2013-04-25 15:47:34 +04:00
|
|
|
"""
|
|
|
|
Provides various throttling policies.
|
|
|
|
"""
|
2013-02-05 00:55:35 +04:00
|
|
|
from __future__ import unicode_literals
|
2013-08-28 16:34:14 +04:00
|
|
|
from django.core.cache import cache as default_cache
|
2013-06-05 16:45:28 +04:00
|
|
|
from django.core.exceptions import ImproperlyConfigured
|
2012-09-20 16:06:27 +04:00
|
|
|
from rest_framework.settings import api_settings
|
2013-02-05 00:55:35 +04:00
|
|
|
import time
|
2012-09-20 16:06:27 +04:00
|
|
|
|
|
|
|
|
|
|
|
class BaseThrottle(object):
|
|
|
|
"""
|
|
|
|
Rate throttling of requests.
|
|
|
|
"""
|
2012-10-10 13:02:37 +04:00
|
|
|
def allow_request(self, request, view):
|
2012-09-20 16:06:27 +04:00
|
|
|
"""
|
|
|
|
Return `True` if the request should be allowed, `False` otherwise.
|
|
|
|
"""
|
|
|
|
raise NotImplementedError('.allow_request() must be overridden')
|
|
|
|
|
2013-12-07 02:21:52 +04:00
|
|
|
def get_ident(self, request):
|
|
|
|
"""
|
|
|
|
Identify the machine making the request by parsing HTTP_X_FORWARDED_FOR
|
|
|
|
if present and number of proxies is > 0. If not use all of
|
|
|
|
HTTP_X_FORWARDED_FOR if it is available, if not use REMOTE_ADDR.
|
|
|
|
"""
|
|
|
|
xff = request.META.get('HTTP_X_FORWARDED_FOR')
|
|
|
|
remote_addr = request.META.get('REMOTE_ADDR')
|
|
|
|
num_proxies = api_settings.NUM_PROXIES
|
|
|
|
|
2013-12-13 04:02:18 +04:00
|
|
|
if num_proxies is not None:
|
|
|
|
if num_proxies == 0 or xff is None:
|
|
|
|
return remote_addr
|
|
|
|
addrs = xff.split(',')
|
|
|
|
client_addr = addrs[-min(num_proxies, len(xff))]
|
|
|
|
return client_addr.strip()
|
2013-12-07 02:21:52 +04:00
|
|
|
|
|
|
|
return xff if xff else remote_addr
|
|
|
|
|
2012-09-20 16:06:27 +04:00
|
|
|
def wait(self):
|
|
|
|
"""
|
2012-10-30 03:30:52 +04:00
|
|
|
Optionally, return a recommended number of seconds to wait before
|
2012-09-20 16:06:27 +04:00
|
|
|
the next request.
|
|
|
|
"""
|
|
|
|
return None
|
|
|
|
|
|
|
|
|
2012-10-17 11:41:23 +04:00
|
|
|
class SimpleRateThrottle(BaseThrottle):
|
2012-09-20 16:06:27 +04:00
|
|
|
"""
|
|
|
|
A simple cache implementation, that only requires `.get_cache_key()`
|
|
|
|
to be overridden.
|
|
|
|
|
2013-04-25 15:47:34 +04:00
|
|
|
The rate (requests / seconds) is set by a `throttle` attribute on the View
|
|
|
|
class. The attribute is a string of the form 'number_of_requests/period'.
|
2012-09-20 16:06:27 +04:00
|
|
|
|
|
|
|
Period should be one of: ('s', 'sec', 'm', 'min', 'h', 'hour', 'd', 'day')
|
|
|
|
|
|
|
|
Previous request information used for throttling is stored in the cache.
|
|
|
|
"""
|
|
|
|
|
2013-08-28 16:34:14 +04:00
|
|
|
cache = default_cache
|
2012-09-20 16:06:27 +04:00
|
|
|
timer = time.time
|
|
|
|
cache_format = 'throtte_%(scope)s_%(ident)s'
|
|
|
|
scope = None
|
2013-06-14 17:18:40 +04:00
|
|
|
THROTTLE_RATES = api_settings.DEFAULT_THROTTLE_RATES
|
2012-09-20 16:06:27 +04:00
|
|
|
|
2012-10-10 13:02:37 +04:00
|
|
|
def __init__(self):
|
2012-09-27 00:47:19 +04:00
|
|
|
if not getattr(self, 'rate', None):
|
|
|
|
self.rate = self.get_rate()
|
|
|
|
self.num_requests, self.duration = self.parse_rate(self.rate)
|
2012-09-20 16:06:27 +04:00
|
|
|
|
2012-10-10 13:02:37 +04:00
|
|
|
def get_cache_key(self, request, view):
|
2012-09-20 16:06:27 +04:00
|
|
|
"""
|
|
|
|
Should return a unique cache-key which can be used for throttling.
|
|
|
|
Must be overridden.
|
|
|
|
|
|
|
|
May return `None` if the request should not be throttled.
|
|
|
|
"""
|
|
|
|
raise NotImplementedError('.get_cache_key() must be overridden')
|
|
|
|
|
2012-09-27 00:47:19 +04:00
|
|
|
def get_rate(self):
|
2012-09-20 16:06:27 +04:00
|
|
|
"""
|
|
|
|
Determine the string representation of the allowed request rate.
|
|
|
|
"""
|
2012-09-27 00:47:19 +04:00
|
|
|
if not getattr(self, 'scope', None):
|
2012-10-21 18:34:07 +04:00
|
|
|
msg = ("You must set either `.scope` or `.rate` for '%s' throttle" %
|
2012-09-27 00:47:19 +04:00
|
|
|
self.__class__.__name__)
|
2013-06-05 16:45:28 +04:00
|
|
|
raise ImproperlyConfigured(msg)
|
2012-09-27 00:47:19 +04:00
|
|
|
|
2012-09-20 16:06:27 +04:00
|
|
|
try:
|
2013-06-14 17:18:40 +04:00
|
|
|
return self.THROTTLE_RATES[self.scope]
|
2012-09-27 00:47:19 +04:00
|
|
|
except KeyError:
|
|
|
|
msg = "No default throttle rate set for '%s' scope" % self.scope
|
2013-06-05 16:45:28 +04:00
|
|
|
raise ImproperlyConfigured(msg)
|
2012-09-20 16:06:27 +04:00
|
|
|
|
2012-09-27 00:47:19 +04:00
|
|
|
def parse_rate(self, rate):
|
2012-09-20 16:06:27 +04:00
|
|
|
"""
|
|
|
|
Given the request rate string, return a two tuple of:
|
|
|
|
<allowed number of requests>, <period of time in seconds>
|
|
|
|
"""
|
2012-09-27 00:47:19 +04:00
|
|
|
if rate is None:
|
|
|
|
return (None, None)
|
2012-09-20 16:06:27 +04:00
|
|
|
num, period = rate.split('/')
|
|
|
|
num_requests = int(num)
|
|
|
|
duration = {'s': 1, 'm': 60, 'h': 3600, 'd': 86400}[period[0]]
|
|
|
|
return (num_requests, duration)
|
|
|
|
|
2012-10-10 13:02:37 +04:00
|
|
|
def allow_request(self, request, view):
|
2012-09-20 16:06:27 +04:00
|
|
|
"""
|
|
|
|
Implement the check to see if the request should be throttled.
|
|
|
|
|
|
|
|
On success calls `throttle_success`.
|
|
|
|
On failure calls `throttle_failure`.
|
|
|
|
"""
|
2012-09-27 00:47:19 +04:00
|
|
|
if self.rate is None:
|
|
|
|
return True
|
|
|
|
|
2012-10-10 13:02:37 +04:00
|
|
|
self.key = self.get_cache_key(request, view)
|
2013-08-16 00:36:45 +04:00
|
|
|
if self.key is None:
|
|
|
|
return True
|
|
|
|
|
2013-08-28 16:34:14 +04:00
|
|
|
self.history = self.cache.get(self.key, [])
|
2012-09-20 16:06:27 +04:00
|
|
|
self.now = self.timer()
|
|
|
|
|
|
|
|
# Drop any requests from the history which have now passed the
|
|
|
|
# throttle duration
|
|
|
|
while self.history and self.history[-1] <= self.now - self.duration:
|
|
|
|
self.history.pop()
|
|
|
|
if len(self.history) >= self.num_requests:
|
|
|
|
return self.throttle_failure()
|
|
|
|
return self.throttle_success()
|
|
|
|
|
|
|
|
def throttle_success(self):
|
|
|
|
"""
|
|
|
|
Inserts the current request's timestamp along with the key
|
|
|
|
into the cache.
|
|
|
|
"""
|
|
|
|
self.history.insert(0, self.now)
|
2013-08-28 16:34:14 +04:00
|
|
|
self.cache.set(self.key, self.history, self.duration)
|
2012-09-20 16:06:27 +04:00
|
|
|
return True
|
|
|
|
|
|
|
|
def throttle_failure(self):
|
|
|
|
"""
|
|
|
|
Called when a request to the API has failed due to throttling.
|
|
|
|
"""
|
|
|
|
return False
|
|
|
|
|
|
|
|
def wait(self):
|
|
|
|
"""
|
|
|
|
Returns the recommended next request time in seconds.
|
|
|
|
"""
|
|
|
|
if self.history:
|
|
|
|
remaining_duration = self.duration - (self.now - self.history[-1])
|
|
|
|
else:
|
|
|
|
remaining_duration = self.duration
|
|
|
|
|
|
|
|
available_requests = self.num_requests - len(self.history) + 1
|
2014-02-28 00:27:54 +04:00
|
|
|
if available_requests <= 0:
|
|
|
|
return None
|
2012-09-20 16:06:27 +04:00
|
|
|
|
|
|
|
return remaining_duration / float(available_requests)
|
|
|
|
|
|
|
|
|
2012-10-17 11:41:23 +04:00
|
|
|
class AnonRateThrottle(SimpleRateThrottle):
|
2012-09-20 16:06:27 +04:00
|
|
|
"""
|
|
|
|
Limits the rate of API calls that may be made by a anonymous users.
|
|
|
|
|
2012-10-21 18:34:07 +04:00
|
|
|
The IP address of the request will be used as the unique cache key.
|
2012-09-20 16:06:27 +04:00
|
|
|
"""
|
|
|
|
scope = 'anon'
|
|
|
|
|
2012-10-10 13:02:37 +04:00
|
|
|
def get_cache_key(self, request, view):
|
2012-09-20 16:06:27 +04:00
|
|
|
if request.user.is_authenticated():
|
|
|
|
return None # Only throttle unauthenticated requests.
|
|
|
|
|
2013-08-28 18:32:41 +04:00
|
|
|
ident = request.META.get('HTTP_X_FORWARDED_FOR')
|
|
|
|
if ident is None:
|
|
|
|
ident = request.META.get('REMOTE_ADDR')
|
2014-02-12 21:11:18 +04:00
|
|
|
else:
|
2014-02-14 16:47:17 +04:00
|
|
|
ident = ''.join(ident.split())
|
2012-09-20 16:06:27 +04:00
|
|
|
|
|
|
|
return self.cache_format % {
|
|
|
|
'scope': self.scope,
|
2013-12-07 02:21:52 +04:00
|
|
|
'ident': self.get_ident(request)
|
2012-09-20 16:06:27 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-10-17 11:41:23 +04:00
|
|
|
class UserRateThrottle(SimpleRateThrottle):
|
2012-09-20 16:06:27 +04:00
|
|
|
"""
|
|
|
|
Limits the rate of API calls that may be made by a given user.
|
|
|
|
|
|
|
|
The user id will be used as a unique cache key if the user is
|
|
|
|
authenticated. For anonymous requests, the IP address of the request will
|
|
|
|
be used.
|
|
|
|
"""
|
|
|
|
scope = 'user'
|
|
|
|
|
2012-10-10 13:02:37 +04:00
|
|
|
def get_cache_key(self, request, view):
|
2012-09-20 16:06:27 +04:00
|
|
|
if request.user.is_authenticated():
|
|
|
|
ident = request.user.id
|
|
|
|
else:
|
2013-12-07 02:21:52 +04:00
|
|
|
ident = self.get_ident(request)
|
2012-09-20 16:06:27 +04:00
|
|
|
|
|
|
|
return self.cache_format % {
|
|
|
|
'scope': self.scope,
|
|
|
|
'ident': ident
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-10-17 11:41:23 +04:00
|
|
|
class ScopedRateThrottle(SimpleRateThrottle):
|
2012-09-20 16:06:27 +04:00
|
|
|
"""
|
|
|
|
Limits the rate of API calls by different amounts for various parts of
|
|
|
|
the API. Any view that has the `throttle_scope` property set will be
|
|
|
|
throttled. The unique cache key will be generated by concatenating the
|
|
|
|
user id of the request, and the scope of the view being accessed.
|
|
|
|
"""
|
|
|
|
scope_attr = 'throttle_scope'
|
|
|
|
|
2013-06-14 17:18:40 +04:00
|
|
|
def __init__(self):
|
2013-06-14 18:39:56 +04:00
|
|
|
# Override the usual SimpleRateThrottle, because we can't determine
|
|
|
|
# the rate until called by the view.
|
2013-06-14 17:18:40 +04:00
|
|
|
pass
|
|
|
|
|
|
|
|
def allow_request(self, request, view):
|
2013-06-14 18:39:56 +04:00
|
|
|
# We can only determine the scope once we're called by the view.
|
2013-06-14 17:18:40 +04:00
|
|
|
self.scope = getattr(view, self.scope_attr, None)
|
|
|
|
|
2013-06-14 18:39:56 +04:00
|
|
|
# If a view does not have a `throttle_scope` always allow the request
|
2013-06-14 17:18:40 +04:00
|
|
|
if not self.scope:
|
|
|
|
return True
|
|
|
|
|
2013-06-14 18:39:56 +04:00
|
|
|
# Determine the allowed request rate as we normally would during
|
|
|
|
# the `__init__` call.
|
2013-06-14 17:18:40 +04:00
|
|
|
self.rate = self.get_rate()
|
|
|
|
self.num_requests, self.duration = self.parse_rate(self.rate)
|
2013-06-14 18:39:56 +04:00
|
|
|
|
|
|
|
# We can now proceed as normal.
|
2013-06-14 17:18:40 +04:00
|
|
|
return super(ScopedRateThrottle, self).allow_request(request, view)
|
|
|
|
|
2012-10-10 13:02:37 +04:00
|
|
|
def get_cache_key(self, request, view):
|
2012-09-20 16:06:27 +04:00
|
|
|
"""
|
|
|
|
If `view.throttle_scope` is not set, don't apply this throttle.
|
|
|
|
|
|
|
|
Otherwise generate the unique cache key by concatenating the user id
|
|
|
|
with the '.throttle_scope` property of the view.
|
|
|
|
"""
|
|
|
|
if request.user.is_authenticated():
|
|
|
|
ident = request.user.id
|
|
|
|
else:
|
2013-12-07 02:21:52 +04:00
|
|
|
ident = self.get_ident(request)
|
2012-09-20 16:06:27 +04:00
|
|
|
|
|
|
|
return self.cache_format % {
|
2013-06-14 18:39:56 +04:00
|
|
|
'scope': self.scope,
|
2012-09-20 16:06:27 +04:00
|
|
|
'ident': ident
|
|
|
|
}
|