Page MenuHomePhabricator

D17758.id42720.diff
No OneTemporary

D17758.id42720.diff

diff --git a/src/aphront/configuration/AphrontApplicationConfiguration.php b/src/aphront/configuration/AphrontApplicationConfiguration.php
--- a/src/aphront/configuration/AphrontApplicationConfiguration.php
+++ b/src/aphront/configuration/AphrontApplicationConfiguration.php
@@ -205,9 +205,8 @@
DarkConsoleXHProfPluginAPI::saveProfilerSample($access_log);
// Add points to the rate limits for this request.
- if (isset($_SERVER['REMOTE_ADDR'])) {
- $user_ip = $_SERVER['REMOTE_ADDR'];
-
+ $rate_token = PhabricatorStartup::getRateLimitToken();
+ if ($rate_token !== null) {
// The base score for a request allows users to make 30 requests per
// minute.
$score = (1000 / 30);
@@ -217,7 +216,7 @@
$score = $score / 5;
}
- PhabricatorStartup::addRateLimitScore($user_ip, $score);
+ PhabricatorStartup::addRateLimitScore($rate_token, $score);
}
if ($processing_exception) {
diff --git a/src/docs/user/configuration/configuring_preamble.diviner b/src/docs/user/configuration/configuring_preamble.diviner
--- a/src/docs/user/configuration/configuring_preamble.diviner
+++ b/src/docs/user/configuration/configuring_preamble.diviner
@@ -1,8 +1,7 @@
@title Configuring a Preamble Script
@group config
-Adjust environmental settings (SSL, remote IP, rate limiting) using a preamble
-script.
+Adjust environmental settings (SSL, remote IPs) using a preamble script.
Overview
========
diff --git a/support/PhabricatorStartup.php b/support/PhabricatorStartup.php
--- a/support/PhabricatorStartup.php
+++ b/support/PhabricatorStartup.php
@@ -50,6 +50,7 @@
// iterate on it a bit for Conduit, some of the specific score levels, and
// to deal with NAT'd offices.
private static $maximumRate = 0;
+ private static $rateLimitToken;
/* -( Accessing Request Information )-------------------------------------- */
@@ -137,8 +138,9 @@
// we can switch over to relying on our own exception recovery mechanisms.
ini_set('display_errors', 0);
- if (isset($_SERVER['REMOTE_ADDR'])) {
- self::rateLimitRequest($_SERVER['REMOTE_ADDR']);
+ $rate_token = self::getRateLimitToken();
+ if ($rate_token !== null) {
+ self::rateLimitRequest($rate_token);
}
self::normalizeInput();
@@ -681,6 +683,36 @@
/**
+ * Set a token to identify the client for purposes of rate limiting.
+ *
+ * By default, the `REMOTE_ADDR` is used. If your install is behind a load
+ * balancer, you may want to parse `X-Forwarded-For` and use that address
+ * instead.
+ *
+ * @param string Client identity for rate limiting.
+ */
+ public static function setRateLimitToken($token) {
+ self::$rateLimitToken = $token;
+ }
+
+
+ /**
+ * Get the current client identity for rate limiting.
+ */
+ public static function getRateLimitToken() {
+ if (self::$rateLimitToken !== null) {
+ return self::$rateLimitToken;
+ }
+
+ if (isset($_SERVER['REMOTE_ADDR'])) {
+ return $_SERVER['REMOTE_ADDR'];
+ }
+
+ return null;
+ }
+
+
+ /**
* Check if the user (identified by `$user_identity`) has issued too many
* requests recently. If they have, end the request with a 429 error code.
*
@@ -699,13 +731,18 @@
}
$score = self::getRateLimitScore($user_identity);
- if ($score > (self::$maximumRate * self::getRateLimitBucketCount())) {
+ $limit = self::$maximumRate * self::getRateLimitBucketCount();
+ if ($score > $limit) {
// Give the user some bonus points for getting rate limited. This keeps
// bad actors who keep slamming the 429 page locked out completely,
// instead of letting them get a burst of requests through every minute
// after a bucket expires.
- self::addRateLimitScore($user_identity, 50);
- self::didRateLimit($user_identity);
+ $penalty = 50;
+
+ self::addRateLimitScore($user_identity, $penalty);
+ $score += $penalty;
+
+ self::didRateLimit($user_identity, $score, $limit);
}
}
@@ -729,15 +766,21 @@
return;
}
+ $is_apcu = (bool)function_exists('apcu_fetch');
$current = self::getRateLimitBucket();
- // There's a bit of a race here, if a second process reads the bucket before
- // this one writes it, but it's fine if we occasionally fail to record a
- // user's score. If they're making requests fast enough to hit rate
- // limiting, we'll get them soon.
+ // There's a bit of a race here, if a second process reads the bucket
+ // before this one writes it, but it's fine if we occasionally fail to
+ // record a user's score. If they're making requests fast enough to hit
+ // rate limiting, we'll get them soon enough.
$bucket_key = self::getRateLimitBucketKey($current);
- $bucket = apc_fetch($bucket_key);
+ if ($is_apcu) {
+ $bucket = apcu_fetch($bucket_key);
+ } else {
+ $bucket = apc_fetch($bucket_key);
+ }
+
if (!is_array($bucket)) {
$bucket = array();
}
@@ -747,7 +790,12 @@
}
$bucket[$user_identity] += $score;
- apc_store($bucket_key, $bucket);
+
+ if ($is_apcu) {
+ apcu_store($bucket_key, $bucket);
+ } else {
+ apc_store($bucket_key, $bucket);
+ }
}
@@ -761,11 +809,12 @@
* @task ratelimit
*/
private static function canRateLimit() {
+
if (!self::$maximumRate) {
return false;
}
- if (!function_exists('apc_fetch')) {
+ if (!function_exists('apc_fetch') && !function_exists('apcu_fetch')) {
return false;
}
@@ -826,16 +875,26 @@
* @task ratelimit
*/
private static function getRateLimitScore($user_identity) {
+ $is_apcu = (bool)function_exists('apcu_fetch');
+
$min_key = self::getRateLimitMinKey();
// Identify the oldest bucket stored in APC.
$cur = self::getRateLimitBucket();
- $min = apc_fetch($min_key);
+ if ($is_apcu) {
+ $min = apcu_fetch($min_key);
+ } else {
+ $min = apc_fetch($min_key);
+ }
// If we don't have any buckets stored yet, store the current bucket as
// the oldest bucket.
if (!$min) {
- apc_store($min_key, $cur);
+ if ($is_apcu) {
+ apcu_store($min_key, $cur);
+ } else {
+ apc_store($min_key, $cur);
+ }
$min = $cur;
}
@@ -844,14 +903,25 @@
// up an old bucket once per minute.
$count = self::getRateLimitBucketCount();
for ($cursor = $min; $cursor < ($cur - $count); $cursor++) {
- apc_delete(self::getRateLimitBucketKey($cursor));
- apc_store($min_key, $cursor + 1);
+ $bucket_key = self::getRateLimitBucketKey($cursor);
+ if ($is_apcu) {
+ apcu_delete($bucket_key);
+ apcu_store($min_key, $cursor + 1);
+ } else {
+ apc_delete($bucket_key);
+ apc_store($min_key, $cursor + 1);
+ }
}
// Now, sum up the user's scores in all of the active buckets.
$score = 0;
for (; $cursor <= $cur; $cursor++) {
- $bucket = apc_fetch(self::getRateLimitBucketKey($cursor));
+ $bucket_key = self::getRateLimitBucketKey($cursor);
+ if ($is_apcu) {
+ $bucket = apcu_fetch($bucket_key);
+ } else {
+ $bucket = apc_fetch($bucket_key);
+ }
if (isset($bucket[$user_identity])) {
$score += $bucket[$user_identity];
}
@@ -868,12 +938,11 @@
* @return exit This method **does not return**.
* @task ratelimit
*/
- private static function didRateLimit() {
+ private static function didRateLimit($user_identity, $score, $limit) {
$message =
"TOO MANY REQUESTS\n".
- "You are issuing too many requests too quickly.\n".
- "To adjust limits, see \"Configuring a Preamble Script\" in the ".
- "documentation.";
+ "You (\"{$user_identity}\") are issuing too many requests ".
+ "too quickly.\n";
header(
'Content-Type: text/plain; charset=utf-8',

File Metadata

Mime Type
text/plain
Expires
Sat, Mar 15, 7:50 AM (3 w, 1 d ago)
Storage Engine
blob
Storage Format
Encrypted (AES-256-CBC)
Storage Handle
7382895
Default Alt Text
D17758.id42720.diff (7 KB)

Event Timeline