123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172 |
- <?php
- declare(strict_types=1);
- /**
- * @copyright Copyright (c) 2023 Joas Schilling <coding@schilljs.com>
- * @copyright Copyright (c) 2017 Lukas Reschke <lukas@statuscode.ch>
- *
- * @author Christoph Wurst <christoph@winzerhof-wurst.at>
- * @author Joas Schilling <coding@schilljs.com>
- * @author Lukas Reschke <lukas@statuscode.ch>
- *
- * @license GNU AGPL version 3 or any later version
- *
- * This program is free software: you can redistribute it and/or modify
- * it under the terms of the GNU Affero General Public License as
- * published by the Free Software Foundation, either version 3 of the
- * License, or (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU Affero General Public License for more details.
- *
- * You should have received a copy of the GNU Affero General Public License
- * along with this program. If not, see <http://www.gnu.org/licenses/>.
- *
- */
- namespace OC\AppFramework\Middleware\Security;
- use OC\AppFramework\Utility\ControllerMethodReflector;
- use OC\Security\RateLimiting\Exception\RateLimitExceededException;
- use OC\Security\RateLimiting\Limiter;
- use OCP\AppFramework\Controller;
- use OCP\AppFramework\Http\Attribute\AnonRateLimit;
- use OCP\AppFramework\Http\Attribute\ARateLimit;
- use OCP\AppFramework\Http\Attribute\UserRateLimit;
- use OCP\AppFramework\Http\DataResponse;
- use OCP\AppFramework\Http\Response;
- use OCP\AppFramework\Http\TemplateResponse;
- use OCP\AppFramework\Middleware;
- use OCP\IRequest;
- use OCP\ISession;
- use OCP\IUserSession;
- use ReflectionMethod;
- /**
- * Class RateLimitingMiddleware is the middleware responsible for implementing the
- * ratelimiting in Nextcloud.
- *
- * It parses annotations such as:
- *
- * @UserRateThrottle(limit=5, period=100)
- * @AnonRateThrottle(limit=1, period=100)
- *
- * Or attributes such as:
- *
- * #[UserRateLimit(limit: 5, period: 100)]
- * #[AnonRateLimit(limit: 1, period: 100)]
- *
- * Both sets would mean that logged-in users can access the page 5
- * times within 100 seconds, and anonymous users 1 time within 100 seconds. If
- * only an AnonRateThrottle is specified that one will also be applied to logged-in
- * users.
- *
- * @package OC\AppFramework\Middleware\Security
- */
- class RateLimitingMiddleware extends Middleware {
- public function __construct(
- protected IRequest $request,
- protected IUserSession $userSession,
- protected ControllerMethodReflector $reflector,
- protected Limiter $limiter,
- protected ISession $session,
- ) {
- }
- /**
- * {@inheritDoc}
- * @throws RateLimitExceededException
- */
- public function beforeController(Controller $controller, string $methodName): void {
- parent::beforeController($controller, $methodName);
- $rateLimitIdentifier = get_class($controller) . '::' . $methodName;
- if ($this->session->exists('app_api_system')) {
- // Bypass rate limiting for app_api
- return;
- }
- if ($this->userSession->isLoggedIn()) {
- $rateLimit = $this->readLimitFromAnnotationOrAttribute($controller, $methodName, 'UserRateThrottle', UserRateLimit::class);
- if ($rateLimit !== null) {
- $this->limiter->registerUserRequest(
- $rateLimitIdentifier,
- $rateLimit->getLimit(),
- $rateLimit->getPeriod(),
- $this->userSession->getUser()
- );
- return;
- }
- // If not user specific rate limit is found the Anon rate limit applies!
- }
- $rateLimit = $this->readLimitFromAnnotationOrAttribute($controller, $methodName, 'AnonRateThrottle', AnonRateLimit::class);
- if ($rateLimit !== null) {
- $this->limiter->registerAnonRequest(
- $rateLimitIdentifier,
- $rateLimit->getLimit(),
- $rateLimit->getPeriod(),
- $this->request->getRemoteAddress()
- );
- }
- }
- /**
- * @template T of ARateLimit
- *
- * @param Controller $controller
- * @param string $methodName
- * @param string $annotationName
- * @param class-string<T> $attributeClass
- * @return ?ARateLimit
- */
- protected function readLimitFromAnnotationOrAttribute(Controller $controller, string $methodName, string $annotationName, string $attributeClass): ?ARateLimit {
- $annotationLimit = $this->reflector->getAnnotationParameter($annotationName, 'limit');
- $annotationPeriod = $this->reflector->getAnnotationParameter($annotationName, 'period');
- if ($annotationLimit !== '' && $annotationPeriod !== '') {
- return new $attributeClass(
- (int) $annotationLimit,
- (int) $annotationPeriod,
- );
- }
- $reflectionMethod = new ReflectionMethod($controller, $methodName);
- $attributes = $reflectionMethod->getAttributes($attributeClass);
- $attribute = current($attributes);
- if ($attribute !== false) {
- return $attribute->newInstance();
- }
- return null;
- }
- /**
- * {@inheritDoc}
- */
- public function afterException(Controller $controller, string $methodName, \Exception $exception): Response {
- if ($exception instanceof RateLimitExceededException) {
- if (stripos($this->request->getHeader('Accept'), 'html') === false) {
- $response = new DataResponse([], $exception->getCode());
- } else {
- $response = new TemplateResponse(
- 'core',
- '429',
- [],
- TemplateResponse::RENDER_AS_GUEST
- );
- $response->setStatus($exception->getCode());
- }
- return $response;
- }
- throw $exception;
- }
- }
|