visitor.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365
  1. package server
  2. import (
  3. "errors"
  4. "fmt"
  5. "heckel.io/ntfy/log"
  6. "heckel.io/ntfy/user"
  7. "net/netip"
  8. "sync"
  9. "time"
  10. "golang.org/x/time/rate"
  11. "heckel.io/ntfy/util"
  12. )
  13. const (
  14. // visitorExpungeAfter defines how long a visitor is active before it is removed from memory. This number
  15. // has to be very high to prevent e-mail abuse, but it doesn't really affect the other limits anyway, since
  16. // they are replenished faster (typically).
  17. visitorExpungeAfter = 24 * time.Hour
  18. // visitorDefaultReservationsLimit is the amount of topic names a user without a tier is allowed to reserve.
  19. // This number is zero, and changing it may have unintended consequences in the web app, or otherwise
  20. visitorDefaultReservationsLimit = int64(0)
  21. )
  22. var (
  23. errVisitorLimitReached = errors.New("limit reached")
  24. )
  25. // visitor represents an API user, and its associated rate.Limiter used for rate limiting
  26. type visitor struct {
  27. config *Config
  28. messageCache *messageCache
  29. userManager *user.Manager // May be nil
  30. ip netip.Addr // Visitor IP address
  31. user *user.User // Only set if authenticated user, otherwise nil
  32. messages int64 // Number of messages sent, reset every day
  33. emails int64 // Number of emails sent, reset every day
  34. requestLimiter *rate.Limiter // Rate limiter for (almost) all requests (including messages)
  35. messagesLimiter util.Limiter // Rate limiter for messages, may be nil
  36. emailsLimiter *rate.Limiter // Rate limiter for emails
  37. subscriptionLimiter util.Limiter // Fixed limiter for active subscriptions (ongoing connections)
  38. bandwidthLimiter util.Limiter // Limiter for attachment bandwidth downloads
  39. accountLimiter *rate.Limiter // Rate limiter for account creation, may be nil
  40. firebase time.Time // Next allowed Firebase message
  41. seen time.Time // Last seen time of this visitor (needed for removal of stale visitors)
  42. mu sync.Mutex
  43. }
  44. type visitorInfo struct {
  45. Limits *visitorLimits
  46. Stats *visitorStats
  47. }
  48. type visitorLimits struct {
  49. Basis visitorLimitBasis
  50. MessagesLimit int64
  51. MessagesExpiryDuration time.Duration
  52. EmailsLimit int64
  53. ReservationsLimit int64
  54. AttachmentTotalSizeLimit int64
  55. AttachmentFileSizeLimit int64
  56. AttachmentExpiryDuration time.Duration
  57. AttachmentBandwidthLimit int64
  58. }
  59. type visitorStats struct {
  60. Messages int64
  61. MessagesRemaining int64
  62. Emails int64
  63. EmailsRemaining int64
  64. Reservations int64
  65. ReservationsRemaining int64
  66. AttachmentTotalSize int64
  67. AttachmentTotalSizeRemaining int64
  68. }
  69. // visitorLimitBasis describes how the visitor limits were derived, either from a user's
  70. // IP address (default config), or from its tier
  71. type visitorLimitBasis string
  72. const (
  73. visitorLimitBasisIP = visitorLimitBasis("ip")
  74. visitorLimitBasisTier = visitorLimitBasis("tier")
  75. )
  76. func newVisitor(conf *Config, messageCache *messageCache, userManager *user.Manager, ip netip.Addr, user *user.User) *visitor {
  77. var messages, emails int64
  78. if user != nil {
  79. messages = user.Stats.Messages
  80. emails = user.Stats.Emails
  81. }
  82. v := &visitor{
  83. config: conf,
  84. messageCache: messageCache,
  85. userManager: userManager, // May be nil
  86. ip: ip,
  87. user: user,
  88. messages: messages,
  89. emails: emails,
  90. firebase: time.Unix(0, 0),
  91. seen: time.Now(),
  92. subscriptionLimiter: util.NewFixedLimiter(int64(conf.VisitorSubscriptionLimit)),
  93. requestLimiter: nil, // Set in resetLimiters
  94. messagesLimiter: nil, // Set in resetLimiters, may be nil
  95. emailsLimiter: nil, // Set in resetLimiters
  96. bandwidthLimiter: nil, // Set in resetLimiters
  97. accountLimiter: nil, // Set in resetLimiters, may be nil
  98. }
  99. v.resetLimiters()
  100. return v
  101. }
  102. func (v *visitor) String() string {
  103. v.mu.Lock()
  104. defer v.mu.Unlock()
  105. return v.stringNoLock()
  106. }
  107. func (v *visitor) stringNoLock() string {
  108. if v.user != nil && v.user.Billing.StripeCustomerID != "" {
  109. return fmt.Sprintf("%s/%s/%s", v.ip.String(), v.user.ID, v.user.Billing.StripeCustomerID)
  110. } else if v.user != nil {
  111. return fmt.Sprintf("%s/%s", v.ip.String(), v.user.ID)
  112. }
  113. return v.ip.String()
  114. }
  115. func (v *visitor) RequestAllowed() error {
  116. if !v.requestLimiter.Allow() {
  117. return errVisitorLimitReached
  118. }
  119. return nil
  120. }
  121. func (v *visitor) FirebaseAllowed() error {
  122. v.mu.Lock()
  123. defer v.mu.Unlock()
  124. if time.Now().Before(v.firebase) {
  125. return errVisitorLimitReached
  126. }
  127. return nil
  128. }
  129. func (v *visitor) FirebaseTemporarilyDeny() {
  130. v.mu.Lock()
  131. defer v.mu.Unlock()
  132. v.firebase = time.Now().Add(v.config.FirebaseQuotaExceededPenaltyDuration)
  133. }
  134. func (v *visitor) MessageAllowed() error {
  135. if v.messagesLimiter != nil && v.messagesLimiter.Allow(1) != nil {
  136. return errVisitorLimitReached
  137. }
  138. return nil
  139. }
  140. func (v *visitor) EmailAllowed() error {
  141. if !v.emailsLimiter.Allow() {
  142. return errVisitorLimitReached
  143. }
  144. return nil
  145. }
  146. func (v *visitor) SubscriptionAllowed() error {
  147. v.mu.Lock()
  148. defer v.mu.Unlock()
  149. if err := v.subscriptionLimiter.Allow(1); err != nil {
  150. return errVisitorLimitReached
  151. }
  152. return nil
  153. }
  154. func (v *visitor) AccountCreationAllowed() error {
  155. if v.accountLimiter != nil && !v.accountLimiter.Allow() {
  156. return errVisitorLimitReached
  157. }
  158. return nil
  159. }
  160. func (v *visitor) RemoveSubscription() {
  161. v.mu.Lock()
  162. defer v.mu.Unlock()
  163. v.subscriptionLimiter.Allow(-1)
  164. }
  165. func (v *visitor) Keepalive() {
  166. v.mu.Lock()
  167. defer v.mu.Unlock()
  168. v.seen = time.Now()
  169. }
  170. func (v *visitor) BandwidthLimiter() util.Limiter {
  171. return v.bandwidthLimiter
  172. }
  173. func (v *visitor) Stale() bool {
  174. v.mu.Lock()
  175. defer v.mu.Unlock()
  176. return time.Since(v.seen) > visitorExpungeAfter
  177. }
  178. func (v *visitor) IncrementMessages() {
  179. v.mu.Lock()
  180. defer v.mu.Unlock()
  181. v.messages++
  182. if v.user != nil {
  183. v.user.Stats.Messages = v.messages
  184. }
  185. }
  186. func (v *visitor) IncrementEmails() {
  187. v.mu.Lock()
  188. defer v.mu.Unlock()
  189. v.emails++
  190. if v.user != nil {
  191. v.user.Stats.Emails = v.emails
  192. }
  193. }
  194. func (v *visitor) ResetStats() {
  195. v.mu.Lock()
  196. defer v.mu.Unlock()
  197. v.messages = 0
  198. v.emails = 0
  199. if v.user != nil {
  200. v.user.Stats.Messages = 0
  201. v.user.Stats.Emails = 0
  202. // v.messagesLimiter = ... // FIXME
  203. }
  204. }
  205. // SetUser sets the visitors user to the given value
  206. func (v *visitor) SetUser(u *user.User) {
  207. v.mu.Lock()
  208. defer v.mu.Unlock()
  209. shouldResetLimiters := v.user.TierID() != u.TierID() // TierID works with nil receiver
  210. v.user = u
  211. if shouldResetLimiters {
  212. v.resetLimiters()
  213. }
  214. }
  215. func (v *visitor) resetLimiters() {
  216. log.Info("%s Resetting limiters for visitor", v.stringNoLock())
  217. var messagesLimiter, bandwidthLimiter util.Limiter
  218. var requestLimiter, emailsLimiter, accountLimiter *rate.Limiter
  219. if v.user != nil && v.user.Tier != nil {
  220. requestLimiter = rate.NewLimiter(dailyLimitToRate(v.user.Tier.MessagesLimit), v.config.VisitorRequestLimitBurst)
  221. messagesLimiter = util.NewFixedLimiter(v.user.Tier.MessagesLimit)
  222. emailsLimiter = rate.NewLimiter(dailyLimitToRate(v.user.Tier.EmailsLimit), v.config.VisitorEmailLimitBurst)
  223. bandwidthLimiter = util.NewBytesLimiter(int(v.user.Tier.AttachmentBandwidthLimit), 24*time.Hour)
  224. } else {
  225. requestLimiter = rate.NewLimiter(rate.Every(v.config.VisitorRequestLimitReplenish), v.config.VisitorRequestLimitBurst)
  226. messagesLimiter = nil // Message limit is governed by the requestLimiter
  227. emailsLimiter = rate.NewLimiter(rate.Every(v.config.VisitorEmailLimitReplenish), v.config.VisitorEmailLimitBurst)
  228. bandwidthLimiter = util.NewBytesLimiter(int(v.config.VisitorAttachmentDailyBandwidthLimit), 24*time.Hour)
  229. }
  230. if v.user == nil {
  231. accountLimiter = rate.NewLimiter(rate.Every(v.config.VisitorAccountCreationLimitReplenish), v.config.VisitorAccountCreationLimitBurst)
  232. }
  233. v.requestLimiter = requestLimiter
  234. v.messagesLimiter = messagesLimiter
  235. v.emailsLimiter = emailsLimiter
  236. v.bandwidthLimiter = bandwidthLimiter
  237. v.accountLimiter = accountLimiter
  238. }
  239. // MaybeUserID returns the user ID of the visitor (if any). If this is an anonymous visitor,
  240. // an empty string is returned.
  241. func (v *visitor) MaybeUserID() string {
  242. v.mu.Lock()
  243. defer v.mu.Unlock()
  244. if v.user != nil {
  245. return v.user.ID
  246. }
  247. return ""
  248. }
  249. func (v *visitor) Limits() *visitorLimits {
  250. v.mu.Lock()
  251. defer v.mu.Unlock()
  252. limits := defaultVisitorLimits(v.config)
  253. if v.user != nil && v.user.Tier != nil {
  254. limits.Basis = visitorLimitBasisTier
  255. limits.MessagesLimit = v.user.Tier.MessagesLimit
  256. limits.MessagesExpiryDuration = v.user.Tier.MessagesExpiryDuration
  257. limits.EmailsLimit = v.user.Tier.EmailsLimit
  258. limits.ReservationsLimit = v.user.Tier.ReservationsLimit
  259. limits.AttachmentTotalSizeLimit = v.user.Tier.AttachmentTotalSizeLimit
  260. limits.AttachmentFileSizeLimit = v.user.Tier.AttachmentFileSizeLimit
  261. limits.AttachmentExpiryDuration = v.user.Tier.AttachmentExpiryDuration
  262. limits.AttachmentBandwidthLimit = v.user.Tier.AttachmentBandwidthLimit
  263. }
  264. return limits
  265. }
  266. func (v *visitor) Info() (*visitorInfo, error) {
  267. v.mu.Lock()
  268. messages := v.messages
  269. emails := v.emails
  270. v.mu.Unlock()
  271. var attachmentsBytesUsed int64
  272. var err error
  273. if v.user != nil {
  274. attachmentsBytesUsed, err = v.messageCache.AttachmentBytesUsedByUser(v.user.ID)
  275. } else {
  276. attachmentsBytesUsed, err = v.messageCache.AttachmentBytesUsedBySender(v.ip.String())
  277. }
  278. if err != nil {
  279. return nil, err
  280. }
  281. var reservations int64
  282. if v.user != nil && v.userManager != nil {
  283. reservations, err = v.userManager.ReservationsCount(v.user.Name)
  284. if err != nil {
  285. return nil, err
  286. }
  287. }
  288. limits := v.Limits()
  289. stats := &visitorStats{
  290. Messages: messages,
  291. MessagesRemaining: zeroIfNegative(limits.MessagesLimit - messages),
  292. Emails: emails,
  293. EmailsRemaining: zeroIfNegative(limits.EmailsLimit - emails),
  294. Reservations: reservations,
  295. ReservationsRemaining: zeroIfNegative(limits.ReservationsLimit - reservations),
  296. AttachmentTotalSize: attachmentsBytesUsed,
  297. AttachmentTotalSizeRemaining: zeroIfNegative(limits.AttachmentTotalSizeLimit - attachmentsBytesUsed),
  298. }
  299. return &visitorInfo{
  300. Limits: limits,
  301. Stats: stats,
  302. }, nil
  303. }
  304. func zeroIfNegative(value int64) int64 {
  305. if value < 0 {
  306. return 0
  307. }
  308. return value
  309. }
  310. func replenishDurationToDailyLimit(duration time.Duration) int64 {
  311. return int64(24 * time.Hour / duration)
  312. }
  313. func dailyLimitToRate(limit int64) rate.Limit {
  314. return rate.Limit(limit) * rate.Every(24*time.Hour)
  315. }
  316. func defaultVisitorLimits(conf *Config) *visitorLimits {
  317. return &visitorLimits{
  318. Basis: visitorLimitBasisIP,
  319. MessagesLimit: replenishDurationToDailyLimit(conf.VisitorRequestLimitReplenish),
  320. MessagesExpiryDuration: conf.CacheDuration,
  321. EmailsLimit: replenishDurationToDailyLimit(conf.VisitorEmailLimitReplenish),
  322. ReservationsLimit: visitorDefaultReservationsLimit,
  323. AttachmentTotalSizeLimit: conf.VisitorAttachmentTotalSizeLimit,
  324. AttachmentFileSizeLimit: conf.AttachmentFileSizeLimit,
  325. AttachmentExpiryDuration: conf.AttachmentExpiryDuration,
  326. AttachmentBandwidthLimit: conf.VisitorAttachmentDailyBandwidthLimit,
  327. }
  328. }