| 
									
										
										
										
											2017-04-18 22:29:14 +02:00
										 |  |  | # frozen_string_literal: true | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-03-19 14:57:30 +01:00
										 |  |  | class Rack::Attack | 
					
						
							| 
									
										
										
										
											2017-04-29 15:27:49 -07:00
										 |  |  |   # Always allow requests from localhost | 
					
						
							|  |  |  |   # (blocklist & throttles are skipped) | 
					
						
							|  |  |  |   Rack::Attack.safelist('allow from localhost') do |req| | 
					
						
							|  |  |  |     # Requests are allowed if the return value is truthy | 
					
						
							|  |  |  |     '127.0.0.1' == req.ip || '::1' == req.ip | 
					
						
							|  |  |  |   end | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-10-22 19:38:47 +02:00
										 |  |  |   # Rate limits for the API | 
					
						
							| 
									
										
										
										
											2017-03-14 15:59:21 +01:00
										 |  |  |   throttle('api', limit: 300, period: 5.minutes) do |req| | 
					
						
							| 
									
										
										
										
											2017-04-18 22:29:14 +02:00
										 |  |  |     req.ip if req.path =~ /\A\/api\/v/ | 
					
						
							|  |  |  |   end | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |   # Rate limit logins | 
					
						
							|  |  |  |   throttle('login', limit: 5, period: 5.minutes) do |req| | 
					
						
							|  |  |  |     req.ip if req.path == '/auth/sign_in' && req.post? | 
					
						
							|  |  |  |   end | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |   # Rate limit sign-ups | 
					
						
							|  |  |  |   throttle('register', limit: 5, period: 5.minutes) do |req| | 
					
						
							|  |  |  |     req.ip if req.path == '/auth' && req.post? | 
					
						
							|  |  |  |   end | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |   # Rate limit forgotten passwords | 
					
						
							|  |  |  |   throttle('reminder', limit: 5, period: 5.minutes) do |req| | 
					
						
							|  |  |  |     req.ip if req.path == '/auth/password' && req.post? | 
					
						
							| 
									
										
										
										
											2016-09-24 13:53:54 +02:00
										 |  |  |   end | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-10-22 19:38:47 +02:00
										 |  |  |   self.throttled_response = lambda do |env| | 
					
						
							|  |  |  |     now        = Time.now.utc | 
					
						
							|  |  |  |     match_data = env['rack.attack.match_data'] | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     headers = { | 
					
						
							|  |  |  |       'X-RateLimit-Limit'     => match_data[:limit].to_s, | 
					
						
							|  |  |  |       'X-RateLimit-Remaining' => '0', | 
					
						
							| 
									
										
										
										
											2017-03-14 15:59:21 +01:00
										 |  |  |       'X-RateLimit-Reset'     => (now + (match_data[:period] - now.to_i % match_data[:period])).iso8601(6), | 
					
						
							| 
									
										
										
										
											2016-10-22 19:38:47 +02:00
										 |  |  |     } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2017-05-04 06:36:19 +09:00
										 |  |  |     [429, headers, [{ error: I18n.t('errors.429') }.to_json]] | 
					
						
							| 
									
										
										
										
											2016-03-25 14:12:24 +01:00
										 |  |  |   end | 
					
						
							| 
									
										
										
										
											2016-03-19 14:57:30 +01:00
										 |  |  | end |