2020-06-05 11:47:20 +02:00
|
|
|
from synapse.api.ratelimiting import LimitExceededError, Ratelimiter
|
2020-08-21 16:07:56 +02:00
|
|
|
from synapse.appservice import ApplicationService
|
|
|
|
from synapse.types import create_requester
|
2014-09-02 16:06:20 +02:00
|
|
|
|
2014-09-12 19:24:53 +02:00
|
|
|
from tests import unittest
|
2014-09-02 16:06:20 +02:00
|
|
|
|
2016-02-19 16:34:38 +01:00
|
|
|
|
2014-09-02 16:06:20 +02:00
|
|
|
class TestRatelimiter(unittest.TestCase):
|
2020-06-05 11:47:20 +02:00
|
|
|
def test_allowed_via_can_do_action(self):
|
|
|
|
limiter = Ratelimiter(clock=None, rate_hz=0.1, burst_count=1)
|
|
|
|
allowed, time_allowed = limiter.can_do_action(key="test_id", _time_now_s=0)
|
2014-09-02 16:06:20 +02:00
|
|
|
self.assertTrue(allowed)
|
2019-05-10 07:12:11 +02:00
|
|
|
self.assertEquals(10.0, time_allowed)
|
2014-09-02 16:06:20 +02:00
|
|
|
|
2020-06-05 11:47:20 +02:00
|
|
|
allowed, time_allowed = limiter.can_do_action(key="test_id", _time_now_s=5)
|
2014-09-02 16:06:20 +02:00
|
|
|
self.assertFalse(allowed)
|
2019-05-10 07:12:11 +02:00
|
|
|
self.assertEquals(10.0, time_allowed)
|
2014-09-02 16:06:20 +02:00
|
|
|
|
2020-06-05 11:47:20 +02:00
|
|
|
allowed, time_allowed = limiter.can_do_action(key="test_id", _time_now_s=10)
|
2014-09-02 16:06:20 +02:00
|
|
|
self.assertTrue(allowed)
|
2019-05-10 07:12:11 +02:00
|
|
|
self.assertEquals(20.0, time_allowed)
|
2014-09-02 16:06:20 +02:00
|
|
|
|
2020-08-21 16:07:56 +02:00
|
|
|
def test_allowed_user_via_can_requester_do_action(self):
|
|
|
|
user_requester = create_requester("@user:example.com")
|
|
|
|
limiter = Ratelimiter(clock=None, rate_hz=0.1, burst_count=1)
|
|
|
|
allowed, time_allowed = limiter.can_requester_do_action(
|
|
|
|
user_requester, _time_now_s=0
|
|
|
|
)
|
|
|
|
self.assertTrue(allowed)
|
|
|
|
self.assertEquals(10.0, time_allowed)
|
|
|
|
|
|
|
|
allowed, time_allowed = limiter.can_requester_do_action(
|
|
|
|
user_requester, _time_now_s=5
|
|
|
|
)
|
|
|
|
self.assertFalse(allowed)
|
|
|
|
self.assertEquals(10.0, time_allowed)
|
|
|
|
|
|
|
|
allowed, time_allowed = limiter.can_requester_do_action(
|
|
|
|
user_requester, _time_now_s=10
|
|
|
|
)
|
|
|
|
self.assertTrue(allowed)
|
|
|
|
self.assertEquals(20.0, time_allowed)
|
|
|
|
|
|
|
|
def test_allowed_appservice_ratelimited_via_can_requester_do_action(self):
|
|
|
|
appservice = ApplicationService(
|
2020-10-29 16:58:44 +01:00
|
|
|
None, "example.com", id="foo", rate_limited=True, sender="@as:example.com",
|
2020-08-21 16:07:56 +02:00
|
|
|
)
|
|
|
|
as_requester = create_requester("@user:example.com", app_service=appservice)
|
|
|
|
|
|
|
|
limiter = Ratelimiter(clock=None, rate_hz=0.1, burst_count=1)
|
|
|
|
allowed, time_allowed = limiter.can_requester_do_action(
|
|
|
|
as_requester, _time_now_s=0
|
|
|
|
)
|
|
|
|
self.assertTrue(allowed)
|
|
|
|
self.assertEquals(10.0, time_allowed)
|
|
|
|
|
|
|
|
allowed, time_allowed = limiter.can_requester_do_action(
|
|
|
|
as_requester, _time_now_s=5
|
|
|
|
)
|
|
|
|
self.assertFalse(allowed)
|
|
|
|
self.assertEquals(10.0, time_allowed)
|
|
|
|
|
|
|
|
allowed, time_allowed = limiter.can_requester_do_action(
|
|
|
|
as_requester, _time_now_s=10
|
|
|
|
)
|
|
|
|
self.assertTrue(allowed)
|
|
|
|
self.assertEquals(20.0, time_allowed)
|
|
|
|
|
|
|
|
def test_allowed_appservice_via_can_requester_do_action(self):
|
|
|
|
appservice = ApplicationService(
|
2020-10-29 16:58:44 +01:00
|
|
|
None, "example.com", id="foo", rate_limited=False, sender="@as:example.com",
|
2020-08-21 16:07:56 +02:00
|
|
|
)
|
|
|
|
as_requester = create_requester("@user:example.com", app_service=appservice)
|
|
|
|
|
|
|
|
limiter = Ratelimiter(clock=None, rate_hz=0.1, burst_count=1)
|
|
|
|
allowed, time_allowed = limiter.can_requester_do_action(
|
|
|
|
as_requester, _time_now_s=0
|
|
|
|
)
|
|
|
|
self.assertTrue(allowed)
|
|
|
|
self.assertEquals(-1, time_allowed)
|
|
|
|
|
|
|
|
allowed, time_allowed = limiter.can_requester_do_action(
|
|
|
|
as_requester, _time_now_s=5
|
|
|
|
)
|
|
|
|
self.assertTrue(allowed)
|
|
|
|
self.assertEquals(-1, time_allowed)
|
|
|
|
|
|
|
|
allowed, time_allowed = limiter.can_requester_do_action(
|
|
|
|
as_requester, _time_now_s=10
|
|
|
|
)
|
|
|
|
self.assertTrue(allowed)
|
|
|
|
self.assertEquals(-1, time_allowed)
|
|
|
|
|
2020-06-05 11:47:20 +02:00
|
|
|
def test_allowed_via_ratelimit(self):
|
|
|
|
limiter = Ratelimiter(clock=None, rate_hz=0.1, burst_count=1)
|
|
|
|
|
|
|
|
# Shouldn't raise
|
|
|
|
limiter.ratelimit(key="test_id", _time_now_s=0)
|
|
|
|
|
|
|
|
# Should raise
|
|
|
|
with self.assertRaises(LimitExceededError) as context:
|
|
|
|
limiter.ratelimit(key="test_id", _time_now_s=5)
|
|
|
|
self.assertEqual(context.exception.retry_after_ms, 5000)
|
|
|
|
|
|
|
|
# Shouldn't raise
|
|
|
|
limiter.ratelimit(key="test_id", _time_now_s=10)
|
|
|
|
|
|
|
|
def test_allowed_via_can_do_action_and_overriding_parameters(self):
|
|
|
|
"""Test that we can override options of can_do_action that would otherwise fail
|
|
|
|
an action
|
|
|
|
"""
|
|
|
|
# Create a Ratelimiter with a very low allowed rate_hz and burst_count
|
|
|
|
limiter = Ratelimiter(clock=None, rate_hz=0.1, burst_count=1)
|
|
|
|
|
|
|
|
# First attempt should be allowed
|
|
|
|
allowed, time_allowed = limiter.can_do_action(("test_id",), _time_now_s=0,)
|
|
|
|
self.assertTrue(allowed)
|
|
|
|
self.assertEqual(10.0, time_allowed)
|
|
|
|
|
|
|
|
# Second attempt, 1s later, will fail
|
|
|
|
allowed, time_allowed = limiter.can_do_action(("test_id",), _time_now_s=1,)
|
|
|
|
self.assertFalse(allowed)
|
|
|
|
self.assertEqual(10.0, time_allowed)
|
|
|
|
|
|
|
|
# But, if we allow 10 actions/sec for this request, we should be allowed
|
|
|
|
# to continue.
|
2019-03-05 15:25:33 +01:00
|
|
|
allowed, time_allowed = limiter.can_do_action(
|
2020-06-05 11:47:20 +02:00
|
|
|
("test_id",), _time_now_s=1, rate_hz=10.0
|
2014-09-02 16:06:20 +02:00
|
|
|
)
|
2020-06-05 11:47:20 +02:00
|
|
|
self.assertTrue(allowed)
|
|
|
|
self.assertEqual(1.1, time_allowed)
|
2014-09-02 16:06:20 +02:00
|
|
|
|
2020-06-05 11:47:20 +02:00
|
|
|
# Similarly if we allow a burst of 10 actions
|
2019-03-05 15:25:33 +01:00
|
|
|
allowed, time_allowed = limiter.can_do_action(
|
2020-06-05 11:47:20 +02:00
|
|
|
("test_id",), _time_now_s=1, burst_count=10
|
2014-09-02 16:06:20 +02:00
|
|
|
)
|
2020-06-05 11:47:20 +02:00
|
|
|
self.assertTrue(allowed)
|
|
|
|
self.assertEqual(1.0, time_allowed)
|
|
|
|
|
|
|
|
def test_allowed_via_ratelimit_and_overriding_parameters(self):
|
|
|
|
"""Test that we can override options of the ratelimit method that would otherwise
|
|
|
|
fail an action
|
|
|
|
"""
|
|
|
|
# Create a Ratelimiter with a very low allowed rate_hz and burst_count
|
|
|
|
limiter = Ratelimiter(clock=None, rate_hz=0.1, burst_count=1)
|
|
|
|
|
|
|
|
# First attempt should be allowed
|
|
|
|
limiter.ratelimit(key=("test_id",), _time_now_s=0)
|
|
|
|
|
|
|
|
# Second attempt, 1s later, will fail
|
|
|
|
with self.assertRaises(LimitExceededError) as context:
|
|
|
|
limiter.ratelimit(key=("test_id",), _time_now_s=1)
|
|
|
|
self.assertEqual(context.exception.retry_after_ms, 9000)
|
|
|
|
|
|
|
|
# But, if we allow 10 actions/sec for this request, we should be allowed
|
|
|
|
# to continue.
|
|
|
|
limiter.ratelimit(key=("test_id",), _time_now_s=1, rate_hz=10.0)
|
|
|
|
|
|
|
|
# Similarly if we allow a burst of 10 actions
|
|
|
|
limiter.ratelimit(key=("test_id",), _time_now_s=1, burst_count=10)
|
|
|
|
|
|
|
|
def test_pruning(self):
|
|
|
|
limiter = Ratelimiter(clock=None, rate_hz=0.1, burst_count=1)
|
|
|
|
limiter.can_do_action(key="test_id_1", _time_now_s=0)
|
|
|
|
|
|
|
|
self.assertIn("test_id_1", limiter.actions)
|
|
|
|
|
|
|
|
limiter.can_do_action(key="test_id_2", _time_now_s=10)
|
2014-09-02 16:06:20 +02:00
|
|
|
|
2020-06-05 11:47:20 +02:00
|
|
|
self.assertNotIn("test_id_1", limiter.actions)
|