File size: 7,976 Bytes
97c535b
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
"""
Module: api.middleware.rate_limit
Description: Rate limiting middleware for API endpoints
Author: Anderson H. Silva
Date: 2025-01-25
License: Proprietary - All rights reserved
"""

from typing import Optional, Dict, Any
from datetime import datetime

from fastapi import Request, Response, HTTPException, status
from starlette.middleware.base import BaseHTTPMiddleware
from starlette.responses import JSONResponse

from src.core import get_logger
from src.infrastructure.rate_limiter import (
    rate_limiter,
    RateLimitTier,
    RateLimitStrategy
)
from src.models.api_key import APIKey

logger = get_logger(__name__)


class RateLimitMiddleware(BaseHTTPMiddleware):
    """
    Rate limiting middleware.
    
    Supports multiple identification methods:
    - API Key (preferred)
    - User ID (authenticated users)
    - IP Address (fallback)
    """
    
    def __init__(
        self,
        app,
        default_tier: RateLimitTier = RateLimitTier.FREE,
        strategy: RateLimitStrategy = RateLimitStrategy.SLIDING_WINDOW
    ):
        """Initialize rate limit middleware."""
        super().__init__(app)
        self.default_tier = default_tier
        self.rate_limiter = rate_limiter
        self.rate_limiter.strategy = strategy
        
    async def dispatch(self, request: Request, call_next):
        """Process request with rate limiting."""
        # Skip rate limiting for certain paths
        if self._should_skip(request.url.path):
            return await call_next(request)
        
        # Get rate limit key and tier
        key, tier, custom_limits = self._get_rate_limit_info(request)
        
        if not key:
            # No identifier available, skip rate limiting
            logger.warning(
                "rate_limit_no_identifier",
                path=request.url.path,
                method=request.method
            )
            return await call_next(request)
        
        # Check rate limit
        try:
            allowed, results = await self.rate_limiter.check_rate_limit(
                key=key,
                endpoint=request.url.path,
                tier=tier,
                custom_limits=custom_limits
            )
            
            if not allowed:
                # Rate limit exceeded
                headers = self.rate_limiter.get_headers(results)
                
                # Find which limit was exceeded
                exceeded_window = None
                for window, data in results.items():
                    if not data.get("allowed", True):
                        exceeded_window = window
                        break
                
                logger.warning(
                    "rate_limit_exceeded",
                    key=key,
                    endpoint=request.url.path,
                    window=exceeded_window,
                    tier=tier
                )
                
                return JSONResponse(
                    status_code=status.HTTP_429_TOO_MANY_REQUESTS,
                    content={
                        "detail": f"Rate limit exceeded for {exceeded_window}",
                        "error": "RATE_LIMIT_EXCEEDED",
                        "limits": results
                    },
                    headers=headers
                )
            
            # Add rate limit headers to response
            response = await call_next(request)
            
            # Add headers
            headers = self.rate_limiter.get_headers(results)
            for header, value in headers.items():
                response.headers[header] = value
            
            # Log high usage
            for window, data in results.items():
                if data["remaining"] < data["limit"] * 0.1:  # Less than 10% remaining
                    logger.info(
                        "rate_limit_warning",
                        key=key,
                        endpoint=request.url.path,
                        window=window,
                        remaining=data["remaining"],
                        limit=data["limit"]
                    )
            
            return response
            
        except Exception as e:
            logger.error(
                "rate_limit_error",
                error=str(e),
                exc_info=True
            )
            # On error, allow request to proceed
            return await call_next(request)
    
    def _should_skip(self, path: str) -> bool:
        """Check if path should skip rate limiting."""
        skip_paths = [
            "/health",
            "/metrics",
            "/docs",
            "/openapi.json",
            "/favicon.ico",
            "/_next",  # Next.js assets
            "/static",
        ]
        
        for skip_path in skip_paths:
            if path.startswith(skip_path):
                return True
        
        return False
    
    def _get_rate_limit_info(
        self,
        request: Request
    ) -> tuple[Optional[str], RateLimitTier, Optional[Dict[str, int]]]:
        """
        Get rate limit key, tier, and custom limits from request.
        
        Returns:
            Tuple of (key, tier, custom_limits)
        """
        # Priority 1: API Key
        api_key = getattr(request.state, "api_key", None)
        if api_key and isinstance(api_key, APIKey):
            key = f"api_key:{api_key.id}"
            tier = RateLimitTier(api_key.tier)
            
            # Get custom limits if set
            custom_limits = {}
            if api_key.rate_limit_per_minute:
                custom_limits["per_minute"] = api_key.rate_limit_per_minute
            if api_key.rate_limit_per_hour:
                custom_limits["per_hour"] = api_key.rate_limit_per_hour
            if api_key.rate_limit_per_day:
                custom_limits["per_day"] = api_key.rate_limit_per_day
            
            return key, tier, custom_limits if custom_limits else None
        
        # Priority 2: Authenticated User
        user_id = getattr(request.state, "user_id", None)
        if user_id:
            key = f"user:{user_id}"
            
            # Check user role for tier
            user = getattr(request.state, "user", {})
            role = user.get("role", "").lower()
            
            if role == "admin" or user.get("is_superuser"):
                tier = RateLimitTier.UNLIMITED
            elif role == "pro":
                tier = RateLimitTier.PRO
            elif role == "basic":
                tier = RateLimitTier.BASIC
            else:
                tier = RateLimitTier.FREE
            
            return key, tier, None
        
        # Priority 3: IP Address
        client_ip = None
        if request.client:
            client_ip = request.client.host
        
        # Check for proxy headers
        if not client_ip:
            forwarded_for = request.headers.get("X-Forwarded-For")
            if forwarded_for:
                client_ip = forwarded_for.split(",")[0].strip()
        
        if not client_ip:
            real_ip = request.headers.get("X-Real-IP")
            if real_ip:
                client_ip = real_ip
        
        if client_ip:
            key = f"ip:{client_ip}"
            return key, self.default_tier, None
        
        return None, self.default_tier, None


def get_rate_limit_decorator(
    tier: Optional[RateLimitTier] = None,
    custom_limits: Optional[Dict[str, int]] = None
):
    """
    Decorator for endpoint-specific rate limiting.
    
    Usage:
        @router.get("/expensive")
        @rate_limit(tier=RateLimitTier.PRO, custom_limits={"per_minute": 5})
        async def expensive_endpoint():
            ...
    """
    def decorator(func):
        # Store rate limit info on function
        func._rate_limit_tier = tier
        func._rate_limit_custom = custom_limits
        return func
    
    return decorator


# Convenience decorator
rate_limit = get_rate_limit_decorator