Files
Messenger/app/utils/rate_limit.py
benya 85631b566a
All checks were successful
CI / test (push) Successful in 9m2s
Implement security hardening, notification pipeline, and CI test suite
Security hardening:

- Added IP/user rate limiting with Redis-backed counters and fail-open behavior.

- Added message anti-spam controls (per-chat rate + duplicate cooldown).

- Implemented refresh token rotation with JTI tracking and revoke support.

Notification pipeline:

- Added Celery app and async notification tasks for mention/offline delivery.

- Added Redis-based presence tracking and integrated it into realtime connect/disconnect.

- Added notification dispatch from message flow and notifications listing endpoint.

Quality gates and CI:

- Added pytest async integration tests for auth and chat/message lifecycle.

- Added pytest config, test fixtures, and GitHub Actions CI workflow.

- Fixed bcrypt/passlib compatibility by pinning bcrypt version.

- Documented worker and quality-gate commands in README.
2026-03-07 21:46:30 +03:00

55 lines
1.5 KiB
Python

from fastapi import HTTPException, Request, status
from redis.exceptions import RedisError
from app.utils.redis_client import get_redis_client
def _safe_ip(request: Request) -> str:
if not request.client or not request.client.host:
return "unknown"
return request.client.host
async def enforce_ip_rate_limit(
request: Request,
*,
scope: str,
limit: int,
window_seconds: int = 60,
) -> None:
if limit <= 0:
return
key = f"rl:{scope}:ip:{_safe_ip(request)}"
await _enforce(key=key, limit=limit, window_seconds=window_seconds)
async def enforce_user_rate_limit(
user_id: int,
*,
scope: str,
limit: int,
window_seconds: int = 60,
) -> None:
if limit <= 0:
return
key = f"rl:{scope}:user:{user_id}"
await _enforce(key=key, limit=limit, window_seconds=window_seconds)
async def _enforce(*, key: str, limit: int, window_seconds: int) -> None:
try:
redis = get_redis_client()
current = await redis.incr(key)
if current == 1:
await redis.expire(key, window_seconds)
if current > limit:
ttl = await redis.ttl(key)
retry_after = max(1, ttl if ttl and ttl > 0 else window_seconds)
raise HTTPException(
status_code=status.HTTP_429_TOO_MANY_REQUESTS,
detail=f"Rate limit exceeded. Retry in {retry_after} seconds.",
)
except RedisError:
# Fail-open in case of Redis outage to keep core API available.
return