summaryrefslogtreecommitdiff
path: root/app/controllers/concerns/check_rate_limit.rb
blob: 0eaf74fd3a9b4dd1921f6dddb8a9d46417f56e7b (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
# frozen_string_literal: true

# == CheckRateLimit
#
# Controller concern that checks if the rate limit for a given action is throttled by calling the
# Gitlab::ApplicationRateLimiter class. If the action is throttled for the current user, the request
# will be logged and an error message will be rendered with a Too Many Requests response status.
# See lib/api/helpers/rate_limiter.rb for API version
module CheckRateLimit
  def check_rate_limit!(key, scope:, redirect_back: false, **options)
    return if bypass_header_set?
    return unless rate_limiter.throttled?(key, scope: scope, **options)

    rate_limiter.log_request(request, "#{key}_request_limit".to_sym, current_user)

    return yield if block_given?

    message = _('This endpoint has been requested too many times. Try again later.')

    if redirect_back
      redirect_back_or_default(options: { alert: message })
    else
      render plain: message, status: :too_many_requests
    end
  end

  private

  def rate_limiter
    ::Gitlab::ApplicationRateLimiter
  end

  def bypass_header_set?
    ::Gitlab::Throttle.bypass_header.present? && request.get_header(Gitlab::Throttle.bypass_header) == '1'
  end
end