mirror of
https://github.com/bitwarden/server
synced 2025-12-10 13:23:27 +00:00
* Start switch to System.Text.Json * Work on switching to System.Text.Json * Main work on STJ refactor * Fix build errors * Run formatting * Delete unused file * Use legacy for two factor providers * Run formatter * Add TokenProviderTests * Run formatting * Fix merge issues * Switch to use JsonSerializer * Address PR feedback * Fix formatting * Ran formatter * Switch to async * Ensure Enums are serialized as strings * Fix formatting * Enqueue single items as arrays * Remove CreateAsync method on AzureQueueService
93 lines
3.5 KiB
C#
93 lines
3.5 KiB
C#
using System;
|
|
using System.Threading.Tasks;
|
|
using AspNetCoreRateLimit;
|
|
using Bit.Core.Models.Api;
|
|
using Bit.Core.Services;
|
|
using Microsoft.AspNetCore.Http;
|
|
using Microsoft.Extensions.Caching.Memory;
|
|
using Microsoft.Extensions.Logging;
|
|
using Microsoft.Extensions.Options;
|
|
|
|
namespace Bit.Core.Utilities
|
|
{
|
|
public class CustomIpRateLimitMiddleware : IpRateLimitMiddleware
|
|
{
|
|
private readonly IpRateLimitOptions _options;
|
|
private readonly IMemoryCache _memoryCache;
|
|
private readonly IBlockIpService _blockIpService;
|
|
private readonly ILogger<CustomIpRateLimitMiddleware> _logger;
|
|
|
|
public CustomIpRateLimitMiddleware(
|
|
IMemoryCache memoryCache,
|
|
IBlockIpService blockIpService,
|
|
RequestDelegate next,
|
|
IOptions<IpRateLimitOptions> options,
|
|
IRateLimitCounterStore counterStore,
|
|
IIpPolicyStore policyStore,
|
|
ILogger<CustomIpRateLimitMiddleware> logger,
|
|
IIpAddressParser ipParser = null)
|
|
: base(next, options, counterStore, policyStore, logger, ipParser)
|
|
{
|
|
_memoryCache = memoryCache;
|
|
_blockIpService = blockIpService;
|
|
_options = options.Value;
|
|
_logger = logger;
|
|
}
|
|
|
|
public override Task ReturnQuotaExceededResponse(HttpContext httpContext, RateLimitRule rule, string retryAfter)
|
|
{
|
|
var message = string.IsNullOrWhiteSpace(_options.QuotaExceededMessage) ?
|
|
$"Slow down! Too many requests. Try again in {rule.Period}." : _options.QuotaExceededMessage;
|
|
httpContext.Response.Headers["Retry-After"] = retryAfter;
|
|
httpContext.Response.StatusCode = _options.HttpStatusCode;
|
|
var errorModel = new ErrorResponseModel { Message = message };
|
|
return httpContext.Response.WriteAsJsonAsync(errorModel, cancellationToken: httpContext.RequestAborted);
|
|
}
|
|
|
|
public override void LogBlockedRequest(HttpContext httpContext, ClientRequestIdentity identity,
|
|
RateLimitCounter counter, RateLimitRule rule)
|
|
{
|
|
base.LogBlockedRequest(httpContext, identity, counter, rule);
|
|
var key = $"blockedIp_{identity.ClientIp}";
|
|
|
|
_memoryCache.TryGetValue(key, out int blockedCount);
|
|
|
|
blockedCount++;
|
|
if (blockedCount > 10)
|
|
{
|
|
_blockIpService.BlockIpAsync(identity.ClientIp, false);
|
|
_logger.LogInformation(Constants.BypassFiltersEventId, null,
|
|
"Banned {0}. \nInfo: \n{1}", identity.ClientIp, GetRequestInfo(httpContext));
|
|
}
|
|
else
|
|
{
|
|
_logger.LogInformation(Constants.BypassFiltersEventId, null,
|
|
"Request blocked {0}. \nInfo: \n{1}", identity.ClientIp, GetRequestInfo(httpContext));
|
|
_memoryCache.Set(key, blockedCount,
|
|
new MemoryCacheEntryOptions().SetSlidingExpiration(new TimeSpan(0, 5, 0)));
|
|
}
|
|
}
|
|
|
|
private string GetRequestInfo(HttpContext httpContext)
|
|
{
|
|
if (httpContext == null || httpContext.Request == null)
|
|
{
|
|
return null;
|
|
}
|
|
|
|
var s = string.Empty;
|
|
foreach (var header in httpContext.Request.Headers)
|
|
{
|
|
s += $"Header \"{header.Key}\": {header.Value} \n";
|
|
}
|
|
|
|
foreach (var query in httpContext.Request.Query)
|
|
{
|
|
s += $"Query \"{query.Key}\": {query.Value} \n";
|
|
}
|
|
|
|
return s;
|
|
}
|
|
}
|
|
}
|