You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@servicecomb.apache.org by li...@apache.org on 2017/12/29 09:51:36 UTC
[incubator-servicecomb-service-center] branch master updated:
SCB-143 Add new rate limiter (#235)
This is an automated email from the ASF dual-hosted git repository.
littlecui pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/incubator-servicecomb-service-center.git
The following commit(s) were added to refs/heads/master by this push:
new 349d4b2 SCB-143 Add new rate limiter (#235)
349d4b2 is described below
commit 349d4b2944396109c3915b81b6563197e7b15d1e
Author: Mohammad Asif Siddiqui <mo...@huawei.com>
AuthorDate: Fri Dec 29 17:51:34 2017 +0800
SCB-143 Add new rate limiter (#235)
* Add new rate limiter
* Add new rate limiter
* Update the code with correct import path
* Handled review comments for status code and logs
---
pkg/httplimiter/httpratelimiter.go | 228 ++++++++++++++++++
pkg/ratelimiter/ratelimiter.go | 121 ++++++++++
server/interceptor/ratelimiter/limiter.go | 17 +-
server/interceptor/ratelimiter/limiter_test.go | 8 +-
.../ratelimiter/ratelimiter_suite_test.go | 2 +-
vendor/github.com/didip/tollbooth/.gitignore | 2 -
vendor/github.com/didip/tollbooth/LICENSE | 21 --
vendor/github.com/didip/tollbooth/README.md | 65 -----
vendor/github.com/didip/tollbooth/config/config.go | 77 ------
.../tollbooth/config/config_benchmark_test.go | 15 --
.../didip/tollbooth/config/config_test.go | 57 -----
vendor/github.com/didip/tollbooth/errors/errors.go | 15 --
.../didip/tollbooth/errors/errors_test.go | 10 -
.../didip/tollbooth/libstring/libstring.go | 50 ----
.../didip/tollbooth/libstring/libstring_test.go | 81 -------
.../tollbooth/thirdparty/tollbooth_echo/README.md | 33 ---
.../thirdparty/tollbooth_echo/test/main.go | 23 --
.../thirdparty/tollbooth_echo/tollbooth_echo.go | 182 --------------
.../tollbooth/thirdparty/tollbooth_gin/README.md | 31 ---
.../thirdparty/tollbooth_gin/tollbooth_gin.go | 19 --
.../thirdparty/tollbooth_gorestful/README.md | 36 ---
.../tollbooth_gorestful/tollbooth_gorestful.go | 19 --
.../thirdparty/tollbooth_httprouter/README.md | 44 ----
.../tollbooth_httprouter/tollbooth_httprouter.go | 22 --
.../thirdparty/tollbooth_negroni/README.md | 42 ----
.../tollbooth_negroni/tollbooth_negroni.go | 27 ---
vendor/github.com/didip/tollbooth/tollbooth.go | 170 -------------
.../didip/tollbooth/tollbooth_benchmark_test.go | 34 ---
.../github.com/didip/tollbooth/tollbooth_test.go | 266 ---------------------
.../vendor/github.com/juju/ratelimit/LICENSE | 191 ---------------
.../vendor/github.com/juju/ratelimit/README.md | 117 ---------
.../vendor/github.com/juju/ratelimit/ratelimit.go | 245 -------------------
.../vendor/github.com/juju/ratelimit/reader.go | 51 ----
.../github.com/didip/tollbooth/vendor/vendor.json | 13 -
34 files changed, 362 insertions(+), 1972 deletions(-)
diff --git a/pkg/httplimiter/httpratelimiter.go b/pkg/httplimiter/httpratelimiter.go
new file mode 100644
index 0000000..9128d5b
--- /dev/null
+++ b/pkg/httplimiter/httpratelimiter.go
@@ -0,0 +1,228 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements. See the NOTICE file distributed with
+ * this work for additional information regarding copyright ownership.
+ * The ASF licenses this file to You under the Apache License, Version 2.0
+ * (the "License"); you may not use this file except in compliance with
+ * the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+package httplimiter
+
+import (
+ "net/http"
+ "strconv"
+ "strings"
+ "time"
+ "github.com/apache/incubator-servicecomb-service-center/pkg/ratelimiter"
+ "fmt"
+ "sync"
+)
+
+type HTTPErrorMessage struct {
+ Message string
+ StatusCode int
+}
+
+func (httpErrorMessage *HTTPErrorMessage) Error() string {
+ return fmt.Sprintf("%v: %v", httpErrorMessage.StatusCode, httpErrorMessage.Message)
+}
+
+
+type HttpLimiter struct {
+ HttpMessage string
+ ContentType string
+ StatusCode int
+ RequestLimit int64
+ TTL time.Duration
+ IPLookups []string
+ Methods []string
+ Headers map[string][]string
+ BasicAuthUsers []string
+ leakyBuckets map[string]*ratelimiter.LeakyBucket
+ sync.RWMutex
+}
+
+
+
+func LimitBySegments(limiter *HttpLimiter, keys []string) *HTTPErrorMessage {
+ if limiter.LimitExceeded(strings.Join(keys, "|")) {
+ return &HTTPErrorMessage{Message: limiter.HttpMessage, StatusCode: limiter.StatusCode}
+ }
+
+ return nil
+}
+
+func LimitByRequest(httpLimiter *HttpLimiter, r *http.Request) *HTTPErrorMessage {
+ sliceKeys := BuildSegments(httpLimiter, r)
+
+ for _, keys := range sliceKeys {
+ httpError := LimitBySegments(httpLimiter, keys)
+ if httpError != nil {
+ return httpError
+ }
+ }
+
+ return nil
+}
+
+func BuildSegments(httpLimiter *HttpLimiter, r *http.Request) [][]string {
+ remoteIP := getRemoteIP(httpLimiter.IPLookups, r)
+ urlPath := r.URL.Path
+ sliceKeys := make([][]string, 0)
+
+ if remoteIP == "" {
+ return sliceKeys
+ }
+
+ if httpLimiter.Methods != nil && httpLimiter.Headers != nil && httpLimiter.BasicAuthUsers != nil {
+ if checkExistence(httpLimiter.Methods, r.Method) {
+ for headerKey, headerValues := range httpLimiter.Headers {
+ if (headerValues == nil || len(headerValues) <= 0) && r.Header.Get(headerKey) != "" {
+ username, _, ok := r.BasicAuth()
+ if ok && checkExistence(httpLimiter.BasicAuthUsers, username) {
+ sliceKeys = append(sliceKeys, []string{remoteIP, urlPath, r.Method, headerKey, username})
+ }
+
+ } else if len(headerValues) > 0 && r.Header.Get(headerKey) != "" {
+ for _, headerValue := range headerValues {
+ username, _, ok := r.BasicAuth()
+ if ok && checkExistence(httpLimiter.BasicAuthUsers, username) {
+ sliceKeys = append(sliceKeys, []string{remoteIP, urlPath, r.Method, headerKey, headerValue, username})
+ }
+ }
+ }
+ }
+ }
+
+ } else if httpLimiter.Methods != nil && httpLimiter.Headers != nil {
+ if checkExistence(httpLimiter.Methods, r.Method) {
+ for headerKey, headerValues := range httpLimiter.Headers {
+ if (headerValues == nil || len(headerValues) <= 0) && r.Header.Get(headerKey) != "" {
+ sliceKeys = append(sliceKeys, []string{remoteIP, urlPath, r.Method, headerKey})
+
+ } else if len(headerValues) > 0 && r.Header.Get(headerKey) != "" {
+ for _, headerValue := range headerValues {
+ sliceKeys = append(sliceKeys, []string{remoteIP, urlPath, r.Method, headerKey, headerValue})
+ }
+ }
+ }
+ }
+
+ } else if httpLimiter.Methods != nil && httpLimiter.BasicAuthUsers != nil {
+ if checkExistence(httpLimiter.Methods, r.Method) {
+ username, _, ok := r.BasicAuth()
+ if ok && checkExistence(httpLimiter.BasicAuthUsers, username) {
+ sliceKeys = append(sliceKeys, []string{remoteIP, urlPath, r.Method, username})
+ }
+ }
+
+ } else if httpLimiter.Methods != nil {
+ if checkExistence(httpLimiter.Methods, r.Method) {
+ sliceKeys = append(sliceKeys, []string{remoteIP, urlPath, r.Method})
+ }
+
+ } else if httpLimiter.Headers != nil {
+ for headerKey, headerValues := range httpLimiter.Headers {
+ if (headerValues == nil || len(headerValues) <= 0) && r.Header.Get(headerKey) != "" {
+ sliceKeys = append(sliceKeys, []string{remoteIP, urlPath, headerKey})
+
+ } else if len(headerValues) > 0 && r.Header.Get(headerKey) != "" {
+ for _, headerValue := range headerValues {
+ sliceKeys = append(sliceKeys, []string{remoteIP, urlPath, headerKey, headerValue})
+ }
+ }
+ }
+
+ } else if httpLimiter.BasicAuthUsers != nil {
+ username, _, ok := r.BasicAuth()
+ if ok && checkExistence(httpLimiter.BasicAuthUsers, username) {
+ sliceKeys = append(sliceKeys, []string{remoteIP, urlPath, username})
+ }
+ } else {
+ sliceKeys = append(sliceKeys, []string{remoteIP, urlPath})
+ }
+
+ return sliceKeys
+}
+
+func SetResponseHeaders(limiter *HttpLimiter, w http.ResponseWriter) {
+ w.Header().Add("X-Rate-Limit-Limit", strconv.FormatInt(limiter.RequestLimit, 10))
+ w.Header().Add("X-Rate-Limit-Duration", limiter.TTL.String())
+}
+
+func checkExistence(sliceString []string, needle string) bool {
+ for _, b := range sliceString {
+ if b == needle {
+ return true
+ }
+ }
+ return false
+}
+
+func ipAddrFromRemoteAddr(s string) string {
+ idx := strings.LastIndex(s, ":")
+ if idx == -1 {
+ return s
+ }
+ return s[:idx]
+}
+
+func getRemoteIP(ipLookups []string, r *http.Request) string {
+ realIP := r.Header.Get("X-Real-IP")
+ forwardedFor := r.Header.Get("X-Forwarded-For")
+
+ for _, lookup := range ipLookups {
+ if lookup == "RemoteAddr" {
+ return ipAddrFromRemoteAddr(r.RemoteAddr)
+ }
+ if lookup == "X-Forwarded-For" && forwardedFor != "" {
+ parts := strings.Split(forwardedFor, ",")
+ for i, p := range parts {
+ parts[i] = strings.TrimSpace(p)
+ }
+ return parts[0]
+ }
+ if lookup == "X-Real-IP" && realIP != "" {
+ return realIP
+ }
+ }
+
+ return ""
+}
+
+
+func NewHttpLimiter(max int64, ttl time.Duration) *HttpLimiter {
+ limiter := &HttpLimiter{RequestLimit: max, TTL: ttl}
+ limiter.ContentType = "text/plain; charset=utf-8"
+ limiter.HttpMessage = "You have reached maximum request limit."
+ limiter.StatusCode = http.StatusTooManyRequests
+ limiter.leakyBuckets = make(map[string]*ratelimiter.LeakyBucket)
+ limiter.IPLookups = []string{"RemoteAddr", "X-Forwarded-For", "X-Real-IP"}
+
+ return limiter
+}
+
+
+func (rateLimiter *HttpLimiter) LimitExceeded(key string) bool {
+ rateLimiter.Lock()
+ if _, found := rateLimiter.leakyBuckets[key]; !found {
+ rateLimiter.leakyBuckets[key] = ratelimiter.NewLeakyBucket(rateLimiter.TTL, rateLimiter.RequestLimit, rateLimiter.RequestLimit)
+ }
+ _, isInLimits := rateLimiter.leakyBuckets[key].MaximumTakeDuration(1, 0)
+ rateLimiter.Unlock()
+ if isInLimits {
+ return false
+ }
+ return true
+}
+
+
diff --git a/pkg/ratelimiter/ratelimiter.go b/pkg/ratelimiter/ratelimiter.go
new file mode 100644
index 0000000..8184108
--- /dev/null
+++ b/pkg/ratelimiter/ratelimiter.go
@@ -0,0 +1,121 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements. See the NOTICE file distributed with
+ * this work for additional information regarding copyright ownership.
+ * The ASF licenses this file to You under the Apache License, Version 2.0
+ * (the "License"); you may not use this file except in compliance with
+ * the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+package ratelimiter
+
+import (
+ "time"
+ "sync"
+)
+
+type LeakyBucket struct {
+ startTime time.Time
+ capacity int64
+ quantum int64
+ interval time.Duration
+ mutex sync.Mutex
+ available int64
+ availableTicker int64
+}
+
+
+func NewLeakyBucket(fillInterval time.Duration, capacity, quantum int64) *LeakyBucket {
+ if fillInterval <= 0 {
+ panic("leaky bucket fill interval is not > 0")
+ }
+ if capacity <= 0 {
+ panic("leaky bucket capacity is not > 0")
+ }
+ if quantum <= 0 {
+ panic("leaky bucket quantum is not > 0")
+ }
+ return &LeakyBucket{
+ startTime: time.Now(),
+ capacity: capacity,
+ quantum: quantum,
+ available: capacity,
+ interval: fillInterval,
+ }
+}
+
+func (leakyBucket *LeakyBucket) Wait(count int64) {
+ if d := leakyBucket.Take(count); d > 0 {
+ time.Sleep(d)
+ }
+}
+
+func (leakyBucket *LeakyBucket) MaximumWaitDuration(count int64, maxWait time.Duration) bool {
+ d, ok := leakyBucket.MaximumTakeDuration(count, maxWait)
+ if d > 0 {
+ time.Sleep(d)
+ }
+ return ok
+}
+
+const sleepForever time.Duration = 0x7fffffffffffffff
+
+func (leakyBucket *LeakyBucket) Take(count int64) time.Duration {
+ d, _ := leakyBucket.take(time.Now(), count, sleepForever)
+ return d
+}
+
+func (leakyBucket *LeakyBucket) MaximumTakeDuration(count int64, maxWait time.Duration) (time.Duration, bool) {
+ return leakyBucket.take(time.Now(), count, maxWait)
+}
+
+
+func (leakyBucket *LeakyBucket) Rate() float64 {
+ return 1e9 * float64(leakyBucket.quantum) / float64(leakyBucket.interval)
+}
+
+func (leakyBucket *LeakyBucket) take(now time.Time, count int64, maxWait time.Duration) (time.Duration, bool) {
+ if count <= 0 {
+ return 0, true
+ }
+ leakyBucket.mutex.Lock()
+ defer leakyBucket.mutex.Unlock()
+
+ currentTick := leakyBucket.adjust(now)
+ avail := leakyBucket.available - count
+ if avail >= 0 {
+ leakyBucket.available = avail
+ return 0, true
+ }
+ endTick := currentTick + (-avail+leakyBucket.quantum-1)/leakyBucket.quantum
+ endTime := leakyBucket.startTime.Add(time.Duration(endTick) * leakyBucket.interval)
+ waitTime := endTime.Sub(now)
+ if waitTime > maxWait {
+ return 0, false
+ }
+ leakyBucket.available = avail
+ return waitTime, true
+}
+
+func (leakyBucket *LeakyBucket) adjust(now time.Time) (currentTick int64) {
+ currentTick = int64(now.Sub(leakyBucket.startTime) / leakyBucket.interval)
+
+ if leakyBucket.available >= leakyBucket.capacity {
+ return
+ }
+ leakyBucket.available += (currentTick - leakyBucket.availableTicker) * leakyBucket.quantum
+ if leakyBucket.available > leakyBucket.capacity {
+ leakyBucket.available = leakyBucket.capacity
+ }
+ leakyBucket.availableTicker = currentTick
+ return
+}
+
diff --git a/server/interceptor/ratelimiter/limiter.go b/server/interceptor/ratelimiter/limiter.go
index 6476942..5845b78 100644
--- a/server/interceptor/ratelimiter/limiter.go
+++ b/server/interceptor/ratelimiter/limiter.go
@@ -18,10 +18,9 @@ package ratelimiter
import (
"errors"
+ "github.com/apache/incubator-servicecomb-service-center/pkg/httplimiter"
"github.com/apache/incubator-servicecomb-service-center/pkg/util"
"github.com/apache/incubator-servicecomb-service-center/server/core"
- "github.com/didip/tollbooth"
- "github.com/didip/tollbooth/config"
"net/http"
"strings"
"sync"
@@ -31,7 +30,7 @@ import (
type Limiter struct {
conns int64
- tbLimiter *config.Limiter
+ httpLimiter *httplimiter.HttpLimiter
}
var limiter *Limiter
@@ -61,9 +60,9 @@ func (this *Limiter) LoadConfig() {
ttl = time.Hour
}
this.conns = core.ServerInfo.Config.LimitConnections
- this.tbLimiter = tollbooth.NewLimiter(this.conns, ttl)
+ this.httpLimiter = httplimiter.NewHttpLimiter(this.conns, ttl)
iplookups := core.ServerInfo.Config.LimitIPLookup
- this.tbLimiter.IPLookups = strings.Split(iplookups, ",")
+ this.httpLimiter.IPLookups = strings.Split(iplookups, ",")
util.Logger().Warnf(nil, "Rate-limit Load config, ttl: %s, conns: %d, iplookups: %s", ttl, this.conns, iplookups)
}
@@ -73,13 +72,13 @@ func (this *Limiter) Handle(w http.ResponseWriter, r *http.Request) error {
return nil
}
- tollbooth.SetResponseHeaders(this.tbLimiter, w)
- httpError := tollbooth.LimitByRequest(this.tbLimiter, r)
+ httplimiter.SetResponseHeaders(this.httpLimiter, w)
+ httpError := httplimiter.LimitByRequest(this.httpLimiter, r)
if httpError != nil {
- w.Header().Add("Content-Type", this.tbLimiter.MessageContentType)
+ w.Header().Add("Content-Type", this.httpLimiter.ContentType)
w.WriteHeader(httpError.StatusCode)
w.Write(util.StringToBytesWithNoCopy(httpError.Message))
- util.Logger().Warn("Reached maximum request limit!", nil)
+ util.Logger().Warnf(nil, "Reached maximum request limit for %s host and %s url", r.RemoteAddr, r.RequestURI)
return errors.New(httpError.Message)
}
return nil
diff --git a/server/interceptor/ratelimiter/limiter_test.go b/server/interceptor/ratelimiter/limiter_test.go
index f382d01..eb8a752 100644
--- a/server/interceptor/ratelimiter/limiter_test.go
+++ b/server/interceptor/ratelimiter/limiter_test.go
@@ -25,7 +25,7 @@ import (
"time"
)
-var _ = Describe("Limiter", func() {
+var _ = Describe("HttpLimiter", func() {
var (
limiter *Limiter
)
@@ -39,7 +39,7 @@ var _ = Describe("Limiter", func() {
It("should be ok", func() {
Expect(limiter.conns).To(Equal(int64(0)))
res := []string{"RemoteAddr", "X-Forwarded-For", "X-Real-IP"}
- for i, val := range limiter.tbLimiter.IPLookups {
+ for i, val := range limiter.httpLimiter.IPLookups {
Expect(val).To(Equal(res[i]))
}
})
@@ -57,7 +57,7 @@ var _ = Describe("Limiter", func() {
Context("Connections > 0", func() {
It("should not be router", func() {
limiter.conns = 1
- limiter.tbLimiter = tollbooth.NewLimiter(1, time.Second)
+ limiter.httpLimiter = tollbooth.NewLimiter(1, time.Second)
resp, err := http.Get(ts.URL)
Expect(err).To(BeNil())
Expect(resp.StatusCode).To(Equal(http.StatusOK))
@@ -70,7 +70,7 @@ var _ = Describe("Limiter", func() {
Context("Connections <= 0", func() {
It("should be router", func() {
limiter.conns = 0
- limiter.tbLimiter = tollbooth.NewLimiter(0, time.Second)
+ limiter.httpLimiter = tollbooth.NewLimiter(0, time.Second)
resp, err := http.Get(ts.URL)
Expect(err).To(BeNil())
Expect(resp.StatusCode).To(Equal(http.StatusOK))
diff --git a/server/interceptor/ratelimiter/ratelimiter_suite_test.go b/server/interceptor/ratelimiter/ratelimiter_suite_test.go
index 8360af3..af2baf8 100644
--- a/server/interceptor/ratelimiter/ratelimiter_suite_test.go
+++ b/server/interceptor/ratelimiter/ratelimiter_suite_test.go
@@ -25,5 +25,5 @@ import (
func TestNet(t *testing.T) {
RegisterFailHandler(Fail)
- RunSpecs(t, "RateLimiter Suite")
+ RunSpecs(t, "HttpLimiter Suite")
}
diff --git a/vendor/github.com/didip/tollbooth/.gitignore b/vendor/github.com/didip/tollbooth/.gitignore
deleted file mode 100644
index 1043f53..0000000
--- a/vendor/github.com/didip/tollbooth/.gitignore
+++ /dev/null
@@ -1,2 +0,0 @@
-/debug
-/.vscode
diff --git a/vendor/github.com/didip/tollbooth/LICENSE b/vendor/github.com/didip/tollbooth/LICENSE
deleted file mode 100644
index 349ee1c..0000000
--- a/vendor/github.com/didip/tollbooth/LICENSE
+++ /dev/null
@@ -1,21 +0,0 @@
-The MIT License (MIT)
-
-Copyright (c) 2015 Didip Kerabat
-
-Permission is hereby granted, free of charge, to any person obtaining a copy
-of this software and associated documentation files (the "Software"), to deal
-in the Software without restriction, including without limitation the rights
-to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
-copies of the Software, and to permit persons to whom the Software is
-furnished to do so, subject to the following conditions:
-
-The above copyright notice and this permission notice shall be included in
-all copies or substantial portions of the Software.
-
-THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
-IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
-FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
-AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
-LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
-OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
-THE SOFTWARE.
diff --git a/vendor/github.com/didip/tollbooth/README.md b/vendor/github.com/didip/tollbooth/README.md
deleted file mode 100644
index 08dd9a2..0000000
--- a/vendor/github.com/didip/tollbooth/README.md
+++ /dev/null
@@ -1,65 +0,0 @@
-[![GoDoc](https://godoc.org/github.com/didip/tollbooth?status.svg)](http://godoc.org/github.com/didip/tollbooth)
-[![license](http://img.shields.io/badge/license-MIT-red.svg?style=flat)](https://raw.githubusercontent.com/didip/tollbooth/master/LICENSE)
-
-## Tollbooth
-
-This is a generic middleware to rate-limit HTTP requests.
-
-**NOTE:** This library is considered finished, any new activities are probably centered around `thirdparty` modules.
-
-
-## Five Minutes Tutorial
-```
-package main
-
-import (
- "github.com/didip/tollbooth"
- "net/http"
- "time"
-)
-
-func HelloHandler(w http.ResponseWriter, req *http.Request) {
- w.Write([]byte("Hello, World!"))
-}
-
-func main() {
- // Create a request limiter per handler.
- http.Handle("/", tollbooth.LimitFuncHandler(tollbooth.NewLimiter(1, time.Second), HelloHandler))
- http.ListenAndServe(":12345", nil)
-}
-```
-
-## Features
-
-1. Rate-limit by request's remote IP, path, methods, custom headers, & basic auth usernames.
- ```
- limiter := tollbooth.NewLimiter(1, time.Second)
-
- // Configure list of places to look for IP address.
- // By default it's: "RemoteAddr", "X-Forwarded-For", "X-Real-IP"
- // If your application is behind a proxy, set "X-Forwarded-For" first.
- limiter.IPLookups = []string{"RemoteAddr", "X-Forwarded-For", "X-Real-IP"}
-
- // Limit only GET and POST requests.
- limiter.Methods = []string{"GET", "POST"}
-
- // Limit request headers containing certain values.
- // Typically, you prefetched these values from the database.
- limiter.Headers = make(map[string][]string)
- limiter.Headers["X-Access-Token"] = []string{"abc123", "xyz098"}
-
- // Limit based on basic auth usernames.
- // Typically, you prefetched these values from the database.
- limiter.BasicAuthUsers = []string{"bob", "joe", "didip"}
- ```
-
-2. Each request handler can be rate-limited individually.
-
-3. Compose your own middleware by using `LimitByKeys()`.
-
-4. Tollbooth does not require external storage since it uses an algorithm called [Token Bucket](http://en.wikipedia.org/wiki/Token_bucket) [(Go library: ratelimit)](https://github.com/juju/ratelimit).
-
-
-# Other Web Frameworks
-
-Support for other web frameworks are defined under `/thirdparty` directory.
diff --git a/vendor/github.com/didip/tollbooth/config/config.go b/vendor/github.com/didip/tollbooth/config/config.go
deleted file mode 100644
index c66e5bb..0000000
--- a/vendor/github.com/didip/tollbooth/config/config.go
+++ /dev/null
@@ -1,77 +0,0 @@
-// Package config provides data structure to configure rate-limiter.
-package config
-
-import (
- "sync"
- "time"
-
- "github.com/juju/ratelimit"
-)
-
-// NewLimiter is a constructor for Limiter.
-func NewLimiter(max int64, ttl time.Duration) *Limiter {
- limiter := &Limiter{Max: max, TTL: ttl}
- limiter.MessageContentType = "text/plain; charset=utf-8"
- limiter.Message = "You have reached maximum request limit."
- limiter.StatusCode = 429
- limiter.tokenBuckets = make(map[string]*ratelimit.Bucket)
- limiter.IPLookups = []string{"RemoteAddr", "X-Forwarded-For", "X-Real-IP"}
-
- return limiter
-}
-
-// Limiter is a config struct to limit a particular request handler.
-type Limiter struct {
- // HTTP message when limit is reached.
- Message string
-
- // Content-Type for Message
- MessageContentType string
-
- // HTTP status code when limit is reached.
- StatusCode int
-
- // Maximum number of requests to limit per duration.
- Max int64
-
- // Duration of rate-limiter.
- TTL time.Duration
-
- // List of places to look up IP address.
- // Default is "RemoteAddr", "X-Forwarded-For", "X-Real-IP".
- // You can rearrange the order as you like.
- IPLookups []string
-
- // List of HTTP Methods to limit (GET, POST, PUT, etc.).
- // Empty means limit all methods.
- Methods []string
-
- // List of HTTP headers to limit.
- // Empty means skip headers checking.
- Headers map[string][]string
-
- // List of basic auth usernames to limit.
- BasicAuthUsers []string
-
- // Throttler struct
- tokenBuckets map[string]*ratelimit.Bucket
-
- sync.RWMutex
-}
-
-// LimitReached returns a bool indicating if the Bucket identified by key ran out of tokens.
-func (l *Limiter) LimitReached(key string) bool {
- l.Lock()
- if _, found := l.tokenBuckets[key]; !found {
- l.tokenBuckets[key] = ratelimit.NewBucketWithQuantum(l.TTL, l.Max, l.Max)
- }
-
- _, isSoonerThanMaxWait := l.tokenBuckets[key].TakeMaxDuration(1, 0)
- l.Unlock()
-
- if isSoonerThanMaxWait {
- return false
- }
-
- return true
-}
diff --git a/vendor/github.com/didip/tollbooth/config/config_benchmark_test.go b/vendor/github.com/didip/tollbooth/config/config_benchmark_test.go
deleted file mode 100644
index 77ae567..0000000
--- a/vendor/github.com/didip/tollbooth/config/config_benchmark_test.go
+++ /dev/null
@@ -1,15 +0,0 @@
-package config
-
-import (
- "testing"
- "time"
-)
-
-func BenchmarkLimitReached(b *testing.B) {
- limiter := NewLimiter(1, time.Second)
- key := "127.0.0.1|/"
-
- for i := 0; i < b.N; i++ {
- limiter.LimitReached(key)
- }
-}
diff --git a/vendor/github.com/didip/tollbooth/config/config_test.go b/vendor/github.com/didip/tollbooth/config/config_test.go
deleted file mode 100644
index 7b3b3ab..0000000
--- a/vendor/github.com/didip/tollbooth/config/config_test.go
+++ /dev/null
@@ -1,57 +0,0 @@
-package config
-
-import (
- "testing"
- "time"
-)
-
-func TestConstructor(t *testing.T) {
- limiter := NewLimiter(1, time.Second)
- if limiter.Max != 1 {
- t.Errorf("Max field is incorrect. Value: %v", limiter.Max)
- }
- if limiter.TTL != time.Second {
- t.Errorf("TTL field is incorrect. Value: %v", limiter.TTL)
- }
- if limiter.Message != "You have reached maximum request limit." {
- t.Errorf("Message field is incorrect. Value: %v", limiter.Message)
- }
- if limiter.StatusCode != 429 {
- t.Errorf("StatusCode field is incorrect. Value: %v", limiter.StatusCode)
- }
-}
-
-func TestLimitReached(t *testing.T) {
- limiter := NewLimiter(1, time.Second)
- key := "127.0.0.1|/"
-
- if limiter.LimitReached(key) == true {
- t.Error("First time count should not reached the limit.")
- }
-
- if limiter.LimitReached(key) == false {
- t.Error("Second time count should return true because it exceeds 1 request per second.")
- }
-
- <-time.After(1 * time.Second)
- if limiter.LimitReached(key) == true {
- t.Error("Third time count should not reached the limit because the 1 second window has passed.")
- }
-}
-
-func TestMuchHigherMaxRequests(t *testing.T) {
- numRequests := 1000
- limiter := NewLimiter(int64(numRequests), time.Second)
- key := "127.0.0.1|/"
-
- for i := 0; i < numRequests; i++ {
- if limiter.LimitReached(key) == true {
- t.Errorf("N(%v) limit should not be reached.", i)
- }
- }
-
- if limiter.LimitReached(key) == false {
- t.Errorf("N(%v) limit should be reached because it exceeds %v request per second.", numRequests+2, numRequests)
- }
-
-}
diff --git a/vendor/github.com/didip/tollbooth/errors/errors.go b/vendor/github.com/didip/tollbooth/errors/errors.go
deleted file mode 100644
index 149bc5a..0000000
--- a/vendor/github.com/didip/tollbooth/errors/errors.go
+++ /dev/null
@@ -1,15 +0,0 @@
-// Package errors provide data structure for errors.
-package errors
-
-import "fmt"
-
-// HTTPError is an error struct that returns both message and status code.
-type HTTPError struct {
- Message string
- StatusCode int
-}
-
-// Error returns error message.
-func (httperror *HTTPError) Error() string {
- return fmt.Sprintf("%v: %v", httperror.StatusCode, httperror.Message)
-}
diff --git a/vendor/github.com/didip/tollbooth/errors/errors_test.go b/vendor/github.com/didip/tollbooth/errors/errors_test.go
deleted file mode 100644
index a5d04ae..0000000
--- a/vendor/github.com/didip/tollbooth/errors/errors_test.go
+++ /dev/null
@@ -1,10 +0,0 @@
-package errors
-
-import "testing"
-
-func TestError(t *testing.T) {
- errs := HTTPError{"blah", 429}
- if errs.Error() == "" {
- t.Errorf("Unable to print Error(). Value: %v", errs.Error())
- }
-}
diff --git a/vendor/github.com/didip/tollbooth/libstring/libstring.go b/vendor/github.com/didip/tollbooth/libstring/libstring.go
deleted file mode 100644
index 8e6a356..0000000
--- a/vendor/github.com/didip/tollbooth/libstring/libstring.go
+++ /dev/null
@@ -1,50 +0,0 @@
-// Package libstring provides various string related functions.
-package libstring
-
-import (
- "net/http"
- "strings"
-)
-
-// StringInSlice finds needle in a slice of strings.
-func StringInSlice(sliceString []string, needle string) bool {
- for _, b := range sliceString {
- if b == needle {
- return true
- }
- }
- return false
-}
-
-func ipAddrFromRemoteAddr(s string) string {
- idx := strings.LastIndex(s, ":")
- if idx == -1 {
- return s
- }
- return s[:idx]
-}
-
-// RemoteIP finds IP Address given http.Request struct.
-func RemoteIP(ipLookups []string, r *http.Request) string {
- realIP := r.Header.Get("X-Real-IP")
- forwardedFor := r.Header.Get("X-Forwarded-For")
-
- for _, lookup := range ipLookups {
- if lookup == "RemoteAddr" {
- return ipAddrFromRemoteAddr(r.RemoteAddr)
- }
- if lookup == "X-Forwarded-For" && forwardedFor != "" {
- // X-Forwarded-For is potentially a list of addresses separated with ","
- parts := strings.Split(forwardedFor, ",")
- for i, p := range parts {
- parts[i] = strings.TrimSpace(p)
- }
- return parts[0]
- }
- if lookup == "X-Real-IP" && realIP != "" {
- return realIP
- }
- }
-
- return ""
-}
diff --git a/vendor/github.com/didip/tollbooth/libstring/libstring_test.go b/vendor/github.com/didip/tollbooth/libstring/libstring_test.go
deleted file mode 100644
index f11245a..0000000
--- a/vendor/github.com/didip/tollbooth/libstring/libstring_test.go
+++ /dev/null
@@ -1,81 +0,0 @@
-package libstring
-
-import (
- "net/http"
- "strings"
- "testing"
-)
-
-func TestStringInSlice(t *testing.T) {
- if StringInSlice([]string{"alice", "dan", "didip", "jason", "karl"}, "brotato") {
- t.Error("brotato should not be in slice.")
- }
-}
-
-func TestIPAddrFromRemoteAddr(t *testing.T) {
- if ipAddrFromRemoteAddr("127.0.0.1:8989") != "127.0.0.1" {
- t.Errorf("ipAddrFromRemoteAddr did not chop the port number correctly.")
- }
-}
-
-func TestRemoteIPDefault(t *testing.T) {
- ipLookups := []string{"RemoteAddr", "X-Real-IP"}
- ipv6 := "2601:7:1c82:4097:59a0:a80b:2841:b8c8"
-
- request, err := http.NewRequest("GET", "/", strings.NewReader("Hello, world!"))
- if err != nil {
- t.Errorf("Unable to create new HTTP request. Error: %v", err)
- }
-
- request.Header.Set("X-Real-IP", ipv6)
-
- ip := RemoteIP(ipLookups, request)
- if ip != request.RemoteAddr {
- t.Errorf("Did not get the right IP. IP: %v", ip)
- }
- if ip == ipv6 {
- t.Errorf("X-Real-IP should have been skipped. IP: %v", ip)
- }
-}
-
-func TestRemoteIPForwardedFor(t *testing.T) {
- ipLookups := []string{"X-Forwarded-For", "X-Real-IP", "RemoteAddr"}
- ipv6 := "2601:7:1c82:4097:59a0:a80b:2841:b8c8"
-
- request, err := http.NewRequest("GET", "/", strings.NewReader("Hello, world!"))
- if err != nil {
- t.Errorf("Unable to create new HTTP request. Error: %v", err)
- }
-
- request.Header.Set("X-Forwarded-For", "54.223.11.104")
- request.Header.Set("X-Real-IP", ipv6)
-
- ip := RemoteIP(ipLookups, request)
- if ip != "54.223.11.104" {
- t.Errorf("Did not get the right IP. IP: %v", ip)
- }
- if ip == ipv6 {
- t.Errorf("X-Real-IP should have been skipped. IP: %v", ip)
- }
-}
-
-func TestRemoteIPRealIP(t *testing.T) {
- ipLookups := []string{"X-Real-IP", "X-Forwarded-For", "RemoteAddr"}
- ipv6 := "2601:7:1c82:4097:59a0:a80b:2841:b8c8"
-
- request, err := http.NewRequest("GET", "/", strings.NewReader("Hello, world!"))
- if err != nil {
- t.Errorf("Unable to create new HTTP request. Error: %v", err)
- }
-
- request.Header.Set("X-Forwarded-For", "54.223.11.104")
- request.Header.Set("X-Real-IP", ipv6)
-
- ip := RemoteIP(ipLookups, request)
- if ip != ipv6 {
- t.Errorf("Did not get the right IP. IP: %v", ip)
- }
- if ip == "54.223.11.104" {
- t.Errorf("X-Forwarded-For should have been skipped. IP: %v", ip)
- }
-}
diff --git a/vendor/github.com/didip/tollbooth/thirdparty/tollbooth_echo/README.md b/vendor/github.com/didip/tollbooth/thirdparty/tollbooth_echo/README.md
deleted file mode 100644
index cb99aae..0000000
--- a/vendor/github.com/didip/tollbooth/thirdparty/tollbooth_echo/README.md
+++ /dev/null
@@ -1,33 +0,0 @@
-## tollbooth_echo
-
-[Echo](https://github.com/webx-top/echo) middleware for rate limiting HTTP requests.
-
-
-## Five Minutes Tutorial
-
-```
-package main
-
-import (
- "time"
-
- "github.com/didip/tollbooth/thirdparty/tollbooth_echo"
- "github.com/didip/tollbooth"
- "github.com/webx-top/echo"
- "github.com/webx-top/echo/engine/standard"
-)
-
-func main() {
- e := echo.New()
-
- // Create a limiter struct.
- limiter := tollbooth.NewLimiter(1, time.Second)
-
- e.Get("/", echo.HandlerFunc(func(c echo.Context) error {
- return c.String(200, "Hello, World!")
- }), tollbooth_echo.LimitHandler(limiter))
-
- e.Run(standard.New(":4444"))
-}
-
-```
\ No newline at end of file
diff --git a/vendor/github.com/didip/tollbooth/thirdparty/tollbooth_echo/test/main.go b/vendor/github.com/didip/tollbooth/thirdparty/tollbooth_echo/test/main.go
deleted file mode 100644
index ec179ad..0000000
--- a/vendor/github.com/didip/tollbooth/thirdparty/tollbooth_echo/test/main.go
+++ /dev/null
@@ -1,23 +0,0 @@
-package main
-
-import (
- "time"
-
- "github.com/didip/tollbooth"
- "github.com/didip/tollbooth/thirdparty/tollbooth_echo"
- "github.com/webx-top/echo"
- "github.com/webx-top/echo/engine/standard"
-)
-
-func main() {
- e := echo.New()
-
- // Create a limiter struct.
- limiter := tollbooth.NewLimiter(1, time.Second)
-
- e.Get("/", echo.HandlerFunc(func(c echo.Context) error {
- return c.String(200, "Hello, World!")
- }), tollbooth_echo.LimitHandler(limiter))
-
- e.Run(standard.New(":4444"))
-}
diff --git a/vendor/github.com/didip/tollbooth/thirdparty/tollbooth_echo/tollbooth_echo.go b/vendor/github.com/didip/tollbooth/thirdparty/tollbooth_echo/tollbooth_echo.go
deleted file mode 100644
index 50f466b..0000000
--- a/vendor/github.com/didip/tollbooth/thirdparty/tollbooth_echo/tollbooth_echo.go
+++ /dev/null
@@ -1,182 +0,0 @@
-package tollbooth_echo
-
-import (
- "strings"
-
- "github.com/didip/tollbooth"
- "github.com/didip/tollbooth/config"
- "github.com/didip/tollbooth/errors"
- "github.com/didip/tollbooth/libstring"
- "github.com/webx-top/echo"
- "github.com/webx-top/echo/engine"
-)
-
-func LimitMiddleware(limiter *config.Limiter) echo.MiddlewareFunc {
- return func(h echo.Handler) echo.Handler {
- return echo.HandlerFunc(func(c echo.Context) error {
- httpError := LimitByRequest(limiter, c.Request())
- if httpError != nil {
- return c.String(httpError.StatusCode, httpError.Message)
- }
- return h.Handle(c)
- })
- }
-}
-
-func LimitHandler(limiter *config.Limiter) echo.MiddlewareFunc {
- return LimitMiddleware(limiter)
-}
-
-// LimitByRequest builds keys based on http.Request struct,
-// loops through all the keys, and check if any one of them returns HTTPError.
-func LimitByRequest(limiter *config.Limiter, r engine.Request) *errors.HTTPError {
- sliceKeys := BuildKeys(limiter, r)
-
- // Loop sliceKeys and check if one of them has error.
- for _, keys := range sliceKeys {
- httpError := tollbooth.LimitByKeys(limiter, keys)
- if httpError != nil {
- return httpError
- }
- }
-
- return nil
-}
-
-// StringInSlice finds needle in a slice of strings.
-func StringInSlice(sliceString []string, needle string) bool {
- for _, b := range sliceString {
- if b == needle {
- return true
- }
- }
- return false
-}
-
-func ipAddrFromRemoteAddr(s string) string {
- idx := strings.LastIndex(s, ":")
- if idx == -1 {
- return s
- }
- return s[:idx]
-}
-
-// RemoteIP finds IP Address given http.Request struct.
-func RemoteIP(ipLookups []string, r engine.Request) string {
- realIP := r.Header().Get("X-Real-IP")
- forwardedFor := r.Header().Get("X-Forwarded-For")
-
- for _, lookup := range ipLookups {
- if lookup == "RemoteAddr" {
- return ipAddrFromRemoteAddr(r.RemoteAddress())
- }
- if lookup == "X-Forwarded-For" && forwardedFor != "" {
- // X-Forwarded-For is potentially a list of addresses separated with ","
- parts := strings.Split(forwardedFor, ",")
- for i, p := range parts {
- parts[i] = strings.TrimSpace(p)
- }
- return parts[0]
- }
- if lookup == "X-Real-IP" && realIP != "" {
- return realIP
- }
- }
-
- return ""
-}
-
-// BuildKeys generates a slice of keys to rate-limit by given config and request structs.
-func BuildKeys(limiter *config.Limiter, r engine.Request) [][]string {
- remoteIP := RemoteIP(limiter.IPLookups, r)
- path := r.URL().Path()
- sliceKeys := make([][]string, 0)
-
- // Don't BuildKeys if remoteIP is blank.
- if remoteIP == "" {
- return sliceKeys
- }
-
- if limiter.Methods != nil && limiter.Headers != nil && limiter.BasicAuthUsers != nil {
- // Limit by HTTP methods and HTTP headers+values and Basic Auth credentials.
- if StringInSlice(limiter.Methods, r.Method()) {
- for headerKey, headerValues := range limiter.Headers {
- if (headerValues == nil || len(headerValues) <= 0) && r.Header().Get(headerKey) != "" {
- // If header values are empty, rate-limit all request with headerKey.
- username, _, ok := r.BasicAuth()
- if ok && libstring.StringInSlice(limiter.BasicAuthUsers, username) {
- sliceKeys = append(sliceKeys, []string{remoteIP, path, r.Method(), headerKey, username})
- }
-
- } else if len(headerValues) > 0 && r.Header().Get(headerKey) != "" {
- // If header values are not empty, rate-limit all request with headerKey and headerValues.
- for _, headerValue := range headerValues {
- username, _, ok := r.BasicAuth()
- if ok && libstring.StringInSlice(limiter.BasicAuthUsers, username) {
- sliceKeys = append(sliceKeys, []string{remoteIP, path, r.Method(), headerKey, headerValue, username})
- }
- }
- }
- }
- }
-
- } else if limiter.Methods != nil && limiter.Headers != nil {
- // Limit by HTTP methods and HTTP headers+values.
- if libstring.StringInSlice(limiter.Methods, r.Method()) {
- for headerKey, headerValues := range limiter.Headers {
- if (headerValues == nil || len(headerValues) <= 0) && r.Header().Get(headerKey) != "" {
- // If header values are empty, rate-limit all request with headerKey.
- sliceKeys = append(sliceKeys, []string{remoteIP, path, r.Method(), headerKey})
-
- } else if len(headerValues) > 0 && r.Header().Get(headerKey) != "" {
- // If header values are not empty, rate-limit all request with headerKey and headerValues.
- for _, headerValue := range headerValues {
- sliceKeys = append(sliceKeys, []string{remoteIP, path, r.Method(), headerKey, headerValue})
- }
- }
- }
- }
-
- } else if limiter.Methods != nil && limiter.BasicAuthUsers != nil {
- // Limit by HTTP methods and Basic Auth credentials.
- if libstring.StringInSlice(limiter.Methods, r.Method()) {
- username, _, ok := r.BasicAuth()
- if ok && libstring.StringInSlice(limiter.BasicAuthUsers, username) {
- sliceKeys = append(sliceKeys, []string{remoteIP, path, r.Method(), username})
- }
- }
-
- } else if limiter.Methods != nil {
- // Limit by HTTP methods.
- if libstring.StringInSlice(limiter.Methods, r.Method()) {
- sliceKeys = append(sliceKeys, []string{remoteIP, path, r.Method()})
- }
-
- } else if limiter.Headers != nil {
- // Limit by HTTP headers+values.
- for headerKey, headerValues := range limiter.Headers {
- if (headerValues == nil || len(headerValues) <= 0) && r.Header().Get(headerKey) != "" {
- // If header values are empty, rate-limit all request with headerKey.
- sliceKeys = append(sliceKeys, []string{remoteIP, path, headerKey})
-
- } else if len(headerValues) > 0 && r.Header().Get(headerKey) != "" {
- // If header values are not empty, rate-limit all request with headerKey and headerValues.
- for _, headerValue := range headerValues {
- sliceKeys = append(sliceKeys, []string{remoteIP, path, headerKey, headerValue})
- }
- }
- }
-
- } else if limiter.BasicAuthUsers != nil {
- // Limit by Basic Auth credentials.
- username, _, ok := r.BasicAuth()
- if ok && libstring.StringInSlice(limiter.BasicAuthUsers, username) {
- sliceKeys = append(sliceKeys, []string{remoteIP, path, username})
- }
- } else {
- // Default: Limit by remoteIP and path.
- sliceKeys = append(sliceKeys, []string{remoteIP, path})
- }
-
- return sliceKeys
-}
diff --git a/vendor/github.com/didip/tollbooth/thirdparty/tollbooth_gin/README.md b/vendor/github.com/didip/tollbooth/thirdparty/tollbooth_gin/README.md
deleted file mode 100644
index a1a82db..0000000
--- a/vendor/github.com/didip/tollbooth/thirdparty/tollbooth_gin/README.md
+++ /dev/null
@@ -1,31 +0,0 @@
-## tollbooth_gin
-
-[Gin](https://github.com/gin-gonic) middleware for rate limiting HTTP requests.
-
-
-## Five Minutes Tutorial
-
-```
-package main
-
-import (
- "github.com/didip/tollbooth"
- "github.com/didip/tollbooth/thirdparty/tollbooth_gin"
- "github.com/gin-gonic/gin"
- "time"
-)
-
-func main() {
- r := gin.New()
-
- // Create a limiter struct.
- limiter := tollbooth.NewLimiter(1, time.Second)
-
- r.GET("/", tollbooth_gin.LimitHandler(limiter), func(c *gin.Context) {
- c.String(200, "Hello, world!")
- })
-
- r.Run(":12345")
-}
-
-```
\ No newline at end of file
diff --git a/vendor/github.com/didip/tollbooth/thirdparty/tollbooth_gin/tollbooth_gin.go b/vendor/github.com/didip/tollbooth/thirdparty/tollbooth_gin/tollbooth_gin.go
deleted file mode 100644
index cbd15ce..0000000
--- a/vendor/github.com/didip/tollbooth/thirdparty/tollbooth_gin/tollbooth_gin.go
+++ /dev/null
@@ -1,19 +0,0 @@
-package tollbooth_gin
-
-import (
- "github.com/didip/tollbooth"
- "github.com/didip/tollbooth/config"
- "github.com/gin-gonic/gin"
-)
-
-func LimitHandler(limiter *config.Limiter) gin.HandlerFunc {
- return func(c *gin.Context) {
- httpError := tollbooth.LimitByRequest(limiter, c.Request)
- if httpError != nil {
- c.String(httpError.StatusCode, httpError.Message)
- c.Abort()
- } else {
- c.Next()
- }
- }
-}
diff --git a/vendor/github.com/didip/tollbooth/thirdparty/tollbooth_gorestful/README.md b/vendor/github.com/didip/tollbooth/thirdparty/tollbooth_gorestful/README.md
deleted file mode 100644
index b96c654..0000000
--- a/vendor/github.com/didip/tollbooth/thirdparty/tollbooth_gorestful/README.md
+++ /dev/null
@@ -1,36 +0,0 @@
-## tollbooth_gorestful
-
-Middleware for [go-restful](https://github.com/emicklei/go-restful)
-
-Import package `thirdparty/tollbooth_gorestful` and use `tollbooth_gorestful.LimitHandler` to which your own handler can be passed
-
-## Five Minutes Tutorial
-
-```
-package resources
-
-import (
- "github.com/didip/tollbooth"
- "github.com/didip/tollbooth/thirdparty/tollbooth_gorestful"
- "github.com/emicklei/go-restful"
-)
-
-type User struct {
- ID string `json:"id"`
- Email string `json:"email"`
-}
-
-func (u *User) Register(container *restful.Container) {
- ws := new(restful.WebService)
- ws.Path("/users").Doc("Manage Users").Consumes(restful.MIME_JSON).Produces(restful.MIME_JSON)
-
- ws.Route(ws.GET("/{id}").To(tollbooth_gorestful.LimitHandler(u.GetUser, tollbooth.NewLimiter(3, time.Minute))).
- // docs
- Doc("get a user").
- Operation("GetUser").
- Param(ws.PathParameter("id", "identifier of the user").DataType("string")).
- Writes(User{}))
-
- container.Add(ws)
-}
-```
diff --git a/vendor/github.com/didip/tollbooth/thirdparty/tollbooth_gorestful/tollbooth_gorestful.go b/vendor/github.com/didip/tollbooth/thirdparty/tollbooth_gorestful/tollbooth_gorestful.go
deleted file mode 100644
index d0303f1..0000000
--- a/vendor/github.com/didip/tollbooth/thirdparty/tollbooth_gorestful/tollbooth_gorestful.go
+++ /dev/null
@@ -1,19 +0,0 @@
-package tollbooth_gorestful
-
-import (
- "github.com/didip/tollbooth"
- "github.com/didip/tollbooth/config"
- "github.com/emicklei/go-restful"
-)
-
-func LimitHandler(handler restful.RouteFunction, limiter *config.Limiter) restful.RouteFunction {
- return func(request *restful.Request, response *restful.Response) {
- httpError := tollbooth.LimitByRequest(limiter, request.Request)
- if httpError != nil {
- response.WriteErrorString(429, "429: Too Many Requests")
- return
- }
-
- handler(request, response)
- }
-}
diff --git a/vendor/github.com/didip/tollbooth/thirdparty/tollbooth_httprouter/README.md b/vendor/github.com/didip/tollbooth/thirdparty/tollbooth_httprouter/README.md
deleted file mode 100644
index c991baa..0000000
--- a/vendor/github.com/didip/tollbooth/thirdparty/tollbooth_httprouter/README.md
+++ /dev/null
@@ -1,44 +0,0 @@
-## tollbooth_httprouter
-
-[httprouter](https://github.com/julienschmidt/httprouter) middleware for rate limiting HTTP requests.
-
-
-## Five Minutes Tutorial
-
-```
-package main
-
-import (
- "time"
- "log"
-
- "github.com/didip/tollbooth"
- "github.com/didip/tollbooth/thirdparty/tollbooth_httprouter"
- "github.com/julienschmidt/httprouter"
-)
-
-Index(w http.ResponseWriter, r *http.Request, _ httprouter.Params) {
- fmt.Fprint(w, "Welcome!\n")
-}
-
-func Hello(w http.ResponseWriter, r *http.Request, ps httprouter.Params) {
- fmt.Fprintf(w, "hello, %s!\n", ps.ByName("name"))
-}
-
-func main() {
- router := httprouter.New()
-
- // Create a limiter struct.
- limiter := tollbooth.NewLimiter(1, time.Second)
-
- // Index route without limiting.
- router.GET("/", Index)
-
- // Hello route with limiting.
- router.GET("/hello/:name",
- tollbooth_httprouter.LimitHandler(Hello, limiter),
- )
-
- log.Fatal(http.ListenAndServe(":8080", router))
-}
-```
diff --git a/vendor/github.com/didip/tollbooth/thirdparty/tollbooth_httprouter/tollbooth_httprouter.go b/vendor/github.com/didip/tollbooth/thirdparty/tollbooth_httprouter/tollbooth_httprouter.go
deleted file mode 100644
index fb6db78..0000000
--- a/vendor/github.com/didip/tollbooth/thirdparty/tollbooth_httprouter/tollbooth_httprouter.go
+++ /dev/null
@@ -1,22 +0,0 @@
-package tollbooth_httprouter
-
-import (
- "net/http"
-
- "github.com/didip/tollbooth"
- "github.com/didip/tollbooth/config"
- "github.com/julienschmidt/httprouter"
-)
-
-// RateLimit is a rate limiting middleware
-func LimitHandler(handler httprouter.Handle, limiter *config.Limiter) httprouter.Handle {
- return func(w http.ResponseWriter, r *http.Request, ps httprouter.Params) {
- httpError := tollbooth.LimitByRequest(limiter, r)
- if httpError != nil {
- http.Error(w, httpError.Message, httpError.StatusCode)
- return
- }
-
- handler(w, r, ps)
- }
-}
diff --git a/vendor/github.com/didip/tollbooth/thirdparty/tollbooth_negroni/README.md b/vendor/github.com/didip/tollbooth/thirdparty/tollbooth_negroni/README.md
deleted file mode 100644
index c950fd5..0000000
--- a/vendor/github.com/didip/tollbooth/thirdparty/tollbooth_negroni/README.md
+++ /dev/null
@@ -1,42 +0,0 @@
-## tollbooth_negroni
-
-[Negroni](https://github.com/urfave/negroni) middleware for rate limiting HTTP requests.
-
-
-## Five Minutes Tutorial
-
-```
-package main
-
-import (
- "github.com/urfave/negroni"
- "github.com/didip/tollbooth"
- "github.com/didip/tollbooth/thirdparty/tollbooth_negroni"
- "net/http"
- "time"
-)
-
-func HelloHandler() http.Handler {
- handleFunc := func(w http.ResponseWriter, r *http.Request) {
- w.Write([]byte("Hello, world!"))
- }
-
- return http.HandlerFunc(handleFunc)
-}
-
-func main() {
- // Create a limiter struct.
- limiter := tollbooth.NewLimiter(1, time.Second)
-
- mux := http.NewServeMux()
-
- mux.Handle("/", negroni.New(
- tollbooth_negroni.LimitHandler(limiter),
- negroni.Wrap(HelloHandler()),
- ))
-
- n := negroni.Classic()
- n.UseHandler(mux)
- n.Run(":12345")
-}
-```
\ No newline at end of file
diff --git a/vendor/github.com/didip/tollbooth/thirdparty/tollbooth_negroni/tollbooth_negroni.go b/vendor/github.com/didip/tollbooth/thirdparty/tollbooth_negroni/tollbooth_negroni.go
deleted file mode 100644
index 9f12b02..0000000
--- a/vendor/github.com/didip/tollbooth/thirdparty/tollbooth_negroni/tollbooth_negroni.go
+++ /dev/null
@@ -1,27 +0,0 @@
-package tollbooth_negroni
-
-import (
- "github.com/didip/tollbooth"
- "github.com/didip/tollbooth/config"
- "github.com/urfave/negroni"
- "net/http"
-)
-
-func LimitHandler(limiter *config.Limiter) negroni.HandlerFunc {
- return negroni.HandlerFunc(func(w http.ResponseWriter, r *http.Request, next http.HandlerFunc) {
- httpError := tollbooth.LimitByRequest(limiter, r)
- if httpError != nil {
- w.Header().Add("Content-Type", limiter.MessageContentType)
- /* RHMOD Fix for error "http: multiple response.WriteHeader calls"
- Reverse the sequence of the functions calls w.WriteHeader() and w.Write()
- */
- w.WriteHeader(httpError.StatusCode)
- w.Write([]byte(httpError.Message))
- return
-
- } else {
- next(w, r)
- }
-
- })
-}
diff --git a/vendor/github.com/didip/tollbooth/tollbooth.go b/vendor/github.com/didip/tollbooth/tollbooth.go
deleted file mode 100644
index c6b1fe3..0000000
--- a/vendor/github.com/didip/tollbooth/tollbooth.go
+++ /dev/null
@@ -1,170 +0,0 @@
-// Package tollbooth provides rate-limiting logic to HTTP request handler.
-package tollbooth
-
-import (
- "net/http"
- "strconv"
- "strings"
- "time"
-
- "github.com/didip/tollbooth/config"
- "github.com/didip/tollbooth/errors"
- "github.com/didip/tollbooth/libstring"
-)
-
-// NewLimiter is a convenience function to config.NewLimiter.
-func NewLimiter(max int64, ttl time.Duration) *config.Limiter {
- return config.NewLimiter(max, ttl)
-}
-
-// LimitByKeys keeps track number of request made by keys separated by pipe.
-// It returns HTTPError when limit is exceeded.
-func LimitByKeys(limiter *config.Limiter, keys []string) *errors.HTTPError {
- if limiter.LimitReached(strings.Join(keys, "|")) {
- return &errors.HTTPError{Message: limiter.Message, StatusCode: limiter.StatusCode}
- }
-
- return nil
-}
-
-// LimitByRequest builds keys based on http.Request struct,
-// loops through all the keys, and check if any one of them returns HTTPError.
-func LimitByRequest(limiter *config.Limiter, r *http.Request) *errors.HTTPError {
- sliceKeys := BuildKeys(limiter, r)
-
- // Loop sliceKeys and check if one of them has error.
- for _, keys := range sliceKeys {
- httpError := LimitByKeys(limiter, keys)
- if httpError != nil {
- return httpError
- }
- }
-
- return nil
-}
-
-// BuildKeys generates a slice of keys to rate-limit by given config and request structs.
-func BuildKeys(limiter *config.Limiter, r *http.Request) [][]string {
- remoteIP := libstring.RemoteIP(limiter.IPLookups, r)
- path := r.URL.Path
- sliceKeys := make([][]string, 0)
-
- // Don't BuildKeys if remoteIP is blank.
- if remoteIP == "" {
- return sliceKeys
- }
-
- if limiter.Methods != nil && limiter.Headers != nil && limiter.BasicAuthUsers != nil {
- // Limit by HTTP methods and HTTP headers+values and Basic Auth credentials.
- if libstring.StringInSlice(limiter.Methods, r.Method) {
- for headerKey, headerValues := range limiter.Headers {
- if (headerValues == nil || len(headerValues) <= 0) && r.Header.Get(headerKey) != "" {
- // If header values are empty, rate-limit all request with headerKey.
- username, _, ok := r.BasicAuth()
- if ok && libstring.StringInSlice(limiter.BasicAuthUsers, username) {
- sliceKeys = append(sliceKeys, []string{remoteIP, path, r.Method, headerKey, username})
- }
-
- } else if len(headerValues) > 0 && r.Header.Get(headerKey) != "" {
- // If header values are not empty, rate-limit all request with headerKey and headerValues.
- for _, headerValue := range headerValues {
- username, _, ok := r.BasicAuth()
- if ok && libstring.StringInSlice(limiter.BasicAuthUsers, username) {
- sliceKeys = append(sliceKeys, []string{remoteIP, path, r.Method, headerKey, headerValue, username})
- }
- }
- }
- }
- }
-
- } else if limiter.Methods != nil && limiter.Headers != nil {
- // Limit by HTTP methods and HTTP headers+values.
- if libstring.StringInSlice(limiter.Methods, r.Method) {
- for headerKey, headerValues := range limiter.Headers {
- if (headerValues == nil || len(headerValues) <= 0) && r.Header.Get(headerKey) != "" {
- // If header values are empty, rate-limit all request with headerKey.
- sliceKeys = append(sliceKeys, []string{remoteIP, path, r.Method, headerKey})
-
- } else if len(headerValues) > 0 && r.Header.Get(headerKey) != "" {
- // If header values are not empty, rate-limit all request with headerKey and headerValues.
- for _, headerValue := range headerValues {
- sliceKeys = append(sliceKeys, []string{remoteIP, path, r.Method, headerKey, headerValue})
- }
- }
- }
- }
-
- } else if limiter.Methods != nil && limiter.BasicAuthUsers != nil {
- // Limit by HTTP methods and Basic Auth credentials.
- if libstring.StringInSlice(limiter.Methods, r.Method) {
- username, _, ok := r.BasicAuth()
- if ok && libstring.StringInSlice(limiter.BasicAuthUsers, username) {
- sliceKeys = append(sliceKeys, []string{remoteIP, path, r.Method, username})
- }
- }
-
- } else if limiter.Methods != nil {
- // Limit by HTTP methods.
- if libstring.StringInSlice(limiter.Methods, r.Method) {
- sliceKeys = append(sliceKeys, []string{remoteIP, path, r.Method})
- }
-
- } else if limiter.Headers != nil {
- // Limit by HTTP headers+values.
- for headerKey, headerValues := range limiter.Headers {
- if (headerValues == nil || len(headerValues) <= 0) && r.Header.Get(headerKey) != "" {
- // If header values are empty, rate-limit all request with headerKey.
- sliceKeys = append(sliceKeys, []string{remoteIP, path, headerKey})
-
- } else if len(headerValues) > 0 && r.Header.Get(headerKey) != "" {
- // If header values are not empty, rate-limit all request with headerKey and headerValues.
- for _, headerValue := range headerValues {
- sliceKeys = append(sliceKeys, []string{remoteIP, path, headerKey, headerValue})
- }
- }
- }
-
- } else if limiter.BasicAuthUsers != nil {
- // Limit by Basic Auth credentials.
- username, _, ok := r.BasicAuth()
- if ok && libstring.StringInSlice(limiter.BasicAuthUsers, username) {
- sliceKeys = append(sliceKeys, []string{remoteIP, path, username})
- }
- } else {
- // Default: Limit by remoteIP and path.
- sliceKeys = append(sliceKeys, []string{remoteIP, path})
- }
-
- return sliceKeys
-}
-
-// SetResponseHeaders configures X-Rate-Limit-Limit and X-Rate-Limit-Duration
-func SetResponseHeaders(limiter *config.Limiter, w http.ResponseWriter) {
- w.Header().Add("X-Rate-Limit-Limit", strconv.FormatInt(limiter.Max, 10))
- w.Header().Add("X-Rate-Limit-Duration", limiter.TTL.String())
-}
-
-// LimitHandler is a middleware that performs rate-limiting given http.Handler struct.
-func LimitHandler(limiter *config.Limiter, next http.Handler) http.Handler {
- middle := func(w http.ResponseWriter, r *http.Request) {
- SetResponseHeaders(limiter, w)
-
- httpError := LimitByRequest(limiter, r)
- if httpError != nil {
- w.Header().Add("Content-Type", limiter.MessageContentType)
- w.WriteHeader(httpError.StatusCode)
- w.Write([]byte(httpError.Message))
- return
- }
-
- // There's no rate-limit error, serve the next handler.
- next.ServeHTTP(w, r)
- }
-
- return http.HandlerFunc(middle)
-}
-
-// LimitFuncHandler is a middleware that performs rate-limiting given request handler function.
-func LimitFuncHandler(limiter *config.Limiter, nextFunc func(http.ResponseWriter, *http.Request)) http.Handler {
- return LimitHandler(limiter, http.HandlerFunc(nextFunc))
-}
diff --git a/vendor/github.com/didip/tollbooth/tollbooth_benchmark_test.go b/vendor/github.com/didip/tollbooth/tollbooth_benchmark_test.go
deleted file mode 100644
index 9136ec3..0000000
--- a/vendor/github.com/didip/tollbooth/tollbooth_benchmark_test.go
+++ /dev/null
@@ -1,34 +0,0 @@
-package tollbooth
-
-import (
- "fmt"
- "net/http"
- "strings"
- "testing"
- "time"
-)
-
-func BenchmarkLimitByKeys(b *testing.B) {
- limiter := NewLimiter(1, time.Second) // Only 1 request per second is allowed.
-
- for i := 0; i < b.N; i++ {
- LimitByKeys(limiter, []string{"127.0.0.1", "/"})
- }
-}
-
-func BenchmarkBuildKeys(b *testing.B) {
- limiter := NewLimiter(1, time.Second)
-
- request, err := http.NewRequest("GET", "/", strings.NewReader("Hello, world!"))
- if err != nil {
- fmt.Printf("Unable to create new HTTP request. Error: %v", err)
- }
-
- request.Header.Set("X-Real-IP", "2601:7:1c82:4097:59a0:a80b:2841:b8c8")
- for i := 0; i < b.N; i++ {
- sliceKeys := BuildKeys(limiter, request)
- if len(sliceKeys) == 0 {
- fmt.Print("Length of sliceKeys should never be empty.")
- }
- }
-}
diff --git a/vendor/github.com/didip/tollbooth/tollbooth_test.go b/vendor/github.com/didip/tollbooth/tollbooth_test.go
deleted file mode 100644
index c7792d1..0000000
--- a/vendor/github.com/didip/tollbooth/tollbooth_test.go
+++ /dev/null
@@ -1,266 +0,0 @@
-package tollbooth
-
-import (
- "net/http"
- "strings"
- "testing"
- "time"
-)
-
-func TestLimitByKeys(t *testing.T) {
- limiter := NewLimiter(1, time.Second) // Only 1 request per second is allowed.
-
- httperror := LimitByKeys(limiter, []string{"127.0.0.1", "/"})
- if httperror != nil {
- t.Errorf("First time count should not return error. Error: %v", httperror.Error())
- }
-
- httperror = LimitByKeys(limiter, []string{"127.0.0.1", "/"})
- if httperror == nil {
- t.Errorf("Second time count should return error because it exceeds 1 request per second.")
- }
-
- <-time.After(1 * time.Second)
- httperror = LimitByKeys(limiter, []string{"127.0.0.1", "/"})
- if httperror != nil {
- t.Errorf("Third time count should not return error because the 1 second window has passed.")
- }
-}
-
-func TestDefaultBuildKeys(t *testing.T) {
- limiter := NewLimiter(1, time.Second)
- limiter.IPLookups = []string{"X-Forwarded-For", "X-Real-IP", "RemoteAddr"}
-
- request, err := http.NewRequest("GET", "/", strings.NewReader("Hello, world!"))
- if err != nil {
- t.Errorf("Unable to create new HTTP request. Error: %v", err)
- }
-
- request.Header.Set("X-Real-IP", "2601:7:1c82:4097:59a0:a80b:2841:b8c8")
-
- sliceKeys := BuildKeys(limiter, request)
- if len(sliceKeys) == 0 {
- t.Error("Length of sliceKeys should never be empty.")
- }
-
- for _, keys := range sliceKeys {
- for i, keyChunk := range keys {
- if i == 0 && keyChunk != request.Header.Get("X-Real-IP") {
- t.Errorf("The first chunk should be remote IP. KeyChunk: %v", keyChunk)
- }
- if i == 1 && keyChunk != request.URL.Path {
- t.Errorf("The second chunk should be request path. KeyChunk: %v", keyChunk)
- }
- }
- }
-}
-
-func TestBasicAuthBuildKeys(t *testing.T) {
- limiter := NewLimiter(1, time.Second)
- limiter.BasicAuthUsers = []string{"bro"}
-
- request, err := http.NewRequest("GET", "/", strings.NewReader("Hello, world!"))
- if err != nil {
- t.Errorf("Unable to create new HTTP request. Error: %v", err)
- }
-
- request.Header.Set("X-Real-IP", "2601:7:1c82:4097:59a0:a80b:2841:b8c8")
-
- request.SetBasicAuth("bro", "tato")
-
- for _, keys := range BuildKeys(limiter, request) {
- if len(keys) != 3 {
- t.Error("Keys should be made of 3 parts.")
- }
- for i, keyChunk := range keys {
- if i == 0 && keyChunk != request.Header.Get("X-Real-IP") {
- t.Errorf("The (%v) chunk should be remote IP. KeyChunk: %v", i+1, keyChunk)
- }
- if i == 1 && keyChunk != request.URL.Path {
- t.Errorf("The (%v) chunk should be request path. KeyChunk: %v", i+1, keyChunk)
- }
- if i == 2 && keyChunk != "bro" {
- t.Errorf("The (%v) chunk should be request username. KeyChunk: %v", i+1, keyChunk)
- }
- }
- }
-}
-
-func TestCustomHeadersBuildKeys(t *testing.T) {
- limiter := NewLimiter(1, time.Second)
- limiter.Headers = make(map[string][]string)
- limiter.Headers["X-Auth-Token"] = []string{"totally-top-secret", "another-secret"}
-
- request, err := http.NewRequest("GET", "/", strings.NewReader("Hello, world!"))
- if err != nil {
- t.Errorf("Unable to create new HTTP request. Error: %v", err)
- }
-
- request.Header.Set("X-Real-IP", "2601:7:1c82:4097:59a0:a80b:2841:b8c8")
- request.Header.Set("X-Auth-Token", "totally-top-secret")
-
- for _, keys := range BuildKeys(limiter, request) {
- if len(keys) != 4 {
- t.Errorf("Keys should be made of 4 parts. Keys: %v", keys)
- }
- for i, keyChunk := range keys {
- if i == 0 && keyChunk != request.Header.Get("X-Real-IP") {
- t.Errorf("The (%v) chunk should be remote IP. KeyChunk: %v", i+1, keyChunk)
- }
- if i == 1 && keyChunk != request.URL.Path {
- t.Errorf("The (%v) chunk should be request path. KeyChunk: %v", i+1, keyChunk)
- }
- if i == 2 && keyChunk != "X-Auth-Token" {
- t.Errorf("The (%v) chunk should be request header. KeyChunk: %v", i+1, keyChunk)
- }
- if i == 3 && (keyChunk != "totally-top-secret" && keyChunk != "another-secret") {
- t.Errorf("The (%v) chunk should be request path. KeyChunk: %v", i+1, keyChunk)
- }
- }
- }
-}
-
-func TestRequestMethodBuildKeys(t *testing.T) {
- limiter := NewLimiter(1, time.Second)
- limiter.Methods = []string{"GET"}
-
- request, err := http.NewRequest("GET", "/", strings.NewReader("Hello, world!"))
- if err != nil {
- t.Errorf("Unable to create new HTTP request. Error: %v", err)
- }
-
- request.Header.Set("X-Real-IP", "2601:7:1c82:4097:59a0:a80b:2841:b8c8")
-
- for _, keys := range BuildKeys(limiter, request) {
- if len(keys) != 3 {
- t.Errorf("Keys should be made of 3 parts. Keys: %v", keys)
- }
- for i, keyChunk := range keys {
- if i == 0 && keyChunk != request.Header.Get("X-Real-IP") {
- t.Errorf("The (%v) chunk should be remote IP. KeyChunk: %v", i+1, keyChunk)
- }
- if i == 1 && keyChunk != request.URL.Path {
- t.Errorf("The (%v) chunk should be request path. KeyChunk: %v", i+1, keyChunk)
- }
- if i == 2 && keyChunk != "GET" {
- t.Errorf("The (%v) chunk should be request method. KeyChunk: %v", i+1, keyChunk)
- }
- }
- }
-}
-
-func TestRequestMethodAndCustomHeadersBuildKeys(t *testing.T) {
- limiter := NewLimiter(1, time.Second)
- limiter.Methods = []string{"GET"}
- limiter.Headers = make(map[string][]string)
- limiter.Headers["X-Auth-Token"] = []string{"totally-top-secret", "another-secret"}
-
- request, err := http.NewRequest("GET", "/", strings.NewReader("Hello, world!"))
- if err != nil {
- t.Errorf("Unable to create new HTTP request. Error: %v", err)
- }
-
- request.Header.Set("X-Real-IP", "2601:7:1c82:4097:59a0:a80b:2841:b8c8")
- request.Header.Set("X-Auth-Token", "totally-top-secret")
-
- for _, keys := range BuildKeys(limiter, request) {
- if len(keys) != 5 {
- t.Errorf("Keys should be made of 4 parts. Keys: %v", keys)
- }
- for i, keyChunk := range keys {
- if i == 0 && keyChunk != request.Header.Get("X-Real-IP") {
- t.Errorf("The (%v) chunk should be remote IP. KeyChunk: %v", i+1, keyChunk)
- }
- if i == 1 && keyChunk != request.URL.Path {
- t.Errorf("The (%v) chunk should be request path. KeyChunk: %v", i+1, keyChunk)
- }
- if i == 2 && keyChunk != "GET" {
- t.Errorf("The (%v) chunk should be request method. KeyChunk: %v", i+1, keyChunk)
- }
- if i == 3 && keyChunk != "X-Auth-Token" {
- t.Errorf("The (%v) chunk should be request header. KeyChunk: %v", i+1, keyChunk)
- }
- if i == 4 && (keyChunk != "totally-top-secret" && keyChunk != "another-secret") {
- t.Errorf("The (%v) chunk should be request path. KeyChunk: %v", i+1, keyChunk)
- }
- }
- }
-}
-
-func TestRequestMethodAndBasicAuthUsersBuildKeys(t *testing.T) {
- limiter := NewLimiter(1, time.Second)
- limiter.Methods = []string{"GET"}
- limiter.BasicAuthUsers = []string{"bro"}
-
- request, err := http.NewRequest("GET", "/", strings.NewReader("Hello, world!"))
- if err != nil {
- t.Errorf("Unable to create new HTTP request. Error: %v", err)
- }
-
- request.Header.Set("X-Real-IP", "2601:7:1c82:4097:59a0:a80b:2841:b8c8")
- request.SetBasicAuth("bro", "tato")
-
- for _, keys := range BuildKeys(limiter, request) {
- if len(keys) != 4 {
- t.Errorf("Keys should be made of 4 parts. Keys: %v", keys)
- }
- for i, keyChunk := range keys {
- if i == 0 && keyChunk != request.Header.Get("X-Real-IP") {
- t.Errorf("The (%v) chunk should be remote IP. KeyChunk: %v", i+1, keyChunk)
- }
- if i == 1 && keyChunk != request.URL.Path {
- t.Errorf("The (%v) chunk should be request path. KeyChunk: %v", i+1, keyChunk)
- }
- if i == 2 && keyChunk != "GET" {
- t.Errorf("The (%v) chunk should be request method. KeyChunk: %v", i+1, keyChunk)
- }
- if i == 3 && keyChunk != "bro" {
- t.Errorf("The (%v) chunk should be basic auth user. KeyChunk: %v", i+1, keyChunk)
- }
- }
- }
-}
-
-func TestRequestMethodCustomHeadersAndBasicAuthUsersBuildKeys(t *testing.T) {
- limiter := NewLimiter(1, time.Second)
- limiter.Methods = []string{"GET"}
- limiter.Headers = make(map[string][]string)
- limiter.Headers["X-Auth-Token"] = []string{"totally-top-secret", "another-secret"}
- limiter.BasicAuthUsers = []string{"bro"}
-
- request, err := http.NewRequest("GET", "/", strings.NewReader("Hello, world!"))
- if err != nil {
- t.Errorf("Unable to create new HTTP request. Error: %v", err)
- }
-
- request.Header.Set("X-Real-IP", "2601:7:1c82:4097:59a0:a80b:2841:b8c8")
- request.Header.Set("X-Auth-Token", "totally-top-secret")
- request.SetBasicAuth("bro", "tato")
-
- for _, keys := range BuildKeys(limiter, request) {
- if len(keys) != 6 {
- t.Errorf("Keys should be made of 4 parts. Keys: %v", keys)
- }
- for i, keyChunk := range keys {
- if i == 0 && keyChunk != request.Header.Get("X-Real-IP") {
- t.Errorf("The (%v) chunk should be remote IP. KeyChunk: %v", i+1, keyChunk)
- }
- if i == 1 && keyChunk != request.URL.Path {
- t.Errorf("The (%v) chunk should be request path. KeyChunk: %v", i+1, keyChunk)
- }
- if i == 2 && keyChunk != "GET" {
- t.Errorf("The (%v) chunk should be request method. KeyChunk: %v", i+1, keyChunk)
- }
- if i == 3 && keyChunk != "X-Auth-Token" {
- t.Errorf("The (%v) chunk should be request header. KeyChunk: %v", i+1, keyChunk)
- }
- if i == 4 && (keyChunk != "totally-top-secret" && keyChunk != "another-secret") {
- t.Errorf("The (%v) chunk should be request path. KeyChunk: %v", i+1, keyChunk)
- }
- if i == 5 && keyChunk != "bro" {
- t.Errorf("The (%v) chunk should be basic auth user. KeyChunk: %v", i+1, keyChunk)
- }
- }
- }
-
-}
diff --git a/vendor/github.com/didip/tollbooth/vendor/github.com/juju/ratelimit/LICENSE b/vendor/github.com/didip/tollbooth/vendor/github.com/juju/ratelimit/LICENSE
deleted file mode 100644
index ade9307..0000000
--- a/vendor/github.com/didip/tollbooth/vendor/github.com/juju/ratelimit/LICENSE
+++ /dev/null
@@ -1,191 +0,0 @@
-All files in this repository are licensed as follows. If you contribute
-to this repository, it is assumed that you license your contribution
-under the same license unless you state otherwise.
-
-All files Copyright (C) 2015 Canonical Ltd. unless otherwise specified in the file.
-
-This software is licensed under the LGPLv3, included below.
-
-As a special exception to the GNU Lesser General Public License version 3
-("LGPL3"), the copyright holders of this Library give you permission to
-convey to a third party a Combined Work that links statically or dynamically
-to this Library without providing any Minimal Corresponding Source or
-Minimal Application Code as set out in 4d or providing the installation
-information set out in section 4e, provided that you comply with the other
-provisions of LGPL3 and provided that you meet, for the Application the
-terms and conditions of the license(s) which apply to the Application.
-
-Except as stated in this special exception, the provisions of LGPL3 will
-continue to comply in full to this Library. If you modify this Library, you
-may apply this exception to your version of this Library, but you are not
-obliged to do so. If you do not wish to do so, delete this exception
-statement from your version. This exception does not (and cannot) modify any
-license terms which apply to the Application, with which you must still
-comply.
-
-
- GNU LESSER GENERAL PUBLIC LICENSE
- Version 3, 29 June 2007
-
- Copyright (C) 2007 Free Software Foundation, Inc. <http://fsf.org/>
- Everyone is permitted to copy and distribute verbatim copies
- of this license document, but changing it is not allowed.
-
-
- This version of the GNU Lesser General Public License incorporates
-the terms and conditions of version 3 of the GNU General Public
-License, supplemented by the additional permissions listed below.
-
- 0. Additional Definitions.
-
- As used herein, "this License" refers to version 3 of the GNU Lesser
-General Public License, and the "GNU GPL" refers to version 3 of the GNU
-General Public License.
-
- "The Library" refers to a covered work governed by this License,
-other than an Application or a Combined Work as defined below.
-
- An "Application" is any work that makes use of an interface provided
-by the Library, but which is not otherwise based on the Library.
-Defining a subclass of a class defined by the Library is deemed a mode
-of using an interface provided by the Library.
-
- A "Combined Work" is a work produced by combining or linking an
-Application with the Library. The particular version of the Library
-with which the Combined Work was made is also called the "Linked
-Version".
-
- The "Minimal Corresponding Source" for a Combined Work means the
-Corresponding Source for the Combined Work, excluding any source code
-for portions of the Combined Work that, considered in isolation, are
-based on the Application, and not on the Linked Version.
-
- The "Corresponding Application Code" for a Combined Work means the
-object code and/or source code for the Application, including any data
-and utility programs needed for reproducing the Combined Work from the
-Application, but excluding the System Libraries of the Combined Work.
-
- 1. Exception to Section 3 of the GNU GPL.
-
- You may convey a covered work under sections 3 and 4 of this License
-without being bound by section 3 of the GNU GPL.
-
- 2. Conveying Modified Versions.
-
- If you modify a copy of the Library, and, in your modifications, a
-facility refers to a function or data to be supplied by an Application
-that uses the facility (other than as an argument passed when the
-facility is invoked), then you may convey a copy of the modified
-version:
-
- a) under this License, provided that you make a good faith effort to
- ensure that, in the event an Application does not supply the
- function or data, the facility still operates, and performs
- whatever part of its purpose remains meaningful, or
-
- b) under the GNU GPL, with none of the additional permissions of
- this License applicable to that copy.
-
- 3. Object Code Incorporating Material from Library Header Files.
-
- The object code form of an Application may incorporate material from
-a header file that is part of the Library. You may convey such object
-code under terms of your choice, provided that, if the incorporated
-material is not limited to numerical parameters, data structure
-layouts and accessors, or small macros, inline functions and templates
-(ten or fewer lines in length), you do both of the following:
-
- a) Give prominent notice with each copy of the object code that the
- Library is used in it and that the Library and its use are
- covered by this License.
-
- b) Accompany the object code with a copy of the GNU GPL and this license
- document.
-
- 4. Combined Works.
-
- You may convey a Combined Work under terms of your choice that,
-taken together, effectively do not restrict modification of the
-portions of the Library contained in the Combined Work and reverse
-engineering for debugging such modifications, if you also do each of
-the following:
-
- a) Give prominent notice with each copy of the Combined Work that
- the Library is used in it and that the Library and its use are
- covered by this License.
-
- b) Accompany the Combined Work with a copy of the GNU GPL and this license
- document.
-
- c) For a Combined Work that displays copyright notices during
- execution, include the copyright notice for the Library among
- these notices, as well as a reference directing the user to the
- copies of the GNU GPL and this license document.
-
- d) Do one of the following:
-
- 0) Convey the Minimal Corresponding Source under the terms of this
- License, and the Corresponding Application Code in a form
- suitable for, and under terms that permit, the user to
- recombine or relink the Application with a modified version of
- the Linked Version to produce a modified Combined Work, in the
- manner specified by section 6 of the GNU GPL for conveying
- Corresponding Source.
-
- 1) Use a suitable shared library mechanism for linking with the
- Library. A suitable mechanism is one that (a) uses at run time
- a copy of the Library already present on the user's computer
- system, and (b) will operate properly with a modified version
- of the Library that is interface-compatible with the Linked
- Version.
-
- e) Provide Installation Information, but only if you would otherwise
- be required to provide such information under section 6 of the
- GNU GPL, and only to the extent that such information is
- necessary to install and execute a modified version of the
- Combined Work produced by recombining or relinking the
- Application with a modified version of the Linked Version. (If
- you use option 4d0, the Installation Information must accompany
- the Minimal Corresponding Source and Corresponding Application
- Code. If you use option 4d1, you must provide the Installation
- Information in the manner specified by section 6 of the GNU GPL
- for conveying Corresponding Source.)
-
- 5. Combined Libraries.
-
- You may place library facilities that are a work based on the
-Library side by side in a single library together with other library
-facilities that are not Applications and are not covered by this
-License, and convey such a combined library under terms of your
-choice, if you do both of the following:
-
- a) Accompany the combined library with a copy of the same work based
- on the Library, uncombined with any other library facilities,
- conveyed under the terms of this License.
-
- b) Give prominent notice with the combined library that part of it
- is a work based on the Library, and explaining where to find the
- accompanying uncombined form of the same work.
-
- 6. Revised Versions of the GNU Lesser General Public License.
-
- The Free Software Foundation may publish revised and/or new versions
-of the GNU Lesser General Public License from time to time. Such new
-versions will be similar in spirit to the present version, but may
-differ in detail to address new problems or concerns.
-
- Each version is given a distinguishing version number. If the
-Library as you received it specifies that a certain numbered version
-of the GNU Lesser General Public License "or any later version"
-applies to it, you have the option of following the terms and
-conditions either of that published version or of any later version
-published by the Free Software Foundation. If the Library as you
-received it does not specify a version number of the GNU Lesser
-General Public License, you may choose any version of the GNU Lesser
-General Public License ever published by the Free Software Foundation.
-
- If the Library as you received it specifies that a proxy can decide
-whether future versions of the GNU Lesser General Public License shall
-apply, that proxy's public statement of acceptance of any version is
-permanent authorization for you to choose that version for the
-Library.
diff --git a/vendor/github.com/didip/tollbooth/vendor/github.com/juju/ratelimit/README.md b/vendor/github.com/didip/tollbooth/vendor/github.com/juju/ratelimit/README.md
deleted file mode 100644
index a0fdfe2..0000000
--- a/vendor/github.com/didip/tollbooth/vendor/github.com/juju/ratelimit/README.md
+++ /dev/null
@@ -1,117 +0,0 @@
-# ratelimit
---
- import "github.com/juju/ratelimit"
-
-The ratelimit package provides an efficient token bucket implementation. See
-http://en.wikipedia.org/wiki/Token_bucket.
-
-## Usage
-
-#### func Reader
-
-```go
-func Reader(r io.Reader, bucket *Bucket) io.Reader
-```
-Reader returns a reader that is rate limited by the given token bucket. Each
-token in the bucket represents one byte.
-
-#### func Writer
-
-```go
-func Writer(w io.Writer, bucket *Bucket) io.Writer
-```
-Writer returns a writer that is rate limited by the given token bucket. Each
-token in the bucket represents one byte.
-
-#### type Bucket
-
-```go
-type Bucket struct {
-}
-```
-
-Bucket represents a token bucket that fills at a predetermined rate. Methods on
-Bucket may be called concurrently.
-
-#### func NewBucket
-
-```go
-func NewBucket(fillInterval time.Duration, capacity int64) *Bucket
-```
-NewBucket returns a new token bucket that fills at the rate of one token every
-fillInterval, up to the given maximum capacity. Both arguments must be positive.
-The bucket is initially full.
-
-#### func NewBucketWithQuantum
-
-```go
-func NewBucketWithQuantum(fillInterval time.Duration, capacity, quantum int64) *Bucket
-```
-NewBucketWithQuantum is similar to NewBucket, but allows the specification of
-the quantum size - quantum tokens are added every fillInterval.
-
-#### func NewBucketWithRate
-
-```go
-func NewBucketWithRate(rate float64, capacity int64) *Bucket
-```
-NewBucketWithRate returns a token bucket that fills the bucket at the rate of
-rate tokens per second up to the given maximum capacity. Because of limited
-clock resolution, at high rates, the actual rate may be up to 1% different from
-the specified rate.
-
-#### func (*Bucket) Rate
-
-```go
-func (tb *Bucket) Rate() float64
-```
-Rate returns the fill rate of the bucket, in tokens per second.
-
-#### func (*Bucket) Take
-
-```go
-func (tb *Bucket) Take(count int64) time.Duration
-```
-Take takes count tokens from the bucket without blocking. It returns the time
-that the caller should wait until the tokens are actually available.
-
-Note that if the request is irrevocable - there is no way to return tokens to
-the bucket once this method commits us to taking them.
-
-#### func (*Bucket) TakeAvailable
-
-```go
-func (tb *Bucket) TakeAvailable(count int64) int64
-```
-TakeAvailable takes up to count immediately available tokens from the bucket. It
-returns the number of tokens removed, or zero if there are no available tokens.
-It does not block.
-
-#### func (*Bucket) TakeMaxDuration
-
-```go
-func (tb *Bucket) TakeMaxDuration(count int64, maxWait time.Duration) (time.Duration, bool)
-```
-TakeMaxDuration is like Take, except that it will only take tokens from the
-bucket if the wait time for the tokens is no greater than maxWait.
-
-If it would take longer than maxWait for the tokens to become available, it does
-nothing and reports false, otherwise it returns the time that the caller should
-wait until the tokens are actually available, and reports true.
-
-#### func (*Bucket) Wait
-
-```go
-func (tb *Bucket) Wait(count int64)
-```
-Wait takes count tokens from the bucket, waiting until they are available.
-
-#### func (*Bucket) WaitMaxDuration
-
-```go
-func (tb *Bucket) WaitMaxDuration(count int64, maxWait time.Duration) bool
-```
-WaitMaxDuration is like Wait except that it will only take tokens from the
-bucket if it needs to wait for no greater than maxWait. It reports whether any
-tokens have been removed from the bucket If no tokens have been removed, it
-returns immediately.
diff --git a/vendor/github.com/didip/tollbooth/vendor/github.com/juju/ratelimit/ratelimit.go b/vendor/github.com/didip/tollbooth/vendor/github.com/juju/ratelimit/ratelimit.go
deleted file mode 100644
index 3ef32fb..0000000
--- a/vendor/github.com/didip/tollbooth/vendor/github.com/juju/ratelimit/ratelimit.go
+++ /dev/null
@@ -1,245 +0,0 @@
-// Copyright 2014 Canonical Ltd.
-// Licensed under the LGPLv3 with static-linking exception.
-// See LICENCE file for details.
-
-// The ratelimit package provides an efficient token bucket implementation
-// that can be used to limit the rate of arbitrary things.
-// See http://en.wikipedia.org/wiki/Token_bucket.
-package ratelimit
-
-import (
- "math"
- "strconv"
- "sync"
- "time"
-)
-
-// Bucket represents a token bucket that fills at a predetermined rate.
-// Methods on Bucket may be called concurrently.
-type Bucket struct {
- startTime time.Time
- capacity int64
- quantum int64
- fillInterval time.Duration
-
- // The mutex guards the fields following it.
- mu sync.Mutex
-
- // avail holds the number of available tokens
- // in the bucket, as of availTick ticks from startTime.
- // It will be negative when there are consumers
- // waiting for tokens.
- avail int64
- availTick int64
-}
-
-// NewBucket returns a new token bucket that fills at the
-// rate of one token every fillInterval, up to the given
-// maximum capacity. Both arguments must be
-// positive. The bucket is initially full.
-func NewBucket(fillInterval time.Duration, capacity int64) *Bucket {
- return NewBucketWithQuantum(fillInterval, capacity, 1)
-}
-
-// rateMargin specifes the allowed variance of actual
-// rate from specified rate. 1% seems reasonable.
-const rateMargin = 0.01
-
-// NewBucketWithRate returns a token bucket that fills the bucket
-// at the rate of rate tokens per second up to the given
-// maximum capacity. Because of limited clock resolution,
-// at high rates, the actual rate may be up to 1% different from the
-// specified rate.
-func NewBucketWithRate(rate float64, capacity int64) *Bucket {
- for quantum := int64(1); quantum < 1<<50; quantum = nextQuantum(quantum) {
- fillInterval := time.Duration(1e9 * float64(quantum) / rate)
- if fillInterval <= 0 {
- continue
- }
- tb := NewBucketWithQuantum(fillInterval, capacity, quantum)
- if diff := math.Abs(tb.Rate() - rate); diff/rate <= rateMargin {
- return tb
- }
- }
- panic("cannot find suitable quantum for " + strconv.FormatFloat(rate, 'g', -1, 64))
-}
-
-// nextQuantum returns the next quantum to try after q.
-// We grow the quantum exponentially, but slowly, so we
-// get a good fit in the lower numbers.
-func nextQuantum(q int64) int64 {
- q1 := q * 11 / 10
- if q1 == q {
- q1++
- }
- return q1
-}
-
-// NewBucketWithQuantum is similar to NewBucket, but allows
-// the specification of the quantum size - quantum tokens
-// are added every fillInterval.
-func NewBucketWithQuantum(fillInterval time.Duration, capacity, quantum int64) *Bucket {
- if fillInterval <= 0 {
- panic("token bucket fill interval is not > 0")
- }
- if capacity <= 0 {
- panic("token bucket capacity is not > 0")
- }
- if quantum <= 0 {
- panic("token bucket quantum is not > 0")
- }
- return &Bucket{
- startTime: time.Now(),
- capacity: capacity,
- quantum: quantum,
- avail: capacity,
- fillInterval: fillInterval,
- }
-}
-
-// Wait takes count tokens from the bucket, waiting until they are
-// available.
-func (tb *Bucket) Wait(count int64) {
- if d := tb.Take(count); d > 0 {
- time.Sleep(d)
- }
-}
-
-// WaitMaxDuration is like Wait except that it will
-// only take tokens from the bucket if it needs to wait
-// for no greater than maxWait. It reports whether
-// any tokens have been removed from the bucket
-// If no tokens have been removed, it returns immediately.
-func (tb *Bucket) WaitMaxDuration(count int64, maxWait time.Duration) bool {
- d, ok := tb.TakeMaxDuration(count, maxWait)
- if d > 0 {
- time.Sleep(d)
- }
- return ok
-}
-
-const infinityDuration time.Duration = 0x7fffffffffffffff
-
-// Take takes count tokens from the bucket without blocking. It returns
-// the time that the caller should wait until the tokens are actually
-// available.
-//
-// Note that if the request is irrevocable - there is no way to return
-// tokens to the bucket once this method commits us to taking them.
-func (tb *Bucket) Take(count int64) time.Duration {
- d, _ := tb.take(time.Now(), count, infinityDuration)
- return d
-}
-
-// TakeMaxDuration is like Take, except that
-// it will only take tokens from the bucket if the wait
-// time for the tokens is no greater than maxWait.
-//
-// If it would take longer than maxWait for the tokens
-// to become available, it does nothing and reports false,
-// otherwise it returns the time that the caller should
-// wait until the tokens are actually available, and reports
-// true.
-func (tb *Bucket) TakeMaxDuration(count int64, maxWait time.Duration) (time.Duration, bool) {
- return tb.take(time.Now(), count, maxWait)
-}
-
-// TakeAvailable takes up to count immediately available tokens from the
-// bucket. It returns the number of tokens removed, or zero if there are
-// no available tokens. It does not block.
-func (tb *Bucket) TakeAvailable(count int64) int64 {
- return tb.takeAvailable(time.Now(), count)
-}
-
-// takeAvailable is the internal version of TakeAvailable - it takes the
-// current time as an argument to enable easy testing.
-func (tb *Bucket) takeAvailable(now time.Time, count int64) int64 {
- if count <= 0 {
- return 0
- }
- tb.mu.Lock()
- defer tb.mu.Unlock()
-
- tb.adjust(now)
- if tb.avail <= 0 {
- return 0
- }
- if count > tb.avail {
- count = tb.avail
- }
- tb.avail -= count
- return count
-}
-
-// Available returns the number of available tokens. It will be negative
-// when there are consumers waiting for tokens. Note that if this
-// returns greater than zero, it does not guarantee that calls that take
-// tokens from the buffer will succeed, as the number of available
-// tokens could have changed in the meantime. This method is intended
-// primarily for metrics reporting and debugging.
-func (tb *Bucket) Available() int64 {
- return tb.available(time.Now())
-}
-
-// available is the internal version of available - it takes the current time as
-// an argument to enable easy testing.
-func (tb *Bucket) available(now time.Time) int64 {
- tb.mu.Lock()
- defer tb.mu.Unlock()
- tb.adjust(now)
- return tb.avail
-}
-
-// Capacity returns the capacity that the bucket was created with.
-func (tb *Bucket) Capacity() int64 {
- return tb.capacity
-}
-
-// Rate returns the fill rate of the bucket, in tokens per second.
-func (tb *Bucket) Rate() float64 {
- return 1e9 * float64(tb.quantum) / float64(tb.fillInterval)
-}
-
-// take is the internal version of Take - it takes the current time as
-// an argument to enable easy testing.
-func (tb *Bucket) take(now time.Time, count int64, maxWait time.Duration) (time.Duration, bool) {
- if count <= 0 {
- return 0, true
- }
- tb.mu.Lock()
- defer tb.mu.Unlock()
-
- currentTick := tb.adjust(now)
- avail := tb.avail - count
- if avail >= 0 {
- tb.avail = avail
- return 0, true
- }
- // Round up the missing tokens to the nearest multiple
- // of quantum - the tokens won't be available until
- // that tick.
- endTick := currentTick + (-avail+tb.quantum-1)/tb.quantum
- endTime := tb.startTime.Add(time.Duration(endTick) * tb.fillInterval)
- waitTime := endTime.Sub(now)
- if waitTime > maxWait {
- return 0, false
- }
- tb.avail = avail
- return waitTime, true
-}
-
-// adjust adjusts the current bucket capacity based on the current time.
-// It returns the current tick.
-func (tb *Bucket) adjust(now time.Time) (currentTick int64) {
- currentTick = int64(now.Sub(tb.startTime) / tb.fillInterval)
-
- if tb.avail >= tb.capacity {
- return
- }
- tb.avail += (currentTick - tb.availTick) * tb.quantum
- if tb.avail > tb.capacity {
- tb.avail = tb.capacity
- }
- tb.availTick = currentTick
- return
-}
diff --git a/vendor/github.com/didip/tollbooth/vendor/github.com/juju/ratelimit/reader.go b/vendor/github.com/didip/tollbooth/vendor/github.com/juju/ratelimit/reader.go
deleted file mode 100644
index 6403bf7..0000000
--- a/vendor/github.com/didip/tollbooth/vendor/github.com/juju/ratelimit/reader.go
+++ /dev/null
@@ -1,51 +0,0 @@
-// Copyright 2014 Canonical Ltd.
-// Licensed under the LGPLv3 with static-linking exception.
-// See LICENCE file for details.
-
-package ratelimit
-
-import "io"
-
-type reader struct {
- r io.Reader
- bucket *Bucket
-}
-
-// Reader returns a reader that is rate limited by
-// the given token bucket. Each token in the bucket
-// represents one byte.
-func Reader(r io.Reader, bucket *Bucket) io.Reader {
- return &reader{
- r: r,
- bucket: bucket,
- }
-}
-
-func (r *reader) Read(buf []byte) (int, error) {
- n, err := r.r.Read(buf)
- if n <= 0 {
- return n, err
- }
- r.bucket.Wait(int64(n))
- return n, err
-}
-
-type writer struct {
- w io.Writer
- bucket *Bucket
-}
-
-// Writer returns a reader that is rate limited by
-// the given token bucket. Each token in the bucket
-// represents one byte.
-func Writer(w io.Writer, bucket *Bucket) io.Writer {
- return &writer{
- w: w,
- bucket: bucket,
- }
-}
-
-func (w *writer) Write(buf []byte) (int, error) {
- w.bucket.Wait(int64(len(buf)))
- return w.w.Write(buf)
-}
diff --git a/vendor/github.com/didip/tollbooth/vendor/vendor.json b/vendor/github.com/didip/tollbooth/vendor/vendor.json
deleted file mode 100644
index e4dbff8..0000000
--- a/vendor/github.com/didip/tollbooth/vendor/vendor.json
+++ /dev/null
@@ -1,13 +0,0 @@
-{
- "comment": "",
- "ignore": "test",
- "package": [
- {
- "checksumSHA1": "sKheT5xw89Tbu2Q071FQO27CVmE=",
- "path": "github.com/juju/ratelimit",
- "revision": "77ed1c8a01217656d2080ad51981f6e99adaa177",
- "revisionTime": "2015-11-25T20:19:25Z"
- }
- ],
- "rootPath": "github.com/didip/tollbooth"
-}
--
To stop receiving notification emails like this one, please contact
['"commits@servicecomb.apache.org" <co...@servicecomb.apache.org>'].