2
0
Files
logikonline 12f4ea03a8
Some checks failed
Build and Release / Create Release (push) Successful in 0s
Trigger Vault Plugin Rebuild / Trigger Vault Rebuild (push) Successful in 0s
Build and Release / Integration Tests (PostgreSQL) (push) Successful in 2m48s
Build and Release / Lint (push) Failing after 5m2s
Build and Release / Build Binaries (amd64, windows, windows-latest) (push) Has been skipped
Build and Release / Build Binaries (amd64, darwin, linux-latest) (push) Has been skipped
Build and Release / Build Binaries (amd64, linux, linux-latest) (push) Has been skipped
Build and Release / Build Binaries (arm64, darwin, linux-latest) (push) Has been skipped
Build and Release / Build Binaries (arm64, linux, linux-latest) (push) Has been skipped
Build and Release / Unit Tests (push) Successful in 5m37s
refactor: add /v3 suffix to module path for proper Go semver
Go's semantic import versioning requires v2+ modules to include the
major version in the module path. This enables using proper version
tags (v3.x.x) instead of pseudo-versions.

Updated module path: code.gitcaddy.com/server/v3
2026-01-17 17:53:59 -05:00

53 lines
1.6 KiB
Go

// Copyright 2026 MarketAlly. All rights reserved.
// SPDX-License-Identifier: MIT
package middleware
import (
"net/http"
"strconv"
"time"
"code.gitcaddy.com/server/v3/modules/setting"
)
// RateLimitHeaders is the header names for rate limit information
const (
RateLimitHeader = "X-RateLimit-Limit"
RateLimitRemainingHeader = "X-RateLimit-Remaining"
RateLimitResetHeader = "X-RateLimit-Reset"
)
// RateLimitInfo returns a middleware that sets rate limit headers.
// This is currently informational only - actual rate limiting enforcement
// can be added in the future based on the RateLimitEnabled setting.
func RateLimitInfo() func(http.Handler) http.Handler {
return func(next http.Handler) http.Handler {
return http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
// Set informational rate limit headers
// These tell clients what to expect even if enforcement isn't active
limit := setting.API.RateLimitPerHour
// Calculate reset time (next hour boundary)
now := time.Now()
resetTime := now.Truncate(time.Hour).Add(time.Hour)
w.Header().Set(RateLimitHeader, strconv.Itoa(limit))
// When rate limiting is not enforced, remaining equals limit
// Future: implement actual tracking per user/IP
remaining := limit
if setting.API.RateLimitEnabled {
// TODO: Implement actual rate limit tracking
// For now, just show full quota when enabled
remaining = limit
}
w.Header().Set(RateLimitRemainingHeader, strconv.Itoa(remaining))
w.Header().Set(RateLimitResetHeader, strconv.FormatInt(resetTime.Unix(), 10))
next.ServeHTTP(w, req)
})
}
}