discord 0.8.1

Client library for the Discord API
use std::sync::Mutex;
use std::collections::BTreeMap;
use std;

use hyper;
use time::get_time;

use {Result, Error};

#[derive(Default)]
pub struct RateLimits {
	global: Mutex<RateLimit>,
	endpoints: Mutex<BTreeMap<String, RateLimit>>,
}

impl RateLimits {
	/// Check before issuing a request for the given URL.
	pub fn pre_check(&self, url: &str) {
		self.global.lock().expect("Rate limits poisoned").pre_check();
		if let Some(rl) = self.endpoints.lock().expect("Rate limits poisoned").get_mut(url) {
			rl.pre_check();
		}
	}

	/// Update based on rate limit headers in the response for given URL.
	/// Returns `true` if the request was rate limited and should be retried.
	pub fn post_update(&self, url: &str, response: &hyper::client::Response) -> bool {
		if response.headers.get_raw("X-RateLimit-Global").is_some() {
			self.global.lock().expect("Rate limits poisoned").post_update(response)
		} else {
			self.endpoints.lock().expect("Rate limits poisoned")
				.entry(url.to_owned())
				.or_insert_with(RateLimit::default)
				.post_update(response)
		}
	}
}

#[derive(Default)]
struct RateLimit {
	reset: i64,
	limit: i64,
	remaining: i64,
}

impl RateLimit {
	fn pre_check(&mut self) {
		// break out if uninitialized
		if self.limit == 0 { return }

		let difference = self.reset - get_time().sec;
		if difference < 0 {
			// If reset is apparently in the past, optimistically assume that
			// the reset has occurred and we're good for the next three seconds
			// or so. When the response comes back we will know for real.
			self.reset += 3;
			self.remaining = self.limit;
			return
		}

		// if no requests remain, wait a bit
		if self.remaining <= 0 {
			// 900ms in case "difference" is off by 1
			let delay = difference as u64 * 1000 + 900;
			warn!("pre-ratelimit: sleeping for {}ms", delay);
			::sleep_ms(delay);
			return
		}

		// Deduct from our remaining requests. If a lot of requests are issued
		// before any responses are received, this will mean we can still limit
		// preemptively.
		self.remaining -= 1;
	}

	fn post_update(&mut self, response: &hyper::client::Response) -> bool {
		match self.try_post_update(response) {
			Err(e) => {
				error!("rate limit checking error: {}", e);
				false
			}
			Ok(r) => r
		}
	}

	fn try_post_update(&mut self, response: &hyper::client::Response) -> Result<bool> {
		if let Some(reset) = try!(read_header(&response.headers, "X-RateLimit-Reset")) {
			self.reset = reset;
		}
		if let Some(limit) = try!(read_header(&response.headers, "X-RateLimit-Limit")) {
			self.limit = limit;
		}
		if let Some(remaining) = try!(read_header(&response.headers, "X-RateLimit-Remaining")) {
			self.remaining = remaining;
		}
		if response.status == hyper::status::StatusCode::TooManyRequests {
			if let Some(delay) = try!(read_header(&response.headers, "Retry-After")) {
				let delay = delay as u64 + 100; // 100ms of leeway
				warn!("429: sleeping for {}ms", delay);
				::sleep_ms(delay);
				return Ok(true); // retry the request
			}
		}
		Ok(false)
	}
}

fn read_header(headers: &hyper::header::Headers, name: &str) -> Result<Option<i64>> {
	match headers.get_raw(name) {
		Some(hdr) => if hdr.len() == 1 {
			match std::str::from_utf8(&hdr[0]) {
				Ok(text) => match text.parse() {
					Ok(val) => Ok(Some(val)),
					Err(_) => Err(Error::Other("header is not an i64"))
				},
				Err(_) => Err(Error::Other("header is not UTF-8"))
			}
		} else {
			Err(Error::Other("header appears multiple times"))
		},
		None => Ok(None)
	}
}