throttlecrab-server 0.4.37

A high-performance rate limiting server with multiple protocol support
Documentation
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
//! Simple metrics collection for observability
//!
//! This module provides lightweight metrics collection using atomic counters.
//! Designed for minimal overhead and zero allocations in the hot path.

use std::collections::HashMap;
use std::sync::Mutex;
use std::sync::atomic::{AtomicU64, Ordering};
use std::time::Instant;

/// Maximum length allowed for rate limit keys
const MAX_KEY_LENGTH: usize = 256;

/// Maximum number of denied keys that can be tracked
/// This prevents excessive memory usage (at 10k keys with 3x growth factor,
/// we could have up to 30k entries temporarily)
const MAX_DENIED_KEYS_LIMIT: usize = 10_000;

/// Tracks top N denied keys using HashMap for counts
///
/// Uses a grow-then-cleanup strategy where the HashMap can grow to 3x the
/// configured max_size before triggering cleanup. This amortizes the cost
/// of sorting operations.
pub(crate) struct TopDeniedKeys {
    counts: HashMap<String, u64>,
    max_size: usize,
}

impl TopDeniedKeys {
    fn new(max_size: usize) -> Self {
        Self {
            counts: HashMap::with_capacity(max_size * 2),
            max_size,
        }
    }

    fn update(&mut self, key: String) {
        // Validate key length to prevent memory exhaustion
        if key.len() > MAX_KEY_LENGTH {
            return;
        }

        // Update count
        *self.counts.entry(key).or_insert(0) += 1;

        // Periodically clean up if we have too many entries
        if self.counts.len() > self.max_size * 3 {
            self.cleanup();
        }
    }

    fn cleanup(&mut self) {
        if self.counts.len() <= self.max_size {
            return;
        }

        // Get all entries and sort by count
        let mut entries: Vec<_> = self.counts.drain().collect();
        entries.sort_by_key(|e| std::cmp::Reverse(e.1));

        // Keep only top max_size entries
        entries.truncate(self.max_size);
        self.counts = entries.into_iter().collect();
    }

    fn get_top(&self) -> Vec<(String, u64)> {
        let mut entries: Vec<_> = self.counts.iter().map(|(k, v)| (k.clone(), *v)).collect();

        // Sort by count descending
        entries.sort_by_key(|e| std::cmp::Reverse(e.1));

        // Take only top N
        entries.truncate(self.max_size);
        entries
    }
}

/// Core metrics collected by the server
pub struct Metrics {
    /// Server start time
    start_time: Instant,

    /// Total requests received
    pub total_requests: AtomicU64,

    /// Requests by transport
    pub http_requests: AtomicU64,
    pub grpc_requests: AtomicU64,
    pub redis_requests: AtomicU64,

    /// Rate limiting decisions
    pub requests_allowed: AtomicU64,
    pub requests_denied: AtomicU64,
    pub requests_errors: AtomicU64,

    /// Top denied keys tracking (None if disabled)
    pub(crate) top_denied_keys: Option<Mutex<TopDeniedKeys>>,
}

/// Builder for configuring Metrics
pub struct MetricsBuilder {
    max_denied_keys: usize,
}

impl MetricsBuilder {
    /// Create a new builder with default settings
    pub fn new() -> Self {
        Self {
            max_denied_keys: 100,
        }
    }

    /// Set the maximum number of denied keys to track
    ///
    /// Note: Set to 0 to disable denied keys tracking entirely (best performance).
    /// Non-zero values will be capped at 10,000 to prevent excessive memory usage.
    /// The actual memory usage can be up to 3x this value temporarily due to the
    /// grow-then-cleanup strategy used for performance.
    pub fn max_denied_keys(mut self, count: usize) -> Self {
        self.max_denied_keys = count.clamp(0, MAX_DENIED_KEYS_LIMIT);
        self
    }

    /// Build the Metrics instance
    pub fn build(self) -> Metrics {
        Metrics {
            start_time: Instant::now(),
            total_requests: AtomicU64::new(0),
            http_requests: AtomicU64::new(0),
            grpc_requests: AtomicU64::new(0),
            redis_requests: AtomicU64::new(0),
            requests_allowed: AtomicU64::new(0),
            requests_denied: AtomicU64::new(0),
            requests_errors: AtomicU64::new(0),
            top_denied_keys: if self.max_denied_keys == 0 {
                None
            } else {
                Some(Mutex::new(TopDeniedKeys::new(self.max_denied_keys)))
            },
        }
    }
}

impl Default for MetricsBuilder {
    fn default() -> Self {
        Self::new()
    }
}

impl Metrics {
    /// Create a builder for configuring metrics
    pub fn builder() -> MetricsBuilder {
        MetricsBuilder::new()
    }

    /// Create a new metrics instance with default settings
    pub fn new() -> Self {
        MetricsBuilder::new().build()
    }

    /// Record a request with key information
    pub fn record_request_with_key(&self, transport: Transport, allowed: bool, key: &str) {
        // Update all the metrics that don't need the key
        self.record_request(transport, allowed);

        // Update top denied keys if request was denied and tracking is enabled
        if !allowed
            && let Some(ref top_denied_keys) = self.top_denied_keys
            && let Ok(mut top_keys) = top_denied_keys.lock()
        {
            top_keys.update(key.to_string());
        }
    }

    /// Record a request
    pub fn record_request(&self, transport: Transport, allowed: bool) {
        self.total_requests.fetch_add(1, Ordering::Relaxed);

        // Record transport-specific counter
        match transport {
            Transport::Http => self.http_requests.fetch_add(1, Ordering::Relaxed),
            Transport::Grpc => self.grpc_requests.fetch_add(1, Ordering::Relaxed),
            Transport::Redis => self.redis_requests.fetch_add(1, Ordering::Relaxed),
        };

        // Record allow/deny decision
        if allowed {
            self.requests_allowed.fetch_add(1, Ordering::Relaxed);
        } else {
            self.requests_denied.fetch_add(1, Ordering::Relaxed);
        }
    }

    /// Record an internal error
    pub fn record_error(&self, transport: Transport) {
        self.total_requests.fetch_add(1, Ordering::Relaxed);
        self.requests_errors.fetch_add(1, Ordering::Relaxed);

        // Record transport-specific counter
        match transport {
            Transport::Http => self.http_requests.fetch_add(1, Ordering::Relaxed),
            Transport::Grpc => self.grpc_requests.fetch_add(1, Ordering::Relaxed),
            Transport::Redis => self.redis_requests.fetch_add(1, Ordering::Relaxed),
        };
    }

    /// Get server uptime in seconds
    pub fn uptime_seconds(&self) -> u64 {
        self.start_time.elapsed().as_secs()
    }

    /// Escape a string for use as a Prometheus label value
    fn escape_prometheus_label(s: &str) -> String {
        let mut result = String::with_capacity(s.len() * 2);
        for ch in s.chars() {
            match ch {
                '"' => result.push_str("\\\""),
                '\\' => result.push_str("\\\\"),
                '\n' => result.push_str("\\n"),
                '\r' => result.push_str("\\r"),
                '\t' => result.push_str("\\t"),
                // Control characters
                c if c.is_control() => {
                    result.push_str(&format!("\\x{:02x}", c as u8));
                }
                c => result.push(c),
            }
        }
        result
    }

    /// Export metrics in Prometheus text format
    pub fn export_prometheus(&self) -> String {
        // Estimate size: ~50 chars per metric line, ~7 metrics = ~350 chars
        let mut output = String::with_capacity(500);

        // Add header
        output.push_str("# HELP throttlecrab_uptime_seconds Time since server start in seconds\n");
        output.push_str("# TYPE throttlecrab_uptime_seconds gauge\n");
        output.push_str(&format!(
            "throttlecrab_uptime_seconds {}\n\n",
            self.uptime_seconds()
        ));

        // Total requests
        output.push_str("# HELP throttlecrab_requests_total Total number of requests processed\n");
        output.push_str("# TYPE throttlecrab_requests_total counter\n");
        output.push_str(&format!(
            "throttlecrab_requests_total {}\n\n",
            self.total_requests.load(Ordering::Relaxed)
        ));

        // Requests by transport
        output.push_str(
            "# HELP throttlecrab_requests_by_transport Total requests by transport type\n",
        );
        output.push_str("# TYPE throttlecrab_requests_by_transport counter\n");
        output.push_str(&format!(
            "throttlecrab_requests_by_transport{{transport=\"http\"}} {}\n",
            self.http_requests.load(Ordering::Relaxed)
        ));
        output.push_str(&format!(
            "throttlecrab_requests_by_transport{{transport=\"grpc\"}} {}\n",
            self.grpc_requests.load(Ordering::Relaxed)
        ));
        output.push_str(&format!(
            "throttlecrab_requests_by_transport{{transport=\"redis\"}} {}\n\n",
            self.redis_requests.load(Ordering::Relaxed)
        ));

        // Allow/Deny decisions
        output.push_str("# HELP throttlecrab_requests_allowed Total requests allowed\n");
        output.push_str("# TYPE throttlecrab_requests_allowed counter\n");
        output.push_str(&format!(
            "throttlecrab_requests_allowed {}\n\n",
            self.requests_allowed.load(Ordering::Relaxed)
        ));

        output.push_str("# HELP throttlecrab_requests_denied Total requests denied\n");
        output.push_str("# TYPE throttlecrab_requests_denied counter\n");
        output.push_str(&format!(
            "throttlecrab_requests_denied {}\n\n",
            self.requests_denied.load(Ordering::Relaxed)
        ));

        output.push_str("# HELP throttlecrab_requests_errors Total internal errors\n");
        output.push_str("# TYPE throttlecrab_requests_errors counter\n");
        output.push_str(&format!(
            "throttlecrab_requests_errors {}\n\n",
            self.requests_errors.load(Ordering::Relaxed)
        ));

        // Top denied keys (only if tracking is enabled)
        if let Some(ref top_denied_keys) = self.top_denied_keys {
            output.push_str("# HELP throttlecrab_top_denied_keys Top keys by denial count\n");
            output.push_str("# TYPE throttlecrab_top_denied_keys gauge\n");
            if let Ok(top_keys) = top_denied_keys.lock() {
                for (rank, (key, count)) in top_keys.get_top().iter().enumerate() {
                    output.push_str(&format!(
                        "throttlecrab_top_denied_keys{{key=\"{}\",rank=\"{}\"}} {}\n",
                        Self::escape_prometheus_label(key),
                        rank + 1,
                        count
                    ));
                }
            }
        }

        output
    }
}

/// Transport type for metrics tracking
#[derive(Debug, Clone, Copy)]
pub enum Transport {
    Http,
    Grpc,
    Redis,
}

impl Default for Metrics {
    fn default() -> Self {
        Self::new()
    }
}

#[cfg(test)]
mod tests {
    use super::*;
    use std::sync::atomic::Ordering;

    #[test]
    fn test_metrics_creation() {
        let metrics = Metrics::new();
        assert_eq!(metrics.total_requests.load(Ordering::Relaxed), 0);
        assert_eq!(metrics.requests_allowed.load(Ordering::Relaxed), 0);
        assert_eq!(metrics.requests_denied.load(Ordering::Relaxed), 0);
        assert_eq!(metrics.requests_errors.load(Ordering::Relaxed), 0);
    }

    #[test]
    fn test_record_request() {
        let metrics = Metrics::new();

        // Record an allowed HTTP request
        metrics.record_request(Transport::Http, true);

        assert_eq!(metrics.total_requests.load(Ordering::Relaxed), 1);
        assert_eq!(metrics.http_requests.load(Ordering::Relaxed), 1);
        assert_eq!(metrics.requests_allowed.load(Ordering::Relaxed), 1);
        assert_eq!(metrics.requests_denied.load(Ordering::Relaxed), 0);

        // Record a denied gRPC request
        metrics.record_request(Transport::Grpc, false);

        assert_eq!(metrics.total_requests.load(Ordering::Relaxed), 2);
        assert_eq!(metrics.grpc_requests.load(Ordering::Relaxed), 1);
        assert_eq!(metrics.http_requests.load(Ordering::Relaxed), 1);
        assert_eq!(metrics.requests_allowed.load(Ordering::Relaxed), 1);
        assert_eq!(metrics.requests_denied.load(Ordering::Relaxed), 1);
    }

    #[test]
    fn test_prometheus_export() {
        let metrics = Metrics::new();

        // Add some test data
        metrics.record_request(Transport::Http, true);
        metrics.record_request(Transport::Grpc, false);

        let output = metrics.export_prometheus();

        // Check that output contains expected metrics
        assert!(output.contains("throttlecrab_uptime_seconds"));
        assert!(output.contains("throttlecrab_requests_total 2"));
        assert!(output.contains("throttlecrab_requests_allowed 1"));
        assert!(output.contains("throttlecrab_requests_denied 1"));
        assert!(output.contains("throttlecrab_requests_by_transport{transport=\"http\"} 1"));
        assert!(output.contains("throttlecrab_requests_by_transport{transport=\"grpc\"} 1"));
    }

    #[test]
    fn test_counter_consistency() {
        let metrics = Metrics::new();

        // Record various requests
        metrics.record_request(Transport::Http, true); // allowed
        metrics.record_request(Transport::Http, false); // denied
        metrics.record_request(Transport::Grpc, true); // allowed
        metrics.record_request(Transport::Grpc, false); // denied
        metrics.record_error(Transport::Http); // error

        // Verify total requests
        assert_eq!(metrics.total_requests.load(Ordering::Relaxed), 5);

        // Verify transport counters sum to total
        let transport_sum = metrics.http_requests.load(Ordering::Relaxed)
            + metrics.grpc_requests.load(Ordering::Relaxed);
        assert_eq!(transport_sum, 5);

        // Verify allowed + denied + errors = total
        let decision_sum = metrics.requests_allowed.load(Ordering::Relaxed)
            + metrics.requests_denied.load(Ordering::Relaxed)
            + metrics.requests_errors.load(Ordering::Relaxed);
        assert_eq!(decision_sum, 5);

        // Verify specific counts
        assert_eq!(metrics.requests_allowed.load(Ordering::Relaxed), 2);
        assert_eq!(metrics.requests_denied.load(Ordering::Relaxed), 2);
        assert_eq!(metrics.requests_errors.load(Ordering::Relaxed), 1);
    }
}