v_exchanges_api_generics 0.20.0

A client for HTTP/HTTPS/WebSocket APIs.
Documentation
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
//! A rate limiter implementation heavily inspired by [governor](https://github.com/antifuchs/governor).
//!
//! The governor does not support different quota for different key. It is an open [issue](https://github.com/antifuchs/governor/issues/193).
pub mod clock;
mod gcra;
mod nanos;
pub mod quota;

use std::{
	fmt::Debug,
	hash::Hash,
	num::NonZeroU64,
	sync::atomic::{AtomicU64, Ordering},
	time::Duration,
};

use dashmap::DashMap;
use futures_util::StreamExt;

use self::{
	clock::{Clock, FakeRelativeClock, MonotonicClock},
	gcra::{Gcra, NotUntil},
	nanos::Nanos,
	quota::Quota,
};

/// A concurrent, thread-safe and fairly performant hashmap based on [`DashMap`].
pub type DashMapStateStore<K> = DashMap<K, InMemoryState>;
/// A way for rate limiters to keep state.
///
/// There are two important kinds of state stores: Direct and keyed. The direct kind have only
/// one state, and are useful for "global" rate limit enforcement (e.g. a process should never
/// do more than N tasks a day). The keyed kind allows one rate limit per key (e.g. an API
/// call budget per client API key).
///
/// A direct state store is expressed as [`StateStore::Key`] = `NotKeyed`.
/// Keyed state stores have a
/// type parameter for the key and set their key to that.
pub trait StateStore {
	/// The type of key that the state store can represent.
	type Key;

	/// Updates a state store's rate limiting state for a given key, using the given closure.
	///
	/// The closure parameter takes the old value (`None` if this is the first measurement) of the
	/// state store at the key's location, checks if the request an be accommodated and:
	///
	/// - If the request is rate-limited, returns `Err(E)`.
	/// - If the request can make it through, returns `Ok(T)` (an arbitrary positive return
	///   value) and the updated state.
	///
	/// It is `measure_and_replace`'s job then to safely replace the value at the key - it must
	/// only update the value if the value hasn't changed. The implementations in this
	/// crate use `AtomicU64` operations for this.
	///
	/// # Errors
	///
	/// Returns `Err(E)` if the closure returns an error or the request is rate-limited.
	fn measure_and_replace<T, F, E>(&self, key: &Self::Key, f: F) -> Result<T, E>
	where
		F: Fn(Option<Nanos>) -> Result<(T, Nanos), E>;
}
/// An in-memory representation of a GCRA's rate-limiting state.
///
/// Implemented using [`AtomicU64`] operations, this state representation can be used to
/// construct rate limiting states for other in-memory states: e.g., this crate uses
/// `InMemoryState` as the states it tracks in the keyed rate limiters it implements.
///
/// Internally, the number tracked here is the theoretical arrival time (a GCRA term) in number of
/// nanoseconds since the rate limiter was created.
#[derive(Debug, Default)]
pub struct InMemoryState(AtomicU64);

impl InMemoryState {
	/// Measures and updates the GCRA's state atomically, retrying on concurrent modifications.
	///
	/// # Errors
	///
	/// Returns an error if the provided closure returns an error.
	pub(crate) fn measure_and_replace_one<T, F, E>(&self, mut f: F) -> Result<T, E>
	where
		F: FnMut(Option<Nanos>) -> Result<(T, Nanos), E>, {
		let mut prev = self.0.load(Ordering::Acquire);
		let mut decision = f(NonZeroU64::new(prev).map(|n| n.get().into()));
		while let Ok((result, new_data)) = decision {
			// Lock-free CAS loop: retry with current value if another thread modified it,
			// uses weak variant (faster) since spurious failures are fine in a retry loop.
			match self.0.compare_exchange_weak(prev, new_data.into(), Ordering::Release, Ordering::Relaxed) {
				Ok(_) => return Ok(result),
				Err(e) => prev = e, // Retry with value written by another thread
			}
			decision = f(NonZeroU64::new(prev).map(|n| n.get().into()));
		}
		// This map shouldn't be needed, as we only get here in the error case, but the compiler
		// can't see it.
		decision.map(|(result, _)| result)
	}
}

impl<K: Hash + Eq + Clone> StateStore for DashMapStateStore<K> {
	type Key = K;

	fn measure_and_replace<T, F, E>(&self, key: &Self::Key, f: F) -> Result<T, E>
	where
		F: Fn(Option<Nanos>) -> Result<(T, Nanos), E>, {
		if let Some(v) = self.get(key) {
			// fast path: measure existing entry
			return v.measure_and_replace_one(f);
		}
		// make an entry and measure that:
		let entry = self.entry(key.clone()).or_default();
		(*entry).measure_and_replace_one(f)
	}
}

/// A rate limiter that enforces different quotas per key using the GCRA algorithm.
///
/// This implementation allows setting different rate limits for different keys,
/// with an optional default quota for keys that don't have specific quotas.
pub struct RateLimiter<K, C>
where
	C: Clock, {
	default_gcra: Option<Gcra>,
	state: DashMapStateStore<K>,
	gcra: DashMap<K, Gcra>,
	clock: C,
	start: C::Instant,
}
impl<K> RateLimiter<K, MonotonicClock>
where
	K: Eq + Hash,
{
	/// Creates a new rate limiter with a base quota and keyed quotas.
	///
	/// The base quota applies to all keys that don't have specific quotas.
	/// Keyed quotas override the base quota for specific keys.
	#[must_use]
	pub fn new_with_quota(base_quota: Option<Quota>, keyed_quotas: Vec<(K, Quota)>) -> Self {
		let clock = MonotonicClock {};
		let start = MonotonicClock::now(&clock);
		let gcra: DashMap<_, _> = keyed_quotas.into_iter().map(|(k, q)| (k, Gcra::new(q))).collect();
		Self {
			default_gcra: base_quota.map(Gcra::new),
			state: DashMapStateStore::default(),
			gcra,
			clock,
			start,
		}
	}
}
impl<K> RateLimiter<K, FakeRelativeClock>
where
	K: Hash + Eq + Clone,
{
	/// Advances the fake clock by the specified duration.
	///
	/// This is only available for testing with `FakeRelativeClock`.
	pub fn advance_clock(&self, by: Duration) {
		self.clock.advance(by);
	}
}
impl<K, C> RateLimiter<K, C>
where
	K: Hash + Eq + Clone,
	C: Clock,
{
	/// Adds or updates a quota for a specific key.
	pub fn add_quota_for_key(&self, key: K, value: Quota) {
		self.gcra.insert(key, Gcra::new(value));
	}

	/// Checks if the given key is allowed under the rate limit.
	///
	/// # Errors
	///
	/// Returns `Err(NotUntil)` if the key is rate-limited, indicating when it will be allowed.
	pub fn check_key(&self, key: &K) -> Result<(), NotUntil<C::Instant>> {
		match self.gcra.get(key) {
			Some(quota) => quota.test_and_update(self.start, key, &self.state, self.clock.now()),
			None => self
				.default_gcra
				.as_ref()
				.map_or(Ok(()), |gcra| gcra.test_and_update(self.start, key, &self.state, self.clock.now())),
		}
	}

	/// Waits until the specified key is ready (not rate-limited).
	pub async fn until_key_ready(&self, key: &K) {
		loop {
			match self.check_key(key) {
				Ok(()) => {
					break;
				}
				Err(e) => {
					tokio::time::sleep(e.wait_time_from(self.clock.now())).await;
				}
			}
		}
	}

	/// Waits until all specified keys are ready (not rate-limited).
	///
	/// If no keys are provided, this function returns immediately.
	pub async fn await_keys_ready(&self, keys: Option<Vec<K>>) {
		let keys = keys.unwrap_or_default();
		let tasks = keys.iter().map(|key| self.until_key_ready(key));

		futures_util::stream::iter(tasks)
			.for_each_concurrent(None, |key_future| async move {
				key_future.await;
			})
			.await;
	}

	/// Checks if the given key is allowed under the rate limit, consuming n weight units.
	///
	/// # Errors
	///
	/// Returns `Err(NotUntil)` if the key is rate-limited, indicating when it will be allowed.
	pub fn check_key_n(&self, key: &K, n: u32) -> Result<(), NotUntil<C::Instant>> {
		match self.gcra.get(key) {
			Some(quota) => quota.test_and_update_n(self.start, key, &self.state, self.clock.now(), n),
			None => self
				.default_gcra
				.as_ref()
				.map_or(Ok(()), |gcra| gcra.test_and_update_n(self.start, key, &self.state, self.clock.now(), n)),
		}
	}

	/// Waits until the specified key is ready for n weight units (not rate-limited).
	pub async fn until_key_ready_n(&self, key: &K, n: u32) {
		loop {
			match self.check_key_n(key, n) {
				Ok(()) => break,
				Err(e) => tokio::time::sleep(e.wait_time_from(self.clock.now())).await,
			}
		}
	}

	/// Waits concurrently until all specified (key, weight) pairs are ready.
	///
	/// If no keys are provided, this function returns immediately.
	pub async fn await_keys_ready_n(&self, keys: Vec<(K, u32)>) {
		futures_util::stream::iter(keys.iter().map(|(key, n)| self.until_key_ready_n(key, *n)))
			.for_each_concurrent(None, |f| f)
			.await;
	}
}

impl<K, C> Debug for RateLimiter<K, C>
where
	K: Debug,
	C: Clock,
{
	fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
		f.debug_struct(stringify!(RateLimiter)).finish()
	}
}

#[cfg(test)]
mod tests {
	use std::{num::NonZeroU32, time::Duration};

	use dashmap::DashMap;
	use rstest::rstest;

	use super::{
		DashMapStateStore, RateLimiter,
		clock::{Clock, FakeRelativeClock},
		gcra::Gcra,
		quota::Quota,
	};

	fn initialize_mock_rate_limiter() -> RateLimiter<String, FakeRelativeClock> {
		let clock = FakeRelativeClock::default();
		let start = clock.now();
		let gcra = DashMap::default();
		let base_quota = Quota::per_second(NonZeroU32::new(2).unwrap());
		RateLimiter {
			default_gcra: Some(Gcra::new(base_quota)),
			state: DashMapStateStore::default(),
			gcra,
			clock,
			start,
		}
	}

	#[rstest]
	fn test_default_quota() {
		let mock_limiter = initialize_mock_rate_limiter();

		// Check base quota is not exceeded
		assert!(mock_limiter.check_key(&"default".to_string()).is_ok());
		assert!(mock_limiter.check_key(&"default".to_string()).is_ok());

		// Check base quota is exceeded
		assert!(mock_limiter.check_key(&"default".to_string()).is_err());

		// Increment clock and check base quota is reset
		mock_limiter.advance_clock(Duration::from_secs(1));
		assert!(mock_limiter.check_key(&"default".to_string()).is_ok());
	}

	#[rstest]
	fn test_custom_key_quota() {
		let mock_limiter = initialize_mock_rate_limiter();

		// Add new key quota pair
		mock_limiter.add_quota_for_key("custom".to_string(), Quota::per_second(NonZeroU32::new(1).unwrap()));

		// Check custom quota
		assert!(mock_limiter.check_key(&"custom".to_string()).is_ok());
		assert!(mock_limiter.check_key(&"custom".to_string()).is_err());

		// Check that default quota still applies to other keys
		assert!(mock_limiter.check_key(&"default".to_string()).is_ok());
		assert!(mock_limiter.check_key(&"default".to_string()).is_ok());
		assert!(mock_limiter.check_key(&"default".to_string()).is_err());
	}

	#[rstest]
	fn test_multiple_keys() {
		let mock_limiter = initialize_mock_rate_limiter();

		mock_limiter.add_quota_for_key("key1".to_string(), Quota::per_second(NonZeroU32::new(1).unwrap()));
		mock_limiter.add_quota_for_key("key2".to_string(), Quota::per_second(NonZeroU32::new(3).unwrap()));

		// Test key1
		assert!(mock_limiter.check_key(&"key1".to_string()).is_ok());
		assert!(mock_limiter.check_key(&"key1".to_string()).is_err());

		// Test key2
		assert!(mock_limiter.check_key(&"key2".to_string()).is_ok());
		assert!(mock_limiter.check_key(&"key2".to_string()).is_ok());
		assert!(mock_limiter.check_key(&"key2".to_string()).is_ok());
		assert!(mock_limiter.check_key(&"key2".to_string()).is_err());
	}

	#[rstest]
	fn test_quota_reset() {
		let mock_limiter = initialize_mock_rate_limiter();

		// Exhaust quota
		assert!(mock_limiter.check_key(&"reset".to_string()).is_ok());
		assert!(mock_limiter.check_key(&"reset".to_string()).is_ok());
		assert!(mock_limiter.check_key(&"reset".to_string()).is_err());

		// Advance clock by less than a second
		mock_limiter.advance_clock(Duration::from_millis(499));
		assert!(mock_limiter.check_key(&"reset".to_string()).is_err());

		// Advance clock to reset
		mock_limiter.advance_clock(Duration::from_millis(501));
		assert!(mock_limiter.check_key(&"reset".to_string()).is_ok());
	}

	#[rstest]
	fn test_different_quotas() {
		let mock_limiter = initialize_mock_rate_limiter();

		mock_limiter.add_quota_for_key("per_second".to_string(), Quota::per_second(NonZeroU32::new(2).unwrap()));
		mock_limiter.add_quota_for_key("per_minute".to_string(), Quota::per_minute(NonZeroU32::new(3).unwrap()));

		// Test per_second quota
		assert!(mock_limiter.check_key(&"per_second".to_string()).is_ok());
		assert!(mock_limiter.check_key(&"per_second".to_string()).is_ok());
		assert!(mock_limiter.check_key(&"per_second".to_string()).is_err());

		// Test per_minute quota
		assert!(mock_limiter.check_key(&"per_minute".to_string()).is_ok());
		assert!(mock_limiter.check_key(&"per_minute".to_string()).is_ok());
		assert!(mock_limiter.check_key(&"per_minute".to_string()).is_ok());
		assert!(mock_limiter.check_key(&"per_minute".to_string()).is_err());

		// Advance clock and check reset
		mock_limiter.advance_clock(Duration::from_secs(1));
		assert!(mock_limiter.check_key(&"per_second".to_string()).is_ok());
		assert!(mock_limiter.check_key(&"per_minute".to_string()).is_err());
	}

	#[tokio::test]
	async fn test_await_keys_ready() {
		let mock_limiter = initialize_mock_rate_limiter();

		// Check base quota is not exceeded
		assert!(mock_limiter.check_key(&"default".to_string()).is_ok());
		assert!(mock_limiter.check_key(&"default".to_string()).is_ok());

		// Check base quota is exceeded
		assert!(mock_limiter.check_key(&"default".to_string()).is_err());

		// Wait keys to be ready and check base quota is reset
		mock_limiter.advance_clock(Duration::from_secs(1));
		mock_limiter.await_keys_ready(Some(vec!["default".to_string()])).await;
		assert!(mock_limiter.check_key(&"default".to_string()).is_ok());
	}

	#[rstest]
	fn test_gcra_boundary_exact_replenishment() {
		// Test GCRA boundary condition where t0 equals earliest_time exactly.
		// This exercises the saturating_sub edge case deterministically without sleeps.
		let mock_limiter = initialize_mock_rate_limiter();
		let key = "boundary_test".to_string();

		// Consume entire burst capacity (2 requests)
		assert!(mock_limiter.check_key(&key).is_ok());
		assert!(mock_limiter.check_key(&key).is_ok());

		// Next request should be rate-limited
		assert!(mock_limiter.check_key(&key).is_err());

		// Advance clock by exactly one replenish interval (500ms for 2 req/sec)
		let quota = Quota::per_second(NonZeroU32::new(2).unwrap());
		let replenish_interval = quota.replenish_interval();
		mock_limiter.advance_clock(replenish_interval);

		// At the exact boundary (t0 == earliest_time), request should be allowed
		assert!(mock_limiter.check_key(&key).is_ok(), "Request at exact replenish boundary should be allowed");

		// But the next immediate request should be denied (burst exhausted again)
		assert!(mock_limiter.check_key(&key).is_err(), "Immediate follow-up should be rate-limited");
	}
}