mirror of
https://github.com/labring/FastGPT.git
synced 2025-07-23 13:03:50 +00:00

* update: Add type * fix: update import statement for NextApiRequest type * fix: update imports to use type for LexicalEditor and EditorState * Refactor imports to use 'import type' for type-only imports across multiple files - Updated imports in various components and API files to use 'import type' for better clarity and to optimize TypeScript's type checking. - Ensured consistent usage of type imports in files related to chat, dataset, workflow, and user management. - Improved code readability and maintainability by distinguishing between value and type imports. * refactor: remove old ESLint configuration and add new rules - Deleted the old ESLint configuration file from the app project. - Added a new ESLint configuration file with updated rules and settings. - Changed imports to use type-only imports in various files for better clarity and performance. - Updated TypeScript configuration to remove unnecessary options. - Added an ESLint ignore file to exclude build and dependency directories from linting. * fix: update imports to use 'import type' for type-only imports in schema files
41 lines
1.1 KiB
TypeScript
41 lines
1.1 KiB
TypeScript
import { type ApiRequestProps } from '../../type/next';
|
|
import requestIp from 'request-ip';
|
|
import { authFrequencyLimit } from '../system/frequencyLimit/utils';
|
|
import { addSeconds } from 'date-fns';
|
|
import { type NextApiResponse } from 'next';
|
|
import { jsonRes } from '../response';
|
|
|
|
// unit: times/s
|
|
// how to use?
|
|
// export default NextAPI(useQPSLimit(10), handler); // limit 10 times per second for a ip
|
|
export function useIPFrequencyLimit({
|
|
id,
|
|
seconds,
|
|
limit,
|
|
force = false
|
|
}: {
|
|
id: string;
|
|
seconds: number;
|
|
limit: number;
|
|
force?: boolean;
|
|
}) {
|
|
return async (req: ApiRequestProps, res: NextApiResponse) => {
|
|
const ip = requestIp.getClientIp(req);
|
|
if (!ip || (process.env.USE_IP_LIMIT !== 'true' && !force)) {
|
|
return;
|
|
}
|
|
try {
|
|
await authFrequencyLimit({
|
|
eventId: `ip-qps-limit-${id}-` + ip,
|
|
maxAmount: limit,
|
|
expiredTime: addSeconds(new Date(), seconds)
|
|
});
|
|
} catch (_) {
|
|
jsonRes(res, {
|
|
code: 429,
|
|
error: `Too many request, request ${limit} times every ${seconds} seconds`
|
|
});
|
|
}
|
|
};
|
|
}
|