mirror of
https://github.com/redlib-org/redlib.git
synced 2025-04-03 04:57:38 +03:00
This commit is contained in:
parent
6be6f892a4
commit
100a7b65a6
3 changed files with 53 additions and 6 deletions
|
@ -19,6 +19,7 @@ use std::{io, result::Result};
|
||||||
use crate::dbg_msg;
|
use crate::dbg_msg;
|
||||||
use crate::oauth::{force_refresh_token, token_daemon, Oauth};
|
use crate::oauth::{force_refresh_token, token_daemon, Oauth};
|
||||||
use crate::server::RequestExt;
|
use crate::server::RequestExt;
|
||||||
|
use crate::subreddit::community;
|
||||||
use crate::utils::format_url;
|
use crate::utils::format_url;
|
||||||
|
|
||||||
const REDDIT_URL_BASE: &str = "https://oauth.reddit.com";
|
const REDDIT_URL_BASE: &str = "https://oauth.reddit.com";
|
||||||
|
@ -235,13 +236,11 @@ fn request(method: &'static Method, path: String, redirect: bool, quarantine: bo
|
||||||
|
|
||||||
{
|
{
|
||||||
let client = OAUTH_CLIENT.load_full();
|
let client = OAUTH_CLIENT.load_full();
|
||||||
for (key, value) in client.initial_headers.clone() {
|
for (key, value) in client.headers_map.clone() {
|
||||||
headers.push((key, value));
|
headers.push((key, value));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
trace!("Headers: {:#?}", headers);
|
|
||||||
|
|
||||||
// shuffle headers: https://github.com/redlib-org/redlib/issues/324
|
// shuffle headers: https://github.com/redlib-org/redlib/issues/324
|
||||||
fastrand::shuffle(&mut headers);
|
fastrand::shuffle(&mut headers);
|
||||||
|
|
||||||
|
@ -390,6 +389,12 @@ pub async fn json(path: String, quarantine: bool) -> Result<Value, String> {
|
||||||
"Ratelimit remaining: Header says {remaining}, we have {current_rate_limit}. Resets in {reset}. Rollover: {}. Ratelimit used: {used}",
|
"Ratelimit remaining: Header says {remaining}, we have {current_rate_limit}. Resets in {reset}. Rollover: {}. Ratelimit used: {used}",
|
||||||
if is_rolling_over { "yes" } else { "no" },
|
if is_rolling_over { "yes" } else { "no" },
|
||||||
);
|
);
|
||||||
|
|
||||||
|
// If can parse remaining as a float, round to a u16 and save
|
||||||
|
if let Ok(val) = remaining.parse::<f32>() {
|
||||||
|
OAUTH_RATELIMIT_REMAINING.store(val.round() as u16, Ordering::SeqCst);
|
||||||
|
}
|
||||||
|
|
||||||
Some(reset)
|
Some(reset)
|
||||||
} else {
|
} else {
|
||||||
None
|
None
|
||||||
|
@ -474,6 +479,36 @@ pub async fn json(path: String, quarantine: bool) -> Result<Value, String> {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
async fn self_check(sub: &str) -> Result<(), String> {
|
||||||
|
let request = Request::get(format!("/r/{sub}/")).body(Body::empty()).unwrap();
|
||||||
|
|
||||||
|
match community(request).await {
|
||||||
|
Ok(sub) if sub.status().is_success() => Ok(()),
|
||||||
|
Ok(sub) => Err(sub.status().to_string()),
|
||||||
|
Err(e) => Err(e),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
pub async fn rate_limit_check() -> Result<(), String> {
|
||||||
|
// First, check a subreddit.
|
||||||
|
self_check("reddit").await?;
|
||||||
|
// This will reduce the rate limit to 99. Assert this check.
|
||||||
|
if OAUTH_RATELIMIT_REMAINING.load(Ordering::SeqCst) != 99 {
|
||||||
|
return Err(format!("Rate limit check failed: expected 99, got {}", OAUTH_RATELIMIT_REMAINING.load(Ordering::SeqCst)));
|
||||||
|
}
|
||||||
|
// Now, we switch out the OAuth client.
|
||||||
|
// This checks for the IP rate limit association.
|
||||||
|
force_refresh_token().await;
|
||||||
|
// Now, check a new sub to break cache.
|
||||||
|
self_check("rust").await?;
|
||||||
|
// Again, assert the rate limit check.
|
||||||
|
if OAUTH_RATELIMIT_REMAINING.load(Ordering::SeqCst) != 99 {
|
||||||
|
return Err(format!("Rate limit check failed: expected 99, got {}", OAUTH_RATELIMIT_REMAINING.load(Ordering::SeqCst)));
|
||||||
|
}
|
||||||
|
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
|
||||||
#[cfg(test)]
|
#[cfg(test)]
|
||||||
static POPULAR_URL: &str = "/r/popular/hot.json?&raw_json=1&geo_filter=GLOBAL";
|
static POPULAR_URL: &str = "/r/popular/hot.json?&raw_json=1&geo_filter=GLOBAL";
|
||||||
|
|
||||||
|
|
12
src/main.rs
12
src/main.rs
|
@ -11,7 +11,7 @@ use hyper::Uri;
|
||||||
use hyper::{header::HeaderValue, Body, Request, Response};
|
use hyper::{header::HeaderValue, Body, Request, Response};
|
||||||
use log::info;
|
use log::info;
|
||||||
use once_cell::sync::Lazy;
|
use once_cell::sync::Lazy;
|
||||||
use redlib::client::{canonical_path, proxy, CLIENT};
|
use redlib::client::{canonical_path, proxy, rate_limit_check, CLIENT};
|
||||||
use redlib::server::{self, RequestExt};
|
use redlib::server::{self, RequestExt};
|
||||||
use redlib::utils::{error, redirect, ThemeAssets};
|
use redlib::utils::{error, redirect, ThemeAssets};
|
||||||
use redlib::{config, duplicates, headers, instance_info, post, search, settings, subreddit, user};
|
use redlib::{config, duplicates, headers, instance_info, post, search, settings, subreddit, user};
|
||||||
|
@ -146,6 +146,16 @@ async fn main() {
|
||||||
)
|
)
|
||||||
.get_matches();
|
.get_matches();
|
||||||
|
|
||||||
|
match rate_limit_check().await {
|
||||||
|
Ok(()) => {
|
||||||
|
info!("[✅] Rate limit check passed");
|
||||||
|
},
|
||||||
|
Err(e) => {
|
||||||
|
log::error!("[❌] Rate limit check failed: {}", e);
|
||||||
|
std::process::exit(1);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
let address = matches.get_one::<String>("address").unwrap();
|
let address = matches.get_one::<String>("address").unwrap();
|
||||||
let port = matches.get_one::<String>("port").unwrap();
|
let port = matches.get_one::<String>("port").unwrap();
|
||||||
let hsts = matches.get_one("hsts").map(|m: &String| m.as_str());
|
let hsts = matches.get_one("hsts").map(|m: &String| m.as_str());
|
||||||
|
|
|
@ -38,12 +38,12 @@ impl Oauth {
|
||||||
}
|
}
|
||||||
Ok(None) => {
|
Ok(None) => {
|
||||||
error!("Failed to create OAuth client. Retrying in 5 seconds...");
|
error!("Failed to create OAuth client. Retrying in 5 seconds...");
|
||||||
continue;
|
|
||||||
}
|
}
|
||||||
Err(duration) => {
|
Err(duration) => {
|
||||||
error!("Failed to create OAuth client in {duration:?}. Retrying in 5 seconds...");
|
error!("Failed to create OAuth client in {duration:?}. Retrying in 5 seconds...");
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
tokio::time::sleep(Duration::from_secs(5)).await;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -91,13 +91,14 @@ impl Oauth {
|
||||||
// Build request
|
// Build request
|
||||||
let request = builder.body(body).unwrap();
|
let request = builder.body(body).unwrap();
|
||||||
|
|
||||||
trace!("Sending token request...");
|
trace!("Sending token request...\n\n{request:?}");
|
||||||
|
|
||||||
// Send request
|
// Send request
|
||||||
let client: &once_cell::sync::Lazy<client::Client<_, Body>> = &CLIENT;
|
let client: &once_cell::sync::Lazy<client::Client<_, Body>> = &CLIENT;
|
||||||
let resp = client.request(request).await.ok()?;
|
let resp = client.request(request).await.ok()?;
|
||||||
|
|
||||||
trace!("Received response with status {} and length {:?}", resp.status(), resp.headers().get("content-length"));
|
trace!("Received response with status {} and length {:?}", resp.status(), resp.headers().get("content-length"));
|
||||||
|
trace!("OAuth headers: {:#?}", resp.headers());
|
||||||
|
|
||||||
// Parse headers - loid header _should_ be saved sent on subsequent token refreshes.
|
// Parse headers - loid header _should_ be saved sent on subsequent token refreshes.
|
||||||
// Technically it's not needed, but it's easy for Reddit API to check for this.
|
// Technically it's not needed, but it's easy for Reddit API to check for this.
|
||||||
|
@ -200,6 +201,7 @@ impl Device {
|
||||||
("x-reddit-media-codecs".into(), codecs),
|
("x-reddit-media-codecs".into(), codecs),
|
||||||
("Content-Type".into(), "application/json; charset=UTF-8".into()),
|
("Content-Type".into(), "application/json; charset=UTF-8".into()),
|
||||||
("client-vendor-id".into(), uuid.clone()),
|
("client-vendor-id".into(), uuid.clone()),
|
||||||
|
("X-Reddit-Device-Id".into(), uuid.clone()),
|
||||||
]);
|
]);
|
||||||
|
|
||||||
info!("[🔄] Spoofing Android client with headers: {headers:?}, uuid: \"{uuid}\", and OAuth ID \"{REDDIT_ANDROID_OAUTH_CLIENT_ID}\"");
|
info!("[🔄] Spoofing Android client with headers: {headers:?}, uuid: \"{uuid}\", and OAuth ID \"{REDDIT_ANDROID_OAUTH_CLIENT_ID}\"");
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue