Scrum4Me/lib/rate-limit.ts
Madhura68 5f410d3b10 actions: ideas CRUD + grill_md/plan_md edit + download (M12 T-496)
actions/ideas.ts (strikt user_id-only, geen productAccessFilter):
- createIdeaAction(input) — atomic nextIdeaCode + idea.create in $transaction
- updateIdeaAction(id, input) — guards on isIdeaEditable
- archiveIdeaAction / unarchiveIdeaAction
- deleteIdeaAction — refuses when pbi_id linked
- updateGrillMdAction — only in GRILLED|PLAN_READY; logs IdeaLog{NOTE}
- updatePlanMdAction — only in PLAN_READY; runs parsePlanMd; 422 with details on fail
- downloadIdeaMdAction — read-only, demo allowed

Added rate-limit configs: create-idea, edit-idea-md, start-idea-job,
materialize-idea.

Tests: 19 cases covering auth (401), demo (403), zod (422), status guards
(422), 404 cross-user-scope, plan-md parse-fail with details.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
2026-05-04 19:47:30 +02:00

87 lines
2.9 KiB
TypeScript

// Simple in-memory rate limiter.
// Note: resets on server restart and does not share state across multiple processes.
// Suitable for MVP; replace with Redis for production scale-out.
interface RateLimitConfig {
windowMs: number
max: number
}
const CONFIGS: Record<string, RateLimitConfig> = {
login: { windowMs: 60_000, max: 10 }, // 10 attempts per minute
register: { windowMs: 3_600_000, max: 5 }, // 5 attempts per hour
'pair-start': { windowMs: 60_000, max: 10 }, // 10 QR-pairings per minute (M10)
// v1-readiness item 3 — per-user mutation-rate-limits.
// Limits zijn ruim genoeg voor normaal gebruik, eng genoeg om abuse-loops
// (bv. een runaway-script dat duizenden tasks aanmaakt) te stoppen.
'create-pbi': { windowMs: 60_000, max: 30 },
'create-story': { windowMs: 60_000, max: 50 },
'create-task': { windowMs: 60_000, max: 100 },
'create-todo': { windowMs: 60_000, max: 60 },
'create-sprint': { windowMs: 60_000, max: 5 },
'create-product': { windowMs: 60_000, max: 5 },
'create-token': { windowMs: 3_600_000, max: 10 }, // 10 API-tokens/uur/user
'enqueue-job': { windowMs: 60_000, max: 30 },
'log-story': { windowMs: 60_000, max: 60 },
'upload-avatar': { windowMs: 3_600_000, max: 20 },
'answer-question': { windowMs: 60_000, max: 30 },
// M12 — Idea entity (zie docs/plans/M12-ideas.md)
'create-idea': { windowMs: 60_000, max: 30 },
'edit-idea-md': { windowMs: 60_000, max: 60 }, // grill_md / plan_md edits
'start-idea-job': { windowMs: 60_000, max: 10 }, // Grill / Make Plan triggers
'materialize-idea': { windowMs: 60_000, max: 5 },
}
const DEFAULT_CONFIG: RateLimitConfig = { windowMs: 60_000, max: 10 }
const store = new Map<string, { count: number; resetAt: number }>()
export function checkRateLimit(key: string): boolean {
const prefix = key.split(':')[0]
const config = CONFIGS[prefix] ?? DEFAULT_CONFIG
const now = Date.now()
const entry = store.get(key)
if (!entry || now > entry.resetAt) {
store.set(key, { count: 1, resetAt: now + config.windowMs })
return true
}
if (entry.count >= config.max) {
return false
}
entry.count++
return true
}
/**
* Wrapper voor server-actions: scope op (action, userId), retourneert het
* standaard `{ error, code: 429 }` shape als de gebruiker over de limiet is.
*
* Gebruik in een action:
*
* const limited = enforceUserRateLimit('create-pbi', session.userId)
* if (limited) return limited
*/
export function enforceUserRateLimit(
scope: keyof typeof CONFIGS,
userId: string,
): { error: string; code: 429 } | null {
if (!checkRateLimit(`${scope}:${userId}`)) {
return {
error: 'Te veel acties achter elkaar. Probeer het over een minuut opnieuw.',
code: 429,
}
}
return null
}
/**
* Voor test-isolatie: leegt de in-memory store. Niet exporteren in productie-paden.
*/
export function _resetRateLimit() {
store.clear()
}