Skip to main content

A comprehensive rate limiting system for FastAPI with Redis backend

Reason this release was yanked:

depricated

Project description

Fastrict - FastAPI Rate Limiter Striction

A comprehensive, production-ready rate limiting system for FastAPI applications with Redis backend support.

Python 3.8+ FastAPI Redis License: MIT

Features

  • 🚀 High Performance: Supports 1K-30K concurrent connections
  • 🎯 Flexible Strategies: Multiple built-in strategies (short, medium, long-term limits)
  • 🔧 Easy Integration: Drop-in middleware with decorator overrides
  • 🔑 Advanced Key Extraction: IP, headers, query params, custom functions, combined keys
  • 💾 Redis Backend: Efficient sliding window implementation with automatic cleanup
  • 📊 Monitoring Ready: Standard rate limit headers and comprehensive logging
  • 🛡️ Production Ready: Graceful error handling, fallbacks, and bypass functions
  • 🎨 Clean Architecture: Well-structured, testable, and maintainable code

Installation

pip install fastrict

Dependencies

  • Python 3.8+
  • FastAPI 0.68+
  • Redis 4.0+
  • Pydantic 1.8+

Quick Start

1. Basic Setup

from fastapi import FastAPI
from fastrict import RateLimitMiddleware, throttle
from fastrict import RedisRateLimitRepository, RateLimitUseCase, KeyExtractionUseCase
import redis

# Create FastAPI app
app = FastAPI()

# Setup Redis
redis_client = redis.from_url("redis://localhost:6379", decode_responses=True)

# Setup rate limiting components
repository = RedisRateLimitRepository(redis_client)
key_extraction = KeyExtractionUseCase()
rate_limiter = RateLimitUseCase(repository, key_extraction)

# Add middleware
app.add_middleware(
    RateLimitMiddleware,
    rate_limit_use_case=rate_limiter,
    excluded_paths=["/health", "/docs"]
)

# Basic endpoint (uses default rate limiting)
@app.get("/api/data")
async def get_data():
    return {"data": "This endpoint is rate limited"}

2. Route-Specific Rate Limiting

from fastrict import RateLimitStrategyName, KeyExtractionType

# Strict rate limiting for login
@app.post("/auth/login")
@throttle(strategy=RateLimitStrategyName.SHORT)  # 3 requests per minute
async def login():
    return {"message": "Login endpoint"}

# Custom rate limiting
@app.post("/api/upload")
@throttle(limit=5, ttl=300)  # 5 requests per 5 minutes
async def upload_file():
    return {"message": "File uploaded"}

# API key-based rate limiting
@app.get("/api/premium")
@throttle(
    limit=100, 
    ttl=3600,
    key_type=KeyExtractionType.HEADER,
    key_field="X-API-Key"
)
async def premium_endpoint():
    return {"data": "Premium content"}

3. Advanced Key Strategies

# Combined key (IP + User-Agent)
@app.get("/api/sensitive")
@throttle(
    limit=10,
    ttl=300,
    key_type=KeyExtractionType.COMBINED,
    key_combination=["ip", "header:User-Agent"]
)
async def sensitive_endpoint():
    return {"data": "Sensitive information"}

# Custom key extraction
def extract_user_key(request):
    user_id = request.headers.get("User-ID")
    return f"user:{user_id}" if user_id else request.client.host

@app.get("/api/user-data")
@throttle(
    limit=50,
    ttl=3600,
    key_type=KeyExtractionType.CUSTOM,
    key_extractor=extract_user_key
)
async def user_data():
    return {"data": "User-specific data"}

# Bypass for admin users
def bypass_for_admins(request):
    return request.headers.get("Role") == "admin"

@app.get("/api/admin")
@throttle(
    limit=5,
    ttl=60,
    bypass_function=bypass_for_admins
)
async def admin_endpoint():
    return {"data": "Admin data"}

Configuration

Built-in Strategies

from fastrict import RateLimitStrategy, RateLimitStrategyName

strategies = [
    RateLimitStrategy(name=RateLimitStrategyName.SHORT, limit=3, ttl=60),      # 3/min
    RateLimitStrategy(name=RateLimitStrategyName.MEDIUM, limit=20, ttl=600),   # 20/10min
    RateLimitStrategy(name=RateLimitStrategyName.LONG, limit=100, ttl=3600),   # 100/hour
]

app.add_middleware(
    RateLimitMiddleware,
    rate_limit_use_case=rate_limiter,
    default_strategies=strategies,
    default_strategy_name=RateLimitStrategyName.MEDIUM
)

Key Extraction Types

  • IP: Client IP address (default)
  • HEADER: HTTP header value
  • QUERY_PARAM: Query parameter value
  • FORM_FIELD: Form field value
  • CUSTOM: Custom extraction function
  • COMBINED: Multiple extraction methods

Environment Configuration

import os
from fastrict import RedisRateLimitRepository

# Redis configuration
redis_url = os.getenv("REDIS_URL", "redis://localhost:6379")
repository = RedisRateLimitRepository.from_url(
    redis_url=redis_url,
    key_prefix="myapp_rate_limit"
)

Response Headers

The middleware automatically adds standard rate limiting headers:

X-RateLimit-Limit: 20
X-RateLimit-Remaining: 15
X-RateLimit-Used: 5
X-RateLimit-Window: 600
Retry-After: 300  # Only when rate limited

Error Responses

When rate limits are exceeded, the API returns HTTP 429:

{
  "message": "Rate limit exceeded. Maximum 20 requests per 600 seconds. Please try again in 300 seconds.",
  "retry_after": 300,
  "limit": 20,
  "window": 600
}

Advanced Usage

Custom Redis Configuration

import redis
from fastrict import RedisRateLimitRepository

# Custom Redis client
redis_client = redis.Redis(
    host="localhost",
    port=6379,
    db=0,
    password="secret",
    decode_responses=True,
    socket_timeout=5,
    socket_connect_timeout=5,
    retry_on_timeout=True
)

repository = RedisRateLimitRepository(
    redis_client=redis_client,
    key_prefix="myapp_limits"
)
# or
repository = RedisRateLimitRepository(redis_url="redis://:secret@localhost:6379/0")

Multiple Rate Limiters

# Different limiters for different API versions
v1_limiter = RateLimitUseCase(repository, key_extraction)
v2_limiter = RateLimitUseCase(repository, key_extraction)

# Apply to route groups
from fastapi import APIRouter

v1_router = APIRouter(prefix="/v1")
v2_router = APIRouter(prefix="/v2")

# Different strategies for each version
v1_router.add_middleware(RateLimitMiddleware, rate_limit_use_case=v1_limiter)
v2_router.add_middleware(RateLimitMiddleware, rate_limit_use_case=v2_limiter)

Monitoring and Metrics

# Get current usage without incrementing
@app.get("/api/rate-limit-status")
async def rate_limit_status(request: Request):
    result = rate_limiter.get_current_usage(request)
    return {
        "allowed": result.allowed,
        "current_count": result.current_count,
        "limit": result.limit,
        "remaining": result.remaining_requests,
        "usage_percentage": result.usage_percentage
    }

# Cleanup expired keys (maintenance)
@app.post("/admin/cleanup-rate-limits")
async def cleanup_rate_limits():
    cleaned = repository.cleanup_expired_keys()
    return {"cleaned_keys": cleaned}

Testing

import pytest
from fastapi.testclient import TestClient
from unittest.mock import Mock

def test_rate_limiting():
    # Mock Redis for testing
    mock_redis = Mock()
    repository = RedisRateLimitRepository(mock_redis)
    
    # Test your endpoints
    with TestClient(app) as client:
        # First request should succeed
        response = client.get("/api/data")
        assert response.status_code == 200
        
        # Simulate rate limit exceeded
        mock_redis.zcard.return_value = 100  # Over limit
        response = client.get("/api/data")
        assert response.status_code == 429

Performance

  • Throughput: Supports 1K-30K concurrent requests
  • Latency: Sub-millisecond rate limit checks
  • Memory: Efficient Redis sorted sets with automatic cleanup
  • Scalability: Horizontal scaling with Redis cluster

Architecture

The library follows Clean Architecture principles:

fastrict/
├── entities/          # Core business models
├── use_cases/         # Business logic
├── adapters/          # External integrations (Redis)
└── frameworks/        # FastAPI middleware & decorators

Contributing

Contributions are welcome! Please see CONTRIBUTING.md for guidelines.

License

This project is licensed under the MIT License - see the LICENSE file for details.

Changelog

See CHANGELOG.md for version history.

Support

Related Projects

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

fastrict-1.0.1.tar.gz (8.3 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

fastrict-1.0.1-py3-none-any.whl (6.9 kB view details)

Uploaded Python 3

File details

Details for the file fastrict-1.0.1.tar.gz.

File metadata

  • Download URL: fastrict-1.0.1.tar.gz
  • Upload date:
  • Size: 8.3 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.10.16

File hashes

Hashes for fastrict-1.0.1.tar.gz
Algorithm Hash digest
SHA256 e73709daf60d676544d6b81bcade72d54b0173310fe98f0f31afaf613876a270
MD5 22fb429f326c4003251e57ef2c8821b5
BLAKE2b-256 414c5ce5c6e841d388b9f631c919c1a60b6bbd0beba4ddc92e10b9d2b1bd35bf

See more details on using hashes here.

File details

Details for the file fastrict-1.0.1-py3-none-any.whl.

File metadata

  • Download URL: fastrict-1.0.1-py3-none-any.whl
  • Upload date:
  • Size: 6.9 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.10.16

File hashes

Hashes for fastrict-1.0.1-py3-none-any.whl
Algorithm Hash digest
SHA256 20fd97fbd163916b1977623a8c50dc40c7a070e687c11ef7f0e933a4c4861171
MD5 67016377526d348a8ff40c71a84e5b6d
BLAKE2b-256 646c68f07f0785ccaeb6a3138ced91e87e0fce225b5025837785d3f271a20ace

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page