A rate limiter for FastAPI
Project description
ThrottledAPI
ThrottledAPI is a rate limiter for FastAPI. Check our features to see the use-cases already tested. The code base is 99% covered by unit and integration tests. It is also full type checked with type hints, assuring code with great quality.
Why another rate limiter for FastAPI?
Why another rate limiter for FastAPI, if we already have slowapi and fastapi-limiter? This limiter glues what is good from both projects and adds a bit more. Here is a list of reasons:
- The
throttled-api
rate limiter takes full advantage from the composable dependency injection system in FastAPI. That means you can also create limiters per resource.- Want to limit requests per IP or per user? Got it!
- Want to limit requests based on another weird parameter you are receiving? Just extend our
FastAPILimiter
and you are good to go!
- You can use different storage backends (different implementations for
BaseStorage
) for each limiter.- Want to limit each API instance to 2000 requests per second? You don´t need more than a in-memory counter.
Just use
MemoryStorage
for the task. - Want to limit calls to all your API instances by user or IP? A shared cache is what you need.
Our
RedisStorage
implementation is an adapter for the famous redis package. Other implementations + asyncio support are coming...
- Want to limit each API instance to 2000 requests per second? You don´t need more than a in-memory counter.
Just use
Install
Just use your favorite python package manager. Here are two examples:
- With pip:
pip install throttled
- With poetry:
poetry add throttled
The package is in an early development stage. This means the API can change a lot along the way, before hitting 1.0.0, given community feedback. I recommend you pin the latest version that works for you when using the library for now.
Use
Use existing limiters
We already implemented TotalLimiter
and IPLimiter
for you:
TotalLimiter
: limits all calls to your API, so you can assure it won't suffocate with too many requests.IPLimiter
: as the name suggests, limits requests by IP.
Disclaimer: generalize getting IP from theRequest
object is not easy, because there is too many variations in the community. TheIPLimiter
works when hitting the API running onuvicorn
from another docker container. However, reverse proxies can complicate things. Notwithstanding, theThrottledAPI
archtecture allows creating limiters as you like, so there is nothing stopping you from creating an IP limiter that fits your infrastructure. You can also submit it here as a PR, and I will be glad to merge it in the codebase, given instructions for when to use it.
Implement custom limiters
You can implement new limiters easily extending from FastAPILimiter
or MiddlewareLimiter
# Your IDE will help you find the imports
class UserLimiter(FastAPILimiter):
"""Client specific limiter"""
def __call__(self, request: Request, user: UserID = Depends(get_current_user)):
# The request parameter is mandatory
self.limit(key=f"username={user.username}")
Attach to the API
There are two options when using the limiters in your API
All limiters as dependencies
This is the simplest usage, requiring less code
def create_limiters() -> Sequence[FastAPILimiter]:
memory = MemoryStorage(cache={})
api_limiter = TotalLimiter(limit=Rate(2000, 1), storage=memory)
redis = RedisStorage(client=Redis.from_url("redis://localhost:0"))
ip_limiter = IPLimiter(limit=Rate(10, 1), storage=redis)
user_limiter = UserLimiter(limit=Rate(2, 5), storage=redis)
return api_limiter, ip_limiter, user_limiter
def create_app(limiters: Sequence[FastAPILimiter] = tuple()) -> FastAPI:
"""Creates a FastAPI app with attached limiters and routes"""
api = FastAPI(title="Snacks bar", dependencies=limiters)
api.include_router(products_router, prefix="/products")
api.include_router(users_router, prefix="/users")
return api
app = create_app(limiters=create_limiters())
Some limiters as middlewares
Although FastAPI dependency injection is really powerful, some limiters doesn't require any special resource in other to do their job. In that case you cut some latency if using the limiter as a Middleware.
def create_app(limiters: Sequence[FastAPILimiter] = tuple()) -> FastAPI:
"""Creates a FastAPI app with attached limiters and routes"""
dependencies, middlewares = split_dependencies_and_middlewares(*limiters)
api = FastAPI(title="Snacks bar", dependencies=dependencies)
api.include_router(products_router, prefix="/products")
api.include_router(users_router, prefix="/users")
for mid in middlewares:
api.add_middleware(BaseHTTPMiddleware, dispatch=mid)
return api
app = create_app(limiters=create_limiters()) # create_limiter: same function above
Middleware vs Dependency
When implementing a custom limiter, how to choose between extending FastAPILimiter
or MiddlewareLimiter
?
stateDiagram-v2
state FirstCondition <<choice>>
state SecondCondition <<choice>>
FirstQuestion: What type of limiter should I choose?
FirstQuestion --> FirstCondition
FirstCondition: Limiting depends on resources other\nthan Request object from Starlette?
FirstCondition --> FastAPILimiter: yes
FirstCondition --> MiddlewareLimiter : no
FastAPILimiter --> SecondQuestion
MiddlewareLimiter --> SecondQuestion
SecondQuestion: What storage should I pick?
SecondQuestion --> SecondCondition
SecondCondition: The parameters you are limiting spams a parameter space.\n Is that space too large?
SecondCondition --> RedisStorage : yes
SecondCondition --> ThirdCondition : no
ThirdCondition: You want to share the limiter\nbetween different API instances (pods)?
ThirdCondition --> RedisStorage : yes
ThirdCondition --> MemoryStorage : no
RedisStorage --> End
MemoryStorage --> End
End: Attach the limiter to your API
Contributing
Issues, suggestions, PRs are welcome!
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file throttled-0.2.1.tar.gz
.
File metadata
- Download URL: throttled-0.2.1.tar.gz
- Upload date:
- Size: 11.8 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: poetry/1.1.13 CPython/3.10.2 Linux/5.11.0-1028-azure
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | e2932fdab52f8a9b255c7a852b43fe193fb7a9489d6ab53ed82ba2485675c9dc |
|
MD5 | 86cd0c7bc5c19d64f97849fdf09ee3c5 |
|
BLAKE2b-256 | 174781d8751414705edfebb0618c226e350dc1f3c33928f61c6b2b969cb5a317 |
File details
Details for the file throttled-0.2.1-py3-none-any.whl
.
File metadata
- Download URL: throttled-0.2.1-py3-none-any.whl
- Upload date:
- Size: 12.8 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: poetry/1.1.13 CPython/3.10.2 Linux/5.11.0-1028-azure
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | a1415cefd5985ef92baf982f3829e2fe2ab646c52700b820c56253f46fcb203f |
|
MD5 | ae5fe6ca51dede1abd7feb72e8ba1299 |
|
BLAKE2b-256 | c764a51489448b5e91db3069cf8a38e3b60e7b480d4761b100dd1c022313792b |