Skip to content

pastanetwork/quart-rate-limiter

 
 

Repository files navigation

Quart-Rate-Limiter

Build Status docs pypi python license

Quart-Rate-Limiter is an extension for Quart to allow for rate limits to be defined and enforced on a per route basis and for WebSocket connections. The 429 error response includes a RFC7231 compliant Retry-After header and the successful responses contain headers compliant with the RateLimit Header Fields for HTTP RFC draft.

Quickstart

To add a rate limit first initialise the RateLimiting extension with the application, and then rate limit the route,

app = Quart(__name__)
rate_limiter = RateLimiter(app)

@app.get('/')
@rate_limit(1, timedelta(seconds=10))
async def handler():
    ...

Simple examples

To limit a route to 1 request per second and a maximum of 20 per minute,

@app.route('/')
@rate_limit(1, timedelta(seconds=1))
@rate_limit(20, timedelta(minutes=1))
async def handler():
    ...

Alternatively the limits argument can be used for multiple limits,

@app.route('/')
@rate_limit(
    limits=[
        RateLimit(1, timedelta(seconds=1)),
        RateLimit(20, timedelta(minutes=1)),
    ],
)
async def handler():
    ...

To identify remote users based on their authentication ID, rather than their IP,

async def key_function():
    return current_user.id

RateLimiter(app, key_function=key_function)

The key_function is a coroutine function to allow session lookups if appropriate.

WebSocket Rate Limiting

Quart-Rate-Limiter also supports rate limiting for WebSocket connections, similar to fastapi-limiter's WebSocketRateLimiter:

from quart_rate_limiter import RateLimiter, WebSocketRateLimiter, WebSocketRateLimitException
from quart_rate_limiter.redis_store import RedisStore

# Configure global rate limiter with Redis
redis_store = RedisStore("redis://localhost:6379/0")
RateLimiter(app, store=redis_store)

@app.websocket('/ws')
async def websocket_endpoint():
    # Automatically uses the same Redis store as the global RateLimiter
    ratelimit = WebSocketRateLimiter(times=1, seconds=5)

    await websocket.accept()
    while True:
        try:
            data = await websocket.receive()
            await ratelimit(websocket, context_key=data)  # context_key is optional
            await websocket.send(f"Hello, world! You sent: {data}")
        except WebSocketRateLimitException:
            await websocket.send("Rate limited! Please slow down.")

WebSocket rate limiting automatically uses the same storage backend as your global RateLimiter configuration, ensuring consistency across HTTP and WebSocket rate limiting. It supports all the same storage backends (Memory, Redis, Valkey) and key functions as HTTP route rate limiting.

Contributing

Quart-Rate-Limiter is developed on GitHub. You are very welcome to open issues or propose merge requests.

Testing

The best way to test Quart-Rate-Limiter is with Tox,

$ pip install tox
$ tox

this will check the code style and run the tests.

Help

The Quart-Rate-Limiter documentation is the best places to start, after that try searching stack overflow or ask for help on gitter. If you still can't find an answer please open an issue.

About

Quart-Rate-Limiter is an extension for Quart to allow for rate limits to be defined and enforced on a per route basis.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages

  • Python 100.0%