1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575
|
Recipes
=======
.. currentmodule:: flask_limiter
.. _keyfunc-customization:
Rate Limit Key Functions
-------------------------
You can easily customize your rate limits to be based on any
characteristic of the incoming request. Both the :class:`~Limiter` constructor
and the :meth:`~Limiter.limit` decorator accept a keyword argument
``key_func`` that should return a string (or an object that has a string representation).
Rate limiting a route by current user (using Flask-Login)::
@route("/test")
@login_required
@limiter.limit("1 per day", key_func = lambda : current_user.username)
def test_route():
return "42"
Rate limiting all requests by country::
from flask import request, Flask
import GeoIP
gi = GeoIP.open("GeoLiteCity.dat", GeoIP.GEOIP_INDEX_CACHE | GeoIP.GEOIP_CHECK_CACHE)
def get_request_country():
return gi.record_by_name(request.remote_addr)['region_name']
app = Flask(__name__)
limiter = Limiter(get_request_country, app=app, default_limits=["10/hour"])
Custom Rate limit exceeded responses
------------------------------------
The default configuration results in a :exc:`RateLimitExceeded` exception being
thrown (**which effectively halts any further processing and a response with status `429`**).
The exceeded limit is added to the response and results in an response body that looks something like:
.. code:: html
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<title>429 Too Many Requests</title>
<h1>Too Many Requests</h1>
<p>1 per 1 day</p>
For all routes that are rate limited
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
If you want to configure the response you can register an error handler for the
``429`` error code in a manner similar to the following example, which returns a
json response instead::
@app.errorhandler(429)
def ratelimit_handler(e):
return make_response(
jsonify(error=f"ratelimit exceeded {e.description}")
, 429
)
.. versionadded:: 2.6.0
The same effect can be achieved by using the :paramref:`~Limiter.on_breach` parameter
when initializing the :class:`Limiter`. If the callback passed to this parameter
returns an instance of :class:`~flask.Response` that response will be the one embedded
into the :exc:`RateLimitExceeded` exception that is raised.
For example::
from flask import make_response, render_template
from flask_limiter import Limiter, RequestLimit
def default_error_responder(request_limit: RequestLimit):
return make_response(
render_template("my_ratelimit_template.tmpl", request_limit=request_limit),
429
)
app = Limiter(
key_func=...,
default_limits=["100/minute"],
on_breach=default_error_responder
)
.. tip:: If you have specified both an :paramref:`~Limiter.on_breach` callback
and registered a callback using the :meth:`~flask.Flask.errorhandler` decorator, the one
registered for ``429`` errors will still be called and could end up ignoring
the response returned by the :paramref:`~Limiter.on_breach` callback.
There may be legitimate reasons to do this (for example if your application raises
``429`` errors by itself or through another middleware).
This can be managed in the callback registered with :meth:`~flask.Flask.errorhandler`
by checking if the incoming error has a canned response and using that instead of building
a new one::
@app.errorhandler(429)
def careful_ratelimit_handler(error):
return error.get_response() or make_response(
jsonify(
error=f"ratelimit exceeded {e.description}"
),
429
)
.. note::
.. versionchanged:: 2.8.0
Any errors encountered when calling an :paramref:`~Limiter.on_breach` callback will
be re-raised unless :paramref:`~Limiter.swallow_errors` is set to ``True``
For specific rate limit decorated routes
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
.. versionadded:: 2.6.0
If the objective is to only customize rate limited error responses for certain
rate limited routes this can be achieved in a similar manner as above,
through the :paramref:`~Limiter.limit.on_breach` parameter of the rate limit decorator.
Following the example from above where the extension was initialized with an :paramref:`~Limiter.on_breach`
callback, the ``index`` route below declares it's own :paramref:`~Limiter.limiter.on_breach` callback which
instead of rendering a template returns a json response (with a ``200`` status code)::
app = Limiter(
key_func=...,
default_limits=["100/minute"],
on_breach=default_error_responder
)
def index_ratelimit_error_responder(request_limit: RequestLimit):
return jsonify({"error": "rate_limit_exceeded"})
@app.route("/")
@limiter.limit("10/minute", on_breach=index_ratelimit_error_responder)
def index():
...
The above example also demonstrates the subtle implementation detail that the
response from :paramref:`Limiter.limiter.on_breach` callback (if provided) will
take priority over the response from the :paramref:`Limiter.on_breach` callback if
there is one.
Meta limits
-----------
.. versionadded:: 3.5.0
Meta limits can be used for an additional layer of protection (for example
against denial of service attacks) by limiting the number of times a requesting
client can hit any rate limit in the application within configured time slices.
These can be configured by using the :paramref:`~flask_limiter.Limiter.meta_limits`
constructor argument (or the associated :data:`RATELIMIT_META` flask
config attribute).
Consider the following application & limiter configuration::
app = Limiter(
key_func=get_remote_address,
meta_limits=["2/hour", "4/day"],
default_limits=["10/minute"],
)
@app.route("/fast")
def fast():
return "fast"
@app.route("/slow")
@limiter.limit("1/minute")
def slow():
return "slow"
The ``2/hour, 4/day`` value of :paramref:`~flask_limiter.Limiter.meta_limits` ensures that if
any of the ``default_limits`` or per route limit of ``1/minute`` is exceeded more than
**twice an hour** or **four times a day**, a :class:`~flask_limiter.RateLimitExceeded` exception will be
raised (i.e. a ``429`` response will be returned) for any subsequent request until the ``meta_limit`` is reset.
For example
.. code-block:: shell
$ curl localhost:5000/fast
fast
$ curl localhost:5000/slow
slow
$ curl localhost:5000/slow
<!doctype html>
<html lang=en>
<title>429 Too Many Requests</title>
<h1>Too Many Requests</h1>
<p>1 per 1 minute</p>
After a minute the ``slow`` endpoint can be accessed again once per minute
.. code-block:: shell
$ sleep 60
$ curl localhost:5000/slow
slow
$ curl localhost:5000/slow
<!doctype html>
<html lang=en>
<title>429 Too Many Requests</title>
<h1>Too Many Requests</h1>
<p>1 per 1 minute</p>
Now, even after waiting a minute both the ``slow`` and ``fast`` endpoints
are rejected due to the ``2/hour`` meta limit.
.. code-block:: shell
$ sleep 60
$ curl localhost:5000/slow
<!doctype html>
<html lang=en>
<title>429 Too Many Requests</title>
<h1>Too Many Requests</h1>
<p>2 per 1 hour</p>
$ curl localhost:5000/fast
<!doctype html>
<html lang=en>
<title>429 Too Many Requests</title>
<h1>Too Many Requests</h1>
<p>2 per 1 hour</p>
Customizing the cost of a request
---------------------------------
By default whenever a request is served a **cost** of ``1`` is charged for
each rate limit that applies within the context of that request.
There may be situations where a different value should be used.
The :meth:`~flask_limiter.Limiter.limit` and :meth:`~flask_limiter.Limiter.shared_limit`
decorators both accept a ``cost`` parameter which accepts either a static :class:`int` or
a callable that returns an :class:`int`.
As an example, the following configuration will result in a double penalty whenever
``Some reason`` is true ::
from flask import request, current_app
def my_cost_function() -> int:
if .....: # Some reason
return 2
return 1
@app.route("/")
@limiter.limit("100/second", cost=my_cost_function)
def root():
...
A similar approach can be used for both default and application level limits by
providing either a cost function to the :class:`~flask_limiter.Limiter` constructor
via the :paramref:`~flask_limiter.Limiter.default_limits_cost` or
:paramref:`~flask_limiter.Limiter.application_limits_cost` parameters.
Customizing rate limits based on response
-----------------------------------------
For scenarios where the decision to count the current request towards a rate limit
can only be made after the request has completed, a callable that accepts the current
:class:`flask.Response` object as its argument can be provided to the :meth:`~Limiter.limit` or
:meth:`~Limiter.shared_limit` decorators through the ``deduct_when`` keyword argument.
A truthy response from the callable will result in a deduction from the rate limit.
As an example, to only count non `200` responses towards the rate limit
.. code-block:: python
@app.route("..")
@limiter.limit(
"1/second",
deduct_when=lambda response: response.status_code != 200
)
def route():
...
`deduct_when` can also be provided for default limits by providing the
:paramref:`~flask_limiter.Limiter.default_limits_deduct_when` parameter
to the :class:`~flask_limiter.Limiter` constructor.
.. note:: All requests will be tested for the rate limit and rejected accordingly
if the rate limit is already hit. The provision of the `deduct_when`
argument only changes whether the request will count towards depleting the rate limit.
.. _using-flask-pluggable-views:
Rate limiting Class-based Views
-------------------------------
If you are taking a class based approach for defining views,
the recommended method (:doc:`flask:views`) of adding decorators is
to add the :meth:`~Limiter.limit` decorator to :attr:`~flask.views.View.decorators` in your view subclass as shown in the
example below
.. code-block:: python
app = Flask(__name__)
limiter = Limiter(get_remote_address, app=app)
class MyView(flask.views.MethodView):
decorators = [limiter.limit("10/second")]
def get(self):
return "get"
def put(self):
return "put"
.. note:: This approach is limited to either sharing the same rate limit for
all http methods of a given :class:`flask.views.View` or applying the declared
rate limit independently for each http method (to accomplish this, pass in ``True`` to
the ``per_method`` keyword argument to :meth:`~Limiter.limit`). Alternatively, the limit
can be restricted to only certain http methods by passing them as a list to the `methods`
keyword argument.
Rate limiting all routes in a :class:`~flask.Blueprint`
-------------------------------------------------------
.. warning:: :class:`~flask.Blueprint` instances that are registered on another blueprint
instead of on the main :class:`~flask.Flask` instance had not been considered
upto :ref:`changelog:v2.3.0`. Effectively **they neither inherited** the rate limits
explicitly registered on the parent :class:`~flask.Blueprint` **nor were they
exempt** from rate limits if the parent had been marked exempt.
(See :issue:`326`, and the :ref:`recipes:nested blueprints` section below).
:meth:`~Limiter.limit`, :meth:`~Limiter.shared_limit` &
:meth:`~Limiter.exempt` can all be applied to :class:`flask.Blueprint` instances as well.
In the following example the ``login`` Blueprint has a special rate limit applied to all its routes, while
the ``doc`` Blueprint is exempt from all rate limits. The ``regular`` Blueprint follows the default rate limits.
.. code-block:: python
app = Flask(__name__)
login = Blueprint("login", __name__, url_prefix = "/login")
regular = Blueprint("regular", __name__, url_prefix = "/regular")
doc = Blueprint("doc", __name__, url_prefix = "/doc")
@doc.route("/")
def doc_index():
return "doc"
@regular.route("/")
def regular_index():
return "regular"
@login.route("/")
def login_index():
return "login"
limiter = Limiter(get_remote_address, app=app, default_limits = ["1/second"])
limiter.limit("60/hour")(login)
limiter.exempt(doc)
app.register_blueprint(doc)
app.register_blueprint(login)
app.register_blueprint(regular)
Nested Blueprints
^^^^^^^^^^^^^^^^^
.. versionadded:: 2.3.0
`Nested Blueprints <https://flask.palletsprojects.com/en/latest/blueprints/#nesting-blueprints>`__
require some special considerations.
=====================================
Exempting routes in nested Blueprints
=====================================
Expanding the example from the Flask documentation::
parent = Blueprint('parent', __name__, url_prefix='/parent')
child = Blueprint('child', __name__, url_prefix='/child')
parent.register_blueprint(child)
limiter.exempt(parent)
app.register_blueprint(parent)
Routes under the ``child`` blueprint **do not** automatically get exempted by default
and have to be marked exempt explicitly. This behavior is to maintain backward compatibility
and can be opted out of by adding :attr:`~flask_limiter.ExemptionScope.DESCENDENTS`
to :paramref:`~Limiter.exempt.flags` when calling :meth:`Limiter.exempt`::
limiter.exempt(
parent,
flags=ExemptionScope.DEFAULT | ExemptionScope.APPLICATION | ExemptionScope.DESCENDENTS
)
===========================================================
Explicitly setting limits / exemptions on nested Blueprints
===========================================================
Using combinations of :paramref:`~Limiter.limit.override_defaults` parameter
when explicitly declaring limits on Blueprints and the :paramref:`~Limiter.exempt.flags`
parameter when exempting Blueprints with :meth:`~Limiter.exempt`
the resolution of inherited and descendent limits within the scope of a Blueprint
can be controlled.
Here's a slightly involved example::
limiter = Limiter(
...,
default_limits = ["100/hour"],
application_limits = ["100/minute"]
)
parent = Blueprint('parent', __name__, url_prefix='/parent')
child = Blueprint('child', __name__, url_prefix='/child')
grandchild = Blueprint('grandchild', __name__, url_prefix='/grandchild')
health = Blueprint('health', __name__, url_prefix='/health')
parent.register_blueprint(child)
parent.register_blueprint(health)
child.register_blueprint(grandchild)
child.register_blueprint(health)
grandchild.register_blueprint(health)
app.register_blueprint(parent)
limiter.limit("2/minute")(parent)
limiter.limit("1/second", override_defaults=False)(child)
limiter.limit("10/minute")(grandchild)
limiter.exempt(
health,
flags=ExemptionScope.DEFAULT|ExemptionScope.APPLICATION|ExemptionScope.ANCESTORS
)
Effectively this means:
#. Routes under ``parent`` will override the application defaults and will be
limited to ``2 per minute``
#. Routes under ``child`` will respect both the parent and the application defaults
and effectively be limited to ``At most 1 per second, 2 per minute and 100 per hour``
#. Routes under ``grandchild`` will not inherit either the limits from `child` or `parent`
or the application defaults and allow ``10 per minute``
#. All calls to ``/health/`` will be exempt from all limits (including any limits that would
otherwise be inherited from the Blueprints it is nested under due to the addition of the
:class:`~ExemptionScope.ANCESTORS` flag).
.. note:: Only calls to `/health` will be exempt from the application wide global
limit of `100/minute`.
.. _logging:
Logging
-------
Each :class:`~Limiter` instance has a registered :class:`~logging.Logger` named ``flask-limiter``
that is by default **not** configured with a handler.
This can be configured according to your needs::
import logging
limiter_logger = logging.getLogger("flask-limiter")
# force DEBUG logging
limiter_logger.setLevel(logging.DEBUG)
# restrict to only error level
limiter_logger.setLevel(logging.ERROR)
# Add a filter
limiter_logger.addFilter(SomeFilter)
# etc ..
Custom error messages
---------------------
:meth:`~Limiter.limit` & :meth:`~Limiter.shared_limit` can be provided with an `error_message`
argument to over ride the default `n per x` error message that is returned to the calling client.
The `error_message` argument can either be a simple string or a callable that returns one.
.. code-block:: python
app = Flask(__name__)
limiter = Limiter(get_remote_address, app=app)
def error_handler():
return app.config.get("DEFAULT_ERROR_MESSAGE")
@app.route("/")
@limiter.limit("1/second", error_message='chill!')
def index():
....
@app.route("/ping")
@limiter.limit("10/second", error_message=error_handler)
def ping():
....
Custom rate limit headers
-------------------------
Though you can get pretty far with configuring the standard headers associated
with rate limiting using configuration parameters available as described under
:ref:`configuration:rate-limiting headers` - this may not be sufficient for your use case.
For such cases you can access the :attr:`~Limiter.current_limit`
property from the :class:`~Limiter` instance from anywhere within a :doc:`request context <flask:reqcontext>`.
As an example you could leave the built in header population disabled
and add your own with an :meth:`~flask.Flask.after_request` hook::
app = Flask(__name__)
limiter = Limiter(get_remote_address, app=app)
@app.route("/")
@limiter.limit("1/second")
def index():
....
@app.after_request
def add_headers(response):
if limiter.current_limit:
response.headers["RemainingLimit"] = limiter.current_limit.remaining
response.headers["ResetAt"] = limiter.current_limit.reset_at
response.headers["MaxRequests"] = limiter.current_limit.limit.amount
response.headers["WindowSize"] = limiter.current_limit.limit.get_expiry()
response.headers["Breached"] = limiter.current_limit.breached
return response
This will result in headers along the lines of::
< RemainingLimit: 0
< ResetAt: 1641691205
< MaxRequests: 1
< WindowSize: 1
< Breached: True
.. _deploy-behind-proxy:
Deploying an application behind a proxy
---------------------------------------
If your application is behind a proxy and you are using werkzeug > 0.9+ you can use the :class:`werkzeug.middleware.proxy_fix.ProxyFix`
fixer to reliably get the remote address of the user, while protecting your application against ip spoofing via headers.
.. code-block:: python
from flask import Flask
from flask_limiter import Limiter
from flask_limiter.util import get_remote_address
from werkzeug.middleware.proxy_fix import ProxyFix
app = Flask(__name__)
# for example if the request goes through one proxy
# before hitting your application server
app.wsgi_app = ProxyFix(app.wsgi_app, x_for=1)
limiter = Limiter(get_remote_address, app=app)
|