معرفی شرکت ها


asgi-ratelimit-0.9.0


Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر

توضیحات

-
ویژگی مقدار
سیستم عامل -
نام فایل asgi-ratelimit-0.9.0
نام asgi-ratelimit
نسخه کتابخانه 0.9.0
نگهدارنده []
ایمیل نگهدارنده []
نویسنده abersheeran
ایمیل نویسنده me@abersheeran.com
آدرس صفحه اصلی https://github.com/abersheeran/asgi-ratelimit
آدرس اینترنتی https://pypi.org/project/asgi-ratelimit/
مجوز Apache-2.0
# ASGI RateLimit Limit user access frequency. Base on ASGI. 100% coverage. High performance. Support regular matching. Customizable. ## Install ``` # Only install pip install asgi-ratelimit # Use redis pip install asgi-ratelimit[redis] # Use jwt pip install asgi-ratelimit[jwt] # Install all pip install asgi-ratelimit[full] ``` ## Usage The following example will limit users under the `"default"` group to access `/towns` at most once per second and `/forests` at most once per minute. And the users in the `"admin"` group have no restrictions. ```python from typing import Tuple from ratelimit import RateLimitMiddleware, Rule # Simple rate-limiter in memory: from ratelimit.backends.simple import MemoryBackend rate_limit = RateLimitMiddleware( ASGI_APP, AUTH_FUNCTION, MemoryBackend(), { r"^/towns": [Rule(second=1, group="default"), Rule(group="admin")], r"^/forests": [Rule(minute=1, group="default"), Rule(group="admin")], }, ) # with Redis: from redis.asyncio import StrictRedis from ratelimit.backends.redis import RedisBackend rate_limit = RateLimitMiddleware( ASGI_APP, AUTH_FUNCTION, RedisBackend(StrictRedis()), { r"^/towns": [Rule(second=1, group="default"), Rule(group="admin")], r"^/forests": [Rule(minute=1, group="default"), Rule(group="admin")], }, ) ``` :warning: **The pattern's order is important, rules are set on the first match**: Be careful here ! Next, provide a custom authenticate function, or use one of the [existing auth methods](#built-in-auth-functions). ```python from ratelimit.auths import EmptyInformation async def AUTH_FUNCTION(scope: Scope) -> Tuple[str, str]: """ Resolve the user's unique identifier and the user's group from ASGI SCOPE. If there is no user information, it should raise `EmptyInformation`. If there is no group information, it should return "default". """ # FIXME # You must write the logic of this function yourself, # or use the function in the following document directly. return USER_UNIQUE_ID, GROUP_NAME rate_limit = RateLimitMiddleware(ASGI_APP, AUTH_FUNCTION, ...) ``` The `Rule` type takes a time unit (e.g. `"second"`), a `"group"`, and a `"method"` as a param. If the `"group"` param is not specified then the `"authenticate"` method needs to return the "default group". The `"method"` param corresponds to the http method, if it is not specified, the rule will be applied to all http requests. Example: ```python ... config={ r"^/towns": [Rule(second=1, method="get"), Rule(second=10, group="admin")], } ... async def AUTH_FUNCTION(scope: Scope) -> Tuple[str, str]: ... # no group information about this user if user not in admins_group: return user_unique_id, 'default' return user_unique_id, user_group ``` ### Customizable rules It is possible to mix the rules to obtain higher level of control. The below example will allow up to 10 requests per second and no more than 200 requests per minute, for everyone, for the same API endpoint. ```python ... config={ r"^/towns": [Rule(minute=200, second=10)], } ... ``` Example for a "admin" group with higher limits. ```python ... config={ r"^/towns": [ Rule(day=400, minute=200, second=10), Rule(minute=500, second=25, group="admin"), ], } ... ``` Sometimes you may want to specify that some APIs share the same flow control pool. In other words, flow control is performed on the entire set of APIs instead of a single specific API. Only the `zone` parameter needs to be used. **Note**: You can give different rules the same `zone` value, and all rules with the same `zone` value share the same flow control pool. ```python ... config={ r"/user/\d+": [ Rule(minute=200, zone="user-api"), Rule(second=100, zone="user-api", group="admin"), ], } ... ``` ### Block time When the user's request frequency triggers the upper limit, all requests in the following period of time will be returned with a `429` status code. Example: `Rule(second=5, block_time=60)`, this rule will limit the user to a maximum of 5 visits per second. Once this limit is exceeded, all requests within the next 60 seconds will return `429`. ### HTTP Method If you want a rate limit a specifc HTTP method on an endpoint, the `Rule` object has a `method` param. If no method is specified, the default value is `"*"` for all HTTP methods. ```python r"^/towns": [ Rule(group="admin", method="get", second=10), Rule(group="admin", method="post", second=2) ] ``` ### Custom block handler Just specify `on_blocked` and you can customize the asgi application that is called when blocked. ```python def yourself_429(retry_after: int): async def inside_yourself_429(scope: Scope, receive: Receive, send: Send) -> None: await send({"type": "http.response.start", "status": 429}) await send( { "type": "http.response.body", "body": b"custom 429 page", "more_body": False, } ) return inside_yourself_429 RateLimitMiddleware(..., on_blocked=yourself_429) ``` ### Built-in auth functions #### Client IP ```python from ratelimit.auths.ip import client_ip ``` Obtain user IP through `scope["client"]` or `X-Real-IP`. Note: this auth method will not work if your IP address (such as 127.0.0.1 etc) is not allocated for public networks. #### Starlette Session ```python from ratelimit.auths.session import from_session ``` Get `user` and `group` from `scope["session"]`. If key `group` not in session, will return `default`. If key `user` not in session, will raise a `EmptyInformation`. #### Json Web Token ```python from ratelimit.auths.jwt import create_jwt_auth jwt_auth = create_jwt_auth("KEY", "HS256") ``` Get `user` and `group` from JWT that in `Authorization` header. ### Custom auth error handler Normally exceptions raised in the authentication function result in an Internal Server Error, but you can pass a function to handle the errors and send the appropriate response back to the user. For example, if you're using FastAPI or Starlette: ```python from fastapi.responses import JSONResponse from ratelimit.types import ASGIApp async def handle_auth_error(exc: Exception) -> ASGIApp: return JSONResponse({"message": "Unauthorized access."}, status_code=401) RateLimitMiddleware(..., on_auth_error=handle_auth_error) ``` For advanced usage you can handle the response completely by yourself: ```python from fastapi.responses import JSONResponse from ratelimit.types import ASGIApp, Scope, Receive, Send async def handle_auth_error(exc: Exception) -> ASGIApp: async def response(scope: Scope, receive: Receive, send: Send): # do something here e.g. # await send({"type": "http.response.start", "status": 429}) return response ```


نیازمندی

مقدار نام
>=0.6,<0.7) dataclasses
>=1.7.1,<2.0.0) pyjwt
>=4.2.0rc2) redis


زبان مورد نیاز

مقدار نام
>=3.6,<4.0 Python


نحوه نصب


نصب پکیج whl asgi-ratelimit-0.9.0:

    pip install asgi-ratelimit-0.9.0.whl


نصب پکیج tar.gz asgi-ratelimit-0.9.0:

    pip install asgi-ratelimit-0.9.0.tar.gz