Source code for flask_limiter.extension

the flask extension
import itertools
import logging
import sys
import time
import warnings
from functools import wraps

import six
from flask import request, current_app, g, Blueprint
from limits.errors import ConfigurationError
from import storage_from_string, MemoryStorage
from limits.strategies import STRATEGIES
from werkzeug.http import http_date

from flask_limiter.wrappers import Limit, LimitGroup
from .errors import RateLimitExceeded
from .util import get_ipaddr

class C:

class HEADERS:
    RESET = 1
    LIMIT = 3


[docs]class Limiter(object): """ :param app: :class:`flask.Flask` instance to initialize the extension with. :param list default_limits: a variable list of strings or callables returning strings denoting global limits to apply to all routes. :ref:`ratelimit-string` for more details. :param list application_limits: a variable list of strings or callables returning strings for limits that are applied to the entire application (i.e a shared limit for all routes) :param function key_func: a callable that returns the domain to rate limit by. :param bool headers_enabled: whether ``X-RateLimit`` response headers are written. :param str strategy: the strategy to use. refer to :ref:`ratelimit-strategy` :param str storage_uri: the storage location. refer to :ref:`ratelimit-conf` :param dict storage_options: kwargs to pass to the storage implementation upon instantiation. :param bool auto_check: whether to automatically check the rate limit in the before_request chain of the application. default ``True`` :param bool swallow_errors: whether to swallow errors when hitting a rate limit. An exception will still be logged. default ``False`` :param list in_memory_fallback: a variable list of strings or callables returning strings denoting fallback limits to apply when the storage is down. :param str key_prefix: prefix prepended to rate limiter keys. """ def __init__( self, app=None, key_func=None, global_limits=[], default_limits=[], application_limits=[], headers_enabled=False, strategy=None, storage_uri=None, storage_options={}, auto_check=True, swallow_errors=False, in_memory_fallback=[], retry_after=None, key_prefix="" ): = app self.logger = logging.getLogger("flask-limiter") self.enabled = True self._default_limits = [] self._application_limits = [] self._in_memory_fallback = [] self._exempt_routes = set() self._request_filters = [] self._headers_enabled = headers_enabled self._header_mapping = {} self._retry_after = retry_after self._strategy = strategy self._storage_uri = storage_uri self._storage_options = storage_options self._auto_check = auto_check self._swallow_errors = swallow_errors if not key_func: warnings.warn( "Use of the default `get_ipaddr` function is discouraged." " Please refer to" " for the recommended configuration", UserWarning ) if global_limits: self.raise_global_limits_warning() self._key_func = key_func or get_ipaddr self._key_prefix = key_prefix for limit in set(global_limits + default_limits): self._default_limits.extend( [ LimitGroup( limit, self._key_func, None, False, None, None, None ) ] ) for limit in application_limits: self._application_limits.extend( [ LimitGroup( limit, self._key_func, "global", False, None, None, None ) ] ) for limit in in_memory_fallback: self._in_memory_fallback.extend( [ LimitGroup( limit, self._key_func, None, False, None, None, None ) ] ) self._route_limits = {} self._dynamic_route_limits = {} self._blueprint_limits = {} self._blueprint_dynamic_limits = {} self._blueprint_exempt = set() self._storage = self._limiter = None self._storage_dead = False self._fallback_limiter = None self.__check_backend_count = 0 self.__last_check_backend = time.time() self.__marked_for_limiting = {} class BlackHoleHandler(logging.StreamHandler): def emit(*_): return self.logger.addHandler(BlackHoleHandler()) if app: self.init_app(app)
[docs] def init_app(self, app): """ :param app: :class:`flask.Flask` instance to rate limit. """ self.enabled = app.config.setdefault(C.ENABLED, True) self._swallow_errors = app.config.setdefault( C.SWALLOW_ERRORS, self._swallow_errors ) self._headers_enabled = ( self._headers_enabled or app.config.setdefault(C.HEADERS_ENABLED, False) ) self._storage_options.update(app.config.get(C.STORAGE_OPTIONS, {})) self._storage = storage_from_string( self._storage_uri or app.config.setdefault(C.STORAGE_URL, 'memory://'), **self._storage_options ) strategy = ( self._strategy or app.config.setdefault(C.STRATEGY, 'fixed-window') ) if strategy not in STRATEGIES: raise ConfigurationError( "Invalid rate limiting strategy %s" % strategy ) self._limiter = STRATEGIES[strategy](self._storage) self._header_mapping.update( { HEADERS.RESET: self._header_mapping.get(HEADERS.RESET, None) or app.config.setdefault(C.HEADER_RESET, "X-RateLimit-Reset"), HEADERS.REMAINING: self._header_mapping.get(HEADERS.REMAINING, None) or app.config.setdefault( C.HEADER_REMAINING, "X-RateLimit-Remaining" ), HEADERS.LIMIT: self._header_mapping.get(HEADERS.LIMIT, None) or app.config.setdefault(C.HEADER_LIMIT, "X-RateLimit-Limit"), HEADERS.RETRY_AFTER: self._header_mapping.get(HEADERS.RETRY_AFTER, None) or app.config.setdefault(C.HEADER_RETRY_AFTER, "Retry-After"), } ) self._retry_after = ( self._retry_after or app.config.get(C.HEADER_RETRY_AFTER_VALUE) ) self._key_prefix = (self._key_prefix or app.config.get(C.KEY_PREFIX)) app_limits = app.config.get(C.APPLICATION_LIMITS, None) if not self._application_limits and app_limits: self._application_limits = [ LimitGroup( app_limits, self._key_func, "global", False, None, None, None ) ] if app.config.get(C.GLOBAL_LIMITS, None): self.raise_global_limits_warning() conf_limits = app.config.get( C.GLOBAL_LIMITS, app.config.get(C.DEFAULT_LIMITS, None) ) if not self._default_limits and conf_limits: self._default_limits = [ LimitGroup( conf_limits, self._key_func, None, False, None, None, None ) ] fallback_limits = app.config.get(C.IN_MEMORY_FALLBACK, None) if not self._in_memory_fallback and fallback_limits: self._in_memory_fallback = [ LimitGroup( fallback_limits, self._key_func, None, False, None, None, None ) ] if self._auto_check: app.before_request(self.__check_request_limit) app.after_request(self.__inject_headers) if self._in_memory_fallback: self._fallback_storage = MemoryStorage() self._fallback_limiter = STRATEGIES[strategy]( self._fallback_storage ) # purely for backward compatibility as stated in flask documentation if not hasattr(app, 'extensions'): app.extensions = {} # pragma: no cover app.extensions['limiter'] = self
def __should_check_backend(self): if self.__check_backend_count > MAX_BACKEND_CHECKS: self.__check_backend_count = 0 if time.time() - self.__last_check_backend > pow( 2, self.__check_backend_count ): self.__last_check_backend = time.time() self.__check_backend_count += 1 return True return False
[docs] def check(self): """ check the limits for the current request :raises: RateLimitExceeded """ self.__check_request_limit(False)
[docs] def reset(self): """ resets the storage if it supports being reset """ try: self._storage.reset()"Storage has been reset and all limits cleared") except NotImplementedError: self.logger.warning( "This storage type does not support being reset" )
@property def limiter(self): if self._storage_dead and self._in_memory_fallback: return self._fallback_limiter else: return self._limiter def __inject_headers(self, response): current_limit = getattr(g, 'view_rate_limit', None) if self.enabled and self._headers_enabled and current_limit: window_stats = self.limiter.get_window_stats(*current_limit) reset_in = 1 + window_stats[0] response.headers.add( self._header_mapping[HEADERS.LIMIT], str(current_limit[0].amount) ) response.headers.add( self._header_mapping[HEADERS.REMAINING], window_stats[1] ) response.headers.add(self._header_mapping[HEADERS.RESET], reset_in) response.headers.add( self._header_mapping[HEADERS.RETRY_AFTER], self._retry_after == 'http-date' and http_date(reset_in) or int(reset_in - time.time()) ) return response def __evaluate_limits(self, endpoint, limits): failed_limit = None limit_for_header = None for lim in limits: limit_scope = lim.scope or endpoint if lim.is_exempt: return if lim.methods is not None and request.method.lower( ) not in lim.methods: return if lim.per_method: limit_scope += ":%s" % request.method limit_key = lim.key_func() args = [limit_key, limit_scope] if all(args): if self._key_prefix: args = [self._key_prefix] + args if not limit_for_header or lim.limit < limit_for_header[0]: limit_for_header = [lim.limit] + args if not self.limiter.hit(lim.limit, *args): self.logger.warning( "ratelimit %s (%s) exceeded at endpoint: %s", lim.limit, limit_key, limit_scope ) failed_limit = lim limit_for_header = [lim.limit] + args break else: self.logger.error( "Skipping limit: %s. Empty value found in parameters.", lim.limit ) continue g.view_rate_limit = limit_for_header if failed_limit: if failed_limit.error_message: exc_description = failed_limit.error_message if not callable( failed_limit.error_message ) else failed_limit.error_message() else: exc_description = six.text_type(failed_limit.limit) raise RateLimitExceeded(exc_description) def __check_request_limit(self, in_middleware=True): endpoint = request.endpoint or "" view_func = current_app.view_functions.get(endpoint, None) name = ( "%s.%s" % (view_func.__module__, view_func.__name__) if view_func else "" ) if (not request.endpoint or not self.enabled or view_func == current_app.send_static_file or name in self._exempt_routes or request.blueprint in self._blueprint_exempt or any(fn() for fn in self._request_filters) or g.get("_rate_limiting_complete") ): return limits, dynamic_limits = [], [] # this is to ensure backward compatibility with behavior that # existed accidentally, i.e:: # # @limiter.limit(...) # @app.route('...') # def func(...): # # The above setup would work in pre 1.0 versions because the decorator # was not acting immediately and instead simply registering the rate # limiting. The correct way to use the decorator is to wrap # the limiter with the route, i.e:: # # @app.route(...) # @limiter.limit(...) # def func(...): implicit_decorator = view_func in self.__marked_for_limiting.get( name, [] ) if not in_middleware or implicit_decorator: limits = ( name in self._route_limits and self._route_limits[name] or [] ) dynamic_limits = [] if name in self._dynamic_route_limits: for lim in self._dynamic_route_limits[name]: try: dynamic_limits.extend(list(lim)) except ValueError as e: self.logger.error( "failed to load ratelimit for view function %s (%s)", name, e ) if request.blueprint: if (request.blueprint in self._blueprint_dynamic_limits and not dynamic_limits ): for limit_group in self._blueprint_dynamic_limits[ request.blueprint ]: try: dynamic_limits.extend( [ Limit( limit.limit, limit.key_func, limit.scope, limit.per_method, limit.methods, limit.error_message, limit.exempt_when ) for limit in limit_group ] ) except ValueError as e: self.logger.error( "failed to load ratelimit for blueprint %s (%s)", request.blueprint, e ) if request.blueprint in self._blueprint_limits and not limits: limits.extend(self._blueprint_limits[request.blueprint]) try: all_limits = [] if self._storage_dead and self._fallback_limiter: if in_middleware and name in self.__marked_for_limiting: pass else: if self.__should_check_backend() and self._storage.check():"Rate limit storage recovered") self._storage_dead = False self.__check_backend_count = 0 else: all_limits = list( itertools.chain(*self._in_memory_fallback) ) if not all_limits: route_limits = limits + dynamic_limits all_limits = list(itertools.chain(*self._application_limits)) if in_middleware else [] all_limits += route_limits if ( not route_limits and not (in_middleware and name in self.__marked_for_limiting) or implicit_decorator ): all_limits += list(itertools.chain(*self._default_limits)) self.__evaluate_limits(endpoint, all_limits) except Exception as e: # no qa if isinstance(e, RateLimitExceeded): six.reraise(*sys.exc_info()) if self._in_memory_fallback and not self._storage_dead: self.logger.warn( "Rate limit storage unreachable - falling back to" " in-memory storage" ) self._storage_dead = True self.__check_request_limit(in_middleware) else: if self._swallow_errors: self.logger.exception( "Failed to rate limit. Swallowing error" ) else: six.reraise(*sys.exc_info()) def __limit_decorator( self, limit_value, key_func=None, shared=False, scope=None, per_method=False, methods=None, error_message=None, exempt_when=None, ): _scope = scope if shared else None def _inner(obj): func = key_func or self._key_func is_route = not isinstance(obj, Blueprint) name = "%s.%s" % ( obj.__module__, obj.__name__ ) if is_route else dynamic_limit, static_limits = None, [] if callable(limit_value): dynamic_limit = LimitGroup( limit_value, func, _scope, per_method, methods, error_message, exempt_when ) else: try: static_limits = list( LimitGroup( limit_value, func, _scope, per_method, methods, error_message, exempt_when ) ) except ValueError as e: self.logger.error( "failed to configure %s %s (%s)", "view function" if is_route else "blueprint", name, e ) if isinstance(obj, Blueprint): if dynamic_limit: self._blueprint_dynamic_limits.setdefault( name, [] ).append(dynamic_limit) else: self._blueprint_limits.setdefault( name, [] ).extend(static_limits) else: self.__marked_for_limiting.setdefault(name, []).append(obj) if dynamic_limit: self._dynamic_route_limits.setdefault( name, [] ).append(dynamic_limit) else: self._route_limits.setdefault( name, [] ).extend(static_limits) @wraps(obj) def __inner(*a, **k): if self._auto_check and not g.get("_rate_limiting_complete"): self.__check_request_limit(False) g._rate_limiting_complete = True return obj(*a, **k) return __inner return _inner
[docs] def limit( self, limit_value, key_func=None, per_method=False, methods=None, error_message=None, exempt_when=None, ): """ decorator to be used for rate limiting individual routes or blueprints. :param limit_value: rate limit string or a callable that returns a string. :ref:`ratelimit-string` for more details. :param function key_func: function/lambda to extract the unique identifier for the rate limit. defaults to remote address of the request. :param bool per_method: whether the limit is sub categorized into the http method of the request. :param list methods: if specified, only the methods in this list will be rate limited (default: None). :param error_message: string (or callable that returns one) to override the error message used in the response. :param exempt_when: :return: """ return self.__limit_decorator( limit_value, key_func, per_method=per_method, methods=methods, error_message=error_message, exempt_when=exempt_when, )
[docs] def shared_limit( self, limit_value, scope, key_func=None, error_message=None, exempt_when=None, ): """ decorator to be applied to multiple routes sharing the same rate limit. :param limit_value: rate limit string or a callable that returns a string. :ref:`ratelimit-string` for more details. :param scope: a string or callable that returns a string for defining the rate limiting scope. :param function key_func: function/lambda to extract the unique identifier for the rate limit. defaults to remote address of the request. :param error_message: string (or callable that returns one) to override the error message used in the response. :param exempt_when: """ return self.__limit_decorator( limit_value, key_func, True, scope, error_message=error_message, exempt_when=exempt_when, )
[docs] def exempt(self, obj): """ decorator to mark a view or all views in a blueprint as exempt from rate limits. """ if not isinstance(obj, Blueprint): name = "%s.%s" % (obj.__module__, obj.__name__) @wraps(obj) def __inner(*a, **k): return obj(*a, **k) self._exempt_routes.add(name) return __inner else: self._blueprint_exempt.add(
[docs] def request_filter(self, fn): """ decorator to mark a function as a filter to be executed to check if the request is exempt from rate limiting. """ self._request_filters.append(fn) return fn
def raise_global_limits_warning(self): warnings.warn( "global_limits was a badly name configuration since it is actually a default limit and not a " " globally shared limit. Use default_limits if you want to provide a default or use application_limits " " if you intend to really have a global shared limit", UserWarning )