2017 © Pedro PelĂĄez
 

symfony-bundle ratelimit-bundle

This bundle provides functionality to limit calls to actions based on rate limits

image

instasent/ratelimit-bundle

This bundle provides functionality to limit calls to actions based on rate limits

  • Monday, August 1, 2016
  • by markitosgv
  • Repository
  • 3 Watchers
  • 2 Stars
  • 185 Installations
  • PHP
  • 0 Dependents
  • 0 Suggesters
  • 0 Forks
  • 1 Open issues
  • 2 Versions
  • 10 % Grown

The README.md

InstasentRateLimitBundle

Build Status Code Coverage Scrutinizer Code Quality, (*1)

Latest Stable Version Total Downloads Latest Unstable Version License, (*2)

This bundle provides enables the @RateLimit annotation which allows you to limit the number of connections to actions. This is mostly useful in APIs., (*3)

The bundle is prepared to work by default in cooperation with the FOSOAuthServerBundle. It contains a listener that adds the OAuth token to the cache-key. However, you can create your own key generator to allow custom rate limiting based on the request. See Create a custom key generator below., (*4)

This bundle is partially inspired by a GitHub gist from Ruud Kamphuis: https://gist.github.com/ruudk/3350405, (*5)

Features

  • Simple usage through annotations
  • Customize rates per controller, action and even per HTTP method
  • Multiple storage backends: Redis, Memcached and Doctrine cache

Installation

Installation takes just few easy steps:, (*6)

Step 1: Add the bundle to your composer.json

If you're not yet familiar with Composer see http://getcomposer.org. Add the InstasentRateLimitBundle in your composer.json:, (*7)

{
    "require": {
        "Instasent/ratelimit-bundle": "1.x"
    }
}

Now tell composer to download the bundle by running the command:, (*8)

``` bash php composer.phar update Instasent/ratelimit-bundle, (*9)


### Step 2: Enable the bundle Enable the bundle in the kernel: ``` php <?php // app/AppKernel.php public function registerBundles() { $bundles = array( // ... new Instasent\RateLimitBundle\InstasentRateLimitBundle(), ); }

Step 3: Install a storage engine

Redis

If you want to use Redis as your storage engine, you will need to install SncRedisBundle:, (*10)

  • https://github.com/snc/SncRedisBundle

Memcache

If you want to use Memcache, you need to install LswMemcacheBundle, (*11)

  • https://github.com/LeaseWeb/LswMemcacheBundle

Doctrine cache

If you want to use Doctrine cache as your storage engine, you will need to install DoctrineCacheBundle:, (*12)

  • https://github.com/doctrine/DoctrineCacheBundle

Referer to their documentations for more details. You can change your storage engine with the storage_engine configuration parameter. See Configuration reference., (*13)

Configuration

Enable bundle only in production

If you wish to enable the bundle only in production environment (so you can test without worrying about limit in your development environments), you can use the enabled configuration setting to enable/disable the bundle completely. It's enabled by default:, (*14)

# config_dev.yml
instasent_rate_limit:
    enabled: false

Configuration reference

This is the default bundle configuration:, (*15)

instasent_rate_limit:
    enabled:              true

    # The storage engine where all the rates will be stored
    storage_engine:       ~ # One of "redis"; "memcache"; "doctrine"

    # The redis client to use for the redis storage engine
    redis_client:         default_client

    # The memcache client to use for the memcache storage engine
    memcache_client:      default

    # The Doctrine Cache provider to use for the doctrine storage engine
    doctrine_provider:    null # Example: my_apc_cache

    # The HTTP status code to return when a client hits the rate limit
    rate_response_code:   429

    # Optional exception class that will be returned when a client hits the rate limit
    rate_response_exception:  null

    # The HTTP message to return when a client hits the rate limit
    rate_response_message:  'You exceeded the rate limit'

    # Should the ratelimit headers be automatically added to the response?
    display_headers:      true

    # What are the different header names to add
    headers:
        limit:                X-RateLimit-Limit
        remaining:            X-RateLimit-Remaining
        reset:                X-RateLimit-Reset

    # Rate limits for paths
    path_limits:
        path:                 ~ # Required
        methods:

            # Default:
            - *
        limit:                ~ # Required
        period:               ~ # Required

Usage

Simple rate limiting

To enable rate limiting, you only need to add the annotation to the docblock of the specified action, (*16)

<?php

use Instasent\RateLimitBundle\Annotation\RateLimit;
use Sensio\Bundle\FrameworkExtraBundle\Configuration\Route;

/**
 * @Route(...)
 *
 * @RateLimit(limit=1000, period=3600)
 */
public function someApiAction()
{
}

Limit per method

It's possible to rate-limit specific HTTP methods as well. This can be either a string or an array of methods. When no method argument is given, all other methods not defined are rated. This allows to add a default rate limit if needed., (*17)

<?php

use Instasent\RateLimitBundle\Annotation\RateLimit;
use Sensio\Bundle\FrameworkExtraBundle\Configuration\Route;

/**
 * @Route(...)
 *
 * @RateLimit(methods={"PUT", "POST"}, limit=1000, period=3600)
 * @RateLimit(methods={"GET"}, limit=1000, period=3600)
 * @RateLimit(limit=5000, period=3600)
 */
public function someApiAction()
{
}

Limit per controller

It's also possible to add rate-limits to a controller class instead of a single action. This will act as a default rate limit for all actions, except the ones that actually defines a custom rate-limit., (*18)

<?php

use Instasent\RateLimitBundle\Annotation\RateLimit;
use Sensio\Bundle\FrameworkExtraBundle\Configuration\Route;

/**
 * @Ratelimit(methods={"POST"}, limit=100, period=10); // 100 POST requests per 10 seconds
 */
class DefaultController extends Controller
{
    /**
     * @ratelimit(method="POST", limit=200, period=10); // 200 POST requests to indexAction allowed.
     */
    public function indexAction()
    {
    }
}

Create a custom key generator

If you need to create a custom key generator, you need to register a listener to listen to the ratelimit.generate.key event:, (*19)

services:
    mybundle.listener.rate_limit_generate_key:
        class: MyBundle\Listener\RateLimitGenerateKeyListener
        tags:
            - { name: kernel.event_listener, event: 'ratelimit.generate.key', method: 'onGenerateKey' }
<?php

namespace MyBundle\Listener;

use Instasent\RateLimitBundle\Events\GenerateKeyEvent;

class RateLimitGenerateKeyListener
{
    public function onGenerateKey(GenerateKeyEvent $event)
    {
        $key = $this->generateKey();

        $event->addToKey($key);
        // $event->setKey($key); // to overwrite key completely
    }
}

Make sure to generate a key based on what is rate limited in your controllers., (*20)

Set custom period or limit

If you need to create a custom period/limit based for example on client settings saved in database, you need to register a listener to listen to the ratelimit.pre.create event:, (*21)

services:
    mybundle.listener.rate_limit_pre_create:
        class: MyBundle\Listener\RateLimitFromDatabaseListener
        tags:
            - { name: kernel.event_listener, event: 'ratelimit.pre.create', method: 'findUserLimit' }
<?php

namespace MyBundle\Listener;

use Instasent\RateLimitBundle\Events\RateLimit;

class RateLimitFromDatabaseListener
{
    public function findUserLimit(RateLimit $event)
    {

        //TODO search value in database
        $event->setLimit($value);
    }
}

Set your own limit value, (*22)

Throwing exceptions

Instead of returning a Response object when a rate limit has exceeded, it's also possible to throw an exception. This allows you to easily handle the rate limit on another level, for instance by capturing the kernel.exception event., (*23)

Running tests

If you want to run the tests use:, (*24)

./vendor/bin/phpunit ./Tests

The Versions

01/08 2016

dev-master

9999999-dev

This bundle provides functionality to limit calls to actions based on rate limits

  Sources   Download

MIT

The Requires

 

The Development Requires

api rest x-rate-limit

01/08 2016

v0.1.0

0.1.0.0

This bundle provides functionality to limit calls to actions based on rate limits

  Sources   Download

MIT

The Requires

 

The Development Requires

api rest x-rate-limit