All Projects → oak-labs-io → phalcon-throttler

oak-labs-io / phalcon-throttler

Licence: MIT license
Phalcon Throttler is a Rate Limiter for the PHP Phalcon Framework.

Programming Languages

PHP
23972 projects - #3 most used programming language

Projects that are alternatives of or similar to phalcon-throttler

adaptive throttler
manages multiple throttlers with ability to ramp up and down
Stars: ✭ 31 (+63.16%)
Mutual labels:  rate-limiting, rate-limiter, throttler
rush
rush.readthedocs.io/en/latest/
Stars: ✭ 42 (+121.05%)
Mutual labels:  rate-limiting, rate-limiter, throttler
portara-website
Portara dashboard controller to change rate limit settings without redeploying your app
Stars: ✭ 42 (+121.05%)
Mutual labels:  rate-limiter, throttler
limitrr-php
Better PHP rate limiting using Redis.
Stars: ✭ 19 (+0%)
Mutual labels:  rate-limiting, rate-limiter
kong-scalable-rate-limiter
Kong plugin for Rate Limiting at high throughputs.
Stars: ✭ 19 (+0%)
Mutual labels:  rate-limiting, rate-limiter
zlimiter
A toolkit for rate limite,support memory and redis
Stars: ✭ 17 (-10.53%)
Mutual labels:  rate-limiting, rate-limiter
php-ratelimiter
A framework independent rate limiter for PHP
Stars: ✭ 59 (+210.53%)
Mutual labels:  rate-limiter, throttler
Bucket4j
Java rate limiting library based on token/leaky-bucket algorithm.
Stars: ✭ 1,025 (+5294.74%)
Mutual labels:  rate-limiting, rate-limiter
Redis Ratelimit
A fixed window rate limiter based on Redis
Stars: ✭ 15 (-21.05%)
Mutual labels:  rate-limiting, rate-limiter
Gubernator
High Performance Rate Limiting MicroService and Library
Stars: ✭ 609 (+3105.26%)
Mutual labels:  rate-limiting, rate-limiter
Hammer
An Elixir rate-limiter with pluggable backends
Stars: ✭ 366 (+1826.32%)
Mutual labels:  rate-limiting, rate-limiter
Guzzle Advanced Throttle
A Guzzle middleware that can throttle requests according to (multiple) defined rules. It is also possible to define a caching strategy, e.g. get the response from cache when the rate limit is exceeded or always get a cached value to spare your rate limits. Using wildcards in host names is also supported.
Stars: ✭ 120 (+531.58%)
Mutual labels:  rate-limiting, rate-limiter
Bottleneck
Job scheduler and rate limiter, supports Clustering
Stars: ✭ 1,113 (+5757.89%)
Mutual labels:  rate-limiting, rate-limiter
gentle-force
Brute-force, error and request rate limiting
Stars: ✭ 45 (+136.84%)
Mutual labels:  rate-limiting, rate-limiter
EnumerableAsyncProcessor
Process Multiple Asynchronous Tasks in Various Ways - One at a time / Batched / Rate limited / Concurrently
Stars: ✭ 84 (+342.11%)
Mutual labels:  rate-limiting
x-api
phalcon搭建的基础php结构
Stars: ✭ 27 (+42.11%)
Mutual labels:  phalcon
flume
A blazing fast job processing system backed by GenStage & Redis.
Stars: ✭ 37 (+94.74%)
Mutual labels:  rate-limiting
falconplus
falconplus - for phalcon+plus
Stars: ✭ 14 (-26.32%)
Mutual labels:  phalcon
nestjs-ratelimiter
Distributed consistent flexible NestJS rate limiter based on Redis
Stars: ✭ 49 (+157.89%)
Mutual labels:  rate-limiter
gcra-ruby
Generic cell rate algorithm (leaky bucket) implementation for rate limiting
Stars: ✭ 49 (+157.89%)
Mutual labels:  rate-limiting

Throttler

License Latest Stable Version Latest Unstable Version Build Status

Introduction

Phalcon Throttler is a Rate Limiter for PHP Phalcon Framework.

It provides a simple interface to build Rate Limiters using various strategies as well as with a Redis Throttler ready out of the box.

PHP 7.1+ and Phalcon 3.1.2+ are required.

Installation

Throttler can be installed through Composer, just include "oaklabs/phalcon-throttler": "^0.1" to your composer.json and run composer update or composer install.

Usage

Throttling

Phalcon Throttler comes shipped with a Redis throttler by default. It uses PhpRedis to communicate with the Redis server.

First of all we need a Redis instance. We can then add a redis service in the Phalcon Dependency Injection container

$di->setShared('redis', function () use ($config) {
    $redis = new \Redis();
    $redis->pconnect($config->redis->host, $config->redis->port);
    $redis->auth($config->redis->password);

    return $redis;
});

so that it can be used when we want to create an instance of the Redis Throttler. We can set it up in the Dependency Injection container as well

$di->setShared('throttler',function() use ($di) {
    return new OakLabs\PhalconThrottler\RedisThrottler($di->get('redis'), [
        'bucket_size'  => 20,
        'refill_time'  => 600, // 10m
        'refill_amount'  => 10
    ]);
});

The second parameter allows to configure the behaviour of the Throttler:

  • bucket_size: the number of allowed hits in the period of time of reference
  • refill_time: the amount of time after that the counter will completely or partially reset
  • refill_amount: the number of hits to be reset every time the refill_time passes

You are now able to successfully throttle users:

$throttler = $this->getDI()->get('throttler');
$rateLimit = $throttler->consume($this->request->getClientAddress());

if ($rateLimit->isLimited()) {
    // Do something
}

Strategies

The only question left is: which one is the appropriate place where the check should be performed?

There is of course not an uniquely valid answer, several places can be used.

Check in the dispatcher

A good strategy is to put the check during the Phalcon dispatcher lifecycle.

In the dependency injection we can use the Phalcon Event Manager to listen to the dispatcher event and bind it to some Security plugin

$di->setShared('eventsManager',function() use ($di) {
    $eventsManager = new \Phalcon\Events\Manager();
    return $eventsManager;
});

$di->set('dispatcher', function () use ($di) {
    //Create an EventsManager
    $eventsManager = $di->getShared('eventsManager');

    $security = new \MyNamespace\Security();
    $eventsManager->attach('dispatch', $security);

    $dispatcher = new \Phalcon\Mvc\Dispatcher();
    $dispatcher->setEventsManager($eventsManager);

    return $dispatcher;
});

and put our Rate Limiter in it

<?php

namespace MyNamespace;

use Phalcon\Events\Event;
use Phalcon\Mvc\User\Plugin;
use Phalcon\Mvc\Dispatcher;
use OakLabs\PhalconThrottler\ThrottlerInterface;

class Security extends Plugin
{
    public function beforeDispatch(Event $event, Dispatcher $dispatcher)
    {
        /** @var ThrottlerInterface $throttler */
        $throttler = $this->getDI()->get('throttler');
        $rateLimit = $throttler->consume($this->request->getClientAddress());

        if ($rateLimit->isLimited()) {
            $dispatcher->forward(
                [
                    'namespace' => 'MyNamespace\Http',
                    'controller' => 'error',
                    'action' => 'ratelimited',
                    'params' => $rateLimit->toArray()
                ]
            );
        }
    }
}

and finally perform a redirection in case the User gets rate limited. The information returned by the $rateLimit->toArray() method contains:

[
    'hits' => (int) // Number of hits in the reference period,
    'remaining' =>(int) // Remaining hits before getting rate limited,
    'period' => (int) // Reference period in seconds,
    'hits_per_period' => (int) // Allowed number of hits in the reference period,
    'warning' => (bool) // Whether a warning has been emitted,
    'limited' => (bool) // Whether the User is rate limited
]

Contribution guidelines

Throttler follows PSR-1, PSR-2 and PSR-4 PHP coding standards, and semantic versioning.

Pull requests are welcome.

License

Throttler is free software distributed under the terms of the MIT license.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].