node-rate-limiter-flexible
Flexible rate limiter and anti-DDoS protector works in process
Memory, Cluster, MongoDB or Redis allows to control requests rate in single process or distributed environment.
It uses fixed window as it is much faster than rolling window.
See comparative benchmarks with other libraries here
Advantages:
- in-memory block strategy against really powerful DDoS attacks (like 100k requests per sec) Read about it and benchmarking here
- backed on native Promises
- works in Cluster without additional software See RateLimiterCluster benchmark and detailed description here
- actions can be done evenly over duration window to cut off picks
- no race conditions
- covered by tests
- no prod dependencies
- Redis and Mongo errors don't result to broken app if
insuranceLimiter
set up - useful
block
, penalty
and reward
methods
Links
Benchmark
Average latency of pure NodeJS endpoint limited by (all set up on one server):
1. Memory 0.34 ms
2. Cluster 0.69 ms
3. Redis 2.45 ms
4. Mongo 4.75 ms
RateLimiterRedis benchmark
Endpoint is pure NodeJS endpoint launched in node:latest
and redis:alpine
Docker containers by PM2 with 4 workers
By bombardier -c 1000 -l -d 30s -r 2000 -t 5s http://127.0.0.1:8000
Test with 1000 concurrent requests with maximum 2000 requests per sec during 30 seconds
Statistics Avg Stdev Max
Reqs/sec 2015.20 511.21 14570.19
Latency 2.45ms 7.51ms 138.41ms
Latency Distribution
50% 1.95ms
75% 2.16ms
90% 2.43ms
95% 2.77ms
99% 5.73ms
HTTP codes:
1xx - 0, 2xx - 53556, 3xx - 0, 4xx - 6417, 5xx - 0
Installation
npm i rate-limiter-flexible
Usage
RateLimiterRedis
It supports both redis
and ioredis
clients.
Redis client must be created with offline queue switched off.
const redis = require('redis');
const redisClient = redis.createClient({ enable_offline_queue: false });
const Redis = require('ioredis');
const redisClient = new Redis({
options: {
enableOfflineQueue: false
}
});
const { RateLimiterRedis, RateLimiterMemory } = require('rate-limiter-flexible');
redisClient.on('error', (err) => {
});
const opts = {
redis: redisClient,
points: 5,
duration: 5,
execEvenly: false,
blockDuration: 0,
keyPrefix: 'rlflx',
inmemoryBlockOnConsumed: 10,
inmemoryBlockDuration: 30,
insuranceLimiter: new RateLimiterMemory(
{
points: 1,
duration: 5,
execEvenly: false,
})
};
const rateLimiterRedis = new RateLimiterRedis(opts);
rateLimiterRedis.consume(remoteAddress)
.then((rateLimiterRes) => {
rateLimiterRedis.penalty(remoteAddress, 3)
.then((rateLimiterRes) => {});
rateLimiterRedis.reward(remoteAddress, 2)
.then((rateLimiterRes) => {});
})
.catch((rejRes) => {
if (rejRes instanceof Error) {
} else {
const secs = Math.round(rejRes.msBeforeNext / 1000) || 1;
res.set('Retry-After', String(secs));
res.status(429).send('Too Many Requests');
}
});
RateLimiterMongo
It supports mongodb
native and mongoose
packages
See RateLimiterMongo benchmark here
const { RateLimiterMongo } = require('rate-limiter-flexible');
const mongoose = require('mongoose');
const mongoOpts = {
reconnectTries: Number.MAX_VALUE,
reconnectInterval: 100,
};
mongoose.createConnection('mongodb://localhost:27017/' + RateLimiterMongo.getDbName(), mongoOpts)
.then((mongo) => {
const opts = {
mongo: mongo,
points: 10,
duration: 1,
};
const rateLimiterMongo = new RateLimiterMongo(opts);
});
const { MongoClient } = require('mongodb');
const mongoOpts = {
useNewUrlParser: true,
reconnectTries: Number.MAX_VALUE,
reconnectInterval: 100,
};
MongoClient.connect(
'mongodb://localhost:27017',
mongoOpts
).then((mongo) => {
const opts = {
mongo: mongo,
points: 10,
duration: 1,
};
const rateLimiterMongo = new RateLimiterMongo(opts);
rateLimiterMongo.consume(remoteAddress)
.then(() => {})
.catch(() => {});
});
RateLimiterCluster
Note: it doesn't work with PM2 yet
RateLimiterCluster performs limiting using IPC.
Each request is sent to master process, which handles all the limits, then master send results back to worker.
See RateLimiterCluster benchmark and detailed description here
const cluster = require('cluster');
const numCPUs = require('os').cpus().length;
const { RateLimiterClusterMaster, RateLimiterCluster } = require('rate-limiter-flexible');
if (cluster.isMaster) {
new RateLimiterClusterMaster();
for (let i = 0; i < numCPUs; i++) {
cluster.fork();
}
} else {
const rateLimiter = new RateLimiterCluster({
keyPrefix: 'myclusterlimiter',
points: 100,
duration: 1,
timeoutMs: 3000
});
}
RateLimiterMemory
It manages limits in current process memory, so keep it in mind when use it in cluster
const rateLimiter = new RateLimiterMemory(
{
keyPrefix: 'rlflx',
points: 1,
duration: 5,
execEvenly: false,
});
RateLimiterUnion
Combine 2 or more rate limiters to act as single
Any rate limiters from this rate-limiter-flexible
can be united
Useful for authorization, which must be protected from password brute force
For example, not more than once per second and only 5 points per minute
keyPrefix
is necessary as resolved and rejected results depend on it
const limiter1 = new RateLimiterMemory({
keyPrefix: 'limit1',
points: 1,
duration: 1,
});
const limiter2 = new RateLimiterMemory({
keyPrefix: 'limit2',
points: 5,
duration: 60,
});
const rateLimiterUnion = new RateLimiterUnion(limiter1, limiter2);
rateLimiterUnion.consume(remoteAddress)
.then((res) => {
res['limit1'].remainingPoints;
res['limit2'].remainingPoints;
})
.catch((rej) => {
});
Express middleware
const rateLimiterMiddleware = (req, res, next) => {
rateLimiter.consume(req.connection.remoteAddress)
.then(() => {
next();
})
.catch((rejRes) => {
res.status(429).send('Too Many Requests');
});
};
Koa middleware
app.use(async (ctx, next) => {
try {
await rateLimiter.consume(ctx.ip)
next()
} catch (rejRes) {
ctx.status = 429
ctx.body = 'Too Many Requests'
}
})
Options
-
keyPrefix
Default: 'rlflx'
If you need to create several limiters for different purpose
-
points
Default: 4
Maximum number of points can be consumed over duration
-
duration
Default: 1
Number of seconds before consumed points are reset
-
execEvenly
Default: false
Delay action to be executed evenly over duration
First action in duration is executed without delay.
All next allowed actions in current duration are delayed by formula msBeforeDurationEnd / (remainingPoints + 2)
It allows to cut off load peaks.
Note: it isn't recommended to use it for long duration, as it may delay action for too long
-
blockDuration
Default: 0
If positive number and consumed more than points in current duration,
block for blockDuration
seconds.
Options specific to Redis and Mongo
-
inmemoryBlockOnConsumed
Default: 0
Against DDoS attacks. Blocked key isn't checked by requesting Redis or Mongo.
In-memory blocking works in current process memory.
Redis and Mongo are quite fast, however, they may be significantly slowed down on dozens of thousands requests.
-
inmemoryBlockDuration
Default: 0
Block key for inmemoryBlockDuration
seconds,
if inmemoryBlockOnConsumed
or more points are consumed
-
insuranceLimiter
Default: undefined
Instance of RateLimiterAbstract extended object to store limits,
when Redis comes up with any error.
Additional RateLimiterRedis or RateLimiterMemory can be used as insurance.
Be careful when use RateLimiterMemory in cluster or in distributed app.
It may result to floating number of allowed actions.
If an action with a same key
is launched on one worker several times in sequence,
limiter will reach out of points soon.
Omit it if you want strictly deal with store errors
Note: insuranceLimiter
automatically setup blockDuration
and execEvenly
to same values as in parent to avoid unexpected behaviour
Options specific to Cluster
timeoutMs
Default: 5000
Timeout for communication between worker and master over IPC.
If master doesn't response in time, promise is rejected with Error
API
RateLimiterRes object
Both Promise resolve and reject returns object of RateLimiterRes
class if there is no any error.
Object attributes:
RateLimiterRes = {
msBeforeNext: 250,
remainingPoints: 0,
consumedPoints: 5,
isFirstInDuration: false,
}
rateLimiter.consume(key, points = 1)
Returns Promise, which:
- resolved with
RateLimiterRes
when point(s) is consumed, so action can be done - rejected only for Redis and Mongo if
insuranceLimiter
isn't setup: when some error happened, where reject reason rejRes
is Error object - rejected only for RateLimiterCluster if
insuranceLimiter
isn't setup: when timeoutMs
exceeded, where reject reason rejRes
is Error object - rejected when there is no points to be consumed, where reject reason
rejRes
is RateLimiterRes
object - rejected when key is blocked (if block strategy is set up), where reject reason
rejRes
is RateLimiterRes
object
Arguments:
key
is usually IP address or some unique client idpoints
number of points consumed. default: 1
rateLimiter.penalty(key, points = 1)
Fine key
by points
number of points for one duration.
Note: Depending on time penalty may go to next durations
Returns Promise, which:
- resolved with
RateLimiterRes
- rejected only for Redis and Mongo if
insuranceLimiter
isn't setup: when some error happened, where reject reason rejRes
is Error object - rejected only for RateLimiterCluster if
insuranceLimiter
isn't setup: when timeoutMs
exceeded, where reject reason rejRes
is Error object
rateLimiter.reward(key, points = 1)
Reward key
by points
number of points for one duration.
Note: Depending on time reward may go to next durations
Returns Promise, which:
- resolved with
RateLimiterRes
- rejected only for RateLimiterRedis if
insuranceLimiter
isn't setup: when some Redis error happened, where reject reason rejRes
is Error object - rejected only for RateLimiterCluster if
insuranceLimiter
isn't setup: when timeoutMs
exceeded, where reject reason rejRes
is Error object
rateLimiter.block(key, secDuration)
Block key
for secDuration
seconds
Returns Promise, which:
- resolved with
RateLimiterRes
- rejected only for Redis and Mongo if
insuranceLimiter
isn't setup: when some error happened, where reject reason rejRes
is Error object - rejected only for RateLimiterCluster if
insuranceLimiter
isn't setup: when timeoutMs
exceeded, where reject reason rejRes
is Error object
Contribution
Make sure you've launched npm run eslint
before creating PR, all errors have to be fixed.
You can try to run npm run eslint-fix
to fix some issues.
Appreciated, feel free!