Rate Limiting
A common technique to protect applications from brute-force attacks is rate-limiting. To get started, you'll need to install the @nestjs/throttler
package.
$ npm i --save @nestjs/throttler
Once the installation is complete, the ThrottlerModule
can be configured as any other Nest package with forRoot
or forRootAsync
methods.
@Module({
imports: [
ThrottlerModule.forRoot({
throttlers: [
{
ttl: 60000,
limit: 10,
},
],
}),
],
})
export class AppModule {}
The above will set the global options for the ttl
, the time to live in milliseconds, and the limit
, the maximum number of requests within the ttl, for the routes of your application that are guarded.
Once the module has been imported, you can then choose how you would like to bind the ThrottlerGuard
. Any kind of binding as mentioned in the guards section is fine. If you wanted to bind the guard globally, for example, you could do so by adding this provider to any module:
{
provide: APP_GUARD,
useClass: ThrottlerGuard
}
Multiple Throttler Definitions#
There may come upon times where you want to set up multiple throttling definitions, like no more than 3 calls in a second, 20 calls in 10 seconds, and 100 calls in a minute. To do so, you can set up your definitions in the array with named options, that can later be referenced in the @SkipThrottle()
and @Throttle()
decorators to change the options again.
@Module({
imports: [
ThrottlerModule.forRoot([
{
name: 'short',
ttl: 1000,
limit: 3,
},
{
name: 'medium',
ttl: 10000,
limit: 20
},
{
name: 'long',
ttl: 60000,
limit: 100
}
]),
],
})
export class AppModule {}
Customization#
There may be a time where you want to bind the guard to a controller or globally, but want to disable rate limiting for one or more of your endpoints. For that, you can use the @SkipThrottle()
decorator, to negate the throttler for an entire class or a single route. The @SkipThrottle()
decorator can also take in an object of string keys with boolean values for if there is a case where you want to exclude most of a controller, but not every route, and configure it per throttler set if you have more than one. If you do not pass an object, the default is to use { default: true }
@SkipThrottle()
@Controller('users')
export class UsersController {}
This @SkipThrottle()
decorator can be used to skip a route or a class or to negate the skipping of a route in a class that is skipped.
@SkipThrottle()
@Controller('users')
export class UsersController {
// Rate limiting is applied to this route.
@SkipThrottle({ default: false })
dontSkip() {
return 'List users work with Rate limiting.';
}
// This route will skip rate limiting.
doSkip() {
return 'List users work without Rate limiting.';
}
}
There is also the @Throttle()
decorator which can be used to override the limit
and ttl
set in the global module, to give tighter or looser security options. This decorator can be used on a class or a function as well. With version 5 and onwards, the decorator takes in an object with the string relating to the name of the throttler set, and an object with the limit and ttl keys and integer values, similar to the options passed to the root module. If you do not have a name set in your original options, use the string default
You have to configure it like this:
// Override default configuration for Rate limiting and duration.
@Throttle({ default: { limit: 3, ttl: 60000 } })
@Get()
findAll() {
return "List users works with custom rate limiting.";
}
Proxies#
If your application is running behind a proxy server, it’s essential to configure the HTTP adapter to trust the proxy. You can refer to the specific HTTP adapter options for Express and Fastify to enable the trust proxy
setting.
Here's an example that demonstrates how to enable trust proxy
for the Express adapter:
import { NestFactory } from '@nestjs/core';
import { AppModule } from './app.module';
import { NestExpressApplication } from '@nestjs/platform-express';
async function bootstrap() {
const app = await NestFactory.create<NestExpressApplication>(AppModule);
app.set('trust proxy', 'loopback'); // Trust requests from the loopback address
await app.listen(3000);
}
bootstrap();
import { NestFactory } from '@nestjs/core';
import { AppModule } from './app.module';
import { NestExpressApplication } from '@nestjs/platform-express';
async function bootstrap() {
const app = await NestFactory.create(AppModule);
app.set('trust proxy', 'loopback'); // Trust requests from the loopback address
await app.listen(3000);
}
bootstrap();
Enabling trust proxy
allows you to retrieve the original IP address from the X-Forwarded-For
header. You can also customize the behavior of your application by overriding the getTracker()
method to extract the IP address from this header instead of relying on req.ip
. The following example demonstrates how to achieve this for both Express and Fastify:
import { ThrottlerGuard } from '@nestjs/throttler';
import { Injectable } from '@nestjs/common';
@Injectable()
export class ThrottlerBehindProxyGuard extends ThrottlerGuard {
protected async getTracker(req: Record<string, any>): Promise<string> {
return req.ips.length ? req.ips[0] : req.ip; // individualize IP extraction to meet your own needs
}
}
Hint You can find the API of the req
Request object for express here and for fastify here.
Websockets#
This module can work with websockets, but it requires some class extension. You can extend the ThrottlerGuard
and override the handleRequest
method like so:
@Injectable()
export class WsThrottlerGuard extends ThrottlerGuard {
async handleRequest(requestProps: ThrottlerRequest): Promise<boolean> {
const {
context,
limit,
ttl,
throttler,
blockDuration,
getTracker,
generateKey,
} = requestProps;
const client = context.switchToWs().getClient();
const tracker = client._socket.remoteAddress;
const key = generateKey(context, tracker, throttler.name);
const { totalHits, timeToExpire, isBlocked, timeToBlockExpire } =
await this.storageService.increment(
key,
ttl,
limit,
blockDuration,
throttler.name,
);
const getThrottlerSuffix = (name: string) =>
name === 'default' ? '' : `-${name}`;
// Throw an error when the user reached their limit.
if (isBlocked) {
await this.throwThrottlingException(context, {
limit,
ttl,
key,
tracker,
totalHits,
timeToExpire,
isBlocked,
timeToBlockExpire,
});
}
return true;
}
}
Hint If you are using ws, it is necessary to replace the_socket
withconn
There's a few things to keep in mind when working with WebSockets:
- Guard cannot be registered with the
APP_GUARD
orapp.useGlobalGuards()
- When a limit is reached, Nest will emit an
exception
event, so make sure there is a listener ready for this
Hint If you are using the@nestjs/platform-ws
package you can useclient._socket.remoteAddress
instead.
GraphQL#
The ThrottlerGuard
can also be used to work with GraphQL requests. Again, the guard can be extended, but this time the getRequestResponse
method will be overridden
@Injectable()
export class GqlThrottlerGuard extends ThrottlerGuard {
getRequestResponse(context: ExecutionContext) {
const gqlCtx = GqlExecutionContext.create(context);
const ctx = gqlCtx.getContext();
return { req: ctx.req, res: ctx.res };
}
}
Configuration#
The following options are valid for the object passed to the array of the ThrottlerModule
's options:
name | the name for internal tracking of which throttler set is being used. Defaults to `default` if not passed |
ttl | the number of milliseconds that each request will last in storage |
limit | the maximum number of requests within the TTL limit |
blockDuration | the number of milliseconds that request will be blocked for that time |
ignoreUserAgents | an array of regular expressions of user-agents to ignore when it comes to throttling requests |
skipIf | a function that takes in the ExecutionContext and returns a boolean to short circuit the throttler logic. Like @SkipThrottler() , but based on the request |
If you need to set up storage instead, or want to use some of the above options in a more global sense, applying to each throttler set, you can pass the options above via the throttlers
option key and use the below table
storage | a custom storage service for where the throttling should be kept track. See here. |
ignoreUserAgents | an array of regular expressions of user-agents to ignore when it comes to throttling requests |
skipIf | a function that takes in the ExecutionContext and returns a boolean to short circuit the throttler logic. Like @SkipThrottler() , but based on the request |
throttlers | an array of throttler sets, defined using the table above |
errorMessage | a string OR a function that takes in the ExecutionContext and the ThrottlerLimitDetail and returns a string which overrides the default throttler error message |
getTracker | a function that takes in the Request and returns a string to override the default logic of the getTracker method |
generateKey | a function that takes in the ExecutionContext , the tacker string and the throttler name as a string and returns a string to override the final key which will be used to store the rate limit value. This overrides the default logic of the generateKey method |
Async Configuration#
You may want to get your rate-limiting configuration asynchronously instead of synchronously. You can use the forRootAsync()
method, which allows for dependency injection and async
methods.
One approach would be to use a factory function:
@Module({
imports: [
ThrottlerModule.forRootAsync({
imports: [ConfigModule],
inject: [ConfigService],
useFactory: (config: ConfigService) => [
{
ttl: config.get('THROTTLE_TTL'),
limit: config.get('THROTTLE_LIMIT'),
},
],
}),
],
})
export class AppModule {}
You can also use the useClass
syntax:
@Module({
imports: [
ThrottlerModule.forRootAsync({
imports: [ConfigModule],
useClass: ThrottlerConfigService,
}),
],
})
export class AppModule {}
This is doable, as long as ThrottlerConfigService
implements the interface ThrottlerOptionsFactory
.
Storages#
The built in storage is an in memory cache that keeps track of the requests made until they have passed the TTL set by the global options. You can drop in your own storage option to the storage
option of the ThrottlerModule
so long as the class implements the ThrottlerStorage
interface.
For distributed servers you could use the community storage provider for Redis to have a single source of truth.
NoteThrottlerStorage
can be imported from@nestjs/throttler
.
Time Helpers#
There are a couple of helper methods to make the timings more readable if you prefer to use them over the direct definition. @nestjs/throttler
exports five different helpers, seconds
, minutes
, hours
, days
, and weeks
. To use them, simply call seconds(5)
or any of the other helpers, and the correct number of milliseconds will be returned.
Migration Guide#
For most people, wrapping your options in an array will be enough.
If you are using a custom storage, you should wrap your ttl
and limit
in an
array and assign it to the throttlers
property of the options object.
Any @ThrottleSkip()
should now take in an object with string: boolean
props.
The strings are the names of the throttlers. If you do not have a name, pass the
string 'default'
, as this is what will be used under the hood otherwise.
Any @Throttle()
decorators should also now take in an object with string keys,
relating to the names of the throttler contexts (again, 'default'
if no name)
and values of objects that have limit
and ttl
keys.
Important Thettl
is now in milliseconds. If you want to keep your ttl in seconds for readability, use theseconds
helper from this package. It just multiplies the ttl by 1000 to make it in milliseconds.
For more info, see the Changelog