Skip to main content

Rate Limiting

Forja uses Redis-backed fixed-window counters for rate limiting. Rate limiting operates at two levels: per-IP (global) and per-API-key (individual). If Redis is unavailable, the behavior depends on the configured fail mode (open or closed).

How It Works

Rate limiting is enforced inside the authentication guard, after the API key or JWT has been validated but before the handler runs. The flow is:

Request authenticated


┌───────────────────┐
│ Redis available? │──── No ──▶ fail mode = "open"? Allow : 429
└───────┬───────────┘
│ Yes

┌───────────────────────────┐
│ Resolve client IP │ (uses X-Forwarded-For / X-Real-IP
│ (proxy-aware extraction) │ when TRUST_PROXY_HEADERS=true)
└───────┬───────────────────┘

┌───────────────────┐
│ IP is loopback? │──── Yes ───▶ Skip IP rate limit
│ (127.0.0.1/::1) │
└───────┬───────────┘
│ No

┌───────────────────┐
│ Check IP-based │──── Exceeded? ────▶ 429 Too Many Requests
│ rate limit │
└───────┬───────────┘
│ OK

┌───────────────────┐
│ Check per-key │──── Exceeded? ────▶ 429 Too Many Requests
│ rate limit │
└───────┬───────────┘
│ OK

Handler executes

Fixed-Window Counters

Each rate limit window is tracked with a Redis key following the pattern:

rl:<identifier>:<window>:<window_id>

Where:

  • <identifier> is ip:<address> or key:<uuid>
  • <window> is s (second), m (minute), h (hour), or d (day)
  • <window_id> is now / window_duration (epoch-based window number)

For example, a per-minute counter for IP 192.168.1.100 at timestamp 1709136060:

rl:ip:192.168.1.100:m:28485601

Counting Logic

  1. INCR the Redis key (atomic increment, returns new count).
  2. If the count is 1 (first request in window), EXPIRE the key with the window duration as TTL.
  3. If the count exceeds the limit, return 429 Too Many Requests.
  4. If Redis returns an error at any step, behavior depends on the fail mode: fail-open (default) logs a warning and allows the request; fail-closed rejects with 429.

This approach is simple, atomic (INCR is a single Redis command), and self-cleaning (keys expire automatically).

IP-Based Rate Limiting

Global rate limits apply to all requests from a given IP address, regardless of which API key is used. These limits are configured at the application level.

Default Limits

WindowDefault LimitEnvironment Variable
Per second50APP__SECURITY__RATE_LIMIT_PER_SECOND
Per minute500APP__SECURITY__RATE_LIMIT_PER_MINUTE

Exemptions

Loopback addresses (127.0.0.1, ::1, localhost) are exempt from IP-based rate limiting. This prevents development environments from being throttled.

Client IP Extraction Behind Proxies

When running behind a reverse proxy (nginx, Caddy, HAProxy), all connections appear to come from 127.0.0.1, which would bypass IP-based rate limiting via the loopback exemption.

To handle this, set TRUST_PROXY_HEADERS=true. When enabled, Forja extracts the real client IP from:

  1. X-Forwarded-For header (first entry) — standard proxy header
  2. X-Real-IP header — single-IP header set by nginx

Only enable this when running behind a trusted proxy. Without a proxy, clients could forge these headers to rotate their apparent IP and bypass rate limiting.

Per-Key Rate Limiting

Individual API keys can have custom rate limits configured in the api_keys table:

FieldPurpose
rate_limit_per_secondMax requests per second for this key
rate_limit_per_minuteMax requests per minute for this key
rate_limit_per_hourMax requests per hour for this key
rate_limit_per_dayMax requests per day for this key

All four fields are optional. If a field is NULL or 0, that window is not enforced for the key.

Per-key limits are checked after global IP limits. Both must pass for the request to proceed.

Response Headers

Every response includes rate limit headers (when Redis is available):

X-RateLimit-Limit: 500
X-RateLimit-Remaining: 487
X-RateLimit-Reset: 42
HeaderDescription
X-RateLimit-LimitThe limit for the most restrictive applicable window
X-RateLimit-RemainingRemaining requests in that window
X-RateLimit-ResetSeconds until the window resets

The "most restrictive" window is determined by whichever window has the lowest remaining-to-limit ratio. This ensures clients see the most relevant throttling information.

Implementation Detail

Rate limit header values are stored in a request-scoped RateLimitHeaders extension (held inside Arc<...> on the request) using atomic integers (AtomicU32 / AtomicU64). The auth extractor populates these atomics during handler dispatch, and the rate_limit_headers tower layer reads them on the response path when constructing the X-RateLimit-* headers.

pub struct RateLimitHeaderInfo {
pub limit: AtomicU32,
pub remaining: AtomicU32,
pub reset: AtomicU64,
}

Error Response

When a rate limit is exceeded, the API returns a 429 Too Many Requests response with an RFC 7807 Problem Details body:

{
"type": "https://forja.dev/errors/rate_limited",
"title": "Rate Limited",
"status": 429,
"detail": "Rate limit exceeded: 51 requests per second exceeded (limit: 50)",
"code": "RATE_LIMITED"
}

Graceful Degradation

Rate limiting behavior when Redis is unavailable is controlled by the RATE_LIMIT_FAIL_MODE setting:

Fail-Open (default)

  • At startup: The application logs a warning and starts without rate limiting.
  • During operation: If a Redis command fails, the request is allowed through and a warning is logged.
  • No data loss: Rate limits are ephemeral counters, so Redis restarts simply reset all windows.

This ensures that a Redis outage does not cause a service-wide outage.

Fail-Closed

  • At startup: The application starts normally (rate limiting begins once Redis connects).
  • During operation: If a Redis command fails, the request is rejected with 429 Too Many Requests and an error is logged.

This ensures that no requests bypass rate limiting, at the cost of availability during Redis outages. Choose this mode for high-security deployments.

Configuration Summary

Environment VariablePurposeDefault
REDIS_URLRedis connection stringredis://127.0.0.1:6379
APP__SECURITY__RATE_LIMIT_PER_SECONDGlobal per-IP requests/second50
APP__SECURITY__RATE_LIMIT_PER_MINUTEGlobal per-IP requests/minute500
APP__SECURITY__RATE_LIMIT_BURSTBurst size (max concurrent)20
RATE_LIMIT_FAIL_MODEBehavior when Redis is down: open or closedopen
TRUST_PROXY_HEADERSUse X-Forwarded-For/X-Real-IP for client IPfalse