Metadata-Version: 2.4
Name: core-redis
Version: 1.2.0
Summary: This project/library contains common elements related to Redis integration...
Author-email: Alejandro Cora González <alek.cora.glez@gmail.com>
Maintainer: Alejandro Cora González
License-Expression: MIT
Project-URL: Homepage, https://gitlab.com/bytecode-solutions/core/core-redis
Project-URL: Repository, https://gitlab.com/bytecode-solutions/core/core-redis
Project-URL: Documentation, https://core-redis.readthedocs.io/en/latest/
Project-URL: Issues, https://gitlab.com/bytecode-solutions/core/core-redis/-/issues
Project-URL: Changelog, https://gitlab.com/bytecode-solutions/core/core-redis/-/blob/master/CHANGELOG.md
Classifier: Intended Audience :: Developers
Classifier: Development Status :: 5 - Production/Stable
Classifier: Topic :: Software Development :: Libraries :: Python Modules
Classifier: Topic :: Utilities
Classifier: Programming Language :: Python :: 3
Classifier: Programming Language :: Python :: 3 :: Only
Classifier: Programming Language :: Python :: 3.9
Classifier: Programming Language :: Python :: 3.10
Classifier: Programming Language :: Python :: 3.11
Classifier: Programming Language :: Python :: 3.12
Classifier: Programming Language :: Python :: 3.13
Classifier: Programming Language :: Python :: 3.14
Classifier: Programming Language :: Python :: Implementation :: PyPy
Requires-Python: >=3.9
Description-Content-Type: text/x-rst
License-File: LICENSE
Requires-Dist: core-mixins>=3.2.0
Requires-Dist: redis>=4.0.0
Provides-Extra: dev
Requires-Dist: core-dev-tools>=2.0.0; extra == "dev"
Requires-Dist: core-tests>=2.1.0; extra == "dev"
Dynamic: license-file

core-redis
===============================================================================

This project/library contains common elements related to Redis integration.

===============================================================================

.. image:: https://img.shields.io/pypi/pyversions/core-redis.svg
    :target: https://pypi.org/project/core-redis/
    :alt: Python Versions

.. image:: https://img.shields.io/badge/license-MIT-blue.svg
    :target: https://gitlab.com/bytecode-solutions/core/core-redis/-/blob/main/LICENSE
    :alt: License

.. image:: https://gitlab.com/bytecode-solutions/core/core-redis/badges/release/pipeline.svg
    :target: https://gitlab.com/bytecode-solutions/core/core-redis/-/pipelines
    :alt: Pipeline Status

.. image:: https://readthedocs.org/projects/core-redis/badge/?version=latest
    :target: https://readthedocs.org/projects/core-redis/
    :alt: Docs Status

.. image:: https://img.shields.io/badge/security-bandit-yellow.svg
    :target: https://github.com/PyCQA/bandit
    :alt: Security

|


Installation
===============================================================================

.. code-block:: bash

    pip install core-redis
    uv pip install core-redis  # or using UV


Features
===============================================================================

- ``RedisClient``: thin connection wrapper that decouples the ecosystem from
  the underlying ``redis`` library.
- ``cache_redis_based``: write-through caching decorator backed by Redis (L2)
  with an in-memory LRU as L1.
- ``FixedWindow``: fixed-window rate limiter backed by Redis.
- ``SlidingWindowLog``: sliding-window log rate limiter backed by Redis;
  eliminates the burst problem at the cost of per-request sorted-set writes.
- ``TokenBucket``: token-bucket rate limiter backed by Redis; supports bursts
  up to bucket capacity while enforcing a smooth long-term refill rate.
- ``LeakyBucket``: leaky-bucket rate limiter backed by Redis; enforces a
  strictly constant output rate by queuing requests and draining at a fixed
  leak rate.


RedisClient
===============================================================================

``RedisClient`` abstracts the ``redis`` library so the rest of the ecosystem
never imports it directly. The connection is created lazily on first use and
is thread-safe.

.. code-block:: python

    from core_redis import RedisClient

    client = RedisClient(host="localhost", port=6379, db=0)

    client.set("key", b"value", ex=60)        # store with 60 s TTL
    data  = client.get("key")                 # b"value" or None
    count = client.delete("key")              # 1
    n     = client.exists("key", "other")     # 0–N
    alive = client.ping()                     # True

Additional keyword arguments are forwarded verbatim to ``redis.Redis``
(e.g. ``ssl=True``, ``socket_timeout=5``).


cache_redis_based
===============================================================================

Write-through caching decorator: L1 is a bounded in-memory LRU; L2 is Redis.
TTL is handled natively by Redis (``SET … EX``), so no background threads or
manual expiry are needed.

.. code-block:: python

    from core_redis.decorators import cache_redis_based

    @cache_redis_based(
        key_prefix="myapp/",
        ttl=3600,
        redis_kwargs={"host": "localhost", "port": 6379},
    )
    def fetch_reference_data(dataset: str) -> dict:
        ...


Rate Limiters
===============================================================================

Rate-limiting algorithms that count requests in Redis and reject traffic once
a threshold is reached.  Each algorithm lives in ``core_redis.rate_limits``.


FixedWindow
-------------------------------------------------------------------------------

Divides time into fixed-size buckets and tracks a request counter per bucket.
A request is allowed while the counter is within *limit*; once the bucket
rolls over the counter resets.

.. code-block:: python

    from core_redis.rate_limits import FixedWindow

    limiter = FixedWindow(redis_kwargs={"host": "localhost", "port": 6379})
    allowed = limiter.is_allowed("user_123", limit=100, window=60)

The counter is incremented and the TTL is set in a single Redis pipeline call
(``INCR`` + ``EXPIRE``), keeping round-trips to one per request.

A common pattern is to guard outbound HTTP calls so a client never exceeds an
upstream API's rate limit:

.. code-block:: python

    import requests
    from core_redis.rate_limits import FixedWindow

    limiter = FixedWindow(redis_kwargs={"host": "localhost", "port": 6379})

    def call_api(user_id: str) -> None:
        if not limiter.is_allowed(user_id, limit=100, window=60):
            print(f"[{user_id}] BLOCKED —> rate limit exceeded")
            return

        response = requests.get("https://api.example.com/data", timeout=5)
        print(f"[{user_id}] {response.status_code}")

.. warning::

   **Burst problem**: because the window boundary is a hard reset, a client
   can send up to ``2 × limit`` requests in rapid succession by timing them
   around the window edge (*limit* at the end of window N, then *limit* at the
   start of window N+1). If smooth traffic enforcement is required, use a
   sliding-window or token-bucket algorithm instead.


SlidingWindowLog
-------------------------------------------------------------------------------

Stores a timestamp for every request in a Redis sorted set. On each call,
entries older than ``now − window`` are pruned before counting, so the window
always reflects exactly the last *window* seconds, the burst problem does not
occur.

Returns a ``(allowed, remaining)`` tuple so callers know how many slots are
left without a second round-trip.

.. code-block:: python

    from core_redis.rate_limits import SlidingWindowLog

    limiter = SlidingWindowLog(redis_kwargs={"host": "localhost", "port": 6379})
    allowed, remaining = limiter.is_allowed("user_123", limit=100, window=60)

    if not allowed:
        print("Rate limit exceeded")
    else:
        print(f"{remaining} requests remaining in this window")

The same HTTP-guard pattern works here:

.. code-block:: python

    import requests
    from core_redis.rate_limits import SlidingWindowLog

    limiter = SlidingWindowLog(redis_kwargs={"host": "localhost", "port": 6379})

    def call_api(user_id: str) -> None:
        allowed, remaining = limiter.is_allowed(user_id, limit=100, window=60)
        if not allowed:
            print(f"[{user_id}] BLOCKED —> rate limit exceeded")
            return

        response = requests.get("https://api.example.com/data", timeout=5)
        print(f"[{user_id}] {response.status_code}  ({remaining} remaining)")

.. note::

   **Trade-offs vs. FixedWindow**

   * **Accuracy**: no boundary artefacts; any *window*-second period contains
     at most *limit* requests.
   * **Memory**: stores up to *limit* timestamps per identifier instead of a
     single counter.
   * **Round-trips**: two pipeline batches per allowed request
     (``ZREMRANGEBYSCORE + ZCARD``, then ``ZADD + EXPIRE``); one batch for
     blocked requests.


TokenBucket
-------------------------------------------------------------------------------

Maintains a virtual token bucket per identifier in a Redis hash. Tokens
refill continuously at *refill_rate* per second up to *capacity*. Each
request consumes *tokens_per_request* tokens.  A request is allowed when the
bucket has enough tokens; otherwise it is rejected.

Returns a ``(allowed, available_tokens)`` tuple.

.. code-block:: python

    from core_redis.rate_limits import TokenBucket

    limiter = TokenBucket(redis_kwargs={"host": "localhost", "port": 6379})

    allowed, tokens = limiter.is_allowed(
        "user_123",
        capacity=100,       # max burst size
        refill_rate=10.0,   # tokens added per second
    )
    if not allowed:
        print(f"Rate limited —> {tokens} tokens available")
    else:
        print(f"Allowed —> {tokens} tokens remaining")

Variable-cost operations are supported via *tokens_per_request*:

.. code-block:: python

    # A bulk export costs 10 tokens; a lightweight read costs 1
    allowed, tokens = limiter.is_allowed(
        "user_123", capacity=100, refill_rate=10.0, tokens_per_request=10
    )

.. note::

   **Trade-offs vs. SlidingWindowLog**

   * **Burst-friendly**: up to *capacity* requests can fire instantly before
     throttling begins; ``SlidingWindowLog`` spreads the budget evenly across
     the window.
   * **Memory**: one hash with two fields per identifier regardless of
     request volume; ``SlidingWindowLog`` stores one entry per request.
   * **Round-trips**: one ``HGETALL`` read + one ``HSET + EXPIRE`` pipeline
     write per allowed request; zero writes when blocked.


LeakyBucket
-------------------------------------------------------------------------------

Maintains a virtual queue per identifier in a Redis hash. Incoming requests
fill the queue; the queue drains at a fixed *leak_rate* requests per second
regardless of arrival rate. A request is accepted when the queue has room;
otherwise it is rejected immediately. Unlike ``TokenBucket``, the output rate
is strictly constant, bursts are absorbed into the queue and processed at the
leak rate, never served faster.

Returns a ``(allowed, available)`` tuple where *available* is the number of
free queue slots after this request (``0`` when blocked).

.. code-block:: python

    from core_redis.rate_limits import LeakyBucket

    limiter = LeakyBucket(redis_kwargs={"host": "localhost", "port": 6379})

    allowed, available = limiter.is_allowed(
        "user_123",
        capacity=100,     # max queue depth
        leak_rate=10.0,   # requests drained per second
    )

    if not allowed:
        print("Queue full - retry later")
    else:
        print(f"Queued - {available} slots remaining")

HTTP-guard pattern:

.. code-block:: python

    import requests
    from core_redis.rate_limits import LeakyBucket

    limiter = LeakyBucket(redis_kwargs={"host": "localhost", "port": 6379})

    def call_api(user_id: str) -> None:
        allowed, available = limiter.is_allowed(user_id, capacity=100, leak_rate=10.0)
        if not allowed:
            print(f"[{user_id}] BLOCKED - queue full")
            return

        response = requests.get("https://api.example.com/data", timeout=5)
        print(f"[{user_id}] {response.status_code}  ({available} slots remaining)")

.. note::

   **Trade-offs vs. TokenBucket**

   * **Constant output rate**: downstream systems receive requests at exactly
     *leak_rate* per second; ``TokenBucket`` can burst all tokens instantly.
   * **No burst acceleration**: a full queue is accepted up to *capacity* and
     processed steadily; ``TokenBucket`` serves stored tokens without delay.
   * **Memory**: one hash with two fields per identifier, same as ``TokenBucket``.
   * **Round-trips**: one ``HGETALL`` read + one ``HSET + EXPIRE`` pipeline
     write per allowed request; zero writes when blocked.


Local Redis with Docker
===============================================================================

Start a Redis server on the default port:

.. code-block:: bash

    docker run -d --name redis-local -p 6379:6379 redis:latest

Stop and remove it when done:

.. code-block:: bash

    docker stop redis-local && docker rm redis-local


Setting Up for Development
===============================================================================

.. code-block:: bash

    pip install --upgrade pip
    pip install virtualenv
    virtualenv --python=python3.12 .venv
    source .venv/bin/activate
    pip install -e ".[dev]"


Running Tests
===============================================================================

.. code-block:: shell

    python manager.py run-tests                                          # unit tests
    python manager.py run-tests --test-type integration
    python manager.py run-coverage                                       # unit + coverage

Functional tests require a running Redis server (see `Local Redis with Docker`_):

.. code-block:: shell

    # defaults: REDIS_HOST=localhost REDIS_PORT=6379 REDIS_DB=15
    python manager.py run-tests --test-type functional --pattern "*.py"


Contributing
===============================================================================

Contributions are welcome! Please:

1. Fork the repository
2. Create a feature branch
3. Write tests for new functionality
4. Ensure all tests pass: ``python manager.py run-tests``
5. Run linting: ``pylint core_redis``
6. Run security checks: ``bandit -r core_redis``
7. Submit a pull request


License
===============================================================================

This project is licensed under the MIT License. See the LICENSE file for details.


Links
===============================================================================

* **Documentation:** https://core-redis.readthedocs.io/en/latest/
* **Repository:** https://gitlab.com/bytecode-solutions/core/core-redis
* **Issues:** https://gitlab.com/bytecode-solutions/core/core-redis/-/issues
* **Changelog:** https://gitlab.com/bytecode-solutions/core/core-redis/-/blob/master/CHANGELOG.md
* **PyPI:** https://pypi.org/project/core-redis/


Support
===============================================================================

For questions or support, please open an issue on GitLab or contact the maintainers.


Authors
===============================================================================

* **Alejandro Cora González** - *Initial work* - alek.cora.glez@gmail.com
