Lead Maintainer: Gar
hapi-rate-limit is a plugin for hapi that enables rate limiting.
It relies on cache being defined in the server.
const Hapi = require('hapi');
const server = Hapi.server({
cache: { engine: require('catbox-memory'), name: 'memory' }
});
server.register({
plugin: require('hapi-rate-limit'),
options: {}
});Defaults are given here
enabled:truewhether or not rate limiting is enabled at all. Set this tofalsein a route's config to bypass all rate limiting for that routeuserLimit:300number of total requests a user can make per period. Set tofalseto disable limiting requests per user.userCache: Object with the following properties:segment:hapi-rate-limit-userName of the cache segment to use for storing user rate limit infoexpiresIn:600000Time (in milliseconds) of period foruserLimit
userAttribute:idcredentials attribute to use when determining distinct authenticated usersuserWhitelist:[]array of users (as defined byuserAttributefor whom to bypass rate limiting. This is only applied to authenticated users, for ip whitelisting useipWhitelist.addressOnly:falseif true, only consider user address when determining distinct authenticated userspathLimit:50number of total requests that can be made on a given path per period. Set tofalseto disable limiting requests per path.pathCache: Object with the following properties:segment:hapi-rate-limit-pathName of the cache segment to use for storing path rate limit infoexpiresIn:60000Time (in milliseconds) of period forpathLimit
userPathLimit:falsenumber of total requests that can be made on a given path per user per period. Set tofalseto disable limiting requests per path per user.userPathCache: Object with the following properties:segment:hapi-rate-limit-userPathName of the cache segment to use for storing userPath rate limit infoexpiresIn:60000Time (in milliseconds) of period foruserPathLimit
headers:trueWhether or not to include headers in responsesipWhitelist:[]array of IPs for whom to bypass rate limiting. Note that a whitelisted IP would also bypass restrictions an authenticated user would otherwise have.trustProxy:falseIf true, honor theX-Forwarded-Forheader. See note below.getIpFromProxyHeader:undefineda function which will extract the remote address from theX-Forwarded-Forheader. The default implementation takes the first entry.
A user is considered a single remoteAddress for routes that are unauthenticated. On authenticated routes it is the userAtribute (default id) of the authenticated user.
If trustProxy is true, the address from the X-Forwarded-For header will be use instead of remoteAddress, if present.
If trustProxy is true and getIpFromProxyHeader is not defined, the address will be determined using the first entry in the X-Forwarded-For header.
If you set trustProxy to true, make sure that your proxy server is the only thing that can access the server, and be sure to configure your proxy to strip all incoming X-Forwarded-For headers.
For example if you were using haproxy you would add reqidel ^X-Forwarded-For to your config.
Failure to do this would allow anyone to spoof that header to bypass your rate limiting.
The following headers will be included in server responses if their respective limits are enabled
x-ratelimit-pathlimit: Will equalpathLimitx-ratelimit-pathremaining: Remaining number of requests path has this - periodx-ratelimit-pathreset: Time (in milliseconds) until reset ofpathLimitperiodx-ratelimit-userlimit: Will equaluserLimitx-ratelimit-userremaining: Remaining number of requests user has this periodx-ratelimit-userreset: Time (in milliseconds) until reset ofuserLimitperiodx-ratelimit-userpathlimit: Will equaluserPathLimitx-ratelimit-userpathremaining: Remaining number of requests user has this period for this pathx-ratelimit-userpathreset: Time (in milliseconds) until reset ofuserPathLimitperiod
All of the settings (except for userLimit and userCache) can be overridden in your route's config.
For instance, to disable pathLimit for a route you would add this to its config attribute
plugins: {
'hapi-rate-limit': {
pathLimit: false
}
}To disable all rate limiting for a route you woul add this to its config attribute
plugins: {
'hapi-rate-limit': {
enabled: false
}
}License: MIT