Lead Maintainer: Gar
hapi-rate-limit is a plugin for hapi that enables rate limiting.
It relies on cache
being defined in the server.
const Hapi = require('hapi');
const server = new Hapi.Server({
cache: { engine: require('catbox-memory') }
});
server.connection();
server.register({
register: require('hapi-rate-limit'),
options: {}
});
Defaults are given here
enabled
:true
whether or not rate limiting is enabled at all. Set this tofalse
in a route's config to bypass all rate limiting for that routeuserLimit
:300
number of total requests a user can make per period. Set tofalse
to disable limiting requests per user.userCache
: Object with the following properties:segment
:hapi-rate-limit-user
Name of the cache segment to use for storing user rate limit infoexpiresIn
:600000
Time (in milliseconds) of period foruserLimit
userAttribute
:id
credentials attribute to use when determining distinct authenticated usersuserWhitelist
:[]
array of users (as defined byuserAttribute
for whom to bypass rate limiting. This is only applied to authenticated users, for ip whitelisting useipWhitelist
.addressOnly
:false
if true, only consider user address when determining distinct authenticated userspathLimit
:50
number of total requests that can be made on a given path per period. Set tofalse
to disable limiting requests per user.pathCache
: Object with the following properties:segment
:hapi-rate-limit-path
Name of the cache segment to use for storing path rate limit infoexpiresIn
:60000
Time (in milliseconds) of period forpathLimit
headers
:true
Whether or not to include headers in responsesipWhitelist
:[]
array of IPs for whom to bypass rate limiting. Note that a whitelisted IP would also bypass restrictions an authenticated user would otherwise have.trustProxy
:false
If true, honor theX-Forwarded-For
header. See note below.
A user is considered a single remoteAddress
for routes that are unauthenticated. On authenticated routes it is the userAtribute
(default id
) of the authenticated user.
If trustProxy
is true, the address from the X-Forwarded-For
header will be use instead of remoteAddress
, if present
If you set trustProxy
to true, make sure that your proxy server is the only thing that can access the server, and be sure to configure your proxy to strip all incoming X-Forwarded-For
headers.
For example if you were using haproxy you would add reqidel ^X-Forwarded-For
to your config.
Failure to do this would allow anyone to spoof that header to bypass your rate limiting.
The following headers will be included in server responses if their respective limits are enabled
x-ratelimit-pathlimit
: Will equalpathLimit
x-ratelimit-pathremaining
: Remaining number of requests path has this - periodx-ratelimit-pathreset
: Time (in milliseconds) until reset ofpathLimit
periodx-ratelimit-userlimit
: Will equaluserLimit
x-ratelimit-userremaining
: Remaining number of requests user has this periodx-ratelimit-userreset
: Time (in milliseconds) until reset ofuserLimit
period
All of the settings (except for userLimit
and userCache
) can be overridden in your route's config.
For instance, to disable pathLimit
for a route you would add this to its config
attribute
plugins: {
'hapi-rate-limit': {
pathLimit: false
}
}
To disable all rate limiting for a route you woul add this to its config
attribute
plugins: {
'hapi-rate-limit': {
enabled: false
}
}
License: MIT