Skip to content
This repository has been archived by the owner on Apr 3, 2019. It is now read-only.

Commit

Permalink
fix(config): update name values for ip ban
Browse files Browse the repository at this point in the history
  • Loading branch information
vladikoff committed Apr 3, 2016
1 parent 5ca3052 commit 92a0008
Show file tree
Hide file tree
Showing 4 changed files with 10 additions and 10 deletions.
4 changes: 2 additions & 2 deletions lib/bans/handler.js
Original file line number Diff line number Diff line change
Expand Up @@ -7,8 +7,8 @@ var config = require('../config').root()
var LIFETIME = config.memcache.recordLifetimeSeconds
var BLOCK_INTERVAL_MS = config.limits.blockIntervalSeconds * 1000
var RATE_LIMIT_INTERVAL_MS = config.limits.rateLimitIntervalSeconds * 1000
var IP_RATE_LIMIT_INTERVAL_MS = config.limits.maxBadLoginsIntervalSeconds * 1000
var IP_RATE_LIMIT_BAN_DURATION_MS = config.limits.maxBadLoginsBanDurationSeconds * 1000
var IP_RATE_LIMIT_INTERVAL_MS = config.limits.ipRateLimitIntervalSeconds * 1000
var IP_RATE_LIMIT_BAN_DURATION_MS = config.limits.ipRateLimitBanDurationSeconds * 1000
var MAX_EMAILS = config.limits.emails
var BAD_LOGIN_LOCKOUT = config.limits.badLoginLockout
var BAD_LOGIN_LOCKOUT_INTERVAL_MS = config.limits.badLoginLockoutIntervalSeconds * 1000
Expand Down
4 changes: 2 additions & 2 deletions lib/config/config.js
Original file line number Diff line number Diff line change
Expand Up @@ -67,13 +67,13 @@ module.exports = function (fs, path, url, convict) {
format: 'nat',
env: 'MAX_BAD_LOGINS_PER_IP'
},
maxBadLoginsIntervalSeconds: {
ipRateLimitIntervalSeconds: {
doc: 'Duration of automatic throttling for IPs',
default: 60 * 15,
format: 'nat',
env: 'IP_RATE_LIMIT_INTERVAL_SECONDS'
},
maxBadLoginsBanDurationSeconds: {
ipRateLimitBanDurationSeconds: {
doc: 'Duration of automatic ban for throttled IPs',
default: 60 * 15,
format: 'nat',
Expand Down
4 changes: 2 additions & 2 deletions lib/server.js
Original file line number Diff line number Diff line change
Expand Up @@ -19,8 +19,8 @@ module.exports = function createServer(config, log) {
var LIFETIME = config.memcache.recordLifetimeSeconds
var BLOCK_INTERVAL_MS = config.limits.blockIntervalSeconds * 1000
var RATE_LIMIT_INTERVAL_MS = config.limits.rateLimitIntervalSeconds * 1000
var IP_RATE_LIMIT_INTERVAL_MS = config.limits.maxBadLoginsIntervalSeconds * 1000
var IP_RATE_LIMIT_BAN_DURATION_MS = config.limits.maxBadLoginsBanDurationSeconds * 1000
var IP_RATE_LIMIT_INTERVAL_MS = config.limits.ipRateLimitIntervalSeconds * 1000
var IP_RATE_LIMIT_BAN_DURATION_MS = config.limits.ipRateLimitBanDurationSeconds * 1000
var BAD_LOGIN_LOCKOUT_INTERVAL_MS = config.limits.badLoginLockoutIntervalSeconds * 1000
var MAX_BAD_LOGINS = config.limits.maxBadLogins
var MAX_BAD_LOGINS_PER_IP = config.limits.maxBadLoginsPerIp
Expand Down
8 changes: 4 additions & 4 deletions test/memcache-helper.js
Original file line number Diff line number Diff line change
Expand Up @@ -16,8 +16,8 @@ var config = {
maxEmails: 3,
maxBadLogins: 2,
maxBadLoginsPerIp: Number(process.env.MAX_BAD_LOGINS_PER_IP) || 3,
maxBadLoginsIntervalSeconds: Number(process.env.IP_RATE_LIMIT_INTERVAL_SECONDS) || 60 * 15,
maxBadLoginsBanDurationSeconds: Number(process.env.IP_RATE_LIMIT_BAN_DURATION_SECONDS) || 60 * 15,
ipRateLimitIntervalSeconds: Number(process.env.IP_RATE_LIMIT_INTERVAL_SECONDS) || 60 * 15,
ipRateLimitBanDurationSeconds: Number(process.env.IP_RATE_LIMIT_BAN_DURATION_SECONDS) || 60 * 15,
badLoginLockout: 3,
badLoginLockoutIntervalSeconds: 20
}
Expand All @@ -44,8 +44,8 @@ var EmailRecord = require('../lib/email_record')(config.limits.rateLimitInterval
var IpEmailRecord = require('../lib/ip_email_record')(config.limits.rateLimitIntervalSeconds * 1000, config.limits.maxBadLogins)
var IpRecord = require('../lib/ip_record')(
config.limits.blockIntervalSeconds * 1000,
config.limits.maxBadLoginsIntervalSeconds * 1000,
config.limits.maxBadLoginsBanDurationSeconds * 1000,
config.limits.ipRateLimitIntervalSeconds * 1000,
config.limits.ipRateLimitBanDurationSeconds * 1000,
config.limits.maxBadLoginsPerIp,
config.limits.maxAccountStatusCheck)

Expand Down

0 comments on commit 92a0008

Please sign in to comment.