Simple IP/API Key rate-limiting middleware.
A simple express rate-limiting, who uses user ip or an specific key to control access on REST APIs.
$ npm install --save shen-rate-limit
With Shen you can manage your KeyChan, adding, removing and cleaning all keys.
- Adding new key:
var rateLimit = require('shen-rate-limit');
app.enable('trust proxy'); // only if you're behind a reverse proxy (Heroku, Bluemix, AWS if you use an ELB, custom Nginx setup, etc)
var limiter = new rateLimit({/*options*/});
limiter.addKey('your-new-key');
- Removing a key:
var rateLimit = require('shen-rate-limit');
app.enable('trust proxy'); // only if you're behind a reverse proxy (Heroku, Bluemix, AWS if you use an ELB, custom Nginx setup, etc)
var limiter = new rateLimit({/*options*/});
limiter.removeKey('your-new-key');
- Cleaning all keys:
var rateLimit = require('shen-rate-limit');
app.enable('trust proxy'); // only if you're behind a reverse proxy (Heroku, Bluemix, AWS if you use an ELB, custom Nginx setup, etc)
var limiter = new rateLimit({/*options*/});
limiter.resetAll();
Shen includes a whitelist system. You can configure which IP won't need to provide an API KEY, and won't consume the rate-limit(This is an array).
Shen includes an json-based. Shen reads a json file, an add all created keys to keychan. Every time a key is added, removed or cleaned, Shen overwritten the json file.
For an API-only server where the rate-limiter should be applied to all requests:
var RateLimit = require('shen-rate-limit');
app.enable('trust proxy'); // only if you're behind a reverse proxy (Heroku, Bluemix, AWS if you use an ELB, custom Nginx setup, etc)
var limiter = new RateLimit({
windowMs: 15*60*1000, // 15 minutes
max: 100, // limit each IP to 100 requests per windowMs
delayMs: 0 // disable delaying - full speed until the max limit is reached
});
// apply to all requests
app.use(limiter);
For a "regular" web server (e.g. anything that uses express.static()
), where the rate-limiter should only apply to certain requests:
var RateLimit = require('shen-rate-limit');
app.enable('trust proxy'); // only if you're behind a reverse proxy (Heroku, Bluemix, AWS if you use an ELB, custom Nginx setup, etc)
var apiLimiter = new RateLimit({
windowMs: 15*60*1000, // 15 minutes
max: 100,
delayMs: 0 // disabled
});
// only apply to requests that begin with /api/
app.use('/api/', apiLimiter);
Create multiple instances to apply different rules to different routes:
var RateLimit = require('shen-rate-limit');
app.enable('trust proxy'); // only if you're behind a reverse proxy (Heroku, Bluemix, AWS if you use an ELB, custom Nginx setup, etc)
var apiLimiter = new RateLimit({
windowMs: 15*60*1000, // 15 minutes
max: 100,
delayMs: 0 // disabled
});
app.use('/api/', apiLimiter);
var createAccountLimiter = new RateLimit({
windowMs: 60*60*1000, // 1 hour window
delayAfter: 1, // begin slowing down responses after the first request
delayMs: 3*1000, // slow down subsequent responses by 3 seconds per request
max: 5, // start blocking after 5 requests
message: "Too many accounts created from this IP, please try again after an hour"
});
app.post('/create-account', createAccountLimiter, function(req, res) {
//...
});
- windowMs: milliseconds - how long to keep records of requests in memory. Defaults to
60000
(1 minute). - delayAfter: max number of connections during
windowMs
before starting to delay responses. Defaults to1
. Set to0
to disable delaying. - delayMs: milliseconds - how long to delay the response, multiplied by (number of recent hits -
delayAfter
). Defaults to1000
(1 second). Set to0
to disable delaying. - max: max number of connections during
windowMs
milliseconds before sending a 429 response. Defaults to5
. Set to0
to disable. - message: Error message returned when
max
is exceeded. Defaults to'Too many requests, please try again later.'
- statusCode: HTTP status code returned when
max
is exceeded. Defaults to429
. - headers: Enable header to show request limit and current usage
- allowedIp: Whitelisted ip (an array), won't consume Rate limit and won't need an API KEY.
- keyGet: Function used to get user key. By default passed by header X-RateLimit-ApiKey. Defaults:
function (req /*, res, next*/) {
return req.header('X-RateLimit-ApiKey');
}
- handler: The function to execute once the max limit is exceeded. It receives the request and the response objects. The "next" param is available if you need to pass to the next middleware. Defaults:
function (req, res, /*next*/) {
res.format({
html: function(){
res.status(options.statusCode).end(options.message);
},
json: function(){
res.status(options.statusCode).json({ message: options.message });
}
});
}
- store: The storage to use when persisting rate limit attempts. By default, the MemoryStore is used. It must implement the following in order to function:
function SomeStore() {
/**
* Increments the value in the underlying store for the given key.
* @method function
* @param {string} key - The key to use as the unique identifier passed
* down from RateLimit.
* @param {Store~incrCallback} cb - The callback issued when the underlying
* store is finished.
*/
this.incr = function(key, cb) {
// ...
};
/**
* This callback is called by the underlying store when an answer to the
* increment is available.
* @callback Store~incrCallback
* @param {?object} err - The error from the underlying store, or null if no
* error occurred.
* @param {number} value - The current value of the counter
*/
/**
* Resets a value with the given key.
* @method function
* @param {[type]} key - The key to reset
*/
this.resetKey = function(key) {
// ...
};
/**
* Adds a new key.
* @method function
* @param {[type]} key - The key to add
*/
this.addKey = function(key) {
// ...
};
/**
* Remove a key.
* @method function
* @param {[type]} key - The key to remove
*/
this.removeKey = function(key) {
// ...
};
/**
* Reset all keys.
* @method function
*/
this.resetAll = function() {
// ...
};
};
Avaliable data stores are:
- MemoryStore: (default)Basic json-based memory, every time servers up, load a json file. Every time a key is add/clean/removed, an json file is overwritten.
- [rate-limit-redis]: Redis-backed store, more suitable for large or demanding deployments.
The delayAfter
and delayMs
options were written for human-facing pages such as login and password reset forms.
For public APIs, setting these to 0
(disabled) and relying on only windowMs
and max
for rate-limiting usually makes the most sense.
You can check out the full license here
This project is licensed under the terms of the MIT license.