Simple IP/API Key rate-limiting middleware.
About
What is Shen Rate Limit?
A simple express rate-limiting, who uses user ip or an specific key to control access on REST APIs.
Getting started
Install
$ npm install --save shen-rate-limit
Features
Key management
With Shen you can manage your KeyChan, adding, removing and cleaning all keys.
var rateLimit = require('shen-rate-limit');
app.enable('trust proxy');
var limiter = new rateLimit({});
limiter.addKey('your-new-key');
var rateLimit = require('shen-rate-limit');
app.enable('trust proxy');
var limiter = new rateLimit({});
limiter.removeKey('your-new-key');
var rateLimit = require('shen-rate-limit');
app.enable('trust proxy');
var limiter = new rateLimit({});
limiter.resetAll();
IP Whitelist
Shen includes a whitelist system. You can configure which IP won't need to provide an API KEY, and won't consume the rate-limit(This is an array).
Json-based database
Shen includes an json-based. Shen reads a json file, an add all created keys to keychan. Every time a key is added, removed or cleaned, Shen overwritten the json file.
Documentation
Usage
For an API-only server where the rate-limiter should be applied to all requests:
var RateLimit = require('shen-rate-limit');
app.enable('trust proxy');
var limiter = new RateLimit({
windowMs: 15*60*1000,
max: 100,
delayMs: 0
});
app.use(limiter);
For a "regular" web server (e.g. anything that uses express.static()), where the rate-limiter should only apply to certain requests:
var RateLimit = require('shen-rate-limit');
app.enable('trust proxy');
var apiLimiter = new RateLimit({
windowMs: 15*60*1000,
max: 100,
delayMs: 0
});
app.use('/api/', apiLimiter);
Create multiple instances to apply different rules to different routes:
var RateLimit = require('shen-rate-limit');
app.enable('trust proxy');
var apiLimiter = new RateLimit({
windowMs: 15*60*1000,
max: 100,
delayMs: 0
});
app.use('/api/', apiLimiter);
var createAccountLimiter = new RateLimit({
windowMs: 60*60*1000,
delayAfter: 1,
delayMs: 3*1000,
max: 5,
message: "Too many accounts created from this IP, please try again after an hour"
});
app.post('/create-account', createAccountLimiter, function(req, res) {
});
Configuration
- windowMs: milliseconds - how long to keep records of requests in memory. Defaults to
60000 (1 minute).
- delayAfter: max number of connections during
windowMs before starting to delay responses. Defaults to 1. Set to 0 to disable delaying.
- delayMs: milliseconds - how long to delay the response, multiplied by (number of recent hits -
delayAfter). Defaults to 1000 (1 second). Set to 0 to disable delaying.
- max: max number of connections during
windowMs milliseconds before sending a 429 response. Defaults to 5. Set to 0 to disable.
- message: Error message returned when
max is exceeded. Defaults to 'Too many requests, please try again later.'
- statusCode: HTTP status code returned when
max is exceeded. Defaults to 429.
- headers: Enable header to show request limit and current usage
- allowedIp: Whitelisted ip (an array), won't consume Rate limit and won't need an API KEY.
- keyGet: Function used to get user key. By default passed by header X-RateLimit-ApiKey. Defaults:
function (req ) {
return req.header('X-RateLimit-ApiKey');
}
- handler: The function to execute once the max limit is exceeded. It receives the request and the response objects. The "next" param is available if you need to pass to the next middleware. Defaults:
function (req, res, ) {
res.format({
html: function(){
res.status(options.statusCode).end(options.message);
},
json: function(){
res.status(options.statusCode).json({ message: options.message });
}
});
}
- store: The storage to use when persisting rate limit attempts. By default, the MemoryStore is used. It must implement the following in order to function:
function SomeStore() {
this.incr = function(key, cb) {
};
this.resetKey = function(key) {
};
this.addKey = function(key) {
};
this.removeKey = function(key) {
};
this.resetAll = function() {
};
};
Avaliable data stores are:
- MemoryStore: (default)Basic json-based memory, every time servers up, load a json file. Every time a key is add/clean/removed, an json file is overwritten.
- [rate-limit-redis]: Redis-backed store, more suitable for large or demanding deployments.
The delayAfter and delayMs options were written for human-facing pages such as login and password reset forms.
For public APIs, setting these to 0 (disabled) and relying on only windowMs and max for rate-limiting usually makes the most sense.
Contributors
License
You can check out the full license here
This project is licensed under the terms of the MIT license.