Searched defs:RateLimiterConfig (Results 1 – 5 of 5) sorted by relevance
33 type RateLimiterConfig struct { struct35 Average int64 `json:"average" mapstructure:"average"`39 Period int64 `json:"period" mapstructure:"period"`42 Burst int `json:"burst" mapstructure:"burst"`46 Type int `json:"type" mapstructure:"type"`50 Protocols []string `json:"protocols" mapstructure:"protocols"`52 AllowList []string `json:"allow_list" mapstructure:"mapstructure"`58 EntriesSoftLimit int `json:"entries_soft_limit" mapstructure:"entries_soft_limit"`62 func (r *RateLimiterConfig) isEnabled() bool {66 func (r *RateLimiterConfig) validate() error {[all …]
22 RateLimiterConfig struct { struct23 Skipper Skipper24 BeforeFunc BeforeFunc26 IdentifierExtractor Extractor28 Store RateLimiterStore30 ErrorHandler func(context echo.Context, err error) error32 DenyHandler func(context echo.Context, identifier string, err error) error113 func RateLimiterWithConfig(config RateLimiterConfig) echo.MiddlewareFunc {
18 type RateLimiterConfig struct { struct19 Duration time.Duration `help:"the rate at which request are allowed" default:"5m"`20 …t int `help:"number of events before the limit kicks in" default:"5" testDefault:"3"`21 …int `help:"number of clients whose rate limits we store" default:"1000" testDefault:"10"`39 func NewIPRateLimiter(config RateLimiterConfig) *RateLimiter {44 func NewRateLimiter(config RateLimiterConfig, keyFunc func(*http.Request) (string, error)) *RateLim…
94 type RateLimiterConfig struct { struct95 … bool `help:"whether rate limiting is enabled." releaseDefault:"true" devDefault:"true"`96 …p:"request rate per project per second." releaseDefault:"1000" devDefault:"100" testDefault:"1000"`97 … `help:"number of projects to cache." releaseDefault:"10000" devDefault:"10" testDefault:"100"`98 …ime.Duration `help:"how long to cache the projects limiter." releaseDefault:"10m" devDefault:"10s"`
853 func NewUserIDRateLimiter(config web.RateLimiterConfig) *web.RateLimiter {