Expand description
Limits traffic from a IP address to partially mitigate attacks.
Kvarn’s limiting is smart; when a client first makes to many requests,
a hard-coded 429 Too Many Requests
is sent back.
It the spam continues, the current connection and all future streams are blocked,
until the limit resets.
The thresholds are configurable and have sensible defaults.
After reset_time
is elapsed, all stored request counts are cleared.
Longer reset_time
s and higher max_requests
can be less forgiving for clients,
but safer for the server, and vise versa.
Structs§
- Data used to limit requests.
Enums§
- The strength of limiting.
Functions§
- Get a
429 Too Many Requests
response.