-
Notifications
You must be signed in to change notification settings - Fork 15
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Rate limit implementation #303
Conversation
I think it's ok for now, If anyone has any corrections/suggestions please feel free to add :) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This looks great to me. I'll leave it for a day to give others a chance to review @jonhealy1 @StijnCaerts
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nice work @pedro-cf. Really cool.
Description:
Implementation of address based global rate limiting option.
Rate limiting is an optional security feature that controls API request frequency on a remote address basis. It's enabled by setting the
STAC_FASTAPI_RATE_LIMIT
environment variable, e.g.,500/minute
. This limits each client to 500 requests per minute, helping prevent abuse and maintain API stability. Implementation examples are available in the examples/rate_limit directory.PR Checklist:
pre-commit run --all-files
)make test
)