Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Changelog
Support CORS configuration
Authentication rate limiting by IP
Implements configurable, API-wide authentication rate limiting. If a user calls the API with invalid credentials, they will be warned with the number of attempts remaining. If they continue to call the API with failing credentials and run out of attempts, they will be blocked from further attempts until the window ends. This mitigates brute force credential attacks on publicly accessible instances.
The client IP is extracted from the header
X-FORWARDED-FOR(for reverse proxy users) followed byX-REAL-IP-- You must ensure your reverse proxy adds this header, fortunately this is a default behavior on most reverse proxies and will probably just work.It can be disabled if you would like, but was designed to have minimal impact outside of its security role, and is recommended to leave enabled even on non-publicly accessible production instances. It still provides significant brute force mitigation if your network is somehow compromised.
Other
"noImplicitAny": trueintsconfig.json.