Replies: 5 comments 7 replies
-
|
I don't know of a critical function as such. The code for koa and hono middleware is similar, so I suggest you try to make a copy of it. I hope this helps. |
Beta Was this translation helpful? Give feedback.
-
|
Probably Hono does not have this feature |
Beta Was this translation helpful? Give feedback.
-
|
hi @rodhoward Now, this approach is not DDoS-proof. So we think measures should be taken at lower layers.
For more information, please refer to the excellent information by @usualoma .
|
Beta Was this translation helpful? Give feedback.
-
|
New PR is created: #2103 |
Beta Was this translation helpful? Give feedback.
-
|
Size limits are a really important first step here, especially for DoS-style abuse. I’d just treat them as one layer, not the whole file-upload defense story. In practice I like combining:
I built an OSS Node.js package around that inspection step: It doesn’t replace parser/body limits, but it complements them well once the request has been accepted. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Hi, just checking out Hono and trying to convert our existing Koa server. One of the things we had was a bodyParser which you could specify limits.
Is there something similar in Hono? I think the idea is to protect from denial of service attacks using massive payloads.
Cheers
Rod
Beta Was this translation helpful? Give feedback.
All reactions