configureRateLimiting(); $this->routes(function () { Route::middleware(['web', 'auth', 'csrf']) ->namespace("$this->namespace\\Base") ->group(base_path('routes/base.php')); Route::middleware(['web', 'auth', 'admin', 'csrf'])->prefix('/admin') ->namespace("$this->namespace\\Admin") ->group(base_path('routes/admin.php')); Route::middleware(['web', 'csrf'])->prefix('/auth') ->namespace("$this->namespace\\Auth") ->group(base_path('routes/auth.php')); Route::middleware(['web', 'csrf', 'auth', 'server', 'node.maintenance']) ->prefix('/api/server/{server}') ->namespace("$this->namespace\\Server") ->group(base_path('routes/server.php')); Route::middleware(['api', 'throttle:api.application']) ->prefix('/api/application') ->namespace("$this->namespace\\Api\\Application") ->group(base_path('routes/api-application.php')); Route::middleware(['client-api', 'throttle:api.client']) ->prefix('/api/client') ->namespace("$this->namespace\\Api\\Client") ->group(base_path('routes/api-client.php')); Route::middleware(['daemon'])->prefix('/api/remote') ->namespace("$this->namespace\\Api\\Remote") ->group(base_path('routes/api-remote.php')); }); } /** * Configure the rate limiters for the application. */ protected function configureRateLimiting() { // Authentication rate limiting. For login and checkpoint endpoints we'll apply // a limit of 10 requests per minute, for the forgot password endpoint apply a // limit of two per minute for the requester so that there is less ability to // trigger email spam. RateLimiter::for('authentication', function (Request $request) { if ($request->route()->named('auth.post.forgot-password')) { return Limit::perMinute(2)->by($request->ip()); } return Limit::perMinute(10); }); // Configure the throttles for both the application and client APIs below. // This is configurable per-instance in "config/http.php". By default this // limiter will be tied to the specific request user, and falls back to the // request IP if there is no request user present for the key. // // This means that an authenticated API user cannot use IP switching to get // around the limits. RateLimiter::for('api.client', function (Request $request) { $key = optional($request->user())->uuid ?: $request->ip(); return Limit::perMinutes( config('http.rate_limit.client_period'), config('http.rate_limit.client') )->by($key); }); RateLimiter::for('api.application', function (Request $request) { $key = optional($request->user())->uuid ?: $request->ip(); return Limit::perMinutes( config('http.rate_limit.application_period'), config('http.rate_limit.application') )->by($key); }); RateLimiter::for('pull', function () { return Limit::perMinute(10); }); } }