Skip to content
Discussion options

You must be logged in to vote

This is a really great question, thanks for asking!

Is it possible to limit the invocation of these functions?

First off, you should determine if this is in your threat model. If you don't expect this to be an issue then I wouldn't think too much about it.

That said, the solution to the problem is a combination of authentication and rate limiting. You essentially need to track the state of valid user connections and ensure that not too many are being processed.

A hypothetical scenario could work like this:

  • The user authenticates into your application and is given a JTW.
  • You pass this JWT to the Gatsby Function to ensure it's a valid user connection
  • You could also track on the backend (…

Replies: 1 comment 2 replies

Comment options

You must be logged in to vote
2 replies
@KyleAMathews
Comment options

@kelvindecosta
Comment options

Answer selected by mlgualtieri
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Help
Labels
None yet
3 participants