Initial commit

This commit is contained in:
Zhongwei Li
2025-11-29 18:52:31 +08:00
commit 7f9211b22c
16 changed files with 1217 additions and 0 deletions

View File

@@ -0,0 +1,6 @@
# Assets
Bundled resources for api-rate-limiter skill
- [ ] rate_limit_template.conf: Template configuration file for the rate limiting implementation.
- [ ] error_message_template.json: Template for the JSON error message returned when rate limits are exceeded.

View File

@@ -0,0 +1,32 @@
{
"skill": {
"name": "skill-name",
"version": "1.0.0",
"enabled": true,
"settings": {
"verbose": false,
"autoActivate": true,
"toolRestrictions": true
}
},
"triggers": {
"keywords": [
"example-trigger-1",
"example-trigger-2"
],
"patterns": []
},
"tools": {
"allowed": [
"Read",
"Grep",
"Bash"
],
"restricted": []
},
"metadata": {
"author": "Plugin Author",
"category": "general",
"tags": []
}
}

View File

@@ -0,0 +1,33 @@
{
"_comment": "Template for error message when rate limits are exceeded",
"error": {
"code": 429,
"_comment": "HTTP status code for Too Many Requests",
"message": "Too Many Requests",
"_comment": "General error message",
"details": {
"reason": "Rate limit exceeded",
"_comment": "Specific reason for the error",
"limit": 100,
"_comment": "The allowed request limit",
"remaining": 0,
"_comment": "Requests remaining in the current window",
"reset_at": "2024-01-24T12:00:00Z",
"_comment": "ISO 8601 timestamp for when the limit resets",
"policy": "100 requests per minute",
"_comment": "Human-readable policy description",
"algorithm": "token_bucket",
"_comment": "Rate limiting algorithm used (token_bucket, sliding_window, fixed_window)",
"scope": "user",
"_comment": "Scope of the rate limit (user, ip, global)",
"key": "user_id:123",
"_comment": "Key used for rate limiting (e.g., user ID, IP address)",
"retry_after": 60,
"_comment": "Seconds to wait before retrying the request (for Retry-After header)",
"documentation_url": "https://example.com/api/rate-limiting",
"_comment": "URL to documentation about rate limiting",
"support_email": "support@example.com"
"_comment": "Support email for questions about rate limits"
}
}
}

View File

@@ -0,0 +1,97 @@
# rate_limit_template.conf
# This is a template configuration file for the API Rate Limiter plugin.
# Fill in the placeholders with your desired values.
# Save this file as rate_limit.conf (or similar) and specify its path when configuring the plugin.
# --- General Settings ---
# Enable/Disable rate limiting
enabled: true # Set to 'false' to disable rate limiting
# Rate limiting algorithm: token_bucket, sliding_window, fixed_window
algorithm: token_bucket
# Redis connection details
redis_host: localhost
redis_port: 6379
redis_password: "" # Leave blank if no password
redis_db: 0
# --- Global Rate Limits (applied to all requests if no user/IP specific limits are defined) ---
global_limit_enabled: false # Enable/disable global rate limiting
# Number of requests allowed within the specified time window
global_requests_per_window: 100
# Time window in seconds
global_window_seconds: 60
# --- Token Bucket Settings (if algorithm is set to 'token_bucket') ---
# Number of tokens in the bucket
token_bucket_capacity: 100
# Rate at which tokens are added to the bucket (tokens per second)
token_replenishment_rate: 10
# --- Sliding Window Settings (if algorithm is set to 'sliding_window') ---
# Number of requests allowed within the window
sliding_window_limit: 100
# Window size in seconds
sliding_window_seconds: 60
# --- Fixed Window Settings (if algorithm is set to 'fixed_window') ---
# Number of requests allowed within the window
fixed_window_limit: 100
# Window size in seconds
fixed_window_seconds: 60
# --- Per User/IP Rate Limits ---
# Enable per-user rate limiting (requires user identification mechanism)
user_limit_enabled: false
# Number of requests allowed per user within the specified time window
user_requests_per_window: 50
# Time window in seconds for user rate limiting
user_window_seconds: 60
# Enable per-IP rate limiting
ip_limit_enabled: true
# Number of requests allowed per IP within the specified time window
ip_requests_per_window: 20
# Time window in seconds for IP rate limiting
ip_window_seconds: 60
# --- Burst Handling ---
# Allow a burst of requests beyond the rate limit (e.g., for initial page load)
burst_limit_enabled: true
# Maximum number of requests allowed in a burst
burst_limit: 20
# --- Rate Limit Headers ---
# Enable sending rate limit headers in the response
enable_rate_limit_headers: true
# Header name for the rate limit
rate_limit_header: X-RateLimit-Limit
# Header name for the remaining requests
rate_limit_remaining_header: X-RateLimit-Remaining
# Header name for the time until the limit resets (in seconds)
rate_limit_reset_header: X-RateLimit-Reset
# --- Advanced Settings ---
# Key prefix for storing rate limit data in Redis
redis_key_prefix: rate_limit:
# Custom error message when rate limit is exceeded
rate_limit_exceeded_message: "Rate limit exceeded. Please try again later."
# HTTP status code to return when rate limit is exceeded
rate_limit_exceeded_status_code: 429 # Too Many Requests

View File

@@ -0,0 +1,28 @@
{
"$schema": "http://json-schema.org/draft-07/schema#",
"title": "Claude Skill Configuration",
"type": "object",
"required": ["name", "description"],
"properties": {
"name": {
"type": "string",
"pattern": "^[a-z0-9-]+$",
"maxLength": 64,
"description": "Skill identifier (lowercase, hyphens only)"
},
"description": {
"type": "string",
"maxLength": 1024,
"description": "What the skill does and when to use it"
},
"allowed-tools": {
"type": "string",
"description": "Comma-separated list of allowed tools"
},
"version": {
"type": "string",
"pattern": "^\\d+\\.\\d+\\.\\d+$",
"description": "Semantic version (x.y.z)"
}
}
}

View File

@@ -0,0 +1,27 @@
{
"testCases": [
{
"name": "Basic activation test",
"input": "trigger phrase example",
"expected": {
"activated": true,
"toolsUsed": ["Read", "Grep"],
"success": true
}
},
{
"name": "Complex workflow test",
"input": "multi-step trigger example",
"expected": {
"activated": true,
"steps": 3,
"toolsUsed": ["Read", "Write", "Bash"],
"success": true
}
}
],
"fixtures": {
"sampleInput": "example data",
"expectedOutput": "processed result"
}
}