Skip to content

Request Blocking

Function Description

The request-block plugin implements HTTP request blocking based on features such as URL, request headers, etc. It can be used to protect certain site resources from being exposed to the outside.

Running Attributes

Plugin Execution Stage: Authentication Stage

Plugin Execution Priority: 320

Configuration Fields

NameData TypeFill RequirementDefault ValueDescription
block_urlsarray of stringOptional, at least one of block_urls, block_headers, block_bodies must be filled-Configure strings for matching URLs that need to be blocked
block_headersarray of stringOptional, at least one of block_urls, block_headers, block_bodies must be filled-Configure strings for matching request headers that need to be blocked
block_bodiesarray of stringOptional, at least one of block_urls, block_headers, block_bodies must be filled-Configure strings for matching request bodies that need to be blocked
blocked_codenumberOptional403Configure the HTTP status code returned when a request is blocked
blocked_messagestringOptional-Configure the HTTP response body returned when a request is blocked
case_sensitiveboolOptionaltrueConfigure whether matching is case-sensitive, default is case-sensitive

Configuration Example

Blocking Request URL Paths

block_urls:
- swagger.html
- foo=bar
case_sensitive: false

Based on this configuration, the following requests will be denied access:

Terminal window
curl http://example.com?foo=Bar
curl http://exmaple.com/Swagger.html

Blocking Request Headers

block_headers:
- example-key
- example-value

Based on this configuration, the following requests will be denied access:

Terminal window
curl http://example.com -H 'example-key: 123'
curl http://exmaple.com -H 'my-header: example-value'

Blocking Request Bodies

block_bodies:
- "hello world"
case_sensitive: false

Based on this configuration, the following requests will be denied access:

Terminal window
curl http://example.com -d 'Hello World'
curl http://exmaple.com -d 'hello world'

Request Body Size Limit

When block_bodies is configured, only request bodies smaller than 32 MB are supported for matching. If the request body exceeds this limit and there are no matching block_urls or block_headers, the blocking operation will not be executed for that request.

When block_bodies is configured and the request body exceeds the global configuration DownstreamConnectionBufferLimits, it will return 413 Payload Too Large.