2016-01-07 05:26:29 +01:00
|
|
|
# Copyright 2014-2016 OpenMarket Ltd
|
2020-06-05 11:47:20 +02:00
|
|
|
# Copyright 2020 The Matrix.org Foundation C.I.C.
|
2014-09-03 10:43:11 +02:00
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
|
|
|
|
2020-01-20 18:34:13 +01:00
|
|
|
from collections import OrderedDict
|
2021-02-19 19:20:34 +01:00
|
|
|
from typing import Hashable, Optional, Tuple
|
2014-09-01 18:54:54 +02:00
|
|
|
|
2019-03-15 18:46:16 +01:00
|
|
|
from synapse.api.errors import LimitExceededError
|
2022-08-03 11:40:20 +02:00
|
|
|
from synapse.config.ratelimiting import RatelimitSettings
|
2021-03-30 13:06:09 +02:00
|
|
|
from synapse.storage.databases.main import DataStore
|
2020-08-21 16:07:56 +02:00
|
|
|
from synapse.types import Requester
|
2020-06-05 11:47:20 +02:00
|
|
|
from synapse.util import Clock
|
2019-03-15 18:46:16 +01:00
|
|
|
|
2014-09-01 18:54:54 +02:00
|
|
|
|
2020-09-04 12:54:56 +02:00
|
|
|
class Ratelimiter:
|
2014-09-02 16:06:20 +02:00
|
|
|
"""
|
2020-06-05 11:47:20 +02:00
|
|
|
Ratelimit actions marked by arbitrary keys.
|
|
|
|
|
2022-07-13 21:09:42 +02:00
|
|
|
(Note that the source code speaks of "actions" and "burst_count" rather than
|
|
|
|
"tokens" and a "bucket_size".)
|
|
|
|
|
|
|
|
This is a "leaky bucket as a meter". For each key to be tracked there is a bucket
|
|
|
|
containing some number 0 <= T <= `burst_count` of tokens corresponding to previously
|
|
|
|
permitted requests for that key. Each bucket starts empty, and gradually leaks
|
|
|
|
tokens at a rate of `rate_hz`.
|
|
|
|
|
|
|
|
Upon an incoming request, we must determine:
|
|
|
|
- the key that this request falls under (which bucket to inspect), and
|
|
|
|
- the cost C of this request in tokens.
|
|
|
|
Then, if there is room in the bucket for C tokens (T + C <= `burst_count`),
|
|
|
|
the request is permitted and `cost` tokens are added to the bucket.
|
|
|
|
Otherwise the request is denied, and the bucket continues to hold T tokens.
|
|
|
|
|
|
|
|
This means that the limiter enforces an average request frequency of `rate_hz`,
|
|
|
|
while accumulating a buffer of up to `burst_count` requests which can be consumed
|
|
|
|
instantaneously.
|
|
|
|
|
|
|
|
The tricky bit is the leaking. We do not want to have a periodic process which
|
|
|
|
leaks every bucket! Instead, we track
|
|
|
|
- the time point when the bucket was last completely empty, and
|
|
|
|
- how many tokens have added to the bucket permitted since then.
|
|
|
|
Then for each incoming request, we can calculate how many tokens have leaked
|
|
|
|
since this time point, and use that to decide if we should accept or reject the
|
|
|
|
request.
|
|
|
|
|
2020-06-05 11:47:20 +02:00
|
|
|
Args:
|
|
|
|
clock: A homeserver clock, for retrieving the current time
|
|
|
|
rate_hz: The long term number of actions that can be performed in a second.
|
|
|
|
burst_count: How many actions that can be performed before being limited.
|
2014-09-02 16:06:20 +02:00
|
|
|
"""
|
2014-09-01 18:54:54 +02:00
|
|
|
|
2021-03-30 13:06:09 +02:00
|
|
|
def __init__(
|
|
|
|
self, store: DataStore, clock: Clock, rate_hz: float, burst_count: int
|
|
|
|
):
|
2020-06-05 11:47:20 +02:00
|
|
|
self.clock = clock
|
|
|
|
self.rate_hz = rate_hz
|
|
|
|
self.burst_count = burst_count
|
2021-03-30 13:06:09 +02:00
|
|
|
self.store = store
|
2020-06-05 11:47:20 +02:00
|
|
|
|
2022-07-13 21:09:42 +02:00
|
|
|
# An ordered dictionary representing the token buckets tracked by this rate
|
|
|
|
# limiter. Each entry maps a key of arbitrary type to a tuple representing:
|
|
|
|
# * The number of tokens currently in the bucket,
|
|
|
|
# * The time point when the bucket was last completely empty, and
|
|
|
|
# * The rate_hz (leak rate) of this particular bucket.
|
2021-09-10 18:03:18 +02:00
|
|
|
self.actions: OrderedDict[Hashable, Tuple[float, float, float]] = OrderedDict()
|
2014-09-01 18:54:54 +02:00
|
|
|
|
2022-07-13 21:09:42 +02:00
|
|
|
def _get_key(
|
|
|
|
self, requester: Optional[Requester], key: Optional[Hashable]
|
|
|
|
) -> Hashable:
|
|
|
|
"""Use the requester's MXID as a fallback key if no key is provided."""
|
|
|
|
if key is None:
|
|
|
|
if not requester:
|
|
|
|
raise ValueError("Must supply at least one of `requester` or `key`")
|
|
|
|
|
|
|
|
key = requester.user.to_string()
|
|
|
|
return key
|
|
|
|
|
|
|
|
def _get_action_counts(
|
|
|
|
self, key: Hashable, time_now_s: float
|
|
|
|
) -> Tuple[float, float, float]:
|
|
|
|
"""Retrieve the action counts, with a fallback representing an empty bucket."""
|
|
|
|
return self.actions.get(key, (0.0, time_now_s, 0.0))
|
|
|
|
|
2021-03-30 13:06:09 +02:00
|
|
|
async def can_do_action(
|
2020-06-05 11:47:20 +02:00
|
|
|
self,
|
2021-03-30 13:06:09 +02:00
|
|
|
requester: Optional[Requester],
|
|
|
|
key: Optional[Hashable] = None,
|
2020-06-05 11:47:20 +02:00
|
|
|
rate_hz: Optional[float] = None,
|
|
|
|
burst_count: Optional[int] = None,
|
|
|
|
update: bool = True,
|
2021-05-12 16:05:28 +02:00
|
|
|
n_actions: int = 1,
|
2021-09-10 18:03:18 +02:00
|
|
|
_time_now_s: Optional[float] = None,
|
2020-06-05 11:47:20 +02:00
|
|
|
) -> Tuple[bool, float]:
|
2019-03-05 15:25:33 +01:00
|
|
|
"""Can the entity (e.g. user or IP address) perform the action?
|
2020-06-05 11:47:20 +02:00
|
|
|
|
2021-03-30 13:06:09 +02:00
|
|
|
Checks if the user has ratelimiting disabled in the database by looking
|
|
|
|
for null/zero values in the `ratelimit_override` table. (Non-zero
|
|
|
|
values aren't honoured, as they're specific to the event sending
|
|
|
|
ratelimiter, rather than all ratelimiters)
|
|
|
|
|
2014-09-02 16:06:20 +02:00
|
|
|
Args:
|
2021-03-30 13:06:09 +02:00
|
|
|
requester: The requester that is doing the action, if any. Used to check
|
|
|
|
if the user has ratelimits disabled in the database.
|
|
|
|
key: An arbitrary key used to classify an action. Defaults to the
|
|
|
|
requester's user ID.
|
2020-06-05 11:47:20 +02:00
|
|
|
rate_hz: The long term number of actions that can be performed in a second.
|
|
|
|
Overrides the value set during instantiation if set.
|
|
|
|
burst_count: How many actions that can be performed before being limited.
|
|
|
|
Overrides the value set during instantiation if set.
|
|
|
|
update: Whether to count this check as performing the action
|
2021-05-12 16:05:28 +02:00
|
|
|
n_actions: The number of times the user wants to do this action. If the user
|
|
|
|
cannot do all of the actions, the user's action count is not incremented
|
|
|
|
at all.
|
2020-06-05 11:47:20 +02:00
|
|
|
_time_now_s: The current time. Optional, defaults to the current time according
|
|
|
|
to self.clock. Only used by tests.
|
|
|
|
|
2014-09-02 16:06:20 +02:00
|
|
|
Returns:
|
2020-06-05 11:47:20 +02:00
|
|
|
A tuple containing:
|
|
|
|
* A bool indicating if they can perform the action now
|
|
|
|
* The reactor timestamp for when the action can be performed next.
|
|
|
|
-1 if rate_hz is less than or equal to zero
|
2014-09-02 16:06:20 +02:00
|
|
|
"""
|
2022-07-13 21:09:42 +02:00
|
|
|
key = self._get_key(requester, key)
|
2021-03-30 13:06:09 +02:00
|
|
|
|
|
|
|
if requester:
|
|
|
|
# Disable rate limiting of users belonging to any AS that is configured
|
|
|
|
# not to be rate limited in its registration file (rate_limited: true|false).
|
|
|
|
if requester.app_service and not requester.app_service.is_rate_limited():
|
|
|
|
return True, -1.0
|
|
|
|
|
|
|
|
# Check if ratelimiting has been disabled for the user.
|
|
|
|
#
|
|
|
|
# Note that we don't use the returned rate/burst count, as the table
|
|
|
|
# is specifically for the event sending ratelimiter. Instead, we
|
|
|
|
# only use it to (somewhat cheekily) infer whether the user should
|
|
|
|
# be subject to any rate limiting or not.
|
|
|
|
override = await self.store.get_ratelimit_for_user(
|
|
|
|
requester.authenticated_entity
|
|
|
|
)
|
|
|
|
if override and not override.messages_per_second:
|
|
|
|
return True, -1.0
|
|
|
|
|
2020-06-05 11:47:20 +02:00
|
|
|
# Override default values if set
|
|
|
|
time_now_s = _time_now_s if _time_now_s is not None else self.clock.time()
|
|
|
|
rate_hz = rate_hz if rate_hz is not None else self.rate_hz
|
|
|
|
burst_count = burst_count if burst_count is not None else self.burst_count
|
|
|
|
|
|
|
|
# Remove any expired entries
|
|
|
|
self._prune_message_counts(time_now_s)
|
|
|
|
|
|
|
|
# Check if there is an existing count entry for this key
|
2022-07-13 21:09:42 +02:00
|
|
|
action_count, time_start, _ = self._get_action_counts(key, time_now_s)
|
2020-06-05 11:47:20 +02:00
|
|
|
|
|
|
|
# Check whether performing another action is allowed
|
2014-09-02 16:06:20 +02:00
|
|
|
time_delta = time_now_s - time_start
|
2020-06-05 11:47:20 +02:00
|
|
|
performed_count = action_count - time_delta * rate_hz
|
|
|
|
if performed_count < 0:
|
2021-05-12 16:05:28 +02:00
|
|
|
performed_count = 0
|
2022-06-15 16:11:55 +02:00
|
|
|
|
|
|
|
# Reset the start time and forgive all actions
|
|
|
|
action_count = 0
|
2014-09-02 16:06:20 +02:00
|
|
|
time_start = time_now_s
|
2021-05-12 16:05:28 +02:00
|
|
|
|
|
|
|
# This check would be easier read as performed_count + n_actions > burst_count,
|
|
|
|
# but performed_count might be a very precise float (with lots of numbers
|
|
|
|
# following the point) in which case Python might round it up when adding it to
|
|
|
|
# n_actions. Writing it this way ensures it doesn't happen.
|
|
|
|
if performed_count > burst_count - n_actions:
|
2020-06-05 11:47:20 +02:00
|
|
|
# Deny, we have exceeded our burst count
|
2014-09-01 18:54:54 +02:00
|
|
|
allowed = False
|
|
|
|
else:
|
2020-06-05 11:47:20 +02:00
|
|
|
# We haven't reached our limit yet
|
2014-09-01 18:54:54 +02:00
|
|
|
allowed = True
|
2022-06-15 16:11:55 +02:00
|
|
|
action_count = action_count + n_actions
|
2014-09-02 16:06:20 +02:00
|
|
|
|
2016-10-19 11:45:24 +02:00
|
|
|
if update:
|
2020-06-05 11:47:20 +02:00
|
|
|
self.actions[key] = (action_count, time_start, rate_hz)
|
2014-09-02 16:06:20 +02:00
|
|
|
|
2019-03-05 15:25:33 +01:00
|
|
|
if rate_hz > 0:
|
2020-06-05 11:47:20 +02:00
|
|
|
# Find out when the count of existing actions expires
|
|
|
|
time_allowed = time_start + (action_count - burst_count + 1) / rate_hz
|
|
|
|
|
|
|
|
# Don't give back a time in the past
|
2014-09-02 16:06:20 +02:00
|
|
|
if time_allowed < time_now_s:
|
|
|
|
time_allowed = time_now_s
|
2020-06-05 11:47:20 +02:00
|
|
|
|
2014-09-02 16:06:20 +02:00
|
|
|
else:
|
2020-06-05 11:47:20 +02:00
|
|
|
# XXX: Why is this -1? This seems to only be used in
|
|
|
|
# self.ratelimit. I guess so that clients get a time in the past and don't
|
|
|
|
# feel afraid to try again immediately
|
2014-09-02 16:06:20 +02:00
|
|
|
time_allowed = -1
|
|
|
|
|
|
|
|
return allowed, time_allowed
|
|
|
|
|
2022-07-13 21:09:42 +02:00
|
|
|
def record_action(
|
|
|
|
self,
|
|
|
|
requester: Optional[Requester],
|
|
|
|
key: Optional[Hashable] = None,
|
|
|
|
n_actions: int = 1,
|
|
|
|
_time_now_s: Optional[float] = None,
|
|
|
|
) -> None:
|
|
|
|
"""Record that an action(s) took place, even if they violate the rate limit.
|
|
|
|
|
|
|
|
This is useful for tracking the frequency of events that happen across
|
|
|
|
federation which we still want to impose local rate limits on. For instance, if
|
|
|
|
we are alice.com monitoring a particular room, we cannot prevent bob.com
|
|
|
|
from joining users to that room. However, we can track the number of recent
|
|
|
|
joins in the room and refuse to serve new joins ourselves if there have been too
|
|
|
|
many in the room across both homeservers.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
requester: The requester that is doing the action, if any.
|
|
|
|
key: An arbitrary key used to classify an action. Defaults to the
|
|
|
|
requester's user ID.
|
|
|
|
n_actions: The number of times the user wants to do this action. If the user
|
|
|
|
cannot do all of the actions, the user's action count is not incremented
|
|
|
|
at all.
|
|
|
|
_time_now_s: The current time. Optional, defaults to the current time according
|
|
|
|
to self.clock. Only used by tests.
|
|
|
|
"""
|
|
|
|
key = self._get_key(requester, key)
|
|
|
|
time_now_s = _time_now_s if _time_now_s is not None else self.clock.time()
|
|
|
|
action_count, time_start, rate_hz = self._get_action_counts(key, time_now_s)
|
|
|
|
self.actions[key] = (action_count + n_actions, time_start, rate_hz)
|
|
|
|
|
2021-10-18 21:01:10 +02:00
|
|
|
def _prune_message_counts(self, time_now_s: float) -> None:
|
2020-06-05 11:47:20 +02:00
|
|
|
"""Remove message count entries that have not exceeded their defined
|
|
|
|
rate_hz limit
|
|
|
|
|
|
|
|
Args:
|
|
|
|
time_now_s: The current time
|
|
|
|
"""
|
|
|
|
# We create a copy of the key list here as the dictionary is modified during
|
|
|
|
# the loop
|
|
|
|
for key in list(self.actions.keys()):
|
|
|
|
action_count, time_start, rate_hz = self.actions[key]
|
|
|
|
|
|
|
|
# Rate limit = "seconds since we started limiting this action" * rate_hz
|
|
|
|
# If this limit has not been exceeded, wipe our record of this action
|
2014-09-02 16:06:20 +02:00
|
|
|
time_delta = time_now_s - time_start
|
2020-06-05 11:47:20 +02:00
|
|
|
if action_count - time_delta * rate_hz > 0:
|
|
|
|
continue
|
2014-09-02 16:06:20 +02:00
|
|
|
else:
|
2020-06-05 11:47:20 +02:00
|
|
|
del self.actions[key]
|
|
|
|
|
2021-03-30 13:06:09 +02:00
|
|
|
async def ratelimit(
|
2020-06-05 11:47:20 +02:00
|
|
|
self,
|
2021-03-30 13:06:09 +02:00
|
|
|
requester: Optional[Requester],
|
|
|
|
key: Optional[Hashable] = None,
|
2020-06-05 11:47:20 +02:00
|
|
|
rate_hz: Optional[float] = None,
|
|
|
|
burst_count: Optional[int] = None,
|
|
|
|
update: bool = True,
|
2021-05-12 16:05:28 +02:00
|
|
|
n_actions: int = 1,
|
2021-09-10 18:03:18 +02:00
|
|
|
_time_now_s: Optional[float] = None,
|
2021-10-18 21:01:10 +02:00
|
|
|
) -> None:
|
2020-06-05 11:47:20 +02:00
|
|
|
"""Checks if an action can be performed. If not, raises a LimitExceededError
|
|
|
|
|
2021-03-30 13:06:09 +02:00
|
|
|
Checks if the user has ratelimiting disabled in the database by looking
|
|
|
|
for null/zero values in the `ratelimit_override` table. (Non-zero
|
|
|
|
values aren't honoured, as they're specific to the event sending
|
|
|
|
ratelimiter, rather than all ratelimiters)
|
|
|
|
|
2020-06-05 11:47:20 +02:00
|
|
|
Args:
|
2021-03-30 13:06:09 +02:00
|
|
|
requester: The requester that is doing the action, if any. Used to check for
|
|
|
|
if the user has ratelimits disabled.
|
|
|
|
key: An arbitrary key used to classify an action. Defaults to the
|
|
|
|
requester's user ID.
|
2020-06-05 11:47:20 +02:00
|
|
|
rate_hz: The long term number of actions that can be performed in a second.
|
|
|
|
Overrides the value set during instantiation if set.
|
|
|
|
burst_count: How many actions that can be performed before being limited.
|
|
|
|
Overrides the value set during instantiation if set.
|
|
|
|
update: Whether to count this check as performing the action
|
2021-05-12 16:05:28 +02:00
|
|
|
n_actions: The number of times the user wants to do this action. If the user
|
|
|
|
cannot do all of the actions, the user's action count is not incremented
|
|
|
|
at all.
|
2020-06-05 11:47:20 +02:00
|
|
|
_time_now_s: The current time. Optional, defaults to the current time according
|
|
|
|
to self.clock. Only used by tests.
|
|
|
|
|
|
|
|
Raises:
|
|
|
|
LimitExceededError: If an action could not be performed, along with the time in
|
|
|
|
milliseconds until the action can be performed again
|
|
|
|
"""
|
|
|
|
time_now_s = _time_now_s if _time_now_s is not None else self.clock.time()
|
2019-03-15 18:46:16 +01:00
|
|
|
|
2021-03-30 13:06:09 +02:00
|
|
|
allowed, time_allowed = await self.can_do_action(
|
|
|
|
requester,
|
2020-06-05 11:47:20 +02:00
|
|
|
key,
|
|
|
|
rate_hz=rate_hz,
|
|
|
|
burst_count=burst_count,
|
|
|
|
update=update,
|
2021-05-12 16:05:28 +02:00
|
|
|
n_actions=n_actions,
|
2020-06-05 11:47:20 +02:00
|
|
|
_time_now_s=time_now_s,
|
2019-03-15 18:46:16 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
if not allowed:
|
|
|
|
raise LimitExceededError(
|
2019-06-20 11:32:02 +02:00
|
|
|
retry_after_ms=int(1000 * (time_allowed - time_now_s))
|
2019-03-15 18:46:16 +01:00
|
|
|
)
|
2021-10-08 13:44:43 +02:00
|
|
|
|
|
|
|
|
|
|
|
class RequestRatelimiter:
|
|
|
|
def __init__(
|
|
|
|
self,
|
|
|
|
store: DataStore,
|
|
|
|
clock: Clock,
|
2022-08-03 11:40:20 +02:00
|
|
|
rc_message: RatelimitSettings,
|
|
|
|
rc_admin_redaction: Optional[RatelimitSettings],
|
2021-10-08 13:44:43 +02:00
|
|
|
):
|
|
|
|
self.store = store
|
|
|
|
self.clock = clock
|
|
|
|
|
|
|
|
# The rate_hz and burst_count are overridden on a per-user basis
|
|
|
|
self.request_ratelimiter = Ratelimiter(
|
|
|
|
store=self.store, clock=self.clock, rate_hz=0, burst_count=0
|
|
|
|
)
|
|
|
|
self._rc_message = rc_message
|
|
|
|
|
|
|
|
# Check whether ratelimiting room admin message redaction is enabled
|
|
|
|
# by the presence of rate limits in the config
|
|
|
|
if rc_admin_redaction:
|
|
|
|
self.admin_redaction_ratelimiter: Optional[Ratelimiter] = Ratelimiter(
|
|
|
|
store=self.store,
|
|
|
|
clock=self.clock,
|
|
|
|
rate_hz=rc_admin_redaction.per_second,
|
|
|
|
burst_count=rc_admin_redaction.burst_count,
|
|
|
|
)
|
|
|
|
else:
|
|
|
|
self.admin_redaction_ratelimiter = None
|
|
|
|
|
|
|
|
async def ratelimit(
|
|
|
|
self,
|
|
|
|
requester: Requester,
|
|
|
|
update: bool = True,
|
|
|
|
is_admin_redaction: bool = False,
|
2022-10-28 12:53:34 +02:00
|
|
|
n_actions: int = 1,
|
2021-10-08 13:44:43 +02:00
|
|
|
) -> None:
|
|
|
|
"""Ratelimits requests.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
requester
|
|
|
|
update: Whether to record that a request is being processed.
|
|
|
|
Set to False when doing multiple checks for one request (e.g.
|
|
|
|
to check up front if we would reject the request), and set to
|
|
|
|
True for the last call for a given request.
|
|
|
|
is_admin_redaction: Whether this is a room admin/moderator
|
|
|
|
redacting an event. If so then we may apply different
|
|
|
|
ratelimits depending on config.
|
2022-10-28 12:53:34 +02:00
|
|
|
n_actions: Multiplier for the number of actions to apply to the
|
|
|
|
rate limiter at once.
|
2021-10-08 13:44:43 +02:00
|
|
|
|
|
|
|
Raises:
|
|
|
|
LimitExceededError if the request should be ratelimited
|
|
|
|
"""
|
|
|
|
user_id = requester.user.to_string()
|
|
|
|
|
|
|
|
# The AS user itself is never rate limited.
|
|
|
|
app_service = self.store.get_app_service_by_user_id(user_id)
|
|
|
|
if app_service is not None:
|
|
|
|
return # do not ratelimit app service senders
|
|
|
|
|
|
|
|
messages_per_second = self._rc_message.per_second
|
|
|
|
burst_count = self._rc_message.burst_count
|
|
|
|
|
|
|
|
# Check if there is a per user override in the DB.
|
|
|
|
override = await self.store.get_ratelimit_for_user(user_id)
|
|
|
|
if override:
|
|
|
|
# If overridden with a null Hz then ratelimiting has been entirely
|
|
|
|
# disabled for the user
|
|
|
|
if not override.messages_per_second:
|
|
|
|
return
|
|
|
|
|
|
|
|
messages_per_second = override.messages_per_second
|
|
|
|
burst_count = override.burst_count
|
|
|
|
|
|
|
|
if is_admin_redaction and self.admin_redaction_ratelimiter:
|
|
|
|
# If we have separate config for admin redactions, use a separate
|
|
|
|
# ratelimiter as to not have user_ids clash
|
2022-10-28 12:53:34 +02:00
|
|
|
await self.admin_redaction_ratelimiter.ratelimit(
|
|
|
|
requester, update=update, n_actions=n_actions
|
|
|
|
)
|
2021-10-08 13:44:43 +02:00
|
|
|
else:
|
|
|
|
# Override rate and burst count per-user
|
|
|
|
await self.request_ratelimiter.ratelimit(
|
|
|
|
requester,
|
|
|
|
rate_hz=messages_per_second,
|
|
|
|
burst_count=burst_count,
|
|
|
|
update=update,
|
2022-10-28 12:53:34 +02:00
|
|
|
n_actions=n_actions,
|
2021-10-08 13:44:43 +02:00
|
|
|
)
|