GNU bug report logs -
#54241
[PATCH 0/4] 'github' importer gracefully handles rate limiting
Previous Next
Reported by: Ludovic Courtès <ludo <at> gnu.org>
Date: Thu, 3 Mar 2022 21:14:01 UTC
Severity: normal
Tags: patch
Done: Ludovic Courtès <ludo <at> gnu.org>
Bug is archived. No further changes may be made.
Full log
Message #74 received at 54241 <at> debbugs.gnu.org (full text, mbox):
[Message part 1 (text/plain, inline)]
Ludovic Courtès schreef op za 05-03-2022 om 23:03 [+0100]:
> Maxime Devos <maximedevos <at> telenet.be> skribis:
>
> > Ludovic Courtès schreef op do 03-03-2022 om 22:14 [+0100]:
> > > +(define (update-rate-limit-reset-time! headers)
> > > + "Update the rate limit reset time based on HEADERS, the HTTP response
> > > +headers."
> > > + (match (assq-ref headers 'x-ratelimit-reset)
> > > + ((= string->number (? number? reset))
> > > + (set! %rate-limit-reset-time reset)
> > > + reset)
> > > + (_
> > > + 0)))
> >
> > When can this second case happen?
>
> I don’t know if it’s supposed to happen. It’s defensive programming:
> better keep going than crash if the server starts behaving slightly
> differently.
If it's not supposed to happen, can it at least be reported with a
warning, such that we then know that 'update-rate-limit-reset-time!'
needs to be extended or GitHub needs to be contacted?
FWIW, I think crashing in case of bogus HTTP answers is fine, as long
as it crashes with a _nice_ error message ("guix: error: HTTP server
foo.com returned an unrecoginised X-Ratelimit-Reset $SOME_STRING" or
something like that) instead of some vague backtrace.
Greetings,
Maxime.
[signature.asc (application/pgp-signature, inline)]
This bug report was last modified 3 years and 78 days ago.
Previous Next
GNU bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson.