-
Notifications
You must be signed in to change notification settings - Fork 308
improve usage of GitHub API to avoid rate throttling #561
Comments
So, are you using the |
Good call, mail sent. We should still clean up our act, though. We don't send If-Modified-Since, for example. |
That is a great header to include to help prevent stuff like this. |
!m @pengwynn. Thank you! :-) |
Also, I believe we're doing unauthenticated requests for |
@pengwynn is the man. As for unauthenticated requests, I almost doubt that. Are you including your client key/secret pair as parameters in the URL? If so, that isn't unauthenticated last I checked. Caching the organizations would definitely be another great idea. |
@sigmavirus24 I just checked, and the |
@sigmavirus24 Want to take this ticket? It's about time we put you on the contributors board: https://github.com/zetaweb/www.gittip.com/graphs/contributors ;-) |
I'm curious, how necessary is it to incur these requests on every page load? Is the data something we could consider maybe caching for a period? |
We do cache lookups of individual GitHub accounts (via |
@whit537 so it seems the issue about |
We'll reopen/reticket if this becomes an issue again. |
This is our first instance of this in the wild since logging to Sentry. Here's the body of the reply from GitHub:
{"message":"API Rate Limit Exceeded for [IP address]"}
Unfortunately we're not logging the headers for that response. But we should.
Traceback snip:
Sentry: https://app.getsentry.com/gittip/gittip/group/3381442/
The text was updated successfully, but these errors were encountered: