Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[MM-54216] Bump ws rate limiting burst #498

Merged
merged 1 commit into from
Aug 23, 2023
Merged

[MM-54216] Bump ws rate limiting burst #498

merged 1 commit into from
Aug 23, 2023

Conversation

streamer45
Copy link
Collaborator

Summary

It looks like Firefox can be spamming a very long list of candidates if running on an instance with many network interfaces and hit the rate limiter which will drop messages, potentially preventing proper connectivity. What's worse, upon first unmute or screen sharing attempt it will do more of the same.

Note to self: this should be the last time we bump this. If the problem reappears we need to investigate a different solution.

Ticket Link

https://mattermost.atlassian.net/browse/MM-54216

@streamer45 streamer45 added the 2: Dev Review Requires review by a core committer label Aug 22, 2023
@streamer45 streamer45 added this to the v0.19.0 - MM 9.0 milestone Aug 22, 2023
@streamer45 streamer45 requested a review from cpoile August 22, 2023 23:08
@streamer45 streamer45 self-assigned this Aug 22, 2023
@codecov-commenter
Copy link

Codecov Report

Patch coverage has no change and project coverage change: -0.01% ⚠️

Comparison is base (ab8863b) 5.60% compared to head (6f89196) 5.60%.
Report is 2 commits behind head on main.

Additional details and impacted files
@@           Coverage Diff            @@
##            main    #498      +/-   ##
========================================
- Coverage   5.60%   5.60%   -0.01%     
========================================
  Files         21      21              
  Lines       4193    4194       +1     
========================================
  Hits         235     235              
- Misses      3941    3942       +1     
  Partials      17      17              
Files Changed Coverage Δ
server/session.go 0.00% <0.00%> (ø)
server/websocket.go 0.00% <0.00%> (ø)

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

@@ -47,7 +47,8 @@ type session struct {
leaveCh chan struct{}
left int32

limiter *rate.Limiter
// rate limiter for incoming WebSocket messages.
wsMsgLimiter *rate.Limiter
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thank you for the nice var name!

@streamer45 streamer45 added 3: Reviews Complete All reviewers have approved the pull request and removed 2: Dev Review Requires review by a core committer labels Aug 23, 2023
@streamer45
Copy link
Collaborator Author

@streamer45 streamer45 merged commit 3dbaaf5 into main Aug 23, 2023
@streamer45 streamer45 deleted the MM-54216 branch August 23, 2023 16:37
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
3: Reviews Complete All reviewers have approved the pull request
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants