mirror of
https://git.mirrors.martin98.com/https://github.com/jina-ai/reader
synced 2025-08-18 05:35:52 +08:00
chore: add LRU cache for high rate limit user
This commit is contained in:
parent
9fbd751b65
commit
d50aa2e923
@ -1,6 +1,7 @@
|
||||
import { singleton } from 'tsyringe';
|
||||
import {
|
||||
assignTransferProtocolMeta, RPCHost, RPCReflection, AssertionFailureError, assignMeta, RawString,
|
||||
AuthenticationFailedError,
|
||||
} from 'civkit/civ-rpc';
|
||||
import { marshalErrorLike } from 'civkit/lang';
|
||||
import { objHashMd5B64Of } from 'civkit/hash';
|
||||
@ -22,6 +23,8 @@ import { JinaEmbeddingsAuthDTO } from '../dto/jina-embeddings-auth';
|
||||
import { InsufficientBalanceError } from '../services/errors';
|
||||
import { SerperImageSearchResponse, SerperNewsSearchResponse, SerperSearchQueryParams, SerperSearchResponse, SerperWebSearchResponse, WORLD_COUNTRIES, WORLD_LANGUAGES } from '../shared/3rd-party/serper-search';
|
||||
import { toAsyncGenerator } from '../utils/misc';
|
||||
import { LRUCache } from 'lru-cache';
|
||||
import { JinaEmbeddingsTokenAccount } from '../shared/db/jina-embeddings-token-account';
|
||||
|
||||
const WORLD_COUNTRY_CODES = Object.keys(WORLD_COUNTRIES).map((x) => x.toLowerCase());
|
||||
|
||||
@ -30,6 +33,12 @@ interface FormattedPage extends RealFormattedPage {
|
||||
date?: string;
|
||||
}
|
||||
|
||||
type RateLimitCache = {
|
||||
error?: Error;
|
||||
timeout?: NodeJS.Timeout;
|
||||
banned: boolean;
|
||||
};
|
||||
|
||||
@singleton()
|
||||
export class SearcherHost extends RPCHost {
|
||||
logger = this.globalLogger.child({ service: this.constructor.name });
|
||||
@ -42,6 +51,20 @@ export class SearcherHost extends RPCHost {
|
||||
|
||||
targetResultCount = 5;
|
||||
|
||||
rateLimitCache = new LRUCache<{}, RateLimitCache>({
|
||||
max: 256,
|
||||
ttl: 60 * 60 * 1000,
|
||||
updateAgeOnGet: false,
|
||||
updateAgeOnHas: false,
|
||||
});
|
||||
|
||||
userCache = new LRUCache<{}, JinaEmbeddingsTokenAccount>({
|
||||
max: 256,
|
||||
ttl: 60 * 60 * 1000,
|
||||
updateAgeOnGet: false,
|
||||
updateAgeOnHas: false,
|
||||
});
|
||||
|
||||
constructor(
|
||||
protected globalLogger: GlobalLogger,
|
||||
protected rateLimitControl: RateLimitControl,
|
||||
@ -106,13 +129,17 @@ export class SearcherHost extends RPCHost {
|
||||
count = (num !== undefined ? num : count) ?? 10;
|
||||
|
||||
const uid = await auth.solveUID();
|
||||
const authToken = auth.bearerToken;
|
||||
// Return content by default
|
||||
const crawlWithoutContent = crawlerOptions.respondWith.includes('no-content');
|
||||
const withFavicon = Boolean(ctx.get('X-With-Favicons'));
|
||||
this.threadLocal.set('collect-favicon', withFavicon);
|
||||
crawlerOptions.respondTiming ??= RESPOND_TIMING.VISIBLE_CONTENT;
|
||||
|
||||
let chargeAmount = 0;
|
||||
const rpcReflectPayload = {
|
||||
chargeAmount: 0
|
||||
};
|
||||
|
||||
const noSlashPath = decodeURIComponent(ctx.path).slice(1);
|
||||
if (!noSlashPath && !q) {
|
||||
const index = await this.crawler.getIndex(auth);
|
||||
@ -129,36 +156,31 @@ export class SearcherHost extends RPCHost {
|
||||
);
|
||||
}
|
||||
|
||||
const user = await auth.assertUser();
|
||||
if (!(user.wallet.total_balance > 0)) {
|
||||
throw new InsufficientBalanceError(`Account balance not enough to run this query, please recharge.`);
|
||||
if (!authToken) {
|
||||
throw new AuthenticationFailedError({
|
||||
message: 'Invalid API key, please get a new one from https://jina.ai'
|
||||
});
|
||||
}
|
||||
|
||||
const rateLimitPolicy = auth.getRateLimits(rpcReflect.name.toUpperCase()) || [
|
||||
parseInt(user.metadata?.speed_level) >= 2 ?
|
||||
RateLimitDesc.from({
|
||||
occurrence: 400,
|
||||
periodSeconds: 60
|
||||
}) :
|
||||
RateLimitDesc.from({
|
||||
occurrence: 40,
|
||||
periodSeconds: 60
|
||||
})
|
||||
];
|
||||
let user: JinaEmbeddingsTokenAccount | undefined = this.userCache.get(authToken);
|
||||
const userPromise = this.assertUser(auth);
|
||||
if (!user) {
|
||||
user = await userPromise;
|
||||
} else {
|
||||
// resolve uncaught error
|
||||
userPromise.catch(() => {});
|
||||
}
|
||||
|
||||
const apiRoll = await this.rateLimitControl.simpleRPCUidBasedLimit(
|
||||
rpcReflect, uid!, [rpcReflect.name.toUpperCase()],
|
||||
...rateLimitPolicy
|
||||
);
|
||||
|
||||
rpcReflect.finally(() => {
|
||||
if (chargeAmount) {
|
||||
auth.reportUsage(chargeAmount, `reader-${rpcReflect.name}`).catch((err) => {
|
||||
this.logger.warn(`Unable to report usage for ${uid}`, { err: marshalErrorLike(err) });
|
||||
});
|
||||
apiRoll.chargeAmount = chargeAmount;
|
||||
}
|
||||
});
|
||||
let rateLimitResult: RateLimitCache | undefined = this.rateLimitCache.get(authToken);
|
||||
const rateLimitPromise = this.assertRateLimit(rpcReflect, auth, user, rpcReflectPayload);
|
||||
if (rateLimitResult !== undefined) {
|
||||
// resolve uncaught error
|
||||
rateLimitPromise.catch(() => {});
|
||||
// throw rate limit error when cache is error result from last time.
|
||||
if (rateLimitResult.error instanceof Error) throw rateLimitResult;
|
||||
} else {
|
||||
await rateLimitPromise;
|
||||
}
|
||||
|
||||
delete crawlerOptions.html;
|
||||
|
||||
@ -257,7 +279,7 @@ export class SearcherHost extends RPCHost {
|
||||
break;
|
||||
}
|
||||
|
||||
chargeAmount = this.assignChargeAmount(scrapped, count, chargeAmountScaler);
|
||||
rpcReflectPayload.chargeAmount = this.assignChargeAmount(scrapped, count, chargeAmountScaler);
|
||||
lastScrapped = scrapped;
|
||||
sseStream.write({
|
||||
event: 'data',
|
||||
@ -291,7 +313,7 @@ export class SearcherHost extends RPCHost {
|
||||
return;
|
||||
}
|
||||
await assigningOfGeneralMixins;
|
||||
chargeAmount = this.assignChargeAmount(lastScrapped, count, chargeAmountScaler);
|
||||
rpcReflectPayload.chargeAmount = this.assignChargeAmount(lastScrapped, count, chargeAmountScaler);
|
||||
rpcReflect.return(lastScrapped);
|
||||
earlyReturn = true;
|
||||
}, ((crawlerOptions.timeout || 0) * 1000) || this.reasonableDelayMs);
|
||||
@ -312,7 +334,7 @@ export class SearcherHost extends RPCHost {
|
||||
clearTimeout(earlyReturnTimer);
|
||||
}
|
||||
await assigningOfGeneralMixins;
|
||||
chargeAmount = this.assignChargeAmount(scrapped, count, chargeAmountScaler);
|
||||
rpcReflectPayload.chargeAmount = this.assignChargeAmount(scrapped, count, chargeAmountScaler);
|
||||
|
||||
return scrapped;
|
||||
}
|
||||
@ -327,7 +349,7 @@ export class SearcherHost extends RPCHost {
|
||||
|
||||
if (!earlyReturn) {
|
||||
await assigningOfGeneralMixins;
|
||||
chargeAmount = this.assignChargeAmount(lastScrapped, count, chargeAmountScaler);
|
||||
rpcReflectPayload.chargeAmount = this.assignChargeAmount(lastScrapped, count, chargeAmountScaler);
|
||||
}
|
||||
|
||||
return lastScrapped;
|
||||
@ -343,7 +365,7 @@ export class SearcherHost extends RPCHost {
|
||||
return;
|
||||
}
|
||||
await assigningOfGeneralMixins;
|
||||
chargeAmount = this.assignChargeAmount(lastScrapped, count, chargeAmountScaler);
|
||||
rpcReflectPayload.chargeAmount = this.assignChargeAmount(lastScrapped, count, chargeAmountScaler);
|
||||
rpcReflect.return(assignTransferProtocolMeta(`${lastScrapped}`, { contentType: 'text/plain', envelope: null }));
|
||||
earlyReturn = true;
|
||||
}, ((crawlerOptions.timeout || 0) * 1000) || this.reasonableDelayMs);
|
||||
@ -366,7 +388,7 @@ export class SearcherHost extends RPCHost {
|
||||
clearTimeout(earlyReturnTimer);
|
||||
}
|
||||
await assigningOfGeneralMixins;
|
||||
chargeAmount = this.assignChargeAmount(scrapped, count, chargeAmountScaler);
|
||||
rpcReflectPayload.chargeAmount = this.assignChargeAmount(scrapped, count, chargeAmountScaler);
|
||||
|
||||
return assignTransferProtocolMeta(`${scrapped}`, { contentType: 'text/plain', envelope: null });
|
||||
}
|
||||
@ -381,7 +403,7 @@ export class SearcherHost extends RPCHost {
|
||||
|
||||
if (!earlyReturn) {
|
||||
await assigningOfGeneralMixins;
|
||||
chargeAmount = this.assignChargeAmount(lastScrapped, count, chargeAmountScaler);
|
||||
rpcReflectPayload.chargeAmount = this.assignChargeAmount(lastScrapped, count, chargeAmountScaler);
|
||||
}
|
||||
|
||||
return assignTransferProtocolMeta(`${lastScrapped}`, { contentType: 'text/plain', envelope: null });
|
||||
@ -603,6 +625,75 @@ export class SearcherHost extends RPCHost {
|
||||
|
||||
Object.setPrototypeOf(result, searchResultProto);
|
||||
}
|
||||
|
||||
async assertUser(auth: JinaEmbeddingsAuthDTO) {
|
||||
let user: JinaEmbeddingsTokenAccount | undefined = undefined;
|
||||
try {
|
||||
user = await auth.assertUser();
|
||||
if (!(user.wallet.total_balance > 0)) {
|
||||
throw new InsufficientBalanceError(`Account balance not enough to run this query, please recharge.`);
|
||||
}
|
||||
this.userCache.set(auth.bearerToken!, user);
|
||||
return user;
|
||||
} catch (e: any) {
|
||||
throw e;
|
||||
}
|
||||
}
|
||||
|
||||
async assertRateLimit(rpcReflect: RPCReflection, auth: JinaEmbeddingsAuthDTO, user: JinaEmbeddingsTokenAccount, rpcReflectPayload: {chargeAmount: number}) {
|
||||
const uid = auth.uid!;
|
||||
const rateLimitPolicy = auth.getRateLimits(rpcReflect.name.toUpperCase()) || [
|
||||
parseInt(user.metadata?.speed_level) >= 2 ?
|
||||
RateLimitDesc.from({
|
||||
occurrence: 400,
|
||||
periodSeconds: 60
|
||||
}) :
|
||||
RateLimitDesc.from({
|
||||
occurrence: 40,
|
||||
periodSeconds: 60
|
||||
})
|
||||
];
|
||||
|
||||
const isBigRateLimit = rateLimitPolicy.some(x => x.occurrence >= 500);
|
||||
let cacheValue: RateLimitCache | undefined = undefined;
|
||||
try {
|
||||
const apiRoll = await this.rateLimitControl.simpleRPCUidBasedLimit(
|
||||
rpcReflect, uid, [rpcReflect.name.toUpperCase()],
|
||||
...rateLimitPolicy
|
||||
);
|
||||
|
||||
rpcReflect.finally(() => {
|
||||
const chargeAmount = rpcReflectPayload.chargeAmount;
|
||||
if (chargeAmount) {
|
||||
auth.reportUsage(chargeAmount, `reader-${rpcReflect.name}`).catch((err) => {
|
||||
this.logger.warn(`Unable to report usage for ${uid}`, { err: marshalErrorLike(err) });
|
||||
});
|
||||
apiRoll.chargeAmount = chargeAmount;
|
||||
}
|
||||
});
|
||||
|
||||
cacheValue = {
|
||||
banned: false,
|
||||
};
|
||||
} catch (e: any) {
|
||||
const cache: RateLimitCache | undefined = this.rateLimitCache.get(auth.bearerToken!);
|
||||
if (cache && cache.banned !== false) {
|
||||
clearTimeout(cache.timeout);
|
||||
}
|
||||
cacheValue = {
|
||||
error: e,
|
||||
timeout: setTimeout(() => {
|
||||
this.rateLimitCache.set(auth.bearerToken!, {banned: false});
|
||||
}, e.retryAfter * 1000),
|
||||
banned: true,
|
||||
};
|
||||
throw e;
|
||||
} finally {
|
||||
if (isBigRateLimit) {
|
||||
this.rateLimitCache.set(auth.bearerToken!, cacheValue);
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
const dataItems = [
|
||||
|
Loading…
x
Reference in New Issue
Block a user