No as a Service

  • > {"error":"Too many requests, please try again later."}

    I guess it still works.

  • Not sure why, but reasons.json is mostly duplicates (as many as 50!) of the same 25 responses: https://gist.github.com/deanputney/4143ca30f7823ce53d894d3ed...

    It'd be easier to add new ones if they were in there a single time each. Maybe the duplication is meant to handle distribution?

  • Fun idea. I wonder why the rejection messages are repeated so often in the "reasons" file.

    "I truly value our connection, and I hope my no doesn't change that." shows up 45 times.

    Seems like most of the rejections appear between 30 and 50 times.

  • I made a lot of things like this as a noob and threw them up on github.

    As you gain experience, these projects become a testament to how far you've come.

    "An http endpoint that returns a random array element" becomes so incredibly trivial that you can't believe you even made a repo for it, and one day you sheepishly delete it.

  • Well this is something... someone creating a service off the back of a meme that's been flying around my networks for the past two days...

  • {"error":"Too many requests, please try again later."}

    a missed opportunity for some humor

  • It could be genuinely useful for testing HTTP clients if it had a wider array of failure modes.

    Some ideas:

    - All the different HTTP status codes

    - expired/invalid TLS cert

    - no TLS cipher overlap

    - invalid syntax at the TLS and/or HTTP level

    - hang/timeout

    - endless slowloris-style response

    - compression-bomb

    - DNS failure (and/or round-robin DNS where some IPs are bad)

    - infinite redirect loop

    - ipv6-only

    - ipv4-only

    - Invalid JSON or XML syntax

  • Looks impressive, but out of the 1000 possible responses, only 26 are unique.

  • A worthy spiritual disciple of the Journal of Universal Rejection (https://www.universalrejection.org/)

  • nice. Reminds me of BOFH (Bastard operator from Hell) . And those box-like calendars with page-per-day with some excuse^w^w tip on each :)

    https://bofh.bjash.com/bofh/bofh1.html

  • Oh great, it's Balatro's Wheel of Fortune card as a Service (WoFaaS)

  • The API rate limiting has been removed.

  • inb4 someone genuinely doesn't understand why you wouldn't do this with an LLM

  • :)

  • :)

  • [dead]

  • > Rate Limit: 10 requests per minute per IP

    I understand that one wants some rate limiting so that others don't just use this as a backend for their own service causing every single request for their service to also create an API request. But this is as simple and resource unintensive as it gets for an HTTP server. 10 requests per minute is just silly.

    Also could it be that the limit isn't enforced against the origin IP address but against the whole Cloudflare reverse proxy?