Skip to content

Commit 706ad04

Browse files
Dzmitry Kishylaualbertchang
Dzmitry Kishylau
andauthored
[feat] Implement client-side rate limiting of API requests (#31)
* [feat] Implement client-side rate limiting of API requests * Update internal/provider/utils/throttled_transport.go Co-authored-by: Albert Chang <[email protected]> --------- Co-authored-by: Albert Chang <[email protected]>
1 parent 1447e33 commit 706ad04

File tree

8 files changed

+114
-6
lines changed

8 files changed

+114
-6
lines changed

docs/index.md

+25
Original file line numberDiff line numberDiff line change
@@ -63,6 +63,7 @@ better alternative.
6363

6464
- `access_token` (String, Sensitive) The access token for the Retool API
6565
- `host` (String) The host of the Retool instance, organization or Space, e.g. 'example.retool.com'
66+
- `requests_per_minute` (Number) The number of requests per minute to allow to the Retool API. Set to 45 by default. Set to -1 to disable rate limiting.
6667
- `scheme` (String) The scheme of the Retool instance, e.g. 'https'
6768

6869
## Environment Variables
@@ -112,3 +113,27 @@ RETOOL_SCHEME="https" \
112113
RETOOL_ACCESS_TOKEN="your-access-token" \
113114
terraform plan
114115
```
116+
117+
## Rate limiting
118+
Retool API has rate limits. In order to avoid hitting the rate limits, Retool Terraform provider is configured to limit requests to the API to 45 requests per minute.
119+
This might be too slow for complex Retool configurations with a lot of folders and permission groups. To increase the rate limit, you can do the following:
120+
121+
- Disable rate limiting on your self-hosted Retool instance by setting `DISABLE_RATE_LIMIT` environment variable to `true`.
122+
123+
- Increase the rate limit on your self-hosted Retool instance by setting `API_CALLS_PER_MIN` environment variable higher than its default value of 300.
124+
125+
Once you've increased the rate limit, you can increase the `requests_per_minute` parameter in the provider configuration.
126+
127+
```terraform
128+
provider "retool" {
129+
requests_per_minute = 100
130+
}
131+
```
132+
133+
Or you can disable rate limiting in the provider completely by setting `requests_per_minute` to `-1`.
134+
135+
```terraform
136+
provider "retool" {
137+
requests_per_minute = -1
138+
}
139+
```
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
provider "retool" {
2+
requests_per_minute = 100
3+
}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
provider "retool" {
2+
requests_per_minute = -1
3+
}

go.mod

+2-1
Original file line numberDiff line numberDiff line change
@@ -4,13 +4,14 @@ go 1.22.3
44

55
require (
66
github.com/hashicorp/terraform-plugin-docs v0.19.4
7-
github.com/hashicorp/terraform-plugin-framework v1.9.0
7+
github.com/hashicorp/terraform-plugin-framework v1.11.0
88
github.com/hashicorp/terraform-plugin-framework-validators v0.12.0
99
github.com/hashicorp/terraform-plugin-go v0.23.0
1010
github.com/hashicorp/terraform-plugin-log v0.9.0
1111
github.com/hashicorp/terraform-plugin-testing v1.8.0
1212
github.com/stretchr/testify v1.8.2
1313
golang.org/x/mod v0.17.0
14+
golang.org/x/time v0.6.0
1415
gopkg.in/dnaeon/go-vcr.v3 v3.2.0
1516
)
1617

go.sum

+4-2
Original file line numberDiff line numberDiff line change
@@ -99,8 +99,8 @@ github.com/hashicorp/terraform-json v0.22.1 h1:xft84GZR0QzjPVWs4lRUwvTcPnegqlyS7
9999
github.com/hashicorp/terraform-json v0.22.1/go.mod h1:JbWSQCLFSXFFhg42T7l9iJwdGXBYV8fmmD6o/ML4p3A=
100100
github.com/hashicorp/terraform-plugin-docs v0.19.4 h1:G3Bgo7J22OMtegIgn8Cd/CaSeyEljqjH3G39w28JK4c=
101101
github.com/hashicorp/terraform-plugin-docs v0.19.4/go.mod h1:4pLASsatTmRynVzsjEhbXZ6s7xBlUw/2Kt0zfrq8HxA=
102-
github.com/hashicorp/terraform-plugin-framework v1.9.0 h1:caLcDoxiRucNi2hk8+j3kJwkKfvHznubyFsJMWfZqKU=
103-
github.com/hashicorp/terraform-plugin-framework v1.9.0/go.mod h1:qBXLDn69kM97NNVi/MQ9qgd1uWWsVftGSnygYG1tImM=
102+
github.com/hashicorp/terraform-plugin-framework v1.11.0 h1:M7+9zBArexHFXDx/pKTxjE6n/2UCXY6b8FIq9ZYhwfE=
103+
github.com/hashicorp/terraform-plugin-framework v1.11.0/go.mod h1:qBXLDn69kM97NNVi/MQ9qgd1uWWsVftGSnygYG1tImM=
104104
github.com/hashicorp/terraform-plugin-framework-validators v0.12.0 h1:HOjBuMbOEzl7snOdOoUfE2Jgeto6JOjLVQ39Ls2nksc=
105105
github.com/hashicorp/terraform-plugin-framework-validators v0.12.0/go.mod h1:jfHGE/gzjxYz6XoUwi/aYiiKrJDeutQNUtGQXkaHklg=
106106
github.com/hashicorp/terraform-plugin-go v0.23.0 h1:AALVuU1gD1kPb48aPQUjug9Ir/125t+AAurhqphJ2Co=
@@ -257,6 +257,8 @@ golang.org/x/text v0.3.8/go.mod h1:E6s5w1FMmriuDzIBO73fBruAKo1PCIq6d2Q6DHfQ8WQ=
257257
golang.org/x/text v0.4.0/go.mod h1:mrYo+phRRbMaCq/xk9113O4dZlRixOauAjOtrjsXDZ8=
258258
golang.org/x/text v0.15.0 h1:h1V/4gjBv8v9cjcR6+AR5+/cIYK5N/WAgiv4xlsEtAk=
259259
golang.org/x/text v0.15.0/go.mod h1:18ZOQIKpY8NJVqYksKHtTdi31H5itFRjB5/qKTNYzSU=
260+
golang.org/x/time v0.6.0 h1:eTDhh4ZXt5Qf0augr54TN6suAUudPcawVZeIAPU7D4U=
261+
golang.org/x/time v0.6.0/go.mod h1:3BpzKBy/shNhVucY/MWOyx10tF3SFh9QdLuxbVysPQM=
260262
golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
261263
golang.org/x/tools v0.0.0-20191119224855-298f0cb1881e/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
262264
golang.org/x/tools v0.1.12/go.mod h1:hNGJHUnrk76NpqgfD5Aqm5Crs+Hm0VOH/i9J2+nxYbc=

internal/provider/provider.go

+26-3
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@ import (
77
"io"
88
"net/http"
99
"os"
10+
"time"
1011

1112
"github.com/hashicorp/terraform-plugin-framework/datasource"
1213
"github.com/hashicorp/terraform-plugin-framework/path"
@@ -64,9 +65,10 @@ type retoolProvider struct {
6465
}
6566

6667
type retoolProviderModel struct {
67-
Host types.String `tfsdk:"host"`
68-
Scheme types.String `tfsdk:"scheme"`
69-
AccessToken types.String `tfsdk:"access_token"`
68+
Host types.String `tfsdk:"host"`
69+
Scheme types.String `tfsdk:"scheme"`
70+
AccessToken types.String `tfsdk:"access_token"`
71+
RequestsPerMinute types.Int32 `tfsdk:"requests_per_minute"`
7072
}
7173

7274
// Metadata returns the provider type name.
@@ -92,6 +94,10 @@ func (p *retoolProvider) Schema(_ context.Context, _ provider.SchemaRequest, res
9294
Optional: true,
9395
Sensitive: true,
9496
},
97+
"requests_per_minute": schema.Int32Attribute{
98+
Description: "The number of requests per minute to allow to the Retool API. Set to 45 by default. Set to -1 to disable rate limiting.",
99+
Optional: true,
100+
},
95101
},
96102
}
97103
}
@@ -191,6 +197,11 @@ func (p *retoolProvider) Configure(ctx context.Context, req provider.ConfigureRe
191197
accessToken = config.AccessToken.ValueString()
192198
}
193199

200+
requestsPerMinute := 45
201+
if !config.RequestsPerMinute.IsNull() {
202+
requestsPerMinute = int(config.RequestsPerMinute.ValueInt32())
203+
}
204+
194205
// If any of the expected configurations are missing, return
195206
// errors with provider-specific guidance.
196207

@@ -237,6 +248,18 @@ func (p *retoolProvider) Configure(ctx context.Context, req provider.ConfigureRe
237248
// We need this to be able to record and replay HTTP interactions in the acceptance tests.
238249
if p.httpClient != nil {
239250
clientConfig.HTTPClient = p.httpClient
251+
} else {
252+
clientConfig.HTTPClient = http.DefaultClient
253+
}
254+
255+
if requestsPerMinute > 0 {
256+
currentTransport := clientConfig.HTTPClient.Transport
257+
if currentTransport == nil {
258+
currentTransport = http.DefaultTransport
259+
}
260+
// Rate-limiter is using a token bucket algorithm to limit the number of requests per minute.
261+
// The first parameter is the rate of token replenishment, the second is the capacity of the bucket.
262+
clientConfig.HTTPClient.Transport = utils.NewThrottledTransport(time.Duration(60000/requestsPerMinute)*time.Millisecond, requestsPerMinute, currentTransport)
240263
}
241264

242265
clientConfig.AddDefaultHeader("Authorization", "Bearer "+accessToken)
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
package utils
2+
3+
import (
4+
"net/http"
5+
"time"
6+
7+
"golang.org/x/time/rate"
8+
)
9+
10+
// ThrottledTransport Rate Limited HTTP Client
11+
// Copied as-is from https://gist.github.com/zdebra/10f0e284c4672e99f0cb767298f20c11
12+
type ThrottledTransport struct {
13+
roundTripperWrap http.RoundTripper
14+
ratelimiter *rate.Limiter
15+
}
16+
17+
// Implements the RoundTripper interface.
18+
func (c *ThrottledTransport) RoundTrip(r *http.Request) (*http.Response, error) {
19+
err := c.ratelimiter.Wait(r.Context()) // This is a blocking call. Honors the rate limit.
20+
if err != nil {
21+
return nil, err
22+
}
23+
return c.roundTripperWrap.RoundTrip(r)
24+
}
25+
26+
// NewThrottledTransport wraps transportWrap with a rate limitter
27+
// example usage:
28+
// client := http.DefaultClient
29+
// client.Transport = NewThrottledTransport(10*time.Seconds, 60, http.DefaultTransport) allows 60 requests every 10 seconds.
30+
func NewThrottledTransport(limitPeriod time.Duration, requestCount int, transportWrap http.RoundTripper) http.RoundTripper {
31+
return &ThrottledTransport{
32+
roundTripperWrap: transportWrap,
33+
ratelimiter: rate.NewLimiter(rate.Every(limitPeriod), requestCount),
34+
}
35+
}

templates/index.md.tmpl

+16
Original file line numberDiff line numberDiff line change
@@ -33,3 +33,19 @@ environment variables, respectively.
3333
### Example Usage
3434

3535
{{ codefile "shell" "examples/provider/usage_with_env_vars.sh" }}
36+
37+
## Rate limiting
38+
Retool API has rate limits. In order to avoid hitting the rate limits, Retool Terraform provider is configured to limit requests to the API to 45 requests per minute.
39+
This might be too slow for complex Retool configurations with a lot of folders and permission groups. To increase the rate limit, you can do the following:
40+
41+
- Disable rate limiting on your self-hosted Retool instance by setting `DISABLE_RATE_LIMIT` environment variable to `true`.
42+
43+
- Increase the rate limit on your self-hosted Retool instance by setting `API_CALLS_PER_MIN` environment variable higher than its default value of 300.
44+
45+
Once you've increased the rate limit, you can increase the `requests_per_minute` parameter in the provider configuration.
46+
47+
{{ tffile "examples/provider/provider_with_rate_limit.tf" }}
48+
49+
Or you can disable rate limiting in the provider completely by setting `requests_per_minute` to `-1`.
50+
51+
{{ tffile "examples/provider/provider_without_rate_limit.tf" }}

0 commit comments

Comments
 (0)