-
-
Notifications
You must be signed in to change notification settings - Fork 606
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ratelimits: Check at NewOrder and SpendOnly later #7669
Conversation
73ed05b
to
315ab1a
Compare
315ab1a
to
e9ee493
Compare
e9ee493
to
08170d7
Compare
@beautifulentropy, this PR appears to contain configuration and/or SQL schema changes. Please ensure that a corresponding deployment ticket has been filed with the new values. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM % filing a ticket for the RA to be hooked up to the rate limits redis cluster
Filing a ticket with #7666 to ensure that the RA gets hooked up and I'll ensure that there's no dependence on it unless it's configured and the flag is flipped. |
- Check `CertificatesPerDomain` at newOrder and spend at Finalize time. - Check `CertificatesPerAccountPerDomain` at newOrder and spend at Finalize time. - Check `CertificatesPerFQDNSet` at newOrder and spend at Finalize time. - Fix a bug in`FailedAuthorizationsPerDomainPerAccountSpendOnlyTransaction()` which results in failed authorizations being spent for the exact FQDN, not the eTLD+1. - Remove redundant "max names" check at transaction construction time - Enable key-value rate limits in the RA
CertificatesPerDomain
at newOrder and spend at Finalize time.CertificatesPerAccountPerDomain
at newOrder and spend at Finalize time.CertificatesPerFQDNSet
at newOrder and spend at Finalize time.FailedAuthorizationsPerDomainPerAccountSpendOnlyTransaction()
which results in failed authorizations being spent for the exact FQDN, not the eTLD+1.