2017-05-05 12:07:10 +02:00
|
|
|
import os
|
|
|
|
|
2019-12-30 02:26:08 +01:00
|
|
|
from abc import ABC, abstractmethod
|
2019-04-01 21:18:26 +02:00
|
|
|
from typing import Dict, List, Optional, Tuple
|
2016-03-27 12:09:54 +02:00
|
|
|
|
2013-05-29 23:58:07 +02:00
|
|
|
from django.conf import settings
|
2019-04-01 20:11:56 +02:00
|
|
|
from django.http import HttpRequest
|
|
|
|
from zerver.lib.exceptions import RateLimited
|
2014-02-05 00:35:32 +01:00
|
|
|
from zerver.lib.redis_utils import get_redis_client
|
2019-03-23 18:33:37 +01:00
|
|
|
from zerver.lib.utils import statsd
|
2013-05-29 23:58:07 +02:00
|
|
|
|
2016-03-27 12:09:54 +02:00
|
|
|
from zerver.models import UserProfile
|
|
|
|
|
2019-03-23 18:33:37 +01:00
|
|
|
import logging
|
2013-05-29 23:58:07 +02:00
|
|
|
import redis
|
|
|
|
import time
|
|
|
|
|
|
|
|
# Implement a rate-limiting scheme inspired by the one described here, but heavily modified
|
2020-03-27 01:32:21 +01:00
|
|
|
# https://www.domaintools.com/resources/blog/rate-limiting-with-redis
|
2013-05-29 23:58:07 +02:00
|
|
|
|
2014-02-05 00:35:32 +01:00
|
|
|
client = get_redis_client()
|
2019-04-01 21:18:26 +02:00
|
|
|
rules = settings.RATE_LIMITING_RULES # type: Dict[str, List[Tuple[int, int]]]
|
2013-05-29 23:58:07 +02:00
|
|
|
|
2017-11-03 03:12:25 +01:00
|
|
|
KEY_PREFIX = ''
|
2017-05-05 12:07:10 +02:00
|
|
|
|
2019-03-23 18:33:37 +01:00
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
|
2018-12-12 21:13:00 +01:00
|
|
|
class RateLimiterLockingException(Exception):
|
|
|
|
pass
|
|
|
|
|
2019-12-30 02:26:08 +01:00
|
|
|
class RateLimitedObject(ABC):
|
2020-03-05 13:38:20 +01:00
|
|
|
def __init__(self) -> None:
|
|
|
|
self.backend = RedisRateLimiterBackend
|
|
|
|
|
2020-03-04 14:05:25 +01:00
|
|
|
def rate_limit(self) -> Tuple[bool, float]:
|
|
|
|
# Returns (ratelimited, secs_to_freedom)
|
2020-03-06 13:44:52 +01:00
|
|
|
return self.backend.rate_limit_entity(self.key(), self.rules(),
|
|
|
|
self.max_api_calls(),
|
|
|
|
self.max_api_window())
|
2020-03-04 14:05:25 +01:00
|
|
|
|
|
|
|
def rate_limit_request(self, request: HttpRequest) -> None:
|
|
|
|
ratelimited, time = self.rate_limit()
|
|
|
|
|
2020-04-01 13:31:20 +02:00
|
|
|
if not hasattr(request, '_ratelimits_applied'):
|
|
|
|
request._ratelimits_applied = []
|
|
|
|
request._ratelimits_applied.append(RateLimitResult(
|
2020-03-04 14:05:25 +01:00
|
|
|
entity=self,
|
|
|
|
secs_to_freedom=time,
|
2020-04-01 13:50:27 +02:00
|
|
|
remaining=0,
|
2020-03-04 14:05:25 +01:00
|
|
|
over_limit=ratelimited
|
2020-04-01 13:31:20 +02:00
|
|
|
))
|
2020-03-04 14:05:25 +01:00
|
|
|
# Abort this request if the user is over their rate limits
|
|
|
|
if ratelimited:
|
|
|
|
# Pass information about what kind of entity got limited in the exception:
|
2020-04-01 13:13:06 +02:00
|
|
|
raise RateLimited(str(time))
|
2020-03-04 14:05:25 +01:00
|
|
|
|
2020-04-01 18:44:19 +02:00
|
|
|
calls_remaining, seconds_until_reset = self.api_calls_left()
|
2020-03-04 14:05:25 +01:00
|
|
|
|
2020-04-01 13:31:20 +02:00
|
|
|
request._ratelimits_applied[-1].remaining = calls_remaining
|
2020-04-01 18:44:19 +02:00
|
|
|
request._ratelimits_applied[-1].secs_to_freedom = seconds_until_reset
|
2020-03-04 14:05:25 +01:00
|
|
|
|
|
|
|
def block_access(self, seconds: int) -> None:
|
|
|
|
"Manually blocks an entity for the desired number of seconds"
|
2020-03-06 13:44:52 +01:00
|
|
|
self.backend.block_access(self.key(), seconds)
|
2020-03-04 14:05:25 +01:00
|
|
|
|
|
|
|
def unblock_access(self) -> None:
|
2020-03-06 13:44:52 +01:00
|
|
|
self.backend.unblock_access(self.key())
|
2020-03-04 14:05:25 +01:00
|
|
|
|
|
|
|
def clear_history(self) -> None:
|
2020-03-06 13:44:52 +01:00
|
|
|
self.backend.clear_history(self.key())
|
2020-03-04 14:05:25 +01:00
|
|
|
|
|
|
|
def max_api_calls(self) -> int:
|
|
|
|
"Returns the API rate limit for the highest limit"
|
|
|
|
return self.rules()[-1][1]
|
|
|
|
|
|
|
|
def max_api_window(self) -> int:
|
|
|
|
"Returns the API time window for the highest limit"
|
|
|
|
return self.rules()[-1][0]
|
|
|
|
|
|
|
|
def api_calls_left(self) -> Tuple[int, float]:
|
|
|
|
"""Returns how many API calls in this range this client has, as well as when
|
|
|
|
the rate-limit will be reset to 0"""
|
|
|
|
max_window = self.max_api_window()
|
|
|
|
max_calls = self.max_api_calls()
|
2020-03-06 13:44:52 +01:00
|
|
|
return self.backend.get_api_calls_left(self.key(), max_window, max_calls)
|
2020-03-04 14:05:25 +01:00
|
|
|
|
2019-12-30 02:26:08 +01:00
|
|
|
@abstractmethod
|
2020-03-06 10:49:04 +01:00
|
|
|
def key(self) -> str:
|
2019-12-30 02:26:08 +01:00
|
|
|
pass
|
2017-07-28 06:40:52 +02:00
|
|
|
|
2019-12-30 02:26:08 +01:00
|
|
|
@abstractmethod
|
2017-11-05 11:15:10 +01:00
|
|
|
def rules(self) -> List[Tuple[int, int]]:
|
2019-12-30 02:26:08 +01:00
|
|
|
pass
|
2017-07-28 06:40:52 +02:00
|
|
|
|
|
|
|
class RateLimitedUser(RateLimitedObject):
|
2019-08-03 20:39:49 +02:00
|
|
|
def __init__(self, user: UserProfile, domain: str='api_by_user') -> None:
|
2017-07-28 06:40:52 +02:00
|
|
|
self.user = user
|
|
|
|
self.domain = domain
|
2020-03-05 13:38:20 +01:00
|
|
|
super().__init__()
|
2017-07-28 06:40:52 +02:00
|
|
|
|
2020-03-06 10:49:04 +01:00
|
|
|
def key(self) -> str:
|
2020-03-06 10:56:36 +01:00
|
|
|
return "{}:{}:{}".format(type(self).__name__, self.user.id, self.domain)
|
2017-07-28 06:40:52 +02:00
|
|
|
|
2017-11-05 11:15:10 +01:00
|
|
|
def rules(self) -> List[Tuple[int, int]]:
|
2019-08-03 20:39:49 +02:00
|
|
|
# user.rate_limits are general limits, applicable to the domain 'api_by_user'
|
|
|
|
if self.user.rate_limits != "" and self.domain == 'api_by_user':
|
2017-07-28 06:40:52 +02:00
|
|
|
result = [] # type: List[Tuple[int, int]]
|
|
|
|
for limit in self.user.rate_limits.split(','):
|
|
|
|
(seconds, requests) = limit.split(':', 2)
|
|
|
|
result.append((int(seconds), int(requests)))
|
|
|
|
return result
|
2019-04-01 21:18:26 +02:00
|
|
|
return rules[self.domain]
|
2017-07-28 06:40:52 +02:00
|
|
|
|
2018-05-11 01:40:23 +02:00
|
|
|
def bounce_redis_key_prefix_for_testing(test_name: str) -> None:
|
2017-05-05 12:07:10 +02:00
|
|
|
global KEY_PREFIX
|
2018-05-11 01:40:23 +02:00
|
|
|
KEY_PREFIX = test_name + ':' + str(os.getpid()) + ':'
|
2017-05-05 12:07:10 +02:00
|
|
|
|
2019-08-03 20:39:49 +02:00
|
|
|
def add_ratelimit_rule(range_seconds: int, num_requests: int, domain: str='api_by_user') -> None:
|
2013-05-29 23:58:07 +02:00
|
|
|
"Add a rate-limiting rule to the ratelimiter"
|
2013-06-05 22:32:23 +02:00
|
|
|
global rules
|
2013-05-29 23:58:07 +02:00
|
|
|
|
2019-04-01 21:18:26 +02:00
|
|
|
if domain not in rules:
|
|
|
|
# If we don't have any rules for domain yet, the domain key needs to be
|
|
|
|
# added to the rules dictionary.
|
|
|
|
rules[domain] = []
|
2013-05-29 23:58:07 +02:00
|
|
|
|
2019-04-01 21:18:26 +02:00
|
|
|
rules[domain].append((range_seconds, num_requests))
|
|
|
|
rules[domain].sort(key=lambda x: x[0])
|
|
|
|
|
2019-08-03 20:39:49 +02:00
|
|
|
def remove_ratelimit_rule(range_seconds: int, num_requests: int, domain: str='api_by_user') -> None:
|
2013-05-29 23:58:07 +02:00
|
|
|
global rules
|
2019-04-01 21:18:26 +02:00
|
|
|
rules[domain] = [x for x in rules[domain] if x[0] != range_seconds and x[1] != num_requests]
|
2013-05-29 23:58:07 +02:00
|
|
|
|
2020-03-05 13:38:20 +01:00
|
|
|
class RateLimiterBackend(ABC):
|
|
|
|
@classmethod
|
|
|
|
@abstractmethod
|
2020-03-06 13:44:52 +01:00
|
|
|
def block_access(cls, entity_key: str, seconds: int) -> None:
|
2020-03-05 13:38:20 +01:00
|
|
|
"Manually blocks an entity for the desired number of seconds"
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
@abstractmethod
|
2020-03-06 13:44:52 +01:00
|
|
|
def unblock_access(cls, entity_key: str) -> None:
|
2020-03-05 13:38:20 +01:00
|
|
|
pass
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
@abstractmethod
|
2020-03-06 13:44:52 +01:00
|
|
|
def clear_history(cls, entity_key: str) -> None:
|
2020-03-06 13:58:23 +01:00
|
|
|
pass
|
2020-03-05 13:38:20 +01:00
|
|
|
|
|
|
|
@classmethod
|
|
|
|
@abstractmethod
|
2020-03-06 13:44:52 +01:00
|
|
|
def get_api_calls_left(cls, entity_key: str, range_seconds: int,
|
2020-03-05 13:38:20 +01:00
|
|
|
max_calls: int) -> Tuple[int, float]:
|
|
|
|
pass
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
@abstractmethod
|
2020-03-06 13:44:52 +01:00
|
|
|
def rate_limit_entity(cls, entity_key: str, rules: List[Tuple[int, int]],
|
|
|
|
max_api_calls: int, max_api_window: int) -> Tuple[bool, float]:
|
2020-03-05 13:38:20 +01:00
|
|
|
# Returns (ratelimited, secs_to_freedom)
|
|
|
|
pass
|
|
|
|
|
|
|
|
class RedisRateLimiterBackend(RateLimiterBackend):
|
|
|
|
@classmethod
|
2020-03-06 13:44:52 +01:00
|
|
|
def get_keys(cls, entity_key: str) -> List[str]:
|
|
|
|
return ["{}ratelimit:{}:{}".format(KEY_PREFIX, entity_key, keytype)
|
|
|
|
for keytype in ['list', 'zset', 'block']]
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def block_access(cls, entity_key: str, seconds: int) -> None:
|
2020-03-05 13:38:20 +01:00
|
|
|
"Manually blocks an entity for the desired number of seconds"
|
2020-03-06 13:44:52 +01:00
|
|
|
_, _, blocking_key = cls.get_keys(entity_key)
|
2020-03-05 13:38:20 +01:00
|
|
|
with client.pipeline() as pipe:
|
|
|
|
pipe.set(blocking_key, 1)
|
|
|
|
pipe.expire(blocking_key, seconds)
|
|
|
|
pipe.execute()
|
|
|
|
|
|
|
|
@classmethod
|
2020-03-06 13:44:52 +01:00
|
|
|
def unblock_access(cls, entity_key: str) -> None:
|
|
|
|
_, _, blocking_key = cls.get_keys(entity_key)
|
2020-03-05 13:38:20 +01:00
|
|
|
client.delete(blocking_key)
|
|
|
|
|
|
|
|
@classmethod
|
2020-03-06 13:44:52 +01:00
|
|
|
def clear_history(cls, entity_key: str) -> None:
|
|
|
|
for key in cls.get_keys(entity_key):
|
2020-03-05 13:38:20 +01:00
|
|
|
client.delete(key)
|
|
|
|
|
|
|
|
@classmethod
|
2020-03-06 13:44:52 +01:00
|
|
|
def get_api_calls_left(cls, entity_key: str, range_seconds: int,
|
2020-03-05 13:38:20 +01:00
|
|
|
max_calls: int) -> Tuple[int, float]:
|
2020-03-06 13:44:52 +01:00
|
|
|
list_key, set_key, _ = cls.get_keys(entity_key)
|
2020-03-05 13:38:20 +01:00
|
|
|
# Count the number of values in our sorted set
|
|
|
|
# that are between now and the cutoff
|
|
|
|
now = time.time()
|
|
|
|
boundary = now - range_seconds
|
|
|
|
|
|
|
|
with client.pipeline() as pipe:
|
|
|
|
# Count how many API calls in our range have already been made
|
|
|
|
pipe.zcount(set_key, boundary, now)
|
|
|
|
# Get the newest call so we can calculate when the ratelimit
|
|
|
|
# will reset to 0
|
|
|
|
pipe.lindex(list_key, 0)
|
|
|
|
|
|
|
|
results = pipe.execute()
|
2013-05-29 23:58:07 +02:00
|
|
|
|
2020-03-05 13:38:20 +01:00
|
|
|
count = results[0] # type: int
|
|
|
|
newest_call = results[1] # type: Optional[bytes]
|
2013-05-29 23:58:07 +02:00
|
|
|
|
2020-03-05 13:38:20 +01:00
|
|
|
calls_left = max_calls - count
|
|
|
|
if newest_call is not None:
|
|
|
|
time_reset = now + (range_seconds - (now - float(newest_call)))
|
|
|
|
else:
|
|
|
|
time_reset = now
|
2013-05-29 23:58:07 +02:00
|
|
|
|
2020-04-01 18:44:19 +02:00
|
|
|
return calls_left, time_reset - now
|
2013-05-29 23:58:07 +02:00
|
|
|
|
2020-03-05 13:38:20 +01:00
|
|
|
@classmethod
|
2020-03-06 13:44:52 +01:00
|
|
|
def is_ratelimited(cls, entity_key: str, rules: List[Tuple[int, int]]) -> Tuple[bool, float]:
|
2020-03-05 13:38:20 +01:00
|
|
|
"Returns a tuple of (rate_limited, time_till_free)"
|
2020-03-06 13:44:52 +01:00
|
|
|
list_key, set_key, blocking_key = cls.get_keys(entity_key)
|
2013-05-29 23:58:07 +02:00
|
|
|
|
2020-03-05 13:38:20 +01:00
|
|
|
if len(rules) == 0:
|
|
|
|
return False, 0.0
|
2013-05-29 23:58:07 +02:00
|
|
|
|
2020-03-05 13:38:20 +01:00
|
|
|
# Go through the rules from shortest to longest,
|
|
|
|
# seeing if this user has violated any of them. First
|
|
|
|
# get the timestamps for each nth items
|
|
|
|
with client.pipeline() as pipe:
|
|
|
|
for _, request_count in rules:
|
|
|
|
pipe.lindex(list_key, request_count - 1) # 0-indexed list
|
|
|
|
|
|
|
|
# Get blocking info
|
|
|
|
pipe.get(blocking_key)
|
|
|
|
pipe.ttl(blocking_key)
|
|
|
|
|
|
|
|
rule_timestamps = pipe.execute() # type: List[Optional[bytes]]
|
|
|
|
|
|
|
|
# Check if there is a manual block on this API key
|
|
|
|
blocking_ttl_b = rule_timestamps.pop()
|
|
|
|
key_blocked = rule_timestamps.pop()
|
|
|
|
|
|
|
|
if key_blocked is not None:
|
|
|
|
# We are manually blocked. Report for how much longer we will be
|
|
|
|
if blocking_ttl_b is None:
|
|
|
|
blocking_ttl = 0.5
|
|
|
|
else:
|
|
|
|
blocking_ttl = int(blocking_ttl_b)
|
|
|
|
return True, blocking_ttl
|
|
|
|
|
|
|
|
now = time.time()
|
|
|
|
for timestamp, (range_seconds, num_requests) in zip(rule_timestamps, rules):
|
|
|
|
# Check if the nth timestamp is newer than the associated rule. If so,
|
|
|
|
# it means we've hit our limit for this rule
|
|
|
|
if timestamp is None:
|
|
|
|
continue
|
2013-05-29 23:58:07 +02:00
|
|
|
|
2020-03-05 13:38:20 +01:00
|
|
|
boundary = float(timestamp) + range_seconds
|
2020-04-02 17:44:23 +02:00
|
|
|
if boundary >= now:
|
2020-03-05 13:38:20 +01:00
|
|
|
free = boundary - now
|
|
|
|
return True, free
|
|
|
|
|
2013-05-29 23:58:07 +02:00
|
|
|
return False, 0.0
|
|
|
|
|
2020-03-05 13:38:20 +01:00
|
|
|
@classmethod
|
2020-03-06 13:44:52 +01:00
|
|
|
def incr_ratelimit(cls, entity_key: str, rules: List[Tuple[int, int]],
|
|
|
|
max_api_calls: int, max_api_window: int) -> None:
|
2020-03-05 13:38:20 +01:00
|
|
|
"""Increases the rate-limit for the specified entity"""
|
2020-03-06 13:44:52 +01:00
|
|
|
list_key, set_key, _ = cls.get_keys(entity_key)
|
2020-03-05 13:38:20 +01:00
|
|
|
now = time.time()
|
2013-05-29 23:58:07 +02:00
|
|
|
|
2020-03-05 13:38:20 +01:00
|
|
|
# If we have no rules, we don't store anything
|
|
|
|
if len(rules) == 0:
|
|
|
|
return
|
2013-05-29 23:58:07 +02:00
|
|
|
|
2020-03-05 13:38:20 +01:00
|
|
|
# Start redis transaction
|
|
|
|
with client.pipeline() as pipe:
|
|
|
|
count = 0
|
|
|
|
while True:
|
|
|
|
try:
|
|
|
|
# To avoid a race condition between getting the element we might trim from our list
|
|
|
|
# and removing it from our associated set, we abort this whole transaction if
|
|
|
|
# another agent manages to change our list out from under us
|
|
|
|
# When watching a value, the pipeline is set to Immediate mode
|
|
|
|
pipe.watch(list_key)
|
2013-05-29 23:58:07 +02:00
|
|
|
|
2020-03-05 13:38:20 +01:00
|
|
|
# Get the last elem that we'll trim (so we can remove it from our sorted set)
|
2020-03-06 13:44:52 +01:00
|
|
|
last_val = pipe.lindex(list_key, max_api_calls - 1)
|
2013-05-29 23:58:07 +02:00
|
|
|
|
2020-03-05 13:38:20 +01:00
|
|
|
# Restart buffered execution
|
|
|
|
pipe.multi()
|
2013-05-29 23:58:07 +02:00
|
|
|
|
2020-03-05 13:38:20 +01:00
|
|
|
# Add this timestamp to our list
|
|
|
|
pipe.lpush(list_key, now)
|
2013-05-29 23:58:07 +02:00
|
|
|
|
2020-03-05 13:38:20 +01:00
|
|
|
# Trim our list to the oldest rule we have
|
2020-03-06 13:44:52 +01:00
|
|
|
pipe.ltrim(list_key, 0, max_api_calls - 1)
|
2013-05-29 23:58:07 +02:00
|
|
|
|
2020-03-05 13:38:20 +01:00
|
|
|
# Add our new value to the sorted set that we keep
|
|
|
|
# We need to put the score and val both as timestamp,
|
|
|
|
# as we sort by score but remove by value
|
|
|
|
pipe.zadd(set_key, {str(now): now})
|
2013-05-29 23:58:07 +02:00
|
|
|
|
2020-03-05 13:38:20 +01:00
|
|
|
# Remove the trimmed value from our sorted set, if there was one
|
|
|
|
if last_val is not None:
|
|
|
|
pipe.zrem(set_key, last_val)
|
2013-05-29 23:58:07 +02:00
|
|
|
|
2020-03-05 13:38:20 +01:00
|
|
|
# Set the TTL for our keys as well
|
2020-03-06 13:44:52 +01:00
|
|
|
api_window = max_api_window
|
2020-03-05 13:38:20 +01:00
|
|
|
pipe.expire(list_key, api_window)
|
|
|
|
pipe.expire(set_key, api_window)
|
2013-05-29 23:58:07 +02:00
|
|
|
|
2020-03-05 13:38:20 +01:00
|
|
|
pipe.execute()
|
2013-05-29 23:58:07 +02:00
|
|
|
|
2020-03-05 13:38:20 +01:00
|
|
|
# If no exception was raised in the execution, there were no transaction conflicts
|
|
|
|
break
|
|
|
|
except redis.WatchError:
|
|
|
|
if count > 10:
|
|
|
|
raise RateLimiterLockingException()
|
|
|
|
count += 1
|
2013-06-05 22:32:23 +02:00
|
|
|
|
2020-03-05 13:38:20 +01:00
|
|
|
continue
|
2013-05-29 23:58:07 +02:00
|
|
|
|
2020-03-05 13:38:20 +01:00
|
|
|
@classmethod
|
2020-03-06 13:44:52 +01:00
|
|
|
def rate_limit_entity(cls, entity_key: str, rules: List[Tuple[int, int]],
|
|
|
|
max_api_calls: int, max_api_window: int) -> Tuple[bool, float]:
|
|
|
|
ratelimited, time = cls.is_ratelimited(entity_key, rules)
|
2013-05-29 23:58:07 +02:00
|
|
|
|
2020-03-05 13:38:20 +01:00
|
|
|
if ratelimited:
|
2020-03-06 13:44:52 +01:00
|
|
|
statsd.incr("ratelimiter.limited.%s" % (entity_key,))
|
2020-03-05 13:38:20 +01:00
|
|
|
|
|
|
|
else:
|
|
|
|
try:
|
2020-03-06 13:44:52 +01:00
|
|
|
cls.incr_ratelimit(entity_key, rules, max_api_calls, max_api_window)
|
2020-03-05 13:38:20 +01:00
|
|
|
except RateLimiterLockingException:
|
2020-03-06 13:44:52 +01:00
|
|
|
logger.warning("Deadlock trying to incr_ratelimit for %s" % (entity_key,))
|
2020-03-05 13:38:20 +01:00
|
|
|
# rate-limit users who are hitting the API so hard we can't update our stats.
|
|
|
|
ratelimited = True
|
|
|
|
|
|
|
|
return ratelimited, time
|
2019-03-23 18:33:37 +01:00
|
|
|
|
2019-12-28 20:23:18 +01:00
|
|
|
class RateLimitResult:
|
|
|
|
def __init__(self, entity: RateLimitedObject, secs_to_freedom: float, over_limit: bool,
|
2020-04-01 13:50:27 +02:00
|
|
|
remaining: int) -> None:
|
2019-12-28 20:23:18 +01:00
|
|
|
if over_limit:
|
|
|
|
assert not remaining
|
|
|
|
|
|
|
|
self.entity = entity
|
|
|
|
self.secs_to_freedom = secs_to_freedom
|
|
|
|
self.over_limit = over_limit
|
|
|
|
self.remaining = remaining
|