[ Index ]

PHP Cross Reference of Phabricator

title

Body

[close]

/support/ -> PhabricatorStartup.php (summary)

Handle request startup, before loading the environment or libraries. This class bootstraps the request state up to the point where we can enter Phabricator code. NOTE: This class MUST NOT have any dependencies. It runs before libraries load.

File Size: 856 lines (25 kb)
Included or required:0 times
Referenced: 2 times
Includes or requires: 0 files

Defines 31 functions

  getStartTime()
  getMicrosecondsSinceStart()
  setGlobal()
  getGlobal()
  getRawInput()
  didStartup()
  didShutdown()
  loadCoreLibraries()
  beginOutputCapture()
  endOutputCapture()
  setDebugTimeLimit()
  onDebugTick()
  didEncounterFatalException()
  didFatal()
  setupPHP()
  getOldMemoryLimit()
  normalizeInput()
  verifyPHP()
  verifyRewriteRules()
  validateGlobal()
  detectPostMaxSizeTriggered()
  setMaximumRate()
  rateLimitRequest()
  addRateLimitScore()
  canRateLimit()
  getRateLimitBucket()
  getRateLimitBucketCount()
  getRateLimitBucketKey()
  getRateLimitMinKey()
  getRateLimitScore()
  didRateLimit()

Functions
Functions that are not part of a class:

getStartTime()   X-Ref


getMicrosecondsSinceStart()   X-Ref


setGlobal($key, $value)   X-Ref


getGlobal($key, $default = null)   X-Ref


getRawInput()   X-Ref


didStartup()   X-Ref


didShutdown()   X-Ref


loadCoreLibraries()   X-Ref
No description

beginOutputCapture()   X-Ref
No description

endOutputCapture()   X-Ref
No description

setDebugTimeLimit($limit)   X-Ref
Set a time limit (in seconds) for the current script. After time expires,
the script fatals.

This works like `max_execution_time`, but prints out a useful stack trace
when the time limit expires. This is primarily intended to make it easier
to debug pages which hang by allowing extraction of a stack trace: set a
short debug limit, then use the trace to figure out what's happening.

The limit is implemented with a tick function, so enabling it implies
some accounting overhead.

param: int Time limit in seconds.
return: void

onDebugTick()   X-Ref
Callback tick function used by @{method:setDebugTimeLimit}.

Fatals with a useful stack trace after the time limit expires.

return: void

didEncounterFatalException($note,Exception $ex,$show_trace)   X-Ref
Fatal the request completely in response to an exception, sending a plain
text message to the client. Calls @{method:didFatal} internally.

param: string    Brief description of the exception context, like
param: Exception The exception itself.
param: bool      True if it's okay to show the exception's stack trace
return: exit      This method **does not return**.

didFatal($message, $log_message = null)   X-Ref
Fatal the request completely, sending a plain text message to the client.

param: string  Plain text message to send to the client.
param: string  Plain text message to send to the error log. If not
return: exit    This method **does not return**.

setupPHP()   X-Ref


getOldMemoryLimit()   X-Ref


normalizeInput()   X-Ref


verifyPHP()   X-Ref


verifyRewriteRules()   X-Ref


validateGlobal($key)   X-Ref


detectPostMaxSizeTriggered()   X-Ref
Detect if this request has had its POST data stripped by exceeding the
'post_max_size' PHP configuration limit.

PHP has a setting called 'post_max_size'. If a POST request arrives with
a body larger than the limit, PHP doesn't generate $_POST but processes
the request anyway, and provides no formal way to detect that this
happened.

We can still read the entire body out of `php://input`. However according
to the documentation the stream isn't available for "multipart/form-data"
(on nginx + php-fpm it appears that it is available, though, at least) so
any attempt to generate $_POST would be fragile.


setMaximumRate($rate)   X-Ref
Adjust the permissible rate limit score.

By default, the limit is `1000`. You can use this method to set it to
a larger or smaller value. If you set it to `2000`, users may make twice
as many requests before rate limiting.

param: int Maximum score before rate limiting.
return: void

rateLimitRequest($user_identity)   X-Ref
Check if the user (identified by `$user_identity`) has issued too many
requests recently. If they have, end the request with a 429 error code.

The key just needs to identify the user. Phabricator uses both user PHIDs
and user IPs as keys, tracking logged-in and logged-out users separately
and enforcing different limits.

param: string  Some key which identifies the user making the request.
return: void    If the user has exceeded the rate limit, this method

addRateLimitScore($user_identity, $score)   X-Ref
Add points to the rate limit score for some user.

If users have earned more than 1000 points per minute across all the
buckets they'll be locked out of the application, so awarding 1 point per
request roughly corresponds to allowing 1000 requests per second, while
awarding 50 points roughly corresponds to allowing 20 requests per second.

param: string  Some key which identifies the user making the request.
param: float   The cost for this request; more points pushes them toward
return: void

canRateLimit()   X-Ref
Determine if rate limiting is available.

Rate limiting depends on APC, and isn't available unless the APC user
cache is available.

return: bool True if rate limiting is available.

getRateLimitBucket()   X-Ref
Get the current bucket for storing rate limit scores.

return: int The current bucket.

getRateLimitBucketCount()   X-Ref
Get the total number of rate limit buckets to retain.

return: int Total number of rate limit buckets to retain.

getRateLimitBucketKey($bucket)   X-Ref
Get the APC key for a given bucket.

param: int Bucket to get the key for.
return: string APC key for the bucket.

getRateLimitMinKey()   X-Ref
Get the APC key for the smallest stored bucket.

return: string APC key for the smallest stored bucket.

getRateLimitScore($user_identity)   X-Ref
Get the current rate limit score for a given user.

param: string Unique key identifying the user.
return: float The user's current score.

didRateLimit()   X-Ref
Emit an HTTP 429 "Too Many Requests" response (indicating that the user
has exceeded application rate limits) and exit.

return: exit This method **does not return**.



Generated: Sun Nov 30 09:20:46 2014 Cross-referenced by PHPXref 0.7.1