Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

increase payload limit for api /v1 to 200MB #283

Merged
merged 1 commit into from
Dec 18, 2024
Merged

Conversation

dinmukhamedm
Copy link
Member

@dinmukhamedm dinmukhamedm commented Dec 18, 2024

Some people load large payloads in evals, this is a quick fix


Important

Increase payload limit for /v1 API scope to 200MB in main.rs.

  • Behavior:
    • Increase payload limit for /v1 API scope from 10MB to 200MB in main.rs.
  • Misc:
    • This change is a quick fix to support larger payloads in evaluations.

This description was created by Ellipsis for 2e5f424. It will automatically update as commits are pushed.

Copy link
Contributor

@ellipsis-dev ellipsis-dev bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

❌ Changes requested. Reviewed everything up to 2e5f424 in 28 seconds

More details
  • Looked at 13 lines of code in 1 files
  • Skipped 0 files when reviewing.
  • Skipped posting 0 drafted comments based on config settings.

Workflow ID: wflow_1d3y1vJgzLRyQBon


Want Ellipsis to fix these issues? Tag @ellipsis-dev in a comment. You can customize Ellipsis with 👍 / 👎 feedback, review rules, user-specific overrides, quiet mode, and more.

@@ -404,7 +404,7 @@ fn main() -> anyhow::Result<()> {
.service(api::v1::evaluations::create_evaluation)
.service(api::v1::metrics::process_metrics)
.service(api::v1::semantic_search::semantic_search)
.app_data(PayloadConfig::new(10 * 1024 * 1024)),
.app_data(PayloadConfig::new(200 * 1024 * 1024)),
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Increasing the payload limit to 200MB can expose the server to potential denial-of-service (DoS) attacks due to large payloads. Consider implementing additional checks or rate limiting to mitigate this risk.

@dinmukhamedm dinmukhamedm merged commit 4336ec9 into dev Dec 18, 2024
1 check passed
@dinmukhamedm dinmukhamedm deleted the payload-limit branch December 18, 2024 21:04
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant