mirror of
https://github.com/d0zingcat/gocryptotrader.git
synced 2026-05-13 23:16:45 +00:00
* rate limits: Make context aware * binance: rate limit allow for cancellation of reservation when deadline is exceeded * request: add context.done() before initiating any bulk work. * binance: update error return for rate limiting * request: updated dealine check to remove after time.Now procedure as this will obfuscate a deadline which will be limited by the context check on every attempt, so no need to sleep with delay.
39 lines
838 B
Go
39 lines
838 B
Go
package gemini
|
|
|
|
import (
|
|
"context"
|
|
"time"
|
|
|
|
"github.com/thrasher-corp/gocryptotrader/exchanges/request"
|
|
"golang.org/x/time/rate"
|
|
)
|
|
|
|
const (
|
|
// gemini limit rates
|
|
geminiRateInterval = time.Minute
|
|
geminiAuthRate = 600
|
|
geminiUnauthRate = 120
|
|
)
|
|
|
|
// RateLimit implements the request.Limiter interface
|
|
type RateLimit struct {
|
|
Auth *rate.Limiter
|
|
UnAuth *rate.Limiter
|
|
}
|
|
|
|
// Limit limits the endpoint functionality
|
|
func (r *RateLimit) Limit(ctx context.Context, f request.EndpointLimit) error {
|
|
if f == request.Auth {
|
|
return r.Auth.Wait(ctx)
|
|
}
|
|
return r.UnAuth.Wait(ctx)
|
|
}
|
|
|
|
// SetRateLimit returns the rate limit for the exchange
|
|
func SetRateLimit() *RateLimit {
|
|
return &RateLimit{
|
|
Auth: request.NewRateLimit(geminiRateInterval, geminiAuthRate),
|
|
UnAuth: request.NewRateLimit(geminiRateInterval, geminiUnauthRate),
|
|
}
|
|
}
|