from Hacker News

No as a Service

by radeeyate on 4/30/25, 1:33 PM with 46 comments

  • by varun_ch on 4/30/25, 2:25 PM

    > {"error":"Too many requests, please try again later."}

    I guess it still works.

  • by deanputney on 4/30/25, 2:39 PM

    Not sure why, but reasons.json is mostly duplicates (as many as 50!) of the same 25 responses: https://gist.github.com/deanputney/4143ca30f7823ce53d894d3ed...

    It'd be easier to add new ones if they were in there a single time each. Maybe the duplication is meant to handle distribution?

  • by ziddoap on 4/30/25, 2:24 PM

    Fun idea. I wonder why the rejection messages are repeated so often in the "reasons" file.

    "I truly value our connection, and I hope my no doesn't change that." shows up 45 times.

    Seems like most of the rejections appear between 30 and 50 times.

  • by hombre_fatal on 4/30/25, 2:52 PM

    I made a lot of things like this as a noob and threw them up on github.

    As you gain experience, these projects become a testament to how far you've come.

    "An http endpoint that returns a random array element" becomes so incredibly trivial that you can't believe you even made a repo for it, and one day you sheepishly delete it.

  • by thih9 on 4/30/25, 2:39 PM

  • by choult on 4/30/25, 2:24 PM

    Well this is something... someone creating a service off the back of a meme that's been flying around my networks for the past two days...
  • by seabass on 4/30/25, 2:59 PM

    {"error":"Too many requests, please try again later."}

    a missed opportunity for some humor

  • by Retr0id on 4/30/25, 2:33 PM

    It could be genuinely useful for testing HTTP clients if it had a wider array of failure modes.

    Some ideas:

    - All the different HTTP status codes

    - expired/invalid TLS cert

    - no TLS cipher overlap

    - invalid syntax at the TLS and/or HTTP level

    - hang/timeout

    - endless slowloris-style response

    - compression-bomb

    - DNS failure (and/or round-robin DNS where some IPs are bad)

    - infinite redirect loop

    - ipv6-only

    - ipv4-only

    - Invalid JSON or XML syntax

  • by anonymousiam on 4/30/25, 2:42 PM

    Looks impressive, but out of the 1000 possible responses, only 26 are unique.
  • by macleginn on 4/30/25, 3:12 PM

    A worthy spiritual disciple of the Journal of Universal Rejection (https://www.universalrejection.org/)
  • by svilen_dobrev on 4/30/25, 3:22 PM

    nice. Reminds me of BOFH (Bastard operator from Hell) . And those box-like calendars with page-per-day with some excuse^w^w tip on each :)

    https://bofh.bjash.com/bofh/bofh1.html

  • by qrush on 4/30/25, 2:49 PM

    Oh great, it's Balatro's Wheel of Fortune card as a Service (WoFaaS)
  • by hotheadhacker on 4/30/25, 4:03 PM

    The API rate limiting has been removed.
  • by n8m8 on 4/30/25, 3:04 PM

    inb4 someone genuinely doesn't understand why you wouldn't do this with an LLM
  • by Haeuserschlucht on 4/30/25, 1:44 PM

    :)
  • by artogahr on 4/30/25, 2:20 PM

    :)
  • by blahaj on 4/30/25, 2:22 PM

    > Rate Limit: 10 requests per minute per IP

    I understand that one wants some rate limiting so that others don't just use this as a backend for their own service causing every single request for their service to also create an API request. But this is as simple and resource unintensive as it gets for an HTTP server. 10 requests per minute is just silly.

    Also could it be that the limit isn't enforced against the origin IP address but against the whole Cloudflare reverse proxy?