2022-01-18 13:38:18 +00:00
|
|
|
package net
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"strings"
|
|
|
|
|
2022-08-25 18:20:41 +00:00
|
|
|
"github.com/libp2p/go-libp2p/core/network"
|
|
|
|
"github.com/libp2p/go-libp2p/core/peer"
|
|
|
|
"github.com/libp2p/go-libp2p/core/protocol"
|
2022-08-25 18:23:25 +00:00
|
|
|
rcmgr "github.com/libp2p/go-libp2p/p2p/host/resource-manager"
|
2022-06-14 15:00:51 +00:00
|
|
|
"golang.org/x/xerrors"
|
2022-01-18 13:38:18 +00:00
|
|
|
|
|
|
|
"github.com/filecoin-project/lotus/api"
|
|
|
|
)
|
|
|
|
|
|
|
|
func (a *NetAPI) NetStat(ctx context.Context, scope string) (result api.NetStat, err error) {
|
|
|
|
switch {
|
|
|
|
case scope == "all":
|
|
|
|
rapi, ok := a.ResourceManager.(rcmgr.ResourceManagerState)
|
|
|
|
if !ok {
|
|
|
|
return result, xerrors.Errorf("rexource manager does not support ResourceManagerState API")
|
|
|
|
}
|
|
|
|
|
|
|
|
stat := rapi.Stat()
|
|
|
|
result.System = &stat.System
|
|
|
|
result.Transient = &stat.Transient
|
|
|
|
if len(stat.Services) > 0 {
|
|
|
|
result.Services = stat.Services
|
|
|
|
}
|
|
|
|
if len(stat.Protocols) > 0 {
|
|
|
|
result.Protocols = make(map[string]network.ScopeStat, len(stat.Protocols))
|
|
|
|
for proto, stat := range stat.Protocols {
|
|
|
|
result.Protocols[string(proto)] = stat
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if len(stat.Peers) > 0 {
|
|
|
|
result.Peers = make(map[string]network.ScopeStat, len(stat.Peers))
|
|
|
|
for p, stat := range stat.Peers {
|
2023-09-12 04:55:04 +00:00
|
|
|
result.Peers[p.String()] = stat
|
2022-01-18 13:38:18 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return result, nil
|
|
|
|
|
|
|
|
case scope == "system":
|
|
|
|
err = a.ResourceManager.ViewSystem(func(s network.ResourceScope) error {
|
|
|
|
stat := s.Stat()
|
|
|
|
result.System = &stat
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
return result, err
|
|
|
|
|
|
|
|
case scope == "transient":
|
|
|
|
err = a.ResourceManager.ViewTransient(func(s network.ResourceScope) error {
|
|
|
|
stat := s.Stat()
|
|
|
|
result.Transient = &stat
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
return result, err
|
|
|
|
|
|
|
|
case strings.HasPrefix(scope, "svc:"):
|
|
|
|
svc := scope[4:]
|
|
|
|
err = a.ResourceManager.ViewService(svc, func(s network.ServiceScope) error {
|
|
|
|
stat := s.Stat()
|
|
|
|
result.Services = map[string]network.ScopeStat{
|
|
|
|
svc: stat,
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
return result, err
|
|
|
|
|
|
|
|
case strings.HasPrefix(scope, "proto:"):
|
|
|
|
proto := scope[6:]
|
|
|
|
err = a.ResourceManager.ViewProtocol(protocol.ID(proto), func(s network.ProtocolScope) error {
|
|
|
|
stat := s.Stat()
|
|
|
|
result.Protocols = map[string]network.ScopeStat{
|
|
|
|
proto: stat,
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
return result, err
|
|
|
|
|
|
|
|
case strings.HasPrefix(scope, "peer:"):
|
|
|
|
p := scope[5:]
|
2022-07-07 21:47:33 +00:00
|
|
|
pid, err := peer.Decode(p)
|
2022-01-18 13:38:18 +00:00
|
|
|
if err != nil {
|
2022-01-18 14:15:32 +00:00
|
|
|
return result, xerrors.Errorf("invalid peer ID: %s: %w", p, err)
|
2022-01-18 13:38:18 +00:00
|
|
|
}
|
|
|
|
err = a.ResourceManager.ViewPeer(pid, func(s network.PeerScope) error {
|
|
|
|
stat := s.Stat()
|
|
|
|
result.Peers = map[string]network.ScopeStat{
|
|
|
|
p: stat,
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
return result, err
|
|
|
|
|
|
|
|
default:
|
|
|
|
return result, xerrors.Errorf("invalid scope %s", scope)
|
|
|
|
}
|
|
|
|
}
|
2022-01-18 14:15:32 +00:00
|
|
|
|
|
|
|
func (a *NetAPI) NetLimit(ctx context.Context, scope string) (result api.NetLimit, err error) {
|
|
|
|
getLimit := func(s network.ResourceScope) error {
|
|
|
|
limiter, ok := s.(rcmgr.ResourceScopeLimiter)
|
|
|
|
if !ok {
|
|
|
|
return xerrors.Errorf("resource scope doesn't implement ResourceScopeLimiter interface")
|
|
|
|
}
|
|
|
|
|
|
|
|
limit := limiter.Limit()
|
2022-07-05 22:07:56 +00:00
|
|
|
result.Memory = limit.GetMemoryLimit()
|
|
|
|
result.Streams = limit.GetStreamTotalLimit()
|
|
|
|
result.StreamsInbound = limit.GetStreamLimit(network.DirInbound)
|
|
|
|
result.StreamsOutbound = limit.GetStreamLimit(network.DirOutbound)
|
|
|
|
result.Conns = limit.GetConnTotalLimit()
|
|
|
|
result.ConnsInbound = limit.GetConnLimit(network.DirInbound)
|
|
|
|
result.ConnsOutbound = limit.GetConnLimit(network.DirOutbound)
|
|
|
|
result.FD = limit.GetFDLimit()
|
2022-01-18 14:15:32 +00:00
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
switch {
|
|
|
|
case scope == "system":
|
|
|
|
err = a.ResourceManager.ViewSystem(func(s network.ResourceScope) error {
|
|
|
|
return getLimit(s)
|
|
|
|
})
|
|
|
|
return result, err
|
|
|
|
|
|
|
|
case scope == "transient":
|
|
|
|
err = a.ResourceManager.ViewTransient(func(s network.ResourceScope) error {
|
|
|
|
return getLimit(s)
|
|
|
|
})
|
|
|
|
return result, err
|
|
|
|
|
|
|
|
case strings.HasPrefix(scope, "svc:"):
|
|
|
|
svc := scope[4:]
|
|
|
|
err = a.ResourceManager.ViewService(svc, func(s network.ServiceScope) error {
|
|
|
|
return getLimit(s)
|
|
|
|
})
|
|
|
|
return result, err
|
|
|
|
|
|
|
|
case strings.HasPrefix(scope, "proto:"):
|
|
|
|
proto := scope[6:]
|
|
|
|
err = a.ResourceManager.ViewProtocol(protocol.ID(proto), func(s network.ProtocolScope) error {
|
|
|
|
return getLimit(s)
|
|
|
|
})
|
|
|
|
return result, err
|
|
|
|
|
|
|
|
case strings.HasPrefix(scope, "peer:"):
|
|
|
|
p := scope[5:]
|
2022-07-07 21:47:33 +00:00
|
|
|
pid, err := peer.Decode(p)
|
2022-01-18 14:15:32 +00:00
|
|
|
if err != nil {
|
|
|
|
return result, xerrors.Errorf("invalid peer ID: %s: %w", p, err)
|
|
|
|
}
|
|
|
|
err = a.ResourceManager.ViewPeer(pid, func(s network.PeerScope) error {
|
|
|
|
return getLimit(s)
|
|
|
|
})
|
|
|
|
return result, err
|
|
|
|
|
|
|
|
default:
|
|
|
|
return result, xerrors.Errorf("invalid scope %s", scope)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (a *NetAPI) NetSetLimit(ctx context.Context, scope string, limit api.NetLimit) error {
|
|
|
|
setLimit := func(s network.ResourceScope) error {
|
|
|
|
limiter, ok := s.(rcmgr.ResourceScopeLimiter)
|
|
|
|
if !ok {
|
|
|
|
return xerrors.Errorf("resource scope doesn't implement ResourceScopeLimiter interface")
|
|
|
|
}
|
|
|
|
|
2022-07-05 22:07:56 +00:00
|
|
|
newLimit := &rcmgr.BaseLimit{
|
|
|
|
Memory: limit.Memory,
|
|
|
|
Streams: limit.Streams,
|
|
|
|
StreamsInbound: limit.StreamsInbound,
|
|
|
|
StreamsOutbound: limit.StreamsOutbound,
|
|
|
|
Conns: limit.Conns,
|
|
|
|
ConnsInbound: limit.ConnsInbound,
|
|
|
|
ConnsOutbound: limit.ConnsOutbound,
|
|
|
|
FD: limit.FD,
|
2022-01-18 14:15:32 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
limiter.SetLimit(newLimit)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
switch {
|
|
|
|
case scope == "system":
|
|
|
|
err := a.ResourceManager.ViewSystem(func(s network.ResourceScope) error {
|
|
|
|
return setLimit(s)
|
|
|
|
})
|
|
|
|
return err
|
|
|
|
|
|
|
|
case scope == "transient":
|
|
|
|
err := a.ResourceManager.ViewTransient(func(s network.ResourceScope) error {
|
|
|
|
return setLimit(s)
|
|
|
|
})
|
|
|
|
return err
|
|
|
|
|
|
|
|
case strings.HasPrefix(scope, "svc:"):
|
|
|
|
svc := scope[4:]
|
|
|
|
err := a.ResourceManager.ViewService(svc, func(s network.ServiceScope) error {
|
|
|
|
return setLimit(s)
|
|
|
|
})
|
|
|
|
return err
|
|
|
|
|
|
|
|
case strings.HasPrefix(scope, "proto:"):
|
|
|
|
proto := scope[6:]
|
|
|
|
err := a.ResourceManager.ViewProtocol(protocol.ID(proto), func(s network.ProtocolScope) error {
|
|
|
|
return setLimit(s)
|
|
|
|
})
|
|
|
|
return err
|
|
|
|
|
|
|
|
case strings.HasPrefix(scope, "peer:"):
|
|
|
|
p := scope[5:]
|
2022-07-07 21:47:33 +00:00
|
|
|
pid, err := peer.Decode(p)
|
2022-01-18 14:15:32 +00:00
|
|
|
if err != nil {
|
|
|
|
return xerrors.Errorf("invalid peer ID: %s: %w", p, err)
|
|
|
|
}
|
|
|
|
err = a.ResourceManager.ViewPeer(pid, func(s network.PeerScope) error {
|
|
|
|
return setLimit(s)
|
|
|
|
})
|
|
|
|
return err
|
|
|
|
|
|
|
|
default:
|
|
|
|
return xerrors.Errorf("invalid scope %s", scope)
|
|
|
|
}
|
|
|
|
}
|