You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
107 lines
2.7 KiB
107 lines
2.7 KiB
package s3api
|
|
|
|
import (
|
|
"github.com/seaweedfs/seaweedfs/weed/pb/s3_pb"
|
|
"github.com/seaweedfs/seaweedfs/weed/s3api/s3_constants"
|
|
"github.com/seaweedfs/seaweedfs/weed/s3api/s3err"
|
|
"net/http"
|
|
"sync"
|
|
"sync/atomic"
|
|
"testing"
|
|
)
|
|
|
|
type TestLimitCase struct {
|
|
actionName string
|
|
|
|
limitType string
|
|
bucketLimitValue int64
|
|
globalLimitValue int64
|
|
|
|
routineCount int
|
|
successCount int64
|
|
}
|
|
|
|
var (
|
|
bucket = "/test"
|
|
action = s3_constants.ACTION_WRITE
|
|
fileSize int64 = 200
|
|
|
|
TestLimitCases = []*TestLimitCase{
|
|
|
|
//bucket-LimitTypeCount
|
|
{action, s3_constants.LimitTypeCount, 5, 6, 60, 5},
|
|
{action, s3_constants.LimitTypeCount, 0, 6, 6, 0},
|
|
|
|
//global-LimitTypeCount
|
|
{action, s3_constants.LimitTypeCount, 6, 5, 6, 5},
|
|
{action, s3_constants.LimitTypeCount, 6, 0, 6, 0},
|
|
|
|
//bucket-LimitTypeBytes
|
|
{action, s3_constants.LimitTypeBytes, 1000, 1020, 6, 5},
|
|
{action, s3_constants.LimitTypeBytes, 0, 1020, 6, 0},
|
|
|
|
//global-LimitTypeBytes
|
|
{action, s3_constants.LimitTypeBytes, 1020, 1000, 6, 5},
|
|
{action, s3_constants.LimitTypeBytes, 1020, 0, 6, 0},
|
|
}
|
|
)
|
|
|
|
func TestLimit(t *testing.T) {
|
|
for _, tc := range TestLimitCases {
|
|
circuitBreakerConfig := &s3_pb.S3CircuitBreakerConfig{
|
|
Global: &s3_pb.S3CircuitBreakerOptions{
|
|
Enabled: true,
|
|
Actions: map[string]int64{
|
|
s3_constants.Concat(tc.actionName, tc.limitType): tc.globalLimitValue,
|
|
s3_constants.Concat(tc.actionName, tc.limitType): tc.globalLimitValue,
|
|
},
|
|
},
|
|
Buckets: map[string]*s3_pb.S3CircuitBreakerOptions{
|
|
bucket: {
|
|
Enabled: true,
|
|
Actions: map[string]int64{
|
|
s3_constants.Concat(tc.actionName, tc.limitType): tc.bucketLimitValue,
|
|
},
|
|
},
|
|
},
|
|
}
|
|
circuitBreaker := &CircuitBreaker{
|
|
counters: make(map[string]*int64),
|
|
limitations: make(map[string]int64),
|
|
}
|
|
err := circuitBreaker.loadCircuitBreakerConfig(circuitBreakerConfig)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
successCount := doLimit(circuitBreaker, tc.routineCount, &http.Request{ContentLength: fileSize}, tc.actionName)
|
|
if successCount != tc.successCount {
|
|
t.Errorf("successCount not equal, expect=%d, actual=%d, case: %v", tc.successCount, successCount, tc)
|
|
}
|
|
}
|
|
}
|
|
|
|
func doLimit(circuitBreaker *CircuitBreaker, routineCount int, r *http.Request, action string) int64 {
|
|
var successCounter int64
|
|
resultCh := make(chan []func(), routineCount)
|
|
var wg sync.WaitGroup
|
|
for i := 0; i < routineCount; i++ {
|
|
wg.Add(1)
|
|
go func() {
|
|
defer wg.Done()
|
|
rollbackFn, errCode := circuitBreaker.limit(r, bucket, action)
|
|
if errCode == s3err.ErrNone {
|
|
atomic.AddInt64(&successCounter, 1)
|
|
}
|
|
resultCh <- rollbackFn
|
|
}()
|
|
}
|
|
wg.Wait()
|
|
close(resultCh)
|
|
for fns := range resultCh {
|
|
for _, fn := range fns {
|
|
fn()
|
|
}
|
|
}
|
|
return successCounter
|
|
}
|