mirror of
https://github.com/monero-project/monero.git
synced 2024-10-01 11:49:47 -04:00
Merge pull request #2470
2e59f6ea
rpc: add new RPCs to get and set limits (MaxXor)
This commit is contained in:
commit
3bf20a77f2
@ -334,17 +334,18 @@ bool t_command_parser_executor::set_limit(const std::vector<std::string>& args)
|
|||||||
if(args.size()==0) {
|
if(args.size()==0) {
|
||||||
return m_executor.get_limit();
|
return m_executor.get_limit();
|
||||||
}
|
}
|
||||||
int limit;
|
int64_t limit;
|
||||||
try {
|
try {
|
||||||
limit = std::stoi(args[0]);
|
limit = std::stoll(args[0]);
|
||||||
}
|
}
|
||||||
catch(std::invalid_argument& ex) {
|
catch(const std::invalid_argument& ex) {
|
||||||
|
std::cout << "failed to parse argument" << std::endl;
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
if (limit==-1) limit=128;
|
if (limit > 0)
|
||||||
limit *= 1024;
|
limit *= 1024;
|
||||||
|
|
||||||
return m_executor.set_limit(limit);
|
return m_executor.set_limit(limit, limit);
|
||||||
}
|
}
|
||||||
|
|
||||||
bool t_command_parser_executor::set_limit_up(const std::vector<std::string>& args)
|
bool t_command_parser_executor::set_limit_up(const std::vector<std::string>& args)
|
||||||
@ -353,17 +354,18 @@ bool t_command_parser_executor::set_limit_up(const std::vector<std::string>& arg
|
|||||||
if(args.size()==0) {
|
if(args.size()==0) {
|
||||||
return m_executor.get_limit_up();
|
return m_executor.get_limit_up();
|
||||||
}
|
}
|
||||||
int limit;
|
int64_t limit;
|
||||||
try {
|
try {
|
||||||
limit = std::stoi(args[0]);
|
limit = std::stoll(args[0]);
|
||||||
}
|
}
|
||||||
catch(std::invalid_argument& ex) {
|
catch(const std::invalid_argument& ex) {
|
||||||
|
std::cout << "failed to parse argument" << std::endl;
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
if (limit==-1) limit=128;
|
if (limit > 0)
|
||||||
limit *= 1024;
|
limit *= 1024;
|
||||||
|
|
||||||
return m_executor.set_limit_up(limit);
|
return m_executor.set_limit(0, limit);
|
||||||
}
|
}
|
||||||
|
|
||||||
bool t_command_parser_executor::set_limit_down(const std::vector<std::string>& args)
|
bool t_command_parser_executor::set_limit_down(const std::vector<std::string>& args)
|
||||||
@ -372,17 +374,18 @@ bool t_command_parser_executor::set_limit_down(const std::vector<std::string>& a
|
|||||||
if(args.size()==0) {
|
if(args.size()==0) {
|
||||||
return m_executor.get_limit_down();
|
return m_executor.get_limit_down();
|
||||||
}
|
}
|
||||||
int limit;
|
int64_t limit;
|
||||||
try {
|
try {
|
||||||
limit = std::stoi(args[0]);
|
limit = std::stoll(args[0]);
|
||||||
}
|
}
|
||||||
catch(std::invalid_argument& ex) {
|
catch(const std::invalid_argument& ex) {
|
||||||
|
std::cout << "failed to parse argument" << std::endl;
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
if (limit==-1) limit=128;
|
if (limit > 0)
|
||||||
limit *= 1024;
|
limit *= 1024;
|
||||||
|
|
||||||
return m_executor.set_limit_down(limit);
|
return m_executor.set_limit(limit, 0);
|
||||||
}
|
}
|
||||||
|
|
||||||
bool t_command_parser_executor::out_peers(const std::vector<std::string>& args)
|
bool t_command_parser_executor::out_peers(const std::vector<std::string>& args)
|
||||||
|
@ -1130,48 +1130,115 @@ bool t_rpc_command_executor::print_status()
|
|||||||
|
|
||||||
bool t_rpc_command_executor::get_limit()
|
bool t_rpc_command_executor::get_limit()
|
||||||
{
|
{
|
||||||
int limit_down = epee::net_utils::connection_basic::get_rate_down_limit( );
|
cryptonote::COMMAND_RPC_GET_LIMIT::request req;
|
||||||
int limit_up = epee::net_utils::connection_basic::get_rate_up_limit( );
|
cryptonote::COMMAND_RPC_GET_LIMIT::response res;
|
||||||
std::cout << "limit-down is " << limit_down/1024 << " kB/s" << std::endl;
|
|
||||||
std::cout << "limit-up is " << limit_up/1024 << " kB/s" << std::endl;
|
std::string failure_message = "Couldn't get limit";
|
||||||
return true;
|
|
||||||
|
if (m_is_rpc)
|
||||||
|
{
|
||||||
|
if (!m_rpc_client->rpc_request(req, res, "/get_limit", failure_message.c_str()))
|
||||||
|
{
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
if (!m_rpc_server->on_get_limit(req, res) || res.status != CORE_RPC_STATUS_OK)
|
||||||
|
{
|
||||||
|
tools::fail_msg_writer() << make_error(failure_message, res.status);
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
tools::msg_writer() << "limit-down is " << res.limit_down/1024 << " kB/s";
|
||||||
|
tools::msg_writer() << "limit-up is " << res.limit_up/1024 << " kB/s";
|
||||||
|
return true;
|
||||||
}
|
}
|
||||||
|
|
||||||
bool t_rpc_command_executor::set_limit(int limit)
|
bool t_rpc_command_executor::set_limit(int64_t limit_down, int64_t limit_up)
|
||||||
{
|
{
|
||||||
epee::net_utils::connection_basic::set_rate_down_limit( limit );
|
cryptonote::COMMAND_RPC_SET_LIMIT::request req;
|
||||||
epee::net_utils::connection_basic::set_rate_up_limit( limit );
|
cryptonote::COMMAND_RPC_SET_LIMIT::response res;
|
||||||
std::cout << "Set limit-down to " << limit/1024 << " kB/s" << std::endl;
|
|
||||||
std::cout << "Set limit-up to " << limit/1024 << " kB/s" << std::endl;
|
req.limit_down = limit_down;
|
||||||
return true;
|
req.limit_up = limit_up;
|
||||||
|
|
||||||
|
std::string failure_message = "Couldn't set limit";
|
||||||
|
|
||||||
|
if (m_is_rpc)
|
||||||
|
{
|
||||||
|
if (!m_rpc_client->rpc_request(req, res, "/set_limit", failure_message.c_str()))
|
||||||
|
{
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
if (!m_rpc_server->on_set_limit(req, res) || res.status != CORE_RPC_STATUS_OK)
|
||||||
|
{
|
||||||
|
tools::fail_msg_writer() << make_error(failure_message, res.status);
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
tools::msg_writer() << "Set limit-down to " << res.limit_down/1024 << " kB/s";
|
||||||
|
tools::msg_writer() << "Set limit-up to " << res.limit_up/1024 << " kB/s";
|
||||||
|
return true;
|
||||||
}
|
}
|
||||||
|
|
||||||
bool t_rpc_command_executor::get_limit_up()
|
bool t_rpc_command_executor::get_limit_up()
|
||||||
{
|
{
|
||||||
int limit_up = epee::net_utils::connection_basic::get_rate_up_limit( );
|
cryptonote::COMMAND_RPC_GET_LIMIT::request req;
|
||||||
std::cout << "limit-up is " << limit_up/1024 << " kB/s" << std::endl;
|
cryptonote::COMMAND_RPC_GET_LIMIT::response res;
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
bool t_rpc_command_executor::set_limit_up(int limit)
|
std::string failure_message = "Couldn't get limit";
|
||||||
{
|
|
||||||
epee::net_utils::connection_basic::set_rate_up_limit( limit );
|
if (m_is_rpc)
|
||||||
std::cout << "Set limit-up to " << limit/1024 << " kB/s" << std::endl;
|
{
|
||||||
return true;
|
if (!m_rpc_client->rpc_request(req, res, "/get_limit", failure_message.c_str()))
|
||||||
|
{
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
if (!m_rpc_server->on_get_limit(req, res) || res.status != CORE_RPC_STATUS_OK)
|
||||||
|
{
|
||||||
|
tools::fail_msg_writer() << make_error(failure_message, res.status);
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
tools::msg_writer() << "limit-up is " << res.limit_up/1024 << " kB/s";
|
||||||
|
return true;
|
||||||
}
|
}
|
||||||
|
|
||||||
bool t_rpc_command_executor::get_limit_down()
|
bool t_rpc_command_executor::get_limit_down()
|
||||||
{
|
{
|
||||||
int limit_down = epee::net_utils::connection_basic::get_rate_down_limit( );
|
cryptonote::COMMAND_RPC_GET_LIMIT::request req;
|
||||||
std::cout << "limit-down is " << limit_down/1024 << " kB/s" << std::endl;
|
cryptonote::COMMAND_RPC_GET_LIMIT::response res;
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
bool t_rpc_command_executor::set_limit_down(int limit)
|
std::string failure_message = "Couldn't get limit";
|
||||||
{
|
|
||||||
epee::net_utils::connection_basic::set_rate_down_limit( limit );
|
if (m_is_rpc)
|
||||||
std::cout << "Set limit-down to " << limit/1024 << " kB/s" << std::endl;
|
{
|
||||||
return true;
|
if (!m_rpc_client->rpc_request(req, res, "/get_limit", failure_message.c_str()))
|
||||||
|
{
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
if (!m_rpc_server->on_get_limit(req, res) || res.status != CORE_RPC_STATUS_OK)
|
||||||
|
{
|
||||||
|
tools::fail_msg_writer() << make_error(failure_message, res.status);
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
tools::msg_writer() << "limit-down is " << res.limit_down/1024 << " kB/s";
|
||||||
|
return true;
|
||||||
}
|
}
|
||||||
|
|
||||||
bool t_rpc_command_executor::out_peers(uint64_t limit)
|
bool t_rpc_command_executor::out_peers(uint64_t limit)
|
||||||
|
@ -119,11 +119,7 @@ public:
|
|||||||
|
|
||||||
bool get_limit_down();
|
bool get_limit_down();
|
||||||
|
|
||||||
bool set_limit(int limit);
|
bool set_limit(int64_t limit_down, int64_t limit_up);
|
||||||
|
|
||||||
bool set_limit_up(int limit);
|
|
||||||
|
|
||||||
bool set_limit_down(int limit);
|
|
||||||
|
|
||||||
bool out_peers(uint64_t limit);
|
bool out_peers(uint64_t limit);
|
||||||
|
|
||||||
|
@ -1533,6 +1533,53 @@ namespace cryptonote
|
|||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
//------------------------------------------------------------------------------------------------------------------------------
|
//------------------------------------------------------------------------------------------------------------------------------
|
||||||
|
bool core_rpc_server::on_get_limit(const COMMAND_RPC_GET_LIMIT::request& req, COMMAND_RPC_GET_LIMIT::response& res)
|
||||||
|
{
|
||||||
|
res.limit_down = epee::net_utils::connection_basic::get_rate_down_limit();
|
||||||
|
res.limit_up = epee::net_utils::connection_basic::get_rate_up_limit();
|
||||||
|
res.status = CORE_RPC_STATUS_OK;
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
//------------------------------------------------------------------------------------------------------------------------------
|
||||||
|
bool core_rpc_server::on_set_limit(const COMMAND_RPC_SET_LIMIT::request& req, COMMAND_RPC_SET_LIMIT::response& res)
|
||||||
|
{
|
||||||
|
// -1 = reset to default
|
||||||
|
// 0 = do not modify
|
||||||
|
|
||||||
|
if (req.limit_down > 0)
|
||||||
|
{
|
||||||
|
epee::net_utils::connection_basic::set_rate_down_limit(req.limit_down);
|
||||||
|
}
|
||||||
|
else if (req.limit_down < 0)
|
||||||
|
{
|
||||||
|
if (req.limit_down != -1)
|
||||||
|
{
|
||||||
|
res.status = CORE_RPC_ERROR_CODE_WRONG_PARAM;
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
epee::net_utils::connection_basic::set_rate_down_limit(nodetool::default_limit_down * 1024);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (req.limit_up > 0)
|
||||||
|
{
|
||||||
|
epee::net_utils::connection_basic::set_rate_up_limit(req.limit_up);
|
||||||
|
}
|
||||||
|
else if (req.limit_up < 0)
|
||||||
|
{
|
||||||
|
if (req.limit_up != -1)
|
||||||
|
{
|
||||||
|
res.status = CORE_RPC_ERROR_CODE_WRONG_PARAM;
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
epee::net_utils::connection_basic::set_rate_up_limit(nodetool::default_limit_up * 1024);
|
||||||
|
}
|
||||||
|
|
||||||
|
res.limit_down = epee::net_utils::connection_basic::get_rate_down_limit();
|
||||||
|
res.limit_up = epee::net_utils::connection_basic::get_rate_up_limit();
|
||||||
|
res.status = CORE_RPC_STATUS_OK;
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
//------------------------------------------------------------------------------------------------------------------------------
|
||||||
bool core_rpc_server::on_out_peers(const COMMAND_RPC_OUT_PEERS::request& req, COMMAND_RPC_OUT_PEERS::response& res)
|
bool core_rpc_server::on_out_peers(const COMMAND_RPC_OUT_PEERS::request& req, COMMAND_RPC_OUT_PEERS::response& res)
|
||||||
{
|
{
|
||||||
// TODO
|
// TODO
|
||||||
|
@ -97,6 +97,8 @@ namespace cryptonote
|
|||||||
MAP_URI_AUTO_JON2("/get_transaction_pool_stats", on_get_transaction_pool_stats, COMMAND_RPC_GET_TRANSACTION_POOL_STATS)
|
MAP_URI_AUTO_JON2("/get_transaction_pool_stats", on_get_transaction_pool_stats, COMMAND_RPC_GET_TRANSACTION_POOL_STATS)
|
||||||
MAP_URI_AUTO_JON2_IF("/stop_daemon", on_stop_daemon, COMMAND_RPC_STOP_DAEMON, !m_restricted)
|
MAP_URI_AUTO_JON2_IF("/stop_daemon", on_stop_daemon, COMMAND_RPC_STOP_DAEMON, !m_restricted)
|
||||||
MAP_URI_AUTO_JON2("/getinfo", on_get_info, COMMAND_RPC_GET_INFO)
|
MAP_URI_AUTO_JON2("/getinfo", on_get_info, COMMAND_RPC_GET_INFO)
|
||||||
|
MAP_URI_AUTO_JON2("/get_limit", on_get_limit, COMMAND_RPC_GET_LIMIT)
|
||||||
|
MAP_URI_AUTO_JON2_IF("/set_limit", on_set_limit, COMMAND_RPC_SET_LIMIT, !m_restricted)
|
||||||
MAP_URI_AUTO_JON2_IF("/out_peers", on_out_peers, COMMAND_RPC_OUT_PEERS, !m_restricted)
|
MAP_URI_AUTO_JON2_IF("/out_peers", on_out_peers, COMMAND_RPC_OUT_PEERS, !m_restricted)
|
||||||
MAP_URI_AUTO_JON2_IF("/start_save_graph", on_start_save_graph, COMMAND_RPC_START_SAVE_GRAPH, !m_restricted)
|
MAP_URI_AUTO_JON2_IF("/start_save_graph", on_start_save_graph, COMMAND_RPC_START_SAVE_GRAPH, !m_restricted)
|
||||||
MAP_URI_AUTO_JON2_IF("/stop_save_graph", on_stop_save_graph, COMMAND_RPC_STOP_SAVE_GRAPH, !m_restricted)
|
MAP_URI_AUTO_JON2_IF("/stop_save_graph", on_stop_save_graph, COMMAND_RPC_STOP_SAVE_GRAPH, !m_restricted)
|
||||||
@ -155,6 +157,8 @@ namespace cryptonote
|
|||||||
bool on_get_transaction_pool_hashes(const COMMAND_RPC_GET_TRANSACTION_POOL_HASHES::request& req, COMMAND_RPC_GET_TRANSACTION_POOL_HASHES::response& res);
|
bool on_get_transaction_pool_hashes(const COMMAND_RPC_GET_TRANSACTION_POOL_HASHES::request& req, COMMAND_RPC_GET_TRANSACTION_POOL_HASHES::response& res);
|
||||||
bool on_get_transaction_pool_stats(const COMMAND_RPC_GET_TRANSACTION_POOL_STATS::request& req, COMMAND_RPC_GET_TRANSACTION_POOL_STATS::response& res);
|
bool on_get_transaction_pool_stats(const COMMAND_RPC_GET_TRANSACTION_POOL_STATS::request& req, COMMAND_RPC_GET_TRANSACTION_POOL_STATS::response& res);
|
||||||
bool on_stop_daemon(const COMMAND_RPC_STOP_DAEMON::request& req, COMMAND_RPC_STOP_DAEMON::response& res);
|
bool on_stop_daemon(const COMMAND_RPC_STOP_DAEMON::request& req, COMMAND_RPC_STOP_DAEMON::response& res);
|
||||||
|
bool on_get_limit(const COMMAND_RPC_GET_LIMIT::request& req, COMMAND_RPC_GET_LIMIT::response& res);
|
||||||
|
bool on_set_limit(const COMMAND_RPC_SET_LIMIT::request& req, COMMAND_RPC_SET_LIMIT::response& res);
|
||||||
bool on_out_peers(const COMMAND_RPC_OUT_PEERS::request& req, COMMAND_RPC_OUT_PEERS::response& res);
|
bool on_out_peers(const COMMAND_RPC_OUT_PEERS::request& req, COMMAND_RPC_OUT_PEERS::response& res);
|
||||||
bool on_start_save_graph(const COMMAND_RPC_START_SAVE_GRAPH::request& req, COMMAND_RPC_START_SAVE_GRAPH::response& res);
|
bool on_start_save_graph(const COMMAND_RPC_START_SAVE_GRAPH::request& req, COMMAND_RPC_START_SAVE_GRAPH::response& res);
|
||||||
bool on_stop_save_graph(const COMMAND_RPC_STOP_SAVE_GRAPH::request& req, COMMAND_RPC_STOP_SAVE_GRAPH::response& res);
|
bool on_stop_save_graph(const COMMAND_RPC_STOP_SAVE_GRAPH::request& req, COMMAND_RPC_STOP_SAVE_GRAPH::response& res);
|
||||||
|
@ -1244,6 +1244,55 @@ namespace cryptonote
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
struct COMMAND_RPC_GET_LIMIT
|
||||||
|
{
|
||||||
|
struct request
|
||||||
|
{
|
||||||
|
BEGIN_KV_SERIALIZE_MAP()
|
||||||
|
END_KV_SERIALIZE_MAP()
|
||||||
|
};
|
||||||
|
|
||||||
|
struct response
|
||||||
|
{
|
||||||
|
std::string status;
|
||||||
|
uint64_t limit_up;
|
||||||
|
uint64_t limit_down;
|
||||||
|
|
||||||
|
BEGIN_KV_SERIALIZE_MAP()
|
||||||
|
KV_SERIALIZE(status)
|
||||||
|
KV_SERIALIZE(limit_up)
|
||||||
|
KV_SERIALIZE(limit_down)
|
||||||
|
END_KV_SERIALIZE_MAP()
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
struct COMMAND_RPC_SET_LIMIT
|
||||||
|
{
|
||||||
|
struct request
|
||||||
|
{
|
||||||
|
int64_t limit_down;
|
||||||
|
int64_t limit_up;
|
||||||
|
|
||||||
|
BEGIN_KV_SERIALIZE_MAP()
|
||||||
|
KV_SERIALIZE(limit_down)
|
||||||
|
KV_SERIALIZE(limit_up)
|
||||||
|
END_KV_SERIALIZE_MAP()
|
||||||
|
};
|
||||||
|
|
||||||
|
struct response
|
||||||
|
{
|
||||||
|
std::string status;
|
||||||
|
uint64_t limit_up;
|
||||||
|
uint64_t limit_down;
|
||||||
|
|
||||||
|
BEGIN_KV_SERIALIZE_MAP()
|
||||||
|
KV_SERIALIZE(status)
|
||||||
|
KV_SERIALIZE(limit_up)
|
||||||
|
KV_SERIALIZE(limit_down)
|
||||||
|
END_KV_SERIALIZE_MAP()
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
struct COMMAND_RPC_OUT_PEERS
|
struct COMMAND_RPC_OUT_PEERS
|
||||||
{
|
{
|
||||||
struct request
|
struct request
|
||||||
|
Loading…
Reference in New Issue
Block a user