Merge pull request #2470

2e59f6ea rpc: add new RPCs to get and set limits (MaxXor)
This commit is contained in:
Riccardo Spagni 2017-10-02 23:15:22 +04:00
commit 3bf20a77f2
No known key found for this signature in database
GPG Key ID: 55432DF31CCD4FCD
6 changed files with 218 additions and 52 deletions

View File

@ -334,17 +334,18 @@ bool t_command_parser_executor::set_limit(const std::vector<std::string>& args)
if(args.size()==0) { if(args.size()==0) {
return m_executor.get_limit(); return m_executor.get_limit();
} }
int limit; int64_t limit;
try { try {
limit = std::stoi(args[0]); limit = std::stoll(args[0]);
} }
catch(std::invalid_argument& ex) { catch(const std::invalid_argument& ex) {
std::cout << "failed to parse argument" << std::endl;
return false; return false;
} }
if (limit==-1) limit=128; if (limit > 0)
limit *= 1024; limit *= 1024;
return m_executor.set_limit(limit); return m_executor.set_limit(limit, limit);
} }
bool t_command_parser_executor::set_limit_up(const std::vector<std::string>& args) bool t_command_parser_executor::set_limit_up(const std::vector<std::string>& args)
@ -353,17 +354,18 @@ bool t_command_parser_executor::set_limit_up(const std::vector<std::string>& arg
if(args.size()==0) { if(args.size()==0) {
return m_executor.get_limit_up(); return m_executor.get_limit_up();
} }
int limit; int64_t limit;
try { try {
limit = std::stoi(args[0]); limit = std::stoll(args[0]);
} }
catch(std::invalid_argument& ex) { catch(const std::invalid_argument& ex) {
std::cout << "failed to parse argument" << std::endl;
return false; return false;
} }
if (limit==-1) limit=128; if (limit > 0)
limit *= 1024; limit *= 1024;
return m_executor.set_limit_up(limit); return m_executor.set_limit(0, limit);
} }
bool t_command_parser_executor::set_limit_down(const std::vector<std::string>& args) bool t_command_parser_executor::set_limit_down(const std::vector<std::string>& args)
@ -372,17 +374,18 @@ bool t_command_parser_executor::set_limit_down(const std::vector<std::string>& a
if(args.size()==0) { if(args.size()==0) {
return m_executor.get_limit_down(); return m_executor.get_limit_down();
} }
int limit; int64_t limit;
try { try {
limit = std::stoi(args[0]); limit = std::stoll(args[0]);
} }
catch(std::invalid_argument& ex) { catch(const std::invalid_argument& ex) {
std::cout << "failed to parse argument" << std::endl;
return false; return false;
} }
if (limit==-1) limit=128; if (limit > 0)
limit *= 1024; limit *= 1024;
return m_executor.set_limit_down(limit); return m_executor.set_limit(limit, 0);
} }
bool t_command_parser_executor::out_peers(const std::vector<std::string>& args) bool t_command_parser_executor::out_peers(const std::vector<std::string>& args)

View File

@ -1130,48 +1130,115 @@ bool t_rpc_command_executor::print_status()
bool t_rpc_command_executor::get_limit() bool t_rpc_command_executor::get_limit()
{ {
int limit_down = epee::net_utils::connection_basic::get_rate_down_limit( ); cryptonote::COMMAND_RPC_GET_LIMIT::request req;
int limit_up = epee::net_utils::connection_basic::get_rate_up_limit( ); cryptonote::COMMAND_RPC_GET_LIMIT::response res;
std::cout << "limit-down is " << limit_down/1024 << " kB/s" << std::endl;
std::cout << "limit-up is " << limit_up/1024 << " kB/s" << std::endl; std::string failure_message = "Couldn't get limit";
return true;
if (m_is_rpc)
{
if (!m_rpc_client->rpc_request(req, res, "/get_limit", failure_message.c_str()))
{
return true;
}
}
else
{
if (!m_rpc_server->on_get_limit(req, res) || res.status != CORE_RPC_STATUS_OK)
{
tools::fail_msg_writer() << make_error(failure_message, res.status);
return true;
}
}
tools::msg_writer() << "limit-down is " << res.limit_down/1024 << " kB/s";
tools::msg_writer() << "limit-up is " << res.limit_up/1024 << " kB/s";
return true;
} }
bool t_rpc_command_executor::set_limit(int limit) bool t_rpc_command_executor::set_limit(int64_t limit_down, int64_t limit_up)
{ {
epee::net_utils::connection_basic::set_rate_down_limit( limit ); cryptonote::COMMAND_RPC_SET_LIMIT::request req;
epee::net_utils::connection_basic::set_rate_up_limit( limit ); cryptonote::COMMAND_RPC_SET_LIMIT::response res;
std::cout << "Set limit-down to " << limit/1024 << " kB/s" << std::endl;
std::cout << "Set limit-up to " << limit/1024 << " kB/s" << std::endl; req.limit_down = limit_down;
return true; req.limit_up = limit_up;
std::string failure_message = "Couldn't set limit";
if (m_is_rpc)
{
if (!m_rpc_client->rpc_request(req, res, "/set_limit", failure_message.c_str()))
{
return true;
}
}
else
{
if (!m_rpc_server->on_set_limit(req, res) || res.status != CORE_RPC_STATUS_OK)
{
tools::fail_msg_writer() << make_error(failure_message, res.status);
return true;
}
}
tools::msg_writer() << "Set limit-down to " << res.limit_down/1024 << " kB/s";
tools::msg_writer() << "Set limit-up to " << res.limit_up/1024 << " kB/s";
return true;
} }
bool t_rpc_command_executor::get_limit_up() bool t_rpc_command_executor::get_limit_up()
{ {
int limit_up = epee::net_utils::connection_basic::get_rate_up_limit( ); cryptonote::COMMAND_RPC_GET_LIMIT::request req;
std::cout << "limit-up is " << limit_up/1024 << " kB/s" << std::endl; cryptonote::COMMAND_RPC_GET_LIMIT::response res;
return true;
}
bool t_rpc_command_executor::set_limit_up(int limit) std::string failure_message = "Couldn't get limit";
{
epee::net_utils::connection_basic::set_rate_up_limit( limit ); if (m_is_rpc)
std::cout << "Set limit-up to " << limit/1024 << " kB/s" << std::endl; {
return true; if (!m_rpc_client->rpc_request(req, res, "/get_limit", failure_message.c_str()))
{
return true;
}
}
else
{
if (!m_rpc_server->on_get_limit(req, res) || res.status != CORE_RPC_STATUS_OK)
{
tools::fail_msg_writer() << make_error(failure_message, res.status);
return true;
}
}
tools::msg_writer() << "limit-up is " << res.limit_up/1024 << " kB/s";
return true;
} }
bool t_rpc_command_executor::get_limit_down() bool t_rpc_command_executor::get_limit_down()
{ {
int limit_down = epee::net_utils::connection_basic::get_rate_down_limit( ); cryptonote::COMMAND_RPC_GET_LIMIT::request req;
std::cout << "limit-down is " << limit_down/1024 << " kB/s" << std::endl; cryptonote::COMMAND_RPC_GET_LIMIT::response res;
return true;
}
bool t_rpc_command_executor::set_limit_down(int limit) std::string failure_message = "Couldn't get limit";
{
epee::net_utils::connection_basic::set_rate_down_limit( limit ); if (m_is_rpc)
std::cout << "Set limit-down to " << limit/1024 << " kB/s" << std::endl; {
return true; if (!m_rpc_client->rpc_request(req, res, "/get_limit", failure_message.c_str()))
{
return true;
}
}
else
{
if (!m_rpc_server->on_get_limit(req, res) || res.status != CORE_RPC_STATUS_OK)
{
tools::fail_msg_writer() << make_error(failure_message, res.status);
return true;
}
}
tools::msg_writer() << "limit-down is " << res.limit_down/1024 << " kB/s";
return true;
} }
bool t_rpc_command_executor::out_peers(uint64_t limit) bool t_rpc_command_executor::out_peers(uint64_t limit)

View File

@ -119,11 +119,7 @@ public:
bool get_limit_down(); bool get_limit_down();
bool set_limit(int limit); bool set_limit(int64_t limit_down, int64_t limit_up);
bool set_limit_up(int limit);
bool set_limit_down(int limit);
bool out_peers(uint64_t limit); bool out_peers(uint64_t limit);

View File

@ -1533,6 +1533,53 @@ namespace cryptonote
return true; return true;
} }
//------------------------------------------------------------------------------------------------------------------------------ //------------------------------------------------------------------------------------------------------------------------------
bool core_rpc_server::on_get_limit(const COMMAND_RPC_GET_LIMIT::request& req, COMMAND_RPC_GET_LIMIT::response& res)
{
res.limit_down = epee::net_utils::connection_basic::get_rate_down_limit();
res.limit_up = epee::net_utils::connection_basic::get_rate_up_limit();
res.status = CORE_RPC_STATUS_OK;
return true;
}
//------------------------------------------------------------------------------------------------------------------------------
bool core_rpc_server::on_set_limit(const COMMAND_RPC_SET_LIMIT::request& req, COMMAND_RPC_SET_LIMIT::response& res)
{
// -1 = reset to default
// 0 = do not modify
if (req.limit_down > 0)
{
epee::net_utils::connection_basic::set_rate_down_limit(req.limit_down);
}
else if (req.limit_down < 0)
{
if (req.limit_down != -1)
{
res.status = CORE_RPC_ERROR_CODE_WRONG_PARAM;
return false;
}
epee::net_utils::connection_basic::set_rate_down_limit(nodetool::default_limit_down * 1024);
}
if (req.limit_up > 0)
{
epee::net_utils::connection_basic::set_rate_up_limit(req.limit_up);
}
else if (req.limit_up < 0)
{
if (req.limit_up != -1)
{
res.status = CORE_RPC_ERROR_CODE_WRONG_PARAM;
return false;
}
epee::net_utils::connection_basic::set_rate_up_limit(nodetool::default_limit_up * 1024);
}
res.limit_down = epee::net_utils::connection_basic::get_rate_down_limit();
res.limit_up = epee::net_utils::connection_basic::get_rate_up_limit();
res.status = CORE_RPC_STATUS_OK;
return true;
}
//------------------------------------------------------------------------------------------------------------------------------
bool core_rpc_server::on_out_peers(const COMMAND_RPC_OUT_PEERS::request& req, COMMAND_RPC_OUT_PEERS::response& res) bool core_rpc_server::on_out_peers(const COMMAND_RPC_OUT_PEERS::request& req, COMMAND_RPC_OUT_PEERS::response& res)
{ {
// TODO // TODO

View File

@ -97,6 +97,8 @@ namespace cryptonote
MAP_URI_AUTO_JON2("/get_transaction_pool_stats", on_get_transaction_pool_stats, COMMAND_RPC_GET_TRANSACTION_POOL_STATS) MAP_URI_AUTO_JON2("/get_transaction_pool_stats", on_get_transaction_pool_stats, COMMAND_RPC_GET_TRANSACTION_POOL_STATS)
MAP_URI_AUTO_JON2_IF("/stop_daemon", on_stop_daemon, COMMAND_RPC_STOP_DAEMON, !m_restricted) MAP_URI_AUTO_JON2_IF("/stop_daemon", on_stop_daemon, COMMAND_RPC_STOP_DAEMON, !m_restricted)
MAP_URI_AUTO_JON2("/getinfo", on_get_info, COMMAND_RPC_GET_INFO) MAP_URI_AUTO_JON2("/getinfo", on_get_info, COMMAND_RPC_GET_INFO)
MAP_URI_AUTO_JON2("/get_limit", on_get_limit, COMMAND_RPC_GET_LIMIT)
MAP_URI_AUTO_JON2_IF("/set_limit", on_set_limit, COMMAND_RPC_SET_LIMIT, !m_restricted)
MAP_URI_AUTO_JON2_IF("/out_peers", on_out_peers, COMMAND_RPC_OUT_PEERS, !m_restricted) MAP_URI_AUTO_JON2_IF("/out_peers", on_out_peers, COMMAND_RPC_OUT_PEERS, !m_restricted)
MAP_URI_AUTO_JON2_IF("/start_save_graph", on_start_save_graph, COMMAND_RPC_START_SAVE_GRAPH, !m_restricted) MAP_URI_AUTO_JON2_IF("/start_save_graph", on_start_save_graph, COMMAND_RPC_START_SAVE_GRAPH, !m_restricted)
MAP_URI_AUTO_JON2_IF("/stop_save_graph", on_stop_save_graph, COMMAND_RPC_STOP_SAVE_GRAPH, !m_restricted) MAP_URI_AUTO_JON2_IF("/stop_save_graph", on_stop_save_graph, COMMAND_RPC_STOP_SAVE_GRAPH, !m_restricted)
@ -155,6 +157,8 @@ namespace cryptonote
bool on_get_transaction_pool_hashes(const COMMAND_RPC_GET_TRANSACTION_POOL_HASHES::request& req, COMMAND_RPC_GET_TRANSACTION_POOL_HASHES::response& res); bool on_get_transaction_pool_hashes(const COMMAND_RPC_GET_TRANSACTION_POOL_HASHES::request& req, COMMAND_RPC_GET_TRANSACTION_POOL_HASHES::response& res);
bool on_get_transaction_pool_stats(const COMMAND_RPC_GET_TRANSACTION_POOL_STATS::request& req, COMMAND_RPC_GET_TRANSACTION_POOL_STATS::response& res); bool on_get_transaction_pool_stats(const COMMAND_RPC_GET_TRANSACTION_POOL_STATS::request& req, COMMAND_RPC_GET_TRANSACTION_POOL_STATS::response& res);
bool on_stop_daemon(const COMMAND_RPC_STOP_DAEMON::request& req, COMMAND_RPC_STOP_DAEMON::response& res); bool on_stop_daemon(const COMMAND_RPC_STOP_DAEMON::request& req, COMMAND_RPC_STOP_DAEMON::response& res);
bool on_get_limit(const COMMAND_RPC_GET_LIMIT::request& req, COMMAND_RPC_GET_LIMIT::response& res);
bool on_set_limit(const COMMAND_RPC_SET_LIMIT::request& req, COMMAND_RPC_SET_LIMIT::response& res);
bool on_out_peers(const COMMAND_RPC_OUT_PEERS::request& req, COMMAND_RPC_OUT_PEERS::response& res); bool on_out_peers(const COMMAND_RPC_OUT_PEERS::request& req, COMMAND_RPC_OUT_PEERS::response& res);
bool on_start_save_graph(const COMMAND_RPC_START_SAVE_GRAPH::request& req, COMMAND_RPC_START_SAVE_GRAPH::response& res); bool on_start_save_graph(const COMMAND_RPC_START_SAVE_GRAPH::request& req, COMMAND_RPC_START_SAVE_GRAPH::response& res);
bool on_stop_save_graph(const COMMAND_RPC_STOP_SAVE_GRAPH::request& req, COMMAND_RPC_STOP_SAVE_GRAPH::response& res); bool on_stop_save_graph(const COMMAND_RPC_STOP_SAVE_GRAPH::request& req, COMMAND_RPC_STOP_SAVE_GRAPH::response& res);

View File

@ -1244,6 +1244,55 @@ namespace cryptonote
}; };
}; };
struct COMMAND_RPC_GET_LIMIT
{
struct request
{
BEGIN_KV_SERIALIZE_MAP()
END_KV_SERIALIZE_MAP()
};
struct response
{
std::string status;
uint64_t limit_up;
uint64_t limit_down;
BEGIN_KV_SERIALIZE_MAP()
KV_SERIALIZE(status)
KV_SERIALIZE(limit_up)
KV_SERIALIZE(limit_down)
END_KV_SERIALIZE_MAP()
};
};
struct COMMAND_RPC_SET_LIMIT
{
struct request
{
int64_t limit_down;
int64_t limit_up;
BEGIN_KV_SERIALIZE_MAP()
KV_SERIALIZE(limit_down)
KV_SERIALIZE(limit_up)
END_KV_SERIALIZE_MAP()
};
struct response
{
std::string status;
uint64_t limit_up;
uint64_t limit_down;
BEGIN_KV_SERIALIZE_MAP()
KV_SERIALIZE(status)
KV_SERIALIZE(limit_up)
KV_SERIALIZE(limit_down)
END_KV_SERIALIZE_MAP()
};
};
struct COMMAND_RPC_OUT_PEERS struct COMMAND_RPC_OUT_PEERS
{ {
struct request struct request