mirror of
https://github.com/openfaas/faas.git
synced 2025-06-08 08:25:03 +00:00
This enables limiting concurrency. It is a naive approach which will reject requests as soon as they exceed the maximum number of in-flight requests. It is a port of the following PR from the new watchdog code: https://github.com/openfaas-incubator/of-watchdog/pull/54 Signed-off-by: Sargun Dhillon <sargun@sargun.me> Signed-off-by: Lucas Roesler <roesler.lucas@gmail.com>
68 lines
2.1 KiB
Go
68 lines
2.1 KiB
Go
package limiter
|
|
|
|
import (
|
|
"fmt"
|
|
"net/http"
|
|
"sync/atomic"
|
|
)
|
|
|
|
type ConcurrencyLimiter struct {
|
|
backendHTTPHandler http.Handler
|
|
/*
|
|
We keep two counters here in order to make it so that we can know when a request has gone to completed
|
|
in the tests. We could wrap these up in a condvar, so there's no need to spinlock, but that seems overkill
|
|
for testing.
|
|
|
|
This is effectively a very fancy semaphore built for optimistic concurrency only, and with spinlocks. If
|
|
you want to add timeouts here / pessimistic concurrency, signaling needs to be added and/or a condvar esque
|
|
sorta thing needs to be done to wake up waiters who are waiting post-spin.
|
|
|
|
Otherwise, there's all sorts of futzing in order to make sure that the concurrency limiter handler
|
|
has completed
|
|
The math works on overflow:
|
|
var x, y uint64
|
|
x = (1 << 64 - 1)
|
|
y = (1 << 64 - 1)
|
|
x++
|
|
fmt.Println(x)
|
|
fmt.Println(y)
|
|
fmt.Println(x - y)
|
|
Prints:
|
|
0
|
|
18446744073709551615
|
|
1
|
|
*/
|
|
requestsStarted uint64
|
|
requestsCompleted uint64
|
|
|
|
maxInflightRequests uint64
|
|
}
|
|
|
|
func (cl *ConcurrencyLimiter) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
|
requestsStarted := atomic.AddUint64(&cl.requestsStarted, 1)
|
|
completedRequested := atomic.LoadUint64(&cl.requestsCompleted)
|
|
if requestsStarted-completedRequested > cl.maxInflightRequests {
|
|
// This is a failure pathway, and we do not want to block on the write to finish
|
|
atomic.AddUint64(&cl.requestsCompleted, 1)
|
|
w.WriteHeader(http.StatusTooManyRequests)
|
|
fmt.Fprintf(w, "Concurrent request limit exceeded. Max concurrent requests: %d\n", cl.maxInflightRequests)
|
|
return
|
|
}
|
|
cl.backendHTTPHandler.ServeHTTP(w, r)
|
|
atomic.AddUint64(&cl.requestsCompleted, 1)
|
|
}
|
|
|
|
// NewConcurrencyLimiter creates a handler which limits the active number of active, concurrent
|
|
// requests. If the concurrency limit is less than, or equal to 0, then it will just return the handler
|
|
// passed to it.
|
|
func NewConcurrencyLimiter(handler http.Handler, concurrencyLimit int) http.Handler {
|
|
if concurrencyLimit <= 0 {
|
|
return handler
|
|
}
|
|
|
|
return &ConcurrencyLimiter{
|
|
backendHTTPHandler: handler,
|
|
maxInflightRequests: uint64(concurrencyLimit),
|
|
}
|
|
}
|