All checks were successful
DCO action / DCO (pull_request) Successful in 42s
Tests and linters / Run gofumpt (pull_request) Successful in 37s
Vulncheck / Vulncheck (pull_request) Successful in 52s
Pre-commit hooks / Pre-commit (pull_request) Successful in 1m25s
Build / Build Components (pull_request) Successful in 1m45s
Tests and linters / Staticcheck (pull_request) Successful in 2m13s
Tests and linters / Lint (pull_request) Successful in 2m55s
Tests and linters / Tests (pull_request) Successful in 2m59s
Tests and linters / Tests with -race (pull_request) Successful in 3m15s
Tests and linters / gopls check (pull_request) Successful in 3m18s
If no tags specified, then limiter could be optimized to use atomic semaphore. Signed-off-by: Dmitrii Stepanov <d.stepanov@yadro.com>
39 lines
668 B
Go
39 lines
668 B
Go
package qos
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"sync/atomic"
|
|
|
|
"git.frostfs.info/TrueCloudLab/frostfs-qos/scheduling"
|
|
)
|
|
|
|
var (
|
|
_ scheduler = (*semaphore)(nil)
|
|
errSemaphoreLimitExceeded = errors.New("semaphore limit exceeded")
|
|
)
|
|
|
|
type semaphore struct {
|
|
count atomic.Int64
|
|
limit int64
|
|
}
|
|
|
|
func (s *semaphore) Close() {}
|
|
|
|
func (s *semaphore) RequestArrival(ctx context.Context, _ string) (scheduling.ReleaseFunc, error) {
|
|
select {
|
|
case <-ctx.Done():
|
|
return nil, ctx.Err()
|
|
default:
|
|
}
|
|
|
|
v := s.count.Add(1)
|
|
if v > s.limit {
|
|
s.count.Add(-1)
|
|
return nil, errSemaphoreLimitExceeded
|
|
}
|
|
|
|
return func() {
|
|
s.count.Add(-1)
|
|
}, nil
|
|
}
|