Some checks failed
DCO action / DCO (pull_request) Successful in 42s
Tests and linters / Run gofumpt (pull_request) Successful in 33s
Vulncheck / Vulncheck (pull_request) Successful in 53s
Pre-commit hooks / Pre-commit (pull_request) Failing after 1m25s
Build / Build Components (pull_request) Successful in 1m33s
Tests and linters / Staticcheck (pull_request) Successful in 2m15s
Tests and linters / Tests with -race (pull_request) Successful in 2m49s
Tests and linters / Lint (pull_request) Successful in 2m55s
Tests and linters / Tests (pull_request) Successful in 2m56s
Tests and linters / gopls check (pull_request) Successful in 3m10s
If no tags specified, then limiter could be optimized to use atomic semaphore. Signed-off-by: Dmitrii Stepanov <d.stepanov@yadro.com>
39 lines
668 B
Go
39 lines
668 B
Go
package qos
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"sync/atomic"
|
|
|
|
"git.frostfs.info/TrueCloudLab/frostfs-qos/scheduling"
|
|
)
|
|
|
|
var (
|
|
_ scheduler = (*semaphore)(nil)
|
|
errSemaphoreLimitExceeded = errors.New("semaphore limit exceeded")
|
|
)
|
|
|
|
type semaphore struct {
|
|
count atomic.Int64
|
|
limit int64
|
|
}
|
|
|
|
func (s *semaphore) Close() {}
|
|
|
|
func (s *semaphore) RequestArrival(ctx context.Context, _ string) (scheduling.ReleaseFunc, error) {
|
|
select {
|
|
case <-ctx.Done():
|
|
return nil, ctx.Err()
|
|
default:
|
|
}
|
|
|
|
v := s.count.Add(1)
|
|
if v > s.limit {
|
|
s.count.Add(-1)
|
|
return nil, errSemaphoreLimitExceeded
|
|
}
|
|
|
|
return func() {
|
|
s.count.Add(-1)
|
|
}, nil
|
|
}
|