Added RateLimit service to globally manager short duration ratelimits.
This commit is contained in:
parent
fac6b05bb4
commit
78ade3250c
|
@ -9,6 +9,7 @@ using NzbDrone.Common.Http;
|
||||||
using NzbDrone.Test.Common;
|
using NzbDrone.Test.Common;
|
||||||
using NzbDrone.Test.Common.Categories;
|
using NzbDrone.Test.Common.Categories;
|
||||||
using NLog;
|
using NLog;
|
||||||
|
using NzbDrone.Common.TPL;
|
||||||
|
|
||||||
namespace NzbDrone.Common.Test.Http
|
namespace NzbDrone.Common.Test.Http
|
||||||
{
|
{
|
||||||
|
@ -20,6 +21,7 @@ namespace NzbDrone.Common.Test.Http
|
||||||
public void SetUp()
|
public void SetUp()
|
||||||
{
|
{
|
||||||
Mocker.SetConstant<ICacheManager>(Mocker.Resolve<CacheManager>());
|
Mocker.SetConstant<ICacheManager>(Mocker.Resolve<CacheManager>());
|
||||||
|
Mocker.SetConstant<IRateLimitService>(Mocker.Resolve<RateLimitService>());
|
||||||
}
|
}
|
||||||
|
|
||||||
[Test]
|
[Test]
|
||||||
|
@ -140,7 +142,7 @@ namespace NzbDrone.Common.Test.Http
|
||||||
var oldRequest = new HttpRequest("http://eu.httpbin.org/get");
|
var oldRequest = new HttpRequest("http://eu.httpbin.org/get");
|
||||||
oldRequest.AddCookie("my", "cookie");
|
oldRequest.AddCookie("my", "cookie");
|
||||||
|
|
||||||
var oldClient = new HttpClient(Mocker.Resolve<ICacheManager>(), Mocker.Resolve<Logger>());
|
var oldClient = new HttpClient(Mocker.Resolve<ICacheManager>(), Mocker.Resolve<IRateLimitService>(), Mocker.Resolve<Logger>());
|
||||||
|
|
||||||
oldClient.Should().NotBeSameAs(Subject);
|
oldClient.Should().NotBeSameAs(Subject);
|
||||||
|
|
||||||
|
|
|
@ -90,6 +90,7 @@
|
||||||
<Compile Include="ServiceFactoryFixture.cs" />
|
<Compile Include="ServiceFactoryFixture.cs" />
|
||||||
<Compile Include="ServiceProviderTests.cs" />
|
<Compile Include="ServiceProviderTests.cs" />
|
||||||
<Compile Include="TPLTests\DebouncerFixture.cs" />
|
<Compile Include="TPLTests\DebouncerFixture.cs" />
|
||||||
|
<Compile Include="TPLTests\RateLimitServiceFixture.cs" />
|
||||||
<Compile Include="WebClientTests.cs" />
|
<Compile Include="WebClientTests.cs" />
|
||||||
</ItemGroup>
|
</ItemGroup>
|
||||||
<ItemGroup>
|
<ItemGroup>
|
||||||
|
|
|
@ -0,0 +1,94 @@
|
||||||
|
using System;
|
||||||
|
using System.Collections.Concurrent;
|
||||||
|
using System.Collections.Generic;
|
||||||
|
using System.Diagnostics;
|
||||||
|
using System.Linq;
|
||||||
|
using System.Text;
|
||||||
|
using NUnit.Framework;
|
||||||
|
using NzbDrone.Common.Cache;
|
||||||
|
using NzbDrone.Common.TPL;
|
||||||
|
using NzbDrone.Test.Common;
|
||||||
|
using FluentAssertions;
|
||||||
|
|
||||||
|
namespace NzbDrone.Common.Test.TPLTests
|
||||||
|
{
|
||||||
|
[TestFixture]
|
||||||
|
public class RateLimitServiceFixture : TestBase<RateLimitService>
|
||||||
|
{
|
||||||
|
private DateTime _epoch;
|
||||||
|
|
||||||
|
[SetUp]
|
||||||
|
public void SetUp()
|
||||||
|
{
|
||||||
|
// Make sure it's there so we don't affect measurements.
|
||||||
|
Subject.GetType();
|
||||||
|
|
||||||
|
_epoch = DateTime.UtcNow;
|
||||||
|
}
|
||||||
|
|
||||||
|
private ConcurrentDictionary<string, DateTime> GetRateLimitStore()
|
||||||
|
{
|
||||||
|
var cache = Mocker.Resolve<ICacheManager>()
|
||||||
|
.GetCache<ConcurrentDictionary<string, DateTime>>(typeof(RateLimitService), "rateLimitStore");
|
||||||
|
|
||||||
|
return cache.Get("rateLimitStore", () => new ConcurrentDictionary<string, DateTime>());
|
||||||
|
}
|
||||||
|
|
||||||
|
private void GivenExisting(string key, DateTime dateTime)
|
||||||
|
{
|
||||||
|
GetRateLimitStore().AddOrUpdate(key, dateTime, (s, i) => dateTime);
|
||||||
|
}
|
||||||
|
|
||||||
|
[Test]
|
||||||
|
public void should_not_delay_if_unset()
|
||||||
|
{
|
||||||
|
var watch = Stopwatch.StartNew();
|
||||||
|
Subject.WaitAndPulse("me", TimeSpan.FromMilliseconds(100));
|
||||||
|
watch.Stop();
|
||||||
|
|
||||||
|
watch.ElapsedMilliseconds.Should().BeLessThan(100);
|
||||||
|
}
|
||||||
|
|
||||||
|
[Test]
|
||||||
|
public void should_not_delay_unrelated_key()
|
||||||
|
{
|
||||||
|
GivenExisting("other", _epoch + TimeSpan.FromMilliseconds(200));
|
||||||
|
|
||||||
|
var watch = Stopwatch.StartNew();
|
||||||
|
Subject.WaitAndPulse("me", TimeSpan.FromMilliseconds(100));
|
||||||
|
watch.Stop();
|
||||||
|
|
||||||
|
watch.ElapsedMilliseconds.Should().BeLessThan(50);
|
||||||
|
}
|
||||||
|
|
||||||
|
[Test]
|
||||||
|
public void should_wait_for_existing()
|
||||||
|
{
|
||||||
|
GivenExisting("me", _epoch + TimeSpan.FromMilliseconds(200));
|
||||||
|
|
||||||
|
var watch = Stopwatch.StartNew();
|
||||||
|
Subject.WaitAndPulse("me", TimeSpan.FromMilliseconds(400));
|
||||||
|
watch.Stop();
|
||||||
|
|
||||||
|
watch.ElapsedMilliseconds.Should().BeInRange(195, 250);
|
||||||
|
}
|
||||||
|
|
||||||
|
[Test]
|
||||||
|
public void should_extend_delay()
|
||||||
|
{
|
||||||
|
GivenExisting("me", _epoch + TimeSpan.FromMilliseconds(200));
|
||||||
|
|
||||||
|
Subject.WaitAndPulse("me", TimeSpan.FromMilliseconds(100));
|
||||||
|
|
||||||
|
(GetRateLimitStore()["me"] - _epoch).Should().BeGreaterOrEqualTo(TimeSpan.FromMilliseconds(300));
|
||||||
|
}
|
||||||
|
|
||||||
|
[Test]
|
||||||
|
public void should_add_delay()
|
||||||
|
{
|
||||||
|
Subject.WaitAndPulse("me", TimeSpan.FromMilliseconds(100));
|
||||||
|
|
||||||
|
(GetRateLimitStore()["me"] - _epoch).Should().BeGreaterOrEqualTo(TimeSpan.FromMilliseconds(100));
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
|
@ -6,6 +6,7 @@ using NLog;
|
||||||
using NzbDrone.Common.Cache;
|
using NzbDrone.Common.Cache;
|
||||||
using NzbDrone.Common.EnvironmentInfo;
|
using NzbDrone.Common.EnvironmentInfo;
|
||||||
using NzbDrone.Common.Extensions;
|
using NzbDrone.Common.Extensions;
|
||||||
|
using NzbDrone.Common.TPL;
|
||||||
|
|
||||||
namespace NzbDrone.Common.Http
|
namespace NzbDrone.Common.Http
|
||||||
{
|
{
|
||||||
|
@ -23,12 +24,13 @@ namespace NzbDrone.Common.Http
|
||||||
public class HttpClient : IHttpClient
|
public class HttpClient : IHttpClient
|
||||||
{
|
{
|
||||||
private readonly Logger _logger;
|
private readonly Logger _logger;
|
||||||
|
private readonly IRateLimitService _rateLimitService;
|
||||||
private readonly ICached<CookieContainer> _cookieContainerCache;
|
private readonly ICached<CookieContainer> _cookieContainerCache;
|
||||||
|
|
||||||
public HttpClient(ICacheManager cacheManager, Logger logger)
|
public HttpClient(ICacheManager cacheManager, IRateLimitService rateLimitService, Logger logger)
|
||||||
{
|
{
|
||||||
_logger = logger;
|
_logger = logger;
|
||||||
|
_rateLimitService = rateLimitService;
|
||||||
ServicePointManager.DefaultConnectionLimit = 12;
|
ServicePointManager.DefaultConnectionLimit = 12;
|
||||||
|
|
||||||
_cookieContainerCache = cacheManager.GetCache<CookieContainer>(typeof(HttpClient));
|
_cookieContainerCache = cacheManager.GetCache<CookieContainer>(typeof(HttpClient));
|
||||||
|
@ -36,6 +38,11 @@ namespace NzbDrone.Common.Http
|
||||||
|
|
||||||
public HttpResponse Execute(HttpRequest request)
|
public HttpResponse Execute(HttpRequest request)
|
||||||
{
|
{
|
||||||
|
if (request.RateLimit != TimeSpan.Zero)
|
||||||
|
{
|
||||||
|
_rateLimitService.WaitAndPulse(request.Url.Host, request.RateLimit);
|
||||||
|
}
|
||||||
|
|
||||||
_logger.Trace(request);
|
_logger.Trace(request);
|
||||||
|
|
||||||
var webRequest = (HttpWebRequest)WebRequest.Create(request.Url);
|
var webRequest = (HttpWebRequest)WebRequest.Create(request.Url);
|
||||||
|
|
|
@ -47,6 +47,7 @@ namespace NzbDrone.Common.Http
|
||||||
public bool AllowAutoRedirect { get; set; }
|
public bool AllowAutoRedirect { get; set; }
|
||||||
public Dictionary<string, string> Cookies { get; private set; }
|
public Dictionary<string, string> Cookies { get; private set; }
|
||||||
public bool StoreResponseCookie { get; set; }
|
public bool StoreResponseCookie { get; set; }
|
||||||
|
public TimeSpan RateLimit { get; set; }
|
||||||
|
|
||||||
public override string ToString()
|
public override string ToString()
|
||||||
{
|
{
|
||||||
|
|
|
@ -178,7 +178,6 @@
|
||||||
<Compile Include="Processes\ProcessProvider.cs" />
|
<Compile Include="Processes\ProcessProvider.cs" />
|
||||||
<Compile Include="Properties\AssemblyInfo.cs" />
|
<Compile Include="Properties\AssemblyInfo.cs" />
|
||||||
<Compile Include="Properties\SharedAssemblyInfo.cs" />
|
<Compile Include="Properties\SharedAssemblyInfo.cs" />
|
||||||
<Compile Include="RateGate.cs" />
|
|
||||||
<Compile Include="Reflection\ReflectionExtensions.cs" />
|
<Compile Include="Reflection\ReflectionExtensions.cs" />
|
||||||
<Compile Include="Extensions\ResourceExtensions.cs" />
|
<Compile Include="Extensions\ResourceExtensions.cs" />
|
||||||
<Compile Include="Security\X509CertificateValidationPolicy.cs" />
|
<Compile Include="Security\X509CertificateValidationPolicy.cs" />
|
||||||
|
@ -190,6 +189,7 @@
|
||||||
<Compile Include="TinyIoC.cs" />
|
<Compile Include="TinyIoC.cs" />
|
||||||
<Compile Include="TPL\Debouncer.cs" />
|
<Compile Include="TPL\Debouncer.cs" />
|
||||||
<Compile Include="TPL\LimitedConcurrencyLevelTaskScheduler.cs" />
|
<Compile Include="TPL\LimitedConcurrencyLevelTaskScheduler.cs" />
|
||||||
|
<Compile Include="TPL\RateLimitService.cs" />
|
||||||
<Compile Include="TPL\TaskExtensions.cs" />
|
<Compile Include="TPL\TaskExtensions.cs" />
|
||||||
<Compile Include="Extensions\TryParseExtensions.cs" />
|
<Compile Include="Extensions\TryParseExtensions.cs" />
|
||||||
</ItemGroup>
|
</ItemGroup>
|
||||||
|
|
|
@ -1,197 +0,0 @@
|
||||||
/*
|
|
||||||
* Code from: http://www.jackleitch.net/2010/10/better-rate-limiting-with-dot-net/
|
|
||||||
*/
|
|
||||||
|
|
||||||
using System;
|
|
||||||
using System.Collections.Concurrent;
|
|
||||||
using System.Threading;
|
|
||||||
|
|
||||||
namespace NzbDrone.Common
|
|
||||||
{
|
|
||||||
/// <summary>
|
|
||||||
/// Used to control the rate of some occurrence per unit of time.
|
|
||||||
/// </summary>
|
|
||||||
/// <remarks>
|
|
||||||
/// <para>
|
|
||||||
/// To control the rate of an action using a <see cref="RateGate"/>,
|
|
||||||
/// code should simply call <see cref="WaitToProceed()"/> prior to
|
|
||||||
/// performing the action. <see cref="WaitToProceed()"/> will block
|
|
||||||
/// the current thread until the action is allowed based on the rate
|
|
||||||
/// limit.
|
|
||||||
/// </para>
|
|
||||||
/// <para>
|
|
||||||
/// This class is thread safe. A single <see cref="RateGate"/> instance
|
|
||||||
/// may be used to control the rate of an occurrence across multiple
|
|
||||||
/// threads.
|
|
||||||
/// </para>
|
|
||||||
/// </remarks>
|
|
||||||
public class RateGate : IDisposable
|
|
||||||
{
|
|
||||||
// Semaphore used to count and limit the number of occurrences per
|
|
||||||
// unit time.
|
|
||||||
private readonly SemaphoreSlim _semaphore;
|
|
||||||
|
|
||||||
// Times (in millisecond ticks) at which the semaphore should be exited.
|
|
||||||
private readonly ConcurrentQueue<int> _exitTimes;
|
|
||||||
|
|
||||||
// Timer used to trigger exiting the semaphore.
|
|
||||||
private readonly Timer _exitTimer;
|
|
||||||
|
|
||||||
// Whether this instance is disposed.
|
|
||||||
private bool _isDisposed;
|
|
||||||
|
|
||||||
/// <summary>
|
|
||||||
/// Number of occurrences allowed per unit of time.
|
|
||||||
/// </summary>
|
|
||||||
public int Occurrences { get; private set; }
|
|
||||||
|
|
||||||
/// <summary>
|
|
||||||
/// The length of the time unit, in milliseconds.
|
|
||||||
/// </summary>
|
|
||||||
public int TimeUnitMilliseconds { get; private set; }
|
|
||||||
|
|
||||||
/// <summary>
|
|
||||||
/// Initializes a <see cref="RateGate"/> with a rate of <paramref name="occurrences"/>
|
|
||||||
/// per <paramref name="timeUnit"/>.
|
|
||||||
/// </summary>
|
|
||||||
/// <param name="occurrences">Number of occurrences allowed per unit of time.</param>
|
|
||||||
/// <param name="timeUnit">Length of the time unit.</param>
|
|
||||||
/// <exception cref="ArgumentOutOfRangeException">
|
|
||||||
/// If <paramref name="occurrences"/> or <paramref name="timeUnit"/> is negative.
|
|
||||||
/// </exception>
|
|
||||||
public RateGate(int occurrences, TimeSpan timeUnit)
|
|
||||||
{
|
|
||||||
// Check the arguments.
|
|
||||||
if (occurrences <= 0)
|
|
||||||
throw new ArgumentOutOfRangeException("occurrences", "Number of occurrences must be a positive integer");
|
|
||||||
if (timeUnit != timeUnit.Duration())
|
|
||||||
throw new ArgumentOutOfRangeException("timeUnit", "Time unit must be a positive span of time");
|
|
||||||
if (timeUnit >= TimeSpan.FromMilliseconds(UInt32.MaxValue))
|
|
||||||
throw new ArgumentOutOfRangeException("timeUnit", "Time unit must be less than 2^32 milliseconds");
|
|
||||||
|
|
||||||
Occurrences = occurrences;
|
|
||||||
TimeUnitMilliseconds = (int)timeUnit.TotalMilliseconds;
|
|
||||||
|
|
||||||
// Create the semaphore, with the number of occurrences as the maximum count.
|
|
||||||
_semaphore = new SemaphoreSlim(Occurrences, Occurrences);
|
|
||||||
|
|
||||||
// Create a queue to hold the semaphore exit times.
|
|
||||||
_exitTimes = new ConcurrentQueue<int>();
|
|
||||||
|
|
||||||
// Create a timer to exit the semaphore. Use the time unit as the original
|
|
||||||
// interval length because that's the earliest we will need to exit the semaphore.
|
|
||||||
_exitTimer = new Timer(ExitTimerCallback, null, TimeUnitMilliseconds, -1);
|
|
||||||
}
|
|
||||||
|
|
||||||
// Callback for the exit timer that exits the semaphore based on exit times
|
|
||||||
// in the queue and then sets the timer for the nextexit time.
|
|
||||||
private void ExitTimerCallback(object state)
|
|
||||||
{
|
|
||||||
// While there are exit times that are passed due still in the queue,
|
|
||||||
// exit the semaphore and dequeue the exit time.
|
|
||||||
int exitTime;
|
|
||||||
while (_exitTimes.TryPeek(out exitTime)
|
|
||||||
&& unchecked(exitTime - Environment.TickCount) <= 0)
|
|
||||||
{
|
|
||||||
_semaphore.Release();
|
|
||||||
_exitTimes.TryDequeue(out exitTime);
|
|
||||||
}
|
|
||||||
|
|
||||||
// Try to get the next exit time from the queue and compute
|
|
||||||
// the time until the next check should take place. If the
|
|
||||||
// queue is empty, then no exit times will occur until at least
|
|
||||||
// one time unit has passed.
|
|
||||||
int timeUntilNextCheck;
|
|
||||||
if (_exitTimes.TryPeek(out exitTime))
|
|
||||||
timeUntilNextCheck = unchecked(exitTime - Environment.TickCount);
|
|
||||||
else
|
|
||||||
timeUntilNextCheck = TimeUnitMilliseconds;
|
|
||||||
|
|
||||||
// Set the timer.
|
|
||||||
_exitTimer.Change(timeUntilNextCheck, -1);
|
|
||||||
}
|
|
||||||
|
|
||||||
/// <summary>
|
|
||||||
/// Blocks the current thread until allowed to proceed or until the
|
|
||||||
/// specified timeout elapses.
|
|
||||||
/// </summary>
|
|
||||||
/// <param name="millisecondsTimeout">Number of milliseconds to wait, or -1 to wait indefinitely.</param>
|
|
||||||
/// <returns>true if the thread is allowed to proceed, or false if timed out</returns>
|
|
||||||
public bool WaitToProceed(int millisecondsTimeout)
|
|
||||||
{
|
|
||||||
// Check the arguments.
|
|
||||||
if (millisecondsTimeout < -1)
|
|
||||||
throw new ArgumentOutOfRangeException("millisecondsTimeout");
|
|
||||||
|
|
||||||
CheckDisposed();
|
|
||||||
|
|
||||||
// Block until we can enter the semaphore or until the timeout expires.
|
|
||||||
var entered = _semaphore.Wait(millisecondsTimeout);
|
|
||||||
|
|
||||||
// If we entered the semaphore, compute the corresponding exit time
|
|
||||||
// and add it to the queue.
|
|
||||||
if (entered)
|
|
||||||
{
|
|
||||||
var timeToExit = unchecked(Environment.TickCount + TimeUnitMilliseconds);
|
|
||||||
_exitTimes.Enqueue(timeToExit);
|
|
||||||
}
|
|
||||||
|
|
||||||
return entered;
|
|
||||||
}
|
|
||||||
|
|
||||||
/// <summary>
|
|
||||||
/// Blocks the current thread until allowed to proceed or until the
|
|
||||||
/// specified timeout elapses.
|
|
||||||
/// </summary>
|
|
||||||
/// <param name="timeout"></param>
|
|
||||||
/// <returns>true if the thread is allowed to proceed, or false if timed out</returns>
|
|
||||||
public bool WaitToProceed(TimeSpan timeout)
|
|
||||||
{
|
|
||||||
return WaitToProceed((int)timeout.TotalMilliseconds);
|
|
||||||
}
|
|
||||||
|
|
||||||
/// <summary>
|
|
||||||
/// Blocks the current thread indefinitely until allowed to proceed.
|
|
||||||
/// </summary>
|
|
||||||
public void WaitToProceed()
|
|
||||||
{
|
|
||||||
WaitToProceed(Timeout.Infinite);
|
|
||||||
}
|
|
||||||
|
|
||||||
// Throws an ObjectDisposedException if this object is disposed.
|
|
||||||
private void CheckDisposed()
|
|
||||||
{
|
|
||||||
if (_isDisposed)
|
|
||||||
throw new ObjectDisposedException("RateGate is already disposed");
|
|
||||||
}
|
|
||||||
|
|
||||||
/// <summary>
|
|
||||||
/// Releases unmanaged resources held by an instance of this class.
|
|
||||||
/// </summary>
|
|
||||||
public void Dispose()
|
|
||||||
{
|
|
||||||
Dispose(true);
|
|
||||||
GC.SuppressFinalize(this);
|
|
||||||
}
|
|
||||||
|
|
||||||
/// <summary>
|
|
||||||
/// Releases unmanaged resources held by an instance of this class.
|
|
||||||
/// </summary>
|
|
||||||
/// <param name="isDisposing">Whether this object is being disposed.</param>
|
|
||||||
protected virtual void Dispose(bool isDisposing)
|
|
||||||
{
|
|
||||||
if (!_isDisposed)
|
|
||||||
{
|
|
||||||
if (isDisposing)
|
|
||||||
{
|
|
||||||
// The semaphore and timer both implement IDisposable and
|
|
||||||
// therefore must be disposed.
|
|
||||||
_semaphore.Dispose();
|
|
||||||
_exitTimer.Dispose();
|
|
||||||
|
|
||||||
_isDisposed = true;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
|
@ -0,0 +1,43 @@
|
||||||
|
using System;
|
||||||
|
using System.Collections.Concurrent;
|
||||||
|
using System.Collections.Generic;
|
||||||
|
using System.Linq;
|
||||||
|
using NLog;
|
||||||
|
using NzbDrone.Common.Cache;
|
||||||
|
|
||||||
|
namespace NzbDrone.Common.TPL
|
||||||
|
{
|
||||||
|
public interface IRateLimitService
|
||||||
|
{
|
||||||
|
void WaitAndPulse(string key, TimeSpan interval);
|
||||||
|
}
|
||||||
|
|
||||||
|
public class RateLimitService : IRateLimitService
|
||||||
|
{
|
||||||
|
private readonly ConcurrentDictionary<string, DateTime> _rateLimitStore;
|
||||||
|
private readonly Logger _logger;
|
||||||
|
|
||||||
|
public RateLimitService(ICacheManager cacheManager, Logger logger)
|
||||||
|
{
|
||||||
|
_rateLimitStore = cacheManager.GetCache<ConcurrentDictionary<string, DateTime>>(GetType(), "rateLimitStore").Get("rateLimitStore", () => new ConcurrentDictionary<string, DateTime>());
|
||||||
|
_logger = logger;
|
||||||
|
}
|
||||||
|
|
||||||
|
public void WaitAndPulse(string key, TimeSpan interval)
|
||||||
|
{
|
||||||
|
var waitUntil = _rateLimitStore.AddOrUpdate(key,
|
||||||
|
(s) => DateTime.UtcNow + interval,
|
||||||
|
(s,i) => new DateTime(Math.Max(DateTime.UtcNow.Ticks, i.Ticks), DateTimeKind.Utc) + interval);
|
||||||
|
|
||||||
|
waitUntil -= interval;
|
||||||
|
|
||||||
|
var delay = waitUntil - DateTime.UtcNow;
|
||||||
|
|
||||||
|
if (delay.TotalSeconds > 0.0)
|
||||||
|
{
|
||||||
|
_logger.Trace("Rate Limit triggered, delaying '{0}' for {1:0.000} sec", key, delay.TotalSeconds);
|
||||||
|
System.Threading.Thread.Sleep(delay);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
|
@ -38,6 +38,7 @@ namespace NzbDrone.Core.Test.Download
|
||||||
|
|
||||||
var releaseInfo = Builder<ReleaseInfo>.CreateNew()
|
var releaseInfo = Builder<ReleaseInfo>.CreateNew()
|
||||||
.With(v => v.DownloadProtocol = Indexers.DownloadProtocol.Usenet)
|
.With(v => v.DownloadProtocol = Indexers.DownloadProtocol.Usenet)
|
||||||
|
.With(v => v.DownloadUrl = "http://test.site/download1.ext")
|
||||||
.Build();
|
.Build();
|
||||||
|
|
||||||
_parseResult = Builder<RemoteEpisode>.CreateNew()
|
_parseResult = Builder<RemoteEpisode>.CreateNew()
|
||||||
|
|
|
@ -3,6 +3,7 @@ using NUnit.Framework;
|
||||||
using NzbDrone.Common.Cache;
|
using NzbDrone.Common.Cache;
|
||||||
using NzbDrone.Common.Cloud;
|
using NzbDrone.Common.Cloud;
|
||||||
using NzbDrone.Common.Http;
|
using NzbDrone.Common.Http;
|
||||||
|
using NzbDrone.Common.TPL;
|
||||||
using NzbDrone.Test.Common;
|
using NzbDrone.Test.Common;
|
||||||
|
|
||||||
namespace NzbDrone.Core.Test.Framework
|
namespace NzbDrone.Core.Test.Framework
|
||||||
|
@ -17,7 +18,7 @@ namespace NzbDrone.Core.Test.Framework
|
||||||
protected void UseRealHttp()
|
protected void UseRealHttp()
|
||||||
{
|
{
|
||||||
Mocker.SetConstant<IHttpProvider>(new HttpProvider(TestLogger));
|
Mocker.SetConstant<IHttpProvider>(new HttpProvider(TestLogger));
|
||||||
Mocker.SetConstant<IHttpClient>(new HttpClient(Mocker.Resolve<CacheManager>(), TestLogger));
|
Mocker.SetConstant<IHttpClient>(new HttpClient(Mocker.Resolve<CacheManager>(), Mocker.Resolve<RateLimitService>(), TestLogger));
|
||||||
Mocker.SetConstant<IDroneServicesRequestBuilder>(new DroneServicesHttpRequestBuilder());
|
Mocker.SetConstant<IDroneServicesRequestBuilder>(new DroneServicesHttpRequestBuilder());
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,7 +1,9 @@
|
||||||
using System;
|
using System;
|
||||||
using NLog;
|
using NLog;
|
||||||
using NzbDrone.Common.EnsureThat;
|
using NzbDrone.Common.EnsureThat;
|
||||||
|
using NzbDrone.Common.Extensions;
|
||||||
using NzbDrone.Common.Instrumentation.Extensions;
|
using NzbDrone.Common.Instrumentation.Extensions;
|
||||||
|
using NzbDrone.Common.TPL;
|
||||||
using NzbDrone.Core.Messaging.Events;
|
using NzbDrone.Core.Messaging.Events;
|
||||||
using NzbDrone.Core.Parser.Model;
|
using NzbDrone.Core.Parser.Model;
|
||||||
|
|
||||||
|
@ -16,13 +18,17 @@ namespace NzbDrone.Core.Download
|
||||||
public class DownloadService : IDownloadService
|
public class DownloadService : IDownloadService
|
||||||
{
|
{
|
||||||
private readonly IProvideDownloadClient _downloadClientProvider;
|
private readonly IProvideDownloadClient _downloadClientProvider;
|
||||||
|
private readonly IRateLimitService _rateLimitService;
|
||||||
private readonly IEventAggregator _eventAggregator;
|
private readonly IEventAggregator _eventAggregator;
|
||||||
private readonly Logger _logger;
|
private readonly Logger _logger;
|
||||||
|
|
||||||
public DownloadService(IProvideDownloadClient downloadClientProvider,
|
public DownloadService(IProvideDownloadClient downloadClientProvider,
|
||||||
IEventAggregator eventAggregator, Logger logger)
|
IRateLimitService rateLimitService,
|
||||||
|
IEventAggregator eventAggregator,
|
||||||
|
Logger logger)
|
||||||
{
|
{
|
||||||
_downloadClientProvider = downloadClientProvider;
|
_downloadClientProvider = downloadClientProvider;
|
||||||
|
_rateLimitService = rateLimitService;
|
||||||
_eventAggregator = eventAggregator;
|
_eventAggregator = eventAggregator;
|
||||||
_logger = logger;
|
_logger = logger;
|
||||||
}
|
}
|
||||||
|
@ -41,6 +47,13 @@ namespace NzbDrone.Core.Download
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Limit grabs to 2 per second.
|
||||||
|
if (remoteEpisode.Release.DownloadUrl.IsNotNullOrWhiteSpace() && !remoteEpisode.Release.DownloadUrl.StartsWith("magnet:"))
|
||||||
|
{
|
||||||
|
var uri = new Uri(remoteEpisode.Release.DownloadUrl);
|
||||||
|
_rateLimitService.WaitAndPulse(uri.Host, TimeSpan.FromSeconds(2));
|
||||||
|
}
|
||||||
|
|
||||||
var downloadClientId = downloadClient.Download(remoteEpisode);
|
var downloadClientId = downloadClient.Download(remoteEpisode);
|
||||||
var episodeGrabbedEvent = new EpisodeGrabbedEvent(remoteEpisode);
|
var episodeGrabbedEvent = new EpisodeGrabbedEvent(remoteEpisode);
|
||||||
episodeGrabbedEvent.DownloadClient = downloadClient.GetType().Name;
|
episodeGrabbedEvent.DownloadClient = downloadClient.GetType().Name;
|
||||||
|
|
|
@ -39,53 +39,48 @@ namespace NzbDrone.Core.Download
|
||||||
var grabbed = new List<DownloadDecision>();
|
var grabbed = new List<DownloadDecision>();
|
||||||
var pending = new List<DownloadDecision>();
|
var pending = new List<DownloadDecision>();
|
||||||
|
|
||||||
//Limits to 1 grab every 1 second to reduce rapid API hits
|
foreach (var report in prioritizedDecisions)
|
||||||
using (var rateGate = new RateGate(1, TimeSpan.FromSeconds(1)))
|
|
||||||
{
|
{
|
||||||
foreach (var report in prioritizedDecisions)
|
var remoteEpisode = report.RemoteEpisode;
|
||||||
|
|
||||||
|
var episodeIds = remoteEpisode.Episodes.Select(e => e.Id).ToList();
|
||||||
|
|
||||||
|
//Skip if already grabbed
|
||||||
|
if (grabbed.SelectMany(r => r.RemoteEpisode.Episodes)
|
||||||
|
.Select(e => e.Id)
|
||||||
|
.ToList()
|
||||||
|
.Intersect(episodeIds)
|
||||||
|
.Any())
|
||||||
{
|
{
|
||||||
var remoteEpisode = report.RemoteEpisode;
|
continue;
|
||||||
|
}
|
||||||
|
|
||||||
var episodeIds = remoteEpisode.Episodes.Select(e => e.Id).ToList();
|
if (report.TemporarilyRejected)
|
||||||
|
{
|
||||||
|
_pendingReleaseService.Add(report);
|
||||||
|
pending.Add(report);
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
|
||||||
//Skip if already grabbed
|
if (pending.SelectMany(r => r.RemoteEpisode.Episodes)
|
||||||
if (grabbed.SelectMany(r => r.RemoteEpisode.Episodes)
|
.Select(e => e.Id)
|
||||||
.Select(e => e.Id)
|
.ToList()
|
||||||
.ToList()
|
.Intersect(episodeIds)
|
||||||
.Intersect(episodeIds)
|
.Any())
|
||||||
.Any())
|
{
|
||||||
{
|
continue;
|
||||||
continue;
|
}
|
||||||
}
|
|
||||||
|
|
||||||
if (report.TemporarilyRejected)
|
try
|
||||||
{
|
{
|
||||||
_pendingReleaseService.Add(report);
|
_downloadService.DownloadReport(remoteEpisode);
|
||||||
pending.Add(report);
|
grabbed.Add(report);
|
||||||
continue;
|
}
|
||||||
}
|
catch (Exception e)
|
||||||
|
{
|
||||||
if (pending.SelectMany(r => r.RemoteEpisode.Episodes)
|
//TODO: support for store & forward
|
||||||
.Select(e => e.Id)
|
//We'll need to differentiate between a download client error and an indexer error
|
||||||
.ToList()
|
_logger.WarnException("Couldn't add report to download queue. " + remoteEpisode, e);
|
||||||
.Intersect(episodeIds)
|
|
||||||
.Any())
|
|
||||||
{
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
|
|
||||||
try
|
|
||||||
{
|
|
||||||
rateGate.WaitToProceed();
|
|
||||||
_downloadService.DownloadReport(remoteEpisode);
|
|
||||||
grabbed.Add(report);
|
|
||||||
}
|
|
||||||
catch (Exception e)
|
|
||||||
{
|
|
||||||
//TODO: support for store & forward
|
|
||||||
//We'll need to differentiate between a download client error and an indexer error
|
|
||||||
_logger.WarnException("Couldn't add report to download queue. " + remoteEpisode, e);
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -6,6 +6,7 @@ using FluentValidation.Results;
|
||||||
using NLog;
|
using NLog;
|
||||||
using NzbDrone.Common.Extensions;
|
using NzbDrone.Common.Extensions;
|
||||||
using NzbDrone.Common.Http;
|
using NzbDrone.Common.Http;
|
||||||
|
using NzbDrone.Common.TPL;
|
||||||
using NzbDrone.Core.Configuration;
|
using NzbDrone.Core.Configuration;
|
||||||
using NzbDrone.Core.Indexers.Exceptions;
|
using NzbDrone.Core.Indexers.Exceptions;
|
||||||
using NzbDrone.Core.IndexerSearch.Definitions;
|
using NzbDrone.Core.IndexerSearch.Definitions;
|
||||||
|
@ -27,6 +28,7 @@ namespace NzbDrone.Core.Indexers
|
||||||
public bool SupportsPaging { get { return PageSize > 0; } }
|
public bool SupportsPaging { get { return PageSize > 0; } }
|
||||||
|
|
||||||
public virtual Int32 PageSize { get { return 0; } }
|
public virtual Int32 PageSize { get { return 0; } }
|
||||||
|
public virtual TimeSpan RateLimit { get { return TimeSpan.FromSeconds(2); } }
|
||||||
|
|
||||||
public abstract IIndexerRequestGenerator GetRequestGenerator();
|
public abstract IIndexerRequestGenerator GetRequestGenerator();
|
||||||
public abstract IParseIndexerResponse GetParser();
|
public abstract IParseIndexerResponse GetParser();
|
||||||
|
@ -199,6 +201,11 @@ namespace NzbDrone.Core.Indexers
|
||||||
{
|
{
|
||||||
_logger.Debug("Downloading Feed " + request.Url);
|
_logger.Debug("Downloading Feed " + request.Url);
|
||||||
|
|
||||||
|
if (request.HttpRequest.RateLimit < RateLimit)
|
||||||
|
{
|
||||||
|
request.HttpRequest.RateLimit = RateLimit;
|
||||||
|
}
|
||||||
|
|
||||||
return new IndexerResponse(request, _httpClient.Execute(request.HttpRequest));
|
return new IndexerResponse(request, _httpClient.Execute(request.HttpRequest));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue