2017-05-17 16:38:24 +02:00
|
|
|
// Copyright 2017 Vector Creations Ltd
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
2021-01-08 17:59:06 +01:00
|
|
|
package notifier
|
2017-05-17 16:38:24 +02:00
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2020-03-19 13:07:01 +01:00
|
|
|
"encoding/json"
|
2017-05-17 16:38:24 +02:00
|
|
|
"fmt"
|
|
|
|
"sync"
|
|
|
|
"testing"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/matrix-org/dendrite/syncapi/types"
|
2020-06-16 15:10:55 +02:00
|
|
|
userapi "github.com/matrix-org/dendrite/userapi/api"
|
2017-05-17 16:38:24 +02:00
|
|
|
"github.com/matrix-org/gomatrixserverlib"
|
|
|
|
"github.com/matrix-org/util"
|
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
2020-03-19 13:07:01 +01:00
|
|
|
randomMessageEvent gomatrixserverlib.HeaderedEvent
|
|
|
|
aliceInviteBobEvent gomatrixserverlib.HeaderedEvent
|
|
|
|
bobLeaveEvent gomatrixserverlib.HeaderedEvent
|
2020-12-10 19:57:10 +01:00
|
|
|
syncPositionVeryOld = types.StreamingToken{PDUPosition: 5}
|
|
|
|
syncPositionBefore = types.StreamingToken{PDUPosition: 11}
|
|
|
|
syncPositionAfter = types.StreamingToken{PDUPosition: 12}
|
|
|
|
//syncPositionNewEDU = types.NewStreamToken(syncPositionAfter.PDUPosition, 1, 0, 0, nil)
|
|
|
|
syncPositionAfter2 = types.StreamingToken{PDUPosition: 13}
|
2017-05-17 16:38:24 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
2020-05-28 11:05:04 +02:00
|
|
|
roomID = "!test:localhost"
|
|
|
|
alice = "@alice:localhost"
|
|
|
|
aliceDev = "alicedevice"
|
|
|
|
bob = "@bob:localhost"
|
|
|
|
bobDev = "bobdev"
|
2017-05-17 16:38:24 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
func init() {
|
|
|
|
var err error
|
2020-03-19 13:07:01 +01:00
|
|
|
err = json.Unmarshal([]byte(`{
|
|
|
|
"_room_version": "1",
|
2017-05-17 16:38:24 +02:00
|
|
|
"type": "m.room.message",
|
|
|
|
"content": {
|
|
|
|
"body": "Hello World",
|
|
|
|
"msgtype": "m.text"
|
|
|
|
},
|
|
|
|
"sender": "@noone:localhost",
|
|
|
|
"room_id": "`+roomID+`",
|
2020-03-19 13:07:01 +01:00
|
|
|
"origin": "localhost",
|
2017-05-17 16:38:24 +02:00
|
|
|
"origin_server_ts": 12345,
|
|
|
|
"event_id": "$randomMessageEvent:localhost"
|
2020-03-19 13:07:01 +01:00
|
|
|
}`), &randomMessageEvent)
|
2017-05-17 16:38:24 +02:00
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
2020-03-19 13:07:01 +01:00
|
|
|
err = json.Unmarshal([]byte(`{
|
|
|
|
"_room_version": "1",
|
2017-05-17 16:38:24 +02:00
|
|
|
"type": "m.room.member",
|
|
|
|
"state_key": "`+bob+`",
|
|
|
|
"content": {
|
|
|
|
"membership": "invite"
|
|
|
|
},
|
|
|
|
"sender": "`+alice+`",
|
|
|
|
"room_id": "`+roomID+`",
|
2020-03-19 13:07:01 +01:00
|
|
|
"origin": "localhost",
|
2017-05-17 16:38:24 +02:00
|
|
|
"origin_server_ts": 12345,
|
|
|
|
"event_id": "$aliceInviteBobEvent:localhost"
|
2020-03-19 13:07:01 +01:00
|
|
|
}`), &aliceInviteBobEvent)
|
2017-05-17 16:38:24 +02:00
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
2020-03-19 13:07:01 +01:00
|
|
|
err = json.Unmarshal([]byte(`{
|
|
|
|
"_room_version": "1",
|
2017-05-17 16:38:24 +02:00
|
|
|
"type": "m.room.member",
|
|
|
|
"state_key": "`+bob+`",
|
|
|
|
"content": {
|
|
|
|
"membership": "leave"
|
|
|
|
},
|
|
|
|
"sender": "`+bob+`",
|
|
|
|
"room_id": "`+roomID+`",
|
2020-03-19 13:07:01 +01:00
|
|
|
"origin": "localhost",
|
2017-05-17 16:38:24 +02:00
|
|
|
"origin_server_ts": 12345,
|
|
|
|
"event_id": "$bobLeaveEvent:localhost"
|
2020-03-19 13:07:01 +01:00
|
|
|
}`), &bobLeaveEvent)
|
2017-05-17 16:38:24 +02:00
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-05-13 13:14:50 +02:00
|
|
|
func mustEqualPositions(t *testing.T, got, want types.StreamingToken) {
|
|
|
|
if got.String() != want.String() {
|
|
|
|
t.Fatalf("mustEqualPositions got %s want %s", got.String(), want.String())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-05-17 16:38:24 +02:00
|
|
|
// Test that the current position is returned if a request is already behind.
|
|
|
|
func TestImmediateNotification(t *testing.T) {
|
2019-07-12 16:59:53 +02:00
|
|
|
n := NewNotifier(syncPositionBefore)
|
2020-05-28 11:05:04 +02:00
|
|
|
pos, err := waitForEvents(n, newTestSyncRequest(alice, aliceDev, syncPositionVeryOld))
|
2017-05-17 16:38:24 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("TestImmediateNotification error: %s", err)
|
|
|
|
}
|
2020-05-13 13:14:50 +02:00
|
|
|
mustEqualPositions(t, pos, syncPositionBefore)
|
2017-05-17 16:38:24 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Test that new events to a joined room unblocks the request.
|
|
|
|
func TestNewEventAndJoinedToRoom(t *testing.T) {
|
2019-07-12 16:59:53 +02:00
|
|
|
n := NewNotifier(syncPositionBefore)
|
2017-05-17 16:38:24 +02:00
|
|
|
n.setUsersJoinedToRooms(map[string][]string{
|
2017-06-12 19:30:47 +02:00
|
|
|
roomID: {alice, bob},
|
2017-05-17 16:38:24 +02:00
|
|
|
})
|
|
|
|
|
|
|
|
var wg sync.WaitGroup
|
|
|
|
wg.Add(1)
|
|
|
|
go func() {
|
2020-05-28 11:05:04 +02:00
|
|
|
pos, err := waitForEvents(n, newTestSyncRequest(bob, bobDev, syncPositionBefore))
|
2017-05-17 16:38:24 +02:00
|
|
|
if err != nil {
|
2020-03-18 13:48:51 +01:00
|
|
|
t.Errorf("TestNewEventAndJoinedToRoom error: %w", err)
|
2017-05-17 16:38:24 +02:00
|
|
|
}
|
2020-05-13 13:14:50 +02:00
|
|
|
mustEqualPositions(t, pos, syncPositionAfter)
|
2017-05-17 16:38:24 +02:00
|
|
|
wg.Done()
|
|
|
|
}()
|
|
|
|
|
2020-05-28 11:05:04 +02:00
|
|
|
stream := lockedFetchUserStream(n, bob, bobDev)
|
2017-05-17 16:38:24 +02:00
|
|
|
waitForBlocking(stream, 1)
|
|
|
|
|
2019-07-12 16:59:53 +02:00
|
|
|
n.OnNewEvent(&randomMessageEvent, "", nil, syncPositionAfter)
|
2017-05-17 16:38:24 +02:00
|
|
|
|
|
|
|
wg.Wait()
|
|
|
|
}
|
|
|
|
|
2020-05-28 11:05:04 +02:00
|
|
|
func TestCorrectStream(t *testing.T) {
|
|
|
|
n := NewNotifier(syncPositionBefore)
|
|
|
|
stream := lockedFetchUserStream(n, bob, bobDev)
|
|
|
|
if stream.UserID != bob {
|
|
|
|
t.Fatalf("expected user %q, got %q", bob, stream.UserID)
|
|
|
|
}
|
|
|
|
if stream.DeviceID != bobDev {
|
|
|
|
t.Fatalf("expected device %q, got %q", bobDev, stream.DeviceID)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestCorrectStreamWakeup(t *testing.T) {
|
|
|
|
n := NewNotifier(syncPositionBefore)
|
|
|
|
awoken := make(chan string)
|
|
|
|
|
|
|
|
streamone := lockedFetchUserStream(n, alice, "one")
|
|
|
|
streamtwo := lockedFetchUserStream(n, alice, "two")
|
|
|
|
|
|
|
|
go func() {
|
|
|
|
select {
|
|
|
|
case <-streamone.signalChannel:
|
|
|
|
awoken <- "one"
|
|
|
|
case <-streamtwo.signalChannel:
|
|
|
|
awoken <- "two"
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
time.Sleep(1 * time.Second)
|
|
|
|
|
|
|
|
wake := "two"
|
Send-to-device support (#1072)
* Groundwork for send-to-device messaging
* Update sample config
* Add unstable routing for now
* Send to device consumer in sync API
* Start the send-to-device consumer
* fix indentation in dendrite-config.yaml
* Create send-to-device database tables, other tweaks
* Add some logic for send-to-device messages, add them into sync stream
* Handle incoming send-to-device messages, count them with EDU stream pos
* Undo changes to test
* pq.Array
* Fix sync
* Logging
* Fix a couple of transaction things, fix client API
* Add send-to-device test, hopefully fix bugs
* Comments
* Refactor a bit
* Fix schema
* Fix queries
* Debug logging
* Fix storing and retrieving of send-to-device messages
* Try to avoid database locks
* Update sync position
* Use latest sync position
* Jiggle about sync a bit
* Fix tests
* Break out the retrieval from the update/delete behaviour
* Comments
* nolint on getResponseWithPDUsForCompleteSync
* Try to line up sync tokens again
* Implement wildcard
* Add all send-to-device tests to whitelist, what could possibly go wrong?
* Only care about wildcard when targeted locally
* Deduplicate transactions
* Handle tokens properly, return immediately if waiting send-to-device messages
* Fix sync
* Update sytest-whitelist
* Fix copyright notice (need to do more of this)
* Comments, copyrights
* Return errors from Do, fix dendritejs
* Review comments
* Comments
* Constructor for TransactionWriter
* defletions
* Update gomatrixserverlib, sytest-blacklist
2020-06-01 18:50:19 +02:00
|
|
|
n.wakeupUserDevice(alice, []string{wake}, syncPositionAfter)
|
2020-05-28 11:05:04 +02:00
|
|
|
|
|
|
|
if result := <-awoken; result != wake {
|
|
|
|
t.Fatalf("expected to wake %q, got %q", wake, result)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-05-17 16:38:24 +02:00
|
|
|
// Test that an invite unblocks the request
|
|
|
|
func TestNewInviteEventForUser(t *testing.T) {
|
2019-07-12 16:59:53 +02:00
|
|
|
n := NewNotifier(syncPositionBefore)
|
|
|
|
n.setUsersJoinedToRooms(map[string][]string{
|
|
|
|
roomID: {alice, bob},
|
|
|
|
})
|
|
|
|
|
|
|
|
var wg sync.WaitGroup
|
|
|
|
wg.Add(1)
|
|
|
|
go func() {
|
2020-05-28 11:05:04 +02:00
|
|
|
pos, err := waitForEvents(n, newTestSyncRequest(bob, bobDev, syncPositionBefore))
|
2019-07-12 16:59:53 +02:00
|
|
|
if err != nil {
|
2020-03-18 13:48:51 +01:00
|
|
|
t.Errorf("TestNewInviteEventForUser error: %w", err)
|
2019-07-12 16:59:53 +02:00
|
|
|
}
|
2020-05-13 13:14:50 +02:00
|
|
|
mustEqualPositions(t, pos, syncPositionAfter)
|
2019-07-12 16:59:53 +02:00
|
|
|
wg.Done()
|
|
|
|
}()
|
|
|
|
|
2020-05-28 11:05:04 +02:00
|
|
|
stream := lockedFetchUserStream(n, bob, bobDev)
|
2019-07-12 16:59:53 +02:00
|
|
|
waitForBlocking(stream, 1)
|
|
|
|
|
|
|
|
n.OnNewEvent(&aliceInviteBobEvent, "", nil, syncPositionAfter)
|
|
|
|
|
|
|
|
wg.Wait()
|
|
|
|
}
|
|
|
|
|
|
|
|
// Test an EDU-only update wakes up the request.
|
2020-12-10 19:57:10 +01:00
|
|
|
// TODO: Fix this test, invites wake up with an incremented
|
|
|
|
// PDU position, not EDU position
|
|
|
|
/*
|
2019-07-12 16:59:53 +02:00
|
|
|
func TestEDUWakeup(t *testing.T) {
|
|
|
|
n := NewNotifier(syncPositionAfter)
|
2017-05-17 16:38:24 +02:00
|
|
|
n.setUsersJoinedToRooms(map[string][]string{
|
2017-06-12 19:30:47 +02:00
|
|
|
roomID: {alice, bob},
|
2017-05-17 16:38:24 +02:00
|
|
|
})
|
|
|
|
|
|
|
|
var wg sync.WaitGroup
|
|
|
|
wg.Add(1)
|
|
|
|
go func() {
|
2020-05-28 11:05:04 +02:00
|
|
|
pos, err := waitForEvents(n, newTestSyncRequest(bob, bobDev, syncPositionAfter))
|
2017-05-17 16:38:24 +02:00
|
|
|
if err != nil {
|
2020-03-18 13:48:51 +01:00
|
|
|
t.Errorf("TestNewInviteEventForUser error: %w", err)
|
2017-05-17 16:38:24 +02:00
|
|
|
}
|
2020-05-13 13:14:50 +02:00
|
|
|
mustEqualPositions(t, pos, syncPositionNewEDU)
|
2017-05-17 16:38:24 +02:00
|
|
|
wg.Done()
|
|
|
|
}()
|
|
|
|
|
2020-05-28 11:05:04 +02:00
|
|
|
stream := lockedFetchUserStream(n, bob, bobDev)
|
2017-05-17 16:38:24 +02:00
|
|
|
waitForBlocking(stream, 1)
|
|
|
|
|
2019-07-12 16:59:53 +02:00
|
|
|
n.OnNewEvent(&aliceInviteBobEvent, "", nil, syncPositionNewEDU)
|
2017-05-17 16:38:24 +02:00
|
|
|
|
|
|
|
wg.Wait()
|
|
|
|
}
|
2020-12-10 19:57:10 +01:00
|
|
|
*/
|
2017-05-17 16:38:24 +02:00
|
|
|
|
|
|
|
// Test that all blocked requests get woken up on a new event.
|
|
|
|
func TestMultipleRequestWakeup(t *testing.T) {
|
2019-07-12 16:59:53 +02:00
|
|
|
n := NewNotifier(syncPositionBefore)
|
2017-05-17 16:38:24 +02:00
|
|
|
n.setUsersJoinedToRooms(map[string][]string{
|
2017-06-12 19:30:47 +02:00
|
|
|
roomID: {alice, bob},
|
2017-05-17 16:38:24 +02:00
|
|
|
})
|
|
|
|
|
|
|
|
var wg sync.WaitGroup
|
|
|
|
wg.Add(3)
|
|
|
|
poll := func() {
|
2020-05-28 11:05:04 +02:00
|
|
|
pos, err := waitForEvents(n, newTestSyncRequest(bob, bobDev, syncPositionBefore))
|
2017-05-17 16:38:24 +02:00
|
|
|
if err != nil {
|
2020-03-18 13:48:51 +01:00
|
|
|
t.Errorf("TestMultipleRequestWakeup error: %w", err)
|
2017-05-17 16:38:24 +02:00
|
|
|
}
|
2020-05-13 13:14:50 +02:00
|
|
|
mustEqualPositions(t, pos, syncPositionAfter)
|
2017-05-17 16:38:24 +02:00
|
|
|
wg.Done()
|
|
|
|
}
|
|
|
|
go poll()
|
|
|
|
go poll()
|
|
|
|
go poll()
|
|
|
|
|
2020-05-28 11:05:04 +02:00
|
|
|
stream := lockedFetchUserStream(n, bob, bobDev)
|
2017-05-17 16:38:24 +02:00
|
|
|
waitForBlocking(stream, 3)
|
|
|
|
|
2019-07-12 16:59:53 +02:00
|
|
|
n.OnNewEvent(&randomMessageEvent, "", nil, syncPositionAfter)
|
2017-05-17 16:38:24 +02:00
|
|
|
|
|
|
|
wg.Wait()
|
|
|
|
|
|
|
|
numWaiting := stream.NumWaiting()
|
|
|
|
if numWaiting != 0 {
|
|
|
|
t.Errorf("TestMultipleRequestWakeup NumWaiting() want 0, got %d", numWaiting)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Test that you stop getting woken up when you leave a room.
|
|
|
|
func TestNewEventAndWasPreviouslyJoinedToRoom(t *testing.T) {
|
|
|
|
// listen as bob. Make bob leave room. Make alice send event to room.
|
|
|
|
// Make sure alice gets woken up only and not bob as well.
|
2019-07-12 16:59:53 +02:00
|
|
|
n := NewNotifier(syncPositionBefore)
|
2017-05-17 16:38:24 +02:00
|
|
|
n.setUsersJoinedToRooms(map[string][]string{
|
2017-06-12 19:30:47 +02:00
|
|
|
roomID: {alice, bob},
|
2017-05-17 16:38:24 +02:00
|
|
|
})
|
|
|
|
|
|
|
|
var leaveWG sync.WaitGroup
|
|
|
|
|
|
|
|
// Make bob leave the room
|
|
|
|
leaveWG.Add(1)
|
|
|
|
go func() {
|
2020-05-28 11:05:04 +02:00
|
|
|
pos, err := waitForEvents(n, newTestSyncRequest(bob, bobDev, syncPositionBefore))
|
2017-05-17 16:38:24 +02:00
|
|
|
if err != nil {
|
2020-03-18 13:48:51 +01:00
|
|
|
t.Errorf("TestNewEventAndWasPreviouslyJoinedToRoom error: %w", err)
|
2017-05-17 16:38:24 +02:00
|
|
|
}
|
2020-05-13 13:14:50 +02:00
|
|
|
mustEqualPositions(t, pos, syncPositionAfter)
|
2017-05-17 16:38:24 +02:00
|
|
|
leaveWG.Done()
|
|
|
|
}()
|
2020-05-28 11:05:04 +02:00
|
|
|
bobStream := lockedFetchUserStream(n, bob, bobDev)
|
2017-05-17 16:38:24 +02:00
|
|
|
waitForBlocking(bobStream, 1)
|
2019-07-12 16:59:53 +02:00
|
|
|
n.OnNewEvent(&bobLeaveEvent, "", nil, syncPositionAfter)
|
2017-05-17 16:38:24 +02:00
|
|
|
leaveWG.Wait()
|
|
|
|
|
|
|
|
// send an event into the room. Make sure alice gets it. Bob should not.
|
|
|
|
var aliceWG sync.WaitGroup
|
2020-05-28 11:05:04 +02:00
|
|
|
aliceStream := lockedFetchUserStream(n, alice, aliceDev)
|
2017-05-17 16:38:24 +02:00
|
|
|
aliceWG.Add(1)
|
|
|
|
go func() {
|
2020-05-28 11:05:04 +02:00
|
|
|
pos, err := waitForEvents(n, newTestSyncRequest(alice, aliceDev, syncPositionAfter))
|
2017-05-17 16:38:24 +02:00
|
|
|
if err != nil {
|
2020-03-18 13:48:51 +01:00
|
|
|
t.Errorf("TestNewEventAndWasPreviouslyJoinedToRoom error: %w", err)
|
2017-05-17 16:38:24 +02:00
|
|
|
}
|
2020-05-13 13:14:50 +02:00
|
|
|
mustEqualPositions(t, pos, syncPositionAfter2)
|
2017-05-17 16:38:24 +02:00
|
|
|
aliceWG.Done()
|
|
|
|
}()
|
|
|
|
|
|
|
|
go func() {
|
|
|
|
// this should timeout with an error (but the main goroutine won't wait for the timeout explicitly)
|
2020-05-28 11:05:04 +02:00
|
|
|
_, err := waitForEvents(n, newTestSyncRequest(bob, bobDev, syncPositionAfter))
|
2017-05-17 16:38:24 +02:00
|
|
|
if err == nil {
|
|
|
|
t.Errorf("TestNewEventAndWasPreviouslyJoinedToRoom expect error but got nil")
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
waitForBlocking(aliceStream, 1)
|
|
|
|
waitForBlocking(bobStream, 1)
|
|
|
|
|
2019-07-12 16:59:53 +02:00
|
|
|
n.OnNewEvent(&randomMessageEvent, "", nil, syncPositionAfter2)
|
2017-05-17 16:38:24 +02:00
|
|
|
aliceWG.Wait()
|
|
|
|
|
|
|
|
// it's possible that at this point alice has been informed and bob is about to be informed, so wait
|
|
|
|
// for a fraction of a second to account for this race
|
|
|
|
time.Sleep(1 * time.Millisecond)
|
|
|
|
}
|
|
|
|
|
2021-01-08 17:59:06 +01:00
|
|
|
func waitForEvents(n *Notifier, req types.SyncRequest) (types.StreamingToken, error) {
|
2017-10-26 12:34:54 +02:00
|
|
|
listener := n.GetListener(req)
|
|
|
|
defer listener.Close()
|
|
|
|
|
2017-05-17 16:38:24 +02:00
|
|
|
select {
|
|
|
|
case <-time.After(5 * time.Second):
|
2020-05-13 13:14:50 +02:00
|
|
|
return types.StreamingToken{}, fmt.Errorf(
|
2021-01-08 17:59:06 +01:00
|
|
|
"waitForEvents timed out waiting for %s (pos=%v)", req.Device.UserID, req.Since,
|
2017-05-17 16:38:24 +02:00
|
|
|
)
|
2021-01-08 17:59:06 +01:00
|
|
|
case <-listener.GetNotifyChannel(req.Since):
|
2019-07-12 16:59:53 +02:00
|
|
|
p := listener.GetSyncPosition()
|
2017-05-17 16:38:24 +02:00
|
|
|
return p, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Wait until something is Wait()ing on the user stream.
|
2020-05-28 11:05:04 +02:00
|
|
|
func waitForBlocking(s *UserDeviceStream, numBlocking uint) {
|
2017-05-17 16:38:24 +02:00
|
|
|
for numBlocking != s.NumWaiting() {
|
|
|
|
// This is horrible but I don't want to add a signalling mechanism JUST for testing.
|
|
|
|
time.Sleep(1 * time.Microsecond)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-07-25 18:00:22 +02:00
|
|
|
// lockedFetchUserStream invokes Notifier.fetchUserStream, respecting Notifier.streamLock.
|
|
|
|
// A new stream is made if it doesn't exist already.
|
2020-05-28 11:05:04 +02:00
|
|
|
func lockedFetchUserStream(n *Notifier, userID, deviceID string) *UserDeviceStream {
|
2019-07-25 18:00:22 +02:00
|
|
|
n.streamLock.Lock()
|
|
|
|
defer n.streamLock.Unlock()
|
|
|
|
|
2020-05-28 11:05:04 +02:00
|
|
|
return n.fetchUserDeviceStream(userID, deviceID, true)
|
2019-07-25 18:00:22 +02:00
|
|
|
}
|
|
|
|
|
2021-01-08 17:59:06 +01:00
|
|
|
func newTestSyncRequest(userID, deviceID string, since types.StreamingToken) types.SyncRequest {
|
|
|
|
return types.SyncRequest{
|
|
|
|
Device: &userapi.Device{
|
2020-05-28 11:05:04 +02:00
|
|
|
UserID: userID,
|
|
|
|
ID: deviceID,
|
|
|
|
},
|
2021-01-08 17:59:06 +01:00
|
|
|
Timeout: 1 * time.Minute,
|
|
|
|
Since: since,
|
|
|
|
WantFullState: false,
|
|
|
|
Log: util.GetLogger(context.TODO()),
|
|
|
|
Context: context.TODO(),
|
2017-05-17 16:38:24 +02:00
|
|
|
}
|
|
|
|
}
|