2020-04-30 18:15:29 +02:00
|
|
|
package storage_test
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"fmt"
|
2022-04-08 18:53:24 +02:00
|
|
|
"reflect"
|
2020-04-30 18:15:29 +02:00
|
|
|
"testing"
|
|
|
|
|
2020-12-02 18:41:00 +01:00
|
|
|
"github.com/matrix-org/dendrite/setup/config"
|
2020-04-30 18:15:29 +02:00
|
|
|
"github.com/matrix-org/dendrite/syncapi/storage"
|
|
|
|
"github.com/matrix-org/dendrite/syncapi/types"
|
2022-04-08 11:12:30 +02:00
|
|
|
"github.com/matrix-org/dendrite/test"
|
2020-04-30 18:15:29 +02:00
|
|
|
"github.com/matrix-org/gomatrixserverlib"
|
|
|
|
)
|
|
|
|
|
2022-04-08 11:12:30 +02:00
|
|
|
var ctx = context.Background()
|
2020-04-30 18:15:29 +02:00
|
|
|
|
2022-04-08 11:12:30 +02:00
|
|
|
func MustCreateDatabase(t *testing.T, dbType test.DBType) (storage.Database, func()) {
|
|
|
|
connStr, close := test.PrepareDBConnectionString(t, dbType)
|
2022-05-03 17:35:06 +02:00
|
|
|
db, err := storage.NewSyncServerDatasource(nil, &config.DatabaseOptions{
|
2022-04-08 11:12:30 +02:00
|
|
|
ConnectionString: config.DataSource(connStr),
|
2020-08-10 15:18:04 +02:00
|
|
|
})
|
2020-04-30 18:15:29 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("NewSyncServerDatasource returned %s", err)
|
|
|
|
}
|
2022-04-08 11:12:30 +02:00
|
|
|
return db, close
|
2020-04-30 18:15:29 +02:00
|
|
|
}
|
|
|
|
|
2020-11-16 16:44:53 +01:00
|
|
|
func MustWriteEvents(t *testing.T, db storage.Database, events []*gomatrixserverlib.HeaderedEvent) (positions []types.StreamPosition) {
|
2020-04-30 18:15:29 +02:00
|
|
|
for _, ev := range events {
|
2020-11-16 16:44:53 +01:00
|
|
|
var addStateEvents []*gomatrixserverlib.HeaderedEvent
|
2020-04-30 18:15:29 +02:00
|
|
|
var addStateEventIDs []string
|
|
|
|
var removeStateEventIDs []string
|
|
|
|
if ev.StateKey() != nil {
|
|
|
|
addStateEvents = append(addStateEvents, ev)
|
|
|
|
addStateEventIDs = append(addStateEventIDs, ev.EventID())
|
|
|
|
}
|
2020-11-16 16:44:53 +01:00
|
|
|
pos, err := db.WriteEvent(ctx, ev, addStateEvents, addStateEventIDs, removeStateEventIDs, nil, false)
|
2020-04-30 18:15:29 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("WriteEvent failed: %s", err)
|
|
|
|
}
|
2022-04-08 18:53:24 +02:00
|
|
|
t.Logf("Event ID %s spos=%v depth=%v", ev.EventID(), pos, ev.Depth())
|
2020-04-30 18:15:29 +02:00
|
|
|
positions = append(positions, pos)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestWriteEvents(t *testing.T) {
|
2022-04-08 11:12:30 +02:00
|
|
|
test.WithAllDatabases(t, func(t *testing.T, dbType test.DBType) {
|
|
|
|
alice := test.NewUser()
|
|
|
|
r := test.NewRoom(t, alice)
|
|
|
|
db, close := MustCreateDatabase(t, dbType)
|
|
|
|
defer close()
|
|
|
|
MustWriteEvents(t, db, r.Events())
|
|
|
|
})
|
2020-04-30 18:15:29 +02:00
|
|
|
}
|
|
|
|
|
2022-04-08 11:12:30 +02:00
|
|
|
// These tests assert basic functionality of RecentEvents for PDUs
|
|
|
|
func TestRecentEventsPDU(t *testing.T) {
|
|
|
|
test.WithAllDatabases(t, func(t *testing.T, dbType test.DBType) {
|
|
|
|
db, close := MustCreateDatabase(t, dbType)
|
|
|
|
defer close()
|
|
|
|
alice := test.NewUser()
|
2022-04-08 18:53:24 +02:00
|
|
|
// dummy room to make sure SQL queries are filtering on room ID
|
|
|
|
MustWriteEvents(t, db, test.NewRoom(t, alice).Events())
|
|
|
|
|
|
|
|
// actual test room
|
2022-04-08 11:12:30 +02:00
|
|
|
r := test.NewRoom(t, alice)
|
|
|
|
r.CreateAndInsert(t, alice, "m.room.message", map[string]interface{}{"body": "hi"})
|
|
|
|
events := r.Events()
|
|
|
|
positions := MustWriteEvents(t, db, events)
|
2022-04-08 18:53:24 +02:00
|
|
|
|
|
|
|
// dummy room to make sure SQL queries are filtering on room ID
|
|
|
|
MustWriteEvents(t, db, test.NewRoom(t, alice).Events())
|
|
|
|
|
2022-04-08 11:12:30 +02:00
|
|
|
latest, err := db.MaxStreamPositionForPDUs(ctx)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed to get MaxStreamPositionForPDUs: %s", err)
|
|
|
|
}
|
2020-04-30 18:15:29 +02:00
|
|
|
|
2022-04-08 11:12:30 +02:00
|
|
|
testCases := []struct {
|
2022-04-08 18:53:24 +02:00
|
|
|
Name string
|
|
|
|
From types.StreamPosition
|
|
|
|
To types.StreamPosition
|
|
|
|
Limit int
|
|
|
|
ReverseOrder bool
|
|
|
|
WantEvents []*gomatrixserverlib.HeaderedEvent
|
|
|
|
WantLimited bool
|
2022-04-08 11:12:30 +02:00
|
|
|
}{
|
|
|
|
// The purpose of this test is to make sure that incremental syncs are including up to the latest events.
|
2022-04-08 18:53:24 +02:00
|
|
|
// It's a basic sanity test that sync works. It creates a streaming position that is on the penultimate event.
|
2022-04-08 11:12:30 +02:00
|
|
|
// It makes sure the response includes the final event.
|
|
|
|
{
|
2022-04-08 18:53:24 +02:00
|
|
|
Name: "penultimate",
|
2022-04-08 11:12:30 +02:00
|
|
|
From: positions[len(positions)-2], // pretend we are at the penultimate event
|
|
|
|
To: latest,
|
2022-04-08 18:53:24 +02:00
|
|
|
Limit: 100,
|
2022-04-08 11:12:30 +02:00
|
|
|
WantEvents: events[len(events)-1:],
|
|
|
|
WantLimited: false,
|
2020-04-30 18:15:29 +02:00
|
|
|
},
|
2022-04-08 18:53:24 +02:00
|
|
|
// The purpose of this test is to check that limits can be applied and work.
|
|
|
|
// This is critical for big rooms hence the test here.
|
|
|
|
{
|
|
|
|
Name: "limited",
|
|
|
|
From: 0,
|
|
|
|
To: latest,
|
|
|
|
Limit: 1,
|
|
|
|
WantEvents: events[len(events)-1:],
|
|
|
|
WantLimited: true,
|
|
|
|
},
|
|
|
|
// The purpose of this test is to check that we can return every event with a high
|
|
|
|
// enough limit
|
|
|
|
{
|
|
|
|
Name: "large limited",
|
|
|
|
From: 0,
|
|
|
|
To: latest,
|
|
|
|
Limit: 100,
|
|
|
|
WantEvents: events,
|
|
|
|
WantLimited: false,
|
|
|
|
},
|
|
|
|
// The purpose of this test is to check that we can return events in reverse order
|
|
|
|
{
|
|
|
|
Name: "reverse",
|
|
|
|
From: positions[len(positions)-3], // 2 events back
|
|
|
|
To: latest,
|
|
|
|
Limit: 100,
|
|
|
|
ReverseOrder: true,
|
|
|
|
WantEvents: test.Reversed(events[len(events)-2:]),
|
|
|
|
WantLimited: false,
|
|
|
|
},
|
2022-04-08 11:12:30 +02:00
|
|
|
}
|
2020-04-30 18:15:29 +02:00
|
|
|
|
2022-04-08 18:53:24 +02:00
|
|
|
for i := range testCases {
|
|
|
|
tc := testCases[i]
|
2022-04-08 11:12:30 +02:00
|
|
|
t.Run(tc.Name, func(st *testing.T) {
|
2022-04-08 18:53:24 +02:00
|
|
|
var filter gomatrixserverlib.RoomEventFilter
|
|
|
|
filter.Limit = tc.Limit
|
2022-04-08 11:12:30 +02:00
|
|
|
gotEvents, limited, err := db.RecentEvents(ctx, r.ID, types.Range{
|
|
|
|
From: tc.From,
|
|
|
|
To: tc.To,
|
2022-04-08 18:53:24 +02:00
|
|
|
}, &filter, !tc.ReverseOrder, true)
|
2022-04-08 11:12:30 +02:00
|
|
|
if err != nil {
|
|
|
|
st.Fatalf("failed to do sync: %s", err)
|
|
|
|
}
|
|
|
|
if limited != tc.WantLimited {
|
|
|
|
st.Errorf("got limited=%v want %v", limited, tc.WantLimited)
|
|
|
|
}
|
|
|
|
if len(gotEvents) != len(tc.WantEvents) {
|
|
|
|
st.Errorf("got %d events, want %d", len(gotEvents), len(tc.WantEvents))
|
|
|
|
}
|
2022-04-08 18:53:24 +02:00
|
|
|
for j := range gotEvents {
|
|
|
|
if !reflect.DeepEqual(gotEvents[j].JSON(), tc.WantEvents[j].JSON()) {
|
|
|
|
st.Errorf("event %d got %s want %s", j, string(gotEvents[j].JSON()), string(tc.WantEvents[j].JSON()))
|
|
|
|
}
|
|
|
|
}
|
2022-04-08 11:12:30 +02:00
|
|
|
})
|
|
|
|
}
|
|
|
|
})
|
2020-04-30 18:15:29 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// The purpose of this test is to ensure that backfill does indeed go backwards, using a topology token
|
|
|
|
func TestGetEventsInRangeWithTopologyToken(t *testing.T) {
|
2022-04-08 18:53:24 +02:00
|
|
|
test.WithAllDatabases(t, func(t *testing.T, dbType test.DBType) {
|
|
|
|
db, close := MustCreateDatabase(t, dbType)
|
|
|
|
defer close()
|
|
|
|
alice := test.NewUser()
|
|
|
|
r := test.NewRoom(t, alice)
|
|
|
|
for i := 0; i < 10; i++ {
|
|
|
|
r.CreateAndInsert(t, alice, "m.room.message", map[string]interface{}{"body": fmt.Sprintf("hi %d", i)})
|
|
|
|
}
|
|
|
|
events := r.Events()
|
|
|
|
_ = MustWriteEvents(t, db, events)
|
2020-04-30 18:15:29 +02:00
|
|
|
|
2022-04-08 18:53:24 +02:00
|
|
|
from, err := db.MaxTopologicalPosition(ctx, r.ID)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed to get MaxTopologicalPosition: %s", err)
|
|
|
|
}
|
|
|
|
t.Logf("max topo pos = %+v", from)
|
|
|
|
// head towards the beginning of time
|
|
|
|
to := types.TopologyToken{}
|
|
|
|
|
|
|
|
// backpaginate 5 messages starting at the latest position.
|
2022-04-13 13:16:02 +02:00
|
|
|
filter := &gomatrixserverlib.RoomEventFilter{Limit: 5}
|
|
|
|
paginatedEvents, err := db.GetEventsInTopologicalRange(ctx, &from, &to, r.ID, filter, true)
|
2022-04-08 18:53:24 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("GetEventsInTopologicalRange returned an error: %s", err)
|
|
|
|
}
|
|
|
|
gots := db.StreamEventsToEvents(nil, paginatedEvents)
|
|
|
|
test.AssertEventsEqual(t, gots, test.Reversed(events[len(events)-5:]))
|
|
|
|
})
|
2020-04-30 18:15:29 +02:00
|
|
|
}
|
|
|
|
|
2022-04-08 18:53:24 +02:00
|
|
|
/*
|
2020-05-01 12:01:34 +02:00
|
|
|
// The purpose of this test is to make sure that backpagination returns all events, even if some events have the same depth.
|
|
|
|
// For cases where events have the same depth, the streaming token should be used to tie break so events written via WriteEvent
|
|
|
|
// will appear FIRST when going backwards. This test creates a DAG like:
|
|
|
|
// .-----> Message ---.
|
|
|
|
// Create -> Membership --------> Message -------> Message
|
|
|
|
// `-----> Message ---`
|
|
|
|
// depth 1 2 3 4
|
|
|
|
//
|
|
|
|
// With a total depth of 4. It tests that:
|
|
|
|
// - Backpagination over the whole fork should include all messages and not leave any out.
|
|
|
|
// - Backpagination from the middle of the fork should not return duplicates (things later than the token).
|
|
|
|
func TestGetEventsInRangeWithEventsSameDepth(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
db := MustCreateDatabase(t)
|
|
|
|
|
2020-11-16 16:44:53 +01:00
|
|
|
var events []*gomatrixserverlib.HeaderedEvent
|
2020-05-01 12:01:34 +02:00
|
|
|
events = append(events, MustCreateEvent(t, testRoomID, nil, &gomatrixserverlib.EventBuilder{
|
|
|
|
Content: []byte(fmt.Sprintf(`{"room_version":"4","creator":"%s"}`, testUserIDA)),
|
|
|
|
Type: "m.room.create",
|
|
|
|
StateKey: &emptyStateKey,
|
|
|
|
Sender: testUserIDA,
|
|
|
|
Depth: int64(len(events) + 1),
|
|
|
|
}))
|
2020-11-16 16:44:53 +01:00
|
|
|
events = append(events, MustCreateEvent(t, testRoomID, []*gomatrixserverlib.HeaderedEvent{events[len(events)-1]}, &gomatrixserverlib.EventBuilder{
|
2020-10-01 21:00:56 +02:00
|
|
|
Content: []byte(`{"membership":"join"}`),
|
2020-05-01 12:01:34 +02:00
|
|
|
Type: "m.room.member",
|
|
|
|
StateKey: &testUserIDA,
|
|
|
|
Sender: testUserIDA,
|
|
|
|
Depth: int64(len(events) + 1),
|
|
|
|
}))
|
|
|
|
// fork the dag into three, same prev_events and depth
|
2020-11-16 16:44:53 +01:00
|
|
|
parent := []*gomatrixserverlib.HeaderedEvent{events[len(events)-1]}
|
2020-05-01 12:01:34 +02:00
|
|
|
depth := int64(len(events) + 1)
|
|
|
|
for i := 0; i < 3; i++ {
|
|
|
|
events = append(events, MustCreateEvent(t, testRoomID, parent, &gomatrixserverlib.EventBuilder{
|
|
|
|
Content: []byte(fmt.Sprintf(`{"body":"Message A %d"}`, i+1)),
|
|
|
|
Type: "m.room.message",
|
|
|
|
Sender: testUserIDA,
|
|
|
|
Depth: depth,
|
|
|
|
}))
|
|
|
|
}
|
|
|
|
// merge the fork, prev_events are all 3 messages, depth is increased by 1.
|
|
|
|
events = append(events, MustCreateEvent(t, testRoomID, events[len(events)-3:], &gomatrixserverlib.EventBuilder{
|
2020-10-01 21:00:56 +02:00
|
|
|
Content: []byte(`{"body":"Message merge"}`),
|
2020-05-01 12:01:34 +02:00
|
|
|
Type: "m.room.message",
|
|
|
|
Sender: testUserIDA,
|
|
|
|
Depth: depth + 1,
|
|
|
|
}))
|
|
|
|
MustWriteEvents(t, db, events)
|
2020-05-14 18:30:16 +02:00
|
|
|
fromLatest, err := db.EventPositionInTopology(ctx, events[len(events)-1].EventID())
|
2020-05-01 12:01:34 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed to get EventPositionInTopology: %s", err)
|
|
|
|
}
|
2020-05-14 18:30:16 +02:00
|
|
|
fromFork, err := db.EventPositionInTopology(ctx, events[len(events)-3].EventID()) // Message 2
|
2020-05-01 12:01:34 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed to get EventPositionInTopology for event: %s", err)
|
|
|
|
}
|
|
|
|
// head towards the beginning of time
|
2020-12-10 19:57:10 +01:00
|
|
|
to := types.TopologyToken{}
|
2020-05-01 12:01:34 +02:00
|
|
|
|
|
|
|
testCases := []struct {
|
|
|
|
Name string
|
2020-05-13 13:14:50 +02:00
|
|
|
From types.TopologyToken
|
2020-05-01 12:01:34 +02:00
|
|
|
Limit int
|
2020-11-16 16:44:53 +01:00
|
|
|
Wants []*gomatrixserverlib.HeaderedEvent
|
2020-05-01 12:01:34 +02:00
|
|
|
}{
|
|
|
|
{
|
|
|
|
Name: "Pagination over the whole fork",
|
|
|
|
From: fromLatest,
|
|
|
|
Limit: 5,
|
|
|
|
Wants: reversed(events[len(events)-5:]),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Name: "Paginating to the middle of the fork",
|
|
|
|
From: fromLatest,
|
|
|
|
Limit: 2,
|
|
|
|
Wants: reversed(events[len(events)-2:]),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Name: "Pagination FROM the middle of the fork",
|
|
|
|
From: fromFork,
|
|
|
|
Limit: 3,
|
|
|
|
Wants: reversed(events[len(events)-5 : len(events)-2]),
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, tc := range testCases {
|
|
|
|
// backpaginate messages starting at the latest position.
|
2020-05-13 13:14:50 +02:00
|
|
|
paginatedEvents, err := db.GetEventsInTopologicalRange(ctx, &tc.From, &to, testRoomID, tc.Limit, true)
|
2020-05-01 12:01:34 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("%s GetEventsInRange returned an error: %s", tc.Name, err)
|
|
|
|
}
|
|
|
|
gots := gomatrixserverlib.HeaderedToClientEvents(db.StreamEventsToEvents(&testUserDeviceA, paginatedEvents), gomatrixserverlib.FormatAll)
|
|
|
|
assertEventsEqual(t, tc.Name, true, gots, tc.Wants)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-05-15 17:27:34 +02:00
|
|
|
// The purpose of this test is to make sure that the query to pull out events is honouring the room ID correctly.
|
|
|
|
// It works by creating two rooms with the same events in them, then selecting events by topological range.
|
|
|
|
// Specifically, we know that events with the same depth but lower stream positions are selected, and it's possible
|
|
|
|
// that this check isn't using the room ID if the brackets are wrong in the SQL query.
|
|
|
|
func TestGetEventsInTopologicalRangeMultiRoom(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
db := MustCreateDatabase(t)
|
|
|
|
|
2020-11-16 16:44:53 +01:00
|
|
|
makeEvents := func(roomID string) (events []*gomatrixserverlib.HeaderedEvent) {
|
2020-05-15 17:27:34 +02:00
|
|
|
events = append(events, MustCreateEvent(t, roomID, nil, &gomatrixserverlib.EventBuilder{
|
|
|
|
Content: []byte(fmt.Sprintf(`{"room_version":"4","creator":"%s"}`, testUserIDA)),
|
|
|
|
Type: "m.room.create",
|
|
|
|
StateKey: &emptyStateKey,
|
|
|
|
Sender: testUserIDA,
|
|
|
|
Depth: int64(len(events) + 1),
|
|
|
|
}))
|
2020-11-16 16:44:53 +01:00
|
|
|
events = append(events, MustCreateEvent(t, roomID, []*gomatrixserverlib.HeaderedEvent{events[len(events)-1]}, &gomatrixserverlib.EventBuilder{
|
2020-10-01 21:00:56 +02:00
|
|
|
Content: []byte(`{"membership":"join"}`),
|
2020-05-15 17:27:34 +02:00
|
|
|
Type: "m.room.member",
|
|
|
|
StateKey: &testUserIDA,
|
|
|
|
Sender: testUserIDA,
|
|
|
|
Depth: int64(len(events) + 1),
|
|
|
|
}))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
roomA := "!room_a:" + string(testOrigin)
|
|
|
|
roomB := "!room_b:" + string(testOrigin)
|
|
|
|
eventsA := makeEvents(roomA)
|
|
|
|
eventsB := makeEvents(roomB)
|
|
|
|
MustWriteEvents(t, db, eventsA)
|
|
|
|
MustWriteEvents(t, db, eventsB)
|
|
|
|
from, err := db.MaxTopologicalPosition(ctx, roomB)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed to get MaxTopologicalPosition: %s", err)
|
|
|
|
}
|
|
|
|
// head towards the beginning of time
|
2020-12-10 19:57:10 +01:00
|
|
|
to := types.TopologyToken{}
|
2020-05-15 17:27:34 +02:00
|
|
|
|
|
|
|
// Query using room B as room A was inserted first and hence A will have lower stream positions but identical depths,
|
|
|
|
// allowing this bug to surface.
|
|
|
|
paginatedEvents, err := db.GetEventsInTopologicalRange(ctx, &from, &to, roomB, 5, true)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("GetEventsInRange returned an error: %s", err)
|
|
|
|
}
|
|
|
|
gots := gomatrixserverlib.HeaderedToClientEvents(db.StreamEventsToEvents(&testUserDeviceA, paginatedEvents), gomatrixserverlib.FormatAll)
|
|
|
|
assertEventsEqual(t, "", true, gots, reversed(eventsB))
|
|
|
|
}
|
|
|
|
|
2020-05-01 17:41:13 +02:00
|
|
|
// The purpose of this test is to make sure that events are returned in the right *order* when they have been inserted in a manner similar to
|
|
|
|
// how any kind of backfill operation will insert the events. This test inserts the SimpleRoom events in a manner similar to how backfill over
|
|
|
|
// federation would:
|
|
|
|
// - First inserts join event of test user C
|
|
|
|
// - Inserts chunks of history in strata e.g (25-30, 20-25, 15-20, 10-15, 5-10, 0-5).
|
|
|
|
// The test then does a backfill to ensure that the response is ordered correctly according to depth.
|
|
|
|
func TestGetEventsInRangeWithEventsInsertedLikeBackfill(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
db := MustCreateDatabase(t)
|
|
|
|
events, _ := SimpleRoom(t, testRoomID, testUserIDA, testUserIDB)
|
|
|
|
|
|
|
|
// "federation" join
|
|
|
|
userC := fmt.Sprintf("@radiance:%s", testOrigin)
|
2020-11-16 16:44:53 +01:00
|
|
|
joinEvent := MustCreateEvent(t, testRoomID, []*gomatrixserverlib.HeaderedEvent{events[len(events)-1]}, &gomatrixserverlib.EventBuilder{
|
2020-10-01 21:00:56 +02:00
|
|
|
Content: []byte(`{"membership":"join"}`),
|
2020-05-01 17:41:13 +02:00
|
|
|
Type: "m.room.member",
|
|
|
|
StateKey: &userC,
|
|
|
|
Sender: userC,
|
|
|
|
Depth: int64(len(events) + 1),
|
|
|
|
})
|
2020-11-16 16:44:53 +01:00
|
|
|
MustWriteEvents(t, db, []*gomatrixserverlib.HeaderedEvent{joinEvent})
|
2020-05-01 17:41:13 +02:00
|
|
|
|
|
|
|
// Sync will return this for the prev_batch
|
|
|
|
from := topologyTokenBefore(t, db, joinEvent.EventID())
|
|
|
|
|
|
|
|
// inject events in batches as if they were from backfill
|
|
|
|
// e.g [1,2,3,4,5,6] => [4,5,6] , [1,2,3]
|
|
|
|
chunkSize := 5
|
|
|
|
for i := len(events); i >= 0; i -= chunkSize {
|
|
|
|
start := i - chunkSize
|
|
|
|
if start < 0 {
|
|
|
|
start = 0
|
|
|
|
}
|
|
|
|
backfill := events[start:i]
|
|
|
|
MustWriteEvents(t, db, backfill)
|
|
|
|
}
|
|
|
|
|
|
|
|
// head towards the beginning of time
|
2020-12-10 19:57:10 +01:00
|
|
|
to := types.TopologyToken{}
|
2020-05-01 17:41:13 +02:00
|
|
|
|
|
|
|
// starting at `from`, backpaginate to the beginning of time, asserting as we go.
|
|
|
|
chunkSize = 3
|
|
|
|
events = reversed(events)
|
|
|
|
for i := 0; i < len(events); i += chunkSize {
|
2020-05-13 13:14:50 +02:00
|
|
|
paginatedEvents, err := db.GetEventsInTopologicalRange(ctx, from, &to, testRoomID, chunkSize, true)
|
2020-05-01 17:41:13 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("GetEventsInRange returned an error: %s", err)
|
|
|
|
}
|
|
|
|
gots := gomatrixserverlib.HeaderedToClientEvents(db.StreamEventsToEvents(&testUserDeviceA, paginatedEvents), gomatrixserverlib.FormatAll)
|
|
|
|
endi := i + chunkSize
|
|
|
|
if endi > len(events) {
|
|
|
|
endi = len(events)
|
|
|
|
}
|
|
|
|
assertEventsEqual(t, from.String(), true, gots, events[i:endi])
|
|
|
|
from = topologyTokenBefore(t, db, paginatedEvents[len(paginatedEvents)-1].EventID())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
Send-to-device support (#1072)
* Groundwork for send-to-device messaging
* Update sample config
* Add unstable routing for now
* Send to device consumer in sync API
* Start the send-to-device consumer
* fix indentation in dendrite-config.yaml
* Create send-to-device database tables, other tweaks
* Add some logic for send-to-device messages, add them into sync stream
* Handle incoming send-to-device messages, count them with EDU stream pos
* Undo changes to test
* pq.Array
* Fix sync
* Logging
* Fix a couple of transaction things, fix client API
* Add send-to-device test, hopefully fix bugs
* Comments
* Refactor a bit
* Fix schema
* Fix queries
* Debug logging
* Fix storing and retrieving of send-to-device messages
* Try to avoid database locks
* Update sync position
* Use latest sync position
* Jiggle about sync a bit
* Fix tests
* Break out the retrieval from the update/delete behaviour
* Comments
* nolint on getResponseWithPDUsForCompleteSync
* Try to line up sync tokens again
* Implement wildcard
* Add all send-to-device tests to whitelist, what could possibly go wrong?
* Only care about wildcard when targeted locally
* Deduplicate transactions
* Handle tokens properly, return immediately if waiting send-to-device messages
* Fix sync
* Update sytest-whitelist
* Fix copyright notice (need to do more of this)
* Comments, copyrights
* Return errors from Do, fix dendritejs
* Review comments
* Comments
* Constructor for TransactionWriter
* defletions
* Update gomatrixserverlib, sytest-blacklist
2020-06-01 18:50:19 +02:00
|
|
|
func TestSendToDeviceBehaviour(t *testing.T) {
|
|
|
|
//t.Parallel()
|
|
|
|
db := MustCreateDatabase(t)
|
|
|
|
|
|
|
|
// At this point there should be no messages. We haven't sent anything
|
|
|
|
// yet.
|
2020-12-18 12:11:21 +01:00
|
|
|
_, events, updates, deletions, err := db.SendToDeviceUpdatesForSync(ctx, "alice", "one", types.StreamingToken{})
|
Send-to-device support (#1072)
* Groundwork for send-to-device messaging
* Update sample config
* Add unstable routing for now
* Send to device consumer in sync API
* Start the send-to-device consumer
* fix indentation in dendrite-config.yaml
* Create send-to-device database tables, other tweaks
* Add some logic for send-to-device messages, add them into sync stream
* Handle incoming send-to-device messages, count them with EDU stream pos
* Undo changes to test
* pq.Array
* Fix sync
* Logging
* Fix a couple of transaction things, fix client API
* Add send-to-device test, hopefully fix bugs
* Comments
* Refactor a bit
* Fix schema
* Fix queries
* Debug logging
* Fix storing and retrieving of send-to-device messages
* Try to avoid database locks
* Update sync position
* Use latest sync position
* Jiggle about sync a bit
* Fix tests
* Break out the retrieval from the update/delete behaviour
* Comments
* nolint on getResponseWithPDUsForCompleteSync
* Try to line up sync tokens again
* Implement wildcard
* Add all send-to-device tests to whitelist, what could possibly go wrong?
* Only care about wildcard when targeted locally
* Deduplicate transactions
* Handle tokens properly, return immediately if waiting send-to-device messages
* Fix sync
* Update sytest-whitelist
* Fix copyright notice (need to do more of this)
* Comments, copyrights
* Return errors from Do, fix dendritejs
* Review comments
* Comments
* Constructor for TransactionWriter
* defletions
* Update gomatrixserverlib, sytest-blacklist
2020-06-01 18:50:19 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if len(events) != 0 || len(updates) != 0 || len(deletions) != 0 {
|
|
|
|
t.Fatal("first call should have no updates")
|
|
|
|
}
|
2020-12-10 19:57:10 +01:00
|
|
|
err = db.CleanSendToDeviceUpdates(context.Background(), updates, deletions, types.StreamingToken{})
|
Send-to-device support (#1072)
* Groundwork for send-to-device messaging
* Update sample config
* Add unstable routing for now
* Send to device consumer in sync API
* Start the send-to-device consumer
* fix indentation in dendrite-config.yaml
* Create send-to-device database tables, other tweaks
* Add some logic for send-to-device messages, add them into sync stream
* Handle incoming send-to-device messages, count them with EDU stream pos
* Undo changes to test
* pq.Array
* Fix sync
* Logging
* Fix a couple of transaction things, fix client API
* Add send-to-device test, hopefully fix bugs
* Comments
* Refactor a bit
* Fix schema
* Fix queries
* Debug logging
* Fix storing and retrieving of send-to-device messages
* Try to avoid database locks
* Update sync position
* Use latest sync position
* Jiggle about sync a bit
* Fix tests
* Break out the retrieval from the update/delete behaviour
* Comments
* nolint on getResponseWithPDUsForCompleteSync
* Try to line up sync tokens again
* Implement wildcard
* Add all send-to-device tests to whitelist, what could possibly go wrong?
* Only care about wildcard when targeted locally
* Deduplicate transactions
* Handle tokens properly, return immediately if waiting send-to-device messages
* Fix sync
* Update sytest-whitelist
* Fix copyright notice (need to do more of this)
* Comments, copyrights
* Return errors from Do, fix dendritejs
* Review comments
* Comments
* Constructor for TransactionWriter
* defletions
* Update gomatrixserverlib, sytest-blacklist
2020-06-01 18:50:19 +02:00
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Try sending a message.
|
2020-12-18 12:11:21 +01:00
|
|
|
streamPos, err := db.StoreNewSendForDeviceMessage(ctx, "alice", "one", gomatrixserverlib.SendToDeviceEvent{
|
Send-to-device support (#1072)
* Groundwork for send-to-device messaging
* Update sample config
* Add unstable routing for now
* Send to device consumer in sync API
* Start the send-to-device consumer
* fix indentation in dendrite-config.yaml
* Create send-to-device database tables, other tweaks
* Add some logic for send-to-device messages, add them into sync stream
* Handle incoming send-to-device messages, count them with EDU stream pos
* Undo changes to test
* pq.Array
* Fix sync
* Logging
* Fix a couple of transaction things, fix client API
* Add send-to-device test, hopefully fix bugs
* Comments
* Refactor a bit
* Fix schema
* Fix queries
* Debug logging
* Fix storing and retrieving of send-to-device messages
* Try to avoid database locks
* Update sync position
* Use latest sync position
* Jiggle about sync a bit
* Fix tests
* Break out the retrieval from the update/delete behaviour
* Comments
* nolint on getResponseWithPDUsForCompleteSync
* Try to line up sync tokens again
* Implement wildcard
* Add all send-to-device tests to whitelist, what could possibly go wrong?
* Only care about wildcard when targeted locally
* Deduplicate transactions
* Handle tokens properly, return immediately if waiting send-to-device messages
* Fix sync
* Update sytest-whitelist
* Fix copyright notice (need to do more of this)
* Comments, copyrights
* Return errors from Do, fix dendritejs
* Review comments
* Comments
* Constructor for TransactionWriter
* defletions
* Update gomatrixserverlib, sytest-blacklist
2020-06-01 18:50:19 +02:00
|
|
|
Sender: "bob",
|
|
|
|
Type: "m.type",
|
|
|
|
Content: json.RawMessage("{}"),
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// At this point we should get exactly one message. We're sending the sync position
|
|
|
|
// that we were given from the update and the send-to-device update will be updated
|
|
|
|
// in the database to reflect that this was the sync position we sent the message at.
|
2020-12-18 12:11:21 +01:00
|
|
|
_, events, updates, deletions, err = db.SendToDeviceUpdatesForSync(ctx, "alice", "one", types.StreamingToken{SendToDevicePosition: streamPos})
|
Send-to-device support (#1072)
* Groundwork for send-to-device messaging
* Update sample config
* Add unstable routing for now
* Send to device consumer in sync API
* Start the send-to-device consumer
* fix indentation in dendrite-config.yaml
* Create send-to-device database tables, other tweaks
* Add some logic for send-to-device messages, add them into sync stream
* Handle incoming send-to-device messages, count them with EDU stream pos
* Undo changes to test
* pq.Array
* Fix sync
* Logging
* Fix a couple of transaction things, fix client API
* Add send-to-device test, hopefully fix bugs
* Comments
* Refactor a bit
* Fix schema
* Fix queries
* Debug logging
* Fix storing and retrieving of send-to-device messages
* Try to avoid database locks
* Update sync position
* Use latest sync position
* Jiggle about sync a bit
* Fix tests
* Break out the retrieval from the update/delete behaviour
* Comments
* nolint on getResponseWithPDUsForCompleteSync
* Try to line up sync tokens again
* Implement wildcard
* Add all send-to-device tests to whitelist, what could possibly go wrong?
* Only care about wildcard when targeted locally
* Deduplicate transactions
* Handle tokens properly, return immediately if waiting send-to-device messages
* Fix sync
* Update sytest-whitelist
* Fix copyright notice (need to do more of this)
* Comments, copyrights
* Return errors from Do, fix dendritejs
* Review comments
* Comments
* Constructor for TransactionWriter
* defletions
* Update gomatrixserverlib, sytest-blacklist
2020-06-01 18:50:19 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if len(events) != 1 || len(updates) != 1 || len(deletions) != 0 {
|
|
|
|
t.Fatal("second call should have one update")
|
|
|
|
}
|
2020-12-10 19:57:10 +01:00
|
|
|
err = db.CleanSendToDeviceUpdates(context.Background(), updates, deletions, types.StreamingToken{SendToDevicePosition: streamPos})
|
Send-to-device support (#1072)
* Groundwork for send-to-device messaging
* Update sample config
* Add unstable routing for now
* Send to device consumer in sync API
* Start the send-to-device consumer
* fix indentation in dendrite-config.yaml
* Create send-to-device database tables, other tweaks
* Add some logic for send-to-device messages, add them into sync stream
* Handle incoming send-to-device messages, count them with EDU stream pos
* Undo changes to test
* pq.Array
* Fix sync
* Logging
* Fix a couple of transaction things, fix client API
* Add send-to-device test, hopefully fix bugs
* Comments
* Refactor a bit
* Fix schema
* Fix queries
* Debug logging
* Fix storing and retrieving of send-to-device messages
* Try to avoid database locks
* Update sync position
* Use latest sync position
* Jiggle about sync a bit
* Fix tests
* Break out the retrieval from the update/delete behaviour
* Comments
* nolint on getResponseWithPDUsForCompleteSync
* Try to line up sync tokens again
* Implement wildcard
* Add all send-to-device tests to whitelist, what could possibly go wrong?
* Only care about wildcard when targeted locally
* Deduplicate transactions
* Handle tokens properly, return immediately if waiting send-to-device messages
* Fix sync
* Update sytest-whitelist
* Fix copyright notice (need to do more of this)
* Comments, copyrights
* Return errors from Do, fix dendritejs
* Review comments
* Comments
* Constructor for TransactionWriter
* defletions
* Update gomatrixserverlib, sytest-blacklist
2020-06-01 18:50:19 +02:00
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// At this point we should still have one message because we haven't progressed the
|
|
|
|
// sync position yet. This is equivalent to the client failing to /sync and retrying
|
|
|
|
// with the same position.
|
2020-12-18 12:11:21 +01:00
|
|
|
_, events, updates, deletions, err = db.SendToDeviceUpdatesForSync(ctx, "alice", "one", types.StreamingToken{SendToDevicePosition: streamPos})
|
Send-to-device support (#1072)
* Groundwork for send-to-device messaging
* Update sample config
* Add unstable routing for now
* Send to device consumer in sync API
* Start the send-to-device consumer
* fix indentation in dendrite-config.yaml
* Create send-to-device database tables, other tweaks
* Add some logic for send-to-device messages, add them into sync stream
* Handle incoming send-to-device messages, count them with EDU stream pos
* Undo changes to test
* pq.Array
* Fix sync
* Logging
* Fix a couple of transaction things, fix client API
* Add send-to-device test, hopefully fix bugs
* Comments
* Refactor a bit
* Fix schema
* Fix queries
* Debug logging
* Fix storing and retrieving of send-to-device messages
* Try to avoid database locks
* Update sync position
* Use latest sync position
* Jiggle about sync a bit
* Fix tests
* Break out the retrieval from the update/delete behaviour
* Comments
* nolint on getResponseWithPDUsForCompleteSync
* Try to line up sync tokens again
* Implement wildcard
* Add all send-to-device tests to whitelist, what could possibly go wrong?
* Only care about wildcard when targeted locally
* Deduplicate transactions
* Handle tokens properly, return immediately if waiting send-to-device messages
* Fix sync
* Update sytest-whitelist
* Fix copyright notice (need to do more of this)
* Comments, copyrights
* Return errors from Do, fix dendritejs
* Review comments
* Comments
* Constructor for TransactionWriter
* defletions
* Update gomatrixserverlib, sytest-blacklist
2020-06-01 18:50:19 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if len(events) != 1 || len(updates) != 0 || len(deletions) != 0 {
|
|
|
|
t.Fatal("third call should have one update still")
|
|
|
|
}
|
2020-12-10 19:57:10 +01:00
|
|
|
err = db.CleanSendToDeviceUpdates(context.Background(), updates, deletions, types.StreamingToken{SendToDevicePosition: streamPos})
|
Send-to-device support (#1072)
* Groundwork for send-to-device messaging
* Update sample config
* Add unstable routing for now
* Send to device consumer in sync API
* Start the send-to-device consumer
* fix indentation in dendrite-config.yaml
* Create send-to-device database tables, other tweaks
* Add some logic for send-to-device messages, add them into sync stream
* Handle incoming send-to-device messages, count them with EDU stream pos
* Undo changes to test
* pq.Array
* Fix sync
* Logging
* Fix a couple of transaction things, fix client API
* Add send-to-device test, hopefully fix bugs
* Comments
* Refactor a bit
* Fix schema
* Fix queries
* Debug logging
* Fix storing and retrieving of send-to-device messages
* Try to avoid database locks
* Update sync position
* Use latest sync position
* Jiggle about sync a bit
* Fix tests
* Break out the retrieval from the update/delete behaviour
* Comments
* nolint on getResponseWithPDUsForCompleteSync
* Try to line up sync tokens again
* Implement wildcard
* Add all send-to-device tests to whitelist, what could possibly go wrong?
* Only care about wildcard when targeted locally
* Deduplicate transactions
* Handle tokens properly, return immediately if waiting send-to-device messages
* Fix sync
* Update sytest-whitelist
* Fix copyright notice (need to do more of this)
* Comments, copyrights
* Return errors from Do, fix dendritejs
* Review comments
* Comments
* Constructor for TransactionWriter
* defletions
* Update gomatrixserverlib, sytest-blacklist
2020-06-01 18:50:19 +02:00
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// At this point we should now have no updates, because we've progressed the sync
|
|
|
|
// position. Therefore the update from before will not be sent again.
|
2020-12-18 12:11:21 +01:00
|
|
|
_, events, updates, deletions, err = db.SendToDeviceUpdatesForSync(ctx, "alice", "one", types.StreamingToken{SendToDevicePosition: streamPos + 1})
|
Send-to-device support (#1072)
* Groundwork for send-to-device messaging
* Update sample config
* Add unstable routing for now
* Send to device consumer in sync API
* Start the send-to-device consumer
* fix indentation in dendrite-config.yaml
* Create send-to-device database tables, other tweaks
* Add some logic for send-to-device messages, add them into sync stream
* Handle incoming send-to-device messages, count them with EDU stream pos
* Undo changes to test
* pq.Array
* Fix sync
* Logging
* Fix a couple of transaction things, fix client API
* Add send-to-device test, hopefully fix bugs
* Comments
* Refactor a bit
* Fix schema
* Fix queries
* Debug logging
* Fix storing and retrieving of send-to-device messages
* Try to avoid database locks
* Update sync position
* Use latest sync position
* Jiggle about sync a bit
* Fix tests
* Break out the retrieval from the update/delete behaviour
* Comments
* nolint on getResponseWithPDUsForCompleteSync
* Try to line up sync tokens again
* Implement wildcard
* Add all send-to-device tests to whitelist, what could possibly go wrong?
* Only care about wildcard when targeted locally
* Deduplicate transactions
* Handle tokens properly, return immediately if waiting send-to-device messages
* Fix sync
* Update sytest-whitelist
* Fix copyright notice (need to do more of this)
* Comments, copyrights
* Return errors from Do, fix dendritejs
* Review comments
* Comments
* Constructor for TransactionWriter
* defletions
* Update gomatrixserverlib, sytest-blacklist
2020-06-01 18:50:19 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if len(events) != 0 || len(updates) != 0 || len(deletions) != 1 {
|
|
|
|
t.Fatal("fourth call should have no updates")
|
|
|
|
}
|
2020-12-10 19:57:10 +01:00
|
|
|
err = db.CleanSendToDeviceUpdates(context.Background(), updates, deletions, types.StreamingToken{SendToDevicePosition: streamPos + 1})
|
Send-to-device support (#1072)
* Groundwork for send-to-device messaging
* Update sample config
* Add unstable routing for now
* Send to device consumer in sync API
* Start the send-to-device consumer
* fix indentation in dendrite-config.yaml
* Create send-to-device database tables, other tweaks
* Add some logic for send-to-device messages, add them into sync stream
* Handle incoming send-to-device messages, count them with EDU stream pos
* Undo changes to test
* pq.Array
* Fix sync
* Logging
* Fix a couple of transaction things, fix client API
* Add send-to-device test, hopefully fix bugs
* Comments
* Refactor a bit
* Fix schema
* Fix queries
* Debug logging
* Fix storing and retrieving of send-to-device messages
* Try to avoid database locks
* Update sync position
* Use latest sync position
* Jiggle about sync a bit
* Fix tests
* Break out the retrieval from the update/delete behaviour
* Comments
* nolint on getResponseWithPDUsForCompleteSync
* Try to line up sync tokens again
* Implement wildcard
* Add all send-to-device tests to whitelist, what could possibly go wrong?
* Only care about wildcard when targeted locally
* Deduplicate transactions
* Handle tokens properly, return immediately if waiting send-to-device messages
* Fix sync
* Update sytest-whitelist
* Fix copyright notice (need to do more of this)
* Comments, copyrights
* Return errors from Do, fix dendritejs
* Review comments
* Comments
* Constructor for TransactionWriter
* defletions
* Update gomatrixserverlib, sytest-blacklist
2020-06-01 18:50:19 +02:00
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// At this point we should still have no updates, because no new updates have been
|
|
|
|
// sent.
|
2020-12-18 12:11:21 +01:00
|
|
|
_, events, updates, deletions, err = db.SendToDeviceUpdatesForSync(ctx, "alice", "one", types.StreamingToken{SendToDevicePosition: streamPos + 2})
|
Send-to-device support (#1072)
* Groundwork for send-to-device messaging
* Update sample config
* Add unstable routing for now
* Send to device consumer in sync API
* Start the send-to-device consumer
* fix indentation in dendrite-config.yaml
* Create send-to-device database tables, other tweaks
* Add some logic for send-to-device messages, add them into sync stream
* Handle incoming send-to-device messages, count them with EDU stream pos
* Undo changes to test
* pq.Array
* Fix sync
* Logging
* Fix a couple of transaction things, fix client API
* Add send-to-device test, hopefully fix bugs
* Comments
* Refactor a bit
* Fix schema
* Fix queries
* Debug logging
* Fix storing and retrieving of send-to-device messages
* Try to avoid database locks
* Update sync position
* Use latest sync position
* Jiggle about sync a bit
* Fix tests
* Break out the retrieval from the update/delete behaviour
* Comments
* nolint on getResponseWithPDUsForCompleteSync
* Try to line up sync tokens again
* Implement wildcard
* Add all send-to-device tests to whitelist, what could possibly go wrong?
* Only care about wildcard when targeted locally
* Deduplicate transactions
* Handle tokens properly, return immediately if waiting send-to-device messages
* Fix sync
* Update sytest-whitelist
* Fix copyright notice (need to do more of this)
* Comments, copyrights
* Return errors from Do, fix dendritejs
* Review comments
* Comments
* Constructor for TransactionWriter
* defletions
* Update gomatrixserverlib, sytest-blacklist
2020-06-01 18:50:19 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if len(events) != 0 || len(updates) != 0 || len(deletions) != 0 {
|
|
|
|
t.Fatal("fifth call should have no updates")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-26 12:07:52 +02:00
|
|
|
func TestInviteBehaviour(t *testing.T) {
|
|
|
|
db := MustCreateDatabase(t)
|
|
|
|
inviteRoom1 := "!inviteRoom1:somewhere"
|
|
|
|
inviteEvent1 := MustCreateEvent(t, inviteRoom1, nil, &gomatrixserverlib.EventBuilder{
|
2020-10-01 21:00:56 +02:00
|
|
|
Content: []byte(`{"membership":"invite"}`),
|
2020-06-26 12:07:52 +02:00
|
|
|
Type: "m.room.member",
|
|
|
|
StateKey: &testUserIDA,
|
|
|
|
Sender: "@inviteUser1:somewhere",
|
|
|
|
})
|
|
|
|
inviteRoom2 := "!inviteRoom2:somewhere"
|
|
|
|
inviteEvent2 := MustCreateEvent(t, inviteRoom2, nil, &gomatrixserverlib.EventBuilder{
|
2020-10-01 21:00:56 +02:00
|
|
|
Content: []byte(`{"membership":"invite"}`),
|
2020-06-26 12:07:52 +02:00
|
|
|
Type: "m.room.member",
|
|
|
|
StateKey: &testUserIDA,
|
|
|
|
Sender: "@inviteUser2:somewhere",
|
|
|
|
})
|
2020-11-16 16:44:53 +01:00
|
|
|
for _, ev := range []*gomatrixserverlib.HeaderedEvent{inviteEvent1, inviteEvent2} {
|
2020-06-26 12:07:52 +02:00
|
|
|
_, err := db.AddInviteEvent(ctx, ev)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Failed to AddInviteEvent: %s", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
latest, err := db.SyncPosition(ctx)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed to get SyncPosition: %s", err)
|
|
|
|
}
|
|
|
|
// both invite events should appear in a new sync
|
|
|
|
beforeRetireRes := types.NewResponse()
|
2020-12-10 19:57:10 +01:00
|
|
|
beforeRetireRes, err = db.IncrementalSync(ctx, beforeRetireRes, testUserDeviceA, types.StreamingToken{}, latest, 0, false)
|
2020-06-26 12:07:52 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("IncrementalSync failed: %s", err)
|
|
|
|
}
|
|
|
|
assertInvitedToRooms(t, beforeRetireRes, []string{inviteRoom1, inviteRoom2})
|
|
|
|
|
|
|
|
// retire one event: a fresh sync should just return 1 invite room
|
|
|
|
if _, err = db.RetireInviteEvent(ctx, inviteEvent1.EventID()); err != nil {
|
|
|
|
t.Fatalf("Failed to RetireInviteEvent: %s", err)
|
|
|
|
}
|
|
|
|
latest, err = db.SyncPosition(ctx)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed to get SyncPosition: %s", err)
|
|
|
|
}
|
|
|
|
res := types.NewResponse()
|
2020-12-10 19:57:10 +01:00
|
|
|
res, err = db.IncrementalSync(ctx, res, testUserDeviceA, types.StreamingToken{}, latest, 0, false)
|
2020-06-26 12:07:52 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("IncrementalSync failed: %s", err)
|
|
|
|
}
|
|
|
|
assertInvitedToRooms(t, res, []string{inviteRoom2})
|
|
|
|
|
|
|
|
// a sync after we have received both invites should result in a leave for the retired room
|
|
|
|
res = types.NewResponse()
|
2020-12-18 12:11:21 +01:00
|
|
|
res, err = db.IncrementalSync(ctx, res, testUserDeviceA, beforeRetireRes.NextBatch, latest, 0, false)
|
2020-06-26 12:07:52 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("IncrementalSync failed: %s", err)
|
|
|
|
}
|
|
|
|
assertInvitedToRooms(t, res, []string{})
|
|
|
|
if _, ok := res.Rooms.Leave[inviteRoom1]; !ok {
|
|
|
|
t.Fatalf("IncrementalSync: expected to see room left after it was retired but it wasn't")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func assertInvitedToRooms(t *testing.T, res *types.Response, roomIDs []string) {
|
|
|
|
t.Helper()
|
|
|
|
if len(res.Rooms.Invite) != len(roomIDs) {
|
|
|
|
t.Fatalf("got %d invited rooms, want %d", len(res.Rooms.Invite), len(roomIDs))
|
|
|
|
}
|
|
|
|
for _, roomID := range roomIDs {
|
|
|
|
if _, ok := res.Rooms.Invite[roomID]; !ok {
|
|
|
|
t.Fatalf("missing room ID %s", roomID)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-11-16 16:44:53 +01:00
|
|
|
func assertEventsEqual(t *testing.T, msg string, checkRoomID bool, gots []gomatrixserverlib.ClientEvent, wants []*gomatrixserverlib.HeaderedEvent) {
|
2020-10-02 18:08:13 +02:00
|
|
|
t.Helper()
|
2020-04-30 18:15:29 +02:00
|
|
|
if len(gots) != len(wants) {
|
|
|
|
t.Fatalf("%s response returned %d events, want %d", msg, len(gots), len(wants))
|
|
|
|
}
|
|
|
|
for i := range gots {
|
|
|
|
g := gots[i]
|
|
|
|
w := wants[i]
|
|
|
|
if g.EventID != w.EventID() {
|
|
|
|
t.Errorf("%s event[%d] event_id mismatch: got %s want %s", msg, i, g.EventID, w.EventID())
|
|
|
|
}
|
|
|
|
if g.Sender != w.Sender() {
|
|
|
|
t.Errorf("%s event[%d] sender mismatch: got %s want %s", msg, i, g.Sender, w.Sender())
|
|
|
|
}
|
|
|
|
if checkRoomID && g.RoomID != w.RoomID() {
|
|
|
|
t.Errorf("%s event[%d] room_id mismatch: got %s want %s", msg, i, g.RoomID, w.RoomID())
|
|
|
|
}
|
|
|
|
if g.Type != w.Type() {
|
|
|
|
t.Errorf("%s event[%d] event type mismatch: got %s want %s", msg, i, g.Type, w.Type())
|
|
|
|
}
|
|
|
|
if g.OriginServerTS != w.OriginServerTS() {
|
|
|
|
t.Errorf("%s event[%d] origin_server_ts mismatch: got %v want %v", msg, i, g.OriginServerTS, w.OriginServerTS())
|
|
|
|
}
|
|
|
|
if string(g.Content) != string(w.Content()) {
|
|
|
|
t.Errorf("%s event[%d] content mismatch: got %s want %s", msg, i, string(g.Content), string(w.Content()))
|
|
|
|
}
|
|
|
|
if string(g.Unsigned) != string(w.Unsigned()) {
|
|
|
|
t.Errorf("%s event[%d] unsigned mismatch: got %s want %s", msg, i, string(g.Unsigned), string(w.Unsigned()))
|
|
|
|
}
|
|
|
|
if (g.StateKey == nil && w.StateKey() != nil) || (g.StateKey != nil && w.StateKey() == nil) {
|
2020-05-01 12:01:34 +02:00
|
|
|
t.Errorf("%s event[%d] state_key [not] missing: got %v want %v", msg, i, g.StateKey, w.StateKey())
|
|
|
|
continue
|
2020-04-30 18:15:29 +02:00
|
|
|
}
|
|
|
|
if g.StateKey != nil {
|
|
|
|
if !w.StateKeyEquals(*g.StateKey) {
|
|
|
|
t.Errorf("%s event[%d] state_key mismatch: got %s want %s", msg, i, *g.StateKey, *w.StateKey())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-05-13 13:14:50 +02:00
|
|
|
func topologyTokenBefore(t *testing.T, db storage.Database, eventID string) *types.TopologyToken {
|
2020-05-14 18:30:16 +02:00
|
|
|
tok, err := db.EventPositionInTopology(ctx, eventID)
|
2020-05-01 17:41:13 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed to get EventPositionInTopology: %s", err)
|
|
|
|
}
|
2020-05-13 13:14:50 +02:00
|
|
|
tok.Decrement()
|
|
|
|
return &tok
|
2020-05-01 17:41:13 +02:00
|
|
|
}
|
2021-01-08 17:59:06 +01:00
|
|
|
*/
|