| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| |
|
| | use crate::codec::{Cookie, ErrorCode, Message, Namespace, NewRegistration, Registration, Ttl}; |
| | use crate::{MAX_TTL, MIN_TTL}; |
| | use bimap::BiMap; |
| | use futures::future::BoxFuture; |
| | use futures::stream::FuturesUnordered; |
| | use futures::{FutureExt, StreamExt}; |
| | use libp2p_core::transport::PortUse; |
| | use libp2p_core::{Endpoint, Multiaddr}; |
| | use libp2p_identity::PeerId; |
| | use libp2p_request_response::ProtocolSupport; |
| | use libp2p_swarm::behaviour::FromSwarm; |
| | use libp2p_swarm::{ |
| | ConnectionDenied, ConnectionId, NetworkBehaviour, THandler, THandlerInEvent, THandlerOutEvent, |
| | ToSwarm, |
| | }; |
| | use std::collections::{HashMap, HashSet}; |
| | use std::iter; |
| | use std::task::{ready, Context, Poll}; |
| | use std::time::Duration; |
| |
|
| | pub struct Behaviour { |
| | inner: libp2p_request_response::Behaviour<crate::codec::Codec>, |
| |
|
| | registrations: Registrations, |
| | } |
| |
|
| | pub struct Config { |
| | min_ttl: Ttl, |
| | max_ttl: Ttl, |
| | } |
| |
|
| | impl Config { |
| | pub fn with_min_ttl(mut self, min_ttl: Ttl) -> Self { |
| | self.min_ttl = min_ttl; |
| | self |
| | } |
| |
|
| | pub fn with_max_ttl(mut self, max_ttl: Ttl) -> Self { |
| | self.max_ttl = max_ttl; |
| | self |
| | } |
| | } |
| |
|
| | impl Default for Config { |
| | fn default() -> Self { |
| | Self { |
| | min_ttl: MIN_TTL, |
| | max_ttl: MAX_TTL, |
| | } |
| | } |
| | } |
| |
|
| | impl Behaviour { |
| | |
| | pub fn new(config: Config) -> Self { |
| | Self { |
| | inner: libp2p_request_response::Behaviour::with_codec( |
| | crate::codec::Codec::default(), |
| | iter::once((crate::PROTOCOL_IDENT, ProtocolSupport::Inbound)), |
| | libp2p_request_response::Config::default(), |
| | ), |
| |
|
| | registrations: Registrations::with_config(config), |
| | } |
| | } |
| | } |
| |
|
| | #[derive(Debug)] |
| | #[allow(clippy::large_enum_variant)] |
| | pub enum Event { |
| | |
| | DiscoverServed { |
| | enquirer: PeerId, |
| | registrations: Vec<Registration>, |
| | }, |
| | |
| | DiscoverNotServed { enquirer: PeerId, error: ErrorCode }, |
| | |
| | PeerRegistered { |
| | peer: PeerId, |
| | registration: Registration, |
| | }, |
| | |
| | PeerNotRegistered { |
| | peer: PeerId, |
| | namespace: Namespace, |
| | error: ErrorCode, |
| | }, |
| | |
| | PeerUnregistered { peer: PeerId, namespace: Namespace }, |
| | |
| | RegistrationExpired(Registration), |
| | } |
| |
|
| | impl NetworkBehaviour for Behaviour { |
| | type ConnectionHandler = <libp2p_request_response::Behaviour< |
| | crate::codec::Codec, |
| | > as NetworkBehaviour>::ConnectionHandler; |
| |
|
| | type ToSwarm = Event; |
| |
|
| | fn handle_established_inbound_connection( |
| | &mut self, |
| | connection_id: ConnectionId, |
| | peer: PeerId, |
| | local_addr: &Multiaddr, |
| | remote_addr: &Multiaddr, |
| | ) -> Result<THandler<Self>, ConnectionDenied> { |
| | self.inner.handle_established_inbound_connection( |
| | connection_id, |
| | peer, |
| | local_addr, |
| | remote_addr, |
| | ) |
| | } |
| |
|
| | fn handle_established_outbound_connection( |
| | &mut self, |
| | connection_id: ConnectionId, |
| | peer: PeerId, |
| | addr: &Multiaddr, |
| | role_override: Endpoint, |
| | port_use: PortUse, |
| | ) -> Result<THandler<Self>, ConnectionDenied> { |
| | self.inner.handle_established_outbound_connection( |
| | connection_id, |
| | peer, |
| | addr, |
| | role_override, |
| | port_use, |
| | ) |
| | } |
| |
|
| | fn on_connection_handler_event( |
| | &mut self, |
| | peer_id: PeerId, |
| | connection: ConnectionId, |
| | event: THandlerOutEvent<Self>, |
| | ) { |
| | self.inner |
| | .on_connection_handler_event(peer_id, connection, event); |
| | } |
| |
|
| | #[tracing::instrument(level = "trace", name = "NetworkBehaviour::poll", skip(self, cx))] |
| | fn poll( |
| | &mut self, |
| | cx: &mut Context<'_>, |
| | ) -> Poll<ToSwarm<Self::ToSwarm, THandlerInEvent<Self>>> { |
| | if let Poll::Ready(ExpiredRegistration(registration)) = self.registrations.poll(cx) { |
| | return Poll::Ready(ToSwarm::GenerateEvent(Event::RegistrationExpired( |
| | registration, |
| | ))); |
| | } |
| |
|
| | loop { |
| | if let Poll::Ready(to_swarm) = self.inner.poll(cx) { |
| | match to_swarm { |
| | ToSwarm::GenerateEvent(libp2p_request_response::Event::Message { |
| | peer: peer_id, |
| | message: |
| | libp2p_request_response::Message::Request { |
| | request, channel, .. |
| | }, |
| | }) => { |
| | if let Some((event, response)) = |
| | handle_request(peer_id, request, &mut self.registrations) |
| | { |
| | if let Some(resp) = response { |
| | self.inner |
| | .send_response(channel, resp) |
| | .expect("Send response"); |
| | } |
| |
|
| | return Poll::Ready(ToSwarm::GenerateEvent(event)); |
| | } |
| |
|
| | continue; |
| | } |
| | ToSwarm::GenerateEvent(libp2p_request_response::Event::InboundFailure { |
| | peer, |
| | request_id, |
| | error, |
| | }) => { |
| | tracing::warn!( |
| | %peer, |
| | request=%request_id, |
| | "Inbound request with peer failed: {error}" |
| | ); |
| |
|
| | continue; |
| | } |
| | ToSwarm::GenerateEvent(libp2p_request_response::Event::ResponseSent { |
| | .. |
| | }) |
| | | ToSwarm::GenerateEvent(libp2p_request_response::Event::Message { |
| | peer: _, |
| | message: libp2p_request_response::Message::Response { .. }, |
| | }) |
| | | ToSwarm::GenerateEvent(libp2p_request_response::Event::OutboundFailure { |
| | .. |
| | }) => { |
| | continue; |
| | } |
| | other => { |
| | let new_to_swarm = other |
| | .map_out(|_| unreachable!("we manually map `GenerateEvent` variants")); |
| |
|
| | return Poll::Ready(new_to_swarm); |
| | } |
| | }; |
| | } |
| |
|
| | return Poll::Pending; |
| | } |
| | } |
| |
|
| | fn on_swarm_event(&mut self, event: FromSwarm) { |
| | self.inner.on_swarm_event(event); |
| | } |
| | } |
| |
|
| | fn handle_request( |
| | peer_id: PeerId, |
| | message: Message, |
| | registrations: &mut Registrations, |
| | ) -> Option<(Event, Option<Message>)> { |
| | match message { |
| | Message::Register(registration) => { |
| | if registration.record.peer_id() != peer_id { |
| | let error = ErrorCode::NotAuthorized; |
| |
|
| | let event = Event::PeerNotRegistered { |
| | peer: peer_id, |
| | namespace: registration.namespace, |
| | error, |
| | }; |
| |
|
| | return Some((event, Some(Message::RegisterResponse(Err(error))))); |
| | } |
| |
|
| | let namespace = registration.namespace.clone(); |
| |
|
| | match registrations.add(registration) { |
| | Ok(registration) => { |
| | let response = Message::RegisterResponse(Ok(registration.ttl)); |
| |
|
| | let event = Event::PeerRegistered { |
| | peer: peer_id, |
| | registration, |
| | }; |
| |
|
| | Some((event, Some(response))) |
| | } |
| | Err(TtlOutOfRange::TooLong { .. }) | Err(TtlOutOfRange::TooShort { .. }) => { |
| | let error = ErrorCode::InvalidTtl; |
| |
|
| | let response = Message::RegisterResponse(Err(error)); |
| |
|
| | let event = Event::PeerNotRegistered { |
| | peer: peer_id, |
| | namespace, |
| | error, |
| | }; |
| |
|
| | Some((event, Some(response))) |
| | } |
| | } |
| | } |
| | Message::Unregister(namespace) => { |
| | registrations.remove(namespace.clone(), peer_id); |
| |
|
| | let event = Event::PeerUnregistered { |
| | peer: peer_id, |
| | namespace, |
| | }; |
| |
|
| | Some((event, None)) |
| | } |
| | Message::Discover { |
| | namespace, |
| | cookie, |
| | limit, |
| | } => match registrations.get(namespace, cookie, limit) { |
| | Ok((registrations, cookie)) => { |
| | let discovered = registrations.cloned().collect::<Vec<_>>(); |
| |
|
| | let response = Message::DiscoverResponse(Ok((discovered.clone(), cookie))); |
| |
|
| | let event = Event::DiscoverServed { |
| | enquirer: peer_id, |
| | registrations: discovered, |
| | }; |
| |
|
| | Some((event, Some(response))) |
| | } |
| | Err(_) => { |
| | let error = ErrorCode::InvalidCookie; |
| |
|
| | let response = Message::DiscoverResponse(Err(error)); |
| |
|
| | let event = Event::DiscoverNotServed { |
| | enquirer: peer_id, |
| | error, |
| | }; |
| |
|
| | Some((event, Some(response))) |
| | } |
| | }, |
| | Message::RegisterResponse(_) => None, |
| | Message::DiscoverResponse(_) => None, |
| | } |
| | } |
| |
|
| | #[derive(Debug, Eq, PartialEq, Hash, Copy, Clone)] |
| | struct RegistrationId(u64); |
| |
|
| | impl RegistrationId { |
| | fn new() -> Self { |
| | Self(rand::random()) |
| | } |
| | } |
| |
|
| | #[derive(Debug, PartialEq)] |
| | struct ExpiredRegistration(Registration); |
| |
|
| | pub struct Registrations { |
| | registrations_for_peer: BiMap<(PeerId, Namespace), RegistrationId>, |
| | registrations: HashMap<RegistrationId, Registration>, |
| | cookies: HashMap<Cookie, HashSet<RegistrationId>>, |
| | min_ttl: Ttl, |
| | max_ttl: Ttl, |
| | next_expiry: FuturesUnordered<BoxFuture<'static, RegistrationId>>, |
| | } |
| |
|
| | #[derive(Debug, thiserror::Error)] |
| | pub enum TtlOutOfRange { |
| | #[error("Requested TTL ({requested}s) is too long; max {bound}s")] |
| | TooLong { bound: Ttl, requested: Ttl }, |
| | #[error("Requested TTL ({requested}s) is too short; min {bound}s")] |
| | TooShort { bound: Ttl, requested: Ttl }, |
| | } |
| |
|
| | impl Default for Registrations { |
| | fn default() -> Self { |
| | Registrations::with_config(Config::default()) |
| | } |
| | } |
| |
|
| | impl Registrations { |
| | pub fn with_config(config: Config) -> Self { |
| | Self { |
| | registrations_for_peer: Default::default(), |
| | registrations: Default::default(), |
| | min_ttl: config.min_ttl, |
| | max_ttl: config.max_ttl, |
| | cookies: Default::default(), |
| | next_expiry: FuturesUnordered::from_iter(vec![futures::future::pending().boxed()]), |
| | } |
| | } |
| |
|
| | pub fn add( |
| | &mut self, |
| | new_registration: NewRegistration, |
| | ) -> Result<Registration, TtlOutOfRange> { |
| | let ttl = new_registration.effective_ttl(); |
| | if ttl > self.max_ttl { |
| | return Err(TtlOutOfRange::TooLong { |
| | bound: self.max_ttl, |
| | requested: ttl, |
| | }); |
| | } |
| | if ttl < self.min_ttl { |
| | return Err(TtlOutOfRange::TooShort { |
| | bound: self.min_ttl, |
| | requested: ttl, |
| | }); |
| | } |
| |
|
| | let namespace = new_registration.namespace; |
| | let registration_id = RegistrationId::new(); |
| |
|
| | if let Some(old_registration) = self |
| | .registrations_for_peer |
| | .get_by_left(&(new_registration.record.peer_id(), namespace.clone())) |
| | { |
| | self.registrations.remove(old_registration); |
| | } |
| |
|
| | self.registrations_for_peer.insert( |
| | (new_registration.record.peer_id(), namespace.clone()), |
| | registration_id, |
| | ); |
| |
|
| | let registration = Registration { |
| | namespace, |
| | record: new_registration.record, |
| | ttl, |
| | }; |
| | self.registrations |
| | .insert(registration_id, registration.clone()); |
| |
|
| | let next_expiry = futures_timer::Delay::new(Duration::from_secs(ttl)) |
| | .map(move |_| registration_id) |
| | .boxed(); |
| |
|
| | self.next_expiry.push(next_expiry); |
| |
|
| | Ok(registration) |
| | } |
| |
|
| | pub fn remove(&mut self, namespace: Namespace, peer_id: PeerId) { |
| | let reggo_to_remove = self |
| | .registrations_for_peer |
| | .remove_by_left(&(peer_id, namespace)); |
| |
|
| | if let Some((_, reggo_to_remove)) = reggo_to_remove { |
| | self.registrations.remove(®go_to_remove); |
| | } |
| | } |
| |
|
| | pub fn get( |
| | &mut self, |
| | discover_namespace: Option<Namespace>, |
| | cookie: Option<Cookie>, |
| | limit: Option<u64>, |
| | ) -> Result<(impl Iterator<Item = &Registration> + '_, Cookie), CookieNamespaceMismatch> { |
| | let cookie_namespace = cookie.as_ref().and_then(|cookie| cookie.namespace()); |
| |
|
| | match (discover_namespace.as_ref(), cookie_namespace) { |
| | |
| | (None, Some(_)) => return Err(CookieNamespaceMismatch), |
| | |
| | (Some(namespace), Some(cookie_namespace)) if namespace != cookie_namespace => { |
| | return Err(CookieNamespaceMismatch) |
| | } |
| | |
| | _ => {} |
| | } |
| |
|
| | let mut reggos_of_last_discover = cookie |
| | .and_then(|cookie| self.cookies.get(&cookie)) |
| | .cloned() |
| | .unwrap_or_default(); |
| |
|
| | let ids = self |
| | .registrations_for_peer |
| | .iter() |
| | .filter_map({ |
| | |((_, namespace), registration_id)| { |
| | if reggos_of_last_discover.contains(registration_id) { |
| | return None; |
| | } |
| |
|
| | match discover_namespace.as_ref() { |
| | Some(discover_namespace) if discover_namespace == namespace => { |
| | Some(registration_id) |
| | } |
| | Some(_) => None, |
| | None => Some(registration_id), |
| | } |
| | } |
| | }) |
| | .take(limit.unwrap_or(u64::MAX) as usize) |
| | .cloned() |
| | .collect::<Vec<_>>(); |
| |
|
| | reggos_of_last_discover.extend(&ids); |
| |
|
| | let new_cookie = discover_namespace |
| | .map(Cookie::for_namespace) |
| | .unwrap_or_else(Cookie::for_all_namespaces); |
| | self.cookies |
| | .insert(new_cookie.clone(), reggos_of_last_discover); |
| |
|
| | let regs = &self.registrations; |
| | let registrations = ids |
| | .into_iter() |
| | .map(move |id| regs.get(&id).expect("bad internal data structure")); |
| |
|
| | Ok((registrations, new_cookie)) |
| | } |
| |
|
| | fn poll(&mut self, cx: &mut Context<'_>) -> Poll<ExpiredRegistration> { |
| | loop { |
| | let expired_registration = ready!(self.next_expiry.poll_next_unpin(cx)).expect( |
| | "This stream should never finish because it is initialised with a pending future", |
| | ); |
| |
|
| | |
| | self.cookies.retain(|_, registrations| { |
| | registrations.remove(&expired_registration); |
| |
|
| | |
| | !registrations.is_empty() |
| | }); |
| |
|
| | self.registrations_for_peer |
| | .remove_by_right(&expired_registration); |
| | match self.registrations.remove(&expired_registration) { |
| | None => { |
| | continue; |
| | } |
| | Some(registration) => { |
| | return Poll::Ready(ExpiredRegistration(registration)); |
| | } |
| | } |
| | } |
| | } |
| | } |
| |
|
| | #[derive(Debug, thiserror::Error, Eq, PartialEq)] |
| | #[error("The provided cookie is not valid for a DISCOVER request for the given namespace")] |
| | pub struct CookieNamespaceMismatch; |
| |
|
| | #[cfg(test)] |
| | mod tests { |
| | use web_time::SystemTime; |
| |
|
| | use libp2p_core::PeerRecord; |
| | use libp2p_identity as identity; |
| |
|
| | use super::*; |
| |
|
| | #[test] |
| | fn given_cookie_from_discover_when_discover_again_then_only_get_diff() { |
| | let mut registrations = Registrations::default(); |
| | registrations.add(new_dummy_registration("foo")).unwrap(); |
| | registrations.add(new_dummy_registration("foo")).unwrap(); |
| |
|
| | let (initial_discover, cookie) = registrations.get(None, None, None).unwrap(); |
| | assert_eq!(initial_discover.count(), 2); |
| |
|
| | let (subsequent_discover, _) = registrations.get(None, Some(cookie), None).unwrap(); |
| | assert_eq!(subsequent_discover.count(), 0); |
| | } |
| |
|
| | #[test] |
| | fn given_registrations_when_discover_all_then_all_are_returned() { |
| | let mut registrations = Registrations::default(); |
| | registrations.add(new_dummy_registration("foo")).unwrap(); |
| | registrations.add(new_dummy_registration("foo")).unwrap(); |
| |
|
| | let (discover, _) = registrations.get(None, None, None).unwrap(); |
| |
|
| | assert_eq!(discover.count(), 2); |
| | } |
| |
|
| | #[test] |
| | fn given_registrations_when_discover_only_for_specific_namespace_then_only_those_are_returned() |
| | { |
| | let mut registrations = Registrations::default(); |
| | registrations.add(new_dummy_registration("foo")).unwrap(); |
| | registrations.add(new_dummy_registration("bar")).unwrap(); |
| |
|
| | let (discover, _) = registrations |
| | .get(Some(Namespace::from_static("foo")), None, None) |
| | .unwrap(); |
| |
|
| | assert_eq!( |
| | discover.map(|r| &r.namespace).collect::<Vec<_>>(), |
| | vec!["foo"] |
| | ); |
| | } |
| |
|
| | #[test] |
| | fn given_reregistration_old_registration_is_discarded() { |
| | let alice = identity::Keypair::generate_ed25519(); |
| | let mut registrations = Registrations::default(); |
| | registrations |
| | .add(new_registration("foo", alice.clone(), None)) |
| | .unwrap(); |
| | registrations |
| | .add(new_registration("foo", alice, None)) |
| | .unwrap(); |
| |
|
| | let (discover, _) = registrations |
| | .get(Some(Namespace::from_static("foo")), None, None) |
| | .unwrap(); |
| |
|
| | assert_eq!( |
| | discover.map(|r| &r.namespace).collect::<Vec<_>>(), |
| | vec!["foo"] |
| | ); |
| | } |
| |
|
| | #[test] |
| | fn given_cookie_from_2nd_discover_does_not_return_nodes_from_first_discover() { |
| | let mut registrations = Registrations::default(); |
| | registrations.add(new_dummy_registration("foo")).unwrap(); |
| | registrations.add(new_dummy_registration("foo")).unwrap(); |
| |
|
| | let (initial_discover, cookie1) = registrations.get(None, None, None).unwrap(); |
| | assert_eq!(initial_discover.count(), 2); |
| |
|
| | let (subsequent_discover, cookie2) = registrations.get(None, Some(cookie1), None).unwrap(); |
| | assert_eq!(subsequent_discover.count(), 0); |
| |
|
| | let (subsequent_discover, _) = registrations.get(None, Some(cookie2), None).unwrap(); |
| | assert_eq!(subsequent_discover.count(), 0); |
| | } |
| |
|
| | #[test] |
| | fn cookie_from_different_discover_request_is_not_valid() { |
| | let mut registrations = Registrations::default(); |
| | registrations.add(new_dummy_registration("foo")).unwrap(); |
| | registrations.add(new_dummy_registration("bar")).unwrap(); |
| |
|
| | let (_, foo_discover_cookie) = registrations |
| | .get(Some(Namespace::from_static("foo")), None, None) |
| | .unwrap(); |
| | let result = registrations.get( |
| | Some(Namespace::from_static("bar")), |
| | Some(foo_discover_cookie), |
| | None, |
| | ); |
| |
|
| | assert!(matches!(result, Err(CookieNamespaceMismatch))) |
| | } |
| |
|
| | #[tokio::test] |
| | async fn given_two_registration_ttls_one_expires_one_lives() { |
| | let mut registrations = Registrations::with_config(Config { |
| | min_ttl: 0, |
| | max_ttl: 4, |
| | }); |
| |
|
| | let start_time = SystemTime::now(); |
| |
|
| | registrations |
| | .add(new_dummy_registration_with_ttl("foo", 1)) |
| | .unwrap(); |
| | registrations |
| | .add(new_dummy_registration_with_ttl("bar", 4)) |
| | .unwrap(); |
| |
|
| | let event = registrations.next_event().await; |
| |
|
| | let elapsed = start_time.elapsed().unwrap(); |
| | assert!(elapsed.as_secs() >= 1); |
| | assert!(elapsed.as_secs() < 2); |
| |
|
| | assert_eq!(event.0.namespace, Namespace::from_static("foo")); |
| |
|
| | { |
| | let (mut discovered_foo, _) = registrations |
| | .get(Some(Namespace::from_static("foo")), None, None) |
| | .unwrap(); |
| | assert!(discovered_foo.next().is_none()); |
| | } |
| | let (mut discovered_bar, _) = registrations |
| | .get(Some(Namespace::from_static("bar")), None, None) |
| | .unwrap(); |
| | assert!(discovered_bar.next().is_some()); |
| | } |
| |
|
| | #[tokio::test] |
| | async fn given_peer_unregisters_before_expiry_do_not_emit_registration_expired() { |
| | let mut registrations = Registrations::with_config(Config { |
| | min_ttl: 1, |
| | max_ttl: 10, |
| | }); |
| | let dummy_registration = new_dummy_registration_with_ttl("foo", 2); |
| | let namespace = dummy_registration.namespace.clone(); |
| | let peer_id = dummy_registration.record.peer_id(); |
| |
|
| | registrations.add(dummy_registration).unwrap(); |
| | registrations.no_event_for(1).await; |
| | registrations.remove(namespace, peer_id); |
| |
|
| | registrations.no_event_for(3).await |
| | } |
| |
|
| | |
| | |
| | |
| | |
| | #[tokio::test] |
| | async fn given_all_registrations_expired_then_successfully_handle_new_registration_and_expiry() |
| | { |
| | let mut registrations = Registrations::with_config(Config { |
| | min_ttl: 0, |
| | max_ttl: 10, |
| | }); |
| | let dummy_registration = new_dummy_registration_with_ttl("foo", 1); |
| |
|
| | registrations.add(dummy_registration.clone()).unwrap(); |
| | let _ = registrations.next_event_in_at_most(2).await; |
| |
|
| | registrations.no_event_for(1).await; |
| |
|
| | registrations.add(dummy_registration).unwrap(); |
| | let _ = registrations.next_event_in_at_most(2).await; |
| | } |
| |
|
| | #[tokio::test] |
| | async fn cookies_are_cleaned_up_if_registrations_expire() { |
| | let mut registrations = Registrations::with_config(Config { |
| | min_ttl: 1, |
| | max_ttl: 10, |
| | }); |
| |
|
| | registrations |
| | .add(new_dummy_registration_with_ttl("foo", 2)) |
| | .unwrap(); |
| | let (_, _) = registrations.get(None, None, None).unwrap(); |
| |
|
| | assert_eq!(registrations.cookies.len(), 1); |
| |
|
| | let _ = registrations.next_event_in_at_most(3).await; |
| |
|
| | assert_eq!(registrations.cookies.len(), 0); |
| | } |
| |
|
| | #[test] |
| | fn given_limit_discover_only_returns_n_results() { |
| | let mut registrations = Registrations::default(); |
| | registrations.add(new_dummy_registration("foo")).unwrap(); |
| | registrations.add(new_dummy_registration("foo")).unwrap(); |
| |
|
| | let (registrations, _) = registrations.get(None, None, Some(1)).unwrap(); |
| |
|
| | assert_eq!(registrations.count(), 1); |
| | } |
| |
|
| | #[test] |
| | fn given_limit_cookie_can_be_used_for_pagination() { |
| | let mut registrations = Registrations::default(); |
| | registrations.add(new_dummy_registration("foo")).unwrap(); |
| | registrations.add(new_dummy_registration("foo")).unwrap(); |
| |
|
| | let (discover1, cookie) = registrations.get(None, None, Some(1)).unwrap(); |
| | assert_eq!(discover1.count(), 1); |
| |
|
| | let (discover2, _) = registrations.get(None, Some(cookie), None).unwrap(); |
| | assert_eq!(discover2.count(), 1); |
| | } |
| |
|
| | fn new_dummy_registration(namespace: &'static str) -> NewRegistration { |
| | let identity = identity::Keypair::generate_ed25519(); |
| |
|
| | new_registration(namespace, identity, None) |
| | } |
| |
|
| | fn new_dummy_registration_with_ttl(namespace: &'static str, ttl: Ttl) -> NewRegistration { |
| | let identity = identity::Keypair::generate_ed25519(); |
| |
|
| | new_registration(namespace, identity, Some(ttl)) |
| | } |
| |
|
| | fn new_registration( |
| | namespace: &'static str, |
| | identity: identity::Keypair, |
| | ttl: Option<Ttl>, |
| | ) -> NewRegistration { |
| | NewRegistration::new( |
| | Namespace::from_static(namespace), |
| | PeerRecord::new(&identity, vec!["/ip4/127.0.0.1/tcp/1234".parse().unwrap()]).unwrap(), |
| | ttl, |
| | ) |
| | } |
| |
|
| | |
| | impl Registrations { |
| | async fn next_event(&mut self) -> ExpiredRegistration { |
| | futures::future::poll_fn(|cx| self.poll(cx)).await |
| | } |
| |
|
| | |
| | async fn no_event_for(&mut self, seconds: u64) { |
| | tokio::time::timeout(Duration::from_secs(seconds), self.next_event()) |
| | .await |
| | .unwrap_err(); |
| | } |
| |
|
| | |
| | async fn next_event_in_at_most(&mut self, seconds: u64) -> ExpiredRegistration { |
| | tokio::time::timeout(Duration::from_secs(seconds), self.next_event()) |
| | .await |
| | .unwrap() |
| | } |
| | } |
| | } |
| |
|