modest cleanup of snake sync service related

Signed-off-by: Jason Volk <jason@zemos.net>
This commit is contained in:
Jason Volk 2025-04-06 20:30:15 +00:00 committed by Jade Ellis
parent e7c3f78377
commit 05e65936fa
No known key found for this signature in database
GPG key ID: 8705A2A3EBF77BD2
3 changed files with 143 additions and 200 deletions

View file

@ -6,22 +6,23 @@ use std::{
use axum::extract::State; use axum::extract::State;
use conduwuit::{ use conduwuit::{
Error, PduCount, PduEvent, Result, debug, error, extract_variant, Err, Error, PduCount, PduEvent, Result, debug, error, extract_variant,
utils::{ utils::{
BoolExt, IterStream, ReadyExt, TryFutureExtExt, BoolExt, IterStream, ReadyExt, TryFutureExtExt,
math::{ruma_from_usize, usize_from_ruma, usize_from_u64_truncated}, math::{ruma_from_usize, usize_from_ruma, usize_from_u64_truncated},
}, },
warn, warn,
}; };
use conduwuit_service::{
rooms::read_receipt::pack_receipts,
sync::{into_db_key, into_snake_key},
};
use futures::{FutureExt, StreamExt, TryFutureExt}; use futures::{FutureExt, StreamExt, TryFutureExt};
use ruma::{ use ruma::{
MilliSecondsSinceUnixEpoch, OwnedEventId, OwnedRoomId, RoomId, UInt, UserId, MilliSecondsSinceUnixEpoch, OwnedEventId, OwnedRoomId, RoomId, UInt, UserId,
api::client::{ api::client::sync::sync_events::{
error::ErrorKind, self, DeviceLists, UnreadNotificationsCount,
sync::sync_events::{ v4::{SlidingOp, SlidingSyncRoomHero},
self, DeviceLists, UnreadNotificationsCount,
v4::{SlidingOp, SlidingSyncRoomHero},
},
}, },
events::{ events::{
AnyRawAccountDataEvent, AnySyncEphemeralRoomEvent, StateEventType, AnyRawAccountDataEvent, AnySyncEphemeralRoomEvent, StateEventType,
@ -31,7 +32,6 @@ use ruma::{
serde::Raw, serde::Raw,
uint, uint,
}; };
use service::rooms::read_receipt::pack_receipts;
use super::{load_timeline, share_encrypted_room}; use super::{load_timeline, share_encrypted_room};
use crate::{ use crate::{
@ -50,10 +50,11 @@ pub(crate) async fn sync_events_v4_route(
) -> Result<sync_events::v4::Response> { ) -> Result<sync_events::v4::Response> {
debug_assert!(DEFAULT_BUMP_TYPES.is_sorted(), "DEFAULT_BUMP_TYPES is not sorted"); debug_assert!(DEFAULT_BUMP_TYPES.is_sorted(), "DEFAULT_BUMP_TYPES is not sorted");
let sender_user = body.sender_user.as_ref().expect("user is authenticated"); let sender_user = body.sender_user.as_ref().expect("user is authenticated");
let sender_device = body.sender_device.expect("user is authenticated"); let sender_device = body.sender_device.as_ref().expect("user is authenticated");
let mut body = body.body; let mut body = body.body;
// Setup watchers, so if there's no response, we can wait for them // Setup watchers, so if there's no response, we can wait for them
let watcher = services.sync.watch(sender_user, &sender_device); let watcher = services.sync.watch(sender_user, sender_device);
let next_batch = services.globals.next_count()?; let next_batch = services.globals.next_count()?;
@ -68,33 +69,21 @@ pub(crate) async fn sync_events_v4_route(
.and_then(|string| string.parse().ok()) .and_then(|string| string.parse().ok())
.unwrap_or(0); .unwrap_or(0);
if globalsince != 0 let db_key = into_db_key(sender_user, sender_device, conn_id.clone());
&& !services if globalsince != 0 && !services.sync.remembered(&db_key) {
.sync
.remembered(sender_user.clone(), sender_device.clone(), conn_id.clone())
{
debug!("Restarting sync stream because it was gone from the database"); debug!("Restarting sync stream because it was gone from the database");
return Err(Error::Request( return Err!(Request(UnknownPos("Connection data lost since last time")));
ErrorKind::UnknownPos,
"Connection data lost since last time".into(),
http::StatusCode::BAD_REQUEST,
));
} }
if globalsince == 0 { if globalsince == 0 {
services.sync.forget_sync_request_connection( services.sync.forget_sync_request_connection(&db_key);
sender_user.clone(),
sender_device.clone(),
conn_id.clone(),
);
} }
// Get sticky parameters from cache // Get sticky parameters from cache
let known_rooms = services.sync.update_sync_request_with_cache( let snake_key = into_snake_key(sender_user, sender_device, conn_id.clone());
sender_user.clone(), let known_rooms = services
sender_device.clone(), .sync
&mut body, .update_sync_request_with_cache(&snake_key, &mut body);
);
let all_joined_rooms: Vec<_> = services let all_joined_rooms: Vec<_> = services
.rooms .rooms
@ -136,7 +125,7 @@ pub(crate) async fn sync_events_v4_route(
if body.extensions.to_device.enabled.unwrap_or(false) { if body.extensions.to_device.enabled.unwrap_or(false) {
services services
.users .users
.remove_to_device_events(sender_user, &sender_device, globalsince) .remove_to_device_events(sender_user, sender_device, globalsince)
.await; .await;
} }
@ -261,7 +250,7 @@ pub(crate) async fn sync_events_v4_route(
if let Some(Ok(user_id)) = if let Some(Ok(user_id)) =
pdu.state_key.as_deref().map(UserId::parse) pdu.state_key.as_deref().map(UserId::parse)
{ {
if user_id == *sender_user { if user_id == sender_user {
continue; continue;
} }
@ -299,7 +288,7 @@ pub(crate) async fn sync_events_v4_route(
.state_cache .state_cache
.room_members(room_id) .room_members(room_id)
// Don't send key updates from the sender to the sender // Don't send key updates from the sender to the sender
.ready_filter(|user_id| sender_user != user_id) .ready_filter(|&user_id| sender_user != user_id)
// Only send keys if the sender doesn't share an encrypted room with the target // Only send keys if the sender doesn't share an encrypted room with the target
// already // already
.filter_map(|user_id| { .filter_map(|user_id| {
@ -425,10 +414,9 @@ pub(crate) async fn sync_events_v4_route(
}); });
if let Some(conn_id) = &body.conn_id { if let Some(conn_id) = &body.conn_id {
let db_key = into_db_key(sender_user, sender_device, conn_id);
services.sync.update_sync_known_rooms( services.sync.update_sync_known_rooms(
sender_user, &db_key,
&sender_device,
conn_id.clone(),
list_id.clone(), list_id.clone(),
new_known_rooms, new_known_rooms,
globalsince, globalsince,
@ -478,23 +466,20 @@ pub(crate) async fn sync_events_v4_route(
} }
if let Some(conn_id) = &body.conn_id { if let Some(conn_id) = &body.conn_id {
let db_key = into_db_key(sender_user, sender_device, conn_id);
services.sync.update_sync_known_rooms( services.sync.update_sync_known_rooms(
sender_user, &db_key,
&sender_device,
conn_id.clone(),
"subscriptions".to_owned(), "subscriptions".to_owned(),
known_subscription_rooms, known_subscription_rooms,
globalsince, globalsince,
); );
} }
if let Some(conn_id) = &body.conn_id { if let Some(conn_id) = body.conn_id.clone() {
services.sync.update_sync_subscriptions( let db_key = into_db_key(sender_user, sender_device, conn_id);
sender_user.clone(), services
sender_device.clone(), .sync
conn_id.clone(), .update_sync_subscriptions(&db_key, body.room_subscriptions);
body.room_subscriptions,
);
} }
let mut rooms = BTreeMap::new(); let mut rooms = BTreeMap::new();
@ -648,7 +633,7 @@ pub(crate) async fn sync_events_v4_route(
.rooms .rooms
.state_cache .state_cache
.room_members(room_id) .room_members(room_id)
.ready_filter(|member| member != sender_user) .ready_filter(|&member| member != sender_user)
.filter_map(|user_id| { .filter_map(|user_id| {
services services
.rooms .rooms
@ -787,7 +772,7 @@ pub(crate) async fn sync_events_v4_route(
.users .users
.get_to_device_events( .get_to_device_events(
sender_user, sender_user,
&sender_device, sender_device,
Some(globalsince), Some(globalsince),
Some(next_batch), Some(next_batch),
) )
@ -805,7 +790,7 @@ pub(crate) async fn sync_events_v4_route(
}, },
device_one_time_keys_count: services device_one_time_keys_count: services
.users .users
.count_one_time_keys(sender_user, &sender_device) .count_one_time_keys(sender_user, sender_device)
.await, .await,
// Fallback keys are not yet supported // Fallback keys are not yet supported
device_unused_fallback_key_types: None, device_unused_fallback_key_types: None,

View file

@ -6,7 +6,7 @@ use std::{
use axum::extract::State; use axum::extract::State;
use conduwuit::{ use conduwuit::{
Error, Result, debug, error, extract_variant, Err, Error, Result, error, extract_variant,
matrix::{ matrix::{
TypeStateKey, TypeStateKey,
pdu::{PduCount, PduEvent}, pdu::{PduCount, PduEvent},
@ -18,14 +18,11 @@ use conduwuit::{
}, },
warn, warn,
}; };
use conduwuit_service::rooms::read_receipt::pack_receipts; use conduwuit_service::{rooms::read_receipt::pack_receipts, sync::into_snake_key};
use futures::{FutureExt, StreamExt, TryFutureExt}; use futures::{FutureExt, StreamExt, TryFutureExt};
use ruma::{ use ruma::{
DeviceId, OwnedEventId, OwnedRoomId, RoomId, UInt, UserId, DeviceId, OwnedEventId, OwnedRoomId, RoomId, UInt, UserId,
api::client::{ api::client::sync::sync_events::{self, DeviceLists, UnreadNotificationsCount},
error::ErrorKind,
sync::sync_events::{self, DeviceLists, UnreadNotificationsCount},
},
events::{ events::{
AnyRawAccountDataEvent, AnySyncEphemeralRoomEvent, StateEventType, TimelineEventType, AnyRawAccountDataEvent, AnySyncEphemeralRoomEvent, StateEventType, TimelineEventType,
room::member::{MembershipState, RoomMemberEventContent}, room::member::{MembershipState, RoomMemberEventContent},
@ -74,35 +71,23 @@ pub(crate) async fn sync_events_v5_route(
.and_then(|string| string.parse().ok()) .and_then(|string| string.parse().ok())
.unwrap_or(0); .unwrap_or(0);
if globalsince != 0 let snake_key = into_snake_key(sender_user, sender_device, conn_id);
&& !services.sync.snake_connection_cached(
sender_user.clone(), if globalsince != 0 && !services.sync.snake_connection_cached(&snake_key) {
sender_device.clone(), return Err!(Request(UnknownPos(
conn_id.clone(), "Connection data unknown to server; restarting sync stream."
) { )));
debug!("Restarting sync stream because it was gone from the database");
return Err(Error::Request(
ErrorKind::UnknownPos,
"Connection data lost since last time".into(),
http::StatusCode::BAD_REQUEST,
));
} }
// Client / User requested an initial sync // Client / User requested an initial sync
if globalsince == 0 { if globalsince == 0 {
services.sync.forget_snake_sync_connection( services.sync.forget_snake_sync_connection(&snake_key);
sender_user.clone(),
sender_device.clone(),
conn_id.clone(),
);
} }
// Get sticky parameters from cache // Get sticky parameters from cache
let known_rooms = services.sync.update_snake_sync_request_with_cache( let known_rooms = services
sender_user.clone(), .sync
sender_device.clone(), .update_snake_sync_request_with_cache(&snake_key, &mut body);
&mut body,
);
let all_joined_rooms: Vec<_> = services let all_joined_rooms: Vec<_> = services
.rooms .rooms
@ -254,11 +239,10 @@ async fn fetch_subscriptions(
// body.room_subscriptions.remove(&r); // body.room_subscriptions.remove(&r);
//} //}
if let Some(conn_id) = &body.conn_id { if let Some(conn_id) = body.conn_id.clone() {
let snake_key = into_snake_key(sender_user, sender_device, conn_id);
services.sync.update_snake_sync_known_rooms( services.sync.update_snake_sync_known_rooms(
sender_user, &snake_key,
sender_device,
conn_id.clone(),
"subscriptions".to_owned(), "subscriptions".to_owned(),
known_subscription_rooms, known_subscription_rooms,
globalsince, globalsince,
@ -340,11 +324,10 @@ async fn handle_lists<'a>(
count: ruma_from_usize(active_rooms.len()), count: ruma_from_usize(active_rooms.len()),
}); });
if let Some(conn_id) = &body.conn_id { if let Some(conn_id) = body.conn_id.clone() {
let snake_key = into_snake_key(sender_user, sender_device, conn_id);
services.sync.update_snake_sync_known_rooms( services.sync.update_snake_sync_known_rooms(
sender_user, &snake_key,
sender_device,
conn_id.clone(),
list_id.clone(), list_id.clone(),
new_known_rooms, new_known_rooms,
globalsince, globalsince,

View file

@ -8,7 +8,7 @@ use std::{
use conduwuit::{Result, Server}; use conduwuit::{Result, Server};
use database::Map; use database::Map;
use ruma::{ use ruma::{
DeviceId, OwnedDeviceId, OwnedRoomId, OwnedUserId, UserId, OwnedDeviceId, OwnedRoomId, OwnedUserId,
api::client::sync::sync_events::{ api::client::sync::sync_events::{
self, self,
v4::{ExtensionsConfig, SyncRequestList}, v4::{ExtensionsConfig, SyncRequestList},
@ -49,8 +49,8 @@ struct Services {
struct SlidingSyncCache { struct SlidingSyncCache {
lists: BTreeMap<String, SyncRequestList>, lists: BTreeMap<String, SyncRequestList>,
subscriptions: BTreeMap<OwnedRoomId, sync_events::v4::RoomSubscription>, subscriptions: BTreeMap<OwnedRoomId, sync_events::v4::RoomSubscription>,
known_rooms: BTreeMap<String, BTreeMap<OwnedRoomId, u64>>, /* For every room, the // For every room, the roomsince number
* roomsince number */ known_rooms: BTreeMap<String, BTreeMap<OwnedRoomId, u64>>,
extensions: ExtensionsConfig, extensions: ExtensionsConfig,
} }
@ -98,79 +98,35 @@ impl crate::Service for Service {
fn name(&self) -> &str { crate::service::make_name(std::module_path!()) } fn name(&self) -> &str { crate::service::make_name(std::module_path!()) }
} }
/// load params from cache if body doesn't contain it, as long as it's allowed
/// in some cases we may need to allow an empty list as an actual value
fn list_or_sticky<T: Clone>(target: &mut Vec<T>, cached: &Vec<T>) {
if target.is_empty() {
target.clone_from(cached);
}
}
fn some_or_sticky<T>(target: &mut Option<T>, cached: Option<T>) {
if target.is_none() {
*target = cached;
}
}
impl Service { impl Service {
pub fn snake_connection_cached( pub fn snake_connection_cached(&self, key: &SnakeConnectionsKey) -> bool {
&self,
user_id: OwnedUserId,
device_id: OwnedDeviceId,
conn_id: Option<String>,
) -> bool {
self.snake_connections
.lock()
.unwrap()
.contains_key(&(user_id, device_id, conn_id))
}
pub fn forget_snake_sync_connection(
&self,
user_id: OwnedUserId,
device_id: OwnedDeviceId,
conn_id: Option<String>,
) {
self.snake_connections self.snake_connections
.lock() .lock()
.expect("locked") .expect("locked")
.remove(&(user_id, device_id, conn_id)); .contains_key(key)
} }
pub fn remembered( pub fn forget_snake_sync_connection(&self, key: &SnakeConnectionsKey) {
&self, self.snake_connections.lock().expect("locked").remove(key);
user_id: OwnedUserId,
device_id: OwnedDeviceId,
conn_id: String,
) -> bool {
self.connections
.lock()
.unwrap()
.contains_key(&(user_id, device_id, conn_id))
} }
pub fn forget_sync_request_connection( pub fn remembered(&self, key: &DbConnectionsKey) -> bool {
&self, self.connections.lock().expect("locked").contains_key(key)
user_id: OwnedUserId, }
device_id: OwnedDeviceId,
conn_id: String, pub fn forget_sync_request_connection(&self, key: &DbConnectionsKey) {
) { self.connections.lock().expect("locked").remove(key);
self.connections
.lock()
.expect("locked")
.remove(&(user_id, device_id, conn_id));
} }
pub fn update_snake_sync_request_with_cache( pub fn update_snake_sync_request_with_cache(
&self, &self,
user_id: OwnedUserId, snake_key: &SnakeConnectionsKey,
device_id: OwnedDeviceId,
request: &mut v5::Request, request: &mut v5::Request,
) -> BTreeMap<String, BTreeMap<OwnedRoomId, u64>> { ) -> BTreeMap<String, BTreeMap<OwnedRoomId, u64>> {
let conn_id = request.conn_id.clone();
let mut cache = self.snake_connections.lock().expect("locked"); let mut cache = self.snake_connections.lock().expect("locked");
let cached = Arc::clone( let cached = Arc::clone(
cache cache
.entry((user_id, device_id, conn_id)) .entry(snake_key.clone())
.or_insert_with(|| Arc::new(Mutex::new(SnakeSyncCache::default()))), .or_insert_with(|| Arc::new(Mutex::new(SnakeSyncCache::default()))),
); );
let cached = &mut cached.lock().expect("locked"); let cached = &mut cached.lock().expect("locked");
@ -268,25 +224,23 @@ impl Service {
pub fn update_sync_request_with_cache( pub fn update_sync_request_with_cache(
&self, &self,
user_id: OwnedUserId, key: &SnakeConnectionsKey,
device_id: OwnedDeviceId,
request: &mut sync_events::v4::Request, request: &mut sync_events::v4::Request,
) -> BTreeMap<String, BTreeMap<OwnedRoomId, u64>> { ) -> BTreeMap<String, BTreeMap<OwnedRoomId, u64>> {
let Some(conn_id) = request.conn_id.clone() else { let Some(conn_id) = request.conn_id.clone() else {
return BTreeMap::new(); return BTreeMap::new();
}; };
let key = into_db_key(key.0.clone(), key.1.clone(), conn_id);
let mut cache = self.connections.lock().expect("locked"); let mut cache = self.connections.lock().expect("locked");
let cached = Arc::clone(cache.entry((user_id, device_id, conn_id)).or_insert_with( let cached = Arc::clone(cache.entry(key).or_insert_with(|| {
|| { Arc::new(Mutex::new(SlidingSyncCache {
Arc::new(Mutex::new(SlidingSyncCache { lists: BTreeMap::new(),
lists: BTreeMap::new(), subscriptions: BTreeMap::new(),
subscriptions: BTreeMap::new(), known_rooms: BTreeMap::new(),
known_rooms: BTreeMap::new(), extensions: ExtensionsConfig::default(),
extensions: ExtensionsConfig::default(), }))
})) }));
},
));
let cached = &mut cached.lock().expect("locked"); let cached = &mut cached.lock().expect("locked");
drop(cache); drop(cache);
@ -371,22 +325,18 @@ impl Service {
pub fn update_sync_subscriptions( pub fn update_sync_subscriptions(
&self, &self,
user_id: OwnedUserId, key: &DbConnectionsKey,
device_id: OwnedDeviceId,
conn_id: String,
subscriptions: BTreeMap<OwnedRoomId, sync_events::v4::RoomSubscription>, subscriptions: BTreeMap<OwnedRoomId, sync_events::v4::RoomSubscription>,
) { ) {
let mut cache = self.connections.lock().expect("locked"); let mut cache = self.connections.lock().expect("locked");
let cached = Arc::clone(cache.entry((user_id, device_id, conn_id)).or_insert_with( let cached = Arc::clone(cache.entry(key.clone()).or_insert_with(|| {
|| { Arc::new(Mutex::new(SlidingSyncCache {
Arc::new(Mutex::new(SlidingSyncCache { lists: BTreeMap::new(),
lists: BTreeMap::new(), subscriptions: BTreeMap::new(),
subscriptions: BTreeMap::new(), known_rooms: BTreeMap::new(),
known_rooms: BTreeMap::new(), extensions: ExtensionsConfig::default(),
extensions: ExtensionsConfig::default(), }))
})) }));
},
));
let cached = &mut cached.lock().expect("locked"); let cached = &mut cached.lock().expect("locked");
drop(cache); drop(cache);
@ -395,90 +345,81 @@ impl Service {
pub fn update_sync_known_rooms( pub fn update_sync_known_rooms(
&self, &self,
user_id: &UserId, key: &DbConnectionsKey,
device_id: &DeviceId,
conn_id: String,
list_id: String, list_id: String,
new_cached_rooms: BTreeSet<OwnedRoomId>, new_cached_rooms: BTreeSet<OwnedRoomId>,
globalsince: u64, globalsince: u64,
) { ) {
let mut cache = self.connections.lock().expect("locked"); let mut cache = self.connections.lock().expect("locked");
let cached = Arc::clone( let cached = Arc::clone(cache.entry(key.clone()).or_insert_with(|| {
cache Arc::new(Mutex::new(SlidingSyncCache {
.entry((user_id.to_owned(), device_id.to_owned(), conn_id)) lists: BTreeMap::new(),
.or_insert_with(|| { subscriptions: BTreeMap::new(),
Arc::new(Mutex::new(SlidingSyncCache { known_rooms: BTreeMap::new(),
lists: BTreeMap::new(), extensions: ExtensionsConfig::default(),
subscriptions: BTreeMap::new(), }))
known_rooms: BTreeMap::new(), }));
extensions: ExtensionsConfig::default(),
}))
}),
);
let cached = &mut cached.lock().expect("locked"); let cached = &mut cached.lock().expect("locked");
drop(cache); drop(cache);
for (roomid, lastsince) in cached for (room_id, lastsince) in cached
.known_rooms .known_rooms
.entry(list_id.clone()) .entry(list_id.clone())
.or_default() .or_default()
.iter_mut() .iter_mut()
{ {
if !new_cached_rooms.contains(roomid) { if !new_cached_rooms.contains(room_id) {
*lastsince = 0; *lastsince = 0;
} }
} }
let list = cached.known_rooms.entry(list_id).or_default(); let list = cached.known_rooms.entry(list_id).or_default();
for roomid in new_cached_rooms { for room_id in new_cached_rooms {
list.insert(roomid, globalsince); list.insert(room_id, globalsince);
} }
} }
pub fn update_snake_sync_known_rooms( pub fn update_snake_sync_known_rooms(
&self, &self,
user_id: &UserId, key: &SnakeConnectionsKey,
device_id: &DeviceId,
conn_id: String,
list_id: String, list_id: String,
new_cached_rooms: BTreeSet<OwnedRoomId>, new_cached_rooms: BTreeSet<OwnedRoomId>,
globalsince: u64, globalsince: u64,
) { ) {
assert!(key.2.is_some(), "Some(conn_id) required for this call");
let mut cache = self.snake_connections.lock().expect("locked"); let mut cache = self.snake_connections.lock().expect("locked");
let cached = Arc::clone( let cached = Arc::clone(
cache cache
.entry((user_id.to_owned(), device_id.to_owned(), Some(conn_id))) .entry(key.clone())
.or_insert_with(|| Arc::new(Mutex::new(SnakeSyncCache::default()))), .or_insert_with(|| Arc::new(Mutex::new(SnakeSyncCache::default()))),
); );
let cached = &mut cached.lock().expect("locked"); let cached = &mut cached.lock().expect("locked");
drop(cache); drop(cache);
for (roomid, lastsince) in cached for (room_id, lastsince) in cached
.known_rooms .known_rooms
.entry(list_id.clone()) .entry(list_id.clone())
.or_default() .or_default()
.iter_mut() .iter_mut()
{ {
if !new_cached_rooms.contains(roomid) { if !new_cached_rooms.contains(room_id) {
*lastsince = 0; *lastsince = 0;
} }
} }
let list = cached.known_rooms.entry(list_id).or_default(); let list = cached.known_rooms.entry(list_id).or_default();
for roomid in new_cached_rooms { for room_id in new_cached_rooms {
list.insert(roomid, globalsince); list.insert(room_id, globalsince);
} }
} }
pub fn update_snake_sync_subscriptions( pub fn update_snake_sync_subscriptions(
&self, &self,
user_id: OwnedUserId, key: &SnakeConnectionsKey,
device_id: OwnedDeviceId,
conn_id: Option<String>,
subscriptions: BTreeMap<OwnedRoomId, v5::request::RoomSubscription>, subscriptions: BTreeMap<OwnedRoomId, v5::request::RoomSubscription>,
) { ) {
let mut cache = self.snake_connections.lock().expect("locked"); let mut cache = self.snake_connections.lock().expect("locked");
let cached = Arc::clone( let cached = Arc::clone(
cache cache
.entry((user_id, device_id, conn_id)) .entry(key.clone())
.or_insert_with(|| Arc::new(Mutex::new(SnakeSyncCache::default()))), .or_insert_with(|| Arc::new(Mutex::new(SnakeSyncCache::default()))),
); );
let cached = &mut cached.lock().expect("locked"); let cached = &mut cached.lock().expect("locked");
@ -487,3 +428,37 @@ impl Service {
cached.subscriptions = subscriptions; cached.subscriptions = subscriptions;
} }
} }
#[inline]
pub fn into_snake_key<U, D, C>(user_id: U, device_id: D, conn_id: C) -> SnakeConnectionsKey
where
U: Into<OwnedUserId>,
D: Into<OwnedDeviceId>,
C: Into<Option<String>>,
{
(user_id.into(), device_id.into(), conn_id.into())
}
#[inline]
pub fn into_db_key<U, D, C>(user_id: U, device_id: D, conn_id: C) -> DbConnectionsKey
where
U: Into<OwnedUserId>,
D: Into<OwnedDeviceId>,
C: Into<String>,
{
(user_id.into(), device_id.into(), conn_id.into())
}
/// load params from cache if body doesn't contain it, as long as it's allowed
/// in some cases we may need to allow an empty list as an actual value
fn list_or_sticky<T: Clone>(target: &mut Vec<T>, cached: &Vec<T>) {
if target.is_empty() {
target.clone_from(cached);
}
}
fn some_or_sticky<T>(target: &mut Option<T>, cached: Option<T>) {
if target.is_none() {
*target = cached;
}
}