| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
|
|
| use crate::codec::{Cookie, ErrorCode, Message, Namespace, NewRegistration, Registration, Ttl}; |
| use crate::{MAX_TTL, MIN_TTL}; |
| use bimap::BiMap; |
| use futures::future::BoxFuture; |
| use futures::stream::FuturesUnordered; |
| use futures::{FutureExt, StreamExt}; |
| use libp2p_core::transport::PortUse; |
| use libp2p_core::{Endpoint, Multiaddr}; |
| use libp2p_identity::PeerId; |
| use libp2p_request_response::ProtocolSupport; |
| use libp2p_swarm::behaviour::FromSwarm; |
| use libp2p_swarm::{ |
| ConnectionDenied, ConnectionId, NetworkBehaviour, THandler, THandlerInEvent, THandlerOutEvent, |
| ToSwarm, |
| }; |
| use std::collections::{HashMap, HashSet}; |
| use std::iter; |
| use std::task::{ready, Context, Poll}; |
| use std::time::Duration; |
|
|
| pub struct Behaviour { |
| inner: libp2p_request_response::Behaviour<crate::codec::Codec>, |
|
|
| registrations: Registrations, |
| } |
|
|
| pub struct Config { |
| min_ttl: Ttl, |
| max_ttl: Ttl, |
| } |
|
|
| impl Config { |
| pub fn with_min_ttl(mut self, min_ttl: Ttl) -> Self { |
| self.min_ttl = min_ttl; |
| self |
| } |
|
|
| pub fn with_max_ttl(mut self, max_ttl: Ttl) -> Self { |
| self.max_ttl = max_ttl; |
| self |
| } |
| } |
|
|
| impl Default for Config { |
| fn default() -> Self { |
| Self { |
| min_ttl: MIN_TTL, |
| max_ttl: MAX_TTL, |
| } |
| } |
| } |
|
|
| impl Behaviour { |
| |
| pub fn new(config: Config) -> Self { |
| Self { |
| inner: libp2p_request_response::Behaviour::with_codec( |
| crate::codec::Codec::default(), |
| iter::once((crate::PROTOCOL_IDENT, ProtocolSupport::Inbound)), |
| libp2p_request_response::Config::default(), |
| ), |
|
|
| registrations: Registrations::with_config(config), |
| } |
| } |
| } |
|
|
| #[derive(Debug)] |
| #[allow(clippy::large_enum_variant)] |
| pub enum Event { |
| |
| DiscoverServed { |
| enquirer: PeerId, |
| registrations: Vec<Registration>, |
| }, |
| |
| DiscoverNotServed { enquirer: PeerId, error: ErrorCode }, |
| |
| PeerRegistered { |
| peer: PeerId, |
| registration: Registration, |
| }, |
| |
| PeerNotRegistered { |
| peer: PeerId, |
| namespace: Namespace, |
| error: ErrorCode, |
| }, |
| |
| PeerUnregistered { peer: PeerId, namespace: Namespace }, |
| |
| RegistrationExpired(Registration), |
| } |
|
|
| impl NetworkBehaviour for Behaviour { |
| type ConnectionHandler = <libp2p_request_response::Behaviour< |
| crate::codec::Codec, |
| > as NetworkBehaviour>::ConnectionHandler; |
|
|
| type ToSwarm = Event; |
|
|
| fn handle_established_inbound_connection( |
| &mut self, |
| connection_id: ConnectionId, |
| peer: PeerId, |
| local_addr: &Multiaddr, |
| remote_addr: &Multiaddr, |
| ) -> Result<THandler<Self>, ConnectionDenied> { |
| self.inner.handle_established_inbound_connection( |
| connection_id, |
| peer, |
| local_addr, |
| remote_addr, |
| ) |
| } |
|
|
| fn handle_established_outbound_connection( |
| &mut self, |
| connection_id: ConnectionId, |
| peer: PeerId, |
| addr: &Multiaddr, |
| role_override: Endpoint, |
| port_use: PortUse, |
| ) -> Result<THandler<Self>, ConnectionDenied> { |
| self.inner.handle_established_outbound_connection( |
| connection_id, |
| peer, |
| addr, |
| role_override, |
| port_use, |
| ) |
| } |
|
|
| fn on_connection_handler_event( |
| &mut self, |
| peer_id: PeerId, |
| connection: ConnectionId, |
| event: THandlerOutEvent<Self>, |
| ) { |
| self.inner |
| .on_connection_handler_event(peer_id, connection, event); |
| } |
|
|
| #[tracing::instrument(level = "trace", name = "NetworkBehaviour::poll", skip(self, cx))] |
| fn poll( |
| &mut self, |
| cx: &mut Context<'_>, |
| ) -> Poll<ToSwarm<Self::ToSwarm, THandlerInEvent<Self>>> { |
| if let Poll::Ready(ExpiredRegistration(registration)) = self.registrations.poll(cx) { |
| return Poll::Ready(ToSwarm::GenerateEvent(Event::RegistrationExpired( |
| registration, |
| ))); |
| } |
|
|
| loop { |
| if let Poll::Ready(to_swarm) = self.inner.poll(cx) { |
| match to_swarm { |
| ToSwarm::GenerateEvent(libp2p_request_response::Event::Message { |
| peer: peer_id, |
| message: |
| libp2p_request_response::Message::Request { |
| request, channel, .. |
| }, |
| }) => { |
| if let Some((event, response)) = |
| handle_request(peer_id, request, &mut self.registrations) |
| { |
| if let Some(resp) = response { |
| self.inner |
| .send_response(channel, resp) |
| .expect("Send response"); |
| } |
|
|
| return Poll::Ready(ToSwarm::GenerateEvent(event)); |
| } |
|
|
| continue; |
| } |
| ToSwarm::GenerateEvent(libp2p_request_response::Event::InboundFailure { |
| peer, |
| request_id, |
| error, |
| }) => { |
| tracing::warn!( |
| %peer, |
| request=%request_id, |
| "Inbound request with peer failed: {error}" |
| ); |
|
|
| continue; |
| } |
| ToSwarm::GenerateEvent(libp2p_request_response::Event::ResponseSent { |
| .. |
| }) |
| | ToSwarm::GenerateEvent(libp2p_request_response::Event::Message { |
| peer: _, |
| message: libp2p_request_response::Message::Response { .. }, |
| }) |
| | ToSwarm::GenerateEvent(libp2p_request_response::Event::OutboundFailure { |
| .. |
| }) => { |
| continue; |
| } |
| other => { |
| let new_to_swarm = other |
| .map_out(|_| unreachable!("we manually map `GenerateEvent` variants")); |
|
|
| return Poll::Ready(new_to_swarm); |
| } |
| }; |
| } |
|
|
| return Poll::Pending; |
| } |
| } |
|
|
| fn on_swarm_event(&mut self, event: FromSwarm) { |
| self.inner.on_swarm_event(event); |
| } |
| } |
|
|
| fn handle_request( |
| peer_id: PeerId, |
| message: Message, |
| registrations: &mut Registrations, |
| ) -> Option<(Event, Option<Message>)> { |
| match message { |
| Message::Register(registration) => { |
| if registration.record.peer_id() != peer_id { |
| let error = ErrorCode::NotAuthorized; |
|
|
| let event = Event::PeerNotRegistered { |
| peer: peer_id, |
| namespace: registration.namespace, |
| error, |
| }; |
|
|
| return Some((event, Some(Message::RegisterResponse(Err(error))))); |
| } |
|
|
| let namespace = registration.namespace.clone(); |
|
|
| match registrations.add(registration) { |
| Ok(registration) => { |
| let response = Message::RegisterResponse(Ok(registration.ttl)); |
|
|
| let event = Event::PeerRegistered { |
| peer: peer_id, |
| registration, |
| }; |
|
|
| Some((event, Some(response))) |
| } |
| Err(TtlOutOfRange::TooLong { .. }) | Err(TtlOutOfRange::TooShort { .. }) => { |
| let error = ErrorCode::InvalidTtl; |
|
|
| let response = Message::RegisterResponse(Err(error)); |
|
|
| let event = Event::PeerNotRegistered { |
| peer: peer_id, |
| namespace, |
| error, |
| }; |
|
|
| Some((event, Some(response))) |
| } |
| } |
| } |
| Message::Unregister(namespace) => { |
| registrations.remove(namespace.clone(), peer_id); |
|
|
| let event = Event::PeerUnregistered { |
| peer: peer_id, |
| namespace, |
| }; |
|
|
| Some((event, None)) |
| } |
| Message::Discover { |
| namespace, |
| cookie, |
| limit, |
| } => match registrations.get(namespace, cookie, limit) { |
| Ok((registrations, cookie)) => { |
| let discovered = registrations.cloned().collect::<Vec<_>>(); |
|
|
| let response = Message::DiscoverResponse(Ok((discovered.clone(), cookie))); |
|
|
| let event = Event::DiscoverServed { |
| enquirer: peer_id, |
| registrations: discovered, |
| }; |
|
|
| Some((event, Some(response))) |
| } |
| Err(_) => { |
| let error = ErrorCode::InvalidCookie; |
|
|
| let response = Message::DiscoverResponse(Err(error)); |
|
|
| let event = Event::DiscoverNotServed { |
| enquirer: peer_id, |
| error, |
| }; |
|
|
| Some((event, Some(response))) |
| } |
| }, |
| Message::RegisterResponse(_) => None, |
| Message::DiscoverResponse(_) => None, |
| } |
| } |
|
|
| #[derive(Debug, Eq, PartialEq, Hash, Copy, Clone)] |
| struct RegistrationId(u64); |
|
|
| impl RegistrationId { |
| fn new() -> Self { |
| Self(rand::random()) |
| } |
| } |
|
|
| #[derive(Debug, PartialEq)] |
| struct ExpiredRegistration(Registration); |
|
|
| pub struct Registrations { |
| registrations_for_peer: BiMap<(PeerId, Namespace), RegistrationId>, |
| registrations: HashMap<RegistrationId, Registration>, |
| cookies: HashMap<Cookie, HashSet<RegistrationId>>, |
| min_ttl: Ttl, |
| max_ttl: Ttl, |
| next_expiry: FuturesUnordered<BoxFuture<'static, RegistrationId>>, |
| } |
|
|
| #[derive(Debug, thiserror::Error)] |
| pub enum TtlOutOfRange { |
| #[error("Requested TTL ({requested}s) is too long; max {bound}s")] |
| TooLong { bound: Ttl, requested: Ttl }, |
| #[error("Requested TTL ({requested}s) is too short; min {bound}s")] |
| TooShort { bound: Ttl, requested: Ttl }, |
| } |
|
|
| impl Default for Registrations { |
| fn default() -> Self { |
| Registrations::with_config(Config::default()) |
| } |
| } |
|
|
| impl Registrations { |
| pub fn with_config(config: Config) -> Self { |
| Self { |
| registrations_for_peer: Default::default(), |
| registrations: Default::default(), |
| min_ttl: config.min_ttl, |
| max_ttl: config.max_ttl, |
| cookies: Default::default(), |
| next_expiry: FuturesUnordered::from_iter(vec![futures::future::pending().boxed()]), |
| } |
| } |
|
|
| pub fn add( |
| &mut self, |
| new_registration: NewRegistration, |
| ) -> Result<Registration, TtlOutOfRange> { |
| let ttl = new_registration.effective_ttl(); |
| if ttl > self.max_ttl { |
| return Err(TtlOutOfRange::TooLong { |
| bound: self.max_ttl, |
| requested: ttl, |
| }); |
| } |
| if ttl < self.min_ttl { |
| return Err(TtlOutOfRange::TooShort { |
| bound: self.min_ttl, |
| requested: ttl, |
| }); |
| } |
|
|
| let namespace = new_registration.namespace; |
| let registration_id = RegistrationId::new(); |
|
|
| if let Some(old_registration) = self |
| .registrations_for_peer |
| .get_by_left(&(new_registration.record.peer_id(), namespace.clone())) |
| { |
| self.registrations.remove(old_registration); |
| } |
|
|
| self.registrations_for_peer.insert( |
| (new_registration.record.peer_id(), namespace.clone()), |
| registration_id, |
| ); |
|
|
| let registration = Registration { |
| namespace, |
| record: new_registration.record, |
| ttl, |
| }; |
| self.registrations |
| .insert(registration_id, registration.clone()); |
|
|
| let next_expiry = futures_timer::Delay::new(Duration::from_secs(ttl)) |
| .map(move |_| registration_id) |
| .boxed(); |
|
|
| self.next_expiry.push(next_expiry); |
|
|
| Ok(registration) |
| } |
|
|
| pub fn remove(&mut self, namespace: Namespace, peer_id: PeerId) { |
| let reggo_to_remove = self |
| .registrations_for_peer |
| .remove_by_left(&(peer_id, namespace)); |
|
|
| if let Some((_, reggo_to_remove)) = reggo_to_remove { |
| self.registrations.remove(®go_to_remove); |
| } |
| } |
|
|
| pub fn get( |
| &mut self, |
| discover_namespace: Option<Namespace>, |
| cookie: Option<Cookie>, |
| limit: Option<u64>, |
| ) -> Result<(impl Iterator<Item = &Registration> + '_, Cookie), CookieNamespaceMismatch> { |
| let cookie_namespace = cookie.as_ref().and_then(|cookie| cookie.namespace()); |
|
|
| match (discover_namespace.as_ref(), cookie_namespace) { |
| |
| (None, Some(_)) => return Err(CookieNamespaceMismatch), |
| |
| (Some(namespace), Some(cookie_namespace)) if namespace != cookie_namespace => { |
| return Err(CookieNamespaceMismatch) |
| } |
| |
| _ => {} |
| } |
|
|
| let mut reggos_of_last_discover = cookie |
| .and_then(|cookie| self.cookies.get(&cookie)) |
| .cloned() |
| .unwrap_or_default(); |
|
|
| let ids = self |
| .registrations_for_peer |
| .iter() |
| .filter_map({ |
| |((_, namespace), registration_id)| { |
| if reggos_of_last_discover.contains(registration_id) { |
| return None; |
| } |
|
|
| match discover_namespace.as_ref() { |
| Some(discover_namespace) if discover_namespace == namespace => { |
| Some(registration_id) |
| } |
| Some(_) => None, |
| None => Some(registration_id), |
| } |
| } |
| }) |
| .take(limit.unwrap_or(u64::MAX) as usize) |
| .cloned() |
| .collect::<Vec<_>>(); |
|
|
| reggos_of_last_discover.extend(&ids); |
|
|
| let new_cookie = discover_namespace |
| .map(Cookie::for_namespace) |
| .unwrap_or_else(Cookie::for_all_namespaces); |
| self.cookies |
| .insert(new_cookie.clone(), reggos_of_last_discover); |
|
|
| let regs = &self.registrations; |
| let registrations = ids |
| .into_iter() |
| .map(move |id| regs.get(&id).expect("bad internal data structure")); |
|
|
| Ok((registrations, new_cookie)) |
| } |
|
|
| fn poll(&mut self, cx: &mut Context<'_>) -> Poll<ExpiredRegistration> { |
| loop { |
| let expired_registration = ready!(self.next_expiry.poll_next_unpin(cx)).expect( |
| "This stream should never finish because it is initialised with a pending future", |
| ); |
|
|
| |
| self.cookies.retain(|_, registrations| { |
| registrations.remove(&expired_registration); |
|
|
| |
| !registrations.is_empty() |
| }); |
|
|
| self.registrations_for_peer |
| .remove_by_right(&expired_registration); |
| match self.registrations.remove(&expired_registration) { |
| None => { |
| continue; |
| } |
| Some(registration) => { |
| return Poll::Ready(ExpiredRegistration(registration)); |
| } |
| } |
| } |
| } |
| } |
|
|
| #[derive(Debug, thiserror::Error, Eq, PartialEq)] |
| #[error("The provided cookie is not valid for a DISCOVER request for the given namespace")] |
| pub struct CookieNamespaceMismatch; |
|
|
| #[cfg(test)] |
| mod tests { |
| use web_time::SystemTime; |
|
|
| use libp2p_core::PeerRecord; |
| use libp2p_identity as identity; |
|
|
| use super::*; |
|
|
| #[test] |
| fn given_cookie_from_discover_when_discover_again_then_only_get_diff() { |
| let mut registrations = Registrations::default(); |
| registrations.add(new_dummy_registration("foo")).unwrap(); |
| registrations.add(new_dummy_registration("foo")).unwrap(); |
|
|
| let (initial_discover, cookie) = registrations.get(None, None, None).unwrap(); |
| assert_eq!(initial_discover.count(), 2); |
|
|
| let (subsequent_discover, _) = registrations.get(None, Some(cookie), None).unwrap(); |
| assert_eq!(subsequent_discover.count(), 0); |
| } |
|
|
| #[test] |
| fn given_registrations_when_discover_all_then_all_are_returned() { |
| let mut registrations = Registrations::default(); |
| registrations.add(new_dummy_registration("foo")).unwrap(); |
| registrations.add(new_dummy_registration("foo")).unwrap(); |
|
|
| let (discover, _) = registrations.get(None, None, None).unwrap(); |
|
|
| assert_eq!(discover.count(), 2); |
| } |
|
|
| #[test] |
| fn given_registrations_when_discover_only_for_specific_namespace_then_only_those_are_returned() |
| { |
| let mut registrations = Registrations::default(); |
| registrations.add(new_dummy_registration("foo")).unwrap(); |
| registrations.add(new_dummy_registration("bar")).unwrap(); |
|
|
| let (discover, _) = registrations |
| .get(Some(Namespace::from_static("foo")), None, None) |
| .unwrap(); |
|
|
| assert_eq!( |
| discover.map(|r| &r.namespace).collect::<Vec<_>>(), |
| vec!["foo"] |
| ); |
| } |
|
|
| #[test] |
| fn given_reregistration_old_registration_is_discarded() { |
| let alice = identity::Keypair::generate_ed25519(); |
| let mut registrations = Registrations::default(); |
| registrations |
| .add(new_registration("foo", alice.clone(), None)) |
| .unwrap(); |
| registrations |
| .add(new_registration("foo", alice, None)) |
| .unwrap(); |
|
|
| let (discover, _) = registrations |
| .get(Some(Namespace::from_static("foo")), None, None) |
| .unwrap(); |
|
|
| assert_eq!( |
| discover.map(|r| &r.namespace).collect::<Vec<_>>(), |
| vec!["foo"] |
| ); |
| } |
|
|
| #[test] |
| fn given_cookie_from_2nd_discover_does_not_return_nodes_from_first_discover() { |
| let mut registrations = Registrations::default(); |
| registrations.add(new_dummy_registration("foo")).unwrap(); |
| registrations.add(new_dummy_registration("foo")).unwrap(); |
|
|
| let (initial_discover, cookie1) = registrations.get(None, None, None).unwrap(); |
| assert_eq!(initial_discover.count(), 2); |
|
|
| let (subsequent_discover, cookie2) = registrations.get(None, Some(cookie1), None).unwrap(); |
| assert_eq!(subsequent_discover.count(), 0); |
|
|
| let (subsequent_discover, _) = registrations.get(None, Some(cookie2), None).unwrap(); |
| assert_eq!(subsequent_discover.count(), 0); |
| } |
|
|
| #[test] |
| fn cookie_from_different_discover_request_is_not_valid() { |
| let mut registrations = Registrations::default(); |
| registrations.add(new_dummy_registration("foo")).unwrap(); |
| registrations.add(new_dummy_registration("bar")).unwrap(); |
|
|
| let (_, foo_discover_cookie) = registrations |
| .get(Some(Namespace::from_static("foo")), None, None) |
| .unwrap(); |
| let result = registrations.get( |
| Some(Namespace::from_static("bar")), |
| Some(foo_discover_cookie), |
| None, |
| ); |
|
|
| assert!(matches!(result, Err(CookieNamespaceMismatch))) |
| } |
|
|
| #[tokio::test] |
| async fn given_two_registration_ttls_one_expires_one_lives() { |
| let mut registrations = Registrations::with_config(Config { |
| min_ttl: 0, |
| max_ttl: 4, |
| }); |
|
|
| let start_time = SystemTime::now(); |
|
|
| registrations |
| .add(new_dummy_registration_with_ttl("foo", 1)) |
| .unwrap(); |
| registrations |
| .add(new_dummy_registration_with_ttl("bar", 4)) |
| .unwrap(); |
|
|
| let event = registrations.next_event().await; |
|
|
| let elapsed = start_time.elapsed().unwrap(); |
| assert!(elapsed.as_secs() >= 1); |
| assert!(elapsed.as_secs() < 2); |
|
|
| assert_eq!(event.0.namespace, Namespace::from_static("foo")); |
|
|
| { |
| let (mut discovered_foo, _) = registrations |
| .get(Some(Namespace::from_static("foo")), None, None) |
| .unwrap(); |
| assert!(discovered_foo.next().is_none()); |
| } |
| let (mut discovered_bar, _) = registrations |
| .get(Some(Namespace::from_static("bar")), None, None) |
| .unwrap(); |
| assert!(discovered_bar.next().is_some()); |
| } |
|
|
| #[tokio::test] |
| async fn given_peer_unregisters_before_expiry_do_not_emit_registration_expired() { |
| let mut registrations = Registrations::with_config(Config { |
| min_ttl: 1, |
| max_ttl: 10, |
| }); |
| let dummy_registration = new_dummy_registration_with_ttl("foo", 2); |
| let namespace = dummy_registration.namespace.clone(); |
| let peer_id = dummy_registration.record.peer_id(); |
|
|
| registrations.add(dummy_registration).unwrap(); |
| registrations.no_event_for(1).await; |
| registrations.remove(namespace, peer_id); |
|
|
| registrations.no_event_for(3).await |
| } |
|
|
| |
| |
| |
| |
| #[tokio::test] |
| async fn given_all_registrations_expired_then_successfully_handle_new_registration_and_expiry() |
| { |
| let mut registrations = Registrations::with_config(Config { |
| min_ttl: 0, |
| max_ttl: 10, |
| }); |
| let dummy_registration = new_dummy_registration_with_ttl("foo", 1); |
|
|
| registrations.add(dummy_registration.clone()).unwrap(); |
| let _ = registrations.next_event_in_at_most(2).await; |
|
|
| registrations.no_event_for(1).await; |
|
|
| registrations.add(dummy_registration).unwrap(); |
| let _ = registrations.next_event_in_at_most(2).await; |
| } |
|
|
| #[tokio::test] |
| async fn cookies_are_cleaned_up_if_registrations_expire() { |
| let mut registrations = Registrations::with_config(Config { |
| min_ttl: 1, |
| max_ttl: 10, |
| }); |
|
|
| registrations |
| .add(new_dummy_registration_with_ttl("foo", 2)) |
| .unwrap(); |
| let (_, _) = registrations.get(None, None, None).unwrap(); |
|
|
| assert_eq!(registrations.cookies.len(), 1); |
|
|
| let _ = registrations.next_event_in_at_most(3).await; |
|
|
| assert_eq!(registrations.cookies.len(), 0); |
| } |
|
|
| #[test] |
| fn given_limit_discover_only_returns_n_results() { |
| let mut registrations = Registrations::default(); |
| registrations.add(new_dummy_registration("foo")).unwrap(); |
| registrations.add(new_dummy_registration("foo")).unwrap(); |
|
|
| let (registrations, _) = registrations.get(None, None, Some(1)).unwrap(); |
|
|
| assert_eq!(registrations.count(), 1); |
| } |
|
|
| #[test] |
| fn given_limit_cookie_can_be_used_for_pagination() { |
| let mut registrations = Registrations::default(); |
| registrations.add(new_dummy_registration("foo")).unwrap(); |
| registrations.add(new_dummy_registration("foo")).unwrap(); |
|
|
| let (discover1, cookie) = registrations.get(None, None, Some(1)).unwrap(); |
| assert_eq!(discover1.count(), 1); |
|
|
| let (discover2, _) = registrations.get(None, Some(cookie), None).unwrap(); |
| assert_eq!(discover2.count(), 1); |
| } |
|
|
| fn new_dummy_registration(namespace: &'static str) -> NewRegistration { |
| let identity = identity::Keypair::generate_ed25519(); |
|
|
| new_registration(namespace, identity, None) |
| } |
|
|
| fn new_dummy_registration_with_ttl(namespace: &'static str, ttl: Ttl) -> NewRegistration { |
| let identity = identity::Keypair::generate_ed25519(); |
|
|
| new_registration(namespace, identity, Some(ttl)) |
| } |
|
|
| fn new_registration( |
| namespace: &'static str, |
| identity: identity::Keypair, |
| ttl: Option<Ttl>, |
| ) -> NewRegistration { |
| NewRegistration::new( |
| Namespace::from_static(namespace), |
| PeerRecord::new(&identity, vec!["/ip4/127.0.0.1/tcp/1234".parse().unwrap()]).unwrap(), |
| ttl, |
| ) |
| } |
|
|
| |
| impl Registrations { |
| async fn next_event(&mut self) -> ExpiredRegistration { |
| futures::future::poll_fn(|cx| self.poll(cx)).await |
| } |
|
|
| |
| async fn no_event_for(&mut self, seconds: u64) { |
| tokio::time::timeout(Duration::from_secs(seconds), self.next_event()) |
| .await |
| .unwrap_err(); |
| } |
|
|
| |
| async fn next_event_in_at_most(&mut self, seconds: u64) -> ExpiredRegistration { |
| tokio::time::timeout(Duration::from_secs(seconds), self.next_event()) |
| .await |
| .unwrap() |
| } |
| } |
| } |
|
|