matrix_sdk/sliding_sync/
builder.rsuse std::{
collections::BTreeMap,
fmt::Debug,
sync::{Arc, RwLock as StdRwLock},
time::Duration,
};
use matrix_sdk_base::sliding_sync::http;
use matrix_sdk_common::timer;
use ruma::OwnedRoomId;
use tokio::sync::{broadcast::channel, Mutex as AsyncMutex, RwLock as AsyncRwLock};
use super::{
cache::{format_storage_key_prefix, restore_sliding_sync_state},
sticky_parameters::SlidingSyncStickyManager,
Error, SlidingSync, SlidingSyncInner, SlidingSyncListBuilder, SlidingSyncPositionMarkers,
Version,
};
use crate::{sliding_sync::SlidingSyncStickyParameters, Client, Result};
#[derive(Debug, Clone)]
pub struct SlidingSyncBuilder {
id: String,
storage_key: String,
version: Option<Version>,
client: Client,
lists: Vec<SlidingSyncListBuilder>,
extensions: Option<http::request::Extensions>,
subscriptions: BTreeMap<OwnedRoomId, http::request::RoomSubscription>,
poll_timeout: Duration,
network_timeout: Duration,
#[cfg(feature = "e2e-encryption")]
share_pos: bool,
}
impl SlidingSyncBuilder {
pub(super) fn new(id: String, client: Client) -> Result<Self, Error> {
if id.len() > 16 {
Err(Error::InvalidSlidingSyncIdentifier)
} else {
let storage_key =
format_storage_key_prefix(&id, client.user_id().ok_or(Error::UnauthenticatedUser)?);
Ok(Self {
id,
storage_key,
version: None,
client,
lists: Vec::new(),
extensions: None,
subscriptions: BTreeMap::new(),
poll_timeout: Duration::from_secs(30),
network_timeout: Duration::from_secs(30),
#[cfg(feature = "e2e-encryption")]
share_pos: false,
})
}
}
pub fn version(mut self, version: Version) -> Self {
self.version = Some(version);
self
}
pub fn add_list(mut self, list_builder: SlidingSyncListBuilder) -> Self {
self.lists.push(list_builder);
self
}
pub async fn add_cached_list(self, mut list: SlidingSyncListBuilder) -> Result<Self> {
let _timer = timer!(format!("restoring (loading+processing) list {}", list.name));
list.set_cached_and_reload(&self.client, &self.storage_key).await?;
Ok(self.add_list(list))
}
pub fn with_all_extensions(mut self) -> Self {
{
let cfg = self.extensions.get_or_insert_with(Default::default);
if cfg.to_device.enabled.is_none() {
cfg.to_device.enabled = Some(true);
}
if cfg.e2ee.enabled.is_none() {
cfg.e2ee.enabled = Some(true);
}
if cfg.account_data.enabled.is_none() {
cfg.account_data.enabled = Some(true);
}
if cfg.receipts.enabled.is_none() {
cfg.receipts.enabled = Some(true);
}
if cfg.typing.enabled.is_none() {
cfg.typing.enabled = Some(true);
}
}
self
}
pub fn with_e2ee_extension(mut self, e2ee: http::request::E2EE) -> Self {
self.extensions.get_or_insert_with(Default::default).e2ee = e2ee;
self
}
pub fn without_e2ee_extension(mut self) -> Self {
self.extensions.get_or_insert_with(Default::default).e2ee = http::request::E2EE::default();
self
}
pub fn with_to_device_extension(mut self, to_device: http::request::ToDevice) -> Self {
self.extensions.get_or_insert_with(Default::default).to_device = to_device;
self
}
pub fn without_to_device_extension(mut self) -> Self {
self.extensions.get_or_insert_with(Default::default).to_device =
http::request::ToDevice::default();
self
}
pub fn with_account_data_extension(mut self, account_data: http::request::AccountData) -> Self {
self.extensions.get_or_insert_with(Default::default).account_data = account_data;
self
}
pub fn without_account_data_extension(mut self) -> Self {
self.extensions.get_or_insert_with(Default::default).account_data =
http::request::AccountData::default();
self
}
pub fn with_typing_extension(mut self, typing: http::request::Typing) -> Self {
self.extensions.get_or_insert_with(Default::default).typing = typing;
self
}
pub fn without_typing_extension(mut self) -> Self {
self.extensions.get_or_insert_with(Default::default).typing =
http::request::Typing::default();
self
}
pub fn with_receipt_extension(mut self, receipt: http::request::Receipts) -> Self {
self.extensions.get_or_insert_with(Default::default).receipts = receipt;
self
}
pub fn without_receipt_extension(mut self) -> Self {
self.extensions.get_or_insert_with(Default::default).receipts =
http::request::Receipts::default();
self
}
pub fn poll_timeout(mut self, timeout: Duration) -> Self {
self.poll_timeout = timeout;
self
}
pub fn network_timeout(mut self, timeout: Duration) -> Self {
self.network_timeout = timeout;
self
}
#[cfg(feature = "e2e-encryption")]
pub fn share_pos(mut self) -> Self {
self.share_pos = true;
self
}
pub async fn build(self) -> Result<SlidingSync> {
let client = self.client;
let version = self.version.unwrap_or_else(|| client.sliding_sync_version());
if matches!(version, Version::None) {
return Err(crate::error::Error::SlidingSync(Error::VersionIsMissing));
}
let (internal_channel_sender, _internal_channel_receiver) = channel(8);
let mut lists = BTreeMap::new();
for list_builder in self.lists {
let list = list_builder.build(internal_channel_sender.clone());
lists.insert(list.name().to_owned(), list);
}
let restored_fields =
restore_sliding_sync_state(&client, &self.storage_key, &lists).await?;
let (pos, rooms) = if let Some(fields) = restored_fields {
#[cfg(feature = "e2e-encryption")]
let pos = if self.share_pos { fields.pos } else { None };
#[cfg(not(feature = "e2e-encryption"))]
let pos = None;
(pos, fields.rooms)
} else {
(None, BTreeMap::new())
};
#[cfg(feature = "e2e-encryption")]
let share_pos = self.share_pos;
#[cfg(not(feature = "e2e-encryption"))]
let share_pos = false;
let rooms = AsyncRwLock::new(rooms);
let lists = AsyncRwLock::new(lists);
Ok(SlidingSync::new(SlidingSyncInner {
id: self.id,
version,
client,
storage_key: self.storage_key,
share_pos,
lists,
rooms,
position: Arc::new(AsyncMutex::new(SlidingSyncPositionMarkers { pos })),
sticky: StdRwLock::new(SlidingSyncStickyManager::new(
SlidingSyncStickyParameters::new(
self.subscriptions,
self.extensions.unwrap_or_default(),
),
)),
internal_channel: internal_channel_sender,
poll_timeout: self.poll_timeout,
network_timeout: self.network_timeout,
}))
}
}