2022-11-06 21:15:42 -03:00
|
|
|
package nostr
|
|
|
|
|
|
|
|
import (
|
2022-12-17 19:39:10 +01:00
|
|
|
"context"
|
2022-11-06 21:15:42 -03:00
|
|
|
"encoding/json"
|
|
|
|
"fmt"
|
|
|
|
"log"
|
2023-02-21 13:12:23 +01:00
|
|
|
"net/http"
|
2023-01-16 06:27:11 -05:00
|
|
|
"sync"
|
2022-11-06 21:15:42 -03:00
|
|
|
"time"
|
|
|
|
|
|
|
|
s "github.com/SaveTheRbtz/generic-sync-map-go"
|
|
|
|
"github.com/gorilla/websocket"
|
|
|
|
)
|
|
|
|
|
|
|
|
type Status int
|
|
|
|
|
|
|
|
const (
|
|
|
|
PublishStatusSent Status = 0
|
|
|
|
PublishStatusFailed Status = -1
|
|
|
|
PublishStatusSucceeded Status = 1
|
|
|
|
)
|
|
|
|
|
2023-03-17 16:43:48 -03:00
|
|
|
var subscriptionIdCounter = 0
|
|
|
|
|
2022-11-06 21:15:42 -03:00
|
|
|
func (s Status) String() string {
|
|
|
|
switch s {
|
|
|
|
case PublishStatusSent:
|
|
|
|
return "sent"
|
|
|
|
case PublishStatusFailed:
|
|
|
|
return "failed"
|
|
|
|
case PublishStatusSucceeded:
|
|
|
|
return "success"
|
|
|
|
}
|
|
|
|
|
|
|
|
return "unknown"
|
|
|
|
}
|
|
|
|
|
|
|
|
type Relay struct {
|
2023-02-21 13:12:23 +01:00
|
|
|
URL string
|
|
|
|
RequestHeader http.Header // e.g. for origin header
|
2022-11-06 21:15:42 -03:00
|
|
|
|
|
|
|
Connection *Connection
|
2023-03-18 08:39:31 -03:00
|
|
|
subscriptions s.MapOf[string, *Subscription]
|
2022-11-06 21:15:42 -03:00
|
|
|
|
2023-03-16 14:15:16 -03:00
|
|
|
Challenges chan string // NIP-42 Challenges
|
|
|
|
Notices chan string
|
2023-03-18 08:39:31 -03:00
|
|
|
ConnectionError error
|
2023-03-16 14:15:16 -03:00
|
|
|
ConnectionContext context.Context // will be canceled when the connection closes
|
2022-11-15 07:53:50 -03:00
|
|
|
|
2023-03-16 14:27:33 -03:00
|
|
|
okCallbacks s.MapOf[string, func(bool, string)]
|
2023-03-14 17:07:22 -03:00
|
|
|
|
|
|
|
// custom things that aren't often used
|
|
|
|
//
|
|
|
|
AssumeValid bool // this will skip verifying signatures for events received from this relay
|
2022-11-06 21:15:42 -03:00
|
|
|
}
|
|
|
|
|
2023-01-16 06:27:11 -05:00
|
|
|
// RelayConnect returns a relay object connected to url.
|
|
|
|
// Once successfully connected, cancelling ctx has no effect.
|
|
|
|
// To close the connection, call r.Close().
|
2023-01-01 20:22:40 -03:00
|
|
|
func RelayConnect(ctx context.Context, url string) (*Relay, error) {
|
2022-11-15 07:53:50 -03:00
|
|
|
r := &Relay{URL: NormalizeURL(url)}
|
2023-01-01 20:22:40 -03:00
|
|
|
err := r.Connect(ctx)
|
2022-11-15 07:53:50 -03:00
|
|
|
return r, err
|
2022-11-06 21:15:42 -03:00
|
|
|
}
|
|
|
|
|
2022-11-26 09:25:31 -03:00
|
|
|
func (r *Relay) String() string {
|
|
|
|
return r.URL
|
|
|
|
}
|
|
|
|
|
2023-01-01 20:22:40 -03:00
|
|
|
// Connect tries to establish a websocket connection to r.URL.
|
2022-12-17 19:39:10 +01:00
|
|
|
// If the context expires before the connection is complete, an error is returned.
|
|
|
|
// Once successfully connected, context expiration has no effect: call r.Close
|
|
|
|
// to close the connection.
|
2023-01-01 20:22:40 -03:00
|
|
|
func (r *Relay) Connect(ctx context.Context) error {
|
2023-03-18 08:39:31 -03:00
|
|
|
connectionContext, cancel := context.WithCancel(context.Background())
|
|
|
|
r.ConnectionContext = connectionContext
|
2023-03-16 14:15:16 -03:00
|
|
|
|
2022-11-06 21:15:42 -03:00
|
|
|
if r.URL == "" {
|
2023-03-16 14:15:16 -03:00
|
|
|
cancel()
|
2022-11-06 21:15:42 -03:00
|
|
|
return fmt.Errorf("invalid relay URL '%s'", r.URL)
|
|
|
|
}
|
|
|
|
|
2023-01-03 14:47:21 -03:00
|
|
|
if _, ok := ctx.Deadline(); !ok {
|
|
|
|
// if no timeout is set, force it to 7 seconds
|
|
|
|
var cancel context.CancelFunc
|
|
|
|
ctx, cancel = context.WithTimeout(ctx, 7*time.Second)
|
|
|
|
defer cancel()
|
|
|
|
}
|
|
|
|
|
2023-02-21 13:12:23 +01:00
|
|
|
socket, _, err := websocket.DefaultDialer.DialContext(ctx, r.URL, r.RequestHeader)
|
2022-11-06 21:15:42 -03:00
|
|
|
if err != nil {
|
2023-03-16 14:15:16 -03:00
|
|
|
cancel()
|
2022-11-06 21:15:42 -03:00
|
|
|
return fmt.Errorf("error opening websocket to '%s': %w", r.URL, err)
|
|
|
|
}
|
|
|
|
|
2023-01-16 06:27:11 -05:00
|
|
|
r.Challenges = make(chan string)
|
2022-11-15 07:53:50 -03:00
|
|
|
r.Notices = make(chan string)
|
|
|
|
|
2022-11-06 21:15:42 -03:00
|
|
|
conn := NewConnection(socket)
|
2022-11-14 19:48:02 -03:00
|
|
|
r.Connection = conn
|
2022-11-06 21:15:42 -03:00
|
|
|
|
2022-11-14 19:48:02 -03:00
|
|
|
go func() {
|
|
|
|
for {
|
|
|
|
typ, message, err := conn.socket.ReadMessage()
|
|
|
|
if err != nil {
|
2023-03-18 08:39:31 -03:00
|
|
|
r.ConnectionError = err
|
2022-11-15 07:53:50 -03:00
|
|
|
break
|
2022-11-14 19:48:02 -03:00
|
|
|
}
|
2022-11-15 07:53:50 -03:00
|
|
|
|
2022-11-14 19:48:02 -03:00
|
|
|
if typ == websocket.PingMessage {
|
|
|
|
conn.WriteMessage(websocket.PongMessage, nil)
|
|
|
|
continue
|
|
|
|
}
|
2022-11-06 21:15:42 -03:00
|
|
|
|
2022-11-14 19:48:02 -03:00
|
|
|
if typ != websocket.TextMessage || len(message) == 0 || message[0] != '[' {
|
|
|
|
continue
|
|
|
|
}
|
2022-11-06 21:15:42 -03:00
|
|
|
|
2022-11-14 19:48:02 -03:00
|
|
|
var jsonMessage []json.RawMessage
|
|
|
|
err = json.Unmarshal(message, &jsonMessage)
|
|
|
|
if err != nil {
|
|
|
|
continue
|
|
|
|
}
|
2022-11-06 21:15:42 -03:00
|
|
|
|
2022-11-14 19:48:02 -03:00
|
|
|
if len(jsonMessage) < 2 {
|
2022-11-06 21:15:42 -03:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2023-03-18 08:39:31 -03:00
|
|
|
var command string
|
|
|
|
json.Unmarshal(jsonMessage[0], &command)
|
2022-11-14 19:48:02 -03:00
|
|
|
|
2023-03-18 08:39:31 -03:00
|
|
|
switch command {
|
2022-11-14 19:48:02 -03:00
|
|
|
case "NOTICE":
|
|
|
|
var content string
|
|
|
|
json.Unmarshal(jsonMessage[1], &content)
|
2023-02-05 20:03:00 -03:00
|
|
|
go func() {
|
|
|
|
r.Notices <- content
|
|
|
|
}()
|
2023-01-16 06:27:11 -05:00
|
|
|
case "AUTH":
|
|
|
|
var challenge string
|
|
|
|
json.Unmarshal(jsonMessage[1], &challenge)
|
|
|
|
go func() {
|
|
|
|
r.Challenges <- challenge
|
|
|
|
}()
|
2022-11-14 19:48:02 -03:00
|
|
|
case "EVENT":
|
|
|
|
if len(jsonMessage) < 3 {
|
2022-11-06 21:15:42 -03:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2023-03-18 08:39:31 -03:00
|
|
|
var subId string
|
|
|
|
json.Unmarshal(jsonMessage[1], &subId)
|
|
|
|
if subscription, ok := r.subscriptions.Load(subId); ok {
|
2022-11-14 19:48:02 -03:00
|
|
|
var event Event
|
|
|
|
json.Unmarshal(jsonMessage[2], &event)
|
|
|
|
|
|
|
|
// check signature of all received events, ignore invalid
|
2023-03-14 17:07:22 -03:00
|
|
|
if !r.AssumeValid {
|
|
|
|
if ok, err := event.CheckSignature(); !ok {
|
|
|
|
errmsg := ""
|
|
|
|
if err != nil {
|
|
|
|
errmsg = err.Error()
|
|
|
|
}
|
2023-03-18 08:39:31 -03:00
|
|
|
log.Printf("bad signature: %s\n", errmsg)
|
2023-03-14 17:07:22 -03:00
|
|
|
continue
|
2022-11-14 19:48:02 -03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// check if the event matches the desired filter, ignore otherwise
|
2023-01-15 07:19:00 -05:00
|
|
|
func() {
|
|
|
|
subscription.mutex.Lock()
|
|
|
|
defer subscription.mutex.Unlock()
|
|
|
|
if !subscription.Filters.Match(&event) || subscription.stopped {
|
|
|
|
return
|
|
|
|
}
|
2023-01-26 09:04:27 -03:00
|
|
|
subscription.Events <- &event
|
2023-01-15 07:19:00 -05:00
|
|
|
}()
|
2022-11-14 19:48:02 -03:00
|
|
|
}
|
|
|
|
case "EOSE":
|
|
|
|
if len(jsonMessage) < 2 {
|
2022-11-06 21:15:42 -03:00
|
|
|
continue
|
|
|
|
}
|
2023-03-18 08:39:31 -03:00
|
|
|
var subId string
|
|
|
|
json.Unmarshal(jsonMessage[1], &subId)
|
|
|
|
if subscription, ok := r.subscriptions.Load(subId); ok {
|
2022-11-16 10:07:15 -03:00
|
|
|
subscription.emitEose.Do(func() {
|
|
|
|
subscription.EndOfStoredEvents <- struct{}{}
|
|
|
|
})
|
2022-11-06 21:15:42 -03:00
|
|
|
}
|
2022-11-14 19:48:02 -03:00
|
|
|
case "OK":
|
|
|
|
if len(jsonMessage) < 3 {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
var (
|
|
|
|
eventId string
|
|
|
|
ok bool
|
2023-03-16 14:27:33 -03:00
|
|
|
msg string
|
2022-11-14 19:48:02 -03:00
|
|
|
)
|
|
|
|
json.Unmarshal(jsonMessage[1], &eventId)
|
|
|
|
json.Unmarshal(jsonMessage[2], &ok)
|
|
|
|
|
2023-03-16 14:27:33 -03:00
|
|
|
if len(jsonMessage) > 3 {
|
|
|
|
json.Unmarshal(jsonMessage[3], &msg)
|
|
|
|
}
|
|
|
|
|
2023-01-01 20:22:40 -03:00
|
|
|
if okCallback, exist := r.okCallbacks.Load(eventId); exist {
|
2023-03-16 14:27:33 -03:00
|
|
|
okCallback(ok, msg)
|
2022-11-12 21:49:57 -03:00
|
|
|
}
|
|
|
|
}
|
2022-11-06 21:15:42 -03:00
|
|
|
}
|
2023-03-16 14:15:16 -03:00
|
|
|
|
|
|
|
cancel()
|
2022-11-14 19:48:02 -03:00
|
|
|
}()
|
|
|
|
|
|
|
|
return nil
|
2022-11-06 21:15:42 -03:00
|
|
|
}
|
|
|
|
|
2023-01-16 06:27:11 -05:00
|
|
|
// Publish sends an "EVENT" command to the relay r as in NIP-01.
|
|
|
|
// Status can be: success, failed, or sent (no response from relay before ctx times out).
|
2023-03-16 14:27:33 -03:00
|
|
|
func (r *Relay) Publish(ctx context.Context, event Event) (Status, error) {
|
2023-02-05 13:44:26 +00:00
|
|
|
status := PublishStatusSent
|
2023-03-16 14:27:33 -03:00
|
|
|
var err error
|
2022-11-06 21:15:42 -03:00
|
|
|
|
2023-01-16 11:32:00 -05:00
|
|
|
// data races on status variable without this mutex
|
|
|
|
var mu sync.Mutex
|
|
|
|
|
2023-01-01 20:22:40 -03:00
|
|
|
if _, ok := ctx.Deadline(); !ok {
|
|
|
|
// if no timeout is set, force it to 3 seconds
|
|
|
|
var cancel context.CancelFunc
|
|
|
|
ctx, cancel = context.WithTimeout(ctx, 3*time.Second)
|
|
|
|
defer cancel()
|
|
|
|
}
|
|
|
|
|
|
|
|
// make it cancellable so we can stop everything upon receiving an "OK"
|
|
|
|
var cancel context.CancelFunc
|
|
|
|
ctx, cancel = context.WithCancel(ctx)
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
// listen for an OK callback
|
2023-03-16 14:27:33 -03:00
|
|
|
okCallback := func(ok bool, msg string) {
|
2023-01-16 11:32:00 -05:00
|
|
|
mu.Lock()
|
|
|
|
defer mu.Unlock()
|
2023-01-01 20:22:40 -03:00
|
|
|
if ok {
|
|
|
|
status = PublishStatusSucceeded
|
|
|
|
} else {
|
|
|
|
status = PublishStatusFailed
|
2023-03-16 14:27:33 -03:00
|
|
|
err = fmt.Errorf("msg: %s", msg)
|
2022-11-06 21:15:42 -03:00
|
|
|
}
|
2023-01-01 20:22:40 -03:00
|
|
|
cancel()
|
|
|
|
}
|
|
|
|
r.okCallbacks.Store(event.ID, okCallback)
|
|
|
|
defer r.okCallbacks.Delete(event.ID)
|
2022-11-06 21:15:42 -03:00
|
|
|
|
2023-01-01 20:22:40 -03:00
|
|
|
// publish event
|
2023-01-16 11:32:00 -05:00
|
|
|
if err := r.Connection.WriteJSON([]interface{}{"EVENT", event}); err != nil {
|
2023-03-16 14:27:33 -03:00
|
|
|
return status, err
|
2023-01-01 20:22:40 -03:00
|
|
|
}
|
|
|
|
|
|
|
|
sub := r.Subscribe(ctx, Filters{Filter{IDs: []string{event.ID}}})
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case receivedEvent := <-sub.Events:
|
2023-03-16 15:53:24 -03:00
|
|
|
if receivedEvent == nil {
|
|
|
|
// channel is closed
|
|
|
|
return status, err
|
|
|
|
}
|
|
|
|
|
2023-01-01 20:22:40 -03:00
|
|
|
if receivedEvent.ID == event.ID {
|
|
|
|
// we got a success, so update our status and proceed to return
|
2023-01-16 11:32:00 -05:00
|
|
|
mu.Lock()
|
2023-01-01 20:22:40 -03:00
|
|
|
status = PublishStatusSucceeded
|
2023-02-05 16:00:48 +00:00
|
|
|
mu.Unlock()
|
2023-03-16 14:27:33 -03:00
|
|
|
return status, err
|
2022-11-06 21:15:42 -03:00
|
|
|
}
|
2023-01-01 20:22:40 -03:00
|
|
|
case <-ctx.Done():
|
|
|
|
// return status as it was
|
|
|
|
// will proceed to return status as it is
|
|
|
|
// e.g. if this happens because of the timeout then status will probably be "failed"
|
|
|
|
// but if it happens because okCallback was called then it might be "succeeded"
|
2023-01-16 11:32:00 -05:00
|
|
|
// do not return if okCallback is in process
|
2023-03-16 14:27:33 -03:00
|
|
|
return status, err
|
2023-03-17 16:21:04 -03:00
|
|
|
case <-r.ConnectionContext.Done():
|
|
|
|
// same as above, but when the relay loses connectivity entirely
|
|
|
|
return status, err
|
2022-11-06 21:15:42 -03:00
|
|
|
}
|
2023-01-01 20:22:40 -03:00
|
|
|
}
|
2022-11-06 21:15:42 -03:00
|
|
|
}
|
|
|
|
|
2023-01-16 06:27:11 -05:00
|
|
|
// Auth sends an "AUTH" command client -> relay as in NIP-42.
|
|
|
|
// Status can be: success, failed, or sent (no response from relay before ctx times out).
|
2023-03-16 14:27:33 -03:00
|
|
|
func (r *Relay) Auth(ctx context.Context, event Event) (Status, error) {
|
2023-01-16 06:27:11 -05:00
|
|
|
status := PublishStatusFailed
|
2023-03-16 14:27:33 -03:00
|
|
|
var err error
|
2023-01-16 06:27:11 -05:00
|
|
|
|
|
|
|
// data races on status variable without this mutex
|
|
|
|
var mu sync.Mutex
|
|
|
|
|
|
|
|
if _, ok := ctx.Deadline(); !ok {
|
|
|
|
// if no timeout is set, force it to 3 seconds
|
|
|
|
var cancel context.CancelFunc
|
|
|
|
ctx, cancel = context.WithTimeout(ctx, 3*time.Second)
|
|
|
|
defer cancel()
|
|
|
|
}
|
|
|
|
|
|
|
|
// make it cancellable so we can stop everything upon receiving an "OK"
|
|
|
|
var cancel context.CancelFunc
|
|
|
|
ctx, cancel = context.WithCancel(ctx)
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
// listen for an OK callback
|
2023-03-16 14:27:33 -03:00
|
|
|
okCallback := func(ok bool, msg string) {
|
2023-01-16 06:27:11 -05:00
|
|
|
mu.Lock()
|
|
|
|
if ok {
|
|
|
|
status = PublishStatusSucceeded
|
|
|
|
} else {
|
|
|
|
status = PublishStatusFailed
|
2023-03-16 14:27:33 -03:00
|
|
|
err = fmt.Errorf("msg: %s", msg)
|
2023-01-16 06:27:11 -05:00
|
|
|
}
|
|
|
|
mu.Unlock()
|
|
|
|
cancel()
|
|
|
|
}
|
|
|
|
r.okCallbacks.Store(event.ID, okCallback)
|
|
|
|
defer r.okCallbacks.Delete(event.ID)
|
|
|
|
|
|
|
|
// send AUTH
|
|
|
|
if err := r.Connection.WriteJSON([]interface{}{"AUTH", event}); err != nil {
|
|
|
|
// status will be "failed"
|
2023-03-16 14:27:33 -03:00
|
|
|
return status, err
|
2023-01-16 06:27:11 -05:00
|
|
|
}
|
2023-01-16 11:32:00 -05:00
|
|
|
// use mu.Lock() just in case the okCallback got called, extremely unlikely.
|
|
|
|
mu.Lock()
|
|
|
|
status = PublishStatusSent
|
|
|
|
mu.Unlock()
|
|
|
|
|
2023-01-16 06:27:11 -05:00
|
|
|
// the context either times out, and the status is "sent"
|
|
|
|
// or the okCallback is called and the status is set to "succeeded" or "failed"
|
|
|
|
// NIP-42 does not mandate an "OK" reply to an "AUTH" message
|
|
|
|
<-ctx.Done()
|
|
|
|
mu.Lock()
|
|
|
|
defer mu.Unlock()
|
2023-03-16 14:27:33 -03:00
|
|
|
return status, err
|
2023-01-16 06:27:11 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// Subscribe sends a "REQ" command to the relay r as in NIP-01.
|
|
|
|
// Events are returned through the channel sub.Events.
|
|
|
|
// The subscription is closed when context ctx is cancelled ("CLOSE" in NIP-01).
|
2023-01-01 20:22:40 -03:00
|
|
|
func (r *Relay) Subscribe(ctx context.Context, filters Filters) *Subscription {
|
2022-11-14 19:48:02 -03:00
|
|
|
if r.Connection == nil {
|
|
|
|
panic(fmt.Errorf("must call .Connect() first before calling .Subscribe()"))
|
|
|
|
}
|
|
|
|
|
2022-11-19 14:00:29 -03:00
|
|
|
sub := r.PrepareSubscription()
|
|
|
|
sub.Filters = filters
|
2023-01-01 20:22:40 -03:00
|
|
|
sub.Fire(ctx)
|
|
|
|
|
2022-11-19 14:00:29 -03:00
|
|
|
return sub
|
|
|
|
}
|
|
|
|
|
2023-01-26 09:04:27 -03:00
|
|
|
func (r *Relay) QuerySync(ctx context.Context, filter Filter) []*Event {
|
2023-01-01 20:22:40 -03:00
|
|
|
sub := r.Subscribe(ctx, Filters{filter})
|
|
|
|
defer sub.Unsub()
|
|
|
|
|
|
|
|
if _, ok := ctx.Deadline(); !ok {
|
|
|
|
// if no timeout is set, force it to 3 seconds
|
|
|
|
var cancel context.CancelFunc
|
2023-03-18 08:39:31 -03:00
|
|
|
ctx, cancel = context.WithTimeout(ctx, 7*time.Second)
|
2023-01-01 20:22:40 -03:00
|
|
|
defer cancel()
|
|
|
|
}
|
|
|
|
|
2023-01-26 09:04:27 -03:00
|
|
|
var events []*Event
|
2022-11-26 19:32:03 -03:00
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case evt := <-sub.Events:
|
2023-03-16 15:53:24 -03:00
|
|
|
if evt == nil {
|
|
|
|
// channel is closed
|
|
|
|
return events
|
|
|
|
}
|
2022-11-26 19:32:03 -03:00
|
|
|
events = append(events, evt)
|
|
|
|
case <-sub.EndOfStoredEvents:
|
|
|
|
return events
|
2023-01-01 20:22:40 -03:00
|
|
|
case <-ctx.Done():
|
2022-11-26 19:32:03 -03:00
|
|
|
return events
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-11-19 14:00:29 -03:00
|
|
|
func (r *Relay) PrepareSubscription() *Subscription {
|
2023-03-17 16:43:48 -03:00
|
|
|
id := subscriptionIdCounter
|
|
|
|
subscriptionIdCounter++
|
2022-11-06 21:15:42 -03:00
|
|
|
|
2022-11-19 14:00:29 -03:00
|
|
|
sub := &Subscription{
|
2022-11-26 09:25:51 -03:00
|
|
|
Relay: r,
|
2022-11-14 19:48:02 -03:00
|
|
|
conn: r.Connection,
|
|
|
|
id: id,
|
2023-01-26 09:04:27 -03:00
|
|
|
Events: make(chan *Event),
|
2022-11-16 10:05:28 -03:00
|
|
|
EndOfStoredEvents: make(chan struct{}, 1),
|
2022-11-14 19:48:02 -03:00
|
|
|
}
|
2022-11-06 21:15:42 -03:00
|
|
|
|
2023-03-18 08:39:31 -03:00
|
|
|
r.subscriptions.Store(sub.GetID(), sub)
|
2022-11-19 14:00:29 -03:00
|
|
|
return sub
|
2022-11-06 21:15:42 -03:00
|
|
|
}
|
|
|
|
|
|
|
|
func (r *Relay) Close() error {
|
|
|
|
return r.Connection.Close()
|
|
|
|
}
|