From 9273a4b809006062efe4b376df505d6c67eb6943 Mon Sep 17 00:00:00 2001 From: fiatjaf Date: Fri, 8 Dec 2023 23:48:30 -0300 Subject: [PATCH] use a special context for each REQ stored-events handler that can be canceled. --- handlers.go | 12 ++++++++++-- 1 file changed, 10 insertions(+), 2 deletions(-) diff --git a/handlers.go b/handlers.go index 510479d..da22164 100644 --- a/handlers.go +++ b/handlers.go @@ -6,6 +6,7 @@ import ( "crypto/sha256" "encoding/hex" "encoding/json" + "fmt" "net/http" "strings" "sync" @@ -158,26 +159,33 @@ func (rl *Relay) HandleWebsocket(w http.ResponseWriter, r *http.Request) { eose := sync.WaitGroup{} eose.Add(len(env.Filters)) - reqCtx, cancel := context.WithCancelCause(ctx) + // a context just for the "stored events" request handler + reqCtx, cancelReqCtx := context.WithCancelCause(ctx) + // handle each filter separately -- dispatching events as they're loaded from databases for _, filter := range env.Filters { err := rl.handleRequest(reqCtx, env.SubscriptionID, &eose, ws, filter) if err != nil { + // fail everything if any filter is rejected reason := nostr.NormalizeOKMessage(err.Error(), "blocked") if isAuthRequired(reason) { ws.WriteJSON(nostr.AuthEnvelope{Challenge: &ws.Challenge}) } ws.WriteJSON(nostr.ClosedEnvelope{SubscriptionID: env.SubscriptionID, Reason: reason}) + cancelReqCtx(fmt.Errorf("filter rejected")) return } } go func() { + // when all events have been loaded from databases and dispatched + // we can cancel the context and fire the EOSE message eose.Wait() + cancelReqCtx(nil) ws.WriteJSON(nostr.EOSEEnvelope(env.SubscriptionID)) }() - setListener(env.SubscriptionID, ws, env.Filters, cancel) + setListener(env.SubscriptionID, ws, env.Filters, cancelReqCtx) case *nostr.CloseEnvelope: removeListenerId(ws, string(*env)) case *nostr.AuthEnvelope: