• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

realm / realm-core / github_pull_request_319175

19 May 2025 08:16PM UTC coverage: 91.119% (-0.02%) from 91.143%
github_pull_request_319175

Pull #8082

Evergreen

web-flow
Bump setuptools from 70.0.0 to 78.1.1 in /evergreen/hang_analyzer

Bumps [setuptools](https://github.com/pypa/setuptools) from 70.0.0 to 78.1.1.
- [Release notes](https://github.com/pypa/setuptools/releases)
- [Changelog](https://github.com/pypa/setuptools/blob/main/NEWS.rst)
- [Commits](https://github.com/pypa/setuptools/compare/v70.0.0...v78.1.1)

---
updated-dependencies:
- dependency-name: setuptools
  dependency-version: 78.1.1
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
Pull Request #8082: Bump setuptools from 70.0.0 to 78.1.1 in /evergreen/hang_analyzer

102788 of 181548 branches covered (56.62%)

217441 of 238634 relevant lines covered (91.12%)

5497200.53 hits per line

Source File
Press 'n' to go to next uncovered line, 'b' for previous

87.06
/test/object-store/util/test_file.cpp
1
////////////////////////////////////////////////////////////////////////////
2
//
3
// Copyright 2016 Realm Inc.
4
//
5
// Licensed under the Apache License, Version 2.0 (the "License");
6
// you may not use this file except in compliance with the License.
7
// You may obtain a copy of the License at
8
//
9
// http://www.apache.org/licenses/LICENSE-2.0
10
//
11
// Unless required by applicable law or agreed to in writing, software
12
// distributed under the License is distributed on an "AS IS" BASIS,
13
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14
// See the License for the specific language governing permissions and
15
// limitations under the License.
16
//
17
////////////////////////////////////////////////////////////////////////////
18

19
#include "util/test_file.hpp"
20

21
#include "util/test_utils.hpp"
22
#include "util/sync/baas_admin_api.hpp"
23
#include "util/sync/sync_test_utils.hpp"
24
#include "../util/crypt_key.hpp"
25
#include "../util/test_path.hpp"
26
#include "util/sync/sync_test_utils.hpp"
27

28
#include <realm/db.hpp>
29
#include <realm/disable_sync_to_disk.hpp>
30
#include <realm/history.hpp>
31
#include <realm/string_data.hpp>
32
#include <realm/object-store/impl/realm_coordinator.hpp>
33
#include <realm/util/base64.hpp>
34
#include <realm/util/file.hpp>
35

36
#if REALM_ENABLE_SYNC
37
#include <realm/object-store/sync/mongo_client.hpp>
38
#include <realm/object-store/sync/mongo_database.hpp>
39
#include <realm/object-store/sync/mongo_collection.hpp>
40
#include <realm/object-store/sync/sync_manager.hpp>
41
#include <realm/object-store/sync/sync_session.hpp>
42
#include <realm/object-store/sync/sync_user.hpp>
43
#include <realm/object-store/schema.hpp>
44
#endif
45

46
#include <cstdlib>
47
#include <iostream>
48

49
#ifdef _WIN32
50
#include <io.h>
51
#include <fcntl.h>
52

53
inline static int mkstemp(char* _template)
54
{
55
    return _open(_mktemp(_template), _O_CREAT | _O_TEMPORARY, _S_IREAD | _S_IWRITE);
56
}
57
#else
58
#include <unistd.h>
59
#endif
60

61
#if REALM_HAVE_CLANG_FEATURE(thread_sanitizer)
62
#include <condition_variable>
63
#include <functional>
64
#include <thread>
65
#include <map>
66
#endif
67

68
using namespace realm;
69

70
TestFile::TestFile()
71
{
10,077✔
72
    disable_sync_to_disk();
10,077✔
73
    m_temp_dir = util::make_temp_dir();
10,077✔
74
    path = (fs::path(m_temp_dir) / "realm.XXXXXX").string();
10,077✔
75
    if (const char* crypt_key = test_util::crypt_key()) {
10,077✔
76
        encryption_key = std::vector<char>(crypt_key, crypt_key + 64);
×
77
    }
×
78
    int fd = mkstemp(path.data());
10,077✔
79
    if (fd < 0) {
10,077✔
80
        int err = errno;
×
81
        throw std::system_error(err, std::system_category());
×
82
    }
×
83
#ifdef _WIN32
84
    _close(fd);
85
    _unlink(path.c_str());
86
#else // POSIX
87
    close(fd);
10,077✔
88
    unlink(path.c_str());
10,077✔
89
#endif
10,077✔
90

91
    schema_version = 0;
10,077✔
92
}
10,077✔
93

94
TestFile::~TestFile()
95
{
10,077✔
96
    if (!m_persist) {
10,077✔
97
        try {
9,989✔
98
            util::Logger::get_default_logger()->debug("~TestFile() removing '%1' and '%2'", path, m_temp_dir);
9,989✔
99
            util::File::try_remove(path);
9,989✔
100
            util::try_remove_dir_recursive(m_temp_dir);
9,989✔
101
        }
9,989✔
102
        catch (const std::exception& e) {
9,989✔
103
            util::Logger::get_default_logger()->warn("~TestFile() cleanup failed for '%1': %2", path, e.what());
×
104
            // clean up is best effort, ignored.
105
        }
×
106
    }
9,989✔
107
}
10,077✔
108

109
DBOptions TestFile::options() const
110
{
26✔
111
    DBOptions options;
26✔
112
    options.durability = in_memory ? DBOptions::Durability::MemOnly : DBOptions::Durability::Full;
26✔
113
    return options;
26✔
114
}
26✔
115

116
InMemoryTestFile::InMemoryTestFile()
117
{
8,628✔
118
    in_memory = true;
8,628✔
119
    schema_version = 0;
8,628✔
120
    encryption_key = std::vector<char>();
8,628✔
121
}
8,628✔
122

123
DBOptions InMemoryTestFile::options() const
124
{
×
125
    DBOptions options;
×
126
    options.durability = DBOptions::Durability::MemOnly;
×
127
    return options;
×
128
}
×
129

130
#if REALM_ENABLE_SYNC
131

132
static const std::string fake_refresh_token = ENCODE_FAKE_JWT("not_a_real_token");
133
static const std::string fake_access_token = ENCODE_FAKE_JWT("also_not_real");
134
static const std::string fake_device_id = "123400000000000000000000";
135

136
SyncTestFile::SyncTestFile(TestSyncManager& tsm, std::string name, std::string user_name)
137
    : SyncTestFile(tsm.fake_user(user_name), bson::Bson(name))
91✔
138
{
240✔
139
}
240✔
140

141
#if REALM_APP_SERVICES
142
SyncTestFile::SyncTestFile(OfflineAppSession& oas, std::string name)
143
    : SyncTestFile(oas.make_user(), bson::Bson(name))
1,829✔
144
{
3,658✔
145
}
3,658✔
146
#endif // REALM_APP_SERVICES
147

148
SyncTestFile::SyncTestFile(std::shared_ptr<SyncUser> user, bson::Bson partition, util::Optional<Schema> schema)
149
{
8,068✔
150
    REALM_ASSERT(user);
8,068✔
151
    sync_config = std::make_shared<realm::SyncConfig>(user, partition);
8,068✔
152
    sync_config->stop_policy = SyncSessionStopPolicy::Immediately;
8,068✔
153
    sync_config->error_handler = [](std::shared_ptr<SyncSession>, SyncError error) {
8,068✔
154
        util::format(std::cerr, "An unexpected sync error was caught by the default SyncTestFile handler: '%1'\n",
×
155
                     error.status);
×
156
        abort();
×
157
    };
×
158
    schema_version = 1;
8,068✔
159
    this->schema = std::move(schema);
8,068✔
160
    schema_mode = SchemaMode::AdditiveExplicit;
8,068✔
161
}
8,068✔
162

163
SyncTestFile::SyncTestFile(std::shared_ptr<SyncUser> user, bson::Bson partition,
164
                           realm::util::Optional<realm::Schema> schema,
165
                           std::function<SyncSessionErrorHandler>&& error_handler)
166
{
2✔
167
    REALM_ASSERT(user);
2✔
168
    sync_config = std::make_shared<realm::SyncConfig>(user, partition);
2✔
169
    sync_config->stop_policy = SyncSessionStopPolicy::Immediately;
2✔
170
    sync_config->error_handler = std::move(error_handler);
2✔
171
    schema_version = 1;
2✔
172
    this->schema = std::move(schema);
2✔
173
    schema_mode = SchemaMode::AdditiveExplicit;
2✔
174
}
2✔
175

176
SyncTestFile::SyncTestFile(std::shared_ptr<realm::SyncUser> user, realm::Schema _schema, SyncConfig::FLXSyncEnabled)
177
{
493✔
178
    REALM_ASSERT(user);
493✔
179
    sync_config = std::make_shared<realm::SyncConfig>(user, SyncConfig::FLXSyncEnabled{});
493✔
180
    sync_config->stop_policy = SyncSessionStopPolicy::Immediately;
493✔
181
    sync_config->error_handler = [](std::shared_ptr<SyncSession> session, SyncError error) {
493✔
182
        util::format(std::cerr,
×
183
                     "An unexpected sync error was caught by the default SyncTestFile handler: '%1' for '%2'",
×
184
                     error.status, session->path());
×
185
        abort();
×
186
    };
×
187
    schema_version = 0;
493✔
188
    schema = _schema;
493✔
189
    schema_mode = SchemaMode::AdditiveExplicit;
493✔
190
}
493✔
191

192
SyncTestFile::SyncTestFile(TestSyncManager& tsm, bson::Bson partition, Schema schema)
193
    : SyncTestFile(tsm.fake_user("test"), std::move(partition), std::move(schema))
194
{
×
195
}
×
196

197
// MARK: - SyncServer
198
SyncServer::SyncServer(const SyncServer::Config& config)
199
    : m_local_root_dir(config.local_dir.empty() ? util::make_temp_dir() : config.local_dir)
98✔
200
    , m_server(m_local_root_dir, util::none, ([&] {
250✔
201
                   using namespace std::literals::chrono_literals;
250✔
202

203
                   m_logger = util::Logger::get_default_logger();
250✔
204

205
                   sync::Server::Config c;
250✔
206
                   c.logger = m_logger;
250✔
207
                   c.token_expiration_clock = this;
250✔
208
                   c.listen_address = "127.0.0.1";
250✔
209
                   c.disable_sync_to_disk = true;
250✔
210
                   c.ssl = config.ssl;
250✔
211
                   if (c.ssl) {
250✔
212
                       c.ssl_certificate_path = test_util::get_test_resource_path() + "test_util_network_ssl_ca.pem";
2✔
213
                       c.ssl_certificate_key_path =
2✔
214
                           test_util::get_test_resource_path() + "test_util_network_ssl_key.pem";
2✔
215
                   }
2✔
216

217
                   return c;
250✔
218
               })())
250✔
219
{
250✔
220
    m_server.start();
250✔
221
    m_url = util::format("%1://127.0.0.1:%2", config.ssl ? "wss" : "ws", m_server.listen_endpoint().port());
250✔
222
    if (config.start_immediately)
250✔
223
        start();
189✔
224
}
250✔
225

226
SyncServer::~SyncServer()
227
{
250✔
228
    stop();
250✔
229
}
250✔
230

231
void SyncServer::start()
232
{
222✔
233
    REALM_ASSERT(!m_thread.joinable());
222✔
234
    m_thread = std::thread([this] {
222✔
235
        m_server.run();
222✔
236
    });
222✔
237
}
222✔
238

239
void SyncServer::stop()
240
{
300✔
241
    m_server.stop();
300✔
242
    if (m_thread.joinable())
300✔
243
        m_thread.join();
222✔
244
}
300✔
245

246
std::string SyncServer::url_for_realm(StringData realm_name) const
247
{
×
248
    return util::format("%1/%2", m_url, realm_name);
×
249
}
×
250

251
int SyncServer::port() const
252
{
20✔
253
    return static_cast<int>(m_server.listen_endpoint().port());
20✔
254
}
20✔
255

256
struct WaitForSessionState {
257
    std::condition_variable cv;
258
    std::mutex mutex;
259
    bool complete = false;
260
    Status status = Status::OK();
261
};
262

263
static Status wait_for_session(Realm& realm, void (SyncSession::*fn)(util::UniqueFunction<void(Status)>&&),
264
                               std::chrono::seconds timeout)
265
{
1,978✔
266
    auto shared_state = std::make_shared<WaitForSessionState>();
1,978✔
267
    auto& session = *realm.sync_session();
1,978✔
268
    auto delay = TEST_TIMEOUT_EXTRA > 0 ? timeout + std::chrono::seconds(TEST_TIMEOUT_EXTRA) : timeout;
1,978✔
269
    (session.*fn)([weak_state = std::weak_ptr<WaitForSessionState>(shared_state)](Status s) {
1,978✔
270
        auto shared_state = weak_state.lock();
1,978✔
271
        if (!shared_state) {
1,978✔
272
            return;
×
273
        }
×
274
        std::lock_guard<std::mutex> lock(shared_state->mutex);
1,978✔
275
        shared_state->complete = true;
1,978✔
276
        shared_state->status = s;
1,978✔
277
        shared_state->cv.notify_one();
1,978✔
278
    });
1,978✔
279
    std::unique_lock<std::mutex> lock(shared_state->mutex);
1,978✔
280
    bool completed = shared_state->cv.wait_for(lock, delay, [&]() {
3,956✔
281
        return shared_state->complete == true;
3,956✔
282
    });
3,956✔
283
    if (!completed) {
1,978✔
284
        throw std::runtime_error(util::format("wait_for_session() exceeded %1 s", delay.count()));
×
285
    }
×
286
    return shared_state->status;
1,978✔
287
}
1,978✔
288

289
bool wait_for_upload(Realm& realm, std::chrono::seconds timeout)
290
{
932✔
291
    return !wait_for_session(realm, &SyncSession::wait_for_upload_completion, timeout).is_ok();
932✔
292
}
932✔
293

294
bool wait_for_download(Realm& realm, std::chrono::seconds timeout)
295
{
1,046✔
296
    return !wait_for_session(realm, &SyncSession::wait_for_download_completion, timeout).is_ok();
1,046✔
297
}
1,046✔
298

299
#if REALM_APP_SERVICES
300
void set_app_config_defaults(app::AppConfig& app_config,
301
                             const std::shared_ptr<app::GenericNetworkTransport>& transport)
302
{
4,377✔
303
    if (!app_config.transport)
4,377✔
304
        app_config.transport = transport;
3,824✔
305
    if (app_config.device_info.platform_version.empty())
4,377✔
306
        app_config.device_info.platform_version = "Object Store Test Platform Version";
3,824✔
307
    if (app_config.device_info.sdk_version.empty())
4,377✔
308
        app_config.device_info.sdk_version = "SDK Version";
3,824✔
309
    if (app_config.device_info.sdk.empty())
4,377✔
310
        app_config.device_info.sdk = "SDK Name";
3,824✔
311
    if (app_config.device_info.device_name.empty())
4,377✔
312
        app_config.device_info.device_name = "Device Name";
3,824✔
313
    if (app_config.device_info.device_version.empty())
4,377✔
314
        app_config.device_info.device_version = "Device Version";
3,824✔
315
    if (app_config.device_info.framework_name.empty())
4,377✔
316
        app_config.device_info.framework_name = "Framework Name";
3,824✔
317
    if (app_config.device_info.framework_version.empty())
4,377✔
318
        app_config.device_info.framework_version = "Framework Version";
3,824✔
319
    if (app_config.device_info.bundle_id.empty())
4,377✔
320
        app_config.device_info.bundle_id = "Bundle Id";
3,824✔
321
    if (app_config.app_id.empty())
4,377✔
322
        app_config.app_id = "app_id";
3,824✔
323
    app_config.metadata_mode = app::AppConfig::MetadataMode::InMemory;
4,377✔
324
}
4,377✔
325
#endif // REALM_APP_SERVICES
326

327
// MARK: - TestAppSession
328

329
#if REALM_ENABLE_AUTH_TESTS
330

331
TestAppSession::TestAppSession()
332
    // Don't delete the global runtime app session
333
    : TestAppSession(get_runtime_app_session(), {}, DeleteApp{false})
65✔
334
{
130✔
335
}
130✔
336

337
TestAppSession::TestAppSession(AppSession session)
338
    : TestAppSession(session, {}, DeleteApp{true})
84✔
339
{
184✔
340
}
184✔
341

342
TestAppSession::TestAppSession(AppSession session, Config config, DeleteApp delete_app, bool delete_storage)
343
    : m_app_session(std::make_unique<AppSession>(session))
267✔
344
    , m_config(config)
267✔
345
    , m_delete_app(delete_app)
267✔
346
    , m_delete_storage(delete_storage)
267✔
347
{
553✔
348
    if (!m_config.storage_path || m_config.storage_path->empty()) {
553✔
349
        m_config.storage_path.emplace(util::make_temp_dir() + random_string(10));
551✔
350
    }
551✔
351
    REALM_ASSERT(m_config.storage_path);
553✔
352
    util::try_make_dir(*m_config.storage_path);
553✔
353

354
    if (!m_config.transport) {
553✔
355
        m_config.transport = instance_of<SynchronousTestTransport>;
320✔
356
    }
320✔
357
    realm::app::AppConfig app_config = get_config(m_config.transport, *m_app_session);
553✔
358
    set_app_config_defaults(app_config, m_config.transport);
553✔
359
    // If a base URL was provided, set it in the app config
360
    if (m_config.base_url) {
553✔
361
        app_config.base_url = *m_config.base_url;
×
362
    }
×
363
    app_config.base_file_path = *m_config.storage_path;
553✔
364
    app_config.metadata_mode = m_config.metadata_mode;
553✔
365
    app_config.sync_client_config.reconnect_mode = m_config.reconnect_mode;
553✔
366
    // With multiplexing enabled, the linger time controls how long a
367
    // connection is kept open for reuse. In tests, we want to shut
368
    // down sync clients immediately.
369
    app_config.sync_client_config.timeouts.connection_linger_time = 0;
553✔
370
    app_config.sync_client_config.socket_provider = m_config.socket_provider;
553✔
371
    if (m_config.logger) {
553✔
372
        app_config.sync_client_config.logger_factory = [logger = m_config.logger](util::Logger::Level) {
2✔
373
            return logger;
2✔
374
        };
2✔
375
    }
2✔
376

377
    m_app = app::App::get_app(app::App::CacheMode::Disabled, app_config);
553✔
378

379
    // initialize sync client
380
    m_app->sync_manager()->get_sync_client();
553✔
381
    // If no user creds are supplied, then create the user and log in
382
    if (!m_config.user_creds) {
553✔
383
        auto result = create_user_and_log_in();
551✔
384
        REALM_ASSERT(result.is_ok());
551✔
385
        m_config.user_creds = result.get_value();
551✔
386
    }
551✔
387
    // If creds are supplied, it is up to the caller to log in separately
388
}
553✔
389

390
TestAppSession::~TestAppSession()
391
{
553✔
392
    if (m_app) {
553✔
393
        m_app->sync_manager()->tear_down_for_testing();
553✔
394
        m_app.reset();
553✔
395
    }
553✔
396
    app::App::clear_cached_apps();
553✔
397
    // If the app session is being deleted or the config tells us to, delete the storage path
398
    if ((m_delete_app || m_delete_storage) && util::File::exists(*m_config.storage_path)) {
553✔
399
        try {
551✔
400
            util::try_remove_dir_recursive(*m_config.storage_path);
551✔
401
        }
551✔
402
        catch (const std::exception& ex) {
551✔
403
            std::cerr << "Error tearing down TestAppSession(" << m_app_session->config.app_name << "): " << ex.what()
×
404
                      << "\n";
×
405
        }
×
406
    }
551✔
407
    if (m_delete_app && m_app_session) {
553✔
408
        m_app_session->admin_api.delete_app(m_app_session->server_app_id);
393✔
409
    }
393✔
410
}
553✔
411

412
StatusWith<realm::app::AppCredentials> TestAppSession::create_user_and_log_in()
413
{
551✔
414
    REALM_ASSERT(m_app);
551✔
415
    AutoVerifiedEmailCredentials creds;
551✔
416
    auto pf = util::make_promise_future<void>();
551✔
417
    m_app->provider_client<app::App::UsernamePasswordProviderClient>().register_email(
551✔
418
        creds.email, creds.password,
551✔
419
        [this, &creds, promise = util::CopyablePromiseHolder<void>(std::move(pf.promise))](
551✔
420
            util::Optional<app::AppError> error) mutable {
551✔
421
            if (error) {
551✔
422
                promise.get_promise().set_error(error->to_status());
×
423
                return;
×
424
            }
×
425
            auto result = log_in_user(creds);
551✔
426
            if (!result.is_ok()) {
551✔
427
                promise.get_promise().set_error(result.get_status());
×
428
                return;
×
429
            }
×
430
            promise.get_promise().emplace_value();
551✔
431
        });
551✔
432
    auto result = pf.future.get_no_throw();
551✔
433
    if (!result.is_ok()) {
551✔
434
        return result;
×
435
    }
×
436
    return creds;
551✔
437
}
551✔
438

439
StatusWith<std::shared_ptr<realm::SyncUser>>
440
TestAppSession::log_in_user(std::optional<realm::app::AppCredentials> user_creds)
441
{
551✔
442
    REALM_ASSERT(m_app);
551✔
443
    REALM_ASSERT((user_creds || m_config.user_creds));
551✔
444
    auto pf = util::make_promise_future<std::shared_ptr<realm::SyncUser>>();
551✔
445
    m_app->log_in_with_credentials(
551✔
446
        *user_creds, [promise = util::CopyablePromiseHolder<std::shared_ptr<realm::SyncUser>>(std::move(pf.promise))](
551✔
447
                         std::shared_ptr<realm::SyncUser> user, util::Optional<app::AppError> error) mutable {
551✔
448
            if (error) {
551✔
449
                promise.get_promise().set_error(error->to_status());
×
450
                return;
×
451
            }
×
452
            promise.get_promise().emplace_value(user);
551✔
453
        });
551✔
454
    return pf.future.get_no_throw();
551✔
455
}
551✔
456

457
std::vector<bson::BsonDocument> TestAppSession::get_documents(app::User& user, const std::string& object_type,
458
                                                              size_t expected_count) const
459
{
27✔
460
    app::MongoClient remote_client = user.mongo_client("BackingDB");
27✔
461
    app::MongoDatabase db = remote_client.db(m_app_session->config.mongo_dbname);
27✔
462
    app::MongoCollection collection = db[object_type];
27✔
463
    int sleep_time = 10;
27✔
464
    timed_wait_for(
27✔
465
        [&] {
118✔
466
            uint64_t count = 0;
118✔
467
            collection.count({}, [&](uint64_t c, util::Optional<app::AppError> error) {
118✔
468
                REQUIRE(!error);
118!
469
                count = c;
118✔
470
            });
118✔
471
            if (count < expected_count) {
118✔
472
                // querying the server too frequently makes it take longer to process the sync changesets we're
473
                // waiting for
474
                millisleep(sleep_time);
60✔
475
                if (sleep_time < 500) {
60✔
476
                    sleep_time *= 2;
55✔
477
                }
55✔
478
                return false;
60✔
479
            }
60✔
480
            return true;
58✔
481
        },
118✔
482
        std::chrono::minutes(5));
27✔
483

484
    std::vector<bson::BsonDocument> documents;
27✔
485
    collection.find({}, {}, [&](util::Optional<bson::BsonArray>&& result, util::Optional<app::AppError> error) {
27✔
486
        REQUIRE(result);
27!
487
        REQUIRE(!error);
27!
488
        REQUIRE(result->size() == expected_count);
27!
489
        documents.reserve(result->size());
27✔
490
        for (auto&& bson : *result) {
2,345✔
491
            REQUIRE(bson.type() == bson::Bson::Type::Document);
2,345!
492
            documents.push_back(std::move(static_cast<const bson::BsonDocument&>(bson)));
2,345✔
493
        }
2,345✔
494
    });
27✔
495
    return documents;
27✔
496
}
27✔
497
#endif // REALM_ENABLE_AUTH_TESTS
498

499
// MARK: - TestSyncManager
500

501
TestSyncManager::Config::Config() {}
244✔
502

503
TestSyncManager::TestSyncManager(const Config& config, const SyncServer::Config& sync_server_config)
504
    : m_sync_manager(SyncManager::create(SyncClientConfig()))
95✔
505
    , m_sync_server(sync_server_config)
95✔
506
    , m_base_file_path(config.base_path.empty() ? util::make_temp_dir() : config.base_path)
95✔
507
    , m_should_teardown_test_directory(config.should_teardown_test_directory)
95✔
508
{
244✔
509
    util::try_make_dir(m_base_file_path);
244✔
510

511
    m_sync_manager->set_sync_route(m_sync_server.base_url() + "/realm-sync", true);
244✔
512
    if (config.start_sync_client) {
244✔
513
        m_sync_manager->get_sync_client();
240✔
514
    }
240✔
515
}
244✔
516

517
TestSyncManager::~TestSyncManager()
518
{
244✔
519
    if (m_should_teardown_test_directory) {
244✔
520
        if (!m_base_file_path.empty() && util::File::exists(m_base_file_path)) {
244✔
521
            try {
244✔
522
                m_sync_manager->tear_down_for_testing();
244✔
523
                util::try_remove_dir_recursive(m_base_file_path);
244✔
524
            }
244✔
525
            catch (const std::exception& ex) {
244✔
526
                std::cerr << ex.what() << "\n";
×
527
            }
×
528
#if REALM_APP_SERVICES
244✔
529
            app::App::clear_cached_apps();
244✔
530
#endif // REALM_APP_SERVICES
244✔
531
        }
244✔
532
    }
244✔
533
}
244✔
534

535
std::shared_ptr<TestUser> TestSyncManager::fake_user(const std::string& name)
536
{
330✔
537
    auto user = std::make_shared<TestUser>(name, m_sync_manager);
330✔
538
    user->m_access_token = fake_access_token;
330✔
539
    user->m_refresh_token = fake_refresh_token;
330✔
540
    return user;
330✔
541
}
330✔
542

543
#if REALM_APP_SERVICES
544
OfflineAppSession::Config::Config(std::shared_ptr<realm::app::GenericNetworkTransport> t)
545
    : transport(t)
1,890✔
546
{
3,780✔
547
}
3,780✔
548

549
OfflineAppSession::OfflineAppSession(OfflineAppSession::Config config)
550
    : m_transport(std::move(config.transport))
1,897✔
551
    , m_delete_storage(config.delete_storage)
1,897✔
552
{
3,794✔
553
    REALM_ASSERT(m_transport);
3,794✔
554
    set_app_config_defaults(m_app_config, m_transport);
3,794✔
555

556
    if (config.storage_path) {
3,794✔
557
        m_base_file_path = *config.storage_path;
28✔
558
        util::try_make_dir(m_base_file_path);
28✔
559
    }
28✔
560
    else {
3,766✔
561
        m_base_file_path = util::make_temp_dir();
3,766✔
562
    }
3,766✔
563

564
    m_app_config.base_file_path = m_base_file_path;
3,794✔
565
    m_app_config.metadata_mode = config.metadata_mode;
3,794✔
566
    if (config.base_url) {
3,794✔
567
        m_app_config.base_url = *config.base_url;
42✔
568
    }
42✔
569
    if (config.app_id) {
3,794✔
570
        m_app_config.app_id = *config.app_id;
×
571
    }
×
572
    m_app_config.sync_client_config.socket_provider = config.socket_provider;
3,794✔
573
    m_app = app::App::get_app(app::App::CacheMode::Disabled, m_app_config);
3,794✔
574
}
3,794✔
575

576
OfflineAppSession::~OfflineAppSession()
577
{
3,794✔
578
    if (util::File::exists(m_base_file_path) && m_delete_storage) {
3,794✔
579
        try {
3,780✔
580
            m_app->sync_manager()->tear_down_for_testing();
3,780✔
581
            util::try_remove_dir_recursive(m_base_file_path);
3,780✔
582
        }
3,780✔
583
        catch (const std::exception& ex) {
3,780✔
584
            std::cerr << ex.what() << "\n";
×
585
        }
×
586
        app::App::clear_cached_apps();
3,780✔
587
    }
3,780✔
588
}
3,794✔
589

590
std::shared_ptr<realm::app::User> OfflineAppSession::make_user() const
591
{
3,726✔
592
    create_user_and_log_in(app());
3,726✔
593
    return app()->current_user();
3,726✔
594
}
3,726✔
595

596
#endif // REALM_APP_SERVICES
597
#endif // REALM_ENABLE_SYNC
598

599
#if REALM_HAVE_CLANG_FEATURE(thread_sanitizer)
600
// MARK: - TsanNotifyWorker
601
// A helper which synchronously runs on_change() on a fixed background thread
602
// so that ThreadSanitizer can potentially detect issues
603
// This deliberately uses an unsafe spinlock for synchronization to ensure that
604
// the code being tested has to supply all required safety
605
static class TsanNotifyWorker {
606
public:
607
    TsanNotifyWorker()
608
    {
609
        m_thread = std::thread([&] {
610
            work();
611
        });
612
    }
613

614
    void work()
615
    {
616
        while (true) {
617
            auto value = m_signal.load(std::memory_order_relaxed);
618
            if (value == 0 || value == 1)
619
                continue;
620
            if (value == 2)
621
                return;
622

623
            if (value & 1) {
624
                // Synchronize on the first handover of a given coordinator.
625
                value &= ~1;
626
                m_signal.load();
627
            }
628

629
            auto c = reinterpret_cast<_impl::RealmCoordinator*>(value);
630
            c->on_change();
631
            m_signal.store(1, std::memory_order_relaxed);
632
        }
633
    }
634

635
    ~TsanNotifyWorker()
636
    {
637
        m_signal = 2;
638
        m_thread.join();
639
    }
640

641
    void on_change(const std::shared_ptr<_impl::RealmCoordinator>& c)
642
    {
643
        auto& it = m_published_coordinators[c.get()];
644
        if (it.lock()) {
645
            m_signal.store(reinterpret_cast<uintptr_t>(c.get()), std::memory_order_relaxed);
646
        }
647
        else {
648
            // Synchronize on the first handover of a given coordinator.
649
            it = c;
650
            m_signal = reinterpret_cast<uintptr_t>(c.get()) | 1;
651
        }
652

653
        while (m_signal.load(std::memory_order_relaxed) != 1)
654
            ;
655
    }
656

657
private:
658
    std::atomic<uintptr_t> m_signal{0};
659
    std::thread m_thread;
660
    std::map<_impl::RealmCoordinator*, std::weak_ptr<_impl::RealmCoordinator>> m_published_coordinators;
661
} s_worker;
662

663
void on_change_but_no_notify(Realm& realm)
664
{
665
    s_worker.on_change(_impl::RealmCoordinator::get_existing_coordinator(realm.config().path));
666
}
667

668
void advance_and_notify(Realm& realm)
669
{
670
    on_change_but_no_notify(realm);
671
    realm.notify();
672
}
673

674
#else // REALM_HAVE_CLANG_FEATURE(thread_sanitizer)
675

676
void on_change_but_no_notify(Realm& realm)
677
{
25,047✔
678
    _impl::RealmCoordinator::get_coordinator(realm.config().path)->on_change();
25,047✔
679
}
25,047✔
680

681
void advance_and_notify(Realm& realm)
682
{
17,320✔
683
    on_change_but_no_notify(realm);
17,320✔
684
    realm.notify();
17,320✔
685
}
17,320✔
686
#endif
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2025 Coveralls, Inc