parent
bd2e18ad25
commit
d373279c96
|
|
@ -148,7 +148,7 @@ class EventFederationWorkerStore(EventsWorkerStore, SignatureWorkerStore, SQLBas
|
||||||
# B -´---------´
|
# B -´---------´
|
||||||
#
|
#
|
||||||
# and state sets {A} and {B} then walking the auth chains of A and B
|
# and state sets {A} and {B} then walking the auth chains of A and B
|
||||||
# would immediatley show that C is reachable by both. However, if we
|
# would immediately show that C is reachable by both. However, if we
|
||||||
# stopped at C then we'd only reach E via the auth chain of B and so E
|
# stopped at C then we'd only reach E via the auth chain of B and so E
|
||||||
# would errornously get included in the returned difference.
|
# would errornously get included in the returned difference.
|
||||||
#
|
#
|
||||||
|
|
@ -159,7 +159,7 @@ class EventFederationWorkerStore(EventsWorkerStore, SignatureWorkerStore, SQLBas
|
||||||
# lower depth are likely reachable by those with higher depths.
|
# lower depth are likely reachable by those with higher depths.
|
||||||
#
|
#
|
||||||
# We could use any ordering that we believe would give a rough
|
# We could use any ordering that we believe would give a rough
|
||||||
# toplogical ordfering, e.g. origin server timestamp. If the ordering
|
# topological ordering, e.g. origin server timestamp. If the ordering
|
||||||
# chosen is not topological then the algorithm still produces the right
|
# chosen is not topological then the algorithm still produces the right
|
||||||
# result, but perhaps a bit more inefficiently. This is why it is safe
|
# result, but perhaps a bit more inefficiently. This is why it is safe
|
||||||
# to use "depth" here.
|
# to use "depth" here.
|
||||||
|
|
|
||||||
|
|
@ -114,7 +114,7 @@ class EventFederationWorkerStoreTestCase(tests.unittest.HomeserverTestCase):
|
||||||
def test_auth_difference(self):
|
def test_auth_difference(self):
|
||||||
room_id = "@ROOM:local"
|
room_id = "@ROOM:local"
|
||||||
|
|
||||||
# The silly auth graph we use to test th eauth difference algorithm,
|
# The silly auth graph we use to test the auth difference algorithm,
|
||||||
# where the top are the most recent events.
|
# where the top are the most recent events.
|
||||||
#
|
#
|
||||||
# A B
|
# A B
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue