go get github.com/thejerf/abtime
A library for abstracting away from the literal Go time library and the context's cancellation and timeout libraries, for testing and time control.
In any code that seriously uses time, such as billing or scheduling code, best software engineering practices are that you should not directly access the operating system time. This module provides you with code to implement that principle in Go.
See some discussions:
This module is fully covered with godoc, including examples, usage, and everything else you might expect from a README.md on GitHub. (DRY.)
Most if not all other time testing abstractions for Go attempt to simulate the passage of time itself. That is, you can set a Timer for a second from now, then, you tell the time replacement module that one second has passed, and it will trigger the timer at that point.
That is indeed simpler for simple use cases than what I have here, and permits a drop-in interface replacement for the whole module. However, it does not permit you to test all scenarios, because it is built on a fundamentally false premise, which is that time is a monotonic, agreed-upon value for all goroutines. That is not how goroutines "perceive" time.
In reality, if you give one goroutine a timer for 1 second in the future, and another goroutine a timer for 1.1 seconds in the future, it is entirely possible for the second goroutine to entirely finish its execution before the first one even gets woken up. (The first goroutine may well have had its timer triggered, but then immediately descheduled for whatever reason, while the second runs to completion.)
Proper testing of complex time-dependent multi-goroutine coordination requires deeper levels of control than a compatible API can offer. This package takes the hit of having to add unique IDs to timers and tickers in order to permit a deeper level of testing, as proper testing of time-sensitive code must be able to consider the case where events in different goroutines happen "out of order", because they will.
If you only have one goroutine using time-based code then this package may be overkill. However, if you have multiple goroutines interacting with each other while also referring to the clock, you may find this package is worthwhile as it will permit you to set up important test scenarios that drop-in replacements for the time package simply can not express.
- 1.0.7:
- Fixups in the internal registration of triggerable events.
- Added wrappers around context.WithTimeout and context.WithCancel that allow controlled cancellation of contexts like the rest of time-based code.
- 1.0.6:
- Manual timer needs to reflect whether it was stopped, not that it was stopped.
- This also cleans up some of the concurrency. This was one of my earlier libraries. The place where a goroutine is spawned to perform the various triggered actions should now be more correct.
- 1.0.5:
- (INCORRECT) The manual timer is ALWAYS successfully stopped by a Stop call, so .Stop must always return true.
- 1.0.4:
- Add ticker.Reset for Go 1.15. This version requires Go 1.15.
- Add proper go module support.
- 1.0.3:
- Fix locking for Unregister and UnregisterAll.
- 1.0.2
-
Adds support for unregistering triggers, so the ids can be reused with the same abtime object.
As the godoc says, this is a sign of some sort of flaw, but it is not yet clear how to handle it. I still haven't found a good option for an API for this stuff. My original goal with abtime was to be as close to the original
time
API as possible, I'm considering abandoning that. Though I still don't know what exactly that would look like.(Plus, this need some sort of context support now.)
-
- 1.0.1
- Issue 3 reports a reversal in the sense of the timer.Reset return value, which is fixed. While fixing this, a race condition in setting the underlying value was also fixed.
- 1.0.0
- Initial Release.
As I have been using this code for a while now and it has stopped changing, this is now at version 1.0.0.
Starting with the commit after 3003eee879c, I will be signing this repository with the "jerf" keybase account. If you are viewing this repository through GitHub, you should see the commits as showing as "verified" in the commit view.
(Bear in mind that due to the nature of how git commit signing works, there may be runs of unverified commits; what matters is that the top one is signed.)