2018-06-06 21:41:01 +03:00
|
|
|
import asyncio
|
2018-09-29 13:20:26 +03:00
|
|
|
import collections
|
2018-06-06 21:41:01 +03:00
|
|
|
import logging
|
|
|
|
|
2018-10-01 10:58:53 +03:00
|
|
|
from . import authenticator
|
2018-09-29 11:58:45 +03:00
|
|
|
from .mtprotolayer import MTProtoLayer
|
2018-10-01 10:58:53 +03:00
|
|
|
from .mtprotoplainsender import MTProtoPlainSender
|
2018-09-29 13:48:50 +03:00
|
|
|
from .requeststate import RequestState
|
2018-10-05 14:23:38 +03:00
|
|
|
from ..tl.tlobject import TLRequest
|
2018-06-09 12:34:01 +03:00
|
|
|
from .. import utils
|
2018-06-07 17:32:12 +03:00
|
|
|
from ..errors import (
|
2018-10-02 09:55:46 +03:00
|
|
|
BadMessageError, BrokenAuthKeyError, SecurityError, TypeNotFoundError,
|
2018-10-03 15:46:10 +03:00
|
|
|
InvalidChecksumError, rpc_message_to_error
|
2018-06-07 17:32:12 +03:00
|
|
|
)
|
2018-06-06 21:41:01 +03:00
|
|
|
from ..extensions import BinaryReader
|
2018-09-29 14:29:44 +03:00
|
|
|
from ..helpers import _ReadyQueue
|
2018-06-09 14:11:49 +03:00
|
|
|
from ..tl.core import RpcResult, MessageContainer, GzipPacked
|
2018-06-07 12:51:09 +03:00
|
|
|
from ..tl.functions.auth import LogOutRequest
|
2018-06-06 21:41:01 +03:00
|
|
|
from ..tl.types import (
|
|
|
|
MsgsAck, Pong, BadServerSalt, BadMsgNotification, FutureSalts,
|
2018-06-14 17:23:16 +03:00
|
|
|
MsgNewDetailedInfo, NewSessionCreated, MsgDetailedInfo, MsgsStateReq,
|
2018-08-20 12:42:51 +03:00
|
|
|
MsgsStateInfo, MsgsAllInfo, MsgResendReq, upload
|
2018-06-06 21:41:01 +03:00
|
|
|
)
|
2018-10-05 21:25:49 +03:00
|
|
|
from ..utils import AsyncClassWrapper
|
2018-06-06 21:41:01 +03:00
|
|
|
|
|
|
|
__log__ = logging.getLogger(__name__)
|
|
|
|
|
|
|
|
|
|
|
|
class MTProtoSender:
|
2018-06-07 12:51:09 +03:00
|
|
|
"""
|
|
|
|
MTProto Mobile Protocol sender
|
|
|
|
(https://core.telegram.org/mtproto/description).
|
|
|
|
|
|
|
|
This class is responsible for wrapping requests into `TLMessage`'s,
|
|
|
|
sending them over the network and receiving them in a safe manner.
|
|
|
|
|
|
|
|
Automatic reconnection due to temporary network issues is a concern
|
|
|
|
for this class as well, including retry of messages that could not
|
|
|
|
be sent successfully.
|
|
|
|
|
|
|
|
A new authorization key will be generated on connection if no other
|
|
|
|
key exists yet.
|
|
|
|
"""
|
2018-10-01 15:20:50 +03:00
|
|
|
def __init__(self, loop, *,
|
2018-10-04 17:39:57 +03:00
|
|
|
retries=5, auto_reconnect=True, connect_timeout=None,
|
|
|
|
update_callback=None,
|
2018-06-27 20:40:32 +03:00
|
|
|
auth_key_callback=None, auto_reconnect_callback=None):
|
2018-09-29 11:58:45 +03:00
|
|
|
self._connection = None # MTProtoLayer, a.k.a. encrypted connection
|
2018-06-14 20:35:12 +03:00
|
|
|
self._loop = loop
|
2018-06-08 21:50:53 +03:00
|
|
|
self._retries = retries
|
2018-06-18 19:11:16 +03:00
|
|
|
self._auto_reconnect = auto_reconnect
|
2018-10-04 17:39:57 +03:00
|
|
|
self._connect_timeout = connect_timeout
|
2018-06-09 22:03:48 +03:00
|
|
|
self._update_callback = update_callback
|
2018-06-27 11:15:59 +03:00
|
|
|
self._auth_key_callback = auth_key_callback
|
2018-06-27 20:40:32 +03:00
|
|
|
self._auto_reconnect_callback = auto_reconnect_callback
|
2018-06-07 12:51:09 +03:00
|
|
|
|
|
|
|
# Whether the user has explicitly connected or disconnected.
|
|
|
|
#
|
|
|
|
# If a disconnection happens for any other reason and it
|
|
|
|
# was *not* user action then the pending messages won't
|
|
|
|
# be cleared but on explicit user disconnection all the
|
|
|
|
# pending futures should be cancelled.
|
2018-06-06 21:41:01 +03:00
|
|
|
self._user_connected = False
|
2018-06-08 21:41:48 +03:00
|
|
|
self._reconnecting = False
|
2018-06-17 20:29:41 +03:00
|
|
|
self._disconnected = None
|
2018-06-06 21:41:01 +03:00
|
|
|
|
2018-06-06 22:42:48 +03:00
|
|
|
# We need to join the loops upon disconnection
|
|
|
|
self._send_loop_handle = None
|
|
|
|
self._recv_loop_handle = None
|
|
|
|
|
2018-09-29 13:20:26 +03:00
|
|
|
# Outgoing messages are put in a queue and sent in a batch.
|
|
|
|
# Note that here we're also storing their ``_RequestState``.
|
|
|
|
# Note that it may also store lists (implying order must be kept).
|
2018-09-29 14:29:44 +03:00
|
|
|
self._send_queue = _ReadyQueue(self._loop)
|
2018-06-06 21:41:01 +03:00
|
|
|
|
2018-09-29 13:20:26 +03:00
|
|
|
# Sent states are remembered until a response is received.
|
|
|
|
self._pending_state = {}
|
2018-06-06 21:41:01 +03:00
|
|
|
|
2018-09-29 13:20:26 +03:00
|
|
|
# Responses must be acknowledged, and we can also batch these.
|
2018-06-06 21:41:01 +03:00
|
|
|
self._pending_ack = set()
|
|
|
|
|
2018-09-29 13:20:26 +03:00
|
|
|
# Similar to pending_messages but only for the last acknowledges.
|
|
|
|
# These can't go in pending_messages because no acknowledge for them
|
|
|
|
# is received, but we may still need to resend their state on bad salts.
|
|
|
|
self._last_acks = collections.deque(maxlen=10)
|
2018-06-20 12:12:04 +03:00
|
|
|
|
2018-06-06 21:41:01 +03:00
|
|
|
# Jump table from response ID to method that handles it
|
|
|
|
self._handlers = {
|
2018-06-09 14:11:49 +03:00
|
|
|
RpcResult.CONSTRUCTOR_ID: self._handle_rpc_result,
|
2018-06-06 21:41:01 +03:00
|
|
|
MessageContainer.CONSTRUCTOR_ID: self._handle_container,
|
|
|
|
GzipPacked.CONSTRUCTOR_ID: self._handle_gzip_packed,
|
|
|
|
Pong.CONSTRUCTOR_ID: self._handle_pong,
|
|
|
|
BadServerSalt.CONSTRUCTOR_ID: self._handle_bad_server_salt,
|
|
|
|
BadMsgNotification.CONSTRUCTOR_ID: self._handle_bad_notification,
|
|
|
|
MsgDetailedInfo.CONSTRUCTOR_ID: self._handle_detailed_info,
|
|
|
|
MsgNewDetailedInfo.CONSTRUCTOR_ID: self._handle_new_detailed_info,
|
|
|
|
NewSessionCreated.CONSTRUCTOR_ID: self._handle_new_session_created,
|
|
|
|
MsgsAck.CONSTRUCTOR_ID: self._handle_ack,
|
2018-06-14 17:23:16 +03:00
|
|
|
FutureSalts.CONSTRUCTOR_ID: self._handle_future_salts,
|
|
|
|
MsgsStateReq.CONSTRUCTOR_ID: self._handle_state_forgotten,
|
|
|
|
MsgResendReq.CONSTRUCTOR_ID: self._handle_state_forgotten,
|
|
|
|
MsgsAllInfo.CONSTRUCTOR_ID: self._handle_msg_all,
|
2018-06-06 21:41:01 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
# Public API
|
|
|
|
|
2018-10-01 15:20:50 +03:00
|
|
|
async def connect(self, auth_key, connection):
|
2018-06-07 12:51:09 +03:00
|
|
|
"""
|
2018-10-01 15:20:50 +03:00
|
|
|
Connects to the specified given connection using the given auth key.
|
2018-06-07 12:51:09 +03:00
|
|
|
"""
|
|
|
|
if self._user_connected:
|
2018-06-08 22:13:14 +03:00
|
|
|
__log__.info('User is already connected!')
|
2018-06-07 12:51:09 +03:00
|
|
|
return
|
|
|
|
|
2018-10-01 15:20:50 +03:00
|
|
|
self._connection = MTProtoLayer(connection, auth_key)
|
2018-06-06 22:42:48 +03:00
|
|
|
self._user_connected = True
|
2018-06-08 21:41:48 +03:00
|
|
|
await self._connect()
|
|
|
|
|
2018-06-09 22:03:48 +03:00
|
|
|
def is_connected(self):
|
|
|
|
return self._user_connected
|
|
|
|
|
2018-06-06 21:41:01 +03:00
|
|
|
async def disconnect(self):
|
2018-06-07 12:51:09 +03:00
|
|
|
"""
|
|
|
|
Cleanly disconnects the instance from the network, cancels
|
|
|
|
all pending requests, and closes the send and receive loops.
|
|
|
|
"""
|
2018-10-05 14:23:38 +03:00
|
|
|
self._disconnect()
|
2018-06-17 12:41:35 +03:00
|
|
|
|
2018-06-09 16:26:13 +03:00
|
|
|
def send(self, request, ordered=False):
|
2018-06-07 11:30:20 +03:00
|
|
|
"""
|
2018-09-29 13:20:26 +03:00
|
|
|
This method enqueues the given request to be sent. Its send
|
|
|
|
state will be saved until a response arrives, and a ``Future``
|
|
|
|
that will be resolved when the response arrives will be returned:
|
2018-06-07 11:30:20 +03:00
|
|
|
|
|
|
|
.. code-block:: python
|
|
|
|
|
|
|
|
async def method():
|
|
|
|
# Sending (enqueued for the send loop)
|
2018-06-09 16:26:13 +03:00
|
|
|
future = sender.send(request)
|
2018-06-07 11:30:20 +03:00
|
|
|
# Receiving (waits for the receive loop to read the result)
|
|
|
|
result = await future
|
|
|
|
|
|
|
|
Designed like this because Telegram may send the response at
|
|
|
|
any point, and it can send other items while one waits for it.
|
|
|
|
Once the response for this future arrives, it is set with the
|
|
|
|
received result, quite similar to how a ``receive()`` call
|
|
|
|
would otherwise work.
|
|
|
|
|
|
|
|
Since the receiving part is "built in" the future, it's
|
|
|
|
impossible to await receive a result that was never sent.
|
|
|
|
"""
|
2018-06-17 21:25:22 +03:00
|
|
|
if not self._user_connected:
|
|
|
|
raise ConnectionError('Cannot send requests while disconnected')
|
|
|
|
|
2018-09-29 13:20:26 +03:00
|
|
|
if not utils.is_list_like(request):
|
|
|
|
state = RequestState(request, self._loop)
|
2018-09-29 13:48:50 +03:00
|
|
|
self._send_queue.append(state)
|
2018-09-29 13:20:26 +03:00
|
|
|
return state.future
|
2018-06-07 15:02:55 +03:00
|
|
|
else:
|
2018-09-29 13:20:26 +03:00
|
|
|
states = []
|
|
|
|
futures = []
|
|
|
|
for req in request:
|
|
|
|
state = RequestState(req, self._loop)
|
|
|
|
states.append(state)
|
|
|
|
futures.append(state.future)
|
|
|
|
if ordered:
|
2018-09-29 13:48:50 +03:00
|
|
|
self._send_queue.append(states)
|
2018-09-29 13:20:26 +03:00
|
|
|
else:
|
2018-09-29 13:48:50 +03:00
|
|
|
self._send_queue.extend(states)
|
|
|
|
|
2018-09-29 13:20:26 +03:00
|
|
|
return futures
|
2018-06-06 21:41:01 +03:00
|
|
|
|
2018-06-17 20:29:41 +03:00
|
|
|
@property
|
|
|
|
def disconnected(self):
|
|
|
|
"""
|
|
|
|
Future that resolves when the connection to Telegram
|
|
|
|
ends, either by user action or in the background.
|
|
|
|
"""
|
|
|
|
if self._disconnected is not None:
|
2018-06-18 16:55:24 +03:00
|
|
|
return asyncio.shield(self._disconnected, loop=self._loop)
|
2018-06-17 20:29:41 +03:00
|
|
|
else:
|
|
|
|
raise ConnectionError('Sender was never connected')
|
|
|
|
|
2018-06-08 22:18:15 +03:00
|
|
|
# Private methods
|
|
|
|
|
|
|
|
async def _connect(self):
|
|
|
|
"""
|
|
|
|
Performs the actual connection, retrying, generating the
|
|
|
|
authorization key if necessary, and starting the send and
|
|
|
|
receive loops.
|
|
|
|
"""
|
2018-09-29 11:58:45 +03:00
|
|
|
__log__.info('Connecting to %s...', self._connection)
|
2018-06-08 22:18:15 +03:00
|
|
|
for retry in range(1, self._retries + 1):
|
|
|
|
try:
|
|
|
|
__log__.debug('Connection attempt {}...'.format(retry))
|
2018-10-04 17:39:57 +03:00
|
|
|
await self._connection.connect(timeout=self._connect_timeout)
|
|
|
|
except (OSError, asyncio.TimeoutError) as e:
|
2018-06-15 10:57:32 +03:00
|
|
|
__log__.warning('Attempt {} at connecting failed: {}: {}'
|
|
|
|
.format(retry, type(e).__name__, e))
|
2018-06-08 22:18:15 +03:00
|
|
|
else:
|
|
|
|
break
|
|
|
|
else:
|
2018-06-17 12:41:35 +03:00
|
|
|
raise ConnectionError('Connection to Telegram failed {} times'
|
|
|
|
.format(self._retries))
|
2018-06-08 22:18:15 +03:00
|
|
|
|
|
|
|
__log__.debug('Connection success!')
|
2018-10-01 10:58:53 +03:00
|
|
|
state = self._connection._state
|
|
|
|
if state.auth_key is None:
|
|
|
|
plain = MTProtoPlainSender(self._connection._connection)
|
2018-06-08 22:18:15 +03:00
|
|
|
for retry in range(1, self._retries + 1):
|
|
|
|
try:
|
|
|
|
__log__.debug('New auth_key attempt {}...'.format(retry))
|
2018-10-01 10:58:53 +03:00
|
|
|
state.auth_key, state.time_offset =\
|
2018-06-08 22:18:15 +03:00
|
|
|
await authenticator.do_authentication(plain)
|
2018-06-27 11:15:59 +03:00
|
|
|
|
|
|
|
if self._auth_key_callback:
|
2018-10-05 21:25:49 +03:00
|
|
|
await self._auth_key_callback(state.auth_key)
|
2018-06-27 11:15:59 +03:00
|
|
|
|
2018-06-21 10:48:11 +03:00
|
|
|
break
|
2018-06-08 22:18:15 +03:00
|
|
|
except (SecurityError, AssertionError) as e:
|
|
|
|
__log__.warning('Attempt {} at new auth_key failed: {}'
|
|
|
|
.format(retry, e))
|
|
|
|
else:
|
2018-06-17 20:29:41 +03:00
|
|
|
e = ConnectionError('auth_key generation failed {} times'
|
|
|
|
.format(self._retries))
|
|
|
|
await self._disconnect(error=e)
|
|
|
|
raise e
|
2018-06-08 22:18:15 +03:00
|
|
|
|
|
|
|
__log__.debug('Starting send loop')
|
2018-06-15 00:33:56 +03:00
|
|
|
self._send_loop_handle = self._loop.create_task(self._send_loop())
|
2018-06-14 20:35:12 +03:00
|
|
|
|
2018-06-10 22:30:16 +03:00
|
|
|
__log__.debug('Starting receive loop')
|
2018-06-15 00:33:56 +03:00
|
|
|
self._recv_loop_handle = self._loop.create_task(self._recv_loop())
|
2018-06-14 20:35:12 +03:00
|
|
|
|
2018-06-17 20:29:41 +03:00
|
|
|
# First connection or manual reconnection after a failure
|
|
|
|
if self._disconnected is None or self._disconnected.done():
|
2018-08-21 13:22:06 +03:00
|
|
|
self._disconnected = self._loop.create_future()
|
2018-09-29 11:58:45 +03:00
|
|
|
__log__.info('Connection to %s complete!', self._connection)
|
2018-06-08 22:18:15 +03:00
|
|
|
|
2018-10-05 14:23:38 +03:00
|
|
|
def _disconnect(self, error=None):
|
2018-09-30 12:58:46 +03:00
|
|
|
__log__.info('Disconnecting from %s...', self._connection)
|
|
|
|
self._user_connected = False
|
|
|
|
try:
|
|
|
|
__log__.debug('Closing current connection...')
|
|
|
|
self._connection.disconnect()
|
|
|
|
finally:
|
|
|
|
__log__.debug('Cancelling {} pending message(s)...'
|
|
|
|
.format(len(self._pending_state)))
|
|
|
|
for state in self._pending_state.values():
|
|
|
|
if error and not state.future.done():
|
|
|
|
state.future.set_exception(error)
|
|
|
|
else:
|
|
|
|
state.future.cancel()
|
|
|
|
|
|
|
|
self._pending_state.clear()
|
|
|
|
self._pending_ack.clear()
|
|
|
|
self._last_ack = None
|
|
|
|
|
|
|
|
if self._send_loop_handle:
|
|
|
|
__log__.debug('Cancelling the send loop...')
|
|
|
|
self._send_loop_handle.cancel()
|
|
|
|
|
|
|
|
if self._recv_loop_handle:
|
|
|
|
__log__.debug('Cancelling the receive loop...')
|
|
|
|
self._recv_loop_handle.cancel()
|
|
|
|
|
|
|
|
__log__.info('Disconnection from %s complete!', self._connection)
|
|
|
|
if self._disconnected and not self._disconnected.done():
|
|
|
|
if error:
|
|
|
|
self._disconnected.set_exception(error)
|
|
|
|
else:
|
|
|
|
self._disconnected.set_result(None)
|
|
|
|
|
2018-06-08 22:18:15 +03:00
|
|
|
async def _reconnect(self):
|
|
|
|
"""
|
|
|
|
Cleanly disconnects and then reconnects.
|
|
|
|
"""
|
|
|
|
self._reconnecting = True
|
|
|
|
|
2018-10-02 09:55:46 +03:00
|
|
|
__log__.debug('Closing current connection...')
|
|
|
|
self._connection.disconnect()
|
|
|
|
|
2018-06-08 22:18:15 +03:00
|
|
|
__log__.debug('Awaiting for the send loop before reconnecting...')
|
|
|
|
await self._send_loop_handle
|
|
|
|
|
|
|
|
__log__.debug('Awaiting for the receive loop before reconnecting...')
|
|
|
|
await self._recv_loop_handle
|
|
|
|
|
|
|
|
__log__.debug('Closing current connection...')
|
2018-09-28 18:51:28 +03:00
|
|
|
self._connection.disconnect()
|
2018-06-08 22:18:15 +03:00
|
|
|
|
|
|
|
self._reconnecting = False
|
2018-06-18 19:11:16 +03:00
|
|
|
|
2018-10-02 09:55:46 +03:00
|
|
|
# Start with a clean state (and thus session ID) to avoid old msgs
|
|
|
|
self._connection.reset_state()
|
|
|
|
|
2018-06-18 19:11:16 +03:00
|
|
|
retries = self._retries if self._auto_reconnect else 0
|
|
|
|
for retry in range(1, retries + 1):
|
|
|
|
try:
|
|
|
|
await self._connect()
|
2018-10-02 09:55:46 +03:00
|
|
|
except ConnectionError:
|
|
|
|
__log__.info('Failed reconnection retry %d/%d', retry, retries)
|
|
|
|
else:
|
|
|
|
self._send_queue.extend(self._pending_state.values())
|
|
|
|
self._pending_state.clear()
|
2018-06-27 11:26:26 +03:00
|
|
|
|
2018-06-27 20:40:32 +03:00
|
|
|
if self._auto_reconnect_callback:
|
|
|
|
self._loop.create_task(self._auto_reconnect_callback())
|
|
|
|
|
2018-06-18 19:11:16 +03:00
|
|
|
break
|
|
|
|
else:
|
|
|
|
__log__.error('Failed to reconnect automatically.')
|
|
|
|
await self._disconnect(error=ConnectionError())
|
2018-06-08 22:18:15 +03:00
|
|
|
|
2018-06-24 11:44:31 +03:00
|
|
|
def _start_reconnect(self):
|
|
|
|
"""Starts a reconnection in the background."""
|
|
|
|
if self._user_connected:
|
|
|
|
self._loop.create_task(self._reconnect())
|
|
|
|
|
2018-06-06 21:41:01 +03:00
|
|
|
# Loops
|
|
|
|
|
|
|
|
async def _send_loop(self):
|
2018-06-07 12:51:09 +03:00
|
|
|
"""
|
|
|
|
This loop is responsible for popping items off the send
|
|
|
|
queue, encrypting them, and sending them over the network.
|
|
|
|
|
|
|
|
Besides `connect`, only this method ever sends data.
|
|
|
|
"""
|
2018-06-08 21:41:48 +03:00
|
|
|
while self._user_connected and not self._reconnecting:
|
2018-06-07 15:16:47 +03:00
|
|
|
if self._pending_ack:
|
2018-09-29 13:20:26 +03:00
|
|
|
ack = RequestState(MsgsAck(list(self._pending_ack)), self._loop)
|
2018-09-29 13:48:50 +03:00
|
|
|
self._send_queue.append(ack)
|
2018-09-29 13:20:26 +03:00
|
|
|
self._last_acks.append(ack)
|
2018-06-07 15:16:47 +03:00
|
|
|
self._pending_ack.clear()
|
|
|
|
|
2018-09-29 14:29:44 +03:00
|
|
|
state_list = await self._send_queue.get(
|
|
|
|
self._connection._connection.disconnected)
|
2018-06-16 19:34:36 +03:00
|
|
|
|
2018-09-29 14:29:44 +03:00
|
|
|
if state_list is None:
|
2018-09-29 13:48:50 +03:00
|
|
|
break
|
2018-08-21 12:31:14 +03:00
|
|
|
|
2018-10-05 14:23:38 +03:00
|
|
|
try:
|
|
|
|
await self._connection.send(state_list)
|
|
|
|
except Exception:
|
|
|
|
__log__.exception('Unhandled error while sending data')
|
|
|
|
continue
|
|
|
|
|
2018-09-29 13:20:26 +03:00
|
|
|
for state in state_list:
|
|
|
|
if not isinstance(state, list):
|
2018-10-05 14:23:38 +03:00
|
|
|
if isinstance(state.request, TLRequest):
|
|
|
|
self._pending_state[state.msg_id] = state
|
2018-09-29 13:20:26 +03:00
|
|
|
else:
|
|
|
|
for s in state:
|
2018-10-05 14:23:38 +03:00
|
|
|
if isinstance(s.request, TLRequest):
|
|
|
|
self._pending_state[s.msg_id] = s
|
2018-06-08 22:13:14 +03:00
|
|
|
|
2018-06-06 21:41:01 +03:00
|
|
|
async def _recv_loop(self):
|
2018-06-07 12:51:09 +03:00
|
|
|
"""
|
|
|
|
This loop is responsible for reading all incoming responses
|
|
|
|
from the network, decrypting and handling or dispatching them.
|
|
|
|
|
|
|
|
Besides `connect`, only this method ever receives data.
|
|
|
|
"""
|
2018-06-08 21:41:48 +03:00
|
|
|
while self._user_connected and not self._reconnecting:
|
2018-09-29 13:20:26 +03:00
|
|
|
__log__.debug('Receiving items from the network...')
|
2018-10-02 09:55:46 +03:00
|
|
|
try:
|
|
|
|
message = await self._connection.recv()
|
|
|
|
except TypeNotFoundError as e:
|
|
|
|
__log__.info('Type %08x not found, remaining data %r',
|
|
|
|
e.invalid_constructor_id, e.remaining)
|
|
|
|
continue
|
|
|
|
except SecurityError as e:
|
|
|
|
# A step while decoding had the incorrect data. This message
|
|
|
|
# should not be considered safe and it should be ignored.
|
|
|
|
__log__.warning('Security error while unpacking a '
|
|
|
|
'received message: %s', e)
|
|
|
|
continue
|
2018-10-03 15:46:10 +03:00
|
|
|
except InvalidChecksumError as e:
|
|
|
|
__log__.warning(
|
|
|
|
'Invalid checksum on the read packet (was %s expected %s)',
|
|
|
|
e.checksum, e.valid_checksum
|
|
|
|
)
|
2018-10-02 09:55:46 +03:00
|
|
|
except asyncio.CancelledError:
|
|
|
|
return
|
|
|
|
except (BrokenAuthKeyError, BufferError):
|
|
|
|
__log__.info('Broken authorization key; resetting')
|
|
|
|
self._connection._state.auth_key = None
|
|
|
|
self._start_reconnect()
|
|
|
|
return
|
2018-10-03 15:46:10 +03:00
|
|
|
except asyncio.IncompleteReadError:
|
|
|
|
__log__.info('Telegram closed the connection')
|
|
|
|
self._start_reconnect()
|
|
|
|
return
|
2018-10-02 09:55:46 +03:00
|
|
|
except Exception:
|
|
|
|
__log__.exception('Unhandled error while receiving data')
|
|
|
|
self._start_reconnect()
|
|
|
|
return
|
|
|
|
else:
|
|
|
|
try:
|
|
|
|
await self._process_message(message)
|
|
|
|
except Exception:
|
|
|
|
__log__.exception('Unhandled error while processing msgs')
|
2018-06-06 21:41:01 +03:00
|
|
|
|
|
|
|
# Response Handlers
|
|
|
|
|
2018-06-09 14:48:27 +03:00
|
|
|
async def _process_message(self, message):
|
2018-06-07 12:51:09 +03:00
|
|
|
"""
|
|
|
|
Adds the given message to the list of messages that must be
|
|
|
|
acknowledged and dispatches control to different ``_handle_*``
|
|
|
|
method based on its type.
|
|
|
|
"""
|
2018-06-09 12:34:01 +03:00
|
|
|
self._pending_ack.add(message.msg_id)
|
2018-06-09 14:48:27 +03:00
|
|
|
handler = self._handlers.get(message.obj.CONSTRUCTOR_ID,
|
|
|
|
self._handle_update)
|
|
|
|
await handler(message)
|
2018-06-06 22:42:48 +03:00
|
|
|
|
2018-10-01 14:49:30 +03:00
|
|
|
def _pop_states(self, msg_id):
|
|
|
|
"""
|
|
|
|
Pops the states known to match the given ID from pending messages.
|
|
|
|
|
|
|
|
This method should be used when the response isn't specific.
|
|
|
|
"""
|
|
|
|
state = self._pending_state.pop(msg_id, None)
|
|
|
|
if state:
|
|
|
|
return [state]
|
|
|
|
|
|
|
|
to_pop = []
|
|
|
|
for state in self._pending_state.values():
|
|
|
|
if state.container_id == msg_id:
|
|
|
|
to_pop.append(state.msg_id)
|
|
|
|
|
|
|
|
if to_pop:
|
|
|
|
return [self._pending_state.pop(x) for x in to_pop]
|
|
|
|
|
|
|
|
for ack in self._last_acks:
|
|
|
|
if ack.msg_id == msg_id:
|
|
|
|
return [ack]
|
|
|
|
|
|
|
|
return []
|
|
|
|
|
2018-06-09 14:48:27 +03:00
|
|
|
async def _handle_rpc_result(self, message):
|
2018-06-07 12:51:09 +03:00
|
|
|
"""
|
|
|
|
Handles the result for Remote Procedure Calls:
|
|
|
|
|
|
|
|
rpc_result#f35c6d01 req_msg_id:long result:bytes = RpcResult;
|
|
|
|
|
|
|
|
This is where the future results for sent requests are set.
|
|
|
|
"""
|
2018-06-09 14:48:27 +03:00
|
|
|
rpc_result = message.obj
|
2018-09-29 13:20:26 +03:00
|
|
|
state = self._pending_state.pop(rpc_result.req_msg_id, None)
|
2018-06-18 18:14:04 +03:00
|
|
|
__log__.debug('Handling RPC result for message %d',
|
|
|
|
rpc_result.req_msg_id)
|
2018-06-06 22:42:48 +03:00
|
|
|
|
2018-09-29 13:20:26 +03:00
|
|
|
if not state:
|
2018-07-25 13:19:28 +03:00
|
|
|
# TODO We should not get responses to things we never sent
|
2018-08-20 12:42:51 +03:00
|
|
|
# However receiving a File() with empty bytes is "common".
|
|
|
|
# See #658, #759 and #958. They seem to happen in a container
|
|
|
|
# which contain the real response right after.
|
|
|
|
try:
|
|
|
|
with BinaryReader(rpc_result.body) as reader:
|
|
|
|
if not isinstance(reader.tgread_object(), upload.File):
|
|
|
|
raise ValueError('Not an upload.File')
|
|
|
|
except (TypeNotFoundError, ValueError):
|
|
|
|
__log__.info('Received response without parent request: {}'
|
|
|
|
.format(rpc_result.body))
|
2018-07-25 13:19:28 +03:00
|
|
|
return
|
|
|
|
|
2018-06-09 14:11:49 +03:00
|
|
|
if rpc_result.error:
|
|
|
|
error = rpc_message_to_error(rpc_result.error)
|
2018-09-29 13:48:50 +03:00
|
|
|
self._send_queue.append(
|
2018-09-29 13:20:26 +03:00
|
|
|
RequestState(MsgsAck([state.msg_id]), loop=self._loop))
|
2018-06-07 11:30:20 +03:00
|
|
|
|
2018-09-29 13:20:26 +03:00
|
|
|
if not state.future.cancelled():
|
|
|
|
state.future.set_exception(error)
|
2018-07-25 13:19:28 +03:00
|
|
|
else:
|
2018-06-09 14:11:49 +03:00
|
|
|
with BinaryReader(rpc_result.body) as reader:
|
2018-09-29 13:20:26 +03:00
|
|
|
result = state.request.read_result(reader)
|
2018-06-06 22:42:48 +03:00
|
|
|
|
2018-09-29 13:20:26 +03:00
|
|
|
if not state.future.cancelled():
|
|
|
|
state.future.set_result(result)
|
2018-06-06 22:42:48 +03:00
|
|
|
|
2018-06-09 14:48:27 +03:00
|
|
|
async def _handle_container(self, message):
|
2018-06-07 12:51:09 +03:00
|
|
|
"""
|
|
|
|
Processes the inner messages of a container with many of them:
|
|
|
|
|
|
|
|
msg_container#73f1f8dc messages:vector<%Message> = MessageContainer;
|
|
|
|
"""
|
2018-06-08 22:13:14 +03:00
|
|
|
__log__.debug('Handling container')
|
2018-06-09 14:48:27 +03:00
|
|
|
for inner_message in message.obj.messages:
|
|
|
|
await self._process_message(inner_message)
|
2018-06-06 22:42:48 +03:00
|
|
|
|
2018-06-09 14:48:27 +03:00
|
|
|
async def _handle_gzip_packed(self, message):
|
2018-06-07 12:51:09 +03:00
|
|
|
"""
|
|
|
|
Unpacks the data from a gzipped object and processes it:
|
|
|
|
|
|
|
|
gzip_packed#3072cfa1 packed_data:bytes = Object;
|
|
|
|
"""
|
2018-06-08 22:13:14 +03:00
|
|
|
__log__.debug('Handling gzipped data')
|
2018-06-09 14:48:27 +03:00
|
|
|
with BinaryReader(message.obj.data) as reader:
|
|
|
|
message.obj = reader.tgread_object()
|
|
|
|
await self._process_message(message)
|
2018-06-06 21:41:01 +03:00
|
|
|
|
2018-06-09 14:48:27 +03:00
|
|
|
async def _handle_update(self, message):
|
|
|
|
__log__.debug('Handling update {}'
|
|
|
|
.format(message.obj.__class__.__name__))
|
2018-06-09 22:03:48 +03:00
|
|
|
if self._update_callback:
|
|
|
|
self._update_callback(message.obj)
|
2018-06-07 15:32:22 +03:00
|
|
|
|
2018-06-09 14:48:27 +03:00
|
|
|
async def _handle_pong(self, message):
|
2018-06-07 12:51:09 +03:00
|
|
|
"""
|
|
|
|
Handles pong results, which don't come inside a ``rpc_result``
|
|
|
|
but are still sent through a request:
|
|
|
|
|
|
|
|
pong#347773c5 msg_id:long ping_id:long = Pong;
|
|
|
|
"""
|
2018-06-09 14:48:27 +03:00
|
|
|
pong = message.obj
|
2018-06-18 18:14:04 +03:00
|
|
|
__log__.debug('Handling pong for message %d', pong.msg_id)
|
2018-09-29 13:20:26 +03:00
|
|
|
state = self._pending_state.pop(pong.msg_id, None)
|
|
|
|
if state:
|
|
|
|
state.future.set_result(pong)
|
2018-06-06 21:41:01 +03:00
|
|
|
|
2018-06-09 14:48:27 +03:00
|
|
|
async def _handle_bad_server_salt(self, message):
|
2018-06-07 12:51:09 +03:00
|
|
|
"""
|
|
|
|
Corrects the currently used server salt to use the right value
|
|
|
|
before enqueuing the rejected message to be re-sent:
|
|
|
|
|
|
|
|
bad_server_salt#edab447b bad_msg_id:long bad_msg_seqno:int
|
|
|
|
error_code:int new_server_salt:long = BadMsgNotification;
|
|
|
|
"""
|
2018-06-09 14:48:27 +03:00
|
|
|
bad_salt = message.obj
|
2018-06-18 18:14:04 +03:00
|
|
|
__log__.debug('Handling bad salt for message %d', bad_salt.bad_msg_id)
|
2018-09-29 13:20:26 +03:00
|
|
|
self._connection._state.salt = bad_salt.new_server_salt
|
2018-10-01 14:49:30 +03:00
|
|
|
states = self._pop_states(bad_salt.bad_msg_id)
|
|
|
|
self._send_queue.extend(states)
|
2018-09-29 13:20:26 +03:00
|
|
|
|
2018-10-01 14:49:30 +03:00
|
|
|
__log__.debug('%d message(s) will be resent', len(states))
|
2018-06-06 21:41:01 +03:00
|
|
|
|
2018-06-09 14:48:27 +03:00
|
|
|
async def _handle_bad_notification(self, message):
|
2018-06-07 12:51:09 +03:00
|
|
|
"""
|
|
|
|
Adjusts the current state to be correct based on the
|
|
|
|
received bad message notification whenever possible:
|
|
|
|
|
|
|
|
bad_msg_notification#a7eff811 bad_msg_id:long bad_msg_seqno:int
|
|
|
|
error_code:int = BadMsgNotification;
|
|
|
|
"""
|
2018-06-09 14:48:27 +03:00
|
|
|
bad_msg = message.obj
|
2018-10-01 14:49:30 +03:00
|
|
|
states = self._pop_states(bad_msg.bad_msg_id)
|
2018-06-27 20:04:33 +03:00
|
|
|
|
2018-07-25 13:33:12 +03:00
|
|
|
__log__.debug('Handling bad msg %s', bad_msg)
|
2018-06-07 12:51:09 +03:00
|
|
|
if bad_msg.error_code in (16, 17):
|
|
|
|
# Sent msg_id too low or too high (respectively).
|
|
|
|
# Use the current msg_id to determine the right time offset.
|
2018-09-29 13:20:26 +03:00
|
|
|
to = self._connection._state.update_time_offset(
|
|
|
|
correct_msg_id=message.msg_id)
|
2018-06-27 20:04:33 +03:00
|
|
|
__log__.info('System clock is wrong, set time offset to %ds', to)
|
2018-06-07 12:51:09 +03:00
|
|
|
elif bad_msg.error_code == 32:
|
|
|
|
# msg_seqno too low, so just pump it up by some "large" amount
|
|
|
|
# TODO A better fix would be to start with a new fresh session ID
|
2018-09-29 13:20:26 +03:00
|
|
|
self._connection._state._sequence += 64
|
2018-06-07 12:51:09 +03:00
|
|
|
elif bad_msg.error_code == 33:
|
|
|
|
# msg_seqno too high never seems to happen but just in case
|
2018-09-29 13:20:26 +03:00
|
|
|
self._connection._state._sequence -= 16
|
2018-06-07 12:51:09 +03:00
|
|
|
else:
|
2018-10-01 14:49:30 +03:00
|
|
|
for state in states:
|
2018-09-29 13:20:26 +03:00
|
|
|
state.future.set_exception(BadMessageError(bad_msg.error_code))
|
2018-06-07 12:51:09 +03:00
|
|
|
return
|
|
|
|
|
|
|
|
# Messages are to be re-sent once we've corrected the issue
|
2018-10-01 14:49:30 +03:00
|
|
|
self._send_queue.extend(states)
|
|
|
|
__log__.debug('%d messages will be resent due to bad msg', len(states))
|
2018-06-06 21:41:01 +03:00
|
|
|
|
2018-06-09 14:48:27 +03:00
|
|
|
async def _handle_detailed_info(self, message):
|
2018-06-07 12:51:09 +03:00
|
|
|
"""
|
|
|
|
Updates the current status with the received detailed information:
|
|
|
|
|
|
|
|
msg_detailed_info#276d3ec6 msg_id:long answer_msg_id:long
|
|
|
|
bytes:int status:int = MsgDetailedInfo;
|
|
|
|
"""
|
|
|
|
# TODO https://goo.gl/VvpCC6
|
2018-06-18 18:14:04 +03:00
|
|
|
msg_id = message.obj.answer_msg_id
|
|
|
|
__log__.debug('Handling detailed info for message %d', msg_id)
|
|
|
|
self._pending_ack.add(msg_id)
|
2018-06-06 21:41:01 +03:00
|
|
|
|
2018-06-09 14:48:27 +03:00
|
|
|
async def _handle_new_detailed_info(self, message):
|
2018-06-07 12:51:09 +03:00
|
|
|
"""
|
|
|
|
Updates the current status with the received detailed information:
|
|
|
|
|
|
|
|
msg_new_detailed_info#809db6df answer_msg_id:long
|
|
|
|
bytes:int status:int = MsgDetailedInfo;
|
|
|
|
"""
|
|
|
|
# TODO https://goo.gl/G7DPsR
|
2018-06-18 18:14:04 +03:00
|
|
|
msg_id = message.obj.answer_msg_id
|
|
|
|
__log__.debug('Handling new detailed info for message %d', msg_id)
|
|
|
|
self._pending_ack.add(msg_id)
|
2018-06-06 21:41:01 +03:00
|
|
|
|
2018-06-09 14:48:27 +03:00
|
|
|
async def _handle_new_session_created(self, message):
|
2018-06-07 12:51:09 +03:00
|
|
|
"""
|
|
|
|
Updates the current status with the received session information:
|
|
|
|
|
|
|
|
new_session_created#9ec20908 first_msg_id:long unique_id:long
|
|
|
|
server_salt:long = NewSession;
|
|
|
|
"""
|
2018-06-06 22:42:48 +03:00
|
|
|
# TODO https://goo.gl/LMyN7A
|
2018-06-08 22:13:14 +03:00
|
|
|
__log__.debug('Handling new session created')
|
2018-09-29 13:20:26 +03:00
|
|
|
self._connection._state.salt = message.obj.server_salt
|
2018-06-06 21:41:01 +03:00
|
|
|
|
2018-06-09 14:48:27 +03:00
|
|
|
async def _handle_ack(self, message):
|
2018-06-07 12:51:09 +03:00
|
|
|
"""
|
|
|
|
Handles a server acknowledge about our messages. Normally
|
|
|
|
these can be ignored except in the case of ``auth.logOut``:
|
|
|
|
|
|
|
|
auth.logOut#5717da40 = Bool;
|
2018-06-06 21:41:01 +03:00
|
|
|
|
2018-06-07 12:51:09 +03:00
|
|
|
Telegram doesn't seem to send its result so we need to confirm
|
|
|
|
it manually. No other request is known to have this behaviour.
|
2018-06-07 14:33:32 +03:00
|
|
|
|
|
|
|
Since the ID of sent messages consisting of a container is
|
|
|
|
never returned (unless on a bad notification), this method
|
|
|
|
also removes containers messages when any of their inner
|
|
|
|
messages are acknowledged.
|
2018-06-07 12:51:09 +03:00
|
|
|
"""
|
2018-06-09 14:48:27 +03:00
|
|
|
ack = message.obj
|
2018-06-18 18:14:04 +03:00
|
|
|
__log__.debug('Handling acknowledge for %s', str(ack.msg_ids))
|
2018-06-07 14:33:32 +03:00
|
|
|
for msg_id in ack.msg_ids:
|
2018-09-29 13:20:26 +03:00
|
|
|
state = self._pending_state.get(msg_id)
|
|
|
|
if state and isinstance(state.request, LogOutRequest):
|
|
|
|
del self._pending_state[msg_id]
|
|
|
|
state.future.set_result(True)
|
2018-06-06 21:41:01 +03:00
|
|
|
|
2018-06-09 14:48:27 +03:00
|
|
|
async def _handle_future_salts(self, message):
|
2018-06-07 12:51:09 +03:00
|
|
|
"""
|
|
|
|
Handles future salt results, which don't come inside a
|
|
|
|
``rpc_result`` but are still sent through a request:
|
|
|
|
|
|
|
|
future_salts#ae500895 req_msg_id:long now:int
|
|
|
|
salts:vector<future_salt> = FutureSalts;
|
|
|
|
"""
|
|
|
|
# TODO save these salts and automatically adjust to the
|
|
|
|
# correct one whenever the salt in use expires.
|
2018-06-18 18:14:04 +03:00
|
|
|
__log__.debug('Handling future salts for message %d', message.msg_id)
|
2018-09-29 13:20:26 +03:00
|
|
|
state = self._pending_state.pop(message.msg_id, None)
|
|
|
|
if state:
|
|
|
|
state.future.set_result(message.obj)
|
2018-06-07 14:51:19 +03:00
|
|
|
|
2018-06-14 17:23:16 +03:00
|
|
|
async def _handle_state_forgotten(self, message):
|
|
|
|
"""
|
|
|
|
Handles both :tl:`MsgsStateReq` and :tl:`MsgResendReq` by
|
|
|
|
enqueuing a :tl:`MsgsStateInfo` to be sent at a later point.
|
|
|
|
"""
|
2018-09-29 13:48:50 +03:00
|
|
|
self._send_queue.append(RequestState(MsgsStateInfo(
|
2018-09-29 13:20:26 +03:00
|
|
|
req_msg_id=message.msg_id, info=chr(1) * len(message.obj.msg_ids)),
|
|
|
|
loop=self._loop))
|
2018-06-14 17:23:16 +03:00
|
|
|
|
|
|
|
async def _handle_msg_all(self, message):
|
|
|
|
"""
|
|
|
|
Handles :tl:`MsgsAllInfo` by doing nothing (yet).
|
|
|
|
"""
|