2016-09-05 19:35:12 +03:00
|
|
|
import gzip
|
2016-10-03 10:53:41 +03:00
|
|
|
from datetime import timedelta
|
2016-11-30 00:29:42 +03:00
|
|
|
from threading import RLock, Thread
|
2017-02-19 17:20:21 +03:00
|
|
|
from time import sleep, time
|
2016-08-26 13:58:53 +03:00
|
|
|
|
2016-09-17 21:42:34 +03:00
|
|
|
import telethon.helpers as utils
|
|
|
|
from telethon.crypto import AES
|
2016-11-30 00:29:42 +03:00
|
|
|
from telethon.errors import *
|
2017-04-09 14:14:04 +03:00
|
|
|
from telethon.log import Log
|
2016-09-17 21:42:34 +03:00
|
|
|
from telethon.tl.all_tlobjects import tlobjects
|
2016-11-30 00:29:42 +03:00
|
|
|
from telethon.tl.types import MsgsAck
|
2017-02-19 17:20:21 +03:00
|
|
|
from telethon.tl.functions import PingRequest
|
2016-11-30 00:29:42 +03:00
|
|
|
from telethon.utils import BinaryReader, BinaryWriter
|
2016-08-26 13:58:53 +03:00
|
|
|
|
|
|
|
|
|
|
|
class MtProtoSender:
|
2016-08-28 14:43:00 +03:00
|
|
|
"""MTProto Mobile Protocol sender (https://core.telegram.org/mtproto/description)"""
|
2016-11-30 00:29:42 +03:00
|
|
|
|
2016-09-10 19:05:20 +03:00
|
|
|
def __init__(self, transport, session):
|
2016-08-28 14:43:00 +03:00
|
|
|
self.transport = transport
|
|
|
|
self.session = session
|
2016-09-07 12:36:34 +03:00
|
|
|
|
2016-08-28 14:43:00 +03:00
|
|
|
self.need_confirmation = [] # Message IDs that need confirmation
|
2016-09-06 19:54:49 +03:00
|
|
|
self.on_update_handlers = []
|
|
|
|
|
2016-10-02 14:30:14 +03:00
|
|
|
# Store an RLock instance to make this class safely multi-threaded
|
|
|
|
self.lock = RLock()
|
|
|
|
|
|
|
|
# Flag used to determine whether we've received a sent request yet or not
|
|
|
|
# We need this to avoid using the updates thread if we're waiting to read
|
|
|
|
self.waiting_receive = False
|
2016-09-10 12:01:03 +03:00
|
|
|
|
2017-04-06 19:46:09 +03:00
|
|
|
# Determine whether the received acknowledge request confirm
|
|
|
|
# our requests or not. This is not desired until we initialize
|
|
|
|
# our connection, because it breaks things when we call InvokeWithLayer
|
|
|
|
# TODO There might be a better way to handle msgs_ack requests
|
|
|
|
self.ack_requests_confirm = False
|
2017-02-19 17:20:21 +03:00
|
|
|
|
|
|
|
self.ping_interval = 60
|
|
|
|
self.ping_time_last = time()
|
|
|
|
|
2017-04-06 19:46:09 +03:00
|
|
|
# Variables used to determine the status of the updates thread.
|
|
|
|
self.updates_thread_running = False
|
2016-09-10 19:05:20 +03:00
|
|
|
self.updates_thread_receiving = False
|
2016-09-09 12:47:37 +03:00
|
|
|
|
2017-04-11 10:58:22 +03:00
|
|
|
# Sleep amount on "must sleep" error for the updates thread to sleep too
|
|
|
|
self.updates_thread_sleep = None
|
|
|
|
|
2017-04-06 19:46:09 +03:00
|
|
|
self.updates_thread = Thread(
|
2017-04-12 11:35:07 +03:00
|
|
|
target=self.updates_thread_method, name='UpdatesThread')
|
2016-09-26 18:16:15 +03:00
|
|
|
|
2017-04-06 19:46:09 +03:00
|
|
|
# The "updates" thread must also be running to make periodic ping requests.
|
|
|
|
self.set_updates_thread(running=True)
|
2017-02-19 17:20:21 +03:00
|
|
|
|
2016-09-09 12:47:37 +03:00
|
|
|
def disconnect(self):
|
2016-09-10 11:17:15 +03:00
|
|
|
"""Disconnects and **stops all the running threads** if any"""
|
2017-04-06 19:46:09 +03:00
|
|
|
self.set_updates_thread(running=False)
|
2016-09-09 12:47:37 +03:00
|
|
|
self.transport.close()
|
|
|
|
|
2016-09-06 19:54:49 +03:00
|
|
|
def add_update_handler(self, handler):
|
2016-09-09 12:47:37 +03:00
|
|
|
"""Adds an update handler (a method with one argument, the received
|
|
|
|
TLObject) that is fired when there are updates available"""
|
2016-09-11 12:50:38 +03:00
|
|
|
|
2017-04-06 19:46:09 +03:00
|
|
|
# The updates thread is already running for periodic ping requests,
|
|
|
|
# so there is no need to start it when adding update handlers.
|
2016-09-06 19:54:49 +03:00
|
|
|
self.on_update_handlers.append(handler)
|
2016-08-26 13:58:53 +03:00
|
|
|
|
2016-09-11 12:50:38 +03:00
|
|
|
def remove_update_handler(self, handler):
|
|
|
|
self.on_update_handlers.remove(handler)
|
|
|
|
|
2016-08-26 13:58:53 +03:00
|
|
|
def generate_sequence(self, confirmed):
|
2016-09-09 12:47:37 +03:00
|
|
|
"""Generates the next sequence number, based on whether it
|
|
|
|
was confirmed yet or not"""
|
2016-08-26 13:58:53 +03:00
|
|
|
if confirmed:
|
2016-08-28 14:43:00 +03:00
|
|
|
result = self.session.sequence * 2 + 1
|
|
|
|
self.session.sequence += 1
|
2016-08-26 13:58:53 +03:00
|
|
|
return result
|
|
|
|
else:
|
2016-08-28 14:43:00 +03:00
|
|
|
return self.session.sequence * 2
|
|
|
|
|
|
|
|
# region Send and receive
|
2016-08-26 13:58:53 +03:00
|
|
|
|
2017-02-19 17:20:21 +03:00
|
|
|
def send_ping(self):
|
|
|
|
"""Sends PingRequest"""
|
|
|
|
request = PingRequest(0)
|
|
|
|
self.send(request)
|
|
|
|
self.receive(request)
|
|
|
|
|
2016-10-02 14:30:14 +03:00
|
|
|
def send(self, request):
|
2016-09-09 12:47:37 +03:00
|
|
|
"""Sends the specified MTProtoRequest, previously sending any message
|
|
|
|
which needed confirmation. This also pauses the updates thread"""
|
|
|
|
|
2016-09-10 12:01:03 +03:00
|
|
|
# Only cancel the receive *if* it was the
|
|
|
|
# updates thread who was receiving. We do
|
|
|
|
# not want to cancel other pending requests!
|
|
|
|
if self.updates_thread_receiving:
|
2017-04-09 14:14:04 +03:00
|
|
|
Log.i('Cancelling updates receive from send()...')
|
2016-09-10 12:01:03 +03:00
|
|
|
self.transport.cancel_receive()
|
|
|
|
|
2016-10-02 14:30:14 +03:00
|
|
|
# Now only us can be using this method
|
|
|
|
with self.lock:
|
2017-04-09 14:14:04 +03:00
|
|
|
Log.d('send() acquired the lock')
|
2016-10-02 14:30:14 +03:00
|
|
|
# Set the flag to true so the updates thread stops trying to receive
|
|
|
|
self.waiting_receive = True
|
2016-08-26 13:58:53 +03:00
|
|
|
|
2016-10-02 14:30:14 +03:00
|
|
|
# If any message needs confirmation send an AckRequest first
|
|
|
|
if self.need_confirmation:
|
|
|
|
msgs_ack = MsgsAck(self.need_confirmation)
|
|
|
|
with BinaryWriter() as writer:
|
|
|
|
msgs_ack.on_send(writer)
|
|
|
|
self.send_packet(writer.get_bytes(), msgs_ack)
|
2016-09-10 12:01:03 +03:00
|
|
|
|
2016-10-02 14:30:14 +03:00
|
|
|
del self.need_confirmation[:]
|
2016-08-26 13:58:53 +03:00
|
|
|
|
2016-10-02 14:30:14 +03:00
|
|
|
# Finally send our packed request
|
|
|
|
with BinaryWriter() as writer:
|
|
|
|
request.on_send(writer)
|
|
|
|
self.send_packet(writer.get_bytes(), request)
|
2016-08-26 13:58:53 +03:00
|
|
|
|
2016-10-02 14:30:14 +03:00
|
|
|
# And update the saved session
|
|
|
|
self.session.save()
|
2016-08-28 14:43:00 +03:00
|
|
|
|
2017-04-09 14:14:04 +03:00
|
|
|
Log.d('send() released the lock')
|
|
|
|
|
2016-10-03 10:53:41 +03:00
|
|
|
def receive(self, request, timeout=timedelta(seconds=5)):
|
2016-09-09 12:47:37 +03:00
|
|
|
"""Receives the specified MTProtoRequest ("fills in it"
|
2016-10-03 10:53:41 +03:00
|
|
|
the received data). This also restores the updates thread.
|
|
|
|
An optional timeout can be specified to cancel the operation
|
|
|
|
if no data has been read after its time delta"""
|
2016-09-09 12:47:37 +03:00
|
|
|
|
2016-10-02 14:30:14 +03:00
|
|
|
with self.lock:
|
2017-04-09 14:14:04 +03:00
|
|
|
Log.d('receive() acquired the lock')
|
2016-09-10 12:01:03 +03:00
|
|
|
# Don't stop trying to receive until we get the request we wanted
|
|
|
|
while not request.confirm_received:
|
2017-04-09 14:14:04 +03:00
|
|
|
Log.i('Trying to .receive() the request result...')
|
2016-10-03 10:53:41 +03:00
|
|
|
seq, body = self.transport.receive(timeout)
|
2016-09-10 12:01:03 +03:00
|
|
|
message, remote_msg_id, remote_sequence = self.decode_msg(body)
|
2016-08-28 14:43:00 +03:00
|
|
|
|
2016-09-10 12:01:03 +03:00
|
|
|
with BinaryReader(message) as reader:
|
2016-11-30 00:29:42 +03:00
|
|
|
self.process_msg(remote_msg_id, remote_sequence, reader,
|
|
|
|
request)
|
2016-09-06 19:54:49 +03:00
|
|
|
|
2017-04-09 14:14:04 +03:00
|
|
|
Log.i('Request result received')
|
|
|
|
|
2016-10-02 14:30:14 +03:00
|
|
|
# We can now set the flag to False thus resuming the updates thread
|
|
|
|
self.waiting_receive = False
|
2017-04-09 14:14:04 +03:00
|
|
|
Log.d('receive() released the lock')
|
2016-09-09 12:47:37 +03:00
|
|
|
|
2016-08-28 14:43:00 +03:00
|
|
|
# endregion
|
|
|
|
|
|
|
|
# region Low level processing
|
2016-08-26 13:58:53 +03:00
|
|
|
|
|
|
|
def send_packet(self, packet, request):
|
2016-09-10 12:01:03 +03:00
|
|
|
"""Sends the given packet bytes with the additional
|
|
|
|
information of the original request. This does NOT lock the threads!"""
|
2016-08-28 14:43:00 +03:00
|
|
|
request.msg_id = self.session.get_new_msg_id()
|
2016-08-26 13:58:53 +03:00
|
|
|
|
2016-09-05 19:35:12 +03:00
|
|
|
# First calculate plain_text to encrypt it
|
|
|
|
with BinaryWriter() as plain_writer:
|
|
|
|
plain_writer.write_long(self.session.salt, signed=False)
|
|
|
|
plain_writer.write_long(self.session.id, signed=False)
|
|
|
|
plain_writer.write_long(request.msg_id)
|
|
|
|
plain_writer.write_int(self.generate_sequence(request.confirmed))
|
|
|
|
plain_writer.write_int(len(packet))
|
|
|
|
plain_writer.write(packet)
|
2016-08-26 13:58:53 +03:00
|
|
|
|
2016-09-05 19:35:12 +03:00
|
|
|
msg_key = utils.calc_msg_key(plain_writer.get_bytes())
|
2016-08-26 13:58:53 +03:00
|
|
|
|
2016-09-04 13:42:11 +03:00
|
|
|
key, iv = utils.calc_key(self.session.auth_key.key, msg_key, True)
|
2016-09-05 19:35:12 +03:00
|
|
|
cipher_text = AES.encrypt_ige(plain_writer.get_bytes(), key, iv)
|
2016-08-26 13:58:53 +03:00
|
|
|
|
2016-09-05 19:35:12 +03:00
|
|
|
# And then finally send the encrypted packet
|
|
|
|
with BinaryWriter() as cipher_writer:
|
2016-11-30 00:29:42 +03:00
|
|
|
cipher_writer.write_long(
|
|
|
|
self.session.auth_key.key_id, signed=False)
|
2016-09-05 19:35:12 +03:00
|
|
|
cipher_writer.write(msg_key)
|
|
|
|
cipher_writer.write(cipher_text)
|
|
|
|
self.transport.send(cipher_writer.get_bytes())
|
2016-08-26 13:58:53 +03:00
|
|
|
|
|
|
|
def decode_msg(self, body):
|
2016-08-28 14:43:00 +03:00
|
|
|
"""Decodes an received encrypted message body bytes"""
|
2016-08-26 13:58:53 +03:00
|
|
|
message = None
|
2016-08-28 14:43:00 +03:00
|
|
|
remote_msg_id = None
|
2016-08-26 13:58:53 +03:00
|
|
|
remote_sequence = None
|
|
|
|
|
|
|
|
with BinaryReader(body) as reader:
|
|
|
|
if len(body) < 8:
|
2016-09-04 12:07:18 +03:00
|
|
|
raise BufferError("Can't decode packet ({})".format(body))
|
2016-08-26 13:58:53 +03:00
|
|
|
|
|
|
|
# TODO Check for both auth key ID and msg_key correctness
|
2017-01-13 23:22:53 +03:00
|
|
|
reader.read_long() # remote_auth_key_id
|
2016-08-26 13:58:53 +03:00
|
|
|
msg_key = reader.read(16)
|
|
|
|
|
2016-09-04 22:07:09 +03:00
|
|
|
key, iv = utils.calc_key(self.session.auth_key.key, msg_key, False)
|
2016-11-30 00:29:42 +03:00
|
|
|
plain_text = AES.decrypt_ige(
|
|
|
|
reader.read(len(body) - reader.tell_position()), key, iv)
|
2016-08-26 13:58:53 +03:00
|
|
|
|
|
|
|
with BinaryReader(plain_text) as plain_text_reader:
|
2017-01-13 23:22:53 +03:00
|
|
|
plain_text_reader.read_long() # remote_salt
|
|
|
|
plain_text_reader.read_long() # remote_session_id
|
2016-08-28 14:43:00 +03:00
|
|
|
remote_msg_id = plain_text_reader.read_long()
|
2016-08-26 13:58:53 +03:00
|
|
|
remote_sequence = plain_text_reader.read_int()
|
|
|
|
msg_len = plain_text_reader.read_int()
|
|
|
|
message = plain_text_reader.read(msg_len)
|
|
|
|
|
2016-08-28 14:43:00 +03:00
|
|
|
return message, remote_msg_id, remote_sequence
|
2016-08-26 13:58:53 +03:00
|
|
|
|
2016-09-10 19:05:20 +03:00
|
|
|
def process_msg(self, msg_id, sequence, reader, request=None):
|
|
|
|
"""Processes and handles a Telegram message"""
|
2016-09-09 12:47:37 +03:00
|
|
|
|
2016-08-26 13:58:53 +03:00
|
|
|
# TODO Check salt, session_id and sequence_number
|
2016-08-28 14:43:00 +03:00
|
|
|
self.need_confirmation.append(msg_id)
|
2016-08-26 13:58:53 +03:00
|
|
|
|
|
|
|
code = reader.read_int(signed=False)
|
|
|
|
reader.seek(-4)
|
|
|
|
|
2016-09-10 19:05:20 +03:00
|
|
|
# The following codes are "parsed manually"
|
|
|
|
if code == 0xf35c6d01: # rpc_result, (response of an RPC call, i.e., we sent a request)
|
|
|
|
return self.handle_rpc_result(msg_id, sequence, reader, request)
|
|
|
|
|
2017-01-19 17:54:28 +03:00
|
|
|
if code == 0x347773c5: # pong
|
|
|
|
return self.handle_pong(msg_id, sequence, reader, request)
|
2016-09-10 19:05:20 +03:00
|
|
|
if code == 0x73f1f8dc: # msg_container
|
|
|
|
return self.handle_container(msg_id, sequence, reader, request)
|
|
|
|
if code == 0x3072cfa1: # gzip_packed
|
|
|
|
return self.handle_gzip_packed(msg_id, sequence, reader, request)
|
|
|
|
if code == 0xedab447b: # bad_server_salt
|
2016-11-30 00:29:42 +03:00
|
|
|
return self.handle_bad_server_salt(msg_id, sequence, reader,
|
|
|
|
request)
|
2016-09-10 19:05:20 +03:00
|
|
|
if code == 0xa7eff811: # bad_msg_notification
|
|
|
|
return self.handle_bad_msg_notification(msg_id, sequence, reader)
|
2016-09-09 12:47:37 +03:00
|
|
|
|
2016-09-26 18:16:15 +03:00
|
|
|
# msgs_ack, it may handle the request we wanted
|
2017-04-11 10:52:44 +03:00
|
|
|
if code == 0x62d6b459:
|
2016-09-26 14:13:11 +03:00
|
|
|
ack = reader.tgread_object()
|
|
|
|
if request and request.msg_id in ack.msg_ids:
|
2017-04-11 10:52:44 +03:00
|
|
|
Log.w('Ack found for the current request ID')
|
|
|
|
|
|
|
|
if self.ack_requests_confirm:
|
|
|
|
Log.w('Message ack confirmed a request')
|
|
|
|
request.confirm_received = True
|
|
|
|
|
2016-09-26 14:13:11 +03:00
|
|
|
return False
|
|
|
|
|
2016-09-09 12:47:37 +03:00
|
|
|
# If the code is not parsed manually, then it was parsed by the code generator!
|
|
|
|
# In this case, we will simply treat the incoming TLObject as an Update,
|
|
|
|
# if we can first find a matching TLObject
|
|
|
|
if code in tlobjects.keys():
|
|
|
|
return self.handle_update(msg_id, sequence, reader)
|
2016-08-26 13:58:53 +03:00
|
|
|
|
2016-09-06 20:39:25 +03:00
|
|
|
print('Unknown message: {}'.format(hex(code)))
|
2016-08-26 13:58:53 +03:00
|
|
|
return False
|
|
|
|
|
2016-08-28 14:43:00 +03:00
|
|
|
# endregion
|
|
|
|
|
|
|
|
# region Message handling
|
|
|
|
|
|
|
|
def handle_update(self, msg_id, sequence, reader):
|
2016-09-06 19:54:49 +03:00
|
|
|
tlobject = reader.tgread_object()
|
2017-04-09 14:14:04 +03:00
|
|
|
Log.d('Handling update for object %s', repr(tlobject))
|
2016-09-06 19:54:49 +03:00
|
|
|
for handler in self.on_update_handlers:
|
|
|
|
handler(tlobject)
|
|
|
|
|
2016-08-26 13:58:53 +03:00
|
|
|
return False
|
|
|
|
|
2017-01-19 17:54:28 +03:00
|
|
|
def handle_pong(self, msg_id, sequence, reader, request):
|
2017-04-09 14:14:04 +03:00
|
|
|
Log.d('Handling pong')
|
2017-01-19 17:54:28 +03:00
|
|
|
reader.read_int(signed=False) # code
|
|
|
|
recv_msg_id = reader.read_long(signed=False)
|
|
|
|
|
|
|
|
if recv_msg_id == request.msg_id:
|
2017-04-09 14:14:04 +03:00
|
|
|
Log.w('Pong confirmed a request')
|
2017-01-19 17:54:28 +03:00
|
|
|
request.confirm_received = True
|
|
|
|
|
|
|
|
return False
|
|
|
|
|
2016-08-28 14:43:00 +03:00
|
|
|
def handle_container(self, msg_id, sequence, reader, request):
|
2017-04-09 14:14:04 +03:00
|
|
|
Log.d('Handling container')
|
2017-01-13 23:22:53 +03:00
|
|
|
reader.read_int(signed=False) # code
|
2016-08-26 13:58:53 +03:00
|
|
|
size = reader.read_int()
|
|
|
|
for _ in range(size):
|
|
|
|
inner_msg_id = reader.read_long(signed=False)
|
2017-01-13 23:22:53 +03:00
|
|
|
reader.read_int() # inner_sequence
|
2016-08-26 13:58:53 +03:00
|
|
|
inner_length = reader.read_int()
|
|
|
|
begin_position = reader.tell_position()
|
2016-09-06 19:54:49 +03:00
|
|
|
|
|
|
|
if not self.process_msg(inner_msg_id, sequence, reader, request):
|
|
|
|
reader.set_position(begin_position + inner_length)
|
2016-08-26 13:58:53 +03:00
|
|
|
|
|
|
|
return False
|
|
|
|
|
2016-09-10 19:05:20 +03:00
|
|
|
def handle_bad_server_salt(self, msg_id, sequence, reader, request):
|
2017-04-09 14:14:04 +03:00
|
|
|
Log.d('Handling bad server salt')
|
2017-01-13 23:22:53 +03:00
|
|
|
reader.read_int(signed=False) # code
|
|
|
|
reader.read_long(signed=False) # bad_msg_id
|
|
|
|
reader.read_int() # bad_msg_seq_no
|
|
|
|
reader.read_int() # error_code
|
2016-08-26 13:58:53 +03:00
|
|
|
new_salt = reader.read_long(signed=False)
|
|
|
|
|
2016-08-28 14:43:00 +03:00
|
|
|
self.session.salt = new_salt
|
2016-08-26 13:58:53 +03:00
|
|
|
|
2016-09-10 19:05:20 +03:00
|
|
|
if request is None:
|
2016-11-30 00:29:42 +03:00
|
|
|
raise ValueError(
|
|
|
|
'Tried to handle a bad server salt with no request specified')
|
2016-09-10 19:05:20 +03:00
|
|
|
|
2016-08-26 13:58:53 +03:00
|
|
|
# Resend
|
2016-10-02 14:30:14 +03:00
|
|
|
self.send(request)
|
2016-08-26 13:58:53 +03:00
|
|
|
|
|
|
|
return True
|
|
|
|
|
2016-08-28 14:43:00 +03:00
|
|
|
def handle_bad_msg_notification(self, msg_id, sequence, reader):
|
2017-04-09 14:14:04 +03:00
|
|
|
Log.d('Handling bad message notification')
|
2017-01-13 23:22:53 +03:00
|
|
|
reader.read_int(signed=False) # code
|
|
|
|
reader.read_long(signed=False) # request_id
|
|
|
|
reader.read_int() # request_sequence
|
2016-08-26 13:58:53 +03:00
|
|
|
|
2016-09-05 19:35:12 +03:00
|
|
|
error_code = reader.read_int()
|
|
|
|
raise BadMessageError(error_code)
|
2016-08-26 13:58:53 +03:00
|
|
|
|
2016-09-09 12:47:37 +03:00
|
|
|
def handle_rpc_result(self, msg_id, sequence, reader, request):
|
2017-04-09 14:14:04 +03:00
|
|
|
Log.d('Handling RPC result, request is%s None', ' not' if request else '')
|
2017-01-13 23:22:53 +03:00
|
|
|
reader.read_int(signed=False) # code
|
2016-08-26 13:58:53 +03:00
|
|
|
request_id = reader.read_long(signed=False)
|
2016-09-06 19:54:49 +03:00
|
|
|
inner_code = reader.read_int(signed=False)
|
2016-08-26 13:58:53 +03:00
|
|
|
|
2016-10-02 14:30:14 +03:00
|
|
|
if request and request_id == request.msg_id:
|
2016-09-09 12:47:37 +03:00
|
|
|
request.confirm_received = True
|
2016-08-26 13:58:53 +03:00
|
|
|
|
|
|
|
if inner_code == 0x2144ca19: # RPC Error
|
2016-11-30 00:29:42 +03:00
|
|
|
error = RPCError(
|
|
|
|
code=reader.read_int(), message=reader.tgread_string())
|
2017-04-09 14:14:04 +03:00
|
|
|
|
|
|
|
Log.w('Read RPC error: %s', str(error))
|
2016-09-06 19:54:49 +03:00
|
|
|
if error.must_resend:
|
2016-10-02 14:30:14 +03:00
|
|
|
if not request:
|
2016-11-30 00:29:42 +03:00
|
|
|
raise ValueError(
|
|
|
|
'The previously sent request must be resent. '
|
|
|
|
'However, no request was previously sent (called from updates thread).')
|
2016-09-09 12:47:37 +03:00
|
|
|
request.confirm_received = False
|
2016-08-26 13:58:53 +03:00
|
|
|
|
2016-09-06 19:54:49 +03:00
|
|
|
if error.message.startswith('FLOOD_WAIT_'):
|
2017-04-11 10:58:22 +03:00
|
|
|
self.updates_thread_sleep = error.additional_data
|
|
|
|
|
2016-11-30 00:29:42 +03:00
|
|
|
print('Should wait {}s. Sleeping until then.'.format(
|
|
|
|
error.additional_data))
|
2016-09-06 19:54:49 +03:00
|
|
|
sleep(error.additional_data)
|
2016-08-26 13:58:53 +03:00
|
|
|
|
2017-03-20 14:23:53 +03:00
|
|
|
elif '_MIGRATE_' in error.message:
|
2016-09-06 19:54:49 +03:00
|
|
|
raise InvalidDCError(error.additional_data)
|
2016-08-26 13:58:53 +03:00
|
|
|
|
2016-09-06 19:54:49 +03:00
|
|
|
else:
|
|
|
|
raise error
|
2016-08-26 13:58:53 +03:00
|
|
|
else:
|
2016-10-02 14:30:14 +03:00
|
|
|
if not request:
|
2016-11-30 00:29:42 +03:00
|
|
|
raise ValueError(
|
|
|
|
'Cannot receive a request from inside an RPC result from the updates thread.')
|
2016-10-02 14:30:14 +03:00
|
|
|
|
2017-04-09 14:14:04 +03:00
|
|
|
Log.d('Reading request response')
|
2016-09-06 19:54:49 +03:00
|
|
|
if inner_code == 0x3072cfa1: # GZip packed
|
|
|
|
unpacked_data = gzip.decompress(reader.tgread_bytes())
|
|
|
|
with BinaryReader(unpacked_data) as compressed_reader:
|
2016-09-09 12:47:37 +03:00
|
|
|
request.on_response(compressed_reader)
|
2016-09-06 19:54:49 +03:00
|
|
|
else:
|
|
|
|
reader.seek(-4)
|
2016-09-09 12:47:37 +03:00
|
|
|
request.on_response(reader)
|
2016-08-26 13:58:53 +03:00
|
|
|
|
2016-09-10 19:05:20 +03:00
|
|
|
def handle_gzip_packed(self, msg_id, sequence, reader, request):
|
2017-04-09 14:14:04 +03:00
|
|
|
Log.d('Handling gzip packed data')
|
2017-01-13 23:22:53 +03:00
|
|
|
reader.read_int(signed=False) # code
|
2016-08-26 13:58:53 +03:00
|
|
|
packed_data = reader.tgread_bytes()
|
2016-09-05 19:35:12 +03:00
|
|
|
unpacked_data = gzip.decompress(packed_data)
|
2016-08-26 13:58:53 +03:00
|
|
|
|
|
|
|
with BinaryReader(unpacked_data) as compressed_reader:
|
2016-11-30 00:29:42 +03:00
|
|
|
return self.process_msg(msg_id, sequence, compressed_reader,
|
|
|
|
request)
|
2016-08-28 14:43:00 +03:00
|
|
|
|
|
|
|
# endregion
|
2016-09-09 12:47:37 +03:00
|
|
|
|
2017-04-06 19:46:09 +03:00
|
|
|
def set_updates_thread(self, running):
|
|
|
|
"""Sets the updates thread status (running or not)"""
|
|
|
|
if running == self.updates_thread_running:
|
|
|
|
return
|
|
|
|
|
|
|
|
# Different state, update the saved value and behave as required
|
2017-04-09 14:14:04 +03:00
|
|
|
Log.i('Changing updates thread running status to %s', running)
|
2017-04-06 19:46:09 +03:00
|
|
|
self.updates_thread_running = running
|
|
|
|
if running:
|
|
|
|
self.updates_thread.start()
|
|
|
|
|
|
|
|
elif self.updates_thread_receiving:
|
|
|
|
self.transport.cancel_receive()
|
2016-09-10 19:05:20 +03:00
|
|
|
|
2016-09-09 12:47:37 +03:00
|
|
|
def updates_thread_method(self):
|
|
|
|
"""This method will run until specified and listen for incoming updates"""
|
2016-10-03 10:53:41 +03:00
|
|
|
|
|
|
|
# Set a reasonable timeout when checking for updates
|
|
|
|
timeout = timedelta(minutes=1)
|
|
|
|
|
2017-04-06 19:46:09 +03:00
|
|
|
while self.updates_thread_running:
|
2017-04-09 14:16:22 +03:00
|
|
|
# Always sleep a bit before each iteration to relax the CPU,
|
|
|
|
# since it's possible to early 'continue' the loop to reach
|
|
|
|
# the next iteration, but we still should to sleep.
|
|
|
|
if self.updates_thread_running:
|
2017-04-11 10:58:22 +03:00
|
|
|
if self.updates_thread_sleep:
|
|
|
|
sleep(self.updates_thread_sleep)
|
|
|
|
self.updates_thread_sleep = None
|
|
|
|
else:
|
|
|
|
# Longer sleep if we're not expecting updates (only pings)
|
|
|
|
sleep(0.1 if self.on_update_handlers else 1)
|
2017-04-09 14:16:22 +03:00
|
|
|
|
2016-10-02 14:30:14 +03:00
|
|
|
# Only try to receive updates if we're not waiting to receive a request
|
|
|
|
if not self.waiting_receive:
|
|
|
|
with self.lock:
|
2017-04-09 14:14:04 +03:00
|
|
|
Log.d('Updates thread acquired the lock')
|
2016-10-02 14:30:14 +03:00
|
|
|
try:
|
2017-02-19 17:20:21 +03:00
|
|
|
now = time()
|
2017-04-06 19:46:09 +03:00
|
|
|
# If ping_interval seconds passed since last ping, send a new one
|
2017-02-19 17:20:21 +03:00
|
|
|
if now >= self.ping_time_last + self.ping_interval:
|
|
|
|
self.ping_time_last = now
|
|
|
|
self.send_ping()
|
2017-04-09 14:14:04 +03:00
|
|
|
Log.d('Ping sent from the updates thread')
|
2017-04-06 19:46:09 +03:00
|
|
|
|
|
|
|
# Exit the loop if we're not expecting to receive any updates
|
|
|
|
if not self.on_update_handlers:
|
2017-04-09 14:14:04 +03:00
|
|
|
Log.d('No updates handlers found, continuing')
|
2017-02-19 17:20:21 +03:00
|
|
|
continue
|
|
|
|
|
2016-10-02 14:30:14 +03:00
|
|
|
self.updates_thread_receiving = True
|
2017-04-09 14:14:04 +03:00
|
|
|
Log.d('Trying to receive updates from the updates thread')
|
2016-10-03 10:53:41 +03:00
|
|
|
seq, body = self.transport.receive(timeout)
|
2016-11-30 00:29:42 +03:00
|
|
|
message, remote_msg_id, remote_sequence = self.decode_msg(
|
|
|
|
body)
|
2016-09-09 12:47:37 +03:00
|
|
|
|
2017-04-09 14:14:04 +03:00
|
|
|
Log.i('Received update from the updates thread')
|
2016-10-02 14:30:14 +03:00
|
|
|
with BinaryReader(message) as reader:
|
2016-11-30 00:29:42 +03:00
|
|
|
self.process_msg(remote_msg_id, remote_sequence,
|
|
|
|
reader)
|
2016-09-09 12:47:37 +03:00
|
|
|
|
2017-04-09 14:14:04 +03:00
|
|
|
except TimeoutError:
|
|
|
|
Log.d('Receiving updates timed out')
|
|
|
|
except ReadCancelledError:
|
|
|
|
Log.i('Receiving updates cancelled')
|
2016-09-09 12:47:37 +03:00
|
|
|
|
2017-04-09 14:14:04 +03:00
|
|
|
Log.d('Updates thread released the lock')
|
2016-10-02 14:30:14 +03:00
|
|
|
self.updates_thread_receiving = False
|