tdesktop/Telegram/SourceFiles/mtproto/session.h

308 lines
7.7 KiB
C
Raw Normal View History

/*
This file is part of Telegram Desktop,
the official desktop application for the Telegram messaging service.
For license and copyright information please follow this link:
https://github.com/telegramdesktop/tdesktop/blob/master/LEGAL
*/
#pragma once
2019-01-18 11:26:43 +00:00
#include "base/timer.h"
2019-11-18 09:28:14 +00:00
#include "mtproto/mtproto_rpc_sender.h"
2019-11-13 14:12:04 +00:00
#include "mtproto/mtproto_proxy_data.h"
#include <QtCore/QTimer>
namespace MTP {
class Instance;
2017-06-26 17:38:16 +00:00
class AuthKey;
using AuthKeyPtr = std::shared_ptr<AuthKey>;
namespace internal {
2017-06-26 17:38:16 +00:00
class Dcenter;
class Connection;
using PreRequestMap = QMap<mtpRequestId, SecureRequest>;
using RequestMap = QMap<mtpMsgId, SecureRequest>;
class RequestIdsMap : public QMap<mtpMsgId, mtpRequestId> {
public:
using ParentType = QMap<mtpMsgId, mtpRequestId>;
mtpMsgId min() const {
return size() ? cbegin().key() : 0;
}
mtpMsgId max() const {
ParentType::const_iterator e(cend());
return size() ? (--e).key() : 0;
}
};
using SerializedMessage = mtpBuffer;
inline bool ResponseNeedsAck(const SerializedMessage &response) {
if (response.size() < 8) {
return false;
}
auto seqNo = *(uint32*)(response.constData() + 6);
return (seqNo & 0x01) ? true : false;
}
struct ConnectionOptions {
ConnectionOptions() = default;
ConnectionOptions(
const QString &systemLangCode,
const QString &cloudLangCode,
2018-08-20 11:31:40 +00:00
const QString &langPackName,
const ProxyData &proxy,
bool useIPv4,
bool useIPv6,
bool useHttp,
bool useTcp);
ConnectionOptions(const ConnectionOptions &other) = default;
ConnectionOptions &operator=(const ConnectionOptions &other) = default;
QString systemLangCode;
QString cloudLangCode;
2018-08-20 11:31:40 +00:00
QString langPackName;
ProxyData proxy;
bool useIPv4 = true;
bool useIPv6 = true;
bool useHttp = true;
bool useTcp = true;
};
class Session;
class SessionData {
public:
SessionData(not_null<Session*> creator) : _owner(creator) {
}
void notifyConnectionInited(const ConnectionOptions &options);
void setConnectionOptions(ConnectionOptions options) {
2019-11-20 10:41:14 +00:00
QWriteLocker locker(&_optionsLock);
_options = options;
}
[[nodiscard]] ConnectionOptions connectionOptions() const {
2019-11-20 10:41:14 +00:00
QReadLocker locker(&_optionsLock);
return _options;
}
not_null<QReadWriteLock*> toSendMutex() const {
return &_toSendLock;
}
not_null<QReadWriteLock*> haveSentMutex() const {
return &_haveSentLock;
}
not_null<QReadWriteLock*> toResendMutex() const {
return &_toResendLock;
}
not_null<QReadWriteLock*> wereAckedMutex() const {
return &_wereAckedLock;
}
not_null<QReadWriteLock*> haveReceivedMutex() const {
return &_haveReceivedLock;
}
PreRequestMap &toSendMap() {
return _toSend;
}
const PreRequestMap &toSendMap() const {
return _toSend;
}
RequestMap &haveSentMap() {
return _haveSent;
}
const RequestMap &haveSentMap() const {
return _haveSent;
}
RequestIdsMap &toResendMap() { // msgId -> requestId, on which toSend: requestId -> request for resended requests
return _toResend;
}
const RequestIdsMap &toResendMap() const {
return _toResend;
}
RequestIdsMap &wereAckedMap() {
return _wereAcked;
}
const RequestIdsMap &wereAckedMap() const {
return _wereAcked;
}
QMap<mtpRequestId, SerializedMessage> &haveReceivedResponses() {
return _receivedResponses;
}
const QMap<mtpRequestId, SerializedMessage> &haveReceivedResponses() const {
return _receivedResponses;
}
QList<SerializedMessage> &haveReceivedUpdates() {
return _receivedUpdates;
}
const QList<SerializedMessage> &haveReceivedUpdates() const {
return _receivedUpdates;
}
// Warning! Valid only in constructor, _owner is guaranteed != null.
[[nodiscard]] not_null<Session*> owner() {
return _owner;
}
void clearForNewKey(not_null<Instance*> instance);
// Connection -> Session interface.
void queueTryToReceive();
void queueNeedToResumeAndSend();
void queueConnectionStateChange(int newState);
void queueResetDone();
void queueSendAnything(crl::time msCanWait = 0);
void queueSendMsgsStateInfo(quint64 msgId, QByteArray data);
[[nodiscard]] bool connectionInited() const;
[[nodiscard]] AuthKeyPtr getPersistentKey() const;
[[nodiscard]] AuthKeyPtr getTemporaryKey() const;
[[nodiscard]] bool acquireKeyCreation();
void releaseKeyCreationOnDone(
const AuthKeyPtr &temporaryKey,
const AuthKeyPtr &persistentKey);
void releaseKeyCreationOnFail();
void destroyTemporaryKey(uint64 keyId);
void resend(
mtpMsgId msgId,
crl::time msCanWait,
bool forceContainer);
void resendAll();
void detach();
private:
template <typename Callback>
void withSession(Callback &&callback);
Session *_owner = nullptr;
mutable QMutex _ownerMutex;
ConnectionOptions _options;
PreRequestMap _toSend; // map of request_id -> request, that is waiting to be sent
RequestMap _haveSent; // map of msg_id -> request, that was sent, msDate = 0 for msgs_state_req (no resend / state req), msDate = 0, seqNo = 0 for containers
RequestIdsMap _toResend; // map of msg_id -> request_id, that request_id -> request lies in toSend and is waiting to be resent
RequestIdsMap _wereAcked; // map of msg_id -> request_id, this msg_ids already were acked or do not need ack
QMap<mtpRequestId, SerializedMessage> _receivedResponses; // map of request_id -> response that should be processed in the main thread
QList<SerializedMessage> _receivedUpdates; // list of updates that should be processed in the main thread
// mutexes
2019-11-20 10:41:14 +00:00
mutable QReadWriteLock _optionsLock;
mutable QReadWriteLock _toSendLock;
mutable QReadWriteLock _haveSentLock;
mutable QReadWriteLock _toResendLock;
mutable QReadWriteLock _wereAckedLock;
mutable QReadWriteLock _haveReceivedLock;
};
class Session : public QObject {
Q_OBJECT
public:
// Main thread.
2019-11-15 07:28:33 +00:00
Session(
not_null<Instance*> instance,
ShiftedDcId shiftedDcId,
2019-11-20 13:33:45 +00:00
not_null<Dcenter*> dc);
~Session();
void start();
void reInitConnection();
void restart();
void refreshOptions();
void stop();
void kill();
void unpaused();
// Thread-safe.
[[nodiscard]] ShiftedDcId getDcWithShift() const;
[[nodiscard]] AuthKeyPtr getPersistentKey() const;
[[nodiscard]] AuthKeyPtr getTemporaryKey() const;
[[nodiscard]] bool connectionInited() const;
void resend(
mtpMsgId msgId,
crl::time msCanWait = 0,
bool forceContainer = false);
void resendAll();
// Thread-safe.
// Nulls msgId and seqNo in request, if newRequest = true.
void sendPrepared(
const SecureRequest &request,
crl::time msCanWait = 0,
bool newRequest = true);
// Connection thread.
[[nodiscard]] bool acquireKeyCreation();
void releaseKeyCreationOnDone(
const AuthKeyPtr &temporaryKey,
const AuthKeyPtr &persistentKey);
void releaseKeyCreationOnFail();
void destroyTemporaryKey(uint64 keyId);
void notifyDcConnectionInited();
void ping();
void cancel(mtpRequestId requestId, mtpMsgId msgId);
int32 requestState(mtpRequestId requestId) const;
int32 getState() const;
QString transport() const;
void tryToReceive();
void needToResumeAndSend();
void connectionStateChange(int newState);
void resetDone();
void sendAnything(crl::time msCanWait = 0);
void sendMsgsStateInfo(quint64 msgId, QByteArray data);
signals:
void authKeyChanged();
void needToSend();
void needToPing();
2014-11-24 13:21:27 +00:00
void needToRestart();
private:
void watchDcKeyChanges();
bool rpcErrorOccured(mtpRequestId requestId, const RPCFailHandlerPtr &onFail, const RPCError &err);
2019-11-14 17:39:15 +00:00
const not_null<Instance*> _instance;
const ShiftedDcId _shiftedDcId = 0;
const not_null<Dcenter*> _dc;
const std::shared_ptr<SessionData> _data;
2019-11-14 17:39:15 +00:00
std::unique_ptr<Connection> _connection;
bool _killed = false;
bool _needToReceive = false;
AuthKeyPtr _dcKeyForCheck;
bool _myKeyCreation = false;
2019-11-14 07:13:17 +00:00
crl::time _msSendCall = 0;
crl::time _msWait = 0;
bool _ping = false;
2019-11-14 17:39:15 +00:00
base::Timer _timeouter;
2019-11-14 07:13:17 +00:00
base::Timer _sender;
rpl::lifetime _lifetime;
};
} // namespace internal
} // namespace MTP