1429 lines
44 KiB
C++
1429 lines
44 KiB
C++
/*
|
|
This file is part of Telegram Desktop,
|
|
the official desktop version of Telegram messaging app, see https://telegram.org
|
|
|
|
Telegram Desktop is free software: you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
It is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
In addition, as a special exception, the copyright holders give permission
|
|
to link the code of portions of this program with the OpenSSL library.
|
|
|
|
Full license: https://github.com/telegramdesktop/tdesktop/blob/master/LICENSE
|
|
Copyright (c) 2014-2017 John Preston, https://desktop.telegram.org
|
|
*/
|
|
#include "mtproto/mtp_instance.h"
|
|
|
|
#include "mtproto/dc_options.h"
|
|
#include "storage/localstorage.h"
|
|
#include "auth_session.h"
|
|
#include "messenger.h"
|
|
#include "mtproto/connection.h"
|
|
#include "mtproto/sender.h"
|
|
#include "mtproto/rsa_public_key.h"
|
|
|
|
namespace MTP {
|
|
|
|
class Instance::Private : public Sender {
|
|
public:
|
|
Private(Instance *instance, DcOptions *options, Instance::Mode mode);
|
|
|
|
void start(Config &&config);
|
|
|
|
void suggestMainDcId(DcId mainDcId);
|
|
void setMainDcId(DcId mainDcId);
|
|
DcId mainDcId() const;
|
|
|
|
void setKeyForWrite(DcId dcId, const AuthKeyPtr &key);
|
|
AuthKeysList getKeysForWrite() const;
|
|
void addKeysForDestroy(AuthKeysList &&keys);
|
|
|
|
DcOptions *dcOptions();
|
|
|
|
void configLoadRequest();
|
|
void cdnConfigLoadRequest();
|
|
|
|
void restart();
|
|
void restart(ShiftedDcId shiftedDcId);
|
|
int32 dcstate(ShiftedDcId shiftedDcId = 0);
|
|
QString dctransport(ShiftedDcId shiftedDcId = 0);
|
|
void ping();
|
|
void cancel(mtpRequestId requestId);
|
|
int32 state(mtpRequestId requestId); // < 0 means waiting for such count of ms
|
|
void killSession(ShiftedDcId shiftedDcId);
|
|
void killSession(std::unique_ptr<internal::Session> session);
|
|
void stopSession(ShiftedDcId shiftedDcId);
|
|
void logout(RPCDoneHandlerPtr onDone, RPCFailHandlerPtr onFail);
|
|
|
|
internal::DcenterPtr getDcById(ShiftedDcId shiftedDcId);
|
|
void unpaused();
|
|
|
|
void queueQuittingConnection(std::unique_ptr<internal::Connection> connection);
|
|
void connectionFinished(internal::Connection *connection);
|
|
|
|
void registerRequest(mtpRequestId requestId, int32 dcWithShift);
|
|
void unregisterRequest(mtpRequestId requestId);
|
|
mtpRequestId storeRequest(mtpRequest &request, const RPCResponseHandler &parser);
|
|
mtpRequest getRequest(mtpRequestId requestId);
|
|
void clearCallbacks(mtpRequestId requestId, int32 errorCode = RPCError::NoError); // 0 - do not toggle onError callback
|
|
void clearCallbacksDelayed(const RPCCallbackClears &requestIds);
|
|
void performDelayedClear();
|
|
void execCallback(mtpRequestId requestId, const mtpPrime *from, const mtpPrime *end);
|
|
bool hasCallbacks(mtpRequestId requestId);
|
|
void globalCallback(const mtpPrime *from, const mtpPrime *end);
|
|
|
|
void onStateChange(ShiftedDcId dcWithShift, int32 state);
|
|
void onSessionReset(ShiftedDcId dcWithShift);
|
|
|
|
// return true if need to clean request data
|
|
bool rpcErrorOccured(mtpRequestId requestId, const RPCFailHandlerPtr &onFail, const RPCError &err);
|
|
inline bool rpcErrorOccured(mtpRequestId requestId, const RPCResponseHandler &handler, const RPCError &err) {
|
|
return rpcErrorOccured(requestId, handler.onFail, err);
|
|
}
|
|
|
|
void setUpdatesHandler(RPCDoneHandlerPtr onDone);
|
|
void setGlobalFailHandler(RPCFailHandlerPtr onFail);
|
|
void setStateChangedHandler(base::lambda<void(ShiftedDcId shiftedDcId, int32 state)> handler);
|
|
void setSessionResetHandler(base::lambda<void(ShiftedDcId shiftedDcId)> handler);
|
|
void clearGlobalHandlers();
|
|
|
|
internal::Session *getSession(ShiftedDcId shiftedDcId);
|
|
|
|
bool isKeysDestroyer() const {
|
|
return (_mode == Instance::Mode::KeysDestroyer);
|
|
}
|
|
|
|
void scheduleKeyDestroy(ShiftedDcId shiftedDcId);
|
|
void performKeyDestroy(ShiftedDcId shiftedDcId);
|
|
void completedKeyDestroy(ShiftedDcId shiftedDcId);
|
|
|
|
void clearKilledSessions();
|
|
void prepareToDestroy();
|
|
|
|
private:
|
|
bool hasAuthorization();
|
|
void importDone(const MTPauth_Authorization &result, mtpRequestId requestId);
|
|
bool importFail(const RPCError &error, mtpRequestId requestId);
|
|
void exportDone(const MTPauth_ExportedAuthorization &result, mtpRequestId requestId);
|
|
bool exportFail(const RPCError &error, mtpRequestId requestId);
|
|
bool onErrorDefault(mtpRequestId requestId, const RPCError &error);
|
|
|
|
bool logoutGuestDone(mtpRequestId requestId);
|
|
|
|
void configLoadDone(const MTPConfig &result);
|
|
bool configLoadFail(const RPCError &error);
|
|
|
|
void cdnConfigLoadDone(const MTPCdnConfig &result);
|
|
bool cdnConfigLoadFail(const RPCError &error);
|
|
|
|
void checkDelayedRequests();
|
|
|
|
Instance *_instance = nullptr;
|
|
DcOptions *_dcOptions = nullptr;
|
|
Instance::Mode _mode = Instance::Mode::Normal;
|
|
|
|
DcId _mainDcId = Config::kDefaultMainDc;
|
|
bool _mainDcIdForced = false;
|
|
internal::DcenterMap _dcenters;
|
|
|
|
internal::Session *_mainSession = nullptr;
|
|
std::map<ShiftedDcId, std::unique_ptr<internal::Session>> _sessions;
|
|
std::vector<std::unique_ptr<internal::Session>> _killedSessions; // delayed delete
|
|
|
|
base::set_of_unique_ptr<internal::Connection> _quittingConnections;
|
|
|
|
std::unique_ptr<internal::ConfigLoader> _configLoader;
|
|
mtpRequestId _cdnConfigLoadRequestId = 0;
|
|
|
|
std::map<DcId, AuthKeyPtr> _keysForWrite;
|
|
mutable QReadWriteLock _keysForWriteLock;
|
|
|
|
std::map<ShiftedDcId, mtpRequestId> _logoutGuestRequestIds;
|
|
|
|
// holds dcWithShift for request to this dc or -dc for request to main dc
|
|
std::map<mtpRequestId, ShiftedDcId> _requestsByDc;
|
|
QMutex _requestByDcLock;
|
|
|
|
// holds target dcWithShift for auth export request
|
|
std::map<mtpRequestId, ShiftedDcId> _authExportRequests;
|
|
|
|
std::map<mtpRequestId, RPCResponseHandler> _parserMap;
|
|
QMutex _parserMapLock;
|
|
|
|
std::map<mtpRequestId, mtpRequest> _requestMap;
|
|
QReadWriteLock _requestMapLock;
|
|
|
|
std::deque<std::pair<mtpRequestId, TimeMs>> _delayedRequests;
|
|
|
|
std::map<mtpRequestId, int> _requestsDelays;
|
|
|
|
std::set<mtpRequestId> _badGuestDcRequests;
|
|
|
|
std::map<DcId, std::vector<mtpRequestId>> _authWaiters;
|
|
|
|
QMutex _toClearLock;
|
|
RPCCallbackClears _toClear;
|
|
|
|
RPCResponseHandler _globalHandler;
|
|
base::lambda<void(ShiftedDcId shiftedDcId, int32 state)> _stateChangedHandler;
|
|
base::lambda<void(ShiftedDcId shiftedDcId)> _sessionResetHandler;
|
|
|
|
SingleTimer _checkDelayedTimer;
|
|
|
|
// Debug flag to find out how we end up crashing.
|
|
bool MustNotCreateSessions = false;
|
|
|
|
};
|
|
|
|
Instance::Private::Private(Instance *instance, DcOptions *options, Instance::Mode mode) : Sender(instance), _instance(instance)
|
|
, _dcOptions(options)
|
|
, _mode(mode) {
|
|
}
|
|
|
|
void Instance::Private::start(Config &&config) {
|
|
if (isKeysDestroyer()) {
|
|
_instance->connect(_instance, SIGNAL(keyDestroyed(qint32)), _instance, SLOT(onKeyDestroyed(qint32)), Qt::QueuedConnection);
|
|
} else {
|
|
unixtimeInit();
|
|
}
|
|
|
|
for (auto &key : config.keys) {
|
|
auto dcId = key->dcId();
|
|
auto shiftedDcId = dcId;
|
|
if (isKeysDestroyer()) {
|
|
shiftedDcId = MTP::destroyKeyNextDcId(shiftedDcId);
|
|
|
|
// There could be several keys for one dc if we're destroying them.
|
|
// Place them all in separate shiftedDcId so that they won't conflict.
|
|
while (_keysForWrite.find(shiftedDcId) != _keysForWrite.cend()) {
|
|
shiftedDcId = MTP::destroyKeyNextDcId(shiftedDcId);
|
|
}
|
|
}
|
|
_keysForWrite[shiftedDcId] = key;
|
|
|
|
auto dc = std::make_shared<internal::Dcenter>(_instance, dcId, std::move(key));
|
|
_dcenters.emplace(shiftedDcId, std::move(dc));
|
|
}
|
|
|
|
if (config.mainDcId != Config::kNotSetMainDc) {
|
|
_mainDcId = config.mainDcId;
|
|
_mainDcIdForced = true;
|
|
}
|
|
|
|
if (isKeysDestroyer()) {
|
|
for (auto &dc : _dcenters) {
|
|
t_assert(!MustNotCreateSessions);
|
|
auto shiftedDcId = dc.first;
|
|
auto session = std::make_unique<internal::Session>(_instance, shiftedDcId);
|
|
auto it = _sessions.emplace(shiftedDcId, std::move(session)).first;
|
|
it->second->start();
|
|
}
|
|
} else if (_mainDcId != Config::kNoneMainDc) {
|
|
t_assert(!MustNotCreateSessions);
|
|
auto main = std::make_unique<internal::Session>(_instance, _mainDcId);
|
|
_mainSession = main.get();
|
|
_sessions.emplace(_mainDcId, std::move(main));
|
|
_mainSession->start();
|
|
}
|
|
|
|
_checkDelayedTimer.setTimeoutHandler([this] {
|
|
checkDelayedRequests();
|
|
});
|
|
|
|
t_assert((_mainDcId == Config::kNoneMainDc) == isKeysDestroyer());
|
|
if (!isKeysDestroyer()) {
|
|
configLoadRequest();
|
|
}
|
|
}
|
|
|
|
void Instance::Private::suggestMainDcId(DcId mainDcId) {
|
|
if (_mainDcIdForced) return;
|
|
setMainDcId(mainDcId);
|
|
}
|
|
|
|
void Instance::Private::setMainDcId(DcId mainDcId) {
|
|
if (!_mainSession) {
|
|
LOG(("MTP Error: attempting to change mainDcId in an MTP instance without main session."));
|
|
return;
|
|
}
|
|
|
|
_mainDcIdForced = true;
|
|
auto oldMainDcId = _mainSession->getDcWithShift();
|
|
_mainDcId = mainDcId;
|
|
if (oldMainDcId != _mainDcId) {
|
|
killSession(oldMainDcId);
|
|
}
|
|
Local::writeMtpData();
|
|
}
|
|
|
|
DcId Instance::Private::mainDcId() const {
|
|
t_assert(_mainDcId != Config::kNoneMainDc);
|
|
return _mainDcId;
|
|
}
|
|
|
|
void Instance::Private::configLoadRequest() {
|
|
if (_configLoader) {
|
|
return;
|
|
}
|
|
_configLoader = std::make_unique<internal::ConfigLoader>(_instance, rpcDone([this](const MTPConfig &result) {
|
|
configLoadDone(result);
|
|
}), rpcFail([this](const RPCError &error) {
|
|
return configLoadFail(error);
|
|
}));
|
|
_configLoader->load();
|
|
}
|
|
|
|
void Instance::Private::cdnConfigLoadRequest() {
|
|
if (_cdnConfigLoadRequestId || _mainDcId == Config::kNoneMainDc) {
|
|
return;
|
|
}
|
|
_cdnConfigLoadRequestId = request(MTPhelp_GetCdnConfig()).done([this](const MTPCdnConfig &result) {
|
|
_cdnConfigLoadRequestId = 0;
|
|
|
|
Expects(result.type() == mtpc_cdnConfig);
|
|
dcOptions()->setCDNConfig(result.c_cdnConfig());
|
|
|
|
Local::writeSettings();
|
|
|
|
emit _instance->cdnConfigLoaded();
|
|
}).send();
|
|
}
|
|
|
|
void Instance::Private::restart() {
|
|
for (auto &session : _sessions) {
|
|
session.second->restart();
|
|
}
|
|
}
|
|
|
|
void Instance::Private::restart(ShiftedDcId shiftedDcId) {
|
|
auto dcId = bareDcId(shiftedDcId);
|
|
for (auto &session : _sessions) {
|
|
if (bareDcId(session.second->getDcWithShift()) == dcId) {
|
|
session.second->restart();
|
|
}
|
|
}
|
|
}
|
|
|
|
int32 Instance::Private::dcstate(ShiftedDcId shiftedDcId) {
|
|
if (!shiftedDcId) {
|
|
t_assert(_mainSession != nullptr);
|
|
return _mainSession->getState();
|
|
}
|
|
|
|
if (!bareDcId(shiftedDcId)) {
|
|
t_assert(_mainSession != nullptr);
|
|
shiftedDcId += bareDcId(_mainSession->getDcWithShift());
|
|
}
|
|
|
|
auto it = _sessions.find(shiftedDcId);
|
|
if (it != _sessions.cend()) {
|
|
return it->second->getState();
|
|
}
|
|
|
|
return DisconnectedState;
|
|
}
|
|
|
|
QString Instance::Private::dctransport(ShiftedDcId shiftedDcId) {
|
|
if (!shiftedDcId) {
|
|
t_assert(_mainSession != nullptr);
|
|
return _mainSession->transport();
|
|
}
|
|
if (!bareDcId(shiftedDcId)) {
|
|
t_assert(_mainSession != nullptr);
|
|
shiftedDcId += bareDcId(_mainSession->getDcWithShift());
|
|
}
|
|
|
|
auto it = _sessions.find(shiftedDcId);
|
|
if (it != _sessions.cend()) {
|
|
return it->second->transport();
|
|
}
|
|
|
|
return QString();
|
|
}
|
|
|
|
void Instance::Private::ping() {
|
|
if (auto session = getSession(0)) {
|
|
session->ping();
|
|
}
|
|
}
|
|
|
|
void Instance::Private::cancel(mtpRequestId requestId) {
|
|
if (!requestId) return;
|
|
|
|
mtpMsgId msgId = 0;
|
|
_requestsDelays.erase(requestId);
|
|
{
|
|
QWriteLocker locker(&_requestMapLock);
|
|
auto it = _requestMap.find(requestId);
|
|
if (it != _requestMap.end()) {
|
|
msgId = *(mtpMsgId*)(it->second->constData() + 4);
|
|
_requestMap.erase(it);
|
|
}
|
|
}
|
|
{
|
|
QMutexLocker locker(&_requestByDcLock);
|
|
auto it = _requestsByDc.find(requestId);
|
|
if (it != _requestsByDc.end()) {
|
|
if (auto session = getSession(qAbs(it->second))) {
|
|
session->cancel(requestId, msgId);
|
|
}
|
|
_requestsByDc.erase(it);
|
|
}
|
|
}
|
|
clearCallbacks(requestId);
|
|
}
|
|
|
|
int32 Instance::Private::state(mtpRequestId requestId) { // < 0 means waiting for such count of ms
|
|
if (requestId > 0) {
|
|
QMutexLocker locker(&_requestByDcLock);
|
|
auto i = _requestsByDc.find(requestId);
|
|
if (i != _requestsByDc.end()) {
|
|
if (auto session = getSession(qAbs(i->second))) {
|
|
return session->requestState(requestId);
|
|
}
|
|
return MTP::RequestConnecting;
|
|
}
|
|
return MTP::RequestSent;
|
|
}
|
|
if (auto session = getSession(-requestId)) {
|
|
return session->requestState(0);
|
|
}
|
|
return MTP::RequestConnecting;
|
|
}
|
|
|
|
void Instance::Private::killSession(ShiftedDcId shiftedDcId) {
|
|
auto checkIfMainAndKill = [this](ShiftedDcId shiftedDcId) {
|
|
auto it = _sessions.find(shiftedDcId);
|
|
if (it != _sessions.cend()) {
|
|
_killedSessions.push_back(std::move(it->second));
|
|
_sessions.erase(it);
|
|
_killedSessions.back()->kill();
|
|
return (_killedSessions.back().get() == _mainSession);
|
|
}
|
|
return false;
|
|
};
|
|
if (checkIfMainAndKill(shiftedDcId)) {
|
|
checkIfMainAndKill(_mainDcId);
|
|
|
|
t_assert(!MustNotCreateSessions);
|
|
auto main = std::make_unique<internal::Session>(_instance, _mainDcId);
|
|
_mainSession = main.get();
|
|
_sessions.emplace(_mainDcId, std::move(main));
|
|
_mainSession->start();
|
|
}
|
|
QMetaObject::invokeMethod(_instance, "onClearKilledSessions", Qt::QueuedConnection);
|
|
}
|
|
|
|
void Instance::Private::clearKilledSessions() {
|
|
_killedSessions.clear();
|
|
}
|
|
|
|
void Instance::Private::stopSession(ShiftedDcId shiftedDcId) {
|
|
auto it = _sessions.find(shiftedDcId);
|
|
if (it != _sessions.end()) {
|
|
if (it->second.get() != _mainSession) { // don't stop main session
|
|
it->second->stop();
|
|
}
|
|
}
|
|
}
|
|
|
|
void Instance::Private::logout(RPCDoneHandlerPtr onDone, RPCFailHandlerPtr onFail) {
|
|
_instance->send(MTPauth_LogOut(), onDone, onFail);
|
|
|
|
auto dcIds = std::vector<DcId>();
|
|
{
|
|
QReadLocker lock(&_keysForWriteLock);
|
|
dcIds.reserve(_keysForWrite.size());
|
|
for (auto &key : _keysForWrite) {
|
|
dcIds.push_back(key.first);
|
|
}
|
|
}
|
|
for (auto dcId : dcIds) {
|
|
if (dcId != mainDcId() && dcOptions()->dcType(dcId) != DcType::Cdn) {
|
|
auto shiftedDcId = MTP::logoutDcId(dcId);
|
|
auto requestId = _instance->send(MTPauth_LogOut(), rpcDone([this](mtpRequestId requestId) {
|
|
logoutGuestDone(requestId);
|
|
}), rpcFail([this](mtpRequestId requestId) {
|
|
return logoutGuestDone(requestId);
|
|
}), shiftedDcId);
|
|
_logoutGuestRequestIds.emplace(shiftedDcId, requestId);
|
|
}
|
|
}
|
|
}
|
|
|
|
bool Instance::Private::logoutGuestDone(mtpRequestId requestId) {
|
|
for (auto i = _logoutGuestRequestIds.begin(), e = _logoutGuestRequestIds.end(); i != e; ++i) {
|
|
if (i->second == requestId) {
|
|
killSession(i->first);
|
|
_logoutGuestRequestIds.erase(i);
|
|
return true;
|
|
}
|
|
}
|
|
return false;
|
|
}
|
|
|
|
internal::DcenterPtr Instance::Private::getDcById(ShiftedDcId shiftedDcId) {
|
|
auto it = _dcenters.find(shiftedDcId);
|
|
if (it == _dcenters.cend()) {
|
|
auto dcId = bareDcId(shiftedDcId);
|
|
it = _dcenters.find(dcId);
|
|
if (it == _dcenters.cend()) {
|
|
auto result = std::make_shared<internal::Dcenter>(_instance, dcId, AuthKeyPtr());
|
|
it = _dcenters.emplace(dcId, std::move(result)).first;
|
|
}
|
|
}
|
|
return it->second;
|
|
}
|
|
|
|
void Instance::Private::setKeyForWrite(DcId dcId, const AuthKeyPtr &key) {
|
|
QWriteLocker lock(&_keysForWriteLock);
|
|
if (key) {
|
|
_keysForWrite[dcId] = key;
|
|
} else {
|
|
_keysForWrite.erase(dcId);
|
|
}
|
|
}
|
|
|
|
AuthKeysList Instance::Private::getKeysForWrite() const {
|
|
auto result = AuthKeysList();
|
|
|
|
QReadLocker lock(&_keysForWriteLock);
|
|
result.reserve(_keysForWrite.size());
|
|
for (auto &key : _keysForWrite) {
|
|
result.push_back(key.second);
|
|
}
|
|
return result;
|
|
}
|
|
|
|
void Instance::Private::addKeysForDestroy(AuthKeysList &&keys) {
|
|
t_assert(isKeysDestroyer());
|
|
|
|
for (auto &key : keys) {
|
|
auto dcId = key->dcId();
|
|
auto shiftedDcId = MTP::destroyKeyNextDcId(dcId);
|
|
|
|
{
|
|
QWriteLocker lock(&_keysForWriteLock);
|
|
// There could be several keys for one dc if we're destroying them.
|
|
// Place them all in separate shiftedDcId so that they won't conflict.
|
|
while (_keysForWrite.find(shiftedDcId) != _keysForWrite.cend()) {
|
|
shiftedDcId = MTP::destroyKeyNextDcId(shiftedDcId);
|
|
}
|
|
_keysForWrite[shiftedDcId] = key;
|
|
}
|
|
|
|
auto dc = std::make_shared<internal::Dcenter>(_instance, dcId, std::move(key));
|
|
_dcenters.emplace(shiftedDcId, std::move(dc));
|
|
|
|
t_assert(!MustNotCreateSessions);
|
|
auto session = std::make_unique<internal::Session>(_instance, shiftedDcId);
|
|
auto it = _sessions.emplace(shiftedDcId, std::move(session)).first;
|
|
it->second->start();
|
|
}
|
|
}
|
|
|
|
DcOptions *Instance::Private::dcOptions() {
|
|
return _dcOptions;
|
|
}
|
|
|
|
void Instance::Private::unpaused() {
|
|
for (auto &session : _sessions) {
|
|
session.second->unpaused();
|
|
}
|
|
}
|
|
|
|
void Instance::Private::queueQuittingConnection(std::unique_ptr<internal::Connection> connection) {
|
|
_quittingConnections.insert(std::move(connection));
|
|
}
|
|
|
|
void Instance::Private::connectionFinished(internal::Connection *connection) {
|
|
auto it = _quittingConnections.find(connection);
|
|
if (it != _quittingConnections.end()) {
|
|
_quittingConnections.erase(it);
|
|
}
|
|
}
|
|
|
|
void Instance::Private::configLoadDone(const MTPConfig &result) {
|
|
_configLoader.reset();
|
|
|
|
if (result.type() != mtpc_config) {
|
|
LOG(("MTP Error: wrong config constructor: %1").arg(result.type()));
|
|
return;
|
|
}
|
|
auto &data = result.c_config();
|
|
|
|
DEBUG_LOG(("MTP Info: got config, chat_size_max: %1, date: %2, test_mode: %3, this_dc: %4, dc_options.length: %5").arg(data.vchat_size_max.v).arg(data.vdate.v).arg(mtpIsTrue(data.vtest_mode)).arg(data.vthis_dc.v).arg(data.vdc_options.v.size()));
|
|
|
|
if (data.vdc_options.v.empty()) {
|
|
LOG(("MTP Error: config with empty dc_options received!"));
|
|
} else {
|
|
_dcOptions->setFromList(data.vdc_options);
|
|
}
|
|
|
|
Global::SetChatSizeMax(data.vchat_size_max.v);
|
|
Global::SetMegagroupSizeMax(data.vmegagroup_size_max.v);
|
|
Global::SetForwardedCountMax(data.vforwarded_count_max.v);
|
|
Global::SetOnlineUpdatePeriod(data.vonline_update_period_ms.v);
|
|
Global::SetOfflineBlurTimeout(data.voffline_blur_timeout_ms.v);
|
|
Global::SetOfflineIdleTimeout(data.voffline_idle_timeout_ms.v);
|
|
Global::SetOnlineCloudTimeout(data.vonline_cloud_timeout_ms.v);
|
|
Global::SetNotifyCloudDelay(data.vnotify_cloud_delay_ms.v);
|
|
Global::SetNotifyDefaultDelay(data.vnotify_default_delay_ms.v);
|
|
Global::SetChatBigSize(data.vchat_big_size.v);
|
|
Global::SetPushChatPeriod(data.vpush_chat_period_ms.v);
|
|
Global::SetPushChatLimit(data.vpush_chat_limit.v);
|
|
Global::SetSavedGifsLimit(data.vsaved_gifs_limit.v);
|
|
Global::SetEditTimeLimit(data.vedit_time_limit.v);
|
|
Global::SetStickersRecentLimit(data.vstickers_recent_limit.v);
|
|
Global::SetPinnedDialogsCountMax(data.vpinned_dialogs_count_max.v);
|
|
Messenger::Instance().setInternalLinkDomain(qs(data.vme_url_prefix));
|
|
Global::SetCallReceiveTimeoutMs(data.vcall_receive_timeout_ms.v);
|
|
Global::SetCallRingTimeoutMs(data.vcall_ring_timeout_ms.v);
|
|
Global::SetCallConnectTimeoutMs(data.vcall_connect_timeout_ms.v);
|
|
Global::SetCallPacketTimeoutMs(data.vcall_packet_timeout_ms.v);
|
|
if (Global::PhoneCallsEnabled() != data.is_phonecalls_enabled()) {
|
|
Global::SetPhoneCallsEnabled(data.is_phonecalls_enabled());
|
|
Global::RefPhoneCallsEnabledChanged().notify();
|
|
}
|
|
|
|
Local::writeSettings();
|
|
|
|
emit _instance->configLoaded();
|
|
}
|
|
|
|
bool Instance::Private::configLoadFail(const RPCError &error) {
|
|
if (isDefaultHandledError(error)) return false;
|
|
|
|
// loadingConfig = false;
|
|
LOG(("MTP Error: failed to get config!"));
|
|
return false;
|
|
}
|
|
|
|
void Instance::Private::checkDelayedRequests() {
|
|
auto now = getms(true);
|
|
while (!_delayedRequests.empty() && now >= _delayedRequests.front().second) {
|
|
auto requestId = _delayedRequests.front().first;
|
|
_delayedRequests.pop_front();
|
|
|
|
auto dcWithShift = ShiftedDcId(0);
|
|
{
|
|
QMutexLocker locker(&_requestByDcLock);
|
|
auto it = _requestsByDc.find(requestId);
|
|
if (it != _requestsByDc.cend()) {
|
|
dcWithShift = it->second;
|
|
} else {
|
|
LOG(("MTP Error: could not find request dc for delayed resend, requestId %1").arg(requestId));
|
|
continue;
|
|
}
|
|
}
|
|
|
|
auto request = mtpRequest();
|
|
{
|
|
QReadLocker locker(&_requestMapLock);
|
|
auto it = _requestMap.find(requestId);
|
|
if (it == _requestMap.cend()) {
|
|
DEBUG_LOG(("MTP Error: could not find request %1").arg(requestId));
|
|
continue;
|
|
}
|
|
request = it->second;
|
|
}
|
|
if (auto session = getSession(qAbs(dcWithShift))) {
|
|
session->sendPrepared(request);
|
|
}
|
|
}
|
|
|
|
if (!_delayedRequests.empty()) {
|
|
_checkDelayedTimer.start(_delayedRequests.front().second - now);
|
|
}
|
|
}
|
|
|
|
void Instance::Private::registerRequest(mtpRequestId requestId, int32 dcWithShift) {
|
|
{
|
|
QMutexLocker locker(&_requestByDcLock);
|
|
_requestsByDc.emplace(requestId, dcWithShift);
|
|
}
|
|
performDelayedClear(); // need to do it somewhere...
|
|
}
|
|
|
|
void Instance::Private::unregisterRequest(mtpRequestId requestId) {
|
|
_requestsDelays.erase(requestId);
|
|
|
|
{
|
|
QWriteLocker locker(&_requestMapLock);
|
|
_requestMap.erase(requestId);
|
|
}
|
|
|
|
QMutexLocker locker(&_requestByDcLock);
|
|
_requestsByDc.erase(requestId);
|
|
}
|
|
|
|
mtpRequestId Instance::Private::storeRequest(mtpRequest &request, const RPCResponseHandler &parser) {
|
|
mtpRequestId res = reqid();
|
|
request->requestId = res;
|
|
if (parser.onDone || parser.onFail) {
|
|
QMutexLocker locker(&_parserMapLock);
|
|
_parserMap.emplace(res, parser);
|
|
}
|
|
{
|
|
QWriteLocker locker(&_requestMapLock);
|
|
_requestMap.emplace(res, request);
|
|
}
|
|
return res;
|
|
}
|
|
|
|
mtpRequest Instance::Private::getRequest(mtpRequestId requestId) {
|
|
auto result = mtpRequest();
|
|
{
|
|
QReadLocker locker(&_requestMapLock);
|
|
auto it = _requestMap.find(requestId);
|
|
if (it != _requestMap.cend()) {
|
|
result = it->second;
|
|
}
|
|
}
|
|
return result;
|
|
}
|
|
|
|
|
|
void Instance::Private::clearCallbacks(mtpRequestId requestId, int32 errorCode) {
|
|
RPCResponseHandler h;
|
|
bool found = false;
|
|
{
|
|
QMutexLocker locker(&_parserMapLock);
|
|
auto it = _parserMap.find(requestId);
|
|
if (it != _parserMap.end()) {
|
|
h = it->second;
|
|
found = true;
|
|
|
|
_parserMap.erase(it);
|
|
}
|
|
}
|
|
if (errorCode && found) {
|
|
rpcErrorOccured(requestId, h, internal::rpcClientError("CLEAR_CALLBACK", QString("did not handle request %1, error code %2").arg(requestId).arg(errorCode)));
|
|
}
|
|
}
|
|
|
|
void Instance::Private::clearCallbacksDelayed(const RPCCallbackClears &requestIds) {
|
|
uint32 idsCount = requestIds.size();
|
|
if (!idsCount) return;
|
|
|
|
if (cDebug()) {
|
|
QString idsStr = QString("%1").arg(requestIds[0].requestId);
|
|
for (uint32 i = 1; i < idsCount; ++i) {
|
|
idsStr += QString(", %1").arg(requestIds[i].requestId);
|
|
}
|
|
DEBUG_LOG(("RPC Info: clear callbacks delayed, msgIds: %1").arg(idsStr));
|
|
}
|
|
|
|
QMutexLocker lock(&_toClearLock);
|
|
uint32 toClearNow = _toClear.size();
|
|
if (toClearNow) {
|
|
_toClear.resize(toClearNow + idsCount);
|
|
memcpy(_toClear.data() + toClearNow, requestIds.constData(), idsCount * sizeof(RPCCallbackClear));
|
|
} else {
|
|
_toClear = requestIds;
|
|
}
|
|
}
|
|
|
|
void Instance::Private::performDelayedClear() {
|
|
QMutexLocker lock(&_toClearLock);
|
|
if (!_toClear.isEmpty()) {
|
|
for (auto &clearRequest : _toClear) {
|
|
if (cDebug()) {
|
|
QMutexLocker locker(&_parserMapLock);
|
|
if (_parserMap.find(clearRequest.requestId) != _parserMap.end()) {
|
|
DEBUG_LOG(("RPC Info: clearing delayed callback %1, error code %2").arg(clearRequest.requestId).arg(clearRequest.errorCode));
|
|
}
|
|
}
|
|
clearCallbacks(clearRequest.requestId, clearRequest.errorCode);
|
|
unregisterRequest(clearRequest.requestId);
|
|
}
|
|
_toClear.clear();
|
|
}
|
|
}
|
|
|
|
void Instance::Private::execCallback(mtpRequestId requestId, const mtpPrime *from, const mtpPrime *end) {
|
|
RPCResponseHandler h;
|
|
{
|
|
QMutexLocker locker(&_parserMapLock);
|
|
auto it = _parserMap.find(requestId);
|
|
if (it != _parserMap.cend()) {
|
|
h = it->second;
|
|
_parserMap.erase(it);
|
|
|
|
DEBUG_LOG(("RPC Info: found parser for request %1, trying to parse response...").arg(requestId));
|
|
}
|
|
}
|
|
if (h.onDone || h.onFail) {
|
|
try {
|
|
if (from >= end) throw mtpErrorInsufficient();
|
|
|
|
if (*from == mtpc_rpc_error) {
|
|
auto mtpError = MTPRpcError();
|
|
mtpError.read(from, end);
|
|
auto error = RPCError(mtpError);
|
|
DEBUG_LOG(("RPC Info: error received, code %1, type %2, description: %3").arg(error.code()).arg(error.type()).arg(error.description()));
|
|
if (!rpcErrorOccured(requestId, h, error)) {
|
|
QMutexLocker locker(&_parserMapLock);
|
|
_parserMap.emplace(requestId, h);
|
|
return;
|
|
}
|
|
} else {
|
|
if (h.onDone) {
|
|
(*h.onDone)(requestId, from, end);
|
|
}
|
|
}
|
|
} catch (Exception &e) {
|
|
if (!rpcErrorOccured(requestId, h, internal::rpcClientError("RESPONSE_PARSE_FAILED", QString("exception text: ") + e.what()))) {
|
|
QMutexLocker locker(&_parserMapLock);
|
|
_parserMap.emplace(requestId, h);
|
|
return;
|
|
}
|
|
}
|
|
} else {
|
|
DEBUG_LOG(("RPC Info: parser not found for %1").arg(requestId));
|
|
}
|
|
unregisterRequest(requestId);
|
|
}
|
|
|
|
bool Instance::Private::hasCallbacks(mtpRequestId requestId) {
|
|
QMutexLocker locker(&_parserMapLock);
|
|
auto it = _parserMap.find(requestId);
|
|
return (it != _parserMap.cend());
|
|
}
|
|
|
|
void Instance::Private::globalCallback(const mtpPrime *from, const mtpPrime *end) {
|
|
if (_globalHandler.onDone) {
|
|
(*_globalHandler.onDone)(0, from, end); // some updates were received
|
|
}
|
|
}
|
|
|
|
void Instance::Private::onStateChange(int32 dcWithShift, int32 state) {
|
|
if (_stateChangedHandler) {
|
|
_stateChangedHandler(dcWithShift, state);
|
|
}
|
|
}
|
|
|
|
void Instance::Private::onSessionReset(int32 dcWithShift) {
|
|
if (_sessionResetHandler) {
|
|
_sessionResetHandler(dcWithShift);
|
|
}
|
|
}
|
|
|
|
bool Instance::Private::rpcErrorOccured(mtpRequestId requestId, const RPCFailHandlerPtr &onFail, const RPCError &err) { // return true if need to clean request data
|
|
if (isDefaultHandledError(err)) {
|
|
if (onFail && (*onFail)(requestId, err)) return true;
|
|
}
|
|
|
|
if (onErrorDefault(requestId, err)) {
|
|
return false;
|
|
}
|
|
LOG(("RPC Error: request %1 got fail with code %2, error %3%4").arg(requestId).arg(err.code()).arg(err.type()).arg(err.description().isEmpty() ? QString() : QString(": %1").arg(err.description())));
|
|
onFail && (*onFail)(requestId, err);
|
|
return true;
|
|
}
|
|
|
|
bool Instance::Private::hasAuthorization() {
|
|
return AuthSession::Exists();
|
|
}
|
|
|
|
void Instance::Private::importDone(const MTPauth_Authorization &result, mtpRequestId requestId) {
|
|
QMutexLocker locker1(&_requestByDcLock);
|
|
|
|
auto it = _requestsByDc.find(requestId);
|
|
if (it == _requestsByDc.end()) {
|
|
LOG(("MTP Error: auth import request not found in requestsByDC, requestId: %1").arg(requestId));
|
|
RPCError error(internal::rpcClientError("AUTH_IMPORT_FAIL", QString("did not find import request in requestsByDC, request %1").arg(requestId)));
|
|
if (_globalHandler.onFail && hasAuthorization()) {
|
|
(*_globalHandler.onFail)(requestId, error); // auth failed in main dc
|
|
}
|
|
return;
|
|
}
|
|
auto newdc = bareDcId(it->second);
|
|
|
|
DEBUG_LOG(("MTP Info: auth import to dc %1 succeeded").arg(newdc));
|
|
|
|
auto &waiters = _authWaiters[newdc];
|
|
if (waiters.size()) {
|
|
QReadLocker locker(&_requestMapLock);
|
|
for (auto waitedRequestId : waiters) {
|
|
auto it = _requestMap.find(waitedRequestId);
|
|
if (it == _requestMap.cend()) {
|
|
LOG(("MTP Error: could not find request %1 for resending").arg(waitedRequestId));
|
|
continue;
|
|
}
|
|
auto dcWithShift = ShiftedDcId(newdc);
|
|
{
|
|
auto k = _requestsByDc.find(waitedRequestId);
|
|
if (k == _requestsByDc.cend()) {
|
|
LOG(("MTP Error: could not find request %1 by dc for resending").arg(waitedRequestId));
|
|
continue;
|
|
}
|
|
if (k->second < 0) {
|
|
_instance->setMainDcId(newdc);
|
|
k->second = -newdc;
|
|
} else {
|
|
dcWithShift = shiftDcId(newdc, getDcIdShift(k->second));
|
|
k->second = dcWithShift;
|
|
}
|
|
DEBUG_LOG(("MTP Info: resending request %1 to dc %2 after import auth").arg(waitedRequestId).arg(k->second));
|
|
}
|
|
if (auto session = getSession(dcWithShift)) {
|
|
session->sendPrepared(it->second);
|
|
}
|
|
}
|
|
waiters.clear();
|
|
}
|
|
}
|
|
|
|
bool Instance::Private::importFail(const RPCError &error, mtpRequestId requestId) {
|
|
if (isDefaultHandledError(error)) return false;
|
|
|
|
if (_globalHandler.onFail && hasAuthorization()) {
|
|
(*_globalHandler.onFail)(requestId, error); // auth import failed
|
|
}
|
|
return true;
|
|
}
|
|
|
|
void Instance::Private::exportDone(const MTPauth_ExportedAuthorization &result, mtpRequestId requestId) {
|
|
auto it = _authExportRequests.find(requestId);
|
|
if (it == _authExportRequests.cend()) {
|
|
LOG(("MTP Error: auth export request target dcWithShift not found, requestId: %1").arg(requestId));
|
|
RPCError error(internal::rpcClientError("AUTH_IMPORT_FAIL", QString("did not find target dcWithShift, request %1").arg(requestId)));
|
|
if (_globalHandler.onFail && hasAuthorization()) {
|
|
(*_globalHandler.onFail)(requestId, error); // auth failed in main dc
|
|
}
|
|
return;
|
|
}
|
|
|
|
auto &data = result.c_auth_exportedAuthorization();
|
|
_instance->send(MTPauth_ImportAuthorization(data.vid, data.vbytes), rpcDone([this](const MTPauth_Authorization &result, mtpRequestId requestId) {
|
|
importDone(result, requestId);
|
|
}), rpcFail([this](const RPCError &error, mtpRequestId requestId) {
|
|
return importFail(error, requestId);
|
|
}), it->second);
|
|
_authExportRequests.erase(requestId);
|
|
}
|
|
|
|
bool Instance::Private::exportFail(const RPCError &error, mtpRequestId requestId) {
|
|
if (isDefaultHandledError(error)) return false;
|
|
|
|
auto it = _authExportRequests.find(requestId);
|
|
if (it != _authExportRequests.cend()) {
|
|
_authWaiters[bareDcId(it->second)].clear();
|
|
}
|
|
if (_globalHandler.onFail && hasAuthorization()) {
|
|
(*_globalHandler.onFail)(requestId, error); // auth failed in main dc
|
|
}
|
|
return true;
|
|
}
|
|
|
|
bool Instance::Private::onErrorDefault(mtpRequestId requestId, const RPCError &error) {
|
|
auto &err(error.type());
|
|
auto code = error.code();
|
|
if (!isFloodError(error) && err != qstr("AUTH_KEY_UNREGISTERED")) {
|
|
int breakpoint = 0;
|
|
}
|
|
auto badGuestDc = (code == 400) && (err == qsl("FILE_ID_INVALID"));
|
|
QRegularExpressionMatch m;
|
|
if ((m = QRegularExpression("^(FILE|PHONE|NETWORK|USER)_MIGRATE_(\\d+)$").match(err)).hasMatch()) {
|
|
if (!requestId) return false;
|
|
|
|
ShiftedDcId dcWithShift = 0, newdcWithShift = m.captured(2).toInt();
|
|
{
|
|
QMutexLocker locker(&_requestByDcLock);
|
|
auto it = _requestsByDc.find(requestId);
|
|
if (it == _requestsByDc.end()) {
|
|
LOG(("MTP Error: could not find request %1 for migrating to %2").arg(requestId).arg(newdcWithShift));
|
|
} else {
|
|
dcWithShift = it->second;
|
|
}
|
|
}
|
|
if (!dcWithShift || !newdcWithShift) return false;
|
|
|
|
DEBUG_LOG(("MTP Info: changing request %1 from dcWithShift%2 to dc%3").arg(requestId).arg(dcWithShift).arg(newdcWithShift));
|
|
if (dcWithShift < 0) { // newdc shift = 0
|
|
if (false && hasAuthorization() && _authExportRequests.find(requestId) == _authExportRequests.cend()) {
|
|
//
|
|
// migrate not supported at this moment
|
|
// this was not tested even once
|
|
//
|
|
//DEBUG_LOG(("MTP Info: importing auth to dc %1").arg(newdcWithShift));
|
|
//auto &waiters(_authWaiters[newdcWithShift]);
|
|
//if (waiters.empty()) {
|
|
// auto exportRequestId = _instance->send(MTPauth_ExportAuthorization(MTP_int(newdcWithShift)), rpcDone([this](const MTPauth_ExportedAuthorization &result, mtpRequestId requestId) {
|
|
// exportDone(result, requestId);
|
|
// }), rpcFail([this](const RPCError &error, mtpRequestId requestId) {
|
|
// return exportFail(error, requestId);
|
|
// }));
|
|
// _authExportRequests.emplace(exportRequestId, newdcWithShift);
|
|
//}
|
|
//waiters.push_back(requestId);
|
|
//return true;
|
|
} else {
|
|
_instance->setMainDcId(newdcWithShift);
|
|
}
|
|
} else {
|
|
newdcWithShift = shiftDcId(newdcWithShift, getDcIdShift(dcWithShift));
|
|
}
|
|
|
|
auto request = mtpRequest();
|
|
{
|
|
QReadLocker locker(&_requestMapLock);
|
|
auto it = _requestMap.find(requestId);
|
|
if (it == _requestMap.cend()) {
|
|
LOG(("MTP Error: could not find request %1").arg(requestId));
|
|
return false;
|
|
}
|
|
request = it->second;
|
|
}
|
|
if (auto session = getSession(newdcWithShift)) {
|
|
registerRequest(requestId, (dcWithShift < 0) ? -newdcWithShift : newdcWithShift);
|
|
session->sendPrepared(request);
|
|
}
|
|
return true;
|
|
} else if (code < 0 || code >= 500 || (m = QRegularExpression("^FLOOD_WAIT_(\\d+)$").match(err)).hasMatch()) {
|
|
if (!requestId) return false;
|
|
|
|
int32 secs = 1;
|
|
if (code < 0 || code >= 500) {
|
|
auto it = _requestsDelays.find(requestId);
|
|
if (it != _requestsDelays.cend()) {
|
|
secs = (it->second > 60) ? it->second : (it->second *= 2);
|
|
} else {
|
|
_requestsDelays.emplace(requestId, secs);
|
|
}
|
|
} else {
|
|
secs = m.captured(1).toInt();
|
|
// if (secs >= 60) return false;
|
|
}
|
|
auto sendAt = getms(true) + secs * 1000 + 10;
|
|
auto it = _delayedRequests.begin(), e = _delayedRequests.end();
|
|
for (; it != e; ++it) {
|
|
if (it->first == requestId) return true;
|
|
if (it->second > sendAt) break;
|
|
}
|
|
_delayedRequests.insert(it, std::make_pair(requestId, sendAt));
|
|
|
|
checkDelayedRequests();
|
|
|
|
return true;
|
|
} else if (code == 401 || (badGuestDc && _badGuestDcRequests.find(requestId) == _badGuestDcRequests.cend())) {
|
|
auto dcWithShift = ShiftedDcId(0);
|
|
{
|
|
QMutexLocker locker(&_requestByDcLock);
|
|
auto it = _requestsByDc.find(requestId);
|
|
if (it != _requestsByDc.end()) {
|
|
dcWithShift = it->second;
|
|
} else {
|
|
LOG(("MTP Error: unauthorized request without dc info, requestId %1").arg(requestId));
|
|
}
|
|
}
|
|
auto newdc = bareDcId(qAbs(dcWithShift));
|
|
if (!newdc || newdc == mainDcId() || !hasAuthorization()) {
|
|
if (!badGuestDc && _globalHandler.onFail) {
|
|
(*_globalHandler.onFail)(requestId, error); // auth failed in main dc
|
|
}
|
|
return false;
|
|
}
|
|
|
|
DEBUG_LOG(("MTP Info: importing auth to dcWithShift %1").arg(dcWithShift));
|
|
auto &waiters(_authWaiters[newdc]);
|
|
if (!waiters.size()) {
|
|
auto exportRequestId = _instance->send(MTPauth_ExportAuthorization(MTP_int(newdc)), rpcDone([this](const MTPauth_ExportedAuthorization &result, mtpRequestId requestId) {
|
|
exportDone(result, requestId);
|
|
}), rpcFail([this](const RPCError &error, mtpRequestId requestId) {
|
|
return exportFail(error, requestId);
|
|
}));
|
|
_authExportRequests.emplace(exportRequestId, abs(dcWithShift));
|
|
}
|
|
waiters.push_back(requestId);
|
|
if (badGuestDc) _badGuestDcRequests.insert(requestId);
|
|
return true;
|
|
} else if (err == qstr("CONNECTION_NOT_INITED") || err == qstr("CONNECTION_LAYER_INVALID")) {
|
|
mtpRequest request;
|
|
{
|
|
QReadLocker locker(&_requestMapLock);
|
|
auto it = _requestMap.find(requestId);
|
|
if (it == _requestMap.cend()) {
|
|
LOG(("MTP Error: could not find request %1").arg(requestId));
|
|
return false;
|
|
}
|
|
request = it->second;
|
|
}
|
|
auto dcWithShift = ShiftedDcId(0);
|
|
{
|
|
QMutexLocker locker(&_requestByDcLock);
|
|
auto it = _requestsByDc.find(requestId);
|
|
if (it == _requestsByDc.end()) {
|
|
LOG(("MTP Error: could not find request %1 for resending with init connection").arg(requestId));
|
|
} else {
|
|
dcWithShift = it->second;
|
|
}
|
|
}
|
|
if (!dcWithShift) return false;
|
|
|
|
if (auto session = getSession(qAbs(dcWithShift))) {
|
|
request->needsLayer = true;
|
|
session->sendPrepared(request);
|
|
}
|
|
return true;
|
|
} else if (err == qstr("MSG_WAIT_FAILED")) {
|
|
mtpRequest request;
|
|
{
|
|
QReadLocker locker(&_requestMapLock);
|
|
auto it = _requestMap.find(requestId);
|
|
if (it == _requestMap.cend()) {
|
|
LOG(("MTP Error: could not find request %1").arg(requestId));
|
|
return false;
|
|
}
|
|
request = it->second;
|
|
}
|
|
if (!request->after) {
|
|
LOG(("MTP Error: wait failed for not dependent request %1").arg(requestId));
|
|
return false;
|
|
}
|
|
auto dcWithShift = ShiftedDcId(0);
|
|
{
|
|
QMutexLocker locker(&_requestByDcLock);
|
|
auto it = _requestsByDc.find(requestId);
|
|
auto afterIt = _requestsByDc.find(request->after->requestId);
|
|
if (it == _requestsByDc.end()) {
|
|
LOG(("MTP Error: could not find request %1 by dc").arg(requestId));
|
|
} else if (afterIt == _requestsByDc.end()) {
|
|
LOG(("MTP Error: could not find dependent request %1 by dc").arg(request->after->requestId));
|
|
} else {
|
|
dcWithShift = it->second;
|
|
if (it->second != afterIt->second) {
|
|
request->after = mtpRequest();
|
|
}
|
|
}
|
|
}
|
|
if (!dcWithShift) return false;
|
|
|
|
if (!request->after) {
|
|
if (auto session = getSession(qAbs(dcWithShift))) {
|
|
request->needsLayer = true;
|
|
session->sendPrepared(request);
|
|
}
|
|
} else {
|
|
auto newdc = bareDcId(qAbs(dcWithShift));
|
|
auto &waiters(_authWaiters[newdc]);
|
|
if (base::contains(waiters, request->after->requestId)) {
|
|
if (!base::contains(waiters, requestId)) {
|
|
waiters.push_back(requestId);
|
|
}
|
|
if (_badGuestDcRequests.find(request->after->requestId) != _badGuestDcRequests.cend()) {
|
|
if (_badGuestDcRequests.find(requestId) == _badGuestDcRequests.cend()) {
|
|
_badGuestDcRequests.insert(requestId);
|
|
}
|
|
}
|
|
} else {
|
|
auto i = _delayedRequests.begin(), e = _delayedRequests.end();
|
|
for (; i != e; ++i) {
|
|
if (i->first == requestId) return true;
|
|
if (i->first == request->after->requestId) break;
|
|
}
|
|
if (i != e) {
|
|
_delayedRequests.insert(i, std::make_pair(requestId, i->second));
|
|
}
|
|
|
|
checkDelayedRequests();
|
|
}
|
|
}
|
|
return true;
|
|
}
|
|
if (badGuestDc) _badGuestDcRequests.erase(requestId);
|
|
return false;
|
|
}
|
|
|
|
internal::Session *Instance::Private::getSession(ShiftedDcId shiftedDcId) {
|
|
if (!shiftedDcId) {
|
|
t_assert(_mainSession != nullptr);
|
|
return _mainSession;
|
|
}
|
|
if (!bareDcId(shiftedDcId)) {
|
|
t_assert(_mainSession != nullptr);
|
|
shiftedDcId += bareDcId(_mainSession->getDcWithShift());
|
|
}
|
|
|
|
auto it = _sessions.find(shiftedDcId);
|
|
if (it == _sessions.cend()) {
|
|
t_assert(!MustNotCreateSessions);
|
|
it = _sessions.emplace(shiftedDcId, std::make_unique<internal::Session>(_instance, shiftedDcId)).first;
|
|
it->second->start();
|
|
}
|
|
return it->second.get();
|
|
}
|
|
|
|
void Instance::Private::scheduleKeyDestroy(ShiftedDcId shiftedDcId) {
|
|
t_assert(isKeysDestroyer());
|
|
|
|
_instance->send(MTPauth_LogOut(), rpcDone([this, shiftedDcId](const MTPBool &result) {
|
|
performKeyDestroy(shiftedDcId);
|
|
}), rpcFail([this, shiftedDcId](const RPCError &error) {
|
|
if (isDefaultHandledError(error)) return false;
|
|
performKeyDestroy(shiftedDcId);
|
|
return true;
|
|
}), shiftedDcId);
|
|
}
|
|
|
|
void Instance::Private::performKeyDestroy(ShiftedDcId shiftedDcId) {
|
|
t_assert(isKeysDestroyer());
|
|
|
|
_instance->send(MTPDestroy_auth_key(), rpcDone([this, shiftedDcId](const MTPDestroyAuthKeyRes &result) {
|
|
switch (result.type()) {
|
|
case mtpc_destroy_auth_key_ok: LOG(("MTP Info: key %1 destroyed.").arg(shiftedDcId)); break;
|
|
case mtpc_destroy_auth_key_fail: {
|
|
LOG(("MTP Error: key %1 destruction fail, leave it for now.").arg(shiftedDcId));
|
|
killSession(shiftedDcId);
|
|
} break;
|
|
case mtpc_destroy_auth_key_none: LOG(("MTP Info: key %1 already destroyed.").arg(shiftedDcId)); break;
|
|
}
|
|
emit _instance->keyDestroyed(shiftedDcId);
|
|
}), rpcFail([this, shiftedDcId](const RPCError &error) {
|
|
LOG(("MTP Error: key %1 destruction resulted in error: %2").arg(shiftedDcId).arg(error.type()));
|
|
emit _instance->keyDestroyed(shiftedDcId);
|
|
return true;
|
|
}), shiftedDcId);
|
|
}
|
|
|
|
void Instance::Private::completedKeyDestroy(ShiftedDcId shiftedDcId) {
|
|
t_assert(isKeysDestroyer());
|
|
|
|
_dcenters.erase(shiftedDcId);
|
|
{
|
|
QWriteLocker lock(&_keysForWriteLock);
|
|
_keysForWrite.erase(shiftedDcId);
|
|
}
|
|
killSession(shiftedDcId);
|
|
if (_dcenters.empty()) {
|
|
emit _instance->allKeysDestroyed();
|
|
}
|
|
}
|
|
|
|
void Instance::Private::setUpdatesHandler(RPCDoneHandlerPtr onDone) {
|
|
_globalHandler.onDone = onDone;
|
|
}
|
|
|
|
void Instance::Private::setGlobalFailHandler(RPCFailHandlerPtr onFail) {
|
|
_globalHandler.onFail = onFail;
|
|
}
|
|
|
|
void Instance::Private::setStateChangedHandler(base::lambda<void(ShiftedDcId shiftedDcId, int32 state)> handler) {
|
|
_stateChangedHandler = std::move(handler);
|
|
}
|
|
|
|
void Instance::Private::setSessionResetHandler(base::lambda<void(ShiftedDcId shiftedDcId)> handler) {
|
|
_sessionResetHandler = std::move(handler);
|
|
}
|
|
|
|
void Instance::Private::clearGlobalHandlers() {
|
|
setUpdatesHandler(RPCDoneHandlerPtr());
|
|
setGlobalFailHandler(RPCFailHandlerPtr());
|
|
setStateChangedHandler(base::lambda<void(ShiftedDcId,int32)>());
|
|
setSessionResetHandler(base::lambda<void(ShiftedDcId)>());
|
|
}
|
|
|
|
void Instance::Private::prepareToDestroy() {
|
|
// It accesses Instance in destructor, so it should be destroyed first.
|
|
_configLoader.reset();
|
|
|
|
requestCancellingDiscard();
|
|
|
|
for (auto &session : base::take(_sessions)) {
|
|
session.second->kill();
|
|
}
|
|
_mainSession = nullptr;
|
|
|
|
MustNotCreateSessions = true;
|
|
}
|
|
|
|
Instance::Instance(DcOptions *options, Mode mode, Config &&config) : QObject()
|
|
, _private(std::make_unique<Private>(this, options, mode)) {
|
|
_private->start(std::move(config));
|
|
}
|
|
|
|
void Instance::suggestMainDcId(DcId mainDcId) {
|
|
_private->suggestMainDcId(mainDcId);
|
|
}
|
|
|
|
void Instance::setMainDcId(DcId mainDcId) {
|
|
_private->setMainDcId(mainDcId);
|
|
}
|
|
|
|
DcId Instance::mainDcId() const {
|
|
return _private->mainDcId();
|
|
}
|
|
|
|
void Instance::configLoadRequest() {
|
|
_private->configLoadRequest();
|
|
}
|
|
|
|
void Instance::cdnConfigLoadRequest() {
|
|
_private->cdnConfigLoadRequest();
|
|
}
|
|
|
|
void Instance::connectionFinished(internal::Connection *connection) {
|
|
_private->connectionFinished(connection);
|
|
}
|
|
|
|
void Instance::restart() {
|
|
_private->restart();
|
|
}
|
|
|
|
void Instance::restart(ShiftedDcId shiftedDcId) {
|
|
_private->restart(shiftedDcId);
|
|
}
|
|
|
|
int32 Instance::dcstate(ShiftedDcId shiftedDcId) {
|
|
return _private->dcstate(shiftedDcId);
|
|
}
|
|
|
|
QString Instance::dctransport(ShiftedDcId shiftedDcId) {
|
|
return _private->dctransport(shiftedDcId);
|
|
}
|
|
|
|
void Instance::ping() {
|
|
_private->ping();
|
|
}
|
|
|
|
void Instance::cancel(mtpRequestId requestId) {
|
|
_private->cancel(requestId);
|
|
}
|
|
|
|
int32 Instance::state(mtpRequestId requestId) { // < 0 means waiting for such count of ms
|
|
return _private->state(requestId);
|
|
}
|
|
|
|
void Instance::killSession(ShiftedDcId shiftedDcId) {
|
|
_private->killSession(shiftedDcId);
|
|
}
|
|
|
|
void Instance::stopSession(ShiftedDcId shiftedDcId) {
|
|
_private->stopSession(shiftedDcId);
|
|
}
|
|
|
|
void Instance::logout(RPCDoneHandlerPtr onDone, RPCFailHandlerPtr onFail) {
|
|
_private->logout(onDone, onFail);
|
|
}
|
|
|
|
internal::DcenterPtr Instance::getDcById(ShiftedDcId shiftedDcId) {
|
|
return _private->getDcById(shiftedDcId);
|
|
}
|
|
|
|
void Instance::setKeyForWrite(DcId dcId, const AuthKeyPtr &key) {
|
|
_private->setKeyForWrite(dcId, key);
|
|
}
|
|
|
|
AuthKeysList Instance::getKeysForWrite() const {
|
|
return _private->getKeysForWrite();
|
|
}
|
|
|
|
void Instance::addKeysForDestroy(AuthKeysList &&keys) {
|
|
_private->addKeysForDestroy(std::move(keys));
|
|
}
|
|
|
|
DcOptions *Instance::dcOptions() {
|
|
return _private->dcOptions();
|
|
}
|
|
|
|
void Instance::unpaused() {
|
|
_private->unpaused();
|
|
}
|
|
|
|
void Instance::queueQuittingConnection(std::unique_ptr<internal::Connection> connection) {
|
|
_private->queueQuittingConnection(std::move(connection));
|
|
}
|
|
|
|
void Instance::setUpdatesHandler(RPCDoneHandlerPtr onDone) {
|
|
_private->setUpdatesHandler(onDone);
|
|
}
|
|
|
|
void Instance::setGlobalFailHandler(RPCFailHandlerPtr onFail) {
|
|
_private->setGlobalFailHandler(onFail);
|
|
}
|
|
|
|
void Instance::setStateChangedHandler(base::lambda<void(ShiftedDcId shiftedDcId, int32 state)> handler) {
|
|
_private->setStateChangedHandler(std::move(handler));
|
|
}
|
|
|
|
void Instance::setSessionResetHandler(base::lambda<void(ShiftedDcId shiftedDcId)> handler) {
|
|
_private->setSessionResetHandler(std::move(handler));
|
|
}
|
|
|
|
void Instance::clearGlobalHandlers() {
|
|
_private->clearGlobalHandlers();
|
|
}
|
|
|
|
void Instance::onStateChange(ShiftedDcId dcWithShift, int32 state) {
|
|
_private->onStateChange(dcWithShift, state);
|
|
}
|
|
|
|
void Instance::onSessionReset(ShiftedDcId dcWithShift) {
|
|
_private->onSessionReset(dcWithShift);
|
|
}
|
|
|
|
void Instance::registerRequest(mtpRequestId requestId, ShiftedDcId dcWithShift) {
|
|
_private->registerRequest(requestId, dcWithShift);
|
|
}
|
|
|
|
mtpRequestId Instance::storeRequest(mtpRequest &request, const RPCResponseHandler &parser) {
|
|
return _private->storeRequest(request, parser);
|
|
}
|
|
|
|
mtpRequest Instance::getRequest(mtpRequestId requestId) {
|
|
return _private->getRequest(requestId);
|
|
}
|
|
|
|
void Instance::clearCallbacksDelayed(const RPCCallbackClears &requestIds) {
|
|
_private->clearCallbacksDelayed(requestIds);
|
|
}
|
|
|
|
void Instance::execCallback(mtpRequestId requestId, const mtpPrime *from, const mtpPrime *end) {
|
|
_private->execCallback(requestId, from, end);
|
|
}
|
|
|
|
bool Instance::hasCallbacks(mtpRequestId requestId) {
|
|
return _private->hasCallbacks(requestId);
|
|
}
|
|
|
|
void Instance::globalCallback(const mtpPrime *from, const mtpPrime *end) {
|
|
_private->globalCallback(from, end);
|
|
}
|
|
|
|
bool Instance::rpcErrorOccured(mtpRequestId requestId, const RPCFailHandlerPtr &onFail, const RPCError &err) {
|
|
return _private->rpcErrorOccured(requestId, onFail, err);
|
|
}
|
|
|
|
internal::Session *Instance::getSession(ShiftedDcId shiftedDcId) {
|
|
return _private->getSession(shiftedDcId);
|
|
}
|
|
|
|
bool Instance::isKeysDestroyer() const {
|
|
return _private->isKeysDestroyer();
|
|
}
|
|
|
|
void Instance::scheduleKeyDestroy(ShiftedDcId shiftedDcId) {
|
|
_private->scheduleKeyDestroy(shiftedDcId);
|
|
}
|
|
|
|
void Instance::onKeyDestroyed(qint32 shiftedDcId) {
|
|
_private->completedKeyDestroy(shiftedDcId);
|
|
}
|
|
|
|
void Instance::onClearKilledSessions() {
|
|
_private->clearKilledSessions();
|
|
}
|
|
|
|
Instance::~Instance() {
|
|
_private->prepareToDestroy();
|
|
}
|
|
|
|
} // namespace MTP
|