refactor: (initial) extracted connection management to NetworkManager

This commit is contained in:
teidesu 2022-11-05 03:03:21 +03:00 committed by Alina Sireneva
parent 76639d2993
commit 4f834afc6a
Signed by: teidesu
SSH key fingerprint: SHA256:uNeCpw6aTSU4aIObXLvHfLkDa82HWH9EiOj9AXOIRpI
9 changed files with 860 additions and 472 deletions

View file

@ -78,8 +78,7 @@ export async function startTest(
if (!availableDcs.find((dc) => dc.id === id)) { throw new MtArgumentError(`${phone} has invalid DC ID (${id})`) }
} else {
let dcId = this._primaryDc.id
let dcId = this._defaultDc.id
if (params.dcId) {
if (!availableDcs.find((dc) => dc.id === params!.dcId)) { throw new MtArgumentError(`DC ID is invalid (${dcId})`) }
dcId = params.dcId

View file

@ -76,7 +76,7 @@ export async function* downloadAsIterable(
const isWeb = tl.isAnyInputWebFileLocation(location)
// we will receive a FileMigrateError in case this is invalid
if (!dcId) dcId = this._primaryDc.id
if (!dcId) dcId = this._defaultDc.id
const chunkSize = partSizeKb * 1024

View file

@ -7,6 +7,9 @@ import defaultReaderMap from '@mtcute/tl/binary/reader'
import defaultWriterMap from '@mtcute/tl/binary/writer'
import { TlReaderMap, TlWriterMap } from '@mtcute/tl-runtime'
import defaultReaderMap from '@mtcute/tl/binary/reader'
import defaultWriterMap from '@mtcute/tl/binary/writer'
import {
defaultReconnectionStrategy,
defaultTransportFactory,
@ -22,6 +25,10 @@ import {
createControllablePromise,
CryptoProviderFactory,
defaultCryptoProviderFactory,
sleep,
getAllPeersFrom,
LogManager,
toggleChannelIdMark,
defaultProductionDc,
defaultProductionIpv6Dc,
defaultTestDc,
@ -31,11 +38,26 @@ import {
LogManager,
sleep,
toggleChannelIdMark,
ControllablePromise,
createControllablePromise,
readStringSession,
writeStringSession
} from './utils'
import { addPublicKey } from './utils/crypto/keys'
import { readStringSession, writeStringSession } from './utils/string-session'
import {
TransportFactory,
defaultReconnectionStrategy,
ReconnectionStrategy,
defaultTransportFactory,
SessionConnection,
} from './network'
import { PersistentConnectionParams } from './network/persistent-connection'
import { ITelegramStorage, MemoryStorage } from './storage'
import { ConfigManager } from './network/config-manager'
import { NetworkManager } from "./network/network-manager";
export interface BaseTelegramClientOptions {
/**
@ -66,27 +88,27 @@ export interface BaseTelegramClientOptions {
*/
useIpv6?: boolean
/**
* Primary DC to use for initial connection.
* This does not mean this will be the only DC used,
* nor that this DC will actually be primary, this only
* determines the first DC the library will try to connect to.
* Can be used to connect to other networks (like test DCs).
*
* When session already contains primary DC, this parameter is ignored.
* Defaults to Production DC 2.
*/
primaryDc?: tl.RawDcOption
/**
* Primary DC to use for initial connection.
* This does not mean this will be the only DC used,
* nor that this DC will actually be primary, this only
* determines the first DC the library will try to connect to.
* Can be used to connect to other networks (like test DCs).
*
* When session already contains primary DC, this parameter is ignored.
* Defaults to Production DC 2.
*/
defaultDc?: tl.RawDcOption
/**
* Whether to connect to test servers.
*
* If passed, {@link primaryDc} defaults to Test DC 2.
*
* **Must** be passed if using test servers, even if
* you passed custom {@link primaryDc}
*/
testMode?: boolean
/**
* Whether to connect to test servers.
*
* If passed, {@link defaultDc} defaults to Test DC 2.
*
* **Must** be passed if using test servers, even if
* you passed custom {@link defaultDc}
*/
testMode?: boolean
/**
* Additional options for initConnection call.
@ -179,21 +201,11 @@ export interface BaseTelegramClientOptions {
}
export class BaseTelegramClient extends EventEmitter {
/**
* `initConnection` params taken from {@link BaseTelegramClient.Options.initConnectionOptions}.
*/
protected readonly _initConnectionParams: tl.RawInitConnectionRequest
/**
* Crypto provider taken from {@link BaseTelegramClient.Options.crypto}
*/
protected readonly _crypto: ICryptoProvider
/**
* Transport factory taken from {@link BaseTelegramClient.Options.transport}
*/
protected readonly _transportFactory: TransportFactory
/**
* Telegram storage taken from {@link BaseTelegramClient.Options.storage}
*/
@ -214,11 +226,6 @@ export class BaseTelegramClient extends EventEmitter {
*/
protected readonly _testMode: boolean
/**
* Reconnection strategy taken from {@link BaseTelegramClient.Options.reconnectionStrategy}
*/
protected readonly _reconnectionStrategy: ReconnectionStrategy<PersistentConnectionParams>
/**
* Flood sleep threshold taken from {@link BaseTelegramClient.Options.floodSleepThreshold}
*/
@ -230,22 +237,16 @@ export class BaseTelegramClient extends EventEmitter {
protected readonly _rpcRetryCount: number
/**
* "Disable updates" taken from {@link BaseTelegramClient.Options.disableUpdates}
*/
protected readonly _disableUpdates: boolean
/**
* Primary DC taken from {@link BaseTelegramClient.Options.primaryDc},
* Primary DC taken from {@link BaseTelegramClient.Options.defaultDc},
* loaded from session or changed by other means (like redirecting).
*/
protected _primaryDc: tl.RawDcOption
protected _defaultDc: tl.RawDcOption
private _niceStacks: boolean
readonly _layer: number
readonly _readerMap: TlReaderMap
readonly _writerMap: TlWriterMap
private _keepAliveInterval?: NodeJS.Timeout
protected _lastUpdateTime = 0
private _floodWaitedRequests: Record<string, number> = {}
@ -260,14 +261,6 @@ export class BaseTelegramClient extends EventEmitter {
private _onError?: (err: unknown, connection?: SessionConnection) => void
/**
* The primary {@link SessionConnection} that is used for
* most of the communication with Telegram.
*
* Methods for downloading/uploading files may create additional connections as needed.
*/
primaryConnection!: SessionConnection
private _importFrom?: string
private _importForce?: boolean
@ -282,6 +275,7 @@ export class BaseTelegramClient extends EventEmitter {
protected _handleUpdate(update: tl.TypeUpdates): void {}
readonly log = new LogManager()
readonly network: NetworkManager
constructor(opts: BaseTelegramClientOptions) {
super()
@ -293,14 +287,13 @@ export class BaseTelegramClient extends EventEmitter {
throw new Error('apiId must be a number or a numeric string!')
}
this._transportFactory = opts.transport ?? defaultTransportFactory
this._crypto = (opts.crypto ?? defaultCryptoProviderFactory)()
this.storage = opts.storage ?? new MemoryStorage()
this._apiHash = opts.apiHash
this._useIpv6 = Boolean(opts.useIpv6)
this._testMode = Boolean(opts.testMode)
let dc = opts.primaryDc
let dc = opts.defaultDc
if (!dc) {
if (this._testMode) {
@ -312,42 +305,33 @@ export class BaseTelegramClient extends EventEmitter {
}
}
this._primaryDc = dc
this._defaultDc = dc
this._reconnectionStrategy =
opts.reconnectionStrategy ?? defaultReconnectionStrategy
this._floodSleepThreshold = opts.floodSleepThreshold ?? 10000
this._rpcRetryCount = opts.rpcRetryCount ?? 5
this._disableUpdates = opts.disableUpdates ?? false
this._niceStacks = opts.niceStacks ?? true
this._layer = opts.overrideLayer ?? tl.LAYER
this._readerMap = opts.readerMap ?? defaultReaderMap
this._writerMap = opts.writerMap ?? defaultWriterMap
this.storage.setup?.(this.log, this._readerMap, this._writerMap)
let deviceModel = 'mtcute on '
if (typeof process !== 'undefined' && typeof require !== 'undefined') {
// eslint-disable-next-line @typescript-eslint/no-var-requires
const os = require('os')
deviceModel += `${os.type()} ${os.arch()} ${os.release()}`
} else if (typeof navigator !== 'undefined') {
deviceModel += navigator.userAgent
} else deviceModel += 'unknown'
this._initConnectionParams = {
_: 'initConnection',
deviceModel,
systemVersion: '1.0',
appVersion: '1.0.0',
systemLangCode: 'en',
langPack: '', // "langPacks are for official apps only"
langCode: 'en',
...(opts.initConnectionOptions ?? {}),
this.network = new NetworkManager({
apiId,
crypto: this._crypto,
disableUpdates: opts.disableUpdates ?? false,
initConnectionOptions: opts.initConnectionOptions,
layer: this._layer,
log: this.log,
readerMap: this._readerMap,
writerMap: this._writerMap,
reconnectionStrategy: opts.reconnectionStrategy,
storage: this.storage,
testMode: this._testMode,
transport: opts.transport,
}, this._config)
query: null as any,
}
this.storage.setup?.(this.log, this._readerMap, this._writerMap)
}
protected async _loadStorage(): Promise<void> {
@ -433,6 +417,7 @@ export class BaseTelegramClient extends EventEmitter {
*/
async connect(): Promise<void> {
if (this._connected) {
// avoid double-connect
await this._connected
return
@ -442,16 +427,14 @@ export class BaseTelegramClient extends EventEmitter {
await this._loadStorage()
const primaryDc = await this.storage.getDefaultDc()
if (primaryDc !== null) this._primaryDc = primaryDc
if (primaryDc !== null) this._defaultDc = primaryDc
this._setupPrimaryConnection()
const defaultDcAuthKey = await this.storage.getAuthKeyFor(this._defaultDc.id)
await this.primaryConnection.setupKeys(
await this.storage.getAuthKeyFor(this._primaryDc.id),
)
// await this.primaryConnection.setupKeys()
if (
(this._importForce || !this.primaryConnection.getAuthKey()) &&
(this._importForce || !defaultDcAuthKey) &&
this._importFrom
) {
const data = readStringSession(this._readerMap, this._importFrom)
@ -462,23 +445,23 @@ export class BaseTelegramClient extends EventEmitter {
)
}
this._primaryDc = this.primaryConnection.params.dc = data.primaryDc
this._defaultDc = data.primaryDc
await this.storage.setDefaultDc(data.primaryDc)
if (data.self) {
await this.storage.setSelf(data.self)
}
await this.primaryConnection.setupKeys(data.authKey)
// await this.primaryConnection.setupKeys(data.authKey)
await this.storage.setAuthKeyFor(data.primaryDc.id, data.authKey)
await this._saveStorage(true)
}
this.network.connect(this._defaultDc)
this._connected.resolve()
this._connected = true
this.primaryConnection.connect()
}
/**
@ -486,7 +469,8 @@ export class BaseTelegramClient extends EventEmitter {
*/
async waitUntilUsable(): Promise<void> {
return new Promise((resolve) => {
this.primaryConnection.once('usable', resolve)
// todo
// this.primaryConnection.once('usable', resolve)
})
}
@ -503,8 +487,8 @@ export class BaseTelegramClient extends EventEmitter {
await this._onClose()
this._config.destroy()
this.network.destroy()
this._cleanupPrimaryConnection(true)
// close additional connections
this._additionalConnections.forEach((conn) => conn.destroy())
@ -528,10 +512,11 @@ export class BaseTelegramClient extends EventEmitter {
newDc = res
}
this._primaryDc = newDc
this._defaultDc = newDc
await this.storage.setDefaultDc(newDc)
await this._saveStorage()
await this.primaryConnection.changeDc(newDc)
// todo
// await this.primaryConnection.changeDc(newDc)
}
/**
@ -555,6 +540,7 @@ export class BaseTelegramClient extends EventEmitter {
timeout?: number
},
): Promise<tl.RpcCallReturn[T['_']]> {
// todo move to network manager
if (this._connected !== true) {
await this.connect()
}
@ -574,14 +560,12 @@ export class BaseTelegramClient extends EventEmitter {
}
}
const connection = params?.connection ?? this.primaryConnection
let lastError: Error | null = null
const stack = this._niceStacks ? new Error().stack : undefined
for (let i = 0; i < this._rpcRetryCount; i++) {
try {
const res = await connection.sendRpc(
const res = await this.network['_primaryDc']!.mainConnection.sendRpc(
message,
stack,
params?.timeout,
@ -629,35 +613,35 @@ export class BaseTelegramClient extends EventEmitter {
}
}
if (connection.params.dc.id === this._primaryDc.id) {
if (
e.constructor === tl.errors.PhoneMigrateXError ||
e.constructor === tl.errors.UserMigrateXError ||
e.constructor === tl.errors.NetworkMigrateXError
) {
this.log.info('Migrate error, new dc = %d', e.new_dc)
await this.changeDc(e.new_dc)
continue
}
} else if (
e.constructor === tl.errors.AuthKeyUnregisteredError
) {
// we can try re-exporting auth from the primary connection
this.log.warn('exported auth key error, re-exporting..')
const auth = await this.call({
_: 'auth.exportAuthorization',
dcId: connection.params.dc.id,
})
await connection.sendRpc({
_: 'auth.importAuthorization',
id: auth.id,
bytes: auth.bytes,
})
continue
}
// if (connection.params.dc.id === this._defaultDc.id) {
// if (
// e.constructor === tl.errors.PhoneMigrateXError ||
// e.constructor === tl.errors.UserMigrateXError ||
// e.constructor === tl.errors.NetworkMigrateXError
// ) {
// this.log.info('Migrate error, new dc = %d', e.new_dc)
// await this.changeDc(e.new_dc)
// continue
// }
// } else {
// if (e.constructor === tl.errors.AuthKeyUnregisteredError) {
// // we can try re-exporting auth from the primary connection
// this.log.warn('exported auth key error, re-exporting..')
//
// const auth = await this.call({
// _: 'auth.exportAuthorization',
// dcId: connection.params.dc.id,
// })
//
// await connection.sendRpc({
// _: 'auth.importAuthorization',
// id: auth.id,
// bytes: auth.bytes,
// })
//
// continue
// }
// }
throw e
}
@ -666,100 +650,100 @@ export class BaseTelegramClient extends EventEmitter {
throw lastError
}
/**
* Creates an additional connection to a given DC.
* This will use auth key for that DC that was already stored
* in the session, or generate a new auth key by exporting
* authorization from primary DC and importing it to the new DC.
* New connection will use the same crypto provider, `initConnection`,
* transport and reconnection strategy as the primary connection
*
* This method is quite low-level and you shouldn't usually care about this
* when using high-level API provided by `@mtcute/client`.
*
* @param dcId DC id, to which the connection will be created
* @param cdn Whether that DC is a CDN DC
* @param inactivityTimeout
* Inactivity timeout for the connection (in ms), after which the transport will be closed.
* Note that connection can still be used normally, it's just the transport which is closed.
* Defaults to 5 min
*/
async createAdditionalConnection(
dcId: number,
params?: {
// todo proper docs
// default = false
media?: boolean
// default = fa;se
cdn?: boolean
// default = 300_000
inactivityTimeout?: number
// default = false
disableUpdates?: boolean
},
): Promise<SessionConnection> {
const dc = await this._config.findOption({
dcId,
preferMedia: params?.media,
cdn: params?.cdn,
allowIpv6: this._useIpv6,
})
if (!dc) throw new Error('DC not found')
const connection = new SessionConnection(
{
dc,
testMode: this._testMode,
crypto: this._crypto,
initConnection: this._initConnectionParams,
transportFactory: this._transportFactory,
reconnectionStrategy: this._reconnectionStrategy,
inactivityTimeout: params?.inactivityTimeout ?? 300_000,
layer: this._layer,
disableUpdates: params?.disableUpdates,
readerMap: this._readerMap,
writerMap: this._writerMap,
},
this.log.create('connection'),
)
connection.on('error', (err) => this._emitError(err, connection))
await connection.setupKeys(await this.storage.getAuthKeyFor(dc.id))
connection.connect()
if (!connection.getAuthKey()) {
this.log.info('exporting auth to DC %d', dcId)
const auth = await this.call({
_: 'auth.exportAuthorization',
dcId,
})
await connection.sendRpc({
_: 'auth.importAuthorization',
id: auth.id,
bytes: auth.bytes,
})
// connection.authKey was already generated at this point
this.storage.setAuthKeyFor(dc.id, connection.getAuthKey()!)
await this._saveStorage()
} else {
// in case the auth key is invalid
const dcId = dc.id
connection.on('key-change', async (key) => {
// we don't need to export, it will be done by `.call()`
// in case this error is returned
//
// even worse, exporting here will lead to a race condition,
// and may result in redundant re-exports.
this.storage.setAuthKeyFor(dcId, key)
await this._saveStorage()
})
}
this._additionalConnections.push(connection)
return connection
}
// /**
// * Creates an additional connection to a given DC.
// * This will use auth key for that DC that was already stored
// * in the session, or generate a new auth key by exporting
// * authorization from primary DC and importing it to the new DC.
// * New connection will use the same crypto provider, `initConnection`,
// * transport and reconnection strategy as the primary connection
// *
// * This method is quite low-level and you shouldn't usually care about this
// * when using high-level API provided by `@mtcute/client`.
// *
// * @param dcId DC id, to which the connection will be created
// * @param cdn Whether that DC is a CDN DC
// * @param inactivityTimeout
// * Inactivity timeout for the connection (in ms), after which the transport will be closed.
// * Note that connection can still be used normally, it's just the transport which is closed.
// * Defaults to 5 min
// */
// async createAdditionalConnection(
// dcId: number,
// params?: {
// // todo proper docs
// // default = false
// media?: boolean
// // default = fa;se
// cdn?: boolean
// // default = 300_000
// inactivityTimeout?: number
// // default = false
// disableUpdates?: boolean
// }
// ): Promise<SessionConnection> {
// const dc = await this._config.findOption({
// dcId,
// preferMedia: params?.media,
// cdn: params?.cdn,
// allowIpv6: this._useIpv6,
// })
// if (!dc) throw new Error('DC not found')
// const connection = new SessionConnection(
// {
// dc,
// testMode: this._testMode,
// crypto: this._crypto,
// initConnection: this._initConnectionParams,
// transportFactory: this._transportFactory,
// reconnectionStrategy: this._reconnectionStrategy,
// inactivityTimeout: params?.inactivityTimeout ?? 300_000,
// layer: this._layer,
// disableUpdates: params?.disableUpdates,
// readerMap: this._readerMap,
// writerMap: this._writerMap,
// },
// this.log.create('connection')
// )
//
// connection.on('error', (err) => this._emitError(err, connection))
// await connection.setupKeys(await this.storage.getAuthKeyFor(dc.id))
// connection.connect()
//
// if (!connection.getAuthKey()) {
// this.log.info('exporting auth to DC %d', dcId)
// const auth = await this.call({
// _: 'auth.exportAuthorization',
// dcId,
// })
// await connection.sendRpc({
// _: 'auth.importAuthorization',
// id: auth.id,
// bytes: auth.bytes,
// })
//
// // connection.authKey was already generated at this point
// this.storage.setAuthKeyFor(dc.id, connection.getAuthKey()!)
// await this._saveStorage()
// } else {
// // in case the auth key is invalid
// const dcId = dc.id
// connection.on('key-change', async (key) => {
// // we don't need to export, it will be done by `.call()`
// // in case this error is returned
// //
// // even worse, exporting here will lead to a race condition,
// // and may result in redundant re-exports.
//
// this.storage.setAuthKeyFor(dcId, key)
// await this._saveStorage()
// })
// }
//
// this._additionalConnections.push(connection)
//
// return connection
// }
/**
* Destroy a connection that was previously created using
@ -789,7 +773,8 @@ export class BaseTelegramClient extends EventEmitter {
* @param factory New transport factory
*/
changeTransport(factory: TransportFactory): void {
this.primaryConnection.changeTransport(factory)
// todo
// this.primaryConnection.changeTransport(factory)
this._additionalConnections.forEach((conn) =>
conn.changeTransport(factory),
@ -915,16 +900,16 @@ export class BaseTelegramClient extends EventEmitter {
* > with [@BotFather](//t.me/botfather)
*/
async exportSession(): Promise<string> {
if (!this.primaryConnection.getAuthKey()) {
throw new Error('Auth key is not generated yet')
}
// todo
// if (!this.primaryConnection.getAuthKey())
// throw new Error('Auth key is not generated yet')
return writeStringSession(this._writerMap, {
version: 1,
self: await this.storage.getSelf(),
testMode: this._testMode,
primaryDc: this._primaryDc,
authKey: this.primaryConnection.getAuthKey()!,
primaryDc: this._defaultDc,
authKey: Buffer.from([]) //this.primaryConnection.getAuthKey()!,
})
}

View file

@ -11,8 +11,76 @@ import {
import { getRandomInt, ICryptoProvider, Logger, randomLong } from '../utils'
import { buffersEqual, randomBytes } from '../utils/buffer-utils'
import {
ICryptoProvider,
Logger,
getRandomInt,
randomLong,
ControllablePromise,
LruSet,
Deque,
SortedArray,
LongMap,
} from '../utils'
import { createAesIgeForMessage } from '../utils/crypto/mtproto'
export interface PendingRpc {
method: string
data: Buffer
promise: ControllablePromise
stack?: string
gzipOverhead?: number
sent?: boolean
msgId?: Long
seqNo?: number
containerId?: Long
acked?: boolean
initConn?: boolean
getState?: number
cancelled?: boolean
timeout?: number
}
export type PendingMessage =
| {
_: 'rpc'
rpc: PendingRpc
}
| {
_: 'container'
msgIds: Long[]
}
| {
_: 'state'
msgIds: Long[]
containerId: Long
}
| {
_: 'resend'
msgIds: Long[]
containerId: Long
}
| {
_: 'ping'
pingId: Long
containerId: Long
}
| {
_: 'destroy_session'
sessionId: Long
containerId: Long
}
| {
_: 'cancel'
msgId: Long
containerId: Long
}
| {
_: 'future_salts'
containerId: Long
}
/**
* Class encapsulating a single MTProto session.
* Provides means to en-/decrypt messages
@ -33,6 +101,27 @@ export class MtprotoSession {
serverSalt = Long.ZERO
/// state ///
// recent msg ids
recentOutgoingMsgIds = new LruSet<Long>(1000, false, true)
recentIncomingMsgIds = new LruSet<Long>(1000, false, true)
// queues
queuedRpc = new Deque<PendingRpc>()
queuedAcks: Long[] = []
queuedStateReq: Long[] = []
queuedResendReq: Long[] = []
queuedCancelReq: Long[] = []
getStateSchedule = new SortedArray<PendingRpc>(
[],
(a, b) => a.getState! - b.getState!
)
// requests info
pendingMessages = new LongMap<PendingMessage>()
initConnectionCalled = false
constructor(
crypto: ICryptoProvider,
readonly log: Logger,
@ -40,6 +129,7 @@ export class MtprotoSession {
readonly _writerMap: TlWriterMap,
) {
this._crypto = crypto
this.log.prefix = `[SESSION ${this._sessionId.toString(16)}] `
}
/** Whether session contains authKey */
@ -50,11 +140,13 @@ export class MtprotoSession {
/** Setup keys based on authKey */
async setupKeys(authKey?: Buffer | null): Promise<void> {
if (authKey) {
this.log.debug('setting up keys')
this._authKey = authKey
this._authKeyClientSalt = authKey.slice(88, 120)
this._authKeyServerSalt = authKey.slice(96, 128)
this._authKeyId = (await this._crypto.sha1(this._authKey)).slice(-8)
} else {
this.log.debug('resetting keys')
this._authKey = undefined
this._authKeyClientSalt = undefined
this._authKeyServerSalt = undefined
@ -62,22 +154,76 @@ export class MtprotoSession {
}
}
/** Reset session by removing authKey and values derived from it */
/**
* Reset session by removing authKey and values derived from it,
* as well as resetting session state
*/
reset(): void {
this._lastMessageId = Long.ZERO
this._seqNo = 0
this._authKey = undefined
this._authKeyClientSalt = undefined
this._authKeyServerSalt = undefined
this._authKeyId = undefined
this._sessionId = randomLong()
// no need to reset server salt
this.resetState()
}
changeSessionId(): void {
this._sessionId = randomLong()
/**
* Reset session state and generate a new session ID.
*
* By default, also cancels any pending RPC requests.
* If `keepPending` is set to `true`, pending requests will be kept
*/
resetState(keepPending = false): void {
this._lastMessageId = Long.ZERO
this._seqNo = 0
this._sessionId = randomLong()
this.log.debug('session reset, new sid = %l', this._sessionId)
this.log.prefix = `[SESSION ${this._sessionId.toString(16)}] `
// reset session state
if (!keepPending) {
for (const info of this.pendingMessages.values()) {
if (info._ === 'rpc') {
info.rpc.promise.reject(new Error('Session is reset'))
}
}
this.pendingMessages.clear()
}
this.recentOutgoingMsgIds.clear()
this.recentIncomingMsgIds.clear()
if (!keepPending) {
while (this.queuedRpc.length) {
const rpc = this.queuedRpc.popFront()!
if (rpc.sent === false) {
rpc.promise.reject(new Error('Session is reset'))
}
}
}
this.queuedAcks.length = 0
this.queuedStateReq.length = 0
this.queuedResendReq.length = 0
this.getStateSchedule.clear()
}
enqueueRpc(rpc: PendingRpc, force?: boolean): boolean {
// already queued or cancelled
if ((!force && !rpc.sent) || rpc.cancelled) return false
rpc.sent = false
rpc.containerId = undefined
this.log.debug(
'enqueued %s for sending (msg_id = %s)',
rpc.method,
rpc.msgId || 'n/a'
)
this.queuedRpc.pushBack(rpc)
return true
}
/** Encrypt a single MTProto message using session's keys */

View file

@ -0,0 +1,160 @@
import EventEmitter from 'events'
import { tl } from '@mtcute/tl'
import { Logger } from '../utils'
import {
SessionConnection,
SessionConnectionParams,
} from './session-connection'
import { MtprotoSession } from './mtproto-session'
export class MultiSessionConnection extends EventEmitter {
private _log: Logger
private _sessions: MtprotoSession[]
constructor(
readonly params: SessionConnectionParams,
private _count: number,
log: Logger
) {
super()
this._log = log.create('multi')
this._sessions = []
this._updateConnections()
}
protected _connections: SessionConnection[] = []
setCount(count: number, doUpdate = true): void {
this._count = count
if (doUpdate) this._updateConnections()
}
private _updateSessions(): void {
// there are two cases
// 1. this msc is main, in which case every connection should have its own session
// 2. this msc is not main, in which case all connections should share the same session
if (!this.params.isMainConnection) {
// case 2
if (this._sessions.length === 0) {
this._sessions.push(
new MtprotoSession(
this.params.crypto,
this._log.create('session'),
this.params.readerMap,
this.params.writerMap
)
)
}
// shouldn't happen, but just in case
while (this._sessions.length > 1) {
this._sessions.pop()!.reset()
}
return
}
// case 1
if (this._sessions.length === this._count) return
if (this._sessions.length > this._count) {
// destroy extra sessions
for (let i = this._sessions.length - 1; i >= this._count; i--) {
this._sessions[i].reset()
}
this._sessions.splice(this._count)
return
}
while (this._sessions.length < this._count) {
this._sessions.push(
new MtprotoSession(
this.params.crypto,
this._log.create('session'),
this.params.readerMap,
this.params.writerMap
)
)
}
}
private _updateConnections(): void {
this._updateSessions()
if (this._connections.length === this._count) return
if (this._connections.length > this._count) {
// destroy extra connections
for (let i = this._connections.length - 1; i >= this._count; i--) {
this._connections[i].destroy()
}
this._connections.splice(this._count)
return
}
// create new connections
for (let i = this._connections.length; i < this._count; i++) {
const session = this.params.isMainConnection ? this._sessions[i] : this._sessions[0]
const conn = new SessionConnection(this.params, session)
conn.on('update', (update) => this.emit('update', update))
this._connections.push(conn)
}
}
destroy(): void {
for (const conn of this._connections) {
conn.destroy()
}
for (const session of this._sessions) {
session.reset()
}
}
private _nextConnection = 0
sendRpc<T extends tl.RpcMethod>(
request: T,
stack?: string,
timeout?: number
): Promise<tl.RpcCallReturn[T['_']]> {
if (this.params.isMainConnection) {
// find the least loaded connection
let min = Infinity
let minIdx = 0
for (let i = 0; i < this._connections.length; i++) {
const conn = this._connections[i]
const total = conn._session.queuedRpc.length + conn._session.pendingMessages.size()
if (total < min) {
min = total
minIdx = i
}
}
return this._connections[minIdx].sendRpc(request, stack, timeout)
}
// round-robin connections
// since they all share the same session, it doesn't matter which one we use
return this._connections[
this._nextConnection++ % this._connections.length
].sendRpc(request, stack, timeout)
}
async changeDc(dc: tl.RawDcOption, authKey?: Buffer | null): Promise<void> {
await Promise.all(
this._connections.map((conn) => conn.changeDc(dc, authKey))
)
}
connect(): void {
for (const conn of this._connections) {
conn.connect()
}
}
}

View file

@ -0,0 +1,202 @@
import { TlReaderMap, TlWriterMap } from '@mtcute/tl-runtime'
import { tl } from '@mtcute/tl'
import { createControllablePromise, ICryptoProvider, Logger } from '../utils'
import { defaultTransportFactory, TransportFactory } from './transports'
import {
defaultReconnectionStrategy,
ReconnectionStrategy,
} from './reconnection'
import { PersistentConnectionParams } from './persistent-connection'
import { ConfigManager } from './config-manager'
import { MultiSessionConnection } from './multi-session-connection'
import { SessionConnectionParams } from './session-connection'
import { ITelegramStorage } from '../storage'
export class DcConnectionManager {
constructor(
readonly manager: NetworkManager,
readonly dcId: number,
private _dc: tl.RawDcOption
) {}
private __baseConnectionParams = (): SessionConnectionParams => ({
crypto: this.manager.params.crypto,
initConnection: this.manager._initConnectionParams,
transportFactory: this.manager._transportFactory,
dc: this._dc,
testMode: this.manager.params.testMode,
reconnectionStrategy: this.manager._reconnectionStrategy,
layer: this.manager.params.layer,
disableUpdates: this.manager.params.disableUpdates,
readerMap: this.manager.params.readerMap,
writerMap: this.manager.params.writerMap,
isMainConnection: false,
})
mainConnection = new MultiSessionConnection(
{
...this.__baseConnectionParams(),
isMainConnection: true,
},
1,
this.manager._log
)
}
export interface NetworkManagerParams {
storage: ITelegramStorage
crypto: ICryptoProvider
log: Logger
apiId: number
initConnectionOptions?: Partial<
Omit<tl.RawInitConnectionRequest, 'apiId' | 'query'>
>
transport?: TransportFactory
reconnectionStrategy?: ReconnectionStrategy<PersistentConnectionParams>
disableUpdates?: boolean
testMode: boolean
layer: number
readerMap: TlReaderMap
writerMap: TlWriterMap
}
export class NetworkManager {
readonly _log = this.params.log.create('network')
readonly _initConnectionParams: tl.RawInitConnectionRequest
readonly _transportFactory: TransportFactory
readonly _reconnectionStrategy: ReconnectionStrategy<PersistentConnectionParams>
protected readonly _dcConnections: Record<number, DcConnectionManager> = {}
protected _primaryDc?: DcConnectionManager
private _keepAliveInterval?: NodeJS.Timeout
private _keepAliveAction = this._defaultKeepAliveAction.bind(this)
private _defaultKeepAliveAction(): void {
if (this._keepAliveInterval) return
// todo
// telegram asks to fetch pending updates
// if there are no updates for 15 minutes.
// core does not have update handling,
// so we just use getState so the server knows
// we still do need updates
// this.call({ _: 'updates.getState' }).catch((e) => {
// if (!(e instanceof tl.errors.RpcError)) {
// this.primaryConnection.reconnect()
// }
// })
}
constructor(
readonly params: NetworkManagerParams,
readonly config: ConfigManager
) {
let deviceModel = 'mtcute on '
let appVersion = 'unknown'
if (typeof process !== 'undefined' && typeof require !== 'undefined') {
const os = require('os')
deviceModel += `${os.type()} ${os.arch()} ${os.release()}`
try {
// for production builds
appVersion = require('../package.json').version
} catch (e) {
try {
// for development builds (additional /src/ in path)
appVersion = require('../../package.json').version
} catch (e) {}
}
} else if (typeof navigator !== 'undefined') {
deviceModel += navigator.userAgent
} else deviceModel += 'unknown'
this._initConnectionParams = {
_: 'initConnection',
deviceModel,
systemVersion: '1.0',
appVersion,
systemLangCode: 'en',
langPack: '', // "langPacks are for official apps only"
langCode: 'en',
...(params.initConnectionOptions ?? {}),
apiId: params.apiId,
query: null as any,
}
this._transportFactory = params.transport ?? defaultTransportFactory
this._reconnectionStrategy =
params.reconnectionStrategy ?? defaultReconnectionStrategy
// this._dcConnections[params.defaultDc?.id ?? 2] =
// new DcConnectionManager(this, params.defaultDc?.id ?? 2)
}
private _switchPrimaryDc(dc: DcConnectionManager) {
if (this._primaryDc && this._primaryDc !== dc) {
// todo clean up
return
}
this._primaryDc = dc
// todo add handlers
/*
this.primaryConnection.on('usable', () => {
this._lastUpdateTime = Date.now()
if (this._keepAliveInterval) clearInterval(this._keepAliveInterval)
this._keepAliveInterval = setInterval(async () => {
if (Date.now() - this._lastUpdateTime > 900_000) {
this._keepAliveAction()
this._lastUpdateTime = Date.now()
}
}, 60_000)
})
this.primaryConnection.on('update', (update) => {
this._lastUpdateTime = Date.now()
this._handleUpdate(update)
})
this.primaryConnection.on('wait', () =>
this._cleanupPrimaryConnection()
)
this.primaryConnection.on('key-change', async (key) => {
this.storage.setAuthKeyFor(this._defaultDc.id, key)
await this._saveStorage()
})
this.primaryConnection.on('error', (err) =>
this._emitError(err, this.primaryConnection)
)
*/
dc.mainConnection.connect()
}
/**
* Perform initial connection to the default DC
*
* @param defaultDc Default DC to connect to
*/
connect(defaultDc: tl.RawDcOption): void {
if (this._dcConnections[defaultDc.id]) {
// shouldn't happen
throw new Error('DC manager already exists')
}
this._dcConnections[defaultDc.id] = new DcConnectionManager(
this,
defaultDc.id,
defaultDc
)
this._switchPrimaryDc(this._dcConnections[defaultDc.id])
}
destroy(): void {
for (const dc of Object.values(this._dcConnections)) {
dc.mainConnection.destroy()
}
if (this._keepAliveInterval) clearInterval(this._keepAliveInterval)
}
}

View file

@ -6,7 +6,9 @@ import { ICryptoProvider, Logger } from '../utils'
import {
ControllablePromise,
createControllablePromise,
} from '../utils/controllable-promise'
ICryptoProvider,
Logger,
} from '../utils'
import { ReconnectionStrategy } from './reconnection'
import {
ITelegramTransport,
@ -23,11 +25,15 @@ export interface PersistentConnectionParams {
inactivityTimeout?: number
}
let nextConnectionUid = 0
/**
* Base class for persistent connections.
* Only used for {@link PersistentConnection} and used as a mean of code splitting.
*/
export abstract class PersistentConnection extends EventEmitter {
private _uid = nextConnectionUid++
readonly params: PersistentConnectionParams
private _transport!: ITelegramTransport
@ -64,6 +70,18 @@ export abstract class PersistentConnection extends EventEmitter {
this.changeTransport(params.transportFactory)
}
private _updateLogPrefix() {
this.log.prefix = `[UID ${this._uid}, DC ${this.params.dc.id}] `
}
async changeDc(dc: tl.RawDcOption): Promise<void> {
this.log.debug('dc changed to: %j', dc)
this.params.dc = dc
this._updateLogPrefix()
this.reconnect()
}
changeTransport(factory: TransportFactory): void {
if (this._transport) {
this._transport.close()

View file

@ -25,6 +25,7 @@ import {
removeFromLongArray,
SortedArray,
} from '../utils'
import { MtprotoSession, PendingMessage, PendingRpc } from './mtproto-session'
import { doAuthorization } from './authorization'
import { MtprotoSession } from './mtproto-session'
import {
@ -39,68 +40,12 @@ export interface SessionConnectionParams extends PersistentConnectionParams {
niceStacks?: boolean
layer: number
disableUpdates?: boolean
isMainConnection: boolean
readerMap: TlReaderMap
writerMap: TlWriterMap
}
interface PendingRpc {
method: string
data: Buffer
promise: ControllablePromise
stack?: string
gzipOverhead?: number
sent?: boolean
msgId?: Long
seqNo?: number
containerId?: Long
acked?: boolean
initConn?: boolean
getState?: number
cancelled?: boolean
timeout?: NodeJS.Timeout
}
type PendingMessage =
| {
_: 'rpc'
rpc: PendingRpc
}
| {
_: 'container'
msgIds: Long[]
}
| {
_: 'state'
msgIds: Long[]
containerId: Long
}
| {
_: 'resend'
msgIds: Long[]
containerId: Long
}
| {
_: 'ping'
pingId: Long
containerId: Long
}
| {
_: 'destroy_session'
sessionId: Long
containerId: Long
}
| {
_: 'cancel'
msgId: Long
containerId: Long
}
| {
_: 'future_salts'
containerId: Long
}
// destroy_session#e7512126 session_id:long
// todo
const DESTROY_SESSION_ID = Buffer.from('262151e7', 'hex')
@ -115,61 +60,31 @@ function makeNiceStack(
}\n at ${method}\n${stack.split('\n').slice(2).join('\n')}`
}
let nextConnectionUid = 0
/**
* A connection to a single DC.
*/
export class SessionConnection extends PersistentConnection {
readonly params!: SessionConnectionParams
private _uid = nextConnectionUid++
private _session: MtprotoSession
private _flushTimer = new EarlyTimer()
/// internal state ///
// recent msg ids
private _recentOutgoingMsgIds = new LruSet<Long>(1000, false, true)
private _recentIncomingMsgIds = new LruSet<Long>(1000, false, true)
// queues
private _queuedRpc = new Deque<PendingRpc>()
private _queuedAcks: Long[] = []
private _queuedStateReq: Long[] = []
private _queuedResendReq: Long[] = []
private _queuedCancelReq: Long[] = []
private _queuedDestroySession: Long[] = []
private _getStateSchedule = new SortedArray<PendingRpc>(
[],
(a, b) => a.getState! - b.getState!,
)
// requests info
private _pendingMessages = new LongMap<PendingMessage>()
private _initConnectionCalled = false
private _next429Timeout = 1000
private _current429Timeout?: NodeJS.Timeout
private _lastPingRtt = NaN
private _lastPingTime = 0
private _lastPingMsgId = Long.ZERO
private _lastSessionCreatedUid = Long.ZERO
private _next429Timeout = 1000
private _current429Timeout?: NodeJS.Timeout
private _readerMap: TlReaderMap
private _writerMap: TlWriterMap
constructor(params: SessionConnectionParams, log: Logger) {
super(params, log.create('conn'))
this._updateLogPrefix()
this._session = new MtprotoSession(
params.crypto,
log.create('session'),
params.readerMap,
params.writerMap,
)
constructor(
params: SessionConnectionParams,
readonly _session: MtprotoSession
) {
super(params, _session.log.create('conn'))
this._flushTimer.onTimeout(this._flush.bind(this))
this._readerMap = params.readerMap
@ -177,18 +92,10 @@ export class SessionConnection extends PersistentConnection {
this._handleRawMessage = this._handleRawMessage.bind(this)
}
private _updateLogPrefix() {
this.log.prefix = `[UID ${this._uid}, DC ${this.params.dc.id}] `
}
async changeDc(dc: tl.RawDcOption, authKey?: Buffer): Promise<void> {
this.log.debug('dc changed (has_auth_key = %b) to: %j', authKey, dc)
this._updateLogPrefix()
async changeDc(dc: tl.RawDcOption, authKey?: Buffer | null): Promise<void> {
this._session.reset()
await this._session.setupKeys(authKey)
this.params.dc = dc
this.reconnect()
await super.changeDc(dc)
}
setupKeys(authKey: Buffer | null): Promise<void> {
@ -212,37 +119,12 @@ export class SessionConnection extends PersistentConnection {
}
reset(forever = false): void {
this._initConnectionCalled = false
this._session.initConnectionCalled = false
this._resetLastPing(true)
this._flushTimer.reset()
clearTimeout(this._current429Timeout!)
if (forever) {
// reset all the queues, cancel all pending messages, etc
this._session.reset()
for (const info of this._pendingMessages.values()) {
if (info._ === 'rpc') {
info.rpc.promise.reject(new Error('Connection destroyed'))
}
}
this._pendingMessages.clear()
this._recentOutgoingMsgIds.clear()
this._recentIncomingMsgIds.clear()
while (this._queuedRpc.length) {
const rpc = this._queuedRpc.popFront()!
if (rpc.sent === false) {
rpc.promise.reject(new Error('Connection destroyed'))
}
}
this._queuedAcks.length = 0
this._queuedStateReq.length = 0
this._queuedResendReq.length = 0
this._getStateSchedule.clear()
this.removeAllListeners()
}
}
@ -284,11 +166,11 @@ export class SessionConnection extends PersistentConnection {
timeout,
)
for (const msgId of this._pendingMessages.keys()) {
const info = this._pendingMessages.get(msgId)!
for (const msgId of this._session.pendingMessages.keys()) {
const info = this._session.pendingMessages.get(msgId)!
if (info._ === 'container') {
this._pendingMessages.delete(msgId)
this._session.pendingMessages.delete(msgId)
} else {
this._onMessageFailed(msgId, 'transport flood', true)
}
@ -415,15 +297,15 @@ export class SessionConnection extends PersistentConnection {
return
}
if (this._recentIncomingMsgIds.has(messageId)) {
if (this._session.recentIncomingMsgIds.has(messageId)) {
this.log.warn('warn: ignoring duplicate message %s', messageId)
return
}
const message = message_ as mtp.TlObject
this.log.verbose('received %s (msg_id: %s)', message._, messageId)
this._recentIncomingMsgIds.add(messageId)
this.log.verbose('received %s (msg_id: %l)', message._, messageId)
this._session.recentIncomingMsgIds.add(messageId)
switch (message._) {
case 'mt_msgs_ack':
@ -490,6 +372,17 @@ export class SessionConnection extends PersistentConnection {
this._rescheduleInactivity()
}
if (this.params.disableUpdates) {
this.log.warn(
'received updates, but updates are disabled'
)
break
}
if (!this.params.isMainConnection) {
this.log.warn('received updates on non-main connection')
break
}
this.emit('update', message)
return
@ -522,8 +415,7 @@ export class SessionConnection extends PersistentConnection {
return
}
const msg = this._pendingMessages.get(reqMsgId)
const msg = this._session.pendingMessages.get(reqMsgId)
if (!msg) {
let result
@ -538,7 +430,7 @@ export class SessionConnection extends PersistentConnection {
)
// check if the msg is one of the recent ones
if (this._recentOutgoingMsgIds.has(reqMsgId)) {
if (this._session.recentOutgoingMsgIds.has(reqMsgId)) {
this.log.debug(
'received rpc_result again for %l (contains %s)',
reqMsgId,
@ -573,7 +465,7 @@ export class SessionConnection extends PersistentConnection {
// initConnection call was definitely received and
// processed by the server, so we no longer need to use it
if (rpc.initConn) this._initConnectionCalled = true
if (rpc.initConn) this._session.initConnectionCalled = true
this.log.verbose('<<< (%s) %j', rpc.method, result)
@ -610,11 +502,11 @@ export class SessionConnection extends PersistentConnection {
}
this._onMessageAcked(reqMsgId)
this._pendingMessages.delete(reqMsgId)
this._session.pendingMessages.delete(reqMsgId)
}
private _onMessageAcked(msgId: Long, inContainer = false): void {
const msg = this._pendingMessages.get(msgId)
const msg = this._session.pendingMessages.get(msgId)
if (!msg) {
this.log.warn('received ack for unknown message %l', msgId)
@ -633,7 +525,7 @@ export class SessionConnection extends PersistentConnection {
msg.msgIds.forEach((msgId) => this._onMessageAcked(msgId, true))
// we no longer need info about the container
this._pendingMessages.delete(msgId)
this._session.pendingMessages.delete(msgId)
break
case 'rpc': {
@ -650,19 +542,19 @@ export class SessionConnection extends PersistentConnection {
if (
!inContainer &&
rpc.containerId &&
this._pendingMessages.has(rpc.containerId)
this._session.pendingMessages.has(rpc.containerId)
) {
// ack all the messages in that container
this._onMessageAcked(rpc.containerId)
}
// this message could also already be in some queue,
removeFromLongArray(this._queuedStateReq, msgId)
removeFromLongArray(this._queuedResendReq, msgId)
removeFromLongArray(this._session.queuedStateReq, msgId)
removeFromLongArray(this._session.queuedResendReq, msgId)
// if resend/state was already requested, it will simply be ignored
this._getStateSchedule.remove(rpc)
this._session.getStateSchedule.remove(rpc)
break
}
default:
@ -681,8 +573,7 @@ export class SessionConnection extends PersistentConnection {
reason: string,
inContainer = false,
): void {
const msgInfo = this._pendingMessages.get(msgId)
const msgInfo = this._session.pendingMessages.get(msgId)
if (!msgInfo) {
this.log.debug(
'unknown message %l failed because of %s',
@ -725,26 +616,26 @@ export class SessionConnection extends PersistentConnection {
)
// since the query was rejected, we can let it reassign msg_id to avoid containers
this._pendingMessages.delete(msgId)
this._session.pendingMessages.delete(msgId)
rpc.msgId = undefined
this._enqueueRpc(rpc, true)
if (
!inContainer &&
rpc.containerId &&
this._pendingMessages.has(rpc.containerId)
this._session.pendingMessages.has(rpc.containerId)
) {
// fail all the messages in that container
this._onMessageFailed(rpc.containerId, reason)
}
// this message could also already be in some queue,
removeFromLongArray(this._queuedStateReq, msgId)
removeFromLongArray(this._queuedResendReq, msgId)
removeFromLongArray(this._session.queuedStateReq, msgId)
removeFromLongArray(this._session.queuedResendReq, msgId)
// if resend/state was already requested, it will simply be ignored
this._getStateSchedule.remove(rpc)
this._session.getStateSchedule.remove(rpc)
break
}
@ -755,7 +646,7 @@ export class SessionConnection extends PersistentConnection {
msgInfo.msgIds.length,
reason,
)
this._queuedResendReq.splice(0, 0, ...msgInfo.msgIds)
this._session.queuedResendReq.splice(0, 0, ...msgInfo.msgIds)
this._flushTimer.emitWhenIdle()
break
case 'state':
@ -765,32 +656,31 @@ export class SessionConnection extends PersistentConnection {
msgInfo.msgIds.length,
reason,
)
this._queuedStateReq.splice(0, 0, ...msgInfo.msgIds)
this._session.queuedStateReq.splice(0, 0, ...msgInfo.msgIds)
this._flushTimer.emitWhenIdle()
break
}
this._pendingMessages.delete(msgId)
this._session.pendingMessages.delete(msgId)
}
private _resetLastPing(withTime = false): void {
if (withTime) this._lastPingTime = 0
if (!this._lastPingMsgId.isZero()) {
this._pendingMessages.delete(this._lastPingMsgId)
this._session.pendingMessages.delete(this._lastPingMsgId)
}
this._lastPingMsgId = Long.ZERO
}
private _registerOutgoingMsgId(msgId: Long): Long {
this._recentOutgoingMsgIds.add(msgId)
this._session.recentOutgoingMsgIds.add(msgId)
return msgId
}
private _onPong({ msgId, pingId }: mtp.RawMt_pong): void {
const info = this._pendingMessages.get(msgId)
const info = this._session.pendingMessages.get(msgId)
if (!info) {
this.log.warn(
@ -916,14 +806,14 @@ export class SessionConnection extends PersistentConnection {
firstMsgId,
)
for (const msgId of this._pendingMessages.keys()) {
const val = this._pendingMessages.get(msgId)!
for (const msgId of this._session.pendingMessages.keys()) {
const val = this._session.pendingMessages.get(msgId)!
if (val._ === 'container') {
if (msgId.lt(firstMsgId)) {
// all messages in this container will be resent
// info about this container is no longer needed
this._pendingMessages.delete(msgId)
this._session.pendingMessages.delete(msgId)
}
return
@ -944,8 +834,7 @@ export class SessionConnection extends PersistentConnection {
answerMsgId: Long,
): void {
if (!msgId.isZero()) {
const info = this._pendingMessages.get(msgId)
const info = this._session.pendingMessages.get(msgId)
if (!info) {
this.log.info(
'received message info about unknown message %l',
@ -986,14 +875,14 @@ export class SessionConnection extends PersistentConnection {
if (
!answerMsgId.isZero() &&
!this._recentIncomingMsgIds.has(answerMsgId)
!this._session.recentIncomingMsgIds.has(answerMsgId)
) {
this.log.debug(
'received message info for %l, but answer (%l) was not received yet',
msgId,
answerMsgId,
)
this._queuedResendReq.push(answerMsgId)
this._session.queuedResendReq.push(answerMsgId)
this._flushTimer.emitWhenIdle()
return
@ -1019,7 +908,7 @@ export class SessionConnection extends PersistentConnection {
}
private _onMsgsStateInfo(msg: mtp.RawMt_msgs_state_info): void {
const info = this._pendingMessages.get(msg.reqMsgId)
const info = this._session.pendingMessages.get(msg.reqMsgId)
if (!info) {
this.log.warn(
@ -1044,43 +933,28 @@ export class SessionConnection extends PersistentConnection {
}
private _enqueueRpc(rpc: PendingRpc, force?: boolean) {
// already queued or cancelled
if ((!force && !rpc.sent) || rpc.cancelled) return
rpc.sent = false
rpc.containerId = undefined
this.log.debug(
'enqueued %s for sending (msg_id = %s)',
rpc.method,
rpc.msgId || 'n/a',
)
this._queuedRpc.pushBack(rpc)
this._flushTimer.emitWhenIdle()
if (this._session.enqueueRpc(rpc, force))
this._flushTimer.emitWhenIdle()
}
_resetSession(): void {
this._queuedDestroySession.push(this._session._sessionId)
this._session.resetState(true)
this.reconnect()
this._session.changeSessionId()
this.log.debug('session reset, new sid = %l', this._session._sessionId)
// once we receive new_session_created, all pending messages will be resent.
// clear getState/resend queues because they are not needed anymore
this._queuedStateReq.length = 0
this._queuedResendReq.length = 0
this._flushTimer.reset()
}
private _sendAck(msgId: Long): void {
if (this._queuedAcks.length === 0) {
if (this._session.queuedAcks.length === 0) {
this._flushTimer.emitBeforeNext(30000)
}
this._queuedAcks.push(msgId)
this._session.queuedAcks.push(msgId)
if (this._queuedAcks.length >= 100) {
if (this._session.queuedAcks.length >= 100) {
this._flushTimer.emitNow()
}
}
@ -1110,7 +984,7 @@ export class SessionConnection extends PersistentConnection {
}
}
if (!this._initConnectionCalled) {
if (!this._session.initConnectionCalled) {
// we will wrap every rpc call with initConnection
// until some of the requests wrapped with it is
// either acked or returns rpc_result
@ -1239,12 +1113,12 @@ export class SessionConnection extends PersistentConnection {
rpc.cancelled = true
if (rpc.msgId) {
this._queuedCancelReq.push(rpc.msgId)
this._session.queuedCancelReq.push(rpc.msgId)
this._flushTimer.emitWhenIdle()
} else {
// in case rpc wasn't sent yet (or had some error),
// we can simply remove it from queue
this._queuedRpc.remove(rpc)
this._session.queuedRpc.remove(rpc)
}
}
@ -1265,10 +1139,10 @@ export class SessionConnection extends PersistentConnection {
// if there are more queued requests, flush immediately
// (they likely didn't fit into one message)
if (
this._queuedRpc.length ||
this._queuedAcks.length ||
this._queuedStateReq.length ||
this._queuedResendReq.length
this._session.queuedRpc.length ||
this._session.queuedAcks.length ||
this._session.queuedStateReq.length ||
this._session.queuedResendReq.length
) {
this._flush()
} else {
@ -1279,7 +1153,7 @@ export class SessionConnection extends PersistentConnection {
private _doFlush(): void {
this.log.debug(
'flushing send queue. queued rpc: %d',
this._queuedRpc.length,
this._session.queuedRpc.length
)
// oh bloody hell mate
@ -1312,14 +1186,13 @@ export class SessionConnection extends PersistentConnection {
const now = Date.now()
if (this._queuedAcks.length) {
let acks = this._queuedAcks
if (this._session.queuedAcks.length) {
let acks = this._session.queuedAcks
if (acks.length > 8192) {
this._queuedAcks = acks.slice(8192)
this._session.queuedAcks = acks.slice(8192)
acks = acks.slice(0, 8192)
} else {
this._queuedAcks = []
this._session.queuedAcks = []
}
const obj: mtp.RawMt_msgs_ack = {
@ -1341,7 +1214,7 @@ export class SessionConnection extends PersistentConnection {
"didn't receive pong for previous ping (msg_id = %l)",
this._lastPingMsgId,
)
this._pendingMessages.delete(this._lastPingMsgId)
this._session.pendingMessages.delete(this._lastPingMsgId)
}
pingId = randomLong()
@ -1358,25 +1231,27 @@ export class SessionConnection extends PersistentConnection {
}
{
if (this._queuedStateReq.length) {
let ids = this._queuedStateReq
if (this._session.queuedStateReq.length) {
let ids = this._session.queuedStateReq
if (ids.length > 8192) {
this._queuedStateReq = ids.slice(8192)
this._session.queuedStateReq = ids.slice(8192)
ids = ids.slice(0, 8192)
} else {
this._queuedStateReq = []
this._session.queuedStateReq = []
}
getStateMsgIds = ids
}
const idx = this._getStateSchedule.index(
const idx = this._session.getStateSchedule.index(
{ getState: now } as any,
true,
)
if (idx > 0) {
const toGetState = this._getStateSchedule.raw.splice(0, idx)
const toGetState = this._session.getStateSchedule.raw.splice(
0,
idx
)
if (!getStateMsgIds) getStateMsgIds = []
toGetState.forEach((it) => getStateMsgIds!.push(it.msgId!))
}
@ -1396,14 +1271,13 @@ export class SessionConnection extends PersistentConnection {
}
}
if (this._queuedResendReq.length) {
resendMsgIds = this._queuedResendReq
if (this._session.queuedResendReq.length) {
resendMsgIds = this._session.queuedResendReq
if (resendMsgIds.length > 8192) {
this._queuedResendReq = resendMsgIds.slice(8192)
this._session.queuedResendReq = resendMsgIds.slice(8192)
resendMsgIds = resendMsgIds.slice(0, 8192)
} else {
this._queuedResendReq = []
this._session.queuedResendReq = []
}
const obj: mtp.RawMt_msg_resend_req = {
@ -1416,16 +1290,16 @@ export class SessionConnection extends PersistentConnection {
messageCount += 1
}
if (this._queuedCancelReq.length) {
containerMessageCount += this._queuedCancelReq.length
containerSize += this._queuedCancelReq.length * 28
cancelRpcs = this._queuedCancelReq
this._queuedCancelReq = []
if (this._session.queuedCancelReq.length) {
containerMessageCount += this._session.queuedCancelReq.length
containerSize += this._session.queuedCancelReq.length * 28
cancelRpcs = this._session.queuedCancelReq
this._session.queuedCancelReq = []
}
if (this._queuedDestroySession.length) {
containerMessageCount += this._queuedCancelReq.length
containerSize += this._queuedCancelReq.length * 28
containerMessageCount += this._session.queuedCancelReq.length
containerSize += this._session.queuedCancelReq.length * 28
destroySessions = this._queuedDestroySession
this._queuedDestroySession = []
}
@ -1434,11 +1308,11 @@ export class SessionConnection extends PersistentConnection {
const rpcToSend: PendingRpc[] = []
while (
this._queuedRpc.length &&
this._session.queuedRpc.length &&
containerSize < 32768 && // 2^15
containerMessageCount < 1020
) {
const msg = this._queuedRpc.popFront()!
const msg = this._session.queuedRpc.popFront()!
if (msg.cancelled) continue
// note: we don't check for <2^15 here
@ -1497,7 +1371,7 @@ export class SessionConnection extends PersistentConnection {
pingId: pingId!,
containerId: pingMsgId,
}
this._pendingMessages.set(pingMsgId, pingPending)
this._session.pendingMessages.set(pingMsgId, pingPending)
otherPendings.push(pingPending)
}
@ -1510,7 +1384,7 @@ export class SessionConnection extends PersistentConnection {
msgIds: getStateMsgIds!,
containerId: getStateMsgId,
}
this._pendingMessages.set(getStateMsgId, getStatePending)
this._session.pendingMessages.set(getStateMsgId, getStatePending)
otherPendings.push(getStatePending)
}
@ -1523,7 +1397,7 @@ export class SessionConnection extends PersistentConnection {
msgIds: resendMsgIds!,
containerId: resendMsgId,
}
this._pendingMessages.set(resendMsgId, resendPending)
this._session.pendingMessages.set(resendMsgId, resendPending)
otherPendings.push(resendPending)
}
@ -1541,7 +1415,7 @@ export class SessionConnection extends PersistentConnection {
msgId,
containerId: cancelMsgId,
}
this._pendingMessages.set(cancelMsgId, pending)
this._session.pendingMessages.set(cancelMsgId, pending)
otherPendings.push(pending)
})
}
@ -1560,7 +1434,7 @@ export class SessionConnection extends PersistentConnection {
sessionId,
containerId: msgId,
}
this._pendingMessages.set(msgId, pending)
this._session.pendingMessages.set(msgId, pending)
otherPendings.push(pending)
})
}
@ -1584,7 +1458,7 @@ export class SessionConnection extends PersistentConnection {
msg.msgId = msgId
msg.seqNo = seqNo
this._pendingMessages.set(msgId, {
this._session.pendingMessages.set(msgId, {
_: 'rpc',
rpc: msg,
})
@ -1599,11 +1473,11 @@ export class SessionConnection extends PersistentConnection {
// (re-)schedule get_state if needed
if (msg.getState) {
this._getStateSchedule.remove(msg)
this._session.getStateSchedule.remove(msg)
}
if (!msg.acked) {
msg.getState = getStateTime
this._getStateSchedule.insert(msg)
this._session.getStateSchedule.insert(msg)
}
writer.long(this._registerOutgoingMsgId(msg.msgId))
@ -1650,7 +1524,10 @@ export class SessionConnection extends PersistentConnection {
})
}
this._pendingMessages.set(containerId, { _: 'container', msgIds })
this._session.pendingMessages.set(containerId, {
_: 'container',
msgIds,
})
}
const result = writer.result()
@ -1685,7 +1562,8 @@ export class SessionConnection extends PersistentConnection {
)
// put acks in the front so they are the first to be sent
if (ackMsgIds) this._queuedAcks.splice(0, 0, ...ackMsgIds)
if (ackMsgIds)
this._session.queuedAcks.splice(0, 0, ...ackMsgIds)
this._onMessageFailed(rootMsgId, 'unknown error')
})
}

View file

@ -59,7 +59,7 @@ describe('fuzz : transport', function () {
transport: () => new RandomBytesTransport(),
apiId: 0,
apiHash: '',
primaryDc: defaultDcs.defaultTestDc,
defaultDc: defaultDcs.defaultTestDc,
})
client.log.level = 0
@ -85,7 +85,7 @@ describe('fuzz : transport', function () {
transport: () => new RandomBytesTransport(),
apiId: 0,
apiHash: '',
primaryDc: defaultDcs.defaultTestDc,
defaultDc: defaultDcs.defaultTestDc,
})
client.log.level = 0