2017-12-05 11:41:07 +00:00
|
|
|
# Pyrogram - Telegram MTProto API Client Library for Python
|
2020-02-01 13:04:33 +00:00
|
|
|
# Copyright (C) 2017-2020 Dan <https://github.com/delivrance>
|
2017-12-05 11:41:07 +00:00
|
|
|
#
|
|
|
|
# This file is part of Pyrogram.
|
|
|
|
#
|
|
|
|
# Pyrogram is free software: you can redistribute it and/or modify
|
|
|
|
# it under the terms of the GNU Lesser General Public License as published
|
|
|
|
# by the Free Software Foundation, either version 3 of the License, or
|
|
|
|
# (at your option) any later version.
|
|
|
|
#
|
|
|
|
# Pyrogram is distributed in the hope that it will be useful,
|
|
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
# GNU Lesser General Public License for more details.
|
|
|
|
#
|
|
|
|
# You should have received a copy of the GNU Lesser General Public License
|
|
|
|
# along with Pyrogram. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
|
|
|
import logging
|
|
|
|
import threading
|
2018-04-12 08:40:17 +00:00
|
|
|
import time
|
2017-12-05 11:41:07 +00:00
|
|
|
from datetime import timedelta, datetime
|
2017-12-09 01:21:23 +00:00
|
|
|
from hashlib import sha1, sha256
|
2017-12-05 11:41:07 +00:00
|
|
|
from io import BytesIO
|
|
|
|
from os import urandom
|
|
|
|
from queue import Queue
|
|
|
|
from threading import Event, Thread
|
|
|
|
|
2018-01-31 20:03:26 +00:00
|
|
|
import pyrogram
|
2017-12-05 11:41:07 +00:00
|
|
|
from pyrogram import __copyright__, __license__, __version__
|
|
|
|
from pyrogram.api import functions, types, core
|
2019-08-13 11:20:21 +00:00
|
|
|
from pyrogram.api.all import layer
|
2019-06-03 12:19:50 +00:00
|
|
|
from pyrogram.api.core import Message, TLObject, MsgContainer, Long, FutureSalt, Int
|
2017-12-05 11:41:07 +00:00
|
|
|
from pyrogram.connection import Connection
|
2018-01-28 00:44:38 +00:00
|
|
|
from pyrogram.crypto import AES, KDF
|
2019-03-25 10:10:46 +00:00
|
|
|
from pyrogram.errors import RPCError, InternalServerError, AuthKeyDuplicated
|
2018-06-13 11:37:35 +00:00
|
|
|
from .internals import MsgId, MsgFactory
|
2017-12-05 11:41:07 +00:00
|
|
|
|
2019-09-08 17:24:06 +00:00
|
|
|
log = logging.getLogger(__name__)
|
|
|
|
|
2017-12-05 11:41:07 +00:00
|
|
|
|
|
|
|
class Result:
|
|
|
|
def __init__(self):
|
|
|
|
self.value = None
|
|
|
|
self.event = Event()
|
|
|
|
|
|
|
|
|
|
|
|
class Session:
|
|
|
|
INITIAL_SALT = 0x616e67656c696361
|
2018-02-10 17:28:11 +00:00
|
|
|
NET_WORKERS = 1
|
2019-03-03 15:50:25 +00:00
|
|
|
START_TIMEOUT = 1
|
2018-04-12 06:29:39 +00:00
|
|
|
WAIT_TIMEOUT = 15
|
2017-12-05 11:41:07 +00:00
|
|
|
MAX_RETRIES = 5
|
|
|
|
ACKS_THRESHOLD = 8
|
|
|
|
PING_INTERVAL = 5
|
|
|
|
|
2017-12-09 16:09:39 +00:00
|
|
|
notice_displayed = False
|
|
|
|
|
2018-02-22 00:28:46 +00:00
|
|
|
BAD_MSG_DESCRIPTION = {
|
|
|
|
16: "[16] msg_id too low, the client time has to be synchronized",
|
|
|
|
17: "[17] msg_id too high, the client time has to be synchronized",
|
|
|
|
18: "[18] incorrect two lower order msg_id bits, the server expects client message msg_id to be divisible by 4",
|
|
|
|
19: "[19] container msg_id is the same as msg_id of a previously received message",
|
|
|
|
20: "[20] message too old, it cannot be verified by the server",
|
|
|
|
32: "[32] msg_seqno too low",
|
|
|
|
33: "[33] msg_seqno too high",
|
|
|
|
34: "[34] an even msg_seqno expected, but odd received",
|
|
|
|
35: "[35] odd msg_seqno expected, but even received",
|
|
|
|
48: "[48] incorrect server salt",
|
|
|
|
64: "[64] invalid container"
|
|
|
|
}
|
|
|
|
|
2019-06-19 14:01:23 +00:00
|
|
|
def __init__(
|
|
|
|
self,
|
|
|
|
client: pyrogram,
|
|
|
|
dc_id: int,
|
|
|
|
auth_key: bytes,
|
|
|
|
is_media: bool = False,
|
|
|
|
is_cdn: bool = False
|
|
|
|
):
|
2017-12-09 16:09:39 +00:00
|
|
|
if not Session.notice_displayed:
|
|
|
|
print("Pyrogram v{}, {}".format(__version__, __copyright__))
|
|
|
|
print("Licensed under the terms of the " + __license__, end="\n\n")
|
|
|
|
Session.notice_displayed = True
|
2017-12-05 11:41:07 +00:00
|
|
|
|
2018-06-24 16:26:11 +00:00
|
|
|
self.client = client
|
2018-05-24 19:19:57 +00:00
|
|
|
self.dc_id = dc_id
|
2018-06-24 16:26:11 +00:00
|
|
|
self.auth_key = auth_key
|
|
|
|
self.is_media = is_media
|
2018-02-08 18:48:01 +00:00
|
|
|
self.is_cdn = is_cdn
|
2017-12-05 11:41:07 +00:00
|
|
|
|
2018-05-24 19:19:57 +00:00
|
|
|
self.connection = None
|
|
|
|
|
2017-12-05 11:41:07 +00:00
|
|
|
self.auth_key_id = sha1(auth_key).digest()[-8:]
|
|
|
|
|
2018-02-18 16:31:00 +00:00
|
|
|
self.session_id = Long(MsgId())
|
|
|
|
self.msg_factory = MsgFactory()
|
2017-12-05 11:41:07 +00:00
|
|
|
|
|
|
|
self.current_salt = None
|
|
|
|
|
|
|
|
self.pending_acks = set()
|
|
|
|
|
|
|
|
self.recv_queue = Queue()
|
|
|
|
self.results = {}
|
|
|
|
|
|
|
|
self.ping_thread = None
|
|
|
|
self.ping_thread_event = Event()
|
|
|
|
|
|
|
|
self.next_salt_thread = None
|
|
|
|
self.next_salt_thread_event = Event()
|
|
|
|
|
2018-04-29 18:30:32 +00:00
|
|
|
self.net_worker_list = []
|
|
|
|
|
2017-12-05 11:41:07 +00:00
|
|
|
self.is_connected = Event()
|
|
|
|
|
|
|
|
def start(self):
|
|
|
|
while True:
|
2019-06-19 14:01:23 +00:00
|
|
|
self.connection = Connection(
|
|
|
|
self.dc_id,
|
2019-09-14 17:57:20 +00:00
|
|
|
self.client.storage.test_mode(),
|
2019-06-19 14:01:23 +00:00
|
|
|
self.client.ipv6,
|
|
|
|
self.client.proxy
|
|
|
|
)
|
2018-05-24 19:19:57 +00:00
|
|
|
|
2017-12-05 11:41:07 +00:00
|
|
|
try:
|
|
|
|
self.connection.connect()
|
|
|
|
|
2018-02-08 18:48:01 +00:00
|
|
|
for i in range(self.NET_WORKERS):
|
2018-04-29 18:30:32 +00:00
|
|
|
self.net_worker_list.append(
|
|
|
|
Thread(
|
|
|
|
target=self.net_worker,
|
|
|
|
name="NetWorker#{}".format(i + 1)
|
|
|
|
)
|
|
|
|
)
|
|
|
|
|
|
|
|
self.net_worker_list[-1].start()
|
2017-12-05 11:41:07 +00:00
|
|
|
|
|
|
|
Thread(target=self.recv, name="RecvThread").start()
|
|
|
|
|
|
|
|
self.current_salt = FutureSalt(0, 0, self.INITIAL_SALT)
|
2019-03-03 15:50:25 +00:00
|
|
|
self.current_salt = FutureSalt(
|
|
|
|
0, 0,
|
|
|
|
self._send(
|
2019-03-16 15:50:40 +00:00
|
|
|
functions.Ping(ping_id=0),
|
2019-03-03 15:50:25 +00:00
|
|
|
timeout=self.START_TIMEOUT
|
|
|
|
).new_server_salt
|
|
|
|
)
|
2019-03-16 15:50:40 +00:00
|
|
|
self.current_salt = self._send(functions.GetFutureSalts(num=1), timeout=self.START_TIMEOUT).salts[0]
|
2017-12-05 11:41:07 +00:00
|
|
|
|
|
|
|
self.next_salt_thread = Thread(target=self.next_salt, name="NextSaltThread")
|
|
|
|
self.next_salt_thread.start()
|
|
|
|
|
2017-12-19 10:38:15 +00:00
|
|
|
if not self.is_cdn:
|
2018-03-15 11:03:02 +00:00
|
|
|
self._send(
|
2017-12-19 10:38:15 +00:00
|
|
|
functions.InvokeWithLayer(
|
2019-03-16 15:50:40 +00:00
|
|
|
layer=layer,
|
|
|
|
query=functions.InitConnection(
|
2018-06-24 16:26:11 +00:00
|
|
|
api_id=self.client.api_id,
|
2018-06-24 16:47:49 +00:00
|
|
|
app_version=self.client.app_version,
|
|
|
|
device_model=self.client.device_model,
|
|
|
|
system_version=self.client.system_version,
|
2018-06-26 22:42:32 +00:00
|
|
|
system_lang_code=self.client.lang_code,
|
2018-06-24 16:47:49 +00:00
|
|
|
lang_code=self.client.lang_code,
|
2018-06-24 16:26:11 +00:00
|
|
|
lang_pack="",
|
|
|
|
query=functions.help.GetConfig(),
|
2017-12-19 10:38:15 +00:00
|
|
|
)
|
2019-03-03 15:50:25 +00:00
|
|
|
),
|
|
|
|
timeout=self.START_TIMEOUT
|
2018-03-15 11:03:02 +00:00
|
|
|
)
|
2017-12-05 11:41:07 +00:00
|
|
|
|
|
|
|
self.ping_thread = Thread(target=self.ping, name="PingThread")
|
|
|
|
self.ping_thread.start()
|
|
|
|
|
2019-09-08 17:24:06 +00:00
|
|
|
log.info("Session initialized: Layer {}".format(layer))
|
|
|
|
log.info("Device: {} - {}".format(self.client.device_model, self.client.app_version))
|
|
|
|
log.info("System: {} ({})".format(self.client.system_version, self.client.lang_code.upper()))
|
2018-08-28 10:39:14 +00:00
|
|
|
|
2018-06-27 22:16:12 +00:00
|
|
|
except AuthKeyDuplicated as e:
|
|
|
|
self.stop()
|
|
|
|
raise e
|
2019-03-25 10:10:46 +00:00
|
|
|
except (OSError, TimeoutError, RPCError):
|
2017-12-05 11:41:07 +00:00
|
|
|
self.stop()
|
2018-04-12 06:30:52 +00:00
|
|
|
except Exception as e:
|
|
|
|
self.stop()
|
|
|
|
raise e
|
2017-12-05 11:41:07 +00:00
|
|
|
else:
|
|
|
|
break
|
|
|
|
|
|
|
|
self.is_connected.set()
|
|
|
|
|
2019-09-08 17:24:06 +00:00
|
|
|
log.debug("Session started")
|
2017-12-05 11:41:07 +00:00
|
|
|
|
|
|
|
def stop(self):
|
|
|
|
self.is_connected.clear()
|
2017-12-23 22:43:20 +00:00
|
|
|
|
2017-12-05 11:41:07 +00:00
|
|
|
self.ping_thread_event.set()
|
|
|
|
self.next_salt_thread_event.set()
|
2017-12-23 22:43:20 +00:00
|
|
|
|
2017-12-26 00:19:38 +00:00
|
|
|
if self.ping_thread is not None:
|
|
|
|
self.ping_thread.join()
|
|
|
|
|
|
|
|
if self.next_salt_thread is not None:
|
|
|
|
self.next_salt_thread.join()
|
2017-12-23 22:43:20 +00:00
|
|
|
|
|
|
|
self.ping_thread_event.clear()
|
|
|
|
self.next_salt_thread_event.clear()
|
|
|
|
|
2017-12-05 11:41:07 +00:00
|
|
|
self.connection.close()
|
|
|
|
|
2018-02-08 18:48:01 +00:00
|
|
|
for i in range(self.NET_WORKERS):
|
2017-12-05 11:41:07 +00:00
|
|
|
self.recv_queue.put(None)
|
|
|
|
|
2018-04-29 18:30:32 +00:00
|
|
|
for i in self.net_worker_list:
|
|
|
|
i.join()
|
|
|
|
|
|
|
|
self.net_worker_list.clear()
|
2018-09-03 14:35:22 +00:00
|
|
|
self.recv_queue.queue.clear()
|
2018-04-29 18:30:32 +00:00
|
|
|
|
2018-03-16 10:18:16 +00:00
|
|
|
for i in self.results.values():
|
|
|
|
i.event.set()
|
|
|
|
|
2018-06-24 17:29:12 +00:00
|
|
|
if not self.is_media and callable(self.client.disconnect_handler):
|
2018-05-23 12:27:17 +00:00
|
|
|
try:
|
|
|
|
self.client.disconnect_handler(self.client)
|
|
|
|
except Exception as e:
|
2019-09-08 17:24:06 +00:00
|
|
|
log.error(e, exc_info=True)
|
2018-05-23 12:27:17 +00:00
|
|
|
|
2019-09-08 17:24:06 +00:00
|
|
|
log.debug("Session stopped")
|
2017-12-05 11:41:07 +00:00
|
|
|
|
|
|
|
def restart(self):
|
|
|
|
self.stop()
|
|
|
|
self.start()
|
|
|
|
|
2017-12-18 14:16:21 +00:00
|
|
|
def pack(self, message: Message):
|
2017-12-09 01:21:23 +00:00
|
|
|
data = Long(self.current_salt.salt) + self.session_id + message.write()
|
|
|
|
padding = urandom(-(len(data) + 12) % 16 + 12)
|
|
|
|
|
|
|
|
# 88 = 88 + 0 (outgoing message)
|
|
|
|
msg_key_large = sha256(self.auth_key[88: 88 + 32] + data + padding).digest()
|
|
|
|
msg_key = msg_key_large[8:24]
|
2017-12-18 14:16:21 +00:00
|
|
|
aes_key, aes_iv = KDF(self.auth_key, msg_key, True)
|
2017-12-09 01:21:23 +00:00
|
|
|
|
2018-05-18 12:15:35 +00:00
|
|
|
return self.auth_key_id + msg_key + AES.ige256_encrypt(data + padding, aes_key, aes_iv)
|
2017-12-09 01:21:23 +00:00
|
|
|
|
2017-12-18 14:16:21 +00:00
|
|
|
def unpack(self, b: BytesIO) -> Message:
|
2017-12-09 01:21:23 +00:00
|
|
|
assert b.read(8) == self.auth_key_id, b.getvalue()
|
|
|
|
|
|
|
|
msg_key = b.read(16)
|
2017-12-18 14:16:21 +00:00
|
|
|
aes_key, aes_iv = KDF(self.auth_key, msg_key, False)
|
2018-05-18 12:15:35 +00:00
|
|
|
data = BytesIO(AES.ige256_decrypt(b.read(), aes_key, aes_iv))
|
2017-12-09 01:21:23 +00:00
|
|
|
data.read(8)
|
|
|
|
|
|
|
|
# https://core.telegram.org/mtproto/security_guidelines#checking-session-id
|
|
|
|
assert data.read(8) == self.session_id
|
|
|
|
|
|
|
|
message = Message.read(data)
|
|
|
|
|
|
|
|
# https://core.telegram.org/mtproto/security_guidelines#checking-sha256-hash-value-of-msg-key
|
|
|
|
# https://core.telegram.org/mtproto/security_guidelines#checking-message-length
|
|
|
|
# 96 = 88 + 8 (incoming message)
|
|
|
|
assert msg_key == sha256(self.auth_key[96:96 + 32] + data.getvalue()).digest()[8:24]
|
|
|
|
|
|
|
|
# https://core.telegram.org/mtproto/security_guidelines#checking-msg-id
|
|
|
|
# TODO: check for lower msg_ids
|
|
|
|
assert message.msg_id % 2 != 0
|
|
|
|
|
|
|
|
return message
|
|
|
|
|
2018-02-08 17:56:40 +00:00
|
|
|
def net_worker(self):
|
2017-12-05 11:41:07 +00:00
|
|
|
name = threading.current_thread().name
|
2019-09-08 17:24:06 +00:00
|
|
|
log.debug("{} started".format(name))
|
2017-12-05 11:41:07 +00:00
|
|
|
|
|
|
|
while True:
|
|
|
|
packet = self.recv_queue.get()
|
|
|
|
|
|
|
|
if packet is None:
|
|
|
|
break
|
|
|
|
|
|
|
|
try:
|
2018-05-06 12:55:41 +00:00
|
|
|
data = self.unpack(BytesIO(packet))
|
|
|
|
|
|
|
|
messages = (
|
|
|
|
data.body.messages
|
|
|
|
if isinstance(data.body, MsgContainer)
|
|
|
|
else [data]
|
|
|
|
)
|
|
|
|
|
2019-09-08 17:24:06 +00:00
|
|
|
log.debug(data)
|
2018-05-06 12:55:41 +00:00
|
|
|
|
|
|
|
for msg in messages:
|
|
|
|
if msg.seq_no % 2 != 0:
|
|
|
|
if msg.msg_id in self.pending_acks:
|
|
|
|
continue
|
|
|
|
else:
|
|
|
|
self.pending_acks.add(msg.msg_id)
|
|
|
|
|
|
|
|
if isinstance(msg.body, (types.MsgDetailedInfo, types.MsgNewDetailedInfo)):
|
|
|
|
self.pending_acks.add(msg.body.answer_msg_id)
|
|
|
|
continue
|
|
|
|
|
|
|
|
if isinstance(msg.body, types.NewSessionCreated):
|
|
|
|
continue
|
|
|
|
|
|
|
|
msg_id = None
|
|
|
|
|
|
|
|
if isinstance(msg.body, (types.BadMsgNotification, types.BadServerSalt)):
|
|
|
|
msg_id = msg.body.bad_msg_id
|
|
|
|
elif isinstance(msg.body, (core.FutureSalts, types.RpcResult)):
|
|
|
|
msg_id = msg.body.req_msg_id
|
|
|
|
elif isinstance(msg.body, types.Pong):
|
|
|
|
msg_id = msg.body.msg_id
|
|
|
|
else:
|
|
|
|
if self.client is not None:
|
|
|
|
self.client.updates_queue.put(msg.body)
|
|
|
|
|
|
|
|
if msg_id in self.results:
|
|
|
|
self.results[msg_id].value = getattr(msg.body, "result", msg.body)
|
|
|
|
self.results[msg_id].event.set()
|
|
|
|
|
|
|
|
if len(self.pending_acks) >= self.ACKS_THRESHOLD:
|
2019-09-08 17:24:06 +00:00
|
|
|
log.info("Send {} acks".format(len(self.pending_acks)))
|
2018-05-06 12:55:41 +00:00
|
|
|
|
|
|
|
try:
|
2019-03-16 15:50:40 +00:00
|
|
|
self._send(types.MsgsAck(msg_ids=list(self.pending_acks)), False)
|
2018-05-06 12:55:41 +00:00
|
|
|
except (OSError, TimeoutError):
|
|
|
|
pass
|
|
|
|
else:
|
|
|
|
self.pending_acks.clear()
|
2017-12-05 11:41:07 +00:00
|
|
|
except Exception as e:
|
2019-09-08 17:24:06 +00:00
|
|
|
log.error(e, exc_info=True)
|
2017-12-05 11:41:07 +00:00
|
|
|
|
2019-09-08 17:24:06 +00:00
|
|
|
log.debug("{} stopped".format(name))
|
2017-12-05 11:41:07 +00:00
|
|
|
|
|
|
|
def ping(self):
|
2019-09-08 17:24:06 +00:00
|
|
|
log.debug("PingThread started")
|
2017-12-05 11:41:07 +00:00
|
|
|
|
|
|
|
while True:
|
|
|
|
self.ping_thread_event.wait(self.PING_INTERVAL)
|
|
|
|
|
|
|
|
if self.ping_thread_event.is_set():
|
|
|
|
break
|
|
|
|
|
|
|
|
try:
|
2018-04-12 06:29:39 +00:00
|
|
|
self._send(functions.PingDelayDisconnect(
|
2019-03-16 15:50:40 +00:00
|
|
|
ping_id=0, disconnect_delay=self.WAIT_TIMEOUT + 10
|
2018-04-12 06:29:39 +00:00
|
|
|
), False)
|
2019-03-25 10:10:46 +00:00
|
|
|
except (OSError, TimeoutError, RPCError):
|
2017-12-05 11:41:07 +00:00
|
|
|
pass
|
|
|
|
|
2019-09-08 17:24:06 +00:00
|
|
|
log.debug("PingThread stopped")
|
2017-12-05 11:41:07 +00:00
|
|
|
|
|
|
|
def next_salt(self):
|
2019-09-08 17:24:06 +00:00
|
|
|
log.debug("NextSaltThread started")
|
2017-12-05 11:41:07 +00:00
|
|
|
|
|
|
|
while True:
|
|
|
|
now = datetime.now()
|
|
|
|
|
|
|
|
# Seconds to wait until middle-overlap, which is
|
|
|
|
# 15 minutes before/after the current/next salt end/start time
|
2019-05-31 14:36:20 +00:00
|
|
|
valid_until = datetime.fromtimestamp(self.current_salt.valid_until)
|
|
|
|
dt = (valid_until - now).total_seconds() - 900
|
2017-12-05 11:41:07 +00:00
|
|
|
|
2019-09-08 17:24:06 +00:00
|
|
|
log.debug("Current salt: {} | Next salt in {:.0f}m {:.0f}s ({})".format(
|
2017-12-05 11:41:07 +00:00
|
|
|
self.current_salt.salt,
|
|
|
|
dt // 60,
|
|
|
|
dt % 60,
|
|
|
|
now + timedelta(seconds=dt)
|
|
|
|
))
|
|
|
|
|
|
|
|
self.next_salt_thread_event.wait(dt)
|
|
|
|
|
|
|
|
if self.next_salt_thread_event.is_set():
|
|
|
|
break
|
|
|
|
|
|
|
|
try:
|
2019-03-16 15:50:40 +00:00
|
|
|
self.current_salt = self._send(functions.GetFutureSalts(num=1)).salts[0]
|
2019-03-25 10:10:46 +00:00
|
|
|
except (OSError, TimeoutError, RPCError):
|
2017-12-05 11:41:07 +00:00
|
|
|
self.connection.close()
|
|
|
|
break
|
|
|
|
|
2019-09-08 17:24:06 +00:00
|
|
|
log.debug("NextSaltThread stopped")
|
2017-12-05 11:41:07 +00:00
|
|
|
|
|
|
|
def recv(self):
|
2019-09-08 17:24:06 +00:00
|
|
|
log.debug("RecvThread started")
|
2017-12-05 11:41:07 +00:00
|
|
|
|
|
|
|
while True:
|
|
|
|
packet = self.connection.recv()
|
|
|
|
|
2018-02-18 19:33:33 +00:00
|
|
|
if packet is None or len(packet) == 4:
|
|
|
|
if packet:
|
2019-09-08 17:24:06 +00:00
|
|
|
log.warning("Server sent \"{}\"".format(Int.read(BytesIO(packet))))
|
2018-02-18 19:33:33 +00:00
|
|
|
|
2017-12-05 11:41:07 +00:00
|
|
|
if self.is_connected.is_set():
|
|
|
|
Thread(target=self.restart, name="RestartThread").start()
|
|
|
|
break
|
|
|
|
|
|
|
|
self.recv_queue.put(packet)
|
|
|
|
|
2019-09-08 17:24:06 +00:00
|
|
|
log.debug("RecvThread stopped")
|
2017-12-05 11:41:07 +00:00
|
|
|
|
2019-06-03 12:19:50 +00:00
|
|
|
def _send(self, data: TLObject, wait_response: bool = True, timeout: float = WAIT_TIMEOUT):
|
2017-12-05 11:41:07 +00:00
|
|
|
message = self.msg_factory(data)
|
|
|
|
msg_id = message.msg_id
|
|
|
|
|
|
|
|
if wait_response:
|
|
|
|
self.results[msg_id] = Result()
|
|
|
|
|
2017-12-18 14:16:21 +00:00
|
|
|
payload = self.pack(message)
|
2017-12-05 11:41:07 +00:00
|
|
|
|
|
|
|
try:
|
|
|
|
self.connection.send(payload)
|
|
|
|
except OSError as e:
|
|
|
|
self.results.pop(msg_id, None)
|
|
|
|
raise e
|
|
|
|
|
|
|
|
if wait_response:
|
2018-06-24 15:47:29 +00:00
|
|
|
self.results[msg_id].event.wait(timeout)
|
2017-12-05 11:41:07 +00:00
|
|
|
result = self.results.pop(msg_id).value
|
|
|
|
|
|
|
|
if result is None:
|
|
|
|
raise TimeoutError
|
|
|
|
elif isinstance(result, types.RpcError):
|
2020-02-01 14:19:05 +00:00
|
|
|
if isinstance(data, (functions.InvokeWithoutUpdates, functions.InvokeWithTakeout)):
|
|
|
|
data = data.query
|
|
|
|
|
2019-03-25 10:10:46 +00:00
|
|
|
RPCError.raise_it(result, type(data))
|
2018-02-22 00:28:46 +00:00
|
|
|
elif isinstance(result, types.BadMsgNotification):
|
|
|
|
raise Exception(self.BAD_MSG_DESCRIPTION.get(
|
|
|
|
result.error_code,
|
|
|
|
"Error code {}".format(result.error_code)
|
|
|
|
))
|
2017-12-05 11:41:07 +00:00
|
|
|
else:
|
|
|
|
return result
|
|
|
|
|
2019-06-03 12:19:50 +00:00
|
|
|
def send(self, data: TLObject, retries: int = MAX_RETRIES, timeout: float = WAIT_TIMEOUT):
|
2018-04-18 13:17:46 +00:00
|
|
|
self.is_connected.wait(self.WAIT_TIMEOUT)
|
2017-12-05 11:41:07 +00:00
|
|
|
|
2018-04-18 13:17:46 +00:00
|
|
|
try:
|
2018-06-24 15:47:29 +00:00
|
|
|
return self._send(data, timeout=timeout)
|
2018-04-18 13:17:46 +00:00
|
|
|
except (OSError, TimeoutError, InternalServerError) as e:
|
|
|
|
if retries == 0:
|
|
|
|
raise e from None
|
|
|
|
|
2019-07-25 09:15:56 +00:00
|
|
|
(log.warning if retries < 2 else log.info)(
|
2019-08-13 11:20:21 +00:00
|
|
|
"[{}] Retrying {} due to {}".format(
|
2019-07-25 09:15:56 +00:00
|
|
|
Session.MAX_RETRIES - retries + 1,
|
2019-08-13 11:20:21 +00:00
|
|
|
data.QUALNAME, e))
|
2018-04-18 13:17:46 +00:00
|
|
|
|
|
|
|
time.sleep(0.5)
|
2018-06-24 15:47:29 +00:00
|
|
|
return self.send(data, retries - 1, timeout)
|