tdlight/td/telegram/SecretChatActor.h

715 lines
26 KiB
C
Raw Normal View History

//
2021-01-01 13:57:46 +01:00
// Copyright Aliaksei Levin (levlam@telegram.org), Arseny Smirnov (arseny30@gmail.com) 2014-2021
//
// Distributed under the Boost Software License, Version 1.0. (See accompanying
// file LICENSE_1_0.txt or copy at http://www.boost.org/LICENSE_1_0.txt)
//
#pragma once
#include "td/telegram/DhConfig.h"
2021-08-01 05:17:51 +02:00
#include "td/telegram/EncryptedFile.h"
#include "td/telegram/FolderId.h"
#include "td/telegram/logevent/SecretChatEvent.h"
#include "td/telegram/MessageId.h"
#include "td/telegram/net/NetQuery.h"
2021-04-09 01:35:50 +02:00
#include "td/telegram/secret_api.h"
#include "td/telegram/SecretChatDb.h"
#include "td/telegram/SecretChatId.h"
2021-07-05 04:42:37 +02:00
#include "td/telegram/SecretChatLayer.h"
#include "td/telegram/telegram_api.h"
#include "td/telegram/UserId.h"
#include "td/mtproto/AuthKey.h"
2021-07-05 20:20:07 +02:00
#include "td/mtproto/DhCallback.h"
#include "td/mtproto/DhHandshake.h"
#include "td/actor/actor.h"
#include "td/actor/PromiseFuture.h"
#include "td/utils/buffer.h"
#include "td/utils/ChangesProcessor.h"
#include "td/utils/common.h"
#include "td/utils/Container.h"
#include "td/utils/format.h"
#include "td/utils/port/Clocks.h"
#include "td/utils/Slice.h"
#include "td/utils/Status.h"
#include "td/utils/StringBuilder.h"
#include "td/utils/Time.h"
#include "td/utils/tl_helpers.h"
#include <functional>
#include <map>
#include <memory>
#include <tuple>
#include <utility>
namespace td {
class BinlogInterface;
class NetQueryCreator;
class SecretChatActor final : public NetQueryCallback {
public:
class Context {
public:
Context() = default;
Context(const Context &) = delete;
Context &operator=(const Context &) = delete;
virtual ~Context() = default;
virtual mtproto::DhCallback *dh_callback() = 0;
virtual BinlogInterface *binlog() = 0;
virtual SecretChatDb *secret_chat_db() = 0;
virtual NetQueryCreator &net_query_creator() = 0;
virtual std::shared_ptr<DhConfig> dh_config() = 0;
virtual void set_dh_config(std::shared_ptr<DhConfig> dh_config) = 0;
virtual bool get_config_option_boolean(const string &name) const = 0;
virtual int32 unix_time() = 0;
virtual bool close_flag() = 0;
// We don't want to expose the whole NetQueryDispatcher, MessagesManager and ContactsManager.
// So it is more clear which parts of MessagesManager are really used. And it is much easier to create tests.
virtual void send_net_query(NetQueryPtr query, ActorShared<NetQueryCallback> callback, bool ordered) = 0;
virtual void on_update_secret_chat(int64 access_hash, UserId user_id, SecretChatState state, bool is_outbound,
int32 ttl, int32 date, string key_hash, int32 layer,
FolderId initial_folder_id) = 0;
// Promise must be set only after the update is processed.
//
// For example, one may set promise, after update was sent to binlog. It is ok, because SecretChatsActor will delete
// this update through binlog too. So it wouldn't be deleted before update is saved.
// inbound messages
2021-08-01 05:17:51 +02:00
virtual void on_inbound_message(UserId user_id, MessageId message_id, int32 date, unique_ptr<EncryptedFile> file,
tl_object_ptr<secret_api::decryptedMessage> message, Promise<> promise) = 0;
virtual void on_delete_messages(std::vector<int64> random_id, Promise<> promise) = 0;
virtual void on_flush_history(bool remove_from_dialog_list, MessageId message_id, Promise<> promise) = 0;
virtual void on_read_message(int64 random_id, Promise<> promise) = 0;
virtual void on_screenshot_taken(UserId user_id, MessageId message_id, int32 date, int64 random_id,
Promise<> promise) = 0;
virtual void on_set_ttl(UserId user_id, MessageId message_id, int32 date, int32 ttl, int64 random_id,
Promise<> promise) = 0;
// outbound messages
virtual void on_send_message_ack(int64 random_id) = 0;
2021-08-01 05:17:51 +02:00
virtual void on_send_message_ok(int64 random_id, MessageId message_id, int32 date, unique_ptr<EncryptedFile> file,
Promise<> promise) = 0;
virtual void on_send_message_error(int64 random_id, Status error, Promise<> promise) = 0;
};
SecretChatActor(int32 id, unique_ptr<Context> context, bool can_be_empty);
// First query to new chat must be one of these two
void update_chat(telegram_api::object_ptr<telegram_api::EncryptedChat> chat);
void create_chat(UserId user_id, int64 user_access_hash, int32 random_id, Promise<SecretChatId> promise);
void cancel_chat(bool delete_history, bool is_already_discarded, Promise<> promise);
// Inbound messages
// Logevent is created by SecretChatsManager, because it must contain qts
void add_inbound_message(unique_ptr<log_event::InboundSecretMessage> message);
// Outbound messages
// Promise will be set just after corresponding log event will be SENT to binlog.
void send_message(tl_object_ptr<secret_api::DecryptedMessage> message,
tl_object_ptr<telegram_api::InputEncryptedFile> file, Promise<> promise);
void send_message_action(tl_object_ptr<secret_api::SendMessageAction> action);
void send_read_history(int32 date,
Promise<>); // no binlog event. TODO: Promise will be set after the net query is sent
void send_open_message(int64 random_id, Promise<>);
void delete_message(int64 random_id, Promise<> promise);
void delete_messages(std::vector<int64> random_ids, Promise<> promise);
void delete_all_messages(Promise<> promise);
void notify_screenshot_taken(Promise<> promise);
void send_set_ttl_message(int32 ttl, int64 random_id, Promise<> promise);
// Binlog replay interface
void replay_inbound_message(unique_ptr<log_event::InboundSecretMessage> message);
void replay_outbound_message(unique_ptr<log_event::OutboundSecretMessage> message);
void replay_close_chat(unique_ptr<log_event::CloseSecretChat> event);
void replay_create_chat(unique_ptr<log_event::CreateSecretChat> event);
void binlog_replay_finish();
private:
enum class State : int32 { Empty, SendRequest, SendAccept, WaitRequestResponse, WaitAcceptResponse, Ready, Closed };
static constexpr int32 MAX_RESEND_COUNT = 1000;
// We have git state that should be synchronized with the database.
// It is splitted into several parts because:
// 1. Some parts are BIG (auth_key, for example) and are rarely updated.
// 2. Other are frequently updated, so probably should be as small as possible.
// 3. Some parts must be updated atomically.
struct SeqNoState {
int32 message_id = 0;
int32 my_in_seq_no = 0;
int32 my_out_seq_no = 0;
int32 his_in_seq_no = 0;
int32 his_layer = 0;
int32 resend_end_seq_no = -1;
static Slice key() {
return Slice("state");
}
template <class StorerT>
void store(StorerT &storer) const {
storer.store_int(message_id | HAS_LAYER);
storer.store_int(my_in_seq_no);
storer.store_int(my_out_seq_no);
storer.store_int(his_in_seq_no);
storer.store_int(resend_end_seq_no);
storer.store_int(his_layer);
}
template <class ParserT>
void parse(ParserT &parser) {
message_id = parser.fetch_int();
my_in_seq_no = parser.fetch_int();
my_out_seq_no = parser.fetch_int();
his_in_seq_no = parser.fetch_int();
resend_end_seq_no = parser.fetch_int();
bool has_layer = (message_id & HAS_LAYER) != 0;
if (has_layer) {
message_id &= static_cast<int32>(~HAS_LAYER);
his_layer = parser.fetch_int();
}
}
static constexpr uint32 HAS_LAYER = 1u << 31;
};
struct ConfigState {
int32 his_layer = 8;
int32 my_layer = 8;
int32 ttl = 0;
static Slice key() {
return Slice("config");
}
template <class StorerT>
void store(StorerT &storer) const {
storer.store_int(his_layer | HAS_FLAGS);
storer.store_int(ttl);
storer.store_int(my_layer);
//for future usage
BEGIN_STORE_FLAGS();
END_STORE_FLAGS();
}
template <class ParserT>
void parse(ParserT &parser) {
his_layer = parser.fetch_int();
ttl = parser.fetch_int();
bool has_flags = (his_layer & HAS_FLAGS) != 0;
if (has_flags) {
his_layer &= static_cast<int32>(~HAS_FLAGS);
my_layer = parser.fetch_int();
// for future usage
BEGIN_PARSE_FLAGS();
END_PARSE_FLAGS();
}
}
static constexpr uint32 HAS_FLAGS = 1u << 31;
};
// PfsAction
struct PfsState {
enum State : int32 {
Empty,
WaitSendRequest,
SendRequest,
WaitRequestResponse,
WaitSendAccept,
SendAccept,
WaitAcceptResponse,
WaitSendCommit,
SendCommit
} state = Empty;
enum Flags : int32 { CanForgetOtherKey = 1 };
mtproto::AuthKey auth_key;
mtproto::AuthKey other_auth_key;
bool can_forget_other_key = true;
int32 message_id = 0; // to skip old actions
int32 wait_message_id = 0;
int64 exchange_id = 0;
int32 last_message_id = 0;
double last_timestamp = 0;
int32 last_out_seq_no = 0;
mtproto::DhHandshake handshake;
static Slice key() {
return Slice("pfs_state");
}
template <class StorerT>
void store(StorerT &storer) const {
int32 flags = 0;
if (can_forget_other_key) {
flags |= CanForgetOtherKey;
}
storer.store_int(flags);
storer.store_int(state);
auth_key.store(storer);
other_auth_key.store(storer);
storer.store_int(message_id);
storer.store_long(exchange_id);
storer.store_int(last_message_id);
storer.store_long(static_cast<int64>((last_timestamp - Time::now() + Clocks::system()) * 1000000));
storer.store_int(last_out_seq_no);
handshake.store(storer);
}
template <class ParserT>
void parse(ParserT &parser) {
int32 flags = parser.fetch_int();
can_forget_other_key = (flags & CanForgetOtherKey) != 0;
state = static_cast<State>(parser.fetch_int());
auth_key.parse(parser);
other_auth_key.parse(parser);
message_id = parser.fetch_int();
exchange_id = parser.fetch_long();
last_message_id = parser.fetch_int();
last_timestamp = static_cast<double>(parser.fetch_long()) / 1000000 - Clocks::system() + Time::now();
if (last_timestamp > Time::now_cached()) {
last_timestamp = Time::now_cached();
}
last_out_seq_no = parser.fetch_int();
handshake.parse(parser);
}
};
friend StringBuilder &operator<<(StringBuilder &sb, const PfsState &state) {
return sb << "PfsState["
<< tag("state",
[&] {
switch (state.state) {
case PfsState::Empty:
return "Empty";
case PfsState::WaitSendRequest:
return "WaitSendRequest";
case PfsState::SendRequest:
return "SendRequest";
case PfsState::WaitRequestResponse:
return "WaitRequestResponse";
case PfsState::WaitSendAccept:
return "WaitSendAccept";
case PfsState::SendAccept:
return "SendAccept";
case PfsState::WaitAcceptResponse:
return "WaitAcceptResponse";
case PfsState::WaitSendCommit:
return "WaitSendCommit";
case PfsState::SendCommit:
return "SendCommit";
}
return "UNKNOWN";
}())
<< tag("message_id", state.message_id) << tag("auth_key", format::as_hex(state.auth_key.id()))
<< tag("last_message_id", state.last_message_id)
<< tag("other_auth_key", format::as_hex(state.other_auth_key.id()))
<< tag("can_forget", state.can_forget_other_key) << "]";
}
PfsState pfs_state_;
bool pfs_state_changed_ = false;
void on_outbound_action(secret_api::decryptedMessageActionSetMessageTTL &set_ttl);
void on_outbound_action(secret_api::decryptedMessageActionReadMessages &read_messages);
void on_outbound_action(secret_api::decryptedMessageActionDeleteMessages &delete_messages);
void on_outbound_action(secret_api::decryptedMessageActionScreenshotMessages &screenshot);
void on_outbound_action(secret_api::decryptedMessageActionFlushHistory &flush_history);
void on_outbound_action(secret_api::decryptedMessageActionResend &resend);
void on_outbound_action(secret_api::decryptedMessageActionNotifyLayer &notify_layer);
void on_outbound_action(secret_api::decryptedMessageActionTyping &typing);
Status on_inbound_action(secret_api::decryptedMessageActionSetMessageTTL &set_ttl);
Status on_inbound_action(secret_api::decryptedMessageActionReadMessages &read_messages);
Status on_inbound_action(secret_api::decryptedMessageActionDeleteMessages &delete_messages);
Status on_inbound_action(secret_api::decryptedMessageActionScreenshotMessages &screenshot);
Status on_inbound_action(secret_api::decryptedMessageActionFlushHistory &screenshot);
Status on_inbound_action(secret_api::decryptedMessageActionResend &resend);
Status on_inbound_action(secret_api::decryptedMessageActionNotifyLayer &notify_layer);
Status on_inbound_action(secret_api::decryptedMessageActionTyping &typing);
// Perfect Forward Secrecy
void on_outbound_action(secret_api::decryptedMessageActionRequestKey &request_key);
void on_outbound_action(secret_api::decryptedMessageActionAcceptKey &accept_key);
void on_outbound_action(secret_api::decryptedMessageActionAbortKey &abort_key);
void on_outbound_action(secret_api::decryptedMessageActionCommitKey &commit_key);
void on_outbound_action(secret_api::decryptedMessageActionNoop &noop);
Status on_inbound_action(secret_api::decryptedMessageActionRequestKey &request_key);
Status on_inbound_action(secret_api::decryptedMessageActionAcceptKey &accept_key);
Status on_inbound_action(secret_api::decryptedMessageActionAbortKey &abort_key);
Status on_inbound_action(secret_api::decryptedMessageActionCommitKey &commit_key);
Status on_inbound_action(secret_api::decryptedMessageActionNoop &noop);
Status on_inbound_action(secret_api::DecryptedMessageAction &action, int32 message_id);
void on_outbound_action(secret_api::DecryptedMessageAction &action, int32 message_id);
void request_new_key();
struct AuthState {
State state = State::Empty;
int x = -1;
string key_hash;
int32 id = 0;
int64 access_hash = 0;
UserId user_id;
int64 user_access_hash = 0;
int32 random_id = 0;
int32 date = 0;
FolderId initial_folder_id;
DhConfig dh_config;
mtproto::DhHandshake handshake;
static Slice key() {
return Slice("auth_state");
}
template <class StorerT>
void store(StorerT &storer) const {
2021-09-03 11:27:59 +02:00
uint32 flags = 8;
bool has_date = date != 0;
bool has_key_hash = true;
bool has_initial_folder_id = initial_folder_id != FolderId();
if (has_date) {
flags |= 1;
}
if (has_key_hash) {
flags |= 2;
}
if (has_initial_folder_id) {
flags |= 4;
}
storer.store_int((flags << 8) | static_cast<int32>(state));
storer.store_int(x);
storer.store_int(id);
storer.store_long(access_hash);
2021-09-03 11:27:59 +02:00
storer.store_long(user_id.get());
storer.store_long(user_access_hash);
storer.store_int(random_id);
if (has_date) {
storer.store_int(date);
}
if (has_key_hash) {
storer.store_string(key_hash);
}
dh_config.store(storer);
if (state == State::SendRequest || state == State::WaitRequestResponse) {
handshake.store(storer);
}
if (has_initial_folder_id) {
initial_folder_id.store(storer);
}
}
template <class ParserT>
void parse(ParserT &parser) {
uint32 tmp = parser.fetch_int();
state = static_cast<State>(tmp & 255);
uint32 flags = tmp >> 8;
bool has_date = (flags & 1) != 0;
bool has_key_hash = (flags & 2) != 0;
bool has_initial_folder_id = (flags & 4) != 0;
2021-09-03 11:27:59 +02:00
bool has_64bit_user_id = (flags & 8) != 0;
x = parser.fetch_int();
id = parser.fetch_int();
access_hash = parser.fetch_long();
2021-09-03 11:27:59 +02:00
if (has_64bit_user_id) {
user_id = UserId(parser.fetch_long());
} else {
user_id = UserId(static_cast<int64>(parser.fetch_int()));
}
user_access_hash = parser.fetch_long();
random_id = parser.fetch_int();
if (has_date) {
date = parser.fetch_int();
}
if (has_key_hash) {
key_hash = parser.template fetch_string<std::string>();
}
dh_config.parse(parser);
if (state == State::SendRequest || state == State::WaitRequestResponse) {
handshake.parse(parser);
}
if (has_initial_folder_id) {
initial_folder_id.parse(parser);
}
}
};
std::shared_ptr<SecretChatDb> db_;
unique_ptr<Context> context_;
bool binlog_replay_finish_flag_ = false;
bool close_flag_ = false;
Promise<Unit> discard_encryption_promise_;
LogEvent::Id create_log_event_id_ = 0;
enum class QueryType : uint8 { DhConfig, EncryptedChat, Message, Ignore, DiscardEncryption, ReadHistory };
bool can_be_empty_;
AuthState auth_state_;
ConfigState config_state_;
// Turns out, that all changes should be made through StateChange.
//
// The problem is the time between the moment we made decision about change and
// the moment we actually apply the change to memory.
// We may accept some other change during that time, and there goes our problem
// The reason for the change may already be invalid. So we should somehow recheck change, that
// is already written to binlog, and apply it only if necessary.
// This is completly flawed.
// (A-start_save_to_binlog ----> B-start_save_to_binlog+change_memory ----> A-finish_save_to_binlog+surprise)
//
// Instead I suggest general solution that is already used with SeqNoState and qts
// 1. We APPLY CHANGE to memory immediately AFTER corresponding EVENT is SENT to the binlog.
// 2. We SEND CHANGE to database only after corresponding EVENT is SAVED to the binlog.
// 3. Then we are able to ERASE EVENT just AFTER the CHANGE is SAVED to the binlog.
//
// Actually the change will be saved to binlog too.
// So we can do it immediatelly after EVENT is SENT to the binlog, because SEND CHANGE and ERASE EVENT will be
// ordered automatically.
//
// We will use common ChangeProcessor for all changes (inside one SecretChatActor).
// So all changes will be saved in exactly the same order as they are applied.
template <class StateT>
class Change {
public:
Change() = default;
explicit operator bool() const {
return !data.empty();
}
explicit Change(const StateT &state) {
data = serialize(state);
message_id = state.message_id;
}
template <class StorerT>
void store(StorerT &storer) const {
// NB: rely that storer will the same as in serialize
storer.store_slice(data);
}
static Slice key() {
return StateT::key();
}
friend StringBuilder &operator<<(StringBuilder &sb, const Change<StateT> &change) {
if (change) {
StateT state;
unserialize(state, change.data).ensure();
return sb << state;
}
return sb;
}
int32 message_id;
private:
std::string data;
};
// SeqNoState
using SeqNoStateChange = Change<SeqNoState>;
using PfsStateChange = Change<PfsState>;
struct StateChange {
// TODO(perf): Less allocations, please? May be BufferSlice instead of std::string?
SeqNoStateChange seq_no_state_change;
PfsStateChange pfs_state_change;
Promise<Unit> save_changes_finish;
};
ChangesProcessor<StateChange> changes_processor_;
int32 saved_pfs_state_message_id_;
SeqNoState seq_no_state_;
bool seq_no_state_changed_ = false;
int32 last_binlog_message_id_ = -1;
Status check_seq_no(int in_seq_no, int out_seq_no, int32 his_layer) TD_WARN_UNUSED_RESULT;
void on_his_in_seq_no_updated();
void on_seq_no_state_changed();
template <class T>
void update_seq_no_state(const T &new_seq_no_state);
void on_pfs_state_changed();
Promise<> add_changes(Promise<> save_changes_finish = Promise<>());
// called only via Promise
void on_save_changes_start(ChangesProcessor<StateChange>::Id save_changes_token);
// InboundMessage
struct InboundMessageState {
bool save_changes_finish = false;
bool save_message_finish = false;
LogEvent::Id log_event_id = 0;
int32 message_id;
};
Container<InboundMessageState> inbound_message_states_;
std::map<int32, unique_ptr<log_event::InboundSecretMessage>> pending_inbound_messages_;
Result<std::tuple<uint64, BufferSlice, int32>> decrypt(BufferSlice &encrypted_message);
Status do_inbound_message_encrypted(unique_ptr<log_event::InboundSecretMessage> message);
Status do_inbound_message_decrypted_unchecked(unique_ptr<log_event::InboundSecretMessage> message,
int32 mtproto_version);
Status do_inbound_message_decrypted(unique_ptr<log_event::InboundSecretMessage> message);
void do_inbound_message_decrypted_pending(unique_ptr<log_event::InboundSecretMessage> message);
void on_inbound_save_message_finish(uint64 state_id);
void on_inbound_save_changes_finish(uint64 state_id);
void inbound_loop(InboundMessageState *state, uint64 state_id);
// OutboundMessage
struct OutboundMessageState {
unique_ptr<log_event::OutboundSecretMessage> message;
Promise<> outer_send_message_finish;
Promise<> send_message_finish;
bool save_changes_finish_flag = false;
bool send_message_finish_flag = false;
bool ack_flag = false;
uint64 net_query_id = 0;
NetQueryRef net_query_ref;
bool net_query_may_fail = false;
std::function<void(Promise<>)> send_result_;
};
std::map<uint64, uint64> random_id_to_outbound_message_state_token_;
std::map<int32, uint64> out_seq_no_to_outbound_message_state_token_;
Container<OutboundMessageState> outbound_message_states_;
NetQueryRef set_typing_query_;
NetQueryRef read_history_query_;
int32 last_read_history_date_ = -1;
Promise<Unit> read_history_promise_;
template <class T>
NetQueryPtr create_net_query(QueryType type, const T &function);
enum SendFlag : int32 {
None = 0,
External = 1,
Push = 2,
};
void send_action(tl_object_ptr<secret_api::DecryptedMessageAction> action, int32 flags, Promise<> promise);
void send_message_impl(tl_object_ptr<secret_api::DecryptedMessage> message,
tl_object_ptr<telegram_api::InputEncryptedFile> file, int32 flags, Promise<> promise);
void do_outbound_message_impl(unique_ptr<log_event::OutboundSecretMessage>, Promise<> promise);
Result<BufferSlice> create_encrypted_message(int32 my_in_seq_no, int32 my_out_seq_no,
tl_object_ptr<secret_api::DecryptedMessage> &message);
NetQueryPtr create_net_query(const log_event::OutboundSecretMessage &message);
void outbound_resend(uint64 state_id);
Status outbound_rewrite_with_empty(uint64 state_id);
void on_outbound_send_message_start(uint64 state_id);
void on_outbound_send_message_result(NetQueryPtr query, Promise<NetQueryPtr> resend_promise);
void on_outbound_send_message_error(uint64 state_id, Status error, Promise<NetQueryPtr> resend_promise);
void on_outbound_send_message_finish(uint64 state_id);
void on_outbound_save_changes_finish(uint64 state_id);
void on_outbound_ack(uint64 state_id);
void on_outbound_outer_send_message_promise(uint64 state_id, Promise<> promise);
void outbound_loop(OutboundMessageState *state, uint64 state_id);
// DiscardEncryption
void on_fatal_error(Status status);
void do_close_chat_impl(bool delete_history, bool is_already_discarded, uint64 log_event_id, Promise<Unit> &&promise);
void on_closed(uint64 log_event_id, Promise<Unit> &&promise);
// Other
template <class T>
Status save_common_info(T &update);
int32 current_layer() const {
2021-07-05 18:17:26 +02:00
int32 layer = static_cast<int32>(SecretChatLayer::Current);
if (config_state_.his_layer < layer) {
layer = config_state_.his_layer;
}
2021-07-05 18:17:26 +02:00
if (layer < static_cast<int32>(SecretChatLayer::Default)) {
layer = static_cast<int32>(SecretChatLayer::Default);
}
return layer;
}
void ask_on_binlog_replay_finish();
void check_status(Status status);
2021-07-03 22:51:36 +02:00
void start_up() final;
void loop() final;
Status do_loop();
2021-07-03 22:51:36 +02:00
void tear_down() final;
2021-07-03 22:51:36 +02:00
void on_result_resendable(NetQueryPtr net_query, Promise<NetQueryPtr> promise) final;
Status run_auth();
void run_pfs();
void run_fill_gaps();
void on_send_message_ack(int64 random_id);
Status on_delete_messages(const vector<int64> &random_ids);
Status on_flush_history(int32 last_message_id);
telegram_api::object_ptr<telegram_api::inputUser> get_input_user();
telegram_api::object_ptr<telegram_api::inputEncryptedChat> get_input_chat();
Status on_update_chat(telegram_api::encryptedChatRequested &update) TD_WARN_UNUSED_RESULT;
Status on_update_chat(telegram_api::encryptedChatEmpty &update) TD_WARN_UNUSED_RESULT;
Status on_update_chat(telegram_api::encryptedChatWaiting &update) TD_WARN_UNUSED_RESULT;
Status on_update_chat(telegram_api::encryptedChat &update) TD_WARN_UNUSED_RESULT;
Status on_update_chat(telegram_api::encryptedChatDiscarded &update) TD_WARN_UNUSED_RESULT;
Status on_update_chat(NetQueryPtr query) TD_WARN_UNUSED_RESULT;
Status on_update_chat(telegram_api::object_ptr<telegram_api::EncryptedChat> chat) TD_WARN_UNUSED_RESULT;
Status on_read_history(NetQueryPtr query) TD_WARN_UNUSED_RESULT;
void on_promise_error(Status error, string desc);
void get_dh_config();
Status on_dh_config(NetQueryPtr query) TD_WARN_UNUSED_RESULT;
void on_dh_config(telegram_api::messages_dhConfigNotModified &dh_not_modified);
void on_dh_config(telegram_api::messages_dhConfig &dh);
void do_create_chat_impl(unique_ptr<log_event::CreateSecretChat> event);
SecretChatId get_secret_chat_id() {
return SecretChatId(auth_state_.id);
}
UserId get_user_id() {
return auth_state_.user_id;
}
void send_update_ttl(int32 ttl);
void send_update_secret_chat();
void calc_key_hash();
friend inline StringBuilder &operator<<(StringBuilder &sb, const SecretChatActor::SeqNoState &state) {
return sb << "[" << tag("my_in_seq_no", state.my_in_seq_no) << tag("my_out_seq_no", state.my_out_seq_no)
<< tag("his_in_seq_no", state.his_in_seq_no) << "]";
}
};
} // namespace td