2018-12-31 20:04:05 +01:00
|
|
|
//
|
2020-01-01 02:23:48 +01:00
|
|
|
// Copyright Aliaksei Levin (levlam@telegram.org), Arseny Smirnov (arseny30@gmail.com) 2014-2020
|
2018-12-31 20:04:05 +01:00
|
|
|
//
|
|
|
|
// Distributed under the Boost Software License, Version 1.0. (See accompanying
|
|
|
|
// file LICENSE_1_0.txt or copy at http://www.boost.org/LICENSE_1_0.txt)
|
|
|
|
//
|
|
|
|
#pragma once
|
|
|
|
|
|
|
|
#include "td/telegram/secret_api.h"
|
|
|
|
#include "td/telegram/telegram_api.h"
|
|
|
|
|
|
|
|
#include "td/actor/actor.h"
|
|
|
|
#include "td/actor/PromiseFuture.h"
|
|
|
|
|
|
|
|
#include "td/mtproto/AuthKey.h"
|
2019-01-31 12:26:06 +01:00
|
|
|
#include "td/mtproto/DhHandshake.h"
|
2018-12-31 20:04:05 +01:00
|
|
|
|
|
|
|
#include "td/telegram/DhConfig.h"
|
2020-06-30 11:11:22 +02:00
|
|
|
#include "td/telegram/FolderId.h"
|
2018-12-31 20:04:05 +01:00
|
|
|
#include "td/telegram/logevent/SecretChatEvent.h"
|
|
|
|
#include "td/telegram/MessageId.h"
|
2020-03-15 01:43:42 +01:00
|
|
|
#include "td/telegram/net/NetQuery.h"
|
2018-12-31 20:04:05 +01:00
|
|
|
#include "td/telegram/SecretChatDb.h"
|
|
|
|
#include "td/telegram/SecretChatId.h"
|
|
|
|
#include "td/telegram/UserId.h"
|
|
|
|
|
|
|
|
#include "td/utils/buffer.h"
|
|
|
|
#include "td/utils/ChangesProcessor.h"
|
2019-02-12 22:26:36 +01:00
|
|
|
#include "td/utils/common.h"
|
2018-12-31 20:04:05 +01:00
|
|
|
#include "td/utils/Container.h"
|
|
|
|
#include "td/utils/format.h"
|
|
|
|
#include "td/utils/port/Clocks.h"
|
|
|
|
#include "td/utils/Slice.h"
|
|
|
|
#include "td/utils/Status.h"
|
|
|
|
#include "td/utils/StringBuilder.h"
|
|
|
|
#include "td/utils/Time.h"
|
|
|
|
#include "td/utils/tl_helpers.h"
|
|
|
|
|
2018-02-11 16:58:18 +01:00
|
|
|
#include <functional>
|
2018-12-31 20:04:05 +01:00
|
|
|
#include <map>
|
|
|
|
#include <memory>
|
|
|
|
#include <tuple>
|
|
|
|
#include <utility>
|
|
|
|
|
|
|
|
namespace td {
|
2018-12-04 19:18:07 +01:00
|
|
|
|
2018-12-31 20:04:05 +01:00
|
|
|
class BinlogInterface;
|
|
|
|
class NetQueryCreator;
|
|
|
|
|
|
|
|
class SecretChatActor : public NetQueryCallback {
|
|
|
|
public:
|
|
|
|
// do not change DEFAULT_LAYER, unless all it's usages are fixed
|
2019-09-19 21:07:11 +02:00
|
|
|
enum : int32 {
|
|
|
|
DEFAULT_LAYER = 46,
|
|
|
|
VIDEO_NOTES_LAYER = 66,
|
|
|
|
MTPROTO_2_LAYER = 73,
|
|
|
|
NEW_ENTITIES_LAYER = 101,
|
|
|
|
MY_LAYER = NEW_ENTITIES_LAYER
|
|
|
|
};
|
2018-12-31 20:04:05 +01:00
|
|
|
|
|
|
|
class Context {
|
|
|
|
public:
|
|
|
|
Context() = default;
|
|
|
|
Context(const Context &) = delete;
|
|
|
|
Context &operator=(const Context &) = delete;
|
|
|
|
virtual ~Context() = default;
|
|
|
|
virtual DhCallback *dh_callback() = 0;
|
|
|
|
virtual BinlogInterface *binlog() = 0;
|
|
|
|
virtual SecretChatDb *secret_chat_db() = 0;
|
|
|
|
|
|
|
|
virtual NetQueryCreator &net_query_creator() = 0;
|
|
|
|
virtual std::shared_ptr<DhConfig> dh_config() = 0;
|
|
|
|
virtual void set_dh_config(std::shared_ptr<DhConfig> dh_config) = 0;
|
|
|
|
|
|
|
|
virtual bool get_config_option_boolean(const string &name) const = 0;
|
|
|
|
|
|
|
|
virtual int32 unix_time() = 0;
|
|
|
|
|
|
|
|
virtual bool close_flag() = 0;
|
|
|
|
|
|
|
|
// We don't want to expose the whole NetQueryDispatcher, MessagesManager and ContactsManager.
|
2018-12-13 23:48:36 +01:00
|
|
|
// So it is more clear which parts of MessagesManager are really used. And it is much easier to create tests.
|
2018-12-31 20:04:05 +01:00
|
|
|
virtual void send_net_query(NetQueryPtr query, ActorShared<NetQueryCallback> callback, bool ordered) = 0;
|
|
|
|
|
|
|
|
virtual void on_update_secret_chat(int64 access_hash, UserId user_id, SecretChatState state, bool is_outbound,
|
2020-06-30 11:11:22 +02:00
|
|
|
int32 ttl, int32 date, string key_hash, int32 layer,
|
|
|
|
FolderId initial_folder_id) = 0;
|
2018-12-31 20:04:05 +01:00
|
|
|
|
|
|
|
// Promise must be set only after the update is processed.
|
|
|
|
//
|
|
|
|
// For example, one may set promise, after update was sent to binlog. It is ok, because SecretChatsActor will delete
|
2018-12-13 23:48:36 +01:00
|
|
|
// this update through binlog too. So it wouldn't be deleted before update is saved.
|
2018-12-31 20:04:05 +01:00
|
|
|
|
|
|
|
// inbound messages
|
|
|
|
virtual void on_inbound_message(UserId user_id, MessageId message_id, int32 date,
|
|
|
|
tl_object_ptr<telegram_api::encryptedFile> file,
|
|
|
|
tl_object_ptr<secret_api::decryptedMessage> message, Promise<> promise) = 0;
|
|
|
|
virtual void on_delete_messages(std::vector<int64> random_id, Promise<> promise) = 0;
|
|
|
|
virtual void on_flush_history(MessageId message_id, Promise<> promise) = 0;
|
|
|
|
virtual void on_read_message(int64 random_id, Promise<> promise) = 0;
|
|
|
|
virtual void on_screenshot_taken(UserId user_id, MessageId message_id, int32 date, int64 random_id,
|
|
|
|
Promise<> promise) = 0;
|
|
|
|
virtual void on_set_ttl(UserId user_id, MessageId message_id, int32 date, int32 ttl, int64 random_id,
|
|
|
|
Promise<> promise) = 0;
|
|
|
|
|
|
|
|
// outbound messages
|
|
|
|
virtual void on_send_message_ack(int64 random_id) = 0;
|
|
|
|
virtual void on_send_message_ok(int64 random_id, MessageId message_id, int32 date,
|
|
|
|
tl_object_ptr<telegram_api::EncryptedFile> file, Promise<> promise) = 0;
|
|
|
|
virtual void on_send_message_error(int64 random_id, Status error, Promise<> promise) = 0;
|
|
|
|
};
|
|
|
|
|
2018-09-27 03:19:03 +02:00
|
|
|
SecretChatActor(int32 id, unique_ptr<Context> context, bool can_be_empty);
|
2018-12-31 20:04:05 +01:00
|
|
|
|
2018-12-26 17:11:15 +01:00
|
|
|
// First query to new chat must be on of these two
|
2018-12-31 20:04:05 +01:00
|
|
|
void update_chat(telegram_api::object_ptr<telegram_api::EncryptedChat> chat);
|
|
|
|
void create_chat(int32 user_id, int64 user_access_hash, int32 random_id, Promise<SecretChatId> promise);
|
|
|
|
void cancel_chat(Promise<> promise);
|
|
|
|
|
|
|
|
// Inbound messages
|
|
|
|
// Logevent is created by SecretChatsManager, because it must contain qts
|
2020-09-22 01:15:09 +02:00
|
|
|
void add_inbound_message(unique_ptr<log_event::InboundSecretMessage> message);
|
2018-12-31 20:04:05 +01:00
|
|
|
|
|
|
|
// Outbound messages
|
2020-09-22 01:15:09 +02:00
|
|
|
// Promise will be set just after corresponding log event will be SENT to binlog.
|
2018-12-31 20:04:05 +01:00
|
|
|
void send_message(tl_object_ptr<secret_api::DecryptedMessage> message,
|
|
|
|
tl_object_ptr<telegram_api::InputEncryptedFile> file, Promise<> promise);
|
|
|
|
void send_message_action(tl_object_ptr<secret_api::SendMessageAction> action);
|
|
|
|
void send_read_history(int32 date,
|
|
|
|
Promise<>); // no binlog event. TODO: Promise will be set after the net query is sent
|
|
|
|
void send_open_message(int64 random_id, Promise<>);
|
|
|
|
void delete_message(int64 random_id, Promise<> promise);
|
|
|
|
void delete_messages(std::vector<int64> random_ids, Promise<> promise);
|
|
|
|
void delete_all_messages(Promise<> promise);
|
|
|
|
void notify_screenshot_taken(Promise<> promise);
|
|
|
|
void send_set_ttl_message(int32 ttl, int64 random_id, Promise<> promise);
|
|
|
|
|
|
|
|
// Binlog replay interface
|
2020-09-22 01:15:09 +02:00
|
|
|
void replay_inbound_message(unique_ptr<log_event::InboundSecretMessage> message);
|
|
|
|
void replay_outbound_message(unique_ptr<log_event::OutboundSecretMessage> message);
|
|
|
|
void replay_close_chat(unique_ptr<log_event::CloseSecretChat> event);
|
|
|
|
void replay_create_chat(unique_ptr<log_event::CreateSecretChat> event);
|
2018-12-31 20:04:05 +01:00
|
|
|
void binlog_replay_finish();
|
|
|
|
|
|
|
|
private:
|
2018-04-19 15:08:30 +02:00
|
|
|
enum class State : int32 { Empty, SendRequest, SendAccept, WaitRequestResponse, WaitAcceptResponse, Ready, Closed };
|
|
|
|
static constexpr int32 MAX_RESEND_COUNT = 1000;
|
2018-12-31 20:04:05 +01:00
|
|
|
|
2018-12-13 23:48:36 +01:00
|
|
|
// We have git state that should be synchronized with the database.
|
2018-12-31 20:04:05 +01:00
|
|
|
// It is splitted into several parts because:
|
|
|
|
// 1. Some parts are BIG (auth_key, for example) and are rarely updated.
|
|
|
|
// 2. Other are frequently updated, so probably should be as small as possible.
|
|
|
|
// 3. Some parts must be updated atomically.
|
|
|
|
struct SeqNoState {
|
|
|
|
int32 message_id = 0;
|
|
|
|
int32 my_in_seq_no = 0;
|
|
|
|
int32 my_out_seq_no = 0;
|
|
|
|
int32 his_in_seq_no = 0;
|
2018-06-14 17:00:10 +02:00
|
|
|
int32 his_layer = 0;
|
2018-12-31 20:04:05 +01:00
|
|
|
|
|
|
|
int32 resend_end_seq_no = -1;
|
|
|
|
|
|
|
|
static Slice key() {
|
|
|
|
return Slice("state");
|
|
|
|
}
|
|
|
|
template <class StorerT>
|
|
|
|
void store(StorerT &storer) const {
|
2018-06-14 17:00:10 +02:00
|
|
|
storer.store_int(message_id | HAS_LAYER);
|
2018-12-31 20:04:05 +01:00
|
|
|
storer.store_int(my_in_seq_no);
|
|
|
|
storer.store_int(my_out_seq_no);
|
|
|
|
storer.store_int(his_in_seq_no);
|
|
|
|
storer.store_int(resend_end_seq_no);
|
2018-06-14 17:00:10 +02:00
|
|
|
storer.store_int(his_layer);
|
2018-12-31 20:04:05 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
template <class ParserT>
|
|
|
|
void parse(ParserT &parser) {
|
|
|
|
message_id = parser.fetch_int();
|
|
|
|
my_in_seq_no = parser.fetch_int();
|
|
|
|
my_out_seq_no = parser.fetch_int();
|
|
|
|
his_in_seq_no = parser.fetch_int();
|
|
|
|
resend_end_seq_no = parser.fetch_int();
|
2018-06-14 17:00:10 +02:00
|
|
|
|
|
|
|
bool has_layer = (message_id & HAS_LAYER) != 0;
|
|
|
|
if (has_layer) {
|
|
|
|
message_id &= static_cast<int32>(~HAS_LAYER);
|
|
|
|
his_layer = parser.fetch_int();
|
|
|
|
}
|
2018-12-31 20:04:05 +01:00
|
|
|
}
|
2018-06-14 17:00:10 +02:00
|
|
|
static constexpr uint32 HAS_LAYER = 1u << 31;
|
2018-12-31 20:04:05 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
struct ConfigState {
|
|
|
|
int32 his_layer = 8;
|
|
|
|
int32 my_layer = 8;
|
|
|
|
int32 ttl = 0;
|
|
|
|
|
|
|
|
static Slice key() {
|
|
|
|
return Slice("config");
|
|
|
|
}
|
|
|
|
template <class StorerT>
|
|
|
|
void store(StorerT &storer) const {
|
|
|
|
storer.store_int(his_layer | HAS_FLAGS);
|
|
|
|
storer.store_int(ttl);
|
|
|
|
storer.store_int(my_layer);
|
|
|
|
//for future usage
|
2018-04-16 17:02:42 +02:00
|
|
|
BEGIN_STORE_FLAGS();
|
|
|
|
END_STORE_FLAGS();
|
2018-12-31 20:04:05 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
template <class ParserT>
|
|
|
|
void parse(ParserT &parser) {
|
|
|
|
his_layer = parser.fetch_int();
|
|
|
|
ttl = parser.fetch_int();
|
|
|
|
bool has_flags = (his_layer & HAS_FLAGS) != 0;
|
|
|
|
if (has_flags) {
|
2018-04-19 15:08:30 +02:00
|
|
|
his_layer &= static_cast<int32>(~HAS_FLAGS);
|
2018-12-31 20:04:05 +01:00
|
|
|
my_layer = parser.fetch_int();
|
|
|
|
// for future usage
|
2018-04-16 17:02:42 +02:00
|
|
|
BEGIN_PARSE_FLAGS();
|
2019-08-01 02:40:28 +02:00
|
|
|
END_PARSE_FLAGS();
|
2018-12-31 20:04:05 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-04-19 15:08:30 +02:00
|
|
|
static constexpr uint32 HAS_FLAGS = 1u << 31;
|
2018-12-31 20:04:05 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
// PfsAction
|
|
|
|
struct PfsState {
|
|
|
|
enum State : int32 {
|
|
|
|
Empty,
|
|
|
|
WaitSendRequest,
|
|
|
|
SendRequest,
|
|
|
|
WaitRequestResponse,
|
|
|
|
WaitSendAccept,
|
|
|
|
SendAccept,
|
|
|
|
WaitAcceptResponse,
|
|
|
|
WaitSendCommit,
|
|
|
|
SendCommit
|
|
|
|
} state = Empty;
|
|
|
|
|
|
|
|
enum Flags : int32 { CanForgetOtherKey = 1 };
|
|
|
|
mtproto::AuthKey auth_key;
|
|
|
|
mtproto::AuthKey other_auth_key;
|
|
|
|
bool can_forget_other_key = true;
|
|
|
|
|
|
|
|
int32 message_id = 0; // to skip old actions
|
|
|
|
int32 wait_message_id = 0;
|
|
|
|
int64 exchange_id = 0;
|
|
|
|
int32 last_message_id = 0;
|
|
|
|
double last_timestamp = 0;
|
|
|
|
int32 last_out_seq_no = 0;
|
|
|
|
DhHandshake handshake;
|
|
|
|
|
|
|
|
static Slice key() {
|
|
|
|
return Slice("pfs_state");
|
|
|
|
}
|
|
|
|
|
|
|
|
template <class StorerT>
|
|
|
|
void store(StorerT &storer) const {
|
|
|
|
int32 flags = 0;
|
|
|
|
if (can_forget_other_key) {
|
|
|
|
flags |= CanForgetOtherKey;
|
|
|
|
}
|
|
|
|
storer.store_int(flags);
|
|
|
|
storer.store_int(state);
|
|
|
|
auth_key.store(storer);
|
|
|
|
other_auth_key.store(storer);
|
|
|
|
storer.store_int(message_id);
|
|
|
|
storer.store_long(exchange_id);
|
|
|
|
storer.store_int(last_message_id);
|
|
|
|
storer.store_long(static_cast<int64>((last_timestamp - Time::now() + Clocks::system()) * 1000000));
|
|
|
|
storer.store_int(last_out_seq_no);
|
|
|
|
handshake.store(storer);
|
|
|
|
}
|
|
|
|
template <class ParserT>
|
|
|
|
void parse(ParserT &parser) {
|
|
|
|
int32 flags = parser.fetch_int();
|
|
|
|
can_forget_other_key = (flags & CanForgetOtherKey) != 0;
|
|
|
|
state = static_cast<State>(parser.fetch_int());
|
|
|
|
auth_key.parse(parser);
|
|
|
|
other_auth_key.parse(parser);
|
|
|
|
message_id = parser.fetch_int();
|
|
|
|
exchange_id = parser.fetch_long();
|
|
|
|
last_message_id = parser.fetch_int();
|
|
|
|
last_timestamp = static_cast<double>(parser.fetch_long()) / 1000000 - Clocks::system() + Time::now();
|
|
|
|
if (last_timestamp > Time::now_cached()) {
|
|
|
|
last_timestamp = Time::now_cached();
|
|
|
|
}
|
|
|
|
last_out_seq_no = parser.fetch_int();
|
|
|
|
handshake.parse(parser);
|
|
|
|
}
|
|
|
|
};
|
|
|
|
friend StringBuilder &operator<<(StringBuilder &sb, const PfsState &state) {
|
|
|
|
return sb << "PfsState["
|
|
|
|
<< tag("state",
|
|
|
|
[&] {
|
|
|
|
switch (state.state) {
|
|
|
|
case PfsState::Empty:
|
|
|
|
return "Empty";
|
|
|
|
case PfsState::WaitSendRequest:
|
|
|
|
return "WaitSendRequest";
|
|
|
|
case PfsState::SendRequest:
|
|
|
|
return "SendRequest";
|
|
|
|
case PfsState::WaitRequestResponse:
|
|
|
|
return "WaitRequestResponse";
|
|
|
|
case PfsState::WaitSendAccept:
|
|
|
|
return "WaitSendAccept";
|
|
|
|
case PfsState::SendAccept:
|
|
|
|
return "SendAccept";
|
|
|
|
case PfsState::WaitAcceptResponse:
|
|
|
|
return "WaitAcceptResponse";
|
|
|
|
case PfsState::WaitSendCommit:
|
|
|
|
return "WaitSendCommit";
|
|
|
|
case PfsState::SendCommit:
|
|
|
|
return "SendCommit";
|
|
|
|
}
|
|
|
|
return "UNKNOWN";
|
|
|
|
}())
|
|
|
|
<< tag("message_id", state.message_id) << tag("auth_key", format::as_hex(state.auth_key.id()))
|
|
|
|
<< tag("last_message_id", state.last_message_id)
|
|
|
|
<< tag("other_auth_key", format::as_hex(state.other_auth_key.id()))
|
|
|
|
<< tag("can_forget", state.can_forget_other_key) << "]";
|
|
|
|
}
|
|
|
|
|
|
|
|
PfsState pfs_state_;
|
|
|
|
bool pfs_state_changed_ = false;
|
|
|
|
|
|
|
|
void on_outbound_action(secret_api::decryptedMessageActionSetMessageTTL &set_ttl);
|
|
|
|
void on_outbound_action(secret_api::decryptedMessageActionReadMessages &read_messages);
|
|
|
|
void on_outbound_action(secret_api::decryptedMessageActionDeleteMessages &delete_messages);
|
|
|
|
void on_outbound_action(secret_api::decryptedMessageActionScreenshotMessages &screenshot);
|
|
|
|
void on_outbound_action(secret_api::decryptedMessageActionFlushHistory &flush_history);
|
|
|
|
void on_outbound_action(secret_api::decryptedMessageActionResend &resend);
|
|
|
|
void on_outbound_action(secret_api::decryptedMessageActionNotifyLayer ¬ify_layer);
|
|
|
|
void on_outbound_action(secret_api::decryptedMessageActionTyping &typing);
|
|
|
|
|
|
|
|
Status on_inbound_action(secret_api::decryptedMessageActionSetMessageTTL &set_ttl);
|
|
|
|
Status on_inbound_action(secret_api::decryptedMessageActionReadMessages &read_messages);
|
|
|
|
Status on_inbound_action(secret_api::decryptedMessageActionDeleteMessages &delete_messages);
|
|
|
|
Status on_inbound_action(secret_api::decryptedMessageActionScreenshotMessages &screenshot);
|
|
|
|
Status on_inbound_action(secret_api::decryptedMessageActionFlushHistory &screenshot);
|
|
|
|
|
|
|
|
Status on_inbound_action(secret_api::decryptedMessageActionResend &resend);
|
|
|
|
Status on_inbound_action(secret_api::decryptedMessageActionNotifyLayer ¬ify_layer);
|
|
|
|
Status on_inbound_action(secret_api::decryptedMessageActionTyping &typing);
|
|
|
|
|
|
|
|
// Perfect Forward Secrecy
|
|
|
|
void on_outbound_action(secret_api::decryptedMessageActionRequestKey &request_key);
|
|
|
|
void on_outbound_action(secret_api::decryptedMessageActionAcceptKey &accept_key);
|
|
|
|
void on_outbound_action(secret_api::decryptedMessageActionAbortKey &abort_key);
|
|
|
|
void on_outbound_action(secret_api::decryptedMessageActionCommitKey &commit_key);
|
|
|
|
void on_outbound_action(secret_api::decryptedMessageActionNoop &noop);
|
|
|
|
|
|
|
|
Status on_inbound_action(secret_api::decryptedMessageActionRequestKey &request_key);
|
|
|
|
Status on_inbound_action(secret_api::decryptedMessageActionAcceptKey &accept_key);
|
|
|
|
Status on_inbound_action(secret_api::decryptedMessageActionAbortKey &abort_key);
|
|
|
|
Status on_inbound_action(secret_api::decryptedMessageActionCommitKey &commit_key);
|
|
|
|
Status on_inbound_action(secret_api::decryptedMessageActionNoop &noop);
|
|
|
|
|
|
|
|
Status on_inbound_action(secret_api::DecryptedMessageAction &action, int32 message_id);
|
|
|
|
|
|
|
|
void on_outbound_action(secret_api::DecryptedMessageAction &action, int32 message_id);
|
|
|
|
|
|
|
|
void request_new_key();
|
|
|
|
|
|
|
|
struct AuthState {
|
|
|
|
State state = State::Empty;
|
|
|
|
int x = -1;
|
|
|
|
string key_hash;
|
|
|
|
|
|
|
|
int32 id = 0;
|
|
|
|
int64 access_hash = 0;
|
|
|
|
|
|
|
|
int32 user_id = 0;
|
|
|
|
int64 user_access_hash = 0;
|
|
|
|
int32 random_id = 0;
|
|
|
|
|
|
|
|
int32 date = 0;
|
|
|
|
|
2020-06-30 11:11:22 +02:00
|
|
|
FolderId initial_folder_id;
|
|
|
|
|
2018-12-31 20:04:05 +01:00
|
|
|
DhConfig dh_config;
|
|
|
|
DhHandshake handshake;
|
|
|
|
|
|
|
|
static Slice key() {
|
|
|
|
return Slice("auth_state");
|
|
|
|
}
|
|
|
|
template <class StorerT>
|
|
|
|
void store(StorerT &storer) const {
|
|
|
|
uint32 flags = 0;
|
2020-06-30 11:11:22 +02:00
|
|
|
bool has_date = date != 0;
|
|
|
|
bool has_key_hash = true;
|
|
|
|
bool has_initial_folder_id = initial_folder_id != FolderId();
|
|
|
|
if (has_date) {
|
2018-12-31 20:04:05 +01:00
|
|
|
flags |= 1;
|
|
|
|
}
|
2020-06-30 11:11:22 +02:00
|
|
|
if (has_key_hash) {
|
2018-12-31 20:04:05 +01:00
|
|
|
flags |= 2;
|
|
|
|
}
|
2020-06-30 11:11:22 +02:00
|
|
|
if (has_initial_folder_id) {
|
|
|
|
flags |= 4;
|
|
|
|
}
|
2018-12-31 20:04:05 +01:00
|
|
|
storer.store_int((flags << 8) | static_cast<int32>(state));
|
|
|
|
storer.store_int(x);
|
|
|
|
|
|
|
|
storer.store_int(id);
|
|
|
|
storer.store_long(access_hash);
|
|
|
|
storer.store_int(user_id);
|
|
|
|
storer.store_long(user_access_hash);
|
|
|
|
storer.store_int(random_id);
|
2020-06-30 11:11:22 +02:00
|
|
|
if (has_date) {
|
2018-12-31 20:04:05 +01:00
|
|
|
storer.store_int(date);
|
|
|
|
}
|
2020-06-30 11:11:22 +02:00
|
|
|
if (has_key_hash) {
|
2018-12-31 20:04:05 +01:00
|
|
|
storer.store_string(key_hash);
|
|
|
|
}
|
|
|
|
dh_config.store(storer);
|
|
|
|
if (state == State::SendRequest || state == State::WaitRequestResponse) {
|
|
|
|
handshake.store(storer);
|
|
|
|
}
|
2020-06-30 11:11:22 +02:00
|
|
|
if (has_initial_folder_id) {
|
|
|
|
initial_folder_id.store(storer);
|
|
|
|
}
|
2018-12-31 20:04:05 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
template <class ParserT>
|
|
|
|
void parse(ParserT &parser) {
|
|
|
|
uint32 tmp = parser.fetch_int();
|
|
|
|
state = static_cast<State>(tmp & 255);
|
|
|
|
uint32 flags = tmp >> 8;
|
2020-06-30 11:11:22 +02:00
|
|
|
bool has_date = (flags & 1) != 0;
|
|
|
|
bool has_key_hash = (flags & 2) != 0;
|
|
|
|
bool has_initial_folder_id = (flags & 4) != 0;
|
2018-12-31 20:04:05 +01:00
|
|
|
|
|
|
|
x = parser.fetch_int();
|
|
|
|
|
|
|
|
id = parser.fetch_int();
|
|
|
|
access_hash = parser.fetch_long();
|
|
|
|
user_id = parser.fetch_int();
|
|
|
|
user_access_hash = parser.fetch_long();
|
|
|
|
random_id = parser.fetch_int();
|
2020-06-30 11:11:22 +02:00
|
|
|
if (has_date) {
|
2018-12-31 20:04:05 +01:00
|
|
|
date = parser.fetch_int();
|
|
|
|
}
|
2020-06-30 11:11:22 +02:00
|
|
|
if (has_key_hash) {
|
2018-12-31 20:04:05 +01:00
|
|
|
key_hash = parser.template fetch_string<std::string>();
|
|
|
|
}
|
|
|
|
dh_config.parse(parser);
|
|
|
|
if (state == State::SendRequest || state == State::WaitRequestResponse) {
|
|
|
|
handshake.parse(parser);
|
|
|
|
}
|
2020-06-30 11:11:22 +02:00
|
|
|
if (has_initial_folder_id) {
|
|
|
|
initial_folder_id.parse(parser);
|
|
|
|
}
|
2018-12-31 20:04:05 +01:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
std::shared_ptr<SecretChatDb> db_;
|
2018-09-27 03:19:03 +02:00
|
|
|
unique_ptr<Context> context_;
|
2018-12-31 20:04:05 +01:00
|
|
|
|
|
|
|
bool binlog_replay_finish_flag_ = false;
|
|
|
|
bool close_flag_ = false;
|
2020-09-22 01:15:09 +02:00
|
|
|
LogEvent::Id close_log_event_id_ = 0;
|
2018-12-31 20:04:05 +01:00
|
|
|
|
2020-09-22 01:15:09 +02:00
|
|
|
LogEvent::Id create_log_event_id_ = 0;
|
2018-12-31 20:04:05 +01:00
|
|
|
|
2018-04-02 03:14:47 +02:00
|
|
|
enum class QueryType : uint8 { DhConfig, EncryptedChat, Message, Ignore, DiscardEncryption, ReadHistory };
|
2018-12-31 20:04:05 +01:00
|
|
|
|
|
|
|
bool can_be_empty_;
|
|
|
|
AuthState auth_state_;
|
|
|
|
ConfigState config_state_;
|
|
|
|
|
2018-04-02 03:14:47 +02:00
|
|
|
// Turns out, that all changes should be made through StateChange.
|
2018-12-31 20:04:05 +01:00
|
|
|
//
|
|
|
|
// The problem is the time between the moment we made decision about change and
|
|
|
|
// the moment we actually apply the change to memory.
|
|
|
|
// We may accept some other change during that time, and there goes our problem
|
|
|
|
// The reason for the change may already be invalid. So we should somehow recheck change, that
|
|
|
|
// is already written to binlog, and apply it only if necessary.
|
|
|
|
// This is completly flawed.
|
|
|
|
// (A-start_save_to_binlog ----> B-start_save_to_binlog+change_memory ----> A-finish_save_to_binlog+surprise)
|
|
|
|
//
|
2018-12-13 23:48:36 +01:00
|
|
|
// Instead I suggest general solution that is already used with SeqNoState and qts
|
|
|
|
// 1. We APPLY CHANGE to memory immediately AFTER corresponding EVENT is SENT to the binlog.
|
|
|
|
// 2. We SEND CHANGE to database only after corresponding EVENT is SAVED to the binlog.
|
|
|
|
// 3. Then we are able to ERASE EVENT just AFTER the CHANGE is SAVED to the binlog.
|
2018-12-31 20:04:05 +01:00
|
|
|
//
|
2018-04-02 03:14:47 +02:00
|
|
|
// Actually the change will be saved to binlog too.
|
2018-12-13 23:48:36 +01:00
|
|
|
// So we can do it immediatelly after EVENT is SENT to the binlog, because SEND CHANGE and ERASE EVENT will be
|
2018-12-31 20:04:05 +01:00
|
|
|
// ordered automatically.
|
|
|
|
//
|
|
|
|
// We will use common ChangeProcessor for all changes (inside one SecretChatActor).
|
2018-04-02 03:14:47 +02:00
|
|
|
// So all changes will be saved in exactly the same order as they are applied.
|
2018-12-31 20:04:05 +01:00
|
|
|
|
|
|
|
template <class StateT>
|
|
|
|
class Change {
|
|
|
|
public:
|
|
|
|
Change() = default;
|
|
|
|
explicit operator bool() const {
|
|
|
|
return !data.empty();
|
|
|
|
}
|
|
|
|
explicit Change(const StateT &state) {
|
|
|
|
data = serialize(state);
|
|
|
|
message_id = state.message_id;
|
|
|
|
}
|
|
|
|
template <class StorerT>
|
|
|
|
void store(StorerT &storer) const {
|
|
|
|
// NB: rely that storer will the same as in serialize
|
|
|
|
storer.store_slice(data);
|
|
|
|
}
|
|
|
|
static Slice key() {
|
|
|
|
return StateT::key();
|
|
|
|
}
|
|
|
|
|
|
|
|
friend StringBuilder &operator<<(StringBuilder &sb, const Change<StateT> &change) {
|
|
|
|
if (change) {
|
|
|
|
StateT state;
|
|
|
|
unserialize(state, change.data).ensure();
|
|
|
|
return sb << state;
|
|
|
|
}
|
|
|
|
return sb;
|
|
|
|
}
|
|
|
|
|
|
|
|
int32 message_id;
|
|
|
|
|
|
|
|
private:
|
|
|
|
std::string data;
|
|
|
|
};
|
|
|
|
|
|
|
|
// SeqNoState
|
|
|
|
using SeqNoStateChange = Change<SeqNoState>;
|
|
|
|
using PfsStateChange = Change<PfsState>;
|
|
|
|
struct StateChange {
|
|
|
|
// TODO(perf): Less allocations, please? May be BufferSlice instead of std::string?
|
|
|
|
SeqNoStateChange seq_no_state_change;
|
|
|
|
PfsStateChange pfs_state_change;
|
|
|
|
Promise<Unit> save_changes_finish;
|
|
|
|
};
|
|
|
|
|
|
|
|
ChangesProcessor<StateChange> changes_processor_;
|
|
|
|
int32 saved_pfs_state_message_id_;
|
|
|
|
|
|
|
|
SeqNoState seq_no_state_;
|
|
|
|
bool seq_no_state_changed_ = false;
|
|
|
|
int32 last_binlog_message_id_ = -1;
|
|
|
|
|
2018-06-14 17:00:10 +02:00
|
|
|
Status check_seq_no(int in_seq_no, int out_seq_no, int32 his_layer) TD_WARN_UNUSED_RESULT;
|
2018-12-31 20:04:05 +01:00
|
|
|
void on_his_in_seq_no_updated();
|
|
|
|
|
|
|
|
void on_seq_no_state_changed();
|
|
|
|
template <class T>
|
|
|
|
void update_seq_no_state(const T &new_seq_no_state);
|
|
|
|
void on_pfs_state_changed();
|
|
|
|
Promise<> add_changes(Promise<> save_changes_finish = Promise<>());
|
|
|
|
// called only via Promise
|
|
|
|
void on_save_changes_start(ChangesProcessor<StateChange>::Id save_changes_token);
|
|
|
|
|
|
|
|
// InboundMessage
|
|
|
|
struct InboundMessageState {
|
|
|
|
bool save_changes_finish = false;
|
|
|
|
bool save_message_finish = false;
|
2020-09-22 01:15:09 +02:00
|
|
|
LogEvent::Id log_event_id = 0;
|
2018-12-31 20:04:05 +01:00
|
|
|
int32 message_id;
|
|
|
|
};
|
|
|
|
Container<InboundMessageState> inbound_message_states_;
|
|
|
|
|
2020-09-22 01:15:09 +02:00
|
|
|
std::map<int32, unique_ptr<log_event::InboundSecretMessage>> pending_inbound_messages_;
|
2018-12-31 20:04:05 +01:00
|
|
|
|
|
|
|
Result<std::tuple<uint64, BufferSlice, int32>> decrypt(BufferSlice &encrypted_message);
|
|
|
|
|
2020-09-22 01:15:09 +02:00
|
|
|
Status do_inbound_message_encrypted(unique_ptr<log_event::InboundSecretMessage> message);
|
|
|
|
Status do_inbound_message_decrypted_unchecked(unique_ptr<log_event::InboundSecretMessage> message);
|
|
|
|
Status do_inbound_message_decrypted(unique_ptr<log_event::InboundSecretMessage> message);
|
|
|
|
void do_inbound_message_decrypted_pending(unique_ptr<log_event::InboundSecretMessage> message);
|
2018-12-31 20:04:05 +01:00
|
|
|
|
|
|
|
void on_inbound_save_message_finish(uint64 state_id);
|
|
|
|
void on_inbound_save_changes_finish(uint64 state_id);
|
|
|
|
void inbound_loop(InboundMessageState *state, uint64 state_id);
|
|
|
|
|
|
|
|
// OutboundMessage
|
|
|
|
struct OutboundMessageState {
|
2020-09-22 01:15:09 +02:00
|
|
|
unique_ptr<log_event::OutboundSecretMessage> message;
|
2018-12-31 20:04:05 +01:00
|
|
|
|
|
|
|
Promise<> outer_send_message_finish;
|
|
|
|
Promise<> send_message_finish;
|
|
|
|
|
|
|
|
bool save_changes_finish_flag = false;
|
|
|
|
bool send_message_finish_flag = false;
|
|
|
|
bool ack_flag = false;
|
|
|
|
|
|
|
|
uint64 net_query_id = 0;
|
|
|
|
NetQueryRef net_query_ref;
|
|
|
|
bool net_query_may_fail = false;
|
2018-01-31 16:14:43 +01:00
|
|
|
|
|
|
|
std::function<void(Promise<>)> send_result_;
|
2018-12-31 20:04:05 +01:00
|
|
|
};
|
|
|
|
std::map<uint64, uint64> random_id_to_outbound_message_state_token_;
|
|
|
|
std::map<int32, uint64> out_seq_no_to_outbound_message_state_token_;
|
|
|
|
|
|
|
|
Container<OutboundMessageState> outbound_message_states_;
|
|
|
|
|
2018-03-13 09:08:56 +01:00
|
|
|
NetQueryRef set_typing_query_;
|
2018-04-02 03:14:47 +02:00
|
|
|
NetQueryRef read_history_query_;
|
|
|
|
int32 last_read_history_date_ = -1;
|
|
|
|
Promise<Unit> read_history_promise_;
|
2018-03-13 09:08:56 +01:00
|
|
|
|
2020-03-15 01:43:42 +01:00
|
|
|
template <class T>
|
|
|
|
NetQueryPtr create_net_query(QueryType type, const T &function);
|
|
|
|
|
2018-04-19 15:08:30 +02:00
|
|
|
enum SendFlag : int32 {
|
2018-12-31 20:04:05 +01:00
|
|
|
None = 0,
|
|
|
|
External = 1,
|
|
|
|
Push = 2,
|
|
|
|
};
|
|
|
|
void send_action(tl_object_ptr<secret_api::DecryptedMessageAction> action, int32 flags, Promise<> promise);
|
|
|
|
|
|
|
|
void send_message_impl(tl_object_ptr<secret_api::DecryptedMessage> message,
|
|
|
|
tl_object_ptr<telegram_api::InputEncryptedFile> file, int32 flags, Promise<> promise);
|
|
|
|
|
2020-09-22 01:15:09 +02:00
|
|
|
void do_outbound_message_impl(unique_ptr<log_event::OutboundSecretMessage>, Promise<> promise);
|
2018-12-31 20:04:05 +01:00
|
|
|
Result<BufferSlice> create_encrypted_message(int32 layer, int32 my_in_seq_no, int32 my_out_seq_no,
|
|
|
|
tl_object_ptr<secret_api::DecryptedMessage> &message);
|
|
|
|
|
2020-09-22 01:15:09 +02:00
|
|
|
NetQueryPtr create_net_query(const log_event::OutboundSecretMessage &message);
|
2018-12-31 20:04:05 +01:00
|
|
|
|
|
|
|
void outbound_resend(uint64 state_id);
|
|
|
|
Status outbound_rewrite_with_empty(uint64 state_id);
|
|
|
|
void on_outbound_send_message_start(uint64 state_id);
|
|
|
|
void on_outbound_send_message_result(NetQueryPtr query, Promise<NetQueryPtr> resend_promise);
|
|
|
|
void on_outbound_send_message_error(uint64 state_id, Status error, Promise<NetQueryPtr> resend_promise);
|
|
|
|
void on_outbound_send_message_finish(uint64 state_id);
|
|
|
|
void on_outbound_save_changes_finish(uint64 state_id);
|
|
|
|
void on_outbound_ack(uint64 state_id);
|
|
|
|
void on_outbound_outer_send_message_promise(uint64 state_id, Promise<> promise);
|
|
|
|
void outbound_loop(OutboundMessageState *state, uint64 state_id);
|
|
|
|
|
|
|
|
// DiscardEncryption
|
|
|
|
void on_fatal_error(Status status);
|
2020-09-22 01:15:09 +02:00
|
|
|
void do_close_chat_impl(unique_ptr<log_event::CloseSecretChat> event);
|
2018-12-31 20:04:05 +01:00
|
|
|
void on_discard_encryption_result(NetQueryPtr result);
|
|
|
|
|
|
|
|
// Other
|
|
|
|
template <class T>
|
|
|
|
Status save_common_info(T &update);
|
|
|
|
|
|
|
|
int32 current_layer() const {
|
|
|
|
int32 layer = MY_LAYER;
|
|
|
|
if (config_state_.his_layer < layer) {
|
|
|
|
layer = config_state_.his_layer;
|
|
|
|
}
|
|
|
|
if (layer < DEFAULT_LAYER) {
|
|
|
|
layer = DEFAULT_LAYER;
|
|
|
|
}
|
|
|
|
return layer;
|
|
|
|
}
|
|
|
|
|
|
|
|
void ask_on_binlog_replay_finish();
|
|
|
|
|
|
|
|
void check_status(Status status);
|
|
|
|
void start_up() override;
|
|
|
|
void loop() override;
|
|
|
|
Status do_loop();
|
|
|
|
void tear_down() override;
|
|
|
|
|
|
|
|
void on_result_resendable(NetQueryPtr net_query, Promise<NetQueryPtr> promise) override;
|
|
|
|
|
|
|
|
Status run_auth();
|
|
|
|
void run_pfs();
|
|
|
|
void run_fill_gaps();
|
|
|
|
void on_send_message_ack(int64 random_id);
|
|
|
|
Status on_delete_messages(const vector<int64> &random_ids);
|
|
|
|
Status on_flush_history(int32 last_message_id);
|
|
|
|
|
|
|
|
telegram_api::object_ptr<telegram_api::inputUser> get_input_user();
|
|
|
|
telegram_api::object_ptr<telegram_api::inputEncryptedChat> get_input_chat();
|
|
|
|
|
|
|
|
Status on_update_chat(telegram_api::encryptedChatRequested &update) TD_WARN_UNUSED_RESULT;
|
|
|
|
Status on_update_chat(telegram_api::encryptedChatEmpty &update) TD_WARN_UNUSED_RESULT;
|
|
|
|
Status on_update_chat(telegram_api::encryptedChatWaiting &update) TD_WARN_UNUSED_RESULT;
|
|
|
|
Status on_update_chat(telegram_api::encryptedChat &update) TD_WARN_UNUSED_RESULT;
|
|
|
|
Status on_update_chat(telegram_api::encryptedChatDiscarded &update) TD_WARN_UNUSED_RESULT;
|
|
|
|
|
|
|
|
Status on_update_chat(NetQueryPtr query) TD_WARN_UNUSED_RESULT;
|
|
|
|
Status on_update_chat(telegram_api::object_ptr<telegram_api::EncryptedChat> chat) TD_WARN_UNUSED_RESULT;
|
|
|
|
|
2018-04-02 03:14:47 +02:00
|
|
|
Status on_read_history(NetQueryPtr query) TD_WARN_UNUSED_RESULT;
|
|
|
|
|
2018-12-31 20:04:05 +01:00
|
|
|
void on_promise_error(Status error, string desc);
|
|
|
|
|
|
|
|
void get_dh_config();
|
|
|
|
Status on_dh_config(NetQueryPtr query) TD_WARN_UNUSED_RESULT;
|
|
|
|
void on_dh_config(telegram_api::messages_dhConfigNotModified &dh_not_modified);
|
|
|
|
void on_dh_config(telegram_api::messages_dhConfig &dh);
|
|
|
|
|
2020-09-22 01:15:09 +02:00
|
|
|
void do_create_chat_impl(unique_ptr<log_event::CreateSecretChat> event);
|
2018-12-31 20:04:05 +01:00
|
|
|
|
|
|
|
SecretChatId get_secret_chat_id() {
|
|
|
|
return SecretChatId(auth_state_.id);
|
|
|
|
}
|
|
|
|
UserId get_user_id() {
|
|
|
|
return UserId(auth_state_.user_id);
|
|
|
|
}
|
|
|
|
void send_update_ttl(int32 ttl);
|
|
|
|
void send_update_secret_chat();
|
|
|
|
void calc_key_hash();
|
|
|
|
|
|
|
|
friend inline StringBuilder &operator<<(StringBuilder &sb, const SecretChatActor::SeqNoState &state) {
|
|
|
|
return sb << "[" << tag("my_in_seq_no", state.my_in_seq_no) << tag("my_out_seq_no", state.my_out_seq_no)
|
|
|
|
<< tag("his_in_seq_no", state.his_in_seq_no) << "]";
|
|
|
|
}
|
|
|
|
};
|
2018-12-04 19:18:07 +01:00
|
|
|
|
2018-12-31 20:04:05 +01:00
|
|
|
} // namespace td
|