2020-01-17 05:17:46 +00:00
|
|
|
// Package session abstracts around the REST API and the Gateway, managing both
|
|
|
|
// at once. It offers a handler interface similar to that in discordgo for
|
|
|
|
// Gateway events.
|
2020-01-15 04:43:34 +00:00
|
|
|
package session
|
|
|
|
|
|
|
|
import (
|
2020-11-14 23:30:18 +00:00
|
|
|
"context"
|
2021-09-28 20:19:04 +00:00
|
|
|
"sync"
|
2020-10-17 10:21:07 +00:00
|
|
|
|
2020-06-06 20:47:15 +00:00
|
|
|
"github.com/pkg/errors"
|
|
|
|
|
2021-06-02 02:53:19 +00:00
|
|
|
"github.com/diamondburned/arikawa/v3/api"
|
2022-08-22 09:18:54 +00:00
|
|
|
"github.com/diamondburned/arikawa/v3/api/webhook"
|
2021-06-02 02:53:19 +00:00
|
|
|
"github.com/diamondburned/arikawa/v3/gateway"
|
|
|
|
"github.com/diamondburned/arikawa/v3/utils/handler"
|
2021-09-28 20:19:04 +00:00
|
|
|
"github.com/diamondburned/arikawa/v3/utils/json/option"
|
2022-11-18 10:09:12 +00:00
|
|
|
"github.com/diamondburned/arikawa/v3/utils/ws"
|
2021-09-28 20:19:04 +00:00
|
|
|
"github.com/diamondburned/arikawa/v3/utils/ws/ophandler"
|
2020-01-15 04:43:34 +00:00
|
|
|
)
|
|
|
|
|
2021-09-28 20:19:04 +00:00
|
|
|
// ErrMFA is returned if the account requires a 2FA code to log in.
|
2020-06-06 20:47:15 +00:00
|
|
|
var ErrMFA = errors.New("account has 2FA enabled")
|
|
|
|
|
2022-08-14 23:10:31 +00:00
|
|
|
// ErrClosed is returned if the Session is closed, either because it's already
|
|
|
|
// closed (and Close is being called again) or it was never started.
|
|
|
|
var ErrClosed = errors.New("Session is closed")
|
|
|
|
|
2020-01-17 05:23:56 +00:00
|
|
|
// Session manages both the API and Gateway. As such, Session inherits all of
|
|
|
|
// API's methods, as well has the Handler used for Gateway.
|
2020-01-15 04:43:34 +00:00
|
|
|
type Session struct {
|
2020-01-17 02:08:03 +00:00
|
|
|
*api.Client
|
2020-01-17 05:17:46 +00:00
|
|
|
*handler.Handler
|
2020-01-17 05:23:56 +00:00
|
|
|
|
2020-11-14 23:30:18 +00:00
|
|
|
// internal state to not be copied around.
|
2021-09-28 20:19:04 +00:00
|
|
|
state *sessionState
|
2022-10-04 05:37:40 +00:00
|
|
|
|
|
|
|
// Options, all of which default to the zero value.
|
|
|
|
|
|
|
|
// DontWaitForReady makes Open not wait for the Ready event. This is useful
|
|
|
|
// for non-bots, since Discord may send over a READY_SUPPLEMENT instead. If
|
|
|
|
// this is true, then any event sent by Discord will unblock Open (usually
|
|
|
|
// HELLO).
|
|
|
|
DontWaitForReady bool
|
2020-11-14 23:30:18 +00:00
|
|
|
}
|
|
|
|
|
2021-09-28 20:19:04 +00:00
|
|
|
type sessionState struct {
|
|
|
|
sync.Mutex
|
|
|
|
id gateway.Identifier
|
|
|
|
gateway *gateway.Gateway
|
|
|
|
|
|
|
|
ctx context.Context
|
|
|
|
cancel context.CancelFunc
|
|
|
|
doneCh <-chan struct{}
|
|
|
|
}
|
|
|
|
|
|
|
|
// NewWithIntents is similar to New but adds the given intents in during
|
|
|
|
// construction.
|
|
|
|
func NewWithIntents(token string, intents ...gateway.Intents) *Session {
|
|
|
|
var allIntent gateway.Intents
|
|
|
|
for _, intent := range intents {
|
|
|
|
allIntent |= intent
|
2020-07-11 19:50:32 +00:00
|
|
|
}
|
|
|
|
|
2021-09-28 20:19:04 +00:00
|
|
|
id := gateway.DefaultIdentifier(token)
|
|
|
|
id.Intents = option.NewUint(uint(allIntent))
|
|
|
|
|
|
|
|
return NewWithIdentifier(id)
|
2020-07-11 19:50:32 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// New creates a new session from a given token. Most bots should be using
|
|
|
|
// NewWithIntents instead.
|
2021-09-28 20:19:04 +00:00
|
|
|
func New(token string) *Session {
|
|
|
|
return NewWithIdentifier(gateway.DefaultIdentifier(token))
|
2020-01-15 04:43:34 +00:00
|
|
|
}
|
|
|
|
|
2020-01-19 21:54:16 +00:00
|
|
|
// Login tries to log in as a normal user account; MFA is optional.
|
2021-09-28 20:19:04 +00:00
|
|
|
func Login(ctx context.Context, email, password, mfa string) (*Session, error) {
|
2020-01-19 21:54:16 +00:00
|
|
|
// Make a scratch HTTP client without a token
|
2021-09-28 20:19:04 +00:00
|
|
|
client := api.NewClient("").WithContext(ctx)
|
2020-01-19 21:54:16 +00:00
|
|
|
|
|
|
|
// Try to login without TOTP
|
|
|
|
l, err := client.Login(email, password)
|
|
|
|
if err != nil {
|
2020-05-16 21:14:49 +00:00
|
|
|
return nil, errors.Wrap(err, "failed to login")
|
2020-01-19 21:54:16 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if l.Token != "" && !l.MFA {
|
|
|
|
// We got the token, return with a new Session.
|
2021-09-28 20:19:04 +00:00
|
|
|
return New(l.Token), nil
|
2020-01-19 21:54:16 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Discord requests MFA, so we need the MFA token.
|
|
|
|
if mfa == "" {
|
|
|
|
return nil, ErrMFA
|
|
|
|
}
|
|
|
|
|
|
|
|
// Retry logging in with a 2FA token
|
|
|
|
l, err = client.TOTP(mfa, l.Ticket)
|
|
|
|
if err != nil {
|
2020-05-16 21:14:49 +00:00
|
|
|
return nil, errors.Wrap(err, "failed to login with 2FA")
|
2020-01-19 21:54:16 +00:00
|
|
|
}
|
|
|
|
|
2021-09-28 20:19:04 +00:00
|
|
|
return New(l.Token), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// NewWithIdentifier creates a bare Session with the given identifier.
|
|
|
|
func NewWithIdentifier(id gateway.Identifier) *Session {
|
|
|
|
return NewCustom(id, api.NewClient(id.Token), handler.New())
|
2020-01-19 21:54:16 +00:00
|
|
|
}
|
|
|
|
|
2021-09-28 20:19:04 +00:00
|
|
|
// NewWithGateway constructs a bare Session from the given UNOPENED gateway.
|
|
|
|
func NewWithGateway(g *gateway.Gateway, h *handler.Handler) *Session {
|
|
|
|
state := g.State()
|
|
|
|
return &Session{
|
|
|
|
Client: api.NewClient(state.Identifier.Token),
|
|
|
|
Handler: h,
|
|
|
|
state: &sessionState{
|
|
|
|
gateway: g,
|
|
|
|
id: state.Identifier,
|
|
|
|
},
|
|
|
|
}
|
2021-06-10 23:48:32 +00:00
|
|
|
}
|
2020-11-17 19:09:51 +00:00
|
|
|
|
2021-09-28 20:19:04 +00:00
|
|
|
// NewCustom constructs a bare Session from the given parameters.
|
|
|
|
func NewCustom(id gateway.Identifier, cl *api.Client, h *handler.Handler) *Session {
|
2020-02-16 05:29:25 +00:00
|
|
|
return &Session{
|
2021-06-10 23:48:32 +00:00
|
|
|
Client: cl,
|
|
|
|
Handler: h,
|
2021-09-28 20:19:04 +00:00
|
|
|
state: &sessionState{id: id},
|
2020-01-17 02:08:03 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-09-28 20:19:04 +00:00
|
|
|
// AddIntents adds the given intents into the gateway. Calling it after Open has
|
|
|
|
// already been called will result in a panic.
|
|
|
|
func (s *Session) AddIntents(intents gateway.Intents) {
|
|
|
|
s.state.Lock()
|
|
|
|
|
|
|
|
s.state.id.AddIntents(intents)
|
|
|
|
|
|
|
|
if s.state.gateway != nil {
|
|
|
|
s.state.gateway.AddIntents(intents)
|
|
|
|
}
|
|
|
|
|
|
|
|
s.state.Unlock()
|
|
|
|
}
|
|
|
|
|
|
|
|
// HasIntents reports if the Gateway has the passed Intents.
|
|
|
|
//
|
|
|
|
// If no intents are set, e.g. if using a user account, HasIntents will always
|
|
|
|
// return true.
|
|
|
|
func (s *Session) HasIntents(intents gateway.Intents) bool {
|
|
|
|
return s.state.id.HasIntents(intents)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Gateway returns the current session's gateway. If Open has never been called
|
|
|
|
// or Session was never constructed with a gateway, then nil is returned.
|
|
|
|
func (s *Session) Gateway() *gateway.Gateway {
|
|
|
|
s.state.Lock()
|
2022-04-08 06:27:34 +00:00
|
|
|
defer s.state.Unlock()
|
|
|
|
|
|
|
|
return s.state.gateway
|
|
|
|
}
|
|
|
|
|
2022-11-18 10:09:12 +00:00
|
|
|
// GatewayOpts returns a copy of the current session's gateway options. If Open
|
|
|
|
// has never been called or Session was never constructed with a gateway, then
|
|
|
|
// the default gateway options are returned.
|
|
|
|
func (s *Session) GatewayOpts() *ws.GatewayOpts {
|
|
|
|
s.state.Lock()
|
|
|
|
defer s.state.Unlock()
|
|
|
|
|
|
|
|
opts := &gateway.DefaultGatewayOpts
|
|
|
|
if s.state.gateway != nil {
|
|
|
|
opts = s.state.gateway.Opts()
|
|
|
|
}
|
|
|
|
|
|
|
|
return opts
|
|
|
|
}
|
|
|
|
|
2022-04-08 06:27:34 +00:00
|
|
|
// GatewayError returns the gateway's error if the gateway is dead. If it's not
|
|
|
|
// dead, then nil is always returned. The check is done with GatewayIsAlive().
|
|
|
|
// If the gateway has never been started, nil will be returned (even though
|
|
|
|
// GatewayIsAlive would've returned true).
|
|
|
|
//
|
|
|
|
// This method would return what Close() would've returned if a fatal gateway
|
|
|
|
// error was found.
|
|
|
|
func (s *Session) GatewayError() error {
|
|
|
|
s.state.Lock()
|
|
|
|
defer s.state.Unlock()
|
|
|
|
|
|
|
|
if !s.gatewayIsAlive() && s.state.gateway != nil {
|
|
|
|
return s.state.gateway.LastError()
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// GatewayIsAlive returns true if the gateway is still alive, that is, it is
|
|
|
|
// either connected or is trying to reconnect after an interruption. In other
|
|
|
|
// words, false is returned if the gateway isn't open or it has exited after
|
|
|
|
// seeing a fatal error code (and therefore cannot recover).
|
|
|
|
func (s *Session) GatewayIsAlive() bool {
|
|
|
|
s.state.Lock()
|
|
|
|
defer s.state.Unlock()
|
|
|
|
|
|
|
|
return s.gatewayIsAlive()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Session) gatewayIsAlive() bool {
|
|
|
|
if s.state.gateway == nil || s.state.doneCh == nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
select {
|
|
|
|
case <-s.state.doneCh:
|
|
|
|
return false
|
|
|
|
default:
|
|
|
|
return true
|
|
|
|
}
|
2021-09-28 20:19:04 +00:00
|
|
|
}
|
|
|
|
|
2022-08-14 23:10:31 +00:00
|
|
|
// Connect opens the Discord gateway and waits until an unrecoverable error
|
|
|
|
// occurs. Always prefer this method over Open. Note that Connect will return
|
|
|
|
// when ctx is done or when s.Close is called.
|
|
|
|
//
|
|
|
|
// As an odd case, when ctx is done and if the gateway is already finished
|
|
|
|
// connecting, then a nil error will be returned (unless the gateway has an
|
|
|
|
// error). This is contrary to the common behavior of a ctx function returning
|
|
|
|
// ctx.Err().
|
|
|
|
func (s *Session) Connect(ctx context.Context) error {
|
2022-11-18 10:09:12 +00:00
|
|
|
opts := s.GatewayOpts()
|
|
|
|
|
|
|
|
for {
|
|
|
|
if err := s.Open(ctx); err != nil {
|
|
|
|
if opts.ErrorIsFatalClose(err) {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
continue
|
|
|
|
}
|
2022-08-14 23:10:31 +00:00
|
|
|
|
2022-11-18 10:09:12 +00:00
|
|
|
if err := s.Wait(ctx); err != nil {
|
|
|
|
if opts.ErrorIsFatalClose(err) {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if ctx.Err() == nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
2022-08-14 23:10:31 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-09-28 20:19:04 +00:00
|
|
|
// Open opens the Discord gateway and its handler, then waits until either the
|
2022-08-14 23:10:31 +00:00
|
|
|
// Ready or Resumed event gets through. Prefer using Connect instead of Open.
|
2021-06-10 23:48:32 +00:00
|
|
|
func (s *Session) Open(ctx context.Context) error {
|
2021-09-28 20:19:04 +00:00
|
|
|
evCh := make(chan interface{})
|
|
|
|
|
|
|
|
s.state.Lock()
|
|
|
|
defer s.state.Unlock()
|
|
|
|
|
|
|
|
if s.state.cancel != nil {
|
2022-08-14 23:10:31 +00:00
|
|
|
if err := s.close(); err != nil {
|
2021-09-28 20:19:04 +00:00
|
|
|
return err
|
|
|
|
}
|
2020-04-07 02:36:06 +00:00
|
|
|
}
|
|
|
|
|
2021-09-28 20:19:04 +00:00
|
|
|
if s.state.gateway == nil {
|
|
|
|
g, err := gateway.NewWithIdentifier(ctx, s.state.id)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
s.state.gateway = g
|
2020-04-06 20:26:00 +00:00
|
|
|
}
|
|
|
|
|
2022-10-04 05:10:20 +00:00
|
|
|
// Make a context that's stored in state so this can be used throughout.
|
|
|
|
s.state.ctx, s.state.cancel = context.WithCancel(context.Background())
|
2021-09-28 20:19:04 +00:00
|
|
|
|
|
|
|
// TODO: change this to AddSyncHandler.
|
|
|
|
rm := s.AddHandler(evCh)
|
|
|
|
defer rm()
|
|
|
|
|
|
|
|
opCh := s.state.gateway.Connect(s.state.ctx)
|
|
|
|
s.state.doneCh = ophandler.Loop(opCh, s.Handler)
|
|
|
|
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-ctx.Done():
|
2022-08-14 23:10:31 +00:00
|
|
|
s.close()
|
2021-09-28 20:19:04 +00:00
|
|
|
return ctx.Err()
|
|
|
|
|
2022-10-04 05:10:20 +00:00
|
|
|
case <-s.state.ctx.Done():
|
|
|
|
s.close()
|
|
|
|
return s.state.ctx.Err()
|
|
|
|
|
2021-09-28 20:19:04 +00:00
|
|
|
case <-s.state.doneCh:
|
|
|
|
// Event loop died.
|
|
|
|
return s.state.gateway.LastError()
|
|
|
|
|
|
|
|
case ev := <-evCh:
|
2022-10-04 05:37:40 +00:00
|
|
|
if s.DontWaitForReady {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2021-09-28 20:19:04 +00:00
|
|
|
switch ev.(type) {
|
|
|
|
case *gateway.ReadyEvent, *gateway.ResumedEvent:
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2020-01-17 02:08:03 +00:00
|
|
|
}
|
|
|
|
|
2022-08-14 23:10:31 +00:00
|
|
|
// Wait blocks until either ctx is done or the gateway stumbles on an
|
|
|
|
// unrecoverable error.
|
|
|
|
func (s *Session) Wait(ctx context.Context) error {
|
|
|
|
s.state.Lock()
|
|
|
|
doneCh := s.state.doneCh
|
|
|
|
s.state.Unlock()
|
|
|
|
|
|
|
|
if doneCh == nil {
|
|
|
|
return ErrClosed
|
|
|
|
}
|
|
|
|
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-ctx.Done():
|
|
|
|
s.Close()
|
|
|
|
// Prefer gateway errors over context errors.
|
|
|
|
if err := s.GatewayError(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return ctx.Err()
|
|
|
|
|
|
|
|
case <-doneCh:
|
|
|
|
// Event loop died.
|
|
|
|
return s.GatewayError()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-11-14 23:30:18 +00:00
|
|
|
// WithContext returns a shallow copy of Session with the context replaced in
|
|
|
|
// the API client. All methods called on the returned Session will use this
|
|
|
|
// given context.
|
|
|
|
//
|
|
|
|
// This method is thread-safe only after Open and before Close are called. Open
|
|
|
|
// and Close should not be called on the returned Session.
|
|
|
|
func (s *Session) WithContext(ctx context.Context) *Session {
|
|
|
|
cpy := *s
|
|
|
|
cpy.Client = s.Client.WithContext(ctx)
|
|
|
|
return &cpy
|
|
|
|
}
|
|
|
|
|
2022-08-22 09:18:54 +00:00
|
|
|
// AddInteractionHandler adds an interaction handler function to be handled with
|
|
|
|
// the gateway and the API client. Use this as a compatibility layer for bots
|
|
|
|
// that support both methods of hosting.
|
2022-08-23 20:46:42 +00:00
|
|
|
func (s *Session) AddInteractionHandler(h webhook.InteractionHandler) {
|
2022-08-22 09:18:54 +00:00
|
|
|
// State doesn't override this, but it doesn't touch
|
|
|
|
// InteractionCreateEvents, so it shouldn't need to.
|
2022-08-23 20:46:42 +00:00
|
|
|
s.AddHandler(func(ev *gateway.InteractionCreateEvent) {
|
|
|
|
if resp := h.HandleInteraction(&ev.InteractionEvent); resp != nil {
|
|
|
|
s.RespondInteraction(ev.ID, ev.Token, *resp)
|
2022-08-22 09:18:54 +00:00
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2022-08-23 20:46:42 +00:00
|
|
|
// AddInteractionHandlerFunc is a function variant of AddInteractionHandler.
|
|
|
|
func (s *Session) AddInteractionHandlerFunc(f webhook.InteractionHandlerFunc) {
|
|
|
|
s.AddInteractionHandler(f)
|
|
|
|
}
|
|
|
|
|
2022-11-25 19:16:13 +00:00
|
|
|
// SendGateway is a helper to send messages over the gateway. It will check
|
|
|
|
// if the gateway is open and available, then send the message.
|
|
|
|
func (s *Session) SendGateway(ctx context.Context, m ws.Event) error {
|
|
|
|
// The only necessary check here is checking if gateway is nil, however
|
|
|
|
// this will save us a bit of work in serialization.
|
|
|
|
if !s.GatewayIsAlive() {
|
|
|
|
return ErrClosed
|
|
|
|
}
|
|
|
|
|
|
|
|
return s.Gateway().Send(ctx, m)
|
|
|
|
}
|
|
|
|
|
2021-05-29 20:32:58 +00:00
|
|
|
// Close closes the underlying Websocket connection, invalidating the session
|
2021-09-28 20:19:04 +00:00
|
|
|
// ID. It will send a closing frame before ending the connection, closing it
|
|
|
|
// gracefully. This will cause the bot to appear as offline instantly. To
|
|
|
|
// prevent this behavior, change Gateway.AlwaysCloseGracefully.
|
2020-01-17 02:08:03 +00:00
|
|
|
func (s *Session) Close() error {
|
2021-09-28 20:19:04 +00:00
|
|
|
s.state.Lock()
|
|
|
|
defer s.state.Unlock()
|
|
|
|
|
2022-08-14 23:10:31 +00:00
|
|
|
return s.close()
|
2021-01-30 07:25:15 +00:00
|
|
|
}
|
|
|
|
|
2022-08-14 23:10:31 +00:00
|
|
|
func (s *Session) close() error {
|
2021-09-28 20:19:04 +00:00
|
|
|
if s.state.cancel == nil {
|
2022-08-14 23:10:31 +00:00
|
|
|
return ErrClosed
|
2021-09-28 20:19:04 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
s.state.cancel()
|
|
|
|
s.state.cancel = nil
|
|
|
|
s.state.ctx = nil
|
|
|
|
|
2022-08-14 23:10:31 +00:00
|
|
|
<-s.state.doneCh
|
2021-09-28 20:19:04 +00:00
|
|
|
s.state.doneCh = nil
|
|
|
|
|
|
|
|
return s.state.gateway.LastError()
|
2020-01-15 04:43:34 +00:00
|
|
|
}
|