2020-07-26 19:47:02 +02:00
|
|
|
// The version of ngrok ping-pong-bot, which uses a webhook to receive updates
|
|
|
|
// from Telegram, instead of long polling.
|
2020-03-30 20:57:19 +02:00
|
|
|
|
2021-12-26 15:55:24 +01:00
|
|
|
use teloxide::{
|
|
|
|
dispatching::{
|
|
|
|
stop_token::AsyncStopToken,
|
|
|
|
update_listeners::{self, StatefulListener},
|
|
|
|
},
|
|
|
|
prelude::*,
|
|
|
|
types::Update,
|
|
|
|
};
|
2020-03-30 20:57:19 +02:00
|
|
|
|
2020-07-17 12:04:25 +02:00
|
|
|
use std::{convert::Infallible, net::SocketAddr};
|
2020-03-30 20:57:19 +02:00
|
|
|
use tokio::sync::mpsc;
|
2021-03-13 17:13:24 +01:00
|
|
|
use tokio_stream::wrappers::UnboundedReceiverStream;
|
2020-03-30 20:57:19 +02:00
|
|
|
use warp::Filter;
|
|
|
|
|
2021-07-06 14:10:22 +02:00
|
|
|
use reqwest::{StatusCode, Url};
|
2020-03-30 20:57:19 +02:00
|
|
|
|
|
|
|
#[tokio::main]
|
|
|
|
async fn main() {
|
2021-12-27 16:13:46 +01:00
|
|
|
teloxide::enable_logging!();
|
|
|
|
log::info!("Starting ngrok_ping_pong_bot...");
|
|
|
|
|
|
|
|
let bot = Bot::from_env().auto_send();
|
|
|
|
|
|
|
|
let cloned_bot = bot.clone();
|
|
|
|
teloxide::repl_with_listener(
|
|
|
|
bot,
|
|
|
|
|message| async move {
|
|
|
|
message.answer("pong").await?;
|
|
|
|
respond(())
|
|
|
|
},
|
|
|
|
webhook(cloned_bot).await,
|
|
|
|
)
|
|
|
|
.await;
|
2020-03-30 20:57:19 +02:00
|
|
|
}
|
|
|
|
|
2020-07-26 19:47:02 +02:00
|
|
|
async fn handle_rejection(error: warp::Rejection) -> Result<impl warp::Reply, Infallible> {
|
2020-03-30 20:57:19 +02:00
|
|
|
log::error!("Cannot process the request due to: {:?}", error);
|
|
|
|
Ok(StatusCode::INTERNAL_SERVER_ERROR)
|
|
|
|
}
|
|
|
|
|
2021-05-22 00:15:32 +02:00
|
|
|
pub async fn webhook(bot: AutoSend<Bot>) -> impl update_listeners::UpdateListener<Infallible> {
|
2021-07-06 14:10:22 +02:00
|
|
|
let url = Url::parse("Your HTTPS ngrok URL here. Get it by `ngrok http 80`").unwrap();
|
|
|
|
|
2020-03-30 20:57:19 +02:00
|
|
|
// You might want to specify a self-signed certificate via .certificate
|
|
|
|
// method on SetWebhook.
|
2021-12-26 15:55:24 +01:00
|
|
|
bot.set_webhook(url).await.expect("Cannot setup a webhook");
|
2020-03-30 20:57:19 +02:00
|
|
|
|
|
|
|
let (tx, rx) = mpsc::unbounded_channel();
|
|
|
|
|
|
|
|
let server = warp::post()
|
|
|
|
.and(warp::body::json())
|
|
|
|
.map(move |json: serde_json::Value| {
|
2020-03-31 17:41:00 +02:00
|
|
|
if let Ok(update) = Update::try_parse(&json) {
|
2020-07-26 19:47:02 +02:00
|
|
|
tx.send(Ok(update)).expect("Cannot send an incoming update from the webhook")
|
2020-03-30 20:57:19 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
StatusCode::OK
|
|
|
|
})
|
|
|
|
.recover(handle_rejection);
|
|
|
|
|
2021-05-22 00:15:32 +02:00
|
|
|
let (stop_token, stop_flag) = AsyncStopToken::new_pair();
|
|
|
|
|
|
|
|
let addr = "127.0.0.1:80".parse::<SocketAddr>().unwrap();
|
|
|
|
let server = warp::serve(server);
|
|
|
|
let (_addr, fut) = server.bind_with_graceful_shutdown(addr, stop_flag);
|
2020-03-30 20:57:19 +02:00
|
|
|
|
|
|
|
// You might want to use serve.key_path/serve.cert_path methods here to
|
|
|
|
// setup a self-signed TLS certificate.
|
|
|
|
|
2021-05-22 00:15:32 +02:00
|
|
|
tokio::spawn(fut);
|
|
|
|
let stream = UnboundedReceiverStream::new(rx);
|
|
|
|
|
2021-12-26 15:55:24 +01:00
|
|
|
fn streamf<S, T>(state: &mut (S, T)) -> &mut S {
|
|
|
|
&mut state.0
|
|
|
|
}
|
|
|
|
|
|
|
|
StatefulListener::new((stream, stop_token), streamf, |state: &mut (_, AsyncStopToken)| {
|
|
|
|
state.1.clone()
|
|
|
|
})
|
2020-03-30 20:57:19 +02:00
|
|
|
}
|