2018-12-31 20:04:05 +01:00
|
|
|
//
|
2018-12-31 23:02:34 +01:00
|
|
|
// Copyright Aliaksei Levin (levlam@telegram.org), Arseny Smirnov (arseny30@gmail.com) 2014-2019
|
2018-12-31 20:04:05 +01:00
|
|
|
//
|
|
|
|
// Distributed under the Boost Software License, Version 1.0. (See accompanying
|
|
|
|
// file LICENSE_1_0.txt or copy at http://www.boost.org/LICENSE_1_0.txt)
|
|
|
|
//
|
|
|
|
#pragma once
|
|
|
|
|
|
|
|
#include "td/telegram/DialogId.h"
|
2018-12-27 20:24:44 +01:00
|
|
|
#include "td/telegram/files/FileEncryptionKey.h"
|
2019-02-12 15:04:12 +01:00
|
|
|
#include "td/telegram/files/FileLocation.h"
|
2019-02-07 22:00:26 +01:00
|
|
|
#include "td/telegram/files/FileLocation.hpp"
|
2018-12-31 20:04:05 +01:00
|
|
|
#include "td/telegram/files/FileManager.h"
|
2019-01-19 22:54:29 +01:00
|
|
|
#include "td/telegram/files/FileType.h"
|
2018-12-31 20:04:05 +01:00
|
|
|
#include "td/telegram/Version.h"
|
|
|
|
|
|
|
|
#include "td/utils/logging.h"
|
|
|
|
#include "td/utils/misc.h"
|
|
|
|
#include "td/utils/Slice.h"
|
|
|
|
#include "td/utils/tl_helpers.h"
|
|
|
|
|
|
|
|
namespace td {
|
|
|
|
|
|
|
|
enum class FileStoreType : int32 { Empty, Url, Generate, Local, Remote };
|
|
|
|
|
|
|
|
template <class StorerT>
|
|
|
|
void FileManager::store_file(FileId file_id, StorerT &storer, int32 ttl) const {
|
|
|
|
auto file_store_type = FileStoreType::Empty;
|
|
|
|
auto file_view = get_file_view(file_id);
|
|
|
|
if (file_view.empty() || ttl <= 0) {
|
|
|
|
} else if (file_view.has_remote_location()) {
|
|
|
|
file_store_type = FileStoreType::Remote;
|
|
|
|
} else if (file_view.has_local_location()) {
|
|
|
|
file_store_type = FileStoreType::Local;
|
2018-02-19 23:28:06 +01:00
|
|
|
} else if (file_view.has_url()) {
|
2018-12-31 20:04:05 +01:00
|
|
|
file_store_type = FileStoreType::Url;
|
|
|
|
} else if (file_view.has_generate_location()) {
|
|
|
|
file_store_type = FileStoreType::Generate;
|
|
|
|
}
|
|
|
|
|
|
|
|
store(file_store_type, storer);
|
|
|
|
|
|
|
|
bool has_encryption_key = false;
|
|
|
|
bool has_expected_size =
|
|
|
|
file_store_type == FileStoreType::Remote && file_view.size() == 0 && file_view.expected_size() != 0;
|
2018-04-03 19:49:07 +02:00
|
|
|
bool has_secure_key = false;
|
2018-12-31 20:04:05 +01:00
|
|
|
if (file_store_type != FileStoreType::Empty) {
|
2018-03-27 15:11:15 +02:00
|
|
|
has_encryption_key = !file_view.empty() && file_view.is_encrypted_secret();
|
2018-04-03 19:49:07 +02:00
|
|
|
has_secure_key = !file_view.empty() && file_view.is_encrypted_secure();
|
2018-12-31 20:04:05 +01:00
|
|
|
BEGIN_STORE_FLAGS();
|
|
|
|
STORE_FLAG(has_encryption_key);
|
|
|
|
STORE_FLAG(has_expected_size);
|
2018-04-03 19:49:07 +02:00
|
|
|
STORE_FLAG(has_secure_key);
|
2018-12-31 20:04:05 +01:00
|
|
|
END_STORE_FLAGS();
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (file_store_type) {
|
|
|
|
case FileStoreType::Empty:
|
|
|
|
break;
|
|
|
|
case FileStoreType::Url:
|
|
|
|
store(file_view.get_type(), storer);
|
|
|
|
store(file_view.url(), storer);
|
|
|
|
store(file_view.owner_dialog_id(), storer);
|
|
|
|
break;
|
|
|
|
case FileStoreType::Remote: {
|
|
|
|
store(file_view.remote_location(), storer);
|
|
|
|
if (has_expected_size) {
|
|
|
|
store(narrow_cast<int32>(file_view.expected_size()), storer);
|
|
|
|
} else {
|
|
|
|
store(narrow_cast<int32>(file_view.size()), storer);
|
|
|
|
}
|
2018-02-18 17:29:44 +01:00
|
|
|
store(file_view.remote_name(), storer);
|
2018-12-31 20:04:05 +01:00
|
|
|
store(file_view.owner_dialog_id(), storer);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case FileStoreType::Local: {
|
|
|
|
store(file_view.local_location(), storer);
|
|
|
|
store(narrow_cast<int32>(file_view.size()), storer);
|
|
|
|
store(static_cast<int32>(file_view.get_by_hash()), storer);
|
|
|
|
store(file_view.owner_dialog_id(), storer);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case FileStoreType::Generate: {
|
|
|
|
auto generate_location = file_view.generate_location();
|
|
|
|
FileId from_file_id;
|
|
|
|
bool have_file_id = false;
|
|
|
|
if (generate_location.conversion_ == "#_file_id#") {
|
|
|
|
break;
|
|
|
|
} else if (begins_with(generate_location.conversion_, "#file_id#")) {
|
|
|
|
// It is not the best possible way to serialize file_id
|
|
|
|
from_file_id =
|
2018-03-06 19:31:20 +01:00
|
|
|
FileId(to_integer<int32>(Slice(generate_location.conversion_).remove_prefix(Slice("#file_id#").size())), 0);
|
2018-12-31 20:04:05 +01:00
|
|
|
generate_location.conversion_ = "#_file_id#";
|
|
|
|
have_file_id = true;
|
|
|
|
}
|
|
|
|
store(generate_location, storer);
|
2019-01-01 17:26:36 +01:00
|
|
|
store(static_cast<int32>(file_view.expected_size()), storer);
|
2018-12-31 20:04:05 +01:00
|
|
|
store(static_cast<int32>(0), storer);
|
|
|
|
store(file_view.owner_dialog_id(), storer);
|
|
|
|
|
|
|
|
if (have_file_id) {
|
|
|
|
store_file(from_file_id, storer, ttl - 1);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
2019-01-01 17:26:36 +01:00
|
|
|
default:
|
|
|
|
UNREACHABLE();
|
2018-12-31 20:04:05 +01:00
|
|
|
}
|
|
|
|
if (has_encryption_key) {
|
|
|
|
store(file_view.encryption_key(), storer);
|
2018-04-03 19:49:07 +02:00
|
|
|
} else if (has_secure_key) {
|
|
|
|
store(file_view.encryption_key(), storer);
|
2018-12-31 20:04:05 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
template <class ParserT>
|
|
|
|
FileId FileManager::parse_file(ParserT &parser) {
|
|
|
|
if (parser.version() < static_cast<int32>(Version::StoreFileId)) {
|
|
|
|
return FileId();
|
|
|
|
}
|
|
|
|
|
|
|
|
FileStoreType file_store_type;
|
|
|
|
parse(file_store_type, parser);
|
|
|
|
|
|
|
|
bool has_encryption_key = false;
|
|
|
|
bool has_expected_size = false;
|
2018-04-03 19:49:07 +02:00
|
|
|
bool has_secure_key = false;
|
2018-12-31 20:04:05 +01:00
|
|
|
if (file_store_type != FileStoreType::Empty) {
|
|
|
|
if (parser.version() >= static_cast<int32>(Version::StoreFileEncryptionKey)) {
|
|
|
|
BEGIN_PARSE_FLAGS();
|
|
|
|
PARSE_FLAG(has_encryption_key);
|
|
|
|
PARSE_FLAG(has_expected_size);
|
2018-04-03 19:49:07 +02:00
|
|
|
PARSE_FLAG(has_secure_key);
|
2018-12-31 20:04:05 +01:00
|
|
|
END_PARSE_FLAGS();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
auto file_id = [&] {
|
|
|
|
switch (file_store_type) {
|
|
|
|
case FileStoreType::Empty:
|
|
|
|
return FileId();
|
|
|
|
case FileStoreType::Remote: {
|
|
|
|
FullRemoteFileLocation full_remote_location;
|
|
|
|
parse(full_remote_location, parser);
|
|
|
|
int32 size = 0;
|
|
|
|
int32 expected_size = 0;
|
|
|
|
if (has_expected_size) {
|
|
|
|
parse(expected_size, parser);
|
|
|
|
} else {
|
|
|
|
parse(size, parser);
|
|
|
|
}
|
|
|
|
string name;
|
|
|
|
parse(name, parser);
|
|
|
|
DialogId owner_dialog_id;
|
|
|
|
if (parser.version() >= static_cast<int32>(Version::StoreFileOwnerId)) {
|
|
|
|
parse(owner_dialog_id, parser);
|
|
|
|
}
|
2018-01-26 13:56:19 +01:00
|
|
|
return register_remote(full_remote_location, FileLocationSource::FromDb, owner_dialog_id, size, expected_size,
|
|
|
|
name);
|
2018-12-31 20:04:05 +01:00
|
|
|
}
|
|
|
|
case FileStoreType::Local: {
|
|
|
|
FullLocalFileLocation full_local_location;
|
|
|
|
parse(full_local_location, parser);
|
|
|
|
int32 size;
|
|
|
|
parse(size, parser);
|
|
|
|
int32 get_by_hash;
|
|
|
|
parse(get_by_hash, parser);
|
|
|
|
DialogId owner_dialog_id;
|
|
|
|
if (parser.version() >= static_cast<int32>(Version::StoreFileOwnerId)) {
|
|
|
|
parse(owner_dialog_id, parser);
|
|
|
|
}
|
|
|
|
auto r_file_id = register_local(full_local_location, owner_dialog_id, size, get_by_hash != 0);
|
|
|
|
if (r_file_id.is_ok()) {
|
|
|
|
return r_file_id.move_as_ok();
|
|
|
|
}
|
|
|
|
LOG(ERROR) << "Can't resend local file " << full_local_location.path_;
|
2018-01-20 15:57:52 +01:00
|
|
|
return register_empty(full_local_location.file_type_);
|
2018-12-31 20:04:05 +01:00
|
|
|
}
|
|
|
|
case FileStoreType::Generate: {
|
|
|
|
FullGenerateFileLocation full_generated_location;
|
|
|
|
parse(full_generated_location, parser);
|
|
|
|
int32 expected_size;
|
2019-01-01 17:26:36 +01:00
|
|
|
parse(expected_size, parser);
|
2018-12-31 20:04:05 +01:00
|
|
|
int32 zero;
|
|
|
|
parse(zero, parser);
|
|
|
|
DialogId owner_dialog_id;
|
|
|
|
if (parser.version() >= static_cast<int32>(Version::StoreFileOwnerId)) {
|
|
|
|
parse(owner_dialog_id, parser);
|
|
|
|
}
|
|
|
|
if (begins_with(full_generated_location.conversion_, "#file_id#")) {
|
|
|
|
LOG(ERROR) << "Can't resend message with '#file_id#...' location";
|
2018-01-20 15:57:52 +01:00
|
|
|
return register_empty(full_generated_location.file_type_);
|
2018-12-31 20:04:05 +01:00
|
|
|
}
|
|
|
|
if (full_generated_location.conversion_ == "#_file_id#") {
|
|
|
|
auto file_id = parse_file(parser);
|
|
|
|
if (file_id.empty()) {
|
2018-01-20 15:57:52 +01:00
|
|
|
return register_empty(full_generated_location.file_type_);
|
2018-12-31 20:04:05 +01:00
|
|
|
}
|
|
|
|
auto download_file_id = dup_file_id(file_id);
|
|
|
|
full_generated_location.conversion_ = PSTRING() << "#file_id#" << download_file_id.get();
|
|
|
|
}
|
|
|
|
|
2018-01-26 13:56:19 +01:00
|
|
|
auto r_file_id = register_generate(full_generated_location.file_type_, FileLocationSource::FromDb,
|
|
|
|
full_generated_location.original_path_, full_generated_location.conversion_,
|
|
|
|
owner_dialog_id, expected_size);
|
2018-12-31 20:04:05 +01:00
|
|
|
if (r_file_id.is_ok()) {
|
|
|
|
return r_file_id.move_as_ok();
|
|
|
|
}
|
2018-01-20 15:57:52 +01:00
|
|
|
return register_empty(full_generated_location.file_type_);
|
2018-12-31 20:04:05 +01:00
|
|
|
}
|
|
|
|
case FileStoreType::Url: {
|
|
|
|
FileType type;
|
|
|
|
string url;
|
|
|
|
parse(type, parser);
|
|
|
|
parse(url, parser);
|
|
|
|
DialogId owner_dialog_id;
|
|
|
|
if (parser.version() >= static_cast<int32>(Version::StoreFileOwnerId)) {
|
|
|
|
parse(owner_dialog_id, parser);
|
|
|
|
}
|
2018-01-26 13:56:19 +01:00
|
|
|
return register_url(url, type, FileLocationSource::FromDb, owner_dialog_id);
|
2018-12-31 20:04:05 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return FileId();
|
|
|
|
}();
|
|
|
|
|
|
|
|
if (has_encryption_key) {
|
|
|
|
FileEncryptionKey encryption_key;
|
2018-04-03 19:49:07 +02:00
|
|
|
encryption_key.parse(FileEncryptionKey::Type::Secret, parser);
|
|
|
|
set_encryption_key(file_id, std::move(encryption_key));
|
|
|
|
} else if (has_secure_key) {
|
|
|
|
FileEncryptionKey encryption_key;
|
|
|
|
encryption_key.parse(FileEncryptionKey::Type::Secure, parser);
|
2018-12-31 20:04:05 +01:00
|
|
|
set_encryption_key(file_id, std::move(encryption_key));
|
|
|
|
}
|
|
|
|
|
|
|
|
return file_id;
|
|
|
|
}
|
|
|
|
|
|
|
|
} // namespace td
|