// // Copyright Aliaksei Levin (levlam@telegram.org), Arseny Smirnov (arseny30@gmail.com) 2014-2019 // // Distributed under the Boost Software License, Version 1.0. (See accompanying // file LICENSE_1_0.txt or copy at http://www.boost.org/LICENSE_1_0.txt) // #pragma once #include "td/telegram/DialogId.h" #include "td/telegram/files/FileEncryptionKey.h" #include "td/telegram/files/FileLocation.h" #include "td/telegram/files/FileSourceId.h" #include "td/utils/common.h" #include "td/utils/format.h" #include "td/utils/StringBuilder.h" #include "td/utils/tl_helpers.h" namespace td { class FileData { public: DialogId owner_dialog_id_; uint64 pmc_id_ = 0; RemoteFileLocation remote_; LocalFileLocation local_; unique_ptr generate_; int64 size_ = 0; int64 expected_size_ = 0; string remote_name_; string url_; FileEncryptionKey encryption_key_; std::vector sources_; template void store(StorerT &storer) const { using ::td::store; bool has_owner_dialog_id = owner_dialog_id_.is_valid(); bool has_expected_size = size_ == 0 && expected_size_ != 0; bool encryption_key_is_secure = encryption_key_.is_secure(); bool has_sources = !sources_.empty(); BEGIN_STORE_FLAGS(); STORE_FLAG(has_owner_dialog_id); STORE_FLAG(has_expected_size); STORE_FLAG(encryption_key_is_secure); //TODO: uncomment //STORE_FLAG(has_sources); END_STORE_FLAGS(); if (has_owner_dialog_id) { store(owner_dialog_id_, storer); } store(pmc_id_, storer); store(remote_, storer); store(local_, storer); auto generate = generate_ == nullptr ? GenerateFileLocation() : GenerateFileLocation(*generate_); store(generate, storer); if (has_expected_size) { store(expected_size_, storer); } else { store(size_, storer); } store(remote_name_, storer); store(url_, storer); store(encryption_key_, storer); if (has_sources) { // TODO: uncomment // store(sources_, storer); } } template void parse(ParserT &parser) { using ::td::parse; bool has_owner_dialog_id; bool has_expected_size; bool encryption_key_is_secure; bool has_sources; BEGIN_PARSE_FLAGS(); PARSE_FLAG(has_owner_dialog_id); PARSE_FLAG(has_expected_size); PARSE_FLAG(encryption_key_is_secure); PARSE_FLAG(has_sources); END_PARSE_FLAGS_GENERIC(); if (has_owner_dialog_id) { parse(owner_dialog_id_, parser); } parse(pmc_id_, parser); parse(remote_, parser); parse(local_, parser); GenerateFileLocation generate; parse(generate, parser); if (generate.type() == GenerateFileLocation::Type::Full) { generate_ = make_unique(generate.full()); } else { generate_ = nullptr; } if (has_expected_size) { parse(expected_size_, parser); } else { parse(size_, parser); } parse(remote_name_, parser); parse(url_, parser); encryption_key_.parse(encryption_key_is_secure ? FileEncryptionKey::Type::Secure : FileEncryptionKey::Type::Secret, parser); if (has_sources) { //TODO: uncomment // parse(sources_, parser); } } }; inline StringBuilder &operator<<(StringBuilder &sb, const FileData &file_data) { sb << "[" << tag("remote_name", file_data.remote_name_) << " " << file_data.owner_dialog_id_ << " " << tag("size", file_data.size_) << tag("expected_size", file_data.expected_size_) << " " << file_data.encryption_key_; if (!file_data.url_.empty()) { sb << tag("url", file_data.url_); } if (file_data.local_.type() == LocalFileLocation::Type::Full) { sb << " local " << file_data.local_.full(); } if (file_data.generate_ != nullptr) { sb << " generate " << *file_data.generate_; } if (file_data.remote_.type() == RemoteFileLocation::Type::Full) { sb << " remote " << file_data.remote_.full(); } sb << format::as_array(file_data.sources_); return sb << "]"; } } // namespace td