3019 lines
		
	
	
	
		
			85 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
			
		
		
	
	
			3019 lines
		
	
	
	
		
			85 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
| /*
 | |
| This file is part of Telegram Desktop,
 | |
| the official desktop application for the Telegram messaging service.
 | |
| 
 | |
| For license and copyright information please follow this link:
 | |
| https://github.com/telegramdesktop/tdesktop/blob/master/LEGAL
 | |
| */
 | |
| #include "storage/storage_account.h"
 | |
| 
 | |
| #include "storage/localstorage.h"
 | |
| #include "storage/storage_domain.h"
 | |
| #include "storage/storage_encryption.h"
 | |
| #include "storage/storage_clear_legacy.h"
 | |
| #include "storage/cache/storage_cache_types.h"
 | |
| #include "storage/details/storage_file_utilities.h"
 | |
| #include "storage/details/storage_settings_scheme.h"
 | |
| #include "storage/serialize_common.h"
 | |
| #include "storage/serialize_peer.h"
 | |
| #include "storage/serialize_document.h"
 | |
| #include "main/main_account.h"
 | |
| #include "main/main_session.h"
 | |
| #include "mtproto/mtproto_config.h"
 | |
| #include "mtproto/mtproto_dc_options.h"
 | |
| #include "mtproto/mtp_instance.h"
 | |
| #include "lang/lang_keys.h"
 | |
| #include "history/history.h"
 | |
| #include "core/application.h"
 | |
| #include "core/core_settings.h"
 | |
| #include "core/file_location.h"
 | |
| #include "data/stickers/data_stickers.h"
 | |
| #include "data/data_session.h"
 | |
| #include "data/data_document.h"
 | |
| #include "data/data_user.h"
 | |
| #include "data/data_drafts.h"
 | |
| #include "export/export_settings.h"
 | |
| #include "window/themes/window_theme.h"
 | |
| 
 | |
| namespace Storage {
 | |
| namespace {
 | |
| 
 | |
| using namespace details;
 | |
| using Database = Cache::Database;
 | |
| 
 | |
| constexpr auto kDelayedWriteTimeout = crl::time(1000);
 | |
| 
 | |
| constexpr auto kStickersVersionTag = quint32(-1);
 | |
| constexpr auto kStickersSerializeVersion = 4;
 | |
| constexpr auto kMaxSavedStickerSetsCount = 1000;
 | |
| constexpr auto kDefaultStickerInstallDate = TimeId(1);
 | |
| 
 | |
| constexpr auto kSinglePeerTypeUserOld = qint32(1);
 | |
| constexpr auto kSinglePeerTypeChatOld = qint32(2);
 | |
| constexpr auto kSinglePeerTypeChannelOld = qint32(3);
 | |
| constexpr auto kSinglePeerTypeUser = qint32(8 + 1);
 | |
| constexpr auto kSinglePeerTypeChat = qint32(8 + 2);
 | |
| constexpr auto kSinglePeerTypeChannel = qint32(8 + 3);
 | |
| constexpr auto kSinglePeerTypeSelf = qint32(4);
 | |
| constexpr auto kSinglePeerTypeEmpty = qint32(0);
 | |
| constexpr auto kMultiDraftTagOld = quint64(0xFFFF'FFFF'FFFF'FF01ULL);
 | |
| constexpr auto kMultiDraftCursorsTagOld = quint64(0xFFFF'FFFF'FFFF'FF02ULL);
 | |
| constexpr auto kMultiDraftTag = quint64(0xFFFF'FFFF'FFFF'FF03ULL);
 | |
| constexpr auto kMultiDraftCursorsTag = quint64(0xFFFF'FFFF'FFFF'FF04ULL);
 | |
| constexpr auto kRichDraftsTag = quint64(0xFFFF'FFFF'FFFF'FF05ULL);
 | |
| 
 | |
| enum { // Local Storage Keys
 | |
| 	lskUserMap = 0x00,
 | |
| 	lskDraft = 0x01, // data: PeerId peer
 | |
| 	lskDraftPosition = 0x02, // data: PeerId peer
 | |
| 	lskLegacyImages = 0x03, // legacy
 | |
| 	lskLocations = 0x04, // no data
 | |
| 	lskLegacyStickerImages = 0x05, // legacy
 | |
| 	lskLegacyAudios = 0x06, // legacy
 | |
| 	lskRecentStickersOld = 0x07, // no data
 | |
| 	lskBackgroundOldOld = 0x08, // no data
 | |
| 	lskUserSettings = 0x09, // no data
 | |
| 	lskRecentHashtagsAndBots = 0x0a, // no data
 | |
| 	lskStickersOld = 0x0b, // no data
 | |
| 	lskSavedPeersOld = 0x0c, // no data
 | |
| 	lskReportSpamStatusesOld = 0x0d, // no data
 | |
| 	lskSavedGifsOld = 0x0e, // no data
 | |
| 	lskSavedGifs = 0x0f, // no data
 | |
| 	lskStickersKeys = 0x10, // no data
 | |
| 	lskTrustedBots = 0x11, // no data
 | |
| 	lskFavedStickers = 0x12, // no data
 | |
| 	lskExportSettings = 0x13, // no data
 | |
| 	lskBackgroundOld = 0x14, // no data
 | |
| 	lskSelfSerialized = 0x15, // serialized self
 | |
| 	lskMasksKeys = 0x16, // no data
 | |
| 	lskCustomEmojiKeys = 0x17, // no data
 | |
| };
 | |
| 
 | |
| auto EmptyMessageDraftSources()
 | |
| -> const base::flat_map<Data::DraftKey, MessageDraftSource> & {
 | |
| 	static const auto result = base::flat_map<
 | |
| 		Data::DraftKey,
 | |
| 		MessageDraftSource>();
 | |
| 	return result;
 | |
| }
 | |
| 
 | |
| [[nodiscard]] FileKey ComputeDataNameKey(const QString &dataName) {
 | |
| 	// We dropped old test authorizations when migrated to multi auth.
 | |
| 	//const auto testAddition = (cTestMode() ? u":/test/"_q : QString());
 | |
| 	const auto testAddition = QString();
 | |
| 	const auto dataNameUtf8 = (dataName + testAddition).toUtf8();
 | |
| 	FileKey dataNameHash[2] = { 0 };
 | |
| 	hashMd5(dataNameUtf8.constData(), dataNameUtf8.size(), dataNameHash);
 | |
| 	return dataNameHash[0];
 | |
| }
 | |
| 
 | |
| [[nodiscard]] QString BaseGlobalPath() {
 | |
| 	return cWorkingDir() + u"tdata/"_q;
 | |
| }
 | |
| 
 | |
| [[nodiscard]] QString ComputeDatabasePath(const QString &dataName) {
 | |
| 	return BaseGlobalPath()
 | |
| 		+ "user_" + dataName
 | |
| 		// We dropped old test authorizations when migrated to multi auth.
 | |
| 		//+ (cTestMode() ? "[test]" : "")
 | |
| 		+ '/';
 | |
| }
 | |
| 
 | |
| [[nodiscard]] QString LegacyTempDirectory() {
 | |
| 	return cWorkingDir() + u"tdata/tdld/"_q;
 | |
| }
 | |
| 
 | |
| } // namespace
 | |
| 
 | |
| Account::Account(not_null<Main::Account*> owner, const QString &dataName)
 | |
| : _owner(owner)
 | |
| , _dataName(dataName)
 | |
| , _dataNameKey(ComputeDataNameKey(dataName))
 | |
| , _basePath(BaseGlobalPath() + ToFilePart(_dataNameKey) + QChar('/'))
 | |
| , _tempPath(BaseGlobalPath() + "temp_" + _dataName + QChar('/'))
 | |
| , _databasePath(ComputeDatabasePath(dataName))
 | |
| , _cacheTotalSizeLimit(Database::Settings().totalSizeLimit)
 | |
| , _cacheBigFileTotalSizeLimit(Database::Settings().totalSizeLimit)
 | |
| , _cacheTotalTimeLimit(Database::Settings().totalTimeLimit)
 | |
| , _cacheBigFileTotalTimeLimit(Database::Settings().totalTimeLimit)
 | |
| , _writeMapTimer([=] { writeMap(); })
 | |
| , _writeLocationsTimer([=] { writeLocations(); }) {
 | |
| }
 | |
| 
 | |
| Account::~Account() {
 | |
| 	if (_localKey && _mapChanged) {
 | |
| 		writeMap();
 | |
| 	}
 | |
| }
 | |
| 
 | |
| QString Account::tempDirectory() const {
 | |
| 	return _tempPath;
 | |
| }
 | |
| 
 | |
| StartResult Account::legacyStart(const QByteArray &passcode) {
 | |
| 	const auto result = readMapWith(MTP::AuthKeyPtr(), passcode);
 | |
| 	if (result == ReadMapResult::Failed) {
 | |
| 		Assert(_localKey == nullptr);
 | |
| 	} else if (result == ReadMapResult::IncorrectPasscode) {
 | |
| 		return StartResult::IncorrectPasscodeLegacy;
 | |
| 	}
 | |
| 	clearLegacyFiles();
 | |
| 	return StartResult::Success;
 | |
| }
 | |
| 
 | |
| std::unique_ptr<MTP::Config> Account::start(MTP::AuthKeyPtr localKey) {
 | |
| 	Expects(localKey != nullptr);
 | |
| 
 | |
| 	_localKey = std::move(localKey);
 | |
| 	readMapWith(_localKey);
 | |
| 	clearLegacyFiles();
 | |
| 	return readMtpConfig();
 | |
| }
 | |
| 
 | |
| void Account::startAdded(MTP::AuthKeyPtr localKey) {
 | |
| 	Expects(localKey != nullptr);
 | |
| 
 | |
| 	_localKey = std::move(localKey);
 | |
| 	clearLegacyFiles();
 | |
| }
 | |
| 
 | |
| void Account::clearLegacyFiles() {
 | |
| 	const auto weak = base::make_weak(_owner);
 | |
| 	ClearLegacyFiles(_basePath, [weak, this](
 | |
| 			FnMut<void(base::flat_set<QString>&&)> then) {
 | |
| 		crl::on_main(weak, [this, then = std::move(then)]() mutable {
 | |
| 			then(collectGoodNames());
 | |
| 		});
 | |
| 	});
 | |
| }
 | |
| 
 | |
| base::flat_set<QString> Account::collectGoodNames() const {
 | |
| 	const auto keys = {
 | |
| 		_locationsKey,
 | |
| 		_settingsKey,
 | |
| 		_installedStickersKey,
 | |
| 		_featuredStickersKey,
 | |
| 		_recentStickersKey,
 | |
| 		_favedStickersKey,
 | |
| 		_archivedStickersKey,
 | |
| 		_recentStickersKeyOld,
 | |
| 		_savedGifsKey,
 | |
| 		_legacyBackgroundKeyNight,
 | |
| 		_legacyBackgroundKeyDay,
 | |
| 		_recentHashtagsAndBotsKey,
 | |
| 		_exportSettingsKey,
 | |
| 		_trustedBotsKey,
 | |
| 		_installedMasksKey,
 | |
| 		_recentMasksKey,
 | |
| 		_archivedMasksKey,
 | |
| 		_installedCustomEmojiKey,
 | |
| 		_featuredCustomEmojiKey,
 | |
| 		_archivedCustomEmojiKey,
 | |
| 	};
 | |
| 	auto result = base::flat_set<QString>{
 | |
| 		"map0",
 | |
| 		"map1",
 | |
| 		"maps",
 | |
| 		"configs",
 | |
| 	};
 | |
| 	const auto push = [&](FileKey key) {
 | |
| 		if (!key) {
 | |
| 			return;
 | |
| 		}
 | |
| 		auto name = ToFilePart(key) + '0';
 | |
| 		result.emplace(name);
 | |
| 		name[name.size() - 1] = '1';
 | |
| 		result.emplace(name);
 | |
| 		name[name.size() - 1] = 's';
 | |
| 		result.emplace(name);
 | |
| 	};
 | |
| 	for (const auto &[key, value] : _draftsMap) {
 | |
| 		push(value);
 | |
| 	}
 | |
| 	for (const auto &[key, value] : _draftCursorsMap) {
 | |
| 		push(value);
 | |
| 	}
 | |
| 	for (const auto &value : keys) {
 | |
| 		push(value);
 | |
| 	}
 | |
| 	return result;
 | |
| }
 | |
| 
 | |
| Account::ReadMapResult Account::readMapWith(
 | |
| 		MTP::AuthKeyPtr localKey,
 | |
| 		const QByteArray &legacyPasscode) {
 | |
| 	auto ms = crl::now();
 | |
| 
 | |
| 	FileReadDescriptor mapData;
 | |
| 	if (!ReadFile(mapData, u"map"_q, _basePath)) {
 | |
| 		return ReadMapResult::Failed;
 | |
| 	}
 | |
| 	LOG(("App Info: reading map..."));
 | |
| 
 | |
| 	QByteArray legacySalt, legacyKeyEncrypted, mapEncrypted;
 | |
| 	mapData.stream >> legacySalt >> legacyKeyEncrypted >> mapEncrypted;
 | |
| 	if (!CheckStreamStatus(mapData.stream)) {
 | |
| 		return ReadMapResult::Failed;
 | |
| 	}
 | |
| 	if (!localKey) {
 | |
| 		if (legacySalt.size() != LocalEncryptSaltSize) {
 | |
| 			LOG(("App Error: bad salt in map file, size: %1").arg(legacySalt.size()));
 | |
| 			return ReadMapResult::Failed;
 | |
| 		}
 | |
| 		auto legacyPasscodeKey = CreateLegacyLocalKey(legacyPasscode, legacySalt);
 | |
| 
 | |
| 		EncryptedDescriptor keyData;
 | |
| 		if (!DecryptLocal(keyData, legacyKeyEncrypted, legacyPasscodeKey)) {
 | |
| 			LOG(("App Info: could not decrypt pass-protected key from map file, maybe bad password..."));
 | |
| 			return ReadMapResult::IncorrectPasscode;
 | |
| 		}
 | |
| 		auto key = Serialize::read<MTP::AuthKey::Data>(keyData.stream);
 | |
| 		if (keyData.stream.status() != QDataStream::Ok || !keyData.stream.atEnd()) {
 | |
| 			LOG(("App Error: could not read pass-protected key from map file"));
 | |
| 			return ReadMapResult::Failed;
 | |
| 		}
 | |
| 		localKey = std::make_shared<MTP::AuthKey>(key);
 | |
| 	}
 | |
| 
 | |
| 	EncryptedDescriptor map;
 | |
| 	if (!DecryptLocal(map, mapEncrypted, localKey)) {
 | |
| 		LOG(("App Error: could not decrypt map."));
 | |
| 		return ReadMapResult::Failed;
 | |
| 	}
 | |
| 	LOG(("App Info: reading encrypted map..."));
 | |
| 
 | |
| 	QByteArray selfSerialized;
 | |
| 	base::flat_map<PeerId, FileKey> draftsMap;
 | |
| 	base::flat_map<PeerId, FileKey> draftCursorsMap;
 | |
| 	base::flat_map<PeerId, bool> draftsNotReadMap;
 | |
| 	quint64 locationsKey = 0, reportSpamStatusesKey = 0, trustedBotsKey = 0;
 | |
| 	quint64 recentStickersKeyOld = 0;
 | |
| 	quint64 installedStickersKey = 0, featuredStickersKey = 0, recentStickersKey = 0, favedStickersKey = 0, archivedStickersKey = 0;
 | |
| 	quint64 installedMasksKey = 0, recentMasksKey = 0, archivedMasksKey = 0;
 | |
| 	quint64 installedCustomEmojiKey = 0, featuredCustomEmojiKey = 0, archivedCustomEmojiKey = 0;
 | |
| 	quint64 savedGifsKey = 0;
 | |
| 	quint64 legacyBackgroundKeyDay = 0, legacyBackgroundKeyNight = 0;
 | |
| 	quint64 userSettingsKey = 0, recentHashtagsAndBotsKey = 0, exportSettingsKey = 0;
 | |
| 	while (!map.stream.atEnd()) {
 | |
| 		quint32 keyType;
 | |
| 		map.stream >> keyType;
 | |
| 		switch (keyType) {
 | |
| 		case lskDraft: {
 | |
| 			quint32 count = 0;
 | |
| 			map.stream >> count;
 | |
| 			for (quint32 i = 0; i < count; ++i) {
 | |
| 				FileKey key;
 | |
| 				quint64 peerIdSerialized;
 | |
| 				map.stream >> key >> peerIdSerialized;
 | |
| 				const auto peerId = DeserializePeerId(peerIdSerialized);
 | |
| 				draftsMap.emplace(peerId, key);
 | |
| 				draftsNotReadMap.emplace(peerId, true);
 | |
| 			}
 | |
| 		} break;
 | |
| 		case lskSelfSerialized: {
 | |
| 			map.stream >> selfSerialized;
 | |
| 		} break;
 | |
| 		case lskDraftPosition: {
 | |
| 			quint32 count = 0;
 | |
| 			map.stream >> count;
 | |
| 			for (quint32 i = 0; i < count; ++i) {
 | |
| 				FileKey key;
 | |
| 				quint64 peerIdSerialized;
 | |
| 				map.stream >> key >> peerIdSerialized;
 | |
| 				const auto peerId = DeserializePeerId(peerIdSerialized);
 | |
| 				draftCursorsMap.emplace(peerId, key);
 | |
| 			}
 | |
| 		} break;
 | |
| 		case lskLegacyImages:
 | |
| 		case lskLegacyStickerImages:
 | |
| 		case lskLegacyAudios: {
 | |
| 			quint32 count = 0;
 | |
| 			map.stream >> count;
 | |
| 			for (quint32 i = 0; i < count; ++i) {
 | |
| 				FileKey key;
 | |
| 				quint64 first, second;
 | |
| 				qint32 size;
 | |
| 				map.stream >> key >> first >> second >> size;
 | |
| 				// Just ignore the key, it will be removed as a leaked one.
 | |
| 			}
 | |
| 		} break;
 | |
| 		case lskLocations: {
 | |
| 			map.stream >> locationsKey;
 | |
| 		} break;
 | |
| 		case lskReportSpamStatusesOld: {
 | |
| 			map.stream >> reportSpamStatusesKey;
 | |
| 			ClearKey(reportSpamStatusesKey, _basePath);
 | |
| 		} break;
 | |
| 		case lskTrustedBots: {
 | |
| 			map.stream >> trustedBotsKey;
 | |
| 		} break;
 | |
| 		case lskRecentStickersOld: {
 | |
| 			map.stream >> recentStickersKeyOld;
 | |
| 		} break;
 | |
| 		case lskBackgroundOldOld: {
 | |
| 			map.stream >> (Window::Theme::IsNightMode()
 | |
| 				? legacyBackgroundKeyNight
 | |
| 				: legacyBackgroundKeyDay);
 | |
| 		} break;
 | |
| 		case lskBackgroundOld: {
 | |
| 			map.stream >> legacyBackgroundKeyDay >> legacyBackgroundKeyNight;
 | |
| 		} break;
 | |
| 		case lskUserSettings: {
 | |
| 			map.stream >> userSettingsKey;
 | |
| 		} break;
 | |
| 		case lskRecentHashtagsAndBots: {
 | |
| 			map.stream >> recentHashtagsAndBotsKey;
 | |
| 		} break;
 | |
| 		case lskStickersOld: {
 | |
| 			map.stream >> installedStickersKey;
 | |
| 		} break;
 | |
| 		case lskStickersKeys: {
 | |
| 			map.stream >> installedStickersKey >> featuredStickersKey >> recentStickersKey >> archivedStickersKey;
 | |
| 		} break;
 | |
| 		case lskFavedStickers: {
 | |
| 			map.stream >> favedStickersKey;
 | |
| 		} break;
 | |
| 		case lskSavedGifsOld: {
 | |
| 			quint64 key;
 | |
| 			map.stream >> key;
 | |
| 		} break;
 | |
| 		case lskSavedGifs: {
 | |
| 			map.stream >> savedGifsKey;
 | |
| 		} break;
 | |
| 		case lskSavedPeersOld: {
 | |
| 			quint64 key;
 | |
| 			map.stream >> key;
 | |
| 		} break;
 | |
| 		case lskExportSettings: {
 | |
| 			map.stream >> exportSettingsKey;
 | |
| 		} break;
 | |
| 		case lskMasksKeys: {
 | |
| 			map.stream
 | |
| 				>> installedMasksKey
 | |
| 				>> recentMasksKey
 | |
| 				>> archivedMasksKey;
 | |
| 		} break;
 | |
| 		case lskCustomEmojiKeys: {
 | |
| 			map.stream
 | |
| 				>> installedCustomEmojiKey
 | |
| 				>> featuredCustomEmojiKey
 | |
| 				>> archivedCustomEmojiKey;
 | |
| 		} break;
 | |
| 		default:
 | |
| 			LOG(("App Error: unknown key type in encrypted map: %1").arg(keyType));
 | |
| 			return ReadMapResult::Failed;
 | |
| 		}
 | |
| 		if (!CheckStreamStatus(map.stream)) {
 | |
| 			return ReadMapResult::Failed;
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	_localKey = std::move(localKey);
 | |
| 
 | |
| 	_draftsMap = draftsMap;
 | |
| 	_draftCursorsMap = draftCursorsMap;
 | |
| 	_draftsNotReadMap = draftsNotReadMap;
 | |
| 
 | |
| 	_locationsKey = locationsKey;
 | |
| 	_trustedBotsKey = trustedBotsKey;
 | |
| 	_recentStickersKeyOld = recentStickersKeyOld;
 | |
| 	_installedStickersKey = installedStickersKey;
 | |
| 	_featuredStickersKey = featuredStickersKey;
 | |
| 	_recentStickersKey = recentStickersKey;
 | |
| 	_favedStickersKey = favedStickersKey;
 | |
| 	_archivedStickersKey = archivedStickersKey;
 | |
| 	_savedGifsKey = savedGifsKey;
 | |
| 	_installedMasksKey = installedMasksKey;
 | |
| 	_recentMasksKey = recentMasksKey;
 | |
| 	_archivedMasksKey = archivedMasksKey;
 | |
| 	_installedCustomEmojiKey = installedCustomEmojiKey;
 | |
| 	_featuredCustomEmojiKey = featuredCustomEmojiKey;
 | |
| 	_archivedCustomEmojiKey = archivedCustomEmojiKey;
 | |
| 	_legacyBackgroundKeyDay = legacyBackgroundKeyDay;
 | |
| 	_legacyBackgroundKeyNight = legacyBackgroundKeyNight;
 | |
| 	_settingsKey = userSettingsKey;
 | |
| 	_recentHashtagsAndBotsKey = recentHashtagsAndBotsKey;
 | |
| 	_exportSettingsKey = exportSettingsKey;
 | |
| 	_oldMapVersion = mapData.version;
 | |
| 
 | |
| 	if (_oldMapVersion < AppVersion) {
 | |
| 		writeMapDelayed();
 | |
| 	} else {
 | |
| 		_mapChanged = false;
 | |
| 	}
 | |
| 
 | |
| 	if (_locationsKey) {
 | |
| 		readLocations();
 | |
| 	}
 | |
| 	if (_legacyBackgroundKeyDay || _legacyBackgroundKeyNight) {
 | |
| 		Local::moveLegacyBackground(
 | |
| 			_basePath,
 | |
| 			_localKey,
 | |
| 			_legacyBackgroundKeyDay,
 | |
| 			_legacyBackgroundKeyNight);
 | |
| 	}
 | |
| 
 | |
| 	auto stored = readSessionSettings();
 | |
| 	readMtpData();
 | |
| 
 | |
| 	DEBUG_LOG(("selfSerialized set: %1").arg(selfSerialized.size()));
 | |
| 	_owner->setSessionFromStorage(
 | |
| 		std::move(stored),
 | |
| 		std::move(selfSerialized),
 | |
| 		_oldMapVersion);
 | |
| 
 | |
| 	LOG(("Map read time: %1").arg(crl::now() - ms));
 | |
| 
 | |
| 	return ReadMapResult::Success;
 | |
| }
 | |
| 
 | |
| void Account::writeMapDelayed() {
 | |
| 	_mapChanged = true;
 | |
| 	_writeMapTimer.callOnce(kDelayedWriteTimeout);
 | |
| }
 | |
| 
 | |
| void Account::writeMapQueued() {
 | |
| 	_mapChanged = true;
 | |
| 	crl::on_main(_owner, [=] {
 | |
| 		writeMap();
 | |
| 	});
 | |
| }
 | |
| 
 | |
| void Account::writeMap() {
 | |
| 	Expects(_localKey != nullptr);
 | |
| 
 | |
| 	_writeMapTimer.cancel();
 | |
| 	if (!_mapChanged) {
 | |
| 		return;
 | |
| 	}
 | |
| 	_mapChanged = false;
 | |
| 
 | |
| 	if (!QDir().exists(_basePath)) {
 | |
| 		QDir().mkpath(_basePath);
 | |
| 	}
 | |
| 
 | |
| 	FileWriteDescriptor map(u"map"_q, _basePath);
 | |
| 	map.writeData(QByteArray());
 | |
| 	map.writeData(QByteArray());
 | |
| 
 | |
| 	uint32 mapSize = 0;
 | |
| 	const auto self = [&] {
 | |
| 		if (!_owner->sessionExists()) {
 | |
| 			DEBUG_LOG(("AuthSelf Warning: Session does not exist."));
 | |
| 			return QByteArray();
 | |
| 		}
 | |
| 		const auto self = _owner->session().user();
 | |
| 		if (self->phone().isEmpty()) {
 | |
| 			DEBUG_LOG(("AuthSelf Error: Phone is empty."));
 | |
| 			return QByteArray();
 | |
| 		}
 | |
| 		auto result = QByteArray();
 | |
| 		result.reserve(Serialize::peerSize(self)
 | |
| 			+ Serialize::stringSize(self->about()));
 | |
| 		{
 | |
| 			QBuffer buffer(&result);
 | |
| 			buffer.open(QIODevice::WriteOnly);
 | |
| 			QDataStream stream(&buffer);
 | |
| 			Serialize::writePeer(stream, self);
 | |
| 			stream << self->about();
 | |
| 		}
 | |
| 		return result;
 | |
| 	}();
 | |
| 	if (!self.isEmpty()) mapSize += sizeof(quint32) + Serialize::bytearraySize(self);
 | |
| 	if (!_draftsMap.empty()) mapSize += sizeof(quint32) * 2 + _draftsMap.size() * sizeof(quint64) * 2;
 | |
| 	if (!_draftCursorsMap.empty()) mapSize += sizeof(quint32) * 2 + _draftCursorsMap.size() * sizeof(quint64) * 2;
 | |
| 	if (_locationsKey) mapSize += sizeof(quint32) + sizeof(quint64);
 | |
| 	if (_trustedBotsKey) mapSize += sizeof(quint32) + sizeof(quint64);
 | |
| 	if (_recentStickersKeyOld) mapSize += sizeof(quint32) + sizeof(quint64);
 | |
| 	if (_installedStickersKey || _featuredStickersKey || _recentStickersKey || _archivedStickersKey) {
 | |
| 		mapSize += sizeof(quint32) + 4 * sizeof(quint64);
 | |
| 	}
 | |
| 	if (_favedStickersKey) mapSize += sizeof(quint32) + sizeof(quint64);
 | |
| 	if (_savedGifsKey) mapSize += sizeof(quint32) + sizeof(quint64);
 | |
| 	if (_settingsKey) mapSize += sizeof(quint32) + sizeof(quint64);
 | |
| 	if (_recentHashtagsAndBotsKey) mapSize += sizeof(quint32) + sizeof(quint64);
 | |
| 	if (_exportSettingsKey) mapSize += sizeof(quint32) + sizeof(quint64);
 | |
| 	if (_installedMasksKey || _recentMasksKey || _archivedMasksKey) {
 | |
| 		mapSize += sizeof(quint32) + 3 * sizeof(quint64);
 | |
| 	}
 | |
| 	if (_installedCustomEmojiKey || _featuredCustomEmojiKey || _archivedCustomEmojiKey) {
 | |
| 		mapSize += sizeof(quint32) + 3 * sizeof(quint64);
 | |
| 	}
 | |
| 
 | |
| 	EncryptedDescriptor mapData(mapSize);
 | |
| 	if (!self.isEmpty()) {
 | |
| 		mapData.stream << quint32(lskSelfSerialized) << self;
 | |
| 	}
 | |
| 	if (!_draftsMap.empty()) {
 | |
| 		mapData.stream << quint32(lskDraft) << quint32(_draftsMap.size());
 | |
| 		for (const auto &[key, value] : _draftsMap) {
 | |
| 			mapData.stream << quint64(value) << SerializePeerId(key);
 | |
| 		}
 | |
| 	}
 | |
| 	if (!_draftCursorsMap.empty()) {
 | |
| 		mapData.stream << quint32(lskDraftPosition) << quint32(_draftCursorsMap.size());
 | |
| 		for (const auto &[key, value] : _draftCursorsMap) {
 | |
| 			mapData.stream << quint64(value) << SerializePeerId(key);
 | |
| 		}
 | |
| 	}
 | |
| 	if (_locationsKey) {
 | |
| 		mapData.stream << quint32(lskLocations) << quint64(_locationsKey);
 | |
| 	}
 | |
| 	if (_trustedBotsKey) {
 | |
| 		mapData.stream << quint32(lskTrustedBots) << quint64(_trustedBotsKey);
 | |
| 	}
 | |
| 	if (_recentStickersKeyOld) {
 | |
| 		mapData.stream << quint32(lskRecentStickersOld) << quint64(_recentStickersKeyOld);
 | |
| 	}
 | |
| 	if (_installedStickersKey || _featuredStickersKey || _recentStickersKey || _archivedStickersKey) {
 | |
| 		mapData.stream << quint32(lskStickersKeys);
 | |
| 		mapData.stream << quint64(_installedStickersKey) << quint64(_featuredStickersKey) << quint64(_recentStickersKey) << quint64(_archivedStickersKey);
 | |
| 	}
 | |
| 	if (_favedStickersKey) {
 | |
| 		mapData.stream << quint32(lskFavedStickers) << quint64(_favedStickersKey);
 | |
| 	}
 | |
| 	if (_savedGifsKey) {
 | |
| 		mapData.stream << quint32(lskSavedGifs) << quint64(_savedGifsKey);
 | |
| 	}
 | |
| 	if (_settingsKey) {
 | |
| 		mapData.stream << quint32(lskUserSettings) << quint64(_settingsKey);
 | |
| 	}
 | |
| 	if (_recentHashtagsAndBotsKey) {
 | |
| 		mapData.stream << quint32(lskRecentHashtagsAndBots) << quint64(_recentHashtagsAndBotsKey);
 | |
| 	}
 | |
| 	if (_exportSettingsKey) {
 | |
| 		mapData.stream << quint32(lskExportSettings) << quint64(_exportSettingsKey);
 | |
| 	}
 | |
| 	if (_installedMasksKey || _recentMasksKey || _archivedMasksKey) {
 | |
| 		mapData.stream << quint32(lskMasksKeys);
 | |
| 		mapData.stream
 | |
| 			<< quint64(_installedMasksKey)
 | |
| 			<< quint64(_recentMasksKey)
 | |
| 			<< quint64(_archivedMasksKey);
 | |
| 	}
 | |
| 	if (_installedCustomEmojiKey || _featuredCustomEmojiKey || _archivedCustomEmojiKey) {
 | |
| 		mapData.stream << quint32(lskCustomEmojiKeys);
 | |
| 		mapData.stream
 | |
| 			<< quint64(_installedCustomEmojiKey)
 | |
| 			<< quint64(_featuredCustomEmojiKey)
 | |
| 			<< quint64(_archivedCustomEmojiKey);
 | |
| 	}
 | |
| 	map.writeEncrypted(mapData, _localKey);
 | |
| 
 | |
| 	_mapChanged = false;
 | |
| }
 | |
| 
 | |
| void Account::reset() {
 | |
| 	auto names = collectGoodNames();
 | |
| 	_draftsMap.clear();
 | |
| 	_draftCursorsMap.clear();
 | |
| 	_draftsNotReadMap.clear();
 | |
| 	_locationsKey = _trustedBotsKey = 0;
 | |
| 	_recentStickersKeyOld = 0;
 | |
| 	_installedStickersKey = 0;
 | |
| 	_featuredStickersKey = 0;
 | |
| 	_recentStickersKey = 0;
 | |
| 	_favedStickersKey = 0;
 | |
| 	_archivedStickersKey = 0;
 | |
| 	_savedGifsKey = 0;
 | |
| 	_installedMasksKey = 0;
 | |
| 	_recentMasksKey = 0;
 | |
| 	_archivedMasksKey = 0;
 | |
| 	_installedCustomEmojiKey = 0;
 | |
| 	_featuredCustomEmojiKey = 0;
 | |
| 	_archivedCustomEmojiKey = 0;
 | |
| 	_legacyBackgroundKeyDay = _legacyBackgroundKeyNight = 0;
 | |
| 	_settingsKey = _recentHashtagsAndBotsKey = _exportSettingsKey = 0;
 | |
| 	_oldMapVersion = 0;
 | |
| 	_fileLocations.clear();
 | |
| 	_fileLocationPairs.clear();
 | |
| 	_fileLocationAliases.clear();
 | |
| 	_downloadsSerialize = nullptr;
 | |
| 	_downloadsSerialized = QByteArray();
 | |
| 	_cacheTotalSizeLimit = Database::Settings().totalSizeLimit;
 | |
| 	_cacheTotalTimeLimit = Database::Settings().totalTimeLimit;
 | |
| 	_cacheBigFileTotalSizeLimit = Database::Settings().totalSizeLimit;
 | |
| 	_cacheBigFileTotalTimeLimit = Database::Settings().totalTimeLimit;
 | |
| 	_mapChanged = true;
 | |
| 	writeMap();
 | |
| 	writeMtpData();
 | |
| 
 | |
| 	crl::async([base = _basePath, temp = _tempPath, names = std::move(names)] {
 | |
| 		for (const auto &name : names) {
 | |
| 			if (!name.endsWith(u"map0"_q)
 | |
| 				&& !name.endsWith(u"map1"_q)
 | |
| 				&& !name.endsWith(u"maps"_q)
 | |
| 				&& !name.endsWith(u"configs"_q)) {
 | |
| 				QFile::remove(base + name);
 | |
| 			}
 | |
| 		}
 | |
| 		QDir(LegacyTempDirectory()).removeRecursively();
 | |
| 		QDir(temp).removeRecursively();
 | |
| 	});
 | |
| 
 | |
| 	Local::sync();
 | |
| }
 | |
| 
 | |
| void Account::writeLocations() {
 | |
| 	_writeLocationsTimer.cancel();
 | |
| 	if (!_locationsChanged) {
 | |
| 		return;
 | |
| 	}
 | |
| 	_locationsChanged = false;
 | |
| 
 | |
| 	if (_downloadsSerialize) {
 | |
| 		if (auto serialized = _downloadsSerialize()) {
 | |
| 			_downloadsSerialized = std::move(*serialized);
 | |
| 		}
 | |
| 	}
 | |
| 	if (_fileLocations.isEmpty() && _downloadsSerialized.isEmpty()) {
 | |
| 		if (_locationsKey) {
 | |
| 			ClearKey(_locationsKey, _basePath);
 | |
| 			_locationsKey = 0;
 | |
| 			writeMapDelayed();
 | |
| 		}
 | |
| 	} else {
 | |
| 		if (!_locationsKey) {
 | |
| 			_locationsKey = GenerateKey(_basePath);
 | |
| 			writeMapQueued();
 | |
| 		}
 | |
| 		quint32 size = 0;
 | |
| 		for (auto i = _fileLocations.cbegin(), e = _fileLocations.cend(); i != e; ++i) {
 | |
| 			// location + type + namelen + name
 | |
| 			size += sizeof(quint64) * 2 + sizeof(quint32) + Serialize::stringSize(i.value().name());
 | |
| 			if (AppVersion > 9013) {
 | |
| 				// bookmark
 | |
| 				size += Serialize::bytearraySize(i.value().bookmark());
 | |
| 			}
 | |
| 			// date + size
 | |
| 			size += Serialize::dateTimeSize() + sizeof(quint32);
 | |
| 		}
 | |
| 
 | |
| 		//end mark
 | |
| 		size += sizeof(quint64) * 2 + sizeof(quint32) + Serialize::stringSize(QString());
 | |
| 		if (AppVersion > 9013) {
 | |
| 			size += Serialize::bytearraySize(QByteArray());
 | |
| 		}
 | |
| 		size += Serialize::dateTimeSize() + sizeof(quint32);
 | |
| 
 | |
| 		size += sizeof(quint32); // aliases count
 | |
| 		for (auto i = _fileLocationAliases.cbegin(), e = _fileLocationAliases.cend(); i != e; ++i) {
 | |
| 			// alias + location
 | |
| 			size += sizeof(quint64) * 2 + sizeof(quint64) * 2;
 | |
| 		}
 | |
| 
 | |
| 		size += sizeof(quint32); // legacy webLocationsCount
 | |
| 		size += Serialize::bytearraySize(_downloadsSerialized);
 | |
| 
 | |
| 		EncryptedDescriptor data(size);
 | |
| 		auto legacyTypeField = 0;
 | |
| 		for (auto i = _fileLocations.cbegin(); i != _fileLocations.cend(); ++i) {
 | |
| 			data.stream << quint64(i.key().first) << quint64(i.key().second) << quint32(legacyTypeField) << i.value().name();
 | |
| 			if (AppVersion > 9013) {
 | |
| 				data.stream << i.value().bookmark();
 | |
| 			}
 | |
| 			data.stream << i.value().modified << quint32(i.value().size);
 | |
| 		}
 | |
| 
 | |
| 		data.stream << quint64(0) << quint64(0) << quint32(0) << QString();
 | |
| 		if (AppVersion > 9013) {
 | |
| 			data.stream << QByteArray();
 | |
| 		}
 | |
| 		data.stream << QDateTime::currentDateTime() << quint32(0);
 | |
| 
 | |
| 		data.stream << quint32(_fileLocationAliases.size());
 | |
| 		for (auto i = _fileLocationAliases.cbegin(), e = _fileLocationAliases.cend(); i != e; ++i) {
 | |
| 			data.stream << quint64(i.key().first) << quint64(i.key().second) << quint64(i.value().first) << quint64(i.value().second);
 | |
| 		}
 | |
| 
 | |
| 		data.stream << quint32(0) << _downloadsSerialized;
 | |
| 
 | |
| 		FileWriteDescriptor file(_locationsKey, _basePath);
 | |
| 		file.writeEncrypted(data, _localKey);
 | |
| 	}
 | |
| }
 | |
| 
 | |
| void Account::writeLocationsQueued() {
 | |
| 	_locationsChanged = true;
 | |
| 	crl::on_main(_owner, [=] {
 | |
| 		writeLocations();
 | |
| 	});
 | |
| }
 | |
| 
 | |
| void Account::writeLocationsDelayed() {
 | |
| 	_locationsChanged = true;
 | |
| 	_writeLocationsTimer.callOnce(kDelayedWriteTimeout);
 | |
| }
 | |
| 
 | |
| void Account::readLocations() {
 | |
| 	FileReadDescriptor locations;
 | |
| 	if (!ReadEncryptedFile(locations, _locationsKey, _basePath, _localKey)) {
 | |
| 		ClearKey(_locationsKey, _basePath);
 | |
| 		_locationsKey = 0;
 | |
| 		writeMapDelayed();
 | |
| 		return;
 | |
| 	}
 | |
| 
 | |
| 	bool endMarkFound = false;
 | |
| 	while (!locations.stream.atEnd()) {
 | |
| 		quint64 first, second;
 | |
| 		QByteArray bookmark;
 | |
| 		Core::FileLocation loc;
 | |
| 		quint32 legacyTypeField = 0;
 | |
| 		quint32 size = 0;
 | |
| 		locations.stream >> first >> second >> legacyTypeField >> loc.fname;
 | |
| 		if (locations.version > 9013) {
 | |
| 			locations.stream >> bookmark;
 | |
| 		}
 | |
| 		locations.stream >> loc.modified >> size;
 | |
| 		loc.setBookmark(bookmark);
 | |
| 		loc.size = int64(size);
 | |
| 
 | |
| 		if (!first && !second && !legacyTypeField && loc.fname.isEmpty() && !loc.size) { // end mark
 | |
| 			endMarkFound = true;
 | |
| 			break;
 | |
| 		}
 | |
| 
 | |
| 		MediaKey key(first, second);
 | |
| 
 | |
| 		_fileLocations.insert(key, loc);
 | |
| 		if (!loc.inMediaCache()) {
 | |
| 			_fileLocationPairs.insert(loc.fname, { key, loc });
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	if (endMarkFound) {
 | |
| 		quint32 cnt;
 | |
| 		locations.stream >> cnt;
 | |
| 		for (quint32 i = 0; i < cnt; ++i) {
 | |
| 			quint64 kfirst, ksecond, vfirst, vsecond;
 | |
| 			locations.stream >> kfirst >> ksecond >> vfirst >> vsecond;
 | |
| 			_fileLocationAliases.insert(MediaKey(kfirst, ksecond), MediaKey(vfirst, vsecond));
 | |
| 		}
 | |
| 
 | |
| 		if (!locations.stream.atEnd()) {
 | |
| 			quint32 webLocationsCount;
 | |
| 			locations.stream >> webLocationsCount;
 | |
| 			for (quint32 i = 0; i < webLocationsCount; ++i) {
 | |
| 				QString url;
 | |
| 				quint64 key;
 | |
| 				qint32 size;
 | |
| 				locations.stream >> url >> key >> size;
 | |
| 				ClearKey(key, _basePath);
 | |
| 			}
 | |
| 
 | |
| 			if (!locations.stream.atEnd()) {
 | |
| 				locations.stream >> _downloadsSerialized;
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| void Account::updateDownloads(
 | |
| 		Fn<std::optional<QByteArray>()> downloadsSerialize) {
 | |
| 	_downloadsSerialize = std::move(downloadsSerialize);
 | |
| 	writeLocationsDelayed();
 | |
| }
 | |
| 
 | |
| QByteArray Account::downloadsSerialized() const {
 | |
| 	return _downloadsSerialized;
 | |
| }
 | |
| 
 | |
| void Account::writeSessionSettings() {
 | |
| 	writeSessionSettings(nullptr);
 | |
| }
 | |
| 
 | |
| void Account::writeSessionSettings(Main::SessionSettings *stored) {
 | |
| 	if (_readingUserSettings) {
 | |
| 		LOG(("App Error: attempt to write settings while reading them!"));
 | |
| 		return;
 | |
| 	}
 | |
| 	LOG(("App Info: writing encrypted user settings..."));
 | |
| 
 | |
| 	if (!_settingsKey) {
 | |
| 		_settingsKey = GenerateKey(_basePath);
 | |
| 		writeMapQueued();
 | |
| 	}
 | |
| 
 | |
| 	auto userDataInstance = stored
 | |
| 		? stored
 | |
| 		: _owner->getSessionSettings();
 | |
| 	auto userData = userDataInstance
 | |
| 		? userDataInstance->serialize()
 | |
| 		: QByteArray();
 | |
| 
 | |
| 	auto recentStickers = cRecentStickersPreload();
 | |
| 	if (recentStickers.isEmpty() && _owner->sessionExists()) {
 | |
| 		const auto &stickers = _owner->session().data().stickers();
 | |
| 		recentStickers.reserve(stickers.getRecentPack().size());
 | |
| 		for (const auto &pair : std::as_const(stickers.getRecentPack())) {
 | |
| 			recentStickers.push_back(qMakePair(pair.first->id, pair.second));
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	uint32 size = 24 * (sizeof(quint32) + sizeof(qint32));
 | |
| 	size += sizeof(quint32);
 | |
| 	size += sizeof(quint32) + sizeof(qint32) + recentStickers.size() * (sizeof(uint64) + sizeof(ushort));
 | |
| 	size += sizeof(quint32) + 3 * sizeof(qint32);
 | |
| 	size += sizeof(quint32) + 2 * sizeof(qint32);
 | |
| 	size += sizeof(quint32) + sizeof(qint64) + sizeof(qint32);
 | |
| 	if (!userData.isEmpty()) {
 | |
| 		size += sizeof(quint32) + Serialize::bytearraySize(userData);
 | |
| 	}
 | |
| 
 | |
| 	EncryptedDescriptor data(size);
 | |
| 	data.stream << quint32(dbiCacheSettings) << qint64(_cacheTotalSizeLimit) << qint32(_cacheTotalTimeLimit) << qint64(_cacheBigFileTotalSizeLimit) << qint32(_cacheBigFileTotalTimeLimit);
 | |
| 	if (!userData.isEmpty()) {
 | |
| 		data.stream << quint32(dbiSessionSettings) << userData;
 | |
| 	}
 | |
| 	data.stream << quint32(dbiRecentStickers) << recentStickers;
 | |
| 
 | |
| 	FileWriteDescriptor file(_settingsKey, _basePath);
 | |
| 	file.writeEncrypted(data, _localKey);
 | |
| }
 | |
| 
 | |
| ReadSettingsContext Account::prepareReadSettingsContext() const {
 | |
| 	return ReadSettingsContext{
 | |
| 		.legacyHasCustomDayBackground = (_legacyBackgroundKeyDay != 0)
 | |
| 	};
 | |
| }
 | |
| 
 | |
| std::unique_ptr<Main::SessionSettings> Account::readSessionSettings() {
 | |
| 	ReadSettingsContext context;
 | |
| 	FileReadDescriptor userSettings;
 | |
| 	if (!ReadEncryptedFile(userSettings, _settingsKey, _basePath, _localKey)) {
 | |
| 		LOG(("App Info: could not read encrypted user settings..."));
 | |
| 
 | |
| 		Local::readOldUserSettings(true, context);
 | |
| 		auto result = applyReadContext(std::move(context));
 | |
| 
 | |
| 		writeSessionSettings(result.get());
 | |
| 
 | |
| 		return result;
 | |
| 	}
 | |
| 
 | |
| 	LOG(("App Info: reading encrypted user settings..."));
 | |
| 	_readingUserSettings = true;
 | |
| 	while (!userSettings.stream.atEnd()) {
 | |
| 		quint32 blockId;
 | |
| 		userSettings.stream >> blockId;
 | |
| 		if (!CheckStreamStatus(userSettings.stream)) {
 | |
| 			_readingUserSettings = false;
 | |
| 			writeSessionSettings();
 | |
| 			return nullptr;
 | |
| 		}
 | |
| 
 | |
| 		if (!ReadSetting(blockId, userSettings.stream, userSettings.version, context)) {
 | |
| 			_readingUserSettings = false;
 | |
| 			writeSessionSettings();
 | |
| 			return nullptr;
 | |
| 		}
 | |
| 	}
 | |
| 	_readingUserSettings = false;
 | |
| 	LOG(("App Info: encrypted user settings read."));
 | |
| 
 | |
| 	auto result = applyReadContext(std::move(context));
 | |
| 	if (context.legacyRead) {
 | |
| 		writeSessionSettings(result.get());
 | |
| 	}
 | |
| 	return result;
 | |
| }
 | |
| 
 | |
| std::unique_ptr<Main::SessionSettings> Account::applyReadContext(
 | |
| 		ReadSettingsContext &&context) {
 | |
| 	ApplyReadFallbackConfig(context);
 | |
| 
 | |
| 	if (context.cacheTotalSizeLimit) {
 | |
| 		_cacheTotalSizeLimit = context.cacheTotalSizeLimit;
 | |
| 		_cacheTotalTimeLimit = context.cacheTotalTimeLimit;
 | |
| 		_cacheBigFileTotalSizeLimit = context.cacheBigFileTotalSizeLimit;
 | |
| 		_cacheBigFileTotalTimeLimit = context.cacheBigFileTotalTimeLimit;
 | |
| 
 | |
| 		const auto &normal = Database::Settings();
 | |
| 		Assert(_cacheTotalSizeLimit > normal.maxDataSize);
 | |
| 		Assert(_cacheBigFileTotalSizeLimit > normal.maxDataSize);
 | |
| 	}
 | |
| 
 | |
| 	if (!context.mtpAuthorization.isEmpty()) {
 | |
| 		_owner->setMtpAuthorization(context.mtpAuthorization);
 | |
| 	} else {
 | |
| 		for (auto &key : context.mtpLegacyKeys) {
 | |
| 			_owner->setLegacyMtpKey(std::move(key));
 | |
| 		}
 | |
| 		if (context.mtpLegacyMainDcId) {
 | |
| 			_owner->setMtpMainDcId(context.mtpLegacyMainDcId);
 | |
| 			_owner->setSessionUserId(context.mtpLegacyUserId);
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	if (context.tileRead) {
 | |
| 		Window::Theme::Background()->setTileDayValue(context.tileDay);
 | |
| 		Window::Theme::Background()->setTileNightValue(context.tileNight);
 | |
| 	}
 | |
| 
 | |
| 	return std::move(context.sessionSettingsStorage);
 | |
| }
 | |
| 
 | |
| void Account::writeMtpData() {
 | |
| 	Expects(_localKey != nullptr);
 | |
| 
 | |
| 	const auto serialized = _owner->serializeMtpAuthorization();
 | |
| 	const auto size = sizeof(quint32) + Serialize::bytearraySize(serialized);
 | |
| 
 | |
| 	FileWriteDescriptor mtp(ToFilePart(_dataNameKey), BaseGlobalPath());
 | |
| 	EncryptedDescriptor data(size);
 | |
| 	data.stream << quint32(dbiMtpAuthorization) << serialized;
 | |
| 	mtp.writeEncrypted(data, _localKey);
 | |
| }
 | |
| 
 | |
| void Account::readMtpData() {
 | |
| 	auto context = prepareReadSettingsContext();
 | |
| 
 | |
| 	FileReadDescriptor mtp;
 | |
| 	if (!ReadEncryptedFile(mtp, ToFilePart(_dataNameKey), BaseGlobalPath(), _localKey)) {
 | |
| 		if (_localKey) {
 | |
| 			Local::readOldMtpData(true, context);
 | |
| 			applyReadContext(std::move(context));
 | |
| 			writeMtpData();
 | |
| 		}
 | |
| 		return;
 | |
| 	}
 | |
| 
 | |
| 	LOG(("App Info: reading encrypted mtp data..."));
 | |
| 	while (!mtp.stream.atEnd()) {
 | |
| 		quint32 blockId;
 | |
| 		mtp.stream >> blockId;
 | |
| 		if (!CheckStreamStatus(mtp.stream)) {
 | |
| 			return writeMtpData();
 | |
| 		}
 | |
| 
 | |
| 		if (!ReadSetting(blockId, mtp.stream, mtp.version, context)) {
 | |
| 			return writeMtpData();
 | |
| 		}
 | |
| 	}
 | |
| 	applyReadContext(std::move(context));
 | |
| }
 | |
| 
 | |
| void Account::writeMtpConfig() {
 | |
| 	Expects(_localKey != nullptr);
 | |
| 
 | |
| 	const auto serialized = _owner->mtp().config().serialize();
 | |
| 	const auto size = Serialize::bytearraySize(serialized);
 | |
| 
 | |
| 	FileWriteDescriptor file(u"config"_q, _basePath);
 | |
| 	EncryptedDescriptor data(size);
 | |
| 	data.stream << serialized;
 | |
| 	file.writeEncrypted(data, _localKey);
 | |
| }
 | |
| 
 | |
| std::unique_ptr<MTP::Config> Account::readMtpConfig() {
 | |
| 	Expects(_localKey != nullptr);
 | |
| 
 | |
| 	FileReadDescriptor file;
 | |
| 	if (!ReadEncryptedFile(file, "config", _basePath, _localKey)) {
 | |
| 		return nullptr;
 | |
| 	}
 | |
| 
 | |
| 	LOG(("App Info: reading encrypted mtp config..."));
 | |
| 	auto serialized = QByteArray();
 | |
| 	file.stream >> serialized;
 | |
| 	if (!CheckStreamStatus(file.stream)) {
 | |
| 		return nullptr;
 | |
| 	}
 | |
| 	return MTP::Config::FromSerialized(serialized);
 | |
| }
 | |
| 
 | |
| template <typename Callback>
 | |
| void EnumerateDrafts(
 | |
| 		const Data::HistoryDrafts &map,
 | |
| 		bool supportMode,
 | |
| 		const base::flat_map<Data::DraftKey, MessageDraftSource> &sources,
 | |
| 		Callback &&callback) {
 | |
| 	for (const auto &[key, draft] : map) {
 | |
| 		if (key.isCloud() || sources.contains(key)) {
 | |
| 			continue;
 | |
| 		} else if (key.isLocal()
 | |
| 			&& (!supportMode || key.topicRootId())) {
 | |
| 			const auto i = map.find(
 | |
| 				Data::DraftKey::Cloud(key.topicRootId()));
 | |
| 			const auto cloud = (i != end(map)) ? i->second.get() : nullptr;
 | |
| 			if (Data::DraftsAreEqual(draft.get(), cloud)) {
 | |
| 				continue;
 | |
| 			}
 | |
| 		}
 | |
| 		callback(
 | |
| 			key,
 | |
| 			draft->reply,
 | |
| 			draft->textWithTags,
 | |
| 			draft->webpage,
 | |
| 			draft->cursor);
 | |
| 	}
 | |
| 	for (const auto &[key, source] : sources) {
 | |
| 		const auto draft = source.draft();
 | |
| 		const auto cursor = source.cursor();
 | |
| 		if (draft.reply.messageId
 | |
| 			|| !draft.textWithTags.text.isEmpty()
 | |
| 			|| cursor != MessageCursor()) {
 | |
| 			callback(
 | |
| 				key,
 | |
| 				draft.reply,
 | |
| 				draft.textWithTags,
 | |
| 				draft.webpage,
 | |
| 				cursor);
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| void Account::registerDraftSource(
 | |
| 		not_null<History*> history,
 | |
| 		Data::DraftKey key,
 | |
| 		MessageDraftSource source) {
 | |
| 	Expects(source.draft != nullptr);
 | |
| 	Expects(source.cursor != nullptr);
 | |
| 
 | |
| 	_draftSources[history][key] = std::move(source);
 | |
| }
 | |
| 
 | |
| void Account::unregisterDraftSource(
 | |
| 		not_null<History*> history,
 | |
| 		Data::DraftKey key) {
 | |
| 	const auto i = _draftSources.find(history);
 | |
| 	if (i != _draftSources.end()) {
 | |
| 		i->second.remove(key);
 | |
| 		if (i->second.empty()) {
 | |
| 			_draftSources.erase(i);
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| void Account::writeDrafts(not_null<History*> history) {
 | |
| 	const auto peerId = history->peer->id;
 | |
| 	const auto &map = history->draftsMap();
 | |
| 	const auto supportMode = history->session().supportMode();
 | |
| 	const auto sourcesIt = _draftSources.find(history);
 | |
| 	const auto &sources = (sourcesIt != _draftSources.end())
 | |
| 		? sourcesIt->second
 | |
| 		: EmptyMessageDraftSources();
 | |
| 	auto count = 0;
 | |
| 	EnumerateDrafts(
 | |
| 		map,
 | |
| 		supportMode,
 | |
| 		sources,
 | |
| 		[&](auto&&...) { ++count; });
 | |
| 	if (!count) {
 | |
| 		auto i = _draftsMap.find(peerId);
 | |
| 		if (i != _draftsMap.cend()) {
 | |
| 			ClearKey(i->second, _basePath);
 | |
| 			_draftsMap.erase(i);
 | |
| 			writeMapDelayed();
 | |
| 		}
 | |
| 
 | |
| 		_draftsNotReadMap.remove(peerId);
 | |
| 		return;
 | |
| 	}
 | |
| 
 | |
| 	auto i = _draftsMap.find(peerId);
 | |
| 	if (i == _draftsMap.cend()) {
 | |
| 		i = _draftsMap.emplace(peerId, GenerateKey(_basePath)).first;
 | |
| 		writeMapQueued();
 | |
| 	}
 | |
| 
 | |
| 	auto size = int(sizeof(quint64) * 2 + sizeof(quint32));
 | |
| 	const auto sizeCallback = [&](
 | |
| 			auto&&, // key
 | |
| 			const FullReplyTo &reply,
 | |
| 			const TextWithTags &text,
 | |
| 			const Data::WebPageDraft &webpage,
 | |
| 			auto&&) { // cursor
 | |
| 		size += sizeof(qint64) // key
 | |
| 			+ Serialize::stringSize(text.text)
 | |
| 			+ TextUtilities::SerializeTagsSize(text.tags)
 | |
| 			+ sizeof(qint64) + sizeof(qint64) // messageId
 | |
| 			+ Serialize::stringSize(webpage.url)
 | |
| 			+ sizeof(qint32) // webpage.forceLargeMedia
 | |
| 			+ sizeof(qint32) // webpage.forceSmallMedia
 | |
| 			+ sizeof(qint32) // webpage.invert
 | |
| 			+ sizeof(qint32) // webpage.manual
 | |
| 			+ sizeof(qint32); // webpage.removed
 | |
| 	};
 | |
| 	EnumerateDrafts(
 | |
| 		map,
 | |
| 		supportMode,
 | |
| 		sources,
 | |
| 		sizeCallback);
 | |
| 
 | |
| 	EncryptedDescriptor data(size);
 | |
| 	data.stream
 | |
| 		<< quint64(kRichDraftsTag)
 | |
| 		<< SerializePeerId(peerId)
 | |
| 		<< quint32(count);
 | |
| 
 | |
| 	const auto writeCallback = [&](
 | |
| 			const Data::DraftKey &key,
 | |
| 			const FullReplyTo &reply,
 | |
| 			const TextWithTags &text,
 | |
| 			const Data::WebPageDraft &webpage,
 | |
| 			auto&&) { // cursor
 | |
| 		data.stream
 | |
| 			<< key.serialize()
 | |
| 			<< text.text
 | |
| 			<< TextUtilities::SerializeTags(text.tags)
 | |
| 			<< qint64(reply.messageId.peer.value)
 | |
| 			<< qint64(reply.messageId.msg.bare)
 | |
| 			<< webpage.url
 | |
| 			<< qint32(webpage.forceLargeMedia ? 1 : 0)
 | |
| 			<< qint32(webpage.forceSmallMedia ? 1 : 0)
 | |
| 			<< qint32(webpage.invert ? 1 : 0)
 | |
| 			<< qint32(webpage.manual ? 1 : 0)
 | |
| 			<< qint32(webpage.removed ? 1 : 0);
 | |
| 	};
 | |
| 	EnumerateDrafts(
 | |
| 		map,
 | |
| 		supportMode,
 | |
| 		sources,
 | |
| 		writeCallback);
 | |
| 
 | |
| 	FileWriteDescriptor file(i->second, _basePath);
 | |
| 	file.writeEncrypted(data, _localKey);
 | |
| 
 | |
| 	_draftsNotReadMap.remove(peerId);
 | |
| }
 | |
| 
 | |
| void Account::writeDraftCursors(not_null<History*> history) {
 | |
| 	const auto peerId = history->peer->id;
 | |
| 	const auto &map = history->draftsMap();
 | |
| 	const auto supportMode = history->session().supportMode();
 | |
| 	const auto sourcesIt = _draftSources.find(history);
 | |
| 	const auto &sources = (sourcesIt != _draftSources.end())
 | |
| 		? sourcesIt->second
 | |
| 		: EmptyMessageDraftSources();
 | |
| 	auto count = 0;
 | |
| 	EnumerateDrafts(
 | |
| 		map,
 | |
| 		supportMode,
 | |
| 		sources,
 | |
| 		[&](auto&&...) { ++count; });
 | |
| 	if (!count) {
 | |
| 		clearDraftCursors(peerId);
 | |
| 		return;
 | |
| 	}
 | |
| 	auto i = _draftCursorsMap.find(peerId);
 | |
| 	if (i == _draftCursorsMap.cend()) {
 | |
| 		i = _draftCursorsMap.emplace(peerId, GenerateKey(_basePath)).first;
 | |
| 		writeMapQueued();
 | |
| 	}
 | |
| 
 | |
| 	auto size = int(sizeof(quint64) * 2
 | |
| 		+ sizeof(quint32)
 | |
| 		+ (sizeof(qint64) + sizeof(qint32) * 3) * count);
 | |
| 
 | |
| 	EncryptedDescriptor data(size);
 | |
| 	data.stream
 | |
| 		<< quint64(kMultiDraftCursorsTag)
 | |
| 		<< SerializePeerId(peerId)
 | |
| 		<< quint32(count);
 | |
| 
 | |
| 	const auto writeCallback = [&](
 | |
| 			const Data::DraftKey &key,
 | |
| 			auto&&, // reply
 | |
| 			auto&&, // text
 | |
| 			auto&&, // webpage
 | |
| 			const MessageCursor &cursor) { // cursor
 | |
| 		data.stream
 | |
| 			<< key.serialize()
 | |
| 			<< qint32(cursor.position)
 | |
| 			<< qint32(cursor.anchor)
 | |
| 			<< qint32(cursor.scroll);
 | |
| 	};
 | |
| 	EnumerateDrafts(
 | |
| 		map,
 | |
| 		supportMode,
 | |
| 		sources,
 | |
| 		writeCallback);
 | |
| 
 | |
| 	FileWriteDescriptor file(i->second, _basePath);
 | |
| 	file.writeEncrypted(data, _localKey);
 | |
| }
 | |
| 
 | |
| void Account::clearDraftCursors(PeerId peerId) {
 | |
| 	const auto i = _draftCursorsMap.find(peerId);
 | |
| 	if (i != _draftCursorsMap.cend()) {
 | |
| 		ClearKey(i->second, _basePath);
 | |
| 		_draftCursorsMap.erase(i);
 | |
| 		writeMapDelayed();
 | |
| 	}
 | |
| }
 | |
| 
 | |
| void Account::readDraftCursors(PeerId peerId, Data::HistoryDrafts &map) {
 | |
| 	const auto j = _draftCursorsMap.find(peerId);
 | |
| 	if (j == _draftCursorsMap.cend()) {
 | |
| 		return;
 | |
| 	}
 | |
| 
 | |
| 	FileReadDescriptor draft;
 | |
| 	if (!ReadEncryptedFile(draft, j->second, _basePath, _localKey)) {
 | |
| 		clearDraftCursors(peerId);
 | |
| 		return;
 | |
| 	}
 | |
| 	quint64 tag = 0;
 | |
| 	draft.stream >> tag;
 | |
| 	if (tag != kMultiDraftCursorsTag
 | |
| 		&& tag != kMultiDraftCursorsTagOld
 | |
| 		&& tag != kMultiDraftTagOld) {
 | |
| 		readDraftCursorsLegacy(peerId, draft, tag, map);
 | |
| 		return;
 | |
| 	}
 | |
| 	quint64 draftPeerSerialized = 0;
 | |
| 	quint32 count = 0;
 | |
| 	draft.stream >> draftPeerSerialized >> count;
 | |
| 	const auto draftPeer = DeserializePeerId(draftPeerSerialized);
 | |
| 	if (!count || count > 1000 || draftPeer != peerId) {
 | |
| 		clearDraftCursors(peerId);
 | |
| 		return;
 | |
| 	}
 | |
| 	const auto keysWritten = (tag == kMultiDraftCursorsTag);
 | |
| 	const auto keysOld = (tag == kMultiDraftCursorsTagOld);
 | |
| 	for (auto i = 0; i != count; ++i) {
 | |
| 		qint64 keyValue = 0;
 | |
| 		qint32 keyValueOld = 0;
 | |
| 		if (keysWritten) {
 | |
| 			draft.stream >> keyValue;
 | |
| 		} else if (keysOld) {
 | |
| 			draft.stream >> keyValueOld;
 | |
| 		}
 | |
| 		const auto key = keysWritten
 | |
| 			? Data::DraftKey::FromSerialized(keyValue)
 | |
| 			: keysOld
 | |
| 			? Data::DraftKey::FromSerializedOld(keyValueOld)
 | |
| 			: Data::DraftKey::Local(0);
 | |
| 		qint32 position = 0, anchor = 0, scroll = Ui::kQFixedMax;
 | |
| 		draft.stream >> position >> anchor >> scroll;
 | |
| 		if (const auto i = map.find(key); i != end(map)) {
 | |
| 			i->second->cursor = MessageCursor(position, anchor, scroll);
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| void Account::readDraftCursorsLegacy(
 | |
| 		PeerId peerId,
 | |
| 		details::FileReadDescriptor &draft,
 | |
| 		quint64 draftPeerSerialized,
 | |
| 		Data::HistoryDrafts &map) {
 | |
| 	qint32 localPosition = 0, localAnchor = 0, localScroll = Ui::kQFixedMax;
 | |
| 	qint32 editPosition = 0, editAnchor = 0, editScroll = Ui::kQFixedMax;
 | |
| 	draft.stream >> localPosition >> localAnchor >> localScroll;
 | |
| 	if (!draft.stream.atEnd()) {
 | |
| 		draft.stream >> editPosition >> editAnchor >> editScroll;
 | |
| 	}
 | |
| 
 | |
| 	const auto draftPeer = DeserializePeerId(draftPeerSerialized);
 | |
| 	if (draftPeer != peerId) {
 | |
| 		clearDraftCursors(peerId);
 | |
| 		return;
 | |
| 	}
 | |
| 
 | |
| 	if (const auto i = map.find(Data::DraftKey::Local({})); i != end(map)) {
 | |
| 		i->second->cursor = MessageCursor(
 | |
| 			localPosition,
 | |
| 			localAnchor,
 | |
| 			localScroll);
 | |
| 	}
 | |
| 	if (const auto i = map.find(Data::DraftKey::LocalEdit({}))
 | |
| 		; i != end(map)) {
 | |
| 		i->second->cursor = MessageCursor(
 | |
| 			editPosition,
 | |
| 			editAnchor,
 | |
| 			editScroll);
 | |
| 	}
 | |
| }
 | |
| 
 | |
| void Account::readDraftsWithCursors(not_null<History*> history) {
 | |
| 	const auto guard = gsl::finally([&] {
 | |
| 		if (const auto migrated = history->migrateFrom()) {
 | |
| 			readDraftsWithCursors(migrated);
 | |
| 			migrated->clearLocalEditDraft({});
 | |
| 			history->takeLocalDraft(migrated);
 | |
| 		}
 | |
| 	});
 | |
| 
 | |
| 	PeerId peerId = history->peer->id;
 | |
| 	if (!_draftsNotReadMap.remove(peerId)) {
 | |
| 		clearDraftCursors(peerId);
 | |
| 		return;
 | |
| 	}
 | |
| 
 | |
| 	const auto j = _draftsMap.find(peerId);
 | |
| 	if (j == _draftsMap.cend()) {
 | |
| 		clearDraftCursors(peerId);
 | |
| 		return;
 | |
| 	}
 | |
| 	FileReadDescriptor draft;
 | |
| 	if (!ReadEncryptedFile(draft, j->second, _basePath, _localKey)) {
 | |
| 		ClearKey(j->second, _basePath);
 | |
| 		_draftsMap.erase(j);
 | |
| 		clearDraftCursors(peerId);
 | |
| 		return;
 | |
| 	}
 | |
| 
 | |
| 	quint64 tag = 0;
 | |
| 	draft.stream >> tag;
 | |
| 	if (tag != kRichDraftsTag
 | |
| 		&& tag != kMultiDraftTag
 | |
| 		&& tag != kMultiDraftTagOld) {
 | |
| 		readDraftsWithCursorsLegacy(history, draft, tag);
 | |
| 		return;
 | |
| 	}
 | |
| 	quint32 count = 0;
 | |
| 	quint64 draftPeerSerialized = 0;
 | |
| 	draft.stream >> draftPeerSerialized >> count;
 | |
| 	const auto draftPeer = DeserializePeerId(draftPeerSerialized);
 | |
| 	if (!count || count > 1000 || draftPeer != peerId) {
 | |
| 		ClearKey(j->second, _basePath);
 | |
| 		_draftsMap.erase(j);
 | |
| 		clearDraftCursors(peerId);
 | |
| 		return;
 | |
| 	}
 | |
| 	auto map = Data::HistoryDrafts();
 | |
| 	const auto keysOld = (tag == kMultiDraftTagOld);
 | |
| 	const auto rich = (tag == kRichDraftsTag);
 | |
| 	for (auto i = 0; i != count; ++i) {
 | |
| 		TextWithTags text;
 | |
| 		QByteArray textTagsSerialized;
 | |
| 		qint64 keyValue = 0;
 | |
| 		qint64 messageIdPeer = 0, messageIdMsg = 0;
 | |
| 		qint32 keyValueOld = 0;
 | |
| 		QString webpageUrl;
 | |
| 		qint32 webpageForceLargeMedia = 0;
 | |
| 		qint32 webpageForceSmallMedia = 0;
 | |
| 		qint32 webpageInvert = 0;
 | |
| 		qint32 webpageManual = 0;
 | |
| 		qint32 webpageRemoved = 0;
 | |
| 		if (keysOld) {
 | |
| 			draft.stream >> keyValueOld;
 | |
| 		} else {
 | |
| 			draft.stream >> keyValue;
 | |
| 		}
 | |
| 		if (!rich) {
 | |
| 			qint32 uncheckedPreviewState = 0;
 | |
| 			draft.stream
 | |
| 				>> text.text
 | |
| 				>> textTagsSerialized
 | |
| 				>> messageIdMsg
 | |
| 				>> uncheckedPreviewState;
 | |
| 			enum class PreviewState : char {
 | |
| 				Allowed,
 | |
| 				Cancelled,
 | |
| 				EmptyOnEdit,
 | |
| 			};
 | |
| 			if (uncheckedPreviewState == int(PreviewState::Cancelled)) {
 | |
| 				webpageRemoved = 1;
 | |
| 			}
 | |
| 			messageIdPeer = peerId.value;
 | |
| 		} else {
 | |
| 			draft.stream
 | |
| 				>> text.text
 | |
| 				>> textTagsSerialized
 | |
| 				>> messageIdPeer
 | |
| 				>> messageIdMsg
 | |
| 				>> webpageUrl
 | |
| 				>> webpageForceLargeMedia
 | |
| 				>> webpageForceSmallMedia
 | |
| 				>> webpageInvert
 | |
| 				>> webpageManual
 | |
| 				>> webpageRemoved;
 | |
| 		}
 | |
| 		text.tags = TextUtilities::DeserializeTags(
 | |
| 			textTagsSerialized,
 | |
| 			text.text.size());
 | |
| 		const auto key = keysOld
 | |
| 			? Data::DraftKey::FromSerializedOld(keyValueOld)
 | |
| 			: Data::DraftKey::FromSerialized(keyValue);
 | |
| 		if (key && !key.isCloud()) {
 | |
| 			map.emplace(key, std::make_unique<Data::Draft>(
 | |
| 				text,
 | |
| 				FullReplyTo{
 | |
| 					.messageId = FullMsgId(
 | |
| 						PeerId(messageIdPeer),
 | |
| 						MsgId(messageIdMsg)),
 | |
| 					.topicRootId = key.topicRootId(),
 | |
| 				},
 | |
| 				MessageCursor(),
 | |
| 				Data::WebPageDraft{
 | |
| 					.url = webpageUrl,
 | |
| 					.forceLargeMedia = (webpageForceLargeMedia == 1),
 | |
| 					.forceSmallMedia = (webpageForceSmallMedia == 1),
 | |
| 					.invert = (webpageInvert == 1),
 | |
| 					.manual = (webpageManual == 1),
 | |
| 					.removed = (webpageRemoved == 1),
 | |
| 				}));
 | |
| 		}
 | |
| 	}
 | |
| 	if (draft.stream.status() != QDataStream::Ok) {
 | |
| 		ClearKey(j->second, _basePath);
 | |
| 		_draftsMap.erase(j);
 | |
| 		clearDraftCursors(peerId);
 | |
| 		return;
 | |
| 	}
 | |
| 	readDraftCursors(peerId, map);
 | |
| 	history->setDraftsMap(std::move(map));
 | |
| }
 | |
| 
 | |
| void Account::readDraftsWithCursorsLegacy(
 | |
| 		not_null<History*> history,
 | |
| 		details::FileReadDescriptor &draft,
 | |
| 		quint64 draftPeerSerialized) {
 | |
| 	TextWithTags msgData, editData;
 | |
| 	QByteArray msgTagsSerialized, editTagsSerialized;
 | |
| 	qint32 msgReplyTo = 0, msgPreviewCancelled = 0, editMsgId = 0, editPreviewCancelled = 0;
 | |
| 	draft.stream >> msgData.text;
 | |
| 	if (draft.version >= 9048) {
 | |
| 		draft.stream >> msgTagsSerialized;
 | |
| 	}
 | |
| 	if (draft.version >= 7021) {
 | |
| 		draft.stream >> msgReplyTo;
 | |
| 		if (draft.version >= 8001) {
 | |
| 			draft.stream >> msgPreviewCancelled;
 | |
| 			if (!draft.stream.atEnd()) {
 | |
| 				draft.stream >> editData.text;
 | |
| 				if (draft.version >= 9048) {
 | |
| 					draft.stream >> editTagsSerialized;
 | |
| 				}
 | |
| 				draft.stream >> editMsgId >> editPreviewCancelled;
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 	const auto peerId = history->peer->id;
 | |
| 	const auto draftPeer = DeserializePeerId(draftPeerSerialized);
 | |
| 	if (draftPeer != peerId) {
 | |
| 		const auto j = _draftsMap.find(peerId);
 | |
| 		if (j != _draftsMap.cend()) {
 | |
| 			ClearKey(j->second, _basePath);
 | |
| 			_draftsMap.erase(j);
 | |
| 		}
 | |
| 		clearDraftCursors(peerId);
 | |
| 		return;
 | |
| 	}
 | |
| 
 | |
| 	msgData.tags = TextUtilities::DeserializeTags(
 | |
| 		msgTagsSerialized,
 | |
| 		msgData.text.size());
 | |
| 	editData.tags = TextUtilities::DeserializeTags(
 | |
| 		editTagsSerialized,
 | |
| 		editData.text.size());
 | |
| 
 | |
| 	const auto topicRootId = MsgId();
 | |
| 	auto map = base::flat_map<Data::DraftKey, std::unique_ptr<Data::Draft>>();
 | |
| 	if (!msgData.text.isEmpty() || msgReplyTo) {
 | |
| 		map.emplace(
 | |
| 			Data::DraftKey::Local(topicRootId),
 | |
| 			std::make_unique<Data::Draft>(
 | |
| 				msgData,
 | |
| 				FullReplyTo{ FullMsgId(peerId, MsgId(msgReplyTo)) },
 | |
| 				MessageCursor(),
 | |
| 				Data::WebPageDraft{
 | |
| 					.removed = (msgPreviewCancelled == 1),
 | |
| 				}));
 | |
| 	}
 | |
| 	if (editMsgId) {
 | |
| 		map.emplace(
 | |
| 			Data::DraftKey::LocalEdit(topicRootId),
 | |
| 			std::make_unique<Data::Draft>(
 | |
| 				editData,
 | |
| 				FullReplyTo{ FullMsgId(peerId, editMsgId) },
 | |
| 				MessageCursor(),
 | |
| 				Data::WebPageDraft{
 | |
| 					.removed = (editPreviewCancelled == 1),
 | |
| 				}));
 | |
| 	}
 | |
| 	readDraftCursors(peerId, map);
 | |
| 	history->setDraftsMap(std::move(map));
 | |
| }
 | |
| 
 | |
| bool Account::hasDraftCursors(PeerId peer) {
 | |
| 	return _draftCursorsMap.contains(peer);
 | |
| }
 | |
| 
 | |
| bool Account::hasDraft(PeerId peer) {
 | |
| 	return _draftsMap.contains(peer);
 | |
| }
 | |
| 
 | |
| void Account::writeFileLocation(MediaKey location, const Core::FileLocation &local) {
 | |
| 	if (local.fname.isEmpty()) {
 | |
| 		return;
 | |
| 	}
 | |
| 	if (!local.inMediaCache()) {
 | |
| 		const auto aliasIt = _fileLocationAliases.constFind(location);
 | |
| 		if (aliasIt != _fileLocationAliases.cend()) {
 | |
| 			location = aliasIt.value();
 | |
| 		}
 | |
| 
 | |
| 		const auto i = _fileLocationPairs.find(local.fname);
 | |
| 		if (i != _fileLocationPairs.cend()) {
 | |
| 			if (i.value().second == local) {
 | |
| 				if (i.value().first != location) {
 | |
| 					_fileLocationAliases.insert(location, i.value().first);
 | |
| 					writeLocationsQueued();
 | |
| 				}
 | |
| 				return;
 | |
| 			}
 | |
| 			if (i.value().first != location) {
 | |
| 				for (auto j = _fileLocations.find(i.value().first), e = _fileLocations.end(); (j != e) && (j.key() == i.value().first); ++j) {
 | |
| 					if (j.value() == i.value().second) {
 | |
| 						_fileLocations.erase(j);
 | |
| 						break;
 | |
| 					}
 | |
| 				}
 | |
| 				_fileLocationPairs.erase(i);
 | |
| 			}
 | |
| 		}
 | |
| 		_fileLocationPairs.insert(local.fname, { location, local });
 | |
| 	} else {
 | |
| 		for (auto i = _fileLocations.find(location); (i != _fileLocations.end()) && (i.key() == location);) {
 | |
| 			if (i.value().inMediaCache() || i.value().check()) {
 | |
| 				return;
 | |
| 			}
 | |
| 			i = _fileLocations.erase(i);
 | |
| 		}
 | |
| 	}
 | |
| 	_fileLocations.insert(location, local);
 | |
| 	writeLocationsQueued();
 | |
| }
 | |
| 
 | |
| void Account::removeFileLocation(MediaKey location) {
 | |
| 	auto i = _fileLocations.find(location);
 | |
| 	if (i == _fileLocations.end()) {
 | |
| 		return;
 | |
| 	}
 | |
| 	while (i != _fileLocations.end() && (i.key() == location)) {
 | |
| 		i = _fileLocations.erase(i);
 | |
| 	}
 | |
| 	writeLocationsQueued();
 | |
| }
 | |
| 
 | |
| Core::FileLocation Account::readFileLocation(MediaKey location) {
 | |
| 	const auto aliasIt = _fileLocationAliases.constFind(location);
 | |
| 	if (aliasIt != _fileLocationAliases.cend()) {
 | |
| 		location = aliasIt.value();
 | |
| 	}
 | |
| 
 | |
| 	for (auto i = _fileLocations.find(location); (i != _fileLocations.end()) && (i.key() == location);) {
 | |
| 		if (!i.value().inMediaCache() && !i.value().check()) {
 | |
| 			_fileLocationPairs.remove(i.value().fname);
 | |
| 			i = _fileLocations.erase(i);
 | |
| 			writeLocationsDelayed();
 | |
| 			continue;
 | |
| 		}
 | |
| 		return i.value();
 | |
| 	}
 | |
| 	return Core::FileLocation();
 | |
| }
 | |
| 
 | |
| EncryptionKey Account::cacheKey() const {
 | |
| 	Expects(_localKey != nullptr);
 | |
| 
 | |
| 	return EncryptionKey(bytes::make_vector(_localKey->data()));
 | |
| }
 | |
| 
 | |
| EncryptionKey Account::cacheBigFileKey() const {
 | |
| 	return cacheKey();
 | |
| }
 | |
| 
 | |
| QString Account::cachePath() const {
 | |
| 	Expects(!_databasePath.isEmpty());
 | |
| 
 | |
| 	return _databasePath + "cache";
 | |
| }
 | |
| 
 | |
| Cache::Database::Settings Account::cacheSettings() const {
 | |
| 	auto result = Cache::Database::Settings();
 | |
| 	result.clearOnWrongKey = true;
 | |
| 	result.totalSizeLimit = _cacheTotalSizeLimit;
 | |
| 	result.totalTimeLimit = _cacheTotalTimeLimit;
 | |
| 	result.maxDataSize = kMaxFileInMemory;
 | |
| 	return result;
 | |
| }
 | |
| 
 | |
| void Account::updateCacheSettings(
 | |
| 		Cache::Database::SettingsUpdate &update,
 | |
| 		Cache::Database::SettingsUpdate &updateBig) {
 | |
| 	Expects(update.totalSizeLimit > Database::Settings().maxDataSize);
 | |
| 	Expects(update.totalTimeLimit >= 0);
 | |
| 	Expects(updateBig.totalSizeLimit > Database::Settings().maxDataSize);
 | |
| 	Expects(updateBig.totalTimeLimit >= 0);
 | |
| 
 | |
| 	if (_cacheTotalSizeLimit == update.totalSizeLimit
 | |
| 		&& _cacheTotalTimeLimit == update.totalTimeLimit
 | |
| 		&& _cacheBigFileTotalSizeLimit == updateBig.totalSizeLimit
 | |
| 		&& _cacheBigFileTotalTimeLimit == updateBig.totalTimeLimit) {
 | |
| 		return;
 | |
| 	}
 | |
| 	_cacheTotalSizeLimit = update.totalSizeLimit;
 | |
| 	_cacheTotalTimeLimit = update.totalTimeLimit;
 | |
| 	_cacheBigFileTotalSizeLimit = updateBig.totalSizeLimit;
 | |
| 	_cacheBigFileTotalTimeLimit = updateBig.totalTimeLimit;
 | |
| 	writeSessionSettings();
 | |
| }
 | |
| 
 | |
| QString Account::cacheBigFilePath() const {
 | |
| 	Expects(!_databasePath.isEmpty());
 | |
| 
 | |
| 	return _databasePath + "media_cache";
 | |
| }
 | |
| 
 | |
| Cache::Database::Settings Account::cacheBigFileSettings() const {
 | |
| 	auto result = Cache::Database::Settings();
 | |
| 	result.clearOnWrongKey = true;
 | |
| 	result.totalSizeLimit = _cacheBigFileTotalSizeLimit;
 | |
| 	result.totalTimeLimit = _cacheBigFileTotalTimeLimit;
 | |
| 	result.maxDataSize = kMaxFileInMemory;
 | |
| 	return result;
 | |
| }
 | |
| 
 | |
| void Account::writeStickerSet(
 | |
| 		QDataStream &stream,
 | |
| 		const Data::StickersSet &set) {
 | |
| 	using SetFlag = Data::StickersSetFlag;
 | |
| 	const auto writeInfo = [&](int count) {
 | |
| 		stream
 | |
| 			<< quint64(set.id)
 | |
| 			<< quint64(set.accessHash)
 | |
| 			<< quint64(set.hash)
 | |
| 			<< set.title
 | |
| 			<< set.shortName
 | |
| 			<< qint32(count)
 | |
| 			<< qint32(set.flags)
 | |
| 			<< qint32(set.installDate)
 | |
| 			<< quint64(set.thumbnailDocumentId)
 | |
| 			<< qint32(set.thumbnailType());
 | |
| 		Serialize::writeImageLocation(stream, set.thumbnailLocation());
 | |
| 	};
 | |
| 	if (set.flags & SetFlag::NotLoaded) {
 | |
| 		writeInfo(-set.count);
 | |
| 		return;
 | |
| 	} else if (set.stickers.isEmpty()) {
 | |
| 		return;
 | |
| 	}
 | |
| 
 | |
| 	writeInfo(set.stickers.size());
 | |
| 	for (const auto &sticker : set.stickers) {
 | |
| 		Serialize::Document::writeToStream(stream, sticker);
 | |
| 	}
 | |
| 	stream << qint32(set.dates.size());
 | |
| 	if (!set.dates.empty()) {
 | |
| 		Assert(set.dates.size() == set.stickers.size());
 | |
| 		for (const auto date : set.dates) {
 | |
| 			stream << qint32(date);
 | |
| 		}
 | |
| 	}
 | |
| 	stream << qint32(set.emoji.size());
 | |
| 	for (auto j = set.emoji.cbegin(), e = set.emoji.cend(); j != e; ++j) {
 | |
| 		stream << j->first->id() << qint32(j->second.size());
 | |
| 		for (const auto sticker : j->second) {
 | |
| 			stream << quint64(sticker->id);
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // In generic method _writeStickerSets() we look through all the sets and call a
 | |
| // callback on each set to see, if we write it, skip it or abort the whole write.
 | |
| enum class StickerSetCheckResult {
 | |
| 	Write,
 | |
| 	Skip,
 | |
| 	Abort,
 | |
| };
 | |
| 
 | |
| // CheckSet is a functor on Data::StickersSet, which returns a StickerSetCheckResult.
 | |
| template <typename CheckSet>
 | |
| void Account::writeStickerSets(
 | |
| 		FileKey &stickersKey,
 | |
| 		CheckSet checkSet,
 | |
| 		const Data::StickersSetsOrder &order) {
 | |
| 	using SetFlag = Data::StickersSetFlag;
 | |
| 
 | |
| 	const auto &sets = _owner->session().data().stickers().sets();
 | |
| 	if (sets.empty()) {
 | |
| 		if (stickersKey) {
 | |
| 			ClearKey(stickersKey, _basePath);
 | |
| 			stickersKey = 0;
 | |
| 			writeMapDelayed();
 | |
| 		}
 | |
| 		return;
 | |
| 	}
 | |
| 
 | |
| 	// versionTag + version + count
 | |
| 	quint32 size = sizeof(quint32) + sizeof(qint32) + sizeof(qint32);
 | |
| 
 | |
| 	int32 setsCount = 0;
 | |
| 	for (const auto &[id, set] : sets) {
 | |
| 		const auto raw = set.get();
 | |
| 		auto result = checkSet(*raw);
 | |
| 		if (result == StickerSetCheckResult::Abort) {
 | |
| 			return;
 | |
| 		} else if (result == StickerSetCheckResult::Skip) {
 | |
| 			continue;
 | |
| 		}
 | |
| 
 | |
| 		// id
 | |
| 		// + accessHash
 | |
| 		// + hash
 | |
| 		// + title
 | |
| 		// + shortName
 | |
| 		// + stickersCount
 | |
| 		// + flags
 | |
| 		// + installDate
 | |
| 		// + thumbnailDocumentId
 | |
| 		// + thumbnailType
 | |
| 		// + thumbnailLocation
 | |
| 		size += sizeof(quint64) * 3
 | |
| 			+ Serialize::stringSize(raw->title)
 | |
| 			+ Serialize::stringSize(raw->shortName)
 | |
| 			+ sizeof(qint32) * 3
 | |
| 			+ sizeof(quint64)
 | |
| 			+ sizeof(qint32)
 | |
| 			+ Serialize::imageLocationSize(raw->thumbnailLocation());
 | |
| 		if (raw->flags & SetFlag::NotLoaded) {
 | |
| 			continue;
 | |
| 		}
 | |
| 
 | |
| 		for (const auto sticker : std::as_const(raw->stickers)) {
 | |
| 			size += Serialize::Document::sizeInStream(sticker);
 | |
| 		}
 | |
| 
 | |
| 		size += sizeof(qint32); // datesCount
 | |
| 		if (!raw->dates.empty()) {
 | |
| 			Assert(raw->stickers.size() == raw->dates.size());
 | |
| 			size += raw->dates.size() * sizeof(qint32);
 | |
| 		}
 | |
| 
 | |
| 		size += sizeof(qint32); // emojiCount
 | |
| 		for (auto j = raw->emoji.cbegin(), e = raw->emoji.cend(); j != e; ++j) {
 | |
| 			size += Serialize::stringSize(j->first->id()) + sizeof(qint32) + (j->second.size() * sizeof(quint64));
 | |
| 		}
 | |
| 
 | |
| 		++setsCount;
 | |
| 	}
 | |
| 	if (!setsCount && order.isEmpty()) {
 | |
| 		if (stickersKey) {
 | |
| 			ClearKey(stickersKey, _basePath);
 | |
| 			stickersKey = 0;
 | |
| 			writeMapDelayed();
 | |
| 		}
 | |
| 		return;
 | |
| 	}
 | |
| 	size += sizeof(qint32) + (order.size() * sizeof(quint64));
 | |
| 
 | |
| 	if (!stickersKey) {
 | |
| 		stickersKey = GenerateKey(_basePath);
 | |
| 		writeMapQueued();
 | |
| 	}
 | |
| 	EncryptedDescriptor data(size);
 | |
| 	data.stream
 | |
| 		<< quint32(kStickersVersionTag)
 | |
| 		<< qint32(kStickersSerializeVersion)
 | |
| 		<< qint32(setsCount);
 | |
| 	for (const auto &[id, set] : sets) {
 | |
| 		auto result = checkSet(*set);
 | |
| 		if (result == StickerSetCheckResult::Abort) {
 | |
| 			return;
 | |
| 		} else if (result == StickerSetCheckResult::Skip) {
 | |
| 			continue;
 | |
| 		}
 | |
| 		writeStickerSet(data.stream, *set);
 | |
| 	}
 | |
| 	data.stream << order;
 | |
| 
 | |
| 	FileWriteDescriptor file(stickersKey, _basePath);
 | |
| 	file.writeEncrypted(data, _localKey);
 | |
| }
 | |
| 
 | |
| void Account::readStickerSets(
 | |
| 		FileKey &stickersKey,
 | |
| 		Data::StickersSetsOrder *outOrder,
 | |
| 		Data::StickersSetFlags readingFlags) {
 | |
| 	using SetFlag = Data::StickersSetFlag;
 | |
| 
 | |
| 	FileReadDescriptor stickers;
 | |
| 	if (!ReadEncryptedFile(stickers, stickersKey, _basePath, _localKey)) {
 | |
| 		ClearKey(stickersKey, _basePath);
 | |
| 		stickersKey = 0;
 | |
| 		writeMapDelayed();
 | |
| 		return;
 | |
| 	}
 | |
| 
 | |
| 	const auto failed = [&] {
 | |
| 		ClearKey(stickersKey, _basePath);
 | |
| 		stickersKey = 0;
 | |
| 	};
 | |
| 
 | |
| 	auto &sets = _owner->session().data().stickers().setsRef();
 | |
| 	if (outOrder) outOrder->clear();
 | |
| 
 | |
| 	quint32 versionTag = 0;
 | |
| 	qint32 version = 0;
 | |
| 	stickers.stream >> versionTag >> version;
 | |
| 	if (versionTag != kStickersVersionTag || version < 2) {
 | |
| 		// Old data, without sticker set thumbnails.
 | |
| 		return failed();
 | |
| 	}
 | |
| 	qint32 count = 0;
 | |
| 	stickers.stream >> count;
 | |
| 	if (!CheckStreamStatus(stickers.stream)
 | |
| 		|| (count < 0)
 | |
| 		|| (count > kMaxSavedStickerSetsCount)) {
 | |
| 		return failed();
 | |
| 	}
 | |
| 	for (auto i = 0; i != count; ++i) {
 | |
| 		quint64 setId = 0, setAccessHash = 0, setHash = 0;
 | |
| 		quint64 setThumbnailDocumentId = 0;
 | |
| 		QString setTitle, setShortName;
 | |
| 		qint32 scnt = 0;
 | |
| 		qint32 setInstallDate = 0;
 | |
| 		Data::StickersSetFlags setFlags = 0;
 | |
| 		qint32 setFlagsValue = 0;
 | |
| 		qint32 setThumbnailType = qint32(StickerType::Webp);
 | |
| 		ImageLocation setThumbnail;
 | |
| 
 | |
| 		stickers.stream
 | |
| 			>> setId
 | |
| 			>> setAccessHash
 | |
| 			>> setHash
 | |
| 			>> setTitle
 | |
| 			>> setShortName
 | |
| 			>> scnt
 | |
| 			>> setFlagsValue
 | |
| 			>> setInstallDate;
 | |
| 		if (version > 2) {
 | |
| 			stickers.stream >> setThumbnailDocumentId;
 | |
| 			if (version > 3) {
 | |
| 				stickers.stream >> setThumbnailType;
 | |
| 			}
 | |
| 		}
 | |
| 
 | |
| 		constexpr auto kLegacyFlagWebm = (1 << 8);
 | |
| 		if ((version < 4) && (setFlagsValue & kLegacyFlagWebm)) {
 | |
| 			setThumbnailType = qint32(StickerType::Webm);
 | |
| 		}
 | |
| 		const auto thumbnail = Serialize::readImageLocation(
 | |
| 			stickers.version,
 | |
| 			stickers.stream);
 | |
| 		if (!thumbnail || !CheckStreamStatus(stickers.stream)) {
 | |
| 			return failed();
 | |
| 		} else if (thumbnail->valid() && thumbnail->isLegacy()) {
 | |
| 			// No thumb_version information in legacy location.
 | |
| 			return failed();
 | |
| 		} else {
 | |
| 			setThumbnail = *thumbnail;
 | |
| 		}
 | |
| 
 | |
| 		setFlags = Data::StickersSetFlags::from_raw(setFlagsValue);
 | |
| 		if (setId == Data::Stickers::DefaultSetId) {
 | |
| 			setTitle = tr::lng_stickers_default_set(tr::now);
 | |
| 			setFlags |= SetFlag::Official | SetFlag::Special;
 | |
| 		} else if (setId == Data::Stickers::CustomSetId) {
 | |
| 			setTitle = u"Custom stickers"_q;
 | |
| 			setFlags |= SetFlag::Special;
 | |
| 		} else if ((setId == Data::Stickers::CloudRecentSetId)
 | |
| 				|| (setId == Data::Stickers::CloudRecentAttachedSetId)) {
 | |
| 			setTitle = tr::lng_recent_stickers(tr::now);
 | |
| 			setFlags |= SetFlag::Special;
 | |
| 		} else if (setId == Data::Stickers::FavedSetId) {
 | |
| 			setTitle = Lang::Hard::FavedSetTitle();
 | |
| 			setFlags |= SetFlag::Special;
 | |
| 		} else if (!setId) {
 | |
| 			continue;
 | |
| 		}
 | |
| 
 | |
| 		auto it = sets.find(setId);
 | |
| 		auto settingSet = (it == sets.cend());
 | |
| 		if (settingSet) {
 | |
| 			// We will set this flags from order lists when reading those stickers.
 | |
| 			setFlags &= ~(SetFlag::Installed | SetFlag::Featured);
 | |
| 			it = sets.emplace(setId, std::make_unique<Data::StickersSet>(
 | |
| 				&_owner->session().data(),
 | |
| 				setId,
 | |
| 				setAccessHash,
 | |
| 				setHash,
 | |
| 				setTitle,
 | |
| 				setShortName,
 | |
| 				0,
 | |
| 				setFlags,
 | |
| 				setInstallDate)).first;
 | |
| 			it->second->thumbnailDocumentId = setThumbnailDocumentId;
 | |
| 		}
 | |
| 		const auto set = it->second.get();
 | |
| 		const auto inputSet = set->identifier();
 | |
| 		const auto fillStickers = set->stickers.isEmpty();
 | |
| 
 | |
| 		if (scnt < 0) { // disabled not loaded set
 | |
| 			if (!set->count || fillStickers) {
 | |
| 				set->count = -scnt;
 | |
| 			}
 | |
| 			continue;
 | |
| 		}
 | |
| 
 | |
| 		if (fillStickers) {
 | |
| 			set->stickers.reserve(scnt);
 | |
| 			set->count = 0;
 | |
| 		}
 | |
| 
 | |
| 		Serialize::Document::StickerSetInfo info(
 | |
| 			setId,
 | |
| 			setAccessHash,
 | |
| 			setShortName);
 | |
| 		base::flat_set<DocumentId> read;
 | |
| 		for (int32 j = 0; j < scnt; ++j) {
 | |
| 			auto document = Serialize::Document::readStickerFromStream(
 | |
| 				&_owner->session(),
 | |
| 				stickers.version,
 | |
| 				stickers.stream, info);
 | |
| 			if (!CheckStreamStatus(stickers.stream)) {
 | |
| 				return failed();
 | |
| 			} else if (!document
 | |
| 				|| !document->sticker()
 | |
| 				|| read.contains(document->id)) {
 | |
| 				continue;
 | |
| 			}
 | |
| 			read.emplace(document->id);
 | |
| 			if (fillStickers) {
 | |
| 				set->stickers.push_back(document);
 | |
| 				if (!(set->flags & SetFlag::Special)) {
 | |
| 					if (!document->sticker()->set.id) {
 | |
| 						document->sticker()->set = inputSet;
 | |
| 					}
 | |
| 				}
 | |
| 				++set->count;
 | |
| 			}
 | |
| 		}
 | |
| 
 | |
| 		qint32 datesCount = 0;
 | |
| 		stickers.stream >> datesCount;
 | |
| 		if (datesCount > 0) {
 | |
| 			if (datesCount != scnt) {
 | |
| 				return failed();
 | |
| 			}
 | |
| 			const auto fillDates =
 | |
| 				((set->id == Data::Stickers::CloudRecentSetId)
 | |
| 					|| (set->id == Data::Stickers::CloudRecentAttachedSetId))
 | |
| 				&& (set->stickers.size() == datesCount);
 | |
| 			if (fillDates) {
 | |
| 				set->dates.clear();
 | |
| 				set->dates.reserve(datesCount);
 | |
| 			}
 | |
| 			for (auto i = 0; i != datesCount; ++i) {
 | |
| 				qint32 date = 0;
 | |
| 				stickers.stream >> date;
 | |
| 				if (fillDates) {
 | |
| 					set->dates.push_back(TimeId(date));
 | |
| 				}
 | |
| 			}
 | |
| 		}
 | |
| 
 | |
| 		qint32 emojiCount = 0;
 | |
| 		stickers.stream >> emojiCount;
 | |
| 		if (!CheckStreamStatus(stickers.stream) || emojiCount < 0) {
 | |
| 			return failed();
 | |
| 		}
 | |
| 		for (int32 j = 0; j < emojiCount; ++j) {
 | |
| 			QString emojiString;
 | |
| 			qint32 stickersCount;
 | |
| 			stickers.stream >> emojiString >> stickersCount;
 | |
| 			Data::StickersPack pack;
 | |
| 			pack.reserve(stickersCount);
 | |
| 			for (int32 k = 0; k < stickersCount; ++k) {
 | |
| 				quint64 id;
 | |
| 				stickers.stream >> id;
 | |
| 				const auto doc = _owner->session().data().document(id);
 | |
| 				if (!doc->sticker()) continue;
 | |
| 
 | |
| 				pack.push_back(doc);
 | |
| 			}
 | |
| 			if (fillStickers) {
 | |
| 				if (auto emoji = Ui::Emoji::Find(emojiString)) {
 | |
| 					emoji = emoji->original();
 | |
| 					set->emoji[emoji] = std::move(pack);
 | |
| 				}
 | |
| 			}
 | |
| 		}
 | |
| 
 | |
| 		if (settingSet) {
 | |
| 			if (version < 4
 | |
| 				&& setThumbnailType == qint32(StickerType::Webp)
 | |
| 				&& !set->stickers.empty()
 | |
| 				&& set->stickers.front()->sticker()) {
 | |
| 				const auto first = set->stickers.front();
 | |
| 				setThumbnailType = qint32(first->sticker()->type);
 | |
| 			}
 | |
| 			const auto thumbType = [&] {
 | |
| 				switch (setThumbnailType) {
 | |
| 				case qint32(StickerType::Webp): return StickerType::Webp;
 | |
| 				case qint32(StickerType::Tgs): return StickerType::Tgs;
 | |
| 				case qint32(StickerType::Webm): return StickerType::Webm;
 | |
| 				}
 | |
| 				return StickerType::Webp;
 | |
| 			}();
 | |
| 			set->setThumbnail(
 | |
| 				ImageWithLocation{ .location = setThumbnail }, thumbType);
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// Read orders of installed and featured stickers.
 | |
| 	if (outOrder) {
 | |
| 		auto outOrderCount = quint32();
 | |
| 		stickers.stream >> outOrderCount;
 | |
| 		if (!CheckStreamStatus(stickers.stream) || outOrderCount > 1000) {
 | |
| 			return failed();
 | |
| 		}
 | |
| 		outOrder->reserve(outOrderCount);
 | |
| 		for (auto i = 0; i != outOrderCount; ++i) {
 | |
| 			auto value = uint64();
 | |
| 			stickers.stream >> value;
 | |
| 			if (!CheckStreamStatus(stickers.stream)) {
 | |
| 				outOrder->clear();
 | |
| 				return failed();
 | |
| 			}
 | |
| 			outOrder->push_back(value);
 | |
| 		}
 | |
| 	}
 | |
| 	if (!CheckStreamStatus(stickers.stream)) {
 | |
| 		return failed();
 | |
| 	}
 | |
| 
 | |
| 	// Set flags that we dropped above from the order.
 | |
| 	if (readingFlags && outOrder) {
 | |
| 		for (const auto setId : std::as_const(*outOrder)) {
 | |
| 			auto it = sets.find(setId);
 | |
| 			if (it != sets.cend()) {
 | |
| 				const auto set = it->second.get();
 | |
| 				set->flags |= readingFlags;
 | |
| 				if ((readingFlags == SetFlag::Installed)
 | |
| 					&& !set->installDate) {
 | |
| 					set->installDate = kDefaultStickerInstallDate;
 | |
| 				}
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| void Account::writeInstalledStickers() {
 | |
| 	using SetFlag = Data::StickersSetFlag;
 | |
| 
 | |
| 	writeStickerSets(_installedStickersKey, [](const Data::StickersSet &set) {
 | |
| 		if (set.id == Data::Stickers::CloudRecentSetId
 | |
| 			|| set.id == Data::Stickers::FavedSetId
 | |
| 			|| set.id == Data::Stickers::CloudRecentAttachedSetId) {
 | |
| 			// separate files for them
 | |
| 			return StickerSetCheckResult::Skip;
 | |
| 		} else if (set.flags & SetFlag::Special) {
 | |
| 			if (set.stickers.isEmpty()) { // all other special are "installed"
 | |
| 				return StickerSetCheckResult::Skip;
 | |
| 			}
 | |
| 		} else if (!(set.flags & SetFlag::Installed)
 | |
| 			|| (set.flags & SetFlag::Archived)
 | |
| 			|| (set.type() != Data::StickersType::Stickers)) {
 | |
| 			return StickerSetCheckResult::Skip;
 | |
| 		} else if (set.flags & SetFlag::NotLoaded) {
 | |
| 			// waiting to receive
 | |
| 			return StickerSetCheckResult::Abort;
 | |
| 		} else if (set.stickers.isEmpty()) {
 | |
| 			return StickerSetCheckResult::Skip;
 | |
| 		}
 | |
| 		return StickerSetCheckResult::Write;
 | |
| 	}, _owner->session().data().stickers().setsOrder());
 | |
| }
 | |
| 
 | |
| void Account::writeFeaturedStickers() {
 | |
| 	using SetFlag = Data::StickersSetFlag;
 | |
| 
 | |
| 	writeStickerSets(_featuredStickersKey, [](const Data::StickersSet &set) {
 | |
| 		if (set.id == Data::Stickers::CloudRecentSetId
 | |
| 			|| set.id == Data::Stickers::FavedSetId
 | |
| 			|| set.id == Data::Stickers::CloudRecentAttachedSetId) {
 | |
| 			// separate files for them
 | |
| 			return StickerSetCheckResult::Skip;
 | |
| 		} else if ((set.flags & SetFlag::Special)
 | |
| 			|| !(set.flags & SetFlag::Featured)
 | |
| 			|| (set.type() != Data::StickersType::Stickers)) {
 | |
| 			return StickerSetCheckResult::Skip;
 | |
| 		} else if (set.flags & SetFlag::NotLoaded) { // waiting to receive
 | |
| 			return StickerSetCheckResult::Abort;
 | |
| 		} else if (set.stickers.isEmpty()) {
 | |
| 			return StickerSetCheckResult::Skip;
 | |
| 		}
 | |
| 		return StickerSetCheckResult::Write;
 | |
| 	}, _owner->session().data().stickers().featuredSetsOrder());
 | |
| }
 | |
| 
 | |
| void Account::writeFeaturedCustomEmoji() {
 | |
| 	using SetFlag = Data::StickersSetFlag;
 | |
| 
 | |
| 	writeStickerSets(_featuredCustomEmojiKey, [](const Data::StickersSet &set) {
 | |
| 		if (!(set.flags & SetFlag::Featured)
 | |
| 			|| (set.type() != Data::StickersType::Emoji)) {
 | |
| 			return StickerSetCheckResult::Skip;
 | |
| 		} else if (set.flags & SetFlag::NotLoaded) { // waiting to receive
 | |
| 			return StickerSetCheckResult::Abort;
 | |
| 		} else if (set.stickers.isEmpty()) {
 | |
| 			return StickerSetCheckResult::Skip;
 | |
| 		}
 | |
| 		return StickerSetCheckResult::Write;
 | |
| 	}, _owner->session().data().stickers().featuredEmojiSetsOrder());
 | |
| }
 | |
| 
 | |
| void Account::writeRecentStickers() {
 | |
| 	writeStickerSets(_recentStickersKey, [](const Data::StickersSet &set) {
 | |
| 		if (set.id != Data::Stickers::CloudRecentSetId
 | |
| 			|| set.stickers.isEmpty()) {
 | |
| 			return StickerSetCheckResult::Skip;
 | |
| 		}
 | |
| 		return StickerSetCheckResult::Write;
 | |
| 	}, Data::StickersSetsOrder());
 | |
| }
 | |
| 
 | |
| void Account::writeFavedStickers() {
 | |
| 	writeStickerSets(_favedStickersKey, [](const Data::StickersSet &set) {
 | |
| 		if (set.id != Data::Stickers::FavedSetId || set.stickers.isEmpty()) {
 | |
| 			return StickerSetCheckResult::Skip;
 | |
| 		}
 | |
| 		return StickerSetCheckResult::Write;
 | |
| 	}, Data::StickersSetsOrder());
 | |
| }
 | |
| 
 | |
| void Account::writeArchivedStickers() {
 | |
| 	using SetFlag = Data::StickersSetFlag;
 | |
| 
 | |
| 	writeStickerSets(_archivedStickersKey, [](const Data::StickersSet &set) {
 | |
| 		if (!(set.flags & SetFlag::Archived)
 | |
| 			|| (set.type() != Data::StickersType::Stickers)
 | |
| 			|| set.stickers.isEmpty()) {
 | |
| 			return StickerSetCheckResult::Skip;
 | |
| 		}
 | |
| 		return StickerSetCheckResult::Write;
 | |
| 	}, _owner->session().data().stickers().archivedSetsOrder());
 | |
| }
 | |
| 
 | |
| void Account::writeArchivedMasks() {
 | |
| 	using SetFlag = Data::StickersSetFlag;
 | |
| 
 | |
| 	writeStickerSets(_archivedStickersKey, [](const Data::StickersSet &set) {
 | |
| 		if (!(set.flags & SetFlag::Archived)
 | |
| 			|| (set.type() != Data::StickersType::Masks)
 | |
| 			|| set.stickers.isEmpty()) {
 | |
| 			return StickerSetCheckResult::Skip;
 | |
| 		}
 | |
| 		return StickerSetCheckResult::Write;
 | |
| 	}, _owner->session().data().stickers().archivedMaskSetsOrder());
 | |
| }
 | |
| 
 | |
| void Account::writeInstalledMasks() {
 | |
| 	using SetFlag = Data::StickersSetFlag;
 | |
| 
 | |
| 	writeStickerSets(_installedMasksKey, [](const Data::StickersSet &set) {
 | |
| 		if (!(set.flags & SetFlag::Installed)
 | |
| 			|| (set.flags & SetFlag::Archived)
 | |
| 			|| (set.type() != Data::StickersType::Masks)
 | |
| 			|| set.stickers.isEmpty()) {
 | |
| 			return StickerSetCheckResult::Skip;
 | |
| 		}
 | |
| 		return StickerSetCheckResult::Write;
 | |
| 	}, _owner->session().data().stickers().maskSetsOrder());
 | |
| }
 | |
| 
 | |
| void Account::writeRecentMasks() {
 | |
| 	writeStickerSets(_recentMasksKey, [](const Data::StickersSet &set) {
 | |
| 		if (set.id != Data::Stickers::CloudRecentAttachedSetId
 | |
| 			|| set.stickers.isEmpty()) {
 | |
| 			return StickerSetCheckResult::Skip;
 | |
| 		}
 | |
| 		return StickerSetCheckResult::Write;
 | |
| 	}, Data::StickersSetsOrder());
 | |
| }
 | |
| 
 | |
| void Account::writeInstalledCustomEmoji() {
 | |
| 	using SetFlag = Data::StickersSetFlag;
 | |
| 
 | |
| 	writeStickerSets(_installedCustomEmojiKey, [](const Data::StickersSet &set) {
 | |
| 		if (!(set.flags & SetFlag::Installed)
 | |
| 			|| (set.flags & SetFlag::Archived)
 | |
| 			|| (set.type() != Data::StickersType::Emoji)) {
 | |
| 			return StickerSetCheckResult::Skip;
 | |
| 		} else if (set.flags & SetFlag::NotLoaded) {
 | |
| 			// waiting to receive
 | |
| 			return StickerSetCheckResult::Abort;
 | |
| 		} else if (set.stickers.isEmpty()) {
 | |
| 			return StickerSetCheckResult::Skip;
 | |
| 		}
 | |
| 		return StickerSetCheckResult::Write;
 | |
| 	}, _owner->session().data().stickers().emojiSetsOrder());
 | |
| }
 | |
| 
 | |
| void Account::importOldRecentStickers() {
 | |
| 	using SetFlag = Data::StickersSetFlag;
 | |
| 
 | |
| 	if (!_recentStickersKeyOld) {
 | |
| 		return;
 | |
| 	}
 | |
| 
 | |
| 	FileReadDescriptor stickers;
 | |
| 	if (!ReadEncryptedFile(stickers, _recentStickersKeyOld, _basePath, _localKey)) {
 | |
| 		ClearKey(_recentStickersKeyOld, _basePath);
 | |
| 		_recentStickersKeyOld = 0;
 | |
| 		writeMapDelayed();
 | |
| 		return;
 | |
| 	}
 | |
| 
 | |
| 	auto &sets = _owner->session().data().stickers().setsRef();
 | |
| 	sets.clear();
 | |
| 
 | |
| 	auto &order = _owner->session().data().stickers().setsOrderRef();
 | |
| 	order.clear();
 | |
| 
 | |
| 	auto &recent = cRefRecentStickers();
 | |
| 	recent.clear();
 | |
| 
 | |
| 	const auto def = sets.emplace(
 | |
| 		Data::Stickers::DefaultSetId,
 | |
| 		std::make_unique<Data::StickersSet>(
 | |
| 			&_owner->session().data(),
 | |
| 			Data::Stickers::DefaultSetId,
 | |
| 			uint64(0), // accessHash
 | |
| 			uint64(0), // hash
 | |
| 			tr::lng_stickers_default_set(tr::now),
 | |
| 			QString(),
 | |
| 			0, // count
 | |
| 			(SetFlag::Official | SetFlag::Installed | SetFlag::Special),
 | |
| 			kDefaultStickerInstallDate)).first->second.get();
 | |
| 	const auto custom = sets.emplace(
 | |
| 		Data::Stickers::CustomSetId,
 | |
| 		std::make_unique<Data::StickersSet>(
 | |
| 			&_owner->session().data(),
 | |
| 			Data::Stickers::CustomSetId,
 | |
| 			uint64(0), // accessHash
 | |
| 			uint64(0), // hash
 | |
| 			u"Custom stickers"_q,
 | |
| 			QString(),
 | |
| 			0, // count
 | |
| 			(SetFlag::Installed | SetFlag::Special),
 | |
| 			kDefaultStickerInstallDate)).first->second.get();
 | |
| 
 | |
| 	QMap<uint64, bool> read;
 | |
| 	while (!stickers.stream.atEnd()) {
 | |
| 		quint64 id, access;
 | |
| 		QString name, mime, alt;
 | |
| 		qint32 date, dc, size, width, height, type;
 | |
| 		qint16 value;
 | |
| 		stickers.stream >> id >> value >> access >> date >> name >> mime >> dc >> size >> width >> height >> type;
 | |
| 		if (stickers.version >= 7021) {
 | |
| 			stickers.stream >> alt;
 | |
| 		}
 | |
| 		if (!value || read.contains(id)) continue;
 | |
| 		read.insert(id, true);
 | |
| 
 | |
| 		QVector<MTPDocumentAttribute> attributes;
 | |
| 		if (!name.isEmpty()) attributes.push_back(MTP_documentAttributeFilename(MTP_string(name)));
 | |
| 		if (type == AnimatedDocument) {
 | |
| 			attributes.push_back(MTP_documentAttributeAnimated());
 | |
| 		} else if (type == StickerDocument) {
 | |
| 			attributes.push_back(MTP_documentAttributeSticker(MTP_flags(0), MTP_string(alt), MTP_inputStickerSetEmpty(), MTPMaskCoords()));
 | |
| 		}
 | |
| 		if (width > 0 && height > 0) {
 | |
| 			attributes.push_back(MTP_documentAttributeImageSize(MTP_int(width), MTP_int(height)));
 | |
| 		}
 | |
| 
 | |
| 		const auto doc = _owner->session().data().document(
 | |
| 			id,
 | |
| 			access,
 | |
| 			QByteArray(),
 | |
| 			date,
 | |
| 			attributes,
 | |
| 			mime,
 | |
| 			InlineImageLocation(),
 | |
| 			ImageWithLocation(), // thumbnail
 | |
| 			ImageWithLocation(), // videoThumbnail
 | |
| 			false, // isPremiumSticker
 | |
| 			dc,
 | |
| 			size);
 | |
| 		if (!doc->sticker()) {
 | |
| 			continue;
 | |
| 		}
 | |
| 
 | |
| 		if (value > 0) {
 | |
| 			def->stickers.push_back(doc);
 | |
| 			++def->count;
 | |
| 		} else {
 | |
| 			custom->stickers.push_back(doc);
 | |
| 			++custom->count;
 | |
| 		}
 | |
| 		if (qAbs(value) > 1
 | |
| 			&& (recent.size()
 | |
| 				< _owner->session().serverConfig().stickersRecentLimit)) {
 | |
| 			recent.push_back(qMakePair(doc, qAbs(value)));
 | |
| 		}
 | |
| 	}
 | |
| 	if (def->stickers.isEmpty()) {
 | |
| 		sets.remove(Data::Stickers::DefaultSetId);
 | |
| 	} else {
 | |
| 		order.push_front(Data::Stickers::DefaultSetId);
 | |
| 	}
 | |
| 	if (custom->stickers.isEmpty()) {
 | |
| 		sets.remove(Data::Stickers::CustomSetId);
 | |
| 	}
 | |
| 
 | |
| 	writeInstalledStickers();
 | |
| 	writeSessionSettings();
 | |
| 
 | |
| 	ClearKey(_recentStickersKeyOld, _basePath);
 | |
| 	_recentStickersKeyOld = 0;
 | |
| 	writeMapDelayed();
 | |
| }
 | |
| 
 | |
| void Account::readInstalledStickers() {
 | |
| 	if (!_installedStickersKey) {
 | |
| 		return importOldRecentStickers();
 | |
| 	}
 | |
| 
 | |
| 	_owner->session().data().stickers().setsRef().clear();
 | |
| 	readStickerSets(
 | |
| 		_installedStickersKey,
 | |
| 		&_owner->session().data().stickers().setsOrderRef(),
 | |
| 		Data::StickersSetFlag::Installed);
 | |
| }
 | |
| 
 | |
| void Account::readFeaturedStickers() {
 | |
| 	readStickerSets(
 | |
| 		_featuredStickersKey,
 | |
| 		&_owner->session().data().stickers().featuredSetsOrderRef(),
 | |
| 		Data::StickersSetFlag::Featured);
 | |
| 
 | |
| 	const auto &sets = _owner->session().data().stickers().sets();
 | |
| 	const auto &order = _owner->session().data().stickers().featuredSetsOrder();
 | |
| 	int unreadCount = 0;
 | |
| 	for (const auto setId : order) {
 | |
| 		auto it = sets.find(setId);
 | |
| 		if (it != sets.cend()
 | |
| 			&& (it->second->flags & Data::StickersSetFlag::Unread)) {
 | |
| 			++unreadCount;
 | |
| 		}
 | |
| 	}
 | |
| 	_owner->session().data().stickers().setFeaturedSetsUnreadCount(unreadCount);
 | |
| }
 | |
| 
 | |
| void Account::readFeaturedCustomEmoji() {
 | |
| 	readStickerSets(
 | |
| 		_featuredCustomEmojiKey,
 | |
| 		&_owner->session().data().stickers().featuredEmojiSetsOrderRef(),
 | |
| 		Data::StickersSetFlag::Featured);
 | |
| }
 | |
| 
 | |
| void Account::readRecentStickers() {
 | |
| 	readStickerSets(_recentStickersKey);
 | |
| }
 | |
| 
 | |
| void Account::readRecentMasks() {
 | |
| 	readStickerSets(_recentMasksKey);
 | |
| }
 | |
| 
 | |
| void Account::readFavedStickers() {
 | |
| 	readStickerSets(_favedStickersKey);
 | |
| }
 | |
| 
 | |
| void Account::readArchivedStickers() {
 | |
| 	// TODO: refactor to support for multiple accounts.
 | |
| 	static bool archivedStickersRead = false;
 | |
| 	if (!archivedStickersRead) {
 | |
| 		readStickerSets(
 | |
| 			_archivedStickersKey,
 | |
| 			&_owner->session().data().stickers().archivedSetsOrderRef());
 | |
| 		archivedStickersRead = true;
 | |
| 	}
 | |
| }
 | |
| 
 | |
| void Account::readArchivedMasks() {
 | |
| 	// TODO: refactor to support for multiple accounts.
 | |
| 	static bool archivedMasksRead = false;
 | |
| 	if (!archivedMasksRead) {
 | |
| 		readStickerSets(
 | |
| 			_archivedMasksKey,
 | |
| 			&_owner->session().data().stickers().archivedMaskSetsOrderRef());
 | |
| 		archivedMasksRead = true;
 | |
| 	}
 | |
| }
 | |
| 
 | |
| void Account::readInstalledMasks() {
 | |
| 	readStickerSets(
 | |
| 		_installedMasksKey,
 | |
| 		&_owner->session().data().stickers().maskSetsOrderRef(),
 | |
| 		Data::StickersSetFlag::Installed);
 | |
| }
 | |
| 
 | |
| void Account::readInstalledCustomEmoji() {
 | |
| 	readStickerSets(
 | |
| 		_installedCustomEmojiKey,
 | |
| 		&_owner->session().data().stickers().emojiSetsOrderRef(),
 | |
| 		Data::StickersSetFlag::Installed);
 | |
| }
 | |
| 
 | |
| void Account::writeSavedGifs() {
 | |
| 	const auto &saved = _owner->session().data().stickers().savedGifs();
 | |
| 	if (saved.isEmpty()) {
 | |
| 		if (_savedGifsKey) {
 | |
| 			ClearKey(_savedGifsKey, _basePath);
 | |
| 			_savedGifsKey = 0;
 | |
| 			writeMapDelayed();
 | |
| 		}
 | |
| 	} else {
 | |
| 		quint32 size = sizeof(quint32); // count
 | |
| 		for (const auto gif : saved) {
 | |
| 			size += Serialize::Document::sizeInStream(gif);
 | |
| 		}
 | |
| 
 | |
| 		if (!_savedGifsKey) {
 | |
| 			_savedGifsKey = GenerateKey(_basePath);
 | |
| 			writeMapQueued();
 | |
| 		}
 | |
| 		EncryptedDescriptor data(size);
 | |
| 		data.stream << quint32(saved.size());
 | |
| 		for (const auto gif : saved) {
 | |
| 			Serialize::Document::writeToStream(data.stream, gif);
 | |
| 		}
 | |
| 		FileWriteDescriptor file(_savedGifsKey, _basePath);
 | |
| 		file.writeEncrypted(data, _localKey);
 | |
| 	}
 | |
| }
 | |
| 
 | |
| void Account::readSavedGifs() {
 | |
| 	if (!_savedGifsKey) return;
 | |
| 
 | |
| 	FileReadDescriptor gifs;
 | |
| 	if (!ReadEncryptedFile(gifs, _savedGifsKey, _basePath, _localKey)) {
 | |
| 		ClearKey(_savedGifsKey, _basePath);
 | |
| 		_savedGifsKey = 0;
 | |
| 		writeMapDelayed();
 | |
| 		return;
 | |
| 	}
 | |
| 
 | |
| 	auto &saved = _owner->session().data().stickers().savedGifsRef();
 | |
| 	const auto failed = [&] {
 | |
| 		ClearKey(_savedGifsKey, _basePath);
 | |
| 		_savedGifsKey = 0;
 | |
| 		saved.clear();
 | |
| 	};
 | |
| 	saved.clear();
 | |
| 
 | |
| 	quint32 cnt;
 | |
| 	gifs.stream >> cnt;
 | |
| 	saved.reserve(cnt);
 | |
| 	OrderedSet<DocumentId> read;
 | |
| 	for (uint32 i = 0; i < cnt; ++i) {
 | |
| 		auto document = Serialize::Document::readFromStream(
 | |
| 			&_owner->session(),
 | |
| 			gifs.version,
 | |
| 			gifs.stream);
 | |
| 		if (!CheckStreamStatus(gifs.stream)) {
 | |
| 			return failed();
 | |
| 		} else if (!document || !document->isGifv()) {
 | |
| 			continue;
 | |
| 		}
 | |
| 
 | |
| 		if (read.contains(document->id)) continue;
 | |
| 		read.insert(document->id);
 | |
| 
 | |
| 		saved.push_back(document);
 | |
| 	}
 | |
| }
 | |
| 
 | |
| void Account::writeRecentHashtagsAndBots() {
 | |
| 	const auto &write = cRecentWriteHashtags();
 | |
| 	const auto &search = cRecentSearchHashtags();
 | |
| 	const auto &bots = cRecentInlineBots();
 | |
| 
 | |
| 	if (write.isEmpty() && search.isEmpty() && bots.isEmpty()) {
 | |
| 		readRecentHashtagsAndBots();
 | |
| 	}
 | |
| 	if (write.isEmpty() && search.isEmpty() && bots.isEmpty()) {
 | |
| 		if (_recentHashtagsAndBotsKey) {
 | |
| 			ClearKey(_recentHashtagsAndBotsKey, _basePath);
 | |
| 			_recentHashtagsAndBotsKey = 0;
 | |
| 			writeMapDelayed();
 | |
| 		}
 | |
| 		return;
 | |
| 	}
 | |
| 	if (!_recentHashtagsAndBotsKey) {
 | |
| 		_recentHashtagsAndBotsKey = GenerateKey(_basePath);
 | |
| 		writeMapQueued();
 | |
| 	}
 | |
| 	quint32 size = sizeof(quint32) * 3, writeCnt = 0, searchCnt = 0, botsCnt = cRecentInlineBots().size();
 | |
| 	for (auto i = write.cbegin(), e = write.cend(); i != e; ++i) {
 | |
| 		if (!i->first.isEmpty()) {
 | |
| 			size += Serialize::stringSize(i->first) + sizeof(quint16);
 | |
| 			++writeCnt;
 | |
| 		}
 | |
| 	}
 | |
| 	for (auto i = search.cbegin(), e = search.cend(); i != e; ++i) {
 | |
| 		if (!i->first.isEmpty()) {
 | |
| 			size += Serialize::stringSize(i->first) + sizeof(quint16);
 | |
| 			++searchCnt;
 | |
| 		}
 | |
| 	}
 | |
| 	for (auto i = bots.cbegin(), e = bots.cend(); i != e; ++i) {
 | |
| 		size += Serialize::peerSize(*i);
 | |
| 	}
 | |
| 
 | |
| 	EncryptedDescriptor data(size);
 | |
| 	data.stream << quint32(writeCnt) << quint32(searchCnt);
 | |
| 	for (auto i = write.cbegin(), e = write.cend(); i != e; ++i) {
 | |
| 		if (!i->first.isEmpty()) data.stream << i->first << quint16(i->second);
 | |
| 	}
 | |
| 	for (auto i = search.cbegin(), e = search.cend(); i != e; ++i) {
 | |
| 		if (!i->first.isEmpty()) data.stream << i->first << quint16(i->second);
 | |
| 	}
 | |
| 	data.stream << quint32(botsCnt);
 | |
| 	for (auto i = bots.cbegin(), e = bots.cend(); i != e; ++i) {
 | |
| 		Serialize::writePeer(data.stream, *i);
 | |
| 	}
 | |
| 	FileWriteDescriptor file(_recentHashtagsAndBotsKey, _basePath);
 | |
| 	file.writeEncrypted(data, _localKey);
 | |
| }
 | |
| 
 | |
| void Account::readRecentHashtagsAndBots() {
 | |
| 	if (_recentHashtagsAndBotsWereRead) return;
 | |
| 	_recentHashtagsAndBotsWereRead = true;
 | |
| 
 | |
| 	if (!_recentHashtagsAndBotsKey) return;
 | |
| 
 | |
| 	FileReadDescriptor hashtags;
 | |
| 	if (!ReadEncryptedFile(hashtags, _recentHashtagsAndBotsKey, _basePath, _localKey)) {
 | |
| 		ClearKey(_recentHashtagsAndBotsKey, _basePath);
 | |
| 		_recentHashtagsAndBotsKey = 0;
 | |
| 		writeMapDelayed();
 | |
| 		return;
 | |
| 	}
 | |
| 
 | |
| 	quint32 writeCount = 0, searchCount = 0, botsCount = 0;
 | |
| 	hashtags.stream >> writeCount >> searchCount;
 | |
| 
 | |
| 	QString tag;
 | |
| 	quint16 count;
 | |
| 
 | |
| 	RecentHashtagPack write, search;
 | |
| 	RecentInlineBots bots;
 | |
| 	if (writeCount) {
 | |
| 		write.reserve(writeCount);
 | |
| 		for (uint32 i = 0; i < writeCount; ++i) {
 | |
| 			hashtags.stream >> tag >> count;
 | |
| 			write.push_back(qMakePair(tag.trimmed(), count));
 | |
| 		}
 | |
| 	}
 | |
| 	if (searchCount) {
 | |
| 		search.reserve(searchCount);
 | |
| 		for (uint32 i = 0; i < searchCount; ++i) {
 | |
| 			hashtags.stream >> tag >> count;
 | |
| 			search.push_back(qMakePair(tag.trimmed(), count));
 | |
| 		}
 | |
| 	}
 | |
| 	cSetRecentWriteHashtags(write);
 | |
| 	cSetRecentSearchHashtags(search);
 | |
| 
 | |
| 	if (!hashtags.stream.atEnd()) {
 | |
| 		hashtags.stream >> botsCount;
 | |
| 		if (botsCount) {
 | |
| 			bots.reserve(botsCount);
 | |
| 			for (auto i = 0; i < botsCount; ++i) {
 | |
| 				const auto peer = Serialize::readPeer(
 | |
| 					&_owner->session(),
 | |
| 					hashtags.version,
 | |
| 					hashtags.stream);
 | |
| 				if (!peer) {
 | |
| 					return; // Broken data.
 | |
| 				} else if (peer->isUser()
 | |
| 					&& peer->asUser()->isBot()
 | |
| 					&& !peer->asUser()->botInfo->inlinePlaceholder.isEmpty()
 | |
| 					&& !peer->asUser()->username().isEmpty()) {
 | |
| 					bots.push_back(peer->asUser());
 | |
| 				}
 | |
| 			}
 | |
| 		}
 | |
| 		cSetRecentInlineBots(bots);
 | |
| 	}
 | |
| }
 | |
| 
 | |
| std::optional<RecentHashtagPack> Account::saveRecentHashtags(
 | |
| 		Fn<RecentHashtagPack()> getPack,
 | |
| 		const QString &text) {
 | |
| 	auto found = false;
 | |
| 	auto m = QRegularExpressionMatch();
 | |
| 	auto recent = getPack();
 | |
| 	for (auto i = 0, next = 0; (m = TextUtilities::RegExpHashtag().match(text, i)).hasMatch(); i = next) {
 | |
| 		i = m.capturedStart();
 | |
| 		next = m.capturedEnd();
 | |
| 		if (m.hasMatch()) {
 | |
| 			if (!m.capturedView(1).isEmpty()) {
 | |
| 				++i;
 | |
| 			}
 | |
| 			if (!m.capturedView(2).isEmpty()) {
 | |
| 				--next;
 | |
| 			}
 | |
| 		}
 | |
| 		const auto tag = text.mid(i + 1, next - i - 1);
 | |
| 		if (TextUtilities::RegExpHashtagExclude().match(tag).hasMatch()) {
 | |
| 			continue;
 | |
| 		}
 | |
| 		if (!found
 | |
| 			&& cRecentWriteHashtags().isEmpty()
 | |
| 			&& cRecentSearchHashtags().isEmpty()) {
 | |
| 			readRecentHashtagsAndBots();
 | |
| 			recent = getPack();
 | |
| 		}
 | |
| 		found = true;
 | |
| 		Local::incrementRecentHashtag(recent, tag);
 | |
| 	}
 | |
| 	return found ? base::make_optional(recent) : std::nullopt;
 | |
| }
 | |
| 
 | |
| void Account::saveRecentSentHashtags(const QString &text) {
 | |
| 	const auto result = saveRecentHashtags(
 | |
| 		[] { return cRecentWriteHashtags(); },
 | |
| 		text);
 | |
| 	if (result) {
 | |
| 		cSetRecentWriteHashtags(*result);
 | |
| 		writeRecentHashtagsAndBots();
 | |
| 	}
 | |
| }
 | |
| 
 | |
| void Account::saveRecentSearchHashtags(const QString &text) {
 | |
| 	const auto result = saveRecentHashtags(
 | |
| 		[] { return cRecentSearchHashtags(); },
 | |
| 		text);
 | |
| 	if (result) {
 | |
| 		cSetRecentSearchHashtags(*result);
 | |
| 		writeRecentHashtagsAndBots();
 | |
| 	}
 | |
| }
 | |
| 
 | |
| void Account::writeExportSettings(const Export::Settings &settings) {
 | |
| 	const auto check = Export::Settings();
 | |
| 	if (settings.types == check.types
 | |
| 		&& settings.fullChats == check.fullChats
 | |
| 		&& settings.media.types == check.media.types
 | |
| 		&& settings.media.sizeLimit == check.media.sizeLimit
 | |
| 		&& settings.path == check.path
 | |
| 		&& settings.format == check.format
 | |
| 		&& settings.availableAt == check.availableAt
 | |
| 		&& !settings.onlySinglePeer()) {
 | |
| 		if (_exportSettingsKey) {
 | |
| 			ClearKey(_exportSettingsKey, _basePath);
 | |
| 			_exportSettingsKey = 0;
 | |
| 			writeMapDelayed();
 | |
| 		}
 | |
| 		return;
 | |
| 	}
 | |
| 	if (!_exportSettingsKey) {
 | |
| 		_exportSettingsKey = GenerateKey(_basePath);
 | |
| 		writeMapQueued();
 | |
| 	}
 | |
| 	quint32 size = sizeof(quint32) * 6
 | |
| 		+ Serialize::stringSize(settings.path)
 | |
| 		+ sizeof(qint32) * 2 + sizeof(quint64);
 | |
| 	EncryptedDescriptor data(size);
 | |
| 	data.stream
 | |
| 		<< quint32(settings.types)
 | |
| 		<< quint32(settings.fullChats)
 | |
| 		<< quint32(settings.media.types)
 | |
| 		<< quint32(settings.media.sizeLimit)
 | |
| 		<< quint32(settings.format)
 | |
| 		<< settings.path
 | |
| 		<< quint32(settings.availableAt);
 | |
| 	settings.singlePeer.match([&](const MTPDinputPeerUser & user) {
 | |
| 		data.stream
 | |
| 			<< kSinglePeerTypeUser
 | |
| 			<< quint64(user.vuser_id().v)
 | |
| 			<< quint64(user.vaccess_hash().v);
 | |
| 	}, [&](const MTPDinputPeerChat & chat) {
 | |
| 		data.stream << kSinglePeerTypeChat << quint64(chat.vchat_id().v);
 | |
| 	}, [&](const MTPDinputPeerChannel & channel) {
 | |
| 		data.stream
 | |
| 			<< kSinglePeerTypeChannel
 | |
| 			<< quint64(channel.vchannel_id().v)
 | |
| 			<< quint64(channel.vaccess_hash().v);
 | |
| 	}, [&](const MTPDinputPeerSelf &) {
 | |
| 		data.stream << kSinglePeerTypeSelf;
 | |
| 	}, [&](const MTPDinputPeerEmpty &) {
 | |
| 		data.stream << kSinglePeerTypeEmpty;
 | |
| 	}, [&](const MTPDinputPeerUserFromMessage &) {
 | |
| 		Unexpected("From message peer in single peer export settings.");
 | |
| 	}, [&](const MTPDinputPeerChannelFromMessage &) {
 | |
| 		Unexpected("From message peer in single peer export settings.");
 | |
| 	});
 | |
| 	data.stream << qint32(settings.singlePeerFrom);
 | |
| 	data.stream << qint32(settings.singlePeerTill);
 | |
| 
 | |
| 	FileWriteDescriptor file(_exportSettingsKey, _basePath);
 | |
| 	file.writeEncrypted(data, _localKey);
 | |
| }
 | |
| 
 | |
| Export::Settings Account::readExportSettings() {
 | |
| 	FileReadDescriptor file;
 | |
| 	if (!ReadEncryptedFile(file, _exportSettingsKey, _basePath, _localKey)) {
 | |
| 		ClearKey(_exportSettingsKey, _basePath);
 | |
| 		_exportSettingsKey = 0;
 | |
| 		writeMapDelayed();
 | |
| 		return Export::Settings();
 | |
| 	}
 | |
| 
 | |
| 	quint32 types = 0, fullChats = 0;
 | |
| 	quint32 mediaTypes = 0, mediaSizeLimit = 0;
 | |
| 	quint32 format = 0, availableAt = 0;
 | |
| 	QString path;
 | |
| 	qint32 singlePeerType = 0, singlePeerBareIdOld = 0;
 | |
| 	quint64 singlePeerBareId = 0;
 | |
| 	quint64 singlePeerAccessHash = 0;
 | |
| 	qint32 singlePeerFrom = 0, singlePeerTill = 0;
 | |
| 	file.stream
 | |
| 		>> types
 | |
| 		>> fullChats
 | |
| 		>> mediaTypes
 | |
| 		>> mediaSizeLimit
 | |
| 		>> format
 | |
| 		>> path
 | |
| 		>> availableAt;
 | |
| 	if (!file.stream.atEnd()) {
 | |
| 		file.stream >> singlePeerType;
 | |
| 		switch (singlePeerType) {
 | |
| 		case kSinglePeerTypeUserOld:
 | |
| 		case kSinglePeerTypeChannelOld: {
 | |
| 			file.stream >> singlePeerBareIdOld >> singlePeerAccessHash;
 | |
| 		} break;
 | |
| 		case kSinglePeerTypeChatOld: file.stream >> singlePeerBareIdOld; break;
 | |
| 
 | |
| 		case kSinglePeerTypeUser:
 | |
| 		case kSinglePeerTypeChannel: {
 | |
| 			file.stream >> singlePeerBareId >> singlePeerAccessHash;
 | |
| 		} break;
 | |
| 		case kSinglePeerTypeChat: file.stream >> singlePeerBareId; break;
 | |
| 		case kSinglePeerTypeSelf:
 | |
| 		case kSinglePeerTypeEmpty: break;
 | |
| 		default: return Export::Settings();
 | |
| 		}
 | |
| 	}
 | |
| 	if (!file.stream.atEnd()) {
 | |
| 		file.stream >> singlePeerFrom >> singlePeerTill;
 | |
| 	}
 | |
| 	auto result = Export::Settings();
 | |
| 	result.types = Export::Settings::Types::from_raw(types);
 | |
| 	result.fullChats = Export::Settings::Types::from_raw(fullChats);
 | |
| 	result.media.types = Export::MediaSettings::Types::from_raw(mediaTypes);
 | |
| 	result.media.sizeLimit = mediaSizeLimit;
 | |
| 	result.format = Export::Output::Format(format);
 | |
| 	result.path = path;
 | |
| 	result.availableAt = availableAt;
 | |
| 	result.singlePeer = [&] {
 | |
| 		switch (singlePeerType) {
 | |
| 		case kSinglePeerTypeUserOld:
 | |
| 			return MTP_inputPeerUser(
 | |
| 				MTP_long(singlePeerBareIdOld),
 | |
| 				MTP_long(singlePeerAccessHash));
 | |
| 		case kSinglePeerTypeChatOld:
 | |
| 			return MTP_inputPeerChat(MTP_long(singlePeerBareIdOld));
 | |
| 		case kSinglePeerTypeChannelOld:
 | |
| 			return MTP_inputPeerChannel(
 | |
| 				MTP_long(singlePeerBareIdOld),
 | |
| 				MTP_long(singlePeerAccessHash));
 | |
| 
 | |
| 		case kSinglePeerTypeUser:
 | |
| 			return MTP_inputPeerUser(
 | |
| 				MTP_long(singlePeerBareId),
 | |
| 				MTP_long(singlePeerAccessHash));
 | |
| 		case kSinglePeerTypeChat:
 | |
| 			return MTP_inputPeerChat(MTP_long(singlePeerBareId));
 | |
| 		case kSinglePeerTypeChannel:
 | |
| 			return MTP_inputPeerChannel(
 | |
| 				MTP_long(singlePeerBareId),
 | |
| 				MTP_long(singlePeerAccessHash));
 | |
| 		case kSinglePeerTypeSelf:
 | |
| 			return MTP_inputPeerSelf();
 | |
| 		case kSinglePeerTypeEmpty:
 | |
| 			return MTP_inputPeerEmpty();
 | |
| 		}
 | |
| 		Unexpected("Type in export data single peer.");
 | |
| 	}();
 | |
| 	result.singlePeerFrom = singlePeerFrom;
 | |
| 	result.singlePeerTill = singlePeerTill;
 | |
| 	return (file.stream.status() == QDataStream::Ok && result.validate())
 | |
| 		? result
 | |
| 		: Export::Settings();
 | |
| }
 | |
| 
 | |
| void Account::writeSelf() {
 | |
| 	writeMapDelayed();
 | |
| }
 | |
| 
 | |
| void Account::readSelf(
 | |
| 		not_null<Main::Session*> session,
 | |
| 		const QByteArray &serialized,
 | |
| 		int32 streamVersion) {
 | |
| 	QDataStream stream(serialized);
 | |
| 	const auto user = session->user();
 | |
| 	const auto wasLoadedStatus = user->loadedStatus();
 | |
| 	user->setLoadedStatus(PeerData::LoadedStatus::Not);
 | |
| 	const auto self = Serialize::readPeer(
 | |
| 		session,
 | |
| 		streamVersion,
 | |
| 		stream);
 | |
| 	if (!self || !self->isSelf() || self != user) {
 | |
| 		user->setLoadedStatus(wasLoadedStatus);
 | |
| 		return;
 | |
| 	}
 | |
| 
 | |
| 	QString about;
 | |
| 	stream >> about;
 | |
| 	if (CheckStreamStatus(stream)) {
 | |
| 		self->asUser()->setAbout(about);
 | |
| 	}
 | |
| }
 | |
| 
 | |
| void Account::writeTrustedBots() {
 | |
| 	if (_trustedBots.empty()) {
 | |
| 		if (_trustedBotsKey) {
 | |
| 			ClearKey(_trustedBotsKey, _basePath);
 | |
| 			_trustedBotsKey = 0;
 | |
| 			writeMapDelayed();
 | |
| 		}
 | |
| 		return;
 | |
| 	}
 | |
| 	if (!_trustedBotsKey) {
 | |
| 		_trustedBotsKey = GenerateKey(_basePath);
 | |
| 		writeMapQueued();
 | |
| 	}
 | |
| 	quint32 size = sizeof(qint32) + _trustedBots.size() * sizeof(quint64);
 | |
| 	EncryptedDescriptor data(size);
 | |
| 	data.stream << qint32(_trustedBots.size());
 | |
| 	for (const auto &[peerId, mask] : _trustedBots) {
 | |
| 		// value: 8 bit mask, 56 bit bot peer_id.
 | |
| 		auto value = SerializePeerId(peerId);
 | |
| 		Assert((value >> 56) == 0);
 | |
| 		value |= (quint64(mask) << 56);
 | |
| 		data.stream << value;
 | |
| 	}
 | |
| 
 | |
| 	FileWriteDescriptor file(_trustedBotsKey, _basePath);
 | |
| 	file.writeEncrypted(data, _localKey);
 | |
| }
 | |
| 
 | |
| void Account::readTrustedBots() {
 | |
| 	if (_trustedBotsRead) {
 | |
| 		return;
 | |
| 	}
 | |
| 	_trustedBotsRead = true;
 | |
| 	if (!_trustedBotsKey) {
 | |
| 		return;
 | |
| 	}
 | |
| 
 | |
| 	FileReadDescriptor trusted;
 | |
| 	if (!ReadEncryptedFile(trusted, _trustedBotsKey, _basePath, _localKey)) {
 | |
| 		ClearKey(_trustedBotsKey, _basePath);
 | |
| 		_trustedBotsKey = 0;
 | |
| 		writeMapDelayed();
 | |
| 		return;
 | |
| 	}
 | |
| 
 | |
| 	qint32 size = 0;
 | |
| 	trusted.stream >> size;
 | |
| 	for (int i = 0; i < size; ++i) {
 | |
| 		auto value = quint64();
 | |
| 		trusted.stream >> value;
 | |
| 		const auto mask = base::flags<BotTrustFlag>::from_raw(
 | |
| 			uchar(value >> 56));
 | |
| 		const auto peerIdSerialized = value & ~(0xFFULL << 56);
 | |
| 		const auto peerId = DeserializePeerId(peerIdSerialized);
 | |
| 		_trustedBots.emplace(peerId, mask);
 | |
| 	}
 | |
| }
 | |
| 
 | |
| void Account::markBotTrustedOpenGame(PeerId botId) {
 | |
| 	if (isBotTrustedOpenGame(botId)) {
 | |
| 		return;
 | |
| 	}
 | |
| 	const auto i = _trustedBots.find(botId);
 | |
| 	if (i == end(_trustedBots)) {
 | |
| 		_trustedBots.emplace(botId, BotTrustFlag());
 | |
| 	} else {
 | |
| 		i->second &= ~BotTrustFlag::NoOpenGame;
 | |
| 	}
 | |
| 	writeTrustedBots();
 | |
| }
 | |
| 
 | |
| bool Account::isBotTrustedOpenGame(PeerId botId) {
 | |
| 	readTrustedBots();
 | |
| 	const auto i = _trustedBots.find(botId);
 | |
| 	return (i != end(_trustedBots))
 | |
| 		&& ((i->second & BotTrustFlag::NoOpenGame) == 0);
 | |
| }
 | |
| 
 | |
| void Account::markBotTrustedPayment(PeerId botId) {
 | |
| 	if (isBotTrustedPayment(botId)) {
 | |
| 		return;
 | |
| 	}
 | |
| 	const auto i = _trustedBots.find(botId);
 | |
| 	if (i == end(_trustedBots)) {
 | |
| 		_trustedBots.emplace(
 | |
| 			botId,
 | |
| 			BotTrustFlag::NoOpenGame | BotTrustFlag::Payment);
 | |
| 	} else {
 | |
| 		i->second |= BotTrustFlag::Payment;
 | |
| 	}
 | |
| 	writeTrustedBots();
 | |
| }
 | |
| 
 | |
| bool Account::isBotTrustedPayment(PeerId botId) {
 | |
| 	readTrustedBots();
 | |
| 	const auto i = _trustedBots.find(botId);
 | |
| 	return (i != end(_trustedBots))
 | |
| 		&& ((i->second & BotTrustFlag::Payment) != 0);
 | |
| }
 | |
| 
 | |
| void Account::markBotTrustedOpenWebView(PeerId botId) {
 | |
| 	if (isBotTrustedOpenWebView(botId)) {
 | |
| 		return;
 | |
| 	}
 | |
| 	const auto i = _trustedBots.find(botId);
 | |
| 	if (i == end(_trustedBots)) {
 | |
| 		_trustedBots.emplace(
 | |
| 			botId,
 | |
| 			BotTrustFlag::NoOpenGame | BotTrustFlag::OpenWebView);
 | |
| 	} else {
 | |
| 		i->second |= BotTrustFlag::OpenWebView;
 | |
| 	}
 | |
| 	writeTrustedBots();
 | |
| }
 | |
| 
 | |
| bool Account::isBotTrustedOpenWebView(PeerId botId) {
 | |
| 	readTrustedBots();
 | |
| 	const auto i = _trustedBots.find(botId);
 | |
| 	return (i != end(_trustedBots))
 | |
| 		&& ((i->second & BotTrustFlag::OpenWebView) != 0);
 | |
| }
 | |
| 
 | |
| bool Account::encrypt(
 | |
| 		const void *src,
 | |
| 		void *dst,
 | |
| 		uint32 len,
 | |
| 		const void *key128) const {
 | |
| 	if (!_localKey) {
 | |
| 		return false;
 | |
| 	}
 | |
| 	MTP::aesEncryptLocal(src, dst, len, _localKey, key128);
 | |
| 	return true;
 | |
| }
 | |
| 
 | |
| bool Account::decrypt(
 | |
| 		const void *src,
 | |
| 		void *dst,
 | |
| 		uint32 len,
 | |
| 		const void *key128) const {
 | |
| 	if (!_localKey) {
 | |
| 		return false;
 | |
| 	}
 | |
| 	MTP::aesDecryptLocal(src, dst, len, _localKey, key128);
 | |
| 	return true;
 | |
| }
 | |
| 
 | |
| } // namespace Storage
 | 
