]> nmode's Git Repositories - signal-cli/blob - lib/src/main/java/org/asamk/signal/manager/helper/IncomingMessageHandler.java
Update libsignal-service-java
[signal-cli] / lib / src / main / java / org / asamk / signal / manager / helper / IncomingMessageHandler.java
1 package org.asamk.signal.manager.helper;
2
3 import org.asamk.signal.manager.Manager;
4 import org.asamk.signal.manager.SignalDependencies;
5 import org.asamk.signal.manager.actions.HandleAction;
6 import org.asamk.signal.manager.actions.RefreshPreKeysAction;
7 import org.asamk.signal.manager.actions.RenewSessionAction;
8 import org.asamk.signal.manager.actions.ResendMessageAction;
9 import org.asamk.signal.manager.actions.RetrieveProfileAction;
10 import org.asamk.signal.manager.actions.RetrieveStorageDataAction;
11 import org.asamk.signal.manager.actions.SendGroupInfoAction;
12 import org.asamk.signal.manager.actions.SendGroupInfoRequestAction;
13 import org.asamk.signal.manager.actions.SendPniIdentityKeyAction;
14 import org.asamk.signal.manager.actions.SendProfileKeyAction;
15 import org.asamk.signal.manager.actions.SendReceiptAction;
16 import org.asamk.signal.manager.actions.SendRetryMessageRequestAction;
17 import org.asamk.signal.manager.actions.SendSyncBlockedListAction;
18 import org.asamk.signal.manager.actions.SendSyncConfigurationAction;
19 import org.asamk.signal.manager.actions.SendSyncContactsAction;
20 import org.asamk.signal.manager.actions.SendSyncGroupsAction;
21 import org.asamk.signal.manager.actions.SendSyncKeysAction;
22 import org.asamk.signal.manager.actions.UpdateAccountAttributesAction;
23 import org.asamk.signal.manager.api.MessageEnvelope;
24 import org.asamk.signal.manager.api.Pair;
25 import org.asamk.signal.manager.api.ReceiveConfig;
26 import org.asamk.signal.manager.api.StickerPackId;
27 import org.asamk.signal.manager.api.TrustLevel;
28 import org.asamk.signal.manager.api.UntrustedIdentityException;
29 import org.asamk.signal.manager.groups.GroupId;
30 import org.asamk.signal.manager.groups.GroupNotFoundException;
31 import org.asamk.signal.manager.groups.GroupUtils;
32 import org.asamk.signal.manager.jobs.RetrieveStickerPackJob;
33 import org.asamk.signal.manager.storage.SignalAccount;
34 import org.asamk.signal.manager.storage.groups.GroupInfoV1;
35 import org.asamk.signal.manager.storage.recipients.Profile;
36 import org.asamk.signal.manager.storage.recipients.RecipientId;
37 import org.asamk.signal.manager.storage.stickers.StickerPack;
38 import org.asamk.signal.manager.util.KeyUtils;
39 import org.signal.libsignal.metadata.ProtocolInvalidKeyException;
40 import org.signal.libsignal.metadata.ProtocolInvalidKeyIdException;
41 import org.signal.libsignal.metadata.ProtocolInvalidMessageException;
42 import org.signal.libsignal.metadata.ProtocolNoSessionException;
43 import org.signal.libsignal.metadata.ProtocolUntrustedIdentityException;
44 import org.signal.libsignal.metadata.SelfSendException;
45 import org.signal.libsignal.protocol.IdentityKeyPair;
46 import org.signal.libsignal.protocol.InvalidMessageException;
47 import org.signal.libsignal.protocol.groups.GroupSessionBuilder;
48 import org.signal.libsignal.protocol.message.DecryptionErrorMessage;
49 import org.signal.libsignal.protocol.state.SignedPreKeyRecord;
50 import org.signal.libsignal.zkgroup.InvalidInputException;
51 import org.signal.libsignal.zkgroup.profiles.ProfileKey;
52 import org.slf4j.Logger;
53 import org.slf4j.LoggerFactory;
54 import org.whispersystems.signalservice.api.crypto.SignalGroupSessionBuilder;
55 import org.whispersystems.signalservice.api.messages.SignalServiceContent;
56 import org.whispersystems.signalservice.api.messages.SignalServiceDataMessage;
57 import org.whispersystems.signalservice.api.messages.SignalServiceEnvelope;
58 import org.whispersystems.signalservice.api.messages.SignalServiceGroup;
59 import org.whispersystems.signalservice.api.messages.SignalServiceGroupContext;
60 import org.whispersystems.signalservice.api.messages.SignalServiceGroupV2;
61 import org.whispersystems.signalservice.api.messages.SignalServicePniSignatureMessage;
62 import org.whispersystems.signalservice.api.messages.SignalServiceReceiptMessage;
63 import org.whispersystems.signalservice.api.messages.SignalServiceStoryMessage;
64 import org.whispersystems.signalservice.api.messages.multidevice.SignalServiceSyncMessage;
65 import org.whispersystems.signalservice.api.messages.multidevice.StickerPackOperationMessage;
66 import org.whispersystems.signalservice.api.push.ACI;
67 import org.whispersystems.signalservice.api.push.PNI;
68 import org.whispersystems.signalservice.api.push.ServiceId;
69 import org.whispersystems.signalservice.api.push.SignalServiceAddress;
70
71 import java.util.ArrayList;
72 import java.util.List;
73 import java.util.Optional;
74 import java.util.stream.Collectors;
75
76 public final class IncomingMessageHandler {
77
78 private final static Logger logger = LoggerFactory.getLogger(IncomingMessageHandler.class);
79
80 private final SignalAccount account;
81 private final SignalDependencies dependencies;
82 private final Context context;
83
84 public IncomingMessageHandler(final Context context) {
85 this.account = context.getAccount();
86 this.dependencies = context.getDependencies();
87 this.context = context;
88 }
89
90 public Pair<List<HandleAction>, Exception> handleRetryEnvelope(
91 final SignalServiceEnvelope envelope,
92 final ReceiveConfig receiveConfig,
93 final Manager.ReceiveMessageHandler handler
94 ) {
95 final List<HandleAction> actions = new ArrayList<>();
96 if (envelope.isPreKeySignalMessage()) {
97 actions.add(RefreshPreKeysAction.create());
98 }
99
100 SignalServiceContent content = null;
101 if (!envelope.isReceipt()) {
102 account.getIdentityKeyStore().setRetryingDecryption(true);
103 try {
104 content = dependencies.getCipher().decrypt(envelope);
105 } catch (ProtocolUntrustedIdentityException e) {
106 final var recipientId = account.getRecipientResolver().resolveRecipient(e.getSender());
107 final var exception = new UntrustedIdentityException(account.getRecipientAddressResolver()
108 .resolveRecipientAddress(recipientId)
109 .toApiRecipientAddress(), e.getSenderDevice());
110 return new Pair<>(List.of(), exception);
111 } catch (Exception e) {
112 return new Pair<>(List.of(), e);
113 } finally {
114 account.getIdentityKeyStore().setRetryingDecryption(false);
115 }
116 }
117 actions.addAll(checkAndHandleMessage(envelope, content, receiveConfig, handler, null));
118 return new Pair<>(actions, null);
119 }
120
121 public Pair<List<HandleAction>, Exception> handleEnvelope(
122 final SignalServiceEnvelope envelope,
123 final ReceiveConfig receiveConfig,
124 final Manager.ReceiveMessageHandler handler
125 ) {
126 final var actions = new ArrayList<HandleAction>();
127 if (envelope.hasSourceUuid()) {
128 // Store uuid if we don't have it already
129 // address/uuid in envelope is sent by server
130 account.getRecipientTrustedResolver().resolveRecipientTrusted(envelope.getSourceAddress());
131 }
132 SignalServiceContent content = null;
133 Exception exception = null;
134 if (!envelope.isReceipt()) {
135 try {
136 content = dependencies.getCipher().decrypt(envelope);
137 } catch (ProtocolUntrustedIdentityException e) {
138 final var recipientId = account.getRecipientResolver().resolveRecipient(e.getSender());
139 actions.add(new RetrieveProfileAction(recipientId));
140 exception = new UntrustedIdentityException(account.getRecipientAddressResolver()
141 .resolveRecipientAddress(recipientId)
142 .toApiRecipientAddress(), e.getSenderDevice());
143 } catch (ProtocolInvalidKeyIdException | ProtocolInvalidKeyException | ProtocolNoSessionException |
144 ProtocolInvalidMessageException e) {
145 logger.debug("Failed to decrypt incoming message", e);
146 final var sender = account.getRecipientResolver().resolveRecipient(e.getSender());
147 if (context.getContactHelper().isContactBlocked(sender)) {
148 logger.debug("Received invalid message from blocked contact, ignoring.");
149 } else {
150 final var senderProfile = context.getProfileHelper().getRecipientProfile(sender);
151 final var selfProfile = context.getProfileHelper().getSelfProfile();
152 var serviceId = ServiceId.parseOrNull(e.getSender());
153 if (serviceId == null) {
154 // Workaround for libsignal-client issue #492
155 serviceId = account.getRecipientAddressResolver()
156 .resolveRecipientAddress(sender)
157 .serviceId()
158 .orElse(null);
159 }
160 if (serviceId != null) {
161 final var isSelf = sender.equals(account.getSelfRecipientId())
162 && e.getSenderDevice() == account.getDeviceId();
163 final var isSenderSenderKeyCapable = senderProfile != null && senderProfile.getCapabilities()
164 .contains(Profile.Capability.senderKey);
165 final var isSelfSenderKeyCapable = selfProfile != null && selfProfile.getCapabilities()
166 .contains(Profile.Capability.senderKey);
167 if (!isSelf && isSenderSenderKeyCapable && isSelfSenderKeyCapable) {
168 logger.debug("Received invalid message, requesting message resend.");
169 actions.add(new SendRetryMessageRequestAction(sender, serviceId, e, envelope));
170 } else {
171 logger.debug("Received invalid message, queuing renew session action.");
172 actions.add(new RenewSessionAction(sender, serviceId));
173 }
174 } else {
175 logger.debug("Received invalid message from invalid sender: {}", e.getSender());
176 }
177 }
178 exception = e;
179 } catch (SelfSendException e) {
180 logger.debug("Dropping unidentified message from self.");
181 return new Pair<>(List.of(), null);
182 } catch (Exception e) {
183 logger.debug("Failed to handle incoming message", e);
184 exception = e;
185 }
186 }
187
188 actions.addAll(checkAndHandleMessage(envelope, content, receiveConfig, handler, exception));
189 return new Pair<>(actions, exception);
190 }
191
192 private List<HandleAction> checkAndHandleMessage(
193 final SignalServiceEnvelope envelope,
194 final SignalServiceContent content,
195 final ReceiveConfig receiveConfig,
196 final Manager.ReceiveMessageHandler handler,
197 final Exception exception
198 ) {
199 if (content != null) {
200 // Store uuid if we don't have it already
201 // address/uuid is validated by unidentified sender certificate
202
203 boolean handledPniSignature = false;
204 if (content.getPniSignatureMessage().isPresent()) {
205 final var message = content.getPniSignatureMessage().get();
206 final var senderAddress = getSenderAddress(envelope, content);
207 if (senderAddress != null) {
208 handledPniSignature = handlePniSignatureMessage(message, senderAddress);
209 }
210 }
211 if (!handledPniSignature) {
212 account.getRecipientTrustedResolver().resolveRecipientTrusted(content.getSender());
213 }
214 }
215 if (envelope.isReceipt()) {
216 final var senderDeviceAddress = getSender(envelope, content);
217 final var sender = senderDeviceAddress.serviceId();
218 final var senderDeviceId = senderDeviceAddress.deviceId();
219 account.getMessageSendLogStore().deleteEntryForRecipient(envelope.getTimestamp(), sender, senderDeviceId);
220 }
221
222 var notAllowedToSendToGroup = isNotAllowedToSendToGroup(envelope, content);
223 final var groupContext = getGroupContext(content);
224 if (groupContext != null && groupContext.getGroupV2().isPresent()) {
225 handleGroupV2Context(groupContext.getGroupV2().get());
226 }
227 // Check again in case the user just joined the group
228 notAllowedToSendToGroup = notAllowedToSendToGroup && isNotAllowedToSendToGroup(envelope, content);
229
230 if (isMessageBlocked(envelope, content)) {
231 logger.info("Ignoring a message from blocked user/group: {}", envelope.getTimestamp());
232 return List.of();
233 } else if (notAllowedToSendToGroup) {
234 final var senderAddress = getSenderAddress(envelope, content);
235 logger.info("Ignoring a group message from an unauthorized sender (no member or admin): {} {}",
236 senderAddress == null ? null : senderAddress.getIdentifier(),
237 envelope.getTimestamp());
238 return List.of();
239 } else {
240 List<HandleAction> actions;
241 if (content != null) {
242 actions = handleMessage(envelope, content, receiveConfig);
243 } else {
244 actions = List.of();
245 }
246 handler.handleMessage(MessageEnvelope.from(envelope,
247 content,
248 account.getRecipientResolver(),
249 account.getRecipientAddressResolver(),
250 context.getAttachmentHelper()::getAttachmentFile,
251 exception), exception);
252 return actions;
253 }
254 }
255
256 public List<HandleAction> handleMessage(
257 SignalServiceEnvelope envelope, SignalServiceContent content, ReceiveConfig receiveConfig
258 ) {
259 var actions = new ArrayList<HandleAction>();
260 final var senderDeviceAddress = getSender(envelope, content);
261 final var sender = senderDeviceAddress.recipientId();
262 final var senderServiceId = senderDeviceAddress.serviceId();
263 final var senderDeviceId = senderDeviceAddress.deviceId();
264 final var destination = getDestination(envelope);
265
266 if (content.getReceiptMessage().isPresent()) {
267 final var message = content.getReceiptMessage().get();
268 if (message.isDeliveryReceipt()) {
269 account.getMessageSendLogStore()
270 .deleteEntriesForRecipient(message.getTimestamps(), senderServiceId, senderDeviceId);
271 }
272 }
273
274 if (content.getSenderKeyDistributionMessage().isPresent()) {
275 final var message = content.getSenderKeyDistributionMessage().get();
276 final var protocolAddress = senderServiceId.toProtocolAddress(senderDeviceId);
277 logger.debug("Received a sender key distribution message for distributionId {} from {}",
278 message.getDistributionId(),
279 protocolAddress);
280 new SignalGroupSessionBuilder(dependencies.getSessionLock(),
281 new GroupSessionBuilder(account.getSenderKeyStore())).process(protocolAddress, message);
282 }
283
284 if (content.getDecryptionErrorMessage().isPresent()) {
285 var message = content.getDecryptionErrorMessage().get();
286 logger.debug("Received a decryption error message from {}.{} (resend request for {})",
287 sender,
288 senderDeviceId,
289 message.getTimestamp());
290 if (message.getDeviceId() == account.getDeviceId()) {
291 handleDecryptionErrorMessage(actions, sender, senderServiceId, senderDeviceId, message);
292 } else {
293 logger.debug("Request is for another one of our devices");
294 }
295 }
296
297 if (content.getDataMessage().isPresent()) {
298 var message = content.getDataMessage().get();
299
300 if (content.isNeedsReceipt()) {
301 actions.add(new SendReceiptAction(sender,
302 SignalServiceReceiptMessage.Type.DELIVERY,
303 message.getTimestamp()));
304 } else {
305 // Message wasn't sent as unidentified sender message
306 final var contact = context.getAccount().getContactStore().getContact(sender);
307 if (account.isPrimaryDevice()
308 && contact != null
309 && !contact.isBlocked()
310 && contact.isProfileSharingEnabled()) {
311 actions.add(UpdateAccountAttributesAction.create());
312 actions.add(new SendProfileKeyAction(sender));
313 }
314 }
315 if (receiveConfig.sendReadReceipts()) {
316 actions.add(new SendReceiptAction(sender,
317 SignalServiceReceiptMessage.Type.READ,
318 message.getTimestamp()));
319 }
320
321 actions.addAll(handleSignalServiceDataMessage(message,
322 false,
323 senderDeviceAddress,
324 destination,
325 receiveConfig.ignoreAttachments()));
326 }
327
328 if (content.getStoryMessage().isPresent()) {
329 final var message = content.getStoryMessage().get();
330 actions.addAll(handleSignalServiceStoryMessage(message, sender, receiveConfig.ignoreAttachments()));
331 }
332
333 if (content.getSyncMessage().isPresent()) {
334 var syncMessage = content.getSyncMessage().get();
335 actions.addAll(handleSyncMessage(envelope,
336 syncMessage,
337 senderDeviceAddress,
338 receiveConfig.ignoreAttachments()));
339 }
340
341 return actions;
342 }
343
344 private boolean handlePniSignatureMessage(
345 final SignalServicePniSignatureMessage message, final SignalServiceAddress senderAddress
346 ) {
347 final var aci = ACI.from(senderAddress.getServiceId());
348 final var aciIdentity = account.getIdentityKeyStore().getIdentityInfo(aci);
349 final var pni = message.getPni();
350 final var pniIdentity = account.getIdentityKeyStore().getIdentityInfo(pni);
351
352 if (aciIdentity == null || pniIdentity == null || aci.equals(pni)) {
353 return false;
354 }
355
356 final var verified = pniIdentity.getIdentityKey()
357 .verifyAlternateIdentity(aciIdentity.getIdentityKey(), message.getSignature());
358
359 if (!verified) {
360 logger.debug("Invalid PNI signature of ACI {} with PNI {}", aci, pni);
361 return false;
362 }
363
364 logger.debug("Verified association of ACI {} with PNI {}", aci, pni);
365 account.getRecipientTrustedResolver()
366 .resolveRecipientTrusted(Optional.of(aci), Optional.of(pni), senderAddress.getNumber());
367 return true;
368 }
369
370 private void handleDecryptionErrorMessage(
371 final List<HandleAction> actions,
372 final RecipientId sender,
373 final ServiceId senderServiceId,
374 final int senderDeviceId,
375 final DecryptionErrorMessage message
376 ) {
377 final var logEntries = account.getMessageSendLogStore()
378 .findMessages(senderServiceId,
379 senderDeviceId,
380 message.getTimestamp(),
381 message.getRatchetKey().isEmpty());
382
383 for (final var logEntry : logEntries) {
384 actions.add(new ResendMessageAction(sender, message.getTimestamp(), logEntry));
385 }
386
387 if (message.getRatchetKey().isPresent()) {
388 if (account.getAciSessionStore()
389 .isCurrentRatchetKey(senderServiceId, senderDeviceId, message.getRatchetKey().get())) {
390 if (logEntries.isEmpty()) {
391 logger.debug("Renewing the session with sender");
392 actions.add(new RenewSessionAction(sender, senderServiceId));
393 } else {
394 logger.trace("Archiving the session with sender, a resend message has already been queued");
395 context.getAccount().getAciSessionStore().archiveSessions(senderServiceId);
396 }
397 }
398 return;
399 }
400
401 var found = false;
402 for (final var logEntry : logEntries) {
403 if (logEntry.groupId().isEmpty()) {
404 continue;
405 }
406 final var group = account.getGroupStore().getGroup(logEntry.groupId().get());
407 if (group == null) {
408 continue;
409 }
410 found = true;
411 logger.trace("Deleting shared sender key with {} ({}): {}",
412 sender,
413 senderDeviceId,
414 group.getDistributionId());
415 account.getSenderKeyStore().deleteSharedWith(senderServiceId, senderDeviceId, group.getDistributionId());
416 }
417 if (!found) {
418 logger.debug("Reset all shared sender keys with this recipient, no related message found in send log");
419 account.getSenderKeyStore().deleteSharedWith(senderServiceId);
420 }
421 }
422
423 private List<HandleAction> handleSyncMessage(
424 final SignalServiceEnvelope envelope,
425 final SignalServiceSyncMessage syncMessage,
426 final DeviceAddress sender,
427 final boolean ignoreAttachments
428 ) {
429 var actions = new ArrayList<HandleAction>();
430 account.setMultiDevice(true);
431 if (syncMessage.getSent().isPresent()) {
432 var message = syncMessage.getSent().get();
433 final var destination = message.getDestination().orElse(null);
434 if (message.getDataMessage().isPresent()) {
435 actions.addAll(handleSignalServiceDataMessage(message.getDataMessage().get(),
436 true,
437 sender,
438 destination == null
439 ? null
440 : new DeviceAddress(context.getRecipientHelper().resolveRecipient(destination),
441 destination.getServiceId(),
442 0),
443 ignoreAttachments));
444 }
445 if (message.getStoryMessage().isPresent()) {
446 actions.addAll(handleSignalServiceStoryMessage(message.getStoryMessage().get(),
447 sender.recipientId(),
448 ignoreAttachments));
449 }
450 }
451 if (syncMessage.getRequest().isPresent() && account.isPrimaryDevice()) {
452 var rm = syncMessage.getRequest().get();
453 if (rm.isContactsRequest()) {
454 actions.add(SendSyncContactsAction.create());
455 }
456 if (rm.isGroupsRequest()) {
457 actions.add(SendSyncGroupsAction.create());
458 }
459 if (rm.isBlockedListRequest()) {
460 actions.add(SendSyncBlockedListAction.create());
461 }
462 if (rm.isKeysRequest()) {
463 actions.add(SendSyncKeysAction.create());
464 }
465 if (rm.isConfigurationRequest()) {
466 actions.add(SendSyncConfigurationAction.create());
467 }
468 if (rm.isPniIdentityRequest()) {
469 actions.add(SendPniIdentityKeyAction.create());
470 }
471 }
472 if (syncMessage.getGroups().isPresent()) {
473 try {
474 final var groupsMessage = syncMessage.getGroups().get();
475 context.getAttachmentHelper()
476 .retrieveAttachment(groupsMessage, context.getSyncHelper()::handleSyncDeviceGroups);
477 } catch (Exception e) {
478 logger.warn("Failed to handle received sync groups, ignoring: {}", e.getMessage());
479 }
480 }
481 if (syncMessage.getBlockedList().isPresent()) {
482 final var blockedListMessage = syncMessage.getBlockedList().get();
483 for (var address : blockedListMessage.getAddresses()) {
484 context.getContactHelper()
485 .setContactBlocked(context.getRecipientHelper().resolveRecipient(address), true);
486 }
487 for (var groupId : blockedListMessage.getGroupIds()
488 .stream()
489 .map(GroupId::unknownVersion)
490 .collect(Collectors.toSet())) {
491 try {
492 context.getGroupHelper().setGroupBlocked(groupId, true);
493 } catch (GroupNotFoundException e) {
494 logger.warn("BlockedListMessage contained groupID that was not found in GroupStore: {}",
495 groupId.toBase64());
496 }
497 }
498 }
499 if (syncMessage.getContacts().isPresent()) {
500 try {
501 final var contactsMessage = syncMessage.getContacts().get();
502 context.getAttachmentHelper()
503 .retrieveAttachment(contactsMessage.getContactsStream(),
504 context.getSyncHelper()::handleSyncDeviceContacts);
505 } catch (Exception e) {
506 logger.warn("Failed to handle received sync contacts, ignoring: {}", e.getMessage());
507 }
508 }
509 if (syncMessage.getVerified().isPresent()) {
510 final var verifiedMessage = syncMessage.getVerified().get();
511 account.getIdentityKeyStore()
512 .setIdentityTrustLevel(verifiedMessage.getDestination().getServiceId(),
513 verifiedMessage.getIdentityKey(),
514 TrustLevel.fromVerifiedState(verifiedMessage.getVerified()));
515 }
516 if (syncMessage.getStickerPackOperations().isPresent()) {
517 final var stickerPackOperationMessages = syncMessage.getStickerPackOperations().get();
518 for (var m : stickerPackOperationMessages) {
519 if (m.getPackId().isEmpty()) {
520 continue;
521 }
522 final var stickerPackId = StickerPackId.deserialize(m.getPackId().get());
523 final var installed = m.getType().isEmpty()
524 || m.getType().get() == StickerPackOperationMessage.Type.INSTALL;
525
526 var sticker = account.getStickerStore().getStickerPack(stickerPackId);
527 if (m.getPackKey().isPresent()) {
528 if (sticker == null) {
529 sticker = new StickerPack(-1, stickerPackId, m.getPackKey().get(), installed);
530 account.getStickerStore().addStickerPack(sticker);
531 }
532 if (installed) {
533 context.getJobExecutor()
534 .enqueueJob(new RetrieveStickerPackJob(stickerPackId, m.getPackKey().get()));
535 }
536 }
537
538 if (sticker != null && sticker.isInstalled() != installed) {
539 account.getStickerStore().updateStickerPackInstalled(sticker.packId(), installed);
540 }
541 }
542 }
543 if (syncMessage.getFetchType().isPresent()) {
544 switch (syncMessage.getFetchType().get()) {
545 case LOCAL_PROFILE:
546 actions.add(new RetrieveProfileAction(account.getSelfRecipientId()));
547 case STORAGE_MANIFEST:
548 actions.add(RetrieveStorageDataAction.create());
549 }
550 }
551 if (syncMessage.getKeys().isPresent()) {
552 final var keysMessage = syncMessage.getKeys().get();
553 if (keysMessage.getStorageService().isPresent()) {
554 final var storageKey = keysMessage.getStorageService().get();
555 account.setStorageKey(storageKey);
556 actions.add(RetrieveStorageDataAction.create());
557 }
558 }
559 if (syncMessage.getConfiguration().isPresent()) {
560 final var configurationMessage = syncMessage.getConfiguration().get();
561 final var configurationStore = account.getConfigurationStore();
562 if (configurationMessage.getReadReceipts().isPresent()) {
563 configurationStore.setReadReceipts(configurationMessage.getReadReceipts().get());
564 }
565 if (configurationMessage.getLinkPreviews().isPresent()) {
566 configurationStore.setLinkPreviews(configurationMessage.getLinkPreviews().get());
567 }
568 if (configurationMessage.getTypingIndicators().isPresent()) {
569 configurationStore.setTypingIndicators(configurationMessage.getTypingIndicators().get());
570 }
571 if (configurationMessage.getUnidentifiedDeliveryIndicators().isPresent()) {
572 configurationStore.setUnidentifiedDeliveryIndicators(configurationMessage.getUnidentifiedDeliveryIndicators()
573 .get());
574 }
575 }
576 if (syncMessage.getPniIdentity().isPresent()) {
577 final var pniIdentity = syncMessage.getPniIdentity().get();
578 account.setPniIdentityKeyPair(KeyUtils.getIdentityKeyPair(pniIdentity.getPublicKey().toByteArray(),
579 pniIdentity.getPrivateKey().toByteArray()));
580 actions.add(RefreshPreKeysAction.create());
581 }
582 if (syncMessage.getPniChangeNumber().isPresent()) {
583 final var pniChangeNumber = syncMessage.getPniChangeNumber().get();
584 logger.debug("Received PNI change number sync message, applying.");
585 if (pniChangeNumber.hasIdentityKeyPair()
586 && pniChangeNumber.hasRegistrationId()
587 && pniChangeNumber.hasSignedPreKey()
588 && !envelope.getUpdatedPni().isEmpty()) {
589 logger.debug("New PNI: {}", envelope.getUpdatedPni());
590 try {
591 final var updatedPni = PNI.parseOrThrow(envelope.getUpdatedPni());
592 context.getAccountHelper()
593 .setPni(updatedPni,
594 new IdentityKeyPair(pniChangeNumber.getIdentityKeyPair().toByteArray()),
595 new SignedPreKeyRecord(pniChangeNumber.getSignedPreKey().toByteArray()),
596 pniChangeNumber.getRegistrationId());
597 } catch (Exception e) {
598 logger.warn("Failed to handle change number message", e);
599 }
600 }
601 }
602 return actions;
603 }
604
605 private SignalServiceGroupContext getGroupContext(SignalServiceContent content) {
606 if (content == null) {
607 return null;
608 }
609
610 if (content.getDataMessage().isPresent()) {
611 var message = content.getDataMessage().get();
612 if (message.getGroupContext().isPresent()) {
613 return message.getGroupContext().get();
614 }
615 }
616
617 if (content.getStoryMessage().isPresent()) {
618 var message = content.getStoryMessage().get();
619 if (message.getGroupContext().isPresent()) {
620 try {
621 return SignalServiceGroupContext.create(null, message.getGroupContext().get());
622 } catch (InvalidMessageException e) {
623 throw new AssertionError(e);
624 }
625 }
626 }
627
628 return null;
629 }
630
631 private boolean isMessageBlocked(SignalServiceEnvelope envelope, SignalServiceContent content) {
632 SignalServiceAddress source = getSenderAddress(envelope, content);
633 if (source == null) {
634 return false;
635 }
636 final var recipientId = context.getRecipientHelper().resolveRecipient(source);
637 if (context.getContactHelper().isContactBlocked(recipientId)) {
638 return true;
639 }
640
641 final var groupContext = getGroupContext(content);
642 if (groupContext != null) {
643 var groupId = GroupUtils.getGroupId(groupContext);
644 return context.getGroupHelper().isGroupBlocked(groupId);
645 }
646
647 return false;
648 }
649
650 private boolean isNotAllowedToSendToGroup(SignalServiceEnvelope envelope, SignalServiceContent content) {
651 SignalServiceAddress source = getSenderAddress(envelope, content);
652 if (source == null) {
653 return false;
654 }
655
656 final var groupContext = getGroupContext(content);
657 if (groupContext == null) {
658 return false;
659 }
660
661 if (groupContext.getGroupV1().isPresent()) {
662 var groupInfo = groupContext.getGroupV1().get();
663 if (groupInfo.getType() == SignalServiceGroup.Type.QUIT) {
664 return false;
665 }
666 }
667
668 var groupId = GroupUtils.getGroupId(groupContext);
669 var group = context.getGroupHelper().getGroup(groupId);
670 if (group == null) {
671 return false;
672 }
673
674 final var message = content.getDataMessage().orElse(null);
675
676 final var recipientId = context.getRecipientHelper().resolveRecipient(source);
677 if (!group.isMember(recipientId) && !(
678 group.isPendingMember(recipientId) && message != null && message.isGroupV2Update()
679 )) {
680 return true;
681 }
682
683 if (group.isAnnouncementGroup() && !group.isAdmin(recipientId)) {
684 return message == null
685 || message.getBody().isPresent()
686 || message.getAttachments().isPresent()
687 || message.getQuote().isPresent()
688 || message.getPreviews().isPresent()
689 || message.getMentions().isPresent()
690 || message.getSticker().isPresent();
691 }
692 return false;
693 }
694
695 private List<HandleAction> handleSignalServiceDataMessage(
696 SignalServiceDataMessage message,
697 boolean isSync,
698 DeviceAddress source,
699 DeviceAddress destination,
700 boolean ignoreAttachments
701 ) {
702 var actions = new ArrayList<HandleAction>();
703 if (message.getGroupContext().isPresent()) {
704 final var groupContext = message.getGroupContext().get();
705 if (groupContext.getGroupV1().isPresent()) {
706 var groupInfo = groupContext.getGroupV1().get();
707 var groupId = GroupId.v1(groupInfo.getGroupId());
708 var group = context.getGroupHelper().getGroup(groupId);
709 if (group == null || group instanceof GroupInfoV1) {
710 var groupV1 = (GroupInfoV1) group;
711 switch (groupInfo.getType()) {
712 case UPDATE: {
713 if (groupV1 == null) {
714 groupV1 = new GroupInfoV1(groupId);
715 }
716
717 if (groupInfo.getAvatar().isPresent()) {
718 var avatar = groupInfo.getAvatar().get();
719 context.getGroupHelper().downloadGroupAvatar(groupV1.getGroupId(), avatar);
720 }
721
722 if (groupInfo.getName().isPresent()) {
723 groupV1.name = groupInfo.getName().get();
724 }
725
726 if (groupInfo.getMembers().isPresent()) {
727 groupV1.addMembers(groupInfo.getMembers()
728 .get()
729 .stream()
730 .map(context.getRecipientHelper()::resolveRecipient)
731 .collect(Collectors.toSet()));
732 }
733
734 account.getGroupStore().updateGroup(groupV1);
735 break;
736 }
737 case DELIVER:
738 if (groupV1 == null && !isSync) {
739 actions.add(new SendGroupInfoRequestAction(source.recipientId(), groupId));
740 }
741 break;
742 case QUIT: {
743 if (groupV1 != null) {
744 groupV1.removeMember(source.recipientId());
745 account.getGroupStore().updateGroup(groupV1);
746 }
747 break;
748 }
749 case REQUEST_INFO:
750 if (groupV1 != null && !isSync) {
751 actions.add(new SendGroupInfoAction(source.recipientId(), groupV1.getGroupId()));
752 }
753 break;
754 }
755 } else {
756 // Received a group v1 message for a v2 group
757 }
758 }
759 if (groupContext.getGroupV2().isPresent()) {
760 handleGroupV2Context(groupContext.getGroupV2().get());
761 }
762 }
763
764 final var conversationPartnerAddress = isSync ? destination : source;
765 if (conversationPartnerAddress != null && message.isEndSession()) {
766 account.getAciSessionStore().deleteAllSessions(conversationPartnerAddress.serviceId());
767 }
768 if (message.isExpirationUpdate() || message.getBody().isPresent()) {
769 if (message.getGroupContext().isPresent()) {
770 final var groupContext = message.getGroupContext().get();
771 if (groupContext.getGroupV1().isPresent()) {
772 var groupInfo = groupContext.getGroupV1().get();
773 var group = account.getGroupStore().getOrCreateGroupV1(GroupId.v1(groupInfo.getGroupId()));
774 if (group != null) {
775 if (group.messageExpirationTime != message.getExpiresInSeconds()) {
776 group.messageExpirationTime = message.getExpiresInSeconds();
777 account.getGroupStore().updateGroup(group);
778 }
779 }
780 } else if (groupContext.getGroupV2().isPresent()) {
781 // disappearing message timer already stored in the DecryptedGroup
782 }
783 } else if (conversationPartnerAddress != null) {
784 context.getContactHelper()
785 .setExpirationTimer(conversationPartnerAddress.recipientId(), message.getExpiresInSeconds());
786 }
787 }
788 if (!ignoreAttachments) {
789 if (message.getAttachments().isPresent()) {
790 for (var attachment : message.getAttachments().get()) {
791 context.getAttachmentHelper().downloadAttachment(attachment);
792 }
793 }
794 if (message.getSharedContacts().isPresent()) {
795 for (var contact : message.getSharedContacts().get()) {
796 if (contact.getAvatar().isPresent()) {
797 context.getAttachmentHelper().downloadAttachment(contact.getAvatar().get().getAttachment());
798 }
799 }
800 }
801 if (message.getPreviews().isPresent()) {
802 final var previews = message.getPreviews().get();
803 for (var preview : previews) {
804 if (preview.getImage().isPresent()) {
805 context.getAttachmentHelper().downloadAttachment(preview.getImage().get());
806 }
807 }
808 }
809 if (message.getQuote().isPresent()) {
810 final var quote = message.getQuote().get();
811
812 for (var quotedAttachment : quote.getAttachments()) {
813 final var thumbnail = quotedAttachment.getThumbnail();
814 if (thumbnail != null) {
815 context.getAttachmentHelper().downloadAttachment(thumbnail);
816 }
817 }
818 }
819 }
820 if (message.getProfileKey().isPresent()) {
821 handleIncomingProfileKey(message.getProfileKey().get(), source.recipientId());
822 }
823 if (message.getSticker().isPresent()) {
824 final var messageSticker = message.getSticker().get();
825 final var stickerPackId = StickerPackId.deserialize(messageSticker.getPackId());
826 var sticker = account.getStickerStore().getStickerPack(stickerPackId);
827 if (sticker == null) {
828 sticker = new StickerPack(stickerPackId, messageSticker.getPackKey());
829 account.getStickerStore().addStickerPack(sticker);
830 }
831 context.getJobExecutor().enqueueJob(new RetrieveStickerPackJob(stickerPackId, messageSticker.getPackKey()));
832 }
833 return actions;
834 }
835
836 private List<HandleAction> handleSignalServiceStoryMessage(
837 SignalServiceStoryMessage message, RecipientId source, boolean ignoreAttachments
838 ) {
839 var actions = new ArrayList<HandleAction>();
840 if (message.getGroupContext().isPresent()) {
841 handleGroupV2Context(message.getGroupContext().get());
842 }
843
844 if (!ignoreAttachments) {
845 if (message.getFileAttachment().isPresent()) {
846 context.getAttachmentHelper().downloadAttachment(message.getFileAttachment().get());
847 }
848 if (message.getTextAttachment().isPresent()) {
849 final var textAttachment = message.getTextAttachment().get();
850 if (textAttachment.getPreview().isPresent()) {
851 final var preview = textAttachment.getPreview().get();
852 if (preview.getImage().isPresent()) {
853 context.getAttachmentHelper().downloadAttachment(preview.getImage().get());
854 }
855 }
856 }
857 }
858
859 if (message.getProfileKey().isPresent()) {
860 handleIncomingProfileKey(message.getProfileKey().get(), source);
861 }
862
863 return actions;
864 }
865
866 private void handleGroupV2Context(final SignalServiceGroupV2 groupContext) {
867 final var groupMasterKey = groupContext.getMasterKey();
868
869 context.getGroupHelper()
870 .getOrMigrateGroup(groupMasterKey,
871 groupContext.getRevision(),
872 groupContext.hasSignedGroupChange() ? groupContext.getSignedGroupChange() : null);
873 }
874
875 private void handleIncomingProfileKey(final byte[] profileKeyBytes, final RecipientId source) {
876 if (profileKeyBytes.length != 32) {
877 logger.debug("Received invalid profile key of length {}", profileKeyBytes.length);
878 return;
879 }
880 final ProfileKey profileKey;
881 try {
882 profileKey = new ProfileKey(profileKeyBytes);
883 } catch (InvalidInputException e) {
884 throw new AssertionError(e);
885 }
886 if (account.getSelfRecipientId().equals(source)) {
887 this.account.setProfileKey(profileKey);
888 }
889 this.account.getProfileStore().storeProfileKey(source, profileKey);
890 }
891
892 private SignalServiceAddress getSenderAddress(SignalServiceEnvelope envelope, SignalServiceContent content) {
893 if (!envelope.isUnidentifiedSender() && envelope.hasSourceUuid()) {
894 return envelope.getSourceAddress();
895 } else if (content != null) {
896 return content.getSender();
897 } else {
898 return null;
899 }
900 }
901
902 private DeviceAddress getSender(SignalServiceEnvelope envelope, SignalServiceContent content) {
903 if (!envelope.isUnidentifiedSender() && envelope.hasSourceUuid()) {
904 return new DeviceAddress(context.getRecipientHelper().resolveRecipient(envelope.getSourceAddress()),
905 envelope.getSourceAddress().getServiceId(),
906 envelope.getSourceDevice());
907 } else {
908 return new DeviceAddress(context.getRecipientHelper().resolveRecipient(content.getSender()),
909 content.getSender().getServiceId(),
910 content.getSenderDevice());
911 }
912 }
913
914 private DeviceAddress getDestination(SignalServiceEnvelope envelope) {
915 if (!envelope.hasDestinationUuid()) {
916 return new DeviceAddress(account.getSelfRecipientId(), account.getAci(), account.getDeviceId());
917 }
918 final var addressOptional = SignalServiceAddress.fromRaw(envelope.getDestinationUuid(), null);
919 if (addressOptional.isEmpty()) {
920 return new DeviceAddress(account.getSelfRecipientId(), account.getAci(), account.getDeviceId());
921 }
922 final var address = addressOptional.get();
923 return new DeviceAddress(context.getRecipientHelper().resolveRecipient(address), address.getServiceId(), 0);
924 }
925
926 private record DeviceAddress(RecipientId recipientId, ServiceId serviceId, int deviceId) {}
927 }