1 package org
.asamk
.signal
.manager
.helper
;
3 import org
.asamk
.signal
.manager
.Manager
;
4 import org
.asamk
.signal
.manager
.actions
.HandleAction
;
5 import org
.asamk
.signal
.manager
.actions
.RefreshPreKeysAction
;
6 import org
.asamk
.signal
.manager
.actions
.RenewSessionAction
;
7 import org
.asamk
.signal
.manager
.actions
.ResendMessageAction
;
8 import org
.asamk
.signal
.manager
.actions
.RetrieveProfileAction
;
9 import org
.asamk
.signal
.manager
.actions
.SendGroupInfoAction
;
10 import org
.asamk
.signal
.manager
.actions
.SendGroupInfoRequestAction
;
11 import org
.asamk
.signal
.manager
.actions
.SendProfileKeyAction
;
12 import org
.asamk
.signal
.manager
.actions
.SendReceiptAction
;
13 import org
.asamk
.signal
.manager
.actions
.SendRetryMessageRequestAction
;
14 import org
.asamk
.signal
.manager
.actions
.SendSyncBlockedListAction
;
15 import org
.asamk
.signal
.manager
.actions
.SendSyncConfigurationAction
;
16 import org
.asamk
.signal
.manager
.actions
.SendSyncContactsAction
;
17 import org
.asamk
.signal
.manager
.actions
.SendSyncGroupsAction
;
18 import org
.asamk
.signal
.manager
.actions
.SendSyncKeysAction
;
19 import org
.asamk
.signal
.manager
.actions
.SyncStorageDataAction
;
20 import org
.asamk
.signal
.manager
.actions
.UpdateAccountAttributesAction
;
21 import org
.asamk
.signal
.manager
.api
.GroupId
;
22 import org
.asamk
.signal
.manager
.api
.GroupNotFoundException
;
23 import org
.asamk
.signal
.manager
.api
.MessageEnvelope
;
24 import org
.asamk
.signal
.manager
.api
.Pair
;
25 import org
.asamk
.signal
.manager
.api
.ReceiveConfig
;
26 import org
.asamk
.signal
.manager
.api
.StickerPackId
;
27 import org
.asamk
.signal
.manager
.api
.TrustLevel
;
28 import org
.asamk
.signal
.manager
.api
.UntrustedIdentityException
;
29 import org
.asamk
.signal
.manager
.groups
.GroupUtils
;
30 import org
.asamk
.signal
.manager
.internal
.SignalDependencies
;
31 import org
.asamk
.signal
.manager
.jobs
.RetrieveStickerPackJob
;
32 import org
.asamk
.signal
.manager
.storage
.SignalAccount
;
33 import org
.asamk
.signal
.manager
.storage
.groups
.GroupInfoV1
;
34 import org
.asamk
.signal
.manager
.storage
.recipients
.RecipientAddress
;
35 import org
.asamk
.signal
.manager
.storage
.recipients
.RecipientId
;
36 import org
.asamk
.signal
.manager
.storage
.stickers
.StickerPack
;
37 import org
.signal
.libsignal
.metadata
.ProtocolInvalidKeyException
;
38 import org
.signal
.libsignal
.metadata
.ProtocolInvalidKeyIdException
;
39 import org
.signal
.libsignal
.metadata
.ProtocolInvalidMessageException
;
40 import org
.signal
.libsignal
.metadata
.ProtocolNoSessionException
;
41 import org
.signal
.libsignal
.metadata
.ProtocolUntrustedIdentityException
;
42 import org
.signal
.libsignal
.metadata
.SelfSendException
;
43 import org
.signal
.libsignal
.protocol
.InvalidMessageException
;
44 import org
.signal
.libsignal
.protocol
.groups
.GroupSessionBuilder
;
45 import org
.signal
.libsignal
.protocol
.message
.DecryptionErrorMessage
;
46 import org
.signal
.libsignal
.zkgroup
.InvalidInputException
;
47 import org
.signal
.libsignal
.zkgroup
.profiles
.ProfileKey
;
48 import org
.slf4j
.Logger
;
49 import org
.slf4j
.LoggerFactory
;
50 import org
.whispersystems
.signalservice
.api
.InvalidMessageStructureException
;
51 import org
.whispersystems
.signalservice
.api
.crypto
.SignalGroupSessionBuilder
;
52 import org
.whispersystems
.signalservice
.api
.crypto
.SignalServiceCipherResult
;
53 import org
.whispersystems
.signalservice
.api
.messages
.EnvelopeContentValidator
;
54 import org
.whispersystems
.signalservice
.api
.messages
.SignalServiceContent
;
55 import org
.whispersystems
.signalservice
.api
.messages
.SignalServiceDataMessage
;
56 import org
.whispersystems
.signalservice
.api
.messages
.SignalServiceEnvelope
;
57 import org
.whispersystems
.signalservice
.api
.messages
.SignalServiceGroup
;
58 import org
.whispersystems
.signalservice
.api
.messages
.SignalServiceGroupContext
;
59 import org
.whispersystems
.signalservice
.api
.messages
.SignalServiceGroupV2
;
60 import org
.whispersystems
.signalservice
.api
.messages
.SignalServicePniSignatureMessage
;
61 import org
.whispersystems
.signalservice
.api
.messages
.SignalServiceReceiptMessage
;
62 import org
.whispersystems
.signalservice
.api
.messages
.SignalServiceStoryMessage
;
63 import org
.whispersystems
.signalservice
.api
.messages
.multidevice
.SignalServiceSyncMessage
;
64 import org
.whispersystems
.signalservice
.api
.messages
.multidevice
.StickerPackOperationMessage
;
65 import org
.whispersystems
.signalservice
.api
.push
.ServiceId
;
66 import org
.whispersystems
.signalservice
.api
.push
.ServiceId
.ACI
;
67 import org
.whispersystems
.signalservice
.api
.push
.ServiceIdType
;
68 import org
.whispersystems
.signalservice
.api
.push
.SignalServiceAddress
;
69 import org
.whispersystems
.signalservice
.internal
.push
.Envelope
;
70 import org
.whispersystems
.signalservice
.internal
.push
.UnsupportedDataMessageException
;
72 import java
.util
.ArrayList
;
73 import java
.util
.List
;
74 import java
.util
.Optional
;
75 import java
.util
.stream
.Collectors
;
77 public final class IncomingMessageHandler
{
79 private static final Logger logger
= LoggerFactory
.getLogger(IncomingMessageHandler
.class);
81 private final SignalAccount account
;
82 private final SignalDependencies dependencies
;
83 private final Context context
;
85 public IncomingMessageHandler(final Context context
) {
86 this.account
= context
.getAccount();
87 this.dependencies
= context
.getDependencies();
88 this.context
= context
;
91 public Pair
<List
<HandleAction
>, Exception
> handleRetryEnvelope(
92 final SignalServiceEnvelope envelope
,
93 final ReceiveConfig receiveConfig
,
94 final Manager
.ReceiveMessageHandler handler
96 final List
<HandleAction
> actions
= new ArrayList
<>();
97 if (envelope
.isPreKeySignalMessage()) {
98 actions
.add(RefreshPreKeysAction
.create());
101 SignalServiceContent content
= null;
102 if (!envelope
.isReceipt()) {
103 account
.getIdentityKeyStore().setRetryingDecryption(true);
104 final var destination
= getDestination(envelope
).serviceId();
106 final var cipherResult
= dependencies
.getCipher(destination
== null
107 || destination
.equals(account
.getAci()) ? ServiceIdType
.ACI
: ServiceIdType
.PNI
)
108 .decrypt(envelope
.getProto(), envelope
.getServerDeliveredTimestamp());
109 content
= validate(envelope
.getProto(), cipherResult
, envelope
.getServerDeliveredTimestamp());
110 if (content
== null) {
111 return new Pair
<>(List
.of(), null);
113 } catch (ProtocolUntrustedIdentityException e
) {
114 final var recipientId
= account
.getRecipientResolver().resolveRecipient(e
.getSender());
115 final var exception
= new UntrustedIdentityException(account
.getRecipientAddressResolver()
116 .resolveRecipientAddress(recipientId
)
117 .toApiRecipientAddress(), e
.getSenderDevice());
118 return new Pair
<>(List
.of(), exception
);
119 } catch (Exception e
) {
120 return new Pair
<>(List
.of(), e
);
122 account
.getIdentityKeyStore().setRetryingDecryption(false);
125 actions
.addAll(checkAndHandleMessage(envelope
, content
, receiveConfig
, handler
, null));
126 return new Pair
<>(actions
, null);
129 public Pair
<List
<HandleAction
>, Exception
> handleEnvelope(
130 final SignalServiceEnvelope envelope
,
131 final ReceiveConfig receiveConfig
,
132 final Manager
.ReceiveMessageHandler handler
134 final var actions
= new ArrayList
<HandleAction
>();
135 SignalServiceContent content
= null;
136 Exception exception
= null;
137 envelope
.getSourceServiceId().map(ServiceId
::parseOrNull
)
138 // Store uuid if we don't have it already
139 // uuid in envelope is sent by server
140 .ifPresent(serviceId
-> account
.getRecipientResolver().resolveRecipient(serviceId
));
141 if (!envelope
.isReceipt()) {
142 final var destination
= getDestination(envelope
).serviceId();
144 final var cipherResult
= dependencies
.getCipher(destination
== null
145 || destination
.equals(account
.getAci()) ? ServiceIdType
.ACI
: ServiceIdType
.PNI
)
146 .decrypt(envelope
.getProto(), envelope
.getServerDeliveredTimestamp());
147 content
= validate(envelope
.getProto(), cipherResult
, envelope
.getServerDeliveredTimestamp());
148 if (content
== null) {
149 return new Pair
<>(List
.of(), null);
151 } catch (ProtocolUntrustedIdentityException e
) {
152 final var recipientId
= account
.getRecipientResolver().resolveRecipient(e
.getSender());
153 actions
.add(new RetrieveProfileAction(recipientId
));
154 exception
= new UntrustedIdentityException(account
.getRecipientAddressResolver()
155 .resolveRecipientAddress(recipientId
)
156 .toApiRecipientAddress(), e
.getSenderDevice());
157 } catch (ProtocolInvalidKeyIdException
| ProtocolInvalidKeyException
| ProtocolNoSessionException
|
158 ProtocolInvalidMessageException e
) {
159 logger
.debug("Failed to decrypt incoming message", e
);
160 if (e
instanceof ProtocolInvalidKeyIdException
) {
161 actions
.add(RefreshPreKeysAction
.create());
163 final var sender
= account
.getRecipientResolver().resolveRecipient(e
.getSender());
164 if (context
.getContactHelper().isContactBlocked(sender
)) {
165 logger
.debug("Received invalid message from blocked contact, ignoring.");
167 var serviceId
= ServiceId
.parseOrNull(e
.getSender());
168 if (serviceId
!= null) {
169 final var isSelf
= sender
.equals(account
.getSelfRecipientId())
170 && e
.getSenderDevice() == account
.getDeviceId();
171 logger
.debug("Received invalid message, queuing renew session action.");
172 actions
.add(new RenewSessionAction(sender
, serviceId
, destination
));
174 logger
.debug("Received invalid message, requesting message resend.");
175 actions
.add(new SendRetryMessageRequestAction(sender
, e
, envelope
));
178 logger
.debug("Received invalid message from invalid sender: {}", e
.getSender());
182 } catch (SelfSendException e
) {
183 logger
.debug("Dropping unidentified message from self.");
184 return new Pair
<>(List
.of(), null);
185 } catch (Exception e
) {
186 logger
.debug("Failed to handle incoming message", e
);
191 actions
.addAll(checkAndHandleMessage(envelope
, content
, receiveConfig
, handler
, exception
));
192 return new Pair
<>(actions
, exception
);
195 private SignalServiceContent
validate(
197 SignalServiceCipherResult cipherResult
,
198 long serverDeliveredTimestamp
199 ) throws ProtocolInvalidKeyException
, ProtocolInvalidMessageException
, UnsupportedDataMessageException
, InvalidMessageStructureException
{
200 final var content
= cipherResult
.getContent();
201 final var envelopeMetadata
= cipherResult
.getMetadata();
202 final var validationResult
= EnvelopeContentValidator
.INSTANCE
.validate(envelope
, content
, account
.getAci());
204 if (validationResult
instanceof EnvelopeContentValidator
.Result
.Invalid v
) {
205 logger
.warn("Invalid content! {}", v
.getReason(), v
.getThrowable());
209 if (validationResult
instanceof EnvelopeContentValidator
.Result
.UnsupportedDataMessage v
) {
210 logger
.warn("Unsupported DataMessage! Our version: {}, their version: {}",
212 v
.getTheirVersion());
216 return SignalServiceContent
.Companion
.createFrom(account
.getNumber(),
220 serverDeliveredTimestamp
);
223 private List
<HandleAction
> checkAndHandleMessage(
224 final SignalServiceEnvelope envelope
,
225 final SignalServiceContent content
,
226 final ReceiveConfig receiveConfig
,
227 final Manager
.ReceiveMessageHandler handler
,
228 final Exception exception
230 if (content
!= null) {
231 // Store uuid if we don't have it already
232 // address/uuid is validated by unidentified sender certificate
234 boolean handledPniSignature
= false;
235 if (content
.getPniSignatureMessage().isPresent()) {
236 final var message
= content
.getPniSignatureMessage().get();
237 final var senderAddress
= getSenderAddress(envelope
, content
);
238 if (senderAddress
!= null) {
239 handledPniSignature
= handlePniSignatureMessage(message
, senderAddress
);
242 if (!handledPniSignature
) {
243 account
.getRecipientTrustedResolver().resolveRecipientTrusted(content
.getSender());
246 if (envelope
.isReceipt()) {
247 final var senderDeviceAddress
= getSender(envelope
, content
);
248 final var sender
= senderDeviceAddress
.serviceId();
249 final var senderDeviceId
= senderDeviceAddress
.deviceId();
250 account
.getMessageSendLogStore().deleteEntryForRecipient(envelope
.getTimestamp(), sender
, senderDeviceId
);
253 var notAllowedToSendToGroup
= isNotAllowedToSendToGroup(envelope
, content
);
254 final var groupContext
= getGroupContext(content
);
255 if (groupContext
!= null && groupContext
.getGroupV2().isPresent()) {
256 handleGroupV2Context(groupContext
.getGroupV2().get());
258 // Check again in case the user just joined the group
259 notAllowedToSendToGroup
= notAllowedToSendToGroup
&& isNotAllowedToSendToGroup(envelope
, content
);
261 if (isMessageBlocked(envelope
, content
)) {
262 logger
.info("Ignoring a message from blocked user/group: {}", envelope
.getTimestamp());
264 } else if (notAllowedToSendToGroup
) {
265 final var senderAddress
= getSenderAddress(envelope
, content
);
266 logger
.info("Ignoring a group message from an unauthorized sender (no member or admin): {} {}",
267 senderAddress
== null ?
null : senderAddress
.getIdentifier(),
268 envelope
.getTimestamp());
271 List
<HandleAction
> actions
;
272 if (content
!= null) {
273 actions
= handleMessage(envelope
, content
, receiveConfig
);
277 handler
.handleMessage(MessageEnvelope
.from(envelope
,
279 account
.getRecipientResolver(),
280 account
.getRecipientAddressResolver(),
281 context
.getAttachmentHelper()::getAttachmentFile
,
282 exception
), exception
);
287 public List
<HandleAction
> handleMessage(
288 SignalServiceEnvelope envelope
,
289 SignalServiceContent content
,
290 ReceiveConfig receiveConfig
292 var actions
= new ArrayList
<HandleAction
>();
293 final var senderDeviceAddress
= getSender(envelope
, content
);
294 final var sender
= senderDeviceAddress
.recipientId();
295 final var senderServiceId
= senderDeviceAddress
.serviceId();
296 final var senderDeviceId
= senderDeviceAddress
.deviceId();
297 final var destination
= getDestination(envelope
);
299 if (account
.getPni().equals(destination
.serviceId
)) {
300 account
.getRecipientStore().markNeedsPniSignature(destination
.recipientId
, true);
301 } else if (account
.getAci().equals(destination
.serviceId
)) {
302 account
.getRecipientStore().markNeedsPniSignature(destination
.recipientId
, false);
305 if (content
.getReceiptMessage().isPresent()) {
306 final var message
= content
.getReceiptMessage().get();
307 if (message
.isDeliveryReceipt()) {
308 account
.getMessageSendLogStore()
309 .deleteEntriesForRecipient(message
.getTimestamps(), senderServiceId
, senderDeviceId
);
313 if (content
.getSenderKeyDistributionMessage().isPresent()) {
314 final var message
= content
.getSenderKeyDistributionMessage().get();
315 final var protocolAddress
= senderServiceId
.toProtocolAddress(senderDeviceId
);
316 logger
.debug("Received a sender key distribution message for distributionId {} from {}",
317 message
.getDistributionId(),
319 new SignalGroupSessionBuilder(dependencies
.getSessionLock(),
320 new GroupSessionBuilder(account
.getSenderKeyStore())).process(protocolAddress
, message
);
323 if (content
.getDecryptionErrorMessage().isPresent()) {
324 var message
= content
.getDecryptionErrorMessage().get();
325 logger
.debug("Received a decryption error message from {}.{} (resend request for {})",
328 message
.getTimestamp());
329 if (message
.getDeviceId() == account
.getDeviceId()) {
330 handleDecryptionErrorMessage(actions
,
335 destination
.serviceId());
337 logger
.debug("Request is for another one of our devices");
341 if (content
.getDataMessage().isPresent() || content
.getEditMessage().isPresent()) {
342 var message
= content
.getDataMessage().isPresent()
343 ? content
.getDataMessage().get()
344 : content
.getEditMessage().get().getDataMessage();
346 if (content
.isNeedsReceipt()) {
347 actions
.add(new SendReceiptAction(sender
,
348 SignalServiceReceiptMessage
.Type
.DELIVERY
,
349 message
.getTimestamp()));
351 // Message wasn't sent as unidentified sender message
352 final var contact
= context
.getAccount().getContactStore().getContact(sender
);
353 if (account
.isPrimaryDevice()
355 && !contact
.isBlocked()
356 && contact
.isProfileSharingEnabled()) {
357 actions
.add(UpdateAccountAttributesAction
.create());
358 actions
.add(new SendProfileKeyAction(sender
));
361 if (receiveConfig
.sendReadReceipts()) {
362 actions
.add(new SendReceiptAction(sender
,
363 SignalServiceReceiptMessage
.Type
.READ
,
364 message
.getTimestamp()));
367 actions
.addAll(handleSignalServiceDataMessage(message
,
371 receiveConfig
.ignoreAttachments()));
374 if (content
.getStoryMessage().isPresent()) {
375 final var message
= content
.getStoryMessage().get();
376 actions
.addAll(handleSignalServiceStoryMessage(message
, sender
, receiveConfig
.ignoreAttachments()));
379 if (content
.getSyncMessage().isPresent()) {
380 var syncMessage
= content
.getSyncMessage().get();
381 actions
.addAll(handleSyncMessage(envelope
,
384 receiveConfig
.ignoreAttachments()));
390 private boolean handlePniSignatureMessage(
391 final SignalServicePniSignatureMessage message
,
392 final SignalServiceAddress senderAddress
394 final var aci
= senderAddress
.getServiceId();
395 final var aciIdentity
= account
.getIdentityKeyStore().getIdentityInfo(aci
);
396 final var pni
= message
.getPni();
397 final var pniIdentity
= account
.getIdentityKeyStore().getIdentityInfo(pni
);
399 if (aciIdentity
== null || pniIdentity
== null || aci
.equals(pni
)) {
403 final var verified
= pniIdentity
.getIdentityKey()
404 .verifyAlternateIdentity(aciIdentity
.getIdentityKey(), message
.getSignature());
407 logger
.debug("Invalid PNI signature of ACI {} with PNI {}", aci
, pni
);
411 logger
.debug("Verified association of ACI {} with PNI {}", aci
, pni
);
412 account
.getRecipientTrustedResolver()
413 .resolveRecipientTrusted(Optional
.of(ACI
.from(aci
.getRawUuid())),
415 senderAddress
.getNumber());
419 private void handleDecryptionErrorMessage(
420 final List
<HandleAction
> actions
,
421 final RecipientId sender
,
422 final ServiceId senderServiceId
,
423 final int senderDeviceId
,
424 final DecryptionErrorMessage message
,
425 final ServiceId destination
427 final var logEntries
= account
.getMessageSendLogStore()
428 .findMessages(senderServiceId
,
430 message
.getTimestamp(),
431 message
.getRatchetKey().isEmpty());
433 for (final var logEntry
: logEntries
) {
434 actions
.add(new ResendMessageAction(sender
, message
.getTimestamp(), logEntry
));
437 if (message
.getRatchetKey().isPresent()) {
438 final var sessionStore
= account
.getAccountData(destination
).getSessionStore();
439 if (sessionStore
.isCurrentRatchetKey(senderServiceId
, senderDeviceId
, message
.getRatchetKey().get())) {
440 if (logEntries
.isEmpty()) {
441 logger
.debug("Renewing the session with sender");
442 actions
.add(new RenewSessionAction(sender
, senderServiceId
, destination
));
444 logger
.trace("Archiving the session with sender, a resend message has already been queued");
445 sessionStore
.archiveSessions(senderServiceId
);
452 for (final var logEntry
: logEntries
) {
453 if (logEntry
.groupId().isEmpty()) {
456 final var group
= account
.getGroupStore().getGroup(logEntry
.groupId().get());
461 logger
.trace("Deleting shared sender key with {} ({}): {}",
464 group
.getDistributionId());
465 account
.getSenderKeyStore().deleteSharedWith(senderServiceId
, senderDeviceId
, group
.getDistributionId());
468 logger
.debug("Reset all shared sender keys with this recipient, no related message found in send log");
469 account
.getSenderKeyStore().deleteSharedWith(senderServiceId
);
473 private List
<HandleAction
> handleSyncMessage(
474 final SignalServiceEnvelope envelope
,
475 final SignalServiceSyncMessage syncMessage
,
476 final DeviceAddress sender
,
477 final boolean ignoreAttachments
479 var actions
= new ArrayList
<HandleAction
>();
480 account
.setMultiDevice(true);
481 if (syncMessage
.getSent().isPresent()) {
482 var message
= syncMessage
.getSent().get();
483 final var destination
= message
.getDestination().orElse(null);
484 if (message
.getDataMessage().isPresent()) {
485 actions
.addAll(handleSignalServiceDataMessage(message
.getDataMessage().get(),
490 : new DeviceAddress(account
.getRecipientResolver().resolveRecipient(destination
),
491 destination
.getServiceId(),
495 if (message
.getStoryMessage().isPresent()) {
496 actions
.addAll(handleSignalServiceStoryMessage(message
.getStoryMessage().get(),
497 sender
.recipientId(),
501 if (syncMessage
.getRequest().isPresent() && account
.isPrimaryDevice()) {
502 var rm
= syncMessage
.getRequest().get();
503 if (rm
.isContactsRequest()) {
504 actions
.add(SendSyncContactsAction
.create());
506 if (rm
.isGroupsRequest()) {
507 actions
.add(SendSyncGroupsAction
.create());
509 if (rm
.isBlockedListRequest()) {
510 actions
.add(SendSyncBlockedListAction
.create());
512 if (rm
.isKeysRequest()) {
513 actions
.add(SendSyncKeysAction
.create());
515 if (rm
.isConfigurationRequest()) {
516 actions
.add(SendSyncConfigurationAction
.create());
518 actions
.add(SyncStorageDataAction
.create());
520 if (syncMessage
.getGroups().isPresent()) {
522 final var groupsMessage
= syncMessage
.getGroups().get();
523 context
.getAttachmentHelper()
524 .retrieveAttachment(groupsMessage
, context
.getSyncHelper()::handleSyncDeviceGroups
);
525 } catch (Exception e
) {
526 logger
.warn("Failed to handle received sync groups, ignoring: {}", e
.getMessage());
529 if (syncMessage
.getBlockedList().isPresent()) {
530 final var blockedListMessage
= syncMessage
.getBlockedList().get();
531 for (var individual
: blockedListMessage
.individuals
) {
532 final var address
= new RecipientAddress(individual
.getAci(), individual
.getE164());
533 final var recipientId
= account
.getRecipientResolver().resolveRecipient(address
);
534 context
.getContactHelper().setContactBlocked(recipientId
, true);
536 for (var groupId
: blockedListMessage
.groupIds
.stream()
537 .map(GroupId
::unknownVersion
)
538 .collect(Collectors
.toSet())) {
540 context
.getGroupHelper().setGroupBlocked(groupId
, true);
541 } catch (GroupNotFoundException e
) {
542 logger
.warn("BlockedListMessage contained groupID that was not found in GroupStore: {}",
547 if (syncMessage
.getContacts().isPresent()) {
549 final var contactsMessage
= syncMessage
.getContacts().get();
550 context
.getAttachmentHelper()
551 .retrieveAttachment(contactsMessage
.getContactsStream(),
552 context
.getSyncHelper()::handleSyncDeviceContacts
);
553 } catch (Exception e
) {
554 logger
.warn("Failed to handle received sync contacts, ignoring: {}", e
.getMessage());
557 if (syncMessage
.getVerified().isPresent()) {
558 final var verifiedMessage
= syncMessage
.getVerified().get();
559 account
.getIdentityKeyStore()
560 .setIdentityTrustLevel(verifiedMessage
.getDestination().getServiceId(),
561 verifiedMessage
.getIdentityKey(),
562 TrustLevel
.fromVerifiedState(verifiedMessage
.getVerified()));
564 if (syncMessage
.getStickerPackOperations().isPresent()) {
565 final var stickerPackOperationMessages
= syncMessage
.getStickerPackOperations().get();
566 for (var m
: stickerPackOperationMessages
) {
567 if (m
.getPackId().isEmpty()) {
570 final var stickerPackId
= StickerPackId
.deserialize(m
.getPackId().get());
571 final var stickerPackKey
= m
.getPackKey().orElse(null);
572 final var installed
= m
.getType().isEmpty()
573 || m
.getType().get() == StickerPackOperationMessage
.Type
.INSTALL
;
575 final var sticker
= context
.getStickerHelper()
576 .addOrUpdateStickerPack(stickerPackId
, stickerPackKey
, installed
);
578 if (sticker
!= null && installed
) {
579 context
.getJobExecutor().enqueueJob(new RetrieveStickerPackJob(stickerPackId
, sticker
.packKey()));
583 if (syncMessage
.getFetchType().isPresent()) {
584 switch (syncMessage
.getFetchType().get()) {
585 case LOCAL_PROFILE
-> actions
.add(new RetrieveProfileAction(account
.getSelfRecipientId()));
586 case STORAGE_MANIFEST
-> actions
.add(SyncStorageDataAction
.create());
589 if (syncMessage
.getKeys().isPresent()) {
590 final var keysMessage
= syncMessage
.getKeys().get();
591 if (keysMessage
.getAccountEntropyPool() != null) {
592 final var aep
= keysMessage
.getAccountEntropyPool();
593 account
.setAccountEntropyPool(aep
);
594 actions
.add(SyncStorageDataAction
.create());
595 } else if (keysMessage
.getMaster() != null) {
596 final var masterKey
= keysMessage
.getMaster();
597 account
.setMasterKey(masterKey
);
598 actions
.add(SyncStorageDataAction
.create());
599 } else if (keysMessage
.getStorageService() != null) {
600 final var storageKey
= keysMessage
.getStorageService();
601 account
.setStorageKey(storageKey
);
602 actions
.add(SyncStorageDataAction
.create());
604 if (keysMessage
.getMediaRootBackupKey() != null) {
605 final var mrb
= keysMessage
.getMediaRootBackupKey();
606 account
.setMediaRootBackupKey(mrb
);
607 actions
.add(SyncStorageDataAction
.create());
610 if (syncMessage
.getConfiguration().isPresent()) {
611 final var configurationMessage
= syncMessage
.getConfiguration().get();
612 final var configurationStore
= account
.getConfigurationStore();
613 if (configurationMessage
.getReadReceipts().isPresent()) {
614 configurationStore
.setReadReceipts(configurationMessage
.getReadReceipts().get());
616 if (configurationMessage
.getLinkPreviews().isPresent()) {
617 configurationStore
.setLinkPreviews(configurationMessage
.getLinkPreviews().get());
619 if (configurationMessage
.getTypingIndicators().isPresent()) {
620 configurationStore
.setTypingIndicators(configurationMessage
.getTypingIndicators().get());
622 if (configurationMessage
.getUnidentifiedDeliveryIndicators().isPresent()) {
623 configurationStore
.setUnidentifiedDeliveryIndicators(configurationMessage
.getUnidentifiedDeliveryIndicators()
627 if (syncMessage
.getPniChangeNumber().isPresent()) {
628 final var pniChangeNumber
= syncMessage
.getPniChangeNumber().get();
629 logger
.debug("Received PNI change number sync message, applying.");
630 final var updatedPniString
= envelope
.getUpdatedPni();
631 if (updatedPniString
!= null && !updatedPniString
.isEmpty()) {
632 final var updatedPni
= ServiceId
.PNI
.parseOrThrow(updatedPniString
);
633 context
.getAccountHelper().handlePniChangeNumberMessage(pniChangeNumber
, updatedPni
);
639 private SignalServiceGroupContext
getGroupContext(SignalServiceContent content
) {
640 if (content
== null) {
644 if (content
.getDataMessage().isPresent()) {
645 var message
= content
.getDataMessage().get();
646 if (message
.getGroupContext().isPresent()) {
647 return message
.getGroupContext().get();
651 if (content
.getStoryMessage().isPresent()) {
652 var message
= content
.getStoryMessage().get();
653 if (message
.getGroupContext().isPresent()) {
655 return SignalServiceGroupContext
.create(null, message
.getGroupContext().get());
656 } catch (InvalidMessageException e
) {
657 throw new AssertionError(e
);
665 private boolean isMessageBlocked(SignalServiceEnvelope envelope
, SignalServiceContent content
) {
666 SignalServiceAddress source
= getSenderAddress(envelope
, content
);
667 if (source
== null) {
670 final var recipientId
= account
.getRecipientResolver().resolveRecipient(source
);
671 if (context
.getContactHelper().isContactBlocked(recipientId
)) {
675 final var groupContext
= getGroupContext(content
);
676 if (groupContext
!= null) {
677 var groupId
= GroupUtils
.getGroupId(groupContext
);
678 return context
.getGroupHelper().isGroupBlocked(groupId
);
684 private boolean isNotAllowedToSendToGroup(SignalServiceEnvelope envelope
, SignalServiceContent content
) {
685 SignalServiceAddress source
= getSenderAddress(envelope
, content
);
686 if (source
== null) {
690 final var groupContext
= getGroupContext(content
);
691 if (groupContext
== null) {
695 if (groupContext
.getGroupV1().isPresent()) {
696 var groupInfo
= groupContext
.getGroupV1().get();
697 if (groupInfo
.getType() == SignalServiceGroup
.Type
.QUIT
) {
702 var groupId
= GroupUtils
.getGroupId(groupContext
);
703 var group
= context
.getGroupHelper().getGroup(groupId
);
708 final var message
= content
.getDataMessage().orElse(null);
710 final var recipientId
= account
.getRecipientResolver().resolveRecipient(source
);
711 if (!group
.isMember(recipientId
) && !(
712 group
.isPendingMember(recipientId
) && message
!= null && message
.isGroupV2Update()
717 if (group
.isAnnouncementGroup() && !group
.isAdmin(recipientId
)) {
718 return message
== null
719 || message
.getBody().isPresent()
720 || message
.getAttachments().isPresent()
721 || message
.getQuote().isPresent()
722 || message
.getPreviews().isPresent()
723 || message
.getMentions().isPresent()
724 || message
.getSticker().isPresent();
729 private List
<HandleAction
> handleSignalServiceDataMessage(
730 SignalServiceDataMessage message
,
732 DeviceAddress source
,
733 DeviceAddress destination
,
734 boolean ignoreAttachments
736 var actions
= new ArrayList
<HandleAction
>();
737 if (message
.getGroupContext().isPresent()) {
738 final var groupContext
= message
.getGroupContext().get();
739 if (groupContext
.getGroupV1().isPresent()) {
740 var groupInfo
= groupContext
.getGroupV1().get();
741 var groupId
= GroupId
.v1(groupInfo
.getGroupId());
742 var group
= context
.getGroupHelper().getGroup(groupId
);
743 if (group
== null || group
instanceof GroupInfoV1
) {
744 var groupV1
= (GroupInfoV1
) group
;
745 switch (groupInfo
.getType()) {
747 if (groupV1
== null) {
748 groupV1
= new GroupInfoV1(groupId
);
751 if (groupInfo
.getAvatar().isPresent()) {
752 var avatar
= groupInfo
.getAvatar().get();
753 context
.getGroupHelper().downloadGroupAvatar(groupV1
.getGroupId(), avatar
);
756 if (groupInfo
.getName().isPresent()) {
757 groupV1
.name
= groupInfo
.getName().get();
760 if (groupInfo
.getMembers().isPresent()) {
761 final var recipientResolver
= account
.getRecipientResolver();
762 groupV1
.addMembers(groupInfo
.getMembers()
765 .map(recipientResolver
::resolveRecipient
)
766 .collect(Collectors
.toSet()));
769 account
.getGroupStore().updateGroup(groupV1
);
772 if (groupV1
== null && !isSync
) {
773 actions
.add(new SendGroupInfoRequestAction(source
.recipientId(), groupId
));
777 if (groupV1
!= null) {
778 groupV1
.removeMember(source
.recipientId());
779 account
.getGroupStore().updateGroup(groupV1
);
782 case REQUEST_INFO
-> {
783 if (groupV1
!= null && !isSync
) {
784 actions
.add(new SendGroupInfoAction(source
.recipientId(), groupV1
.getGroupId()));
789 // Received a group v1 message for a v2 group
792 if (groupContext
.getGroupV2().isPresent()) {
793 handleGroupV2Context(groupContext
.getGroupV2().get());
797 final var selfAddress
= isSync ? source
: destination
;
798 final var conversationPartnerAddress
= isSync ? destination
: source
;
799 if (conversationPartnerAddress
!= null && message
.isEndSession()) {
800 account
.getAccountData(selfAddress
.serviceId())
802 .deleteAllSessions(conversationPartnerAddress
.serviceId());
804 if (message
.isExpirationUpdate() || message
.getBody().isPresent()) {
805 if (message
.getGroupContext().isPresent()) {
806 final var groupContext
= message
.getGroupContext().get();
807 if (groupContext
.getGroupV1().isPresent()) {
808 var groupInfo
= groupContext
.getGroupV1().get();
809 var group
= account
.getGroupStore().getOrCreateGroupV1(GroupId
.v1(groupInfo
.getGroupId()));
811 if (group
.messageExpirationTime
!= message
.getExpiresInSeconds()) {
812 group
.messageExpirationTime
= message
.getExpiresInSeconds();
813 account
.getGroupStore().updateGroup(group
);
816 } else if (groupContext
.getGroupV2().isPresent()) {
817 // disappearing message timer already stored in the DecryptedGroup
819 } else if (conversationPartnerAddress
!= null) {
820 context
.getContactHelper()
821 .setExpirationTimer(conversationPartnerAddress
.recipientId(),
822 message
.getExpiresInSeconds(),
823 message
.getExpireTimerVersion());
826 if (!ignoreAttachments
) {
827 if (message
.getAttachments().isPresent()) {
828 for (var attachment
: message
.getAttachments().get()) {
829 context
.getAttachmentHelper().downloadAttachment(attachment
);
832 if (message
.getSharedContacts().isPresent()) {
833 for (var contact
: message
.getSharedContacts().get()) {
834 if (contact
.getAvatar().isPresent()) {
835 context
.getAttachmentHelper().downloadAttachment(contact
.getAvatar().get().getAttachment());
839 if (message
.getPreviews().isPresent()) {
840 final var previews
= message
.getPreviews().get();
841 for (var preview
: previews
) {
842 if (preview
.getImage().isPresent()) {
843 context
.getAttachmentHelper().downloadAttachment(preview
.getImage().get());
847 if (message
.getQuote().isPresent()) {
848 final var quote
= message
.getQuote().get();
850 if (quote
.getAttachments() != null) {
851 for (var quotedAttachment
: quote
.getAttachments()) {
852 final var thumbnail
= quotedAttachment
.getThumbnail();
853 if (thumbnail
!= null) {
854 context
.getAttachmentHelper().downloadAttachment(thumbnail
);
860 if (message
.getGiftBadge().isPresent()) {
861 handleIncomingGiftBadge(message
.getGiftBadge().get());
863 if (message
.getProfileKey().isPresent()) {
864 handleIncomingProfileKey(message
.getProfileKey().get(), source
.recipientId());
866 if (message
.getSticker().isPresent()) {
867 final var messageSticker
= message
.getSticker().get();
868 final var stickerPackId
= StickerPackId
.deserialize(messageSticker
.getPackId());
869 var sticker
= account
.getStickerStore().getStickerPack(stickerPackId
);
870 if (sticker
== null) {
871 sticker
= new StickerPack(stickerPackId
, messageSticker
.getPackKey());
872 account
.getStickerStore().addStickerPack(sticker
);
874 context
.getJobExecutor().enqueueJob(new RetrieveStickerPackJob(stickerPackId
, messageSticker
.getPackKey()));
879 private void handleIncomingGiftBadge(final SignalServiceDataMessage
.GiftBadge giftBadge
) {
883 private List
<HandleAction
> handleSignalServiceStoryMessage(
884 SignalServiceStoryMessage message
,
886 boolean ignoreAttachments
888 var actions
= new ArrayList
<HandleAction
>();
889 if (message
.getGroupContext().isPresent()) {
890 handleGroupV2Context(message
.getGroupContext().get());
893 if (!ignoreAttachments
) {
894 if (message
.getFileAttachment().isPresent()) {
895 context
.getAttachmentHelper().downloadAttachment(message
.getFileAttachment().get());
897 if (message
.getTextAttachment().isPresent()) {
898 final var textAttachment
= message
.getTextAttachment().get();
899 if (textAttachment
.getPreview().isPresent()) {
900 final var preview
= textAttachment
.getPreview().get();
901 if (preview
.getImage().isPresent()) {
902 context
.getAttachmentHelper().downloadAttachment(preview
.getImage().get());
908 if (message
.getProfileKey().isPresent()) {
909 handleIncomingProfileKey(message
.getProfileKey().get(), source
);
915 private void handleGroupV2Context(final SignalServiceGroupV2 groupContext
) {
916 final var groupMasterKey
= groupContext
.getMasterKey();
918 context
.getGroupHelper()
919 .getOrMigrateGroup(groupMasterKey
,
920 groupContext
.getRevision(),
921 groupContext
.hasSignedGroupChange() ? groupContext
.getSignedGroupChange() : null);
924 private void handleIncomingProfileKey(final byte[] profileKeyBytes
, final RecipientId source
) {
925 if (profileKeyBytes
.length
!= 32) {
926 logger
.debug("Received invalid profile key of length {}", profileKeyBytes
.length
);
929 final ProfileKey profileKey
;
931 profileKey
= new ProfileKey(profileKeyBytes
);
932 } catch (InvalidInputException e
) {
933 throw new AssertionError(e
);
935 if (account
.getSelfRecipientId().equals(source
)) {
936 this.account
.setProfileKey(profileKey
);
938 this.account
.getProfileStore().storeProfileKey(source
, profileKey
);
941 private SignalServiceAddress
getSenderAddress(SignalServiceEnvelope envelope
, SignalServiceContent content
) {
942 final var serviceId
= envelope
.getSourceServiceId().map(ServiceId
::parseOrNull
).orElse(null);
943 if (!envelope
.isUnidentifiedSender() && serviceId
!= null) {
944 return new SignalServiceAddress(serviceId
);
945 } else if (content
!= null) {
946 return content
.getSender();
952 private DeviceAddress
getSender(SignalServiceEnvelope envelope
, SignalServiceContent content
) {
953 final var serviceId
= envelope
.getSourceServiceId().map(ServiceId
::parseOrNull
).orElse(null);
954 if (!envelope
.isUnidentifiedSender() && serviceId
!= null) {
955 return new DeviceAddress(account
.getRecipientResolver().resolveRecipient(serviceId
),
957 envelope
.getSourceDevice());
959 return new DeviceAddress(account
.getRecipientResolver().resolveRecipient(content
.getSender()),
960 content
.getSender().getServiceId(),
961 content
.getSenderDevice());
965 private DeviceAddress
getDestination(SignalServiceEnvelope envelope
) {
966 final var destination
= envelope
.getDestinationServiceId();
967 if (destination
== null || destination
.isUnknown()) {
968 return new DeviceAddress(account
.getSelfRecipientId(), account
.getAci(), account
.getDeviceId());
970 return new DeviceAddress(account
.getRecipientResolver().resolveRecipient(destination
),
972 account
.getDeviceId());
975 private record DeviceAddress(RecipientId recipientId
, ServiceId serviceId
, int deviceId
) {}