1 package org
.asamk
.signal
.manager
.helper
;
3 import org
.asamk
.signal
.manager
.Manager
;
4 import org
.asamk
.signal
.manager
.SignalDependencies
;
5 import org
.asamk
.signal
.manager
.actions
.HandleAction
;
6 import org
.asamk
.signal
.manager
.actions
.RefreshPreKeysAction
;
7 import org
.asamk
.signal
.manager
.actions
.RenewSessionAction
;
8 import org
.asamk
.signal
.manager
.actions
.ResendMessageAction
;
9 import org
.asamk
.signal
.manager
.actions
.RetrieveProfileAction
;
10 import org
.asamk
.signal
.manager
.actions
.RetrieveStorageDataAction
;
11 import org
.asamk
.signal
.manager
.actions
.SendGroupInfoAction
;
12 import org
.asamk
.signal
.manager
.actions
.SendGroupInfoRequestAction
;
13 import org
.asamk
.signal
.manager
.actions
.SendProfileKeyAction
;
14 import org
.asamk
.signal
.manager
.actions
.SendReceiptAction
;
15 import org
.asamk
.signal
.manager
.actions
.SendRetryMessageRequestAction
;
16 import org
.asamk
.signal
.manager
.actions
.SendSyncBlockedListAction
;
17 import org
.asamk
.signal
.manager
.actions
.SendSyncConfigurationAction
;
18 import org
.asamk
.signal
.manager
.actions
.SendSyncContactsAction
;
19 import org
.asamk
.signal
.manager
.actions
.SendSyncGroupsAction
;
20 import org
.asamk
.signal
.manager
.actions
.SendSyncKeysAction
;
21 import org
.asamk
.signal
.manager
.actions
.UpdateAccountAttributesAction
;
22 import org
.asamk
.signal
.manager
.api
.MessageEnvelope
;
23 import org
.asamk
.signal
.manager
.api
.Pair
;
24 import org
.asamk
.signal
.manager
.api
.ReceiveConfig
;
25 import org
.asamk
.signal
.manager
.api
.StickerPackId
;
26 import org
.asamk
.signal
.manager
.api
.TrustLevel
;
27 import org
.asamk
.signal
.manager
.api
.UntrustedIdentityException
;
28 import org
.asamk
.signal
.manager
.groups
.GroupId
;
29 import org
.asamk
.signal
.manager
.groups
.GroupNotFoundException
;
30 import org
.asamk
.signal
.manager
.groups
.GroupUtils
;
31 import org
.asamk
.signal
.manager
.jobs
.RetrieveStickerPackJob
;
32 import org
.asamk
.signal
.manager
.storage
.SignalAccount
;
33 import org
.asamk
.signal
.manager
.storage
.groups
.GroupInfoV1
;
34 import org
.asamk
.signal
.manager
.storage
.recipients
.Profile
;
35 import org
.asamk
.signal
.manager
.storage
.recipients
.RecipientId
;
36 import org
.asamk
.signal
.manager
.storage
.stickers
.StickerPack
;
37 import org
.signal
.libsignal
.metadata
.ProtocolInvalidKeyException
;
38 import org
.signal
.libsignal
.metadata
.ProtocolInvalidKeyIdException
;
39 import org
.signal
.libsignal
.metadata
.ProtocolInvalidMessageException
;
40 import org
.signal
.libsignal
.metadata
.ProtocolNoSessionException
;
41 import org
.signal
.libsignal
.metadata
.ProtocolUntrustedIdentityException
;
42 import org
.signal
.libsignal
.metadata
.SelfSendException
;
43 import org
.signal
.libsignal
.protocol
.IdentityKeyPair
;
44 import org
.signal
.libsignal
.protocol
.InvalidMessageException
;
45 import org
.signal
.libsignal
.protocol
.groups
.GroupSessionBuilder
;
46 import org
.signal
.libsignal
.protocol
.message
.DecryptionErrorMessage
;
47 import org
.signal
.libsignal
.protocol
.state
.SignedPreKeyRecord
;
48 import org
.signal
.libsignal
.zkgroup
.InvalidInputException
;
49 import org
.signal
.libsignal
.zkgroup
.profiles
.ProfileKey
;
50 import org
.slf4j
.Logger
;
51 import org
.slf4j
.LoggerFactory
;
52 import org
.whispersystems
.signalservice
.api
.InvalidMessageStructureException
;
53 import org
.whispersystems
.signalservice
.api
.crypto
.SignalGroupSessionBuilder
;
54 import org
.whispersystems
.signalservice
.api
.crypto
.SignalServiceCipherResult
;
55 import org
.whispersystems
.signalservice
.api
.messages
.EnvelopeContentValidator
;
56 import org
.whispersystems
.signalservice
.api
.messages
.SignalServiceContent
;
57 import org
.whispersystems
.signalservice
.api
.messages
.SignalServiceDataMessage
;
58 import org
.whispersystems
.signalservice
.api
.messages
.SignalServiceEnvelope
;
59 import org
.whispersystems
.signalservice
.api
.messages
.SignalServiceGroup
;
60 import org
.whispersystems
.signalservice
.api
.messages
.SignalServiceGroupContext
;
61 import org
.whispersystems
.signalservice
.api
.messages
.SignalServiceGroupV2
;
62 import org
.whispersystems
.signalservice
.api
.messages
.SignalServiceMetadata
;
63 import org
.whispersystems
.signalservice
.api
.messages
.SignalServicePniSignatureMessage
;
64 import org
.whispersystems
.signalservice
.api
.messages
.SignalServiceReceiptMessage
;
65 import org
.whispersystems
.signalservice
.api
.messages
.SignalServiceStoryMessage
;
66 import org
.whispersystems
.signalservice
.api
.messages
.multidevice
.SignalServiceSyncMessage
;
67 import org
.whispersystems
.signalservice
.api
.messages
.multidevice
.StickerPackOperationMessage
;
68 import org
.whispersystems
.signalservice
.api
.push
.ACI
;
69 import org
.whispersystems
.signalservice
.api
.push
.PNI
;
70 import org
.whispersystems
.signalservice
.api
.push
.ServiceId
;
71 import org
.whispersystems
.signalservice
.api
.push
.SignalServiceAddress
;
72 import org
.whispersystems
.signalservice
.internal
.push
.SignalServiceProtos
;
73 import org
.whispersystems
.signalservice
.internal
.push
.UnsupportedDataMessageException
;
74 import org
.whispersystems
.signalservice
.internal
.serialize
.SignalServiceAddressProtobufSerializer
;
75 import org
.whispersystems
.signalservice
.internal
.serialize
.SignalServiceMetadataProtobufSerializer
;
76 import org
.whispersystems
.signalservice
.internal
.serialize
.protos
.SignalServiceContentProto
;
78 import java
.util
.ArrayList
;
79 import java
.util
.List
;
80 import java
.util
.Optional
;
81 import java
.util
.stream
.Collectors
;
83 public final class IncomingMessageHandler
{
85 private final static Logger logger
= LoggerFactory
.getLogger(IncomingMessageHandler
.class);
87 private final SignalAccount account
;
88 private final SignalDependencies dependencies
;
89 private final Context context
;
91 public IncomingMessageHandler(final Context context
) {
92 this.account
= context
.getAccount();
93 this.dependencies
= context
.getDependencies();
94 this.context
= context
;
97 public Pair
<List
<HandleAction
>, Exception
> handleRetryEnvelope(
98 final SignalServiceEnvelope envelope
,
99 final ReceiveConfig receiveConfig
,
100 final Manager
.ReceiveMessageHandler handler
102 final List
<HandleAction
> actions
= new ArrayList
<>();
103 if (envelope
.isPreKeySignalMessage()) {
104 actions
.add(RefreshPreKeysAction
.create());
107 SignalServiceContent content
= null;
108 if (!envelope
.isReceipt()) {
109 account
.getIdentityKeyStore().setRetryingDecryption(true);
111 final var cipherResult
= dependencies
.getCipher()
112 .decrypt(envelope
.getProto(), envelope
.getServerDeliveredTimestamp());
113 content
= validate(envelope
.getProto(), cipherResult
, envelope
.getServerDeliveredTimestamp());
114 if (content
== null) {
115 return new Pair
<>(List
.of(), null);
117 } catch (ProtocolUntrustedIdentityException e
) {
118 final var recipientId
= account
.getRecipientResolver().resolveRecipient(e
.getSender());
119 final var exception
= new UntrustedIdentityException(account
.getRecipientAddressResolver()
120 .resolveRecipientAddress(recipientId
)
121 .toApiRecipientAddress(), e
.getSenderDevice());
122 return new Pair
<>(List
.of(), exception
);
123 } catch (Exception e
) {
124 return new Pair
<>(List
.of(), e
);
126 account
.getIdentityKeyStore().setRetryingDecryption(false);
129 actions
.addAll(checkAndHandleMessage(envelope
, content
, receiveConfig
, handler
, null));
130 return new Pair
<>(actions
, null);
133 public Pair
<List
<HandleAction
>, Exception
> handleEnvelope(
134 final SignalServiceEnvelope envelope
,
135 final ReceiveConfig receiveConfig
,
136 final Manager
.ReceiveMessageHandler handler
138 final var actions
= new ArrayList
<HandleAction
>();
139 if (envelope
.hasSourceUuid()) {
140 // Store uuid if we don't have it already
141 // address/uuid in envelope is sent by server
142 account
.getRecipientTrustedResolver().resolveRecipientTrusted(envelope
.getSourceAddress());
144 SignalServiceContent content
= null;
145 Exception exception
= null;
146 if (!envelope
.isReceipt()) {
148 final var cipherResult
= dependencies
.getCipher()
149 .decrypt(envelope
.getProto(), envelope
.getServerDeliveredTimestamp());
150 content
= validate(envelope
.getProto(), cipherResult
, envelope
.getServerDeliveredTimestamp());
151 if (content
== null) {
152 return new Pair
<>(List
.of(), null);
154 } catch (ProtocolUntrustedIdentityException e
) {
155 final var recipientId
= account
.getRecipientResolver().resolveRecipient(e
.getSender());
156 actions
.add(new RetrieveProfileAction(recipientId
));
157 exception
= new UntrustedIdentityException(account
.getRecipientAddressResolver()
158 .resolveRecipientAddress(recipientId
)
159 .toApiRecipientAddress(), e
.getSenderDevice());
160 } catch (ProtocolInvalidKeyIdException
| ProtocolInvalidKeyException
| ProtocolNoSessionException
|
161 ProtocolInvalidMessageException e
) {
162 logger
.debug("Failed to decrypt incoming message", e
);
163 final var sender
= account
.getRecipientResolver().resolveRecipient(e
.getSender());
164 if (context
.getContactHelper().isContactBlocked(sender
)) {
165 logger
.debug("Received invalid message from blocked contact, ignoring.");
167 final var senderProfile
= context
.getProfileHelper().getRecipientProfile(sender
);
168 final var selfProfile
= context
.getProfileHelper().getSelfProfile();
169 var serviceId
= ServiceId
.parseOrNull(e
.getSender());
170 if (serviceId
== null) {
171 // Workaround for libsignal-client issue #492
172 serviceId
= account
.getRecipientAddressResolver()
173 .resolveRecipientAddress(sender
)
177 if (serviceId
!= null) {
178 final var isSelf
= sender
.equals(account
.getSelfRecipientId())
179 && e
.getSenderDevice() == account
.getDeviceId();
180 final var isSenderSenderKeyCapable
= senderProfile
!= null && senderProfile
.getCapabilities()
181 .contains(Profile
.Capability
.senderKey
);
182 final var isSelfSenderKeyCapable
= selfProfile
!= null && selfProfile
.getCapabilities()
183 .contains(Profile
.Capability
.senderKey
);
184 if (!isSelf
&& isSenderSenderKeyCapable
&& isSelfSenderKeyCapable
) {
185 logger
.debug("Received invalid message, requesting message resend.");
186 actions
.add(new SendRetryMessageRequestAction(sender
, serviceId
, e
, envelope
));
188 logger
.debug("Received invalid message, queuing renew session action.");
189 actions
.add(new RenewSessionAction(sender
, serviceId
));
192 logger
.debug("Received invalid message from invalid sender: {}", e
.getSender());
196 } catch (SelfSendException e
) {
197 logger
.debug("Dropping unidentified message from self.");
198 return new Pair
<>(List
.of(), null);
199 } catch (Exception e
) {
200 logger
.debug("Failed to handle incoming message", e
);
205 actions
.addAll(checkAndHandleMessage(envelope
, content
, receiveConfig
, handler
, exception
));
206 return new Pair
<>(actions
, exception
);
209 private SignalServiceContent
validate(
210 SignalServiceProtos
.Envelope envelope
, SignalServiceCipherResult cipherResult
, long serverDeliveredTimestamp
211 ) throws ProtocolInvalidKeyException
, ProtocolInvalidMessageException
, UnsupportedDataMessageException
, InvalidMessageStructureException
{
212 final var content
= cipherResult
.getContent();
213 final var envelopeMetadata
= cipherResult
.getMetadata();
214 final var validationResult
= EnvelopeContentValidator
.INSTANCE
.validate(envelope
, content
);
216 if (validationResult
instanceof EnvelopeContentValidator
.Result
.Invalid v
) {
217 logger
.warn("Invalid content! {}", v
.getReason(), v
.getThrowable());
221 if (validationResult
instanceof EnvelopeContentValidator
.Result
.UnsupportedDataMessage v
) {
222 logger
.warn("Unsupported DataMessage! Our version: {}, their version: {}",
224 v
.getTheirVersion());
228 final var localAddress
= new SignalServiceAddress(envelopeMetadata
.getDestinationServiceId(),
229 Optional
.ofNullable(account
.getNumber()));
230 final var metadata
= new SignalServiceMetadata(new SignalServiceAddress(envelopeMetadata
.getSourceServiceId(),
231 Optional
.ofNullable(envelopeMetadata
.getSourceE164())),
232 envelopeMetadata
.getSourceDeviceId(),
233 envelope
.getTimestamp(),
234 envelope
.getServerTimestamp(),
235 serverDeliveredTimestamp
,
236 envelopeMetadata
.getSealedSender(),
237 envelope
.getServerGuid(),
238 Optional
.ofNullable(envelopeMetadata
.getGroupId()),
239 envelopeMetadata
.getDestinationServiceId().toString());
241 final var contentProto
= SignalServiceContentProto
.newBuilder()
242 .setLocalAddress(SignalServiceAddressProtobufSerializer
.toProtobuf(localAddress
))
243 .setMetadata(SignalServiceMetadataProtobufSerializer
.toProtobuf(metadata
))
247 return SignalServiceContent
.createFromProto(contentProto
);
250 private List
<HandleAction
> checkAndHandleMessage(
251 final SignalServiceEnvelope envelope
,
252 final SignalServiceContent content
,
253 final ReceiveConfig receiveConfig
,
254 final Manager
.ReceiveMessageHandler handler
,
255 final Exception exception
257 if (content
!= null) {
258 // Store uuid if we don't have it already
259 // address/uuid is validated by unidentified sender certificate
261 boolean handledPniSignature
= false;
262 if (content
.getPniSignatureMessage().isPresent()) {
263 final var message
= content
.getPniSignatureMessage().get();
264 final var senderAddress
= getSenderAddress(envelope
, content
);
265 if (senderAddress
!= null) {
266 handledPniSignature
= handlePniSignatureMessage(message
, senderAddress
);
269 if (!handledPniSignature
) {
270 account
.getRecipientTrustedResolver().resolveRecipientTrusted(content
.getSender());
273 if (envelope
.isReceipt()) {
274 final var senderDeviceAddress
= getSender(envelope
, content
);
275 final var sender
= senderDeviceAddress
.serviceId();
276 final var senderDeviceId
= senderDeviceAddress
.deviceId();
277 account
.getMessageSendLogStore().deleteEntryForRecipient(envelope
.getTimestamp(), sender
, senderDeviceId
);
280 var notAllowedToSendToGroup
= isNotAllowedToSendToGroup(envelope
, content
);
281 final var groupContext
= getGroupContext(content
);
282 if (groupContext
!= null && groupContext
.getGroupV2().isPresent()) {
283 handleGroupV2Context(groupContext
.getGroupV2().get());
285 // Check again in case the user just joined the group
286 notAllowedToSendToGroup
= notAllowedToSendToGroup
&& isNotAllowedToSendToGroup(envelope
, content
);
288 if (isMessageBlocked(envelope
, content
)) {
289 logger
.info("Ignoring a message from blocked user/group: {}", envelope
.getTimestamp());
291 } else if (notAllowedToSendToGroup
) {
292 final var senderAddress
= getSenderAddress(envelope
, content
);
293 logger
.info("Ignoring a group message from an unauthorized sender (no member or admin): {} {}",
294 senderAddress
== null ?
null : senderAddress
.getIdentifier(),
295 envelope
.getTimestamp());
298 List
<HandleAction
> actions
;
299 if (content
!= null) {
300 actions
= handleMessage(envelope
, content
, receiveConfig
);
304 handler
.handleMessage(MessageEnvelope
.from(envelope
,
306 account
.getRecipientResolver(),
307 account
.getRecipientAddressResolver(),
308 context
.getAttachmentHelper()::getAttachmentFile
,
309 exception
), exception
);
314 public List
<HandleAction
> handleMessage(
315 SignalServiceEnvelope envelope
, SignalServiceContent content
, ReceiveConfig receiveConfig
317 var actions
= new ArrayList
<HandleAction
>();
318 final var senderDeviceAddress
= getSender(envelope
, content
);
319 final var sender
= senderDeviceAddress
.recipientId();
320 final var senderServiceId
= senderDeviceAddress
.serviceId();
321 final var senderDeviceId
= senderDeviceAddress
.deviceId();
322 final var destination
= getDestination(envelope
);
324 if (content
.getReceiptMessage().isPresent()) {
325 final var message
= content
.getReceiptMessage().get();
326 if (message
.isDeliveryReceipt()) {
327 account
.getMessageSendLogStore()
328 .deleteEntriesForRecipient(message
.getTimestamps(), senderServiceId
, senderDeviceId
);
332 if (content
.getSenderKeyDistributionMessage().isPresent()) {
333 final var message
= content
.getSenderKeyDistributionMessage().get();
334 final var protocolAddress
= senderServiceId
.toProtocolAddress(senderDeviceId
);
335 logger
.debug("Received a sender key distribution message for distributionId {} from {}",
336 message
.getDistributionId(),
338 new SignalGroupSessionBuilder(dependencies
.getSessionLock(),
339 new GroupSessionBuilder(account
.getSenderKeyStore())).process(protocolAddress
, message
);
342 if (content
.getDecryptionErrorMessage().isPresent()) {
343 var message
= content
.getDecryptionErrorMessage().get();
344 logger
.debug("Received a decryption error message from {}.{} (resend request for {})",
347 message
.getTimestamp());
348 if (message
.getDeviceId() == account
.getDeviceId()) {
349 handleDecryptionErrorMessage(actions
, sender
, senderServiceId
, senderDeviceId
, message
);
351 logger
.debug("Request is for another one of our devices");
355 if (content
.getDataMessage().isPresent()) {
356 var message
= content
.getDataMessage().get();
358 if (content
.isNeedsReceipt()) {
359 actions
.add(new SendReceiptAction(sender
,
360 SignalServiceReceiptMessage
.Type
.DELIVERY
,
361 message
.getTimestamp()));
363 // Message wasn't sent as unidentified sender message
364 final var contact
= context
.getAccount().getContactStore().getContact(sender
);
365 if (account
.isPrimaryDevice()
367 && !contact
.isBlocked()
368 && contact
.isProfileSharingEnabled()) {
369 actions
.add(UpdateAccountAttributesAction
.create());
370 actions
.add(new SendProfileKeyAction(sender
));
373 if (receiveConfig
.sendReadReceipts()) {
374 actions
.add(new SendReceiptAction(sender
,
375 SignalServiceReceiptMessage
.Type
.READ
,
376 message
.getTimestamp()));
379 actions
.addAll(handleSignalServiceDataMessage(message
,
383 receiveConfig
.ignoreAttachments()));
386 if (content
.getStoryMessage().isPresent()) {
387 final var message
= content
.getStoryMessage().get();
388 actions
.addAll(handleSignalServiceStoryMessage(message
, sender
, receiveConfig
.ignoreAttachments()));
391 if (content
.getSyncMessage().isPresent()) {
392 var syncMessage
= content
.getSyncMessage().get();
393 actions
.addAll(handleSyncMessage(envelope
,
396 receiveConfig
.ignoreAttachments()));
402 private boolean handlePniSignatureMessage(
403 final SignalServicePniSignatureMessage message
, final SignalServiceAddress senderAddress
405 final var aci
= ACI
.from(senderAddress
.getServiceId());
406 final var aciIdentity
= account
.getIdentityKeyStore().getIdentityInfo(aci
);
407 final var pni
= message
.getPni();
408 final var pniIdentity
= account
.getIdentityKeyStore().getIdentityInfo(pni
);
410 if (aciIdentity
== null || pniIdentity
== null || aci
.equals(pni
)) {
414 final var verified
= pniIdentity
.getIdentityKey()
415 .verifyAlternateIdentity(aciIdentity
.getIdentityKey(), message
.getSignature());
418 logger
.debug("Invalid PNI signature of ACI {} with PNI {}", aci
, pni
);
422 logger
.debug("Verified association of ACI {} with PNI {}", aci
, pni
);
423 account
.getRecipientTrustedResolver()
424 .resolveRecipientTrusted(Optional
.of(aci
), Optional
.of(pni
), senderAddress
.getNumber());
428 private void handleDecryptionErrorMessage(
429 final List
<HandleAction
> actions
,
430 final RecipientId sender
,
431 final ServiceId senderServiceId
,
432 final int senderDeviceId
,
433 final DecryptionErrorMessage message
435 final var logEntries
= account
.getMessageSendLogStore()
436 .findMessages(senderServiceId
,
438 message
.getTimestamp(),
439 message
.getRatchetKey().isEmpty());
441 for (final var logEntry
: logEntries
) {
442 actions
.add(new ResendMessageAction(sender
, message
.getTimestamp(), logEntry
));
445 if (message
.getRatchetKey().isPresent()) {
446 if (account
.getAciSessionStore()
447 .isCurrentRatchetKey(senderServiceId
, senderDeviceId
, message
.getRatchetKey().get())) {
448 if (logEntries
.isEmpty()) {
449 logger
.debug("Renewing the session with sender");
450 actions
.add(new RenewSessionAction(sender
, senderServiceId
));
452 logger
.trace("Archiving the session with sender, a resend message has already been queued");
453 context
.getAccount().getAciSessionStore().archiveSessions(senderServiceId
);
460 for (final var logEntry
: logEntries
) {
461 if (logEntry
.groupId().isEmpty()) {
464 final var group
= account
.getGroupStore().getGroup(logEntry
.groupId().get());
469 logger
.trace("Deleting shared sender key with {} ({}): {}",
472 group
.getDistributionId());
473 account
.getSenderKeyStore().deleteSharedWith(senderServiceId
, senderDeviceId
, group
.getDistributionId());
476 logger
.debug("Reset all shared sender keys with this recipient, no related message found in send log");
477 account
.getSenderKeyStore().deleteSharedWith(senderServiceId
);
481 private List
<HandleAction
> handleSyncMessage(
482 final SignalServiceEnvelope envelope
,
483 final SignalServiceSyncMessage syncMessage
,
484 final DeviceAddress sender
,
485 final boolean ignoreAttachments
487 var actions
= new ArrayList
<HandleAction
>();
488 account
.setMultiDevice(true);
489 if (syncMessage
.getSent().isPresent()) {
490 var message
= syncMessage
.getSent().get();
491 final var destination
= message
.getDestination().orElse(null);
492 if (message
.getDataMessage().isPresent()) {
493 actions
.addAll(handleSignalServiceDataMessage(message
.getDataMessage().get(),
498 : new DeviceAddress(context
.getRecipientHelper().resolveRecipient(destination
),
499 destination
.getServiceId(),
503 if (message
.getStoryMessage().isPresent()) {
504 actions
.addAll(handleSignalServiceStoryMessage(message
.getStoryMessage().get(),
505 sender
.recipientId(),
509 if (syncMessage
.getRequest().isPresent() && account
.isPrimaryDevice()) {
510 var rm
= syncMessage
.getRequest().get();
511 if (rm
.isContactsRequest()) {
512 actions
.add(SendSyncContactsAction
.create());
514 if (rm
.isGroupsRequest()) {
515 actions
.add(SendSyncGroupsAction
.create());
517 if (rm
.isBlockedListRequest()) {
518 actions
.add(SendSyncBlockedListAction
.create());
520 if (rm
.isKeysRequest()) {
521 actions
.add(SendSyncKeysAction
.create());
523 if (rm
.isConfigurationRequest()) {
524 actions
.add(SendSyncConfigurationAction
.create());
527 if (syncMessage
.getGroups().isPresent()) {
529 final var groupsMessage
= syncMessage
.getGroups().get();
530 context
.getAttachmentHelper()
531 .retrieveAttachment(groupsMessage
, context
.getSyncHelper()::handleSyncDeviceGroups
);
532 } catch (Exception e
) {
533 logger
.warn("Failed to handle received sync groups, ignoring: {}", e
.getMessage());
536 if (syncMessage
.getBlockedList().isPresent()) {
537 final var blockedListMessage
= syncMessage
.getBlockedList().get();
538 for (var address
: blockedListMessage
.getAddresses()) {
539 context
.getContactHelper()
540 .setContactBlocked(context
.getRecipientHelper().resolveRecipient(address
), true);
542 for (var groupId
: blockedListMessage
.getGroupIds()
544 .map(GroupId
::unknownVersion
)
545 .collect(Collectors
.toSet())) {
547 context
.getGroupHelper().setGroupBlocked(groupId
, true);
548 } catch (GroupNotFoundException e
) {
549 logger
.warn("BlockedListMessage contained groupID that was not found in GroupStore: {}",
554 if (syncMessage
.getContacts().isPresent()) {
556 final var contactsMessage
= syncMessage
.getContacts().get();
557 context
.getAttachmentHelper()
558 .retrieveAttachment(contactsMessage
.getContactsStream(),
559 context
.getSyncHelper()::handleSyncDeviceContacts
);
560 } catch (Exception e
) {
561 logger
.warn("Failed to handle received sync contacts, ignoring: {}", e
.getMessage());
564 if (syncMessage
.getVerified().isPresent()) {
565 final var verifiedMessage
= syncMessage
.getVerified().get();
566 account
.getIdentityKeyStore()
567 .setIdentityTrustLevel(verifiedMessage
.getDestination().getServiceId(),
568 verifiedMessage
.getIdentityKey(),
569 TrustLevel
.fromVerifiedState(verifiedMessage
.getVerified()));
571 if (syncMessage
.getStickerPackOperations().isPresent()) {
572 final var stickerPackOperationMessages
= syncMessage
.getStickerPackOperations().get();
573 for (var m
: stickerPackOperationMessages
) {
574 if (m
.getPackId().isEmpty()) {
577 final var stickerPackId
= StickerPackId
.deserialize(m
.getPackId().get());
578 final var installed
= m
.getType().isEmpty()
579 || m
.getType().get() == StickerPackOperationMessage
.Type
.INSTALL
;
581 var sticker
= account
.getStickerStore().getStickerPack(stickerPackId
);
582 if (m
.getPackKey().isPresent()) {
583 if (sticker
== null) {
584 sticker
= new StickerPack(-1, stickerPackId
, m
.getPackKey().get(), installed
);
585 account
.getStickerStore().addStickerPack(sticker
);
588 context
.getJobExecutor()
589 .enqueueJob(new RetrieveStickerPackJob(stickerPackId
, m
.getPackKey().get()));
593 if (sticker
!= null && sticker
.isInstalled() != installed
) {
594 account
.getStickerStore().updateStickerPackInstalled(sticker
.packId(), installed
);
598 if (syncMessage
.getFetchType().isPresent()) {
599 switch (syncMessage
.getFetchType().get()) {
600 case LOCAL_PROFILE
-> actions
.add(new RetrieveProfileAction(account
.getSelfRecipientId()));
601 case STORAGE_MANIFEST
-> actions
.add(RetrieveStorageDataAction
.create());
604 if (syncMessage
.getKeys().isPresent()) {
605 final var keysMessage
= syncMessage
.getKeys().get();
606 if (keysMessage
.getStorageService().isPresent()) {
607 final var storageKey
= keysMessage
.getStorageService().get();
608 account
.setStorageKey(storageKey
);
609 actions
.add(RetrieveStorageDataAction
.create());
612 if (syncMessage
.getConfiguration().isPresent()) {
613 final var configurationMessage
= syncMessage
.getConfiguration().get();
614 final var configurationStore
= account
.getConfigurationStore();
615 if (configurationMessage
.getReadReceipts().isPresent()) {
616 configurationStore
.setReadReceipts(configurationMessage
.getReadReceipts().get());
618 if (configurationMessage
.getLinkPreviews().isPresent()) {
619 configurationStore
.setLinkPreviews(configurationMessage
.getLinkPreviews().get());
621 if (configurationMessage
.getTypingIndicators().isPresent()) {
622 configurationStore
.setTypingIndicators(configurationMessage
.getTypingIndicators().get());
624 if (configurationMessage
.getUnidentifiedDeliveryIndicators().isPresent()) {
625 configurationStore
.setUnidentifiedDeliveryIndicators(configurationMessage
.getUnidentifiedDeliveryIndicators()
629 if (syncMessage
.getPniChangeNumber().isPresent()) {
630 final var pniChangeNumber
= syncMessage
.getPniChangeNumber().get();
631 logger
.debug("Received PNI change number sync message, applying.");
632 if (pniChangeNumber
.hasIdentityKeyPair()
633 && pniChangeNumber
.hasRegistrationId()
634 && pniChangeNumber
.hasSignedPreKey()
635 && !envelope
.getUpdatedPni().isEmpty()) {
636 logger
.debug("New PNI: {}", envelope
.getUpdatedPni());
638 final var updatedPni
= PNI
.parseOrThrow(envelope
.getUpdatedPni());
639 context
.getAccountHelper()
641 new IdentityKeyPair(pniChangeNumber
.getIdentityKeyPair().toByteArray()),
642 new SignedPreKeyRecord(pniChangeNumber
.getSignedPreKey().toByteArray()),
643 pniChangeNumber
.getRegistrationId());
644 } catch (Exception e
) {
645 logger
.warn("Failed to handle change number message", e
);
652 private SignalServiceGroupContext
getGroupContext(SignalServiceContent content
) {
653 if (content
== null) {
657 if (content
.getDataMessage().isPresent()) {
658 var message
= content
.getDataMessage().get();
659 if (message
.getGroupContext().isPresent()) {
660 return message
.getGroupContext().get();
664 if (content
.getStoryMessage().isPresent()) {
665 var message
= content
.getStoryMessage().get();
666 if (message
.getGroupContext().isPresent()) {
668 return SignalServiceGroupContext
.create(null, message
.getGroupContext().get());
669 } catch (InvalidMessageException e
) {
670 throw new AssertionError(e
);
678 private boolean isMessageBlocked(SignalServiceEnvelope envelope
, SignalServiceContent content
) {
679 SignalServiceAddress source
= getSenderAddress(envelope
, content
);
680 if (source
== null) {
683 final var recipientId
= context
.getRecipientHelper().resolveRecipient(source
);
684 if (context
.getContactHelper().isContactBlocked(recipientId
)) {
688 final var groupContext
= getGroupContext(content
);
689 if (groupContext
!= null) {
690 var groupId
= GroupUtils
.getGroupId(groupContext
);
691 return context
.getGroupHelper().isGroupBlocked(groupId
);
697 private boolean isNotAllowedToSendToGroup(SignalServiceEnvelope envelope
, SignalServiceContent content
) {
698 SignalServiceAddress source
= getSenderAddress(envelope
, content
);
699 if (source
== null) {
703 final var groupContext
= getGroupContext(content
);
704 if (groupContext
== null) {
708 if (groupContext
.getGroupV1().isPresent()) {
709 var groupInfo
= groupContext
.getGroupV1().get();
710 if (groupInfo
.getType() == SignalServiceGroup
.Type
.QUIT
) {
715 var groupId
= GroupUtils
.getGroupId(groupContext
);
716 var group
= context
.getGroupHelper().getGroup(groupId
);
721 final var message
= content
.getDataMessage().orElse(null);
723 final var recipientId
= context
.getRecipientHelper().resolveRecipient(source
);
724 if (!group
.isMember(recipientId
) && !(
725 group
.isPendingMember(recipientId
) && message
!= null && message
.isGroupV2Update()
730 if (group
.isAnnouncementGroup() && !group
.isAdmin(recipientId
)) {
731 return message
== null
732 || message
.getBody().isPresent()
733 || message
.getAttachments().isPresent()
734 || message
.getQuote().isPresent()
735 || message
.getPreviews().isPresent()
736 || message
.getMentions().isPresent()
737 || message
.getSticker().isPresent();
742 private List
<HandleAction
> handleSignalServiceDataMessage(
743 SignalServiceDataMessage message
,
745 DeviceAddress source
,
746 DeviceAddress destination
,
747 boolean ignoreAttachments
749 var actions
= new ArrayList
<HandleAction
>();
750 if (message
.getGroupContext().isPresent()) {
751 final var groupContext
= message
.getGroupContext().get();
752 if (groupContext
.getGroupV1().isPresent()) {
753 var groupInfo
= groupContext
.getGroupV1().get();
754 var groupId
= GroupId
.v1(groupInfo
.getGroupId());
755 var group
= context
.getGroupHelper().getGroup(groupId
);
756 if (group
== null || group
instanceof GroupInfoV1
) {
757 var groupV1
= (GroupInfoV1
) group
;
758 switch (groupInfo
.getType()) {
760 if (groupV1
== null) {
761 groupV1
= new GroupInfoV1(groupId
);
764 if (groupInfo
.getAvatar().isPresent()) {
765 var avatar
= groupInfo
.getAvatar().get();
766 context
.getGroupHelper().downloadGroupAvatar(groupV1
.getGroupId(), avatar
);
769 if (groupInfo
.getName().isPresent()) {
770 groupV1
.name
= groupInfo
.getName().get();
773 if (groupInfo
.getMembers().isPresent()) {
774 groupV1
.addMembers(groupInfo
.getMembers()
777 .map(context
.getRecipientHelper()::resolveRecipient
)
778 .collect(Collectors
.toSet()));
781 account
.getGroupStore().updateGroup(groupV1
);
784 if (groupV1
== null && !isSync
) {
785 actions
.add(new SendGroupInfoRequestAction(source
.recipientId(), groupId
));
789 if (groupV1
!= null) {
790 groupV1
.removeMember(source
.recipientId());
791 account
.getGroupStore().updateGroup(groupV1
);
794 case REQUEST_INFO
-> {
795 if (groupV1
!= null && !isSync
) {
796 actions
.add(new SendGroupInfoAction(source
.recipientId(), groupV1
.getGroupId()));
801 // Received a group v1 message for a v2 group
804 if (groupContext
.getGroupV2().isPresent()) {
805 handleGroupV2Context(groupContext
.getGroupV2().get());
809 final var conversationPartnerAddress
= isSync ? destination
: source
;
810 if (conversationPartnerAddress
!= null && message
.isEndSession()) {
811 account
.getAciSessionStore().deleteAllSessions(conversationPartnerAddress
.serviceId());
813 if (message
.isExpirationUpdate() || message
.getBody().isPresent()) {
814 if (message
.getGroupContext().isPresent()) {
815 final var groupContext
= message
.getGroupContext().get();
816 if (groupContext
.getGroupV1().isPresent()) {
817 var groupInfo
= groupContext
.getGroupV1().get();
818 var group
= account
.getGroupStore().getOrCreateGroupV1(GroupId
.v1(groupInfo
.getGroupId()));
820 if (group
.messageExpirationTime
!= message
.getExpiresInSeconds()) {
821 group
.messageExpirationTime
= message
.getExpiresInSeconds();
822 account
.getGroupStore().updateGroup(group
);
825 } else if (groupContext
.getGroupV2().isPresent()) {
826 // disappearing message timer already stored in the DecryptedGroup
828 } else if (conversationPartnerAddress
!= null) {
829 context
.getContactHelper()
830 .setExpirationTimer(conversationPartnerAddress
.recipientId(), message
.getExpiresInSeconds());
833 if (!ignoreAttachments
) {
834 if (message
.getAttachments().isPresent()) {
835 for (var attachment
: message
.getAttachments().get()) {
836 context
.getAttachmentHelper().downloadAttachment(attachment
);
839 if (message
.getSharedContacts().isPresent()) {
840 for (var contact
: message
.getSharedContacts().get()) {
841 if (contact
.getAvatar().isPresent()) {
842 context
.getAttachmentHelper().downloadAttachment(contact
.getAvatar().get().getAttachment());
846 if (message
.getPreviews().isPresent()) {
847 final var previews
= message
.getPreviews().get();
848 for (var preview
: previews
) {
849 if (preview
.getImage().isPresent()) {
850 context
.getAttachmentHelper().downloadAttachment(preview
.getImage().get());
854 if (message
.getQuote().isPresent()) {
855 final var quote
= message
.getQuote().get();
857 for (var quotedAttachment
: quote
.getAttachments()) {
858 final var thumbnail
= quotedAttachment
.getThumbnail();
859 if (thumbnail
!= null) {
860 context
.getAttachmentHelper().downloadAttachment(thumbnail
);
865 if (message
.getGiftBadge().isPresent()) {
866 handleIncomingGiftBadge(message
.getGiftBadge().get());
868 if (message
.getProfileKey().isPresent()) {
869 handleIncomingProfileKey(message
.getProfileKey().get(), source
.recipientId());
871 if (message
.getSticker().isPresent()) {
872 final var messageSticker
= message
.getSticker().get();
873 final var stickerPackId
= StickerPackId
.deserialize(messageSticker
.getPackId());
874 var sticker
= account
.getStickerStore().getStickerPack(stickerPackId
);
875 if (sticker
== null) {
876 sticker
= new StickerPack(stickerPackId
, messageSticker
.getPackKey());
877 account
.getStickerStore().addStickerPack(sticker
);
879 context
.getJobExecutor().enqueueJob(new RetrieveStickerPackJob(stickerPackId
, messageSticker
.getPackKey()));
884 private void handleIncomingGiftBadge(final SignalServiceDataMessage
.GiftBadge giftBadge
) {
888 private List
<HandleAction
> handleSignalServiceStoryMessage(
889 SignalServiceStoryMessage message
, RecipientId source
, boolean ignoreAttachments
891 var actions
= new ArrayList
<HandleAction
>();
892 if (message
.getGroupContext().isPresent()) {
893 handleGroupV2Context(message
.getGroupContext().get());
896 if (!ignoreAttachments
) {
897 if (message
.getFileAttachment().isPresent()) {
898 context
.getAttachmentHelper().downloadAttachment(message
.getFileAttachment().get());
900 if (message
.getTextAttachment().isPresent()) {
901 final var textAttachment
= message
.getTextAttachment().get();
902 if (textAttachment
.getPreview().isPresent()) {
903 final var preview
= textAttachment
.getPreview().get();
904 if (preview
.getImage().isPresent()) {
905 context
.getAttachmentHelper().downloadAttachment(preview
.getImage().get());
911 if (message
.getProfileKey().isPresent()) {
912 handleIncomingProfileKey(message
.getProfileKey().get(), source
);
918 private void handleGroupV2Context(final SignalServiceGroupV2 groupContext
) {
919 final var groupMasterKey
= groupContext
.getMasterKey();
921 context
.getGroupHelper()
922 .getOrMigrateGroup(groupMasterKey
,
923 groupContext
.getRevision(),
924 groupContext
.hasSignedGroupChange() ? groupContext
.getSignedGroupChange() : null);
927 private void handleIncomingProfileKey(final byte[] profileKeyBytes
, final RecipientId source
) {
928 if (profileKeyBytes
.length
!= 32) {
929 logger
.debug("Received invalid profile key of length {}", profileKeyBytes
.length
);
932 final ProfileKey profileKey
;
934 profileKey
= new ProfileKey(profileKeyBytes
);
935 } catch (InvalidInputException e
) {
936 throw new AssertionError(e
);
938 if (account
.getSelfRecipientId().equals(source
)) {
939 this.account
.setProfileKey(profileKey
);
941 this.account
.getProfileStore().storeProfileKey(source
, profileKey
);
944 private SignalServiceAddress
getSenderAddress(SignalServiceEnvelope envelope
, SignalServiceContent content
) {
945 if (!envelope
.isUnidentifiedSender() && envelope
.hasSourceUuid()) {
946 return envelope
.getSourceAddress();
947 } else if (content
!= null) {
948 return content
.getSender();
954 private DeviceAddress
getSender(SignalServiceEnvelope envelope
, SignalServiceContent content
) {
955 if (!envelope
.isUnidentifiedSender() && envelope
.hasSourceUuid()) {
956 return new DeviceAddress(context
.getRecipientHelper().resolveRecipient(envelope
.getSourceAddress()),
957 envelope
.getSourceAddress().getServiceId(),
958 envelope
.getSourceDevice());
960 return new DeviceAddress(context
.getRecipientHelper().resolveRecipient(content
.getSender()),
961 content
.getSender().getServiceId(),
962 content
.getSenderDevice());
966 private DeviceAddress
getDestination(SignalServiceEnvelope envelope
) {
967 if (!envelope
.hasDestinationUuid()) {
968 return new DeviceAddress(account
.getSelfRecipientId(), account
.getAci(), account
.getDeviceId());
970 final var addressOptional
= SignalServiceAddress
.fromRaw(envelope
.getDestinationUuid(), null);
971 if (addressOptional
.isEmpty()) {
972 return new DeviceAddress(account
.getSelfRecipientId(), account
.getAci(), account
.getDeviceId());
974 final var address
= addressOptional
.get();
975 return new DeviceAddress(context
.getRecipientHelper().resolveRecipient(address
), address
.getServiceId(), 0);
978 private record DeviceAddress(RecipientId recipientId
, ServiceId serviceId
, int deviceId
) {}