]> nmode's Git Repositories - signal-cli/blob - src/main/java/cli/Manager.java
Add possibility to send messages via dbus daemon
[signal-cli] / src / main / java / cli / Manager.java
1 /**
2 * Copyright (C) 2015 AsamK
3 *
4 * This program is free software: you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License as published by
6 * the Free Software Foundation, either version 3 of the License, or
7 * (at your option) any later version.
8 *
9 * This program is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
13 *
14 * You should have received a copy of the GNU General Public License
15 * along with this program. If not, see <http://www.gnu.org/licenses/>.
16 */
17 package cli;
18
19 import com.fasterxml.jackson.annotation.JsonAutoDetect;
20 import com.fasterxml.jackson.annotation.PropertyAccessor;
21 import com.fasterxml.jackson.databind.DeserializationFeature;
22 import com.fasterxml.jackson.databind.JsonNode;
23 import com.fasterxml.jackson.databind.ObjectMapper;
24 import com.fasterxml.jackson.databind.SerializationFeature;
25 import com.fasterxml.jackson.databind.node.ObjectNode;
26 import org.whispersystems.libaxolotl.*;
27 import org.whispersystems.libaxolotl.ecc.Curve;
28 import org.whispersystems.libaxolotl.ecc.ECKeyPair;
29 import org.whispersystems.libaxolotl.state.PreKeyRecord;
30 import org.whispersystems.libaxolotl.state.SignedPreKeyRecord;
31 import org.whispersystems.libaxolotl.util.KeyHelper;
32 import org.whispersystems.libaxolotl.util.Medium;
33 import org.whispersystems.libaxolotl.util.guava.Optional;
34 import org.whispersystems.textsecure.api.TextSecureAccountManager;
35 import org.whispersystems.textsecure.api.TextSecureMessagePipe;
36 import org.whispersystems.textsecure.api.TextSecureMessageReceiver;
37 import org.whispersystems.textsecure.api.TextSecureMessageSender;
38 import org.whispersystems.textsecure.api.crypto.TextSecureCipher;
39 import org.whispersystems.textsecure.api.messages.*;
40 import org.whispersystems.textsecure.api.push.TextSecureAddress;
41 import org.whispersystems.textsecure.api.push.TrustStore;
42 import org.whispersystems.textsecure.api.push.exceptions.EncapsulatedExceptions;
43 import org.whispersystems.textsecure.api.util.InvalidNumberException;
44 import org.whispersystems.textsecure.api.util.PhoneNumberFormatter;
45
46 import java.io.*;
47 import java.nio.file.Files;
48 import java.nio.file.Paths;
49 import java.util.*;
50 import java.util.concurrent.TimeUnit;
51 import java.util.concurrent.TimeoutException;
52
53 class Manager implements TextSecure {
54 private final static String URL = "https://textsecure-service.whispersystems.org";
55 private final static TrustStore TRUST_STORE = new WhisperTrustStore();
56
57 public final static String PROJECT_NAME = Manager.class.getPackage().getImplementationTitle();
58 public final static String PROJECT_VERSION = Manager.class.getPackage().getImplementationVersion();
59 private final static String USER_AGENT = PROJECT_NAME + " " + PROJECT_VERSION;
60
61 private final static String settingsPath = System.getProperty("user.home") + "/.config/textsecure";
62 private final static String dataPath = settingsPath + "/data";
63 private final static String attachmentsPath = settingsPath + "/attachments";
64
65 private final ObjectMapper jsonProcessot = new ObjectMapper();
66 private String username;
67 private String password;
68 private String signalingKey;
69 private int preKeyIdOffset;
70 private int nextSignedPreKeyId;
71
72 private boolean registered = false;
73
74 private JsonAxolotlStore axolotlStore;
75 private TextSecureAccountManager accountManager;
76 private JsonGroupStore groupStore;
77
78 public Manager(String username) {
79 this.username = username;
80 jsonProcessot.setVisibility(PropertyAccessor.ALL, JsonAutoDetect.Visibility.NONE); // disable autodetect
81 jsonProcessot.enable(SerializationFeature.INDENT_OUTPUT); // for pretty print, you can disable it.
82 jsonProcessot.enable(SerializationFeature.WRITE_NULL_MAP_VALUES);
83 jsonProcessot.disable(DeserializationFeature.FAIL_ON_UNKNOWN_PROPERTIES);
84 }
85
86 public String getFileName() {
87 new File(dataPath).mkdirs();
88 return dataPath + "/" + username;
89 }
90
91 public boolean userExists() {
92 File f = new File(getFileName());
93 return !(!f.exists() || f.isDirectory());
94 }
95
96 public boolean userHasKeys() {
97 return axolotlStore != null;
98 }
99
100 private JsonNode getNotNullNode(JsonNode parent, String name) throws InvalidObjectException {
101 JsonNode node = parent.get(name);
102 if (node == null) {
103 throw new InvalidObjectException(String.format("Incorrect file format: expected parameter %s not found ", name));
104 }
105
106 return node;
107 }
108
109 public void load() throws IOException, InvalidKeyException {
110 JsonNode rootNode = jsonProcessot.readTree(new File(getFileName()));
111
112 username = getNotNullNode(rootNode, "username").asText();
113 password = getNotNullNode(rootNode, "password").asText();
114 if (rootNode.has("signalingKey")) {
115 signalingKey = getNotNullNode(rootNode, "signalingKey").asText();
116 }
117 if (rootNode.has("preKeyIdOffset")) {
118 preKeyIdOffset = getNotNullNode(rootNode, "preKeyIdOffset").asInt(0);
119 } else {
120 preKeyIdOffset = 0;
121 }
122 if (rootNode.has("nextSignedPreKeyId")) {
123 nextSignedPreKeyId = getNotNullNode(rootNode, "nextSignedPreKeyId").asInt();
124 } else {
125 nextSignedPreKeyId = 0;
126 }
127 axolotlStore = jsonProcessot.convertValue(getNotNullNode(rootNode, "axolotlStore"), JsonAxolotlStore.class); //new JsonAxolotlStore(in.getJSONObject("axolotlStore"));
128 registered = getNotNullNode(rootNode, "registered").asBoolean();
129 JsonNode groupStoreNode = rootNode.get("groupStore");
130 if (groupStoreNode != null) {
131 groupStore = jsonProcessot.convertValue(groupStoreNode, JsonGroupStore.class);
132 }
133 if (groupStore == null) {
134 groupStore = new JsonGroupStore();
135 }
136 accountManager = new TextSecureAccountManager(URL, TRUST_STORE, username, password, USER_AGENT);
137 }
138
139 private void save() {
140 ObjectNode rootNode = jsonProcessot.createObjectNode();
141 rootNode.put("username", username)
142 .put("password", password)
143 .put("signalingKey", signalingKey)
144 .put("preKeyIdOffset", preKeyIdOffset)
145 .put("nextSignedPreKeyId", nextSignedPreKeyId)
146 .put("registered", registered)
147 .putPOJO("axolotlStore", axolotlStore)
148 .putPOJO("groupStore", groupStore)
149 ;
150 try {
151 jsonProcessot.writeValue(new File(getFileName()), rootNode);
152 } catch (Exception e) {
153 System.err.println(String.format("Error saving file: %s", e.getMessage()));
154 }
155 }
156
157 public void createNewIdentity() {
158 IdentityKeyPair identityKey = KeyHelper.generateIdentityKeyPair();
159 int registrationId = KeyHelper.generateRegistrationId(false);
160 axolotlStore = new JsonAxolotlStore(identityKey, registrationId);
161 groupStore = new JsonGroupStore();
162 registered = false;
163 save();
164 }
165
166 public boolean isRegistered() {
167 return registered;
168 }
169
170 public void register(boolean voiceVerication) throws IOException {
171 password = Util.getSecret(18);
172
173 accountManager = new TextSecureAccountManager(URL, TRUST_STORE, username, password, USER_AGENT);
174
175 if (voiceVerication)
176 accountManager.requestVoiceVerificationCode();
177 else
178 accountManager.requestSmsVerificationCode();
179
180 registered = false;
181 save();
182 }
183
184 private static final int BATCH_SIZE = 100;
185
186 private List<PreKeyRecord> generatePreKeys() {
187 List<PreKeyRecord> records = new LinkedList<>();
188
189 for (int i = 0; i < BATCH_SIZE; i++) {
190 int preKeyId = (preKeyIdOffset + i) % Medium.MAX_VALUE;
191 ECKeyPair keyPair = Curve.generateKeyPair();
192 PreKeyRecord record = new PreKeyRecord(preKeyId, keyPair);
193
194 axolotlStore.storePreKey(preKeyId, record);
195 records.add(record);
196 }
197
198 preKeyIdOffset = (preKeyIdOffset + BATCH_SIZE + 1) % Medium.MAX_VALUE;
199 save();
200
201 return records;
202 }
203
204 private PreKeyRecord generateLastResortPreKey() {
205 if (axolotlStore.containsPreKey(Medium.MAX_VALUE)) {
206 try {
207 return axolotlStore.loadPreKey(Medium.MAX_VALUE);
208 } catch (InvalidKeyIdException e) {
209 axolotlStore.removePreKey(Medium.MAX_VALUE);
210 }
211 }
212
213 ECKeyPair keyPair = Curve.generateKeyPair();
214 PreKeyRecord record = new PreKeyRecord(Medium.MAX_VALUE, keyPair);
215
216 axolotlStore.storePreKey(Medium.MAX_VALUE, record);
217 save();
218
219 return record;
220 }
221
222 private SignedPreKeyRecord generateSignedPreKey(IdentityKeyPair identityKeyPair) {
223 try {
224 ECKeyPair keyPair = Curve.generateKeyPair();
225 byte[] signature = Curve.calculateSignature(identityKeyPair.getPrivateKey(), keyPair.getPublicKey().serialize());
226 SignedPreKeyRecord record = new SignedPreKeyRecord(nextSignedPreKeyId, System.currentTimeMillis(), keyPair, signature);
227
228 axolotlStore.storeSignedPreKey(nextSignedPreKeyId, record);
229 nextSignedPreKeyId = (nextSignedPreKeyId + 1) % Medium.MAX_VALUE;
230 save();
231
232 return record;
233 } catch (InvalidKeyException e) {
234 throw new AssertionError(e);
235 }
236 }
237
238 public void verifyAccount(String verificationCode) throws IOException {
239 verificationCode = verificationCode.replace("-", "");
240 signalingKey = Util.getSecret(52);
241 accountManager.verifyAccountWithCode(verificationCode, signalingKey, axolotlStore.getLocalRegistrationId(), false);
242
243 //accountManager.setGcmId(Optional.of(GoogleCloudMessaging.getInstance(this).register(REGISTRATION_ID)));
244 registered = true;
245
246 List<PreKeyRecord> oneTimePreKeys = generatePreKeys();
247
248 PreKeyRecord lastResortKey = generateLastResortPreKey();
249
250 SignedPreKeyRecord signedPreKeyRecord = generateSignedPreKey(axolotlStore.getIdentityKeyPair());
251
252 accountManager.setPreKeys(axolotlStore.getIdentityKeyPair().getPublicKey(), lastResortKey, signedPreKeyRecord, oneTimePreKeys);
253 save();
254 }
255
256
257 private static List<TextSecureAttachment> getTextSecureAttachments(List<String> attachments) throws AttachmentInvalidException {
258 List<TextSecureAttachment> textSecureAttachments = null;
259 if (attachments != null) {
260 textSecureAttachments = new ArrayList<>(attachments.size());
261 for (String attachment : attachments) {
262 try {
263 textSecureAttachments.add(createAttachment(attachment));
264 } catch (IOException e) {
265 throw new AttachmentInvalidException(attachment, e);
266 }
267 }
268 }
269 return textSecureAttachments;
270 }
271
272 private static TextSecureAttachmentStream createAttachment(String attachment) throws IOException {
273 File attachmentFile = new File(attachment);
274 InputStream attachmentStream = new FileInputStream(attachmentFile);
275 final long attachmentSize = attachmentFile.length();
276 String mime = Files.probeContentType(Paths.get(attachment));
277 return new TextSecureAttachmentStream(attachmentStream, mime, attachmentSize, null);
278 }
279
280 @Override
281 public void sendGroupMessage(String messageText, List<String> attachments,
282 byte[] groupId)
283 throws IOException, EncapsulatedExceptions, GroupNotFoundException, AttachmentInvalidException {
284 final TextSecureDataMessage.Builder messageBuilder = TextSecureDataMessage.newBuilder().withBody(messageText);
285 if (attachments != null) {
286 messageBuilder.withAttachments(getTextSecureAttachments(attachments));
287 }
288 if (groupId != null) {
289 TextSecureGroup group = TextSecureGroup.newBuilder(TextSecureGroup.Type.DELIVER)
290 .withId(groupId)
291 .build();
292 messageBuilder.asGroupMessage(group);
293 }
294 TextSecureDataMessage message = messageBuilder.build();
295
296 sendMessage(message, groupStore.getGroup(groupId).members);
297 }
298
299 public void sendQuitGroupMessage(byte[] groupId) throws GroupNotFoundException, IOException, EncapsulatedExceptions {
300 TextSecureGroup group = TextSecureGroup.newBuilder(TextSecureGroup.Type.QUIT)
301 .withId(groupId)
302 .build();
303
304 TextSecureDataMessage message = TextSecureDataMessage.newBuilder()
305 .asGroupMessage(group)
306 .build();
307
308 sendMessage(message, groupStore.getGroup(groupId).members);
309 }
310
311 public byte[] sendUpdateGroupMessage(byte[] groupId, String name, Collection<String> members, String avatarFile) throws IOException, EncapsulatedExceptions, GroupNotFoundException, AttachmentInvalidException {
312 GroupInfo g;
313 if (groupId == null) {
314 // Create new group
315 g = new GroupInfo(Util.getSecretBytes(16));
316 g.members.add(username);
317 } else {
318 g = groupStore.getGroup(groupId);
319 }
320
321 if (name != null) {
322 g.name = name;
323 }
324
325 if (members != null) {
326 for (String member : members) {
327 try {
328 g.members.add(canonicalizeNumber(member));
329 } catch (InvalidNumberException e) {
330 System.err.println("Failed to add member \"" + member + "\" to group: " + e.getMessage());
331 System.err.println("Aborting…");
332 System.exit(1);
333 }
334 }
335 }
336
337 TextSecureGroup.Builder group = TextSecureGroup.newBuilder(TextSecureGroup.Type.UPDATE)
338 .withId(g.groupId)
339 .withName(g.name)
340 .withMembers(new ArrayList<>(g.members));
341
342 if (avatarFile != null) {
343 try {
344 group.withAvatar(createAttachment(avatarFile));
345 // TODO
346 g.avatarId = 0;
347 } catch (IOException e) {
348 throw new AttachmentInvalidException(avatarFile, e);
349 }
350 }
351
352 groupStore.updateGroup(g);
353
354 TextSecureDataMessage message = TextSecureDataMessage.newBuilder()
355 .asGroupMessage(group.build())
356 .build();
357
358 sendMessage(message, g.members);
359 return g.groupId;
360 }
361
362 @Override
363 public void sendMessage(String message, List<String> attachments, String recipient)
364 throws EncapsulatedExceptions, AttachmentInvalidException, IOException {
365 List<String> recipients = new ArrayList<>(1);
366 recipients.add(recipient);
367 sendMessage(message, attachments, recipients);
368 }
369
370 @Override
371 public void sendMessage(String messageText, List<String> attachments,
372 List<String> recipients)
373 throws IOException, EncapsulatedExceptions, AttachmentInvalidException {
374 final TextSecureDataMessage.Builder messageBuilder = TextSecureDataMessage.newBuilder().withBody(messageText);
375 if (attachments != null) {
376 messageBuilder.withAttachments(getTextSecureAttachments(attachments));
377 }
378 TextSecureDataMessage message = messageBuilder.build();
379
380 sendMessage(message, recipients);
381 }
382
383 @Override
384 public void sendEndSessionMessage(List<String> recipients) throws IOException, EncapsulatedExceptions {
385 TextSecureDataMessage message = TextSecureDataMessage.newBuilder()
386 .asEndSessionMessage()
387 .build();
388
389 sendMessage(message, recipients);
390 }
391
392 private void sendMessage(TextSecureDataMessage message, Collection<String> recipients)
393 throws IOException, EncapsulatedExceptions {
394 TextSecureMessageSender messageSender = new TextSecureMessageSender(URL, TRUST_STORE, username, password,
395 axolotlStore, USER_AGENT, Optional.<TextSecureMessageSender.EventListener>absent());
396
397 Set<TextSecureAddress> recipientsTS = new HashSet<>(recipients.size());
398 for (String recipient : recipients) {
399 try {
400 recipientsTS.add(getPushAddress(recipient));
401 } catch (InvalidNumberException e) {
402 System.err.println("Failed to add recipient \"" + recipient + "\": " + e.getMessage());
403 System.err.println("Aborting sending.");
404 save();
405 return;
406 }
407 }
408
409 messageSender.sendMessage(new ArrayList<>(recipientsTS), message);
410
411 if (message.isEndSession()) {
412 for (TextSecureAddress recipient : recipientsTS) {
413 handleEndSession(recipient.getNumber());
414 }
415 }
416 save();
417 }
418
419 private TextSecureContent decryptMessage(TextSecureEnvelope envelope) {
420 TextSecureCipher cipher = new TextSecureCipher(new TextSecureAddress(username), axolotlStore);
421 try {
422 return cipher.decrypt(envelope);
423 } catch (Exception e) {
424 // TODO handle all exceptions
425 e.printStackTrace();
426 return null;
427 }
428 }
429
430 private void handleEndSession(String source) {
431 axolotlStore.deleteAllSessions(source);
432 }
433
434 public interface ReceiveMessageHandler {
435 void handleMessage(TextSecureEnvelope envelope, TextSecureContent decryptedContent, GroupInfo group);
436 }
437
438 public void receiveMessages(int timeoutSeconds, boolean returnOnTimeout, ReceiveMessageHandler handler) throws IOException {
439 final TextSecureMessageReceiver messageReceiver = new TextSecureMessageReceiver(URL, TRUST_STORE, username, password, signalingKey, USER_AGENT);
440 TextSecureMessagePipe messagePipe = null;
441
442 try {
443 messagePipe = messageReceiver.createMessagePipe();
444
445 while (true) {
446 TextSecureEnvelope envelope;
447 TextSecureContent content = null;
448 GroupInfo group = null;
449 try {
450 envelope = messagePipe.read(timeoutSeconds, TimeUnit.SECONDS);
451 if (!envelope.isReceipt()) {
452 content = decryptMessage(envelope);
453 if (content != null) {
454 if (content.getDataMessage().isPresent()) {
455 TextSecureDataMessage message = content.getDataMessage().get();
456 if (message.getGroupInfo().isPresent()) {
457 TextSecureGroup groupInfo = message.getGroupInfo().get();
458 switch (groupInfo.getType()) {
459 case UPDATE:
460 try {
461 group = groupStore.getGroup(groupInfo.getGroupId());
462 } catch (GroupNotFoundException e) {
463 group = new GroupInfo(groupInfo.getGroupId());
464 }
465
466 if (groupInfo.getAvatar().isPresent()) {
467 TextSecureAttachment avatar = groupInfo.getAvatar().get();
468 if (avatar.isPointer()) {
469 long avatarId = avatar.asPointer().getId();
470 try {
471 retrieveAttachment(avatar.asPointer());
472 group.avatarId = avatarId;
473 } catch (IOException | InvalidMessageException e) {
474 System.err.println("Failed to retrieve group avatar (" + avatarId + "): " + e.getMessage());
475 }
476 }
477 }
478
479 if (groupInfo.getName().isPresent()) {
480 group.name = groupInfo.getName().get();
481 }
482
483 if (groupInfo.getMembers().isPresent()) {
484 group.members.addAll(groupInfo.getMembers().get());
485 }
486
487 groupStore.updateGroup(group);
488 break;
489 case DELIVER:
490 try {
491 group = groupStore.getGroup(groupInfo.getGroupId());
492 } catch (GroupNotFoundException e) {
493 }
494 break;
495 case QUIT:
496 try {
497 group = groupStore.getGroup(groupInfo.getGroupId());
498 group.members.remove(envelope.getSource());
499 } catch (GroupNotFoundException e) {
500 }
501 break;
502 }
503 }
504 if (message.isEndSession()) {
505 handleEndSession(envelope.getSource());
506 }
507 if (message.getAttachments().isPresent()) {
508 for (TextSecureAttachment attachment : message.getAttachments().get()) {
509 if (attachment.isPointer()) {
510 try {
511 retrieveAttachment(attachment.asPointer());
512 } catch (IOException | InvalidMessageException e) {
513 System.err.println("Failed to retrieve attachment (" + attachment.asPointer().getId() + "): " + e.getMessage());
514 }
515 }
516 }
517 }
518 }
519 }
520 }
521 save();
522 handler.handleMessage(envelope, content, group);
523 } catch (TimeoutException e) {
524 if (returnOnTimeout)
525 return;
526 } catch (InvalidVersionException e) {
527 System.err.println("Ignoring error: " + e.getMessage());
528 }
529 }
530 } finally {
531 if (messagePipe != null)
532 messagePipe.shutdown();
533 }
534 }
535
536 public File getAttachmentFile(long attachmentId) {
537 return new File(attachmentsPath + "/" + attachmentId);
538 }
539
540 private File retrieveAttachment(TextSecureAttachmentPointer pointer) throws IOException, InvalidMessageException {
541 final TextSecureMessageReceiver messageReceiver = new TextSecureMessageReceiver(URL, TRUST_STORE, username, password, signalingKey, USER_AGENT);
542
543 File tmpFile = File.createTempFile("ts_attach_" + pointer.getId(), ".tmp");
544 InputStream input = messageReceiver.retrieveAttachment(pointer, tmpFile);
545
546 new File(attachmentsPath).mkdirs();
547 File outputFile = getAttachmentFile(pointer.getId());
548 OutputStream output = null;
549 try {
550 output = new FileOutputStream(outputFile);
551 byte[] buffer = new byte[4096];
552 int read;
553
554 while ((read = input.read(buffer)) != -1) {
555 output.write(buffer, 0, read);
556 }
557 } catch (FileNotFoundException e) {
558 e.printStackTrace();
559 return null;
560 } finally {
561 if (output != null) {
562 output.close();
563 output = null;
564 }
565 if (!tmpFile.delete()) {
566 System.err.println("Failed to delete temp file: " + tmpFile);
567 }
568 }
569 if (pointer.getPreview().isPresent()) {
570 File previewFile = new File(outputFile + ".preview");
571 try {
572 output = new FileOutputStream(previewFile);
573 byte[] preview = pointer.getPreview().get();
574 output.write(preview, 0, preview.length);
575 } catch (FileNotFoundException e) {
576 e.printStackTrace();
577 return null;
578 } finally {
579 if (output != null) {
580 output.close();
581 }
582 }
583 }
584 return outputFile;
585 }
586
587 private String canonicalizeNumber(String number) throws InvalidNumberException {
588 String localNumber = username;
589 return PhoneNumberFormatter.formatNumber(number, localNumber);
590 }
591
592 private TextSecureAddress getPushAddress(String number) throws InvalidNumberException {
593 String e164number = canonicalizeNumber(number);
594 return new TextSecureAddress(e164number);
595 }
596
597 @Override
598 public boolean isRemote() {
599 return false;
600 }
601 }