1 package org
.asamk
.signal
.manager
.helper
;
3 import org
.asamk
.signal
.manager
.Manager
;
4 import org
.asamk
.signal
.manager
.actions
.HandleAction
;
5 import org
.asamk
.signal
.manager
.actions
.RefreshPreKeysAction
;
6 import org
.asamk
.signal
.manager
.actions
.RenewSessionAction
;
7 import org
.asamk
.signal
.manager
.actions
.ResendMessageAction
;
8 import org
.asamk
.signal
.manager
.actions
.RetrieveProfileAction
;
9 import org
.asamk
.signal
.manager
.actions
.SendGroupInfoAction
;
10 import org
.asamk
.signal
.manager
.actions
.SendGroupInfoRequestAction
;
11 import org
.asamk
.signal
.manager
.actions
.SendProfileKeyAction
;
12 import org
.asamk
.signal
.manager
.actions
.SendReceiptAction
;
13 import org
.asamk
.signal
.manager
.actions
.SendRetryMessageRequestAction
;
14 import org
.asamk
.signal
.manager
.actions
.SendSyncBlockedListAction
;
15 import org
.asamk
.signal
.manager
.actions
.SendSyncConfigurationAction
;
16 import org
.asamk
.signal
.manager
.actions
.SendSyncContactsAction
;
17 import org
.asamk
.signal
.manager
.actions
.SendSyncGroupsAction
;
18 import org
.asamk
.signal
.manager
.actions
.SendSyncKeysAction
;
19 import org
.asamk
.signal
.manager
.actions
.SyncStorageDataAction
;
20 import org
.asamk
.signal
.manager
.actions
.UpdateAccountAttributesAction
;
21 import org
.asamk
.signal
.manager
.api
.GroupId
;
22 import org
.asamk
.signal
.manager
.api
.GroupNotFoundException
;
23 import org
.asamk
.signal
.manager
.api
.MessageEnvelope
;
24 import org
.asamk
.signal
.manager
.api
.Pair
;
25 import org
.asamk
.signal
.manager
.api
.ReceiveConfig
;
26 import org
.asamk
.signal
.manager
.api
.StickerPackId
;
27 import org
.asamk
.signal
.manager
.api
.TrustLevel
;
28 import org
.asamk
.signal
.manager
.api
.UntrustedIdentityException
;
29 import org
.asamk
.signal
.manager
.groups
.GroupUtils
;
30 import org
.asamk
.signal
.manager
.internal
.SignalDependencies
;
31 import org
.asamk
.signal
.manager
.jobs
.RetrieveStickerPackJob
;
32 import org
.asamk
.signal
.manager
.storage
.SignalAccount
;
33 import org
.asamk
.signal
.manager
.storage
.groups
.GroupInfoV1
;
34 import org
.asamk
.signal
.manager
.storage
.recipients
.RecipientAddress
;
35 import org
.asamk
.signal
.manager
.storage
.recipients
.RecipientId
;
36 import org
.asamk
.signal
.manager
.storage
.stickers
.StickerPack
;
37 import org
.signal
.libsignal
.metadata
.ProtocolInvalidKeyException
;
38 import org
.signal
.libsignal
.metadata
.ProtocolInvalidKeyIdException
;
39 import org
.signal
.libsignal
.metadata
.ProtocolInvalidMessageException
;
40 import org
.signal
.libsignal
.metadata
.ProtocolNoSessionException
;
41 import org
.signal
.libsignal
.metadata
.ProtocolUntrustedIdentityException
;
42 import org
.signal
.libsignal
.metadata
.SelfSendException
;
43 import org
.signal
.libsignal
.protocol
.InvalidMessageException
;
44 import org
.signal
.libsignal
.protocol
.groups
.GroupSessionBuilder
;
45 import org
.signal
.libsignal
.protocol
.message
.DecryptionErrorMessage
;
46 import org
.signal
.libsignal
.zkgroup
.InvalidInputException
;
47 import org
.signal
.libsignal
.zkgroup
.profiles
.ProfileKey
;
48 import org
.slf4j
.Logger
;
49 import org
.slf4j
.LoggerFactory
;
50 import org
.whispersystems
.signalservice
.api
.InvalidMessageStructureException
;
51 import org
.whispersystems
.signalservice
.api
.crypto
.SignalGroupSessionBuilder
;
52 import org
.whispersystems
.signalservice
.api
.crypto
.SignalServiceCipherResult
;
53 import org
.whispersystems
.signalservice
.api
.messages
.EnvelopeContentValidator
;
54 import org
.whispersystems
.signalservice
.api
.messages
.SignalServiceContent
;
55 import org
.whispersystems
.signalservice
.api
.messages
.SignalServiceDataMessage
;
56 import org
.whispersystems
.signalservice
.api
.messages
.SignalServiceEnvelope
;
57 import org
.whispersystems
.signalservice
.api
.messages
.SignalServiceGroup
;
58 import org
.whispersystems
.signalservice
.api
.messages
.SignalServiceGroupContext
;
59 import org
.whispersystems
.signalservice
.api
.messages
.SignalServiceGroupV2
;
60 import org
.whispersystems
.signalservice
.api
.messages
.SignalServicePniSignatureMessage
;
61 import org
.whispersystems
.signalservice
.api
.messages
.SignalServiceReceiptMessage
;
62 import org
.whispersystems
.signalservice
.api
.messages
.SignalServiceStoryMessage
;
63 import org
.whispersystems
.signalservice
.api
.messages
.multidevice
.SignalServiceSyncMessage
;
64 import org
.whispersystems
.signalservice
.api
.messages
.multidevice
.StickerPackOperationMessage
;
65 import org
.whispersystems
.signalservice
.api
.push
.ServiceId
;
66 import org
.whispersystems
.signalservice
.api
.push
.ServiceId
.ACI
;
67 import org
.whispersystems
.signalservice
.api
.push
.ServiceIdType
;
68 import org
.whispersystems
.signalservice
.api
.push
.SignalServiceAddress
;
69 import org
.whispersystems
.signalservice
.internal
.push
.Envelope
;
70 import org
.whispersystems
.signalservice
.internal
.push
.UnsupportedDataMessageException
;
72 import java
.util
.ArrayList
;
73 import java
.util
.List
;
74 import java
.util
.Optional
;
75 import java
.util
.stream
.Collectors
;
77 public final class IncomingMessageHandler
{
79 private static final Logger logger
= LoggerFactory
.getLogger(IncomingMessageHandler
.class);
81 private final SignalAccount account
;
82 private final SignalDependencies dependencies
;
83 private final Context context
;
85 public IncomingMessageHandler(final Context context
) {
86 this.account
= context
.getAccount();
87 this.dependencies
= context
.getDependencies();
88 this.context
= context
;
91 public Pair
<List
<HandleAction
>, Exception
> handleRetryEnvelope(
92 final SignalServiceEnvelope envelope
,
93 final ReceiveConfig receiveConfig
,
94 final Manager
.ReceiveMessageHandler handler
96 final List
<HandleAction
> actions
= new ArrayList
<>();
97 if (envelope
.isPreKeySignalMessage()) {
98 actions
.add(RefreshPreKeysAction
.create());
101 SignalServiceContent content
= null;
102 if (!envelope
.isReceipt()) {
103 account
.getIdentityKeyStore().setRetryingDecryption(true);
104 final var destination
= getDestination(envelope
).serviceId();
106 final var cipherResult
= dependencies
.getCipher(destination
== null
107 || destination
.equals(account
.getAci()) ? ServiceIdType
.ACI
: ServiceIdType
.PNI
)
108 .decrypt(envelope
.getProto(), envelope
.getServerDeliveredTimestamp());
109 content
= validate(envelope
.getProto(), cipherResult
, envelope
.getServerDeliveredTimestamp());
110 if (content
== null) {
111 return new Pair
<>(List
.of(), null);
113 } catch (ProtocolUntrustedIdentityException e
) {
114 final var recipientId
= account
.getRecipientResolver().resolveRecipient(e
.getSender());
115 final var exception
= new UntrustedIdentityException(account
.getRecipientAddressResolver()
116 .resolveRecipientAddress(recipientId
)
117 .toApiRecipientAddress(), e
.getSenderDevice());
118 return new Pair
<>(List
.of(), exception
);
119 } catch (Exception e
) {
120 return new Pair
<>(List
.of(), e
);
122 account
.getIdentityKeyStore().setRetryingDecryption(false);
125 actions
.addAll(checkAndHandleMessage(envelope
, content
, receiveConfig
, handler
, null));
126 return new Pair
<>(actions
, null);
129 public Pair
<List
<HandleAction
>, Exception
> handleEnvelope(
130 final SignalServiceEnvelope envelope
,
131 final ReceiveConfig receiveConfig
,
132 final Manager
.ReceiveMessageHandler handler
134 final var actions
= new ArrayList
<HandleAction
>();
135 SignalServiceContent content
= null;
136 Exception exception
= null;
137 envelope
.getSourceServiceId().map(ServiceId
::parseOrNull
)
138 // Store uuid if we don't have it already
139 // uuid in envelope is sent by server
140 .ifPresent(serviceId
-> account
.getRecipientResolver().resolveRecipient(serviceId
));
141 if (!envelope
.isReceipt()) {
142 final var destination
= getDestination(envelope
).serviceId();
144 final var cipherResult
= dependencies
.getCipher(destination
== null
145 || destination
.equals(account
.getAci()) ? ServiceIdType
.ACI
: ServiceIdType
.PNI
)
146 .decrypt(envelope
.getProto(), envelope
.getServerDeliveredTimestamp());
147 content
= validate(envelope
.getProto(), cipherResult
, envelope
.getServerDeliveredTimestamp());
148 if (content
== null) {
149 return new Pair
<>(List
.of(), null);
151 } catch (ProtocolUntrustedIdentityException e
) {
152 final var recipientId
= account
.getRecipientResolver().resolveRecipient(e
.getSender());
153 actions
.add(new RetrieveProfileAction(recipientId
));
154 exception
= new UntrustedIdentityException(account
.getRecipientAddressResolver()
155 .resolveRecipientAddress(recipientId
)
156 .toApiRecipientAddress(), e
.getSenderDevice());
157 } catch (ProtocolInvalidKeyIdException
| ProtocolInvalidKeyException
| ProtocolNoSessionException
|
158 ProtocolInvalidMessageException e
) {
159 logger
.debug("Failed to decrypt incoming message", e
);
160 final var sender
= account
.getRecipientResolver().resolveRecipient(e
.getSender());
161 if (context
.getContactHelper().isContactBlocked(sender
)) {
162 logger
.debug("Received invalid message from blocked contact, ignoring.");
164 var serviceId
= ServiceId
.parseOrNull(e
.getSender());
165 if (serviceId
!= null) {
166 final var isSelf
= sender
.equals(account
.getSelfRecipientId())
167 && e
.getSenderDevice() == account
.getDeviceId();
169 logger
.debug("Received invalid message, requesting message resend.");
170 actions
.add(new SendRetryMessageRequestAction(sender
, serviceId
, e
, envelope
, destination
));
172 logger
.debug("Received invalid message, queuing renew session action.");
173 actions
.add(new RenewSessionAction(sender
, serviceId
, destination
));
176 logger
.debug("Received invalid message from invalid sender: {}", e
.getSender());
180 } catch (SelfSendException e
) {
181 logger
.debug("Dropping unidentified message from self.");
182 return new Pair
<>(List
.of(), null);
183 } catch (Exception e
) {
184 logger
.debug("Failed to handle incoming message", e
);
189 actions
.addAll(checkAndHandleMessage(envelope
, content
, receiveConfig
, handler
, exception
));
190 return new Pair
<>(actions
, exception
);
193 private SignalServiceContent
validate(
195 SignalServiceCipherResult cipherResult
,
196 long serverDeliveredTimestamp
197 ) throws ProtocolInvalidKeyException
, ProtocolInvalidMessageException
, UnsupportedDataMessageException
, InvalidMessageStructureException
{
198 final var content
= cipherResult
.getContent();
199 final var envelopeMetadata
= cipherResult
.getMetadata();
200 final var validationResult
= EnvelopeContentValidator
.INSTANCE
.validate(envelope
, content
, account
.getAci());
202 if (validationResult
instanceof EnvelopeContentValidator
.Result
.Invalid v
) {
203 logger
.warn("Invalid content! {}", v
.getReason(), v
.getThrowable());
207 if (validationResult
instanceof EnvelopeContentValidator
.Result
.UnsupportedDataMessage v
) {
208 logger
.warn("Unsupported DataMessage! Our version: {}, their version: {}",
210 v
.getTheirVersion());
214 return SignalServiceContent
.Companion
.createFrom(account
.getNumber(),
218 serverDeliveredTimestamp
);
221 private List
<HandleAction
> checkAndHandleMessage(
222 final SignalServiceEnvelope envelope
,
223 final SignalServiceContent content
,
224 final ReceiveConfig receiveConfig
,
225 final Manager
.ReceiveMessageHandler handler
,
226 final Exception exception
228 if (content
!= null) {
229 // Store uuid if we don't have it already
230 // address/uuid is validated by unidentified sender certificate
232 boolean handledPniSignature
= false;
233 if (content
.getPniSignatureMessage().isPresent()) {
234 final var message
= content
.getPniSignatureMessage().get();
235 final var senderAddress
= getSenderAddress(envelope
, content
);
236 if (senderAddress
!= null) {
237 handledPniSignature
= handlePniSignatureMessage(message
, senderAddress
);
240 if (!handledPniSignature
) {
241 account
.getRecipientTrustedResolver().resolveRecipientTrusted(content
.getSender());
244 if (envelope
.isReceipt()) {
245 final var senderDeviceAddress
= getSender(envelope
, content
);
246 final var sender
= senderDeviceAddress
.serviceId();
247 final var senderDeviceId
= senderDeviceAddress
.deviceId();
248 account
.getMessageSendLogStore().deleteEntryForRecipient(envelope
.getTimestamp(), sender
, senderDeviceId
);
251 var notAllowedToSendToGroup
= isNotAllowedToSendToGroup(envelope
, content
);
252 final var groupContext
= getGroupContext(content
);
253 if (groupContext
!= null && groupContext
.getGroupV2().isPresent()) {
254 handleGroupV2Context(groupContext
.getGroupV2().get());
256 // Check again in case the user just joined the group
257 notAllowedToSendToGroup
= notAllowedToSendToGroup
&& isNotAllowedToSendToGroup(envelope
, content
);
259 if (isMessageBlocked(envelope
, content
)) {
260 logger
.info("Ignoring a message from blocked user/group: {}", envelope
.getTimestamp());
262 } else if (notAllowedToSendToGroup
) {
263 final var senderAddress
= getSenderAddress(envelope
, content
);
264 logger
.info("Ignoring a group message from an unauthorized sender (no member or admin): {} {}",
265 senderAddress
== null ?
null : senderAddress
.getIdentifier(),
266 envelope
.getTimestamp());
269 List
<HandleAction
> actions
;
270 if (content
!= null) {
271 actions
= handleMessage(envelope
, content
, receiveConfig
);
275 handler
.handleMessage(MessageEnvelope
.from(envelope
,
277 account
.getRecipientResolver(),
278 account
.getRecipientAddressResolver(),
279 context
.getAttachmentHelper()::getAttachmentFile
,
280 exception
), exception
);
285 public List
<HandleAction
> handleMessage(
286 SignalServiceEnvelope envelope
,
287 SignalServiceContent content
,
288 ReceiveConfig receiveConfig
290 var actions
= new ArrayList
<HandleAction
>();
291 final var senderDeviceAddress
= getSender(envelope
, content
);
292 final var sender
= senderDeviceAddress
.recipientId();
293 final var senderServiceId
= senderDeviceAddress
.serviceId();
294 final var senderDeviceId
= senderDeviceAddress
.deviceId();
295 final var destination
= getDestination(envelope
);
297 if (account
.getPni().equals(destination
.serviceId
)) {
298 account
.getRecipientStore().markNeedsPniSignature(destination
.recipientId
, true);
299 } else if (account
.getAci().equals(destination
.serviceId
)) {
300 account
.getRecipientStore().markNeedsPniSignature(destination
.recipientId
, false);
303 if (content
.getReceiptMessage().isPresent()) {
304 final var message
= content
.getReceiptMessage().get();
305 if (message
.isDeliveryReceipt()) {
306 account
.getMessageSendLogStore()
307 .deleteEntriesForRecipient(message
.getTimestamps(), senderServiceId
, senderDeviceId
);
311 if (content
.getSenderKeyDistributionMessage().isPresent()) {
312 final var message
= content
.getSenderKeyDistributionMessage().get();
313 final var protocolAddress
= senderServiceId
.toProtocolAddress(senderDeviceId
);
314 logger
.debug("Received a sender key distribution message for distributionId {} from {}",
315 message
.getDistributionId(),
317 new SignalGroupSessionBuilder(dependencies
.getSessionLock(),
318 new GroupSessionBuilder(account
.getSenderKeyStore())).process(protocolAddress
, message
);
321 if (content
.getDecryptionErrorMessage().isPresent()) {
322 var message
= content
.getDecryptionErrorMessage().get();
323 logger
.debug("Received a decryption error message from {}.{} (resend request for {})",
326 message
.getTimestamp());
327 if (message
.getDeviceId() == account
.getDeviceId()) {
328 handleDecryptionErrorMessage(actions
,
333 destination
.serviceId());
335 logger
.debug("Request is for another one of our devices");
339 if (content
.getDataMessage().isPresent() || content
.getEditMessage().isPresent()) {
340 var message
= content
.getDataMessage().isPresent()
341 ? content
.getDataMessage().get()
342 : content
.getEditMessage().get().getDataMessage();
344 if (content
.isNeedsReceipt()) {
345 actions
.add(new SendReceiptAction(sender
,
346 SignalServiceReceiptMessage
.Type
.DELIVERY
,
347 message
.getTimestamp()));
349 // Message wasn't sent as unidentified sender message
350 final var contact
= context
.getAccount().getContactStore().getContact(sender
);
351 if (account
.isPrimaryDevice()
353 && !contact
.isBlocked()
354 && contact
.isProfileSharingEnabled()) {
355 actions
.add(UpdateAccountAttributesAction
.create());
356 actions
.add(new SendProfileKeyAction(sender
));
359 if (receiveConfig
.sendReadReceipts()) {
360 actions
.add(new SendReceiptAction(sender
,
361 SignalServiceReceiptMessage
.Type
.READ
,
362 message
.getTimestamp()));
365 actions
.addAll(handleSignalServiceDataMessage(message
,
369 receiveConfig
.ignoreAttachments()));
372 if (content
.getStoryMessage().isPresent()) {
373 final var message
= content
.getStoryMessage().get();
374 actions
.addAll(handleSignalServiceStoryMessage(message
, sender
, receiveConfig
.ignoreAttachments()));
377 if (content
.getSyncMessage().isPresent()) {
378 var syncMessage
= content
.getSyncMessage().get();
379 actions
.addAll(handleSyncMessage(envelope
,
382 receiveConfig
.ignoreAttachments()));
388 private boolean handlePniSignatureMessage(
389 final SignalServicePniSignatureMessage message
,
390 final SignalServiceAddress senderAddress
392 final var aci
= senderAddress
.getServiceId();
393 final var aciIdentity
= account
.getIdentityKeyStore().getIdentityInfo(aci
);
394 final var pni
= message
.getPni();
395 final var pniIdentity
= account
.getIdentityKeyStore().getIdentityInfo(pni
);
397 if (aciIdentity
== null || pniIdentity
== null || aci
.equals(pni
)) {
401 final var verified
= pniIdentity
.getIdentityKey()
402 .verifyAlternateIdentity(aciIdentity
.getIdentityKey(), message
.getSignature());
405 logger
.debug("Invalid PNI signature of ACI {} with PNI {}", aci
, pni
);
409 logger
.debug("Verified association of ACI {} with PNI {}", aci
, pni
);
410 account
.getRecipientTrustedResolver()
411 .resolveRecipientTrusted(Optional
.of(ACI
.from(aci
.getRawUuid())),
413 senderAddress
.getNumber());
417 private void handleDecryptionErrorMessage(
418 final List
<HandleAction
> actions
,
419 final RecipientId sender
,
420 final ServiceId senderServiceId
,
421 final int senderDeviceId
,
422 final DecryptionErrorMessage message
,
423 final ServiceId destination
425 final var logEntries
= account
.getMessageSendLogStore()
426 .findMessages(senderServiceId
,
428 message
.getTimestamp(),
429 message
.getRatchetKey().isEmpty());
431 for (final var logEntry
: logEntries
) {
432 actions
.add(new ResendMessageAction(sender
, message
.getTimestamp(), logEntry
));
435 if (message
.getRatchetKey().isPresent()) {
436 final var sessionStore
= account
.getAccountData(destination
).getSessionStore();
437 if (sessionStore
.isCurrentRatchetKey(senderServiceId
, senderDeviceId
, message
.getRatchetKey().get())) {
438 if (logEntries
.isEmpty()) {
439 logger
.debug("Renewing the session with sender");
440 actions
.add(new RenewSessionAction(sender
, senderServiceId
, destination
));
442 logger
.trace("Archiving the session with sender, a resend message has already been queued");
443 sessionStore
.archiveSessions(senderServiceId
);
450 for (final var logEntry
: logEntries
) {
451 if (logEntry
.groupId().isEmpty()) {
454 final var group
= account
.getGroupStore().getGroup(logEntry
.groupId().get());
459 logger
.trace("Deleting shared sender key with {} ({}): {}",
462 group
.getDistributionId());
463 account
.getSenderKeyStore().deleteSharedWith(senderServiceId
, senderDeviceId
, group
.getDistributionId());
466 logger
.debug("Reset all shared sender keys with this recipient, no related message found in send log");
467 account
.getSenderKeyStore().deleteSharedWith(senderServiceId
);
471 private List
<HandleAction
> handleSyncMessage(
472 final SignalServiceEnvelope envelope
,
473 final SignalServiceSyncMessage syncMessage
,
474 final DeviceAddress sender
,
475 final boolean ignoreAttachments
477 var actions
= new ArrayList
<HandleAction
>();
478 account
.setMultiDevice(true);
479 if (syncMessage
.getSent().isPresent()) {
480 var message
= syncMessage
.getSent().get();
481 final var destination
= message
.getDestination().orElse(null);
482 if (message
.getDataMessage().isPresent()) {
483 actions
.addAll(handleSignalServiceDataMessage(message
.getDataMessage().get(),
488 : new DeviceAddress(account
.getRecipientResolver().resolveRecipient(destination
),
489 destination
.getServiceId(),
493 if (message
.getStoryMessage().isPresent()) {
494 actions
.addAll(handleSignalServiceStoryMessage(message
.getStoryMessage().get(),
495 sender
.recipientId(),
499 if (syncMessage
.getRequest().isPresent() && account
.isPrimaryDevice()) {
500 var rm
= syncMessage
.getRequest().get();
501 if (rm
.isContactsRequest()) {
502 actions
.add(SendSyncContactsAction
.create());
504 if (rm
.isGroupsRequest()) {
505 actions
.add(SendSyncGroupsAction
.create());
507 if (rm
.isBlockedListRequest()) {
508 actions
.add(SendSyncBlockedListAction
.create());
510 if (rm
.isKeysRequest()) {
511 actions
.add(SendSyncKeysAction
.create());
513 if (rm
.isConfigurationRequest()) {
514 actions
.add(SendSyncConfigurationAction
.create());
516 actions
.add(SyncStorageDataAction
.create());
518 if (syncMessage
.getGroups().isPresent()) {
520 final var groupsMessage
= syncMessage
.getGroups().get();
521 context
.getAttachmentHelper()
522 .retrieveAttachment(groupsMessage
, context
.getSyncHelper()::handleSyncDeviceGroups
);
523 } catch (Exception e
) {
524 logger
.warn("Failed to handle received sync groups, ignoring: {}", e
.getMessage());
527 if (syncMessage
.getBlockedList().isPresent()) {
528 final var blockedListMessage
= syncMessage
.getBlockedList().get();
529 for (var individual
: blockedListMessage
.individuals
) {
530 final var address
= new RecipientAddress(individual
.getAci(), individual
.getE164());
531 final var recipientId
= account
.getRecipientResolver().resolveRecipient(address
);
532 context
.getContactHelper().setContactBlocked(recipientId
, true);
534 for (var groupId
: blockedListMessage
.groupIds
.stream()
535 .map(GroupId
::unknownVersion
)
536 .collect(Collectors
.toSet())) {
538 context
.getGroupHelper().setGroupBlocked(groupId
, true);
539 } catch (GroupNotFoundException e
) {
540 logger
.warn("BlockedListMessage contained groupID that was not found in GroupStore: {}",
545 if (syncMessage
.getContacts().isPresent()) {
547 final var contactsMessage
= syncMessage
.getContacts().get();
548 context
.getAttachmentHelper()
549 .retrieveAttachment(contactsMessage
.getContactsStream(),
550 context
.getSyncHelper()::handleSyncDeviceContacts
);
551 } catch (Exception e
) {
552 logger
.warn("Failed to handle received sync contacts, ignoring: {}", e
.getMessage());
555 if (syncMessage
.getVerified().isPresent()) {
556 final var verifiedMessage
= syncMessage
.getVerified().get();
557 account
.getIdentityKeyStore()
558 .setIdentityTrustLevel(verifiedMessage
.getDestination().getServiceId(),
559 verifiedMessage
.getIdentityKey(),
560 TrustLevel
.fromVerifiedState(verifiedMessage
.getVerified()));
562 if (syncMessage
.getStickerPackOperations().isPresent()) {
563 final var stickerPackOperationMessages
= syncMessage
.getStickerPackOperations().get();
564 for (var m
: stickerPackOperationMessages
) {
565 if (m
.getPackId().isEmpty()) {
568 final var stickerPackId
= StickerPackId
.deserialize(m
.getPackId().get());
569 final var stickerPackKey
= m
.getPackKey().orElse(null);
570 final var installed
= m
.getType().isEmpty()
571 || m
.getType().get() == StickerPackOperationMessage
.Type
.INSTALL
;
573 final var sticker
= context
.getStickerHelper()
574 .addOrUpdateStickerPack(stickerPackId
, stickerPackKey
, installed
);
576 if (sticker
!= null && installed
) {
577 context
.getJobExecutor().enqueueJob(new RetrieveStickerPackJob(stickerPackId
, sticker
.packKey()));
581 if (syncMessage
.getFetchType().isPresent()) {
582 switch (syncMessage
.getFetchType().get()) {
583 case LOCAL_PROFILE
-> actions
.add(new RetrieveProfileAction(account
.getSelfRecipientId()));
584 case STORAGE_MANIFEST
-> actions
.add(SyncStorageDataAction
.create());
587 if (syncMessage
.getKeys().isPresent()) {
588 final var keysMessage
= syncMessage
.getKeys().get();
589 if (keysMessage
.getAccountEntropyPool() != null) {
590 final var aep
= keysMessage
.getAccountEntropyPool();
591 account
.setAccountEntropyPool(aep
);
592 actions
.add(SyncStorageDataAction
.create());
593 } else if (keysMessage
.getMaster() != null) {
594 final var masterKey
= keysMessage
.getMaster();
595 account
.setMasterKey(masterKey
);
596 actions
.add(SyncStorageDataAction
.create());
597 } else if (keysMessage
.getStorageService() != null) {
598 final var storageKey
= keysMessage
.getStorageService();
599 account
.setStorageKey(storageKey
);
600 actions
.add(SyncStorageDataAction
.create());
602 if (keysMessage
.getMediaRootBackupKey() != null) {
603 final var mrb
= keysMessage
.getMediaRootBackupKey();
604 account
.setMediaRootBackupKey(mrb
);
605 actions
.add(SyncStorageDataAction
.create());
608 if (syncMessage
.getConfiguration().isPresent()) {
609 final var configurationMessage
= syncMessage
.getConfiguration().get();
610 final var configurationStore
= account
.getConfigurationStore();
611 if (configurationMessage
.getReadReceipts().isPresent()) {
612 configurationStore
.setReadReceipts(configurationMessage
.getReadReceipts().get());
614 if (configurationMessage
.getLinkPreviews().isPresent()) {
615 configurationStore
.setLinkPreviews(configurationMessage
.getLinkPreviews().get());
617 if (configurationMessage
.getTypingIndicators().isPresent()) {
618 configurationStore
.setTypingIndicators(configurationMessage
.getTypingIndicators().get());
620 if (configurationMessage
.getUnidentifiedDeliveryIndicators().isPresent()) {
621 configurationStore
.setUnidentifiedDeliveryIndicators(configurationMessage
.getUnidentifiedDeliveryIndicators()
625 if (syncMessage
.getPniChangeNumber().isPresent()) {
626 final var pniChangeNumber
= syncMessage
.getPniChangeNumber().get();
627 logger
.debug("Received PNI change number sync message, applying.");
628 final var updatedPniString
= envelope
.getUpdatedPni();
629 if (updatedPniString
!= null && !updatedPniString
.isEmpty()) {
630 final var updatedPni
= ServiceId
.PNI
.parseOrThrow(updatedPniString
);
631 context
.getAccountHelper().handlePniChangeNumberMessage(pniChangeNumber
, updatedPni
);
637 private SignalServiceGroupContext
getGroupContext(SignalServiceContent content
) {
638 if (content
== null) {
642 if (content
.getDataMessage().isPresent()) {
643 var message
= content
.getDataMessage().get();
644 if (message
.getGroupContext().isPresent()) {
645 return message
.getGroupContext().get();
649 if (content
.getStoryMessage().isPresent()) {
650 var message
= content
.getStoryMessage().get();
651 if (message
.getGroupContext().isPresent()) {
653 return SignalServiceGroupContext
.create(null, message
.getGroupContext().get());
654 } catch (InvalidMessageException e
) {
655 throw new AssertionError(e
);
663 private boolean isMessageBlocked(SignalServiceEnvelope envelope
, SignalServiceContent content
) {
664 SignalServiceAddress source
= getSenderAddress(envelope
, content
);
665 if (source
== null) {
668 final var recipientId
= account
.getRecipientResolver().resolveRecipient(source
);
669 if (context
.getContactHelper().isContactBlocked(recipientId
)) {
673 final var groupContext
= getGroupContext(content
);
674 if (groupContext
!= null) {
675 var groupId
= GroupUtils
.getGroupId(groupContext
);
676 return context
.getGroupHelper().isGroupBlocked(groupId
);
682 private boolean isNotAllowedToSendToGroup(SignalServiceEnvelope envelope
, SignalServiceContent content
) {
683 SignalServiceAddress source
= getSenderAddress(envelope
, content
);
684 if (source
== null) {
688 final var groupContext
= getGroupContext(content
);
689 if (groupContext
== null) {
693 if (groupContext
.getGroupV1().isPresent()) {
694 var groupInfo
= groupContext
.getGroupV1().get();
695 if (groupInfo
.getType() == SignalServiceGroup
.Type
.QUIT
) {
700 var groupId
= GroupUtils
.getGroupId(groupContext
);
701 var group
= context
.getGroupHelper().getGroup(groupId
);
706 final var message
= content
.getDataMessage().orElse(null);
708 final var recipientId
= account
.getRecipientResolver().resolveRecipient(source
);
709 if (!group
.isMember(recipientId
) && !(
710 group
.isPendingMember(recipientId
) && message
!= null && message
.isGroupV2Update()
715 if (group
.isAnnouncementGroup() && !group
.isAdmin(recipientId
)) {
716 return message
== null
717 || message
.getBody().isPresent()
718 || message
.getAttachments().isPresent()
719 || message
.getQuote().isPresent()
720 || message
.getPreviews().isPresent()
721 || message
.getMentions().isPresent()
722 || message
.getSticker().isPresent();
727 private List
<HandleAction
> handleSignalServiceDataMessage(
728 SignalServiceDataMessage message
,
730 DeviceAddress source
,
731 DeviceAddress destination
,
732 boolean ignoreAttachments
734 var actions
= new ArrayList
<HandleAction
>();
735 if (message
.getGroupContext().isPresent()) {
736 final var groupContext
= message
.getGroupContext().get();
737 if (groupContext
.getGroupV1().isPresent()) {
738 var groupInfo
= groupContext
.getGroupV1().get();
739 var groupId
= GroupId
.v1(groupInfo
.getGroupId());
740 var group
= context
.getGroupHelper().getGroup(groupId
);
741 if (group
== null || group
instanceof GroupInfoV1
) {
742 var groupV1
= (GroupInfoV1
) group
;
743 switch (groupInfo
.getType()) {
745 if (groupV1
== null) {
746 groupV1
= new GroupInfoV1(groupId
);
749 if (groupInfo
.getAvatar().isPresent()) {
750 var avatar
= groupInfo
.getAvatar().get();
751 context
.getGroupHelper().downloadGroupAvatar(groupV1
.getGroupId(), avatar
);
754 if (groupInfo
.getName().isPresent()) {
755 groupV1
.name
= groupInfo
.getName().get();
758 if (groupInfo
.getMembers().isPresent()) {
759 final var recipientResolver
= account
.getRecipientResolver();
760 groupV1
.addMembers(groupInfo
.getMembers()
763 .map(recipientResolver
::resolveRecipient
)
764 .collect(Collectors
.toSet()));
767 account
.getGroupStore().updateGroup(groupV1
);
770 if (groupV1
== null && !isSync
) {
771 actions
.add(new SendGroupInfoRequestAction(source
.recipientId(), groupId
));
775 if (groupV1
!= null) {
776 groupV1
.removeMember(source
.recipientId());
777 account
.getGroupStore().updateGroup(groupV1
);
780 case REQUEST_INFO
-> {
781 if (groupV1
!= null && !isSync
) {
782 actions
.add(new SendGroupInfoAction(source
.recipientId(), groupV1
.getGroupId()));
787 // Received a group v1 message for a v2 group
790 if (groupContext
.getGroupV2().isPresent()) {
791 handleGroupV2Context(groupContext
.getGroupV2().get());
795 final var selfAddress
= isSync ? source
: destination
;
796 final var conversationPartnerAddress
= isSync ? destination
: source
;
797 if (conversationPartnerAddress
!= null && message
.isEndSession()) {
798 account
.getAccountData(selfAddress
.serviceId())
800 .deleteAllSessions(conversationPartnerAddress
.serviceId());
802 if (message
.isExpirationUpdate() || message
.getBody().isPresent()) {
803 if (message
.getGroupContext().isPresent()) {
804 final var groupContext
= message
.getGroupContext().get();
805 if (groupContext
.getGroupV1().isPresent()) {
806 var groupInfo
= groupContext
.getGroupV1().get();
807 var group
= account
.getGroupStore().getOrCreateGroupV1(GroupId
.v1(groupInfo
.getGroupId()));
809 if (group
.messageExpirationTime
!= message
.getExpiresInSeconds()) {
810 group
.messageExpirationTime
= message
.getExpiresInSeconds();
811 account
.getGroupStore().updateGroup(group
);
814 } else if (groupContext
.getGroupV2().isPresent()) {
815 // disappearing message timer already stored in the DecryptedGroup
817 } else if (conversationPartnerAddress
!= null) {
818 context
.getContactHelper()
819 .setExpirationTimer(conversationPartnerAddress
.recipientId(),
820 message
.getExpiresInSeconds(),
821 message
.getExpireTimerVersion());
824 if (!ignoreAttachments
) {
825 if (message
.getAttachments().isPresent()) {
826 for (var attachment
: message
.getAttachments().get()) {
827 context
.getAttachmentHelper().downloadAttachment(attachment
);
830 if (message
.getSharedContacts().isPresent()) {
831 for (var contact
: message
.getSharedContacts().get()) {
832 if (contact
.getAvatar().isPresent()) {
833 context
.getAttachmentHelper().downloadAttachment(contact
.getAvatar().get().getAttachment());
837 if (message
.getPreviews().isPresent()) {
838 final var previews
= message
.getPreviews().get();
839 for (var preview
: previews
) {
840 if (preview
.getImage().isPresent()) {
841 context
.getAttachmentHelper().downloadAttachment(preview
.getImage().get());
845 if (message
.getQuote().isPresent()) {
846 final var quote
= message
.getQuote().get();
848 if (quote
.getAttachments() != null) {
849 for (var quotedAttachment
: quote
.getAttachments()) {
850 final var thumbnail
= quotedAttachment
.getThumbnail();
851 if (thumbnail
!= null) {
852 context
.getAttachmentHelper().downloadAttachment(thumbnail
);
858 if (message
.getGiftBadge().isPresent()) {
859 handleIncomingGiftBadge(message
.getGiftBadge().get());
861 if (message
.getProfileKey().isPresent()) {
862 handleIncomingProfileKey(message
.getProfileKey().get(), source
.recipientId());
864 if (message
.getSticker().isPresent()) {
865 final var messageSticker
= message
.getSticker().get();
866 final var stickerPackId
= StickerPackId
.deserialize(messageSticker
.getPackId());
867 var sticker
= account
.getStickerStore().getStickerPack(stickerPackId
);
868 if (sticker
== null) {
869 sticker
= new StickerPack(stickerPackId
, messageSticker
.getPackKey());
870 account
.getStickerStore().addStickerPack(sticker
);
872 context
.getJobExecutor().enqueueJob(new RetrieveStickerPackJob(stickerPackId
, messageSticker
.getPackKey()));
877 private void handleIncomingGiftBadge(final SignalServiceDataMessage
.GiftBadge giftBadge
) {
881 private List
<HandleAction
> handleSignalServiceStoryMessage(
882 SignalServiceStoryMessage message
,
884 boolean ignoreAttachments
886 var actions
= new ArrayList
<HandleAction
>();
887 if (message
.getGroupContext().isPresent()) {
888 handleGroupV2Context(message
.getGroupContext().get());
891 if (!ignoreAttachments
) {
892 if (message
.getFileAttachment().isPresent()) {
893 context
.getAttachmentHelper().downloadAttachment(message
.getFileAttachment().get());
895 if (message
.getTextAttachment().isPresent()) {
896 final var textAttachment
= message
.getTextAttachment().get();
897 if (textAttachment
.getPreview().isPresent()) {
898 final var preview
= textAttachment
.getPreview().get();
899 if (preview
.getImage().isPresent()) {
900 context
.getAttachmentHelper().downloadAttachment(preview
.getImage().get());
906 if (message
.getProfileKey().isPresent()) {
907 handleIncomingProfileKey(message
.getProfileKey().get(), source
);
913 private void handleGroupV2Context(final SignalServiceGroupV2 groupContext
) {
914 final var groupMasterKey
= groupContext
.getMasterKey();
916 context
.getGroupHelper()
917 .getOrMigrateGroup(groupMasterKey
,
918 groupContext
.getRevision(),
919 groupContext
.hasSignedGroupChange() ? groupContext
.getSignedGroupChange() : null);
922 private void handleIncomingProfileKey(final byte[] profileKeyBytes
, final RecipientId source
) {
923 if (profileKeyBytes
.length
!= 32) {
924 logger
.debug("Received invalid profile key of length {}", profileKeyBytes
.length
);
927 final ProfileKey profileKey
;
929 profileKey
= new ProfileKey(profileKeyBytes
);
930 } catch (InvalidInputException e
) {
931 throw new AssertionError(e
);
933 if (account
.getSelfRecipientId().equals(source
)) {
934 this.account
.setProfileKey(profileKey
);
936 this.account
.getProfileStore().storeProfileKey(source
, profileKey
);
939 private SignalServiceAddress
getSenderAddress(SignalServiceEnvelope envelope
, SignalServiceContent content
) {
940 final var serviceId
= envelope
.getSourceServiceId().map(ServiceId
::parseOrNull
).orElse(null);
941 if (!envelope
.isUnidentifiedSender() && serviceId
!= null) {
942 return new SignalServiceAddress(serviceId
);
943 } else if (content
!= null) {
944 return content
.getSender();
950 private DeviceAddress
getSender(SignalServiceEnvelope envelope
, SignalServiceContent content
) {
951 final var serviceId
= envelope
.getSourceServiceId().map(ServiceId
::parseOrNull
).orElse(null);
952 if (!envelope
.isUnidentifiedSender() && serviceId
!= null) {
953 return new DeviceAddress(account
.getRecipientResolver().resolveRecipient(serviceId
),
955 envelope
.getSourceDevice());
957 return new DeviceAddress(account
.getRecipientResolver().resolveRecipient(content
.getSender()),
958 content
.getSender().getServiceId(),
959 content
.getSenderDevice());
963 private DeviceAddress
getDestination(SignalServiceEnvelope envelope
) {
964 final var destination
= envelope
.getDestinationServiceId();
965 if (destination
== null || destination
.isUnknown()) {
966 return new DeviceAddress(account
.getSelfRecipientId(), account
.getAci(), account
.getDeviceId());
968 return new DeviceAddress(account
.getRecipientResolver().resolveRecipient(destination
),
970 account
.getDeviceId());
973 private record DeviceAddress(RecipientId recipientId
, ServiceId serviceId
, int deviceId
) {}