]> nmode's Git Repositories - signal-cli/blob - src/main/java/org/asamk/signal/commands/TrustCommand.java
Merge profile commands to a single UpdateProfileCommand
[signal-cli] / src / main / java / org / asamk / signal / commands / TrustCommand.java
1 package org.asamk.signal.commands;
2
3 import net.sourceforge.argparse4j.impl.Arguments;
4 import net.sourceforge.argparse4j.inf.MutuallyExclusiveGroup;
5 import net.sourceforge.argparse4j.inf.Namespace;
6 import net.sourceforge.argparse4j.inf.Subparser;
7 import org.asamk.signal.manager.Manager;
8 import org.asamk.signal.util.Hex;
9
10 import java.util.Locale;
11
12 public class TrustCommand implements LocalCommand {
13
14 @Override
15 public void attachToSubparser(final Subparser subparser) {
16 subparser.addArgument("number")
17 .help("Specify the phone number, for which to set the trust.")
18 .required(true);
19 MutuallyExclusiveGroup mutTrust = subparser.addMutuallyExclusiveGroup();
20 mutTrust.addArgument("-a", "--trust-all-known-keys")
21 .help("Trust all known keys of this user, only use this for testing.")
22 .action(Arguments.storeTrue());
23 mutTrust.addArgument("-v", "--verified-fingerprint")
24 .help("Specify the fingerprint of the key, only use this option if you have verified the fingerprint.");
25 }
26
27 @Override
28 public int handleCommand(final Namespace ns, final Manager m) {
29 if (!m.isRegistered()) {
30 System.err.println("User is not registered.");
31 return 1;
32 }
33 String number = ns.getString("number");
34 if (ns.getBoolean("trust_all_known_keys")) {
35 boolean res = m.trustIdentityAllKeys(number);
36 if (!res) {
37 System.err.println("Failed to set the trust for this number, make sure the number is correct.");
38 return 1;
39 }
40 } else {
41 String fingerprint = ns.getString("verified_fingerprint");
42 if (fingerprint != null) {
43 fingerprint = fingerprint.replaceAll(" ", "");
44 if (fingerprint.length() == 66) {
45 byte[] fingerprintBytes;
46 try {
47 fingerprintBytes = Hex.toByteArray(fingerprint.toLowerCase(Locale.ROOT));
48 } catch (Exception e) {
49 System.err.println("Failed to parse the fingerprint, make sure the fingerprint is a correctly encoded hex string without additional characters.");
50 return 1;
51 }
52 boolean res = m.trustIdentityVerified(number, fingerprintBytes);
53 if (!res) {
54 System.err.println("Failed to set the trust for the fingerprint of this number, make sure the number and the fingerprint are correct.");
55 return 1;
56 }
57 } else if (fingerprint.length() == 60) {
58 boolean res = m.trustIdentityVerifiedSafetyNumber(number, fingerprint);
59 if (!res) {
60 System.err.println("Failed to set the trust for the safety number of this phone number, make sure the phone number and the safety number are correct.");
61 return 1;
62 }
63 } else {
64 System.err.println("Fingerprint has invalid format, either specify the old hex fingerprint or the new safety number");
65 return 1;
66 }
67 } else {
68 System.err.println("You need to specify the fingerprint you have verified with -v FINGERPRINT");
69 return 1;
70 }
71 }
72 return 0;
73 }
74 }