]> nmode's Git Repositories - signal-cli/blob - lib/src/main/java/org/asamk/signal/manager/config/ServiceConfig.java
Catch ProofRequiredException from getPreKeys request and wrap in SendMessageResult
[signal-cli] / lib / src / main / java / org / asamk / signal / manager / config / ServiceConfig.java
1 package org.asamk.signal.manager.config;
2
3 import org.signal.zkgroup.internal.Native;
4 import org.slf4j.Logger;
5 import org.slf4j.LoggerFactory;
6 import org.whispersystems.signalservice.api.account.AccountAttributes;
7 import org.whispersystems.signalservice.api.push.TrustStore;
8
9 import java.io.IOException;
10 import java.security.KeyStore;
11 import java.security.KeyStoreException;
12 import java.security.NoSuchAlgorithmException;
13 import java.security.cert.CertificateException;
14 import java.util.List;
15
16 import okhttp3.Interceptor;
17
18 public class ServiceConfig {
19
20 private final static Logger logger = LoggerFactory.getLogger(ServiceConfig.class);
21
22 public final static int PREKEY_MINIMUM_COUNT = 20;
23 public final static int PREKEY_BATCH_SIZE = 100;
24 public final static int MAX_ATTACHMENT_SIZE = 150 * 1024 * 1024;
25 public final static long MAX_ENVELOPE_SIZE = 0;
26 public final static long AVATAR_DOWNLOAD_FAILSAFE_MAX_SIZE = 10 * 1024 * 1024;
27 public final static boolean AUTOMATIC_NETWORK_RETRY = true;
28
29 private final static KeyStore iasKeyStore;
30
31 public static final AccountAttributes.Capabilities capabilities;
32
33 static {
34 boolean zkGroupAvailable;
35 try {
36 Native.serverPublicParamsCheckValidContentsJNI(new byte[]{});
37 zkGroupAvailable = true;
38 } catch (Throwable e) {
39 logger.warn("Failed to call libzkgroup: {}", e.getMessage());
40 zkGroupAvailable = false;
41 }
42 capabilities = new AccountAttributes.Capabilities(false, zkGroupAvailable, false, zkGroupAvailable, true, true);
43
44 try {
45 TrustStore contactTrustStore = new IasTrustStore();
46
47 var keyStore = KeyStore.getInstance("BKS");
48 keyStore.load(contactTrustStore.getKeyStoreInputStream(),
49 contactTrustStore.getKeyStorePassword().toCharArray());
50
51 iasKeyStore = keyStore;
52 } catch (KeyStoreException | CertificateException | IOException | NoSuchAlgorithmException e) {
53 throw new AssertionError(e);
54 }
55 }
56
57 public static boolean isSignalClientAvailable() {
58 try {
59 org.signal.client.internal.Native.DeviceTransfer_GeneratePrivateKey();
60 return true;
61 } catch (UnsatisfiedLinkError e) {
62 logger.warn("Failed to call libsignal-client: {}", e.getMessage());
63 return false;
64 }
65 }
66
67 public static AccountAttributes.Capabilities getCapabilities() {
68 return capabilities;
69 }
70
71 public static KeyStore getIasKeyStore() {
72 return iasKeyStore;
73 }
74
75 public static ServiceEnvironmentConfig getServiceEnvironmentConfig(
76 ServiceEnvironment serviceEnvironment, String userAgent
77 ) {
78 final Interceptor userAgentInterceptor = chain -> chain.proceed(chain.request()
79 .newBuilder()
80 .header("User-Agent", userAgent)
81 .build());
82
83 final var interceptors = List.of(userAgentInterceptor);
84
85 switch (serviceEnvironment) {
86 case LIVE:
87 return new ServiceEnvironmentConfig(LiveConfig.createDefaultServiceConfiguration(interceptors),
88 LiveConfig.getUnidentifiedSenderTrustRoot(),
89 LiveConfig.createKeyBackupConfig(),
90 LiveConfig.getCdsMrenclave());
91 case SANDBOX:
92 return new ServiceEnvironmentConfig(SandboxConfig.createDefaultServiceConfiguration(interceptors),
93 SandboxConfig.getUnidentifiedSenderTrustRoot(),
94 SandboxConfig.createKeyBackupConfig(),
95 SandboxConfig.getCdsMrenclave());
96 default:
97 throw new IllegalArgumentException("Unsupported environment");
98 }
99 }
100 }