2 Copyright (C) 2015-2022 AsamK and contributors
4 This program is free software: you can redistribute it and/or modify
5 it under the terms of the GNU General Public License as published by
6 the Free Software Foundation, either version 3 of the License, or
7 (at your option) any later version.
9 This program is distributed in the hope that it will be useful,
10 but WITHOUT ANY WARRANTY; without even the implied warranty of
11 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 GNU General Public License for more details.
14 You should have received a copy of the GNU General Public License
15 along with this program. If not, see <http://www.gnu.org/licenses/>.
17 package org
.asamk
.signal
.manager
;
19 import org
.asamk
.signal
.manager
.api
.CaptchaRequiredException
;
20 import org
.asamk
.signal
.manager
.api
.IncorrectPinException
;
21 import org
.asamk
.signal
.manager
.api
.PinLockedException
;
22 import org
.asamk
.signal
.manager
.config
.ServiceConfig
;
23 import org
.asamk
.signal
.manager
.config
.ServiceEnvironmentConfig
;
24 import org
.asamk
.signal
.manager
.helper
.AccountFileUpdater
;
25 import org
.asamk
.signal
.manager
.helper
.PinHelper
;
26 import org
.asamk
.signal
.manager
.storage
.SignalAccount
;
27 import org
.asamk
.signal
.manager
.util
.NumberVerificationUtils
;
28 import org
.slf4j
.Logger
;
29 import org
.slf4j
.LoggerFactory
;
30 import org
.whispersystems
.signalservice
.api
.SignalServiceAccountManager
;
31 import org
.whispersystems
.signalservice
.api
.groupsv2
.ClientZkOperations
;
32 import org
.whispersystems
.signalservice
.api
.groupsv2
.GroupsV2Operations
;
33 import org
.whispersystems
.signalservice
.api
.push
.ACI
;
34 import org
.whispersystems
.signalservice
.api
.push
.SignalServiceAddress
;
35 import org
.whispersystems
.signalservice
.internal
.ServiceResponse
;
36 import org
.whispersystems
.signalservice
.internal
.push
.VerifyAccountResponse
;
37 import org
.whispersystems
.signalservice
.internal
.util
.DynamicCredentialsProvider
;
39 import java
.io
.IOException
;
40 import java
.util
.function
.Consumer
;
42 import static org
.asamk
.signal
.manager
.config
.ServiceConfig
.capabilities
;
44 class RegistrationManagerImpl
implements RegistrationManager
{
46 private final static Logger logger
= LoggerFactory
.getLogger(RegistrationManagerImpl
.class);
48 private SignalAccount account
;
49 private final PathConfig pathConfig
;
50 private final ServiceEnvironmentConfig serviceEnvironmentConfig
;
51 private final String userAgent
;
52 private final Consumer
<Manager
> newManagerListener
;
54 private final SignalServiceAccountManager accountManager
;
55 private final PinHelper pinHelper
;
56 private final AccountFileUpdater accountFileUpdater
;
58 RegistrationManagerImpl(
59 SignalAccount account
,
60 PathConfig pathConfig
,
61 ServiceEnvironmentConfig serviceEnvironmentConfig
,
63 Consumer
<Manager
> newManagerListener
,
64 AccountFileUpdater accountFileUpdater
66 this.account
= account
;
67 this.pathConfig
= pathConfig
;
68 this.accountFileUpdater
= accountFileUpdater
;
69 this.serviceEnvironmentConfig
= serviceEnvironmentConfig
;
70 this.userAgent
= userAgent
;
71 this.newManagerListener
= newManagerListener
;
73 GroupsV2Operations groupsV2Operations
;
75 groupsV2Operations
= new GroupsV2Operations(ClientZkOperations
.create(serviceEnvironmentConfig
.getSignalServiceConfiguration()));
76 } catch (Throwable ignored
) {
77 groupsV2Operations
= null;
79 this.accountManager
= new SignalServiceAccountManager(serviceEnvironmentConfig
.getSignalServiceConfiguration(),
80 new DynamicCredentialsProvider(
81 // Using empty UUID, because registering doesn't work otherwise
82 null, account
.getNumber(), account
.getPassword(), SignalServiceAddress
.DEFAULT_DEVICE_ID
),
85 ServiceConfig
.AUTOMATIC_NETWORK_RETRY
);
86 final var keyBackupService
= accountManager
.getKeyBackupService(ServiceConfig
.getIasKeyStore(),
87 serviceEnvironmentConfig
.getKeyBackupConfig().getEnclaveName(),
88 serviceEnvironmentConfig
.getKeyBackupConfig().getServiceId(),
89 serviceEnvironmentConfig
.getKeyBackupConfig().getMrenclave(),
91 this.pinHelper
= new PinHelper(keyBackupService
);
95 public void register(boolean voiceVerification
, String captcha
) throws IOException
, CaptchaRequiredException
{
96 if (account
.getAci() != null && attemptReactivateAccount()) {
100 NumberVerificationUtils
.requestVerificationCode(accountManager
, captcha
, voiceVerification
);
104 public void verifyAccount(
105 String verificationCode
, String pin
106 ) throws IOException
, PinLockedException
, IncorrectPinException
{
107 final var result
= NumberVerificationUtils
.verifyNumber(verificationCode
,
110 this::verifyAccountWithCode
);
111 final var response
= result
.first();
112 final var masterKey
= result
.second();
113 if (masterKey
== null) {
117 //accountManager.setGcmId(Optional.of(GoogleCloudMessaging.getInstance(this).register(REGISTRATION_ID)));
118 final var aci
= ACI
.parseOrNull(response
.getUuid());
119 account
.finishRegistration(aci
, masterKey
, pin
);
120 accountFileUpdater
.updateAccountIdentifiers(account
.getNumber(), aci
);
122 ManagerImpl m
= null;
124 m
= new ManagerImpl(account
, pathConfig
, accountFileUpdater
, serviceEnvironmentConfig
, userAgent
);
128 if (response
.isStorageCapable()) {
129 m
.retrieveRemoteStorage();
131 // Set an initial empty profile so user can be added to groups
133 m
.setProfile(null, null, null, null, null);
134 } catch (NoClassDefFoundError e
) {
135 logger
.warn("Failed to set default profile: {}", e
.getMessage());
138 if (newManagerListener
!= null) {
139 newManagerListener
.accept(m
);
149 private boolean attemptReactivateAccount() {
151 final var accountManager
= new SignalServiceAccountManager(serviceEnvironmentConfig
.getSignalServiceConfiguration(),
152 account
.getCredentialsProvider(),
155 ServiceConfig
.AUTOMATIC_NETWORK_RETRY
);
156 accountManager
.setAccountAttributes(null,
157 account
.getLocalRegistrationId(),
160 account
.getPinMasterKey() == null ?
null : account
.getPinMasterKey().deriveRegistrationLock(),
161 account
.getSelfUnidentifiedAccessKey(),
162 account
.isUnrestrictedUnidentifiedAccess(),
164 account
.isDiscoverableByPhoneNumber(),
165 account
.getEncryptedDeviceName());
166 account
.setRegistered(true);
167 logger
.info("Reactivated existing account, verify is not necessary.");
168 if (newManagerListener
!= null) {
169 final var m
= new ManagerImpl(account
,
172 serviceEnvironmentConfig
,
175 newManagerListener
.accept(m
);
178 } catch (IOException e
) {
179 logger
.debug("Failed to reactivate account");
184 private ServiceResponse
<VerifyAccountResponse
> verifyAccountWithCode(
185 final String verificationCode
, final String registrationLock
187 if (registrationLock
== null) {
188 return accountManager
.verifyAccount(verificationCode
,
189 account
.getLocalRegistrationId(),
191 account
.getSelfUnidentifiedAccessKey(),
192 account
.isUnrestrictedUnidentifiedAccess(),
193 ServiceConfig
.capabilities
,
194 account
.isDiscoverableByPhoneNumber());
196 return accountManager
.verifyAccountWithRegistrationLockPin(verificationCode
,
197 account
.getLocalRegistrationId(),
200 account
.getSelfUnidentifiedAccessKey(),
201 account
.isUnrestrictedUnidentifiedAccess(),
202 ServiceConfig
.capabilities
,
203 account
.isDiscoverableByPhoneNumber());
208 public void close() {
209 if (account
!= null) {