]> nmode's Git Repositories - signal-cli/blob - src/main/java/org/asamk/signal/commands/TrustCommand.java
Use PlainTextWriter for all cli stdout output
[signal-cli] / src / main / java / org / asamk / signal / commands / TrustCommand.java
1 package org.asamk.signal.commands;
2
3 import net.sourceforge.argparse4j.impl.Arguments;
4 import net.sourceforge.argparse4j.inf.Namespace;
5 import net.sourceforge.argparse4j.inf.Subparser;
6
7 import org.asamk.signal.manager.Manager;
8 import org.asamk.signal.util.ErrorUtils;
9 import org.asamk.signal.util.Hex;
10 import org.whispersystems.signalservice.api.util.InvalidNumberException;
11
12 import java.util.Locale;
13
14 public class TrustCommand implements LocalCommand {
15
16 @Override
17 public void attachToSubparser(final Subparser subparser) {
18 subparser.addArgument("number").help("Specify the phone number, for which to set the trust.").required(true);
19 var mutTrust = subparser.addMutuallyExclusiveGroup();
20 mutTrust.addArgument("-a", "--trust-all-known-keys")
21 .help("Trust all known keys of this user, only use this for testing.")
22 .action(Arguments.storeTrue());
23 mutTrust.addArgument("-v", "--verified-safety-number", "--verified-fingerprint")
24 .help("Specify the safety number of the key, only use this option if you have verified the safety number.");
25 }
26
27 @Override
28 public int handleCommand(final Namespace ns, final Manager m) {
29 var number = ns.getString("number");
30 if (ns.getBoolean("trust_all_known_keys")) {
31 var res = m.trustIdentityAllKeys(number);
32 if (!res) {
33 System.err.println("Failed to set the trust for this number, make sure the number is correct.");
34 return 1;
35 }
36 } else {
37 var safetyNumber = ns.getString("verified_safety_number");
38 if (safetyNumber != null) {
39 safetyNumber = safetyNumber.replaceAll(" ", "");
40 if (safetyNumber.length() == 66) {
41 byte[] fingerprintBytes;
42 try {
43 fingerprintBytes = Hex.toByteArray(safetyNumber.toLowerCase(Locale.ROOT));
44 } catch (Exception e) {
45 System.err.println(
46 "Failed to parse the fingerprint, make sure the fingerprint is a correctly encoded hex string without additional characters.");
47 return 1;
48 }
49 boolean res;
50 try {
51 res = m.trustIdentityVerified(number, fingerprintBytes);
52 } catch (InvalidNumberException e) {
53 ErrorUtils.handleInvalidNumberException(e);
54 return 1;
55 }
56 if (!res) {
57 System.err.println(
58 "Failed to set the trust for the fingerprint of this number, make sure the number and the fingerprint are correct.");
59 return 1;
60 }
61 } else if (safetyNumber.length() == 60) {
62 boolean res;
63 try {
64 res = m.trustIdentityVerifiedSafetyNumber(number, safetyNumber);
65 } catch (InvalidNumberException e) {
66 ErrorUtils.handleInvalidNumberException(e);
67 return 1;
68 }
69 if (!res) {
70 System.err.println(
71 "Failed to set the trust for the safety number of this phone number, make sure the phone number and the safety number are correct.");
72 return 1;
73 }
74 } else {
75 System.err.println(
76 "Safety number has invalid format, either specify the old hex fingerprint or the new safety number");
77 return 1;
78 }
79 } else {
80 System.err.println(
81 "You need to specify the fingerprint/safety number you have verified with -v SAFETY_NUMBER");
82 return 1;
83 }
84 }
85 return 0;
86 }
87 }