]> nmode's Git Repositories - signal-cli/blob - src/main/java/org/asamk/signal/commands/TrustCommand.java
Refactor register and verify
[signal-cli] / src / main / java / org / asamk / signal / commands / TrustCommand.java
1 package org.asamk.signal.commands;
2
3 import net.sourceforge.argparse4j.impl.Arguments;
4 import net.sourceforge.argparse4j.inf.MutuallyExclusiveGroup;
5 import net.sourceforge.argparse4j.inf.Namespace;
6 import net.sourceforge.argparse4j.inf.Subparser;
7
8 import org.asamk.signal.manager.Manager;
9 import org.asamk.signal.util.ErrorUtils;
10 import org.asamk.signal.util.Hex;
11 import org.whispersystems.signalservice.api.util.InvalidNumberException;
12
13 import java.util.Locale;
14
15 public class TrustCommand implements LocalCommand {
16
17 @Override
18 public void attachToSubparser(final Subparser subparser) {
19 subparser.addArgument("number").help("Specify the phone number, for which to set the trust.").required(true);
20 MutuallyExclusiveGroup mutTrust = subparser.addMutuallyExclusiveGroup();
21 mutTrust.addArgument("-a", "--trust-all-known-keys")
22 .help("Trust all known keys of this user, only use this for testing.")
23 .action(Arguments.storeTrue());
24 mutTrust.addArgument("-v", "--verified-safety-number", "--verified-fingerprint")
25 .help("Specify the safety number of the key, only use this option if you have verified the safety number.");
26 }
27
28 @Override
29 public int handleCommand(final Namespace ns, final Manager m) {
30 String number = ns.getString("number");
31 if (ns.getBoolean("trust_all_known_keys")) {
32 boolean res = m.trustIdentityAllKeys(number);
33 if (!res) {
34 System.err.println("Failed to set the trust for this number, make sure the number is correct.");
35 return 1;
36 }
37 } else {
38 String safetyNumber = ns.getString("verified_safety_number");
39 if (safetyNumber != null) {
40 safetyNumber = safetyNumber.replaceAll(" ", "");
41 if (safetyNumber.length() == 66) {
42 byte[] fingerprintBytes;
43 try {
44 fingerprintBytes = Hex.toByteArray(safetyNumber.toLowerCase(Locale.ROOT));
45 } catch (Exception e) {
46 System.err.println(
47 "Failed to parse the fingerprint, make sure the fingerprint is a correctly encoded hex string without additional characters.");
48 return 1;
49 }
50 boolean res;
51 try {
52 res = m.trustIdentityVerified(number, fingerprintBytes);
53 } catch (InvalidNumberException e) {
54 ErrorUtils.handleInvalidNumberException(e);
55 return 1;
56 }
57 if (!res) {
58 System.err.println(
59 "Failed to set the trust for the fingerprint of this number, make sure the number and the fingerprint are correct.");
60 return 1;
61 }
62 } else if (safetyNumber.length() == 60) {
63 boolean res;
64 try {
65 res = m.trustIdentityVerifiedSafetyNumber(number, safetyNumber);
66 } catch (InvalidNumberException e) {
67 ErrorUtils.handleInvalidNumberException(e);
68 return 1;
69 }
70 if (!res) {
71 System.err.println(
72 "Failed to set the trust for the safety number of this phone number, make sure the phone number and the safety number are correct.");
73 return 1;
74 }
75 } else {
76 System.err.println(
77 "Safety number has invalid format, either specify the old hex fingerprint or the new safety number");
78 return 1;
79 }
80 } else {
81 System.err.println(
82 "You need to specify the fingerprint/safety number you have verified with -v SAFETY_NUMBER");
83 return 1;
84 }
85 }
86 return 0;
87 }
88 }