import org.whispersystems.libsignal.InvalidKeyException;
import org.whispersystems.signalservice.api.crypto.UntrustedIdentityException;
import org.whispersystems.signalservice.api.messages.*;
-import org.whispersystems.signalservice.api.messages.multidevice.DeviceInfo;
-import org.whispersystems.signalservice.api.messages.multidevice.ReadMessage;
-import org.whispersystems.signalservice.api.messages.multidevice.SentTranscriptMessage;
-import org.whispersystems.signalservice.api.messages.multidevice.SignalServiceSyncMessage;
+import org.whispersystems.signalservice.api.messages.multidevice.*;
import org.whispersystems.signalservice.api.push.SignalServiceAddress;
import org.whispersystems.signalservice.api.push.exceptions.EncapsulatedExceptions;
import org.whispersystems.signalservice.api.push.exceptions.NetworkFailureException;
import java.security.Security;
import java.util.ArrayList;
import java.util.List;
+import java.util.Locale;
+import java.util.Map;
import java.util.concurrent.TimeoutException;
public class Main {
} catch (GroupNotFoundException e) {
handleGroupNotFoundException(e);
return 1;
+ } catch (NotAGroupMemberException e) {
+ handleNotAGroupMemberException(e);
+ return 1;
} catch (AttachmentInvalidException e) {
System.err.println("Failed to add attachment: " + e.getMessage());
System.err.println("Aborting sending.");
} catch (GroupNotFoundException e) {
handleGroupNotFoundException(e);
return 1;
+ } catch (NotAGroupMemberException e) {
+ handleNotAGroupMemberException(e);
+ return 1;
}
break;
} catch (GroupNotFoundException e) {
handleGroupNotFoundException(e);
return 1;
+ } catch (NotAGroupMemberException e) {
+ handleNotAGroupMemberException(e);
+ return 1;
} catch (EncapsulatedExceptions e) {
handleEncapsulatedExceptions(e);
return 3;
}
+ break;
+ case "listIdentities":
+ if (dBusConn != null) {
+ System.err.println("listIdentities is not yet implemented via dbus");
+ return 1;
+ }
+ if (!m.isRegistered()) {
+ System.err.println("User is not registered.");
+ return 1;
+ }
+ if (ns.get("number") == null) {
+ for (Map.Entry<String, List<JsonIdentityKeyStore.Identity>> keys : m.getIdentities().entrySet()) {
+ for (JsonIdentityKeyStore.Identity id : keys.getValue()) {
+ System.out.println(String.format("%s: %s Added: %s Fingerprint: %s", keys.getKey(), id.trustLevel, id.added, Hex.toStringCondensed(id.getFingerprint())));
+ }
+ }
+ } else {
+ String number = ns.getString("number");
+ for (JsonIdentityKeyStore.Identity id : m.getIdentities(number)) {
+ System.out.println(String.format("%s: %s Added: %s Fingerprint: %s", number, id.trustLevel, id.added, Hex.toStringCondensed(id.getFingerprint())));
+ }
+ }
+ break;
+ case "trust":
+ if (dBusConn != null) {
+ System.err.println("trust is not yet implemented via dbus");
+ return 1;
+ }
+ if (!m.isRegistered()) {
+ System.err.println("User is not registered.");
+ return 1;
+ }
+ String number = ns.getString("number");
+ if (ns.getBoolean("trust_all_known_keys")) {
+ boolean res = m.trustIdentityAllKeys(number);
+ if (!res) {
+ System.err.println("Failed to set the trust for this number, make sure the number is correct.");
+ return 1;
+ }
+ } else {
+ String fingerprint = ns.getString("verified_fingerprint");
+ if (fingerprint != null) {
+ byte[] fingerprintBytes;
+ try {
+ fingerprintBytes = Hex.toByteArray(fingerprint.replaceAll(" ", "").toLowerCase(Locale.ROOT));
+ } catch (Exception e) {
+ System.err.println("Failed to parse the fingerprint, make sure the fingerprint is a correctly encoded hex string without additional characters.");
+ return 1;
+ }
+ boolean res = m.trustIdentityVerified(number, fingerprintBytes);
+ if (!res) {
+ System.err.println("Failed to set the trust for the fingerprint of this number, make sure the number and the fingerprint are correct.");
+ return 1;
+ }
+ } else {
+ System.err.println("You need to specify the fingerprint you have verified with -v FINGERPRINT");
+ return 1;
+ }
+ }
break;
case "daemon":
if (dBusConn != null) {
System.err.println("Aborting sending.");
}
+ private static void handleNotAGroupMemberException(NotAGroupMemberException e) {
+ System.err.println("Failed to send to group: " + e.getMessage());
+ System.err.println("Update the group on another device to readd the user to this group.");
+ System.err.println("Aborting sending.");
+ }
+
+
private static void handleDBusExecutionException(DBusExecutionException e) {
System.err.println("Cannot connect to dbus: " + e.getMessage());
System.err.println("Aborting.");
.nargs("*")
.help("Specify one or more members to add to the group");
+ Subparser parserListIdentities = subparsers.addParser("listIdentities");
+ parserListIdentities.addArgument("-n", "--number")
+ .help("Only show identity keys for the given phone number.");
+
+ Subparser parserTrust = subparsers.addParser("trust");
+ parserTrust.addArgument("number")
+ .help("Specify the phone number, for which to set the trust.")
+ .required(true);
+ MutuallyExclusiveGroup mutTrust = parserTrust.addMutuallyExclusiveGroup();
+ mutTrust.addArgument("-a", "--trust-all-known-keys")
+ .help("Trust all known keys of this user, only use this for testing.")
+ .action(Arguments.storeTrue());
+ mutTrust.addArgument("-v", "--verified-fingerprint")
+ .help("Specify the fingerprint of the key, only use this option if you have verified the fingerprint.");
+
Subparser parserReceive = subparsers.addParser("receive");
parserReceive.addArgument("-t", "--timeout")
.type(int.class)
}
@Override
- public void handleMessage(SignalServiceEnvelope envelope, SignalServiceContent content) {
+ public void handleMessage(SignalServiceEnvelope envelope, SignalServiceContent content, Throwable exception) {
SignalServiceAddress source = envelope.getSourceAddress();
ContactInfo sourceContact = m.getContact(source.getNumber());
System.out.println(String.format("Envelope from: %s (device: %d)", (sourceContact == null ? "" : "“" + sourceContact.name + "” ") + source.getNumber(), envelope.getSourceDevice()));
if (envelope.isReceipt()) {
System.out.println("Got receipt.");
} else if (envelope.isSignalMessage() | envelope.isPreKeySignalMessage()) {
+ if (exception != null) {
+ if (exception instanceof org.whispersystems.libsignal.UntrustedIdentityException) {
+ org.whispersystems.libsignal.UntrustedIdentityException e = (org.whispersystems.libsignal.UntrustedIdentityException) exception;
+ System.out.println("The user’s key is untrusted, either the user has reinstalled Signal or a third party sent this message.");
+ System.out.println("Use 'signal-cli -u " + m.getUsername() + " listIdentities -n " + e.getName() + "', verify the key and run 'signal-cli -u " + m.getUsername() + " trust -v \"FINGER_PRINT\" " + e.getName() + "' to mark it as trusted");
+ System.out.println("If you don't care about security, use 'signal-cli -u " + m.getUsername() + " trust -a " + e.getName() + "' to trust it without verification");
+ } else {
+ System.out.println("Exception: " + exception.getMessage() + " (" + exception.getClass().getSimpleName() + ")");
+ }
+ }
if (content == null) {
System.out.println("Failed to decrypt message.");
} else {
to = "Unknown";
}
System.out.println("To: " + to + " , Message timestamp: " + sentTranscriptMessage.getTimestamp());
+ if (sentTranscriptMessage.getExpirationStartTimestamp() > 0) {
+ System.out.println("Expiration started at: " + sentTranscriptMessage.getExpirationStartTimestamp());
+ }
SignalServiceDataMessage message = sentTranscriptMessage.getMessage();
handleSignalServiceDataMessage(message);
}
+ if (syncMessage.getBlockedList().isPresent()) {
+ System.out.println("Received sync message with block list");
+ System.out.println("Blocked numbers:");
+ final BlockedListMessage blockedList = syncMessage.getBlockedList().get();
+ for (String number : blockedList.getNumbers()) {
+ System.out.println(" - " + number);
+ }
+ }
}
}
} else {
if (message.isEndSession()) {
System.out.println("Is end session");
}
+ if (message.isExpirationUpdate()) {
+ System.out.println("Is Expiration update: " + message.isExpirationUpdate());
+ }
+ if (message.getExpiresInSeconds() > 0) {
+ System.out.println("Expires in: " + message.getExpiresInSeconds() + " seconds");
+ }
if (message.getAttachments().isPresent()) {
System.out.println("Attachments: ");
}
@Override
- public void handleMessage(SignalServiceEnvelope envelope, SignalServiceContent content) {
- super.handleMessage(envelope, content);
+ public void handleMessage(SignalServiceEnvelope envelope, SignalServiceContent content, Throwable exception) {
+ super.handleMessage(envelope, content, exception);
if (!envelope.isReceipt() && content != null && content.getDataMessage().isPresent()) {
SignalServiceDataMessage message = content.getDataMessage().get();