.allMatch(identityFailure -> identityFailure)
&& results.values().stream().mapToInt(List::size).sum() > 0;
}
+
+ public boolean hasOnlyRateLimitFailure() {
+ return results.values()
+ .stream()
+ .flatMap(res -> res.stream().map(SendMessageResult::isRateLimitFailure))
+ .allMatch(r -> r) && results.values().stream().mapToInt(List::size).sum() > 0;
+ }
}
* *2*: Some unexpected error
* *3*: Server or IO error
* *4*: Sending failed due to untrusted key
+* *5*: Server rate limiting error
== Files
import org.asamk.signal.commands.exceptions.CommandException;
import org.asamk.signal.commands.exceptions.IOErrorException;
+import org.asamk.signal.commands.exceptions.RateLimitErrorException;
import org.asamk.signal.commands.exceptions.UnexpectedErrorException;
import org.asamk.signal.commands.exceptions.UntrustedKeyErrorException;
import org.asamk.signal.commands.exceptions.UserErrorException;
return 3;
} else if (e instanceof UntrustedKeyErrorException) {
return 4;
+ } else if (e instanceof RateLimitErrorException) {
+ return 5;
} else {
return 2;
}
import org.asamk.signal.OutputType;
import org.asamk.signal.commands.exceptions.CommandException;
import org.asamk.signal.commands.exceptions.IOErrorException;
+import org.asamk.signal.commands.exceptions.RateLimitErrorException;
import org.asamk.signal.commands.exceptions.UserErrorException;
import org.asamk.signal.manager.RegistrationManager;
import org.asamk.signal.manager.api.CaptchaRequiredException;
private void register(
final RegistrationManager m, final boolean voiceVerification, final String captcha
- ) throws UserErrorException, IOErrorException {
+ ) throws CommandException {
try {
m.register(voiceVerification, captcha);
} catch (RateLimitException e) {
if (e.getNextAttemptTimestamp() > 0) {
message += "\nNext attempt may be tried at " + DateUtils.formatTimestamp(e.getNextAttemptTimestamp());
}
- throw new UserErrorException(message);
+ throw new RateLimitErrorException(message, e);
} catch (CaptchaRequiredException e) {
String message;
if (captcha == null) {
--- /dev/null
+package org.asamk.signal.commands.exceptions;
+
+import org.asamk.signal.manager.api.RateLimitException;
+
+public final class RateLimitErrorException extends CommandException {
+
+ public RateLimitErrorException(final String message, final RateLimitException cause) {
+ super(message, cause);
+ }
+}
package org.asamk.signal.util;
import org.asamk.signal.commands.exceptions.CommandException;
+import org.asamk.signal.commands.exceptions.RateLimitErrorException;
import org.asamk.signal.commands.exceptions.UntrustedKeyErrorException;
import org.asamk.signal.commands.exceptions.UserErrorException;
import org.asamk.signal.json.JsonSendMessageResult;
import org.asamk.signal.manager.api.ProofRequiredException;
+import org.asamk.signal.manager.api.RateLimitException;
import org.asamk.signal.manager.api.RecipientIdentifier;
import org.asamk.signal.manager.api.SendGroupMessageResults;
import org.asamk.signal.manager.api.SendMessageResult;
if (!sendMessageResults.hasSuccess()) {
if (sendMessageResults.hasOnlyUntrustedIdentity()) {
throw new UntrustedKeyErrorException("Failed to send message due to untrusted identities");
+ } else if (sendMessageResults.hasOnlyRateLimitFailure()) {
+ throw new RateLimitErrorException("Failed to send message due to rate limiting",
+ new RateLimitException(0));
} else {
throw new UserErrorException("Failed to send message");
}
}
public static void printSendMessageResultErrors(PlainTextWriter writer, List<String> errors) {
- if (errors.size() == 0) {
+ if (errors.isEmpty()) {
return;
}
writer.println("Failed to send (some) messages:");