mirror of
https://github.com/AsamK/signal-cli
synced 2025-08-29 18:40:39 +00:00
Refactor trust command implementation
This commit is contained in:
parent
2ae5297f7d
commit
106af6a801
5 changed files with 64 additions and 105 deletions
|
@ -11,6 +11,7 @@ import org.asamk.signal.manager.api.GroupInviteLinkUrl;
|
||||||
import org.asamk.signal.manager.api.GroupNotFoundException;
|
import org.asamk.signal.manager.api.GroupNotFoundException;
|
||||||
import org.asamk.signal.manager.api.GroupSendingNotAllowedException;
|
import org.asamk.signal.manager.api.GroupSendingNotAllowedException;
|
||||||
import org.asamk.signal.manager.api.Identity;
|
import org.asamk.signal.manager.api.Identity;
|
||||||
|
import org.asamk.signal.manager.api.IdentityVerificationCode;
|
||||||
import org.asamk.signal.manager.api.InactiveGroupLinkException;
|
import org.asamk.signal.manager.api.InactiveGroupLinkException;
|
||||||
import org.asamk.signal.manager.api.InvalidDeviceLinkException;
|
import org.asamk.signal.manager.api.InvalidDeviceLinkException;
|
||||||
import org.asamk.signal.manager.api.InvalidStickerException;
|
import org.asamk.signal.manager.api.InvalidStickerException;
|
||||||
|
@ -261,33 +262,12 @@ public interface Manager extends Closeable {
|
||||||
List<Identity> getIdentities(RecipientIdentifier.Single recipient);
|
List<Identity> getIdentities(RecipientIdentifier.Single recipient);
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Trust this the identity with this fingerprint
|
* Trust this the identity with this fingerprint/safetyNumber
|
||||||
*
|
*
|
||||||
* @param recipient account of the identity
|
* @param recipient account of the identity
|
||||||
* @param fingerprint Fingerprint
|
|
||||||
*/
|
*/
|
||||||
boolean trustIdentityVerified(
|
boolean trustIdentityVerified(
|
||||||
RecipientIdentifier.Single recipient, byte[] fingerprint
|
RecipientIdentifier.Single recipient, IdentityVerificationCode verificationCode
|
||||||
) throws UnregisteredRecipientException;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Trust this the identity with this safety number
|
|
||||||
*
|
|
||||||
* @param recipient account of the identity
|
|
||||||
* @param safetyNumber Safety number
|
|
||||||
*/
|
|
||||||
boolean trustIdentityVerifiedSafetyNumber(
|
|
||||||
RecipientIdentifier.Single recipient, String safetyNumber
|
|
||||||
) throws UnregisteredRecipientException;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Trust this the identity with this scannable safety number
|
|
||||||
*
|
|
||||||
* @param recipient account of the identity
|
|
||||||
* @param safetyNumber Scannable safety number
|
|
||||||
*/
|
|
||||||
boolean trustIdentityVerifiedSafetyNumber(
|
|
||||||
RecipientIdentifier.Single recipient, byte[] safetyNumber
|
|
||||||
) throws UnregisteredRecipientException;
|
) throws UnregisteredRecipientException;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
|
|
@ -0,0 +1,28 @@
|
||||||
|
package org.asamk.signal.manager.api;
|
||||||
|
|
||||||
|
import org.signal.libsignal.protocol.util.Hex;
|
||||||
|
|
||||||
|
import java.util.Base64;
|
||||||
|
import java.util.Locale;
|
||||||
|
|
||||||
|
public sealed interface IdentityVerificationCode {
|
||||||
|
|
||||||
|
record Fingerprint(byte[] fingerprint) implements IdentityVerificationCode {}
|
||||||
|
|
||||||
|
record SafetyNumber(String safetyNumber) implements IdentityVerificationCode {}
|
||||||
|
|
||||||
|
record ScannableSafetyNumber(byte[] safetyNumber) implements IdentityVerificationCode {}
|
||||||
|
|
||||||
|
static IdentityVerificationCode parse(String code) throws Exception {
|
||||||
|
code = code.replaceAll(" ", "");
|
||||||
|
if (code.length() == 66) {
|
||||||
|
final var fingerprintBytes = Hex.fromStringCondensed(code.toLowerCase(Locale.ROOT));
|
||||||
|
return new Fingerprint(fingerprintBytes);
|
||||||
|
} else if (code.length() == 60) {
|
||||||
|
return new SafetyNumber(code);
|
||||||
|
} else {
|
||||||
|
final var scannableSafetyNumber = Base64.getDecoder().decode(code);
|
||||||
|
return new ScannableSafetyNumber(scannableSafetyNumber);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
|
@ -28,6 +28,7 @@ import org.asamk.signal.manager.api.GroupInviteLinkUrl;
|
||||||
import org.asamk.signal.manager.api.GroupNotFoundException;
|
import org.asamk.signal.manager.api.GroupNotFoundException;
|
||||||
import org.asamk.signal.manager.api.GroupSendingNotAllowedException;
|
import org.asamk.signal.manager.api.GroupSendingNotAllowedException;
|
||||||
import org.asamk.signal.manager.api.Identity;
|
import org.asamk.signal.manager.api.Identity;
|
||||||
|
import org.asamk.signal.manager.api.IdentityVerificationCode;
|
||||||
import org.asamk.signal.manager.api.InactiveGroupLinkException;
|
import org.asamk.signal.manager.api.InactiveGroupLinkException;
|
||||||
import org.asamk.signal.manager.api.InvalidDeviceLinkException;
|
import org.asamk.signal.manager.api.InvalidDeviceLinkException;
|
||||||
import org.asamk.signal.manager.api.InvalidStickerException;
|
import org.asamk.signal.manager.api.InvalidStickerException;
|
||||||
|
@ -1166,25 +1167,20 @@ public class ManagerImpl implements Manager {
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public boolean trustIdentityVerified(
|
public boolean trustIdentityVerified(
|
||||||
RecipientIdentifier.Single recipient, byte[] fingerprint
|
RecipientIdentifier.Single recipient, IdentityVerificationCode verificationCode
|
||||||
) throws UnregisteredRecipientException {
|
) throws UnregisteredRecipientException {
|
||||||
return trustIdentity(recipient, r -> context.getIdentityHelper().trustIdentityVerified(r, fingerprint));
|
if (verificationCode instanceof IdentityVerificationCode.Fingerprint fingerprint) {
|
||||||
}
|
return trustIdentity(recipient,
|
||||||
|
r -> context.getIdentityHelper().trustIdentityVerified(r, fingerprint.fingerprint()));
|
||||||
@Override
|
} else if (verificationCode instanceof IdentityVerificationCode.SafetyNumber safetyNumber) {
|
||||||
public boolean trustIdentityVerifiedSafetyNumber(
|
return trustIdentity(recipient,
|
||||||
RecipientIdentifier.Single recipient, String safetyNumber
|
r -> context.getIdentityHelper().trustIdentityVerifiedSafetyNumber(r, safetyNumber.safetyNumber()));
|
||||||
) throws UnregisteredRecipientException {
|
} else if (verificationCode instanceof IdentityVerificationCode.ScannableSafetyNumber safetyNumber) {
|
||||||
return trustIdentity(recipient,
|
return trustIdentity(recipient,
|
||||||
r -> context.getIdentityHelper().trustIdentityVerifiedSafetyNumber(r, safetyNumber));
|
r -> context.getIdentityHelper().trustIdentityVerifiedSafetyNumber(r, safetyNumber.safetyNumber()));
|
||||||
}
|
} else {
|
||||||
|
throw new AssertionError("Invalid verification code type");
|
||||||
@Override
|
}
|
||||||
public boolean trustIdentityVerifiedSafetyNumber(
|
|
||||||
RecipientIdentifier.Single recipient, byte[] safetyNumber
|
|
||||||
) throws UnregisteredRecipientException {
|
|
||||||
return trustIdentity(recipient,
|
|
||||||
r -> context.getIdentityHelper().trustIdentityVerifiedSafetyNumber(r, safetyNumber));
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
|
|
@ -7,13 +7,10 @@ import net.sourceforge.argparse4j.inf.Subparser;
|
||||||
import org.asamk.signal.commands.exceptions.CommandException;
|
import org.asamk.signal.commands.exceptions.CommandException;
|
||||||
import org.asamk.signal.commands.exceptions.UserErrorException;
|
import org.asamk.signal.commands.exceptions.UserErrorException;
|
||||||
import org.asamk.signal.manager.Manager;
|
import org.asamk.signal.manager.Manager;
|
||||||
|
import org.asamk.signal.manager.api.IdentityVerificationCode;
|
||||||
import org.asamk.signal.manager.api.UnregisteredRecipientException;
|
import org.asamk.signal.manager.api.UnregisteredRecipientException;
|
||||||
import org.asamk.signal.output.OutputWriter;
|
import org.asamk.signal.output.OutputWriter;
|
||||||
import org.asamk.signal.util.CommandUtil;
|
import org.asamk.signal.util.CommandUtil;
|
||||||
import org.asamk.signal.util.Hex;
|
|
||||||
|
|
||||||
import java.util.Base64;
|
|
||||||
import java.util.Locale;
|
|
||||||
|
|
||||||
public class TrustCommand implements JsonRpcLocalCommand {
|
public class TrustCommand implements JsonRpcLocalCommand {
|
||||||
|
|
||||||
|
@ -57,54 +54,22 @@ public class TrustCommand implements JsonRpcLocalCommand {
|
||||||
"You need to specify the fingerprint/safety number you have verified with -v SAFETY_NUMBER");
|
"You need to specify the fingerprint/safety number you have verified with -v SAFETY_NUMBER");
|
||||||
}
|
}
|
||||||
|
|
||||||
safetyNumber = safetyNumber.replaceAll(" ", "");
|
final IdentityVerificationCode verificationCode;
|
||||||
if (safetyNumber.length() == 66) {
|
try {
|
||||||
byte[] fingerprintBytes;
|
verificationCode = IdentityVerificationCode.parse(safetyNumber);
|
||||||
try {
|
} catch (Exception e) {
|
||||||
fingerprintBytes = Hex.toByteArray(safetyNumber.toLowerCase(Locale.ROOT));
|
throw new UserErrorException(
|
||||||
} catch (Exception e) {
|
"Safety number has invalid format, either specify the old hex fingerprint or the new safety number");
|
||||||
throw new UserErrorException(
|
}
|
||||||
"Failed to parse the fingerprint, make sure the fingerprint is a correctly encoded hex string without additional characters.");
|
|
||||||
}
|
try {
|
||||||
boolean res;
|
final var res = m.trustIdentityVerified(recipient, verificationCode);
|
||||||
try {
|
|
||||||
res = m.trustIdentityVerified(recipient, fingerprintBytes);
|
|
||||||
} catch (UnregisteredRecipientException e) {
|
|
||||||
throw new UserErrorException("The user " + e.getSender().getIdentifier() + " is not registered.");
|
|
||||||
}
|
|
||||||
if (!res) {
|
if (!res) {
|
||||||
throw new UserErrorException(
|
throw new UserErrorException(
|
||||||
"Failed to set the trust for the fingerprint of this number, make sure the number and the fingerprint are correct.");
|
"Failed to set the trust for this number, make sure the number and the fingerprint/safety number are correct.");
|
||||||
}
|
|
||||||
} else if (safetyNumber.length() == 60) {
|
|
||||||
boolean res;
|
|
||||||
try {
|
|
||||||
res = m.trustIdentityVerifiedSafetyNumber(recipient, safetyNumber);
|
|
||||||
} catch (UnregisteredRecipientException e) {
|
|
||||||
throw new UserErrorException("The user " + e.getSender().getIdentifier() + " is not registered.");
|
|
||||||
}
|
|
||||||
if (!res) {
|
|
||||||
throw new UserErrorException(
|
|
||||||
"Failed to set the trust for the safety number of this phone number, make sure the phone number and the safety number are correct.");
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
final byte[] scannableSafetyNumber;
|
|
||||||
try {
|
|
||||||
scannableSafetyNumber = Base64.getDecoder().decode(safetyNumber);
|
|
||||||
} catch (IllegalArgumentException e) {
|
|
||||||
throw new UserErrorException(
|
|
||||||
"Safety number has invalid format, either specify the old hex fingerprint or the new safety number");
|
|
||||||
}
|
|
||||||
boolean res;
|
|
||||||
try {
|
|
||||||
res = m.trustIdentityVerifiedSafetyNumber(recipient, scannableSafetyNumber);
|
|
||||||
} catch (UnregisteredRecipientException e) {
|
|
||||||
throw new UserErrorException("The user " + e.getSender().getIdentifier() + " is not registered.");
|
|
||||||
}
|
|
||||||
if (!res) {
|
|
||||||
throw new UserErrorException(
|
|
||||||
"Failed to set the trust for the safety number of this phone number, make sure the phone number and the safety number are correct.");
|
|
||||||
}
|
}
|
||||||
|
} catch (UnregisteredRecipientException e) {
|
||||||
|
throw new UserErrorException("The user " + e.getSender().getIdentifier() + " is not registered.");
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -15,6 +15,7 @@ import org.asamk.signal.manager.api.GroupNotFoundException;
|
||||||
import org.asamk.signal.manager.api.GroupPermission;
|
import org.asamk.signal.manager.api.GroupPermission;
|
||||||
import org.asamk.signal.manager.api.GroupSendingNotAllowedException;
|
import org.asamk.signal.manager.api.GroupSendingNotAllowedException;
|
||||||
import org.asamk.signal.manager.api.Identity;
|
import org.asamk.signal.manager.api.Identity;
|
||||||
|
import org.asamk.signal.manager.api.IdentityVerificationCode;
|
||||||
import org.asamk.signal.manager.api.InactiveGroupLinkException;
|
import org.asamk.signal.manager.api.InactiveGroupLinkException;
|
||||||
import org.asamk.signal.manager.api.InvalidDeviceLinkException;
|
import org.asamk.signal.manager.api.InvalidDeviceLinkException;
|
||||||
import org.asamk.signal.manager.api.InvalidStickerException;
|
import org.asamk.signal.manager.api.InvalidStickerException;
|
||||||
|
@ -667,20 +668,9 @@ public class DbusManagerImpl implements Manager {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public boolean trustIdentityVerified(final RecipientIdentifier.Single recipient, final byte[] fingerprint) {
|
public boolean trustIdentityVerified(
|
||||||
throw new UnsupportedOperationException();
|
final RecipientIdentifier.Single recipient,
|
||||||
}
|
final IdentityVerificationCode verificationCode
|
||||||
|
|
||||||
@Override
|
|
||||||
public boolean trustIdentityVerifiedSafetyNumber(
|
|
||||||
final RecipientIdentifier.Single recipient, final String safetyNumber
|
|
||||||
) {
|
|
||||||
throw new UnsupportedOperationException();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public boolean trustIdentityVerifiedSafetyNumber(
|
|
||||||
final RecipientIdentifier.Single recipient, final byte[] safetyNumber
|
|
||||||
) {
|
) {
|
||||||
throw new UnsupportedOperationException();
|
throw new UnsupportedOperationException();
|
||||||
}
|
}
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue