org.whispersystems.signalservice.api.groupsv2.GroupsV2Operations Maven / Gradle / Ivy
Show all versions of signal-service-java Show documentation
package org.whispersystems.signalservice.api.groupsv2;
import org.signal.libsignal.protocol.logging.Log;
import org.signal.libsignal.zkgroup.InvalidInputException;
import org.signal.libsignal.zkgroup.NotarySignature;
import org.signal.libsignal.zkgroup.ServerPublicParams;
import org.signal.libsignal.zkgroup.VerificationFailedException;
import org.signal.libsignal.zkgroup.auth.ClientZkAuthOperations;
import org.signal.libsignal.zkgroup.groups.ClientZkGroupCipher;
import org.signal.libsignal.zkgroup.groups.GroupSecretParams;
import org.signal.libsignal.zkgroup.groups.ProfileKeyCiphertext;
import org.signal.libsignal.zkgroup.groups.UuidCiphertext;
import org.signal.libsignal.zkgroup.profiles.ClientZkProfileOperations;
import org.signal.libsignal.zkgroup.profiles.ExpiringProfileKeyCredential;
import org.signal.libsignal.zkgroup.profiles.ProfileKey;
import org.signal.libsignal.zkgroup.profiles.ProfileKeyCredentialPresentation;
import org.signal.storageservice.protos.groups.AccessControl;
import org.signal.storageservice.protos.groups.BannedMember;
import org.signal.storageservice.protos.groups.Group;
import org.signal.storageservice.protos.groups.GroupAttributeBlob;
import org.signal.storageservice.protos.groups.GroupChange;
import org.signal.storageservice.protos.groups.GroupJoinInfo;
import org.signal.storageservice.protos.groups.Member;
import org.signal.storageservice.protos.groups.PendingMember;
import org.signal.storageservice.protos.groups.RequestingMember;
import org.signal.storageservice.protos.groups.local.DecryptedApproveMember;
import org.signal.storageservice.protos.groups.local.DecryptedBannedMember;
import org.signal.storageservice.protos.groups.local.DecryptedGroup;
import org.signal.storageservice.protos.groups.local.DecryptedGroupChange;
import org.signal.storageservice.protos.groups.local.DecryptedGroupJoinInfo;
import org.signal.storageservice.protos.groups.local.DecryptedMember;
import org.signal.storageservice.protos.groups.local.DecryptedModifyMemberRole;
import org.signal.storageservice.protos.groups.local.DecryptedPendingMember;
import org.signal.storageservice.protos.groups.local.DecryptedPendingMemberRemoval;
import org.signal.storageservice.protos.groups.local.DecryptedRequestingMember;
import org.signal.storageservice.protos.groups.local.DecryptedString;
import org.signal.storageservice.protos.groups.local.DecryptedTimer;
import org.signal.storageservice.protos.groups.local.EnabledState;
import org.whispersystems.signalservice.api.push.ServiceId;
import org.whispersystems.signalservice.api.push.ServiceId.ACI;
import org.whispersystems.signalservice.api.push.ServiceId.PNI;
import org.whispersystems.signalservice.api.util.UuidUtil;
import java.io.IOException;
import java.security.SecureRandom;
import java.util.ArrayList;
import java.util.Collections;
import java.util.Comparator;
import java.util.List;
import java.util.Locale;
import java.util.Optional;
import java.util.Set;
import java.util.UUID;
import java.util.stream.Collectors;
import okio.ByteString;
/**
* Contains operations to create, modify and validate groups and group changes.
*/
public final class GroupsV2Operations {
private static final String TAG = GroupsV2Operations.class.getSimpleName();
/** Used for undecryptable pending invites */
public static final UUID UNKNOWN_UUID = UuidUtil.UNKNOWN_UUID;
/** Highest change epoch this class knows now to decrypt */
public static final int HIGHEST_KNOWN_EPOCH = 5;
private final ServerPublicParams serverPublicParams;
private final ClientZkProfileOperations clientZkProfileOperations;
private final ClientZkAuthOperations clientZkAuthOperations;
private final int maxGroupSize;
private final SecureRandom random;
public GroupsV2Operations(ClientZkOperations clientZkOperations, int maxGroupSize) {
this.serverPublicParams = clientZkOperations.getServerPublicParams();
this.clientZkProfileOperations = clientZkOperations.getProfileOperations();
this.clientZkAuthOperations = clientZkOperations.getAuthOperations();
this.maxGroupSize = maxGroupSize;
this.random = new SecureRandom();
}
/**
* Creates a new group with the title and avatar.
*
* @param self You will be member 0 and the only admin.
* @param members Members must not contain self. Members will be non-admin members of the group.
*/
public NewGroup createNewGroup(final GroupSecretParams groupSecretParams,
final String title,
final Optional avatar,
final GroupCandidate self,
final Set members,
final Member.Role memberRole,
final int disappearingMessageTimerSeconds)
{
if (members.contains(self)) {
throw new IllegalArgumentException("Members must not contain self");
}
final GroupOperations groupOperations = forGroup(groupSecretParams);
Group.Builder group = new Group.Builder()
.revision(0)
.publicKey(ByteString.of(groupSecretParams.getPublicParams().serialize()))
.title(groupOperations.encryptTitle(title))
.disappearingMessagesTimer(groupOperations.encryptTimer(disappearingMessageTimerSeconds))
.accessControl(new AccessControl.Builder()
.attributes(AccessControl.AccessRequired.MEMBER)
.members(AccessControl.AccessRequired.MEMBER)
.build());
List groupMembers = new ArrayList<>();
List groupPendingMembers = new ArrayList<>();
groupMembers.add(groupOperations.member(self.requireExpiringProfileKeyCredential(), Member.Role.ADMINISTRATOR).build());
for (GroupCandidate credential : members) {
ExpiringProfileKeyCredential expiringProfileKeyCredential = credential.getExpiringProfileKeyCredential().orElse(null);
if (expiringProfileKeyCredential != null) {
groupMembers.add(groupOperations.member(expiringProfileKeyCredential, memberRole).build());
} else {
groupPendingMembers.add(groupOperations.invitee(credential.getServiceId(), memberRole).build());
}
}
group.members(groupMembers)
.pendingMembers(groupPendingMembers);
return new NewGroup(groupSecretParams, group.build(), avatar);
}
public GroupOperations forGroup(final GroupSecretParams groupSecretParams) {
return new GroupOperations(groupSecretParams);
}
public ClientZkProfileOperations getProfileOperations() {
return clientZkProfileOperations;
}
public ClientZkAuthOperations getAuthOperations() {
return clientZkAuthOperations;
}
/**
* Operations on a single group.
*/
public final class GroupOperations {
private final GroupSecretParams groupSecretParams;
private final ClientZkGroupCipher clientZkGroupCipher;
private GroupOperations(GroupSecretParams groupSecretParams) {
this.groupSecretParams = groupSecretParams;
this.clientZkGroupCipher = new ClientZkGroupCipher(groupSecretParams);
}
public GroupChange.Actions.Builder createModifyGroupTitle(final String title) {
return new GroupChange.Actions.Builder().modifyTitle(new GroupChange.Actions.ModifyTitleAction.Builder().title(encryptTitle(title)).build());
}
public GroupChange.Actions.ModifyDescriptionAction.Builder createModifyGroupDescriptionAction(final String description) {
return new GroupChange.Actions.ModifyDescriptionAction.Builder().description(encryptDescription(description));
}
public GroupChange.Actions.Builder createModifyGroupDescription(final String description) {
return new GroupChange.Actions.Builder().modifyDescription(createModifyGroupDescriptionAction(description).build());
}
public GroupChange.Actions.Builder createModifyGroupMembershipChange(Set membersToAdd, Set bannedMembers, ACI selfAci) {
final GroupOperations groupOperations = forGroup(groupSecretParams);
Set membersToUnban = membersToAdd.stream().map(GroupCandidate::getServiceId).filter(bannedMembers::contains).collect(Collectors.toSet());
GroupChange.Actions.Builder actions = membersToUnban.isEmpty() ? new GroupChange.Actions.Builder()
: createUnbanServiceIdsChange(membersToUnban);
List addGroupMembers = new ArrayList<>(actions.addMembers);
List addGroupPendingMembers = new ArrayList<>(actions.addPendingMembers);
for (GroupCandidate credential : membersToAdd) {
Member.Role newMemberRole = Member.Role.DEFAULT;
ExpiringProfileKeyCredential expiringProfileKeyCredential = credential.getExpiringProfileKeyCredential().orElse(null);
if (expiringProfileKeyCredential != null) {
addGroupMembers.add(new GroupChange.Actions.AddMemberAction.Builder().added(groupOperations.member(expiringProfileKeyCredential, newMemberRole).build()).build());
} else {
addGroupPendingMembers.add(new GroupChange.Actions.AddPendingMemberAction.Builder().added(groupOperations.invitee(credential.getServiceId(), newMemberRole)
.addedByUserId(encryptServiceId(selfAci))
.build())
.build());
}
}
return actions.addMembers(addGroupMembers)
.addPendingMembers(addGroupPendingMembers);
}
public GroupChange.Actions.Builder createGroupJoinRequest(ExpiringProfileKeyCredential expiringProfileKeyCredential) {
GroupOperations groupOperations = forGroup(groupSecretParams);
GroupChange.Actions.Builder actions = new GroupChange.Actions.Builder();
actions.addRequestingMembers = Collections.singletonList(new GroupChange.Actions.AddRequestingMemberAction.Builder().added(groupOperations.requestingMember(expiringProfileKeyCredential).build()).build());
return actions;
}
public GroupChange.Actions.Builder createGroupJoinDirect(ExpiringProfileKeyCredential expiringProfileKeyCredential) {
GroupOperations groupOperations = forGroup(groupSecretParams);
GroupChange.Actions.Builder actions = new GroupChange.Actions.Builder();
actions.addMembers = Collections.singletonList(new GroupChange.Actions.AddMemberAction.Builder().added(groupOperations.member(expiringProfileKeyCredential, Member.Role.DEFAULT).build()).build());
return actions;
}
public GroupChange.Actions.Builder createRefuseGroupJoinRequest(Set extends ServiceId> requestsToRemove, boolean alsoBan, List bannedMembers) {
GroupChange.Actions.Builder actions = alsoBan ? createBanServiceIdsChange(requestsToRemove, false, bannedMembers)
: new GroupChange.Actions.Builder();
List deleteRequestingMemberActions = new ArrayList<>(actions.deleteRequestingMembers);
for (ServiceId serviceId : requestsToRemove) {
if (serviceId instanceof ACI) {
deleteRequestingMemberActions.add(new GroupChange.Actions.DeleteRequestingMemberAction.Builder().deletedUserId(encryptServiceId(serviceId)).build());
}
}
return actions.deleteRequestingMembers(deleteRequestingMemberActions);
}
public GroupChange.Actions.Builder createApproveGroupJoinRequest(Set requestsToApprove) {
GroupChange.Actions.Builder actions = new GroupChange.Actions.Builder();
actions.promoteRequestingMembers = requestsToApprove.stream()
.map(uuid -> new GroupChange.Actions.PromoteRequestingMemberAction.Builder().role(Member.Role.DEFAULT)
.userId(encryptServiceId(ACI.from(uuid)))
.build())
.collect(Collectors.toList());
return actions;
}
public GroupChange.Actions.Builder createRemoveMembersChange(final Set membersToRemove, boolean alsoBan, List bannedMembers) {
GroupChange.Actions.Builder actions = alsoBan ? createBanServiceIdsChange(membersToRemove, false, bannedMembers)
: new GroupChange.Actions.Builder();
List deleteMemberActions = new ArrayList<>(actions.deleteMembers);
for (ACI remove: membersToRemove) {
deleteMemberActions.add(new GroupChange.Actions.DeleteMemberAction.Builder().deletedUserId(encryptServiceId(remove)).build());
}
return actions.deleteMembers(deleteMemberActions);
}
public GroupChange.Actions.Builder createLeaveAndPromoteMembersToAdmin(ACI self, List membersToMakeAdmin) {
GroupChange.Actions.Builder actions = createRemoveMembersChange(Collections.singleton(self), false, Collections.emptyList());
List modifyMemberRoleActions = new ArrayList<>(actions.modifyMemberRoles);
for (UUID member : membersToMakeAdmin) {
modifyMemberRoleActions.add(new GroupChange.Actions.ModifyMemberRoleAction.Builder().userId(encryptServiceId(ACI.from(member))).role(Member.Role.ADMINISTRATOR).build());
}
return actions.modifyMemberRoles(modifyMemberRoleActions);
}
public GroupChange.Actions.Builder createModifyGroupTimerChange(int timerDurationSeconds) {
return new GroupChange.Actions.Builder()
.modifyDisappearingMessagesTimer(new GroupChange.Actions.ModifyDisappearingMessagesTimerAction.Builder().timer(encryptTimer(timerDurationSeconds)).build());
}
public GroupChange.Actions.Builder createUpdateProfileKeyCredentialChange(ExpiringProfileKeyCredential expiringProfileKeyCredential) {
ProfileKeyCredentialPresentation presentation = clientZkProfileOperations.createProfileKeyCredentialPresentation(random, groupSecretParams, expiringProfileKeyCredential);
return new GroupChange.Actions.Builder().modifyMemberProfileKeys(Collections.singletonList(
new GroupChange.Actions.ModifyMemberProfileKeyAction.Builder()
.presentation(ByteString.of(presentation.serialize()))
.build()
));
}
public GroupChange.Actions.Builder createAcceptInviteChange(ExpiringProfileKeyCredential credential) {
ProfileKeyCredentialPresentation presentation = clientZkProfileOperations.createProfileKeyCredentialPresentation(random, groupSecretParams, credential);
return new GroupChange.Actions.Builder().promotePendingMembers(Collections.singletonList(
new GroupChange.Actions.PromotePendingMemberAction.Builder()
.presentation(ByteString.of(presentation.serialize()))
.build()
));
}
public GroupChange.Actions.Builder createAcceptPniInviteChange(ExpiringProfileKeyCredential credential) {
ByteString presentation = ByteString.of(clientZkProfileOperations.createProfileKeyCredentialPresentation(random, groupSecretParams, credential).serialize());
return new GroupChange.Actions.Builder().promotePendingPniAciMembers(Collections.singletonList(
new GroupChange.Actions.PromotePendingPniAciMemberProfileKeyAction.Builder().presentation(presentation).build()
));
}
public GroupChange.Actions.Builder createRemoveInvitationChange(final Set uuidCipherTextsFromInvitesToRemove) {
GroupChange.Actions.Builder builder = new GroupChange.Actions.Builder();
builder.deletePendingMembers = uuidCipherTextsFromInvitesToRemove.stream()
.map(uuidCipherText -> new GroupChange.Actions.DeletePendingMemberAction.Builder().deletedUserId(ByteString.of(uuidCipherText.serialize()))
.build())
.collect(Collectors.toList());
return builder;
}
public GroupChange.Actions.Builder createModifyGroupLinkPasswordChange(byte[] groupLinkPassword) {
return new GroupChange.Actions.Builder().modifyInviteLinkPassword(
new GroupChange.Actions.ModifyInviteLinkPasswordAction.Builder().inviteLinkPassword(ByteString.of(groupLinkPassword)).build()
);
}
public GroupChange.Actions.Builder createModifyGroupLinkPasswordAndRightsChange(byte[] groupLinkPassword, AccessControl.AccessRequired newRights) {
GroupChange.Actions.Builder change = createModifyGroupLinkPasswordChange(groupLinkPassword);
return change.modifyAddFromInviteLinkAccess(new GroupChange.Actions.ModifyAddFromInviteLinkAccessControlAction.Builder().addFromInviteLinkAccess(newRights).build());
}
public GroupChange.Actions.Builder createChangeJoinByLinkRights(AccessControl.AccessRequired newRights) {
return new GroupChange.Actions.Builder().modifyAddFromInviteLinkAccess(new GroupChange.Actions.ModifyAddFromInviteLinkAccessControlAction.Builder().addFromInviteLinkAccess(newRights).build());
}
public GroupChange.Actions.Builder createChangeMembershipRights(AccessControl.AccessRequired newRights) {
return new GroupChange.Actions.Builder().modifyMemberAccess(
new GroupChange.Actions.ModifyMembersAccessControlAction.Builder().membersAccess(newRights).build()
);
}
public GroupChange.Actions.Builder createChangeAttributesRights(AccessControl.AccessRequired newRights) {
return new GroupChange.Actions.Builder().modifyAttributesAccess(
new GroupChange.Actions.ModifyAttributesAccessControlAction.Builder().attributesAccess(newRights).build()
);
}
public GroupChange.Actions.Builder createAnnouncementGroupChange(boolean isAnnouncementGroup) {
return new GroupChange.Actions.Builder().modifyAnnouncementsOnly(
new GroupChange.Actions.ModifyAnnouncementsOnlyAction.Builder().announcementsOnly(isAnnouncementGroup).build()
);
}
/** Note that this can only ban ACIs. */
public GroupChange.Actions.Builder createBanServiceIdsChange(Set extends ServiceId> banServiceIds, boolean rejectJoinRequest, List bannedMembersList) {
GroupChange.Actions.Builder builder = rejectJoinRequest ? createRefuseGroupJoinRequest(banServiceIds, false, Collections.emptyList())
: new GroupChange.Actions.Builder();
int spacesToFree = bannedMembersList.size() + banServiceIds.size() - maxGroupSize;
if (spacesToFree > 0) {
List unban = bannedMembersList.stream()
.sorted(Comparator.comparingLong(m -> m.timestamp))
.limit(spacesToFree)
.map(m -> m.serviceIdBytes)
.collect(Collectors.toList());
List deleteBannedMemberActions = new ArrayList<>(builder.deleteBannedMembers);
for (ByteString serviceIdBinary : unban) {
deleteBannedMemberActions.add(new GroupChange.Actions.DeleteBannedMemberAction.Builder().deletedUserId(encryptServiceId(ServiceId.parseOrThrow(serviceIdBinary.toByteArray()))).build());
}
builder.deleteBannedMembers(deleteBannedMemberActions);
}
List addBannedMemberActions = new ArrayList<>(builder.addBannedMembers);
for (ServiceId banServiceId : banServiceIds) {
addBannedMemberActions.add(new GroupChange.Actions.AddBannedMemberAction.Builder().added(new BannedMember.Builder().userId(encryptServiceId(banServiceId)).build()).build());
}
builder.addBannedMembers(addBannedMemberActions);
return builder;
}
public GroupChange.Actions.Builder createUnbanServiceIdsChange(Set serviceIds) {
GroupChange.Actions.Builder builder = new GroupChange.Actions.Builder();
builder.deleteBannedMembers = serviceIds.stream()
.map(serviceId -> new GroupChange.Actions.DeleteBannedMemberAction.Builder().deletedUserId(encryptServiceId(serviceId)).build())
.collect(Collectors.toList());
return builder;
}
public GroupChange.Actions.Builder replaceAddMembers(GroupChange.Actions.Builder change, List candidates) throws InvalidInputException {
if (change.addMembers.size() != candidates.size()) {
throw new InvalidInputException("Replacement candidates not same size as original add");
}
List addMemberActions = new ArrayList<>(change.addMembers);
for (int i = 0; i < addMemberActions.size(); i++) {
GroupChange.Actions.AddMemberAction original = addMemberActions.get(i);
GroupCandidate candidate = candidates.get(i);
ExpiringProfileKeyCredential expiringProfileKeyCredential = candidate.getExpiringProfileKeyCredential().orElse(null);
if (expiringProfileKeyCredential == null) {
throw new InvalidInputException("Replacement candidate missing credential");
}
addMemberActions.set(i, new GroupChange.Actions.AddMemberAction.Builder().added(member(expiringProfileKeyCredential, original.added.role).build()).build());
}
return change.addMembers(addMemberActions);
}
private Member.Builder member(ExpiringProfileKeyCredential credential, Member.Role role) {
ProfileKeyCredentialPresentation presentation = clientZkProfileOperations.createProfileKeyCredentialPresentation(new SecureRandom(), groupSecretParams, credential);
return new Member.Builder().role(role)
.presentation(ByteString.of(presentation.serialize()));
}
private RequestingMember.Builder requestingMember(ExpiringProfileKeyCredential credential) {
ProfileKeyCredentialPresentation presentation = clientZkProfileOperations.createProfileKeyCredentialPresentation(new SecureRandom(), groupSecretParams, credential);
return new RequestingMember.Builder().presentation(ByteString.of(presentation.serialize()));
}
public PendingMember.Builder invitee(ServiceId serviceId, Member.Role role) {
UuidCiphertext uuidCiphertext = clientZkGroupCipher.encrypt(serviceId.getLibSignalServiceId());
Member member = new Member.Builder().role(role)
.userId(ByteString.of(uuidCiphertext.serialize()))
.build();
return new PendingMember.Builder().member(member);
}
public DecryptedGroup decryptGroup(Group group)
throws VerificationFailedException, InvalidGroupStateException
{
List membersList = group.members;
List pendingMembersList = group.pendingMembers;
List requestingMembersList = group.requestingMembers;
List decryptedMembers = new ArrayList<>(membersList.size());
List decryptedPendingMembers = new ArrayList<>(pendingMembersList.size());
List decryptedRequestingMembers = new ArrayList<>(requestingMembersList.size());
List decryptedBannedMembers = new ArrayList<>(group.bannedMembers.size());
for (Member member : membersList) {
try {
decryptedMembers.add(decryptMember(member).build());
} catch (InvalidInputException e) {
throw new InvalidGroupStateException(e);
}
}
for (PendingMember member : pendingMembersList) {
decryptedPendingMembers.add(decryptMember(member));
}
for (RequestingMember member : requestingMembersList) {
decryptedRequestingMembers.add(decryptRequestingMember(member));
}
for (BannedMember member : group.bannedMembers) {
decryptedBannedMembers.add(new DecryptedBannedMember.Builder().serviceIdBytes(decryptServiceIdToBinary(member.userId)).timestamp(member.timestamp).build());
}
return new DecryptedGroup.Builder()
.title(decryptTitle(group.title))
.description(decryptDescription(group.description))
.isAnnouncementGroup(group.announcementsOnly ? EnabledState.ENABLED : EnabledState.DISABLED)
.avatar(group.avatar)
.accessControl(group.accessControl)
.revision(group.revision)
.members(decryptedMembers)
.pendingMembers(decryptedPendingMembers)
.requestingMembers(decryptedRequestingMembers)
.disappearingMessagesTimer(new DecryptedTimer.Builder().duration(decryptDisappearingMessagesTimer(group.disappearingMessagesTimer)).build())
.inviteLinkPassword(group.inviteLinkPassword)
.bannedMembers(decryptedBannedMembers)
.build();
}
/**
* @param verifySignature You might want to avoid verification if you already know it's correct, or you
* are not going to pass to other clients.
*
* Also, if you know it's version 0, do not verify because changes for version 0
* are not signed, but should be empty.
* @return {@link Optional#empty()} if the epoch for the change is higher that this code can decrypt.
*/
public Optional decryptChange(GroupChange groupChange, boolean verifySignature)
throws IOException, VerificationFailedException, InvalidGroupStateException
{
if (groupChange.changeEpoch > HIGHEST_KNOWN_EPOCH) {
Log.w(TAG, String.format(Locale.US, "Ignoring change from Epoch %d. Highest known Epoch is %d", groupChange.changeEpoch, HIGHEST_KNOWN_EPOCH));
return Optional.empty();
}
GroupChange.Actions actions = verifySignature ? getVerifiedActions(groupChange) : getActions(groupChange);
return Optional.of(decryptChange(actions));
}
public DecryptedGroupChange decryptChange(GroupChange.Actions actions)
throws VerificationFailedException, InvalidGroupStateException
{
return decryptChange(actions, null);
}
public DecryptedGroupChange decryptChange(GroupChange.Actions actions, ServiceId source)
throws VerificationFailedException, InvalidGroupStateException
{
DecryptedGroupChange.Builder builder = new DecryptedGroupChange.Builder();
// Field 1
if (source != null) {
builder.editorServiceIdBytes(source.toByteString());
} else {
builder.editorServiceIdBytes(decryptServiceIdToBinary(actions.sourceServiceId));
}
// Field 2
builder.revision(actions.revision);
// Field 3
List newMembers = new ArrayList<>(actions.addMembers.size());
for (GroupChange.Actions.AddMemberAction addMemberAction : actions.addMembers) {
try {
newMembers.add(decryptMember(addMemberAction.added).joinedAtRevision(actions.revision).build());
} catch (InvalidInputException e) {
throw new InvalidGroupStateException(e);
}
}
builder.newMembers(newMembers);
// Field 4
List deleteMembers = new ArrayList<>(actions.deleteMembers.size());
for (GroupChange.Actions.DeleteMemberAction deleteMemberAction : actions.deleteMembers) {
deleteMembers.add(decryptAciToBinary(deleteMemberAction.deletedUserId));
}
builder.deleteMembers(deleteMembers);
// Field 5
List modifyMemberRoles = new ArrayList<>(actions.modifyMemberRoles.size());
for (GroupChange.Actions.ModifyMemberRoleAction modifyMemberRoleAction : actions.modifyMemberRoles) {
modifyMemberRoles.add(new DecryptedModifyMemberRole.Builder().role(modifyMemberRoleAction.role)
.aciBytes(decryptAciToBinary(modifyMemberRoleAction.userId))
.build());
}
builder.modifyMemberRoles(modifyMemberRoles);
// Field 6
List modifiedProfileKeys = new ArrayList<>(actions.modifyMemberProfileKeys.size());
for (GroupChange.Actions.ModifyMemberProfileKeyAction modifyMemberProfileKeyAction : actions.modifyMemberProfileKeys) {
try {
ACI aci;
ProfileKey profileKey;
if (modifyMemberProfileKeyAction.user_id.size() == 0 || modifyMemberProfileKeyAction.profile_key.size() == 0) {
ProfileKeyCredentialPresentation presentation = new ProfileKeyCredentialPresentation(modifyMemberProfileKeyAction.presentation.toByteArray());
aci = decryptAci(ByteString.of(presentation.getUuidCiphertext().serialize()));
profileKey = decryptProfileKey(ByteString.of(presentation.getProfileKeyCiphertext().serialize()), aci);
} else {
aci = decryptAci(modifyMemberProfileKeyAction.user_id);
profileKey = decryptProfileKey(modifyMemberProfileKeyAction.profile_key, aci);
}
modifiedProfileKeys.add(new DecryptedMember.Builder()
.role(Member.Role.UNKNOWN)
.joinedAtRevision(-1)
.aciBytes(aci.toByteString())
.profileKey(ByteString.of(profileKey.serialize()))
.build());
} catch (InvalidInputException e) {
throw new InvalidGroupStateException(e);
}
}
builder.modifiedProfileKeys(modifiedProfileKeys);
// Field 7
List newPendingMembers = new ArrayList<>(actions.addPendingMembers.size());
for (GroupChange.Actions.AddPendingMemberAction addPendingMemberAction : actions.addPendingMembers) {
PendingMember added = addPendingMemberAction.added;
Member member = added.member;
ByteString serviceIdCipherText = member.userId;
ServiceId serviceId = decryptServiceIdOrUnknown(serviceIdCipherText);
newPendingMembers.add(new DecryptedPendingMember.Builder()
.serviceIdBytes(serviceId.toByteString())
.serviceIdCipherText(serviceIdCipherText)
.role(member.role)
.addedByAci(decryptAciToBinary(added.addedByUserId))
.timestamp(added.timestamp)
.build());
}
builder.newPendingMembers(newPendingMembers);
// Field 8
List deletePendingMembers = new ArrayList<>(actions.deletePendingMembers.size());
for (GroupChange.Actions.DeletePendingMemberAction deletePendingMemberAction : actions.deletePendingMembers) {
ByteString serviceIdCipherText = deletePendingMemberAction.deletedUserId;
ServiceId serviceId = decryptServiceIdOrUnknown(serviceIdCipherText);
deletePendingMembers.add(new DecryptedPendingMemberRemoval.Builder()
.serviceIdBytes(serviceId.toByteString())
.serviceIdCipherText(serviceIdCipherText)
.build());
}
builder.deletePendingMembers(deletePendingMembers);
// Field 9
List promotePendingMembers = new ArrayList<>(actions.promotePendingMembers.size());
for (GroupChange.Actions.PromotePendingMemberAction promotePendingMemberAction : actions.promotePendingMembers) {
try {
ACI aci;
ProfileKey profileKey;
if (promotePendingMemberAction.user_id.size() == 0 || promotePendingMemberAction.profile_key.size() == 0) {
ProfileKeyCredentialPresentation presentation = new ProfileKeyCredentialPresentation(promotePendingMemberAction.presentation.toByteArray());
aci = decryptAci(ByteString.of(presentation.getUuidCiphertext().serialize()));
profileKey = decryptProfileKey(ByteString.of(presentation.getProfileKeyCiphertext().serialize()), aci);
} else {
aci = decryptAci(promotePendingMemberAction.user_id);
profileKey = decryptProfileKey(promotePendingMemberAction.profile_key, aci);
}
promotePendingMembers.add(new DecryptedMember.Builder()
.joinedAtRevision(-1)
.role(Member.Role.DEFAULT)
.aciBytes(aci.toByteString())
.profileKey(ByteString.of(profileKey.serialize()))
.build());
} catch (InvalidInputException e) {
throw new InvalidGroupStateException(e);
}
}
builder.promotePendingMembers(promotePendingMembers);
// Field 10
if (actions.modifyTitle != null) {
builder.newTitle(new DecryptedString.Builder().value_(decryptTitle(actions.modifyTitle.title)).build());
}
// Field 11
if (actions.modifyAvatar != null) {
builder.newAvatar(new DecryptedString.Builder().value_(actions.modifyAvatar.avatar).build());
}
// Field 12
if (actions.modifyDisappearingMessagesTimer != null) {
int duration = decryptDisappearingMessagesTimer(actions.modifyDisappearingMessagesTimer.timer);
builder.newTimer(new DecryptedTimer.Builder().duration(duration).build());
}
// Field 13
if (actions.modifyAttributesAccess != null) {
builder.newAttributeAccess(actions.modifyAttributesAccess.attributesAccess);
}
// Field 14
if (actions.modifyMemberAccess != null) {
builder.newMemberAccess(actions.modifyMemberAccess.membersAccess);
}
// Field 15
if (actions.modifyAddFromInviteLinkAccess != null) {
builder.newInviteLinkAccess(actions.modifyAddFromInviteLinkAccess.addFromInviteLinkAccess);
}
// Field 16
List newRequestingMembers = new ArrayList<>(actions.addRequestingMembers.size());
for (GroupChange.Actions.AddRequestingMemberAction request : actions.addRequestingMembers) {
newRequestingMembers.add(decryptRequestingMember(request.added));
}
builder.newRequestingMembers(newRequestingMembers);
// Field 17
List deleteRequestingMembers = new ArrayList<>(actions.deleteRequestingMembers.size());
for (GroupChange.Actions.DeleteRequestingMemberAction delete : actions.deleteRequestingMembers) {
deleteRequestingMembers.add(decryptServiceIdToBinary(delete.deletedUserId));
}
builder.deleteRequestingMembers(deleteRequestingMembers);
// Field 18
List promoteRequestingMembers = new ArrayList<>(actions.promoteRequestingMembers.size());
for (GroupChange.Actions.PromoteRequestingMemberAction promote : actions.promoteRequestingMembers) {
promoteRequestingMembers.add(new DecryptedApproveMember.Builder().role(promote.role).aciBytes(decryptAciToBinary(promote.userId)).build());
}
builder.promoteRequestingMembers(promoteRequestingMembers);
// Field 19
if (actions.modifyInviteLinkPassword != null) {
builder.newInviteLinkPassword(actions.modifyInviteLinkPassword.inviteLinkPassword);
}
// Field 20
if (actions.modifyDescription != null) {
builder.newDescription(new DecryptedString.Builder().value_(decryptDescription(actions.modifyDescription.description)).build());
}
// Field 21
if (actions.modifyAnnouncementsOnly != null) {
builder.newIsAnnouncementGroup(actions.modifyAnnouncementsOnly.announcementsOnly ? EnabledState.ENABLED : EnabledState.DISABLED);
}
// Field 22
List newBannedMembers = new ArrayList<>(actions.addBannedMembers.size());
for (GroupChange.Actions.AddBannedMemberAction action : actions.addBannedMembers) {
newBannedMembers.add(new DecryptedBannedMember.Builder().serviceIdBytes(decryptServiceIdToBinary(action.added.userId)).timestamp(action.added.timestamp).build());
}
builder.newBannedMembers(newBannedMembers);
// Field 23
List deleteBannedMembers = new ArrayList<>(actions.deleteBannedMembers.size());
for (GroupChange.Actions.DeleteBannedMemberAction action : actions.deleteBannedMembers) {
deleteBannedMembers.add(new DecryptedBannedMember.Builder().serviceIdBytes(decryptServiceIdToBinary(action.deletedUserId)).build());
}
builder.deleteBannedMembers(deleteBannedMembers);
// Field 24
List promotePendingPniAciMembers = new ArrayList<>(actions.promotePendingPniAciMembers.size());
for (GroupChange.Actions.PromotePendingPniAciMemberProfileKeyAction promotePendingPniAciMemberAction : actions.promotePendingPniAciMembers) {
ACI aci = decryptAci(promotePendingPniAciMemberAction.userId);
ServiceId pni = decryptServiceId(promotePendingPniAciMemberAction.pni);
ProfileKey profileKey = decryptProfileKey(promotePendingPniAciMemberAction.profileKey, aci);
if (!(pni instanceof PNI)) {
throw new InvalidGroupStateException();
}
builder.editorServiceIdBytes(aci.toByteString());
promotePendingPniAciMembers.add(new DecryptedMember.Builder()
.aciBytes(aci.toByteString())
.role(Member.Role.DEFAULT)
.profileKey(ByteString.of(profileKey.serialize()))
.joinedAtRevision(actions.revision)
.pniBytes(pni.toByteString())
.build());
}
builder.promotePendingPniAciMembers(promotePendingPniAciMembers);
return builder.build();
}
public DecryptedGroupJoinInfo decryptGroupJoinInfo(GroupJoinInfo joinInfo) {
return new DecryptedGroupJoinInfo.Builder()
.title(decryptTitle(joinInfo.title))
.avatar(joinInfo.avatar)
.memberCount(joinInfo.memberCount)
.addFromInviteLink(joinInfo.addFromInviteLink)
.revision(joinInfo.revision)
.pendingAdminApproval(joinInfo.pendingAdminApproval)
.description(decryptDescription(joinInfo.description))
.build();
}
private DecryptedMember.Builder decryptMember(Member member)
throws InvalidGroupStateException, VerificationFailedException, InvalidInputException
{
if (member.presentation.size() == 0) {
ACI aci = decryptAci(member.userId);
return new DecryptedMember.Builder()
.aciBytes(aci.toByteString())
.joinedAtRevision(member.joinedAtRevision)
.profileKey(decryptProfileKeyToByteString(member.profileKey, aci))
.role(member.role);
} else {
ProfileKeyCredentialPresentation profileKeyCredentialPresentation = new ProfileKeyCredentialPresentation(member.presentation.toByteArray());
ServiceId serviceId = ServiceId.fromLibSignal(clientZkGroupCipher.decrypt(profileKeyCredentialPresentation.getUuidCiphertext()));
if (!(serviceId instanceof ACI)) {
throw new InvalidGroupStateException();
}
ACI aci = (ACI) serviceId;
ProfileKey profileKey = clientZkGroupCipher.decryptProfileKey(profileKeyCredentialPresentation.getProfileKeyCiphertext(), aci.getLibSignalAci());
return new DecryptedMember.Builder()
.aciBytes(aci.toByteString())
.joinedAtRevision(member.joinedAtRevision)
.profileKey(ByteString.of(profileKey.serialize()))
.role(member.role);
}
}
private DecryptedPendingMember decryptMember(PendingMember member)
throws InvalidGroupStateException, VerificationFailedException
{
ByteString userIdCipherText = member.member.userId;
ServiceId serviceId = decryptServiceIdOrUnknown(userIdCipherText);
ACI addedBy = decryptAci(member.addedByUserId);
Member.Role role = member.member.role;
if (role != Member.Role.ADMINISTRATOR && role != Member.Role.DEFAULT) {
role = Member.Role.DEFAULT;
}
return new DecryptedPendingMember.Builder()
.serviceIdBytes(serviceId.toByteString())
.serviceIdCipherText(userIdCipherText)
.addedByAci(addedBy.toByteString())
.role(role)
.timestamp(member.timestamp)
.build();
}
private DecryptedRequestingMember decryptRequestingMember(RequestingMember member)
throws InvalidGroupStateException, VerificationFailedException
{
if (member.presentation.size() == 0) {
ACI aci = decryptAci(member.userId);
return new DecryptedRequestingMember.Builder()
.aciBytes(aci.toByteString())
.profileKey(decryptProfileKeyToByteString(member.profileKey, aci))
.timestamp(member.timestamp)
.build();
} else {
ProfileKeyCredentialPresentation profileKeyCredentialPresentation;
try {
profileKeyCredentialPresentation = new ProfileKeyCredentialPresentation(member.presentation.toByteArray());
} catch (InvalidInputException e) {
throw new InvalidGroupStateException(e);
}
ServiceId serviceId = ServiceId.fromLibSignal(clientZkGroupCipher.decrypt(profileKeyCredentialPresentation.getUuidCiphertext()));
if (!(serviceId instanceof ACI)) {
throw new InvalidGroupStateException();
}
ACI aci = (ACI) serviceId;
ProfileKey profileKey = clientZkGroupCipher.decryptProfileKey(profileKeyCredentialPresentation.getProfileKeyCiphertext(), aci.getLibSignalAci());
return new DecryptedRequestingMember.Builder()
.aciBytes(aci.toByteString())
.profileKey(ByteString.of(profileKey.serialize()))
.build();
}
}
private ProfileKey decryptProfileKey(ByteString profileKey, ACI aci) throws VerificationFailedException, InvalidGroupStateException {
try {
ProfileKeyCiphertext profileKeyCiphertext = new ProfileKeyCiphertext(profileKey.toByteArray());
return clientZkGroupCipher.decryptProfileKey(profileKeyCiphertext, aci.getLibSignalAci());
} catch (InvalidInputException e) {
throw new InvalidGroupStateException(e);
}
}
private ByteString decryptProfileKeyToByteString(ByteString profileKey, ACI aci) throws VerificationFailedException, InvalidGroupStateException {
return ByteString.of(decryptProfileKey(profileKey, aci).serialize());
}
private ByteString decryptServiceIdToBinary(ByteString userId) throws InvalidGroupStateException, VerificationFailedException {
return decryptServiceId(userId).toByteString();
}
private ByteString decryptAciToBinary(ByteString userId) throws InvalidGroupStateException, VerificationFailedException {
return decryptAci(userId).toByteString();
}
// Visible for Testing
public ByteString encryptServiceId(ServiceId serviceId) {
return ByteString.of(clientZkGroupCipher.encrypt(serviceId.getLibSignalServiceId()).serialize());
}
private ServiceId decryptServiceId(ByteString userId) throws InvalidGroupStateException, VerificationFailedException {
try {
return ServiceId.fromLibSignal(clientZkGroupCipher.decrypt(new UuidCiphertext(userId.toByteArray())));
} catch (InvalidInputException e) {
throw new InvalidGroupStateException(e);
}
}
private ACI decryptAci(ByteString userId) throws InvalidGroupStateException, VerificationFailedException {
ServiceId result = decryptServiceId(userId);
if (result instanceof ACI) {
return (ACI) result;
}
throw new InvalidGroupStateException();
}
/**
* Attempts to decrypt a UUID, but will return an ACI of {@link #UNKNOWN_UUID} if it cannot.
*/
private ServiceId decryptServiceIdOrUnknown(ByteString userId) {
try {
return ServiceId.fromLibSignal(clientZkGroupCipher.decrypt(new UuidCiphertext(userId.toByteArray())));
} catch (InvalidInputException | VerificationFailedException e) {
return ACI.UNKNOWN;
}
}
private ACI decryptAciOrUnknown(ByteString userId) {
try {
ServiceId result = ServiceId.fromLibSignal(clientZkGroupCipher.decrypt(new UuidCiphertext(userId.toByteArray())));
if (result instanceof ACI) {
return (ACI) result;
} else {
return ACI.UNKNOWN;
}
} catch (InvalidInputException | VerificationFailedException e) {
return ACI.UNKNOWN;
}
}
ByteString encryptTitle(String title) {
try {
GroupAttributeBlob blob = new GroupAttributeBlob.Builder().title(title).build();
return ByteString.of(clientZkGroupCipher.encryptBlob(blob.encode()));
} catch (VerificationFailedException e) {
throw new AssertionError(e);
}
}
private String decryptTitle(ByteString cipherText) {
String title = decryptBlob(cipherText).title;
return title != null ? title.trim() : "";
}
ByteString encryptDescription(String description) {
try {
GroupAttributeBlob blob = new GroupAttributeBlob.Builder().description(description).build();
return ByteString.of(clientZkGroupCipher.encryptBlob(blob.encode()));
} catch (VerificationFailedException e) {
throw new AssertionError(e);
}
}
private String decryptDescription(ByteString cipherText) {
String description = decryptBlob(cipherText).description;
return description != null ? description.trim() : "";
}
private int decryptDisappearingMessagesTimer(ByteString encryptedTimerMessage) {
Integer disappearingMessagesDuration = decryptBlob(encryptedTimerMessage).disappearingMessagesDuration;
return disappearingMessagesDuration != null ? disappearingMessagesDuration : 0;
}
public byte[] decryptAvatar(byte[] bytes) {
return decryptBlob(bytes).avatar.toByteArray();
}
private GroupAttributeBlob decryptBlob(ByteString blob) {
return decryptBlob(blob.toByteArray());
}
private GroupAttributeBlob decryptBlob(byte[] bytes) {
// TODO GV2: Minimum field length checking should be responsibility of clientZkGroupCipher#decryptBlob
if (bytes == null || bytes.length == 0) {
return new GroupAttributeBlob();
}
if (bytes.length < 29) {
Log.w(TAG, "Bad encrypted blob length");
return new GroupAttributeBlob();
}
try {
return GroupAttributeBlob.ADAPTER.decode(clientZkGroupCipher.decryptBlob(bytes));
} catch (IOException | VerificationFailedException e) {
Log.w(TAG, "Bad encrypted blob");
return new GroupAttributeBlob();
}
}
ByteString encryptTimer(int timerDurationSeconds) {
try {
GroupAttributeBlob timer = new GroupAttributeBlob.Builder()
.disappearingMessagesDuration(timerDurationSeconds)
.build();
return ByteString.of(clientZkGroupCipher.encryptBlob(timer.encode()));
} catch (VerificationFailedException e) {
throw new AssertionError(e);
}
}
/**
* Verifies signature and parses actions on a group change.
*/
private GroupChange.Actions getVerifiedActions(GroupChange groupChange)
throws VerificationFailedException, IOException
{
byte[] actionsByteArray = groupChange.actions.toByteArray();
NotarySignature signature;
try {
signature = new NotarySignature(groupChange.serverSignature.toByteArray());
} catch (InvalidInputException e) {
Log.w(TAG, "Invalid input while verifying group change", e);
throw new VerificationFailedException();
}
serverPublicParams.verifySignature(actionsByteArray, signature);
return GroupChange.Actions.ADAPTER.decode(actionsByteArray);
}
/**
* Parses actions on a group change without verification.
*/
private GroupChange.Actions getActions(GroupChange groupChange)
throws IOException
{
return GroupChange.Actions.ADAPTER.decode(groupChange.actions);
}
public GroupChange.Actions.Builder createChangeMemberRole(ACI memberAci, Member.Role role) {
return new GroupChange.Actions.Builder().modifyMemberRoles(Collections.singletonList(
new GroupChange.Actions.ModifyMemberRoleAction.Builder().userId(encryptServiceId(memberAci)).role(role).build()
));
}
public List decryptAddMembers(List addMembers) throws InvalidGroupStateException, InvalidInputException, VerificationFailedException {
List ids = new ArrayList<>(addMembers.size());
for (GroupChange.Actions.AddMemberAction addMember : addMembers) {
if (addMember.added.presentation.size() == 0) {
ids.add(decryptAci(addMember.added.userId));
} else {
ProfileKeyCredentialPresentation profileKeyCredentialPresentation = new ProfileKeyCredentialPresentation(addMember.added.presentation.toByteArray());
ids.add(ServiceId.fromLibSignal(clientZkGroupCipher.decrypt(profileKeyCredentialPresentation.getUuidCiphertext())));
}
}
return ids;
}
}
public static class NewGroup {
private final GroupSecretParams groupSecretParams;
private final Group newGroupMessage;
private final Optional avatar;
private NewGroup(GroupSecretParams groupSecretParams, Group newGroupMessage, Optional avatar) {
this.groupSecretParams = groupSecretParams;
this.newGroupMessage = newGroupMessage;
this.avatar = avatar;
}
public GroupSecretParams getGroupSecretParams() {
return groupSecretParams;
}
public Group getNewGroupMessage() {
return newGroupMessage;
}
public Optional getAvatar() {
return avatar;
}
}
}