provisioning.go 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544
  1. package main
  2. import (
  3. "bufio"
  4. "context"
  5. "encoding/json"
  6. "errors"
  7. "net"
  8. "net/http"
  9. "strings"
  10. "time"
  11. "github.com/gorilla/mux"
  12. "github.com/gorilla/websocket"
  13. log "maunium.net/go/maulogger/v2"
  14. "maunium.net/go/mautrix"
  15. "maunium.net/go/mautrix/bridge/bridgeconfig"
  16. "maunium.net/go/mautrix/id"
  17. "go.mau.fi/mautrix-discord/database"
  18. "go.mau.fi/mautrix-discord/remoteauth"
  19. )
  20. const (
  21. SecWebSocketProtocol = "com.gitlab.beeper.discord"
  22. )
  23. const (
  24. ErrCodeNotConnected = "FI.MAU.DISCORD.NOT_CONNECTED"
  25. ErrCodeAlreadyLoggedIn = "FI.MAU.DISCORD.ALREADY_LOGGED_IN"
  26. ErrCodeAlreadyConnected = "FI.MAU.DISCORD.ALREADY_CONNECTED"
  27. ErrCodeConnectFailed = "FI.MAU.DISCORD.CONNECT_FAILED"
  28. ErrCodeDisconnectFailed = "FI.MAU.DISCORD.DISCONNECT_FAILED"
  29. ErrCodeGuildBridgeFailed = "M_UNKNOWN"
  30. ErrCodeGuildUnbridgeFailed = "M_UNKNOWN"
  31. ErrCodeGuildNotBridged = "FI.MAU.DISCORD.GUILD_NOT_BRIDGED"
  32. ErrCodeLoginPrepareFailed = "FI.MAU.DISCORD.LOGIN_PREPARE_FAILED"
  33. ErrCodeLoginConnectionFailed = "FI.MAU.DISCORD.LOGIN_CONN_FAILED"
  34. ErrCodeLoginFailed = "FI.MAU.DISCORD.LOGIN_FAILED"
  35. ErrCodePostLoginConnFailed = "FI.MAU.DISCORD.POST_LOGIN_CONNECTION_FAILED"
  36. )
  37. type ProvisioningAPI struct {
  38. bridge *DiscordBridge
  39. log log.Logger
  40. }
  41. func newProvisioningAPI(br *DiscordBridge) *ProvisioningAPI {
  42. p := &ProvisioningAPI{
  43. bridge: br,
  44. log: br.Log.Sub("Provisioning"),
  45. }
  46. prefix := br.Config.Bridge.Provisioning.Prefix
  47. p.log.Debugln("Enabling provisioning API at", prefix)
  48. r := br.AS.Router.PathPrefix(prefix).Subrouter()
  49. r.Use(p.authMiddleware)
  50. r.HandleFunc("/v1/disconnect", p.disconnect).Methods(http.MethodPost)
  51. r.HandleFunc("/v1/ping", p.ping).Methods(http.MethodGet)
  52. r.HandleFunc("/v1/login/qr", p.qrLogin).Methods(http.MethodGet)
  53. r.HandleFunc("/v1/login/token", p.tokenLogin).Methods(http.MethodPost)
  54. r.HandleFunc("/v1/logout", p.logout).Methods(http.MethodPost)
  55. r.HandleFunc("/v1/reconnect", p.reconnect).Methods(http.MethodPost)
  56. r.HandleFunc("/v1/guilds", p.guildsList).Methods(http.MethodGet)
  57. r.HandleFunc("/v1/guilds/{guildID}", p.guildsBridge).Methods(http.MethodPost)
  58. r.HandleFunc("/v1/guilds/{guildID}", p.guildsUnbridge).Methods(http.MethodDelete)
  59. return p
  60. }
  61. func jsonResponse(w http.ResponseWriter, status int, response interface{}) {
  62. w.Header().Add("Content-Type", "application/json")
  63. w.WriteHeader(status)
  64. _ = json.NewEncoder(w).Encode(response)
  65. }
  66. // Response structs
  67. type Response struct {
  68. Success bool `json:"success"`
  69. Status string `json:"status"`
  70. }
  71. type Error struct {
  72. Success bool `json:"success"`
  73. Error string `json:"error"`
  74. ErrCode string `json:"errcode"`
  75. }
  76. // Wrapped http.ResponseWriter to capture the status code
  77. type responseWrap struct {
  78. http.ResponseWriter
  79. statusCode int
  80. }
  81. var _ http.Hijacker = (*responseWrap)(nil)
  82. func (rw *responseWrap) WriteHeader(statusCode int) {
  83. rw.ResponseWriter.WriteHeader(statusCode)
  84. rw.statusCode = statusCode
  85. }
  86. func (rw *responseWrap) Hijack() (net.Conn, *bufio.ReadWriter, error) {
  87. hijacker, ok := rw.ResponseWriter.(http.Hijacker)
  88. if !ok {
  89. return nil, nil, errors.New("response does not implement http.Hijacker")
  90. }
  91. return hijacker.Hijack()
  92. }
  93. // Middleware
  94. func (p *ProvisioningAPI) authMiddleware(h http.Handler) http.Handler {
  95. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  96. auth := r.Header.Get("Authorization")
  97. // Special case the login endpoint to use the discord qrcode auth
  98. if auth == "" && strings.HasSuffix(r.URL.Path, "/login") {
  99. authParts := strings.Split(r.Header.Get("Sec-WebSocket-Protocol"), ",")
  100. for _, part := range authParts {
  101. part = strings.TrimSpace(part)
  102. if strings.HasPrefix(part, SecWebSocketProtocol+"-") {
  103. auth = part[len(SecWebSocketProtocol+"-"):]
  104. break
  105. }
  106. }
  107. } else if strings.HasPrefix(auth, "Bearer ") {
  108. auth = auth[len("Bearer "):]
  109. }
  110. if auth != p.bridge.Config.Bridge.Provisioning.SharedSecret {
  111. jsonResponse(w, http.StatusUnauthorized, map[string]interface{}{
  112. "error": "Invalid auth token",
  113. "errcode": mautrix.MUnknownToken.ErrCode,
  114. })
  115. return
  116. }
  117. userID := r.URL.Query().Get("user_id")
  118. user := p.bridge.GetUserByMXID(id.UserID(userID))
  119. start := time.Now()
  120. wWrap := &responseWrap{w, 200}
  121. h.ServeHTTP(wWrap, r.WithContext(context.WithValue(r.Context(), "user", user)))
  122. duration := time.Now().Sub(start).Seconds()
  123. p.log.Infofln("%s %s from %s took %.2f seconds and returned status %d", r.Method, r.URL.Path, user.MXID, duration, wWrap.statusCode)
  124. })
  125. }
  126. // websocket upgrader
  127. var upgrader = websocket.Upgrader{
  128. CheckOrigin: func(r *http.Request) bool {
  129. return true
  130. },
  131. Subprotocols: []string{SecWebSocketProtocol},
  132. }
  133. // Handlers
  134. func (p *ProvisioningAPI) disconnect(w http.ResponseWriter, r *http.Request) {
  135. user := r.Context().Value("user").(*User)
  136. if !user.Connected() {
  137. jsonResponse(w, http.StatusConflict, Error{
  138. Error: "You're not connected to discord",
  139. ErrCode: ErrCodeNotConnected,
  140. })
  141. return
  142. }
  143. if err := user.Disconnect(); err != nil {
  144. p.log.Errorfln("Failed to disconnect %s: %v", user.MXID, err)
  145. jsonResponse(w, http.StatusInternalServerError, Error{
  146. Error: "Failed to disconnect from discord",
  147. ErrCode: ErrCodeDisconnectFailed,
  148. })
  149. } else {
  150. jsonResponse(w, http.StatusOK, Response{
  151. Success: true,
  152. Status: "Disconnected from Discord",
  153. })
  154. }
  155. }
  156. type respPing struct {
  157. Discord struct {
  158. ID string `json:"id,omitempty"`
  159. LoggedIn bool `json:"logged_in"`
  160. Connected bool `json:"connected"`
  161. Conn struct {
  162. LastHeartbeatAck int64 `json:"last_heartbeat_ack,omitempty"`
  163. LastHeartbeatSent int64 `json:"last_heartbeat_sent,omitempty"`
  164. } `json:"conn"`
  165. }
  166. MXID id.UserID `json:"mxid"`
  167. ManagementRoom id.RoomID `json:"management_room"`
  168. }
  169. func (p *ProvisioningAPI) ping(w http.ResponseWriter, r *http.Request) {
  170. user := r.Context().Value("user").(*User)
  171. resp := respPing{
  172. MXID: user.MXID,
  173. ManagementRoom: user.ManagementRoom,
  174. }
  175. resp.Discord.LoggedIn = user.IsLoggedIn()
  176. resp.Discord.Connected = user.Connected()
  177. resp.Discord.ID = user.DiscordID
  178. if user.Session != nil {
  179. resp.Discord.Conn.LastHeartbeatAck = user.Session.LastHeartbeatAck.UnixMilli()
  180. resp.Discord.Conn.LastHeartbeatSent = user.Session.LastHeartbeatSent.UnixMilli()
  181. }
  182. jsonResponse(w, http.StatusOK, resp)
  183. }
  184. func (p *ProvisioningAPI) logout(w http.ResponseWriter, r *http.Request) {
  185. user := r.Context().Value("user").(*User)
  186. var msg string
  187. if user.DiscordID != "" {
  188. msg = "Logged out successfully."
  189. } else {
  190. msg = "User wasn't logged in."
  191. }
  192. user.Logout(false)
  193. jsonResponse(w, http.StatusOK, Response{true, msg})
  194. }
  195. func (p *ProvisioningAPI) qrLogin(w http.ResponseWriter, r *http.Request) {
  196. userID := r.URL.Query().Get("user_id")
  197. user := p.bridge.GetUserByMXID(id.UserID(userID))
  198. c, err := upgrader.Upgrade(w, r, nil)
  199. if err != nil {
  200. p.log.Errorln("Failed to upgrade connection to websocket:", err)
  201. return
  202. }
  203. log := p.log.Sub("QRLogin").Sub(user.MXID.String())
  204. defer func() {
  205. err := c.Close()
  206. if err != nil {
  207. log.Debugln("Error closing websocket:", err)
  208. }
  209. }()
  210. go func() {
  211. // Read everything so SetCloseHandler() works
  212. for {
  213. _, _, err := c.ReadMessage()
  214. if err != nil {
  215. break
  216. }
  217. }
  218. }()
  219. ctx, cancel := context.WithCancel(context.Background())
  220. c.SetCloseHandler(func(code int, text string) error {
  221. log.Debugfln("Login websocket closed (%d), cancelling login", code)
  222. cancel()
  223. return nil
  224. })
  225. if user.IsLoggedIn() {
  226. _ = c.WriteJSON(Error{
  227. Error: "You're already logged into Discord",
  228. ErrCode: ErrCodeAlreadyLoggedIn,
  229. })
  230. return
  231. }
  232. client, err := remoteauth.New()
  233. if err != nil {
  234. log.Errorln("Failed to prepare login:", err)
  235. _ = c.WriteJSON(Error{
  236. Error: "Failed to prepare login",
  237. ErrCode: ErrCodeLoginPrepareFailed,
  238. })
  239. return
  240. }
  241. qrChan := make(chan string)
  242. doneChan := make(chan struct{})
  243. log.Debugln("Started login via provisioning API")
  244. err = client.Dial(ctx, qrChan, doneChan)
  245. if err != nil {
  246. log.Errorln("Failed to connect to Discord login websocket:", err)
  247. close(qrChan)
  248. close(doneChan)
  249. _ = c.WriteJSON(Error{
  250. Error: "Failed to connect to Discord login websocket",
  251. ErrCode: ErrCodeLoginConnectionFailed,
  252. })
  253. return
  254. }
  255. for {
  256. select {
  257. case qrCode, ok := <-qrChan:
  258. if !ok {
  259. continue
  260. }
  261. err = c.WriteJSON(map[string]interface{}{
  262. "code": qrCode,
  263. "timeout": 120, // TODO: move this to the library or something
  264. })
  265. if err != nil {
  266. log.Errorln("Failed to write QR code to websocket:", err)
  267. }
  268. case <-doneChan:
  269. var discordUser remoteauth.User
  270. discordUser, err = client.Result()
  271. if err != nil {
  272. log.Errorln("Discord login websocket returned error:", err)
  273. _ = c.WriteJSON(Error{
  274. Error: "Failed to log in",
  275. ErrCode: ErrCodeLoginFailed,
  276. })
  277. return
  278. }
  279. log.Infofln("Logged in as %s#%s (%s)", discordUser.Username, discordUser.Discriminator, discordUser.UserID)
  280. if err = user.Login(discordUser.Token); err != nil {
  281. log.Errorln("Failed to connect after logging in:", err)
  282. _ = c.WriteJSON(Error{
  283. Error: "Failed to connect to Discord after logging in",
  284. ErrCode: ErrCodePostLoginConnFailed,
  285. })
  286. return
  287. }
  288. err = c.WriteJSON(respLogin{
  289. Success: true,
  290. ID: user.DiscordID,
  291. Username: discordUser.Username,
  292. Discriminator: discordUser.Discriminator,
  293. })
  294. if err != nil {
  295. log.Errorln("Failed to write login success to websocket:", err)
  296. }
  297. return
  298. case <-ctx.Done():
  299. return
  300. }
  301. }
  302. }
  303. type respLogin struct {
  304. Success bool `json:"success"`
  305. ID string `json:"id"`
  306. Username string `json:"username"`
  307. Discriminator string `json:"discriminator"`
  308. }
  309. type reqTokenLogin struct {
  310. Token string `json:"token"`
  311. }
  312. func (p *ProvisioningAPI) tokenLogin(w http.ResponseWriter, r *http.Request) {
  313. userID := r.URL.Query().Get("user_id")
  314. user := p.bridge.GetUserByMXID(id.UserID(userID))
  315. log := p.log.Sub("TokenLogin").Sub(user.MXID.String())
  316. if user.IsLoggedIn() {
  317. jsonResponse(w, http.StatusConflict, Error{
  318. Error: "You're already logged into Discord",
  319. ErrCode: ErrCodeAlreadyLoggedIn,
  320. })
  321. return
  322. }
  323. var body reqTokenLogin
  324. if err := json.NewDecoder(r.Body).Decode(&body); err != nil {
  325. log.Errorln("Failed to parse login request:", err)
  326. jsonResponse(w, http.StatusBadRequest, Error{
  327. Error: "Failed to parse request body",
  328. ErrCode: mautrix.MBadJSON.ErrCode,
  329. })
  330. return
  331. }
  332. if err := user.Login(body.Token); err != nil {
  333. log.Errorln("Failed to connect with provided token:", err)
  334. jsonResponse(w, http.StatusUnauthorized, Error{
  335. Error: "Failed to connect to Discord",
  336. ErrCode: ErrCodePostLoginConnFailed,
  337. })
  338. return
  339. }
  340. log.Infoln("Successfully logged in")
  341. jsonResponse(w, http.StatusOK, respLogin{
  342. Success: true,
  343. ID: user.DiscordID,
  344. Username: user.Session.State.User.Username,
  345. Discriminator: user.Session.State.User.Discriminator,
  346. })
  347. }
  348. func (p *ProvisioningAPI) reconnect(w http.ResponseWriter, r *http.Request) {
  349. user := r.Context().Value("user").(*User)
  350. if user.Connected() {
  351. jsonResponse(w, http.StatusConflict, Error{
  352. Error: "You're already connected to discord",
  353. ErrCode: ErrCodeAlreadyConnected,
  354. })
  355. return
  356. }
  357. if err := user.Connect(); err != nil {
  358. jsonResponse(w, http.StatusInternalServerError, Error{
  359. Error: "Failed to connect to discord",
  360. ErrCode: ErrCodeConnectFailed,
  361. })
  362. } else {
  363. jsonResponse(w, http.StatusOK, Response{
  364. Success: true,
  365. Status: "Connected to Discord",
  366. })
  367. }
  368. }
  369. type guildEntry struct {
  370. ID string `json:"id"`
  371. Name string `json:"name"`
  372. AvatarURL id.ContentURI `json:"avatar_url"`
  373. MXID id.RoomID `json:"mxid"`
  374. AutoBridge bool `json:"auto_bridge_channels"`
  375. BridgingMode string `json:"bridging_mode"`
  376. }
  377. type respGuildsList struct {
  378. Guilds []guildEntry `json:"guilds"`
  379. }
  380. func (p *ProvisioningAPI) guildsList(w http.ResponseWriter, r *http.Request) {
  381. user := r.Context().Value("user").(*User)
  382. var resp respGuildsList
  383. resp.Guilds = []guildEntry{}
  384. for _, userGuild := range user.GetPortals() {
  385. guild := p.bridge.GetGuildByID(userGuild.DiscordID, false)
  386. if guild == nil {
  387. continue
  388. }
  389. resp.Guilds = append(resp.Guilds, guildEntry{
  390. ID: guild.ID,
  391. Name: guild.PlainName,
  392. AvatarURL: guild.AvatarURL,
  393. MXID: guild.MXID,
  394. AutoBridge: guild.BridgingMode == database.GuildBridgeEverything,
  395. BridgingMode: guild.BridgingMode.String(),
  396. })
  397. }
  398. jsonResponse(w, http.StatusOK, resp)
  399. }
  400. type reqBridgeGuild struct {
  401. AutoCreateChannels bool `json:"auto_create_channels"`
  402. }
  403. type respBridgeGuild struct {
  404. Success bool `json:"success"`
  405. MXID id.RoomID `json:"mxid"`
  406. }
  407. func (p *ProvisioningAPI) guildsBridge(w http.ResponseWriter, r *http.Request) {
  408. user := r.Context().Value("user").(*User)
  409. guildID := mux.Vars(r)["guildID"]
  410. var body reqBridgeGuild
  411. if err := json.NewDecoder(r.Body).Decode(&body); err != nil {
  412. p.log.Errorln("Failed to parse bridge request:", err)
  413. jsonResponse(w, http.StatusBadRequest, Error{
  414. Error: "Failed to parse request body",
  415. ErrCode: mautrix.MBadJSON.ErrCode,
  416. })
  417. return
  418. }
  419. guild := user.bridge.GetGuildByID(guildID, false)
  420. if guild == nil {
  421. jsonResponse(w, http.StatusNotFound, Error{
  422. Error: "Guild not found",
  423. ErrCode: mautrix.MNotFound.ErrCode,
  424. })
  425. return
  426. }
  427. alreadyExists := guild.MXID == ""
  428. if err := user.bridgeGuild(guildID, body.AutoCreateChannels); err != nil {
  429. p.log.Errorfln("Error bridging %s: %v", guildID, err)
  430. jsonResponse(w, http.StatusInternalServerError, Error{
  431. Error: "Internal error while trying to bridge guild",
  432. ErrCode: ErrCodeGuildBridgeFailed,
  433. })
  434. } else if alreadyExists {
  435. jsonResponse(w, http.StatusOK, respBridgeGuild{
  436. Success: true,
  437. MXID: guild.MXID,
  438. })
  439. } else {
  440. jsonResponse(w, http.StatusCreated, respBridgeGuild{
  441. Success: true,
  442. MXID: guild.MXID,
  443. })
  444. }
  445. }
  446. func (p *ProvisioningAPI) guildsUnbridge(w http.ResponseWriter, r *http.Request) {
  447. guildID := mux.Vars(r)["guildID"]
  448. user := r.Context().Value("user").(*User)
  449. if user.PermissionLevel < bridgeconfig.PermissionLevelAdmin {
  450. jsonResponse(w, http.StatusForbidden, Error{
  451. Error: "Only bridge admins can unbridge guilds",
  452. ErrCode: mautrix.MForbidden.ErrCode,
  453. })
  454. } else if guild := user.bridge.GetGuildByID(guildID, false); guild == nil {
  455. jsonResponse(w, http.StatusNotFound, Error{
  456. Error: "Guild not found",
  457. ErrCode: mautrix.MNotFound.ErrCode,
  458. })
  459. } else if guild.BridgingMode == database.GuildBridgeNothing && guild.MXID == "" {
  460. jsonResponse(w, http.StatusNotFound, Error{
  461. Error: "That guild is not bridged",
  462. ErrCode: ErrCodeGuildNotBridged,
  463. })
  464. } else if err := user.unbridgeGuild(guildID); err != nil {
  465. p.log.Errorfln("Error unbridging %s: %v", guildID, err)
  466. jsonResponse(w, http.StatusInternalServerError, Error{
  467. Error: "Internal error while trying to unbridge guild",
  468. ErrCode: ErrCodeGuildUnbridgeFailed,
  469. })
  470. } else {
  471. w.WriteHeader(http.StatusNoContent)
  472. }
  473. }