provisioning.go 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527
  1. package main
  2. import (
  3. "bufio"
  4. "context"
  5. "encoding/json"
  6. "errors"
  7. "net"
  8. "net/http"
  9. "strings"
  10. "time"
  11. "github.com/gorilla/mux"
  12. "github.com/gorilla/websocket"
  13. log "maunium.net/go/maulogger/v2"
  14. "maunium.net/go/mautrix/bridge/bridgeconfig"
  15. "maunium.net/go/mautrix/id"
  16. "go.mau.fi/mautrix-discord/remoteauth"
  17. )
  18. const (
  19. SecWebSocketProtocol = "com.gitlab.beeper.discord"
  20. )
  21. type ProvisioningAPI struct {
  22. bridge *DiscordBridge
  23. log log.Logger
  24. }
  25. func newProvisioningAPI(br *DiscordBridge) *ProvisioningAPI {
  26. p := &ProvisioningAPI{
  27. bridge: br,
  28. log: br.Log.Sub("Provisioning"),
  29. }
  30. prefix := br.Config.Bridge.Provisioning.Prefix
  31. p.log.Debugln("Enabling provisioning API at", prefix)
  32. r := br.AS.Router.PathPrefix(prefix).Subrouter()
  33. r.Use(p.authMiddleware)
  34. r.HandleFunc("/v1/disconnect", p.disconnect).Methods(http.MethodPost)
  35. r.HandleFunc("/v1/ping", p.ping).Methods(http.MethodGet)
  36. r.HandleFunc("/v1/login/qr", p.qrLogin).Methods(http.MethodGet)
  37. r.HandleFunc("/v1/login/token", p.tokenLogin).Methods(http.MethodPost)
  38. r.HandleFunc("/v1/logout", p.logout).Methods(http.MethodPost)
  39. r.HandleFunc("/v1/reconnect", p.reconnect).Methods(http.MethodPost)
  40. r.HandleFunc("/v1/guilds", p.guildsList).Methods(http.MethodGet)
  41. r.HandleFunc("/v1/guilds/{guildID}", p.guildsBridge).Methods(http.MethodPost)
  42. r.HandleFunc("/v1/guilds/{guildID}", p.guildsUnbridge).Methods(http.MethodDelete)
  43. return p
  44. }
  45. func jsonResponse(w http.ResponseWriter, status int, response interface{}) {
  46. w.Header().Add("Content-Type", "application/json")
  47. w.WriteHeader(status)
  48. _ = json.NewEncoder(w).Encode(response)
  49. }
  50. // Response structs
  51. type Response struct {
  52. Success bool `json:"success"`
  53. Status string `json:"status"`
  54. }
  55. type Error struct {
  56. Success bool `json:"success"`
  57. Error string `json:"error"`
  58. ErrCode string `json:"errcode"`
  59. }
  60. // Wrapped http.ResponseWriter to capture the status code
  61. type responseWrap struct {
  62. http.ResponseWriter
  63. statusCode int
  64. }
  65. var _ http.Hijacker = (*responseWrap)(nil)
  66. func (rw *responseWrap) WriteHeader(statusCode int) {
  67. rw.ResponseWriter.WriteHeader(statusCode)
  68. rw.statusCode = statusCode
  69. }
  70. func (rw *responseWrap) Hijack() (net.Conn, *bufio.ReadWriter, error) {
  71. hijacker, ok := rw.ResponseWriter.(http.Hijacker)
  72. if !ok {
  73. return nil, nil, errors.New("response does not implement http.Hijacker")
  74. }
  75. return hijacker.Hijack()
  76. }
  77. // Middleware
  78. func (p *ProvisioningAPI) authMiddleware(h http.Handler) http.Handler {
  79. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  80. auth := r.Header.Get("Authorization")
  81. // Special case the login endpoint to use the discord qrcode auth
  82. if auth == "" && strings.HasSuffix(r.URL.Path, "/login") {
  83. authParts := strings.Split(r.Header.Get("Sec-WebSocket-Protocol"), ",")
  84. for _, part := range authParts {
  85. part = strings.TrimSpace(part)
  86. if strings.HasPrefix(part, SecWebSocketProtocol+"-") {
  87. auth = part[len(SecWebSocketProtocol+"-"):]
  88. break
  89. }
  90. }
  91. } else if strings.HasPrefix(auth, "Bearer ") {
  92. auth = auth[len("Bearer "):]
  93. }
  94. if auth != p.bridge.Config.Bridge.Provisioning.SharedSecret {
  95. jsonResponse(w, http.StatusForbidden, map[string]interface{}{
  96. "error": "Invalid auth token",
  97. "errcode": "M_FORBIDDEN",
  98. })
  99. return
  100. }
  101. userID := r.URL.Query().Get("user_id")
  102. user := p.bridge.GetUserByMXID(id.UserID(userID))
  103. start := time.Now()
  104. wWrap := &responseWrap{w, 200}
  105. h.ServeHTTP(wWrap, r.WithContext(context.WithValue(r.Context(), "user", user)))
  106. duration := time.Now().Sub(start).Seconds()
  107. p.log.Infofln("%s %s from %s took %.2f seconds and returned status %d", r.Method, r.URL.Path, user.MXID, duration, wWrap.statusCode)
  108. })
  109. }
  110. // websocket upgrader
  111. var upgrader = websocket.Upgrader{
  112. CheckOrigin: func(r *http.Request) bool {
  113. return true
  114. },
  115. Subprotocols: []string{SecWebSocketProtocol},
  116. }
  117. // Handlers
  118. func (p *ProvisioningAPI) disconnect(w http.ResponseWriter, r *http.Request) {
  119. user := r.Context().Value("user").(*User)
  120. if !user.Connected() {
  121. jsonResponse(w, http.StatusConflict, Error{
  122. Error: "You're not connected to discord",
  123. ErrCode: "not connected",
  124. })
  125. return
  126. }
  127. if err := user.Disconnect(); err != nil {
  128. jsonResponse(w, http.StatusInternalServerError, Error{
  129. Error: "Failed to disconnect from discord",
  130. ErrCode: "failed to disconnect",
  131. })
  132. } else {
  133. jsonResponse(w, http.StatusOK, Response{
  134. Success: true,
  135. Status: "Disconnected from Discord",
  136. })
  137. }
  138. }
  139. type respPing struct {
  140. Discord struct {
  141. ID string `json:"id,omitempty"`
  142. LoggedIn bool `json:"logged_in"`
  143. Connected bool `json:"connected"`
  144. Conn struct {
  145. LastHeartbeatAck int64 `json:"last_heartbeat_ack,omitempty"`
  146. LastHeartbeatSent int64 `json:"last_heartbeat_sent,omitempty"`
  147. } `json:"conn"`
  148. }
  149. MXID id.UserID `json:"mxid"`
  150. ManagementRoom id.RoomID `json:"management_room"`
  151. }
  152. func (p *ProvisioningAPI) ping(w http.ResponseWriter, r *http.Request) {
  153. user := r.Context().Value("user").(*User)
  154. resp := respPing{
  155. MXID: user.MXID,
  156. ManagementRoom: user.ManagementRoom,
  157. }
  158. resp.Discord.LoggedIn = user.IsLoggedIn()
  159. resp.Discord.Connected = user.Connected()
  160. resp.Discord.ID = user.DiscordID
  161. if user.Session != nil {
  162. resp.Discord.Conn.LastHeartbeatAck = user.Session.LastHeartbeatAck.UnixMilli()
  163. resp.Discord.Conn.LastHeartbeatSent = user.Session.LastHeartbeatSent.UnixMilli()
  164. }
  165. jsonResponse(w, http.StatusOK, resp)
  166. }
  167. func (p *ProvisioningAPI) logout(w http.ResponseWriter, r *http.Request) {
  168. user := r.Context().Value("user").(*User)
  169. var msg string
  170. if user.DiscordID != "" {
  171. msg = "Logged out successfully."
  172. } else {
  173. msg = "User wasn't logged in."
  174. }
  175. user.Logout()
  176. jsonResponse(w, http.StatusOK, Response{true, msg})
  177. }
  178. func (p *ProvisioningAPI) qrLogin(w http.ResponseWriter, r *http.Request) {
  179. userID := r.URL.Query().Get("user_id")
  180. user := p.bridge.GetUserByMXID(id.UserID(userID))
  181. c, err := upgrader.Upgrade(w, r, nil)
  182. if err != nil {
  183. p.log.Errorln("Failed to upgrade connection to websocket:", err)
  184. return
  185. }
  186. log := p.log.Sub("QRLogin").Sub(user.MXID.String())
  187. defer func() {
  188. err := c.Close()
  189. if err != nil {
  190. log.Debugln("Error closing websocket:", err)
  191. }
  192. }()
  193. go func() {
  194. // Read everything so SetCloseHandler() works
  195. for {
  196. _, _, err := c.ReadMessage()
  197. if err != nil {
  198. break
  199. }
  200. }
  201. }()
  202. ctx, cancel := context.WithCancel(context.Background())
  203. c.SetCloseHandler(func(code int, text string) error {
  204. log.Debugfln("Login websocket closed (%d), cancelling login", code)
  205. cancel()
  206. return nil
  207. })
  208. if user.IsLoggedIn() {
  209. _ = c.WriteJSON(Error{
  210. Error: "You're already logged into Discord",
  211. ErrCode: "already logged in",
  212. })
  213. return
  214. }
  215. client, err := remoteauth.New()
  216. if err != nil {
  217. log.Errorln("Failed to prepare login:", err)
  218. _ = c.WriteJSON(Error{
  219. Error: "Failed to prepare login",
  220. ErrCode: "connection error",
  221. })
  222. return
  223. }
  224. qrChan := make(chan string)
  225. doneChan := make(chan struct{})
  226. log.Debugln("Started login via provisioning API")
  227. err = client.Dial(ctx, qrChan, doneChan)
  228. if err != nil {
  229. log.Errorln("Failed to connect to Discord login websocket:", err)
  230. close(qrChan)
  231. close(doneChan)
  232. _ = c.WriteJSON(Error{
  233. Error: "Failed to prepare login",
  234. ErrCode: "connection error",
  235. })
  236. return
  237. }
  238. for {
  239. select {
  240. case qrCode, ok := <-qrChan:
  241. if !ok {
  242. continue
  243. }
  244. err = c.WriteJSON(map[string]interface{}{
  245. "code": qrCode,
  246. "timeout": 120, // TODO: move this to the library or something
  247. })
  248. if err != nil {
  249. log.Errorln("Failed to write QR code to websocket:", err)
  250. }
  251. case <-doneChan:
  252. var discordUser remoteauth.User
  253. discordUser, err = client.Result()
  254. if err != nil {
  255. log.Errorln("Discord login websocket returned error:", err)
  256. _ = c.WriteJSON(Error{
  257. Error: "Failed to log in",
  258. ErrCode: "login fail",
  259. })
  260. return
  261. }
  262. log.Infofln("Logged in as %s#%s (%s)", discordUser.Username, discordUser.Discriminator, discordUser.UserID)
  263. user.DiscordID = discordUser.UserID
  264. user.Update()
  265. if err = user.Login(discordUser.Token); err != nil {
  266. log.Errorln("Failed to connect after logging in:", err)
  267. _ = c.WriteJSON(Error{
  268. Error: "Failed to connect to Discord after logging in",
  269. ErrCode: "connect fail",
  270. })
  271. return
  272. }
  273. err = c.WriteJSON(respLogin{
  274. Success: true,
  275. ID: user.DiscordID,
  276. Username: discordUser.Username,
  277. Discriminator: discordUser.Discriminator,
  278. })
  279. if err != nil {
  280. log.Errorln("Failed to write login success to websocket:", err)
  281. }
  282. return
  283. case <-ctx.Done():
  284. return
  285. }
  286. }
  287. }
  288. type respLogin struct {
  289. Success bool `json:"success"`
  290. ID string `json:"id"`
  291. Username string `json:"username"`
  292. Discriminator string `json:"discriminator"`
  293. }
  294. type reqTokenLogin struct {
  295. Token string `json:"token"`
  296. }
  297. func (p *ProvisioningAPI) tokenLogin(w http.ResponseWriter, r *http.Request) {
  298. userID := r.URL.Query().Get("user_id")
  299. user := p.bridge.GetUserByMXID(id.UserID(userID))
  300. log := p.log.Sub("TokenLogin").Sub(user.MXID.String())
  301. if user.IsLoggedIn() {
  302. jsonResponse(w, http.StatusConflict, Error{
  303. Error: "You're already logged into Discord",
  304. ErrCode: "already logged in",
  305. })
  306. return
  307. }
  308. var body reqTokenLogin
  309. if err := json.NewDecoder(r.Body).Decode(&body); err != nil {
  310. log.Errorln("Failed to parse login request:", err)
  311. jsonResponse(w, http.StatusBadRequest, Error{
  312. Error: "Failed to parse request body",
  313. ErrCode: "bad request",
  314. })
  315. return
  316. }
  317. if err := user.Login(body.Token); err != nil {
  318. log.Errorln("Failed to connect with provided token:", err)
  319. jsonResponse(w, http.StatusUnauthorized, Error{
  320. Error: "Failed to connect to Discord",
  321. ErrCode: "connect fail",
  322. })
  323. return
  324. }
  325. log.Infoln("Successfully logged in")
  326. jsonResponse(w, http.StatusOK, respLogin{
  327. Success: true,
  328. ID: user.DiscordID,
  329. Username: user.Session.State.User.Username,
  330. Discriminator: user.Session.State.User.Discriminator,
  331. })
  332. }
  333. func (p *ProvisioningAPI) reconnect(w http.ResponseWriter, r *http.Request) {
  334. user := r.Context().Value("user").(*User)
  335. if user.Connected() {
  336. jsonResponse(w, http.StatusConflict, Error{
  337. Error: "You're already connected to discord",
  338. ErrCode: "already connected",
  339. })
  340. return
  341. }
  342. if err := user.Connect(); err != nil {
  343. jsonResponse(w, http.StatusInternalServerError, Error{
  344. Error: "Failed to connect to discord",
  345. ErrCode: "failed to connect",
  346. })
  347. } else {
  348. jsonResponse(w, http.StatusOK, Response{
  349. Success: true,
  350. Status: "Connected to Discord",
  351. })
  352. }
  353. }
  354. type guildEntry struct {
  355. ID string `json:"id"`
  356. Name string `json:"name"`
  357. AvatarURL id.ContentURI `json:"avatar_url"`
  358. MXID id.RoomID `json:"mxid"`
  359. AutoBridge bool `json:"auto_bridge_channels"`
  360. }
  361. type respGuildsList struct {
  362. Guilds []guildEntry `json:"guilds"`
  363. }
  364. func (p *ProvisioningAPI) guildsList(w http.ResponseWriter, r *http.Request) {
  365. user := r.Context().Value("user").(*User)
  366. var resp respGuildsList
  367. resp.Guilds = []guildEntry{}
  368. for _, userGuild := range user.GetPortals() {
  369. guild := p.bridge.GetGuildByID(userGuild.DiscordID, false)
  370. if guild == nil {
  371. continue
  372. }
  373. resp.Guilds = append(resp.Guilds, guildEntry{
  374. ID: guild.ID,
  375. Name: guild.PlainName,
  376. AvatarURL: guild.AvatarURL,
  377. MXID: guild.MXID,
  378. AutoBridge: guild.AutoBridgeChannels,
  379. })
  380. }
  381. jsonResponse(w, http.StatusOK, resp)
  382. }
  383. type reqBridgeGuild struct {
  384. AutoCreateChannels bool `json:"auto_create_channels"`
  385. }
  386. type respBridgeGuild struct {
  387. Success bool `json:"success"`
  388. MXID id.RoomID `json:"mxid"`
  389. }
  390. func (p *ProvisioningAPI) guildsBridge(w http.ResponseWriter, r *http.Request) {
  391. user := r.Context().Value("user").(*User)
  392. guildID := mux.Vars(r)["guildID"]
  393. var body reqBridgeGuild
  394. if err := json.NewDecoder(r.Body).Decode(&body); err != nil {
  395. p.log.Errorln("Failed to parse bridge request:", err)
  396. jsonResponse(w, http.StatusBadRequest, Error{
  397. Error: "Failed to parse request body",
  398. ErrCode: "bad request",
  399. })
  400. return
  401. }
  402. guild := user.bridge.GetGuildByID(guildID, false)
  403. if guild == nil {
  404. jsonResponse(w, http.StatusNotFound, Error{
  405. Error: "Guild not found",
  406. ErrCode: "M_NOT_FOUND",
  407. })
  408. return
  409. }
  410. alreadyExists := guild.MXID == ""
  411. if err := user.bridgeGuild(guildID, body.AutoCreateChannels); err != nil {
  412. p.log.Errorfln("Error bridging %s: %v", guildID, err)
  413. jsonResponse(w, http.StatusInternalServerError, Error{
  414. Error: "Internal error while trying to bridge guild",
  415. ErrCode: "guild bridge failed",
  416. })
  417. } else if alreadyExists {
  418. jsonResponse(w, http.StatusOK, respBridgeGuild{
  419. Success: true,
  420. MXID: guild.MXID,
  421. })
  422. } else {
  423. jsonResponse(w, http.StatusCreated, respBridgeGuild{
  424. Success: true,
  425. MXID: guild.MXID,
  426. })
  427. }
  428. }
  429. func (p *ProvisioningAPI) guildsUnbridge(w http.ResponseWriter, r *http.Request) {
  430. guildID := mux.Vars(r)["guildID"]
  431. user := r.Context().Value("user").(*User)
  432. if user.PermissionLevel < bridgeconfig.PermissionLevelAdmin {
  433. jsonResponse(w, http.StatusForbidden, Error{
  434. Error: "Only bridge admins can unbridge guilds",
  435. ErrCode: "M_FORBIDDEN",
  436. })
  437. } else if guild := user.bridge.GetGuildByID(guildID, false); guild == nil {
  438. jsonResponse(w, http.StatusNotFound, Error{
  439. Error: "Guild not found",
  440. ErrCode: "M_NOT_FOUND",
  441. })
  442. } else if !guild.AutoBridgeChannels && guild.MXID == "" {
  443. jsonResponse(w, http.StatusNotFound, Error{
  444. Error: "That guild is not bridged",
  445. ErrCode: "not bridged",
  446. })
  447. } else if err := user.unbridgeGuild(guildID); err != nil {
  448. p.log.Errorfln("Error unbridging %s: %v", guildID, err)
  449. jsonResponse(w, http.StatusInternalServerError, Error{
  450. Error: "Internal error while trying to unbridge guild",
  451. ErrCode: "guild unbridge failed",
  452. })
  453. } else {
  454. w.WriteHeader(http.StatusNoContent)
  455. }
  456. }