custompuppet.go 4.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170
  1. package main
  2. import (
  3. "crypto/hmac"
  4. "crypto/sha512"
  5. "encoding/hex"
  6. "errors"
  7. "fmt"
  8. "maunium.net/go/mautrix"
  9. "maunium.net/go/mautrix/appservice"
  10. "maunium.net/go/mautrix/id"
  11. )
  12. var (
  13. ErrNoCustomMXID = errors.New("no custom mxid set")
  14. ErrMismatchingMXID = errors.New("whoami result does not match custom mxid")
  15. )
  16. func (br *DiscordBridge) newDoublePuppetClient(mxid id.UserID, accessToken string) (*mautrix.Client, error) {
  17. _, homeserver, err := mxid.Parse()
  18. if err != nil {
  19. return nil, err
  20. }
  21. homeserverURL, found := br.Config.Bridge.DoublePuppetServerMap[homeserver]
  22. if !found {
  23. if homeserver == br.AS.HomeserverDomain {
  24. homeserverURL = ""
  25. } else if br.Config.Bridge.DoublePuppetAllowDiscovery {
  26. resp, err := mautrix.DiscoverClientAPI(homeserver)
  27. if err != nil {
  28. return nil, fmt.Errorf("failed to find homeserver URL for %s: %v", homeserver, err)
  29. }
  30. homeserverURL = resp.Homeserver.BaseURL
  31. br.Log.Debugfln("Discovered URL %s for %s to enable double puppeting for %s", homeserverURL, homeserver, mxid)
  32. } else {
  33. return nil, fmt.Errorf("double puppeting from %s is not allowed", homeserver)
  34. }
  35. }
  36. return br.AS.NewExternalMautrixClient(mxid, accessToken, homeserverURL)
  37. }
  38. func (puppet *Puppet) clearCustomMXID() {
  39. puppet.CustomMXID = ""
  40. puppet.AccessToken = ""
  41. puppet.customIntent = nil
  42. puppet.customUser = nil
  43. }
  44. func (puppet *Puppet) newCustomIntent() (*appservice.IntentAPI, error) {
  45. if puppet.CustomMXID == "" {
  46. return nil, ErrNoCustomMXID
  47. }
  48. client, err := puppet.bridge.newDoublePuppetClient(puppet.CustomMXID, puppet.AccessToken)
  49. if err != nil {
  50. return nil, err
  51. }
  52. ia := puppet.bridge.AS.NewIntentAPI("custom")
  53. ia.Client = client
  54. ia.Localpart, _, _ = puppet.CustomMXID.Parse()
  55. ia.UserID = puppet.CustomMXID
  56. ia.IsCustomPuppet = true
  57. return ia, nil
  58. }
  59. func (puppet *Puppet) StartCustomMXID(reloginOnFail bool) error {
  60. if puppet.CustomMXID == "" {
  61. puppet.clearCustomMXID()
  62. return nil
  63. }
  64. intent, err := puppet.newCustomIntent()
  65. if err != nil {
  66. puppet.clearCustomMXID()
  67. return err
  68. }
  69. resp, err := intent.Whoami()
  70. if err != nil {
  71. if !reloginOnFail || (errors.Is(err, mautrix.MUnknownToken) && !puppet.tryRelogin(err, "initializing double puppeting")) {
  72. puppet.clearCustomMXID()
  73. return err
  74. }
  75. intent.AccessToken = puppet.AccessToken
  76. } else if resp.UserID != puppet.CustomMXID {
  77. puppet.clearCustomMXID()
  78. return ErrMismatchingMXID
  79. }
  80. puppet.customIntent = intent
  81. puppet.customUser = puppet.bridge.GetUserByMXID(puppet.CustomMXID)
  82. return nil
  83. }
  84. func (puppet *Puppet) tryRelogin(cause error, action string) bool {
  85. if !puppet.bridge.Config.CanAutoDoublePuppet(puppet.CustomMXID) {
  86. return false
  87. }
  88. log := puppet.log.With().
  89. AnErr("cause_error", cause).
  90. Str("while_action", action).
  91. Logger()
  92. log.Debug().Msg("Trying to relogin")
  93. accessToken, err := puppet.loginWithSharedSecret(puppet.CustomMXID)
  94. if err != nil {
  95. log.Error().Err(err).Msg("Failed to relogin")
  96. return false
  97. }
  98. log.Info().Msg("Successfully relogined")
  99. puppet.AccessToken = accessToken
  100. puppet.Update()
  101. return true
  102. }
  103. func (puppet *Puppet) loginWithSharedSecret(mxid id.UserID) (string, error) {
  104. _, homeserver, _ := mxid.Parse()
  105. puppet.log.Debug().Str("user_id", mxid.String()).Msg("Logging into double puppet target with shared secret")
  106. loginSecret := puppet.bridge.Config.Bridge.LoginSharedSecretMap[homeserver]
  107. client, err := puppet.bridge.newDoublePuppetClient(mxid, "")
  108. if err != nil {
  109. return "", fmt.Errorf("failed to create mautrix client to log in: %v", err)
  110. }
  111. req := mautrix.ReqLogin{
  112. Identifier: mautrix.UserIdentifier{Type: mautrix.IdentifierTypeUser, User: string(mxid)},
  113. DeviceID: "Discord Bridge",
  114. InitialDeviceDisplayName: "Discord Bridge",
  115. }
  116. if loginSecret == "appservice" {
  117. client.AccessToken = puppet.bridge.AS.Registration.AppToken
  118. req.Type = mautrix.AuthTypeAppservice
  119. } else {
  120. mac := hmac.New(sha512.New, []byte(loginSecret))
  121. mac.Write([]byte(mxid))
  122. req.Password = hex.EncodeToString(mac.Sum(nil))
  123. req.Type = mautrix.AuthTypePassword
  124. }
  125. resp, err := client.Login(&req)
  126. if err != nil {
  127. return "", err
  128. }
  129. return resp.AccessToken, nil
  130. }
  131. func (puppet *Puppet) SwitchCustomMXID(accessToken string, mxid id.UserID) error {
  132. prevCustomMXID := puppet.CustomMXID
  133. puppet.CustomMXID = mxid
  134. puppet.AccessToken = accessToken
  135. err := puppet.StartCustomMXID(false)
  136. if err != nil {
  137. return err
  138. }
  139. if prevCustomMXID != "" {
  140. delete(puppet.bridge.puppetsByCustomMXID, prevCustomMXID)
  141. }
  142. if puppet.CustomMXID != "" {
  143. puppet.bridge.puppetsByCustomMXID[puppet.CustomMXID] = puppet
  144. }
  145. puppet.bridge.AS.StateStore.MarkRegistered(puppet.CustomMXID)
  146. puppet.Update()
  147. // TODO leave rooms with default puppet
  148. return nil
  149. }