matrix.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376
  1. package bridge
  2. import (
  3. "errors"
  4. "fmt"
  5. "strings"
  6. "time"
  7. "maunium.net/go/maulogger/v2"
  8. "maunium.net/go/mautrix"
  9. "maunium.net/go/mautrix/appservice"
  10. "maunium.net/go/mautrix/event"
  11. "maunium.net/go/mautrix/format"
  12. "maunium.net/go/mautrix/id"
  13. )
  14. type matrixHandler struct {
  15. as *appservice.AppService
  16. bridge *Bridge
  17. log maulogger.Logger
  18. cmd *commandHandler
  19. }
  20. func (b *Bridge) setupEvents() {
  21. b.eventProcessor = appservice.NewEventProcessor(b.as)
  22. b.matrixHandler = &matrixHandler{
  23. as: b.as,
  24. bridge: b,
  25. log: b.log.Sub("Matrix"),
  26. cmd: newCommandHandler(b),
  27. }
  28. b.eventProcessor.On(event.EventMessage, b.matrixHandler.handleMessage)
  29. b.eventProcessor.On(event.EventEncrypted, b.matrixHandler.handleEncrypted)
  30. b.eventProcessor.On(event.EventReaction, b.matrixHandler.handleReaction)
  31. b.eventProcessor.On(event.EventRedaction, b.matrixHandler.handleRedaction)
  32. b.eventProcessor.On(event.StateMember, b.matrixHandler.handleMembership)
  33. b.eventProcessor.On(event.StateEncryption, b.matrixHandler.handleEncryption)
  34. }
  35. func (mh *matrixHandler) join(evt *event.Event, intent *appservice.IntentAPI) *mautrix.RespJoinedMembers {
  36. resp, err := intent.JoinRoomByID(evt.RoomID)
  37. if err != nil {
  38. mh.log.Debugfln("Failed to join room %s as %s with invite from %s: %v", evt.RoomID, intent.UserID, evt.Sender, err)
  39. return nil
  40. }
  41. members, err := intent.JoinedMembers(resp.RoomID)
  42. if err != nil {
  43. intent.LeaveRoom(resp.RoomID)
  44. mh.log.Debugfln("Failed to get members in room %s after accepting invite from %s as %s: %v", resp.RoomID, evt.Sender, intent.UserID, err)
  45. return nil
  46. }
  47. if len(members.Joined) < 2 {
  48. intent.LeaveRoom(resp.RoomID)
  49. mh.log.Debugln("Leaving empty room", resp.RoomID, "after accepting invite from", evt.Sender, "as", intent.UserID)
  50. return nil
  51. }
  52. return members
  53. }
  54. func (mh *matrixHandler) ignoreEvent(evt *event.Event) bool {
  55. return false
  56. }
  57. func (mh *matrixHandler) handleMessage(evt *event.Event) {
  58. if mh.ignoreEvent(evt) {
  59. return
  60. }
  61. user := mh.bridge.GetUserByMXID(evt.Sender)
  62. if user == nil {
  63. mh.log.Debugln("unknown user", evt.Sender)
  64. return
  65. }
  66. content := evt.Content.AsMessage()
  67. content.RemoveReplyFallback()
  68. if content.MsgType == event.MsgText {
  69. prefix := mh.bridge.Config.Bridge.CommandPrefix
  70. hasPrefix := strings.HasPrefix(content.Body, prefix)
  71. if hasPrefix {
  72. content.Body = strings.TrimLeft(content.Body[len(prefix):], " ")
  73. }
  74. if hasPrefix || evt.RoomID == user.ManagementRoom {
  75. mh.cmd.handle(evt.RoomID, user, content.Body, content.GetReplyTo())
  76. return
  77. }
  78. }
  79. portal := mh.bridge.GetPortalByMXID(evt.RoomID)
  80. if portal != nil {
  81. portal.matrixMessages <- portalMatrixMessage{user: user, evt: evt}
  82. }
  83. }
  84. func (mh *matrixHandler) joinAndCheckMembers(evt *event.Event, intent *appservice.IntentAPI) int {
  85. resp, err := intent.JoinRoomByID(evt.RoomID)
  86. if err != nil {
  87. mh.log.Debugfln("Failed to join room %q as %q with invite from %q: %v", evt.RoomID, intent.UserID, evt.Sender, err)
  88. return 0
  89. }
  90. members, err := intent.Members(resp.RoomID)
  91. if err != nil {
  92. mh.log.Debugfln("Failed to get members in room %q with invite from %q as %q: %v", resp.RoomID, evt.Sender, intent.UserID, err)
  93. return 0
  94. }
  95. if len(members.Chunk) < 2 {
  96. mh.log.Debugfln("Leaving empty room %q with invite from %q as %q", resp.RoomID, evt.Sender, intent.UserID)
  97. intent.LeaveRoom(resp.RoomID)
  98. return 0
  99. }
  100. return len(members.Chunk)
  101. }
  102. func (mh *matrixHandler) sendNoticeWithmarkdown(roomID id.RoomID, message string) (*mautrix.RespSendEvent, error) {
  103. intent := mh.as.BotIntent()
  104. content := format.RenderMarkdown(message, true, false)
  105. content.MsgType = event.MsgNotice
  106. return intent.SendMessageEvent(roomID, event.EventMessage, content)
  107. }
  108. func (mh *matrixHandler) handleBotInvite(evt *event.Event) {
  109. intent := mh.as.BotIntent()
  110. user := mh.bridge.GetUserByMXID(evt.Sender)
  111. if user == nil {
  112. return
  113. }
  114. members := mh.joinAndCheckMembers(evt, intent)
  115. if members == 0 {
  116. return
  117. }
  118. // If this is a DM and the user doesn't have a management room, make this
  119. // the management room.
  120. if members == 2 && (user.ManagementRoom == "" || evt.Content.AsMember().IsDirect) {
  121. user.SetManagementRoom(evt.RoomID)
  122. intent.SendNotice(user.ManagementRoom, "This room has been registered as your bridge management/status room")
  123. mh.log.Debugfln("%q registered as management room with %q", evt.RoomID, evt.Sender)
  124. }
  125. if evt.RoomID == user.ManagementRoom {
  126. // Wait to send the welcome message until we're sure we're not in an empty
  127. // room.
  128. mh.sendNoticeWithmarkdown(evt.RoomID, mh.bridge.Config.Bridge.ManagementRoomText.Welcome)
  129. if user.Connected() {
  130. mh.sendNoticeWithmarkdown(evt.RoomID, mh.bridge.Config.Bridge.ManagementRoomText.Connected)
  131. } else {
  132. mh.sendNoticeWithmarkdown(evt.RoomID, mh.bridge.Config.Bridge.ManagementRoomText.NotConnected)
  133. }
  134. additionalHelp := mh.bridge.Config.Bridge.ManagementRoomText.AdditionalHelp
  135. if additionalHelp != "" {
  136. mh.sendNoticeWithmarkdown(evt.RoomID, additionalHelp)
  137. }
  138. }
  139. }
  140. func (mh *matrixHandler) handlePuppetInvite(evt *event.Event, inviter *User, puppet *Puppet) {
  141. mh.log.Warnln("handling puppet invite!")
  142. }
  143. func (mh *matrixHandler) handleMembership(evt *event.Event) {
  144. // Return early if we're supposed to ignore the event.
  145. if mh.ignoreEvent(evt) {
  146. return
  147. }
  148. if mh.bridge.crypto != nil {
  149. mh.bridge.crypto.HandleMemberEvent(evt)
  150. }
  151. // Grab the content of the event.
  152. content := evt.Content.AsMember()
  153. // Check if this is a new conversation from a matrix user to the bot
  154. if content.Membership == event.MembershipInvite && id.UserID(evt.GetStateKey()) == mh.as.BotMXID() {
  155. mh.handleBotInvite(evt)
  156. return
  157. }
  158. // Load or create a new user.
  159. user := mh.bridge.GetUserByMXID(evt.Sender)
  160. if user == nil {
  161. return
  162. }
  163. puppet := mh.bridge.GetPuppetByMXID(id.UserID(evt.GetStateKey()))
  164. // Load or create a new portal.
  165. portal := mh.bridge.GetPortalByMXID(evt.RoomID)
  166. if portal == nil {
  167. if content.Membership == event.MembershipInvite && puppet != nil {
  168. mh.handlePuppetInvite(evt, user, puppet)
  169. }
  170. return
  171. }
  172. isSelf := id.UserID(evt.GetStateKey()) == evt.Sender
  173. if content.Membership == event.MembershipLeave {
  174. if evt.Unsigned.PrevContent != nil {
  175. _ = evt.Unsigned.PrevContent.ParseRaw(evt.Type)
  176. prevContent, ok := evt.Unsigned.PrevContent.Parsed.(*event.MemberEventContent)
  177. if ok && prevContent.Membership != "join" {
  178. return
  179. }
  180. }
  181. if isSelf {
  182. portal.handleMatrixLeave(user)
  183. } else if puppet != nil {
  184. portal.handleMatrixKick(user, puppet)
  185. }
  186. } else if content.Membership == event.MembershipInvite {
  187. portal.handleMatrixInvite(user, evt)
  188. }
  189. }
  190. func (mh *matrixHandler) handleReaction(evt *event.Event) {
  191. if mh.ignoreEvent(evt) {
  192. return
  193. }
  194. portal := mh.bridge.GetPortalByMXID(evt.RoomID)
  195. if portal != nil {
  196. portal.handleMatrixReaction(evt)
  197. }
  198. }
  199. func (mh *matrixHandler) handleRedaction(evt *event.Event) {
  200. if mh.ignoreEvent(evt) {
  201. return
  202. }
  203. portal := mh.bridge.GetPortalByMXID(evt.RoomID)
  204. if portal != nil {
  205. portal.handleMatrixRedaction(evt)
  206. }
  207. }
  208. func (mh *matrixHandler) handleEncryption(evt *event.Event) {
  209. if evt.Content.AsEncryption().Algorithm != id.AlgorithmMegolmV1 {
  210. return
  211. }
  212. portal := mh.bridge.GetPortalByMXID(evt.RoomID)
  213. if portal != nil && !portal.Encrypted {
  214. mh.log.Debugfln("%s enabled encryption in %s", evt.Sender, evt.RoomID)
  215. portal.Encrypted = true
  216. portal.Update()
  217. }
  218. }
  219. const sessionWaitTimeout = 5 * time.Second
  220. func (mh *matrixHandler) handleEncrypted(evt *event.Event) {
  221. if mh.ignoreEvent(evt) || mh.bridge.crypto == nil {
  222. return
  223. }
  224. decrypted, err := mh.bridge.crypto.Decrypt(evt)
  225. decryptionRetryCount := 0
  226. if errors.Is(err, NoSessionFound) {
  227. content := evt.Content.AsEncrypted()
  228. mh.log.Debugfln("Couldn't find session %s trying to decrypt %s, waiting %d seconds...", content.SessionID, evt.ID, int(sessionWaitTimeout.Seconds()))
  229. mh.as.SendErrorMessageSendCheckpoint(evt, appservice.StepDecrypted, err, false, decryptionRetryCount)
  230. decryptionRetryCount++
  231. if mh.bridge.crypto.WaitForSession(evt.RoomID, content.SenderKey, content.SessionID, sessionWaitTimeout) {
  232. mh.log.Debugfln("Got session %s after waiting, trying to decrypt %s again", content.SessionID, evt.ID)
  233. decrypted, err = mh.bridge.crypto.Decrypt(evt)
  234. } else {
  235. mh.as.SendErrorMessageSendCheckpoint(evt, appservice.StepDecrypted, fmt.Errorf("didn't receive encryption keys"), false, decryptionRetryCount)
  236. go mh.waitLongerForSession(evt)
  237. return
  238. }
  239. }
  240. if err != nil {
  241. mh.as.SendErrorMessageSendCheckpoint(evt, appservice.StepDecrypted, err, true, decryptionRetryCount)
  242. mh.log.Warnfln("Failed to decrypt %s: %v", evt.ID, err)
  243. _, _ = mh.bridge.bot.SendNotice(evt.RoomID, fmt.Sprintf(
  244. "\u26a0 Your message was not bridged: %v", err))
  245. return
  246. }
  247. mh.as.SendMessageSendCheckpoint(decrypted, appservice.StepDecrypted, decryptionRetryCount)
  248. mh.bridge.eventProcessor.Dispatch(decrypted)
  249. }
  250. func (mh *matrixHandler) waitLongerForSession(evt *event.Event) {
  251. const extendedTimeout = sessionWaitTimeout * 3
  252. content := evt.Content.AsEncrypted()
  253. mh.log.Debugfln("Couldn't find session %s trying to decrypt %s, waiting %d more seconds...",
  254. content.SessionID, evt.ID, int(extendedTimeout.Seconds()))
  255. go mh.bridge.crypto.RequestSession(evt.RoomID, content.SenderKey, content.SessionID, evt.Sender, content.DeviceID)
  256. resp, err := mh.bridge.bot.SendNotice(evt.RoomID, fmt.Sprintf(
  257. "\u26a0 Your message was not bridged: the bridge hasn't received the decryption keys. "+
  258. "The bridge will retry for %d seconds. If this error keeps happening, try restarting your client.",
  259. int(extendedTimeout.Seconds())))
  260. if err != nil {
  261. mh.log.Errorfln("Failed to send decryption error to %s: %v", evt.RoomID, err)
  262. }
  263. update := event.MessageEventContent{MsgType: event.MsgNotice}
  264. if mh.bridge.crypto.WaitForSession(evt.RoomID, content.SenderKey, content.SessionID, extendedTimeout) {
  265. mh.log.Debugfln("Got session %s after waiting more, trying to decrypt %s again", content.SessionID, evt.ID)
  266. decrypted, err := mh.bridge.crypto.Decrypt(evt)
  267. if err == nil {
  268. mh.as.SendMessageSendCheckpoint(decrypted, appservice.StepDecrypted, 2)
  269. mh.bridge.eventProcessor.Dispatch(decrypted)
  270. _, _ = mh.bridge.bot.RedactEvent(evt.RoomID, resp.EventID)
  271. return
  272. }
  273. mh.log.Warnfln("Failed to decrypt %s: %v", evt.ID, err)
  274. mh.as.SendErrorMessageSendCheckpoint(evt, appservice.StepDecrypted, err, true, 2)
  275. update.Body = fmt.Sprintf("\u26a0 Your message was not bridged: %v", err)
  276. } else {
  277. mh.log.Debugfln("Didn't get %s, giving up on %s", content.SessionID, evt.ID)
  278. mh.as.SendErrorMessageSendCheckpoint(evt, appservice.StepDecrypted, fmt.Errorf("didn't receive encryption keys"), true, 2)
  279. update.Body = "\u26a0 Your message was not bridged: the bridge hasn't received the decryption keys. " +
  280. "If this error keeps happening, try restarting your client."
  281. }
  282. newContent := update
  283. update.NewContent = &newContent
  284. if resp != nil {
  285. update.RelatesTo = &event.RelatesTo{
  286. Type: event.RelReplace,
  287. EventID: resp.EventID,
  288. }
  289. }
  290. _, err = mh.bridge.bot.SendMessageEvent(evt.RoomID, event.EventMessage, &update)
  291. if err != nil {
  292. mh.log.Debugfln("Failed to update decryption error notice %s: %v", resp.EventID, err)
  293. }
  294. }