provisioning.go 6.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307
  1. package bridge
  2. import (
  3. "bufio"
  4. "context"
  5. "encoding/json"
  6. "errors"
  7. "fmt"
  8. "net"
  9. "net/http"
  10. "strings"
  11. "time"
  12. "github.com/gorilla/websocket"
  13. log "maunium.net/go/maulogger/v2"
  14. "maunium.net/go/mautrix/id"
  15. "gitlab.com/beeper/discord/remoteauth"
  16. )
  17. const (
  18. SecWebSocketProtocol = "com.gitlab.beeper.discord"
  19. )
  20. type ProvisioningAPI struct {
  21. bridge *Bridge
  22. log log.Logger
  23. }
  24. func newProvisioningAPI(bridge *Bridge) *ProvisioningAPI {
  25. p := &ProvisioningAPI{
  26. bridge: bridge,
  27. log: bridge.log.Sub("Provisioning"),
  28. }
  29. prefix := bridge.Config.Appservice.Provisioning.Prefix
  30. p.log.Debugln("Enabling provisioning API at", prefix)
  31. r := bridge.as.Router.PathPrefix(prefix).Subrouter()
  32. r.Use(p.authMiddleware)
  33. r.HandleFunc("/ping", p.Ping).Methods(http.MethodGet)
  34. r.HandleFunc("/login", p.Login).Methods(http.MethodGet)
  35. r.HandleFunc("/logout", p.Logout).Methods(http.MethodPost)
  36. return p
  37. }
  38. func jsonResponse(w http.ResponseWriter, status int, response interface{}) {
  39. w.Header().Add("Content-Type", "application/json")
  40. w.WriteHeader(status)
  41. json.NewEncoder(w).Encode(response)
  42. }
  43. // Response structs
  44. type Response struct {
  45. Success bool `json:"success"`
  46. Status string `json:"status"`
  47. }
  48. type Error struct {
  49. Success bool `json:"success"`
  50. Error string `json:"error"`
  51. ErrCode string `json:"errcode"`
  52. }
  53. // Wrapped http.ResponseWriter to capture the status code
  54. type responseWrap struct {
  55. http.ResponseWriter
  56. statusCode int
  57. }
  58. var _ http.Hijacker = (*responseWrap)(nil)
  59. func (rw *responseWrap) WriteHeader(statusCode int) {
  60. rw.ResponseWriter.WriteHeader(statusCode)
  61. rw.statusCode = statusCode
  62. }
  63. func (rw *responseWrap) Hijack() (net.Conn, *bufio.ReadWriter, error) {
  64. hijacker, ok := rw.ResponseWriter.(http.Hijacker)
  65. if !ok {
  66. return nil, nil, errors.New("response does not implement http.Hijacker")
  67. }
  68. return hijacker.Hijack()
  69. }
  70. // Middleware
  71. func (p *ProvisioningAPI) authMiddleware(h http.Handler) http.Handler {
  72. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
  73. auth := r.Header.Get("Authorization")
  74. // Special case the login endpoint to use the discord qrcode auth
  75. if auth == "" && strings.HasSuffix(r.URL.Path, "/login") {
  76. authParts := strings.Split(r.Header.Get("Sec-WebSocket-Protocol"), ",")
  77. for _, part := range authParts {
  78. part = strings.TrimSpace(part)
  79. if strings.HasPrefix(part, SecWebSocketProtocol+"-") {
  80. auth = part[len(SecWebSocketProtocol+"-"):]
  81. break
  82. }
  83. }
  84. } else if strings.HasPrefix(auth, "Bearer ") {
  85. auth = auth[len("Bearer "):]
  86. }
  87. if auth != p.bridge.Config.Appservice.Provisioning.SharedSecret {
  88. jsonResponse(w, http.StatusForbidden, map[string]interface{}{
  89. "error": "Invalid auth token",
  90. "errcode": "M_FORBIDDEN",
  91. })
  92. return
  93. }
  94. userID := r.URL.Query().Get("user_id")
  95. user := p.bridge.GetUserByMXID(id.UserID(userID))
  96. start := time.Now()
  97. wWrap := &responseWrap{w, 200}
  98. h.ServeHTTP(wWrap, r.WithContext(context.WithValue(r.Context(), "user", user)))
  99. duration := time.Now().Sub(start).Seconds()
  100. p.log.Infofln("%s %s from %s took %.2f seconds and returned status %d", r.Method, r.URL.Path, user.MXID, duration, wWrap.statusCode)
  101. })
  102. }
  103. // websocket upgrader
  104. var upgrader = websocket.Upgrader{
  105. CheckOrigin: func(r *http.Request) bool {
  106. return true
  107. },
  108. Subprotocols: []string{SecWebSocketProtocol},
  109. }
  110. // Handlers
  111. func (p *ProvisioningAPI) Ping(w http.ResponseWriter, r *http.Request) {
  112. user := r.Context().Value("user").(*User)
  113. discord := map[string]interface{}{
  114. "has_session": user.Session != nil,
  115. "management_room": user.ManagementRoom,
  116. "conn": nil,
  117. }
  118. if user.ID != "" {
  119. discord["id"] = user.ID
  120. }
  121. if user.Session != nil {
  122. discord["conn"] = map[string]interface{}{
  123. "last_heartbeat_ack": user.Session.LastHeartbeatAck,
  124. "last_heartbeat_sent": user.Session.LastHeartbeatSent,
  125. }
  126. }
  127. resp := map[string]interface{}{
  128. "mxid": user.MXID,
  129. "discord": discord,
  130. }
  131. jsonResponse(w, http.StatusOK, resp)
  132. }
  133. func (p *ProvisioningAPI) Logout(w http.ResponseWriter, r *http.Request) {
  134. user := r.Context().Value("user").(*User)
  135. force := strings.ToLower(r.URL.Query().Get("force")) != "false"
  136. if user.Session == nil {
  137. if force {
  138. jsonResponse(w, http.StatusOK, Response{true, "Logged out successfully."})
  139. } else {
  140. jsonResponse(w, http.StatusNotFound, Error{
  141. Error: "You're not logged in",
  142. ErrCode: "not logged in",
  143. })
  144. }
  145. return
  146. }
  147. err := user.DeleteSession()
  148. if err != nil {
  149. user.log.Warnln("Error while logging out:", err)
  150. if !force {
  151. jsonResponse(w, http.StatusInternalServerError, Error{
  152. Error: fmt.Sprintf("Unknown error while logging out: %v", err),
  153. ErrCode: err.Error(),
  154. })
  155. return
  156. }
  157. }
  158. jsonResponse(w, http.StatusOK, Response{true, "Logged out successfully."})
  159. }
  160. func (p *ProvisioningAPI) Login(w http.ResponseWriter, r *http.Request) {
  161. userID := r.URL.Query().Get("user_id")
  162. user := p.bridge.GetUserByMXID(id.UserID(userID))
  163. c, err := upgrader.Upgrade(w, r, nil)
  164. if err != nil {
  165. p.log.Errorln("Failed to upgrade connection to websocket:", err)
  166. return
  167. }
  168. defer func() {
  169. err := c.Close()
  170. if err != nil {
  171. user.log.Debugln("Error closing websocket:", err)
  172. }
  173. }()
  174. go func() {
  175. // Read everything so SetCloseHandler() works
  176. for {
  177. _, _, err = c.ReadMessage()
  178. if err != nil {
  179. break
  180. }
  181. }
  182. }()
  183. ctx, cancel := context.WithCancel(context.Background())
  184. c.SetCloseHandler(func(code int, text string) error {
  185. user.log.Debugfln("Login websocket closed (%d), cancelling login", code)
  186. cancel()
  187. return nil
  188. })
  189. client, err := remoteauth.New()
  190. if err != nil {
  191. user.log.Errorf("Failed to log in from provisioning API:", err)
  192. c.WriteJSON(Error{
  193. Error: "Failed to connect to Discord",
  194. ErrCode: "connection error",
  195. })
  196. }
  197. qrChan := make(chan string)
  198. doneChan := make(chan struct{})
  199. user.log.Debugln("Started login via provisioning API")
  200. err = client.Dial(ctx, qrChan, doneChan)
  201. if err != nil {
  202. close(qrChan)
  203. close(doneChan)
  204. }
  205. for {
  206. select {
  207. case qrCode, ok := <-qrChan:
  208. if !ok {
  209. continue
  210. }
  211. c.WriteJSON(map[string]interface{}{
  212. "code": qrCode,
  213. "timeout": 120, // TODO: move this to the library or something
  214. })
  215. case <-doneChan:
  216. discordUser, err := client.Result()
  217. if err != nil {
  218. c.WriteJSON(Error{
  219. Error: "Failed to connect to Discord",
  220. ErrCode: "connection error",
  221. })
  222. p.log.Errorfln("failed to login via qrcode:", err)
  223. return
  224. }
  225. if err := user.Login(discordUser.Token); err != nil {
  226. c.WriteJSON(Error{
  227. Error: "Failed to connect to Discord",
  228. ErrCode: "connection error",
  229. })
  230. p.log.Errorfln("failed to login via qrcode:", err)
  231. return
  232. }
  233. user.ID = discordUser.UserID
  234. user.Update()
  235. c.WriteJSON(map[string]interface{}{
  236. "success": true,
  237. "id": user.ID,
  238. })
  239. return
  240. case <-ctx.Done():
  241. return
  242. }
  243. }
  244. }