provisioning_api.py 6.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158
  1. # mautrix-signal - A Matrix-Signal puppeting bridge
  2. # Copyright (C) 2020 Tulir Asokan
  3. #
  4. # This program is free software: you can redistribute it and/or modify
  5. # it under the terms of the GNU Affero General Public License as published by
  6. # the Free Software Foundation, either version 3 of the License, or
  7. # (at your option) any later version.
  8. #
  9. # This program is distributed in the hope that it will be useful,
  10. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. # GNU Affero General Public License for more details.
  13. #
  14. # You should have received a copy of the GNU Affero General Public License
  15. # along with this program. If not, see <https://www.gnu.org/licenses/>.
  16. from typing import Awaitable, Dict, TYPE_CHECKING
  17. import logging
  18. import json
  19. from aiohttp import web
  20. from mausignald.types import Address
  21. from mausignald.errors import TimeoutException
  22. from mautrix.types import UserID
  23. from mautrix.util.logging import TraceLogger
  24. from .. import user as u
  25. if TYPE_CHECKING:
  26. from ..__main__ import SignalBridge
  27. class ProvisioningAPI:
  28. log: TraceLogger = logging.getLogger("mau.web.provisioning")
  29. app: web.Application
  30. bridge: 'SignalBridge'
  31. def __init__(self, bridge: 'SignalBridge', shared_secret: str) -> None:
  32. self.bridge = bridge
  33. self.app = web.Application()
  34. self.shared_secret = shared_secret
  35. self.app.router.add_get("/api/whoami", self.status)
  36. self.app.router.add_options("/api/link", self.login_options)
  37. self.app.router.add_options("/api/link/wait", self.login_options)
  38. # self.app.router.add_options("/api/register", self.login_options)
  39. # self.app.router.add_options("/api/register/code", self.login_options)
  40. self.app.router.add_options("/api/logout", self.login_options)
  41. self.app.router.add_post("/api/link", self.link)
  42. self.app.router.add_post("/api/link/wait", self.link_wait)
  43. # self.app.router.add_post("/api/register", self.register)
  44. # self.app.router.add_post("/api/register/code", self.register_code)
  45. self.app.router.add_post("/api/logout", self.logout)
  46. @property
  47. def _acao_headers(self) -> Dict[str, str]:
  48. return {
  49. "Access-Control-Allow-Origin": "*",
  50. "Access-Control-Allow-Headers": "Authorization, Content-Type",
  51. "Access-Control-Allow-Methods": "POST, OPTIONS",
  52. }
  53. @property
  54. def _headers(self) -> Dict[str, str]:
  55. return {
  56. **self._acao_headers,
  57. "Content-Type": "application/json",
  58. }
  59. async def login_options(self, _: web.Request) -> web.Response:
  60. return web.Response(status=200, headers=self._headers)
  61. def check_token(self, request: web.Request) -> Awaitable['u.User']:
  62. try:
  63. token = request.headers["Authorization"]
  64. token = token[len("Bearer "):]
  65. except KeyError:
  66. raise web.HTTPBadRequest(text='{"error": "Missing Authorization header"}',
  67. headers=self._headers)
  68. except IndexError:
  69. raise web.HTTPBadRequest(text='{"error": "Malformed Authorization header"}',
  70. headers=self._headers)
  71. if token != self.shared_secret:
  72. raise web.HTTPForbidden(text='{"error": "Invalid token"}', headers=self._headers)
  73. try:
  74. user_id = request.query["user_id"]
  75. except KeyError:
  76. raise web.HTTPBadRequest(text='{"error": "Missing user_id query param"}',
  77. headers=self._headers)
  78. return u.User.get_by_mxid(UserID(user_id))
  79. async def status(self, request: web.Request) -> web.Response:
  80. user = await self.check_token(request)
  81. data = {
  82. "permissions": user.permission_level,
  83. "mxid": user.mxid,
  84. "signal": None,
  85. }
  86. if await user.is_logged_in():
  87. profile = await self.bridge.signal.get_profile(username=user.username,
  88. address=Address(number=user.username))
  89. addr = profile.address if profile else None
  90. number = addr.number if addr else None
  91. uuid = addr.uuid if addr else None
  92. data["signal"] = {
  93. "number": number or user.username,
  94. "uuid": str(uuid or user.uuid or ""),
  95. "name": profile.name if profile else None,
  96. }
  97. return web.json_response(data, headers=self._acao_headers)
  98. async def link(self, request: web.Request) -> web.Response:
  99. user = await self.check_token(request)
  100. try:
  101. data = await request.json()
  102. except json.JSONDecodeError:
  103. raise web.HTTPBadRequest(text='{"error": "Malformed JSON"}', headers=self._headers)
  104. device_name = data.get("device_name", "Mautrix-Signal bridge")
  105. sess = await self.bridge.signal.start_link()
  106. user.command_status = {
  107. "action": "Link",
  108. "session_id": sess.session_id,
  109. "device_name": device_name,
  110. }
  111. return web.json_response({"uri": sess.uri}, headers=self._acao_headers)
  112. async def link_wait(self, request: web.Request) -> web.Response:
  113. user = await self.check_token(request)
  114. if not user.command_status or user.command_status["action"] != "Link":
  115. raise web.HTTPBadRequest(text='{"error": "No Signal linking started"}',
  116. headers=self._headers)
  117. session_id = user.command_status["session_id"]
  118. device_name = user.command_status["device_name"]
  119. try:
  120. account = await self.bridge.signal.finish_link(session_id=session_id,
  121. device_name=device_name)
  122. except TimeoutException:
  123. raise web.HTTPBadRequest(text='{"error": "Signal linking timed out"}',
  124. headers=self._headers)
  125. except Exception:
  126. self.log.exception("Fatal error while waiting for linking to finish")
  127. raise web.HTTPInternalServerError(text='{"error": "Fatal error in Signal linking"}',
  128. headers=self._headers)
  129. else:
  130. await user.on_signin(account)
  131. return web.json_response(account.address.serialize())
  132. async def logout(self, request: web.Request) -> web.Response:
  133. user = await self.check_token(request)
  134. if not user.username:
  135. raise web.HTTPNotFound(text='''{"error": "You're not logged in"}''',
  136. headers=self._headers)
  137. await user.logout()
  138. return web.json_response({}, headers=self._acao_headers)