portal.py 87 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165
  1. # mautrix-signal - A Matrix-Signal puppeting bridge
  2. # Copyright (C) 2022 Tulir Asokan
  3. #
  4. # This program is free software: you can redistribute it and/or modify
  5. # it under the terms of the GNU Affero General Public License as published by
  6. # the Free Software Foundation, either version 3 of the License, or
  7. # (at your option) any later version.
  8. #
  9. # This program is distributed in the hope that it will be useful,
  10. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. # GNU Affero General Public License for more details.
  13. #
  14. # You should have received a copy of the GNU Affero General Public License
  15. # along with this program. If not, see <https://www.gnu.org/licenses/>.
  16. from __future__ import annotations
  17. from typing import TYPE_CHECKING, Any, AsyncGenerator, Awaitable, Callable, Union, cast
  18. from collections import deque
  19. from uuid import UUID, uuid4
  20. import asyncio
  21. import hashlib
  22. import mimetypes
  23. import os
  24. import os.path
  25. import pathlib
  26. import time
  27. from mausignald.errors import (
  28. AttachmentTooLargeError,
  29. NotConnected,
  30. ProfileUnavailableError,
  31. RPCError,
  32. )
  33. from mausignald.types import (
  34. AccessControlMode,
  35. Address,
  36. AnnouncementsMode,
  37. Attachment,
  38. Group,
  39. GroupAccessControl,
  40. GroupID,
  41. GroupMember,
  42. GroupMemberRole,
  43. GroupV2,
  44. GroupV2ID,
  45. LinkPreview,
  46. Mention,
  47. MessageData,
  48. Profile,
  49. Quote,
  50. QuotedAttachment,
  51. Reaction,
  52. SharedContact,
  53. Sticker,
  54. )
  55. from mautrix.appservice import AppService, IntentAPI
  56. from mautrix.bridge import BasePortal, RejectMatrixInvite, async_getter_lock
  57. from mautrix.errors import IntentError, MatrixError, MForbidden
  58. from mautrix.types import (
  59. AudioInfo,
  60. BeeperMessageStatusEventContent,
  61. ContentURI,
  62. EncryptedEvent,
  63. EncryptedFile,
  64. EventID,
  65. EventType,
  66. FileInfo,
  67. ImageInfo,
  68. LocationMessageEventContent,
  69. MediaMessageEventContent,
  70. Membership,
  71. MessageEvent,
  72. MessageEventContent,
  73. MessageStatus,
  74. MessageStatusReason,
  75. MessageType,
  76. PowerLevelStateEventContent,
  77. RelatesTo,
  78. RelationType,
  79. RoomID,
  80. TextMessageEventContent,
  81. UserID,
  82. VideoInfo,
  83. )
  84. from mautrix.util import ffmpeg, variation_selector
  85. from mautrix.util.format_duration import format_duration
  86. from mautrix.util.message_send_checkpoint import MessageSendCheckpointStatus
  87. from . import matrix as m, puppet as p, signal as s, user as u
  88. from .config import Config
  89. from .db import (
  90. DisappearingMessage,
  91. Message as DBMessage,
  92. Portal as DBPortal,
  93. Reaction as DBReaction,
  94. )
  95. from .formatter import matrix_to_signal, signal_to_matrix
  96. from .util import id_to_str
  97. if TYPE_CHECKING:
  98. from .__main__ import SignalBridge
  99. try:
  100. from mautrix.crypto.attachments import decrypt_attachment, encrypt_attachment
  101. except ImportError:
  102. encrypt_attachment = decrypt_attachment = None
  103. try:
  104. from signalstickers_client import StickersClient
  105. from signalstickers_client.models import StickerPack
  106. except ImportError:
  107. StickersClient = StickerPack = None
  108. try:
  109. from mautrix.util import magic
  110. except ImportError:
  111. magic = None
  112. StateBridge = EventType.find("m.bridge", EventType.Class.STATE)
  113. StateHalfShotBridge = EventType.find("uk.half-shot.bridge", EventType.Class.STATE)
  114. ChatInfo = Union[Group, GroupV2, GroupV2ID, Profile, Address]
  115. MAX_MATRIX_MESSAGE_SIZE = 30000
  116. BEEPER_LINK_PREVIEWS_KEY = "com.beeper.linkpreviews"
  117. BEEPER_IMAGE_ENCRYPTION_KEY = "beeper:image:encryption"
  118. class UnknownReactionTarget(Exception):
  119. pass
  120. class Portal(DBPortal, BasePortal):
  121. by_mxid: dict[RoomID, Portal] = {}
  122. by_chat_id: dict[tuple[str, str], Portal] = {}
  123. _sticker_meta_cache: dict[str, StickerPack] = {}
  124. disappearing_msg_class = DisappearingMessage
  125. config: Config
  126. matrix: m.MatrixHandler
  127. signal: s.SignalHandler
  128. az: AppService
  129. private_chat_portal_meta: bool
  130. expiration_time: int | None
  131. _main_intent: IntentAPI | None
  132. _create_room_lock: asyncio.Lock
  133. _msgts_dedup: deque[tuple[Address, int]]
  134. _reaction_dedup: deque[tuple[Address, int, str, Address, bool]]
  135. _reaction_lock: asyncio.Lock
  136. _pending_members: set[UUID] | None
  137. _expiration_lock: asyncio.Lock
  138. def __init__(
  139. self,
  140. chat_id: GroupID | Address,
  141. receiver: str,
  142. mxid: RoomID | None = None,
  143. name: str | None = None,
  144. topic: str | None = None,
  145. avatar_hash: str | None = None,
  146. avatar_url: ContentURI | None = None,
  147. name_set: bool = False,
  148. avatar_set: bool = False,
  149. revision: int = 0,
  150. encrypted: bool = False,
  151. relay_user_id: UserID | None = None,
  152. expiration_time: int | None = None,
  153. ) -> None:
  154. super().__init__(
  155. chat_id=chat_id,
  156. receiver=receiver,
  157. mxid=mxid,
  158. name=name,
  159. topic=topic,
  160. avatar_hash=avatar_hash,
  161. avatar_url=avatar_url,
  162. name_set=name_set,
  163. avatar_set=avatar_set,
  164. revision=revision,
  165. encrypted=encrypted,
  166. relay_user_id=relay_user_id,
  167. expiration_time=expiration_time,
  168. )
  169. BasePortal.__init__(self)
  170. self._create_room_lock = asyncio.Lock()
  171. self.log = self.log.getChild(self.chat_id_str)
  172. self._main_intent = None
  173. self._msgts_dedup = deque(maxlen=100)
  174. self._reaction_dedup = deque(maxlen=100)
  175. self._last_participant_update = set()
  176. self._reaction_lock = asyncio.Lock()
  177. self._pending_members = None
  178. self._relay_user = None
  179. self._expiration_lock = asyncio.Lock()
  180. @property
  181. def main_intent(self) -> IntentAPI:
  182. if not self._main_intent:
  183. raise ValueError("Portal must be postinit()ed before main_intent can be used")
  184. return self._main_intent
  185. @property
  186. def is_direct(self) -> bool:
  187. return isinstance(self.chat_id, Address)
  188. @property
  189. def disappearing_enabled(self) -> bool:
  190. return self.is_direct or self.config["signal.enable_disappearing_messages_in_groups"]
  191. def handle_uuid_receive(self, uuid: UUID) -> None:
  192. if not self.is_direct or self.chat_id.uuid:
  193. raise ValueError(
  194. "handle_uuid_receive can only be used for private chat portals with a phone "
  195. "number chat_id"
  196. )
  197. del self.by_chat_id[(self.chat_id_str, self.receiver)]
  198. self.chat_id = Address(uuid=uuid)
  199. self.by_chat_id[(self.chat_id_str, self.receiver)] = self
  200. @classmethod
  201. def init_cls(cls, bridge: "SignalBridge") -> None:
  202. cls.config = bridge.config
  203. cls.matrix = bridge.matrix
  204. cls.signal = bridge.signal
  205. cls.az = bridge.az
  206. cls.loop = bridge.loop
  207. BasePortal.bridge = bridge
  208. cls.private_chat_portal_meta = cls.config["bridge.private_chat_portal_meta"]
  209. # region Misc
  210. async def _send_delivery_receipt(self, event_id: EventID) -> None:
  211. if event_id and self.config["bridge.delivery_receipts"]:
  212. try:
  213. await self.az.intent.mark_read(self.mxid, event_id)
  214. except Exception:
  215. self.log.exception("Failed to send delivery receipt for %s", event_id)
  216. async def _upsert_reaction(
  217. self,
  218. existing: DBReaction,
  219. intent: IntentAPI,
  220. mxid: EventID,
  221. sender: p.Puppet | u.User,
  222. message: DBMessage,
  223. emoji: str,
  224. ) -> None:
  225. if existing:
  226. self.log.debug(
  227. f"_upsert_reaction redacting {existing.mxid} and inserting {mxid}"
  228. f" (message: {message.mxid})"
  229. )
  230. try:
  231. await intent.redact(existing.mx_room, existing.mxid)
  232. except MForbidden:
  233. self.log.debug("Unexpected MForbidden redacting reaction", exc_info=True)
  234. await existing.edit(emoji=emoji, mxid=mxid, mx_room=message.mx_room)
  235. else:
  236. self.log.debug(f"_upsert_reaction inserting {mxid} (message: {message.mxid})")
  237. await DBReaction(
  238. mxid=mxid,
  239. mx_room=message.mx_room,
  240. emoji=emoji,
  241. signal_chat_id=self.chat_id,
  242. signal_receiver=self.receiver,
  243. msg_author=message.sender,
  244. msg_timestamp=message.timestamp,
  245. author=sender.address,
  246. ).insert()
  247. # endregion
  248. # region Matrix event handling
  249. @staticmethod
  250. async def _make_attachment(message: MediaMessageEventContent, path: str) -> Attachment:
  251. outgoing_filename = path
  252. if message.msgtype == MessageType.AUDIO:
  253. outgoing_filename = await ffmpeg.convert_path(
  254. path, ".m4a", output_args=("-c:a", "aac"), remove_input=True
  255. )
  256. message.info.mimetype = "audio/mp4"
  257. attachment = Attachment(
  258. custom_filename=message.body,
  259. content_type=message.info.mimetype,
  260. outgoing_filename=str(outgoing_filename),
  261. )
  262. info = message.info
  263. attachment.width = info.get("w", info.get("width", 0))
  264. attachment.height = info.get("h", info.get("height", 0))
  265. attachment.voice_note = message.msgtype == MessageType.AUDIO
  266. return attachment
  267. def _write_outgoing_file(self, data: bytes) -> str:
  268. dir = pathlib.Path(self.config["signal.outgoing_attachment_dir"])
  269. path = dir.joinpath(f"mautrix-signal-{str(uuid4())}")
  270. try:
  271. with open(path, "wb") as file:
  272. file.write(data)
  273. except FileNotFoundError:
  274. dir.mkdir(mode=0o755, parents=True, exist_ok=True)
  275. with open(path, "wb") as file:
  276. file.write(data)
  277. return str(path)
  278. async def _download_matrix_media(self, message: MediaMessageEventContent) -> str:
  279. # Signal limits files to 100 MB
  280. if message.info and message.info.size and message.info.size > 100 * 10**6:
  281. raise AttachmentTooLargeError({"filename": message.body})
  282. if message.file:
  283. data = await self.main_intent.download_media(message.file.url)
  284. data = decrypt_attachment(
  285. data, message.file.key.key, message.file.hashes.get("sha256"), message.file.iv
  286. )
  287. else:
  288. data = await self.main_intent.download_media(message.url)
  289. return self._write_outgoing_file(data)
  290. async def handle_matrix_message(
  291. self, sender: u.User, message: MessageEventContent, event_id: EventID
  292. ) -> None:
  293. try:
  294. await self._handle_matrix_message(sender, message, event_id)
  295. except Exception as e:
  296. self.log.exception(f"Failed to handle Matrix message {event_id}")
  297. status = (
  298. MessageSendCheckpointStatus.UNSUPPORTED
  299. if isinstance(e, AttachmentTooLargeError)
  300. else MessageSendCheckpointStatus.PERM_FAILURE
  301. )
  302. sender.send_remote_checkpoint(
  303. status, event_id, self.mxid, EventType.ROOM_MESSAGE, message.msgtype, error=e
  304. )
  305. await sender.handle_auth_failure(e)
  306. await self._send_error_notice("message", e)
  307. asyncio.create_task(self._send_message_status(event_id, e))
  308. async def _send_error_notice(self, type_name: str, err: Exception) -> None:
  309. if not self.config["bridge.delivery_error_reports"]:
  310. return
  311. message = f"{type(err).__name__}: {err}"
  312. if isinstance(err, NotConnected):
  313. message = "There was an error connecting to signald."
  314. elif isinstance(err, UnknownReactionTarget):
  315. message = "Could not find message to react to on Signal."
  316. await self._send_message(
  317. self.main_intent,
  318. TextMessageEventContent(
  319. msgtype=MessageType.NOTICE,
  320. body=f"\u26a0 Your {type_name} was not bridged: {message}",
  321. ),
  322. )
  323. async def _send_message_status(self, event_id: EventID, err: Exception | None) -> None:
  324. if not self.config["bridge.message_status_events"]:
  325. return
  326. intent = self.az.intent if self.encrypted else self.main_intent
  327. status = BeeperMessageStatusEventContent(
  328. network=self.bridge_info_state_key,
  329. relates_to=RelatesTo(
  330. rel_type=RelationType.REFERENCE,
  331. event_id=event_id,
  332. ),
  333. )
  334. if err:
  335. status.reason = MessageStatusReason.GENERIC_ERROR
  336. status.error = str(err)
  337. if isinstance(err, AttachmentTooLargeError):
  338. status.reason = MessageStatusReason.UNSUPPORTED
  339. status.status = MessageStatus.FAIL
  340. status.message = "too large file (maximum is 100MB)"
  341. elif isinstance(err, UnknownReactionTarget):
  342. status.status = MessageStatus.FAIL
  343. else:
  344. status.status = MessageStatus.RETRIABLE
  345. else:
  346. status.status = MessageStatus.SUCCESS
  347. status.fill_legacy_booleans()
  348. await intent.send_message_event(
  349. room_id=self.mxid,
  350. event_type=EventType.BEEPER_MESSAGE_STATUS,
  351. content=status,
  352. )
  353. async def _beeper_link_preview_to_signal(
  354. self, beeper_link_preview: dict[str, Any]
  355. ) -> LinkPreview | None:
  356. link_preview = LinkPreview(
  357. url=beeper_link_preview["matched_url"],
  358. title=beeper_link_preview.get("og:title", ""),
  359. description=beeper_link_preview.get("og:description", ""),
  360. )
  361. if BEEPER_IMAGE_ENCRYPTION_KEY in beeper_link_preview or "og:image" in beeper_link_preview:
  362. if BEEPER_IMAGE_ENCRYPTION_KEY in beeper_link_preview:
  363. file = EncryptedFile.deserialize(beeper_link_preview[BEEPER_IMAGE_ENCRYPTION_KEY])
  364. data = await self.main_intent.download_media(file.url)
  365. data = decrypt_attachment(data, file.key.key, file.hashes.get("sha256"), file.iv)
  366. else:
  367. data = await self.main_intent.download_media(beeper_link_preview["og:image"])
  368. attachment_path = self._write_outgoing_file(data)
  369. link_preview.attachment = Attachment(
  370. content_type=beeper_link_preview.get("og:image:type"),
  371. outgoing_filename=attachment_path,
  372. width=beeper_link_preview.get("og:image:width", 0),
  373. height=beeper_link_preview.get("og:image:height", 0),
  374. size=beeper_link_preview.get("matrix:image:size", 0),
  375. )
  376. return link_preview
  377. async def _handle_matrix_message(
  378. self, sender: u.User, message: MessageEventContent, event_id: EventID
  379. ) -> None:
  380. orig_sender = sender
  381. sender, is_relay = await self.get_relay_sender(sender, f"message {event_id}")
  382. if not sender:
  383. orig_sender.send_remote_checkpoint(
  384. status=MessageSendCheckpointStatus.PERM_FAILURE,
  385. event_id=event_id,
  386. room_id=self.mxid,
  387. event_type=EventType.ROOM_MESSAGE,
  388. message_type=message.msgtype,
  389. error="user is not logged in",
  390. )
  391. return
  392. elif is_relay:
  393. await self.apply_relay_message_format(orig_sender, message)
  394. request_id = int(time.time() * 1000)
  395. self._msgts_dedup.appendleft((sender.address, request_id))
  396. quote = None
  397. if message.get_reply_to():
  398. reply = await DBMessage.get_by_mxid(message.get_reply_to(), self.mxid)
  399. # TODO include actual text? either store in db or fetch event from homeserver
  400. if reply is not None:
  401. quote = Quote(id=reply.timestamp, author=reply.sender, text="")
  402. # TODO only send this when it's actually a reply to an attachment?
  403. # Neither Signal Android nor iOS seem to care though, so this works too
  404. quote.attachments = [QuotedAttachment("", "")]
  405. attachments: list[Attachment] | None = None
  406. attachment_path: str | None = None
  407. mentions: list[Mention] | None = None
  408. link_previews: list[LinkPreview] | None = None
  409. if message.msgtype.is_text:
  410. text, mentions = await matrix_to_signal(message)
  411. message_previews = message.get(BEEPER_LINK_PREVIEWS_KEY, [])
  412. potential_link_previews = await asyncio.gather(
  413. *(self._beeper_link_preview_to_signal(m) for m in message_previews)
  414. )
  415. link_previews = [p for p in potential_link_previews if p is not None]
  416. elif message.msgtype.is_media:
  417. attachment_path = await self._download_matrix_media(message)
  418. attachment = await self._make_attachment(message, attachment_path)
  419. attachments = [attachment]
  420. text = message.body if is_relay else None
  421. self.log.trace("Formed outgoing attachment %s", attachment)
  422. elif message.msgtype == MessageType.LOCATION:
  423. url = self._matrix_location_to_link(message)
  424. body = message.body.replace(message.geo_uri, "")
  425. sep = "\n" if len(body) > 0 else ""
  426. if url:
  427. text = body + sep + url
  428. else:
  429. self.log.debug(f"Unknown msgtype {message.msgtype} in Matrix message {event_id}")
  430. return
  431. self.log.debug(f"Sending Matrix message {event_id} to Signal with timestamp {request_id}")
  432. retry_count = await self._signal_send_with_retries(
  433. sender,
  434. event_id,
  435. message_type=message.msgtype,
  436. send_fn=lambda *args, **kwargs: self.signal.send(**kwargs),
  437. event_type=EventType.ROOM_MESSAGE,
  438. username=sender.username,
  439. recipient=self.chat_id,
  440. body=text,
  441. mentions=mentions,
  442. previews=link_previews,
  443. quote=quote,
  444. attachments=attachments,
  445. timestamp=request_id,
  446. )
  447. msg = DBMessage(
  448. mxid=event_id,
  449. mx_room=self.mxid,
  450. sender=sender.address,
  451. timestamp=request_id,
  452. signal_chat_id=self.chat_id,
  453. signal_receiver=self.receiver,
  454. )
  455. await msg.insert()
  456. self.log.debug(f"Handled Matrix message {event_id} -> {request_id}")
  457. if attachment_path and self.config["signal.remove_file_after_handling"]:
  458. try:
  459. os.remove(attachment_path)
  460. except FileNotFoundError:
  461. pass
  462. # Handle disappearing messages
  463. if self.expiration_time and self.disappearing_enabled:
  464. dm = DisappearingMessage(self.mxid, event_id, self.expiration_time)
  465. dm.start_timer()
  466. await dm.insert()
  467. asyncio.create_task(self._disappear_event(dm))
  468. sender.send_remote_checkpoint(
  469. MessageSendCheckpointStatus.SUCCESS,
  470. event_id,
  471. self.mxid,
  472. EventType.ROOM_MESSAGE,
  473. message.msgtype,
  474. retry_num=retry_count,
  475. )
  476. await self._send_delivery_receipt(event_id)
  477. asyncio.create_task(self._send_message_status(event_id, err=None))
  478. async def _signal_send_with_retries(
  479. self,
  480. sender: u.User,
  481. event_id: EventID,
  482. send_fn: Callable,
  483. event_type: EventType,
  484. message_type: MessageType | None = None,
  485. **send_args,
  486. ) -> int:
  487. retry_count = 4
  488. last_error_type = NotConnected
  489. for retry_num in range(retry_count):
  490. try:
  491. req_id = uuid4()
  492. self.log.info(
  493. f"Send attempt {retry_num}. Attempting to send {event_id} with {req_id}"
  494. )
  495. await send_fn(sender, event_id, req_id=req_id, **send_args)
  496. return retry_num
  497. except (NotConnected, UnknownReactionTarget) as e:
  498. if retry_num >= retry_count - 1:
  499. break
  500. last_error_type = type(e)
  501. # Only handle NotConnected and UnknownReactionTarget exceptions so that other
  502. # exceptions actually continue to error.
  503. sleep_seconds = retry_num * 2 + 1
  504. msg = (
  505. f"Not connected to signald. Going to sleep for {sleep_seconds}s. Error: {e}"
  506. if isinstance(e, NotConnected)
  507. else f"UnknownReactionTarget: Going to sleep for {sleep_seconds}s. Error: {e}"
  508. )
  509. self.log.exception(msg)
  510. sender.send_remote_checkpoint(
  511. MessageSendCheckpointStatus.WILL_RETRY,
  512. event_id,
  513. self.mxid,
  514. event_type,
  515. message_type=message_type,
  516. error=msg,
  517. retry_num=retry_num,
  518. )
  519. await asyncio.sleep(sleep_seconds)
  520. except Exception as e:
  521. await sender.handle_auth_failure(e)
  522. raise
  523. event_type_name = {
  524. EventType.ROOM_MESSAGE: "message",
  525. EventType.REACTION: "reaction",
  526. }.get(event_type, str(event_type))
  527. raise last_error_type(f"Failed to send {event_type_name} after {retry_count} retries.")
  528. def _matrix_location_to_link(
  529. self,
  530. content: LocationMessageEventContent,
  531. ) -> str:
  532. try:
  533. lat, long = content.geo_uri[len("geo:") :].split(";")[0].split(",")
  534. except (KeyError, ValueError):
  535. self.log.exception("Failed to parse location")
  536. return None
  537. try:
  538. float(lat)
  539. float(long)
  540. except Exception:
  541. self.log.debug("Error: Invalid location " + content.geo_uri)
  542. return None
  543. return self.config["bridge.location_format"].replace("$lat", lat).replace("$long", long)
  544. async def handle_matrix_reaction(
  545. self, sender: u.User, event_id: EventID, reacting_to: EventID, emoji: str
  546. ) -> None:
  547. if not await sender.is_logged_in():
  548. self.log.trace(f"Ignoring reaction by non-logged-in user {sender.mxid}")
  549. return
  550. # Signal doesn't seem to use variation selectors at all
  551. emoji = variation_selector.remove(emoji)
  552. try:
  553. retry_count = await self._signal_send_with_retries(
  554. sender,
  555. event_id,
  556. send_fn=self._handle_matrix_reaction,
  557. event_type=EventType.REACTION,
  558. reacting_to=reacting_to,
  559. emoji=emoji,
  560. )
  561. except Exception as e:
  562. self.log.exception(f"Failed to handle Matrix reaction {event_id} to {reacting_to}")
  563. sender.send_remote_checkpoint(
  564. MessageSendCheckpointStatus.PERM_FAILURE,
  565. event_id,
  566. self.mxid,
  567. EventType.REACTION,
  568. error=e,
  569. )
  570. await self._send_error_notice("reaction", e)
  571. await sender.handle_auth_failure(e)
  572. asyncio.create_task(self._send_message_status(event_id, e))
  573. else:
  574. sender.send_remote_checkpoint(
  575. MessageSendCheckpointStatus.SUCCESS,
  576. event_id,
  577. self.mxid,
  578. EventType.REACTION,
  579. retry_num=retry_count,
  580. )
  581. await self._send_delivery_receipt(event_id)
  582. asyncio.create_task(self._send_message_status(event_id, err=None))
  583. async def _handle_matrix_reaction(
  584. self,
  585. sender: u.User,
  586. event_id: EventID,
  587. reacting_to: EventID,
  588. emoji: str,
  589. req_id: UUID | None = None,
  590. ) -> None:
  591. message = await DBMessage.get_by_mxid(reacting_to, self.mxid)
  592. if not message:
  593. self.log.debug(f"Ignoring reaction to unknown event {reacting_to}")
  594. raise UnknownReactionTarget(f"Ignoring reaction to unknown event {reacting_to}")
  595. async with self._reaction_lock:
  596. existing = await DBReaction.get_by_signal_id(
  597. self.chat_id, self.receiver, message.sender, message.timestamp, sender.address
  598. )
  599. if existing and existing.emoji == emoji:
  600. return
  601. dedup_id = (message.sender, message.timestamp, emoji, sender.address, False)
  602. self._reaction_dedup.appendleft(dedup_id)
  603. reaction = Reaction(
  604. emoji=emoji,
  605. remove=False,
  606. target_author=message.sender,
  607. target_sent_timestamp=message.timestamp,
  608. )
  609. self.log.trace(f"{sender.mxid} reacted to {message.timestamp} with {emoji}")
  610. await self.signal.react(
  611. sender.username, recipient=self.chat_id, reaction=reaction, req_id=req_id
  612. )
  613. await self._upsert_reaction(
  614. existing, self.main_intent, event_id, sender, message, emoji
  615. )
  616. async def handle_matrix_redaction(
  617. self, sender: u.User, event_id: EventID, redaction_event_id: EventID
  618. ) -> None:
  619. if not await sender.is_logged_in():
  620. return
  621. message = await DBMessage.get_by_mxid(event_id, self.mxid)
  622. if message:
  623. try:
  624. await message.delete()
  625. await self.signal.remote_delete(
  626. sender.username, recipient=self.chat_id, timestamp=message.timestamp
  627. )
  628. except Exception as e:
  629. self.log.exception(
  630. f"Failed to handle Matrix redaction {redaction_event_id} of "
  631. f"message {event_id} ({message.timestamp})"
  632. )
  633. sender.send_remote_checkpoint(
  634. MessageSendCheckpointStatus.PERM_FAILURE,
  635. redaction_event_id,
  636. self.mxid,
  637. EventType.ROOM_REDACTION,
  638. error=e,
  639. )
  640. await sender.handle_auth_failure(e)
  641. asyncio.create_task(self._send_error_notice("message deletion", e))
  642. asyncio.create_task(self._send_message_status(event_id, e))
  643. else:
  644. self.log.trace(f"Removed {message} after Matrix redaction")
  645. sender.send_remote_checkpoint(
  646. MessageSendCheckpointStatus.SUCCESS,
  647. redaction_event_id,
  648. self.mxid,
  649. EventType.ROOM_REDACTION,
  650. )
  651. await self._send_delivery_receipt(redaction_event_id)
  652. asyncio.create_task(self._send_message_status(redaction_event_id, err=None))
  653. return
  654. reaction = await DBReaction.get_by_mxid(event_id, self.mxid)
  655. if reaction:
  656. try:
  657. await reaction.delete()
  658. remove_reaction = Reaction(
  659. emoji=reaction.emoji,
  660. remove=True,
  661. target_author=reaction.msg_author,
  662. target_sent_timestamp=reaction.msg_timestamp,
  663. )
  664. await self.signal.react(
  665. username=sender.username, recipient=self.chat_id, reaction=remove_reaction
  666. )
  667. except Exception as e:
  668. self.log.exception(
  669. f"Failed to handle Matrix redaction {redaction_event_id} of "
  670. f"reaction {event_id} to {reaction.msg_timestamp}"
  671. )
  672. sender.send_remote_checkpoint(
  673. MessageSendCheckpointStatus.PERM_FAILURE,
  674. redaction_event_id,
  675. self.mxid,
  676. EventType.ROOM_REDACTION,
  677. error=e,
  678. )
  679. await sender.handle_auth_failure(e)
  680. asyncio.create_task(self._send_error_notice("reaction deletion", e))
  681. asyncio.create_task(self._send_message_status(event_id, e))
  682. else:
  683. self.log.trace(f"Removed {reaction} after Matrix redaction")
  684. sender.send_remote_checkpoint(
  685. MessageSendCheckpointStatus.SUCCESS,
  686. redaction_event_id,
  687. self.mxid,
  688. EventType.ROOM_REDACTION,
  689. )
  690. await self._send_delivery_receipt(redaction_event_id)
  691. asyncio.create_task(self._send_message_status(redaction_event_id, err=None))
  692. return
  693. sender.send_remote_checkpoint(
  694. MessageSendCheckpointStatus.PERM_FAILURE,
  695. redaction_event_id,
  696. self.mxid,
  697. EventType.ROOM_REDACTION,
  698. error="No message or reaction found for redaction",
  699. )
  700. status_err = UnknownReactionTarget("No message or reaction found for redaction")
  701. asyncio.create_task(self._send_message_status(redaction_event_id, err=status_err))
  702. async def handle_matrix_join(self, user: u.User) -> None:
  703. if self.is_direct or not await user.is_logged_in():
  704. return
  705. if self._pending_members is None:
  706. self.log.debug(
  707. f"{user.mxid} ({user.uuid}) joined room, but pending_members is None,"
  708. " updating chat info"
  709. )
  710. await self.update_info(user, GroupV2ID(id=self.chat_id))
  711. if self._pending_members is None:
  712. self.log.warning(
  713. f"Didn't get pending member list after info update, {user.mxid} ({user.uuid}) may"
  714. "not be in the group on Signal."
  715. )
  716. elif user.uuid in self._pending_members:
  717. self.log.debug(f"{user.mxid} ({user.uuid}) joined room, accepting invite on Signal")
  718. try:
  719. resp = await self.signal.accept_invitation(user.username, self.chat_id)
  720. self._pending_members.remove(user.uuid)
  721. except RPCError as e:
  722. await self.main_intent.send_notice(
  723. self.mxid, f"\u26a0 Failed to accept invite on Signal: {e}"
  724. )
  725. await user.handle_auth_failure(e)
  726. else:
  727. await self.update_info(user, resp)
  728. async def handle_matrix_leave(self, user: u.User) -> None:
  729. if not await user.is_logged_in():
  730. return
  731. if self.is_direct:
  732. self.log.info(f"{user.mxid} left private chat portal with {self.chat_id}")
  733. if user.username == self.receiver:
  734. self.log.info(
  735. f"{user.mxid} was the recipient of this portal. Cleaning up and deleting..."
  736. )
  737. await self.cleanup_and_delete()
  738. else:
  739. self.log.debug(f"{user.mxid} left portal to {self.chat_id}")
  740. if self.config["bridge.bridge_matrix_leave"]:
  741. await self.signal.leave_group(user.username, self.chat_id)
  742. # TODO cleanup if empty
  743. async def kick_matrix(self, user: u.User | p.Puppet, source: u.User) -> None:
  744. try:
  745. await self.signal.update_group(
  746. source.username, self.chat_id, remove_members=[user.address]
  747. )
  748. except Exception as e:
  749. self.log.exception(f"Failed to kick Signal user: {e}")
  750. info = await self.signal.get_group(source.username, self.chat_id)
  751. if user.address in info.members:
  752. await self.main_intent.invite_user(
  753. self.mxid,
  754. user.mxid,
  755. check_cache=True,
  756. reason=f"Failed to kick Signal user: {e}",
  757. )
  758. await user.intent_for(self).ensure_joined(self.mxid)
  759. async def ban_matrix(self, user: u.User | p.Puppet, source: u.User) -> None:
  760. try:
  761. await self.signal.ban_user(source.username, self.chat_id, users=[user.address])
  762. except Exception as e:
  763. self.log.exception(f"Failed to ban Signal user: {e}")
  764. info = await self.signal.get_group(source.username, self.chat_id)
  765. is_banned = False
  766. if info.banned_members:
  767. for member in info.banned_members:
  768. is_banned = user.address.uuid == member.uuid or is_banned
  769. if not is_banned:
  770. await self.main_intent.unban_user(
  771. self.mxid, user.mxid, reason=f"Failed to ban Signal user: {e}"
  772. )
  773. if user.address in info.members:
  774. await self.main_intent.invite_user(
  775. self.mxid,
  776. user.mxid,
  777. check_cache=True,
  778. )
  779. await user.intent_for(self).ensure_joined(self.mxid)
  780. async def unban_matrix(self, user: u.User | p.Puppet, source: u.User) -> None:
  781. try:
  782. await self.signal.unban_user(source.username, self.chat_id, users=[user.address])
  783. except Exception as e:
  784. self.log.exception(f"Failed to unban Signal user: {e}")
  785. info = await self.signal.get_group(source.username, self.chat_id)
  786. if info.banned_members:
  787. for member in info.banned_members:
  788. if member.uuid == user.address.uuid:
  789. await self.main_intent.ban_user(
  790. self.mxid, user.mxid, reason=f"Failed to unban Signal user: {e}"
  791. )
  792. return
  793. async def handle_matrix_invite(self, invited_by: u.User, user: u.User | p.Puppet) -> None:
  794. if self.is_direct:
  795. raise RejectMatrixInvite("You can't invite additional users to private chats.")
  796. try:
  797. await self.signal.update_group(
  798. invited_by.username, self.chat_id, add_members=[user.address]
  799. )
  800. except RPCError as e:
  801. raise RejectMatrixInvite(str(e)) from e
  802. power_levels = await self.main_intent.get_power_levels(self.mxid)
  803. invitee_pl = power_levels.get_user_level(user.mxid)
  804. if invitee_pl >= 50:
  805. group_member = GroupMember(uuid=user.uuid, role=GroupMemberRole.ADMINISTRATOR)
  806. try:
  807. update_meta = await self.signal.update_group(
  808. invited_by.username, self.chat_id, update_role=group_member
  809. )
  810. self.revision = update_meta.revision
  811. except Exception as e:
  812. self.log.exception(f"Failed to update Signal member role: {e}")
  813. await self._update_power_levels(
  814. await self.signal.get_group(invited_by.username, self.chat_id)
  815. )
  816. async def handle_matrix_name(self, user: u.User, name: str) -> None:
  817. if self.name == name or self.is_direct or not name:
  818. return
  819. sender, is_relay = await self.get_relay_sender(user, "name change")
  820. if not sender:
  821. return
  822. self.name = name
  823. self.log.debug(
  824. f"{user.mxid} changed the group name, sending to Signal through {sender.username}"
  825. )
  826. try:
  827. await self.signal.update_group(sender.username, self.chat_id, title=name)
  828. except Exception as e:
  829. self.log.exception("Failed to update Signal group name")
  830. await user.handle_auth_failure(e)
  831. self.name = None
  832. async def handle_matrix_topic(self, user: u.User, topic: str) -> None:
  833. if self.topic == topic or self.is_direct or not topic:
  834. return
  835. sender, is_relay = await self.get_relay_sender(user, "topic change")
  836. if not sender:
  837. return
  838. self.topic = topic
  839. self.log.debug(
  840. f"{user.mxid} changed the group topic, sending to Signal through {sender.username}"
  841. )
  842. try:
  843. await self.signal.update_group(sender.username, self.chat_id, description=topic)
  844. except Exception:
  845. self.log.exception("Failed to update Signal group description")
  846. self.name = None
  847. async def handle_matrix_avatar(self, user: u.User, url: ContentURI) -> None:
  848. if self.is_direct or not url:
  849. return
  850. sender, is_relay = await self.get_relay_sender(user, "avatar change")
  851. if not sender:
  852. return
  853. data = await self.main_intent.download_media(url)
  854. new_hash = hashlib.sha256(data).hexdigest()
  855. if new_hash == self.avatar_hash and self.avatar_set:
  856. self.log.debug(f"New avatar from Matrix set by {user.mxid} is same as current one")
  857. return
  858. self.avatar_url = url
  859. self.avatar_hash = new_hash
  860. path = self._write_outgoing_file(data)
  861. self.log.debug(
  862. f"{user.mxid} changed the group avatar, sending to Signal through {sender.username}"
  863. )
  864. try:
  865. await self.signal.update_group(sender.username, self.chat_id, avatar_path=path)
  866. self.avatar_set = True
  867. except Exception as e:
  868. self.log.exception("Failed to update Signal group avatar")
  869. await user.handle_auth_failure(e)
  870. self.avatar_set = False
  871. if self.config["signal.remove_file_after_handling"]:
  872. try:
  873. os.remove(path)
  874. except FileNotFoundError:
  875. pass
  876. async def handle_matrix_power_level(
  877. self,
  878. sender: u.User,
  879. levels: PowerLevelStateEventContent,
  880. prev_content: PowerLevelStateEventContent | None = None,
  881. ) -> None:
  882. old_users = prev_content.users if prev_content else None
  883. new_users = levels.users
  884. changes = {}
  885. sender, is_relay = await self.get_relay_sender(sender, "power level change")
  886. if not sender:
  887. return
  888. if not old_users:
  889. changes = new_users
  890. else:
  891. for user, level in new_users.items():
  892. if (
  893. user
  894. and user != self.main_intent.mxid
  895. and (user not in old_users or level != old_users[user])
  896. ):
  897. changes[user] = level
  898. for user, level in old_users.items():
  899. if user and user != self.main_intent.mxid and user not in new_users:
  900. changes[user] = levels.users_default
  901. if changes:
  902. for user, level in changes.items():
  903. address = p.Puppet.get_id_from_mxid(user)
  904. if not address:
  905. mx_user = await u.User.get_by_mxid(user, create=False)
  906. if not mx_user or not mx_user.is_logged_in:
  907. continue
  908. address = mx_user.address
  909. if not address or not address.uuid:
  910. continue
  911. signal_role = (
  912. GroupMemberRole.DEFAULT if level < 50 else GroupMemberRole.ADMINISTRATOR
  913. )
  914. group_member = GroupMember(uuid=address.uuid, role=signal_role)
  915. try:
  916. update_meta = await self.signal.update_group(
  917. sender.username, self.chat_id, update_role=group_member
  918. )
  919. self.revision = update_meta.revision
  920. except Exception as e:
  921. self.log.exception(f"Failed to update Signal member role: {e}")
  922. await self._update_power_levels(
  923. await self.signal.get_group(sender.username, self.chat_id)
  924. )
  925. return
  926. if not prev_content or levels.invite != prev_content.invite:
  927. try:
  928. update_meta = await self.signal.update_group(
  929. username=sender.username,
  930. group_id=self.chat_id,
  931. update_access_control=GroupAccessControl(
  932. members=(
  933. AccessControlMode.MEMBER
  934. if levels.invite == 0
  935. else AccessControlMode.ADMINISTRATOR
  936. ),
  937. attributes=None,
  938. link=None,
  939. ),
  940. )
  941. self.revision = update_meta.revision
  942. except Exception as e:
  943. self.log.exception(f"Failed to update Signal member add permission: {e}")
  944. await self._update_power_levels(
  945. await self.signal.get_group(sender.username, self.chat_id)
  946. )
  947. return
  948. if not prev_content or levels.state_default != prev_content.state_default:
  949. try:
  950. update_meta = await self.signal.update_group(
  951. username=sender.username,
  952. group_id=self.chat_id,
  953. update_access_control=GroupAccessControl(
  954. attributes=(
  955. AccessControlMode.MEMBER
  956. if levels.state_default == 0
  957. else AccessControlMode.ADMINISTRATOR
  958. ),
  959. members=None,
  960. link=None,
  961. ),
  962. )
  963. self.revision = update_meta.revision
  964. except Exception as e:
  965. self.log.exception(f"Failed to update Signal metadata change permission: {e}")
  966. await self._update_power_levels(
  967. await self.signal.get_group(sender.username, self.chat_id)
  968. )
  969. # endregion
  970. # region Signal event handling
  971. @staticmethod
  972. async def _resolve_address(address: Address) -> Address:
  973. puppet = await p.Puppet.get_by_address(address, create=False)
  974. return puppet.address
  975. async def _find_quote_event_id(self, quote: Quote | None) -> MessageEvent | EventID | None:
  976. if not quote:
  977. return None
  978. author_address = await self._resolve_address(quote.author)
  979. reply_msg = await DBMessage.get_by_signal_id(
  980. author_address, quote.id, self.chat_id, self.receiver
  981. )
  982. if not reply_msg:
  983. return None
  984. try:
  985. evt = await self.main_intent.get_event(self.mxid, reply_msg.mxid)
  986. if isinstance(evt, EncryptedEvent):
  987. return await self.matrix.e2ee.decrypt(evt, wait_session_timeout=0)
  988. return evt
  989. except MatrixError:
  990. return reply_msg.mxid
  991. async def _signal_link_preview_to_beeper(
  992. self, link_preview: LinkPreview, intent: IntentAPI
  993. ) -> dict[str, Any]:
  994. beeper_link_preview: dict[str, Any] = {
  995. "matched_url": link_preview.url,
  996. "og:title": link_preview.title,
  997. "og:url": link_preview.url,
  998. "og:description": link_preview.description,
  999. }
  1000. # Upload an image corresponding to the link preview if it exists.
  1001. if link_preview.attachment and link_preview.attachment.incoming_filename:
  1002. beeper_link_preview["og:image:type"] = link_preview.attachment.content_type
  1003. beeper_link_preview["og:image:height"] = link_preview.attachment.height
  1004. beeper_link_preview["og:image:width"] = link_preview.attachment.width
  1005. beeper_link_preview["matrix:image:size"] = link_preview.attachment.size
  1006. with open(link_preview.attachment.incoming_filename, "rb") as file:
  1007. data = file.read()
  1008. if self.config["signal.remove_file_after_handling"]:
  1009. os.remove(link_preview.attachment.incoming_filename)
  1010. upload_mime_type = link_preview.attachment.content_type
  1011. if self.encrypted and encrypt_attachment:
  1012. data, beeper_link_preview[BEEPER_IMAGE_ENCRYPTION_KEY] = encrypt_attachment(data)
  1013. upload_mime_type = "application/octet-stream"
  1014. upload_uri = await intent.upload_media(
  1015. data,
  1016. mime_type=upload_mime_type,
  1017. filename=link_preview.attachment.id,
  1018. async_upload=self.config["homeserver.async_media"],
  1019. )
  1020. if BEEPER_IMAGE_ENCRYPTION_KEY in beeper_link_preview:
  1021. beeper_link_preview[BEEPER_IMAGE_ENCRYPTION_KEY].url = upload_uri
  1022. beeper_link_preview[BEEPER_IMAGE_ENCRYPTION_KEY] = beeper_link_preview[
  1023. BEEPER_IMAGE_ENCRYPTION_KEY
  1024. ].serialize()
  1025. else:
  1026. beeper_link_preview["og:image"] = upload_uri
  1027. return beeper_link_preview
  1028. async def handle_signal_message(
  1029. self, source: u.User, sender: p.Puppet, message: MessageData
  1030. ) -> None:
  1031. if (sender.address, message.timestamp) in self._msgts_dedup:
  1032. self.log.debug(
  1033. f"Ignoring message {message.timestamp} by {sender.uuid} as it was already handled "
  1034. "(message.timestamp in dedup queue)"
  1035. )
  1036. await self.signal.send_receipt(
  1037. source.username, sender.address, timestamps=[message.timestamp]
  1038. )
  1039. return
  1040. self._msgts_dedup.appendleft((sender.address, message.timestamp))
  1041. old_message = await DBMessage.get_by_signal_id(
  1042. sender.address, message.timestamp, self.chat_id, self.receiver
  1043. )
  1044. if old_message is not None:
  1045. self.log.debug(
  1046. f"Ignoring message {message.timestamp} by {sender.uuid} as it was already handled "
  1047. "(message.id found in database)"
  1048. )
  1049. await self.signal.send_receipt(
  1050. source.username, sender.address, timestamps=[message.timestamp]
  1051. )
  1052. return
  1053. self.log.debug(f"Started handling message {message.timestamp} by {sender.uuid}")
  1054. self.log.trace(f"Message content: {message}")
  1055. intent = sender.intent_for(self)
  1056. await intent.set_typing(self.mxid, False)
  1057. event_id = None
  1058. reply_to = await self._find_quote_event_id(message.quote)
  1059. if message.sticker:
  1060. if message.sticker.attachment.incoming_filename:
  1061. content = await self._handle_signal_attachment(
  1062. intent, message.sticker.attachment, sticker=True
  1063. )
  1064. elif StickersClient:
  1065. content = await self._handle_signal_sticker(intent, message.sticker)
  1066. else:
  1067. self.log.debug(
  1068. f"Not handling sticker in {message.timestamp}: no incoming_filename and "
  1069. "signalstickers-client not installed."
  1070. )
  1071. return
  1072. if content:
  1073. if message.sticker.attachment.blurhash:
  1074. content.info["blurhash"] = message.sticker.attachment.blurhash
  1075. content.info["xyz.amorgan.blurhash"] = message.sticker.attachment.blurhash
  1076. await self._add_sticker_meta(message.sticker, content)
  1077. if reply_to and not message.body:
  1078. content.set_reply(reply_to)
  1079. reply_to = None
  1080. content.msgtype = None
  1081. event_id = await self._send_message(
  1082. intent, content, timestamp=message.timestamp, event_type=EventType.STICKER
  1083. )
  1084. for contact in message.contacts:
  1085. content = await self._handle_signal_contact(contact)
  1086. if reply_to and not message.body:
  1087. content.set_reply(reply_to)
  1088. reply_to = None
  1089. event_id = await self._send_message(intent, content, timestamp=message.timestamp)
  1090. is_first_text = True
  1091. for attachment in message.attachments:
  1092. if not attachment.incoming_filename:
  1093. self.log.warning(
  1094. "Failed to bridge attachment, no incoming filename: %s", attachment
  1095. )
  1096. continue
  1097. as_text = (
  1098. is_first_text
  1099. and attachment.content_type == "text/x-signal-plain"
  1100. and attachment.size < MAX_MATRIX_MESSAGE_SIZE
  1101. )
  1102. file_size = attachment.size or os.path.getsize(attachment.incoming_filename)
  1103. if file_size > self.matrix.media_config.upload_size:
  1104. self.log.warning(
  1105. "Failed to bridge attachment %s in %s: file too large",
  1106. attachment.id,
  1107. message.timestamp,
  1108. )
  1109. continue
  1110. content = await self._handle_signal_attachment(intent, attachment, text=as_text)
  1111. if as_text:
  1112. is_first_text = False
  1113. message.body = ""
  1114. if reply_to and not message.body:
  1115. # If there's no text, set the first image as the reply
  1116. content.set_reply(reply_to)
  1117. reply_to = None
  1118. event_id = await self._send_message(intent, content, timestamp=message.timestamp)
  1119. if message.body:
  1120. content = await signal_to_matrix(message)
  1121. if message.previews:
  1122. content[BEEPER_LINK_PREVIEWS_KEY] = await asyncio.gather(
  1123. *(self._signal_link_preview_to_beeper(p, intent) for p in message.previews)
  1124. )
  1125. if reply_to:
  1126. content.set_reply(reply_to)
  1127. event_id = await self._send_message(intent, content, timestamp=message.timestamp)
  1128. if event_id:
  1129. msg = DBMessage(
  1130. mxid=event_id,
  1131. mx_room=self.mxid,
  1132. sender=sender.address,
  1133. timestamp=message.timestamp,
  1134. signal_chat_id=self.chat_id,
  1135. signal_receiver=self.receiver,
  1136. )
  1137. await msg.insert()
  1138. await self.signal.send_receipt(
  1139. source.username, sender.address, timestamps=[message.timestamp]
  1140. )
  1141. await self._send_delivery_receipt(event_id)
  1142. self.log.debug(f"Handled Signal message {message.timestamp} -> {event_id}")
  1143. if message.expires_in_seconds and self.disappearing_enabled:
  1144. await DisappearingMessage(self.mxid, event_id, message.expires_in_seconds).insert()
  1145. self.log.debug(
  1146. f"{event_id} set to be redacted {message.expires_in_seconds} seconds after "
  1147. "room is read"
  1148. )
  1149. else:
  1150. self.log.debug(f"Didn't get event ID for {message.timestamp}")
  1151. async def handle_signal_kicked(self, user: u.User, sender: p.Puppet) -> None:
  1152. self.log.debug(f"{user.mxid} was kicked by {sender.number} from {self.mxid}")
  1153. await self._kick_with_puppet(user, sender)
  1154. @staticmethod
  1155. async def _make_media_content(
  1156. attachment: Attachment, data: bytes
  1157. ) -> tuple[MediaMessageEventContent, bytes]:
  1158. if attachment.content_type.startswith("image/"):
  1159. msgtype = MessageType.IMAGE
  1160. info = ImageInfo(
  1161. mimetype=attachment.content_type, width=attachment.width, height=attachment.height
  1162. )
  1163. elif attachment.content_type.startswith("video/"):
  1164. msgtype = MessageType.VIDEO
  1165. info = VideoInfo(
  1166. mimetype=attachment.content_type, width=attachment.width, height=attachment.height
  1167. )
  1168. elif attachment.voice_note or attachment.content_type.startswith("audio/"):
  1169. msgtype = MessageType.AUDIO
  1170. info = AudioInfo(
  1171. mimetype=attachment.content_type if not attachment.voice_note else "audio/ogg"
  1172. )
  1173. else:
  1174. msgtype = MessageType.FILE
  1175. info = FileInfo(mimetype=attachment.content_type)
  1176. info.size = attachment.size or len(data)
  1177. if not attachment.custom_filename:
  1178. ext = mimetypes.guess_extension(info.mimetype) or ""
  1179. attachment.custom_filename = attachment.id + ext
  1180. else:
  1181. for ext in mimetypes.guess_all_extensions(info.mimetype):
  1182. if attachment.custom_filename.endswith(ext):
  1183. break
  1184. else:
  1185. attachment.custom_filename += mimetypes.guess_extension(info.mimetype) or ""
  1186. if attachment.blurhash:
  1187. info["blurhash"] = attachment.blurhash
  1188. info["xyz.amorgan.blurhash"] = attachment.blurhash
  1189. content = MediaMessageEventContent(
  1190. msgtype=msgtype, info=info, body=attachment.custom_filename
  1191. )
  1192. # If this is a voice note, add the additional voice message metadata and convert to OGG.
  1193. if attachment.voice_note:
  1194. content["org.matrix.msc1767.file"] = {
  1195. "url": content.url,
  1196. "name": content.body,
  1197. **(content.file.serialize() if content.file else {}),
  1198. **(content.info.serialize() if content.info else {}),
  1199. }
  1200. content["org.matrix.msc3245.voice"] = {}
  1201. data = await ffmpeg.convert_bytes(
  1202. data, ".ogg", output_args=("-c:a", "libopus"), input_mime=attachment.content_type
  1203. )
  1204. info.size = len(data)
  1205. return content, data
  1206. async def _handle_signal_attachment(
  1207. self, intent: IntentAPI, attachment: Attachment, sticker: bool = False, text: bool = False
  1208. ) -> MediaMessageEventContent | TextMessageEventContent:
  1209. self.log.trace(f"Reuploading attachment {attachment}")
  1210. if not attachment.content_type:
  1211. attachment.content_type = (
  1212. magic.mimetype(attachment.incoming_filename)
  1213. if magic is not None
  1214. else "application/octet-stream"
  1215. )
  1216. with open(attachment.incoming_filename, "rb") as file:
  1217. data = file.read()
  1218. if self.config["signal.remove_file_after_handling"]:
  1219. os.remove(attachment.incoming_filename)
  1220. if text:
  1221. assert attachment.content_type == "text/x-signal-plain"
  1222. assert attachment.size < MAX_MATRIX_MESSAGE_SIZE
  1223. content = TextMessageEventContent(msgtype=MessageType.TEXT, body=data.decode("utf-8"))
  1224. return content
  1225. content, data = await self._make_media_content(attachment, data)
  1226. if sticker:
  1227. self._adjust_sticker_size(content.info)
  1228. await self._upload_attachment(intent, content, data, attachment.id)
  1229. return content
  1230. @staticmethod
  1231. async def _handle_signal_contact(contact: SharedContact) -> TextMessageEventContent:
  1232. msg = f"Shared contact: {contact.name!s}"
  1233. if contact.phone:
  1234. msg += "\n"
  1235. for phone in contact.phone:
  1236. msg += f"\nPhone: {phone.value} ({phone.type_or_label})"
  1237. if contact.email:
  1238. msg += "\n"
  1239. for email in contact.email:
  1240. msg += f"\nEmail: {email.value} ({email.type_or_label})"
  1241. content = TextMessageEventContent(msgtype=MessageType.TEXT, body=msg)
  1242. content["fi.mau.signal.contact"] = contact.serialize()
  1243. return content
  1244. async def _add_sticker_meta(self, sticker: Sticker, content: MediaMessageEventContent) -> None:
  1245. try:
  1246. pack = self._sticker_meta_cache[sticker.pack_id]
  1247. except KeyError:
  1248. self.log.debug(f"Fetching sticker pack metadata for {sticker.pack_id}")
  1249. try:
  1250. async with StickersClient() as client:
  1251. pack = await client.get_pack_metadata(sticker.pack_id, sticker.pack_key)
  1252. self._sticker_meta_cache[sticker.pack_id] = pack
  1253. except Exception:
  1254. self.log.warning(
  1255. f"Failed to fetch pack metadata for {sticker.pack_id}", exc_info=True
  1256. )
  1257. pack = None
  1258. if not pack:
  1259. content.info["fi.mau.signal.sticker"] = {
  1260. "id": sticker.sticker_id,
  1261. "pack": {
  1262. "id": sticker.pack_id,
  1263. "key": sticker.pack_key,
  1264. },
  1265. }
  1266. return
  1267. sticker_meta = pack.stickers[sticker.sticker_id]
  1268. content.body = sticker_meta.emoji
  1269. content.info["fi.mau.signal.sticker"] = {
  1270. "id": sticker.sticker_id,
  1271. "emoji": sticker_meta.emoji,
  1272. "pack": {
  1273. "id": pack.id,
  1274. "key": pack.key,
  1275. "title": pack.title,
  1276. "author": pack.author,
  1277. },
  1278. }
  1279. @staticmethod
  1280. def _adjust_sticker_size(info: ImageInfo) -> None:
  1281. if info.width > 256 or info.height > 256:
  1282. if info.width == info.height:
  1283. info.width = info.height = 256
  1284. elif info.width > info.height:
  1285. info.height = int(info.height / (info.width / 256))
  1286. info.width = 256
  1287. else:
  1288. info.width = int(info.width / (info.height / 256))
  1289. info.height = 256
  1290. async def _handle_signal_sticker(
  1291. self, intent: IntentAPI, sticker: Sticker
  1292. ) -> MediaMessageEventContent | None:
  1293. try:
  1294. self.log.debug(f"Fetching sticker {sticker.pack_id}#{sticker.sticker_id}")
  1295. async with StickersClient() as client:
  1296. data = await client.download_sticker(
  1297. sticker.sticker_id, sticker.pack_id, sticker.pack_key
  1298. )
  1299. except Exception:
  1300. self.log.warning(f"Failed to download sticker {sticker.sticker_id}", exc_info=True)
  1301. return None
  1302. info = ImageInfo(
  1303. mimetype=sticker.attachment.content_type,
  1304. size=len(data),
  1305. width=sticker.attachment.width,
  1306. height=sticker.attachment.height,
  1307. )
  1308. self._adjust_sticker_size(info)
  1309. if magic:
  1310. info.mimetype = magic.mimetype(data)
  1311. ext = mimetypes.guess_extension(info.mimetype)
  1312. if not ext and info.mimetype == "image/webp":
  1313. ext = ".webp"
  1314. content = MediaMessageEventContent(
  1315. msgtype=MessageType.IMAGE, info=info, body=f"sticker{ext}"
  1316. )
  1317. await self._upload_attachment(intent, content, data, sticker.attachment.id)
  1318. return content
  1319. async def _upload_attachment(
  1320. self, intent: IntentAPI, content: MediaMessageEventContent, data: bytes, id: str
  1321. ) -> None:
  1322. upload_mime_type = content.info.mimetype
  1323. if self.encrypted and encrypt_attachment:
  1324. data, content.file = encrypt_attachment(data)
  1325. upload_mime_type = "application/octet-stream"
  1326. content.url = await intent.upload_media(
  1327. data,
  1328. mime_type=upload_mime_type,
  1329. filename=id,
  1330. async_upload=self.config["homeserver.async_media"],
  1331. )
  1332. if content.file:
  1333. content.file.url = content.url
  1334. content.url = None
  1335. # This is a hack for bad clients like Element iOS that require a thumbnail
  1336. if content.info.mimetype.startswith("image/"):
  1337. if content.file:
  1338. content.info.thumbnail_file = content.file
  1339. elif content.url:
  1340. content.info.thumbnail_url = content.url
  1341. async def handle_signal_reaction(
  1342. self, sender: p.Puppet, reaction: Reaction, timestamp: int
  1343. ) -> None:
  1344. author_address = await self._resolve_address(reaction.target_author)
  1345. target_id = reaction.target_sent_timestamp
  1346. async with self._reaction_lock:
  1347. dedup_id = (author_address, target_id, reaction.emoji, sender.address, reaction.remove)
  1348. if dedup_id in self._reaction_dedup:
  1349. return
  1350. self._reaction_dedup.appendleft(dedup_id)
  1351. existing = await DBReaction.get_by_signal_id(
  1352. self.chat_id, self.receiver, author_address, target_id, sender.address
  1353. )
  1354. if reaction.remove:
  1355. if existing:
  1356. try:
  1357. await sender.intent_for(self).redact(existing.mx_room, existing.mxid)
  1358. except IntentError:
  1359. await self.main_intent.redact(existing.mx_room, existing.mxid)
  1360. await existing.delete()
  1361. self.log.trace(f"Removed {existing} after Signal removal")
  1362. return
  1363. elif existing and existing.emoji == reaction.emoji:
  1364. return
  1365. message = await DBMessage.get_by_signal_id(
  1366. author_address, target_id, self.chat_id, self.receiver
  1367. )
  1368. if not message:
  1369. self.log.debug(f"Ignoring reaction to unknown message {target_id}")
  1370. return
  1371. intent = sender.intent_for(self)
  1372. matrix_emoji = variation_selector.add(reaction.emoji)
  1373. mxid = await intent.react(message.mx_room, message.mxid, matrix_emoji, timestamp=timestamp)
  1374. self.log.debug(f"{sender.address} reacted to {message.mxid} -> {mxid}")
  1375. await self._upsert_reaction(existing, intent, mxid, sender, message, reaction.emoji)
  1376. async def handle_signal_delete(self, sender: p.Puppet, message_ts: int) -> None:
  1377. message = await DBMessage.get_by_signal_id(
  1378. sender.address, message_ts, self.chat_id, self.receiver
  1379. )
  1380. if not message:
  1381. return
  1382. await message.delete()
  1383. try:
  1384. await sender.intent_for(self).redact(message.mx_room, message.mxid)
  1385. except MForbidden:
  1386. await self.main_intent.redact(message.mx_room, message.mxid)
  1387. # endregion
  1388. # region Matrix -> Signal metadata
  1389. async def create_signal_group(
  1390. self, source: u.User, levels: PowerLevelStateEventContent
  1391. ) -> None:
  1392. user_mxids = await self.az.intent.get_room_members(
  1393. self.mxid, (Membership.JOIN, Membership.INVITE)
  1394. )
  1395. invitee_addresses = []
  1396. for mxid in user_mxids:
  1397. mx_user = await u.User.get_by_mxid(mxid, create=False)
  1398. if mx_user and mx_user.address and mx_user.username != source.username:
  1399. invitee_addresses.append(mx_user.address)
  1400. puppet = await p.Puppet.get_by_mxid(mxid, create=False)
  1401. if puppet:
  1402. invitee_addresses.append(puppet.address)
  1403. avatar_path: str | None = None
  1404. if self.avatar_url:
  1405. avatar_data = await self.az.intent.download_media(self.avatar_url)
  1406. self.avatar_hash = hashlib.sha256(avatar_data).hexdigest()
  1407. avatar_path = self._write_outgoing_file(avatar_data)
  1408. signal_chat = await self.signal.create_group(
  1409. source.username, title=self.name, members=invitee_addresses, avatar_path=avatar_path
  1410. )
  1411. self.name_set = bool(self.name and signal_chat.title)
  1412. self.avatar_set = bool(self.avatar_url and self.avatar_hash and signal_chat.avatar)
  1413. self.chat_id = signal_chat.id
  1414. await self._postinit()
  1415. await self.insert()
  1416. if avatar_path and self.config["signal.remove_file_after_handling"]:
  1417. try:
  1418. os.remove(avatar_path)
  1419. except FileNotFoundError:
  1420. pass
  1421. if self.topic:
  1422. await self.signal.update_group(source.username, self.chat_id, description=self.topic)
  1423. await self.handle_matrix_power_level(source, levels)
  1424. await self.update()
  1425. await self.update_bridge_info()
  1426. # endregion
  1427. # region Updating portal info
  1428. async def update_info(
  1429. self, source: u.User, info: ChatInfo, sender: p.Puppet | None = None
  1430. ) -> None:
  1431. if self.is_direct:
  1432. if not isinstance(info, (Profile, Address)):
  1433. raise ValueError(f"Unexpected type for direct chat update_info: {type(info)}")
  1434. if not self.name:
  1435. puppet = await self.get_dm_puppet()
  1436. if not puppet.name:
  1437. await puppet.update_info(info, source)
  1438. self.name = puppet.name
  1439. return
  1440. if isinstance(info, GroupV2ID):
  1441. try:
  1442. info = await self.signal.get_group(source.username, info.id, info.revision or -1)
  1443. except Exception as e:
  1444. await source.handle_auth_failure(e)
  1445. raise
  1446. if not info:
  1447. self.log.debug(
  1448. f"Failed to get full group v2 info through {source.username}, "
  1449. "cancelling update"
  1450. )
  1451. return
  1452. changed = False
  1453. if isinstance(info, Group):
  1454. changed = await self._update_name(info.name, sender) or changed
  1455. elif isinstance(info, GroupV2):
  1456. if self.revision < info.revision:
  1457. self.revision = info.revision
  1458. changed = True
  1459. elif self.revision > info.revision:
  1460. self.log.warning(
  1461. f"Got outdated info when syncing through {source.username} "
  1462. f"({info.revision} < {self.revision}), ignoring..."
  1463. )
  1464. return
  1465. changed = await self._update_name(info.title, sender) or changed
  1466. changed = await self._update_topic(info.description, sender) or changed
  1467. elif isinstance(info, GroupV2ID):
  1468. return
  1469. else:
  1470. raise ValueError(f"Unexpected type for group update_info: {type(info)}")
  1471. changed = await self._update_avatar(info, sender) or changed
  1472. await self._update_participants(source, info, sender)
  1473. try:
  1474. await self._update_power_levels(info)
  1475. except Exception:
  1476. self.log.warning("Error updating power levels", exc_info=True)
  1477. if changed:
  1478. await self.update_bridge_info()
  1479. await self.update()
  1480. async def update_expires_in_seconds(self, sender: p.Puppet, expires_in_seconds: int) -> None:
  1481. if expires_in_seconds == 0:
  1482. expires_in_seconds = None
  1483. if self.expiration_time == expires_in_seconds:
  1484. return
  1485. assert self.mxid
  1486. self.expiration_time = expires_in_seconds
  1487. await self.update()
  1488. time_str = "Off" if expires_in_seconds is None else format_duration(expires_in_seconds)
  1489. body = f"Set the disappearing message timer to {time_str}"
  1490. content = TextMessageEventContent(msgtype=MessageType.NOTICE, body=body)
  1491. await self._send_message(sender.intent_for(self), content)
  1492. async def get_dm_puppet(self) -> p.Puppet | None:
  1493. if not self.is_direct:
  1494. return None
  1495. return await p.Puppet.get_by_address(self.chat_id)
  1496. async def update_info_from_puppet(self, puppet: p.Puppet | None = None) -> None:
  1497. if not self.is_direct:
  1498. return
  1499. if not puppet:
  1500. puppet = await self.get_dm_puppet()
  1501. await self.update_puppet_name(puppet.name, save=False)
  1502. await self.update_puppet_avatar(puppet.avatar_hash, puppet.avatar_url, save=False)
  1503. async def update_puppet_avatar(
  1504. self, new_hash: str, avatar_url: ContentURI, save: bool = True
  1505. ) -> None:
  1506. if not self.encrypted and not self.private_chat_portal_meta:
  1507. return
  1508. if self.avatar_hash != new_hash or not self.avatar_set:
  1509. self.avatar_hash = new_hash
  1510. self.avatar_url = avatar_url
  1511. if self.mxid:
  1512. try:
  1513. await self.main_intent.set_room_avatar(self.mxid, avatar_url)
  1514. self.avatar_set = True
  1515. except Exception:
  1516. self.log.exception("Error setting avatar")
  1517. self.avatar_set = False
  1518. if save:
  1519. await self.update_bridge_info()
  1520. await self.update()
  1521. async def update_puppet_name(self, name: str, save: bool = True) -> None:
  1522. if not self.encrypted and not self.private_chat_portal_meta:
  1523. return
  1524. changed = await self._update_name(name)
  1525. if changed and save:
  1526. await self.update_bridge_info()
  1527. await self.update()
  1528. async def _update_name(self, name: str, sender: p.Puppet | None = None) -> bool:
  1529. if self.name != name or not self.name_set:
  1530. self.name = name
  1531. if self.mxid:
  1532. try:
  1533. await self._try_with_puppet(
  1534. lambda i: i.set_room_name(self.mxid, self.name), puppet=sender
  1535. )
  1536. self.name_set = True
  1537. except Exception:
  1538. self.log.exception("Error setting name")
  1539. self.name_set = False
  1540. return True
  1541. return False
  1542. async def _update_topic(self, topic: str, sender: p.Puppet | None = None) -> bool:
  1543. if self.topic != topic:
  1544. self.topic = topic
  1545. if self.mxid:
  1546. try:
  1547. await self._try_with_puppet(
  1548. lambda i: i.set_room_topic(self.mxid, self.topic), puppet=sender
  1549. )
  1550. except Exception:
  1551. self.log.exception("Error setting topic")
  1552. self.topic = None
  1553. return True
  1554. return False
  1555. async def _try_with_puppet(
  1556. self, action: Callable[[IntentAPI], Awaitable[Any]], puppet: p.Puppet | None = None
  1557. ) -> None:
  1558. if puppet:
  1559. try:
  1560. await action(puppet.intent_for(self))
  1561. except (MForbidden, IntentError):
  1562. await action(self.main_intent)
  1563. else:
  1564. await action(self.main_intent)
  1565. async def _update_avatar(self, info: ChatInfo, sender: p.Puppet | None = None) -> bool:
  1566. path = None
  1567. if isinstance(info, GroupV2):
  1568. path = info.avatar
  1569. elif isinstance(info, Group):
  1570. path = f"group-{self.chat_id}"
  1571. res = await p.Puppet.upload_avatar(self, path, self.main_intent)
  1572. if res is False:
  1573. return False
  1574. self.avatar_hash, self.avatar_url = res
  1575. if not self.mxid:
  1576. return True
  1577. try:
  1578. await self._try_with_puppet(
  1579. lambda i: i.set_room_avatar(self.mxid, self.avatar_url), puppet=sender
  1580. )
  1581. self.avatar_set = True
  1582. except Exception:
  1583. self.log.exception("Error setting avatar")
  1584. self.avatar_set = False
  1585. return True
  1586. async def _update_participants(
  1587. self, source: u.User, info: ChatInfo, sender: p.Puppet | None = None
  1588. ) -> None:
  1589. if not self.mxid or not isinstance(info, (Group, GroupV2)):
  1590. return
  1591. member_events = await self.main_intent.get_members(self.mxid)
  1592. remove_users: set[UserID] = {
  1593. UserID(evt.state_key)
  1594. for evt in member_events
  1595. if evt.content.membership == Membership.JOIN and evt.state_key != self.az.bot_mxid
  1596. }
  1597. pending_members = info.pending_members if isinstance(info, GroupV2) else []
  1598. self._pending_members = {addr.uuid for addr in pending_members}
  1599. for address in info.members:
  1600. user = await u.User.get_by_address(address)
  1601. if user:
  1602. remove_users.discard(user.mxid)
  1603. await self._try_with_puppet(
  1604. lambda i: i.invite_user(self.mxid, user.mxid, check_cache=True), puppet=sender
  1605. )
  1606. puppet = await p.Puppet.get_by_address(address)
  1607. try:
  1608. await source.sync_contact(address)
  1609. except ProfileUnavailableError:
  1610. self.log.debug(f"Profile of puppet with {address} is unavailable")
  1611. await self._try_with_puppet(
  1612. lambda i: i.invite_user(self.mxid, puppet.intent_for(self).mxid, check_cache=True),
  1613. puppet=sender,
  1614. )
  1615. await puppet.intent_for(self).ensure_joined(self.mxid)
  1616. remove_users.discard(puppet.default_mxid)
  1617. for address in pending_members:
  1618. user = await u.User.get_by_address(address)
  1619. if user:
  1620. remove_users.discard(user.mxid)
  1621. await self._try_with_puppet(
  1622. lambda i: i.invite_user(self.mxid, user.mxid, check_cache=True), puppet=sender
  1623. )
  1624. puppet = await p.Puppet.get_by_address(address)
  1625. try:
  1626. await source.sync_contact(address)
  1627. except ProfileUnavailableError:
  1628. self.log.debug(f"Profile of puppet with {address} is unavailable")
  1629. await self._try_with_puppet(
  1630. lambda i: i.invite_user(self.mxid, puppet.intent_for(self).mxid, check_cache=True),
  1631. puppet=sender,
  1632. )
  1633. remove_users.discard(puppet.default_mxid)
  1634. for mxid in remove_users:
  1635. user = await u.User.get_by_mxid(mxid, create=False)
  1636. if user and await user.is_logged_in():
  1637. await self._kick_with_puppet(user, sender)
  1638. puppet = await p.Puppet.get_by_mxid(mxid, create=False)
  1639. if puppet:
  1640. if puppet == sender:
  1641. await puppet.intent_for(self).leave_room(self.mxid)
  1642. else:
  1643. await self._kick_with_puppet(puppet, sender)
  1644. async def _kick_with_puppet(
  1645. self, user: p.Puppet | u.User, sender: p.Puppet | None = None
  1646. ) -> None:
  1647. if sender:
  1648. try:
  1649. await sender.intent_for(self).kick_user(self.mxid, user.mxid)
  1650. except (MForbidden, IntentError):
  1651. await self.main_intent.kick_user(self.mxid, user.mxid, f"kicked by {sender.name}")
  1652. else:
  1653. await self.main_intent.kick_user(
  1654. self.mxid, user.mxid, "Not a member of this Signal group"
  1655. )
  1656. async def _update_power_levels(self, info: ChatInfo) -> None:
  1657. if not self.mxid:
  1658. return
  1659. power_levels = await self.main_intent.get_power_levels(self.mxid)
  1660. power_levels = await self._get_power_levels(power_levels, info=info, is_initial=False)
  1661. await self.main_intent.set_power_levels(self.mxid, power_levels)
  1662. # endregion
  1663. # region Bridge info state event
  1664. @property
  1665. def bridge_info_state_key(self) -> str:
  1666. return f"net.maunium.signal://signal/{self.chat_id_str}"
  1667. @property
  1668. def bridge_info(self) -> dict[str, Any]:
  1669. return {
  1670. "bridgebot": self.az.bot_mxid,
  1671. "creator": self.main_intent.mxid,
  1672. "protocol": {
  1673. "id": "signal",
  1674. "displayname": "Signal",
  1675. "avatar_url": self.config["appservice.bot_avatar"],
  1676. },
  1677. "channel": {
  1678. "id": self.chat_id_str,
  1679. "displayname": self.name,
  1680. "avatar_url": self.avatar_url,
  1681. },
  1682. }
  1683. async def update_bridge_info(self) -> None:
  1684. if not self.mxid:
  1685. self.log.debug("Not updating bridge info: no Matrix room created")
  1686. return
  1687. try:
  1688. self.log.debug("Updating bridge info...")
  1689. await self.main_intent.send_state_event(
  1690. self.mxid, StateBridge, self.bridge_info, self.bridge_info_state_key
  1691. )
  1692. # TODO remove this once https://github.com/matrix-org/matrix-doc/pull/2346 is in spec
  1693. await self.main_intent.send_state_event(
  1694. self.mxid, StateHalfShotBridge, self.bridge_info, self.bridge_info_state_key
  1695. )
  1696. except Exception:
  1697. self.log.warning("Failed to update bridge info", exc_info=True)
  1698. # endregion
  1699. # region Creating Matrix rooms
  1700. async def update_matrix_room(self, source: u.User, info: ChatInfo) -> None:
  1701. if not self.is_direct and not isinstance(info, (Group, GroupV2, GroupV2ID)):
  1702. raise ValueError(f"Unexpected type for updating group portal: {type(info)}")
  1703. elif self.is_direct and not isinstance(info, (Profile, Address)):
  1704. raise ValueError(f"Unexpected type for updating direct chat portal: {type(info)}")
  1705. try:
  1706. await self._update_matrix_room(source, info)
  1707. except Exception:
  1708. self.log.exception("Failed to update portal")
  1709. async def create_matrix_room(self, source: u.User, info: ChatInfo) -> RoomID | None:
  1710. if not self.is_direct and not isinstance(info, (Group, GroupV2, GroupV2ID)):
  1711. raise ValueError(f"Unexpected type for creating group portal: {type(info)}")
  1712. elif self.is_direct and not isinstance(info, (Profile, Address)):
  1713. raise ValueError(f"Unexpected type for creating direct chat portal: {type(info)}")
  1714. if isinstance(info, Group) and not info.members:
  1715. try:
  1716. groups = await self.signal.list_groups(source.username)
  1717. except Exception as e:
  1718. await source.handle_auth_failure(e)
  1719. raise
  1720. info = next(
  1721. (g for g in groups if isinstance(g, Group) and g.group_id == info.group_id), info
  1722. )
  1723. elif isinstance(info, GroupV2ID) and not isinstance(info, GroupV2):
  1724. self.log.debug(
  1725. f"create_matrix_room() called with {info}, fetching full info from signald"
  1726. )
  1727. try:
  1728. info = await self.signal.get_group(source.username, info.id, info.revision or -1)
  1729. except Exception as e:
  1730. await source.handle_auth_failure(e)
  1731. raise
  1732. if not info:
  1733. self.log.warning(f"Full info not found, canceling room creation")
  1734. return None
  1735. else:
  1736. self.log.trace("get_group() returned full info: %s", info)
  1737. if self.mxid:
  1738. await self.update_matrix_room(source, info)
  1739. return self.mxid
  1740. async with self._create_room_lock:
  1741. return await self._create_matrix_room(source, info)
  1742. def _get_invite_content(self, double_puppet: p.Puppet | None) -> dict[str, Any]:
  1743. invite_content = {}
  1744. if double_puppet:
  1745. invite_content["fi.mau.will_auto_accept"] = True
  1746. if self.is_direct:
  1747. invite_content["is_direct"] = True
  1748. return invite_content
  1749. async def _update_matrix_room(self, source: u.User, info: ChatInfo) -> None:
  1750. puppet = await p.Puppet.get_by_custom_mxid(source.mxid)
  1751. await self.main_intent.invite_user(
  1752. self.mxid,
  1753. source.mxid,
  1754. check_cache=True,
  1755. extra_content=self._get_invite_content(puppet),
  1756. )
  1757. if puppet:
  1758. did_join = await puppet.intent.ensure_joined(self.mxid)
  1759. if did_join and self.is_direct:
  1760. await source.update_direct_chats({self.main_intent.mxid: [self.mxid]})
  1761. await self.update_info(source, info)
  1762. async def _get_power_levels(
  1763. self,
  1764. levels: PowerLevelStateEventContent | None = None,
  1765. info: ChatInfo | None = None,
  1766. is_initial: bool = False,
  1767. ) -> PowerLevelStateEventContent:
  1768. levels = levels or PowerLevelStateEventContent()
  1769. bot_pl = levels.get_user_level(self.az.bot_mxid)
  1770. levels.events_default = 0
  1771. if self.is_direct:
  1772. levels.ban = 99
  1773. levels.kick = 99
  1774. levels.invite = 99
  1775. levels.state_default = 0
  1776. meta_edit_level = 0
  1777. else:
  1778. if isinstance(info, GroupV2):
  1779. ac = info.access_control
  1780. for detail in info.member_detail + info.pending_member_detail:
  1781. puppet = await p.Puppet.get_by_address(Address(uuid=detail.uuid))
  1782. puppet_mxid = puppet.intent_for(self).mxid
  1783. current_level = levels.get_user_level(puppet_mxid)
  1784. if bot_pl > current_level and bot_pl >= 50:
  1785. level = current_level
  1786. if puppet.is_real_user:
  1787. if current_level >= 50 and detail.role == GroupMemberRole.DEFAULT:
  1788. level = 0
  1789. elif (
  1790. current_level < 50 and detail.role == GroupMemberRole.ADMINISTRATOR
  1791. ):
  1792. level = 50
  1793. else:
  1794. level = 50 if detail.role == GroupMemberRole.ADMINISTRATOR else 0
  1795. levels.users[puppet_mxid] = level
  1796. announcements = info.announcements
  1797. else:
  1798. ac = GroupAccessControl()
  1799. announcements = AnnouncementsMode.UNKNOWN
  1800. levels.ban = 50
  1801. levels.kick = 50
  1802. levels.invite = 50 if ac.members == AccessControlMode.ADMINISTRATOR else 0
  1803. levels.state_default = 50
  1804. meta_edit_level = 50 if ac.attributes == AccessControlMode.ADMINISTRATOR else 0
  1805. if announcements == AnnouncementsMode.ENABLED:
  1806. levels.events_default = 50
  1807. levels.events[EventType.REACTION] = 0
  1808. levels.events[EventType.ROOM_NAME] = meta_edit_level
  1809. levels.events[EventType.ROOM_AVATAR] = meta_edit_level
  1810. levels.events[EventType.ROOM_TOPIC] = meta_edit_level
  1811. levels.events[EventType.ROOM_ENCRYPTION] = 50 if self.matrix.e2ee else 99
  1812. levels.events[EventType.ROOM_TOMBSTONE] = 99
  1813. levels.users_default = 0
  1814. # Remote delete is only for your own messages
  1815. levels.redact = 99
  1816. if self.main_intent.mxid not in levels.users:
  1817. levels.users[self.main_intent.mxid] = 9001 if is_initial else 100
  1818. return levels
  1819. async def _create_matrix_room(self, source: u.User, info: ChatInfo) -> RoomID | None:
  1820. if self.mxid:
  1821. await self._update_matrix_room(source, info)
  1822. return self.mxid
  1823. await self.update_info(source, info)
  1824. self.log.debug("Creating Matrix room")
  1825. name: str | None = None
  1826. power_levels = await self._get_power_levels(info=info, is_initial=True)
  1827. initial_state = [
  1828. {
  1829. "type": str(StateBridge),
  1830. "state_key": self.bridge_info_state_key,
  1831. "content": self.bridge_info,
  1832. },
  1833. {
  1834. # TODO remove this once https://github.com/matrix-org/matrix-doc/pull/2346 is in spec
  1835. "type": str(StateHalfShotBridge),
  1836. "state_key": self.bridge_info_state_key,
  1837. "content": self.bridge_info,
  1838. },
  1839. {
  1840. "type": str(EventType.ROOM_POWER_LEVELS),
  1841. "content": power_levels.serialize(),
  1842. },
  1843. ]
  1844. invites = []
  1845. if self.config["bridge.encryption.default"] and self.matrix.e2ee:
  1846. self.encrypted = True
  1847. initial_state.append(
  1848. {
  1849. "type": str(EventType.ROOM_ENCRYPTION),
  1850. "content": self.get_encryption_state_event_json(),
  1851. }
  1852. )
  1853. if self.is_direct:
  1854. invites.append(self.az.bot_mxid)
  1855. if self.is_direct and source.address == self.chat_id:
  1856. name = self.name = "Signal Note to Self"
  1857. elif self.encrypted or self.private_chat_portal_meta or not self.is_direct:
  1858. name = self.name
  1859. if self.avatar_url:
  1860. initial_state.append(
  1861. {
  1862. "type": str(EventType.ROOM_AVATAR),
  1863. "content": {"url": self.avatar_url},
  1864. }
  1865. )
  1866. creation_content = {}
  1867. if not self.config["bridge.federate_rooms"]:
  1868. creation_content["m.federate"] = False
  1869. self.mxid = await self.main_intent.create_room(
  1870. name=name,
  1871. topic=self.topic,
  1872. is_direct=self.is_direct,
  1873. initial_state=initial_state,
  1874. invitees=invites,
  1875. creation_content=creation_content,
  1876. # Make sure the power level event in initial_state is allowed
  1877. # even if the server sends a default power level event before it.
  1878. # TODO remove this if the spec is changed to require servers to
  1879. # use the power level event in initial_state
  1880. power_level_override={"users": {self.main_intent.mxid: 9001}},
  1881. )
  1882. if not self.mxid:
  1883. raise Exception("Failed to create room: no mxid returned")
  1884. self.name_set = bool(name)
  1885. self.avatar_set = bool(self.avatar_url)
  1886. if self.encrypted and self.matrix.e2ee and self.is_direct:
  1887. try:
  1888. await self.az.intent.ensure_joined(self.mxid)
  1889. except Exception:
  1890. self.log.warning("Failed to add bridge bot to new private chat {self.mxid}")
  1891. puppet = await p.Puppet.get_by_custom_mxid(source.mxid)
  1892. await self.main_intent.invite_user(
  1893. self.mxid, source.mxid, extra_content=self._get_invite_content(puppet)
  1894. )
  1895. if puppet:
  1896. try:
  1897. await source.update_direct_chats({self.main_intent.mxid: [self.mxid]})
  1898. await puppet.intent.join_room_by_id(self.mxid)
  1899. except MatrixError:
  1900. self.log.debug(
  1901. "Failed to join custom puppet into newly created portal", exc_info=True
  1902. )
  1903. await self.update()
  1904. self.log.debug(f"Matrix room created: {self.mxid}")
  1905. self.by_mxid[self.mxid] = self
  1906. if not self.is_direct:
  1907. await self._update_participants(source, info)
  1908. return self.mxid
  1909. # endregion
  1910. # region Database getters
  1911. async def _postinit(self) -> None:
  1912. self.by_chat_id[(self.chat_id_str, self.receiver)] = self
  1913. if self.mxid:
  1914. self.by_mxid[self.mxid] = self
  1915. if self.is_direct:
  1916. puppet = await self.get_dm_puppet()
  1917. self._main_intent = puppet.default_mxid_intent
  1918. elif not self.is_direct:
  1919. self._main_intent = self.az.intent
  1920. async def delete(self) -> None:
  1921. await DBMessage.delete_all(self.mxid)
  1922. self.by_mxid.pop(self.mxid, None)
  1923. self.mxid = None
  1924. self.name_set = False
  1925. self.avatar_set = False
  1926. self.relay_user_id = None
  1927. self.topic = None
  1928. self.encrypted = False
  1929. await self.update()
  1930. async def save(self) -> None:
  1931. await self.update()
  1932. @classmethod
  1933. def all_with_room(cls) -> AsyncGenerator[Portal, None]:
  1934. return cls._db_to_portals(super().all_with_room())
  1935. @classmethod
  1936. def find_private_chats_with(cls, other_user: Address) -> AsyncGenerator[Portal, None]:
  1937. return cls._db_to_portals(super().find_private_chats_with(other_user))
  1938. @classmethod
  1939. async def _db_to_portals(cls, query: Awaitable[list[Portal]]) -> AsyncGenerator[Portal, None]:
  1940. portals = await query
  1941. for index, portal in enumerate(portals):
  1942. try:
  1943. yield cls.by_chat_id[(portal.chat_id_str, portal.receiver)]
  1944. except KeyError:
  1945. await portal._postinit()
  1946. yield portal
  1947. @classmethod
  1948. @async_getter_lock
  1949. async def get_by_mxid(cls, mxid: RoomID) -> Portal | None:
  1950. try:
  1951. return cls.by_mxid[mxid]
  1952. except KeyError:
  1953. pass
  1954. portal = cast(cls, await super().get_by_mxid(mxid))
  1955. if portal is not None:
  1956. await portal._postinit()
  1957. return portal
  1958. return None
  1959. @classmethod
  1960. async def get_by_chat_id(
  1961. cls, chat_id: GroupID | Address, *, receiver: str = "", create: bool = False
  1962. ) -> Portal | None:
  1963. if isinstance(chat_id, str):
  1964. receiver = ""
  1965. elif not isinstance(chat_id, Address):
  1966. raise ValueError(f"Invalid chat ID type {type(chat_id)}")
  1967. elif not receiver:
  1968. raise ValueError("Direct chats must have a receiver")
  1969. best_id = id_to_str(chat_id)
  1970. portal = await cls._get_by_chat_id(best_id, receiver, create=create, chat_id=chat_id)
  1971. if portal:
  1972. portal.log.debug(f"get_by_chat_id({chat_id}, {receiver}) -> {hex(id(portal))}")
  1973. return portal
  1974. @classmethod
  1975. @async_getter_lock
  1976. async def _get_by_chat_id(
  1977. cls, best_id: str, receiver: str, *, create: bool, chat_id: GroupID | Address
  1978. ) -> Portal | None:
  1979. try:
  1980. return cls.by_chat_id[(best_id, receiver)]
  1981. except KeyError:
  1982. pass
  1983. portal = cast(cls, await super().get_by_chat_id(chat_id, receiver))
  1984. if portal is not None:
  1985. await portal._postinit()
  1986. return portal
  1987. if create:
  1988. portal = cls(chat_id, receiver)
  1989. await portal.insert()
  1990. await portal._postinit()
  1991. return portal
  1992. return None
  1993. # endregion