signald.py 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406
  1. # Copyright (c) 2022 Tulir Asokan
  2. #
  3. # This Source Code Form is subject to the terms of the Mozilla Public
  4. # License, v. 2.0. If a copy of the MPL was not distributed with this
  5. # file, You can obtain one at http://mozilla.org/MPL/2.0/.
  6. from typing import Any, Awaitable, Callable, Dict, List, Optional, Set, Type, TypeVar, Union
  7. import asyncio
  8. from mautrix.util.logging import TraceLogger
  9. from .errors import RPCError, UnexpectedResponse
  10. from .rpc import CONNECT_EVENT, DISCONNECT_EVENT, SignaldRPCClient
  11. from .types import (
  12. Account,
  13. Address,
  14. Attachment,
  15. DeviceInfo,
  16. GetIdentitiesResponse,
  17. Group,
  18. GroupID,
  19. GroupV2,
  20. IncomingMessage,
  21. LinkSession,
  22. Mention,
  23. Profile,
  24. Quote,
  25. Reaction,
  26. WebsocketConnectionState,
  27. WebsocketConnectionStateChangeEvent,
  28. )
  29. T = TypeVar("T")
  30. EventHandler = Callable[[T], Awaitable[None]]
  31. class SignaldClient(SignaldRPCClient):
  32. _event_handlers: Dict[Type[T], List[EventHandler]]
  33. _subscriptions: Set[str]
  34. def __init__(
  35. self,
  36. socket_path: str = "/var/run/signald/signald.sock",
  37. log: Optional[TraceLogger] = None,
  38. loop: Optional[asyncio.AbstractEventLoop] = None,
  39. ) -> None:
  40. super().__init__(socket_path, log, loop)
  41. self._event_handlers = {}
  42. self._subscriptions = set()
  43. self.add_rpc_handler("IncomingMessage", self._parse_message)
  44. self.add_rpc_handler("WebSocketConnectionState", self._websocket_connection_state_change)
  45. self.add_rpc_handler("version", self._log_version)
  46. self.add_rpc_handler(CONNECT_EVENT, self._resubscribe)
  47. self.add_rpc_handler(DISCONNECT_EVENT, self._on_disconnect)
  48. def add_event_handler(self, event_class: Type[T], handler: EventHandler) -> None:
  49. self._event_handlers.setdefault(event_class, []).append(handler)
  50. def remove_event_handler(self, event_class: Type[T], handler: EventHandler) -> None:
  51. self._event_handlers.setdefault(event_class, []).remove(handler)
  52. async def _run_event_handler(self, event: T) -> None:
  53. try:
  54. handlers = self._event_handlers[type(event)]
  55. except KeyError:
  56. self.log.warning(f"No handlers for {type(event)}")
  57. else:
  58. for handler in handlers:
  59. try:
  60. await handler(event)
  61. except Exception:
  62. self.log.exception("Exception in event handler")
  63. async def _parse_message(self, data: Dict[str, Any]) -> None:
  64. event_type = data["type"]
  65. event_data = data["data"]
  66. event_class = {
  67. "IncomingMessage": IncomingMessage,
  68. }[event_type]
  69. event = event_class.deserialize(event_data)
  70. await self._run_event_handler(event)
  71. async def _log_version(self, data: Dict[str, Any]) -> None:
  72. name = data["data"]["name"]
  73. version = data["data"]["version"]
  74. self.log.info(f"Connected to {name} v{version}")
  75. async def _websocket_connection_state_change(self, change_event: Dict[str, Any]) -> None:
  76. evt = WebsocketConnectionStateChangeEvent.deserialize(
  77. {
  78. "account": change_event["account"],
  79. **change_event["data"],
  80. }
  81. )
  82. await self._run_event_handler(evt)
  83. async def subscribe(self, username: str) -> bool:
  84. try:
  85. await self.request_v1("subscribe", account=username)
  86. self._subscriptions.add(username)
  87. return True
  88. except RPCError as e:
  89. self.log.debug("Failed to subscribe to %s: %s", username, e)
  90. evt = WebsocketConnectionStateChangeEvent(
  91. state=(
  92. WebsocketConnectionState.AUTHENTICATION_FAILED
  93. if str(e) == "[401] Authorization failed!"
  94. else WebsocketConnectionState.DISCONNECTED
  95. ),
  96. account=username,
  97. )
  98. await self._run_event_handler(evt)
  99. return False
  100. async def unsubscribe(self, username: str) -> bool:
  101. try:
  102. await self.request_v1("unsubscribe", account=username)
  103. self._subscriptions.remove(username)
  104. return True
  105. except RPCError as e:
  106. self.log.debug("Failed to unsubscribe from %s: %s", username, e)
  107. return False
  108. async def _resubscribe(self, unused_data: Dict[str, Any]) -> None:
  109. if self._subscriptions:
  110. self.log.debug("Resubscribing to users")
  111. for username in list(self._subscriptions):
  112. await self.subscribe(username)
  113. async def _on_disconnect(self, *_) -> None:
  114. if self._subscriptions:
  115. self.log.debug("Notifying of disconnection from users")
  116. for username in self._subscriptions:
  117. evt = WebsocketConnectionStateChangeEvent(
  118. state=WebsocketConnectionState.SOCKET_DISCONNECTED,
  119. account=username,
  120. exception="Disconnected from signald",
  121. )
  122. await self._run_event_handler(evt)
  123. async def register(
  124. self, phone: str, voice: bool = False, captcha: Optional[str] = None
  125. ) -> str:
  126. resp = await self.request_v1("register", account=phone, voice=voice, captcha=captcha)
  127. return resp["account_id"]
  128. async def verify(self, username: str, code: str) -> Account:
  129. resp = await self.request_v1("verify", account=username, code=code)
  130. return Account.deserialize(resp)
  131. async def start_link(self) -> LinkSession:
  132. return LinkSession.deserialize(await self.request_v1("generate_linking_uri"))
  133. async def wait_for_scan(self, session_id: str) -> None:
  134. await self.request_v1("wait_for_scan", session_id=session_id)
  135. async def finish_link(
  136. self, session_id: str, device_name: str = "mausignald", overwrite: bool = False
  137. ) -> Account:
  138. resp = await self.request_v1(
  139. "finish_link", device_name=device_name, session_id=session_id, overwrite=overwrite
  140. )
  141. return Account.deserialize(resp)
  142. @staticmethod
  143. def _recipient_to_args(
  144. recipient: Union[Address, GroupID], simple_name: bool = False
  145. ) -> Dict[str, Any]:
  146. if isinstance(recipient, Address):
  147. recipient = recipient.serialize()
  148. field_name = "address" if simple_name else "recipientAddress"
  149. else:
  150. field_name = "group" if simple_name else "recipientGroupId"
  151. return {field_name: recipient}
  152. async def react(
  153. self, username: str, recipient: Union[Address, GroupID], reaction: Reaction
  154. ) -> None:
  155. await self.request_v1(
  156. "react",
  157. username=username,
  158. reaction=reaction.serialize(),
  159. **self._recipient_to_args(recipient),
  160. )
  161. async def remote_delete(
  162. self, username: str, recipient: Union[Address, GroupID], timestamp: int
  163. ) -> None:
  164. await self.request_v1(
  165. "remote_delete",
  166. account=username,
  167. timestamp=timestamp,
  168. **self._recipient_to_args(recipient, simple_name=True),
  169. )
  170. async def send(
  171. self,
  172. username: str,
  173. recipient: Union[Address, GroupID],
  174. body: str,
  175. quote: Optional[Quote] = None,
  176. attachments: Optional[List[Attachment]] = None,
  177. mentions: Optional[List[Mention]] = None,
  178. timestamp: Optional[int] = None,
  179. ) -> None:
  180. serialized_quote = quote.serialize() if quote else None
  181. serialized_attachments = [attachment.serialize() for attachment in (attachments or [])]
  182. serialized_mentions = [mention.serialize() for mention in (mentions or [])]
  183. resp = await self.request_v1(
  184. "send",
  185. username=username,
  186. messageBody=body,
  187. attachments=serialized_attachments,
  188. quote=serialized_quote,
  189. mentions=serialized_mentions,
  190. timestamp=timestamp,
  191. **self._recipient_to_args(recipient),
  192. )
  193. # We handle unregisteredFailure a little differently than other errors. If there are no
  194. # successful sends, then we show an error with the unregisteredFailure details, otherwise
  195. # we ignore it.
  196. errors = []
  197. unregistered_failures = []
  198. successful_send_count = 0
  199. results = resp.get("results", [])
  200. for result in results:
  201. address = result.get("addres", {})
  202. number = address.get("number") or address.get("uuid")
  203. proof_required_failure = result.get("proof_required_failure")
  204. if result.get("networkFailure", False):
  205. errors.append(f"Network failure occurred while sending message to {number}.")
  206. elif result.get("unregisteredFailure", False):
  207. unregistered_failures.append(
  208. f"Unregistered failure occurred while sending message to {number}."
  209. )
  210. elif result.get("identityFailure", ""):
  211. errors.append(
  212. f"Identity failure occurred while sending message to {number}. New identity: "
  213. f"{result['identityFailure']}"
  214. )
  215. elif proof_required_failure:
  216. options = proof_required_failure.get("options")
  217. self.log.warning(
  218. f"Proof Required Failure {options}. "
  219. f"Retry after: {proof_required_failure.get('retry_after')}. "
  220. f"Token: {proof_required_failure.get('token')}. "
  221. f"Message: {proof_required_failure.get('message')}. "
  222. )
  223. errors.append(
  224. f"Proof required failure occurred while sending message to {number}. Message: "
  225. f"{proof_required_failure.get('message')}"
  226. )
  227. if "RECAPTCHA" in options:
  228. errors.append("RECAPTCHA required.")
  229. elif "PUSH_CHALLENGE" in options:
  230. # Just submit the challenge automatically.
  231. await self.request_v1("submit_challenge")
  232. else:
  233. successful_send_count += 1
  234. self.log.info(
  235. f"Successfully sent message to {successful_send_count}/{len(results)} users in "
  236. f"{recipient} with {len(unregistered_failures)} unregistered failures"
  237. )
  238. if len(unregistered_failures) == len(results):
  239. errors.extend(unregistered_failures)
  240. if errors:
  241. raise Exception("\n".join(errors))
  242. async def send_receipt(
  243. self,
  244. username: str,
  245. sender: Address,
  246. timestamps: List[int],
  247. when: Optional[int] = None,
  248. read: bool = False,
  249. ) -> None:
  250. if not read:
  251. # TODO implement
  252. return
  253. await self.request_v1(
  254. "mark_read", account=username, timestamps=timestamps, when=when, to=sender.serialize()
  255. )
  256. async def list_accounts(self) -> List[Account]:
  257. resp = await self.request_v1("list_accounts")
  258. return [Account.deserialize(acc) for acc in resp.get("accounts", [])]
  259. async def delete_account(self, username: str, server: bool = False) -> None:
  260. await self.request_v1("delete_account", account=username, server=server)
  261. async def get_linked_devices(self, username: str) -> List[DeviceInfo]:
  262. resp = await self.request_v1("get_linked_devices", account=username)
  263. return [DeviceInfo.deserialize(dev) for dev in resp.get("devices", [])]
  264. async def remove_linked_device(self, username: str, device_id: int) -> None:
  265. await self.request_v1("remove_linked_device", account=username, deviceId=device_id)
  266. async def list_contacts(self, username: str) -> List[Profile]:
  267. resp = await self.request_v1("list_contacts", account=username)
  268. return [Profile.deserialize(contact) for contact in resp["profiles"]]
  269. async def list_groups(self, username: str) -> List[Union[Group, GroupV2]]:
  270. resp = await self.request_v1("list_groups", account=username)
  271. legacy = [Group.deserialize(group) for group in resp.get("legacyGroups", [])]
  272. v2 = [GroupV2.deserialize(group) for group in resp.get("groups", [])]
  273. return legacy + v2
  274. async def update_group(
  275. self,
  276. username: str,
  277. group_id: GroupID,
  278. title: Optional[str] = None,
  279. avatar_path: Optional[str] = None,
  280. add_members: Optional[List[Address]] = None,
  281. remove_members: Optional[List[Address]] = None,
  282. ) -> Union[Group, GroupV2, None]:
  283. update_params = {
  284. key: value
  285. for key, value in {
  286. "groupID": group_id,
  287. "avatar": avatar_path,
  288. "title": title,
  289. "addMembers": [addr.serialize() for addr in add_members] if add_members else None,
  290. "removeMembers": (
  291. [addr.serialize() for addr in remove_members] if remove_members else None
  292. ),
  293. }.items()
  294. if value is not None
  295. }
  296. resp = await self.request_v1("update_group", account=username, **update_params)
  297. if "v1" in resp:
  298. return Group.deserialize(resp["v1"])
  299. elif "v2" in resp:
  300. return GroupV2.deserialize(resp["v2"])
  301. else:
  302. return None
  303. async def accept_invitation(self, username: str, group_id: GroupID) -> GroupV2:
  304. resp = await self.request_v1("accept_invitation", account=username, groupID=group_id)
  305. return GroupV2.deserialize(resp)
  306. async def get_group(
  307. self, username: str, group_id: GroupID, revision: int = -1
  308. ) -> Optional[GroupV2]:
  309. resp = await self.request_v1(
  310. "get_group", account=username, groupID=group_id, revision=revision
  311. )
  312. if "id" not in resp:
  313. return None
  314. return GroupV2.deserialize(resp)
  315. async def get_profile(
  316. self, username: str, address: Address, use_cache: bool = False
  317. ) -> Optional[Profile]:
  318. try:
  319. # async is a reserved keyword, so can't pass it as a normal parameter
  320. kwargs = {"async": use_cache}
  321. resp = await self.request_v1(
  322. "get_profile", account=username, address=address.serialize(), **kwargs
  323. )
  324. except UnexpectedResponse as e:
  325. if e.resp_type == "profile_not_available":
  326. return None
  327. raise
  328. return Profile.deserialize(resp)
  329. async def get_identities(self, username: str, address: Address) -> GetIdentitiesResponse:
  330. resp = await self.request_v1(
  331. "get_identities", account=username, address=address.serialize()
  332. )
  333. return GetIdentitiesResponse.deserialize(resp)
  334. async def set_profile(
  335. self, username: str, name: Optional[str] = None, avatar_path: Optional[str] = None
  336. ) -> None:
  337. args = {}
  338. if name is not None:
  339. args["name"] = name
  340. if avatar_path is not None:
  341. args["avatarFile"] = avatar_path
  342. await self.request_v1("set_profile", account=username, **args)
  343. async def trust(
  344. self,
  345. username: str,
  346. recipient: Address,
  347. trust_level: str,
  348. safety_number: Optional[str] = None,
  349. qr_code_data: Optional[str] = None,
  350. ) -> None:
  351. args = {}
  352. if safety_number:
  353. if qr_code_data:
  354. raise ValueError("only one of safety_number and qr_code_data must be set")
  355. args["safety_number"] = safety_number
  356. elif qr_code_data:
  357. args["qr_code_data"] = qr_code_data
  358. else:
  359. raise ValueError("safety_number or qr_code_data is required")
  360. await self.request_v1(
  361. "trust",
  362. account=username,
  363. **args,
  364. trust_level=trust_level,
  365. address=recipient.serialize(),
  366. )