portal.py 107 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589
  1. # mautrix-signal - A Matrix-Signal puppeting bridge
  2. # Copyright (C) 2022 Tulir Asokan
  3. #
  4. # This program is free software: you can redistribute it and/or modify
  5. # it under the terms of the GNU Affero General Public License as published by
  6. # the Free Software Foundation, either version 3 of the License, or
  7. # (at your option) any later version.
  8. #
  9. # This program is distributed in the hope that it will be useful,
  10. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. # GNU Affero General Public License for more details.
  13. #
  14. # You should have received a copy of the GNU Affero General Public License
  15. # along with this program. If not, see <https://www.gnu.org/licenses/>.
  16. from __future__ import annotations
  17. from typing import TYPE_CHECKING, Any, AsyncGenerator, Awaitable, Callable, Literal, Union, cast
  18. from collections import deque
  19. from uuid import UUID, uuid4
  20. import asyncio
  21. import hashlib
  22. import mimetypes
  23. import os
  24. import os.path
  25. import pathlib
  26. import time
  27. from mausignald.errors import (
  28. AttachmentTooLargeError,
  29. GroupPatchNotAcceptedError,
  30. NotConnected,
  31. ProfileUnavailableError,
  32. RPCError,
  33. )
  34. from mausignald.types import (
  35. AccessControlMode,
  36. Address,
  37. AnnouncementsMode,
  38. Attachment,
  39. GroupAccessControl,
  40. GroupChange,
  41. GroupID,
  42. GroupMember,
  43. GroupMemberRole,
  44. GroupV2,
  45. GroupV2ID,
  46. LinkPreview,
  47. Mention,
  48. MessageData,
  49. Profile,
  50. Quote,
  51. QuotedAttachment,
  52. Reaction,
  53. SharedContact,
  54. Sticker,
  55. )
  56. from mautrix.appservice import AppService, IntentAPI
  57. from mautrix.bridge import BasePortal, RejectMatrixInvite, async_getter_lock
  58. from mautrix.errors import IntentError, MatrixError, MBadState, MForbidden
  59. from mautrix.types import (
  60. AudioInfo,
  61. BeeperMessageStatusEventContent,
  62. ContentURI,
  63. EncryptedEvent,
  64. EncryptedFile,
  65. EventID,
  66. EventType,
  67. FileInfo,
  68. ImageInfo,
  69. JoinRule,
  70. MediaMessageEventContent,
  71. Membership,
  72. MessageEvent,
  73. MessageEventContent,
  74. MessageStatus,
  75. MessageStatusReason,
  76. MessageType,
  77. PowerLevelStateEventContent,
  78. RelatesTo,
  79. RelationType,
  80. RoomID,
  81. TextMessageEventContent,
  82. UserID,
  83. VideoInfo,
  84. )
  85. from mautrix.util import background_task, ffmpeg, variation_selector
  86. from mautrix.util.format_duration import format_duration
  87. from mautrix.util.message_send_checkpoint import MessageSendCheckpointStatus
  88. from . import matrix as m, puppet as p, signal as s, user as u
  89. from .config import Config
  90. from .db import (
  91. DisappearingMessage,
  92. Message as DBMessage,
  93. Portal as DBPortal,
  94. Reaction as DBReaction,
  95. )
  96. from .formatter import matrix_to_signal, signal_to_matrix
  97. if TYPE_CHECKING:
  98. from .__main__ import SignalBridge
  99. try:
  100. from mautrix.crypto.attachments import decrypt_attachment, encrypt_attachment
  101. except ImportError:
  102. encrypt_attachment = decrypt_attachment = None
  103. try:
  104. from signalstickers_client import StickersClient
  105. from signalstickers_client.models import StickerPack
  106. except ImportError:
  107. StickersClient = StickerPack = None
  108. try:
  109. from mautrix.util import magic
  110. except ImportError:
  111. magic = None
  112. StateBridge = EventType.find("m.bridge", EventType.Class.STATE)
  113. StateHalfShotBridge = EventType.find("uk.half-shot.bridge", EventType.Class.STATE)
  114. ChatInfo = Union[GroupV2, Profile, Address]
  115. MAX_MATRIX_MESSAGE_SIZE = 30000
  116. BEEPER_LINK_PREVIEWS_KEY = "com.beeper.linkpreviews"
  117. BEEPER_IMAGE_ENCRYPTION_KEY = "beeper:image:encryption"
  118. class UnknownReactionTarget(Exception):
  119. pass
  120. class Portal(DBPortal, BasePortal):
  121. by_mxid: dict[RoomID, Portal] = {}
  122. by_chat_id: dict[tuple[str, str], Portal] = {}
  123. _sticker_meta_cache: dict[str, StickerPack] = {}
  124. disappearing_msg_class = DisappearingMessage
  125. config: Config
  126. matrix: m.MatrixHandler
  127. signal: s.SignalHandler
  128. az: AppService
  129. private_chat_portal_meta: Literal["default", "always", "never"]
  130. expiration_time: int | None
  131. _main_intent: IntentAPI | None
  132. _create_room_lock: asyncio.Lock
  133. _msgts_dedup: deque[tuple[UUID, int]]
  134. _reaction_dedup: deque[tuple[UUID, int, str, UUID, bool]]
  135. _reaction_lock: asyncio.Lock
  136. _pending_members: set[UUID] | None
  137. _expiration_lock: asyncio.Lock
  138. def __init__(
  139. self,
  140. chat_id: GroupID | UUID,
  141. receiver: str,
  142. mxid: RoomID | None = None,
  143. name: str | None = None,
  144. topic: str | None = None,
  145. avatar_hash: str | None = None,
  146. avatar_url: ContentURI | None = None,
  147. name_set: bool = False,
  148. avatar_set: bool = False,
  149. revision: int = 0,
  150. encrypted: bool = False,
  151. relay_user_id: UserID | None = None,
  152. expiration_time: int | None = None,
  153. ) -> None:
  154. super().__init__(
  155. chat_id=chat_id,
  156. receiver=receiver,
  157. mxid=mxid,
  158. name=name,
  159. topic=topic,
  160. avatar_hash=avatar_hash,
  161. avatar_url=avatar_url,
  162. name_set=name_set,
  163. avatar_set=avatar_set,
  164. revision=revision,
  165. encrypted=encrypted,
  166. relay_user_id=relay_user_id,
  167. expiration_time=expiration_time,
  168. )
  169. BasePortal.__init__(self)
  170. self._create_room_lock = asyncio.Lock()
  171. self.log = self.log.getChild(str(self.chat_id))
  172. self._main_intent = None
  173. self._msgts_dedup = deque(maxlen=100)
  174. self._reaction_dedup = deque(maxlen=100)
  175. self._last_participant_update = set()
  176. self._reaction_lock = asyncio.Lock()
  177. self._pending_members = None
  178. self._relay_user = None
  179. self._expiration_lock = asyncio.Lock()
  180. @property
  181. def main_intent(self) -> IntentAPI:
  182. if not self._main_intent:
  183. raise ValueError("Portal must be postinit()ed before main_intent can be used")
  184. return self._main_intent
  185. @property
  186. def is_direct(self) -> bool:
  187. return isinstance(self.chat_id, UUID)
  188. @property
  189. def set_dm_room_metadata(self) -> bool:
  190. return (
  191. not self.is_direct
  192. or self.private_chat_portal_meta == "always"
  193. or (self.encrypted and self.private_chat_portal_meta != "never")
  194. )
  195. @property
  196. def disappearing_enabled(self) -> bool:
  197. return self.is_direct or self.config["signal.enable_disappearing_messages_in_groups"]
  198. @classmethod
  199. def init_cls(cls, bridge: "SignalBridge") -> None:
  200. cls.config = bridge.config
  201. cls.matrix = bridge.matrix
  202. cls.signal = bridge.signal
  203. cls.az = bridge.az
  204. cls.loop = bridge.loop
  205. BasePortal.bridge = bridge
  206. cls.private_chat_portal_meta = cls.config["bridge.private_chat_portal_meta"]
  207. # region Misc
  208. async def _send_delivery_receipt(self, event_id: EventID) -> None:
  209. if event_id and self.config["bridge.delivery_receipts"]:
  210. try:
  211. await self.az.intent.mark_read(self.mxid, event_id)
  212. except Exception:
  213. self.log.exception("Failed to send delivery receipt for %s", event_id)
  214. async def _upsert_reaction(
  215. self,
  216. existing: DBReaction,
  217. intent: IntentAPI,
  218. mxid: EventID,
  219. sender: p.Puppet | u.User,
  220. message: DBMessage,
  221. emoji: str,
  222. ) -> None:
  223. if existing:
  224. self.log.debug(
  225. f"_upsert_reaction redacting {existing.mxid} and inserting {mxid}"
  226. f" (message: {message.mxid})"
  227. )
  228. try:
  229. await intent.redact(existing.mx_room, existing.mxid)
  230. except MForbidden:
  231. self.log.debug("Unexpected MForbidden redacting reaction", exc_info=True)
  232. await existing.edit(emoji=emoji, mxid=mxid, mx_room=message.mx_room)
  233. else:
  234. self.log.debug(f"_upsert_reaction inserting {mxid} (message: {message.mxid})")
  235. await DBReaction(
  236. mxid=mxid,
  237. mx_room=message.mx_room,
  238. emoji=emoji,
  239. signal_chat_id=self.chat_id,
  240. signal_receiver=self.receiver,
  241. msg_author=message.sender,
  242. msg_timestamp=message.timestamp,
  243. author=sender.uuid,
  244. ).insert()
  245. # endregion
  246. # region Matrix event handling
  247. @staticmethod
  248. async def _make_attachment(message: MediaMessageEventContent, path: str) -> Attachment:
  249. outgoing_filename = path
  250. if message.msgtype == MessageType.AUDIO:
  251. outgoing_filename = await ffmpeg.convert_path(
  252. path, ".m4a", output_args=("-c:a", "aac"), remove_input=True
  253. )
  254. message.info.mimetype = "audio/mp4"
  255. attachment = Attachment(
  256. custom_filename=message.body,
  257. content_type=message.info.mimetype,
  258. outgoing_filename=str(outgoing_filename),
  259. )
  260. info = message.info
  261. attachment.width = info.get("w", info.get("width", 0))
  262. attachment.height = info.get("h", info.get("height", 0))
  263. attachment.voice_note = message.msgtype == MessageType.AUDIO
  264. return attachment
  265. def _write_outgoing_file(self, data: bytes) -> str:
  266. dir = pathlib.Path(self.config["signal.outgoing_attachment_dir"])
  267. path = dir.joinpath(f"mautrix-signal-{str(uuid4())}")
  268. try:
  269. with open(path, "wb") as file:
  270. file.write(data)
  271. except FileNotFoundError:
  272. dir.mkdir(mode=0o755, parents=True, exist_ok=True)
  273. with open(path, "wb") as file:
  274. file.write(data)
  275. return str(path)
  276. async def _download_matrix_media(self, message: MediaMessageEventContent) -> str:
  277. # Signal limits files to 100 MB
  278. if message.info and message.info.size and message.info.size > 100 * 10**6:
  279. raise AttachmentTooLargeError({"filename": message.body})
  280. if message.file:
  281. data = await self.main_intent.download_media(message.file.url)
  282. data = decrypt_attachment(
  283. data, message.file.key.key, message.file.hashes.get("sha256"), message.file.iv
  284. )
  285. else:
  286. data = await self.main_intent.download_media(message.url)
  287. return self._write_outgoing_file(data)
  288. async def handle_matrix_message(
  289. self, sender: u.User, message: MessageEventContent, event_id: EventID
  290. ) -> None:
  291. try:
  292. await self._handle_matrix_message(sender, message, event_id)
  293. except Exception as e:
  294. self.log.exception(f"Failed to handle Matrix message {event_id}")
  295. status = (
  296. MessageSendCheckpointStatus.UNSUPPORTED
  297. if isinstance(e, AttachmentTooLargeError)
  298. else MessageSendCheckpointStatus.PERM_FAILURE
  299. )
  300. sender.send_remote_checkpoint(
  301. status, event_id, self.mxid, EventType.ROOM_MESSAGE, message.msgtype, error=e
  302. )
  303. await sender.handle_auth_failure(e)
  304. await self._send_error_notice("message", e)
  305. background_task.create(self._send_message_status(event_id, e))
  306. async def _send_error_notice(self, type_name: str, err: Exception) -> None:
  307. if not self.config["bridge.delivery_error_reports"]:
  308. return
  309. message = f"{type(err).__name__}: {err}"
  310. if isinstance(err, NotConnected):
  311. message = "There was an error connecting to signald."
  312. elif isinstance(err, UnknownReactionTarget):
  313. message = "Could not find message to react to on Signal."
  314. await self._send_message(
  315. self.main_intent,
  316. TextMessageEventContent(
  317. msgtype=MessageType.NOTICE,
  318. body=f"\u26a0 Your {type_name} was not bridged: {message}",
  319. ),
  320. )
  321. async def _send_message_status(self, event_id: EventID, err: Exception | None) -> None:
  322. if not self.config["bridge.message_status_events"]:
  323. return
  324. intent = self.az.intent if self.encrypted else self.main_intent
  325. status = BeeperMessageStatusEventContent(
  326. network=self.bridge_info_state_key,
  327. relates_to=RelatesTo(
  328. rel_type=RelationType.REFERENCE,
  329. event_id=event_id,
  330. ),
  331. )
  332. if err:
  333. status.reason = MessageStatusReason.GENERIC_ERROR
  334. status.error = str(err)
  335. if isinstance(err, AttachmentTooLargeError):
  336. status.reason = MessageStatusReason.UNSUPPORTED
  337. status.status = MessageStatus.FAIL
  338. status.message = "too large file (maximum is 100MB)"
  339. elif isinstance(err, UnknownReactionTarget):
  340. status.status = MessageStatus.FAIL
  341. else:
  342. status.status = MessageStatus.RETRIABLE
  343. else:
  344. status.status = MessageStatus.SUCCESS
  345. await intent.send_message_event(
  346. room_id=self.mxid,
  347. event_type=EventType.BEEPER_MESSAGE_STATUS,
  348. content=status,
  349. )
  350. async def _beeper_link_preview_to_signal(
  351. self, beeper_link_preview: dict[str, Any]
  352. ) -> LinkPreview | None:
  353. link_preview = LinkPreview(
  354. url=beeper_link_preview["matched_url"],
  355. title=beeper_link_preview.get("og:title", ""),
  356. description=beeper_link_preview.get("og:description", ""),
  357. )
  358. if BEEPER_IMAGE_ENCRYPTION_KEY in beeper_link_preview or "og:image" in beeper_link_preview:
  359. if BEEPER_IMAGE_ENCRYPTION_KEY in beeper_link_preview:
  360. file = EncryptedFile.deserialize(beeper_link_preview[BEEPER_IMAGE_ENCRYPTION_KEY])
  361. data = await self.main_intent.download_media(file.url)
  362. data = decrypt_attachment(data, file.key.key, file.hashes.get("sha256"), file.iv)
  363. else:
  364. data = await self.main_intent.download_media(beeper_link_preview["og:image"])
  365. attachment_path = self._write_outgoing_file(data)
  366. link_preview.attachment = Attachment(
  367. content_type=beeper_link_preview.get("og:image:type"),
  368. outgoing_filename=attachment_path,
  369. width=beeper_link_preview.get("og:image:width", 0),
  370. height=beeper_link_preview.get("og:image:height", 0),
  371. size=beeper_link_preview.get("matrix:image:size", 0),
  372. )
  373. return link_preview
  374. async def _handle_matrix_message(
  375. self, sender: u.User, message: MessageEventContent, event_id: EventID
  376. ) -> None:
  377. orig_sender = sender
  378. sender, is_relay = await self.get_relay_sender(sender, f"message {event_id}")
  379. if not sender:
  380. orig_sender.send_remote_checkpoint(
  381. status=MessageSendCheckpointStatus.PERM_FAILURE,
  382. event_id=event_id,
  383. room_id=self.mxid,
  384. event_type=EventType.ROOM_MESSAGE,
  385. message_type=message.msgtype,
  386. error="user is not logged in",
  387. )
  388. return
  389. elif is_relay:
  390. await self.apply_relay_message_format(orig_sender, message)
  391. request_id = int(time.time() * 1000)
  392. self._msgts_dedup.appendleft((sender.uuid, request_id))
  393. quote = None
  394. if message.get_reply_to():
  395. reply = await DBMessage.get_by_mxid(message.get_reply_to(), self.mxid)
  396. # TODO include actual text? either store in db or fetch event from homeserver
  397. if reply is not None:
  398. quote = Quote(id=reply.timestamp, author=Address(uuid=reply.sender), text="")
  399. # TODO only send this when it's actually a reply to an attachment?
  400. # Neither Signal Android nor iOS seem to care though, so this works too
  401. quote.attachments = [QuotedAttachment("", "")]
  402. attachments: list[Attachment] | None = None
  403. attachment_path: str | None = None
  404. mentions: list[Mention] | None = None
  405. link_previews: list[LinkPreview] | None = None
  406. if message.msgtype.is_text:
  407. text, mentions = await matrix_to_signal(message)
  408. message_previews = message.get(BEEPER_LINK_PREVIEWS_KEY, [])
  409. potential_link_previews: list[LinkPreview | None] = cast(
  410. list,
  411. await asyncio.gather(
  412. *(self._beeper_link_preview_to_signal(m) for m in message_previews)
  413. ),
  414. )
  415. link_previews = [p for p in potential_link_previews if p is not None]
  416. elif message.msgtype.is_media:
  417. attachment_path = await self._download_matrix_media(message)
  418. attachment = await self._make_attachment(message, attachment_path)
  419. attachments = [attachment]
  420. text = message.body if is_relay else None
  421. self.log.trace("Formed outgoing attachment %s", attachment)
  422. elif message.msgtype == MessageType.LOCATION:
  423. try:
  424. lat, long = message.geo_uri[len("geo:") :].split(";")[0].split(",")
  425. text = self.config["bridge.location_format"].format(
  426. lat=float(lat), long=float(long)
  427. )
  428. except (ValueError, KeyError, IndexError) as e:
  429. orig_sender.send_remote_checkpoint(
  430. status=MessageSendCheckpointStatus.PERM_FAILURE,
  431. event_id=event_id,
  432. room_id=self.mxid,
  433. event_type=EventType.ROOM_MESSAGE,
  434. message_type=message.msgtype,
  435. error=str(e),
  436. )
  437. self.log.warning(f"Malformed geo URI in {event_id}: {e}")
  438. return
  439. extev = message.get("org.matrix.msc3488.location", None)
  440. # TODO support relay mode with extensible event location descriptions
  441. if extev and not is_relay:
  442. body = extev.get("description")
  443. else:
  444. body = message.body
  445. if body:
  446. text = f"{body}\n{text}"
  447. else:
  448. self.log.debug(f"Unknown msgtype {message.msgtype} in Matrix message {event_id}")
  449. return
  450. self.log.debug(f"Sending Matrix message {event_id} to Signal with timestamp {request_id}")
  451. retry_count = await self._signal_send_with_retries(
  452. sender,
  453. event_id,
  454. message_type=message.msgtype,
  455. send_fn=lambda *args, **kwargs: self.signal.send(**kwargs),
  456. event_type=EventType.ROOM_MESSAGE,
  457. username=sender.username,
  458. recipient=self.chat_id,
  459. body=text,
  460. mentions=mentions,
  461. previews=link_previews,
  462. quote=quote,
  463. attachments=attachments,
  464. timestamp=request_id,
  465. )
  466. msg = DBMessage(
  467. mxid=event_id,
  468. mx_room=self.mxid,
  469. sender=sender.uuid,
  470. timestamp=request_id,
  471. signal_chat_id=self.chat_id,
  472. signal_receiver=self.receiver,
  473. )
  474. await msg.insert()
  475. self.log.debug(f"Handled Matrix message {event_id} -> {request_id}")
  476. if attachment_path and self.config["signal.remove_file_after_handling"]:
  477. try:
  478. os.remove(attachment_path)
  479. except FileNotFoundError:
  480. pass
  481. # Handle disappearing messages
  482. if self.expiration_time and self.disappearing_enabled:
  483. dm = DisappearingMessage(self.mxid, event_id, self.expiration_time)
  484. dm.start_timer()
  485. await dm.insert()
  486. background_task.create(self._disappear_event(dm))
  487. sender.send_remote_checkpoint(
  488. MessageSendCheckpointStatus.SUCCESS,
  489. event_id,
  490. self.mxid,
  491. EventType.ROOM_MESSAGE,
  492. message.msgtype,
  493. retry_num=retry_count,
  494. )
  495. await self._send_delivery_receipt(event_id)
  496. background_task.create(self._send_message_status(event_id, err=None))
  497. async def _signal_send_with_retries(
  498. self,
  499. sender: u.User,
  500. event_id: EventID,
  501. send_fn: Callable,
  502. event_type: EventType,
  503. message_type: MessageType | None = None,
  504. **send_args,
  505. ) -> int:
  506. retry_count = 4
  507. last_error_type = NotConnected
  508. for retry_num in range(retry_count):
  509. try:
  510. req_id = uuid4()
  511. self.log.info(
  512. f"Send attempt {retry_num}. Attempting to send {event_id} with {req_id}"
  513. )
  514. await send_fn(sender, event_id, req_id=req_id, **send_args)
  515. return retry_num
  516. except (NotConnected, UnknownReactionTarget) as e:
  517. if retry_num >= retry_count - 1:
  518. break
  519. last_error_type = type(e)
  520. # Only handle NotConnected and UnknownReactionTarget exceptions so that other
  521. # exceptions actually continue to error.
  522. sleep_seconds = retry_num * 2 + 1
  523. msg = (
  524. f"Not connected to signald. Going to sleep for {sleep_seconds}s. Error: {e}"
  525. if isinstance(e, NotConnected)
  526. else f"UnknownReactionTarget: Going to sleep for {sleep_seconds}s. Error: {e}"
  527. )
  528. self.log.exception(msg)
  529. sender.send_remote_checkpoint(
  530. MessageSendCheckpointStatus.WILL_RETRY,
  531. event_id,
  532. self.mxid,
  533. event_type,
  534. message_type=message_type,
  535. error=msg,
  536. retry_num=retry_num,
  537. )
  538. await asyncio.sleep(sleep_seconds)
  539. except Exception as e:
  540. await sender.handle_auth_failure(e)
  541. raise
  542. event_type_name = {
  543. EventType.ROOM_MESSAGE: "message",
  544. EventType.REACTION: "reaction",
  545. }.get(event_type, str(event_type))
  546. raise last_error_type(f"Failed to send {event_type_name} after {retry_count} retries.")
  547. async def handle_matrix_reaction(
  548. self, sender: u.User, event_id: EventID, reacting_to: EventID, emoji: str
  549. ) -> None:
  550. if not await sender.is_logged_in():
  551. self.log.trace(f"Ignoring reaction by non-logged-in user {sender.mxid}")
  552. return
  553. # Signal doesn't seem to use variation selectors at all
  554. emoji = variation_selector.remove(emoji)
  555. try:
  556. retry_count = await self._signal_send_with_retries(
  557. sender,
  558. event_id,
  559. send_fn=self._handle_matrix_reaction,
  560. event_type=EventType.REACTION,
  561. reacting_to=reacting_to,
  562. emoji=emoji,
  563. )
  564. except Exception as e:
  565. self.log.exception(f"Failed to handle Matrix reaction {event_id} to {reacting_to}")
  566. sender.send_remote_checkpoint(
  567. MessageSendCheckpointStatus.PERM_FAILURE,
  568. event_id,
  569. self.mxid,
  570. EventType.REACTION,
  571. error=e,
  572. )
  573. await self._send_error_notice("reaction", e)
  574. await sender.handle_auth_failure(e)
  575. background_task.create(self._send_message_status(event_id, e))
  576. else:
  577. sender.send_remote_checkpoint(
  578. MessageSendCheckpointStatus.SUCCESS,
  579. event_id,
  580. self.mxid,
  581. EventType.REACTION,
  582. retry_num=retry_count,
  583. )
  584. await self._send_delivery_receipt(event_id)
  585. background_task.create(self._send_message_status(event_id, err=None))
  586. async def _handle_matrix_reaction(
  587. self,
  588. sender: u.User,
  589. event_id: EventID,
  590. reacting_to: EventID,
  591. emoji: str,
  592. req_id: UUID | None = None,
  593. ) -> None:
  594. message = await DBMessage.get_by_mxid(reacting_to, self.mxid)
  595. if not message:
  596. self.log.debug(f"Ignoring reaction to unknown event {reacting_to}")
  597. raise UnknownReactionTarget(f"Ignoring reaction to unknown event {reacting_to}")
  598. async with self._reaction_lock:
  599. existing = await DBReaction.get_by_signal_id(
  600. self.chat_id, self.receiver, message.sender, message.timestamp, sender.uuid
  601. )
  602. if existing and existing.emoji == emoji:
  603. return
  604. dedup_id = (message.sender, message.timestamp, emoji, sender.uuid, False)
  605. self._reaction_dedup.appendleft(dedup_id)
  606. reaction = Reaction(
  607. emoji=emoji,
  608. remove=False,
  609. target_author=Address(uuid=message.sender),
  610. target_sent_timestamp=message.timestamp,
  611. )
  612. self.log.trace(f"{sender.mxid} reacted to {message.timestamp} with {emoji}")
  613. await self.signal.react(
  614. sender.username, recipient=self.chat_id, reaction=reaction, req_id=req_id
  615. )
  616. await self._upsert_reaction(
  617. existing, self.main_intent, event_id, sender, message, emoji
  618. )
  619. async def handle_matrix_redaction(
  620. self, sender: u.User, event_id: EventID, redaction_event_id: EventID
  621. ) -> None:
  622. if not await sender.is_logged_in():
  623. return
  624. message = await DBMessage.get_by_mxid(event_id, self.mxid)
  625. if message:
  626. try:
  627. await message.delete()
  628. await self.signal.remote_delete(
  629. sender.username, recipient=self.chat_id, timestamp=message.timestamp
  630. )
  631. except Exception as e:
  632. self.log.exception(
  633. f"Failed to handle Matrix redaction {redaction_event_id} of "
  634. f"message {event_id} ({message.timestamp})"
  635. )
  636. sender.send_remote_checkpoint(
  637. MessageSendCheckpointStatus.PERM_FAILURE,
  638. redaction_event_id,
  639. self.mxid,
  640. EventType.ROOM_REDACTION,
  641. error=e,
  642. )
  643. await sender.handle_auth_failure(e)
  644. background_task.create(self._send_error_notice("message deletion", e))
  645. background_task.create(self._send_message_status(event_id, e))
  646. else:
  647. self.log.trace(f"Removed {message} after Matrix redaction")
  648. sender.send_remote_checkpoint(
  649. MessageSendCheckpointStatus.SUCCESS,
  650. redaction_event_id,
  651. self.mxid,
  652. EventType.ROOM_REDACTION,
  653. )
  654. await self._send_delivery_receipt(redaction_event_id)
  655. background_task.create(self._send_message_status(redaction_event_id, err=None))
  656. return
  657. reaction = await DBReaction.get_by_mxid(event_id, self.mxid)
  658. if reaction:
  659. try:
  660. await reaction.delete()
  661. remove_reaction = Reaction(
  662. emoji=reaction.emoji,
  663. remove=True,
  664. target_author=Address(uuid=reaction.msg_author),
  665. target_sent_timestamp=reaction.msg_timestamp,
  666. )
  667. await self.signal.react(
  668. username=sender.username, recipient=self.chat_id, reaction=remove_reaction
  669. )
  670. except Exception as e:
  671. self.log.exception(
  672. f"Failed to handle Matrix redaction {redaction_event_id} of "
  673. f"reaction {event_id} to {reaction.msg_timestamp}"
  674. )
  675. sender.send_remote_checkpoint(
  676. MessageSendCheckpointStatus.PERM_FAILURE,
  677. redaction_event_id,
  678. self.mxid,
  679. EventType.ROOM_REDACTION,
  680. error=e,
  681. )
  682. await sender.handle_auth_failure(e)
  683. background_task.create(self._send_error_notice("reaction deletion", e))
  684. background_task.create(self._send_message_status(event_id, e))
  685. else:
  686. self.log.trace(f"Removed {reaction} after Matrix redaction")
  687. sender.send_remote_checkpoint(
  688. MessageSendCheckpointStatus.SUCCESS,
  689. redaction_event_id,
  690. self.mxid,
  691. EventType.ROOM_REDACTION,
  692. )
  693. await self._send_delivery_receipt(redaction_event_id)
  694. background_task.create(self._send_message_status(redaction_event_id, err=None))
  695. return
  696. sender.send_remote_checkpoint(
  697. MessageSendCheckpointStatus.PERM_FAILURE,
  698. redaction_event_id,
  699. self.mxid,
  700. EventType.ROOM_REDACTION,
  701. error="No message or reaction found for redaction",
  702. )
  703. status_err = UnknownReactionTarget("No message or reaction found for redaction")
  704. background_task.create(self._send_message_status(redaction_event_id, err=status_err))
  705. async def handle_matrix_join(self, user: u.User) -> None:
  706. if self.is_direct or not await user.is_logged_in():
  707. return
  708. if self._pending_members is None:
  709. self.log.debug(
  710. f"{user.mxid} ({user.uuid}) joined room, but pending_members is None,"
  711. " updating chat info"
  712. )
  713. await self.update_info(user, GroupV2ID(id=self.chat_id))
  714. if self._pending_members is None:
  715. self.log.warning(
  716. f"Didn't get pending member list after info update, {user.mxid} ({user.uuid}) may"
  717. "not be in the group on Signal."
  718. )
  719. elif user.uuid in self._pending_members:
  720. self.log.debug(f"{user.mxid} ({user.uuid}) joined room, accepting invite on Signal")
  721. try:
  722. resp = await self.signal.accept_invitation(user.username, self.chat_id)
  723. self._pending_members.remove(user.uuid)
  724. except RPCError as e:
  725. await self.main_intent.send_notice(
  726. self.mxid, f"\u26a0 Failed to accept invite on Signal: {e}"
  727. )
  728. await user.handle_auth_failure(e)
  729. else:
  730. await self.update_info(user, resp)
  731. async def handle_matrix_leave(self, user: u.User) -> None:
  732. if not await user.is_logged_in():
  733. return
  734. if self.is_direct:
  735. self.log.info(f"{user.mxid} left private chat portal with {self.chat_id}")
  736. if user.username == self.receiver:
  737. self.log.info(
  738. f"{user.mxid} was the recipient of this portal. Cleaning up and deleting..."
  739. )
  740. await self.cleanup_and_delete()
  741. else:
  742. self.log.debug(f"{user.mxid} left portal to {self.chat_id}")
  743. if self.config["bridge.bridge_matrix_leave"]:
  744. await self.signal.leave_group(user.username, self.chat_id)
  745. # TODO cleanup if empty
  746. async def kick_matrix(self, user: u.User | p.Puppet, source: u.User) -> None:
  747. try:
  748. await self.signal.update_group(
  749. source.username, self.chat_id, remove_members=[user.address]
  750. )
  751. except Exception as e:
  752. self.log.exception(f"Failed to kick Signal user: {e}")
  753. info = await self.signal.get_group(source.username, self.chat_id)
  754. if user.address in info.members:
  755. await self.main_intent.invite_user(
  756. self.mxid,
  757. user.mxid,
  758. check_cache=True,
  759. reason=f"Failed to kick Signal user: {e}",
  760. )
  761. await user.intent_for(self).ensure_joined(self.mxid)
  762. async def ban_matrix(self, user: u.User | p.Puppet, source: u.User) -> None:
  763. try:
  764. await self.signal.ban_user(source.username, self.chat_id, users=[user.address])
  765. except Exception as e:
  766. self.log.exception(f"Failed to ban Signal user: {e}")
  767. info = await self.signal.get_group(source.username, self.chat_id)
  768. is_banned = False
  769. if info.banned_members:
  770. for member in info.banned_members:
  771. is_banned = user.uuid == member.uuid or is_banned
  772. if not is_banned:
  773. await self.main_intent.unban_user(
  774. self.mxid, user.mxid, reason=f"Failed to ban Signal user: {e}"
  775. )
  776. if user.address in info.members:
  777. await self.main_intent.invite_user(
  778. self.mxid,
  779. user.mxid,
  780. check_cache=True,
  781. )
  782. await user.intent_for(self).ensure_joined(self.mxid)
  783. async def unban_matrix(self, user: u.User | p.Puppet, source: u.User) -> None:
  784. try:
  785. await self.signal.unban_user(source.username, self.chat_id, users=[user.address])
  786. except Exception as e:
  787. self.log.exception(f"Failed to unban Signal user: {e}")
  788. info = await self.signal.get_group(source.username, self.chat_id)
  789. if info.banned_members:
  790. for member in info.banned_members:
  791. if member.uuid == user.uuid:
  792. await self.main_intent.ban_user(
  793. self.mxid, user.mxid, reason=f"Failed to unban Signal user: {e}"
  794. )
  795. return
  796. async def handle_matrix_invite(
  797. self, invited_by: u.User, user: u.User | p.Puppet
  798. ) -> GroupV2 | None:
  799. if self.is_direct:
  800. raise RejectMatrixInvite("You can't invite additional users to private chats.")
  801. invited_by, is_relay = await self.get_relay_sender(invited_by, "invite")
  802. if is_relay:
  803. if not self.config["bridge.relay.invite"]:
  804. raise RejectMatrixInvite("Relaying invites is not enabled on this bridge")
  805. if not invited_by:
  806. raise RejectMatrixInvite("There is no relay in this room")
  807. update_meta = None
  808. try:
  809. update_meta = await self.signal.update_group(
  810. invited_by.username, self.chat_id, add_members=[user.address]
  811. )
  812. self.revision = update_meta.revision
  813. except GroupPatchNotAcceptedError as e:
  814. update_meta = await self.signal.get_group(invited_by.username, self.chat_id)
  815. if (
  816. user.address not in update_meta.members
  817. and user.address not in update_meta.pending_members
  818. ):
  819. raise RejectMatrixInvite(str(e)) from e
  820. except RPCError as e:
  821. raise RejectMatrixInvite(str(e)) from e
  822. if user.mxid == self.config["bridge.relay.relaybot"] != "@relaybot:example.com":
  823. await self._handle_relaybot_invited(user)
  824. power_levels = await self.main_intent.get_power_levels(self.mxid)
  825. invitee_pl = power_levels.get_user_level(user.mxid)
  826. if invitee_pl >= 50:
  827. group_member = GroupMember(uuid=user.uuid, role=GroupMemberRole.ADMINISTRATOR)
  828. try:
  829. update_meta = await self.signal.update_group(
  830. invited_by.username, self.chat_id, update_role=group_member
  831. )
  832. self.revision = update_meta.revision
  833. except Exception as e:
  834. self.log.exception(f"Failed to update Signal member role: {e}")
  835. await self._update_power_levels(
  836. await self.signal.get_group(invited_by.username, self.chat_id)
  837. )
  838. return update_meta
  839. async def _handle_relaybot_invited(self, user: u.User) -> None:
  840. if not self.config["bridge.relay.enabled"]:
  841. await self.main_intent.send_notice(
  842. self.mxid, "Relay mode is not enabled in this instance of the bridge."
  843. )
  844. else:
  845. await self.set_relay_user(user)
  846. await self.main_intent.send_notice(
  847. self.mxid,
  848. "Messages from non-logged-in users in this room will now be bridged "
  849. "through the relaybot's Signal account.",
  850. )
  851. async def handle_matrix_name(self, user: u.User, name: str) -> None:
  852. if self.name == name or self.is_direct or not name:
  853. return
  854. sender, is_relay = await self.get_relay_sender(user, "name change")
  855. if not sender:
  856. return
  857. self.name = name
  858. self.log.debug(
  859. f"{user.mxid} changed the group name, sending to Signal through {sender.username}"
  860. )
  861. try:
  862. await self.signal.update_group(sender.username, self.chat_id, title=name)
  863. except Exception as e:
  864. self.log.exception("Failed to update Signal group name")
  865. await user.handle_auth_failure(e)
  866. self.name = None
  867. async def handle_matrix_topic(self, user: u.User, topic: str) -> None:
  868. if self.topic == topic or self.is_direct or not topic:
  869. return
  870. sender, is_relay = await self.get_relay_sender(user, "topic change")
  871. if not sender:
  872. return
  873. self.topic = topic
  874. self.log.debug(
  875. f"{user.mxid} changed the group topic, sending to Signal through {sender.username}"
  876. )
  877. try:
  878. await self.signal.update_group(sender.username, self.chat_id, description=topic)
  879. except Exception:
  880. self.log.exception("Failed to update Signal group description")
  881. self.name = None
  882. async def handle_matrix_avatar(self, user: u.User, url: ContentURI) -> None:
  883. if self.is_direct or not url:
  884. return
  885. sender, is_relay = await self.get_relay_sender(user, "avatar change")
  886. if not sender:
  887. return
  888. data = await self.main_intent.download_media(url)
  889. new_hash = hashlib.sha256(data).hexdigest()
  890. if new_hash == self.avatar_hash and self.avatar_set:
  891. self.log.debug(f"New avatar from Matrix set by {user.mxid} is same as current one")
  892. return
  893. self.avatar_url = url
  894. self.avatar_hash = new_hash
  895. path = self._write_outgoing_file(data)
  896. self.log.debug(
  897. f"{user.mxid} changed the group avatar, sending to Signal through {sender.username}"
  898. )
  899. try:
  900. await self.signal.update_group(sender.username, self.chat_id, avatar_path=path)
  901. self.avatar_set = True
  902. except Exception as e:
  903. self.log.exception("Failed to update Signal group avatar")
  904. await user.handle_auth_failure(e)
  905. self.avatar_set = False
  906. if self.config["signal.remove_file_after_handling"]:
  907. try:
  908. os.remove(path)
  909. except FileNotFoundError:
  910. pass
  911. async def handle_matrix_power_level(
  912. self,
  913. sender: u.User,
  914. levels: PowerLevelStateEventContent,
  915. prev_content: PowerLevelStateEventContent | None = None,
  916. ) -> None:
  917. old_users = prev_content.users if prev_content else None
  918. new_users = levels.users
  919. changes = {}
  920. sender, is_relay = await self.get_relay_sender(sender, "power level change")
  921. if not sender:
  922. return
  923. if not old_users:
  924. changes = new_users
  925. else:
  926. for user, level in new_users.items():
  927. if (
  928. user
  929. and user != self.main_intent.mxid
  930. and (user not in old_users or level != old_users[user])
  931. ):
  932. changes[user] = level
  933. for user, level in old_users.items():
  934. if user and user != self.main_intent.mxid and user not in new_users:
  935. changes[user] = levels.users_default
  936. if changes:
  937. for user, level in changes.items():
  938. uuid = p.Puppet.get_id_from_mxid(user)
  939. if not uuid:
  940. mx_user = await u.User.get_by_mxid(user, create=False)
  941. if not mx_user or not mx_user.is_logged_in:
  942. continue
  943. uuid = mx_user.uuid
  944. if not uuid:
  945. continue
  946. signal_role = (
  947. GroupMemberRole.DEFAULT if level < 50 else GroupMemberRole.ADMINISTRATOR
  948. )
  949. group_member = GroupMember(uuid=uuid, role=signal_role)
  950. try:
  951. update_meta = await self.signal.update_group(
  952. sender.username, self.chat_id, update_role=group_member
  953. )
  954. self.revision = update_meta.revision
  955. except Exception as e:
  956. self.log.exception(f"Failed to update Signal member role: {e}")
  957. await self._update_power_levels(
  958. await self.signal.get_group(sender.username, self.chat_id)
  959. )
  960. return
  961. if not prev_content or levels.invite != prev_content.invite:
  962. try:
  963. update_meta = await self.signal.update_group(
  964. username=sender.username,
  965. group_id=self.chat_id,
  966. update_access_control=GroupAccessControl(
  967. members=(
  968. AccessControlMode.MEMBER
  969. if levels.invite == 0
  970. else AccessControlMode.ADMINISTRATOR
  971. ),
  972. attributes=None,
  973. link=None,
  974. ),
  975. )
  976. self.revision = update_meta.revision
  977. except Exception as e:
  978. self.log.exception(f"Failed to update Signal member add permission: {e}")
  979. await self._update_power_levels(
  980. await self.signal.get_group(sender.username, self.chat_id)
  981. )
  982. return
  983. if not prev_content or levels.state_default != prev_content.state_default:
  984. try:
  985. update_meta = await self.signal.update_group(
  986. username=sender.username,
  987. group_id=self.chat_id,
  988. update_access_control=GroupAccessControl(
  989. attributes=(
  990. AccessControlMode.MEMBER
  991. if levels.state_default == 0
  992. else AccessControlMode.ADMINISTRATOR
  993. ),
  994. members=None,
  995. link=None,
  996. ),
  997. )
  998. self.revision = update_meta.revision
  999. except Exception as e:
  1000. self.log.exception(f"Failed to update Signal metadata change permission: {e}")
  1001. await self._update_power_levels(
  1002. await self.signal.get_group(sender.username, self.chat_id)
  1003. )
  1004. async def handle_matrix_join_rules(self, sender: u.User, join_rule: JoinRule) -> None:
  1005. if join_rule == JoinRule.PUBLIC:
  1006. link_access = AccessControlMode.ANY
  1007. elif join_rule == JoinRule.INVITE:
  1008. link_access = AccessControlMode.UNSATISFIABLE
  1009. else:
  1010. link_access = AccessControlMode.ADMINISTRATOR
  1011. sender, is_relay = await self.get_relay_sender(sender, "join_rule change")
  1012. if not sender:
  1013. return
  1014. try:
  1015. update_meta = await self.signal.update_group(
  1016. sender.username,
  1017. self.chat_id,
  1018. update_access_control=GroupAccessControl(
  1019. attributes=None, members=None, link=link_access
  1020. ),
  1021. )
  1022. self.revision = update_meta.revision
  1023. except Exception as e:
  1024. self.log.exception(f"Failed to update Signal link access control: {e}")
  1025. await self._update_join_rules(
  1026. await self.signal.get_group(sender.username, self.chat_id)
  1027. )
  1028. async def matrix_accept_knock(self, sender: u.User, user: p.Puppet | u.User) -> None:
  1029. try:
  1030. await self.signal.approve_membership(
  1031. sender.username, self.chat_id, members=[user.address]
  1032. )
  1033. if isinstance(user, p.Puppet):
  1034. await user.intent_for(self).ensure_joined(self.mxid)
  1035. except RPCError as e:
  1036. info = await self.signal.get_group(sender.username, self.chat_id)
  1037. if user.address in info.requesting_members:
  1038. raise RejectMatrixInvite(str(e)) from e
  1039. power_levels = await self.main_intent.get_power_levels(self.mxid)
  1040. invitee_pl = power_levels.get_user_level(user.mxid)
  1041. if invitee_pl >= 50:
  1042. group_member = GroupMember(uuid=user.uuid, role=GroupMemberRole.ADMINISTRATOR)
  1043. try:
  1044. update_meta = await self.signal.update_group(
  1045. sender.username, self.chat_id, update_role=group_member
  1046. )
  1047. self.revision = update_meta.revision
  1048. except Exception as e:
  1049. self.log.exception(f"Failed to update Signal member role: {e}")
  1050. await self._update_power_levels(
  1051. await self.signal.get_group(sender.username, self.chat_id)
  1052. )
  1053. async def matrix_reject_knock(self, sender: u.User, user: p.Puppet | u.User) -> None:
  1054. try:
  1055. await self.signal.refuse_membership(
  1056. sender.username, self.chat_id, members=[user.address]
  1057. )
  1058. except RPCError as e:
  1059. info = await self.signal.get_group(sender.username, self.chat_id)
  1060. if user.address in info.requesting_members:
  1061. await user.intent_for(self).knock(
  1062. self.mxid,
  1063. reason=f"refusing membership failed: {e}",
  1064. servers=[self.config["homeserver.domain"]],
  1065. )
  1066. # endregion
  1067. # region Signal event handling
  1068. async def _find_quote_event_id(self, quote: Quote | None) -> MessageEvent | EventID | None:
  1069. if not quote:
  1070. return None
  1071. puppet = await p.Puppet.get_by_address(quote.author, create=False)
  1072. if not puppet:
  1073. return None
  1074. reply_msg = await DBMessage.get_by_signal_id(
  1075. puppet.uuid, quote.id, self.chat_id, self.receiver
  1076. )
  1077. if not reply_msg:
  1078. return None
  1079. try:
  1080. evt = await self.main_intent.get_event(self.mxid, reply_msg.mxid)
  1081. if isinstance(evt, EncryptedEvent):
  1082. return await self.matrix.e2ee.decrypt(evt, wait_session_timeout=0)
  1083. return evt
  1084. except MatrixError:
  1085. return reply_msg.mxid
  1086. async def _signal_link_preview_to_beeper(
  1087. self, link_preview: LinkPreview, intent: IntentAPI
  1088. ) -> dict[str, Any]:
  1089. beeper_link_preview: dict[str, Any] = {
  1090. "matched_url": link_preview.url,
  1091. "og:title": link_preview.title,
  1092. "og:url": link_preview.url,
  1093. "og:description": link_preview.description,
  1094. }
  1095. # Upload an image corresponding to the link preview if it exists.
  1096. if link_preview.attachment and link_preview.attachment.incoming_filename:
  1097. beeper_link_preview["og:image:type"] = link_preview.attachment.content_type
  1098. beeper_link_preview["og:image:height"] = link_preview.attachment.height
  1099. beeper_link_preview["og:image:width"] = link_preview.attachment.width
  1100. beeper_link_preview["matrix:image:size"] = link_preview.attachment.size
  1101. with open(link_preview.attachment.incoming_filename, "rb") as file:
  1102. data = file.read()
  1103. if self.config["signal.remove_file_after_handling"]:
  1104. os.remove(link_preview.attachment.incoming_filename)
  1105. upload_mime_type = link_preview.attachment.content_type
  1106. if self.encrypted and encrypt_attachment:
  1107. data, beeper_link_preview[BEEPER_IMAGE_ENCRYPTION_KEY] = encrypt_attachment(data)
  1108. upload_mime_type = "application/octet-stream"
  1109. upload_uri = await intent.upload_media(
  1110. data,
  1111. mime_type=upload_mime_type,
  1112. filename=link_preview.attachment.id,
  1113. async_upload=self.config["homeserver.async_media"],
  1114. )
  1115. if BEEPER_IMAGE_ENCRYPTION_KEY in beeper_link_preview:
  1116. beeper_link_preview[BEEPER_IMAGE_ENCRYPTION_KEY].url = upload_uri
  1117. beeper_link_preview[BEEPER_IMAGE_ENCRYPTION_KEY] = beeper_link_preview[
  1118. BEEPER_IMAGE_ENCRYPTION_KEY
  1119. ].serialize()
  1120. else:
  1121. beeper_link_preview["og:image"] = upload_uri
  1122. return beeper_link_preview
  1123. async def handle_signal_message(
  1124. self, source: u.User, sender: p.Puppet, message: MessageData
  1125. ) -> None:
  1126. if (sender.uuid, message.timestamp) in self._msgts_dedup:
  1127. self.log.debug(
  1128. f"Ignoring message {message.timestamp} by {sender.uuid} as it was already handled "
  1129. "(message.timestamp in dedup queue)"
  1130. )
  1131. await self.signal.send_receipt(
  1132. source.username, sender.address, timestamps=[message.timestamp]
  1133. )
  1134. return
  1135. self._msgts_dedup.appendleft((sender.uuid, message.timestamp))
  1136. old_message = await DBMessage.get_by_signal_id(
  1137. sender.uuid, message.timestamp, self.chat_id, self.receiver
  1138. )
  1139. if old_message is not None:
  1140. self.log.debug(
  1141. f"Ignoring message {message.timestamp} by {sender.uuid} as it was already handled "
  1142. "(message.id found in database)"
  1143. )
  1144. await self.signal.send_receipt(
  1145. source.username, sender.address, timestamps=[message.timestamp]
  1146. )
  1147. return
  1148. self.log.debug(f"Started handling message {message.timestamp} by {sender.uuid}")
  1149. self.log.trace(f"Message content: {message}")
  1150. intent = sender.intent_for(self)
  1151. await intent.set_typing(self.mxid, timeout=0)
  1152. event_id = None
  1153. reply_to = await self._find_quote_event_id(message.quote)
  1154. if message.sticker:
  1155. if message.sticker.attachment.incoming_filename:
  1156. content = await self._handle_signal_attachment(
  1157. intent, message.sticker.attachment, sticker=True
  1158. )
  1159. elif StickersClient:
  1160. content = await self._handle_signal_sticker(intent, message.sticker)
  1161. else:
  1162. self.log.debug(
  1163. f"Not handling sticker in {message.timestamp}: no incoming_filename and "
  1164. "signalstickers-client not installed."
  1165. )
  1166. return
  1167. if content:
  1168. if message.sticker.attachment.blurhash:
  1169. content.info["blurhash"] = message.sticker.attachment.blurhash
  1170. content.info["xyz.amorgan.blurhash"] = message.sticker.attachment.blurhash
  1171. await self._add_sticker_meta(message.sticker, content)
  1172. if reply_to and not message.body:
  1173. content.set_reply(reply_to)
  1174. reply_to = None
  1175. content.msgtype = None
  1176. event_id = await self._send_message(
  1177. intent, content, timestamp=message.timestamp, event_type=EventType.STICKER
  1178. )
  1179. for contact in message.contacts:
  1180. content = await self._handle_signal_contact(contact)
  1181. if reply_to and not message.body:
  1182. content.set_reply(reply_to)
  1183. reply_to = None
  1184. event_id = await self._send_message(intent, content, timestamp=message.timestamp)
  1185. is_first_text = True
  1186. for attachment in message.attachments:
  1187. as_text = (
  1188. is_first_text
  1189. and attachment.content_type == "text/x-signal-plain"
  1190. and attachment.size < MAX_MATRIX_MESSAGE_SIZE
  1191. )
  1192. content = await self._handle_signal_attachment(intent, attachment, text=as_text)
  1193. if as_text:
  1194. is_first_text = False
  1195. message.body = ""
  1196. if reply_to and not message.body:
  1197. # If there's no text, set the first image as the reply
  1198. content.set_reply(reply_to)
  1199. reply_to = None
  1200. event_id = await self._send_message(intent, content, timestamp=message.timestamp)
  1201. if message.body:
  1202. content = await signal_to_matrix(message)
  1203. if message.previews:
  1204. content[BEEPER_LINK_PREVIEWS_KEY] = await asyncio.gather(
  1205. *(self._signal_link_preview_to_beeper(p, intent) for p in message.previews)
  1206. )
  1207. if reply_to:
  1208. content.set_reply(reply_to)
  1209. event_id = await self._send_message(intent, content, timestamp=message.timestamp)
  1210. if event_id:
  1211. msg = DBMessage(
  1212. mxid=event_id,
  1213. mx_room=self.mxid,
  1214. sender=sender.uuid,
  1215. timestamp=message.timestamp,
  1216. signal_chat_id=self.chat_id,
  1217. signal_receiver=self.receiver,
  1218. )
  1219. await msg.insert()
  1220. await self.signal.send_receipt(
  1221. source.username, sender.address, timestamps=[message.timestamp]
  1222. )
  1223. await self._send_delivery_receipt(event_id)
  1224. self.log.debug(f"Handled Signal message {message.timestamp} -> {event_id}")
  1225. if message.expires_in_seconds and self.disappearing_enabled:
  1226. dm = DisappearingMessage(self.mxid, event_id, message.expires_in_seconds)
  1227. # Start the timer immediately for own messages
  1228. if sender.uuid == source.uuid:
  1229. dm.start_timer()
  1230. await dm.insert()
  1231. background_task.create(self._disappear_event(dm))
  1232. self.log.debug(
  1233. f"{event_id} set to be redacted in {message.expires_in_seconds} seconds"
  1234. )
  1235. else:
  1236. await dm.insert()
  1237. self.log.debug(
  1238. f"{event_id} set to be redacted {message.expires_in_seconds} seconds"
  1239. " after room is read"
  1240. )
  1241. else:
  1242. self.log.debug(f"Didn't get event ID for {message.timestamp}")
  1243. async def handle_signal_kicked(self, user: u.User, sender: p.Puppet) -> None:
  1244. self.log.debug(f"{user.mxid} was kicked by {sender.number} from {self.mxid}")
  1245. await self._kick_with_puppet(user, sender)
  1246. async def handle_signal_group_change(self, group_change: GroupChange, source: u.User) -> None:
  1247. if self.revision < group_change.revision:
  1248. self.revision = group_change.revision
  1249. else:
  1250. return
  1251. editor = await p.Puppet.get_by_address(group_change.editor)
  1252. if not editor:
  1253. self.log.warning(f"Didn't get puppet for group change editor {group_change.editor}")
  1254. return
  1255. editor_intent = editor.intent_for(self)
  1256. if (
  1257. group_change.delete_members
  1258. or group_change.delete_pending_members
  1259. or group_change.delete_requesting_members
  1260. ):
  1261. for address in (
  1262. (group_change.delete_members or [])
  1263. + (group_change.delete_pending_members or [])
  1264. + (group_change.delete_requesting_members or [])
  1265. ):
  1266. users = [
  1267. await p.Puppet.get_by_address(address),
  1268. await u.User.get_by_address(address),
  1269. ]
  1270. for user in users:
  1271. if not user:
  1272. continue
  1273. if user == editor:
  1274. await editor_intent.leave_room(self.mxid)
  1275. else:
  1276. await self._kick_with_puppet(user, editor)
  1277. if group_change.modify_member_roles:
  1278. levels = await editor.intent_for(self).get_power_levels(self.mxid)
  1279. for group_member in group_change.modify_member_roles:
  1280. users = [
  1281. await p.Puppet.get_by_uuid(group_member.uuid),
  1282. await u.User.get_by_uuid(group_member.uuid),
  1283. ]
  1284. for user in users:
  1285. if not user:
  1286. continue
  1287. if group_member.role == GroupMemberRole.ADMINISTRATOR:
  1288. if levels.users.get(user.mxid, 0) < 50:
  1289. levels.users[user.mxid] = 50
  1290. levels.users = {k: v for k, v in sorted(list(levels.users.items()))}
  1291. elif levels.users.get(user.mxid, 0) >= 50:
  1292. levels.users.pop(user.mxid, 0)
  1293. await self._try_with_puppet(
  1294. lambda i: i.set_power_levels(self.mxid, levels), puppet=editor
  1295. )
  1296. if group_change.new_banned_members:
  1297. for banned_member in group_change.new_banned_members:
  1298. users = [
  1299. await p.Puppet.get_by_uuid(banned_member.uuid),
  1300. await u.User.get_by_uuid(banned_member.uuid),
  1301. ]
  1302. for user in users:
  1303. if not user:
  1304. continue
  1305. try:
  1306. await editor_intent.ban_user(self.mxid, user.mxid)
  1307. except MForbidden:
  1308. try:
  1309. await self.main_intent.ban_user(
  1310. self.mxid, user.mxid, reason=f"banned by {editor.name}"
  1311. )
  1312. except MForbidden as e:
  1313. self.log.debug(f"Could not ban {user.mxid}: {e}")
  1314. except MBadState as e:
  1315. self.log.debug(f"Could not ban {user.mxid}: {e}")
  1316. if group_change.new_unbanned_members:
  1317. for banned_member in group_change.new_unbanned_members:
  1318. users = [
  1319. await p.Puppet.get_by_uuid(banned_member.uuid),
  1320. await u.User.get_by_uuid(banned_member.uuid),
  1321. ]
  1322. for user in users:
  1323. if not user:
  1324. continue
  1325. try:
  1326. await editor_intent.unban_user(self.mxid, user.mxid)
  1327. except MForbidden:
  1328. try:
  1329. await self.main_intent.unban_user(
  1330. self.mxid, user.mxid, reason=f"unbanned by {editor.name}"
  1331. )
  1332. except MForbidden as e:
  1333. self.log.debug(f"Could not unban {user.mxid}: {e}")
  1334. except MBadState as e:
  1335. self.log.debug(f"Could not unban {user.mxid}: {e}")
  1336. if (
  1337. group_change.new_members
  1338. or group_change.new_pending_members
  1339. or group_change.promote_requesting_members
  1340. ):
  1341. banned_users = await self.az.intent.get_room_members(self.mxid, (Membership.BAN,))
  1342. for group_member in (
  1343. (group_change.new_members or [])
  1344. + (group_change.new_pending_members or [])
  1345. + (group_change.promote_requesting_members or [])
  1346. ):
  1347. puppet = await p.Puppet.get_by_uuid(group_member.uuid)
  1348. await source.sync_contact(group_member.address)
  1349. users = [puppet, await u.User.get_by_uuid(group_member.uuid)]
  1350. for user in users:
  1351. if not user:
  1352. continue
  1353. if user.mxid in banned_users:
  1354. await self._try_with_puppet(
  1355. lambda i: i.unban_user(self.mxid, user.mxid), puppet=editor
  1356. )
  1357. try:
  1358. await editor_intent.invite_user(self.mxid, user.mxid, check_cache=True)
  1359. except (MForbidden, IntentError):
  1360. try:
  1361. await self.main_intent.invite_user(
  1362. self.mxid,
  1363. user.mxid,
  1364. reason=f"invited by {editor.name}",
  1365. check_cache=True,
  1366. )
  1367. except (MForbidden, IntentError) as e:
  1368. self.log.debug(f"{editor.name} could not invite {user.mxid}: {e}")
  1369. except MBadState as e:
  1370. self.log.debug(f"{editor.name} could not invite {user.mxid}: {e}")
  1371. if group_member in (group_change.new_members or []) + (
  1372. group_change.promote_requesting_members or []
  1373. ) and isinstance(user, p.Puppet):
  1374. try:
  1375. await user.intent_for(self).ensure_joined(self.mxid)
  1376. except IntentError as e:
  1377. self.log.debug(f"{user.name} could not join group: {e}")
  1378. if group_change.promote_pending_members:
  1379. for group_member in group_change.promote_pending_members:
  1380. await source.sync_contact(group_member.address)
  1381. user = await p.Puppet.get_by_uuid(group_member.uuid)
  1382. if not user:
  1383. continue
  1384. try:
  1385. await user.intent_for(self).ensure_joined(self.mxid)
  1386. except IntentError as e:
  1387. self.log.debug(f"{user.name} could not join group: {e}")
  1388. if group_change.new_requesting_members:
  1389. for group_member in group_change.new_requesting_members:
  1390. try:
  1391. await source.sync_contact(group_member.address)
  1392. except ProfileUnavailableError:
  1393. self.log.debug(
  1394. f"Profile of puppet with uuid {group_member.uuid} is unavailable"
  1395. )
  1396. user = await p.Puppet.get_by_uuid(group_member.uuid)
  1397. try:
  1398. await user.intent_for(self).knock_room(self.mxid, reason="via invite link")
  1399. except (MForbidden, MBadState) as e:
  1400. self.log.debug(f"{user.name} failed knock: {e}")
  1401. if group_change.new_access_control:
  1402. ac = group_change.new_access_control
  1403. if ac.attributes or ac.members:
  1404. levels = await editor.intent_for(self).get_power_levels(self.mxid)
  1405. if ac.attributes:
  1406. meta_edit_level = 50 if ac.attributes == AccessControlMode.ADMINISTRATOR else 0
  1407. levels.events[EventType.ROOM_NAME] = meta_edit_level
  1408. levels.events[EventType.ROOM_AVATAR] = meta_edit_level
  1409. levels.events[EventType.ROOM_TOPIC] = meta_edit_level
  1410. if ac.members:
  1411. levels.invite = 50 if ac.members == AccessControlMode.ADMINISTRATOR else 0
  1412. await self._try_with_puppet(
  1413. lambda i: i.set_power_levels(self.mxid, levels), puppet=editor
  1414. )
  1415. if ac.link:
  1416. new_join_rule = await self._get_new_join_rule(ac.link)
  1417. if new_join_rule:
  1418. await self._try_with_puppet(
  1419. lambda i: i.set_join_rule(self.mxid, new_join_rule), puppet=editor
  1420. )
  1421. if group_change.new_is_announcement_group:
  1422. levels = await editor.intent_for(self).get_power_levels(self.mxid)
  1423. if group_change.new_is_announcement_group == AnnouncementsMode.ENABLED:
  1424. levels.events_default = 50
  1425. elif group_change.new_is_announcement_group == AnnouncementsMode.DISABLED:
  1426. levels.events_default = 0
  1427. await self._try_with_puppet(
  1428. lambda i: i.set_power_levels(self.mxid, levels), puppet=editor
  1429. )
  1430. changed = False
  1431. if group_change.new_description:
  1432. changed = await self._update_topic(group_change.new_description, editor)
  1433. if group_change.new_title:
  1434. changed = await self._update_name(group_change.new_title, editor) or changed
  1435. if group_change.new_avatar:
  1436. changed = (
  1437. await self._update_avatar(
  1438. await self.signal.get_group(
  1439. source.username, self.chat_id, group_change.revision
  1440. ),
  1441. editor,
  1442. )
  1443. or changed
  1444. )
  1445. if group_change.new_timer:
  1446. changed = (
  1447. await self.update_expires_in_seconds(editor, group_change.new_timer) or changed
  1448. )
  1449. if changed:
  1450. await self.update_bridge_info()
  1451. await self.update()
  1452. @staticmethod
  1453. async def _make_media_content(
  1454. attachment: Attachment, data: bytes
  1455. ) -> tuple[MediaMessageEventContent, bytes]:
  1456. if attachment.content_type.startswith("image/"):
  1457. msgtype = MessageType.IMAGE
  1458. info = ImageInfo(
  1459. mimetype=attachment.content_type, width=attachment.width, height=attachment.height
  1460. )
  1461. elif attachment.content_type.startswith("video/"):
  1462. msgtype = MessageType.VIDEO
  1463. info = VideoInfo(
  1464. mimetype=attachment.content_type, width=attachment.width, height=attachment.height
  1465. )
  1466. elif attachment.voice_note or attachment.content_type.startswith("audio/"):
  1467. msgtype = MessageType.AUDIO
  1468. info = AudioInfo(
  1469. mimetype=attachment.content_type if not attachment.voice_note else "audio/ogg"
  1470. )
  1471. else:
  1472. msgtype = MessageType.FILE
  1473. info = FileInfo(mimetype=attachment.content_type)
  1474. info.size = attachment.size or len(data)
  1475. if not attachment.custom_filename:
  1476. ext = mimetypes.guess_extension(info.mimetype) or ""
  1477. attachment.custom_filename = attachment.id + ext
  1478. else:
  1479. for ext in mimetypes.guess_all_extensions(info.mimetype):
  1480. if attachment.custom_filename.endswith(ext):
  1481. break
  1482. else:
  1483. attachment.custom_filename += mimetypes.guess_extension(info.mimetype) or ""
  1484. if attachment.blurhash:
  1485. info["blurhash"] = attachment.blurhash
  1486. info["xyz.amorgan.blurhash"] = attachment.blurhash
  1487. content = MediaMessageEventContent(
  1488. msgtype=msgtype, info=info, body=attachment.custom_filename
  1489. )
  1490. # If this is a voice note, add the additional voice message metadata and convert to OGG.
  1491. if attachment.voice_note:
  1492. content["org.matrix.msc1767.file"] = {
  1493. "url": content.url,
  1494. "name": content.body,
  1495. **(content.file.serialize() if content.file else {}),
  1496. **(content.info.serialize() if content.info else {}),
  1497. }
  1498. content["org.matrix.msc3245.voice"] = {}
  1499. data = await ffmpeg.convert_bytes(
  1500. data, ".ogg", output_args=("-c:a", "libopus"), input_mime=attachment.content_type
  1501. )
  1502. info.size = len(data)
  1503. return content, data
  1504. async def _handle_signal_attachment(
  1505. self, intent: IntentAPI, attachment: Attachment, sticker: bool = False, text: bool = False
  1506. ) -> MediaMessageEventContent | TextMessageEventContent:
  1507. if not attachment.incoming_filename:
  1508. self.log.warning("Failed to bridge attachment, no incoming filename: %s", attachment)
  1509. return TextMessageEventContent(
  1510. msgtype=MessageType.NOTICE, body="Missing attachment data"
  1511. )
  1512. file_size = attachment.size or os.path.getsize(attachment.incoming_filename)
  1513. if file_size > self.matrix.media_config.upload_size:
  1514. self.log.warning(
  1515. f"Dropping attachment {attachment.id}: file too large "
  1516. f"({file_size} > {self.matrix.media_config.upload_size})"
  1517. )
  1518. return TextMessageEventContent(msgtype=MessageType.NOTICE, body="Attachment too large")
  1519. self.log.trace(f"Reuploading attachment {attachment}")
  1520. if not attachment.content_type:
  1521. attachment.content_type = (
  1522. magic.mimetype(attachment.incoming_filename)
  1523. if magic is not None
  1524. else "application/octet-stream"
  1525. )
  1526. with open(attachment.incoming_filename, "rb") as file:
  1527. data = file.read()
  1528. if self.config["signal.remove_file_after_handling"]:
  1529. os.remove(attachment.incoming_filename)
  1530. if text:
  1531. assert attachment.content_type == "text/x-signal-plain"
  1532. assert attachment.size < MAX_MATRIX_MESSAGE_SIZE
  1533. content = TextMessageEventContent(msgtype=MessageType.TEXT, body=data.decode("utf-8"))
  1534. return content
  1535. content, data = await self._make_media_content(attachment, data)
  1536. if sticker:
  1537. self._adjust_sticker_size(content.info)
  1538. await self._upload_attachment(intent, content, data, attachment.id)
  1539. return content
  1540. @staticmethod
  1541. async def _handle_signal_contact(contact: SharedContact) -> TextMessageEventContent:
  1542. msg = f"Shared contact: {contact.name!s}"
  1543. if contact.phone:
  1544. msg += "\n"
  1545. for phone in contact.phone:
  1546. msg += f"\nPhone: {phone.value} ({phone.type_or_label})"
  1547. if contact.email:
  1548. msg += "\n"
  1549. for email in contact.email:
  1550. msg += f"\nEmail: {email.value} ({email.type_or_label})"
  1551. content = TextMessageEventContent(msgtype=MessageType.TEXT, body=msg)
  1552. content["fi.mau.signal.contact"] = contact.serialize()
  1553. return content
  1554. async def _add_sticker_meta(self, sticker: Sticker, content: MediaMessageEventContent) -> None:
  1555. try:
  1556. pack = self._sticker_meta_cache[sticker.pack_id]
  1557. except KeyError:
  1558. self.log.debug(f"Fetching sticker pack metadata for {sticker.pack_id}")
  1559. try:
  1560. async with StickersClient() as client:
  1561. pack = await client.get_pack_metadata(sticker.pack_id, sticker.pack_key)
  1562. self._sticker_meta_cache[sticker.pack_id] = pack
  1563. except Exception:
  1564. self.log.warning(
  1565. f"Failed to fetch pack metadata for {sticker.pack_id}", exc_info=True
  1566. )
  1567. pack = None
  1568. if not pack:
  1569. content.info["fi.mau.signal.sticker"] = {
  1570. "id": sticker.sticker_id,
  1571. "pack": {
  1572. "id": sticker.pack_id,
  1573. "key": sticker.pack_key,
  1574. },
  1575. }
  1576. return
  1577. sticker_meta = pack.stickers[sticker.sticker_id]
  1578. content.body = sticker_meta.emoji
  1579. content.info["fi.mau.signal.sticker"] = {
  1580. "id": sticker.sticker_id,
  1581. "emoji": sticker_meta.emoji,
  1582. "pack": {
  1583. "id": pack.id,
  1584. "key": pack.key,
  1585. "title": pack.title,
  1586. "author": pack.author,
  1587. },
  1588. }
  1589. @staticmethod
  1590. def _adjust_sticker_size(info: ImageInfo) -> None:
  1591. if info.width > 256 or info.height > 256:
  1592. if info.width == info.height:
  1593. info.width = info.height = 256
  1594. elif info.width > info.height:
  1595. info.height = int(info.height / (info.width / 256))
  1596. info.width = 256
  1597. else:
  1598. info.width = int(info.width / (info.height / 256))
  1599. info.height = 256
  1600. async def _handle_signal_sticker(
  1601. self, intent: IntentAPI, sticker: Sticker
  1602. ) -> MediaMessageEventContent | None:
  1603. try:
  1604. self.log.debug(f"Fetching sticker {sticker.pack_id}#{sticker.sticker_id}")
  1605. async with StickersClient() as client:
  1606. data = await client.download_sticker(
  1607. sticker.sticker_id, sticker.pack_id, sticker.pack_key
  1608. )
  1609. except Exception:
  1610. self.log.warning(f"Failed to download sticker {sticker.sticker_id}", exc_info=True)
  1611. return None
  1612. info = ImageInfo(
  1613. mimetype=sticker.attachment.content_type,
  1614. size=len(data),
  1615. width=sticker.attachment.width,
  1616. height=sticker.attachment.height,
  1617. )
  1618. self._adjust_sticker_size(info)
  1619. if magic:
  1620. info.mimetype = magic.mimetype(data)
  1621. ext = mimetypes.guess_extension(info.mimetype)
  1622. if not ext and info.mimetype == "image/webp":
  1623. ext = ".webp"
  1624. content = MediaMessageEventContent(
  1625. msgtype=MessageType.IMAGE, info=info, body=f"sticker{ext}"
  1626. )
  1627. await self._upload_attachment(intent, content, data, sticker.attachment.id)
  1628. return content
  1629. async def _upload_attachment(
  1630. self, intent: IntentAPI, content: MediaMessageEventContent, data: bytes, id: str
  1631. ) -> None:
  1632. upload_mime_type = content.info.mimetype
  1633. if self.encrypted and encrypt_attachment:
  1634. data, content.file = encrypt_attachment(data)
  1635. upload_mime_type = "application/octet-stream"
  1636. content.url = await intent.upload_media(
  1637. data,
  1638. mime_type=upload_mime_type,
  1639. filename=id,
  1640. async_upload=self.config["homeserver.async_media"],
  1641. )
  1642. if content.file:
  1643. content.file.url = content.url
  1644. content.url = None
  1645. # This is a hack for bad clients like Element iOS that require a thumbnail
  1646. if content.info.mimetype.startswith("image/"):
  1647. if content.file:
  1648. content.info.thumbnail_file = content.file
  1649. elif content.url:
  1650. content.info.thumbnail_url = content.url
  1651. async def handle_signal_reaction(
  1652. self, sender: p.Puppet, reaction: Reaction, timestamp: int
  1653. ) -> None:
  1654. author_puppet = await p.Puppet.get_by_address(reaction.target_author, create=False)
  1655. if not author_puppet:
  1656. return None
  1657. target_id = reaction.target_sent_timestamp
  1658. async with self._reaction_lock:
  1659. dedup_id = (
  1660. author_puppet.uuid,
  1661. target_id,
  1662. reaction.emoji,
  1663. sender.uuid,
  1664. reaction.remove,
  1665. )
  1666. if dedup_id in self._reaction_dedup:
  1667. return
  1668. self._reaction_dedup.appendleft(dedup_id)
  1669. existing = await DBReaction.get_by_signal_id(
  1670. self.chat_id, self.receiver, author_puppet.uuid, target_id, sender.uuid
  1671. )
  1672. if reaction.remove:
  1673. if existing:
  1674. try:
  1675. await sender.intent_for(self).redact(existing.mx_room, existing.mxid)
  1676. except IntentError:
  1677. await self.main_intent.redact(existing.mx_room, existing.mxid)
  1678. await existing.delete()
  1679. self.log.trace(f"Removed {existing} after Signal removal")
  1680. return
  1681. elif existing and existing.emoji == reaction.emoji:
  1682. return
  1683. message = await DBMessage.get_by_signal_id(
  1684. author_puppet.uuid, target_id, self.chat_id, self.receiver
  1685. )
  1686. if not message:
  1687. self.log.debug(f"Ignoring reaction to unknown message {target_id}")
  1688. return
  1689. intent = sender.intent_for(self)
  1690. matrix_emoji = variation_selector.add(reaction.emoji)
  1691. mxid = await intent.react(message.mx_room, message.mxid, matrix_emoji, timestamp=timestamp)
  1692. self.log.debug(f"{sender.uuid} reacted to {message.mxid} -> {mxid}")
  1693. await self._upsert_reaction(existing, intent, mxid, sender, message, reaction.emoji)
  1694. async def handle_signal_delete(self, sender: p.Puppet, message_ts: int) -> None:
  1695. message = await DBMessage.get_by_signal_id(
  1696. sender.uuid, message_ts, self.chat_id, self.receiver
  1697. )
  1698. if not message:
  1699. return
  1700. await message.delete()
  1701. try:
  1702. await sender.intent_for(self).redact(message.mx_room, message.mxid)
  1703. except MForbidden:
  1704. await self.main_intent.redact(message.mx_room, message.mxid)
  1705. # endregion
  1706. # region Matrix -> Signal metadata
  1707. async def create_signal_group(
  1708. self, source: u.User, levels: PowerLevelStateEventContent, join_rule: JoinRule
  1709. ) -> None:
  1710. user_mxids = await self.az.intent.get_room_members(
  1711. self.mxid, (Membership.JOIN, Membership.INVITE)
  1712. )
  1713. invitee_addresses = []
  1714. relaybot_mxid = self.config["bridge.relay.relaybot"]
  1715. relaybot = None
  1716. for mxid in user_mxids:
  1717. mx_user = await u.User.get_by_mxid(mxid, create=False)
  1718. if mx_user and mx_user.address and mx_user.username != source.username:
  1719. invitee_addresses.append(mx_user.address)
  1720. if mxid == relaybot_mxid != "@relaybot:example.com":
  1721. relaybot = mx_user
  1722. puppet = await p.Puppet.get_by_mxid(mxid, create=False)
  1723. if puppet:
  1724. invitee_addresses.append(puppet.address)
  1725. avatar_path: str | None = None
  1726. if self.avatar_url:
  1727. avatar_data = await self.az.intent.download_media(self.avatar_url)
  1728. self.avatar_hash = hashlib.sha256(avatar_data).hexdigest()
  1729. avatar_path = self._write_outgoing_file(avatar_data)
  1730. signal_chat = await self.signal.create_group(
  1731. source.username, title=self.name, members=invitee_addresses, avatar_path=avatar_path
  1732. )
  1733. self.name_set = bool(self.name and signal_chat.title)
  1734. self.avatar_set = bool(self.avatar_url and self.avatar_hash and signal_chat.avatar)
  1735. self.chat_id = signal_chat.id
  1736. await self._postinit()
  1737. await self.insert()
  1738. if avatar_path and self.config["signal.remove_file_after_handling"]:
  1739. try:
  1740. os.remove(avatar_path)
  1741. except FileNotFoundError:
  1742. pass
  1743. if self.topic:
  1744. await self.signal.update_group(source.username, self.chat_id, description=self.topic)
  1745. await self.handle_matrix_power_level(source, levels)
  1746. await self.handle_matrix_join_rules(source, join_rule)
  1747. await self.update()
  1748. await self.update_bridge_info()
  1749. if relaybot:
  1750. await self._handle_relaybot_invited(relaybot)
  1751. await self.main_intent.send_notice(self.mxid, f"Signal group created. ID: {self.chat_id}")
  1752. async def bridge_signal_group(
  1753. self, source: u.User, levels: PowerLevelStateEventContent
  1754. ) -> None:
  1755. await self._postinit()
  1756. await self.insert()
  1757. await self.handle_matrix_power_level(source, levels)
  1758. await self.update()
  1759. await self.update_bridge_info()
  1760. # endregion
  1761. # region Updating portal info
  1762. async def update_info(self, source: u.User, info: ChatInfo | GroupV2ID) -> None:
  1763. if self.is_direct:
  1764. if not isinstance(info, (Profile, Address)):
  1765. raise ValueError(f"Unexpected type for direct chat update_info: {type(info)}")
  1766. if not self.name or not self.topic:
  1767. puppet = await self.get_dm_puppet()
  1768. if not puppet.name:
  1769. await puppet.update_info(info, source)
  1770. self.name = puppet.name
  1771. if puppet.number and not self.topic:
  1772. self.topic = puppet.fmt_phone(puppet.number)
  1773. if self.mxid:
  1774. # This is only for automatically updating the topic in existing portals
  1775. await self.update_puppet_number(self.topic)
  1776. return
  1777. if isinstance(info, GroupV2ID):
  1778. try:
  1779. info = await self.signal.get_group(source.username, info.id, info.revision or -1)
  1780. except Exception as e:
  1781. await source.handle_auth_failure(e)
  1782. raise
  1783. if not info:
  1784. self.log.debug(
  1785. f"Failed to get full group v2 info through {source.username}, "
  1786. "cancelling update"
  1787. )
  1788. return
  1789. changed = False
  1790. if self.revision < info.revision:
  1791. self.revision = info.revision
  1792. changed = True
  1793. elif self.revision > info.revision:
  1794. self.log.warning(
  1795. f"Got outdated info when syncing through {source.username} "
  1796. f"({info.revision} < {self.revision}), ignoring..."
  1797. )
  1798. return
  1799. changed = await self._update_name(info.title) or changed
  1800. changed = await self._update_topic(info.description) or changed
  1801. changed = await self._update_avatar(info) or changed
  1802. await self._update_participants(source, info)
  1803. try:
  1804. await self._update_power_levels(info)
  1805. except Exception:
  1806. self.log.warning("Error updating power levels", exc_info=True)
  1807. try:
  1808. await self._update_join_rules(info)
  1809. except:
  1810. self.log.warning("Error updating join rules", exc_info=True)
  1811. if changed:
  1812. await self.update_bridge_info()
  1813. await self.update()
  1814. async def update_expires_in_seconds(self, sender: p.Puppet, expires_in_seconds: int) -> bool:
  1815. if expires_in_seconds == 0:
  1816. expires_in_seconds = None
  1817. if self.expiration_time == expires_in_seconds:
  1818. return False
  1819. assert self.mxid
  1820. self.log.debug(f"Setting portal expiration time to {expires_in_seconds}")
  1821. self.expiration_time = expires_in_seconds
  1822. await self.update()
  1823. time_str = "Off" if expires_in_seconds is None else format_duration(expires_in_seconds)
  1824. body = f"Set the disappearing message timer to {time_str}"
  1825. content = TextMessageEventContent(msgtype=MessageType.NOTICE, body=body)
  1826. await self._send_message(sender.intent_for(self), content)
  1827. return True
  1828. async def get_dm_puppet(self) -> p.Puppet | None:
  1829. if not self.is_direct:
  1830. return None
  1831. return await p.Puppet.get_by_uuid(self.chat_id)
  1832. async def update_info_from_puppet(self, puppet: p.Puppet | None = None) -> None:
  1833. if not self.is_direct:
  1834. return
  1835. if not puppet:
  1836. puppet = await self.get_dm_puppet()
  1837. await self.update_puppet_name(puppet.name, save=False)
  1838. await self.update_puppet_avatar(puppet.avatar_hash, puppet.avatar_url, save=False)
  1839. if puppet.number:
  1840. await self.update_puppet_number(puppet.fmt_phone(puppet.number), save=False)
  1841. async def update_puppet_number(self, number: str, save: bool = True) -> None:
  1842. changed = await self._update_topic(number)
  1843. if changed and save:
  1844. await self.update_bridge_info()
  1845. await self.update()
  1846. async def update_puppet_avatar(
  1847. self, new_hash: str, avatar_url: ContentURI, save: bool = True
  1848. ) -> None:
  1849. if self.avatar_hash != new_hash or (not self.avatar_set and self.set_dm_room_metadata):
  1850. self.avatar_hash = new_hash
  1851. self.avatar_url = avatar_url
  1852. self.avatar_set = False
  1853. if self.mxid and self.set_dm_room_metadata:
  1854. try:
  1855. await self.main_intent.set_room_avatar(self.mxid, avatar_url)
  1856. self.avatar_set = True
  1857. except Exception:
  1858. self.log.exception("Error setting avatar")
  1859. if save:
  1860. await self.update_bridge_info()
  1861. await self.update()
  1862. async def update_puppet_name(self, name: str, save: bool = True) -> None:
  1863. changed = await self._update_name(name)
  1864. if changed and save:
  1865. await self.update_bridge_info()
  1866. await self.update()
  1867. async def _update_name(self, name: str, sender: p.Puppet | None = None) -> bool:
  1868. if self.name != name or (not self.name_set and self.set_dm_room_metadata):
  1869. self.name = name
  1870. self.name_set = False
  1871. if self.mxid and self.set_dm_room_metadata:
  1872. try:
  1873. await self._try_with_puppet(
  1874. lambda i: i.set_room_name(self.mxid, self.name), puppet=sender
  1875. )
  1876. self.name_set = True
  1877. except Exception:
  1878. self.log.exception("Error setting name")
  1879. return True
  1880. return False
  1881. async def _update_topic(self, topic: str, sender: p.Puppet | None = None) -> bool:
  1882. if self.topic != topic:
  1883. self.topic = topic
  1884. if self.mxid:
  1885. try:
  1886. await self._try_with_puppet(
  1887. lambda i: i.set_room_topic(self.mxid, self.topic), puppet=sender
  1888. )
  1889. except Exception:
  1890. self.log.exception("Error setting topic")
  1891. self.topic = None
  1892. return True
  1893. return False
  1894. async def _try_with_puppet(
  1895. self, action: Callable[[IntentAPI], Awaitable[Any]], puppet: p.Puppet | None = None
  1896. ) -> None:
  1897. if puppet:
  1898. try:
  1899. await action(puppet.intent_for(self))
  1900. except (MForbidden, IntentError):
  1901. await action(self.main_intent)
  1902. else:
  1903. await action(self.main_intent)
  1904. async def _update_avatar(self, info: GroupV2, sender: p.Puppet | None = None) -> bool:
  1905. path = None
  1906. if isinstance(info, GroupV2):
  1907. path = info.avatar
  1908. res = await p.Puppet.upload_avatar(self, path, self.main_intent)
  1909. if res is False:
  1910. return False
  1911. self.avatar_hash, self.avatar_url = res
  1912. if not self.mxid:
  1913. return True
  1914. try:
  1915. await self._try_with_puppet(
  1916. lambda i: i.set_room_avatar(self.mxid, self.avatar_url), puppet=sender
  1917. )
  1918. self.avatar_set = True
  1919. except Exception:
  1920. self.log.exception("Error setting avatar")
  1921. self.avatar_set = False
  1922. return True
  1923. async def _update_participants(self, source: u.User, info: GroupV2) -> None:
  1924. if not self.mxid:
  1925. return
  1926. member_events = await self.main_intent.get_members(self.mxid)
  1927. remove_users: set[UserID] = {
  1928. UserID(evt.state_key)
  1929. for evt in member_events
  1930. if (
  1931. evt.content.membership == Membership.JOIN
  1932. or evt.content.membership == Membership.INVITE
  1933. or evt.content.membership == Membership.KNOCK
  1934. )
  1935. and evt.state_key != self.az.bot_mxid
  1936. }
  1937. unban_users: set[UserID] = {
  1938. UserID(evt.state_key)
  1939. for evt in member_events
  1940. if evt.content.membership == Membership.BAN and evt.state_key != self.az.bot_mxid
  1941. }
  1942. self._pending_members = {addr.uuid for addr in info.pending_members}
  1943. for member in info.banned_members:
  1944. user = await u.User.get_by_uuid(member.uuid)
  1945. if user:
  1946. unban_users.discard(user.mxid)
  1947. remove_users.discard(user.mxid)
  1948. try:
  1949. await self.main_intent.ban_user(
  1950. self.mxid, user.mxid, reason="Banned on Signal"
  1951. )
  1952. except (MForbidden, MBadState) as e:
  1953. self.log.debug(f"Could not ban {user.mxid}: {e}")
  1954. puppet = await p.Puppet.get_by_address(Address(uuid=member.uuid))
  1955. unban_users.discard(puppet.mxid)
  1956. remove_users.discard(puppet.mxid)
  1957. try:
  1958. await self.main_intent.ban_user(self.mxid, puppet.mxid, reason="Banned on Signal")
  1959. except (MForbidden, MBadState) as e:
  1960. self.log.debug(f"Could not ban {puppet.mxid}: {e}")
  1961. for mxid in unban_users:
  1962. user = await u.User.get_by_mxid(mxid, create=False)
  1963. if user and await user.is_logged_in():
  1964. try:
  1965. await self.main_intent.unban_user(
  1966. self.mxid, user.mxid, reason="Unbanned on Signal"
  1967. )
  1968. except (MForbidden, MBadState) as e:
  1969. self.log.debug(f"Could not unban {user.mxid}: {e}")
  1970. puppet = await p.Puppet.get_by_mxid(mxid, create=False)
  1971. if puppet:
  1972. try:
  1973. await self.main_intent.unban_user(
  1974. self.mxid, puppet.mxid, reason="Unbanned on Signal"
  1975. )
  1976. except (MForbidden, MBadState) as e:
  1977. self.log.debug(f"Could not unban {puppet.mxid}: {e}")
  1978. for address in info.members + info.pending_members:
  1979. user = await u.User.get_by_address(address)
  1980. if user:
  1981. remove_users.discard(user.mxid)
  1982. try:
  1983. await self.main_intent.invite_user(self.mxid, user.mxid, check_cache=True)
  1984. except (MForbidden, IntentError, MBadState) as e:
  1985. self.log.debug(f"Failed to invite {user.mxid}: {e}")
  1986. puppet = await p.Puppet.get_by_address(address)
  1987. if not puppet:
  1988. self.log.warning(f"Didn't find puppet for member {address}")
  1989. continue
  1990. await source.sync_contact(address)
  1991. try:
  1992. await self.main_intent.invite_user(
  1993. self.mxid, puppet.intent_for(self).mxid, check_cache=True
  1994. )
  1995. except (MForbidden, IntentError, MBadState) as e:
  1996. self.log.debug(f"Could not invite {user.mxid}: {e}")
  1997. if address.uuid not in self._pending_members:
  1998. await puppet.intent_for(self).ensure_joined(self.mxid)
  1999. remove_users.discard(puppet.default_mxid)
  2000. for address in info.requesting_members:
  2001. puppet = await p.Puppet.get_by_address(address)
  2002. if puppet:
  2003. remove_users.discard(puppet.mxid)
  2004. try:
  2005. await puppet.intent_for(self).knock_room(
  2006. self.mxid,
  2007. reason="via invite link",
  2008. servers=[self.config["homeserver.domain"]],
  2009. )
  2010. except (MForbidden, IntentError) as e:
  2011. self.log.debug(f"Failed to bridge knock: {e}")
  2012. for mxid in remove_users:
  2013. user = await u.User.get_by_mxid(mxid, create=False)
  2014. if user and await user.is_logged_in():
  2015. try:
  2016. await self.main_intent.kick_user(
  2017. self.mxid, user.mxid, reason="not a member of this Signal group"
  2018. )
  2019. except (MForbidden, MBadState) as e:
  2020. self.log.debug(f"could not kick {user.mxid}: {e}")
  2021. puppet = await p.Puppet.get_by_mxid(mxid, create=False)
  2022. if puppet:
  2023. try:
  2024. await self.main_intent.kick_user(
  2025. self.mxid,
  2026. puppet.intent_for(self).mxid,
  2027. reason="not a member of this Signal group",
  2028. )
  2029. except (MForbidden, MBadState) as e:
  2030. self.log.debug(f"Could not kick {user.mxid}: {e}")
  2031. async def _kick_with_puppet(self, user: p.Puppet | u.User, sender: p.Puppet) -> None:
  2032. try:
  2033. await sender.intent_for(self).kick_user(self.mxid, user.mxid)
  2034. except MForbidden:
  2035. try:
  2036. await self.main_intent.kick_user(
  2037. self.mxid, user.mxid, reason=f"removed by {sender.name}"
  2038. )
  2039. except MForbidden as e:
  2040. self.log.debug(f"Could not remove {user.mxid}: {e}")
  2041. except MBadState as e:
  2042. self.log.debug(f"Could not remove {user.mxid}: {e}")
  2043. async def _update_power_levels(self, info: ChatInfo) -> None:
  2044. if not self.mxid or not info:
  2045. return
  2046. power_levels = await self.main_intent.get_power_levels(self.mxid)
  2047. power_levels = await self._get_power_levels(power_levels, info=info, is_initial=False)
  2048. await self.main_intent.set_power_levels(self.mxid, power_levels)
  2049. async def _get_new_join_rule(self, link_access: AccessControlMode) -> JoinRule | None:
  2050. if not self.mxid:
  2051. return None
  2052. old_join_rule = await self._get_join_rule()
  2053. if link_access == AccessControlMode.ANY:
  2054. # Default to invite since chat that don't require admin approval don't allow knocks
  2055. join_rule = (
  2056. JoinRule.PUBLIC if self.config["bridge.public_portals"] else JoinRule.INVITE
  2057. )
  2058. allowed_join_rules = (JoinRule.PUBLIC, JoinRule.INVITE)
  2059. elif link_access == AccessControlMode.ADMINISTRATOR:
  2060. join_rule = JoinRule.KNOCK
  2061. # TODO remove getattr once mautrix-python is updated
  2062. allowed_join_rules = (
  2063. JoinRule.KNOCK,
  2064. getattr(JoinRule, "KNOCK_RESTRICTED", "knock_restricted"),
  2065. )
  2066. else:
  2067. join_rule = JoinRule.INVITE
  2068. allowed_join_rules = (JoinRule.INVITE,)
  2069. if old_join_rule in allowed_join_rules:
  2070. return None
  2071. return join_rule
  2072. async def _update_join_rules(self, info: GroupV2) -> None:
  2073. if not self.mxid:
  2074. return
  2075. new_join_rule = await self._get_new_join_rule(info.access_control.link)
  2076. if new_join_rule:
  2077. await self.main_intent.set_join_rule(self.mxid, new_join_rule)
  2078. async def _get_join_rule(self) -> JoinRule | None:
  2079. evt = await self.main_intent.get_state_event(self.mxid, EventType.ROOM_JOIN_RULES)
  2080. return evt.join_rule if evt else None
  2081. # endregion
  2082. # region Bridge info state event
  2083. @property
  2084. def bridge_info_state_key(self) -> str:
  2085. return f"net.maunium.signal://signal/{self.chat_id!s}"
  2086. @property
  2087. def bridge_info(self) -> dict[str, Any]:
  2088. return {
  2089. "bridgebot": self.az.bot_mxid,
  2090. "creator": self.main_intent.mxid,
  2091. "protocol": {
  2092. "id": "signal",
  2093. "displayname": "Signal",
  2094. "avatar_url": self.config["appservice.bot_avatar"],
  2095. },
  2096. "channel": {
  2097. "id": str(self.chat_id),
  2098. "displayname": self.name,
  2099. "avatar_url": self.avatar_url,
  2100. },
  2101. }
  2102. async def update_bridge_info(self) -> None:
  2103. if not self.mxid:
  2104. self.log.debug("Not updating bridge info: no Matrix room created")
  2105. return
  2106. try:
  2107. self.log.debug("Updating bridge info...")
  2108. await self.main_intent.send_state_event(
  2109. self.mxid, StateBridge, self.bridge_info, self.bridge_info_state_key
  2110. )
  2111. # TODO remove this once https://github.com/matrix-org/matrix-doc/pull/2346 is in spec
  2112. await self.main_intent.send_state_event(
  2113. self.mxid, StateHalfShotBridge, self.bridge_info, self.bridge_info_state_key
  2114. )
  2115. except Exception:
  2116. self.log.warning("Failed to update bridge info", exc_info=True)
  2117. # endregion
  2118. # region Creating Matrix rooms
  2119. async def update_matrix_room(self, source: u.User, info: ChatInfo) -> None:
  2120. if not self.is_direct and not isinstance(info, GroupV2):
  2121. raise ValueError(f"Unexpected type for updating group portal: {type(info)}")
  2122. elif self.is_direct and not isinstance(info, (Profile, Address)):
  2123. raise ValueError(f"Unexpected type for updating direct chat portal: {type(info)}")
  2124. try:
  2125. await self._update_matrix_room(source, info)
  2126. except Exception:
  2127. self.log.exception("Failed to update portal")
  2128. async def create_matrix_room(
  2129. self, source: u.User, info: ChatInfo | GroupV2ID
  2130. ) -> RoomID | None:
  2131. if not self.is_direct and not isinstance(info, GroupV2ID):
  2132. raise ValueError(f"Unexpected type for creating group portal: {type(info)}")
  2133. elif self.is_direct and not isinstance(info, (Profile, Address)):
  2134. raise ValueError(f"Unexpected type for creating direct chat portal: {type(info)}")
  2135. if isinstance(info, GroupV2ID) and not isinstance(info, GroupV2):
  2136. self.log.debug(
  2137. f"create_matrix_room() called with {info}, fetching full info from signald"
  2138. )
  2139. try:
  2140. info = await self.signal.get_group(source.username, info.id, info.revision or -1)
  2141. except Exception as e:
  2142. await source.handle_auth_failure(e)
  2143. raise
  2144. if not info:
  2145. self.log.warning(f"Full info not found, canceling room creation")
  2146. return None
  2147. else:
  2148. self.log.trace("get_group() returned full info: %s", info)
  2149. if self.mxid:
  2150. await self.update_matrix_room(source, info)
  2151. return self.mxid
  2152. async with self._create_room_lock:
  2153. return await self._create_matrix_room(source, info)
  2154. def _get_invite_content(self, double_puppet: p.Puppet | None) -> dict[str, Any]:
  2155. invite_content = {}
  2156. if double_puppet:
  2157. invite_content["fi.mau.will_auto_accept"] = True
  2158. if self.is_direct:
  2159. invite_content["is_direct"] = True
  2160. return invite_content
  2161. async def _update_matrix_room(self, source: u.User, info: ChatInfo) -> None:
  2162. puppet = await p.Puppet.get_by_custom_mxid(source.mxid)
  2163. await self.main_intent.invite_user(
  2164. self.mxid,
  2165. source.mxid,
  2166. check_cache=True,
  2167. extra_content=self._get_invite_content(puppet),
  2168. )
  2169. if puppet:
  2170. did_join = await puppet.intent.ensure_joined(self.mxid)
  2171. if did_join and self.is_direct:
  2172. await source.update_direct_chats({self.main_intent.mxid: [self.mxid]})
  2173. await self.update_info(source, info)
  2174. async def _get_power_levels(
  2175. self,
  2176. levels: PowerLevelStateEventContent | None = None,
  2177. info: ChatInfo = None,
  2178. is_initial: bool = False,
  2179. ) -> PowerLevelStateEventContent:
  2180. levels = levels or PowerLevelStateEventContent()
  2181. bot_pl = levels.get_user_level(self.az.bot_mxid)
  2182. levels.events_default = 0
  2183. if self.is_direct:
  2184. levels.ban = 99
  2185. levels.kick = 99
  2186. levels.invite = 99
  2187. levels.state_default = 0
  2188. meta_edit_level = 0
  2189. else:
  2190. ac = info.access_control
  2191. for detail in info.member_detail + info.pending_member_detail:
  2192. puppet = await p.Puppet.get_by_uuid(detail.uuid)
  2193. puppet_mxid = puppet.intent_for(self).mxid
  2194. current_level = levels.get_user_level(puppet_mxid)
  2195. if bot_pl > current_level and bot_pl >= 50:
  2196. level = current_level
  2197. user = await u.User.get_by_uuid(detail.uuid)
  2198. if user:
  2199. if current_level >= 50 and detail.role == GroupMemberRole.DEFAULT:
  2200. level = 0
  2201. elif current_level < 50 and detail.role == GroupMemberRole.ADMINISTRATOR:
  2202. level = 50
  2203. if level == 0:
  2204. levels.users.pop(user.mxid, None)
  2205. else:
  2206. levels.users[user.mxid] = level
  2207. else:
  2208. level = 50 if detail.role == GroupMemberRole.ADMINISTRATOR else 0
  2209. if level == 0:
  2210. levels.users.pop(puppet_mxid, None)
  2211. else:
  2212. levels.users[puppet_mxid] = level
  2213. announcements = info.announcements
  2214. levels.ban = 50
  2215. levels.kick = 50
  2216. levels.invite = 50 if ac.members == AccessControlMode.ADMINISTRATOR else 0
  2217. levels.state_default = 50
  2218. meta_edit_level = 50 if ac.attributes == AccessControlMode.ADMINISTRATOR else 0
  2219. if announcements == AnnouncementsMode.ENABLED:
  2220. levels.events_default = 50
  2221. levels.events[EventType.REACTION] = 0
  2222. levels.events[EventType.ROOM_NAME] = meta_edit_level
  2223. levels.events[EventType.ROOM_AVATAR] = meta_edit_level
  2224. levels.events[EventType.ROOM_TOPIC] = meta_edit_level
  2225. levels.events[EventType.ROOM_ENCRYPTION] = 50 if self.matrix.e2ee else 99
  2226. levels.events[EventType.ROOM_TOMBSTONE] = 99
  2227. levels.users_default = 0
  2228. # Remote delete is only for your own messages
  2229. levels.redact = 99
  2230. if self.main_intent.mxid not in levels.users:
  2231. levels.users[self.main_intent.mxid] = 9001 if is_initial else 100
  2232. levels.users = {k: v for k, v in sorted(list(levels.users.items()))}
  2233. return levels
  2234. async def _create_matrix_room(self, source: u.User, info: ChatInfo) -> RoomID | None:
  2235. if self.mxid:
  2236. await self._update_matrix_room(source, info)
  2237. return self.mxid
  2238. await self.update_info(source, info)
  2239. self.log.debug("Creating Matrix room")
  2240. name: str | None = None
  2241. power_levels = await self._get_power_levels(info=info, is_initial=True)
  2242. initial_state = [
  2243. {
  2244. "type": str(StateBridge),
  2245. "state_key": self.bridge_info_state_key,
  2246. "content": self.bridge_info,
  2247. },
  2248. {
  2249. # TODO remove this once https://github.com/matrix-org/matrix-doc/pull/2346 is in spec
  2250. "type": str(StateHalfShotBridge),
  2251. "state_key": self.bridge_info_state_key,
  2252. "content": self.bridge_info,
  2253. },
  2254. {
  2255. "type": str(EventType.ROOM_POWER_LEVELS),
  2256. "content": power_levels.serialize(),
  2257. },
  2258. ]
  2259. invites = []
  2260. if self.config["bridge.encryption.default"] and self.matrix.e2ee:
  2261. self.encrypted = True
  2262. initial_state.append(
  2263. {
  2264. "type": str(EventType.ROOM_ENCRYPTION),
  2265. "content": self.get_encryption_state_event_json(),
  2266. }
  2267. )
  2268. if self.is_direct:
  2269. invites.append(self.az.bot_mxid)
  2270. if self.is_direct and source.uuid == self.chat_id:
  2271. name = self.name = "Signal Note to Self"
  2272. elif self.set_dm_room_metadata:
  2273. name = self.name
  2274. if self.avatar_url and self.set_dm_room_metadata:
  2275. initial_state.append(
  2276. {
  2277. "type": str(EventType.ROOM_AVATAR),
  2278. "content": {"url": self.avatar_url},
  2279. }
  2280. )
  2281. creation_content = {}
  2282. if not self.config["bridge.federate_rooms"]:
  2283. creation_content["m.federate"] = False
  2284. self.mxid = await self.main_intent.create_room(
  2285. name=name,
  2286. topic=self.topic,
  2287. is_direct=self.is_direct,
  2288. initial_state=initial_state,
  2289. invitees=invites,
  2290. creation_content=creation_content,
  2291. # Make sure the power level event in initial_state is allowed
  2292. # even if the server sends a default power level event before it.
  2293. # TODO remove this if the spec is changed to require servers to
  2294. # use the power level event in initial_state
  2295. power_level_override={"users": {self.main_intent.mxid: 9001}},
  2296. )
  2297. if not self.mxid:
  2298. raise Exception("Failed to create room: no mxid returned")
  2299. self.name_set = bool(name)
  2300. self.avatar_set = bool(self.avatar_url) and self.set_dm_room_metadata
  2301. if self.encrypted and self.matrix.e2ee and self.is_direct:
  2302. try:
  2303. await self.az.intent.ensure_joined(self.mxid)
  2304. except Exception:
  2305. self.log.warning("Failed to add bridge bot to new private chat {self.mxid}")
  2306. puppet = await p.Puppet.get_by_custom_mxid(source.mxid)
  2307. await self.main_intent.invite_user(
  2308. self.mxid, source.mxid, extra_content=self._get_invite_content(puppet)
  2309. )
  2310. if puppet:
  2311. try:
  2312. await source.update_direct_chats({self.main_intent.mxid: [self.mxid]})
  2313. await puppet.intent.join_room_by_id(self.mxid)
  2314. except MatrixError:
  2315. self.log.debug(
  2316. "Failed to join custom puppet into newly created portal", exc_info=True
  2317. )
  2318. await self.update()
  2319. self.log.debug(f"Matrix room created: {self.mxid}")
  2320. self.by_mxid[self.mxid] = self
  2321. if not self.is_direct:
  2322. await self._update_participants(source, info)
  2323. return self.mxid
  2324. # endregion
  2325. # region Database getters
  2326. async def _postinit(self) -> None:
  2327. self.by_chat_id[(str(self.chat_id), self.receiver)] = self
  2328. if self.mxid:
  2329. self.by_mxid[self.mxid] = self
  2330. if self.is_direct:
  2331. puppet = await self.get_dm_puppet()
  2332. self._main_intent = puppet.default_mxid_intent
  2333. elif not self.is_direct:
  2334. self._main_intent = self.az.intent
  2335. async def delete(self) -> None:
  2336. await DBMessage.delete_all(self.mxid)
  2337. self.by_mxid.pop(self.mxid, None)
  2338. self.mxid = None
  2339. self.name_set = False
  2340. self.avatar_set = False
  2341. self.relay_user_id = None
  2342. self.topic = None
  2343. self.encrypted = False
  2344. await self.update()
  2345. async def save(self) -> None:
  2346. await self.update()
  2347. @classmethod
  2348. def all_with_room(cls) -> AsyncGenerator[Portal, None]:
  2349. return cls._db_to_portals(super().all_with_room())
  2350. @classmethod
  2351. def find_private_chats_with(cls, other_user: UUID) -> AsyncGenerator[Portal, None]:
  2352. return cls._db_to_portals(super().find_private_chats_with(other_user))
  2353. @classmethod
  2354. async def _db_to_portals(cls, query: Awaitable[list[Portal]]) -> AsyncGenerator[Portal, None]:
  2355. portals = await query
  2356. for index, portal in enumerate(portals):
  2357. try:
  2358. yield cls.by_chat_id[(str(portal.chat_id), portal.receiver)]
  2359. except KeyError:
  2360. await portal._postinit()
  2361. yield portal
  2362. @classmethod
  2363. @async_getter_lock
  2364. async def get_by_mxid(cls, mxid: RoomID, /) -> Portal | None:
  2365. try:
  2366. return cls.by_mxid[mxid]
  2367. except KeyError:
  2368. pass
  2369. portal = cast(cls, await super().get_by_mxid(mxid))
  2370. if portal is not None:
  2371. await portal._postinit()
  2372. return portal
  2373. return None
  2374. @classmethod
  2375. @async_getter_lock
  2376. async def get_by_chat_id(
  2377. cls, chat_id: GroupID | UUID, /, *, receiver: str = "", create: bool = False
  2378. ) -> Portal | None:
  2379. if isinstance(chat_id, str):
  2380. receiver = ""
  2381. elif not isinstance(chat_id, UUID):
  2382. raise ValueError(f"Invalid chat ID type {type(chat_id)}")
  2383. elif not receiver:
  2384. raise ValueError("Direct chats must have a receiver")
  2385. try:
  2386. return cls.by_chat_id[(str(chat_id), receiver)]
  2387. except KeyError:
  2388. pass
  2389. portal = cast(cls, await super().get_by_chat_id(chat_id, receiver))
  2390. if portal is not None:
  2391. await portal._postinit()
  2392. return portal
  2393. if create:
  2394. portal = cls(chat_id, receiver)
  2395. await portal.insert()
  2396. await portal._postinit()
  2397. return portal
  2398. return None
  2399. # endregion