portal.py 78 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954
  1. # mautrix-signal - A Matrix-Signal puppeting bridge
  2. # Copyright (C) 2022 Tulir Asokan
  3. #
  4. # This program is free software: you can redistribute it and/or modify
  5. # it under the terms of the GNU Affero General Public License as published by
  6. # the Free Software Foundation, either version 3 of the License, or
  7. # (at your option) any later version.
  8. #
  9. # This program is distributed in the hope that it will be useful,
  10. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. # GNU Affero General Public License for more details.
  13. #
  14. # You should have received a copy of the GNU Affero General Public License
  15. # along with this program. If not, see <https://www.gnu.org/licenses/>.
  16. from __future__ import annotations
  17. from typing import TYPE_CHECKING, Any, AsyncGenerator, Awaitable, Callable, Union, cast
  18. from collections import deque
  19. from uuid import UUID, uuid4
  20. import asyncio
  21. import hashlib
  22. import mimetypes
  23. import os
  24. import os.path
  25. import pathlib
  26. import time
  27. from mausignald.errors import AttachmentTooLargeError, NotConnected, RPCError
  28. from mausignald.types import (
  29. AccessControlMode,
  30. Address,
  31. AnnouncementsMode,
  32. Attachment,
  33. Contact,
  34. Group,
  35. GroupAccessControl,
  36. GroupID,
  37. GroupMemberRole,
  38. GroupV2,
  39. GroupV2ID,
  40. LinkPreview,
  41. Mention,
  42. MessageData,
  43. Profile,
  44. Quote,
  45. QuotedAttachment,
  46. Reaction,
  47. SharedContact,
  48. Sticker,
  49. )
  50. from mautrix.appservice import AppService, IntentAPI
  51. from mautrix.bridge import BasePortal, RejectMatrixInvite, async_getter_lock
  52. from mautrix.errors import IntentError, MatrixError, MForbidden
  53. from mautrix.types import (
  54. AudioInfo,
  55. BeeperMessageStatusEventContent,
  56. ContentURI,
  57. EncryptedEvent,
  58. EncryptedFile,
  59. EventID,
  60. EventType,
  61. FileInfo,
  62. ImageInfo,
  63. MediaMessageEventContent,
  64. Membership,
  65. MessageEvent,
  66. MessageEventContent,
  67. MessageStatusReason,
  68. MessageType,
  69. PowerLevelStateEventContent,
  70. RelatesTo,
  71. RelationType,
  72. RoomID,
  73. TextMessageEventContent,
  74. UserID,
  75. VideoInfo,
  76. )
  77. from mautrix.util import ffmpeg, variation_selector
  78. from mautrix.util.format_duration import format_duration
  79. from mautrix.util.message_send_checkpoint import MessageSendCheckpointStatus
  80. from . import matrix as m, puppet as p, signal as s, user as u
  81. from .config import Config
  82. from .db import (
  83. DisappearingMessage,
  84. Message as DBMessage,
  85. Portal as DBPortal,
  86. Reaction as DBReaction,
  87. )
  88. from .formatter import matrix_to_signal, signal_to_matrix
  89. from .util import id_to_str
  90. if TYPE_CHECKING:
  91. from .__main__ import SignalBridge
  92. try:
  93. from mautrix.crypto.attachments import decrypt_attachment, encrypt_attachment
  94. except ImportError:
  95. encrypt_attachment = decrypt_attachment = None
  96. try:
  97. from signalstickers_client import StickersClient
  98. from signalstickers_client.models import StickerPack
  99. except ImportError:
  100. StickersClient = StickerPack = None
  101. try:
  102. from mautrix.util import magic
  103. except ImportError:
  104. magic = None
  105. StateBridge = EventType.find("m.bridge", EventType.Class.STATE)
  106. StateHalfShotBridge = EventType.find("uk.half-shot.bridge", EventType.Class.STATE)
  107. ChatInfo = Union[Group, GroupV2, GroupV2ID, Contact, Profile, Address]
  108. MAX_MATRIX_MESSAGE_SIZE = 60000
  109. BEEPER_LINK_PREVIEWS_KEY = "com.beeper.linkpreviews"
  110. BEEPER_IMAGE_ENCRYPTION_KEY = "beeper:image:encryption"
  111. class UnknownReactionTarget(Exception):
  112. pass
  113. class Portal(DBPortal, BasePortal):
  114. by_mxid: dict[RoomID, Portal] = {}
  115. by_chat_id: dict[tuple[str, str], Portal] = {}
  116. _sticker_meta_cache: dict[str, StickerPack] = {}
  117. disappearing_msg_class = DisappearingMessage
  118. config: Config
  119. matrix: m.MatrixHandler
  120. signal: s.SignalHandler
  121. az: AppService
  122. private_chat_portal_meta: bool
  123. expiration_time: int | None
  124. _main_intent: IntentAPI | None
  125. _create_room_lock: asyncio.Lock
  126. _msgts_dedup: deque[tuple[Address, int]]
  127. _reaction_dedup: deque[tuple[Address, int, str, Address, bool]]
  128. _reaction_lock: asyncio.Lock
  129. _pending_members: set[UUID] | None
  130. _expiration_lock: asyncio.Lock
  131. def __init__(
  132. self,
  133. chat_id: GroupID | Address,
  134. receiver: str,
  135. mxid: RoomID | None = None,
  136. name: str | None = None,
  137. topic: str | None = None,
  138. avatar_hash: str | None = None,
  139. avatar_url: ContentURI | None = None,
  140. name_set: bool = False,
  141. avatar_set: bool = False,
  142. revision: int = 0,
  143. encrypted: bool = False,
  144. relay_user_id: UserID | None = None,
  145. expiration_time: int | None = None,
  146. ) -> None:
  147. super().__init__(
  148. chat_id=chat_id,
  149. receiver=receiver,
  150. mxid=mxid,
  151. name=name,
  152. topic=topic,
  153. avatar_hash=avatar_hash,
  154. avatar_url=avatar_url,
  155. name_set=name_set,
  156. avatar_set=avatar_set,
  157. revision=revision,
  158. encrypted=encrypted,
  159. relay_user_id=relay_user_id,
  160. expiration_time=expiration_time,
  161. )
  162. BasePortal.__init__(self)
  163. self._create_room_lock = asyncio.Lock()
  164. self.log = self.log.getChild(self.chat_id_str)
  165. self._main_intent = None
  166. self._msgts_dedup = deque(maxlen=100)
  167. self._reaction_dedup = deque(maxlen=100)
  168. self._last_participant_update = set()
  169. self._reaction_lock = asyncio.Lock()
  170. self._pending_members = None
  171. self._relay_user = None
  172. self._expiration_lock = asyncio.Lock()
  173. @property
  174. def main_intent(self) -> IntentAPI:
  175. if not self._main_intent:
  176. raise ValueError("Portal must be postinit()ed before main_intent can be used")
  177. return self._main_intent
  178. @property
  179. def is_direct(self) -> bool:
  180. return isinstance(self.chat_id, Address)
  181. @property
  182. def disappearing_enabled(self) -> bool:
  183. return self.is_direct or self.config["signal.enable_disappearing_messages_in_groups"]
  184. def handle_uuid_receive(self, uuid: UUID) -> None:
  185. if not self.is_direct or self.chat_id.uuid:
  186. raise ValueError(
  187. "handle_uuid_receive can only be used for private chat portals with a phone "
  188. "number chat_id"
  189. )
  190. del self.by_chat_id[(self.chat_id_str, self.receiver)]
  191. self.chat_id = Address(uuid=uuid)
  192. self.by_chat_id[(self.chat_id_str, self.receiver)] = self
  193. @classmethod
  194. def init_cls(cls, bridge: "SignalBridge") -> None:
  195. cls.config = bridge.config
  196. cls.matrix = bridge.matrix
  197. cls.signal = bridge.signal
  198. cls.az = bridge.az
  199. cls.loop = bridge.loop
  200. BasePortal.bridge = bridge
  201. cls.private_chat_portal_meta = cls.config["bridge.private_chat_portal_meta"]
  202. # region Misc
  203. async def _send_delivery_receipt(self, event_id: EventID) -> None:
  204. if event_id and self.config["bridge.delivery_receipts"]:
  205. try:
  206. await self.az.intent.mark_read(self.mxid, event_id)
  207. except Exception:
  208. self.log.exception("Failed to send delivery receipt for %s", event_id)
  209. async def _upsert_reaction(
  210. self,
  211. existing: DBReaction,
  212. intent: IntentAPI,
  213. mxid: EventID,
  214. sender: p.Puppet | u.User,
  215. message: DBMessage,
  216. emoji: str,
  217. ) -> None:
  218. if existing:
  219. self.log.debug(
  220. f"_upsert_reaction redacting {existing.mxid} and inserting {mxid}"
  221. f" (message: {message.mxid})"
  222. )
  223. try:
  224. await intent.redact(existing.mx_room, existing.mxid)
  225. except MForbidden:
  226. self.log.debug("Unexpected MForbidden redacting reaction", exc_info=True)
  227. await existing.edit(emoji=emoji, mxid=mxid, mx_room=message.mx_room)
  228. else:
  229. self.log.debug(f"_upsert_reaction inserting {mxid} (message: {message.mxid})")
  230. await DBReaction(
  231. mxid=mxid,
  232. mx_room=message.mx_room,
  233. emoji=emoji,
  234. signal_chat_id=self.chat_id,
  235. signal_receiver=self.receiver,
  236. msg_author=message.sender,
  237. msg_timestamp=message.timestamp,
  238. author=sender.address,
  239. ).insert()
  240. # endregion
  241. # region Matrix event handling
  242. @staticmethod
  243. async def _make_attachment(message: MediaMessageEventContent, path: str) -> Attachment:
  244. outgoing_filename = path
  245. if message.msgtype == MessageType.AUDIO:
  246. outgoing_filename = await ffmpeg.convert_path(
  247. path, ".m4a", output_args=("-c:a", "aac"), remove_input=True
  248. )
  249. message.info.mimetype = "audio/mp4"
  250. attachment = Attachment(
  251. custom_filename=message.body,
  252. content_type=message.info.mimetype,
  253. outgoing_filename=str(outgoing_filename),
  254. )
  255. info = message.info
  256. attachment.width = info.get("w", info.get("width", 0))
  257. attachment.height = info.get("h", info.get("height", 0))
  258. attachment.voice_note = message.msgtype == MessageType.AUDIO
  259. return attachment
  260. def _write_outgoing_file(self, data: bytes) -> str:
  261. dir = pathlib.Path(self.config["signal.outgoing_attachment_dir"])
  262. path = dir.joinpath(f"mautrix-signal-{str(uuid4())}")
  263. try:
  264. with open(path, "wb") as file:
  265. file.write(data)
  266. except FileNotFoundError:
  267. dir.mkdir(mode=0o755, parents=True, exist_ok=True)
  268. with open(path, "wb") as file:
  269. file.write(data)
  270. return str(path)
  271. async def _download_matrix_media(self, message: MediaMessageEventContent) -> str:
  272. # Signal limits files to 100 MB
  273. if message.info and message.info.size and message.info.size > 100 * 10**6:
  274. raise AttachmentTooLargeError({"filename": message.body})
  275. if message.file:
  276. data = await self.main_intent.download_media(message.file.url)
  277. data = decrypt_attachment(
  278. data, message.file.key.key, message.file.hashes.get("sha256"), message.file.iv
  279. )
  280. else:
  281. data = await self.main_intent.download_media(message.url)
  282. return self._write_outgoing_file(data)
  283. async def handle_matrix_message(
  284. self, sender: u.User, message: MessageEventContent, event_id: EventID
  285. ) -> None:
  286. try:
  287. await self._handle_matrix_message(sender, message, event_id)
  288. except Exception as e:
  289. self.log.exception(f"Failed to handle Matrix message {event_id}")
  290. status = (
  291. MessageSendCheckpointStatus.UNSUPPORTED
  292. if isinstance(e, AttachmentTooLargeError)
  293. else MessageSendCheckpointStatus.PERM_FAILURE
  294. )
  295. sender.send_remote_checkpoint(
  296. status, event_id, self.mxid, EventType.ROOM_MESSAGE, message.msgtype, error=e
  297. )
  298. await sender.handle_auth_failure(e)
  299. await self._send_error_notice("message", e)
  300. asyncio.create_task(self._send_message_status(event_id, e))
  301. async def _send_error_notice(self, type_name: str, err: Exception) -> None:
  302. if not self.config["bridge.delivery_error_reports"]:
  303. return
  304. message = f"{type(err).__name__}: {err}"
  305. if isinstance(err, NotConnected):
  306. message = "There was an error connecting to signald."
  307. elif isinstance(err, UnknownReactionTarget):
  308. message = "Could not find message to react to on Signal."
  309. await self._send_message(
  310. self.main_intent,
  311. TextMessageEventContent(
  312. msgtype=MessageType.NOTICE,
  313. body=f"\u26a0 Your {type_name} was not bridged: {message}",
  314. ),
  315. )
  316. async def _send_message_status(self, event_id: EventID, err: Exception | None) -> None:
  317. if not self.config["bridge.message_status_events"]:
  318. return
  319. intent = self.az.intent if self.encrypted else self.main_intent
  320. status = BeeperMessageStatusEventContent(
  321. network=self.bridge_info_state_key,
  322. relates_to=RelatesTo(
  323. rel_type=RelationType.REFERENCE,
  324. event_id=event_id,
  325. ),
  326. success=err is None,
  327. )
  328. if err:
  329. status.reason = MessageStatusReason.GENERIC_ERROR
  330. status.error = str(err)
  331. status.is_certain = True
  332. status.can_retry = True
  333. if isinstance(err, AttachmentTooLargeError):
  334. status.reason = MessageStatusReason.UNSUPPORTED
  335. status.can_retry = False
  336. elif isinstance(err, UnknownReactionTarget):
  337. status.can_retry = False
  338. await intent.send_message_event(
  339. room_id=self.mxid,
  340. event_type=EventType.BEEPER_MESSAGE_STATUS,
  341. content=status,
  342. )
  343. async def _beeper_link_preview_to_signal(
  344. self, beeper_link_preview: dict[str, Any]
  345. ) -> LinkPreview | None:
  346. link_preview = LinkPreview(
  347. url=beeper_link_preview["matched_url"],
  348. title=beeper_link_preview.get("og:title", ""),
  349. description=beeper_link_preview.get("og:description", ""),
  350. )
  351. if BEEPER_IMAGE_ENCRYPTION_KEY in beeper_link_preview or "og:image" in beeper_link_preview:
  352. if BEEPER_IMAGE_ENCRYPTION_KEY in beeper_link_preview:
  353. file = EncryptedFile.deserialize(beeper_link_preview[BEEPER_IMAGE_ENCRYPTION_KEY])
  354. data = await self.main_intent.download_media(file.url)
  355. data = decrypt_attachment(data, file.key.key, file.hashes.get("sha256"), file.iv)
  356. else:
  357. data = await self.main_intent.download_media(beeper_link_preview["og:image"])
  358. attachment_path = self._write_outgoing_file(data)
  359. link_preview.attachment = Attachment(
  360. content_type=beeper_link_preview.get("og:image:type"),
  361. outgoing_filename=attachment_path,
  362. width=beeper_link_preview.get("og:image:width", 0),
  363. height=beeper_link_preview.get("og:image:height", 0),
  364. size=beeper_link_preview.get("matrix:image:size", 0),
  365. )
  366. return link_preview
  367. async def _handle_matrix_message(
  368. self, sender: u.User, message: MessageEventContent, event_id: EventID
  369. ) -> None:
  370. orig_sender = sender
  371. sender, is_relay = await self.get_relay_sender(sender, f"message {event_id}")
  372. if not sender:
  373. orig_sender.send_remote_checkpoint(
  374. status=MessageSendCheckpointStatus.PERM_FAILURE,
  375. event_id=event_id,
  376. room_id=self.mxid,
  377. event_type=EventType.ROOM_MESSAGE,
  378. message_type=message.msgtype,
  379. error="user is not logged in",
  380. )
  381. return
  382. elif is_relay:
  383. await self.apply_relay_message_format(orig_sender, message)
  384. request_id = int(time.time() * 1000)
  385. self._msgts_dedup.appendleft((sender.address, request_id))
  386. quote = None
  387. if message.get_reply_to():
  388. reply = await DBMessage.get_by_mxid(message.get_reply_to(), self.mxid)
  389. # TODO include actual text? either store in db or fetch event from homeserver
  390. if reply is not None:
  391. quote = Quote(id=reply.timestamp, author=reply.sender, text="")
  392. # TODO only send this when it's actually a reply to an attachment?
  393. # Neither Signal Android nor iOS seem to care though, so this works too
  394. quote.attachments = [QuotedAttachment("", "")]
  395. attachments: list[Attachment] | None = None
  396. attachment_path: str | None = None
  397. mentions: list[Mention] | None = None
  398. link_previews: list[LinkPreview] | None = None
  399. if message.msgtype.is_text:
  400. text, mentions = await matrix_to_signal(message)
  401. message_previews = message.get(BEEPER_LINK_PREVIEWS_KEY, [])
  402. potential_link_previews = await asyncio.gather(
  403. *(self._beeper_link_preview_to_signal(m) for m in message_previews)
  404. )
  405. link_previews = [p for p in potential_link_previews if p is not None]
  406. elif message.msgtype.is_media:
  407. attachment_path = await self._download_matrix_media(message)
  408. attachment = await self._make_attachment(message, attachment_path)
  409. attachments = [attachment]
  410. text = message.body if is_relay else None
  411. self.log.trace("Formed outgoing attachment %s", attachment)
  412. else:
  413. self.log.debug(f"Unknown msgtype {message.msgtype} in Matrix message {event_id}")
  414. return
  415. self.log.debug(f"Sending Matrix message {event_id} to Signal with timestamp {request_id}")
  416. retry_count = await self._signal_send_with_retries(
  417. sender,
  418. event_id,
  419. message_type=message.msgtype,
  420. send_fn=lambda *args, **kwargs: self.signal.send(**kwargs),
  421. event_type=EventType.ROOM_MESSAGE,
  422. username=sender.username,
  423. recipient=self.chat_id,
  424. body=text,
  425. mentions=mentions,
  426. previews=link_previews,
  427. quote=quote,
  428. attachments=attachments,
  429. timestamp=request_id,
  430. )
  431. msg = DBMessage(
  432. mxid=event_id,
  433. mx_room=self.mxid,
  434. sender=sender.address,
  435. timestamp=request_id,
  436. signal_chat_id=self.chat_id,
  437. signal_receiver=self.receiver,
  438. )
  439. await msg.insert()
  440. self.log.debug(f"Handled Matrix message {event_id} -> {request_id}")
  441. if attachment_path and self.config["signal.remove_file_after_handling"]:
  442. try:
  443. os.remove(attachment_path)
  444. except FileNotFoundError:
  445. pass
  446. # Handle disappearing messages
  447. if self.expiration_time and self.disappearing_enabled:
  448. dm = DisappearingMessage(self.mxid, event_id, self.expiration_time)
  449. dm.start_timer()
  450. await dm.insert()
  451. await self._disappear_event(dm)
  452. sender.send_remote_checkpoint(
  453. MessageSendCheckpointStatus.SUCCESS,
  454. event_id,
  455. self.mxid,
  456. EventType.ROOM_MESSAGE,
  457. message.msgtype,
  458. retry_num=retry_count,
  459. )
  460. await self._send_delivery_receipt(event_id)
  461. asyncio.create_task(self._send_message_status(event_id, err=None))
  462. async def _signal_send_with_retries(
  463. self,
  464. sender: u.User,
  465. event_id: EventID,
  466. send_fn: Callable,
  467. event_type: EventType,
  468. message_type: MessageType | None = None,
  469. **send_args,
  470. ) -> int:
  471. retry_count = 4
  472. last_error_type = NotConnected
  473. for retry_num in range(retry_count):
  474. try:
  475. req_id = uuid4()
  476. self.log.info(
  477. f"Send attempt {retry_num}. Attempting to send {event_id} with {req_id}"
  478. )
  479. await send_fn(sender, event_id, req_id=req_id, **send_args)
  480. return retry_num
  481. except (NotConnected, UnknownReactionTarget) as e:
  482. if retry_num >= retry_count - 1:
  483. break
  484. last_error_type = type(e)
  485. # Only handle NotConnected and UnknownReactionTarget exceptions so that other
  486. # exceptions actually continue to error.
  487. sleep_seconds = retry_num * 2 + 1
  488. msg = (
  489. f"Not connected to signald. Going to sleep for {sleep_seconds}s. Error: {e}"
  490. if isinstance(e, NotConnected)
  491. else f"UnknownReactionTarget: Going to sleep for {sleep_seconds}s. Error: {e}"
  492. )
  493. self.log.exception(msg)
  494. sender.send_remote_checkpoint(
  495. MessageSendCheckpointStatus.WILL_RETRY,
  496. event_id,
  497. self.mxid,
  498. event_type,
  499. message_type=message_type,
  500. error=msg,
  501. retry_num=retry_num,
  502. )
  503. await asyncio.sleep(sleep_seconds)
  504. except Exception as e:
  505. await sender.handle_auth_failure(e)
  506. raise
  507. event_type_name = {
  508. EventType.ROOM_MESSAGE: "message",
  509. EventType.REACTION: "reaction",
  510. }.get(event_type, str(event_type))
  511. raise last_error_type(f"Failed to send {event_type_name} after {retry_count} retries.")
  512. async def handle_matrix_reaction(
  513. self, sender: u.User, event_id: EventID, reacting_to: EventID, emoji: str
  514. ) -> None:
  515. if not await sender.is_logged_in():
  516. self.log.trace(f"Ignoring reaction by non-logged-in user {sender.mxid}")
  517. return
  518. # Signal doesn't seem to use variation selectors at all
  519. emoji = variation_selector.remove(emoji)
  520. try:
  521. retry_count = await self._signal_send_with_retries(
  522. sender,
  523. event_id,
  524. send_fn=self._handle_matrix_reaction,
  525. event_type=EventType.REACTION,
  526. reacting_to=reacting_to,
  527. emoji=emoji,
  528. )
  529. except Exception as e:
  530. self.log.exception(f"Failed to handle Matrix reaction {event_id} to {reacting_to}")
  531. sender.send_remote_checkpoint(
  532. MessageSendCheckpointStatus.PERM_FAILURE,
  533. event_id,
  534. self.mxid,
  535. EventType.REACTION,
  536. error=e,
  537. )
  538. await self._send_error_notice("reaction", e)
  539. await sender.handle_auth_failure(e)
  540. asyncio.create_task(self._send_message_status(event_id, e))
  541. else:
  542. sender.send_remote_checkpoint(
  543. MessageSendCheckpointStatus.SUCCESS,
  544. event_id,
  545. self.mxid,
  546. EventType.REACTION,
  547. retry_num=retry_count,
  548. )
  549. await self._send_delivery_receipt(event_id)
  550. asyncio.create_task(self._send_message_status(event_id, err=None))
  551. async def _handle_matrix_reaction(
  552. self,
  553. sender: u.User,
  554. event_id: EventID,
  555. reacting_to: EventID,
  556. emoji: str,
  557. req_id: UUID | None = None,
  558. ) -> None:
  559. message = await DBMessage.get_by_mxid(reacting_to, self.mxid)
  560. if not message:
  561. self.log.debug(f"Ignoring reaction to unknown event {reacting_to}")
  562. raise UnknownReactionTarget(f"Ignoring reaction to unknown event {reacting_to}")
  563. async with self._reaction_lock:
  564. existing = await DBReaction.get_by_signal_id(
  565. self.chat_id, self.receiver, message.sender, message.timestamp, sender.address
  566. )
  567. if existing and existing.emoji == emoji:
  568. return
  569. dedup_id = (message.sender, message.timestamp, emoji, sender.address, False)
  570. self._reaction_dedup.appendleft(dedup_id)
  571. reaction = Reaction(
  572. emoji=emoji,
  573. remove=False,
  574. target_author=message.sender,
  575. target_sent_timestamp=message.timestamp,
  576. )
  577. self.log.trace(f"{sender.mxid} reacted to {message.timestamp} with {emoji}")
  578. await self.signal.react(
  579. sender.username, recipient=self.chat_id, reaction=reaction, req_id=req_id
  580. )
  581. await self._upsert_reaction(
  582. existing, self.main_intent, event_id, sender, message, emoji
  583. )
  584. async def handle_matrix_redaction(
  585. self, sender: u.User, event_id: EventID, redaction_event_id: EventID
  586. ) -> None:
  587. if not await sender.is_logged_in():
  588. return
  589. message = await DBMessage.get_by_mxid(event_id, self.mxid)
  590. if message:
  591. try:
  592. await message.delete()
  593. await self.signal.remote_delete(
  594. sender.username, recipient=self.chat_id, timestamp=message.timestamp
  595. )
  596. except Exception as e:
  597. self.log.exception(
  598. f"Failed to handle Matrix redaction {redaction_event_id} of "
  599. f"message {event_id} ({message.timestamp})"
  600. )
  601. sender.send_remote_checkpoint(
  602. MessageSendCheckpointStatus.PERM_FAILURE,
  603. redaction_event_id,
  604. self.mxid,
  605. EventType.ROOM_REDACTION,
  606. error=e,
  607. )
  608. await sender.handle_auth_failure(e)
  609. asyncio.create_task(self._send_error_notice("message deletion", e))
  610. asyncio.create_task(self._send_message_status(event_id, e))
  611. else:
  612. self.log.trace(f"Removed {message} after Matrix redaction")
  613. sender.send_remote_checkpoint(
  614. MessageSendCheckpointStatus.SUCCESS,
  615. redaction_event_id,
  616. self.mxid,
  617. EventType.ROOM_REDACTION,
  618. )
  619. await self._send_delivery_receipt(redaction_event_id)
  620. asyncio.create_task(self._send_message_status(redaction_event_id, err=None))
  621. return
  622. reaction = await DBReaction.get_by_mxid(event_id, self.mxid)
  623. if reaction:
  624. try:
  625. await reaction.delete()
  626. remove_reaction = Reaction(
  627. emoji=reaction.emoji,
  628. remove=True,
  629. target_author=reaction.msg_author,
  630. target_sent_timestamp=reaction.msg_timestamp,
  631. )
  632. await self.signal.react(
  633. username=sender.username, recipient=self.chat_id, reaction=remove_reaction
  634. )
  635. except Exception as e:
  636. self.log.exception(
  637. f"Failed to handle Matrix redaction {redaction_event_id} of "
  638. f"reaction {event_id} to {reaction.msg_timestamp}"
  639. )
  640. sender.send_remote_checkpoint(
  641. MessageSendCheckpointStatus.PERM_FAILURE,
  642. redaction_event_id,
  643. self.mxid,
  644. EventType.ROOM_REDACTION,
  645. error=e,
  646. )
  647. await sender.handle_auth_failure(e)
  648. asyncio.create_task(self._send_error_notice("reaction deletion", e))
  649. asyncio.create_task(self._send_message_status(event_id, e))
  650. else:
  651. self.log.trace(f"Removed {reaction} after Matrix redaction")
  652. sender.send_remote_checkpoint(
  653. MessageSendCheckpointStatus.SUCCESS,
  654. redaction_event_id,
  655. self.mxid,
  656. EventType.ROOM_REDACTION,
  657. )
  658. await self._send_delivery_receipt(redaction_event_id)
  659. asyncio.create_task(self._send_message_status(redaction_event_id, err=None))
  660. return
  661. sender.send_remote_checkpoint(
  662. MessageSendCheckpointStatus.PERM_FAILURE,
  663. redaction_event_id,
  664. self.mxid,
  665. EventType.ROOM_REDACTION,
  666. error="No message or reaction found for redaction",
  667. )
  668. status_err = UnknownReactionTarget("No message or reaction found for redaction")
  669. asyncio.create_task(self._send_message_status(redaction_event_id, err=status_err))
  670. async def handle_matrix_join(self, user: u.User) -> None:
  671. if self.is_direct or not await user.is_logged_in():
  672. return
  673. if self._pending_members is None:
  674. self.log.debug(
  675. f"{user.mxid} ({user.uuid}) joined room, but pending_members is None,"
  676. " updating chat info"
  677. )
  678. await self.update_info(user, GroupV2ID(id=self.chat_id))
  679. if self._pending_members is None:
  680. self.log.warning(
  681. f"Didn't get pending member list after info update, {user.mxid} ({user.uuid}) may"
  682. "not be in the group on Signal."
  683. )
  684. elif user.uuid in self._pending_members:
  685. self.log.debug(f"{user.mxid} ({user.uuid}) joined room, accepting invite on Signal")
  686. try:
  687. resp = await self.signal.accept_invitation(user.username, self.chat_id)
  688. self._pending_members.remove(user.uuid)
  689. except RPCError as e:
  690. await self.main_intent.send_notice(
  691. self.mxid, f"\u26a0 Failed to accept invite on Signal: {e}"
  692. )
  693. await user.handle_auth_failure(e)
  694. else:
  695. await self.update_info(user, resp)
  696. async def handle_matrix_leave(self, user: u.User) -> None:
  697. if not await user.is_logged_in():
  698. return
  699. if self.is_direct:
  700. self.log.info(f"{user.mxid} left private chat portal with {self.chat_id}")
  701. if user.username == self.receiver:
  702. self.log.info(
  703. f"{user.mxid} was the recipient of this portal. Cleaning up and deleting..."
  704. )
  705. await self.cleanup_and_delete()
  706. else:
  707. self.log.debug(f"{user.mxid} left portal to {self.chat_id}")
  708. if self.config["bridge.bridge_matrix_leave"]:
  709. await self.signal.leave_group(user.username, self.chat_id)
  710. # TODO cleanup if empty
  711. async def handle_matrix_invite(self, invited_by: u.User, user: u.User | p.Puppet) -> None:
  712. if self.is_direct:
  713. raise RejectMatrixInvite("You can't invite additional users to private chats.")
  714. try:
  715. await self.signal.update_group(
  716. invited_by.username, self.chat_id, add_members=[user.address]
  717. )
  718. except RPCError as e:
  719. raise RejectMatrixInvite(e.message) from e
  720. async def handle_matrix_name(self, user: u.User, name: str) -> None:
  721. if self.name == name or self.is_direct or not name:
  722. return
  723. sender, is_relay = await self.get_relay_sender(user, "name change")
  724. if not sender:
  725. return
  726. self.name = name
  727. self.log.debug(
  728. f"{user.mxid} changed the group name, sending to Signal through {sender.username}"
  729. )
  730. try:
  731. await self.signal.update_group(sender.username, self.chat_id, title=name)
  732. except Exception as e:
  733. self.log.exception("Failed to update Signal group name")
  734. await user.handle_auth_failure(e)
  735. self.name = None
  736. async def handle_matrix_topic(self, user: u.User, topic: str) -> None:
  737. if self.topic == topic or self.is_direct or not topic:
  738. return
  739. sender, is_relay = await self.get_relay_sender(user, "topic change")
  740. if not sender:
  741. return
  742. self.topic = topic
  743. self.log.debug(
  744. f"{user.mxid} changed the group topic, sending to Signal through {sender.username}"
  745. )
  746. try:
  747. await self.signal.update_group(sender.username, self.chat_id, description=topic)
  748. except Exception:
  749. self.log.exception("Failed to update Signal group description")
  750. self.name = None
  751. async def handle_matrix_avatar(self, user: u.User, url: ContentURI) -> None:
  752. if self.is_direct or not url:
  753. return
  754. sender, is_relay = await self.get_relay_sender(user, "avatar change")
  755. if not sender:
  756. return
  757. data = await self.main_intent.download_media(url)
  758. new_hash = hashlib.sha256(data).hexdigest()
  759. if new_hash == self.avatar_hash and self.avatar_set:
  760. self.log.debug(f"New avatar from Matrix set by {user.mxid} is same as current one")
  761. return
  762. self.avatar_url = url
  763. self.avatar_hash = new_hash
  764. path = self._write_outgoing_file(data)
  765. self.log.debug(
  766. f"{user.mxid} changed the group avatar, sending to Signal through {sender.username}"
  767. )
  768. try:
  769. await self.signal.update_group(sender.username, self.chat_id, avatar_path=path)
  770. self.avatar_set = True
  771. except Exception as e:
  772. self.log.exception("Failed to update Signal group avatar")
  773. await user.handle_auth_failure(e)
  774. self.avatar_set = False
  775. if self.config["signal.remove_file_after_handling"]:
  776. try:
  777. os.remove(path)
  778. except FileNotFoundError:
  779. pass
  780. # endregion
  781. # region Signal event handling
  782. @staticmethod
  783. async def _resolve_address(address: Address) -> Address:
  784. puppet = await p.Puppet.get_by_address(address, create=False)
  785. return puppet.address
  786. async def _find_quote_event_id(self, quote: Quote | None) -> MessageEvent | EventID | None:
  787. if not quote:
  788. return None
  789. author_address = await self._resolve_address(quote.author)
  790. reply_msg = await DBMessage.get_by_signal_id(
  791. author_address, quote.id, self.chat_id, self.receiver
  792. )
  793. if not reply_msg:
  794. return None
  795. try:
  796. evt = await self.main_intent.get_event(self.mxid, reply_msg.mxid)
  797. if isinstance(evt, EncryptedEvent):
  798. return await self.matrix.e2ee.decrypt(evt, wait_session_timeout=0)
  799. return evt
  800. except MatrixError:
  801. return reply_msg.mxid
  802. async def _signal_link_preview_to_beeper(
  803. self, link_preview: LinkPreview, intent: IntentAPI
  804. ) -> dict[str, Any]:
  805. beeper_link_preview: dict[str, Any] = {
  806. "matched_url": link_preview.url,
  807. "og:title": link_preview.title,
  808. "og:url": link_preview.url,
  809. "og:description": link_preview.description,
  810. }
  811. # Upload an image corresponding to the link preview if it exists.
  812. if link_preview.attachment and link_preview.attachment.incoming_filename:
  813. beeper_link_preview["og:image:type"] = link_preview.attachment.content_type
  814. beeper_link_preview["og:image:height"] = link_preview.attachment.height
  815. beeper_link_preview["og:image:width"] = link_preview.attachment.width
  816. beeper_link_preview["matrix:image:size"] = link_preview.attachment.size
  817. with open(link_preview.attachment.incoming_filename, "rb") as file:
  818. data = file.read()
  819. if self.config["signal.remove_file_after_handling"]:
  820. os.remove(link_preview.attachment.incoming_filename)
  821. upload_mime_type = link_preview.attachment.content_type
  822. if self.encrypted and encrypt_attachment:
  823. data, beeper_link_preview[BEEPER_IMAGE_ENCRYPTION_KEY] = encrypt_attachment(data)
  824. upload_mime_type = "application/octet-stream"
  825. upload_uri = await intent.upload_media(
  826. data,
  827. mime_type=upload_mime_type,
  828. filename=link_preview.attachment.id,
  829. async_upload=self.config["homeserver.async_media"],
  830. )
  831. if BEEPER_IMAGE_ENCRYPTION_KEY in beeper_link_preview:
  832. beeper_link_preview[BEEPER_IMAGE_ENCRYPTION_KEY].url = upload_uri
  833. beeper_link_preview[BEEPER_IMAGE_ENCRYPTION_KEY] = beeper_link_preview[
  834. BEEPER_IMAGE_ENCRYPTION_KEY
  835. ].serialize()
  836. else:
  837. beeper_link_preview["og:image"] = upload_uri
  838. return beeper_link_preview
  839. async def handle_signal_message(
  840. self, source: u.User, sender: p.Puppet, message: MessageData
  841. ) -> None:
  842. if (sender.address, message.timestamp) in self._msgts_dedup:
  843. self.log.debug(
  844. f"Ignoring message {message.timestamp} by {sender.uuid} as it was already handled "
  845. "(message.timestamp in dedup queue)"
  846. )
  847. await self.signal.send_receipt(
  848. source.username, sender.address, timestamps=[message.timestamp]
  849. )
  850. return
  851. self._msgts_dedup.appendleft((sender.address, message.timestamp))
  852. old_message = await DBMessage.get_by_signal_id(
  853. sender.address, message.timestamp, self.chat_id, self.receiver
  854. )
  855. if old_message is not None:
  856. self.log.debug(
  857. f"Ignoring message {message.timestamp} by {sender.uuid} as it was already handled "
  858. "(message.id found in database)"
  859. )
  860. await self.signal.send_receipt(
  861. source.username, sender.address, timestamps=[message.timestamp]
  862. )
  863. return
  864. self.log.debug(f"Started handling message {message.timestamp} by {sender.uuid}")
  865. self.log.trace(f"Message content: {message}")
  866. intent = sender.intent_for(self)
  867. await intent.set_typing(self.mxid, False)
  868. event_id = None
  869. reply_to = await self._find_quote_event_id(message.quote)
  870. if message.sticker:
  871. if message.sticker.attachment.incoming_filename:
  872. content = await self._handle_signal_attachment(
  873. intent, message.sticker.attachment, sticker=True
  874. )
  875. elif StickersClient:
  876. content = await self._handle_signal_sticker(intent, message.sticker)
  877. else:
  878. self.log.debug(
  879. f"Not handling sticker in {message.timestamp}: no incoming_filename and "
  880. "signalstickers-client not installed."
  881. )
  882. return
  883. if content:
  884. if message.sticker.attachment.blurhash:
  885. content.info["blurhash"] = message.sticker.attachment.blurhash
  886. content.info["xyz.amorgan.blurhash"] = message.sticker.attachment.blurhash
  887. await self._add_sticker_meta(message.sticker, content)
  888. if reply_to and not message.body:
  889. content.set_reply(reply_to)
  890. reply_to = None
  891. content.msgtype = None
  892. event_id = await self._send_message(
  893. intent, content, timestamp=message.timestamp, event_type=EventType.STICKER
  894. )
  895. for contact in message.contacts:
  896. content = await self._handle_signal_contact(contact)
  897. if reply_to and not message.body:
  898. content.set_reply(reply_to)
  899. reply_to = None
  900. event_id = await self._send_message(intent, content, timestamp=message.timestamp)
  901. is_first_text = True
  902. for attachment in message.attachments:
  903. if not attachment.incoming_filename:
  904. self.log.warning(
  905. "Failed to bridge attachment, no incoming filename: %s", attachment
  906. )
  907. continue
  908. as_text = (
  909. is_first_text
  910. and attachment.content_type == "text/x-signal-plain"
  911. and attachment.size < MAX_MATRIX_MESSAGE_SIZE
  912. )
  913. file_size = attachment.size or os.path.getsize(attachment.incoming_filename)
  914. if file_size > self.matrix.media_config.upload_size:
  915. self.log.warning(
  916. "Failed to bridge attachment %s in %s: file too large",
  917. attachment.id,
  918. message.timestamp,
  919. )
  920. continue
  921. content = await self._handle_signal_attachment(intent, attachment, text=as_text)
  922. if as_text:
  923. is_first_text = False
  924. message.body = ""
  925. if reply_to and not message.body:
  926. # If there's no text, set the first image as the reply
  927. content.set_reply(reply_to)
  928. reply_to = None
  929. event_id = await self._send_message(intent, content, timestamp=message.timestamp)
  930. if message.body:
  931. content = await signal_to_matrix(message)
  932. if message.previews:
  933. content[BEEPER_LINK_PREVIEWS_KEY] = await asyncio.gather(
  934. *(self._signal_link_preview_to_beeper(p, intent) for p in message.previews)
  935. )
  936. if reply_to:
  937. content.set_reply(reply_to)
  938. event_id = await self._send_message(intent, content, timestamp=message.timestamp)
  939. if event_id:
  940. msg = DBMessage(
  941. mxid=event_id,
  942. mx_room=self.mxid,
  943. sender=sender.address,
  944. timestamp=message.timestamp,
  945. signal_chat_id=self.chat_id,
  946. signal_receiver=self.receiver,
  947. )
  948. await msg.insert()
  949. await self.signal.send_receipt(
  950. source.username, sender.address, timestamps=[message.timestamp]
  951. )
  952. await self._send_delivery_receipt(event_id)
  953. self.log.debug(f"Handled Signal message {message.timestamp} -> {event_id}")
  954. if message.expires_in_seconds and self.disappearing_enabled:
  955. await DisappearingMessage(self.mxid, event_id, message.expires_in_seconds).insert()
  956. self.log.debug(
  957. f"{event_id} set to be redacted {message.expires_in_seconds} seconds after "
  958. "room is read"
  959. )
  960. else:
  961. self.log.debug(f"Didn't get event ID for {message.timestamp}")
  962. async def handle_signal_kicked(self, user: u.User, sender: p.Puppet) -> None:
  963. self.log.debug(f"{user.mxid} was kicked by {sender.number} from {self.mxid}")
  964. await self.main_intent.kick_user(self.mxid, user.mxid, f"{sender.name} kicked you")
  965. @staticmethod
  966. async def _make_media_content(
  967. attachment: Attachment, data: bytes
  968. ) -> tuple[MediaMessageEventContent, bytes]:
  969. if attachment.content_type.startswith("image/"):
  970. msgtype = MessageType.IMAGE
  971. info = ImageInfo(
  972. mimetype=attachment.content_type, width=attachment.width, height=attachment.height
  973. )
  974. elif attachment.content_type.startswith("video/"):
  975. msgtype = MessageType.VIDEO
  976. info = VideoInfo(
  977. mimetype=attachment.content_type, width=attachment.width, height=attachment.height
  978. )
  979. elif attachment.voice_note or attachment.content_type.startswith("audio/"):
  980. msgtype = MessageType.AUDIO
  981. info = AudioInfo(
  982. mimetype=attachment.content_type if not attachment.voice_note else "audio/ogg"
  983. )
  984. else:
  985. msgtype = MessageType.FILE
  986. info = FileInfo(mimetype=attachment.content_type)
  987. info.size = attachment.size or len(data)
  988. if not attachment.custom_filename:
  989. ext = mimetypes.guess_extension(info.mimetype) or ""
  990. attachment.custom_filename = attachment.id + ext
  991. else:
  992. for ext in mimetypes.guess_all_extensions(info.mimetype):
  993. if attachment.custom_filename.endswith(ext):
  994. break
  995. else:
  996. attachment.custom_filename += mimetypes.guess_extension(info.mimetype) or ""
  997. if attachment.blurhash:
  998. info["blurhash"] = attachment.blurhash
  999. info["xyz.amorgan.blurhash"] = attachment.blurhash
  1000. content = MediaMessageEventContent(
  1001. msgtype=msgtype, info=info, body=attachment.custom_filename
  1002. )
  1003. # If this is a voice note, add the additional voice message metadata and convert to OGG.
  1004. if attachment.voice_note:
  1005. content["org.matrix.msc1767.file"] = {
  1006. "url": content.url,
  1007. "name": content.body,
  1008. **(content.file.serialize() if content.file else {}),
  1009. **(content.info.serialize() if content.info else {}),
  1010. }
  1011. content["org.matrix.msc3245.voice"] = {}
  1012. data = await ffmpeg.convert_bytes(
  1013. data, ".ogg", output_args=("-c:a", "libopus"), input_mime=attachment.content_type
  1014. )
  1015. info.size = len(data)
  1016. return content, data
  1017. async def _handle_signal_attachment(
  1018. self, intent: IntentAPI, attachment: Attachment, sticker: bool = False, text: bool = False
  1019. ) -> MediaMessageEventContent | TextMessageEventContent:
  1020. self.log.trace(f"Reuploading attachment {attachment}")
  1021. if not attachment.content_type:
  1022. attachment.content_type = (
  1023. magic.mimetype(attachment.incoming_filename)
  1024. if magic is not None
  1025. else "application/octet-stream"
  1026. )
  1027. with open(attachment.incoming_filename, "rb") as file:
  1028. data = file.read()
  1029. if self.config["signal.remove_file_after_handling"]:
  1030. os.remove(attachment.incoming_filename)
  1031. if text:
  1032. assert attachment.content_type == "text/x-signal-plain"
  1033. assert attachment.size < MAX_MATRIX_MESSAGE_SIZE
  1034. content = TextMessageEventContent(msgtype=MessageType.TEXT, body=data.decode("utf-8"))
  1035. return content
  1036. content, data = await self._make_media_content(attachment, data)
  1037. if sticker:
  1038. self._adjust_sticker_size(content.info)
  1039. await self._upload_attachment(intent, content, data, attachment.id)
  1040. return content
  1041. @staticmethod
  1042. async def _handle_signal_contact(contact: SharedContact) -> TextMessageEventContent:
  1043. msg = f"Shared contact: {contact.name!s}"
  1044. if contact.phone:
  1045. msg += "\n"
  1046. for phone in contact.phone:
  1047. msg += f"\nPhone: {phone.value} ({phone.type_or_label})"
  1048. if contact.email:
  1049. msg += "\n"
  1050. for email in contact.email:
  1051. msg += f"\nEmail: {email.value} ({email.type_or_label})"
  1052. content = TextMessageEventContent(msgtype=MessageType.TEXT, body=msg)
  1053. content["fi.mau.signal.contact"] = contact.serialize()
  1054. return content
  1055. async def _add_sticker_meta(self, sticker: Sticker, content: MediaMessageEventContent) -> None:
  1056. try:
  1057. pack = self._sticker_meta_cache[sticker.pack_id]
  1058. except KeyError:
  1059. self.log.debug(f"Fetching sticker pack metadata for {sticker.pack_id}")
  1060. try:
  1061. async with StickersClient() as client:
  1062. pack = await client.get_pack_metadata(sticker.pack_id, sticker.pack_key)
  1063. self._sticker_meta_cache[sticker.pack_id] = pack
  1064. except Exception:
  1065. self.log.warning(
  1066. f"Failed to fetch pack metadata for {sticker.pack_id}", exc_info=True
  1067. )
  1068. pack = None
  1069. if not pack:
  1070. content.info["fi.mau.signal.sticker"] = {
  1071. "id": sticker.sticker_id,
  1072. "pack": {
  1073. "id": sticker.pack_id,
  1074. "key": sticker.pack_key,
  1075. },
  1076. }
  1077. return
  1078. sticker_meta = pack.stickers[sticker.sticker_id]
  1079. content.body = sticker_meta.emoji
  1080. content.info["fi.mau.signal.sticker"] = {
  1081. "id": sticker.sticker_id,
  1082. "emoji": sticker_meta.emoji,
  1083. "pack": {
  1084. "id": pack.id,
  1085. "key": pack.key,
  1086. "title": pack.title,
  1087. "author": pack.author,
  1088. },
  1089. }
  1090. @staticmethod
  1091. def _adjust_sticker_size(info: ImageInfo) -> None:
  1092. if info.width > 256 or info.height > 256:
  1093. if info.width == info.height:
  1094. info.width = info.height = 256
  1095. elif info.width > info.height:
  1096. info.height = int(info.height / (info.width / 256))
  1097. info.width = 256
  1098. else:
  1099. info.width = int(info.width / (info.height / 256))
  1100. info.height = 256
  1101. async def _handle_signal_sticker(
  1102. self, intent: IntentAPI, sticker: Sticker
  1103. ) -> MediaMessageEventContent | None:
  1104. try:
  1105. self.log.debug(f"Fetching sticker {sticker.pack_id}#{sticker.sticker_id}")
  1106. async with StickersClient() as client:
  1107. data = await client.download_sticker(
  1108. sticker.sticker_id, sticker.pack_id, sticker.pack_key
  1109. )
  1110. except Exception:
  1111. self.log.warning(f"Failed to download sticker {sticker.sticker_id}", exc_info=True)
  1112. return None
  1113. info = ImageInfo(
  1114. mimetype=sticker.attachment.content_type,
  1115. size=len(data),
  1116. width=sticker.attachment.width,
  1117. height=sticker.attachment.height,
  1118. )
  1119. self._adjust_sticker_size(info)
  1120. if magic:
  1121. info.mimetype = magic.mimetype(data)
  1122. ext = mimetypes.guess_extension(info.mimetype)
  1123. if not ext and info.mimetype == "image/webp":
  1124. ext = ".webp"
  1125. content = MediaMessageEventContent(
  1126. msgtype=MessageType.IMAGE, info=info, body=f"sticker{ext}"
  1127. )
  1128. await self._upload_attachment(intent, content, data, sticker.attachment.id)
  1129. return content
  1130. async def _upload_attachment(
  1131. self, intent: IntentAPI, content: MediaMessageEventContent, data: bytes, id: str
  1132. ) -> None:
  1133. upload_mime_type = content.info.mimetype
  1134. if self.encrypted and encrypt_attachment:
  1135. data, content.file = encrypt_attachment(data)
  1136. upload_mime_type = "application/octet-stream"
  1137. content.url = await intent.upload_media(
  1138. data,
  1139. mime_type=upload_mime_type,
  1140. filename=id,
  1141. async_upload=self.config["homeserver.async_media"],
  1142. )
  1143. if content.file:
  1144. content.file.url = content.url
  1145. content.url = None
  1146. # This is a hack for bad clients like Element iOS that require a thumbnail
  1147. if content.info.mimetype.startswith("image/"):
  1148. if content.file:
  1149. content.info.thumbnail_file = content.file
  1150. elif content.url:
  1151. content.info.thumbnail_url = content.url
  1152. async def handle_signal_reaction(
  1153. self, sender: p.Puppet, reaction: Reaction, timestamp: int
  1154. ) -> None:
  1155. author_address = await self._resolve_address(reaction.target_author)
  1156. target_id = reaction.target_sent_timestamp
  1157. async with self._reaction_lock:
  1158. dedup_id = (author_address, target_id, reaction.emoji, sender.address, reaction.remove)
  1159. if dedup_id in self._reaction_dedup:
  1160. return
  1161. self._reaction_dedup.appendleft(dedup_id)
  1162. existing = await DBReaction.get_by_signal_id(
  1163. self.chat_id, self.receiver, author_address, target_id, sender.address
  1164. )
  1165. if reaction.remove:
  1166. if existing:
  1167. try:
  1168. await sender.intent_for(self).redact(existing.mx_room, existing.mxid)
  1169. except IntentError:
  1170. await self.main_intent.redact(existing.mx_room, existing.mxid)
  1171. await existing.delete()
  1172. self.log.trace(f"Removed {existing} after Signal removal")
  1173. return
  1174. elif existing and existing.emoji == reaction.emoji:
  1175. return
  1176. message = await DBMessage.get_by_signal_id(
  1177. author_address, target_id, self.chat_id, self.receiver
  1178. )
  1179. if not message:
  1180. self.log.debug(f"Ignoring reaction to unknown message {target_id}")
  1181. return
  1182. intent = sender.intent_for(self)
  1183. matrix_emoji = variation_selector.add(reaction.emoji)
  1184. mxid = await intent.react(message.mx_room, message.mxid, matrix_emoji, timestamp=timestamp)
  1185. self.log.debug(f"{sender.address} reacted to {message.mxid} -> {mxid}")
  1186. await self._upsert_reaction(existing, intent, mxid, sender, message, reaction.emoji)
  1187. async def handle_signal_delete(self, sender: p.Puppet, message_ts: int) -> None:
  1188. message = await DBMessage.get_by_signal_id(
  1189. sender.address, message_ts, self.chat_id, self.receiver
  1190. )
  1191. if not message:
  1192. return
  1193. await message.delete()
  1194. try:
  1195. await sender.intent_for(self).redact(message.mx_room, message.mxid)
  1196. except MForbidden:
  1197. await self.main_intent.redact(message.mx_room, message.mxid)
  1198. # endregion
  1199. # region Matrix -> Signal metadata
  1200. async def create_signal_group(
  1201. self, source: u.User, levels: PowerLevelStateEventContent
  1202. ) -> None:
  1203. user_mxids = await self.az.intent.get_room_members(
  1204. self.mxid, (Membership.JOIN, Membership.INVITE)
  1205. )
  1206. invitee_addresses = []
  1207. for mxid in user_mxids:
  1208. mx_user = await u.User.get_by_mxid(mxid, create=False)
  1209. if mx_user and mx_user.address and mx_user.username != source.username:
  1210. invitee_addresses.append(mx_user.address)
  1211. puppet = await p.Puppet.get_by_mxid(mxid, create=False)
  1212. if puppet:
  1213. invitee_addresses.append(puppet.address)
  1214. avatar_path: str | None = None
  1215. if self.avatar_url:
  1216. avatar_data = await self.az.intent.download_media(self.avatar_url)
  1217. self.avatar_hash = hashlib.sha256(avatar_data).hexdigest()
  1218. avatar_path = self._write_outgoing_file(avatar_data)
  1219. signal_chat = await self.signal.create_group(
  1220. source.username, title=self.name, members=invitee_addresses, avatar_path=avatar_path
  1221. )
  1222. self.name_set = bool(self.name and signal_chat.title)
  1223. self.avatar_set = bool(self.avatar_url and self.avatar_hash and signal_chat.avatar)
  1224. self.chat_id = signal_chat.id
  1225. await self._postinit()
  1226. await self.insert()
  1227. if avatar_path and self.config["signal.remove_file_after_handling"]:
  1228. try:
  1229. os.remove(avatar_path)
  1230. except FileNotFoundError:
  1231. pass
  1232. if self.topic:
  1233. await self.signal.update_group(source.username, self.chat_id, description=self.topic)
  1234. await self.signal.update_group(
  1235. username=source.username,
  1236. group_id=self.chat_id,
  1237. update_access_control=GroupAccessControl(
  1238. members=(
  1239. AccessControlMode.MEMBER
  1240. if levels.invite == 0
  1241. else AccessControlMode.ADMINISTRATOR
  1242. ),
  1243. attributes=None,
  1244. link=None,
  1245. ),
  1246. )
  1247. update_meta = await self.signal.update_group(
  1248. username=source.username,
  1249. group_id=self.chat_id,
  1250. update_access_control=GroupAccessControl(
  1251. attributes=(
  1252. AccessControlMode.MEMBER
  1253. if levels.state_default == 0
  1254. else AccessControlMode.ADMINISTRATOR
  1255. ),
  1256. members=None,
  1257. link=None,
  1258. ),
  1259. )
  1260. self.revision = update_meta.revision
  1261. await self.update()
  1262. await self.update_bridge_info()
  1263. # endregion
  1264. # region Updating portal info
  1265. async def update_info(
  1266. self, source: u.User, info: ChatInfo, sender: p.Puppet | None = None
  1267. ) -> None:
  1268. if self.is_direct:
  1269. if not isinstance(info, (Contact, Profile, Address)):
  1270. raise ValueError(f"Unexpected type for direct chat update_info: {type(info)}")
  1271. if not self.name:
  1272. puppet = await self.get_dm_puppet()
  1273. if not puppet.name:
  1274. await puppet.update_info(info)
  1275. self.name = puppet.name
  1276. return
  1277. if isinstance(info, GroupV2ID):
  1278. try:
  1279. info = await self.signal.get_group(source.username, info.id, info.revision or -1)
  1280. except Exception as e:
  1281. await source.handle_auth_failure(e)
  1282. raise
  1283. if not info:
  1284. self.log.debug(
  1285. f"Failed to get full group v2 info through {source.username}, "
  1286. "cancelling update"
  1287. )
  1288. return
  1289. changed = False
  1290. if isinstance(info, Group):
  1291. changed = await self._update_name(info.name, sender) or changed
  1292. elif isinstance(info, GroupV2):
  1293. if self.revision < info.revision:
  1294. self.revision = info.revision
  1295. changed = True
  1296. elif self.revision > info.revision:
  1297. self.log.warning(
  1298. f"Got outdated info when syncing through {source.username} "
  1299. f"({info.revision} < {self.revision}), ignoring..."
  1300. )
  1301. return
  1302. changed = await self._update_name(info.title, sender) or changed
  1303. changed = await self._update_topic(info.description, sender) or changed
  1304. elif isinstance(info, GroupV2ID):
  1305. return
  1306. else:
  1307. raise ValueError(f"Unexpected type for group update_info: {type(info)}")
  1308. changed = await self._update_avatar(info, sender) or changed
  1309. await self._update_participants(source, info)
  1310. try:
  1311. await self._update_power_levels(info)
  1312. except Exception:
  1313. self.log.warning("Error updating power levels", exc_info=True)
  1314. if changed:
  1315. await self.update_bridge_info()
  1316. await self.update()
  1317. async def update_expires_in_seconds(self, sender: p.Puppet, expires_in_seconds: int) -> None:
  1318. if expires_in_seconds == 0:
  1319. expires_in_seconds = None
  1320. if self.expiration_time == expires_in_seconds:
  1321. return
  1322. assert self.mxid
  1323. self.expiration_time = expires_in_seconds
  1324. await self.update()
  1325. time_str = "Off" if expires_in_seconds is None else format_duration(expires_in_seconds)
  1326. body = f"Set the disappearing message timer to {time_str}"
  1327. content = TextMessageEventContent(msgtype=MessageType.NOTICE, body=body)
  1328. await self._send_message(sender.intent_for(self), content)
  1329. async def get_dm_puppet(self) -> p.Puppet | None:
  1330. if not self.is_direct:
  1331. return None
  1332. return await p.Puppet.get_by_address(self.chat_id)
  1333. async def update_info_from_puppet(self, puppet: p.Puppet | None = None) -> None:
  1334. if not self.is_direct:
  1335. return
  1336. if not puppet:
  1337. puppet = await self.get_dm_puppet()
  1338. await self.update_puppet_name(puppet.name, save=False)
  1339. await self.update_puppet_avatar(puppet.avatar_hash, puppet.avatar_url, save=False)
  1340. async def update_puppet_avatar(
  1341. self, new_hash: str, avatar_url: ContentURI, save: bool = True
  1342. ) -> None:
  1343. if not self.encrypted and not self.private_chat_portal_meta:
  1344. return
  1345. if self.avatar_hash != new_hash or not self.avatar_set:
  1346. self.avatar_hash = new_hash
  1347. self.avatar_url = avatar_url
  1348. if self.mxid:
  1349. try:
  1350. await self.main_intent.set_room_avatar(self.mxid, avatar_url)
  1351. self.avatar_set = True
  1352. except Exception:
  1353. self.log.exception("Error setting avatar")
  1354. self.avatar_set = False
  1355. if save:
  1356. await self.update_bridge_info()
  1357. await self.update()
  1358. async def update_puppet_name(self, name: str, save: bool = True) -> None:
  1359. if not self.encrypted and not self.private_chat_portal_meta:
  1360. return
  1361. changed = await self._update_name(name)
  1362. if changed and save:
  1363. await self.update_bridge_info()
  1364. await self.update()
  1365. async def _update_name(self, name: str, sender: p.Puppet | None = None) -> bool:
  1366. if self.name != name or not self.name_set:
  1367. self.name = name
  1368. if self.mxid:
  1369. try:
  1370. await self._try_with_puppet(
  1371. lambda i: i.set_room_name(self.mxid, self.name), puppet=sender
  1372. )
  1373. self.name_set = True
  1374. except Exception:
  1375. self.log.exception("Error setting name")
  1376. self.name_set = False
  1377. return True
  1378. return False
  1379. async def _update_topic(self, topic: str, sender: p.Puppet | None = None) -> bool:
  1380. if self.topic != topic:
  1381. self.topic = topic
  1382. if self.mxid:
  1383. try:
  1384. await self._try_with_puppet(
  1385. lambda i: i.set_room_topic(self.mxid, self.topic), puppet=sender
  1386. )
  1387. except Exception:
  1388. self.log.exception("Error setting topic")
  1389. self.topic = None
  1390. return True
  1391. return False
  1392. async def _try_with_puppet(
  1393. self, action: Callable[[IntentAPI], Awaitable[Any]], puppet: p.Puppet | None = None
  1394. ) -> None:
  1395. if puppet:
  1396. try:
  1397. await action(puppet.intent_for(self))
  1398. except (MForbidden, IntentError):
  1399. await action(self.main_intent)
  1400. else:
  1401. await action(self.main_intent)
  1402. async def _update_avatar(self, info: ChatInfo, sender: p.Puppet | None = None) -> bool:
  1403. path = None
  1404. if isinstance(info, GroupV2):
  1405. path = info.avatar
  1406. elif isinstance(info, Group):
  1407. path = f"group-{self.chat_id}"
  1408. res = await p.Puppet.upload_avatar(self, path, self.main_intent)
  1409. if res is False:
  1410. return False
  1411. self.avatar_hash, self.avatar_url = res
  1412. if not self.mxid:
  1413. return True
  1414. try:
  1415. await self._try_with_puppet(
  1416. lambda i: i.set_room_avatar(self.mxid, self.avatar_url), puppet=sender
  1417. )
  1418. self.avatar_set = True
  1419. except Exception:
  1420. self.log.exception("Error setting avatar")
  1421. self.avatar_set = False
  1422. return True
  1423. async def _update_participants(self, source: u.User, info: ChatInfo) -> None:
  1424. if not self.mxid or not isinstance(info, (Group, GroupV2)):
  1425. return
  1426. member_events = await self.main_intent.get_members(self.mxid)
  1427. remove_users: set[UserID] = {
  1428. UserID(evt.state_key)
  1429. for evt in member_events
  1430. if evt.content.membership == Membership.JOIN and evt.state_key != self.az.bot_mxid
  1431. }
  1432. pending_members = info.pending_members if isinstance(info, GroupV2) else []
  1433. self._pending_members = {addr.uuid for addr in pending_members}
  1434. for address in info.members:
  1435. user = await u.User.get_by_address(address)
  1436. if user:
  1437. remove_users.discard(user.mxid)
  1438. await self.main_intent.invite_user(self.mxid, user.mxid, check_cache=True)
  1439. puppet = await p.Puppet.get_by_address(address)
  1440. await source.sync_contact(address)
  1441. await puppet.intent_for(self).ensure_joined(self.mxid)
  1442. remove_users.discard(puppet.default_mxid)
  1443. for address in pending_members:
  1444. user = await u.User.get_by_address(address)
  1445. if user:
  1446. remove_users.discard(user.mxid)
  1447. await self.main_intent.invite_user(self.mxid, user.mxid, check_cache=True)
  1448. puppet = await p.Puppet.get_by_address(address)
  1449. await source.sync_contact(address)
  1450. await self.main_intent.invite_user(
  1451. self.mxid, puppet.intent_for(self).mxid, check_cache=True
  1452. )
  1453. remove_users.discard(puppet.default_mxid)
  1454. for mxid in remove_users:
  1455. puppet = await p.Puppet.get_by_mxid(mxid, create=False)
  1456. if puppet:
  1457. await puppet.default_mxid_intent.leave_room(self.mxid)
  1458. else:
  1459. user = await u.User.get_by_mxid(mxid, create=False)
  1460. if user and await user.is_logged_in():
  1461. await self.main_intent.kick_user(
  1462. self.mxid, user.mxid, "You are not a member of this Signal group"
  1463. )
  1464. async def _update_power_levels(self, info: ChatInfo) -> None:
  1465. if not self.mxid:
  1466. return
  1467. power_levels = await self.main_intent.get_power_levels(self.mxid)
  1468. power_levels = await self._get_power_levels(power_levels, info=info, is_initial=False)
  1469. await self.main_intent.set_power_levels(self.mxid, power_levels)
  1470. # endregion
  1471. # region Bridge info state event
  1472. @property
  1473. def bridge_info_state_key(self) -> str:
  1474. return f"net.maunium.signal://signal/{self.chat_id_str}"
  1475. @property
  1476. def bridge_info(self) -> dict[str, Any]:
  1477. return {
  1478. "bridgebot": self.az.bot_mxid,
  1479. "creator": self.main_intent.mxid,
  1480. "protocol": {
  1481. "id": "signal",
  1482. "displayname": "Signal",
  1483. "avatar_url": self.config["appservice.bot_avatar"],
  1484. },
  1485. "channel": {
  1486. "id": self.chat_id_str,
  1487. "displayname": self.name,
  1488. "avatar_url": self.avatar_url,
  1489. },
  1490. }
  1491. async def update_bridge_info(self) -> None:
  1492. if not self.mxid:
  1493. self.log.debug("Not updating bridge info: no Matrix room created")
  1494. return
  1495. try:
  1496. self.log.debug("Updating bridge info...")
  1497. await self.main_intent.send_state_event(
  1498. self.mxid, StateBridge, self.bridge_info, self.bridge_info_state_key
  1499. )
  1500. # TODO remove this once https://github.com/matrix-org/matrix-doc/pull/2346 is in spec
  1501. await self.main_intent.send_state_event(
  1502. self.mxid, StateHalfShotBridge, self.bridge_info, self.bridge_info_state_key
  1503. )
  1504. except Exception:
  1505. self.log.warning("Failed to update bridge info", exc_info=True)
  1506. # endregion
  1507. # region Creating Matrix rooms
  1508. async def update_matrix_room(self, source: u.User, info: ChatInfo) -> None:
  1509. if not self.is_direct and not isinstance(info, (Group, GroupV2, GroupV2ID)):
  1510. raise ValueError(f"Unexpected type for updating group portal: {type(info)}")
  1511. elif self.is_direct and not isinstance(info, (Contact, Profile, Address)):
  1512. raise ValueError(f"Unexpected type for updating direct chat portal: {type(info)}")
  1513. try:
  1514. await self._update_matrix_room(source, info)
  1515. except Exception:
  1516. self.log.exception("Failed to update portal")
  1517. async def create_matrix_room(self, source: u.User, info: ChatInfo) -> RoomID | None:
  1518. if not self.is_direct and not isinstance(info, (Group, GroupV2, GroupV2ID)):
  1519. raise ValueError(f"Unexpected type for creating group portal: {type(info)}")
  1520. elif self.is_direct and not isinstance(info, (Contact, Profile, Address)):
  1521. raise ValueError(f"Unexpected type for creating direct chat portal: {type(info)}")
  1522. if isinstance(info, Group) and not info.members:
  1523. try:
  1524. groups = await self.signal.list_groups(source.username)
  1525. except Exception as e:
  1526. await source.handle_auth_failure(e)
  1527. raise
  1528. info = next(
  1529. (g for g in groups if isinstance(g, Group) and g.group_id == info.group_id), info
  1530. )
  1531. elif isinstance(info, GroupV2ID) and not isinstance(info, GroupV2):
  1532. self.log.debug(
  1533. f"create_matrix_room() called with {info}, fetching full info from signald"
  1534. )
  1535. try:
  1536. info = await self.signal.get_group(source.username, info.id, info.revision or -1)
  1537. except Exception as e:
  1538. await source.handle_auth_failure(e)
  1539. raise
  1540. if not info:
  1541. self.log.warning(f"Full info not found, canceling room creation")
  1542. return None
  1543. else:
  1544. self.log.trace("get_group() returned full info: %s", info)
  1545. if self.mxid:
  1546. await self.update_matrix_room(source, info)
  1547. return self.mxid
  1548. async with self._create_room_lock:
  1549. return await self._create_matrix_room(source, info)
  1550. def _get_invite_content(self, double_puppet: p.Puppet | None) -> dict[str, Any]:
  1551. invite_content = {}
  1552. if double_puppet:
  1553. invite_content["fi.mau.will_auto_accept"] = True
  1554. if self.is_direct:
  1555. invite_content["is_direct"] = True
  1556. return invite_content
  1557. async def _update_matrix_room(self, source: u.User, info: ChatInfo) -> None:
  1558. puppet = await p.Puppet.get_by_custom_mxid(source.mxid)
  1559. await self.main_intent.invite_user(
  1560. self.mxid,
  1561. source.mxid,
  1562. check_cache=True,
  1563. extra_content=self._get_invite_content(puppet),
  1564. )
  1565. if puppet:
  1566. did_join = await puppet.intent.ensure_joined(self.mxid)
  1567. if did_join and self.is_direct:
  1568. await source.update_direct_chats({self.main_intent.mxid: [self.mxid]})
  1569. await self.update_info(source, info)
  1570. async def _get_power_levels(
  1571. self,
  1572. levels: PowerLevelStateEventContent | None = None,
  1573. info: ChatInfo | None = None,
  1574. is_initial: bool = False,
  1575. ) -> PowerLevelStateEventContent:
  1576. levels = levels or PowerLevelStateEventContent()
  1577. levels.events_default = 0
  1578. if self.is_direct:
  1579. levels.ban = 99
  1580. levels.kick = 99
  1581. levels.invite = 99
  1582. levels.state_default = 0
  1583. meta_edit_level = 0
  1584. else:
  1585. if isinstance(info, GroupV2):
  1586. ac = info.access_control
  1587. for detail in info.member_detail + info.pending_member_detail:
  1588. puppet = await p.Puppet.get_by_address(Address(uuid=detail.uuid))
  1589. level = 50 if detail.role == GroupMemberRole.ADMINISTRATOR else 0
  1590. levels.users[puppet.intent_for(self).mxid] = level
  1591. announcements = info.announcements
  1592. else:
  1593. ac = GroupAccessControl()
  1594. announcements = AnnouncementsMode.UNKNOWN
  1595. levels.ban = 50
  1596. levels.kick = 50
  1597. levels.invite = 50 if ac.members == AccessControlMode.ADMINISTRATOR else 0
  1598. levels.state_default = 50
  1599. meta_edit_level = 50 if ac.attributes == AccessControlMode.ADMINISTRATOR else 0
  1600. if announcements == AnnouncementsMode.ENABLED:
  1601. levels.events_default = 50
  1602. levels.events[EventType.REACTION] = 0
  1603. levels.events[EventType.ROOM_NAME] = meta_edit_level
  1604. levels.events[EventType.ROOM_AVATAR] = meta_edit_level
  1605. levels.events[EventType.ROOM_TOPIC] = meta_edit_level
  1606. levels.events[EventType.ROOM_ENCRYPTION] = 50 if self.matrix.e2ee else 99
  1607. levels.events[EventType.ROOM_TOMBSTONE] = 99
  1608. levels.users_default = 0
  1609. # Remote delete is only for your own messages
  1610. levels.redact = 99
  1611. if self.main_intent.mxid not in levels.users:
  1612. levels.users[self.main_intent.mxid] = 9001 if is_initial else 100
  1613. return levels
  1614. async def _create_matrix_room(self, source: u.User, info: ChatInfo) -> RoomID | None:
  1615. if self.mxid:
  1616. await self._update_matrix_room(source, info)
  1617. return self.mxid
  1618. await self.update_info(source, info)
  1619. self.log.debug("Creating Matrix room")
  1620. name: str | None = None
  1621. power_levels = await self._get_power_levels(info=info, is_initial=True)
  1622. initial_state = [
  1623. {
  1624. "type": str(StateBridge),
  1625. "state_key": self.bridge_info_state_key,
  1626. "content": self.bridge_info,
  1627. },
  1628. {
  1629. # TODO remove this once https://github.com/matrix-org/matrix-doc/pull/2346 is in spec
  1630. "type": str(StateHalfShotBridge),
  1631. "state_key": self.bridge_info_state_key,
  1632. "content": self.bridge_info,
  1633. },
  1634. {
  1635. "type": str(EventType.ROOM_POWER_LEVELS),
  1636. "content": power_levels.serialize(),
  1637. },
  1638. ]
  1639. invites = []
  1640. if self.config["bridge.encryption.default"] and self.matrix.e2ee:
  1641. self.encrypted = True
  1642. initial_state.append(
  1643. {
  1644. "type": str(EventType.ROOM_ENCRYPTION),
  1645. "content": {"algorithm": "m.megolm.v1.aes-sha2"},
  1646. }
  1647. )
  1648. if self.is_direct:
  1649. invites.append(self.az.bot_mxid)
  1650. if self.is_direct and source.address == self.chat_id:
  1651. name = self.name = "Signal Note to Self"
  1652. elif self.encrypted or self.private_chat_portal_meta or not self.is_direct:
  1653. name = self.name
  1654. if self.avatar_url:
  1655. initial_state.append(
  1656. {
  1657. "type": str(EventType.ROOM_AVATAR),
  1658. "content": {"url": self.avatar_url},
  1659. }
  1660. )
  1661. creation_content = {}
  1662. if not self.config["bridge.federate_rooms"]:
  1663. creation_content["m.federate"] = False
  1664. self.mxid = await self.main_intent.create_room(
  1665. name=name,
  1666. topic=self.topic,
  1667. is_direct=self.is_direct,
  1668. initial_state=initial_state,
  1669. invitees=invites,
  1670. creation_content=creation_content,
  1671. # Make sure the power level event in initial_state is allowed
  1672. # even if the server sends a default power level event before it.
  1673. # TODO remove this if the spec is changed to require servers to
  1674. # use the power level event in initial_state
  1675. power_level_override={"users": {self.main_intent.mxid: 9001}},
  1676. )
  1677. if not self.mxid:
  1678. raise Exception("Failed to create room: no mxid returned")
  1679. self.name_set = bool(name)
  1680. self.avatar_set = bool(self.avatar_url)
  1681. if self.encrypted and self.matrix.e2ee and self.is_direct:
  1682. try:
  1683. await self.az.intent.ensure_joined(self.mxid)
  1684. except Exception:
  1685. self.log.warning("Failed to add bridge bot to new private chat {self.mxid}")
  1686. puppet = await p.Puppet.get_by_custom_mxid(source.mxid)
  1687. await self.main_intent.invite_user(
  1688. self.mxid, source.mxid, extra_content=self._get_invite_content(puppet)
  1689. )
  1690. if puppet:
  1691. try:
  1692. await source.update_direct_chats({self.main_intent.mxid: [self.mxid]})
  1693. await puppet.intent.join_room_by_id(self.mxid)
  1694. except MatrixError:
  1695. self.log.debug(
  1696. "Failed to join custom puppet into newly created portal", exc_info=True
  1697. )
  1698. await self.update()
  1699. self.log.debug(f"Matrix room created: {self.mxid}")
  1700. self.by_mxid[self.mxid] = self
  1701. if not self.is_direct:
  1702. await self._update_participants(source, info)
  1703. return self.mxid
  1704. # endregion
  1705. # region Database getters
  1706. async def _postinit(self) -> None:
  1707. self.by_chat_id[(self.chat_id_str, self.receiver)] = self
  1708. if self.mxid:
  1709. self.by_mxid[self.mxid] = self
  1710. if self.is_direct:
  1711. puppet = await self.get_dm_puppet()
  1712. self._main_intent = puppet.default_mxid_intent
  1713. elif not self.is_direct:
  1714. self._main_intent = self.az.intent
  1715. async def delete(self) -> None:
  1716. await DBMessage.delete_all(self.mxid)
  1717. self.by_mxid.pop(self.mxid, None)
  1718. self.mxid = None
  1719. self.name_set = False
  1720. self.avatar_set = False
  1721. self.relay_user_id = None
  1722. self.topic = None
  1723. self.encrypted = False
  1724. await self.update()
  1725. async def save(self) -> None:
  1726. await self.update()
  1727. @classmethod
  1728. def all_with_room(cls) -> AsyncGenerator[Portal, None]:
  1729. return cls._db_to_portals(super().all_with_room())
  1730. @classmethod
  1731. def find_private_chats_with(cls, other_user: Address) -> AsyncGenerator[Portal, None]:
  1732. return cls._db_to_portals(super().find_private_chats_with(other_user))
  1733. @classmethod
  1734. async def _db_to_portals(cls, query: Awaitable[list[Portal]]) -> AsyncGenerator[Portal, None]:
  1735. portals = await query
  1736. for index, portal in enumerate(portals):
  1737. try:
  1738. yield cls.by_chat_id[(portal.chat_id_str, portal.receiver)]
  1739. except KeyError:
  1740. await portal._postinit()
  1741. yield portal
  1742. @classmethod
  1743. @async_getter_lock
  1744. async def get_by_mxid(cls, mxid: RoomID) -> Portal | None:
  1745. try:
  1746. return cls.by_mxid[mxid]
  1747. except KeyError:
  1748. pass
  1749. portal = cast(cls, await super().get_by_mxid(mxid))
  1750. if portal is not None:
  1751. await portal._postinit()
  1752. return portal
  1753. return None
  1754. @classmethod
  1755. async def get_by_chat_id(
  1756. cls, chat_id: GroupID | Address, *, receiver: str = "", create: bool = False
  1757. ) -> Portal | None:
  1758. if isinstance(chat_id, str):
  1759. receiver = ""
  1760. elif not isinstance(chat_id, Address):
  1761. raise ValueError(f"Invalid chat ID type {type(chat_id)}")
  1762. elif not receiver:
  1763. raise ValueError("Direct chats must have a receiver")
  1764. best_id = id_to_str(chat_id)
  1765. portal = await cls._get_by_chat_id(best_id, receiver, create=create, chat_id=chat_id)
  1766. if portal:
  1767. portal.log.debug(f"get_by_chat_id({chat_id}, {receiver}) -> {hex(id(portal))}")
  1768. return portal
  1769. @classmethod
  1770. @async_getter_lock
  1771. async def _get_by_chat_id(
  1772. cls, best_id: str, receiver: str, *, create: bool, chat_id: GroupID | Address
  1773. ) -> Portal | None:
  1774. try:
  1775. return cls.by_chat_id[(best_id, receiver)]
  1776. except KeyError:
  1777. pass
  1778. portal = cast(cls, await super().get_by_chat_id(chat_id, receiver))
  1779. if portal is not None:
  1780. await portal._postinit()
  1781. return portal
  1782. if create:
  1783. portal = cls(chat_id, receiver)
  1784. await portal.insert()
  1785. await portal._postinit()
  1786. return portal
  1787. return None
  1788. # endregion