portal.py 68 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707
  1. # mautrix-signal - A Matrix-Signal puppeting bridge
  2. # Copyright (C) 2022 Tulir Asokan
  3. #
  4. # This program is free software: you can redistribute it and/or modify
  5. # it under the terms of the GNU Affero General Public License as published by
  6. # the Free Software Foundation, either version 3 of the License, or
  7. # (at your option) any later version.
  8. #
  9. # This program is distributed in the hope that it will be useful,
  10. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. # GNU Affero General Public License for more details.
  13. #
  14. # You should have received a copy of the GNU Affero General Public License
  15. # along with this program. If not, see <https://www.gnu.org/licenses/>.
  16. from __future__ import annotations
  17. from typing import TYPE_CHECKING, Any, AsyncGenerator, Awaitable, Callable, Union, cast
  18. from collections import deque
  19. from uuid import UUID, uuid4
  20. import asyncio
  21. import hashlib
  22. import mimetypes
  23. import os
  24. import os.path
  25. import pathlib
  26. import time
  27. from mausignald.errors import AttachmentTooLargeError, NotConnected, RPCError
  28. from mausignald.types import (
  29. AccessControlMode,
  30. Address,
  31. Attachment,
  32. Contact,
  33. Group,
  34. GroupAccessControl,
  35. GroupID,
  36. GroupMemberRole,
  37. GroupV2,
  38. GroupV2ID,
  39. LinkPreview,
  40. Mention,
  41. MessageData,
  42. Profile,
  43. Quote,
  44. QuotedAttachment,
  45. Reaction,
  46. SharedContact,
  47. Sticker,
  48. )
  49. from mautrix.appservice import AppService, IntentAPI
  50. from mautrix.bridge import BasePortal, async_getter_lock
  51. from mautrix.errors import IntentError, MatrixError, MForbidden
  52. from mautrix.types import (
  53. AudioInfo,
  54. ContentURI,
  55. EncryptedEvent,
  56. EncryptedFile,
  57. EventID,
  58. EventType,
  59. FileInfo,
  60. ImageInfo,
  61. MediaMessageEventContent,
  62. MessageEvent,
  63. MessageEventContent,
  64. MessageType,
  65. PowerLevelStateEventContent,
  66. RoomID,
  67. TextMessageEventContent,
  68. UserID,
  69. VideoInfo,
  70. )
  71. from mautrix.util import ffmpeg, variation_selector
  72. from mautrix.util.format_duration import format_duration
  73. from mautrix.util.message_send_checkpoint import MessageSendCheckpointStatus
  74. from . import matrix as m, puppet as p, signal as s, user as u
  75. from .config import Config
  76. from .db import (
  77. DisappearingMessage,
  78. Message as DBMessage,
  79. Portal as DBPortal,
  80. Reaction as DBReaction,
  81. )
  82. from .formatter import matrix_to_signal, signal_to_matrix
  83. from .util import id_to_str
  84. if TYPE_CHECKING:
  85. from .__main__ import SignalBridge
  86. try:
  87. from mautrix.crypto.attachments import decrypt_attachment, encrypt_attachment
  88. except ImportError:
  89. encrypt_attachment = decrypt_attachment = None
  90. try:
  91. from signalstickers_client import StickersClient
  92. from signalstickers_client.models import StickerPack
  93. except ImportError:
  94. StickersClient = StickerPack = None
  95. try:
  96. from mautrix.util import magic
  97. except ImportError:
  98. magic = None
  99. StateBridge = EventType.find("m.bridge", EventType.Class.STATE)
  100. StateHalfShotBridge = EventType.find("uk.half-shot.bridge", EventType.Class.STATE)
  101. ChatInfo = Union[Group, GroupV2, GroupV2ID, Contact, Profile, Address]
  102. MAX_MATRIX_MESSAGE_SIZE = 60000
  103. BEEPER_LINK_PREVIEWS_KEY = "com.beeper.linkpreviews"
  104. BEEPER_IMAGE_ENCRYPTION_KEY = "beeper:image:encryption"
  105. class UnknownReactionTarget(Exception):
  106. pass
  107. class Portal(DBPortal, BasePortal):
  108. by_mxid: dict[RoomID, Portal] = {}
  109. by_chat_id: dict[tuple[str, str], Portal] = {}
  110. _sticker_meta_cache: dict[str, StickerPack] = {}
  111. disappearing_msg_class = DisappearingMessage
  112. config: Config
  113. matrix: m.MatrixHandler
  114. signal: s.SignalHandler
  115. az: AppService
  116. private_chat_portal_meta: bool
  117. expiration_time: int | None
  118. _main_intent: IntentAPI | None
  119. _create_room_lock: asyncio.Lock
  120. _msgts_dedup: deque[tuple[Address, int]]
  121. _reaction_dedup: deque[tuple[Address, int, str, Address, bool]]
  122. _reaction_lock: asyncio.Lock
  123. _pending_members: set[UUID] | None
  124. _expiration_lock: asyncio.Lock
  125. def __init__(
  126. self,
  127. chat_id: GroupID | Address,
  128. receiver: str,
  129. mxid: RoomID | None = None,
  130. name: str | None = None,
  131. avatar_hash: str | None = None,
  132. avatar_url: ContentURI | None = None,
  133. name_set: bool = False,
  134. avatar_set: bool = False,
  135. revision: int = 0,
  136. encrypted: bool = False,
  137. relay_user_id: UserID | None = None,
  138. expiration_time: int | None = None,
  139. ) -> None:
  140. super().__init__(
  141. chat_id=chat_id,
  142. receiver=receiver,
  143. mxid=mxid,
  144. name=name,
  145. avatar_hash=avatar_hash,
  146. avatar_url=avatar_url,
  147. name_set=name_set,
  148. avatar_set=avatar_set,
  149. revision=revision,
  150. encrypted=encrypted,
  151. relay_user_id=relay_user_id,
  152. expiration_time=expiration_time,
  153. )
  154. BasePortal.__init__(self)
  155. self._create_room_lock = asyncio.Lock()
  156. self.log = self.log.getChild(self.chat_id_str)
  157. self._main_intent = None
  158. self._msgts_dedup = deque(maxlen=100)
  159. self._reaction_dedup = deque(maxlen=100)
  160. self._last_participant_update = set()
  161. self._reaction_lock = asyncio.Lock()
  162. self._pending_members = None
  163. self._relay_user = None
  164. self._expiration_lock = asyncio.Lock()
  165. @property
  166. def main_intent(self) -> IntentAPI:
  167. if not self._main_intent:
  168. raise ValueError("Portal must be postinit()ed before main_intent can be used")
  169. return self._main_intent
  170. @property
  171. def is_direct(self) -> bool:
  172. return isinstance(self.chat_id, Address)
  173. @property
  174. def disappearing_enabled(self) -> bool:
  175. return self.is_direct or self.config["signal.enable_disappearing_messages_in_groups"]
  176. def handle_uuid_receive(self, uuid: UUID) -> None:
  177. if not self.is_direct or self.chat_id.uuid:
  178. raise ValueError(
  179. "handle_uuid_receive can only be used for private chat portals with a phone "
  180. "number chat_id"
  181. )
  182. del self.by_chat_id[(self.chat_id_str, self.receiver)]
  183. self.chat_id = Address(uuid=uuid)
  184. self.by_chat_id[(self.chat_id_str, self.receiver)] = self
  185. @classmethod
  186. def init_cls(cls, bridge: "SignalBridge") -> None:
  187. cls.config = bridge.config
  188. cls.matrix = bridge.matrix
  189. cls.signal = bridge.signal
  190. cls.az = bridge.az
  191. cls.loop = bridge.loop
  192. BasePortal.bridge = bridge
  193. cls.private_chat_portal_meta = cls.config["bridge.private_chat_portal_meta"]
  194. # region Misc
  195. async def _send_delivery_receipt(self, event_id: EventID) -> None:
  196. if event_id and self.config["bridge.delivery_receipts"]:
  197. try:
  198. await self.az.intent.mark_read(self.mxid, event_id)
  199. except Exception:
  200. self.log.exception("Failed to send delivery receipt for %s", event_id)
  201. async def _upsert_reaction(
  202. self,
  203. existing: DBReaction,
  204. intent: IntentAPI,
  205. mxid: EventID,
  206. sender: p.Puppet | u.User,
  207. message: DBMessage,
  208. emoji: str,
  209. ) -> None:
  210. if existing:
  211. self.log.debug(
  212. f"_upsert_reaction redacting {existing.mxid} and inserting {mxid}"
  213. f" (message: {message.mxid})"
  214. )
  215. try:
  216. await intent.redact(existing.mx_room, existing.mxid)
  217. except MForbidden:
  218. self.log.debug("Unexpected MForbidden redacting reaction", exc_info=True)
  219. await existing.edit(emoji=emoji, mxid=mxid, mx_room=message.mx_room)
  220. else:
  221. self.log.debug(f"_upsert_reaction inserting {mxid} (message: {message.mxid})")
  222. await DBReaction(
  223. mxid=mxid,
  224. mx_room=message.mx_room,
  225. emoji=emoji,
  226. signal_chat_id=self.chat_id,
  227. signal_receiver=self.receiver,
  228. msg_author=message.sender,
  229. msg_timestamp=message.timestamp,
  230. author=sender.address,
  231. ).insert()
  232. # endregion
  233. # region Matrix event handling
  234. @staticmethod
  235. async def _make_attachment(message: MediaMessageEventContent, path: str) -> Attachment:
  236. outgoing_filename = path
  237. if message.msgtype == MessageType.AUDIO:
  238. outgoing_filename = await ffmpeg.convert_path(
  239. path, ".m4a", output_args=("-c:a", "aac"), remove_input=True
  240. )
  241. message.info.mimetype = "audio/mp4"
  242. attachment = Attachment(
  243. custom_filename=message.body,
  244. content_type=message.info.mimetype,
  245. outgoing_filename=str(outgoing_filename),
  246. )
  247. info = message.info
  248. attachment.width = info.get("w", info.get("width", 0))
  249. attachment.height = info.get("h", info.get("height", 0))
  250. attachment.voice_note = message.msgtype == MessageType.AUDIO
  251. return attachment
  252. def _write_outgoing_file(self, data: bytes) -> str:
  253. dir = pathlib.Path(self.config["signal.outgoing_attachment_dir"])
  254. path = dir.joinpath(f"mautrix-signal-{str(uuid4())}")
  255. try:
  256. with open(path, "wb") as file:
  257. file.write(data)
  258. except FileNotFoundError:
  259. dir.mkdir(mode=0o755, parents=True, exist_ok=True)
  260. with open(path, "wb") as file:
  261. file.write(data)
  262. return str(path)
  263. async def _download_matrix_media(self, message: MediaMessageEventContent) -> str:
  264. if message.info and message.info.size and message.info.size > 100 * 10**6:
  265. raise AttachmentTooLargeError({"filename": message.body})
  266. if message.file:
  267. data = await self.main_intent.download_media(message.file.url)
  268. data = decrypt_attachment(
  269. data, message.file.key.key, message.file.hashes.get("sha256"), message.file.iv
  270. )
  271. else:
  272. data = await self.main_intent.download_media(message.url)
  273. return self._write_outgoing_file(data)
  274. async def handle_matrix_message(
  275. self, sender: u.User, message: MessageEventContent, event_id: EventID
  276. ) -> None:
  277. try:
  278. await self._handle_matrix_message(sender, message, event_id)
  279. except Exception as e:
  280. self.log.exception(f"Failed to handle Matrix message {event_id}")
  281. status = (
  282. MessageSendCheckpointStatus.UNSUPPORTED
  283. if isinstance(e, AttachmentTooLargeError)
  284. else MessageSendCheckpointStatus.PERM_FAILURE
  285. )
  286. sender.send_remote_checkpoint(
  287. status, event_id, self.mxid, EventType.ROOM_MESSAGE, message.msgtype, error=e
  288. )
  289. await sender.handle_auth_failure(e)
  290. await self._send_message(
  291. self.main_intent,
  292. TextMessageEventContent(
  293. msgtype=MessageType.NOTICE, body=f"\u26a0 Your message was not bridged: {e}"
  294. ),
  295. )
  296. async def _beeper_link_preview_to_signal(
  297. self, beeper_link_preview: dict[str, Any]
  298. ) -> LinkPreview | None:
  299. link_preview = LinkPreview(
  300. url=beeper_link_preview["matched_url"],
  301. title=beeper_link_preview.get("og:title", ""),
  302. description=beeper_link_preview.get("og:description", ""),
  303. )
  304. if BEEPER_IMAGE_ENCRYPTION_KEY in beeper_link_preview or "og:image" in beeper_link_preview:
  305. if BEEPER_IMAGE_ENCRYPTION_KEY in beeper_link_preview:
  306. file = EncryptedFile.deserialize(beeper_link_preview[BEEPER_IMAGE_ENCRYPTION_KEY])
  307. data = await self.main_intent.download_media(file.url)
  308. data = decrypt_attachment(data, file.key.key, file.hashes.get("sha256"), file.iv)
  309. else:
  310. data = await self.main_intent.download_media(beeper_link_preview["og:image"])
  311. attachment_path = self._write_outgoing_file(data)
  312. link_preview.attachment = Attachment(
  313. content_type=beeper_link_preview.get("og:image:type"),
  314. outgoing_filename=attachment_path,
  315. width=beeper_link_preview.get("og:image:width", 0),
  316. height=beeper_link_preview.get("og:image:height", 0),
  317. size=beeper_link_preview.get("matrix:image:size", 0),
  318. )
  319. return link_preview
  320. async def _handle_matrix_message(
  321. self, sender: u.User, message: MessageEventContent, event_id: EventID
  322. ) -> None:
  323. orig_sender = sender
  324. sender, is_relay = await self.get_relay_sender(sender, f"message {event_id}")
  325. if not sender:
  326. orig_sender.send_remote_checkpoint(
  327. status=MessageSendCheckpointStatus.PERM_FAILURE,
  328. event_id=event_id,
  329. room_id=self.mxid,
  330. event_type=EventType.ROOM_MESSAGE,
  331. message_type=message.msgtype,
  332. error="user is not logged in",
  333. )
  334. return
  335. elif is_relay:
  336. await self.apply_relay_message_format(orig_sender, message)
  337. request_id = int(time.time() * 1000)
  338. self._msgts_dedup.appendleft((sender.address, request_id))
  339. quote = None
  340. if message.get_reply_to():
  341. reply = await DBMessage.get_by_mxid(message.get_reply_to(), self.mxid)
  342. # TODO include actual text? either store in db or fetch event from homeserver
  343. if reply is not None:
  344. quote = Quote(id=reply.timestamp, author=reply.sender, text="")
  345. # TODO only send this when it's actually a reply to an attachment?
  346. # Neither Signal Android nor iOS seem to care though, so this works too
  347. quote.attachments = [QuotedAttachment("", "")]
  348. attachments: list[Attachment] | None = None
  349. attachment_path: str | None = None
  350. mentions: list[Mention] | None = None
  351. link_previews: list[LinkPreview] | None = None
  352. if message.msgtype.is_text:
  353. text, mentions = await matrix_to_signal(message)
  354. message_previews = message.get(BEEPER_LINK_PREVIEWS_KEY, [])
  355. potential_link_previews = await asyncio.gather(
  356. *(self._beeper_link_preview_to_signal(m) for m in message_previews)
  357. )
  358. link_previews = [p for p in potential_link_previews if p is not None]
  359. elif message.msgtype.is_media:
  360. attachment_path = await self._download_matrix_media(message)
  361. attachment = await self._make_attachment(message, attachment_path)
  362. attachments = [attachment]
  363. text = message.body if is_relay else None
  364. self.log.trace("Formed outgoing attachment %s", attachment)
  365. else:
  366. self.log.debug(f"Unknown msgtype {message.msgtype} in Matrix message {event_id}")
  367. return
  368. self.log.debug(f"Sending Matrix message {event_id} to Signal with timestamp {request_id}")
  369. try:
  370. retry_count = await self._signal_send_with_retries(
  371. sender,
  372. event_id,
  373. message_type=message.msgtype,
  374. send_fn=lambda *args, **kwargs: self.signal.send(**kwargs),
  375. event_type=EventType.ROOM_MESSAGE,
  376. username=sender.username,
  377. recipient=self.chat_id,
  378. body=text,
  379. mentions=mentions,
  380. previews=link_previews,
  381. quote=quote,
  382. attachments=attachments,
  383. timestamp=request_id,
  384. )
  385. except Exception:
  386. self.log.exception("Sending message failed")
  387. raise
  388. else:
  389. sender.send_remote_checkpoint(
  390. MessageSendCheckpointStatus.SUCCESS,
  391. event_id,
  392. self.mxid,
  393. EventType.ROOM_MESSAGE,
  394. message.msgtype,
  395. retry_num=retry_count,
  396. )
  397. await self._send_delivery_receipt(event_id)
  398. msg = DBMessage(
  399. mxid=event_id,
  400. mx_room=self.mxid,
  401. sender=sender.address,
  402. timestamp=request_id,
  403. signal_chat_id=self.chat_id,
  404. signal_receiver=self.receiver,
  405. )
  406. await msg.insert()
  407. self.log.debug(f"Handled Matrix message {event_id} -> {request_id}")
  408. if attachment_path and self.config["signal.remove_file_after_handling"]:
  409. try:
  410. os.remove(attachment_path)
  411. except FileNotFoundError:
  412. pass
  413. # Handle disappearing messages
  414. if self.expiration_time and self.disappearing_enabled:
  415. dm = DisappearingMessage(self.mxid, event_id, self.expiration_time)
  416. dm.start_timer()
  417. await dm.insert()
  418. await self._disappear_event(dm)
  419. async def _signal_send_with_retries(
  420. self,
  421. sender: u.User,
  422. event_id: EventID,
  423. send_fn: Callable,
  424. event_type: EventType,
  425. message_type: MessageType | None = None,
  426. **send_args,
  427. ) -> int:
  428. retry_count = 7
  429. retry_message_event_id = None
  430. for retry_num in range(retry_count):
  431. try:
  432. req_id = uuid4()
  433. self.log.info(
  434. f"Send attempt {retry_num}. Attempting to send {event_id} with {req_id}"
  435. )
  436. await send_fn(sender, event_id, req_id=req_id, **send_args)
  437. # It was successful.
  438. if retry_message_event_id is not None:
  439. await self.main_intent.redact(self.mxid, retry_message_event_id)
  440. return retry_num
  441. except (NotConnected, UnknownReactionTarget) as e:
  442. # Only handle NotConnected and UnknownReactionTarget exceptions so that other
  443. # exceptions actually continue to error.
  444. sleep_seconds = (retry_num + 1) ** 2
  445. msg = (
  446. f"Not connected to signald. Going to sleep for {sleep_seconds}s. Error: {e}"
  447. if isinstance(e, NotConnected)
  448. else f"UnknownReactionTarget: Going to sleep for {sleep_seconds}s. Error: {e}"
  449. )
  450. self.log.exception(msg)
  451. sender.send_remote_checkpoint(
  452. MessageSendCheckpointStatus.WILL_RETRY,
  453. event_id,
  454. self.mxid,
  455. event_type,
  456. message_type=message_type,
  457. error=msg,
  458. retry_num=retry_num,
  459. )
  460. if retry_num > 2:
  461. # User has waited > ~15 seconds, send a notice that we are retrying.
  462. user_friendly_message = (
  463. "There was an error connecting to signald."
  464. if isinstance(e, NotConnected)
  465. else "Could not find message to react to on Signal."
  466. )
  467. event_content = TextMessageEventContent(
  468. MessageType.NOTICE,
  469. f"{user_friendly_message} Waiting for {sleep_seconds} before retrying.",
  470. )
  471. if retry_message_event_id is not None:
  472. event_content.set_edit(retry_message_event_id)
  473. new_event_id = await self.main_intent.send_message(self.mxid, event_content)
  474. retry_message_event_id = retry_message_event_id or new_event_id
  475. await asyncio.sleep(sleep_seconds)
  476. if retry_message_event_id is not None:
  477. await self.main_intent.redact(self.mxid, retry_message_event_id)
  478. event_type_name = {
  479. EventType.ROOM_MESSAGE: "message",
  480. EventType.REACTION: "reaction",
  481. }.get(event_type, str(event_type))
  482. raise NotConnected(f"Failed to send {event_type_name} after {retry_count} retries.")
  483. async def handle_matrix_reaction(
  484. self, sender: u.User, event_id: EventID, reacting_to: EventID, emoji: str
  485. ) -> None:
  486. if not await sender.is_logged_in():
  487. self.log.trace(f"Ignoring reaction by non-logged-in user {sender.mxid}")
  488. return
  489. # Signal doesn't seem to use variation selectors at all
  490. emoji = variation_selector.remove(emoji)
  491. try:
  492. retry_count = await self._signal_send_with_retries(
  493. sender,
  494. event_id,
  495. send_fn=self._handle_matrix_reaction,
  496. event_type=EventType.REACTION,
  497. reacting_to=reacting_to,
  498. emoji=emoji,
  499. )
  500. except Exception as e:
  501. self.log.exception("Sending reaction failed")
  502. sender.send_remote_checkpoint(
  503. MessageSendCheckpointStatus.PERM_FAILURE,
  504. event_id,
  505. self.mxid,
  506. EventType.REACTION,
  507. error=e,
  508. )
  509. else:
  510. sender.send_remote_checkpoint(
  511. MessageSendCheckpointStatus.SUCCESS,
  512. event_id,
  513. self.mxid,
  514. EventType.REACTION,
  515. retry_num=retry_count,
  516. )
  517. await self._send_delivery_receipt(event_id)
  518. async def _handle_matrix_reaction(
  519. self,
  520. sender: u.User,
  521. event_id: EventID,
  522. reacting_to: EventID,
  523. emoji: str,
  524. req_id: UUID | None = None,
  525. ) -> None:
  526. message = await DBMessage.get_by_mxid(reacting_to, self.mxid)
  527. if not message:
  528. self.log.debug(f"Ignoring reaction to unknown event {reacting_to}")
  529. raise UnknownReactionTarget(f"Ignoring reaction to unknown event {reacting_to}")
  530. async with self._reaction_lock:
  531. existing = await DBReaction.get_by_signal_id(
  532. self.chat_id, self.receiver, message.sender, message.timestamp, sender.address
  533. )
  534. if existing and existing.emoji == emoji:
  535. return
  536. dedup_id = (message.sender, message.timestamp, emoji, sender.address, False)
  537. self._reaction_dedup.appendleft(dedup_id)
  538. reaction = Reaction(
  539. emoji=emoji,
  540. remove=False,
  541. target_author=message.sender,
  542. target_sent_timestamp=message.timestamp,
  543. )
  544. self.log.trace(f"{sender.mxid} reacted to {message.timestamp} with {emoji}")
  545. await self.signal.react(
  546. sender.username, recipient=self.chat_id, reaction=reaction, req_id=req_id
  547. )
  548. await self._upsert_reaction(
  549. existing, self.main_intent, event_id, sender, message, emoji
  550. )
  551. async def handle_matrix_redaction(
  552. self, sender: u.User, event_id: EventID, redaction_event_id: EventID
  553. ) -> None:
  554. if not await sender.is_logged_in():
  555. return
  556. message = await DBMessage.get_by_mxid(event_id, self.mxid)
  557. if message:
  558. try:
  559. await message.delete()
  560. await self.signal.remote_delete(
  561. sender.username, recipient=self.chat_id, timestamp=message.timestamp
  562. )
  563. except Exception as e:
  564. self.log.exception("Removing message failed")
  565. sender.send_remote_checkpoint(
  566. MessageSendCheckpointStatus.PERM_FAILURE,
  567. redaction_event_id,
  568. self.mxid,
  569. EventType.ROOM_REDACTION,
  570. error=e,
  571. )
  572. else:
  573. self.log.trace(f"Removed {message} after Matrix redaction")
  574. sender.send_remote_checkpoint(
  575. MessageSendCheckpointStatus.SUCCESS,
  576. redaction_event_id,
  577. self.mxid,
  578. EventType.ROOM_REDACTION,
  579. )
  580. await self._send_delivery_receipt(redaction_event_id)
  581. return
  582. reaction = await DBReaction.get_by_mxid(event_id, self.mxid)
  583. if reaction:
  584. try:
  585. await reaction.delete()
  586. remove_reaction = Reaction(
  587. emoji=reaction.emoji,
  588. remove=True,
  589. target_author=reaction.msg_author,
  590. target_sent_timestamp=reaction.msg_timestamp,
  591. )
  592. await self.signal.react(
  593. username=sender.username, recipient=self.chat_id, reaction=remove_reaction
  594. )
  595. except Exception as e:
  596. self.log.exception("Removing reaction failed")
  597. sender.send_remote_checkpoint(
  598. MessageSendCheckpointStatus.PERM_FAILURE,
  599. redaction_event_id,
  600. self.mxid,
  601. EventType.ROOM_REDACTION,
  602. error=e,
  603. )
  604. else:
  605. self.log.trace(f"Removed {reaction} after Matrix redaction")
  606. sender.send_remote_checkpoint(
  607. MessageSendCheckpointStatus.SUCCESS,
  608. redaction_event_id,
  609. self.mxid,
  610. EventType.ROOM_REDACTION,
  611. )
  612. await self._send_delivery_receipt(redaction_event_id)
  613. return
  614. sender.send_remote_checkpoint(
  615. MessageSendCheckpointStatus.PERM_FAILURE,
  616. redaction_event_id,
  617. self.mxid,
  618. EventType.ROOM_REDACTION,
  619. error=f"No message or reaction found for redaction",
  620. )
  621. async def handle_matrix_join(self, user: u.User) -> None:
  622. if self.is_direct or not await user.is_logged_in():
  623. return
  624. if self._pending_members is None:
  625. self.log.debug(
  626. f"{user.mxid} ({user.uuid}) joined room, but pending_members is None,"
  627. " updating chat info"
  628. )
  629. await self.update_info(user, GroupV2ID(id=self.chat_id))
  630. if self._pending_members is None:
  631. self.log.warning(
  632. f"Didn't get pending member list after info update, {user.mxid} ({user.uuid}) may"
  633. "not be in the group on Signal."
  634. )
  635. elif user.uuid in self._pending_members:
  636. self.log.debug(f"{user.mxid} ({user.uuid}) joined room, accepting invite on Signal")
  637. try:
  638. resp = await self.signal.accept_invitation(user.username, self.chat_id)
  639. self._pending_members.remove(user.uuid)
  640. except RPCError as e:
  641. await self.main_intent.send_notice(
  642. self.mxid, f"\u26a0 Failed to accept invite on Signal: {e}"
  643. )
  644. else:
  645. await self.update_info(user, resp)
  646. async def handle_matrix_leave(self, user: u.User) -> None:
  647. if not await user.is_logged_in():
  648. return
  649. if self.is_direct:
  650. self.log.info(f"{user.mxid} left private chat portal with {self.chat_id}")
  651. if user.username == self.receiver:
  652. self.log.info(
  653. f"{user.mxid} was the recipient of this portal. Cleaning up and deleting..."
  654. )
  655. await self.cleanup_and_delete()
  656. else:
  657. self.log.debug(f"{user.mxid} left portal to {self.chat_id}")
  658. # TODO cleanup if empty
  659. async def handle_matrix_name(self, user: u.User, name: str) -> None:
  660. if self.name == name or self.is_direct or not name:
  661. return
  662. sender, is_relay = await self.get_relay_sender(user, "name change")
  663. if not sender:
  664. return
  665. self.name = name
  666. self.log.debug(
  667. f"{user.mxid} changed the group name, sending to Signal through {sender.username}"
  668. )
  669. try:
  670. await self.signal.update_group(sender.username, self.chat_id, title=name)
  671. except Exception:
  672. self.log.exception("Failed to update Signal group name")
  673. self.name = None
  674. async def handle_matrix_avatar(self, user: u.User, url: ContentURI) -> None:
  675. if self.is_direct or not url:
  676. return
  677. sender, is_relay = await self.get_relay_sender(user, "avatar change")
  678. if not sender:
  679. return
  680. data = await self.main_intent.download_media(url)
  681. new_hash = hashlib.sha256(data).hexdigest()
  682. if new_hash == self.avatar_hash and self.avatar_set:
  683. self.log.debug(f"New avatar from Matrix set by {user.mxid} is same as current one")
  684. return
  685. self.avatar_url = url
  686. self.avatar_hash = new_hash
  687. path = self._write_outgoing_file(data)
  688. self.log.debug(
  689. f"{user.mxid} changed the group avatar, sending to Signal through {sender.username}"
  690. )
  691. try:
  692. await self.signal.update_group(sender.username, self.chat_id, avatar_path=path)
  693. self.avatar_set = True
  694. except Exception:
  695. self.log.exception("Failed to update Signal group avatar")
  696. self.avatar_set = False
  697. if self.config["signal.remove_file_after_handling"]:
  698. try:
  699. os.remove(path)
  700. except FileNotFoundError:
  701. pass
  702. # endregion
  703. # region Signal event handling
  704. @staticmethod
  705. async def _resolve_address(address: Address) -> Address:
  706. puppet = await p.Puppet.get_by_address(address, create=False)
  707. return puppet.address
  708. async def _find_quote_event_id(self, quote: Quote | None) -> MessageEvent | EventID | None:
  709. if not quote:
  710. return None
  711. author_address = await self._resolve_address(quote.author)
  712. reply_msg = await DBMessage.get_by_signal_id(
  713. author_address, quote.id, self.chat_id, self.receiver
  714. )
  715. if not reply_msg:
  716. return None
  717. try:
  718. evt = await self.main_intent.get_event(self.mxid, reply_msg.mxid)
  719. if isinstance(evt, EncryptedEvent):
  720. return await self.matrix.e2ee.decrypt(evt, wait_session_timeout=0)
  721. return evt
  722. except MatrixError:
  723. return reply_msg.mxid
  724. async def _signal_link_preview_to_beeper(
  725. self, link_preview: LinkPreview, intent: IntentAPI
  726. ) -> dict[str, Any]:
  727. beeper_link_preview: dict[str, Any] = {
  728. "matched_url": link_preview.url,
  729. "og:title": link_preview.title,
  730. "og:url": link_preview.url,
  731. "og:description": link_preview.description,
  732. }
  733. # Upload an image corresponding to the link preview if it exists.
  734. if link_preview.attachment and link_preview.attachment.incoming_filename:
  735. beeper_link_preview["og:image:type"] = link_preview.attachment.content_type
  736. beeper_link_preview["og:image:height"] = link_preview.attachment.height
  737. beeper_link_preview["og:image:width"] = link_preview.attachment.width
  738. beeper_link_preview["matrix:image:size"] = link_preview.attachment.size
  739. with open(link_preview.attachment.incoming_filename, "rb") as file:
  740. data = file.read()
  741. if self.config["signal.remove_file_after_handling"]:
  742. os.remove(link_preview.attachment.incoming_filename)
  743. upload_mime_type = link_preview.attachment.content_type
  744. if self.encrypted and encrypt_attachment:
  745. data, beeper_link_preview[BEEPER_IMAGE_ENCRYPTION_KEY] = encrypt_attachment(data)
  746. upload_mime_type = "application/octet-stream"
  747. upload_uri = await intent.upload_media(
  748. data, mime_type=upload_mime_type, filename=link_preview.attachment.id
  749. )
  750. if BEEPER_IMAGE_ENCRYPTION_KEY in beeper_link_preview:
  751. beeper_link_preview[BEEPER_IMAGE_ENCRYPTION_KEY].url = upload_uri
  752. beeper_link_preview[BEEPER_IMAGE_ENCRYPTION_KEY] = beeper_link_preview[
  753. BEEPER_IMAGE_ENCRYPTION_KEY
  754. ].serialize()
  755. else:
  756. beeper_link_preview["og:image"] = upload_uri
  757. return beeper_link_preview
  758. async def handle_signal_message(
  759. self, source: u.User, sender: p.Puppet, message: MessageData
  760. ) -> None:
  761. if (sender.address, message.timestamp) in self._msgts_dedup:
  762. self.log.debug(
  763. f"Ignoring message {message.timestamp} by {sender.uuid} as it was already handled "
  764. "(message.timestamp in dedup queue)"
  765. )
  766. await self.signal.send_receipt(
  767. source.username, sender.address, timestamps=[message.timestamp]
  768. )
  769. return
  770. self._msgts_dedup.appendleft((sender.address, message.timestamp))
  771. old_message = await DBMessage.get_by_signal_id(
  772. sender.address, message.timestamp, self.chat_id, self.receiver
  773. )
  774. if old_message is not None:
  775. self.log.debug(
  776. f"Ignoring message {message.timestamp} by {sender.uuid} as it was already handled "
  777. "(message.id found in database)"
  778. )
  779. await self.signal.send_receipt(
  780. source.username, sender.address, timestamps=[message.timestamp]
  781. )
  782. return
  783. self.log.debug(f"Started handling message {message.timestamp} by {sender.uuid}")
  784. self.log.trace(f"Message content: {message}")
  785. intent = sender.intent_for(self)
  786. await intent.set_typing(self.mxid, False)
  787. event_id = None
  788. reply_to = await self._find_quote_event_id(message.quote)
  789. if message.sticker:
  790. if message.sticker.attachment.incoming_filename:
  791. content = await self._handle_signal_attachment(
  792. intent, message.sticker.attachment, sticker=True
  793. )
  794. elif StickersClient:
  795. content = await self._handle_signal_sticker(intent, message.sticker)
  796. else:
  797. self.log.debug(
  798. f"Not handling sticker in {message.timestamp}: no incoming_filename and "
  799. "signalstickers-client not installed."
  800. )
  801. return
  802. if content:
  803. if message.sticker.attachment.blurhash:
  804. content.info["blurhash"] = message.sticker.attachment.blurhash
  805. content.info["xyz.amorgan.blurhash"] = message.sticker.attachment.blurhash
  806. await self._add_sticker_meta(message.sticker, content)
  807. if reply_to and not message.body:
  808. content.set_reply(reply_to)
  809. reply_to = None
  810. event_id = await self._send_message(
  811. intent, content, timestamp=message.timestamp, event_type=EventType.STICKER
  812. )
  813. for contact in message.contacts:
  814. content = await self._handle_signal_contact(contact)
  815. if reply_to and not message.body:
  816. content.set_reply(reply_to)
  817. reply_to = None
  818. event_id = await self._send_message(intent, content, timestamp=message.timestamp)
  819. is_first_text = True
  820. for attachment in message.attachments:
  821. if not attachment.incoming_filename:
  822. self.log.warning(
  823. "Failed to bridge attachment, no incoming filename: %s", attachment
  824. )
  825. continue
  826. as_text = (
  827. is_first_text
  828. and attachment.content_type == "text/x-signal-plain"
  829. and attachment.size < MAX_MATRIX_MESSAGE_SIZE
  830. )
  831. content = await self._handle_signal_attachment(intent, attachment, text=as_text)
  832. if as_text:
  833. is_first_text = False
  834. message.body = ""
  835. if reply_to and not message.body:
  836. # If there's no text, set the first image as the reply
  837. content.set_reply(reply_to)
  838. reply_to = None
  839. event_id = await self._send_message(intent, content, timestamp=message.timestamp)
  840. if message.body:
  841. content = await signal_to_matrix(message)
  842. if message.previews:
  843. content[BEEPER_LINK_PREVIEWS_KEY] = await asyncio.gather(
  844. *(self._signal_link_preview_to_beeper(p, intent) for p in message.previews)
  845. )
  846. if reply_to:
  847. content.set_reply(reply_to)
  848. event_id = await self._send_message(intent, content, timestamp=message.timestamp)
  849. if event_id:
  850. msg = DBMessage(
  851. mxid=event_id,
  852. mx_room=self.mxid,
  853. sender=sender.address,
  854. timestamp=message.timestamp,
  855. signal_chat_id=self.chat_id,
  856. signal_receiver=self.receiver,
  857. )
  858. await msg.insert()
  859. await self.signal.send_receipt(
  860. source.username, sender.address, timestamps=[message.timestamp]
  861. )
  862. await self._send_delivery_receipt(event_id)
  863. self.log.debug(f"Handled Signal message {message.timestamp} -> {event_id}")
  864. if message.expires_in_seconds and self.disappearing_enabled:
  865. await DisappearingMessage(self.mxid, event_id, message.expires_in_seconds).insert()
  866. self.log.debug(
  867. f"{event_id} set to be redacted {message.expires_in_seconds} seconds after "
  868. "room is read"
  869. )
  870. else:
  871. self.log.debug(f"Didn't get event ID for {message.timestamp}")
  872. async def handle_signal_kicked(self, user: u.User, sender: pu.Puppet) -> None:
  873. self.log.debug(f"{user.mxid} was kicked by {sender.number} from {self.mxid}")
  874. await self.main_intent.kick_user(self.mxid, user.mxid, f"{sender.name} kicked you")
  875. @staticmethod
  876. async def _make_media_content(
  877. attachment: Attachment, data: bytes
  878. ) -> tuple[MediaMessageEventContent, bytes]:
  879. if attachment.content_type.startswith("image/"):
  880. msgtype = MessageType.IMAGE
  881. info = ImageInfo(
  882. mimetype=attachment.content_type, width=attachment.width, height=attachment.height
  883. )
  884. elif attachment.content_type.startswith("video/"):
  885. msgtype = MessageType.VIDEO
  886. info = VideoInfo(
  887. mimetype=attachment.content_type, width=attachment.width, height=attachment.height
  888. )
  889. elif attachment.voice_note or attachment.content_type.startswith("audio/"):
  890. msgtype = MessageType.AUDIO
  891. info = AudioInfo(
  892. mimetype=attachment.content_type if not attachment.voice_note else "audio/ogg"
  893. )
  894. else:
  895. msgtype = MessageType.FILE
  896. info = FileInfo(mimetype=attachment.content_type)
  897. if not attachment.custom_filename:
  898. ext = mimetypes.guess_extension(info.mimetype) or ""
  899. attachment.custom_filename = attachment.id + ext
  900. else:
  901. for ext in mimetypes.guess_all_extensions(info.mimetype):
  902. if attachment.custom_filename.endswith(ext):
  903. break
  904. else:
  905. attachment.custom_filename += mimetypes.guess_extension(info.mimetype) or ""
  906. if attachment.blurhash:
  907. info["blurhash"] = attachment.blurhash
  908. info["xyz.amorgan.blurhash"] = attachment.blurhash
  909. content = MediaMessageEventContent(
  910. msgtype=msgtype, info=info, body=attachment.custom_filename
  911. )
  912. # If this is a voice note, add the additional voice message metadata and convert to OGG.
  913. if attachment.voice_note:
  914. content["org.matrix.msc1767.file"] = {
  915. "url": content.url,
  916. "name": content.body,
  917. **(content.file.serialize() if content.file else {}),
  918. **(content.info.serialize() if content.info else {}),
  919. }
  920. content["org.matrix.msc3245.voice"] = {}
  921. data = await ffmpeg.convert_bytes(
  922. data, ".ogg", output_args=("-c:a", "libopus"), input_mime=attachment.content_type
  923. )
  924. return content, data
  925. async def _handle_signal_attachment(
  926. self, intent: IntentAPI, attachment: Attachment, sticker: bool = False, text: bool = False
  927. ) -> MediaMessageEventContent | TextMessageEventContent:
  928. self.log.trace(f"Reuploading attachment {attachment}")
  929. if not attachment.content_type:
  930. attachment.content_type = (
  931. magic.mimetype(attachment.incoming_filename)
  932. if magic is not None
  933. else "application/octet-stream"
  934. )
  935. with open(attachment.incoming_filename, "rb") as file:
  936. data = file.read()
  937. if self.config["signal.remove_file_after_handling"]:
  938. os.remove(attachment.incoming_filename)
  939. if text:
  940. assert attachment.content_type == "text/x-signal-plain"
  941. assert attachment.size < MAX_MATRIX_MESSAGE_SIZE
  942. content = TextMessageEventContent(msgtype=MessageType.TEXT, body=data.decode("utf-8"))
  943. return content
  944. content, data = await self._make_media_content(attachment, data)
  945. if sticker:
  946. self._adjust_sticker_size(content.info)
  947. await self._upload_attachment(intent, content, data, attachment.id)
  948. return content
  949. @staticmethod
  950. async def _handle_signal_contact(contact: SharedContact) -> TextMessageEventContent:
  951. msg = f"Shared contact: {contact.name!s}"
  952. if contact.phone:
  953. msg += "\n"
  954. for phone in contact.phone:
  955. msg += f"\nPhone: {phone.value} ({phone.type_or_label})"
  956. if contact.email:
  957. msg += "\n"
  958. for email in contact.email:
  959. msg += f"\nEmail: {email.value} ({email.type_or_label})"
  960. content = TextMessageEventContent(msgtype=MessageType.TEXT, body=msg)
  961. content["fi.mau.signal.contact"] = contact.serialize()
  962. return content
  963. async def _add_sticker_meta(self, sticker: Sticker, content: MediaMessageEventContent) -> None:
  964. try:
  965. pack = self._sticker_meta_cache[sticker.pack_id]
  966. except KeyError:
  967. self.log.debug(f"Fetching sticker pack metadata for {sticker.pack_id}")
  968. try:
  969. async with StickersClient() as client:
  970. pack = await client.get_pack_metadata(sticker.pack_id, sticker.pack_key)
  971. self._sticker_meta_cache[sticker.pack_id] = pack
  972. except Exception:
  973. self.log.warning(
  974. f"Failed to fetch pack metadata for {sticker.pack_id}", exc_info=True
  975. )
  976. pack = None
  977. if not pack:
  978. content.info["fi.mau.signal.sticker"] = {
  979. "id": sticker.sticker_id,
  980. "pack": {
  981. "id": sticker.pack_id,
  982. "key": sticker.pack_key,
  983. },
  984. }
  985. return
  986. sticker_meta = pack.stickers[sticker.sticker_id]
  987. content.body = sticker_meta.emoji
  988. content.info["fi.mau.signal.sticker"] = {
  989. "id": sticker.sticker_id,
  990. "emoji": sticker_meta.emoji,
  991. "pack": {
  992. "id": pack.id,
  993. "key": pack.key,
  994. "title": pack.title,
  995. "author": pack.author,
  996. },
  997. }
  998. @staticmethod
  999. def _adjust_sticker_size(info: ImageInfo) -> None:
  1000. if info.width > 256 or info.height > 256:
  1001. if info.width == info.height:
  1002. info.width = info.height = 256
  1003. elif info.width > info.height:
  1004. info.height = int(info.height / (info.width / 256))
  1005. info.width = 256
  1006. else:
  1007. info.width = int(info.width / (info.height / 256))
  1008. info.height = 256
  1009. async def _handle_signal_sticker(
  1010. self, intent: IntentAPI, sticker: Sticker
  1011. ) -> MediaMessageEventContent | None:
  1012. try:
  1013. self.log.debug(f"Fetching sticker {sticker.pack_id}#{sticker.sticker_id}")
  1014. async with StickersClient() as client:
  1015. data = await client.download_sticker(
  1016. sticker.sticker_id, sticker.pack_id, sticker.pack_key
  1017. )
  1018. except Exception:
  1019. self.log.warning(f"Failed to download sticker {sticker.sticker_id}", exc_info=True)
  1020. return None
  1021. info = ImageInfo(
  1022. mimetype=sticker.attachment.content_type,
  1023. size=len(data),
  1024. width=sticker.attachment.width,
  1025. height=sticker.attachment.height,
  1026. )
  1027. self._adjust_sticker_size(info)
  1028. if magic:
  1029. info.mimetype = magic.mimetype(data)
  1030. ext = mimetypes.guess_extension(info.mimetype)
  1031. if not ext and info.mimetype == "image/webp":
  1032. ext = ".webp"
  1033. content = MediaMessageEventContent(
  1034. msgtype=MessageType.IMAGE, info=info, body=f"sticker{ext}"
  1035. )
  1036. await self._upload_attachment(intent, content, data, sticker.attachment.id)
  1037. return content
  1038. async def _upload_attachment(
  1039. self, intent: IntentAPI, content: MediaMessageEventContent, data: bytes, id: str
  1040. ) -> None:
  1041. upload_mime_type = content.info.mimetype
  1042. if self.encrypted and encrypt_attachment:
  1043. data, content.file = encrypt_attachment(data)
  1044. upload_mime_type = "application/octet-stream"
  1045. content.url = await intent.upload_media(data, mime_type=upload_mime_type, filename=id)
  1046. if content.file:
  1047. content.file.url = content.url
  1048. content.url = None
  1049. # This is a hack for bad clients like Element iOS that require a thumbnail
  1050. if content.info.mimetype.startswith("image/"):
  1051. if content.file:
  1052. content.info.thumbnail_file = content.file
  1053. elif content.url:
  1054. content.info.thumbnail_url = content.url
  1055. async def handle_signal_reaction(
  1056. self, sender: p.Puppet, reaction: Reaction, timestamp: int
  1057. ) -> None:
  1058. author_address = await self._resolve_address(reaction.target_author)
  1059. target_id = reaction.target_sent_timestamp
  1060. async with self._reaction_lock:
  1061. dedup_id = (author_address, target_id, reaction.emoji, sender.address, reaction.remove)
  1062. if dedup_id in self._reaction_dedup:
  1063. return
  1064. self._reaction_dedup.appendleft(dedup_id)
  1065. existing = await DBReaction.get_by_signal_id(
  1066. self.chat_id, self.receiver, author_address, target_id, sender.address
  1067. )
  1068. if reaction.remove:
  1069. if existing:
  1070. try:
  1071. await sender.intent_for(self).redact(existing.mx_room, existing.mxid)
  1072. except IntentError:
  1073. await self.main_intent.redact(existing.mx_room, existing.mxid)
  1074. await existing.delete()
  1075. self.log.trace(f"Removed {existing} after Signal removal")
  1076. return
  1077. elif existing and existing.emoji == reaction.emoji:
  1078. return
  1079. message = await DBMessage.get_by_signal_id(
  1080. author_address, target_id, self.chat_id, self.receiver
  1081. )
  1082. if not message:
  1083. self.log.debug(f"Ignoring reaction to unknown message {target_id}")
  1084. return
  1085. intent = sender.intent_for(self)
  1086. matrix_emoji = variation_selector.add(reaction.emoji)
  1087. mxid = await intent.react(message.mx_room, message.mxid, matrix_emoji, timestamp=timestamp)
  1088. self.log.debug(f"{sender.address} reacted to {message.mxid} -> {mxid}")
  1089. await self._upsert_reaction(existing, intent, mxid, sender, message, reaction.emoji)
  1090. async def handle_signal_delete(self, sender: p.Puppet, message_ts: int) -> None:
  1091. message = await DBMessage.get_by_signal_id(
  1092. sender.address, message_ts, self.chat_id, self.receiver
  1093. )
  1094. if not message:
  1095. return
  1096. await message.delete()
  1097. try:
  1098. await sender.intent_for(self).redact(message.mx_room, message.mxid)
  1099. except MForbidden:
  1100. await self.main_intent.redact(message.mx_room, message.mxid)
  1101. # endregion
  1102. # region Updating portal info
  1103. async def update_info(
  1104. self, source: u.User, info: ChatInfo, sender: p.Puppet | None = None
  1105. ) -> None:
  1106. if self.is_direct:
  1107. if not isinstance(info, (Contact, Profile, Address)):
  1108. raise ValueError(f"Unexpected type for direct chat update_info: {type(info)}")
  1109. if not self.name:
  1110. puppet = await p.Puppet.get_by_address(self.chat_id)
  1111. if not puppet.name:
  1112. await puppet.update_info(info)
  1113. self.name = puppet.name
  1114. return
  1115. if isinstance(info, GroupV2ID):
  1116. info = await self.signal.get_group(source.username, info.id, info.revision or -1)
  1117. if not info:
  1118. self.log.debug(
  1119. f"Failed to get full group v2 info through {source.username}, "
  1120. "cancelling update"
  1121. )
  1122. return
  1123. changed = False
  1124. if isinstance(info, Group):
  1125. changed = await self._update_name(info.name, sender) or changed
  1126. elif isinstance(info, GroupV2):
  1127. if self.revision < info.revision:
  1128. self.revision = info.revision
  1129. changed = True
  1130. elif self.revision > info.revision:
  1131. self.log.warning(
  1132. f"Got outdated info when syncing through {source.username} "
  1133. f"({info.revision} < {self.revision}), ignoring..."
  1134. )
  1135. return
  1136. changed = await self._update_name(info.title, sender) or changed
  1137. elif isinstance(info, GroupV2ID):
  1138. return
  1139. else:
  1140. raise ValueError(f"Unexpected type for group update_info: {type(info)}")
  1141. changed = await self._update_avatar(info, sender) or changed
  1142. await self._update_participants(source, info)
  1143. try:
  1144. await self._update_power_levels(info)
  1145. except Exception:
  1146. self.log.warning("Error updating power levels", exc_info=True)
  1147. if changed:
  1148. await self.update_bridge_info()
  1149. await self.update()
  1150. async def update_expires_in_seconds(self, sender: p.Puppet, expires_in_seconds: int) -> None:
  1151. if expires_in_seconds == 0:
  1152. expires_in_seconds = None
  1153. if self.expiration_time == expires_in_seconds:
  1154. return
  1155. assert self.mxid
  1156. self.expiration_time = expires_in_seconds
  1157. await self.update()
  1158. time_str = "Off" if expires_in_seconds is None else format_duration(expires_in_seconds)
  1159. body = f"Set the disappearing message timer to {time_str}"
  1160. content = TextMessageEventContent(msgtype=MessageType.NOTICE, body=body)
  1161. await self._send_message(sender.intent_for(self), content)
  1162. async def update_puppet_avatar(self, new_hash: str, avatar_url: ContentURI) -> None:
  1163. if not self.encrypted and not self.private_chat_portal_meta:
  1164. return
  1165. if self.avatar_hash != new_hash or not self.avatar_set:
  1166. self.avatar_hash = new_hash
  1167. self.avatar_url = avatar_url
  1168. if self.mxid:
  1169. try:
  1170. await self.main_intent.set_room_avatar(self.mxid, avatar_url)
  1171. self.avatar_set = True
  1172. except Exception:
  1173. self.log.exception("Error setting avatar")
  1174. self.avatar_set = False
  1175. await self.update_bridge_info()
  1176. await self.update()
  1177. async def update_puppet_name(self, name: str) -> None:
  1178. if not self.encrypted and not self.private_chat_portal_meta:
  1179. return
  1180. changed = await self._update_name(name)
  1181. if changed:
  1182. await self.update_bridge_info()
  1183. await self.update()
  1184. async def _update_name(self, name: str, sender: p.Puppet | None = None) -> bool:
  1185. if self.name != name or not self.name_set:
  1186. self.name = name
  1187. if self.mxid:
  1188. try:
  1189. await self._try_with_puppet(
  1190. lambda i: i.set_room_name(self.mxid, self.name), puppet=sender
  1191. )
  1192. self.name_set = True
  1193. except Exception:
  1194. self.log.exception("Error setting name")
  1195. self.name_set = False
  1196. return True
  1197. return False
  1198. async def _try_with_puppet(
  1199. self, action: Callable[[IntentAPI], Awaitable[Any]], puppet: p.Puppet | None = None
  1200. ) -> None:
  1201. if puppet:
  1202. try:
  1203. await action(puppet.intent_for(self))
  1204. except (MForbidden, IntentError):
  1205. await action(self.main_intent)
  1206. else:
  1207. await action(self.main_intent)
  1208. async def _update_avatar(self, info: ChatInfo, sender: p.Puppet | None = None) -> bool:
  1209. path = None
  1210. if isinstance(info, GroupV2):
  1211. path = info.avatar
  1212. elif isinstance(info, Group):
  1213. path = f"group-{self.chat_id}"
  1214. res = await p.Puppet.upload_avatar(self, path, self.main_intent)
  1215. if res is False:
  1216. return False
  1217. self.avatar_hash, self.avatar_url = res
  1218. if not self.mxid:
  1219. return True
  1220. try:
  1221. await self._try_with_puppet(
  1222. lambda i: i.set_room_avatar(self.mxid, self.avatar_url), puppet=sender
  1223. )
  1224. self.avatar_set = True
  1225. except Exception:
  1226. self.log.exception("Error setting avatar")
  1227. self.avatar_set = False
  1228. return True
  1229. async def _update_participants(self, source: u.User, info: ChatInfo) -> None:
  1230. if not self.mxid or not isinstance(info, (Group, GroupV2)):
  1231. return
  1232. pending_members = info.pending_members if isinstance(info, GroupV2) else []
  1233. self._pending_members = {addr.uuid for addr in pending_members}
  1234. for address in info.members:
  1235. user = await u.User.get_by_address(address)
  1236. if user:
  1237. await self.main_intent.invite_user(self.mxid, user.mxid)
  1238. puppet = await p.Puppet.get_by_address(address)
  1239. await source.sync_contact(address)
  1240. await puppet.intent_for(self).ensure_joined(self.mxid)
  1241. for address in pending_members:
  1242. user = await u.User.get_by_address(address)
  1243. if user:
  1244. await self.main_intent.invite_user(self.mxid, user.mxid)
  1245. puppet = await p.Puppet.get_by_address(address)
  1246. await source.sync_contact(address)
  1247. await self.main_intent.invite_user(self.mxid, puppet.intent_for(self).mxid)
  1248. async def _update_power_levels(self, info: ChatInfo) -> None:
  1249. if not self.mxid:
  1250. return
  1251. power_levels = await self.main_intent.get_power_levels(self.mxid)
  1252. power_levels = await self._get_power_levels(power_levels, info=info, is_initial=False)
  1253. await self.main_intent.set_power_levels(self.mxid, power_levels)
  1254. # endregion
  1255. # region Bridge info state event
  1256. @property
  1257. def bridge_info_state_key(self) -> str:
  1258. return f"net.maunium.signal://signal/{self.chat_id}"
  1259. @property
  1260. def bridge_info(self) -> dict[str, Any]:
  1261. return {
  1262. "bridgebot": self.az.bot_mxid,
  1263. "creator": self.main_intent.mxid,
  1264. "protocol": {
  1265. "id": "signal",
  1266. "displayname": "Signal",
  1267. "avatar_url": self.config["appservice.bot_avatar"],
  1268. },
  1269. "channel": {
  1270. "id": str(self.chat_id),
  1271. "displayname": self.name,
  1272. "avatar_url": self.avatar_url,
  1273. },
  1274. }
  1275. async def update_bridge_info(self) -> None:
  1276. if not self.mxid:
  1277. self.log.debug("Not updating bridge info: no Matrix room created")
  1278. return
  1279. try:
  1280. self.log.debug("Updating bridge info...")
  1281. await self.main_intent.send_state_event(
  1282. self.mxid, StateBridge, self.bridge_info, self.bridge_info_state_key
  1283. )
  1284. # TODO remove this once https://github.com/matrix-org/matrix-doc/pull/2346 is in spec
  1285. await self.main_intent.send_state_event(
  1286. self.mxid, StateHalfShotBridge, self.bridge_info, self.bridge_info_state_key
  1287. )
  1288. except Exception:
  1289. self.log.warning("Failed to update bridge info", exc_info=True)
  1290. # endregion
  1291. # region Creating Matrix rooms
  1292. async def update_matrix_room(self, source: u.User, info: ChatInfo) -> None:
  1293. if not self.is_direct and not isinstance(info, (Group, GroupV2, GroupV2ID)):
  1294. raise ValueError(f"Unexpected type for updating group portal: {type(info)}")
  1295. elif self.is_direct and not isinstance(info, (Contact, Profile, Address)):
  1296. raise ValueError(f"Unexpected type for updating direct chat portal: {type(info)}")
  1297. try:
  1298. await self._update_matrix_room(source, info)
  1299. except Exception:
  1300. self.log.exception("Failed to update portal")
  1301. async def create_matrix_room(self, source: u.User, info: ChatInfo) -> RoomID | None:
  1302. if not self.is_direct and not isinstance(info, (Group, GroupV2, GroupV2ID)):
  1303. raise ValueError(f"Unexpected type for creating group portal: {type(info)}")
  1304. elif self.is_direct and not isinstance(info, (Contact, Profile, Address)):
  1305. raise ValueError(f"Unexpected type for creating direct chat portal: {type(info)}")
  1306. if isinstance(info, Group) and not info.members:
  1307. groups = await self.signal.list_groups(source.username)
  1308. info = next(
  1309. (g for g in groups if isinstance(g, Group) and g.group_id == info.group_id), info
  1310. )
  1311. elif isinstance(info, GroupV2ID) and not isinstance(info, GroupV2):
  1312. self.log.debug(
  1313. f"create_matrix_room() called with {info}, fetching full info from signald"
  1314. )
  1315. info = await self.signal.get_group(source.username, info.id, info.revision or -1)
  1316. if not info:
  1317. self.log.warning(f"Full info not found, canceling room creation")
  1318. return None
  1319. else:
  1320. self.log.trace("get_group() returned full info: %s", info)
  1321. if self.mxid:
  1322. await self.update_matrix_room(source, info)
  1323. return self.mxid
  1324. async with self._create_room_lock:
  1325. return await self._create_matrix_room(source, info)
  1326. def _get_invite_content(self, double_puppet: p.Puppet | None) -> dict[str, Any]:
  1327. invite_content = {}
  1328. if double_puppet:
  1329. invite_content["fi.mau.will_auto_accept"] = True
  1330. if self.is_direct:
  1331. invite_content["is_direct"] = True
  1332. return invite_content
  1333. async def _update_matrix_room(self, source: u.User, info: ChatInfo) -> None:
  1334. puppet = await p.Puppet.get_by_custom_mxid(source.mxid)
  1335. await self.main_intent.invite_user(
  1336. self.mxid,
  1337. source.mxid,
  1338. check_cache=True,
  1339. extra_content=self._get_invite_content(puppet),
  1340. )
  1341. if puppet:
  1342. did_join = await puppet.intent.ensure_joined(self.mxid)
  1343. if did_join and self.is_direct:
  1344. await source.update_direct_chats({self.main_intent.mxid: [self.mxid]})
  1345. await self.update_info(source, info)
  1346. async def _get_power_levels(
  1347. self,
  1348. levels: PowerLevelStateEventContent | None = None,
  1349. info: ChatInfo | None = None,
  1350. is_initial: bool = False,
  1351. ) -> PowerLevelStateEventContent:
  1352. levels = levels or PowerLevelStateEventContent()
  1353. if self.is_direct:
  1354. levels.ban = 99
  1355. levels.kick = 99
  1356. levels.invite = 99
  1357. levels.state_default = 0
  1358. meta_edit_level = 0
  1359. else:
  1360. if isinstance(info, GroupV2):
  1361. ac = info.access_control
  1362. for detail in info.member_detail + info.pending_member_detail:
  1363. puppet = await p.Puppet.get_by_address(Address(uuid=detail.uuid))
  1364. level = 50 if detail.role == GroupMemberRole.ADMINISTRATOR else 0
  1365. levels.users[puppet.intent_for(self).mxid] = level
  1366. else:
  1367. ac = GroupAccessControl()
  1368. levels.ban = 50
  1369. levels.kick = 50
  1370. levels.invite = 50 if ac.members == AccessControlMode.ADMINISTRATOR else 0
  1371. levels.state_default = 50
  1372. meta_edit_level = 50 if ac.attributes == AccessControlMode.ADMINISTRATOR else 0
  1373. levels.events[EventType.ROOM_NAME] = meta_edit_level
  1374. levels.events[EventType.ROOM_AVATAR] = meta_edit_level
  1375. levels.events[EventType.ROOM_TOPIC] = meta_edit_level
  1376. levels.events[EventType.ROOM_ENCRYPTION] = 50 if self.matrix.e2ee else 99
  1377. levels.events[EventType.ROOM_TOMBSTONE] = 99
  1378. levels.users_default = 0
  1379. levels.events_default = 0
  1380. # Remote delete is only for your own messages
  1381. levels.redact = 99
  1382. if self.main_intent.mxid not in levels.users:
  1383. levels.users[self.main_intent.mxid] = 9001 if is_initial else 100
  1384. return levels
  1385. async def _create_matrix_room(self, source: u.User, info: ChatInfo) -> RoomID | None:
  1386. if self.mxid:
  1387. await self._update_matrix_room(source, info)
  1388. return self.mxid
  1389. await self.update_info(source, info)
  1390. self.log.debug("Creating Matrix room")
  1391. name: str | None = None
  1392. power_levels = await self._get_power_levels(info=info, is_initial=True)
  1393. initial_state = [
  1394. {
  1395. "type": str(StateBridge),
  1396. "state_key": self.bridge_info_state_key,
  1397. "content": self.bridge_info,
  1398. },
  1399. {
  1400. # TODO remove this once https://github.com/matrix-org/matrix-doc/pull/2346 is in spec
  1401. "type": str(StateHalfShotBridge),
  1402. "state_key": self.bridge_info_state_key,
  1403. "content": self.bridge_info,
  1404. },
  1405. {
  1406. "type": str(EventType.ROOM_POWER_LEVELS),
  1407. "content": power_levels.serialize(),
  1408. },
  1409. ]
  1410. invites = []
  1411. if self.config["bridge.encryption.default"] and self.matrix.e2ee:
  1412. self.encrypted = True
  1413. initial_state.append(
  1414. {
  1415. "type": str(EventType.ROOM_ENCRYPTION),
  1416. "content": {"algorithm": "m.megolm.v1.aes-sha2"},
  1417. }
  1418. )
  1419. if self.is_direct:
  1420. invites.append(self.az.bot_mxid)
  1421. if self.is_direct and source.address == self.chat_id:
  1422. name = self.name = "Signal Note to Self"
  1423. elif self.encrypted or self.private_chat_portal_meta or not self.is_direct:
  1424. name = self.name
  1425. if self.avatar_url:
  1426. initial_state.append(
  1427. {
  1428. "type": str(EventType.ROOM_AVATAR),
  1429. "content": {"url": self.avatar_url},
  1430. }
  1431. )
  1432. creation_content = {}
  1433. if not self.config["bridge.federate_rooms"]:
  1434. creation_content["m.federate"] = False
  1435. self.mxid = await self.main_intent.create_room(
  1436. name=name,
  1437. is_direct=self.is_direct,
  1438. initial_state=initial_state,
  1439. invitees=invites,
  1440. creation_content=creation_content,
  1441. # Make sure the power level event in initial_state is allowed
  1442. # even if the server sends a default power level event before it.
  1443. # TODO remove this if the spec is changed to require servers to
  1444. # use the power level event in initial_state
  1445. power_level_override={"users": {self.main_intent.mxid: 9001}},
  1446. )
  1447. if not self.mxid:
  1448. raise Exception("Failed to create room: no mxid returned")
  1449. self.name_set = bool(name)
  1450. self.avatar_set = bool(self.avatar_url)
  1451. if self.encrypted and self.matrix.e2ee and self.is_direct:
  1452. try:
  1453. await self.az.intent.ensure_joined(self.mxid)
  1454. except Exception:
  1455. self.log.warning("Failed to add bridge bot to new private chat {self.mxid}")
  1456. puppet = await p.Puppet.get_by_custom_mxid(source.mxid)
  1457. await self.main_intent.invite_user(
  1458. self.mxid, source.mxid, extra_content=self._get_invite_content(puppet)
  1459. )
  1460. if puppet:
  1461. try:
  1462. await source.update_direct_chats({self.main_intent.mxid: [self.mxid]})
  1463. await puppet.intent.join_room_by_id(self.mxid)
  1464. except MatrixError:
  1465. self.log.debug(
  1466. "Failed to join custom puppet into newly created portal", exc_info=True
  1467. )
  1468. await self.update()
  1469. self.log.debug(f"Matrix room created: {self.mxid}")
  1470. self.by_mxid[self.mxid] = self
  1471. if not self.is_direct:
  1472. await self._update_participants(source, info)
  1473. return self.mxid
  1474. # endregion
  1475. # region Database getters
  1476. async def _postinit(self) -> None:
  1477. self.by_chat_id[(self.chat_id_str, self.receiver)] = self
  1478. if self.mxid:
  1479. self.by_mxid[self.mxid] = self
  1480. if self.is_direct:
  1481. puppet = await p.Puppet.get_by_address(self.chat_id)
  1482. self._main_intent = puppet.default_mxid_intent
  1483. elif not self.is_direct:
  1484. self._main_intent = self.az.intent
  1485. async def delete(self) -> None:
  1486. await DBMessage.delete_all(self.mxid)
  1487. self.by_mxid.pop(self.mxid, None)
  1488. self.mxid = None
  1489. self.encrypted = False
  1490. await self.update()
  1491. async def save(self) -> None:
  1492. await self.update()
  1493. @classmethod
  1494. def all_with_room(cls) -> AsyncGenerator[Portal, None]:
  1495. return cls._db_to_portals(super().all_with_room())
  1496. @classmethod
  1497. def find_private_chats_with(cls, other_user: Address) -> AsyncGenerator[Portal, None]:
  1498. return cls._db_to_portals(super().find_private_chats_with(other_user))
  1499. @classmethod
  1500. async def _db_to_portals(cls, query: Awaitable[list[Portal]]) -> AsyncGenerator[Portal, None]:
  1501. portals = await query
  1502. for index, portal in enumerate(portals):
  1503. try:
  1504. yield cls.by_chat_id[(portal.chat_id_str, portal.receiver)]
  1505. except KeyError:
  1506. await portal._postinit()
  1507. yield portal
  1508. @classmethod
  1509. @async_getter_lock
  1510. async def get_by_mxid(cls, mxid: RoomID) -> Portal | None:
  1511. try:
  1512. return cls.by_mxid[mxid]
  1513. except KeyError:
  1514. pass
  1515. portal = cast(cls, await super().get_by_mxid(mxid))
  1516. if portal is not None:
  1517. await portal._postinit()
  1518. return portal
  1519. return None
  1520. @classmethod
  1521. async def get_by_chat_id(
  1522. cls, chat_id: GroupID | Address, *, receiver: str = "", create: bool = False
  1523. ) -> Portal | None:
  1524. if isinstance(chat_id, str):
  1525. receiver = ""
  1526. elif not isinstance(chat_id, Address):
  1527. raise ValueError(f"Invalid chat ID type {type(chat_id)}")
  1528. elif not receiver:
  1529. raise ValueError("Direct chats must have a receiver")
  1530. best_id = id_to_str(chat_id)
  1531. portal = await cls._get_by_chat_id(best_id, receiver, create=create, chat_id=chat_id)
  1532. if portal:
  1533. portal.log.debug(f"get_by_chat_id({chat_id}, {receiver}) -> {hex(id(portal))}")
  1534. return portal
  1535. @classmethod
  1536. @async_getter_lock
  1537. async def _get_by_chat_id(
  1538. cls, best_id: str, receiver: str, *, create: bool, chat_id: GroupID | Address
  1539. ) -> Portal | None:
  1540. try:
  1541. return cls.by_chat_id[(best_id, receiver)]
  1542. except KeyError:
  1543. pass
  1544. portal = cast(cls, await super().get_by_chat_id(chat_id, receiver))
  1545. if portal is not None:
  1546. await portal._postinit()
  1547. return portal
  1548. if create:
  1549. portal = cls(chat_id, receiver)
  1550. await portal.insert()
  1551. await portal._postinit()
  1552. return portal
  1553. return None
  1554. # endregion