matrix.go 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477
  1. // mautrix-whatsapp - A Matrix-WhatsApp puppeting bridge.
  2. // Copyright (C) 2020 Tulir Asokan
  3. //
  4. // This program is free software: you can redistribute it and/or modify
  5. // it under the terms of the GNU Affero General Public License as published by
  6. // the Free Software Foundation, either version 3 of the License, or
  7. // (at your option) any later version.
  8. //
  9. // This program is distributed in the hope that it will be useful,
  10. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. // GNU Affero General Public License for more details.
  13. //
  14. // You should have received a copy of the GNU Affero General Public License
  15. // along with this program. If not, see <https://www.gnu.org/licenses/>.
  16. package main
  17. import (
  18. "errors"
  19. "fmt"
  20. "strings"
  21. "time"
  22. "maunium.net/go/maulogger/v2"
  23. "maunium.net/go/mautrix"
  24. "maunium.net/go/mautrix/appservice"
  25. "maunium.net/go/mautrix/event"
  26. "maunium.net/go/mautrix/format"
  27. "maunium.net/go/mautrix/id"
  28. "maunium.net/go/mautrix-whatsapp/database"
  29. )
  30. type MatrixHandler struct {
  31. bridge *Bridge
  32. as *appservice.AppService
  33. log maulogger.Logger
  34. cmd *CommandHandler
  35. }
  36. func NewMatrixHandler(bridge *Bridge) *MatrixHandler {
  37. handler := &MatrixHandler{
  38. bridge: bridge,
  39. as: bridge.AS,
  40. log: bridge.Log.Sub("Matrix"),
  41. cmd: NewCommandHandler(bridge),
  42. }
  43. bridge.EventProcessor.On(event.EventMessage, handler.HandleMessage)
  44. bridge.EventProcessor.On(event.EventEncrypted, handler.HandleEncrypted)
  45. bridge.EventProcessor.On(event.EventSticker, handler.HandleMessage)
  46. bridge.EventProcessor.On(event.EventRedaction, handler.HandleRedaction)
  47. bridge.EventProcessor.On(event.StateMember, handler.HandleMembership)
  48. bridge.EventProcessor.On(event.StateRoomName, handler.HandleRoomMetadata)
  49. bridge.EventProcessor.On(event.StateRoomAvatar, handler.HandleRoomMetadata)
  50. bridge.EventProcessor.On(event.StateTopic, handler.HandleRoomMetadata)
  51. bridge.EventProcessor.On(event.StateEncryption, handler.HandleEncryption)
  52. return handler
  53. }
  54. func (mx *MatrixHandler) HandleEncryption(evt *event.Event) {
  55. defer mx.bridge.Metrics.TrackMatrixEvent(evt.Type)()
  56. if evt.Content.AsEncryption().Algorithm != id.AlgorithmMegolmV1 {
  57. return
  58. }
  59. portal := mx.bridge.GetPortalByMXID(evt.RoomID)
  60. if portal != nil && !portal.Encrypted {
  61. mx.log.Debugfln("%s enabled encryption in %s", evt.Sender, evt.RoomID)
  62. portal.Encrypted = true
  63. portal.Update()
  64. }
  65. }
  66. func (mx *MatrixHandler) joinAndCheckMembers(evt *event.Event, intent *appservice.IntentAPI) *mautrix.RespJoinedMembers {
  67. resp, err := intent.JoinRoomByID(evt.RoomID)
  68. if err != nil {
  69. mx.log.Debugfln("Failed to join room %s as %s with invite from %s: %v", evt.RoomID, intent.UserID, evt.Sender, err)
  70. return nil
  71. }
  72. members, err := intent.JoinedMembers(resp.RoomID)
  73. if err != nil {
  74. mx.log.Debugfln("Failed to get members in room %s after accepting invite from %s as %s: %v", resp.RoomID, evt.Sender, intent.UserID, err)
  75. _, _ = intent.LeaveRoom(resp.RoomID)
  76. return nil
  77. }
  78. if len(members.Joined) < 2 {
  79. mx.log.Debugln("Leaving empty room", resp.RoomID, "after accepting invite from", evt.Sender, "as", intent.UserID)
  80. _, _ = intent.LeaveRoom(resp.RoomID)
  81. return nil
  82. }
  83. return members
  84. }
  85. func (mx *MatrixHandler) sendNoticeWithMarkdown(roomID id.RoomID, message string) (*mautrix.RespSendEvent, error) {
  86. intent := mx.as.BotIntent()
  87. content := format.RenderMarkdown(message, true, false)
  88. content.MsgType = event.MsgNotice
  89. return intent.SendMessageEvent(roomID, event.EventMessage, content)
  90. }
  91. func (mx *MatrixHandler) HandleBotInvite(evt *event.Event) {
  92. intent := mx.as.BotIntent()
  93. user := mx.bridge.GetUserByMXID(evt.Sender)
  94. if user == nil {
  95. return
  96. }
  97. members := mx.joinAndCheckMembers(evt, intent)
  98. if members == nil {
  99. return
  100. }
  101. if !user.Whitelisted {
  102. _, _ = intent.SendNotice(evt.RoomID, "You are not whitelisted to use this bridge.\n"+
  103. "If you're the owner of this bridge, see the bridge.permissions section in your config file.")
  104. _, _ = intent.LeaveRoom(evt.RoomID)
  105. return
  106. }
  107. if evt.RoomID == mx.bridge.Config.Bridge.Relaybot.ManagementRoom {
  108. _, _ = intent.SendNotice(evt.RoomID, "This is the relaybot management room. Send `!wa help` to get a list of commands.")
  109. mx.log.Debugln("Joined relaybot management room", evt.RoomID, "after invite from", evt.Sender)
  110. return
  111. }
  112. hasPuppets := false
  113. for mxid, _ := range members.Joined {
  114. if mxid == intent.UserID || mxid == evt.Sender {
  115. continue
  116. } else if _, ok := mx.bridge.ParsePuppetMXID(mxid); ok {
  117. hasPuppets = true
  118. continue
  119. }
  120. mx.log.Debugln("Leaving multi-user room", evt.RoomID, "after accepting invite from", evt.Sender)
  121. _, _ = intent.SendNotice(evt.RoomID, "This bridge is user-specific, please don't invite me into rooms with other users.")
  122. _, _ = intent.LeaveRoom(evt.RoomID)
  123. return
  124. }
  125. _, _ = mx.sendNoticeWithMarkdown(evt.RoomID, mx.bridge.Config.Bridge.ManagementRoomText.Welcome)
  126. if !hasPuppets && (len(user.ManagementRoom) == 0 || evt.Content.AsMember().IsDirect) {
  127. user.SetManagementRoom(evt.RoomID)
  128. _, _ = intent.SendNotice(user.ManagementRoom, "This room has been registered as your bridge management/status room.")
  129. mx.log.Debugln(evt.RoomID, "registered as a management room with", evt.Sender)
  130. }
  131. if evt.RoomID == user.ManagementRoom {
  132. if user.HasSession() {
  133. _, _ = mx.sendNoticeWithMarkdown(evt.RoomID, mx.bridge.Config.Bridge.ManagementRoomText.WelcomeConnected)
  134. } else {
  135. _, _ = mx.sendNoticeWithMarkdown(evt.RoomID, mx.bridge.Config.Bridge.ManagementRoomText.WelcomeUnconnected)
  136. }
  137. additionalHelp := mx.bridge.Config.Bridge.ManagementRoomText.AdditionalHelp
  138. if len(additionalHelp) > 0 {
  139. _, _ = mx.sendNoticeWithMarkdown(evt.RoomID, additionalHelp)
  140. }
  141. }
  142. }
  143. func (mx *MatrixHandler) handlePrivatePortal(roomID id.RoomID, inviter *User, puppet *Puppet, key database.PortalKey) {
  144. portal := mx.bridge.GetPortalByJID(key)
  145. if len(portal.MXID) == 0 {
  146. mx.createPrivatePortalFromInvite(roomID, inviter, puppet, portal)
  147. return
  148. }
  149. err := portal.MainIntent().EnsureInvited(portal.MXID, inviter.MXID)
  150. if err != nil {
  151. mx.log.Warnfln("Failed to invite %s to existing private chat portal %s with %s: %v. Redirecting portal to new room...", inviter.MXID, portal.MXID, puppet.JID, err)
  152. mx.createPrivatePortalFromInvite(roomID, inviter, puppet, portal)
  153. return
  154. }
  155. intent := puppet.DefaultIntent()
  156. errorMessage := fmt.Sprintf("You already have a private chat portal with me at [%[1]s](https://matrix.to/#/%[1]s)", portal.MXID)
  157. errorContent := format.RenderMarkdown(errorMessage, true, false)
  158. _, _ = intent.SendMessageEvent(roomID, event.EventMessage, errorContent)
  159. mx.log.Debugfln("Leaving private chat room %s as %s after accepting invite from %s as we already have chat with the user", roomID, puppet.MXID, inviter.MXID)
  160. _, _ = intent.LeaveRoom(roomID)
  161. }
  162. func (mx *MatrixHandler) createPrivatePortalFromInvite(roomID id.RoomID, inviter *User, puppet *Puppet, portal *Portal) {
  163. portal.MXID = roomID
  164. portal.Topic = PrivateChatTopic
  165. _, _ = portal.MainIntent().SetRoomTopic(portal.MXID, portal.Topic)
  166. if portal.bridge.Config.Bridge.PrivateChatPortalMeta {
  167. portal.Name = puppet.Displayname
  168. portal.AvatarURL = puppet.AvatarURL
  169. portal.Avatar = puppet.Avatar
  170. _, _ = portal.MainIntent().SetRoomName(portal.MXID, portal.Name)
  171. _, _ = portal.MainIntent().SetRoomAvatar(portal.MXID, portal.AvatarURL)
  172. } else {
  173. portal.Name = ""
  174. }
  175. portal.log.Infofln("Created private chat portal in %s after invite from %s", roomID, inviter.MXID)
  176. intent := puppet.DefaultIntent()
  177. if mx.bridge.Config.Bridge.Encryption.Default {
  178. _, err := intent.InviteUser(roomID, &mautrix.ReqInviteUser{UserID: mx.bridge.Bot.UserID})
  179. if err != nil {
  180. portal.log.Warnln("Failed to invite bridge bot to enable e2be:", err)
  181. }
  182. err = mx.bridge.Bot.EnsureJoined(roomID)
  183. if err != nil {
  184. portal.log.Warnln("Failed to join as bridge bot to enable e2be:", err)
  185. }
  186. _, err = intent.SendStateEvent(roomID, event.StateEncryption, "", &event.EncryptionEventContent{Algorithm: id.AlgorithmMegolmV1})
  187. if err != nil {
  188. portal.log.Warnln("Failed to enable e2be:", err)
  189. }
  190. mx.as.StateStore.SetMembership(roomID, inviter.MXID, event.MembershipJoin)
  191. mx.as.StateStore.SetMembership(roomID, puppet.MXID, event.MembershipJoin)
  192. mx.as.StateStore.SetMembership(roomID, mx.bridge.Bot.UserID, event.MembershipJoin)
  193. portal.Encrypted = true
  194. }
  195. portal.Update()
  196. portal.UpdateBridgeInfo()
  197. _, _ = intent.SendNotice(roomID, "Private chat portal created")
  198. err := portal.FillInitialHistory(inviter)
  199. if err != nil {
  200. portal.log.Errorln("Failed to fill history:", err)
  201. }
  202. inviter.addPortalToCommunity(portal)
  203. inviter.addPuppetToCommunity(puppet)
  204. }
  205. func (mx *MatrixHandler) HandlePuppetInvite(evt *event.Event, inviter *User, puppet *Puppet) {
  206. intent := puppet.DefaultIntent()
  207. members := mx.joinAndCheckMembers(evt, intent)
  208. if members == nil {
  209. return
  210. }
  211. var hasBridgeBot, hasOtherUsers bool
  212. for mxid, _ := range members.Joined {
  213. if mxid == intent.UserID || mxid == inviter.MXID {
  214. continue
  215. } else if mxid == mx.bridge.Bot.UserID {
  216. hasBridgeBot = true
  217. } else {
  218. hasOtherUsers = true
  219. }
  220. }
  221. if !hasBridgeBot && !hasOtherUsers {
  222. key := database.NewPortalKey(puppet.JID, inviter.JID)
  223. mx.handlePrivatePortal(evt.RoomID, inviter, puppet, key)
  224. } else if !hasBridgeBot {
  225. mx.log.Debugln("Leaving multi-user room", evt.RoomID, "as", puppet.MXID, "after accepting invite from", evt.Sender)
  226. _, _ = intent.SendNotice(evt.RoomID, "Please invite the bridge bot first if you want to bridge to a WhatsApp group.")
  227. _, _ = intent.LeaveRoom(evt.RoomID)
  228. } else {
  229. _, _ = intent.SendNotice(evt.RoomID, "This puppet will remain inactive until this room is bridged to a WhatsApp group.")
  230. }
  231. }
  232. func (mx *MatrixHandler) HandleMembership(evt *event.Event) {
  233. if _, isPuppet := mx.bridge.ParsePuppetMXID(evt.Sender); evt.Sender == mx.bridge.Bot.UserID || isPuppet {
  234. return
  235. }
  236. defer mx.bridge.Metrics.TrackMatrixEvent(evt.Type)()
  237. if mx.bridge.Crypto != nil {
  238. mx.bridge.Crypto.HandleMemberEvent(evt)
  239. }
  240. content := evt.Content.AsMember()
  241. if content.Membership == event.MembershipInvite && id.UserID(evt.GetStateKey()) == mx.as.BotMXID() {
  242. mx.HandleBotInvite(evt)
  243. return
  244. }
  245. if mx.shouldIgnoreEvent(evt) {
  246. return
  247. }
  248. user := mx.bridge.GetUserByMXID(evt.Sender)
  249. if user == nil || !user.Whitelisted || !user.IsConnected() {
  250. return
  251. }
  252. portal := mx.bridge.GetPortalByMXID(evt.RoomID)
  253. if portal == nil {
  254. puppet := mx.bridge.GetPuppetByMXID(id.UserID(evt.GetStateKey()))
  255. if content.Membership == event.MembershipInvite && puppet != nil {
  256. mx.HandlePuppetInvite(evt, user, puppet)
  257. }
  258. return
  259. }
  260. isSelf := id.UserID(evt.GetStateKey()) == evt.Sender
  261. if content.Membership == event.MembershipLeave {
  262. if isSelf {
  263. if evt.Unsigned.PrevContent != nil {
  264. _ = evt.Unsigned.PrevContent.ParseRaw(evt.Type)
  265. prevContent, ok := evt.Unsigned.PrevContent.Parsed.(*event.MemberEventContent)
  266. if ok {
  267. if portal.IsPrivateChat() || prevContent.Membership == "join" {
  268. portal.HandleMatrixLeave(user)
  269. }
  270. }
  271. }
  272. } else {
  273. portal.HandleMatrixKick(user, evt)
  274. }
  275. } else if content.Membership == event.MembershipInvite && !isSelf {
  276. portal.HandleMatrixInvite(user, evt)
  277. }
  278. }
  279. func (mx *MatrixHandler) HandleRoomMetadata(evt *event.Event) {
  280. defer mx.bridge.Metrics.TrackMatrixEvent(evt.Type)()
  281. if mx.shouldIgnoreEvent(evt) {
  282. return
  283. }
  284. user := mx.bridge.GetUserByMXID(evt.Sender)
  285. if user == nil || !user.Whitelisted || !user.IsConnected() {
  286. return
  287. }
  288. portal := mx.bridge.GetPortalByMXID(evt.RoomID)
  289. if portal == nil || portal.IsPrivateChat() {
  290. return
  291. }
  292. portal.HandleMatrixMeta(user, evt)
  293. }
  294. func (mx *MatrixHandler) shouldIgnoreEvent(evt *event.Event) bool {
  295. if _, isPuppet := mx.bridge.ParsePuppetMXID(evt.Sender); evt.Sender == mx.bridge.Bot.UserID || isPuppet {
  296. return true
  297. }
  298. isCustomPuppet, ok := evt.Content.Raw["net.maunium.whatsapp.puppet"].(bool)
  299. if ok && isCustomPuppet && mx.bridge.GetPuppetByCustomMXID(evt.Sender) != nil {
  300. return true
  301. }
  302. user := mx.bridge.GetUserByMXID(evt.Sender)
  303. if !user.RelaybotWhitelisted {
  304. return true
  305. }
  306. return false
  307. }
  308. const sessionWaitTimeout = 5 * time.Second
  309. func (mx *MatrixHandler) HandleEncrypted(evt *event.Event) {
  310. defer mx.bridge.Metrics.TrackMatrixEvent(evt.Type)()
  311. if mx.shouldIgnoreEvent(evt) || mx.bridge.Crypto == nil {
  312. return
  313. }
  314. decrypted, err := mx.bridge.Crypto.Decrypt(evt)
  315. if errors.Is(err, NoSessionFound) {
  316. content := evt.Content.AsEncrypted()
  317. mx.log.Debugfln("Couldn't find session %s trying to decrypt %s, waiting %d seconds...", content.SessionID, evt.ID, int(sessionWaitTimeout.Seconds()))
  318. if mx.bridge.Crypto.WaitForSession(evt.RoomID, content.SenderKey, content.SessionID, sessionWaitTimeout) {
  319. mx.log.Debugfln("Got session %s after waiting, trying to decrypt %s again", content.SessionID, evt.ID)
  320. decrypted, err = mx.bridge.Crypto.Decrypt(evt)
  321. } else {
  322. go mx.waitLongerForSession(evt)
  323. return
  324. }
  325. }
  326. if err != nil {
  327. mx.log.Warnfln("Failed to decrypt %s: %v", evt.ID, err)
  328. _, _ = mx.bridge.Bot.SendNotice(evt.RoomID, fmt.Sprintf(
  329. "\u26a0 Your message was not bridged: %v", err))
  330. return
  331. }
  332. mx.bridge.EventProcessor.Dispatch(decrypted)
  333. }
  334. func (mx *MatrixHandler) waitLongerForSession(evt *event.Event) {
  335. const extendedTimeout = sessionWaitTimeout * 2
  336. content := evt.Content.AsEncrypted()
  337. mx.log.Debugfln("Couldn't find session %s trying to decrypt %s, waiting %d more seconds...",
  338. content.SessionID, evt.ID, int(extendedTimeout.Seconds()))
  339. resp, err := mx.bridge.Bot.SendNotice(evt.RoomID, fmt.Sprintf(
  340. "\u26a0 Your message was not bridged: the bridge hasn't received the decryption keys. "+
  341. "The bridge will retry for %d seconds. If this error keeps happening, try restarting your client.",
  342. int(extendedTimeout.Seconds())))
  343. if err != nil {
  344. mx.log.Errorfln("Failed to send decryption error to %s: %v", evt.RoomID, err)
  345. }
  346. update := event.MessageEventContent{MsgType: event.MsgNotice}
  347. if mx.bridge.Crypto.WaitForSession(evt.RoomID, content.SenderKey, content.SessionID, extendedTimeout) {
  348. mx.log.Debugfln("Got session %s after waiting more, trying to decrypt %s again", content.SessionID, evt.ID)
  349. decrypted, err := mx.bridge.Crypto.Decrypt(evt)
  350. if err == nil {
  351. mx.bridge.EventProcessor.Dispatch(decrypted)
  352. _, _ = mx.bridge.Bot.RedactEvent(evt.RoomID, resp.EventID)
  353. return
  354. }
  355. mx.log.Warnfln("Failed to decrypt %s: %v", err)
  356. update.Body = fmt.Sprintf("\u26a0 Your message was not bridged: %v", err)
  357. } else {
  358. mx.log.Debugfln("Didn't get %s, giving up on %s", content.SessionID, evt.ID)
  359. update.Body = "\u26a0 Your message was not bridged: the bridge hasn't received the decryption keys. " +
  360. "If this keeps happening, try restarting your client."
  361. }
  362. newContent := update
  363. update.NewContent = &newContent
  364. if resp != nil {
  365. update.RelatesTo = &event.RelatesTo{
  366. Type: event.RelReplace,
  367. EventID: resp.EventID,
  368. }
  369. }
  370. _, _ = mx.bridge.Bot.SendMessageEvent(evt.RoomID, event.EventMessage, &update)
  371. }
  372. func (mx *MatrixHandler) HandleMessage(evt *event.Event) {
  373. defer mx.bridge.Metrics.TrackMatrixEvent(evt.Type)()
  374. if mx.shouldIgnoreEvent(evt) {
  375. return
  376. }
  377. user := mx.bridge.GetUserByMXID(evt.Sender)
  378. content := evt.Content.AsMessage()
  379. if user.Whitelisted && content.MsgType == event.MsgText {
  380. commandPrefix := mx.bridge.Config.Bridge.CommandPrefix
  381. hasCommandPrefix := strings.HasPrefix(content.Body, commandPrefix)
  382. if hasCommandPrefix {
  383. content.Body = strings.TrimLeft(content.Body[len(commandPrefix):], " ")
  384. }
  385. if hasCommandPrefix || evt.RoomID == user.ManagementRoom {
  386. mx.cmd.Handle(evt.RoomID, user, content.Body)
  387. return
  388. }
  389. }
  390. portal := mx.bridge.GetPortalByMXID(evt.RoomID)
  391. if portal != nil && (user.Whitelisted || portal.HasRelaybot()) {
  392. portal.HandleMatrixMessage(user, evt)
  393. }
  394. }
  395. func (mx *MatrixHandler) HandleRedaction(evt *event.Event) {
  396. defer mx.bridge.Metrics.TrackMatrixEvent(evt.Type)()
  397. if _, isPuppet := mx.bridge.ParsePuppetMXID(evt.Sender); evt.Sender == mx.bridge.Bot.UserID || isPuppet {
  398. return
  399. }
  400. user := mx.bridge.GetUserByMXID(evt.Sender)
  401. if !user.Whitelisted {
  402. return
  403. }
  404. if !user.HasSession() {
  405. return
  406. } else if !user.IsConnected() {
  407. msg := format.RenderMarkdown(fmt.Sprintf("[%[1]s](https://matrix.to/#/%[1]s): \u26a0 "+
  408. "You are not connected to WhatsApp, so your redaction was not bridged. "+
  409. "Use `%[2]s reconnect` to reconnect.", user.MXID, mx.bridge.Config.Bridge.CommandPrefix), true, false)
  410. msg.MsgType = event.MsgNotice
  411. _, _ = mx.bridge.Bot.SendMessageEvent(evt.RoomID, event.EventMessage, msg)
  412. return
  413. }
  414. portal := mx.bridge.GetPortalByMXID(evt.RoomID)
  415. if portal != nil {
  416. portal.HandleMatrixRedaction(user, evt)
  417. }
  418. }