custompuppet.go 8.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285
  1. // mautrix-whatsapp - A Matrix-WhatsApp puppeting bridge.
  2. // Copyright (C) 2021 Tulir Asokan
  3. //
  4. // This program is free software: you can redistribute it and/or modify
  5. // it under the terms of the GNU Affero General Public License as published by
  6. // the Free Software Foundation, either version 3 of the License, or
  7. // (at your option) any later version.
  8. //
  9. // This program is distributed in the hope that it will be useful,
  10. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. // GNU Affero General Public License for more details.
  13. //
  14. // You should have received a copy of the GNU Affero General Public License
  15. // along with this program. If not, see <https://www.gnu.org/licenses/>.
  16. package main
  17. import (
  18. "crypto/hmac"
  19. "crypto/sha512"
  20. "encoding/hex"
  21. "errors"
  22. "fmt"
  23. "time"
  24. "maunium.net/go/mautrix"
  25. "maunium.net/go/mautrix/appservice"
  26. "maunium.net/go/mautrix/event"
  27. "maunium.net/go/mautrix/id"
  28. )
  29. var (
  30. ErrNoCustomMXID = errors.New("no custom mxid set")
  31. ErrMismatchingMXID = errors.New("whoami result does not match custom mxid")
  32. )
  33. func (puppet *Puppet) SwitchCustomMXID(accessToken string, mxid id.UserID) error {
  34. prevCustomMXID := puppet.CustomMXID
  35. if puppet.customIntent != nil {
  36. puppet.stopSyncing()
  37. }
  38. puppet.CustomMXID = mxid
  39. puppet.AccessToken = accessToken
  40. err := puppet.StartCustomMXID(false)
  41. if err != nil {
  42. return err
  43. }
  44. if len(prevCustomMXID) > 0 {
  45. delete(puppet.bridge.puppetsByCustomMXID, prevCustomMXID)
  46. }
  47. if len(puppet.CustomMXID) > 0 {
  48. puppet.bridge.puppetsByCustomMXID[puppet.CustomMXID] = puppet
  49. }
  50. puppet.EnablePresence = puppet.bridge.Config.Bridge.DefaultBridgePresence
  51. puppet.EnableReceipts = puppet.bridge.Config.Bridge.DefaultBridgeReceipts
  52. puppet.bridge.AS.StateStore.MarkRegistered(puppet.CustomMXID)
  53. puppet.Update()
  54. // TODO leave rooms with default puppet
  55. return nil
  56. }
  57. func (puppet *Puppet) loginWithSharedSecret(mxid id.UserID) (string, error) {
  58. _, homeserver, _ := mxid.Parse()
  59. puppet.log.Debugfln("Logging into %s with shared secret", mxid)
  60. loginSecret := puppet.bridge.Config.Bridge.LoginSharedSecretMap[homeserver]
  61. client, err := puppet.bridge.newDoublePuppetClient(mxid, "")
  62. if err != nil {
  63. return "", fmt.Errorf("failed to create mautrix client to log in: %v", err)
  64. }
  65. req := mautrix.ReqLogin{
  66. Identifier: mautrix.UserIdentifier{Type: mautrix.IdentifierTypeUser, User: string(mxid)},
  67. DeviceID: "WhatsApp Bridge",
  68. InitialDeviceDisplayName: "WhatsApp Bridge",
  69. }
  70. if loginSecret == "appservice" {
  71. client.AccessToken = puppet.bridge.AS.Registration.AppToken
  72. req.Type = mautrix.AuthTypeAppservice
  73. } else {
  74. mac := hmac.New(sha512.New, []byte(loginSecret))
  75. mac.Write([]byte(mxid))
  76. req.Password = hex.EncodeToString(mac.Sum(nil))
  77. req.Type = mautrix.AuthTypePassword
  78. }
  79. resp, err := client.Login(&req)
  80. if err != nil {
  81. return "", err
  82. }
  83. return resp.AccessToken, nil
  84. }
  85. func (br *WABridge) newDoublePuppetClient(mxid id.UserID, accessToken string) (*mautrix.Client, error) {
  86. _, homeserver, err := mxid.Parse()
  87. if err != nil {
  88. return nil, err
  89. }
  90. homeserverURL, found := br.Config.Bridge.DoublePuppetServerMap[homeserver]
  91. if !found {
  92. if homeserver == br.AS.HomeserverDomain {
  93. homeserverURL = br.AS.HomeserverURL
  94. } else if br.Config.Bridge.DoublePuppetAllowDiscovery {
  95. resp, err := mautrix.DiscoverClientAPI(homeserver)
  96. if err != nil {
  97. return nil, fmt.Errorf("failed to find homeserver URL for %s: %v", homeserver, err)
  98. }
  99. homeserverURL = resp.Homeserver.BaseURL
  100. br.Log.Debugfln("Discovered URL %s for %s to enable double puppeting for %s", homeserverURL, homeserver, mxid)
  101. } else {
  102. return nil, fmt.Errorf("double puppeting from %s is not allowed", homeserver)
  103. }
  104. }
  105. client, err := mautrix.NewClient(homeserverURL, mxid, accessToken)
  106. if err != nil {
  107. return nil, err
  108. }
  109. client.Logger = br.AS.Log.Sub(mxid.String())
  110. client.Client = br.AS.HTTPClient
  111. client.DefaultHTTPRetries = br.AS.DefaultHTTPRetries
  112. return client, nil
  113. }
  114. func (puppet *Puppet) newCustomIntent() (*appservice.IntentAPI, error) {
  115. if len(puppet.CustomMXID) == 0 {
  116. return nil, ErrNoCustomMXID
  117. }
  118. client, err := puppet.bridge.newDoublePuppetClient(puppet.CustomMXID, puppet.AccessToken)
  119. if err != nil {
  120. return nil, err
  121. }
  122. client.Syncer = puppet
  123. client.Store = puppet
  124. ia := puppet.bridge.AS.NewIntentAPI("custom")
  125. ia.Client = client
  126. ia.Localpart, _, _ = puppet.CustomMXID.Parse()
  127. ia.UserID = puppet.CustomMXID
  128. ia.IsCustomPuppet = true
  129. return ia, nil
  130. }
  131. func (puppet *Puppet) clearCustomMXID() {
  132. puppet.CustomMXID = ""
  133. puppet.AccessToken = ""
  134. puppet.customIntent = nil
  135. puppet.customUser = nil
  136. }
  137. func (puppet *Puppet) StartCustomMXID(reloginOnFail bool) error {
  138. if len(puppet.CustomMXID) == 0 {
  139. puppet.clearCustomMXID()
  140. return nil
  141. }
  142. intent, err := puppet.newCustomIntent()
  143. if err != nil {
  144. puppet.clearCustomMXID()
  145. return err
  146. }
  147. resp, err := intent.Whoami()
  148. if err != nil {
  149. if !reloginOnFail || (errors.Is(err, mautrix.MUnknownToken) && !puppet.tryRelogin(err, "initializing double puppeting")) {
  150. puppet.clearCustomMXID()
  151. return err
  152. }
  153. intent.AccessToken = puppet.AccessToken
  154. } else if resp.UserID != puppet.CustomMXID {
  155. puppet.clearCustomMXID()
  156. return ErrMismatchingMXID
  157. }
  158. puppet.customIntent = intent
  159. puppet.customUser = puppet.bridge.GetUserByMXID(puppet.CustomMXID)
  160. puppet.startSyncing()
  161. return nil
  162. }
  163. func (puppet *Puppet) startSyncing() {
  164. if !puppet.bridge.Config.Bridge.SyncWithCustomPuppets {
  165. return
  166. }
  167. go func() {
  168. puppet.log.Debugln("Starting syncing...")
  169. puppet.customIntent.SyncPresence = "offline"
  170. err := puppet.customIntent.Sync()
  171. if err != nil {
  172. puppet.log.Errorln("Fatal error syncing:", err)
  173. }
  174. }()
  175. }
  176. func (puppet *Puppet) stopSyncing() {
  177. if !puppet.bridge.Config.Bridge.SyncWithCustomPuppets {
  178. return
  179. }
  180. puppet.customIntent.StopSync()
  181. }
  182. func (puppet *Puppet) ProcessResponse(resp *mautrix.RespSync, _ string) error {
  183. if !puppet.customUser.IsLoggedIn() {
  184. puppet.log.Debugln("Skipping sync processing: custom user not connected to whatsapp")
  185. return nil
  186. }
  187. for roomID, events := range resp.Rooms.Join {
  188. for _, evt := range events.Ephemeral.Events {
  189. evt.RoomID = roomID
  190. err := evt.Content.ParseRaw(evt.Type)
  191. if err != nil {
  192. continue
  193. }
  194. switch evt.Type {
  195. case event.EphemeralEventReceipt:
  196. if puppet.EnableReceipts {
  197. go puppet.bridge.MatrixHandler.HandleReceipt(evt)
  198. }
  199. case event.EphemeralEventTyping:
  200. go puppet.bridge.MatrixHandler.HandleTyping(evt)
  201. }
  202. }
  203. }
  204. if puppet.EnablePresence {
  205. for _, evt := range resp.Presence.Events {
  206. if evt.Sender != puppet.CustomMXID {
  207. continue
  208. }
  209. err := evt.Content.ParseRaw(evt.Type)
  210. if err != nil {
  211. continue
  212. }
  213. go puppet.bridge.HandlePresence(evt)
  214. }
  215. }
  216. return nil
  217. }
  218. func (puppet *Puppet) tryRelogin(cause error, action string) bool {
  219. if !puppet.bridge.Config.CanAutoDoublePuppet(puppet.CustomMXID) {
  220. return false
  221. }
  222. puppet.log.Debugfln("Trying to relogin after '%v' while %s", cause, action)
  223. accessToken, err := puppet.loginWithSharedSecret(puppet.CustomMXID)
  224. if err != nil {
  225. puppet.log.Errorfln("Failed to relogin after '%v' while %s: %v", cause, action, err)
  226. return false
  227. }
  228. puppet.log.Infofln("Successfully relogined after '%v' while %s", cause, action)
  229. puppet.AccessToken = accessToken
  230. return true
  231. }
  232. func (puppet *Puppet) OnFailedSync(_ *mautrix.RespSync, err error) (time.Duration, error) {
  233. puppet.log.Warnln("Sync error:", err)
  234. if errors.Is(err, mautrix.MUnknownToken) {
  235. if !puppet.tryRelogin(err, "syncing") {
  236. return 0, err
  237. }
  238. puppet.customIntent.AccessToken = puppet.AccessToken
  239. return 0, nil
  240. }
  241. return 10 * time.Second, nil
  242. }
  243. func (puppet *Puppet) GetFilterJSON(_ id.UserID) *mautrix.Filter {
  244. everything := []event.Type{{Type: "*"}}
  245. return &mautrix.Filter{
  246. Presence: mautrix.FilterPart{
  247. Senders: []id.UserID{puppet.CustomMXID},
  248. Types: []event.Type{event.EphemeralEventPresence},
  249. },
  250. AccountData: mautrix.FilterPart{NotTypes: everything},
  251. Room: mautrix.RoomFilter{
  252. Ephemeral: mautrix.FilterPart{Types: []event.Type{event.EphemeralEventTyping, event.EphemeralEventReceipt}},
  253. IncludeLeave: false,
  254. AccountData: mautrix.FilterPart{NotTypes: everything},
  255. State: mautrix.FilterPart{NotTypes: everything},
  256. Timeline: mautrix.FilterPart{NotTypes: everything},
  257. },
  258. }
  259. }
  260. func (puppet *Puppet) SaveFilterID(_ id.UserID, _ string) {}
  261. func (puppet *Puppet) SaveNextBatch(_ id.UserID, nbt string) { puppet.NextBatch = nbt; puppet.Update() }
  262. func (puppet *Puppet) SaveRoom(_ *mautrix.Room) {}
  263. func (puppet *Puppet) LoadFilterID(_ id.UserID) string { return "" }
  264. func (puppet *Puppet) LoadNextBatch(_ id.UserID) string { return puppet.NextBatch }
  265. func (puppet *Puppet) LoadRoom(_ id.RoomID) *mautrix.Room { return nil }