user.go 36 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107
  1. // mautrix-whatsapp - A Matrix-WhatsApp puppeting bridge.
  2. // Copyright (C) 2022 Tulir Asokan
  3. //
  4. // This program is free software: you can redistribute it and/or modify
  5. // it under the terms of the GNU Affero General Public License as published by
  6. // the Free Software Foundation, either version 3 of the License, or
  7. // (at your option) any later version.
  8. //
  9. // This program is distributed in the hope that it will be useful,
  10. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. // GNU Affero General Public License for more details.
  13. //
  14. // You should have received a copy of the GNU Affero General Public License
  15. // along with this program. If not, see <https://www.gnu.org/licenses/>.
  16. package main
  17. import (
  18. "context"
  19. "encoding/json"
  20. "errors"
  21. "fmt"
  22. "math"
  23. "net/http"
  24. "strconv"
  25. "strings"
  26. "sync"
  27. "time"
  28. log "maunium.net/go/maulogger/v2"
  29. "maunium.net/go/mautrix"
  30. "maunium.net/go/mautrix/appservice"
  31. "maunium.net/go/mautrix/event"
  32. "maunium.net/go/mautrix/format"
  33. "maunium.net/go/mautrix/id"
  34. "maunium.net/go/mautrix/pushrules"
  35. "go.mau.fi/whatsmeow"
  36. "go.mau.fi/whatsmeow/appstate"
  37. waProto "go.mau.fi/whatsmeow/binary/proto"
  38. "go.mau.fi/whatsmeow/store"
  39. "go.mau.fi/whatsmeow/types"
  40. "go.mau.fi/whatsmeow/types/events"
  41. waLog "go.mau.fi/whatsmeow/util/log"
  42. "maunium.net/go/mautrix-whatsapp/database"
  43. )
  44. type User struct {
  45. *database.User
  46. Client *whatsmeow.Client
  47. Session *store.Device
  48. bridge *Bridge
  49. log log.Logger
  50. Admin bool
  51. Whitelisted bool
  52. RelayWhitelisted bool
  53. mgmtCreateLock sync.Mutex
  54. spaceCreateLock sync.Mutex
  55. connLock sync.Mutex
  56. historySyncs chan *events.HistorySync
  57. prevBridgeStatus *BridgeState
  58. lastPresence types.Presence
  59. spaceMembershipChecked bool
  60. lastPhoneOfflineWarning time.Time
  61. groupListCache []*types.GroupInfo
  62. groupListCacheLock sync.Mutex
  63. groupListCacheTime time.Time
  64. BackfillQueue *BackfillQueue
  65. }
  66. func (bridge *Bridge) getUserByMXID(userID id.UserID, onlyIfExists bool) *User {
  67. _, isPuppet := bridge.ParsePuppetMXID(userID)
  68. if isPuppet || userID == bridge.Bot.UserID {
  69. return nil
  70. }
  71. bridge.usersLock.Lock()
  72. defer bridge.usersLock.Unlock()
  73. user, ok := bridge.usersByMXID[userID]
  74. if !ok {
  75. userIDPtr := &userID
  76. if onlyIfExists {
  77. userIDPtr = nil
  78. }
  79. return bridge.loadDBUser(bridge.DB.User.GetByMXID(userID), userIDPtr)
  80. }
  81. return user
  82. }
  83. func (bridge *Bridge) GetUserByMXID(userID id.UserID) *User {
  84. return bridge.getUserByMXID(userID, false)
  85. }
  86. func (bridge *Bridge) GetUserByMXIDIfExists(userID id.UserID) *User {
  87. return bridge.getUserByMXID(userID, true)
  88. }
  89. func (bridge *Bridge) GetUserByJID(jid types.JID) *User {
  90. bridge.usersLock.Lock()
  91. defer bridge.usersLock.Unlock()
  92. user, ok := bridge.usersByUsername[jid.User]
  93. if !ok {
  94. return bridge.loadDBUser(bridge.DB.User.GetByUsername(jid.User), nil)
  95. }
  96. return user
  97. }
  98. func (user *User) addToJIDMap() {
  99. user.bridge.usersLock.Lock()
  100. user.bridge.usersByUsername[user.JID.User] = user
  101. user.bridge.usersLock.Unlock()
  102. }
  103. func (user *User) removeFromJIDMap(state BridgeState) {
  104. user.bridge.usersLock.Lock()
  105. jidUser, ok := user.bridge.usersByUsername[user.JID.User]
  106. if ok && user == jidUser {
  107. delete(user.bridge.usersByUsername, user.JID.User)
  108. }
  109. user.bridge.usersLock.Unlock()
  110. user.bridge.Metrics.TrackLoginState(user.JID, false)
  111. user.sendBridgeState(state)
  112. }
  113. func (bridge *Bridge) GetAllUsers() []*User {
  114. bridge.usersLock.Lock()
  115. defer bridge.usersLock.Unlock()
  116. dbUsers := bridge.DB.User.GetAll()
  117. output := make([]*User, len(dbUsers))
  118. for index, dbUser := range dbUsers {
  119. user, ok := bridge.usersByMXID[dbUser.MXID]
  120. if !ok {
  121. user = bridge.loadDBUser(dbUser, nil)
  122. }
  123. output[index] = user
  124. }
  125. return output
  126. }
  127. func (bridge *Bridge) loadDBUser(dbUser *database.User, mxid *id.UserID) *User {
  128. if dbUser == nil {
  129. if mxid == nil {
  130. return nil
  131. }
  132. dbUser = bridge.DB.User.New()
  133. dbUser.MXID = *mxid
  134. dbUser.Insert()
  135. }
  136. user := bridge.NewUser(dbUser)
  137. bridge.usersByMXID[user.MXID] = user
  138. if !user.JID.IsEmpty() {
  139. var err error
  140. user.Session, err = bridge.WAContainer.GetDevice(user.JID)
  141. if err != nil {
  142. user.log.Errorfln("Failed to load user's whatsapp session: %v", err)
  143. } else if user.Session == nil {
  144. user.log.Warnfln("Didn't find session data for %s, treating user as logged out", user.JID)
  145. user.JID = types.EmptyJID
  146. user.Update()
  147. } else {
  148. bridge.usersByUsername[user.JID.User] = user
  149. }
  150. }
  151. if len(user.ManagementRoom) > 0 {
  152. bridge.managementRooms[user.ManagementRoom] = user
  153. }
  154. return user
  155. }
  156. func (bridge *Bridge) NewUser(dbUser *database.User) *User {
  157. user := &User{
  158. User: dbUser,
  159. bridge: bridge,
  160. log: bridge.Log.Sub("User").Sub(string(dbUser.MXID)),
  161. historySyncs: make(chan *events.HistorySync, 32),
  162. lastPresence: types.PresenceUnavailable,
  163. }
  164. user.RelayWhitelisted = user.bridge.Config.Bridge.Permissions.IsRelayWhitelisted(user.MXID)
  165. user.Whitelisted = user.bridge.Config.Bridge.Permissions.IsWhitelisted(user.MXID)
  166. user.Admin = user.bridge.Config.Bridge.Permissions.IsAdmin(user.MXID)
  167. go user.handleHistorySyncsLoop()
  168. return user
  169. }
  170. func (user *User) ensureInvited(intent *appservice.IntentAPI, roomID id.RoomID, isDirect bool) (ok bool) {
  171. inviteContent := event.Content{
  172. Parsed: &event.MemberEventContent{
  173. Membership: event.MembershipInvite,
  174. IsDirect: isDirect,
  175. },
  176. Raw: map[string]interface{}{},
  177. }
  178. customPuppet := user.bridge.GetPuppetByCustomMXID(user.MXID)
  179. if customPuppet != nil && customPuppet.CustomIntent() != nil {
  180. inviteContent.Raw["fi.mau.will_auto_accept"] = true
  181. }
  182. _, err := intent.SendStateEvent(roomID, event.StateMember, user.MXID.String(), &inviteContent)
  183. var httpErr mautrix.HTTPError
  184. if err != nil && errors.As(err, &httpErr) && httpErr.RespError != nil && strings.Contains(httpErr.RespError.Err, "is already in the room") {
  185. user.bridge.StateStore.SetMembership(roomID, user.MXID, event.MembershipJoin)
  186. ok = true
  187. return
  188. } else if err != nil {
  189. user.log.Warnfln("Failed to invite user to %s: %v", roomID, err)
  190. } else {
  191. ok = true
  192. }
  193. if customPuppet != nil && customPuppet.CustomIntent() != nil {
  194. err = customPuppet.CustomIntent().EnsureJoined(roomID, appservice.EnsureJoinedParams{IgnoreCache: true})
  195. if err != nil {
  196. user.log.Warnfln("Failed to auto-join %s: %v", roomID, err)
  197. ok = false
  198. } else {
  199. ok = true
  200. }
  201. }
  202. return
  203. }
  204. func (user *User) GetSpaceRoom() id.RoomID {
  205. if !user.bridge.Config.Bridge.PersonalFilteringSpaces {
  206. return ""
  207. }
  208. if len(user.SpaceRoom) == 0 {
  209. user.spaceCreateLock.Lock()
  210. defer user.spaceCreateLock.Unlock()
  211. if len(user.SpaceRoom) > 0 {
  212. return user.SpaceRoom
  213. }
  214. resp, err := user.bridge.Bot.CreateRoom(&mautrix.ReqCreateRoom{
  215. Visibility: "private",
  216. Name: "WhatsApp",
  217. Topic: "Your WhatsApp bridged chats",
  218. InitialState: []*event.Event{{
  219. Type: event.StateRoomAvatar,
  220. Content: event.Content{
  221. Parsed: &event.RoomAvatarEventContent{
  222. URL: user.bridge.Config.AppService.Bot.ParsedAvatar,
  223. },
  224. },
  225. }},
  226. CreationContent: map[string]interface{}{
  227. "type": event.RoomTypeSpace,
  228. },
  229. PowerLevelOverride: &event.PowerLevelsEventContent{
  230. Users: map[id.UserID]int{
  231. user.bridge.Bot.UserID: 9001,
  232. user.MXID: 50,
  233. },
  234. },
  235. })
  236. if err != nil {
  237. user.log.Errorln("Failed to auto-create space room:", err)
  238. } else {
  239. user.SpaceRoom = resp.RoomID
  240. user.Update()
  241. user.ensureInvited(user.bridge.Bot, user.SpaceRoom, false)
  242. }
  243. } else if !user.spaceMembershipChecked && !user.bridge.StateStore.IsInRoom(user.SpaceRoom, user.MXID) {
  244. user.ensureInvited(user.bridge.Bot, user.SpaceRoom, false)
  245. }
  246. user.spaceMembershipChecked = true
  247. return user.SpaceRoom
  248. }
  249. func (user *User) GetManagementRoom() id.RoomID {
  250. if len(user.ManagementRoom) == 0 {
  251. user.mgmtCreateLock.Lock()
  252. defer user.mgmtCreateLock.Unlock()
  253. if len(user.ManagementRoom) > 0 {
  254. return user.ManagementRoom
  255. }
  256. creationContent := make(map[string]interface{})
  257. if !user.bridge.Config.Bridge.FederateRooms {
  258. creationContent["m.federate"] = false
  259. }
  260. resp, err := user.bridge.Bot.CreateRoom(&mautrix.ReqCreateRoom{
  261. Topic: "WhatsApp bridge notices",
  262. IsDirect: true,
  263. CreationContent: creationContent,
  264. })
  265. if err != nil {
  266. user.log.Errorln("Failed to auto-create management room:", err)
  267. } else {
  268. user.SetManagementRoom(resp.RoomID)
  269. }
  270. }
  271. return user.ManagementRoom
  272. }
  273. func (user *User) SetManagementRoom(roomID id.RoomID) {
  274. existingUser, ok := user.bridge.managementRooms[roomID]
  275. if ok {
  276. existingUser.ManagementRoom = ""
  277. existingUser.Update()
  278. }
  279. user.ManagementRoom = roomID
  280. user.bridge.managementRooms[user.ManagementRoom] = user
  281. user.Update()
  282. }
  283. type waLogger struct{ l log.Logger }
  284. func (w *waLogger) Debugf(msg string, args ...interface{}) { w.l.Debugfln(msg, args...) }
  285. func (w *waLogger) Infof(msg string, args ...interface{}) { w.l.Infofln(msg, args...) }
  286. func (w *waLogger) Warnf(msg string, args ...interface{}) { w.l.Warnfln(msg, args...) }
  287. func (w *waLogger) Errorf(msg string, args ...interface{}) { w.l.Errorfln(msg, args...) }
  288. func (w *waLogger) Sub(module string) waLog.Logger { return &waLogger{l: w.l.Sub(module)} }
  289. var ErrAlreadyLoggedIn = errors.New("already logged in")
  290. func (user *User) createClient(sess *store.Device) {
  291. user.Client = whatsmeow.NewClient(sess, &waLogger{user.log.Sub("Client")})
  292. user.Client.AddEventHandler(user.HandleEvent)
  293. user.Client.SetForceActiveDeliveryReceipts(user.bridge.Config.Bridge.ForceActiveDeliveryReceipts)
  294. user.Client.GetMessageForRetry = func(to types.JID, id types.MessageID) *waProto.Message {
  295. user.bridge.Metrics.TrackRetryReceipt(0, false)
  296. return nil
  297. }
  298. user.Client.PreRetryCallback = func(receipt *events.Receipt, retryCount int, msg *waProto.Message) bool {
  299. user.bridge.Metrics.TrackRetryReceipt(retryCount, true)
  300. return true
  301. }
  302. }
  303. func (user *User) Login(ctx context.Context) (<-chan whatsmeow.QRChannelItem, error) {
  304. user.connLock.Lock()
  305. defer user.connLock.Unlock()
  306. if user.Session != nil {
  307. return nil, ErrAlreadyLoggedIn
  308. } else if user.Client != nil {
  309. user.unlockedDeleteConnection()
  310. }
  311. newSession := user.bridge.WAContainer.NewDevice()
  312. newSession.Log = &waLogger{user.log.Sub("Session")}
  313. user.createClient(newSession)
  314. qrChan, err := user.Client.GetQRChannel(ctx)
  315. if err != nil {
  316. return nil, fmt.Errorf("failed to get QR channel: %w", err)
  317. }
  318. err = user.Client.Connect()
  319. if err != nil {
  320. return nil, fmt.Errorf("failed to connect to WhatsApp: %w", err)
  321. }
  322. return qrChan, nil
  323. }
  324. func (user *User) Connect() bool {
  325. user.connLock.Lock()
  326. defer user.connLock.Unlock()
  327. if user.Client != nil {
  328. return user.Client.IsConnected()
  329. } else if user.Session == nil {
  330. return false
  331. }
  332. user.log.Debugln("Connecting to WhatsApp")
  333. user.sendBridgeState(BridgeState{StateEvent: StateConnecting, Error: WAConnecting})
  334. user.createClient(user.Session)
  335. err := user.Client.Connect()
  336. if err != nil {
  337. user.log.Warnln("Error connecting to WhatsApp:", err)
  338. return false
  339. }
  340. return true
  341. }
  342. func (user *User) unlockedDeleteConnection() {
  343. if user.Client == nil {
  344. return
  345. }
  346. user.Client.Disconnect()
  347. user.Client.RemoveEventHandlers()
  348. user.Client = nil
  349. user.bridge.Metrics.TrackConnectionState(user.JID, false)
  350. }
  351. func (user *User) DeleteConnection() {
  352. user.connLock.Lock()
  353. defer user.connLock.Unlock()
  354. user.unlockedDeleteConnection()
  355. }
  356. func (user *User) HasSession() bool {
  357. return user.Session != nil
  358. }
  359. func (user *User) DeleteSession() {
  360. if user.Session != nil {
  361. err := user.Session.Delete()
  362. if err != nil {
  363. user.log.Warnln("Failed to delete session:", err)
  364. }
  365. user.Session = nil
  366. }
  367. if !user.JID.IsEmpty() {
  368. user.JID = types.EmptyJID
  369. user.Update()
  370. }
  371. }
  372. func (user *User) IsConnected() bool {
  373. return user.Client != nil && user.Client.IsConnected()
  374. }
  375. func (user *User) IsLoggedIn() bool {
  376. return user.IsConnected() && user.Client.IsLoggedIn()
  377. }
  378. func (user *User) tryAutomaticDoublePuppeting() {
  379. if !user.bridge.Config.CanAutoDoublePuppet(user.MXID) {
  380. return
  381. }
  382. user.log.Debugln("Checking if double puppeting needs to be enabled")
  383. puppet := user.bridge.GetPuppetByJID(user.JID)
  384. if len(puppet.CustomMXID) > 0 {
  385. user.log.Debugln("User already has double-puppeting enabled")
  386. // Custom puppet already enabled
  387. return
  388. }
  389. accessToken, err := puppet.loginWithSharedSecret(user.MXID)
  390. if err != nil {
  391. user.log.Warnln("Failed to login with shared secret:", err)
  392. return
  393. }
  394. err = puppet.SwitchCustomMXID(accessToken, user.MXID)
  395. if err != nil {
  396. puppet.log.Warnln("Failed to switch to auto-logined custom puppet:", err)
  397. return
  398. }
  399. user.log.Infoln("Successfully automatically enabled custom puppet")
  400. }
  401. func (user *User) sendMarkdownBridgeAlert(formatString string, args ...interface{}) {
  402. if user.bridge.Config.Bridge.DisableBridgeAlerts {
  403. return
  404. }
  405. notice := fmt.Sprintf(formatString, args...)
  406. content := format.RenderMarkdown(notice, true, false)
  407. _, err := user.bridge.Bot.SendMessageEvent(user.GetManagementRoom(), event.EventMessage, content)
  408. if err != nil {
  409. user.log.Warnf("Failed to send bridge alert \"%s\": %v", notice, err)
  410. }
  411. }
  412. const callEventMaxAge = 15 * time.Minute
  413. func (user *User) handleCallStart(sender types.JID, id, callType string, ts time.Time) {
  414. if !user.bridge.Config.Bridge.CallStartNotices || ts.Add(callEventMaxAge).Before(time.Now()) {
  415. return
  416. }
  417. portal := user.GetPortalByJID(sender)
  418. text := "Incoming call"
  419. if callType != "" {
  420. text = fmt.Sprintf("Incoming %s call", callType)
  421. }
  422. portal.messages <- PortalMessage{
  423. fake: &fakeMessage{
  424. Sender: sender,
  425. Text: text,
  426. ID: id,
  427. Time: ts,
  428. Important: true,
  429. },
  430. source: user,
  431. }
  432. }
  433. const PhoneDisconnectWarningTime = 12 * 24 * time.Hour // 12 days
  434. const PhoneDisconnectPingTime = 10 * 24 * time.Hour
  435. const PhoneMinPingInterval = 24 * time.Hour
  436. func (user *User) sendHackyPhonePing() {
  437. msgID := whatsmeow.GenerateMessageID()
  438. user.PhoneLastPinged = time.Now()
  439. ts, err := user.Client.SendMessage(user.JID.ToNonAD(), msgID, &waProto.Message{
  440. ProtocolMessage: &waProto.ProtocolMessage{},
  441. })
  442. if err != nil {
  443. user.log.Warnfln("Failed to send hacky phone ping: %v", err)
  444. } else {
  445. user.log.Debugfln("Sent hacky phone ping %s/%s because phone has been offline for >10 days", msgID, ts)
  446. user.PhoneLastPinged = ts
  447. user.Update()
  448. }
  449. }
  450. func (user *User) PhoneRecentlySeen(doPing bool) bool {
  451. if doPing && !user.PhoneLastSeen.IsZero() && user.PhoneLastSeen.Add(PhoneDisconnectPingTime).Before(time.Now()) && user.PhoneLastPinged.Add(PhoneMinPingInterval).Before(time.Now()) {
  452. // Over 10 days since the phone was seen and over a day since the last somewhat hacky ping, send a new ping.
  453. go user.sendHackyPhonePing()
  454. }
  455. return user.PhoneLastSeen.IsZero() || user.PhoneLastSeen.Add(PhoneDisconnectWarningTime).After(time.Now())
  456. }
  457. // phoneSeen records a timestamp when the user's main device was seen online.
  458. // The stored timestamp can later be used to warn the user if the main device is offline for too long.
  459. func (user *User) phoneSeen(ts time.Time) {
  460. if user.PhoneLastSeen.Add(1 * time.Hour).After(ts) {
  461. // The last seen timestamp isn't going to be perfectly accurate in any case,
  462. // so don't spam the database with an update every time there's an event.
  463. return
  464. } else if !user.PhoneRecentlySeen(false) && user.GetPrevBridgeState().Error == WAPhoneOffline && user.IsConnected() {
  465. user.log.Debugfln("Saw phone after current bridge state said it has been offline, switching state back to connected")
  466. go user.sendBridgeState(BridgeState{StateEvent: StateConnected})
  467. }
  468. user.PhoneLastSeen = ts
  469. go user.Update()
  470. }
  471. func formatDisconnectTime(dur time.Duration) string {
  472. days := int(math.Floor(dur.Hours() / 24))
  473. hours := int(dur.Hours()) % 24
  474. if hours == 0 {
  475. return fmt.Sprintf("%d days", days)
  476. } else if hours == 1 {
  477. return fmt.Sprintf("%d days and 1 hour", days)
  478. } else {
  479. return fmt.Sprintf("%d days and %d hours", days, hours)
  480. }
  481. }
  482. func (user *User) sendPhoneOfflineWarning() {
  483. if user.lastPhoneOfflineWarning.Add(12 * time.Hour).After(time.Now()) {
  484. // Don't spam the warning too much
  485. return
  486. }
  487. user.lastPhoneOfflineWarning = time.Now()
  488. timeSinceSeen := time.Now().Sub(user.PhoneLastSeen)
  489. user.sendMarkdownBridgeAlert("Your phone hasn't been seen in %s. The server will force the bridge to log out if the phone is not active at least every 2 weeks.", formatDisconnectTime(timeSinceSeen))
  490. }
  491. func (user *User) HandleEvent(event interface{}) {
  492. switch v := event.(type) {
  493. case *events.LoggedOut:
  494. go user.handleLoggedOut(v.OnConnect, v.Reason)
  495. case *events.Connected:
  496. user.bridge.Metrics.TrackConnectionState(user.JID, true)
  497. user.bridge.Metrics.TrackLoginState(user.JID, true)
  498. if len(user.Client.Store.PushName) > 0 {
  499. go func() {
  500. err := user.Client.SendPresence(user.lastPresence)
  501. if err != nil {
  502. user.log.Warnln("Failed to send initial presence:", err)
  503. }
  504. }()
  505. }
  506. go user.tryAutomaticDoublePuppeting()
  507. case *events.OfflineSyncPreview:
  508. user.log.Infofln("Server says it's going to send %d messages and %d receipts that were missed during downtime", v.Messages, v.Receipts)
  509. case *events.OfflineSyncCompleted:
  510. if !user.PhoneRecentlySeen(true) {
  511. user.log.Infofln("Offline sync completed, but phone last seen date is still %s - sending phone offline bridge status", user.PhoneLastSeen)
  512. go user.sendBridgeState(BridgeState{StateEvent: StateTransientDisconnect, Error: WAPhoneOffline})
  513. } else {
  514. go user.sendBridgeState(BridgeState{StateEvent: StateConnected})
  515. }
  516. case *events.AppStateSyncComplete:
  517. if len(user.Client.Store.PushName) > 0 && v.Name == appstate.WAPatchCriticalBlock {
  518. err := user.Client.SendPresence(user.lastPresence)
  519. if err != nil {
  520. user.log.Warnln("Failed to send presence after app state sync:", err)
  521. }
  522. } else if v.Name == appstate.WAPatchCriticalUnblockLow {
  523. go func() {
  524. err := user.ResyncContacts()
  525. if err != nil {
  526. user.log.Errorln("Failed to resync puppets: %v", err)
  527. }
  528. }()
  529. }
  530. case *events.PushNameSetting:
  531. // Send presence available when connecting and when the pushname is changed.
  532. // This makes sure that outgoing messages always have the right pushname.
  533. err := user.Client.SendPresence(user.lastPresence)
  534. if err != nil {
  535. user.log.Warnln("Failed to send presence after push name update:", err)
  536. }
  537. case *events.PairSuccess:
  538. user.PhoneLastSeen = time.Now()
  539. user.Session = user.Client.Store
  540. user.JID = v.ID
  541. user.addToJIDMap()
  542. user.Update()
  543. case *events.StreamError:
  544. var message string
  545. if v.Code != "" {
  546. message = fmt.Sprintf("Unknown stream error with code %s", v.Code)
  547. } else if children := v.Raw.GetChildren(); len(children) > 0 {
  548. message = fmt.Sprintf("Unknown stream error (contains %s node)", children[0].Tag)
  549. } else {
  550. message = "Unknown stream error"
  551. }
  552. go user.sendBridgeState(BridgeState{StateEvent: StateUnknownError, Message: message})
  553. user.bridge.Metrics.TrackConnectionState(user.JID, false)
  554. case *events.ConnectFailure:
  555. go user.sendBridgeState(BridgeState{StateEvent: StateUnknownError, Message: fmt.Sprintf("Unknown connection failure: %s", v.Reason)})
  556. user.bridge.Metrics.TrackConnectionState(user.JID, false)
  557. case *events.ClientOutdated:
  558. user.log.Errorfln("Got a client outdated connect failure. The bridge is likely out of date, please update immediately.")
  559. go user.sendBridgeState(BridgeState{StateEvent: StateUnknownError, Message: "Connect failure: 405 client outdated"})
  560. user.bridge.Metrics.TrackConnectionState(user.JID, false)
  561. case *events.TemporaryBan:
  562. go user.sendBridgeState(BridgeState{StateEvent: StateBadCredentials, Message: v.String()})
  563. user.bridge.Metrics.TrackConnectionState(user.JID, false)
  564. case *events.Disconnected:
  565. // Don't send the normal transient disconnect state if we're already in a different transient disconnect state.
  566. // TODO remove this if/when the phone offline state is moved to a sub-state of CONNECTED
  567. if user.GetPrevBridgeState().Error != WAPhoneOffline && user.PhoneRecentlySeen(false) {
  568. go user.sendBridgeState(BridgeState{StateEvent: StateTransientDisconnect, Message: "Disconnected from WhatsApp. Trying to reconnect."})
  569. }
  570. user.bridge.Metrics.TrackConnectionState(user.JID, false)
  571. case *events.Contact:
  572. go user.syncPuppet(v.JID, "contact event")
  573. case *events.PushName:
  574. go user.syncPuppet(v.JID, "push name event")
  575. case *events.GroupInfo:
  576. user.groupListCache = nil
  577. go user.handleGroupUpdate(v)
  578. case *events.JoinedGroup:
  579. user.groupListCache = nil
  580. go user.handleGroupCreate(v)
  581. case *events.Picture:
  582. go user.handlePictureUpdate(v)
  583. case *events.Receipt:
  584. if v.IsFromMe && v.Sender.Device == 0 {
  585. user.phoneSeen(v.Timestamp)
  586. }
  587. go user.handleReceipt(v)
  588. case *events.ChatPresence:
  589. go user.handleChatPresence(v)
  590. case *events.Message:
  591. portal := user.GetPortalByMessageSource(v.Info.MessageSource)
  592. portal.messages <- PortalMessage{evt: v, source: user}
  593. case *events.MediaRetry:
  594. user.phoneSeen(v.Timestamp)
  595. portal := user.GetPortalByJID(v.ChatID)
  596. portal.mediaRetries <- PortalMediaRetry{evt: v, source: user}
  597. case *events.CallOffer:
  598. user.handleCallStart(v.CallCreator, v.CallID, "", v.Timestamp)
  599. case *events.CallOfferNotice:
  600. user.handleCallStart(v.CallCreator, v.CallID, v.Type, v.Timestamp)
  601. case *events.IdentityChange:
  602. puppet := user.bridge.GetPuppetByJID(v.JID)
  603. portal := user.GetPortalByJID(v.JID)
  604. if len(portal.MXID) > 0 && user.bridge.Config.Bridge.IdentityChangeNotices {
  605. text := fmt.Sprintf("Your security code with %s changed.", puppet.Displayname)
  606. if v.Implicit {
  607. text = fmt.Sprintf("Your security code with %s (device #%d) changed.", puppet.Displayname, v.JID.Device)
  608. }
  609. portal.messages <- PortalMessage{
  610. fake: &fakeMessage{
  611. Sender: v.JID,
  612. Text: text,
  613. ID: strconv.FormatInt(v.Timestamp.Unix(), 10),
  614. Time: v.Timestamp,
  615. Important: false,
  616. },
  617. source: user,
  618. }
  619. }
  620. case *events.CallTerminate, *events.CallRelayLatency, *events.CallAccept, *events.UnknownCallEvent:
  621. // ignore
  622. case *events.UndecryptableMessage:
  623. portal := user.GetPortalByMessageSource(v.Info.MessageSource)
  624. portal.messages <- PortalMessage{undecryptable: v, source: user}
  625. case *events.HistorySync:
  626. user.historySyncs <- v
  627. case *events.Mute:
  628. portal := user.GetPortalByJID(v.JID)
  629. if portal != nil {
  630. var mutedUntil time.Time
  631. if v.Action.GetMuted() {
  632. mutedUntil = time.Unix(v.Action.GetMuteEndTimestamp(), 0)
  633. }
  634. go user.updateChatMute(nil, portal, mutedUntil)
  635. }
  636. case *events.Archive:
  637. portal := user.GetPortalByJID(v.JID)
  638. if portal != nil {
  639. go user.updateChatTag(nil, portal, user.bridge.Config.Bridge.ArchiveTag, v.Action.GetArchived())
  640. }
  641. case *events.Pin:
  642. portal := user.GetPortalByJID(v.JID)
  643. if portal != nil {
  644. go user.updateChatTag(nil, portal, user.bridge.Config.Bridge.PinnedTag, v.Action.GetPinned())
  645. }
  646. case *events.AppState:
  647. // Ignore
  648. default:
  649. user.log.Debugfln("Unknown type of event in HandleEvent: %T", v)
  650. }
  651. }
  652. func (user *User) updateChatMute(intent *appservice.IntentAPI, portal *Portal, mutedUntil time.Time) {
  653. if len(portal.MXID) == 0 || !user.bridge.Config.Bridge.MuteBridging {
  654. return
  655. } else if intent == nil {
  656. doublePuppet := user.bridge.GetPuppetByCustomMXID(user.MXID)
  657. if doublePuppet == nil || doublePuppet.CustomIntent() == nil {
  658. return
  659. }
  660. intent = doublePuppet.CustomIntent()
  661. }
  662. var err error
  663. if mutedUntil.IsZero() && mutedUntil.Before(time.Now()) {
  664. user.log.Debugfln("Portal %s is muted until %s, unmuting...", portal.MXID, mutedUntil)
  665. err = intent.DeletePushRule("global", pushrules.RoomRule, string(portal.MXID))
  666. } else {
  667. user.log.Debugfln("Portal %s is muted until %s, muting...", portal.MXID, mutedUntil)
  668. err = intent.PutPushRule("global", pushrules.RoomRule, string(portal.MXID), &mautrix.ReqPutPushRule{
  669. Actions: []pushrules.PushActionType{pushrules.ActionDontNotify},
  670. })
  671. }
  672. if err != nil && !errors.Is(err, mautrix.MNotFound) {
  673. user.log.Warnfln("Failed to update push rule for %s through double puppet: %v", portal.MXID, err)
  674. }
  675. }
  676. type CustomTagData struct {
  677. Order json.Number `json:"order"`
  678. DoublePuppet string `json:"fi.mau.double_puppet_source"`
  679. }
  680. type CustomTagEventContent struct {
  681. Tags map[string]CustomTagData `json:"tags"`
  682. }
  683. func (user *User) updateChatTag(intent *appservice.IntentAPI, portal *Portal, tag string, active bool) {
  684. if len(portal.MXID) == 0 || len(tag) == 0 {
  685. return
  686. } else if intent == nil {
  687. doublePuppet := user.bridge.GetPuppetByCustomMXID(user.MXID)
  688. if doublePuppet == nil || doublePuppet.CustomIntent() == nil {
  689. return
  690. }
  691. intent = doublePuppet.CustomIntent()
  692. }
  693. var existingTags CustomTagEventContent
  694. err := intent.GetTagsWithCustomData(portal.MXID, &existingTags)
  695. if err != nil && !errors.Is(err, mautrix.MNotFound) {
  696. user.log.Warnfln("Failed to get tags of %s: %v", portal.MXID, err)
  697. }
  698. currentTag, ok := existingTags.Tags[tag]
  699. if active && !ok {
  700. user.log.Debugln("Adding tag", tag, "to", portal.MXID)
  701. data := CustomTagData{"0.5", doublePuppetValue}
  702. err = intent.AddTagWithCustomData(portal.MXID, tag, &data)
  703. } else if !active && ok && currentTag.DoublePuppet == doublePuppetValue {
  704. user.log.Debugln("Removing tag", tag, "from", portal.MXID)
  705. err = intent.RemoveTag(portal.MXID, tag)
  706. } else {
  707. err = nil
  708. }
  709. if err != nil {
  710. user.log.Warnfln("Failed to update tag %s for %s through double puppet: %v", tag, portal.MXID, err)
  711. }
  712. }
  713. type CustomReadReceipt struct {
  714. Timestamp int64 `json:"ts,omitempty"`
  715. DoublePuppetSource string `json:"fi.mau.double_puppet_source,omitempty"`
  716. }
  717. type CustomReadMarkers struct {
  718. mautrix.ReqSetReadMarkers
  719. ReadExtra CustomReadReceipt `json:"com.beeper.read.extra"`
  720. FullyReadExtra CustomReadReceipt `json:"com.beeper.fully_read.extra"`
  721. }
  722. func (user *User) syncChatDoublePuppetDetails(portal *Portal, justCreated bool) {
  723. doublePuppet := portal.bridge.GetPuppetByCustomMXID(user.MXID)
  724. if doublePuppet == nil {
  725. return
  726. }
  727. if doublePuppet == nil || doublePuppet.CustomIntent() == nil || len(portal.MXID) == 0 {
  728. return
  729. }
  730. if justCreated || !user.bridge.Config.Bridge.TagOnlyOnCreate {
  731. chat, err := user.Client.Store.ChatSettings.GetChatSettings(portal.Key.JID)
  732. if err != nil {
  733. user.log.Warnfln("Failed to get settings of %s: %v", portal.Key.JID, err)
  734. return
  735. }
  736. intent := doublePuppet.CustomIntent()
  737. if portal.Key.JID == types.StatusBroadcastJID && justCreated && user.bridge.Config.Bridge.MuteStatusBroadcast {
  738. user.updateChatMute(intent, portal, time.Now().Add(365*24*time.Hour))
  739. user.updateChatTag(intent, portal, user.bridge.Config.Bridge.ArchiveTag, true)
  740. return
  741. } else if !chat.Found {
  742. return
  743. }
  744. user.updateChatMute(intent, portal, chat.MutedUntil)
  745. user.updateChatTag(intent, portal, user.bridge.Config.Bridge.ArchiveTag, chat.Archived)
  746. user.updateChatTag(intent, portal, user.bridge.Config.Bridge.PinnedTag, chat.Pinned)
  747. }
  748. }
  749. func (user *User) getDirectChats() map[id.UserID][]id.RoomID {
  750. res := make(map[id.UserID][]id.RoomID)
  751. privateChats := user.bridge.DB.Portal.FindPrivateChats(user.JID.ToNonAD())
  752. for _, portal := range privateChats {
  753. if len(portal.MXID) > 0 {
  754. res[user.bridge.FormatPuppetMXID(portal.Key.JID)] = []id.RoomID{portal.MXID}
  755. }
  756. }
  757. return res
  758. }
  759. func (user *User) UpdateDirectChats(chats map[id.UserID][]id.RoomID) {
  760. if !user.bridge.Config.Bridge.SyncDirectChatList {
  761. return
  762. }
  763. puppet := user.bridge.GetPuppetByCustomMXID(user.MXID)
  764. if puppet == nil || puppet.CustomIntent() == nil {
  765. return
  766. }
  767. intent := puppet.CustomIntent()
  768. method := http.MethodPatch
  769. if chats == nil {
  770. chats = user.getDirectChats()
  771. method = http.MethodPut
  772. }
  773. user.log.Debugln("Updating m.direct list on homeserver")
  774. var err error
  775. if user.bridge.Config.Homeserver.Asmux {
  776. urlPath := intent.BuildBaseURL("_matrix", "client", "unstable", "com.beeper.asmux", "dms")
  777. _, err = intent.MakeFullRequest(mautrix.FullRequest{
  778. Method: method,
  779. URL: urlPath,
  780. Headers: http.Header{"X-Asmux-Auth": {user.bridge.AS.Registration.AppToken}},
  781. RequestJSON: chats,
  782. })
  783. } else {
  784. existingChats := make(map[id.UserID][]id.RoomID)
  785. err = intent.GetAccountData(event.AccountDataDirectChats.Type, &existingChats)
  786. if err != nil {
  787. user.log.Warnln("Failed to get m.direct list to update it:", err)
  788. return
  789. }
  790. for userID, rooms := range existingChats {
  791. if _, ok := user.bridge.ParsePuppetMXID(userID); !ok {
  792. // This is not a ghost user, include it in the new list
  793. chats[userID] = rooms
  794. } else if _, ok := chats[userID]; !ok && method == http.MethodPatch {
  795. // This is a ghost user, but we're not replacing the whole list, so include it too
  796. chats[userID] = rooms
  797. }
  798. }
  799. err = intent.SetAccountData(event.AccountDataDirectChats.Type, &chats)
  800. }
  801. if err != nil {
  802. user.log.Warnln("Failed to update m.direct list:", err)
  803. }
  804. }
  805. func (user *User) handleLoggedOut(onConnect bool, reason events.ConnectFailureReason) {
  806. errorCode := WAUnknownLogout
  807. if reason == events.ConnectFailureLoggedOut {
  808. errorCode = WALoggedOut
  809. } else if reason == events.ConnectFailureBanned {
  810. errorCode = WAAccountBanned
  811. }
  812. user.removeFromJIDMap(BridgeState{StateEvent: StateBadCredentials, Error: errorCode})
  813. user.DeleteConnection()
  814. user.Session = nil
  815. user.JID = types.EmptyJID
  816. user.Update()
  817. if onConnect {
  818. user.sendMarkdownBridgeAlert("Connecting to WhatsApp failed as the device was unlinked (error %s). Please link the bridge to your phone again.", reason)
  819. } else {
  820. user.sendMarkdownBridgeAlert("You were logged out from another device. Please link the bridge to your phone again.")
  821. }
  822. }
  823. func (user *User) GetPortalByMessageSource(ms types.MessageSource) *Portal {
  824. jid := ms.Chat
  825. if ms.IsIncomingBroadcast() {
  826. if ms.IsFromMe {
  827. jid = ms.BroadcastListOwner.ToNonAD()
  828. } else {
  829. jid = ms.Sender.ToNonAD()
  830. }
  831. if jid.IsEmpty() {
  832. return nil
  833. }
  834. }
  835. return user.bridge.GetPortalByJID(database.NewPortalKey(jid, user.JID))
  836. }
  837. func (user *User) GetPortalByJID(jid types.JID) *Portal {
  838. return user.bridge.GetPortalByJID(database.NewPortalKey(jid, user.JID))
  839. }
  840. func (user *User) syncPuppet(jid types.JID, reason string) {
  841. user.bridge.GetPuppetByJID(jid).SyncContact(user, false, reason)
  842. }
  843. func (user *User) ResyncContacts() error {
  844. contacts, err := user.Client.Store.Contacts.GetAllContacts()
  845. if err != nil {
  846. return fmt.Errorf("failed to get cached contacts: %w", err)
  847. }
  848. user.log.Infofln("Resyncing displaynames with %d contacts", len(contacts))
  849. for jid, contact := range contacts {
  850. puppet := user.bridge.GetPuppetByJID(jid)
  851. if puppet != nil {
  852. puppet.Sync(user, contact)
  853. } else {
  854. user.log.Warnfln("Got a nil puppet for %s while syncing contacts", jid)
  855. }
  856. }
  857. return nil
  858. }
  859. func (user *User) ResyncGroups(createPortals bool) error {
  860. groups, err := user.Client.GetJoinedGroups()
  861. if err != nil {
  862. return fmt.Errorf("failed to get group list from server: %w", err)
  863. }
  864. for _, group := range groups {
  865. portal := user.GetPortalByJID(group.JID)
  866. if len(portal.MXID) == 0 {
  867. if createPortals {
  868. err = portal.CreateMatrixRoom(user, group, true)
  869. if err != nil {
  870. return fmt.Errorf("failed to create room for %s: %w", group.JID, err)
  871. }
  872. }
  873. } else {
  874. portal.UpdateMatrixRoom(user, group)
  875. }
  876. }
  877. return nil
  878. }
  879. const WATypingTimeout = 15 * time.Second
  880. func (user *User) handleChatPresence(presence *events.ChatPresence) {
  881. puppet := user.bridge.GetPuppetByJID(presence.Sender)
  882. portal := user.GetPortalByJID(presence.Chat)
  883. if puppet == nil || portal == nil || len(portal.MXID) == 0 {
  884. return
  885. }
  886. if presence.State == types.ChatPresenceComposing {
  887. if puppet.typingIn != "" && puppet.typingAt.Add(WATypingTimeout).Before(time.Now()) {
  888. if puppet.typingIn == portal.MXID {
  889. return
  890. }
  891. _, _ = puppet.IntentFor(portal).UserTyping(puppet.typingIn, false, 0)
  892. }
  893. _, _ = puppet.IntentFor(portal).UserTyping(portal.MXID, true, WATypingTimeout.Milliseconds())
  894. puppet.typingIn = portal.MXID
  895. puppet.typingAt = time.Now()
  896. } else {
  897. _, _ = puppet.IntentFor(portal).UserTyping(portal.MXID, false, 0)
  898. puppet.typingIn = ""
  899. }
  900. }
  901. func (user *User) handleReceipt(receipt *events.Receipt) {
  902. if receipt.Type != events.ReceiptTypeRead && receipt.Type != events.ReceiptTypeReadSelf {
  903. return
  904. }
  905. portal := user.GetPortalByMessageSource(receipt.MessageSource)
  906. if portal == nil || len(portal.MXID) == 0 {
  907. return
  908. }
  909. portal.receipts <- PortalReceipt{evt: receipt, source: user}
  910. }
  911. func makeReadMarkerContent(eventID id.EventID, doublePuppet bool) CustomReadMarkers {
  912. var extra CustomReadReceipt
  913. if doublePuppet {
  914. extra.DoublePuppetSource = doublePuppetValue
  915. }
  916. return CustomReadMarkers{
  917. ReqSetReadMarkers: mautrix.ReqSetReadMarkers{
  918. Read: eventID,
  919. FullyRead: eventID,
  920. },
  921. ReadExtra: extra,
  922. FullyReadExtra: extra,
  923. }
  924. }
  925. func (user *User) markSelfReadFull(portal *Portal) {
  926. puppet := user.bridge.GetPuppetByCustomMXID(user.MXID)
  927. if puppet == nil || puppet.CustomIntent() == nil {
  928. return
  929. }
  930. lastMessage := user.bridge.DB.Message.GetLastInChat(portal.Key)
  931. if lastMessage == nil {
  932. return
  933. }
  934. user.SetLastReadTS(portal.Key, lastMessage.Timestamp)
  935. err := puppet.CustomIntent().SetReadMarkers(portal.MXID, makeReadMarkerContent(lastMessage.MXID, true))
  936. if err != nil {
  937. user.log.Warnfln("Failed to mark %s (last message) in %s as read: %v", lastMessage.MXID, portal.MXID, err)
  938. } else {
  939. user.log.Debugfln("Marked %s (last message) in %s as read", lastMessage.MXID, portal.MXID)
  940. }
  941. }
  942. func (user *User) handleGroupCreate(evt *events.JoinedGroup) {
  943. portal := user.GetPortalByJID(evt.JID)
  944. if len(portal.MXID) == 0 {
  945. err := portal.CreateMatrixRoom(user, &evt.GroupInfo, true)
  946. if err != nil {
  947. user.log.Errorln("Failed to create Matrix room after join notification: %v", err)
  948. }
  949. } else {
  950. portal.UpdateMatrixRoom(user, &evt.GroupInfo)
  951. }
  952. }
  953. func (user *User) handleGroupUpdate(evt *events.GroupInfo) {
  954. portal := user.GetPortalByJID(evt.JID)
  955. if portal == nil || len(portal.MXID) == 0 {
  956. user.log.Debugfln("Ignoring group info update in chat with no portal: %+v", evt)
  957. return
  958. }
  959. switch {
  960. case evt.Announce != nil:
  961. portal.RestrictMessageSending(evt.Announce.IsAnnounce)
  962. case evt.Locked != nil:
  963. portal.RestrictMetadataChanges(evt.Locked.IsLocked)
  964. case evt.Name != nil:
  965. portal.UpdateName(evt.Name.Name, evt.Name.NameSetBy, true)
  966. case evt.Topic != nil:
  967. portal.UpdateTopic(evt.Topic.Topic, evt.Topic.TopicSetBy, true)
  968. case evt.Leave != nil:
  969. if evt.Sender != nil && !evt.Sender.IsEmpty() {
  970. portal.HandleWhatsAppKick(user, *evt.Sender, evt.Leave)
  971. }
  972. case evt.Join != nil:
  973. portal.HandleWhatsAppInvite(user, evt.Sender, evt.Join)
  974. case evt.Promote != nil:
  975. portal.ChangeAdminStatus(evt.Promote, true)
  976. case evt.Demote != nil:
  977. portal.ChangeAdminStatus(evt.Demote, false)
  978. case evt.Ephemeral != nil:
  979. portal.UpdateGroupDisappearingMessages(evt.Sender, evt.Timestamp, evt.Ephemeral.DisappearingTimer)
  980. }
  981. }
  982. func (user *User) handlePictureUpdate(evt *events.Picture) {
  983. if evt.JID.Server == types.DefaultUserServer {
  984. puppet := user.bridge.GetPuppetByJID(evt.JID)
  985. user.log.Debugfln("Received picture update for puppet %s (current: %s, new: %s)", evt.JID, puppet.Avatar, evt.PictureID)
  986. if puppet.Avatar != evt.PictureID {
  987. puppet.UpdateAvatar(user)
  988. }
  989. } else if portal := user.GetPortalByJID(evt.JID); portal != nil {
  990. user.log.Debugfln("Received picture update for portal %s (current: %s, new: %s)", evt.JID, portal.Avatar, evt.PictureID)
  991. if portal.Avatar != evt.PictureID {
  992. portal.UpdateAvatar(user, evt.Author, true)
  993. }
  994. }
  995. }
  996. func (user *User) StartPM(jid types.JID, reason string) (*Portal, *Puppet, bool, error) {
  997. user.log.Debugln("Starting PM with", jid, "from", reason)
  998. puppet := user.bridge.GetPuppetByJID(jid)
  999. puppet.SyncContact(user, true, reason)
  1000. portal := user.GetPortalByJID(puppet.JID)
  1001. if len(portal.MXID) > 0 {
  1002. ok := portal.ensureUserInvited(user)
  1003. if !ok {
  1004. portal.log.Warnfln("ensureUserInvited(%s) returned false, creating new portal", user.MXID)
  1005. portal.MXID = ""
  1006. } else {
  1007. return portal, puppet, false, nil
  1008. }
  1009. }
  1010. err := portal.CreateMatrixRoom(user, nil, false)
  1011. return portal, puppet, true, err
  1012. }
  1013. const groupListCacheMaxAge = 24 * time.Hour
  1014. func (user *User) getCachedGroupList() ([]*types.GroupInfo, error) {
  1015. user.groupListCacheLock.Lock()
  1016. defer user.groupListCacheLock.Unlock()
  1017. if user.groupListCache != nil && user.groupListCacheTime.Add(groupListCacheMaxAge).After(time.Now()) {
  1018. return user.groupListCache, nil
  1019. }
  1020. var err error
  1021. user.groupListCache, err = user.Client.GetJoinedGroups()
  1022. user.groupListCacheTime = time.Now()
  1023. return user.groupListCache, err
  1024. }