user.go 38 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168
  1. // mautrix-whatsapp - A Matrix-WhatsApp puppeting bridge.
  2. // Copyright (C) 2022 Tulir Asokan
  3. //
  4. // This program is free software: you can redistribute it and/or modify
  5. // it under the terms of the GNU Affero General Public License as published by
  6. // the Free Software Foundation, either version 3 of the License, or
  7. // (at your option) any later version.
  8. //
  9. // This program is distributed in the hope that it will be useful,
  10. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. // GNU Affero General Public License for more details.
  13. //
  14. // You should have received a copy of the GNU Affero General Public License
  15. // along with this program. If not, see <https://www.gnu.org/licenses/>.
  16. package main
  17. import (
  18. "context"
  19. "encoding/json"
  20. "errors"
  21. "fmt"
  22. "math"
  23. "net/http"
  24. "strconv"
  25. "strings"
  26. "sync"
  27. "time"
  28. log "maunium.net/go/maulogger/v2"
  29. "maunium.net/go/mautrix"
  30. "maunium.net/go/mautrix/appservice"
  31. "maunium.net/go/mautrix/event"
  32. "maunium.net/go/mautrix/format"
  33. "maunium.net/go/mautrix/id"
  34. "maunium.net/go/mautrix/pushrules"
  35. "go.mau.fi/whatsmeow"
  36. "go.mau.fi/whatsmeow/appstate"
  37. waProto "go.mau.fi/whatsmeow/binary/proto"
  38. "go.mau.fi/whatsmeow/store"
  39. "go.mau.fi/whatsmeow/types"
  40. "go.mau.fi/whatsmeow/types/events"
  41. waLog "go.mau.fi/whatsmeow/util/log"
  42. "maunium.net/go/mautrix-whatsapp/database"
  43. )
  44. type User struct {
  45. *database.User
  46. Client *whatsmeow.Client
  47. Session *store.Device
  48. bridge *Bridge
  49. log log.Logger
  50. Admin bool
  51. Whitelisted bool
  52. RelayWhitelisted bool
  53. mgmtCreateLock sync.Mutex
  54. spaceCreateLock sync.Mutex
  55. connLock sync.Mutex
  56. historySyncs chan *events.HistorySync
  57. prevBridgeStatus *BridgeState
  58. lastPresence types.Presence
  59. historySyncLoopsStarted bool
  60. spaceMembershipChecked bool
  61. lastPhoneOfflineWarning time.Time
  62. groupListCache []*types.GroupInfo
  63. groupListCacheLock sync.Mutex
  64. groupListCacheTime time.Time
  65. bridgeStateQueue chan BridgeState
  66. BackfillQueue *BackfillQueue
  67. }
  68. func (bridge *Bridge) getUserByMXID(userID id.UserID, onlyIfExists bool) *User {
  69. _, isPuppet := bridge.ParsePuppetMXID(userID)
  70. if isPuppet || userID == bridge.Bot.UserID {
  71. return nil
  72. }
  73. bridge.usersLock.Lock()
  74. defer bridge.usersLock.Unlock()
  75. user, ok := bridge.usersByMXID[userID]
  76. if !ok {
  77. userIDPtr := &userID
  78. if onlyIfExists {
  79. userIDPtr = nil
  80. }
  81. return bridge.loadDBUser(bridge.DB.User.GetByMXID(userID), userIDPtr)
  82. }
  83. return user
  84. }
  85. func (bridge *Bridge) GetUserByMXID(userID id.UserID) *User {
  86. return bridge.getUserByMXID(userID, false)
  87. }
  88. func (bridge *Bridge) GetUserByMXIDIfExists(userID id.UserID) *User {
  89. return bridge.getUserByMXID(userID, true)
  90. }
  91. func (bridge *Bridge) GetUserByJID(jid types.JID) *User {
  92. bridge.usersLock.Lock()
  93. defer bridge.usersLock.Unlock()
  94. user, ok := bridge.usersByUsername[jid.User]
  95. if !ok {
  96. return bridge.loadDBUser(bridge.DB.User.GetByUsername(jid.User), nil)
  97. }
  98. return user
  99. }
  100. func (user *User) addToJIDMap() {
  101. user.bridge.usersLock.Lock()
  102. user.bridge.usersByUsername[user.JID.User] = user
  103. user.bridge.usersLock.Unlock()
  104. }
  105. func (user *User) removeFromJIDMap(state BridgeState) {
  106. user.bridge.usersLock.Lock()
  107. jidUser, ok := user.bridge.usersByUsername[user.JID.User]
  108. if ok && user == jidUser {
  109. delete(user.bridge.usersByUsername, user.JID.User)
  110. }
  111. user.bridge.usersLock.Unlock()
  112. user.bridge.Metrics.TrackLoginState(user.JID, false)
  113. user.sendBridgeState(state)
  114. }
  115. func (bridge *Bridge) GetAllUsers() []*User {
  116. bridge.usersLock.Lock()
  117. defer bridge.usersLock.Unlock()
  118. dbUsers := bridge.DB.User.GetAll()
  119. output := make([]*User, len(dbUsers))
  120. for index, dbUser := range dbUsers {
  121. user, ok := bridge.usersByMXID[dbUser.MXID]
  122. if !ok {
  123. user = bridge.loadDBUser(dbUser, nil)
  124. }
  125. output[index] = user
  126. }
  127. return output
  128. }
  129. func (bridge *Bridge) loadDBUser(dbUser *database.User, mxid *id.UserID) *User {
  130. if dbUser == nil {
  131. if mxid == nil {
  132. return nil
  133. }
  134. dbUser = bridge.DB.User.New()
  135. dbUser.MXID = *mxid
  136. dbUser.Insert()
  137. }
  138. user := bridge.NewUser(dbUser)
  139. bridge.usersByMXID[user.MXID] = user
  140. if !user.JID.IsEmpty() {
  141. var err error
  142. user.Session, err = bridge.WAContainer.GetDevice(user.JID)
  143. if err != nil {
  144. user.log.Errorfln("Failed to load user's whatsapp session: %v", err)
  145. } else if user.Session == nil {
  146. user.log.Warnfln("Didn't find session data for %s, treating user as logged out", user.JID)
  147. user.JID = types.EmptyJID
  148. user.Update()
  149. } else {
  150. user.Session.Log = &waLogger{user.log.Sub("Session")}
  151. bridge.usersByUsername[user.JID.User] = user
  152. }
  153. }
  154. if len(user.ManagementRoom) > 0 {
  155. bridge.managementRooms[user.ManagementRoom] = user
  156. }
  157. return user
  158. }
  159. func (bridge *Bridge) NewUser(dbUser *database.User) *User {
  160. user := &User{
  161. User: dbUser,
  162. bridge: bridge,
  163. log: bridge.Log.Sub("User").Sub(string(dbUser.MXID)),
  164. historySyncs: make(chan *events.HistorySync, 32),
  165. lastPresence: types.PresenceUnavailable,
  166. }
  167. user.RelayWhitelisted = user.bridge.Config.Bridge.Permissions.IsRelayWhitelisted(user.MXID)
  168. user.Whitelisted = user.bridge.Config.Bridge.Permissions.IsWhitelisted(user.MXID)
  169. user.Admin = user.bridge.Config.Bridge.Permissions.IsAdmin(user.MXID)
  170. if len(user.bridge.Config.Homeserver.StatusEndpoint) > 0 {
  171. user.bridgeStateQueue = make(chan BridgeState, 10)
  172. go user.bridgeStateLoop()
  173. }
  174. return user
  175. }
  176. func (user *User) ensureInvited(intent *appservice.IntentAPI, roomID id.RoomID, isDirect bool) (ok bool) {
  177. inviteContent := event.Content{
  178. Parsed: &event.MemberEventContent{
  179. Membership: event.MembershipInvite,
  180. IsDirect: isDirect,
  181. },
  182. Raw: map[string]interface{}{},
  183. }
  184. customPuppet := user.bridge.GetPuppetByCustomMXID(user.MXID)
  185. if customPuppet != nil && customPuppet.CustomIntent() != nil {
  186. inviteContent.Raw["fi.mau.will_auto_accept"] = true
  187. }
  188. _, err := intent.SendStateEvent(roomID, event.StateMember, user.MXID.String(), &inviteContent)
  189. var httpErr mautrix.HTTPError
  190. if err != nil && errors.As(err, &httpErr) && httpErr.RespError != nil && strings.Contains(httpErr.RespError.Err, "is already in the room") {
  191. user.bridge.StateStore.SetMembership(roomID, user.MXID, event.MembershipJoin)
  192. ok = true
  193. return
  194. } else if err != nil {
  195. user.log.Warnfln("Failed to invite user to %s: %v", roomID, err)
  196. } else {
  197. ok = true
  198. }
  199. if customPuppet != nil && customPuppet.CustomIntent() != nil {
  200. err = customPuppet.CustomIntent().EnsureJoined(roomID, appservice.EnsureJoinedParams{IgnoreCache: true})
  201. if err != nil {
  202. user.log.Warnfln("Failed to auto-join %s: %v", roomID, err)
  203. ok = false
  204. } else {
  205. ok = true
  206. }
  207. }
  208. return
  209. }
  210. func (user *User) GetSpaceRoom() id.RoomID {
  211. if !user.bridge.Config.Bridge.PersonalFilteringSpaces {
  212. return ""
  213. }
  214. if len(user.SpaceRoom) == 0 {
  215. user.spaceCreateLock.Lock()
  216. defer user.spaceCreateLock.Unlock()
  217. if len(user.SpaceRoom) > 0 {
  218. return user.SpaceRoom
  219. }
  220. resp, err := user.bridge.Bot.CreateRoom(&mautrix.ReqCreateRoom{
  221. Visibility: "private",
  222. Name: "WhatsApp",
  223. Topic: "Your WhatsApp bridged chats",
  224. InitialState: []*event.Event{{
  225. Type: event.StateRoomAvatar,
  226. Content: event.Content{
  227. Parsed: &event.RoomAvatarEventContent{
  228. URL: user.bridge.Config.AppService.Bot.ParsedAvatar,
  229. },
  230. },
  231. }},
  232. CreationContent: map[string]interface{}{
  233. "type": event.RoomTypeSpace,
  234. },
  235. PowerLevelOverride: &event.PowerLevelsEventContent{
  236. Users: map[id.UserID]int{
  237. user.bridge.Bot.UserID: 9001,
  238. user.MXID: 50,
  239. },
  240. },
  241. })
  242. if err != nil {
  243. user.log.Errorln("Failed to auto-create space room:", err)
  244. } else {
  245. user.SpaceRoom = resp.RoomID
  246. user.Update()
  247. user.ensureInvited(user.bridge.Bot, user.SpaceRoom, false)
  248. }
  249. } else if !user.spaceMembershipChecked && !user.bridge.StateStore.IsInRoom(user.SpaceRoom, user.MXID) {
  250. user.ensureInvited(user.bridge.Bot, user.SpaceRoom, false)
  251. }
  252. user.spaceMembershipChecked = true
  253. return user.SpaceRoom
  254. }
  255. func (user *User) GetManagementRoom() id.RoomID {
  256. if len(user.ManagementRoom) == 0 {
  257. user.mgmtCreateLock.Lock()
  258. defer user.mgmtCreateLock.Unlock()
  259. if len(user.ManagementRoom) > 0 {
  260. return user.ManagementRoom
  261. }
  262. creationContent := make(map[string]interface{})
  263. if !user.bridge.Config.Bridge.FederateRooms {
  264. creationContent["m.federate"] = false
  265. }
  266. resp, err := user.bridge.Bot.CreateRoom(&mautrix.ReqCreateRoom{
  267. Topic: "WhatsApp bridge notices",
  268. IsDirect: true,
  269. CreationContent: creationContent,
  270. })
  271. if err != nil {
  272. user.log.Errorln("Failed to auto-create management room:", err)
  273. } else {
  274. user.SetManagementRoom(resp.RoomID)
  275. }
  276. }
  277. return user.ManagementRoom
  278. }
  279. func (user *User) SetManagementRoom(roomID id.RoomID) {
  280. existingUser, ok := user.bridge.managementRooms[roomID]
  281. if ok {
  282. existingUser.ManagementRoom = ""
  283. existingUser.Update()
  284. }
  285. user.ManagementRoom = roomID
  286. user.bridge.managementRooms[user.ManagementRoom] = user
  287. user.Update()
  288. }
  289. type waLogger struct{ l log.Logger }
  290. func (w *waLogger) Debugf(msg string, args ...interface{}) { w.l.Debugfln(msg, args...) }
  291. func (w *waLogger) Infof(msg string, args ...interface{}) { w.l.Infofln(msg, args...) }
  292. func (w *waLogger) Warnf(msg string, args ...interface{}) { w.l.Warnfln(msg, args...) }
  293. func (w *waLogger) Errorf(msg string, args ...interface{}) { w.l.Errorfln(msg, args...) }
  294. func (w *waLogger) Sub(module string) waLog.Logger { return &waLogger{l: w.l.Sub(module)} }
  295. var ErrAlreadyLoggedIn = errors.New("already logged in")
  296. func (user *User) createClient(sess *store.Device) {
  297. user.Client = whatsmeow.NewClient(sess, &waLogger{user.log.Sub("Client")})
  298. user.Client.AddEventHandler(user.HandleEvent)
  299. user.Client.SetForceActiveDeliveryReceipts(user.bridge.Config.Bridge.ForceActiveDeliveryReceipts)
  300. user.Client.GetMessageForRetry = func(to types.JID, id types.MessageID) *waProto.Message {
  301. user.bridge.Metrics.TrackRetryReceipt(0, false)
  302. return nil
  303. }
  304. user.Client.PreRetryCallback = func(receipt *events.Receipt, retryCount int, msg *waProto.Message) bool {
  305. user.bridge.Metrics.TrackRetryReceipt(retryCount, true)
  306. return true
  307. }
  308. }
  309. func (user *User) Login(ctx context.Context) (<-chan whatsmeow.QRChannelItem, error) {
  310. user.connLock.Lock()
  311. defer user.connLock.Unlock()
  312. if user.Session != nil {
  313. return nil, ErrAlreadyLoggedIn
  314. } else if user.Client != nil {
  315. user.unlockedDeleteConnection()
  316. }
  317. newSession := user.bridge.WAContainer.NewDevice()
  318. newSession.Log = &waLogger{user.log.Sub("Session")}
  319. user.createClient(newSession)
  320. qrChan, err := user.Client.GetQRChannel(ctx)
  321. if err != nil {
  322. return nil, fmt.Errorf("failed to get QR channel: %w", err)
  323. }
  324. err = user.Client.Connect()
  325. if err != nil {
  326. return nil, fmt.Errorf("failed to connect to WhatsApp: %w", err)
  327. }
  328. return qrChan, nil
  329. }
  330. func (user *User) Connect() bool {
  331. user.connLock.Lock()
  332. defer user.connLock.Unlock()
  333. if user.Client != nil {
  334. return user.Client.IsConnected()
  335. } else if user.Session == nil {
  336. return false
  337. }
  338. user.log.Debugln("Connecting to WhatsApp")
  339. user.sendBridgeState(BridgeState{StateEvent: StateConnecting, Error: WAConnecting})
  340. user.createClient(user.Session)
  341. err := user.Client.Connect()
  342. if err != nil {
  343. user.log.Warnln("Error connecting to WhatsApp:", err)
  344. user.sendBridgeState(BridgeState{
  345. StateEvent: StateUnknownError,
  346. Error: WAConnectionFailed,
  347. Info: map[string]interface{}{
  348. "go_error": err.Error(),
  349. },
  350. })
  351. return false
  352. }
  353. return true
  354. }
  355. func (user *User) unlockedDeleteConnection() {
  356. if user.Client == nil {
  357. return
  358. }
  359. user.Client.Disconnect()
  360. user.Client.RemoveEventHandlers()
  361. user.Client = nil
  362. user.bridge.Metrics.TrackConnectionState(user.JID, false)
  363. }
  364. func (user *User) DeleteConnection() {
  365. user.connLock.Lock()
  366. defer user.connLock.Unlock()
  367. user.unlockedDeleteConnection()
  368. }
  369. func (user *User) HasSession() bool {
  370. return user.Session != nil
  371. }
  372. func (user *User) DeleteSession() {
  373. if user.Session != nil {
  374. err := user.Session.Delete()
  375. if err != nil {
  376. user.log.Warnln("Failed to delete session:", err)
  377. }
  378. user.Session = nil
  379. }
  380. if !user.JID.IsEmpty() {
  381. user.JID = types.EmptyJID
  382. user.Update()
  383. }
  384. // Delete all of the backfill and history sync data.
  385. user.bridge.DB.Backfill.DeleteAll(user.MXID)
  386. user.bridge.DB.HistorySync.DeleteAllConversations(user.MXID)
  387. user.bridge.DB.HistorySync.DeleteAllMessages(user.MXID)
  388. user.bridge.DB.MediaBackfillRequest.DeleteAllMediaBackfillRequests(user.MXID)
  389. }
  390. func (user *User) IsConnected() bool {
  391. return user.Client != nil && user.Client.IsConnected()
  392. }
  393. func (user *User) IsLoggedIn() bool {
  394. return user.IsConnected() && user.Client.IsLoggedIn()
  395. }
  396. func (user *User) tryAutomaticDoublePuppeting() {
  397. if !user.bridge.Config.CanAutoDoublePuppet(user.MXID) {
  398. return
  399. }
  400. user.log.Debugln("Checking if double puppeting needs to be enabled")
  401. puppet := user.bridge.GetPuppetByJID(user.JID)
  402. if len(puppet.CustomMXID) > 0 {
  403. user.log.Debugln("User already has double-puppeting enabled")
  404. // Custom puppet already enabled
  405. return
  406. }
  407. accessToken, err := puppet.loginWithSharedSecret(user.MXID)
  408. if err != nil {
  409. user.log.Warnln("Failed to login with shared secret:", err)
  410. return
  411. }
  412. err = puppet.SwitchCustomMXID(accessToken, user.MXID)
  413. if err != nil {
  414. puppet.log.Warnln("Failed to switch to auto-logined custom puppet:", err)
  415. return
  416. }
  417. user.log.Infoln("Successfully automatically enabled custom puppet")
  418. }
  419. func (user *User) sendMarkdownBridgeAlert(formatString string, args ...interface{}) {
  420. if user.bridge.Config.Bridge.DisableBridgeAlerts {
  421. return
  422. }
  423. notice := fmt.Sprintf(formatString, args...)
  424. content := format.RenderMarkdown(notice, true, false)
  425. _, err := user.bridge.Bot.SendMessageEvent(user.GetManagementRoom(), event.EventMessage, content)
  426. if err != nil {
  427. user.log.Warnf("Failed to send bridge alert \"%s\": %v", notice, err)
  428. }
  429. }
  430. const callEventMaxAge = 15 * time.Minute
  431. func (user *User) handleCallStart(sender types.JID, id, callType string, ts time.Time) {
  432. if !user.bridge.Config.Bridge.CallStartNotices || ts.Add(callEventMaxAge).Before(time.Now()) {
  433. return
  434. }
  435. portal := user.GetPortalByJID(sender)
  436. text := "Incoming call"
  437. if callType != "" {
  438. text = fmt.Sprintf("Incoming %s call", callType)
  439. }
  440. portal.messages <- PortalMessage{
  441. fake: &fakeMessage{
  442. Sender: sender,
  443. Text: text,
  444. ID: id,
  445. Time: ts,
  446. Important: true,
  447. },
  448. source: user,
  449. }
  450. }
  451. const PhoneDisconnectWarningTime = 12 * 24 * time.Hour // 12 days
  452. const PhoneDisconnectPingTime = 10 * 24 * time.Hour
  453. const PhoneMinPingInterval = 24 * time.Hour
  454. func (user *User) sendHackyPhonePing() {
  455. user.PhoneLastPinged = time.Now()
  456. msgID := whatsmeow.GenerateMessageID()
  457. keyIDs := make([]*waProto.AppStateSyncKeyId, 0, 1)
  458. lastKeyID, err := user.GetLastAppStateKeyID()
  459. if lastKeyID != nil {
  460. keyIDs = append(keyIDs, &waProto.AppStateSyncKeyId{
  461. KeyId: lastKeyID,
  462. })
  463. } else {
  464. user.log.Warnfln("Failed to get last app state key ID to send hacky phone ping: %v - sending empty request", err)
  465. }
  466. ts, err := user.Client.SendMessage(user.JID.ToNonAD(), msgID, &waProto.Message{
  467. ProtocolMessage: &waProto.ProtocolMessage{
  468. Type: waProto.ProtocolMessage_APP_STATE_SYNC_KEY_REQUEST.Enum(),
  469. AppStateSyncKeyRequest: &waProto.AppStateSyncKeyRequest{
  470. KeyIds: keyIDs,
  471. },
  472. },
  473. })
  474. if err != nil {
  475. user.log.Warnfln("Failed to send hacky phone ping: %v", err)
  476. } else {
  477. user.log.Debugfln("Sent hacky phone ping %s/%s because phone has been offline for >10 days", msgID, ts.Unix())
  478. user.PhoneLastPinged = ts
  479. user.Update()
  480. }
  481. }
  482. func (user *User) PhoneRecentlySeen(doPing bool) bool {
  483. if doPing && !user.PhoneLastSeen.IsZero() && user.PhoneLastSeen.Add(PhoneDisconnectPingTime).Before(time.Now()) && user.PhoneLastPinged.Add(PhoneMinPingInterval).Before(time.Now()) {
  484. // Over 10 days since the phone was seen and over a day since the last somewhat hacky ping, send a new ping.
  485. go user.sendHackyPhonePing()
  486. }
  487. return user.PhoneLastSeen.IsZero() || user.PhoneLastSeen.Add(PhoneDisconnectWarningTime).After(time.Now())
  488. }
  489. // phoneSeen records a timestamp when the user's main device was seen online.
  490. // The stored timestamp can later be used to warn the user if the main device is offline for too long.
  491. func (user *User) phoneSeen(ts time.Time) {
  492. if user.PhoneLastSeen.Add(1 * time.Hour).After(ts) {
  493. // The last seen timestamp isn't going to be perfectly accurate in any case,
  494. // so don't spam the database with an update every time there's an event.
  495. return
  496. } else if !user.PhoneRecentlySeen(false) {
  497. if user.GetPrevBridgeState().Error == WAPhoneOffline && user.IsConnected() {
  498. user.log.Debugfln("Saw phone after current bridge state said it has been offline, switching state back to connected")
  499. go user.sendBridgeState(BridgeState{StateEvent: StateConnected})
  500. } else {
  501. user.log.Debugfln("Saw phone after current bridge state said it has been offline, not sending new bridge state (prev: %s, connected: %t)", user.GetPrevBridgeState().Error, user.IsConnected())
  502. }
  503. }
  504. user.PhoneLastSeen = ts
  505. go user.Update()
  506. }
  507. func formatDisconnectTime(dur time.Duration) string {
  508. days := int(math.Floor(dur.Hours() / 24))
  509. hours := int(dur.Hours()) % 24
  510. if hours == 0 {
  511. return fmt.Sprintf("%d days", days)
  512. } else if hours == 1 {
  513. return fmt.Sprintf("%d days and 1 hour", days)
  514. } else {
  515. return fmt.Sprintf("%d days and %d hours", days, hours)
  516. }
  517. }
  518. func (user *User) sendPhoneOfflineWarning() {
  519. if user.lastPhoneOfflineWarning.Add(12 * time.Hour).After(time.Now()) {
  520. // Don't spam the warning too much
  521. return
  522. }
  523. user.lastPhoneOfflineWarning = time.Now()
  524. timeSinceSeen := time.Now().Sub(user.PhoneLastSeen)
  525. user.sendMarkdownBridgeAlert("Your phone hasn't been seen in %s. The server will force the bridge to log out if the phone is not active at least every 2 weeks.", formatDisconnectTime(timeSinceSeen))
  526. }
  527. func (user *User) HandleEvent(event interface{}) {
  528. switch v := event.(type) {
  529. case *events.LoggedOut:
  530. go user.handleLoggedOut(v.OnConnect, v.Reason)
  531. case *events.Connected:
  532. user.bridge.Metrics.TrackConnectionState(user.JID, true)
  533. user.bridge.Metrics.TrackLoginState(user.JID, true)
  534. if len(user.Client.Store.PushName) > 0 {
  535. go func() {
  536. err := user.Client.SendPresence(user.lastPresence)
  537. if err != nil {
  538. user.log.Warnln("Failed to send initial presence:", err)
  539. }
  540. }()
  541. }
  542. go user.tryAutomaticDoublePuppeting()
  543. if user.bridge.Config.Bridge.HistorySync.Backfill && !user.historySyncLoopsStarted {
  544. go user.handleHistorySyncsLoop()
  545. user.historySyncLoopsStarted = true
  546. }
  547. case *events.OfflineSyncPreview:
  548. user.log.Infofln("Server says it's going to send %d messages and %d receipts that were missed during downtime", v.Messages, v.Receipts)
  549. go user.sendBridgeState(BridgeState{
  550. StateEvent: StateBackfilling,
  551. Message: fmt.Sprintf("backfilling %d messages and %d receipts", v.Messages, v.Receipts),
  552. })
  553. case *events.OfflineSyncCompleted:
  554. if !user.PhoneRecentlySeen(true) {
  555. user.log.Infofln("Offline sync completed, but phone last seen date is still %s - sending phone offline bridge status", user.PhoneLastSeen)
  556. go user.sendBridgeState(BridgeState{StateEvent: StateTransientDisconnect, Error: WAPhoneOffline})
  557. } else {
  558. if user.GetPrevBridgeState().StateEvent == StateBackfilling {
  559. user.log.Infoln("Offline sync completed")
  560. }
  561. go user.sendBridgeState(BridgeState{StateEvent: StateConnected})
  562. }
  563. case *events.AppStateSyncComplete:
  564. if len(user.Client.Store.PushName) > 0 && v.Name == appstate.WAPatchCriticalBlock {
  565. err := user.Client.SendPresence(user.lastPresence)
  566. if err != nil {
  567. user.log.Warnln("Failed to send presence after app state sync:", err)
  568. }
  569. } else if v.Name == appstate.WAPatchCriticalUnblockLow {
  570. go func() {
  571. err := user.ResyncContacts()
  572. if err != nil {
  573. user.log.Errorln("Failed to resync puppets: %v", err)
  574. }
  575. }()
  576. }
  577. case *events.PushNameSetting:
  578. // Send presence available when connecting and when the pushname is changed.
  579. // This makes sure that outgoing messages always have the right pushname.
  580. err := user.Client.SendPresence(user.lastPresence)
  581. if err != nil {
  582. user.log.Warnln("Failed to send presence after push name update:", err)
  583. }
  584. case *events.PairSuccess:
  585. user.PhoneLastSeen = time.Now()
  586. user.Session = user.Client.Store
  587. user.JID = v.ID
  588. user.addToJIDMap()
  589. user.Update()
  590. case *events.StreamError:
  591. var message string
  592. if v.Code != "" {
  593. message = fmt.Sprintf("Unknown stream error with code %s", v.Code)
  594. } else if children := v.Raw.GetChildren(); len(children) > 0 {
  595. message = fmt.Sprintf("Unknown stream error (contains %s node)", children[0].Tag)
  596. } else {
  597. message = "Unknown stream error"
  598. }
  599. go user.sendBridgeState(BridgeState{StateEvent: StateUnknownError, Message: message})
  600. user.bridge.Metrics.TrackConnectionState(user.JID, false)
  601. case *events.ConnectFailure:
  602. go user.sendBridgeState(BridgeState{StateEvent: StateUnknownError, Message: fmt.Sprintf("Unknown connection failure: %s", v.Reason)})
  603. user.bridge.Metrics.TrackConnectionState(user.JID, false)
  604. case *events.ClientOutdated:
  605. user.log.Errorfln("Got a client outdated connect failure. The bridge is likely out of date, please update immediately.")
  606. go user.sendBridgeState(BridgeState{StateEvent: StateUnknownError, Message: "Connect failure: 405 client outdated"})
  607. user.bridge.Metrics.TrackConnectionState(user.JID, false)
  608. case *events.TemporaryBan:
  609. go user.sendBridgeState(BridgeState{StateEvent: StateBadCredentials, Message: v.String()})
  610. user.bridge.Metrics.TrackConnectionState(user.JID, false)
  611. case *events.Disconnected:
  612. // Don't send the normal transient disconnect state if we're already in a different transient disconnect state.
  613. // TODO remove this if/when the phone offline state is moved to a sub-state of CONNECTED
  614. if user.GetPrevBridgeState().Error != WAPhoneOffline && user.PhoneRecentlySeen(false) {
  615. go user.sendBridgeState(BridgeState{StateEvent: StateTransientDisconnect, Message: "Disconnected from WhatsApp. Trying to reconnect."})
  616. }
  617. user.bridge.Metrics.TrackConnectionState(user.JID, false)
  618. case *events.Contact:
  619. go user.syncPuppet(v.JID, "contact event")
  620. case *events.PushName:
  621. go user.syncPuppet(v.JID, "push name event")
  622. case *events.GroupInfo:
  623. user.groupListCache = nil
  624. go user.handleGroupUpdate(v)
  625. case *events.JoinedGroup:
  626. user.groupListCache = nil
  627. go user.handleGroupCreate(v)
  628. case *events.Picture:
  629. go user.handlePictureUpdate(v)
  630. case *events.Receipt:
  631. if v.IsFromMe && v.Sender.Device == 0 {
  632. user.phoneSeen(v.Timestamp)
  633. }
  634. go user.handleReceipt(v)
  635. case *events.ChatPresence:
  636. go user.handleChatPresence(v)
  637. case *events.Message:
  638. portal := user.GetPortalByMessageSource(v.Info.MessageSource)
  639. portal.messages <- PortalMessage{evt: v, source: user}
  640. case *events.MediaRetry:
  641. user.phoneSeen(v.Timestamp)
  642. portal := user.GetPortalByJID(v.ChatID)
  643. portal.mediaRetries <- PortalMediaRetry{evt: v, source: user}
  644. case *events.CallOffer:
  645. user.handleCallStart(v.CallCreator, v.CallID, "", v.Timestamp)
  646. case *events.CallOfferNotice:
  647. user.handleCallStart(v.CallCreator, v.CallID, v.Type, v.Timestamp)
  648. case *events.IdentityChange:
  649. puppet := user.bridge.GetPuppetByJID(v.JID)
  650. portal := user.GetPortalByJID(v.JID)
  651. if len(portal.MXID) > 0 && user.bridge.Config.Bridge.IdentityChangeNotices {
  652. text := fmt.Sprintf("Your security code with %s changed.", puppet.Displayname)
  653. if v.Implicit {
  654. text = fmt.Sprintf("Your security code with %s (device #%d) changed.", puppet.Displayname, v.JID.Device)
  655. }
  656. portal.messages <- PortalMessage{
  657. fake: &fakeMessage{
  658. Sender: v.JID,
  659. Text: text,
  660. ID: strconv.FormatInt(v.Timestamp.Unix(), 10),
  661. Time: v.Timestamp,
  662. Important: false,
  663. },
  664. source: user,
  665. }
  666. }
  667. case *events.CallTerminate, *events.CallRelayLatency, *events.CallAccept, *events.UnknownCallEvent:
  668. // ignore
  669. case *events.UndecryptableMessage:
  670. portal := user.GetPortalByMessageSource(v.Info.MessageSource)
  671. portal.messages <- PortalMessage{undecryptable: v, source: user}
  672. case *events.HistorySync:
  673. if user.bridge.Config.Bridge.HistorySync.Backfill {
  674. user.historySyncs <- v
  675. }
  676. case *events.Mute:
  677. portal := user.GetPortalByJID(v.JID)
  678. if portal != nil {
  679. var mutedUntil time.Time
  680. if v.Action.GetMuted() {
  681. mutedUntil = time.Unix(v.Action.GetMuteEndTimestamp(), 0)
  682. }
  683. go user.updateChatMute(nil, portal, mutedUntil)
  684. }
  685. case *events.Archive:
  686. portal := user.GetPortalByJID(v.JID)
  687. if portal != nil {
  688. go user.updateChatTag(nil, portal, user.bridge.Config.Bridge.ArchiveTag, v.Action.GetArchived())
  689. }
  690. case *events.Pin:
  691. portal := user.GetPortalByJID(v.JID)
  692. if portal != nil {
  693. go user.updateChatTag(nil, portal, user.bridge.Config.Bridge.PinnedTag, v.Action.GetPinned())
  694. }
  695. case *events.AppState:
  696. // Ignore
  697. case *events.KeepAliveTimeout:
  698. go user.sendBridgeState(BridgeState{StateEvent: StateTransientDisconnect, Error: WAKeepaliveTimeout})
  699. case *events.KeepAliveRestored:
  700. user.log.Infof("Keepalive restored after timeouts, sending connected event")
  701. go user.sendBridgeState(BridgeState{StateEvent: StateConnected})
  702. default:
  703. user.log.Debugfln("Unknown type of event in HandleEvent: %T", v)
  704. }
  705. }
  706. func (user *User) updateChatMute(intent *appservice.IntentAPI, portal *Portal, mutedUntil time.Time) {
  707. if len(portal.MXID) == 0 || !user.bridge.Config.Bridge.MuteBridging {
  708. return
  709. } else if intent == nil {
  710. doublePuppet := user.bridge.GetPuppetByCustomMXID(user.MXID)
  711. if doublePuppet == nil || doublePuppet.CustomIntent() == nil {
  712. return
  713. }
  714. intent = doublePuppet.CustomIntent()
  715. }
  716. var err error
  717. if mutedUntil.IsZero() && mutedUntil.Before(time.Now()) {
  718. user.log.Debugfln("Portal %s is muted until %s, unmuting...", portal.MXID, mutedUntil)
  719. err = intent.DeletePushRule("global", pushrules.RoomRule, string(portal.MXID))
  720. } else {
  721. user.log.Debugfln("Portal %s is muted until %s, muting...", portal.MXID, mutedUntil)
  722. err = intent.PutPushRule("global", pushrules.RoomRule, string(portal.MXID), &mautrix.ReqPutPushRule{
  723. Actions: []pushrules.PushActionType{pushrules.ActionDontNotify},
  724. })
  725. }
  726. if err != nil && !errors.Is(err, mautrix.MNotFound) {
  727. user.log.Warnfln("Failed to update push rule for %s through double puppet: %v", portal.MXID, err)
  728. }
  729. }
  730. type CustomTagData struct {
  731. Order json.Number `json:"order"`
  732. DoublePuppet string `json:"fi.mau.double_puppet_source"`
  733. }
  734. type CustomTagEventContent struct {
  735. Tags map[string]CustomTagData `json:"tags"`
  736. }
  737. func (user *User) updateChatTag(intent *appservice.IntentAPI, portal *Portal, tag string, active bool) {
  738. if len(portal.MXID) == 0 || len(tag) == 0 {
  739. return
  740. } else if intent == nil {
  741. doublePuppet := user.bridge.GetPuppetByCustomMXID(user.MXID)
  742. if doublePuppet == nil || doublePuppet.CustomIntent() == nil {
  743. return
  744. }
  745. intent = doublePuppet.CustomIntent()
  746. }
  747. var existingTags CustomTagEventContent
  748. err := intent.GetTagsWithCustomData(portal.MXID, &existingTags)
  749. if err != nil && !errors.Is(err, mautrix.MNotFound) {
  750. user.log.Warnfln("Failed to get tags of %s: %v", portal.MXID, err)
  751. }
  752. currentTag, ok := existingTags.Tags[tag]
  753. if active && !ok {
  754. user.log.Debugln("Adding tag", tag, "to", portal.MXID)
  755. data := CustomTagData{"0.5", doublePuppetValue}
  756. err = intent.AddTagWithCustomData(portal.MXID, tag, &data)
  757. } else if !active && ok && currentTag.DoublePuppet == doublePuppetValue {
  758. user.log.Debugln("Removing tag", tag, "from", portal.MXID)
  759. err = intent.RemoveTag(portal.MXID, tag)
  760. } else {
  761. err = nil
  762. }
  763. if err != nil {
  764. user.log.Warnfln("Failed to update tag %s for %s through double puppet: %v", tag, portal.MXID, err)
  765. }
  766. }
  767. type CustomReadReceipt struct {
  768. Timestamp int64 `json:"ts,omitempty"`
  769. DoublePuppetSource string `json:"fi.mau.double_puppet_source,omitempty"`
  770. }
  771. type CustomReadMarkers struct {
  772. mautrix.ReqSetReadMarkers
  773. ReadExtra CustomReadReceipt `json:"com.beeper.read.extra"`
  774. FullyReadExtra CustomReadReceipt `json:"com.beeper.fully_read.extra"`
  775. }
  776. func (user *User) syncChatDoublePuppetDetails(portal *Portal, justCreated bool) {
  777. doublePuppet := portal.bridge.GetPuppetByCustomMXID(user.MXID)
  778. if doublePuppet == nil {
  779. return
  780. }
  781. if doublePuppet == nil || doublePuppet.CustomIntent() == nil || len(portal.MXID) == 0 {
  782. return
  783. }
  784. if justCreated || !user.bridge.Config.Bridge.TagOnlyOnCreate {
  785. chat, err := user.Client.Store.ChatSettings.GetChatSettings(portal.Key.JID)
  786. if err != nil {
  787. user.log.Warnfln("Failed to get settings of %s: %v", portal.Key.JID, err)
  788. return
  789. }
  790. intent := doublePuppet.CustomIntent()
  791. if portal.Key.JID == types.StatusBroadcastJID && justCreated {
  792. if user.bridge.Config.Bridge.MuteStatusBroadcast {
  793. user.updateChatMute(intent, portal, time.Now().Add(365*24*time.Hour))
  794. }
  795. if len(user.bridge.Config.Bridge.StatusBroadcastTag) > 0 {
  796. user.updateChatTag(intent, portal, user.bridge.Config.Bridge.StatusBroadcastTag, true)
  797. }
  798. return
  799. } else if !chat.Found {
  800. return
  801. }
  802. user.updateChatMute(intent, portal, chat.MutedUntil)
  803. user.updateChatTag(intent, portal, user.bridge.Config.Bridge.ArchiveTag, chat.Archived)
  804. user.updateChatTag(intent, portal, user.bridge.Config.Bridge.PinnedTag, chat.Pinned)
  805. }
  806. }
  807. func (user *User) getDirectChats() map[id.UserID][]id.RoomID {
  808. res := make(map[id.UserID][]id.RoomID)
  809. privateChats := user.bridge.DB.Portal.FindPrivateChats(user.JID.ToNonAD())
  810. for _, portal := range privateChats {
  811. if len(portal.MXID) > 0 {
  812. res[user.bridge.FormatPuppetMXID(portal.Key.JID)] = []id.RoomID{portal.MXID}
  813. }
  814. }
  815. return res
  816. }
  817. func (user *User) UpdateDirectChats(chats map[id.UserID][]id.RoomID) {
  818. if !user.bridge.Config.Bridge.SyncDirectChatList {
  819. return
  820. }
  821. puppet := user.bridge.GetPuppetByCustomMXID(user.MXID)
  822. if puppet == nil || puppet.CustomIntent() == nil {
  823. return
  824. }
  825. intent := puppet.CustomIntent()
  826. method := http.MethodPatch
  827. if chats == nil {
  828. chats = user.getDirectChats()
  829. method = http.MethodPut
  830. }
  831. user.log.Debugln("Updating m.direct list on homeserver")
  832. var err error
  833. if user.bridge.Config.Homeserver.Asmux {
  834. urlPath := intent.BuildClientURL("unstable", "com.beeper.asmux", "dms")
  835. _, err = intent.MakeFullRequest(mautrix.FullRequest{
  836. Method: method,
  837. URL: urlPath,
  838. Headers: http.Header{"X-Asmux-Auth": {user.bridge.AS.Registration.AppToken}},
  839. RequestJSON: chats,
  840. })
  841. } else {
  842. existingChats := make(map[id.UserID][]id.RoomID)
  843. err = intent.GetAccountData(event.AccountDataDirectChats.Type, &existingChats)
  844. if err != nil {
  845. user.log.Warnln("Failed to get m.direct list to update it:", err)
  846. return
  847. }
  848. for userID, rooms := range existingChats {
  849. if _, ok := user.bridge.ParsePuppetMXID(userID); !ok {
  850. // This is not a ghost user, include it in the new list
  851. chats[userID] = rooms
  852. } else if _, ok := chats[userID]; !ok && method == http.MethodPatch {
  853. // This is a ghost user, but we're not replacing the whole list, so include it too
  854. chats[userID] = rooms
  855. }
  856. }
  857. err = intent.SetAccountData(event.AccountDataDirectChats.Type, &chats)
  858. }
  859. if err != nil {
  860. user.log.Warnln("Failed to update m.direct list:", err)
  861. }
  862. }
  863. func (user *User) handleLoggedOut(onConnect bool, reason events.ConnectFailureReason) {
  864. errorCode := WAUnknownLogout
  865. if reason == events.ConnectFailureLoggedOut {
  866. errorCode = WALoggedOut
  867. } else if reason == events.ConnectFailureMainDeviceGone {
  868. errorCode = WAMainDeviceGone
  869. }
  870. user.removeFromJIDMap(BridgeState{StateEvent: StateBadCredentials, Error: errorCode})
  871. user.DeleteConnection()
  872. user.Session = nil
  873. user.JID = types.EmptyJID
  874. user.Update()
  875. if onConnect {
  876. user.sendMarkdownBridgeAlert("Connecting to WhatsApp failed as the device was unlinked (error %s). Please link the bridge to your phone again.", reason)
  877. } else {
  878. user.sendMarkdownBridgeAlert("You were logged out from another device. Please link the bridge to your phone again.")
  879. }
  880. }
  881. func (user *User) GetPortalByMessageSource(ms types.MessageSource) *Portal {
  882. jid := ms.Chat
  883. if ms.IsIncomingBroadcast() {
  884. if ms.IsFromMe {
  885. jid = ms.BroadcastListOwner.ToNonAD()
  886. } else {
  887. jid = ms.Sender.ToNonAD()
  888. }
  889. if jid.IsEmpty() {
  890. return nil
  891. }
  892. }
  893. return user.bridge.GetPortalByJID(database.NewPortalKey(jid, user.JID))
  894. }
  895. func (user *User) GetPortalByJID(jid types.JID) *Portal {
  896. return user.bridge.GetPortalByJID(database.NewPortalKey(jid, user.JID))
  897. }
  898. func (user *User) syncPuppet(jid types.JID, reason string) {
  899. user.bridge.GetPuppetByJID(jid).SyncContact(user, false, false, reason)
  900. }
  901. func (user *User) ResyncContacts() error {
  902. contacts, err := user.Client.Store.Contacts.GetAllContacts()
  903. if err != nil {
  904. return fmt.Errorf("failed to get cached contacts: %w", err)
  905. }
  906. user.log.Infofln("Resyncing displaynames with %d contacts", len(contacts))
  907. for jid, contact := range contacts {
  908. puppet := user.bridge.GetPuppetByJID(jid)
  909. if puppet != nil {
  910. puppet.Sync(user, contact)
  911. } else {
  912. user.log.Warnfln("Got a nil puppet for %s while syncing contacts", jid)
  913. }
  914. }
  915. return nil
  916. }
  917. func (user *User) ResyncGroups(createPortals bool) error {
  918. groups, err := user.Client.GetJoinedGroups()
  919. if err != nil {
  920. return fmt.Errorf("failed to get group list from server: %w", err)
  921. }
  922. for _, group := range groups {
  923. portal := user.GetPortalByJID(group.JID)
  924. if len(portal.MXID) == 0 {
  925. if createPortals {
  926. err = portal.CreateMatrixRoom(user, group, true, true)
  927. if err != nil {
  928. return fmt.Errorf("failed to create room for %s: %w", group.JID, err)
  929. }
  930. }
  931. } else {
  932. portal.UpdateMatrixRoom(user, group)
  933. }
  934. }
  935. return nil
  936. }
  937. const WATypingTimeout = 15 * time.Second
  938. func (user *User) handleChatPresence(presence *events.ChatPresence) {
  939. puppet := user.bridge.GetPuppetByJID(presence.Sender)
  940. portal := user.GetPortalByJID(presence.Chat)
  941. if puppet == nil || portal == nil || len(portal.MXID) == 0 {
  942. return
  943. }
  944. if presence.State == types.ChatPresenceComposing {
  945. if puppet.typingIn != "" && puppet.typingAt.Add(WATypingTimeout).Before(time.Now()) {
  946. if puppet.typingIn == portal.MXID {
  947. return
  948. }
  949. _, _ = puppet.IntentFor(portal).UserTyping(puppet.typingIn, false, 0)
  950. }
  951. _, _ = puppet.IntentFor(portal).UserTyping(portal.MXID, true, WATypingTimeout.Milliseconds())
  952. puppet.typingIn = portal.MXID
  953. puppet.typingAt = time.Now()
  954. } else {
  955. _, _ = puppet.IntentFor(portal).UserTyping(portal.MXID, false, 0)
  956. puppet.typingIn = ""
  957. }
  958. }
  959. func (user *User) handleReceipt(receipt *events.Receipt) {
  960. if receipt.Type != events.ReceiptTypeRead && receipt.Type != events.ReceiptTypeReadSelf {
  961. return
  962. }
  963. portal := user.GetPortalByMessageSource(receipt.MessageSource)
  964. if portal == nil || len(portal.MXID) == 0 {
  965. return
  966. }
  967. portal.messages <- PortalMessage{receipt: receipt, source: user}
  968. }
  969. func makeReadMarkerContent(eventID id.EventID, doublePuppet bool) CustomReadMarkers {
  970. var extra CustomReadReceipt
  971. if doublePuppet {
  972. extra.DoublePuppetSource = doublePuppetValue
  973. }
  974. return CustomReadMarkers{
  975. ReqSetReadMarkers: mautrix.ReqSetReadMarkers{
  976. Read: eventID,
  977. FullyRead: eventID,
  978. },
  979. ReadExtra: extra,
  980. FullyReadExtra: extra,
  981. }
  982. }
  983. func (user *User) markSelfReadFull(portal *Portal) {
  984. puppet := user.bridge.GetPuppetByCustomMXID(user.MXID)
  985. if puppet == nil || puppet.CustomIntent() == nil {
  986. return
  987. }
  988. lastMessage := user.bridge.DB.Message.GetLastInChat(portal.Key)
  989. if lastMessage == nil {
  990. return
  991. }
  992. user.SetLastReadTS(portal.Key, lastMessage.Timestamp)
  993. err := puppet.CustomIntent().SetReadMarkers(portal.MXID, makeReadMarkerContent(lastMessage.MXID, true))
  994. if err != nil {
  995. user.log.Warnfln("Failed to mark %s (last message) in %s as read: %v", lastMessage.MXID, portal.MXID, err)
  996. } else {
  997. user.log.Debugfln("Marked %s (last message) in %s as read", lastMessage.MXID, portal.MXID)
  998. }
  999. }
  1000. func (user *User) handleGroupCreate(evt *events.JoinedGroup) {
  1001. portal := user.GetPortalByJID(evt.JID)
  1002. if len(portal.MXID) == 0 {
  1003. err := portal.CreateMatrixRoom(user, &evt.GroupInfo, true, true)
  1004. if err != nil {
  1005. user.log.Errorln("Failed to create Matrix room after join notification: %v", err)
  1006. }
  1007. } else {
  1008. portal.UpdateMatrixRoom(user, &evt.GroupInfo)
  1009. }
  1010. }
  1011. func (user *User) handleGroupUpdate(evt *events.GroupInfo) {
  1012. portal := user.GetPortalByJID(evt.JID)
  1013. if portal == nil || len(portal.MXID) == 0 {
  1014. user.log.Debugfln("Ignoring group info update in chat with no portal: %+v", evt)
  1015. return
  1016. }
  1017. switch {
  1018. case evt.Announce != nil:
  1019. portal.RestrictMessageSending(evt.Announce.IsAnnounce)
  1020. case evt.Locked != nil:
  1021. portal.RestrictMetadataChanges(evt.Locked.IsLocked)
  1022. case evt.Name != nil:
  1023. portal.UpdateName(evt.Name.Name, evt.Name.NameSetBy, true)
  1024. case evt.Topic != nil:
  1025. portal.UpdateTopic(evt.Topic.Topic, evt.Topic.TopicSetBy, true)
  1026. case evt.Leave != nil:
  1027. if evt.Sender != nil && !evt.Sender.IsEmpty() {
  1028. portal.HandleWhatsAppKick(user, *evt.Sender, evt.Leave)
  1029. }
  1030. case evt.Join != nil:
  1031. portal.HandleWhatsAppInvite(user, evt.Sender, evt.Join)
  1032. case evt.Promote != nil:
  1033. portal.ChangeAdminStatus(evt.Promote, true)
  1034. case evt.Demote != nil:
  1035. portal.ChangeAdminStatus(evt.Demote, false)
  1036. case evt.Ephemeral != nil:
  1037. portal.UpdateGroupDisappearingMessages(evt.Sender, evt.Timestamp, evt.Ephemeral.DisappearingTimer)
  1038. }
  1039. }
  1040. func (user *User) handlePictureUpdate(evt *events.Picture) {
  1041. if evt.JID.Server == types.DefaultUserServer {
  1042. puppet := user.bridge.GetPuppetByJID(evt.JID)
  1043. user.log.Debugfln("Received picture update for puppet %s (current: %s, new: %s)", evt.JID, puppet.Avatar, evt.PictureID)
  1044. if puppet.Avatar != evt.PictureID {
  1045. puppet.UpdateAvatar(user)
  1046. }
  1047. } else if portal := user.GetPortalByJID(evt.JID); portal != nil {
  1048. user.log.Debugfln("Received picture update for portal %s (current: %s, new: %s)", evt.JID, portal.Avatar, evt.PictureID)
  1049. if portal.Avatar != evt.PictureID {
  1050. portal.UpdateAvatar(user, evt.Author, true)
  1051. }
  1052. }
  1053. }
  1054. func (user *User) StartPM(jid types.JID, reason string) (*Portal, *Puppet, bool, error) {
  1055. user.log.Debugln("Starting PM with", jid, "from", reason)
  1056. puppet := user.bridge.GetPuppetByJID(jid)
  1057. puppet.SyncContact(user, true, false, reason)
  1058. portal := user.GetPortalByJID(puppet.JID)
  1059. if len(portal.MXID) > 0 {
  1060. ok := portal.ensureUserInvited(user)
  1061. if !ok {
  1062. portal.log.Warnfln("ensureUserInvited(%s) returned false, creating new portal", user.MXID)
  1063. portal.MXID = ""
  1064. } else {
  1065. return portal, puppet, false, nil
  1066. }
  1067. }
  1068. err := portal.CreateMatrixRoom(user, nil, false, true)
  1069. return portal, puppet, true, err
  1070. }
  1071. const groupListCacheMaxAge = 24 * time.Hour
  1072. func (user *User) getCachedGroupList() ([]*types.GroupInfo, error) {
  1073. user.groupListCacheLock.Lock()
  1074. defer user.groupListCacheLock.Unlock()
  1075. if user.groupListCache != nil && user.groupListCacheTime.Add(groupListCacheMaxAge).After(time.Now()) {
  1076. return user.groupListCache, nil
  1077. }
  1078. var err error
  1079. user.groupListCache, err = user.Client.GetJoinedGroups()
  1080. user.groupListCacheTime = time.Now()
  1081. return user.groupListCache, err
  1082. }