user.go 41 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242
  1. // mautrix-whatsapp - A Matrix-WhatsApp puppeting bridge.
  2. // Copyright (C) 2022 Tulir Asokan
  3. //
  4. // This program is free software: you can redistribute it and/or modify
  5. // it under the terms of the GNU Affero General Public License as published by
  6. // the Free Software Foundation, either version 3 of the License, or
  7. // (at your option) any later version.
  8. //
  9. // This program is distributed in the hope that it will be useful,
  10. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. // GNU Affero General Public License for more details.
  13. //
  14. // You should have received a copy of the GNU Affero General Public License
  15. // along with this program. If not, see <https://www.gnu.org/licenses/>.
  16. package main
  17. import (
  18. "context"
  19. "crypto/hmac"
  20. "crypto/sha256"
  21. "encoding/binary"
  22. "encoding/json"
  23. "errors"
  24. "fmt"
  25. "math"
  26. "net/http"
  27. "strconv"
  28. "strings"
  29. "sync"
  30. "time"
  31. log "maunium.net/go/maulogger/v2"
  32. "maunium.net/go/mautrix/bridge/bridgeconfig"
  33. "maunium.net/go/mautrix"
  34. "maunium.net/go/mautrix/appservice"
  35. "maunium.net/go/mautrix/bridge"
  36. "maunium.net/go/mautrix/event"
  37. "maunium.net/go/mautrix/format"
  38. "maunium.net/go/mautrix/id"
  39. "maunium.net/go/mautrix/pushrules"
  40. "go.mau.fi/whatsmeow"
  41. "go.mau.fi/whatsmeow/appstate"
  42. waProto "go.mau.fi/whatsmeow/binary/proto"
  43. "go.mau.fi/whatsmeow/store"
  44. "go.mau.fi/whatsmeow/types"
  45. "go.mau.fi/whatsmeow/types/events"
  46. waLog "go.mau.fi/whatsmeow/util/log"
  47. "maunium.net/go/mautrix-whatsapp/database"
  48. )
  49. type User struct {
  50. *database.User
  51. Client *whatsmeow.Client
  52. Session *store.Device
  53. bridge *WABridge
  54. log log.Logger
  55. Admin bool
  56. Whitelisted bool
  57. RelayWhitelisted bool
  58. PermissionLevel bridgeconfig.PermissionLevel
  59. mgmtCreateLock sync.Mutex
  60. spaceCreateLock sync.Mutex
  61. connLock sync.Mutex
  62. historySyncs chan *events.HistorySync
  63. prevBridgeStatus *BridgeState
  64. lastPresence types.Presence
  65. historySyncLoopsStarted bool
  66. spaceMembershipChecked bool
  67. lastPhoneOfflineWarning time.Time
  68. groupListCache []*types.GroupInfo
  69. groupListCacheLock sync.Mutex
  70. groupListCacheTime time.Time
  71. bridgeStateQueue chan BridgeState
  72. BackfillQueue *BackfillQueue
  73. }
  74. func (br *WABridge) getUserByMXID(userID id.UserID, onlyIfExists bool) *User {
  75. _, isPuppet := br.ParsePuppetMXID(userID)
  76. if isPuppet || userID == br.Bot.UserID {
  77. return nil
  78. }
  79. br.usersLock.Lock()
  80. defer br.usersLock.Unlock()
  81. user, ok := br.usersByMXID[userID]
  82. if !ok {
  83. userIDPtr := &userID
  84. if onlyIfExists {
  85. userIDPtr = nil
  86. }
  87. return br.loadDBUser(br.DB.User.GetByMXID(userID), userIDPtr)
  88. }
  89. return user
  90. }
  91. func (br *WABridge) GetUserByMXID(userID id.UserID) *User {
  92. return br.getUserByMXID(userID, false)
  93. }
  94. func (br *WABridge) GetIUser(userID id.UserID, create bool) bridge.User {
  95. u := br.getUserByMXID(userID, !create)
  96. if u == nil {
  97. return nil
  98. }
  99. return u
  100. }
  101. func (user *User) GetPermissionLevel() bridgeconfig.PermissionLevel {
  102. return user.PermissionLevel
  103. }
  104. func (user *User) GetManagementRoomID() id.RoomID {
  105. return user.ManagementRoom
  106. }
  107. func (user *User) GetMXID() id.UserID {
  108. return user.MXID
  109. }
  110. func (user *User) GetCommandState() map[string]interface{} {
  111. return nil
  112. }
  113. func (br *WABridge) GetUserByMXIDIfExists(userID id.UserID) *User {
  114. return br.getUserByMXID(userID, true)
  115. }
  116. func (br *WABridge) GetUserByJID(jid types.JID) *User {
  117. br.usersLock.Lock()
  118. defer br.usersLock.Unlock()
  119. user, ok := br.usersByUsername[jid.User]
  120. if !ok {
  121. return br.loadDBUser(br.DB.User.GetByUsername(jid.User), nil)
  122. }
  123. return user
  124. }
  125. func (user *User) addToJIDMap() {
  126. user.bridge.usersLock.Lock()
  127. user.bridge.usersByUsername[user.JID.User] = user
  128. user.bridge.usersLock.Unlock()
  129. }
  130. func (user *User) removeFromJIDMap(state BridgeState) {
  131. user.bridge.usersLock.Lock()
  132. jidUser, ok := user.bridge.usersByUsername[user.JID.User]
  133. if ok && user == jidUser {
  134. delete(user.bridge.usersByUsername, user.JID.User)
  135. }
  136. user.bridge.usersLock.Unlock()
  137. user.bridge.Metrics.TrackLoginState(user.JID, false)
  138. user.sendBridgeState(state)
  139. }
  140. func (br *WABridge) GetAllUsers() []*User {
  141. br.usersLock.Lock()
  142. defer br.usersLock.Unlock()
  143. dbUsers := br.DB.User.GetAll()
  144. output := make([]*User, len(dbUsers))
  145. for index, dbUser := range dbUsers {
  146. user, ok := br.usersByMXID[dbUser.MXID]
  147. if !ok {
  148. user = br.loadDBUser(dbUser, nil)
  149. }
  150. output[index] = user
  151. }
  152. return output
  153. }
  154. func (br *WABridge) loadDBUser(dbUser *database.User, mxid *id.UserID) *User {
  155. if dbUser == nil {
  156. if mxid == nil {
  157. return nil
  158. }
  159. dbUser = br.DB.User.New()
  160. dbUser.MXID = *mxid
  161. dbUser.Insert()
  162. }
  163. user := br.NewUser(dbUser)
  164. br.usersByMXID[user.MXID] = user
  165. if !user.JID.IsEmpty() {
  166. var err error
  167. user.Session, err = br.WAContainer.GetDevice(user.JID)
  168. if err != nil {
  169. user.log.Errorfln("Failed to load user's whatsapp session: %v", err)
  170. } else if user.Session == nil {
  171. user.log.Warnfln("Didn't find session data for %s, treating user as logged out", user.JID)
  172. user.JID = types.EmptyJID
  173. user.Update()
  174. } else {
  175. user.Session.Log = &waLogger{user.log.Sub("Session")}
  176. br.usersByUsername[user.JID.User] = user
  177. }
  178. }
  179. if len(user.ManagementRoom) > 0 {
  180. br.managementRooms[user.ManagementRoom] = user
  181. }
  182. return user
  183. }
  184. func (br *WABridge) NewUser(dbUser *database.User) *User {
  185. user := &User{
  186. User: dbUser,
  187. bridge: br,
  188. log: br.Log.Sub("User").Sub(string(dbUser.MXID)),
  189. historySyncs: make(chan *events.HistorySync, 32),
  190. lastPresence: types.PresenceUnavailable,
  191. }
  192. user.PermissionLevel = user.bridge.Config.Bridge.Permissions.Get(user.MXID)
  193. user.RelayWhitelisted = user.PermissionLevel >= bridgeconfig.PermissionLevelRelay
  194. user.Whitelisted = user.PermissionLevel >= bridgeconfig.PermissionLevelUser
  195. user.Admin = user.PermissionLevel >= bridgeconfig.PermissionLevelAdmin
  196. if len(user.bridge.Config.Homeserver.StatusEndpoint) > 0 {
  197. user.bridgeStateQueue = make(chan BridgeState, 10)
  198. go user.bridgeStateLoop()
  199. }
  200. return user
  201. }
  202. func (user *User) ensureInvited(intent *appservice.IntentAPI, roomID id.RoomID, isDirect bool) (ok bool) {
  203. inviteContent := event.Content{
  204. Parsed: &event.MemberEventContent{
  205. Membership: event.MembershipInvite,
  206. IsDirect: isDirect,
  207. },
  208. Raw: map[string]interface{}{},
  209. }
  210. customPuppet := user.bridge.GetPuppetByCustomMXID(user.MXID)
  211. if customPuppet != nil && customPuppet.CustomIntent() != nil {
  212. inviteContent.Raw["fi.mau.will_auto_accept"] = true
  213. }
  214. _, err := intent.SendStateEvent(roomID, event.StateMember, user.MXID.String(), &inviteContent)
  215. var httpErr mautrix.HTTPError
  216. if err != nil && errors.As(err, &httpErr) && httpErr.RespError != nil && strings.Contains(httpErr.RespError.Err, "is already in the room") {
  217. user.bridge.StateStore.SetMembership(roomID, user.MXID, event.MembershipJoin)
  218. ok = true
  219. return
  220. } else if err != nil {
  221. user.log.Warnfln("Failed to invite user to %s: %v", roomID, err)
  222. } else {
  223. ok = true
  224. }
  225. if customPuppet != nil && customPuppet.CustomIntent() != nil {
  226. err = customPuppet.CustomIntent().EnsureJoined(roomID, appservice.EnsureJoinedParams{IgnoreCache: true})
  227. if err != nil {
  228. user.log.Warnfln("Failed to auto-join %s: %v", roomID, err)
  229. ok = false
  230. } else {
  231. ok = true
  232. }
  233. }
  234. return
  235. }
  236. func (user *User) GetSpaceRoom() id.RoomID {
  237. if !user.bridge.Config.Bridge.PersonalFilteringSpaces {
  238. return ""
  239. }
  240. if len(user.SpaceRoom) == 0 {
  241. user.spaceCreateLock.Lock()
  242. defer user.spaceCreateLock.Unlock()
  243. if len(user.SpaceRoom) > 0 {
  244. return user.SpaceRoom
  245. }
  246. resp, err := user.bridge.Bot.CreateRoom(&mautrix.ReqCreateRoom{
  247. Visibility: "private",
  248. Name: "WhatsApp",
  249. Topic: "Your WhatsApp bridged chats",
  250. InitialState: []*event.Event{{
  251. Type: event.StateRoomAvatar,
  252. Content: event.Content{
  253. Parsed: &event.RoomAvatarEventContent{
  254. URL: user.bridge.Config.AppService.Bot.ParsedAvatar,
  255. },
  256. },
  257. }},
  258. CreationContent: map[string]interface{}{
  259. "type": event.RoomTypeSpace,
  260. },
  261. PowerLevelOverride: &event.PowerLevelsEventContent{
  262. Users: map[id.UserID]int{
  263. user.bridge.Bot.UserID: 9001,
  264. user.MXID: 50,
  265. },
  266. },
  267. })
  268. if err != nil {
  269. user.log.Errorln("Failed to auto-create space room:", err)
  270. } else {
  271. user.SpaceRoom = resp.RoomID
  272. user.Update()
  273. user.ensureInvited(user.bridge.Bot, user.SpaceRoom, false)
  274. }
  275. } else if !user.spaceMembershipChecked && !user.bridge.StateStore.IsInRoom(user.SpaceRoom, user.MXID) {
  276. user.ensureInvited(user.bridge.Bot, user.SpaceRoom, false)
  277. }
  278. user.spaceMembershipChecked = true
  279. return user.SpaceRoom
  280. }
  281. func (user *User) GetManagementRoom() id.RoomID {
  282. if len(user.ManagementRoom) == 0 {
  283. user.mgmtCreateLock.Lock()
  284. defer user.mgmtCreateLock.Unlock()
  285. if len(user.ManagementRoom) > 0 {
  286. return user.ManagementRoom
  287. }
  288. creationContent := make(map[string]interface{})
  289. if !user.bridge.Config.Bridge.FederateRooms {
  290. creationContent["m.federate"] = false
  291. }
  292. resp, err := user.bridge.Bot.CreateRoom(&mautrix.ReqCreateRoom{
  293. Topic: "WhatsApp bridge notices",
  294. IsDirect: true,
  295. CreationContent: creationContent,
  296. })
  297. if err != nil {
  298. user.log.Errorln("Failed to auto-create management room:", err)
  299. } else {
  300. user.SetManagementRoom(resp.RoomID)
  301. }
  302. }
  303. return user.ManagementRoom
  304. }
  305. func (user *User) SetManagementRoom(roomID id.RoomID) {
  306. existingUser, ok := user.bridge.managementRooms[roomID]
  307. if ok {
  308. existingUser.ManagementRoom = ""
  309. existingUser.Update()
  310. }
  311. user.ManagementRoom = roomID
  312. user.bridge.managementRooms[user.ManagementRoom] = user
  313. user.Update()
  314. }
  315. type waLogger struct{ l log.Logger }
  316. func (w *waLogger) Debugf(msg string, args ...interface{}) { w.l.Debugfln(msg, args...) }
  317. func (w *waLogger) Infof(msg string, args ...interface{}) { w.l.Infofln(msg, args...) }
  318. func (w *waLogger) Warnf(msg string, args ...interface{}) { w.l.Warnfln(msg, args...) }
  319. func (w *waLogger) Errorf(msg string, args ...interface{}) { w.l.Errorfln(msg, args...) }
  320. func (w *waLogger) Sub(module string) waLog.Logger { return &waLogger{l: w.l.Sub(module)} }
  321. var ErrAlreadyLoggedIn = errors.New("already logged in")
  322. func (user *User) obfuscateJID(jid types.JID) string {
  323. // Turn the first 4 bytes of HMAC-SHA256(hs_token, phone) into a number and replace the middle of the actual phone with that deterministic random number.
  324. randomNumber := binary.BigEndian.Uint32(hmac.New(sha256.New, []byte(user.bridge.Config.AppService.HSToken)).Sum([]byte(jid.User))[:4])
  325. return fmt.Sprintf("+%s-%d-%s:%d", jid.User[:1], randomNumber, jid.User[len(jid.User)-2:], jid.Device)
  326. }
  327. func (user *User) createClient(sess *store.Device) {
  328. user.Client = whatsmeow.NewClient(sess, &waLogger{user.log.Sub("Client")})
  329. user.Client.AddEventHandler(user.HandleEvent)
  330. user.Client.SetForceActiveDeliveryReceipts(user.bridge.Config.Bridge.ForceActiveDeliveryReceipts)
  331. user.Client.GetMessageForRetry = func(requester, to types.JID, id types.MessageID) *waProto.Message {
  332. Segment.Track(user.MXID, "WhatsApp incoming retry (message not found)", map[string]interface{}{
  333. "requester": user.obfuscateJID(requester),
  334. "messageID": id,
  335. })
  336. user.bridge.Metrics.TrackRetryReceipt(0, false)
  337. return nil
  338. }
  339. user.Client.PreRetryCallback = func(receipt *events.Receipt, messageID types.MessageID, retryCount int, msg *waProto.Message) bool {
  340. Segment.Track(user.MXID, "WhatsApp incoming retry (accepted)", map[string]interface{}{
  341. "requester": user.obfuscateJID(receipt.Sender),
  342. "messageID": messageID,
  343. "retryCount": retryCount,
  344. })
  345. user.bridge.Metrics.TrackRetryReceipt(retryCount, true)
  346. return true
  347. }
  348. }
  349. func (user *User) Login(ctx context.Context) (<-chan whatsmeow.QRChannelItem, error) {
  350. user.connLock.Lock()
  351. defer user.connLock.Unlock()
  352. if user.Session != nil {
  353. return nil, ErrAlreadyLoggedIn
  354. } else if user.Client != nil {
  355. user.unlockedDeleteConnection()
  356. }
  357. newSession := user.bridge.WAContainer.NewDevice()
  358. newSession.Log = &waLogger{user.log.Sub("Session")}
  359. user.createClient(newSession)
  360. qrChan, err := user.Client.GetQRChannel(ctx)
  361. if err != nil {
  362. return nil, fmt.Errorf("failed to get QR channel: %w", err)
  363. }
  364. err = user.Client.Connect()
  365. if err != nil {
  366. return nil, fmt.Errorf("failed to connect to WhatsApp: %w", err)
  367. }
  368. return qrChan, nil
  369. }
  370. func (user *User) Connect() bool {
  371. user.connLock.Lock()
  372. defer user.connLock.Unlock()
  373. if user.Client != nil {
  374. return user.Client.IsConnected()
  375. } else if user.Session == nil {
  376. return false
  377. }
  378. user.log.Debugln("Connecting to WhatsApp")
  379. user.sendBridgeState(BridgeState{StateEvent: StateConnecting, Error: WAConnecting})
  380. user.createClient(user.Session)
  381. err := user.Client.Connect()
  382. if err != nil {
  383. user.log.Warnln("Error connecting to WhatsApp:", err)
  384. user.sendBridgeState(BridgeState{
  385. StateEvent: StateUnknownError,
  386. Error: WAConnectionFailed,
  387. Info: map[string]interface{}{
  388. "go_error": err.Error(),
  389. },
  390. })
  391. return false
  392. }
  393. return true
  394. }
  395. func (user *User) unlockedDeleteConnection() {
  396. if user.Client == nil {
  397. return
  398. }
  399. user.Client.Disconnect()
  400. user.Client.RemoveEventHandlers()
  401. user.Client = nil
  402. user.bridge.Metrics.TrackConnectionState(user.JID, false)
  403. }
  404. func (user *User) DeleteConnection() {
  405. user.connLock.Lock()
  406. defer user.connLock.Unlock()
  407. user.unlockedDeleteConnection()
  408. }
  409. func (user *User) HasSession() bool {
  410. return user.Session != nil
  411. }
  412. func (user *User) DeleteSession() {
  413. if user.Session != nil {
  414. err := user.Session.Delete()
  415. if err != nil {
  416. user.log.Warnln("Failed to delete session:", err)
  417. }
  418. user.Session = nil
  419. }
  420. if !user.JID.IsEmpty() {
  421. user.JID = types.EmptyJID
  422. user.Update()
  423. }
  424. // Delete all of the backfill and history sync data.
  425. user.bridge.DB.Backfill.DeleteAll(user.MXID)
  426. user.bridge.DB.HistorySync.DeleteAllConversations(user.MXID)
  427. user.bridge.DB.HistorySync.DeleteAllMessages(user.MXID)
  428. user.bridge.DB.MediaBackfillRequest.DeleteAllMediaBackfillRequests(user.MXID)
  429. }
  430. func (user *User) IsConnected() bool {
  431. return user.Client != nil && user.Client.IsConnected()
  432. }
  433. func (user *User) IsLoggedIn() bool {
  434. return user.IsConnected() && user.Client.IsLoggedIn()
  435. }
  436. func (user *User) tryAutomaticDoublePuppeting() {
  437. if !user.bridge.Config.CanAutoDoublePuppet(user.MXID) {
  438. return
  439. }
  440. user.log.Debugln("Checking if double puppeting needs to be enabled")
  441. puppet := user.bridge.GetPuppetByJID(user.JID)
  442. if len(puppet.CustomMXID) > 0 {
  443. user.log.Debugln("User already has double-puppeting enabled")
  444. // Custom puppet already enabled
  445. return
  446. }
  447. accessToken, err := puppet.loginWithSharedSecret(user.MXID)
  448. if err != nil {
  449. user.log.Warnln("Failed to login with shared secret:", err)
  450. return
  451. }
  452. err = puppet.SwitchCustomMXID(accessToken, user.MXID)
  453. if err != nil {
  454. puppet.log.Warnln("Failed to switch to auto-logined custom puppet:", err)
  455. return
  456. }
  457. user.log.Infoln("Successfully automatically enabled custom puppet")
  458. }
  459. func (user *User) sendMarkdownBridgeAlert(formatString string, args ...interface{}) {
  460. if user.bridge.Config.Bridge.DisableBridgeAlerts {
  461. return
  462. }
  463. notice := fmt.Sprintf(formatString, args...)
  464. content := format.RenderMarkdown(notice, true, false)
  465. _, err := user.bridge.Bot.SendMessageEvent(user.GetManagementRoom(), event.EventMessage, content)
  466. if err != nil {
  467. user.log.Warnf("Failed to send bridge alert \"%s\": %v", notice, err)
  468. }
  469. }
  470. const callEventMaxAge = 15 * time.Minute
  471. func (user *User) handleCallStart(sender types.JID, id, callType string, ts time.Time) {
  472. if !user.bridge.Config.Bridge.CallStartNotices || ts.Add(callEventMaxAge).Before(time.Now()) {
  473. return
  474. }
  475. portal := user.GetPortalByJID(sender)
  476. text := "Incoming call"
  477. if callType != "" {
  478. text = fmt.Sprintf("Incoming %s call", callType)
  479. }
  480. portal.messages <- PortalMessage{
  481. fake: &fakeMessage{
  482. Sender: sender,
  483. Text: text,
  484. ID: id,
  485. Time: ts,
  486. Important: true,
  487. },
  488. source: user,
  489. }
  490. }
  491. const PhoneDisconnectWarningTime = 12 * 24 * time.Hour // 12 days
  492. const PhoneDisconnectPingTime = 10 * 24 * time.Hour
  493. const PhoneMinPingInterval = 24 * time.Hour
  494. func (user *User) sendHackyPhonePing() {
  495. user.PhoneLastPinged = time.Now()
  496. msgID := whatsmeow.GenerateMessageID()
  497. keyIDs := make([]*waProto.AppStateSyncKeyId, 0, 1)
  498. lastKeyID, err := user.GetLastAppStateKeyID()
  499. if lastKeyID != nil {
  500. keyIDs = append(keyIDs, &waProto.AppStateSyncKeyId{
  501. KeyId: lastKeyID,
  502. })
  503. } else {
  504. user.log.Warnfln("Failed to get last app state key ID to send hacky phone ping: %v - sending empty request", err)
  505. }
  506. ts, err := user.Client.SendMessage(user.JID.ToNonAD(), msgID, &waProto.Message{
  507. ProtocolMessage: &waProto.ProtocolMessage{
  508. Type: waProto.ProtocolMessage_APP_STATE_SYNC_KEY_REQUEST.Enum(),
  509. AppStateSyncKeyRequest: &waProto.AppStateSyncKeyRequest{
  510. KeyIds: keyIDs,
  511. },
  512. },
  513. })
  514. if err != nil {
  515. user.log.Warnfln("Failed to send hacky phone ping: %v", err)
  516. } else {
  517. user.log.Debugfln("Sent hacky phone ping %s/%s because phone has been offline for >10 days", msgID, ts.Unix())
  518. user.PhoneLastPinged = ts
  519. user.Update()
  520. }
  521. }
  522. func (user *User) PhoneRecentlySeen(doPing bool) bool {
  523. if doPing && !user.PhoneLastSeen.IsZero() && user.PhoneLastSeen.Add(PhoneDisconnectPingTime).Before(time.Now()) && user.PhoneLastPinged.Add(PhoneMinPingInterval).Before(time.Now()) {
  524. // Over 10 days since the phone was seen and over a day since the last somewhat hacky ping, send a new ping.
  525. go user.sendHackyPhonePing()
  526. }
  527. return user.PhoneLastSeen.IsZero() || user.PhoneLastSeen.Add(PhoneDisconnectWarningTime).After(time.Now())
  528. }
  529. // phoneSeen records a timestamp when the user's main device was seen online.
  530. // The stored timestamp can later be used to warn the user if the main device is offline for too long.
  531. func (user *User) phoneSeen(ts time.Time) {
  532. if user.PhoneLastSeen.Add(1 * time.Hour).After(ts) {
  533. // The last seen timestamp isn't going to be perfectly accurate in any case,
  534. // so don't spam the database with an update every time there's an event.
  535. return
  536. } else if !user.PhoneRecentlySeen(false) {
  537. if user.GetPrevBridgeState().Error == WAPhoneOffline && user.IsConnected() {
  538. user.log.Debugfln("Saw phone after current bridge state said it has been offline, switching state back to connected")
  539. go user.sendBridgeState(BridgeState{StateEvent: StateConnected})
  540. } else {
  541. user.log.Debugfln("Saw phone after current bridge state said it has been offline, not sending new bridge state (prev: %s, connected: %t)", user.GetPrevBridgeState().Error, user.IsConnected())
  542. }
  543. }
  544. user.PhoneLastSeen = ts
  545. go user.Update()
  546. }
  547. func formatDisconnectTime(dur time.Duration) string {
  548. days := int(math.Floor(dur.Hours() / 24))
  549. hours := int(dur.Hours()) % 24
  550. if hours == 0 {
  551. return fmt.Sprintf("%d days", days)
  552. } else if hours == 1 {
  553. return fmt.Sprintf("%d days and 1 hour", days)
  554. } else {
  555. return fmt.Sprintf("%d days and %d hours", days, hours)
  556. }
  557. }
  558. func (user *User) sendPhoneOfflineWarning() {
  559. if user.lastPhoneOfflineWarning.Add(12 * time.Hour).After(time.Now()) {
  560. // Don't spam the warning too much
  561. return
  562. }
  563. user.lastPhoneOfflineWarning = time.Now()
  564. timeSinceSeen := time.Now().Sub(user.PhoneLastSeen)
  565. user.sendMarkdownBridgeAlert("Your phone hasn't been seen in %s. The server will force the bridge to log out if the phone is not active at least every 2 weeks.", formatDisconnectTime(timeSinceSeen))
  566. }
  567. func (user *User) HandleEvent(event interface{}) {
  568. switch v := event.(type) {
  569. case *events.LoggedOut:
  570. go user.handleLoggedOut(v.OnConnect, v.Reason)
  571. case *events.Connected:
  572. user.bridge.Metrics.TrackConnectionState(user.JID, true)
  573. user.bridge.Metrics.TrackLoginState(user.JID, true)
  574. if len(user.Client.Store.PushName) > 0 {
  575. go func() {
  576. err := user.Client.SendPresence(user.lastPresence)
  577. if err != nil {
  578. user.log.Warnln("Failed to send initial presence:", err)
  579. }
  580. }()
  581. }
  582. go user.tryAutomaticDoublePuppeting()
  583. if user.bridge.Config.Bridge.HistorySync.Backfill && !user.historySyncLoopsStarted {
  584. go user.handleHistorySyncsLoop()
  585. user.historySyncLoopsStarted = true
  586. }
  587. case *events.OfflineSyncPreview:
  588. user.log.Infofln("Server says it's going to send %d messages and %d receipts that were missed during downtime", v.Messages, v.Receipts)
  589. go user.sendBridgeState(BridgeState{
  590. StateEvent: StateBackfilling,
  591. Message: fmt.Sprintf("backfilling %d messages and %d receipts", v.Messages, v.Receipts),
  592. })
  593. case *events.OfflineSyncCompleted:
  594. if !user.PhoneRecentlySeen(true) {
  595. user.log.Infofln("Offline sync completed, but phone last seen date is still %s - sending phone offline bridge status", user.PhoneLastSeen)
  596. go user.sendBridgeState(BridgeState{StateEvent: StateTransientDisconnect, Error: WAPhoneOffline})
  597. } else {
  598. if user.GetPrevBridgeState().StateEvent == StateBackfilling {
  599. user.log.Infoln("Offline sync completed")
  600. }
  601. go user.sendBridgeState(BridgeState{StateEvent: StateConnected})
  602. }
  603. case *events.AppStateSyncComplete:
  604. if len(user.Client.Store.PushName) > 0 && v.Name == appstate.WAPatchCriticalBlock {
  605. err := user.Client.SendPresence(user.lastPresence)
  606. if err != nil {
  607. user.log.Warnln("Failed to send presence after app state sync:", err)
  608. }
  609. } else if v.Name == appstate.WAPatchCriticalUnblockLow {
  610. go func() {
  611. err := user.ResyncContacts()
  612. if err != nil {
  613. user.log.Errorln("Failed to resync puppets: %v", err)
  614. }
  615. }()
  616. }
  617. case *events.PushNameSetting:
  618. // Send presence available when connecting and when the pushname is changed.
  619. // This makes sure that outgoing messages always have the right pushname.
  620. err := user.Client.SendPresence(user.lastPresence)
  621. if err != nil {
  622. user.log.Warnln("Failed to send presence after push name update:", err)
  623. }
  624. case *events.PairSuccess:
  625. user.PhoneLastSeen = time.Now()
  626. user.Session = user.Client.Store
  627. user.JID = v.ID
  628. user.addToJIDMap()
  629. user.Update()
  630. case *events.StreamError:
  631. var message string
  632. if v.Code != "" {
  633. message = fmt.Sprintf("Unknown stream error with code %s", v.Code)
  634. } else if children := v.Raw.GetChildren(); len(children) > 0 {
  635. message = fmt.Sprintf("Unknown stream error (contains %s node)", children[0].Tag)
  636. } else {
  637. message = "Unknown stream error"
  638. }
  639. go user.sendBridgeState(BridgeState{StateEvent: StateUnknownError, Message: message})
  640. user.bridge.Metrics.TrackConnectionState(user.JID, false)
  641. case *events.ConnectFailure:
  642. go user.sendBridgeState(BridgeState{StateEvent: StateUnknownError, Message: fmt.Sprintf("Unknown connection failure: %s", v.Reason)})
  643. user.bridge.Metrics.TrackConnectionState(user.JID, false)
  644. case *events.ClientOutdated:
  645. user.log.Errorfln("Got a client outdated connect failure. The bridge is likely out of date, please update immediately.")
  646. go user.sendBridgeState(BridgeState{StateEvent: StateUnknownError, Message: "Connect failure: 405 client outdated"})
  647. user.bridge.Metrics.TrackConnectionState(user.JID, false)
  648. case *events.TemporaryBan:
  649. go user.sendBridgeState(BridgeState{StateEvent: StateBadCredentials, Message: v.String()})
  650. user.bridge.Metrics.TrackConnectionState(user.JID, false)
  651. case *events.Disconnected:
  652. // Don't send the normal transient disconnect state if we're already in a different transient disconnect state.
  653. // TODO remove this if/when the phone offline state is moved to a sub-state of CONNECTED
  654. if user.GetPrevBridgeState().Error != WAPhoneOffline && user.PhoneRecentlySeen(false) {
  655. go user.sendBridgeState(BridgeState{StateEvent: StateTransientDisconnect, Message: "Disconnected from WhatsApp. Trying to reconnect."})
  656. }
  657. user.bridge.Metrics.TrackConnectionState(user.JID, false)
  658. case *events.Contact:
  659. go user.syncPuppet(v.JID, "contact event")
  660. case *events.PushName:
  661. go user.syncPuppet(v.JID, "push name event")
  662. case *events.GroupInfo:
  663. user.groupListCache = nil
  664. go user.handleGroupUpdate(v)
  665. case *events.JoinedGroup:
  666. user.groupListCache = nil
  667. go user.handleGroupCreate(v)
  668. case *events.Picture:
  669. go user.handlePictureUpdate(v)
  670. case *events.Receipt:
  671. if v.IsFromMe && v.Sender.Device == 0 {
  672. user.phoneSeen(v.Timestamp)
  673. }
  674. go user.handleReceipt(v)
  675. case *events.ChatPresence:
  676. go user.handleChatPresence(v)
  677. case *events.Message:
  678. portal := user.GetPortalByMessageSource(v.Info.MessageSource)
  679. portal.messages <- PortalMessage{evt: v, source: user}
  680. case *events.MediaRetry:
  681. user.phoneSeen(v.Timestamp)
  682. portal := user.GetPortalByJID(v.ChatID)
  683. portal.mediaRetries <- PortalMediaRetry{evt: v, source: user}
  684. case *events.CallOffer:
  685. user.handleCallStart(v.CallCreator, v.CallID, "", v.Timestamp)
  686. case *events.CallOfferNotice:
  687. user.handleCallStart(v.CallCreator, v.CallID, v.Type, v.Timestamp)
  688. case *events.IdentityChange:
  689. puppet := user.bridge.GetPuppetByJID(v.JID)
  690. portal := user.GetPortalByJID(v.JID)
  691. if len(portal.MXID) > 0 && user.bridge.Config.Bridge.IdentityChangeNotices {
  692. text := fmt.Sprintf("Your security code with %s changed.", puppet.Displayname)
  693. if v.Implicit {
  694. text = fmt.Sprintf("Your security code with %s (device #%d) changed.", puppet.Displayname, v.JID.Device)
  695. }
  696. portal.messages <- PortalMessage{
  697. fake: &fakeMessage{
  698. Sender: v.JID,
  699. Text: text,
  700. ID: strconv.FormatInt(v.Timestamp.Unix(), 10),
  701. Time: v.Timestamp,
  702. Important: false,
  703. },
  704. source: user,
  705. }
  706. }
  707. case *events.CallTerminate, *events.CallRelayLatency, *events.CallAccept, *events.UnknownCallEvent:
  708. // ignore
  709. case *events.UndecryptableMessage:
  710. portal := user.GetPortalByMessageSource(v.Info.MessageSource)
  711. portal.messages <- PortalMessage{undecryptable: v, source: user}
  712. case *events.HistorySync:
  713. if user.bridge.Config.Bridge.HistorySync.Backfill {
  714. user.historySyncs <- v
  715. }
  716. case *events.Mute:
  717. portal := user.GetPortalByJID(v.JID)
  718. if portal != nil {
  719. var mutedUntil time.Time
  720. if v.Action.GetMuted() {
  721. mutedUntil = time.Unix(v.Action.GetMuteEndTimestamp(), 0)
  722. }
  723. go user.updateChatMute(nil, portal, mutedUntil)
  724. }
  725. case *events.Archive:
  726. portal := user.GetPortalByJID(v.JID)
  727. if portal != nil {
  728. go user.updateChatTag(nil, portal, user.bridge.Config.Bridge.ArchiveTag, v.Action.GetArchived())
  729. }
  730. case *events.Pin:
  731. portal := user.GetPortalByJID(v.JID)
  732. if portal != nil {
  733. go user.updateChatTag(nil, portal, user.bridge.Config.Bridge.PinnedTag, v.Action.GetPinned())
  734. }
  735. case *events.AppState:
  736. // Ignore
  737. case *events.KeepAliveTimeout:
  738. go user.sendBridgeState(BridgeState{StateEvent: StateTransientDisconnect, Error: WAKeepaliveTimeout})
  739. case *events.KeepAliveRestored:
  740. user.log.Infof("Keepalive restored after timeouts, sending connected event")
  741. go user.sendBridgeState(BridgeState{StateEvent: StateConnected})
  742. case *events.MarkChatAsRead:
  743. if user.bridge.Config.Bridge.SyncManualMarkedUnread {
  744. user.markUnread(user.GetPortalByJID(v.JID), !v.Action.GetRead())
  745. }
  746. default:
  747. user.log.Debugfln("Unknown type of event in HandleEvent: %T", v)
  748. }
  749. }
  750. func (user *User) updateChatMute(intent *appservice.IntentAPI, portal *Portal, mutedUntil time.Time) {
  751. if len(portal.MXID) == 0 || !user.bridge.Config.Bridge.MuteBridging {
  752. return
  753. } else if intent == nil {
  754. doublePuppet := user.bridge.GetPuppetByCustomMXID(user.MXID)
  755. if doublePuppet == nil || doublePuppet.CustomIntent() == nil {
  756. return
  757. }
  758. intent = doublePuppet.CustomIntent()
  759. }
  760. var err error
  761. if mutedUntil.IsZero() && mutedUntil.Before(time.Now()) {
  762. user.log.Debugfln("Portal %s is muted until %s, unmuting...", portal.MXID, mutedUntil)
  763. err = intent.DeletePushRule("global", pushrules.RoomRule, string(portal.MXID))
  764. } else {
  765. user.log.Debugfln("Portal %s is muted until %s, muting...", portal.MXID, mutedUntil)
  766. err = intent.PutPushRule("global", pushrules.RoomRule, string(portal.MXID), &mautrix.ReqPutPushRule{
  767. Actions: []pushrules.PushActionType{pushrules.ActionDontNotify},
  768. })
  769. }
  770. if err != nil && !errors.Is(err, mautrix.MNotFound) {
  771. user.log.Warnfln("Failed to update push rule for %s through double puppet: %v", portal.MXID, err)
  772. }
  773. }
  774. type CustomTagData struct {
  775. Order json.Number `json:"order"`
  776. DoublePuppet string `json:"fi.mau.double_puppet_source"`
  777. }
  778. type CustomTagEventContent struct {
  779. Tags map[string]CustomTagData `json:"tags"`
  780. }
  781. func (user *User) updateChatTag(intent *appservice.IntentAPI, portal *Portal, tag string, active bool) {
  782. if len(portal.MXID) == 0 || len(tag) == 0 {
  783. return
  784. } else if intent == nil {
  785. doublePuppet := user.bridge.GetPuppetByCustomMXID(user.MXID)
  786. if doublePuppet == nil || doublePuppet.CustomIntent() == nil {
  787. return
  788. }
  789. intent = doublePuppet.CustomIntent()
  790. }
  791. var existingTags CustomTagEventContent
  792. err := intent.GetTagsWithCustomData(portal.MXID, &existingTags)
  793. if err != nil && !errors.Is(err, mautrix.MNotFound) {
  794. user.log.Warnfln("Failed to get tags of %s: %v", portal.MXID, err)
  795. }
  796. currentTag, ok := existingTags.Tags[tag]
  797. if active && !ok {
  798. user.log.Debugln("Adding tag", tag, "to", portal.MXID)
  799. data := CustomTagData{"0.5", doublePuppetValue}
  800. err = intent.AddTagWithCustomData(portal.MXID, tag, &data)
  801. } else if !active && ok && currentTag.DoublePuppet == doublePuppetValue {
  802. user.log.Debugln("Removing tag", tag, "from", portal.MXID)
  803. err = intent.RemoveTag(portal.MXID, tag)
  804. } else {
  805. err = nil
  806. }
  807. if err != nil {
  808. user.log.Warnfln("Failed to update tag %s for %s through double puppet: %v", tag, portal.MXID, err)
  809. }
  810. }
  811. type CustomReadReceipt struct {
  812. Timestamp int64 `json:"ts,omitempty"`
  813. DoublePuppetSource string `json:"fi.mau.double_puppet_source,omitempty"`
  814. }
  815. type CustomReadMarkers struct {
  816. mautrix.ReqSetReadMarkers
  817. ReadExtra CustomReadReceipt `json:"com.beeper.read.extra"`
  818. FullyReadExtra CustomReadReceipt `json:"com.beeper.fully_read.extra"`
  819. }
  820. func (user *User) syncChatDoublePuppetDetails(portal *Portal, justCreated bool) {
  821. doublePuppet := portal.bridge.GetPuppetByCustomMXID(user.MXID)
  822. if doublePuppet == nil {
  823. return
  824. }
  825. if doublePuppet == nil || doublePuppet.CustomIntent() == nil || len(portal.MXID) == 0 {
  826. return
  827. }
  828. if justCreated || !user.bridge.Config.Bridge.TagOnlyOnCreate {
  829. chat, err := user.Client.Store.ChatSettings.GetChatSettings(portal.Key.JID)
  830. if err != nil {
  831. user.log.Warnfln("Failed to get settings of %s: %v", portal.Key.JID, err)
  832. return
  833. }
  834. intent := doublePuppet.CustomIntent()
  835. if portal.Key.JID == types.StatusBroadcastJID && justCreated {
  836. if user.bridge.Config.Bridge.MuteStatusBroadcast {
  837. user.updateChatMute(intent, portal, time.Now().Add(365*24*time.Hour))
  838. }
  839. if len(user.bridge.Config.Bridge.StatusBroadcastTag) > 0 {
  840. user.updateChatTag(intent, portal, user.bridge.Config.Bridge.StatusBroadcastTag, true)
  841. }
  842. return
  843. } else if !chat.Found {
  844. return
  845. }
  846. user.updateChatMute(intent, portal, chat.MutedUntil)
  847. user.updateChatTag(intent, portal, user.bridge.Config.Bridge.ArchiveTag, chat.Archived)
  848. user.updateChatTag(intent, portal, user.bridge.Config.Bridge.PinnedTag, chat.Pinned)
  849. }
  850. }
  851. func (user *User) getDirectChats() map[id.UserID][]id.RoomID {
  852. res := make(map[id.UserID][]id.RoomID)
  853. privateChats := user.bridge.DB.Portal.FindPrivateChats(user.JID.ToNonAD())
  854. for _, portal := range privateChats {
  855. if len(portal.MXID) > 0 {
  856. res[user.bridge.FormatPuppetMXID(portal.Key.JID)] = []id.RoomID{portal.MXID}
  857. }
  858. }
  859. return res
  860. }
  861. func (user *User) UpdateDirectChats(chats map[id.UserID][]id.RoomID) {
  862. if !user.bridge.Config.Bridge.SyncDirectChatList {
  863. return
  864. }
  865. puppet := user.bridge.GetPuppetByCustomMXID(user.MXID)
  866. if puppet == nil || puppet.CustomIntent() == nil {
  867. return
  868. }
  869. intent := puppet.CustomIntent()
  870. method := http.MethodPatch
  871. if chats == nil {
  872. chats = user.getDirectChats()
  873. method = http.MethodPut
  874. }
  875. user.log.Debugln("Updating m.direct list on homeserver")
  876. var err error
  877. if user.bridge.Config.Homeserver.Asmux {
  878. urlPath := intent.BuildClientURL("unstable", "com.beeper.asmux", "dms")
  879. _, err = intent.MakeFullRequest(mautrix.FullRequest{
  880. Method: method,
  881. URL: urlPath,
  882. Headers: http.Header{"X-Asmux-Auth": {user.bridge.AS.Registration.AppToken}},
  883. RequestJSON: chats,
  884. })
  885. } else {
  886. existingChats := make(map[id.UserID][]id.RoomID)
  887. err = intent.GetAccountData(event.AccountDataDirectChats.Type, &existingChats)
  888. if err != nil {
  889. user.log.Warnln("Failed to get m.direct list to update it:", err)
  890. return
  891. }
  892. for userID, rooms := range existingChats {
  893. if _, ok := user.bridge.ParsePuppetMXID(userID); !ok {
  894. // This is not a ghost user, include it in the new list
  895. chats[userID] = rooms
  896. } else if _, ok := chats[userID]; !ok && method == http.MethodPatch {
  897. // This is a ghost user, but we're not replacing the whole list, so include it too
  898. chats[userID] = rooms
  899. }
  900. }
  901. err = intent.SetAccountData(event.AccountDataDirectChats.Type, &chats)
  902. }
  903. if err != nil {
  904. user.log.Warnln("Failed to update m.direct list:", err)
  905. }
  906. }
  907. func (user *User) handleLoggedOut(onConnect bool, reason events.ConnectFailureReason) {
  908. errorCode := WAUnknownLogout
  909. if reason == events.ConnectFailureLoggedOut {
  910. errorCode = WALoggedOut
  911. } else if reason == events.ConnectFailureMainDeviceGone {
  912. errorCode = WAMainDeviceGone
  913. }
  914. user.removeFromJIDMap(BridgeState{StateEvent: StateBadCredentials, Error: errorCode})
  915. user.DeleteConnection()
  916. user.Session = nil
  917. user.JID = types.EmptyJID
  918. user.Update()
  919. if onConnect {
  920. user.sendMarkdownBridgeAlert("Connecting to WhatsApp failed as the device was unlinked (error %s). Please link the bridge to your phone again.", reason)
  921. } else {
  922. user.sendMarkdownBridgeAlert("You were logged out from another device. Please link the bridge to your phone again.")
  923. }
  924. }
  925. func (user *User) GetPortalByMessageSource(ms types.MessageSource) *Portal {
  926. jid := ms.Chat
  927. if ms.IsIncomingBroadcast() {
  928. if ms.IsFromMe {
  929. jid = ms.BroadcastListOwner.ToNonAD()
  930. } else {
  931. jid = ms.Sender.ToNonAD()
  932. }
  933. if jid.IsEmpty() {
  934. return nil
  935. }
  936. }
  937. return user.bridge.GetPortalByJID(database.NewPortalKey(jid, user.JID))
  938. }
  939. func (user *User) GetPortalByJID(jid types.JID) *Portal {
  940. return user.bridge.GetPortalByJID(database.NewPortalKey(jid, user.JID))
  941. }
  942. func (user *User) syncPuppet(jid types.JID, reason string) {
  943. user.bridge.GetPuppetByJID(jid).SyncContact(user, false, false, reason)
  944. }
  945. func (user *User) ResyncContacts() error {
  946. contacts, err := user.Client.Store.Contacts.GetAllContacts()
  947. if err != nil {
  948. return fmt.Errorf("failed to get cached contacts: %w", err)
  949. }
  950. user.log.Infofln("Resyncing displaynames with %d contacts", len(contacts))
  951. for jid, contact := range contacts {
  952. puppet := user.bridge.GetPuppetByJID(jid)
  953. if puppet != nil {
  954. puppet.Sync(user, contact)
  955. } else {
  956. user.log.Warnfln("Got a nil puppet for %s while syncing contacts", jid)
  957. }
  958. }
  959. return nil
  960. }
  961. func (user *User) ResyncGroups(createPortals bool) error {
  962. groups, err := user.Client.GetJoinedGroups()
  963. if err != nil {
  964. return fmt.Errorf("failed to get group list from server: %w", err)
  965. }
  966. for _, group := range groups {
  967. portal := user.GetPortalByJID(group.JID)
  968. if len(portal.MXID) == 0 {
  969. if createPortals {
  970. err = portal.CreateMatrixRoom(user, group, true, true)
  971. if err != nil {
  972. return fmt.Errorf("failed to create room for %s: %w", group.JID, err)
  973. }
  974. }
  975. } else {
  976. portal.UpdateMatrixRoom(user, group)
  977. }
  978. }
  979. return nil
  980. }
  981. const WATypingTimeout = 15 * time.Second
  982. func (user *User) handleChatPresence(presence *events.ChatPresence) {
  983. puppet := user.bridge.GetPuppetByJID(presence.Sender)
  984. portal := user.GetPortalByJID(presence.Chat)
  985. if puppet == nil || portal == nil || len(portal.MXID) == 0 {
  986. return
  987. }
  988. if presence.State == types.ChatPresenceComposing {
  989. if puppet.typingIn != "" && puppet.typingAt.Add(WATypingTimeout).Before(time.Now()) {
  990. if puppet.typingIn == portal.MXID {
  991. return
  992. }
  993. _, _ = puppet.IntentFor(portal).UserTyping(puppet.typingIn, false, 0)
  994. }
  995. _, _ = puppet.IntentFor(portal).UserTyping(portal.MXID, true, WATypingTimeout.Milliseconds())
  996. puppet.typingIn = portal.MXID
  997. puppet.typingAt = time.Now()
  998. } else {
  999. _, _ = puppet.IntentFor(portal).UserTyping(portal.MXID, false, 0)
  1000. puppet.typingIn = ""
  1001. }
  1002. }
  1003. func (user *User) handleReceipt(receipt *events.Receipt) {
  1004. if receipt.Type != events.ReceiptTypeRead && receipt.Type != events.ReceiptTypeReadSelf {
  1005. return
  1006. }
  1007. portal := user.GetPortalByMessageSource(receipt.MessageSource)
  1008. if portal == nil || len(portal.MXID) == 0 {
  1009. return
  1010. }
  1011. portal.messages <- PortalMessage{receipt: receipt, source: user}
  1012. }
  1013. func makeReadMarkerContent(eventID id.EventID, doublePuppet bool) CustomReadMarkers {
  1014. var extra CustomReadReceipt
  1015. if doublePuppet {
  1016. extra.DoublePuppetSource = doublePuppetValue
  1017. }
  1018. return CustomReadMarkers{
  1019. ReqSetReadMarkers: mautrix.ReqSetReadMarkers{
  1020. Read: eventID,
  1021. FullyRead: eventID,
  1022. },
  1023. ReadExtra: extra,
  1024. FullyReadExtra: extra,
  1025. }
  1026. }
  1027. func (user *User) markSelfReadFull(portal *Portal) {
  1028. puppet := user.bridge.GetPuppetByCustomMXID(user.MXID)
  1029. if puppet == nil || puppet.CustomIntent() == nil {
  1030. return
  1031. }
  1032. lastMessage := user.bridge.DB.Message.GetLastInChat(portal.Key)
  1033. if lastMessage == nil {
  1034. return
  1035. }
  1036. user.SetLastReadTS(portal.Key, lastMessage.Timestamp)
  1037. err := puppet.CustomIntent().SetReadMarkers(portal.MXID, makeReadMarkerContent(lastMessage.MXID, true))
  1038. if err != nil {
  1039. user.log.Warnfln("Failed to mark %s (last message) in %s as read: %v", lastMessage.MXID, portal.MXID, err)
  1040. } else {
  1041. user.log.Debugfln("Marked %s (last message) in %s as read", lastMessage.MXID, portal.MXID)
  1042. }
  1043. }
  1044. func (user *User) markUnread(portal *Portal, unread bool) {
  1045. puppet := user.bridge.GetPuppetByCustomMXID(user.MXID)
  1046. if puppet == nil || puppet.CustomIntent() == nil {
  1047. return
  1048. }
  1049. err := puppet.CustomIntent().SetRoomAccountData(portal.MXID, "m.marked_unread",
  1050. map[string]bool{"unread": unread})
  1051. if err != nil {
  1052. user.log.Warnfln("Failed to mark %s as unread via m.marked_unread: %v", portal.MXID, err)
  1053. } else {
  1054. user.log.Debugfln("Marked %s as unread via m.marked_unread: %v", portal.MXID, err)
  1055. }
  1056. err = puppet.CustomIntent().SetRoomAccountData(portal.MXID, "com.famedly.marked_unread",
  1057. map[string]bool{"unread": unread})
  1058. if err != nil {
  1059. user.log.Warnfln("Failed to mark %s as unread via com.famedly.marked_unread: %v", portal.MXID, err)
  1060. } else {
  1061. user.log.Debugfln("Marked %s as unread via com.famedly.marked_unread: %v", portal.MXID, err)
  1062. }
  1063. }
  1064. func (user *User) handleGroupCreate(evt *events.JoinedGroup) {
  1065. portal := user.GetPortalByJID(evt.JID)
  1066. if len(portal.MXID) == 0 {
  1067. err := portal.CreateMatrixRoom(user, &evt.GroupInfo, true, true)
  1068. if err != nil {
  1069. user.log.Errorln("Failed to create Matrix room after join notification: %v", err)
  1070. }
  1071. } else {
  1072. portal.UpdateMatrixRoom(user, &evt.GroupInfo)
  1073. }
  1074. }
  1075. func (user *User) handleGroupUpdate(evt *events.GroupInfo) {
  1076. portal := user.GetPortalByJID(evt.JID)
  1077. if portal == nil || len(portal.MXID) == 0 {
  1078. user.log.Debugfln("Ignoring group info update in chat with no portal: %+v", evt)
  1079. return
  1080. }
  1081. switch {
  1082. case evt.Announce != nil:
  1083. portal.RestrictMessageSending(evt.Announce.IsAnnounce)
  1084. case evt.Locked != nil:
  1085. portal.RestrictMetadataChanges(evt.Locked.IsLocked)
  1086. case evt.Name != nil:
  1087. portal.UpdateName(evt.Name.Name, evt.Name.NameSetBy, true)
  1088. case evt.Topic != nil:
  1089. portal.UpdateTopic(evt.Topic.Topic, evt.Topic.TopicSetBy, true)
  1090. case evt.Leave != nil:
  1091. if evt.Sender != nil && !evt.Sender.IsEmpty() {
  1092. portal.HandleWhatsAppKick(user, *evt.Sender, evt.Leave)
  1093. }
  1094. case evt.Join != nil:
  1095. portal.HandleWhatsAppInvite(user, evt.Sender, evt.Join)
  1096. case evt.Promote != nil:
  1097. portal.ChangeAdminStatus(evt.Promote, true)
  1098. case evt.Demote != nil:
  1099. portal.ChangeAdminStatus(evt.Demote, false)
  1100. case evt.Ephemeral != nil:
  1101. portal.UpdateGroupDisappearingMessages(evt.Sender, evt.Timestamp, evt.Ephemeral.DisappearingTimer)
  1102. }
  1103. }
  1104. func (user *User) handlePictureUpdate(evt *events.Picture) {
  1105. if evt.JID.Server == types.DefaultUserServer {
  1106. puppet := user.bridge.GetPuppetByJID(evt.JID)
  1107. user.log.Debugfln("Received picture update for puppet %s (current: %s, new: %s)", evt.JID, puppet.Avatar, evt.PictureID)
  1108. if puppet.Avatar != evt.PictureID {
  1109. puppet.UpdateAvatar(user)
  1110. }
  1111. } else if portal := user.GetPortalByJID(evt.JID); portal != nil {
  1112. user.log.Debugfln("Received picture update for portal %s (current: %s, new: %s)", evt.JID, portal.Avatar, evt.PictureID)
  1113. if portal.Avatar != evt.PictureID {
  1114. portal.UpdateAvatar(user, evt.Author, true)
  1115. }
  1116. }
  1117. }
  1118. func (user *User) StartPM(jid types.JID, reason string) (*Portal, *Puppet, bool, error) {
  1119. user.log.Debugln("Starting PM with", jid, "from", reason)
  1120. puppet := user.bridge.GetPuppetByJID(jid)
  1121. puppet.SyncContact(user, true, false, reason)
  1122. portal := user.GetPortalByJID(puppet.JID)
  1123. if len(portal.MXID) > 0 {
  1124. ok := portal.ensureUserInvited(user)
  1125. if !ok {
  1126. portal.log.Warnfln("ensureUserInvited(%s) returned false, creating new portal", user.MXID)
  1127. portal.MXID = ""
  1128. } else {
  1129. return portal, puppet, false, nil
  1130. }
  1131. }
  1132. err := portal.CreateMatrixRoom(user, nil, false, true)
  1133. return portal, puppet, true, err
  1134. }
  1135. const groupListCacheMaxAge = 24 * time.Hour
  1136. func (user *User) getCachedGroupList() ([]*types.GroupInfo, error) {
  1137. user.groupListCacheLock.Lock()
  1138. defer user.groupListCacheLock.Unlock()
  1139. if user.groupListCache != nil && user.groupListCacheTime.Add(groupListCacheMaxAge).After(time.Now()) {
  1140. return user.groupListCache, nil
  1141. }
  1142. var err error
  1143. user.groupListCache, err = user.Client.GetJoinedGroups()
  1144. user.groupListCacheTime = time.Now()
  1145. return user.groupListCache, err
  1146. }