user.go 41 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237
  1. // mautrix-whatsapp - A Matrix-WhatsApp puppeting bridge.
  2. // Copyright (C) 2022 Tulir Asokan
  3. //
  4. // This program is free software: you can redistribute it and/or modify
  5. // it under the terms of the GNU Affero General Public License as published by
  6. // the Free Software Foundation, either version 3 of the License, or
  7. // (at your option) any later version.
  8. //
  9. // This program is distributed in the hope that it will be useful,
  10. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. // GNU Affero General Public License for more details.
  13. //
  14. // You should have received a copy of the GNU Affero General Public License
  15. // along with this program. If not, see <https://www.gnu.org/licenses/>.
  16. package main
  17. import (
  18. "context"
  19. "crypto/hmac"
  20. "crypto/sha256"
  21. "encoding/binary"
  22. "encoding/json"
  23. "errors"
  24. "fmt"
  25. "math"
  26. "net/http"
  27. "strconv"
  28. "strings"
  29. "sync"
  30. "time"
  31. log "maunium.net/go/maulogger/v2"
  32. "maunium.net/go/mautrix"
  33. "maunium.net/go/mautrix/appservice"
  34. "maunium.net/go/mautrix/bridge"
  35. "maunium.net/go/mautrix/bridge/bridgeconfig"
  36. "maunium.net/go/mautrix/event"
  37. "maunium.net/go/mautrix/format"
  38. "maunium.net/go/mautrix/id"
  39. "maunium.net/go/mautrix/pushrules"
  40. "go.mau.fi/whatsmeow"
  41. "go.mau.fi/whatsmeow/appstate"
  42. waProto "go.mau.fi/whatsmeow/binary/proto"
  43. "go.mau.fi/whatsmeow/store"
  44. "go.mau.fi/whatsmeow/types"
  45. "go.mau.fi/whatsmeow/types/events"
  46. waLog "go.mau.fi/whatsmeow/util/log"
  47. "maunium.net/go/mautrix-whatsapp/database"
  48. )
  49. type User struct {
  50. *database.User
  51. Client *whatsmeow.Client
  52. Session *store.Device
  53. bridge *WABridge
  54. log log.Logger
  55. Admin bool
  56. Whitelisted bool
  57. RelayWhitelisted bool
  58. PermissionLevel bridgeconfig.PermissionLevel
  59. mgmtCreateLock sync.Mutex
  60. spaceCreateLock sync.Mutex
  61. connLock sync.Mutex
  62. historySyncs chan *events.HistorySync
  63. lastPresence types.Presence
  64. historySyncLoopsStarted bool
  65. spaceMembershipChecked bool
  66. lastPhoneOfflineWarning time.Time
  67. groupListCache []*types.GroupInfo
  68. groupListCacheLock sync.Mutex
  69. groupListCacheTime time.Time
  70. BackfillQueue *BackfillQueue
  71. BridgeState *bridge.BridgeStateQueue
  72. }
  73. func (br *WABridge) getUserByMXID(userID id.UserID, onlyIfExists bool) *User {
  74. _, isPuppet := br.ParsePuppetMXID(userID)
  75. if isPuppet || userID == br.Bot.UserID {
  76. return nil
  77. }
  78. br.usersLock.Lock()
  79. defer br.usersLock.Unlock()
  80. user, ok := br.usersByMXID[userID]
  81. if !ok {
  82. userIDPtr := &userID
  83. if onlyIfExists {
  84. userIDPtr = nil
  85. }
  86. return br.loadDBUser(br.DB.User.GetByMXID(userID), userIDPtr)
  87. }
  88. return user
  89. }
  90. func (br *WABridge) GetUserByMXID(userID id.UserID) *User {
  91. return br.getUserByMXID(userID, false)
  92. }
  93. func (br *WABridge) GetIUser(userID id.UserID, create bool) bridge.User {
  94. u := br.getUserByMXID(userID, !create)
  95. if u == nil {
  96. return nil
  97. }
  98. return u
  99. }
  100. func (user *User) GetPermissionLevel() bridgeconfig.PermissionLevel {
  101. return user.PermissionLevel
  102. }
  103. func (user *User) GetManagementRoomID() id.RoomID {
  104. return user.ManagementRoom
  105. }
  106. func (user *User) GetMXID() id.UserID {
  107. return user.MXID
  108. }
  109. func (user *User) GetCommandState() map[string]interface{} {
  110. return nil
  111. }
  112. func (br *WABridge) GetUserByMXIDIfExists(userID id.UserID) *User {
  113. return br.getUserByMXID(userID, true)
  114. }
  115. func (br *WABridge) GetUserByJID(jid types.JID) *User {
  116. br.usersLock.Lock()
  117. defer br.usersLock.Unlock()
  118. user, ok := br.usersByUsername[jid.User]
  119. if !ok {
  120. return br.loadDBUser(br.DB.User.GetByUsername(jid.User), nil)
  121. }
  122. return user
  123. }
  124. func (user *User) addToJIDMap() {
  125. user.bridge.usersLock.Lock()
  126. user.bridge.usersByUsername[user.JID.User] = user
  127. user.bridge.usersLock.Unlock()
  128. }
  129. func (user *User) removeFromJIDMap(state bridge.State) {
  130. user.bridge.usersLock.Lock()
  131. jidUser, ok := user.bridge.usersByUsername[user.JID.User]
  132. if ok && user == jidUser {
  133. delete(user.bridge.usersByUsername, user.JID.User)
  134. }
  135. user.bridge.usersLock.Unlock()
  136. user.bridge.Metrics.TrackLoginState(user.JID, false)
  137. user.BridgeState.Send(state)
  138. }
  139. func (br *WABridge) GetAllUsers() []*User {
  140. br.usersLock.Lock()
  141. defer br.usersLock.Unlock()
  142. dbUsers := br.DB.User.GetAll()
  143. output := make([]*User, len(dbUsers))
  144. for index, dbUser := range dbUsers {
  145. user, ok := br.usersByMXID[dbUser.MXID]
  146. if !ok {
  147. user = br.loadDBUser(dbUser, nil)
  148. }
  149. output[index] = user
  150. }
  151. return output
  152. }
  153. func (br *WABridge) loadDBUser(dbUser *database.User, mxid *id.UserID) *User {
  154. if dbUser == nil {
  155. if mxid == nil {
  156. return nil
  157. }
  158. dbUser = br.DB.User.New()
  159. dbUser.MXID = *mxid
  160. dbUser.Insert()
  161. }
  162. user := br.NewUser(dbUser)
  163. br.usersByMXID[user.MXID] = user
  164. if !user.JID.IsEmpty() {
  165. var err error
  166. user.Session, err = br.WAContainer.GetDevice(user.JID)
  167. if err != nil {
  168. user.log.Errorfln("Failed to load user's whatsapp session: %v", err)
  169. } else if user.Session == nil {
  170. user.log.Warnfln("Didn't find session data for %s, treating user as logged out", user.JID)
  171. user.JID = types.EmptyJID
  172. user.Update()
  173. } else {
  174. user.Session.Log = &waLogger{user.log.Sub("Session")}
  175. br.usersByUsername[user.JID.User] = user
  176. }
  177. }
  178. if len(user.ManagementRoom) > 0 {
  179. br.managementRooms[user.ManagementRoom] = user
  180. }
  181. return user
  182. }
  183. func (br *WABridge) NewUser(dbUser *database.User) *User {
  184. user := &User{
  185. User: dbUser,
  186. bridge: br,
  187. log: br.Log.Sub("User").Sub(string(dbUser.MXID)),
  188. historySyncs: make(chan *events.HistorySync, 32),
  189. lastPresence: types.PresenceUnavailable,
  190. }
  191. user.PermissionLevel = user.bridge.Config.Bridge.Permissions.Get(user.MXID)
  192. user.RelayWhitelisted = user.PermissionLevel >= bridgeconfig.PermissionLevelRelay
  193. user.Whitelisted = user.PermissionLevel >= bridgeconfig.PermissionLevelUser
  194. user.Admin = user.PermissionLevel >= bridgeconfig.PermissionLevelAdmin
  195. user.BridgeState = br.NewBridgeStateQueue(user, user.log)
  196. return user
  197. }
  198. func (user *User) ensureInvited(intent *appservice.IntentAPI, roomID id.RoomID, isDirect bool) (ok bool) {
  199. inviteContent := event.Content{
  200. Parsed: &event.MemberEventContent{
  201. Membership: event.MembershipInvite,
  202. IsDirect: isDirect,
  203. },
  204. Raw: map[string]interface{}{},
  205. }
  206. customPuppet := user.bridge.GetPuppetByCustomMXID(user.MXID)
  207. if customPuppet != nil && customPuppet.CustomIntent() != nil {
  208. inviteContent.Raw["fi.mau.will_auto_accept"] = true
  209. }
  210. _, err := intent.SendStateEvent(roomID, event.StateMember, user.MXID.String(), &inviteContent)
  211. var httpErr mautrix.HTTPError
  212. if err != nil && errors.As(err, &httpErr) && httpErr.RespError != nil && strings.Contains(httpErr.RespError.Err, "is already in the room") {
  213. user.bridge.StateStore.SetMembership(roomID, user.MXID, event.MembershipJoin)
  214. ok = true
  215. return
  216. } else if err != nil {
  217. user.log.Warnfln("Failed to invite user to %s: %v", roomID, err)
  218. } else {
  219. ok = true
  220. }
  221. if customPuppet != nil && customPuppet.CustomIntent() != nil {
  222. err = customPuppet.CustomIntent().EnsureJoined(roomID, appservice.EnsureJoinedParams{IgnoreCache: true})
  223. if err != nil {
  224. user.log.Warnfln("Failed to auto-join %s: %v", roomID, err)
  225. ok = false
  226. } else {
  227. ok = true
  228. }
  229. }
  230. return
  231. }
  232. func (user *User) GetSpaceRoom() id.RoomID {
  233. if !user.bridge.Config.Bridge.PersonalFilteringSpaces {
  234. return ""
  235. }
  236. if len(user.SpaceRoom) == 0 {
  237. user.spaceCreateLock.Lock()
  238. defer user.spaceCreateLock.Unlock()
  239. if len(user.SpaceRoom) > 0 {
  240. return user.SpaceRoom
  241. }
  242. resp, err := user.bridge.Bot.CreateRoom(&mautrix.ReqCreateRoom{
  243. Visibility: "private",
  244. Name: "WhatsApp",
  245. Topic: "Your WhatsApp bridged chats",
  246. InitialState: []*event.Event{{
  247. Type: event.StateRoomAvatar,
  248. Content: event.Content{
  249. Parsed: &event.RoomAvatarEventContent{
  250. URL: user.bridge.Config.AppService.Bot.ParsedAvatar,
  251. },
  252. },
  253. }},
  254. CreationContent: map[string]interface{}{
  255. "type": event.RoomTypeSpace,
  256. },
  257. PowerLevelOverride: &event.PowerLevelsEventContent{
  258. Users: map[id.UserID]int{
  259. user.bridge.Bot.UserID: 9001,
  260. user.MXID: 50,
  261. },
  262. },
  263. })
  264. if err != nil {
  265. user.log.Errorln("Failed to auto-create space room:", err)
  266. } else {
  267. user.SpaceRoom = resp.RoomID
  268. user.Update()
  269. user.ensureInvited(user.bridge.Bot, user.SpaceRoom, false)
  270. }
  271. } else if !user.spaceMembershipChecked && !user.bridge.StateStore.IsInRoom(user.SpaceRoom, user.MXID) {
  272. user.ensureInvited(user.bridge.Bot, user.SpaceRoom, false)
  273. }
  274. user.spaceMembershipChecked = true
  275. return user.SpaceRoom
  276. }
  277. func (user *User) GetManagementRoom() id.RoomID {
  278. if len(user.ManagementRoom) == 0 {
  279. user.mgmtCreateLock.Lock()
  280. defer user.mgmtCreateLock.Unlock()
  281. if len(user.ManagementRoom) > 0 {
  282. return user.ManagementRoom
  283. }
  284. creationContent := make(map[string]interface{})
  285. if !user.bridge.Config.Bridge.FederateRooms {
  286. creationContent["m.federate"] = false
  287. }
  288. resp, err := user.bridge.Bot.CreateRoom(&mautrix.ReqCreateRoom{
  289. Topic: "WhatsApp bridge notices",
  290. IsDirect: true,
  291. CreationContent: creationContent,
  292. })
  293. if err != nil {
  294. user.log.Errorln("Failed to auto-create management room:", err)
  295. } else {
  296. user.SetManagementRoom(resp.RoomID)
  297. }
  298. }
  299. return user.ManagementRoom
  300. }
  301. func (user *User) SetManagementRoom(roomID id.RoomID) {
  302. existingUser, ok := user.bridge.managementRooms[roomID]
  303. if ok {
  304. existingUser.ManagementRoom = ""
  305. existingUser.Update()
  306. }
  307. user.ManagementRoom = roomID
  308. user.bridge.managementRooms[user.ManagementRoom] = user
  309. user.Update()
  310. }
  311. type waLogger struct{ l log.Logger }
  312. func (w *waLogger) Debugf(msg string, args ...interface{}) { w.l.Debugfln(msg, args...) }
  313. func (w *waLogger) Infof(msg string, args ...interface{}) { w.l.Infofln(msg, args...) }
  314. func (w *waLogger) Warnf(msg string, args ...interface{}) { w.l.Warnfln(msg, args...) }
  315. func (w *waLogger) Errorf(msg string, args ...interface{}) { w.l.Errorfln(msg, args...) }
  316. func (w *waLogger) Sub(module string) waLog.Logger { return &waLogger{l: w.l.Sub(module)} }
  317. var ErrAlreadyLoggedIn = errors.New("already logged in")
  318. func (user *User) obfuscateJID(jid types.JID) string {
  319. // Turn the first 4 bytes of HMAC-SHA256(hs_token, phone) into a number and replace the middle of the actual phone with that deterministic random number.
  320. randomNumber := binary.BigEndian.Uint32(hmac.New(sha256.New, []byte(user.bridge.Config.AppService.HSToken)).Sum([]byte(jid.User))[:4])
  321. return fmt.Sprintf("+%s-%d-%s:%d", jid.User[:1], randomNumber, jid.User[len(jid.User)-2:], jid.Device)
  322. }
  323. func (user *User) createClient(sess *store.Device) {
  324. user.Client = whatsmeow.NewClient(sess, &waLogger{user.log.Sub("Client")})
  325. user.Client.AddEventHandler(user.HandleEvent)
  326. user.Client.SetForceActiveDeliveryReceipts(user.bridge.Config.Bridge.ForceActiveDeliveryReceipts)
  327. user.Client.GetMessageForRetry = func(requester, to types.JID, id types.MessageID) *waProto.Message {
  328. Segment.Track(user.MXID, "WhatsApp incoming retry (message not found)", map[string]interface{}{
  329. "requester": user.obfuscateJID(requester),
  330. "messageID": id,
  331. })
  332. user.bridge.Metrics.TrackRetryReceipt(0, false)
  333. return nil
  334. }
  335. user.Client.PreRetryCallback = func(receipt *events.Receipt, messageID types.MessageID, retryCount int, msg *waProto.Message) bool {
  336. Segment.Track(user.MXID, "WhatsApp incoming retry (accepted)", map[string]interface{}{
  337. "requester": user.obfuscateJID(receipt.Sender),
  338. "messageID": messageID,
  339. "retryCount": retryCount,
  340. })
  341. user.bridge.Metrics.TrackRetryReceipt(retryCount, true)
  342. return true
  343. }
  344. }
  345. func (user *User) Login(ctx context.Context) (<-chan whatsmeow.QRChannelItem, error) {
  346. user.connLock.Lock()
  347. defer user.connLock.Unlock()
  348. if user.Session != nil {
  349. return nil, ErrAlreadyLoggedIn
  350. } else if user.Client != nil {
  351. user.unlockedDeleteConnection()
  352. }
  353. newSession := user.bridge.WAContainer.NewDevice()
  354. newSession.Log = &waLogger{user.log.Sub("Session")}
  355. user.createClient(newSession)
  356. qrChan, err := user.Client.GetQRChannel(ctx)
  357. if err != nil {
  358. return nil, fmt.Errorf("failed to get QR channel: %w", err)
  359. }
  360. err = user.Client.Connect()
  361. if err != nil {
  362. return nil, fmt.Errorf("failed to connect to WhatsApp: %w", err)
  363. }
  364. return qrChan, nil
  365. }
  366. func (user *User) Connect() bool {
  367. user.connLock.Lock()
  368. defer user.connLock.Unlock()
  369. if user.Client != nil {
  370. return user.Client.IsConnected()
  371. } else if user.Session == nil {
  372. return false
  373. }
  374. user.log.Debugln("Connecting to WhatsApp")
  375. user.BridgeState.Send(bridge.State{StateEvent: bridge.StateConnecting, Error: WAConnecting})
  376. user.createClient(user.Session)
  377. err := user.Client.Connect()
  378. if err != nil {
  379. user.log.Warnln("Error connecting to WhatsApp:", err)
  380. user.BridgeState.Send(bridge.State{
  381. StateEvent: bridge.StateUnknownError,
  382. Error: WAConnectionFailed,
  383. Info: map[string]interface{}{
  384. "go_error": err.Error(),
  385. },
  386. })
  387. return false
  388. }
  389. return true
  390. }
  391. func (user *User) unlockedDeleteConnection() {
  392. if user.Client == nil {
  393. return
  394. }
  395. user.Client.Disconnect()
  396. user.Client.RemoveEventHandlers()
  397. user.Client = nil
  398. user.bridge.Metrics.TrackConnectionState(user.JID, false)
  399. }
  400. func (user *User) DeleteConnection() {
  401. user.connLock.Lock()
  402. defer user.connLock.Unlock()
  403. user.unlockedDeleteConnection()
  404. }
  405. func (user *User) HasSession() bool {
  406. return user.Session != nil
  407. }
  408. func (user *User) DeleteSession() {
  409. if user.Session != nil {
  410. err := user.Session.Delete()
  411. if err != nil {
  412. user.log.Warnln("Failed to delete session:", err)
  413. }
  414. user.Session = nil
  415. }
  416. if !user.JID.IsEmpty() {
  417. user.JID = types.EmptyJID
  418. user.Update()
  419. }
  420. // Delete all of the backfill and history sync data.
  421. user.bridge.DB.Backfill.DeleteAll(user.MXID)
  422. user.bridge.DB.HistorySync.DeleteAllConversations(user.MXID)
  423. user.bridge.DB.HistorySync.DeleteAllMessages(user.MXID)
  424. user.bridge.DB.MediaBackfillRequest.DeleteAllMediaBackfillRequests(user.MXID)
  425. }
  426. func (user *User) IsConnected() bool {
  427. return user.Client != nil && user.Client.IsConnected()
  428. }
  429. func (user *User) IsLoggedIn() bool {
  430. return user.IsConnected() && user.Client.IsLoggedIn()
  431. }
  432. func (user *User) tryAutomaticDoublePuppeting() {
  433. if !user.bridge.Config.CanAutoDoublePuppet(user.MXID) {
  434. return
  435. }
  436. user.log.Debugln("Checking if double puppeting needs to be enabled")
  437. puppet := user.bridge.GetPuppetByJID(user.JID)
  438. if len(puppet.CustomMXID) > 0 {
  439. user.log.Debugln("User already has double-puppeting enabled")
  440. // Custom puppet already enabled
  441. return
  442. }
  443. accessToken, err := puppet.loginWithSharedSecret(user.MXID)
  444. if err != nil {
  445. user.log.Warnln("Failed to login with shared secret:", err)
  446. return
  447. }
  448. err = puppet.SwitchCustomMXID(accessToken, user.MXID)
  449. if err != nil {
  450. puppet.log.Warnln("Failed to switch to auto-logined custom puppet:", err)
  451. return
  452. }
  453. user.log.Infoln("Successfully automatically enabled custom puppet")
  454. }
  455. func (user *User) sendMarkdownBridgeAlert(formatString string, args ...interface{}) {
  456. if user.bridge.Config.Bridge.DisableBridgeAlerts {
  457. return
  458. }
  459. notice := fmt.Sprintf(formatString, args...)
  460. content := format.RenderMarkdown(notice, true, false)
  461. _, err := user.bridge.Bot.SendMessageEvent(user.GetManagementRoom(), event.EventMessage, content)
  462. if err != nil {
  463. user.log.Warnf("Failed to send bridge alert \"%s\": %v", notice, err)
  464. }
  465. }
  466. const callEventMaxAge = 15 * time.Minute
  467. func (user *User) handleCallStart(sender types.JID, id, callType string, ts time.Time) {
  468. if !user.bridge.Config.Bridge.CallStartNotices || ts.Add(callEventMaxAge).Before(time.Now()) {
  469. return
  470. }
  471. portal := user.GetPortalByJID(sender)
  472. text := "Incoming call"
  473. if callType != "" {
  474. text = fmt.Sprintf("Incoming %s call", callType)
  475. }
  476. portal.messages <- PortalMessage{
  477. fake: &fakeMessage{
  478. Sender: sender,
  479. Text: text,
  480. ID: id,
  481. Time: ts,
  482. Important: true,
  483. },
  484. source: user,
  485. }
  486. }
  487. const PhoneDisconnectWarningTime = 12 * 24 * time.Hour // 12 days
  488. const PhoneDisconnectPingTime = 10 * 24 * time.Hour
  489. const PhoneMinPingInterval = 24 * time.Hour
  490. func (user *User) sendHackyPhonePing() {
  491. user.PhoneLastPinged = time.Now()
  492. msgID := whatsmeow.GenerateMessageID()
  493. keyIDs := make([]*waProto.AppStateSyncKeyId, 0, 1)
  494. lastKeyID, err := user.GetLastAppStateKeyID()
  495. if lastKeyID != nil {
  496. keyIDs = append(keyIDs, &waProto.AppStateSyncKeyId{
  497. KeyId: lastKeyID,
  498. })
  499. } else {
  500. user.log.Warnfln("Failed to get last app state key ID to send hacky phone ping: %v - sending empty request", err)
  501. }
  502. ts, err := user.Client.SendMessage(user.JID.ToNonAD(), msgID, &waProto.Message{
  503. ProtocolMessage: &waProto.ProtocolMessage{
  504. Type: waProto.ProtocolMessage_APP_STATE_SYNC_KEY_REQUEST.Enum(),
  505. AppStateSyncKeyRequest: &waProto.AppStateSyncKeyRequest{
  506. KeyIds: keyIDs,
  507. },
  508. },
  509. })
  510. if err != nil {
  511. user.log.Warnfln("Failed to send hacky phone ping: %v", err)
  512. } else {
  513. user.log.Debugfln("Sent hacky phone ping %s/%s because phone has been offline for >10 days", msgID, ts.Unix())
  514. user.PhoneLastPinged = ts
  515. user.Update()
  516. }
  517. }
  518. func (user *User) PhoneRecentlySeen(doPing bool) bool {
  519. if doPing && !user.PhoneLastSeen.IsZero() && user.PhoneLastSeen.Add(PhoneDisconnectPingTime).Before(time.Now()) && user.PhoneLastPinged.Add(PhoneMinPingInterval).Before(time.Now()) {
  520. // Over 10 days since the phone was seen and over a day since the last somewhat hacky ping, send a new ping.
  521. go user.sendHackyPhonePing()
  522. }
  523. return user.PhoneLastSeen.IsZero() || user.PhoneLastSeen.Add(PhoneDisconnectWarningTime).After(time.Now())
  524. }
  525. // phoneSeen records a timestamp when the user's main device was seen online.
  526. // The stored timestamp can later be used to warn the user if the main device is offline for too long.
  527. func (user *User) phoneSeen(ts time.Time) {
  528. if user.PhoneLastSeen.Add(1 * time.Hour).After(ts) {
  529. // The last seen timestamp isn't going to be perfectly accurate in any case,
  530. // so don't spam the database with an update every time there's an event.
  531. return
  532. } else if !user.PhoneRecentlySeen(false) {
  533. if user.BridgeState.GetPrev().Error == WAPhoneOffline && user.IsConnected() {
  534. user.log.Debugfln("Saw phone after current bridge state said it has been offline, switching state back to connected")
  535. go user.BridgeState.Send(bridge.State{StateEvent: bridge.StateConnected})
  536. } else {
  537. user.log.Debugfln("Saw phone after current bridge state said it has been offline, not sending new bridge state (prev: %s, connected: %t)", user.BridgeState.GetPrev().Error, user.IsConnected())
  538. }
  539. }
  540. user.PhoneLastSeen = ts
  541. go user.Update()
  542. }
  543. func formatDisconnectTime(dur time.Duration) string {
  544. days := int(math.Floor(dur.Hours() / 24))
  545. hours := int(dur.Hours()) % 24
  546. if hours == 0 {
  547. return fmt.Sprintf("%d days", days)
  548. } else if hours == 1 {
  549. return fmt.Sprintf("%d days and 1 hour", days)
  550. } else {
  551. return fmt.Sprintf("%d days and %d hours", days, hours)
  552. }
  553. }
  554. func (user *User) sendPhoneOfflineWarning() {
  555. if user.lastPhoneOfflineWarning.Add(12 * time.Hour).After(time.Now()) {
  556. // Don't spam the warning too much
  557. return
  558. }
  559. user.lastPhoneOfflineWarning = time.Now()
  560. timeSinceSeen := time.Now().Sub(user.PhoneLastSeen)
  561. user.sendMarkdownBridgeAlert("Your phone hasn't been seen in %s. The server will force the bridge to log out if the phone is not active at least every 2 weeks.", formatDisconnectTime(timeSinceSeen))
  562. }
  563. func (user *User) HandleEvent(event interface{}) {
  564. switch v := event.(type) {
  565. case *events.LoggedOut:
  566. go user.handleLoggedOut(v.OnConnect, v.Reason)
  567. case *events.Connected:
  568. user.bridge.Metrics.TrackConnectionState(user.JID, true)
  569. user.bridge.Metrics.TrackLoginState(user.JID, true)
  570. if len(user.Client.Store.PushName) > 0 {
  571. go func() {
  572. err := user.Client.SendPresence(user.lastPresence)
  573. if err != nil {
  574. user.log.Warnln("Failed to send initial presence:", err)
  575. }
  576. }()
  577. }
  578. go user.tryAutomaticDoublePuppeting()
  579. if user.bridge.Config.Bridge.HistorySync.Backfill && !user.historySyncLoopsStarted {
  580. go user.handleHistorySyncsLoop()
  581. user.historySyncLoopsStarted = true
  582. }
  583. case *events.OfflineSyncPreview:
  584. user.log.Infofln("Server says it's going to send %d messages and %d receipts that were missed during downtime", v.Messages, v.Receipts)
  585. go user.BridgeState.Send(bridge.State{
  586. StateEvent: bridge.StateBackfilling,
  587. Message: fmt.Sprintf("backfilling %d messages and %d receipts", v.Messages, v.Receipts),
  588. })
  589. case *events.OfflineSyncCompleted:
  590. if !user.PhoneRecentlySeen(true) {
  591. user.log.Infofln("Offline sync completed, but phone last seen date is still %s - sending phone offline bridge status", user.PhoneLastSeen)
  592. go user.BridgeState.Send(bridge.State{StateEvent: bridge.StateTransientDisconnect, Error: WAPhoneOffline})
  593. } else {
  594. if user.BridgeState.GetPrev().StateEvent == bridge.StateBackfilling {
  595. user.log.Infoln("Offline sync completed")
  596. }
  597. go user.BridgeState.Send(bridge.State{StateEvent: bridge.StateConnected})
  598. }
  599. case *events.AppStateSyncComplete:
  600. if len(user.Client.Store.PushName) > 0 && v.Name == appstate.WAPatchCriticalBlock {
  601. err := user.Client.SendPresence(user.lastPresence)
  602. if err != nil {
  603. user.log.Warnln("Failed to send presence after app state sync:", err)
  604. }
  605. } else if v.Name == appstate.WAPatchCriticalUnblockLow {
  606. go func() {
  607. err := user.ResyncContacts()
  608. if err != nil {
  609. user.log.Errorln("Failed to resync puppets: %v", err)
  610. }
  611. }()
  612. }
  613. case *events.PushNameSetting:
  614. // Send presence available when connecting and when the pushname is changed.
  615. // This makes sure that outgoing messages always have the right pushname.
  616. err := user.Client.SendPresence(user.lastPresence)
  617. if err != nil {
  618. user.log.Warnln("Failed to send presence after push name update:", err)
  619. }
  620. case *events.PairSuccess:
  621. user.PhoneLastSeen = time.Now()
  622. user.Session = user.Client.Store
  623. user.JID = v.ID
  624. user.addToJIDMap()
  625. user.Update()
  626. case *events.StreamError:
  627. var message string
  628. if v.Code != "" {
  629. message = fmt.Sprintf("Unknown stream error with code %s", v.Code)
  630. } else if children := v.Raw.GetChildren(); len(children) > 0 {
  631. message = fmt.Sprintf("Unknown stream error (contains %s node)", children[0].Tag)
  632. } else {
  633. message = "Unknown stream error"
  634. }
  635. go user.BridgeState.Send(bridge.State{StateEvent: bridge.StateUnknownError, Message: message})
  636. user.bridge.Metrics.TrackConnectionState(user.JID, false)
  637. case *events.ConnectFailure:
  638. go user.BridgeState.Send(bridge.State{StateEvent: bridge.StateUnknownError, Message: fmt.Sprintf("Unknown connection failure: %s", v.Reason)})
  639. user.bridge.Metrics.TrackConnectionState(user.JID, false)
  640. case *events.ClientOutdated:
  641. user.log.Errorfln("Got a client outdated connect failure. The bridge is likely out of date, please update immediately.")
  642. go user.BridgeState.Send(bridge.State{StateEvent: bridge.StateUnknownError, Message: "Connect failure: 405 client outdated"})
  643. user.bridge.Metrics.TrackConnectionState(user.JID, false)
  644. case *events.TemporaryBan:
  645. go user.BridgeState.Send(bridge.State{StateEvent: bridge.StateBadCredentials, Message: v.String()})
  646. user.bridge.Metrics.TrackConnectionState(user.JID, false)
  647. case *events.Disconnected:
  648. // Don't send the normal transient disconnect state if we're already in a different transient disconnect state.
  649. // TODO remove this if/when the phone offline state is moved to a sub-state of CONNECTED
  650. if user.BridgeState.GetPrev().Error != WAPhoneOffline && user.PhoneRecentlySeen(false) {
  651. go user.BridgeState.Send(bridge.State{StateEvent: bridge.StateTransientDisconnect, Message: "Disconnected from WhatsApp. Trying to reconnect."})
  652. }
  653. user.bridge.Metrics.TrackConnectionState(user.JID, false)
  654. case *events.Contact:
  655. go user.syncPuppet(v.JID, "contact event")
  656. case *events.PushName:
  657. go user.syncPuppet(v.JID, "push name event")
  658. case *events.GroupInfo:
  659. user.groupListCache = nil
  660. go user.handleGroupUpdate(v)
  661. case *events.JoinedGroup:
  662. user.groupListCache = nil
  663. go user.handleGroupCreate(v)
  664. case *events.Picture:
  665. go user.handlePictureUpdate(v)
  666. case *events.Receipt:
  667. if v.IsFromMe && v.Sender.Device == 0 {
  668. user.phoneSeen(v.Timestamp)
  669. }
  670. go user.handleReceipt(v)
  671. case *events.ChatPresence:
  672. go user.handleChatPresence(v)
  673. case *events.Message:
  674. portal := user.GetPortalByMessageSource(v.Info.MessageSource)
  675. portal.messages <- PortalMessage{evt: v, source: user}
  676. case *events.MediaRetry:
  677. user.phoneSeen(v.Timestamp)
  678. portal := user.GetPortalByJID(v.ChatID)
  679. portal.mediaRetries <- PortalMediaRetry{evt: v, source: user}
  680. case *events.CallOffer:
  681. user.handleCallStart(v.CallCreator, v.CallID, "", v.Timestamp)
  682. case *events.CallOfferNotice:
  683. user.handleCallStart(v.CallCreator, v.CallID, v.Type, v.Timestamp)
  684. case *events.IdentityChange:
  685. puppet := user.bridge.GetPuppetByJID(v.JID)
  686. portal := user.GetPortalByJID(v.JID)
  687. if len(portal.MXID) > 0 && user.bridge.Config.Bridge.IdentityChangeNotices {
  688. text := fmt.Sprintf("Your security code with %s changed.", puppet.Displayname)
  689. if v.Implicit {
  690. text = fmt.Sprintf("Your security code with %s (device #%d) changed.", puppet.Displayname, v.JID.Device)
  691. }
  692. portal.messages <- PortalMessage{
  693. fake: &fakeMessage{
  694. Sender: v.JID,
  695. Text: text,
  696. ID: strconv.FormatInt(v.Timestamp.Unix(), 10),
  697. Time: v.Timestamp,
  698. Important: false,
  699. },
  700. source: user,
  701. }
  702. }
  703. case *events.CallTerminate, *events.CallRelayLatency, *events.CallAccept, *events.UnknownCallEvent:
  704. // ignore
  705. case *events.UndecryptableMessage:
  706. portal := user.GetPortalByMessageSource(v.Info.MessageSource)
  707. portal.messages <- PortalMessage{undecryptable: v, source: user}
  708. case *events.HistorySync:
  709. if user.bridge.Config.Bridge.HistorySync.Backfill {
  710. user.historySyncs <- v
  711. }
  712. case *events.Mute:
  713. portal := user.GetPortalByJID(v.JID)
  714. if portal != nil {
  715. var mutedUntil time.Time
  716. if v.Action.GetMuted() {
  717. mutedUntil = time.Unix(v.Action.GetMuteEndTimestamp(), 0)
  718. }
  719. go user.updateChatMute(nil, portal, mutedUntil)
  720. }
  721. case *events.Archive:
  722. portal := user.GetPortalByJID(v.JID)
  723. if portal != nil {
  724. go user.updateChatTag(nil, portal, user.bridge.Config.Bridge.ArchiveTag, v.Action.GetArchived())
  725. }
  726. case *events.Pin:
  727. portal := user.GetPortalByJID(v.JID)
  728. if portal != nil {
  729. go user.updateChatTag(nil, portal, user.bridge.Config.Bridge.PinnedTag, v.Action.GetPinned())
  730. }
  731. case *events.AppState:
  732. // Ignore
  733. case *events.KeepAliveTimeout:
  734. go user.BridgeState.Send(bridge.State{StateEvent: bridge.StateTransientDisconnect, Error: WAKeepaliveTimeout})
  735. case *events.KeepAliveRestored:
  736. user.log.Infof("Keepalive restored after timeouts, sending connected event")
  737. go user.BridgeState.Send(bridge.State{StateEvent: bridge.StateConnected})
  738. case *events.MarkChatAsRead:
  739. if user.bridge.Config.Bridge.SyncManualMarkedUnread {
  740. user.markUnread(user.GetPortalByJID(v.JID), !v.Action.GetRead())
  741. }
  742. default:
  743. user.log.Debugfln("Unknown type of event in HandleEvent: %T", v)
  744. }
  745. }
  746. func (user *User) updateChatMute(intent *appservice.IntentAPI, portal *Portal, mutedUntil time.Time) {
  747. if len(portal.MXID) == 0 || !user.bridge.Config.Bridge.MuteBridging {
  748. return
  749. } else if intent == nil {
  750. doublePuppet := user.bridge.GetPuppetByCustomMXID(user.MXID)
  751. if doublePuppet == nil || doublePuppet.CustomIntent() == nil {
  752. return
  753. }
  754. intent = doublePuppet.CustomIntent()
  755. }
  756. var err error
  757. if mutedUntil.IsZero() && mutedUntil.Before(time.Now()) {
  758. user.log.Debugfln("Portal %s is muted until %s, unmuting...", portal.MXID, mutedUntil)
  759. err = intent.DeletePushRule("global", pushrules.RoomRule, string(portal.MXID))
  760. } else {
  761. user.log.Debugfln("Portal %s is muted until %s, muting...", portal.MXID, mutedUntil)
  762. err = intent.PutPushRule("global", pushrules.RoomRule, string(portal.MXID), &mautrix.ReqPutPushRule{
  763. Actions: []pushrules.PushActionType{pushrules.ActionDontNotify},
  764. })
  765. }
  766. if err != nil && !errors.Is(err, mautrix.MNotFound) {
  767. user.log.Warnfln("Failed to update push rule for %s through double puppet: %v", portal.MXID, err)
  768. }
  769. }
  770. type CustomTagData struct {
  771. Order json.Number `json:"order"`
  772. DoublePuppet string `json:"fi.mau.double_puppet_source"`
  773. }
  774. type CustomTagEventContent struct {
  775. Tags map[string]CustomTagData `json:"tags"`
  776. }
  777. func (user *User) updateChatTag(intent *appservice.IntentAPI, portal *Portal, tag string, active bool) {
  778. if len(portal.MXID) == 0 || len(tag) == 0 {
  779. return
  780. } else if intent == nil {
  781. doublePuppet := user.bridge.GetPuppetByCustomMXID(user.MXID)
  782. if doublePuppet == nil || doublePuppet.CustomIntent() == nil {
  783. return
  784. }
  785. intent = doublePuppet.CustomIntent()
  786. }
  787. var existingTags CustomTagEventContent
  788. err := intent.GetTagsWithCustomData(portal.MXID, &existingTags)
  789. if err != nil && !errors.Is(err, mautrix.MNotFound) {
  790. user.log.Warnfln("Failed to get tags of %s: %v", portal.MXID, err)
  791. }
  792. currentTag, ok := existingTags.Tags[tag]
  793. if active && !ok {
  794. user.log.Debugln("Adding tag", tag, "to", portal.MXID)
  795. data := CustomTagData{"0.5", doublePuppetValue}
  796. err = intent.AddTagWithCustomData(portal.MXID, tag, &data)
  797. } else if !active && ok && currentTag.DoublePuppet == doublePuppetValue {
  798. user.log.Debugln("Removing tag", tag, "from", portal.MXID)
  799. err = intent.RemoveTag(portal.MXID, tag)
  800. } else {
  801. err = nil
  802. }
  803. if err != nil {
  804. user.log.Warnfln("Failed to update tag %s for %s through double puppet: %v", tag, portal.MXID, err)
  805. }
  806. }
  807. type CustomReadReceipt struct {
  808. Timestamp int64 `json:"ts,omitempty"`
  809. DoublePuppetSource string `json:"fi.mau.double_puppet_source,omitempty"`
  810. }
  811. type CustomReadMarkers struct {
  812. mautrix.ReqSetReadMarkers
  813. ReadExtra CustomReadReceipt `json:"com.beeper.read.extra"`
  814. FullyReadExtra CustomReadReceipt `json:"com.beeper.fully_read.extra"`
  815. }
  816. func (user *User) syncChatDoublePuppetDetails(portal *Portal, justCreated bool) {
  817. doublePuppet := portal.bridge.GetPuppetByCustomMXID(user.MXID)
  818. if doublePuppet == nil {
  819. return
  820. }
  821. if doublePuppet == nil || doublePuppet.CustomIntent() == nil || len(portal.MXID) == 0 {
  822. return
  823. }
  824. if justCreated || !user.bridge.Config.Bridge.TagOnlyOnCreate {
  825. chat, err := user.Client.Store.ChatSettings.GetChatSettings(portal.Key.JID)
  826. if err != nil {
  827. user.log.Warnfln("Failed to get settings of %s: %v", portal.Key.JID, err)
  828. return
  829. }
  830. intent := doublePuppet.CustomIntent()
  831. if portal.Key.JID == types.StatusBroadcastJID && justCreated {
  832. if user.bridge.Config.Bridge.MuteStatusBroadcast {
  833. user.updateChatMute(intent, portal, time.Now().Add(365*24*time.Hour))
  834. }
  835. if len(user.bridge.Config.Bridge.StatusBroadcastTag) > 0 {
  836. user.updateChatTag(intent, portal, user.bridge.Config.Bridge.StatusBroadcastTag, true)
  837. }
  838. return
  839. } else if !chat.Found {
  840. return
  841. }
  842. user.updateChatMute(intent, portal, chat.MutedUntil)
  843. user.updateChatTag(intent, portal, user.bridge.Config.Bridge.ArchiveTag, chat.Archived)
  844. user.updateChatTag(intent, portal, user.bridge.Config.Bridge.PinnedTag, chat.Pinned)
  845. }
  846. }
  847. func (user *User) getDirectChats() map[id.UserID][]id.RoomID {
  848. res := make(map[id.UserID][]id.RoomID)
  849. privateChats := user.bridge.DB.Portal.FindPrivateChats(user.JID.ToNonAD())
  850. for _, portal := range privateChats {
  851. if len(portal.MXID) > 0 {
  852. res[user.bridge.FormatPuppetMXID(portal.Key.JID)] = []id.RoomID{portal.MXID}
  853. }
  854. }
  855. return res
  856. }
  857. func (user *User) UpdateDirectChats(chats map[id.UserID][]id.RoomID) {
  858. if !user.bridge.Config.Bridge.SyncDirectChatList {
  859. return
  860. }
  861. puppet := user.bridge.GetPuppetByCustomMXID(user.MXID)
  862. if puppet == nil || puppet.CustomIntent() == nil {
  863. return
  864. }
  865. intent := puppet.CustomIntent()
  866. method := http.MethodPatch
  867. if chats == nil {
  868. chats = user.getDirectChats()
  869. method = http.MethodPut
  870. }
  871. user.log.Debugln("Updating m.direct list on homeserver")
  872. var err error
  873. if user.bridge.Config.Homeserver.Asmux {
  874. urlPath := intent.BuildClientURL("unstable", "com.beeper.asmux", "dms")
  875. _, err = intent.MakeFullRequest(mautrix.FullRequest{
  876. Method: method,
  877. URL: urlPath,
  878. Headers: http.Header{"X-Asmux-Auth": {user.bridge.AS.Registration.AppToken}},
  879. RequestJSON: chats,
  880. })
  881. } else {
  882. existingChats := make(map[id.UserID][]id.RoomID)
  883. err = intent.GetAccountData(event.AccountDataDirectChats.Type, &existingChats)
  884. if err != nil {
  885. user.log.Warnln("Failed to get m.direct list to update it:", err)
  886. return
  887. }
  888. for userID, rooms := range existingChats {
  889. if _, ok := user.bridge.ParsePuppetMXID(userID); !ok {
  890. // This is not a ghost user, include it in the new list
  891. chats[userID] = rooms
  892. } else if _, ok := chats[userID]; !ok && method == http.MethodPatch {
  893. // This is a ghost user, but we're not replacing the whole list, so include it too
  894. chats[userID] = rooms
  895. }
  896. }
  897. err = intent.SetAccountData(event.AccountDataDirectChats.Type, &chats)
  898. }
  899. if err != nil {
  900. user.log.Warnln("Failed to update m.direct list:", err)
  901. }
  902. }
  903. func (user *User) handleLoggedOut(onConnect bool, reason events.ConnectFailureReason) {
  904. errorCode := WAUnknownLogout
  905. if reason == events.ConnectFailureLoggedOut {
  906. errorCode = WALoggedOut
  907. } else if reason == events.ConnectFailureMainDeviceGone {
  908. errorCode = WAMainDeviceGone
  909. }
  910. user.removeFromJIDMap(bridge.State{StateEvent: bridge.StateBadCredentials, Error: errorCode})
  911. user.DeleteConnection()
  912. user.Session = nil
  913. user.JID = types.EmptyJID
  914. user.Update()
  915. if onConnect {
  916. user.sendMarkdownBridgeAlert("Connecting to WhatsApp failed as the device was unlinked (error %s). Please link the bridge to your phone again.", reason)
  917. } else {
  918. user.sendMarkdownBridgeAlert("You were logged out from another device. Please link the bridge to your phone again.")
  919. }
  920. }
  921. func (user *User) GetPortalByMessageSource(ms types.MessageSource) *Portal {
  922. jid := ms.Chat
  923. if ms.IsIncomingBroadcast() {
  924. if ms.IsFromMe {
  925. jid = ms.BroadcastListOwner.ToNonAD()
  926. } else {
  927. jid = ms.Sender.ToNonAD()
  928. }
  929. if jid.IsEmpty() {
  930. return nil
  931. }
  932. }
  933. return user.bridge.GetPortalByJID(database.NewPortalKey(jid, user.JID))
  934. }
  935. func (user *User) GetPortalByJID(jid types.JID) *Portal {
  936. return user.bridge.GetPortalByJID(database.NewPortalKey(jid, user.JID))
  937. }
  938. func (user *User) syncPuppet(jid types.JID, reason string) {
  939. user.bridge.GetPuppetByJID(jid).SyncContact(user, false, false, reason)
  940. }
  941. func (user *User) ResyncContacts() error {
  942. contacts, err := user.Client.Store.Contacts.GetAllContacts()
  943. if err != nil {
  944. return fmt.Errorf("failed to get cached contacts: %w", err)
  945. }
  946. user.log.Infofln("Resyncing displaynames with %d contacts", len(contacts))
  947. for jid, contact := range contacts {
  948. puppet := user.bridge.GetPuppetByJID(jid)
  949. if puppet != nil {
  950. puppet.Sync(user, contact)
  951. } else {
  952. user.log.Warnfln("Got a nil puppet for %s while syncing contacts", jid)
  953. }
  954. }
  955. return nil
  956. }
  957. func (user *User) ResyncGroups(createPortals bool) error {
  958. groups, err := user.Client.GetJoinedGroups()
  959. if err != nil {
  960. return fmt.Errorf("failed to get group list from server: %w", err)
  961. }
  962. for _, group := range groups {
  963. portal := user.GetPortalByJID(group.JID)
  964. if len(portal.MXID) == 0 {
  965. if createPortals {
  966. err = portal.CreateMatrixRoom(user, group, true, true)
  967. if err != nil {
  968. return fmt.Errorf("failed to create room for %s: %w", group.JID, err)
  969. }
  970. }
  971. } else {
  972. portal.UpdateMatrixRoom(user, group)
  973. }
  974. }
  975. return nil
  976. }
  977. const WATypingTimeout = 15 * time.Second
  978. func (user *User) handleChatPresence(presence *events.ChatPresence) {
  979. puppet := user.bridge.GetPuppetByJID(presence.Sender)
  980. portal := user.GetPortalByJID(presence.Chat)
  981. if puppet == nil || portal == nil || len(portal.MXID) == 0 {
  982. return
  983. }
  984. if presence.State == types.ChatPresenceComposing {
  985. if puppet.typingIn != "" && puppet.typingAt.Add(WATypingTimeout).Before(time.Now()) {
  986. if puppet.typingIn == portal.MXID {
  987. return
  988. }
  989. _, _ = puppet.IntentFor(portal).UserTyping(puppet.typingIn, false, 0)
  990. }
  991. _, _ = puppet.IntentFor(portal).UserTyping(portal.MXID, true, WATypingTimeout.Milliseconds())
  992. puppet.typingIn = portal.MXID
  993. puppet.typingAt = time.Now()
  994. } else {
  995. _, _ = puppet.IntentFor(portal).UserTyping(portal.MXID, false, 0)
  996. puppet.typingIn = ""
  997. }
  998. }
  999. func (user *User) handleReceipt(receipt *events.Receipt) {
  1000. if receipt.Type != events.ReceiptTypeRead && receipt.Type != events.ReceiptTypeReadSelf {
  1001. return
  1002. }
  1003. portal := user.GetPortalByMessageSource(receipt.MessageSource)
  1004. if portal == nil || len(portal.MXID) == 0 {
  1005. return
  1006. }
  1007. portal.messages <- PortalMessage{receipt: receipt, source: user}
  1008. }
  1009. func makeReadMarkerContent(eventID id.EventID, doublePuppet bool) CustomReadMarkers {
  1010. var extra CustomReadReceipt
  1011. if doublePuppet {
  1012. extra.DoublePuppetSource = doublePuppetValue
  1013. }
  1014. return CustomReadMarkers{
  1015. ReqSetReadMarkers: mautrix.ReqSetReadMarkers{
  1016. Read: eventID,
  1017. FullyRead: eventID,
  1018. },
  1019. ReadExtra: extra,
  1020. FullyReadExtra: extra,
  1021. }
  1022. }
  1023. func (user *User) markSelfReadFull(portal *Portal) {
  1024. puppet := user.bridge.GetPuppetByCustomMXID(user.MXID)
  1025. if puppet == nil || puppet.CustomIntent() == nil {
  1026. return
  1027. }
  1028. lastMessage := user.bridge.DB.Message.GetLastInChat(portal.Key)
  1029. if lastMessage == nil {
  1030. return
  1031. }
  1032. user.SetLastReadTS(portal.Key, lastMessage.Timestamp)
  1033. err := puppet.CustomIntent().SetReadMarkers(portal.MXID, makeReadMarkerContent(lastMessage.MXID, true))
  1034. if err != nil {
  1035. user.log.Warnfln("Failed to mark %s (last message) in %s as read: %v", lastMessage.MXID, portal.MXID, err)
  1036. } else {
  1037. user.log.Debugfln("Marked %s (last message) in %s as read", lastMessage.MXID, portal.MXID)
  1038. }
  1039. }
  1040. func (user *User) markUnread(portal *Portal, unread bool) {
  1041. puppet := user.bridge.GetPuppetByCustomMXID(user.MXID)
  1042. if puppet == nil || puppet.CustomIntent() == nil {
  1043. return
  1044. }
  1045. err := puppet.CustomIntent().SetRoomAccountData(portal.MXID, "m.marked_unread",
  1046. map[string]bool{"unread": unread})
  1047. if err != nil {
  1048. user.log.Warnfln("Failed to mark %s as unread via m.marked_unread: %v", portal.MXID, err)
  1049. } else {
  1050. user.log.Debugfln("Marked %s as unread via m.marked_unread: %v", portal.MXID, err)
  1051. }
  1052. err = puppet.CustomIntent().SetRoomAccountData(portal.MXID, "com.famedly.marked_unread",
  1053. map[string]bool{"unread": unread})
  1054. if err != nil {
  1055. user.log.Warnfln("Failed to mark %s as unread via com.famedly.marked_unread: %v", portal.MXID, err)
  1056. } else {
  1057. user.log.Debugfln("Marked %s as unread via com.famedly.marked_unread: %v", portal.MXID, err)
  1058. }
  1059. }
  1060. func (user *User) handleGroupCreate(evt *events.JoinedGroup) {
  1061. portal := user.GetPortalByJID(evt.JID)
  1062. if len(portal.MXID) == 0 {
  1063. err := portal.CreateMatrixRoom(user, &evt.GroupInfo, true, true)
  1064. if err != nil {
  1065. user.log.Errorln("Failed to create Matrix room after join notification: %v", err)
  1066. }
  1067. } else {
  1068. portal.UpdateMatrixRoom(user, &evt.GroupInfo)
  1069. }
  1070. }
  1071. func (user *User) handleGroupUpdate(evt *events.GroupInfo) {
  1072. portal := user.GetPortalByJID(evt.JID)
  1073. if portal == nil || len(portal.MXID) == 0 {
  1074. user.log.Debugfln("Ignoring group info update in chat with no portal: %+v", evt)
  1075. return
  1076. }
  1077. switch {
  1078. case evt.Announce != nil:
  1079. portal.RestrictMessageSending(evt.Announce.IsAnnounce)
  1080. case evt.Locked != nil:
  1081. portal.RestrictMetadataChanges(evt.Locked.IsLocked)
  1082. case evt.Name != nil:
  1083. portal.UpdateName(evt.Name.Name, evt.Name.NameSetBy, true)
  1084. case evt.Topic != nil:
  1085. portal.UpdateTopic(evt.Topic.Topic, evt.Topic.TopicSetBy, true)
  1086. case evt.Leave != nil:
  1087. if evt.Sender != nil && !evt.Sender.IsEmpty() {
  1088. portal.HandleWhatsAppKick(user, *evt.Sender, evt.Leave)
  1089. }
  1090. case evt.Join != nil:
  1091. portal.HandleWhatsAppInvite(user, evt.Sender, evt.Join)
  1092. case evt.Promote != nil:
  1093. portal.ChangeAdminStatus(evt.Promote, true)
  1094. case evt.Demote != nil:
  1095. portal.ChangeAdminStatus(evt.Demote, false)
  1096. case evt.Ephemeral != nil:
  1097. portal.UpdateGroupDisappearingMessages(evt.Sender, evt.Timestamp, evt.Ephemeral.DisappearingTimer)
  1098. }
  1099. }
  1100. func (user *User) handlePictureUpdate(evt *events.Picture) {
  1101. if evt.JID.Server == types.DefaultUserServer {
  1102. puppet := user.bridge.GetPuppetByJID(evt.JID)
  1103. user.log.Debugfln("Received picture update for puppet %s (current: %s, new: %s)", evt.JID, puppet.Avatar, evt.PictureID)
  1104. if puppet.Avatar != evt.PictureID {
  1105. puppet.UpdateAvatar(user)
  1106. }
  1107. } else if portal := user.GetPortalByJID(evt.JID); portal != nil {
  1108. user.log.Debugfln("Received picture update for portal %s (current: %s, new: %s)", evt.JID, portal.Avatar, evt.PictureID)
  1109. if portal.Avatar != evt.PictureID {
  1110. portal.UpdateAvatar(user, evt.Author, true)
  1111. }
  1112. }
  1113. }
  1114. func (user *User) StartPM(jid types.JID, reason string) (*Portal, *Puppet, bool, error) {
  1115. user.log.Debugln("Starting PM with", jid, "from", reason)
  1116. puppet := user.bridge.GetPuppetByJID(jid)
  1117. puppet.SyncContact(user, true, false, reason)
  1118. portal := user.GetPortalByJID(puppet.JID)
  1119. if len(portal.MXID) > 0 {
  1120. ok := portal.ensureUserInvited(user)
  1121. if !ok {
  1122. portal.log.Warnfln("ensureUserInvited(%s) returned false, creating new portal", user.MXID)
  1123. portal.MXID = ""
  1124. } else {
  1125. return portal, puppet, false, nil
  1126. }
  1127. }
  1128. err := portal.CreateMatrixRoom(user, nil, false, true)
  1129. return portal, puppet, true, err
  1130. }
  1131. const groupListCacheMaxAge = 24 * time.Hour
  1132. func (user *User) getCachedGroupList() ([]*types.GroupInfo, error) {
  1133. user.groupListCacheLock.Lock()
  1134. defer user.groupListCacheLock.Unlock()
  1135. if user.groupListCache != nil && user.groupListCacheTime.Add(groupListCacheMaxAge).After(time.Now()) {
  1136. return user.groupListCache, nil
  1137. }
  1138. var err error
  1139. user.groupListCache, err = user.Client.GetJoinedGroups()
  1140. user.groupListCacheTime = time.Now()
  1141. return user.groupListCache, err
  1142. }