user.go 41 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241
  1. // mautrix-whatsapp - A Matrix-WhatsApp puppeting bridge.
  2. // Copyright (C) 2022 Tulir Asokan
  3. //
  4. // This program is free software: you can redistribute it and/or modify
  5. // it under the terms of the GNU Affero General Public License as published by
  6. // the Free Software Foundation, either version 3 of the License, or
  7. // (at your option) any later version.
  8. //
  9. // This program is distributed in the hope that it will be useful,
  10. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. // GNU Affero General Public License for more details.
  13. //
  14. // You should have received a copy of the GNU Affero General Public License
  15. // along with this program. If not, see <https://www.gnu.org/licenses/>.
  16. package main
  17. import (
  18. "context"
  19. "crypto/hmac"
  20. "crypto/sha256"
  21. "encoding/binary"
  22. "encoding/json"
  23. "errors"
  24. "fmt"
  25. "math"
  26. "net/http"
  27. "strconv"
  28. "strings"
  29. "sync"
  30. "time"
  31. log "maunium.net/go/maulogger/v2"
  32. "maunium.net/go/mautrix"
  33. "maunium.net/go/mautrix/appservice"
  34. "maunium.net/go/mautrix/bridge"
  35. "maunium.net/go/mautrix/event"
  36. "maunium.net/go/mautrix/format"
  37. "maunium.net/go/mautrix/id"
  38. "maunium.net/go/mautrix/pushrules"
  39. "go.mau.fi/whatsmeow"
  40. "go.mau.fi/whatsmeow/appstate"
  41. waProto "go.mau.fi/whatsmeow/binary/proto"
  42. "go.mau.fi/whatsmeow/store"
  43. "go.mau.fi/whatsmeow/types"
  44. "go.mau.fi/whatsmeow/types/events"
  45. waLog "go.mau.fi/whatsmeow/util/log"
  46. "maunium.net/go/mautrix-whatsapp/database"
  47. )
  48. type User struct {
  49. *database.User
  50. Client *whatsmeow.Client
  51. Session *store.Device
  52. bridge *WABridge
  53. log log.Logger
  54. Admin bool
  55. Whitelisted bool
  56. RelayWhitelisted bool
  57. PermissionLevel bridge.PermissionLevel
  58. mgmtCreateLock sync.Mutex
  59. spaceCreateLock sync.Mutex
  60. connLock sync.Mutex
  61. historySyncs chan *events.HistorySync
  62. prevBridgeStatus *BridgeState
  63. lastPresence types.Presence
  64. historySyncLoopsStarted bool
  65. spaceMembershipChecked bool
  66. lastPhoneOfflineWarning time.Time
  67. groupListCache []*types.GroupInfo
  68. groupListCacheLock sync.Mutex
  69. groupListCacheTime time.Time
  70. bridgeStateQueue chan BridgeState
  71. BackfillQueue *BackfillQueue
  72. }
  73. func (br *WABridge) getUserByMXID(userID id.UserID, onlyIfExists bool) *User {
  74. _, isPuppet := br.ParsePuppetMXID(userID)
  75. if isPuppet || userID == br.Bot.UserID {
  76. return nil
  77. }
  78. br.usersLock.Lock()
  79. defer br.usersLock.Unlock()
  80. user, ok := br.usersByMXID[userID]
  81. if !ok {
  82. userIDPtr := &userID
  83. if onlyIfExists {
  84. userIDPtr = nil
  85. }
  86. return br.loadDBUser(br.DB.User.GetByMXID(userID), userIDPtr)
  87. }
  88. return user
  89. }
  90. func (br *WABridge) GetUserByMXID(userID id.UserID) *User {
  91. return br.getUserByMXID(userID, false)
  92. }
  93. func (br *WABridge) GetIUser(userID id.UserID, create bool) bridge.User {
  94. u := br.getUserByMXID(userID, !create)
  95. if u == nil {
  96. return nil
  97. }
  98. return u
  99. }
  100. func (user *User) GetPermissionLevel() bridge.PermissionLevel {
  101. return user.PermissionLevel
  102. }
  103. func (user *User) GetManagementRoomID() id.RoomID {
  104. return user.ManagementRoom
  105. }
  106. func (user *User) GetMXID() id.UserID {
  107. return user.MXID
  108. }
  109. func (user *User) GetCommandState() map[string]interface{} {
  110. return nil
  111. }
  112. func (br *WABridge) GetUserByMXIDIfExists(userID id.UserID) *User {
  113. return br.getUserByMXID(userID, true)
  114. }
  115. func (br *WABridge) GetUserByJID(jid types.JID) *User {
  116. br.usersLock.Lock()
  117. defer br.usersLock.Unlock()
  118. user, ok := br.usersByUsername[jid.User]
  119. if !ok {
  120. return br.loadDBUser(br.DB.User.GetByUsername(jid.User), nil)
  121. }
  122. return user
  123. }
  124. func (user *User) addToJIDMap() {
  125. user.bridge.usersLock.Lock()
  126. user.bridge.usersByUsername[user.JID.User] = user
  127. user.bridge.usersLock.Unlock()
  128. }
  129. func (user *User) removeFromJIDMap(state BridgeState) {
  130. user.bridge.usersLock.Lock()
  131. jidUser, ok := user.bridge.usersByUsername[user.JID.User]
  132. if ok && user == jidUser {
  133. delete(user.bridge.usersByUsername, user.JID.User)
  134. }
  135. user.bridge.usersLock.Unlock()
  136. user.bridge.Metrics.TrackLoginState(user.JID, false)
  137. user.sendBridgeState(state)
  138. }
  139. func (br *WABridge) GetAllUsers() []*User {
  140. br.usersLock.Lock()
  141. defer br.usersLock.Unlock()
  142. dbUsers := br.DB.User.GetAll()
  143. output := make([]*User, len(dbUsers))
  144. for index, dbUser := range dbUsers {
  145. user, ok := br.usersByMXID[dbUser.MXID]
  146. if !ok {
  147. user = br.loadDBUser(dbUser, nil)
  148. }
  149. output[index] = user
  150. }
  151. return output
  152. }
  153. func (br *WABridge) loadDBUser(dbUser *database.User, mxid *id.UserID) *User {
  154. if dbUser == nil {
  155. if mxid == nil {
  156. return nil
  157. }
  158. dbUser = br.DB.User.New()
  159. dbUser.MXID = *mxid
  160. dbUser.Insert()
  161. }
  162. user := br.NewUser(dbUser)
  163. br.usersByMXID[user.MXID] = user
  164. if !user.JID.IsEmpty() {
  165. var err error
  166. user.Session, err = br.WAContainer.GetDevice(user.JID)
  167. if err != nil {
  168. user.log.Errorfln("Failed to load user's whatsapp session: %v", err)
  169. } else if user.Session == nil {
  170. user.log.Warnfln("Didn't find session data for %s, treating user as logged out", user.JID)
  171. user.JID = types.EmptyJID
  172. user.Update()
  173. } else {
  174. user.Session.Log = &waLogger{user.log.Sub("Session")}
  175. br.usersByUsername[user.JID.User] = user
  176. }
  177. }
  178. if len(user.ManagementRoom) > 0 {
  179. br.managementRooms[user.ManagementRoom] = user
  180. }
  181. return user
  182. }
  183. func (br *WABridge) NewUser(dbUser *database.User) *User {
  184. user := &User{
  185. User: dbUser,
  186. bridge: br,
  187. log: br.Log.Sub("User").Sub(string(dbUser.MXID)),
  188. historySyncs: make(chan *events.HistorySync, 32),
  189. lastPresence: types.PresenceUnavailable,
  190. }
  191. user.RelayWhitelisted = user.bridge.Config.Bridge.Permissions.IsRelayWhitelisted(user.MXID)
  192. user.Whitelisted = user.bridge.Config.Bridge.Permissions.IsWhitelisted(user.MXID)
  193. user.Admin = user.bridge.Config.Bridge.Permissions.IsAdmin(user.MXID)
  194. user.PermissionLevel = bridge.PermissionLevel(user.bridge.Config.Bridge.Permissions.GetPermissionLevel(user.MXID))
  195. if len(user.bridge.Config.Homeserver.StatusEndpoint) > 0 {
  196. user.bridgeStateQueue = make(chan BridgeState, 10)
  197. go user.bridgeStateLoop()
  198. }
  199. return user
  200. }
  201. func (user *User) ensureInvited(intent *appservice.IntentAPI, roomID id.RoomID, isDirect bool) (ok bool) {
  202. inviteContent := event.Content{
  203. Parsed: &event.MemberEventContent{
  204. Membership: event.MembershipInvite,
  205. IsDirect: isDirect,
  206. },
  207. Raw: map[string]interface{}{},
  208. }
  209. customPuppet := user.bridge.GetPuppetByCustomMXID(user.MXID)
  210. if customPuppet != nil && customPuppet.CustomIntent() != nil {
  211. inviteContent.Raw["fi.mau.will_auto_accept"] = true
  212. }
  213. _, err := intent.SendStateEvent(roomID, event.StateMember, user.MXID.String(), &inviteContent)
  214. var httpErr mautrix.HTTPError
  215. if err != nil && errors.As(err, &httpErr) && httpErr.RespError != nil && strings.Contains(httpErr.RespError.Err, "is already in the room") {
  216. user.bridge.StateStore.SetMembership(roomID, user.MXID, event.MembershipJoin)
  217. ok = true
  218. return
  219. } else if err != nil {
  220. user.log.Warnfln("Failed to invite user to %s: %v", roomID, err)
  221. } else {
  222. ok = true
  223. }
  224. if customPuppet != nil && customPuppet.CustomIntent() != nil {
  225. err = customPuppet.CustomIntent().EnsureJoined(roomID, appservice.EnsureJoinedParams{IgnoreCache: true})
  226. if err != nil {
  227. user.log.Warnfln("Failed to auto-join %s: %v", roomID, err)
  228. ok = false
  229. } else {
  230. ok = true
  231. }
  232. }
  233. return
  234. }
  235. func (user *User) GetSpaceRoom() id.RoomID {
  236. if !user.bridge.Config.Bridge.PersonalFilteringSpaces {
  237. return ""
  238. }
  239. if len(user.SpaceRoom) == 0 {
  240. user.spaceCreateLock.Lock()
  241. defer user.spaceCreateLock.Unlock()
  242. if len(user.SpaceRoom) > 0 {
  243. return user.SpaceRoom
  244. }
  245. resp, err := user.bridge.Bot.CreateRoom(&mautrix.ReqCreateRoom{
  246. Visibility: "private",
  247. Name: "WhatsApp",
  248. Topic: "Your WhatsApp bridged chats",
  249. InitialState: []*event.Event{{
  250. Type: event.StateRoomAvatar,
  251. Content: event.Content{
  252. Parsed: &event.RoomAvatarEventContent{
  253. URL: user.bridge.Config.AppService.Bot.ParsedAvatar,
  254. },
  255. },
  256. }},
  257. CreationContent: map[string]interface{}{
  258. "type": event.RoomTypeSpace,
  259. },
  260. PowerLevelOverride: &event.PowerLevelsEventContent{
  261. Users: map[id.UserID]int{
  262. user.bridge.Bot.UserID: 9001,
  263. user.MXID: 50,
  264. },
  265. },
  266. })
  267. if err != nil {
  268. user.log.Errorln("Failed to auto-create space room:", err)
  269. } else {
  270. user.SpaceRoom = resp.RoomID
  271. user.Update()
  272. user.ensureInvited(user.bridge.Bot, user.SpaceRoom, false)
  273. }
  274. } else if !user.spaceMembershipChecked && !user.bridge.StateStore.IsInRoom(user.SpaceRoom, user.MXID) {
  275. user.ensureInvited(user.bridge.Bot, user.SpaceRoom, false)
  276. }
  277. user.spaceMembershipChecked = true
  278. return user.SpaceRoom
  279. }
  280. func (user *User) GetManagementRoom() id.RoomID {
  281. if len(user.ManagementRoom) == 0 {
  282. user.mgmtCreateLock.Lock()
  283. defer user.mgmtCreateLock.Unlock()
  284. if len(user.ManagementRoom) > 0 {
  285. return user.ManagementRoom
  286. }
  287. creationContent := make(map[string]interface{})
  288. if !user.bridge.Config.Bridge.FederateRooms {
  289. creationContent["m.federate"] = false
  290. }
  291. resp, err := user.bridge.Bot.CreateRoom(&mautrix.ReqCreateRoom{
  292. Topic: "WhatsApp bridge notices",
  293. IsDirect: true,
  294. CreationContent: creationContent,
  295. })
  296. if err != nil {
  297. user.log.Errorln("Failed to auto-create management room:", err)
  298. } else {
  299. user.SetManagementRoom(resp.RoomID)
  300. }
  301. }
  302. return user.ManagementRoom
  303. }
  304. func (user *User) SetManagementRoom(roomID id.RoomID) {
  305. existingUser, ok := user.bridge.managementRooms[roomID]
  306. if ok {
  307. existingUser.ManagementRoom = ""
  308. existingUser.Update()
  309. }
  310. user.ManagementRoom = roomID
  311. user.bridge.managementRooms[user.ManagementRoom] = user
  312. user.Update()
  313. }
  314. type waLogger struct{ l log.Logger }
  315. func (w *waLogger) Debugf(msg string, args ...interface{}) { w.l.Debugfln(msg, args...) }
  316. func (w *waLogger) Infof(msg string, args ...interface{}) { w.l.Infofln(msg, args...) }
  317. func (w *waLogger) Warnf(msg string, args ...interface{}) { w.l.Warnfln(msg, args...) }
  318. func (w *waLogger) Errorf(msg string, args ...interface{}) { w.l.Errorfln(msg, args...) }
  319. func (w *waLogger) Sub(module string) waLog.Logger { return &waLogger{l: w.l.Sub(module)} }
  320. var ErrAlreadyLoggedIn = errors.New("already logged in")
  321. func (user *User) obfuscateJID(jid types.JID) string {
  322. // Turn the first 4 bytes of HMAC-SHA256(hs_token, phone) into a number and replace the middle of the actual phone with that deterministic random number.
  323. randomNumber := binary.BigEndian.Uint32(hmac.New(sha256.New, []byte(user.bridge.Config.AppService.HSToken)).Sum([]byte(jid.User))[:4])
  324. return fmt.Sprintf("+%s-%d-%s:%d", jid.User[:1], randomNumber, jid.User[len(jid.User)-2:], jid.Device)
  325. }
  326. func (user *User) createClient(sess *store.Device) {
  327. user.Client = whatsmeow.NewClient(sess, &waLogger{user.log.Sub("Client")})
  328. user.Client.AddEventHandler(user.HandleEvent)
  329. user.Client.SetForceActiveDeliveryReceipts(user.bridge.Config.Bridge.ForceActiveDeliveryReceipts)
  330. user.Client.GetMessageForRetry = func(requester, to types.JID, id types.MessageID) *waProto.Message {
  331. Segment.Track(user.MXID, "WhatsApp incoming retry (message not found)", map[string]interface{}{
  332. "requester": user.obfuscateJID(requester),
  333. "messageID": id,
  334. })
  335. user.bridge.Metrics.TrackRetryReceipt(0, false)
  336. return nil
  337. }
  338. user.Client.PreRetryCallback = func(receipt *events.Receipt, messageID types.MessageID, retryCount int, msg *waProto.Message) bool {
  339. Segment.Track(user.MXID, "WhatsApp incoming retry (accepted)", map[string]interface{}{
  340. "requester": user.obfuscateJID(receipt.Sender),
  341. "messageID": messageID,
  342. "retryCount": retryCount,
  343. })
  344. user.bridge.Metrics.TrackRetryReceipt(retryCount, true)
  345. return true
  346. }
  347. }
  348. func (user *User) Login(ctx context.Context) (<-chan whatsmeow.QRChannelItem, error) {
  349. user.connLock.Lock()
  350. defer user.connLock.Unlock()
  351. if user.Session != nil {
  352. return nil, ErrAlreadyLoggedIn
  353. } else if user.Client != nil {
  354. user.unlockedDeleteConnection()
  355. }
  356. newSession := user.bridge.WAContainer.NewDevice()
  357. newSession.Log = &waLogger{user.log.Sub("Session")}
  358. user.createClient(newSession)
  359. qrChan, err := user.Client.GetQRChannel(ctx)
  360. if err != nil {
  361. return nil, fmt.Errorf("failed to get QR channel: %w", err)
  362. }
  363. err = user.Client.Connect()
  364. if err != nil {
  365. return nil, fmt.Errorf("failed to connect to WhatsApp: %w", err)
  366. }
  367. return qrChan, nil
  368. }
  369. func (user *User) Connect() bool {
  370. user.connLock.Lock()
  371. defer user.connLock.Unlock()
  372. if user.Client != nil {
  373. return user.Client.IsConnected()
  374. } else if user.Session == nil {
  375. return false
  376. }
  377. user.log.Debugln("Connecting to WhatsApp")
  378. user.sendBridgeState(BridgeState{StateEvent: StateConnecting, Error: WAConnecting})
  379. user.createClient(user.Session)
  380. err := user.Client.Connect()
  381. if err != nil {
  382. user.log.Warnln("Error connecting to WhatsApp:", err)
  383. user.sendBridgeState(BridgeState{
  384. StateEvent: StateUnknownError,
  385. Error: WAConnectionFailed,
  386. Info: map[string]interface{}{
  387. "go_error": err.Error(),
  388. },
  389. })
  390. return false
  391. }
  392. return true
  393. }
  394. func (user *User) unlockedDeleteConnection() {
  395. if user.Client == nil {
  396. return
  397. }
  398. user.Client.Disconnect()
  399. user.Client.RemoveEventHandlers()
  400. user.Client = nil
  401. user.bridge.Metrics.TrackConnectionState(user.JID, false)
  402. }
  403. func (user *User) DeleteConnection() {
  404. user.connLock.Lock()
  405. defer user.connLock.Unlock()
  406. user.unlockedDeleteConnection()
  407. }
  408. func (user *User) HasSession() bool {
  409. return user.Session != nil
  410. }
  411. func (user *User) DeleteSession() {
  412. if user.Session != nil {
  413. err := user.Session.Delete()
  414. if err != nil {
  415. user.log.Warnln("Failed to delete session:", err)
  416. }
  417. user.Session = nil
  418. }
  419. if !user.JID.IsEmpty() {
  420. user.JID = types.EmptyJID
  421. user.Update()
  422. }
  423. // Delete all of the backfill and history sync data.
  424. user.bridge.DB.Backfill.DeleteAll(user.MXID)
  425. user.bridge.DB.HistorySync.DeleteAllConversations(user.MXID)
  426. user.bridge.DB.HistorySync.DeleteAllMessages(user.MXID)
  427. user.bridge.DB.MediaBackfillRequest.DeleteAllMediaBackfillRequests(user.MXID)
  428. }
  429. func (user *User) IsConnected() bool {
  430. return user.Client != nil && user.Client.IsConnected()
  431. }
  432. func (user *User) IsLoggedIn() bool {
  433. return user.IsConnected() && user.Client.IsLoggedIn()
  434. }
  435. func (user *User) tryAutomaticDoublePuppeting() {
  436. if !user.bridge.Config.CanAutoDoublePuppet(user.MXID) {
  437. return
  438. }
  439. user.log.Debugln("Checking if double puppeting needs to be enabled")
  440. puppet := user.bridge.GetPuppetByJID(user.JID)
  441. if len(puppet.CustomMXID) > 0 {
  442. user.log.Debugln("User already has double-puppeting enabled")
  443. // Custom puppet already enabled
  444. return
  445. }
  446. accessToken, err := puppet.loginWithSharedSecret(user.MXID)
  447. if err != nil {
  448. user.log.Warnln("Failed to login with shared secret:", err)
  449. return
  450. }
  451. err = puppet.SwitchCustomMXID(accessToken, user.MXID)
  452. if err != nil {
  453. puppet.log.Warnln("Failed to switch to auto-logined custom puppet:", err)
  454. return
  455. }
  456. user.log.Infoln("Successfully automatically enabled custom puppet")
  457. }
  458. func (user *User) sendMarkdownBridgeAlert(formatString string, args ...interface{}) {
  459. if user.bridge.Config.Bridge.DisableBridgeAlerts {
  460. return
  461. }
  462. notice := fmt.Sprintf(formatString, args...)
  463. content := format.RenderMarkdown(notice, true, false)
  464. _, err := user.bridge.Bot.SendMessageEvent(user.GetManagementRoom(), event.EventMessage, content)
  465. if err != nil {
  466. user.log.Warnf("Failed to send bridge alert \"%s\": %v", notice, err)
  467. }
  468. }
  469. const callEventMaxAge = 15 * time.Minute
  470. func (user *User) handleCallStart(sender types.JID, id, callType string, ts time.Time) {
  471. if !user.bridge.Config.Bridge.CallStartNotices || ts.Add(callEventMaxAge).Before(time.Now()) {
  472. return
  473. }
  474. portal := user.GetPortalByJID(sender)
  475. text := "Incoming call"
  476. if callType != "" {
  477. text = fmt.Sprintf("Incoming %s call", callType)
  478. }
  479. portal.messages <- PortalMessage{
  480. fake: &fakeMessage{
  481. Sender: sender,
  482. Text: text,
  483. ID: id,
  484. Time: ts,
  485. Important: true,
  486. },
  487. source: user,
  488. }
  489. }
  490. const PhoneDisconnectWarningTime = 12 * 24 * time.Hour // 12 days
  491. const PhoneDisconnectPingTime = 10 * 24 * time.Hour
  492. const PhoneMinPingInterval = 24 * time.Hour
  493. func (user *User) sendHackyPhonePing() {
  494. user.PhoneLastPinged = time.Now()
  495. msgID := whatsmeow.GenerateMessageID()
  496. keyIDs := make([]*waProto.AppStateSyncKeyId, 0, 1)
  497. lastKeyID, err := user.GetLastAppStateKeyID()
  498. if lastKeyID != nil {
  499. keyIDs = append(keyIDs, &waProto.AppStateSyncKeyId{
  500. KeyId: lastKeyID,
  501. })
  502. } else {
  503. user.log.Warnfln("Failed to get last app state key ID to send hacky phone ping: %v - sending empty request", err)
  504. }
  505. ts, err := user.Client.SendMessage(user.JID.ToNonAD(), msgID, &waProto.Message{
  506. ProtocolMessage: &waProto.ProtocolMessage{
  507. Type: waProto.ProtocolMessage_APP_STATE_SYNC_KEY_REQUEST.Enum(),
  508. AppStateSyncKeyRequest: &waProto.AppStateSyncKeyRequest{
  509. KeyIds: keyIDs,
  510. },
  511. },
  512. })
  513. if err != nil {
  514. user.log.Warnfln("Failed to send hacky phone ping: %v", err)
  515. } else {
  516. user.log.Debugfln("Sent hacky phone ping %s/%s because phone has been offline for >10 days", msgID, ts.Unix())
  517. user.PhoneLastPinged = ts
  518. user.Update()
  519. }
  520. }
  521. func (user *User) PhoneRecentlySeen(doPing bool) bool {
  522. if doPing && !user.PhoneLastSeen.IsZero() && user.PhoneLastSeen.Add(PhoneDisconnectPingTime).Before(time.Now()) && user.PhoneLastPinged.Add(PhoneMinPingInterval).Before(time.Now()) {
  523. // Over 10 days since the phone was seen and over a day since the last somewhat hacky ping, send a new ping.
  524. go user.sendHackyPhonePing()
  525. }
  526. return user.PhoneLastSeen.IsZero() || user.PhoneLastSeen.Add(PhoneDisconnectWarningTime).After(time.Now())
  527. }
  528. // phoneSeen records a timestamp when the user's main device was seen online.
  529. // The stored timestamp can later be used to warn the user if the main device is offline for too long.
  530. func (user *User) phoneSeen(ts time.Time) {
  531. if user.PhoneLastSeen.Add(1 * time.Hour).After(ts) {
  532. // The last seen timestamp isn't going to be perfectly accurate in any case,
  533. // so don't spam the database with an update every time there's an event.
  534. return
  535. } else if !user.PhoneRecentlySeen(false) {
  536. if user.GetPrevBridgeState().Error == WAPhoneOffline && user.IsConnected() {
  537. user.log.Debugfln("Saw phone after current bridge state said it has been offline, switching state back to connected")
  538. go user.sendBridgeState(BridgeState{StateEvent: StateConnected})
  539. } else {
  540. user.log.Debugfln("Saw phone after current bridge state said it has been offline, not sending new bridge state (prev: %s, connected: %t)", user.GetPrevBridgeState().Error, user.IsConnected())
  541. }
  542. }
  543. user.PhoneLastSeen = ts
  544. go user.Update()
  545. }
  546. func formatDisconnectTime(dur time.Duration) string {
  547. days := int(math.Floor(dur.Hours() / 24))
  548. hours := int(dur.Hours()) % 24
  549. if hours == 0 {
  550. return fmt.Sprintf("%d days", days)
  551. } else if hours == 1 {
  552. return fmt.Sprintf("%d days and 1 hour", days)
  553. } else {
  554. return fmt.Sprintf("%d days and %d hours", days, hours)
  555. }
  556. }
  557. func (user *User) sendPhoneOfflineWarning() {
  558. if user.lastPhoneOfflineWarning.Add(12 * time.Hour).After(time.Now()) {
  559. // Don't spam the warning too much
  560. return
  561. }
  562. user.lastPhoneOfflineWarning = time.Now()
  563. timeSinceSeen := time.Now().Sub(user.PhoneLastSeen)
  564. user.sendMarkdownBridgeAlert("Your phone hasn't been seen in %s. The server will force the bridge to log out if the phone is not active at least every 2 weeks.", formatDisconnectTime(timeSinceSeen))
  565. }
  566. func (user *User) HandleEvent(event interface{}) {
  567. switch v := event.(type) {
  568. case *events.LoggedOut:
  569. go user.handleLoggedOut(v.OnConnect, v.Reason)
  570. case *events.Connected:
  571. user.bridge.Metrics.TrackConnectionState(user.JID, true)
  572. user.bridge.Metrics.TrackLoginState(user.JID, true)
  573. if len(user.Client.Store.PushName) > 0 {
  574. go func() {
  575. err := user.Client.SendPresence(user.lastPresence)
  576. if err != nil {
  577. user.log.Warnln("Failed to send initial presence:", err)
  578. }
  579. }()
  580. }
  581. go user.tryAutomaticDoublePuppeting()
  582. if user.bridge.Config.Bridge.HistorySync.Backfill && !user.historySyncLoopsStarted {
  583. go user.handleHistorySyncsLoop()
  584. user.historySyncLoopsStarted = true
  585. }
  586. case *events.OfflineSyncPreview:
  587. user.log.Infofln("Server says it's going to send %d messages and %d receipts that were missed during downtime", v.Messages, v.Receipts)
  588. go user.sendBridgeState(BridgeState{
  589. StateEvent: StateBackfilling,
  590. Message: fmt.Sprintf("backfilling %d messages and %d receipts", v.Messages, v.Receipts),
  591. })
  592. case *events.OfflineSyncCompleted:
  593. if !user.PhoneRecentlySeen(true) {
  594. user.log.Infofln("Offline sync completed, but phone last seen date is still %s - sending phone offline bridge status", user.PhoneLastSeen)
  595. go user.sendBridgeState(BridgeState{StateEvent: StateTransientDisconnect, Error: WAPhoneOffline})
  596. } else {
  597. if user.GetPrevBridgeState().StateEvent == StateBackfilling {
  598. user.log.Infoln("Offline sync completed")
  599. }
  600. go user.sendBridgeState(BridgeState{StateEvent: StateConnected})
  601. }
  602. case *events.AppStateSyncComplete:
  603. if len(user.Client.Store.PushName) > 0 && v.Name == appstate.WAPatchCriticalBlock {
  604. err := user.Client.SendPresence(user.lastPresence)
  605. if err != nil {
  606. user.log.Warnln("Failed to send presence after app state sync:", err)
  607. }
  608. } else if v.Name == appstate.WAPatchCriticalUnblockLow {
  609. go func() {
  610. err := user.ResyncContacts()
  611. if err != nil {
  612. user.log.Errorln("Failed to resync puppets: %v", err)
  613. }
  614. }()
  615. }
  616. case *events.PushNameSetting:
  617. // Send presence available when connecting and when the pushname is changed.
  618. // This makes sure that outgoing messages always have the right pushname.
  619. err := user.Client.SendPresence(user.lastPresence)
  620. if err != nil {
  621. user.log.Warnln("Failed to send presence after push name update:", err)
  622. }
  623. case *events.PairSuccess:
  624. user.PhoneLastSeen = time.Now()
  625. user.Session = user.Client.Store
  626. user.JID = v.ID
  627. user.addToJIDMap()
  628. user.Update()
  629. case *events.StreamError:
  630. var message string
  631. if v.Code != "" {
  632. message = fmt.Sprintf("Unknown stream error with code %s", v.Code)
  633. } else if children := v.Raw.GetChildren(); len(children) > 0 {
  634. message = fmt.Sprintf("Unknown stream error (contains %s node)", children[0].Tag)
  635. } else {
  636. message = "Unknown stream error"
  637. }
  638. go user.sendBridgeState(BridgeState{StateEvent: StateUnknownError, Message: message})
  639. user.bridge.Metrics.TrackConnectionState(user.JID, false)
  640. case *events.ConnectFailure:
  641. go user.sendBridgeState(BridgeState{StateEvent: StateUnknownError, Message: fmt.Sprintf("Unknown connection failure: %s", v.Reason)})
  642. user.bridge.Metrics.TrackConnectionState(user.JID, false)
  643. case *events.ClientOutdated:
  644. user.log.Errorfln("Got a client outdated connect failure. The bridge is likely out of date, please update immediately.")
  645. go user.sendBridgeState(BridgeState{StateEvent: StateUnknownError, Message: "Connect failure: 405 client outdated"})
  646. user.bridge.Metrics.TrackConnectionState(user.JID, false)
  647. case *events.TemporaryBan:
  648. go user.sendBridgeState(BridgeState{StateEvent: StateBadCredentials, Message: v.String()})
  649. user.bridge.Metrics.TrackConnectionState(user.JID, false)
  650. case *events.Disconnected:
  651. // Don't send the normal transient disconnect state if we're already in a different transient disconnect state.
  652. // TODO remove this if/when the phone offline state is moved to a sub-state of CONNECTED
  653. if user.GetPrevBridgeState().Error != WAPhoneOffline && user.PhoneRecentlySeen(false) {
  654. go user.sendBridgeState(BridgeState{StateEvent: StateTransientDisconnect, Message: "Disconnected from WhatsApp. Trying to reconnect."})
  655. }
  656. user.bridge.Metrics.TrackConnectionState(user.JID, false)
  657. case *events.Contact:
  658. go user.syncPuppet(v.JID, "contact event")
  659. case *events.PushName:
  660. go user.syncPuppet(v.JID, "push name event")
  661. case *events.GroupInfo:
  662. user.groupListCache = nil
  663. go user.handleGroupUpdate(v)
  664. case *events.JoinedGroup:
  665. user.groupListCache = nil
  666. go user.handleGroupCreate(v)
  667. case *events.Picture:
  668. go user.handlePictureUpdate(v)
  669. case *events.Receipt:
  670. if v.IsFromMe && v.Sender.Device == 0 {
  671. user.phoneSeen(v.Timestamp)
  672. }
  673. go user.handleReceipt(v)
  674. case *events.ChatPresence:
  675. go user.handleChatPresence(v)
  676. case *events.Message:
  677. portal := user.GetPortalByMessageSource(v.Info.MessageSource)
  678. portal.messages <- PortalMessage{evt: v, source: user}
  679. case *events.MediaRetry:
  680. user.phoneSeen(v.Timestamp)
  681. portal := user.GetPortalByJID(v.ChatID)
  682. portal.mediaRetries <- PortalMediaRetry{evt: v, source: user}
  683. case *events.CallOffer:
  684. user.handleCallStart(v.CallCreator, v.CallID, "", v.Timestamp)
  685. case *events.CallOfferNotice:
  686. user.handleCallStart(v.CallCreator, v.CallID, v.Type, v.Timestamp)
  687. case *events.IdentityChange:
  688. puppet := user.bridge.GetPuppetByJID(v.JID)
  689. portal := user.GetPortalByJID(v.JID)
  690. if len(portal.MXID) > 0 && user.bridge.Config.Bridge.IdentityChangeNotices {
  691. text := fmt.Sprintf("Your security code with %s changed.", puppet.Displayname)
  692. if v.Implicit {
  693. text = fmt.Sprintf("Your security code with %s (device #%d) changed.", puppet.Displayname, v.JID.Device)
  694. }
  695. portal.messages <- PortalMessage{
  696. fake: &fakeMessage{
  697. Sender: v.JID,
  698. Text: text,
  699. ID: strconv.FormatInt(v.Timestamp.Unix(), 10),
  700. Time: v.Timestamp,
  701. Important: false,
  702. },
  703. source: user,
  704. }
  705. }
  706. case *events.CallTerminate, *events.CallRelayLatency, *events.CallAccept, *events.UnknownCallEvent:
  707. // ignore
  708. case *events.UndecryptableMessage:
  709. portal := user.GetPortalByMessageSource(v.Info.MessageSource)
  710. portal.messages <- PortalMessage{undecryptable: v, source: user}
  711. case *events.HistorySync:
  712. if user.bridge.Config.Bridge.HistorySync.Backfill {
  713. user.historySyncs <- v
  714. }
  715. case *events.Mute:
  716. portal := user.GetPortalByJID(v.JID)
  717. if portal != nil {
  718. var mutedUntil time.Time
  719. if v.Action.GetMuted() {
  720. mutedUntil = time.Unix(v.Action.GetMuteEndTimestamp(), 0)
  721. }
  722. go user.updateChatMute(nil, portal, mutedUntil)
  723. }
  724. case *events.Archive:
  725. portal := user.GetPortalByJID(v.JID)
  726. if portal != nil {
  727. go user.updateChatTag(nil, portal, user.bridge.Config.Bridge.ArchiveTag, v.Action.GetArchived())
  728. }
  729. case *events.Pin:
  730. portal := user.GetPortalByJID(v.JID)
  731. if portal != nil {
  732. go user.updateChatTag(nil, portal, user.bridge.Config.Bridge.PinnedTag, v.Action.GetPinned())
  733. }
  734. case *events.AppState:
  735. // Ignore
  736. case *events.KeepAliveTimeout:
  737. go user.sendBridgeState(BridgeState{StateEvent: StateTransientDisconnect, Error: WAKeepaliveTimeout})
  738. case *events.KeepAliveRestored:
  739. user.log.Infof("Keepalive restored after timeouts, sending connected event")
  740. go user.sendBridgeState(BridgeState{StateEvent: StateConnected})
  741. case *events.MarkChatAsRead:
  742. if user.bridge.Config.Bridge.SyncManualMarkedUnread {
  743. user.markUnread(user.GetPortalByJID(v.JID), !v.Action.GetRead())
  744. }
  745. default:
  746. user.log.Debugfln("Unknown type of event in HandleEvent: %T", v)
  747. }
  748. }
  749. func (user *User) updateChatMute(intent *appservice.IntentAPI, portal *Portal, mutedUntil time.Time) {
  750. if len(portal.MXID) == 0 || !user.bridge.Config.Bridge.MuteBridging {
  751. return
  752. } else if intent == nil {
  753. doublePuppet := user.bridge.GetPuppetByCustomMXID(user.MXID)
  754. if doublePuppet == nil || doublePuppet.CustomIntent() == nil {
  755. return
  756. }
  757. intent = doublePuppet.CustomIntent()
  758. }
  759. var err error
  760. if mutedUntil.IsZero() && mutedUntil.Before(time.Now()) {
  761. user.log.Debugfln("Portal %s is muted until %s, unmuting...", portal.MXID, mutedUntil)
  762. err = intent.DeletePushRule("global", pushrules.RoomRule, string(portal.MXID))
  763. } else {
  764. user.log.Debugfln("Portal %s is muted until %s, muting...", portal.MXID, mutedUntil)
  765. err = intent.PutPushRule("global", pushrules.RoomRule, string(portal.MXID), &mautrix.ReqPutPushRule{
  766. Actions: []pushrules.PushActionType{pushrules.ActionDontNotify},
  767. })
  768. }
  769. if err != nil && !errors.Is(err, mautrix.MNotFound) {
  770. user.log.Warnfln("Failed to update push rule for %s through double puppet: %v", portal.MXID, err)
  771. }
  772. }
  773. type CustomTagData struct {
  774. Order json.Number `json:"order"`
  775. DoublePuppet string `json:"fi.mau.double_puppet_source"`
  776. }
  777. type CustomTagEventContent struct {
  778. Tags map[string]CustomTagData `json:"tags"`
  779. }
  780. func (user *User) updateChatTag(intent *appservice.IntentAPI, portal *Portal, tag string, active bool) {
  781. if len(portal.MXID) == 0 || len(tag) == 0 {
  782. return
  783. } else if intent == nil {
  784. doublePuppet := user.bridge.GetPuppetByCustomMXID(user.MXID)
  785. if doublePuppet == nil || doublePuppet.CustomIntent() == nil {
  786. return
  787. }
  788. intent = doublePuppet.CustomIntent()
  789. }
  790. var existingTags CustomTagEventContent
  791. err := intent.GetTagsWithCustomData(portal.MXID, &existingTags)
  792. if err != nil && !errors.Is(err, mautrix.MNotFound) {
  793. user.log.Warnfln("Failed to get tags of %s: %v", portal.MXID, err)
  794. }
  795. currentTag, ok := existingTags.Tags[tag]
  796. if active && !ok {
  797. user.log.Debugln("Adding tag", tag, "to", portal.MXID)
  798. data := CustomTagData{"0.5", doublePuppetValue}
  799. err = intent.AddTagWithCustomData(portal.MXID, tag, &data)
  800. } else if !active && ok && currentTag.DoublePuppet == doublePuppetValue {
  801. user.log.Debugln("Removing tag", tag, "from", portal.MXID)
  802. err = intent.RemoveTag(portal.MXID, tag)
  803. } else {
  804. err = nil
  805. }
  806. if err != nil {
  807. user.log.Warnfln("Failed to update tag %s for %s through double puppet: %v", tag, portal.MXID, err)
  808. }
  809. }
  810. type CustomReadReceipt struct {
  811. Timestamp int64 `json:"ts,omitempty"`
  812. DoublePuppetSource string `json:"fi.mau.double_puppet_source,omitempty"`
  813. }
  814. type CustomReadMarkers struct {
  815. mautrix.ReqSetReadMarkers
  816. ReadExtra CustomReadReceipt `json:"com.beeper.read.extra"`
  817. FullyReadExtra CustomReadReceipt `json:"com.beeper.fully_read.extra"`
  818. }
  819. func (user *User) syncChatDoublePuppetDetails(portal *Portal, justCreated bool) {
  820. doublePuppet := portal.bridge.GetPuppetByCustomMXID(user.MXID)
  821. if doublePuppet == nil {
  822. return
  823. }
  824. if doublePuppet == nil || doublePuppet.CustomIntent() == nil || len(portal.MXID) == 0 {
  825. return
  826. }
  827. if justCreated || !user.bridge.Config.Bridge.TagOnlyOnCreate {
  828. chat, err := user.Client.Store.ChatSettings.GetChatSettings(portal.Key.JID)
  829. if err != nil {
  830. user.log.Warnfln("Failed to get settings of %s: %v", portal.Key.JID, err)
  831. return
  832. }
  833. intent := doublePuppet.CustomIntent()
  834. if portal.Key.JID == types.StatusBroadcastJID && justCreated {
  835. if user.bridge.Config.Bridge.MuteStatusBroadcast {
  836. user.updateChatMute(intent, portal, time.Now().Add(365*24*time.Hour))
  837. }
  838. if len(user.bridge.Config.Bridge.StatusBroadcastTag) > 0 {
  839. user.updateChatTag(intent, portal, user.bridge.Config.Bridge.StatusBroadcastTag, true)
  840. }
  841. return
  842. } else if !chat.Found {
  843. return
  844. }
  845. user.updateChatMute(intent, portal, chat.MutedUntil)
  846. user.updateChatTag(intent, portal, user.bridge.Config.Bridge.ArchiveTag, chat.Archived)
  847. user.updateChatTag(intent, portal, user.bridge.Config.Bridge.PinnedTag, chat.Pinned)
  848. }
  849. }
  850. func (user *User) getDirectChats() map[id.UserID][]id.RoomID {
  851. res := make(map[id.UserID][]id.RoomID)
  852. privateChats := user.bridge.DB.Portal.FindPrivateChats(user.JID.ToNonAD())
  853. for _, portal := range privateChats {
  854. if len(portal.MXID) > 0 {
  855. res[user.bridge.FormatPuppetMXID(portal.Key.JID)] = []id.RoomID{portal.MXID}
  856. }
  857. }
  858. return res
  859. }
  860. func (user *User) UpdateDirectChats(chats map[id.UserID][]id.RoomID) {
  861. if !user.bridge.Config.Bridge.SyncDirectChatList {
  862. return
  863. }
  864. puppet := user.bridge.GetPuppetByCustomMXID(user.MXID)
  865. if puppet == nil || puppet.CustomIntent() == nil {
  866. return
  867. }
  868. intent := puppet.CustomIntent()
  869. method := http.MethodPatch
  870. if chats == nil {
  871. chats = user.getDirectChats()
  872. method = http.MethodPut
  873. }
  874. user.log.Debugln("Updating m.direct list on homeserver")
  875. var err error
  876. if user.bridge.Config.Homeserver.Asmux {
  877. urlPath := intent.BuildClientURL("unstable", "com.beeper.asmux", "dms")
  878. _, err = intent.MakeFullRequest(mautrix.FullRequest{
  879. Method: method,
  880. URL: urlPath,
  881. Headers: http.Header{"X-Asmux-Auth": {user.bridge.AS.Registration.AppToken}},
  882. RequestJSON: chats,
  883. })
  884. } else {
  885. existingChats := make(map[id.UserID][]id.RoomID)
  886. err = intent.GetAccountData(event.AccountDataDirectChats.Type, &existingChats)
  887. if err != nil {
  888. user.log.Warnln("Failed to get m.direct list to update it:", err)
  889. return
  890. }
  891. for userID, rooms := range existingChats {
  892. if _, ok := user.bridge.ParsePuppetMXID(userID); !ok {
  893. // This is not a ghost user, include it in the new list
  894. chats[userID] = rooms
  895. } else if _, ok := chats[userID]; !ok && method == http.MethodPatch {
  896. // This is a ghost user, but we're not replacing the whole list, so include it too
  897. chats[userID] = rooms
  898. }
  899. }
  900. err = intent.SetAccountData(event.AccountDataDirectChats.Type, &chats)
  901. }
  902. if err != nil {
  903. user.log.Warnln("Failed to update m.direct list:", err)
  904. }
  905. }
  906. func (user *User) handleLoggedOut(onConnect bool, reason events.ConnectFailureReason) {
  907. errorCode := WAUnknownLogout
  908. if reason == events.ConnectFailureLoggedOut {
  909. errorCode = WALoggedOut
  910. } else if reason == events.ConnectFailureMainDeviceGone {
  911. errorCode = WAMainDeviceGone
  912. }
  913. user.removeFromJIDMap(BridgeState{StateEvent: StateBadCredentials, Error: errorCode})
  914. user.DeleteConnection()
  915. user.Session = nil
  916. user.JID = types.EmptyJID
  917. user.Update()
  918. if onConnect {
  919. user.sendMarkdownBridgeAlert("Connecting to WhatsApp failed as the device was unlinked (error %s). Please link the bridge to your phone again.", reason)
  920. } else {
  921. user.sendMarkdownBridgeAlert("You were logged out from another device. Please link the bridge to your phone again.")
  922. }
  923. }
  924. func (user *User) GetPortalByMessageSource(ms types.MessageSource) *Portal {
  925. jid := ms.Chat
  926. if ms.IsIncomingBroadcast() {
  927. if ms.IsFromMe {
  928. jid = ms.BroadcastListOwner.ToNonAD()
  929. } else {
  930. jid = ms.Sender.ToNonAD()
  931. }
  932. if jid.IsEmpty() {
  933. return nil
  934. }
  935. }
  936. return user.bridge.GetPortalByJID(database.NewPortalKey(jid, user.JID))
  937. }
  938. func (user *User) GetPortalByJID(jid types.JID) *Portal {
  939. return user.bridge.GetPortalByJID(database.NewPortalKey(jid, user.JID))
  940. }
  941. func (user *User) syncPuppet(jid types.JID, reason string) {
  942. user.bridge.GetPuppetByJID(jid).SyncContact(user, false, false, reason)
  943. }
  944. func (user *User) ResyncContacts() error {
  945. contacts, err := user.Client.Store.Contacts.GetAllContacts()
  946. if err != nil {
  947. return fmt.Errorf("failed to get cached contacts: %w", err)
  948. }
  949. user.log.Infofln("Resyncing displaynames with %d contacts", len(contacts))
  950. for jid, contact := range contacts {
  951. puppet := user.bridge.GetPuppetByJID(jid)
  952. if puppet != nil {
  953. puppet.Sync(user, contact)
  954. } else {
  955. user.log.Warnfln("Got a nil puppet for %s while syncing contacts", jid)
  956. }
  957. }
  958. return nil
  959. }
  960. func (user *User) ResyncGroups(createPortals bool) error {
  961. groups, err := user.Client.GetJoinedGroups()
  962. if err != nil {
  963. return fmt.Errorf("failed to get group list from server: %w", err)
  964. }
  965. for _, group := range groups {
  966. portal := user.GetPortalByJID(group.JID)
  967. if len(portal.MXID) == 0 {
  968. if createPortals {
  969. err = portal.CreateMatrixRoom(user, group, true, true)
  970. if err != nil {
  971. return fmt.Errorf("failed to create room for %s: %w", group.JID, err)
  972. }
  973. }
  974. } else {
  975. portal.UpdateMatrixRoom(user, group)
  976. }
  977. }
  978. return nil
  979. }
  980. const WATypingTimeout = 15 * time.Second
  981. func (user *User) handleChatPresence(presence *events.ChatPresence) {
  982. puppet := user.bridge.GetPuppetByJID(presence.Sender)
  983. portal := user.GetPortalByJID(presence.Chat)
  984. if puppet == nil || portal == nil || len(portal.MXID) == 0 {
  985. return
  986. }
  987. if presence.State == types.ChatPresenceComposing {
  988. if puppet.typingIn != "" && puppet.typingAt.Add(WATypingTimeout).Before(time.Now()) {
  989. if puppet.typingIn == portal.MXID {
  990. return
  991. }
  992. _, _ = puppet.IntentFor(portal).UserTyping(puppet.typingIn, false, 0)
  993. }
  994. _, _ = puppet.IntentFor(portal).UserTyping(portal.MXID, true, WATypingTimeout.Milliseconds())
  995. puppet.typingIn = portal.MXID
  996. puppet.typingAt = time.Now()
  997. } else {
  998. _, _ = puppet.IntentFor(portal).UserTyping(portal.MXID, false, 0)
  999. puppet.typingIn = ""
  1000. }
  1001. }
  1002. func (user *User) handleReceipt(receipt *events.Receipt) {
  1003. if receipt.Type != events.ReceiptTypeRead && receipt.Type != events.ReceiptTypeReadSelf {
  1004. return
  1005. }
  1006. portal := user.GetPortalByMessageSource(receipt.MessageSource)
  1007. if portal == nil || len(portal.MXID) == 0 {
  1008. return
  1009. }
  1010. portal.messages <- PortalMessage{receipt: receipt, source: user}
  1011. }
  1012. func makeReadMarkerContent(eventID id.EventID, doublePuppet bool) CustomReadMarkers {
  1013. var extra CustomReadReceipt
  1014. if doublePuppet {
  1015. extra.DoublePuppetSource = doublePuppetValue
  1016. }
  1017. return CustomReadMarkers{
  1018. ReqSetReadMarkers: mautrix.ReqSetReadMarkers{
  1019. Read: eventID,
  1020. FullyRead: eventID,
  1021. },
  1022. ReadExtra: extra,
  1023. FullyReadExtra: extra,
  1024. }
  1025. }
  1026. func (user *User) markSelfReadFull(portal *Portal) {
  1027. puppet := user.bridge.GetPuppetByCustomMXID(user.MXID)
  1028. if puppet == nil || puppet.CustomIntent() == nil {
  1029. return
  1030. }
  1031. lastMessage := user.bridge.DB.Message.GetLastInChat(portal.Key)
  1032. if lastMessage == nil {
  1033. return
  1034. }
  1035. user.SetLastReadTS(portal.Key, lastMessage.Timestamp)
  1036. err := puppet.CustomIntent().SetReadMarkers(portal.MXID, makeReadMarkerContent(lastMessage.MXID, true))
  1037. if err != nil {
  1038. user.log.Warnfln("Failed to mark %s (last message) in %s as read: %v", lastMessage.MXID, portal.MXID, err)
  1039. } else {
  1040. user.log.Debugfln("Marked %s (last message) in %s as read", lastMessage.MXID, portal.MXID)
  1041. }
  1042. }
  1043. func (user *User) markUnread(portal *Portal, unread bool) {
  1044. puppet := user.bridge.GetPuppetByCustomMXID(user.MXID)
  1045. if puppet == nil || puppet.CustomIntent() == nil {
  1046. return
  1047. }
  1048. err := puppet.CustomIntent().SetRoomAccountData(portal.MXID, "m.marked_unread",
  1049. map[string]bool{"unread": unread})
  1050. if err != nil {
  1051. user.log.Warnfln("Failed to mark %s as unread via m.marked_unread: %v", portal.MXID, err)
  1052. } else {
  1053. user.log.Debugfln("Marked %s as unread via m.marked_unread: %v", portal.MXID, err)
  1054. }
  1055. err = puppet.CustomIntent().SetRoomAccountData(portal.MXID, "com.famedly.marked_unread",
  1056. map[string]bool{"unread": unread})
  1057. if err != nil {
  1058. user.log.Warnfln("Failed to mark %s as unread via com.famedly.marked_unread: %v", portal.MXID, err)
  1059. } else {
  1060. user.log.Debugfln("Marked %s as unread via com.famedly.marked_unread: %v", portal.MXID, err)
  1061. }
  1062. }
  1063. func (user *User) handleGroupCreate(evt *events.JoinedGroup) {
  1064. portal := user.GetPortalByJID(evt.JID)
  1065. if len(portal.MXID) == 0 {
  1066. err := portal.CreateMatrixRoom(user, &evt.GroupInfo, true, true)
  1067. if err != nil {
  1068. user.log.Errorln("Failed to create Matrix room after join notification: %v", err)
  1069. }
  1070. } else {
  1071. portal.UpdateMatrixRoom(user, &evt.GroupInfo)
  1072. }
  1073. }
  1074. func (user *User) handleGroupUpdate(evt *events.GroupInfo) {
  1075. portal := user.GetPortalByJID(evt.JID)
  1076. if portal == nil || len(portal.MXID) == 0 {
  1077. user.log.Debugfln("Ignoring group info update in chat with no portal: %+v", evt)
  1078. return
  1079. }
  1080. switch {
  1081. case evt.Announce != nil:
  1082. portal.RestrictMessageSending(evt.Announce.IsAnnounce)
  1083. case evt.Locked != nil:
  1084. portal.RestrictMetadataChanges(evt.Locked.IsLocked)
  1085. case evt.Name != nil:
  1086. portal.UpdateName(evt.Name.Name, evt.Name.NameSetBy, true)
  1087. case evt.Topic != nil:
  1088. portal.UpdateTopic(evt.Topic.Topic, evt.Topic.TopicSetBy, true)
  1089. case evt.Leave != nil:
  1090. if evt.Sender != nil && !evt.Sender.IsEmpty() {
  1091. portal.HandleWhatsAppKick(user, *evt.Sender, evt.Leave)
  1092. }
  1093. case evt.Join != nil:
  1094. portal.HandleWhatsAppInvite(user, evt.Sender, evt.Join)
  1095. case evt.Promote != nil:
  1096. portal.ChangeAdminStatus(evt.Promote, true)
  1097. case evt.Demote != nil:
  1098. portal.ChangeAdminStatus(evt.Demote, false)
  1099. case evt.Ephemeral != nil:
  1100. portal.UpdateGroupDisappearingMessages(evt.Sender, evt.Timestamp, evt.Ephemeral.DisappearingTimer)
  1101. }
  1102. }
  1103. func (user *User) handlePictureUpdate(evt *events.Picture) {
  1104. if evt.JID.Server == types.DefaultUserServer {
  1105. puppet := user.bridge.GetPuppetByJID(evt.JID)
  1106. user.log.Debugfln("Received picture update for puppet %s (current: %s, new: %s)", evt.JID, puppet.Avatar, evt.PictureID)
  1107. if puppet.Avatar != evt.PictureID {
  1108. puppet.UpdateAvatar(user)
  1109. }
  1110. } else if portal := user.GetPortalByJID(evt.JID); portal != nil {
  1111. user.log.Debugfln("Received picture update for portal %s (current: %s, new: %s)", evt.JID, portal.Avatar, evt.PictureID)
  1112. if portal.Avatar != evt.PictureID {
  1113. portal.UpdateAvatar(user, evt.Author, true)
  1114. }
  1115. }
  1116. }
  1117. func (user *User) StartPM(jid types.JID, reason string) (*Portal, *Puppet, bool, error) {
  1118. user.log.Debugln("Starting PM with", jid, "from", reason)
  1119. puppet := user.bridge.GetPuppetByJID(jid)
  1120. puppet.SyncContact(user, true, false, reason)
  1121. portal := user.GetPortalByJID(puppet.JID)
  1122. if len(portal.MXID) > 0 {
  1123. ok := portal.ensureUserInvited(user)
  1124. if !ok {
  1125. portal.log.Warnfln("ensureUserInvited(%s) returned false, creating new portal", user.MXID)
  1126. portal.MXID = ""
  1127. } else {
  1128. return portal, puppet, false, nil
  1129. }
  1130. }
  1131. err := portal.CreateMatrixRoom(user, nil, false, true)
  1132. return portal, puppet, true, err
  1133. }
  1134. const groupListCacheMaxAge = 24 * time.Hour
  1135. func (user *User) getCachedGroupList() ([]*types.GroupInfo, error) {
  1136. user.groupListCacheLock.Lock()
  1137. defer user.groupListCacheLock.Unlock()
  1138. if user.groupListCache != nil && user.groupListCacheTime.Add(groupListCacheMaxAge).After(time.Now()) {
  1139. return user.groupListCache, nil
  1140. }
  1141. var err error
  1142. user.groupListCache, err = user.Client.GetJoinedGroups()
  1143. user.groupListCacheTime = time.Now()
  1144. return user.groupListCache, err
  1145. }