matrix.go 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578
  1. // mautrix-whatsapp - A Matrix-WhatsApp puppeting bridge.
  2. // Copyright (C) 2021 Tulir Asokan
  3. //
  4. // This program is free software: you can redistribute it and/or modify
  5. // it under the terms of the GNU Affero General Public License as published by
  6. // the Free Software Foundation, either version 3 of the License, or
  7. // (at your option) any later version.
  8. //
  9. // This program is distributed in the hope that it will be useful,
  10. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. // GNU Affero General Public License for more details.
  13. //
  14. // You should have received a copy of the GNU Affero General Public License
  15. // along with this program. If not, see <https://www.gnu.org/licenses/>.
  16. package main
  17. import (
  18. "errors"
  19. "fmt"
  20. "strings"
  21. "time"
  22. "maunium.net/go/maulogger/v2"
  23. "go.mau.fi/whatsmeow/types"
  24. "maunium.net/go/mautrix"
  25. "maunium.net/go/mautrix/appservice"
  26. "maunium.net/go/mautrix/bridge"
  27. "maunium.net/go/mautrix/event"
  28. "maunium.net/go/mautrix/format"
  29. "maunium.net/go/mautrix/id"
  30. "maunium.net/go/mautrix-whatsapp/database"
  31. )
  32. type MatrixHandler struct {
  33. bridge *WABridge
  34. as *appservice.AppService
  35. log maulogger.Logger
  36. cmd *CommandHandler
  37. }
  38. func NewMatrixHandler(bridge *WABridge) *MatrixHandler {
  39. handler := &MatrixHandler{
  40. bridge: bridge,
  41. as: bridge.AS,
  42. log: bridge.Log.Sub("Matrix"),
  43. cmd: NewCommandHandler(bridge),
  44. }
  45. bridge.EventProcessor.On(event.EventMessage, handler.HandleMessage)
  46. bridge.EventProcessor.On(event.EventEncrypted, handler.HandleEncrypted)
  47. bridge.EventProcessor.On(event.EventSticker, handler.HandleMessage)
  48. bridge.EventProcessor.On(event.EventReaction, handler.HandleReaction)
  49. bridge.EventProcessor.On(event.EventRedaction, handler.HandleRedaction)
  50. bridge.EventProcessor.On(event.StateMember, handler.HandleMembership)
  51. bridge.EventProcessor.On(event.StateRoomName, handler.HandleRoomMetadata)
  52. bridge.EventProcessor.On(event.StateRoomAvatar, handler.HandleRoomMetadata)
  53. bridge.EventProcessor.On(event.StateTopic, handler.HandleRoomMetadata)
  54. bridge.EventProcessor.On(event.StateEncryption, handler.HandleEncryption)
  55. bridge.EventProcessor.On(event.EphemeralEventPresence, handler.HandlePresence)
  56. bridge.EventProcessor.On(event.EphemeralEventReceipt, handler.HandleReceipt)
  57. bridge.EventProcessor.On(event.EphemeralEventTyping, handler.HandleTyping)
  58. return handler
  59. }
  60. func (mx *MatrixHandler) HandleEncryption(evt *event.Event) {
  61. defer mx.bridge.Metrics.TrackMatrixEvent(evt.Type)()
  62. if evt.Content.AsEncryption().Algorithm != id.AlgorithmMegolmV1 {
  63. return
  64. }
  65. portal := mx.bridge.GetPortalByMXID(evt.RoomID)
  66. if portal != nil && !portal.Encrypted {
  67. mx.log.Debugfln("%s enabled encryption in %s", evt.Sender, evt.RoomID)
  68. portal.Encrypted = true
  69. portal.Update(nil)
  70. if portal.IsPrivateChat() {
  71. err := mx.as.BotIntent().EnsureJoined(portal.MXID, appservice.EnsureJoinedParams{BotOverride: portal.MainIntent().Client})
  72. if err != nil {
  73. mx.log.Errorfln("Failed to join bot to %s after encryption was enabled: %v", evt.RoomID, err)
  74. }
  75. }
  76. }
  77. }
  78. func (mx *MatrixHandler) joinAndCheckMembers(evt *event.Event, intent *appservice.IntentAPI) *mautrix.RespJoinedMembers {
  79. resp, err := intent.JoinRoomByID(evt.RoomID)
  80. if err != nil {
  81. mx.log.Debugfln("Failed to join room %s as %s with invite from %s: %v", evt.RoomID, intent.UserID, evt.Sender, err)
  82. return nil
  83. }
  84. members, err := intent.JoinedMembers(resp.RoomID)
  85. if err != nil {
  86. mx.log.Debugfln("Failed to get members in room %s after accepting invite from %s as %s: %v", resp.RoomID, evt.Sender, intent.UserID, err)
  87. _, _ = intent.LeaveRoom(resp.RoomID)
  88. return nil
  89. }
  90. if len(members.Joined) < 2 {
  91. mx.log.Debugln("Leaving empty room", resp.RoomID, "after accepting invite from", evt.Sender, "as", intent.UserID)
  92. _, _ = intent.LeaveRoom(resp.RoomID)
  93. return nil
  94. }
  95. return members
  96. }
  97. func (mx *MatrixHandler) sendNoticeWithMarkdown(roomID id.RoomID, message string) (*mautrix.RespSendEvent, error) {
  98. intent := mx.as.BotIntent()
  99. content := format.RenderMarkdown(message, true, false)
  100. content.MsgType = event.MsgNotice
  101. return intent.SendMessageEvent(roomID, event.EventMessage, content)
  102. }
  103. func (mx *MatrixHandler) HandleBotInvite(evt *event.Event) {
  104. intent := mx.as.BotIntent()
  105. user := mx.bridge.GetUserByMXID(evt.Sender)
  106. if user == nil {
  107. return
  108. }
  109. members := mx.joinAndCheckMembers(evt, intent)
  110. if members == nil {
  111. return
  112. }
  113. if !user.Whitelisted {
  114. _, _ = intent.SendNotice(evt.RoomID, "You are not whitelisted to use this bridge.\n"+
  115. "If you're the owner of this bridge, see the bridge.permissions section in your config file.")
  116. _, _ = intent.LeaveRoom(evt.RoomID)
  117. return
  118. }
  119. _, _ = mx.sendNoticeWithMarkdown(evt.RoomID, mx.bridge.Config.Bridge.ManagementRoomText.Welcome)
  120. if len(members.Joined) == 2 && (len(user.ManagementRoom) == 0 || evt.Content.AsMember().IsDirect) {
  121. user.SetManagementRoom(evt.RoomID)
  122. _, _ = intent.SendNotice(user.ManagementRoom, "This room has been registered as your bridge management/status room.")
  123. mx.log.Debugln(evt.RoomID, "registered as a management room with", evt.Sender)
  124. }
  125. if evt.RoomID == user.ManagementRoom {
  126. if user.HasSession() {
  127. _, _ = mx.sendNoticeWithMarkdown(evt.RoomID, mx.bridge.Config.Bridge.ManagementRoomText.WelcomeConnected)
  128. } else {
  129. _, _ = mx.sendNoticeWithMarkdown(evt.RoomID, mx.bridge.Config.Bridge.ManagementRoomText.WelcomeUnconnected)
  130. }
  131. additionalHelp := mx.bridge.Config.Bridge.ManagementRoomText.AdditionalHelp
  132. if len(additionalHelp) > 0 {
  133. _, _ = mx.sendNoticeWithMarkdown(evt.RoomID, additionalHelp)
  134. }
  135. }
  136. }
  137. func (mx *MatrixHandler) handlePrivatePortal(roomID id.RoomID, inviter *User, puppet *Puppet, key database.PortalKey) {
  138. portal := mx.bridge.GetPortalByJID(key)
  139. if len(portal.MXID) == 0 {
  140. mx.createPrivatePortalFromInvite(roomID, inviter, puppet, portal)
  141. return
  142. }
  143. err := portal.MainIntent().EnsureInvited(portal.MXID, inviter.MXID)
  144. if err != nil {
  145. mx.log.Warnfln("Failed to invite %s to existing private chat portal %s with %s: %v. Redirecting portal to new room...", inviter.MXID, portal.MXID, puppet.JID, err)
  146. mx.createPrivatePortalFromInvite(roomID, inviter, puppet, portal)
  147. return
  148. }
  149. intent := puppet.DefaultIntent()
  150. errorMessage := fmt.Sprintf("You already have a private chat portal with me at [%[1]s](https://matrix.to/#/%[1]s)", portal.MXID)
  151. errorContent := format.RenderMarkdown(errorMessage, true, false)
  152. _, _ = intent.SendMessageEvent(roomID, event.EventMessage, errorContent)
  153. mx.log.Debugfln("Leaving private chat room %s as %s after accepting invite from %s as we already have chat with the user", roomID, puppet.MXID, inviter.MXID)
  154. _, _ = intent.LeaveRoom(roomID)
  155. }
  156. func (mx *MatrixHandler) createPrivatePortalFromInvite(roomID id.RoomID, inviter *User, puppet *Puppet, portal *Portal) {
  157. portal.MXID = roomID
  158. portal.Topic = PrivateChatTopic
  159. _, _ = portal.MainIntent().SetRoomTopic(portal.MXID, portal.Topic)
  160. if portal.bridge.Config.Bridge.PrivateChatPortalMeta {
  161. portal.Name = puppet.Displayname
  162. portal.AvatarURL = puppet.AvatarURL
  163. portal.Avatar = puppet.Avatar
  164. _, _ = portal.MainIntent().SetRoomName(portal.MXID, portal.Name)
  165. _, _ = portal.MainIntent().SetRoomAvatar(portal.MXID, portal.AvatarURL)
  166. } else {
  167. portal.Name = ""
  168. }
  169. portal.log.Infofln("Created private chat portal in %s after invite from %s", roomID, inviter.MXID)
  170. intent := puppet.DefaultIntent()
  171. if mx.bridge.Config.Bridge.Encryption.Default {
  172. _, err := intent.InviteUser(roomID, &mautrix.ReqInviteUser{UserID: mx.bridge.Bot.UserID})
  173. if err != nil {
  174. portal.log.Warnln("Failed to invite bridge bot to enable e2be:", err)
  175. }
  176. err = mx.bridge.Bot.EnsureJoined(roomID)
  177. if err != nil {
  178. portal.log.Warnln("Failed to join as bridge bot to enable e2be:", err)
  179. }
  180. _, err = intent.SendStateEvent(roomID, event.StateEncryption, "", &event.EncryptionEventContent{Algorithm: id.AlgorithmMegolmV1})
  181. if err != nil {
  182. portal.log.Warnln("Failed to enable e2be:", err)
  183. }
  184. mx.as.StateStore.SetMembership(roomID, inviter.MXID, event.MembershipJoin)
  185. mx.as.StateStore.SetMembership(roomID, puppet.MXID, event.MembershipJoin)
  186. mx.as.StateStore.SetMembership(roomID, mx.bridge.Bot.UserID, event.MembershipJoin)
  187. portal.Encrypted = true
  188. }
  189. portal.Update(nil)
  190. portal.UpdateBridgeInfo()
  191. _, _ = intent.SendNotice(roomID, "Private chat portal created")
  192. }
  193. func (mx *MatrixHandler) HandlePuppetInvite(evt *event.Event, inviter *User, puppet *Puppet) {
  194. intent := puppet.DefaultIntent()
  195. if !inviter.Whitelisted {
  196. puppet.log.Debugfln("Rejecting invite from %s to %s: user is not whitelisted", evt.Sender, evt.RoomID)
  197. _, err := intent.LeaveRoom(evt.RoomID, &mautrix.ReqLeave{
  198. Reason: "You're not whitelisted to use this bridge",
  199. })
  200. if err != nil {
  201. puppet.log.Warnfln("Failed to reject invite from %s to %s: %v", evt.Sender, evt.RoomID, err)
  202. }
  203. return
  204. } else if !inviter.IsLoggedIn() {
  205. puppet.log.Debugfln("Rejecting invite from %s to %s: user is not logged in", evt.Sender, evt.RoomID)
  206. _, err := intent.LeaveRoom(evt.RoomID, &mautrix.ReqLeave{
  207. Reason: "You're not logged into this bridge",
  208. })
  209. if err != nil {
  210. puppet.log.Warnfln("Failed to reject invite from %s to %s: %v", evt.Sender, evt.RoomID, err)
  211. }
  212. return
  213. }
  214. members := mx.joinAndCheckMembers(evt, intent)
  215. if members == nil {
  216. return
  217. }
  218. var hasBridgeBot, hasOtherUsers bool
  219. for mxid, _ := range members.Joined {
  220. if mxid == intent.UserID || mxid == inviter.MXID {
  221. continue
  222. } else if mxid == mx.bridge.Bot.UserID {
  223. hasBridgeBot = true
  224. } else {
  225. hasOtherUsers = true
  226. }
  227. }
  228. if !hasBridgeBot && !hasOtherUsers {
  229. key := database.NewPortalKey(puppet.JID, inviter.JID)
  230. mx.handlePrivatePortal(evt.RoomID, inviter, puppet, key)
  231. } else if !hasBridgeBot {
  232. mx.log.Debugln("Leaving multi-user room", evt.RoomID, "as", puppet.MXID, "after accepting invite from", evt.Sender)
  233. _, _ = intent.SendNotice(evt.RoomID, "Please invite the bridge bot first if you want to bridge to a WhatsApp group.")
  234. _, _ = intent.LeaveRoom(evt.RoomID)
  235. } else {
  236. _, _ = intent.SendNotice(evt.RoomID, "This puppet will remain inactive until this room is bridged to a WhatsApp group.")
  237. }
  238. }
  239. func (mx *MatrixHandler) HandleMembership(evt *event.Event) {
  240. if _, isPuppet := mx.bridge.ParsePuppetMXID(evt.Sender); evt.Sender == mx.bridge.Bot.UserID || isPuppet {
  241. return
  242. }
  243. defer mx.bridge.Metrics.TrackMatrixEvent(evt.Type)()
  244. if mx.bridge.Crypto != nil {
  245. mx.bridge.Crypto.HandleMemberEvent(evt)
  246. }
  247. content := evt.Content.AsMember()
  248. if content.Membership == event.MembershipInvite && id.UserID(evt.GetStateKey()) == mx.as.BotMXID() {
  249. mx.HandleBotInvite(evt)
  250. return
  251. }
  252. if mx.shouldIgnoreEvent(evt) {
  253. return
  254. }
  255. user := mx.bridge.GetUserByMXID(evt.Sender)
  256. if user == nil {
  257. return
  258. }
  259. isSelf := id.UserID(evt.GetStateKey()) == evt.Sender
  260. puppet := mx.bridge.GetPuppetByMXID(id.UserID(evt.GetStateKey()))
  261. portal := mx.bridge.GetPortalByMXID(evt.RoomID)
  262. if portal == nil {
  263. if puppet != nil && content.Membership == event.MembershipInvite {
  264. mx.HandlePuppetInvite(evt, user, puppet)
  265. }
  266. return
  267. } else if !user.Whitelisted || !user.IsLoggedIn() {
  268. return
  269. }
  270. if content.Membership == event.MembershipLeave {
  271. if evt.Unsigned.PrevContent != nil {
  272. _ = evt.Unsigned.PrevContent.ParseRaw(evt.Type)
  273. prevContent, ok := evt.Unsigned.PrevContent.Parsed.(*event.MemberEventContent)
  274. if ok && prevContent.Membership != "join" {
  275. return
  276. }
  277. }
  278. if isSelf {
  279. portal.HandleMatrixLeave(user)
  280. } else if puppet != nil {
  281. portal.HandleMatrixKick(user, puppet)
  282. }
  283. } else if content.Membership == event.MembershipInvite && !isSelf && puppet != nil {
  284. portal.HandleMatrixInvite(user, puppet)
  285. }
  286. }
  287. func (mx *MatrixHandler) HandleRoomMetadata(evt *event.Event) {
  288. defer mx.bridge.Metrics.TrackMatrixEvent(evt.Type)()
  289. if mx.shouldIgnoreEvent(evt) {
  290. return
  291. }
  292. user := mx.bridge.GetUserByMXID(evt.Sender)
  293. if user == nil || !user.Whitelisted || !user.IsLoggedIn() {
  294. return
  295. }
  296. portal := mx.bridge.GetPortalByMXID(evt.RoomID)
  297. if portal == nil || portal.IsPrivateChat() {
  298. return
  299. }
  300. portal.HandleMatrixMeta(user, evt)
  301. }
  302. func (mx *MatrixHandler) shouldIgnoreEvent(evt *event.Event) bool {
  303. if _, isPuppet := mx.bridge.ParsePuppetMXID(evt.Sender); evt.Sender == mx.bridge.Bot.UserID || isPuppet {
  304. return true
  305. }
  306. if val, ok := evt.Content.Raw[doublePuppetKey]; ok && val == doublePuppetValue && mx.bridge.GetPuppetByCustomMXID(evt.Sender) != nil {
  307. return true
  308. }
  309. user := mx.bridge.GetUserByMXID(evt.Sender)
  310. if !user.RelayWhitelisted {
  311. return true
  312. }
  313. return false
  314. }
  315. const sessionWaitTimeout = 5 * time.Second
  316. func (mx *MatrixHandler) HandleEncrypted(evt *event.Event) {
  317. defer mx.bridge.Metrics.TrackMatrixEvent(evt.Type)()
  318. if mx.shouldIgnoreEvent(evt) || mx.bridge.Crypto == nil {
  319. return
  320. }
  321. decrypted, err := mx.bridge.Crypto.Decrypt(evt)
  322. decryptionRetryCount := 0
  323. if errors.Is(err, bridge.NoSessionFound) {
  324. content := evt.Content.AsEncrypted()
  325. mx.log.Debugfln("Couldn't find session %s trying to decrypt %s, waiting %d seconds...", content.SessionID, evt.ID, int(sessionWaitTimeout.Seconds()))
  326. mx.as.SendErrorMessageSendCheckpoint(evt, appservice.StepDecrypted, err, false, decryptionRetryCount)
  327. decryptionRetryCount++
  328. if mx.bridge.Crypto.WaitForSession(evt.RoomID, content.SenderKey, content.SessionID, sessionWaitTimeout) {
  329. mx.log.Debugfln("Got session %s after waiting, trying to decrypt %s again", content.SessionID, evt.ID)
  330. decrypted, err = mx.bridge.Crypto.Decrypt(evt)
  331. } else {
  332. mx.as.SendErrorMessageSendCheckpoint(evt, appservice.StepDecrypted, fmt.Errorf("didn't receive encryption keys"), false, decryptionRetryCount)
  333. go mx.waitLongerForSession(evt)
  334. return
  335. }
  336. }
  337. if err != nil {
  338. mx.as.SendErrorMessageSendCheckpoint(evt, appservice.StepDecrypted, err, true, decryptionRetryCount)
  339. mx.log.Warnfln("Failed to decrypt %s: %v", evt.ID, err)
  340. _, _ = mx.bridge.Bot.SendNotice(evt.RoomID, fmt.Sprintf(
  341. "\u26a0 Your message was not bridged: %v", err))
  342. return
  343. }
  344. mx.as.SendMessageSendCheckpoint(decrypted, appservice.StepDecrypted, decryptionRetryCount)
  345. mx.bridge.EventProcessor.Dispatch(decrypted)
  346. }
  347. func (mx *MatrixHandler) waitLongerForSession(evt *event.Event) {
  348. const extendedTimeout = sessionWaitTimeout * 3
  349. content := evt.Content.AsEncrypted()
  350. mx.log.Debugfln("Couldn't find session %s trying to decrypt %s, waiting %d more seconds...",
  351. content.SessionID, evt.ID, int(extendedTimeout.Seconds()))
  352. go mx.bridge.Crypto.RequestSession(evt.RoomID, content.SenderKey, content.SessionID, evt.Sender, content.DeviceID)
  353. resp, err := mx.bridge.Bot.SendNotice(evt.RoomID, fmt.Sprintf(
  354. "\u26a0 Your message was not bridged: the bridge hasn't received the decryption keys. "+
  355. "The bridge will retry for %d seconds. If this error keeps happening, try restarting your client.",
  356. int(extendedTimeout.Seconds())))
  357. if err != nil {
  358. mx.log.Errorfln("Failed to send decryption error to %s: %v", evt.RoomID, err)
  359. }
  360. update := event.MessageEventContent{MsgType: event.MsgNotice}
  361. if mx.bridge.Crypto.WaitForSession(evt.RoomID, content.SenderKey, content.SessionID, extendedTimeout) {
  362. mx.log.Debugfln("Got session %s after waiting more, trying to decrypt %s again", content.SessionID, evt.ID)
  363. decrypted, err := mx.bridge.Crypto.Decrypt(evt)
  364. if err == nil {
  365. mx.as.SendMessageSendCheckpoint(decrypted, appservice.StepDecrypted, 2)
  366. mx.bridge.EventProcessor.Dispatch(decrypted)
  367. _, _ = mx.bridge.Bot.RedactEvent(evt.RoomID, resp.EventID)
  368. return
  369. }
  370. mx.log.Warnfln("Failed to decrypt %s: %v", evt.ID, err)
  371. mx.as.SendErrorMessageSendCheckpoint(evt, appservice.StepDecrypted, err, true, 2)
  372. update.Body = fmt.Sprintf("\u26a0 Your message was not bridged: %v", err)
  373. } else {
  374. mx.log.Debugfln("Didn't get %s, giving up on %s", content.SessionID, evt.ID)
  375. mx.as.SendErrorMessageSendCheckpoint(evt, appservice.StepDecrypted, fmt.Errorf("didn't receive encryption keys"), true, 2)
  376. update.Body = "\u26a0 Your message was not bridged: the bridge hasn't received the decryption keys. " +
  377. "If this error keeps happening, try restarting your client."
  378. }
  379. newContent := update
  380. update.NewContent = &newContent
  381. if resp != nil {
  382. update.RelatesTo = &event.RelatesTo{
  383. Type: event.RelReplace,
  384. EventID: resp.EventID,
  385. }
  386. }
  387. _, err = mx.bridge.Bot.SendMessageEvent(evt.RoomID, event.EventMessage, &update)
  388. if err != nil {
  389. mx.log.Debugfln("Failed to update decryption error notice %s: %v", resp.EventID, err)
  390. }
  391. }
  392. func (mx *MatrixHandler) HandleMessage(evt *event.Event) {
  393. defer mx.bridge.Metrics.TrackMatrixEvent(evt.Type)()
  394. if mx.shouldIgnoreEvent(evt) {
  395. return
  396. }
  397. user := mx.bridge.GetUserByMXID(evt.Sender)
  398. if user == nil {
  399. return
  400. }
  401. content := evt.Content.AsMessage()
  402. content.RemoveReplyFallback()
  403. if user.Whitelisted && content.MsgType == event.MsgText {
  404. commandPrefix := mx.bridge.Config.Bridge.CommandPrefix
  405. hasCommandPrefix := strings.HasPrefix(content.Body, commandPrefix)
  406. if hasCommandPrefix {
  407. content.Body = strings.TrimLeft(content.Body[len(commandPrefix):], " ")
  408. }
  409. if hasCommandPrefix || evt.RoomID == user.ManagementRoom {
  410. mx.cmd.Handle(evt.RoomID, evt.ID, user, content.Body, content.GetReplyTo())
  411. return
  412. }
  413. }
  414. portal := mx.bridge.GetPortalByMXID(evt.RoomID)
  415. if portal != nil && (user.Whitelisted || portal.HasRelaybot()) {
  416. portal.matrixMessages <- PortalMatrixMessage{user: user, evt: evt}
  417. }
  418. }
  419. func (mx *MatrixHandler) HandleReaction(evt *event.Event) {
  420. defer mx.bridge.Metrics.TrackMatrixEvent(evt.Type)()
  421. if mx.shouldIgnoreEvent(evt) {
  422. return
  423. }
  424. user := mx.bridge.GetUserByMXID(evt.Sender)
  425. if user == nil || !user.Whitelisted || !user.IsLoggedIn() {
  426. return
  427. }
  428. portal := mx.bridge.GetPortalByMXID(evt.RoomID)
  429. if portal == nil {
  430. return
  431. } else if portal.IsPrivateChat() && user.JID.User != portal.Key.Receiver.User {
  432. // One user can only react once, so we don't use the relay user for reactions
  433. return
  434. }
  435. content := evt.Content.AsReaction()
  436. if strings.Contains(content.RelatesTo.Key, "retry") || strings.HasPrefix(content.RelatesTo.Key, "\u267b") { // ♻️
  437. if retryRequested, _ := portal.requestMediaRetry(user, content.RelatesTo.EventID, nil); retryRequested {
  438. _, _ = portal.MainIntent().RedactEvent(portal.MXID, evt.ID, mautrix.ReqRedact{
  439. Reason: "requested media from phone",
  440. })
  441. // Errored media, don't try to send as reaction
  442. return
  443. }
  444. }
  445. portal.HandleMatrixReaction(user, evt)
  446. }
  447. func (mx *MatrixHandler) HandleRedaction(evt *event.Event) {
  448. defer mx.bridge.Metrics.TrackMatrixEvent(evt.Type)()
  449. user := mx.bridge.GetUserByMXID(evt.Sender)
  450. if user == nil {
  451. return
  452. }
  453. portal := mx.bridge.GetPortalByMXID(evt.RoomID)
  454. if portal != nil && (user.Whitelisted || portal.HasRelaybot()) {
  455. portal.matrixMessages <- PortalMatrixMessage{user: user, evt: evt}
  456. }
  457. }
  458. func (mx *MatrixHandler) HandlePresence(evt *event.Event) {
  459. user := mx.bridge.GetUserByMXIDIfExists(evt.Sender)
  460. if user == nil || !user.IsLoggedIn() {
  461. return
  462. }
  463. customPuppet := mx.bridge.GetPuppetByCustomMXID(user.MXID)
  464. // TODO move this flag to the user and/or portal data
  465. if customPuppet != nil && !customPuppet.EnablePresence {
  466. return
  467. }
  468. presence := types.PresenceAvailable
  469. if evt.Content.AsPresence().Presence != event.PresenceOnline {
  470. presence = types.PresenceUnavailable
  471. user.log.Debugln("Marking offline")
  472. } else {
  473. user.log.Debugln("Marking online")
  474. }
  475. user.lastPresence = presence
  476. if user.Client.Store.PushName != "" {
  477. err := user.Client.SendPresence(presence)
  478. if err != nil {
  479. user.log.Warnln("Failed to set presence:", err)
  480. }
  481. }
  482. }
  483. func (mx *MatrixHandler) HandleReceipt(evt *event.Event) {
  484. portal := mx.bridge.GetPortalByMXID(evt.RoomID)
  485. if portal == nil {
  486. return
  487. }
  488. for eventID, receipts := range *evt.Content.AsReceipt() {
  489. for userID, receipt := range receipts.Read {
  490. if user := mx.bridge.GetUserByMXIDIfExists(userID); user == nil {
  491. // Not a bridge user
  492. } else if customPuppet := mx.bridge.GetPuppetByCustomMXID(user.MXID); customPuppet != nil && !customPuppet.EnableReceipts {
  493. // TODO move this flag to the user and/or portal data
  494. continue
  495. } else if val, ok := receipt.Extra[doublePuppetKey].(string); ok && customPuppet != nil && val == doublePuppetValue {
  496. // Ignore double puppeted read receipts.
  497. user.log.Debugfln("Ignoring double puppeted read receipt %+v", evt.Content.Raw)
  498. // But do start disappearing messages, because the user read the chat
  499. portal.ScheduleDisappearing()
  500. } else {
  501. portal.HandleMatrixReadReceipt(user, eventID, time.UnixMilli(receipt.Timestamp), true)
  502. }
  503. }
  504. }
  505. }
  506. func (mx *MatrixHandler) HandleTyping(evt *event.Event) {
  507. portal := mx.bridge.GetPortalByMXID(evt.RoomID)
  508. if portal == nil {
  509. return
  510. }
  511. portal.HandleMatrixTyping(evt.Content.AsTyping().UserIDs)
  512. }