2020-08-10 00:02:07 +02:00
|
|
|
import logging
|
|
|
|
|
2022-07-06 00:54:13 +02:00
|
|
|
from diskcache import Cache
|
2021-01-10 04:30:07 +01:00
|
|
|
from nio import (
|
|
|
|
AsyncClient,
|
|
|
|
InviteMemberEvent,
|
|
|
|
JoinError,
|
2022-10-26 13:25:47 +02:00
|
|
|
KeyVerificationCancel,
|
|
|
|
KeyVerificationKey,
|
|
|
|
KeyVerificationMac,
|
|
|
|
KeyVerificationStart,
|
2022-08-08 12:38:09 +02:00
|
|
|
LocalProtocolError,
|
2021-01-10 04:30:07 +01:00
|
|
|
MatrixRoom,
|
|
|
|
MegolmEvent,
|
2022-07-10 14:42:23 +02:00
|
|
|
RedactionEvent,
|
2021-01-10 04:30:07 +01:00
|
|
|
RoomGetEventError,
|
|
|
|
RoomMessageText,
|
2022-08-08 12:38:09 +02:00
|
|
|
SendRetryError,
|
2022-10-26 13:25:47 +02:00
|
|
|
ToDeviceError,
|
2021-01-10 04:30:07 +01:00
|
|
|
UnknownEvent,
|
|
|
|
)
|
2020-08-10 00:02:07 +02:00
|
|
|
|
2022-07-04 01:03:24 +02:00
|
|
|
from matrix_alertbot.alertmanager import AlertmanagerClient
|
2022-07-10 13:13:32 +02:00
|
|
|
from matrix_alertbot.chat_functions import strip_fallback
|
2022-07-26 19:33:04 +02:00
|
|
|
from matrix_alertbot.command import AckAlertCommand, CommandFactory, UnackAlertCommand
|
2022-06-13 20:55:01 +02:00
|
|
|
from matrix_alertbot.config import Config
|
2019-09-25 14:26:29 +02:00
|
|
|
|
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
|
|
|
|
|
2021-01-10 04:30:07 +01:00
|
|
|
class Callbacks:
|
2022-07-04 01:03:24 +02:00
|
|
|
def __init__(
|
|
|
|
self,
|
2022-08-08 00:28:36 +02:00
|
|
|
matrix_client: AsyncClient,
|
|
|
|
alertmanager_client: AlertmanagerClient,
|
2022-07-08 21:11:25 +02:00
|
|
|
cache: Cache,
|
2022-07-04 01:03:24 +02:00
|
|
|
config: Config,
|
|
|
|
):
|
2019-09-25 14:26:29 +02:00
|
|
|
"""
|
|
|
|
Args:
|
2021-01-10 04:33:59 +01:00
|
|
|
client: nio client used to interact with matrix.
|
2019-09-25 14:26:29 +02:00
|
|
|
|
2022-07-04 01:03:24 +02:00
|
|
|
cache: Bot cache.
|
|
|
|
|
|
|
|
alertmanager: Client used to interact with alertmanager.
|
2019-09-25 14:26:29 +02:00
|
|
|
|
2021-01-10 04:33:59 +01:00
|
|
|
config: Bot configuration parameters.
|
2019-09-25 14:26:29 +02:00
|
|
|
"""
|
2022-08-08 00:28:36 +02:00
|
|
|
self.matrix_client = matrix_client
|
2022-07-08 21:11:25 +02:00
|
|
|
self.cache = cache
|
2022-08-08 00:28:36 +02:00
|
|
|
self.alertmanager_client = alertmanager_client
|
2019-10-04 15:44:19 +02:00
|
|
|
self.config = config
|
|
|
|
self.command_prefix = config.command_prefix
|
2019-09-25 14:26:29 +02:00
|
|
|
|
2021-01-10 04:30:07 +01:00
|
|
|
async def message(self, room: MatrixRoom, event: RoomMessageText) -> None:
|
2019-09-25 14:26:29 +02:00
|
|
|
"""Callback for when a message event is received
|
|
|
|
|
|
|
|
Args:
|
2021-01-10 04:33:59 +01:00
|
|
|
room: The room the event came from.
|
2019-09-25 14:26:29 +02:00
|
|
|
|
2021-01-10 04:33:59 +01:00
|
|
|
event: The event defining the message.
|
2019-09-25 14:26:29 +02:00
|
|
|
"""
|
|
|
|
# Ignore messages from ourselves
|
2022-08-08 00:28:36 +02:00
|
|
|
if event.sender == self.matrix_client.user:
|
2019-09-25 14:26:29 +02:00
|
|
|
return
|
|
|
|
|
2022-07-04 01:03:24 +02:00
|
|
|
# Ignore messages from unauthorized room
|
2022-07-28 14:37:23 +02:00
|
|
|
if room.room_id not in self.config.allowed_rooms:
|
2022-07-04 01:03:24 +02:00
|
|
|
return
|
|
|
|
|
2022-07-26 19:33:04 +02:00
|
|
|
# Extract the message text
|
|
|
|
msg = strip_fallback(event.body)
|
|
|
|
|
2019-09-25 14:26:29 +02:00
|
|
|
logger.debug(
|
|
|
|
f"Bot message received for room {room.display_name} | "
|
|
|
|
f"{room.user_name(event.sender)}: {msg}"
|
|
|
|
)
|
2019-10-04 15:44:19 +02:00
|
|
|
# Process as message if in a public room without command prefix
|
2019-09-25 14:26:29 +02:00
|
|
|
has_command_prefix = msg.startswith(self.command_prefix)
|
2022-07-04 01:03:24 +02:00
|
|
|
if not has_command_prefix:
|
|
|
|
logger.debug(
|
2022-07-26 19:33:04 +02:00
|
|
|
f"Cannot process message: Command prefix {self.command_prefix} not provided."
|
2022-07-04 01:03:24 +02:00
|
|
|
)
|
2019-09-25 14:26:29 +02:00
|
|
|
return
|
|
|
|
|
2022-07-10 14:06:36 +02:00
|
|
|
source_content = event.source["content"]
|
2022-07-26 19:33:04 +02:00
|
|
|
reacted_to_event_id = (
|
2022-07-16 23:08:12 +02:00
|
|
|
source_content.get("m.relates_to", {})
|
|
|
|
.get("m.in_reply_to", {})
|
|
|
|
.get("event_id")
|
|
|
|
)
|
|
|
|
|
2022-07-26 19:33:04 +02:00
|
|
|
if reacted_to_event_id is not None:
|
|
|
|
logger.debug(f"Command in reply to event ID {reacted_to_event_id}")
|
2022-07-10 14:06:36 +02:00
|
|
|
|
2022-07-04 01:03:24 +02:00
|
|
|
# Remove the command prefix
|
2022-07-16 23:08:12 +02:00
|
|
|
cmd = msg[len(self.command_prefix) :]
|
2022-07-16 23:20:25 +02:00
|
|
|
try:
|
|
|
|
command = CommandFactory.create(
|
|
|
|
cmd,
|
2022-08-08 00:28:36 +02:00
|
|
|
self.matrix_client,
|
2022-07-16 23:20:25 +02:00
|
|
|
self.cache,
|
2022-08-08 00:28:36 +02:00
|
|
|
self.alertmanager_client,
|
2022-07-16 23:20:25 +02:00
|
|
|
self.config,
|
|
|
|
room,
|
|
|
|
event.sender,
|
|
|
|
event.event_id,
|
2022-07-26 19:33:04 +02:00
|
|
|
reacted_to_event_id,
|
2022-07-16 23:20:25 +02:00
|
|
|
)
|
|
|
|
except TypeError as e:
|
2022-07-26 19:33:04 +02:00
|
|
|
logging.error(f"Cannot process command '{cmd}': {e}")
|
2022-07-16 23:20:25 +02:00
|
|
|
return
|
|
|
|
|
2022-08-08 12:38:09 +02:00
|
|
|
try:
|
|
|
|
await command.process()
|
|
|
|
except (SendRetryError, LocalProtocolError) as e:
|
|
|
|
logger.exception(f"Unable to send message to {room.room_id}", exc_info=e)
|
2019-09-25 14:26:29 +02:00
|
|
|
|
2021-01-10 04:30:07 +01:00
|
|
|
async def invite(self, room: MatrixRoom, event: InviteMemberEvent) -> None:
|
|
|
|
"""Callback for when an invite is received. Join the room specified in the invite.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
room: The room that we are invited to.
|
|
|
|
|
|
|
|
event: The invite event.
|
|
|
|
"""
|
2022-07-04 01:03:24 +02:00
|
|
|
# Ignore invites from unauthorized room
|
2022-07-28 14:37:23 +02:00
|
|
|
if room.room_id not in self.config.allowed_rooms:
|
2022-07-04 01:03:24 +02:00
|
|
|
return
|
|
|
|
|
2019-09-25 14:26:29 +02:00
|
|
|
logger.debug(f"Got invite to {room.room_id} from {event.sender}.")
|
|
|
|
|
|
|
|
# Attempt to join 3 times before giving up
|
|
|
|
for attempt in range(3):
|
2022-08-08 00:28:36 +02:00
|
|
|
result = await self.matrix_client.join(room.room_id)
|
2019-09-25 14:26:29 +02:00
|
|
|
if type(result) == JoinError:
|
|
|
|
logger.error(
|
|
|
|
f"Error joining room {room.room_id} (attempt %d): %s",
|
2020-08-10 00:02:07 +02:00
|
|
|
attempt,
|
|
|
|
result.message,
|
2019-09-25 14:26:29 +02:00
|
|
|
)
|
|
|
|
else:
|
|
|
|
break
|
2020-06-23 03:11:31 +02:00
|
|
|
else:
|
|
|
|
logger.error("Unable to join room: %s", room.room_id)
|
2019-09-25 14:26:29 +02:00
|
|
|
|
2020-06-23 03:11:31 +02:00
|
|
|
# Successfully joined room
|
|
|
|
logger.info(f"Joined {room.room_id}")
|
2021-01-04 05:47:27 +01:00
|
|
|
|
2021-10-25 21:28:38 +02:00
|
|
|
async def invite_event_filtered_callback(
|
|
|
|
self, room: MatrixRoom, event: InviteMemberEvent
|
|
|
|
) -> None:
|
|
|
|
"""
|
|
|
|
Since the InviteMemberEvent is fired for every m.room.member state received
|
|
|
|
in a sync response's `rooms.invite` section, we will receive some that are
|
|
|
|
not actually our own invite event (such as the inviter's membership).
|
|
|
|
This makes sure we only call `callbacks.invite` with our own invite events.
|
|
|
|
"""
|
2022-08-08 00:28:36 +02:00
|
|
|
if event.state_key == self.matrix_client.user_id:
|
2021-10-25 21:28:38 +02:00
|
|
|
# This is our own membership (invite) event
|
|
|
|
await self.invite(room, event)
|
|
|
|
|
2021-01-04 05:47:27 +01:00
|
|
|
async def _reaction(
|
2022-07-16 23:08:12 +02:00
|
|
|
self, room: MatrixRoom, event: UnknownEvent, alert_event_id: str
|
2021-01-10 04:30:07 +01:00
|
|
|
) -> None:
|
2021-01-04 05:47:27 +01:00
|
|
|
"""A reaction was sent to one of our messages. Let's send a reply acknowledging it.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
room: The room the reaction was sent in.
|
|
|
|
|
|
|
|
event: The reaction event.
|
|
|
|
|
|
|
|
reacted_to_id: The event ID that the reaction points to.
|
|
|
|
"""
|
2022-07-04 01:03:24 +02:00
|
|
|
# Ignore reactions from unauthorized room
|
2022-07-28 14:37:23 +02:00
|
|
|
if room.room_id not in self.config.allowed_rooms:
|
2022-07-04 01:03:24 +02:00
|
|
|
return
|
|
|
|
|
|
|
|
# Ignore reactions from ourselves
|
2022-08-08 00:28:36 +02:00
|
|
|
if event.sender == self.matrix_client.user:
|
2022-07-04 01:03:24 +02:00
|
|
|
return
|
|
|
|
|
2022-07-10 13:13:32 +02:00
|
|
|
reaction = event.source.get("content", {}).get("m.relates_to", {}).get("key")
|
|
|
|
logger.debug(f"Got reaction {reaction} to {room.room_id} from {event.sender}.")
|
|
|
|
|
2022-07-28 17:39:47 +02:00
|
|
|
if reaction not in self.config.allowed_reactions:
|
2022-07-10 13:13:32 +02:00
|
|
|
logger.warning(f"Uknown duration reaction {reaction}")
|
|
|
|
return
|
2021-01-04 05:47:27 +01:00
|
|
|
|
|
|
|
# Get the original event that was reacted to
|
2022-08-08 00:28:36 +02:00
|
|
|
event_response = await self.matrix_client.room_get_event(
|
|
|
|
room.room_id, alert_event_id
|
|
|
|
)
|
2021-01-04 05:47:27 +01:00
|
|
|
if isinstance(event_response, RoomGetEventError):
|
2022-07-16 23:08:12 +02:00
|
|
|
logger.warning(
|
|
|
|
f"Error getting event that was reacted to ({alert_event_id})"
|
|
|
|
)
|
2021-01-04 05:47:27 +01:00
|
|
|
return
|
|
|
|
reacted_to_event = event_response.event
|
|
|
|
|
|
|
|
# Only acknowledge reactions to events that we sent
|
|
|
|
if reacted_to_event.sender != self.config.user_id:
|
|
|
|
return
|
|
|
|
|
2022-07-26 19:33:04 +02:00
|
|
|
# Send a message acknowledging the reaction
|
|
|
|
command = AckAlertCommand(
|
2022-08-08 00:28:36 +02:00
|
|
|
self.matrix_client,
|
2022-07-26 19:33:04 +02:00
|
|
|
self.cache,
|
2022-08-08 00:28:36 +02:00
|
|
|
self.alertmanager_client,
|
2022-07-26 19:33:04 +02:00
|
|
|
self.config,
|
|
|
|
room,
|
|
|
|
event.sender,
|
2022-07-10 14:49:01 +02:00
|
|
|
event.event_id,
|
2022-07-26 19:33:04 +02:00
|
|
|
alert_event_id,
|
2022-07-10 14:49:01 +02:00
|
|
|
)
|
|
|
|
|
2022-08-08 12:38:09 +02:00
|
|
|
try:
|
|
|
|
await command.process()
|
|
|
|
except (SendRetryError, LocalProtocolError) as e:
|
|
|
|
logger.exception(f"Unable to send message to {room.room_id}", exc_info=e)
|
2021-01-04 05:47:27 +01:00
|
|
|
|
2022-07-10 14:59:21 +02:00
|
|
|
async def redaction(self, room: MatrixRoom, event: RedactionEvent) -> None:
|
|
|
|
# Ignore events from unauthorized room
|
2022-07-28 14:37:23 +02:00
|
|
|
if room.room_id not in self.config.allowed_rooms:
|
2022-07-10 14:59:21 +02:00
|
|
|
return
|
|
|
|
|
|
|
|
# Ignore redactions from ourselves
|
2022-08-08 00:28:36 +02:00
|
|
|
if event.sender == self.matrix_client.user:
|
2022-07-10 14:59:21 +02:00
|
|
|
return
|
|
|
|
|
2022-07-28 10:35:11 +02:00
|
|
|
logger.debug(f"Received event to remove event ID {event.redacts}")
|
2022-07-16 23:20:25 +02:00
|
|
|
|
2022-07-26 19:33:04 +02:00
|
|
|
command = UnackAlertCommand(
|
2022-08-08 00:28:36 +02:00
|
|
|
self.matrix_client,
|
2022-07-26 19:33:04 +02:00
|
|
|
self.cache,
|
2022-08-08 00:28:36 +02:00
|
|
|
self.alertmanager_client,
|
2022-07-26 19:33:04 +02:00
|
|
|
self.config,
|
|
|
|
room,
|
|
|
|
event.sender,
|
2022-07-28 10:35:11 +02:00
|
|
|
event.event_id,
|
2022-07-26 19:33:04 +02:00
|
|
|
event.redacts,
|
|
|
|
)
|
2022-08-08 12:38:09 +02:00
|
|
|
try:
|
|
|
|
await command.process()
|
|
|
|
except (SendRetryError, LocalProtocolError) as e:
|
|
|
|
logger.exception(f"Unable to send message to {room.room_id}", exc_info=e)
|
2022-07-10 14:59:21 +02:00
|
|
|
|
2021-01-10 04:30:07 +01:00
|
|
|
async def decryption_failure(self, room: MatrixRoom, event: MegolmEvent) -> None:
|
|
|
|
"""Callback for when an event fails to decrypt. Inform the user.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
room: The room that the event that we were unable to decrypt is in.
|
|
|
|
|
|
|
|
event: The encrypted event that we were unable to decrypt.
|
|
|
|
"""
|
2022-07-04 01:03:24 +02:00
|
|
|
# Ignore events from unauthorized room
|
2022-07-28 14:37:23 +02:00
|
|
|
if room.room_id not in self.config.allowed_rooms:
|
2022-07-04 01:03:24 +02:00
|
|
|
return
|
|
|
|
|
2021-01-10 03:58:39 +01:00
|
|
|
logger.error(
|
|
|
|
f"Failed to decrypt event '{event.event_id}' in room '{room.room_id}'!"
|
|
|
|
f"\n\n"
|
|
|
|
f"Tip: try using a different device ID in your config file and restart."
|
|
|
|
f"\n\n"
|
|
|
|
f"If all else fails, delete your store directory and let the bot recreate "
|
|
|
|
f"it (your reminders will NOT be deleted, but the bot may respond to existing "
|
|
|
|
f"commands a second time)."
|
|
|
|
)
|
|
|
|
|
2022-10-26 13:25:47 +02:00
|
|
|
async def key_verification_start(self, event: KeyVerificationStart):
|
|
|
|
"""Callback for when somebody wants to verify our devices."""
|
|
|
|
if "emoji" not in event.short_authentication_string:
|
|
|
|
logger.error(
|
|
|
|
f"Unable to use emoji verification with {event.sender} on device {event.from_device}."
|
|
|
|
)
|
|
|
|
return
|
|
|
|
|
|
|
|
event_response = await self.matrix_client.accept_key_verification(
|
|
|
|
event.transaction_id
|
|
|
|
)
|
|
|
|
if isinstance(event_response, ToDeviceError):
|
|
|
|
logger.error(
|
|
|
|
f"Unable to start key verification with {event.sender} on device {event.from_device}, got error: {event_response}."
|
|
|
|
)
|
|
|
|
return
|
|
|
|
|
|
|
|
sas = self.matrix_client.key_verifications[event.transaction_id]
|
|
|
|
|
|
|
|
todevice_msg = sas.share_key()
|
|
|
|
event_response = await self.matrix_client.to_device(todevice_msg)
|
|
|
|
if isinstance(event_response, ToDeviceError):
|
|
|
|
logger.error(
|
|
|
|
f"Unable to share key with {event.sender} on device {event.from_device}, got error: {event_response}."
|
|
|
|
)
|
|
|
|
return
|
|
|
|
|
|
|
|
async def key_verification_cancel(self, event: KeyVerificationCancel):
|
|
|
|
# There is no need to issue a
|
|
|
|
# client.cancel_key_verification(tx_id, reject=False)
|
|
|
|
# here. The SAS flow is already cancelled.
|
|
|
|
# We only need to inform the user.
|
|
|
|
logger.info(
|
|
|
|
f"Verification has been cancelled by {event.sender} for reason: {event.reason}."
|
|
|
|
)
|
|
|
|
|
|
|
|
async def key_verification_accept(self, event: KeyVerificationKey):
|
|
|
|
sas = self.matrix_client.key_verifications[event.transaction_id]
|
|
|
|
emoji_list = sas.get_emoji()
|
2022-10-26 14:53:29 +02:00
|
|
|
emoji_str = " ".join(emoji for emoji, alt_text in emoji_list)
|
2022-10-26 13:25:47 +02:00
|
|
|
|
|
|
|
logger.info(
|
2022-10-26 14:53:29 +02:00
|
|
|
f"Received request to verify emojis from {event.sender}: {emoji_str}"
|
2022-10-26 13:25:47 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
event_response = await self.matrix_client.confirm_short_auth_string(
|
|
|
|
event.transaction_id
|
|
|
|
)
|
|
|
|
if isinstance(event_response, ToDeviceError):
|
|
|
|
logger.error(
|
|
|
|
f"Unable to confirm emoji verification with {event.sender}, got error: {event_response}."
|
|
|
|
)
|
|
|
|
|
|
|
|
# FIXME: We should allow manual cancel or reject
|
|
|
|
# event_response = await self.matrix_client.cancel_key_verification(
|
|
|
|
# event.transaction_id, reject=True
|
|
|
|
# )
|
|
|
|
# if isinstance(event_response, ToDeviceError):
|
|
|
|
# logger.error(
|
|
|
|
# f"Unable to reject emoji verification with {event.sender}, got error: {event_response}."
|
|
|
|
# )
|
|
|
|
#
|
|
|
|
# event_response = await self.matrix_client.cancel_key_verification(
|
|
|
|
# event.transaction_id, reject=False
|
|
|
|
# )
|
|
|
|
# if isinstance(event_response, ToDeviceError):
|
|
|
|
# logger.error(
|
|
|
|
# f"Unable to cancel emoji verification with {event.sender}, got error: {event_response}."
|
|
|
|
# )
|
|
|
|
|
|
|
|
async def key_verification_end(self, event: KeyVerificationMac):
|
|
|
|
sas = self.matrix_client.key_verifications[event.transaction_id]
|
|
|
|
try:
|
|
|
|
todevice_msg = sas.get_mac()
|
|
|
|
except LocalProtocolError as e:
|
|
|
|
# e.g. it might have been cancelled by ourselves
|
|
|
|
logger.warn(f"Unable to conclude verification with {event.sender}: {e}.")
|
|
|
|
return
|
|
|
|
|
|
|
|
event_response = await self.matrix_client.to_device(todevice_msg)
|
|
|
|
if isinstance(event_response, ToDeviceError):
|
|
|
|
logger.error(
|
|
|
|
f"Unable to conclude verification with {event.sender}, got error: {event_response}."
|
|
|
|
)
|
|
|
|
return
|
|
|
|
|
2022-10-26 14:53:29 +02:00
|
|
|
verified_devices = " ".join(sas.verified_devices)
|
2022-10-26 13:25:47 +02:00
|
|
|
logger.info(
|
2022-10-26 14:53:29 +02:00
|
|
|
f"Successfully verified devices from {event.sender}: {verified_devices}"
|
2022-10-26 13:25:47 +02:00
|
|
|
)
|
|
|
|
|
2021-01-10 04:30:07 +01:00
|
|
|
async def unknown(self, room: MatrixRoom, event: UnknownEvent) -> None:
|
2021-01-04 05:47:27 +01:00
|
|
|
"""Callback for when an event with a type that is unknown to matrix-nio is received.
|
2021-01-10 04:30:07 +01:00
|
|
|
Currently this is used for reaction events, which are not yet part of a released
|
|
|
|
matrix spec (and are thus unknown to nio).
|
2021-01-04 05:47:27 +01:00
|
|
|
|
|
|
|
Args:
|
|
|
|
room: The room the reaction was sent in.
|
|
|
|
|
2021-01-10 04:30:07 +01:00
|
|
|
event: The event itself.
|
2021-01-04 05:47:27 +01:00
|
|
|
"""
|
2022-07-04 01:03:24 +02:00
|
|
|
# Ignore events from unauthorized room
|
2022-07-28 14:37:23 +02:00
|
|
|
if room.room_id not in self.config.allowed_rooms:
|
2022-07-04 01:03:24 +02:00
|
|
|
return
|
|
|
|
|
2021-01-04 05:47:27 +01:00
|
|
|
if event.type == "m.reaction":
|
|
|
|
# Get the ID of the event this was a reaction to
|
|
|
|
relation_dict = event.source.get("content", {}).get("m.relates_to", {})
|
|
|
|
|
2022-07-10 14:06:36 +02:00
|
|
|
reacted_to_id = relation_dict.get("event_id")
|
|
|
|
if reacted_to_id and relation_dict.get("rel_type") == "m.annotation":
|
|
|
|
await self._reaction(room, event, reacted_to_id)
|
2021-01-10 04:30:07 +01:00
|
|
|
return
|
2021-01-04 05:47:27 +01:00
|
|
|
|
|
|
|
logger.debug(
|
|
|
|
f"Got unknown event with type to {event.type} from {event.sender} in {room.room_id}."
|
|
|
|
)
|