Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

client,bridgev2: Add support for MSC4190 #288

Closed
wants to merge 1 commit into from
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions appservice/registration.go
Original file line number Diff line number Diff line change
Expand Up @@ -29,6 +29,7 @@ type Registration struct {
SoruEphemeralEvents bool `yaml:"de.sorunome.msc2409.push_ephemeral,omitempty" json:"de.sorunome.msc2409.push_ephemeral,omitempty"`
EphemeralEvents bool `yaml:"push_ephemeral,omitempty" json:"push_ephemeral,omitempty"`
MSC3202 bool `yaml:"org.matrix.msc3202,omitempty" json:"org.matrix.msc3202,omitempty"`
MSC4190 bool `yaml:"io.element.msc4190,omitempty" json:"io.element.msc4190,omitempty"`
}

// CreateRegistration creates a Registration with random appservice and homeserver tokens.
Expand Down
2 changes: 2 additions & 0 deletions bridgev2/bridgeconfig/appservice.go
Original file line number Diff line number Diff line change
Expand Up @@ -34,6 +34,7 @@ type AppserviceConfig struct {

EphemeralEvents bool `yaml:"ephemeral_events"`
AsyncTransactions bool `yaml:"async_transactions"`
MSC4190 bool `yaml:"msc4190"`

UsernameTemplate string `yaml:"username_template"`
usernameTemplate *template.Template `yaml:"-"`
Expand Down Expand Up @@ -77,6 +78,7 @@ func (asc *AppserviceConfig) copyToRegistration(registration *appservice.Registr
registration.RateLimited = &falseVal
registration.EphemeralEvents = asc.EphemeralEvents
registration.SoruEphemeralEvents = asc.EphemeralEvents
registration.MSC4190 = asc.MSC4190
}

// GenerateRegistration generates a registration file for the homeserver.
Expand Down
1 change: 1 addition & 0 deletions bridgev2/bridgeconfig/upgrade.go
Original file line number Diff line number Diff line change
Expand Up @@ -78,6 +78,7 @@ func doUpgrade(helper up.Helper) {
helper.Copy(up.Str, "appservice", "bot", "avatar")
helper.Copy(up.Bool, "appservice", "ephemeral_events")
helper.Copy(up.Bool, "appservice", "async_transactions")
helper.Copy(up.Bool, "appservice", "msc4190")
helper.Copy(up.Str, "appservice", "as_token")
helper.Copy(up.Str, "appservice", "hs_token")
helper.Copy(up.Str, "appservice", "username_template")
Expand Down
21 changes: 16 additions & 5 deletions bridgev2/matrix/crypto.go
Original file line number Diff line number Diff line change
Expand Up @@ -241,23 +241,34 @@ func (helper *CryptoHelper) loginBot(ctx context.Context) (*mautrix.Client, bool
// Create a new client instance with the default AS settings (including as_token),
// the Login call will then override the access token in the client.
client := helper.bridge.AS.NewMautrixClient(helper.bridge.AS.BotMXID())

initialDeviceDisplayName := fmt.Sprintf("%s bridge", helper.bridge.Bridge.Network.GetName().DisplayName)
if helper.bridge.Config.AppService.MSC4190 {
helper.log.Debug().Msg("Creating bot device with msc4190")
err = client.CreateDeviceMSC4190(ctx, deviceID, initialDeviceDisplayName)
if err != nil {
return nil, deviceID != "", fmt.Errorf("failed to create device for bridge bot: %w", err)
}
helper.store.DeviceID = client.DeviceID
return client, deviceID != "", nil
}

flows, err := client.GetLoginFlows(ctx)
if err != nil {
return nil, deviceID != "", fmt.Errorf("failed to get supported login flows: %w", err)
} else if !flows.HasFlow(mautrix.AuthTypeAppservice) {
return nil, deviceID != "", fmt.Errorf("homeserver does not support appservice login")
}

resp, err := client.Login(ctx, &mautrix.ReqLogin{
Type: mautrix.AuthTypeAppservice,
Identifier: mautrix.UserIdentifier{
Type: mautrix.IdentifierTypeUser,
User: string(helper.bridge.AS.BotMXID()),
},
DeviceID: deviceID,
StoreCredentials: true,

// TODO find proper bridge name
InitialDeviceDisplayName: "Megabridge", // fmt.Sprintf("%s bridge", helper.bridge.ProtocolName),
DeviceID: deviceID,
StoreCredentials: true,
InitialDeviceDisplayName: initialDeviceDisplayName,
})
if err != nil {
return nil, deviceID != "", fmt.Errorf("failed to log in as bridge bot: %w", err)
Expand Down
4 changes: 4 additions & 0 deletions bridgev2/matrix/mxmain/example-config.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -186,6 +186,10 @@ appservice:
# However, messages will not be guaranteed to be bridged in the same order they were sent in.
# This value doesn't affect the registration file.
async_transactions: false
# Wether to use MSC4190 to create DeviceIDs for ghost users.
# Requires the homeserver to support MSC4190 and the device masquerading parts of MSC3202.
# Required when using encryption on the bridge and OIDC Auth (MSC3861) on the homeserver.
msc4190: false

# Authentication tokens for AS <-> HS communication. Autogenerated; do not modify.
as_token: "This value is generated when generating the registration"
Expand Down
23 changes: 23 additions & 0 deletions client.go
Original file line number Diff line number Diff line change
Expand Up @@ -21,6 +21,7 @@ import (

"github.com/rs/zerolog"
"go.mau.fi/util/ptr"
"go.mau.fi/util/random"
"go.mau.fi/util/retryafter"
"golang.org/x/exp/maps"

Expand Down Expand Up @@ -897,6 +898,28 @@ func (cli *Client) Login(ctx context.Context, req *ReqLogin) (resp *RespLogin, e
return
}

// Create a Device for a user of the homeserver using appservice interface defined in MSC4190
func (cli *Client) CreateDeviceMSC4190(ctx context.Context, deviceID id.DeviceID, initialDispalyName string) (err error) {
if len(deviceID) == 0 {
deviceID = id.DeviceID(random.String(10))
}
if !cli.SetAppServiceUserID {
return fmt.Errorf("CreateDeviceMSC4190 requires SetAppServiceUserID to be enabled")
}
if cli.AccessToken == "" {
return fmt.Errorf("CreateDeviceMSC4190 requires The AS AccessToken token to be set as the client AccessToken")
}
_, err = cli.MakeRequest(ctx, http.MethodPut, cli.BuildClientURL("v3", "devices", deviceID), ReqPutDevice{
DisplayName: initialDispalyName,
}, nil)
if err != nil {
return err
}
cli.DeviceID = deviceID
cli.SetAppServiceDeviceID = true
return nil
}

// Logout the current user. See https://spec.matrix.org/v1.2/client-server-api/#post_matrixclientv3logout
// This does not clear the credentials from the client instance. See ClearCredentials() instead.
func (cli *Client) Logout(ctx context.Context) (resp *RespLogout, err error) {
Expand Down
3 changes: 3 additions & 0 deletions requests.go
Original file line number Diff line number Diff line change
Expand Up @@ -90,6 +90,9 @@ type ReqLogin struct {
// Whether or not the returned .well-known data should update the homeserver URL in the Client
StoreHomeserverURL bool `json:"-"`
}
type ReqPutDevice struct {
DisplayName string `json:"display_name,omitempty"`
}

type ReqUIAuthFallback struct {
Session string `json:"session"`
Expand Down