UNPKG

@vector-im/matrix-bot-sdk

Version:

TypeScript/JavaScript SDK for Matrix bots and appservices

902 lines 40.4 kB
"use strict"; Object.defineProperty(exports, "__esModule", { value: true }); exports.Appservice = void 0; const express = require("express"); const events_1 = require("events"); const morgan = require("morgan"); const LRU = require("lru-cache"); const querystring_1 = require("querystring"); const crypto_1 = require("crypto"); const Intent_1 = require("./Intent"); const __1 = require(".."); const MatrixBridge_1 = require("./MatrixBridge"); const EDU_ANNOTATION_KEY = "io.t2bot.sdk.bot.type"; var EduAnnotation; (function (EduAnnotation) { EduAnnotation["ToDevice"] = "to_device"; EduAnnotation["Ephemeral"] = "ephemeral"; })(EduAnnotation || (EduAnnotation = {})); /** * Represents an application service. This provides helper utilities such as tracking * of user intents (clients that are aware of their membership in rooms). * @category Application services */ class Appservice extends events_1.EventEmitter { options; /** * The metrics instance for this appservice. This will raise all metrics * from this appservice instance as well as any intents/MatrixClients created * by the appservice. */ metrics = new __1.Metrics(); userPrefix; aliasPrefix; registration; storage; cryptoStorage; bridgeInstance = new MatrixBridge_1.MatrixBridge(this); pingRequest; app = express(); appServer; intentsCache; eventProcessors = {}; pendingTransactions = new Map(); /** * A cache of intents for the purposes of decrypting rooms */ cryptoClientForRoomId; /** * Creates a new application service. * @param {IAppserviceOptions} options The options for the application service. */ constructor(options) { super(); this.options = options; options.joinStrategy = new __1.AppserviceJoinRoomStrategy(options.joinStrategy, this); if (!options.intentOptions) options.intentOptions = {}; if (options.intentOptions.maxAgeMs === undefined) options.intentOptions.maxAgeMs = 60 * 60 * 1000; if (options.intentOptions.maxCached === undefined) options.intentOptions.maxCached = 10000; this.intentsCache = new LRU.LRUCache({ max: options.intentOptions.maxCached, ttl: options.intentOptions.maxAgeMs, }); this.cryptoClientForRoomId = new LRU.LRUCache({ max: options.intentOptions.maxCached, ttl: options.intentOptions.maxAgeMs, }); this.registration = options.registration; // If protocol is not defined, define an empty array. if (!this.registration.protocols) { this.registration.protocols = []; } this.storage = options.storage || new __1.MemoryStorageProvider(); options.storage = this.storage; this.cryptoStorage = options.cryptoStorage; this.app.use(express.json({ limit: Number.MAX_SAFE_INTEGER })); // disable limits, use a reverse proxy morgan.token('url-safe', (req) => `${req.path}?${(0, querystring_1.stringify)((0, __1.redactObjectForLogging)(req.query ?? {}))}`); this.app.use(morgan( // Same as "combined", but with sensitive values removed from requests. ':remote-addr - :remote-user [:date[clf]] ":method :url-safe HTTP/:http-version" :status :res[content-length] ":referrer" ":user-agent"', { stream: { write: __1.LogService.info.bind(__1.LogService, 'Appservice') } })); // ETag headers break the tests sometimes, and we don't actually need them anyways for // appservices - none of this should be cached. this.app.set('etag', false); this.app.get("/users/:userId", this.onUser.bind(this)); this.app.get("/rooms/:roomAlias", this.onRoomAlias.bind(this)); this.app.put("/transactions/:txnId", this.onTransaction.bind(this)); this.app.get("/_matrix/app/v1/users/:userId", this.onUser.bind(this)); this.app.get("/_matrix/app/v1/rooms/:roomAlias", this.onRoomAlias.bind(this)); this.app.put("/_matrix/app/v1/transactions/:txnId", this.onTransaction.bind(this)); this.app.get("/_matrix/app/v1/thirdparty/protocol/:protocol", this.onThirdpartyProtocol.bind(this)); this.app.get("/_matrix/app/v1/thirdparty/user/:protocol", this.onThirdpartyUser.bind(this)); this.app.get("/_matrix/app/v1/thirdparty/user", this.onThirdpartyUser.bind(this)); this.app.get("/_matrix/app/v1/thirdparty/location/:protocol", this.onThirdpartyLocation.bind(this)); this.app.get("/_matrix/app/v1/thirdparty/location", this.onThirdpartyLocation.bind(this)); this.app.post("/_matrix/app/unstable/org.matrix.msc3983/keys/claim", this.onKeysClaim.bind(this)); this.app.post("/_matrix/app/unstable/org.matrix.msc3984/keys/query", this.onKeysQuery.bind(this)); // Workaround for https://github.com/matrix-org/synapse/issues/3780 this.app.post("/_matrix/app/v1/unstable/org.matrix.msc3983/keys/claim", this.onKeysClaim.bind(this)); this.app.post("/unstable/org.matrix.msc3983/keys/claim", this.onKeysClaim.bind(this)); this.app.post("/_matrix/app/v1/unstable/org.matrix.msc3984/keys/query", this.onKeysQuery.bind(this)); this.app.post("/unstable/org.matrix.msc3984/keys/query", this.onKeysQuery.bind(this)); this.app.post("/_matrix/app/v1/ping", this.onPing.bind(this)); // We register the 404 handler in the `begin()` function to allow consumers to add their own endpoints. if (!this.registration.namespaces || !this.registration.namespaces.users || this.registration.namespaces.users.length === 0) { throw new Error("No user namespaces in registration"); } if (this.registration.namespaces.users.length !== 1) { throw new Error("Too many user namespaces registered: expecting exactly one"); } const userPrefix = (this.registration.namespaces.users[0].regex || "").split(":")[0]; if (!userPrefix.endsWith(".*") && !userPrefix.endsWith(".+")) { this.userPrefix = null; } else { this.userPrefix = userPrefix.substring(0, userPrefix.length - 2); // trim off the .* part } if (!this.registration.namespaces?.aliases || this.registration.namespaces.aliases.length !== 1) { this.aliasPrefix = null; } else { this.aliasPrefix = (this.registration.namespaces.aliases[0].regex || "").split(":")[0]; if (!this.aliasPrefix.endsWith(".*") && !this.aliasPrefix.endsWith(".+")) { this.aliasPrefix = null; } else { this.aliasPrefix = this.aliasPrefix.substring(0, this.aliasPrefix.length - 2); // trim off the .* part } } } /** * Gets the express app instance which is serving requests. Not recommended for * general usage, but may be used to append routes to the web server. */ get expressAppInstance() { return this.app; } /** * Gets the bridge-specific APIs for this application service. */ get bridge() { return this.bridgeInstance; } /** * Get the application service's "bot" user ID (the sender_localpart). */ get botUserId() { return this.getUserId(this.registration.sender_localpart); } /** * Get the application service's "bot" Intent (the sender_localpart). * @returns {Intent} The intent for the application service itself. */ get botIntent() { return this.getIntentForUserId(this.botUserId); } /** * Get the application service's "bot" MatrixClient (the sender_localpart). * Normally the botIntent should be used to ensure that the bot user is safely * handled. * @returns {MatrixClient} The client for the application service itself. */ get botClient() { return this.botIntent.underlyingClient; } /** * Starts the application service, opening the bind address to begin processing requests. * @returns {Promise<void>} resolves when started */ begin() { return new Promise((resolve, reject) => { // Per constructor, all other endpoints should 404. // Technically, according to https://spec.matrix.org/v1.6/application-service-api/#unknown-routes we should // be returning 405 for *known* endpoints with the wrong method. this.app.all("*", (req, res) => { res.status(404).json({ errcode: "M_UNRECOGNIZED", error: "Endpoint not implemented" }); }); this.appServer = this.app.listen(this.options.port, this.options.bindAddress, () => resolve()); }).then(async () => { if (this.options.intentOptions?.encryption) { await this.botIntent.enableEncryption(); } else { await this.botIntent.ensureRegistered(); } }); } /** * Stops the application service, freeing the web server. */ stop() { if (!this.appServer) return; this.appServer.close(); } /** * Gets an intent for a given localpart. The user ID will be formed with the domain name given * in the constructor. * @param localpart The localpart to get an Intent for. * @returns {Intent} An Intent for the user. */ getIntent(localpart) { return this.getIntentForUserId(this.getUserId(localpart)); } /** * Gets a full user ID for a given localpart. The user ID will be formed with the domain name given * in the constructor. * @param localpart The localpart to get a user ID for. * @returns {string} The user's ID. */ getUserId(localpart) { return `@${localpart}:${this.options.homeserverName}`; } /** * Gets an Intent for a given user suffix. The prefix is automatically detected from the registration * options. * @param suffix The user's suffix * @returns {Intent} An Intent for the user. */ getIntentForSuffix(suffix) { return this.getIntentForUserId(this.getUserIdForSuffix(suffix)); } /** * Gets a full user ID for a given suffix. The prefix is automatically detected from the registration * options. * @param suffix The user's suffix * @returns {string} The user's ID. */ getUserIdForSuffix(suffix) { if (!this.userPrefix) { throw new Error(`Cannot use getUserIdForSuffix, provided namespace did not include a valid suffix`); } return `${this.userPrefix}${suffix}:${this.options.homeserverName}`; } /** * Gets an Intent for a given user ID. * @param {string} userId The user ID to get an Intent for. * @returns {Intent} An Intent for the user. */ getIntentForUserId(userId) { let intent = this.intentsCache.get(userId); if (!intent) { intent = new Intent_1.Intent(this.options, userId, this); this.intentsCache.set(userId, intent); this.emit("intent.new", intent); if (this.options.intentOptions.encryption) { intent.enableEncryption().catch(e => { __1.LogService.error("Appservice", `Failed to set up crypto on intent ${userId}`, e); throw e; // re-throw to cause unhandled exception }); } } return intent; } /** * Gets the suffix for the provided user ID. If the user ID is not a namespaced * user, this will return a falsey value. * @param {string} userId The user ID to parse * @returns {string} The suffix from the user ID. */ getSuffixForUserId(userId) { if (!this.userPrefix) { throw new Error(`Cannot use getUserIdForSuffix, provided namespace did not include a valid suffix`); } if (!userId || !userId.startsWith(this.userPrefix) || !userId.endsWith(`:${this.options.homeserverName}`)) { // Invalid ID return null; } return userId .split('') .slice(this.userPrefix.length) .reverse() .slice(this.options.homeserverName.length + 1) .reverse() .join(''); } /** * Determines if a given user ID is namespaced by this application service. * @param {string} userId The user ID to check * @returns {boolean} true if the user is namespaced, false otherwise */ isNamespacedUser(userId) { return userId === this.botUserId || !!this.registration.namespaces?.users.find(({ regex }) => new RegExp(regex).test(userId)); } /** * Gets a full alias for a given localpart. The alias will be formed with the domain name given * in the constructor. * @param localpart The localpart to get an alias for. * @returns {string} The alias. */ getAlias(localpart) { return `#${localpart}:${this.options.homeserverName}`; } /** * Gets a full alias for a given suffix. The prefix is automatically detected from the registration * options. * @param suffix The alias's suffix * @returns {string} The alias. */ getAliasForSuffix(suffix) { if (!this.aliasPrefix) { throw new Error("Invalid configured alias prefix"); } return `${this.aliasPrefix}${suffix}:${this.options.homeserverName}`; } /** * Gets the localpart of an alias for a given suffix. The prefix is automatically detected from the registration * options. Useful for the createRoom endpoint. * @param suffix The alias's suffix * @returns {string} The alias localpart. */ getAliasLocalpartForSuffix(suffix) { if (!this.aliasPrefix) { throw new Error("Invalid configured alias prefix"); } return `${this.aliasPrefix.substr(1)}${suffix}`; } /** * Gets the suffix for the provided alias. If the alias is not a namespaced * alias, this will return a falsey value. * @param {string} alias The alias to parse * @returns {string} The suffix from the alias. */ getSuffixForAlias(alias) { if (!this.aliasPrefix) { throw new Error("Invalid configured alias prefix"); } if (!alias || !this.isNamespacedAlias(alias)) { // Invalid ID return null; } return alias .split('') .slice(this.aliasPrefix.length) .reverse() .slice(this.options.homeserverName.length + 1) .reverse() .join(''); } /** * Determines if a given alias is namespaced by this application service. * @param {string} alias The alias to check * @returns {boolean} true if the alias is namespaced, false otherwise */ isNamespacedAlias(alias) { if (!this.aliasPrefix) { throw new Error("Invalid configured alias prefix"); } return alias.startsWith(this.aliasPrefix) && alias.endsWith(":" + this.options.homeserverName); } /** * Adds a preprocessor to the event pipeline. When this appservice encounters an event, it * will try to run it through the preprocessors it can in the order they were added. * @param {IPreprocessor} preprocessor the preprocessor to add */ addPreprocessor(preprocessor) { if (!preprocessor) throw new Error("Preprocessor cannot be null"); const eventTypes = preprocessor.getSupportedEventTypes(); if (!eventTypes) return; // Nothing to do for (const eventType of eventTypes) { if (!this.eventProcessors[eventType]) this.eventProcessors[eventType] = []; this.eventProcessors[eventType].push(preprocessor); } } /** * Sets the visibility of a room in the appservice's room directory. * @param {string} networkId The network ID to group the room under. * @param {string} roomId The room ID to manipulate the visibility of. * @param {"public" | "private"} visibility The visibility to set for the room. * @return {Promise<any>} resolves when the visibility has been updated. */ setRoomDirectoryVisibility(networkId, roomId, visibility) { roomId = encodeURIComponent(roomId); networkId = encodeURIComponent(networkId); return this.botClient.doRequest("PUT", `/_matrix/client/v3/directory/list/appservice/${networkId}/${roomId}`, null, { visibility, }); } async pingHomeserver() { if (!this.registration.id) { throw Error('No `id` given in registration information. Cannot ping homeserver'); } this.pingRequest = (0, crypto_1.randomUUID)(); return this.botClient.doRequest("POST", `/_matrix/client/v1/appservice/${this.registration.id}/ping`, undefined, { transaction_id: this.pingRequest }); } async processEphemeralEvent(event) { if (!event) return event; if (!this.eventProcessors[event["type"]]) return event; for (const processor of this.eventProcessors[event["type"]]) { await processor.processEvent(event, this.botIntent.underlyingClient, __1.EventKind.EphemeralEvent); } return event; } async processEvent(event) { if (!event) return event; if (!this.eventProcessors[event["type"]]) return event; for (const processor of this.eventProcessors[event["type"]]) { await processor.processEvent(event, this.botIntent.underlyingClient, __1.EventKind.RoomEvent); } return event; } async processMembershipEvent(event) { if (!event["content"]) return; const domain = new __1.UserID(event['state_key']).domain; const botDomain = new __1.UserID(this.botUserId).domain; if (domain !== botDomain) return; // can't be impersonated, so don't try const intent = this.getIntentForUserId(event['state_key']); const targetMembership = event["content"]["membership"]; if (targetMembership === "join") { this.emit("room.join", event["room_id"], event); await intent.underlyingClient.crypto?.onRoomJoin(event["room_id"]); } else if (targetMembership === "ban" || targetMembership === "leave") { this.emit("room.leave", event["room_id"], event); } else if (targetMembership === "invite") { this.emit("room.invite", event["room_id"], event); } } isAuthed(req) { let providedToken = req.query ? req.query["access_token"] : null; if (req.headers && req.headers["authorization"]) { const authHeader = req.headers["authorization"]; if (!authHeader.startsWith("Bearer ")) providedToken = null; else providedToken = authHeader.substring("Bearer ".length); } return providedToken === this.registration.hs_token; } async decryptAppserviceEvent(roomId, encrypted) { const existingClient = this.cryptoClientForRoomId.get(roomId); const decryptFn = async (client) => { // Also fetches state in order to decrypt room. We should throw if the client is confused. if (!await client.crypto.isRoomEncrypted(roomId)) { throw new Error("Client detected that the room is not encrypted."); } let event = (await client.crypto.decryptRoomEvent(encrypted, roomId)).raw; event = await this.processEvent(event); this.cryptoClientForRoomId.set(roomId, client); // For logging purposes: show that the event was decrypted __1.LogService.info("Appservice", `Processing decrypted event of type ${event["type"]}`); return event; }; // 1. Try cached client if (existingClient) { try { return await decryptFn(existingClient); } catch (error) { __1.LogService.debug("Appservice", `Failed to decrypt via cached client ${await existingClient.getUserId()}`, error); __1.LogService.warn("Appservice", `Cached client was not able to decrypt ${roomId} ${encrypted.eventId} - trying other intents`); } } this.cryptoClientForRoomId.delete(roomId); // 2. Try the bot client if (this.botClient.crypto?.isReady) { try { return await decryptFn(this.botClient); } catch (error) { __1.LogService.debug("Appservice", `Failed to decrypt via bot client`, error); __1.LogService.warn("Appservice", `Bot client was not able to decrypt ${roomId} ${encrypted.eventId} - trying other intents`); } } const userIdsInRoom = (await this.botClient.getJoinedRoomMembers(roomId)).filter(u => this.isNamespacedUser(u)); // 3. Try existing clients with crypto enabled. for (const intentCacheEntry of this.intentsCache.entries()) { const [userId, intent] = intentCacheEntry; if (!userIdsInRoom.includes(userId)) { // Not in this room. continue; } // Is this client crypto enabled? if (!intent.underlyingClient.crypto?.isReady) { continue; } try { return await decryptFn(intent.underlyingClient); } catch (error) { __1.LogService.debug("Appservice", `Failed to decrypt via ${userId}`, error); __1.LogService.warn("Appservice", `Existing encrypted client was not able to decrypt ${roomId} ${encrypted.eventId} - trying other intents`); } } // 4. Try to enable crypto on any client to decrypt it. // We deliberately do not enable crypto on every client for performance reasons. const userInRoom = this.intentsCache.find((intent, userId) => !intent.underlyingClient.crypto?.isReady && userIdsInRoom.includes(userId)); if (!userInRoom) { throw Error('No users in room, cannot decrypt'); } try { await userInRoom.enableEncryption(); return await decryptFn(userInRoom.underlyingClient); } catch (error) { __1.LogService.debug("Appservice", `Failed to decrypt via random user ${userInRoom.userId}`, error); throw new Error("Unable to decrypt event", { cause: error }); } } async handleTransaction(txnId, body) { // Process all the crypto stuff first to ensure that future transactions (if not this one) // will decrypt successfully. We start with EDUs because we need structures to put counts // and such into in a later stage, and EDUs are independent of crypto. if (await this.storage.isTransactionCompleted(txnId)) { // Duplicate. return; } const byUserId = {}; const orderedEdus = []; if (Array.isArray(body["de.sorunome.msc2409.to_device"])) { orderedEdus.push(...body["de.sorunome.msc2409.to_device"].map(e => ({ ...e, unsigned: { ...e['unsigned'], [EDU_ANNOTATION_KEY]: EduAnnotation.ToDevice, }, }))); } if (Array.isArray(body["de.sorunome.msc2409.ephemeral"])) { orderedEdus.push(...body["de.sorunome.msc2409.ephemeral"].map(e => ({ ...e, unsigned: { ...e['unsigned'], [EDU_ANNOTATION_KEY]: EduAnnotation.Ephemeral, }, }))); } for (let event of orderedEdus) { if (event['edu_type']) event['type'] = event['edu_type']; // handle property change during MSC2409's course __1.LogService.info("Appservice", `Processing ${event['unsigned'][EDU_ANNOTATION_KEY]} event of type ${event["type"]}`); event = await this.processEphemeralEvent(event); // These events aren't tied to rooms, so just emit them generically this.emit("ephemeral.event", event); if (this.cryptoStorage && (event["type"] === "m.room.encrypted" || event.unsigned?.[EDU_ANNOTATION_KEY] === EduAnnotation.ToDevice)) { const toUser = event["to_user_id"]; const intent = this.getIntentForUserId(toUser); await intent.enableEncryption(); if (!byUserId[toUser]) byUserId[toUser] = { counts: null, toDevice: null, unusedFallbacks: null }; if (!byUserId[toUser].toDevice) byUserId[toUser].toDevice = []; byUserId[toUser].toDevice.push(event); } } const deviceLists = body["org.matrix.msc3202.device_lists"] ?? { changed: [], removed: [], }; if (!deviceLists.changed) deviceLists.changed = []; if (!deviceLists.removed) deviceLists.removed = []; if (deviceLists.changed.length || deviceLists.removed.length) { this.emit("device_lists", deviceLists); } let otks = body["org.matrix.msc3202.device_one_time_keys_count"]; const otks2 = body["org.matrix.msc3202.device_one_time_key_counts"]; if (otks2 && !otks) { __1.LogService.warn("Appservice", "Your homeserver is using an outdated field (device_one_time_key_counts) to talk to this appservice. " + "If you're using Synapse, please upgrade to 1.73.0 or higher."); otks = otks2; } if (otks) { this.emit("otk.counts", otks); } if (otks && this.cryptoStorage) { for (const userId of Object.keys(otks)) { const intent = this.getIntentForUserId(userId); await intent.enableEncryption(); const otksForUser = otks[userId][intent.underlyingClient.crypto.clientDeviceId]; if (otksForUser) { if (!byUserId[userId]) { byUserId[userId] = { counts: null, toDevice: null, unusedFallbacks: null, }; } byUserId[userId].counts = otksForUser; } } } const fallbacks = body["org.matrix.msc3202.device_unused_fallback_key_types"]; if (fallbacks) { this.emit("otk.unused_fallback_keys", fallbacks); } if (fallbacks && this.cryptoStorage) { for (const userId of Object.keys(fallbacks)) { const intent = this.getIntentForUserId(userId); await intent.enableEncryption(); const fallbacksForUser = fallbacks[userId][intent.underlyingClient.crypto.clientDeviceId]; if (Array.isArray(fallbacksForUser) && !fallbacksForUser.includes(__1.OTKAlgorithm.Signed)) { if (!byUserId[userId]) { byUserId[userId] = { counts: null, toDevice: null, unusedFallbacks: null, }; } byUserId[userId].unusedFallbacks = fallbacksForUser; } } } if (this.cryptoStorage) { for (const userId of Object.keys(byUserId)) { const intent = this.getIntentForUserId(userId); await intent.enableEncryption(); const info = byUserId[userId]; const userStorage = this.storage.storageForUser(userId); if (!info.toDevice) info.toDevice = []; if (!info.unusedFallbacks) info.unusedFallbacks = JSON.parse(await userStorage.readValue("last_unused_fallbacks") || "[]"); if (!info.counts) info.counts = JSON.parse(await userStorage.readValue("last_counts") || "{}"); __1.LogService.info("Appservice", `Updating crypto state for ${userId}`); await intent.underlyingClient.crypto.updateSyncData(info.toDevice, info.counts, info.unusedFallbacks, deviceLists.changed, deviceLists.removed); } } for (let event of body.events) { __1.LogService.info("Appservice", `Processing event of type ${event["type"]}`); event = await this.processEvent(event); if (event['type'] === 'm.room.encrypted') { this.emit("room.encrypted_event", event["room_id"], event); if (this.cryptoStorage) { try { const encrypted = new __1.EncryptedRoomEvent(event); const roomId = event['room_id']; event = await this.decryptAppserviceEvent(roomId, encrypted); this.emit("room.decrypted_event", roomId, event); // For logging purposes: show that the event was decrypted __1.LogService.info("Appservice", `Processing decrypted event of type ${event["type"]}`); } catch (e) { __1.LogService.error("Appservice", `Decryption error on ${event['room_id']} ${event['event_id']}`, e); this.emit("room.failed_decryption", event['room_id'], event, e); } } } this.emit("room.event", event["room_id"], event); if (event['type'] === 'm.room.message') { this.emit("room.message", event["room_id"], event); } if (event['type'] === 'm.room.member' && this.isNamespacedUser(event['state_key'])) { await this.processMembershipEvent(event); } if (event['type'] === 'm.room.tombstone' && event['state_key'] === '') { this.emit("room.archived", event['room_id'], event); } if (event['type'] === 'm.room.create' && event['state_key'] === '' && event['content'] && event['content']['predecessor']) { this.emit("room.upgraded", event['room_id'], event); } } } async onTransaction(req, res) { if (!this.isAuthed(req)) { res.status(401).json({ errcode: "AUTH_FAILED", error: "Authentication failed" }); return; } if (typeof (req.body) !== "object") { res.status(400).json({ errcode: "BAD_REQUEST", error: "Expected JSON" }); return; } if (!req.body["events"] || !Array.isArray(req.body["events"])) { res.status(400).json({ errcode: "BAD_REQUEST", error: "Invalid JSON: expected events" }); return; } const { txnId } = req.params; if (this.pendingTransactions.has(txnId)) { // The homeserver has retried a transaction while we're still handling it. try { await this.pendingTransactions.get(txnId); res.status(200).json({}); } catch (e) { __1.LogService.error("Appservice", e); res.status(500).json({}); } return; } __1.LogService.info("Appservice", `Processing transaction ${txnId}`); const txnHandler = this.handleTransaction(txnId, req.body); this.pendingTransactions.set(txnId, txnHandler); try { await txnHandler; try { await this.storage.setTransactionCompleted(txnId); } catch (ex) { // Not fatal for the transaction since we *did* process it, but we should // warn loudly. __1.LogService.warn("Appservice", "Failed to store completed transaction", ex); } res.status(200).json({}); } catch (e) { __1.LogService.error("Appservice", e); res.status(500).json({}); } finally { this.pendingTransactions.delete(txnId); } } async onUser(req, res) { if (!this.isAuthed(req)) { res.status(401).json({ errcode: "AUTH_FAILED", error: "Authentication failed" }); return; } const userId = req.params["userId"]; this.emit("query.user", userId, async (result) => { if (result.then) result = await result; if (result === false) { res.status(404).json({ errcode: "USER_DOES_NOT_EXIST", error: "User not created" }); } else { const intent = this.getIntentForUserId(userId); await intent.ensureRegistered(); if (result.display_name) await intent.underlyingClient.setDisplayName(result.display_name); if (result.avatar_mxc) await intent.underlyingClient.setAvatarUrl(result.avatar_mxc); res.status(200).json(result); // return result for debugging + testing } }); } async onRoomAlias(req, res) { if (!this.isAuthed(req)) { res.status(401).json({ errcode: "AUTH_FAILED", error: "Authentication failed" }); return; } const roomAlias = req.params["roomAlias"]; this.emit("query.room", roomAlias, async (result) => { if (result.then) result = await result; if (result === false) { res.status(404).json({ errcode: "ROOM_DOES_NOT_EXIST", error: "Room not created" }); } else { const intent = this.botIntent; await intent.ensureRegistered(); result["room_alias_name"] = roomAlias.substring(1).split(':')[0]; result["__roomId"] = await intent.underlyingClient.createRoom(result); res.status(200).json(result); // return result for debugging + testing } }); } async onKeysClaim(req, res) { if (!this.isAuthed(req)) { res.status(401).json({ errcode: "AUTH_FAILED", error: "Authentication failed" }); return; } if (typeof (req.body) !== "object") { res.status(400).json({ errcode: "BAD_REQUEST", error: "Expected JSON" }); return; } let responded = false; this.emit("query.key_claim", req.body, (result) => { responded = true; const handleResult = (result2) => { if (!result2) { res.status(404).json({ errcode: "M_UNRECOGNIZED", error: "Endpoint not implemented" }); return; } res.status(200).json(result2); }; Promise.resolve(result).then(r => handleResult(r)).catch(e => { __1.LogService.error("Appservice", "Error handling key claim API", e); res.status(500).json({ errcode: "M_UNKNOWN", error: "Error handling key claim API" }); }); }); if (!responded) { res.status(404).json({ errcode: "M_UNRECOGNIZED", error: "Endpoint not implemented" }); } } async onKeysQuery(req, res) { if (!this.isAuthed(req)) { res.status(401).json({ errcode: "AUTH_FAILED", error: "Authentication failed" }); return; } if (typeof (req.body) !== "object") { res.status(400).json({ errcode: "BAD_REQUEST", error: "Expected JSON" }); return; } let responded = false; this.emit("query.key", req.body, (result) => { responded = true; const handleResult = (result2) => { if (!result2) { res.status(404).json({ errcode: "M_UNRECOGNIZED", error: "Endpoint not implemented" }); return; } // Implementation note: we could probably query the device keys from our storage if we wanted to. res.status(200).json(result2); }; Promise.resolve(result).then(r => handleResult(r)).catch(e => { __1.LogService.error("Appservice", "Error handling key query API", e); res.status(500).json({ errcode: "M_UNKNOWN", error: "Error handling key query API" }); }); }); if (!responded) { res.status(404).json({ errcode: "M_UNRECOGNIZED", error: "Endpoint not implemented" }); } } onThirdpartyProtocol(req, res) { if (!this.isAuthed(req)) { res.status(401).json({ errcode: "AUTH_FAILED", error: "Authentication failed" }); return; } const protocol = req.params["protocol"]; if (!this.registration.protocols.includes(protocol)) { res.status(404).json({ errcode: "PROTOCOL_NOT_HANDLED", error: "Protocol is not handled by this appservice", }); return; } this.emit("thirdparty.protocol", protocol, (protocolResponse) => { res.status(200).json(protocolResponse); }); } handleThirdpartyObject(req, res, objType, matrixId) { if (!this.isAuthed(req)) { res.status(401).json({ errcode: "AUTH_FAILED", error: "Authentication failed" }); return; } const protocol = req.params["protocol"]; const responseFunc = (items) => { if (items && items.length > 0) { res.status(200).json(items); return; } res.status(404).json({ errcode: "NO_MAPPING_FOUND", error: "No mappings found", }); }; // Lookup remote objects(s) if (protocol) { // If protocol is given, we are looking up a objects based on fields if (!this.registration.protocols.includes(protocol)) { res.status(404).json({ errcode: "PROTOCOL_NOT_HANDLED", error: "Protocol is not handled by this appservice", }); return; } // Remove the access_token delete req.query.access_token; this.emit(`thirdparty.${objType}.remote`, protocol, req.query, responseFunc); return; } else if (matrixId) { // If a user ID is given, we are looking up a remote objects based on a id this.emit(`thirdparty.${objType}.matrix`, matrixId, responseFunc); return; } res.status(400).json({ errcode: "INVALID_PARAMETERS", error: "Invalid parameters given", }); } onThirdpartyUser(req, res) { return this.handleThirdpartyObject(req, res, "user", req.query["userid"]); } onThirdpartyLocation(req, res) { return this.handleThirdpartyObject(req, res, "location", req.query["alias"]); } onPing(req, res) { if (!this.isAuthed(req)) { res.status(401).json({ errcode: "AUTH_FAILED", error: "Authentication failed" }); return; } if (typeof (req.body) !== "object") { res.status(400).json({ errcode: "BAD_REQUEST", error: "Expected JSON" }); return; } if (!this.pingRequest) { res.status(400).json({ errcode: "BAD_REQUEST", error: "No ping request expected" }); return; } if (req.body.transaction_id !== this.pingRequest) { res.status(400).json({ errcode: "BAD_REQUEST", error: "transaction_id did not match" }); return; } this.pingRequest = undefined; res.status(200).json({}); } } exports.Appservice = Appservice; //# sourceMappingURL=Appservice.js.map