gmessages/libgm/pair.go

162 lines
5.1 KiB
Go
Raw Normal View History

2023-06-30 11:05:33 +00:00
package libgm
2023-06-30 09:54:08 +00:00
import (
"io"
"time"
"go.mau.fi/mautrix-gmessages/libgm/binary"
"go.mau.fi/mautrix-gmessages/libgm/crypto"
2023-06-30 10:43:54 +00:00
"go.mau.fi/mautrix-gmessages/libgm/events"
2023-06-30 09:54:08 +00:00
"go.mau.fi/mautrix-gmessages/libgm/payload"
"go.mau.fi/mautrix-gmessages/libgm/util"
)
type Pairer struct {
client *Client
KeyData *crypto.JWK
ticker *time.Ticker
tickerTime time.Duration
pairingKey []byte
}
/*
refreshQrCodeTime is the interval to refresh the qr code in seconds, this is usually 20 seconds.
*/
func (c *Client) NewPairer(keyData *crypto.JWK, refreshQrCodeTime int) (*Pairer, error) {
if keyData == nil {
var err error
keyData, err = crypto.GenerateECDSA_P256_JWK()
if err != nil {
c.Logger.Error().Any("data", keyData).Msg(err.Error())
return nil, err
}
}
p := &Pairer{
client: c,
KeyData: keyData,
tickerTime: time.Duration(refreshQrCodeTime) * time.Second,
}
c.pairer = p
return p, nil
}
func (p *Pairer) RegisterPhoneRelay() (*binary.RegisterPhoneRelayResponse, error) {
body, _, err := payload.RegisterPhoneRelay(p.KeyData)
if err != nil {
p.client.Logger.Err(err)
return &binary.RegisterPhoneRelayResponse{}, err
}
//p.client.Logger.Debug().Any("keyByteLength", len(jsonPayload.EcdsaKeysContainer.EcdsaKeys.EncryptedKeys)).Any("json", jsonPayload).Any("base64", body).Msg("RegisterPhoneRelay Payload")
relayResponse, reqErr := p.client.MakeRelayRequest(util.REGISTER_PHONE_RELAY, body)
if reqErr != nil {
p.client.Logger.Err(reqErr)
return nil, err
}
responseBody, err2 := io.ReadAll(relayResponse.Body)
if err2 != nil {
return nil, err2
}
relayResponse.Body.Close()
res := &binary.RegisterPhoneRelayResponse{}
err3 := binary.DecodeProtoMessage(responseBody, res)
if err3 != nil {
return nil, err3
}
p.pairingKey = res.GetPairingKey()
2023-06-30 10:43:54 +00:00
url, qrErr := p.GenerateQRCodeData()
2023-06-30 09:54:08 +00:00
if qrErr != nil {
return nil, qrErr
}
2023-06-30 13:09:29 +00:00
p.client.triggerEvent(&events.QR{URL: url})
2023-06-30 09:54:08 +00:00
p.startRefreshRelayTask()
return res, err
}
func (p *Pairer) startRefreshRelayTask() {
if p.ticker != nil {
p.ticker.Stop()
}
ticker := time.NewTicker(30 * time.Second)
p.ticker = ticker
go func() {
for range ticker.C {
p.RefreshPhoneRelay()
}
}()
}
func (p *Pairer) RefreshPhoneRelay() {
body, _, err := payload.RefreshPhoneRelay(p.client.rpcKey)
if err != nil {
p.client.Logger.Err(err).Msg("refresh phone relay err")
return
}
//p.client.Logger.Debug().Any("keyByteLength", len(jsonPayload.PhoneRelay.RpcKey)).Any("json", jsonPayload).Any("base64", body).Msg("RefreshPhoneRelay Payload")
relayResponse, reqErr := p.client.MakeRelayRequest(util.REFRESH_PHONE_RELAY, body)
if reqErr != nil {
p.client.Logger.Err(reqErr).Msg("refresh phone relay err")
}
responseBody, err2 := io.ReadAll(relayResponse.Body)
defer relayResponse.Body.Close()
if err2 != nil {
p.client.Logger.Err(err2).Msg("refresh phone relay err")
}
p.client.Logger.Debug().Any("responseLength", len(responseBody)).Msg("Response Body Length")
res := &binary.RefreshPhoneRelayResponse{}
err3 := binary.DecodeProtoMessage(responseBody, res)
if err3 != nil {
p.client.Logger.Err(err3)
}
p.pairingKey = res.GetPairKey()
p.client.Logger.Debug().Any("res", res).Msg("RefreshPhoneRelayResponse")
2023-06-30 10:43:54 +00:00
url, qrErr := p.GenerateQRCodeData()
2023-06-30 09:54:08 +00:00
if qrErr != nil {
2023-06-30 11:48:50 +00:00
panic(qrErr)
2023-06-30 09:54:08 +00:00
}
2023-06-30 13:09:29 +00:00
p.client.triggerEvent(&events.QR{URL: url})
2023-06-30 09:54:08 +00:00
}
2023-07-02 14:19:00 +00:00
func (p *Pairer) GetWebEncryptionKey(oldKey []byte) []byte {
body, _, err2 := payload.GetWebEncryptionKey(oldKey)
2023-06-30 09:54:08 +00:00
if err2 != nil {
p.client.Logger.Err(err2).Msg("web encryption key err")
2023-07-02 14:19:00 +00:00
return nil
2023-06-30 09:54:08 +00:00
}
//p.client.Logger.Debug().Any("keyByteLength", len(rawData.PhoneRelay.RpcKey)).Any("json", rawData).Any("base64", body).Msg("GetWebEncryptionKey Payload")
webKeyResponse, reqErr := p.client.MakeRelayRequest(util.GET_WEB_ENCRYPTION_KEY, body)
if reqErr != nil {
p.client.Logger.Err(reqErr).Msg("Web encryption key request err")
}
responseBody, err2 := io.ReadAll(webKeyResponse.Body)
defer webKeyResponse.Body.Close()
if err2 != nil {
p.client.Logger.Err(err2).Msg("Web encryption key read response err")
2023-07-02 14:19:00 +00:00
return nil
2023-06-30 09:54:08 +00:00
}
//p.client.Logger.Debug().Any("responseLength", len(responseBody)).Any("raw", responseBody).Msg("Response Body Length")
parsedResponse := &binary.WebEncryptionKeyResponse{}
err2 = binary.DecodeProtoMessage(responseBody, parsedResponse)
if err2 != nil {
p.client.Logger.Err(err2).Msg("Parse webkeyresponse into proto struct error")
}
p.client.Logger.Debug().Any("parsedResponse", parsedResponse).Msg("WebEncryptionKeyResponse")
2023-07-02 14:19:00 +00:00
if p.ticker != nil {
p.client.Logger.Info().Msg("Reconnecting")
p.ticker.Stop()
reconnectErr := p.client.Reconnect(p.client.rpc.webAuthKey)
if reconnectErr != nil {
panic(reconnectErr)
}
2023-06-30 09:54:08 +00:00
}
2023-07-02 14:19:00 +00:00
return parsedResponse.GetKey()
2023-06-30 09:54:08 +00:00
}
func (p *Pairer) pairCallback(pairData *binary.Container) {
p.client.rpc.webAuthKey = pairData.PairDeviceData.WebAuthKeyData.WebAuthKey
p.client.ttl = pairData.PairDeviceData.WebAuthKeyData.ValidFor
p.client.devicePair = &DevicePair{Mobile: pairData.PairDeviceData.Mobile, Browser: pairData.PairDeviceData.Browser}
2023-07-02 14:19:00 +00:00
p.client.pairer.GetWebEncryptionKey(p.client.rpc.webAuthKey)
2023-06-30 11:48:58 +00:00
p.client.triggerEvent(&events.PairSuccessful{Container: pairData})
p.client.pairer = nil
2023-06-30 09:54:08 +00:00
}