// mautrix-gmessages - A Matrix-Google Messages puppeting bridge. // Copyright (C) 2023 Tulir Asokan // // This program is free software: you can redistribute it and/or modify // it under the terms of the GNU Affero General Public License as published by // the Free Software Foundation, either version 3 of the License, or // (at your option) any later version. // // This program is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU Affero General Public License for more details. // // You should have received a copy of the GNU Affero General Public License // along with this program. If not, see . package main import ( "context" "errors" "fmt" "maunium.net/go/mautrix/appservice" "maunium.net/go/mautrix/bridge" "maunium.net/go/mautrix/id" ) var _ bridge.DoublePuppet = (*User)(nil) func (user *User) SwitchCustomMXID(accessToken string, mxid id.UserID) error { if mxid != user.MXID { return errors.New("mismatching mxid") } user.DoublePuppetIntent = nil user.AccessToken = accessToken err := user.StartCustomMXID(false) if err != nil { return err } return nil } func (user *User) ClearCustomMXID() { user.DoublePuppetIntent = nil user.AccessToken = "" err := user.Update(context.TODO()) if err != nil { user.zlog.Warn().Err(err).Msg("Failed to clear access token from database") } } func (user *User) StartCustomMXID(reloginOnFail bool) error { newIntent, newAccessToken, err := user.bridge.DoublePuppet.Setup(context.TODO(), user.MXID, user.AccessToken, reloginOnFail) if err != nil { user.ClearCustomMXID() return err } if user.AccessToken != newAccessToken { user.AccessToken = newAccessToken err = user.Update(context.TODO()) if err != nil { return fmt.Errorf("failed to save access token: %w", err) } } user.DoublePuppetIntent = newIntent return nil } func (user *User) CustomIntent() *appservice.IntentAPI { return user.DoublePuppetIntent } func (user *User) tryAutomaticDoublePuppeting() { if !user.bridge.Config.CanAutoDoublePuppet(user.MXID) || user.DoublePuppetIntent != nil { return } err := user.StartCustomMXID(true) if err != nil { user.zlog.Warn().Err(err).Msg("Failed to login with shared secret for double puppeting") } else { user.zlog.Info().Msg("Successfully automatically enabled double puppet") } }