gmessages/libgm/pair.go
Tulir Asokan 1615e146b6 Update library
Co-authored-by: zero <108243503+0xzer@users.noreply.github.com>
2023-07-09 14:49:55 +03:00

153 lines
4.7 KiB
Go

package libgm
import (
"io"
"time"
"go.mau.fi/mautrix-gmessages/libgm/binary"
"go.mau.fi/mautrix-gmessages/libgm/crypto"
"go.mau.fi/mautrix-gmessages/libgm/events"
"go.mau.fi/mautrix-gmessages/libgm/payload"
"go.mau.fi/mautrix-gmessages/libgm/util"
)
type Pairer struct {
client *Client
KeyData *crypto.JWK
ticker *time.Ticker
tickerTime time.Duration
pairingKey []byte
}
/*
refreshQrCodeTime is the interval to refresh the qr code in seconds, this is usually 20 seconds.
*/
func (c *Client) NewPairer(keyData *crypto.JWK, refreshQrCodeTime int) (*Pairer, error) {
if keyData == nil {
var err error
keyData, err = crypto.GenerateECDSA_P256_JWK()
c.updateJWK(keyData)
if err != nil {
c.Logger.Error().Any("data", keyData).Msg(err.Error())
return nil, err
}
}
p := &Pairer{
client: c,
KeyData: keyData,
tickerTime: time.Duration(refreshQrCodeTime) * time.Second,
}
c.pairer = p
return p, nil
}
func (p *Pairer) RegisterPhoneRelay() (*binary.RegisterPhoneRelayResponse, error) {
body, _, err := payload.RegisterPhoneRelay(p.KeyData)
if err != nil {
p.client.Logger.Err(err)
return &binary.RegisterPhoneRelayResponse{}, err
}
//p.client.Logger.Debug().Any("keyByteLength", len(jsonPayload.GetPairDeviceData().EcdsaKeys.EncryptedKeys)).Any("json", jsonPayload).Any("base64", body).Msg("RegisterPhoneRelay Payload")
relayResponse, reqErr := p.client.MakeRelayRequest(util.REGISTER_PHONE_RELAY, body)
if reqErr != nil {
p.client.Logger.Err(reqErr)
return nil, err
}
responseBody, err2 := io.ReadAll(relayResponse.Body)
if err2 != nil {
return nil, err2
}
relayResponse.Body.Close()
res := &binary.RegisterPhoneRelayResponse{}
err3 := binary.DecodeProtoMessage(responseBody, res)
if err3 != nil {
return nil, err3
}
p.pairingKey = res.GetPairingKey()
p.client.Logger.Debug().Any("response", res).Msg("Registerphonerelay response")
url, qrErr := p.GenerateQRCodeData()
if qrErr != nil {
return nil, qrErr
}
p.client.triggerEvent(&events.QR{URL: url})
p.startRefreshRelayTask()
return res, err
}
func (p *Pairer) startRefreshRelayTask() {
if p.ticker != nil {
p.ticker.Stop()
}
ticker := time.NewTicker(30 * time.Second)
p.ticker = ticker
go func() {
for range ticker.C {
p.RefreshPhoneRelay()
}
}()
}
func (p *Pairer) RefreshPhoneRelay() {
body, _, err := payload.RefreshPhoneRelay(p.client.authData.TachyonAuthToken)
if err != nil {
p.client.Logger.Err(err).Msg("refresh phone relay err")
return
}
//p.client.Logger.Debug().Any("keyByteLength", len(jsonPayload.PhoneRelay.tachyonAuthToken)).Any("json", jsonPayload).Any("base64", body).Msg("RefreshPhoneRelay Payload")
relayResponse, reqErr := p.client.MakeRelayRequest(util.REFRESH_PHONE_RELAY, body)
if reqErr != nil {
p.client.Logger.Err(reqErr).Msg("refresh phone relay err")
}
responseBody, err2 := io.ReadAll(relayResponse.Body)
defer relayResponse.Body.Close()
if err2 != nil {
p.client.Logger.Err(err2).Msg("refresh phone relay err")
}
p.client.Logger.Debug().Any("responseLength", len(responseBody)).Msg("Response Body Length")
res := &binary.RefreshPhoneRelayResponse{}
err3 := binary.DecodeProtoMessage(responseBody, res)
if err3 != nil {
p.client.Logger.Err(err3)
}
p.pairingKey = res.GetPairKey()
p.client.Logger.Debug().Any("res", res).Msg("RefreshPhoneRelayResponse")
url, qrErr := p.GenerateQRCodeData()
if qrErr != nil {
panic(qrErr)
}
p.client.triggerEvent(&events.QR{URL: url})
}
func (c *Client) GetWebEncryptionKey() (*binary.WebEncryptionKeyResponse, error) {
body, rawData, err1 := payload.GetWebEncryptionKey(c.authData.TachyonAuthToken)
if err1 != nil {
c.Logger.Err(err1).Msg("web encryption key err")
return nil, err1
}
c.Logger.Debug().Any("keyByteLength", len(rawData.AuthMessage.TachyonAuthToken)).Any("json", rawData).Any("base64", body).Msg("GetWebEncryptionKey Payload")
webKeyResponse, reqErr := c.MakeRelayRequest(util.GET_WEB_ENCRYPTION_KEY, body)
if reqErr != nil {
c.Logger.Err(reqErr).Msg("Web encryption key request err")
return nil, reqErr
}
responseBody, err2 := io.ReadAll(webKeyResponse.Body)
defer webKeyResponse.Body.Close()
if err2 != nil {
c.Logger.Err(err2).Msg("Web encryption key read response err")
return nil, err2
}
//p.client.Logger.Debug().Any("responseLength", len(responseBody)).Any("raw", responseBody).Msg("Response Body Length")
parsedResponse := &binary.WebEncryptionKeyResponse{}
err2 = binary.DecodeProtoMessage(responseBody, parsedResponse)
if err2 != nil {
c.Logger.Err(err2).Msg("Parse webkeyresponse into proto struct error")
return nil, err2
}
c.Logger.Debug().Any("webenckeyresponse", parsedResponse).Msg("Web encryption key")
if c.pairer != nil {
if c.pairer.ticker != nil {
c.pairer.ticker.Stop()
}
}
return parsedResponse, nil
}