Andrew Ferrazzutti
27b2c15ad3
- Move config from Python to Node - Also log responses - Only log request/response object properties in Node, as logging them in both Node and Python is redundant - Error-out if Node listen config is missing - For convenience, make PeerClient copy setting properties from ClientManager instead of referencing them
138 lines
5.1 KiB
Python
138 lines
5.1 KiB
Python
# matrix-appservice-kakaotalk - A Matrix-KakaoTalk puppeting bridge.
|
|
# Copyright (C) 2022 Tulir Asokan, Andrew Ferrazzutti
|
|
#
|
|
# This program is free software: you can redistribute it and/or modify
|
|
# it under the terms of the GNU Affero General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU Affero General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU Affero General Public License
|
|
# along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
from __future__ import annotations
|
|
|
|
from typing import Any
|
|
import os
|
|
|
|
from mautrix.bridge.config import BaseBridgeConfig
|
|
from mautrix.types import UserID
|
|
from mautrix.util.config import ConfigUpdateHelper, ForbiddenDefault, ForbiddenKey
|
|
|
|
|
|
class Config(BaseBridgeConfig):
|
|
def __getitem__(self, key: str) -> Any:
|
|
try:
|
|
return os.environ[f"MATRIX_APPSERVICE_KAKAOTALK_{key.replace('.', '_').upper()}"]
|
|
except KeyError:
|
|
return super().__getitem__(key)
|
|
|
|
@property
|
|
def forbidden_defaults(self) -> list[ForbiddenDefault]:
|
|
return [
|
|
*super().forbidden_defaults,
|
|
ForbiddenDefault("appservice.database", "postgres://username:password@hostname/db"),
|
|
# TODO
|
|
#ForbiddenDefault(
|
|
# "appservice.public.external",
|
|
# "https://example.com/public",
|
|
# condition="appservice.public.enabled",
|
|
#),
|
|
#
|
|
ForbiddenDefault("bridge.permissions", ForbiddenKey("example.com")),
|
|
]
|
|
|
|
def do_update(self, helper: ConfigUpdateHelper) -> None:
|
|
super().do_update(helper)
|
|
|
|
copy, copy_dict, base = helper
|
|
|
|
copy("homeserver.asmux")
|
|
|
|
""" TODO
|
|
copy("appservice.public.enabled")
|
|
copy("appservice.public.prefix")
|
|
copy("appservice.public.external")
|
|
if self["appservice.public.shared_secret"] == "generate":
|
|
base["appservice.public.shared_secret"] = self._new_token()
|
|
else:
|
|
copy("appservice.public.shared_secret")
|
|
copy("appservice.public.allow_matrix_login")
|
|
copy("appservice.public.segment_key")
|
|
"""
|
|
|
|
copy("metrics.enabled")
|
|
copy("metrics.listen_port")
|
|
|
|
copy("kakaotalk.device_name")
|
|
|
|
copy("bridge.username_template")
|
|
copy("bridge.displayname_template")
|
|
copy("bridge.command_prefix")
|
|
|
|
copy("bridge.initial_chat_sync")
|
|
copy("bridge.invite_own_puppet_to_pm")
|
|
copy("bridge.sync_with_custom_puppets")
|
|
copy("bridge.sync_direct_chat_list")
|
|
copy("bridge.double_puppet_server_map")
|
|
copy("bridge.double_puppet_allow_discovery")
|
|
if "bridge.login_shared_secret" in self:
|
|
base["bridge.login_shared_secret_map"] = {
|
|
base["homeserver.domain"]: self["bridge.login_shared_secret"]
|
|
}
|
|
else:
|
|
copy("bridge.login_shared_secret_map")
|
|
copy("bridge.update_avatar_initial_sync")
|
|
copy("bridge.encryption.allow")
|
|
copy("bridge.encryption.default")
|
|
copy("bridge.encryption.key_sharing.allow")
|
|
copy("bridge.encryption.key_sharing.require_cross_signing")
|
|
copy("bridge.encryption.key_sharing.require_verification")
|
|
copy("bridge.delivery_receipts")
|
|
copy("bridge.federate_rooms")
|
|
copy("bridge.allow_invites")
|
|
copy("bridge.backfill.invite_own_puppet")
|
|
copy("bridge.backfill.initial_limit")
|
|
copy("bridge.backfill.missed_limit")
|
|
copy("bridge.backfill.disable_notifications")
|
|
copy("bridge.resync_max_disconnected_time")
|
|
copy("bridge.remain_logged_in_on_disconnect")
|
|
copy("bridge.allow_token_relogin")
|
|
copy("bridge.reconnect_on_token_relogin")
|
|
copy("bridge.sync_on_startup")
|
|
copy("bridge.temporary_disconnect_notices")
|
|
copy("bridge.disable_bridge_notices")
|
|
copy("bridge.resend_bridge_info")
|
|
copy("bridge.tag_only_on_create")
|
|
copy("bridge.sandbox_media_download")
|
|
|
|
copy_dict("bridge.permissions")
|
|
|
|
copy("rpc.connection.type")
|
|
if base["rpc.connection.type"] == "unix":
|
|
copy("rpc.connection.path")
|
|
else:
|
|
copy("rpc.connection.host")
|
|
copy("rpc.connection.port")
|
|
|
|
def _get_permissions(self, key: str) -> tuple[bool, bool, bool, str]:
|
|
level = self["bridge.permissions"].get(key, "")
|
|
admin = level == "admin"
|
|
user = level == "user" or admin
|
|
relay = level == "relay" or user
|
|
return relay, user, admin, level
|
|
|
|
def get_permissions(self, mxid: UserID) -> tuple[bool, bool, bool, str]:
|
|
permissions = self["bridge.permissions"] or {}
|
|
if mxid in permissions:
|
|
return self._get_permissions(mxid)
|
|
|
|
homeserver = mxid[mxid.index(":") + 1 :]
|
|
if homeserver in permissions:
|
|
return self._get_permissions(homeserver)
|
|
|
|
return self._get_permissions("*")
|