@baileys-md/baileys 11.2.4 → 12.0.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (126) hide show
  1. package/LICENSE +1 -1
  2. package/WAProto/WAProto.proto +5311 -0
  3. package/WAProto/index.js +70084 -131686
  4. package/lib/Defaults/index.js +118 -117
  5. package/lib/KeyDB/BinarySearch.js +20 -0
  6. package/lib/KeyDB/KeyedDB.js +167 -0
  7. package/lib/KeyDB/index.js +4 -0
  8. package/lib/Signal/Group/ciphertext-message.js +13 -0
  9. package/lib/Signal/Group/group-session-builder.js +32 -0
  10. package/lib/Signal/Group/group_cipher.js +84 -0
  11. package/lib/Signal/Group/index.js +13 -0
  12. package/lib/Signal/Group/keyhelper.js +20 -0
  13. package/lib/Signal/Group/sender-chain-key.js +28 -0
  14. package/lib/Signal/Group/sender-key-distribution-message.js +65 -0
  15. package/lib/Signal/Group/sender-key-message.js +68 -0
  16. package/{WASignalGroup/sender_key_name.js → lib/Signal/Group/sender-key-name.js} +10 -28
  17. package/lib/Signal/Group/sender-key-record.js +43 -0
  18. package/lib/Signal/Group/sender-key-state.js +86 -0
  19. package/lib/Signal/Group/sender-message-key.js +28 -0
  20. package/lib/Signal/libsignal.js +314 -151
  21. package/lib/Signal/lid-mapping.js +155 -0
  22. package/lib/Socket/Client/index.js +4 -19
  23. package/lib/Socket/Client/types.js +13 -0
  24. package/lib/Socket/Client/websocket.js +52 -0
  25. package/lib/Socket/business.js +359 -242
  26. package/lib/Socket/chats.js +847 -844
  27. package/lib/Socket/communities.js +413 -0
  28. package/lib/Socket/groups.js +304 -319
  29. package/lib/Socket/index.js +15 -9
  30. package/lib/Socket/messages-recv.js +1109 -989
  31. package/lib/Socket/messages-send.js +611 -347
  32. package/lib/Socket/mex.js +45 -0
  33. package/lib/Socket/newsletter.js +230 -231
  34. package/lib/Socket/socket.js +795 -616
  35. package/lib/Store/index.js +6 -8
  36. package/lib/Store/make-cache-manager-store.js +73 -81
  37. package/lib/Store/make-in-memory-store.js +286 -427
  38. package/lib/Store/make-ordered-dictionary.js +77 -79
  39. package/lib/Store/object-repository.js +24 -26
  40. package/lib/Types/Auth.js +3 -2
  41. package/lib/Types/Bussines.js +3 -0
  42. package/lib/Types/Call.js +3 -2
  43. package/lib/Types/Chat.js +9 -4
  44. package/lib/Types/Contact.js +3 -2
  45. package/lib/Types/Events.js +3 -2
  46. package/lib/Types/GroupMetadata.js +3 -2
  47. package/lib/Types/Label.js +24 -26
  48. package/lib/Types/LabelAssociation.js +6 -8
  49. package/lib/Types/Message.js +12 -7
  50. package/lib/Types/Newsletter.js +32 -17
  51. package/lib/Types/Product.js +3 -2
  52. package/lib/Types/Signal.js +3 -2
  53. package/lib/Types/Socket.js +4 -2
  54. package/lib/Types/State.js +11 -2
  55. package/lib/Types/USync.js +3 -2
  56. package/lib/Types/index.js +27 -41
  57. package/lib/Utils/auth-utils.js +211 -198
  58. package/lib/Utils/baileys-event-stream.js +42 -61
  59. package/lib/Utils/browser-utils.js +25 -0
  60. package/lib/Utils/business.js +213 -214
  61. package/lib/Utils/chat-utils.js +711 -689
  62. package/lib/Utils/crypto.js +112 -133
  63. package/lib/Utils/decode-wa-message.js +254 -186
  64. package/lib/Utils/event-buffer.js +510 -502
  65. package/lib/Utils/generics.js +318 -408
  66. package/lib/Utils/history.js +83 -90
  67. package/lib/Utils/index.js +21 -33
  68. package/lib/Utils/link-preview.js +71 -116
  69. package/lib/Utils/logger.js +5 -7
  70. package/lib/Utils/lt-hash.js +40 -46
  71. package/lib/Utils/make-mutex.js +34 -41
  72. package/lib/Utils/message-retry-manager.js +113 -0
  73. package/lib/Utils/messages-media.js +575 -671
  74. package/lib/Utils/messages.js +354 -462
  75. package/lib/Utils/noise-handler.js +138 -149
  76. package/lib/Utils/pre-key-manager.js +85 -0
  77. package/lib/Utils/process-message.js +323 -354
  78. package/lib/Utils/signal.js +148 -130
  79. package/lib/Utils/use-multi-file-auth-state.js +109 -91
  80. package/lib/Utils/validate-connection.js +183 -190
  81. package/lib/WABinary/constants.js +1298 -35
  82. package/lib/WABinary/decode.js +231 -256
  83. package/lib/WABinary/encode.js +207 -239
  84. package/lib/WABinary/generic-utils.js +119 -40
  85. package/lib/WABinary/index.js +7 -21
  86. package/lib/WABinary/jid-utils.js +88 -64
  87. package/lib/WABinary/types.js +3 -2
  88. package/lib/WAM/BinaryInfo.js +10 -12
  89. package/lib/WAM/constants.js +22851 -15348
  90. package/lib/WAM/encode.js +135 -136
  91. package/lib/WAM/index.js +5 -19
  92. package/lib/WAUSync/Protocols/USyncContactProtocol.js +28 -30
  93. package/lib/WAUSync/Protocols/USyncDeviceProtocol.js +49 -53
  94. package/lib/WAUSync/Protocols/USyncDisappearingModeProtocol.js +27 -28
  95. package/lib/WAUSync/Protocols/USyncStatusProtocol.js +36 -39
  96. package/lib/WAUSync/Protocols/UsyncBotProfileProtocol.js +50 -50
  97. package/lib/WAUSync/Protocols/UsyncLIDProtocol.js +26 -20
  98. package/lib/WAUSync/Protocols/index.js +6 -20
  99. package/lib/WAUSync/USyncQuery.js +86 -85
  100. package/lib/WAUSync/USyncUser.js +23 -25
  101. package/lib/WAUSync/index.js +5 -19
  102. package/lib/index.js +18 -33
  103. package/package.json +52 -57
  104. package/README.md +0 -2
  105. package/WASignalGroup/GroupProtocol.js +0 -1697
  106. package/WASignalGroup/ciphertext_message.js +0 -16
  107. package/WASignalGroup/group_cipher.js +0 -120
  108. package/WASignalGroup/group_session_builder.js +0 -46
  109. package/WASignalGroup/index.js +0 -5
  110. package/WASignalGroup/keyhelper.js +0 -21
  111. package/WASignalGroup/protobufs.js +0 -3
  112. package/WASignalGroup/queue_job.js +0 -69
  113. package/WASignalGroup/sender_chain_key.js +0 -50
  114. package/WASignalGroup/sender_key_distribution_message.js +0 -78
  115. package/WASignalGroup/sender_key_message.js +0 -92
  116. package/WASignalGroup/sender_key_record.js +0 -56
  117. package/WASignalGroup/sender_key_state.js +0 -129
  118. package/WASignalGroup/sender_message_key.js +0 -39
  119. package/lib/Defaults/baileys-version.json +0 -3
  120. package/lib/Defaults/phonenumber-mcc.json +0 -223
  121. package/lib/Socket/Client/abstract-socket-client.js +0 -13
  122. package/lib/Socket/Client/mobile-socket-client.js +0 -65
  123. package/lib/Socket/Client/web-socket-client.js +0 -62
  124. package/lib/Socket/registration.js +0 -166
  125. package/lib/Socket/usync.js +0 -70
  126. package/lib/Store/make-mongo-store.js +0 -567
@@ -1,155 +1,144 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.makeNoiseHandler = void 0;
4
- const boom_1 = require("@hapi/boom");
5
- const WAProto_1 = require("../../WAProto");
6
- const Defaults_1 = require("../Defaults");
7
- const WABinary_1 = require("../WABinary");
8
- const crypto_1 = require("./crypto");
1
+ //=======================================================//
2
+ import { aesDecryptGCM, aesEncryptGCM, Curve, hkdf, sha256 } from "./crypto.js";
3
+ import { NOISE_MODE, WA_CERT_DETAILS } from "../Defaults/index.js";
4
+ import { decodeBinaryNode } from "../WABinary/index.js";
5
+ import { proto } from "../../WAProto/index.js";
6
+ import { Boom } from "@hapi/boom";
7
+ //=======================================================//
9
8
  const generateIV = (counter) => {
10
- const iv = new ArrayBuffer(12);
11
- new DataView(iv).setUint32(8, counter);
12
- return new Uint8Array(iv);
9
+ const iv = new ArrayBuffer(12);
10
+ new DataView(iv).setUint32(8, counter);
11
+ return new Uint8Array(iv);
13
12
  };
14
- const makeNoiseHandler = ({ keyPair: { private: privateKey, public: publicKey }, NOISE_HEADER, mobile, logger, routingInfo }) => {
15
- logger = logger.child({ class: 'ns' });
16
- const authenticate = (data) => {
17
- if (!isFinished) {
18
- hash = (0, crypto_1.sha256)(Buffer.concat([hash, data]));
13
+ //=======================================================//
14
+ export const makeNoiseHandler = ({ keyPair: { private: privateKey, public: publicKey }, NOISE_HEADER, logger, routingInfo }) => {
15
+ logger = logger.child({ class: "ns" });
16
+ const authenticate = (data) => {
17
+ if (!isFinished) {
18
+ hash = sha256(Buffer.concat([hash, data]));
19
+ }
20
+ };
21
+ const encrypt = (plaintext) => {
22
+ const result = aesEncryptGCM(plaintext, encKey, generateIV(writeCounter), hash);
23
+ writeCounter += 1;
24
+ authenticate(result);
25
+ return result;
26
+ };
27
+ const decrypt = (ciphertext) => {
28
+ const iv = generateIV(isFinished ? readCounter : writeCounter);
29
+ const result = aesDecryptGCM(ciphertext, decKey, iv, hash);
30
+ if (isFinished) {
31
+ readCounter += 1;
32
+ }
33
+ else {
34
+ writeCounter += 1;
35
+ }
36
+ authenticate(ciphertext);
37
+ return result;
38
+ };
39
+ const localHKDF = async (data) => {
40
+ const key = await hkdf(Buffer.from(data), 64, { salt, info: "" });
41
+ return [key.slice(0, 32), key.slice(32)];
42
+ };
43
+ const mixIntoKey = async (data) => {
44
+ const [write, read] = await localHKDF(data);
45
+ salt = write;
46
+ encKey = read;
47
+ decKey = read;
48
+ readCounter = 0;
49
+ writeCounter = 0;
50
+ };
51
+ const finishInit = async () => {
52
+ const [write, read] = await localHKDF(new Uint8Array(0));
53
+ encKey = write;
54
+ decKey = read;
55
+ hash = Buffer.from([]);
56
+ readCounter = 0;
57
+ writeCounter = 0;
58
+ isFinished = true;
59
+ };
60
+ const data = Buffer.from(NOISE_MODE);
61
+ let hash = data.byteLength === 32 ? data : sha256(data);
62
+ let salt = hash;
63
+ let encKey = hash;
64
+ let decKey = hash;
65
+ let readCounter = 0;
66
+ let writeCounter = 0;
67
+ let isFinished = false;
68
+ let sentIntro = false;
69
+ let inBytes = Buffer.alloc(0);
70
+ authenticate(NOISE_HEADER);
71
+ authenticate(publicKey);
72
+ return {
73
+ encrypt,
74
+ decrypt,
75
+ authenticate,
76
+ mixIntoKey,
77
+ finishInit,
78
+ processHandshake: async ({ serverHello }, noiseKey) => {
79
+ authenticate(serverHello.ephemeral);
80
+ await mixIntoKey(Curve.sharedKey(privateKey, serverHello.ephemeral));
81
+ const decStaticContent = decrypt(serverHello.static);
82
+ await mixIntoKey(Curve.sharedKey(privateKey, decStaticContent));
83
+ const certDecoded = decrypt(serverHello.payload);
84
+ const { intermediate: certIntermediate } = proto.CertChain.decode(certDecoded);
85
+ const { issuerSerial } = proto.CertChain.NoiseCertificate.Details.decode(certIntermediate.details);
86
+ if (issuerSerial !== WA_CERT_DETAILS.SERIAL) {
87
+ throw new Boom("certification match failed", { statusCode: 400 });
88
+ }
89
+ const keyEnc = encrypt(noiseKey.public);
90
+ await mixIntoKey(Curve.sharedKey(noiseKey.private, serverHello.ephemeral));
91
+ return keyEnc;
92
+ },
93
+ encodeFrame: (data) => {
94
+ if (isFinished) {
95
+ data = encrypt(data);
96
+ }
97
+ let header;
98
+ if (routingInfo) {
99
+ header = Buffer.alloc(7);
100
+ header.write("ED", 0, "utf8");
101
+ header.writeUint8(0, 2);
102
+ header.writeUint8(1, 3);
103
+ header.writeUint8(routingInfo.byteLength >> 16, 4);
104
+ header.writeUint16BE(routingInfo.byteLength & 65535, 5);
105
+ header = Buffer.concat([header, routingInfo, NOISE_HEADER]);
106
+ }
107
+ else {
108
+ header = Buffer.from(NOISE_HEADER);
109
+ }
110
+ const introSize = sentIntro ? 0 : header.length;
111
+ const frame = Buffer.alloc(introSize + 3 + data.byteLength);
112
+ if (!sentIntro) {
113
+ frame.set(header);
114
+ sentIntro = true;
115
+ }
116
+ frame.writeUInt8(data.byteLength >> 16, introSize);
117
+ frame.writeUInt16BE(65535 & data.byteLength, introSize + 1);
118
+ frame.set(data, introSize + 3);
119
+ return frame;
120
+ },
121
+ decodeFrame: async (newData, onFrame) => {
122
+ const getBytesSize = () => {
123
+ if (inBytes.length >= 3) {
124
+ return (inBytes.readUInt8() << 16) | inBytes.readUInt16BE(1);
19
125
  }
20
- };
21
- const encrypt = (plaintext) => {
22
- const result = (0, crypto_1.aesEncryptGCM)(plaintext, encKey, generateIV(writeCounter), hash);
23
- writeCounter += 1;
24
- authenticate(result);
25
- return result;
26
- };
27
- const decrypt = (ciphertext) => {
28
- // before the handshake is finished, we use the same counter
29
- // after handshake, the counters are different
30
- const iv = generateIV(isFinished ? readCounter : writeCounter);
31
- const result = (0, crypto_1.aesDecryptGCM)(ciphertext, decKey, iv, hash);
126
+ };
127
+ inBytes = Buffer.concat([inBytes, newData]);
128
+ logger.trace(`recv ${newData.length} bytes, total recv ${inBytes.length} bytes`);
129
+ let size = getBytesSize();
130
+ while (size && inBytes.length >= size + 3) {
131
+ let frame = inBytes.slice(3, size + 3);
132
+ inBytes = inBytes.slice(size + 3);
32
133
  if (isFinished) {
33
- readCounter += 1;
134
+ const result = decrypt(frame);
135
+ frame = await decodeBinaryNode(result);
34
136
  }
35
- else {
36
- writeCounter += 1;
37
- }
38
- authenticate(ciphertext);
39
- return result;
40
- };
41
- const localHKDF = async (data) => {
42
- const key = await (0, crypto_1.hkdf)(Buffer.from(data), 64, { salt, info: '' });
43
- return [key.slice(0, 32), key.slice(32)];
44
- };
45
- const mixIntoKey = async (data) => {
46
- const [write, read] = await localHKDF(data);
47
- salt = write;
48
- encKey = read;
49
- decKey = read;
50
- readCounter = 0;
51
- writeCounter = 0;
52
- };
53
- const finishInit = async () => {
54
- const [write, read] = await localHKDF(new Uint8Array(0));
55
- encKey = write;
56
- decKey = read;
57
- hash = Buffer.from([]);
58
- readCounter = 0;
59
- writeCounter = 0;
60
- isFinished = true;
61
- };
62
- const data = Buffer.from(Defaults_1.NOISE_MODE);
63
- let hash = data.byteLength === 32 ? data : (0, crypto_1.sha256)(data);
64
- let salt = hash;
65
- let encKey = hash;
66
- let decKey = hash;
67
- let readCounter = 0;
68
- let writeCounter = 0;
69
- let isFinished = false;
70
- let sentIntro = false;
71
- let inBytes = Buffer.alloc(0);
72
- authenticate(NOISE_HEADER);
73
- authenticate(publicKey);
74
- return {
75
- encrypt,
76
- decrypt,
77
- authenticate,
78
- mixIntoKey,
79
- finishInit,
80
- processHandshake: async ({ serverHello }, noiseKey) => {
81
- authenticate(serverHello.ephemeral);
82
- await mixIntoKey(crypto_1.Curve.sharedKey(privateKey, serverHello.ephemeral));
83
- const decStaticContent = decrypt(serverHello.static);
84
- await mixIntoKey(crypto_1.Curve.sharedKey(privateKey, decStaticContent));
85
- const certDecoded = decrypt(serverHello.payload);
86
- if (mobile) {
87
- WAProto_1.proto.CertChain.NoiseCertificate.decode(certDecoded);
88
- }
89
- else {
90
- const { intermediate: certIntermediate } = WAProto_1.proto.CertChain.decode(certDecoded);
91
- const { issuerSerial } = WAProto_1.proto.CertChain.NoiseCertificate.Details.decode(certIntermediate.details);
92
- if (issuerSerial !== Defaults_1.WA_CERT_DETAILS.SERIAL) {
93
- throw new boom_1.Boom('certification match failed', { statusCode: 400 });
94
- }
95
- }
96
- const keyEnc = encrypt(noiseKey.public);
97
- await mixIntoKey(crypto_1.Curve.sharedKey(noiseKey.private, serverHello.ephemeral));
98
- return keyEnc;
99
- },
100
- encodeFrame: (data) => {
101
- if (isFinished) {
102
- data = encrypt(data);
103
- }
104
- let header;
105
- if (routingInfo) {
106
- header = Buffer.alloc(7);
107
- header.write('ED', 0, 'utf8');
108
- header.writeUint8(0, 2);
109
- header.writeUint8(1, 3);
110
- header.writeUint8(routingInfo.byteLength >> 16, 4);
111
- header.writeUint16BE(routingInfo.byteLength & 65535, 5);
112
- header = Buffer.concat([header, routingInfo, NOISE_HEADER]);
113
- }
114
- else {
115
- header = Buffer.from(NOISE_HEADER);
116
- }
117
- const introSize = sentIntro ? 0 : header.length;
118
- const frame = Buffer.alloc(introSize + 3 + data.byteLength);
119
- if (!sentIntro) {
120
- frame.set(header);
121
- sentIntro = true;
122
- }
123
- frame.writeUInt8(data.byteLength >> 16, introSize);
124
- frame.writeUInt16BE(65535 & data.byteLength, introSize + 1);
125
- frame.set(data, introSize + 3);
126
- return frame;
127
- },
128
- decodeFrame: async (newData, onFrame) => {
129
- var _a;
130
- // the binary protocol uses its own framing mechanism
131
- // on top of the WS frames
132
- // so we get this data and separate out the frames
133
- const getBytesSize = () => {
134
- if (inBytes.length >= 3) {
135
- return (inBytes.readUInt8() << 16) | inBytes.readUInt16BE(1);
136
- }
137
- };
138
- inBytes = Buffer.concat([inBytes, newData]);
139
- logger.trace(`recv ${newData.length} bytes, total recv ${inBytes.length} bytes`);
140
- let size = getBytesSize();
141
- while (size && inBytes.length >= size + 3) {
142
- let frame = inBytes.slice(3, size + 3);
143
- inBytes = inBytes.slice(size + 3);
144
- if (isFinished) {
145
- const result = decrypt(frame);
146
- frame = await (0, WABinary_1.decodeBinaryNode)(result);
147
- }
148
- logger.trace({ msg: (_a = frame === null || frame === void 0 ? void 0 : frame.attrs) === null || _a === void 0 ? void 0 : _a.id }, 'recv frame');
149
- onFrame(frame);
150
- size = getBytesSize();
151
- }
152
- }
153
- };
137
+ logger.trace({ msg: frame?.attrs?.id }, "recv frame");
138
+ onFrame(frame);
139
+ size = getBytesSize();
140
+ }
141
+ }
142
+ };
154
143
  };
155
- exports.makeNoiseHandler = makeNoiseHandler;
144
+ //=======================================================//
@@ -0,0 +1,85 @@
1
+ //=======================================================//
2
+ import PQueue from "p-queue";
3
+ //=======================================================//
4
+ export class PreKeyManager {
5
+ constructor(store, logger) {
6
+ this.store = store;
7
+ this.logger = logger;
8
+ this.queues = new Map();
9
+ }
10
+ getQueue(keyType) {
11
+ if (!this.queues.has(keyType)) {
12
+ this.queues.set(keyType, new PQueue({ concurrency: 1 }));
13
+ }
14
+ return this.queues.get(keyType);
15
+ }
16
+ async processOperations(data, keyType, transactionCache, mutations, isInTransaction) {
17
+ const keyData = data[keyType];
18
+ if (!keyData)
19
+ return;
20
+ return this.getQueue(keyType).add(async () => {
21
+ transactionCache[keyType] = transactionCache[keyType] || {};
22
+ mutations[keyType] = mutations[keyType] || {};
23
+ const deletions = [];
24
+ const updates = {};
25
+ for (const keyId in keyData) {
26
+ if (keyData[keyId] === null) {
27
+ deletions.push(keyId);
28
+ }
29
+ else {
30
+ updates[keyId] = keyData[keyId];
31
+ }
32
+ }
33
+ if (Object.keys(updates).length > 0) {
34
+ Object.assign(transactionCache[keyType], updates);
35
+ Object.assign(mutations[keyType], updates);
36
+ }
37
+ if (deletions.length > 0) {
38
+ await this.processDeletions(keyType, deletions, transactionCache, mutations, isInTransaction);
39
+ }
40
+ });
41
+ }
42
+ async processDeletions(keyType, ids, transactionCache, mutations, isInTransaction) {
43
+ if (isInTransaction) {
44
+ for (const keyId of ids) {
45
+ if (transactionCache[keyType]?.[keyId]) {
46
+ transactionCache[keyType][keyId] = null;
47
+ mutations[keyType][keyId] = null;
48
+ }
49
+ else {
50
+ this.logger.warn(`Skipping deletion of non-existent ${keyType} in transaction: ${keyId}`);
51
+ }
52
+ }
53
+ }
54
+ else {
55
+ const existingKeys = await this.store.get(keyType, ids);
56
+ for (const keyId of ids) {
57
+ if (existingKeys[keyId]) {
58
+ transactionCache[keyType][keyId] = null;
59
+ mutations[keyType][keyId] = null;
60
+ }
61
+ else {
62
+ this.logger.warn(`Skipping deletion of non-existent ${keyType}: ${keyId}`);
63
+ }
64
+ }
65
+ }
66
+ }
67
+ async validateDeletions(data, keyType) {
68
+ const keyData = data[keyType];
69
+ if (!keyData)
70
+ return;
71
+ return this.getQueue(keyType).add(async () => {
72
+ const deletionIds = Object.keys(keyData).filter(id => keyData[id] === null);
73
+ if (deletionIds.length === 0)
74
+ return;
75
+ const existingKeys = await this.store.get(keyType, deletionIds);
76
+ for (const keyId of deletionIds) {
77
+ if (!existingKeys[keyId]) {
78
+ this.logger.warn(`Skipping deletion of non-existent ${keyType}: ${keyId}`);
79
+ delete data[keyType][keyId];
80
+ }
81
+ }
82
+ });
83
+ }
84
+ }
85
+ //=======================================================//