@heavstaltech/baileys 1.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +200 -0
- package/WAProto/index.d.ts +50383 -0
- package/WAProto/index.js +155693 -0
- package/WASignalGroup/GroupProtocol.js +1697 -0
- package/WASignalGroup/ciphertext_message.js +16 -0
- package/WASignalGroup/group_cipher.js +120 -0
- package/WASignalGroup/group_session_builder.js +46 -0
- package/WASignalGroup/index.js +5 -0
- package/WASignalGroup/keyhelper.js +21 -0
- package/WASignalGroup/protobufs.js +3 -0
- package/WASignalGroup/queue_job.js +69 -0
- package/WASignalGroup/sender_chain_key.js +50 -0
- package/WASignalGroup/sender_key_distribution_message.js +78 -0
- package/WASignalGroup/sender_key_message.js +92 -0
- package/WASignalGroup/sender_key_name.js +70 -0
- package/WASignalGroup/sender_key_record.js +56 -0
- package/WASignalGroup/sender_key_state.js +129 -0
- package/WASignalGroup/sender_message_key.js +39 -0
- package/lib/Defaults/baileys-version.json +3 -0
- package/lib/Defaults/index.d.ts +53 -0
- package/lib/Defaults/index.js +108 -0
- package/lib/Signal/libsignal.d.ts +3 -0
- package/lib/Signal/libsignal.js +152 -0
- package/lib/Socket/Client/abstract-socket-client.d.ts +17 -0
- package/lib/Socket/Client/abstract-socket-client.js +13 -0
- package/lib/Socket/Client/index.d.ts +3 -0
- package/lib/Socket/Client/index.js +19 -0
- package/lib/Socket/Client/mobile-socket-client.d.ts +13 -0
- package/lib/Socket/Client/mobile-socket-client.js +65 -0
- package/lib/Socket/Client/web-socket-client.d.ts +12 -0
- package/lib/Socket/Client/web-socket-client.js +62 -0
- package/lib/Socket/business.d.ts +170 -0
- package/lib/Socket/business.js +260 -0
- package/lib/Socket/chats.d.ts +81 -0
- package/lib/Socket/chats.js +950 -0
- package/lib/Socket/groups.d.ts +115 -0
- package/lib/Socket/groups.js +315 -0
- package/lib/Socket/index.d.ts +172 -0
- package/lib/Socket/index.js +10 -0
- package/lib/Socket/messages-recv.d.ts +158 -0
- package/lib/Socket/messages-recv.js +972 -0
- package/lib/Socket/messages-send.d.ts +155 -0
- package/lib/Socket/messages-send.js +1087 -0
- package/lib/Socket/newsletter.d.ts +132 -0
- package/lib/Socket/newsletter.js +236 -0
- package/lib/Socket/registration.d.ts +264 -0
- package/lib/Socket/registration.js +166 -0
- package/lib/Socket/socket.d.ts +44 -0
- package/lib/Socket/socket.js +643 -0
- package/lib/Socket/usync.d.ts +37 -0
- package/lib/Socket/usync.js +70 -0
- package/lib/Store/index.d.ts +3 -0
- package/lib/Store/index.js +10 -0
- package/lib/Store/make-cache-manager-store.d.ts +14 -0
- package/lib/Store/make-cache-manager-store.js +83 -0
- package/lib/Store/make-in-memory-store.d.ts +118 -0
- package/lib/Store/make-in-memory-store.js +431 -0
- package/lib/Store/make-ordered-dictionary.d.ts +13 -0
- package/lib/Store/make-ordered-dictionary.js +81 -0
- package/lib/Store/object-repository.d.ts +10 -0
- package/lib/Store/object-repository.js +27 -0
- package/lib/Types/Auth.d.ts +109 -0
- package/lib/Types/Auth.js +2 -0
- package/lib/Types/Call.d.ts +13 -0
- package/lib/Types/Call.js +2 -0
- package/lib/Types/Chat.d.ts +107 -0
- package/lib/Types/Chat.js +4 -0
- package/lib/Types/Contact.d.ts +19 -0
- package/lib/Types/Contact.js +2 -0
- package/lib/Types/Events.d.ts +172 -0
- package/lib/Types/Events.js +2 -0
- package/lib/Types/GroupMetadata.d.ts +56 -0
- package/lib/Types/GroupMetadata.js +2 -0
- package/lib/Types/Label.d.ts +46 -0
- package/lib/Types/Label.js +27 -0
- package/lib/Types/LabelAssociation.d.ts +29 -0
- package/lib/Types/LabelAssociation.js +9 -0
- package/lib/Types/Message.d.ts +433 -0
- package/lib/Types/Message.js +9 -0
- package/lib/Types/Newsletter.d.ts +92 -0
- package/lib/Types/Newsletter.js +32 -0
- package/lib/Types/Product.d.ts +78 -0
- package/lib/Types/Product.js +2 -0
- package/lib/Types/Signal.d.ts +57 -0
- package/lib/Types/Signal.js +2 -0
- package/lib/Types/Socket.d.ts +116 -0
- package/lib/Types/Socket.js +2 -0
- package/lib/Types/State.d.ts +27 -0
- package/lib/Types/State.js +2 -0
- package/lib/Types/USync.d.ts +25 -0
- package/lib/Types/USync.js +2 -0
- package/lib/Types/index.d.ts +66 -0
- package/lib/Types/index.js +42 -0
- package/lib/Utils/auth-utils.d.ts +18 -0
- package/lib/Utils/auth-utils.js +227 -0
- package/lib/Utils/baileys-event-stream.d.ts +16 -0
- package/lib/Utils/baileys-event-stream.js +63 -0
- package/lib/Utils/business.d.ts +22 -0
- package/lib/Utils/business.js +234 -0
- package/lib/Utils/chat-utils.d.ts +70 -0
- package/lib/Utils/chat-utils.js +745 -0
- package/lib/Utils/crypto.d.ts +40 -0
- package/lib/Utils/crypto.js +199 -0
- package/lib/Utils/decode-wa-message.d.ts +36 -0
- package/lib/Utils/decode-wa-message.js +234 -0
- package/lib/Utils/event-buffer.d.ts +35 -0
- package/lib/Utils/event-buffer.js +517 -0
- package/lib/Utils/generics.d.ts +88 -0
- package/lib/Utils/generics.js +402 -0
- package/lib/Utils/history.d.ts +19 -0
- package/lib/Utils/history.js +94 -0
- package/lib/Utils/index.d.ts +17 -0
- package/lib/Utils/index.js +33 -0
- package/lib/Utils/link-preview.d.ts +21 -0
- package/lib/Utils/link-preview.js +93 -0
- package/lib/Utils/logger.d.ts +2 -0
- package/lib/Utils/logger.js +7 -0
- package/lib/Utils/lt-hash.d.ts +12 -0
- package/lib/Utils/lt-hash.js +51 -0
- package/lib/Utils/make-mutex.d.ts +7 -0
- package/lib/Utils/make-mutex.js +43 -0
- package/lib/Utils/messages-media.d.ts +113 -0
- package/lib/Utils/messages-media.js +721 -0
- package/lib/Utils/messages.d.ts +77 -0
- package/lib/Utils/messages.js +1221 -0
- package/lib/Utils/noise-handler.d.ts +20 -0
- package/lib/Utils/noise-handler.js +160 -0
- package/lib/Utils/process-message.d.ts +41 -0
- package/lib/Utils/process-message.js +373 -0
- package/lib/Utils/signal.d.ts +33 -0
- package/lib/Utils/signal.js +159 -0
- package/lib/Utils/use-multi-file-auth-state.d.ts +12 -0
- package/lib/Utils/use-multi-file-auth-state.js +295 -0
- package/lib/Utils/use-single-file-auth-state.d.ts +12 -0
- package/lib/Utils/use-single-file-auth-state.js +75 -0
- package/lib/Utils/validate-connection.d.ts +11 -0
- package/lib/Utils/validate-connection.js +205 -0
- package/lib/WABinary/constants.d.ts +27 -0
- package/lib/WABinary/constants.js +40 -0
- package/lib/WABinary/decode.d.ts +6 -0
- package/lib/WABinary/decode.js +264 -0
- package/lib/WABinary/encode.d.ts +2 -0
- package/lib/WABinary/encode.js +252 -0
- package/lib/WABinary/generic-utils.d.ts +14 -0
- package/lib/WABinary/generic-utils.js +110 -0
- package/lib/WABinary/index.d.ts +5 -0
- package/lib/WABinary/index.js +21 -0
- package/lib/WABinary/jid-utils.d.ts +31 -0
- package/lib/WABinary/jid-utils.js +62 -0
- package/lib/WABinary/types.d.ts +18 -0
- package/lib/WABinary/types.js +2 -0
- package/lib/WAM/BinaryInfo.d.ts +8 -0
- package/lib/WAM/BinaryInfo.js +13 -0
- package/lib/WAM/constants.d.ts +38 -0
- package/lib/WAM/constants.js +15350 -0
- package/lib/WAM/encode.d.ts +2 -0
- package/lib/WAM/encode.js +155 -0
- package/lib/WAM/index.d.ts +3 -0
- package/lib/WAM/index.js +19 -0
- package/lib/WAUSync/Protocols/USyncContactProtocol.d.ts +9 -0
- package/lib/WAUSync/Protocols/USyncContactProtocol.js +32 -0
- package/lib/WAUSync/Protocols/USyncDeviceProtocol.d.ts +22 -0
- package/lib/WAUSync/Protocols/USyncDeviceProtocol.js +57 -0
- package/lib/WAUSync/Protocols/USyncDisappearingModeProtocol.d.ts +12 -0
- package/lib/WAUSync/Protocols/USyncDisappearingModeProtocol.js +30 -0
- package/lib/WAUSync/Protocols/USyncStatusProtocol.d.ts +12 -0
- package/lib/WAUSync/Protocols/USyncStatusProtocol.js +42 -0
- package/lib/WAUSync/Protocols/UsyncBotProfileProtocol.d.ts +25 -0
- package/lib/WAUSync/Protocols/UsyncBotProfileProtocol.js +53 -0
- package/lib/WAUSync/Protocols/UsyncLIDProtocol.d.ts +8 -0
- package/lib/WAUSync/Protocols/UsyncLIDProtocol.js +24 -0
- package/lib/WAUSync/Protocols/index.d.ts +4 -0
- package/lib/WAUSync/Protocols/index.js +20 -0
- package/lib/WAUSync/USyncQuery.d.ts +28 -0
- package/lib/WAUSync/USyncQuery.js +89 -0
- package/lib/WAUSync/USyncUser.d.ts +10 -0
- package/lib/WAUSync/USyncUser.js +26 -0
- package/lib/WAUSync/index.d.ts +3 -0
- package/lib/WAUSync/index.js +19 -0
- package/lib/index.js +31 -0
- package/package.json +103 -0
|
@@ -0,0 +1,159 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.getNextPreKeysNode = exports.getNextPreKeys = exports.extractDeviceJids = exports.parseAndInjectE2ESessions = exports.xmppPreKey = exports.xmppSignedPreKey = exports.generateOrGetPreKeys = exports.getPreKeys = exports.createSignalIdentity = void 0;
|
|
4
|
+
const Defaults_1 = require("../Defaults");
|
|
5
|
+
const WABinary_1 = require("../WABinary");
|
|
6
|
+
const crypto_1 = require("./crypto");
|
|
7
|
+
const generics_1 = require("./generics");
|
|
8
|
+
function chunk(array, size) {
|
|
9
|
+
const result = [];
|
|
10
|
+
for (let i = 0; i < array.length; i += size) {
|
|
11
|
+
result.push(array.slice(i, i + size));
|
|
12
|
+
}
|
|
13
|
+
return result;
|
|
14
|
+
}
|
|
15
|
+
const createSignalIdentity = (wid, accountSignatureKey) => {
|
|
16
|
+
return {
|
|
17
|
+
identifier: { name: wid, deviceId: 0 },
|
|
18
|
+
identifierKey: (0, crypto_1.generateSignalPubKey)(accountSignatureKey)
|
|
19
|
+
};
|
|
20
|
+
};
|
|
21
|
+
exports.createSignalIdentity = createSignalIdentity;
|
|
22
|
+
const getPreKeys = async ({ get }, min, limit) => {
|
|
23
|
+
const idList = [];
|
|
24
|
+
for (let id = min; id < limit; id++) {
|
|
25
|
+
idList.push(id.toString());
|
|
26
|
+
}
|
|
27
|
+
return get('pre-key', idList);
|
|
28
|
+
};
|
|
29
|
+
exports.getPreKeys = getPreKeys;
|
|
30
|
+
const generateOrGetPreKeys = (creds, range) => {
|
|
31
|
+
const avaliable = creds.nextPreKeyId - creds.firstUnuploadedPreKeyId;
|
|
32
|
+
const remaining = range - avaliable;
|
|
33
|
+
const lastPreKeyId = creds.nextPreKeyId + remaining - 1;
|
|
34
|
+
const newPreKeys = {};
|
|
35
|
+
if (remaining > 0) {
|
|
36
|
+
for (let i = creds.nextPreKeyId; i <= lastPreKeyId; i++) {
|
|
37
|
+
newPreKeys[i] = crypto_1.Curve.generateKeyPair();
|
|
38
|
+
}
|
|
39
|
+
}
|
|
40
|
+
return {
|
|
41
|
+
newPreKeys,
|
|
42
|
+
lastPreKeyId,
|
|
43
|
+
preKeysRange: [creds.firstUnuploadedPreKeyId, range],
|
|
44
|
+
};
|
|
45
|
+
};
|
|
46
|
+
exports.generateOrGetPreKeys = generateOrGetPreKeys;
|
|
47
|
+
const xmppSignedPreKey = (key) => ({
|
|
48
|
+
tag: 'skey',
|
|
49
|
+
attrs: {},
|
|
50
|
+
content: [
|
|
51
|
+
{ tag: 'id', attrs: {}, content: (0, generics_1.encodeBigEndian)(key.keyId, 3) },
|
|
52
|
+
{ tag: 'value', attrs: {}, content: key.keyPair.public },
|
|
53
|
+
{ tag: 'signature', attrs: {}, content: key.signature }
|
|
54
|
+
]
|
|
55
|
+
});
|
|
56
|
+
exports.xmppSignedPreKey = xmppSignedPreKey;
|
|
57
|
+
const xmppPreKey = (pair, id) => ({
|
|
58
|
+
tag: 'key',
|
|
59
|
+
attrs: {},
|
|
60
|
+
content: [
|
|
61
|
+
{ tag: 'id', attrs: {}, content: (0, generics_1.encodeBigEndian)(id, 3) },
|
|
62
|
+
{ tag: 'value', attrs: {}, content: pair.public }
|
|
63
|
+
]
|
|
64
|
+
});
|
|
65
|
+
exports.xmppPreKey = xmppPreKey;
|
|
66
|
+
const parseAndInjectE2ESessions = async (node, repository) => {
|
|
67
|
+
const extractKey = (key) => (key ? ({
|
|
68
|
+
keyId: (0, WABinary_1.getBinaryNodeChildUInt)(key, 'id', 3),
|
|
69
|
+
publicKey: (0, crypto_1.generateSignalPubKey)((0, WABinary_1.getBinaryNodeChildBuffer)(key, 'value')),
|
|
70
|
+
signature: (0, WABinary_1.getBinaryNodeChildBuffer)(key, 'signature'),
|
|
71
|
+
}) : undefined);
|
|
72
|
+
const nodes = (0, WABinary_1.getBinaryNodeChildren)((0, WABinary_1.getBinaryNodeChild)(node, 'list'), 'user');
|
|
73
|
+
for (const node of nodes) {
|
|
74
|
+
(0, WABinary_1.assertNodeErrorFree)(node);
|
|
75
|
+
}
|
|
76
|
+
// Most of the work in repository.injectE2ESession is CPU intensive, not IO
|
|
77
|
+
// So Promise.all doesn't really help here,
|
|
78
|
+
// but blocks even loop if we're using it inside keys.transaction, and it makes it "sync" actually
|
|
79
|
+
// This way we chunk it in smaller parts and between those parts we can yield to the event loop
|
|
80
|
+
// It's rare case when you need to E2E sessions for so many users, but it's possible
|
|
81
|
+
const chunkSize = 100;
|
|
82
|
+
const chunks = chunk(nodes, chunkSize);
|
|
83
|
+
for (const nodesChunk of chunks) {
|
|
84
|
+
await Promise.all(nodesChunk.map(async (node) => {
|
|
85
|
+
const signedKey = (0, WABinary_1.getBinaryNodeChild)(node, 'skey');
|
|
86
|
+
const key = (0, WABinary_1.getBinaryNodeChild)(node, 'key');
|
|
87
|
+
const identity = (0, WABinary_1.getBinaryNodeChildBuffer)(node, 'identity');
|
|
88
|
+
const jid = node.attrs.jid;
|
|
89
|
+
const registrationId = (0, WABinary_1.getBinaryNodeChildUInt)(node, 'registration', 4);
|
|
90
|
+
await repository.injectE2ESession({
|
|
91
|
+
jid,
|
|
92
|
+
session: {
|
|
93
|
+
registrationId: registrationId,
|
|
94
|
+
identityKey: (0, crypto_1.generateSignalPubKey)(identity),
|
|
95
|
+
signedPreKey: extractKey(signedKey),
|
|
96
|
+
preKey: extractKey(key)
|
|
97
|
+
}
|
|
98
|
+
});
|
|
99
|
+
}));
|
|
100
|
+
}
|
|
101
|
+
};
|
|
102
|
+
exports.parseAndInjectE2ESessions = parseAndInjectE2ESessions;
|
|
103
|
+
const extractDeviceJids = (result, myJid, excludeZeroDevices) => {
|
|
104
|
+
const { user: myUser, device: myDevice } = (0, WABinary_1.jidDecode)(myJid);
|
|
105
|
+
const extracted = [];
|
|
106
|
+
for (const userResult of result) {
|
|
107
|
+
const { devices, id } = userResult;
|
|
108
|
+
const { user } = (0, WABinary_1.jidDecode)(id);
|
|
109
|
+
const deviceList = devices === null || devices === void 0 ? void 0 : devices.deviceList;
|
|
110
|
+
if (Array.isArray(deviceList)) {
|
|
111
|
+
for (const { id: device, keyIndex } of deviceList) {
|
|
112
|
+
if ((!excludeZeroDevices || device !== 0) && // if zero devices are not-excluded, or device is non zero
|
|
113
|
+
(myUser !== user || myDevice !== device) && // either different user or if me user, not this device
|
|
114
|
+
(device === 0 || !!keyIndex) // ensure that "key-index" is specified for "non-zero" devices, produces a bad req otherwise
|
|
115
|
+
) {
|
|
116
|
+
extracted.push({ user, device });
|
|
117
|
+
}
|
|
118
|
+
}
|
|
119
|
+
}
|
|
120
|
+
}
|
|
121
|
+
return extracted;
|
|
122
|
+
};
|
|
123
|
+
exports.extractDeviceJids = extractDeviceJids;
|
|
124
|
+
/**
|
|
125
|
+
* get the next N keys for upload or processing
|
|
126
|
+
* @param count number of pre-keys to get or generate
|
|
127
|
+
*/
|
|
128
|
+
const getNextPreKeys = async ({ creds, keys }, count) => {
|
|
129
|
+
const { newPreKeys, lastPreKeyId, preKeysRange } = (0, exports.generateOrGetPreKeys)(creds, count);
|
|
130
|
+
const update = {
|
|
131
|
+
nextPreKeyId: Math.max(lastPreKeyId + 1, creds.nextPreKeyId),
|
|
132
|
+
firstUnuploadedPreKeyId: Math.max(creds.firstUnuploadedPreKeyId, lastPreKeyId + 1)
|
|
133
|
+
};
|
|
134
|
+
await keys.set({ 'pre-key': newPreKeys });
|
|
135
|
+
const preKeys = await (0, exports.getPreKeys)(keys, preKeysRange[0], preKeysRange[0] + preKeysRange[1]);
|
|
136
|
+
return { update, preKeys };
|
|
137
|
+
};
|
|
138
|
+
exports.getNextPreKeys = getNextPreKeys;
|
|
139
|
+
const getNextPreKeysNode = async (state, count) => {
|
|
140
|
+
const { creds } = state;
|
|
141
|
+
const { update, preKeys } = await (0, exports.getNextPreKeys)(state, count);
|
|
142
|
+
const node = {
|
|
143
|
+
tag: 'iq',
|
|
144
|
+
attrs: {
|
|
145
|
+
xmlns: 'encrypt',
|
|
146
|
+
type: 'set',
|
|
147
|
+
to: WABinary_1.S_WHATSAPP_NET,
|
|
148
|
+
},
|
|
149
|
+
content: [
|
|
150
|
+
{ tag: 'registration', attrs: {}, content: (0, generics_1.encodeBigEndian)(creds.registrationId) },
|
|
151
|
+
{ tag: 'type', attrs: {}, content: Defaults_1.KEY_BUNDLE_TYPE },
|
|
152
|
+
{ tag: 'identity', attrs: {}, content: creds.signedIdentityKey.public },
|
|
153
|
+
{ tag: 'list', attrs: {}, content: Object.keys(preKeys).map(k => (0, exports.xmppPreKey)(preKeys[+k], +k)) },
|
|
154
|
+
(0, exports.xmppSignedPreKey)(creds.signedPreKey)
|
|
155
|
+
]
|
|
156
|
+
};
|
|
157
|
+
return { update, node };
|
|
158
|
+
};
|
|
159
|
+
exports.getNextPreKeysNode = getNextPreKeysNode;
|
|
@@ -0,0 +1,12 @@
|
|
|
1
|
+
import { AuthenticationState } from '../Types';
|
|
2
|
+
/**
|
|
3
|
+
* stores the full authentication state in a single folder.
|
|
4
|
+
* Far more efficient than singlefileauthstate
|
|
5
|
+
*
|
|
6
|
+
* Again, I wouldn't endorse this for any production level use other than perhaps a bot.
|
|
7
|
+
* Would recommend writing an auth state for use with a proper SQL or No-SQL DB
|
|
8
|
+
* */
|
|
9
|
+
export declare const useMultiFileAuthState: (folder: string) => Promise<{
|
|
10
|
+
state: AuthenticationState;
|
|
11
|
+
saveCreds: () => Promise<void>;
|
|
12
|
+
}>;
|
|
@@ -0,0 +1,295 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
3
|
+
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
4
|
+
};
|
|
5
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
6
|
+
exports.useMultiFileAuthState = void 0;
|
|
7
|
+
const async_lock_1 = __importDefault(require("async-lock"));
|
|
8
|
+
const promises_1 = require("fs/promises");
|
|
9
|
+
const path_1 = require("path");
|
|
10
|
+
const WAProto_1 = require("../../WAProto");
|
|
11
|
+
const auth_utils_1 = require("./auth-utils");
|
|
12
|
+
const generics_1 = require("./generics");
|
|
13
|
+
const node_cache_1 = __importDefault(require("node-cache"));
|
|
14
|
+
const Defaults_1 = require("../Defaults");
|
|
15
|
+
|
|
16
|
+
// Enhanced locking mechanism
|
|
17
|
+
const fileLock = new async_lock_1.default({
|
|
18
|
+
maxPending: Infinity,
|
|
19
|
+
timeout: 5000 // 5s timeout to prevent deadlocks
|
|
20
|
+
});
|
|
21
|
+
const globalAuthLock = new async_lock_1.default(); // Additional global lock
|
|
22
|
+
|
|
23
|
+
// Debugging utilities
|
|
24
|
+
let AUTH_DEBUG = false;
|
|
25
|
+
function authDebug(...args) {
|
|
26
|
+
if (AUTH_DEBUG) {
|
|
27
|
+
console.log('[AUTH DEBUG]', new Date().toISOString(), ...args);
|
|
28
|
+
}
|
|
29
|
+
}
|
|
30
|
+
|
|
31
|
+
/**
|
|
32
|
+
* Enhanced multi-file auth state storage with:
|
|
33
|
+
* - Better error handling
|
|
34
|
+
* - Additional locking
|
|
35
|
+
* - Data validation
|
|
36
|
+
* - Auto-repair mechanisms
|
|
37
|
+
*/
|
|
38
|
+
const useMultiFileAuthState = async (folder, options = {}) => {
|
|
39
|
+
AUTH_DEBUG = options.authDebug ?? false;
|
|
40
|
+
const cache = options.syncCache ? new node_cache_1.default({
|
|
41
|
+
stdTTL: Defaults_1.DEFAULT_CACHE_TTLS.SIGNAL_STORE,
|
|
42
|
+
useClones: false,
|
|
43
|
+
deleteOnExpire: true,
|
|
44
|
+
checkperiod: 120
|
|
45
|
+
}) : null;
|
|
46
|
+
// Validate and prepare folder
|
|
47
|
+
const prepareFolder = async () => {
|
|
48
|
+
try {
|
|
49
|
+
const folderInfo = await (0, promises_1.stat)(folder).catch(() => null);
|
|
50
|
+
|
|
51
|
+
if (folderInfo) {
|
|
52
|
+
if (!folderInfo.isDirectory()) {
|
|
53
|
+
throw new Error(`Path exists but is not a directory: ${folder}`);
|
|
54
|
+
}
|
|
55
|
+
} else {
|
|
56
|
+
authDebug('Creating auth folder:', folder);
|
|
57
|
+
await (0, promises_1.mkdir)(folder, { recursive: true });
|
|
58
|
+
}
|
|
59
|
+
|
|
60
|
+
// Verify folder is writable
|
|
61
|
+
await testFolderAccess();
|
|
62
|
+
} catch (error) {
|
|
63
|
+
authDebug('Folder preparation failed:', error);
|
|
64
|
+
throw new Error(`Auth folder initialization failed: ${error.message}`);
|
|
65
|
+
}
|
|
66
|
+
};
|
|
67
|
+
|
|
68
|
+
const testFolderAccess = async () => {
|
|
69
|
+
const testFile = (0, path_1.join)(folder, '.temp_test');
|
|
70
|
+
try {
|
|
71
|
+
await (0, promises_1.writeFile)(testFile, 'test');
|
|
72
|
+
await (0, promises_1.unlink)(testFile);
|
|
73
|
+
} catch (error) {
|
|
74
|
+
throw new Error(`Folder not writable: ${error.message}`);
|
|
75
|
+
}
|
|
76
|
+
};
|
|
77
|
+
|
|
78
|
+
const fixFileName = (file) => {
|
|
79
|
+
if (!file) return file;
|
|
80
|
+
return file.replace(/\//g, '__').replace(/:/g, '-');
|
|
81
|
+
};
|
|
82
|
+
|
|
83
|
+
function getUniqueId(type, id) {
|
|
84
|
+
return `${type}.${id}`;
|
|
85
|
+
}
|
|
86
|
+
|
|
87
|
+
// Enhanced write with retries
|
|
88
|
+
const writeData = async (data, file) => {
|
|
89
|
+
return globalAuthLock.acquire('write', async () => {
|
|
90
|
+
const filePath = (0, path_1.join)(folder, fixFileName(file));
|
|
91
|
+
let attempts = 0;
|
|
92
|
+
const maxAttempts = 3;
|
|
93
|
+
|
|
94
|
+
while (attempts < maxAttempts) {
|
|
95
|
+
attempts++;
|
|
96
|
+
try {
|
|
97
|
+
await fileLock.acquire(filePath, async () => {
|
|
98
|
+
const serialized = JSON.stringify(data, generics_1.BufferJSON.replacer);
|
|
99
|
+
await (0, promises_1.writeFile)(filePath, serialized);
|
|
100
|
+
authDebug('Write successful:', file);
|
|
101
|
+
});
|
|
102
|
+
return;
|
|
103
|
+
} catch (error) {
|
|
104
|
+
authDebug(`Write attempt ${attempts} failed for ${file}:`, error);
|
|
105
|
+
if (attempts >= maxAttempts) {
|
|
106
|
+
throw new Error(`Failed to write after ${maxAttempts} attempts: ${error.message}`);
|
|
107
|
+
}
|
|
108
|
+
await new Promise(resolve => setTimeout(resolve, 100 * attempts));
|
|
109
|
+
}
|
|
110
|
+
}
|
|
111
|
+
});
|
|
112
|
+
};
|
|
113
|
+
|
|
114
|
+
// Enhanced read with validation
|
|
115
|
+
const readData = async (file) => {
|
|
116
|
+
return globalAuthLock.acquire('read', async () => {
|
|
117
|
+
const filePath = (0, path_1.join)(folder, fixFileName(file));
|
|
118
|
+
|
|
119
|
+
try {
|
|
120
|
+
const data = await fileLock.acquire(filePath, async () => {
|
|
121
|
+
const content = await (0, promises_1.readFile)(filePath, { encoding: 'utf-8' });
|
|
122
|
+
authDebug('Read successful:', file);
|
|
123
|
+
return content;
|
|
124
|
+
});
|
|
125
|
+
|
|
126
|
+
const parsed = JSON.parse(data, generics_1.BufferJSON.reviver);
|
|
127
|
+
|
|
128
|
+
// Basic data validation
|
|
129
|
+
if (file === 'creds.json' && !parsed.me) {
|
|
130
|
+
authDebug('Invalid creds data detected');
|
|
131
|
+
return null;
|
|
132
|
+
}
|
|
133
|
+
|
|
134
|
+
return parsed;
|
|
135
|
+
} catch (error) {
|
|
136
|
+
if (error.code !== 'ENOENT') { // Ignore "file not found" errors
|
|
137
|
+
authDebug('Read error:', file, error);
|
|
138
|
+
}
|
|
139
|
+
return null;
|
|
140
|
+
}
|
|
141
|
+
});
|
|
142
|
+
};
|
|
143
|
+
|
|
144
|
+
// Safe removal
|
|
145
|
+
const removeData = async (file) => {
|
|
146
|
+
return globalAuthLock.acquire('remove', async () => {
|
|
147
|
+
const filePath = (0, path_1.join)(folder, fixFileName(file));
|
|
148
|
+
|
|
149
|
+
try {
|
|
150
|
+
await fileLock.acquire(filePath, async () => {
|
|
151
|
+
await (0, promises_1.unlink)(filePath);
|
|
152
|
+
authDebug('Removed:', file);
|
|
153
|
+
});
|
|
154
|
+
} catch (error) {
|
|
155
|
+
if (error.code !== 'ENOENT') { // Ignore "file not found" errors
|
|
156
|
+
authDebug('Remove error:', file, error);
|
|
157
|
+
}
|
|
158
|
+
}
|
|
159
|
+
});
|
|
160
|
+
};
|
|
161
|
+
|
|
162
|
+
// Initialize
|
|
163
|
+
await prepareFolder();
|
|
164
|
+
|
|
165
|
+
// Load or initialize credentials
|
|
166
|
+
let creds = await readData('creds.json');
|
|
167
|
+
if (!creds) {
|
|
168
|
+
authDebug('No existing creds found, initializing new ones');
|
|
169
|
+
creds = (0, auth_utils_1.initAuthCreds)();
|
|
170
|
+
await writeData(creds, 'creds.json');
|
|
171
|
+
}
|
|
172
|
+
|
|
173
|
+
async function warmUpCache() {
|
|
174
|
+
try {
|
|
175
|
+
const files = await promises_1.readdir(folder);
|
|
176
|
+
for (const file of files) {
|
|
177
|
+
if (file.endsWith('.json') && file !== 'creds.json') {
|
|
178
|
+
const parts = file.split('-');
|
|
179
|
+
if (parts.length === 2) {
|
|
180
|
+
const type = parts[0];
|
|
181
|
+
const id = parts[1].replace('.json', '');
|
|
182
|
+
const data = await readData(file);
|
|
183
|
+
if (data) {
|
|
184
|
+
cache.set(getUniqueId(type, id), data);
|
|
185
|
+
authDebug(`Cache warmed: ${type}-${id}`);
|
|
186
|
+
}
|
|
187
|
+
}
|
|
188
|
+
}
|
|
189
|
+
}
|
|
190
|
+
} catch (error) {
|
|
191
|
+
authDebug('Cache warm-up failed:', error);
|
|
192
|
+
}
|
|
193
|
+
}
|
|
194
|
+
|
|
195
|
+
if (cache) warmUpCache();
|
|
196
|
+
|
|
197
|
+
// Auto-save mechanism
|
|
198
|
+
let saveTimeout;
|
|
199
|
+
const scheduleSave = () => {
|
|
200
|
+
if (saveTimeout) clearTimeout(saveTimeout);
|
|
201
|
+
saveTimeout = setTimeout(() => {
|
|
202
|
+
saveCreds().catch(error => {
|
|
203
|
+
authDebug('Auto-save failed, retrying sooner:', error);
|
|
204
|
+
setTimeout(scheduleSave, 60000);
|
|
205
|
+
});
|
|
206
|
+
}, 180000);
|
|
207
|
+
};
|
|
208
|
+
// Enhanced save function
|
|
209
|
+
const saveCreds = async () => {
|
|
210
|
+
try {
|
|
211
|
+
await writeData(creds, 'creds.json');
|
|
212
|
+
scheduleSave();
|
|
213
|
+
} catch (error) {
|
|
214
|
+
authDebug('Critical: Creds save failed:', error);
|
|
215
|
+
throw error;
|
|
216
|
+
}
|
|
217
|
+
};
|
|
218
|
+
|
|
219
|
+
process.on('beforeExit', async () => {
|
|
220
|
+
if (saveTimeout) clearTimeout(saveTimeout);
|
|
221
|
+
await saveCreds().catch(error => {
|
|
222
|
+
authDebug('Emergency save failed:', error);
|
|
223
|
+
});
|
|
224
|
+
});
|
|
225
|
+
|
|
226
|
+
process.on('uncaughtException', async (error) => {
|
|
227
|
+
authDebug('Uncaught exception, attempting emergency save:', error);
|
|
228
|
+
if (saveTimeout) clearTimeout(saveTimeout);
|
|
229
|
+
await saveCreds().catch(e => {
|
|
230
|
+
authDebug('Emergency save failed:', e);
|
|
231
|
+
});
|
|
232
|
+
process.exit(1);
|
|
233
|
+
});
|
|
234
|
+
// Start auto-save loop
|
|
235
|
+
scheduleSave();
|
|
236
|
+
|
|
237
|
+
return {
|
|
238
|
+
state: {
|
|
239
|
+
creds,
|
|
240
|
+
keys: {
|
|
241
|
+
get: async (type, ids) => {
|
|
242
|
+
const data = {};
|
|
243
|
+
|
|
244
|
+
await Promise.all(ids.map(async (id) => {
|
|
245
|
+
let value = await readData(`${type}-${id}.json`);
|
|
246
|
+
|
|
247
|
+
if (type === 'app-state-sync-key' && value) {
|
|
248
|
+
try {
|
|
249
|
+
value = WAProto_1.proto.Message.AppStateSyncKeyData.fromObject(value);
|
|
250
|
+
} catch (error) {
|
|
251
|
+
authDebug('Key conversion failed:', type, id, error);
|
|
252
|
+
value = null;
|
|
253
|
+
}
|
|
254
|
+
}
|
|
255
|
+
|
|
256
|
+
data[id] = value;
|
|
257
|
+
}));
|
|
258
|
+
|
|
259
|
+
return data;
|
|
260
|
+
},
|
|
261
|
+
set: async (data) => {
|
|
262
|
+
const tasks = [];
|
|
263
|
+
|
|
264
|
+
for (const category in data) {
|
|
265
|
+
for (const id in data[category]) {
|
|
266
|
+
const value = data[category][id];
|
|
267
|
+
const file = `${category}-${id}.json`;
|
|
268
|
+
|
|
269
|
+
if (value) {
|
|
270
|
+
tasks.push(writeData(value, file));
|
|
271
|
+
} else {
|
|
272
|
+
tasks.push(removeData(file));
|
|
273
|
+
}
|
|
274
|
+
}
|
|
275
|
+
}
|
|
276
|
+
|
|
277
|
+
try {
|
|
278
|
+
await Promise.all(tasks);
|
|
279
|
+
} catch (error) {
|
|
280
|
+
authDebug('Bulk key update failed:', error);
|
|
281
|
+
throw error;
|
|
282
|
+
}
|
|
283
|
+
}
|
|
284
|
+
}
|
|
285
|
+
},
|
|
286
|
+
saveCreds,
|
|
287
|
+
// Additional maintenance API
|
|
288
|
+
cleanup: async () => {
|
|
289
|
+
if (saveTimeout) clearTimeout(saveTimeout);
|
|
290
|
+
await saveCreds();
|
|
291
|
+
},
|
|
292
|
+
cache
|
|
293
|
+
};
|
|
294
|
+
};
|
|
295
|
+
exports.useMultiFileAuthState = useMultiFileAuthState;
|
|
@@ -0,0 +1,12 @@
|
|
|
1
|
+
import type { Logger } from 'pino';
|
|
2
|
+
import type { AuthenticationState } from '../Types';
|
|
3
|
+
/**
|
|
4
|
+
* @deprecated use multi file auth state instead please
|
|
5
|
+
* stores the full authentication state in a single JSON file
|
|
6
|
+
*
|
|
7
|
+
* DO NOT USE IN A PROD ENVIRONMENT, only meant to serve as an example
|
|
8
|
+
* */
|
|
9
|
+
export declare const useSingleFileAuthState: (filename: string, logger?: Logger) => {
|
|
10
|
+
state: AuthenticationState;
|
|
11
|
+
saveState: () => void;
|
|
12
|
+
};
|
|
@@ -0,0 +1,75 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.useSingleFileAuthState = void 0;
|
|
4
|
+
const WAProto_1 = require("../../WAProto");
|
|
5
|
+
const auth_utils_1 = require("./auth-utils");
|
|
6
|
+
const generics_1 = require("./generics");
|
|
7
|
+
// useless key map only there to maintain backwards compatibility
|
|
8
|
+
// do not use in your own systems please
|
|
9
|
+
const KEY_MAP = {
|
|
10
|
+
'pre-key': 'preKeys',
|
|
11
|
+
'session': 'sessions',
|
|
12
|
+
'sender-key': 'senderKeys',
|
|
13
|
+
'app-state-sync-key': 'appStateSyncKeys',
|
|
14
|
+
'app-state-sync-version': 'appStateVersions',
|
|
15
|
+
'sender-key-memory': 'senderKeyMemory'
|
|
16
|
+
};
|
|
17
|
+
/**
|
|
18
|
+
* @deprecated use multi file auth state instead please
|
|
19
|
+
* stores the full authentication state in a single JSON file
|
|
20
|
+
*
|
|
21
|
+
* DO NOT USE IN A PROD ENVIRONMENT, only meant to serve as an example
|
|
22
|
+
* */
|
|
23
|
+
const useSingleFileAuthState = (filename, logger) => {
|
|
24
|
+
// require fs here so that in case "fs" is not available -- the app does not crash
|
|
25
|
+
const { readFileSync, writeFileSync, existsSync } = require('fs');
|
|
26
|
+
let creds;
|
|
27
|
+
let keys = {};
|
|
28
|
+
// save the authentication state to a file
|
|
29
|
+
const saveState = () => {
|
|
30
|
+
logger && logger.trace('saving auth state');
|
|
31
|
+
writeFileSync(filename,
|
|
32
|
+
// BufferJSON replacer utility saves buffers nicely
|
|
33
|
+
JSON.stringify({ creds, keys }, generics_1.BufferJSON.replacer, 2));
|
|
34
|
+
};
|
|
35
|
+
if (existsSync(filename)) {
|
|
36
|
+
const result = JSON.parse(readFileSync(filename, { encoding: 'utf-8' }), generics_1.BufferJSON.reviver);
|
|
37
|
+
creds = result.creds;
|
|
38
|
+
keys = result.keys;
|
|
39
|
+
}
|
|
40
|
+
else {
|
|
41
|
+
creds = (0, auth_utils_1.initAuthCreds)();
|
|
42
|
+
keys = {};
|
|
43
|
+
}
|
|
44
|
+
return {
|
|
45
|
+
state: {
|
|
46
|
+
creds,
|
|
47
|
+
keys: {
|
|
48
|
+
get: (type, ids) => {
|
|
49
|
+
const key = KEY_MAP[type];
|
|
50
|
+
return ids.reduce((dict, id) => {
|
|
51
|
+
var _a;
|
|
52
|
+
let value = (_a = keys[key]) === null || _a === void 0 ? void 0 : _a[id];
|
|
53
|
+
if (value) {
|
|
54
|
+
if (type === 'app-state-sync-key') {
|
|
55
|
+
value = WAProto_1.proto.Message.AppStateSyncKeyData.fromObject(value);
|
|
56
|
+
}
|
|
57
|
+
dict[id] = value;
|
|
58
|
+
}
|
|
59
|
+
return dict;
|
|
60
|
+
}, {});
|
|
61
|
+
},
|
|
62
|
+
set: (data) => {
|
|
63
|
+
for (const _key in data) {
|
|
64
|
+
const key = KEY_MAP[_key];
|
|
65
|
+
keys[key] = keys[key] || {};
|
|
66
|
+
Object.assign(keys[key], data[_key]);
|
|
67
|
+
}
|
|
68
|
+
saveState();
|
|
69
|
+
}
|
|
70
|
+
}
|
|
71
|
+
},
|
|
72
|
+
saveState
|
|
73
|
+
};
|
|
74
|
+
};
|
|
75
|
+
exports.useSingleFileAuthState = useSingleFileAuthState;
|
|
@@ -0,0 +1,11 @@
|
|
|
1
|
+
import { proto } from '../../WAProto';
|
|
2
|
+
import type { AuthenticationCreds, SignalCreds, SocketConfig } from '../Types';
|
|
3
|
+
import { BinaryNode } from '../WABinary';
|
|
4
|
+
export declare const generateMobileNode: (config: SocketConfig) => proto.IClientPayload;
|
|
5
|
+
export declare const generateLoginNode: (userJid: string, config: SocketConfig) => proto.IClientPayload;
|
|
6
|
+
export declare const generateRegistrationNode: ({ registrationId, signedPreKey, signedIdentityKey }: SignalCreds, config: SocketConfig) => proto.ClientPayload;
|
|
7
|
+
export declare const configureSuccessfulPairing: (stanza: BinaryNode, { advSecretKey, signedIdentityKey, signalIdentities }: Pick<AuthenticationCreds, 'advSecretKey' | 'signedIdentityKey' | 'signalIdentities'>) => {
|
|
8
|
+
creds: Partial<AuthenticationCreds>;
|
|
9
|
+
reply: BinaryNode;
|
|
10
|
+
};
|
|
11
|
+
export declare const encodeSignedDeviceIdentity: (account: proto.IADVSignedDeviceIdentity, includeSignatureKey: boolean) => Uint8Array;
|