@heavstaltech/baileys 1.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (181) hide show
  1. package/README.md +200 -0
  2. package/WAProto/index.d.ts +50383 -0
  3. package/WAProto/index.js +155693 -0
  4. package/WASignalGroup/GroupProtocol.js +1697 -0
  5. package/WASignalGroup/ciphertext_message.js +16 -0
  6. package/WASignalGroup/group_cipher.js +120 -0
  7. package/WASignalGroup/group_session_builder.js +46 -0
  8. package/WASignalGroup/index.js +5 -0
  9. package/WASignalGroup/keyhelper.js +21 -0
  10. package/WASignalGroup/protobufs.js +3 -0
  11. package/WASignalGroup/queue_job.js +69 -0
  12. package/WASignalGroup/sender_chain_key.js +50 -0
  13. package/WASignalGroup/sender_key_distribution_message.js +78 -0
  14. package/WASignalGroup/sender_key_message.js +92 -0
  15. package/WASignalGroup/sender_key_name.js +70 -0
  16. package/WASignalGroup/sender_key_record.js +56 -0
  17. package/WASignalGroup/sender_key_state.js +129 -0
  18. package/WASignalGroup/sender_message_key.js +39 -0
  19. package/lib/Defaults/baileys-version.json +3 -0
  20. package/lib/Defaults/index.d.ts +53 -0
  21. package/lib/Defaults/index.js +108 -0
  22. package/lib/Signal/libsignal.d.ts +3 -0
  23. package/lib/Signal/libsignal.js +152 -0
  24. package/lib/Socket/Client/abstract-socket-client.d.ts +17 -0
  25. package/lib/Socket/Client/abstract-socket-client.js +13 -0
  26. package/lib/Socket/Client/index.d.ts +3 -0
  27. package/lib/Socket/Client/index.js +19 -0
  28. package/lib/Socket/Client/mobile-socket-client.d.ts +13 -0
  29. package/lib/Socket/Client/mobile-socket-client.js +65 -0
  30. package/lib/Socket/Client/web-socket-client.d.ts +12 -0
  31. package/lib/Socket/Client/web-socket-client.js +62 -0
  32. package/lib/Socket/business.d.ts +170 -0
  33. package/lib/Socket/business.js +260 -0
  34. package/lib/Socket/chats.d.ts +81 -0
  35. package/lib/Socket/chats.js +950 -0
  36. package/lib/Socket/groups.d.ts +115 -0
  37. package/lib/Socket/groups.js +315 -0
  38. package/lib/Socket/index.d.ts +172 -0
  39. package/lib/Socket/index.js +10 -0
  40. package/lib/Socket/messages-recv.d.ts +158 -0
  41. package/lib/Socket/messages-recv.js +972 -0
  42. package/lib/Socket/messages-send.d.ts +155 -0
  43. package/lib/Socket/messages-send.js +1087 -0
  44. package/lib/Socket/newsletter.d.ts +132 -0
  45. package/lib/Socket/newsletter.js +236 -0
  46. package/lib/Socket/registration.d.ts +264 -0
  47. package/lib/Socket/registration.js +166 -0
  48. package/lib/Socket/socket.d.ts +44 -0
  49. package/lib/Socket/socket.js +643 -0
  50. package/lib/Socket/usync.d.ts +37 -0
  51. package/lib/Socket/usync.js +70 -0
  52. package/lib/Store/index.d.ts +3 -0
  53. package/lib/Store/index.js +10 -0
  54. package/lib/Store/make-cache-manager-store.d.ts +14 -0
  55. package/lib/Store/make-cache-manager-store.js +83 -0
  56. package/lib/Store/make-in-memory-store.d.ts +118 -0
  57. package/lib/Store/make-in-memory-store.js +431 -0
  58. package/lib/Store/make-ordered-dictionary.d.ts +13 -0
  59. package/lib/Store/make-ordered-dictionary.js +81 -0
  60. package/lib/Store/object-repository.d.ts +10 -0
  61. package/lib/Store/object-repository.js +27 -0
  62. package/lib/Types/Auth.d.ts +109 -0
  63. package/lib/Types/Auth.js +2 -0
  64. package/lib/Types/Call.d.ts +13 -0
  65. package/lib/Types/Call.js +2 -0
  66. package/lib/Types/Chat.d.ts +107 -0
  67. package/lib/Types/Chat.js +4 -0
  68. package/lib/Types/Contact.d.ts +19 -0
  69. package/lib/Types/Contact.js +2 -0
  70. package/lib/Types/Events.d.ts +172 -0
  71. package/lib/Types/Events.js +2 -0
  72. package/lib/Types/GroupMetadata.d.ts +56 -0
  73. package/lib/Types/GroupMetadata.js +2 -0
  74. package/lib/Types/Label.d.ts +46 -0
  75. package/lib/Types/Label.js +27 -0
  76. package/lib/Types/LabelAssociation.d.ts +29 -0
  77. package/lib/Types/LabelAssociation.js +9 -0
  78. package/lib/Types/Message.d.ts +433 -0
  79. package/lib/Types/Message.js +9 -0
  80. package/lib/Types/Newsletter.d.ts +92 -0
  81. package/lib/Types/Newsletter.js +32 -0
  82. package/lib/Types/Product.d.ts +78 -0
  83. package/lib/Types/Product.js +2 -0
  84. package/lib/Types/Signal.d.ts +57 -0
  85. package/lib/Types/Signal.js +2 -0
  86. package/lib/Types/Socket.d.ts +116 -0
  87. package/lib/Types/Socket.js +2 -0
  88. package/lib/Types/State.d.ts +27 -0
  89. package/lib/Types/State.js +2 -0
  90. package/lib/Types/USync.d.ts +25 -0
  91. package/lib/Types/USync.js +2 -0
  92. package/lib/Types/index.d.ts +66 -0
  93. package/lib/Types/index.js +42 -0
  94. package/lib/Utils/auth-utils.d.ts +18 -0
  95. package/lib/Utils/auth-utils.js +227 -0
  96. package/lib/Utils/baileys-event-stream.d.ts +16 -0
  97. package/lib/Utils/baileys-event-stream.js +63 -0
  98. package/lib/Utils/business.d.ts +22 -0
  99. package/lib/Utils/business.js +234 -0
  100. package/lib/Utils/chat-utils.d.ts +70 -0
  101. package/lib/Utils/chat-utils.js +745 -0
  102. package/lib/Utils/crypto.d.ts +40 -0
  103. package/lib/Utils/crypto.js +199 -0
  104. package/lib/Utils/decode-wa-message.d.ts +36 -0
  105. package/lib/Utils/decode-wa-message.js +234 -0
  106. package/lib/Utils/event-buffer.d.ts +35 -0
  107. package/lib/Utils/event-buffer.js +517 -0
  108. package/lib/Utils/generics.d.ts +88 -0
  109. package/lib/Utils/generics.js +402 -0
  110. package/lib/Utils/history.d.ts +19 -0
  111. package/lib/Utils/history.js +94 -0
  112. package/lib/Utils/index.d.ts +17 -0
  113. package/lib/Utils/index.js +33 -0
  114. package/lib/Utils/link-preview.d.ts +21 -0
  115. package/lib/Utils/link-preview.js +93 -0
  116. package/lib/Utils/logger.d.ts +2 -0
  117. package/lib/Utils/logger.js +7 -0
  118. package/lib/Utils/lt-hash.d.ts +12 -0
  119. package/lib/Utils/lt-hash.js +51 -0
  120. package/lib/Utils/make-mutex.d.ts +7 -0
  121. package/lib/Utils/make-mutex.js +43 -0
  122. package/lib/Utils/messages-media.d.ts +113 -0
  123. package/lib/Utils/messages-media.js +721 -0
  124. package/lib/Utils/messages.d.ts +77 -0
  125. package/lib/Utils/messages.js +1221 -0
  126. package/lib/Utils/noise-handler.d.ts +20 -0
  127. package/lib/Utils/noise-handler.js +160 -0
  128. package/lib/Utils/process-message.d.ts +41 -0
  129. package/lib/Utils/process-message.js +373 -0
  130. package/lib/Utils/signal.d.ts +33 -0
  131. package/lib/Utils/signal.js +159 -0
  132. package/lib/Utils/use-multi-file-auth-state.d.ts +12 -0
  133. package/lib/Utils/use-multi-file-auth-state.js +295 -0
  134. package/lib/Utils/use-single-file-auth-state.d.ts +12 -0
  135. package/lib/Utils/use-single-file-auth-state.js +75 -0
  136. package/lib/Utils/validate-connection.d.ts +11 -0
  137. package/lib/Utils/validate-connection.js +205 -0
  138. package/lib/WABinary/constants.d.ts +27 -0
  139. package/lib/WABinary/constants.js +40 -0
  140. package/lib/WABinary/decode.d.ts +6 -0
  141. package/lib/WABinary/decode.js +264 -0
  142. package/lib/WABinary/encode.d.ts +2 -0
  143. package/lib/WABinary/encode.js +252 -0
  144. package/lib/WABinary/generic-utils.d.ts +14 -0
  145. package/lib/WABinary/generic-utils.js +110 -0
  146. package/lib/WABinary/index.d.ts +5 -0
  147. package/lib/WABinary/index.js +21 -0
  148. package/lib/WABinary/jid-utils.d.ts +31 -0
  149. package/lib/WABinary/jid-utils.js +62 -0
  150. package/lib/WABinary/types.d.ts +18 -0
  151. package/lib/WABinary/types.js +2 -0
  152. package/lib/WAM/BinaryInfo.d.ts +8 -0
  153. package/lib/WAM/BinaryInfo.js +13 -0
  154. package/lib/WAM/constants.d.ts +38 -0
  155. package/lib/WAM/constants.js +15350 -0
  156. package/lib/WAM/encode.d.ts +2 -0
  157. package/lib/WAM/encode.js +155 -0
  158. package/lib/WAM/index.d.ts +3 -0
  159. package/lib/WAM/index.js +19 -0
  160. package/lib/WAUSync/Protocols/USyncContactProtocol.d.ts +9 -0
  161. package/lib/WAUSync/Protocols/USyncContactProtocol.js +32 -0
  162. package/lib/WAUSync/Protocols/USyncDeviceProtocol.d.ts +22 -0
  163. package/lib/WAUSync/Protocols/USyncDeviceProtocol.js +57 -0
  164. package/lib/WAUSync/Protocols/USyncDisappearingModeProtocol.d.ts +12 -0
  165. package/lib/WAUSync/Protocols/USyncDisappearingModeProtocol.js +30 -0
  166. package/lib/WAUSync/Protocols/USyncStatusProtocol.d.ts +12 -0
  167. package/lib/WAUSync/Protocols/USyncStatusProtocol.js +42 -0
  168. package/lib/WAUSync/Protocols/UsyncBotProfileProtocol.d.ts +25 -0
  169. package/lib/WAUSync/Protocols/UsyncBotProfileProtocol.js +53 -0
  170. package/lib/WAUSync/Protocols/UsyncLIDProtocol.d.ts +8 -0
  171. package/lib/WAUSync/Protocols/UsyncLIDProtocol.js +24 -0
  172. package/lib/WAUSync/Protocols/index.d.ts +4 -0
  173. package/lib/WAUSync/Protocols/index.js +20 -0
  174. package/lib/WAUSync/USyncQuery.d.ts +28 -0
  175. package/lib/WAUSync/USyncQuery.js +89 -0
  176. package/lib/WAUSync/USyncUser.d.ts +10 -0
  177. package/lib/WAUSync/USyncUser.js +26 -0
  178. package/lib/WAUSync/index.d.ts +3 -0
  179. package/lib/WAUSync/index.js +19 -0
  180. package/lib/index.js +31 -0
  181. package/package.json +103 -0
@@ -0,0 +1,159 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.getNextPreKeysNode = exports.getNextPreKeys = exports.extractDeviceJids = exports.parseAndInjectE2ESessions = exports.xmppPreKey = exports.xmppSignedPreKey = exports.generateOrGetPreKeys = exports.getPreKeys = exports.createSignalIdentity = void 0;
4
+ const Defaults_1 = require("../Defaults");
5
+ const WABinary_1 = require("../WABinary");
6
+ const crypto_1 = require("./crypto");
7
+ const generics_1 = require("./generics");
8
+ function chunk(array, size) {
9
+ const result = [];
10
+ for (let i = 0; i < array.length; i += size) {
11
+ result.push(array.slice(i, i + size));
12
+ }
13
+ return result;
14
+ }
15
+ const createSignalIdentity = (wid, accountSignatureKey) => {
16
+ return {
17
+ identifier: { name: wid, deviceId: 0 },
18
+ identifierKey: (0, crypto_1.generateSignalPubKey)(accountSignatureKey)
19
+ };
20
+ };
21
+ exports.createSignalIdentity = createSignalIdentity;
22
+ const getPreKeys = async ({ get }, min, limit) => {
23
+ const idList = [];
24
+ for (let id = min; id < limit; id++) {
25
+ idList.push(id.toString());
26
+ }
27
+ return get('pre-key', idList);
28
+ };
29
+ exports.getPreKeys = getPreKeys;
30
+ const generateOrGetPreKeys = (creds, range) => {
31
+ const avaliable = creds.nextPreKeyId - creds.firstUnuploadedPreKeyId;
32
+ const remaining = range - avaliable;
33
+ const lastPreKeyId = creds.nextPreKeyId + remaining - 1;
34
+ const newPreKeys = {};
35
+ if (remaining > 0) {
36
+ for (let i = creds.nextPreKeyId; i <= lastPreKeyId; i++) {
37
+ newPreKeys[i] = crypto_1.Curve.generateKeyPair();
38
+ }
39
+ }
40
+ return {
41
+ newPreKeys,
42
+ lastPreKeyId,
43
+ preKeysRange: [creds.firstUnuploadedPreKeyId, range],
44
+ };
45
+ };
46
+ exports.generateOrGetPreKeys = generateOrGetPreKeys;
47
+ const xmppSignedPreKey = (key) => ({
48
+ tag: 'skey',
49
+ attrs: {},
50
+ content: [
51
+ { tag: 'id', attrs: {}, content: (0, generics_1.encodeBigEndian)(key.keyId, 3) },
52
+ { tag: 'value', attrs: {}, content: key.keyPair.public },
53
+ { tag: 'signature', attrs: {}, content: key.signature }
54
+ ]
55
+ });
56
+ exports.xmppSignedPreKey = xmppSignedPreKey;
57
+ const xmppPreKey = (pair, id) => ({
58
+ tag: 'key',
59
+ attrs: {},
60
+ content: [
61
+ { tag: 'id', attrs: {}, content: (0, generics_1.encodeBigEndian)(id, 3) },
62
+ { tag: 'value', attrs: {}, content: pair.public }
63
+ ]
64
+ });
65
+ exports.xmppPreKey = xmppPreKey;
66
+ const parseAndInjectE2ESessions = async (node, repository) => {
67
+ const extractKey = (key) => (key ? ({
68
+ keyId: (0, WABinary_1.getBinaryNodeChildUInt)(key, 'id', 3),
69
+ publicKey: (0, crypto_1.generateSignalPubKey)((0, WABinary_1.getBinaryNodeChildBuffer)(key, 'value')),
70
+ signature: (0, WABinary_1.getBinaryNodeChildBuffer)(key, 'signature'),
71
+ }) : undefined);
72
+ const nodes = (0, WABinary_1.getBinaryNodeChildren)((0, WABinary_1.getBinaryNodeChild)(node, 'list'), 'user');
73
+ for (const node of nodes) {
74
+ (0, WABinary_1.assertNodeErrorFree)(node);
75
+ }
76
+ // Most of the work in repository.injectE2ESession is CPU intensive, not IO
77
+ // So Promise.all doesn't really help here,
78
+ // but blocks even loop if we're using it inside keys.transaction, and it makes it "sync" actually
79
+ // This way we chunk it in smaller parts and between those parts we can yield to the event loop
80
+ // It's rare case when you need to E2E sessions for so many users, but it's possible
81
+ const chunkSize = 100;
82
+ const chunks = chunk(nodes, chunkSize);
83
+ for (const nodesChunk of chunks) {
84
+ await Promise.all(nodesChunk.map(async (node) => {
85
+ const signedKey = (0, WABinary_1.getBinaryNodeChild)(node, 'skey');
86
+ const key = (0, WABinary_1.getBinaryNodeChild)(node, 'key');
87
+ const identity = (0, WABinary_1.getBinaryNodeChildBuffer)(node, 'identity');
88
+ const jid = node.attrs.jid;
89
+ const registrationId = (0, WABinary_1.getBinaryNodeChildUInt)(node, 'registration', 4);
90
+ await repository.injectE2ESession({
91
+ jid,
92
+ session: {
93
+ registrationId: registrationId,
94
+ identityKey: (0, crypto_1.generateSignalPubKey)(identity),
95
+ signedPreKey: extractKey(signedKey),
96
+ preKey: extractKey(key)
97
+ }
98
+ });
99
+ }));
100
+ }
101
+ };
102
+ exports.parseAndInjectE2ESessions = parseAndInjectE2ESessions;
103
+ const extractDeviceJids = (result, myJid, excludeZeroDevices) => {
104
+ const { user: myUser, device: myDevice } = (0, WABinary_1.jidDecode)(myJid);
105
+ const extracted = [];
106
+ for (const userResult of result) {
107
+ const { devices, id } = userResult;
108
+ const { user } = (0, WABinary_1.jidDecode)(id);
109
+ const deviceList = devices === null || devices === void 0 ? void 0 : devices.deviceList;
110
+ if (Array.isArray(deviceList)) {
111
+ for (const { id: device, keyIndex } of deviceList) {
112
+ if ((!excludeZeroDevices || device !== 0) && // if zero devices are not-excluded, or device is non zero
113
+ (myUser !== user || myDevice !== device) && // either different user or if me user, not this device
114
+ (device === 0 || !!keyIndex) // ensure that "key-index" is specified for "non-zero" devices, produces a bad req otherwise
115
+ ) {
116
+ extracted.push({ user, device });
117
+ }
118
+ }
119
+ }
120
+ }
121
+ return extracted;
122
+ };
123
+ exports.extractDeviceJids = extractDeviceJids;
124
+ /**
125
+ * get the next N keys for upload or processing
126
+ * @param count number of pre-keys to get or generate
127
+ */
128
+ const getNextPreKeys = async ({ creds, keys }, count) => {
129
+ const { newPreKeys, lastPreKeyId, preKeysRange } = (0, exports.generateOrGetPreKeys)(creds, count);
130
+ const update = {
131
+ nextPreKeyId: Math.max(lastPreKeyId + 1, creds.nextPreKeyId),
132
+ firstUnuploadedPreKeyId: Math.max(creds.firstUnuploadedPreKeyId, lastPreKeyId + 1)
133
+ };
134
+ await keys.set({ 'pre-key': newPreKeys });
135
+ const preKeys = await (0, exports.getPreKeys)(keys, preKeysRange[0], preKeysRange[0] + preKeysRange[1]);
136
+ return { update, preKeys };
137
+ };
138
+ exports.getNextPreKeys = getNextPreKeys;
139
+ const getNextPreKeysNode = async (state, count) => {
140
+ const { creds } = state;
141
+ const { update, preKeys } = await (0, exports.getNextPreKeys)(state, count);
142
+ const node = {
143
+ tag: 'iq',
144
+ attrs: {
145
+ xmlns: 'encrypt',
146
+ type: 'set',
147
+ to: WABinary_1.S_WHATSAPP_NET,
148
+ },
149
+ content: [
150
+ { tag: 'registration', attrs: {}, content: (0, generics_1.encodeBigEndian)(creds.registrationId) },
151
+ { tag: 'type', attrs: {}, content: Defaults_1.KEY_BUNDLE_TYPE },
152
+ { tag: 'identity', attrs: {}, content: creds.signedIdentityKey.public },
153
+ { tag: 'list', attrs: {}, content: Object.keys(preKeys).map(k => (0, exports.xmppPreKey)(preKeys[+k], +k)) },
154
+ (0, exports.xmppSignedPreKey)(creds.signedPreKey)
155
+ ]
156
+ };
157
+ return { update, node };
158
+ };
159
+ exports.getNextPreKeysNode = getNextPreKeysNode;
@@ -0,0 +1,12 @@
1
+ import { AuthenticationState } from '../Types';
2
+ /**
3
+ * stores the full authentication state in a single folder.
4
+ * Far more efficient than singlefileauthstate
5
+ *
6
+ * Again, I wouldn't endorse this for any production level use other than perhaps a bot.
7
+ * Would recommend writing an auth state for use with a proper SQL or No-SQL DB
8
+ * */
9
+ export declare const useMultiFileAuthState: (folder: string) => Promise<{
10
+ state: AuthenticationState;
11
+ saveCreds: () => Promise<void>;
12
+ }>;
@@ -0,0 +1,295 @@
1
+ "use strict";
2
+ var __importDefault = (this && this.__importDefault) || function (mod) {
3
+ return (mod && mod.__esModule) ? mod : { "default": mod };
4
+ };
5
+ Object.defineProperty(exports, "__esModule", { value: true });
6
+ exports.useMultiFileAuthState = void 0;
7
+ const async_lock_1 = __importDefault(require("async-lock"));
8
+ const promises_1 = require("fs/promises");
9
+ const path_1 = require("path");
10
+ const WAProto_1 = require("../../WAProto");
11
+ const auth_utils_1 = require("./auth-utils");
12
+ const generics_1 = require("./generics");
13
+ const node_cache_1 = __importDefault(require("node-cache"));
14
+ const Defaults_1 = require("../Defaults");
15
+
16
+ // Enhanced locking mechanism
17
+ const fileLock = new async_lock_1.default({
18
+ maxPending: Infinity,
19
+ timeout: 5000 // 5s timeout to prevent deadlocks
20
+ });
21
+ const globalAuthLock = new async_lock_1.default(); // Additional global lock
22
+
23
+ // Debugging utilities
24
+ let AUTH_DEBUG = false;
25
+ function authDebug(...args) {
26
+ if (AUTH_DEBUG) {
27
+ console.log('[AUTH DEBUG]', new Date().toISOString(), ...args);
28
+ }
29
+ }
30
+
31
+ /**
32
+ * Enhanced multi-file auth state storage with:
33
+ * - Better error handling
34
+ * - Additional locking
35
+ * - Data validation
36
+ * - Auto-repair mechanisms
37
+ */
38
+ const useMultiFileAuthState = async (folder, options = {}) => {
39
+ AUTH_DEBUG = options.authDebug ?? false;
40
+ const cache = options.syncCache ? new node_cache_1.default({
41
+ stdTTL: Defaults_1.DEFAULT_CACHE_TTLS.SIGNAL_STORE,
42
+ useClones: false,
43
+ deleteOnExpire: true,
44
+ checkperiod: 120
45
+ }) : null;
46
+ // Validate and prepare folder
47
+ const prepareFolder = async () => {
48
+ try {
49
+ const folderInfo = await (0, promises_1.stat)(folder).catch(() => null);
50
+
51
+ if (folderInfo) {
52
+ if (!folderInfo.isDirectory()) {
53
+ throw new Error(`Path exists but is not a directory: ${folder}`);
54
+ }
55
+ } else {
56
+ authDebug('Creating auth folder:', folder);
57
+ await (0, promises_1.mkdir)(folder, { recursive: true });
58
+ }
59
+
60
+ // Verify folder is writable
61
+ await testFolderAccess();
62
+ } catch (error) {
63
+ authDebug('Folder preparation failed:', error);
64
+ throw new Error(`Auth folder initialization failed: ${error.message}`);
65
+ }
66
+ };
67
+
68
+ const testFolderAccess = async () => {
69
+ const testFile = (0, path_1.join)(folder, '.temp_test');
70
+ try {
71
+ await (0, promises_1.writeFile)(testFile, 'test');
72
+ await (0, promises_1.unlink)(testFile);
73
+ } catch (error) {
74
+ throw new Error(`Folder not writable: ${error.message}`);
75
+ }
76
+ };
77
+
78
+ const fixFileName = (file) => {
79
+ if (!file) return file;
80
+ return file.replace(/\//g, '__').replace(/:/g, '-');
81
+ };
82
+
83
+ function getUniqueId(type, id) {
84
+ return `${type}.${id}`;
85
+ }
86
+
87
+ // Enhanced write with retries
88
+ const writeData = async (data, file) => {
89
+ return globalAuthLock.acquire('write', async () => {
90
+ const filePath = (0, path_1.join)(folder, fixFileName(file));
91
+ let attempts = 0;
92
+ const maxAttempts = 3;
93
+
94
+ while (attempts < maxAttempts) {
95
+ attempts++;
96
+ try {
97
+ await fileLock.acquire(filePath, async () => {
98
+ const serialized = JSON.stringify(data, generics_1.BufferJSON.replacer);
99
+ await (0, promises_1.writeFile)(filePath, serialized);
100
+ authDebug('Write successful:', file);
101
+ });
102
+ return;
103
+ } catch (error) {
104
+ authDebug(`Write attempt ${attempts} failed for ${file}:`, error);
105
+ if (attempts >= maxAttempts) {
106
+ throw new Error(`Failed to write after ${maxAttempts} attempts: ${error.message}`);
107
+ }
108
+ await new Promise(resolve => setTimeout(resolve, 100 * attempts));
109
+ }
110
+ }
111
+ });
112
+ };
113
+
114
+ // Enhanced read with validation
115
+ const readData = async (file) => {
116
+ return globalAuthLock.acquire('read', async () => {
117
+ const filePath = (0, path_1.join)(folder, fixFileName(file));
118
+
119
+ try {
120
+ const data = await fileLock.acquire(filePath, async () => {
121
+ const content = await (0, promises_1.readFile)(filePath, { encoding: 'utf-8' });
122
+ authDebug('Read successful:', file);
123
+ return content;
124
+ });
125
+
126
+ const parsed = JSON.parse(data, generics_1.BufferJSON.reviver);
127
+
128
+ // Basic data validation
129
+ if (file === 'creds.json' && !parsed.me) {
130
+ authDebug('Invalid creds data detected');
131
+ return null;
132
+ }
133
+
134
+ return parsed;
135
+ } catch (error) {
136
+ if (error.code !== 'ENOENT') { // Ignore "file not found" errors
137
+ authDebug('Read error:', file, error);
138
+ }
139
+ return null;
140
+ }
141
+ });
142
+ };
143
+
144
+ // Safe removal
145
+ const removeData = async (file) => {
146
+ return globalAuthLock.acquire('remove', async () => {
147
+ const filePath = (0, path_1.join)(folder, fixFileName(file));
148
+
149
+ try {
150
+ await fileLock.acquire(filePath, async () => {
151
+ await (0, promises_1.unlink)(filePath);
152
+ authDebug('Removed:', file);
153
+ });
154
+ } catch (error) {
155
+ if (error.code !== 'ENOENT') { // Ignore "file not found" errors
156
+ authDebug('Remove error:', file, error);
157
+ }
158
+ }
159
+ });
160
+ };
161
+
162
+ // Initialize
163
+ await prepareFolder();
164
+
165
+ // Load or initialize credentials
166
+ let creds = await readData('creds.json');
167
+ if (!creds) {
168
+ authDebug('No existing creds found, initializing new ones');
169
+ creds = (0, auth_utils_1.initAuthCreds)();
170
+ await writeData(creds, 'creds.json');
171
+ }
172
+
173
+ async function warmUpCache() {
174
+ try {
175
+ const files = await promises_1.readdir(folder);
176
+ for (const file of files) {
177
+ if (file.endsWith('.json') && file !== 'creds.json') {
178
+ const parts = file.split('-');
179
+ if (parts.length === 2) {
180
+ const type = parts[0];
181
+ const id = parts[1].replace('.json', '');
182
+ const data = await readData(file);
183
+ if (data) {
184
+ cache.set(getUniqueId(type, id), data);
185
+ authDebug(`Cache warmed: ${type}-${id}`);
186
+ }
187
+ }
188
+ }
189
+ }
190
+ } catch (error) {
191
+ authDebug('Cache warm-up failed:', error);
192
+ }
193
+ }
194
+
195
+ if (cache) warmUpCache();
196
+
197
+ // Auto-save mechanism
198
+ let saveTimeout;
199
+ const scheduleSave = () => {
200
+ if (saveTimeout) clearTimeout(saveTimeout);
201
+ saveTimeout = setTimeout(() => {
202
+ saveCreds().catch(error => {
203
+ authDebug('Auto-save failed, retrying sooner:', error);
204
+ setTimeout(scheduleSave, 60000);
205
+ });
206
+ }, 180000);
207
+ };
208
+ // Enhanced save function
209
+ const saveCreds = async () => {
210
+ try {
211
+ await writeData(creds, 'creds.json');
212
+ scheduleSave();
213
+ } catch (error) {
214
+ authDebug('Critical: Creds save failed:', error);
215
+ throw error;
216
+ }
217
+ };
218
+
219
+ process.on('beforeExit', async () => {
220
+ if (saveTimeout) clearTimeout(saveTimeout);
221
+ await saveCreds().catch(error => {
222
+ authDebug('Emergency save failed:', error);
223
+ });
224
+ });
225
+
226
+ process.on('uncaughtException', async (error) => {
227
+ authDebug('Uncaught exception, attempting emergency save:', error);
228
+ if (saveTimeout) clearTimeout(saveTimeout);
229
+ await saveCreds().catch(e => {
230
+ authDebug('Emergency save failed:', e);
231
+ });
232
+ process.exit(1);
233
+ });
234
+ // Start auto-save loop
235
+ scheduleSave();
236
+
237
+ return {
238
+ state: {
239
+ creds,
240
+ keys: {
241
+ get: async (type, ids) => {
242
+ const data = {};
243
+
244
+ await Promise.all(ids.map(async (id) => {
245
+ let value = await readData(`${type}-${id}.json`);
246
+
247
+ if (type === 'app-state-sync-key' && value) {
248
+ try {
249
+ value = WAProto_1.proto.Message.AppStateSyncKeyData.fromObject(value);
250
+ } catch (error) {
251
+ authDebug('Key conversion failed:', type, id, error);
252
+ value = null;
253
+ }
254
+ }
255
+
256
+ data[id] = value;
257
+ }));
258
+
259
+ return data;
260
+ },
261
+ set: async (data) => {
262
+ const tasks = [];
263
+
264
+ for (const category in data) {
265
+ for (const id in data[category]) {
266
+ const value = data[category][id];
267
+ const file = `${category}-${id}.json`;
268
+
269
+ if (value) {
270
+ tasks.push(writeData(value, file));
271
+ } else {
272
+ tasks.push(removeData(file));
273
+ }
274
+ }
275
+ }
276
+
277
+ try {
278
+ await Promise.all(tasks);
279
+ } catch (error) {
280
+ authDebug('Bulk key update failed:', error);
281
+ throw error;
282
+ }
283
+ }
284
+ }
285
+ },
286
+ saveCreds,
287
+ // Additional maintenance API
288
+ cleanup: async () => {
289
+ if (saveTimeout) clearTimeout(saveTimeout);
290
+ await saveCreds();
291
+ },
292
+ cache
293
+ };
294
+ };
295
+ exports.useMultiFileAuthState = useMultiFileAuthState;
@@ -0,0 +1,12 @@
1
+ import type { Logger } from 'pino';
2
+ import type { AuthenticationState } from '../Types';
3
+ /**
4
+ * @deprecated use multi file auth state instead please
5
+ * stores the full authentication state in a single JSON file
6
+ *
7
+ * DO NOT USE IN A PROD ENVIRONMENT, only meant to serve as an example
8
+ * */
9
+ export declare const useSingleFileAuthState: (filename: string, logger?: Logger) => {
10
+ state: AuthenticationState;
11
+ saveState: () => void;
12
+ };
@@ -0,0 +1,75 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.useSingleFileAuthState = void 0;
4
+ const WAProto_1 = require("../../WAProto");
5
+ const auth_utils_1 = require("./auth-utils");
6
+ const generics_1 = require("./generics");
7
+ // useless key map only there to maintain backwards compatibility
8
+ // do not use in your own systems please
9
+ const KEY_MAP = {
10
+ 'pre-key': 'preKeys',
11
+ 'session': 'sessions',
12
+ 'sender-key': 'senderKeys',
13
+ 'app-state-sync-key': 'appStateSyncKeys',
14
+ 'app-state-sync-version': 'appStateVersions',
15
+ 'sender-key-memory': 'senderKeyMemory'
16
+ };
17
+ /**
18
+ * @deprecated use multi file auth state instead please
19
+ * stores the full authentication state in a single JSON file
20
+ *
21
+ * DO NOT USE IN A PROD ENVIRONMENT, only meant to serve as an example
22
+ * */
23
+ const useSingleFileAuthState = (filename, logger) => {
24
+ // require fs here so that in case "fs" is not available -- the app does not crash
25
+ const { readFileSync, writeFileSync, existsSync } = require('fs');
26
+ let creds;
27
+ let keys = {};
28
+ // save the authentication state to a file
29
+ const saveState = () => {
30
+ logger && logger.trace('saving auth state');
31
+ writeFileSync(filename,
32
+ // BufferJSON replacer utility saves buffers nicely
33
+ JSON.stringify({ creds, keys }, generics_1.BufferJSON.replacer, 2));
34
+ };
35
+ if (existsSync(filename)) {
36
+ const result = JSON.parse(readFileSync(filename, { encoding: 'utf-8' }), generics_1.BufferJSON.reviver);
37
+ creds = result.creds;
38
+ keys = result.keys;
39
+ }
40
+ else {
41
+ creds = (0, auth_utils_1.initAuthCreds)();
42
+ keys = {};
43
+ }
44
+ return {
45
+ state: {
46
+ creds,
47
+ keys: {
48
+ get: (type, ids) => {
49
+ const key = KEY_MAP[type];
50
+ return ids.reduce((dict, id) => {
51
+ var _a;
52
+ let value = (_a = keys[key]) === null || _a === void 0 ? void 0 : _a[id];
53
+ if (value) {
54
+ if (type === 'app-state-sync-key') {
55
+ value = WAProto_1.proto.Message.AppStateSyncKeyData.fromObject(value);
56
+ }
57
+ dict[id] = value;
58
+ }
59
+ return dict;
60
+ }, {});
61
+ },
62
+ set: (data) => {
63
+ for (const _key in data) {
64
+ const key = KEY_MAP[_key];
65
+ keys[key] = keys[key] || {};
66
+ Object.assign(keys[key], data[_key]);
67
+ }
68
+ saveState();
69
+ }
70
+ }
71
+ },
72
+ saveState
73
+ };
74
+ };
75
+ exports.useSingleFileAuthState = useSingleFileAuthState;
@@ -0,0 +1,11 @@
1
+ import { proto } from '../../WAProto';
2
+ import type { AuthenticationCreds, SignalCreds, SocketConfig } from '../Types';
3
+ import { BinaryNode } from '../WABinary';
4
+ export declare const generateMobileNode: (config: SocketConfig) => proto.IClientPayload;
5
+ export declare const generateLoginNode: (userJid: string, config: SocketConfig) => proto.IClientPayload;
6
+ export declare const generateRegistrationNode: ({ registrationId, signedPreKey, signedIdentityKey }: SignalCreds, config: SocketConfig) => proto.ClientPayload;
7
+ export declare const configureSuccessfulPairing: (stanza: BinaryNode, { advSecretKey, signedIdentityKey, signalIdentities }: Pick<AuthenticationCreds, 'advSecretKey' | 'signedIdentityKey' | 'signalIdentities'>) => {
8
+ creds: Partial<AuthenticationCreds>;
9
+ reply: BinaryNode;
10
+ };
11
+ export declare const encodeSignedDeviceIdentity: (account: proto.IADVSignedDeviceIdentity, includeSignatureKey: boolean) => Uint8Array;