@neelegirl/baileys 1.5.2 → 1.5.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (193) hide show
  1. package/LICENSE +21 -21
  2. package/README.md +195 -187
  3. package/WAProto/WAProto.proto +537 -236
  4. package/WAProto/index.d.ts +5971 -2388
  5. package/WAProto/index.js +17298 -6513
  6. package/lib/Defaults/baileys-version.json +3 -3
  7. package/lib/Defaults/index.d.ts +77 -67
  8. package/lib/Defaults/index.js +148 -136
  9. package/lib/Defaults/phonenumber-mcc.json +223 -223
  10. package/lib/Signal/WASignalGroup/GroupProtocol.js +1908 -1908
  11. package/lib/Signal/WASignalGroup/ciphertext-message.d.ts +9 -0
  12. package/lib/Signal/WASignalGroup/ciphertext-message.js +19 -0
  13. package/lib/Signal/WASignalGroup/ciphertext_message.js +15 -15
  14. package/lib/Signal/WASignalGroup/group-session-builder.d.ts +17 -0
  15. package/lib/Signal/WASignalGroup/group-session-builder.js +72 -0
  16. package/lib/Signal/WASignalGroup/group.proto +41 -41
  17. package/lib/Signal/WASignalGroup/group_cipher.d.ts +19 -0
  18. package/lib/Signal/WASignalGroup/group_cipher.js +101 -110
  19. package/lib/Signal/WASignalGroup/group_session_builder.js +45 -45
  20. package/lib/Signal/WASignalGroup/index.d.ts +11 -0
  21. package/lib/Signal/WASignalGroup/index.js +61 -6
  22. package/lib/Signal/WASignalGroup/keyhelper.d.ts +16 -0
  23. package/lib/Signal/WASignalGroup/keyhelper.js +58 -13
  24. package/lib/Signal/WASignalGroup/protobufs.js +2 -2
  25. package/lib/Signal/WASignalGroup/queue_job.js +68 -68
  26. package/lib/Signal/WASignalGroup/readme.md +5 -5
  27. package/lib/Signal/WASignalGroup/sender-chain-key.d.ts +14 -0
  28. package/lib/Signal/WASignalGroup/sender-chain-key.js +47 -0
  29. package/lib/Signal/WASignalGroup/sender-key-distribution-message.d.ts +17 -0
  30. package/lib/Signal/WASignalGroup/sender-key-distribution-message.js +71 -0
  31. package/lib/Signal/WASignalGroup/sender-key-message.d.ts +19 -0
  32. package/lib/Signal/WASignalGroup/sender-key-message.js +73 -0
  33. package/lib/Signal/WASignalGroup/sender-key-name.d.ts +19 -0
  34. package/lib/Signal/WASignalGroup/sender-key-name.js +59 -0
  35. package/lib/Signal/WASignalGroup/sender-key-record.d.ts +32 -0
  36. package/lib/Signal/WASignalGroup/sender-key-record.js +58 -0
  37. package/lib/Signal/WASignalGroup/sender-key-state.d.ts +44 -0
  38. package/lib/Signal/WASignalGroup/sender-key-state.js +147 -0
  39. package/lib/Signal/WASignalGroup/sender-message-key.d.ts +11 -0
  40. package/lib/Signal/WASignalGroup/sender-message-key.js +33 -0
  41. package/lib/Signal/WASignalGroup/sender_chain_key.js +49 -49
  42. package/lib/Signal/WASignalGroup/sender_key_distribution_message.js +77 -77
  43. package/lib/Signal/WASignalGroup/sender_key_message.js +91 -91
  44. package/lib/Signal/WASignalGroup/sender_key_name.js +69 -69
  45. package/lib/Signal/WASignalGroup/sender_key_record.js +55 -55
  46. package/lib/Signal/WASignalGroup/sender_key_state.js +128 -128
  47. package/lib/Signal/WASignalGroup/sender_message_key.js +38 -38
  48. package/lib/Signal/libsignal.d.ts +5 -1
  49. package/lib/Signal/libsignal.js +390 -161
  50. package/lib/Signal/lid-mapping.d.ts +28 -0
  51. package/lib/Signal/lid-mapping.js +184 -0
  52. package/lib/Socket/Client/abstract-socket-client.d.ts +15 -15
  53. package/lib/Socket/Client/abstract-socket-client.js +13 -13
  54. package/lib/Socket/Client/index.d.ts +2 -2
  55. package/lib/Socket/Client/mobile-socket-client.d.ts +12 -12
  56. package/lib/Socket/Client/mobile-socket-client.js +65 -65
  57. package/lib/Socket/Client/types.d.ts +1 -1
  58. package/lib/Socket/Client/websocket.d.ts +1 -1
  59. package/lib/Socket/business.d.ts +6 -6
  60. package/lib/Socket/business.js +152 -5
  61. package/lib/Socket/chats.d.ts +3 -4
  62. package/lib/Socket/chats.js +31 -26
  63. package/lib/Socket/communities.d.ts +223 -223
  64. package/lib/Socket/communities.js +432 -432
  65. package/lib/Socket/groups.d.ts +2 -4
  66. package/lib/Socket/groups.js +22 -14
  67. package/lib/Socket/index.d.ts +69 -69
  68. package/lib/Socket/index.js +3 -2
  69. package/lib/Socket/messages-recv.d.ts +3 -6
  70. package/lib/Socket/messages-recv.js +1449 -1707
  71. package/lib/Socket/messages-send.d.ts +2 -4
  72. package/lib/Socket/messages-send.js +617 -126
  73. package/lib/Socket/mex.d.ts +2 -2
  74. package/lib/Socket/mex.js +46 -46
  75. package/lib/Socket/newsletter.d.ts +2 -4
  76. package/lib/Socket/newsletter.js +294 -285
  77. package/lib/Socket/socket.js +318 -132
  78. package/lib/Socket/usync.js +3 -3
  79. package/lib/Store/index.d.ts +4 -4
  80. package/lib/Store/index.js +23 -23
  81. package/lib/Store/make-cache-manager-store.d.ts +13 -13
  82. package/lib/Store/make-cache-manager-store.js +89 -89
  83. package/lib/Store/make-in-memory-store.d.ts +122 -122
  84. package/lib/Store/make-in-memory-store.js +428 -428
  85. package/lib/Store/make-ordered-dictionary.d.ts +11 -11
  86. package/lib/Store/make-ordered-dictionary.js +85 -85
  87. package/lib/Store/object-repository.d.ts +9 -9
  88. package/lib/Store/object-repository.js +30 -30
  89. package/lib/Types/Auth.d.ts +5 -4
  90. package/lib/Types/Bussines.js +3 -0
  91. package/lib/Types/Bussiness.d.ts +28 -0
  92. package/lib/Types/Chat.d.ts +13 -8
  93. package/lib/Types/Contact.d.ts +4 -1
  94. package/lib/Types/Events.d.ts +13 -16
  95. package/lib/Types/GroupMetadata.d.ts +1 -1
  96. package/lib/Types/Message.d.ts +18 -7
  97. package/lib/Types/Message.js +7 -1
  98. package/lib/Types/MexUpdates.d.ts +8 -8
  99. package/lib/Types/MexUpdates.js +17 -17
  100. package/lib/Types/Newsletter.d.ts +1 -1
  101. package/lib/Types/Product.d.ts +1 -1
  102. package/lib/Types/Signal.d.ts +31 -1
  103. package/lib/Types/Socket.d.ts +34 -13
  104. package/lib/Types/State.d.ts +1 -1
  105. package/lib/Types/USync.d.ts +2 -2
  106. package/lib/Types/index.d.ts +16 -15
  107. package/lib/Types/index.js +4 -2
  108. package/lib/Utils/auth-utils.d.ts +20 -20
  109. package/lib/Utils/auth-utils.js +527 -204
  110. package/lib/Utils/baileys-event-stream.d.ts +17 -17
  111. package/lib/Utils/baileys-event-stream.js +69 -69
  112. package/lib/Utils/business.d.ts +28 -28
  113. package/lib/Utils/business.js +254 -254
  114. package/lib/Utils/chat-utils.d.ts +81 -81
  115. package/lib/Utils/chat-utils.js +808 -780
  116. package/lib/Utils/crypto.d.ts +55 -55
  117. package/lib/Utils/crypto.js +188 -178
  118. package/lib/Utils/decode-wa-message.d.ts +52 -40
  119. package/lib/Utils/decode-wa-message.js +322 -252
  120. package/lib/Utils/event-buffer.d.ts +38 -38
  121. package/lib/Utils/event-buffer.js +594 -564
  122. package/lib/Utils/generics.d.ts +131 -129
  123. package/lib/Utils/generics.js +629 -623
  124. package/lib/Utils/history.d.ts +22 -22
  125. package/lib/Utils/history.js +103 -109
  126. package/lib/Utils/index.d.ts +20 -19
  127. package/lib/Utils/index.js +39 -38
  128. package/lib/Utils/link-preview.d.ts +22 -22
  129. package/lib/Utils/link-preview.js +119 -119
  130. package/lib/Utils/logger.d.ts +13 -13
  131. package/lib/Utils/logger.js +7 -7
  132. package/lib/Utils/lt-hash.d.ts +13 -13
  133. package/lib/Utils/lt-hash.js +57 -57
  134. package/lib/Utils/make-mutex.d.ts +8 -8
  135. package/lib/Utils/make-mutex.js +48 -48
  136. package/lib/Utils/message-retry-manager.d.ts +88 -0
  137. package/lib/Utils/message-retry-manager.js +160 -0
  138. package/lib/Utils/messages-media.d.ts +134 -128
  139. package/lib/Utils/messages-media.js +868 -805
  140. package/lib/Utils/messages.d.ts +104 -102
  141. package/lib/Utils/messages.js +1744 -1578
  142. package/lib/Utils/noise-handler.d.ts +20 -19
  143. package/lib/Utils/noise-handler.js +164 -154
  144. package/lib/Utils/process-message.d.ts +48 -48
  145. package/lib/Utils/process-message.js +427 -428
  146. package/lib/Utils/signal.d.ts +41 -41
  147. package/lib/Utils/signal.js +165 -165
  148. package/lib/Utils/use-mongo-file-auth-state.d.ts +5 -5
  149. package/lib/Utils/use-mongo-file-auth-state.js +83 -83
  150. package/lib/Utils/use-multi-file-auth-state.d.ts +17 -17
  151. package/lib/Utils/use-multi-file-auth-state.js +237 -237
  152. package/lib/Utils/use-single-file-auth-state.d.ts +12 -12
  153. package/lib/Utils/use-single-file-auth-state.js +79 -79
  154. package/lib/Utils/validate-connection.d.ts +12 -12
  155. package/lib/Utils/validate-connection.js +219 -186
  156. package/lib/WABinary/constants.d.ts +29 -29
  157. package/lib/WABinary/constants.js +1315 -1315
  158. package/lib/WABinary/decode.d.ts +8 -8
  159. package/lib/WABinary/decode.js +287 -287
  160. package/lib/WABinary/encode.d.ts +2 -2
  161. package/lib/WABinary/encode.js +264 -264
  162. package/lib/WABinary/generic-utils.d.ts +27 -27
  163. package/lib/WABinary/generic-utils.js +141 -141
  164. package/lib/WABinary/index.d.ts +5 -5
  165. package/lib/WABinary/index.js +24 -24
  166. package/lib/WABinary/jid-utils.d.ts +58 -53
  167. package/lib/WABinary/jid-utils.js +103 -91
  168. package/lib/WABinary/types.d.ts +21 -21
  169. package/lib/WABinary/types.js +2 -2
  170. package/lib/WAM/BinaryInfo.d.ts +15 -15
  171. package/lib/WAM/BinaryInfo.js +16 -16
  172. package/lib/WAM/constants.d.ts +46 -46
  173. package/lib/WAM/constants.js +15370 -15370
  174. package/lib/WAM/encode.d.ts +2 -2
  175. package/lib/WAM/encode.js +163 -164
  176. package/lib/WAM/index.d.ts +3 -3
  177. package/lib/WAM/index.js +22 -22
  178. package/lib/WAUSync/Protocols/USyncBotProfileProtocol.d.ts +27 -27
  179. package/lib/WAUSync/Protocols/USyncBotProfileProtocol.js +68 -68
  180. package/lib/WAUSync/Protocols/USyncContactProtocol.d.ts +3 -3
  181. package/lib/WAUSync/Protocols/USyncDeviceProtocol.d.ts +2 -2
  182. package/lib/WAUSync/Protocols/USyncDisappearingModeProtocol.d.ts +2 -2
  183. package/lib/WAUSync/Protocols/USyncLIDProtocol.d.ts +9 -8
  184. package/lib/WAUSync/Protocols/USyncLIDProtocol.js +37 -29
  185. package/lib/WAUSync/Protocols/USyncStatusProtocol.d.ts +2 -2
  186. package/lib/WAUSync/Protocols/index.d.ts +6 -6
  187. package/lib/WAUSync/USyncQuery.d.ts +3 -3
  188. package/lib/WAUSync/index.d.ts +3 -3
  189. package/lib/index.d.ts +13 -13
  190. package/lib/index.js +33 -33
  191. package/package.json +96 -94
  192. package/lib/Socket/registration.d.ts +0 -266
  193. package/lib/Socket/registration.js +0 -166
@@ -1,1764 +1,1506 @@
1
- "use strict";
2
-
3
- var __importDefault =
4
- (this && this.__importDefault) ||
5
- function (mod) {
6
- return mod && mod.__esModule ? mod : { default: mod };
7
- };
8
-
9
- Object.defineProperty(exports, "__esModule", { value: true });
10
-
11
- const node_cache_1 = __importDefault(require("@cacheable/node-cache"));
12
- const boom_1 = require("@hapi/boom");
13
- const crypto_1 = require("crypto");
14
- const WAProto_1 = require("../../WAProto");
15
- const Defaults_1 = require("../Defaults");
16
- const Types_1 = require("../Types");
17
- const Utils_1 = require("../Utils");
18
- const make_mutex_1 = require("../Utils/make-mutex");
19
- const WABinary_1 = require("../WABinary");
20
- const groups_1 = require("./groups");
21
- const messages_send_1 = require("./messages-send");
1
+ "use strict"
2
+
3
+ var __importDefault = (this && this.__importDefault) || function (mod) {
4
+ return (mod && mod.__esModule) ? mod : { "default": mod }
5
+ }
6
+
7
+ Object.defineProperty(exports, "__esModule", { value: true })
8
+
9
+ const node_cache_1 = __importDefault(require("@cacheable/node-cache"))
10
+ const boom_1 = require("@hapi/boom")
11
+ const crypto_1 = require("crypto")
12
+ const WAProto_1 = require("../../WAProto")
13
+ const Defaults_1 = require("../Defaults")
14
+ const Types_1 = require("../Types")
15
+ const Utils_1 = require("../Utils")
16
+ const WABinary_1 = require("../WABinary")
17
+ const groups_1 = require("./groups")
18
+ const make_mutex_1 = require("../Utils/make-mutex")
19
+ const messages_send_1 = require("./messages-send")
22
20
 
23
21
  const makeMessagesRecvSocket = (config) => {
24
- const {
25
- logger,
26
- retryRequestDelayMs,
27
- maxMsgRetryCount,
28
- getMessage,
29
- shouldIgnoreJid,
30
- } = config;
31
- const Neele = messages_send_1.makeMessagesSocket(config);
32
- const {
33
- ev,
34
- authState,
35
- ws,
36
- processingMutex,
37
- signalRepository,
38
- query,
39
- upsertMessage,
40
- groupMetadata,
41
- resyncAppState,
42
- onUnexpectedError,
43
- assertSessions,
44
- sendNode,
45
- relayMessage,
46
- sendReceipt,
47
- uploadPreKeys,
48
- getUSyncDevices,
49
- createParticipantNodes,
50
- sendPeerDataOperationMessage,
51
- } = Neele;
52
-
53
- /** this mutex ensures that each retryRequest will wait for the previous one to finish */
54
- const retryMutex = make_mutex_1.makeMutex();
55
-
56
- const msgRetryCache =
57
- config.msgRetryCounterCache ||
58
- new node_cache_1.default({
59
- stdTTL: Defaults_1.DEFAULT_CACHE_TTLS.MSG_RETRY,
60
- useClones: false,
61
- });
62
-
63
- const callOfferCache =
64
- config.callOfferCache ||
65
- new node_cache_1.default({
66
- stdTTL: Defaults_1.DEFAULT_CACHE_TTLS.CALL_OFFER,
67
- useClones: false,
68
- });
69
-
70
- const placeholderResendCache =
71
- config.placeholderResendCache ||
72
- new node_cache_1.default({
73
- stdTTL: Defaults_1.DEFAULT_CACHE_TTLS.MSG_RETRY,
74
- useClones: false,
75
- });
76
-
77
- let sendActiveReceipts = false;
78
-
79
- const sendMessageAck = async ({ tag, attrs, content }, errorCode) => {
80
- const stanza = {
81
- tag: "ack",
82
- attrs: {
83
- id: attrs.id,
84
- to: attrs.from,
85
- class: tag,
86
- },
87
- };
88
-
89
- if (!!errorCode) {
90
- stanza.attrs.error = errorCode.toString();
91
- }
92
-
93
- if (!!attrs.participant) {
94
- stanza.attrs.participant = attrs.participant;
95
- }
96
-
97
- if (!!attrs.recipient) {
98
- stanza.attrs.recipient = attrs.recipient;
99
- }
100
-
101
- if (
102
- !!attrs.type &&
103
- (tag !== "message" ||
104
- WABinary_1.getBinaryNodeChild({ tag, attrs, content }, "unavailable") ||
105
- errorCode !== 0)
106
- ) {
107
- stanza.attrs.type = attrs.type;
108
- }
109
-
110
- if (
111
- tag === "message" &&
112
- WABinary_1.getBinaryNodeChild({ tag, attrs, content }, "unavailable")
113
- ) {
114
- stanza.attrs.from = authState.creds.me.id;
115
- }
116
-
117
- logger.debug({ recv: { tag, attrs }, sent: stanza.attrs }, "sent ack");
118
- await sendNode(stanza);
119
- };
120
-
121
- const offerCall = async (toJid, isVideo = false) => {
122
- const callId = crypto_1
123
- .randomBytes(16)
124
- .toString("hex")
125
- .toUpperCase()
126
- .substring(0, 64);
127
- const offerContent = [];
128
- offerContent.push({
129
- tag: "audio",
130
- attrs: { enc: "opus", rate: "16000" },
131
- content: undefined,
132
- });
133
- offerContent.push({
134
- tag: "audio",
135
- attrs: { enc: "opus", rate: "8000" },
136
- content: undefined,
137
- });
138
- if (isVideo) {
139
- offerContent.push({
140
- tag: "video",
141
- attrs: {
142
- enc: "vp8",
143
- dec: "vp8",
144
- orientation: "0",
145
- screen_width: "1920",
146
- screen_height: "1080",
147
- device_orientation: "0",
148
- },
149
- content: undefined,
150
- });
151
- }
152
- offerContent.push({
153
- tag: "net",
154
- attrs: { medium: "3" },
155
- content: undefined,
156
- });
157
- offerContent.push({
158
- tag: "capability",
159
- attrs: { ver: "1" },
160
- content: new Uint8Array([1, 4, 255, 131, 207, 4]),
161
- });
162
- offerContent.push({
163
- tag: "encopt",
164
- attrs: { keygen: "2" },
165
- content: undefined,
166
- });
167
- const encKey = crypto_1.randomBytes(32);
168
- const rawDevices = await getUSyncDevices([toJid], true, false);
169
- const devices = rawDevices.map(({ user, device }) =>
170
- WABinary_1.jidEncode(user, "s.whatsapp.net", device)
171
- );
172
- await assertSessions(devices, true);
173
- const { nodes: destinations, shouldIncludeDeviceIdentity } =
174
- await createParticipantNodes(
175
- devices,
176
- { call: { callKey: new Uint8Array(encKey) } },
177
- { count: "0" }
178
- );
179
- offerContent.push({ tag: "destination", attrs: {}, content: destinations });
180
- if (shouldIncludeDeviceIdentity) {
181
- offerContent.push({
182
- tag: "device-identity",
183
- attrs: {},
184
- content: Utils_1.encodeSignedDeviceIdentity(
185
- authState.creds.account,
186
- true
187
- ),
188
- });
189
- }
190
- const stanza = {
191
- tag: "call",
192
- attrs: {
193
- id: Utils_1.generateMessageIDV2(),
194
- to: toJid,
195
- },
196
- content: [
197
- {
198
- tag: "offer",
199
- attrs: {
200
- "call-id": callId,
201
- "call-creator": authState.creds.me.id,
202
- },
203
- content: offerContent,
204
- },
205
- ],
206
- };
207
- await query(stanza);
208
- return {
209
- id: callId,
210
- to: toJid,
211
- };
212
- };
213
-
214
- const rejectCall = async (callId, callFrom) => {
215
- const stanza = {
216
- tag: "call",
217
- attrs: {
218
- from: authState.creds.me.id,
219
- to: callFrom,
220
- },
221
- content: [
222
- {
223
- tag: "reject",
224
- attrs: {
225
- "call-id": callId,
226
- "call-creator": callFrom,
227
- count: "0",
228
- },
229
- content: undefined,
230
- },
231
- ],
232
- };
233
-
234
- await query(stanza);
235
- };
236
-
237
- const sendRetryRequest = async (node, forceIncludeKeys = false) => {
238
- const { fullMessage } = Utils_1.decodeMessageNode(
239
- node,
240
- authState.creds.me.id,
241
- authState.creds.me.lid || ""
242
- );
243
- const { key: msgKey } = fullMessage;
244
- const msgId = msgKey.id;
245
- const key = `${msgId}:${msgKey?.participant}`;
246
- let retryCount = msgRetryCache.get(key) || 0;
247
-
248
- if (retryCount >= maxMsgRetryCount) {
249
- logger.debug({ retryCount, msgId }, "reached retry limit, clearing");
250
- msgRetryCache.del(key);
251
- return;
252
- }
253
- retryCount += 1;
254
- msgRetryCache.set(key, retryCount);
255
-
256
- const {
257
- account,
258
- signedPreKey,
259
- signedIdentityKey: identityKey,
260
- } = authState.creds;
261
-
262
- if (retryCount === 1) {
263
- //request a resend via phone
264
- const msgId = await requestPlaceholderResend(msgKey);
265
- logger.debug(
266
- `sendRetryRequest: requested placeholder resend for message ${msgId}`
267
- );
22
+ const { logger, retryRequestDelayMs, maxMsgRetryCount, getMessage, shouldIgnoreJid, enableAutoSessionRecreation } = config
23
+ const baron = messages_send_1.makeMessagesSocket(config)
24
+ const { ev, authState, ws, processingMutex, signalRepository, query, upsertMessage, resyncAppState, onUnexpectedError, assertSessions, sendNode, relayMessage, sendReceipt, uploadPreKeys, groupMetadata, getUSyncDevices, createParticipantNodes, messageRetryManager, sendPeerDataOperationMessage } = baron
25
+
26
+ /** this mutex ensures that each retryRequest will wait for the previous one to finish */
27
+ const retryMutex = make_mutex_1.makeMutex()
28
+
29
+ const msgRetryCache = config.msgRetryCounterCache || new node_cache_1.default({
30
+ stdTTL: Defaults_1.DEFAULT_CACHE_TTLS.MSG_RETRY,
31
+ useClones: false
32
+ })
33
+
34
+ const callOfferCache = config.callOfferCache || new node_cache_1.default({
35
+ stdTTL: Defaults_1.DEFAULT_CACHE_TTLS.CALL_OFFER,
36
+ useClones: false
37
+ })
38
+
39
+ const placeholderResendCache = config.placeholderResendCache || new node_cache_1.default({
40
+ stdTTL: Defaults_1.DEFAULT_CACHE_TTLS.MSG_RETRY,
41
+ useClones: false
42
+ })
43
+
44
+ let sendActiveReceipts = false
45
+
46
+ const sendMessageAck = async ({ tag, attrs, content }, errorCode) => {
47
+ const stanza = {
48
+ tag: 'ack',
49
+ attrs: {
50
+ id: attrs.id,
51
+ to: attrs.from,
52
+ class: tag
53
+ }
54
+ }
55
+
56
+ if (!!errorCode) {
57
+ stanza.attrs.error = errorCode.toString()
58
+ }
59
+
60
+ if (!!attrs.participant) {
61
+ stanza.attrs.participant = attrs.participant
62
+ }
63
+
64
+ if (!!attrs.recipient) {
65
+ stanza.attrs.recipient = attrs.recipient
66
+ }
67
+
68
+ if (!!attrs.type && (tag !== 'message' || WABinary_1.getBinaryNodeChild({ tag, attrs, content }, 'unavailable') || errorCode !== 0)) {
69
+ stanza.attrs.type = attrs.type
70
+ }
71
+
72
+ if (tag === 'message' && WABinary_1.getBinaryNodeChild({ tag, attrs, content }, 'unavailable')) {
73
+ stanza.attrs.from = authState.creds.me.id
74
+ }
75
+
76
+ logger.debug({ recv: { tag, attrs }, sent: stanza.attrs }, 'sent ack')
77
+ await sendNode(stanza)
268
78
  }
269
-
270
- const deviceIdentity = Utils_1.encodeSignedDeviceIdentity(account, true);
271
-
272
- await authState.keys.transaction(async () => {
273
- const receipt = {
274
- tag: "receipt",
275
- attrs: {
276
- id: msgId,
277
- type: "retry",
278
- to: node.attrs.from,
279
- },
280
- content: [
281
- {
282
- tag: "retry",
79
+
80
+ const offerCall = async (toJid, isVideo = false) => {
81
+ const callId = crypto_1.randomBytes(16).toString('hex').toUpperCase().substring(0, 64)
82
+ const offerContent = []
83
+ offerContent.push({ tag: 'audio', attrs: { enc: 'opus', rate: '16000' }, content: undefined })
84
+ offerContent.push({ tag: 'audio', attrs: { enc: 'opus', rate: '8000' }, content: undefined })
85
+
86
+ if (isVideo) {
87
+ offerContent.push({
88
+ tag: 'video',
89
+ attrs: { enc: 'vp8', dec: 'vp8', orientation: '0', 'screen_width': '1920', 'screen_height': '1080', 'device_orientation': '0' },
90
+ content: undefined
91
+ })
92
+ }
93
+ offerContent.push({ tag: 'net', attrs: { medium: '3' }, content: undefined })
94
+ offerContent.push({ tag: 'capability', attrs: { ver: '1' }, content: new Uint8Array([1, 4, 255, 131, 207, 4]) })
95
+ offerContent.push({ tag: 'encopt', attrs: { keygen: '2' }, content: undefined })
96
+
97
+ const encKey = crypto_1.randomBytes(32)
98
+ const devices = (await getUSyncDevices([toJid], true, false)).map(({ user, device }) => WABinary_1.jidEncode(user, 's.whatsapp.net', device))
99
+ await assertSessions(devices, true)
100
+
101
+ const { nodes: destinations, shouldIncludeDeviceIdentity } = await createParticipantNodes(devices, {
102
+ call: {
103
+ callKey: new Uint8Array(encKey)
104
+ }
105
+ }, { count: '0' })
106
+ offerContent.push({ tag: 'destination', attrs: {}, content: destinations })
107
+
108
+ if (shouldIncludeDeviceIdentity) {
109
+ offerContent.push({
110
+ tag: 'device-identity',
111
+ attrs: {},
112
+ content: Utils_1.encodeSignedDeviceIdentity(authState.creds.account, true)
113
+ })
114
+ }
115
+
116
+ const stanza = ({
117
+ tag: 'call',
283
118
  attrs: {
284
- count: retryCount.toString(),
285
- id: node.attrs.id,
286
- t: node.attrs.t,
287
- v: "1",
288
- },
289
- },
290
- {
291
- tag: "registration",
292
- attrs: {},
293
- content: Utils_1.encodeBigEndian(authState.creds.registrationId),
294
- },
295
- ],
296
- };
297
-
298
- if (node.attrs.recipient) {
299
- receipt.attrs.recipient = node.attrs.recipient;
300
- }
301
-
302
- if (node.attrs.participant) {
303
- receipt.attrs.participant = node.attrs.participant;
304
- }
305
-
306
- if (retryCount > 1 || forceIncludeKeys) {
307
- const { update, preKeys } = await Utils_1.getNextPreKeys(authState, 1);
308
- const [keyId] = Object.keys(preKeys);
309
- const key = preKeys[+keyId];
310
- const content = receipt.content;
311
-
312
- content.push({
313
- tag: "keys",
314
- attrs: {},
315
- content: [
316
- {
317
- tag: "type",
318
- attrs: {},
319
- content: Buffer.from(Defaults_1.KEY_BUNDLE_TYPE),
119
+ id: Utils_1.generateMessageID(),
120
+ to: toJid,
320
121
  },
321
- { tag: "identity", attrs: {}, content: identityKey.public },
322
- Utils_1.xmppPreKey(key, +keyId),
323
- Utils_1.xmppSignedPreKey(signedPreKey),
324
- { tag: "device-identity", attrs: {}, content: deviceIdentity },
325
- ],
326
- });
327
- ev.emit("creds.update", update);
328
- }
329
-
330
- await sendNode(receipt);
331
-
332
- logger.info({ msgAttrs: node.attrs, retryCount }, "sent retry receipt");
333
- });
334
- };
335
-
336
- const handleEncryptNotification = async (node) => {
337
- const from = node.attrs.from;
338
- if (from === WABinary_1.S_WHATSAPP_NET) {
339
- const countChild = WABinary_1.getBinaryNodeChild(node, "count");
340
- const count = +countChild.attrs.value;
341
- const shouldUploadMorePreKeys = count < Defaults_1.MIN_PREKEY_COUNT;
342
- logger.debug({ count, shouldUploadMorePreKeys }, "recv pre-key count");
343
-
344
- if (shouldUploadMorePreKeys) {
345
- await uploadPreKeys();
346
- }
347
- } else {
348
- const identityNode = WABinary_1.getBinaryNodeChild(node, "identity");
349
- if (identityNode) {
350
- logger.info({ jid: from }, "identity changed");
351
- // not handling right now
352
- // signal will override new identity anyway
353
- } else {
354
- logger.info({ node }, "unknown encrypt notification");
355
- }
122
+ content: [{
123
+ tag: 'offer',
124
+ attrs: {
125
+ 'call-id': callId,
126
+ 'call-creator': authState.creds.me.id,
127
+ },
128
+ content: offerContent,
129
+ }],
130
+ })
131
+
132
+ await query(stanza)
133
+
134
+ return {
135
+ id: callId,
136
+ to: toJid
137
+ }
356
138
  }
357
- };
358
-
359
- const handleGroupNotification = (
360
- participant,
361
- child,
362
- msg,
363
- participantPhoneNumber,
364
- mode
365
- ) => {
366
- if (participant && participant.endsWith("@lid") && participantPhoneNumber) {
367
- participant = participantPhoneNumber;
139
+
140
+ const rejectCall = async (callId, callFrom) => {
141
+ const stanza = ({
142
+ tag: 'call',
143
+ attrs: {
144
+ from: authState.creds.me.id,
145
+ to: callFrom,
146
+ },
147
+ content: [{
148
+ tag: 'reject',
149
+ attrs: {
150
+ 'call-id': callId,
151
+ 'call-creator': callFrom,
152
+ count: '0',
153
+ },
154
+ content: undefined,
155
+ }],
156
+ })
157
+
158
+ await query(stanza)
368
159
  }
369
-
370
- const participantNode = WABinary_1.getBinaryNodeChild(child, "participant");
371
-
372
- const participantJid = participantNode
373
- ? [participantNode]
374
- .map((p) => {
375
- const { jid, lid, phone_number } = p.attrs;
376
-
377
- if (phone_number && phone_number.endsWith("@s.whatsapp.net")) {
378
- return phone_number;
160
+
161
+ const sendRetryRequest = async (node, forceIncludeKeys = false) => {
162
+ const { fullMessage } = Utils_1.decodeMessageNode(node, authState.creds.me.id, authState.creds.me.lid || '')
163
+ const { key: msgKey } = fullMessage
164
+ const msgId = msgKey.id
165
+
166
+ if (messageRetryManager) {
167
+ // Check if we've exceeded max retries using the new system
168
+ if (messageRetryManager.hasExceededMaxRetries(msgId)) {
169
+ logger.debug({ msgId }, 'reached retry limit with new retry manager, clearing')
170
+ messageRetryManager.markRetryFailed(msgId)
171
+ return
379
172
  }
380
-
381
- if (jid && (0, WABinary_1.isJidUser)(jid)) {
382
- return jid;
173
+
174
+ // Increment retry count using new system
175
+ const retryCount = messageRetryManager.incrementRetryCount(msgId)
176
+
177
+ // Use the new retry count for the rest of the logic
178
+ const key = `${msgId}:${msgKey?.participant}`
179
+ msgRetryCache.set(key, retryCount)
180
+ }
181
+ else {
182
+ // Fallback to old system
183
+ const key = `${msgId}:${msgKey?.participant}`
184
+ let retryCount = (await msgRetryCache.get(key)) || 0
185
+
186
+ if (retryCount >= maxMsgRetryCount) {
187
+ logger.debug({ retryCount, msgId }, 'reached retry limit, clearing')
188
+ msgRetryCache.del(key)
189
+ return
383
190
  }
384
-
385
- if (phone_number) {
386
- return (0, WABinary_1.jidNormalizedUser)(phone_number);
191
+
192
+ retryCount += 1
193
+ await msgRetryCache.set(key, retryCount)
194
+ }
195
+
196
+ const key = `${msgId}:${msgKey?.participant}`
197
+ const retryCount = (await msgRetryCache.get(key)) || 1
198
+ const { account, signedPreKey, signedIdentityKey: identityKey } = authState.creds
199
+ const fromJid = node.attrs.from
200
+
201
+ // Check if we should recreate the session
202
+ let shouldRecreateSession = false
203
+ let recreateReason = ''
204
+
205
+ if (enableAutoSessionRecreation && messageRetryManager) {
206
+ try {
207
+ // Check if we have a session with this JID
208
+ const sessionId = signalRepository.jidToSignalProtocolAddress(fromJid)
209
+ const hasSession = await signalRepository.validateSession(fromJid)
210
+ const result = messageRetryManager.shouldRecreateSession(fromJid, retryCount, hasSession.exists)
211
+
212
+ shouldRecreateSession = result.recreate
213
+ recreateReason = result.reason
214
+
215
+ if (shouldRecreateSession) {
216
+ logger.info({ fromJid, retryCount, reason: recreateReason }, 'recreating session for retry')
217
+ // Delete existing session to force recreation
218
+ await authState.keys.set({ session: { [sessionId]: null } })
219
+ forceIncludeKeys = true
220
+ }
387
221
  }
388
-
389
- if (lid && lid.endsWith("@lid")) {
390
- return lid;
222
+ catch (error) {
223
+ logger.warn({ error, fromJid }, 'failed to check session recreation')
391
224
  }
392
-
393
- return null;
394
- })
395
- .filter(Boolean)[0]
396
- : null;
397
-
398
- msg.participant_pn = participantPhoneNumber;
399
- if (participantPhoneNumber) {
400
- msg.key = {
401
- participant: participantPhoneNumber,
402
- };
403
- }
404
-
405
- switch (child.tag) {
406
- case "create":
407
- const metadata = groups_1.extractGroupMetadata(child);
408
- msg.messageStubType = Types_1.WAMessageStubType.GROUP_CREATE;
409
- msg.messageStubParameters = [metadata.subject];
410
- msg.key = { participant: metadata.owner };
411
- ev.emit("chats.upsert", [
412
- {
413
- id: metadata.id,
414
- name: metadata.subject,
415
- conversationTimestamp: metadata.creation,
416
- },
417
- ]);
418
- ev.emit("groups.upsert", [
419
- {
420
- ...metadata,
421
- author: participant,
422
- },
423
- ]);
424
- break;
425
- case "delete":
426
- msg.messageStubType =
427
- Types_1.WAMessageStubType.COMMUNITY_PARENT_GROUP_DELETED;
428
- msg.messageStubParameters = [participantJid, "delete"];
429
- break;
430
- case "ephemeral":
431
- case "not_ephemeral":
432
- msg.message = {
433
- protocolMessage: {
434
- type: WAProto_1.proto.Message.ProtocolMessage.Type
435
- .EPHEMERAL_SETTING,
436
- ephemeralExpiration: +(child.attrs.expiration || 0),
437
- },
438
- };
439
- break;
440
- case "modify":
441
- const oldNumber = WABinary_1.getBinaryNodeChildren(
442
- child,
443
- "participant"
444
- ).map((p) => p.attrs.jid);
445
- msg.messageStubParameters = oldNumber || [];
446
- msg.messageStubType =
447
- Types_1.WAMessageStubType.GROUP_PARTICIPANT_CHANGE_NUMBER;
448
- break;
449
- case "promote":
450
- case "demote":
451
- case "remove":
452
- case "add":
453
- case "leave":
454
- let stubType = `GROUP_PARTICIPANT_${child.tag.toUpperCase()}`;
455
- if (child.attrs?.reason === "linked_group_join") {
456
- stubType = GROUP_PARTICIPANT_LINKED_GROUP_JOIN;
457
- }
458
- msg.messageStubType = Types_1.WAMessageStubType[stubType];
459
- const participants = (0, WABinary_1.getBinaryNodeChildren)(
460
- child,
461
- "participant"
462
- )
463
- .map((p) => {
464
- const { jid, lid, phone_number } = p.attrs;
465
- if (phone_number && phone_number.endsWith("@s.whatsapp.net")) {
466
- return phone_number;
467
- }
468
- if (jid && jid.endsWith("@s.whatsapp.net")) {
469
- return jid;
225
+ }
226
+
227
+ if (retryCount <= 2) {
228
+ // Use new retry manager for phone requests if available
229
+ if (messageRetryManager) {
230
+ // Schedule phone request with delay (like whatsmeow)
231
+ messageRetryManager.schedulePhoneRequest(msgId, async () => {
232
+ try {
233
+ const msgId = await requestPlaceholderResend(msgKey)
234
+ logger.debug(`sendRetryRequest: requested placeholder resend for message ${msgId} (scheduled)`)
235
+ }
236
+ catch (error) {
237
+ logger.warn({ error, msgId }, 'failed to send scheduled phone request');
238
+ }
239
+ })
470
240
  }
471
- if (lid && lid.endsWith("@lid")) {
241
+ else {
242
+ // Fallback to immediate request
243
+ const msgId = await requestPlaceholderResend(msgKey)
244
+ logger.debug(`sendRetryRequest: requested placeholder resend for message ${msgId}`)
472
245
  }
473
- return null;
474
- })
475
- .filter(Boolean);
476
-
477
- if (
478
- participants.length === 1 &&
479
- // if recv. "remove" message and sender removed themselves
480
- // mark as left
481
- WABinary_1.areJidsSameUser(participants[0], participant) &&
482
- child.tag === "remove"
483
- ) {
484
- msg.messageStubType =
485
- Types_1.WAMessageStubType.GROUP_PARTICIPANT_LEAVE;
486
- }
487
- msg.messageStubParameters = participants;
488
- break;
489
- case "subject":
490
- msg.messageStubType = Types_1.WAMessageStubType.GROUP_CHANGE_SUBJECT;
491
- msg.messageStubType =
492
- Types_1.WAMessageStubType.COMMUNITY_PARENT_GROUP_SUBJECT_CHANGED;
493
- msg.messageStubParameters = [participantJid, child.attrs.subject];
494
- break;
495
- case "description":
496
- const description = WABinary_1.getBinaryNodeChild(
497
- child,
498
- "body"
499
- )?.content?.toString();
500
- msg.messageStubType =
501
- Types_1.WAMessageStubType.GROUP_CHANGE_DESCRIPTION;
502
- msg.messageStubType =
503
- Types_1.WAMessageStubType.COMMUNITY_CHANGE_DESCRIPTION;
504
- msg.messageStubParameters = description ? [description] : undefined;
505
-
506
- break;
507
- case "announcement":
508
- case "not_announcement":
509
- msg.messageStubType = Types_1.WAMessageStubType.GROUP_CHANGE_ANNOUNCE;
510
- msg.messageStubParameters = [
511
- child.tag === "announcement" ? "on" : "off",
512
- ];
513
- break;
514
- case "locked":
515
- case "unlocked":
516
- msg.messageStubType = Types_1.WAMessageStubType.GROUP_CHANGE_RESTRICT;
517
- msg.messageStubParameters = [child.tag === "locked" ? "on" : "off"];
518
- break;
519
- case "invite":
520
- msg.messageStubType =
521
- Types_1.WAMessageStubType.GROUP_CHANGE_INVITE_LINK;
522
- msg.messageStubParameters = [child.attrs.code];
523
- break;
524
- case "member_add_mode":
525
- const addMode = child.content;
526
- if (addMode) {
527
- msg.messageStubType = Types_1.WAMessageStubType.GROUP_MEMBER_ADD_MODE;
528
- msg.messageStubParameters = [addMode.toString()];
529
- }
530
- break;
531
- case "membership_approval_mode":
532
- const approvalMode = WABinary_1.getBinaryNodeChild(child, "group_join");
533
- if (approvalMode) {
534
- msg.messageStubType =
535
- Types_1.WAMessageStubType.GROUP_MEMBERSHIP_JOIN_APPROVAL_MODE;
536
- msg.messageStubParameters = [approvalMode.attrs.state];
537
- }
538
- break;
539
- case "created_membership_requests":
540
- msg.messageStubType =
541
- Types_1.WAMessageStubType.GROUP_MEMBERSHIP_JOIN_APPROVAL_REQUEST_NON_ADMIN_ADD;
542
- msg.messageStubParameters = [
543
- participantJid,
544
- "created",
545
- child.attrs.request_method,
546
- ];
547
- break;
548
- case "revoked_membership_requests":
549
- const isDenied = WABinary_1.areJidsSameUser(
550
- participantJid,
551
- participant
552
- );
553
- msg.messageStubType =
554
- Types_1.WAMessageStubType.GROUP_MEMBERSHIP_JOIN_APPROVAL_REQUEST_NON_ADMIN_ADD;
555
- msg.messageStubParameters = [
556
- participantJid,
557
- isDenied ? "revoked" : "rejected",
558
- ];
559
- break;
560
- case "link":
561
- case "unlink":
562
- const type = child.attrs?.unlink_type || child.attrs?.link_type;
563
- const stubMap = {
564
- parent_group:
565
- Types_1.WAMessageStubType[
566
- `COMMUNITY_${child.tag.toUpperCase()}_PARENT_GROUP`
567
- ],
568
- sibling_group:
569
- Types_1.WAMessageStubType[
570
- `COMMUNITY_${child.tag.toUpperCase()}_SIBLING_GROUP`
571
- ],
572
- sub_group:
573
- Types_1.WAMessageStubType[
574
- `COMMUNITY_${child.tag.toUpperCase()}_SUB_GROUP`
575
- ],
576
- };
577
- const groups = WABinary_1.getBinaryNodeChildren(child, "group")
578
- .map((g) => g.attrs?.jid || g.attrs?.subject || "")
579
- .filter((x) => x);
580
- msg.messageStubType =
581
- stubMap?.[type] ||
582
- Types_1.WAMessageStubType[
583
- `COMMUNITY_${child.tag.toUpperCase()}_PARENT_GROUP`
584
- ];
585
- msg.messageStubParameters = [participantJid, child.tag, groups];
586
- break;
587
- case "linked_group_promote":
588
- case "linked_group_demote":
589
- const stubtype = `COMMUNITY_PARTICIPANT_${child.tag
590
- .split("_")[2]
591
- .toUpperCase()}`;
592
- const participantS =
593
- mode === "lid"
594
- ? WABinary_1.getBinaryNodeChildren(child, "participant").map(
595
- (p) => p.attrs.phone_number
596
- )
597
- : WABinary_1.getBinaryNodeChildren(child, "participant").map(
598
- (p) => p.attrs.jid
599
- );
600
- msg.messageStubType = Types_1.WAMessageStubType[stubtype];
601
- msg.messageStubParameters = participantS;
602
- break;
603
- case "created_sub_group_suggestion":
604
- msg.messageStubType =
605
- Types_1.WAMessageStubType.SUGGESTED_SUBGROUP_ANNOUNCE;
606
- msg.messageStubParameters = [participantJid, "add"];
607
- break;
608
- case "revoked_sub_group_suggestions":
609
- const res = WABinary_1.getBinaryNodeChildren(
610
- child,
611
- "sub_group_suggestions"
612
- );
613
- const reason = res.attrs?.reason;
614
- if (reason === "approved")
615
- msg.messageStubType = Types_1.WAMessageStubType.GROUP_CREATE;
616
- else
617
- msg.messageStubType = Types_1.WAMessageStubType.GENERIC_NOTIFICATION;
618
- msg.messageStubParameters = [participantJid, reason];
619
- break;
620
- default:
621
- logger.warn(child.tag, "Unhandled group node");
622
- break;
623
- }
624
- };
625
-
626
- const handleNewsletterNotification = (id, node) => {
627
- const messages = WABinary_1.getBinaryNodeChild(node, "messages");
628
- const message = WABinary_1.getBinaryNodeChild(node, "message");
629
- const serverId = node.attrs.server_id;
630
-
631
- const reactionsList = WABinary_1.getBinaryNodeChild(node, "reactions");
632
- const viewsList = WABinary_1.getBinaryNodeChild(node, "views_count");
633
-
634
- if (reactionsList) {
635
- const reactions = WABinary_1.getBinaryNodeChild(
636
- reactionsList,
637
- "reaction"
638
- );
639
-
640
- if (reactions.length === 0) {
641
- ev.emit("newsletter.reaction", {
642
- id,
643
- newsletter_server_id: serverId,
644
- reaction: {
645
- removed: true,
646
- },
647
- });
648
- }
649
-
650
- reactions.forEach((item) => {
651
- ev.emit("newsletter.reaction", {
652
- id,
653
- newsletter_server_id: serverId,
654
- reaction: {
655
- code: item.attrs?.code,
656
- count: +item.attrs.count,
657
- },
658
- });
659
- });
660
- }
661
-
662
- if (viewsList.length) {
663
- viewsList.forEach((item) => {
664
- ev.emit("newsletter.view", {
665
- id,
666
- newsletter_server_id: serverId,
667
- count: +item.attrs.count,
668
- });
669
- });
670
- }
671
- };
672
-
673
- const handleMexNotification = (id, node) => {
674
- const operation = node?.attrs?.op_name;
675
- const content = JSON.parse(node?.content);
676
-
677
- let contentPath;
678
- let action;
679
-
680
- if (operation === Types_1.MexOperations.UPDATE) {
681
- contentPath = content.data[Types_1.XWAPaths.METADATA_UPDATE];
682
-
683
- ev.emit("newsletter-settings.update", {
684
- id,
685
- update: contentPath.thread_metadata.settings,
686
- });
687
- } else if (operation === Types_1.MexUpdatesOperations.GROUP_LIMIT_SHARING) {
688
- contentPath =
689
- content.data[Types_1.XWAPathsMexUpdates.GROUP_SHARING_CHANGE];
690
-
691
- ev.emit("limit-sharing.update", {
692
- id,
693
- author: contentPath.updated_by?.pn
694
- ? contentPath.updated_by.pn
695
- : contentPath.updated_by.id,
696
- action: `${
697
- contentPath.properties.limit_sharing.limit_sharing_enabled
698
- ? "on"
699
- : "off"
700
- }`,
701
- trigger: contentPath.properties.limit_sharing.limit_sharing_trigger,
702
- update_time: contentPath.update_time,
703
- });
704
- } else if (operation === Types_1.MexUpdatesOperations.OWNER_COMMUNITY) {
705
- contentPath =
706
- content.data[Types_1.XWAPathsMexUpdates.COMMUNITY_OWNER_CHANGE];
707
-
708
- ev.emit("community-owner.update", {
709
- id,
710
- author: contentPath.updated_by?.pn
711
- ? contentPath.updated_by.pn
712
- : contentPath.updated_by.id,
713
- user: contentPath.role_updates[0].user?.pn
714
- ? contentPath.role_updates[0].user.pn
715
- : contentPath.role_updates[0].user.jid,
716
- new_role: contentPath.role_updates[0].new_role,
717
- update_time: contentPath.update_time,
718
- });
719
- } else {
720
- if (operation === Types_1.MexOperations.PROMOTE) {
721
- action = "promote";
722
- contentPath = content.data[Types_1.XWAPaths.PROMOTE];
723
- } else {
724
- action = "demote";
725
- contentPath = content.data[Types_1.XWAPaths.DEMOTE];
726
- }
727
-
728
- ev.emit("newsletter-participants.update", {
729
- id,
730
- author: contentPath.actor.pn,
731
- user: contentPath.user.pn,
732
- new_role: contentPath.user_new_role,
733
- action,
734
- });
735
- }
736
- };
737
-
738
- const processNotification = async (node) => {
739
- const result = {};
740
- const [child] = WABinary_1.getAllBinaryNodeChildren(node);
741
- const nodeType = node.attrs.type;
742
- const from = WABinary_1.jidNormalizedUser(node.attrs.from);
743
-
744
- switch (nodeType) {
745
- case "privacy_token":
746
- const tokenList = WABinary_1.getBinaryNodeChildren(child, "token");
747
- for (const { attrs, content } of tokenList) {
748
- const jid = attrs.jid;
749
- ev.emit("chats.update", [
750
- {
751
- id: jid,
752
- tcToken: content,
753
- },
754
- ]);
755
- logger.debug({ jid }, "got privacy token update");
756
- }
757
- break;
758
- case "w:gp2":
759
- const mode = node.attrs.addressing_mode;
760
- handleGroupNotification(
761
- node.attrs.participant,
762
- child,
763
- result,
764
- node.attrs.participant_pn,
765
- mode
766
- );
767
- break;
768
- case "newsletter":
769
- handleNewsletterNotification(node.attrs.from, child);
770
- break;
771
- case "mex":
772
- handleMexNotification(node.attrs.from, child);
773
- break;
774
- case "mediaretry":
775
- const event = Utils_1.decodeMediaRetryNode(node);
776
- ev.emit("messages.media-update", [event]);
777
- break;
778
- case "encrypt":
779
- await handleEncryptNotification(node);
780
- break;
781
- case "devices":
782
- const devices = WABinary_1.getBinaryNodeChildren(child, "device");
783
- if (
784
- WABinary_1.areJidsSameUser(child.attrs.jid, authState.creds.me.id)
785
- ) {
786
- const deviceJids = devices.map((d) => d.attrs.jid);
787
- logger.info({ deviceJids }, "got my own devices");
788
- }
789
- break;
790
- case "server_sync":
791
- const update = WABinary_1.getBinaryNodeChild(node, "collection");
792
- if (update) {
793
- const name = update.attrs.name;
794
- await resyncAppState([name], false);
795
- }
796
- break;
797
- case "picture":
798
- const setPicture = WABinary_1.getBinaryNodeChild(node, "set");
799
- const delPicture = WABinary_1.getBinaryNodeChild(node, "delete");
800
- ev.emit("contacts.update", [
801
- {
802
- id:
803
- WABinary_1.jidNormalizedUser(node?.attrs?.from) ||
804
- (setPicture || delPicture)?.attrs?.hash ||
805
- "",
806
- imgUrl: setPicture ? "changed" : "removed",
807
- },
808
- ]);
809
- if (WABinary_1.isJidGroup(from)) {
810
- const node = setPicture || delPicture;
811
- result.messageStubType = Types_1.WAMessageStubType.GROUP_CHANGE_ICON;
812
- if (setPicture) {
813
- result.messageStubParameters = [setPicture.attrs.id];
814
- }
815
- result.participant = node?.attrs?.author;
816
- result.key = {
817
- ...(result.key || {}),
818
- participant: setPicture?.attrs?.author,
819
- };
820
- }
821
- break;
822
- case "account_sync":
823
- if (child.tag === "disappearing_mode") {
824
- const newDuration = +child.attrs.duration;
825
- const timestamp = +child.attrs.t;
826
- logger.info({ newDuration }, "updated account disappearing mode");
827
- ev.emit("creds.update", {
828
- accountSettings: {
829
- ...authState.creds.accountSettings,
830
- defaultDisappearingMode: {
831
- ephemeralExpiration: newDuration,
832
- ephemeralSettingTimestamp: timestamp,
833
- },
834
- },
835
- });
836
- } else if (child.tag === "blocklist") {
837
- const blocklists = WABinary_1.getBinaryNodeChildren(child, "item");
838
- for (const { attrs } of blocklists) {
839
- const blocklist = [attrs.jid];
840
- const type = attrs.action === "block" ? "add" : "remove";
841
- ev.emit("blocklist.update", { blocklist, type });
842
- }
843
- }
844
- break;
845
- case "link_code_companion_reg":
846
- const linkCodeCompanionReg = WABinary_1.getBinaryNodeChild(
847
- node,
848
- "link_code_companion_reg"
849
- );
850
- const ref = toRequiredBuffer(
851
- WABinary_1.getBinaryNodeChildBuffer(
852
- linkCodeCompanionReg,
853
- "link_code_pairing_ref"
854
- )
855
- );
856
- const primaryIdentityPublicKey = toRequiredBuffer(
857
- WABinary_1.getBinaryNodeChildBuffer(
858
- linkCodeCompanionReg,
859
- "primary_identity_pub"
860
- )
861
- );
862
- const primaryEphemeralPublicKeyWrapped = toRequiredBuffer(
863
- WABinary_1.getBinaryNodeChildBuffer(
864
- linkCodeCompanionReg,
865
- "link_code_pairing_wrapped_primary_ephemeral_pub"
866
- )
867
- );
868
- const codePairingPublicKey = await decipherLinkPublicKey(
869
- primaryEphemeralPublicKeyWrapped
870
- );
871
- const companionSharedKey = Utils_1.Curve.sharedKey(
872
- authState.creds.pairingEphemeralKeyPair.private,
873
- codePairingPublicKey
874
- );
875
- const random = crypto_1.randomBytes(32);
876
- const linkCodeSalt = crypto_1.randomBytes(32);
877
-
878
- const linkCodePairingExpanded = await Utils_1.hkdf(
879
- companionSharedKey,
880
- 32,
881
- {
882
- salt: linkCodeSalt,
883
- info: "link_code_pairing_key_bundle_encryption_key",
884
- }
885
- );
886
-
887
- const encryptPayload = Buffer.concat([
888
- Buffer.from(authState.creds.signedIdentityKey.public),
889
- primaryIdentityPublicKey,
890
- random,
891
- ]);
892
- const encryptIv = crypto_1.randomBytes(12);
893
- const encrypted = Utils_1.aesEncryptGCM(
894
- encryptPayload,
895
- linkCodePairingExpanded,
896
- encryptIv,
897
- Buffer.alloc(0)
898
- );
899
- const encryptedPayload = Buffer.concat([
900
- linkCodeSalt,
901
- encryptIv,
902
- encrypted,
903
- ]);
904
- const identitySharedKey = Utils_1.Curve.sharedKey(
905
- authState.creds.signedIdentityKey.private,
906
- primaryIdentityPublicKey
907
- );
908
- const identityPayload = Buffer.concat([
909
- companionSharedKey,
910
- identitySharedKey,
911
- random,
912
- ]);
913
-
914
- authState.creds.advSecretKey = (
915
- await Utils_1.hkdf(identityPayload, 32, { info: "adv_secret" })
916
- ).toString("base64");
917
-
918
- await query({
919
- tag: "iq",
920
- attrs: {
921
- to: WABinary_1.S_WHATSAPP_NET,
922
- type: "set",
923
- id: Neele.generateMessageTag(),
924
- xmlns: "md",
925
- },
926
- content: [
927
- {
928
- tag: "link_code_companion_reg",
929
- attrs: {
930
- jid: authState.creds.me.id,
931
- stage: "companion_finish",
932
- },
933
- content: [
934
- {
935
- tag: "link_code_pairing_wrapped_key_bundle",
936
- attrs: {},
937
- content: encryptedPayload,
938
- },
939
- {
940
- tag: "companion_identity_public",
941
- attrs: {},
942
- content: authState.creds.signedIdentityKey.public,
943
- },
944
- {
945
- tag: "link_code_pairing_ref",
946
- attrs: {},
947
- content: ref,
246
+ }
247
+
248
+ const deviceIdentity = Utils_1.encodeSignedDeviceIdentity(account, true)
249
+ await authState.keys.transaction(async () => {
250
+ const receipt = {
251
+ tag: 'receipt',
252
+ attrs: {
253
+ id: msgId,
254
+ type: 'retry',
255
+ to: node.attrs.from
948
256
  },
949
- ],
950
- },
951
- ],
952
- });
953
-
954
- authState.creds.registered = true;
955
- ev.emit("creds.update", authState.creds);
956
- }
957
-
958
- if (Object.keys(result).length) {
959
- return result;
960
- }
961
- };
962
-
963
- async function decipherLinkPublicKey(data) {
964
- const buffer = toRequiredBuffer(data);
965
- const salt = buffer.slice(0, 32);
966
- const secretKey = await Utils_1.derivePairingCodeKey(
967
- authState.creds.pairingCode,
968
- salt
969
- );
970
- const iv = buffer.slice(32, 48);
971
- const payload = buffer.slice(48, 80);
972
- return Utils_1.aesDecryptCTR(payload, secretKey, iv);
973
- }
974
-
975
- function toRequiredBuffer(data) {
976
- if (data === undefined) {
977
- throw new boom_1.Boom("Invalid buffer", { statusCode: 400 });
978
- }
979
- return data instanceof Buffer ? data : Buffer.from(data);
980
- }
981
-
982
- const willSendMessageAgain = (id, participant) => {
983
- const key = `${id}:${participant}`;
984
- const retryCount = msgRetryCache.get(key) || 0;
985
- return retryCount < maxMsgRetryCount;
986
- };
987
-
988
- const updateSendMessageAgainCount = (id, participant) => {
989
- const key = `${id}:${participant}`;
990
- const newValue = (msgRetryCache.get(key) || 0) + 1;
991
- msgRetryCache.set(key, newValue);
992
- };
993
-
994
- const sendMessagesAgain = async (key, ids, retryNode) => {
995
- const msgs = await Promise.all(ids.map((id) => getMessage({ ...key, id })));
996
- const remoteJid = key.remoteJid;
997
- const participant = key.participant || remoteJid;
998
-
999
- // if it's the primary jid sending the request
1000
- // just re-send the message to everyone
1001
- // prevents the first message decryption failure
1002
- const sendToAll = !WABinary_1.jidDecode(participant)?.device;
1003
- await assertSessions([participant], true);
1004
-
1005
- if (WABinary_1.isJidGroup(remoteJid)) {
1006
- await authState.keys.set({ "sender-key-memory": { [remoteJid]: null } });
257
+ content: [
258
+ {
259
+ tag: 'retry',
260
+ attrs: {
261
+ count: retryCount.toString(),
262
+ id: node.attrs.id,
263
+ t: node.attrs.t,
264
+ v: '1'
265
+ }
266
+ },
267
+ {
268
+ tag: 'registration',
269
+ attrs: {},
270
+ content: Utils_1.encodeBigEndian(authState.creds.registrationId)
271
+ }
272
+ ]
273
+ }
274
+
275
+ if (node.attrs.recipient) {
276
+ receipt.attrs.recipient = node.attrs.recipient
277
+ }
278
+
279
+ if (node.attrs.participant) {
280
+ receipt.attrs.participant = node.attrs.participant
281
+ }
282
+
283
+ if (retryCount > 1 || forceIncludeKeys || shouldRecreateSession) {
284
+ const { update, preKeys } = await Utils_1.getNextPreKeys(authState, 1)
285
+ const [keyId] = Object.keys(preKeys)
286
+ const key = preKeys[+keyId]
287
+ const content = receipt.content
288
+
289
+ content.push({
290
+ tag: 'keys',
291
+ attrs: {},
292
+ content: [
293
+ { tag: 'type', attrs: {}, content: Buffer.from(Defaults_1.KEY_BUNDLE_TYPE) },
294
+ { tag: 'identity', attrs: {}, content: identityKey.public },
295
+ Utils_1.xmppPreKey(key, +keyId),
296
+ Utils_1.xmppSignedPreKey(signedPreKey),
297
+ { tag: 'device-identity', attrs: {}, content: deviceIdentity }
298
+ ]
299
+ });
300
+ ev.emit('creds.update', update)
301
+ }
302
+ await sendNode(receipt)
303
+ logger.info({ msgAttrs: node.attrs, retryCount }, 'sent retry receipt')
304
+ }, authState?.creds?.me?.id || 'sendRetryRequest')
1007
305
  }
1008
-
1009
- logger.debug(
1010
- { participant, sendToAll },
1011
- "forced new session for retry recp"
1012
- );
1013
-
1014
- for (const [i, msg] of msgs.entries()) {
1015
- if (msg) {
1016
- updateSendMessageAgainCount(ids[i], participant);
1017
- const msgRelayOpts = { messageId: ids[i] };
1018
-
1019
- if (sendToAll) {
1020
- msgRelayOpts.useUserDevicesCache = false;
1021
- } else {
1022
- msgRelayOpts.participant = {
1023
- jid: participant,
1024
- count: +retryNode.attrs.count,
1025
- };
306
+
307
+ const handleEncryptNotification = async (node) => {
308
+ const from = node.attrs.from
309
+ if (from === WABinary_1.S_WHATSAPP_NET) {
310
+ const countChild = WABinary_1.getBinaryNodeChild(node, 'count')
311
+ const count = +countChild.attrs.value
312
+ const shouldUploadMorePreKeys = count < Defaults_1.MIN_PREKEY_COUNT
313
+ logger.debug({ count, shouldUploadMorePreKeys }, 'recv pre-key count')
314
+
315
+ if (shouldUploadMorePreKeys) {
316
+ await uploadPreKeys()
317
+ }
318
+ }
319
+
320
+ else {
321
+ const identityNode = WABinary_1.getBinaryNodeChild(node, 'identity')
322
+ if (identityNode) {
323
+ logger.info({ jid: from }, 'identity changed')
324
+ // not handling right now
325
+ // signal will override new identity anyway
326
+ }
327
+
328
+ else {
329
+ logger.info({ node }, 'unknown encrypt notification')
330
+ }
1026
331
  }
1027
-
1028
- await relayMessage(key.remoteJid, msg, msgRelayOpts);
1029
- } else {
1030
- logger.debug(
1031
- { jid: key.remoteJid, id: ids[i] },
1032
- "recv retry request, but message not available"
1033
- );
1034
- }
1035
- }
1036
- };
1037
-
1038
- const handleReceipt = async (node) => {
1039
- const { attrs, content } = node;
1040
- const isLid = attrs.from.includes("lid");
1041
- const isNodeFromMe = WABinary_1.areJidsSameUser(
1042
- attrs.participant || attrs.from,
1043
- isLid ? authState.creds.me?.lid : authState.creds.me?.id
1044
- );
1045
- const remoteJid =
1046
- !isNodeFromMe || WABinary_1.isJidGroup(attrs.from)
1047
- ? attrs.from
1048
- : attrs.recipient;
1049
- const fromMe =
1050
- !attrs.recipient ||
1051
- ((attrs.type === "retry" || attrs.type === "sender") && isNodeFromMe);
1052
-
1053
- const key = {
1054
- remoteJid,
1055
- id: "",
1056
- fromMe,
1057
- participant: attrs.participant,
1058
- };
1059
-
1060
- if (shouldIgnoreJid(remoteJid) && remoteJid !== "@s.whatsapp.net") {
1061
- logger.debug({ remoteJid }, "ignoring receipt from jid");
1062
- await sendMessageAck(node);
1063
- return;
1064
332
  }
1065
-
1066
- const ids = [attrs.id];
1067
- if (Array.isArray(content)) {
1068
- const items = WABinary_1.getBinaryNodeChildren(content[0], "item");
1069
- ids.push(...items.map((i) => i.attrs.id));
333
+
334
+ const handleGroupNotification = (participant, child, msg, mode) => {
335
+ let participantJid = mode === 'lid' ? WABinary_1.getBinaryNodeChild(child, 'participant')?.attrs?.phone_number : WABinary_1.getBinaryNodeChild(child, 'participant')?.attrs?.jid || participant
336
+
337
+ // TODO: Add participant LID
338
+ switch (child.tag) {
339
+ case 'create':
340
+ const metadata = groups_1.extractGroupMetadata(child)
341
+ msg.messageStubType = Types_1.WAMessageStubType.GROUP_CREATE
342
+ msg.messageStubParameters = [metadata.subject]
343
+ msg.key = { participant: metadata.owner }
344
+ ev.emit('chats.upsert', [{
345
+ id: metadata.id,
346
+ name: metadata.subject,
347
+ conversationTimestamp: metadata.creation,
348
+ }])
349
+ ev.emit('groups.upsert', [{
350
+ ...metadata,
351
+ author: participant
352
+ }])
353
+ break
354
+ case 'delete':
355
+ msg.messageStubType = Types_1.WAMessageStubType.COMMUNITY_PARENT_GROUP_DELETED
356
+ msg.messageStubParameters = [participantJid, 'delete']
357
+ break
358
+ case 'ephemeral':
359
+ case 'not_ephemeral':
360
+ msg.message = {
361
+ protocolMessage: {
362
+ type: WAProto_1.proto.Message.ProtocolMessage.Type.EPHEMERAL_SETTING,
363
+ ephemeralExpiration: +(child.attrs.expiration || 0)
364
+ }
365
+ }
366
+ break
367
+ case 'modify':
368
+ const oldNumber = mode === 'lid' ? WABinary_1.getBinaryNodeChildren(child, 'participant').map(p => p.attrs.phone_number) : WABinary_1.getBinaryNodeChildren(child, 'participant').map(p => p.attrs.jid)
369
+ msg.messageStubParameters = oldNumber || []
370
+ msg.messageStubType = Types_1.WAMessageStubType.GROUP_PARTICIPANT_CHANGE_NUMBER
371
+ break
372
+ case 'promote':
373
+ case 'demote':
374
+ case 'remove':
375
+ case 'add':
376
+ case 'leave':
377
+ let stubType = `GROUP_PARTICIPANT_${child.tag.toUpperCase()}`
378
+ if (child.attrs?.reason === 'linked_group_join') {
379
+ stubType = GROUP_PARTICIPANT_LINKED_GROUP_JOIN
380
+ }
381
+ msg.messageStubType = Types_1.WAMessageStubType[stubType]
382
+ const participants = mode === 'lid' ? WABinary_1.getBinaryNodeChildren(child, 'participant').map(p => p.attrs.phone_number) : WABinary_1.getBinaryNodeChildren(child, 'participant').map(p => p.attrs.jid)
383
+ if (participants.length === 1 &&
384
+ // if recv. "remove" message and sender removed themselves
385
+ // mark as left
386
+ WABinary_1.areJidsSameUser(participants[0], participant) &&
387
+ child.tag === 'remove') {
388
+ msg.messageStubType = Types_1.WAMessageStubType.GROUP_PARTICIPANT_LEAVE
389
+ }
390
+ msg.messageStubParameters = participants
391
+ break
392
+ case 'subject':
393
+ msg.messageStubType = Types_1.WAMessageStubType.GROUP_CHANGE_SUBJECT
394
+ msg.messageStubParameters = [participantJid, child.attrs.subject]
395
+ break
396
+ case 'description':
397
+ const description = WABinary_1.getBinaryNodeChild(child, 'body')?.content?.toString()
398
+ msg.messageStubType = Types_1.WAMessageStubType.GROUP_CHANGE_DESCRIPTION
399
+ msg.messageStubParameters = description ? [description] : undefined
400
+ break
401
+ case 'announcement':
402
+ case 'not_announcement':
403
+ msg.messageStubType = Types_1.WAMessageStubType.GROUP_CHANGE_ANNOUNCE
404
+ msg.messageStubParameters = [(child.tag === 'announcement') ? 'on' : 'off']
405
+ break
406
+ case 'locked':
407
+ case 'unlocked':
408
+ msg.messageStubType = Types_1.WAMessageStubType.GROUP_CHANGE_RESTRICT
409
+ msg.messageStubParameters = [(child.tag === 'locked') ? 'on' : 'off']
410
+ break
411
+ case 'invite':
412
+ msg.messageStubType = Types_1.WAMessageStubType.GROUP_CHANGE_INVITE_LINK
413
+ msg.messageStubParameters = [child.attrs.code]
414
+ break
415
+ case 'member_add_mode':
416
+ const addMode = child.content
417
+ if (addMode) {
418
+ msg.messageStubType = Types_1.WAMessageStubType.GROUP_MEMBER_ADD_MODE
419
+ msg.messageStubParameters = [addMode.toString()]
420
+ }
421
+ break
422
+ case 'membership_approval_mode':
423
+ const approvalMode = WABinary_1.getBinaryNodeChild(child, 'group_join')
424
+ if (approvalMode) {
425
+ msg.messageStubType = Types_1.WAMessageStubType.GROUP_MEMBERSHIP_JOIN_APPROVAL_MODE
426
+ msg.messageStubParameters = [approvalMode.attrs.state]
427
+ }
428
+ break
429
+ case 'created_membership_requests':
430
+ participantJid = mode === 'lid' ? WABinary_1.getBinaryNodeChild(child, 'requested_user')?.attrs?.phone_number : WABinary_1.getBinaryNodeChild(child, 'requested_user')?.attrs?.jid || participant
431
+
432
+ msg.messageStubType = Types_1.WAMessageStubType.GROUP_MEMBERSHIP_JOIN_APPROVAL_REQUEST_NON_ADMIN_ADD
433
+ msg.messageStubParameters = [participantJid, 'created', child.attrs.request_method]
434
+ break
435
+ case 'revoked_membership_requests':
436
+ participantJid = mode === 'lid' ? WABinary_1.getBinaryNodeChild(child, 'requested_user')?.attrs?.phone_number : WABinary_1.getBinaryNodeChild(child, 'requested_user')?.attrs?.jid || participant
437
+
438
+ const isDenied = WABinary_1.areJidsSameUser(participantJid, participant)
439
+ msg.messageStubType = Types_1.WAMessageStubType.GROUP_MEMBERSHIP_JOIN_APPROVAL_REQUEST_NON_ADMIN_ADD
440
+ msg.messageStubParameters = [participantJid, isDenied ? 'revoked' : 'rejected']
441
+ break
442
+ case 'link':
443
+ case 'unlink':
444
+ const type = child.attrs?.unlink_type || child.attrs?.link_type
445
+ const stubMap = {
446
+ parent_group: Types_1.WAMessageStubType[`COMMUNITY_${child.tag.toUpperCase()}_PARENT_GROUP`],
447
+ sibling_group: Types_1.WAMessageStubType[`COMMUNITY_${child.tag.toUpperCase()}_SIBLING_GROUP`],
448
+ sub_group: Types_1.WAMessageStubType[`COMMUNITY_${child.tag.toUpperCase()}_SUB_GROUP`]
449
+ }
450
+ const groups = WABinary_1.getBinaryNodeChildren(child, 'group')
451
+ .map(g => g.attrs?.jid || g.attrs?.subject || '')
452
+ .filter(x => x)
453
+ msg.messageStubType = stubMap?.[type] || Types_1.WAMessageStubType[`COMMUNITY_${child.tag.toUpperCase()}_PARENT_GROUP`]
454
+ msg.messageStubParameters = [participantJid, child.tag, groups]
455
+ break
456
+ case 'linked_group_promote':
457
+ case 'linked_group_demote':
458
+ const stubtype = `COMMUNITY_PARTICIPANT_${child.tag.split('_')[2].toUpperCase()}`
459
+ const participantS = mode === 'lid' ? WABinary_1.getBinaryNodeChildren(child, 'participant').map(p => p.attrs.phone_number) : WABinary_1.getBinaryNodeChildren(child, 'participant').map(p => p.attrs.jid)
460
+ msg.messageStubType = Types_1.WAMessageStubType[stubtype]
461
+ msg.messageStubParameters = participantS
462
+ break
463
+ case 'created_sub_group_suggestion':
464
+ msg.messageStubType = Types_1.WAMessageStubType.SUGGESTED_SUBGROUP_ANNOUNCE
465
+ msg.messageStubParameters = [participantJid, 'add']
466
+ break
467
+ case 'revoked_sub_group_suggestions':
468
+ const res = WABinary_1.getBinaryNodeChildren(child, 'sub_group_suggestions')
469
+ const reason = res.attrs?.reason
470
+ if (reason === 'approved') msg.messageStubType = Types_1.WAMessageStubType.GROUP_CREATE
471
+ else msg.messageStubType = Types_1.WAMessageStubType.GENERIC_NOTIFICATION
472
+ msg.messageStubParameters = [participantJid, reason]
473
+ break
474
+ default:
475
+ logger.warn(child.tag, 'Unhandled group node')
476
+ break
477
+ }
1070
478
  }
1071
-
1072
- try {
1073
- await Promise.all([
1074
- processingMutex.mutex(async () => {
1075
- const status = Utils_1.getStatusFromReceiptType(attrs.type);
1076
-
1077
- if (
1078
- typeof status !== "undefined" &&
1079
- // basically, we only want to know when a message from us has been delivered to/read by the other person
1080
- // or another device of ours has read some messages
1081
- (status >= WAProto_1.proto.WebMessageInfo.Status.SERVER_ACK ||
1082
- !isNodeFromMe)
1083
- ) {
1084
- if (
1085
- WABinary_1.isJidGroup(remoteJid) ||
1086
- WABinary_1.isJidStatusBroadcast(remoteJid)
1087
- ) {
1088
- if (attrs.participant) {
1089
- const updateKey =
1090
- status === WAProto_1.proto.WebMessageInfo.Status.DELIVERY_ACK
1091
- ? "receiptTimestamp"
1092
- : "readTimestamp";
1093
- ev.emit(
1094
- "message-receipt.update",
1095
- ids.map((id) => ({
1096
- key: { ...key, id },
1097
- receipt: {
1098
- userJid: WABinary_1.jidNormalizedUser(attrs.participant),
1099
- [updateKey]: +attrs.t,
1100
- },
1101
- }))
1102
- );
1103
- }
1104
- } else {
1105
- ev.emit(
1106
- "messages.update",
1107
- ids.map((id) => ({
1108
- key: { ...key, id },
1109
- update: { status },
1110
- }))
1111
- );
479
+
480
+ const handleNewsletterNotification = (id, node) => {
481
+ const messages = WABinary_1.getBinaryNodeChild(node, 'messages')
482
+ const message = WABinary_1.getBinaryNodeChild(node, 'message')
483
+ const serverId = node.attrs.server_id
484
+
485
+ const reactionsList = WABinary_1.getBinaryNodeChild(node, 'reactions')
486
+ const viewsList = WABinary_1.getBinaryNodeChild(node, 'views_count')
487
+
488
+ if (reactionsList) {
489
+ const reactions = WABinary_1.getBinaryNodeChild(reactionsList, 'reaction')
490
+
491
+ if (reactions.length === 0) {
492
+ ev.emit('newsletter.reaction', {
493
+ id,
494
+ newsletter_server_id: serverId,
495
+ reaction: {
496
+ removed: true
497
+ }
498
+ })
1112
499
  }
1113
- }
1114
500
 
1115
- if (attrs.type === "retry") {
1116
- // correctly set who is asking for the retry
1117
- key.participant = key.participant || attrs.from;
1118
- const retryNode = WABinary_1.getBinaryNodeChild(node, "retry");
501
+ reactions.forEach(item => {
502
+ ev.emit('newsletter.reaction', {
503
+ id,
504
+ newsletter_server_id: serverId,
505
+ reaction: {
506
+ code: item.attrs?.code,
507
+ count: +item.attrs.count
508
+ }
509
+ })
510
+ })
511
+ }
1119
512
 
1120
- if (willSendMessageAgain(ids[0], key.participant)) {
1121
- if (key.fromMe) {
1122
- try {
1123
- logger.debug({ attrs, key }, "recv retry request");
1124
- await sendMessagesAgain(key, ids, retryNode);
1125
- } catch (error) {
1126
- logger.error(
1127
- { key, ids, trace: error.stack },
1128
- "error in sending message again"
1129
- );
1130
- }
1131
- } else {
1132
- logger.info(
1133
- { attrs, key },
1134
- "recv retry for not fromMe message"
1135
- );
1136
- }
513
+ if (viewsList.length) {
514
+ viewsList.forEach(item => {
515
+ ev.emit('newsletter.view', {
516
+ id,
517
+ newsletter_server_id: serverId,
518
+ count: +item.attrs.count
519
+ })
520
+ })
521
+ }
522
+ }
523
+
524
+ const handleMexNotification = (id, node) => {
525
+ const operation = node?.attrs?.op_name
526
+ const content = JSON.parse(node?.content)
527
+
528
+ let contentPath
529
+ let action
530
+
531
+ if (operation === Types_1.MexOperations.UPDATE) {
532
+ contentPath = content.data[Types_1.XWAPaths.METADATA_UPDATE]
533
+
534
+ ev.emit('newsletter-settings.update', {
535
+ id,
536
+ update: contentPath.thread_metadata.settings
537
+ })
538
+ } else if (operation === Types_1.MexUpdatesOperations.GROUP_LIMIT_SHARING) {
539
+ contentPath = content.data[Types_1.XWAPathsMexUpdates.GROUP_SHARING_CHANGE]
540
+
541
+ ev.emit('limit-sharing.update', {
542
+ id,
543
+ author: contentPath.updated_by?.pn ? contentPath.updated_by.pn : contentPath.updated_by.id,
544
+ action: `${contentPath.properties.limit_sharing.limit_sharing_enabled ? 'on' : 'off'}`,
545
+ trigger: contentPath.properties.limit_sharing.limit_sharing_trigger,
546
+ update_time: contentPath.update_time
547
+ })
548
+ } else if (operation === Types_1.MexUpdatesOperations.OWNER_COMMUNITY) {
549
+ contentPath = content.data[Types_1.XWAPathsMexUpdates.COMMUNITY_OWNER_CHANGE]
550
+
551
+ ev.emit('community-owner.update', {
552
+ id,
553
+ author: contentPath.updated_by?.pn ? contentPath.updated_by.pn : contentPath.updated_by.id,
554
+ user: contentPath.role_updates[0].user?.pn ? contentPath.role_updates[0].user.pn : contentPath.role_updates[0].user.jid,
555
+ new_role: contentPath.role_updates[0].new_role,
556
+ update_time: contentPath.update_time
557
+ })
558
+ } else {
559
+
560
+ if (operation === Types_1.MexOperations.PROMOTE) {
561
+ action = 'promote'
562
+ contentPath = content.data[Types_1.XWAPaths.PROMOTE]
1137
563
  } else {
1138
- logger.info(
1139
- { attrs, key },
1140
- "will not send message again, as sent too many times"
1141
- );
564
+ action = 'demote'
565
+ contentPath = content.data[Types_1.XWAPaths.DEMOTE]
1142
566
  }
1143
- }
1144
- }),
1145
- ]);
1146
- } finally {
1147
- await sendMessageAck(node);
567
+
568
+ ev.emit('newsletter-participants.update', {
569
+ id,
570
+ author: contentPath.actor.pn,
571
+ user: contentPath.user.pn,
572
+ new_role: contentPath.user_new_role,
573
+ action
574
+ })
575
+ }
1148
576
  }
1149
- };
1150
-
1151
- const handleNotification = async (node) => {
1152
- const remoteJid = node.attrs.from;
1153
577
 
1154
- if (shouldIgnoreJid(remoteJid) && remoteJid !== "@s.whatsapp.net") {
1155
- logger.debug({ remoteJid, id: node.attrs.id }, "ignored notification");
1156
- await sendMessageAck(node);
1157
- return;
578
+ const processNotification = async (node) => {
579
+ const result = {}
580
+ const [child] = WABinary_1.getAllBinaryNodeChildren(node)
581
+ const nodeType = node.attrs.type
582
+ const from = WABinary_1.jidNormalizedUser(node.attrs.from)
583
+
584
+ switch (nodeType) {
585
+ case 'privacy_token':
586
+ const tokenList = WABinary_1.getBinaryNodeChildren(child, 'token')
587
+ for (const { attrs, content } of tokenList) {
588
+ const jid = attrs.jid
589
+ ev.emit('chats.update', [
590
+ {
591
+ id: jid,
592
+ tcToken: content
593
+ }
594
+ ])
595
+ logger.debug({ jid }, 'got privacy token update')
596
+ }
597
+ break
598
+ case 'w:gp2':
599
+ const mode = node.attrs.addressing_mode
600
+ handleGroupNotification(mode === 'lid' ? node.attrs.participant_pn : node.attrs.participant, child, result, mode)
601
+ break
602
+ case 'newsletter':
603
+ handleNewsletterNotification(node.attrs.from, child)
604
+ break
605
+ case 'mex':
606
+ handleMexNotification(node.attrs.from, child)
607
+ break
608
+ case 'mediaretry':
609
+ const event = Utils_1.decodeMediaRetryNode(node)
610
+ ev.emit('messages.media-update', [event])
611
+ break
612
+ case 'encrypt':
613
+ await handleEncryptNotification(node)
614
+ break
615
+ case 'devices':
616
+ const devices = WABinary_1.getBinaryNodeChildren(child, 'device')
617
+ if (WABinary_1.areJidsSameUser(child.attrs.jid, authState.creds.me.id) ||
618
+ WABinary_1.areJidsSameUser(child.attrs.lid, authState.creds.me.lid)) {
619
+ const deviceData = devices.map(d => ({ id: d.attrs.jid, lid: d.attrs.lid }))
620
+ logger.info({ deviceData }, 'my own devices changed')
621
+ }
622
+ //TODO: drop a new event, add hashes
623
+ break
624
+ case 'server_sync':
625
+ const update = WABinary_1.getBinaryNodeChild(node, 'collection')
626
+ if (update) {
627
+ const name = update.attrs.name
628
+ await resyncAppState([name], false)
629
+ }
630
+ break
631
+ case 'picture':
632
+ const setPicture = WABinary_1.getBinaryNodeChild(node, 'set')
633
+ const delPicture = WABinary_1.getBinaryNodeChild(node, 'delete')
634
+ ev.emit('contacts.update', [{
635
+ id: WABinary_1.jidNormalizedUser(node?.attrs?.from) || (setPicture || delPicture)?.attrs?.hash || '',
636
+ imgUrl: setPicture ? 'changed' : 'removed'
637
+ }])
638
+ if (WABinary_1.isJidGroup(from)) {
639
+ const node = setPicture || delPicture
640
+ result.messageStubType = Types_1.WAMessageStubType.GROUP_CHANGE_ICON
641
+ if (setPicture) {
642
+ result.messageStubParameters = [setPicture.attrs.id]
643
+ }
644
+ result.participant = node?.attrs?.author
645
+ result.key = {
646
+ ...result.key || {},
647
+ participant: setPicture?.attrs?.author
648
+ }
649
+ }
650
+ break
651
+ case 'account_sync':
652
+ if (child.tag === 'disappearing_mode') {
653
+ const newDuration = +child.attrs.duration
654
+ const timestamp = +child.attrs.t
655
+ logger.info({ newDuration }, 'updated account disappearing mode')
656
+ ev.emit('creds.update', {
657
+ accountSettings: {
658
+ ...authState.creds.accountSettings,
659
+ defaultDisappearingMode: {
660
+ ephemeralExpiration: newDuration,
661
+ ephemeralSettingTimestamp: timestamp,
662
+ },
663
+ }
664
+ })
665
+ }
666
+ else if (child.tag === 'blocklist') {
667
+ const blocklists = WABinary_1.getBinaryNodeChildren(child, 'item')
668
+ for (const { attrs } of blocklists) {
669
+ const blocklist = [attrs.jid]
670
+ const type = (attrs.action === 'block') ? 'add' : 'remove'
671
+ ev.emit('blocklist.update', { blocklist, type })
672
+ }
673
+ }
674
+ break
675
+ case 'link_code_companion_reg':
676
+ const linkCodeCompanionReg = WABinary_1.getBinaryNodeChild(node, 'link_code_companion_reg')
677
+ const ref = toRequiredBuffer(WABinary_1.getBinaryNodeChildBuffer(linkCodeCompanionReg, 'link_code_pairing_ref'))
678
+ const primaryIdentityPublicKey = toRequiredBuffer(WABinary_1.getBinaryNodeChildBuffer(linkCodeCompanionReg, 'primary_identity_pub'))
679
+ const primaryEphemeralPublicKeyWrapped = toRequiredBuffer(WABinary_1.getBinaryNodeChildBuffer(linkCodeCompanionReg, 'link_code_pairing_wrapped_primary_ephemeral_pub'))
680
+ const codePairingPublicKey = await decipherLinkPublicKey(primaryEphemeralPublicKeyWrapped)
681
+ const companionSharedKey = Utils_1.Curve.sharedKey(authState.creds.pairingEphemeralKeyPair.private, codePairingPublicKey)
682
+ const random = crypto_1.randomBytes(32)
683
+ const linkCodeSalt = crypto_1.randomBytes(32)
684
+
685
+ const linkCodePairingExpanded = await Utils_1.hkdf(companionSharedKey, 32, {
686
+ salt: linkCodeSalt,
687
+ info: 'link_code_pairing_key_bundle_encryption_key'
688
+ })
689
+
690
+ const encryptPayload = Buffer.concat([Buffer.from(authState.creds.signedIdentityKey.public), primaryIdentityPublicKey, random])
691
+ const encryptIv = crypto_1.randomBytes(12)
692
+ const encrypted = Utils_1.aesEncryptGCM(encryptPayload, linkCodePairingExpanded, encryptIv, Buffer.alloc(0))
693
+ const encryptedPayload = Buffer.concat([linkCodeSalt, encryptIv, encrypted])
694
+ const identitySharedKey = Utils_1.Curve.sharedKey(authState.creds.signedIdentityKey.private, primaryIdentityPublicKey)
695
+ const identityPayload = Buffer.concat([companionSharedKey, identitySharedKey, random])
696
+
697
+ authState.creds.advSecretKey = (await Utils_1.hkdf(identityPayload, 32, { info: 'adv_secret' })).toString('base64')
698
+
699
+ await query({
700
+ tag: 'iq',
701
+ attrs: {
702
+ to: WABinary_1.S_WHATSAPP_NET,
703
+ type: 'set',
704
+ id: baron.generateMessageTag(),
705
+ xmlns: 'md'
706
+ },
707
+ content: [
708
+ {
709
+ tag: 'link_code_companion_reg',
710
+ attrs: {
711
+ jid: authState.creds.me.id,
712
+ stage: 'companion_finish',
713
+ },
714
+ content: [
715
+ {
716
+ tag: 'link_code_pairing_wrapped_key_bundle',
717
+ attrs: {},
718
+ content: encryptedPayload
719
+ },
720
+ {
721
+ tag: 'companion_identity_public',
722
+ attrs: {},
723
+ content: authState.creds.signedIdentityKey.public
724
+ },
725
+ {
726
+ tag: 'link_code_pairing_ref',
727
+ attrs: {},
728
+ content: ref
729
+ }
730
+ ]
731
+ }
732
+ ]
733
+ })
734
+
735
+ authState.creds.registered = true
736
+ ev.emit('creds.update', authState.creds)
737
+ }
738
+
739
+ if (Object.keys(result).length) {
740
+ return result
741
+ }
1158
742
  }
1159
-
1160
- try {
1161
- await Promise.all([
1162
- processingMutex.mutex(async () => {
1163
- const msg = await processNotification(node);
1164
-
1165
- if (msg) {
1166
- const fromMe = WABinary_1.areJidsSameUser(
1167
- node.attrs.participant || remoteJid,
1168
- authState.creds.me.id
1169
- );
1170
- msg.key = {
1171
- remoteJid,
1172
- fromMe,
1173
- participant: node.attrs.participant,
1174
- id: node.attrs.id,
1175
- ...(msg.key || {}),
1176
- };
1177
- msg.participant = msg.participant
1178
- ? msg.participant
1179
- : node.attrs.participant;
1180
- msg.messageTimestamp = +node.attrs.t;
1181
- const fullMsg = WAProto_1.proto.WebMessageInfo.fromObject(msg);
1182
- await upsertMessage(fullMsg, "append");
1183
- }
1184
- }),
1185
- ]);
1186
- } finally {
1187
- await sendMessageAck(node);
743
+
744
+ async function decipherLinkPublicKey(data) {
745
+ const buffer = toRequiredBuffer(data)
746
+ const salt = buffer.slice(0, 32)
747
+ const secretKey = await Utils_1.derivePairingCodeKey(authState.creds.pairingCode, salt)
748
+ const iv = buffer.slice(32, 48)
749
+ const payload = buffer.slice(48, 80)
750
+ return Utils_1.aesDecryptCTR(payload, secretKey, iv)
1188
751
  }
1189
- };
1190
-
1191
- const handleMessage = async (node) => {
1192
- if (
1193
- shouldIgnoreJid(node.attrs.from) &&
1194
- node.attrs.from !== "@s.whatsapp.net"
1195
- ) {
1196
- logger.debug({ key: node.attrs.key }, "ignored message");
1197
- await sendMessageAck(node);
1198
- return;
752
+
753
+ function toRequiredBuffer(data) {
754
+ if (data === undefined) {
755
+ throw new boom_1.Boom('Invalid buffer', { statusCode: 400 })
756
+ }
757
+ return data instanceof Buffer ? data : Buffer.from(data)
1199
758
  }
1200
- const groupJid = node.attrs.from;
1201
- const communityJid = linkedParentMap[groupJid];
1202
- let response;
1203
-
1204
- if (
1205
- WABinary_1.getBinaryNodeChild(node, "unavailable") &&
1206
- !WABinary_1.getBinaryNodeChild(node, "enc")
1207
- ) {
1208
- await sendMessageAck(node);
1209
- const { key } = Utils_1.decodeMessageNode(
1210
- node,
1211
- authState.creds.me.id,
1212
- authState.creds.me.lid || ""
1213
- ).fullMessage;
1214
- response = await requestPlaceholderResend(key);
1215
-
1216
- if (response === "RESOLVED") {
1217
- return;
1218
- }
1219
-
1220
- logger.debug(
1221
- "received unavailable message, acked and requested resend from phone"
1222
- );
1223
- } else {
1224
- if (placeholderResendCache.get(node.attrs.id)) {
1225
- placeholderResendCache.del(node.attrs.id);
1226
- }
759
+
760
+ const willSendMessageAgain = async (id, participant) => {
761
+ const key = `${id}:${participant}`
762
+ const retryCount = (await msgRetryCache.get(key)) || 0
763
+ return retryCount < maxMsgRetryCount
1227
764
  }
1228
-
1229
- const {
1230
- fullMessage: msg,
1231
- category,
1232
- author,
1233
- decrypt,
1234
- } = Utils_1.decryptMessageNode(
1235
- node,
1236
- authState.creds.me.id,
1237
- authState.creds.me.lid || "",
1238
- signalRepository,
1239
- logger
1240
- );
1241
-
1242
- if (
1243
- response &&
1244
- msg?.messageStubParameters?.[0] === Utils_1.NO_MESSAGE_FOUND_ERROR_TEXT
1245
- ) {
1246
- msg.messageStubParameters = [
1247
- Utils_1.NO_MESSAGE_FOUND_ERROR_TEXT,
1248
- response,
1249
- ];
765
+
766
+ const updateSendMessageAgainCount = async (id, participant) => {
767
+ const key = `${id}:${participant}`
768
+ const newValue = ((await msgRetryCache.get(key)) || 0) + 1
769
+ await msgRetryCache.set(key, newValue)
1250
770
  }
1251
-
1252
- if (
1253
- msg.message?.protocolMessage?.type ===
1254
- WAProto_1.proto.Message.ProtocolMessage.Type.SHARE_PHONE_NUMBER &&
1255
- node.attrs.sender_pn
1256
- ) {
1257
- ev.emit("chats.phoneNumberShare", {
1258
- lid: node.attrs.from,
1259
- jid: node.attrs.sender_pn,
1260
- });
1261
- }
1262
-
1263
- try {
1264
- await Promise.all([
1265
- processingMutex.mutex(async () => {
1266
- await decrypt();
1267
- // message failed to decrypt
1268
- if (
1269
- msg.messageStubType ===
1270
- WAProto_1.proto.WebMessageInfo.StubType.CIPHERTEXT
1271
- ) {
1272
- if (
1273
- msg?.messageStubParameters?.[0] ===
1274
- Utils_1.MISSING_KEYS_ERROR_TEXT
1275
- ) {
1276
- return sendMessageAck(node, Utils_1.NACK_REASONS.ParsingError);
1277
- }
1278
-
1279
- retryMutex.mutex(async () => {
1280
- if (ws.isOpen) {
1281
- if (WABinary_1.getBinaryNodeChild(node, "unavailable")) {
1282
- return;
771
+
772
+ const sendMessagesAgain = async (key, ids, retryNode) => {
773
+ const remoteJid = key.remoteJid
774
+ const participant = key.participant || remoteJid
775
+ const retryCount = +retryNode.attrs.count || 1
776
+
777
+ // Try to get messages from cache first, then fallback to getMessage
778
+ const msgs = []
779
+
780
+ for (const id of ids) {
781
+ let msg
782
+
783
+ // Try to get from retry cache first if enabled
784
+ if (messageRetryManager) {
785
+ const cachedMsg = messageRetryManager.getRecentMessage(remoteJid, id)
786
+ if (cachedMsg) {
787
+ msg = cachedMsg.message
788
+ logger.debug({ jid: remoteJid, id }, 'found message in retry cache')
789
+
790
+ // Mark retry as successful since we found the message
791
+ messageRetryManager.markRetrySuccess(id)
1283
792
  }
1284
-
1285
- const encNode = WABinary_1.getBinaryNodeChild(node, "enc");
1286
- await sendRetryRequest(node, !encNode);
1287
-
1288
- if (retryRequestDelayMs) {
1289
- await Utils_1.delay(retryRequestDelayMs);
793
+ }
794
+
795
+ // Fallback to getMessage if not found in cache
796
+ if (!msg) {
797
+ msg = await getMessage({ ...key, id })
798
+ if (msg) {
799
+ logger.debug({ jid: remoteJid, id }, 'found message via getMessage')
800
+
801
+ // Also mark as successful if found via getMessage
802
+ if (messageRetryManager) {
803
+ messageRetryManager.markRetrySuccess(id);
804
+ }
1290
805
  }
1291
- } else {
1292
- logger.debug({ node }, "connection closed, ignoring retry req");
1293
- }
1294
- });
1295
- } else {
1296
- // no type in the receipt => message delivered
1297
- let type = undefined;
1298
- if (communityJid) {
1299
- msg.communityJid = communityJid;
1300
806
  }
1301
- const content = Utils_1.normalizeMessageContent(msg.message);
1302
- const type_2 = Utils_1.getContentType(content);
1303
- const message = msg.message[type_2];
1304
-
1305
- if (node?.attrs?.addressing_mode === "lid") {
1306
- const metadata = await groupMetadata(node.attrs.from);
1307
- let found = metadata.participants.find(
1308
- (p) => p.lid === node.attrs.participant
1309
- );
1310
-
1311
- msg.key.participant = found.id;
1312
-
1313
- if (message?.contextInfo?.participant) {
1314
- found = metadata.participants.find(
1315
- (p) => p.lid === msg.message[type_2].contextInfo.participant
1316
- );
1317
- msg.message[type_2].contextInfo.participant = found.id;
1318
- }
1319
-
1320
- if (message?.contextInfo?.mentionedJid?.length > 0) {
1321
- let mentions = [];
1322
- for (const id of message.contextInfo.mentionedJid) {
1323
- found = metadata.participants.find((p) => p.lid === id);
1324
- mentions.push(found.id);
807
+ msgs.push(msg)
808
+ }
809
+
810
+ // if it's the primary jid sending the request
811
+ // just re-send the message to everyone
812
+ // prevents the first message decryption failure
813
+ const sendToAll = !WABinary_1.jidDecode(participant)?.device
814
+
815
+ // Check if we should recreate session for this retry
816
+ let shouldRecreateSession = false
817
+ let recreateReason = ''
818
+
819
+ if (enableAutoSessionRecreation && messageRetryManager) {
820
+ try {
821
+ const sessionId = signalRepository.jidToSignalProtocolAddress(participant)
822
+ const hasSession = await signalRepository.validateSession(participant)
823
+ const result = messageRetryManager.shouldRecreateSession(participant, retryCount, hasSession.exists)
824
+
825
+ shouldRecreateSession = result.recreate
826
+ recreateReason = result.reason
827
+
828
+ if (shouldRecreateSession) {
829
+ logger.info({ participant, retryCount, reason: recreateReason }, 'recreating session for outgoing retry')
830
+ await authState.keys.set({ session: { [sessionId]: null } });
1325
831
  }
1326
- msg.message[type_2].contextInfo.mentionedJid = mentions;
1327
- }
1328
832
  }
1329
-
1330
- if (
1331
- !WABinary_1.isJidGroup(node.attrs.from) &&
1332
- WABinary_1.isLidUser(
1333
- WABinary_1.jidNormalizedUser(node.attrs.from)
1334
- )
1335
- ) {
1336
- const senderPn = WABinary_1.jidNormalizedUser(
1337
- node.attrs.peer_recipient_pn || node.attrs.sender_pn
1338
- );
1339
- msg.key.remoteJid = senderPn;
1340
-
1341
- if (message?.contextInfo?.participant) {
1342
- const isMe =
1343
- msg.message[type_2].contextInfo.participant ===
1344
- WABinary_1.jidNormalizedUser(authState.creds.me.lid);
1345
- msg.message[type_2].contextInfo.participant = isMe
1346
- ? WABinary_1.jidNormalizedUser(authState.creds.me.id)
1347
- : senderPn;
1348
- }
1349
-
1350
- if (message?.contextInfo?.mentionedJid?.length > 0) {
1351
- msg.message[type_2].contextInfo.mentionedJid = [senderPn];
1352
- }
833
+ catch (error) {
834
+ logger.warn({ error, participant }, 'failed to check session recreation for outgoing retry')
1353
835
  }
1354
-
1355
- let participant = msg.key.participant;
1356
-
1357
- if (category === "peer") {
1358
- // special peer message
1359
- type = "peer_msg";
1360
- } else if (msg.key.fromMe) {
1361
- // message was sent by us from a different device
1362
- type = "sender";
1363
- // need to specially handle this case
1364
- if (WABinary_1.isJidUser(msg.key.remoteJid)) {
1365
- participant = author;
1366
- }
1367
- } else if (!sendActiveReceipts) {
1368
- type = "inactive";
836
+ }
837
+
838
+ await assertSessions([participant], shouldRecreateSession)
839
+
840
+ if (WABinary_1.isJidGroup(remoteJid)) {
841
+ await authState.keys.set({ 'sender-key-memory': { [remoteJid]: null } });
842
+ }
843
+ logger.debug({ participant, sendToAll, shouldRecreateSession, recreateReason }, 'forced new session for retry recp')
844
+
845
+ for (const [i, msg] of msgs.entries()) {
846
+ if (!ids[i])
847
+ continue
848
+
849
+ if (msg && (await willSendMessageAgain(ids[i], participant))) {
850
+ updateSendMessageAgainCount(ids[i], participant)
851
+ const msgRelayOpts = { messageId: ids[i] }
852
+
853
+ if (sendToAll) {
854
+ msgRelayOpts.useUserDevicesCache = false
855
+ }
856
+ else {
857
+ msgRelayOpts.participant = {
858
+ jid: participant,
859
+ count: +retryNode.attrs.count
860
+ }
861
+ }
862
+ await relayMessage(key.remoteJid, msg, msgRelayOpts)
1369
863
  }
1370
-
1371
- await sendReceipt(
1372
- msg.key.remoteJid,
1373
- participant,
1374
- [msg.key.id],
1375
- type
1376
- );
1377
- // send ack for history message
1378
- const isAnyHistoryMsg = Utils_1.getHistoryMsg(msg.message);
1379
-
1380
- if (isAnyHistoryMsg) {
1381
- const jid = WABinary_1.jidNormalizedUser(msg.key.remoteJid);
1382
- await sendReceipt(jid, undefined, [msg.key.id], "hist_sync");
864
+ else {
865
+ logger.debug({ jid: key.remoteJid, id: ids[i] }, 'recv retry request, but message not available')
1383
866
  }
1384
- }
1385
-
1386
- // if (node?.attrs?.addressing_mode === 'lid' && node?.attrs?.participant_pn) {
1387
- // msg.key.participant = WABinary_1.jidNormalizedUser(node.attrs.participant_pn)
1388
- // }
1389
-
1390
- Utils_1.cleanMessage(msg, authState.creds.me.id);
1391
- await sendMessageAck(node);
1392
- await upsertMessage(msg, node.attrs.offline ? "append" : "notify");
1393
- }),
1394
- ]);
1395
- } catch (error) {
1396
- logger.error({ error, node }, "error in handling message");
1397
- }
1398
- };
1399
-
1400
- const fetchMessageHistory = async (
1401
- count,
1402
- oldestMsgKey,
1403
- oldestMsgTimestamp
1404
- ) => {
1405
- if (!authState.creds.me?.id) {
1406
- throw new boom_1.Boom("Not authenticated");
1407
- }
1408
-
1409
- const pdoMessage = {
1410
- historySyncOnDemandRequest: {
1411
- chatJid: oldestMsgKey.remoteJid,
1412
- oldestMsgFromMe: oldestMsgKey.fromMe,
1413
- oldestMsgId: oldestMsgKey.id,
1414
- oldestMsgTimestampMs: oldestMsgTimestamp,
1415
- onDemandMsgCount: count,
1416
- },
1417
- peerDataOperationRequestType:
1418
- WAProto_1.proto.Message.PeerDataOperationRequestType
1419
- .HISTORY_SYNC_ON_DEMAND,
1420
- };
1421
-
1422
- return sendPeerDataOperationMessage(pdoMessage);
1423
- };
1424
-
1425
- const requestPlaceholderResend = async (messageKey) => {
1426
- if (!authState.creds.me?.id) {
1427
- throw new boom_1.Boom("Not authenticated");
867
+ }
1428
868
  }
1429
-
1430
- if (placeholderResendCache.get(messageKey?.id)) {
1431
- logger.debug({ messageKey }, "already requested resend");
1432
- return;
1433
- } else {
1434
- placeholderResendCache.set(messageKey?.id, true);
869
+
870
+ const handleReceipt = async (node) => {
871
+ const { attrs, content } = node
872
+ const isLid = attrs.from.includes('lid')
873
+ const isNodeFromMe = WABinary_1.areJidsSameUser(attrs.participant || attrs.from, isLid ? authState.creds.me?.lid : authState.creds.me?.id)
874
+ const remoteJid = !isNodeFromMe || WABinary_1.isJidGroup(attrs.from) ? attrs.from : attrs.recipient
875
+ const fromMe = !attrs.recipient || ((attrs.type === 'retry' || attrs.type === 'sender') && isNodeFromMe)
876
+
877
+ const key = {
878
+ remoteJid,
879
+ id: '',
880
+ fromMe,
881
+ participant: attrs.participant
882
+ }
883
+
884
+ if (shouldIgnoreJid(remoteJid) && remoteJid !== '@s.whatsapp.net') {
885
+ logger.debug({ remoteJid }, 'ignoring receipt from jid')
886
+ await sendMessageAck(node)
887
+ return
888
+ }
889
+
890
+ const ids = [attrs.id]
891
+ if (Array.isArray(content)) {
892
+ const items = WABinary_1.getBinaryNodeChildren(content[0], 'item')
893
+ ids.push(...items.map(i => i.attrs.id))
894
+ }
895
+
896
+ try {
897
+ await Promise.all([
898
+ processingMutex.mutex(async () => {
899
+ const status = Utils_1.getStatusFromReceiptType(attrs.type)
900
+
901
+ if (typeof status !== 'undefined' && (
902
+ // basically, we only want to know when a message from us has been delivered to/read by the other person
903
+ // or another device of ours has read some messages
904
+ status >= WAProto_1.proto.WebMessageInfo.Status.SERVER_ACK ||
905
+ !isNodeFromMe)) {
906
+ if (WABinary_1.isJidGroup(remoteJid) || WABinary_1.isJidStatusBroadcast(remoteJid)) {
907
+ if (attrs.participant) {
908
+ const updateKey = status === WAProto_1.proto.WebMessageInfo.Status.DELIVERY_ACK ? 'receiptTimestamp' : 'readTimestamp'
909
+ ev.emit('message-receipt.update', ids.map(id => ({
910
+ key: { ...key, id },
911
+ receipt: {
912
+ userJid: WABinary_1.jidNormalizedUser(attrs.participant),
913
+ [updateKey]: +attrs.t
914
+ }
915
+ })))
916
+ }
917
+ }
918
+
919
+ else {
920
+ ev.emit('messages.update', ids.map(id => ({
921
+ key: { ...key, id },
922
+ update: { status }
923
+ })))
924
+ }
925
+ }
926
+
927
+ if (attrs.type === 'retry') {
928
+ // correctly set who is asking for the retry
929
+ key.participant = key.participant || attrs.from
930
+ const retryNode = WABinary_1.getBinaryNodeChild(node, 'retry')
931
+
932
+ if (ids[0] && key.participant && (await willSendMessageAgain(ids[0], key.participant))) {
933
+ if (key.fromMe) {
934
+ try {
935
+ updateSendMessageAgainCount(ids[0], key.participant)
936
+ logger.debug({ attrs, key }, 'recv retry request')
937
+ await sendMessagesAgain(key, ids, retryNode)
938
+ }
939
+
940
+ catch (error) {
941
+ logger.error({ key, ids, trace: error instanceof Error ? error.stack : 'Unknown error' }, 'error in sending message again')
942
+ }
943
+ }
944
+
945
+ else {
946
+ logger.info({ attrs, key }, 'recv retry for not fromMe message')
947
+ }
948
+ }
949
+
950
+ else {
951
+ logger.info({ attrs, key }, 'will not send message again, as sent too many times')
952
+ }
953
+ }
954
+ })
955
+ ])
956
+ }
957
+ finally {
958
+ await sendMessageAck(node)
959
+ }
1435
960
  }
1436
-
1437
- await Utils_1.delay(5000);
1438
-
1439
- if (!placeholderResendCache.get(messageKey?.id)) {
1440
- logger.debug({ messageKey }, "message received while resend requested");
1441
- return "RESOLVED";
961
+
962
+ const handleNotification = async (node) => {
963
+ const remoteJid = node.attrs.from
964
+
965
+ if (shouldIgnoreJid(remoteJid) && remoteJid !== '@s.whatsapp.net') {
966
+ logger.debug({ remoteJid, id: node.attrs.id }, 'ignored notification')
967
+ await sendMessageAck(node)
968
+ return
969
+ }
970
+
971
+ try {
972
+ await Promise.all([
973
+ processingMutex.mutex(async () => {
974
+ const msg = await processNotification(node)
975
+
976
+ if (msg) {
977
+ const fromMe = WABinary_1.areJidsSameUser(node.attrs.participant || remoteJid, authState.creds.me.id)
978
+ msg.key = {
979
+ remoteJid,
980
+ fromMe,
981
+ participant: node.attrs.participant,
982
+ id: node.attrs.id,
983
+ ...(msg.key || {})
984
+ }
985
+ msg.participant = msg.participant ? msg.participant : node.attrs.participant
986
+ msg.messageTimestamp = +node.attrs.t
987
+ const fullMsg = WAProto_1.proto.WebMessageInfo.fromObject(msg)
988
+ await upsertMessage(fullMsg, 'append')
989
+ }
990
+ })
991
+ ])
992
+ }
993
+ finally {
994
+ await sendMessageAck(node)
995
+ }
1442
996
  }
1443
-
1444
- const pdoMessage = {
1445
- placeholderMessageResendRequest: [
1446
- {
1447
- messageKey,
1448
- },
1449
- ],
1450
- peerDataOperationRequestType:
1451
- WAProto_1.proto.Message.PeerDataOperationRequestType
1452
- .PLACEHOLDER_MESSAGE_RESEND,
1453
- };
1454
-
1455
- setTimeout(() => {
1456
- if (placeholderResendCache.get(messageKey?.id)) {
1457
- logger.debug(
1458
- { messageKey },
1459
- "PDO message without response after 15 seconds. Phone possibly offline"
1460
- );
1461
- placeholderResendCache.del(messageKey?.id);
1462
- }
1463
- }, 15000);
1464
-
1465
- return sendPeerDataOperationMessage(pdoMessage);
1466
- };
1467
-
1468
- const handleCall = async (node) => {
1469
- let status;
1470
-
1471
- const { attrs } = node;
1472
- const [infoChild] = WABinary_1.getAllBinaryNodeChildren(node);
1473
- const callId = infoChild.attrs["call-id"];
1474
- const from = infoChild.attrs.from || infoChild.attrs["call-creator"];
1475
- status = Utils_1.getCallStatusFromNode(infoChild);
1476
-
1477
- if (WABinary_1.isLidUser(from) && infoChild.tag === "relaylatency") {
1478
- const verify = callOfferCache.get(callId);
1479
-
1480
- if (!verify) {
1481
- status = "offer";
1482
-
1483
- const callLid = {
1484
- chatId: attrs.from,
1485
- from,
1486
- id: callId,
1487
- date: new Date(+attrs.t * 1000),
1488
- offline: !!attrs.offline,
1489
- status,
1490
- };
1491
- callOfferCache.set(callId, callLid);
1492
- }
997
+
998
+ const handleMessage = async (node) => {
999
+ if (shouldIgnoreJid(node.attrs.from) && node.attrs.from !== '@s.whatsapp.net') {
1000
+ logger.debug({ key: node.attrs.key }, 'ignored message')
1001
+ await sendMessageAck(node)
1002
+ return
1003
+ }
1004
+
1005
+ let response
1006
+ const groupJid = node.attrs.from;
1007
+ const communityJid = linkedParentMap[groupJid];
1008
+ const encNode = WABinary_1.getBinaryNodeChild(node, 'enc')
1009
+
1010
+ // TODO: temporary fix for crashes and issues resulting of failed msmsg decryption
1011
+ if (encNode && encNode.attrs.type === 'msmsg') {
1012
+ logger.debug({ key: node.attrs.key }, 'ignored msmsg')
1013
+ await sendMessageAck(node, Utils_1.NACK_REASONS.MissingMessageSecret)
1014
+ return
1015
+ }
1016
+
1017
+ if (WABinary_1.getBinaryNodeChild(node, 'unavailable') && !encNode) {
1018
+ await sendMessageAck(node)
1019
+ const { key } = Utils_1.decodeMessageNode(node, authState.creds.me.id, authState.creds.me.lid || '').fullMessage
1020
+ response = await requestPlaceholderResend(key);
1021
+ if (response === 'RESOLVED') {
1022
+ return
1023
+ }
1024
+ logger.debug('received unavailable message, acked and requested resend from phone');
1025
+ }
1026
+ else {
1027
+ if (placeholderResendCache.get(node.attrs.id)) {
1028
+ await placeholderResendCache.del(node.attrs.id)
1029
+ }
1030
+ }
1031
+
1032
+ const { fullMessage: msg, category, author, decrypt } = Utils_1.decryptMessageNode(node, authState.creds.me.id, authState.creds.me.lid || '', signalRepository, logger)
1033
+
1034
+ if (response && msg?.messageStubParameters?.[0] === Utils_1.NO_MESSAGE_FOUND_ERROR_TEXT) {
1035
+ msg.messageStubParameters = [Utils_1.NO_MESSAGE_FOUND_ERROR_TEXT, response]
1036
+ }
1037
+
1038
+ if (msg.message?.protocolMessage?.type === WAProto_1.proto.Message.ProtocolMessage.Type.SHARE_PHONE_NUMBER &&
1039
+ node.attrs.sender_pn) {
1040
+ const lid = WABinary_1.jidNormalizedUser(node.attrs.from), pn = WABinary_1.jidNormalizedUser(node.attrs.sender_pn)
1041
+ ev.emit('lid-mapping.update', { lid, pn })
1042
+ await signalRepository.lidMapping.storeLIDPNMappings([{ lid, pn }])
1043
+ }
1044
+
1045
+ const alt = msg.key.participantAlt || msg.key.remoteJidAlt
1046
+
1047
+ // store new mappings we didn't have before
1048
+ if (!!alt) {
1049
+ const altServer = WABinary_1.jidDecode(alt)?.server
1050
+
1051
+ if (altServer === 'lid') {
1052
+ if (typeof (await signalRepository.lidMapping.getPNForLID(alt)) === 'string') {
1053
+ await signalRepository.lidMapping.storeLIDPNMappings([
1054
+ { lid: alt, pn: msg.key.participant || msg.key.remoteJid }
1055
+ ])
1056
+ }
1057
+ }
1058
+ else {
1059
+ if (typeof (await signalRepository.lidMapping.getLIDForPN(alt)) === 'string') {
1060
+ await signalRepository.lidMapping.storeLIDPNMappings([
1061
+ { lid: msg.key.participant || msg.key.remoteJid, pn: alt }
1062
+ ])
1063
+ }
1064
+ }
1065
+ }
1066
+
1067
+ if (msg.key?.remoteJid && msg.key?.id && messageRetryManager) {
1068
+ messageRetryManager.addRecentMessage(msg.key.remoteJid, msg.key.id, msg.message)
1069
+ logger.debug({
1070
+ jid: msg.key.remoteJid,
1071
+ id: msg.key.id
1072
+ }, 'Added message to recent cache for retry receipts')
1073
+ }
1074
+
1075
+ try {
1076
+ await Promise.all([
1077
+ processingMutex.mutex(async () => {
1078
+ await decrypt()
1079
+ // message failed to decrypt
1080
+ if (msg.messageStubType === WAProto_1.proto.WebMessageInfo.StubType.CIPHERTEXT) {
1081
+ if (msg?.messageStubParameters?.[0] === Utils_1.MISSING_KEYS_ERROR_TEXT) {
1082
+ return sendMessageAck(node, Utils_1.NACK_REASONS.ParsingError)
1083
+ }
1084
+
1085
+ const errorMessage = msg?.messageStubParameters?.[0] || ''
1086
+ const isPreKeyError = errorMessage.includes('PreKey')
1087
+ logger.debug(`[handleMessage] Attempting retry request for failed decryption`)
1088
+
1089
+ // Handle both pre-key and normal retries in single mutex
1090
+ retryMutex.mutex(async () => {
1091
+ try {
1092
+ if (!ws.isOpen) {
1093
+ logger.debug({ node }, 'Connection closed, skipping retry')
1094
+ return
1095
+ }
1096
+
1097
+ if (WABinary_1.getBinaryNodeChild(node, 'unavailable')) {
1098
+ logger.debug('Message unavailable, skipping retry')
1099
+ return
1100
+ }
1101
+
1102
+ // Handle pre-key errors with upload and delay
1103
+ if (isPreKeyError) {
1104
+ logger.info({ error: errorMessage }, 'PreKey error detected, uploading and retrying')
1105
+ try {
1106
+ logger.debug('Uploading pre-keys for error recovery')
1107
+ await uploadPreKeys(5)
1108
+ logger.debug('Waiting for server to process new pre-keys')
1109
+ await Utils_1.delay(1000)
1110
+ }
1111
+ catch (uploadErr) {
1112
+ logger.error({ uploadErr }, 'Pre-key upload failed, proceeding with retry anyway')
1113
+ }
1114
+ }
1115
+
1116
+ const encNode = WABinary_1.getBinaryNodeChild(node, 'enc')
1117
+ await sendRetryRequest(node, !encNode)
1118
+ if (retryRequestDelayMs) {
1119
+ await Utils_1.delay(retryRequestDelayMs)
1120
+ }
1121
+ }
1122
+ catch (err) {
1123
+ logger.error({ err, isPreKeyError }, 'Failed to handle retry, attempting basic retry')
1124
+ // Still attempt retry even if pre-key upload failed
1125
+ try {
1126
+ const encNode = WABinary_1.getBinaryNodeChild(node, 'enc')
1127
+ await sendRetryRequest(node, !encNode)
1128
+ }
1129
+ catch (retryErr) {
1130
+ logger.error({ retryErr }, 'Failed to send retry after error handling')
1131
+ }
1132
+ }
1133
+ })
1134
+ }
1135
+
1136
+ else {
1137
+ // no type in the receipt => message delivered
1138
+ let type = undefined
1139
+
1140
+ let participant = msg.key.participant
1141
+ if (communityJid) {
1142
+ msg.communityJid = communityJid;
1143
+ }
1144
+ if (category === 'peer') {
1145
+ // special peer message
1146
+ type = 'peer_msg'
1147
+ }
1148
+
1149
+ else if (msg.key.fromMe) {
1150
+ // message was sent by us from a different device
1151
+ type = 'sender'
1152
+
1153
+ // need to specially handle this case
1154
+ if (WABinary_1.isLidUser(msg.key.remoteJid) || WABinary_1.isLidUser(msg.key.remoteJidAlt)) {
1155
+ participant = author // TODO: investigate sending receipts to LIDs and not PNs
1156
+ }
1157
+ }
1158
+
1159
+ else if (!sendActiveReceipts) {
1160
+ type = 'inactive'
1161
+ }
1162
+ await sendReceipt(msg.key.remoteJid, participant, [msg.key.id], type)
1163
+
1164
+ // send ack for history message
1165
+ const isAnyHistoryMsg = Utils_1.getHistoryMsg(msg.message)
1166
+ if (isAnyHistoryMsg) {
1167
+ const jid = WABinary_1.jidNormalizedUser(msg.key.remoteJid)
1168
+ await sendReceipt(jid, undefined, [msg.key.id], 'hist_sync')
1169
+ }
1170
+ }
1171
+ Utils_1.cleanMessage(msg, authState.creds.me.id)
1172
+ await sendMessageAck(node)
1173
+ await upsertMessage(msg, node.attrs.offline ? 'append' : 'notify')
1174
+ })
1175
+ ])
1176
+ }
1177
+
1178
+ catch (error) {
1179
+ logger.error({ error, node }, 'error in handling message')
1180
+ }
1493
1181
  }
1494
-
1495
- const call = {
1496
- chatId: attrs.from,
1497
- from,
1498
- id: callId,
1499
- date: new Date(+attrs.t * 1000),
1500
- offline: !!attrs.offline,
1501
- status,
1502
- };
1503
-
1504
- if (status === "offer") {
1505
- call.isVideo = !!WABinary_1.getBinaryNodeChild(infoChild, "video");
1506
- call.isGroup =
1507
- infoChild.attrs.type === "group" || !!infoChild.attrs["group-jid"];
1508
- call.groupJid = infoChild.attrs["group-jid"];
1509
- callOfferCache.set(call.id, call);
1182
+
1183
+ const fetchMessageHistory = async (count, oldestMsgKey, oldestMsgTimestamp) => {
1184
+ if (!authState.creds.me?.id) {
1185
+ throw new boom_1.Boom('Not authenticated')
1186
+ }
1187
+
1188
+ const pdoMessage = {
1189
+ historySyncOnDemandRequest: {
1190
+ chatJid: oldestMsgKey.remoteJid,
1191
+ oldestMsgFromMe: oldestMsgKey.fromMe,
1192
+ oldestMsgId: oldestMsgKey.id,
1193
+ oldestMsgTimestampMs: oldestMsgTimestamp,
1194
+ onDemandMsgCount: count
1195
+ },
1196
+ peerDataOperationRequestType: WAProto_1.proto.Message.PeerDataOperationRequestType.HISTORY_SYNC_ON_DEMAND
1197
+ }
1198
+
1199
+ return sendPeerDataOperationMessage(pdoMessage)
1510
1200
  }
1511
-
1512
- const existingCall = callOfferCache.get(call.id);
1513
-
1514
- // use existing call info to populate this event
1515
- if (existingCall) {
1516
- call.isVideo = existingCall.isVideo;
1517
- call.isGroup = existingCall.isGroup;
1201
+
1202
+ const requestPlaceholderResend = async (messageKey) => {
1203
+ if (!authState.creds.me?.id) {
1204
+ throw new boom_1.Boom('Not authenticated')
1205
+ }
1206
+
1207
+ if (placeholderResendCache.get(messageKey?.id)) {
1208
+ logger.debug({ messageKey }, 'already requested resend')
1209
+ return
1210
+ }
1211
+
1212
+ else {
1213
+ placeholderResendCache.set(messageKey?.id, true)
1214
+ }
1215
+
1216
+ await Utils_1.delay(5000)
1217
+
1218
+ if (!placeholderResendCache.get(messageKey?.id)) {
1219
+ logger.debug({ messageKey }, 'message received while resend requested')
1220
+ return 'RESOLVED'
1221
+ }
1222
+
1223
+ const pdoMessage = {
1224
+ placeholderMessageResendRequest: [{
1225
+ messageKey
1226
+ }],
1227
+ peerDataOperationRequestType: WAProto_1.proto.Message.PeerDataOperationRequestType.PLACEHOLDER_MESSAGE_RESEND
1228
+ }
1229
+
1230
+ setTimeout(() => {
1231
+ if (placeholderResendCache.get(messageKey?.id)) {
1232
+ logger.debug({ messageKey }, 'PDO message without response after 15 seconds. Phone possibly offline')
1233
+ placeholderResendCache.del(messageKey?.id)
1234
+ }
1235
+ }, 15000)
1236
+
1237
+ return sendPeerDataOperationMessage(pdoMessage)
1518
1238
  }
1519
-
1520
- // delete data once call has ended
1521
- if (
1522
- status === "reject" ||
1523
- status === "accept" ||
1524
- status === "timeout" ||
1525
- status === "terminate"
1526
- ) {
1527
- callOfferCache.del(call.id);
1239
+
1240
+ const handleCall = async (node) => {
1241
+ let status
1242
+
1243
+ const { attrs } = node
1244
+ const [infoChild] = WABinary_1.getAllBinaryNodeChildren(node)
1245
+ const callId = infoChild.attrs['call-id']
1246
+ const from = infoChild.attrs.from || infoChild.attrs['call-creator']
1247
+ status = Utils_1.getCallStatusFromNode(infoChild)
1248
+
1249
+ if (WABinary_1.isLidUser(from) && infoChild.tag === 'relaylatency') {
1250
+ const verify = await callOfferCache.get(callId)
1251
+
1252
+ if (!verify) {
1253
+ status = 'offer'
1254
+
1255
+ const callLid = {
1256
+ chatId: attrs.from,
1257
+ from,
1258
+ id: callId,
1259
+ date: new Date(+attrs.t * 1000),
1260
+ offline: !!attrs.offline,
1261
+ status
1262
+ }
1263
+ await callOfferCache.set(callId, callLid)
1264
+ }
1265
+ }
1266
+
1267
+ const call = {
1268
+ chatId: attrs.from,
1269
+ from,
1270
+ id: callId,
1271
+ date: new Date(+attrs.t * 1000),
1272
+ offline: !!attrs.offline,
1273
+ status,
1274
+ }
1275
+
1276
+ if (status === 'offer') {
1277
+ call.isVideo = !!WABinary_1.getBinaryNodeChild(infoChild, 'video')
1278
+ call.isGroup = infoChild.attrs.type === 'group' || !!infoChild.attrs['group-jid']
1279
+ call.groupJid = infoChild.attrs['group-jid']
1280
+ await callOfferCache.set(call.id, call)
1281
+ }
1282
+
1283
+ const existingCall = await callOfferCache.get(call.id)
1284
+
1285
+ // use existing call info to populate this event
1286
+ if (existingCall) {
1287
+ call.isVideo = existingCall.isVideo
1288
+ call.isGroup = existingCall.isGroup
1289
+ }
1290
+
1291
+ // delete data once call has ended
1292
+ if (status === 'reject' || status === 'accept' || status === 'timeout' || status === 'terminate') {
1293
+ await callOfferCache.del(call.id)
1294
+ }
1295
+
1296
+ ev.emit('call', [call])
1297
+
1298
+ await sendMessageAck(node)
1528
1299
  }
1529
-
1530
- ev.emit("call", [call]);
1531
-
1532
- await sendMessageAck(node);
1533
- };
1534
-
1535
- const handleBadAck = async ({ attrs }) => {
1536
- const key = {
1537
- remoteJid: attrs.from,
1538
- fromMe: true,
1539
- id: attrs.id,
1540
- newsletter_server_id: attrs?.server_id,
1541
- };
1542
- // WARNING: REFRAIN FROM ENABLING THIS FOR NOW. IT WILL CAUSE A LOOP
1543
- // // current hypothesis is that if pash is sent in the ack
1544
- // // it means -- the message hasn't reached all devices yet
1545
- // // we'll retry sending the message here
1546
- // if(attrs.phash) {
1547
- // logger.info({ attrs }, 'received phash in ack, resending message...')
1548
- // const msg = await getMessage(key)
1549
- // if(msg) {
1550
- // await relayMessage(key.remoteJid!, msg, { messageId: key.id!, useUserDevicesCache: false })
1551
- // } else {
1552
- // logger.warn({ attrs }, 'could not send message again, as it was not found')
1553
- // }
1554
- // }
1555
- // error in acknowledgement,
1556
- // device could not display the message
1557
- if (attrs.error) {
1558
- logger.warn({ attrs }, "received error in ack");
1559
- ev.emit("messages.update", [
1560
- {
1561
- key,
1562
- update: {
1563
- status: Types_1.WAMessageStatus.ERROR,
1564
- messageStubParameters: [attrs.error],
1565
- },
1566
- },
1567
- ]);
1300
+
1301
+ const handleBadAck = async ({ attrs }) => {
1302
+ const key = { remoteJid: attrs.from, fromMe: true, id: attrs.id, newsletter_server_id: attrs?.server_id }
1303
+ // WARNING: REFRAIN FROM ENABLING THIS FOR NOW. IT WILL CAUSE A LOOP
1304
+ // // current hypothesis is that if pash is sent in the ack
1305
+ // // it means -- the message hasn't reached all devices yet
1306
+ // // we'll retry sending the message here
1307
+ // if(attrs.phash) {
1308
+ // logger.info({ attrs }, 'received phash in ack, resending message...')
1309
+ // const msg = await getMessage(key)
1310
+ // if(msg) {
1311
+ // await relayMessage(key.remoteJid!, msg, { messageId: key.id!, useUserDevicesCache: false })
1312
+ // } else {
1313
+ // logger.warn({ attrs }, 'could not send message again, as it was not found')
1314
+ // }
1315
+ // }
1316
+ // error in acknowledgement,
1317
+ // device could not display the message
1318
+ if (attrs.error) {
1319
+ logger.warn({ attrs }, 'received error in ack')
1320
+ ev.emit('messages.update', [
1321
+ {
1322
+ key,
1323
+ update: {
1324
+ status: Types_1.WAMessageStatus.ERROR,
1325
+ messageStubParameters: [
1326
+ attrs.error
1327
+ ]
1328
+ }
1329
+ }
1330
+ ])
1331
+ }
1568
1332
  }
1569
- };
1570
-
1571
- /// processes a node with the given function
1572
- /// and adds the task to the existing buffer if we're buffering events
1573
- const processNodeWithBuffer = async (node, identifier, exec) => {
1574
- ev.buffer();
1575
- await execTask();
1576
- ev.flush();
1577
- function execTask() {
1578
- return exec(node, false).catch((err) =>
1579
- onUnexpectedError(err, identifier)
1580
- );
1333
+
1334
+ /// processes a node with the given function
1335
+ /// and adds the task to the existing buffer if we're buffering events
1336
+ const processNodeWithBuffer = async (node, identifier, exec) => {
1337
+ ev.buffer()
1338
+ await execTask()
1339
+ ev.flush()
1340
+ function execTask() {
1341
+ return exec(node, false)
1342
+ .catch(err => onUnexpectedError(err, identifier))
1343
+ }
1581
1344
  }
1582
- };
1583
-
1584
- let latestNodeInMemory = null;
1585
- const nodelogger = (node) => {
1586
- if (!node) return null;
1587
- latestNodeInMemory = node;
1588
- return latestNodeInMemory;
1589
- };
1590
- const setNodeLoggerListener = () => {
1591
- return latestNodeInMemory;
1592
- };
1593
-
1594
- const makeOfflineNodeProcessor = () => {
1595
- const nodeProcessorMap = new Map([
1596
- ["message", handleMessage],
1597
- ["call", handleCall],
1598
- ["receipt", handleReceipt],
1599
- ["notification", handleNotification],
1600
- ]);
1601
-
1602
- const nodes = [];
1603
- let isProcessing = false;
1604
-
1605
- const enqueue = (type, node) => {
1606
- nodes.push({ type, node });
1607
-
1608
- if (isProcessing) {
1609
- return;
1610
- }
1611
-
1612
- isProcessing = true;
1613
-
1614
- const promise = async () => {
1615
- while (nodes.length && ws.isOpen) {
1616
- const { type, node } = nodes.shift();
1617
- const nodeProcessor = nodeProcessorMap.get(type);
1618
- if (!nodeProcessor) {
1619
- onUnexpectedError(
1620
- new Error(`unknown offline node type: ${type}`),
1621
- "processing offline node"
1622
- );
1623
- continue;
1624
- }
1625
- await nodeProcessor(node);
1626
- }
1627
- isProcessing = false;
1628
- };
1629
- promise().catch((error) =>
1630
- onUnexpectedError(error, "processing offline nodes")
1631
- );
1632
- };
1633
-
1634
- return { enqueue };
1635
- };
1636
-
1637
- const offlineNodeProcessor = makeOfflineNodeProcessor();
1638
-
1639
- const processNode = (type, node, identifier, exec) => {
1640
- const isOffline = !!node.attrs.offline;
1641
-
1642
- if (isOffline) {
1643
- offlineNodeProcessor.enqueue(type, node);
1644
- } else {
1645
- processNodeWithBuffer(node, identifier, exec);
1345
+
1346
+ const makeOfflineNodeProcessor = () => {
1347
+ const nodeProcessorMap = new Map([
1348
+ ['message', handleMessage],
1349
+ ['call', handleCall],
1350
+ ['receipt', handleReceipt],
1351
+ ['notification', handleNotification]
1352
+ ])
1353
+
1354
+ const nodes = []
1355
+ let isProcessing = false
1356
+
1357
+ const enqueue = (type, node) => {
1358
+ nodes.push({ type, node })
1359
+
1360
+ if (isProcessing) {
1361
+ return
1362
+ }
1363
+
1364
+ isProcessing = true
1365
+
1366
+ const promise = async () => {
1367
+ while (nodes.length && ws.isOpen) {
1368
+ const { type, node } = nodes.shift()
1369
+ const nodeProcessor = nodeProcessorMap.get(type)
1370
+ if (!nodeProcessor) {
1371
+ onUnexpectedError(new Error(`unknown offline node type: ${type}`), 'processing offline node')
1372
+ continue
1373
+ }
1374
+ await nodeProcessor(node)
1375
+ }
1376
+ isProcessing = false
1377
+ }
1378
+ promise().catch(error => onUnexpectedError(error, 'processing offline nodes'))
1379
+ }
1380
+
1381
+ return { enqueue }
1646
1382
  }
1647
- };
1648
-
1649
- // recv a message
1650
- ws.on("CB:message", (node) => {
1651
- processNode("message", node, "processing message", handleMessage);
1652
- nodelogger(node);
1653
- const messageJid = node.attrs.from;
1654
-
1655
- if (linkedParentMap[messageJid]) {
1656
- // console.log(`Community JID for ${messageJid}: ${linkedParentMap[messageJid]}`);
1657
- } else {
1658
- // console.log(`No Community JID found for ${messageJid}`);
1383
+
1384
+ const offlineNodeProcessor = makeOfflineNodeProcessor()
1385
+
1386
+ const processNode = (type, node, identifier, exec) => {
1387
+ const isOffline = !!node.attrs.offline
1388
+
1389
+ if (isOffline) {
1390
+ offlineNodeProcessor.enqueue(type, node)
1391
+ }
1392
+
1393
+ else {
1394
+ processNodeWithBuffer(node, identifier, exec)
1395
+ }
1659
1396
  }
1660
- });
1661
- ws.on("CB:call", async (node) => {
1662
- processNode("call", node, "handling call", handleCall);
1663
- nodelogger(node);
1664
- });
1665
- ws.on("CB:receipt", (node) => {
1666
- processNode("receipt", node, "handling receipt", handleReceipt);
1667
- });
1668
- ws.on("CB:notification", async (node) => {
1669
- processNode(
1670
- "notification",
1671
- node,
1672
- "handling notification",
1673
- handleNotification
1674
- );
1675
- // nodelogger(node)
1676
- });
1677
- ws.on("CB:ack,class:message", (node) => {
1678
- handleBadAck(node).catch((error) =>
1679
- onUnexpectedError(error, "handling bad ack")
1680
- );
1681
- // nodelogger(node)
1682
- });
1683
- const linkedParentMap = {};
1684
- ws.on("CB:iq", (node) => {
1397
+ let latestNodeInMemory = null;
1398
+ const nodelogger = (node) => {
1399
+ if (!node) return null;
1400
+ latestNodeInMemory = node
1401
+ return latestNodeInMemory;
1402
+ };
1403
+ const setNodeLoggerListener = () => {
1404
+ return latestNodeInMemory;
1405
+ };
1406
+ // recv a message
1407
+ ws.on('CB:message', (node) => {
1408
+ processNode('message', node, 'processing message', handleMessage)
1409
+ nodelogger(node)
1410
+ })
1411
+ ws.on('CB:call', async (node) => {
1412
+ processNode('call', node, 'handling call', handleCall)
1413
+ })
1414
+ ws.on('CB:receipt', node => {
1415
+ processNode('receipt', node, 'handling receipt', handleReceipt)
1416
+ nodelogger(node)
1417
+ })
1418
+ ws.on('CB:notification', async (node) => {
1419
+ processNode('notification', node, 'handling notification', handleNotification)
1420
+ nodelogger(node)
1421
+ })
1422
+ ws.on('CB:ack,class:message', (node) => {
1423
+ nodelogger(node)
1424
+ handleBadAck(node)
1425
+ .catch(error => onUnexpectedError(error, 'handling bad ack'))
1426
+ })
1427
+
1428
+ const linkedParentMap = {};
1429
+ ws.on("CB:iq", (node) => {
1685
1430
  if (node && node.tag === "iq" && node.attrs.type === "result") {
1686
- const groups = node.content;
1687
-
1688
- if (Array.isArray(groups)) {
1689
- for (const group of groups) {
1690
- const groupId = group.attrs.id + "@g.us";
1691
-
1692
- if (group && Array.isArray(group.content)) {
1693
- for (const item of group.content) {
1694
- if (
1695
- item.tag === "linked_parent" &&
1696
- item.attrs &&
1697
- item.attrs.jid
1698
- ) {
1699
- linkedParentMap[groupId] = item.attrs.jid;
1700
- }
1431
+ const groups = node.content;
1432
+
1433
+ if (Array.isArray(groups)) {
1434
+ for (const group of groups) {
1435
+ const groupId = group.attrs.id + "@g.us";
1436
+
1437
+ if (group && Array.isArray(group.content)) {
1438
+ for (const item of group.content) {
1439
+ if (
1440
+ item.tag === "linked_parent" &&
1441
+ item.attrs &&
1442
+ item.attrs.jid
1443
+ ) {
1444
+ linkedParentMap[groupId] = item.attrs.jid;
1445
+ }
1446
+ }
1447
+ }
1701
1448
  }
1702
- }
1703
1449
  }
1704
- }
1705
1450
  }
1706
- });
1707
- // codes in telegram channel @wegschleifen
1708
- ev.on("call", ([call]) => {
1709
- // missed call + group call notification message generation
1710
- if (
1711
- call.status === "timeout" ||
1712
- (call.status === "offer" && call.isGroup)
1713
- ) {
1714
- const msg = {
1715
- key: {
1716
- remoteJid: call.chatId,
1717
- id: call.id,
1718
- fromMe: false,
1719
- },
1720
- messageTimestamp: Utils_1.unixTimestampSeconds(call.date),
1721
- };
1722
-
1723
- if (call.status === "timeout") {
1724
- if (call.isGroup) {
1725
- msg.messageStubType = call.isVideo
1726
- ? Types_1.WAMessageStubType.CALL_MISSED_GROUP_VIDEO
1727
- : Types_1.WAMessageStubType.CALL_MISSED_GROUP_VOICE;
1728
- } else {
1729
- msg.messageStubType = call.isVideo
1730
- ? Types_1.WAMessageStubType.CALL_MISSED_VIDEO
1731
- : Types_1.WAMessageStubType.CALL_MISSED_VOICE;
1451
+ });
1452
+ ev.on('call', ([call]) => {
1453
+ // missed call + group call notification message generation
1454
+ if (call.status === 'timeout' || (call.status === 'offer' && call.isGroup)) {
1455
+ const msg = {
1456
+ key: {
1457
+ remoteJid: call.chatId,
1458
+ id: call.id,
1459
+ fromMe: false
1460
+ },
1461
+ messageTimestamp: Utils_1.unixTimestampSeconds(call.date),
1462
+ }
1463
+
1464
+ if (call.status === 'timeout') {
1465
+ if (call.isGroup) {
1466
+ msg.messageStubType = call.isVideo ? Types_1.WAMessageStubType.CALL_MISSED_GROUP_VIDEO : Types_1.WAMessageStubType.CALL_MISSED_GROUP_VOICE
1467
+ }
1468
+
1469
+ else {
1470
+ msg.messageStubType = call.isVideo ? Types_1.WAMessageStubType.CALL_MISSED_VIDEO : Types_1.WAMessageStubType.CALL_MISSED_VOICE
1471
+ }
1472
+ }
1473
+
1474
+ else {
1475
+ msg.message = { call: { callKey: Buffer.from(call.id) } }
1476
+ }
1477
+
1478
+ const protoMsg = WAProto_1.proto.WebMessageInfo.fromObject(msg)
1479
+ upsertMessage(protoMsg, call.offline ? 'append' : 'notify')
1732
1480
  }
1733
- } else {
1734
- msg.message = { call: { callKey: Buffer.from(call.id) } };
1735
- }
1736
-
1737
- const protoMsg = WAProto_1.proto.WebMessageInfo.fromObject(msg);
1738
- upsertMessage(protoMsg, call.offline ? "append" : "notify");
1739
- }
1740
- });
1741
-
1742
- ev.on("connection.update", ({ isOnline }) => {
1743
- if (typeof isOnline !== "undefined") {
1744
- sendActiveReceipts = isOnline;
1745
- logger.trace(`sendActiveReceipts set to "${sendActiveReceipts}"`);
1481
+ })
1482
+
1483
+ ev.on('connection.update', ({ isOnline }) => {
1484
+ if (typeof isOnline !== 'undefined') {
1485
+ sendActiveReceipts = isOnline
1486
+ logger.trace(`sendActiveReceipts set to "${sendActiveReceipts}"`)
1487
+ }
1488
+ })
1489
+
1490
+ return {
1491
+ ...baron,
1492
+ sendMessageAck,
1493
+ sendRetryRequest,
1494
+ offerCall,
1495
+ rejectCall,
1496
+ nodelogger,
1497
+ setNodeLoggerListener,
1498
+ fetchMessageHistory,
1499
+ requestPlaceholderResend,
1500
+ messageRetryManager
1746
1501
  }
1747
- });
1748
-
1749
- return {
1750
- ...Neele,
1751
- sendMessageAck,
1752
- sendRetryRequest,
1753
- offerCall,
1754
- rejectCall,
1755
- nodelogger,
1756
- setNodeLoggerListener,
1757
- fetchMessageHistory,
1758
- requestPlaceholderResend,
1759
- };
1760
- };
1502
+ }
1761
1503
 
1762
1504
  module.exports = {
1763
- makeMessagesRecvSocket,
1764
- };
1505
+ makeMessagesRecvSocket
1506
+ }