@neelegirl/baileys 1.5.2 → 1.5.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +21 -21
- package/README.md +195 -187
- package/WAProto/WAProto.proto +537 -236
- package/WAProto/index.d.ts +5971 -2388
- package/WAProto/index.js +17298 -6513
- package/lib/Defaults/baileys-version.json +3 -3
- package/lib/Defaults/index.d.ts +77 -67
- package/lib/Defaults/index.js +148 -136
- package/lib/Defaults/phonenumber-mcc.json +223 -223
- package/lib/Signal/WASignalGroup/GroupProtocol.js +1908 -1908
- package/lib/Signal/WASignalGroup/ciphertext-message.d.ts +9 -0
- package/lib/Signal/WASignalGroup/ciphertext-message.js +19 -0
- package/lib/Signal/WASignalGroup/ciphertext_message.js +15 -15
- package/lib/Signal/WASignalGroup/group-session-builder.d.ts +17 -0
- package/lib/Signal/WASignalGroup/group-session-builder.js +72 -0
- package/lib/Signal/WASignalGroup/group.proto +41 -41
- package/lib/Signal/WASignalGroup/group_cipher.d.ts +19 -0
- package/lib/Signal/WASignalGroup/group_cipher.js +101 -110
- package/lib/Signal/WASignalGroup/group_session_builder.js +45 -45
- package/lib/Signal/WASignalGroup/index.d.ts +11 -0
- package/lib/Signal/WASignalGroup/index.js +61 -6
- package/lib/Signal/WASignalGroup/keyhelper.d.ts +16 -0
- package/lib/Signal/WASignalGroup/keyhelper.js +58 -13
- package/lib/Signal/WASignalGroup/protobufs.js +2 -2
- package/lib/Signal/WASignalGroup/queue_job.js +68 -68
- package/lib/Signal/WASignalGroup/readme.md +5 -5
- package/lib/Signal/WASignalGroup/sender-chain-key.d.ts +14 -0
- package/lib/Signal/WASignalGroup/sender-chain-key.js +47 -0
- package/lib/Signal/WASignalGroup/sender-key-distribution-message.d.ts +17 -0
- package/lib/Signal/WASignalGroup/sender-key-distribution-message.js +71 -0
- package/lib/Signal/WASignalGroup/sender-key-message.d.ts +19 -0
- package/lib/Signal/WASignalGroup/sender-key-message.js +73 -0
- package/lib/Signal/WASignalGroup/sender-key-name.d.ts +19 -0
- package/lib/Signal/WASignalGroup/sender-key-name.js +59 -0
- package/lib/Signal/WASignalGroup/sender-key-record.d.ts +32 -0
- package/lib/Signal/WASignalGroup/sender-key-record.js +58 -0
- package/lib/Signal/WASignalGroup/sender-key-state.d.ts +44 -0
- package/lib/Signal/WASignalGroup/sender-key-state.js +147 -0
- package/lib/Signal/WASignalGroup/sender-message-key.d.ts +11 -0
- package/lib/Signal/WASignalGroup/sender-message-key.js +33 -0
- package/lib/Signal/WASignalGroup/sender_chain_key.js +49 -49
- package/lib/Signal/WASignalGroup/sender_key_distribution_message.js +77 -77
- package/lib/Signal/WASignalGroup/sender_key_message.js +91 -91
- package/lib/Signal/WASignalGroup/sender_key_name.js +69 -69
- package/lib/Signal/WASignalGroup/sender_key_record.js +55 -55
- package/lib/Signal/WASignalGroup/sender_key_state.js +128 -128
- package/lib/Signal/WASignalGroup/sender_message_key.js +38 -38
- package/lib/Signal/libsignal.d.ts +5 -1
- package/lib/Signal/libsignal.js +390 -161
- package/lib/Signal/lid-mapping.d.ts +28 -0
- package/lib/Signal/lid-mapping.js +184 -0
- package/lib/Socket/Client/abstract-socket-client.d.ts +15 -15
- package/lib/Socket/Client/abstract-socket-client.js +13 -13
- package/lib/Socket/Client/index.d.ts +2 -2
- package/lib/Socket/Client/mobile-socket-client.d.ts +12 -12
- package/lib/Socket/Client/mobile-socket-client.js +65 -65
- package/lib/Socket/Client/types.d.ts +1 -1
- package/lib/Socket/Client/websocket.d.ts +1 -1
- package/lib/Socket/business.d.ts +6 -6
- package/lib/Socket/business.js +152 -5
- package/lib/Socket/chats.d.ts +3 -4
- package/lib/Socket/chats.js +31 -26
- package/lib/Socket/communities.d.ts +223 -223
- package/lib/Socket/communities.js +432 -432
- package/lib/Socket/groups.d.ts +2 -4
- package/lib/Socket/groups.js +22 -14
- package/lib/Socket/index.d.ts +69 -69
- package/lib/Socket/index.js +3 -2
- package/lib/Socket/messages-recv.d.ts +3 -6
- package/lib/Socket/messages-recv.js +1449 -1707
- package/lib/Socket/messages-send.d.ts +2 -4
- package/lib/Socket/messages-send.js +617 -126
- package/lib/Socket/mex.d.ts +2 -2
- package/lib/Socket/mex.js +46 -46
- package/lib/Socket/newsletter.d.ts +2 -4
- package/lib/Socket/newsletter.js +294 -285
- package/lib/Socket/socket.js +318 -132
- package/lib/Socket/usync.js +3 -3
- package/lib/Store/index.d.ts +4 -4
- package/lib/Store/index.js +23 -23
- package/lib/Store/make-cache-manager-store.d.ts +13 -13
- package/lib/Store/make-cache-manager-store.js +89 -89
- package/lib/Store/make-in-memory-store.d.ts +122 -122
- package/lib/Store/make-in-memory-store.js +428 -428
- package/lib/Store/make-ordered-dictionary.d.ts +11 -11
- package/lib/Store/make-ordered-dictionary.js +85 -85
- package/lib/Store/object-repository.d.ts +9 -9
- package/lib/Store/object-repository.js +30 -30
- package/lib/Types/Auth.d.ts +5 -4
- package/lib/Types/Bussines.js +3 -0
- package/lib/Types/Bussiness.d.ts +28 -0
- package/lib/Types/Chat.d.ts +13 -8
- package/lib/Types/Contact.d.ts +4 -1
- package/lib/Types/Events.d.ts +13 -16
- package/lib/Types/GroupMetadata.d.ts +1 -1
- package/lib/Types/Message.d.ts +18 -7
- package/lib/Types/Message.js +7 -1
- package/lib/Types/MexUpdates.d.ts +8 -8
- package/lib/Types/MexUpdates.js +17 -17
- package/lib/Types/Newsletter.d.ts +1 -1
- package/lib/Types/Product.d.ts +1 -1
- package/lib/Types/Signal.d.ts +31 -1
- package/lib/Types/Socket.d.ts +34 -13
- package/lib/Types/State.d.ts +1 -1
- package/lib/Types/USync.d.ts +2 -2
- package/lib/Types/index.d.ts +16 -15
- package/lib/Types/index.js +4 -2
- package/lib/Utils/auth-utils.d.ts +20 -20
- package/lib/Utils/auth-utils.js +527 -204
- package/lib/Utils/baileys-event-stream.d.ts +17 -17
- package/lib/Utils/baileys-event-stream.js +69 -69
- package/lib/Utils/business.d.ts +28 -28
- package/lib/Utils/business.js +254 -254
- package/lib/Utils/chat-utils.d.ts +81 -81
- package/lib/Utils/chat-utils.js +808 -780
- package/lib/Utils/crypto.d.ts +55 -55
- package/lib/Utils/crypto.js +188 -178
- package/lib/Utils/decode-wa-message.d.ts +52 -40
- package/lib/Utils/decode-wa-message.js +322 -252
- package/lib/Utils/event-buffer.d.ts +38 -38
- package/lib/Utils/event-buffer.js +594 -564
- package/lib/Utils/generics.d.ts +131 -129
- package/lib/Utils/generics.js +629 -623
- package/lib/Utils/history.d.ts +22 -22
- package/lib/Utils/history.js +103 -109
- package/lib/Utils/index.d.ts +20 -19
- package/lib/Utils/index.js +39 -38
- package/lib/Utils/link-preview.d.ts +22 -22
- package/lib/Utils/link-preview.js +119 -119
- package/lib/Utils/logger.d.ts +13 -13
- package/lib/Utils/logger.js +7 -7
- package/lib/Utils/lt-hash.d.ts +13 -13
- package/lib/Utils/lt-hash.js +57 -57
- package/lib/Utils/make-mutex.d.ts +8 -8
- package/lib/Utils/make-mutex.js +48 -48
- package/lib/Utils/message-retry-manager.d.ts +88 -0
- package/lib/Utils/message-retry-manager.js +160 -0
- package/lib/Utils/messages-media.d.ts +134 -128
- package/lib/Utils/messages-media.js +868 -805
- package/lib/Utils/messages.d.ts +104 -102
- package/lib/Utils/messages.js +1744 -1578
- package/lib/Utils/noise-handler.d.ts +20 -19
- package/lib/Utils/noise-handler.js +164 -154
- package/lib/Utils/process-message.d.ts +48 -48
- package/lib/Utils/process-message.js +427 -428
- package/lib/Utils/signal.d.ts +41 -41
- package/lib/Utils/signal.js +165 -165
- package/lib/Utils/use-mongo-file-auth-state.d.ts +5 -5
- package/lib/Utils/use-mongo-file-auth-state.js +83 -83
- package/lib/Utils/use-multi-file-auth-state.d.ts +17 -17
- package/lib/Utils/use-multi-file-auth-state.js +237 -237
- package/lib/Utils/use-single-file-auth-state.d.ts +12 -12
- package/lib/Utils/use-single-file-auth-state.js +79 -79
- package/lib/Utils/validate-connection.d.ts +12 -12
- package/lib/Utils/validate-connection.js +219 -186
- package/lib/WABinary/constants.d.ts +29 -29
- package/lib/WABinary/constants.js +1315 -1315
- package/lib/WABinary/decode.d.ts +8 -8
- package/lib/WABinary/decode.js +287 -287
- package/lib/WABinary/encode.d.ts +2 -2
- package/lib/WABinary/encode.js +264 -264
- package/lib/WABinary/generic-utils.d.ts +27 -27
- package/lib/WABinary/generic-utils.js +141 -141
- package/lib/WABinary/index.d.ts +5 -5
- package/lib/WABinary/index.js +24 -24
- package/lib/WABinary/jid-utils.d.ts +58 -53
- package/lib/WABinary/jid-utils.js +103 -91
- package/lib/WABinary/types.d.ts +21 -21
- package/lib/WABinary/types.js +2 -2
- package/lib/WAM/BinaryInfo.d.ts +15 -15
- package/lib/WAM/BinaryInfo.js +16 -16
- package/lib/WAM/constants.d.ts +46 -46
- package/lib/WAM/constants.js +15370 -15370
- package/lib/WAM/encode.d.ts +2 -2
- package/lib/WAM/encode.js +163 -164
- package/lib/WAM/index.d.ts +3 -3
- package/lib/WAM/index.js +22 -22
- package/lib/WAUSync/Protocols/USyncBotProfileProtocol.d.ts +27 -27
- package/lib/WAUSync/Protocols/USyncBotProfileProtocol.js +68 -68
- package/lib/WAUSync/Protocols/USyncContactProtocol.d.ts +3 -3
- package/lib/WAUSync/Protocols/USyncDeviceProtocol.d.ts +2 -2
- package/lib/WAUSync/Protocols/USyncDisappearingModeProtocol.d.ts +2 -2
- package/lib/WAUSync/Protocols/USyncLIDProtocol.d.ts +9 -8
- package/lib/WAUSync/Protocols/USyncLIDProtocol.js +37 -29
- package/lib/WAUSync/Protocols/USyncStatusProtocol.d.ts +2 -2
- package/lib/WAUSync/Protocols/index.d.ts +6 -6
- package/lib/WAUSync/USyncQuery.d.ts +3 -3
- package/lib/WAUSync/index.d.ts +3 -3
- package/lib/index.d.ts +13 -13
- package/lib/index.js +33 -33
- package/package.json +96 -94
- package/lib/Socket/registration.d.ts +0 -266
- package/lib/Socket/registration.js +0 -166
|
@@ -1,238 +1,238 @@
|
|
|
1
|
-
"use strict"
|
|
2
|
-
|
|
3
|
-
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
4
|
-
return (mod && mod.__esModule) ? mod : { "default": mod }
|
|
5
|
-
}
|
|
6
|
-
|
|
7
|
-
Object.defineProperty(exports, "__esModule", { value: true })
|
|
8
|
-
|
|
9
|
-
const async_mutex_1 = __importDefault(require("async-mutex"))
|
|
10
|
-
const promises_1 = require("fs/promises")
|
|
11
|
-
const path_1 = require("path")
|
|
12
|
-
const WAProto_1 = require("../../WAProto")
|
|
13
|
-
const auth_utils_1 = require("./auth-utils")
|
|
14
|
-
const generics_1 = require("./generics")
|
|
15
|
-
// We need to lock files due to the fact that we are using async functions to read and write files
|
|
16
|
-
// https://github.com/WhiskeySockets/Baileys/issues/794
|
|
17
|
-
// https://github.com/nodejs/node/issues/26338
|
|
18
|
-
// Use a Map to store mutexes for each file path
|
|
19
|
-
const fileLocks = new Map()
|
|
20
|
-
|
|
21
|
-
// Get or create a mutex for a specific file path
|
|
22
|
-
const getFileLock = (path) => {
|
|
23
|
-
let mutex = fileLocks.get(path)
|
|
24
|
-
if (!mutex) {
|
|
25
|
-
mutex = new async_mutex_1.Mutex()
|
|
26
|
-
fileLocks.set(path, mutex)
|
|
27
|
-
}
|
|
28
|
-
|
|
29
|
-
return mutex
|
|
30
|
-
}
|
|
31
|
-
|
|
32
|
-
/**
|
|
33
|
-
* stores the full authentication state in a single folder.
|
|
34
|
-
* Far more efficient than singlefileauthstate
|
|
35
|
-
*
|
|
36
|
-
* Again, I wouldn't endorse this for any production level use other than perhaps a bot.
|
|
37
|
-
* Would recommend writing an auth state for use with a proper SQL or No-SQL DB
|
|
38
|
-
* */
|
|
39
|
-
const useMultiFileAuthState = async (folder) => {
|
|
40
|
-
// eslint-disable-next-line @typescript-eslint/no-explicit-any
|
|
41
|
-
const writeData = async (data, file) => {
|
|
42
|
-
const filePath = path_1.join(folder, fixFileName(file))
|
|
43
|
-
const mutex = getFileLock(filePath)
|
|
44
|
-
return mutex.acquire().then(async (release) => {
|
|
45
|
-
try {
|
|
46
|
-
await promises_1.writeFile(filePath, JSON.stringify(data, generics_1.BufferJSON.replacer))
|
|
47
|
-
} finally {
|
|
48
|
-
release()
|
|
49
|
-
}
|
|
50
|
-
})
|
|
51
|
-
}
|
|
52
|
-
const readData = async (file) => {
|
|
53
|
-
try {
|
|
54
|
-
const filePath = path_1.join(folder, fixFileName(file))
|
|
55
|
-
const mutex = getFileLock(filePath)
|
|
56
|
-
const data = await mutex.acquire().then(async (release) => {
|
|
57
|
-
try {
|
|
58
|
-
return await promises_1.readFile(filePath, { encoding: 'utf-8' })
|
|
59
|
-
} finally {
|
|
60
|
-
release()
|
|
61
|
-
}
|
|
62
|
-
})
|
|
63
|
-
|
|
64
|
-
return JSON.parse(data, generics_1.BufferJSON.reviver)
|
|
65
|
-
} catch (error) {
|
|
66
|
-
return null
|
|
67
|
-
}
|
|
68
|
-
}
|
|
69
|
-
const removeData = async (file) => {
|
|
70
|
-
try {
|
|
71
|
-
const filePath = path_1.join(folder, fixFileName(file))
|
|
72
|
-
const mutex = getFileLock(filePath)
|
|
73
|
-
await mutex.acquire().then(async (release) => {
|
|
74
|
-
try {
|
|
75
|
-
await promises_1.unlink(filePath)
|
|
76
|
-
} finally {
|
|
77
|
-
release()
|
|
78
|
-
}
|
|
79
|
-
})
|
|
80
|
-
} catch {}
|
|
81
|
-
}
|
|
82
|
-
const folderInfo = await promises_1.stat(folder).catch(() => { })
|
|
83
|
-
if (folderInfo) {
|
|
84
|
-
if (!folderInfo.isDirectory()) {
|
|
85
|
-
throw new Error(`found something that is not a directory at ${folder}, either delete it or specify a different location`)
|
|
86
|
-
}
|
|
87
|
-
}
|
|
88
|
-
else {
|
|
89
|
-
await promises_1.mkdir(folder, { recursive: true })
|
|
90
|
-
}
|
|
91
|
-
const fixFileName = (file) => {
|
|
92
|
-
return file?.replace(/\//g, '__')?.replace(/:/g, '-')
|
|
93
|
-
}
|
|
94
|
-
const creds = await readData('creds.json') || auth_utils_1.initAuthCreds()
|
|
95
|
-
return {
|
|
96
|
-
state: {
|
|
97
|
-
creds,
|
|
98
|
-
keys: {
|
|
99
|
-
get: async (type, ids) => {
|
|
100
|
-
const data = {}
|
|
101
|
-
await Promise.all(ids.map(async (id) => {
|
|
102
|
-
let value = await readData(`${type}-${id}.json`)
|
|
103
|
-
if (type === 'app-state-sync-key' && value) {
|
|
104
|
-
value = WAProto_1.proto.Message.AppStateSyncKeyData.fromObject(value)
|
|
105
|
-
}
|
|
106
|
-
data[id] = value
|
|
107
|
-
}))
|
|
108
|
-
return data
|
|
109
|
-
},
|
|
110
|
-
set: async (data) => {
|
|
111
|
-
const tasks = []
|
|
112
|
-
for (const category in data) {
|
|
113
|
-
for (const id in data[category]) {
|
|
114
|
-
const value = data[category][id]
|
|
115
|
-
const file = `${category}-${id}.json`
|
|
116
|
-
tasks.push(value ? writeData(value, file) : removeData(file))
|
|
117
|
-
}
|
|
118
|
-
}
|
|
119
|
-
await Promise.all(tasks)
|
|
120
|
-
}
|
|
121
|
-
}
|
|
122
|
-
},
|
|
123
|
-
saveCreds: async () => {
|
|
124
|
-
return writeData(creds, 'creds.json')
|
|
125
|
-
}
|
|
126
|
-
}
|
|
127
|
-
}
|
|
128
|
-
|
|
129
|
-
/**
|
|
130
|
-
* stores the full authentication state in a single folder.
|
|
131
|
-
* Far more efficient than singlefileauthstate
|
|
132
|
-
*
|
|
133
|
-
* Again, I wouldn't endorse this for any production level use other than perhaps a bot.
|
|
134
|
-
* Would recommend writing an auth state for use with a proper SQL or No-SQL DB
|
|
135
|
-
* */
|
|
136
|
-
const useMultiFileAuthStateV2 = async (folder) => {
|
|
137
|
-
const fixFileName = (file) => {
|
|
138
|
-
return file?.replace(/\//g, '__')?.replace(/:/g, '-')
|
|
139
|
-
}
|
|
140
|
-
|
|
141
|
-
// eslint-disable-next-line @typescript-eslint/no-explicit-any
|
|
142
|
-
const writeData = async (data, file) => {
|
|
143
|
-
const filePath = path_1.join(folder, fixFileName(file))
|
|
144
|
-
const mutex = getFileLock(filePath)
|
|
145
|
-
return mutex.acquire().then(async (release) => {
|
|
146
|
-
try {
|
|
147
|
-
await promises_1.writeFile(
|
|
148
|
-
filePath,
|
|
149
|
-
JSON.stringify(data, generics_1.BufferJSON.replacer, 2) // <-- lesbar formatiert
|
|
150
|
-
)
|
|
151
|
-
} finally {
|
|
152
|
-
release()
|
|
153
|
-
}
|
|
154
|
-
})
|
|
155
|
-
}
|
|
156
|
-
|
|
157
|
-
const readData = async (file) => {
|
|
158
|
-
try {
|
|
159
|
-
const filePath = path_1.join(folder, fixFileName(file))
|
|
160
|
-
const mutex = getFileLock(filePath)
|
|
161
|
-
const data = await mutex.acquire().then(async (release) => {
|
|
162
|
-
try {
|
|
163
|
-
return await promises_1.readFile(filePath, { encoding: 'utf-8' })
|
|
164
|
-
} finally {
|
|
165
|
-
release()
|
|
166
|
-
}
|
|
167
|
-
})
|
|
168
|
-
|
|
169
|
-
return JSON.parse(data, generics_1.BufferJSON.reviver)
|
|
170
|
-
} catch (error) {
|
|
171
|
-
return null
|
|
172
|
-
}
|
|
173
|
-
}
|
|
174
|
-
|
|
175
|
-
const removeData = async (file) => {
|
|
176
|
-
try {
|
|
177
|
-
const filePath = path_1.join(folder, fixFileName(file))
|
|
178
|
-
const mutex = getFileLock(filePath)
|
|
179
|
-
await mutex.acquire().then(async (release) => {
|
|
180
|
-
try {
|
|
181
|
-
await promises_1.unlink(filePath)
|
|
182
|
-
} finally {
|
|
183
|
-
release()
|
|
184
|
-
}
|
|
185
|
-
})
|
|
186
|
-
} catch {}
|
|
187
|
-
}
|
|
188
|
-
|
|
189
|
-
const folderInfo = await promises_1.stat(folder).catch(() => {})
|
|
190
|
-
if (folderInfo) {
|
|
191
|
-
if (!folderInfo.isDirectory()) {
|
|
192
|
-
throw new Error(`found something that is not a directory at ${folder}, either delete it or specify a different location`)
|
|
193
|
-
}
|
|
194
|
-
} else {
|
|
195
|
-
await promises_1.mkdir(folder, { recursive: true })
|
|
196
|
-
}
|
|
197
|
-
|
|
198
|
-
const creds = await readData('creds.json') || auth_utils_1.initAuthCreds()
|
|
199
|
-
|
|
200
|
-
return {
|
|
201
|
-
state: {
|
|
202
|
-
creds,
|
|
203
|
-
keys: {
|
|
204
|
-
get: async (type, ids) => {
|
|
205
|
-
const data = {}
|
|
206
|
-
await Promise.all(ids.map(async (id) => {
|
|
207
|
-
let value = await readData(`${type}-${id}.json`)
|
|
208
|
-
if (type === 'app-state-sync-key' && value) {
|
|
209
|
-
value = WAProto_1.proto.Message.AppStateSyncKeyData.fromObject(value)
|
|
210
|
-
}
|
|
211
|
-
data[id] = value
|
|
212
|
-
}))
|
|
213
|
-
return data
|
|
214
|
-
},
|
|
215
|
-
set: async (data) => {
|
|
216
|
-
const tasks = []
|
|
217
|
-
for (const category in data) {
|
|
218
|
-
for (const id in data[category]) {
|
|
219
|
-
const value = data[category][id]
|
|
220
|
-
const file = `${category}-${id}.json`
|
|
221
|
-
tasks.push(value ? writeData(value, file) : removeData(file))
|
|
222
|
-
}
|
|
223
|
-
}
|
|
224
|
-
await Promise.all(tasks)
|
|
225
|
-
}
|
|
226
|
-
}
|
|
227
|
-
},
|
|
228
|
-
saveCreds: async () => {
|
|
229
|
-
return writeData(creds, 'creds.json')
|
|
230
|
-
}
|
|
231
|
-
}
|
|
232
|
-
}
|
|
233
|
-
|
|
234
|
-
|
|
235
|
-
module.exports = {
|
|
236
|
-
useMultiFileAuthState,
|
|
237
|
-
useMultiFileAuthStateV2
|
|
1
|
+
"use strict"
|
|
2
|
+
|
|
3
|
+
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
4
|
+
return (mod && mod.__esModule) ? mod : { "default": mod }
|
|
5
|
+
}
|
|
6
|
+
|
|
7
|
+
Object.defineProperty(exports, "__esModule", { value: true })
|
|
8
|
+
|
|
9
|
+
const async_mutex_1 = __importDefault(require("async-mutex"))
|
|
10
|
+
const promises_1 = require("fs/promises")
|
|
11
|
+
const path_1 = require("path")
|
|
12
|
+
const WAProto_1 = require("../../WAProto")
|
|
13
|
+
const auth_utils_1 = require("./auth-utils")
|
|
14
|
+
const generics_1 = require("./generics")
|
|
15
|
+
// We need to lock files due to the fact that we are using async functions to read and write files
|
|
16
|
+
// https://github.com/WhiskeySockets/Baileys/issues/794
|
|
17
|
+
// https://github.com/nodejs/node/issues/26338
|
|
18
|
+
// Use a Map to store mutexes for each file path
|
|
19
|
+
const fileLocks = new Map()
|
|
20
|
+
|
|
21
|
+
// Get or create a mutex for a specific file path
|
|
22
|
+
const getFileLock = (path) => {
|
|
23
|
+
let mutex = fileLocks.get(path)
|
|
24
|
+
if (!mutex) {
|
|
25
|
+
mutex = new async_mutex_1.Mutex()
|
|
26
|
+
fileLocks.set(path, mutex)
|
|
27
|
+
}
|
|
28
|
+
|
|
29
|
+
return mutex
|
|
30
|
+
}
|
|
31
|
+
|
|
32
|
+
/**
|
|
33
|
+
* stores the full authentication state in a single folder.
|
|
34
|
+
* Far more efficient than singlefileauthstate
|
|
35
|
+
*
|
|
36
|
+
* Again, I wouldn't endorse this for any production level use other than perhaps a bot.
|
|
37
|
+
* Would recommend writing an auth state for use with a proper SQL or No-SQL DB
|
|
38
|
+
* */
|
|
39
|
+
const useMultiFileAuthState = async (folder) => {
|
|
40
|
+
// eslint-disable-next-line @typescript-eslint/no-explicit-any
|
|
41
|
+
const writeData = async (data, file) => {
|
|
42
|
+
const filePath = path_1.join(folder, fixFileName(file))
|
|
43
|
+
const mutex = getFileLock(filePath)
|
|
44
|
+
return mutex.acquire().then(async (release) => {
|
|
45
|
+
try {
|
|
46
|
+
await promises_1.writeFile(filePath, JSON.stringify(data, generics_1.BufferJSON.replacer))
|
|
47
|
+
} finally {
|
|
48
|
+
release()
|
|
49
|
+
}
|
|
50
|
+
})
|
|
51
|
+
}
|
|
52
|
+
const readData = async (file) => {
|
|
53
|
+
try {
|
|
54
|
+
const filePath = path_1.join(folder, fixFileName(file))
|
|
55
|
+
const mutex = getFileLock(filePath)
|
|
56
|
+
const data = await mutex.acquire().then(async (release) => {
|
|
57
|
+
try {
|
|
58
|
+
return await promises_1.readFile(filePath, { encoding: 'utf-8' })
|
|
59
|
+
} finally {
|
|
60
|
+
release()
|
|
61
|
+
}
|
|
62
|
+
})
|
|
63
|
+
|
|
64
|
+
return JSON.parse(data, generics_1.BufferJSON.reviver)
|
|
65
|
+
} catch (error) {
|
|
66
|
+
return null
|
|
67
|
+
}
|
|
68
|
+
}
|
|
69
|
+
const removeData = async (file) => {
|
|
70
|
+
try {
|
|
71
|
+
const filePath = path_1.join(folder, fixFileName(file))
|
|
72
|
+
const mutex = getFileLock(filePath)
|
|
73
|
+
await mutex.acquire().then(async (release) => {
|
|
74
|
+
try {
|
|
75
|
+
await promises_1.unlink(filePath)
|
|
76
|
+
} finally {
|
|
77
|
+
release()
|
|
78
|
+
}
|
|
79
|
+
})
|
|
80
|
+
} catch {}
|
|
81
|
+
}
|
|
82
|
+
const folderInfo = await promises_1.stat(folder).catch(() => { })
|
|
83
|
+
if (folderInfo) {
|
|
84
|
+
if (!folderInfo.isDirectory()) {
|
|
85
|
+
throw new Error(`found something that is not a directory at ${folder}, either delete it or specify a different location`)
|
|
86
|
+
}
|
|
87
|
+
}
|
|
88
|
+
else {
|
|
89
|
+
await promises_1.mkdir(folder, { recursive: true })
|
|
90
|
+
}
|
|
91
|
+
const fixFileName = (file) => {
|
|
92
|
+
return file?.replace(/\//g, '__')?.replace(/:/g, '-')
|
|
93
|
+
}
|
|
94
|
+
const creds = await readData('creds.json') || auth_utils_1.initAuthCreds()
|
|
95
|
+
return {
|
|
96
|
+
state: {
|
|
97
|
+
creds,
|
|
98
|
+
keys: {
|
|
99
|
+
get: async (type, ids) => {
|
|
100
|
+
const data = {}
|
|
101
|
+
await Promise.all(ids.map(async (id) => {
|
|
102
|
+
let value = await readData(`${type}-${id}.json`)
|
|
103
|
+
if (type === 'app-state-sync-key' && value) {
|
|
104
|
+
value = WAProto_1.proto.Message.AppStateSyncKeyData.fromObject(value)
|
|
105
|
+
}
|
|
106
|
+
data[id] = value
|
|
107
|
+
}))
|
|
108
|
+
return data
|
|
109
|
+
},
|
|
110
|
+
set: async (data) => {
|
|
111
|
+
const tasks = []
|
|
112
|
+
for (const category in data) {
|
|
113
|
+
for (const id in data[category]) {
|
|
114
|
+
const value = data[category][id]
|
|
115
|
+
const file = `${category}-${id}.json`
|
|
116
|
+
tasks.push(value ? writeData(value, file) : removeData(file))
|
|
117
|
+
}
|
|
118
|
+
}
|
|
119
|
+
await Promise.all(tasks)
|
|
120
|
+
}
|
|
121
|
+
}
|
|
122
|
+
},
|
|
123
|
+
saveCreds: async () => {
|
|
124
|
+
return writeData(creds, 'creds.json')
|
|
125
|
+
}
|
|
126
|
+
}
|
|
127
|
+
}
|
|
128
|
+
|
|
129
|
+
/**
|
|
130
|
+
* stores the full authentication state in a single folder.
|
|
131
|
+
* Far more efficient than singlefileauthstate
|
|
132
|
+
*
|
|
133
|
+
* Again, I wouldn't endorse this for any production level use other than perhaps a bot.
|
|
134
|
+
* Would recommend writing an auth state for use with a proper SQL or No-SQL DB
|
|
135
|
+
* */
|
|
136
|
+
const useMultiFileAuthStateV2 = async (folder) => {
|
|
137
|
+
const fixFileName = (file) => {
|
|
138
|
+
return file?.replace(/\//g, '__')?.replace(/:/g, '-')
|
|
139
|
+
}
|
|
140
|
+
|
|
141
|
+
// eslint-disable-next-line @typescript-eslint/no-explicit-any
|
|
142
|
+
const writeData = async (data, file) => {
|
|
143
|
+
const filePath = path_1.join(folder, fixFileName(file))
|
|
144
|
+
const mutex = getFileLock(filePath)
|
|
145
|
+
return mutex.acquire().then(async (release) => {
|
|
146
|
+
try {
|
|
147
|
+
await promises_1.writeFile(
|
|
148
|
+
filePath,
|
|
149
|
+
JSON.stringify(data, generics_1.BufferJSON.replacer, 2) // <-- lesbar formatiert
|
|
150
|
+
)
|
|
151
|
+
} finally {
|
|
152
|
+
release()
|
|
153
|
+
}
|
|
154
|
+
})
|
|
155
|
+
}
|
|
156
|
+
|
|
157
|
+
const readData = async (file) => {
|
|
158
|
+
try {
|
|
159
|
+
const filePath = path_1.join(folder, fixFileName(file))
|
|
160
|
+
const mutex = getFileLock(filePath)
|
|
161
|
+
const data = await mutex.acquire().then(async (release) => {
|
|
162
|
+
try {
|
|
163
|
+
return await promises_1.readFile(filePath, { encoding: 'utf-8' })
|
|
164
|
+
} finally {
|
|
165
|
+
release()
|
|
166
|
+
}
|
|
167
|
+
})
|
|
168
|
+
|
|
169
|
+
return JSON.parse(data, generics_1.BufferJSON.reviver)
|
|
170
|
+
} catch (error) {
|
|
171
|
+
return null
|
|
172
|
+
}
|
|
173
|
+
}
|
|
174
|
+
|
|
175
|
+
const removeData = async (file) => {
|
|
176
|
+
try {
|
|
177
|
+
const filePath = path_1.join(folder, fixFileName(file))
|
|
178
|
+
const mutex = getFileLock(filePath)
|
|
179
|
+
await mutex.acquire().then(async (release) => {
|
|
180
|
+
try {
|
|
181
|
+
await promises_1.unlink(filePath)
|
|
182
|
+
} finally {
|
|
183
|
+
release()
|
|
184
|
+
}
|
|
185
|
+
})
|
|
186
|
+
} catch {}
|
|
187
|
+
}
|
|
188
|
+
|
|
189
|
+
const folderInfo = await promises_1.stat(folder).catch(() => {})
|
|
190
|
+
if (folderInfo) {
|
|
191
|
+
if (!folderInfo.isDirectory()) {
|
|
192
|
+
throw new Error(`found something that is not a directory at ${folder}, either delete it or specify a different location`)
|
|
193
|
+
}
|
|
194
|
+
} else {
|
|
195
|
+
await promises_1.mkdir(folder, { recursive: true })
|
|
196
|
+
}
|
|
197
|
+
|
|
198
|
+
const creds = await readData('creds.json') || auth_utils_1.initAuthCreds()
|
|
199
|
+
|
|
200
|
+
return {
|
|
201
|
+
state: {
|
|
202
|
+
creds,
|
|
203
|
+
keys: {
|
|
204
|
+
get: async (type, ids) => {
|
|
205
|
+
const data = {}
|
|
206
|
+
await Promise.all(ids.map(async (id) => {
|
|
207
|
+
let value = await readData(`${type}-${id}.json`)
|
|
208
|
+
if (type === 'app-state-sync-key' && value) {
|
|
209
|
+
value = WAProto_1.proto.Message.AppStateSyncKeyData.fromObject(value)
|
|
210
|
+
}
|
|
211
|
+
data[id] = value
|
|
212
|
+
}))
|
|
213
|
+
return data
|
|
214
|
+
},
|
|
215
|
+
set: async (data) => {
|
|
216
|
+
const tasks = []
|
|
217
|
+
for (const category in data) {
|
|
218
|
+
for (const id in data[category]) {
|
|
219
|
+
const value = data[category][id]
|
|
220
|
+
const file = `${category}-${id}.json`
|
|
221
|
+
tasks.push(value ? writeData(value, file) : removeData(file))
|
|
222
|
+
}
|
|
223
|
+
}
|
|
224
|
+
await Promise.all(tasks)
|
|
225
|
+
}
|
|
226
|
+
}
|
|
227
|
+
},
|
|
228
|
+
saveCreds: async () => {
|
|
229
|
+
return writeData(creds, 'creds.json')
|
|
230
|
+
}
|
|
231
|
+
}
|
|
232
|
+
}
|
|
233
|
+
|
|
234
|
+
|
|
235
|
+
module.exports = {
|
|
236
|
+
useMultiFileAuthState,
|
|
237
|
+
useMultiFileAuthStateV2
|
|
238
238
|
}
|
|
@@ -1,13 +1,13 @@
|
|
|
1
|
-
import { ILogger } from '
|
|
2
|
-
import type { AuthenticationState } from '
|
|
3
|
-
|
|
4
|
-
/**
|
|
5
|
-
* @deprecated use multi file auth state instead please
|
|
6
|
-
* stores the full authentication state in a single JSON file
|
|
7
|
-
*
|
|
8
|
-
* DO NOT USE IN A PROD ENVIRONMENT, only meant to serve as an example
|
|
9
|
-
* */
|
|
10
|
-
export declare const useSingleFileAuthState: (filename: string, logger?: ILogger) => {
|
|
11
|
-
state: AuthenticationState
|
|
12
|
-
saveState: () => void
|
|
1
|
+
import { ILogger } from '@neelegirl/baileys/lib/Utils/logger'
|
|
2
|
+
import type { AuthenticationState } from '@neelegirl/baileys/lib/Types'
|
|
3
|
+
|
|
4
|
+
/**
|
|
5
|
+
* @deprecated use multi file auth state instead please
|
|
6
|
+
* stores the full authentication state in a single JSON file
|
|
7
|
+
*
|
|
8
|
+
* DO NOT USE IN A PROD ENVIRONMENT, only meant to serve as an example
|
|
9
|
+
* */
|
|
10
|
+
export declare const useSingleFileAuthState: (filename: string, logger?: ILogger) => {
|
|
11
|
+
state: AuthenticationState
|
|
12
|
+
saveState: () => void
|
|
13
13
|
}
|
|
@@ -1,80 +1,80 @@
|
|
|
1
|
-
"use strict"
|
|
2
|
-
|
|
3
|
-
Object.defineProperty(exports, "__esModule", { value: true })
|
|
4
|
-
|
|
5
|
-
const WAProto_1 = require("../../WAProto")
|
|
6
|
-
const auth_utils_1 = require("./auth-utils")
|
|
7
|
-
const generics_1 = require("./generics")
|
|
8
|
-
|
|
9
|
-
// useless key map only there to maintain backwards compatibility
|
|
10
|
-
// do not use in your own systems please
|
|
11
|
-
const KEY_MAP = {
|
|
12
|
-
'pre-key': 'preKeys',
|
|
13
|
-
'session': 'sessions',
|
|
14
|
-
'sender-key': 'senderKeys',
|
|
15
|
-
'app-state-sync-key': 'appStateSyncKeys',
|
|
16
|
-
'app-state-sync-version': 'appStateVersions',
|
|
17
|
-
'sender-key-memory': 'senderKeyMemory'
|
|
18
|
-
}
|
|
19
|
-
|
|
20
|
-
/**
|
|
21
|
-
* @deprecated use multi file auth state instead please
|
|
22
|
-
* stores the full authentication state in a single JSON file
|
|
23
|
-
*
|
|
24
|
-
* DO NOT USE IN A PROD ENVIRONMENT, only meant to serve as an example
|
|
25
|
-
* */
|
|
26
|
-
const useSingleFileAuthState = (filename, logger) => {
|
|
27
|
-
// require fs here so that in case "fs" is not available -- the app does not crash
|
|
28
|
-
const { readFileSync, writeFileSync, existsSync } = require('fs')
|
|
29
|
-
let creds
|
|
30
|
-
let keys = {}
|
|
31
|
-
// save the authentication state to a file
|
|
32
|
-
const saveState = () => {
|
|
33
|
-
logger && logger.trace('saving auth state')
|
|
34
|
-
writeFileSync(filename,
|
|
35
|
-
// BufferJSON replacer utility saves buffers nicely
|
|
36
|
-
JSON.stringify({ creds, keys }, generics_1.BufferJSON.replacer, 2))
|
|
37
|
-
}
|
|
38
|
-
if (existsSync(filename)) {
|
|
39
|
-
const result = JSON.parse(readFileSync(filename, { encoding: 'utf-8' }), generics_1.BufferJSON.reviver)
|
|
40
|
-
creds = result.creds
|
|
41
|
-
keys = result.keys
|
|
42
|
-
}
|
|
43
|
-
else {
|
|
44
|
-
creds = auth_utils_1.initAuthCreds()
|
|
45
|
-
keys = {}
|
|
46
|
-
}
|
|
47
|
-
return {
|
|
48
|
-
state: {
|
|
49
|
-
creds,
|
|
50
|
-
keys: {
|
|
51
|
-
get: (type, ids) => {
|
|
52
|
-
const key = KEY_MAP[type]
|
|
53
|
-
return ids.reduce((dict, id) => {
|
|
54
|
-
let value = keys[key]?.[id]
|
|
55
|
-
if (value) {
|
|
56
|
-
if (type === 'app-state-sync-key') {
|
|
57
|
-
value = WAProto_1.proto.Message.AppStateSyncKeyData.fromObject(value)
|
|
58
|
-
}
|
|
59
|
-
dict[id] = value
|
|
60
|
-
}
|
|
61
|
-
return dict
|
|
62
|
-
}, {})
|
|
63
|
-
},
|
|
64
|
-
set: (data) => {
|
|
65
|
-
for (const _key in data) {
|
|
66
|
-
const key = KEY_MAP[_key]
|
|
67
|
-
keys[key] = keys[key] || {}
|
|
68
|
-
Object.assign(keys[key], data[_key])
|
|
69
|
-
}
|
|
70
|
-
saveState()
|
|
71
|
-
}
|
|
72
|
-
}
|
|
73
|
-
},
|
|
74
|
-
saveState
|
|
75
|
-
}
|
|
76
|
-
}
|
|
77
|
-
|
|
78
|
-
module.exports = {
|
|
79
|
-
useSingleFileAuthState
|
|
1
|
+
"use strict"
|
|
2
|
+
|
|
3
|
+
Object.defineProperty(exports, "__esModule", { value: true })
|
|
4
|
+
|
|
5
|
+
const WAProto_1 = require("../../WAProto")
|
|
6
|
+
const auth_utils_1 = require("./auth-utils")
|
|
7
|
+
const generics_1 = require("./generics")
|
|
8
|
+
|
|
9
|
+
// useless key map only there to maintain backwards compatibility
|
|
10
|
+
// do not use in your own systems please
|
|
11
|
+
const KEY_MAP = {
|
|
12
|
+
'pre-key': 'preKeys',
|
|
13
|
+
'session': 'sessions',
|
|
14
|
+
'sender-key': 'senderKeys',
|
|
15
|
+
'app-state-sync-key': 'appStateSyncKeys',
|
|
16
|
+
'app-state-sync-version': 'appStateVersions',
|
|
17
|
+
'sender-key-memory': 'senderKeyMemory'
|
|
18
|
+
}
|
|
19
|
+
|
|
20
|
+
/**
|
|
21
|
+
* @deprecated use multi file auth state instead please
|
|
22
|
+
* stores the full authentication state in a single JSON file
|
|
23
|
+
*
|
|
24
|
+
* DO NOT USE IN A PROD ENVIRONMENT, only meant to serve as an example
|
|
25
|
+
* */
|
|
26
|
+
const useSingleFileAuthState = (filename, logger) => {
|
|
27
|
+
// require fs here so that in case "fs" is not available -- the app does not crash
|
|
28
|
+
const { readFileSync, writeFileSync, existsSync } = require('fs')
|
|
29
|
+
let creds
|
|
30
|
+
let keys = {}
|
|
31
|
+
// save the authentication state to a file
|
|
32
|
+
const saveState = () => {
|
|
33
|
+
logger && logger.trace('saving auth state')
|
|
34
|
+
writeFileSync(filename,
|
|
35
|
+
// BufferJSON replacer utility saves buffers nicely
|
|
36
|
+
JSON.stringify({ creds, keys }, generics_1.BufferJSON.replacer, 2))
|
|
37
|
+
}
|
|
38
|
+
if (existsSync(filename)) {
|
|
39
|
+
const result = JSON.parse(readFileSync(filename, { encoding: 'utf-8' }), generics_1.BufferJSON.reviver)
|
|
40
|
+
creds = result.creds
|
|
41
|
+
keys = result.keys
|
|
42
|
+
}
|
|
43
|
+
else {
|
|
44
|
+
creds = auth_utils_1.initAuthCreds()
|
|
45
|
+
keys = {}
|
|
46
|
+
}
|
|
47
|
+
return {
|
|
48
|
+
state: {
|
|
49
|
+
creds,
|
|
50
|
+
keys: {
|
|
51
|
+
get: (type, ids) => {
|
|
52
|
+
const key = KEY_MAP[type]
|
|
53
|
+
return ids.reduce((dict, id) => {
|
|
54
|
+
let value = keys[key]?.[id]
|
|
55
|
+
if (value) {
|
|
56
|
+
if (type === 'app-state-sync-key') {
|
|
57
|
+
value = WAProto_1.proto.Message.AppStateSyncKeyData.fromObject(value)
|
|
58
|
+
}
|
|
59
|
+
dict[id] = value
|
|
60
|
+
}
|
|
61
|
+
return dict
|
|
62
|
+
}, {})
|
|
63
|
+
},
|
|
64
|
+
set: (data) => {
|
|
65
|
+
for (const _key in data) {
|
|
66
|
+
const key = KEY_MAP[_key]
|
|
67
|
+
keys[key] = keys[key] || {}
|
|
68
|
+
Object.assign(keys[key], data[_key])
|
|
69
|
+
}
|
|
70
|
+
saveState()
|
|
71
|
+
}
|
|
72
|
+
}
|
|
73
|
+
},
|
|
74
|
+
saveState
|
|
75
|
+
}
|
|
76
|
+
}
|
|
77
|
+
|
|
78
|
+
module.exports = {
|
|
79
|
+
useSingleFileAuthState
|
|
80
80
|
}
|