@neelegirl/baileys 1.5.3 → 1.5.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (224) hide show
  1. package/README.md +16 -195
  2. package/index.js +38 -0
  3. package/package.json +16 -96
  4. package/LICENSE +0 -21
  5. package/WAProto/WAProto.proto +0 -5308
  6. package/WAProto/index.d.ts +0 -61295
  7. package/WAProto/index.js +0 -189754
  8. package/lib/Defaults/baileys-version.json +0 -3
  9. package/lib/Defaults/index.d.ts +0 -78
  10. package/lib/Defaults/index.js +0 -149
  11. package/lib/Defaults/phonenumber-mcc.json +0 -223
  12. package/lib/Signal/WASignalGroup/GroupProtocol.js +0 -1909
  13. package/lib/Signal/WASignalGroup/ciphertext-message.d.ts +0 -9
  14. package/lib/Signal/WASignalGroup/ciphertext-message.js +0 -19
  15. package/lib/Signal/WASignalGroup/ciphertext_message.js +0 -16
  16. package/lib/Signal/WASignalGroup/generate-proto.sh +0 -1
  17. package/lib/Signal/WASignalGroup/group-session-builder.d.ts +0 -17
  18. package/lib/Signal/WASignalGroup/group-session-builder.js +0 -72
  19. package/lib/Signal/WASignalGroup/group.proto +0 -42
  20. package/lib/Signal/WASignalGroup/group_cipher.d.ts +0 -19
  21. package/lib/Signal/WASignalGroup/group_cipher.js +0 -111
  22. package/lib/Signal/WASignalGroup/group_session_builder.js +0 -46
  23. package/lib/Signal/WASignalGroup/index.d.ts +0 -11
  24. package/lib/Signal/WASignalGroup/index.js +0 -61
  25. package/lib/Signal/WASignalGroup/keyhelper.d.ts +0 -16
  26. package/lib/Signal/WASignalGroup/keyhelper.js +0 -66
  27. package/lib/Signal/WASignalGroup/protobufs.js +0 -3
  28. package/lib/Signal/WASignalGroup/queue_job.js +0 -69
  29. package/lib/Signal/WASignalGroup/readme.md +0 -6
  30. package/lib/Signal/WASignalGroup/sender-chain-key.d.ts +0 -14
  31. package/lib/Signal/WASignalGroup/sender-chain-key.js +0 -47
  32. package/lib/Signal/WASignalGroup/sender-key-distribution-message.d.ts +0 -17
  33. package/lib/Signal/WASignalGroup/sender-key-distribution-message.js +0 -71
  34. package/lib/Signal/WASignalGroup/sender-key-message.d.ts +0 -19
  35. package/lib/Signal/WASignalGroup/sender-key-message.js +0 -73
  36. package/lib/Signal/WASignalGroup/sender-key-name.d.ts +0 -19
  37. package/lib/Signal/WASignalGroup/sender-key-name.js +0 -59
  38. package/lib/Signal/WASignalGroup/sender-key-record.d.ts +0 -32
  39. package/lib/Signal/WASignalGroup/sender-key-record.js +0 -58
  40. package/lib/Signal/WASignalGroup/sender-key-state.d.ts +0 -44
  41. package/lib/Signal/WASignalGroup/sender-key-state.js +0 -147
  42. package/lib/Signal/WASignalGroup/sender-message-key.d.ts +0 -11
  43. package/lib/Signal/WASignalGroup/sender-message-key.js +0 -33
  44. package/lib/Signal/WASignalGroup/sender_chain_key.js +0 -50
  45. package/lib/Signal/WASignalGroup/sender_key_distribution_message.js +0 -78
  46. package/lib/Signal/WASignalGroup/sender_key_message.js +0 -92
  47. package/lib/Signal/WASignalGroup/sender_key_name.js +0 -70
  48. package/lib/Signal/WASignalGroup/sender_key_record.js +0 -56
  49. package/lib/Signal/WASignalGroup/sender_key_state.js +0 -129
  50. package/lib/Signal/WASignalGroup/sender_message_key.js +0 -39
  51. package/lib/Signal/libsignal.d.ts +0 -8
  52. package/lib/Signal/libsignal.js +0 -391
  53. package/lib/Signal/lid-mapping.d.ts +0 -28
  54. package/lib/Signal/lid-mapping.js +0 -184
  55. package/lib/Socket/Client/abstract-socket-client.d.ts +0 -15
  56. package/lib/Socket/Client/abstract-socket-client.js +0 -13
  57. package/lib/Socket/Client/index.d.ts +0 -2
  58. package/lib/Socket/Client/index.js +0 -22
  59. package/lib/Socket/Client/mobile-socket-client.d.ts +0 -12
  60. package/lib/Socket/Client/mobile-socket-client.js +0 -65
  61. package/lib/Socket/Client/types.d.ts +0 -16
  62. package/lib/Socket/Client/types.js +0 -18
  63. package/lib/Socket/Client/websocket.d.ts +0 -13
  64. package/lib/Socket/Client/websocket.js +0 -62
  65. package/lib/Socket/business.d.ts +0 -187
  66. package/lib/Socket/business.js +0 -415
  67. package/lib/Socket/chats.d.ts +0 -97
  68. package/lib/Socket/chats.js +0 -1118
  69. package/lib/Socket/communities.d.ts +0 -223
  70. package/lib/Socket/communities.js +0 -433
  71. package/lib/Socket/groups.d.ts +0 -129
  72. package/lib/Socket/groups.js +0 -360
  73. package/lib/Socket/index.d.ts +0 -191
  74. package/lib/Socket/index.js +0 -24
  75. package/lib/Socket/messages-recv.d.ts +0 -174
  76. package/lib/Socket/messages-recv.js +0 -1506
  77. package/lib/Socket/messages-send.d.ts +0 -165
  78. package/lib/Socket/messages-send.js +0 -1785
  79. package/lib/Socket/mex.d.ts +0 -2
  80. package/lib/Socket/mex.js +0 -47
  81. package/lib/Socket/newsletter.d.ts +0 -145
  82. package/lib/Socket/newsletter.js +0 -295
  83. package/lib/Socket/socket.d.ts +0 -45
  84. package/lib/Socket/socket.js +0 -934
  85. package/lib/Socket/usync.d.ts +0 -37
  86. package/lib/Socket/usync.js +0 -83
  87. package/lib/Store/index.d.ts +0 -4
  88. package/lib/Store/index.js +0 -24
  89. package/lib/Store/make-cache-manager-store.d.ts +0 -14
  90. package/lib/Store/make-cache-manager-store.js +0 -90
  91. package/lib/Store/make-in-memory-store.d.ts +0 -123
  92. package/lib/Store/make-in-memory-store.js +0 -429
  93. package/lib/Store/make-ordered-dictionary.d.ts +0 -12
  94. package/lib/Store/make-ordered-dictionary.js +0 -86
  95. package/lib/Store/object-repository.d.ts +0 -10
  96. package/lib/Store/object-repository.js +0 -31
  97. package/lib/Types/Auth.d.ts +0 -121
  98. package/lib/Types/Auth.js +0 -3
  99. package/lib/Types/Bussines.js +0 -3
  100. package/lib/Types/Bussiness.d.ts +0 -28
  101. package/lib/Types/Call.d.ts +0 -14
  102. package/lib/Types/Call.js +0 -3
  103. package/lib/Types/Chat.d.ts +0 -143
  104. package/lib/Types/Chat.js +0 -9
  105. package/lib/Types/Contact.d.ts +0 -23
  106. package/lib/Types/Contact.js +0 -3
  107. package/lib/Types/Events.d.ts +0 -226
  108. package/lib/Types/Events.js +0 -3
  109. package/lib/Types/GroupMetadata.d.ts +0 -66
  110. package/lib/Types/GroupMetadata.js +0 -3
  111. package/lib/Types/Label.d.ts +0 -48
  112. package/lib/Types/Label.js +0 -31
  113. package/lib/Types/LabelAssociation.d.ts +0 -35
  114. package/lib/Types/LabelAssociation.js +0 -13
  115. package/lib/Types/Message.d.ts +0 -484
  116. package/lib/Types/Message.js +0 -19
  117. package/lib/Types/MexUpdates.d.ts +0 -9
  118. package/lib/Types/MexUpdates.js +0 -18
  119. package/lib/Types/Newsletter.d.ts +0 -109
  120. package/lib/Types/Newsletter.js +0 -40
  121. package/lib/Types/Product.d.ts +0 -92
  122. package/lib/Types/Product.js +0 -3
  123. package/lib/Types/Signal.d.ts +0 -98
  124. package/lib/Types/Signal.js +0 -3
  125. package/lib/Types/Socket.d.ts +0 -141
  126. package/lib/Types/Socket.js +0 -3
  127. package/lib/Types/State.d.ts +0 -41
  128. package/lib/Types/State.js +0 -14
  129. package/lib/Types/USync.d.ts +0 -26
  130. package/lib/Types/USync.js +0 -3
  131. package/lib/Types/index.d.ts +0 -80
  132. package/lib/Types/index.js +0 -50
  133. package/lib/Utils/auth-utils.d.ts +0 -21
  134. package/lib/Utils/auth-utils.js +0 -528
  135. package/lib/Utils/baileys-event-stream.d.ts +0 -18
  136. package/lib/Utils/baileys-event-stream.js +0 -70
  137. package/lib/Utils/business.d.ts +0 -29
  138. package/lib/Utils/business.js +0 -255
  139. package/lib/Utils/chat-utils.d.ts +0 -82
  140. package/lib/Utils/chat-utils.js +0 -809
  141. package/lib/Utils/crypto.d.ts +0 -56
  142. package/lib/Utils/crypto.js +0 -189
  143. package/lib/Utils/decode-wa-message.d.ts +0 -53
  144. package/lib/Utils/decode-wa-message.js +0 -323
  145. package/lib/Utils/event-buffer.d.ts +0 -39
  146. package/lib/Utils/event-buffer.js +0 -595
  147. package/lib/Utils/generics.d.ts +0 -131
  148. package/lib/Utils/generics.js +0 -630
  149. package/lib/Utils/history.d.ts +0 -23
  150. package/lib/Utils/history.js +0 -104
  151. package/lib/Utils/index.d.ts +0 -20
  152. package/lib/Utils/index.js +0 -40
  153. package/lib/Utils/link-preview.d.ts +0 -23
  154. package/lib/Utils/link-preview.js +0 -120
  155. package/lib/Utils/logger.d.ts +0 -13
  156. package/lib/Utils/logger.js +0 -7
  157. package/lib/Utils/lt-hash.d.ts +0 -14
  158. package/lib/Utils/lt-hash.js +0 -58
  159. package/lib/Utils/make-mutex.d.ts +0 -9
  160. package/lib/Utils/make-mutex.js +0 -49
  161. package/lib/Utils/message-retry-manager.d.ts +0 -88
  162. package/lib/Utils/message-retry-manager.js +0 -160
  163. package/lib/Utils/messages-media.d.ts +0 -135
  164. package/lib/Utils/messages-media.js +0 -869
  165. package/lib/Utils/messages.d.ts +0 -105
  166. package/lib/Utils/messages.js +0 -1745
  167. package/lib/Utils/noise-handler.d.ts +0 -21
  168. package/lib/Utils/noise-handler.js +0 -165
  169. package/lib/Utils/process-message.d.ts +0 -49
  170. package/lib/Utils/process-message.js +0 -427
  171. package/lib/Utils/signal.d.ts +0 -42
  172. package/lib/Utils/signal.js +0 -166
  173. package/lib/Utils/use-mongo-file-auth-state.d.ts +0 -6
  174. package/lib/Utils/use-mongo-file-auth-state.js +0 -84
  175. package/lib/Utils/use-multi-file-auth-state.d.ts +0 -18
  176. package/lib/Utils/use-multi-file-auth-state.js +0 -238
  177. package/lib/Utils/use-single-file-auth-state.d.ts +0 -13
  178. package/lib/Utils/use-single-file-auth-state.js +0 -80
  179. package/lib/Utils/validate-connection.d.ts +0 -13
  180. package/lib/Utils/validate-connection.js +0 -220
  181. package/lib/WABinary/constants.d.ts +0 -30
  182. package/lib/WABinary/constants.js +0 -1316
  183. package/lib/WABinary/decode.d.ts +0 -9
  184. package/lib/WABinary/decode.js +0 -288
  185. package/lib/WABinary/encode.d.ts +0 -3
  186. package/lib/WABinary/encode.js +0 -265
  187. package/lib/WABinary/generic-utils.d.ts +0 -28
  188. package/lib/WABinary/generic-utils.js +0 -142
  189. package/lib/WABinary/index.d.ts +0 -5
  190. package/lib/WABinary/index.js +0 -25
  191. package/lib/WABinary/jid-utils.d.ts +0 -58
  192. package/lib/WABinary/jid-utils.js +0 -104
  193. package/lib/WABinary/types.d.ts +0 -22
  194. package/lib/WABinary/types.js +0 -3
  195. package/lib/WAM/BinaryInfo.d.ts +0 -16
  196. package/lib/WAM/BinaryInfo.js +0 -17
  197. package/lib/WAM/constants.d.ts +0 -47
  198. package/lib/WAM/constants.js +0 -15371
  199. package/lib/WAM/encode.d.ts +0 -3
  200. package/lib/WAM/encode.js +0 -164
  201. package/lib/WAM/index.d.ts +0 -3
  202. package/lib/WAM/index.js +0 -23
  203. package/lib/WAUSync/Protocols/USyncBotProfileProtocol.d.ts +0 -28
  204. package/lib/WAUSync/Protocols/USyncBotProfileProtocol.js +0 -69
  205. package/lib/WAUSync/Protocols/USyncContactProtocol.d.ts +0 -10
  206. package/lib/WAUSync/Protocols/USyncContactProtocol.js +0 -36
  207. package/lib/WAUSync/Protocols/USyncDeviceProtocol.d.ts +0 -26
  208. package/lib/WAUSync/Protocols/USyncDeviceProtocol.js +0 -62
  209. package/lib/WAUSync/Protocols/USyncDisappearingModeProtocol.d.ts +0 -14
  210. package/lib/WAUSync/Protocols/USyncDisappearingModeProtocol.js +0 -35
  211. package/lib/WAUSync/Protocols/USyncLIDProtocol.d.ts +0 -10
  212. package/lib/WAUSync/Protocols/USyncLIDProtocol.js +0 -38
  213. package/lib/WAUSync/Protocols/USyncStatusProtocol.d.ts +0 -14
  214. package/lib/WAUSync/Protocols/USyncStatusProtocol.js +0 -46
  215. package/lib/WAUSync/Protocols/index.d.ts +0 -6
  216. package/lib/WAUSync/Protocols/index.js +0 -26
  217. package/lib/WAUSync/USyncQuery.d.ts +0 -31
  218. package/lib/WAUSync/USyncQuery.js +0 -92
  219. package/lib/WAUSync/USyncUser.d.ts +0 -12
  220. package/lib/WAUSync/USyncUser.js +0 -30
  221. package/lib/WAUSync/index.d.ts +0 -3
  222. package/lib/WAUSync/index.js +0 -23
  223. package/lib/index.d.ts +0 -13
  224. package/lib/index.js +0 -33
@@ -1,1506 +0,0 @@
1
- "use strict"
2
-
3
- var __importDefault = (this && this.__importDefault) || function (mod) {
4
- return (mod && mod.__esModule) ? mod : { "default": mod }
5
- }
6
-
7
- Object.defineProperty(exports, "__esModule", { value: true })
8
-
9
- const node_cache_1 = __importDefault(require("@cacheable/node-cache"))
10
- const boom_1 = require("@hapi/boom")
11
- const crypto_1 = require("crypto")
12
- const WAProto_1 = require("../../WAProto")
13
- const Defaults_1 = require("../Defaults")
14
- const Types_1 = require("../Types")
15
- const Utils_1 = require("../Utils")
16
- const WABinary_1 = require("../WABinary")
17
- const groups_1 = require("./groups")
18
- const make_mutex_1 = require("../Utils/make-mutex")
19
- const messages_send_1 = require("./messages-send")
20
-
21
- const makeMessagesRecvSocket = (config) => {
22
- const { logger, retryRequestDelayMs, maxMsgRetryCount, getMessage, shouldIgnoreJid, enableAutoSessionRecreation } = config
23
- const baron = messages_send_1.makeMessagesSocket(config)
24
- const { ev, authState, ws, processingMutex, signalRepository, query, upsertMessage, resyncAppState, onUnexpectedError, assertSessions, sendNode, relayMessage, sendReceipt, uploadPreKeys, groupMetadata, getUSyncDevices, createParticipantNodes, messageRetryManager, sendPeerDataOperationMessage } = baron
25
-
26
- /** this mutex ensures that each retryRequest will wait for the previous one to finish */
27
- const retryMutex = make_mutex_1.makeMutex()
28
-
29
- const msgRetryCache = config.msgRetryCounterCache || new node_cache_1.default({
30
- stdTTL: Defaults_1.DEFAULT_CACHE_TTLS.MSG_RETRY,
31
- useClones: false
32
- })
33
-
34
- const callOfferCache = config.callOfferCache || new node_cache_1.default({
35
- stdTTL: Defaults_1.DEFAULT_CACHE_TTLS.CALL_OFFER,
36
- useClones: false
37
- })
38
-
39
- const placeholderResendCache = config.placeholderResendCache || new node_cache_1.default({
40
- stdTTL: Defaults_1.DEFAULT_CACHE_TTLS.MSG_RETRY,
41
- useClones: false
42
- })
43
-
44
- let sendActiveReceipts = false
45
-
46
- const sendMessageAck = async ({ tag, attrs, content }, errorCode) => {
47
- const stanza = {
48
- tag: 'ack',
49
- attrs: {
50
- id: attrs.id,
51
- to: attrs.from,
52
- class: tag
53
- }
54
- }
55
-
56
- if (!!errorCode) {
57
- stanza.attrs.error = errorCode.toString()
58
- }
59
-
60
- if (!!attrs.participant) {
61
- stanza.attrs.participant = attrs.participant
62
- }
63
-
64
- if (!!attrs.recipient) {
65
- stanza.attrs.recipient = attrs.recipient
66
- }
67
-
68
- if (!!attrs.type && (tag !== 'message' || WABinary_1.getBinaryNodeChild({ tag, attrs, content }, 'unavailable') || errorCode !== 0)) {
69
- stanza.attrs.type = attrs.type
70
- }
71
-
72
- if (tag === 'message' && WABinary_1.getBinaryNodeChild({ tag, attrs, content }, 'unavailable')) {
73
- stanza.attrs.from = authState.creds.me.id
74
- }
75
-
76
- logger.debug({ recv: { tag, attrs }, sent: stanza.attrs }, 'sent ack')
77
- await sendNode(stanza)
78
- }
79
-
80
- const offerCall = async (toJid, isVideo = false) => {
81
- const callId = crypto_1.randomBytes(16).toString('hex').toUpperCase().substring(0, 64)
82
- const offerContent = []
83
- offerContent.push({ tag: 'audio', attrs: { enc: 'opus', rate: '16000' }, content: undefined })
84
- offerContent.push({ tag: 'audio', attrs: { enc: 'opus', rate: '8000' }, content: undefined })
85
-
86
- if (isVideo) {
87
- offerContent.push({
88
- tag: 'video',
89
- attrs: { enc: 'vp8', dec: 'vp8', orientation: '0', 'screen_width': '1920', 'screen_height': '1080', 'device_orientation': '0' },
90
- content: undefined
91
- })
92
- }
93
- offerContent.push({ tag: 'net', attrs: { medium: '3' }, content: undefined })
94
- offerContent.push({ tag: 'capability', attrs: { ver: '1' }, content: new Uint8Array([1, 4, 255, 131, 207, 4]) })
95
- offerContent.push({ tag: 'encopt', attrs: { keygen: '2' }, content: undefined })
96
-
97
- const encKey = crypto_1.randomBytes(32)
98
- const devices = (await getUSyncDevices([toJid], true, false)).map(({ user, device }) => WABinary_1.jidEncode(user, 's.whatsapp.net', device))
99
- await assertSessions(devices, true)
100
-
101
- const { nodes: destinations, shouldIncludeDeviceIdentity } = await createParticipantNodes(devices, {
102
- call: {
103
- callKey: new Uint8Array(encKey)
104
- }
105
- }, { count: '0' })
106
- offerContent.push({ tag: 'destination', attrs: {}, content: destinations })
107
-
108
- if (shouldIncludeDeviceIdentity) {
109
- offerContent.push({
110
- tag: 'device-identity',
111
- attrs: {},
112
- content: Utils_1.encodeSignedDeviceIdentity(authState.creds.account, true)
113
- })
114
- }
115
-
116
- const stanza = ({
117
- tag: 'call',
118
- attrs: {
119
- id: Utils_1.generateMessageID(),
120
- to: toJid,
121
- },
122
- content: [{
123
- tag: 'offer',
124
- attrs: {
125
- 'call-id': callId,
126
- 'call-creator': authState.creds.me.id,
127
- },
128
- content: offerContent,
129
- }],
130
- })
131
-
132
- await query(stanza)
133
-
134
- return {
135
- id: callId,
136
- to: toJid
137
- }
138
- }
139
-
140
- const rejectCall = async (callId, callFrom) => {
141
- const stanza = ({
142
- tag: 'call',
143
- attrs: {
144
- from: authState.creds.me.id,
145
- to: callFrom,
146
- },
147
- content: [{
148
- tag: 'reject',
149
- attrs: {
150
- 'call-id': callId,
151
- 'call-creator': callFrom,
152
- count: '0',
153
- },
154
- content: undefined,
155
- }],
156
- })
157
-
158
- await query(stanza)
159
- }
160
-
161
- const sendRetryRequest = async (node, forceIncludeKeys = false) => {
162
- const { fullMessage } = Utils_1.decodeMessageNode(node, authState.creds.me.id, authState.creds.me.lid || '')
163
- const { key: msgKey } = fullMessage
164
- const msgId = msgKey.id
165
-
166
- if (messageRetryManager) {
167
- // Check if we've exceeded max retries using the new system
168
- if (messageRetryManager.hasExceededMaxRetries(msgId)) {
169
- logger.debug({ msgId }, 'reached retry limit with new retry manager, clearing')
170
- messageRetryManager.markRetryFailed(msgId)
171
- return
172
- }
173
-
174
- // Increment retry count using new system
175
- const retryCount = messageRetryManager.incrementRetryCount(msgId)
176
-
177
- // Use the new retry count for the rest of the logic
178
- const key = `${msgId}:${msgKey?.participant}`
179
- msgRetryCache.set(key, retryCount)
180
- }
181
- else {
182
- // Fallback to old system
183
- const key = `${msgId}:${msgKey?.participant}`
184
- let retryCount = (await msgRetryCache.get(key)) || 0
185
-
186
- if (retryCount >= maxMsgRetryCount) {
187
- logger.debug({ retryCount, msgId }, 'reached retry limit, clearing')
188
- msgRetryCache.del(key)
189
- return
190
- }
191
-
192
- retryCount += 1
193
- await msgRetryCache.set(key, retryCount)
194
- }
195
-
196
- const key = `${msgId}:${msgKey?.participant}`
197
- const retryCount = (await msgRetryCache.get(key)) || 1
198
- const { account, signedPreKey, signedIdentityKey: identityKey } = authState.creds
199
- const fromJid = node.attrs.from
200
-
201
- // Check if we should recreate the session
202
- let shouldRecreateSession = false
203
- let recreateReason = ''
204
-
205
- if (enableAutoSessionRecreation && messageRetryManager) {
206
- try {
207
- // Check if we have a session with this JID
208
- const sessionId = signalRepository.jidToSignalProtocolAddress(fromJid)
209
- const hasSession = await signalRepository.validateSession(fromJid)
210
- const result = messageRetryManager.shouldRecreateSession(fromJid, retryCount, hasSession.exists)
211
-
212
- shouldRecreateSession = result.recreate
213
- recreateReason = result.reason
214
-
215
- if (shouldRecreateSession) {
216
- logger.info({ fromJid, retryCount, reason: recreateReason }, 'recreating session for retry')
217
- // Delete existing session to force recreation
218
- await authState.keys.set({ session: { [sessionId]: null } })
219
- forceIncludeKeys = true
220
- }
221
- }
222
- catch (error) {
223
- logger.warn({ error, fromJid }, 'failed to check session recreation')
224
- }
225
- }
226
-
227
- if (retryCount <= 2) {
228
- // Use new retry manager for phone requests if available
229
- if (messageRetryManager) {
230
- // Schedule phone request with delay (like whatsmeow)
231
- messageRetryManager.schedulePhoneRequest(msgId, async () => {
232
- try {
233
- const msgId = await requestPlaceholderResend(msgKey)
234
- logger.debug(`sendRetryRequest: requested placeholder resend for message ${msgId} (scheduled)`)
235
- }
236
- catch (error) {
237
- logger.warn({ error, msgId }, 'failed to send scheduled phone request');
238
- }
239
- })
240
- }
241
- else {
242
- // Fallback to immediate request
243
- const msgId = await requestPlaceholderResend(msgKey)
244
- logger.debug(`sendRetryRequest: requested placeholder resend for message ${msgId}`)
245
- }
246
- }
247
-
248
- const deviceIdentity = Utils_1.encodeSignedDeviceIdentity(account, true)
249
- await authState.keys.transaction(async () => {
250
- const receipt = {
251
- tag: 'receipt',
252
- attrs: {
253
- id: msgId,
254
- type: 'retry',
255
- to: node.attrs.from
256
- },
257
- content: [
258
- {
259
- tag: 'retry',
260
- attrs: {
261
- count: retryCount.toString(),
262
- id: node.attrs.id,
263
- t: node.attrs.t,
264
- v: '1'
265
- }
266
- },
267
- {
268
- tag: 'registration',
269
- attrs: {},
270
- content: Utils_1.encodeBigEndian(authState.creds.registrationId)
271
- }
272
- ]
273
- }
274
-
275
- if (node.attrs.recipient) {
276
- receipt.attrs.recipient = node.attrs.recipient
277
- }
278
-
279
- if (node.attrs.participant) {
280
- receipt.attrs.participant = node.attrs.participant
281
- }
282
-
283
- if (retryCount > 1 || forceIncludeKeys || shouldRecreateSession) {
284
- const { update, preKeys } = await Utils_1.getNextPreKeys(authState, 1)
285
- const [keyId] = Object.keys(preKeys)
286
- const key = preKeys[+keyId]
287
- const content = receipt.content
288
-
289
- content.push({
290
- tag: 'keys',
291
- attrs: {},
292
- content: [
293
- { tag: 'type', attrs: {}, content: Buffer.from(Defaults_1.KEY_BUNDLE_TYPE) },
294
- { tag: 'identity', attrs: {}, content: identityKey.public },
295
- Utils_1.xmppPreKey(key, +keyId),
296
- Utils_1.xmppSignedPreKey(signedPreKey),
297
- { tag: 'device-identity', attrs: {}, content: deviceIdentity }
298
- ]
299
- });
300
- ev.emit('creds.update', update)
301
- }
302
- await sendNode(receipt)
303
- logger.info({ msgAttrs: node.attrs, retryCount }, 'sent retry receipt')
304
- }, authState?.creds?.me?.id || 'sendRetryRequest')
305
- }
306
-
307
- const handleEncryptNotification = async (node) => {
308
- const from = node.attrs.from
309
- if (from === WABinary_1.S_WHATSAPP_NET) {
310
- const countChild = WABinary_1.getBinaryNodeChild(node, 'count')
311
- const count = +countChild.attrs.value
312
- const shouldUploadMorePreKeys = count < Defaults_1.MIN_PREKEY_COUNT
313
- logger.debug({ count, shouldUploadMorePreKeys }, 'recv pre-key count')
314
-
315
- if (shouldUploadMorePreKeys) {
316
- await uploadPreKeys()
317
- }
318
- }
319
-
320
- else {
321
- const identityNode = WABinary_1.getBinaryNodeChild(node, 'identity')
322
- if (identityNode) {
323
- logger.info({ jid: from }, 'identity changed')
324
- // not handling right now
325
- // signal will override new identity anyway
326
- }
327
-
328
- else {
329
- logger.info({ node }, 'unknown encrypt notification')
330
- }
331
- }
332
- }
333
-
334
- const handleGroupNotification = (participant, child, msg, mode) => {
335
- let participantJid = mode === 'lid' ? WABinary_1.getBinaryNodeChild(child, 'participant')?.attrs?.phone_number : WABinary_1.getBinaryNodeChild(child, 'participant')?.attrs?.jid || participant
336
-
337
- // TODO: Add participant LID
338
- switch (child.tag) {
339
- case 'create':
340
- const metadata = groups_1.extractGroupMetadata(child)
341
- msg.messageStubType = Types_1.WAMessageStubType.GROUP_CREATE
342
- msg.messageStubParameters = [metadata.subject]
343
- msg.key = { participant: metadata.owner }
344
- ev.emit('chats.upsert', [{
345
- id: metadata.id,
346
- name: metadata.subject,
347
- conversationTimestamp: metadata.creation,
348
- }])
349
- ev.emit('groups.upsert', [{
350
- ...metadata,
351
- author: participant
352
- }])
353
- break
354
- case 'delete':
355
- msg.messageStubType = Types_1.WAMessageStubType.COMMUNITY_PARENT_GROUP_DELETED
356
- msg.messageStubParameters = [participantJid, 'delete']
357
- break
358
- case 'ephemeral':
359
- case 'not_ephemeral':
360
- msg.message = {
361
- protocolMessage: {
362
- type: WAProto_1.proto.Message.ProtocolMessage.Type.EPHEMERAL_SETTING,
363
- ephemeralExpiration: +(child.attrs.expiration || 0)
364
- }
365
- }
366
- break
367
- case 'modify':
368
- const oldNumber = mode === 'lid' ? WABinary_1.getBinaryNodeChildren(child, 'participant').map(p => p.attrs.phone_number) : WABinary_1.getBinaryNodeChildren(child, 'participant').map(p => p.attrs.jid)
369
- msg.messageStubParameters = oldNumber || []
370
- msg.messageStubType = Types_1.WAMessageStubType.GROUP_PARTICIPANT_CHANGE_NUMBER
371
- break
372
- case 'promote':
373
- case 'demote':
374
- case 'remove':
375
- case 'add':
376
- case 'leave':
377
- let stubType = `GROUP_PARTICIPANT_${child.tag.toUpperCase()}`
378
- if (child.attrs?.reason === 'linked_group_join') {
379
- stubType = GROUP_PARTICIPANT_LINKED_GROUP_JOIN
380
- }
381
- msg.messageStubType = Types_1.WAMessageStubType[stubType]
382
- const participants = mode === 'lid' ? WABinary_1.getBinaryNodeChildren(child, 'participant').map(p => p.attrs.phone_number) : WABinary_1.getBinaryNodeChildren(child, 'participant').map(p => p.attrs.jid)
383
- if (participants.length === 1 &&
384
- // if recv. "remove" message and sender removed themselves
385
- // mark as left
386
- WABinary_1.areJidsSameUser(participants[0], participant) &&
387
- child.tag === 'remove') {
388
- msg.messageStubType = Types_1.WAMessageStubType.GROUP_PARTICIPANT_LEAVE
389
- }
390
- msg.messageStubParameters = participants
391
- break
392
- case 'subject':
393
- msg.messageStubType = Types_1.WAMessageStubType.GROUP_CHANGE_SUBJECT
394
- msg.messageStubParameters = [participantJid, child.attrs.subject]
395
- break
396
- case 'description':
397
- const description = WABinary_1.getBinaryNodeChild(child, 'body')?.content?.toString()
398
- msg.messageStubType = Types_1.WAMessageStubType.GROUP_CHANGE_DESCRIPTION
399
- msg.messageStubParameters = description ? [description] : undefined
400
- break
401
- case 'announcement':
402
- case 'not_announcement':
403
- msg.messageStubType = Types_1.WAMessageStubType.GROUP_CHANGE_ANNOUNCE
404
- msg.messageStubParameters = [(child.tag === 'announcement') ? 'on' : 'off']
405
- break
406
- case 'locked':
407
- case 'unlocked':
408
- msg.messageStubType = Types_1.WAMessageStubType.GROUP_CHANGE_RESTRICT
409
- msg.messageStubParameters = [(child.tag === 'locked') ? 'on' : 'off']
410
- break
411
- case 'invite':
412
- msg.messageStubType = Types_1.WAMessageStubType.GROUP_CHANGE_INVITE_LINK
413
- msg.messageStubParameters = [child.attrs.code]
414
- break
415
- case 'member_add_mode':
416
- const addMode = child.content
417
- if (addMode) {
418
- msg.messageStubType = Types_1.WAMessageStubType.GROUP_MEMBER_ADD_MODE
419
- msg.messageStubParameters = [addMode.toString()]
420
- }
421
- break
422
- case 'membership_approval_mode':
423
- const approvalMode = WABinary_1.getBinaryNodeChild(child, 'group_join')
424
- if (approvalMode) {
425
- msg.messageStubType = Types_1.WAMessageStubType.GROUP_MEMBERSHIP_JOIN_APPROVAL_MODE
426
- msg.messageStubParameters = [approvalMode.attrs.state]
427
- }
428
- break
429
- case 'created_membership_requests':
430
- participantJid = mode === 'lid' ? WABinary_1.getBinaryNodeChild(child, 'requested_user')?.attrs?.phone_number : WABinary_1.getBinaryNodeChild(child, 'requested_user')?.attrs?.jid || participant
431
-
432
- msg.messageStubType = Types_1.WAMessageStubType.GROUP_MEMBERSHIP_JOIN_APPROVAL_REQUEST_NON_ADMIN_ADD
433
- msg.messageStubParameters = [participantJid, 'created', child.attrs.request_method]
434
- break
435
- case 'revoked_membership_requests':
436
- participantJid = mode === 'lid' ? WABinary_1.getBinaryNodeChild(child, 'requested_user')?.attrs?.phone_number : WABinary_1.getBinaryNodeChild(child, 'requested_user')?.attrs?.jid || participant
437
-
438
- const isDenied = WABinary_1.areJidsSameUser(participantJid, participant)
439
- msg.messageStubType = Types_1.WAMessageStubType.GROUP_MEMBERSHIP_JOIN_APPROVAL_REQUEST_NON_ADMIN_ADD
440
- msg.messageStubParameters = [participantJid, isDenied ? 'revoked' : 'rejected']
441
- break
442
- case 'link':
443
- case 'unlink':
444
- const type = child.attrs?.unlink_type || child.attrs?.link_type
445
- const stubMap = {
446
- parent_group: Types_1.WAMessageStubType[`COMMUNITY_${child.tag.toUpperCase()}_PARENT_GROUP`],
447
- sibling_group: Types_1.WAMessageStubType[`COMMUNITY_${child.tag.toUpperCase()}_SIBLING_GROUP`],
448
- sub_group: Types_1.WAMessageStubType[`COMMUNITY_${child.tag.toUpperCase()}_SUB_GROUP`]
449
- }
450
- const groups = WABinary_1.getBinaryNodeChildren(child, 'group')
451
- .map(g => g.attrs?.jid || g.attrs?.subject || '')
452
- .filter(x => x)
453
- msg.messageStubType = stubMap?.[type] || Types_1.WAMessageStubType[`COMMUNITY_${child.tag.toUpperCase()}_PARENT_GROUP`]
454
- msg.messageStubParameters = [participantJid, child.tag, groups]
455
- break
456
- case 'linked_group_promote':
457
- case 'linked_group_demote':
458
- const stubtype = `COMMUNITY_PARTICIPANT_${child.tag.split('_')[2].toUpperCase()}`
459
- const participantS = mode === 'lid' ? WABinary_1.getBinaryNodeChildren(child, 'participant').map(p => p.attrs.phone_number) : WABinary_1.getBinaryNodeChildren(child, 'participant').map(p => p.attrs.jid)
460
- msg.messageStubType = Types_1.WAMessageStubType[stubtype]
461
- msg.messageStubParameters = participantS
462
- break
463
- case 'created_sub_group_suggestion':
464
- msg.messageStubType = Types_1.WAMessageStubType.SUGGESTED_SUBGROUP_ANNOUNCE
465
- msg.messageStubParameters = [participantJid, 'add']
466
- break
467
- case 'revoked_sub_group_suggestions':
468
- const res = WABinary_1.getBinaryNodeChildren(child, 'sub_group_suggestions')
469
- const reason = res.attrs?.reason
470
- if (reason === 'approved') msg.messageStubType = Types_1.WAMessageStubType.GROUP_CREATE
471
- else msg.messageStubType = Types_1.WAMessageStubType.GENERIC_NOTIFICATION
472
- msg.messageStubParameters = [participantJid, reason]
473
- break
474
- default:
475
- logger.warn(child.tag, 'Unhandled group node')
476
- break
477
- }
478
- }
479
-
480
- const handleNewsletterNotification = (id, node) => {
481
- const messages = WABinary_1.getBinaryNodeChild(node, 'messages')
482
- const message = WABinary_1.getBinaryNodeChild(node, 'message')
483
- const serverId = node.attrs.server_id
484
-
485
- const reactionsList = WABinary_1.getBinaryNodeChild(node, 'reactions')
486
- const viewsList = WABinary_1.getBinaryNodeChild(node, 'views_count')
487
-
488
- if (reactionsList) {
489
- const reactions = WABinary_1.getBinaryNodeChild(reactionsList, 'reaction')
490
-
491
- if (reactions.length === 0) {
492
- ev.emit('newsletter.reaction', {
493
- id,
494
- newsletter_server_id: serverId,
495
- reaction: {
496
- removed: true
497
- }
498
- })
499
- }
500
-
501
- reactions.forEach(item => {
502
- ev.emit('newsletter.reaction', {
503
- id,
504
- newsletter_server_id: serverId,
505
- reaction: {
506
- code: item.attrs?.code,
507
- count: +item.attrs.count
508
- }
509
- })
510
- })
511
- }
512
-
513
- if (viewsList.length) {
514
- viewsList.forEach(item => {
515
- ev.emit('newsletter.view', {
516
- id,
517
- newsletter_server_id: serverId,
518
- count: +item.attrs.count
519
- })
520
- })
521
- }
522
- }
523
-
524
- const handleMexNotification = (id, node) => {
525
- const operation = node?.attrs?.op_name
526
- const content = JSON.parse(node?.content)
527
-
528
- let contentPath
529
- let action
530
-
531
- if (operation === Types_1.MexOperations.UPDATE) {
532
- contentPath = content.data[Types_1.XWAPaths.METADATA_UPDATE]
533
-
534
- ev.emit('newsletter-settings.update', {
535
- id,
536
- update: contentPath.thread_metadata.settings
537
- })
538
- } else if (operation === Types_1.MexUpdatesOperations.GROUP_LIMIT_SHARING) {
539
- contentPath = content.data[Types_1.XWAPathsMexUpdates.GROUP_SHARING_CHANGE]
540
-
541
- ev.emit('limit-sharing.update', {
542
- id,
543
- author: contentPath.updated_by?.pn ? contentPath.updated_by.pn : contentPath.updated_by.id,
544
- action: `${contentPath.properties.limit_sharing.limit_sharing_enabled ? 'on' : 'off'}`,
545
- trigger: contentPath.properties.limit_sharing.limit_sharing_trigger,
546
- update_time: contentPath.update_time
547
- })
548
- } else if (operation === Types_1.MexUpdatesOperations.OWNER_COMMUNITY) {
549
- contentPath = content.data[Types_1.XWAPathsMexUpdates.COMMUNITY_OWNER_CHANGE]
550
-
551
- ev.emit('community-owner.update', {
552
- id,
553
- author: contentPath.updated_by?.pn ? contentPath.updated_by.pn : contentPath.updated_by.id,
554
- user: contentPath.role_updates[0].user?.pn ? contentPath.role_updates[0].user.pn : contentPath.role_updates[0].user.jid,
555
- new_role: contentPath.role_updates[0].new_role,
556
- update_time: contentPath.update_time
557
- })
558
- } else {
559
-
560
- if (operation === Types_1.MexOperations.PROMOTE) {
561
- action = 'promote'
562
- contentPath = content.data[Types_1.XWAPaths.PROMOTE]
563
- } else {
564
- action = 'demote'
565
- contentPath = content.data[Types_1.XWAPaths.DEMOTE]
566
- }
567
-
568
- ev.emit('newsletter-participants.update', {
569
- id,
570
- author: contentPath.actor.pn,
571
- user: contentPath.user.pn,
572
- new_role: contentPath.user_new_role,
573
- action
574
- })
575
- }
576
- }
577
-
578
- const processNotification = async (node) => {
579
- const result = {}
580
- const [child] = WABinary_1.getAllBinaryNodeChildren(node)
581
- const nodeType = node.attrs.type
582
- const from = WABinary_1.jidNormalizedUser(node.attrs.from)
583
-
584
- switch (nodeType) {
585
- case 'privacy_token':
586
- const tokenList = WABinary_1.getBinaryNodeChildren(child, 'token')
587
- for (const { attrs, content } of tokenList) {
588
- const jid = attrs.jid
589
- ev.emit('chats.update', [
590
- {
591
- id: jid,
592
- tcToken: content
593
- }
594
- ])
595
- logger.debug({ jid }, 'got privacy token update')
596
- }
597
- break
598
- case 'w:gp2':
599
- const mode = node.attrs.addressing_mode
600
- handleGroupNotification(mode === 'lid' ? node.attrs.participant_pn : node.attrs.participant, child, result, mode)
601
- break
602
- case 'newsletter':
603
- handleNewsletterNotification(node.attrs.from, child)
604
- break
605
- case 'mex':
606
- handleMexNotification(node.attrs.from, child)
607
- break
608
- case 'mediaretry':
609
- const event = Utils_1.decodeMediaRetryNode(node)
610
- ev.emit('messages.media-update', [event])
611
- break
612
- case 'encrypt':
613
- await handleEncryptNotification(node)
614
- break
615
- case 'devices':
616
- const devices = WABinary_1.getBinaryNodeChildren(child, 'device')
617
- if (WABinary_1.areJidsSameUser(child.attrs.jid, authState.creds.me.id) ||
618
- WABinary_1.areJidsSameUser(child.attrs.lid, authState.creds.me.lid)) {
619
- const deviceData = devices.map(d => ({ id: d.attrs.jid, lid: d.attrs.lid }))
620
- logger.info({ deviceData }, 'my own devices changed')
621
- }
622
- //TODO: drop a new event, add hashes
623
- break
624
- case 'server_sync':
625
- const update = WABinary_1.getBinaryNodeChild(node, 'collection')
626
- if (update) {
627
- const name = update.attrs.name
628
- await resyncAppState([name], false)
629
- }
630
- break
631
- case 'picture':
632
- const setPicture = WABinary_1.getBinaryNodeChild(node, 'set')
633
- const delPicture = WABinary_1.getBinaryNodeChild(node, 'delete')
634
- ev.emit('contacts.update', [{
635
- id: WABinary_1.jidNormalizedUser(node?.attrs?.from) || (setPicture || delPicture)?.attrs?.hash || '',
636
- imgUrl: setPicture ? 'changed' : 'removed'
637
- }])
638
- if (WABinary_1.isJidGroup(from)) {
639
- const node = setPicture || delPicture
640
- result.messageStubType = Types_1.WAMessageStubType.GROUP_CHANGE_ICON
641
- if (setPicture) {
642
- result.messageStubParameters = [setPicture.attrs.id]
643
- }
644
- result.participant = node?.attrs?.author
645
- result.key = {
646
- ...result.key || {},
647
- participant: setPicture?.attrs?.author
648
- }
649
- }
650
- break
651
- case 'account_sync':
652
- if (child.tag === 'disappearing_mode') {
653
- const newDuration = +child.attrs.duration
654
- const timestamp = +child.attrs.t
655
- logger.info({ newDuration }, 'updated account disappearing mode')
656
- ev.emit('creds.update', {
657
- accountSettings: {
658
- ...authState.creds.accountSettings,
659
- defaultDisappearingMode: {
660
- ephemeralExpiration: newDuration,
661
- ephemeralSettingTimestamp: timestamp,
662
- },
663
- }
664
- })
665
- }
666
- else if (child.tag === 'blocklist') {
667
- const blocklists = WABinary_1.getBinaryNodeChildren(child, 'item')
668
- for (const { attrs } of blocklists) {
669
- const blocklist = [attrs.jid]
670
- const type = (attrs.action === 'block') ? 'add' : 'remove'
671
- ev.emit('blocklist.update', { blocklist, type })
672
- }
673
- }
674
- break
675
- case 'link_code_companion_reg':
676
- const linkCodeCompanionReg = WABinary_1.getBinaryNodeChild(node, 'link_code_companion_reg')
677
- const ref = toRequiredBuffer(WABinary_1.getBinaryNodeChildBuffer(linkCodeCompanionReg, 'link_code_pairing_ref'))
678
- const primaryIdentityPublicKey = toRequiredBuffer(WABinary_1.getBinaryNodeChildBuffer(linkCodeCompanionReg, 'primary_identity_pub'))
679
- const primaryEphemeralPublicKeyWrapped = toRequiredBuffer(WABinary_1.getBinaryNodeChildBuffer(linkCodeCompanionReg, 'link_code_pairing_wrapped_primary_ephemeral_pub'))
680
- const codePairingPublicKey = await decipherLinkPublicKey(primaryEphemeralPublicKeyWrapped)
681
- const companionSharedKey = Utils_1.Curve.sharedKey(authState.creds.pairingEphemeralKeyPair.private, codePairingPublicKey)
682
- const random = crypto_1.randomBytes(32)
683
- const linkCodeSalt = crypto_1.randomBytes(32)
684
-
685
- const linkCodePairingExpanded = await Utils_1.hkdf(companionSharedKey, 32, {
686
- salt: linkCodeSalt,
687
- info: 'link_code_pairing_key_bundle_encryption_key'
688
- })
689
-
690
- const encryptPayload = Buffer.concat([Buffer.from(authState.creds.signedIdentityKey.public), primaryIdentityPublicKey, random])
691
- const encryptIv = crypto_1.randomBytes(12)
692
- const encrypted = Utils_1.aesEncryptGCM(encryptPayload, linkCodePairingExpanded, encryptIv, Buffer.alloc(0))
693
- const encryptedPayload = Buffer.concat([linkCodeSalt, encryptIv, encrypted])
694
- const identitySharedKey = Utils_1.Curve.sharedKey(authState.creds.signedIdentityKey.private, primaryIdentityPublicKey)
695
- const identityPayload = Buffer.concat([companionSharedKey, identitySharedKey, random])
696
-
697
- authState.creds.advSecretKey = (await Utils_1.hkdf(identityPayload, 32, { info: 'adv_secret' })).toString('base64')
698
-
699
- await query({
700
- tag: 'iq',
701
- attrs: {
702
- to: WABinary_1.S_WHATSAPP_NET,
703
- type: 'set',
704
- id: baron.generateMessageTag(),
705
- xmlns: 'md'
706
- },
707
- content: [
708
- {
709
- tag: 'link_code_companion_reg',
710
- attrs: {
711
- jid: authState.creds.me.id,
712
- stage: 'companion_finish',
713
- },
714
- content: [
715
- {
716
- tag: 'link_code_pairing_wrapped_key_bundle',
717
- attrs: {},
718
- content: encryptedPayload
719
- },
720
- {
721
- tag: 'companion_identity_public',
722
- attrs: {},
723
- content: authState.creds.signedIdentityKey.public
724
- },
725
- {
726
- tag: 'link_code_pairing_ref',
727
- attrs: {},
728
- content: ref
729
- }
730
- ]
731
- }
732
- ]
733
- })
734
-
735
- authState.creds.registered = true
736
- ev.emit('creds.update', authState.creds)
737
- }
738
-
739
- if (Object.keys(result).length) {
740
- return result
741
- }
742
- }
743
-
744
- async function decipherLinkPublicKey(data) {
745
- const buffer = toRequiredBuffer(data)
746
- const salt = buffer.slice(0, 32)
747
- const secretKey = await Utils_1.derivePairingCodeKey(authState.creds.pairingCode, salt)
748
- const iv = buffer.slice(32, 48)
749
- const payload = buffer.slice(48, 80)
750
- return Utils_1.aesDecryptCTR(payload, secretKey, iv)
751
- }
752
-
753
- function toRequiredBuffer(data) {
754
- if (data === undefined) {
755
- throw new boom_1.Boom('Invalid buffer', { statusCode: 400 })
756
- }
757
- return data instanceof Buffer ? data : Buffer.from(data)
758
- }
759
-
760
- const willSendMessageAgain = async (id, participant) => {
761
- const key = `${id}:${participant}`
762
- const retryCount = (await msgRetryCache.get(key)) || 0
763
- return retryCount < maxMsgRetryCount
764
- }
765
-
766
- const updateSendMessageAgainCount = async (id, participant) => {
767
- const key = `${id}:${participant}`
768
- const newValue = ((await msgRetryCache.get(key)) || 0) + 1
769
- await msgRetryCache.set(key, newValue)
770
- }
771
-
772
- const sendMessagesAgain = async (key, ids, retryNode) => {
773
- const remoteJid = key.remoteJid
774
- const participant = key.participant || remoteJid
775
- const retryCount = +retryNode.attrs.count || 1
776
-
777
- // Try to get messages from cache first, then fallback to getMessage
778
- const msgs = []
779
-
780
- for (const id of ids) {
781
- let msg
782
-
783
- // Try to get from retry cache first if enabled
784
- if (messageRetryManager) {
785
- const cachedMsg = messageRetryManager.getRecentMessage(remoteJid, id)
786
- if (cachedMsg) {
787
- msg = cachedMsg.message
788
- logger.debug({ jid: remoteJid, id }, 'found message in retry cache')
789
-
790
- // Mark retry as successful since we found the message
791
- messageRetryManager.markRetrySuccess(id)
792
- }
793
- }
794
-
795
- // Fallback to getMessage if not found in cache
796
- if (!msg) {
797
- msg = await getMessage({ ...key, id })
798
- if (msg) {
799
- logger.debug({ jid: remoteJid, id }, 'found message via getMessage')
800
-
801
- // Also mark as successful if found via getMessage
802
- if (messageRetryManager) {
803
- messageRetryManager.markRetrySuccess(id);
804
- }
805
- }
806
- }
807
- msgs.push(msg)
808
- }
809
-
810
- // if it's the primary jid sending the request
811
- // just re-send the message to everyone
812
- // prevents the first message decryption failure
813
- const sendToAll = !WABinary_1.jidDecode(participant)?.device
814
-
815
- // Check if we should recreate session for this retry
816
- let shouldRecreateSession = false
817
- let recreateReason = ''
818
-
819
- if (enableAutoSessionRecreation && messageRetryManager) {
820
- try {
821
- const sessionId = signalRepository.jidToSignalProtocolAddress(participant)
822
- const hasSession = await signalRepository.validateSession(participant)
823
- const result = messageRetryManager.shouldRecreateSession(participant, retryCount, hasSession.exists)
824
-
825
- shouldRecreateSession = result.recreate
826
- recreateReason = result.reason
827
-
828
- if (shouldRecreateSession) {
829
- logger.info({ participant, retryCount, reason: recreateReason }, 'recreating session for outgoing retry')
830
- await authState.keys.set({ session: { [sessionId]: null } });
831
- }
832
- }
833
- catch (error) {
834
- logger.warn({ error, participant }, 'failed to check session recreation for outgoing retry')
835
- }
836
- }
837
-
838
- await assertSessions([participant], shouldRecreateSession)
839
-
840
- if (WABinary_1.isJidGroup(remoteJid)) {
841
- await authState.keys.set({ 'sender-key-memory': { [remoteJid]: null } });
842
- }
843
- logger.debug({ participant, sendToAll, shouldRecreateSession, recreateReason }, 'forced new session for retry recp')
844
-
845
- for (const [i, msg] of msgs.entries()) {
846
- if (!ids[i])
847
- continue
848
-
849
- if (msg && (await willSendMessageAgain(ids[i], participant))) {
850
- updateSendMessageAgainCount(ids[i], participant)
851
- const msgRelayOpts = { messageId: ids[i] }
852
-
853
- if (sendToAll) {
854
- msgRelayOpts.useUserDevicesCache = false
855
- }
856
- else {
857
- msgRelayOpts.participant = {
858
- jid: participant,
859
- count: +retryNode.attrs.count
860
- }
861
- }
862
- await relayMessage(key.remoteJid, msg, msgRelayOpts)
863
- }
864
- else {
865
- logger.debug({ jid: key.remoteJid, id: ids[i] }, 'recv retry request, but message not available')
866
- }
867
- }
868
- }
869
-
870
- const handleReceipt = async (node) => {
871
- const { attrs, content } = node
872
- const isLid = attrs.from.includes('lid')
873
- const isNodeFromMe = WABinary_1.areJidsSameUser(attrs.participant || attrs.from, isLid ? authState.creds.me?.lid : authState.creds.me?.id)
874
- const remoteJid = !isNodeFromMe || WABinary_1.isJidGroup(attrs.from) ? attrs.from : attrs.recipient
875
- const fromMe = !attrs.recipient || ((attrs.type === 'retry' || attrs.type === 'sender') && isNodeFromMe)
876
-
877
- const key = {
878
- remoteJid,
879
- id: '',
880
- fromMe,
881
- participant: attrs.participant
882
- }
883
-
884
- if (shouldIgnoreJid(remoteJid) && remoteJid !== '@s.whatsapp.net') {
885
- logger.debug({ remoteJid }, 'ignoring receipt from jid')
886
- await sendMessageAck(node)
887
- return
888
- }
889
-
890
- const ids = [attrs.id]
891
- if (Array.isArray(content)) {
892
- const items = WABinary_1.getBinaryNodeChildren(content[0], 'item')
893
- ids.push(...items.map(i => i.attrs.id))
894
- }
895
-
896
- try {
897
- await Promise.all([
898
- processingMutex.mutex(async () => {
899
- const status = Utils_1.getStatusFromReceiptType(attrs.type)
900
-
901
- if (typeof status !== 'undefined' && (
902
- // basically, we only want to know when a message from us has been delivered to/read by the other person
903
- // or another device of ours has read some messages
904
- status >= WAProto_1.proto.WebMessageInfo.Status.SERVER_ACK ||
905
- !isNodeFromMe)) {
906
- if (WABinary_1.isJidGroup(remoteJid) || WABinary_1.isJidStatusBroadcast(remoteJid)) {
907
- if (attrs.participant) {
908
- const updateKey = status === WAProto_1.proto.WebMessageInfo.Status.DELIVERY_ACK ? 'receiptTimestamp' : 'readTimestamp'
909
- ev.emit('message-receipt.update', ids.map(id => ({
910
- key: { ...key, id },
911
- receipt: {
912
- userJid: WABinary_1.jidNormalizedUser(attrs.participant),
913
- [updateKey]: +attrs.t
914
- }
915
- })))
916
- }
917
- }
918
-
919
- else {
920
- ev.emit('messages.update', ids.map(id => ({
921
- key: { ...key, id },
922
- update: { status }
923
- })))
924
- }
925
- }
926
-
927
- if (attrs.type === 'retry') {
928
- // correctly set who is asking for the retry
929
- key.participant = key.participant || attrs.from
930
- const retryNode = WABinary_1.getBinaryNodeChild(node, 'retry')
931
-
932
- if (ids[0] && key.participant && (await willSendMessageAgain(ids[0], key.participant))) {
933
- if (key.fromMe) {
934
- try {
935
- updateSendMessageAgainCount(ids[0], key.participant)
936
- logger.debug({ attrs, key }, 'recv retry request')
937
- await sendMessagesAgain(key, ids, retryNode)
938
- }
939
-
940
- catch (error) {
941
- logger.error({ key, ids, trace: error instanceof Error ? error.stack : 'Unknown error' }, 'error in sending message again')
942
- }
943
- }
944
-
945
- else {
946
- logger.info({ attrs, key }, 'recv retry for not fromMe message')
947
- }
948
- }
949
-
950
- else {
951
- logger.info({ attrs, key }, 'will not send message again, as sent too many times')
952
- }
953
- }
954
- })
955
- ])
956
- }
957
- finally {
958
- await sendMessageAck(node)
959
- }
960
- }
961
-
962
- const handleNotification = async (node) => {
963
- const remoteJid = node.attrs.from
964
-
965
- if (shouldIgnoreJid(remoteJid) && remoteJid !== '@s.whatsapp.net') {
966
- logger.debug({ remoteJid, id: node.attrs.id }, 'ignored notification')
967
- await sendMessageAck(node)
968
- return
969
- }
970
-
971
- try {
972
- await Promise.all([
973
- processingMutex.mutex(async () => {
974
- const msg = await processNotification(node)
975
-
976
- if (msg) {
977
- const fromMe = WABinary_1.areJidsSameUser(node.attrs.participant || remoteJid, authState.creds.me.id)
978
- msg.key = {
979
- remoteJid,
980
- fromMe,
981
- participant: node.attrs.participant,
982
- id: node.attrs.id,
983
- ...(msg.key || {})
984
- }
985
- msg.participant = msg.participant ? msg.participant : node.attrs.participant
986
- msg.messageTimestamp = +node.attrs.t
987
- const fullMsg = WAProto_1.proto.WebMessageInfo.fromObject(msg)
988
- await upsertMessage(fullMsg, 'append')
989
- }
990
- })
991
- ])
992
- }
993
- finally {
994
- await sendMessageAck(node)
995
- }
996
- }
997
-
998
- const handleMessage = async (node) => {
999
- if (shouldIgnoreJid(node.attrs.from) && node.attrs.from !== '@s.whatsapp.net') {
1000
- logger.debug({ key: node.attrs.key }, 'ignored message')
1001
- await sendMessageAck(node)
1002
- return
1003
- }
1004
-
1005
- let response
1006
- const groupJid = node.attrs.from;
1007
- const communityJid = linkedParentMap[groupJid];
1008
- const encNode = WABinary_1.getBinaryNodeChild(node, 'enc')
1009
-
1010
- // TODO: temporary fix for crashes and issues resulting of failed msmsg decryption
1011
- if (encNode && encNode.attrs.type === 'msmsg') {
1012
- logger.debug({ key: node.attrs.key }, 'ignored msmsg')
1013
- await sendMessageAck(node, Utils_1.NACK_REASONS.MissingMessageSecret)
1014
- return
1015
- }
1016
-
1017
- if (WABinary_1.getBinaryNodeChild(node, 'unavailable') && !encNode) {
1018
- await sendMessageAck(node)
1019
- const { key } = Utils_1.decodeMessageNode(node, authState.creds.me.id, authState.creds.me.lid || '').fullMessage
1020
- response = await requestPlaceholderResend(key);
1021
- if (response === 'RESOLVED') {
1022
- return
1023
- }
1024
- logger.debug('received unavailable message, acked and requested resend from phone');
1025
- }
1026
- else {
1027
- if (placeholderResendCache.get(node.attrs.id)) {
1028
- await placeholderResendCache.del(node.attrs.id)
1029
- }
1030
- }
1031
-
1032
- const { fullMessage: msg, category, author, decrypt } = Utils_1.decryptMessageNode(node, authState.creds.me.id, authState.creds.me.lid || '', signalRepository, logger)
1033
-
1034
- if (response && msg?.messageStubParameters?.[0] === Utils_1.NO_MESSAGE_FOUND_ERROR_TEXT) {
1035
- msg.messageStubParameters = [Utils_1.NO_MESSAGE_FOUND_ERROR_TEXT, response]
1036
- }
1037
-
1038
- if (msg.message?.protocolMessage?.type === WAProto_1.proto.Message.ProtocolMessage.Type.SHARE_PHONE_NUMBER &&
1039
- node.attrs.sender_pn) {
1040
- const lid = WABinary_1.jidNormalizedUser(node.attrs.from), pn = WABinary_1.jidNormalizedUser(node.attrs.sender_pn)
1041
- ev.emit('lid-mapping.update', { lid, pn })
1042
- await signalRepository.lidMapping.storeLIDPNMappings([{ lid, pn }])
1043
- }
1044
-
1045
- const alt = msg.key.participantAlt || msg.key.remoteJidAlt
1046
-
1047
- // store new mappings we didn't have before
1048
- if (!!alt) {
1049
- const altServer = WABinary_1.jidDecode(alt)?.server
1050
-
1051
- if (altServer === 'lid') {
1052
- if (typeof (await signalRepository.lidMapping.getPNForLID(alt)) === 'string') {
1053
- await signalRepository.lidMapping.storeLIDPNMappings([
1054
- { lid: alt, pn: msg.key.participant || msg.key.remoteJid }
1055
- ])
1056
- }
1057
- }
1058
- else {
1059
- if (typeof (await signalRepository.lidMapping.getLIDForPN(alt)) === 'string') {
1060
- await signalRepository.lidMapping.storeLIDPNMappings([
1061
- { lid: msg.key.participant || msg.key.remoteJid, pn: alt }
1062
- ])
1063
- }
1064
- }
1065
- }
1066
-
1067
- if (msg.key?.remoteJid && msg.key?.id && messageRetryManager) {
1068
- messageRetryManager.addRecentMessage(msg.key.remoteJid, msg.key.id, msg.message)
1069
- logger.debug({
1070
- jid: msg.key.remoteJid,
1071
- id: msg.key.id
1072
- }, 'Added message to recent cache for retry receipts')
1073
- }
1074
-
1075
- try {
1076
- await Promise.all([
1077
- processingMutex.mutex(async () => {
1078
- await decrypt()
1079
- // message failed to decrypt
1080
- if (msg.messageStubType === WAProto_1.proto.WebMessageInfo.StubType.CIPHERTEXT) {
1081
- if (msg?.messageStubParameters?.[0] === Utils_1.MISSING_KEYS_ERROR_TEXT) {
1082
- return sendMessageAck(node, Utils_1.NACK_REASONS.ParsingError)
1083
- }
1084
-
1085
- const errorMessage = msg?.messageStubParameters?.[0] || ''
1086
- const isPreKeyError = errorMessage.includes('PreKey')
1087
- logger.debug(`[handleMessage] Attempting retry request for failed decryption`)
1088
-
1089
- // Handle both pre-key and normal retries in single mutex
1090
- retryMutex.mutex(async () => {
1091
- try {
1092
- if (!ws.isOpen) {
1093
- logger.debug({ node }, 'Connection closed, skipping retry')
1094
- return
1095
- }
1096
-
1097
- if (WABinary_1.getBinaryNodeChild(node, 'unavailable')) {
1098
- logger.debug('Message unavailable, skipping retry')
1099
- return
1100
- }
1101
-
1102
- // Handle pre-key errors with upload and delay
1103
- if (isPreKeyError) {
1104
- logger.info({ error: errorMessage }, 'PreKey error detected, uploading and retrying')
1105
- try {
1106
- logger.debug('Uploading pre-keys for error recovery')
1107
- await uploadPreKeys(5)
1108
- logger.debug('Waiting for server to process new pre-keys')
1109
- await Utils_1.delay(1000)
1110
- }
1111
- catch (uploadErr) {
1112
- logger.error({ uploadErr }, 'Pre-key upload failed, proceeding with retry anyway')
1113
- }
1114
- }
1115
-
1116
- const encNode = WABinary_1.getBinaryNodeChild(node, 'enc')
1117
- await sendRetryRequest(node, !encNode)
1118
- if (retryRequestDelayMs) {
1119
- await Utils_1.delay(retryRequestDelayMs)
1120
- }
1121
- }
1122
- catch (err) {
1123
- logger.error({ err, isPreKeyError }, 'Failed to handle retry, attempting basic retry')
1124
- // Still attempt retry even if pre-key upload failed
1125
- try {
1126
- const encNode = WABinary_1.getBinaryNodeChild(node, 'enc')
1127
- await sendRetryRequest(node, !encNode)
1128
- }
1129
- catch (retryErr) {
1130
- logger.error({ retryErr }, 'Failed to send retry after error handling')
1131
- }
1132
- }
1133
- })
1134
- }
1135
-
1136
- else {
1137
- // no type in the receipt => message delivered
1138
- let type = undefined
1139
-
1140
- let participant = msg.key.participant
1141
- if (communityJid) {
1142
- msg.communityJid = communityJid;
1143
- }
1144
- if (category === 'peer') {
1145
- // special peer message
1146
- type = 'peer_msg'
1147
- }
1148
-
1149
- else if (msg.key.fromMe) {
1150
- // message was sent by us from a different device
1151
- type = 'sender'
1152
-
1153
- // need to specially handle this case
1154
- if (WABinary_1.isLidUser(msg.key.remoteJid) || WABinary_1.isLidUser(msg.key.remoteJidAlt)) {
1155
- participant = author // TODO: investigate sending receipts to LIDs and not PNs
1156
- }
1157
- }
1158
-
1159
- else if (!sendActiveReceipts) {
1160
- type = 'inactive'
1161
- }
1162
- await sendReceipt(msg.key.remoteJid, participant, [msg.key.id], type)
1163
-
1164
- // send ack for history message
1165
- const isAnyHistoryMsg = Utils_1.getHistoryMsg(msg.message)
1166
- if (isAnyHistoryMsg) {
1167
- const jid = WABinary_1.jidNormalizedUser(msg.key.remoteJid)
1168
- await sendReceipt(jid, undefined, [msg.key.id], 'hist_sync')
1169
- }
1170
- }
1171
- Utils_1.cleanMessage(msg, authState.creds.me.id)
1172
- await sendMessageAck(node)
1173
- await upsertMessage(msg, node.attrs.offline ? 'append' : 'notify')
1174
- })
1175
- ])
1176
- }
1177
-
1178
- catch (error) {
1179
- logger.error({ error, node }, 'error in handling message')
1180
- }
1181
- }
1182
-
1183
- const fetchMessageHistory = async (count, oldestMsgKey, oldestMsgTimestamp) => {
1184
- if (!authState.creds.me?.id) {
1185
- throw new boom_1.Boom('Not authenticated')
1186
- }
1187
-
1188
- const pdoMessage = {
1189
- historySyncOnDemandRequest: {
1190
- chatJid: oldestMsgKey.remoteJid,
1191
- oldestMsgFromMe: oldestMsgKey.fromMe,
1192
- oldestMsgId: oldestMsgKey.id,
1193
- oldestMsgTimestampMs: oldestMsgTimestamp,
1194
- onDemandMsgCount: count
1195
- },
1196
- peerDataOperationRequestType: WAProto_1.proto.Message.PeerDataOperationRequestType.HISTORY_SYNC_ON_DEMAND
1197
- }
1198
-
1199
- return sendPeerDataOperationMessage(pdoMessage)
1200
- }
1201
-
1202
- const requestPlaceholderResend = async (messageKey) => {
1203
- if (!authState.creds.me?.id) {
1204
- throw new boom_1.Boom('Not authenticated')
1205
- }
1206
-
1207
- if (placeholderResendCache.get(messageKey?.id)) {
1208
- logger.debug({ messageKey }, 'already requested resend')
1209
- return
1210
- }
1211
-
1212
- else {
1213
- placeholderResendCache.set(messageKey?.id, true)
1214
- }
1215
-
1216
- await Utils_1.delay(5000)
1217
-
1218
- if (!placeholderResendCache.get(messageKey?.id)) {
1219
- logger.debug({ messageKey }, 'message received while resend requested')
1220
- return 'RESOLVED'
1221
- }
1222
-
1223
- const pdoMessage = {
1224
- placeholderMessageResendRequest: [{
1225
- messageKey
1226
- }],
1227
- peerDataOperationRequestType: WAProto_1.proto.Message.PeerDataOperationRequestType.PLACEHOLDER_MESSAGE_RESEND
1228
- }
1229
-
1230
- setTimeout(() => {
1231
- if (placeholderResendCache.get(messageKey?.id)) {
1232
- logger.debug({ messageKey }, 'PDO message without response after 15 seconds. Phone possibly offline')
1233
- placeholderResendCache.del(messageKey?.id)
1234
- }
1235
- }, 15000)
1236
-
1237
- return sendPeerDataOperationMessage(pdoMessage)
1238
- }
1239
-
1240
- const handleCall = async (node) => {
1241
- let status
1242
-
1243
- const { attrs } = node
1244
- const [infoChild] = WABinary_1.getAllBinaryNodeChildren(node)
1245
- const callId = infoChild.attrs['call-id']
1246
- const from = infoChild.attrs.from || infoChild.attrs['call-creator']
1247
- status = Utils_1.getCallStatusFromNode(infoChild)
1248
-
1249
- if (WABinary_1.isLidUser(from) && infoChild.tag === 'relaylatency') {
1250
- const verify = await callOfferCache.get(callId)
1251
-
1252
- if (!verify) {
1253
- status = 'offer'
1254
-
1255
- const callLid = {
1256
- chatId: attrs.from,
1257
- from,
1258
- id: callId,
1259
- date: new Date(+attrs.t * 1000),
1260
- offline: !!attrs.offline,
1261
- status
1262
- }
1263
- await callOfferCache.set(callId, callLid)
1264
- }
1265
- }
1266
-
1267
- const call = {
1268
- chatId: attrs.from,
1269
- from,
1270
- id: callId,
1271
- date: new Date(+attrs.t * 1000),
1272
- offline: !!attrs.offline,
1273
- status,
1274
- }
1275
-
1276
- if (status === 'offer') {
1277
- call.isVideo = !!WABinary_1.getBinaryNodeChild(infoChild, 'video')
1278
- call.isGroup = infoChild.attrs.type === 'group' || !!infoChild.attrs['group-jid']
1279
- call.groupJid = infoChild.attrs['group-jid']
1280
- await callOfferCache.set(call.id, call)
1281
- }
1282
-
1283
- const existingCall = await callOfferCache.get(call.id)
1284
-
1285
- // use existing call info to populate this event
1286
- if (existingCall) {
1287
- call.isVideo = existingCall.isVideo
1288
- call.isGroup = existingCall.isGroup
1289
- }
1290
-
1291
- // delete data once call has ended
1292
- if (status === 'reject' || status === 'accept' || status === 'timeout' || status === 'terminate') {
1293
- await callOfferCache.del(call.id)
1294
- }
1295
-
1296
- ev.emit('call', [call])
1297
-
1298
- await sendMessageAck(node)
1299
- }
1300
-
1301
- const handleBadAck = async ({ attrs }) => {
1302
- const key = { remoteJid: attrs.from, fromMe: true, id: attrs.id, newsletter_server_id: attrs?.server_id }
1303
- // WARNING: REFRAIN FROM ENABLING THIS FOR NOW. IT WILL CAUSE A LOOP
1304
- // // current hypothesis is that if pash is sent in the ack
1305
- // // it means -- the message hasn't reached all devices yet
1306
- // // we'll retry sending the message here
1307
- // if(attrs.phash) {
1308
- // logger.info({ attrs }, 'received phash in ack, resending message...')
1309
- // const msg = await getMessage(key)
1310
- // if(msg) {
1311
- // await relayMessage(key.remoteJid!, msg, { messageId: key.id!, useUserDevicesCache: false })
1312
- // } else {
1313
- // logger.warn({ attrs }, 'could not send message again, as it was not found')
1314
- // }
1315
- // }
1316
- // error in acknowledgement,
1317
- // device could not display the message
1318
- if (attrs.error) {
1319
- logger.warn({ attrs }, 'received error in ack')
1320
- ev.emit('messages.update', [
1321
- {
1322
- key,
1323
- update: {
1324
- status: Types_1.WAMessageStatus.ERROR,
1325
- messageStubParameters: [
1326
- attrs.error
1327
- ]
1328
- }
1329
- }
1330
- ])
1331
- }
1332
- }
1333
-
1334
- /// processes a node with the given function
1335
- /// and adds the task to the existing buffer if we're buffering events
1336
- const processNodeWithBuffer = async (node, identifier, exec) => {
1337
- ev.buffer()
1338
- await execTask()
1339
- ev.flush()
1340
- function execTask() {
1341
- return exec(node, false)
1342
- .catch(err => onUnexpectedError(err, identifier))
1343
- }
1344
- }
1345
-
1346
- const makeOfflineNodeProcessor = () => {
1347
- const nodeProcessorMap = new Map([
1348
- ['message', handleMessage],
1349
- ['call', handleCall],
1350
- ['receipt', handleReceipt],
1351
- ['notification', handleNotification]
1352
- ])
1353
-
1354
- const nodes = []
1355
- let isProcessing = false
1356
-
1357
- const enqueue = (type, node) => {
1358
- nodes.push({ type, node })
1359
-
1360
- if (isProcessing) {
1361
- return
1362
- }
1363
-
1364
- isProcessing = true
1365
-
1366
- const promise = async () => {
1367
- while (nodes.length && ws.isOpen) {
1368
- const { type, node } = nodes.shift()
1369
- const nodeProcessor = nodeProcessorMap.get(type)
1370
- if (!nodeProcessor) {
1371
- onUnexpectedError(new Error(`unknown offline node type: ${type}`), 'processing offline node')
1372
- continue
1373
- }
1374
- await nodeProcessor(node)
1375
- }
1376
- isProcessing = false
1377
- }
1378
- promise().catch(error => onUnexpectedError(error, 'processing offline nodes'))
1379
- }
1380
-
1381
- return { enqueue }
1382
- }
1383
-
1384
- const offlineNodeProcessor = makeOfflineNodeProcessor()
1385
-
1386
- const processNode = (type, node, identifier, exec) => {
1387
- const isOffline = !!node.attrs.offline
1388
-
1389
- if (isOffline) {
1390
- offlineNodeProcessor.enqueue(type, node)
1391
- }
1392
-
1393
- else {
1394
- processNodeWithBuffer(node, identifier, exec)
1395
- }
1396
- }
1397
- let latestNodeInMemory = null;
1398
- const nodelogger = (node) => {
1399
- if (!node) return null;
1400
- latestNodeInMemory = node
1401
- return latestNodeInMemory;
1402
- };
1403
- const setNodeLoggerListener = () => {
1404
- return latestNodeInMemory;
1405
- };
1406
- // recv a message
1407
- ws.on('CB:message', (node) => {
1408
- processNode('message', node, 'processing message', handleMessage)
1409
- nodelogger(node)
1410
- })
1411
- ws.on('CB:call', async (node) => {
1412
- processNode('call', node, 'handling call', handleCall)
1413
- })
1414
- ws.on('CB:receipt', node => {
1415
- processNode('receipt', node, 'handling receipt', handleReceipt)
1416
- nodelogger(node)
1417
- })
1418
- ws.on('CB:notification', async (node) => {
1419
- processNode('notification', node, 'handling notification', handleNotification)
1420
- nodelogger(node)
1421
- })
1422
- ws.on('CB:ack,class:message', (node) => {
1423
- nodelogger(node)
1424
- handleBadAck(node)
1425
- .catch(error => onUnexpectedError(error, 'handling bad ack'))
1426
- })
1427
-
1428
- const linkedParentMap = {};
1429
- ws.on("CB:iq", (node) => {
1430
- if (node && node.tag === "iq" && node.attrs.type === "result") {
1431
- const groups = node.content;
1432
-
1433
- if (Array.isArray(groups)) {
1434
- for (const group of groups) {
1435
- const groupId = group.attrs.id + "@g.us";
1436
-
1437
- if (group && Array.isArray(group.content)) {
1438
- for (const item of group.content) {
1439
- if (
1440
- item.tag === "linked_parent" &&
1441
- item.attrs &&
1442
- item.attrs.jid
1443
- ) {
1444
- linkedParentMap[groupId] = item.attrs.jid;
1445
- }
1446
- }
1447
- }
1448
- }
1449
- }
1450
- }
1451
- });
1452
- ev.on('call', ([call]) => {
1453
- // missed call + group call notification message generation
1454
- if (call.status === 'timeout' || (call.status === 'offer' && call.isGroup)) {
1455
- const msg = {
1456
- key: {
1457
- remoteJid: call.chatId,
1458
- id: call.id,
1459
- fromMe: false
1460
- },
1461
- messageTimestamp: Utils_1.unixTimestampSeconds(call.date),
1462
- }
1463
-
1464
- if (call.status === 'timeout') {
1465
- if (call.isGroup) {
1466
- msg.messageStubType = call.isVideo ? Types_1.WAMessageStubType.CALL_MISSED_GROUP_VIDEO : Types_1.WAMessageStubType.CALL_MISSED_GROUP_VOICE
1467
- }
1468
-
1469
- else {
1470
- msg.messageStubType = call.isVideo ? Types_1.WAMessageStubType.CALL_MISSED_VIDEO : Types_1.WAMessageStubType.CALL_MISSED_VOICE
1471
- }
1472
- }
1473
-
1474
- else {
1475
- msg.message = { call: { callKey: Buffer.from(call.id) } }
1476
- }
1477
-
1478
- const protoMsg = WAProto_1.proto.WebMessageInfo.fromObject(msg)
1479
- upsertMessage(protoMsg, call.offline ? 'append' : 'notify')
1480
- }
1481
- })
1482
-
1483
- ev.on('connection.update', ({ isOnline }) => {
1484
- if (typeof isOnline !== 'undefined') {
1485
- sendActiveReceipts = isOnline
1486
- logger.trace(`sendActiveReceipts set to "${sendActiveReceipts}"`)
1487
- }
1488
- })
1489
-
1490
- return {
1491
- ...baron,
1492
- sendMessageAck,
1493
- sendRetryRequest,
1494
- offerCall,
1495
- rejectCall,
1496
- nodelogger,
1497
- setNodeLoggerListener,
1498
- fetchMessageHistory,
1499
- requestPlaceholderResend,
1500
- messageRetryManager
1501
- }
1502
- }
1503
-
1504
- module.exports = {
1505
- makeMessagesRecvSocket
1506
- }