@nexustechpro/baileys 1.0.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (101) hide show
  1. package/README.md +1573 -0
  2. package/WAProto/fix-imports.js +29 -0
  3. package/WAProto/index.js +169659 -0
  4. package/lib/Defaults/index.js +115 -0
  5. package/lib/Signal/Group/ciphertext-message.js +12 -0
  6. package/lib/Signal/Group/group-session-builder.js +30 -0
  7. package/lib/Signal/Group/group_cipher.js +82 -0
  8. package/lib/Signal/Group/index.js +12 -0
  9. package/lib/Signal/Group/keyhelper.js +18 -0
  10. package/lib/Signal/Group/sender-chain-key.js +26 -0
  11. package/lib/Signal/Group/sender-key-distribution-message.js +63 -0
  12. package/lib/Signal/Group/sender-key-message.js +66 -0
  13. package/lib/Signal/Group/sender-key-name.js +48 -0
  14. package/lib/Signal/Group/sender-key-record.js +41 -0
  15. package/lib/Signal/Group/sender-key-state.js +84 -0
  16. package/lib/Signal/Group/sender-message-key.js +26 -0
  17. package/lib/Signal/libsignal.js +342 -0
  18. package/lib/Signal/lid-mapping.js +171 -0
  19. package/lib/Socket/Client/index.js +3 -0
  20. package/lib/Socket/Client/types.js +11 -0
  21. package/lib/Socket/Client/websocket.js +91 -0
  22. package/lib/Socket/business.js +376 -0
  23. package/lib/Socket/chats.js +963 -0
  24. package/lib/Socket/communities.js +431 -0
  25. package/lib/Socket/groups.js +328 -0
  26. package/lib/Socket/index.js +19 -0
  27. package/lib/Socket/messages-recv.js +1240 -0
  28. package/lib/Socket/messages-send.js +1370 -0
  29. package/lib/Socket/mex.js +42 -0
  30. package/lib/Socket/newsletter.js +202 -0
  31. package/lib/Socket/nexus-handler.js +667 -0
  32. package/lib/Socket/socket.js +871 -0
  33. package/lib/Store/index.js +4 -0
  34. package/lib/Store/make-cache-manager-store.js +81 -0
  35. package/lib/Store/make-in-memory-store.js +416 -0
  36. package/lib/Store/make-ordered-dictionary.js +82 -0
  37. package/lib/Store/object-repository.js +31 -0
  38. package/lib/Types/Auth.js +2 -0
  39. package/lib/Types/Bussines.js +2 -0
  40. package/lib/Types/Call.js +2 -0
  41. package/lib/Types/Chat.js +8 -0
  42. package/lib/Types/Contact.js +2 -0
  43. package/lib/Types/Events.js +2 -0
  44. package/lib/Types/GroupMetadata.js +2 -0
  45. package/lib/Types/Label.js +25 -0
  46. package/lib/Types/LabelAssociation.js +7 -0
  47. package/lib/Types/Message.js +11 -0
  48. package/lib/Types/Newsletter.js +31 -0
  49. package/lib/Types/Product.js +2 -0
  50. package/lib/Types/Signal.js +2 -0
  51. package/lib/Types/Socket.js +3 -0
  52. package/lib/Types/State.js +13 -0
  53. package/lib/Types/USync.js +2 -0
  54. package/lib/Types/index.js +26 -0
  55. package/lib/Utils/auth-utils.js +257 -0
  56. package/lib/Utils/baileys-event-stream.js +56 -0
  57. package/lib/Utils/browser-utils.js +28 -0
  58. package/lib/Utils/business.js +231 -0
  59. package/lib/Utils/chat-utils.js +763 -0
  60. package/lib/Utils/crypto.js +142 -0
  61. package/lib/Utils/decode-wa-message.js +279 -0
  62. package/lib/Utils/event-buffer.js +548 -0
  63. package/lib/Utils/generics.js +381 -0
  64. package/lib/Utils/history.js +84 -0
  65. package/lib/Utils/index.js +20 -0
  66. package/lib/Utils/link-preview.js +85 -0
  67. package/lib/Utils/logger.js +3 -0
  68. package/lib/Utils/lt-hash.js +48 -0
  69. package/lib/Utils/make-mutex.js +40 -0
  70. package/lib/Utils/message-retry-manager.js +149 -0
  71. package/lib/Utils/messages-media.js +685 -0
  72. package/lib/Utils/messages.js +820 -0
  73. package/lib/Utils/noise-handler.js +147 -0
  74. package/lib/Utils/pre-key-manager.js +106 -0
  75. package/lib/Utils/process-message.js +413 -0
  76. package/lib/Utils/signal.js +159 -0
  77. package/lib/Utils/use-multi-file-auth-state.js +121 -0
  78. package/lib/Utils/validate-connection.js +195 -0
  79. package/lib/WABinary/constants.js +1301 -0
  80. package/lib/WABinary/decode.js +238 -0
  81. package/lib/WABinary/encode.js +216 -0
  82. package/lib/WABinary/generic-utils.js +111 -0
  83. package/lib/WABinary/index.js +6 -0
  84. package/lib/WABinary/jid-utils.js +96 -0
  85. package/lib/WABinary/types.js +2 -0
  86. package/lib/WAM/BinaryInfo.js +10 -0
  87. package/lib/WAM/constants.js +22853 -0
  88. package/lib/WAM/encode.js +150 -0
  89. package/lib/WAM/index.js +4 -0
  90. package/lib/WAUSync/Protocols/USyncContactProtocol.js +29 -0
  91. package/lib/WAUSync/Protocols/USyncDeviceProtocol.js +54 -0
  92. package/lib/WAUSync/Protocols/USyncDisappearingModeProtocol.js +27 -0
  93. package/lib/WAUSync/Protocols/USyncStatusProtocol.js +38 -0
  94. package/lib/WAUSync/Protocols/UsyncBotProfileProtocol.js +51 -0
  95. package/lib/WAUSync/Protocols/UsyncLIDProtocol.js +29 -0
  96. package/lib/WAUSync/Protocols/index.js +5 -0
  97. package/lib/WAUSync/USyncQuery.js +94 -0
  98. package/lib/WAUSync/USyncUser.js +23 -0
  99. package/lib/WAUSync/index.js +4 -0
  100. package/lib/index.js +24 -0
  101. package/package.json +113 -0
@@ -0,0 +1,147 @@
1
+ import { Boom } from '@hapi/boom';
2
+ import { proto } from '../../WAProto/index.js';
3
+ import { NOISE_MODE, WA_CERT_DETAILS } from '../Defaults/index.js';
4
+ import { decodeBinaryNode } from '../WABinary/index.js';
5
+ import { aesDecryptGCM, aesEncryptGCM, Curve, hkdf, sha256 } from './crypto.js';
6
+ const generateIV = (counter) => {
7
+ const iv = new ArrayBuffer(12);
8
+ new DataView(iv).setUint32(8, counter);
9
+ return new Uint8Array(iv);
10
+ };
11
+ export const makeNoiseHandler = ({ keyPair: { private: privateKey, public: publicKey }, NOISE_HEADER, logger, routingInfo }) => {
12
+ logger = logger.child({ class: 'ns' });
13
+ const authenticate = (data) => {
14
+ if (!isFinished) {
15
+ hash = sha256(Buffer.concat([hash, data]));
16
+ }
17
+ };
18
+ const encrypt = (plaintext) => {
19
+ const result = aesEncryptGCM(plaintext, encKey, generateIV(writeCounter), hash);
20
+ writeCounter += 1;
21
+ authenticate(result);
22
+ return result;
23
+ };
24
+ const decrypt = (ciphertext) => {
25
+ // before the handshake is finished, we use the same counter
26
+ // after handshake, the counters are different
27
+ const iv = generateIV(isFinished ? readCounter : writeCounter);
28
+ const result = aesDecryptGCM(ciphertext, decKey, iv, hash);
29
+ if (isFinished) {
30
+ readCounter += 1;
31
+ }
32
+ else {
33
+ writeCounter += 1;
34
+ }
35
+ authenticate(ciphertext);
36
+ return result;
37
+ };
38
+ const localHKDF = async (data) => {
39
+ const key = await hkdf(Buffer.from(data), 64, { salt, info: '' });
40
+ return [key.slice(0, 32), key.slice(32)];
41
+ };
42
+ const mixIntoKey = async (data) => {
43
+ const [write, read] = await localHKDF(data);
44
+ salt = write;
45
+ encKey = read;
46
+ decKey = read;
47
+ readCounter = 0;
48
+ writeCounter = 0;
49
+ };
50
+ const finishInit = async () => {
51
+ const [write, read] = await localHKDF(new Uint8Array(0));
52
+ encKey = write;
53
+ decKey = read;
54
+ hash = Buffer.from([]);
55
+ readCounter = 0;
56
+ writeCounter = 0;
57
+ isFinished = true;
58
+ };
59
+ const data = Buffer.from(NOISE_MODE);
60
+ let hash = data.byteLength === 32 ? data : sha256(data);
61
+ let salt = hash;
62
+ let encKey = hash;
63
+ let decKey = hash;
64
+ let readCounter = 0;
65
+ let writeCounter = 0;
66
+ let isFinished = false;
67
+ let sentIntro = false;
68
+ let inBytes = Buffer.alloc(0);
69
+ authenticate(NOISE_HEADER);
70
+ authenticate(publicKey);
71
+ return {
72
+ encrypt,
73
+ decrypt,
74
+ authenticate,
75
+ mixIntoKey,
76
+ finishInit,
77
+ processHandshake: async ({ serverHello }, noiseKey) => {
78
+ authenticate(serverHello.ephemeral);
79
+ await mixIntoKey(Curve.sharedKey(privateKey, serverHello.ephemeral));
80
+ const decStaticContent = decrypt(serverHello.static);
81
+ await mixIntoKey(Curve.sharedKey(privateKey, decStaticContent));
82
+ const certDecoded = decrypt(serverHello.payload);
83
+ const { intermediate: certIntermediate /*leaf*/ } = proto.CertChain.decode(certDecoded);
84
+ // TODO: handle this leaf stuff
85
+ const { issuerSerial } = proto.CertChain.NoiseCertificate.Details.decode(certIntermediate.details);
86
+ if (issuerSerial !== WA_CERT_DETAILS.SERIAL) {
87
+ throw new Boom('certification match failed', { statusCode: 400 });
88
+ }
89
+ const keyEnc = encrypt(noiseKey.public);
90
+ await mixIntoKey(Curve.sharedKey(noiseKey.private, serverHello.ephemeral));
91
+ return keyEnc;
92
+ },
93
+ encodeFrame: (data) => {
94
+ if (isFinished) {
95
+ data = encrypt(data);
96
+ }
97
+ let header;
98
+ if (routingInfo) {
99
+ header = Buffer.alloc(7);
100
+ header.write('ED', 0, 'utf8');
101
+ header.writeUint8(0, 2);
102
+ header.writeUint8(1, 3);
103
+ header.writeUint8(routingInfo.byteLength >> 16, 4);
104
+ header.writeUint16BE(routingInfo.byteLength & 65535, 5);
105
+ header = Buffer.concat([header, routingInfo, NOISE_HEADER]);
106
+ }
107
+ else {
108
+ header = Buffer.from(NOISE_HEADER);
109
+ }
110
+ const introSize = sentIntro ? 0 : header.length;
111
+ const frame = Buffer.alloc(introSize + 3 + data.byteLength);
112
+ if (!sentIntro) {
113
+ frame.set(header);
114
+ sentIntro = true;
115
+ }
116
+ frame.writeUInt8(data.byteLength >> 16, introSize);
117
+ frame.writeUInt16BE(65535 & data.byteLength, introSize + 1);
118
+ frame.set(data, introSize + 3);
119
+ return frame;
120
+ },
121
+ decodeFrame: async (newData, onFrame) => {
122
+ // the binary protocol uses its own framing mechanism
123
+ // on top of the WS frames
124
+ // so we get this data and separate out the frames
125
+ const getBytesSize = () => {
126
+ if (inBytes.length >= 3) {
127
+ return (inBytes.readUInt8() << 16) | inBytes.readUInt16BE(1);
128
+ }
129
+ };
130
+ inBytes = Buffer.concat([inBytes, newData]);
131
+ logger.trace(`recv ${newData.length} bytes, total recv ${inBytes.length} bytes`);
132
+ let size = getBytesSize();
133
+ while (size && inBytes.length >= size + 3) {
134
+ let frame = inBytes.slice(3, size + 3);
135
+ inBytes = inBytes.slice(size + 3);
136
+ if (isFinished) {
137
+ const result = decrypt(frame);
138
+ frame = await decodeBinaryNode(result);
139
+ }
140
+ logger.trace({ msg: frame?.attrs?.id }, 'recv frame');
141
+ onFrame(frame);
142
+ size = getBytesSize();
143
+ }
144
+ }
145
+ };
146
+ };
147
+ //# sourceMappingURL=noise-handler.js.map
@@ -0,0 +1,106 @@
1
+ import PQueue from 'p-queue';
2
+ /**
3
+ * Manages pre-key operations with proper concurrency control
4
+ */
5
+ export class PreKeyManager {
6
+ constructor(store, logger) {
7
+ this.store = store;
8
+ this.logger = logger;
9
+ this.queues = new Map();
10
+ }
11
+ /**
12
+ * Get or create a queue for a specific key type
13
+ */
14
+ getQueue(keyType) {
15
+ if (!this.queues.has(keyType)) {
16
+ this.queues.set(keyType, new PQueue({ concurrency: 1 }));
17
+ }
18
+ return this.queues.get(keyType);
19
+ }
20
+ /**
21
+ * Process pre-key operations (updates and deletions)
22
+ */
23
+ async processOperations(data, keyType, transactionCache, mutations, isInTransaction) {
24
+ const keyData = data[keyType];
25
+ if (!keyData)
26
+ return;
27
+ return this.getQueue(keyType).add(async () => {
28
+ // Ensure structures exist
29
+ transactionCache[keyType] = transactionCache[keyType] || {};
30
+ mutations[keyType] = mutations[keyType] || {};
31
+ // Separate deletions from updates
32
+ const deletions = [];
33
+ const updates = {};
34
+ for (const keyId in keyData) {
35
+ if (keyData[keyId] === null) {
36
+ deletions.push(keyId);
37
+ }
38
+ else {
39
+ updates[keyId] = keyData[keyId];
40
+ }
41
+ }
42
+ // Process updates (no validation needed)
43
+ if (Object.keys(updates).length > 0) {
44
+ Object.assign(transactionCache[keyType], updates);
45
+ Object.assign(mutations[keyType], updates);
46
+ }
47
+ // Process deletions with validation
48
+ if (deletions.length > 0) {
49
+ await this.processDeletions(keyType, deletions, transactionCache, mutations, isInTransaction);
50
+ }
51
+ });
52
+ }
53
+ /**
54
+ * Process deletions with validation
55
+ */
56
+ async processDeletions(keyType, ids, transactionCache, mutations, isInTransaction) {
57
+ if (isInTransaction) {
58
+ // In transaction, only allow deletion if key exists in cache
59
+ for (const keyId of ids) {
60
+ if (transactionCache[keyType]?.[keyId]) {
61
+ transactionCache[keyType][keyId] = null;
62
+ mutations[keyType][keyId] = null;
63
+ }
64
+ else {
65
+ this.logger.warn(`Skipping deletion of non-existent ${keyType} in transaction: ${keyId}`);
66
+ }
67
+ }
68
+ }
69
+ else {
70
+ // Outside transaction, validate against store
71
+ const existingKeys = await this.store.get(keyType, ids);
72
+ for (const keyId of ids) {
73
+ if (existingKeys[keyId]) {
74
+ transactionCache[keyType][keyId] = null;
75
+ mutations[keyType][keyId] = null;
76
+ }
77
+ else {
78
+ this.logger.warn(`Skipping deletion of non-existent ${keyType}: ${keyId}`);
79
+ }
80
+ }
81
+ }
82
+ }
83
+ /**
84
+ * Validate and process pre-key deletions outside transactions
85
+ */
86
+ async validateDeletions(data, keyType) {
87
+ const keyData = data[keyType];
88
+ if (!keyData)
89
+ return;
90
+ return this.getQueue(keyType).add(async () => {
91
+ // Find all deletion requests
92
+ const deletionIds = Object.keys(keyData).filter(id => keyData[id] === null);
93
+ if (deletionIds.length === 0)
94
+ return;
95
+ // Validate deletions
96
+ const existingKeys = await this.store.get(keyType, deletionIds);
97
+ for (const keyId of deletionIds) {
98
+ if (!existingKeys[keyId]) {
99
+ this.logger.warn(`Skipping deletion of non-existent ${keyType}: ${keyId}`);
100
+ delete data[keyType][keyId];
101
+ }
102
+ }
103
+ });
104
+ }
105
+ }
106
+ //# sourceMappingURL=pre-key-manager.js.map
@@ -0,0 +1,413 @@
1
+ import { proto } from '../../WAProto/index.js';
2
+ import { WAMessageStubType } from '../Types/index.js';
3
+ import { getContentType, normalizeMessageContent } from '../Utils/messages.js';
4
+ import { areJidsSameUser, isHostedLidUser, isHostedPnUser, isJidBroadcast, isJidStatusBroadcast, jidDecode, jidEncode, jidNormalizedUser } from '../WABinary/index.js';
5
+ import { aesDecryptGCM, hmacSign } from './crypto.js';
6
+ import { toNumber } from './generics.js';
7
+ import { downloadAndProcessHistorySyncNotification } from './history.js';
8
+ const REAL_MSG_STUB_TYPES = new Set([
9
+ WAMessageStubType.CALL_MISSED_GROUP_VIDEO,
10
+ WAMessageStubType.CALL_MISSED_GROUP_VOICE,
11
+ WAMessageStubType.CALL_MISSED_VIDEO,
12
+ WAMessageStubType.CALL_MISSED_VOICE
13
+ ]);
14
+ const REAL_MSG_REQ_ME_STUB_TYPES = new Set([WAMessageStubType.GROUP_PARTICIPANT_ADD]);
15
+ /** Cleans a received message to further processing */
16
+ export const cleanMessage = (message, meId, meLid) => {
17
+ // ensure remoteJid and participant doesn't have device or agent in it
18
+ if (isHostedPnUser(message.key.remoteJid) || isHostedLidUser(message.key.remoteJid)) {
19
+ message.key.remoteJid = jidEncode(jidDecode(message.key?.remoteJid)?.user, isHostedPnUser(message.key.remoteJid) ? 's.whatsapp.net' : 'lid');
20
+ }
21
+ else {
22
+ message.key.remoteJid = jidNormalizedUser(message.key.remoteJid);
23
+ }
24
+ if (isHostedPnUser(message.key.participant) || isHostedLidUser(message.key.participant)) {
25
+ message.key.participant = jidEncode(jidDecode(message.key.participant)?.user, isHostedPnUser(message.key.participant) ? 's.whatsapp.net' : 'lid');
26
+ }
27
+ else {
28
+ message.key.participant = jidNormalizedUser(message.key.participant);
29
+ }
30
+ const content = normalizeMessageContent(message.message);
31
+ // if the message has a reaction, ensure fromMe & remoteJid are from our perspective
32
+ if (content?.reactionMessage) {
33
+ normaliseKey(content.reactionMessage.key);
34
+ }
35
+ if (content?.pollUpdateMessage) {
36
+ normaliseKey(content.pollUpdateMessage.pollCreationMessageKey);
37
+ }
38
+ function normaliseKey(msgKey) {
39
+ // if the reaction is from another user
40
+ // we've to correctly map the key to this user's perspective
41
+ if (!message.key.fromMe) {
42
+ // if the sender believed the message being reacted to is not from them
43
+ // we've to correct the key to be from them, or some other participant
44
+ msgKey.fromMe = !msgKey.fromMe
45
+ ? areJidsSameUser(msgKey.participant || msgKey.remoteJid, meId) ||
46
+ areJidsSameUser(msgKey.participant || msgKey.remoteJid, meLid)
47
+ : // if the message being reacted to, was from them
48
+ // fromMe automatically becomes false
49
+ false;
50
+ // set the remoteJid to being the same as the chat the message came from
51
+ // TODO: investigate inconsistencies
52
+ msgKey.remoteJid = message.key.remoteJid;
53
+ // set participant of the message
54
+ msgKey.participant = msgKey.participant || message.key.participant;
55
+ }
56
+ }
57
+ };
58
+ // TODO: target:audit AUDIT THIS FUNCTION AGAIN
59
+ export const isRealMessage = (message) => {
60
+ const normalizedContent = normalizeMessageContent(message.message);
61
+ const hasSomeContent = !!getContentType(normalizedContent);
62
+ return ((!!normalizedContent ||
63
+ REAL_MSG_STUB_TYPES.has(message.messageStubType) ||
64
+ REAL_MSG_REQ_ME_STUB_TYPES.has(message.messageStubType)) &&
65
+ hasSomeContent &&
66
+ !normalizedContent?.protocolMessage &&
67
+ !normalizedContent?.reactionMessage &&
68
+ !normalizedContent?.pollUpdateMessage);
69
+ };
70
+ export const shouldIncrementChatUnread = (message) => !message.key.fromMe && !message.messageStubType;
71
+ /**
72
+ * Get the ID of the chat from the given key.
73
+ * Typically -- that'll be the remoteJid, but for broadcasts, it'll be the participant
74
+ */
75
+ export const getChatId = ({ remoteJid, participant, fromMe }) => {
76
+ if (isJidBroadcast(remoteJid) && !isJidStatusBroadcast(remoteJid) && !fromMe) {
77
+ return participant;
78
+ }
79
+ return remoteJid;
80
+ };
81
+ /**
82
+ * Decrypt a poll vote
83
+ * @param vote encrypted vote
84
+ * @param ctx additional info about the poll required for decryption
85
+ * @returns list of SHA256 options
86
+ */
87
+ export function decryptPollVote({ encPayload, encIv }, { pollCreatorJid, pollMsgId, pollEncKey, voterJid }) {
88
+ const sign = Buffer.concat([
89
+ toBinary(pollMsgId),
90
+ toBinary(pollCreatorJid),
91
+ toBinary(voterJid),
92
+ toBinary('Poll Vote'),
93
+ new Uint8Array([1])
94
+ ]);
95
+ const key0 = hmacSign(pollEncKey, new Uint8Array(32), 'sha256');
96
+ const decKey = hmacSign(sign, key0, 'sha256');
97
+ const aad = toBinary(`${pollMsgId}\u0000${voterJid}`);
98
+ const decrypted = aesDecryptGCM(encPayload, decKey, encIv, aad);
99
+ return proto.Message.PollVoteMessage.decode(decrypted);
100
+ function toBinary(txt) {
101
+ return Buffer.from(txt);
102
+ }
103
+ }
104
+ const processMessage = async (message, { shouldProcessHistoryMsg, placeholderResendCache, ev, creds, signalRepository, keyStore, logger, options }) => {
105
+ const meId = creds.me.id;
106
+ const { accountSettings } = creds;
107
+ const chat = { id: jidNormalizedUser(getChatId(message.key)) };
108
+ const isRealMsg = isRealMessage(message);
109
+ if (isRealMsg) {
110
+ chat.messages = [{ message }];
111
+ chat.conversationTimestamp = toNumber(message.messageTimestamp);
112
+ // only increment unread count if not CIPHERTEXT and from another person
113
+ if (shouldIncrementChatUnread(message)) {
114
+ chat.unreadCount = (chat.unreadCount || 0) + 1;
115
+ }
116
+ }
117
+ const content = normalizeMessageContent(message.message);
118
+ // unarchive chat if it's a real message, or someone reacted to our message
119
+ // and we've the unarchive chats setting on
120
+ if ((isRealMsg || content?.reactionMessage?.key?.fromMe) && accountSettings?.unarchiveChats) {
121
+ chat.archived = false;
122
+ chat.readOnly = false;
123
+ }
124
+ const protocolMsg = content?.protocolMessage;
125
+ if (protocolMsg) {
126
+ switch (protocolMsg.type) {
127
+ case proto.Message.ProtocolMessage.Type.HISTORY_SYNC_NOTIFICATION:
128
+ const histNotification = protocolMsg.historySyncNotification;
129
+ const process = shouldProcessHistoryMsg;
130
+ const isLatest = !creds.processedHistoryMessages?.length;
131
+ logger?.info({
132
+ histNotification,
133
+ process,
134
+ id: message.key.id,
135
+ isLatest
136
+ }, 'got history notification');
137
+ if (process) {
138
+ // TODO: investigate
139
+ if (histNotification.syncType !== proto.HistorySync.HistorySyncType.ON_DEMAND) {
140
+ ev.emit('creds.update', {
141
+ processedHistoryMessages: [
142
+ ...(creds.processedHistoryMessages || []),
143
+ { key: message.key, messageTimestamp: message.messageTimestamp }
144
+ ]
145
+ });
146
+ }
147
+ const data = await downloadAndProcessHistorySyncNotification(histNotification, options);
148
+ ev.emit('messaging-history.set', {
149
+ ...data,
150
+ isLatest: histNotification.syncType !== proto.HistorySync.HistorySyncType.ON_DEMAND ? isLatest : undefined,
151
+ peerDataRequestSessionId: histNotification.peerDataRequestSessionId
152
+ });
153
+ }
154
+ break;
155
+ case proto.Message.ProtocolMessage.Type.APP_STATE_SYNC_KEY_SHARE:
156
+ const keys = protocolMsg.appStateSyncKeyShare.keys;
157
+ if (keys?.length) {
158
+ let newAppStateSyncKeyId = '';
159
+ await keyStore.transaction(async () => {
160
+ const newKeys = [];
161
+ for (const { keyData, keyId } of keys) {
162
+ const strKeyId = Buffer.from(keyId.keyId).toString('base64');
163
+ newKeys.push(strKeyId);
164
+ await keyStore.set({ 'app-state-sync-key': { [strKeyId]: keyData } });
165
+ newAppStateSyncKeyId = strKeyId;
166
+ }
167
+ logger?.info({ newAppStateSyncKeyId, newKeys }, 'injecting new app state sync keys');
168
+ }, meId);
169
+ ev.emit('creds.update', { myAppStateKeyId: newAppStateSyncKeyId });
170
+ }
171
+ else {
172
+ logger?.info({ protocolMsg }, 'recv app state sync with 0 keys');
173
+ }
174
+ break;
175
+ case proto.Message.ProtocolMessage.Type.REVOKE:
176
+ ev.emit('messages.update', [
177
+ {
178
+ key: {
179
+ ...message.key,
180
+ id: protocolMsg.key.id
181
+ },
182
+ update: { message: null, messageStubType: WAMessageStubType.REVOKE, key: message.key }
183
+ }
184
+ ]);
185
+ break;
186
+ case proto.Message.ProtocolMessage.Type.EPHEMERAL_SETTING:
187
+ Object.assign(chat, {
188
+ ephemeralSettingTimestamp: toNumber(message.messageTimestamp),
189
+ ephemeralExpiration: protocolMsg.ephemeralExpiration || null
190
+ });
191
+ break;
192
+ case proto.Message.ProtocolMessage.Type.PEER_DATA_OPERATION_REQUEST_RESPONSE_MESSAGE:
193
+ const response = protocolMsg.peerDataOperationRequestResponseMessage;
194
+ if (response) {
195
+ await placeholderResendCache?.del(response.stanzaId);
196
+ // TODO: IMPLEMENT HISTORY SYNC ETC (sticker uploads etc.).
197
+ const { peerDataOperationResult } = response;
198
+ for (const result of peerDataOperationResult) {
199
+ const { placeholderMessageResendResponse: retryResponse } = result;
200
+ //eslint-disable-next-line max-depth
201
+ if (retryResponse) {
202
+ const webMessageInfo = proto.WebMessageInfo.decode(retryResponse.webMessageInfoBytes);
203
+ // wait till another upsert event is available, don't want it to be part of the PDO response message
204
+ // TODO: parse through proper message handling utilities (to add relevant key fields)
205
+ setTimeout(() => {
206
+ ev.emit('messages.upsert', {
207
+ messages: [webMessageInfo],
208
+ type: 'notify',
209
+ requestId: response.stanzaId
210
+ });
211
+ }, 500);
212
+ }
213
+ }
214
+ }
215
+ break;
216
+ case proto.Message.ProtocolMessage.Type.MESSAGE_EDIT:
217
+ ev.emit('messages.update', [
218
+ {
219
+ // flip the sender / fromMe properties because they're in the perspective of the sender
220
+ key: { ...message.key, id: protocolMsg.key?.id },
221
+ update: {
222
+ message: {
223
+ editedMessage: {
224
+ message: protocolMsg.editedMessage
225
+ }
226
+ },
227
+ messageTimestamp: protocolMsg.timestampMs
228
+ ? Math.floor(toNumber(protocolMsg.timestampMs) / 1000)
229
+ : message.messageTimestamp
230
+ }
231
+ }
232
+ ]);
233
+ break;
234
+ case proto.Message.ProtocolMessage.Type.LID_MIGRATION_MAPPING_SYNC:
235
+ const encodedPayload = protocolMsg.lidMigrationMappingSyncMessage?.encodedMappingPayload;
236
+ const { pnToLidMappings, chatDbMigrationTimestamp } = proto.LIDMigrationMappingSyncPayload.decode(encodedPayload);
237
+ logger?.debug({ pnToLidMappings, chatDbMigrationTimestamp }, 'got lid mappings and chat db migration timestamp');
238
+ const pairs = [];
239
+ for (const { pn, latestLid, assignedLid } of pnToLidMappings) {
240
+ const lid = latestLid || assignedLid;
241
+ pairs.push({ lid: `${lid}@lid`, pn: `${pn}@s.whatsapp.net` });
242
+ }
243
+ await signalRepository.lidMapping.storeLIDPNMappings(pairs);
244
+ if (pairs.length) {
245
+ for (const { pn, lid } of pairs) {
246
+ await signalRepository.migrateSession(pn, lid);
247
+ }
248
+ }
249
+ }
250
+ }
251
+ else if (content?.reactionMessage) {
252
+ const reaction = {
253
+ ...content.reactionMessage,
254
+ key: message.key
255
+ };
256
+ ev.emit('messages.reaction', [
257
+ {
258
+ reaction,
259
+ key: content.reactionMessage?.key
260
+ }
261
+ ]);
262
+ }
263
+ else if (message.messageStubType) {
264
+ const jid = message.key?.remoteJid;
265
+ //let actor = whatsappID (message.participant)
266
+ let participants;
267
+ const emitParticipantsUpdate = (action) => ev.emit('group-participants.update', {
268
+ id: jid,
269
+ author: message.key.participant,
270
+ authorPn: message.key.participantAlt,
271
+ participants,
272
+ action
273
+ });
274
+ const emitGroupUpdate = (update) => {
275
+ ev.emit('groups.update', [
276
+ { id: jid, ...update, author: message.key.participant ?? undefined, authorPn: message.key.participantAlt }
277
+ ]);
278
+ };
279
+ const emitGroupRequestJoin = (participant, action, method) => {
280
+ ev.emit('group.join-request', {
281
+ id: jid,
282
+ author: message.key.participant,
283
+ authorPn: message.key.participantAlt,
284
+ participant: participant.lid,
285
+ participantPn: participant.pn,
286
+ action,
287
+ method: method
288
+ });
289
+ };
290
+ const participantsIncludesMe = () => participants.find(jid => areJidsSameUser(meId, jid.phoneNumber)); // ADD SUPPORT FOR LID
291
+ switch (message.messageStubType) {
292
+ case WAMessageStubType.GROUP_PARTICIPANT_CHANGE_NUMBER:
293
+ participants = message.messageStubParameters.map((a) => JSON.parse(a)) || [];
294
+ emitParticipantsUpdate('modify');
295
+ break;
296
+ case WAMessageStubType.GROUP_PARTICIPANT_LEAVE:
297
+ case WAMessageStubType.GROUP_PARTICIPANT_REMOVE:
298
+ participants = message.messageStubParameters.map((a) => JSON.parse(a)) || [];
299
+ emitParticipantsUpdate('remove');
300
+ // mark the chat read only if you left the group
301
+ if (participantsIncludesMe()) {
302
+ chat.readOnly = true;
303
+ }
304
+ break;
305
+ case WAMessageStubType.GROUP_PARTICIPANT_ADD:
306
+ case WAMessageStubType.GROUP_PARTICIPANT_INVITE:
307
+ case WAMessageStubType.GROUP_PARTICIPANT_ADD_REQUEST_JOIN:
308
+ participants = message.messageStubParameters.map((a) => JSON.parse(a)) || [];
309
+ if (participantsIncludesMe()) {
310
+ chat.readOnly = false;
311
+ }
312
+ emitParticipantsUpdate('add');
313
+ break;
314
+ case WAMessageStubType.GROUP_PARTICIPANT_DEMOTE:
315
+ participants = message.messageStubParameters.map((a) => JSON.parse(a)) || [];
316
+ emitParticipantsUpdate('demote');
317
+ break;
318
+ case WAMessageStubType.GROUP_PARTICIPANT_PROMOTE:
319
+ participants = message.messageStubParameters.map((a) => JSON.parse(a)) || [];
320
+ emitParticipantsUpdate('promote');
321
+ break;
322
+ case WAMessageStubType.GROUP_CHANGE_ANNOUNCE:
323
+ const announceValue = message.messageStubParameters?.[0];
324
+ emitGroupUpdate({ announce: announceValue === 'true' || announceValue === 'on' });
325
+ break;
326
+ case WAMessageStubType.GROUP_CHANGE_RESTRICT:
327
+ const restrictValue = message.messageStubParameters?.[0];
328
+ emitGroupUpdate({ restrict: restrictValue === 'true' || restrictValue === 'on' });
329
+ break;
330
+ case WAMessageStubType.GROUP_CHANGE_SUBJECT:
331
+ const name = message.messageStubParameters?.[0];
332
+ chat.name = name;
333
+ emitGroupUpdate({ subject: name });
334
+ break;
335
+ case WAMessageStubType.GROUP_CHANGE_DESCRIPTION:
336
+ const description = message.messageStubParameters?.[0];
337
+ chat.description = description;
338
+ emitGroupUpdate({ desc: description });
339
+ break;
340
+ case WAMessageStubType.GROUP_CHANGE_INVITE_LINK:
341
+ const code = message.messageStubParameters?.[0];
342
+ emitGroupUpdate({ inviteCode: code });
343
+ break;
344
+ case WAMessageStubType.GROUP_MEMBER_ADD_MODE:
345
+ const memberAddValue = message.messageStubParameters?.[0];
346
+ emitGroupUpdate({ memberAddMode: memberAddValue === 'all_member_add' });
347
+ break;
348
+ case WAMessageStubType.GROUP_MEMBERSHIP_JOIN_APPROVAL_MODE:
349
+ const approvalMode = message.messageStubParameters?.[0];
350
+ emitGroupUpdate({ joinApprovalMode: approvalMode === 'on' });
351
+ break;
352
+ case WAMessageStubType.GROUP_MEMBERSHIP_JOIN_APPROVAL_REQUEST_NON_ADMIN_ADD: // TODO: Add other events
353
+ const participant = JSON.parse(message.messageStubParameters?.[0]);
354
+ const action = message.messageStubParameters?.[1];
355
+ const method = message.messageStubParameters?.[2];
356
+ emitGroupRequestJoin(participant, action, method);
357
+ break;
358
+ }
359
+ } /* else if(content?.pollUpdateMessage) {
360
+ const creationMsgKey = content.pollUpdateMessage.pollCreationMessageKey!
361
+ // we need to fetch the poll creation message to get the poll enc key
362
+ // TODO: make standalone, remove getMessage reference
363
+ // TODO: Remove entirely
364
+ const pollMsg = await getMessage(creationMsgKey)
365
+ if(pollMsg) {
366
+ const meIdNormalised = jidNormalizedUser(meId)
367
+ const pollCreatorJid = getKeyAuthor(creationMsgKey, meIdNormalised)
368
+ const voterJid = getKeyAuthor(message.key, meIdNormalised)
369
+ const pollEncKey = pollMsg.messageContextInfo?.messageSecret!
370
+
371
+ try {
372
+ const voteMsg = decryptPollVote(
373
+ content.pollUpdateMessage.vote!,
374
+ {
375
+ pollEncKey,
376
+ pollCreatorJid,
377
+ pollMsgId: creationMsgKey.id!,
378
+ voterJid,
379
+ }
380
+ )
381
+ ev.emit('messages.update', [
382
+ {
383
+ key: creationMsgKey,
384
+ update: {
385
+ pollUpdates: [
386
+ {
387
+ pollUpdateMessageKey: message.key,
388
+ vote: voteMsg,
389
+ senderTimestampMs: (content.pollUpdateMessage.senderTimestampMs! as Long).toNumber(),
390
+ }
391
+ ]
392
+ }
393
+ }
394
+ ])
395
+ } catch(err) {
396
+ logger?.warn(
397
+ { err, creationMsgKey },
398
+ 'failed to decrypt poll vote'
399
+ )
400
+ }
401
+ } else {
402
+ logger?.warn(
403
+ { creationMsgKey },
404
+ 'poll creation message not found, cannot decrypt update'
405
+ )
406
+ }
407
+ } */
408
+ if (Object.keys(chat).length > 1) {
409
+ ev.emit('chats.update', [chat]);
410
+ }
411
+ };
412
+ export default processMessage;
413
+ //# sourceMappingURL=process-message.js.map