@nexustechpro/baileys 1.0.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +1573 -0
- package/WAProto/fix-imports.js +29 -0
- package/WAProto/index.js +169659 -0
- package/lib/Defaults/index.js +115 -0
- package/lib/Signal/Group/ciphertext-message.js +12 -0
- package/lib/Signal/Group/group-session-builder.js +30 -0
- package/lib/Signal/Group/group_cipher.js +82 -0
- package/lib/Signal/Group/index.js +12 -0
- package/lib/Signal/Group/keyhelper.js +18 -0
- package/lib/Signal/Group/sender-chain-key.js +26 -0
- package/lib/Signal/Group/sender-key-distribution-message.js +63 -0
- package/lib/Signal/Group/sender-key-message.js +66 -0
- package/lib/Signal/Group/sender-key-name.js +48 -0
- package/lib/Signal/Group/sender-key-record.js +41 -0
- package/lib/Signal/Group/sender-key-state.js +84 -0
- package/lib/Signal/Group/sender-message-key.js +26 -0
- package/lib/Signal/libsignal.js +342 -0
- package/lib/Signal/lid-mapping.js +171 -0
- package/lib/Socket/Client/index.js +3 -0
- package/lib/Socket/Client/types.js +11 -0
- package/lib/Socket/Client/websocket.js +91 -0
- package/lib/Socket/business.js +376 -0
- package/lib/Socket/chats.js +963 -0
- package/lib/Socket/communities.js +431 -0
- package/lib/Socket/groups.js +328 -0
- package/lib/Socket/index.js +19 -0
- package/lib/Socket/messages-recv.js +1240 -0
- package/lib/Socket/messages-send.js +1370 -0
- package/lib/Socket/mex.js +42 -0
- package/lib/Socket/newsletter.js +202 -0
- package/lib/Socket/nexus-handler.js +667 -0
- package/lib/Socket/socket.js +871 -0
- package/lib/Store/index.js +4 -0
- package/lib/Store/make-cache-manager-store.js +81 -0
- package/lib/Store/make-in-memory-store.js +416 -0
- package/lib/Store/make-ordered-dictionary.js +82 -0
- package/lib/Store/object-repository.js +31 -0
- package/lib/Types/Auth.js +2 -0
- package/lib/Types/Bussines.js +2 -0
- package/lib/Types/Call.js +2 -0
- package/lib/Types/Chat.js +8 -0
- package/lib/Types/Contact.js +2 -0
- package/lib/Types/Events.js +2 -0
- package/lib/Types/GroupMetadata.js +2 -0
- package/lib/Types/Label.js +25 -0
- package/lib/Types/LabelAssociation.js +7 -0
- package/lib/Types/Message.js +11 -0
- package/lib/Types/Newsletter.js +31 -0
- package/lib/Types/Product.js +2 -0
- package/lib/Types/Signal.js +2 -0
- package/lib/Types/Socket.js +3 -0
- package/lib/Types/State.js +13 -0
- package/lib/Types/USync.js +2 -0
- package/lib/Types/index.js +26 -0
- package/lib/Utils/auth-utils.js +257 -0
- package/lib/Utils/baileys-event-stream.js +56 -0
- package/lib/Utils/browser-utils.js +28 -0
- package/lib/Utils/business.js +231 -0
- package/lib/Utils/chat-utils.js +763 -0
- package/lib/Utils/crypto.js +142 -0
- package/lib/Utils/decode-wa-message.js +279 -0
- package/lib/Utils/event-buffer.js +548 -0
- package/lib/Utils/generics.js +381 -0
- package/lib/Utils/history.js +84 -0
- package/lib/Utils/index.js +20 -0
- package/lib/Utils/link-preview.js +85 -0
- package/lib/Utils/logger.js +3 -0
- package/lib/Utils/lt-hash.js +48 -0
- package/lib/Utils/make-mutex.js +40 -0
- package/lib/Utils/message-retry-manager.js +149 -0
- package/lib/Utils/messages-media.js +685 -0
- package/lib/Utils/messages.js +820 -0
- package/lib/Utils/noise-handler.js +147 -0
- package/lib/Utils/pre-key-manager.js +106 -0
- package/lib/Utils/process-message.js +413 -0
- package/lib/Utils/signal.js +159 -0
- package/lib/Utils/use-multi-file-auth-state.js +121 -0
- package/lib/Utils/validate-connection.js +195 -0
- package/lib/WABinary/constants.js +1301 -0
- package/lib/WABinary/decode.js +238 -0
- package/lib/WABinary/encode.js +216 -0
- package/lib/WABinary/generic-utils.js +111 -0
- package/lib/WABinary/index.js +6 -0
- package/lib/WABinary/jid-utils.js +96 -0
- package/lib/WABinary/types.js +2 -0
- package/lib/WAM/BinaryInfo.js +10 -0
- package/lib/WAM/constants.js +22853 -0
- package/lib/WAM/encode.js +150 -0
- package/lib/WAM/index.js +4 -0
- package/lib/WAUSync/Protocols/USyncContactProtocol.js +29 -0
- package/lib/WAUSync/Protocols/USyncDeviceProtocol.js +54 -0
- package/lib/WAUSync/Protocols/USyncDisappearingModeProtocol.js +27 -0
- package/lib/WAUSync/Protocols/USyncStatusProtocol.js +38 -0
- package/lib/WAUSync/Protocols/UsyncBotProfileProtocol.js +51 -0
- package/lib/WAUSync/Protocols/UsyncLIDProtocol.js +29 -0
- package/lib/WAUSync/Protocols/index.js +5 -0
- package/lib/WAUSync/USyncQuery.js +94 -0
- package/lib/WAUSync/USyncUser.js +23 -0
- package/lib/WAUSync/index.js +4 -0
- package/lib/index.js +24 -0
- package/package.json +113 -0
|
@@ -0,0 +1,147 @@
|
|
|
1
|
+
import { Boom } from '@hapi/boom';
|
|
2
|
+
import { proto } from '../../WAProto/index.js';
|
|
3
|
+
import { NOISE_MODE, WA_CERT_DETAILS } from '../Defaults/index.js';
|
|
4
|
+
import { decodeBinaryNode } from '../WABinary/index.js';
|
|
5
|
+
import { aesDecryptGCM, aesEncryptGCM, Curve, hkdf, sha256 } from './crypto.js';
|
|
6
|
+
const generateIV = (counter) => {
|
|
7
|
+
const iv = new ArrayBuffer(12);
|
|
8
|
+
new DataView(iv).setUint32(8, counter);
|
|
9
|
+
return new Uint8Array(iv);
|
|
10
|
+
};
|
|
11
|
+
export const makeNoiseHandler = ({ keyPair: { private: privateKey, public: publicKey }, NOISE_HEADER, logger, routingInfo }) => {
|
|
12
|
+
logger = logger.child({ class: 'ns' });
|
|
13
|
+
const authenticate = (data) => {
|
|
14
|
+
if (!isFinished) {
|
|
15
|
+
hash = sha256(Buffer.concat([hash, data]));
|
|
16
|
+
}
|
|
17
|
+
};
|
|
18
|
+
const encrypt = (plaintext) => {
|
|
19
|
+
const result = aesEncryptGCM(plaintext, encKey, generateIV(writeCounter), hash);
|
|
20
|
+
writeCounter += 1;
|
|
21
|
+
authenticate(result);
|
|
22
|
+
return result;
|
|
23
|
+
};
|
|
24
|
+
const decrypt = (ciphertext) => {
|
|
25
|
+
// before the handshake is finished, we use the same counter
|
|
26
|
+
// after handshake, the counters are different
|
|
27
|
+
const iv = generateIV(isFinished ? readCounter : writeCounter);
|
|
28
|
+
const result = aesDecryptGCM(ciphertext, decKey, iv, hash);
|
|
29
|
+
if (isFinished) {
|
|
30
|
+
readCounter += 1;
|
|
31
|
+
}
|
|
32
|
+
else {
|
|
33
|
+
writeCounter += 1;
|
|
34
|
+
}
|
|
35
|
+
authenticate(ciphertext);
|
|
36
|
+
return result;
|
|
37
|
+
};
|
|
38
|
+
const localHKDF = async (data) => {
|
|
39
|
+
const key = await hkdf(Buffer.from(data), 64, { salt, info: '' });
|
|
40
|
+
return [key.slice(0, 32), key.slice(32)];
|
|
41
|
+
};
|
|
42
|
+
const mixIntoKey = async (data) => {
|
|
43
|
+
const [write, read] = await localHKDF(data);
|
|
44
|
+
salt = write;
|
|
45
|
+
encKey = read;
|
|
46
|
+
decKey = read;
|
|
47
|
+
readCounter = 0;
|
|
48
|
+
writeCounter = 0;
|
|
49
|
+
};
|
|
50
|
+
const finishInit = async () => {
|
|
51
|
+
const [write, read] = await localHKDF(new Uint8Array(0));
|
|
52
|
+
encKey = write;
|
|
53
|
+
decKey = read;
|
|
54
|
+
hash = Buffer.from([]);
|
|
55
|
+
readCounter = 0;
|
|
56
|
+
writeCounter = 0;
|
|
57
|
+
isFinished = true;
|
|
58
|
+
};
|
|
59
|
+
const data = Buffer.from(NOISE_MODE);
|
|
60
|
+
let hash = data.byteLength === 32 ? data : sha256(data);
|
|
61
|
+
let salt = hash;
|
|
62
|
+
let encKey = hash;
|
|
63
|
+
let decKey = hash;
|
|
64
|
+
let readCounter = 0;
|
|
65
|
+
let writeCounter = 0;
|
|
66
|
+
let isFinished = false;
|
|
67
|
+
let sentIntro = false;
|
|
68
|
+
let inBytes = Buffer.alloc(0);
|
|
69
|
+
authenticate(NOISE_HEADER);
|
|
70
|
+
authenticate(publicKey);
|
|
71
|
+
return {
|
|
72
|
+
encrypt,
|
|
73
|
+
decrypt,
|
|
74
|
+
authenticate,
|
|
75
|
+
mixIntoKey,
|
|
76
|
+
finishInit,
|
|
77
|
+
processHandshake: async ({ serverHello }, noiseKey) => {
|
|
78
|
+
authenticate(serverHello.ephemeral);
|
|
79
|
+
await mixIntoKey(Curve.sharedKey(privateKey, serverHello.ephemeral));
|
|
80
|
+
const decStaticContent = decrypt(serverHello.static);
|
|
81
|
+
await mixIntoKey(Curve.sharedKey(privateKey, decStaticContent));
|
|
82
|
+
const certDecoded = decrypt(serverHello.payload);
|
|
83
|
+
const { intermediate: certIntermediate /*leaf*/ } = proto.CertChain.decode(certDecoded);
|
|
84
|
+
// TODO: handle this leaf stuff
|
|
85
|
+
const { issuerSerial } = proto.CertChain.NoiseCertificate.Details.decode(certIntermediate.details);
|
|
86
|
+
if (issuerSerial !== WA_CERT_DETAILS.SERIAL) {
|
|
87
|
+
throw new Boom('certification match failed', { statusCode: 400 });
|
|
88
|
+
}
|
|
89
|
+
const keyEnc = encrypt(noiseKey.public);
|
|
90
|
+
await mixIntoKey(Curve.sharedKey(noiseKey.private, serverHello.ephemeral));
|
|
91
|
+
return keyEnc;
|
|
92
|
+
},
|
|
93
|
+
encodeFrame: (data) => {
|
|
94
|
+
if (isFinished) {
|
|
95
|
+
data = encrypt(data);
|
|
96
|
+
}
|
|
97
|
+
let header;
|
|
98
|
+
if (routingInfo) {
|
|
99
|
+
header = Buffer.alloc(7);
|
|
100
|
+
header.write('ED', 0, 'utf8');
|
|
101
|
+
header.writeUint8(0, 2);
|
|
102
|
+
header.writeUint8(1, 3);
|
|
103
|
+
header.writeUint8(routingInfo.byteLength >> 16, 4);
|
|
104
|
+
header.writeUint16BE(routingInfo.byteLength & 65535, 5);
|
|
105
|
+
header = Buffer.concat([header, routingInfo, NOISE_HEADER]);
|
|
106
|
+
}
|
|
107
|
+
else {
|
|
108
|
+
header = Buffer.from(NOISE_HEADER);
|
|
109
|
+
}
|
|
110
|
+
const introSize = sentIntro ? 0 : header.length;
|
|
111
|
+
const frame = Buffer.alloc(introSize + 3 + data.byteLength);
|
|
112
|
+
if (!sentIntro) {
|
|
113
|
+
frame.set(header);
|
|
114
|
+
sentIntro = true;
|
|
115
|
+
}
|
|
116
|
+
frame.writeUInt8(data.byteLength >> 16, introSize);
|
|
117
|
+
frame.writeUInt16BE(65535 & data.byteLength, introSize + 1);
|
|
118
|
+
frame.set(data, introSize + 3);
|
|
119
|
+
return frame;
|
|
120
|
+
},
|
|
121
|
+
decodeFrame: async (newData, onFrame) => {
|
|
122
|
+
// the binary protocol uses its own framing mechanism
|
|
123
|
+
// on top of the WS frames
|
|
124
|
+
// so we get this data and separate out the frames
|
|
125
|
+
const getBytesSize = () => {
|
|
126
|
+
if (inBytes.length >= 3) {
|
|
127
|
+
return (inBytes.readUInt8() << 16) | inBytes.readUInt16BE(1);
|
|
128
|
+
}
|
|
129
|
+
};
|
|
130
|
+
inBytes = Buffer.concat([inBytes, newData]);
|
|
131
|
+
logger.trace(`recv ${newData.length} bytes, total recv ${inBytes.length} bytes`);
|
|
132
|
+
let size = getBytesSize();
|
|
133
|
+
while (size && inBytes.length >= size + 3) {
|
|
134
|
+
let frame = inBytes.slice(3, size + 3);
|
|
135
|
+
inBytes = inBytes.slice(size + 3);
|
|
136
|
+
if (isFinished) {
|
|
137
|
+
const result = decrypt(frame);
|
|
138
|
+
frame = await decodeBinaryNode(result);
|
|
139
|
+
}
|
|
140
|
+
logger.trace({ msg: frame?.attrs?.id }, 'recv frame');
|
|
141
|
+
onFrame(frame);
|
|
142
|
+
size = getBytesSize();
|
|
143
|
+
}
|
|
144
|
+
}
|
|
145
|
+
};
|
|
146
|
+
};
|
|
147
|
+
//# sourceMappingURL=noise-handler.js.map
|
|
@@ -0,0 +1,106 @@
|
|
|
1
|
+
import PQueue from 'p-queue';
|
|
2
|
+
/**
|
|
3
|
+
* Manages pre-key operations with proper concurrency control
|
|
4
|
+
*/
|
|
5
|
+
export class PreKeyManager {
|
|
6
|
+
constructor(store, logger) {
|
|
7
|
+
this.store = store;
|
|
8
|
+
this.logger = logger;
|
|
9
|
+
this.queues = new Map();
|
|
10
|
+
}
|
|
11
|
+
/**
|
|
12
|
+
* Get or create a queue for a specific key type
|
|
13
|
+
*/
|
|
14
|
+
getQueue(keyType) {
|
|
15
|
+
if (!this.queues.has(keyType)) {
|
|
16
|
+
this.queues.set(keyType, new PQueue({ concurrency: 1 }));
|
|
17
|
+
}
|
|
18
|
+
return this.queues.get(keyType);
|
|
19
|
+
}
|
|
20
|
+
/**
|
|
21
|
+
* Process pre-key operations (updates and deletions)
|
|
22
|
+
*/
|
|
23
|
+
async processOperations(data, keyType, transactionCache, mutations, isInTransaction) {
|
|
24
|
+
const keyData = data[keyType];
|
|
25
|
+
if (!keyData)
|
|
26
|
+
return;
|
|
27
|
+
return this.getQueue(keyType).add(async () => {
|
|
28
|
+
// Ensure structures exist
|
|
29
|
+
transactionCache[keyType] = transactionCache[keyType] || {};
|
|
30
|
+
mutations[keyType] = mutations[keyType] || {};
|
|
31
|
+
// Separate deletions from updates
|
|
32
|
+
const deletions = [];
|
|
33
|
+
const updates = {};
|
|
34
|
+
for (const keyId in keyData) {
|
|
35
|
+
if (keyData[keyId] === null) {
|
|
36
|
+
deletions.push(keyId);
|
|
37
|
+
}
|
|
38
|
+
else {
|
|
39
|
+
updates[keyId] = keyData[keyId];
|
|
40
|
+
}
|
|
41
|
+
}
|
|
42
|
+
// Process updates (no validation needed)
|
|
43
|
+
if (Object.keys(updates).length > 0) {
|
|
44
|
+
Object.assign(transactionCache[keyType], updates);
|
|
45
|
+
Object.assign(mutations[keyType], updates);
|
|
46
|
+
}
|
|
47
|
+
// Process deletions with validation
|
|
48
|
+
if (deletions.length > 0) {
|
|
49
|
+
await this.processDeletions(keyType, deletions, transactionCache, mutations, isInTransaction);
|
|
50
|
+
}
|
|
51
|
+
});
|
|
52
|
+
}
|
|
53
|
+
/**
|
|
54
|
+
* Process deletions with validation
|
|
55
|
+
*/
|
|
56
|
+
async processDeletions(keyType, ids, transactionCache, mutations, isInTransaction) {
|
|
57
|
+
if (isInTransaction) {
|
|
58
|
+
// In transaction, only allow deletion if key exists in cache
|
|
59
|
+
for (const keyId of ids) {
|
|
60
|
+
if (transactionCache[keyType]?.[keyId]) {
|
|
61
|
+
transactionCache[keyType][keyId] = null;
|
|
62
|
+
mutations[keyType][keyId] = null;
|
|
63
|
+
}
|
|
64
|
+
else {
|
|
65
|
+
this.logger.warn(`Skipping deletion of non-existent ${keyType} in transaction: ${keyId}`);
|
|
66
|
+
}
|
|
67
|
+
}
|
|
68
|
+
}
|
|
69
|
+
else {
|
|
70
|
+
// Outside transaction, validate against store
|
|
71
|
+
const existingKeys = await this.store.get(keyType, ids);
|
|
72
|
+
for (const keyId of ids) {
|
|
73
|
+
if (existingKeys[keyId]) {
|
|
74
|
+
transactionCache[keyType][keyId] = null;
|
|
75
|
+
mutations[keyType][keyId] = null;
|
|
76
|
+
}
|
|
77
|
+
else {
|
|
78
|
+
this.logger.warn(`Skipping deletion of non-existent ${keyType}: ${keyId}`);
|
|
79
|
+
}
|
|
80
|
+
}
|
|
81
|
+
}
|
|
82
|
+
}
|
|
83
|
+
/**
|
|
84
|
+
* Validate and process pre-key deletions outside transactions
|
|
85
|
+
*/
|
|
86
|
+
async validateDeletions(data, keyType) {
|
|
87
|
+
const keyData = data[keyType];
|
|
88
|
+
if (!keyData)
|
|
89
|
+
return;
|
|
90
|
+
return this.getQueue(keyType).add(async () => {
|
|
91
|
+
// Find all deletion requests
|
|
92
|
+
const deletionIds = Object.keys(keyData).filter(id => keyData[id] === null);
|
|
93
|
+
if (deletionIds.length === 0)
|
|
94
|
+
return;
|
|
95
|
+
// Validate deletions
|
|
96
|
+
const existingKeys = await this.store.get(keyType, deletionIds);
|
|
97
|
+
for (const keyId of deletionIds) {
|
|
98
|
+
if (!existingKeys[keyId]) {
|
|
99
|
+
this.logger.warn(`Skipping deletion of non-existent ${keyType}: ${keyId}`);
|
|
100
|
+
delete data[keyType][keyId];
|
|
101
|
+
}
|
|
102
|
+
}
|
|
103
|
+
});
|
|
104
|
+
}
|
|
105
|
+
}
|
|
106
|
+
//# sourceMappingURL=pre-key-manager.js.map
|
|
@@ -0,0 +1,413 @@
|
|
|
1
|
+
import { proto } from '../../WAProto/index.js';
|
|
2
|
+
import { WAMessageStubType } from '../Types/index.js';
|
|
3
|
+
import { getContentType, normalizeMessageContent } from '../Utils/messages.js';
|
|
4
|
+
import { areJidsSameUser, isHostedLidUser, isHostedPnUser, isJidBroadcast, isJidStatusBroadcast, jidDecode, jidEncode, jidNormalizedUser } from '../WABinary/index.js';
|
|
5
|
+
import { aesDecryptGCM, hmacSign } from './crypto.js';
|
|
6
|
+
import { toNumber } from './generics.js';
|
|
7
|
+
import { downloadAndProcessHistorySyncNotification } from './history.js';
|
|
8
|
+
const REAL_MSG_STUB_TYPES = new Set([
|
|
9
|
+
WAMessageStubType.CALL_MISSED_GROUP_VIDEO,
|
|
10
|
+
WAMessageStubType.CALL_MISSED_GROUP_VOICE,
|
|
11
|
+
WAMessageStubType.CALL_MISSED_VIDEO,
|
|
12
|
+
WAMessageStubType.CALL_MISSED_VOICE
|
|
13
|
+
]);
|
|
14
|
+
const REAL_MSG_REQ_ME_STUB_TYPES = new Set([WAMessageStubType.GROUP_PARTICIPANT_ADD]);
|
|
15
|
+
/** Cleans a received message to further processing */
|
|
16
|
+
export const cleanMessage = (message, meId, meLid) => {
|
|
17
|
+
// ensure remoteJid and participant doesn't have device or agent in it
|
|
18
|
+
if (isHostedPnUser(message.key.remoteJid) || isHostedLidUser(message.key.remoteJid)) {
|
|
19
|
+
message.key.remoteJid = jidEncode(jidDecode(message.key?.remoteJid)?.user, isHostedPnUser(message.key.remoteJid) ? 's.whatsapp.net' : 'lid');
|
|
20
|
+
}
|
|
21
|
+
else {
|
|
22
|
+
message.key.remoteJid = jidNormalizedUser(message.key.remoteJid);
|
|
23
|
+
}
|
|
24
|
+
if (isHostedPnUser(message.key.participant) || isHostedLidUser(message.key.participant)) {
|
|
25
|
+
message.key.participant = jidEncode(jidDecode(message.key.participant)?.user, isHostedPnUser(message.key.participant) ? 's.whatsapp.net' : 'lid');
|
|
26
|
+
}
|
|
27
|
+
else {
|
|
28
|
+
message.key.participant = jidNormalizedUser(message.key.participant);
|
|
29
|
+
}
|
|
30
|
+
const content = normalizeMessageContent(message.message);
|
|
31
|
+
// if the message has a reaction, ensure fromMe & remoteJid are from our perspective
|
|
32
|
+
if (content?.reactionMessage) {
|
|
33
|
+
normaliseKey(content.reactionMessage.key);
|
|
34
|
+
}
|
|
35
|
+
if (content?.pollUpdateMessage) {
|
|
36
|
+
normaliseKey(content.pollUpdateMessage.pollCreationMessageKey);
|
|
37
|
+
}
|
|
38
|
+
function normaliseKey(msgKey) {
|
|
39
|
+
// if the reaction is from another user
|
|
40
|
+
// we've to correctly map the key to this user's perspective
|
|
41
|
+
if (!message.key.fromMe) {
|
|
42
|
+
// if the sender believed the message being reacted to is not from them
|
|
43
|
+
// we've to correct the key to be from them, or some other participant
|
|
44
|
+
msgKey.fromMe = !msgKey.fromMe
|
|
45
|
+
? areJidsSameUser(msgKey.participant || msgKey.remoteJid, meId) ||
|
|
46
|
+
areJidsSameUser(msgKey.participant || msgKey.remoteJid, meLid)
|
|
47
|
+
: // if the message being reacted to, was from them
|
|
48
|
+
// fromMe automatically becomes false
|
|
49
|
+
false;
|
|
50
|
+
// set the remoteJid to being the same as the chat the message came from
|
|
51
|
+
// TODO: investigate inconsistencies
|
|
52
|
+
msgKey.remoteJid = message.key.remoteJid;
|
|
53
|
+
// set participant of the message
|
|
54
|
+
msgKey.participant = msgKey.participant || message.key.participant;
|
|
55
|
+
}
|
|
56
|
+
}
|
|
57
|
+
};
|
|
58
|
+
// TODO: target:audit AUDIT THIS FUNCTION AGAIN
|
|
59
|
+
export const isRealMessage = (message) => {
|
|
60
|
+
const normalizedContent = normalizeMessageContent(message.message);
|
|
61
|
+
const hasSomeContent = !!getContentType(normalizedContent);
|
|
62
|
+
return ((!!normalizedContent ||
|
|
63
|
+
REAL_MSG_STUB_TYPES.has(message.messageStubType) ||
|
|
64
|
+
REAL_MSG_REQ_ME_STUB_TYPES.has(message.messageStubType)) &&
|
|
65
|
+
hasSomeContent &&
|
|
66
|
+
!normalizedContent?.protocolMessage &&
|
|
67
|
+
!normalizedContent?.reactionMessage &&
|
|
68
|
+
!normalizedContent?.pollUpdateMessage);
|
|
69
|
+
};
|
|
70
|
+
export const shouldIncrementChatUnread = (message) => !message.key.fromMe && !message.messageStubType;
|
|
71
|
+
/**
|
|
72
|
+
* Get the ID of the chat from the given key.
|
|
73
|
+
* Typically -- that'll be the remoteJid, but for broadcasts, it'll be the participant
|
|
74
|
+
*/
|
|
75
|
+
export const getChatId = ({ remoteJid, participant, fromMe }) => {
|
|
76
|
+
if (isJidBroadcast(remoteJid) && !isJidStatusBroadcast(remoteJid) && !fromMe) {
|
|
77
|
+
return participant;
|
|
78
|
+
}
|
|
79
|
+
return remoteJid;
|
|
80
|
+
};
|
|
81
|
+
/**
|
|
82
|
+
* Decrypt a poll vote
|
|
83
|
+
* @param vote encrypted vote
|
|
84
|
+
* @param ctx additional info about the poll required for decryption
|
|
85
|
+
* @returns list of SHA256 options
|
|
86
|
+
*/
|
|
87
|
+
export function decryptPollVote({ encPayload, encIv }, { pollCreatorJid, pollMsgId, pollEncKey, voterJid }) {
|
|
88
|
+
const sign = Buffer.concat([
|
|
89
|
+
toBinary(pollMsgId),
|
|
90
|
+
toBinary(pollCreatorJid),
|
|
91
|
+
toBinary(voterJid),
|
|
92
|
+
toBinary('Poll Vote'),
|
|
93
|
+
new Uint8Array([1])
|
|
94
|
+
]);
|
|
95
|
+
const key0 = hmacSign(pollEncKey, new Uint8Array(32), 'sha256');
|
|
96
|
+
const decKey = hmacSign(sign, key0, 'sha256');
|
|
97
|
+
const aad = toBinary(`${pollMsgId}\u0000${voterJid}`);
|
|
98
|
+
const decrypted = aesDecryptGCM(encPayload, decKey, encIv, aad);
|
|
99
|
+
return proto.Message.PollVoteMessage.decode(decrypted);
|
|
100
|
+
function toBinary(txt) {
|
|
101
|
+
return Buffer.from(txt);
|
|
102
|
+
}
|
|
103
|
+
}
|
|
104
|
+
const processMessage = async (message, { shouldProcessHistoryMsg, placeholderResendCache, ev, creds, signalRepository, keyStore, logger, options }) => {
|
|
105
|
+
const meId = creds.me.id;
|
|
106
|
+
const { accountSettings } = creds;
|
|
107
|
+
const chat = { id: jidNormalizedUser(getChatId(message.key)) };
|
|
108
|
+
const isRealMsg = isRealMessage(message);
|
|
109
|
+
if (isRealMsg) {
|
|
110
|
+
chat.messages = [{ message }];
|
|
111
|
+
chat.conversationTimestamp = toNumber(message.messageTimestamp);
|
|
112
|
+
// only increment unread count if not CIPHERTEXT and from another person
|
|
113
|
+
if (shouldIncrementChatUnread(message)) {
|
|
114
|
+
chat.unreadCount = (chat.unreadCount || 0) + 1;
|
|
115
|
+
}
|
|
116
|
+
}
|
|
117
|
+
const content = normalizeMessageContent(message.message);
|
|
118
|
+
// unarchive chat if it's a real message, or someone reacted to our message
|
|
119
|
+
// and we've the unarchive chats setting on
|
|
120
|
+
if ((isRealMsg || content?.reactionMessage?.key?.fromMe) && accountSettings?.unarchiveChats) {
|
|
121
|
+
chat.archived = false;
|
|
122
|
+
chat.readOnly = false;
|
|
123
|
+
}
|
|
124
|
+
const protocolMsg = content?.protocolMessage;
|
|
125
|
+
if (protocolMsg) {
|
|
126
|
+
switch (protocolMsg.type) {
|
|
127
|
+
case proto.Message.ProtocolMessage.Type.HISTORY_SYNC_NOTIFICATION:
|
|
128
|
+
const histNotification = protocolMsg.historySyncNotification;
|
|
129
|
+
const process = shouldProcessHistoryMsg;
|
|
130
|
+
const isLatest = !creds.processedHistoryMessages?.length;
|
|
131
|
+
logger?.info({
|
|
132
|
+
histNotification,
|
|
133
|
+
process,
|
|
134
|
+
id: message.key.id,
|
|
135
|
+
isLatest
|
|
136
|
+
}, 'got history notification');
|
|
137
|
+
if (process) {
|
|
138
|
+
// TODO: investigate
|
|
139
|
+
if (histNotification.syncType !== proto.HistorySync.HistorySyncType.ON_DEMAND) {
|
|
140
|
+
ev.emit('creds.update', {
|
|
141
|
+
processedHistoryMessages: [
|
|
142
|
+
...(creds.processedHistoryMessages || []),
|
|
143
|
+
{ key: message.key, messageTimestamp: message.messageTimestamp }
|
|
144
|
+
]
|
|
145
|
+
});
|
|
146
|
+
}
|
|
147
|
+
const data = await downloadAndProcessHistorySyncNotification(histNotification, options);
|
|
148
|
+
ev.emit('messaging-history.set', {
|
|
149
|
+
...data,
|
|
150
|
+
isLatest: histNotification.syncType !== proto.HistorySync.HistorySyncType.ON_DEMAND ? isLatest : undefined,
|
|
151
|
+
peerDataRequestSessionId: histNotification.peerDataRequestSessionId
|
|
152
|
+
});
|
|
153
|
+
}
|
|
154
|
+
break;
|
|
155
|
+
case proto.Message.ProtocolMessage.Type.APP_STATE_SYNC_KEY_SHARE:
|
|
156
|
+
const keys = protocolMsg.appStateSyncKeyShare.keys;
|
|
157
|
+
if (keys?.length) {
|
|
158
|
+
let newAppStateSyncKeyId = '';
|
|
159
|
+
await keyStore.transaction(async () => {
|
|
160
|
+
const newKeys = [];
|
|
161
|
+
for (const { keyData, keyId } of keys) {
|
|
162
|
+
const strKeyId = Buffer.from(keyId.keyId).toString('base64');
|
|
163
|
+
newKeys.push(strKeyId);
|
|
164
|
+
await keyStore.set({ 'app-state-sync-key': { [strKeyId]: keyData } });
|
|
165
|
+
newAppStateSyncKeyId = strKeyId;
|
|
166
|
+
}
|
|
167
|
+
logger?.info({ newAppStateSyncKeyId, newKeys }, 'injecting new app state sync keys');
|
|
168
|
+
}, meId);
|
|
169
|
+
ev.emit('creds.update', { myAppStateKeyId: newAppStateSyncKeyId });
|
|
170
|
+
}
|
|
171
|
+
else {
|
|
172
|
+
logger?.info({ protocolMsg }, 'recv app state sync with 0 keys');
|
|
173
|
+
}
|
|
174
|
+
break;
|
|
175
|
+
case proto.Message.ProtocolMessage.Type.REVOKE:
|
|
176
|
+
ev.emit('messages.update', [
|
|
177
|
+
{
|
|
178
|
+
key: {
|
|
179
|
+
...message.key,
|
|
180
|
+
id: protocolMsg.key.id
|
|
181
|
+
},
|
|
182
|
+
update: { message: null, messageStubType: WAMessageStubType.REVOKE, key: message.key }
|
|
183
|
+
}
|
|
184
|
+
]);
|
|
185
|
+
break;
|
|
186
|
+
case proto.Message.ProtocolMessage.Type.EPHEMERAL_SETTING:
|
|
187
|
+
Object.assign(chat, {
|
|
188
|
+
ephemeralSettingTimestamp: toNumber(message.messageTimestamp),
|
|
189
|
+
ephemeralExpiration: protocolMsg.ephemeralExpiration || null
|
|
190
|
+
});
|
|
191
|
+
break;
|
|
192
|
+
case proto.Message.ProtocolMessage.Type.PEER_DATA_OPERATION_REQUEST_RESPONSE_MESSAGE:
|
|
193
|
+
const response = protocolMsg.peerDataOperationRequestResponseMessage;
|
|
194
|
+
if (response) {
|
|
195
|
+
await placeholderResendCache?.del(response.stanzaId);
|
|
196
|
+
// TODO: IMPLEMENT HISTORY SYNC ETC (sticker uploads etc.).
|
|
197
|
+
const { peerDataOperationResult } = response;
|
|
198
|
+
for (const result of peerDataOperationResult) {
|
|
199
|
+
const { placeholderMessageResendResponse: retryResponse } = result;
|
|
200
|
+
//eslint-disable-next-line max-depth
|
|
201
|
+
if (retryResponse) {
|
|
202
|
+
const webMessageInfo = proto.WebMessageInfo.decode(retryResponse.webMessageInfoBytes);
|
|
203
|
+
// wait till another upsert event is available, don't want it to be part of the PDO response message
|
|
204
|
+
// TODO: parse through proper message handling utilities (to add relevant key fields)
|
|
205
|
+
setTimeout(() => {
|
|
206
|
+
ev.emit('messages.upsert', {
|
|
207
|
+
messages: [webMessageInfo],
|
|
208
|
+
type: 'notify',
|
|
209
|
+
requestId: response.stanzaId
|
|
210
|
+
});
|
|
211
|
+
}, 500);
|
|
212
|
+
}
|
|
213
|
+
}
|
|
214
|
+
}
|
|
215
|
+
break;
|
|
216
|
+
case proto.Message.ProtocolMessage.Type.MESSAGE_EDIT:
|
|
217
|
+
ev.emit('messages.update', [
|
|
218
|
+
{
|
|
219
|
+
// flip the sender / fromMe properties because they're in the perspective of the sender
|
|
220
|
+
key: { ...message.key, id: protocolMsg.key?.id },
|
|
221
|
+
update: {
|
|
222
|
+
message: {
|
|
223
|
+
editedMessage: {
|
|
224
|
+
message: protocolMsg.editedMessage
|
|
225
|
+
}
|
|
226
|
+
},
|
|
227
|
+
messageTimestamp: protocolMsg.timestampMs
|
|
228
|
+
? Math.floor(toNumber(protocolMsg.timestampMs) / 1000)
|
|
229
|
+
: message.messageTimestamp
|
|
230
|
+
}
|
|
231
|
+
}
|
|
232
|
+
]);
|
|
233
|
+
break;
|
|
234
|
+
case proto.Message.ProtocolMessage.Type.LID_MIGRATION_MAPPING_SYNC:
|
|
235
|
+
const encodedPayload = protocolMsg.lidMigrationMappingSyncMessage?.encodedMappingPayload;
|
|
236
|
+
const { pnToLidMappings, chatDbMigrationTimestamp } = proto.LIDMigrationMappingSyncPayload.decode(encodedPayload);
|
|
237
|
+
logger?.debug({ pnToLidMappings, chatDbMigrationTimestamp }, 'got lid mappings and chat db migration timestamp');
|
|
238
|
+
const pairs = [];
|
|
239
|
+
for (const { pn, latestLid, assignedLid } of pnToLidMappings) {
|
|
240
|
+
const lid = latestLid || assignedLid;
|
|
241
|
+
pairs.push({ lid: `${lid}@lid`, pn: `${pn}@s.whatsapp.net` });
|
|
242
|
+
}
|
|
243
|
+
await signalRepository.lidMapping.storeLIDPNMappings(pairs);
|
|
244
|
+
if (pairs.length) {
|
|
245
|
+
for (const { pn, lid } of pairs) {
|
|
246
|
+
await signalRepository.migrateSession(pn, lid);
|
|
247
|
+
}
|
|
248
|
+
}
|
|
249
|
+
}
|
|
250
|
+
}
|
|
251
|
+
else if (content?.reactionMessage) {
|
|
252
|
+
const reaction = {
|
|
253
|
+
...content.reactionMessage,
|
|
254
|
+
key: message.key
|
|
255
|
+
};
|
|
256
|
+
ev.emit('messages.reaction', [
|
|
257
|
+
{
|
|
258
|
+
reaction,
|
|
259
|
+
key: content.reactionMessage?.key
|
|
260
|
+
}
|
|
261
|
+
]);
|
|
262
|
+
}
|
|
263
|
+
else if (message.messageStubType) {
|
|
264
|
+
const jid = message.key?.remoteJid;
|
|
265
|
+
//let actor = whatsappID (message.participant)
|
|
266
|
+
let participants;
|
|
267
|
+
const emitParticipantsUpdate = (action) => ev.emit('group-participants.update', {
|
|
268
|
+
id: jid,
|
|
269
|
+
author: message.key.participant,
|
|
270
|
+
authorPn: message.key.participantAlt,
|
|
271
|
+
participants,
|
|
272
|
+
action
|
|
273
|
+
});
|
|
274
|
+
const emitGroupUpdate = (update) => {
|
|
275
|
+
ev.emit('groups.update', [
|
|
276
|
+
{ id: jid, ...update, author: message.key.participant ?? undefined, authorPn: message.key.participantAlt }
|
|
277
|
+
]);
|
|
278
|
+
};
|
|
279
|
+
const emitGroupRequestJoin = (participant, action, method) => {
|
|
280
|
+
ev.emit('group.join-request', {
|
|
281
|
+
id: jid,
|
|
282
|
+
author: message.key.participant,
|
|
283
|
+
authorPn: message.key.participantAlt,
|
|
284
|
+
participant: participant.lid,
|
|
285
|
+
participantPn: participant.pn,
|
|
286
|
+
action,
|
|
287
|
+
method: method
|
|
288
|
+
});
|
|
289
|
+
};
|
|
290
|
+
const participantsIncludesMe = () => participants.find(jid => areJidsSameUser(meId, jid.phoneNumber)); // ADD SUPPORT FOR LID
|
|
291
|
+
switch (message.messageStubType) {
|
|
292
|
+
case WAMessageStubType.GROUP_PARTICIPANT_CHANGE_NUMBER:
|
|
293
|
+
participants = message.messageStubParameters.map((a) => JSON.parse(a)) || [];
|
|
294
|
+
emitParticipantsUpdate('modify');
|
|
295
|
+
break;
|
|
296
|
+
case WAMessageStubType.GROUP_PARTICIPANT_LEAVE:
|
|
297
|
+
case WAMessageStubType.GROUP_PARTICIPANT_REMOVE:
|
|
298
|
+
participants = message.messageStubParameters.map((a) => JSON.parse(a)) || [];
|
|
299
|
+
emitParticipantsUpdate('remove');
|
|
300
|
+
// mark the chat read only if you left the group
|
|
301
|
+
if (participantsIncludesMe()) {
|
|
302
|
+
chat.readOnly = true;
|
|
303
|
+
}
|
|
304
|
+
break;
|
|
305
|
+
case WAMessageStubType.GROUP_PARTICIPANT_ADD:
|
|
306
|
+
case WAMessageStubType.GROUP_PARTICIPANT_INVITE:
|
|
307
|
+
case WAMessageStubType.GROUP_PARTICIPANT_ADD_REQUEST_JOIN:
|
|
308
|
+
participants = message.messageStubParameters.map((a) => JSON.parse(a)) || [];
|
|
309
|
+
if (participantsIncludesMe()) {
|
|
310
|
+
chat.readOnly = false;
|
|
311
|
+
}
|
|
312
|
+
emitParticipantsUpdate('add');
|
|
313
|
+
break;
|
|
314
|
+
case WAMessageStubType.GROUP_PARTICIPANT_DEMOTE:
|
|
315
|
+
participants = message.messageStubParameters.map((a) => JSON.parse(a)) || [];
|
|
316
|
+
emitParticipantsUpdate('demote');
|
|
317
|
+
break;
|
|
318
|
+
case WAMessageStubType.GROUP_PARTICIPANT_PROMOTE:
|
|
319
|
+
participants = message.messageStubParameters.map((a) => JSON.parse(a)) || [];
|
|
320
|
+
emitParticipantsUpdate('promote');
|
|
321
|
+
break;
|
|
322
|
+
case WAMessageStubType.GROUP_CHANGE_ANNOUNCE:
|
|
323
|
+
const announceValue = message.messageStubParameters?.[0];
|
|
324
|
+
emitGroupUpdate({ announce: announceValue === 'true' || announceValue === 'on' });
|
|
325
|
+
break;
|
|
326
|
+
case WAMessageStubType.GROUP_CHANGE_RESTRICT:
|
|
327
|
+
const restrictValue = message.messageStubParameters?.[0];
|
|
328
|
+
emitGroupUpdate({ restrict: restrictValue === 'true' || restrictValue === 'on' });
|
|
329
|
+
break;
|
|
330
|
+
case WAMessageStubType.GROUP_CHANGE_SUBJECT:
|
|
331
|
+
const name = message.messageStubParameters?.[0];
|
|
332
|
+
chat.name = name;
|
|
333
|
+
emitGroupUpdate({ subject: name });
|
|
334
|
+
break;
|
|
335
|
+
case WAMessageStubType.GROUP_CHANGE_DESCRIPTION:
|
|
336
|
+
const description = message.messageStubParameters?.[0];
|
|
337
|
+
chat.description = description;
|
|
338
|
+
emitGroupUpdate({ desc: description });
|
|
339
|
+
break;
|
|
340
|
+
case WAMessageStubType.GROUP_CHANGE_INVITE_LINK:
|
|
341
|
+
const code = message.messageStubParameters?.[0];
|
|
342
|
+
emitGroupUpdate({ inviteCode: code });
|
|
343
|
+
break;
|
|
344
|
+
case WAMessageStubType.GROUP_MEMBER_ADD_MODE:
|
|
345
|
+
const memberAddValue = message.messageStubParameters?.[0];
|
|
346
|
+
emitGroupUpdate({ memberAddMode: memberAddValue === 'all_member_add' });
|
|
347
|
+
break;
|
|
348
|
+
case WAMessageStubType.GROUP_MEMBERSHIP_JOIN_APPROVAL_MODE:
|
|
349
|
+
const approvalMode = message.messageStubParameters?.[0];
|
|
350
|
+
emitGroupUpdate({ joinApprovalMode: approvalMode === 'on' });
|
|
351
|
+
break;
|
|
352
|
+
case WAMessageStubType.GROUP_MEMBERSHIP_JOIN_APPROVAL_REQUEST_NON_ADMIN_ADD: // TODO: Add other events
|
|
353
|
+
const participant = JSON.parse(message.messageStubParameters?.[0]);
|
|
354
|
+
const action = message.messageStubParameters?.[1];
|
|
355
|
+
const method = message.messageStubParameters?.[2];
|
|
356
|
+
emitGroupRequestJoin(participant, action, method);
|
|
357
|
+
break;
|
|
358
|
+
}
|
|
359
|
+
} /* else if(content?.pollUpdateMessage) {
|
|
360
|
+
const creationMsgKey = content.pollUpdateMessage.pollCreationMessageKey!
|
|
361
|
+
// we need to fetch the poll creation message to get the poll enc key
|
|
362
|
+
// TODO: make standalone, remove getMessage reference
|
|
363
|
+
// TODO: Remove entirely
|
|
364
|
+
const pollMsg = await getMessage(creationMsgKey)
|
|
365
|
+
if(pollMsg) {
|
|
366
|
+
const meIdNormalised = jidNormalizedUser(meId)
|
|
367
|
+
const pollCreatorJid = getKeyAuthor(creationMsgKey, meIdNormalised)
|
|
368
|
+
const voterJid = getKeyAuthor(message.key, meIdNormalised)
|
|
369
|
+
const pollEncKey = pollMsg.messageContextInfo?.messageSecret!
|
|
370
|
+
|
|
371
|
+
try {
|
|
372
|
+
const voteMsg = decryptPollVote(
|
|
373
|
+
content.pollUpdateMessage.vote!,
|
|
374
|
+
{
|
|
375
|
+
pollEncKey,
|
|
376
|
+
pollCreatorJid,
|
|
377
|
+
pollMsgId: creationMsgKey.id!,
|
|
378
|
+
voterJid,
|
|
379
|
+
}
|
|
380
|
+
)
|
|
381
|
+
ev.emit('messages.update', [
|
|
382
|
+
{
|
|
383
|
+
key: creationMsgKey,
|
|
384
|
+
update: {
|
|
385
|
+
pollUpdates: [
|
|
386
|
+
{
|
|
387
|
+
pollUpdateMessageKey: message.key,
|
|
388
|
+
vote: voteMsg,
|
|
389
|
+
senderTimestampMs: (content.pollUpdateMessage.senderTimestampMs! as Long).toNumber(),
|
|
390
|
+
}
|
|
391
|
+
]
|
|
392
|
+
}
|
|
393
|
+
}
|
|
394
|
+
])
|
|
395
|
+
} catch(err) {
|
|
396
|
+
logger?.warn(
|
|
397
|
+
{ err, creationMsgKey },
|
|
398
|
+
'failed to decrypt poll vote'
|
|
399
|
+
)
|
|
400
|
+
}
|
|
401
|
+
} else {
|
|
402
|
+
logger?.warn(
|
|
403
|
+
{ creationMsgKey },
|
|
404
|
+
'poll creation message not found, cannot decrypt update'
|
|
405
|
+
)
|
|
406
|
+
}
|
|
407
|
+
} */
|
|
408
|
+
if (Object.keys(chat).length > 1) {
|
|
409
|
+
ev.emit('chats.update', [chat]);
|
|
410
|
+
}
|
|
411
|
+
};
|
|
412
|
+
export default processMessage;
|
|
413
|
+
//# sourceMappingURL=process-message.js.map
|