@open-wa/wa-automate 4.51.4 → 4.51.6
Sign up to get free protection for your applications and to get access to all the features.
@@ -446,7 +446,7 @@ function initBrowser(sessionId, config = {}, spinner) {
|
|
446
446
|
let args = [...puppeteer_config_1.puppeteerConfig.chromiumArgs, ...((config === null || config === void 0 ? void 0 : config.chromiumArgs) || [])];
|
447
447
|
if (config === null || config === void 0 ? void 0 : config.multiDevice) {
|
448
448
|
args = args.filter(x => x != '--incognito');
|
449
|
-
config["userDataDir"] = config["userDataDir"] || `${(config === null || config === void 0 ? void 0 : config.sessionDataPath) || (config === null || config === void 0 ? void 0 : config.inDocker) ? '/sessions' : (config === null || config === void 0 ? void 0 : config.sessionDataPath) || '.'}/_IGNORE_${(config === null || config === void 0 ? void 0 : config.sessionId) || 'session'}`;
|
449
|
+
config["userDataDir"] = config["userDataDir"] || `${(config === null || config === void 0 ? void 0 : config.sessionDataPath) || ((config === null || config === void 0 ? void 0 : config.inDocker) ? '/sessions' : (config === null || config === void 0 ? void 0 : config.sessionDataPath) || '.')}/_IGNORE_${(config === null || config === void 0 ? void 0 : config.sessionId) || 'session'}`;
|
450
450
|
spinner === null || spinner === void 0 ? void 0 : spinner.info('MD Enabled, turning off incognito mode.');
|
451
451
|
spinner === null || spinner === void 0 ? void 0 : spinner.info(`Data dir: ${config["userDataDir"]}`);
|
452
452
|
}
|
@@ -170,7 +170,7 @@ function create(config = {}) {
|
|
170
170
|
/**
|
171
171
|
* Check if the IGNORE folder exists, therefore, assume that the session is MD.
|
172
172
|
*/
|
173
|
-
const mdDir = config["userDataDir"] || `${(config === null || config === void 0 ? void 0 : config.inDocker) ? '/sessions' : (config === null || config === void 0 ? void 0 : config.sessionDataPath) || '.'}/_IGNORE_${(config === null || config === void 0 ? void 0 : config.sessionId) || 'session'}`;
|
173
|
+
const mdDir = config["userDataDir"] || `${(config === null || config === void 0 ? void 0 : config.sessionDataPath) || ((config === null || config === void 0 ? void 0 : config.inDocker) ? '/sessions' : (config === null || config === void 0 ? void 0 : config.sessionDataPath) || '.')}/_IGNORE_${(config === null || config === void 0 ? void 0 : config.sessionId) || 'session'}`;
|
174
174
|
if (process.env.AUTO_MD && fs.existsSync(mdDir) && !(config === null || config === void 0 ? void 0 : config.multiDevice)) {
|
175
175
|
spinner.info(`Multi-Device directory detected. multiDevice set to true.`);
|
176
176
|
config.multiDevice = true;
|
@@ -37,7 +37,7 @@ const AUTO_DECRYPT = (message, client) => __awaiter(void 0, void 0, void 0, func
|
|
37
37
|
});
|
38
38
|
const AUTO_DECRYPT_SAVE = (message, client) => __awaiter(void 0, void 0, void 0, function* () {
|
39
39
|
if (message.deprecatedMms3Url && message.mimetype) {
|
40
|
-
const filename = `${message.mId}.${mime_1.default.
|
40
|
+
const filename = `${message.mId}.${mime_1.default.getExtension(message.mimetype)}`;
|
41
41
|
const filePath = `media/${filename}`;
|
42
42
|
try {
|
43
43
|
const mediaData = yield client.decryptMedia(message);
|
@@ -59,7 +59,7 @@ const UPLOAD_CLOUD = (message, client) => __awaiter(void 0, void 0, void 0, func
|
|
59
59
|
if (!uploadQueue) {
|
60
60
|
uploadQueue = new p_queue_1.default({ concurrency: 2, interval: 1000, carryoverConcurrencyCount: true, intervalCap: 2 });
|
61
61
|
}
|
62
|
-
const filename = `${message.mId || `${Date.now()}`}.${mime_1.default.
|
62
|
+
const filename = `${message.mId || `${Date.now()}`}.${mime_1.default.getExtension(message.mimetype)}`;
|
63
63
|
const mediaData = yield client.decryptMedia(message);
|
64
64
|
if (!cloudUploadOptions)
|
65
65
|
return message;
|
package/dist/utils/tools.js
CHANGED
@@ -315,7 +315,7 @@ const ensureDUrl = (file, requestConfig = {}, filename) => __awaiter(void 0, voi
|
|
315
315
|
const { ext } = yield (yield ft()).fileTypeFromBuffer(file);
|
316
316
|
filename = `file.${ext}`;
|
317
317
|
}
|
318
|
-
return `data:${mime_1.default.
|
318
|
+
return `data:${mime_1.default.getType(filename)};base64,${file.toString('base64').split(',')[1]}`;
|
319
319
|
}
|
320
320
|
else if (!(0, exports.isDataURL)(file) && !(0, exports.isBase64)(file)) {
|
321
321
|
//must be a file then
|
@@ -333,8 +333,8 @@ const ensureDUrl = (file, requestConfig = {}, filename) => __awaiter(void 0, voi
|
|
333
333
|
const { ext } = yield (yield ft()).fileTypeFromBuffer(Buffer.from(file.split(',')[1], 'base64'));
|
334
334
|
filename = `file.${ext}`;
|
335
335
|
}
|
336
|
-
if (file.includes("data:") && file.includes("undefined") || file.includes("application/octet-stream") && filename && mime_1.default.
|
337
|
-
file = `data:${mime_1.default.
|
336
|
+
if (file.includes("data:") && file.includes("undefined") || file.includes("application/octet-stream") && filename && mime_1.default.getType(filename)) {
|
337
|
+
file = `data:${mime_1.default.getType(filename)};base64,${file.split(',')[1]}`;
|
338
338
|
}
|
339
339
|
return file;
|
340
340
|
});
|
@@ -419,7 +419,7 @@ const assertFile = (file, outfileName, desiredOutputType, requestConfig) => __aw
|
|
419
419
|
let tfn = `${crypto_1.default.randomBytes(6).readUIntLE(0, 6).toString(36)}.${outfileName}`;
|
420
420
|
if (inputType != exports.FileInputTypes.BUFFER) {
|
421
421
|
file = yield (0, exports.ensureDUrl)(file, requestConfig, outfileName);
|
422
|
-
const ext = mime_1.default.
|
422
|
+
const ext = mime_1.default.getExtension(file.match(/[^:]\w+\/[\w-+\d.]+(?=;|,)/)[0]);
|
423
423
|
if (ext && !IGNORE_FILE_EXTS.includes(ext) && !tfn.endsWith(ext))
|
424
424
|
tfn = `${tfn}.${ext}`;
|
425
425
|
file = Buffer.from(file.split(',')[1], 'base64');
|
package/package.json
CHANGED
@@ -1,6 +1,6 @@
|
|
1
1
|
{
|
2
2
|
"name": "@open-wa/wa-automate",
|
3
|
-
"version": "4.51.
|
3
|
+
"version": "4.51.6",
|
4
4
|
"licenseCheckUrl": "https://funcs.openwa.dev/license-check",
|
5
5
|
"brokenMethodReportUrl": "https://funcs.openwa.dev/report-bm",
|
6
6
|
"patches": "https://cdn.openwa.dev/patches.json",
|
@@ -16,6 +16,7 @@
|
|
16
16
|
"build:skipmid": "tsc && npm run build:lib",
|
17
17
|
"build:lib": "ts-node prebuild.ts",
|
18
18
|
"docs": "npm run --prefix docs-v3 deploy_with_ssh_ci",
|
19
|
+
"types:publish": "npm run --prefix types-only pub",
|
19
20
|
"watch": "npm run build && tsc-watch ./src/index.ts --outDir ./dist --onSuccess \"node ./dist/index.js\" --onFailure \"echo Error while compiling\" --compiler typescript/bin/tsc",
|
20
21
|
"clean": "rm -rf session && rm -rf dist",
|
21
22
|
"clean:full": "rm -rf node_modules && npm run clean",
|
@@ -73,7 +74,7 @@
|
|
73
74
|
"@types/line-reader": "0.0.34",
|
74
75
|
"@types/localtunnel": "^2.0.1",
|
75
76
|
"@types/marked": "^4.0.2",
|
76
|
-
"@types/mime
|
77
|
+
"@types/mime": "^3.0.1",
|
77
78
|
"@types/node": "^18.7.6",
|
78
79
|
"@types/puppeteer": "^5.4.0",
|
79
80
|
"@types/shelljs": "^0.8.5",
|
@@ -141,6 +142,7 @@
|
|
141
142
|
"localtunnel": "^2.0.2",
|
142
143
|
"lodash.uniq": "^4.5.0",
|
143
144
|
"meow": "^9.0.0",
|
145
|
+
"mime": "^3.0.0",
|
144
146
|
"node-persist": "^3.1.0",
|
145
147
|
"open": "^8.0.2",
|
146
148
|
"os-name": "^4.0.0",
|