@sanzoffc/baileys 3.0.1 → 3.0.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (114) hide show
  1. package/LICENSE +1 -1
  2. package/WAProto/WAProto.proto +769 -233
  3. package/WAProto/index.js +65801 -141371
  4. package/lib/Defaults/index.js +117 -114
  5. package/lib/Defaults/index.js.bak +123 -0
  6. package/lib/KeyDB/BinarySearch.js +20 -0
  7. package/lib/KeyDB/KeyedDB.js +167 -0
  8. package/lib/KeyDB/index.js +4 -0
  9. package/lib/Signal/Group/ciphertext-message.js +12 -14
  10. package/lib/Signal/Group/group-session-builder.js +10 -42
  11. package/lib/Signal/Group/group_cipher.js +75 -87
  12. package/lib/Signal/Group/index.js +13 -57
  13. package/lib/Signal/Group/keyhelper.js +17 -52
  14. package/lib/Signal/Group/sender-chain-key.js +27 -33
  15. package/lib/Signal/Group/sender-key-distribution-message.js +62 -63
  16. package/lib/Signal/Group/sender-key-message.js +65 -66
  17. package/lib/Signal/Group/sender-key-name.js +45 -44
  18. package/lib/Signal/Group/sender-key-record.js +39 -49
  19. package/lib/Signal/Group/sender-key-state.js +80 -93
  20. package/lib/Signal/Group/sender-message-key.js +27 -28
  21. package/lib/Signal/libsignal.js +313 -163
  22. package/lib/Signal/lid-mapping.js +155 -0
  23. package/lib/Socket/Client/index.js +4 -18
  24. package/lib/Socket/Client/types.js +12 -12
  25. package/lib/Socket/Client/websocket.js +51 -71
  26. package/lib/Socket/Client/websocket.js.bak +53 -0
  27. package/lib/Socket/business.js +359 -242
  28. package/lib/Socket/chats.js +858 -945
  29. package/lib/Socket/communities.js +413 -0
  30. package/lib/Socket/groups.js +304 -324
  31. package/lib/Socket/index.js +15 -9
  32. package/lib/Socket/messages-recv.js +1105 -1046
  33. package/lib/Socket/messages-send.js +615 -389
  34. package/lib/Socket/mex.js +45 -0
  35. package/lib/Socket/newsletter.js +224 -227
  36. package/lib/Socket/socket.js +795 -621
  37. package/lib/Store/index.js +6 -8
  38. package/lib/Store/make-cache-manager-store.js +75 -0
  39. package/lib/Store/make-in-memory-store.js +286 -435
  40. package/lib/Store/make-ordered-dictionary.js +77 -79
  41. package/lib/Store/object-repository.js +24 -26
  42. package/lib/Types/Auth.js +3 -2
  43. package/lib/Types/Bussines.js +3 -0
  44. package/lib/Types/Call.js +3 -2
  45. package/lib/Types/Chat.js +9 -4
  46. package/lib/Types/Contact.js +3 -2
  47. package/lib/Types/Events.js +3 -2
  48. package/lib/Types/GroupMetadata.js +3 -2
  49. package/lib/Types/Label.js +24 -26
  50. package/lib/Types/LabelAssociation.js +6 -8
  51. package/lib/Types/Message.js +12 -7
  52. package/lib/Types/Newsletter.js +32 -17
  53. package/lib/Types/Newsletter.js.bak +33 -0
  54. package/lib/Types/Product.js +3 -2
  55. package/lib/Types/Signal.js +3 -2
  56. package/lib/Types/Socket.js +4 -2
  57. package/lib/Types/State.js +11 -2
  58. package/lib/Types/USync.js +3 -2
  59. package/lib/Types/index.js +27 -41
  60. package/lib/Utils/auth-utils.js +211 -191
  61. package/lib/Utils/baileys-event-stream.js +44 -0
  62. package/lib/Utils/browser-utils.js +21 -31
  63. package/lib/Utils/business.js +213 -214
  64. package/lib/Utils/chat-utils.js +711 -689
  65. package/lib/Utils/crypto.js +112 -175
  66. package/lib/Utils/decode-wa-message.js +254 -194
  67. package/lib/Utils/event-buffer.js +510 -500
  68. package/lib/Utils/generics.js +318 -430
  69. package/lib/Utils/history.js +83 -90
  70. package/lib/Utils/index.js +21 -35
  71. package/lib/Utils/link-preview.js +71 -116
  72. package/lib/Utils/logger.js +5 -7
  73. package/lib/Utils/lt-hash.js +40 -46
  74. package/lib/Utils/make-mutex.js +34 -41
  75. package/lib/Utils/message-retry-manager.js +33 -48
  76. package/lib/Utils/messages-media.js +573 -825
  77. package/lib/Utils/messages.js +349 -489
  78. package/lib/Utils/noise-handler.js +138 -144
  79. package/lib/Utils/pre-key-manager.js +85 -0
  80. package/lib/Utils/process-message.js +321 -384
  81. package/lib/Utils/signal.js +147 -139
  82. package/lib/Utils/use-multi-file-auth-state.js +95 -109
  83. package/lib/Utils/validate-connection.js +183 -212
  84. package/lib/WABinary/constants.js +1298 -1298
  85. package/lib/WABinary/decode.js +231 -256
  86. package/lib/WABinary/encode.js +207 -239
  87. package/lib/WABinary/generic-utils.js +119 -40
  88. package/lib/WABinary/index.js +7 -21
  89. package/lib/WABinary/jid-utils.js +87 -79
  90. package/lib/WABinary/types.js +3 -2
  91. package/lib/WAM/BinaryInfo.js +10 -12
  92. package/lib/WAM/constants.js +22851 -15348
  93. package/lib/WAM/encode.js +135 -136
  94. package/lib/WAM/index.js +5 -19
  95. package/lib/WAUSync/Protocols/USyncContactProtocol.js +28 -30
  96. package/lib/WAUSync/Protocols/USyncDeviceProtocol.js +49 -53
  97. package/lib/WAUSync/Protocols/USyncDisappearingModeProtocol.js +27 -28
  98. package/lib/WAUSync/Protocols/USyncStatusProtocol.js +36 -39
  99. package/lib/WAUSync/Protocols/UsyncBotProfileProtocol.js +50 -50
  100. package/lib/WAUSync/Protocols/UsyncLIDProtocol.js +26 -20
  101. package/lib/WAUSync/Protocols/index.js +6 -20
  102. package/lib/WAUSync/USyncQuery.js +86 -85
  103. package/lib/WAUSync/USyncUser.js +23 -25
  104. package/lib/WAUSync/index.js +5 -19
  105. package/lib/index.js +18 -49
  106. package/package.json +65 -78
  107. package/README.MD +0 -1295
  108. package/WAProto/GenerateStatics.sh +0 -4
  109. package/WAProto/p.html +0 -1
  110. package/engine-requirements.js +0 -10
  111. package/lib/Defaults/wileys-version.json +0 -3
  112. package/lib/Signal/Group/queue-job.js +0 -57
  113. package/lib/Socket/usync.js +0 -70
  114. package/lib/Utils/wileys-event-stream.js +0 -63
@@ -1,646 +1,820 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.makeSocket = void 0;
4
- const boom_1 = require("@hapi/boom");
5
- const crypto_1 = require("crypto");
6
- const url_1 = require("url");
7
- const util_1 = require("util");
8
- const WAProto_1 = require("../../WAProto");
9
- const Defaults_1 = require("../Defaults");
10
- const Types_1 = require("../Types");
11
- const Utils_1 = require("../Utils");
12
- const WABinary_1 = require("../WABinary");
13
- const Client_1 = require("./Client");
14
- /**
15
- * Connects to WA servers and performs:
16
- * - simple queries (no retry mechanism, wait for connection establishment)
17
- * - listen to messages and emit events
18
- * - query phone connection
19
- */
20
- const makeSocket = (config) => {
21
- var _a, _b;
22
- const { waWebSocketUrl, connectTimeoutMs, logger, keepAliveIntervalMs, browser, auth: authState, printQRInTerminal, defaultQueryTimeoutMs, transactionOpts, qrTimeout, makeSignalRepository, } = config;
23
- const url = typeof waWebSocketUrl === 'string' ? new url_1.URL(waWebSocketUrl) : waWebSocketUrl;
24
- if (config.mobile || url.protocol === 'tcp:') {
25
- throw new boom_1.Boom('Mobile API is not supported anymore', { statusCode: Types_1.DisconnectReason.loggedOut });
26
- }
27
- if (url.protocol === 'wss' && ((_a = authState === null || authState === void 0 ? void 0 : authState.creds) === null || _a === void 0 ? void 0 : _a.routingInfo)) {
28
- url.searchParams.append('ED', authState.creds.routingInfo.toString('base64url'));
29
- }
30
- const ws = new Client_1.WebSocketClient(url, config);
31
- ws.connect();
32
- const ev = (0, Utils_1.makeEventBuffer)(logger);
33
- /** ephemeral key pair used to encrypt/decrypt communication. Unique for each connection */
34
- const ephemeralKeyPair = Utils_1.Curve.generateKeyPair();
35
- /** WA noise protocol wrapper */
36
- const noise = (0, Utils_1.makeNoiseHandler)({
37
- keyPair: ephemeralKeyPair,
38
- NOISE_HEADER: Defaults_1.NOISE_WA_HEADER,
39
- logger,
40
- routingInfo: (_b = authState === null || authState === void 0 ? void 0 : authState.creds) === null || _b === void 0 ? void 0 : _b.routingInfo
1
+ //=======================================================//
2
+ import { addTransactionCapability, aesEncryptCTR, bindWaitForConnectionUpdate, bytesToCrockford, configureSuccessfulPairing, Curve, derivePairingCodeKey, generateLoginNode, generateMdTagPrefix, generateRegistrationNode, getCodeFromWSError, getErrorCodeFromStreamError, getNextPreKeysNode, makeEventBuffer, makeNoiseHandler, promiseTimeout } from "../Utils/index.js";
3
+ import { assertNodeErrorFree, binaryNodeToString, encodeBinaryNode, getBinaryNodeChild, getBinaryNodeChildren, isLidUser, jidDecode, jidEncode, S_WHATSAPP_NET } from "../WABinary/index.js";
4
+ import { DEF_CALLBACK_PREFIX, DEF_TAG_PREFIX, INITIAL_PREKEY_COUNT, MIN_PREKEY_COUNT, MIN_UPLOAD_INTERVAL, NOISE_WA_HEADER, UPLOAD_TIMEOUT } from "../Defaults/index.js";
5
+ import { USyncQuery, USyncUser } from "../WAUSync/index.js";
6
+ import { getPlatformId } from "../Utils/browser-utils.js";
7
+ import { DisconnectReason } from "../Types/index.js";
8
+ import { WebSocketClient } from "./Client/index.js";
9
+ import { BinaryInfo } from "../WAM/BinaryInfo.js";
10
+ import { proto } from "../../WAProto/index.js";
11
+ import { randomBytes } from "crypto";
12
+ import { Boom } from "@hapi/boom";
13
+ import { promisify } from "util";
14
+ import { URL } from "url";
15
+ //=======================================================//
16
+ export const makeSocket = (config) => {
17
+ const { waWebSocketUrl, connectTimeoutMs, logger, keepAliveIntervalMs, browser, auth: authState, printQRInTerminal, defaultQueryTimeoutMs, transactionOpts, qrTimeout, makeSignalRepository } = config;
18
+ const publicWAMBuffer = new BinaryInfo();
19
+ const uqTagId = generateMdTagPrefix();
20
+ const generateMessageTag = () => `${uqTagId}${epoch++}`;
21
+ if (printQRInTerminal) {
22
+ console.warn("⚠️ The printQRInTerminal option has been deprecated. You will no longer receive QR codes in the terminal automatically. Please listen to the connection.update event yourself and handle the QR your way. You can remove this message by removing this opttion. This message will be removed in a future version.");
23
+ }
24
+ const url = typeof waWebSocketUrl === "string" ? new URL(waWebSocketUrl) : waWebSocketUrl;
25
+ if (config.mobile || url.protocol === "tcp:") {
26
+ throw new Boom("Mobile API is not supported anymore", { statusCode: DisconnectReason.loggedOut });
27
+ }
28
+ if (url.protocol === "wss" && authState?.creds?.routingInfo) {
29
+ url.searchParams.append("ED", authState.creds.routingInfo.toString("base64url"));
30
+ }
31
+ const ephemeralKeyPair = Curve.generateKeyPair();
32
+ const noise = makeNoiseHandler({
33
+ keyPair: ephemeralKeyPair,
34
+ NOISE_HEADER: NOISE_WA_HEADER,
35
+ logger,
36
+ routingInfo: authState?.creds?.routingInfo
37
+ });
38
+ const ws = new WebSocketClient(url, config);
39
+ ws.connect();
40
+ const sendPromise = promisify(ws.send);
41
+ const sendRawMessage = async (data) => {
42
+ if (!ws.isOpen) {
43
+ throw new Boom("Connection Closed", { statusCode: DisconnectReason.connectionClosed });
44
+ }
45
+ const bytes = noise.encodeFrame(data);
46
+ await promiseTimeout(connectTimeoutMs, async (resolve, reject) => {
47
+ try {
48
+ await sendPromise.call(ws, bytes);
49
+ resolve();
50
+ }
51
+ catch (error) {
52
+ reject(error);
53
+ }
41
54
  });
42
- const { creds } = authState;
43
- // add transaction capability
44
- const keys = (0, Utils_1.addTransactionCapability)(authState.keys, logger, transactionOpts);
45
- const signalRepository = makeSignalRepository({ creds, keys });
46
- let lastDateRecv;
47
- let epoch = 1;
48
- let keepAliveReq;
49
- let qrTimer;
50
- let closed = false;
51
- const uqTagId = (0, Utils_1.generateMdTagPrefix)();
52
- const generateMessageTag = () => `${uqTagId}${epoch++}`;
53
- const sendPromise = (0, util_1.promisify)(ws.send);
54
- /** send a raw buffer */
55
- const sendRawMessage = async (data) => {
56
- if (!ws.isOpen) {
57
- throw new boom_1.Boom('Connection Closed', { statusCode: Types_1.DisconnectReason.connectionClosed });
58
- }
59
- const bytes = noise.encodeFrame(data);
60
- await (0, Utils_1.promiseTimeout)(connectTimeoutMs, async (resolve, reject) => {
61
- try {
62
- await sendPromise.call(ws, bytes);
63
- resolve();
64
- }
65
- catch (error) {
66
- reject(error);
67
- }
68
- });
69
- };
70
- /** send a binary node */
71
- const sendNode = (frame) => {
72
- if (logger.level === 'trace') {
73
- logger.trace({ xml: (0, WABinary_1.binaryNodeToString)(frame), msg: 'xml send' });
74
- }
75
- const buff = (0, WABinary_1.encodeBinaryNode)(frame);
76
- return sendRawMessage(buff);
77
- };
78
- /** log & process any unexpected errors */
79
- const onUnexpectedError = (err, msg) => {
80
- logger.error({ err }, `unexpected error in '${msg}'`);
81
- const message = (err && ((err.stack || err.message) || String(err))).toLowerCase();
82
- // auto recover from cryptographic desyncs by re-uploading prekeys
83
- if (message.includes('bad mac') || (message.includes('mac') && message.includes('invalid'))) {
84
- try {
85
- uploadPreKeysToServerIfRequired(true)
86
- .catch(e => logger.warn({ e }, 'failed to re-upload prekeys after bad mac'));
87
- }
88
- catch (_e) {
89
- // ignore
90
- }
91
- }
92
- };
93
- /** await the next incoming message */
94
- const awaitNextMessage = async (sendMsg) => {
95
- if (!ws.isOpen) {
96
- throw new boom_1.Boom('Connection Closed', {
97
- statusCode: Types_1.DisconnectReason.connectionClosed
98
- });
99
- }
100
- let onOpen;
101
- let onClose;
102
- const result = (0, Utils_1.promiseTimeout)(connectTimeoutMs, (resolve, reject) => {
103
- onOpen = resolve;
104
- onClose = mapWebSocketError(reject);
105
- ws.on('frame', onOpen);
106
- ws.on('close', onClose);
107
- ws.on('error', onClose);
108
- })
109
- .finally(() => {
110
- ws.off('frame', onOpen);
111
- ws.off('close', onClose);
112
- ws.off('error', onClose);
113
- });
114
- if (sendMsg) {
115
- sendRawMessage(sendMsg).catch(onClose);
116
- }
117
- return result;
118
- };
119
- /**
120
- * Wait for a message with a certain tag to be received
121
- * @param msgId the message tag to await
122
- * @param timeoutMs timeout after which the promise will reject
123
- */
124
- const waitForMessage = async (msgId, timeoutMs = defaultQueryTimeoutMs) => {
125
- let onRecv;
126
- let onErr;
127
- try {
128
- const result = await (0, Utils_1.promiseTimeout)(timeoutMs, (resolve, reject) => {
129
- onRecv = resolve;
130
- onErr = err => {
131
- reject(err || new boom_1.Boom('Connection Closed', { statusCode: Types_1.DisconnectReason.connectionClosed }));
132
- };
133
- ws.on(`TAG:${msgId}`, onRecv);
134
- ws.on('close', onErr); // if the socket closes, you'll never receive the message
135
- ws.off('error', onErr);
136
- });
137
- return result;
138
- }
139
- finally {
140
- ws.off(`TAG:${msgId}`, onRecv);
141
- ws.off('close', onErr); // if the socket closes, you'll never receive the message
142
- ws.off('error', onErr);
143
- }
144
- };
145
- /** send a query, and wait for its response. auto-generates message ID if not provided */
146
- const query = async (node, timeoutMs) => {
147
- if (!node.attrs.id) {
148
- node.attrs.id = generateMessageTag();
149
- }
150
- const msgId = node.attrs.id;
151
- const [result] = await Promise.all([
152
- waitForMessage(msgId, timeoutMs),
153
- sendNode(node)
154
- ]);
155
- if ('tag' in result) {
156
- (0, WABinary_1.assertNodeErrorFree)(result);
157
- }
158
- return result;
159
- };
160
- /** connection handshake */
161
- const validateConnection = async () => {
162
- let helloMsg = {
163
- clientHello: { ephemeral: ephemeralKeyPair.public }
55
+ };
56
+ const sendNode = (frame) => {
57
+ if (logger.level === "trace") {
58
+ logger.trace({ xml: binaryNodeToString(frame), msg: "xml send" });
59
+ }
60
+ const buff = encodeBinaryNode(frame);
61
+ return sendRawMessage(buff);
62
+ };
63
+ const waitForMessage = async (msgId, timeoutMs = defaultQueryTimeoutMs) => {
64
+ let onRecv;
65
+ let onErr;
66
+ try {
67
+ const result = await promiseTimeout(timeoutMs, (resolve, reject) => {
68
+ onRecv = data => {
69
+ resolve(data);
164
70
  };
165
- helloMsg = WAProto_1.proto.HandshakeMessage.fromObject(helloMsg);
166
- logger.info({ browser, helloMsg }, 'connected to WA');
167
- const init = WAProto_1.proto.HandshakeMessage.encode(helloMsg).finish();
168
- const result = await awaitNextMessage(init);
169
- const handshake = WAProto_1.proto.HandshakeMessage.decode(result);
170
- logger.trace({ handshake }, 'handshake recv from WA');
171
- const keyEnc = await noise.processHandshake(handshake, creds.noiseKey);
172
- let node;
173
- if (!creds.me) {
174
- node = (0, Utils_1.generateRegistrationNode)(creds, config);
175
- logger.info({ node }, 'not logged in, attempting registration...');
176
- }
177
- else {
178
- node = (0, Utils_1.generateLoginNode)(creds.me.id, config);
179
- logger.info({ node }, 'logging in...');
180
- }
181
- const payloadEnc = noise.encrypt(WAProto_1.proto.ClientPayload.encode(node).finish());
182
- await sendRawMessage(WAProto_1.proto.HandshakeMessage.encode({
183
- clientFinish: {
184
- static: keyEnc,
185
- payload: payloadEnc,
186
- },
187
- }).finish());
188
- noise.finishInit();
189
- startKeepAliveRequest();
190
- };
191
- const getAvailablePreKeysOnServer = async () => {
192
- const result = await query({
193
- tag: 'iq',
194
- attrs: {
195
- id: generateMessageTag(),
196
- xmlns: 'encrypt',
197
- type: 'get',
198
- to: WABinary_1.S_WHATSAPP_NET
199
- },
200
- content: [
201
- { tag: 'count', attrs: {} }
202
- ]
203
- });
204
- const countChild = (0, WABinary_1.getBinaryNodeChild)(result, 'count');
205
- return +countChild.attrs.value;
206
- };
207
- /** generates and uploads a set of pre-keys to the server */
208
- const uploadPreKeys = async (count = Defaults_1.INITIAL_PREKEY_COUNT) => {
209
- await keys.transaction(async () => {
210
- logger.info({ count }, 'uploading pre-keys');
211
- const { update, node } = await (0, Utils_1.getNextPreKeysNode)({ creds, keys }, count);
212
- await query(node);
213
- ev.emit('creds.update', update);
214
- logger.info({ count }, 'uploaded pre-keys');
215
- });
71
+ onErr = err => {
72
+ reject(err ||
73
+ new Boom("Connection Closed", {
74
+ statusCode: DisconnectReason.connectionClosed
75
+ }));
76
+ };
77
+ ws.on(`TAG:${msgId}`, onRecv);
78
+ ws.on("close", onErr);
79
+ ws.on("error", onErr);
80
+ return () => reject(new Boom("Query Cancelled"));
81
+ });
82
+ return result;
83
+ }
84
+ catch (error) {
85
+ if (error instanceof Boom && error.output?.statusCode === DisconnectReason.timedOut) {
86
+ logger?.warn?.({ msgId }, "timed out waiting for message");
87
+ return undefined;
88
+ }
89
+ throw error;
90
+ }
91
+ finally {
92
+ if (onRecv)
93
+ ws.off(`TAG:${msgId}`, onRecv);
94
+ if (onErr) {
95
+ ws.off("close", onErr);
96
+ ws.off("error", onErr);
97
+ }
98
+ }
99
+ };
100
+ const query = async (node, timeoutMs) => {
101
+ if (!node.attrs.id) {
102
+ node.attrs.id = generateMessageTag();
103
+ }
104
+ const msgId = node.attrs.id;
105
+ const result = await promiseTimeout(timeoutMs, async (resolve, reject) => {
106
+ const result = waitForMessage(msgId, timeoutMs).catch(reject);
107
+ sendNode(node)
108
+ .then(async () => resolve(await result))
109
+ .catch(reject);
110
+ });
111
+ if (result && "tag" in result) {
112
+ assertNodeErrorFree(result);
113
+ }
114
+ return result;
115
+ };
116
+ const executeUSyncQuery = async (usyncQuery) => {
117
+ if (usyncQuery.protocols.length === 0) {
118
+ throw new Boom("USyncQuery must have at least one protocol");
119
+ }
120
+ const validUsers = usyncQuery.users;
121
+ const userNodes = validUsers.map(user => {
122
+ return {
123
+ tag: "user",
124
+ attrs: {
125
+ jid: !user.phone ? user.id : undefined
126
+ },
127
+ content: usyncQuery.protocols.map(a => a.getUserElement(user)).filter(a => a !== null)
128
+ };
129
+ });
130
+ const listNode = {
131
+ tag: "list",
132
+ attrs: {},
133
+ content: userNodes
216
134
  };
217
- const uploadPreKeysToServerIfRequired = async () => {
218
- const preKeyCount = await getAvailablePreKeysOnServer();
219
- logger.info(`${preKeyCount} pre-keys found on server`);
220
- if (preKeyCount <= Defaults_1.MIN_PREKEY_COUNT) {
221
- await uploadPreKeys();
222
- }
135
+ const queryNode = {
136
+ tag: "query",
137
+ attrs: {},
138
+ content: usyncQuery.protocols.map(a => a.getQueryElement())
223
139
  };
224
- const onMessageReceived = (data) => {
225
- noise.decodeFrame(data, frame => {
226
- var _a;
227
- // reset ping timeout
228
- lastDateRecv = new Date();
229
- let anyTriggered = false;
230
- anyTriggered = ws.emit('frame', frame);
231
- // if it's a binary node
232
- if (!(frame instanceof Uint8Array)) {
233
- const msgId = frame.attrs.id;
234
- if (logger.level === 'trace') {
235
- logger.trace({ xml: (0, WABinary_1.binaryNodeToString)(frame), msg: 'recv xml' });
236
- }
237
- /* Check if this is a response to a message we sent */
238
- anyTriggered = ws.emit(`${Defaults_1.DEF_TAG_PREFIX}${msgId}`, frame) || anyTriggered;
239
- /* Check if this is a response to a message we are expecting */
240
- const l0 = frame.tag;
241
- const l1 = frame.attrs || {};
242
- const l2 = Array.isArray(frame.content) ? (_a = frame.content[0]) === null || _a === void 0 ? void 0 : _a.tag : '';
243
- for (const key of Object.keys(l1)) {
244
- anyTriggered = ws.emit(`${Defaults_1.DEF_CALLBACK_PREFIX}${l0},${key}:${l1[key]},${l2}`, frame) || anyTriggered;
245
- anyTriggered = ws.emit(`${Defaults_1.DEF_CALLBACK_PREFIX}${l0},${key}:${l1[key]}`, frame) || anyTriggered;
246
- anyTriggered = ws.emit(`${Defaults_1.DEF_CALLBACK_PREFIX}${l0},${key}`, frame) || anyTriggered;
247
- }
248
- anyTriggered = ws.emit(`${Defaults_1.DEF_CALLBACK_PREFIX}${l0},,${l2}`, frame) || anyTriggered;
249
- anyTriggered = ws.emit(`${Defaults_1.DEF_CALLBACK_PREFIX}${l0}`, frame) || anyTriggered;
250
- if (!anyTriggered && logger.level === 'debug') {
251
- logger.debug({ unhandled: true, msgId, fromMe: false, frame }, 'communication recv');
252
- }
253
- }
254
- });
140
+ const iq = {
141
+ tag: "iq",
142
+ attrs: {
143
+ to: S_WHATSAPP_NET,
144
+ type: "get",
145
+ xmlns: "usync"
146
+ },
147
+ content: [
148
+ {
149
+ tag: "usync",
150
+ attrs: {
151
+ context: usyncQuery.context,
152
+ mode: usyncQuery.mode,
153
+ sid: generateMessageTag(),
154
+ last: "true",
155
+ index: "0"
156
+ },
157
+ content: [queryNode, listNode]
158
+ }
159
+ ]
255
160
  };
256
- const end = (error) => {
257
- if (closed) {
258
- logger.trace({ trace: error === null || error === void 0 ? void 0 : error.stack }, 'connection already closed');
259
- return;
260
- }
261
- closed = true;
262
- logger.info({ trace: error === null || error === void 0 ? void 0 : error.stack }, error ? 'connection errored' : 'connection closed');
263
- clearInterval(keepAliveReq);
264
- clearTimeout(qrTimer);
265
- ws.removeAllListeners('close');
266
- ws.removeAllListeners('error');
267
- ws.removeAllListeners('open');
268
- ws.removeAllListeners('message');
269
- if (!ws.isClosed && !ws.isClosing) {
270
- try {
271
- ws.close();
272
- }
273
- catch (_a) { }
274
- }
275
- ev.emit('connection.update', {
276
- connection: 'close',
277
- lastDisconnect: {
278
- error,
279
- date: new Date()
280
- }
281
- });
282
- ev.removeAllListeners('connection.update');
161
+ const result = await query(iq);
162
+ return usyncQuery.parseUSyncQueryResult(result);
163
+ };
164
+ const onWhatsApp = async (...phoneNumber) => {
165
+ let usyncQuery = new USyncQuery();
166
+ let contactEnabled = false;
167
+ for (const jid of phoneNumber) {
168
+ if (isLidUser(jid)) {
169
+ logger?.warn("LIDs are not supported with onWhatsApp");
170
+ continue;
171
+ }
172
+ else {
173
+ if (!contactEnabled) {
174
+ contactEnabled = true;
175
+ usyncQuery = usyncQuery.withContactProtocol();
176
+ }
177
+ const phone = `+${jid.replace("+", "").split("@")[0]?.split(":")[0]}`;
178
+ usyncQuery.withUser(new USyncUser().withPhone(phone));
179
+ }
180
+ }
181
+ if (usyncQuery.users.length === 0) {
182
+ return [];
183
+ }
184
+ const results = await executeUSyncQuery(usyncQuery);
185
+ if (results) {
186
+ return results.list.filter(a => !!a.contact).map(({ contact, id }) => ({ jid: id, exists: contact }));
187
+ }
188
+ };
189
+ const pnFromLIDUSync = async (jids) => {
190
+ const usyncQuery = new USyncQuery().withLIDProtocol().withContext("background");
191
+ for (const jid of jids) {
192
+ if (isLidUser(jid)) {
193
+ logger?.warn("LID user found in LID fetch call");
194
+ continue;
195
+ }
196
+ else {
197
+ usyncQuery.withUser(new USyncUser().withId(jid));
198
+ }
199
+ }
200
+ if (usyncQuery.users.length === 0) {
201
+ return [];
202
+ }
203
+ const results = await executeUSyncQuery(usyncQuery);
204
+ if (results) {
205
+ return results.list.filter(a => !!a.lid).map(({ lid, id }) => ({ pn: id, lid: lid }));
206
+ }
207
+ return [];
208
+ };
209
+ const ev = makeEventBuffer(logger);
210
+ const { creds } = authState;
211
+ const keys = addTransactionCapability(authState.keys, logger, transactionOpts);
212
+ const signalRepository = makeSignalRepository({ creds, keys }, logger, pnFromLIDUSync);
213
+
214
+ const delay = async (ms) => {
215
+ return new Promise(resolve => setTimeout(resolve, ms));
216
+ }
217
+
218
+ const toLid = async (pn) => {
219
+ if (!pn) return "";
220
+ if (pn.includes("@lid")) return pn;
221
+ try {
222
+ return signalRepository.lidMapping.getLIDForPN(pn);
223
+ } catch (err) {
224
+ logger.error({ err }, "error jid unknown");
225
+ return pn;
226
+ }
227
+ };
228
+
229
+ const toPn = async (pn) => {
230
+ if (!pn) return "";
231
+ if (
232
+ pn.includes("@s.whatsapp.net") ||
233
+ pn.includes("@g.us") ||
234
+ pn.includes("@newsletter")
235
+ ) return pn;
236
+
237
+ try {
238
+ const jid = await signalRepository.lidMapping.getPNForLID(pn);
239
+ if (!jid) return "";
240
+ const server = "@" + jid.split("@")[1];
241
+ const pN = jid.split(":")[0] + server;
242
+ return pN.toString();
243
+ } catch (err) {
244
+ logger.error({ err }, "error lid unknown");
245
+ return pn;
246
+ }
247
+ };
248
+
249
+ let lastDateRecv;
250
+ let epoch = 1;
251
+ let keepAliveReq;
252
+ let qrTimer;
253
+ let closed = false;
254
+ const onUnexpectedError = (err, msg) => {
255
+ logger.error({ err }, `unexpected error in "${msg}"`);
256
+ };
257
+ const awaitNextMessage = async (sendMsg) => {
258
+ if (!ws.isOpen) {
259
+ throw new Boom("Connection Closed", {
260
+ statusCode: DisconnectReason.connectionClosed
261
+ });
262
+ }
263
+ let onOpen;
264
+ let onClose;
265
+ const result = promiseTimeout(connectTimeoutMs, (resolve, reject) => {
266
+ onOpen = resolve;
267
+ onClose = mapWebSocketError(reject);
268
+ ws.on("frame", onOpen);
269
+ ws.on("close", onClose);
270
+ ws.on("error", onClose);
271
+ }).finally(() => {
272
+ ws.off("frame", onOpen);
273
+ ws.off("close", onClose);
274
+ ws.off("error", onClose);
275
+ });
276
+ if (sendMsg) {
277
+ sendRawMessage(sendMsg).catch(onClose);
278
+ }
279
+ return result;
280
+ };
281
+ const validateConnection = async () => {
282
+ let helloMsg = {
283
+ clientHello: { ephemeral: ephemeralKeyPair.public }
283
284
  };
284
- const waitForSocketOpen = async () => {
285
- if (ws.isOpen) {
286
- return;
287
- }
288
- if (ws.isClosed || ws.isClosing) {
289
- throw new boom_1.Boom('Connection Closed', { statusCode: Types_1.DisconnectReason.connectionClosed });
290
- }
291
- let onOpen;
292
- let onClose;
293
- await new Promise((resolve, reject) => {
294
- onOpen = () => resolve(undefined);
295
- onClose = mapWebSocketError(reject);
296
- ws.on('open', onOpen);
297
- ws.on('close', onClose);
298
- ws.on('error', onClose);
299
- })
300
- .finally(() => {
301
- ws.off('open', onOpen);
302
- ws.off('close', onClose);
303
- ws.off('error', onClose);
304
- });
285
+ helloMsg = proto.HandshakeMessage.fromObject(helloMsg);
286
+ logger.info({ browser, helloMsg }, "connected to WA");
287
+ const init = proto.HandshakeMessage.encode(helloMsg).finish();
288
+ const result = await awaitNextMessage(init);
289
+ const handshake = proto.HandshakeMessage.decode(result);
290
+ logger.trace({ handshake }, "handshake recv from WA");
291
+ const keyEnc = await noise.processHandshake(handshake, creds.noiseKey);
292
+ let node;
293
+ if (!creds.me) {
294
+ node = generateRegistrationNode(creds, config);
295
+ logger.info({ node }, "not logged in, attempting registration...");
296
+ }
297
+ else {
298
+ node = generateLoginNode(creds.me.id, config);
299
+ logger.info({ node }, "logging in...");
300
+ }
301
+ const payloadEnc = noise.encrypt(proto.ClientPayload.encode(node).finish());
302
+ await sendRawMessage(proto.HandshakeMessage.encode({
303
+ clientFinish: {
304
+ static: keyEnc,
305
+ payload: payloadEnc
306
+ }
307
+ }).finish());
308
+ noise.finishInit();
309
+ startKeepAliveRequest();
310
+ };
311
+ const getAvailablePreKeysOnServer = async () => {
312
+ const result = await query({
313
+ tag: "iq",
314
+ attrs: {
315
+ id: generateMessageTag(),
316
+ xmlns: "encrypt",
317
+ type: "get",
318
+ to: S_WHATSAPP_NET
319
+ },
320
+ content: [{ tag: "count", attrs: {} }]
321
+ });
322
+ const countChild = getBinaryNodeChild(result, "count");
323
+ return +countChild.attrs.value;
324
+ };
325
+ let uploadPreKeysPromise = null;
326
+ let lastUploadTime = 0;
327
+ const uploadPreKeys = async (count = MIN_PREKEY_COUNT, retryCount = 0) => {
328
+ if (retryCount === 0) {
329
+ const timeSinceLastUpload = Date.now() - lastUploadTime;
330
+ if (timeSinceLastUpload < MIN_UPLOAD_INTERVAL) {
331
+ logger.debug(`Skipping upload, only ${timeSinceLastUpload}ms since last upload`);
332
+ return;
333
+ }
334
+ }
335
+ if (uploadPreKeysPromise) {
336
+ logger.debug("Pre-key upload already in progress, waiting for completion");
337
+ await uploadPreKeysPromise;
338
+ }
339
+ const uploadLogic = async () => {
340
+ logger.info({ count, retryCount }, "uploading pre-keys");
341
+ const node = await keys.transaction(async () => {
342
+ logger.debug({ requestedCount: count }, "generating pre-keys with requested count");
343
+ const { update, node } = await getNextPreKeysNode({ creds, keys }, count);
344
+ ev.emit("creds.update", update);
345
+ return node;
346
+ }, creds?.me?.id || "upload-pre-keys");
347
+ try {
348
+ await query(node);
349
+ logger.info({ count }, "uploaded pre-keys successfully");
350
+ lastUploadTime = Date.now();
351
+ }
352
+ catch (uploadError) {
353
+ logger.error({ uploadError: uploadError.toString(), count }, "Failed to upload pre-keys to server");
354
+ if (retryCount < 3) {
355
+ const backoffDelay = Math.min(1000 * Math.pow(2, retryCount), 10000);
356
+ logger.info(`Retrying pre-key upload in ${backoffDelay}ms`);
357
+ await new Promise(resolve => setTimeout(resolve, backoffDelay));
358
+ return uploadPreKeys(count, retryCount + 1);
359
+ }
360
+ throw uploadError;
361
+ }
305
362
  };
306
- const startKeepAliveRequest = () => (keepAliveReq = setInterval(() => {
307
- if (!lastDateRecv) {
308
- lastDateRecv = new Date();
309
- }
310
- const diff = Date.now() - lastDateRecv.getTime();
311
- /*
312
- check if it's been a suspicious amount of time since the server responded with our last seen
313
- it could be that the network is down
314
- */
315
- if (diff > keepAliveIntervalMs + 5000) {
316
- end(new boom_1.Boom('Connection was lost', { statusCode: Types_1.DisconnectReason.connectionLost }));
317
- }
318
- else if (ws.isOpen) {
319
- // if its all good, send a keep alive request
320
- query({
321
- tag: 'iq',
322
- attrs: {
323
- id: generateMessageTag(),
324
- to: WABinary_1.S_WHATSAPP_NET,
325
- type: 'get',
326
- xmlns: 'w:p',
327
- },
328
- content: [{ tag: 'ping', attrs: {} }]
329
- })
330
- .catch(err => {
331
- logger.error({ trace: err.stack }, 'error in sending keep alive');
332
- });
333
- }
334
- else {
335
- logger.warn('keep alive called when WS not open');
336
- }
337
- }, keepAliveIntervalMs));
338
- /** i have no idea why this exists. pls enlighten me */
339
- const sendPassiveIq = (tag) => (query({
340
- tag: 'iq',
363
+ uploadPreKeysPromise = Promise.race([
364
+ uploadLogic(),
365
+ new Promise((_, reject) => setTimeout(() => reject(new Boom("Pre-key upload timeout", { statusCode: 408 })), UPLOAD_TIMEOUT))
366
+ ]);
367
+ try {
368
+ await uploadPreKeysPromise;
369
+ }
370
+ finally {
371
+ uploadPreKeysPromise = null;
372
+ }
373
+ };
374
+ const verifyCurrentPreKeyExists = async () => {
375
+ const currentPreKeyId = creds.nextPreKeyId - 1;
376
+ if (currentPreKeyId <= 0) {
377
+ return { exists: false, currentPreKeyId: 0 };
378
+ }
379
+ const preKeys = await keys.get("pre-key", [currentPreKeyId.toString()]);
380
+ const exists = !!preKeys[currentPreKeyId.toString()];
381
+ return { exists, currentPreKeyId };
382
+ };
383
+ const uploadPreKeysToServerIfRequired = async () => {
384
+ try {
385
+ let count = 0;
386
+ const preKeyCount = await getAvailablePreKeysOnServer();
387
+ if (preKeyCount === 0)
388
+ count = INITIAL_PREKEY_COUNT;
389
+ else
390
+ count = MIN_PREKEY_COUNT;
391
+ const { exists: currentPreKeyExists, currentPreKeyId } = await verifyCurrentPreKeyExists();
392
+ logger.info(`${preKeyCount} pre-keys found on server`);
393
+ logger.info(`Current prekey ID: ${currentPreKeyId}, exists in storage: ${currentPreKeyExists}`);
394
+ const lowServerCount = preKeyCount <= count;
395
+ const missingCurrentPreKey = !currentPreKeyExists && currentPreKeyId > 0;
396
+ const shouldUpload = lowServerCount || missingCurrentPreKey;
397
+ if (shouldUpload) {
398
+ const reasons = [];
399
+ if (lowServerCount)
400
+ reasons.push(`server count low (${preKeyCount})`);
401
+ if (missingCurrentPreKey)
402
+ reasons.push(`current prekey ${currentPreKeyId} missing from storage`);
403
+ logger.info(`Uploading PreKeys due to: ${reasons.join(", ")}`);
404
+ await uploadPreKeys(count);
405
+ }
406
+ else {
407
+ logger.info(`PreKey validation passed - Server: ${preKeyCount}, Current prekey ${currentPreKeyId} exists`);
408
+ }
409
+ }
410
+ catch (error) {
411
+ logger.error({ error }, "Failed to check/upload pre-keys during initialization");
412
+ }
413
+ };
414
+ const onMessageReceived = (data) => {
415
+ noise.decodeFrame(data, frame => {
416
+ lastDateRecv = new Date();
417
+ let anyTriggered = false;
418
+ anyTriggered = ws.emit("frame", frame);
419
+ if (!(frame instanceof Uint8Array)) {
420
+ const msgId = frame.attrs.id;
421
+ if (logger.level === "trace") {
422
+ logger.trace({ xml: binaryNodeToString(frame), msg: "recv xml" });
423
+ }
424
+ anyTriggered = ws.emit(`${DEF_TAG_PREFIX}${msgId}`, frame) || anyTriggered;
425
+ const l0 = frame.tag;
426
+ const l1 = frame.attrs || {};
427
+ const l2 = Array.isArray(frame.content) ? frame.content[0]?.tag : "";
428
+ for (const key of Object.keys(l1)) {
429
+ anyTriggered = ws.emit(`${DEF_CALLBACK_PREFIX}${l0},${key}:${l1[key]},${l2}`, frame) || anyTriggered;
430
+ anyTriggered = ws.emit(`${DEF_CALLBACK_PREFIX}${l0},${key}:${l1[key]}`, frame) || anyTriggered;
431
+ anyTriggered = ws.emit(`${DEF_CALLBACK_PREFIX}${l0},${key}`, frame) || anyTriggered;
432
+ }
433
+ anyTriggered = ws.emit(`${DEF_CALLBACK_PREFIX}${l0},,${l2}`, frame) || anyTriggered;
434
+ anyTriggered = ws.emit(`${DEF_CALLBACK_PREFIX}${l0}`, frame) || anyTriggered;
435
+ if (!anyTriggered && logger.level === "debug") {
436
+ logger.debug({ unhandled: true, msgId, fromMe: false, frame }, "communication recv");
437
+ }
438
+ }
439
+ });
440
+ };
441
+ const end = (error) => {
442
+ if (closed) {
443
+ logger.trace({ trace: error?.stack }, "connection already closed");
444
+ return;
445
+ }
446
+ closed = true;
447
+ logger.info({ trace: error?.stack }, error ? "connection errored" : "connection closed");
448
+ clearInterval(keepAliveReq);
449
+ clearTimeout(qrTimer);
450
+ ws.removeAllListeners("close");
451
+ ws.removeAllListeners("open");
452
+ ws.removeAllListeners("message");
453
+ if (!ws.isClosed && !ws.isClosing) {
454
+ try {
455
+ ws.close();
456
+ }
457
+ catch { }
458
+ }
459
+ ev.emit("connection.update", {
460
+ connection: "close",
461
+ lastDisconnect: {
462
+ error,
463
+ date: new Date()
464
+ }
465
+ });
466
+ ev.removeAllListeners("connection.update");
467
+ };
468
+ const waitForSocketOpen = async () => {
469
+ if (ws.isOpen) {
470
+ return;
471
+ }
472
+ if (ws.isClosed || ws.isClosing) {
473
+ throw new Boom("Connection Closed", { statusCode: DisconnectReason.connectionClosed });
474
+ }
475
+ let onOpen;
476
+ let onClose;
477
+ await new Promise((resolve, reject) => {
478
+ onOpen = () => resolve(undefined);
479
+ onClose = mapWebSocketError(reject);
480
+ ws.on("open", onOpen);
481
+ ws.on("close", onClose);
482
+ ws.on("error", onClose);
483
+ }).finally(() => {
484
+ ws.off("open", onOpen);
485
+ ws.off("close", onClose);
486
+ ws.off("error", onClose);
487
+ });
488
+ };
489
+ const startKeepAliveRequest = () => (keepAliveReq = setInterval(() => {
490
+ if (!lastDateRecv) {
491
+ lastDateRecv = new Date();
492
+ }
493
+ const diff = Date.now() - lastDateRecv.getTime();
494
+ if (diff > keepAliveIntervalMs + 5000) {
495
+ end(new Boom("Connection was lost", { statusCode: DisconnectReason.connectionLost }));
496
+ }
497
+ else if (ws.isOpen) {
498
+ query({
499
+ tag: "iq",
341
500
  attrs: {
342
- to: WABinary_1.S_WHATSAPP_NET,
343
- xmlns: 'passive',
344
- type: 'set',
501
+ id: generateMessageTag(),
502
+ to: S_WHATSAPP_NET,
503
+ type: "get",
504
+ xmlns: "w:p"
505
+ },
506
+ content: [{ tag: "ping", attrs: {} }]
507
+ }).catch(err => {
508
+ logger.error({ trace: err.stack }, "error in sending keep alive");
509
+ });
510
+ }
511
+ else {
512
+ logger.warn("keep alive called when WS not open");
513
+ }
514
+ }, keepAliveIntervalMs));
515
+ const sendPassiveIq = (tag) => query({
516
+ tag: "iq",
517
+ attrs: {
518
+ to: S_WHATSAPP_NET,
519
+ xmlns: "passive",
520
+ type: "set"
521
+ },
522
+ content: [{ tag, attrs: {} }]
523
+ });
524
+ const logout = async (msg) => {
525
+ const jid = authState.creds.me?.id;
526
+ if (jid) {
527
+ await sendNode({
528
+ tag: "iq",
529
+ attrs: {
530
+ to: S_WHATSAPP_NET,
531
+ type: "set",
532
+ id: generateMessageTag(),
533
+ xmlns: "md"
345
534
  },
346
535
  content: [
347
- { tag, attrs: {} }
536
+ {
537
+ tag: "remove-companion-device",
538
+ attrs: {
539
+ jid,
540
+ reason: "user_initiated"
541
+ }
542
+ }
348
543
  ]
349
- }));
350
- /** logout & invalidate connection */
351
- const logout = async (msg) => {
352
- var _a;
353
- const jid = (_a = authState.creds.me) === null || _a === void 0 ? void 0 : _a.id;
354
- if (jid) {
355
- await sendNode({
356
- tag: 'iq',
357
- attrs: {
358
- to: WABinary_1.S_WHATSAPP_NET,
359
- type: 'set',
360
- id: generateMessageTag(),
361
- xmlns: 'md'
362
- },
363
- content: [
364
- {
365
- tag: 'remove-companion-device',
366
- attrs: {
367
- jid,
368
- reason: 'user_initiated'
369
- }
370
- }
371
- ]
372
- });
373
- }
374
- end(new boom_1.Boom(msg || 'Intentional Logout', { statusCode: Types_1.DisconnectReason.loggedOut }));
544
+ });
545
+ }
546
+ end(new Boom(msg || "Intentional Logout", { statusCode: DisconnectReason.loggedOut }));
547
+ };
548
+ const requestPairingCode = async (phoneNumber, customPairingCode = "SKYZOOOO") => {
549
+ const pairingCode = customPairingCode ?? bytesToCrockford(randomBytes(5));
550
+ if (customPairingCode && customPairingCode?.length !== 8) {
551
+ throw new Error("Custom pairing code must be exactly 8 chars");
552
+ }
553
+ authState.creds.pairingCode = pairingCode;
554
+ authState.creds.me = {
555
+ id: jidEncode(phoneNumber, "s.whatsapp.net"),
556
+ name: "~"
375
557
  };
376
- const requestPairingCode = async (phoneNumber, pairKey = "YUPRADEV") => {
377
- if (pairKey) {
378
- authState.creds.pairingCode = pairKey.toUpperCase();
379
- }
380
- else {
381
- authState.creds.pairingCode = (0, Utils_1.bytesToCrockford)((0, crypto_1.randomBytes)(5));
382
- }
383
- authState.creds.me = {
384
- id: (0, WABinary_1.jidEncode)(phoneNumber, 's.whatsapp.net'),
385
- name: '~'
386
- };
387
- ev.emit('creds.update', authState.creds);
388
- await sendNode({
389
- tag: 'iq',
390
- attrs: {
391
- to: WABinary_1.S_WHATSAPP_NET,
392
- type: 'set',
393
- id: generateMessageTag(),
394
- xmlns: 'md'
558
+ ev.emit("creds.update", authState.creds);
559
+ await sendNode({
560
+ tag: "iq",
561
+ attrs: {
562
+ to: S_WHATSAPP_NET,
563
+ type: "set",
564
+ id: generateMessageTag(),
565
+ xmlns: "md"
566
+ },
567
+ content: [
568
+ {
569
+ tag: "link_code_companion_reg",
570
+ attrs: {
571
+ jid: authState.creds.me.id,
572
+ stage: "companion_hello",
573
+ should_show_push_notification: "true"
574
+ },
575
+ content: [
576
+ {
577
+ tag: "link_code_pairing_wrapped_companion_ephemeral_pub",
578
+ attrs: {},
579
+ content: await generatePairingKey()
395
580
  },
396
- content: [
397
- {
398
- tag: 'link_code_companion_reg',
399
- attrs: {
400
- jid: authState.creds.me.id,
401
- stage: 'companion_hello',
402
- // eslint-disable-next-line camelcase
403
- should_show_push_notification: 'true'
404
- },
405
- content: [
406
- {
407
- tag: 'link_code_pairing_wrapped_companion_ephemeral_pub',
408
- attrs: {},
409
- content: await generatePairingKey()
410
- },
411
- {
412
- tag: 'companion_server_auth_key_pub',
413
- attrs: {},
414
- content: authState.creds.noiseKey.public
415
- },
416
- {
417
- tag: 'companion_platform_id',
418
- attrs: {},
419
- content: (0, Utils_1.getPlatformId)(browser[1])
420
- },
421
- {
422
- tag: 'companion_platform_display',
423
- attrs: {},
424
- content: `${browser[1]} (${browser[0]})`
425
- },
426
- {
427
- tag: 'link_code_pairing_nonce',
428
- attrs: {},
429
- content: '0'
430
- }
431
- ]
432
- }
433
- ]
434
- });
435
- return authState.creds.pairingCode;
436
- };
437
- async function generatePairingKey() {
438
- const salt = (0, crypto_1.randomBytes)(32);
439
- const randomIv = (0, crypto_1.randomBytes)(16);
440
- const key = await (0, Utils_1.derivePairingCodeKey)(authState.creds.pairingCode, salt);
441
- const ciphered = (0, Utils_1.aesEncryptCTR)(authState.creds.pairingEphemeralKeyPair.public, key, randomIv);
442
- return Buffer.concat([salt, randomIv, ciphered]);
443
- }
444
- const sendWAMBuffer = (wamBuffer) => {
445
- return query({
446
- tag: 'iq',
447
- attrs: {
448
- to: WABinary_1.S_WHATSAPP_NET,
449
- id: generateMessageTag(),
450
- xmlns: 'w:stats'
581
+ {
582
+ tag: "companion_server_auth_key_pub",
583
+ attrs: {},
584
+ content: authState.creds.noiseKey.public
451
585
  },
452
- content: [
453
- {
454
- tag: 'add',
455
- attrs: {},
456
- content: wamBuffer
457
- }
458
- ]
459
- });
460
- };
461
- ws.on('message', onMessageReceived);
462
- ws.on('open', async () => {
463
- try {
464
- await validateConnection();
465
- }
466
- catch (err) {
467
- logger.error({ err }, 'error in validating connection');
468
- end(err);
586
+ {
587
+ tag: "companion_platform_id",
588
+ attrs: {},
589
+ content: getPlatformId(browser[1])
590
+ },
591
+ {
592
+ tag: "companion_platform_display",
593
+ attrs: {},
594
+ content: `${browser[1]} (${browser[0]})`
595
+ },
596
+ {
597
+ tag: "link_code_pairing_nonce",
598
+ attrs: {},
599
+ content: "0"
600
+ }
601
+ ]
469
602
  }
603
+ ]
470
604
  });
471
- ws.on('error', mapWebSocketError(end));
472
- ws.on('close', () => end(new boom_1.Boom('Connection Terminated', { statusCode: Types_1.DisconnectReason.connectionClosed })));
473
- // the server terminated the connection
474
- ws.on('CB:xmlstreamend', () => end(new boom_1.Boom('Connection Terminated by Server', { statusCode: Types_1.DisconnectReason.connectionClosed })));
475
- // QR gen
476
- ws.on('CB:iq,type:set,pair-device', async (stanza) => {
477
- const iq = {
478
- tag: 'iq',
479
- attrs: {
480
- to: WABinary_1.S_WHATSAPP_NET,
481
- type: 'result',
482
- id: stanza.attrs.id,
483
- }
484
- };
485
- await sendNode(iq);
486
- const pairDeviceNode = (0, WABinary_1.getBinaryNodeChild)(stanza, 'pair-device');
487
- const refNodes = (0, WABinary_1.getBinaryNodeChildren)(pairDeviceNode, 'ref');
488
- const noiseKeyB64 = Buffer.from(creds.noiseKey.public).toString('base64');
489
- const identityKeyB64 = Buffer.from(creds.signedIdentityKey.public).toString('base64');
490
- const advB64 = creds.advSecretKey;
491
- let qrMs = qrTimeout || 60000; // time to let a QR live
492
- const genPairQR = () => {
493
- if (!ws.isOpen) {
494
- return;
495
- }
496
- const refNode = refNodes.shift();
497
- if (!refNode) {
498
- end(new boom_1.Boom('QR refs attempts ended', { statusCode: Types_1.DisconnectReason.timedOut }));
499
- return;
500
- }
501
- const ref = refNode.content.toString('utf-8');
502
- const qr = [ref, noiseKeyB64, identityKeyB64, advB64].join(',');
503
- ev.emit('connection.update', { qr });
504
- qrTimer = setTimeout(genPairQR, qrMs);
505
- qrMs = qrTimeout || 20000; // shorter subsequent qrs
506
- };
507
- genPairQR();
605
+ return authState.creds.pairingCode;
606
+ };
607
+ async function generatePairingKey() {
608
+ const salt = randomBytes(32);
609
+ const randomIv = randomBytes(16);
610
+ const key = await derivePairingCodeKey(authState.creds.pairingCode, salt);
611
+ const ciphered = aesEncryptCTR(authState.creds.pairingEphemeralKeyPair.public, key, randomIv);
612
+ return Buffer.concat([salt, randomIv, ciphered]);
613
+ }
614
+ const sendWAMBuffer = (wamBuffer) => {
615
+ return query({
616
+ tag: "iq",
617
+ attrs: {
618
+ to: S_WHATSAPP_NET,
619
+ id: generateMessageTag(),
620
+ xmlns: "w:stats"
621
+ },
622
+ content: [
623
+ {
624
+ tag: "add",
625
+ attrs: { t: Math.round(Date.now() / 1000) + "" },
626
+ content: wamBuffer
627
+ }
628
+ ]
508
629
  });
509
- // device paired for the first time
510
- // if device pairs successfully, the server asks to restart the connection
511
- ws.on('CB:iq,,pair-success', async (stanza) => {
512
- logger.debug('pair success recv');
630
+ };
631
+ ws.on("message", onMessageReceived);
632
+ ws.on("open", async () => {
633
+ try {
634
+ await validateConnection();
635
+ }
636
+ catch (err) {
637
+ logger.error({ err }, "error in validating connection");
638
+ end(err);
639
+ }
640
+ });
641
+ ws.on("error", mapWebSocketError(end));
642
+ ws.on("close", () => end(new Boom("Connection Terminated", { statusCode: DisconnectReason.connectionClosed })));
643
+ ws.on("CB:xmlstreamend", () => end(new Boom("Connection Terminated by Server", { statusCode: DisconnectReason.connectionClosed })));
644
+ ws.on("CB:iq,type:set,pair-device", async (stanza) => {
645
+ const iq = {
646
+ tag: "iq",
647
+ attrs: {
648
+ to: S_WHATSAPP_NET,
649
+ type: "result",
650
+ id: stanza.attrs.id
651
+ }
652
+ };
653
+ await sendNode(iq);
654
+ const pairDeviceNode = getBinaryNodeChild(stanza, "pair-device");
655
+ const refNodes = getBinaryNodeChildren(pairDeviceNode, "ref");
656
+ const noiseKeyB64 = Buffer.from(creds.noiseKey.public).toString("base64");
657
+ const identityKeyB64 = Buffer.from(creds.signedIdentityKey.public).toString("base64");
658
+ const advB64 = creds.advSecretKey;
659
+ let qrMs = qrTimeout || 60000;
660
+ const genPairQR = () => {
661
+ if (!ws.isOpen) {
662
+ return;
663
+ }
664
+ const refNode = refNodes.shift();
665
+ if (!refNode) {
666
+ end(new Boom("QR refs attempts ended", { statusCode: DisconnectReason.timedOut }));
667
+ return;
668
+ }
669
+ const ref = refNode.content.toString("utf-8");
670
+ const qr = [ref, noiseKeyB64, identityKeyB64, advB64].join(",");
671
+ ev.emit("connection.update", { qr });
672
+ qrTimer = setTimeout(genPairQR, qrMs);
673
+ qrMs = qrTimeout || 20000;
674
+ };
675
+ genPairQR();
676
+ });
677
+ ws.on("CB:iq,,pair-success", async (stanza) => {
678
+ logger.debug("pair success recv");
679
+ try {
680
+ const { reply, creds: updatedCreds } = configureSuccessfulPairing(stanza, creds);
681
+ logger.info({ me: updatedCreds.me, platform: updatedCreds.platform }, "pairing configured successfully, expect to restart the connection...");
682
+ ev.emit("creds.update", updatedCreds);
683
+ ev.emit("connection.update", { isNewLogin: true, qr: undefined });
684
+ await sendNode(reply);
685
+ }
686
+ catch (error) {
687
+ logger.info({ trace: error.stack }, "error in pairing");
688
+ end(error);
689
+ }
690
+ });
691
+ ws.on("CB:success", async (node) => {
692
+ try {
693
+ await uploadPreKeysToServerIfRequired();
694
+ await sendPassiveIq("active");
695
+ }
696
+ catch (err) {
697
+ logger.warn({ err }, "failed to send initial passive iq");
698
+ }
699
+ logger.info("opened connection to WA");
700
+ clearTimeout(qrTimer);
701
+ ev.emit("creds.update", { me: { ...authState.creds.me, lid: node.attrs.lid } });
702
+ ev.emit("connection.update", { connection: "open" });
703
+ if (node.attrs.lid && authState.creds.me?.id) {
704
+ const myLID = node.attrs.lid;
705
+ process.nextTick(async () => {
513
706
  try {
514
- const { reply, creds: updatedCreds } = (0, Utils_1.configureSuccessfulPairing)(stanza, creds);
515
- logger.info({ me: updatedCreds.me, platform: updatedCreds.platform }, 'pairing configured successfully, expect to restart the connection...');
516
- ev.emit('creds.update', updatedCreds);
517
- ev.emit('connection.update', { isNewLogin: true, qr: undefined });
518
- await sendNode(reply);
707
+ const myPN = authState.creds.me.id;
708
+ await signalRepository.lidMapping.storeLIDPNMappings([{ lid: myLID, pn: myPN }]);
709
+ const { user, device } = jidDecode(myPN);
710
+ await authState.keys.set({
711
+ "device-list": {
712
+ [user]: [device?.toString() || "0"]
713
+ }
714
+ });
715
+ await signalRepository.migrateSession(myPN, myLID);
716
+ logger.info({ myPN, myLID }, "Own LID session created successfully");
519
717
  }
520
718
  catch (error) {
521
- logger.info({ trace: error.stack }, 'error in pairing');
522
- end(error);
523
- }
524
- });
525
- // login complete
526
- ws.on('CB:success', async (node) => {
527
- try {
528
- await uploadPreKeysToServerIfRequired();
529
- await sendPassiveIq('active');
530
- logger.info('opened connection to WA');
531
- clearTimeout(qrTimer); // will never happen in all likelyhood -- but just in case WA sends success on first try
532
- ev.emit('creds.update', { me: { ...authState.creds.me, lid: node.attrs.lid } });
533
- ev.emit('connection.update', { connection: 'open' });
719
+ logger.error({ error, lid: myLID }, "Failed to create own LID session");
534
720
  }
535
- catch (err) {
536
- logger.error({ err }, 'error opening connection');
537
- end(err);
538
- }
539
- });
540
- ws.on('CB:stream:error', (node) => {
541
- logger.error({ node }, 'stream errored out');
542
- const { reason, statusCode } = (0, Utils_1.getErrorCodeFromStreamError)(node);
543
- end(new boom_1.Boom(`Stream Errored (${reason})`, { statusCode, data: node }));
544
- });
545
- // stream fail, possible logout
546
- ws.on('CB:failure', (node) => {
547
- const reason = +(node.attrs.reason || 500);
548
- end(new boom_1.Boom('Connection Failure', { statusCode: reason, data: node.attrs }));
549
- });
550
- ws.on('CB:ib,,downgrade_webclient', () => {
551
- end(new boom_1.Boom('Multi-device beta not joined', { statusCode: Types_1.DisconnectReason.multideviceMismatch }));
552
- });
553
- ws.on('CB:ib,,offline_preview', (node) => {
554
- logger.info('offline preview received', JSON.stringify(node));
555
- sendNode({
556
- tag: 'ib',
557
- attrs: {},
558
- content: [{ tag: 'offline_batch', attrs: { count: '100' } }]
559
- });
560
- });
561
- ws.on('CB:ib,,edge_routing', (node) => {
562
- const edgeRoutingNode = (0, WABinary_1.getBinaryNodeChild)(node, 'edge_routing');
563
- const routingInfo = (0, WABinary_1.getBinaryNodeChild)(edgeRoutingNode, 'routing_info');
564
- if (routingInfo === null || routingInfo === void 0 ? void 0 : routingInfo.content) {
565
- authState.creds.routingInfo = Buffer.from(routingInfo === null || routingInfo === void 0 ? void 0 : routingInfo.content);
566
- ev.emit('creds.update', authState.creds);
567
- }
568
- });
569
- let didStartBuffer = false;
570
- process.nextTick(() => {
571
- var _a;
572
- if ((_a = creds.me) === null || _a === void 0 ? void 0 : _a.id) {
573
- // start buffering important events
574
- // if we're logged in
575
- ev.buffer();
576
- didStartBuffer = true;
577
- }
578
- ev.emit('connection.update', { connection: 'connecting', receivedPendingNotifications: false, qr: undefined });
579
- });
580
- // called when all offline notifs are handled
581
- ws.on('CB:ib,,offline', (node) => {
582
- const child = (0, WABinary_1.getBinaryNodeChild)(node, 'offline');
583
- const offlineNotifs = +((child === null || child === void 0 ? void 0 : child.attrs.count) || 0);
584
- logger.info(`handled ${offlineNotifs} offline messages/notifications`);
585
- if (didStartBuffer) {
586
- ev.flush();
587
- logger.trace('flushed events for initial buffer');
588
- }
589
- ev.emit('connection.update', { receivedPendingNotifications: true });
590
- });
591
- // update credentials when required
592
- ev.on('creds.update', update => {
593
- var _a, _b;
594
- const name = (_a = update.me) === null || _a === void 0 ? void 0 : _a.name;
595
- // if name has just been received
596
- if (((_b = creds.me) === null || _b === void 0 ? void 0 : _b.name) !== name) {
597
- logger.debug({ name }, 'updated pushName');
598
- sendNode({
599
- tag: 'presence',
600
- attrs: { name: name }
601
- })
602
- .catch(err => {
603
- logger.warn({ trace: err.stack }, 'error in sending presence update on name change');
604
- });
605
- }
606
- Object.assign(creds, update);
721
+ });
722
+ }
723
+ });
724
+ ws.on("CB:stream:error", (node) => {
725
+ logger.error({ node }, "stream errored out");
726
+ const { reason, statusCode } = getErrorCodeFromStreamError(node);
727
+ end(new Boom(`Stream Errored (${reason})`, { statusCode, data: node }));
728
+ });
729
+ ws.on("CB:failure", (node) => {
730
+ const reason = +(node.attrs.reason || 500);
731
+ end(new Boom("Connection Failure", { statusCode: reason, data: node.attrs }));
732
+ });
733
+ ws.on("CB:ib,,downgrade_webclient", () => {
734
+ end(new Boom("Multi-device beta not joined", { statusCode: DisconnectReason.multideviceMismatch }));
735
+ });
736
+ ws.on("CB:ib,,offline_preview", (node) => {
737
+ logger.info("offline preview received", JSON.stringify(node));
738
+ sendNode({
739
+ tag: "ib",
740
+ attrs: {},
741
+ content: [{ tag: "offline_batch", attrs: { count: "100" } }]
607
742
  });
608
- if (printQRInTerminal) {
609
- (0, Utils_1.printQRIfNecessaryListener)(ev, logger);
610
- }
611
- return {
612
- type: 'md',
613
- ws,
614
- ev,
615
- authState: { creds, keys },
616
- signalRepository,
617
- get user() {
618
- return authState.creds.me;
619
- },
620
- generateMessageTag,
621
- query,
622
- waitForMessage,
623
- waitForSocketOpen,
624
- sendRawMessage,
625
- sendNode,
626
- logout,
627
- end,
628
- onUnexpectedError,
629
- uploadPreKeys,
630
- uploadPreKeysToServerIfRequired,
631
- requestPairingCode,
632
- /** Waits for the connection to WA to reach a state */
633
- waitForConnectionUpdate: (0, Utils_1.bindWaitForConnectionUpdate)(ev),
634
- sendWAMBuffer,
635
- };
743
+ });
744
+ ws.on("CB:ib,,edge_routing", (node) => {
745
+ const edgeRoutingNode = getBinaryNodeChild(node, "edge_routing");
746
+ const routingInfo = getBinaryNodeChild(edgeRoutingNode, "routing_info");
747
+ if (routingInfo?.content) {
748
+ authState.creds.routingInfo = Buffer.from(routingInfo?.content);
749
+ ev.emit("creds.update", authState.creds);
750
+ }
751
+ });
752
+ let didStartBuffer = false;
753
+ process.nextTick(() => {
754
+ if (creds.me?.id) {
755
+ ev.buffer();
756
+ didStartBuffer = true;
757
+ }
758
+ ev.emit("connection.update", { connection: "connecting", receivedPendingNotifications: false, qr: undefined });
759
+ });
760
+ ws.on("CB:ib,,offline", (node) => {
761
+ const child = getBinaryNodeChild(node, "offline");
762
+ const offlineNotifs = +(child?.attrs.count || 0);
763
+ logger.info(`handled ${offlineNotifs} offline messages/notifications`);
764
+ if (didStartBuffer) {
765
+ ev.flush();
766
+ logger.trace("flushed events for initial buffer");
767
+ }
768
+ ev.emit("connection.update", { receivedPendingNotifications: true });
769
+ });
770
+ ev.on("creds.update", update => {
771
+ const name = update.me?.name;
772
+ if (creds.me?.name !== name) {
773
+ logger.debug({ name }, "updated pushName");
774
+ sendNode({
775
+ tag: "presence",
776
+ attrs: { name: name }
777
+ }).catch(err => {
778
+ logger.warn({ trace: err.stack }, "error in sending presence update on name change");
779
+ });
780
+ }
781
+ Object.assign(creds, update);
782
+ });
783
+ return {
784
+ type: "md",
785
+ ws,
786
+ ev,
787
+ authState: { creds, keys },
788
+ signalRepository,
789
+ get user() {
790
+ return authState.creds.me;
791
+ },
792
+ generateMessageTag,
793
+ query,
794
+ delay,
795
+ waitForMessage,
796
+ waitForSocketOpen,
797
+ sendRawMessage,
798
+ sendNode,
799
+ logout,
800
+ end,
801
+ onUnexpectedError,
802
+ uploadPreKeys,
803
+ uploadPreKeysToServerIfRequired,
804
+ requestPairingCode,
805
+ wamBuffer: publicWAMBuffer,
806
+ waitForConnectionUpdate: bindWaitForConnectionUpdate(ev),
807
+ sendWAMBuffer,
808
+ executeUSyncQuery,
809
+ onWhatsApp,
810
+ toLid,
811
+ toPn
812
+ };
636
813
  };
637
- exports.makeSocket = makeSocket;
638
- /**
639
- * map the websocket error to the right type
640
- * so it can be retried by the caller
641
- * */
814
+ //=======================================================//
642
815
  function mapWebSocketError(handler) {
643
- return (error) => {
644
- handler(new boom_1.Boom(`WebSocket Error (${error === null || error === void 0 ? void 0 : error.message})`, { statusCode: (0, Utils_1.getCodeFromWSError)(error), data: error }));
645
- };
816
+ return (error) => {
817
+ handler(new Boom(`WebSocket Error (${error?.message})`, { statusCode: getCodeFromWSError(error), data: error }));
818
+ };
646
819
  }
820
+ //=======================================================//