@zentrix/baileys 4.1.5
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +202 -0
- package/WAProto/index.js +169661 -0
- package/engine-requirements.js +10 -0
- package/lib/Defaults/baileys-version.json +3 -0
- package/lib/Defaults/index.d.ts +53 -0
- package/lib/Defaults/index.js +147 -0
- package/lib/Defaults/phonenumber-mcc.json +223 -0
- package/lib/Signal/Group/ciphertext-message.d.ts +9 -0
- package/lib/Signal/Group/ciphertext-message.js +15 -0
- package/lib/Signal/Group/group-session-builder.d.ts +14 -0
- package/lib/Signal/Group/group-session-builder.js +64 -0
- package/lib/Signal/Group/group_cipher.d.ts +17 -0
- package/lib/Signal/Group/group_cipher.js +96 -0
- package/lib/Signal/Group/index.d.ts +11 -0
- package/lib/Signal/Group/index.js +57 -0
- package/lib/Signal/Group/keyhelper.d.ts +10 -0
- package/lib/Signal/Group/keyhelper.js +55 -0
- package/lib/Signal/Group/queue-job.d.ts +1 -0
- package/lib/Signal/Group/queue-job.js +57 -0
- package/lib/Signal/Group/sender-chain-key.d.ts +13 -0
- package/lib/Signal/Group/sender-chain-key.js +34 -0
- package/lib/Signal/Group/sender-key-distribution-message.d.ts +16 -0
- package/lib/Signal/Group/sender-key-distribution-message.js +66 -0
- package/lib/Signal/Group/sender-key-message.d.ts +18 -0
- package/lib/Signal/Group/sender-key-message.js +69 -0
- package/lib/Signal/Group/sender-key-name.d.ts +17 -0
- package/lib/Signal/Group/sender-key-name.js +51 -0
- package/lib/Signal/Group/sender-key-record.d.ts +30 -0
- package/lib/Signal/Group/sender-key-record.js +53 -0
- package/lib/Signal/Group/sender-key-state.d.ts +38 -0
- package/lib/Signal/Group/sender-key-state.js +99 -0
- package/lib/Signal/Group/sender-message-key.d.ts +11 -0
- package/lib/Signal/Group/sender-message-key.js +29 -0
- package/lib/Signal/libsignal.d.ts +3 -0
- package/lib/Signal/libsignal.js +336 -0
- package/lib/Signal/lid-mapping.js +293 -0
- package/lib/Socket/Client/abstract-socket-client.d.ts +17 -0
- package/lib/Socket/Client/abstract-socket-client.js +13 -0
- package/lib/Socket/Client/index.d.ts +3 -0
- package/lib/Socket/Client/index.js +19 -0
- package/lib/Socket/Client/mobile-socket-client.d.ts +13 -0
- package/lib/Socket/Client/mobile-socket-client.js +65 -0
- package/lib/Socket/Client/web-socket-client.d.ts +12 -0
- package/lib/Socket/Client/web-socket-client.js +62 -0
- package/lib/Socket/business.d.ts +171 -0
- package/lib/Socket/business.js +260 -0
- package/lib/Socket/chats.d.ts +267 -0
- package/lib/Socket/chats.js +970 -0
- package/lib/Socket/groups.d.ts +115 -0
- package/lib/Socket/groups.js +334 -0
- package/lib/Socket/index.d.ts +173 -0
- package/lib/Socket/index.js +11 -0
- package/lib/Socket/luxu.d.ts +268 -0
- package/lib/Socket/luxu.js +591 -0
- package/lib/Socket/messages-recv.d.ts +161 -0
- package/lib/Socket/messages-recv.js +1126 -0
- package/lib/Socket/messages-send.d.ts +149 -0
- package/lib/Socket/messages-send.js +913 -0
- package/lib/Socket/newsletter.d.ts +134 -0
- package/lib/Socket/newsletter.js +315 -0
- package/lib/Socket/registration.d.ts +267 -0
- package/lib/Socket/registration.js +166 -0
- package/lib/Socket/socket.d.ts +43 -0
- package/lib/Socket/socket.js +688 -0
- package/lib/Socket/usync.d.ts +36 -0
- package/lib/Socket/usync.js +70 -0
- package/lib/Store/index.d.ts +3 -0
- package/lib/Store/index.js +10 -0
- package/lib/Store/make-cache-manager-store.d.ts +13 -0
- package/lib/Store/make-cache-manager-store.js +83 -0
- package/lib/Store/make-in-memory-store.d.ts +118 -0
- package/lib/Store/make-in-memory-store.js +427 -0
- package/lib/Store/make-ordered-dictionary.d.ts +13 -0
- package/lib/Store/make-ordered-dictionary.js +81 -0
- package/lib/Store/object-repository.d.ts +10 -0
- package/lib/Store/object-repository.js +27 -0
- package/lib/Types/Auth.d.ts +110 -0
- package/lib/Types/Auth.js +2 -0
- package/lib/Types/Call.d.ts +13 -0
- package/lib/Types/Call.js +2 -0
- package/lib/Types/Chat.d.ts +102 -0
- package/lib/Types/Chat.js +4 -0
- package/lib/Types/Contact.d.ts +19 -0
- package/lib/Types/Contact.js +2 -0
- package/lib/Types/Events.d.ts +157 -0
- package/lib/Types/Events.js +2 -0
- package/lib/Types/GroupMetadata.d.ts +55 -0
- package/lib/Types/GroupMetadata.js +2 -0
- package/lib/Types/Label.d.ts +35 -0
- package/lib/Types/Label.js +27 -0
- package/lib/Types/LabelAssociation.d.ts +29 -0
- package/lib/Types/LabelAssociation.js +9 -0
- package/lib/Types/Message.d.ts +273 -0
- package/lib/Types/Message.js +9 -0
- package/lib/Types/Newsletter.d.ts +103 -0
- package/lib/Types/Newsletter.js +38 -0
- package/lib/Types/Product.d.ts +78 -0
- package/lib/Types/Product.js +2 -0
- package/lib/Types/Signal.d.ts +57 -0
- package/lib/Types/Signal.js +2 -0
- package/lib/Types/Socket.d.ts +111 -0
- package/lib/Types/Socket.js +2 -0
- package/lib/Types/State.d.ts +27 -0
- package/lib/Types/State.js +2 -0
- package/lib/Types/USync.d.ts +25 -0
- package/lib/Types/USync.js +2 -0
- package/lib/Types/index.d.ts +57 -0
- package/lib/Types/index.js +42 -0
- package/lib/Utils/auth-utils.d.ts +18 -0
- package/lib/Utils/auth-utils.js +206 -0
- package/lib/Utils/baileys-event-stream.d.ts +16 -0
- package/lib/Utils/baileys-event-stream.js +63 -0
- package/lib/Utils/business.d.ts +22 -0
- package/lib/Utils/business.js +234 -0
- package/lib/Utils/chat-utils.d.ts +71 -0
- package/lib/Utils/chat-utils.js +729 -0
- package/lib/Utils/crypto.d.ts +41 -0
- package/lib/Utils/crypto.js +151 -0
- package/lib/Utils/decode-wa-message.d.ts +19 -0
- package/lib/Utils/decode-wa-message.js +243 -0
- package/lib/Utils/event-buffer.d.ts +35 -0
- package/lib/Utils/event-buffer.js +514 -0
- package/lib/Utils/generics.d.ts +92 -0
- package/lib/Utils/generics.js +423 -0
- package/lib/Utils/history.d.ts +15 -0
- package/lib/Utils/history.js +96 -0
- package/lib/Utils/identity-change-handler.js +68 -0
- package/lib/Utils/index.d.ts +17 -0
- package/lib/Utils/index.js +41 -0
- package/lib/Utils/link-preview.d.ts +21 -0
- package/lib/Utils/link-preview.js +93 -0
- package/lib/Utils/logger.d.ts +4 -0
- package/lib/Utils/logger.js +7 -0
- package/lib/Utils/lt-hash.d.ts +12 -0
- package/lib/Utils/lt-hash.js +51 -0
- package/lib/Utils/make-mutex.d.ts +7 -0
- package/lib/Utils/make-mutex.js +43 -0
- package/lib/Utils/message-retry-manager.js +192 -0
- package/lib/Utils/messages-media.d.ts +116 -0
- package/lib/Utils/messages-media.js +819 -0
- package/lib/Utils/messages.d.ts +77 -0
- package/lib/Utils/messages.js +816 -0
- package/lib/Utils/noise-handler.d.ts +21 -0
- package/lib/Utils/noise-handler.js +155 -0
- package/lib/Utils/offline-node-processor.js +55 -0
- package/lib/Utils/pre-key-manager.js +95 -0
- package/lib/Utils/process-message.d.ts +41 -0
- package/lib/Utils/process-message.js +321 -0
- package/lib/Utils/signal.d.ts +32 -0
- package/lib/Utils/signal.js +153 -0
- package/lib/Utils/stanza-ack.js +47 -0
- package/lib/Utils/tc-token-utils.js +173 -0
- package/lib/Utils/use-multi-file-auth-state.d.ts +13 -0
- package/lib/Utils/use-multi-file-auth-state.js +119 -0
- package/lib/Utils/validate-connection.d.ts +11 -0
- package/lib/Utils/validate-connection.js +229 -0
- package/lib/WABinary/constants.d.ts +30 -0
- package/lib/WABinary/constants.js +40 -0
- package/lib/WABinary/decode.d.ts +7 -0
- package/lib/WABinary/decode.js +252 -0
- package/lib/WABinary/encode.d.ts +3 -0
- package/lib/WABinary/encode.js +265 -0
- package/lib/WABinary/generic-utils.d.ts +17 -0
- package/lib/WABinary/generic-utils.js +198 -0
- package/lib/WABinary/index.d.ts +5 -0
- package/lib/WABinary/index.js +21 -0
- package/lib/WABinary/jid-utils.d.ts +31 -0
- package/lib/WABinary/jid-utils.js +138 -0
- package/lib/WABinary/types.d.ts +18 -0
- package/lib/WABinary/types.js +2 -0
- package/lib/WAM/BinaryInfo.d.ts +17 -0
- package/lib/WAM/BinaryInfo.js +13 -0
- package/lib/WAM/constants.d.ts +38 -0
- package/lib/WAM/constants.js +15350 -0
- package/lib/WAM/encode.d.ts +3 -0
- package/lib/WAM/encode.js +155 -0
- package/lib/WAM/index.d.ts +3 -0
- package/lib/WAM/index.js +19 -0
- package/lib/WAUSync/Protocols/USyncContactProtocol.d.ts +9 -0
- package/lib/WAUSync/Protocols/USyncContactProtocol.js +32 -0
- package/lib/WAUSync/Protocols/USyncDeviceProtocol.d.ts +22 -0
- package/lib/WAUSync/Protocols/USyncDeviceProtocol.js +57 -0
- package/lib/WAUSync/Protocols/USyncDisappearingModeProtocol.d.ts +12 -0
- package/lib/WAUSync/Protocols/USyncDisappearingModeProtocol.js +30 -0
- package/lib/WAUSync/Protocols/USyncStatusProtocol.d.ts +12 -0
- package/lib/WAUSync/Protocols/USyncStatusProtocol.js +42 -0
- package/lib/WAUSync/Protocols/UsyncBotProfileProtocol.d.ts +25 -0
- package/lib/WAUSync/Protocols/UsyncBotProfileProtocol.js +53 -0
- package/lib/WAUSync/Protocols/UsyncLIDProtocol.d.ts +8 -0
- package/lib/WAUSync/Protocols/UsyncLIDProtocol.js +24 -0
- package/lib/WAUSync/Protocols/index.d.ts +4 -0
- package/lib/WAUSync/Protocols/index.js +20 -0
- package/lib/WAUSync/USyncQuery.d.ts +28 -0
- package/lib/WAUSync/USyncQuery.js +89 -0
- package/lib/WAUSync/USyncUser.d.ts +12 -0
- package/lib/WAUSync/USyncUser.js +26 -0
- package/lib/WAUSync/index.js +19 -0
- package/lib/index.d.ts +12 -0
- package/lib/index.js +35 -0
- package/package.json +108 -0
|
@@ -0,0 +1,173 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.storeTcTokensFromIqResult = exports.buildTcTokenFromJid = exports.resolveIssuanceJid = exports.resolveTcTokenJid = exports.shouldSendNewTcToken = exports.isTcTokenExpired = exports.buildMergedTcTokenIndexWrite = exports.readTcTokenIndex = exports.TC_TOKEN_INDEX_KEY = void 0;
|
|
4
|
+
const WABinary_1 = require("../WABinary");
|
|
5
|
+
|
|
6
|
+
const BOT_PHONE_REGEX = /^1313555\d{4}$|^131655500\d{2}$/;
|
|
7
|
+
|
|
8
|
+
/**
|
|
9
|
+
* Mirrors WA Web's `Wid.isRegularUser()` — gates tctoken storage against
|
|
10
|
+
* malformed notifications. Works for both pre- and post-normalized JIDs.
|
|
11
|
+
*/
|
|
12
|
+
function isRegularUser(jid) {
|
|
13
|
+
if (!jid) return false;
|
|
14
|
+
const user = jid.split('@')[0] || '';
|
|
15
|
+
if (user === '0') return false; // PSA
|
|
16
|
+
if (BOT_PHONE_REGEX.test(user)) return false; // Bot by phone
|
|
17
|
+
if (isJidMetaAI(jid)) return false; // MetaAI
|
|
18
|
+
return !!(
|
|
19
|
+
isPnUser(jid) ||
|
|
20
|
+
isLidUser(jid) ||
|
|
21
|
+
isHostedPnUser(jid) ||
|
|
22
|
+
isHostedLidUser(jid) ||
|
|
23
|
+
jid.endsWith('@c.us')
|
|
24
|
+
);
|
|
25
|
+
}
|
|
26
|
+
|
|
27
|
+
// Re-use helpers from WABinary if available, otherwise inline
|
|
28
|
+
function isPnUser(jid) { return !!(jid?.endsWith('@s.whatsapp.net')); }
|
|
29
|
+
function isLidUser(jid) { return !!(jid?.endsWith('@lid')); }
|
|
30
|
+
function isHostedPnUser(jid) { return !!(jid?.endsWith('@hosted')); }
|
|
31
|
+
function isHostedLidUser(jid) { return !!(jid?.endsWith('@hosted.lid')); }
|
|
32
|
+
function isJidMetaAI(jid) { return !!(jid?.endsWith('@bot')); }
|
|
33
|
+
|
|
34
|
+
const TC_TOKEN_BUCKET_DURATION = 604800; // 7 days
|
|
35
|
+
const TC_TOKEN_NUM_BUCKETS = 4; // ~28-day rolling window
|
|
36
|
+
|
|
37
|
+
/** Sentinel key holding a JSON array of tracked storage JIDs for cross-session pruning. */
|
|
38
|
+
exports.TC_TOKEN_INDEX_KEY = '__index';
|
|
39
|
+
|
|
40
|
+
async function readTcTokenIndex(keys) {
|
|
41
|
+
const data = await keys.get('tctoken', [exports.TC_TOKEN_INDEX_KEY]);
|
|
42
|
+
const entry = data[exports.TC_TOKEN_INDEX_KEY];
|
|
43
|
+
if (!entry?.token?.length) return [];
|
|
44
|
+
try {
|
|
45
|
+
const parsed = JSON.parse(Buffer.from(entry.token).toString());
|
|
46
|
+
if (!Array.isArray(parsed)) return [];
|
|
47
|
+
return parsed.filter(j => typeof j === 'string' && j.length > 0 && j !== exports.TC_TOKEN_INDEX_KEY);
|
|
48
|
+
} catch {
|
|
49
|
+
return [];
|
|
50
|
+
}
|
|
51
|
+
}
|
|
52
|
+
exports.readTcTokenIndex = readTcTokenIndex;
|
|
53
|
+
|
|
54
|
+
async function buildMergedTcTokenIndexWrite(keys, addedJids) {
|
|
55
|
+
const persisted = await readTcTokenIndex(keys);
|
|
56
|
+
const merged = new Set(persisted);
|
|
57
|
+
for (const jid of addedJids) {
|
|
58
|
+
if (jid && jid !== exports.TC_TOKEN_INDEX_KEY) merged.add(jid);
|
|
59
|
+
}
|
|
60
|
+
return {
|
|
61
|
+
[exports.TC_TOKEN_INDEX_KEY]: { token: Buffer.from(JSON.stringify([...merged])) }
|
|
62
|
+
};
|
|
63
|
+
}
|
|
64
|
+
exports.buildMergedTcTokenIndexWrite = buildMergedTcTokenIndexWrite;
|
|
65
|
+
|
|
66
|
+
function isTcTokenExpired(timestamp) {
|
|
67
|
+
if (timestamp === null || timestamp === undefined) return true;
|
|
68
|
+
const ts = typeof timestamp === 'string' ? parseInt(timestamp) : timestamp;
|
|
69
|
+
if (isNaN(ts)) return true;
|
|
70
|
+
const now = Math.floor(Date.now() / 1000);
|
|
71
|
+
const currentBucket = Math.floor(now / TC_TOKEN_BUCKET_DURATION);
|
|
72
|
+
const cutoffBucket = currentBucket - (TC_TOKEN_NUM_BUCKETS - 1);
|
|
73
|
+
const cutoffTimestamp = cutoffBucket * TC_TOKEN_BUCKET_DURATION;
|
|
74
|
+
return ts < cutoffTimestamp;
|
|
75
|
+
}
|
|
76
|
+
exports.isTcTokenExpired = isTcTokenExpired;
|
|
77
|
+
|
|
78
|
+
function shouldSendNewTcToken(senderTimestamp) {
|
|
79
|
+
if (senderTimestamp === undefined) return true;
|
|
80
|
+
const now = Math.floor(Date.now() / 1000);
|
|
81
|
+
const currentBucket = Math.floor(now / TC_TOKEN_BUCKET_DURATION);
|
|
82
|
+
const senderBucket = Math.floor(senderTimestamp / TC_TOKEN_BUCKET_DURATION);
|
|
83
|
+
return currentBucket > senderBucket;
|
|
84
|
+
}
|
|
85
|
+
exports.shouldSendNewTcToken = shouldSendNewTcToken;
|
|
86
|
+
|
|
87
|
+
async function resolveTcTokenJid(jid, getLIDForPN) {
|
|
88
|
+
if (isLidUser(jid)) return jid;
|
|
89
|
+
const lid = await getLIDForPN(jid);
|
|
90
|
+
return lid ?? jid;
|
|
91
|
+
}
|
|
92
|
+
exports.resolveTcTokenJid = resolveTcTokenJid;
|
|
93
|
+
|
|
94
|
+
async function resolveIssuanceJid(jid, issueToLid, getLIDForPN, getPNForLID) {
|
|
95
|
+
if (issueToLid) {
|
|
96
|
+
if (isLidUser(jid)) return jid;
|
|
97
|
+
const lid = await getLIDForPN(jid);
|
|
98
|
+
return lid ?? jid;
|
|
99
|
+
}
|
|
100
|
+
if (!isLidUser(jid)) return jid;
|
|
101
|
+
if (getPNForLID) {
|
|
102
|
+
const pn = await getPNForLID(jid);
|
|
103
|
+
return pn ?? jid;
|
|
104
|
+
}
|
|
105
|
+
return jid;
|
|
106
|
+
}
|
|
107
|
+
exports.resolveIssuanceJid = resolveIssuanceJid;
|
|
108
|
+
|
|
109
|
+
async function buildTcTokenFromJid({ authState, jid, baseContent = [], getLIDForPN }) {
|
|
110
|
+
try {
|
|
111
|
+
const storageJid = await resolveTcTokenJid(jid, getLIDForPN);
|
|
112
|
+
const tcTokenData = await authState.keys.get('tctoken', [storageJid]);
|
|
113
|
+
const entry = tcTokenData?.[storageJid];
|
|
114
|
+
const tcTokenBuffer = entry?.token;
|
|
115
|
+
|
|
116
|
+
if (!tcTokenBuffer?.length || isTcTokenExpired(entry?.timestamp)) {
|
|
117
|
+
if (tcTokenBuffer) {
|
|
118
|
+
const cleared =
|
|
119
|
+
entry?.senderTimestamp !== undefined
|
|
120
|
+
? { token: Buffer.alloc(0), senderTimestamp: entry.senderTimestamp }
|
|
121
|
+
: null;
|
|
122
|
+
await authState.keys.set({ tctoken: { [storageJid]: cleared } });
|
|
123
|
+
}
|
|
124
|
+
return baseContent.length > 0 ? baseContent : undefined;
|
|
125
|
+
}
|
|
126
|
+
|
|
127
|
+
baseContent.push({
|
|
128
|
+
tag: 'tctoken',
|
|
129
|
+
attrs: {},
|
|
130
|
+
content: tcTokenBuffer
|
|
131
|
+
});
|
|
132
|
+
|
|
133
|
+
return baseContent;
|
|
134
|
+
} catch (error) {
|
|
135
|
+
return baseContent.length > 0 ? baseContent : undefined;
|
|
136
|
+
}
|
|
137
|
+
}
|
|
138
|
+
exports.buildTcTokenFromJid = buildTcTokenFromJid;
|
|
139
|
+
|
|
140
|
+
async function storeTcTokensFromIqResult({ result, fallbackJid, keys, getLIDForPN, onNewJidStored }) {
|
|
141
|
+
const tokensNode = (0, WABinary_1.getBinaryNodeChild)(result, 'tokens');
|
|
142
|
+
if (!tokensNode) return;
|
|
143
|
+
|
|
144
|
+
const tokenNodes = (0, WABinary_1.getBinaryNodeChildren)(tokensNode, 'token');
|
|
145
|
+
for (const tokenNode of tokenNodes) {
|
|
146
|
+
if (tokenNode.attrs.type !== 'trusted_contact' || !(tokenNode.content instanceof Uint8Array)) {
|
|
147
|
+
continue;
|
|
148
|
+
}
|
|
149
|
+
|
|
150
|
+
const rawJid = (0, WABinary_1.jidNormalizedUser)(fallbackJid || tokenNode.attrs.jid);
|
|
151
|
+
if (!isRegularUser(rawJid)) continue;
|
|
152
|
+
const storageJid = await resolveTcTokenJid(rawJid, getLIDForPN);
|
|
153
|
+
const existingTcData = await keys.get('tctoken', [storageJid]);
|
|
154
|
+
const existingEntry = existingTcData[storageJid];
|
|
155
|
+
|
|
156
|
+
const existingTs = existingEntry?.timestamp ? Number(existingEntry.timestamp) : 0;
|
|
157
|
+
const incomingTs = tokenNode.attrs.t ? Number(tokenNode.attrs.t) : 0;
|
|
158
|
+
if (!incomingTs) continue;
|
|
159
|
+
if (existingTs > 0 && existingTs > incomingTs) continue;
|
|
160
|
+
|
|
161
|
+
await keys.set({
|
|
162
|
+
tctoken: {
|
|
163
|
+
[storageJid]: {
|
|
164
|
+
...existingEntry,
|
|
165
|
+
token: Buffer.from(tokenNode.content),
|
|
166
|
+
timestamp: tokenNode.attrs.t
|
|
167
|
+
}
|
|
168
|
+
}
|
|
169
|
+
});
|
|
170
|
+
if (onNewJidStored) onNewJidStored(storageJid);
|
|
171
|
+
}
|
|
172
|
+
}
|
|
173
|
+
exports.storeTcTokensFromIqResult = storeTcTokensFromIqResult;
|
|
@@ -0,0 +1,13 @@
|
|
|
1
|
+
import { AuthenticationState } from '../Types';
|
|
2
|
+
/**
|
|
3
|
+
* stores the full authentication state in a single folder.
|
|
4
|
+
* Far more efficient than singlefileauthstate
|
|
5
|
+
*
|
|
6
|
+
* Again, I wouldn't endorse this for any production level use other than perhaps a bot.
|
|
7
|
+
* Would recommend writing an auth state for use with a proper SQL or No-SQL DB
|
|
8
|
+
* */
|
|
9
|
+
export declare const useMultiFileAuthState: (folder: string) => Promise<{
|
|
10
|
+
state: AuthenticationState;
|
|
11
|
+
saveCreds: () => Promise<void>;
|
|
12
|
+
}>;
|
|
13
|
+
|
|
@@ -0,0 +1,119 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.useMultiFileAuthState = void 0;
|
|
4
|
+
const async_mutex_1 = require("async-mutex");
|
|
5
|
+
const promises_1 = require("fs/promises");
|
|
6
|
+
const path_1 = require("path");
|
|
7
|
+
const WAProto_1 = require("../../WAProto");
|
|
8
|
+
const auth_utils_1 = require("./auth-utils");
|
|
9
|
+
const generics_1 = require("./generics");
|
|
10
|
+
const fileLocks = new Map();
|
|
11
|
+
const getFileLock = (path) => {
|
|
12
|
+
let mutex = fileLocks.get(path);
|
|
13
|
+
if (!mutex) {
|
|
14
|
+
mutex = new async_mutex_1.Mutex();
|
|
15
|
+
fileLocks.set(path, mutex);
|
|
16
|
+
}
|
|
17
|
+
return mutex;
|
|
18
|
+
};
|
|
19
|
+
/**
|
|
20
|
+
* stores the full authentication state in a single folder.
|
|
21
|
+
* Far more efficient than singlefileauthstate
|
|
22
|
+
*
|
|
23
|
+
* Again, I wouldn't endorse this for any production level use other than perhaps a bot.
|
|
24
|
+
* Would recommend writing an auth state for use with a proper SQL or No-SQL DB
|
|
25
|
+
* */
|
|
26
|
+
const useMultiFileAuthState = async (folder) => {
|
|
27
|
+
const writeData = async (data, file) => {
|
|
28
|
+
const filePath = (0, path_1.join)(folder, fixFileName(file));
|
|
29
|
+
const mutex = getFileLock(filePath);
|
|
30
|
+
return mutex.acquire().then(async (release) => {
|
|
31
|
+
try {
|
|
32
|
+
await (0, promises_1.writeFile)(filePath, JSON.stringify(data, generics_1.BufferJSON.replacer));
|
|
33
|
+
}
|
|
34
|
+
finally {
|
|
35
|
+
release();
|
|
36
|
+
}
|
|
37
|
+
});
|
|
38
|
+
};
|
|
39
|
+
const readData = async (file) => {
|
|
40
|
+
try {
|
|
41
|
+
const filePath = (0, path_1.join)(folder, fixFileName(file));
|
|
42
|
+
const mutex = getFileLock(filePath);
|
|
43
|
+
return await mutex.acquire().then(async (release) => {
|
|
44
|
+
try {
|
|
45
|
+
const data = await (0, promises_1.readFile)(filePath, { encoding: 'utf-8' });
|
|
46
|
+
return JSON.parse(data, generics_1.BufferJSON.reviver);
|
|
47
|
+
}
|
|
48
|
+
finally {
|
|
49
|
+
release();
|
|
50
|
+
}
|
|
51
|
+
});
|
|
52
|
+
}
|
|
53
|
+
catch (error) {
|
|
54
|
+
return null;
|
|
55
|
+
}
|
|
56
|
+
};
|
|
57
|
+
const removeData = async (file) => {
|
|
58
|
+
try {
|
|
59
|
+
const filePath = (0, path_1.join)(folder, fixFileName(file));
|
|
60
|
+
const mutex = getFileLock(filePath);
|
|
61
|
+
return mutex.acquire().then(async (release) => {
|
|
62
|
+
try {
|
|
63
|
+
await (0, promises_1.unlink)(filePath);
|
|
64
|
+
}
|
|
65
|
+
catch (_a) {
|
|
66
|
+
}
|
|
67
|
+
finally {
|
|
68
|
+
release();
|
|
69
|
+
}
|
|
70
|
+
});
|
|
71
|
+
}
|
|
72
|
+
catch (_a) {
|
|
73
|
+
}
|
|
74
|
+
};
|
|
75
|
+
const folderInfo = await (0, promises_1.stat)(folder).catch(() => { });
|
|
76
|
+
if (folderInfo) {
|
|
77
|
+
if (!folderInfo.isDirectory()) {
|
|
78
|
+
throw new Error(`found something that is not a directory at ${folder}, either delete it or specify a different location`);
|
|
79
|
+
}
|
|
80
|
+
}
|
|
81
|
+
else {
|
|
82
|
+
await (0, promises_1.mkdir)(folder, { recursive: true });
|
|
83
|
+
}
|
|
84
|
+
const fixFileName = (file) => { var _a; return (_a = file === null || file === void 0 ? void 0 : file.replace(/\//g, '__')) === null || _a === void 0 ? void 0 : _a.replace(/:/g, '-'); };
|
|
85
|
+
const creds = await readData('creds.json') || (0, auth_utils_1.initAuthCreds)();
|
|
86
|
+
return {
|
|
87
|
+
state: {
|
|
88
|
+
creds,
|
|
89
|
+
keys: {
|
|
90
|
+
get: async (type, ids) => {
|
|
91
|
+
const data = {};
|
|
92
|
+
await Promise.all(ids.map(async (id) => {
|
|
93
|
+
let value = await readData(`${type}-${id}.json`);
|
|
94
|
+
if (type === 'app-state-sync-key' && value) {
|
|
95
|
+
value = WAProto_1.proto.Message.AppStateSyncKeyData.fromObject(value);
|
|
96
|
+
}
|
|
97
|
+
data[id] = value;
|
|
98
|
+
}));
|
|
99
|
+
return data;
|
|
100
|
+
},
|
|
101
|
+
set: async (data) => {
|
|
102
|
+
const tasks = [];
|
|
103
|
+
for (const category in data) {
|
|
104
|
+
for (const id in data[category]) {
|
|
105
|
+
const value = data[category][id];
|
|
106
|
+
const file = `${category}-${id}.json`;
|
|
107
|
+
tasks.push(value ? writeData(value, file) : removeData(file));
|
|
108
|
+
}
|
|
109
|
+
}
|
|
110
|
+
await Promise.all(tasks);
|
|
111
|
+
}
|
|
112
|
+
}
|
|
113
|
+
},
|
|
114
|
+
saveCreds: async () => {
|
|
115
|
+
return writeData(creds, 'creds.json');
|
|
116
|
+
}
|
|
117
|
+
};
|
|
118
|
+
};
|
|
119
|
+
exports.useMultiFileAuthState = useMultiFileAuthState;
|
|
@@ -0,0 +1,11 @@
|
|
|
1
|
+
import { proto } from '../../WAProto';
|
|
2
|
+
import type { AuthenticationCreds, SignalCreds, SocketConfig } from '../Types';
|
|
3
|
+
import { BinaryNode } from '../WABinary';
|
|
4
|
+
export declare const generateMobileNode: (config: SocketConfig) => proto.IClientPayload;
|
|
5
|
+
export declare const generateLoginNode: (userJid: string, config: SocketConfig) => proto.IClientPayload;
|
|
6
|
+
export declare const generateRegistrationNode: ({ registrationId, signedPreKey, signedIdentityKey }: SignalCreds, config: SocketConfig) => proto.ClientPayload;
|
|
7
|
+
export declare const configureSuccessfulPairing: (stanza: BinaryNode, { advSecretKey, signedIdentityKey, signalIdentities }: Pick<AuthenticationCreds, 'advSecretKey' | 'signedIdentityKey' | 'signalIdentities'>) => {
|
|
8
|
+
creds: Partial<AuthenticationCreds>;
|
|
9
|
+
reply: BinaryNode;
|
|
10
|
+
};
|
|
11
|
+
export declare const encodeSignedDeviceIdentity: (account: proto.IADVSignedDeviceIdentity, includeSignatureKey: boolean) => Uint8Array;
|
|
@@ -0,0 +1,229 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.encodeSignedDeviceIdentity = exports.configureSuccessfulPairing = exports.generateRegistrationNode = exports.generateLoginNode = void 0;
|
|
4
|
+
const boom_1 = require("@hapi/boom");
|
|
5
|
+
const crypto_1 = require("crypto");
|
|
6
|
+
const WAProto_1 = require("../../WAProto");
|
|
7
|
+
const Defaults_1 = require("../Defaults");
|
|
8
|
+
const WABinary_1 = require("../WABinary");
|
|
9
|
+
const crypto_2 = require("./crypto");
|
|
10
|
+
const generics_1 = require("./generics");
|
|
11
|
+
const signal_1 = require("./signal");
|
|
12
|
+
|
|
13
|
+
const getUserAgent = (config) => {
|
|
14
|
+
return {
|
|
15
|
+
appVersion: {
|
|
16
|
+
primary: config.version[0],
|
|
17
|
+
secondary: config.version[1],
|
|
18
|
+
tertiary: config.version[2],
|
|
19
|
+
},
|
|
20
|
+
platform: WAProto_1.proto.ClientPayload.UserAgent.Platform.WEB,
|
|
21
|
+
releaseChannel: WAProto_1.proto.ClientPayload.UserAgent.ReleaseChannel.RELEASE,
|
|
22
|
+
osVersion: '0.1',
|
|
23
|
+
device: 'Desktop',
|
|
24
|
+
osBuildNumber: '0.1',
|
|
25
|
+
localeLanguageIso6391: 'en',
|
|
26
|
+
mnc: '000',
|
|
27
|
+
mcc: '000',
|
|
28
|
+
localeCountryIso31661Alpha2: config.countryCode || 'US'
|
|
29
|
+
};
|
|
30
|
+
};
|
|
31
|
+
|
|
32
|
+
const PLATFORM_MAP = {
|
|
33
|
+
'Mac OS': WAProto_1.proto.ClientPayload.WebInfo.WebSubPlatform.DARWIN,
|
|
34
|
+
'Windows': WAProto_1.proto.ClientPayload.WebInfo.WebSubPlatform.WIN32
|
|
35
|
+
};
|
|
36
|
+
|
|
37
|
+
const getWebInfo = (config) => {
|
|
38
|
+
let webSubPlatform = WAProto_1.proto.ClientPayload.WebInfo.WebSubPlatform.WEB_BROWSER;
|
|
39
|
+
if (config.syncFullHistory && PLATFORM_MAP[config.browser[0]] && config.browser[1] === 'Desktop') {
|
|
40
|
+
webSubPlatform = PLATFORM_MAP[config.browser[0]];
|
|
41
|
+
}
|
|
42
|
+
return { webSubPlatform };
|
|
43
|
+
};
|
|
44
|
+
|
|
45
|
+
const getClientPayload = (config) => {
|
|
46
|
+
const payload = {
|
|
47
|
+
connectType: WAProto_1.proto.ClientPayload.ConnectType.WIFI_UNKNOWN,
|
|
48
|
+
connectReason: WAProto_1.proto.ClientPayload.ConnectReason.USER_ACTIVATED,
|
|
49
|
+
userAgent: getUserAgent(config),
|
|
50
|
+
};
|
|
51
|
+
payload.webInfo = getWebInfo(config);
|
|
52
|
+
return payload;
|
|
53
|
+
};
|
|
54
|
+
|
|
55
|
+
const generateLoginNode = (userJid, config) => {
|
|
56
|
+
const { user, device } = (0, WABinary_1.jidDecode)(userJid);
|
|
57
|
+
const payload = {
|
|
58
|
+
...getClientPayload(config),
|
|
59
|
+
passive: true,
|
|
60
|
+
pull: true,
|
|
61
|
+
username: +user,
|
|
62
|
+
device: device,
|
|
63
|
+
lidDbMigrated: false
|
|
64
|
+
};
|
|
65
|
+
return WAProto_1.proto.ClientPayload.fromObject(payload);
|
|
66
|
+
};
|
|
67
|
+
exports.generateLoginNode = generateLoginNode;
|
|
68
|
+
|
|
69
|
+
const getPlatformType = (platform) => {
|
|
70
|
+
const platformType = platform.toUpperCase();
|
|
71
|
+
return WAProto_1.proto.DeviceProps.PlatformType[platformType] || WAProto_1.proto.DeviceProps.PlatformType.CHROME;
|
|
72
|
+
};
|
|
73
|
+
|
|
74
|
+
const generateRegistrationNode = ({ registrationId, signedPreKey, signedIdentityKey }, config) => {
|
|
75
|
+
const appVersionBuf = (0, crypto_1.createHash)('md5')
|
|
76
|
+
.update(config.version.join('.'))
|
|
77
|
+
.digest();
|
|
78
|
+
|
|
79
|
+
const companion = {
|
|
80
|
+
os: config.browser[0],
|
|
81
|
+
platformType: getPlatformType(config.browser[1]),
|
|
82
|
+
requireFullSync: config.syncFullHistory,
|
|
83
|
+
historySyncConfig: {
|
|
84
|
+
storageQuotaMb: 10240,
|
|
85
|
+
inlineInitialPayloadInE2EeMsg: true,
|
|
86
|
+
recentSyncDaysLimit: undefined,
|
|
87
|
+
supportCallLogHistory: false,
|
|
88
|
+
supportBotUserAgentChatHistory: true,
|
|
89
|
+
supportCagReactionsAndPolls: true,
|
|
90
|
+
supportBizHostedMsg: true,
|
|
91
|
+
supportRecentSyncChunkMessageCountTuning: true,
|
|
92
|
+
supportHostedGroupMsg: true,
|
|
93
|
+
supportFbidBotChatHistory: true,
|
|
94
|
+
supportAddOnHistorySyncMigration: undefined,
|
|
95
|
+
supportMessageAssociation: true,
|
|
96
|
+
supportGroupHistory: false,
|
|
97
|
+
onDemandReady: undefined,
|
|
98
|
+
supportGuestChat: undefined
|
|
99
|
+
},
|
|
100
|
+
version: {
|
|
101
|
+
primary: 10,
|
|
102
|
+
secondary: 15,
|
|
103
|
+
tertiary: 7
|
|
104
|
+
}
|
|
105
|
+
};
|
|
106
|
+
|
|
107
|
+
const companionProto = WAProto_1.proto.DeviceProps.encode(companion).finish();
|
|
108
|
+
|
|
109
|
+
const registerPayload = {
|
|
110
|
+
...getClientPayload(config),
|
|
111
|
+
passive: false,
|
|
112
|
+
pull: false,
|
|
113
|
+
devicePairingData: {
|
|
114
|
+
buildHash: appVersionBuf,
|
|
115
|
+
deviceProps: companionProto,
|
|
116
|
+
eRegid: (0, generics_1.encodeBigEndian)(registrationId),
|
|
117
|
+
eKeytype: Defaults_1.KEY_BUNDLE_TYPE,
|
|
118
|
+
eIdent: signedIdentityKey.public,
|
|
119
|
+
eSkeyId: (0, generics_1.encodeBigEndian)(signedPreKey.keyId, 3),
|
|
120
|
+
eSkeyVal: signedPreKey.keyPair.public,
|
|
121
|
+
eSkeySig: signedPreKey.signature,
|
|
122
|
+
},
|
|
123
|
+
};
|
|
124
|
+
return WAProto_1.proto.ClientPayload.fromObject(registerPayload);
|
|
125
|
+
};
|
|
126
|
+
exports.generateRegistrationNode = generateRegistrationNode;
|
|
127
|
+
|
|
128
|
+
const configureSuccessfulPairing = (stanza, { advSecretKey, signedIdentityKey, signalIdentities }) => {
|
|
129
|
+
const msgId = stanza.attrs.id;
|
|
130
|
+
const pairSuccessNode = (0, WABinary_1.getBinaryNodeChild)(stanza, 'pair-success');
|
|
131
|
+
const deviceIdentityNode = (0, WABinary_1.getBinaryNodeChild)(pairSuccessNode, 'device-identity');
|
|
132
|
+
const platformNode = (0, WABinary_1.getBinaryNodeChild)(pairSuccessNode, 'platform');
|
|
133
|
+
const deviceNode = (0, WABinary_1.getBinaryNodeChild)(pairSuccessNode, 'device');
|
|
134
|
+
const businessNode = (0, WABinary_1.getBinaryNodeChild)(pairSuccessNode, 'biz');
|
|
135
|
+
|
|
136
|
+
if (!deviceIdentityNode || !deviceNode) {
|
|
137
|
+
throw new boom_1.Boom('Missing device-identity or device in pair success node', { data: stanza });
|
|
138
|
+
}
|
|
139
|
+
|
|
140
|
+
const bizName = businessNode?.attrs.name;
|
|
141
|
+
const jid = deviceNode.attrs.jid;
|
|
142
|
+
const lid = deviceNode.attrs.lid;
|
|
143
|
+
|
|
144
|
+
const { details, hmac, accountType } = WAProto_1.proto.ADVSignedDeviceIdentityHMAC.decode(deviceIdentityNode.content);
|
|
145
|
+
|
|
146
|
+
let hmacPrefix = Buffer.from([]);
|
|
147
|
+
if (accountType !== undefined && accountType === WAProto_1.proto.ADVEncryptionType.HOSTED) {
|
|
148
|
+
hmacPrefix = Buffer.from([0x06, 0x05]);
|
|
149
|
+
}
|
|
150
|
+
|
|
151
|
+
const advSign = (0, crypto_2.hmacSign)(Buffer.concat([hmacPrefix, details]), Buffer.from(advSecretKey, 'base64'));
|
|
152
|
+
if (Buffer.compare(hmac, advSign) !== 0) {
|
|
153
|
+
throw new boom_1.Boom('Invalid account signature');
|
|
154
|
+
}
|
|
155
|
+
|
|
156
|
+
const account = WAProto_1.proto.ADVSignedDeviceIdentity.decode(details);
|
|
157
|
+
const { accountSignatureKey, accountSignature, details: deviceDetails } = account;
|
|
158
|
+
|
|
159
|
+
const deviceIdentity = WAProto_1.proto.ADVDeviceIdentity.decode(deviceDetails);
|
|
160
|
+
|
|
161
|
+
const accountSignaturePrefix = deviceIdentity.deviceType === WAProto_1.proto.ADVEncryptionType.HOSTED
|
|
162
|
+
? Buffer.from([0x06, 0x05])
|
|
163
|
+
: Buffer.from([0x06, 0x00]);
|
|
164
|
+
const accountMsg = Buffer.concat([accountSignaturePrefix, deviceDetails, signedIdentityKey.public]);
|
|
165
|
+
|
|
166
|
+
if (!crypto_2.Curve.verify(accountSignatureKey, accountMsg, accountSignature)) {
|
|
167
|
+
throw new boom_1.Boom('Failed to verify account signature');
|
|
168
|
+
}
|
|
169
|
+
|
|
170
|
+
const deviceMsg = Buffer.concat([
|
|
171
|
+
Buffer.from([0x06, 0x01]),
|
|
172
|
+
deviceDetails,
|
|
173
|
+
signedIdentityKey.public,
|
|
174
|
+
accountSignatureKey
|
|
175
|
+
]);
|
|
176
|
+
account.deviceSignature = crypto_2.Curve.sign(signedIdentityKey.private, deviceMsg);
|
|
177
|
+
|
|
178
|
+
const identity = (0, signal_1.createSignalIdentity)(jid, accountSignatureKey);
|
|
179
|
+
const accountEnc = (0, exports.encodeSignedDeviceIdentity)(account, false);
|
|
180
|
+
|
|
181
|
+
const reply = {
|
|
182
|
+
tag: 'iq',
|
|
183
|
+
attrs: {
|
|
184
|
+
to: WABinary_1.S_WHATSAPP_NET,
|
|
185
|
+
type: 'result',
|
|
186
|
+
id: msgId,
|
|
187
|
+
},
|
|
188
|
+
content: [
|
|
189
|
+
{
|
|
190
|
+
tag: 'pair-device-sign',
|
|
191
|
+
attrs: {},
|
|
192
|
+
content: [
|
|
193
|
+
{
|
|
194
|
+
tag: 'device-identity',
|
|
195
|
+
attrs: { 'key-index': deviceIdentity.keyIndex.toString() },
|
|
196
|
+
content: accountEnc
|
|
197
|
+
}
|
|
198
|
+
]
|
|
199
|
+
}
|
|
200
|
+
]
|
|
201
|
+
};
|
|
202
|
+
|
|
203
|
+
const authUpdate = {
|
|
204
|
+
account,
|
|
205
|
+
me: { id: jid, name: bizName, lid },
|
|
206
|
+
signalIdentities: [
|
|
207
|
+
...(signalIdentities || []),
|
|
208
|
+
identity
|
|
209
|
+
],
|
|
210
|
+
platform: platformNode?.attrs.name
|
|
211
|
+
};
|
|
212
|
+
|
|
213
|
+
return {
|
|
214
|
+
creds: authUpdate,
|
|
215
|
+
reply
|
|
216
|
+
};
|
|
217
|
+
};
|
|
218
|
+
exports.configureSuccessfulPairing = configureSuccessfulPairing;
|
|
219
|
+
|
|
220
|
+
const encodeSignedDeviceIdentity = (account, includeSignatureKey) => {
|
|
221
|
+
account = { ...account };
|
|
222
|
+
if (!includeSignatureKey || !account.accountSignatureKey?.length) {
|
|
223
|
+
account.accountSignatureKey = null;
|
|
224
|
+
}
|
|
225
|
+
return WAProto_1.proto.ADVSignedDeviceIdentity
|
|
226
|
+
.encode(account)
|
|
227
|
+
.finish();
|
|
228
|
+
};
|
|
229
|
+
exports.encodeSignedDeviceIdentity = encodeSignedDeviceIdentity;
|
|
@@ -0,0 +1,30 @@
|
|
|
1
|
+
export declare const TAGS: {
|
|
2
|
+
LIST_EMPTY: number
|
|
3
|
+
DICTIONARY_0: number
|
|
4
|
+
DICTIONARY_1: number
|
|
5
|
+
DICTIONARY_2: number
|
|
6
|
+
DICTIONARY_3: number
|
|
7
|
+
INTEROP_JID: number
|
|
8
|
+
FB_JID: number
|
|
9
|
+
AD_JID: number
|
|
10
|
+
LIST_8: number
|
|
11
|
+
LIST_16: number
|
|
12
|
+
JID_PAIR: number
|
|
13
|
+
HEX_8: number
|
|
14
|
+
BINARY_8: number
|
|
15
|
+
BINARY_20: number
|
|
16
|
+
BINARY_32: number
|
|
17
|
+
NIBBLE_8: number
|
|
18
|
+
PACKED_MAX: number
|
|
19
|
+
}
|
|
20
|
+
|
|
21
|
+
export declare const DOUBLE_BYTE_TOKENS: string[][]
|
|
22
|
+
|
|
23
|
+
export declare const SINGLE_BYTE_TOKENS: (string | null)[]
|
|
24
|
+
|
|
25
|
+
export declare const TOKEN_MAP: {
|
|
26
|
+
[token: string]: {
|
|
27
|
+
dict?: number
|
|
28
|
+
index: number
|
|
29
|
+
}
|
|
30
|
+
}
|