UNPKG

@faouzkk/baileys

Version:

A WebSockets library for interacting with WhatsApp Web

369 lines 17.6 kB
"use strict"; var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) { if (k2 === undefined) k2 = k; var desc = Object.getOwnPropertyDescriptor(m, k); if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) { desc = { enumerable: true, get: function() { return m[k]; } }; } Object.defineProperty(o, k2, desc); }) : (function(o, m, k, k2) { if (k2 === undefined) k2 = k; o[k2] = m[k]; })); var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) { Object.defineProperty(o, "default", { enumerable: true, value: v }); }) : function(o, v) { o["default"] = v; }); var __importStar = (this && this.__importStar) || (function () { var ownKeys = function(o) { ownKeys = Object.getOwnPropertyNames || function (o) { var ar = []; for (var k in o) if (Object.prototype.hasOwnProperty.call(o, k)) ar[ar.length] = k; return ar; }; return ownKeys(o); }; return function (mod) { if (mod && mod.__esModule) return mod; var result = {}; if (mod != null) for (var k = ownKeys(mod), i = 0; i < k.length; i++) if (k[i] !== "default") __createBinding(result, mod, k[i]); __setModuleDefault(result, mod); return result; }; })(); Object.defineProperty(exports, "__esModule", { value: true }); exports.makeLibSignalRepository = makeLibSignalRepository; /* @ts-ignore */ const libsignal = __importStar(require("libsignal")); const lru_cache_1 = require("lru-cache"); const Utils_1 = require("../Utils"); const WABinary_1 = require("../WABinary"); const sender_key_name_1 = require("./Group/sender-key-name"); const sender_key_record_1 = require("./Group/sender-key-record"); const Group_1 = require("./Group"); const lid_mapping_1 = require("./lid-mapping"); function makeLibSignalRepository(auth, logger, pnToLIDFunc) { const lidMapping = new lid_mapping_1.LIDMappingStore(auth.keys, logger, pnToLIDFunc); const storage = signalStorage(auth, lidMapping); const parsedKeys = auth.keys; const migratedSessionCache = new lru_cache_1.LRUCache({ ttl: 7 * 24 * 60 * 60 * 1000, // 7 days ttlAutopurge: true, updateAgeOnGet: true }); const repository = { decryptGroupMessage({ group, authorJid, msg }) { const senderName = jidToSignalSenderKeyName(group, authorJid); const cipher = new Group_1.GroupCipher(storage, senderName); // Use transaction to ensure atomicity return parsedKeys.transaction(async () => { return cipher.decrypt(msg); }, group); }, async processSenderKeyDistributionMessage({ item, authorJid }) { const builder = new Group_1.GroupSessionBuilder(storage); if (!item.groupId) { throw new Error('Group ID is required for sender key distribution message'); } const senderName = jidToSignalSenderKeyName(item.groupId, authorJid); const senderMsg = new Group_1.SenderKeyDistributionMessage(null, null, null, null, item.axolotlSenderKeyDistributionMessage); const senderNameStr = senderName.toString(); const { [senderNameStr]: senderKey } = await auth.keys.get('sender-key', [senderNameStr]); if (!senderKey) { await storage.storeSenderKey(senderName, new sender_key_record_1.SenderKeyRecord()); } return parsedKeys.transaction(async () => { const { [senderNameStr]: senderKey } = await auth.keys.get('sender-key', [senderNameStr]); if (!senderKey) { await storage.storeSenderKey(senderName, new sender_key_record_1.SenderKeyRecord()); } await builder.process(senderName, senderMsg); }, item.groupId); }, async decryptMessage({ jid, type, ciphertext }) { const addr = jidToSignalProtocolAddress(jid); const session = new libsignal.SessionCipher(storage, addr); async function doDecrypt() { let result; switch (type) { case 'pkmsg': result = await session.decryptPreKeyWhisperMessage(ciphertext); break; case 'msg': result = await session.decryptWhisperMessage(ciphertext); break; } return result; } // If it's not a sync message, we need to ensure atomicity // For regular messages, we use a transaction to ensure atomicity return parsedKeys.transaction(async () => { return await doDecrypt(); }, jid); }, async encryptMessage({ jid, data }) { const addr = jidToSignalProtocolAddress(jid); const cipher = new libsignal.SessionCipher(storage, addr); // Use transaction to ensure atomicity return parsedKeys.transaction(async () => { const { type: sigType, body } = await cipher.encrypt(data); const type = sigType === 3 ? 'pkmsg' : 'msg'; return { type, ciphertext: Buffer.from(body, 'binary') }; }, jid); }, async encryptGroupMessage({ group, meId, data }) { const senderName = jidToSignalSenderKeyName(group, meId); const builder = new Group_1.GroupSessionBuilder(storage); const senderNameStr = senderName.toString(); return parsedKeys.transaction(async () => { const { [senderNameStr]: senderKey } = await auth.keys.get('sender-key', [senderNameStr]); if (!senderKey) { await storage.storeSenderKey(senderName, new sender_key_record_1.SenderKeyRecord()); } const senderKeyDistributionMessage = await builder.create(senderName); const session = new Group_1.GroupCipher(storage, senderName); const ciphertext = await session.encrypt(data); return { ciphertext, senderKeyDistributionMessage: senderKeyDistributionMessage.serialize() }; }, group); }, async injectE2ESession({ jid, session }) { const cipher = new libsignal.SessionBuilder(storage, jidToSignalProtocolAddress(jid)); return parsedKeys.transaction(async () => { await cipher.initOutgoing(session); }, jid); }, jidToSignalProtocolAddress(jid) { return jidToSignalProtocolAddress(jid).toString(); }, // Optimized direct access to LID mapping store lidMapping, async validateSession(jid) { try { const addr = jidToSignalProtocolAddress(jid); const session = await storage.loadSession(addr.toString()); if (!session) { return { exists: false, reason: 'no session' }; } if (!session.haveOpenSession()) { return { exists: false, reason: 'no open session' }; } return { exists: true }; } catch (error) { return { exists: false, reason: 'validation error' }; } }, async deleteSession(jids) { if (!jids.length) return; // Convert JIDs to signal addresses and prepare for bulk deletion const sessionUpdates = {}; jids.forEach(jid => { const addr = jidToSignalProtocolAddress(jid); sessionUpdates[addr.toString()] = null; }); // Single transaction for all deletions return parsedKeys.transaction(async () => { await auth.keys.set({ session: sessionUpdates }); }, `delete-${jids.length}-sessions`); }, async migrateSession(fromJid, toJid) { // TODO: use usync to handle this entire mess if (!fromJid || !toJid.includes('@lid')) return { migrated: 0, skipped: 0, total: 0 }; // Only support PN to LID migration if (!fromJid.includes('@s.whatsapp.net')) { return { migrated: 0, skipped: 0, total: 1 }; } const { user } = (0, WABinary_1.jidDecode)(fromJid); logger.debug({ fromJid }, 'bulk device migration - loading all user devices'); // Get user's device list from storage const { [user]: userDevices } = await parsedKeys.get('device-list', [user]); if (!userDevices) { return { migrated: 0, skipped: 0, total: 0 }; } const { device: fromDevice } = (0, WABinary_1.jidDecode)(fromJid); const fromDeviceStr = fromDevice?.toString() || '0'; if (!userDevices.includes(fromDeviceStr)) { userDevices.push(fromDeviceStr); } // Filter out cached devices before database fetch const uncachedDevices = userDevices.filter(device => { const deviceKey = `${user}.${device}`; return !migratedSessionCache.has(deviceKey); }); // Bulk check session existence only for uncached devices const deviceSessionKeys = uncachedDevices.map(device => `${user}.${device}`); const existingSessions = await parsedKeys.get('session', deviceSessionKeys); // Step 3: Convert existing sessions to JIDs (only migrate sessions that exist) const deviceJids = []; for (const [sessionKey, sessionData] of Object.entries(existingSessions)) { if (sessionData) { // Session exists in storage const deviceStr = sessionKey.split('.')[1]; if (!deviceStr) continue; const deviceNum = parseInt(deviceStr); const jid = deviceNum === 0 ? `${user}@s.whatsapp.net` : `${user}:${deviceNum}@s.whatsapp.net`; deviceJids.push(jid); } } logger.info({ fromJid, totalDevices: userDevices.length, devicesWithSessions: deviceJids.length, devices: deviceJids }, 'bulk device migration complete - all user devices processed'); // Single transaction for all migrations return parsedKeys.transaction(async () => { const migrationOps = deviceJids.map(jid => { const lidWithDevice = (0, WABinary_1.transferDevice)(jid, toJid); const fromDecoded = (0, WABinary_1.jidDecode)(jid); const toDecoded = (0, WABinary_1.jidDecode)(lidWithDevice); return { fromJid: jid, toJid: lidWithDevice, pnUser: fromDecoded.user, lidUser: toDecoded.user, deviceId: fromDecoded.device || 0, fromAddr: jidToSignalProtocolAddress(jid), toAddr: jidToSignalProtocolAddress(lidWithDevice) }; }); const totalOps = migrationOps.length; let migratedCount = 0; // Bulk fetch PN sessions - already exist (verified during device discovery) const pnAddrStrings = Array.from(new Set(migrationOps.map(op => op.fromAddr.toString()))); const pnSessions = await parsedKeys.get('session', pnAddrStrings); // Prepare bulk session updates (PN → LID migration + deletion) const sessionUpdates = {}; for (const op of migrationOps) { const pnAddrStr = op.fromAddr.toString(); const lidAddrStr = op.toAddr.toString(); const pnSession = pnSessions[pnAddrStr]; if (pnSession) { // Session exists (guaranteed from device discovery) const fromSession = libsignal.SessionRecord.deserialize(pnSession); if (fromSession.haveOpenSession()) { // Queue for bulk update: copy to LID, delete from PN sessionUpdates[lidAddrStr] = fromSession.serialize(); sessionUpdates[pnAddrStr] = null; migratedCount++; } } } // Single bulk session update for all migrations if (Object.keys(sessionUpdates).length > 0) { await parsedKeys.set({ session: sessionUpdates }); logger.debug({ migratedSessions: migratedCount }, 'bulk session migration complete'); // Cache device-level migrations for (const op of migrationOps) { if (sessionUpdates[op.toAddr.toString()]) { const deviceKey = `${op.pnUser}.${op.deviceId}`; migratedSessionCache.set(deviceKey, true); } } } const skippedCount = totalOps - migratedCount; return { migrated: migratedCount, skipped: skippedCount, total: totalOps }; }, `migrate-${deviceJids.length}-sessions-${(0, WABinary_1.jidDecode)(toJid)?.user}`); } }; return repository; } const jidToSignalProtocolAddress = (jid) => { const decoded = (0, WABinary_1.jidDecode)(jid); const { user, device, server } = decoded; if (!user) { throw new Error(`JID decoded but user is empty: "${jid}" -> user: "${user}", server: "${server}", device: ${device}`); } // LID addresses get _1 suffix for Signal protocol const signalUser = server === 'lid' ? `${user}_1` : user; const finalDevice = device || 0; return new libsignal.ProtocolAddress(signalUser, finalDevice); }; const jidToSignalSenderKeyName = (group, user) => { return new sender_key_name_1.SenderKeyName(group, jidToSignalProtocolAddress(user)); }; function signalStorage({ creds, keys }, lidMapping) { // Shared function to resolve PN signal address to LID if mapping exists const resolveSignalAddress = async (id) => { if (id.includes('.') && !id.includes('_1')) { const parts = id.split('.'); const device = parts[1] || '0'; const pnJid = device === '0' ? `${parts[0]}@s.whatsapp.net` : `${parts[0]}:${device}@s.whatsapp.net`; const lidForPN = await lidMapping.getLIDForPN(pnJid); if (lidForPN?.includes('@lid')) { const lidAddr = jidToSignalProtocolAddress(lidForPN); return lidAddr.toString(); } } return id; }; return { loadSession: async (id) => { try { const wireJid = await resolveSignalAddress(id); const { [wireJid]: sess } = await keys.get('session', [wireJid]); if (sess) { return libsignal.SessionRecord.deserialize(sess); } } catch (e) { return null; } return null; }, storeSession: async (id, session) => { const wireJid = await resolveSignalAddress(id); await keys.set({ session: { [wireJid]: session.serialize() } }); }, isTrustedIdentity: () => { return true; }, loadPreKey: async (id) => { const keyId = id.toString(); const { [keyId]: key } = await keys.get('pre-key', [keyId]); if (key) { return { privKey: Buffer.from(key.private), pubKey: Buffer.from(key.public) }; } }, removePreKey: (id) => keys.set({ 'pre-key': { [id]: null } }), loadSignedPreKey: () => { const key = creds.signedPreKey; return { privKey: Buffer.from(key.keyPair.private), pubKey: Buffer.from(key.keyPair.public) }; }, loadSenderKey: async (senderKeyName) => { const keyId = senderKeyName.toString(); const { [keyId]: key } = await keys.get('sender-key', [keyId]); if (key) { return sender_key_record_1.SenderKeyRecord.deserialize(key); } return new sender_key_record_1.SenderKeyRecord(); }, storeSenderKey: async (senderKeyName, key) => { const keyId = senderKeyName.toString(); const serialized = JSON.stringify(key.serialize()); await keys.set({ 'sender-key': { [keyId]: Buffer.from(serialized, 'utf-8') } }); }, getOurRegistrationId: () => creds.registrationId, getOurIdentity: () => { const { signedIdentityKey } = creds; return { privKey: Buffer.from(signedIdentityKey.private), pubKey: Buffer.from((0, Utils_1.generateSignalPubKey)(signedIdentityKey.public)) }; } }; } //# sourceMappingURL=libsignal.js.map