UNPKG

@whiskeysockets/baileys

Version:

A WebSockets library for interacting with WhatsApp Web

922 lines (921 loc) 44.9 kB
"use strict"; var __importDefault = (this && this.__importDefault) || function (mod) { return (mod && mod.__esModule) ? mod : { "default": mod }; }; Object.defineProperty(exports, "__esModule", { value: true }); exports.makeMessagesRecvSocket = void 0; const node_cache_1 = __importDefault(require("@cacheable/node-cache")); const boom_1 = require("@hapi/boom"); const crypto_1 = require("crypto"); const WAProto_1 = require("../../WAProto"); const Defaults_1 = require("../Defaults"); const Types_1 = require("../Types"); const Utils_1 = require("../Utils"); const make_mutex_1 = require("../Utils/make-mutex"); const WABinary_1 = require("../WABinary"); const groups_1 = require("./groups"); const messages_send_1 = require("./messages-send"); const makeMessagesRecvSocket = (config) => { const { logger, retryRequestDelayMs, maxMsgRetryCount, getMessage, shouldIgnoreJid } = config; const sock = (0, messages_send_1.makeMessagesSocket)(config); const { ev, authState, ws, processingMutex, signalRepository, query, upsertMessage, resyncAppState, onUnexpectedError, assertSessions, sendNode, relayMessage, sendReceipt, uploadPreKeys, sendPeerDataOperationMessage, } = sock; /** this mutex ensures that each retryRequest will wait for the previous one to finish */ const retryMutex = (0, make_mutex_1.makeMutex)(); const msgRetryCache = config.msgRetryCounterCache || new node_cache_1.default({ stdTTL: Defaults_1.DEFAULT_CACHE_TTLS.MSG_RETRY, // 1 hour useClones: false }); const callOfferCache = config.callOfferCache || new node_cache_1.default({ stdTTL: Defaults_1.DEFAULT_CACHE_TTLS.CALL_OFFER, // 5 mins useClones: false }); const placeholderResendCache = config.placeholderResendCache || new node_cache_1.default({ stdTTL: Defaults_1.DEFAULT_CACHE_TTLS.MSG_RETRY, // 1 hour useClones: false }); let sendActiveReceipts = false; const sendMessageAck = async ({ tag, attrs, content }, errorCode) => { const stanza = { tag: 'ack', attrs: { id: attrs.id, to: attrs.from, class: tag } }; if (!!errorCode) { stanza.attrs.error = errorCode.toString(); } if (!!attrs.participant) { stanza.attrs.participant = attrs.participant; } if (!!attrs.recipient) { stanza.attrs.recipient = attrs.recipient; } if (!!attrs.type && (tag !== 'message' || (0, WABinary_1.getBinaryNodeChild)({ tag, attrs, content }, 'unavailable') || errorCode !== 0)) { stanza.attrs.type = attrs.type; } if (tag === 'message' && (0, WABinary_1.getBinaryNodeChild)({ tag, attrs, content }, 'unavailable')) { stanza.attrs.from = authState.creds.me.id; } logger.debug({ recv: { tag, attrs }, sent: stanza.attrs }, 'sent ack'); await sendNode(stanza); }; const rejectCall = async (callId, callFrom) => { const stanza = ({ tag: 'call', attrs: { from: authState.creds.me.id, to: callFrom, }, content: [{ tag: 'reject', attrs: { 'call-id': callId, 'call-creator': callFrom, count: '0', }, content: undefined, }], }); await query(stanza); }; const sendRetryRequest = async (node, forceIncludeKeys = false) => { const { fullMessage } = (0, Utils_1.decodeMessageNode)(node, authState.creds.me.id, authState.creds.me.lid || ''); const { key: msgKey } = fullMessage; const msgId = msgKey.id; const key = `${msgId}:${msgKey === null || msgKey === void 0 ? void 0 : msgKey.participant}`; let retryCount = msgRetryCache.get(key) || 0; if (retryCount >= maxMsgRetryCount) { logger.debug({ retryCount, msgId }, 'reached retry limit, clearing'); msgRetryCache.del(key); return; } retryCount += 1; msgRetryCache.set(key, retryCount); const { account, signedPreKey, signedIdentityKey: identityKey } = authState.creds; if (retryCount === 1) { //request a resend via phone const msgId = await requestPlaceholderResend(msgKey); logger.debug(`sendRetryRequest: requested placeholder resend for message ${msgId}`); } const deviceIdentity = (0, Utils_1.encodeSignedDeviceIdentity)(account, true); await authState.keys.transaction(async () => { const receipt = { tag: 'receipt', attrs: { id: msgId, type: 'retry', to: node.attrs.from }, content: [ { tag: 'retry', attrs: { count: retryCount.toString(), id: node.attrs.id, t: node.attrs.t, v: '1' } }, { tag: 'registration', attrs: {}, content: (0, Utils_1.encodeBigEndian)(authState.creds.registrationId) } ] }; if (node.attrs.recipient) { receipt.attrs.recipient = node.attrs.recipient; } if (node.attrs.participant) { receipt.attrs.participant = node.attrs.participant; } if (retryCount > 1 || forceIncludeKeys) { const { update, preKeys } = await (0, Utils_1.getNextPreKeys)(authState, 1); const [keyId] = Object.keys(preKeys); const key = preKeys[+keyId]; const content = receipt.content; content.push({ tag: 'keys', attrs: {}, content: [ { tag: 'type', attrs: {}, content: Buffer.from(Defaults_1.KEY_BUNDLE_TYPE) }, { tag: 'identity', attrs: {}, content: identityKey.public }, (0, Utils_1.xmppPreKey)(key, +keyId), (0, Utils_1.xmppSignedPreKey)(signedPreKey), { tag: 'device-identity', attrs: {}, content: deviceIdentity } ] }); ev.emit('creds.update', update); } await sendNode(receipt); logger.info({ msgAttrs: node.attrs, retryCount }, 'sent retry receipt'); }); }; const handleEncryptNotification = async (node) => { const from = node.attrs.from; if (from === WABinary_1.S_WHATSAPP_NET) { const countChild = (0, WABinary_1.getBinaryNodeChild)(node, 'count'); const count = +countChild.attrs.value; const shouldUploadMorePreKeys = count < Defaults_1.MIN_PREKEY_COUNT; logger.debug({ count, shouldUploadMorePreKeys }, 'recv pre-key count'); if (shouldUploadMorePreKeys) { await uploadPreKeys(); } } else { const identityNode = (0, WABinary_1.getBinaryNodeChild)(node, 'identity'); if (identityNode) { logger.info({ jid: from }, 'identity changed'); // not handling right now // signal will override new identity anyway } else { logger.info({ node }, 'unknown encrypt notification'); } } }; const handleGroupNotification = (participant, child, msg) => { var _a, _b, _c, _d; const participantJid = ((_b = (_a = (0, WABinary_1.getBinaryNodeChild)(child, 'participant')) === null || _a === void 0 ? void 0 : _a.attrs) === null || _b === void 0 ? void 0 : _b.jid) || participant; switch (child === null || child === void 0 ? void 0 : child.tag) { case 'create': const metadata = (0, groups_1.extractGroupMetadata)(child); msg.messageStubType = Types_1.WAMessageStubType.GROUP_CREATE; msg.messageStubParameters = [metadata.subject]; msg.key = { participant: metadata.owner }; ev.emit('chats.upsert', [{ id: metadata.id, name: metadata.subject, conversationTimestamp: metadata.creation, }]); ev.emit('groups.upsert', [{ ...metadata, author: participant }]); break; case 'ephemeral': case 'not_ephemeral': msg.message = { protocolMessage: { type: WAProto_1.proto.Message.ProtocolMessage.Type.EPHEMERAL_SETTING, ephemeralExpiration: +(child.attrs.expiration || 0) } }; break; case 'modify': const oldNumber = (0, WABinary_1.getBinaryNodeChildren)(child, 'participant').map(p => p.attrs.jid); msg.messageStubParameters = oldNumber || []; msg.messageStubType = Types_1.WAMessageStubType.GROUP_PARTICIPANT_CHANGE_NUMBER; break; case 'promote': case 'demote': case 'remove': case 'add': case 'leave': const stubType = `GROUP_PARTICIPANT_${child.tag.toUpperCase()}`; msg.messageStubType = Types_1.WAMessageStubType[stubType]; const participants = (0, WABinary_1.getBinaryNodeChildren)(child, 'participant').map(p => p.attrs.jid); if (participants.length === 1 && // if recv. "remove" message and sender removed themselves // mark as left (0, WABinary_1.areJidsSameUser)(participants[0], participant) && child.tag === 'remove') { msg.messageStubType = Types_1.WAMessageStubType.GROUP_PARTICIPANT_LEAVE; } msg.messageStubParameters = participants; break; case 'subject': msg.messageStubType = Types_1.WAMessageStubType.GROUP_CHANGE_SUBJECT; msg.messageStubParameters = [child.attrs.subject]; break; case 'description': const description = (_d = (_c = (0, WABinary_1.getBinaryNodeChild)(child, 'body')) === null || _c === void 0 ? void 0 : _c.content) === null || _d === void 0 ? void 0 : _d.toString(); msg.messageStubType = Types_1.WAMessageStubType.GROUP_CHANGE_DESCRIPTION; msg.messageStubParameters = description ? [description] : undefined; break; case 'announcement': case 'not_announcement': msg.messageStubType = Types_1.WAMessageStubType.GROUP_CHANGE_ANNOUNCE; msg.messageStubParameters = [(child.tag === 'announcement') ? 'on' : 'off']; break; case 'locked': case 'unlocked': msg.messageStubType = Types_1.WAMessageStubType.GROUP_CHANGE_RESTRICT; msg.messageStubParameters = [(child.tag === 'locked') ? 'on' : 'off']; break; case 'invite': msg.messageStubType = Types_1.WAMessageStubType.GROUP_CHANGE_INVITE_LINK; msg.messageStubParameters = [child.attrs.code]; break; case 'member_add_mode': const addMode = child.content; if (addMode) { msg.messageStubType = Types_1.WAMessageStubType.GROUP_MEMBER_ADD_MODE; msg.messageStubParameters = [addMode.toString()]; } break; case 'membership_approval_mode': const approvalMode = (0, WABinary_1.getBinaryNodeChild)(child, 'group_join'); if (approvalMode) { msg.messageStubType = Types_1.WAMessageStubType.GROUP_MEMBERSHIP_JOIN_APPROVAL_MODE; msg.messageStubParameters = [approvalMode.attrs.state]; } break; case 'created_membership_requests': msg.messageStubType = Types_1.WAMessageStubType.GROUP_MEMBERSHIP_JOIN_APPROVAL_REQUEST_NON_ADMIN_ADD; msg.messageStubParameters = [participantJid, 'created', child.attrs.request_method]; break; case 'revoked_membership_requests': const isDenied = (0, WABinary_1.areJidsSameUser)(participantJid, participant); msg.messageStubType = Types_1.WAMessageStubType.GROUP_MEMBERSHIP_JOIN_APPROVAL_REQUEST_NON_ADMIN_ADD; msg.messageStubParameters = [participantJid, isDenied ? 'revoked' : 'rejected']; break; } }; const processNotification = async (node) => { var _a, _b, _c; const result = {}; const [child] = (0, WABinary_1.getAllBinaryNodeChildren)(node); const nodeType = node.attrs.type; const from = (0, WABinary_1.jidNormalizedUser)(node.attrs.from); switch (nodeType) { case 'privacy_token': const tokenList = (0, WABinary_1.getBinaryNodeChildren)(child, 'token'); for (const { attrs, content } of tokenList) { const jid = attrs.jid; ev.emit('chats.update', [ { id: jid, tcToken: content } ]); logger.debug({ jid }, 'got privacy token update'); } break; case 'w:gp2': handleGroupNotification(node.attrs.participant, child, result); break; case 'mediaretry': const event = (0, Utils_1.decodeMediaRetryNode)(node); ev.emit('messages.media-update', [event]); break; case 'encrypt': await handleEncryptNotification(node); break; case 'devices': const devices = (0, WABinary_1.getBinaryNodeChildren)(child, 'device'); if ((0, WABinary_1.areJidsSameUser)(child.attrs.jid, authState.creds.me.id)) { const deviceJids = devices.map(d => d.attrs.jid); logger.info({ deviceJids }, 'got my own devices'); } break; case 'server_sync': const update = (0, WABinary_1.getBinaryNodeChild)(node, 'collection'); if (update) { const name = update.attrs.name; await resyncAppState([name], false); } break; case 'picture': const setPicture = (0, WABinary_1.getBinaryNodeChild)(node, 'set'); const delPicture = (0, WABinary_1.getBinaryNodeChild)(node, 'delete'); ev.emit('contacts.update', [{ id: (0, WABinary_1.jidNormalizedUser)((_a = node === null || node === void 0 ? void 0 : node.attrs) === null || _a === void 0 ? void 0 : _a.from) || ((_c = (_b = (setPicture || delPicture)) === null || _b === void 0 ? void 0 : _b.attrs) === null || _c === void 0 ? void 0 : _c.hash) || '', imgUrl: setPicture ? 'changed' : 'removed' }]); if ((0, WABinary_1.isJidGroup)(from)) { const node = setPicture || delPicture; result.messageStubType = Types_1.WAMessageStubType.GROUP_CHANGE_ICON; if (setPicture) { result.messageStubParameters = [setPicture.attrs.id]; } result.participant = node === null || node === void 0 ? void 0 : node.attrs.author; result.key = { ...result.key || {}, participant: setPicture === null || setPicture === void 0 ? void 0 : setPicture.attrs.author }; } break; case 'account_sync': if (child.tag === 'disappearing_mode') { const newDuration = +child.attrs.duration; const timestamp = +child.attrs.t; logger.info({ newDuration }, 'updated account disappearing mode'); ev.emit('creds.update', { accountSettings: { ...authState.creds.accountSettings, defaultDisappearingMode: { ephemeralExpiration: newDuration, ephemeralSettingTimestamp: timestamp, }, } }); } else if (child.tag === 'blocklist') { const blocklists = (0, WABinary_1.getBinaryNodeChildren)(child, 'item'); for (const { attrs } of blocklists) { const blocklist = [attrs.jid]; const type = (attrs.action === 'block') ? 'add' : 'remove'; ev.emit('blocklist.update', { blocklist, type }); } } break; case 'link_code_companion_reg': const linkCodeCompanionReg = (0, WABinary_1.getBinaryNodeChild)(node, 'link_code_companion_reg'); const ref = toRequiredBuffer((0, WABinary_1.getBinaryNodeChildBuffer)(linkCodeCompanionReg, 'link_code_pairing_ref')); const primaryIdentityPublicKey = toRequiredBuffer((0, WABinary_1.getBinaryNodeChildBuffer)(linkCodeCompanionReg, 'primary_identity_pub')); const primaryEphemeralPublicKeyWrapped = toRequiredBuffer((0, WABinary_1.getBinaryNodeChildBuffer)(linkCodeCompanionReg, 'link_code_pairing_wrapped_primary_ephemeral_pub')); const codePairingPublicKey = await decipherLinkPublicKey(primaryEphemeralPublicKeyWrapped); const companionSharedKey = Utils_1.Curve.sharedKey(authState.creds.pairingEphemeralKeyPair.private, codePairingPublicKey); const random = (0, crypto_1.randomBytes)(32); const linkCodeSalt = (0, crypto_1.randomBytes)(32); const linkCodePairingExpanded = await (0, Utils_1.hkdf)(companionSharedKey, 32, { salt: linkCodeSalt, info: 'link_code_pairing_key_bundle_encryption_key' }); const encryptPayload = Buffer.concat([Buffer.from(authState.creds.signedIdentityKey.public), primaryIdentityPublicKey, random]); const encryptIv = (0, crypto_1.randomBytes)(12); const encrypted = (0, Utils_1.aesEncryptGCM)(encryptPayload, linkCodePairingExpanded, encryptIv, Buffer.alloc(0)); const encryptedPayload = Buffer.concat([linkCodeSalt, encryptIv, encrypted]); const identitySharedKey = Utils_1.Curve.sharedKey(authState.creds.signedIdentityKey.private, primaryIdentityPublicKey); const identityPayload = Buffer.concat([companionSharedKey, identitySharedKey, random]); authState.creds.advSecretKey = (await (0, Utils_1.hkdf)(identityPayload, 32, { info: 'adv_secret' })).toString('base64'); await query({ tag: 'iq', attrs: { to: WABinary_1.S_WHATSAPP_NET, type: 'set', id: sock.generateMessageTag(), xmlns: 'md' }, content: [ { tag: 'link_code_companion_reg', attrs: { jid: authState.creds.me.id, stage: 'companion_finish', }, content: [ { tag: 'link_code_pairing_wrapped_key_bundle', attrs: {}, content: encryptedPayload }, { tag: 'companion_identity_public', attrs: {}, content: authState.creds.signedIdentityKey.public }, { tag: 'link_code_pairing_ref', attrs: {}, content: ref } ] } ] }); authState.creds.registered = true; ev.emit('creds.update', authState.creds); } if (Object.keys(result).length) { return result; } }; async function decipherLinkPublicKey(data) { const buffer = toRequiredBuffer(data); const salt = buffer.slice(0, 32); const secretKey = await (0, Utils_1.derivePairingCodeKey)(authState.creds.pairingCode, salt); const iv = buffer.slice(32, 48); const payload = buffer.slice(48, 80); return (0, Utils_1.aesDecryptCTR)(payload, secretKey, iv); } function toRequiredBuffer(data) { if (data === undefined) { throw new boom_1.Boom('Invalid buffer', { statusCode: 400 }); } return data instanceof Buffer ? data : Buffer.from(data); } const willSendMessageAgain = (id, participant) => { const key = `${id}:${participant}`; const retryCount = msgRetryCache.get(key) || 0; return retryCount < maxMsgRetryCount; }; const updateSendMessageAgainCount = (id, participant) => { const key = `${id}:${participant}`; const newValue = (msgRetryCache.get(key) || 0) + 1; msgRetryCache.set(key, newValue); }; const sendMessagesAgain = async (key, ids, retryNode) => { var _a; // todo: implement a cache to store the last 256 sent messages (copy whatsmeow) const msgs = await Promise.all(ids.map(id => getMessage({ ...key, id }))); const remoteJid = key.remoteJid; const participant = key.participant || remoteJid; // if it's the primary jid sending the request // just re-send the message to everyone // prevents the first message decryption failure const sendToAll = !((_a = (0, WABinary_1.jidDecode)(participant)) === null || _a === void 0 ? void 0 : _a.device); await assertSessions([participant], true); if ((0, WABinary_1.isJidGroup)(remoteJid)) { await authState.keys.set({ 'sender-key-memory': { [remoteJid]: null } }); } logger.debug({ participant, sendToAll }, 'forced new session for retry recp'); for (const [i, msg] of msgs.entries()) { if (msg) { updateSendMessageAgainCount(ids[i], participant); const msgRelayOpts = { messageId: ids[i] }; if (sendToAll) { msgRelayOpts.useUserDevicesCache = false; } else { msgRelayOpts.participant = { jid: participant, count: +retryNode.attrs.count }; } await relayMessage(key.remoteJid, msg, msgRelayOpts); } else { logger.debug({ jid: key.remoteJid, id: ids[i] }, 'recv retry request, but message not available'); } } }; const handleReceipt = async (node) => { var _a, _b; const { attrs, content } = node; const isLid = attrs.from.includes('lid'); const isNodeFromMe = (0, WABinary_1.areJidsSameUser)(attrs.participant || attrs.from, isLid ? (_a = authState.creds.me) === null || _a === void 0 ? void 0 : _a.lid : (_b = authState.creds.me) === null || _b === void 0 ? void 0 : _b.id); const remoteJid = !isNodeFromMe || (0, WABinary_1.isJidGroup)(attrs.from) ? attrs.from : attrs.recipient; const fromMe = !attrs.recipient || ((attrs.type === 'retry' || attrs.type === 'sender') && isNodeFromMe); const key = { remoteJid, id: '', fromMe, participant: attrs.participant }; if (shouldIgnoreJid(remoteJid) && remoteJid !== '@s.whatsapp.net') { logger.debug({ remoteJid }, 'ignoring receipt from jid'); await sendMessageAck(node); return; } const ids = [attrs.id]; if (Array.isArray(content)) { const items = (0, WABinary_1.getBinaryNodeChildren)(content[0], 'item'); ids.push(...items.map(i => i.attrs.id)); } try { await Promise.all([ processingMutex.mutex(async () => { const status = (0, Utils_1.getStatusFromReceiptType)(attrs.type); if (typeof status !== 'undefined' && ( // basically, we only want to know when a message from us has been delivered to/read by the other person // or another device of ours has read some messages status >= WAProto_1.proto.WebMessageInfo.Status.SERVER_ACK || !isNodeFromMe)) { if ((0, WABinary_1.isJidGroup)(remoteJid) || (0, WABinary_1.isJidStatusBroadcast)(remoteJid)) { if (attrs.participant) { const updateKey = status === WAProto_1.proto.WebMessageInfo.Status.DELIVERY_ACK ? 'receiptTimestamp' : 'readTimestamp'; ev.emit('message-receipt.update', ids.map(id => ({ key: { ...key, id }, receipt: { userJid: (0, WABinary_1.jidNormalizedUser)(attrs.participant), [updateKey]: +attrs.t } }))); } } else { ev.emit('messages.update', ids.map(id => ({ key: { ...key, id }, update: { status } }))); } } if (attrs.type === 'retry') { // correctly set who is asking for the retry key.participant = key.participant || attrs.from; const retryNode = (0, WABinary_1.getBinaryNodeChild)(node, 'retry'); if (willSendMessageAgain(ids[0], key.participant)) { if (key.fromMe) { try { logger.debug({ attrs, key }, 'recv retry request'); await sendMessagesAgain(key, ids, retryNode); } catch (error) { logger.error({ key, ids, trace: error.stack }, 'error in sending message again'); } } else { logger.info({ attrs, key }, 'recv retry for not fromMe message'); } } else { logger.info({ attrs, key }, 'will not send message again, as sent too many times'); } } }) ]); } finally { await sendMessageAck(node); } }; const handleNotification = async (node) => { const remoteJid = node.attrs.from; if (shouldIgnoreJid(remoteJid) && remoteJid !== '@s.whatsapp.net') { logger.debug({ remoteJid, id: node.attrs.id }, 'ignored notification'); await sendMessageAck(node); return; } try { await Promise.all([ processingMutex.mutex(async () => { var _a; const msg = await processNotification(node); if (msg) { const fromMe = (0, WABinary_1.areJidsSameUser)(node.attrs.participant || remoteJid, authState.creds.me.id); msg.key = { remoteJid, fromMe, participant: node.attrs.participant, id: node.attrs.id, ...(msg.key || {}) }; (_a = msg.participant) !== null && _a !== void 0 ? _a : (msg.participant = node.attrs.participant); msg.messageTimestamp = +node.attrs.t; const fullMsg = WAProto_1.proto.WebMessageInfo.fromObject(msg); await upsertMessage(fullMsg, 'append'); } }) ]); } finally { await sendMessageAck(node); } }; const handleMessage = async (node) => { var _a, _b, _c; if (shouldIgnoreJid(node.attrs.from) && node.attrs.from !== '@s.whatsapp.net') { logger.debug({ key: node.attrs.key }, 'ignored message'); await sendMessageAck(node); return; } const encNode = (0, WABinary_1.getBinaryNodeChild)(node, 'enc'); // TODO: temporary fix for crashes and issues resulting of failed msmsg decryption if (encNode && encNode.attrs.type === 'msmsg') { logger.debug({ key: node.attrs.key }, 'ignored msmsg'); await sendMessageAck(node); return; } let response; if ((0, WABinary_1.getBinaryNodeChild)(node, 'unavailable') && !encNode) { await sendMessageAck(node); const { key } = (0, Utils_1.decodeMessageNode)(node, authState.creds.me.id, authState.creds.me.lid || '').fullMessage; response = await requestPlaceholderResend(key); if (response === 'RESOLVED') { return; } logger.debug('received unavailable message, acked and requested resend from phone'); } else { if (placeholderResendCache.get(node.attrs.id)) { placeholderResendCache.del(node.attrs.id); } } const { fullMessage: msg, category, author, decrypt } = (0, Utils_1.decryptMessageNode)(node, authState.creds.me.id, authState.creds.me.lid || '', signalRepository, logger); if (response && ((_a = msg === null || msg === void 0 ? void 0 : msg.messageStubParameters) === null || _a === void 0 ? void 0 : _a[0]) === Utils_1.NO_MESSAGE_FOUND_ERROR_TEXT) { msg.messageStubParameters = [Utils_1.NO_MESSAGE_FOUND_ERROR_TEXT, response]; } if (((_c = (_b = msg.message) === null || _b === void 0 ? void 0 : _b.protocolMessage) === null || _c === void 0 ? void 0 : _c.type) === WAProto_1.proto.Message.ProtocolMessage.Type.SHARE_PHONE_NUMBER && node.attrs.sender_pn) { ev.emit('chats.phoneNumberShare', { lid: node.attrs.from, jid: node.attrs.sender_pn }); } try { await Promise.all([ processingMutex.mutex(async () => { var _a; await decrypt(); // message failed to decrypt if (msg.messageStubType === WAProto_1.proto.WebMessageInfo.StubType.CIPHERTEXT) { if (((_a = msg === null || msg === void 0 ? void 0 : msg.messageStubParameters) === null || _a === void 0 ? void 0 : _a[0]) === Utils_1.MISSING_KEYS_ERROR_TEXT) { return sendMessageAck(node, Utils_1.NACK_REASONS.ParsingError); } retryMutex.mutex(async () => { if (ws.isOpen) { if ((0, WABinary_1.getBinaryNodeChild)(node, 'unavailable')) { return; } const encNode = (0, WABinary_1.getBinaryNodeChild)(node, 'enc'); await sendRetryRequest(node, !encNode); if (retryRequestDelayMs) { await (0, Utils_1.delay)(retryRequestDelayMs); } } else { logger.debug({ node }, 'connection closed, ignoring retry req'); } }); } else { // no type in the receipt => message delivered let type = undefined; let participant = msg.key.participant; if (category === 'peer') { // special peer message type = 'peer_msg'; } else if (msg.key.fromMe) { // message was sent by us from a different device type = 'sender'; // need to specially handle this case if ((0, WABinary_1.isJidUser)(msg.key.remoteJid)) { participant = author; } } else if (!sendActiveReceipts) { type = 'inactive'; } await sendReceipt(msg.key.remoteJid, participant, [msg.key.id], type); // send ack for history message const isAnyHistoryMsg = (0, Utils_1.getHistoryMsg)(msg.message); if (isAnyHistoryMsg) { const jid = (0, WABinary_1.jidNormalizedUser)(msg.key.remoteJid); await sendReceipt(jid, undefined, [msg.key.id], 'hist_sync'); } } (0, Utils_1.cleanMessage)(msg, authState.creds.me.id); await sendMessageAck(node); await upsertMessage(msg, node.attrs.offline ? 'append' : 'notify'); }) ]); } catch (error) { logger.error({ error, node }, 'error in handling message'); } }; const fetchMessageHistory = async (count, oldestMsgKey, oldestMsgTimestamp) => { var _a; if (!((_a = authState.creds.me) === null || _a === void 0 ? void 0 : _a.id)) { throw new boom_1.Boom('Not authenticated'); } const pdoMessage = { historySyncOnDemandRequest: { chatJid: oldestMsgKey.remoteJid, oldestMsgFromMe: oldestMsgKey.fromMe, oldestMsgId: oldestMsgKey.id, oldestMsgTimestampMs: oldestMsgTimestamp, onDemandMsgCount: count }, peerDataOperationRequestType: WAProto_1.proto.Message.PeerDataOperationRequestType.HISTORY_SYNC_ON_DEMAND }; return sendPeerDataOperationMessage(pdoMessage); }; const requestPlaceholderResend = async (messageKey) => { var _a; if (!((_a = authState.creds.me) === null || _a === void 0 ? void 0 : _a.id)) { throw new boom_1.Boom('Not authenticated'); } if (placeholderResendCache.get(messageKey === null || messageKey === void 0 ? void 0 : messageKey.id)) { logger.debug({ messageKey }, 'already requested resend'); return; } else { placeholderResendCache.set(messageKey === null || messageKey === void 0 ? void 0 : messageKey.id, true); } await (0, Utils_1.delay)(5000); if (!placeholderResendCache.get(messageKey === null || messageKey === void 0 ? void 0 : messageKey.id)) { logger.debug({ messageKey }, 'message received while resend requested'); return 'RESOLVED'; } const pdoMessage = { placeholderMessageResendRequest: [{ messageKey }], peerDataOperationRequestType: WAProto_1.proto.Message.PeerDataOperationRequestType.PLACEHOLDER_MESSAGE_RESEND }; setTimeout(() => { if (placeholderResendCache.get(messageKey === null || messageKey === void 0 ? void 0 : messageKey.id)) { logger.debug({ messageKey }, 'PDO message without response after 15 seconds. Phone possibly offline'); placeholderResendCache.del(messageKey === null || messageKey === void 0 ? void 0 : messageKey.id); } }, 15000); return sendPeerDataOperationMessage(pdoMessage); }; const handleCall = async (node) => { const { attrs } = node; const [infoChild] = (0, WABinary_1.getAllBinaryNodeChildren)(node); const callId = infoChild.attrs['call-id']; const from = infoChild.attrs.from || infoChild.attrs['call-creator']; const status = (0, Utils_1.getCallStatusFromNode)(infoChild); const call = { chatId: attrs.from, from, id: callId, date: new Date(+attrs.t * 1000), offline: !!attrs.offline, status, }; if (status === 'offer') { call.isVideo = !!(0, WABinary_1.getBinaryNodeChild)(infoChild, 'video'); call.isGroup = infoChild.attrs.type === 'group' || !!infoChild.attrs['group-jid']; call.groupJid = infoChild.attrs['group-jid']; callOfferCache.set(call.id, call); } const existingCall = callOfferCache.get(call.id); // use existing call info to populate this event if (existingCall) { call.isVideo = existingCall.isVideo; call.isGroup = existingCall.isGroup; } // delete data once call has ended if (status === 'reject' || status === 'accept' || status === 'timeout' || status === 'terminate') { callOfferCache.del(call.id); } ev.emit('call', [call]); await sendMessageAck(node); }; const handleBadAck = async ({ attrs }) => { const key = { remoteJid: attrs.from, fromMe: true, id: attrs.id }; // WARNING: REFRAIN FROM ENABLING THIS FOR NOW. IT WILL CAUSE A LOOP // // current hypothesis is that if pash is sent in the ack // // it means -- the message hasn't reached all devices yet // // we'll retry sending the message here // if(attrs.phash) { // logger.info({ attrs }, 'received phash in ack, resending message...') // const msg = await getMessage(key) // if(msg) { // await relayMessage(key.remoteJid!, msg, { messageId: key.id!, useUserDevicesCache: false }) // } else { // logger.warn({ attrs }, 'could not send message again, as it was not found') // } // } // error in acknowledgement, // device could not display the message if (attrs.error) { logger.warn({ attrs }, 'received error in ack'); ev.emit('messages.update', [ { key, update: { status: Types_1.WAMessageStatus.ERROR, messageStubParameters: [ attrs.error ] } } ]); } }; /// processes a node with the given function /// and adds the task to the existing buffer if we're buffering events const processNodeWithBuffer = async (node, identifier, exec) => { ev.buffer(); await execTask(); ev.flush(); function execTask() { return exec(node, false) .catch(err => onUnexpectedError(err, identifier)); } }; const makeOfflineNodeProcessor = () => { const nodeProcessorMap = new Map([ ['message', handleMessage], ['call', handleCall], ['receipt', handleReceipt], ['notification', handleNotification] ]); const nodes = []; let isProcessing = false; const enqueue = (type, node) => { nodes.push({ type, node }); if (isProcessing) { return; } isProcessing = true; const promise = async () => { while (nodes.length && ws.isOpen) { const { type, node } = nodes.shift(); const nodeProcessor = nodeProcessorMap.get(type); if (!nodeProcessor) { onUnexpectedError(new Error(`unknown offline node type: ${type}`), 'processing offline node'); continue; } await nodeProcessor(node); } isProcessing = false; }; promise().catch(error => onUnexpectedError(error, 'processing offline nodes')); }; return { enqueue }; }; const offlineNodeProcessor = makeOfflineNodeProcessor(); const processNode = (type, node, identifier, exec) => { const isOffline = !!node.attrs.offline; if (isOffline) { offlineNodeProcessor.enqueue(type, node); } else { processNodeWithBuffer(node, identifier, exec); } }; // recv a message ws.on('CB:message', (node) => { processNode('message', node, 'processing message', handleMessage); }); ws.on('CB:call', async (node) => { processNode('call', node, 'handling call', handleCall); }); ws.on('CB:receipt', node => { processNode('receipt', node, 'handling receipt', handleReceipt); }); ws.on('CB:notification', async (node) => { processNode('notification', node, 'handling notification', handleNotification); }); ws.on('CB:ack,class:message', (node) => { handleBadAck(node) .catch(error => onUnexpectedError(error, 'handling bad ack')); }); ev.on('call', ([call]) => { // missed call + group call notification message generation if (call.status === 'timeout' || (call.status === 'offer' && call.isGroup)) { const msg = { key: { remoteJid: call.chatId, id: call.id, fromMe: false }, messageTimestamp: (0, Utils_1.unixTimestampSeconds)(call.date), }; if (call.status === 'timeout') { if (call.isGroup) { msg.messageStubType = call.isVideo ? Types_1.WAMessageStubType.CALL_MISSED_GROUP_VIDEO : Types_1.WAMessageStubType.CALL_MISSED_GROUP_VOICE; } else { msg.messageStubType = call.isVideo ? Types_1.WAMessageStubType.CALL_MISSED_VIDEO : Types_1.WAMessageStubType.CALL_MISSED_VOICE; } } else { msg.message = { call: { callKey: Buffer.from(call.id) } }; } const protoMsg = WAProto_1.proto.WebMessageInfo.fromObject(msg); upsertMessage(protoMsg, call.offline ? 'append' : 'notify'); } }); ev.on('connection.update', ({ isOnline }) => { if (typeof isOnline !== 'undefined') { sendActiveReceipts = isOnline; logger.trace(`sendActiveReceipts set to "${sendActiveReceipts}"`); } }); return { ...sock, sendMessageAck, sendRetryRequest, rejectCall, fetchMessageHistory, requestPlaceholderResend, }; }; exports.makeMessagesRecvSocket = makeMessagesRecvSocket;