neroxbailx
Version:
baileys whatsapp-api
1,010 lines (1,007 loc) • 28.6 kB
JavaScript
"use strict"
var __importDefault = (this && this.__importDefault) || function (mod) {
return (mod && mod.__esModule) ? mod : { "default": mod }
}
Object.defineProperty(exports, "__esModule", { value: true })
const node_cache_1 = __importDefault(require("@cacheable/node-cache"))
const boom_1 = require("@hapi/boom")
const crypto_1 = require("crypto")
const WAProto_1 = require("../../WAProto")
const Defaults_1 = require("../Defaults")
const Utils_1 = require("../Utils")
const Types_1 = require("../Types")
const WABinary_1 = require("../WABinary")
const WAUSync_1 = require("../WAUSync")
const newsletter_1 = require("./newsletter")
const link_preview_1 = require("../Utils/link-preview")
const makeMessagesSocket = (config) => {
const { logger, linkPreviewImageThumbnailWidth, generateHighQualityLinkPreview, options: axiosOptions, patchMessageBeforeSending, cachedGroupMetadata, } = config
const sock = newsletter_1.makeNewsletterSocket(config)
const { ev, authState, processingMutex, signalRepository, upsertMessage, query, fetchPrivacySettings, sendNode, groupMetadata, groupToggleEphemeral, newsletterWMexQuery, executeUSyncQuery } = sock
// Setup session error handler for signalRepository
if (signalRepository.setupSessionErrorHandler) {
signalRepository.setupSessionErrorHandler({
logger,
signalRepository,
authState,
assertSessions: null, // Will be set later
query
})
}
const userDevicesCache = config.userDevicesCache || new node_cache_1.default({
stdTTL: Defaults_1.DEFAULT_CACHE_TTLS.USER_DEVICES,
useClones: false
})
let mediaConn
const refreshMediaConn = async (forceGet = false) => {
const media = await mediaConn
if (!media || forceGet || (new Date().getTime() - media.fetchDate.getTime()) > media.ttl * 1000) {
mediaConn = (async () => {
const result = await query({
tag: 'iq',
attrs: {
type: 'set',
xmlns: 'w:m',
to: WABinary_1.S_WHATSAPP_NET,
},
content: [{ tag: 'media_conn', attrs: {} }]
})
const mediaConnNode = WABinary_1.getBinaryNodeChild(result, 'media_conn')
const node = {
hosts: WABinary_1.getBinaryNodeChildren(mediaConnNode, 'host').map(({ attrs }) => ({
hostname: attrs.hostname,
maxContentLengthBytes: +attrs.maxContentLengthBytes,
})),
auth: mediaConnNode.attrs.auth,
ttl: +mediaConnNode.attrs.ttl,
fetchDate: new Date()
}
logger.debug('fetched media conn')
return node
})()
}
return mediaConn
}
/**
* generic send receipt function
* used for receipts of phone call, read, delivery etc.
* */
const sendReceipt = async (jid, participant, messageIds, type) => {
const node = {
tag: 'receipt',
attrs: {
id: messageIds[0],
},
}
const isReadReceipt = type === 'read' || type === 'read-self'
if (isReadReceipt) {
node.attrs.t = Utils_1.unixTimestampSeconds().toString()
}
if (type === 'sender' && WABinary_1.isJidUser(jid)) {
node.attrs.recipient = jid
node.attrs.to = participant
}
else {
node.attrs.to = jid
if (participant) {
node.attrs.participant = participant
}
}
if (type) {
node.attrs.type = WABinary_1.isJidNewsletter(jid) ? 'read-self' : type
}
const remainingMessageIds = messageIds.slice(1)
if (remainingMessageIds.length) {
node.content = [
{
tag: 'list',
attrs: {},
content: remainingMessageIds.map(id => ({
tag: 'item',
attrs: { id }
}))
}
]
}
logger.debug({ attrs: node.attrs, messageIds }, 'sending receipt for messages')
await sendNode(node)
}
/** Correctly bulk send receipts to multiple chats, participants */
const sendReceipts = async (keys, type) => {
const recps = Utils_1.aggregateMessageKeysNotFromMe(keys)
for (const { jid, participant, messageIds } of recps) {
await sendReceipt(jid, participant, messageIds, type)
}
}
/** Bulk read messages. Keys can be from different chats & participants */
const readMessages = async (keys) => {
const privacySettings = await fetchPrivacySettings()
// based on privacy settings, we have to change the read type
const readType = privacySettings.readreceipts === 'all' ? 'read' : 'read-self'
await sendReceipts(keys, readType)
}
/** Fetch image for groups, user, and newsletter **/
const profilePictureUrl = async (jid) => {
if (WABinary_1.isJidNewsletter(jid)) {
let node = await newsletterWMexQuery(undefined, Types_1.QueryIds.METADATA, {
input: {
key: jid,
type: 'JID',
view_role: 'GUEST'
},
fetch_viewer_metadata: true,
fetch_full_image: true,
fetch_creation_time: true
})
let result = WABinary_1.getBinaryNodeChild(node, 'result')?.content?.toString()
let metadata = JSON.parse(result).data[Types_1.XWAPaths.NEWSLETTER]
return Utils_1.getUrlFromDirectPath(metadata.thread_metadata.picture?.direct_path || '')
}
else {
const result = await query({
tag: 'iq',
attrs: {
target: WABinary_1.jidNormalizedUser(jid),
to: WABinary_1.S_WHATSAPP_NET,
type: 'get',
xmlns: 'w:profile:picture'
},
content: [{
tag: 'picture',
attrs: {
type: 'image',
query: 'url'
}
}]
})
const child = WABinary_1.getBinaryNodeChild(result, 'picture')
return child?.attrs?.url || null
}
}
/** Fetch all the devices we've to send a message to */
const getUSyncDevices = async (jids, useCache, ignoreZeroDevices) => {
const deviceResults = []
if (!useCache) {
logger.debug('not using cache for devices')
}
const toFetch = []
jids = Array.from(new Set(jids))
for (let jid of jids) {
const user = WABinary_1.jidDecode(jid)?.user
jid = WABinary_1.jidNormalizedUser(jid)
if (useCache) {
const devices = userDevicesCache.get(user)
if (devices) {
deviceResults.push(...devices)
logger.trace({ user }, 'using cache for devices')
}
else {
toFetch.push(jid)
}
}
else {
toFetch.push(jid)
}
}
if (!toFetch.length) {
return deviceResults
}
const query = new WAUSync_1.USyncQuery()
.withContext('message')
.withDeviceProtocol()
for (const jid of toFetch) {
query.withUser(new WAUSync_1.USyncUser().withId(jid))
}
const result = await executeUSyncQuery(query)
if (result) {
const extracted = Utils_1.extractDeviceJids(result?.list, authState.creds.me.id, ignoreZeroDevices)
const deviceMap = {}
for (const item of extracted) {
deviceMap[item.user] = deviceMap[item.user] || []
deviceMap[item.user].push(item)
deviceResults.push(item)
}
for (const key in deviceMap) {
userDevicesCache.set(key, deviceMap[key])
}
}
return deviceResults
}
/** Assert Sessions */
const assertSessions = async (jids, force) => {
let didFetchNewSession = false
let jidsRequiringFetch = []
if (force) {
jidsRequiringFetch = jids
}
else {
const addrs = jids.map(jid => (signalRepository.jidToSignalProtocolAddress(jid)))
const sessions = await authState.keys.get('session', addrs)
for (const jid of jids) {
const signalId = signalRepository
.jidToSignalProtocolAddress(jid)
if (!sessions[signalId]) {
jidsRequiringFetch.push(jid)
}
}
}
if (jidsRequiringFetch.length) {
logger.debug({ jidsRequiringFetch }, 'fetching sessions')
try {
const result = await query({
tag: 'iq',
attrs: {
xmlns: 'encrypt',
type: 'get',
to: WABinary_1.S_WHATSAPP_NET,
},
content: [
{
tag: 'key',
attrs: {},
content: jidsRequiringFetch.map(jid => ({
tag: 'user',
attrs: { jid },
}))
}
]
})
await Utils_1.parseAndInjectE2ESessions(result, signalRepository)
didFetchNewSession = true
} catch (error) {
logger.error({ error, jidsRequiringFetch }, 'Failed to fetch sessions')
throw error
}
}
return didFetchNewSession
}
// Update session error handler with assertSessions function
if (signalRepository.setupSessionErrorHandler) {
signalRepository.setupSessionErrorHandler({
logger,
signalRepository,
authState,
assertSessions,
query
})
}
/** Send Peer Operation */
const sendPeerDataOperationMessage = async (pdoMessage) => {
//TODO: for later, abstract the logic to send a Peer Message instead of just PDO - useful for App State Key Resync with phone
if (!authState.creds.me?.id) {
throw new boom_1.Boom('Not authenticated')
}
const protocolMessage = {
protocolMessage: {
peerDataOperationRequestMessage: pdoMessage,
type: WAProto_1.proto.Message.ProtocolMessage.Type.PEER_DATA_OPERATION_REQUEST_MESSAGE
}
}
const meJid = WABinary_1.jidNormalizedUser(authState.creds.me.id)
const msgId = await relayMessage(meJid, protocolMessage, {
additionalAttributes: {
category: 'peer',
// eslint-disable-next-line camelcase
push_priority: 'high_force',
},
})
return msgId
}
const createParticipantNodes = async (jids, message, extraAttrs) => {
const patched = await patchMessageBeforeSending(message, jids)
const bytes = Utils_1.encodeWAMessage(patched)
let shouldIncludeDeviceIdentity = false
const nodes = await Promise.all(jids.map(async (jid) => {
const { type, ciphertext } = await signalRepository.encryptMessage({ jid, data: bytes })
if (type === 'pkmsg') {
shouldIncludeDeviceIdentity = true
}
const node = {
tag: 'to',
attrs: { jid },
content: [{
tag: 'enc',
attrs: {
v: '2',
type,
...extraAttrs || {}
},
content: ciphertext
}]
}
return node
}))
return {
nodes,
shouldIncludeDeviceIdentity
}
}
const relayMessage = async (jid, message, { messageId: msgId, participant, additionalAttributes, useUserDevicesCache, useCachedGroupMetadata, statusJidList, additionalNodes }) => {
const meId = authState.creds.me.id
let didPushAdditional = false
let shouldIncludeDeviceIdentity = false
const { user, server } = WABinary_1.jidDecode(jid)
const statusJid = 'status@broadcast'
const isGroup = server === 'g.us'
const isPrivate = server === 's.whatsapp.net'
const isNewsletter = server == 'newsletter'
const isStatus = jid === statusJid
const isLid = server === 'lid'
msgId = msgId || Utils_1.generateMessageID(authState.creds.me.id)
useUserDevicesCache = useUserDevicesCache !== false
useCachedGroupMetadata = useCachedGroupMetadata !== false && !isStatus
const participants = []
const destinationJid = (!isStatus) ? WABinary_1.jidEncode(user, isLid ? 'lid' : isGroup ? 'g.us' : isNewsletter ? 'newsletter' : 's.whatsapp.net') : statusJid
const binaryNodeContent = []
const devices = []
const meMsg = {
deviceSentMessage: {
destinationJid,
message
}
}
const extraAttrs = {}
if (participant) {
// when the retry request is not for a group
// only send to the specific device that asked for a retry
// otherwise the message is sent out to every device that should be a recipient
if (!isGroup && !isStatus) {
additionalAttributes = { ...additionalAttributes, 'device_fanout': 'false' }
}
const { user, device } = WABinary_1.jidDecode(participant.jid)
devices.push({ user, device })
}
await authState.keys.transaction(async () => {
const mediaType = getMediaType(message)
if (mediaType) {
extraAttrs['mediatype'] = mediaType
}
if (Utils_1.normalizeMessageContent(message)?.pinInChatMessage || Utils_1.normalizeMessageContent(message)?.keepInChatMessage) {
extraAttrs['decrypt-fail'] = 'hide'
}
if (isGroup || isStatus) {
const [groupData, senderKeyMap] = await Promise.all([
(async () => {
let groupData = useCachedGroupMetadata && cachedGroupMetadata ? await cachedGroupMetadata(jid) : undefined
if (groupData && Array.isArray(groupData?.participants)) {
logger.trace({ jid, participants: groupData.participants.length }, 'using cached group metadata')
}
else if (!isStatus) {
groupData = await groupMetadata(jid)
}
return groupData
})(),
(async () => {
if (!participant && !isStatus) {
const result = await authState.keys.get('sender-key-memory', [jid])
return result[jid] || {}
}
return {}
})()
])
if (!participant) {
const participantsList = (groupData && !isStatus) ? groupData.participants.map(p => p.id) : []
if (isStatus && statusJidList) {
participantsList.push(...statusJidList)
}
if (!isStatus) {
additionalAttributes = {
...additionalAttributes,
addressing_mode: groupData?.addressingMode || 'pn'
}
}
const additionalDevices = await getUSyncDevices(participantsList, !!useUserDevicesCache, false)
devices.push(...additionalDevices)
}
const patched = await patchMessageBeforeSending(message, devices.map(d => WABinary_1.jidEncode(d.user, isLid ? 'lid' : 's.whatsapp.net', d.device)))
const bytes = Utils_1.encodeWAMessage(patched)
const { ciphertext, senderKeyDistributionMessage } = await signalRepository.encryptGroupMessage({
group: destinationJid,
data: bytes,
meId,
})
const senderKeyJids = []
// ensure a connection is established with every device
for (const { user, device } of devices) {
const jid = WABinary_1.jidEncode(user, groupData?.addressingMode === 'lid' ? 'lid' : 's.whatsapp.net', device)
if (!senderKeyMap[jid] || !!participant) {
senderKeyJids.push(jid)
// store that this person has had the sender keys sent to them
senderKeyMap[jid] = true
}
}
// if there are some participants with whom the session has not been established
// if there are, we re-send the senderkey
if (senderKeyJids.length) {
logger.debug({ senderKeyJids }, 'sending new sender key')
const senderKeyMsg = {
senderKeyDistributionMessage: {
axolotlSenderKeyDistributionMessage: senderKeyDistributionMessage,
groupId: destinationJid
}
}
await assertSessions(senderKeyJids, false)
const result = await createParticipantNodes(senderKeyJids, senderKeyMsg, extraAttrs)
shouldIncludeDeviceIdentity = shouldIncludeDeviceIdentity || result.shouldIncludeDeviceIdentity
participants.push(...result.nodes)
}
binaryNodeContent.push({
tag: 'enc',
attrs: { v: '2', type: 'skmsg' },
content: ciphertext
})
await authState.keys.set({ 'sender-key-memory': { [jid]: senderKeyMap } })
}
else if (isNewsletter) {
// Message edit
if (message.protocolMessage?.editedMessage) {
msgId = message.protocolMessage.key?.id
message = message.protocolMessage.editedMessage
}
// Message delete
if (message.protocolMessage?.type === WAProto_1.proto.Message.ProtocolMessage.Type.REVOKE) {
msgId = message.protocolMessage.key?.id
message = {}
}
const patched = await patchMessageBeforeSending(message, [])
const bytes = Utils_1.encodeNewsletterMessage(patched)
binaryNodeContent.push({
tag: 'plaintext',
attrs: mediaType ? { mediatype: mediaType } : {},
content: bytes
})
}
else {
const { user: meUser } = WABinary_1.jidDecode(meId)
if (!participant) {
devices.push({ user })
if (user !== meUser) {
devices.push({ user: meUser })
}
if (additionalAttributes?.['category'] !== 'peer') {
const additionalDevices = await getUSyncDevices([meId, jid], !!useUserDevicesCache, true)
devices.push(...additionalDevices)
}
}
const allJids = []
const meJids = []
const otherJids = []
for (const { user, device } of devices) {
const isMe = user === meUser
const jid = WABinary_1.jidEncode(isMe && isLid ? authState.creds?.me?.lid?.split(':')[0] || user : user, isLid ? 'lid' : 's.whatsapp.net', device)
if (isMe) {
meJids.push(jid)
}
else {
otherJids.push(jid)
}
allJids.push(jid)
}
await assertSessions(allJids, false)
const [{ nodes: meNodes, shouldIncludeDeviceIdentity: s1 }, { nodes: otherNodes, shouldIncludeDeviceIdentity: s2 }] = await Promise.all([
createParticipantNodes(meJids, meMsg, extraAttrs),
createParticipantNodes(otherJids, message, extraAttrs)
])
participants.push(...meNodes)
participants.push(...otherNodes)
shouldIncludeDeviceIdentity = shouldIncludeDeviceIdentity || s1 || s2
}
if (participants.length) {
if (additionalAttributes?.['category'] === 'peer') {
const peerNode = participants[0]?.content?.[0]
if (peerNode) {
binaryNodeContent.push(peerNode) // push only enc
}
}
else {
binaryNodeContent.push({
tag: 'participants',
attrs: {},
content: participants
})
}
}
const stanza = {
tag: 'message',
attrs: {
id: msgId,
type: isNewsletter ? getTypeMessage(message) : 'text',
...(additionalAttributes || {})
},
content: binaryNodeContent
}
// if the participant to send to is explicitly specified (generally retry recp)
// ensure the message is only sent to that person
// if a retry receipt is sent to everyone -- it'll fail decryption for everyone else who received the msg
if (participant) {
if (WABinary_1.isJidGroup(destinationJid)) {
stanza.attrs.to = destinationJid
stanza.attrs.participant = participant.jid
}
else if (WABinary_1.areJidsSameUser(participant.jid, meId)) {
stanza.attrs.to = participant.jid
stanza.attrs.recipient = destinationJid
}
else {
stanza.attrs.to = participant.jid
}
}
else {
stanza.attrs.to = destinationJid
}
if (shouldIncludeDeviceIdentity) {
stanza.content.push({
tag: 'device-identity',
attrs: {},
content: Utils_1.encodeSignedDeviceIdentity(authState.creds.account, true)
})
logger.debug({ jid }, 'adding device identity')
}
const messages = Utils_1.normalizeMessageContent(message)
const buttonType = getButtonType(messages)
if (!isNewsletter && buttonType) {
if (!stanza.content || !Array.isArray(stanza.content)) {
stanza.content = []
}
const buttonsNode = getButtonArgs(messages)
const filteredButtons = WABinary_1.getBinaryFilteredButtons(additionalNodes ? additionalNodes : [])
if (filteredButtons) {
stanza.content.push(...additionalNodes)
didPushAdditional = true
}
else {
stanza.content.push(buttonsNode)
}
}
if (isPrivate) {
if (!stanza.content || !Array.isArray(stanza.content)) {
stanza.content = []
}
const botNode = {
tag: 'bot',
attrs: {
biz_bot: '1'
}
}
const filteredBizBot = WABinary_1.getBinaryFilteredBizBot(additionalNodes ? additionalNodes : [])
if (filteredBizBot) {
stanza.content.push(...additionalNodes)
didPushAdditional = true
}
else {
stanza.content.push(botNode)
}
}
if (!didPushAdditional && additionalNodes && additionalNodes.length > 0) {
if (!stanza.content || !Array.isArray(stanza.content)) {
stanza.content = []
}
stanza.content.push(...additionalNodes)
}
logger.debug({ msgId }, `sending message to ${participants.length} devices`)
await sendNode(stanza)
})
return msgId
}
const getTypeMessage = (msg) => {
const message = Utils_1.normalizeMessageContent(msg)
if (message.reactionMessage) {
return 'reaction'
}
else if (getMediaType(message)) {
return 'media'
}
else {
return 'text'
}
}
const getMediaType = (message) => {
if (message.imageMessage) {
return 'image'
}
else if (message.stickerMessage) {
return message.stickerMessage.isLottie ? '1p_sticker' : 'sticker'
}
else if (message.videoMessage) {
return message.videoMessage.gifPlayback ? 'gif' : 'video'
}
else if (message.audioMessage) {
return message.audioMessage.ptt ? 'ptt' : 'audio'
}
else if (message.ptvMessage) {
return 'ptv'
}
else if (message.contactMessage) {
return 'vcard'
}
else if (message.documentMessage) {
return 'document'
}
else if (message.contactsArrayMessage) {
return 'contact_array'
}
else if (message.liveLocationMessage) {
return 'livelocation'
}
else if (message.stickerMessage) {
return 'sticker'
}
else if (message.listMessage) {
return 'list'
}
else if (message.listResponseMessage) {
return 'list_response'
}
else if (message.buttonsResponseMessage) {
return 'buttons_response'
}
else if (message.orderMessage) {
return 'order'
}
else if (message.productMessage) {
return 'product'
}
else if (message.interactiveResponseMessage) {
return 'native_flow_response'
}
else if (message.groupInviteMessage) {
return 'url'
}
else if (/https:\/\/wa\.me\/c\/\d+/.test(message.extendedTextMessage?.text)) {
return 'cataloglink'
}
else if (/https:\/\/wa\.me\/p\/\d+\/\d+/.test(message.extendedTextMessage?.text)) {
return 'productlink'
}
}
const getButtonType = (message) => {
if (message.listMessage) {
return 'list'
}
else if (message.buttonsMessage) {
return 'buttons'
}
else if(message.interactiveMessage?.nativeFlowMessage) {
return 'native_flow'
}
}
const getButtonArgs = (message) => {
const nativeFlow = message.interactiveMessage?.nativeFlowMessage
const firstButtonName = nativeFlow?.buttons?.[0]?.name
const nativeFlowSpecials = [
'mpm', 'cta_catalog', 'send_location',
'call_permission_request', 'wa_payment_transaction_details',
'automated_greeting_message_view_catalog'
]
if (nativeFlow && (firstButtonName === 'review_and_pay' || firstButtonName === 'payment_info')) {
return {
tag: 'biz',
attrs: {
native_flow_name: firstButtonName
}
}
} else if (nativeFlow && nativeFlowSpecials.includes(firstButtonName)) {
// Only works for WhatsApp Original, not WhatsApp Business
return {
tag: 'biz',
attrs: {},
content: [{
tag: 'interactive',
attrs: {
type: 'native_flow',
v: '1'
},
content: [{
tag: 'native_flow',
attrs: {
v: '2',
name: firstButtonName
}
}]
}]
}
} else if (nativeFlow || message.buttonsMessage) {
// It works for whatsapp original and whatsapp business
return {
tag: 'biz',
attrs: {},
content: [{
tag: 'interactive',
attrs: {
type: 'native_flow',
v: '1'
},
content: [{
tag: 'native_flow',
attrs: {
v: '9',
name: 'mixed'
}
}]
}]
}
} else if (message.listMessage) {
return {
tag: 'biz',
attrs: {},
content: [{
tag: 'list',
attrs: {
v: '2',
type: 'product_list'
}
}]
}
} else {
return {
tag: 'biz',
attrs: {}
}
}
}
const getPrivacyTokens = async (jids) => {
const t = Utils_1.unixTimestampSeconds().toString()
const result = await query({
tag: 'iq',
attrs: {
to: WABinary_1.S_WHATSAPP_NET,
type: 'set',
xmlns: 'privacy'
},
content: [
{
tag: 'tokens',
attrs: {},
content: jids.map(jid => ({
tag: 'token',
attrs: {
jid: WABinary_1.jidNormalizedUser(jid),
t,
type: 'trusted_contact'
}
}))
}
]
})
return result
}
const waUploadToServer = Utils_1.getWAUploadToServer(config, refreshMediaConn)
const waitForMsgMediaUpdate = Utils_1.bindWaitForEvent(ev, 'messages.media-update')
return {
...sock,
getPrivacyTokens,
assertSessions,
relayMessage,
sendReceipt,
sendReceipts,
readMessages,
profilePictureUrl,
getUSyncDevices,
refreshMediaConn,
waUploadToServer,
fetchPrivacySettings,
createParticipantNodes,
sendPeerDataOperationMessage,
updateMediaMessage: async (message) => {
const content = Utils_1.assertMediaContent(message.message)
const mediaKey = content.mediaKey
const meId = authState.creds.me.id
const node = await Utils_1.encryptMediaRetryRequest(message.key, mediaKey, meId)
let error = undefined
await Promise.all([
sendNode(node),
waitForMsgMediaUpdate(async (update) => {
const result = update.find(c => c.key.id === message.key.id)
if (result) {
if (result.error) {
error = result.error
}
else {
try {
const media = await Utils_1.decryptMediaRetryData(result.media, mediaKey, result.key.id)
if (media.result !== WAProto_1.proto.MediaRetryNotification.ResultType.SUCCESS) {
const resultStr = WAProto_1.proto.MediaRetryNotification.ResultType[media.result]
throw new boom_1.Boom(`Media re-upload failed by device (${resultStr})`, { data: media, statusCode: Utils_1.getStatusCodeForMediaRetry(media.result) || 404 })
}
content.directPath = media.directPath
content.url = Utils_1.getUrlFromDirectPath(content.directPath)
logger.debug({ directPath: media.directPath, key: result.key }, 'media update successful')
}
catch (err) {
error = err
}
}
return true
}
})
])
if (error) {
throw error
}
ev.emit('messages.update', [
{ key: message.key, update: { message: message.message } }
])
return message
},
sendStatusMentions: async (jid, content) => {
const media = await Utils_1.generateWAMessage(WABinary_1.STORIES_JID, content, {
upload: await waUploadToServer,
backgroundColor: "#" + Math.floor(Math.random() * 16777215).toString(16).padStart(6, "0"),
font: content.text ? Math.floor(Math.random() * 9) : null
})
const additionalNodes = [{
tag: 'meta',
attrs: {},
content: [{
tag: 'mentioned_users',
attrs: {},
content: [{
tag: 'to',
attrs: { jid },
content: undefined
}]
}]
}]
let Private = WABinary_1.isJidUser(jid)
let statusJid = Private ? [jid] : (await groupMetadata(jid)).participants.map((num) => num.id)
await relayMessage(WABinary_1.STORIES_JID, media.message, {
messageId: media.key.id,
statusJidList: statusJid,
additionalNodes
})
let type = Private ? 'statusMentionMessage' : 'groupStatusMentionMessage'
let msg = await Utils_1.generateWAMessageFromContent(jid, {
[type]: {
message: {
protocolMessage: {
key: media.key,
type: 25
}
}
}
}, {})
await relayMessage(jid, msg.message, {})
return media
},
sendAlbumMessage: async (jid, medias, options = {}) => {
const userJid = authState.creds.me.id
for (const media of medias) {
if (!media.image && !media.video)
throw new TypeError(`medias[i] must have image or video property`)
}
const time = options.delay || 500
delete options.delay
const album = await Utils_1.generateWAMessageFromContent(jid, {
albumMessage: {
expectedImageCount: medias.filter(media => media.image).length,
expectedVideoCount: medias.filter(media => media.video).length,
...options
}
}, { userJid, ...options })
await relayMessage(jid, album.message, { messageId: album.key.id })
let mediaHandle
let msg
for (const i in medias) {
const media = medias[i]
if (media.image) {
msg = await Utils_1.generateWAMessage(jid, {
image: media.image,
...media,
...options
}, {
userJid,
upload: async (encFilePath, opts) => {
const up = await waUploadToServer(encFilePath, { ...opts, newsletter: WABinary_1.isJidNewsletter(jid) })
mediaHandle = up.handle
return up
},
...options
})
}
else if (media.video) {
msg = await Utils_1.generateWAMessage(jid, {
video: media.video,
...media,
...options
}, {
userJid,
upload: async (encFilePath, opts) => {
const up = await waUploadToServer(encFilePath, { ...opts, newsletter: WABinary_1.isJidNewsletter(jid) })
mediaHandle = up.handle
return up
},
...options,
})
}
if (msg) {
msg.message.messageContextInfo = {
messageSecret: crypto_1.randomBytes(32),
messageAssociation: {
associationType: 1,
parentMessageKey: album.key
}
}
}
await relayMessage(jid, msg.message, { messageId: msg.key.id })
await Utils_1.delay(time)
}
return album
},
sendMessage: async (jid, content, options = {}) => {
const userJid = authState.creds.me.id
if (typeof content === 'object' &&
'disappearingMessagesInChat' in content &&
typeof content['disappearingMessagesInChat'] !== 'undefined' &&
WABinary_1.isJidGroup(jid)) {
const { disappearingMessagesInChat } = content
const value = typeof disappearingMessagesInChat === 'boolean' ?
(disappearingMessagesInChat ? Defaults_1.WA_DEFAULT_EPHEMERAL : 0) :
disappearingMessagesInChat
await groupToggleEphemeral(jid, value)
}
else {
let mediaHandle
const fullMsg = await Utils_1.generateWAMessage(jid, content, {
logger,
userJid,
getUrlInfo: text => link_preview_1.getUrlInfo(text, {
thumbnailWidth: linkPreviewImageThumbnailWidth,
fetchOpts: {
timeout: 3000,
...axiosOptions || {}
},
logger,
uploadImage: generateHighQualityLinkPreview
? waUploadToServer
: undefined
}),
getProfilePicUrl: profilePictureUrl,
upload: async (encFilePath, opts) => {
const up = await waUploadToServer(encFilePath, { ...opts, newsletter: WABinary_1.isJidNewsletter(jid) })
mediaHandle = up.handle
return up
},
mediaCache: config.mediaCache,
options: config.options,
messageId: Utils_1.generateMessageID(userJid),
...options,
})
const isPin = 'pin' in content && !!content.pin
const isEdit = 'edit' in content && !!content.edit
const isDelete = 'delete' in content && !!content.delete
const additionalAttributes = {}
if (isDelete) {
// if the chat is a group, and I am not the author, then delete the message as an admin
if (WABinary_1.isJidGroup(content.delete?.remoteJid) && !content.delete?.fromMe || WABinary_1.isJidNewsletter(jid)) {
additionalAttributes.edit = '8'
}
else {
additionalAttributes.edit = '7'
}
}
else if (isEdit) {
additionalAttributes.edit = WABinary_1.isJidNewsletter(jid) ? '3' : '1'
}
else if (isPin) {
additionalAttributes.edit = '2'
}
if (mediaHandle) {
additionalAttributes['media_id'] = mediaHandle
}
if ('cachedGroupMetadata' in options) {
console.warn('cachedGroupMetadata in sendMessage are deprecated, now cachedGroupMetadata is part of the socket config.')
}
await relayMessage(jid, fullMsg.message, { messageId: fullMsg.key.id, useCachedGroupMetadata: options.useCachedGroupMetadata, additionalAttributes, statusJidList: options.statusJidList, additionalNodes: options.additionalNodes })
if (config.emitOwnEvents) {
process.nextTick(() => {
processingMutex.mutex(() => (upsertMessage(fullMsg, 'append')))
})
}
return fullMsg
}
}
}
}
module.exports = {
makeMessagesSocket
}