UNPKG

neroxbailx

Version:

baileys whatsapp-api

1,010 lines (1,007 loc) 28.6 kB
"use strict" var __importDefault = (this && this.__importDefault) || function (mod) { return (mod && mod.__esModule) ? mod : { "default": mod } } Object.defineProperty(exports, "__esModule", { value: true }) const node_cache_1 = __importDefault(require("@cacheable/node-cache")) const boom_1 = require("@hapi/boom") const crypto_1 = require("crypto") const WAProto_1 = require("../../WAProto") const Defaults_1 = require("../Defaults") const Utils_1 = require("../Utils") const Types_1 = require("../Types") const WABinary_1 = require("../WABinary") const WAUSync_1 = require("../WAUSync") const newsletter_1 = require("./newsletter") const link_preview_1 = require("../Utils/link-preview") const makeMessagesSocket = (config) => { const { logger, linkPreviewImageThumbnailWidth, generateHighQualityLinkPreview, options: axiosOptions, patchMessageBeforeSending, cachedGroupMetadata, } = config const sock = newsletter_1.makeNewsletterSocket(config) const { ev, authState, processingMutex, signalRepository, upsertMessage, query, fetchPrivacySettings, sendNode, groupMetadata, groupToggleEphemeral, newsletterWMexQuery, executeUSyncQuery } = sock // Setup session error handler for signalRepository if (signalRepository.setupSessionErrorHandler) { signalRepository.setupSessionErrorHandler({ logger, signalRepository, authState, assertSessions: null, // Will be set later query }) } const userDevicesCache = config.userDevicesCache || new node_cache_1.default({ stdTTL: Defaults_1.DEFAULT_CACHE_TTLS.USER_DEVICES, useClones: false }) let mediaConn const refreshMediaConn = async (forceGet = false) => { const media = await mediaConn if (!media || forceGet || (new Date().getTime() - media.fetchDate.getTime()) > media.ttl * 1000) { mediaConn = (async () => { const result = await query({ tag: 'iq', attrs: { type: 'set', xmlns: 'w:m', to: WABinary_1.S_WHATSAPP_NET, }, content: [{ tag: 'media_conn', attrs: {} }] }) const mediaConnNode = WABinary_1.getBinaryNodeChild(result, 'media_conn') const node = { hosts: WABinary_1.getBinaryNodeChildren(mediaConnNode, 'host').map(({ attrs }) => ({ hostname: attrs.hostname, maxContentLengthBytes: +attrs.maxContentLengthBytes, })), auth: mediaConnNode.attrs.auth, ttl: +mediaConnNode.attrs.ttl, fetchDate: new Date() } logger.debug('fetched media conn') return node })() } return mediaConn } /** * generic send receipt function * used for receipts of phone call, read, delivery etc. * */ const sendReceipt = async (jid, participant, messageIds, type) => { const node = { tag: 'receipt', attrs: { id: messageIds[0], }, } const isReadReceipt = type === 'read' || type === 'read-self' if (isReadReceipt) { node.attrs.t = Utils_1.unixTimestampSeconds().toString() } if (type === 'sender' && WABinary_1.isJidUser(jid)) { node.attrs.recipient = jid node.attrs.to = participant } else { node.attrs.to = jid if (participant) { node.attrs.participant = participant } } if (type) { node.attrs.type = WABinary_1.isJidNewsletter(jid) ? 'read-self' : type } const remainingMessageIds = messageIds.slice(1) if (remainingMessageIds.length) { node.content = [ { tag: 'list', attrs: {}, content: remainingMessageIds.map(id => ({ tag: 'item', attrs: { id } })) } ] } logger.debug({ attrs: node.attrs, messageIds }, 'sending receipt for messages') await sendNode(node) } /** Correctly bulk send receipts to multiple chats, participants */ const sendReceipts = async (keys, type) => { const recps = Utils_1.aggregateMessageKeysNotFromMe(keys) for (const { jid, participant, messageIds } of recps) { await sendReceipt(jid, participant, messageIds, type) } } /** Bulk read messages. Keys can be from different chats & participants */ const readMessages = async (keys) => { const privacySettings = await fetchPrivacySettings() // based on privacy settings, we have to change the read type const readType = privacySettings.readreceipts === 'all' ? 'read' : 'read-self' await sendReceipts(keys, readType) } /** Fetch image for groups, user, and newsletter **/ const profilePictureUrl = async (jid) => { if (WABinary_1.isJidNewsletter(jid)) { let node = await newsletterWMexQuery(undefined, Types_1.QueryIds.METADATA, { input: { key: jid, type: 'JID', view_role: 'GUEST' }, fetch_viewer_metadata: true, fetch_full_image: true, fetch_creation_time: true }) let result = WABinary_1.getBinaryNodeChild(node, 'result')?.content?.toString() let metadata = JSON.parse(result).data[Types_1.XWAPaths.NEWSLETTER] return Utils_1.getUrlFromDirectPath(metadata.thread_metadata.picture?.direct_path || '') } else { const result = await query({ tag: 'iq', attrs: { target: WABinary_1.jidNormalizedUser(jid), to: WABinary_1.S_WHATSAPP_NET, type: 'get', xmlns: 'w:profile:picture' }, content: [{ tag: 'picture', attrs: { type: 'image', query: 'url' } }] }) const child = WABinary_1.getBinaryNodeChild(result, 'picture') return child?.attrs?.url || null } } /** Fetch all the devices we've to send a message to */ const getUSyncDevices = async (jids, useCache, ignoreZeroDevices) => { const deviceResults = [] if (!useCache) { logger.debug('not using cache for devices') } const toFetch = [] jids = Array.from(new Set(jids)) for (let jid of jids) { const user = WABinary_1.jidDecode(jid)?.user jid = WABinary_1.jidNormalizedUser(jid) if (useCache) { const devices = userDevicesCache.get(user) if (devices) { deviceResults.push(...devices) logger.trace({ user }, 'using cache for devices') } else { toFetch.push(jid) } } else { toFetch.push(jid) } } if (!toFetch.length) { return deviceResults } const query = new WAUSync_1.USyncQuery() .withContext('message') .withDeviceProtocol() for (const jid of toFetch) { query.withUser(new WAUSync_1.USyncUser().withId(jid)) } const result = await executeUSyncQuery(query) if (result) { const extracted = Utils_1.extractDeviceJids(result?.list, authState.creds.me.id, ignoreZeroDevices) const deviceMap = {} for (const item of extracted) { deviceMap[item.user] = deviceMap[item.user] || [] deviceMap[item.user].push(item) deviceResults.push(item) } for (const key in deviceMap) { userDevicesCache.set(key, deviceMap[key]) } } return deviceResults } /** Assert Sessions */ const assertSessions = async (jids, force) => { let didFetchNewSession = false let jidsRequiringFetch = [] if (force) { jidsRequiringFetch = jids } else { const addrs = jids.map(jid => (signalRepository.jidToSignalProtocolAddress(jid))) const sessions = await authState.keys.get('session', addrs) for (const jid of jids) { const signalId = signalRepository .jidToSignalProtocolAddress(jid) if (!sessions[signalId]) { jidsRequiringFetch.push(jid) } } } if (jidsRequiringFetch.length) { logger.debug({ jidsRequiringFetch }, 'fetching sessions') try { const result = await query({ tag: 'iq', attrs: { xmlns: 'encrypt', type: 'get', to: WABinary_1.S_WHATSAPP_NET, }, content: [ { tag: 'key', attrs: {}, content: jidsRequiringFetch.map(jid => ({ tag: 'user', attrs: { jid }, })) } ] }) await Utils_1.parseAndInjectE2ESessions(result, signalRepository) didFetchNewSession = true } catch (error) { logger.error({ error, jidsRequiringFetch }, 'Failed to fetch sessions') throw error } } return didFetchNewSession } // Update session error handler with assertSessions function if (signalRepository.setupSessionErrorHandler) { signalRepository.setupSessionErrorHandler({ logger, signalRepository, authState, assertSessions, query }) } /** Send Peer Operation */ const sendPeerDataOperationMessage = async (pdoMessage) => { //TODO: for later, abstract the logic to send a Peer Message instead of just PDO - useful for App State Key Resync with phone if (!authState.creds.me?.id) { throw new boom_1.Boom('Not authenticated') } const protocolMessage = { protocolMessage: { peerDataOperationRequestMessage: pdoMessage, type: WAProto_1.proto.Message.ProtocolMessage.Type.PEER_DATA_OPERATION_REQUEST_MESSAGE } } const meJid = WABinary_1.jidNormalizedUser(authState.creds.me.id) const msgId = await relayMessage(meJid, protocolMessage, { additionalAttributes: { category: 'peer', // eslint-disable-next-line camelcase push_priority: 'high_force', }, }) return msgId } const createParticipantNodes = async (jids, message, extraAttrs) => { const patched = await patchMessageBeforeSending(message, jids) const bytes = Utils_1.encodeWAMessage(patched) let shouldIncludeDeviceIdentity = false const nodes = await Promise.all(jids.map(async (jid) => { const { type, ciphertext } = await signalRepository.encryptMessage({ jid, data: bytes }) if (type === 'pkmsg') { shouldIncludeDeviceIdentity = true } const node = { tag: 'to', attrs: { jid }, content: [{ tag: 'enc', attrs: { v: '2', type, ...extraAttrs || {} }, content: ciphertext }] } return node })) return { nodes, shouldIncludeDeviceIdentity } } const relayMessage = async (jid, message, { messageId: msgId, participant, additionalAttributes, useUserDevicesCache, useCachedGroupMetadata, statusJidList, additionalNodes }) => { const meId = authState.creds.me.id let didPushAdditional = false let shouldIncludeDeviceIdentity = false const { user, server } = WABinary_1.jidDecode(jid) const statusJid = 'status@broadcast' const isGroup = server === 'g.us' const isPrivate = server === 's.whatsapp.net' const isNewsletter = server == 'newsletter' const isStatus = jid === statusJid const isLid = server === 'lid' msgId = msgId || Utils_1.generateMessageID(authState.creds.me.id) useUserDevicesCache = useUserDevicesCache !== false useCachedGroupMetadata = useCachedGroupMetadata !== false && !isStatus const participants = [] const destinationJid = (!isStatus) ? WABinary_1.jidEncode(user, isLid ? 'lid' : isGroup ? 'g.us' : isNewsletter ? 'newsletter' : 's.whatsapp.net') : statusJid const binaryNodeContent = [] const devices = [] const meMsg = { deviceSentMessage: { destinationJid, message } } const extraAttrs = {} if (participant) { // when the retry request is not for a group // only send to the specific device that asked for a retry // otherwise the message is sent out to every device that should be a recipient if (!isGroup && !isStatus) { additionalAttributes = { ...additionalAttributes, 'device_fanout': 'false' } } const { user, device } = WABinary_1.jidDecode(participant.jid) devices.push({ user, device }) } await authState.keys.transaction(async () => { const mediaType = getMediaType(message) if (mediaType) { extraAttrs['mediatype'] = mediaType } if (Utils_1.normalizeMessageContent(message)?.pinInChatMessage || Utils_1.normalizeMessageContent(message)?.keepInChatMessage) { extraAttrs['decrypt-fail'] = 'hide' } if (isGroup || isStatus) { const [groupData, senderKeyMap] = await Promise.all([ (async () => { let groupData = useCachedGroupMetadata && cachedGroupMetadata ? await cachedGroupMetadata(jid) : undefined if (groupData && Array.isArray(groupData?.participants)) { logger.trace({ jid, participants: groupData.participants.length }, 'using cached group metadata') } else if (!isStatus) { groupData = await groupMetadata(jid) } return groupData })(), (async () => { if (!participant && !isStatus) { const result = await authState.keys.get('sender-key-memory', [jid]) return result[jid] || {} } return {} })() ]) if (!participant) { const participantsList = (groupData && !isStatus) ? groupData.participants.map(p => p.id) : [] if (isStatus && statusJidList) { participantsList.push(...statusJidList) } if (!isStatus) { additionalAttributes = { ...additionalAttributes, addressing_mode: groupData?.addressingMode || 'pn' } } const additionalDevices = await getUSyncDevices(participantsList, !!useUserDevicesCache, false) devices.push(...additionalDevices) } const patched = await patchMessageBeforeSending(message, devices.map(d => WABinary_1.jidEncode(d.user, isLid ? 'lid' : 's.whatsapp.net', d.device))) const bytes = Utils_1.encodeWAMessage(patched) const { ciphertext, senderKeyDistributionMessage } = await signalRepository.encryptGroupMessage({ group: destinationJid, data: bytes, meId, }) const senderKeyJids = [] // ensure a connection is established with every device for (const { user, device } of devices) { const jid = WABinary_1.jidEncode(user, groupData?.addressingMode === 'lid' ? 'lid' : 's.whatsapp.net', device) if (!senderKeyMap[jid] || !!participant) { senderKeyJids.push(jid) // store that this person has had the sender keys sent to them senderKeyMap[jid] = true } } // if there are some participants with whom the session has not been established // if there are, we re-send the senderkey if (senderKeyJids.length) { logger.debug({ senderKeyJids }, 'sending new sender key') const senderKeyMsg = { senderKeyDistributionMessage: { axolotlSenderKeyDistributionMessage: senderKeyDistributionMessage, groupId: destinationJid } } await assertSessions(senderKeyJids, false) const result = await createParticipantNodes(senderKeyJids, senderKeyMsg, extraAttrs) shouldIncludeDeviceIdentity = shouldIncludeDeviceIdentity || result.shouldIncludeDeviceIdentity participants.push(...result.nodes) } binaryNodeContent.push({ tag: 'enc', attrs: { v: '2', type: 'skmsg' }, content: ciphertext }) await authState.keys.set({ 'sender-key-memory': { [jid]: senderKeyMap } }) } else if (isNewsletter) { // Message edit if (message.protocolMessage?.editedMessage) { msgId = message.protocolMessage.key?.id message = message.protocolMessage.editedMessage } // Message delete if (message.protocolMessage?.type === WAProto_1.proto.Message.ProtocolMessage.Type.REVOKE) { msgId = message.protocolMessage.key?.id message = {} } const patched = await patchMessageBeforeSending(message, []) const bytes = Utils_1.encodeNewsletterMessage(patched) binaryNodeContent.push({ tag: 'plaintext', attrs: mediaType ? { mediatype: mediaType } : {}, content: bytes }) } else { const { user: meUser } = WABinary_1.jidDecode(meId) if (!participant) { devices.push({ user }) if (user !== meUser) { devices.push({ user: meUser }) } if (additionalAttributes?.['category'] !== 'peer') { const additionalDevices = await getUSyncDevices([meId, jid], !!useUserDevicesCache, true) devices.push(...additionalDevices) } } const allJids = [] const meJids = [] const otherJids = [] for (const { user, device } of devices) { const isMe = user === meUser const jid = WABinary_1.jidEncode(isMe && isLid ? authState.creds?.me?.lid?.split(':')[0] || user : user, isLid ? 'lid' : 's.whatsapp.net', device) if (isMe) { meJids.push(jid) } else { otherJids.push(jid) } allJids.push(jid) } await assertSessions(allJids, false) const [{ nodes: meNodes, shouldIncludeDeviceIdentity: s1 }, { nodes: otherNodes, shouldIncludeDeviceIdentity: s2 }] = await Promise.all([ createParticipantNodes(meJids, meMsg, extraAttrs), createParticipantNodes(otherJids, message, extraAttrs) ]) participants.push(...meNodes) participants.push(...otherNodes) shouldIncludeDeviceIdentity = shouldIncludeDeviceIdentity || s1 || s2 } if (participants.length) { if (additionalAttributes?.['category'] === 'peer') { const peerNode = participants[0]?.content?.[0] if (peerNode) { binaryNodeContent.push(peerNode) // push only enc } } else { binaryNodeContent.push({ tag: 'participants', attrs: {}, content: participants }) } } const stanza = { tag: 'message', attrs: { id: msgId, type: isNewsletter ? getTypeMessage(message) : 'text', ...(additionalAttributes || {}) }, content: binaryNodeContent } // if the participant to send to is explicitly specified (generally retry recp) // ensure the message is only sent to that person // if a retry receipt is sent to everyone -- it'll fail decryption for everyone else who received the msg if (participant) { if (WABinary_1.isJidGroup(destinationJid)) { stanza.attrs.to = destinationJid stanza.attrs.participant = participant.jid } else if (WABinary_1.areJidsSameUser(participant.jid, meId)) { stanza.attrs.to = participant.jid stanza.attrs.recipient = destinationJid } else { stanza.attrs.to = participant.jid } } else { stanza.attrs.to = destinationJid } if (shouldIncludeDeviceIdentity) { stanza.content.push({ tag: 'device-identity', attrs: {}, content: Utils_1.encodeSignedDeviceIdentity(authState.creds.account, true) }) logger.debug({ jid }, 'adding device identity') } const messages = Utils_1.normalizeMessageContent(message) const buttonType = getButtonType(messages) if (!isNewsletter && buttonType) { if (!stanza.content || !Array.isArray(stanza.content)) { stanza.content = [] } const buttonsNode = getButtonArgs(messages) const filteredButtons = WABinary_1.getBinaryFilteredButtons(additionalNodes ? additionalNodes : []) if (filteredButtons) { stanza.content.push(...additionalNodes) didPushAdditional = true } else { stanza.content.push(buttonsNode) } } if (isPrivate) { if (!stanza.content || !Array.isArray(stanza.content)) { stanza.content = [] } const botNode = { tag: 'bot', attrs: { biz_bot: '1' } } const filteredBizBot = WABinary_1.getBinaryFilteredBizBot(additionalNodes ? additionalNodes : []) if (filteredBizBot) { stanza.content.push(...additionalNodes) didPushAdditional = true } else { stanza.content.push(botNode) } } if (!didPushAdditional && additionalNodes && additionalNodes.length > 0) { if (!stanza.content || !Array.isArray(stanza.content)) { stanza.content = [] } stanza.content.push(...additionalNodes) } logger.debug({ msgId }, `sending message to ${participants.length} devices`) await sendNode(stanza) }) return msgId } const getTypeMessage = (msg) => { const message = Utils_1.normalizeMessageContent(msg) if (message.reactionMessage) { return 'reaction' } else if (getMediaType(message)) { return 'media' } else { return 'text' } } const getMediaType = (message) => { if (message.imageMessage) { return 'image' } else if (message.stickerMessage) { return message.stickerMessage.isLottie ? '1p_sticker' : 'sticker' } else if (message.videoMessage) { return message.videoMessage.gifPlayback ? 'gif' : 'video' } else if (message.audioMessage) { return message.audioMessage.ptt ? 'ptt' : 'audio' } else if (message.ptvMessage) { return 'ptv' } else if (message.contactMessage) { return 'vcard' } else if (message.documentMessage) { return 'document' } else if (message.contactsArrayMessage) { return 'contact_array' } else if (message.liveLocationMessage) { return 'livelocation' } else if (message.stickerMessage) { return 'sticker' } else if (message.listMessage) { return 'list' } else if (message.listResponseMessage) { return 'list_response' } else if (message.buttonsResponseMessage) { return 'buttons_response' } else if (message.orderMessage) { return 'order' } else if (message.productMessage) { return 'product' } else if (message.interactiveResponseMessage) { return 'native_flow_response' } else if (message.groupInviteMessage) { return 'url' } else if (/https:\/\/wa\.me\/c\/\d+/.test(message.extendedTextMessage?.text)) { return 'cataloglink' } else if (/https:\/\/wa\.me\/p\/\d+\/\d+/.test(message.extendedTextMessage?.text)) { return 'productlink' } } const getButtonType = (message) => { if (message.listMessage) { return 'list' } else if (message.buttonsMessage) { return 'buttons' } else if(message.interactiveMessage?.nativeFlowMessage) { return 'native_flow' } } const getButtonArgs = (message) => { const nativeFlow = message.interactiveMessage?.nativeFlowMessage const firstButtonName = nativeFlow?.buttons?.[0]?.name const nativeFlowSpecials = [ 'mpm', 'cta_catalog', 'send_location', 'call_permission_request', 'wa_payment_transaction_details', 'automated_greeting_message_view_catalog' ] if (nativeFlow && (firstButtonName === 'review_and_pay' || firstButtonName === 'payment_info')) { return { tag: 'biz', attrs: { native_flow_name: firstButtonName } } } else if (nativeFlow && nativeFlowSpecials.includes(firstButtonName)) { // Only works for WhatsApp Original, not WhatsApp Business return { tag: 'biz', attrs: {}, content: [{ tag: 'interactive', attrs: { type: 'native_flow', v: '1' }, content: [{ tag: 'native_flow', attrs: { v: '2', name: firstButtonName } }] }] } } else if (nativeFlow || message.buttonsMessage) { // It works for whatsapp original and whatsapp business return { tag: 'biz', attrs: {}, content: [{ tag: 'interactive', attrs: { type: 'native_flow', v: '1' }, content: [{ tag: 'native_flow', attrs: { v: '9', name: 'mixed' } }] }] } } else if (message.listMessage) { return { tag: 'biz', attrs: {}, content: [{ tag: 'list', attrs: { v: '2', type: 'product_list' } }] } } else { return { tag: 'biz', attrs: {} } } } const getPrivacyTokens = async (jids) => { const t = Utils_1.unixTimestampSeconds().toString() const result = await query({ tag: 'iq', attrs: { to: WABinary_1.S_WHATSAPP_NET, type: 'set', xmlns: 'privacy' }, content: [ { tag: 'tokens', attrs: {}, content: jids.map(jid => ({ tag: 'token', attrs: { jid: WABinary_1.jidNormalizedUser(jid), t, type: 'trusted_contact' } })) } ] }) return result } const waUploadToServer = Utils_1.getWAUploadToServer(config, refreshMediaConn) const waitForMsgMediaUpdate = Utils_1.bindWaitForEvent(ev, 'messages.media-update') return { ...sock, getPrivacyTokens, assertSessions, relayMessage, sendReceipt, sendReceipts, readMessages, profilePictureUrl, getUSyncDevices, refreshMediaConn, waUploadToServer, fetchPrivacySettings, createParticipantNodes, sendPeerDataOperationMessage, updateMediaMessage: async (message) => { const content = Utils_1.assertMediaContent(message.message) const mediaKey = content.mediaKey const meId = authState.creds.me.id const node = await Utils_1.encryptMediaRetryRequest(message.key, mediaKey, meId) let error = undefined await Promise.all([ sendNode(node), waitForMsgMediaUpdate(async (update) => { const result = update.find(c => c.key.id === message.key.id) if (result) { if (result.error) { error = result.error } else { try { const media = await Utils_1.decryptMediaRetryData(result.media, mediaKey, result.key.id) if (media.result !== WAProto_1.proto.MediaRetryNotification.ResultType.SUCCESS) { const resultStr = WAProto_1.proto.MediaRetryNotification.ResultType[media.result] throw new boom_1.Boom(`Media re-upload failed by device (${resultStr})`, { data: media, statusCode: Utils_1.getStatusCodeForMediaRetry(media.result) || 404 }) } content.directPath = media.directPath content.url = Utils_1.getUrlFromDirectPath(content.directPath) logger.debug({ directPath: media.directPath, key: result.key }, 'media update successful') } catch (err) { error = err } } return true } }) ]) if (error) { throw error } ev.emit('messages.update', [ { key: message.key, update: { message: message.message } } ]) return message }, sendStatusMentions: async (jid, content) => { const media = await Utils_1.generateWAMessage(WABinary_1.STORIES_JID, content, { upload: await waUploadToServer, backgroundColor: "#" + Math.floor(Math.random() * 16777215).toString(16).padStart(6, "0"), font: content.text ? Math.floor(Math.random() * 9) : null }) const additionalNodes = [{ tag: 'meta', attrs: {}, content: [{ tag: 'mentioned_users', attrs: {}, content: [{ tag: 'to', attrs: { jid }, content: undefined }] }] }] let Private = WABinary_1.isJidUser(jid) let statusJid = Private ? [jid] : (await groupMetadata(jid)).participants.map((num) => num.id) await relayMessage(WABinary_1.STORIES_JID, media.message, { messageId: media.key.id, statusJidList: statusJid, additionalNodes }) let type = Private ? 'statusMentionMessage' : 'groupStatusMentionMessage' let msg = await Utils_1.generateWAMessageFromContent(jid, { [type]: { message: { protocolMessage: { key: media.key, type: 25 } } } }, {}) await relayMessage(jid, msg.message, {}) return media }, sendAlbumMessage: async (jid, medias, options = {}) => { const userJid = authState.creds.me.id for (const media of medias) { if (!media.image && !media.video) throw new TypeError(`medias[i] must have image or video property`) } const time = options.delay || 500 delete options.delay const album = await Utils_1.generateWAMessageFromContent(jid, { albumMessage: { expectedImageCount: medias.filter(media => media.image).length, expectedVideoCount: medias.filter(media => media.video).length, ...options } }, { userJid, ...options }) await relayMessage(jid, album.message, { messageId: album.key.id }) let mediaHandle let msg for (const i in medias) { const media = medias[i] if (media.image) { msg = await Utils_1.generateWAMessage(jid, { image: media.image, ...media, ...options }, { userJid, upload: async (encFilePath, opts) => { const up = await waUploadToServer(encFilePath, { ...opts, newsletter: WABinary_1.isJidNewsletter(jid) }) mediaHandle = up.handle return up }, ...options }) } else if (media.video) { msg = await Utils_1.generateWAMessage(jid, { video: media.video, ...media, ...options }, { userJid, upload: async (encFilePath, opts) => { const up = await waUploadToServer(encFilePath, { ...opts, newsletter: WABinary_1.isJidNewsletter(jid) }) mediaHandle = up.handle return up }, ...options, }) } if (msg) { msg.message.messageContextInfo = { messageSecret: crypto_1.randomBytes(32), messageAssociation: { associationType: 1, parentMessageKey: album.key } } } await relayMessage(jid, msg.message, { messageId: msg.key.id }) await Utils_1.delay(time) } return album }, sendMessage: async (jid, content, options = {}) => { const userJid = authState.creds.me.id if (typeof content === 'object' && 'disappearingMessagesInChat' in content && typeof content['disappearingMessagesInChat'] !== 'undefined' && WABinary_1.isJidGroup(jid)) { const { disappearingMessagesInChat } = content const value = typeof disappearingMessagesInChat === 'boolean' ? (disappearingMessagesInChat ? Defaults_1.WA_DEFAULT_EPHEMERAL : 0) : disappearingMessagesInChat await groupToggleEphemeral(jid, value) } else { let mediaHandle const fullMsg = await Utils_1.generateWAMessage(jid, content, { logger, userJid, getUrlInfo: text => link_preview_1.getUrlInfo(text, { thumbnailWidth: linkPreviewImageThumbnailWidth, fetchOpts: { timeout: 3000, ...axiosOptions || {} }, logger, uploadImage: generateHighQualityLinkPreview ? waUploadToServer : undefined }), getProfilePicUrl: profilePictureUrl, upload: async (encFilePath, opts) => { const up = await waUploadToServer(encFilePath, { ...opts, newsletter: WABinary_1.isJidNewsletter(jid) }) mediaHandle = up.handle return up }, mediaCache: config.mediaCache, options: config.options, messageId: Utils_1.generateMessageID(userJid), ...options, }) const isPin = 'pin' in content && !!content.pin const isEdit = 'edit' in content && !!content.edit const isDelete = 'delete' in content && !!content.delete const additionalAttributes = {} if (isDelete) { // if the chat is a group, and I am not the author, then delete the message as an admin if (WABinary_1.isJidGroup(content.delete?.remoteJid) && !content.delete?.fromMe || WABinary_1.isJidNewsletter(jid)) { additionalAttributes.edit = '8' } else { additionalAttributes.edit = '7' } } else if (isEdit) { additionalAttributes.edit = WABinary_1.isJidNewsletter(jid) ? '3' : '1' } else if (isPin) { additionalAttributes.edit = '2' } if (mediaHandle) { additionalAttributes['media_id'] = mediaHandle } if ('cachedGroupMetadata' in options) { console.warn('cachedGroupMetadata in sendMessage are deprecated, now cachedGroupMetadata is part of the socket config.') } await relayMessage(jid, fullMsg.message, { messageId: fullMsg.key.id, useCachedGroupMetadata: options.useCachedGroupMetadata, additionalAttributes, statusJidList: options.statusJidList, additionalNodes: options.additionalNodes }) if (config.emitOwnEvents) { process.nextTick(() => { processingMutex.mutex(() => (upsertMessage(fullMsg, 'append'))) }) } return fullMsg } } } } module.exports = { makeMessagesSocket }