2022-01-30 15:27:37 -08:00
|
|
|
// Copyright (c) 2021 Tulir Asokan
|
|
|
|
//
|
|
|
|
// This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
// License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
// file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
|
|
|
|
|
|
|
package whatsmeow
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"compress/zlib"
|
|
|
|
"crypto/rand"
|
2022-06-11 14:07:42 -07:00
|
|
|
"encoding/hex"
|
2022-01-30 15:27:37 -08:00
|
|
|
"errors"
|
|
|
|
"fmt"
|
|
|
|
"io"
|
2022-03-31 15:23:19 -07:00
|
|
|
"runtime/debug"
|
|
|
|
"sync/atomic"
|
2022-01-30 15:27:37 -08:00
|
|
|
"time"
|
|
|
|
|
|
|
|
"go.mau.fi/libsignal/signalerror"
|
|
|
|
"google.golang.org/protobuf/proto"
|
|
|
|
|
|
|
|
"go.mau.fi/libsignal/groups"
|
|
|
|
"go.mau.fi/libsignal/protocol"
|
|
|
|
"go.mau.fi/libsignal/session"
|
|
|
|
|
|
|
|
"go.mau.fi/whatsmeow/appstate"
|
|
|
|
waBinary "go.mau.fi/whatsmeow/binary"
|
|
|
|
waProto "go.mau.fi/whatsmeow/binary/proto"
|
|
|
|
"go.mau.fi/whatsmeow/store"
|
|
|
|
"go.mau.fi/whatsmeow/types"
|
|
|
|
"go.mau.fi/whatsmeow/types/events"
|
|
|
|
)
|
|
|
|
|
|
|
|
var pbSerializer = store.SignalProtobufSerializer
|
|
|
|
|
|
|
|
func (cli *Client) handleEncryptedMessage(node *waBinary.Node) {
|
|
|
|
info, err := cli.parseMessageInfo(node)
|
|
|
|
if err != nil {
|
|
|
|
cli.Log.Warnf("Failed to parse message: %v", err)
|
|
|
|
} else {
|
|
|
|
if len(info.PushName) > 0 && info.PushName != "-" {
|
|
|
|
go cli.updatePushName(info.Sender, info, info.PushName)
|
|
|
|
}
|
|
|
|
cli.decryptMessages(info, node)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (cli *Client) parseMessageSource(node *waBinary.Node) (source types.MessageSource, err error) {
|
2022-06-11 14:07:42 -07:00
|
|
|
ag := node.AttrGetter()
|
|
|
|
from := ag.JID("from")
|
|
|
|
if from.Server == types.GroupServer || from.Server == types.BroadcastServer {
|
2022-01-30 15:27:37 -08:00
|
|
|
source.IsGroup = true
|
|
|
|
source.Chat = from
|
2022-06-11 14:07:42 -07:00
|
|
|
source.Sender = ag.JID("participant")
|
|
|
|
if source.Sender.User == cli.Store.ID.User {
|
|
|
|
source.IsFromMe = true
|
2022-01-30 15:27:37 -08:00
|
|
|
}
|
|
|
|
if from.Server == types.BroadcastServer {
|
2022-06-11 14:07:42 -07:00
|
|
|
source.BroadcastListOwner = ag.OptionalJIDOrEmpty("recipient")
|
2022-01-30 15:27:37 -08:00
|
|
|
}
|
|
|
|
} else if from.User == cli.Store.ID.User {
|
|
|
|
source.IsFromMe = true
|
|
|
|
source.Sender = from
|
2022-06-11 14:07:42 -07:00
|
|
|
recipient := ag.OptionalJID("recipient")
|
|
|
|
if recipient != nil {
|
|
|
|
source.Chat = *recipient
|
2022-01-30 15:27:37 -08:00
|
|
|
} else {
|
2022-06-11 14:07:42 -07:00
|
|
|
source.Chat = from.ToNonAD()
|
2022-01-30 15:27:37 -08:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
source.Chat = from.ToNonAD()
|
|
|
|
source.Sender = from
|
|
|
|
}
|
2022-06-11 14:07:42 -07:00
|
|
|
err = ag.Error()
|
2022-01-30 15:27:37 -08:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
func (cli *Client) parseMessageInfo(node *waBinary.Node) (*types.MessageInfo, error) {
|
|
|
|
var info types.MessageInfo
|
|
|
|
var err error
|
|
|
|
info.MessageSource, err = cli.parseMessageSource(node)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2022-06-11 14:07:42 -07:00
|
|
|
ag := node.AttrGetter()
|
|
|
|
info.ID = types.MessageID(ag.String("id"))
|
|
|
|
info.Timestamp = ag.UnixTime("t")
|
|
|
|
info.PushName = ag.OptionalString("notify")
|
|
|
|
info.Category = ag.OptionalString("category")
|
|
|
|
if !ag.OK() {
|
|
|
|
return nil, ag.Error()
|
2022-01-30 15:27:37 -08:00
|
|
|
}
|
|
|
|
|
2022-04-25 14:50:10 -07:00
|
|
|
for _, child := range node.GetChildren() {
|
|
|
|
if child.Tag == "multicast" {
|
|
|
|
info.Multicast = true
|
|
|
|
} else if mediaType, ok := child.AttrGetter().GetString("mediatype", false); ok {
|
|
|
|
info.MediaType = mediaType
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-01-30 15:27:37 -08:00
|
|
|
return &info, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (cli *Client) decryptMessages(info *types.MessageInfo, node *waBinary.Node) {
|
|
|
|
go cli.sendAck(node)
|
2022-04-25 14:50:10 -07:00
|
|
|
if len(node.GetChildrenByTag("unavailable")) > 0 && len(node.GetChildrenByTag("enc")) == 0 {
|
2022-01-30 15:27:37 -08:00
|
|
|
cli.Log.Warnf("Unavailable message %s from %s", info.ID, info.SourceString())
|
|
|
|
go cli.sendRetryReceipt(node, true)
|
|
|
|
cli.dispatchEvent(&events.UndecryptableMessage{Info: *info, IsUnavailable: true})
|
|
|
|
return
|
|
|
|
}
|
|
|
|
children := node.GetChildren()
|
|
|
|
cli.Log.Debugf("Decrypting %d messages from %s", len(children), info.SourceString())
|
|
|
|
handled := false
|
2022-06-11 14:07:42 -07:00
|
|
|
containsDirectMsg := false
|
2022-01-30 15:27:37 -08:00
|
|
|
for _, child := range children {
|
|
|
|
if child.Tag != "enc" {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
encType, ok := child.Attrs["type"].(string)
|
|
|
|
if !ok {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
var decrypted []byte
|
|
|
|
var err error
|
|
|
|
if encType == "pkmsg" || encType == "msg" {
|
|
|
|
decrypted, err = cli.decryptDM(&child, info.Sender, encType == "pkmsg")
|
2022-06-11 14:07:42 -07:00
|
|
|
containsDirectMsg = true
|
2022-01-30 15:27:37 -08:00
|
|
|
} else if info.IsGroup && encType == "skmsg" {
|
|
|
|
decrypted, err = cli.decryptGroupMsg(&child, info.Sender, info.Chat)
|
|
|
|
} else {
|
|
|
|
cli.Log.Warnf("Unhandled encrypted message (type %s) from %s", encType, info.SourceString())
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
cli.Log.Warnf("Error decrypting message from %s: %v", info.SourceString(), err)
|
2022-06-11 14:07:42 -07:00
|
|
|
isUnavailable := encType == "skmsg" && !containsDirectMsg && errors.Is(err, signalerror.ErrNoSenderKeyForUser)
|
|
|
|
go cli.sendRetryReceipt(node, isUnavailable)
|
|
|
|
cli.dispatchEvent(&events.UndecryptableMessage{Info: *info, IsUnavailable: isUnavailable})
|
2022-01-30 15:27:37 -08:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var msg waProto.Message
|
|
|
|
err = proto.Unmarshal(decrypted, &msg)
|
|
|
|
if err != nil {
|
|
|
|
cli.Log.Warnf("Error unmarshaling decrypted message from %s: %v", info.SourceString(), err)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
cli.handleDecryptedMessage(info, &msg)
|
|
|
|
handled = true
|
|
|
|
}
|
|
|
|
if handled {
|
|
|
|
go cli.sendMessageReceipt(info)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-03-31 15:23:19 -07:00
|
|
|
func (cli *Client) clearUntrustedIdentity(target types.JID) {
|
|
|
|
err := cli.Store.Identities.DeleteIdentity(target.SignalAddress().String())
|
|
|
|
if err != nil {
|
|
|
|
cli.Log.Warnf("Failed to delete untrusted identity of %s from store: %v", target, err)
|
|
|
|
}
|
|
|
|
err = cli.Store.Sessions.DeleteSession(target.SignalAddress().String())
|
|
|
|
if err != nil {
|
|
|
|
cli.Log.Warnf("Failed to delete session with %s (untrusted identity) from store: %v", target, err)
|
|
|
|
}
|
|
|
|
cli.dispatchEvent(&events.IdentityChange{JID: target, Timestamp: time.Now(), Implicit: true})
|
|
|
|
}
|
|
|
|
|
2022-01-30 15:27:37 -08:00
|
|
|
func (cli *Client) decryptDM(child *waBinary.Node, from types.JID, isPreKey bool) ([]byte, error) {
|
|
|
|
content, _ := child.Content.([]byte)
|
|
|
|
|
|
|
|
builder := session.NewBuilderFromSignal(cli.Store, from.SignalAddress(), pbSerializer)
|
|
|
|
cipher := session.NewCipher(builder, from.SignalAddress())
|
|
|
|
var plaintext []byte
|
|
|
|
if isPreKey {
|
|
|
|
preKeyMsg, err := protocol.NewPreKeySignalMessageFromBytes(content, pbSerializer.PreKeySignalMessage, pbSerializer.SignalMessage)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to parse prekey message: %w", err)
|
|
|
|
}
|
|
|
|
plaintext, _, err = cipher.DecryptMessageReturnKey(preKeyMsg)
|
2022-03-31 15:23:19 -07:00
|
|
|
if cli.AutoTrustIdentity && errors.Is(err, signalerror.ErrUntrustedIdentity) {
|
2022-01-30 15:27:37 -08:00
|
|
|
cli.Log.Warnf("Got %v error while trying to decrypt prekey message from %s, clearing stored identity and retrying", err, from)
|
2022-03-31 15:23:19 -07:00
|
|
|
cli.clearUntrustedIdentity(from)
|
2022-01-30 15:27:37 -08:00
|
|
|
plaintext, _, err = cipher.DecryptMessageReturnKey(preKeyMsg)
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to decrypt prekey message: %w", err)
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
msg, err := protocol.NewSignalMessageFromBytes(content, pbSerializer.SignalMessage)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to parse normal message: %w", err)
|
|
|
|
}
|
|
|
|
plaintext, err = cipher.Decrypt(msg)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to decrypt normal message: %w", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return unpadMessage(plaintext)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (cli *Client) decryptGroupMsg(child *waBinary.Node, from types.JID, chat types.JID) ([]byte, error) {
|
|
|
|
content, _ := child.Content.([]byte)
|
|
|
|
|
|
|
|
senderKeyName := protocol.NewSenderKeyName(chat.String(), from.SignalAddress())
|
|
|
|
builder := groups.NewGroupSessionBuilder(cli.Store, pbSerializer)
|
|
|
|
cipher := groups.NewGroupCipher(builder, senderKeyName, cli.Store)
|
|
|
|
msg, err := protocol.NewSenderKeyMessageFromBytes(content, pbSerializer.SenderKeyMessage)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to parse group message: %w", err)
|
|
|
|
}
|
|
|
|
plaintext, err := cipher.Decrypt(msg)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to decrypt group message: %w", err)
|
|
|
|
}
|
|
|
|
return unpadMessage(plaintext)
|
|
|
|
}
|
|
|
|
|
|
|
|
const checkPadding = true
|
|
|
|
|
|
|
|
func isValidPadding(plaintext []byte) bool {
|
|
|
|
lastByte := plaintext[len(plaintext)-1]
|
|
|
|
expectedPadding := bytes.Repeat([]byte{lastByte}, int(lastByte))
|
|
|
|
return bytes.HasSuffix(plaintext, expectedPadding)
|
|
|
|
}
|
|
|
|
|
|
|
|
func unpadMessage(plaintext []byte) ([]byte, error) {
|
|
|
|
if checkPadding && !isValidPadding(plaintext) {
|
|
|
|
return nil, fmt.Errorf("plaintext doesn't have expected padding")
|
|
|
|
}
|
|
|
|
return plaintext[:len(plaintext)-int(plaintext[len(plaintext)-1])], nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func padMessage(plaintext []byte) []byte {
|
|
|
|
var pad [1]byte
|
|
|
|
_, err := rand.Read(pad[:])
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
pad[0] &= 0xf
|
|
|
|
if pad[0] == 0 {
|
|
|
|
pad[0] = 0xf
|
|
|
|
}
|
|
|
|
plaintext = append(plaintext, bytes.Repeat(pad[:], int(pad[0]))...)
|
|
|
|
return plaintext
|
|
|
|
}
|
|
|
|
|
|
|
|
func (cli *Client) handleSenderKeyDistributionMessage(chat, from types.JID, rawSKDMsg *waProto.SenderKeyDistributionMessage) {
|
|
|
|
builder := groups.NewGroupSessionBuilder(cli.Store, pbSerializer)
|
|
|
|
senderKeyName := protocol.NewSenderKeyName(chat.String(), from.SignalAddress())
|
|
|
|
sdkMsg, err := protocol.NewSenderKeyDistributionMessageFromBytes(rawSKDMsg.AxolotlSenderKeyDistributionMessage, pbSerializer.SenderKeyDistributionMessage)
|
|
|
|
if err != nil {
|
|
|
|
cli.Log.Errorf("Failed to parse sender key distribution message from %s for %s: %v", from, chat, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
builder.Process(senderKeyName, sdkMsg)
|
|
|
|
cli.Log.Debugf("Processed sender key distribution message from %s in %s", senderKeyName.Sender().String(), senderKeyName.GroupID())
|
|
|
|
}
|
|
|
|
|
2022-03-31 15:23:19 -07:00
|
|
|
func (cli *Client) handleHistorySyncNotificationLoop() {
|
|
|
|
defer func() {
|
|
|
|
atomic.StoreUint32(&cli.historySyncHandlerStarted, 0)
|
|
|
|
err := recover()
|
|
|
|
if err != nil {
|
|
|
|
cli.Log.Errorf("History sync handler panicked: %v\n%s", err, debug.Stack())
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check in case something new appeared in the channel between the loop stopping
|
|
|
|
// and the atomic variable being updated. If yes, restart the loop.
|
|
|
|
if len(cli.historySyncNotifications) > 0 && atomic.CompareAndSwapUint32(&cli.historySyncHandlerStarted, 0, 1) {
|
|
|
|
cli.Log.Warnf("New history sync notifications appeared after loop stopped, restarting loop...")
|
|
|
|
go cli.handleHistorySyncNotificationLoop()
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
for notif := range cli.historySyncNotifications {
|
|
|
|
cli.handleHistorySyncNotification(notif)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-01-30 15:27:37 -08:00
|
|
|
func (cli *Client) handleHistorySyncNotification(notif *waProto.HistorySyncNotification) {
|
|
|
|
var historySync waProto.HistorySync
|
|
|
|
if data, err := cli.Download(notif); err != nil {
|
|
|
|
cli.Log.Errorf("Failed to download history sync data: %v", err)
|
|
|
|
} else if reader, err := zlib.NewReader(bytes.NewReader(data)); err != nil {
|
|
|
|
cli.Log.Errorf("Failed to create zlib reader for history sync data: %v", err)
|
|
|
|
} else if rawData, err := io.ReadAll(reader); err != nil {
|
|
|
|
cli.Log.Errorf("Failed to decompress history sync data: %v", err)
|
|
|
|
} else if err = proto.Unmarshal(rawData, &historySync); err != nil {
|
|
|
|
cli.Log.Errorf("Failed to unmarshal history sync data: %v", err)
|
|
|
|
} else {
|
2022-03-31 15:23:19 -07:00
|
|
|
cli.Log.Debugf("Received history sync (type %s, chunk %d)", historySync.GetSyncType(), historySync.GetChunkOrder())
|
2022-01-30 15:27:37 -08:00
|
|
|
if historySync.GetSyncType() == waProto.HistorySync_PUSH_NAME {
|
|
|
|
go cli.handleHistoricalPushNames(historySync.GetPushnames())
|
|
|
|
}
|
|
|
|
cli.dispatchEvent(&events.HistorySync{
|
|
|
|
Data: &historySync,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (cli *Client) handleAppStateSyncKeyShare(keys *waProto.AppStateSyncKeyShare) {
|
2022-06-11 14:07:42 -07:00
|
|
|
onlyResyncIfNotSynced := true
|
|
|
|
|
2022-03-12 14:02:04 -08:00
|
|
|
cli.Log.Debugf("Got %d new app state keys", len(keys.GetKeys()))
|
2022-06-11 14:07:42 -07:00
|
|
|
cli.appStateKeyRequestsLock.RLock()
|
2022-01-30 15:27:37 -08:00
|
|
|
for _, key := range keys.GetKeys() {
|
|
|
|
marshaledFingerprint, err := proto.Marshal(key.GetKeyData().GetFingerprint())
|
|
|
|
if err != nil {
|
|
|
|
cli.Log.Errorf("Failed to marshal fingerprint of app state sync key %X", key.GetKeyId().GetKeyId())
|
|
|
|
continue
|
|
|
|
}
|
2022-06-11 14:07:42 -07:00
|
|
|
_, isReRequest := cli.appStateKeyRequests[hex.EncodeToString(key.GetKeyId().GetKeyId())]
|
|
|
|
if isReRequest {
|
|
|
|
onlyResyncIfNotSynced = false
|
|
|
|
}
|
2022-01-30 15:27:37 -08:00
|
|
|
err = cli.Store.AppStateKeys.PutAppStateSyncKey(key.GetKeyId().GetKeyId(), store.AppStateSyncKey{
|
|
|
|
Data: key.GetKeyData().GetKeyData(),
|
|
|
|
Fingerprint: marshaledFingerprint,
|
|
|
|
Timestamp: key.GetKeyData().GetTimestamp(),
|
|
|
|
})
|
|
|
|
if err != nil {
|
2022-06-11 14:07:42 -07:00
|
|
|
cli.Log.Errorf("Failed to store app state sync key %X: %v", key.GetKeyId().GetKeyId(), err)
|
2022-01-30 15:27:37 -08:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
cli.Log.Debugf("Received app state sync key %X", key.GetKeyId().GetKeyId())
|
|
|
|
}
|
2022-06-11 14:07:42 -07:00
|
|
|
cli.appStateKeyRequestsLock.RUnlock()
|
2022-01-30 15:27:37 -08:00
|
|
|
|
|
|
|
for _, name := range appstate.AllPatchNames {
|
2022-06-11 14:07:42 -07:00
|
|
|
err := cli.FetchAppState(name, false, onlyResyncIfNotSynced)
|
2022-01-30 15:27:37 -08:00
|
|
|
if err != nil {
|
|
|
|
cli.Log.Errorf("Failed to do initial fetch of app state %s: %v", name, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (cli *Client) handleProtocolMessage(info *types.MessageInfo, msg *waProto.Message) {
|
|
|
|
protoMsg := msg.GetProtocolMessage()
|
|
|
|
|
|
|
|
if protoMsg.GetHistorySyncNotification() != nil && info.IsFromMe {
|
2022-03-31 15:23:19 -07:00
|
|
|
cli.historySyncNotifications <- protoMsg.HistorySyncNotification
|
|
|
|
if atomic.CompareAndSwapUint32(&cli.historySyncHandlerStarted, 0, 1) {
|
|
|
|
go cli.handleHistorySyncNotificationLoop()
|
|
|
|
}
|
|
|
|
go cli.sendProtocolMessageReceipt(info.ID, "hist_sync")
|
2022-01-30 15:27:37 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
if protoMsg.GetAppStateSyncKeyShare() != nil && info.IsFromMe {
|
2022-03-31 15:23:19 -07:00
|
|
|
go cli.handleAppStateSyncKeyShare(protoMsg.AppStateSyncKeyShare)
|
2022-01-30 15:27:37 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
if info.Category == "peer" {
|
2022-03-31 15:23:19 -07:00
|
|
|
go cli.sendProtocolMessageReceipt(info.ID, "peer_msg")
|
2022-01-30 15:27:37 -08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-06-11 14:07:42 -07:00
|
|
|
func (cli *Client) processProtocolParts(info *types.MessageInfo, msg *waProto.Message) {
|
|
|
|
// Hopefully sender key distribution messages and protocol messages can't be inside ephemeral messages
|
2022-01-30 15:27:37 -08:00
|
|
|
if msg.GetDeviceSentMessage().GetMessage() != nil {
|
|
|
|
msg = msg.GetDeviceSentMessage().GetMessage()
|
|
|
|
}
|
|
|
|
if msg.GetSenderKeyDistributionMessage() != nil {
|
|
|
|
if !info.IsGroup {
|
|
|
|
cli.Log.Warnf("Got sender key distribution message in non-group chat from", info.Sender)
|
|
|
|
} else {
|
|
|
|
cli.handleSenderKeyDistributionMessage(info.Chat, info.Sender, msg.SenderKeyDistributionMessage)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if msg.GetProtocolMessage() != nil {
|
2022-03-31 15:23:19 -07:00
|
|
|
cli.handleProtocolMessage(info, msg)
|
2022-01-30 15:27:37 -08:00
|
|
|
}
|
|
|
|
|
2022-06-11 14:07:42 -07:00
|
|
|
}
|
2022-01-30 15:27:37 -08:00
|
|
|
|
2022-06-11 14:07:42 -07:00
|
|
|
func (cli *Client) handleDecryptedMessage(info *types.MessageInfo, msg *waProto.Message) {
|
|
|
|
cli.processProtocolParts(info, msg)
|
|
|
|
evt := &events.Message{Info: *info, RawMessage: msg}
|
|
|
|
cli.dispatchEvent(evt.UnwrapRaw())
|
2022-01-30 15:27:37 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
func (cli *Client) sendProtocolMessageReceipt(id, msgType string) {
|
2022-03-12 14:02:04 -08:00
|
|
|
if len(id) == 0 || cli.Store.ID == nil {
|
2022-01-30 15:27:37 -08:00
|
|
|
return
|
|
|
|
}
|
|
|
|
err := cli.sendNode(waBinary.Node{
|
|
|
|
Tag: "receipt",
|
|
|
|
Attrs: waBinary.Attrs{
|
|
|
|
"id": id,
|
|
|
|
"type": msgType,
|
|
|
|
"to": types.NewJID(cli.Store.ID.User, types.LegacyUserServer),
|
|
|
|
},
|
|
|
|
Content: nil,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
cli.Log.Warnf("Failed to send acknowledgement for protocol message %s: %v", id, err)
|
|
|
|
}
|
|
|
|
}
|