2022-01-30 23:27:37 +00:00
|
|
|
// Copyright (c) 2021 Tulir Asokan
|
|
|
|
//
|
|
|
|
// This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
// License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
// file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
|
|
|
|
|
|
|
package whatsmeow
|
|
|
|
|
|
|
|
import (
|
2022-08-13 14:14:26 +00:00
|
|
|
"context"
|
2024-05-23 21:44:31 +00:00
|
|
|
"crypto/hmac"
|
|
|
|
"crypto/sha256"
|
2022-01-30 23:27:37 +00:00
|
|
|
"encoding/binary"
|
|
|
|
"fmt"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"go.mau.fi/libsignal/ecc"
|
|
|
|
"go.mau.fi/libsignal/groups"
|
|
|
|
"go.mau.fi/libsignal/keys/prekey"
|
|
|
|
"go.mau.fi/libsignal/protocol"
|
|
|
|
"google.golang.org/protobuf/proto"
|
|
|
|
|
|
|
|
waBinary "go.mau.fi/whatsmeow/binary"
|
2024-05-23 21:44:31 +00:00
|
|
|
"go.mau.fi/whatsmeow/binary/armadillo/waCommon"
|
|
|
|
"go.mau.fi/whatsmeow/binary/armadillo/waConsumerApplication"
|
|
|
|
"go.mau.fi/whatsmeow/binary/armadillo/waMsgApplication"
|
|
|
|
"go.mau.fi/whatsmeow/binary/armadillo/waMsgTransport"
|
2022-01-30 23:27:37 +00:00
|
|
|
waProto "go.mau.fi/whatsmeow/binary/proto"
|
|
|
|
"go.mau.fi/whatsmeow/types"
|
|
|
|
"go.mau.fi/whatsmeow/types/events"
|
|
|
|
)
|
|
|
|
|
|
|
|
// Number of sent messages to cache in memory for handling retry receipts.
|
|
|
|
const recentMessagesSize = 256
|
|
|
|
|
|
|
|
type recentMessageKey struct {
|
|
|
|
To types.JID
|
|
|
|
ID types.MessageID
|
|
|
|
}
|
|
|
|
|
|
|
|
type RecentMessage struct {
|
2024-05-23 21:44:31 +00:00
|
|
|
wa *waProto.Message
|
|
|
|
fb *waMsgApplication.MessageApplication
|
2022-01-30 23:27:37 +00:00
|
|
|
}
|
|
|
|
|
2024-05-23 21:44:31 +00:00
|
|
|
func (rm RecentMessage) IsEmpty() bool {
|
|
|
|
return rm.wa == nil && rm.fb == nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (cli *Client) addRecentMessage(to types.JID, id types.MessageID, wa *waProto.Message, fb *waMsgApplication.MessageApplication) {
|
2022-01-30 23:27:37 +00:00
|
|
|
cli.recentMessagesLock.Lock()
|
|
|
|
key := recentMessageKey{to, id}
|
|
|
|
if cli.recentMessagesList[cli.recentMessagesPtr].ID != "" {
|
|
|
|
delete(cli.recentMessagesMap, cli.recentMessagesList[cli.recentMessagesPtr])
|
|
|
|
}
|
2024-05-23 21:44:31 +00:00
|
|
|
cli.recentMessagesMap[key] = RecentMessage{wa: wa, fb: fb}
|
2022-01-30 23:27:37 +00:00
|
|
|
cli.recentMessagesList[cli.recentMessagesPtr] = key
|
|
|
|
cli.recentMessagesPtr++
|
|
|
|
if cli.recentMessagesPtr >= len(cli.recentMessagesList) {
|
|
|
|
cli.recentMessagesPtr = 0
|
|
|
|
}
|
|
|
|
cli.recentMessagesLock.Unlock()
|
|
|
|
}
|
|
|
|
|
2024-05-23 21:44:31 +00:00
|
|
|
func (cli *Client) getRecentMessage(to types.JID, id types.MessageID) RecentMessage {
|
2022-01-30 23:27:37 +00:00
|
|
|
cli.recentMessagesLock.RLock()
|
|
|
|
msg, _ := cli.recentMessagesMap[recentMessageKey{to, id}]
|
|
|
|
cli.recentMessagesLock.RUnlock()
|
|
|
|
return msg
|
|
|
|
}
|
|
|
|
|
2024-05-23 21:44:31 +00:00
|
|
|
func (cli *Client) getMessageForRetry(receipt *events.Receipt, messageID types.MessageID) (RecentMessage, error) {
|
2022-01-30 23:27:37 +00:00
|
|
|
msg := cli.getRecentMessage(receipt.Chat, messageID)
|
2024-05-23 21:44:31 +00:00
|
|
|
if msg.IsEmpty() {
|
|
|
|
waMsg := cli.GetMessageForRetry(receipt.Sender, receipt.Chat, messageID)
|
|
|
|
if waMsg == nil {
|
|
|
|
return RecentMessage{}, fmt.Errorf("couldn't find message %s", messageID)
|
2022-01-30 23:27:37 +00:00
|
|
|
} else {
|
|
|
|
cli.Log.Debugf("Found message in GetMessageForRetry to accept retry receipt for %s/%s from %s", receipt.Chat, messageID, receipt.Sender)
|
|
|
|
}
|
2024-05-23 21:44:31 +00:00
|
|
|
msg = RecentMessage{wa: waMsg}
|
2022-01-30 23:27:37 +00:00
|
|
|
} else {
|
|
|
|
cli.Log.Debugf("Found message in local cache to accept retry receipt for %s/%s from %s", receipt.Chat, messageID, receipt.Sender)
|
|
|
|
}
|
2024-05-23 21:44:31 +00:00
|
|
|
return msg, nil
|
2022-01-30 23:27:37 +00:00
|
|
|
}
|
|
|
|
|
2022-06-11 21:07:42 +00:00
|
|
|
const recreateSessionTimeout = 1 * time.Hour
|
|
|
|
|
|
|
|
func (cli *Client) shouldRecreateSession(retryCount int, jid types.JID) (reason string, recreate bool) {
|
|
|
|
cli.sessionRecreateHistoryLock.Lock()
|
|
|
|
defer cli.sessionRecreateHistoryLock.Unlock()
|
|
|
|
if !cli.Store.ContainsSession(jid.SignalAddress()) {
|
|
|
|
cli.sessionRecreateHistory[jid] = time.Now()
|
|
|
|
return "we don't have a Signal session with them", true
|
|
|
|
} else if retryCount < 2 {
|
|
|
|
return "", false
|
|
|
|
}
|
|
|
|
prevTime, ok := cli.sessionRecreateHistory[jid]
|
|
|
|
if !ok || prevTime.Add(recreateSessionTimeout).Before(time.Now()) {
|
|
|
|
cli.sessionRecreateHistory[jid] = time.Now()
|
|
|
|
return "retry count > 1 and over an hour since last recreation", true
|
|
|
|
}
|
|
|
|
return "", false
|
|
|
|
}
|
|
|
|
|
2024-05-23 21:44:31 +00:00
|
|
|
type incomingRetryKey struct {
|
|
|
|
jid types.JID
|
|
|
|
messageID types.MessageID
|
|
|
|
}
|
|
|
|
|
2022-01-30 23:27:37 +00:00
|
|
|
// handleRetryReceipt handles an incoming retry receipt for an outgoing message.
|
|
|
|
func (cli *Client) handleRetryReceipt(receipt *events.Receipt, node *waBinary.Node) error {
|
|
|
|
retryChild, ok := node.GetOptionalChildByTag("retry")
|
|
|
|
if !ok {
|
|
|
|
return &ElementMissingError{Tag: "retry", In: "retry receipt"}
|
|
|
|
}
|
|
|
|
ag := retryChild.AttrGetter()
|
|
|
|
messageID := ag.String("id")
|
2022-06-11 21:07:42 +00:00
|
|
|
timestamp := ag.UnixTime("t")
|
2022-01-30 23:27:37 +00:00
|
|
|
retryCount := ag.Int("count")
|
|
|
|
if !ag.OK() {
|
|
|
|
return ag.Error()
|
|
|
|
}
|
|
|
|
msg, err := cli.getMessageForRetry(receipt, messageID)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2024-05-23 21:44:31 +00:00
|
|
|
var fbConsumerMsg *waConsumerApplication.ConsumerApplication
|
|
|
|
if msg.fb != nil {
|
|
|
|
subProto, ok := msg.fb.GetPayload().GetSubProtocol().GetSubProtocol().(*waMsgApplication.MessageApplication_SubProtocolPayload_ConsumerMessage)
|
|
|
|
if ok {
|
|
|
|
fbConsumerMsg, err = subProto.Decode()
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("failed to decode consumer message for retry: %w", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
retryKey := incomingRetryKey{receipt.Sender, messageID}
|
|
|
|
cli.incomingRetryRequestCounterLock.Lock()
|
|
|
|
cli.incomingRetryRequestCounter[retryKey]++
|
|
|
|
internalCounter := cli.incomingRetryRequestCounter[retryKey]
|
|
|
|
cli.incomingRetryRequestCounterLock.Unlock()
|
|
|
|
if internalCounter >= 10 {
|
|
|
|
cli.Log.Warnf("Dropping retry request from %s for %s: internal retry counter is %d", messageID, receipt.Sender, internalCounter)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2023-01-28 21:57:53 +00:00
|
|
|
ownID := cli.getOwnID()
|
|
|
|
if ownID.IsEmpty() {
|
|
|
|
return ErrNotLoggedIn
|
|
|
|
}
|
2022-01-30 23:27:37 +00:00
|
|
|
|
2024-05-23 21:44:31 +00:00
|
|
|
var fbSKDM *waMsgTransport.MessageTransport_Protocol_Ancillary_SenderKeyDistributionMessage
|
|
|
|
var fbDSM *waMsgTransport.MessageTransport_Protocol_Integral_DeviceSentMessage
|
2022-01-30 23:27:37 +00:00
|
|
|
if receipt.IsGroup {
|
|
|
|
builder := groups.NewGroupSessionBuilder(cli.Store, pbSerializer)
|
2023-01-28 21:57:53 +00:00
|
|
|
senderKeyName := protocol.NewSenderKeyName(receipt.Chat.String(), ownID.SignalAddress())
|
2022-01-30 23:27:37 +00:00
|
|
|
signalSKDMessage, err := builder.Create(senderKeyName)
|
|
|
|
if err != nil {
|
|
|
|
cli.Log.Warnf("Failed to create sender key distribution message to include in retry of %s in %s to %s: %v", messageID, receipt.Chat, receipt.Sender, err)
|
2024-05-23 21:44:31 +00:00
|
|
|
}
|
|
|
|
if msg.wa != nil {
|
|
|
|
msg.wa.SenderKeyDistributionMessage = &waProto.SenderKeyDistributionMessage{
|
2022-01-30 23:27:37 +00:00
|
|
|
GroupId: proto.String(receipt.Chat.String()),
|
|
|
|
AxolotlSenderKeyDistributionMessage: signalSKDMessage.Serialize(),
|
|
|
|
}
|
2024-05-23 21:44:31 +00:00
|
|
|
} else {
|
|
|
|
fbSKDM = &waMsgTransport.MessageTransport_Protocol_Ancillary_SenderKeyDistributionMessage{
|
|
|
|
GroupID: receipt.Chat.String(),
|
|
|
|
AxolotlSenderKeyDistributionMessage: signalSKDMessage.Serialize(),
|
|
|
|
}
|
2022-01-30 23:27:37 +00:00
|
|
|
}
|
|
|
|
} else if receipt.IsFromMe {
|
2024-05-23 21:44:31 +00:00
|
|
|
if msg.wa != nil {
|
|
|
|
msg.wa = &waProto.Message{
|
|
|
|
DeviceSentMessage: &waProto.DeviceSentMessage{
|
|
|
|
DestinationJid: proto.String(receipt.Chat.String()),
|
|
|
|
Message: msg.wa,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
fbDSM = &waMsgTransport.MessageTransport_Protocol_Integral_DeviceSentMessage{
|
|
|
|
DestinationJID: receipt.Chat.String(),
|
|
|
|
}
|
2022-01-30 23:27:37 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-05-23 21:44:31 +00:00
|
|
|
// TODO pre-retry callback for fb
|
|
|
|
if cli.PreRetryCallback != nil && !cli.PreRetryCallback(receipt, messageID, retryCount, msg.wa) {
|
2022-01-30 23:27:37 +00:00
|
|
|
cli.Log.Debugf("Cancelled retry receipt in PreRetryCallback")
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-05-23 21:44:31 +00:00
|
|
|
var plaintext, frankingTag []byte
|
|
|
|
if msg.wa != nil {
|
|
|
|
plaintext, err = proto.Marshal(msg.wa)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("failed to marshal message: %w", err)
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
plaintext, err = proto.Marshal(msg.fb)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("failed to marshal consumer message: %w", err)
|
|
|
|
}
|
|
|
|
frankingHash := hmac.New(sha256.New, msg.fb.GetMetadata().GetFrankingKey())
|
|
|
|
frankingHash.Write(plaintext)
|
|
|
|
frankingTag = frankingHash.Sum(nil)
|
2022-01-30 23:27:37 +00:00
|
|
|
}
|
|
|
|
_, hasKeys := node.GetOptionalChildByTag("keys")
|
|
|
|
var bundle *prekey.Bundle
|
|
|
|
if hasKeys {
|
|
|
|
bundle, err = nodeToPreKeyBundle(uint32(receipt.Sender.Device), *node)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("failed to read prekey bundle in retry receipt: %w", err)
|
|
|
|
}
|
2022-06-11 21:07:42 +00:00
|
|
|
} else if reason, recreate := cli.shouldRecreateSession(retryCount, receipt.Sender); recreate {
|
|
|
|
cli.Log.Debugf("Fetching prekeys for %s for handling retry receipt with no prekey bundle because %s", receipt.Sender, reason)
|
2022-01-30 23:27:37 +00:00
|
|
|
var keys map[types.JID]preKeyResp
|
2022-08-13 14:14:26 +00:00
|
|
|
keys, err = cli.fetchPreKeys(context.TODO(), []types.JID{receipt.Sender})
|
2022-01-30 23:27:37 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2024-05-23 21:44:31 +00:00
|
|
|
bundle, err = keys[receipt.Sender].bundle, keys[receipt.Sender].err
|
2022-01-30 23:27:37 +00:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("failed to fetch prekeys: %w", err)
|
|
|
|
} else if bundle == nil {
|
2024-05-23 21:44:31 +00:00
|
|
|
return fmt.Errorf("didn't get prekey bundle for %s (response size: %d)", receipt.Sender, len(keys))
|
2022-01-30 23:27:37 +00:00
|
|
|
}
|
|
|
|
}
|
2023-08-05 18:43:19 +00:00
|
|
|
encAttrs := waBinary.Attrs{}
|
2024-05-23 21:44:31 +00:00
|
|
|
var msgAttrs messageAttrs
|
|
|
|
if msg.wa != nil {
|
|
|
|
msgAttrs.MediaType = getMediaTypeFromMessage(msg.wa)
|
|
|
|
msgAttrs.Type = getTypeFromMessage(msg.wa)
|
|
|
|
} else if fbConsumerMsg != nil {
|
|
|
|
msgAttrs = getAttrsFromFBMessage(fbConsumerMsg)
|
|
|
|
} else {
|
|
|
|
msgAttrs.Type = "text"
|
|
|
|
}
|
|
|
|
if msgAttrs.MediaType != "" {
|
|
|
|
encAttrs["mediatype"] = msgAttrs.MediaType
|
|
|
|
}
|
|
|
|
var encrypted *waBinary.Node
|
|
|
|
var includeDeviceIdentity bool
|
|
|
|
if msg.wa != nil {
|
|
|
|
encrypted, includeDeviceIdentity, err = cli.encryptMessageForDevice(plaintext, receipt.Sender, bundle, encAttrs)
|
|
|
|
} else {
|
|
|
|
encrypted, err = cli.encryptMessageForDeviceV3(&waMsgTransport.MessageTransport_Payload{
|
|
|
|
ApplicationPayload: &waCommon.SubProtocol{
|
|
|
|
Payload: plaintext,
|
|
|
|
Version: FBMessageApplicationVersion,
|
|
|
|
},
|
|
|
|
FutureProof: waCommon.FutureProofBehavior_PLACEHOLDER,
|
|
|
|
}, fbSKDM, fbDSM, receipt.Sender, bundle, encAttrs)
|
2023-08-05 18:43:19 +00:00
|
|
|
}
|
2022-01-30 23:27:37 +00:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("failed to encrypt message for retry: %w", err)
|
|
|
|
}
|
|
|
|
encrypted.Attrs["count"] = retryCount
|
|
|
|
|
|
|
|
attrs := waBinary.Attrs{
|
|
|
|
"to": node.Attrs["from"],
|
2024-05-23 21:44:31 +00:00
|
|
|
"type": msgAttrs.Type,
|
2022-01-30 23:27:37 +00:00
|
|
|
"id": messageID,
|
|
|
|
"t": timestamp.Unix(),
|
|
|
|
}
|
2022-05-09 21:00:23 +00:00
|
|
|
if !receipt.IsGroup {
|
|
|
|
attrs["device_fanout"] = false
|
|
|
|
}
|
2022-01-30 23:27:37 +00:00
|
|
|
if participant, ok := node.Attrs["participant"]; ok {
|
|
|
|
attrs["participant"] = participant
|
|
|
|
}
|
|
|
|
if recipient, ok := node.Attrs["recipient"]; ok {
|
|
|
|
attrs["recipient"] = recipient
|
|
|
|
}
|
|
|
|
if edit, ok := node.Attrs["edit"]; ok {
|
|
|
|
attrs["edit"] = edit
|
|
|
|
}
|
2024-05-23 21:44:31 +00:00
|
|
|
var content []waBinary.Node
|
|
|
|
if msg.wa != nil {
|
|
|
|
content = cli.getMessageContent(*encrypted, msg.wa, attrs, includeDeviceIdentity)
|
|
|
|
} else {
|
|
|
|
content = []waBinary.Node{
|
|
|
|
*encrypted,
|
|
|
|
{Tag: "franking", Content: []waBinary.Node{{Tag: "franking_tag", Content: frankingTag}}},
|
|
|
|
}
|
|
|
|
}
|
2022-06-11 21:07:42 +00:00
|
|
|
err = cli.sendNode(waBinary.Node{
|
|
|
|
Tag: "message",
|
|
|
|
Attrs: attrs,
|
2024-05-23 21:44:31 +00:00
|
|
|
Content: content,
|
2022-06-11 21:07:42 +00:00
|
|
|
})
|
2022-01-30 23:27:37 +00:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("failed to send retry message: %w", err)
|
|
|
|
}
|
|
|
|
cli.Log.Debugf("Sent retry #%d for %s/%s to %s", retryCount, receipt.Chat, messageID, receipt.Sender)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2023-08-05 18:43:19 +00:00
|
|
|
func (cli *Client) cancelDelayedRequestFromPhone(msgID types.MessageID) {
|
2024-05-23 21:44:31 +00:00
|
|
|
if !cli.AutomaticMessageRerequestFromPhone || cli.MessengerConfig != nil {
|
2023-08-05 18:43:19 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
cli.pendingPhoneRerequestsLock.RLock()
|
|
|
|
cancelPendingRequest, ok := cli.pendingPhoneRerequests[msgID]
|
|
|
|
if ok {
|
|
|
|
cancelPendingRequest()
|
|
|
|
}
|
|
|
|
cli.pendingPhoneRerequestsLock.RUnlock()
|
|
|
|
}
|
|
|
|
|
|
|
|
// RequestFromPhoneDelay specifies how long to wait for the sender to resend the message before requesting from your phone.
|
|
|
|
// This is only used if Client.AutomaticMessageRerequestFromPhone is true.
|
|
|
|
var RequestFromPhoneDelay = 5 * time.Second
|
|
|
|
|
|
|
|
func (cli *Client) delayedRequestMessageFromPhone(info *types.MessageInfo) {
|
2024-05-23 21:44:31 +00:00
|
|
|
if !cli.AutomaticMessageRerequestFromPhone || cli.MessengerConfig != nil {
|
2023-08-05 18:43:19 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
cli.pendingPhoneRerequestsLock.Lock()
|
|
|
|
_, alreadyRequesting := cli.pendingPhoneRerequests[info.ID]
|
|
|
|
if alreadyRequesting {
|
|
|
|
cli.pendingPhoneRerequestsLock.Unlock()
|
|
|
|
return
|
|
|
|
}
|
|
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
|
|
defer cancel()
|
|
|
|
cli.pendingPhoneRerequests[info.ID] = cancel
|
|
|
|
cli.pendingPhoneRerequestsLock.Unlock()
|
|
|
|
|
|
|
|
defer func() {
|
|
|
|
cli.pendingPhoneRerequestsLock.Lock()
|
|
|
|
delete(cli.pendingPhoneRerequests, info.ID)
|
|
|
|
cli.pendingPhoneRerequestsLock.Unlock()
|
|
|
|
}()
|
|
|
|
select {
|
|
|
|
case <-time.After(RequestFromPhoneDelay):
|
|
|
|
case <-ctx.Done():
|
|
|
|
cli.Log.Debugf("Cancelled delayed request for message %s from phone", info.ID)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
_, err := cli.SendMessage(
|
|
|
|
ctx,
|
2024-05-23 21:44:31 +00:00
|
|
|
cli.getOwnID().ToNonAD(),
|
2023-08-05 18:43:19 +00:00
|
|
|
cli.BuildUnavailableMessageRequest(info.Chat, info.Sender, info.ID),
|
|
|
|
SendRequestExtra{Peer: true},
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
cli.Log.Warnf("Failed to send request for unavailable message %s to phone: %v", info.ID, err)
|
|
|
|
} else {
|
|
|
|
cli.Log.Debugf("Requested message %s from phone", info.ID)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-01-30 23:27:37 +00:00
|
|
|
// sendRetryReceipt sends a retry receipt for an incoming message.
|
2023-08-05 18:43:19 +00:00
|
|
|
func (cli *Client) sendRetryReceipt(node *waBinary.Node, info *types.MessageInfo, forceIncludeIdentity bool) {
|
2022-01-30 23:27:37 +00:00
|
|
|
id, _ := node.Attrs["id"].(string)
|
|
|
|
children := node.GetChildren()
|
|
|
|
var retryCountInMsg int
|
|
|
|
if len(children) == 1 && children[0].Tag == "enc" {
|
|
|
|
retryCountInMsg = children[0].AttrGetter().OptionalInt("count")
|
|
|
|
}
|
|
|
|
|
|
|
|
cli.messageRetriesLock.Lock()
|
|
|
|
cli.messageRetries[id]++
|
|
|
|
retryCount := cli.messageRetries[id]
|
|
|
|
// In case the message is a retry response, and we restarted in between, find the count from the message
|
|
|
|
if retryCount == 1 && retryCountInMsg > 0 {
|
|
|
|
retryCount = retryCountInMsg + 1
|
|
|
|
cli.messageRetries[id] = retryCount
|
|
|
|
}
|
|
|
|
cli.messageRetriesLock.Unlock()
|
|
|
|
if retryCount >= 5 {
|
|
|
|
cli.Log.Warnf("Not sending any more retry receipts for %s", id)
|
|
|
|
return
|
|
|
|
}
|
2023-08-05 18:43:19 +00:00
|
|
|
if retryCount == 1 {
|
|
|
|
go cli.delayedRequestMessageFromPhone(info)
|
|
|
|
}
|
2022-01-30 23:27:37 +00:00
|
|
|
|
|
|
|
var registrationIDBytes [4]byte
|
|
|
|
binary.BigEndian.PutUint32(registrationIDBytes[:], cli.Store.RegistrationID)
|
|
|
|
attrs := waBinary.Attrs{
|
|
|
|
"id": id,
|
|
|
|
"type": "retry",
|
|
|
|
"to": node.Attrs["from"],
|
|
|
|
}
|
|
|
|
if recipient, ok := node.Attrs["recipient"]; ok {
|
|
|
|
attrs["recipient"] = recipient
|
|
|
|
}
|
|
|
|
if participant, ok := node.Attrs["participant"]; ok {
|
|
|
|
attrs["participant"] = participant
|
|
|
|
}
|
|
|
|
payload := waBinary.Node{
|
|
|
|
Tag: "receipt",
|
|
|
|
Attrs: attrs,
|
|
|
|
Content: []waBinary.Node{
|
|
|
|
{Tag: "retry", Attrs: waBinary.Attrs{
|
|
|
|
"count": retryCount,
|
|
|
|
"id": id,
|
|
|
|
"t": node.Attrs["t"],
|
|
|
|
"v": 1,
|
|
|
|
}},
|
|
|
|
{Tag: "registration", Content: registrationIDBytes[:]},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
if retryCount > 1 || forceIncludeIdentity {
|
|
|
|
if key, err := cli.Store.PreKeys.GenOnePreKey(); err != nil {
|
|
|
|
cli.Log.Errorf("Failed to get prekey for retry receipt: %v", err)
|
|
|
|
} else if deviceIdentity, err := proto.Marshal(cli.Store.Account); err != nil {
|
|
|
|
cli.Log.Errorf("Failed to marshal account info: %v", err)
|
|
|
|
return
|
|
|
|
} else {
|
|
|
|
payload.Content = append(payload.GetChildren(), waBinary.Node{
|
|
|
|
Tag: "keys",
|
|
|
|
Content: []waBinary.Node{
|
|
|
|
{Tag: "type", Content: []byte{ecc.DjbType}},
|
|
|
|
{Tag: "identity", Content: cli.Store.IdentityKey.Pub[:]},
|
|
|
|
preKeyToNode(key),
|
|
|
|
preKeyToNode(cli.Store.SignedPreKey),
|
|
|
|
{Tag: "device-identity", Content: deviceIdentity},
|
|
|
|
},
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
err := cli.sendNode(payload)
|
|
|
|
if err != nil {
|
|
|
|
cli.Log.Errorf("Failed to send retry receipt for %s: %v", id, err)
|
|
|
|
}
|
|
|
|
}
|