summaryrefslogtreecommitdiffstats
path: root/vendor/github.com/Rhymen/go-whatsapp/read.go
diff options
context:
space:
mode:
authorWim <wim@42.be>2022-01-31 00:27:37 +0100
committerWim <wim@42.be>2022-03-20 14:57:48 +0100
commite3cafeaf9292f67459ff1d186f68283bfaedf2ae (patch)
treeb69c39620aa91dba695b3b935c6651c0fb37ce75 /vendor/github.com/Rhymen/go-whatsapp/read.go
parente7b193788a56ee7cdb02a87a9db0ad6724ef66d5 (diff)
downloadmatterbridge-msglm-e3cafeaf9292f67459ff1d186f68283bfaedf2ae.tar.gz
matterbridge-msglm-e3cafeaf9292f67459ff1d186f68283bfaedf2ae.tar.bz2
matterbridge-msglm-e3cafeaf9292f67459ff1d186f68283bfaedf2ae.zip
Add dependencies/vendor (whatsapp)
Diffstat (limited to 'vendor/github.com/Rhymen/go-whatsapp/read.go')
-rw-r--r--vendor/github.com/Rhymen/go-whatsapp/read.go142
1 files changed, 0 insertions, 142 deletions
diff --git a/vendor/github.com/Rhymen/go-whatsapp/read.go b/vendor/github.com/Rhymen/go-whatsapp/read.go
deleted file mode 100644
index a69147a6..00000000
--- a/vendor/github.com/Rhymen/go-whatsapp/read.go
+++ /dev/null
@@ -1,142 +0,0 @@
-package whatsapp
-
-import (
- "crypto/hmac"
- "crypto/sha256"
- "encoding/json"
- "fmt"
- "io"
- "io/ioutil"
- "net/http"
- "strings"
-
- "github.com/Rhymen/go-whatsapp/binary"
- "github.com/Rhymen/go-whatsapp/crypto/cbc"
- "github.com/gorilla/websocket"
- "github.com/pkg/errors"
-)
-
-func (wac *Conn) readPump() {
- defer func() {
- wac.wg.Done()
- _, _ = wac.Disconnect()
- }()
-
- var readErr error
- var msgType int
- var reader io.Reader
-
- for {
- readerFound := make(chan struct{})
- go func() {
- if wac.ws != nil {
- msgType, reader, readErr = wac.ws.conn.NextReader()
- }
- close(readerFound)
- }()
- select {
- case <-readerFound:
- if readErr != nil {
- wac.handle(&ErrConnectionFailed{Err: readErr})
- return
- }
- msg, err := ioutil.ReadAll(reader)
- if err != nil {
- wac.handle(errors.Wrap(err, "error reading message from Reader"))
- continue
- }
- err = wac.processReadData(msgType, msg)
- if err != nil {
- wac.handle(errors.Wrap(err, "error processing data"))
- }
- case <-wac.ws.close:
- return
- }
- }
-}
-
-func (wac *Conn) processReadData(msgType int, msg []byte) error {
- data := strings.SplitN(string(msg), ",", 2)
-
- if data[0][0] == '!' { //Keep-Alive Timestamp
- data = append(data, data[0][1:]) //data[1]
- data[0] = "!"
- }
-
- if len(data) == 2 && len(data[1]) == 0 {
- return nil
- }
-
- if len(data) != 2 || len(data[1]) == 0 {
- return ErrInvalidWsData
- }
-
- wac.listener.RLock()
- listener, hasListener := wac.listener.m[data[0]]
- wac.listener.RUnlock()
-
- if hasListener {
- // listener only exists for TextMessages query messages out of contact.go
- // If these binary query messages can be handled another way,
- // then the TextMessages, which are all JSON encoded, can directly
- // be unmarshalled. The listener chan could then be changed from type
- // chan string to something like chan map[string]interface{}. The unmarshalling
- // in several places, especially in session.go, would then be gone.
- listener <- data[1]
- close(listener)
- wac.removeListener(data[0])
- } else if msgType == websocket.BinaryMessage {
- wac.loginSessionLock.RLock()
- sess := wac.session
- wac.loginSessionLock.RUnlock()
- if sess == nil || sess.MacKey == nil || sess.EncKey == nil {
- return ErrInvalidWsState
- }
- message, err := wac.decryptBinaryMessage([]byte(data[1]))
- if err != nil {
- return errors.Wrap(err, "error decoding binary")
- }
- wac.dispatch(message)
- } else { //RAW json status updates
- wac.handle(string(data[1]))
- }
- return nil
-}
-
-func (wac *Conn) decryptBinaryMessage(msg []byte) (*binary.Node, error) {
- //message validation
- h2 := hmac.New(sha256.New, wac.session.MacKey)
- if len(msg) < 33 {
- var response struct {
- Status int `json:"status"`
- }
-
- if err := json.Unmarshal(msg, &response); err == nil {
- if response.Status == http.StatusNotFound {
- return nil, ErrServerRespondedWith404
- }
- return nil, errors.New(fmt.Sprintf("server responded with %d", response.Status))
- }
-
- return nil, ErrInvalidServerResponse
-
- }
- h2.Write([]byte(msg[32:]))
- if !hmac.Equal(h2.Sum(nil), msg[:32]) {
- return nil, ErrInvalidHmac
- }
-
- // message decrypt
- d, err := cbc.Decrypt(wac.session.EncKey, nil, msg[32:])
- if err != nil {
- return nil, errors.Wrap(err, "decrypting message with AES-CBC failed")
- }
-
- // message unmarshal
- message, err := binary.Unmarshal(d)
- if err != nil {
- return nil, errors.Wrap(err, "could not decode binary")
- }
-
- return message, nil
-}