Newer
Older
WeComCompanyPlugin / crypto.js
import { createCipheriv, createDecipheriv, randomBytes, createHash } from "node:crypto";
import { logger } from "./logger.js";
import { CONSTANTS } from "./utils.js";

/**
 * Enterprise WeChat Intelligent Robot Crypto Implementation
 * Supports both AI Bot mode (no corpId validation) and Self-Built App mode (with corpId validation)
 */
export class WecomCrypto {
  token;
  encodingAesKey;
  aesKey;
  iv;
  corpId; // Added for Self-Built App mode

  constructor(token, encodingAesKey, corpId) { // corpId is now an optional parameter
    if (!encodingAesKey || encodingAesKey.length !== CONSTANTS.AES_KEY_LENGTH) {
      throw new Error(`EncodingAESKey invalid: length must be ${CONSTANTS.AES_KEY_LENGTH}`);
    }
    if (!token) {
      throw new Error("Token is required");
    }
    this.token = token;
    this.encodingAesKey = encodingAesKey;
    this.aesKey = Buffer.from(encodingAesKey + "=", "base64");
    this.iv = this.aesKey.subarray(0, 16);
    this.corpId = corpId; // Store corpId if provided

    // Update debug message to reflect mode
    logger.debug(`WecomCrypto initialized (Mode: ${corpId ? 'Self-Built App' : 'AI Bot'})`);
  }

  getSignature(timestamp, nonce, encrypt) {
    const shasum = createHash("sha1");
    // WeCom requires plain lexicographic sorting before SHA1; localeCompare is locale-sensitive.
    const sorted = [this.token, timestamp, nonce, encrypt]
      .map((value) => String(value))
      .toSorted();
    shasum.update(sorted.join(""));
    return shasum.digest("hex");
  }

  decrypt(text) {
    let decipher;
    try {
      decipher = createDecipheriv("aes-256-cbc", this.aesKey, this.iv);
      decipher.setAutoPadding(false);
    } catch (e) {
      throw new Error(`Decrypt init failed: ${String(e)}`, { cause: e });
    }

    let deciphered = Buffer.concat([decipher.update(text, "base64"), decipher.final()]);
    deciphered = this.decodePkcs7(deciphered);

    // Format: 16 random bytes | 4 bytes msg_len | msg_content | corpId
    const content = deciphered.subarray(16);
    const lenList = content.subarray(0, 4);
    const xmlLen = lenList.readUInt32BE(0);
    const xmlContent = content.subarray(4, 4 + xmlLen).toString("utf-8");

    const extractedCorpId = content.subarray(4 + xmlLen).toString("utf-8");

    // If corpId is provided in the constructor, validate it
    if (this.corpId && this.corpId !== extractedCorpId) {
      throw new Error(`CorpID mismatch: Expected ${this.corpId}, got ${extractedCorpId}`);
    }

    // Return corpId along with the message
    return { message: xmlContent, corpId: extractedCorpId };
  }

  encrypt(text) {
    const random16 = randomBytes(16);
    const msgBuffer = Buffer.from(text);
    const lenBuffer = Buffer.alloc(4);
    lenBuffer.writeUInt32BE(msgBuffer.length, 0);

    // Include corpId (receiveid) in the raw message if available
    const corpIdBuffer = this.corpId ? Buffer.from(this.corpId) : Buffer.from('');
    const rawMsg = Buffer.concat([random16, lenBuffer, msgBuffer, corpIdBuffer]);

    const encoded = this.encodePkcs7(rawMsg);
    const cipher = createCipheriv("aes-256-cbc", this.aesKey, this.iv);
    cipher.setAutoPadding(false);
    const ciphered = Buffer.concat([cipher.update(encoded), cipher.final()]);
    return ciphered.toString("base64");
  }

  encodePkcs7(buff) {
    const blockSize = CONSTANTS.AES_BLOCK_SIZE;
    const amountToPad = blockSize - (buff.length % blockSize);
    const pad = Buffer.alloc(amountToPad, amountToPad);
    return Buffer.concat([buff, pad]);
  }

  decodePkcs7(buff) {
    const pad = buff[buff.length - 1];
    if (pad < 1 || pad > CONSTANTS.AES_BLOCK_SIZE) {
      throw new Error(`Invalid PKCS7 padding: ${pad}`);
    }
    for (let i = buff.length - pad; i < buff.length; i++) {
      if (buff[i] !== pad) {
        throw new Error("Invalid PKCS7 padding: inconsistent padding bytes");
      }
    }
    return buff.subarray(0, buff.length - pad);
  }

  /**
   * Decrypt image/media file from Enterprise WeChat.
   * Images are encrypted with AES-256-CBC using the same key as messages.
   * Note: WeCom uses PKCS7 padding to 32-byte blocks (not standard 16-byte).
   * @param {Buffer} encryptedData - The encrypted image data (raw bytes, not base64)
   * @returns {Buffer} - Decrypted image data
   */
  decryptMedia(encryptedData) {
    const decipher = createDecipheriv("aes-256-cbc", this.aesKey, this.iv);
    decipher.setAutoPadding(false);
    const decrypted = Buffer.concat([
      decipher.update(encryptedData),
      decipher.final(),
    ]);

    // Remove PKCS7 padding manually (padded to 32-byte blocks).
    const padLen = decrypted[decrypted.length - 1];
    let unpadded = decrypted;
    if (padLen >= 1 && padLen <= 32) {
      let validPadding = true;
      for (let i = decrypted.length - padLen; i < decrypted.length; i++) {
        if (decrypted[i] !== padLen) {
          validPadding = false;
          break;
        }
      }
      if (validPadding) {
        unpadded = decrypted.subarray(0, decrypted.length - padLen);
      }
    }

    logger.debug("Media decrypted successfully", {
      inputSize: encryptedData.length,
      outputSize: unpadded.length,
    });
    return unpadded;
  }
}