using System; using System.Buffers.Binary; using System.Collections.Generic; using System.ComponentModel; using System.Globalization; using System.IO; using System.Linq; using System.Net; using System.Net.Sockets; using System.Reflection; using System.Security.Cryptography; using System.Text; using System.Threading; using System.Threading.Tasks; using TL; using static WTelegram.Encryption; // necessary for .NET Standard 2.0 compilation: #pragma warning disable CA1835 // Prefer the 'Memory'-based overloads for 'ReadAsync' and 'WriteAsync' namespace WTelegram { public class Client : IDisposable { /// This event will be called when an unsollicited update/message is sent by Telegram servers /// See Examples/Program_ListenUpdate.cs for how to use this public event Action Update; public delegate Task TcpFactory(string address, int port); /// Used to create a TcpClient connected to the given address/port, or throw an exception on failure public TcpFactory TcpHandler = DefaultTcpHandler; /// Telegram configuration, obtained at connection time public Config TLConfig { get; private set; } /// Number of automatic reconnections on connection/reactor failure public int MaxAutoReconnects { get; set; } = 5; /// Number of seconds under which an error 420 FLOOD_WAIT_X will not be raised and your request will instead be auto-retried after the delay public int FloodRetryThreshold { get; set; } = 60; /// Number of seconds between each keep-alive ping. Increase this if you have a slow connection public int PingInterval { get; set; } = 60; /// Is this Client instance the main or a secondary DC session public bool IsMainDC => (_dcSession?.DataCenter?.id ?? 0) == _session.MainDC; /// Has this Client established connection been disconnected? public bool Disconnected => _tcpClient != null && !(_tcpClient.Client?.Connected ?? false); /// Used to indicate progression of file download/upload /// total size of file in bytes, or 0 if unknown public delegate void ProgressCallback(long transmitted, long totalSize); private readonly Func _config; private readonly int _apiId; private readonly string _apiHash; private readonly Session _session; private Session.DCSession _dcSession; private static readonly byte[] IntermediateHeader = new byte[4] { 0xee, 0xee, 0xee, 0xee }; private TcpClient _tcpClient; private NetworkStream _networkStream; private IObject _lastSentMsg; private long _lastRecvMsgId; private readonly List _msgsToAck = new(); private readonly Random _random = new(); private int _saltChangeCounter; private Task _reactorTask; private long _bareRequest; private readonly Dictionary tcs)> _pendingRequests = new(); private SemaphoreSlim _sendSemaphore = new(0); private readonly SemaphoreSlim _semaphore = new(1); private Task _connecting; private CancellationTokenSource _cts; private int _reactorReconnects = 0; private const int FilePartSize = 512 * 1024; private const string ConnectionShutDown = "Could not read payload length : Connection shut down"; private readonly SemaphoreSlim _parallelTransfers = new(10); // max parallel part uploads/downloads #if MTPROTO1 private readonly SHA1 _sha1 = SHA1.Create(); private readonly SHA1 _sha1Recv = SHA1.Create(); #else private readonly SHA256 _sha256 = SHA256.Create(); private readonly SHA256 _sha256Recv = SHA256.Create(); #endif /// Welcome to WTelegramClient! 🙂 /// Config callback, is queried for: api_id, api_hash, session_pathname public Client(Func configProvider = null) { _config = configProvider ?? DefaultConfigOrAsk; _apiId = int.Parse(Config("api_id")); _apiHash = Config("api_hash"); _session = Session.LoadOrCreate(Config("session_pathname"), Convert.FromHexString(_apiHash)); if (_session.MainDC != 0) _session.DCSessions.TryGetValue(_session.MainDC, out _dcSession); _dcSession ??= new() { Id = Helpers.RandomLong() }; _dcSession.Client = this; var version = Assembly.GetExecutingAssembly().GetCustomAttribute().InformationalVersion; Helpers.Log(1, $"WTelegramClient {version[..version.IndexOf('+')]} running under {System.Runtime.InteropServices.RuntimeInformation.FrameworkDescription}"); } private Client(Client cloneOf, Session.DCSession dcSession) { _config = cloneOf._config; _apiId = cloneOf._apiId; _apiHash = cloneOf._apiHash; _session = cloneOf._session; _dcSession = dcSession; } internal Task ConfigAsync(string what) => Task.Run(() => Config(what)); internal string Config(string what) => _config(what) ?? DefaultConfig(what) ?? throw new ApplicationException("You must provide a config value for " + what); /// Default config values, used if your Config callback returns public static string DefaultConfig(string what) => what switch { "session_pathname" => Path.Combine( Path.GetDirectoryName(Path.GetDirectoryName(AppDomain.CurrentDomain.BaseDirectory.TrimEnd(Path.DirectorySeparatorChar))), "WTelegram.session"), #if DEBUG "server_address" => "149.154.167.40:443", #else "server_address" => "149.154.167.50:443", #endif "device_model" => Environment.Is64BitOperatingSystem ? "PC 64bit" : "PC 32bit", "system_version" => System.Runtime.InteropServices.RuntimeInformation.OSDescription, "app_version" => (Assembly.GetEntryAssembly() ?? AppDomain.CurrentDomain.GetAssemblies().FirstOrDefault(a => a.EntryPoint != null))?.GetName().Version.ToString() ?? "0.0", "system_lang_code" => CultureInfo.InstalledUICulture.TwoLetterISOLanguageName, "lang_pack" => "", "lang_code" => CultureInfo.CurrentUICulture.TwoLetterISOLanguageName, "user_id" => "-1", "verification_code" or "password" => AskConfig(what), _ => null // api_id api_hash phone_number... it's up to you to reply to these correctly }; internal static string DefaultConfigOrAsk(string config) => DefaultConfig(config) ?? AskConfig(config); private static string AskConfig(string config) { if (config == "api_id") Console.WriteLine("Welcome! You can obtain your api_id/api_hash at https://my.telegram.org/apps"); Console.Write($"Enter {config.Replace('_', ' ')}: "); return Console.ReadLine(); } /// Load a specific Telegram server public key /// A string starting with -----BEGIN RSA PUBLIC KEY----- public static void LoadPublicKey(string pem) => Encryption.LoadPublicKey(pem); /// Builds a structure that is used to validate a 2FA password /// Password validation configuration. You can obtain this though an Update event as part of the login process /// The password to validate public static Task InputCheckPassword(Account_Password accountPassword, string password) => Check2FA(accountPassword, () => Task.FromResult(password)); public void Dispose() { Helpers.Log(2, $"{_dcSession.DcID}>Disposing the client"); Reset(false, IsMainDC); GC.SuppressFinalize(this); } /// Disconnect from Telegram (shouldn't be needed in normal usage) /// Forget about logged-in user /// Disconnect secondary sessions with other DCs public void Reset(bool resetUser = true, bool resetSessions = true) { try { if (CheckMsgsToAck() is MsgsAck msgsAck) SendAsync(msgsAck, false).Wait(1000); } catch (Exception) { } _cts?.Cancel(); _sendSemaphore = new(0); _reactorTask = null; _tcpClient?.Dispose(); _connecting = null; if (resetSessions) { foreach (var altSession in _session.DCSessions.Values) if (altSession.Client != null && altSession.Client != this) { altSession.Client.Dispose(); altSession.Client = null; } } if (resetUser) _session.UserId = 0; } /// Establish connection to Telegram servers /// Config callback is queried for: server_address /// Most methods of this class are async (Task), so please use public async Task ConnectAsync() { lock (this) _connecting ??= DoConnectAsync(); await _connecting; } static async Task DefaultTcpHandler(string host, int port) { var tcpClient = new TcpClient(); try { await tcpClient.ConnectAsync(host, port); } catch (Exception) { tcpClient.Dispose(); throw; } return tcpClient; } private async Task DoConnectAsync() { var endpoint = _dcSession?.EndPoint ?? Compat.IPEndPoint_Parse(Config("server_address")); Helpers.Log(2, $"Connecting to {endpoint}..."); TcpClient tcpClient = null; try { try { tcpClient = await TcpHandler(endpoint.Address.ToString(), endpoint.Port); } catch (SocketException ex) // cannot connect to target endpoint, try to find an alternate { Helpers.Log(4, $"SocketException {ex.SocketErrorCode} ({ex.ErrorCode}): {ex.Message}"); if (_dcSession?.DataCenter == null) throw; var triedEndpoints = new HashSet { endpoint }; if (_session.DcOptions != null) { var altOptions = _session.DcOptions.Where(dco => dco.id == _dcSession.DataCenter.id && dco.flags != _dcSession.DataCenter.flags && (dco.flags & (DcOption.Flags.cdn | DcOption.Flags.tcpo_only | DcOption.Flags.media_only)) == 0) .OrderBy(dco => dco.flags); // try alternate addresses for this DC foreach (var dcOption in altOptions) { endpoint = new(IPAddress.Parse(dcOption.ip_address), dcOption.port); if (!triedEndpoints.Add(endpoint)) continue; Helpers.Log(2, $"Connecting to {endpoint}..."); try { tcpClient = await TcpHandler(endpoint.Address.ToString(), endpoint.Port); _dcSession.DataCenter = dcOption; break; } catch (SocketException) { } } } if (tcpClient == null) { endpoint = Compat.IPEndPoint_Parse(Config("server_address")); // re-ask callback for an address if (!triedEndpoints.Add(endpoint)) throw; _dcSession.Client = null; // is it address for a known DCSession? _dcSession = _session.DCSessions.Values.FirstOrDefault(dcs => dcs.EndPoint.Equals(endpoint)); _dcSession ??= new() { Id = Helpers.RandomLong() }; _dcSession.Client = this; Helpers.Log(2, $"Connecting to {endpoint}..."); tcpClient = await TcpHandler(endpoint.Address.ToString(), endpoint.Port); } } } catch (Exception) { tcpClient?.Dispose(); throw; } _tcpClient = tcpClient; _networkStream = tcpClient.GetStream(); await _networkStream.WriteAsync(IntermediateHeader, 0, 4); _cts = new(); _saltChangeCounter = 0; _reactorTask = Reactor(_networkStream, _cts); _sendSemaphore.Release(); try { if (_dcSession.AuthKeyID == 0) await CreateAuthorizationKey(this, _dcSession); var keepAliveTask = KeepAlive(_cts.Token); TLConfig = await this.InvokeWithLayer(Layer.Version, new TL.Methods.InitConnection { api_id = _apiId, device_model = Config("device_model"), system_version = Config("system_version"), app_version = Config("app_version"), system_lang_code = Config("system_lang_code"), lang_pack = Config("lang_pack"), lang_code = Config("lang_code"), query = new TL.Methods.Help_GetConfig() }); _session.DcOptions = TLConfig.dc_options; _saltChangeCounter = 0; if (_dcSession.DataCenter == null) { _dcSession.DataCenter = _session.DcOptions.Where(dc => dc.id == TLConfig.this_dc) .OrderByDescending(dc => dc.ip_address == endpoint.Address.ToString()) .ThenByDescending(dc => dc.port == endpoint.Port).First(); _session.DCSessions[TLConfig.this_dc] = _dcSession; } if (_session.MainDC == 0) _session.MainDC = TLConfig.this_dc; } finally { _session.Save(); } Helpers.Log(2, $"Connected to {(TLConfig.test_mode ? "Test DC" : "DC")} {TLConfig.this_dc}... {TLConfig.flags & (Config.Flags)~0xE00}"); } /// Obtain/create a Client for a secondary session on a specific Data Center /// ID of the Data Center /// Session will be used only for transferring media /// Connect immediately /// public async Task GetClientForDC(int dcId, bool media_only = true, bool connect = true) { if (_dcSession.DataCenter?.id == dcId) return this; Session.DCSession altSession; lock (_session) { altSession = GetOrCreateDCSession(dcId, _dcSession.DataCenter.flags | (media_only ? DcOption.Flags.media_only : 0)); if (altSession.Client?.Disconnected ?? false) { altSession.Client.Dispose(); altSession.Client = null; } altSession.Client ??= new Client(this, altSession); } Helpers.Log(2, $"Requested connection to DC {dcId}..."); if (connect) { await _semaphore.WaitAsync(); try { Auth_ExportedAuthorization exported = null; if (_session.UserId != 0 && IsMainDC && altSession.UserId != _session.UserId) exported = await this.Auth_ExportAuthorization(dcId); await altSession.Client.ConnectAsync(); if (exported != null) { var authorization = await altSession.Client.Auth_ImportAuthorization(exported.id, exported.bytes); if (authorization is not Auth_Authorization { user: User user }) throw new ApplicationException("Failed to get Authorization: " + authorization.GetType().Name); altSession.UserId = user.id; } } finally { _semaphore.Release(); } } return altSession.Client; } private Session.DCSession GetOrCreateDCSession(int dcId, DcOption.Flags flags) { if (_session.DCSessions.TryGetValue(dcId, out var dcSession)) if (dcSession.Client != null || dcSession.DataCenter.flags == flags) return dcSession; // if we have already a session with this DC and we are connected or it is a perfect match, use it // try to find the most appropriate DcOption for this DC if ((dcSession?.AuthKeyID ?? 0) == 0) // we will need to negociate an AuthKey => can't use media_only DC flags &= ~DcOption.Flags.media_only; var dcOptions = _session.DcOptions.Where(dc => dc.id == dcId).OrderBy(dc => dc.flags ^ flags); var dcOption = dcOptions.FirstOrDefault() ?? throw new ApplicationException($"Could not find adequate dc_option for DC {dcId}"); dcSession ??= new Session.DCSession { Id = Helpers.RandomLong() }; // create new session only if not already existing dcSession.DataCenter = dcOption; return _session.DCSessions[dcId] = dcSession; } internal DateTime MsgIdToStamp(long serverMsgId) => new((serverMsgId >> 32) * 10000000 - _dcSession.ServerTicksOffset + 621355968000000000L, DateTimeKind.Utc); internal (long msgId, int seqno) NewMsgId(bool isContent) { int seqno; long msgId = DateTime.UtcNow.Ticks + _dcSession.ServerTicksOffset - 621355968000000000L; msgId = msgId * 428 + (msgId >> 24) * 25110956; // approximately unixtime*2^32 and divisible by 4 lock (_session) { if (msgId <= _dcSession.LastSentMsgId) msgId = _dcSession.LastSentMsgId += 4; else _dcSession.LastSentMsgId = msgId; seqno = isContent ? _dcSession.Seqno++ * 2 + 1 : _dcSession.Seqno * 2; _session.Save(); } return (msgId, seqno); } private async Task KeepAlive(CancellationToken ct) { int ping_id = _random.Next(); while (!ct.IsCancellationRequested) { await Task.Delay(PingInterval * 1000, ct); if (_saltChangeCounter > 0) --_saltChangeCounter; #if DEBUG await this.PingDelayDisconnect(ping_id++, PingInterval * 5); #else await this.PingDelayDisconnect(ping_id++, PingInterval * 5 / 4); #endif } } private async Task Reactor(NetworkStream stream, CancellationTokenSource cts) { const int MinBufferSize = 1024; var data = new byte[MinBufferSize]; while (!cts.IsCancellationRequested) { IObject obj = null; try { if (await FullReadAsync(stream, data, 4, cts.Token) != 4) throw new ApplicationException(ConnectionShutDown); int payloadLen = BinaryPrimitives.ReadInt32LittleEndian(data); if (payloadLen > data.Length) data = new byte[payloadLen]; else if (Math.Max(payloadLen, MinBufferSize) < data.Length / 4) data = new byte[Math.Max(payloadLen, MinBufferSize)]; if (await FullReadAsync(stream, data, payloadLen, cts.Token) != payloadLen) throw new ApplicationException("Could not read frame data : Connection shut down"); obj = ReadFrame(data, payloadLen); } catch (Exception ex) // an exception in RecvAsync is always fatal { if (cts.IsCancellationRequested) return; Helpers.Log(5, $"{_dcSession.DcID}>An exception occured in the reactor: {ex}"); var oldSemaphore = _sendSemaphore; await oldSemaphore.WaitAsync(cts.Token); // prevent any sending while we reconnect var reactorError = new ReactorError { Exception = ex }; try { lock (_msgsToAck) _msgsToAck.Clear(); Reset(false, false); _reactorReconnects = (_reactorReconnects + 1) % MaxAutoReconnects; if (!IsMainDC && _pendingRequests.Count <= 1 && ex is ApplicationException { Message: ConnectionShutDown } or IOException { InnerException: SocketException }) if (_pendingRequests.Values.FirstOrDefault() is var (type, tcs) && (type is null || type == typeof(Pong))) _reactorReconnects = 0; if (_reactorReconnects != 0) { await Task.Delay(5000); await ConnectAsync(); // start a new reactor after 5 secs lock (_pendingRequests) // retry all pending requests { foreach (var (_, tcs) in _pendingRequests.Values) tcs.SetResult(reactorError); _pendingRequests.Clear(); _bareRequest = 0; } // TODO: implement an Updates gaps handling system? https://core.telegram.org/api/updates if (IsMainDC) { var udpatesState = await this.Updates_GetState(); // this call reenables incoming Updates OnUpdate(udpatesState); } } else throw; } catch { lock (_pendingRequests) // abort all pending requests { foreach (var (_, tcs) in _pendingRequests.Values) tcs.SetException(ex); _pendingRequests.Clear(); _bareRequest = 0; } OnUpdate(reactorError); } finally { oldSemaphore.Release(); } } if (obj != null) await HandleMessageAsync(obj); } } internal IObject ReadFrame(byte[] data, int dataLen) { if (dataLen == 4 && data[3] == 0xFF) { int error_code = -BinaryPrimitives.ReadInt32LittleEndian(data); throw new RpcException(error_code, TransportError(error_code)); } if (dataLen < 24) // authKeyId+msgId+length+ctorNb | authKeyId+msgKey throw new ApplicationException($"Packet payload too small: {dataLen}"); long authKeyId = BinaryPrimitives.ReadInt64LittleEndian(data); if (authKeyId != _dcSession.AuthKeyID) throw new ApplicationException($"Received a packet encrypted with unexpected key {authKeyId:X}"); if (authKeyId == 0) // Unencrypted message { using var reader = new TL.BinaryReader(new MemoryStream(data, 8, dataLen - 8), this); long msgId = _lastRecvMsgId = reader.ReadInt64(); if ((msgId & 1) == 0) throw new ApplicationException($"Invalid server msgId {msgId}"); int length = reader.ReadInt32(); if (length != dataLen - 20) throw new ApplicationException($"Unexpected unencrypted length {length} != {dataLen - 20}"); var obj = reader.ReadTLObject(); Helpers.Log(1, $"{_dcSession.DcID}>Receiving {obj.GetType().Name,-40} {MsgIdToStamp(msgId):u} clear{((msgId & 2) == 0 ? "" : " NAR")}"); return obj; } else { #if MTPROTO1 byte[] decrypted_data = EncryptDecryptMessage(data.AsSpan(24, dataLen - 24), false, _dcSession.AuthKey, data, 8, _sha1Recv); #else byte[] decrypted_data = EncryptDecryptMessage(data.AsSpan(24, dataLen - 24), false, _dcSession.AuthKey, data, 8, _sha256Recv); #endif if (decrypted_data.Length < 36) // header below+ctorNb throw new ApplicationException($"Decrypted packet too small: {decrypted_data.Length}"); using var reader = new TL.BinaryReader(new MemoryStream(decrypted_data), this); var serverSalt = reader.ReadInt64(); // int64 salt var sessionId = reader.ReadInt64(); // int64 session_id var msgId = reader.ReadInt64(); // int64 message_id var seqno = reader.ReadInt32(); // int32 msg_seqno var length = reader.ReadInt32(); // int32 message_data_length if (_lastRecvMsgId == 0) // resync ServerTicksOffset on first message _dcSession.ServerTicksOffset = (msgId >> 32) * 10000000 - DateTime.UtcNow.Ticks + 621355968000000000L; var msgStamp = MsgIdToStamp(_lastRecvMsgId = msgId); if (serverSalt != _dcSession.Salt) // salt change happens every 30 min { Helpers.Log(2, $"{_dcSession.DcID}>Server salt has changed: {_dcSession.Salt:X} -> {serverSalt:X}"); _dcSession.Salt = serverSalt; _saltChangeCounter += 20; // counter is decreased by KeepAlive every minute (we have margin of 10) if (_saltChangeCounter >= 30) throw new ApplicationException($"Server salt changed too often! Security issue?"); } if (sessionId != _dcSession.Id) throw new ApplicationException($"Unexpected session ID {sessionId} != {_dcSession.Id}"); if ((msgId & 1) == 0) throw new ApplicationException($"Invalid server msgId {msgId}"); if ((seqno & 1) != 0) lock (_msgsToAck) _msgsToAck.Add(msgId); #if MTPROTO1 if (decrypted_data.Length - 32 - length is < 0 or > 15) throw new ApplicationException($"Unexpected decrypted message_data_length {length} / {decrypted_data.Length - 32}"); if (!data.AsSpan(8, 16).SequenceEqual(_sha1Recv.ComputeHash(decrypted_data, 0, 32 + length).AsSpan(4))) throw new ApplicationException($"Mismatch between MsgKey & decrypted SHA1"); #else if (decrypted_data.Length - 32 - length is < 12 or > 1024) throw new ApplicationException($"Unexpected decrypted message_data_length {length} / {decrypted_data.Length - 32}"); _sha256Recv.TransformBlock(_dcSession.AuthKey, 96, 32, null, 0); _sha256Recv.TransformFinalBlock(decrypted_data, 0, decrypted_data.Length); if (!data.AsSpan(8, 16).SequenceEqual(_sha256Recv.Hash.AsSpan(8, 16))) throw new ApplicationException($"Mismatch between MsgKey & decrypted SHA1"); _sha256Recv.Initialize(); #endif var ctorNb = reader.ReadUInt32(); if (ctorNb != Layer.BadMsgCtor && (msgStamp - DateTime.UtcNow).Ticks / TimeSpan.TicksPerSecond is > 30 or < -300) { // msg_id values that belong over 30 seconds in the future or over 300 seconds in the past are to be ignored. Helpers.Log(1, $"{_dcSession.DcID}>Ignoring 0x{ctorNb:X8} because of wrong timestamp {msgStamp:u} (svc)"); return null; } if (ctorNb == Layer.MsgContainerCtor) { Helpers.Log(1, $"{_dcSession.DcID}>Receiving {"MsgContainer",-40} {msgStamp:u} (svc)"); return ReadMsgContainer(reader); } else if (ctorNb == Layer.RpcResultCtor) { Helpers.Log(1, $"{_dcSession.DcID}>Receiving {"RpcResult",-40} {msgStamp:u}"); return ReadRpcResult(reader); } else { var obj = reader.ReadTLObject(ctorNb); Helpers.Log(1, $"{_dcSession.DcID}>Receiving {obj.GetType().Name,-40} {msgStamp:u} {((seqno & 1) != 0 ? "" : "(svc)")} {((msgId & 2) == 0 ? "" : "NAR")}"); return obj; } } static string TransportError(int error_code) => error_code switch { 404 => "Auth key not found", 429 => "Transport flood", _ => Enum.GetName(typeof(HttpStatusCode), error_code) ?? "Transport error" }; } private static async Task FullReadAsync(Stream stream, byte[] buffer, int length, CancellationToken ct = default) { for (int offset = 0; offset < length;) { var read = await stream.ReadAsync(buffer, offset, length - offset, ct); if (read == 0) return offset; offset += read; } return length; } private async Task SendAsync(IObject msg, bool isContent) { if (_dcSession.AuthKeyID != 0 && isContent && CheckMsgsToAck() is MsgsAck msgsAck) { var ackMsg = NewMsgId(false); var mainMsg = NewMsgId(true); await SendAsync(MakeContainer((msgsAck, ackMsg), (msg, mainMsg)), false); return mainMsg.msgId; } (long msgId, int seqno) = NewMsgId(isContent && _dcSession.AuthKeyID != 0); await _sendSemaphore.WaitAsync(); try { using var memStream = new MemoryStream(1024); using var writer = new BinaryWriter(memStream, Encoding.UTF8); writer.Write(0); // int32 payload_len (to be patched with payload length) if (_dcSession.AuthKeyID == 0) // send unencrypted message { writer.Write(0L); // int64 auth_key_id = 0 (Unencrypted) writer.Write(msgId); // int64 message_id writer.Write(0); // int32 message_data_length (to be patched) Helpers.Log(1, $"{_dcSession.DcID}>Sending {msg.GetType().Name.TrimEnd('_')}..."); writer.WriteTLObject(msg); // bytes message_data BinaryPrimitives.WriteInt32LittleEndian(memStream.GetBuffer().AsSpan(20), (int)memStream.Length - 24); // patch message_data_length } else { using var clearStream = new MemoryStream(1024); using var clearWriter = new BinaryWriter(clearStream, Encoding.UTF8); #if MTPROTO1 const int prepend = 0; #else const int prepend = 32; clearWriter.Write(_dcSession.AuthKey, 88, prepend); #endif clearWriter.Write(_dcSession.Salt); // int64 salt clearWriter.Write(_dcSession.Id); // int64 session_id clearWriter.Write(msgId); // int64 message_id clearWriter.Write(seqno); // int32 msg_seqno clearWriter.Write(0); // int32 message_data_length (to be patched) if ((seqno & 1) != 0) Helpers.Log(1, $"{_dcSession.DcID}>Sending {msg.GetType().Name.TrimEnd('_'),-40} #{(short)msgId.GetHashCode():X4}"); else Helpers.Log(1, $"{_dcSession.DcID}>Sending {msg.GetType().Name.TrimEnd('_'),-40} {MsgIdToStamp(msgId):u} (svc)"); clearWriter.WriteTLObject(msg); // bytes message_data int clearLength = (int)clearStream.Length - prepend; // length before padding (= 32 + message_data_length) int padding = (0x7FFFFFF0 - clearLength) % 16; #if !MTPROTO1 padding += _random.Next(1, 64) * 16; // MTProto 2.0 padding must be between 12..1024 with total length divisible by 16 #endif clearStream.SetLength(prepend + clearLength + padding); byte[] clearBuffer = clearStream.GetBuffer(); BinaryPrimitives.WriteInt32LittleEndian(clearBuffer.AsSpan(prepend + 28), clearLength - 32); // patch message_data_length RNG.GetBytes(clearBuffer, prepend + clearLength, padding); #if MTPROTO1 var msgKeyLarge = _sha1.ComputeHash(clearBuffer, 0, clearLength); // padding excluded from computation! const int msgKeyOffset = 4; // msg_key = low 128-bits of SHA1(plaintext) byte[] encrypted_data = EncryptDecryptMessage(clearBuffer.AsSpan(prepend, clearLength + padding), true, _dcSession.AuthKey, msgKeyLarge, msgKeyOffset, _sha1); #else var msgKeyLarge = _sha256.ComputeHash(clearBuffer, 0, prepend + clearLength + padding); const int msgKeyOffset = 8; // msg_key = middle 128-bits of SHA256(authkey_part+plaintext+padding) byte[] encrypted_data = EncryptDecryptMessage(clearBuffer.AsSpan(prepend, clearLength + padding), true, _dcSession.AuthKey, msgKeyLarge, msgKeyOffset, _sha256); #endif writer.Write(_dcSession.AuthKeyID); // int64 auth_key_id writer.Write(msgKeyLarge, msgKeyOffset, 16); // int128 msg_key writer.Write(encrypted_data); // bytes encrypted_data } var buffer = memStream.GetBuffer(); int frameLength = (int)memStream.Length; BinaryPrimitives.WriteInt32LittleEndian(buffer, frameLength - 4); // patch payload_len with correct value //TODO: support Transport obfuscation? await _networkStream.WriteAsync(memStream.GetBuffer(), 0, frameLength); _lastSentMsg = msg; } finally { _sendSemaphore.Release(); } return msgId; } internal MsgContainer ReadMsgContainer(TL.BinaryReader reader) { int count = reader.ReadInt32(); var array = new _Message[count]; for (int i = 0; i < count; i++) { var msg = array[i] = new _Message { msg_id = reader.ReadInt64(), seqno = reader.ReadInt32(), bytes = reader.ReadInt32(), }; if ((msg.seqno & 1) != 0) lock(_msgsToAck) _msgsToAck.Add(msg.msg_id); var pos = reader.BaseStream.Position; try { var ctorNb = reader.ReadUInt32(); if (ctorNb == Layer.RpcResultCtor) { Helpers.Log(1, $" → {"RpcResult",-38} {MsgIdToStamp(msg.msg_id):u}"); msg.body = ReadRpcResult(reader); } else { var obj = msg.body = reader.ReadTLObject(ctorNb); Helpers.Log(1, $" → {obj.GetType().Name,-38} {MsgIdToStamp(msg.msg_id):u} {((msg.seqno & 1) != 0 ? "" : "(svc)")} {((msg.msg_id & 2) == 0 ? "" : "NAR")}"); } } catch (Exception ex) { Helpers.Log(4, "While deserializing vector<%Message>: " + ex.ToString()); } reader.BaseStream.Position = pos + array[i].bytes; } return new MsgContainer { messages = array }; } private RpcResult ReadRpcResult(TL.BinaryReader reader) { long msgId = reader.ReadInt64(); var (type, tcs) = PullPendingRequest(msgId); object result; if (tcs != null) { try { if (!type.IsArray) result = reader.ReadTLValue(type); else if (reader.ReadUInt32() == Layer.RpcErrorCtor) result = reader.ReadTLObject(Layer.RpcErrorCtor); else { reader.BaseStream.Position -= 4; result = reader.ReadTLValue(type); } if (type.IsEnum) result = Enum.ToObject(type, result); if (result is RpcError rpcError) Helpers.Log(4, $" → RpcError {rpcError.error_code,3} {rpcError.error_message,-24} #{(short)msgId.GetHashCode():X4}"); else Helpers.Log(1, $" → {result?.GetType().Name,-37} #{(short)msgId.GetHashCode():X4}"); tcs.SetResult(result); } catch (Exception ex) { tcs.SetException(ex); throw; } } else { result = reader.ReadTLObject(); if (MsgIdToStamp(msgId) >= _session.SessionStart) Helpers.Log(4, $" → {result?.GetType().Name,-37} for unknown msgId #{(short)msgId.GetHashCode():X4}"); else Helpers.Log(1, $" → {result?.GetType().Name,-37} for past msgId #{(short)msgId.GetHashCode():X4}"); } return new RpcResult { req_msg_id = msgId, result = result }; } private (Type type, TaskCompletionSource tcs) PullPendingRequest(long msgId) { (Type type, TaskCompletionSource tcs) request; lock (_pendingRequests) if (_pendingRequests.TryGetValue(msgId, out request)) _pendingRequests.Remove(msgId); return request; } internal async Task InvokeBare(IMethod request) { if (_bareRequest != 0) throw new ApplicationException("A bare request is already undergoing"); var msgId = await SendAsync(request, false); var tcs = new TaskCompletionSource(TaskCreationOptions.RunContinuationsAsynchronously); lock (_pendingRequests) _pendingRequests[msgId] = (typeof(X), tcs); _bareRequest = msgId; return (X)await tcs.Task; } /// Call the given TL method (You shouldn't need to use this method directly) /// Expected type of the returned object /// TL method structure /// Wait for the reply and return the resulting object, or throws an RpcException if an error was replied public async Task Invoke(IMethod query) { retry: var msgId = await SendAsync(query, true); var tcs = new TaskCompletionSource(TaskCreationOptions.RunContinuationsAsynchronously); lock (_pendingRequests) _pendingRequests[msgId] = (typeof(X), tcs); var result = await tcs.Task; switch (result) { case X resultX: return resultX; case RpcError rpcError: int number; if (rpcError.error_code == 303 && ((number = rpcError.error_message.IndexOf("_MIGRATE_")) > 0)) { if (!rpcError.error_message.StartsWith("FILE_")) { number = int.Parse(rpcError.error_message[(number + 9)..]); // this is a hack to migrate _dcSession in-place (staying in same Client): Session.DCSession dcSession; lock (_session) dcSession = GetOrCreateDCSession(number, _dcSession.DataCenter.flags); Reset(false, false); _session.MainDC = number; _dcSession.Client = null; _dcSession = dcSession; _dcSession.Client = this; await ConnectAsync(); goto retry; } } else if (rpcError.error_code == 420 && ((number = rpcError.error_message.IndexOf("_WAIT_")) > 0)) { number = int.Parse(rpcError.error_message[(number + 6)..]); if (number <= FloodRetryThreshold) { await Task.Delay(number * 1000); goto retry; } } else if (rpcError.error_code == 500 && rpcError.error_message == "AUTH_RESTART") { _session.UserId = 0; // force a full login authorization flow, next time _session.Save(); } throw new RpcException(rpcError.error_code, rpcError.error_message); case ReactorError: goto retry; default: throw new ApplicationException($"{query.GetType().Name} call got a result of type {result.GetType().Name} instead of {typeof(X).Name}"); } } private MsgsAck CheckMsgsToAck() { lock (_msgsToAck) { if (_msgsToAck.Count == 0) return null; var msgsAck = new MsgsAck { msg_ids = _msgsToAck.ToArray() }; _msgsToAck.Clear(); return msgsAck; } } private static MsgContainer MakeContainer(params (IObject obj, (long msgId, int seqno))[] msgs) => new() { messages = msgs.Select(msg => new _Message { msg_id = msg.Item2.msgId, seqno = msg.Item2.seqno, body = msg.obj }).ToArray() }; private async Task HandleMessageAsync(IObject obj) { switch (obj) { case MsgContainer container: foreach (var msg in container.messages) if (msg.body != null) await HandleMessageAsync(msg.body); break; case MsgCopy msgCopy: if (msgCopy?.orig_message?.body != null) await HandleMessageAsync(msgCopy.orig_message.body); break; case TL.Methods.Ping ping: _ = SendAsync(new Pong { msg_id = _lastRecvMsgId, ping_id = ping.ping_id }, false); break; case Pong pong: SetResult(pong.msg_id, pong); break; case FutureSalts futureSalts: SetResult(futureSalts.req_msg_id, futureSalts); break; case RpcResult rpcResult: break; // SetResult was already done in ReadRpcResult case MsgsAck msgsAck: break; // we don't do anything with these, for now case BadMsgNotification badMsgNotification: await _sendSemaphore.WaitAsync(); bool retryLast = badMsgNotification.bad_msg_id == _dcSession.LastSentMsgId; var lastSentMsg = _lastSentMsg; _sendSemaphore.Release(); var logLevel = badMsgNotification.error_code == 48 ? 2 : 4; Helpers.Log(logLevel, $"BadMsgNotification {badMsgNotification.error_code} for msg #{(short)badMsgNotification.bad_msg_id.GetHashCode():X4}"); switch (badMsgNotification.error_code) { case 16: case 17: _dcSession.LastSentMsgId = 0; var localTime = DateTime.UtcNow; _dcSession.ServerTicksOffset = (_lastRecvMsgId >> 32) * 10000000 - localTime.Ticks + 621355968000000000L; Helpers.Log(1, $"Time offset: {_dcSession.ServerTicksOffset} | Server: {MsgIdToStamp(_lastRecvMsgId).AddTicks(_dcSession.ServerTicksOffset).TimeOfDay} UTC | Local: {localTime.TimeOfDay} UTC"); break; case 32: // msg_seqno too low (the server has already received a message with a lower msg_id but with either a higher or an equal and odd seqno) case 33: // msg_seqno too high (similarly, there is a message with a higher msg_id but with either a lower or an equal and odd seqno) if (_dcSession.Seqno <= 1) retryLast = false; else { Reset(false, false); _dcSession.Renew(); await ConnectAsync(); } break; case 48: // incorrect server salt (in this case, the bad_server_salt response is received with the correct salt, and the message is to be re-sent with it) _dcSession.Salt = ((BadServerSalt)badMsgNotification).new_server_salt; break; default: retryLast = false; break; } if (retryLast) { var newMsgId = await SendAsync(lastSentMsg, true); lock (_pendingRequests) if (_pendingRequests.TryGetValue(badMsgNotification.bad_msg_id, out var t)) { _pendingRequests.Remove(badMsgNotification.bad_msg_id); _pendingRequests[newMsgId] = t; } } else if (PullPendingRequest(badMsgNotification.bad_msg_id).tcs is TaskCompletionSource tcs) { if (_bareRequest == badMsgNotification.bad_msg_id) _bareRequest = 0; tcs.SetException(new ApplicationException($"BadMsgNotification {badMsgNotification.error_code}")); } else OnUpdate(obj); break; default: if (_bareRequest != 0) { var (type, tcs) = PullPendingRequest(_bareRequest); if (type?.IsAssignableFrom(obj.GetType()) == true) { _bareRequest = 0; tcs.SetResult(obj); break; } } OnUpdate(obj); break; } void SetResult(long msgId, object result) { var tcs = PullPendingRequest(msgId).tcs; if (tcs != null) tcs.SetResult(result); else OnUpdate(obj); } } private void OnUpdate(IObject obj) { try { Update?.Invoke(obj); } catch (Exception ex) { Helpers.Log(4, $"Update callback on {obj.GetType().Name} raised {ex}"); } } /// Login as a bot (if not already logged-in). /// Config callback is queried for: bot_token ///
Bots can only call API methods marked with [bots: ✓] in their documentation.
/// Detail about the logged-in bot public async Task LoginBotIfNeeded() { await ConnectAsync(); string botToken = Config("bot_token"); if (_session.UserId != 0) // a user is already logged-in { try { var users = await this.Users_GetUsers(new[] { InputUser.Self }); // this calls also reenable incoming Updates var self = users[0] as User; if (self.id == long.Parse(botToken.Split(':')[0])) { _session.UserId = _dcSession.UserId = self.id; return self; } Helpers.Log(3, $"Current logged user {self.id} mismatched bot_token. Logging out and in..."); } catch (Exception ex) { Helpers.Log(4, $"Error while verifying current bot! ({ex.Message}) Proceeding to login..."); } await this.Auth_LogOut(); _session.UserId = _dcSession.UserId = 0; } var authorization = await this.Auth_ImportBotAuthorization(0, _apiId, _apiHash, botToken); return LoginAlreadyDone(authorization); } /// Login as a user (if not already logged-in). ///
(this method calls ConnectAsync if necessary)
/// Config callback is queried for: phone_number, verification_code
and eventually first_name, last_name (signup required), password (2FA auth), user_id (alt validation)
/// (optional) Preference for verification_code sending /// Detail about the logged-in user ///
Most methods of this class are async (Task), so please use to get the result
public async Task LoginUserIfNeeded(CodeSettings settings = null) { await ConnectAsync(); string phone_number = null; if (_session.UserId != 0) // a user is already logged-in { try { var users = await this.Users_GetUsers(new[] { InputUser.Self }); // this calls also reenable incoming Updates var self = users[0] as User; // check user_id or phone_number match currently logged-in user if ((long.TryParse(_config("user_id"), out long id) && (id == -1 || self.id == id)) || self.phone == string.Concat((phone_number = Config("phone_number")).Where(char.IsDigit))) { _session.UserId = _dcSession.UserId = self.id; return self; } Helpers.Log(3, $"Current logged user {self.id} mismatched user_id or phone_number. Logging out and in..."); } catch (Exception ex) { Helpers.Log(4, $"Error while verifying current user! ({ex.Message}) Proceeding to login..."); } await this.Auth_LogOut(); _session.UserId = _dcSession.UserId = 0; } phone_number ??= Config("phone_number"); Auth_SentCode sentCode; try { sentCode = await this.Auth_SendCode(phone_number, _apiId, _apiHash, settings ??= new()); } catch (RpcException ex) when (ex.Code == 500 && ex.Message == "AUTH_RESTART") { sentCode = await this.Auth_SendCode(phone_number, _apiId, _apiHash, settings ??= new()); } resent: var timeout = DateTime.UtcNow + TimeSpan.FromSeconds(sentCode.timeout); OnUpdate(sentCode); Helpers.Log(3, $"A verification code has been sent via {sentCode.type.GetType().Name[17..]}"); Auth_AuthorizationBase authorization = null; for (int retry = 1; authorization == null; retry++) try { var verification_code = await ConfigAsync("verification_code"); if (verification_code == "" && sentCode.next_type != 0) { var mustWait = timeout - DateTime.UtcNow; if (mustWait.Ticks > 0) { Helpers.Log(3, $"You must wait {(int)(mustWait.TotalSeconds + 0.5)} more seconds before requesting the code to be sent via {sentCode.next_type}"); continue; } sentCode = await this.Auth_ResendCode(phone_number, sentCode.phone_code_hash); goto resent; } authorization = await this.Auth_SignIn(phone_number, sentCode.phone_code_hash, verification_code); } catch (RpcException e) when (e.Code == 401 && e.Message == "SESSION_PASSWORD_NEEDED") { var accountPassword = await this.Account_GetPassword(); OnUpdate(accountPassword); var checkPasswordSRP = await Check2FA(accountPassword, () => ConfigAsync("password")); authorization = await this.Auth_CheckPassword(checkPasswordSRP); } catch (RpcException e) when (e.Code == 400 && e.Message == "PHONE_CODE_INVALID" && retry != 3) { } if (authorization is Auth_AuthorizationSignUpRequired signUpRequired) { var waitUntil = DateTime.UtcNow.AddSeconds(3); if (signUpRequired.terms_of_service != null) OnUpdate(signUpRequired.terms_of_service); // give caller the possibility to read and accept TOS var first_name = Config("first_name"); var last_name = Config("last_name"); var wait = waitUntil - DateTime.UtcNow; if (wait > TimeSpan.Zero) await Task.Delay(wait); // we get a FLOOD_WAIT_3 if we SignUp too fast authorization = await this.Auth_SignUp(phone_number, sentCode.phone_code_hash, first_name, last_name); } return LoginAlreadyDone(authorization); } /// [Not recommended] You can use this if you have already obtained a login authorization manually /// if this was not a successful Auth_Authorization, an exception is thrown /// the User that was authorized /// This approach is not recommended because you likely didn't properly handle all aspects of the login process ///
(transient failures, unnecessary login, 2FA, sign-up required, slowness to respond, verification code resending, encryption key safety, etc..) ///
Methods LoginUserIfNeeded and LoginBotIfNeeded handle these automatically for you
[EditorBrowsable(EditorBrowsableState.Never)] public User LoginAlreadyDone(Auth_AuthorizationBase authorization) { if (authorization is not Auth_Authorization { user: User user }) throw new ApplicationException("Failed to get Authorization: " + authorization.GetType().Name); _session.UserId = _dcSession.UserId = user.id; _session.Save(); return user; } /// Enable the collection of id/access_hash pairs (experimental) public bool CollectAccessHash { get; set; } readonly Dictionary> _accessHashes = new(); public IEnumerable> AllAccessHashesFor() where T : IObject => _accessHashes.GetValueOrDefault(typeof(T)); /// Retrieve the access_hash associated with this id (for a TL class) if it was collected /// This requires to be set to first. ///
See Examples/Program_CollectAccessHash.cs for how to use this
/// a TL object class. For example User, Channel or Photo public long GetAccessHashFor(long id) where T : IObject { lock (_accessHashes) return _accessHashes.GetOrCreate(typeof(T)).TryGetValue(id, out var access_hash) ? access_hash : 0; } public void SetAccessHashFor(long id, long access_hash) where T : IObject { lock (_accessHashes) _accessHashes.GetOrCreate(typeof(T))[id] = access_hash; } internal void UpdateAccessHash(object obj, Type type, object access_hash) { if (!CollectAccessHash) return; if (access_hash is not long accessHash) return; if (type.GetField("id") is not FieldInfo idField) return; if (idField.GetValue(obj) is not long id) if (idField.GetValue(obj) is not int idInt) return; else id = idInt; lock (_accessHashes) _accessHashes.GetOrCreate(type)[id] = accessHash; } #region TL-Helpers /// Helper function to upload a file to Telegram /// Path to the file to upload /// (optional) Callback for tracking the progression of the transfer /// an or than can be used in various requests public Task UploadFileAsync(string pathname, ProgressCallback progress = null) => UploadFileAsync(File.OpenRead(pathname), Path.GetFileName(pathname), progress); /// Helper function to upload a file to Telegram /// Content of the file to upload /// Name of the file /// (optional) Callback for tracking the progression of the transfer /// an or than can be used in various requests public async Task UploadFileAsync(Stream stream, string filename, ProgressCallback progress = null) { using var md5 = MD5.Create(); using (stream) { long transmitted = 0, length = stream.Length; var isBig = length >= 10 * 1024 * 1024; int file_total_parts = (int)((length - 1) / FilePartSize) + 1; long file_id = Helpers.RandomLong(); int file_part = 0, read; var tasks = new Dictionary(); bool abort = false; for (long bytesLeft = length; !abort && bytesLeft != 0; file_part++) { var bytes = new byte[Math.Min(FilePartSize, bytesLeft)]; read = await FullReadAsync(stream, bytes, bytes.Length); await _parallelTransfers.WaitAsync(); bytesLeft -= read; var task = SavePart(file_part, bytes); lock (tasks) tasks[file_part] = task; if (!isBig) md5.TransformBlock(bytes, 0, read, null, 0); if (read < FilePartSize && bytesLeft != 0) throw new ApplicationException($"Failed to fully read stream ({read},{bytesLeft})"); async Task SavePart(int file_part, byte[] bytes) { try { if (isBig) await this.Upload_SaveBigFilePart(file_id, file_part, file_total_parts, bytes); else await this.Upload_SaveFilePart(file_id, file_part, bytes); lock (tasks) { transmitted += bytes.Length; tasks.Remove(file_part); } progress?.Invoke(transmitted, length); } catch (Exception) { abort = true; throw; } finally { _parallelTransfers.Release(); } } } Task[] remainingTasks; lock (tasks) remainingTasks = tasks.Values.ToArray(); await Task.WhenAll(remainingTasks); // wait completion and eventually propagate any task exception if (!isBig) md5.TransformFinalBlock(Array.Empty(), 0, 0); return isBig ? new InputFileBig { id = file_id, parts = file_total_parts, name = filename } : new InputFile { id = file_id, parts = file_total_parts, name = filename, md5_checksum = md5.Hash }; } } /// Helper function to send a media message more easily /// Destination of message (chat group, channel, user chat, etc..) /// Caption for the media (in plain text) or /// Media file already uploaded to TG (see UploadFileAsync) /// for automatic detection, "photo" for an inline photo, or a MIME type to send as a document /// Your message is a reply to an existing message with this ID, in the same chat /// Text formatting entities for the caption. You can use MarkdownToEntities to create these /// UTC timestamp when the message should be sent /// The transmitted message confirmed by Telegram public Task SendMediaAsync(InputPeer peer, string caption, InputFileBase mediaFile, string mimeType = null, int reply_to_msg_id = 0, MessageEntity[] entities = null, DateTime schedule_date = default) { var filename = mediaFile is InputFile iFile ? iFile.name : (mediaFile as InputFileBig)?.name; mimeType ??= Path.GetExtension(filename)?.ToLowerInvariant() switch { ".jpg" or ".jpeg" or ".png" or ".bmp" => "photo", ".gif" => "image/gif", ".webp" => "image/webp", ".mp4" => "video/mp4", ".mp3" => "audio/mpeg", ".wav" => "audio/x-wav", _ => "", // send as generic document with undefined MIME type }; if (mimeType == "photo") return SendMessageAsync(peer, caption, new InputMediaUploadedPhoto { file = mediaFile }, reply_to_msg_id, entities, schedule_date); var attributes = filename == null ? Array.Empty() : new[] { new DocumentAttributeFilename { file_name = filename } }; return SendMessageAsync(peer, caption, new InputMediaUploadedDocument { file = mediaFile, mime_type = mimeType, attributes = attributes }, reply_to_msg_id, entities, schedule_date); } /// Helper function to send a text or media message easily /// Destination of message (chat group, channel, user chat, etc..) /// The plain text of the message (or media caption) /// An instance of InputMedia-derived class, or if there is no associated media /// Your message is a reply to an existing message with this ID, in the same chat /// Text formatting entities. You can use MarkdownToEntities to create these /// UTC timestamp when the message should be sent /// Should website/media preview be shown or not, for URLs in your message /// The transmitted message as confirmed by Telegram public async Task SendMessageAsync(InputPeer peer, string text, InputMedia media = null, int reply_to_msg_id = 0, MessageEntity[] entities = null, DateTime schedule_date = default, bool disable_preview = false) { UpdatesBase updates; long random_id = Helpers.RandomLong(); if (media == null) updates = await this.Messages_SendMessage(peer, text, random_id, no_webpage: disable_preview, entities: entities, reply_to_msg_id: reply_to_msg_id == 0 ? null : reply_to_msg_id, schedule_date: schedule_date == default ? null : schedule_date); else updates = await this.Messages_SendMedia(peer, media, text, random_id, entities: entities, reply_to_msg_id: reply_to_msg_id == 0 ? null : reply_to_msg_id, schedule_date: schedule_date == default ? null : schedule_date); OnUpdate(updates); int msgId = -1; foreach (var update in updates.UpdateList) { switch (update) { case UpdateMessageID updMsgId when updMsgId.random_id == random_id: msgId = updMsgId.id; break; case UpdateNewMessage { message: Message message } when message.id == msgId: return message; case UpdateNewScheduledMessage { message: Message schedMsg } when schedMsg.id == msgId: return schedMsg; } } if (updates is UpdateShortSentMessage sent) { return new Message { flags = (Message.Flags)sent.flags | (reply_to_msg_id == 0 ? 0 : Message.Flags.has_reply_to) | (peer is InputPeerSelf ? 0 : Message.Flags.has_from_id), id = sent.id, date = sent.date, message = text, entities = sent.entities, media = sent.media, ttl_period = sent.ttl_period, reply_to = reply_to_msg_id == 0 ? null : new MessageReplyHeader { reply_to_msg_id = reply_to_msg_id }, from_id = peer is InputPeerSelf ? null : new PeerUser { user_id = _session.UserId }, peer_id = InputToPeer(peer) }; } return null; } private Peer InputToPeer(InputPeer peer) => peer switch { InputPeerSelf => new PeerUser { user_id = _session.UserId }, InputPeerUser ipu => new PeerUser { user_id = ipu.user_id }, InputPeerChat ipc => new PeerChat { chat_id = ipc.chat_id }, InputPeerChannel ipch => new PeerChannel { channel_id = ipch.channel_id }, InputPeerUserFromMessage ipufm => new PeerUser { user_id = ipufm.user_id }, InputPeerChannelFromMessage ipcfm => new PeerChannel { channel_id = ipcfm.channel_id }, _ => null, }; /// Download a photo from Telegram into the outputStream /// The photo to download /// Stream to write the file content to. This method does not close/dispose the stream /// A specific size/version of the photo, or to download the largest version of the photo /// (optional) Callback for tracking the progression of the transfer /// The file type of the photo public async Task DownloadFileAsync(Photo photo, Stream outputStream, PhotoSizeBase photoSize = null, ProgressCallback progress = null) { if (photoSize is PhotoStrippedSize psp) return InflateStrippedThumb(outputStream, psp.bytes) ? Storage_FileType.jpeg : 0; photoSize ??= photo.LargestPhotoSize; var fileLocation = photo.ToFileLocation(photoSize); return await DownloadFileAsync(fileLocation, outputStream, photo.dc_id, photoSize.FileSize, progress); } /// Download a document from Telegram into the outputStream /// The document to download /// Stream to write the file content to. This method does not close/dispose the stream /// A specific size/version of the document thumbnail to download, or to download the document itself /// (optional) Callback for tracking the progression of the transfer /// MIME type of the document/thumbnail public async Task DownloadFileAsync(Document document, Stream outputStream, PhotoSizeBase thumbSize = null, ProgressCallback progress = null) { if (thumbSize is PhotoStrippedSize psp) return InflateStrippedThumb(outputStream, psp.bytes) ? "image/jpeg" : null; var fileLocation = document.ToFileLocation(thumbSize); var fileType = await DownloadFileAsync(fileLocation, outputStream, document.dc_id, thumbSize?.FileSize ?? document.size, progress); return thumbSize == null ? document.mime_type : "image/" + fileType; } /// Download a file from Telegram into the outputStream /// Telegram file identifier, typically obtained with a .ToFileLocation() call /// Stream to write file content to. This method does not close/dispose the stream /// (optional) DC on which the file is stored /// (optional) Expected file size /// (optional) Callback for tracking the progression of the transfer /// The file type public async Task DownloadFileAsync(InputFileLocationBase fileLocation, Stream outputStream, int dc_id = 0, int fileSize = 0, ProgressCallback progress = null) { Storage_FileType fileType = Storage_FileType.unknown; var client = dc_id == 0 ? this : await GetClientForDC(dc_id, true); using var writeSem = new SemaphoreSlim(1); long streamStartPos = outputStream.Position; int fileOffset = 0, maxOffsetSeen = 0; long transmitted = 0; var tasks = new Dictionary(); progress?.Invoke(0, fileSize); bool abort = false; while (!abort) { await _parallelTransfers.WaitAsync(); var task = LoadPart(fileOffset); lock (tasks) tasks[fileOffset] = task; if (dc_id == 0) { await task; dc_id = client._dcSession.DcID; } fileOffset += FilePartSize; if (fileSize != 0 && fileOffset >= fileSize) { if (await task != ((fileSize - 1) % FilePartSize) + 1) throw new ApplicationException("Downloaded file size does not match expected file size"); break; } async Task LoadPart(int offset) { Upload_FileBase fileBase; try { fileBase = await client.Upload_GetFile(fileLocation, offset, FilePartSize); } catch (RpcException ex) when (ex.Code == 303 && ex.Message.StartsWith("FILE_MIGRATE_")) { var dcId = int.Parse(ex.Message[13..]); client = await GetClientForDC(dcId, true); fileBase = await client.Upload_GetFile(fileLocation, offset, FilePartSize); } catch (RpcException ex) when (ex.Code == 400 && ex.Message == "OFFSET_INVALID") { abort = true; return 0; } catch (Exception) { abort = true; throw; } finally { _parallelTransfers.Release(); } if (fileBase is not Upload_File fileData) throw new ApplicationException("Upload_GetFile returned unsupported " + fileBase.GetType().Name); if (fileData.bytes.Length != FilePartSize) abort = true; if (fileData.bytes.Length != 0) { fileType = fileData.type; await writeSem.WaitAsync(); try { if (streamStartPos + offset != outputStream.Position) // if we're about to write out of order { await outputStream.FlushAsync(); // async flush, otherwise Seek would do a sync flush outputStream.Seek(streamStartPos + offset, SeekOrigin.Begin); } await outputStream.WriteAsync(fileData.bytes, 0, fileData.bytes.Length); maxOffsetSeen = Math.Max(maxOffsetSeen, offset + fileData.bytes.Length); transmitted += fileData.bytes.Length; } catch (Exception) { abort = true; throw; } finally { writeSem.Release(); progress?.Invoke(transmitted, fileSize); } } lock (tasks) tasks.Remove(offset); return fileData.bytes.Length; } } Task[] remainingTasks; lock (tasks) remainingTasks = tasks.Values.ToArray(); await Task.WhenAll(remainingTasks); // wait completion and eventually propagate any task exception await outputStream.FlushAsync(); outputStream.Seek(streamStartPos + maxOffsetSeen, SeekOrigin.Begin); return fileType; } /// Download the profile photo for a given peer into the outputStream /// User, Chat or Channel /// Stream to write the file content to. This method does not close/dispose the stream /// Whether to download the high-quality version of the picture /// Whether to extract the embedded very low-res thumbnail (synchronous, no actual download needed) /// The file type of the photo, or 0 if no photo available public async Task DownloadProfilePhotoAsync(IPeerInfo peer, Stream outputStream, bool big = false, bool miniThumb = false) { int dc_id; long photo_id; byte[] stripped_thumb; switch (peer) { case User user: if (user.photo == null) return 0; dc_id = user.photo.dc_id; photo_id = user.photo.photo_id; stripped_thumb = user.photo.stripped_thumb; break; case ChatBase { Photo: var photo }: if (photo == null) return 0; dc_id = photo.dc_id; photo_id = photo.photo_id; stripped_thumb = photo.stripped_thumb; break; default: return 0; } if (miniThumb && !big) return InflateStrippedThumb(outputStream, stripped_thumb) ? Storage_FileType.jpeg : 0; var fileLocation = new InputPeerPhotoFileLocation { peer = peer.ToInputPeer(), photo_id = photo_id }; if (big) fileLocation.flags |= InputPeerPhotoFileLocation.Flags.big; return await DownloadFileAsync(fileLocation, outputStream, dc_id); } private static bool InflateStrippedThumb(Stream outputStream, byte[] stripped_thumb) { if (stripped_thumb == null || stripped_thumb.Length <= 3 || stripped_thumb[0] != 1) return false; var header = Helpers.StrippedThumbJPG; outputStream.Write(header, 0, 164); outputStream.WriteByte(stripped_thumb[1]); outputStream.WriteByte(0); outputStream.WriteByte(stripped_thumb[2]); outputStream.Write(header, 167, header.Length - 167); outputStream.Write(stripped_thumb, 3, stripped_thumb.Length - 3); outputStream.WriteByte(0xff); outputStream.WriteByte(0xd9); return true; } /// Helper method that tries to fetch all participants from a Channel (beyond Telegram server-side limitations) /// The channel to query /// Also fetch the kicked/banned members? /// Field count indicates the total count of members. Field participants contains those that were successfully fetched /// This method can take a few minutes to complete on big channels. It likely won't be able to obtain the full total count of members public async Task Channels_GetAllParticipants(InputChannelBase channel, bool includeKickBan = false) { var result = new Channels_ChannelParticipants { chats = new(), users = new() }; var sem = new SemaphoreSlim(10); // prevents flooding Telegram with requests var user_ids = new HashSet(); var participants = new List(); var tasks = new List { GetWithFilter(new ChannelParticipantsAdmins()), GetWithFilter(new ChannelParticipantsBots()), GetWithFilter(new ChannelParticipantsSearch { q = "" }, (f, c) => new ChannelParticipantsSearch { q = f.q + c }), }; var mcf = this.Channels_GetFullChannel(channel); tasks.Add(mcf); if (includeKickBan) { tasks.Add(GetWithFilter(new ChannelParticipantsKicked { q = "" }, (f, c) => new ChannelParticipantsKicked { q = f.q + c })); tasks.Add(GetWithFilter(new ChannelParticipantsBanned { q = "" }, (f, c) => new ChannelParticipantsBanned { q = f.q + c })); } await Task.WhenAll(tasks); result.count = ((ChannelFull)mcf.Result.full_chat).participants_count; result.participants = participants.ToArray(); return result; async Task GetWithFilter(T filter, Func recurse = null) where T : ChannelParticipantsFilter { Channels_ChannelParticipants ccp; for (int offset = 0; ;) { await sem.WaitAsync(); try { ccp = await this.Channels_GetParticipants(channel, filter, offset, 1024, 0); } finally { sem.Release(); } foreach (var kvp in ccp.chats) result.chats[kvp.Key] = kvp.Value; foreach (var kvp in ccp.users) result.users[kvp.Key] = kvp.Value; lock (participants) foreach (var participant in ccp.participants) if (user_ids.Add(participant.UserID)) participants.Add(participant); offset += ccp.participants.Length; if (offset >= ccp.count || ccp.participants.Length == 0) break; } if (recurse != null && (ccp.count == 200 || ccp.count == 1000)) await Task.WhenAll(Enumerable.Range('a', 26).Select(c => GetWithFilter(recurse(filter, (char)c), recurse))); } } public Task AddChatUser(InputPeer peer, InputUserBase user, int fwd_limit = int.MaxValue) => peer switch { InputPeerChat chat => this.Messages_AddChatUser(chat.chat_id, user, fwd_limit), InputPeerChannel channel => this.Channels_InviteToChannel(channel, new[] { user }), _ => throw new ArgumentException("This method works on Chat & Channel only"), }; public Task DeleteChatUser(InputPeer peer, InputUser user, bool revoke_history = true) => peer switch { InputPeerChat chat => this.Messages_DeleteChatUser(chat.chat_id, user, revoke_history), InputPeerChannel channel => this.Channels_EditBanned(channel, user, new ChatBannedRights { flags = ChatBannedRights.Flags.view_messages }), _ => throw new ArgumentException("This method works on Chat & Channel only"), }; public Task LeaveChat(InputPeer peer, bool revoke_history = true) => peer switch { InputPeerChat chat => this.Messages_DeleteChatUser(chat.chat_id, InputUser.Self, revoke_history), InputPeerChannel channel => this.Channels_LeaveChannel(channel), _ => throw new ArgumentException("This method works on Chat & Channel only"), }; public async Task EditChatAdmin(InputPeer peer, InputUserBase user, bool is_admin) { switch (peer) { case InputPeerChat chat: await this.Messages_EditChatAdmin(chat.chat_id, user, is_admin); return new Updates { date = DateTime.UtcNow, users = new(), updates = Array.Empty(), chats = (await this.Messages_GetChats(new[] { chat.chat_id })).chats }; case InputPeerChannel channel: return await this.Channels_EditAdmin(channel, user, new ChatAdminRights { flags = is_admin ? (ChatAdminRights.Flags)0x8BF : 0 }, null); default: throw new ArgumentException("This method works on Chat & Channel only"); } } public Task EditChatPhoto(InputPeer peer, InputChatPhotoBase photo) => peer switch { InputPeerChat chat => this.Messages_EditChatPhoto(chat.chat_id, photo), InputPeerChannel channel => this.Channels_EditPhoto(channel, photo), _ => throw new ArgumentException("This method works on Chat & Channel only"), }; public Task EditChatTitle(InputPeer peer, string title) => peer switch { InputPeerChat chat => this.Messages_EditChatTitle(chat.chat_id, title), InputPeerChannel channel => this.Channels_EditTitle(channel, title), _ => throw new ArgumentException("This method works on Chat & Channel only"), }; public Task GetFullChat(InputPeer peer) => peer switch { InputPeerChat chat => this.Messages_GetFullChat(chat.chat_id), InputPeerChannel channel => this.Channels_GetFullChannel(channel), _ => throw new ArgumentException("This method works on Chat & Channel only"), }; public async Task DeleteChat(InputPeer peer) { switch (peer) { case InputPeerChat chat: await this.Messages_DeleteChat(chat.chat_id); return new Updates { date = DateTime.UtcNow, users = new(), updates = Array.Empty(), chats = (await this.Messages_GetChats(new[] { chat.chat_id })).chats }; case InputPeerChannel channel: return await this.Channels_DeleteChannel(channel); default: throw new ArgumentException("This method works on Chat & Channel only"); } } #endregion } }