Golang bindings for the Telegram Bot API
Go to file
Syfaro aa124ef1e8
Merge pull request #294 from mkishere/inline-venue
Add inline venue type
2020-01-13 00:30:19 -06:00
tests Added VideoNote support 2017-05-22 02:34:12 +04:30
.gitignore Passport Updates (#1) 2018-09-04 10:52:52 -07:00
.travis.yml Remove go1.4 from travis configuration 2018-08-27 22:44:02 +02:00
LICENSE.txt add license 2015-06-26 21:53:55 -05:00
README.md README: fix typo 2019-07-05 03:42:37 +05:30
bot.go Allow to change API endpoint for bot 2019-05-24 13:14:48 +03:00
bot_test.go A number of small improvements. 2018-10-08 02:25:09 -05:00
configs.go Add initial support for sendMediaGroup. 2018-09-21 20:20:28 -05:00
helpers.go Add inline venue type 2020-01-07 00:28:13 +08:00
helpers_test.go Add NewInlineQueryResultPhotoWithThumb for #54. 2016-07-26 13:44:48 -05:00
log.go A number of small improvements. 2018-10-08 02:25:09 -05:00
passport.go Fix capitalization in doc. 2018-10-08 14:45:45 -05:00
types.go Merge pull request #294 from mkishere/inline-venue 2020-01-13 00:30:19 -06:00
types_test.go Add type helpers to message entities. 2019-01-10 15:39:47 +03:00

README.md

Golang bindings for the Telegram Bot API

GoDoc Travis

All methods are fairly self explanatory, and reading the godoc page should explain everything. If something isn't clear, open an issue or submit a pull request.

The scope of this project is just to provide a wrapper around the API without any additional features. There are other projects for creating something with plugins and command handlers without having to design all that yourself.

Join the development group if you want to ask questions or discuss development.

Example

First, ensure the library is installed and up to date by running go get -u github.com/go-telegram-bot-api/telegram-bot-api.

This is a very simple bot that just displays any gotten updates, then replies it to that chat.

package main

import (
	"log"

	"github.com/go-telegram-bot-api/telegram-bot-api"
)

func main() {
	bot, err := tgbotapi.NewBotAPI("MyAwesomeBotToken")
	if err != nil {
		log.Panic(err)
	}

	bot.Debug = true

	log.Printf("Authorized on account %s", bot.Self.UserName)

	u := tgbotapi.NewUpdate(0)
	u.Timeout = 60

	updates, err := bot.GetUpdatesChan(u)

	for update := range updates {
		if update.Message == nil { // ignore any non-Message Updates
			continue
		}

		log.Printf("[%s] %s", update.Message.From.UserName, update.Message.Text)

		msg := tgbotapi.NewMessage(update.Message.Chat.ID, update.Message.Text)
		msg.ReplyToMessageID = update.Message.MessageID

		bot.Send(msg)
	}
}

There are more examples on the wiki with detailed information on how to do many different kinds of things. It's a great place to get started on using keyboards, commands, or other kinds of reply markup.

If you need to use webhooks (if you wish to run on Google App Engine), you may use a slightly different method.

package main

import (
	"log"
	"net/http"

	"github.com/go-telegram-bot-api/telegram-bot-api"
)

func main() {
	bot, err := tgbotapi.NewBotAPI("MyAwesomeBotToken")
	if err != nil {
		log.Fatal(err)
	}

	bot.Debug = true

	log.Printf("Authorized on account %s", bot.Self.UserName)

	_, err = bot.SetWebhook(tgbotapi.NewWebhookWithCert("https://www.google.com:8443/"+bot.Token, "cert.pem"))
	if err != nil {
		log.Fatal(err)
	}
	info, err := bot.GetWebhookInfo()
	if err != nil {
		log.Fatal(err)
	}
	if info.LastErrorDate != 0 {
		log.Printf("Telegram callback failed: %s", info.LastErrorMessage)
	}
	updates := bot.ListenForWebhook("/" + bot.Token)
	go http.ListenAndServeTLS("0.0.0.0:8443", "cert.pem", "key.pem", nil)

	for update := range updates {
		log.Printf("%+v\n", update)
	}
}

If you need, you may generate a self signed certficate, as this requires HTTPS / TLS. The above example tells Telegram that this is your certificate and that it should be trusted, even though it is not properly signed.

openssl req -x509 -newkey rsa:2048 -keyout key.pem -out cert.pem -days 3560 -subj "//O=Org\CN=Test" -nodes

Now that Let's Encrypt is available, you may wish to generate your free TLS certificate there.