repo
stringlengths
6
47
file_url
stringlengths
77
269
file_path
stringlengths
5
186
content
stringlengths
0
32.8k
language
stringclasses
1 value
license
stringclasses
7 values
commit_sha
stringlengths
40
40
retrieved_at
stringdate
2026-01-07 08:35:43
2026-01-07 08:55:24
truncated
bool
2 classes
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/store/test/attachment_filter_test.go
store/test/attachment_filter_test.go
package test import ( "testing" "time" "github.com/stretchr/testify/require" ) // ============================================================================= // Filename Field Tests // Schema: filename (string, supports contains) // ============================================================================= func TestAttachmentFilterFilenameContains(t *testing.T) { tc := NewAttachmentFilterTestContext(t) defer tc.Close() tc.CreateAttachment(NewAttachmentBuilder(tc.CreatorID).Filename("report.pdf").MimeType("application/pdf")) tc.CreateAttachment(NewAttachmentBuilder(tc.CreatorID).Filename("document.pdf").MimeType("application/pdf")) tc.CreateAttachment(NewAttachmentBuilder(tc.CreatorID).Filename("image.png").MimeType("image/png")) // Test: filename.contains("report") - single match attachments := tc.ListWithFilter(`filename.contains("report")`) require.Len(t, attachments, 1) require.Contains(t, attachments[0].Filename, "report") // Test: filename.contains(".pdf") - multiple matches attachments = tc.ListWithFilter(`filename.contains(".pdf")`) require.Len(t, attachments, 2) // Test: filename.contains("nonexistent") - no matches attachments = tc.ListWithFilter(`filename.contains("nonexistent")`) require.Len(t, attachments, 0) } func TestAttachmentFilterFilenameSpecialCharacters(t *testing.T) { tc := NewAttachmentFilterTestContext(t) defer tc.Close() tc.CreateAttachment(NewAttachmentBuilder(tc.CreatorID). Filename("file_with-special.chars@2024.pdf").MimeType("application/pdf")) // Test: filename.contains with underscore attachments := tc.ListWithFilter(`filename.contains("_with")`) require.Len(t, attachments, 1) // Test: filename.contains with @ attachments = tc.ListWithFilter(`filename.contains("@2024")`) require.Len(t, attachments, 1) } func TestAttachmentFilterFilenameUnicode(t *testing.T) { tc := NewAttachmentFilterTestContext(t) defer tc.Close() tc.CreateAttachment(NewAttachmentBuilder(tc.CreatorID). Filename("document_报告.pdf").MimeType("application/pdf")) attachments := tc.ListWithFilter(`filename.contains("报告")`) require.Len(t, attachments, 1) } // ============================================================================= // Mime Type Field Tests // Schema: mime_type (string, ==, !=) // ============================================================================= func TestAttachmentFilterMimeTypeEquals(t *testing.T) { tc := NewAttachmentFilterTestContext(t) defer tc.Close() tc.CreateAttachment(NewAttachmentBuilder(tc.CreatorID).Filename("image.png").MimeType("image/png")) tc.CreateAttachment(NewAttachmentBuilder(tc.CreatorID).Filename("photo.jpeg").MimeType("image/jpeg")) tc.CreateAttachment(NewAttachmentBuilder(tc.CreatorID).Filename("document.pdf").MimeType("application/pdf")) // Test: mime_type == "image/png" attachments := tc.ListWithFilter(`mime_type == "image/png"`) require.Len(t, attachments, 1) require.Equal(t, "image/png", attachments[0].Type) // Test: mime_type == "application/pdf" attachments = tc.ListWithFilter(`mime_type == "application/pdf"`) require.Len(t, attachments, 1) require.Equal(t, "application/pdf", attachments[0].Type) } func TestAttachmentFilterMimeTypeNotEquals(t *testing.T) { tc := NewAttachmentFilterTestContext(t) defer tc.Close() tc.CreateAttachment(NewAttachmentBuilder(tc.CreatorID).Filename("image.png").MimeType("image/png")) tc.CreateAttachment(NewAttachmentBuilder(tc.CreatorID).Filename("document.pdf").MimeType("application/pdf")) attachments := tc.ListWithFilter(`mime_type != "image/png"`) require.Len(t, attachments, 1) require.Equal(t, "application/pdf", attachments[0].Type) } func TestAttachmentFilterMimeTypeInList(t *testing.T) { tc := NewAttachmentFilterTestContext(t) defer tc.Close() tc.CreateAttachment(NewAttachmentBuilder(tc.CreatorID).Filename("image.png").MimeType("image/png")) tc.CreateAttachment(NewAttachmentBuilder(tc.CreatorID).Filename("photo.jpeg").MimeType("image/jpeg")) tc.CreateAttachment(NewAttachmentBuilder(tc.CreatorID).Filename("document.pdf").MimeType("application/pdf")) // Test: mime_type in ["image/png", "image/jpeg"] - matches images attachments := tc.ListWithFilter(`mime_type in ["image/png", "image/jpeg"]`) require.Len(t, attachments, 2) // Test: mime_type in ["video/mp4"] - no matches attachments = tc.ListWithFilter(`mime_type in ["video/mp4"]`) require.Len(t, attachments, 0) } // ============================================================================= // Create Time Field Tests // Schema: create_time (timestamp, all comparison operators) // Functions: now(), arithmetic (+, -, *) // ============================================================================= func TestAttachmentFilterCreateTimeComparison(t *testing.T) { tc := NewAttachmentFilterTestContext(t) defer tc.Close() now := time.Now().Unix() tc.CreateAttachment(NewAttachmentBuilder(tc.CreatorID).Filename("test.png").MimeType("image/png")) // Test: create_time < future (should match) attachments := tc.ListWithFilter(`create_time < ` + formatInt64(now+3600)) require.Len(t, attachments, 1) // Test: create_time > past (should match) attachments = tc.ListWithFilter(`create_time > ` + formatInt64(now-3600)) require.Len(t, attachments, 1) // Test: create_time > future (should not match) attachments = tc.ListWithFilter(`create_time > ` + formatInt64(now+3600)) require.Len(t, attachments, 0) } func TestAttachmentFilterCreateTimeWithNow(t *testing.T) { tc := NewAttachmentFilterTestContext(t) defer tc.Close() tc.CreateAttachment(NewAttachmentBuilder(tc.CreatorID).Filename("test.png").MimeType("image/png")) // Test: create_time < now() + 5 (buffer for container clock drift) attachments := tc.ListWithFilter(`create_time < now() + 5`) require.Len(t, attachments, 1) // Test: create_time > now() + 5 (should not match) attachments = tc.ListWithFilter(`create_time > now() + 5`) require.Len(t, attachments, 0) } func TestAttachmentFilterCreateTimeArithmetic(t *testing.T) { tc := NewAttachmentFilterTestContext(t) defer tc.Close() tc.CreateAttachment(NewAttachmentBuilder(tc.CreatorID).Filename("test.png").MimeType("image/png")) // Test: create_time >= now() - 3600 (attachments created in last hour) attachments := tc.ListWithFilter(`create_time >= now() - 3600`) require.Len(t, attachments, 1) // Test: create_time < now() - 86400 (attachments older than 1 day - should be empty) attachments = tc.ListWithFilter(`create_time < now() - 86400`) require.Len(t, attachments, 0) // Test: Multiplication - create_time >= now() - 60 * 60 attachments = tc.ListWithFilter(`create_time >= now() - 60 * 60`) require.Len(t, attachments, 1) } func TestAttachmentFilterAllComparisonOperators(t *testing.T) { tc := NewAttachmentFilterTestContext(t) defer tc.Close() tc.CreateAttachment(NewAttachmentBuilder(tc.CreatorID).Filename("test.png").MimeType("image/png")) // Test: < (less than) attachments := tc.ListWithFilter(`create_time < now() + 3600`) require.Len(t, attachments, 1) // Test: <= (less than or equal) with buffer for clock drift attachments = tc.ListWithFilter(`create_time < now() + 5`) require.Len(t, attachments, 1) // Test: > (greater than) attachments = tc.ListWithFilter(`create_time > now() - 3600`) require.Len(t, attachments, 1) // Test: >= (greater than or equal) attachments = tc.ListWithFilter(`create_time >= now() - 60`) require.Len(t, attachments, 1) } // ============================================================================= // Memo ID Field Tests // Schema: memo_id (int, ==, !=) // ============================================================================= func TestAttachmentFilterMemoIdEquals(t *testing.T) { tc := NewAttachmentFilterTestContextWithUser(t) defer tc.Close() memo1 := tc.CreateMemo("memo-1", "Memo 1") memo2 := tc.CreateMemo("memo-2", "Memo 2") tc.CreateAttachment(NewAttachmentBuilder(tc.CreatorID).Filename("memo1_attachment.png").MimeType("image/png").MemoID(&memo1.ID)) tc.CreateAttachment(NewAttachmentBuilder(tc.CreatorID).Filename("memo2_attachment.png").MimeType("image/png").MemoID(&memo2.ID)) attachments := tc.ListWithFilter(`memo_id == ` + formatInt32(memo1.ID)) require.Len(t, attachments, 1) require.Equal(t, &memo1.ID, attachments[0].MemoID) } func TestAttachmentFilterMemoIdNotEquals(t *testing.T) { tc := NewAttachmentFilterTestContextWithUser(t) defer tc.Close() memo1 := tc.CreateMemo("memo-1", "Memo 1") memo2 := tc.CreateMemo("memo-2", "Memo 2") tc.CreateAttachment(NewAttachmentBuilder(tc.CreatorID).Filename("memo1_attachment.png").MimeType("image/png").MemoID(&memo1.ID)) tc.CreateAttachment(NewAttachmentBuilder(tc.CreatorID).Filename("memo2_attachment.png").MimeType("image/png").MemoID(&memo2.ID)) attachments := tc.ListWithFilter(`memo_id != ` + formatInt32(memo1.ID)) require.Len(t, attachments, 1) require.Equal(t, &memo2.ID, attachments[0].MemoID) } // ============================================================================= // Logical Operator Tests // Operators: && (AND), || (OR), ! (NOT) // ============================================================================= func TestAttachmentFilterLogicalAnd(t *testing.T) { tc := NewAttachmentFilterTestContext(t) defer tc.Close() tc.CreateAttachment(NewAttachmentBuilder(tc.CreatorID).Filename("image.png").MimeType("image/png")) tc.CreateAttachment(NewAttachmentBuilder(tc.CreatorID).Filename("photo.png").MimeType("image/png")) tc.CreateAttachment(NewAttachmentBuilder(tc.CreatorID).Filename("image.pdf").MimeType("application/pdf")) attachments := tc.ListWithFilter(`mime_type == "image/png" && filename.contains("image")`) require.Len(t, attachments, 1) require.Equal(t, "image.png", attachments[0].Filename) } func TestAttachmentFilterLogicalOr(t *testing.T) { tc := NewAttachmentFilterTestContext(t) defer tc.Close() tc.CreateAttachment(NewAttachmentBuilder(tc.CreatorID).Filename("image.png").MimeType("image/png")) tc.CreateAttachment(NewAttachmentBuilder(tc.CreatorID).Filename("document.pdf").MimeType("application/pdf")) tc.CreateAttachment(NewAttachmentBuilder(tc.CreatorID).Filename("video.mp4").MimeType("video/mp4")) attachments := tc.ListWithFilter(`mime_type == "image/png" || mime_type == "application/pdf"`) require.Len(t, attachments, 2) } func TestAttachmentFilterLogicalNot(t *testing.T) { tc := NewAttachmentFilterTestContext(t) defer tc.Close() tc.CreateAttachment(NewAttachmentBuilder(tc.CreatorID).Filename("image.png").MimeType("image/png")) tc.CreateAttachment(NewAttachmentBuilder(tc.CreatorID).Filename("document.pdf").MimeType("application/pdf")) attachments := tc.ListWithFilter(`!(mime_type == "image/png")`) require.Len(t, attachments, 1) require.Equal(t, "application/pdf", attachments[0].Type) } func TestAttachmentFilterComplexLogical(t *testing.T) { tc := NewAttachmentFilterTestContext(t) defer tc.Close() tc.CreateAttachment(NewAttachmentBuilder(tc.CreatorID).Filename("report.png").MimeType("image/png")) tc.CreateAttachment(NewAttachmentBuilder(tc.CreatorID).Filename("report.pdf").MimeType("application/pdf")) tc.CreateAttachment(NewAttachmentBuilder(tc.CreatorID).Filename("other.png").MimeType("image/png")) attachments := tc.ListWithFilter(`(mime_type == "image/png" || mime_type == "application/pdf") && filename.contains("report")`) require.Len(t, attachments, 2) } // ============================================================================= // Multiple Filters Tests // ============================================================================= func TestAttachmentFilterMultipleFilters(t *testing.T) { tc := NewAttachmentFilterTestContext(t) defer tc.Close() tc.CreateAttachment(NewAttachmentBuilder(tc.CreatorID).Filename("report.png").MimeType("image/png")) tc.CreateAttachment(NewAttachmentBuilder(tc.CreatorID).Filename("other.png").MimeType("image/png")) tc.CreateAttachment(NewAttachmentBuilder(tc.CreatorID).Filename("report.pdf").MimeType("application/pdf")) // Test: Multiple filters (applied as AND) attachments := tc.ListWithFilters(`filename.contains("report")`, `mime_type == "image/png"`) require.Len(t, attachments, 1) require.Contains(t, attachments[0].Filename, "report") require.Equal(t, "image/png", attachments[0].Type) } // ============================================================================= // Edge Cases // ============================================================================= func TestAttachmentFilterNoMatches(t *testing.T) { tc := NewAttachmentFilterTestContext(t) defer tc.Close() tc.CreateAttachment(NewAttachmentBuilder(tc.CreatorID).Filename("test.png").MimeType("image/png")) attachments := tc.ListWithFilter(`filename.contains("nonexistent12345")`) require.Len(t, attachments, 0) } func TestAttachmentFilterNullMemoId(t *testing.T) { tc := NewAttachmentFilterTestContextWithUser(t) defer tc.Close() memo := tc.CreateMemo("memo-1", "Memo 1") tc.CreateAttachment(NewAttachmentBuilder(tc.CreatorID).Filename("with_memo.png").MimeType("image/png").MemoID(&memo.ID)) tc.CreateAttachment(NewAttachmentBuilder(tc.CreatorID).Filename("no_memo.png").MimeType("image/png")) // Test: memo_id == null attachments := tc.ListWithFilter(`memo_id == null`) require.Len(t, attachments, 1) require.Equal(t, "no_memo.png", attachments[0].Filename) require.Nil(t, attachments[0].MemoID) // Test: memo_id != null attachments = tc.ListWithFilter(`memo_id != null`) require.Len(t, attachments, 1) require.Equal(t, "with_memo.png", attachments[0].Filename) require.NotNil(t, attachments[0].MemoID) require.Equal(t, memo.ID, *attachments[0].MemoID) } func TestAttachmentFilterEmptyFilename(t *testing.T) { tc := NewAttachmentFilterTestContext(t) defer tc.Close() tc.CreateAttachment(NewAttachmentBuilder(tc.CreatorID).Filename("test.png").MimeType("image/png")) tc.CreateAttachment(NewAttachmentBuilder(tc.CreatorID).Filename("other.pdf").MimeType("application/pdf")) // Test: filename.contains("") - should match all attachments := tc.ListWithFilter(`filename.contains("")`) require.Len(t, attachments, 2) }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/store/test/idp_test.go
store/test/idp_test.go
package test import ( "context" "testing" "github.com/stretchr/testify/require" storepb "github.com/usememos/memos/proto/gen/store" "github.com/usememos/memos/store" ) func TestIdentityProviderStore(t *testing.T) { ctx := context.Background() ts := NewTestingStore(ctx, t) createdIDP, err := ts.CreateIdentityProvider(ctx, &storepb.IdentityProvider{ Name: "GitHub OAuth", Type: storepb.IdentityProvider_OAUTH2, IdentifierFilter: "", Config: &storepb.IdentityProviderConfig{ Config: &storepb.IdentityProviderConfig_Oauth2Config{ Oauth2Config: &storepb.OAuth2Config{ ClientId: "client_id", ClientSecret: "client_secret", AuthUrl: "https://github.com/auth", TokenUrl: "https://github.com/token", UserInfoUrl: "https://github.com/user", Scopes: []string{"login"}, FieldMapping: &storepb.FieldMapping{ Identifier: "login", DisplayName: "name", Email: "email", }, }, }, }, }) require.NoError(t, err) idp, err := ts.GetIdentityProvider(ctx, &store.FindIdentityProvider{ ID: &createdIDP.Id, }) require.NoError(t, err) require.NotNil(t, idp) require.Equal(t, createdIDP, idp) newName := "My GitHub OAuth" updatedIdp, err := ts.UpdateIdentityProvider(ctx, &store.UpdateIdentityProviderV1{ ID: idp.Id, Name: &newName, }) require.NoError(t, err) require.Equal(t, newName, updatedIdp.Name) err = ts.DeleteIdentityProvider(ctx, &store.DeleteIdentityProvider{ ID: idp.Id, }) require.NoError(t, err) idpList, err := ts.ListIdentityProviders(ctx, &store.FindIdentityProvider{}) require.NoError(t, err) require.Equal(t, 0, len(idpList)) ts.Close() }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/store/test/store.go
store/test/store.go
package test import ( "context" "fmt" "net" "os" "testing" // sqlite driver. _ "modernc.org/sqlite" "github.com/joho/godotenv" "github.com/usememos/memos/internal/profile" "github.com/usememos/memos/internal/version" "github.com/usememos/memos/store" "github.com/usememos/memos/store/db" ) // NewTestingStore creates a new testing store with a fresh database. // Each test gets its own isolated database: // - SQLite: new temp file per test // - MySQL/PostgreSQL: new database per test in shared container func NewTestingStore(ctx context.Context, t *testing.T) *store.Store { driver := getDriverFromEnv() profile := getTestingProfileForDriver(t, driver) dbDriver, err := db.NewDBDriver(profile) if err != nil { t.Fatalf("failed to create db driver: %v", err) } store := store.New(dbDriver, profile) if err := store.Migrate(ctx); err != nil { t.Fatalf("failed to migrate db: %v", err) } return store } func getUnusedPort() int { // Get a random unused port listener, err := net.Listen("tcp", "localhost:0") if err != nil { panic(err) } defer listener.Close() // Get the port number port := listener.Addr().(*net.TCPAddr).Port return port } // getTestingProfileForDriver creates a testing profile for a specific driver. func getTestingProfileForDriver(t *testing.T, driver string) *profile.Profile { // Attempt to load .env file if present (optional, for local development) _ = godotenv.Load(".env") // Get a temporary directory for the test data. dir := t.TempDir() mode := "prod" port := getUnusedPort() var dsn string switch driver { case "sqlite": dsn = fmt.Sprintf("%s/memos_%s.db", dir, mode) case "mysql": dsn = GetMySQLDSN(t) case "postgres": dsn = GetPostgresDSN(t) default: t.Fatalf("unsupported driver: %s", driver) } return &profile.Profile{ Mode: mode, Port: port, Data: dir, DSN: dsn, Driver: driver, Version: version.GetCurrentVersion(mode), } } func getDriverFromEnv() string { driver := os.Getenv("DRIVER") if driver == "" { driver = "sqlite" } return driver }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/store/test/containers.go
store/test/containers.go
package test import ( "context" "database/sql" "fmt" "strings" "sync" "sync/atomic" "testing" "time" "github.com/pkg/errors" "github.com/testcontainers/testcontainers-go" "github.com/testcontainers/testcontainers-go/modules/mysql" "github.com/testcontainers/testcontainers-go/modules/postgres" "github.com/testcontainers/testcontainers-go/wait" // Database drivers for connection verification. _ "github.com/go-sql-driver/mysql" _ "github.com/lib/pq" ) const ( testUser = "root" testPassword = "test" ) var ( mysqlContainer *mysql.MySQLContainer postgresContainer *postgres.PostgresContainer mysqlOnce sync.Once postgresOnce sync.Once mysqlBaseDSN string postgresBaseDSN string dbCounter atomic.Int64 ) // GetMySQLDSN starts a MySQL container (if not already running) and creates a fresh database for this test. func GetMySQLDSN(t *testing.T) string { ctx := context.Background() mysqlOnce.Do(func() { container, err := mysql.Run(ctx, "mysql:8", mysql.WithDatabase("init_db"), mysql.WithUsername("root"), mysql.WithPassword(testPassword), testcontainers.WithEnv(map[string]string{ "MYSQL_ROOT_PASSWORD": testPassword, }), testcontainers.WithWaitStrategy( wait.ForAll( wait.ForLog("ready for connections").WithOccurrence(2), wait.ForListeningPort("3306/tcp"), ).WithDeadline(120*time.Second), ), ) if err != nil { t.Fatalf("failed to start MySQL container: %v", err) } mysqlContainer = container dsn, err := container.ConnectionString(ctx, "multiStatements=true") if err != nil { t.Fatalf("failed to get MySQL connection string: %v", err) } if err := waitForDB("mysql", dsn, 30*time.Second); err != nil { t.Fatalf("MySQL not ready for connections: %v", err) } mysqlBaseDSN = dsn }) if mysqlBaseDSN == "" { t.Fatal("MySQL container failed to start in a previous test") } // Create a fresh database for this test dbName := fmt.Sprintf("memos_test_%d", dbCounter.Add(1)) db, err := sql.Open("mysql", mysqlBaseDSN) if err != nil { t.Fatalf("failed to connect to MySQL: %v", err) } defer db.Close() if _, err := db.ExecContext(ctx, fmt.Sprintf("CREATE DATABASE `%s`", dbName)); err != nil { t.Fatalf("failed to create database %s: %v", dbName, err) } // Return DSN pointing to the new database return strings.Replace(mysqlBaseDSN, "/init_db?", "/"+dbName+"?", 1) } // waitForDB polls the database until it's ready or timeout is reached. func waitForDB(driver, dsn string, timeout time.Duration) error { ctx, cancel := context.WithTimeout(context.Background(), timeout) defer cancel() ticker := time.NewTicker(500 * time.Millisecond) defer ticker.Stop() var lastErr error for { select { case <-ctx.Done(): if lastErr != nil { return errors.Errorf("timeout waiting for %s database: %v", driver, lastErr) } return errors.Errorf("timeout waiting for %s database to be ready", driver) case <-ticker.C: db, err := sql.Open(driver, dsn) if err != nil { lastErr = err continue } err = db.PingContext(ctx) db.Close() if err == nil { return nil } lastErr = err } } } // GetPostgresDSN starts a PostgreSQL container (if not already running) and creates a fresh database for this test. func GetPostgresDSN(t *testing.T) string { ctx := context.Background() postgresOnce.Do(func() { container, err := postgres.Run(ctx, "postgres:18", postgres.WithDatabase("init_db"), postgres.WithUsername(testUser), postgres.WithPassword(testPassword), testcontainers.WithWaitStrategy( wait.ForAll( wait.ForLog("database system is ready to accept connections").WithOccurrence(2), wait.ForListeningPort("5432/tcp"), ).WithDeadline(120*time.Second), ), ) if err != nil { t.Fatalf("failed to start PostgreSQL container: %v", err) } postgresContainer = container dsn, err := container.ConnectionString(ctx, "sslmode=disable") if err != nil { t.Fatalf("failed to get PostgreSQL connection string: %v", err) } if err := waitForDB("postgres", dsn, 30*time.Second); err != nil { t.Fatalf("PostgreSQL not ready for connections: %v", err) } postgresBaseDSN = dsn }) if postgresBaseDSN == "" { t.Fatal("PostgreSQL container failed to start in a previous test") } // Create a fresh database for this test dbName := fmt.Sprintf("memos_test_%d", dbCounter.Add(1)) db, err := sql.Open("postgres", postgresBaseDSN) if err != nil { t.Fatalf("failed to connect to PostgreSQL: %v", err) } defer db.Close() if _, err := db.ExecContext(ctx, fmt.Sprintf("CREATE DATABASE %s", dbName)); err != nil { t.Fatalf("failed to create database %s: %v", dbName, err) } // Return DSN pointing to the new database return strings.Replace(postgresBaseDSN, "/init_db?", "/"+dbName+"?", 1) } // TerminateContainers cleans up all running containers. // This is typically called from TestMain. func TerminateContainers() { ctx := context.Background() if mysqlContainer != nil { _ = mysqlContainer.Terminate(ctx) } if postgresContainer != nil { _ = postgresContainer.Terminate(ctx) } }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/store/test/filter_helpers_test.go
store/test/filter_helpers_test.go
package test import ( "context" "strconv" "testing" "github.com/lithammer/shortuuid/v4" "github.com/stretchr/testify/require" storepb "github.com/usememos/memos/proto/gen/store" "github.com/usememos/memos/store" ) // ============================================================================= // Formatting Helpers // ============================================================================= func formatInt64(n int64) string { return strconv.FormatInt(n, 10) } func formatInt32(n int32) string { return strconv.FormatInt(int64(n), 10) } func formatInt(n int) string { return strconv.Itoa(n) } // ============================================================================= // Pointer Helpers // ============================================================================= func boolPtr(b bool) *bool { return &b } // ============================================================================= // Test Fixture Builders // ============================================================================= // MemoBuilder provides a fluent API for creating test memos. type MemoBuilder struct { memo *store.Memo } // NewMemoBuilder creates a new memo builder with required fields. func NewMemoBuilder(uid string, creatorID int32) *MemoBuilder { return &MemoBuilder{ memo: &store.Memo{ UID: uid, CreatorID: creatorID, Visibility: store.Public, }, } } func (b *MemoBuilder) Content(content string) *MemoBuilder { b.memo.Content = content return b } func (b *MemoBuilder) Visibility(v store.Visibility) *MemoBuilder { b.memo.Visibility = v return b } func (b *MemoBuilder) Tags(tags ...string) *MemoBuilder { if b.memo.Payload == nil { b.memo.Payload = &storepb.MemoPayload{} } b.memo.Payload.Tags = tags return b } func (b *MemoBuilder) Property(fn func(*storepb.MemoPayload_Property)) *MemoBuilder { if b.memo.Payload == nil { b.memo.Payload = &storepb.MemoPayload{} } if b.memo.Payload.Property == nil { b.memo.Payload.Property = &storepb.MemoPayload_Property{} } fn(b.memo.Payload.Property) return b } func (b *MemoBuilder) Build() *store.Memo { return b.memo } // AttachmentBuilder provides a fluent API for creating test attachments. type AttachmentBuilder struct { attachment *store.Attachment } // NewAttachmentBuilder creates a new attachment builder with required fields. func NewAttachmentBuilder(creatorID int32) *AttachmentBuilder { return &AttachmentBuilder{ attachment: &store.Attachment{ UID: shortuuid.New(), CreatorID: creatorID, Blob: []byte("test"), Size: 1000, }, } } func (b *AttachmentBuilder) Filename(filename string) *AttachmentBuilder { b.attachment.Filename = filename return b } func (b *AttachmentBuilder) MimeType(mimeType string) *AttachmentBuilder { b.attachment.Type = mimeType return b } func (b *AttachmentBuilder) MemoID(memoID *int32) *AttachmentBuilder { b.attachment.MemoID = memoID return b } func (b *AttachmentBuilder) Size(size int64) *AttachmentBuilder { b.attachment.Size = size return b } func (b *AttachmentBuilder) Build() *store.Attachment { return b.attachment } // ============================================================================= // Test Context Helpers // ============================================================================= // MemoFilterTestContext holds common test dependencies for memo filter tests. type MemoFilterTestContext struct { Ctx context.Context T *testing.T Store *store.Store User *store.User } // NewMemoFilterTestContext creates a new test context with store and user. func NewMemoFilterTestContext(t *testing.T) *MemoFilterTestContext { ctx := context.Background() ts := NewTestingStore(ctx, t) user, err := createTestingHostUser(ctx, ts) require.NoError(t, err) return &MemoFilterTestContext{ Ctx: ctx, T: t, Store: ts, User: user, } } // CreateMemo creates a memo using the builder pattern. func (tc *MemoFilterTestContext) CreateMemo(b *MemoBuilder) *store.Memo { memo, err := tc.Store.CreateMemo(tc.Ctx, b.Build()) require.NoError(tc.T, err) return memo } // PinMemo pins a memo by ID. func (tc *MemoFilterTestContext) PinMemo(memoID int32) { err := tc.Store.UpdateMemo(tc.Ctx, &store.UpdateMemo{ ID: memoID, Pinned: boolPtr(true), }) require.NoError(tc.T, err) } // ListWithFilter lists memos with the given filter and returns the count. func (tc *MemoFilterTestContext) ListWithFilter(filter string) []*store.Memo { memos, err := tc.Store.ListMemos(tc.Ctx, &store.FindMemo{ Filters: []string{filter}, }) require.NoError(tc.T, err) return memos } // ListWithFilters lists memos with multiple filters and returns the count. func (tc *MemoFilterTestContext) ListWithFilters(filters ...string) []*store.Memo { memos, err := tc.Store.ListMemos(tc.Ctx, &store.FindMemo{ Filters: filters, }) require.NoError(tc.T, err) return memos } // Close closes the test store. func (tc *MemoFilterTestContext) Close() { tc.Store.Close() } // AttachmentFilterTestContext holds common test dependencies for attachment filter tests. type AttachmentFilterTestContext struct { Ctx context.Context T *testing.T Store *store.Store User *store.User CreatorID int32 } // NewAttachmentFilterTestContext creates a new test context for attachments. func NewAttachmentFilterTestContext(t *testing.T) *AttachmentFilterTestContext { ctx := context.Background() ts := NewTestingStore(ctx, t) return &AttachmentFilterTestContext{ Ctx: ctx, T: t, Store: ts, CreatorID: 101, } } // NewAttachmentFilterTestContextWithUser creates a new test context with a user. func NewAttachmentFilterTestContextWithUser(t *testing.T) *AttachmentFilterTestContext { ctx := context.Background() ts := NewTestingStore(ctx, t) user, err := createTestingHostUser(ctx, ts) require.NoError(t, err) return &AttachmentFilterTestContext{ Ctx: ctx, T: t, Store: ts, User: user, CreatorID: user.ID, } } // CreateAttachment creates an attachment using the builder pattern. func (tc *AttachmentFilterTestContext) CreateAttachment(b *AttachmentBuilder) *store.Attachment { attachment, err := tc.Store.CreateAttachment(tc.Ctx, b.Build()) require.NoError(tc.T, err) return attachment } // CreateMemo creates a memo (for attachment tests that need memos). func (tc *AttachmentFilterTestContext) CreateMemo(uid, content string) *store.Memo { memo, err := tc.Store.CreateMemo(tc.Ctx, &store.Memo{ UID: uid, CreatorID: tc.CreatorID, Content: content, Visibility: store.Public, }) require.NoError(tc.T, err) return memo } // ListWithFilter lists attachments with the given filter. func (tc *AttachmentFilterTestContext) ListWithFilter(filter string) []*store.Attachment { attachments, err := tc.Store.ListAttachments(tc.Ctx, &store.FindAttachment{ CreatorID: &tc.CreatorID, Filters: []string{filter}, }) require.NoError(tc.T, err) return attachments } // ListWithFilters lists attachments with multiple filters. func (tc *AttachmentFilterTestContext) ListWithFilters(filters ...string) []*store.Attachment { attachments, err := tc.Store.ListAttachments(tc.Ctx, &store.FindAttachment{ CreatorID: &tc.CreatorID, Filters: filters, }) require.NoError(tc.T, err) return attachments } // Close closes the test store. func (tc *AttachmentFilterTestContext) Close() { tc.Store.Close() } // ============================================================================= // Filter Test Case Definition // ============================================================================= // FilterTestCase defines a single filter test case for table-driven tests. type FilterTestCase struct { Name string Filter string ExpectedCount int }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/store/test/instance_setting_test.go
store/test/instance_setting_test.go
package test import ( "context" "testing" "github.com/stretchr/testify/require" storepb "github.com/usememos/memos/proto/gen/store" "github.com/usememos/memos/store" ) func TestInstanceSettingV1Store(t *testing.T) { ctx := context.Background() ts := NewTestingStore(ctx, t) instanceSetting, err := ts.UpsertInstanceSetting(ctx, &storepb.InstanceSetting{ Key: storepb.InstanceSettingKey_GENERAL, Value: &storepb.InstanceSetting_GeneralSetting{ GeneralSetting: &storepb.InstanceGeneralSetting{ AdditionalScript: "", }, }, }) require.NoError(t, err) setting, err := ts.GetInstanceSetting(ctx, &store.FindInstanceSetting{ Name: storepb.InstanceSettingKey_GENERAL.String(), }) require.NoError(t, err) require.Equal(t, instanceSetting, setting) ts.Close() } func TestInstanceSettingGetNonExistent(t *testing.T) { ctx := context.Background() ts := NewTestingStore(ctx, t) // Get non-existent setting setting, err := ts.GetInstanceSetting(ctx, &store.FindInstanceSetting{ Name: storepb.InstanceSettingKey_STORAGE.String(), }) require.NoError(t, err) require.Nil(t, setting) ts.Close() } func TestInstanceSettingUpsertUpdate(t *testing.T) { ctx := context.Background() ts := NewTestingStore(ctx, t) // Create setting _, err := ts.UpsertInstanceSetting(ctx, &storepb.InstanceSetting{ Key: storepb.InstanceSettingKey_GENERAL, Value: &storepb.InstanceSetting_GeneralSetting{ GeneralSetting: &storepb.InstanceGeneralSetting{ AdditionalScript: "console.log('v1')", }, }, }) require.NoError(t, err) // Update setting _, err = ts.UpsertInstanceSetting(ctx, &storepb.InstanceSetting{ Key: storepb.InstanceSettingKey_GENERAL, Value: &storepb.InstanceSetting_GeneralSetting{ GeneralSetting: &storepb.InstanceGeneralSetting{ AdditionalScript: "console.log('v2')", }, }, }) require.NoError(t, err) // Verify update setting, err := ts.GetInstanceSetting(ctx, &store.FindInstanceSetting{ Name: storepb.InstanceSettingKey_GENERAL.String(), }) require.NoError(t, err) require.Equal(t, "console.log('v2')", setting.GetGeneralSetting().AdditionalScript) // Verify only one setting exists list, err := ts.ListInstanceSettings(ctx, &store.FindInstanceSetting{ Name: storepb.InstanceSettingKey_GENERAL.String(), }) require.NoError(t, err) require.Equal(t, 1, len(list)) ts.Close() } func TestInstanceSettingBasicSetting(t *testing.T) { ctx := context.Background() ts := NewTestingStore(ctx, t) // Get default basic setting (should return empty defaults) basicSetting, err := ts.GetInstanceBasicSetting(ctx) require.NoError(t, err) require.NotNil(t, basicSetting) // Set basic setting _, err = ts.UpsertInstanceSetting(ctx, &storepb.InstanceSetting{ Key: storepb.InstanceSettingKey_BASIC, Value: &storepb.InstanceSetting_BasicSetting{ BasicSetting: &storepb.InstanceBasicSetting{ SecretKey: "my-secret-key", }, }, }) require.NoError(t, err) // Verify basicSetting, err = ts.GetInstanceBasicSetting(ctx) require.NoError(t, err) require.Equal(t, "my-secret-key", basicSetting.SecretKey) ts.Close() } func TestInstanceSettingGeneralSetting(t *testing.T) { ctx := context.Background() ts := NewTestingStore(ctx, t) // Get default general setting generalSetting, err := ts.GetInstanceGeneralSetting(ctx) require.NoError(t, err) require.NotNil(t, generalSetting) // Set general setting _, err = ts.UpsertInstanceSetting(ctx, &storepb.InstanceSetting{ Key: storepb.InstanceSettingKey_GENERAL, Value: &storepb.InstanceSetting_GeneralSetting{ GeneralSetting: &storepb.InstanceGeneralSetting{ AdditionalScript: "console.log('test')", AdditionalStyle: "body { color: red; }", }, }, }) require.NoError(t, err) // Verify generalSetting, err = ts.GetInstanceGeneralSetting(ctx) require.NoError(t, err) require.Equal(t, "console.log('test')", generalSetting.AdditionalScript) require.Equal(t, "body { color: red; }", generalSetting.AdditionalStyle) ts.Close() } func TestInstanceSettingMemoRelatedSetting(t *testing.T) { ctx := context.Background() ts := NewTestingStore(ctx, t) // Get default memo related setting (should have defaults) memoSetting, err := ts.GetInstanceMemoRelatedSetting(ctx) require.NoError(t, err) require.NotNil(t, memoSetting) require.GreaterOrEqual(t, memoSetting.ContentLengthLimit, int32(store.DefaultContentLengthLimit)) require.NotEmpty(t, memoSetting.Reactions) // Set custom memo related setting customReactions := []string{"👍", "👎", "🚀"} _, err = ts.UpsertInstanceSetting(ctx, &storepb.InstanceSetting{ Key: storepb.InstanceSettingKey_MEMO_RELATED, Value: &storepb.InstanceSetting_MemoRelatedSetting{ MemoRelatedSetting: &storepb.InstanceMemoRelatedSetting{ ContentLengthLimit: 16384, Reactions: customReactions, }, }, }) require.NoError(t, err) // Verify memoSetting, err = ts.GetInstanceMemoRelatedSetting(ctx) require.NoError(t, err) require.Equal(t, int32(16384), memoSetting.ContentLengthLimit) require.Equal(t, customReactions, memoSetting.Reactions) ts.Close() } func TestInstanceSettingStorageSetting(t *testing.T) { ctx := context.Background() ts := NewTestingStore(ctx, t) // Get default storage setting (should have defaults) storageSetting, err := ts.GetInstanceStorageSetting(ctx) require.NoError(t, err) require.NotNil(t, storageSetting) require.Equal(t, storepb.InstanceStorageSetting_DATABASE, storageSetting.StorageType) require.Equal(t, int64(30), storageSetting.UploadSizeLimitMb) require.Equal(t, "assets/{timestamp}_{filename}", storageSetting.FilepathTemplate) // Set custom storage setting _, err = ts.UpsertInstanceSetting(ctx, &storepb.InstanceSetting{ Key: storepb.InstanceSettingKey_STORAGE, Value: &storepb.InstanceSetting_StorageSetting{ StorageSetting: &storepb.InstanceStorageSetting{ StorageType: storepb.InstanceStorageSetting_LOCAL, UploadSizeLimitMb: 100, FilepathTemplate: "uploads/{date}/{filename}", }, }, }) require.NoError(t, err) // Verify storageSetting, err = ts.GetInstanceStorageSetting(ctx) require.NoError(t, err) require.Equal(t, storepb.InstanceStorageSetting_LOCAL, storageSetting.StorageType) require.Equal(t, int64(100), storageSetting.UploadSizeLimitMb) require.Equal(t, "uploads/{date}/{filename}", storageSetting.FilepathTemplate) ts.Close() } func TestInstanceSettingListAll(t *testing.T) { ctx := context.Background() ts := NewTestingStore(ctx, t) // Count initial settings initialList, err := ts.ListInstanceSettings(ctx, &store.FindInstanceSetting{}) require.NoError(t, err) initialCount := len(initialList) // Create multiple settings _, err = ts.UpsertInstanceSetting(ctx, &storepb.InstanceSetting{ Key: storepb.InstanceSettingKey_GENERAL, Value: &storepb.InstanceSetting_GeneralSetting{ GeneralSetting: &storepb.InstanceGeneralSetting{}, }, }) require.NoError(t, err) _, err = ts.UpsertInstanceSetting(ctx, &storepb.InstanceSetting{ Key: storepb.InstanceSettingKey_STORAGE, Value: &storepb.InstanceSetting_StorageSetting{ StorageSetting: &storepb.InstanceStorageSetting{}, }, }) require.NoError(t, err) // List all - should have 2 more than initial list, err := ts.ListInstanceSettings(ctx, &store.FindInstanceSetting{}) require.NoError(t, err) require.Equal(t, initialCount+2, len(list)) ts.Close() }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/store/test/user_test.go
store/test/user_test.go
package test import ( "context" "fmt" "testing" "github.com/stretchr/testify/require" "golang.org/x/crypto/bcrypt" "github.com/usememos/memos/store" ) func TestUserStore(t *testing.T) { ctx := context.Background() ts := NewTestingStore(ctx, t) user, err := createTestingHostUser(ctx, ts) require.NoError(t, err) users, err := ts.ListUsers(ctx, &store.FindUser{}) require.NoError(t, err) require.Equal(t, 1, len(users)) require.Equal(t, store.RoleHost, users[0].Role) require.Equal(t, user, users[0]) userPatchNickname := "test_nickname_2" userPatch := &store.UpdateUser{ ID: user.ID, Nickname: &userPatchNickname, } user, err = ts.UpdateUser(ctx, userPatch) require.NoError(t, err) require.Equal(t, userPatchNickname, user.Nickname) err = ts.DeleteUser(ctx, &store.DeleteUser{ ID: user.ID, }) require.NoError(t, err) users, err = ts.ListUsers(ctx, &store.FindUser{}) require.NoError(t, err) require.Equal(t, 0, len(users)) ts.Close() } func TestUserGetByID(t *testing.T) { ctx := context.Background() ts := NewTestingStore(ctx, t) user, err := createTestingHostUser(ctx, ts) require.NoError(t, err) // Get user by ID found, err := ts.GetUser(ctx, &store.FindUser{ID: &user.ID}) require.NoError(t, err) require.NotNil(t, found) require.Equal(t, user.ID, found.ID) require.Equal(t, user.Username, found.Username) // Get non-existent user nonExistentID := int32(99999) notFound, err := ts.GetUser(ctx, &store.FindUser{ID: &nonExistentID}) require.NoError(t, err) require.Nil(t, notFound) // Get system bot systemBotID := store.SystemBotID systemBot, err := ts.GetUser(ctx, &store.FindUser{ID: &systemBotID}) require.NoError(t, err) require.NotNil(t, systemBot) require.Equal(t, store.SystemBotID, systemBot.ID) require.Equal(t, "system_bot", systemBot.Username) ts.Close() } func TestUserGetByUsername(t *testing.T) { ctx := context.Background() ts := NewTestingStore(ctx, t) user, err := createTestingHostUser(ctx, ts) require.NoError(t, err) // Get user by username found, err := ts.GetUser(ctx, &store.FindUser{Username: &user.Username}) require.NoError(t, err) require.NotNil(t, found) require.Equal(t, user.Username, found.Username) // Get non-existent username nonExistent := "nonexistent" notFound, err := ts.GetUser(ctx, &store.FindUser{Username: &nonExistent}) require.NoError(t, err) require.Nil(t, notFound) ts.Close() } func TestUserListByRole(t *testing.T) { ctx := context.Background() ts := NewTestingStore(ctx, t) // Create users with different roles _, err := createTestingHostUser(ctx, ts) require.NoError(t, err) adminUser, err := createTestingUserWithRole(ctx, ts, "admin_user", store.RoleAdmin) require.NoError(t, err) regularUser, err := createTestingUserWithRole(ctx, ts, "regular_user", store.RoleUser) require.NoError(t, err) // List all users allUsers, err := ts.ListUsers(ctx, &store.FindUser{}) require.NoError(t, err) require.Equal(t, 3, len(allUsers)) // List only HOST users hostRole := store.RoleHost hostUsers, err := ts.ListUsers(ctx, &store.FindUser{Role: &hostRole}) require.NoError(t, err) require.Equal(t, 1, len(hostUsers)) require.Equal(t, store.RoleHost, hostUsers[0].Role) // List only ADMIN users adminRole := store.RoleAdmin adminUsers, err := ts.ListUsers(ctx, &store.FindUser{Role: &adminRole}) require.NoError(t, err) require.Equal(t, 1, len(adminUsers)) require.Equal(t, adminUser.ID, adminUsers[0].ID) // List only USER role users userRole := store.RoleUser regularUsers, err := ts.ListUsers(ctx, &store.FindUser{Role: &userRole}) require.NoError(t, err) require.Equal(t, 1, len(regularUsers)) require.Equal(t, regularUser.ID, regularUsers[0].ID) ts.Close() } func TestUserUpdateRowStatus(t *testing.T) { ctx := context.Background() ts := NewTestingStore(ctx, t) user, err := createTestingHostUser(ctx, ts) require.NoError(t, err) require.Equal(t, store.Normal, user.RowStatus) // Archive user archivedStatus := store.Archived updated, err := ts.UpdateUser(ctx, &store.UpdateUser{ ID: user.ID, RowStatus: &archivedStatus, }) require.NoError(t, err) require.Equal(t, store.Archived, updated.RowStatus) // Verify by fetching fetched, err := ts.GetUser(ctx, &store.FindUser{ID: &user.ID}) require.NoError(t, err) require.Equal(t, store.Archived, fetched.RowStatus) // Restore to normal normalStatus := store.Normal restored, err := ts.UpdateUser(ctx, &store.UpdateUser{ ID: user.ID, RowStatus: &normalStatus, }) require.NoError(t, err) require.Equal(t, store.Normal, restored.RowStatus) ts.Close() } func TestUserUpdateAllFields(t *testing.T) { ctx := context.Background() ts := NewTestingStore(ctx, t) user, err := createTestingHostUser(ctx, ts) require.NoError(t, err) // Update all fields newUsername := "updated_username" newEmail := "updated@test.com" newNickname := "Updated Nickname" newAvatarURL := "https://example.com/avatar.png" newDescription := "Updated description" newRole := store.RoleAdmin newPasswordHash := "new_password_hash" updated, err := ts.UpdateUser(ctx, &store.UpdateUser{ ID: user.ID, Username: &newUsername, Email: &newEmail, Nickname: &newNickname, AvatarURL: &newAvatarURL, Description: &newDescription, Role: &newRole, PasswordHash: &newPasswordHash, }) require.NoError(t, err) require.Equal(t, newUsername, updated.Username) require.Equal(t, newEmail, updated.Email) require.Equal(t, newNickname, updated.Nickname) require.Equal(t, newAvatarURL, updated.AvatarURL) require.Equal(t, newDescription, updated.Description) require.Equal(t, newRole, updated.Role) require.Equal(t, newPasswordHash, updated.PasswordHash) // Verify by fetching again fetched, err := ts.GetUser(ctx, &store.FindUser{ID: &user.ID}) require.NoError(t, err) require.Equal(t, newUsername, fetched.Username) ts.Close() } func TestUserListWithLimit(t *testing.T) { ctx := context.Background() ts := NewTestingStore(ctx, t) // Create 5 users for i := 0; i < 5; i++ { role := store.RoleUser if i == 0 { role = store.RoleHost } _, err := createTestingUserWithRole(ctx, ts, fmt.Sprintf("user%d", i), role) require.NoError(t, err) } // List with limit limit := 3 users, err := ts.ListUsers(ctx, &store.FindUser{Limit: &limit}) require.NoError(t, err) require.Equal(t, 3, len(users)) ts.Close() } func createTestingHostUser(ctx context.Context, ts *store.Store) (*store.User, error) { return createTestingUserWithRole(ctx, ts, "test", store.RoleHost) } func createTestingUserWithRole(ctx context.Context, ts *store.Store, username string, role store.Role) (*store.User, error) { userCreate := &store.User{ Username: username, Role: role, Email: username + "@test.com", Nickname: username + "_nickname", Description: username + "_description", } passwordHash, err := bcrypt.GenerateFromPassword([]byte("test_password"), bcrypt.DefaultCost) if err != nil { return nil, err } userCreate.PasswordHash = string(passwordHash) user, err := ts.CreateUser(ctx, userCreate) return user, err }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/internal/util/util.go
internal/util/util.go
package util //nolint:revive // util namespace is intentional for shared helpers import ( "crypto/rand" "math/big" "net/mail" "strconv" "strings" "github.com/google/uuid" ) // ConvertStringToInt32 converts a string to int32. func ConvertStringToInt32(src string) (int32, error) { parsed, err := strconv.ParseInt(src, 10, 32) if err != nil { return 0, err } return int32(parsed), nil } // HasPrefixes returns true if the string s has any of the given prefixes. func HasPrefixes(src string, prefixes ...string) bool { for _, prefix := range prefixes { if strings.HasPrefix(src, prefix) { return true } } return false } // ValidateEmail validates the email. func ValidateEmail(email string) bool { if _, err := mail.ParseAddress(email); err != nil { return false } return true } func GenUUID() string { return uuid.New().String() } var letters = []rune("0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ") // RandomString returns a random string with length n. func RandomString(n int) (string, error) { var sb strings.Builder sb.Grow(n) for i := 0; i < n; i++ { // The reason for using crypto/rand instead of math/rand is that // the former relies on hardware to generate random numbers and // thus has a stronger source of random numbers. randNum, err := rand.Int(rand.Reader, big.NewInt(int64(len(letters)))) if err != nil { return "", err } if _, err := sb.WriteRune(letters[randNum.Uint64()]); err != nil { return "", err } } return sb.String(), nil } // ReplaceString replaces all occurrences of old in slice with new. func ReplaceString(slice []string, old, new string) []string { for i, s := range slice { if s == old { slice[i] = new } } return slice }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/internal/util/util_test.go
internal/util/util_test.go
package util //nolint:revive // util is an appropriate package name for utility functions import ( "testing" ) func TestValidateEmail(t *testing.T) { tests := []struct { email string want bool }{ { email: "t@gmail.com", want: true, }, { email: "@usememos.com", want: false, }, { email: "1@gmail", want: true, }, } for _, test := range tests { result := ValidateEmail(test.email) if result != test.want { t.Errorf("Validate Email %s: got result %v, want %v.", test.email, result, test.want) } } }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/internal/base/resource_name_test.go
internal/base/resource_name_test.go
package base import ( "testing" ) func TestUIDMatcher(t *testing.T) { tests := []struct { input string expected bool }{ {"", false}, {"-abc123", false}, {"012345678901234567890123456789", true}, {"1abc-123", true}, {"A123B456C789", true}, {"a", true}, {"ab", true}, {"a*b&c", false}, {"a--b", true}, {"a-1b-2c", true}, {"a1234567890123456789012345678901", true}, {"abc123", true}, {"abc123-", false}, } for _, test := range tests { t.Run(test.input, func(*testing.T) { result := UIDMatcher.MatchString(test.input) if result != test.expected { t.Errorf("For input '%s', expected %v but got %v", test.input, test.expected, result) } }) } }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/internal/base/resource_name.go
internal/base/resource_name.go
package base import "regexp" var ( UIDMatcher = regexp.MustCompile("^[a-zA-Z0-9]([a-zA-Z0-9-]{0,30}[a-zA-Z0-9])?$") )
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/internal/version/version_test.go
internal/version/version_test.go
package version import ( "sort" "testing" "github.com/stretchr/testify/assert" ) func TestIsVersionGreaterOrEqualThan(t *testing.T) { tests := []struct { version string target string want bool }{ { version: "0.9.1", target: "0.9.1", want: true, }, { version: "0.10.0", target: "0.9.1", want: true, }, { version: "0.9.0", target: "0.9.1", want: false, }, } for _, test := range tests { result := IsVersionGreaterOrEqualThan(test.version, test.target) if result != test.want { t.Errorf("got result %v, want %v.", result, test.want) } } } func TestIsVersionGreaterThan(t *testing.T) { tests := []struct { version string target string want bool }{ { version: "0.9.1", target: "0.9.1", want: false, }, { version: "0.10.0", target: "0.8.0", want: true, }, { version: "0.23", target: "0.22", want: true, }, { version: "0.8.0", target: "0.10.0", want: false, }, { version: "0.9.0", target: "0.9.1", want: false, }, { version: "0.22", target: "0.22", want: false, }, } for _, test := range tests { result := IsVersionGreaterThan(test.version, test.target) if result != test.want { t.Errorf("got result %v, want %v.", result, test.want) } } } func TestSortVersion(t *testing.T) { tests := []struct { versionList []string want []string }{ { versionList: []string{"0.9.1", "0.10.0", "0.8.0"}, want: []string{"0.8.0", "0.9.1", "0.10.0"}, }, { versionList: []string{"1.9.1", "0.9.1", "0.10.0", "0.8.0"}, want: []string{"0.8.0", "0.9.1", "0.10.0", "1.9.1"}, }, } for _, test := range tests { sort.Sort(SortVersion(test.versionList)) assert.Equal(t, test.versionList, test.want) } }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/internal/version/version.go
internal/version/version.go
package version import ( "fmt" "strings" "golang.org/x/mod/semver" ) // Version is the service current released version. // Semantic versioning: https://semver.org/ var Version = "0.26.0" // DevVersion is the service current development version. var DevVersion = "0.26.0" func GetCurrentVersion(mode string) string { if mode == "dev" || mode == "demo" { return DevVersion } return Version } // GetMinorVersion extracts the minor version (e.g., "0.25") from a full version string (e.g., "0.25.1"). // Returns the minor version string or empty string if the version format is invalid. // Version format should be "major.minor.patch" (e.g., "0.25.1"). func GetMinorVersion(version string) string { versionList := strings.Split(version, ".") if len(versionList) < 2 { return "" } // Return major.minor only (first two components) return versionList[0] + "." + versionList[1] } // IsVersionGreaterOrEqualThan returns true if version is greater than or equal to target. func IsVersionGreaterOrEqualThan(version, target string) bool { return semver.Compare(fmt.Sprintf("v%s", version), fmt.Sprintf("v%s", target)) > -1 } // IsVersionGreaterThan returns true if version is greater than target. func IsVersionGreaterThan(version, target string) bool { return semver.Compare(fmt.Sprintf("v%s", version), fmt.Sprintf("v%s", target)) > 0 } type SortVersion []string func (s SortVersion) Len() int { return len(s) } func (s SortVersion) Swap(i, j int) { s[i], s[j] = s[j], s[i] } func (s SortVersion) Less(i, j int) bool { v1 := fmt.Sprintf("v%s", s[i]) v2 := fmt.Sprintf("v%s", s[j]) return semver.Compare(v1, v2) == -1 }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/internal/profile/profile.go
internal/profile/profile.go
package profile import ( "fmt" "log/slog" "os" "path/filepath" "runtime" "strings" "github.com/pkg/errors" ) // Profile is the configuration to start main server. type Profile struct { // Mode can be "prod" or "dev" or "demo" Mode string // Addr is the binding address for server Addr string // Port is the binding port for server Port int // UNIXSock is the IPC binding path. Overrides Addr and Port UNIXSock string // Data is the data directory Data string // DSN points to where memos stores its own data DSN string // Driver is the database driver // sqlite, mysql Driver string // Version is the current version of server Version string // InstanceURL is the url of your memos instance. InstanceURL string } func (p *Profile) IsDev() bool { return p.Mode != "prod" } func checkDataDir(dataDir string) (string, error) { // Convert to absolute path if relative path is supplied. if !filepath.IsAbs(dataDir) { relativeDir := filepath.Join(filepath.Dir(os.Args[0]), dataDir) absDir, err := filepath.Abs(relativeDir) if err != nil { return "", err } dataDir = absDir } // Trim trailing \ or / in case user supplies dataDir = strings.TrimRight(dataDir, "\\/") if _, err := os.Stat(dataDir); err != nil { return "", errors.Wrapf(err, "unable to access data folder %s", dataDir) } return dataDir, nil } func (p *Profile) Validate() error { if p.Mode != "demo" && p.Mode != "dev" && p.Mode != "prod" { p.Mode = "demo" } if p.Mode == "prod" && p.Data == "" { if runtime.GOOS == "windows" { p.Data = filepath.Join(os.Getenv("ProgramData"), "memos") if _, err := os.Stat(p.Data); os.IsNotExist(err) { if err := os.MkdirAll(p.Data, 0770); err != nil { slog.Error("failed to create data directory", slog.String("data", p.Data), slog.String("error", err.Error())) return err } } } else { p.Data = "/var/opt/memos" } } dataDir, err := checkDataDir(p.Data) if err != nil { slog.Error("failed to check dsn", slog.String("data", dataDir), slog.String("error", err.Error())) return err } p.Data = dataDir if p.Driver == "sqlite" && p.DSN == "" { dbFile := fmt.Sprintf("memos_%s.db", p.Mode) p.DSN = filepath.Join(dataDir, dbFile) } return nil }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/server.go
server/server.go
package server import ( "context" "fmt" "log/slog" "net" "net/http" "runtime" "time" "github.com/google/uuid" "github.com/labstack/echo/v4" "github.com/labstack/echo/v4/middleware" "github.com/pkg/errors" "github.com/usememos/memos/internal/profile" storepb "github.com/usememos/memos/proto/gen/store" apiv1 "github.com/usememos/memos/server/router/api/v1" "github.com/usememos/memos/server/router/fileserver" "github.com/usememos/memos/server/router/frontend" "github.com/usememos/memos/server/router/rss" "github.com/usememos/memos/server/runner/s3presign" "github.com/usememos/memos/store" ) type Server struct { Secret string Profile *profile.Profile Store *store.Store echoServer *echo.Echo runnerCancelFuncs []context.CancelFunc } func NewServer(ctx context.Context, profile *profile.Profile, store *store.Store) (*Server, error) { s := &Server{ Store: store, Profile: profile, } echoServer := echo.New() echoServer.Debug = true echoServer.HideBanner = true echoServer.HidePort = true echoServer.Use(middleware.Recover()) s.echoServer = echoServer instanceBasicSetting, err := s.getOrUpsertInstanceBasicSetting(ctx) if err != nil { return nil, errors.Wrap(err, "failed to get instance basic setting") } secret := "usememos" if profile.Mode == "prod" { secret = instanceBasicSetting.SecretKey } s.Secret = secret // Register healthz endpoint. echoServer.GET("/healthz", func(c echo.Context) error { return c.String(http.StatusOK, "Service ready.") }) // Serve frontend static files. frontend.NewFrontendService(profile, store).Serve(ctx, echoServer) rootGroup := echoServer.Group("") apiV1Service := apiv1.NewAPIV1Service(s.Secret, profile, store) // Register HTTP file server routes BEFORE gRPC-Gateway to ensure proper range request handling for Safari. // This uses native HTTP serving (http.ServeContent) instead of gRPC for video/audio files. fileServerService := fileserver.NewFileServerService(s.Profile, s.Store, s.Secret) fileServerService.RegisterRoutes(echoServer) // Create and register RSS routes (needs markdown service from apiV1Service). rss.NewRSSService(s.Profile, s.Store, apiV1Service.MarkdownService).RegisterRoutes(rootGroup) // Register gRPC gateway as api v1. if err := apiV1Service.RegisterGateway(ctx, echoServer); err != nil { return nil, errors.Wrap(err, "failed to register gRPC gateway") } return s, nil } func (s *Server) Start(ctx context.Context) error { var address, network string if len(s.Profile.UNIXSock) == 0 { address = fmt.Sprintf("%s:%d", s.Profile.Addr, s.Profile.Port) network = "tcp" } else { address = s.Profile.UNIXSock network = "unix" } listener, err := net.Listen(network, address) if err != nil { return errors.Wrap(err, "failed to listen") } // Start Echo server directly (no cmux needed - all traffic is HTTP). s.echoServer.Listener = listener go func() { if err := s.echoServer.Start(address); err != nil && err != http.ErrServerClosed { slog.Error("failed to start echo server", "error", err) } }() s.StartBackgroundRunners(ctx) return nil } func (s *Server) Shutdown(ctx context.Context) { ctx, cancel := context.WithTimeout(ctx, 10*time.Second) defer cancel() slog.Info("server shutting down") // Cancel all background runners for _, cancelFunc := range s.runnerCancelFuncs { if cancelFunc != nil { cancelFunc() } } // Shutdown echo server. if err := s.echoServer.Shutdown(ctx); err != nil { slog.Error("failed to shutdown server", slog.String("error", err.Error())) } // Close database connection. if err := s.Store.Close(); err != nil { slog.Error("failed to close database", slog.String("error", err.Error())) } slog.Info("memos stopped properly") } func (s *Server) StartBackgroundRunners(ctx context.Context) { // Create a separate context for each background runner // This allows us to control cancellation for each runner independently s3Context, s3Cancel := context.WithCancel(ctx) // Store the cancel function so we can properly shut down runners s.runnerCancelFuncs = append(s.runnerCancelFuncs, s3Cancel) // Create and start S3 presign runner s3presignRunner := s3presign.NewRunner(s.Store) s3presignRunner.RunOnce(ctx) // Start continuous S3 presign runner go func() { s3presignRunner.Run(s3Context) slog.Info("s3presign runner stopped") }() // Log the number of goroutines running slog.Info("background runners started", "goroutines", runtime.NumGoroutine()) } func (s *Server) getOrUpsertInstanceBasicSetting(ctx context.Context) (*storepb.InstanceBasicSetting, error) { instanceBasicSetting, err := s.Store.GetInstanceBasicSetting(ctx) if err != nil { return nil, errors.Wrap(err, "failed to get instance basic setting") } modified := false if instanceBasicSetting.SecretKey == "" { instanceBasicSetting.SecretKey = uuid.NewString() modified = true } if modified { instanceSetting, err := s.Store.UpsertInstanceSetting(ctx, &storepb.InstanceSetting{ Key: storepb.InstanceSettingKey_BASIC, Value: &storepb.InstanceSetting_BasicSetting{BasicSetting: instanceBasicSetting}, }) if err != nil { return nil, errors.Wrap(err, "failed to upsert instance setting") } instanceBasicSetting = instanceSetting.GetBasicSetting() } return instanceBasicSetting, nil }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/auth/token_test.go
server/auth/token_test.go
package auth import ( "testing" "time" "github.com/stretchr/testify/assert" "github.com/stretchr/testify/require" ) func TestGenerateAccessTokenV2(t *testing.T) { secret := []byte("test-secret") t.Run("generates valid access token", func(t *testing.T) { token, expiresAt, err := GenerateAccessTokenV2(1, "testuser", "USER", "ACTIVE", secret) require.NoError(t, err) assert.NotEmpty(t, token) assert.True(t, expiresAt.After(time.Now())) assert.True(t, expiresAt.Before(time.Now().Add(AccessTokenDuration+time.Minute))) }) t.Run("generates different tokens for same user", func(t *testing.T) { token1, _, err := GenerateAccessTokenV2(1, "testuser", "USER", "ACTIVE", secret) require.NoError(t, err) time.Sleep(2 * time.Second) // Ensure different timestamps (tokens have 1s precision) token2, _, err := GenerateAccessTokenV2(1, "testuser", "USER", "ACTIVE", secret) require.NoError(t, err) assert.NotEqual(t, token1, token2, "tokens should be different due to different timestamps") }) } func TestParseAccessTokenV2(t *testing.T) { secret := []byte("test-secret") t.Run("parses valid access token", func(t *testing.T) { token, _, err := GenerateAccessTokenV2(1, "testuser", "USER", "ACTIVE", secret) require.NoError(t, err) claims, err := ParseAccessTokenV2(token, secret) require.NoError(t, err) assert.Equal(t, "1", claims.Subject) assert.Equal(t, "testuser", claims.Username) assert.Equal(t, "USER", claims.Role) assert.Equal(t, "ACTIVE", claims.Status) assert.Equal(t, "access", claims.Type) }) t.Run("fails with wrong secret", func(t *testing.T) { token, _, err := GenerateAccessTokenV2(1, "testuser", "USER", "ACTIVE", secret) require.NoError(t, err) wrongSecret := []byte("wrong-secret") _, err = ParseAccessTokenV2(token, wrongSecret) assert.Error(t, err) }) t.Run("fails with invalid token", func(t *testing.T) { _, err := ParseAccessTokenV2("invalid-token", secret) assert.Error(t, err) }) t.Run("fails with refresh token", func(t *testing.T) { // Generate a refresh token and try to parse it as access token // Should fail because audience mismatch is caught before type check refreshToken, _, err := GenerateRefreshToken(1, "token-id", secret) require.NoError(t, err) _, err = ParseAccessTokenV2(refreshToken, secret) assert.Error(t, err) assert.Contains(t, err.Error(), "invalid audience") }) t.Run("parses token with different roles", func(t *testing.T) { roles := []string{"USER", "ADMIN", "HOST"} for _, role := range roles { token, _, err := GenerateAccessTokenV2(1, "testuser", role, "ACTIVE", secret) require.NoError(t, err) claims, err := ParseAccessTokenV2(token, secret) require.NoError(t, err) assert.Equal(t, role, claims.Role) } }) } func TestGenerateRefreshToken(t *testing.T) { secret := []byte("test-secret") t.Run("generates valid refresh token", func(t *testing.T) { token, expiresAt, err := GenerateRefreshToken(1, "token-id-123", secret) require.NoError(t, err) assert.NotEmpty(t, token) assert.True(t, expiresAt.After(time.Now().Add(29*24*time.Hour))) }) t.Run("generates different tokens for different token IDs", func(t *testing.T) { token1, _, err := GenerateRefreshToken(1, "token-id-1", secret) require.NoError(t, err) token2, _, err := GenerateRefreshToken(1, "token-id-2", secret) require.NoError(t, err) assert.NotEqual(t, token1, token2) }) } func TestParseRefreshToken(t *testing.T) { secret := []byte("test-secret") t.Run("parses valid refresh token", func(t *testing.T) { token, _, err := GenerateRefreshToken(1, "token-id-123", secret) require.NoError(t, err) claims, err := ParseRefreshToken(token, secret) require.NoError(t, err) assert.Equal(t, "1", claims.Subject) assert.Equal(t, "token-id-123", claims.TokenID) assert.Equal(t, "refresh", claims.Type) }) t.Run("fails with wrong secret", func(t *testing.T) { token, _, err := GenerateRefreshToken(1, "token-id-123", secret) require.NoError(t, err) wrongSecret := []byte("wrong-secret") _, err = ParseRefreshToken(token, wrongSecret) assert.Error(t, err) }) t.Run("fails with invalid token", func(t *testing.T) { _, err := ParseRefreshToken("invalid-token", secret) assert.Error(t, err) }) t.Run("fails with access token", func(t *testing.T) { // Generate an access token and try to parse it as refresh token // Should fail because audience mismatch is caught before type check accessToken, _, err := GenerateAccessTokenV2(1, "testuser", "USER", "ACTIVE", secret) require.NoError(t, err) _, err = ParseRefreshToken(accessToken, secret) assert.Error(t, err) assert.Contains(t, err.Error(), "invalid audience") }) } func TestGeneratePersonalAccessToken(t *testing.T) { t.Run("generates token with correct prefix", func(t *testing.T) { token := GeneratePersonalAccessToken() assert.NotEmpty(t, token) assert.True(t, len(token) > len(PersonalAccessTokenPrefix)) assert.Equal(t, PersonalAccessTokenPrefix, token[:len(PersonalAccessTokenPrefix)]) }) t.Run("generates unique tokens", func(t *testing.T) { token1 := GeneratePersonalAccessToken() token2 := GeneratePersonalAccessToken() assert.NotEqual(t, token1, token2) }) t.Run("generates token of sufficient length", func(t *testing.T) { token := GeneratePersonalAccessToken() // Prefix is "memos_pat_" (10 chars) + 32 random chars = at least 42 chars assert.True(t, len(token) >= 42, "token should be at least 42 characters") }) } func TestHashPersonalAccessToken(t *testing.T) { t.Run("generates SHA-256 hash", func(t *testing.T) { token := "memos_pat_abc123" hash := HashPersonalAccessToken(token) assert.NotEmpty(t, hash) assert.Len(t, hash, 64, "SHA-256 hex should be 64 characters") }) t.Run("same input produces same hash", func(t *testing.T) { token := "memos_pat_abc123" hash1 := HashPersonalAccessToken(token) hash2 := HashPersonalAccessToken(token) assert.Equal(t, hash1, hash2) }) t.Run("different inputs produce different hashes", func(t *testing.T) { token1 := "memos_pat_abc123" token2 := "memos_pat_xyz789" hash1 := HashPersonalAccessToken(token1) hash2 := HashPersonalAccessToken(token2) assert.NotEqual(t, hash1, hash2) }) t.Run("hash is deterministic", func(t *testing.T) { token := GeneratePersonalAccessToken() hash1 := HashPersonalAccessToken(token) hash2 := HashPersonalAccessToken(token) assert.Equal(t, hash1, hash2) }) } func TestAccessTokenV2Integration(t *testing.T) { secret := []byte("test-secret") t.Run("full lifecycle: generate, parse, validate", func(t *testing.T) { userID := int32(42) username := "john_doe" role := "ADMIN" status := "ACTIVE" // Generate token token, expiresAt, err := GenerateAccessTokenV2(userID, username, role, status, secret) require.NoError(t, err) assert.NotEmpty(t, token) // Parse token claims, err := ParseAccessTokenV2(token, secret) require.NoError(t, err) // Validate claims assert.Equal(t, "42", claims.Subject) assert.Equal(t, username, claims.Username) assert.Equal(t, role, claims.Role) assert.Equal(t, status, claims.Status) assert.Equal(t, "access", claims.Type) assert.Equal(t, Issuer, claims.Issuer) assert.NotNil(t, claims.IssuedAt) assert.NotNil(t, claims.ExpiresAt) // Validate expiration assert.True(t, claims.ExpiresAt.Equal(expiresAt) || claims.ExpiresAt.Before(expiresAt)) }) } func TestRefreshTokenIntegration(t *testing.T) { secret := []byte("test-secret") t.Run("full lifecycle: generate, parse, validate", func(t *testing.T) { userID := int32(42) tokenID := "unique-token-id-456" // Generate token token, expiresAt, err := GenerateRefreshToken(userID, tokenID, secret) require.NoError(t, err) assert.NotEmpty(t, token) // Parse token claims, err := ParseRefreshToken(token, secret) require.NoError(t, err) // Validate claims assert.Equal(t, "42", claims.Subject) assert.Equal(t, tokenID, claims.TokenID) assert.Equal(t, "refresh", claims.Type) assert.Equal(t, Issuer, claims.Issuer) assert.NotNil(t, claims.IssuedAt) assert.NotNil(t, claims.ExpiresAt) // Validate expiration assert.True(t, claims.ExpiresAt.Equal(expiresAt) || claims.ExpiresAt.Before(expiresAt)) }) } func TestPersonalAccessTokenIntegration(t *testing.T) { t.Run("full lifecycle: generate, hash, verify", func(t *testing.T) { // Generate token token := GeneratePersonalAccessToken() assert.NotEmpty(t, token) assert.True(t, len(token) > len(PersonalAccessTokenPrefix)) // Hash token hash := HashPersonalAccessToken(token) assert.Len(t, hash, 64) // Verify same token produces same hash hashAgain := HashPersonalAccessToken(token) assert.Equal(t, hash, hashAgain) // Verify different token produces different hash token2 := GeneratePersonalAccessToken() hash2 := HashPersonalAccessToken(token2) assert.NotEqual(t, hash, hash2) }) } func TestTokenExpiration(t *testing.T) { secret := []byte("test-secret") t.Run("access token expires after AccessTokenDuration", func(t *testing.T) { _, expiresAt, err := GenerateAccessTokenV2(1, "testuser", "USER", "ACTIVE", secret) require.NoError(t, err) expectedExpiry := time.Now().Add(AccessTokenDuration) delta := expiresAt.Sub(expectedExpiry) assert.True(t, delta < time.Second, "expiration should be within 1 second of expected") }) t.Run("refresh token expires after RefreshTokenDuration", func(t *testing.T) { _, expiresAt, err := GenerateRefreshToken(1, "token-id", secret) require.NoError(t, err) expectedExpiry := time.Now().Add(RefreshTokenDuration) delta := expiresAt.Sub(expectedExpiry) assert.True(t, delta < time.Second, "expiration should be within 1 second of expected") }) }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/auth/token.go
server/auth/token.go
// Package auth provides authentication and authorization for the Memos server. // // This package is used by: // - server/router/api/v1: gRPC and Connect API interceptors // - server/router/fileserver: HTTP file server authentication // // Authentication methods supported: // - JWT access tokens: Short-lived tokens (15 minutes) for API access // - JWT refresh tokens: Long-lived tokens (30 days) for obtaining new access tokens // - Personal Access Tokens (PAT): Long-lived tokens for programmatic access package auth import ( "crypto/sha256" "encoding/hex" "fmt" "time" "github.com/golang-jwt/jwt/v5" "github.com/pkg/errors" "github.com/usememos/memos/internal/util" ) const ( // Issuer is the issuer claim in JWT tokens. // This identifies tokens as issued by Memos. Issuer = "memos" // KeyID is the key identifier used in JWT header. // Version "v1" allows for future key rotation while maintaining backward compatibility. // If signing mechanism changes, add "v2", "v3", etc. and verify both versions. KeyID = "v1" // AccessTokenAudienceName is the audience claim for JWT access tokens. // This ensures tokens are only used for API access, not other purposes. AccessTokenAudienceName = "user.access-token" // AccessTokenDuration is the lifetime of access tokens (15 minutes). AccessTokenDuration = 15 * time.Minute // RefreshTokenDuration is the lifetime of refresh tokens (30 days). RefreshTokenDuration = 30 * 24 * time.Hour // RefreshTokenAudienceName is the audience claim for refresh tokens. RefreshTokenAudienceName = "user.refresh-token" // RefreshTokenCookieName is the cookie name for refresh tokens. RefreshTokenCookieName = "memos_refresh" // PersonalAccessTokenPrefix is the prefix for PAT tokens. PersonalAccessTokenPrefix = "memos_pat_" ) // ClaimsMessage represents the claims structure in a JWT token. // // JWT Claims include: // - name: Username (custom claim) // - iss: Issuer = "memos" // - aud: Audience = "user.access-token" // - sub: Subject = user ID // - iat: Issued at time // - exp: Expiration time (optional, may be empty for never-expiring tokens). type ClaimsMessage struct { Name string `json:"name"` // Username jwt.RegisteredClaims } // AccessTokenClaims contains claims for short-lived access tokens. // These tokens are validated by signature only (stateless). type AccessTokenClaims struct { Type string `json:"type"` // "access" Role string `json:"role"` // User role Status string `json:"status"` // User status Username string `json:"username"` // Username for display jwt.RegisteredClaims } // RefreshTokenClaims contains claims for long-lived refresh tokens. // These tokens are validated against the database for revocation. type RefreshTokenClaims struct { Type string `json:"type"` // "refresh" TokenID string `json:"tid"` // Token ID for revocation lookup jwt.RegisteredClaims } // GenerateAccessToken generates a JWT access token for a user. // // Parameters: // - username: The user's username (stored in "name" claim) // - userID: The user's ID (stored in "sub" claim) // - expirationTime: When the token expires (pass zero time for no expiration) // - secret: Server secret used to sign the token // // Returns a signed JWT string or an error. func GenerateAccessToken(username string, userID int32, expirationTime time.Time, secret []byte) (string, error) { return generateToken(username, userID, AccessTokenAudienceName, expirationTime, secret) } // generateToken generates a JWT token with the given claims. // // Token structure: // Header: {"alg": "HS256", "kid": "v1", "typ": "JWT"} // Claims: {"name": username, "iss": "memos", "aud": [audience], "sub": userID, "iat": now, "exp": expiry} // Signature: HMACSHA256(base64UrlEncode(header) + "." + base64UrlEncode(payload), secret). func generateToken(username string, userID int32, audience string, expirationTime time.Time, secret []byte) (string, error) { registeredClaims := jwt.RegisteredClaims{ Issuer: Issuer, Audience: jwt.ClaimStrings{audience}, IssuedAt: jwt.NewNumericDate(time.Now()), Subject: fmt.Sprint(userID), } if !expirationTime.IsZero() { registeredClaims.ExpiresAt = jwt.NewNumericDate(expirationTime) } // Declare the token with the HS256 algorithm used for signing, and the claims. token := jwt.NewWithClaims(jwt.SigningMethodHS256, &ClaimsMessage{ Name: username, RegisteredClaims: registeredClaims, }) token.Header["kid"] = KeyID // Create the JWT string. tokenString, err := token.SignedString(secret) if err != nil { return "", err } return tokenString, nil } // GenerateAccessTokenV2 generates a short-lived access token with user claims. func GenerateAccessTokenV2(userID int32, username, role, status string, secret []byte) (string, time.Time, error) { expiresAt := time.Now().Add(AccessTokenDuration) claims := &AccessTokenClaims{ Type: "access", Role: role, Status: status, Username: username, RegisteredClaims: jwt.RegisteredClaims{ Issuer: Issuer, Audience: jwt.ClaimStrings{AccessTokenAudienceName}, Subject: fmt.Sprint(userID), IssuedAt: jwt.NewNumericDate(time.Now()), ExpiresAt: jwt.NewNumericDate(expiresAt), }, } token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims) token.Header["kid"] = KeyID tokenString, err := token.SignedString(secret) if err != nil { return "", time.Time{}, err } return tokenString, expiresAt, nil } // GenerateRefreshToken generates a long-lived refresh token. func GenerateRefreshToken(userID int32, tokenID string, secret []byte) (string, time.Time, error) { expiresAt := time.Now().Add(RefreshTokenDuration) claims := &RefreshTokenClaims{ Type: "refresh", TokenID: tokenID, RegisteredClaims: jwt.RegisteredClaims{ Issuer: Issuer, Audience: jwt.ClaimStrings{RefreshTokenAudienceName}, Subject: fmt.Sprint(userID), IssuedAt: jwt.NewNumericDate(time.Now()), ExpiresAt: jwt.NewNumericDate(expiresAt), }, } token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims) token.Header["kid"] = KeyID tokenString, err := token.SignedString(secret) if err != nil { return "", time.Time{}, err } return tokenString, expiresAt, nil } // GeneratePersonalAccessToken generates a random PAT string. func GeneratePersonalAccessToken() string { randomStr, err := util.RandomString(32) if err != nil { // Fallback to UUID if RandomString fails return PersonalAccessTokenPrefix + util.GenUUID() } return PersonalAccessTokenPrefix + randomStr } // HashPersonalAccessToken returns SHA-256 hash of a PAT. func HashPersonalAccessToken(token string) string { hash := sha256.Sum256([]byte(token)) return hex.EncodeToString(hash[:]) } // verifyJWTKeyFunc returns a jwt.Keyfunc that validates the signing method and key ID. func verifyJWTKeyFunc(secret []byte) jwt.Keyfunc { return func(t *jwt.Token) (any, error) { if t.Method.Alg() != jwt.SigningMethodHS256.Name { return nil, errors.Errorf("unexpected signing method: %v", t.Header["alg"]) } kid, ok := t.Header["kid"].(string) if !ok || kid != KeyID { return nil, errors.Errorf("unexpected kid: %v", t.Header["kid"]) } return secret, nil } } // ParseAccessTokenV2 parses and validates a short-lived access token. func ParseAccessTokenV2(tokenString string, secret []byte) (*AccessTokenClaims, error) { claims := &AccessTokenClaims{} _, err := jwt.ParseWithClaims(tokenString, claims, verifyJWTKeyFunc(secret), jwt.WithIssuer(Issuer), jwt.WithAudience(AccessTokenAudienceName), ) if err != nil { return nil, err } if claims.Type != "access" { return nil, errors.New("invalid token type: expected access token") } return claims, nil } // ParseRefreshToken parses and validates a refresh token. func ParseRefreshToken(tokenString string, secret []byte) (*RefreshTokenClaims, error) { claims := &RefreshTokenClaims{} _, err := jwt.ParseWithClaims(tokenString, claims, verifyJWTKeyFunc(secret), jwt.WithIssuer(Issuer), jwt.WithAudience(RefreshTokenAudienceName), ) if err != nil { return nil, err } if claims.Type != "refresh" { return nil, errors.New("invalid token type: expected refresh token") } return claims, nil }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/auth/authenticator.go
server/auth/authenticator.go
package auth import ( "context" "log/slog" "strings" "time" "github.com/pkg/errors" "google.golang.org/protobuf/types/known/timestamppb" "github.com/usememos/memos/internal/util" storepb "github.com/usememos/memos/proto/gen/store" "github.com/usememos/memos/store" ) // Authenticator provides shared authentication and authorization logic. // Used by gRPC interceptor, Connect interceptor, and file server to ensure // consistent authentication behavior across all API endpoints. // // Authentication methods: // - JWT access tokens: Short-lived tokens (15 minutes) for API access // - Personal Access Tokens (PAT): Long-lived tokens for programmatic access // // This struct is safe for concurrent use. type Authenticator struct { store *store.Store secret string } // NewAuthenticator creates a new Authenticator instance. func NewAuthenticator(store *store.Store, secret string) *Authenticator { return &Authenticator{ store: store, secret: secret, } } // AuthenticateByAccessTokenV2 validates a short-lived access token. // Returns claims without database query (stateless validation). func (a *Authenticator) AuthenticateByAccessTokenV2(accessToken string) (*UserClaims, error) { claims, err := ParseAccessTokenV2(accessToken, []byte(a.secret)) if err != nil { return nil, errors.Wrap(err, "invalid access token") } userID, err := util.ConvertStringToInt32(claims.Subject) if err != nil { return nil, errors.Wrap(err, "invalid user ID in token") } return &UserClaims{ UserID: userID, Username: claims.Username, Role: claims.Role, Status: claims.Status, }, nil } // AuthenticateByRefreshToken validates a refresh token against the database. func (a *Authenticator) AuthenticateByRefreshToken(ctx context.Context, refreshToken string) (*store.User, string, error) { claims, err := ParseRefreshToken(refreshToken, []byte(a.secret)) if err != nil { return nil, "", errors.Wrap(err, "invalid refresh token") } userID, err := util.ConvertStringToInt32(claims.Subject) if err != nil { return nil, "", errors.Wrap(err, "invalid user ID in token") } // Check token exists in database (revocation check) token, err := a.store.GetUserRefreshTokenByID(ctx, userID, claims.TokenID) if err != nil { return nil, "", errors.Wrap(err, "failed to get refresh token") } if token == nil { return nil, "", errors.New("refresh token revoked") } // Check token not expired if token.ExpiresAt != nil && token.ExpiresAt.AsTime().Before(time.Now()) { return nil, "", errors.New("refresh token expired") } // Get user user, err := a.store.GetUser(ctx, &store.FindUser{ID: &userID}) if err != nil { return nil, "", errors.Wrap(err, "failed to get user") } if user == nil { return nil, "", errors.New("user not found") } if user.RowStatus == store.Archived { return nil, "", errors.New("user is archived") } return user, claims.TokenID, nil } // AuthenticateByPAT validates a Personal Access Token. func (a *Authenticator) AuthenticateByPAT(ctx context.Context, token string) (*store.User, *storepb.PersonalAccessTokensUserSetting_PersonalAccessToken, error) { if !strings.HasPrefix(token, PersonalAccessTokenPrefix) { return nil, nil, errors.New("invalid PAT format") } tokenHash := HashPersonalAccessToken(token) result, err := a.store.GetUserByPATHash(ctx, tokenHash) if err != nil { return nil, nil, errors.Wrap(err, "invalid PAT") } // Check expiry if result.PAT.ExpiresAt != nil && result.PAT.ExpiresAt.AsTime().Before(time.Now()) { return nil, nil, errors.New("PAT expired") } // Check user status if result.User.RowStatus == store.Archived { return nil, nil, errors.New("user is archived") } return result.User, result.PAT, nil } // AuthResult contains the result of an authentication attempt. type AuthResult struct { User *store.User // Set for PAT authentication Claims *UserClaims // Set for Access Token V2 (stateless) AccessToken string // Non-empty if authenticated via JWT } // Authenticate tries to authenticate using the provided credentials. // Priority: 1. Access Token V2, 2. PAT // Returns nil if no valid credentials are provided. func (a *Authenticator) Authenticate(ctx context.Context, authHeader string) *AuthResult { token := ExtractBearerToken(authHeader) // Try Access Token V2 (stateless) if token != "" && !strings.HasPrefix(token, PersonalAccessTokenPrefix) { claims, err := a.AuthenticateByAccessTokenV2(token) if err == nil && claims != nil { return &AuthResult{ Claims: claims, AccessToken: token, } } } // Try PAT if token != "" && strings.HasPrefix(token, PersonalAccessTokenPrefix) { user, pat, err := a.AuthenticateByPAT(ctx, token) if err == nil && user != nil { // Update last used (fire-and-forget with logging) go func() { if err := a.store.UpdatePATLastUsed(context.Background(), user.ID, pat.TokenId, timestamppb.Now()); err != nil { slog.Warn("failed to update PAT last used time", "error", err, "userID", user.ID) } }() return &AuthResult{User: user, AccessToken: token} } } return nil }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/auth/extract.go
server/auth/extract.go
package auth import ( "net/http" "strings" ) // ExtractBearerToken extracts the JWT token from an Authorization header value. // Expected format: "Bearer {token}" // Returns empty string if no valid bearer token is found. func ExtractBearerToken(authHeader string) string { if authHeader == "" { return "" } parts := strings.Fields(authHeader) if len(parts) != 2 || !strings.EqualFold(parts[0], "bearer") { return "" } return parts[1] } // ExtractRefreshTokenFromCookie extracts the refresh token from cookie header. func ExtractRefreshTokenFromCookie(cookieHeader string) string { if cookieHeader == "" { return "" } req := &http.Request{Header: http.Header{"Cookie": []string{cookieHeader}}} cookie, err := req.Cookie(RefreshTokenCookieName) if err != nil { return "" } return cookie.Value }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/auth/context.go
server/auth/context.go
package auth import ( "context" "github.com/usememos/memos/store" ) // ContextKey is the key type for context values. // Using a custom type prevents collisions with other packages. type ContextKey int const ( // UserIDContextKey stores the authenticated user's ID. // Set for all authenticated requests. // Use GetUserID(ctx) to retrieve this value. UserIDContextKey ContextKey = iota // AccessTokenContextKey stores the JWT token for token-based auth. // Only set when authenticated via Bearer token. AccessTokenContextKey // UserClaimsContextKey stores the claims from access token. UserClaimsContextKey // RefreshTokenIDContextKey stores the refresh token ID. RefreshTokenIDContextKey ) // GetUserID retrieves the authenticated user's ID from the context. // Returns 0 if no user ID is set (unauthenticated request). func GetUserID(ctx context.Context) int32 { if v, ok := ctx.Value(UserIDContextKey).(int32); ok { return v } return 0 } // GetAccessToken retrieves the JWT access token from the context. // Returns empty string if not authenticated via bearer token. func GetAccessToken(ctx context.Context) string { if v, ok := ctx.Value(AccessTokenContextKey).(string); ok { return v } return "" } // SetUserInContext sets the authenticated user's information in the context. // This is a simpler alternative to AuthorizeAndSetContext for cases where // authorization is handled separately (e.g., HTTP middleware). // // Parameters: // - user: The authenticated user // - accessToken: Set if authenticated via JWT token (empty string otherwise) func SetUserInContext(ctx context.Context, user *store.User, accessToken string) context.Context { ctx = context.WithValue(ctx, UserIDContextKey, user.ID) if accessToken != "" { ctx = context.WithValue(ctx, AccessTokenContextKey, accessToken) } return ctx } // UserClaims represents authenticated user info from access token. type UserClaims struct { UserID int32 Username string Role string Status string } // GetUserClaims retrieves the user claims from context. // Returns nil if not authenticated via access token. func GetUserClaims(ctx context.Context) *UserClaims { if v, ok := ctx.Value(UserClaimsContextKey).(*UserClaims); ok { return v } return nil } // SetUserClaimsInContext sets the user claims in context. func SetUserClaimsInContext(ctx context.Context, claims *UserClaims) context.Context { return context.WithValue(ctx, UserClaimsContextKey, claims) }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/runner/memopayload/runner.go
server/runner/memopayload/runner.go
package memopayload import ( "context" "log/slog" "github.com/pkg/errors" "github.com/usememos/memos/plugin/markdown" storepb "github.com/usememos/memos/proto/gen/store" "github.com/usememos/memos/store" ) type Runner struct { Store *store.Store MarkdownService markdown.Service } func NewRunner(store *store.Store, markdownService markdown.Service) *Runner { return &Runner{ Store: store, MarkdownService: markdownService, } } // RunOnce rebuilds the payload of all memos. func (r *Runner) RunOnce(ctx context.Context) { // Process memos in batches to avoid loading all memos into memory at once const batchSize = 100 offset := 0 processed := 0 for { limit := batchSize memos, err := r.Store.ListMemos(ctx, &store.FindMemo{ Limit: &limit, Offset: &offset, }) if err != nil { slog.Error("failed to list memos", "err", err) return } // Break if no more memos if len(memos) == 0 { break } // Process batch batchSuccessCount := 0 for _, memo := range memos { if err := RebuildMemoPayload(memo, r.MarkdownService); err != nil { slog.Error("failed to rebuild memo payload", "err", err, "memoID", memo.ID) continue } if err := r.Store.UpdateMemo(ctx, &store.UpdateMemo{ ID: memo.ID, Payload: memo.Payload, }); err != nil { slog.Error("failed to update memo", "err", err, "memoID", memo.ID) continue } batchSuccessCount++ } processed += len(memos) slog.Info("Processed memo batch", "batchSize", len(memos), "successCount", batchSuccessCount, "totalProcessed", processed) // Move to next batch offset += len(memos) } } func RebuildMemoPayload(memo *store.Memo, markdownService markdown.Service) error { if memo.Payload == nil { memo.Payload = &storepb.MemoPayload{} } // Use goldmark service to extract all metadata in a single pass (more efficient) data, err := markdownService.ExtractAll([]byte(memo.Content)) if err != nil { return errors.Wrap(err, "failed to extract markdown metadata") } memo.Payload.Tags = data.Tags memo.Payload.Property = data.Property return nil }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/runner/s3presign/runner.go
server/runner/s3presign/runner.go
package s3presign import ( "context" "log/slog" "time" "google.golang.org/protobuf/types/known/timestamppb" "github.com/usememos/memos/plugin/storage/s3" storepb "github.com/usememos/memos/proto/gen/store" "github.com/usememos/memos/store" ) type Runner struct { Store *store.Store } func NewRunner(store *store.Store) *Runner { return &Runner{ Store: store, } } // Schedule runner every 12 hours. const runnerInterval = time.Hour * 12 func (r *Runner) Run(ctx context.Context) { ticker := time.NewTicker(runnerInterval) defer ticker.Stop() for { select { case <-ticker.C: r.RunOnce(ctx) case <-ctx.Done(): return } } } func (r *Runner) RunOnce(ctx context.Context) { r.CheckAndPresign(ctx) } func (r *Runner) CheckAndPresign(ctx context.Context) { instanceStorageSetting, err := r.Store.GetInstanceStorageSetting(ctx) if err != nil { return } s3StorageType := storepb.AttachmentStorageType_S3 // Limit attachments to a reasonable batch size const batchSize = 100 offset := 0 for { limit := batchSize attachments, err := r.Store.ListAttachments(ctx, &store.FindAttachment{ GetBlob: false, StorageType: &s3StorageType, Limit: &limit, Offset: &offset, }) if err != nil { slog.Error("Failed to list attachments for presigning", "error", err) return } // Break if no more attachments if len(attachments) == 0 { break } // Process batch of attachments presignCount := 0 for _, attachment := range attachments { s3ObjectPayload := attachment.Payload.GetS3Object() if s3ObjectPayload == nil { continue } if s3ObjectPayload.LastPresignedTime != nil { // Skip if the presigned URL is still valid for the next 4 days. // The expiration time is set to 5 days. if time.Now().Before(s3ObjectPayload.LastPresignedTime.AsTime().Add(4 * 24 * time.Hour)) { continue } } s3Config := instanceStorageSetting.GetS3Config() if s3ObjectPayload.S3Config != nil { s3Config = s3ObjectPayload.S3Config } if s3Config == nil { slog.Error("S3 config is not found") continue } s3Client, err := s3.NewClient(ctx, s3Config) if err != nil { slog.Error("Failed to create S3 client", "error", err) continue } presignURL, err := s3Client.PresignGetObject(ctx, s3ObjectPayload.Key) if err != nil { slog.Error("Failed to presign URL", "error", err, "attachmentID", attachment.ID) continue } s3ObjectPayload.S3Config = s3Config s3ObjectPayload.LastPresignedTime = timestamppb.New(time.Now()) if err := r.Store.UpdateAttachment(ctx, &store.UpdateAttachment{ ID: attachment.ID, Reference: &presignURL, Payload: &storepb.AttachmentPayload{ Payload: &storepb.AttachmentPayload_S3Object_{ S3Object: s3ObjectPayload, }, }, }); err != nil { slog.Error("Failed to update attachment", "error", err, "attachmentID", attachment.ID) continue } presignCount++ } slog.Info("Presigned batch of S3 attachments", "batchSize", len(attachments), "presigned", presignCount) // Move to next batch offset += len(attachments) } }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/router/rss/rss.go
server/router/rss/rss.go
package rss import ( "context" "crypto/sha256" "fmt" "net/http" "regexp" "strconv" "strings" "sync" "time" "github.com/gorilla/feeds" "github.com/labstack/echo/v4" "github.com/usememos/memos/internal/profile" "github.com/usememos/memos/plugin/markdown" storepb "github.com/usememos/memos/proto/gen/store" "github.com/usememos/memos/store" ) const ( maxRSSItemCount = 100 defaultCacheDuration = 1 * time.Hour maxCacheSize = 50 // Maximum number of cached feeds ) var ( // Regex to match markdown headings at the start of a line. markdownHeadingRegex = regexp.MustCompile(`^#{1,6}\s*`) ) // cacheEntry represents a cached RSS feed with expiration. type cacheEntry struct { content string etag string lastModified time.Time createdAt time.Time } type RSSService struct { Profile *profile.Profile Store *store.Store MarkdownService markdown.Service // Cache for RSS feeds cache map[string]*cacheEntry cacheMutex sync.RWMutex } type RSSHeading struct { Title string Description string Language string } func NewRSSService(profile *profile.Profile, store *store.Store, markdownService markdown.Service) *RSSService { return &RSSService{ Profile: profile, Store: store, MarkdownService: markdownService, cache: make(map[string]*cacheEntry), } } func (s *RSSService) RegisterRoutes(g *echo.Group) { g.GET("/explore/rss.xml", s.GetExploreRSS) g.GET("/u/:username/rss.xml", s.GetUserRSS) } func (s *RSSService) GetExploreRSS(c echo.Context) error { ctx := c.Request().Context() cacheKey := "explore" // Check cache first if cached := s.getFromCache(cacheKey); cached != nil { // Check ETag for conditional request if c.Request().Header.Get("If-None-Match") == cached.etag { return c.NoContent(http.StatusNotModified) } s.setRSSHeaders(c, cached.etag, cached.lastModified) return c.String(http.StatusOK, cached.content) } normalStatus := store.Normal limit := maxRSSItemCount memoFind := store.FindMemo{ RowStatus: &normalStatus, VisibilityList: []store.Visibility{store.Public}, Limit: &limit, } memoList, err := s.Store.ListMemos(ctx, &memoFind) if err != nil { return echo.NewHTTPError(http.StatusInternalServerError, "Failed to find memo list").SetInternal(err) } baseURL := c.Scheme() + "://" + c.Request().Host rss, lastModified, err := s.generateRSSFromMemoList(ctx, memoList, baseURL, nil) if err != nil { return echo.NewHTTPError(http.StatusInternalServerError, "Failed to generate rss").SetInternal(err) } // Cache the result etag := s.putInCache(cacheKey, rss, lastModified) s.setRSSHeaders(c, etag, lastModified) return c.String(http.StatusOK, rss) } func (s *RSSService) GetUserRSS(c echo.Context) error { ctx := c.Request().Context() username := c.Param("username") cacheKey := "user:" + username // Check cache first if cached := s.getFromCache(cacheKey); cached != nil { // Check ETag for conditional request if c.Request().Header.Get("If-None-Match") == cached.etag { return c.NoContent(http.StatusNotModified) } s.setRSSHeaders(c, cached.etag, cached.lastModified) return c.String(http.StatusOK, cached.content) } user, err := s.Store.GetUser(ctx, &store.FindUser{ Username: &username, }) if err != nil { return echo.NewHTTPError(http.StatusInternalServerError, "Failed to find user").SetInternal(err) } if user == nil { return echo.NewHTTPError(http.StatusNotFound, "User not found") } normalStatus := store.Normal limit := maxRSSItemCount memoFind := store.FindMemo{ CreatorID: &user.ID, RowStatus: &normalStatus, VisibilityList: []store.Visibility{store.Public}, Limit: &limit, } memoList, err := s.Store.ListMemos(ctx, &memoFind) if err != nil { return echo.NewHTTPError(http.StatusInternalServerError, "Failed to find memo list").SetInternal(err) } baseURL := c.Scheme() + "://" + c.Request().Host rss, lastModified, err := s.generateRSSFromMemoList(ctx, memoList, baseURL, user) if err != nil { return echo.NewHTTPError(http.StatusInternalServerError, "Failed to generate rss").SetInternal(err) } // Cache the result etag := s.putInCache(cacheKey, rss, lastModified) s.setRSSHeaders(c, etag, lastModified) return c.String(http.StatusOK, rss) } func (s *RSSService) generateRSSFromMemoList(ctx context.Context, memoList []*store.Memo, baseURL string, user *store.User) (string, time.Time, error) { rssHeading, err := getRSSHeading(ctx, s.Store) if err != nil { return "", time.Time{}, err } feed := &feeds.Feed{ Title: rssHeading.Title, Link: &feeds.Link{Href: baseURL}, Description: rssHeading.Description, Created: time.Now(), } var itemCountLimit = min(len(memoList), maxRSSItemCount) if itemCountLimit == 0 { // Return empty feed if no memos rss, err := feed.ToRss() return rss, time.Time{}, err } // Track the most recent update time for Last-Modified header var lastModified time.Time if len(memoList) > 0 { lastModified = time.Unix(memoList[0].UpdatedTs, 0) } // Batch load all attachments for all memos to avoid N+1 query problem memoIDs := make([]int32, itemCountLimit) for i := 0; i < itemCountLimit; i++ { memoIDs[i] = memoList[i].ID } allAttachments, err := s.Store.ListAttachments(ctx, &store.FindAttachment{ MemoIDList: memoIDs, }) if err != nil { return "", lastModified, err } // Group attachments by memo ID for quick lookup attachmentsByMemoID := make(map[int32][]*store.Attachment) for _, attachment := range allAttachments { if attachment.MemoID != nil { attachmentsByMemoID[*attachment.MemoID] = append(attachmentsByMemoID[*attachment.MemoID], attachment) } } // Batch load all memo creators creatorMap := make(map[int32]*store.User) if user != nil { // Single user feed - reuse the user object creatorMap[user.ID] = user } else { // Multi-user feed - batch load all unique creators creatorIDs := make(map[int32]bool) for _, memo := range memoList[:itemCountLimit] { creatorIDs[memo.CreatorID] = true } // Batch load all users with a single query by getting all users and filtering // Note: This is more efficient than N separate queries for creatorID := range creatorIDs { creator, err := s.Store.GetUser(ctx, &store.FindUser{ID: &creatorID}) if err == nil && creator != nil { creatorMap[creatorID] = creator } } } // Generate feed items feed.Items = make([]*feeds.Item, itemCountLimit) for i := 0; i < itemCountLimit; i++ { memo := memoList[i] // Generate item title from memo content title := s.generateItemTitle(memo.Content) // Render content as HTML htmlContent, err := s.getRSSItemDescription(memo.Content) if err != nil { return "", lastModified, err } link := &feeds.Link{Href: baseURL + "/memos/" + memo.UID} item := &feeds.Item{ Title: title, Link: link, Description: htmlContent, // Summary/excerpt Content: htmlContent, // Full content in content:encoded Created: time.Unix(memo.CreatedTs, 0), Updated: time.Unix(memo.UpdatedTs, 0), Id: link.Href, } // Add author information if creator, ok := creatorMap[memo.CreatorID]; ok { authorName := creator.Nickname if authorName == "" { authorName = creator.Username } item.Author = &feeds.Author{ Name: authorName, Email: creator.Email, } } // Note: gorilla/feeds doesn't support categories in RSS items // Tags could be added to the description or content if needed // Add first attachment as enclosure if attachments, ok := attachmentsByMemoID[memo.ID]; ok && len(attachments) > 0 { attachment := attachments[0] enclosure := feeds.Enclosure{} if attachment.StorageType == storepb.AttachmentStorageType_EXTERNAL || attachment.StorageType == storepb.AttachmentStorageType_S3 { enclosure.Url = attachment.Reference } else { enclosure.Url = fmt.Sprintf("%s/file/attachments/%s/%s", baseURL, attachment.UID, attachment.Filename) } enclosure.Length = strconv.Itoa(int(attachment.Size)) enclosure.Type = attachment.Type item.Enclosure = &enclosure } feed.Items[i] = item } rss, err := feed.ToRss() if err != nil { return "", lastModified, err } return rss, lastModified, nil } func (*RSSService) generateItemTitle(content string) string { // Extract first line as title lines := strings.Split(content, "\n") title := strings.TrimSpace(lines[0]) // Remove markdown heading syntax using regex (handles # to ###### with optional spaces) title = markdownHeadingRegex.ReplaceAllString(title, "") title = strings.TrimSpace(title) // Limit title length const maxTitleLength = 100 if len(title) > maxTitleLength { // Find last space before limit to avoid cutting words cutoff := maxTitleLength for i := min(maxTitleLength-1, len(title)-1); i > 0; i-- { if title[i] == ' ' { cutoff = i break } } if cutoff < maxTitleLength { title = title[:cutoff] + "..." } else { // No space found, just truncate title = title[:maxTitleLength] + "..." } } // If title is empty, use a default if title == "" { title = "Memo" } return title } func (s *RSSService) getRSSItemDescription(content string) (string, error) { html, err := s.MarkdownService.RenderHTML([]byte(content)) if err != nil { return "", err } return html, nil } // getFromCache retrieves a cached feed entry if it exists and is not expired. func (s *RSSService) getFromCache(key string) *cacheEntry { s.cacheMutex.RLock() entry, exists := s.cache[key] s.cacheMutex.RUnlock() if !exists { return nil } // Check if cache entry is still valid if time.Since(entry.createdAt) > defaultCacheDuration { // Entry is expired, remove it s.cacheMutex.Lock() delete(s.cache, key) s.cacheMutex.Unlock() return nil } return entry } // putInCache stores a feed in the cache and returns its ETag. func (s *RSSService) putInCache(key, content string, lastModified time.Time) string { s.cacheMutex.Lock() defer s.cacheMutex.Unlock() // Generate ETag from content hash hash := sha256.Sum256([]byte(content)) etag := fmt.Sprintf(`"%x"`, hash[:8]) // Implement simple LRU: if cache is too large, remove oldest entries if len(s.cache) >= maxCacheSize { var oldestKey string var oldestTime time.Time for k, v := range s.cache { if oldestKey == "" || v.createdAt.Before(oldestTime) { oldestKey = k oldestTime = v.createdAt } } if oldestKey != "" { delete(s.cache, oldestKey) } } s.cache[key] = &cacheEntry{ content: content, etag: etag, lastModified: lastModified, createdAt: time.Now(), } return etag } // setRSSHeaders sets appropriate HTTP headers for RSS responses. func (*RSSService) setRSSHeaders(c echo.Context, etag string, lastModified time.Time) { c.Response().Header().Set(echo.HeaderContentType, "application/rss+xml; charset=utf-8") c.Response().Header().Set(echo.HeaderCacheControl, fmt.Sprintf("public, max-age=%d", int(defaultCacheDuration.Seconds()))) c.Response().Header().Set("ETag", etag) if !lastModified.IsZero() { c.Response().Header().Set("Last-Modified", lastModified.UTC().Format(http.TimeFormat)) } } func getRSSHeading(ctx context.Context, stores *store.Store) (RSSHeading, error) { settings, err := stores.GetInstanceGeneralSetting(ctx) if err != nil { return RSSHeading{}, err } if settings == nil || settings.CustomProfile == nil { return RSSHeading{ Title: "Memos", Description: "An open source, lightweight note-taking service. Easily capture and share your great thoughts.", Language: "en-us", }, nil } customProfile := settings.CustomProfile return RSSHeading{ Title: customProfile.Title, Description: customProfile.Description, Language: "en-us", }, nil }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/router/api/v1/connect_services.go
server/router/api/v1/connect_services.go
package v1 import ( "context" "connectrpc.com/connect" "google.golang.org/protobuf/types/known/emptypb" v1pb "github.com/usememos/memos/proto/gen/api/v1" ) // This file contains all Connect service handler method implementations. // Each method delegates to the underlying gRPC service implementation, // converting between Connect and gRPC request/response types. // InstanceService func (s *ConnectServiceHandler) GetInstanceProfile(ctx context.Context, req *connect.Request[v1pb.GetInstanceProfileRequest]) (*connect.Response[v1pb.InstanceProfile], error) { resp, err := s.APIV1Service.GetInstanceProfile(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) GetInstanceSetting(ctx context.Context, req *connect.Request[v1pb.GetInstanceSettingRequest]) (*connect.Response[v1pb.InstanceSetting], error) { resp, err := s.APIV1Service.GetInstanceSetting(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) UpdateInstanceSetting(ctx context.Context, req *connect.Request[v1pb.UpdateInstanceSettingRequest]) (*connect.Response[v1pb.InstanceSetting], error) { resp, err := s.APIV1Service.UpdateInstanceSetting(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } // AuthService // // Auth service methods need special handling for response headers (cookies). // We use connectWithHeaderCarrier helper to inject a header carrier into the context, // which allows the service to set headers in a protocol-agnostic way. func (s *ConnectServiceHandler) GetCurrentUser(ctx context.Context, req *connect.Request[v1pb.GetCurrentUserRequest]) (*connect.Response[v1pb.GetCurrentUserResponse], error) { return connectWithHeaderCarrier(ctx, func(ctx context.Context) (*v1pb.GetCurrentUserResponse, error) { return s.APIV1Service.GetCurrentUser(ctx, req.Msg) }) } func (s *ConnectServiceHandler) SignIn(ctx context.Context, req *connect.Request[v1pb.SignInRequest]) (*connect.Response[v1pb.SignInResponse], error) { return connectWithHeaderCarrier(ctx, func(ctx context.Context) (*v1pb.SignInResponse, error) { return s.APIV1Service.SignIn(ctx, req.Msg) }) } func (s *ConnectServiceHandler) SignOut(ctx context.Context, req *connect.Request[v1pb.SignOutRequest]) (*connect.Response[emptypb.Empty], error) { return connectWithHeaderCarrier(ctx, func(ctx context.Context) (*emptypb.Empty, error) { return s.APIV1Service.SignOut(ctx, req.Msg) }) } func (s *ConnectServiceHandler) RefreshToken(ctx context.Context, req *connect.Request[v1pb.RefreshTokenRequest]) (*connect.Response[v1pb.RefreshTokenResponse], error) { return connectWithHeaderCarrier(ctx, func(ctx context.Context) (*v1pb.RefreshTokenResponse, error) { return s.APIV1Service.RefreshToken(ctx, req.Msg) }) } // UserService func (s *ConnectServiceHandler) ListUsers(ctx context.Context, req *connect.Request[v1pb.ListUsersRequest]) (*connect.Response[v1pb.ListUsersResponse], error) { resp, err := s.APIV1Service.ListUsers(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) GetUser(ctx context.Context, req *connect.Request[v1pb.GetUserRequest]) (*connect.Response[v1pb.User], error) { resp, err := s.APIV1Service.GetUser(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) CreateUser(ctx context.Context, req *connect.Request[v1pb.CreateUserRequest]) (*connect.Response[v1pb.User], error) { resp, err := s.APIV1Service.CreateUser(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) UpdateUser(ctx context.Context, req *connect.Request[v1pb.UpdateUserRequest]) (*connect.Response[v1pb.User], error) { resp, err := s.APIV1Service.UpdateUser(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) DeleteUser(ctx context.Context, req *connect.Request[v1pb.DeleteUserRequest]) (*connect.Response[emptypb.Empty], error) { resp, err := s.APIV1Service.DeleteUser(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) ListAllUserStats(ctx context.Context, req *connect.Request[v1pb.ListAllUserStatsRequest]) (*connect.Response[v1pb.ListAllUserStatsResponse], error) { resp, err := s.APIV1Service.ListAllUserStats(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) GetUserStats(ctx context.Context, req *connect.Request[v1pb.GetUserStatsRequest]) (*connect.Response[v1pb.UserStats], error) { resp, err := s.APIV1Service.GetUserStats(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) GetUserSetting(ctx context.Context, req *connect.Request[v1pb.GetUserSettingRequest]) (*connect.Response[v1pb.UserSetting], error) { resp, err := s.APIV1Service.GetUserSetting(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) UpdateUserSetting(ctx context.Context, req *connect.Request[v1pb.UpdateUserSettingRequest]) (*connect.Response[v1pb.UserSetting], error) { resp, err := s.APIV1Service.UpdateUserSetting(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) ListUserSettings(ctx context.Context, req *connect.Request[v1pb.ListUserSettingsRequest]) (*connect.Response[v1pb.ListUserSettingsResponse], error) { resp, err := s.APIV1Service.ListUserSettings(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) ListPersonalAccessTokens(ctx context.Context, req *connect.Request[v1pb.ListPersonalAccessTokensRequest]) (*connect.Response[v1pb.ListPersonalAccessTokensResponse], error) { resp, err := s.APIV1Service.ListPersonalAccessTokens(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) CreatePersonalAccessToken(ctx context.Context, req *connect.Request[v1pb.CreatePersonalAccessTokenRequest]) (*connect.Response[v1pb.CreatePersonalAccessTokenResponse], error) { resp, err := s.APIV1Service.CreatePersonalAccessToken(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) DeletePersonalAccessToken(ctx context.Context, req *connect.Request[v1pb.DeletePersonalAccessTokenRequest]) (*connect.Response[emptypb.Empty], error) { resp, err := s.APIV1Service.DeletePersonalAccessToken(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) ListUserWebhooks(ctx context.Context, req *connect.Request[v1pb.ListUserWebhooksRequest]) (*connect.Response[v1pb.ListUserWebhooksResponse], error) { resp, err := s.APIV1Service.ListUserWebhooks(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) CreateUserWebhook(ctx context.Context, req *connect.Request[v1pb.CreateUserWebhookRequest]) (*connect.Response[v1pb.UserWebhook], error) { resp, err := s.APIV1Service.CreateUserWebhook(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) UpdateUserWebhook(ctx context.Context, req *connect.Request[v1pb.UpdateUserWebhookRequest]) (*connect.Response[v1pb.UserWebhook], error) { resp, err := s.APIV1Service.UpdateUserWebhook(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) DeleteUserWebhook(ctx context.Context, req *connect.Request[v1pb.DeleteUserWebhookRequest]) (*connect.Response[emptypb.Empty], error) { resp, err := s.APIV1Service.DeleteUserWebhook(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) ListUserNotifications(ctx context.Context, req *connect.Request[v1pb.ListUserNotificationsRequest]) (*connect.Response[v1pb.ListUserNotificationsResponse], error) { resp, err := s.APIV1Service.ListUserNotifications(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) UpdateUserNotification(ctx context.Context, req *connect.Request[v1pb.UpdateUserNotificationRequest]) (*connect.Response[v1pb.UserNotification], error) { resp, err := s.APIV1Service.UpdateUserNotification(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) DeleteUserNotification(ctx context.Context, req *connect.Request[v1pb.DeleteUserNotificationRequest]) (*connect.Response[emptypb.Empty], error) { resp, err := s.APIV1Service.DeleteUserNotification(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } // MemoService func (s *ConnectServiceHandler) CreateMemo(ctx context.Context, req *connect.Request[v1pb.CreateMemoRequest]) (*connect.Response[v1pb.Memo], error) { resp, err := s.APIV1Service.CreateMemo(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) ListMemos(ctx context.Context, req *connect.Request[v1pb.ListMemosRequest]) (*connect.Response[v1pb.ListMemosResponse], error) { resp, err := s.APIV1Service.ListMemos(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) GetMemo(ctx context.Context, req *connect.Request[v1pb.GetMemoRequest]) (*connect.Response[v1pb.Memo], error) { resp, err := s.APIV1Service.GetMemo(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) UpdateMemo(ctx context.Context, req *connect.Request[v1pb.UpdateMemoRequest]) (*connect.Response[v1pb.Memo], error) { resp, err := s.APIV1Service.UpdateMemo(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) DeleteMemo(ctx context.Context, req *connect.Request[v1pb.DeleteMemoRequest]) (*connect.Response[emptypb.Empty], error) { resp, err := s.APIV1Service.DeleteMemo(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) SetMemoAttachments(ctx context.Context, req *connect.Request[v1pb.SetMemoAttachmentsRequest]) (*connect.Response[emptypb.Empty], error) { resp, err := s.APIV1Service.SetMemoAttachments(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) ListMemoAttachments(ctx context.Context, req *connect.Request[v1pb.ListMemoAttachmentsRequest]) (*connect.Response[v1pb.ListMemoAttachmentsResponse], error) { resp, err := s.APIV1Service.ListMemoAttachments(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) SetMemoRelations(ctx context.Context, req *connect.Request[v1pb.SetMemoRelationsRequest]) (*connect.Response[emptypb.Empty], error) { resp, err := s.APIV1Service.SetMemoRelations(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) ListMemoRelations(ctx context.Context, req *connect.Request[v1pb.ListMemoRelationsRequest]) (*connect.Response[v1pb.ListMemoRelationsResponse], error) { resp, err := s.APIV1Service.ListMemoRelations(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) CreateMemoComment(ctx context.Context, req *connect.Request[v1pb.CreateMemoCommentRequest]) (*connect.Response[v1pb.Memo], error) { resp, err := s.APIV1Service.CreateMemoComment(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) ListMemoComments(ctx context.Context, req *connect.Request[v1pb.ListMemoCommentsRequest]) (*connect.Response[v1pb.ListMemoCommentsResponse], error) { resp, err := s.APIV1Service.ListMemoComments(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) ListMemoReactions(ctx context.Context, req *connect.Request[v1pb.ListMemoReactionsRequest]) (*connect.Response[v1pb.ListMemoReactionsResponse], error) { resp, err := s.APIV1Service.ListMemoReactions(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) UpsertMemoReaction(ctx context.Context, req *connect.Request[v1pb.UpsertMemoReactionRequest]) (*connect.Response[v1pb.Reaction], error) { resp, err := s.APIV1Service.UpsertMemoReaction(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) DeleteMemoReaction(ctx context.Context, req *connect.Request[v1pb.DeleteMemoReactionRequest]) (*connect.Response[emptypb.Empty], error) { resp, err := s.APIV1Service.DeleteMemoReaction(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } // AttachmentService func (s *ConnectServiceHandler) CreateAttachment(ctx context.Context, req *connect.Request[v1pb.CreateAttachmentRequest]) (*connect.Response[v1pb.Attachment], error) { resp, err := s.APIV1Service.CreateAttachment(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) ListAttachments(ctx context.Context, req *connect.Request[v1pb.ListAttachmentsRequest]) (*connect.Response[v1pb.ListAttachmentsResponse], error) { resp, err := s.APIV1Service.ListAttachments(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) GetAttachment(ctx context.Context, req *connect.Request[v1pb.GetAttachmentRequest]) (*connect.Response[v1pb.Attachment], error) { resp, err := s.APIV1Service.GetAttachment(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) UpdateAttachment(ctx context.Context, req *connect.Request[v1pb.UpdateAttachmentRequest]) (*connect.Response[v1pb.Attachment], error) { resp, err := s.APIV1Service.UpdateAttachment(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) DeleteAttachment(ctx context.Context, req *connect.Request[v1pb.DeleteAttachmentRequest]) (*connect.Response[emptypb.Empty], error) { resp, err := s.APIV1Service.DeleteAttachment(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } // ShortcutService func (s *ConnectServiceHandler) ListShortcuts(ctx context.Context, req *connect.Request[v1pb.ListShortcutsRequest]) (*connect.Response[v1pb.ListShortcutsResponse], error) { resp, err := s.APIV1Service.ListShortcuts(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) GetShortcut(ctx context.Context, req *connect.Request[v1pb.GetShortcutRequest]) (*connect.Response[v1pb.Shortcut], error) { resp, err := s.APIV1Service.GetShortcut(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) CreateShortcut(ctx context.Context, req *connect.Request[v1pb.CreateShortcutRequest]) (*connect.Response[v1pb.Shortcut], error) { resp, err := s.APIV1Service.CreateShortcut(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) UpdateShortcut(ctx context.Context, req *connect.Request[v1pb.UpdateShortcutRequest]) (*connect.Response[v1pb.Shortcut], error) { resp, err := s.APIV1Service.UpdateShortcut(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) DeleteShortcut(ctx context.Context, req *connect.Request[v1pb.DeleteShortcutRequest]) (*connect.Response[emptypb.Empty], error) { resp, err := s.APIV1Service.DeleteShortcut(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } // ActivityService func (s *ConnectServiceHandler) ListActivities(ctx context.Context, req *connect.Request[v1pb.ListActivitiesRequest]) (*connect.Response[v1pb.ListActivitiesResponse], error) { resp, err := s.APIV1Service.ListActivities(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) GetActivity(ctx context.Context, req *connect.Request[v1pb.GetActivityRequest]) (*connect.Response[v1pb.Activity], error) { resp, err := s.APIV1Service.GetActivity(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } // IdentityProviderService func (s *ConnectServiceHandler) ListIdentityProviders(ctx context.Context, req *connect.Request[v1pb.ListIdentityProvidersRequest]) (*connect.Response[v1pb.ListIdentityProvidersResponse], error) { resp, err := s.APIV1Service.ListIdentityProviders(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) GetIdentityProvider(ctx context.Context, req *connect.Request[v1pb.GetIdentityProviderRequest]) (*connect.Response[v1pb.IdentityProvider], error) { resp, err := s.APIV1Service.GetIdentityProvider(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) CreateIdentityProvider(ctx context.Context, req *connect.Request[v1pb.CreateIdentityProviderRequest]) (*connect.Response[v1pb.IdentityProvider], error) { resp, err := s.APIV1Service.CreateIdentityProvider(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) UpdateIdentityProvider(ctx context.Context, req *connect.Request[v1pb.UpdateIdentityProviderRequest]) (*connect.Response[v1pb.IdentityProvider], error) { resp, err := s.APIV1Service.UpdateIdentityProvider(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil } func (s *ConnectServiceHandler) DeleteIdentityProvider(ctx context.Context, req *connect.Request[v1pb.DeleteIdentityProviderRequest]) (*connect.Response[emptypb.Empty], error) { resp, err := s.APIV1Service.DeleteIdentityProvider(ctx, req.Msg) if err != nil { return nil, convertGRPCError(err) } return connect.NewResponse(resp), nil }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/router/api/v1/memo_service_converter.go
server/router/api/v1/memo_service_converter.go
package v1 import ( "context" "fmt" "time" "github.com/pkg/errors" "google.golang.org/protobuf/types/known/timestamppb" v1pb "github.com/usememos/memos/proto/gen/api/v1" storepb "github.com/usememos/memos/proto/gen/store" "github.com/usememos/memos/store" ) func (s *APIV1Service) convertMemoFromStore(ctx context.Context, memo *store.Memo, reactions []*store.Reaction, attachments []*store.Attachment) (*v1pb.Memo, error) { displayTs := memo.CreatedTs instanceMemoRelatedSetting, err := s.Store.GetInstanceMemoRelatedSetting(ctx) if err != nil { return nil, errors.Wrap(err, "failed to get instance memo related setting") } if instanceMemoRelatedSetting.DisplayWithUpdateTime { displayTs = memo.UpdatedTs } name := fmt.Sprintf("%s%s", MemoNamePrefix, memo.UID) memoMessage := &v1pb.Memo{ Name: name, State: convertStateFromStore(memo.RowStatus), Creator: fmt.Sprintf("%s%d", UserNamePrefix, memo.CreatorID), CreateTime: timestamppb.New(time.Unix(memo.CreatedTs, 0)), UpdateTime: timestamppb.New(time.Unix(memo.UpdatedTs, 0)), DisplayTime: timestamppb.New(time.Unix(displayTs, 0)), Content: memo.Content, Visibility: convertVisibilityFromStore(memo.Visibility), Pinned: memo.Pinned, } if memo.Payload != nil { memoMessage.Tags = memo.Payload.Tags memoMessage.Property = convertMemoPropertyFromStore(memo.Payload.Property) memoMessage.Location = convertLocationFromStore(memo.Payload.Location) } if memo.ParentUID != nil { parentName := fmt.Sprintf("%s%s", MemoNamePrefix, *memo.ParentUID) memoMessage.Parent = &parentName } memoMessage.Reactions = []*v1pb.Reaction{} for _, reaction := range reactions { reactionResponse := convertReactionFromStore(reaction) memoMessage.Reactions = append(memoMessage.Reactions, reactionResponse) } listMemoRelationsResponse, err := s.ListMemoRelations(ctx, &v1pb.ListMemoRelationsRequest{Name: name}) if err != nil { return nil, errors.Wrap(err, "failed to list memo relations") } memoMessage.Relations = listMemoRelationsResponse.Relations memoMessage.Attachments = []*v1pb.Attachment{} for _, attachment := range attachments { attachmentResponse := convertAttachmentFromStore(attachment) memoMessage.Attachments = append(memoMessage.Attachments, attachmentResponse) } snippet, err := s.getMemoContentSnippet(memo.Content) if err != nil { return nil, errors.Wrap(err, "failed to get memo content snippet") } memoMessage.Snippet = snippet return memoMessage, nil } func convertMemoPropertyFromStore(property *storepb.MemoPayload_Property) *v1pb.Memo_Property { if property == nil { return nil } return &v1pb.Memo_Property{ HasLink: property.HasLink, HasTaskList: property.HasTaskList, HasCode: property.HasCode, HasIncompleteTasks: property.HasIncompleteTasks, } } func convertLocationFromStore(location *storepb.MemoPayload_Location) *v1pb.Location { if location == nil { return nil } return &v1pb.Location{ Placeholder: location.Placeholder, Latitude: location.Latitude, Longitude: location.Longitude, } } func convertLocationToStore(location *v1pb.Location) *storepb.MemoPayload_Location { if location == nil { return nil } return &storepb.MemoPayload_Location{ Placeholder: location.Placeholder, Latitude: location.Latitude, Longitude: location.Longitude, } } func convertVisibilityFromStore(visibility store.Visibility) v1pb.Visibility { switch visibility { case store.Private: return v1pb.Visibility_PRIVATE case store.Protected: return v1pb.Visibility_PROTECTED case store.Public: return v1pb.Visibility_PUBLIC default: return v1pb.Visibility_VISIBILITY_UNSPECIFIED } } func convertVisibilityToStore(visibility v1pb.Visibility) store.Visibility { switch visibility { case v1pb.Visibility_PROTECTED: return store.Protected case v1pb.Visibility_PUBLIC: return store.Public default: return store.Private } }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/router/api/v1/auth_service.go
server/router/api/v1/auth_service.go
package v1 import ( "context" "fmt" "log/slog" "regexp" "strings" "time" "github.com/pkg/errors" "golang.org/x/crypto/bcrypt" "google.golang.org/grpc/codes" "google.golang.org/grpc/metadata" "google.golang.org/grpc/status" "google.golang.org/protobuf/types/known/emptypb" "google.golang.org/protobuf/types/known/timestamppb" "github.com/usememos/memos/internal/util" "github.com/usememos/memos/plugin/idp" "github.com/usememos/memos/plugin/idp/oauth2" v1pb "github.com/usememos/memos/proto/gen/api/v1" storepb "github.com/usememos/memos/proto/gen/store" "github.com/usememos/memos/server/auth" "github.com/usememos/memos/store" ) const ( unmatchedUsernameAndPasswordError = "unmatched username and password" ) // GetCurrentUser returns the authenticated user's information. // Validates the access token and returns user details. // // Authentication: Required (access token). // Returns: User information. func (s *APIV1Service) GetCurrentUser(ctx context.Context, _ *v1pb.GetCurrentUserRequest) (*v1pb.GetCurrentUserResponse, error) { user, err := s.fetchCurrentUser(ctx) if err != nil { return nil, status.Errorf(codes.Unauthenticated, "failed to get current user: %v", err) } if user == nil { // Clear auth cookies if err := s.clearAuthCookies(ctx); err != nil { return nil, status.Errorf(codes.Internal, "failed to clear auth cookies: %v", err) } return nil, status.Errorf(codes.Unauthenticated, "user not found") } return &v1pb.GetCurrentUserResponse{ User: convertUserFromStore(user), }, nil } // SignIn authenticates a user with credentials and returns tokens. // On success, returns an access token and sets a refresh token cookie. // // Supports two authentication methods: // 1. Password-based authentication (username + password). // 2. SSO authentication (OAuth2 authorization code). // // Authentication: Not required (public endpoint). // Returns: User info, access token, and token expiry. func (s *APIV1Service) SignIn(ctx context.Context, request *v1pb.SignInRequest) (*v1pb.SignInResponse, error) { var existingUser *store.User // Authentication Method 1: Password-based authentication if passwordCredentials := request.GetPasswordCredentials(); passwordCredentials != nil { user, err := s.Store.GetUser(ctx, &store.FindUser{ Username: &passwordCredentials.Username, }) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get user, error: %v", err) } if user == nil { return nil, status.Errorf(codes.InvalidArgument, unmatchedUsernameAndPasswordError) } // Compare the stored hashed password, with the hashed version of the password that was received. if err := bcrypt.CompareHashAndPassword([]byte(user.PasswordHash), []byte(passwordCredentials.Password)); err != nil { return nil, status.Errorf(codes.InvalidArgument, unmatchedUsernameAndPasswordError) } instanceGeneralSetting, err := s.Store.GetInstanceGeneralSetting(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get instance general setting, error: %v", err) } // Check if the password auth in is allowed. if instanceGeneralSetting.DisallowPasswordAuth && user.Role == store.RoleUser { return nil, status.Errorf(codes.PermissionDenied, "password signin is not allowed") } existingUser = user } else if ssoCredentials := request.GetSsoCredentials(); ssoCredentials != nil { // Authentication Method 2: SSO (OAuth2) authentication identityProvider, err := s.Store.GetIdentityProvider(ctx, &store.FindIdentityProvider{ ID: &ssoCredentials.IdpId, }) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get identity provider, error: %v", err) } if identityProvider == nil { return nil, status.Errorf(codes.InvalidArgument, "identity provider not found") } var userInfo *idp.IdentityProviderUserInfo if identityProvider.Type == storepb.IdentityProvider_OAUTH2 { oauth2IdentityProvider, err := oauth2.NewIdentityProvider(identityProvider.Config.GetOauth2Config()) if err != nil { return nil, status.Errorf(codes.Internal, "failed to create oauth2 identity provider, error: %v", err) } // Pass code_verifier for PKCE support (empty string if not provided for backward compatibility) token, err := oauth2IdentityProvider.ExchangeToken(ctx, ssoCredentials.RedirectUri, ssoCredentials.Code, ssoCredentials.CodeVerifier) if err != nil { return nil, status.Errorf(codes.Internal, "failed to exchange token, error: %v", err) } userInfo, err = oauth2IdentityProvider.UserInfo(token) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get user info, error: %v", err) } } identifierFilter := identityProvider.IdentifierFilter if identifierFilter != "" { identifierFilterRegex, err := regexp.Compile(identifierFilter) if err != nil { return nil, status.Errorf(codes.Internal, "failed to compile identifier filter regex, error: %v", err) } if !identifierFilterRegex.MatchString(userInfo.Identifier) { return nil, status.Errorf(codes.PermissionDenied, "identifier %s is not allowed", userInfo.Identifier) } } user, err := s.Store.GetUser(ctx, &store.FindUser{ Username: &userInfo.Identifier, }) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get user, error: %v", err) } if user == nil { // Check if the user is allowed to sign up. instanceGeneralSetting, err := s.Store.GetInstanceGeneralSetting(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get instance general setting, error: %v", err) } if instanceGeneralSetting.DisallowUserRegistration { return nil, status.Errorf(codes.PermissionDenied, "user registration is not allowed") } // Create a new user with the user info from the identity provider. userCreate := &store.User{ Username: userInfo.Identifier, // The new signup user should be normal user by default. Role: store.RoleUser, Nickname: userInfo.DisplayName, Email: userInfo.Email, AvatarURL: userInfo.AvatarURL, } password, err := util.RandomString(20) if err != nil { return nil, status.Errorf(codes.Internal, "failed to generate random password, error: %v", err) } passwordHash, err := bcrypt.GenerateFromPassword([]byte(password), bcrypt.DefaultCost) if err != nil { return nil, status.Errorf(codes.Internal, "failed to generate password hash, error: %v", err) } userCreate.PasswordHash = string(passwordHash) user, err = s.Store.CreateUser(ctx, userCreate) if err != nil { return nil, status.Errorf(codes.Internal, "failed to create user, error: %v", err) } } existingUser = user } if existingUser == nil { return nil, status.Errorf(codes.InvalidArgument, "invalid credentials") } if existingUser.RowStatus == store.Archived { return nil, status.Errorf(codes.PermissionDenied, "user has been archived with username %s", existingUser.Username) } accessToken, accessExpiresAt, err := s.doSignIn(ctx, existingUser) if err != nil { return nil, status.Errorf(codes.Internal, "failed to sign in: %v", err) } return &v1pb.SignInResponse{ User: convertUserFromStore(existingUser), AccessToken: accessToken, AccessTokenExpiresAt: timestamppb.New(accessExpiresAt), }, nil } // doSignIn performs the actual sign-in operation by creating a session and setting the cookie. // // This function: // 1. Generates refresh token and access token. // 2. Stores refresh token metadata in user_setting. // 3. Sets refresh token as HttpOnly cookie. // 4. Returns access token and its expiry time. func (s *APIV1Service) doSignIn(ctx context.Context, user *store.User) (string, time.Time, error) { // Generate refresh token tokenID := util.GenUUID() refreshToken, refreshExpiresAt, err := auth.GenerateRefreshToken(user.ID, tokenID, []byte(s.Secret)) if err != nil { return "", time.Time{}, status.Errorf(codes.Internal, "failed to generate refresh token: %v", err) } // Store refresh token metadata clientInfo := s.extractClientInfo(ctx) refreshTokenRecord := &storepb.RefreshTokensUserSetting_RefreshToken{ TokenId: tokenID, ExpiresAt: timestamppb.New(refreshExpiresAt), CreatedAt: timestamppb.Now(), ClientInfo: clientInfo, } if err := s.Store.AddUserRefreshToken(ctx, user.ID, refreshTokenRecord); err != nil { slog.Error("failed to store refresh token", "error", err) } // Set refresh token cookie refreshCookie := s.buildRefreshTokenCookie(ctx, refreshToken, refreshExpiresAt) if err := SetResponseHeader(ctx, "Set-Cookie", refreshCookie); err != nil { return "", time.Time{}, status.Errorf(codes.Internal, "failed to set refresh token cookie: %v", err) } // Generate access token accessToken, accessExpiresAt, err := auth.GenerateAccessTokenV2( user.ID, user.Username, string(user.Role), string(user.RowStatus), []byte(s.Secret), ) if err != nil { return "", time.Time{}, status.Errorf(codes.Internal, "failed to generate access token: %v", err) } return accessToken, accessExpiresAt, nil } // SignOut terminates the user's authentication. // Revokes the refresh token and clears the authentication cookie. // // Authentication: Required (access token). // Returns: Empty response on success. func (s *APIV1Service) SignOut(ctx context.Context, _ *v1pb.SignOutRequest) (*emptypb.Empty, error) { // Get user from access token claims claims := auth.GetUserClaims(ctx) if claims != nil { // Revoke refresh token if we can identify it refreshToken := "" if md, ok := metadata.FromIncomingContext(ctx); ok { if cookies := md.Get("cookie"); len(cookies) > 0 { refreshToken = auth.ExtractRefreshTokenFromCookie(cookies[0]) } } if refreshToken != "" { refreshClaims, err := auth.ParseRefreshToken(refreshToken, []byte(s.Secret)) if err == nil { // Remove refresh token from user_setting by token_id _ = s.Store.RemoveUserRefreshToken(ctx, claims.UserID, refreshClaims.TokenID) } } } // Clear refresh token cookie if err := s.clearAuthCookies(ctx); err != nil { return nil, status.Errorf(codes.Internal, "failed to clear auth cookies, error: %v", err) } return &emptypb.Empty{}, nil } // RefreshToken exchanges a valid refresh token for a new access token. // // This endpoint implements refresh token rotation with sliding window sessions: // 1. Extracts the refresh token from the HttpOnly cookie (memos_refresh) // 2. Validates the refresh token against the database (checking expiry and revocation) // 3. Rotates the refresh token: generates a new one with fresh 30-day expiry // 4. Generates a new short-lived access token (15 minutes) // 5. Sets the new refresh token as HttpOnly cookie // 6. Returns the new access token and its expiry time // // Token rotation provides: // - Sliding window sessions: active users stay logged in indefinitely // - Better security: stolen refresh tokens become invalid after legitimate refresh // // Authentication: Requires valid refresh token in cookie (public endpoint) // Returns: New access token and expiry timestamp. func (s *APIV1Service) RefreshToken(ctx context.Context, _ *v1pb.RefreshTokenRequest) (*v1pb.RefreshTokenResponse, error) { // Extract refresh token from cookie refreshToken := "" if md, ok := metadata.FromIncomingContext(ctx); ok { if cookies := md.Get("cookie"); len(cookies) > 0 { refreshToken = auth.ExtractRefreshTokenFromCookie(cookies[0]) } } if refreshToken == "" { return nil, status.Errorf(codes.Unauthenticated, "refresh token not found") } // Validate refresh token and get old token ID for rotation authenticator := auth.NewAuthenticator(s.Store, s.Secret) user, oldTokenID, err := authenticator.AuthenticateByRefreshToken(ctx, refreshToken) if err != nil { return nil, status.Errorf(codes.Unauthenticated, "invalid refresh token: %v", err) } // --- Refresh Token Rotation --- // Generate new refresh token with fresh 30-day expiry (sliding window) newTokenID := util.GenUUID() newRefreshToken, newRefreshExpiresAt, err := auth.GenerateRefreshToken(user.ID, newTokenID, []byte(s.Secret)) if err != nil { return nil, status.Errorf(codes.Internal, "failed to generate refresh token: %v", err) } // Store new refresh token (add before remove to handle race conditions) clientInfo := s.extractClientInfo(ctx) newRefreshTokenRecord := &storepb.RefreshTokensUserSetting_RefreshToken{ TokenId: newTokenID, ExpiresAt: timestamppb.New(newRefreshExpiresAt), CreatedAt: timestamppb.Now(), ClientInfo: clientInfo, } if err := s.Store.AddUserRefreshToken(ctx, user.ID, newRefreshTokenRecord); err != nil { return nil, status.Errorf(codes.Internal, "failed to store refresh token: %v", err) } // Remove old refresh token if err := s.Store.RemoveUserRefreshToken(ctx, user.ID, oldTokenID); err != nil { // Log but don't fail - old token will expire naturally slog.Warn("failed to remove old refresh token", "error", err, "userID", user.ID, "tokenID", oldTokenID) } // Set new refresh token cookie newRefreshCookie := s.buildRefreshTokenCookie(ctx, newRefreshToken, newRefreshExpiresAt) if err := SetResponseHeader(ctx, "Set-Cookie", newRefreshCookie); err != nil { return nil, status.Errorf(codes.Internal, "failed to set refresh token cookie: %v", err) } // --- End Rotation --- // Generate new access token accessToken, expiresAt, err := auth.GenerateAccessTokenV2( user.ID, user.Username, string(user.Role), string(user.RowStatus), []byte(s.Secret), ) if err != nil { return nil, status.Errorf(codes.Internal, "failed to generate access token: %v", err) } return &v1pb.RefreshTokenResponse{ AccessToken: accessToken, ExpiresAt: timestamppb.New(expiresAt), }, nil } func (s *APIV1Service) clearAuthCookies(ctx context.Context) error { // Clear refresh token cookie refreshCookie := s.buildRefreshTokenCookie(ctx, "", time.Time{}) if err := SetResponseHeader(ctx, "Set-Cookie", refreshCookie); err != nil { return errors.Wrap(err, "failed to set refresh cookie") } return nil } func (*APIV1Service) buildRefreshTokenCookie(ctx context.Context, refreshToken string, expireTime time.Time) string { attrs := []string{ fmt.Sprintf("%s=%s", auth.RefreshTokenCookieName, refreshToken), "Path=/", "HttpOnly", } if expireTime.IsZero() { attrs = append(attrs, "Expires=Thu, 01 Jan 1970 00:00:00 GMT") } else { // RFC 6265 requires cookie expiration dates to use GMT timezone // Convert to UTC and format with explicit "GMT" to ensure browser compatibility attrs = append(attrs, "Expires="+expireTime.UTC().Format("Mon, 02 Jan 2006 15:04:05 GMT")) } // Try to determine if the request is HTTPS by checking the origin header // Default to non-HTTPS (Lax SameSite) if metadata is not available isHTTPS := false if md, ok := metadata.FromIncomingContext(ctx); ok { for _, v := range md.Get("origin") { if strings.HasPrefix(v, "https://") { isHTTPS = true break } } } if isHTTPS { attrs = append(attrs, "SameSite=Lax", "Secure") } else { attrs = append(attrs, "SameSite=Lax") } return strings.Join(attrs, "; ") } func (s *APIV1Service) fetchCurrentUser(ctx context.Context) (*store.User, error) { userID := auth.GetUserID(ctx) if userID == 0 { return nil, nil } user, err := s.Store.GetUser(ctx, &store.FindUser{ ID: &userID, }) if err != nil { return nil, err } if user == nil { return nil, errors.Errorf("user %d not found", userID) } return user, nil } // extractClientInfo extracts comprehensive client information from the request context. // // This function parses metadata from the gRPC context to extract: // - User Agent: Raw user agent string for detailed parsing // - IP Address: Client IP from X-Forwarded-For or X-Real-IP headers // - Device Type: "mobile", "tablet", or "desktop" (parsed from user agent) // - Operating System: OS name and version (e.g., "iOS 17.1", "Windows 10/11") // - Browser: Browser name and version (e.g., "Chrome 120.0.0.0") // // This information enables users to: // - See all active sessions with device details // - Identify suspicious login attempts // - Revoke specific sessions from unknown devices. func (s *APIV1Service) extractClientInfo(ctx context.Context) *storepb.RefreshTokensUserSetting_ClientInfo { clientInfo := &storepb.RefreshTokensUserSetting_ClientInfo{} // Extract user agent from metadata if available if md, ok := metadata.FromIncomingContext(ctx); ok { if userAgents := md.Get("user-agent"); len(userAgents) > 0 { userAgent := userAgents[0] clientInfo.UserAgent = userAgent // Parse user agent to extract device type, OS, browser info s.parseUserAgent(userAgent, clientInfo) } if forwardedFor := md.Get("x-forwarded-for"); len(forwardedFor) > 0 { ipAddress := strings.Split(forwardedFor[0], ",")[0] // Get the first IP in case of multiple ipAddress = strings.TrimSpace(ipAddress) clientInfo.IpAddress = ipAddress } else if realIP := md.Get("x-real-ip"); len(realIP) > 0 { clientInfo.IpAddress = realIP[0] } } return clientInfo } // parseUserAgent extracts device type, OS, and browser information from user agent string. // // Detection logic: // - Device Type: Checks for keywords like "mobile", "tablet", "ipad" // - OS: Pattern matches for iOS, Android, Windows, macOS, Linux, Chrome OS // - Browser: Identifies Edge, Chrome, Firefox, Safari, Opera // // Note: This is a simplified parser. For production use with high accuracy requirements, // consider using a dedicated user agent parsing library. func (*APIV1Service) parseUserAgent(userAgent string, clientInfo *storepb.RefreshTokensUserSetting_ClientInfo) { if userAgent == "" { return } userAgent = strings.ToLower(userAgent) // Detect device type if strings.Contains(userAgent, "ipad") || strings.Contains(userAgent, "tablet") { clientInfo.DeviceType = "tablet" } else if strings.Contains(userAgent, "mobile") || strings.Contains(userAgent, "android") || strings.Contains(userAgent, "iphone") || strings.Contains(userAgent, "ipod") || strings.Contains(userAgent, "windows phone") || strings.Contains(userAgent, "blackberry") { clientInfo.DeviceType = "mobile" } else { clientInfo.DeviceType = "desktop" } // Detect operating system if strings.Contains(userAgent, "iphone os") || strings.Contains(userAgent, "cpu os") { // Extract iOS version if idx := strings.Index(userAgent, "cpu os "); idx != -1 { versionStart := idx + 7 versionEnd := strings.Index(userAgent[versionStart:], " ") if versionEnd != -1 { version := strings.ReplaceAll(userAgent[versionStart:versionStart+versionEnd], "_", ".") clientInfo.Os = "iOS " + version } else { clientInfo.Os = "iOS" } } else if idx := strings.Index(userAgent, "iphone os "); idx != -1 { versionStart := idx + 10 versionEnd := strings.Index(userAgent[versionStart:], " ") if versionEnd != -1 { version := strings.ReplaceAll(userAgent[versionStart:versionStart+versionEnd], "_", ".") clientInfo.Os = "iOS " + version } else { clientInfo.Os = "iOS" } } else { clientInfo.Os = "iOS" } } else if strings.Contains(userAgent, "android") { // Extract Android version if idx := strings.Index(userAgent, "android "); idx != -1 { versionStart := idx + 8 versionEnd := strings.Index(userAgent[versionStart:], ";") if versionEnd == -1 { versionEnd = strings.Index(userAgent[versionStart:], ")") } if versionEnd != -1 { version := userAgent[versionStart : versionStart+versionEnd] clientInfo.Os = "Android " + version } else { clientInfo.Os = "Android" } } else { clientInfo.Os = "Android" } } else if strings.Contains(userAgent, "windows nt 10.0") { clientInfo.Os = "Windows 10/11" } else if strings.Contains(userAgent, "windows nt 6.3") { clientInfo.Os = "Windows 8.1" } else if strings.Contains(userAgent, "windows nt 6.1") { clientInfo.Os = "Windows 7" } else if strings.Contains(userAgent, "windows") { clientInfo.Os = "Windows" } else if strings.Contains(userAgent, "mac os x") { // Extract macOS version if idx := strings.Index(userAgent, "mac os x "); idx != -1 { versionStart := idx + 9 versionEnd := strings.Index(userAgent[versionStart:], ";") if versionEnd == -1 { versionEnd = strings.Index(userAgent[versionStart:], ")") } if versionEnd != -1 { version := strings.ReplaceAll(userAgent[versionStart:versionStart+versionEnd], "_", ".") clientInfo.Os = "macOS " + version } else { clientInfo.Os = "macOS" } } else { clientInfo.Os = "macOS" } } else if strings.Contains(userAgent, "linux") { clientInfo.Os = "Linux" } else if strings.Contains(userAgent, "cros") { clientInfo.Os = "Chrome OS" } // Detect browser if strings.Contains(userAgent, "edg/") { // Extract Edge version if idx := strings.Index(userAgent, "edg/"); idx != -1 { versionStart := idx + 4 versionEnd := strings.Index(userAgent[versionStart:], " ") if versionEnd == -1 { versionEnd = len(userAgent) - versionStart } version := userAgent[versionStart : versionStart+versionEnd] clientInfo.Browser = "Edge " + version } else { clientInfo.Browser = "Edge" } } else if strings.Contains(userAgent, "chrome/") && !strings.Contains(userAgent, "edg") { // Extract Chrome version if idx := strings.Index(userAgent, "chrome/"); idx != -1 { versionStart := idx + 7 versionEnd := strings.Index(userAgent[versionStart:], " ") if versionEnd == -1 { versionEnd = len(userAgent) - versionStart } version := userAgent[versionStart : versionStart+versionEnd] clientInfo.Browser = "Chrome " + version } else { clientInfo.Browser = "Chrome" } } else if strings.Contains(userAgent, "firefox/") { // Extract Firefox version if idx := strings.Index(userAgent, "firefox/"); idx != -1 { versionStart := idx + 8 versionEnd := strings.Index(userAgent[versionStart:], " ") if versionEnd == -1 { versionEnd = len(userAgent) - versionStart } version := userAgent[versionStart : versionStart+versionEnd] clientInfo.Browser = "Firefox " + version } else { clientInfo.Browser = "Firefox" } } else if strings.Contains(userAgent, "safari/") && !strings.Contains(userAgent, "chrome") && !strings.Contains(userAgent, "edg") { // Extract Safari version if idx := strings.Index(userAgent, "version/"); idx != -1 { versionStart := idx + 8 versionEnd := strings.Index(userAgent[versionStart:], " ") if versionEnd == -1 { versionEnd = len(userAgent) - versionStart } version := userAgent[versionStart : versionStart+versionEnd] clientInfo.Browser = "Safari " + version } else { clientInfo.Browser = "Safari" } } else if strings.Contains(userAgent, "opera/") || strings.Contains(userAgent, "opr/") { clientInfo.Browser = "Opera" } }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/router/api/v1/memo_attachment_service.go
server/router/api/v1/memo_attachment_service.go
package v1 import ( "context" "slices" "time" "google.golang.org/grpc/codes" "google.golang.org/grpc/status" "google.golang.org/protobuf/types/known/emptypb" v1pb "github.com/usememos/memos/proto/gen/api/v1" "github.com/usememos/memos/store" ) func (s *APIV1Service) SetMemoAttachments(ctx context.Context, request *v1pb.SetMemoAttachmentsRequest) (*emptypb.Empty, error) { user, err := s.fetchCurrentUser(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get current user: %v", err) } if user == nil { return nil, status.Errorf(codes.Unauthenticated, "user not authenticated") } memoUID, err := ExtractMemoUIDFromName(request.Name) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid memo name: %v", err) } memo, err := s.Store.GetMemo(ctx, &store.FindMemo{UID: &memoUID}) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get memo") } if memo == nil { return nil, status.Errorf(codes.NotFound, "memo not found") } if memo.CreatorID != user.ID && !isSuperUser(user) { return nil, status.Errorf(codes.PermissionDenied, "permission denied") } attachments, err := s.Store.ListAttachments(ctx, &store.FindAttachment{ MemoID: &memo.ID, }) if err != nil { return nil, status.Errorf(codes.Internal, "failed to list attachments") } // Delete attachments that are not in the request. for _, attachment := range attachments { found := false for _, requestAttachment := range request.Attachments { requestAttachmentUID, err := ExtractAttachmentUIDFromName(requestAttachment.Name) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid attachment name: %v", err) } if attachment.UID == requestAttachmentUID { found = true break } } if !found { if err = s.Store.DeleteAttachment(ctx, &store.DeleteAttachment{ ID: int32(attachment.ID), MemoID: &memo.ID, }); err != nil { return nil, status.Errorf(codes.Internal, "failed to delete attachment") } } } slices.Reverse(request.Attachments) // Update attachments' memo_id in the request. for index, attachment := range request.Attachments { attachmentUID, err := ExtractAttachmentUIDFromName(attachment.Name) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid attachment name: %v", err) } tempAttachment, err := s.Store.GetAttachment(ctx, &store.FindAttachment{UID: &attachmentUID}) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get attachment: %v", err) } updatedTs := time.Now().Unix() + int64(index) if err := s.Store.UpdateAttachment(ctx, &store.UpdateAttachment{ ID: tempAttachment.ID, MemoID: &memo.ID, UpdatedTs: &updatedTs, }); err != nil { return nil, status.Errorf(codes.Internal, "failed to update attachment: %v", err) } } return &emptypb.Empty{}, nil } func (s *APIV1Service) ListMemoAttachments(ctx context.Context, request *v1pb.ListMemoAttachmentsRequest) (*v1pb.ListMemoAttachmentsResponse, error) { memoUID, err := ExtractMemoUIDFromName(request.Name) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid memo name: %v", err) } memo, err := s.Store.GetMemo(ctx, &store.FindMemo{UID: &memoUID}) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get memo: %v", err) } attachments, err := s.Store.ListAttachments(ctx, &store.FindAttachment{ MemoID: &memo.ID, }) if err != nil { return nil, status.Errorf(codes.Internal, "failed to list attachments: %v", err) } response := &v1pb.ListMemoAttachmentsResponse{ Attachments: []*v1pb.Attachment{}, } for _, attachment := range attachments { response.Attachments = append(response.Attachments, convertAttachmentFromStore(attachment)) } return response, nil }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/router/api/v1/memo_service.go
server/router/api/v1/memo_service.go
package v1 import ( "context" "fmt" "log/slog" "strings" "time" "github.com/lithammer/shortuuid/v4" "github.com/pkg/errors" "google.golang.org/grpc/codes" "google.golang.org/grpc/status" "google.golang.org/protobuf/types/known/emptypb" "github.com/usememos/memos/internal/base" "github.com/usememos/memos/plugin/webhook" v1pb "github.com/usememos/memos/proto/gen/api/v1" storepb "github.com/usememos/memos/proto/gen/store" "github.com/usememos/memos/server/runner/memopayload" "github.com/usememos/memos/store" ) func (s *APIV1Service) CreateMemo(ctx context.Context, request *v1pb.CreateMemoRequest) (*v1pb.Memo, error) { user, err := s.fetchCurrentUser(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get user") } if user == nil { return nil, status.Errorf(codes.Unauthenticated, "user not authenticated") } // Use custom memo_id if provided, otherwise generate a new UUID memoUID := strings.TrimSpace(request.MemoId) if memoUID == "" { memoUID = shortuuid.New() } else if !base.UIDMatcher.MatchString(memoUID) { // Validate custom memo ID format return nil, status.Errorf(codes.InvalidArgument, "invalid memo_id format: must be 1-32 characters, alphanumeric and hyphens only, cannot start or end with hyphen") } create := &store.Memo{ UID: memoUID, CreatorID: user.ID, Content: request.Memo.Content, Visibility: convertVisibilityToStore(request.Memo.Visibility), } instanceMemoRelatedSetting, err := s.Store.GetInstanceMemoRelatedSetting(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get instance memo related setting") } if instanceMemoRelatedSetting.DisallowPublicVisibility && create.Visibility == store.Public { return nil, status.Errorf(codes.PermissionDenied, "disable public memos system setting is enabled") } contentLengthLimit, err := s.getContentLengthLimit(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get content length limit") } if len(create.Content) > contentLengthLimit { return nil, status.Errorf(codes.InvalidArgument, "content too long (max %d characters)", contentLengthLimit) } if err := memopayload.RebuildMemoPayload(create, s.MarkdownService); err != nil { return nil, status.Errorf(codes.Internal, "failed to rebuild memo payload: %v", err) } if request.Memo.Location != nil { create.Payload.Location = convertLocationToStore(request.Memo.Location) } memo, err := s.Store.CreateMemo(ctx, create) if err != nil { // Check for unique constraint violation (AIP-133 compliance) errMsg := err.Error() if strings.Contains(errMsg, "UNIQUE constraint failed") || strings.Contains(errMsg, "duplicate key") || strings.Contains(errMsg, "Duplicate entry") { return nil, status.Errorf(codes.AlreadyExists, "memo with ID %q already exists", memoUID) } return nil, err } attachments := []*store.Attachment{} if len(request.Memo.Attachments) > 0 { _, err := s.SetMemoAttachments(ctx, &v1pb.SetMemoAttachmentsRequest{ Name: fmt.Sprintf("%s%s", MemoNamePrefix, memo.UID), Attachments: request.Memo.Attachments, }) if err != nil { return nil, errors.Wrap(err, "failed to set memo attachments") } a, err := s.Store.ListAttachments(ctx, &store.FindAttachment{ MemoID: &memo.ID, }) if err != nil { return nil, errors.Wrap(err, "failed to get memo attachments") } attachments = a } if len(request.Memo.Relations) > 0 { _, err := s.SetMemoRelations(ctx, &v1pb.SetMemoRelationsRequest{ Name: fmt.Sprintf("%s%s", MemoNamePrefix, memo.UID), Relations: request.Memo.Relations, }) if err != nil { return nil, errors.Wrap(err, "failed to set memo relations") } } memoMessage, err := s.convertMemoFromStore(ctx, memo, nil, attachments) if err != nil { return nil, errors.Wrap(err, "failed to convert memo") } // Try to dispatch webhook when memo is created. if err := s.DispatchMemoCreatedWebhook(ctx, memoMessage); err != nil { slog.Warn("Failed to dispatch memo created webhook", slog.Any("err", err)) } return memoMessage, nil } func (s *APIV1Service) ListMemos(ctx context.Context, request *v1pb.ListMemosRequest) (*v1pb.ListMemosResponse, error) { memoFind := &store.FindMemo{ // Exclude comments by default. ExcludeComments: true, } if request.State == v1pb.State_ARCHIVED { state := store.Archived memoFind.RowStatus = &state } else { state := store.Normal memoFind.RowStatus = &state } // Parse order_by field (replaces the old sort and direction fields) if request.OrderBy != "" { if err := s.parseMemoOrderBy(request.OrderBy, memoFind); err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid order_by: %v", err) } } else { // Default ordering by display_time desc memoFind.OrderByTimeAsc = false } if request.Filter != "" { if err := s.validateFilter(ctx, request.Filter); err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid filter: %v", err) } memoFind.Filters = append(memoFind.Filters, request.Filter) } currentUser, err := s.fetchCurrentUser(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get user") } if currentUser == nil { memoFind.VisibilityList = []store.Visibility{store.Public} } else { if memoFind.CreatorID == nil { filter := fmt.Sprintf(`creator_id == %d || visibility in ["PUBLIC", "PROTECTED"]`, currentUser.ID) memoFind.Filters = append(memoFind.Filters, filter) } else if *memoFind.CreatorID != currentUser.ID { memoFind.VisibilityList = []store.Visibility{store.Public, store.Protected} } } instanceMemoRelatedSetting, err := s.Store.GetInstanceMemoRelatedSetting(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get instance memo related setting") } if instanceMemoRelatedSetting.DisplayWithUpdateTime { memoFind.OrderByUpdatedTs = true } var limit, offset int if request.PageToken != "" { var pageToken v1pb.PageToken if err := unmarshalPageToken(request.PageToken, &pageToken); err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid page token: %v", err) } limit = int(pageToken.Limit) offset = int(pageToken.Offset) } else { limit = int(request.PageSize) } if limit <= 0 { limit = DefaultPageSize } limitPlusOne := limit + 1 memoFind.Limit = &limitPlusOne memoFind.Offset = &offset memos, err := s.Store.ListMemos(ctx, memoFind) if err != nil { return nil, status.Errorf(codes.Internal, "failed to list memos: %v", err) } memoMessages := []*v1pb.Memo{} nextPageToken := "" if len(memos) == limitPlusOne { memos = memos[:limit] nextPageToken, err = getPageToken(limit, offset+limit) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get next page token, error: %v", err) } } if len(memos) == 0 { response := &v1pb.ListMemosResponse{ Memos: memoMessages, NextPageToken: nextPageToken, } return response, nil } reactionMap := make(map[string][]*store.Reaction) contentIDs := make([]string, 0, len(memos)) attachmentMap := make(map[int32][]*store.Attachment) memoIDs := make([]int32, 0, len(memos)) for _, m := range memos { contentIDs = append(contentIDs, fmt.Sprintf("%s%s", MemoNamePrefix, m.UID)) memoIDs = append(memoIDs, m.ID) } // REACTIONS reactions, err := s.Store.ListReactions(ctx, &store.FindReaction{ContentIDList: contentIDs}) if err != nil { return nil, status.Errorf(codes.Internal, "failed to list reactions") } for _, reaction := range reactions { reactionMap[reaction.ContentID] = append(reactionMap[reaction.ContentID], reaction) } // ATTACHMENTS attachments, err := s.Store.ListAttachments(ctx, &store.FindAttachment{MemoIDList: memoIDs}) if err != nil { return nil, status.Errorf(codes.Internal, "failed to list attachments") } for _, attachment := range attachments { attachmentMap[*attachment.MemoID] = append(attachmentMap[*attachment.MemoID], attachment) } for _, memo := range memos { memoName := fmt.Sprintf("%s%s", MemoNamePrefix, memo.UID) reactions := reactionMap[memoName] attachments := attachmentMap[memo.ID] memoMessage, err := s.convertMemoFromStore(ctx, memo, reactions, attachments) if err != nil { return nil, errors.Wrap(err, "failed to convert memo") } memoMessages = append(memoMessages, memoMessage) } response := &v1pb.ListMemosResponse{ Memos: memoMessages, NextPageToken: nextPageToken, } return response, nil } func (s *APIV1Service) GetMemo(ctx context.Context, request *v1pb.GetMemoRequest) (*v1pb.Memo, error) { memoUID, err := ExtractMemoUIDFromName(request.Name) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid memo name: %v", err) } memo, err := s.Store.GetMemo(ctx, &store.FindMemo{ UID: &memoUID, }) if err != nil { return nil, err } if memo == nil { return nil, status.Errorf(codes.NotFound, "memo not found") } if memo.Visibility != store.Public { user, err := s.fetchCurrentUser(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get user") } if user == nil { return nil, status.Errorf(codes.PermissionDenied, "permission denied") } if memo.Visibility == store.Private && memo.CreatorID != user.ID { return nil, status.Errorf(codes.PermissionDenied, "permission denied") } } reactions, err := s.Store.ListReactions(ctx, &store.FindReaction{ ContentID: &request.Name, }) if err != nil { return nil, status.Errorf(codes.Internal, "failed to list reactions") } attachments, err := s.Store.ListAttachments(ctx, &store.FindAttachment{ MemoID: &memo.ID, }) if err != nil { return nil, status.Errorf(codes.Internal, "failed to list attachments") } memoMessage, err := s.convertMemoFromStore(ctx, memo, reactions, attachments) if err != nil { return nil, errors.Wrap(err, "failed to convert memo") } return memoMessage, nil } func (s *APIV1Service) UpdateMemo(ctx context.Context, request *v1pb.UpdateMemoRequest) (*v1pb.Memo, error) { memoUID, err := ExtractMemoUIDFromName(request.Memo.Name) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid memo name: %v", err) } if request.UpdateMask == nil || len(request.UpdateMask.Paths) == 0 { return nil, status.Errorf(codes.InvalidArgument, "update mask is required") } memo, err := s.Store.GetMemo(ctx, &store.FindMemo{UID: &memoUID}) if err != nil { return nil, err } if memo == nil { return nil, status.Errorf(codes.NotFound, "memo not found") } user, err := s.fetchCurrentUser(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get current user") } if user == nil { return nil, status.Errorf(codes.Unauthenticated, "user not authenticated") } // Only the creator or admin can update the memo. if memo.CreatorID != user.ID && !isSuperUser(user) { return nil, status.Errorf(codes.PermissionDenied, "permission denied") } update := &store.UpdateMemo{ ID: memo.ID, } for _, path := range request.UpdateMask.Paths { if path == "content" { contentLengthLimit, err := s.getContentLengthLimit(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get content length limit") } if len(request.Memo.Content) > contentLengthLimit { return nil, status.Errorf(codes.InvalidArgument, "content too long (max %d characters)", contentLengthLimit) } memo.Content = request.Memo.Content if err := memopayload.RebuildMemoPayload(memo, s.MarkdownService); err != nil { return nil, status.Errorf(codes.Internal, "failed to rebuild memo payload: %v", err) } update.Content = &memo.Content update.Payload = memo.Payload } else if path == "visibility" { instanceMemoRelatedSetting, err := s.Store.GetInstanceMemoRelatedSetting(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get instance memo related setting") } visibility := convertVisibilityToStore(request.Memo.Visibility) if instanceMemoRelatedSetting.DisallowPublicVisibility && visibility == store.Public { return nil, status.Errorf(codes.PermissionDenied, "disable public memos system setting is enabled") } update.Visibility = &visibility } else if path == "pinned" { update.Pinned = &request.Memo.Pinned } else if path == "state" { rowStatus := convertStateToStore(request.Memo.State) update.RowStatus = &rowStatus } else if path == "create_time" { createdTs := request.Memo.CreateTime.AsTime().Unix() update.CreatedTs = &createdTs } else if path == "update_time" { updatedTs := time.Now().Unix() if request.Memo.UpdateTime != nil { updatedTs = request.Memo.UpdateTime.AsTime().Unix() } update.UpdatedTs = &updatedTs } else if path == "display_time" { displayTs := request.Memo.DisplayTime.AsTime().Unix() memoRelatedSetting, err := s.Store.GetInstanceMemoRelatedSetting(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get instance memo related setting") } if memoRelatedSetting.DisplayWithUpdateTime { update.UpdatedTs = &displayTs } else { update.CreatedTs = &displayTs } } else if path == "location" { payload := memo.Payload payload.Location = convertLocationToStore(request.Memo.Location) update.Payload = payload } else if path == "attachments" { _, err := s.SetMemoAttachments(ctx, &v1pb.SetMemoAttachmentsRequest{ Name: request.Memo.Name, Attachments: request.Memo.Attachments, }) if err != nil { return nil, errors.Wrap(err, "failed to set memo attachments") } } else if path == "relations" { _, err := s.SetMemoRelations(ctx, &v1pb.SetMemoRelationsRequest{ Name: request.Memo.Name, Relations: request.Memo.Relations, }) if err != nil { return nil, errors.Wrap(err, "failed to set memo relations") } } } if err = s.Store.UpdateMemo(ctx, update); err != nil { return nil, status.Errorf(codes.Internal, "failed to update memo") } memo, err = s.Store.GetMemo(ctx, &store.FindMemo{ ID: &memo.ID, }) if err != nil { return nil, errors.Wrap(err, "failed to get memo") } reactions, err := s.Store.ListReactions(ctx, &store.FindReaction{ ContentID: &request.Memo.Name, }) if err != nil { return nil, status.Errorf(codes.Internal, "failed to list reactions") } attachments, err := s.Store.ListAttachments(ctx, &store.FindAttachment{ MemoID: &memo.ID, }) if err != nil { return nil, status.Errorf(codes.Internal, "failed to list attachments") } memoMessage, err := s.convertMemoFromStore(ctx, memo, reactions, attachments) if err != nil { return nil, errors.Wrap(err, "failed to convert memo") } // Try to dispatch webhook when memo is updated. if err := s.DispatchMemoUpdatedWebhook(ctx, memoMessage); err != nil { slog.Warn("Failed to dispatch memo updated webhook", slog.Any("err", err)) } return memoMessage, nil } func (s *APIV1Service) DeleteMemo(ctx context.Context, request *v1pb.DeleteMemoRequest) (*emptypb.Empty, error) { memoUID, err := ExtractMemoUIDFromName(request.Name) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid memo name: %v", err) } memo, err := s.Store.GetMemo(ctx, &store.FindMemo{ UID: &memoUID, }) if err != nil { return nil, err } if memo == nil { return nil, status.Errorf(codes.NotFound, "memo not found") } user, err := s.fetchCurrentUser(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get current user") } if user == nil { return nil, status.Errorf(codes.Unauthenticated, "user not authenticated") } // Only the creator or admin can update the memo. if memo.CreatorID != user.ID && !isSuperUser(user) { return nil, status.Errorf(codes.PermissionDenied, "permission denied") } reactions, err := s.Store.ListReactions(ctx, &store.FindReaction{ ContentID: &request.Name, }) if err != nil { return nil, status.Errorf(codes.Internal, "failed to list reactions") } attachments, err := s.Store.ListAttachments(ctx, &store.FindAttachment{ MemoID: &memo.ID, }) if err != nil { return nil, status.Errorf(codes.Internal, "failed to list attachments") } if memoMessage, err := s.convertMemoFromStore(ctx, memo, reactions, attachments); err == nil { // Try to dispatch webhook when memo is deleted. if err := s.DispatchMemoDeletedWebhook(ctx, memoMessage); err != nil { slog.Warn("Failed to dispatch memo deleted webhook", slog.Any("err", err)) } } if err = s.Store.DeleteMemo(ctx, &store.DeleteMemo{ID: memo.ID}); err != nil { return nil, status.Errorf(codes.Internal, "failed to delete memo") } // Delete memo relation if err := s.Store.DeleteMemoRelation(ctx, &store.DeleteMemoRelation{MemoID: &memo.ID}); err != nil { return nil, status.Errorf(codes.Internal, "failed to delete memo relations") } // Delete related attachments. for _, attachment := range attachments { if err := s.Store.DeleteAttachment(ctx, &store.DeleteAttachment{ID: attachment.ID}); err != nil { return nil, status.Errorf(codes.Internal, "failed to delete attachment") } } // Delete memo comments commentType := store.MemoRelationComment relations, err := s.Store.ListMemoRelations(ctx, &store.FindMemoRelation{RelatedMemoID: &memo.ID, Type: &commentType}) if err != nil { return nil, status.Errorf(codes.Internal, "failed to list memo comments") } for _, relation := range relations { if err := s.Store.DeleteMemo(ctx, &store.DeleteMemo{ID: relation.MemoID}); err != nil { return nil, status.Errorf(codes.Internal, "failed to delete memo comment") } } // Delete memo references referenceType := store.MemoRelationReference if err := s.Store.DeleteMemoRelation(ctx, &store.DeleteMemoRelation{RelatedMemoID: &memo.ID, Type: &referenceType}); err != nil { return nil, status.Errorf(codes.Internal, "failed to delete memo references") } return &emptypb.Empty{}, nil } func (s *APIV1Service) CreateMemoComment(ctx context.Context, request *v1pb.CreateMemoCommentRequest) (*v1pb.Memo, error) { memoUID, err := ExtractMemoUIDFromName(request.Name) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid memo name: %v", err) } relatedMemo, err := s.Store.GetMemo(ctx, &store.FindMemo{UID: &memoUID}) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get memo") } // Create the memo comment first. memoComment, err := s.CreateMemo(ctx, &v1pb.CreateMemoRequest{ Memo: request.Comment, MemoId: request.CommentId, }) if err != nil { return nil, status.Errorf(codes.Internal, "failed to create memo") } memoUID, err = ExtractMemoUIDFromName(memoComment.Name) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid memo name: %v", err) } memo, err := s.Store.GetMemo(ctx, &store.FindMemo{UID: &memoUID}) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get memo") } // Build the relation between the comment memo and the original memo. _, err = s.Store.UpsertMemoRelation(ctx, &store.MemoRelation{ MemoID: memo.ID, RelatedMemoID: relatedMemo.ID, Type: store.MemoRelationComment, }) if err != nil { return nil, status.Errorf(codes.Internal, "failed to create memo relation") } creatorID, err := ExtractUserIDFromName(memoComment.Creator) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid memo creator") } if memoComment.Visibility != v1pb.Visibility_PRIVATE && creatorID != relatedMemo.CreatorID { activity, err := s.Store.CreateActivity(ctx, &store.Activity{ CreatorID: creatorID, Type: store.ActivityTypeMemoComment, Level: store.ActivityLevelInfo, Payload: &storepb.ActivityPayload{ MemoComment: &storepb.ActivityMemoCommentPayload{ MemoId: memo.ID, RelatedMemoId: relatedMemo.ID, }, }, }) if err != nil { return nil, status.Errorf(codes.Internal, "failed to create activity") } if _, err := s.Store.CreateInbox(ctx, &store.Inbox{ SenderID: creatorID, ReceiverID: relatedMemo.CreatorID, Status: store.UNREAD, Message: &storepb.InboxMessage{ Type: storepb.InboxMessage_MEMO_COMMENT, ActivityId: &activity.ID, }, }); err != nil { return nil, status.Errorf(codes.Internal, "failed to create inbox") } } return memoComment, nil } func (s *APIV1Service) ListMemoComments(ctx context.Context, request *v1pb.ListMemoCommentsRequest) (*v1pb.ListMemoCommentsResponse, error) { memoUID, err := ExtractMemoUIDFromName(request.Name) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid memo name: %v", err) } memo, err := s.Store.GetMemo(ctx, &store.FindMemo{UID: &memoUID}) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get memo") } currentUser, err := s.fetchCurrentUser(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get user") } var memoFilter string if currentUser == nil { memoFilter = `visibility == "PUBLIC"` } else { memoFilter = fmt.Sprintf(`creator_id == %d || visibility in ["PUBLIC", "PROTECTED"]`, currentUser.ID) } memoRelationComment := store.MemoRelationComment memoRelations, err := s.Store.ListMemoRelations(ctx, &store.FindMemoRelation{ RelatedMemoID: &memo.ID, Type: &memoRelationComment, MemoFilter: &memoFilter, }) if err != nil { return nil, status.Errorf(codes.Internal, "failed to list memo relations") } if len(memoRelations) == 0 { response := &v1pb.ListMemoCommentsResponse{ Memos: []*v1pb.Memo{}, } return response, nil } memoRelationIDs := make([]int32, 0, len(memoRelations)) for _, m := range memoRelations { memoRelationIDs = append(memoRelationIDs, m.MemoID) } memos, err := s.Store.ListMemos(ctx, &store.FindMemo{IDList: memoRelationIDs}) if err != nil { return nil, status.Errorf(codes.Internal, "failed to list memos") } memoIDToNameMap := make(map[int32]string) contentIDs := make([]string, 0, len(memos)) memoIDsForAttachments := make([]int32, 0, len(memos)) for _, memo := range memos { memoName := fmt.Sprintf("%s%s", MemoNamePrefix, memo.UID) memoIDToNameMap[memo.ID] = memoName contentIDs = append(contentIDs, memoName) memoIDsForAttachments = append(memoIDsForAttachments, memo.ID) } reactions, err := s.Store.ListReactions(ctx, &store.FindReaction{ContentIDList: contentIDs}) if err != nil { return nil, status.Errorf(codes.Internal, "failed to list reactions") } memoReactionsMap := make(map[string][]*store.Reaction) for _, reaction := range reactions { memoReactionsMap[reaction.ContentID] = append(memoReactionsMap[reaction.ContentID], reaction) } attachments, err := s.Store.ListAttachments(ctx, &store.FindAttachment{MemoIDList: memoIDsForAttachments}) if err != nil { return nil, status.Errorf(codes.Internal, "failed to list attachments") } attachmentMap := make(map[int32][]*store.Attachment) for _, attachment := range attachments { attachmentMap[*attachment.MemoID] = append(attachmentMap[*attachment.MemoID], attachment) } var memosResponse []*v1pb.Memo for _, m := range memos { memoName := memoIDToNameMap[m.ID] reactions := memoReactionsMap[memoName] attachments := attachmentMap[m.ID] memoMessage, err := s.convertMemoFromStore(ctx, m, reactions, attachments) if err != nil { return nil, errors.Wrap(err, "failed to convert memo") } memosResponse = append(memosResponse, memoMessage) } response := &v1pb.ListMemoCommentsResponse{ Memos: memosResponse, } return response, nil } func (s *APIV1Service) getContentLengthLimit(ctx context.Context) (int, error) { instanceMemoRelatedSetting, err := s.Store.GetInstanceMemoRelatedSetting(ctx) if err != nil { return 0, status.Errorf(codes.Internal, "failed to get instance memo related setting") } return int(instanceMemoRelatedSetting.ContentLengthLimit), nil } // DispatchMemoCreatedWebhook dispatches webhook when memo is created. func (s *APIV1Service) DispatchMemoCreatedWebhook(ctx context.Context, memo *v1pb.Memo) error { return s.dispatchMemoRelatedWebhook(ctx, memo, "memos.memo.created") } // DispatchMemoUpdatedWebhook dispatches webhook when memo is updated. func (s *APIV1Service) DispatchMemoUpdatedWebhook(ctx context.Context, memo *v1pb.Memo) error { return s.dispatchMemoRelatedWebhook(ctx, memo, "memos.memo.updated") } // DispatchMemoDeletedWebhook dispatches webhook when memo is deleted. func (s *APIV1Service) DispatchMemoDeletedWebhook(ctx context.Context, memo *v1pb.Memo) error { return s.dispatchMemoRelatedWebhook(ctx, memo, "memos.memo.deleted") } func (s *APIV1Service) dispatchMemoRelatedWebhook(ctx context.Context, memo *v1pb.Memo, activityType string) error { creatorID, err := ExtractUserIDFromName(memo.Creator) if err != nil { return status.Errorf(codes.InvalidArgument, "invalid memo creator") } webhooks, err := s.Store.GetUserWebhooks(ctx, creatorID) if err != nil { return err } for _, hook := range webhooks { payload, err := convertMemoToWebhookPayload(memo) if err != nil { return errors.Wrap(err, "failed to convert memo to webhook payload") } payload.ActivityType = activityType payload.URL = hook.Url // Use asynchronous webhook dispatch webhook.PostAsync(payload) } return nil } func convertMemoToWebhookPayload(memo *v1pb.Memo) (*webhook.WebhookRequestPayload, error) { creatorID, err := ExtractUserIDFromName(memo.Creator) if err != nil { return nil, errors.Wrap(err, "invalid memo creator") } return &webhook.WebhookRequestPayload{ Creator: fmt.Sprintf("%s%d", UserNamePrefix, creatorID), Memo: memo, }, nil } func (s *APIV1Service) getMemoContentSnippet(content string) (string, error) { // Use goldmark service for snippet generation snippet, err := s.MarkdownService.GenerateSnippet([]byte(content), 64) if err != nil { return "", errors.Wrap(err, "failed to generate snippet") } return snippet, nil } // parseMemoOrderBy parses the order_by field and sets the appropriate ordering in memoFind. // Follows AIP-132: supports comma-separated list of fields with optional "desc" suffix. // Example: "pinned desc, display_time desc" or "create_time asc". func (*APIV1Service) parseMemoOrderBy(orderBy string, memoFind *store.FindMemo) error { if strings.TrimSpace(orderBy) == "" { return errors.New("empty order_by") } // Split by comma to support multiple sort fields per AIP-132. fields := strings.Split(orderBy, ",") // Track if we've seen pinned field. hasPinned := false for _, field := range fields { parts := strings.Fields(strings.TrimSpace(field)) if len(parts) == 0 { continue } fieldName := parts[0] fieldDirection := "desc" // default per AIP-132 (we use desc as default for time fields) if len(parts) > 1 { fieldDirection = strings.ToLower(parts[1]) if fieldDirection != "asc" && fieldDirection != "desc" { return errors.Errorf("invalid order direction: %s, must be 'asc' or 'desc'", parts[1]) } } switch fieldName { case "pinned": hasPinned = true memoFind.OrderByPinned = true // Note: pinned is always DESC (true first) regardless of direction specified. case "display_time", "create_time", "name": // Only set if this is the first time field we encounter. if !memoFind.OrderByUpdatedTs { memoFind.OrderByTimeAsc = fieldDirection == "asc" } case "update_time": memoFind.OrderByUpdatedTs = true memoFind.OrderByTimeAsc = fieldDirection == "asc" default: return errors.Errorf("unsupported order field: %s, supported fields are: pinned, display_time, create_time, update_time, name", fieldName) } } // If only pinned was specified, still need to set a default time ordering. if hasPinned && !memoFind.OrderByUpdatedTs && len(fields) == 1 { memoFind.OrderByTimeAsc = false // default to desc } return nil }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/router/api/v1/acl_config.go
server/router/api/v1/acl_config.go
package v1 // PublicMethods defines API endpoints that don't require authentication. // All other endpoints require a valid session or access token. // // This is the SINGLE SOURCE OF TRUTH for public endpoints. // Both Connect interceptor and gRPC-Gateway interceptor use this map. // // Format: Full gRPC procedure path as returned by req.Spec().Procedure (Connect) // or info.FullMethod (gRPC interceptor). var PublicMethods = map[string]struct{}{ // Auth Service - login/token endpoints must be accessible without auth "/memos.api.v1.AuthService/SignIn": {}, "/memos.api.v1.AuthService/RefreshToken": {}, // Token refresh uses cookie, must be accessible when access token expired // Instance Service - needed before login to show instance info "/memos.api.v1.InstanceService/GetInstanceProfile": {}, "/memos.api.v1.InstanceService/GetInstanceSetting": {}, // User Service - public user profiles and stats "/memos.api.v1.UserService/CreateUser": {}, // Allow first user registration "/memos.api.v1.UserService/GetUser": {}, "/memos.api.v1.UserService/GetUserAvatar": {}, "/memos.api.v1.UserService/GetUserStats": {}, "/memos.api.v1.UserService/ListAllUserStats": {}, "/memos.api.v1.UserService/SearchUsers": {}, // Identity Provider Service - SSO buttons on login page "/memos.api.v1.IdentityProviderService/ListIdentityProviders": {}, // Memo Service - public memos (visibility filtering done in service layer) "/memos.api.v1.MemoService/GetMemo": {}, "/memos.api.v1.MemoService/ListMemos": {}, } // IsPublicMethod checks if a procedure path is public (no authentication required). // Returns true for public methods, false for protected methods. func IsPublicMethod(procedure string) bool { _, ok := PublicMethods[procedure] return ok }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/router/api/v1/idp_service.go
server/router/api/v1/idp_service.go
package v1 import ( "context" "fmt" "google.golang.org/grpc/codes" "google.golang.org/grpc/status" "google.golang.org/protobuf/types/known/emptypb" v1pb "github.com/usememos/memos/proto/gen/api/v1" storepb "github.com/usememos/memos/proto/gen/store" "github.com/usememos/memos/store" ) func (s *APIV1Service) CreateIdentityProvider(ctx context.Context, request *v1pb.CreateIdentityProviderRequest) (*v1pb.IdentityProvider, error) { currentUser, err := s.fetchCurrentUser(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get user: %v", err) } if currentUser == nil || currentUser.Role != store.RoleHost { return nil, status.Errorf(codes.PermissionDenied, "permission denied") } identityProvider, err := s.Store.CreateIdentityProvider(ctx, convertIdentityProviderToStore(request.IdentityProvider)) if err != nil { return nil, status.Errorf(codes.Internal, "failed to create identity provider, error: %+v", err) } return convertIdentityProviderFromStore(identityProvider), nil } func (s *APIV1Service) ListIdentityProviders(ctx context.Context, _ *v1pb.ListIdentityProvidersRequest) (*v1pb.ListIdentityProvidersResponse, error) { identityProviders, err := s.Store.ListIdentityProviders(ctx, &store.FindIdentityProvider{}) if err != nil { return nil, status.Errorf(codes.Internal, "failed to list identity providers, error: %+v", err) } response := &v1pb.ListIdentityProvidersResponse{ IdentityProviders: []*v1pb.IdentityProvider{}, } // Default to lowest-privilege role, update later based on real role currentUserRole := store.RoleUser currentUser, err := s.fetchCurrentUser(ctx) if err == nil && currentUser != nil { currentUserRole = currentUser.Role } for _, identityProvider := range identityProviders { identityProviderConverted := convertIdentityProviderFromStore(identityProvider) response.IdentityProviders = append(response.IdentityProviders, redactIdentityProviderResponse(identityProviderConverted, currentUserRole)) } return response, nil } func (s *APIV1Service) GetIdentityProvider(ctx context.Context, request *v1pb.GetIdentityProviderRequest) (*v1pb.IdentityProvider, error) { id, err := ExtractIdentityProviderIDFromName(request.Name) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid identity provider name: %v", err) } identityProvider, err := s.Store.GetIdentityProvider(ctx, &store.FindIdentityProvider{ ID: &id, }) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get identity provider, error: %+v", err) } if identityProvider == nil { return nil, status.Errorf(codes.NotFound, "identity provider not found") } // Default to lowest-privilege role, update later based on real role currentUserRole := store.RoleUser currentUser, err := s.fetchCurrentUser(ctx) if err == nil && currentUser != nil { currentUserRole = currentUser.Role } identityProviderConverted := convertIdentityProviderFromStore(identityProvider) return redactIdentityProviderResponse(identityProviderConverted, currentUserRole), nil } func (s *APIV1Service) UpdateIdentityProvider(ctx context.Context, request *v1pb.UpdateIdentityProviderRequest) (*v1pb.IdentityProvider, error) { currentUser, err := s.fetchCurrentUser(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get user: %v", err) } if currentUser == nil || currentUser.Role != store.RoleHost { return nil, status.Errorf(codes.PermissionDenied, "permission denied") } if request.UpdateMask == nil || len(request.UpdateMask.Paths) == 0 { return nil, status.Errorf(codes.InvalidArgument, "update_mask is required") } id, err := ExtractIdentityProviderIDFromName(request.IdentityProvider.Name) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid identity provider name: %v", err) } update := &store.UpdateIdentityProviderV1{ ID: id, Type: storepb.IdentityProvider_Type(storepb.IdentityProvider_Type_value[request.IdentityProvider.Type.String()]), } for _, field := range request.UpdateMask.Paths { switch field { case "title": update.Name = &request.IdentityProvider.Title case "identifier_filter": update.IdentifierFilter = &request.IdentityProvider.IdentifierFilter case "config": update.Config = convertIdentityProviderConfigToStore(request.IdentityProvider.Type, request.IdentityProvider.Config) default: // Ignore unsupported fields } } identityProvider, err := s.Store.UpdateIdentityProvider(ctx, update) if err != nil { return nil, status.Errorf(codes.Internal, "failed to update identity provider, error: %+v", err) } return convertIdentityProviderFromStore(identityProvider), nil } func (s *APIV1Service) DeleteIdentityProvider(ctx context.Context, request *v1pb.DeleteIdentityProviderRequest) (*emptypb.Empty, error) { currentUser, err := s.fetchCurrentUser(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get user: %v", err) } if currentUser == nil || currentUser.Role != store.RoleHost { return nil, status.Errorf(codes.PermissionDenied, "permission denied") } id, err := ExtractIdentityProviderIDFromName(request.Name) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid identity provider name: %v", err) } // Check if the identity provider exists before trying to delete it identityProvider, err := s.Store.GetIdentityProvider(ctx, &store.FindIdentityProvider{ID: &id}) if err != nil { return nil, status.Errorf(codes.Internal, "failed to check identity provider existence: %v", err) } if identityProvider == nil { return nil, status.Errorf(codes.NotFound, "identity provider not found") } if err := s.Store.DeleteIdentityProvider(ctx, &store.DeleteIdentityProvider{ID: id}); err != nil { return nil, status.Errorf(codes.Internal, "failed to delete identity provider, error: %+v", err) } return &emptypb.Empty{}, nil } func convertIdentityProviderFromStore(identityProvider *storepb.IdentityProvider) *v1pb.IdentityProvider { temp := &v1pb.IdentityProvider{ Name: fmt.Sprintf("%s%d", IdentityProviderNamePrefix, identityProvider.Id), Title: identityProvider.Name, IdentifierFilter: identityProvider.IdentifierFilter, Type: v1pb.IdentityProvider_Type(v1pb.IdentityProvider_Type_value[identityProvider.Type.String()]), } if identityProvider.Type == storepb.IdentityProvider_OAUTH2 { oauth2Config := identityProvider.Config.GetOauth2Config() temp.Config = &v1pb.IdentityProviderConfig{ Config: &v1pb.IdentityProviderConfig_Oauth2Config{ Oauth2Config: &v1pb.OAuth2Config{ ClientId: oauth2Config.ClientId, ClientSecret: oauth2Config.ClientSecret, AuthUrl: oauth2Config.AuthUrl, TokenUrl: oauth2Config.TokenUrl, UserInfoUrl: oauth2Config.UserInfoUrl, Scopes: oauth2Config.Scopes, FieldMapping: &v1pb.FieldMapping{ Identifier: oauth2Config.FieldMapping.Identifier, DisplayName: oauth2Config.FieldMapping.DisplayName, Email: oauth2Config.FieldMapping.Email, AvatarUrl: oauth2Config.FieldMapping.AvatarUrl, }, }, }, } } return temp } func convertIdentityProviderToStore(identityProvider *v1pb.IdentityProvider) *storepb.IdentityProvider { id, _ := ExtractIdentityProviderIDFromName(identityProvider.Name) temp := &storepb.IdentityProvider{ Id: id, Name: identityProvider.Title, IdentifierFilter: identityProvider.IdentifierFilter, Type: storepb.IdentityProvider_Type(storepb.IdentityProvider_Type_value[identityProvider.Type.String()]), Config: convertIdentityProviderConfigToStore(identityProvider.Type, identityProvider.Config), } return temp } func convertIdentityProviderConfigToStore(identityProviderType v1pb.IdentityProvider_Type, config *v1pb.IdentityProviderConfig) *storepb.IdentityProviderConfig { if identityProviderType == v1pb.IdentityProvider_OAUTH2 { oauth2Config := config.GetOauth2Config() return &storepb.IdentityProviderConfig{ Config: &storepb.IdentityProviderConfig_Oauth2Config{ Oauth2Config: &storepb.OAuth2Config{ ClientId: oauth2Config.ClientId, ClientSecret: oauth2Config.ClientSecret, AuthUrl: oauth2Config.AuthUrl, TokenUrl: oauth2Config.TokenUrl, UserInfoUrl: oauth2Config.UserInfoUrl, Scopes: oauth2Config.Scopes, FieldMapping: &storepb.FieldMapping{ Identifier: oauth2Config.FieldMapping.Identifier, DisplayName: oauth2Config.FieldMapping.DisplayName, Email: oauth2Config.FieldMapping.Email, AvatarUrl: oauth2Config.FieldMapping.AvatarUrl, }, }, }, } } return nil } func redactIdentityProviderResponse(identityProvider *v1pb.IdentityProvider, userRole store.Role) *v1pb.IdentityProvider { if userRole != store.RoleHost { if identityProvider.Type == v1pb.IdentityProvider_OAUTH2 { identityProvider.Config.GetOauth2Config().ClientSecret = "" } } return identityProvider }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/router/api/v1/connect_interceptors.go
server/router/api/v1/connect_interceptors.go
package v1 import ( "context" "errors" "fmt" "log/slog" "runtime/debug" "connectrpc.com/connect" pkgerrors "github.com/pkg/errors" "google.golang.org/grpc/metadata" "github.com/usememos/memos/server/auth" "github.com/usememos/memos/store" ) // MetadataInterceptor converts Connect HTTP headers to gRPC metadata. // // This ensures service methods can use metadata.FromIncomingContext() to access // headers like User-Agent, X-Forwarded-For, etc., regardless of whether the // request came via Connect RPC or gRPC-Gateway. type MetadataInterceptor struct{} // NewMetadataInterceptor creates a new metadata interceptor. func NewMetadataInterceptor() *MetadataInterceptor { return &MetadataInterceptor{} } func (*MetadataInterceptor) WrapUnary(next connect.UnaryFunc) connect.UnaryFunc { return func(ctx context.Context, req connect.AnyRequest) (connect.AnyResponse, error) { // Convert HTTP headers to gRPC metadata header := req.Header() md := metadata.MD{} // Copy important headers for client info extraction if ua := header.Get("User-Agent"); ua != "" { md.Set("user-agent", ua) } if xff := header.Get("X-Forwarded-For"); xff != "" { md.Set("x-forwarded-for", xff) } if xri := header.Get("X-Real-Ip"); xri != "" { md.Set("x-real-ip", xri) } // Forward Cookie header for authentication methods that need it (e.g., RefreshToken) if cookie := header.Get("Cookie"); cookie != "" { md.Set("cookie", cookie) } // Set metadata in context so services can use metadata.FromIncomingContext() ctx = metadata.NewIncomingContext(ctx, md) return next(ctx, req) } } func (*MetadataInterceptor) WrapStreamingClient(next connect.StreamingClientFunc) connect.StreamingClientFunc { return next } func (*MetadataInterceptor) WrapStreamingHandler(next connect.StreamingHandlerFunc) connect.StreamingHandlerFunc { return next } // LoggingInterceptor logs Connect RPC requests with appropriate log levels. // // Log levels: // - INFO: Successful requests and expected client errors (not found, permission denied, etc.) // - ERROR: Server errors (internal, unavailable, etc.) type LoggingInterceptor struct { logStacktrace bool } // NewLoggingInterceptor creates a new logging interceptor. func NewLoggingInterceptor(logStacktrace bool) *LoggingInterceptor { return &LoggingInterceptor{logStacktrace: logStacktrace} } func (in *LoggingInterceptor) WrapUnary(next connect.UnaryFunc) connect.UnaryFunc { return func(ctx context.Context, req connect.AnyRequest) (connect.AnyResponse, error) { resp, err := next(ctx, req) in.log(req.Spec().Procedure, err) return resp, err } } func (*LoggingInterceptor) WrapStreamingClient(next connect.StreamingClientFunc) connect.StreamingClientFunc { return next // No-op for server-side interceptor } func (*LoggingInterceptor) WrapStreamingHandler(next connect.StreamingHandlerFunc) connect.StreamingHandlerFunc { return next // Streaming not used in this service } func (in *LoggingInterceptor) log(procedure string, err error) { level, msg := in.classifyError(err) attrs := []slog.Attr{slog.String("method", procedure)} if err != nil { attrs = append(attrs, slog.String("error", err.Error())) if in.logStacktrace { attrs = append(attrs, slog.String("stacktrace", fmt.Sprintf("%+v", err))) } } slog.LogAttrs(context.Background(), level, msg, attrs...) } func (*LoggingInterceptor) classifyError(err error) (slog.Level, string) { if err == nil { return slog.LevelInfo, "OK" } var connectErr *connect.Error if !pkgerrors.As(err, &connectErr) { return slog.LevelError, "unknown error" } // Client errors (expected, log at INFO) switch connectErr.Code() { case connect.CodeCanceled, connect.CodeInvalidArgument, connect.CodeNotFound, connect.CodeAlreadyExists, connect.CodePermissionDenied, connect.CodeUnauthenticated, connect.CodeResourceExhausted, connect.CodeFailedPrecondition, connect.CodeAborted, connect.CodeOutOfRange: return slog.LevelInfo, "client error" default: // Server errors return slog.LevelError, "server error" } } // RecoveryInterceptor recovers from panics in Connect handlers and returns an internal error. type RecoveryInterceptor struct { logStacktrace bool } // NewRecoveryInterceptor creates a new recovery interceptor. func NewRecoveryInterceptor(logStacktrace bool) *RecoveryInterceptor { return &RecoveryInterceptor{logStacktrace: logStacktrace} } func (in *RecoveryInterceptor) WrapUnary(next connect.UnaryFunc) connect.UnaryFunc { return func(ctx context.Context, req connect.AnyRequest) (resp connect.AnyResponse, err error) { defer func() { if r := recover(); r != nil { in.logPanic(req.Spec().Procedure, r) err = connect.NewError(connect.CodeInternal, pkgerrors.New("internal server error")) } }() return next(ctx, req) } } func (*RecoveryInterceptor) WrapStreamingClient(next connect.StreamingClientFunc) connect.StreamingClientFunc { return next } func (*RecoveryInterceptor) WrapStreamingHandler(next connect.StreamingHandlerFunc) connect.StreamingHandlerFunc { return next } func (in *RecoveryInterceptor) logPanic(procedure string, panicValue any) { attrs := []slog.Attr{ slog.String("method", procedure), slog.Any("panic", panicValue), } if in.logStacktrace { attrs = append(attrs, slog.String("stacktrace", string(debug.Stack()))) } slog.LogAttrs(context.Background(), slog.LevelError, "panic recovered in Connect handler", attrs...) } // AuthInterceptor handles authentication for Connect handlers. // // It enforces authentication for all endpoints except those listed in PublicMethods. // Role-based authorization (admin checks) remains in the service layer. type AuthInterceptor struct { authenticator *auth.Authenticator } // NewAuthInterceptor creates a new auth interceptor. func NewAuthInterceptor(store *store.Store, secret string) *AuthInterceptor { return &AuthInterceptor{ authenticator: auth.NewAuthenticator(store, secret), } } func (in *AuthInterceptor) WrapUnary(next connect.UnaryFunc) connect.UnaryFunc { return func(ctx context.Context, req connect.AnyRequest) (connect.AnyResponse, error) { header := req.Header() authHeader := header.Get("Authorization") result := in.authenticator.Authenticate(ctx, authHeader) // Enforce authentication for non-public methods if result == nil && !IsPublicMethod(req.Spec().Procedure) { return nil, connect.NewError(connect.CodeUnauthenticated, errors.New("authentication required")) } // Set context based on auth result if result != nil { if result.Claims != nil { // Access Token V2 - stateless, use claims ctx = auth.SetUserClaimsInContext(ctx, result.Claims) ctx = context.WithValue(ctx, auth.UserIDContextKey, result.Claims.UserID) } else if result.User != nil { // PAT - have full user ctx = auth.SetUserInContext(ctx, result.User, result.AccessToken) } } return next(ctx, req) } } func (*AuthInterceptor) WrapStreamingClient(next connect.StreamingClientFunc) connect.StreamingClientFunc { return next } func (*AuthInterceptor) WrapStreamingHandler(next connect.StreamingHandlerFunc) connect.StreamingHandlerFunc { return next }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/router/api/v1/attachment_service.go
server/router/api/v1/attachment_service.go
package v1 import ( "bytes" "context" "encoding/binary" "fmt" "io" "mime" "net/http" "os" "path/filepath" "regexp" "strings" "time" "github.com/lithammer/shortuuid/v4" "github.com/pkg/errors" "google.golang.org/grpc/codes" "google.golang.org/grpc/status" "google.golang.org/protobuf/types/known/emptypb" "google.golang.org/protobuf/types/known/timestamppb" "github.com/usememos/memos/internal/profile" "github.com/usememos/memos/internal/util" "github.com/usememos/memos/plugin/filter" "github.com/usememos/memos/plugin/storage/s3" v1pb "github.com/usememos/memos/proto/gen/api/v1" storepb "github.com/usememos/memos/proto/gen/store" "github.com/usememos/memos/store" ) const ( // The upload memory buffer is 32 MiB. // It should be kept low, so RAM usage doesn't get out of control. // This is unrelated to maximum upload size limit, which is now set through system setting. MaxUploadBufferSizeBytes = 32 << 20 MebiByte = 1024 * 1024 // ThumbnailCacheFolder is the folder name where the thumbnail images are stored. ThumbnailCacheFolder = ".thumbnail_cache" ) var SupportedThumbnailMimeTypes = []string{ "image/png", "image/jpeg", } func (s *APIV1Service) CreateAttachment(ctx context.Context, request *v1pb.CreateAttachmentRequest) (*v1pb.Attachment, error) { user, err := s.fetchCurrentUser(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get current user: %v", err) } if user == nil { return nil, status.Errorf(codes.Unauthenticated, "user not authenticated") } // Validate required fields if request.Attachment == nil { return nil, status.Errorf(codes.InvalidArgument, "attachment is required") } if request.Attachment.Filename == "" { return nil, status.Errorf(codes.InvalidArgument, "filename is required") } if !validateFilename(request.Attachment.Filename) { return nil, status.Errorf(codes.InvalidArgument, "filename contains invalid characters or format") } if request.Attachment.Type == "" { ext := filepath.Ext(request.Attachment.Filename) mimeType := mime.TypeByExtension(ext) if mimeType == "" { mimeType = http.DetectContentType(request.Attachment.Content) } // ParseMediaType to strip parameters mediaType, _, err := mime.ParseMediaType(mimeType) if err == nil { request.Attachment.Type = mediaType } } if request.Attachment.Type == "" { request.Attachment.Type = "application/octet-stream" } if !isValidMimeType(request.Attachment.Type) { return nil, status.Errorf(codes.InvalidArgument, "invalid MIME type format") } // Use provided attachment_id or generate a new one attachmentUID := request.AttachmentId if attachmentUID == "" { attachmentUID = shortuuid.New() } create := &store.Attachment{ UID: attachmentUID, CreatorID: user.ID, Filename: request.Attachment.Filename, Type: request.Attachment.Type, } instanceStorageSetting, err := s.Store.GetInstanceStorageSetting(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get instance storage setting: %v", err) } size := binary.Size(request.Attachment.Content) uploadSizeLimit := int(instanceStorageSetting.UploadSizeLimitMb) * MebiByte if uploadSizeLimit == 0 { uploadSizeLimit = MaxUploadBufferSizeBytes } if size > uploadSizeLimit { return nil, status.Errorf(codes.InvalidArgument, "file size exceeds the limit") } create.Size = int64(size) create.Blob = request.Attachment.Content if err := SaveAttachmentBlob(ctx, s.Profile, s.Store, create); err != nil { return nil, status.Errorf(codes.Internal, "failed to save attachment blob: %v", err) } if request.Attachment.Memo != nil { memoUID, err := ExtractMemoUIDFromName(*request.Attachment.Memo) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid memo name: %v", err) } memo, err := s.Store.GetMemo(ctx, &store.FindMemo{UID: &memoUID}) if err != nil { return nil, status.Errorf(codes.Internal, "failed to find memo: %v", err) } if memo == nil { return nil, status.Errorf(codes.NotFound, "memo not found: %s", *request.Attachment.Memo) } create.MemoID = &memo.ID } attachment, err := s.Store.CreateAttachment(ctx, create) if err != nil { return nil, status.Errorf(codes.Internal, "failed to create attachment: %v", err) } return convertAttachmentFromStore(attachment), nil } func (s *APIV1Service) ListAttachments(ctx context.Context, request *v1pb.ListAttachmentsRequest) (*v1pb.ListAttachmentsResponse, error) { user, err := s.fetchCurrentUser(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get current user: %v", err) } if user == nil { return nil, status.Errorf(codes.Unauthenticated, "user not authenticated") } // Set default page size pageSize := int(request.PageSize) if pageSize <= 0 { pageSize = 50 } if pageSize > 1000 { pageSize = 1000 } // Parse page token for offset offset := 0 if request.PageToken != "" { // Simple implementation: page token is the offset as string // In production, you might want to use encrypted tokens if parsed, err := fmt.Sscanf(request.PageToken, "%d", &offset); err != nil || parsed != 1 { return nil, status.Errorf(codes.InvalidArgument, "invalid page token") } } findAttachment := &store.FindAttachment{ CreatorID: &user.ID, Limit: &pageSize, Offset: &offset, } // Parse filter if provided if request.Filter != "" { if err := s.validateAttachmentFilter(ctx, request.Filter); err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid filter: %v", err) } findAttachment.Filters = append(findAttachment.Filters, request.Filter) } attachments, err := s.Store.ListAttachments(ctx, findAttachment) if err != nil { return nil, status.Errorf(codes.Internal, "failed to list attachments: %v", err) } response := &v1pb.ListAttachmentsResponse{} for _, attachment := range attachments { response.Attachments = append(response.Attachments, convertAttachmentFromStore(attachment)) } // For simplicity, set total size to the number of returned attachments. // In a full implementation, you'd want a separate count query response.TotalSize = int32(len(response.Attachments)) // Set next page token if we got the full page size (indicating there might be more) if len(attachments) == pageSize { response.NextPageToken = fmt.Sprintf("%d", offset+pageSize) } return response, nil } func (s *APIV1Service) GetAttachment(ctx context.Context, request *v1pb.GetAttachmentRequest) (*v1pb.Attachment, error) { attachmentUID, err := ExtractAttachmentUIDFromName(request.Name) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid attachment id: %v", err) } attachment, err := s.Store.GetAttachment(ctx, &store.FindAttachment{UID: &attachmentUID}) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get attachment: %v", err) } if attachment == nil { return nil, status.Errorf(codes.NotFound, "attachment not found") } return convertAttachmentFromStore(attachment), nil } func (s *APIV1Service) UpdateAttachment(ctx context.Context, request *v1pb.UpdateAttachmentRequest) (*v1pb.Attachment, error) { attachmentUID, err := ExtractAttachmentUIDFromName(request.Attachment.Name) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid attachment id: %v", err) } if request.UpdateMask == nil || len(request.UpdateMask.Paths) == 0 { return nil, status.Errorf(codes.InvalidArgument, "update mask is required") } attachment, err := s.Store.GetAttachment(ctx, &store.FindAttachment{UID: &attachmentUID}) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get attachment: %v", err) } currentTs := time.Now().Unix() update := &store.UpdateAttachment{ ID: attachment.ID, UpdatedTs: &currentTs, } for _, field := range request.UpdateMask.Paths { if field == "filename" { if !validateFilename(request.Attachment.Filename) { return nil, status.Errorf(codes.InvalidArgument, "filename contains invalid characters or format") } update.Filename = &request.Attachment.Filename } } if err := s.Store.UpdateAttachment(ctx, update); err != nil { return nil, status.Errorf(codes.Internal, "failed to update attachment: %v", err) } return s.GetAttachment(ctx, &v1pb.GetAttachmentRequest{ Name: request.Attachment.Name, }) } func (s *APIV1Service) DeleteAttachment(ctx context.Context, request *v1pb.DeleteAttachmentRequest) (*emptypb.Empty, error) { attachmentUID, err := ExtractAttachmentUIDFromName(request.Name) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid attachment id: %v", err) } user, err := s.fetchCurrentUser(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get current user: %v", err) } if user == nil { return nil, status.Errorf(codes.Unauthenticated, "user not authenticated") } attachment, err := s.Store.GetAttachment(ctx, &store.FindAttachment{ UID: &attachmentUID, CreatorID: &user.ID, }) if err != nil { return nil, status.Errorf(codes.Internal, "failed to find attachment: %v", err) } if attachment == nil { return nil, status.Errorf(codes.NotFound, "attachment not found") } // Delete the attachment from the database. if err := s.Store.DeleteAttachment(ctx, &store.DeleteAttachment{ ID: attachment.ID, }); err != nil { return nil, status.Errorf(codes.Internal, "failed to delete attachment: %v", err) } return &emptypb.Empty{}, nil } func convertAttachmentFromStore(attachment *store.Attachment) *v1pb.Attachment { attachmentMessage := &v1pb.Attachment{ Name: fmt.Sprintf("%s%s", AttachmentNamePrefix, attachment.UID), CreateTime: timestamppb.New(time.Unix(attachment.CreatedTs, 0)), Filename: attachment.Filename, Type: attachment.Type, Size: attachment.Size, } if attachment.MemoUID != nil && *attachment.MemoUID != "" { memoName := fmt.Sprintf("%s%s", MemoNamePrefix, *attachment.MemoUID) attachmentMessage.Memo = &memoName } if attachment.StorageType == storepb.AttachmentStorageType_EXTERNAL || attachment.StorageType == storepb.AttachmentStorageType_S3 { attachmentMessage.ExternalLink = attachment.Reference } return attachmentMessage } // SaveAttachmentBlob save the blob of attachment based on the storage config. func SaveAttachmentBlob(ctx context.Context, profile *profile.Profile, stores *store.Store, create *store.Attachment) error { instanceStorageSetting, err := stores.GetInstanceStorageSetting(ctx) if err != nil { return errors.Wrap(err, "Failed to find instance storage setting") } if instanceStorageSetting.StorageType == storepb.InstanceStorageSetting_LOCAL { filepathTemplate := "assets/{timestamp}_{filename}" if instanceStorageSetting.FilepathTemplate != "" { filepathTemplate = instanceStorageSetting.FilepathTemplate } internalPath := filepathTemplate if !strings.Contains(internalPath, "{filename}") { internalPath = filepath.Join(internalPath, "{filename}") } internalPath = replaceFilenameWithPathTemplate(internalPath, create.Filename) internalPath = filepath.ToSlash(internalPath) // Ensure the directory exists. osPath := filepath.FromSlash(internalPath) if !filepath.IsAbs(osPath) { osPath = filepath.Join(profile.Data, osPath) } dir := filepath.Dir(osPath) if err = os.MkdirAll(dir, os.ModePerm); err != nil { return errors.Wrap(err, "Failed to create directory") } // Write the blob to the file. if err := os.WriteFile(osPath, create.Blob, 0644); err != nil { return errors.Wrap(err, "Failed to write file") } create.Reference = internalPath create.Blob = nil create.StorageType = storepb.AttachmentStorageType_LOCAL } else if instanceStorageSetting.StorageType == storepb.InstanceStorageSetting_S3 { s3Config := instanceStorageSetting.S3Config if s3Config == nil { return errors.Errorf("No activated external storage found") } s3Client, err := s3.NewClient(ctx, s3Config) if err != nil { return errors.Wrap(err, "Failed to create s3 client") } filepathTemplate := instanceStorageSetting.FilepathTemplate if !strings.Contains(filepathTemplate, "{filename}") { filepathTemplate = filepath.Join(filepathTemplate, "{filename}") } filepathTemplate = replaceFilenameWithPathTemplate(filepathTemplate, create.Filename) key, err := s3Client.UploadObject(ctx, filepathTemplate, create.Type, bytes.NewReader(create.Blob)) if err != nil { return errors.Wrap(err, "Failed to upload via s3 client") } presignURL, err := s3Client.PresignGetObject(ctx, key) if err != nil { return errors.Wrap(err, "Failed to presign via s3 client") } create.Reference = presignURL create.Blob = nil create.StorageType = storepb.AttachmentStorageType_S3 create.Payload = &storepb.AttachmentPayload{ Payload: &storepb.AttachmentPayload_S3Object_{ S3Object: &storepb.AttachmentPayload_S3Object{ S3Config: s3Config, Key: key, LastPresignedTime: timestamppb.New(time.Now()), }, }, } } return nil } func (s *APIV1Service) GetAttachmentBlob(attachment *store.Attachment) ([]byte, error) { // For local storage, read the file from the local disk. if attachment.StorageType == storepb.AttachmentStorageType_LOCAL { attachmentPath := filepath.FromSlash(attachment.Reference) if !filepath.IsAbs(attachmentPath) { attachmentPath = filepath.Join(s.Profile.Data, attachmentPath) } file, err := os.Open(attachmentPath) if err != nil { if os.IsNotExist(err) { return nil, errors.Wrap(err, "file not found") } return nil, errors.Wrap(err, "failed to open the file") } defer file.Close() blob, err := io.ReadAll(file) if err != nil { return nil, errors.Wrap(err, "failed to read the file") } return blob, nil } // For S3 storage, download the file from S3. if attachment.StorageType == storepb.AttachmentStorageType_S3 { if attachment.Payload == nil { return nil, errors.New("attachment payload is missing") } s3Object := attachment.Payload.GetS3Object() if s3Object == nil { return nil, errors.New("S3 object payload is missing") } if s3Object.S3Config == nil { return nil, errors.New("S3 config is missing") } if s3Object.Key == "" { return nil, errors.New("S3 object key is missing") } s3Client, err := s3.NewClient(context.Background(), s3Object.S3Config) if err != nil { return nil, errors.Wrap(err, "failed to create S3 client") } blob, err := s3Client.GetObject(context.Background(), s3Object.Key) if err != nil { return nil, errors.Wrap(err, "failed to get object from S3") } return blob, nil } // For database storage, return the blob from the database. return attachment.Blob, nil } var fileKeyPattern = regexp.MustCompile(`\{[a-z]{1,9}\}`) func replaceFilenameWithPathTemplate(path, filename string) string { t := time.Now() path = fileKeyPattern.ReplaceAllStringFunc(path, func(s string) string { switch s { case "{filename}": return filename case "{timestamp}": return fmt.Sprintf("%d", t.Unix()) case "{year}": return fmt.Sprintf("%d", t.Year()) case "{month}": return fmt.Sprintf("%02d", t.Month()) case "{day}": return fmt.Sprintf("%02d", t.Day()) case "{hour}": return fmt.Sprintf("%02d", t.Hour()) case "{minute}": return fmt.Sprintf("%02d", t.Minute()) case "{second}": return fmt.Sprintf("%02d", t.Second()) case "{uuid}": return util.GenUUID() default: return s } }) return path } func validateFilename(filename string) bool { // Reject path traversal attempts and make sure no additional directories are created if !filepath.IsLocal(filename) || strings.ContainsAny(filename, "/\\") { return false } // Reject filenames starting or ending with spaces or periods if strings.HasPrefix(filename, " ") || strings.HasSuffix(filename, " ") || strings.HasPrefix(filename, ".") || strings.HasSuffix(filename, ".") { return false } return true } func isValidMimeType(mimeType string) bool { // Reject empty or excessively long MIME types if mimeType == "" || len(mimeType) > 255 { return false } // MIME type must match the pattern: type/subtype // Allow common characters in MIME types per RFC 2045 matched, _ := regexp.MatchString(`^[a-zA-Z0-9][a-zA-Z0-9!#$&^_.+-]{0,126}/[a-zA-Z0-9][a-zA-Z0-9!#$&^_.+-]{0,126}$`, mimeType) return matched } func (s *APIV1Service) validateAttachmentFilter(ctx context.Context, filterStr string) error { if filterStr == "" { return errors.New("filter cannot be empty") } engine, err := filter.DefaultAttachmentEngine() if err != nil { return err } var dialect filter.DialectName switch s.Profile.Driver { case "mysql": dialect = filter.DialectMySQL case "postgres": dialect = filter.DialectPostgres default: dialect = filter.DialectSQLite } if _, err := engine.CompileToStatement(ctx, filterStr, filter.RenderOptions{Dialect: dialect}); err != nil { return errors.Wrap(err, "failed to compile filter") } return nil }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/router/api/v1/reaction_service.go
server/router/api/v1/reaction_service.go
package v1 import ( "context" "fmt" "time" "google.golang.org/grpc/codes" "google.golang.org/grpc/status" "google.golang.org/protobuf/types/known/emptypb" "google.golang.org/protobuf/types/known/timestamppb" v1pb "github.com/usememos/memos/proto/gen/api/v1" "github.com/usememos/memos/store" ) func (s *APIV1Service) ListMemoReactions(ctx context.Context, request *v1pb.ListMemoReactionsRequest) (*v1pb.ListMemoReactionsResponse, error) { reactions, err := s.Store.ListReactions(ctx, &store.FindReaction{ ContentID: &request.Name, }) if err != nil { return nil, status.Errorf(codes.Internal, "failed to list reactions") } response := &v1pb.ListMemoReactionsResponse{ Reactions: []*v1pb.Reaction{}, } for _, reaction := range reactions { reactionMessage := convertReactionFromStore(reaction) response.Reactions = append(response.Reactions, reactionMessage) } return response, nil } func (s *APIV1Service) UpsertMemoReaction(ctx context.Context, request *v1pb.UpsertMemoReactionRequest) (*v1pb.Reaction, error) { user, err := s.fetchCurrentUser(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get current user") } if user == nil { return nil, status.Errorf(codes.Unauthenticated, "user not authenticated") } reaction, err := s.Store.UpsertReaction(ctx, &store.Reaction{ CreatorID: user.ID, ContentID: request.Reaction.ContentId, ReactionType: request.Reaction.ReactionType, }) if err != nil { return nil, status.Errorf(codes.Internal, "failed to upsert reaction") } reactionMessage := convertReactionFromStore(reaction) return reactionMessage, nil } func (s *APIV1Service) DeleteMemoReaction(ctx context.Context, request *v1pb.DeleteMemoReactionRequest) (*emptypb.Empty, error) { user, err := s.fetchCurrentUser(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get current user: %v", err) } if user == nil { return nil, status.Errorf(codes.Unauthenticated, "user not authenticated") } _, reactionID, err := ExtractMemoReactionIDFromName(request.Name) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid reaction name: %v", err) } // Get reaction and check ownership. reaction, err := s.Store.GetReaction(ctx, &store.FindReaction{ ID: &reactionID, }) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get reaction") } if reaction == nil { // Return permission denied to avoid revealing if reaction exists. return nil, status.Errorf(codes.PermissionDenied, "permission denied") } if reaction.CreatorID != user.ID && !isSuperUser(user) { return nil, status.Errorf(codes.PermissionDenied, "permission denied") } if err := s.Store.DeleteReaction(ctx, &store.DeleteReaction{ ID: reactionID, }); err != nil { return nil, status.Errorf(codes.Internal, "failed to delete reaction") } return &emptypb.Empty{}, nil } func convertReactionFromStore(reaction *store.Reaction) *v1pb.Reaction { reactionUID := fmt.Sprintf("%d", reaction.ID) // Generate nested resource name: memos/{memo}/reactions/{reaction} // reaction.ContentID already contains "memos/{memo}" return &v1pb.Reaction{ Name: fmt.Sprintf("%s/%s%s", reaction.ContentID, ReactionNamePrefix, reactionUID), Creator: fmt.Sprintf("%s%d", UserNamePrefix, reaction.CreatorID), ContentId: reaction.ContentID, ReactionType: reaction.ReactionType, CreateTime: timestamppb.New(time.Unix(reaction.CreatedTs, 0)), } }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/router/api/v1/shortcut_service.go
server/router/api/v1/shortcut_service.go
package v1 import ( "context" "fmt" "strings" "github.com/pkg/errors" "google.golang.org/grpc/codes" "google.golang.org/grpc/status" "google.golang.org/protobuf/types/known/emptypb" "github.com/usememos/memos/internal/util" "github.com/usememos/memos/plugin/filter" v1pb "github.com/usememos/memos/proto/gen/api/v1" storepb "github.com/usememos/memos/proto/gen/store" "github.com/usememos/memos/store" ) // Helper function to extract user ID and shortcut ID from shortcut resource name. // Format: users/{user}/shortcuts/{shortcut}. func extractUserAndShortcutIDFromName(name string) (int32, string, error) { parts := strings.Split(name, "/") if len(parts) != 4 || parts[0] != "users" || parts[2] != "shortcuts" { return 0, "", errors.Errorf("invalid shortcut name format: %s", name) } userID, err := util.ConvertStringToInt32(parts[1]) if err != nil { return 0, "", errors.Errorf("invalid user ID %q", parts[1]) } shortcutID := parts[3] if shortcutID == "" { return 0, "", errors.Errorf("empty shortcut ID in name: %s", name) } return userID, shortcutID, nil } // Helper function to construct shortcut resource name. func constructShortcutName(userID int32, shortcutID string) string { return fmt.Sprintf("users/%d/shortcuts/%s", userID, shortcutID) } func (s *APIV1Service) ListShortcuts(ctx context.Context, request *v1pb.ListShortcutsRequest) (*v1pb.ListShortcutsResponse, error) { userID, err := ExtractUserIDFromName(request.Parent) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid user name: %v", err) } currentUser, err := s.fetchCurrentUser(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get current user: %v", err) } if currentUser == nil || currentUser.ID != userID { return nil, status.Errorf(codes.PermissionDenied, "permission denied") } userSetting, err := s.Store.GetUserSetting(ctx, &store.FindUserSetting{ UserID: &userID, Key: storepb.UserSetting_SHORTCUTS, }) if err != nil { return nil, err } if userSetting == nil { return &v1pb.ListShortcutsResponse{ Shortcuts: []*v1pb.Shortcut{}, }, nil } shortcutsUserSetting := userSetting.GetShortcuts() shortcuts := []*v1pb.Shortcut{} for _, shortcut := range shortcutsUserSetting.GetShortcuts() { shortcuts = append(shortcuts, &v1pb.Shortcut{ Name: constructShortcutName(userID, shortcut.GetId()), Title: shortcut.GetTitle(), Filter: shortcut.GetFilter(), }) } return &v1pb.ListShortcutsResponse{ Shortcuts: shortcuts, }, nil } func (s *APIV1Service) GetShortcut(ctx context.Context, request *v1pb.GetShortcutRequest) (*v1pb.Shortcut, error) { userID, shortcutID, err := extractUserAndShortcutIDFromName(request.Name) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid shortcut name: %v", err) } currentUser, err := s.fetchCurrentUser(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get current user: %v", err) } if currentUser == nil || currentUser.ID != userID { return nil, status.Errorf(codes.PermissionDenied, "permission denied") } userSetting, err := s.Store.GetUserSetting(ctx, &store.FindUserSetting{ UserID: &userID, Key: storepb.UserSetting_SHORTCUTS, }) if err != nil { return nil, err } if userSetting == nil { return nil, status.Errorf(codes.NotFound, "shortcut not found") } shortcutsUserSetting := userSetting.GetShortcuts() for _, shortcut := range shortcutsUserSetting.GetShortcuts() { if shortcut.GetId() == shortcutID { return &v1pb.Shortcut{ Name: constructShortcutName(userID, shortcut.GetId()), Title: shortcut.GetTitle(), Filter: shortcut.GetFilter(), }, nil } } return nil, status.Errorf(codes.NotFound, "shortcut not found") } func (s *APIV1Service) CreateShortcut(ctx context.Context, request *v1pb.CreateShortcutRequest) (*v1pb.Shortcut, error) { userID, err := ExtractUserIDFromName(request.Parent) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid user name: %v", err) } currentUser, err := s.fetchCurrentUser(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get current user: %v", err) } if currentUser == nil || currentUser.ID != userID { return nil, status.Errorf(codes.PermissionDenied, "permission denied") } newShortcut := &storepb.ShortcutsUserSetting_Shortcut{ Id: util.GenUUID(), Title: request.Shortcut.GetTitle(), Filter: request.Shortcut.GetFilter(), } if newShortcut.Title == "" { return nil, status.Errorf(codes.InvalidArgument, "title is required") } if err := s.validateFilter(ctx, newShortcut.Filter); err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid filter: %v", err) } if request.ValidateOnly { return &v1pb.Shortcut{ Name: constructShortcutName(userID, newShortcut.GetId()), Title: newShortcut.GetTitle(), Filter: newShortcut.GetFilter(), }, nil } userSetting, err := s.Store.GetUserSetting(ctx, &store.FindUserSetting{ UserID: &userID, Key: storepb.UserSetting_SHORTCUTS, }) if err != nil { return nil, err } if userSetting == nil { userSetting = &storepb.UserSetting{ UserId: userID, Key: storepb.UserSetting_SHORTCUTS, Value: &storepb.UserSetting_Shortcuts{ Shortcuts: &storepb.ShortcutsUserSetting{ Shortcuts: []*storepb.ShortcutsUserSetting_Shortcut{}, }, }, } } shortcutsUserSetting := userSetting.GetShortcuts() shortcuts := shortcutsUserSetting.GetShortcuts() shortcuts = append(shortcuts, newShortcut) shortcutsUserSetting.Shortcuts = shortcuts userSetting.Value = &storepb.UserSetting_Shortcuts{ Shortcuts: shortcutsUserSetting, } _, err = s.Store.UpsertUserSetting(ctx, userSetting) if err != nil { return nil, err } return &v1pb.Shortcut{ Name: constructShortcutName(userID, newShortcut.GetId()), Title: newShortcut.GetTitle(), Filter: newShortcut.GetFilter(), }, nil } func (s *APIV1Service) UpdateShortcut(ctx context.Context, request *v1pb.UpdateShortcutRequest) (*v1pb.Shortcut, error) { userID, shortcutID, err := extractUserAndShortcutIDFromName(request.Shortcut.Name) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid shortcut name: %v", err) } currentUser, err := s.fetchCurrentUser(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get current user: %v", err) } if currentUser == nil || currentUser.ID != userID { return nil, status.Errorf(codes.PermissionDenied, "permission denied") } if request.UpdateMask == nil || len(request.UpdateMask.Paths) == 0 { return nil, status.Errorf(codes.InvalidArgument, "update mask is required") } userSetting, err := s.Store.GetUserSetting(ctx, &store.FindUserSetting{ UserID: &userID, Key: storepb.UserSetting_SHORTCUTS, }) if err != nil { return nil, err } if userSetting == nil { return nil, status.Errorf(codes.NotFound, "shortcut not found") } shortcutsUserSetting := userSetting.GetShortcuts() shortcuts := shortcutsUserSetting.GetShortcuts() var foundShortcut *storepb.ShortcutsUserSetting_Shortcut newShortcuts := make([]*storepb.ShortcutsUserSetting_Shortcut, 0, len(shortcuts)) for _, shortcut := range shortcuts { if shortcut.GetId() == shortcutID { foundShortcut = shortcut for _, field := range request.UpdateMask.Paths { if field == "title" { if request.Shortcut.GetTitle() == "" { return nil, status.Errorf(codes.InvalidArgument, "title is required") } shortcut.Title = request.Shortcut.GetTitle() } else if field == "filter" { if err := s.validateFilter(ctx, request.Shortcut.GetFilter()); err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid filter: %v", err) } shortcut.Filter = request.Shortcut.GetFilter() } } } newShortcuts = append(newShortcuts, shortcut) } if foundShortcut == nil { return nil, status.Errorf(codes.NotFound, "shortcut not found") } shortcutsUserSetting.Shortcuts = newShortcuts userSetting.Value = &storepb.UserSetting_Shortcuts{ Shortcuts: shortcutsUserSetting, } _, err = s.Store.UpsertUserSetting(ctx, userSetting) if err != nil { return nil, err } return &v1pb.Shortcut{ Name: constructShortcutName(userID, foundShortcut.GetId()), Title: foundShortcut.GetTitle(), Filter: foundShortcut.GetFilter(), }, nil } func (s *APIV1Service) DeleteShortcut(ctx context.Context, request *v1pb.DeleteShortcutRequest) (*emptypb.Empty, error) { userID, shortcutID, err := extractUserAndShortcutIDFromName(request.Name) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid shortcut name: %v", err) } currentUser, err := s.fetchCurrentUser(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get current user: %v", err) } if currentUser == nil || currentUser.ID != userID { return nil, status.Errorf(codes.PermissionDenied, "permission denied") } userSetting, err := s.Store.GetUserSetting(ctx, &store.FindUserSetting{ UserID: &userID, Key: storepb.UserSetting_SHORTCUTS, }) if err != nil { return nil, err } if userSetting == nil { return nil, status.Errorf(codes.NotFound, "shortcut not found") } shortcutsUserSetting := userSetting.GetShortcuts() shortcuts := shortcutsUserSetting.GetShortcuts() newShortcuts := make([]*storepb.ShortcutsUserSetting_Shortcut, 0, len(shortcuts)) found := false for _, shortcut := range shortcuts { if shortcut.GetId() != shortcutID { newShortcuts = append(newShortcuts, shortcut) } else { found = true } } if !found { return nil, status.Errorf(codes.NotFound, "shortcut not found") } shortcutsUserSetting.Shortcuts = newShortcuts userSetting.Value = &storepb.UserSetting_Shortcuts{ Shortcuts: shortcutsUserSetting, } _, err = s.Store.UpsertUserSetting(ctx, userSetting) if err != nil { return nil, err } return &emptypb.Empty{}, nil } func (s *APIV1Service) validateFilter(ctx context.Context, filterStr string) error { if filterStr == "" { return errors.New("filter cannot be empty") } engine, err := filter.DefaultEngine() if err != nil { return err } var dialect filter.DialectName switch s.Profile.Driver { case "mysql": dialect = filter.DialectMySQL case "postgres": dialect = filter.DialectPostgres default: dialect = filter.DialectSQLite } if _, err := engine.CompileToStatement(ctx, filterStr, filter.RenderOptions{Dialect: dialect}); err != nil { return errors.Wrap(err, "failed to compile filter") } return nil }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/router/api/v1/resource_name.go
server/router/api/v1/resource_name.go
package v1 import ( "fmt" "strings" "github.com/pkg/errors" "github.com/usememos/memos/internal/util" ) const ( InstanceSettingNamePrefix = "instance/settings/" UserNamePrefix = "users/" MemoNamePrefix = "memos/" AttachmentNamePrefix = "attachments/" ReactionNamePrefix = "reactions/" InboxNamePrefix = "inboxes/" IdentityProviderNamePrefix = "identity-providers/" ActivityNamePrefix = "activities/" WebhookNamePrefix = "webhooks/" ) // GetNameParentTokens returns the tokens from a resource name. func GetNameParentTokens(name string, tokenPrefixes ...string) ([]string, error) { parts := strings.Split(name, "/") if len(parts) != 2*len(tokenPrefixes) { return nil, errors.Errorf("invalid request %q", name) } var tokens []string for i, tokenPrefix := range tokenPrefixes { if fmt.Sprintf("%s/", parts[2*i]) != tokenPrefix { return nil, errors.Errorf("invalid prefix %q in request %q", tokenPrefix, name) } if parts[2*i+1] == "" { return nil, errors.Errorf("invalid request %q with empty prefix %q", name, tokenPrefix) } tokens = append(tokens, parts[2*i+1]) } return tokens, nil } func ExtractInstanceSettingKeyFromName(name string) (string, error) { const prefix = "instance/settings/" if !strings.HasPrefix(name, prefix) { return "", errors.Errorf("invalid instance setting name: expected prefix %q, got %q", prefix, name) } settingKey := strings.TrimPrefix(name, prefix) if settingKey == "" { return "", errors.Errorf("invalid instance setting name: empty setting key in %q", name) } // Ensure there are no additional path segments if strings.Contains(settingKey, "/") { return "", errors.Errorf("invalid instance setting name: setting key cannot contain '/' in %q", name) } return settingKey, nil } // ExtractUserIDFromName returns the uid from a resource name. func ExtractUserIDFromName(name string) (int32, error) { tokens, err := GetNameParentTokens(name, UserNamePrefix) if err != nil { return 0, err } id, err := util.ConvertStringToInt32(tokens[0]) if err != nil { return 0, errors.Errorf("invalid user ID %q", tokens[0]) } return id, nil } // extractUserIdentifierFromName extracts the identifier (ID or username) from a user resource name. // Supports: "users/101" or "users/steven" // Returns the identifier string (e.g., "101" or "steven"). func extractUserIdentifierFromName(name string) string { tokens, err := GetNameParentTokens(name, UserNamePrefix) if err != nil || len(tokens) == 0 { return "" } return tokens[0] } // ExtractMemoUIDFromName returns the memo UID from a resource name. // e.g., "memos/uuid" -> "uuid". func ExtractMemoUIDFromName(name string) (string, error) { tokens, err := GetNameParentTokens(name, MemoNamePrefix) if err != nil { return "", err } id := tokens[0] return id, nil } // ExtractAttachmentUIDFromName returns the attachment UID from a resource name. func ExtractAttachmentUIDFromName(name string) (string, error) { tokens, err := GetNameParentTokens(name, AttachmentNamePrefix) if err != nil { return "", err } id := tokens[0] return id, nil } // ExtractMemoReactionIDFromName returns the memo UID and reaction ID from a resource name. // e.g., "memos/abc/reactions/123" -> ("abc", 123). func ExtractMemoReactionIDFromName(name string) (string, int32, error) { tokens, err := GetNameParentTokens(name, MemoNamePrefix, ReactionNamePrefix) if err != nil { return "", 0, err } memoUID := tokens[0] reactionID, err := util.ConvertStringToInt32(tokens[1]) if err != nil { return "", 0, errors.Errorf("invalid reaction ID %q", tokens[1]) } return memoUID, reactionID, nil } // ExtractInboxIDFromName returns the inbox ID from a resource name. func ExtractInboxIDFromName(name string) (int32, error) { tokens, err := GetNameParentTokens(name, InboxNamePrefix) if err != nil { return 0, err } id, err := util.ConvertStringToInt32(tokens[0]) if err != nil { return 0, errors.Errorf("invalid inbox ID %q", tokens[0]) } return id, nil } func ExtractIdentityProviderIDFromName(name string) (int32, error) { tokens, err := GetNameParentTokens(name, IdentityProviderNamePrefix) if err != nil { return 0, err } id, err := util.ConvertStringToInt32(tokens[0]) if err != nil { return 0, errors.Errorf("invalid identity provider ID %q", tokens[0]) } return id, nil } func ExtractActivityIDFromName(name string) (int32, error) { tokens, err := GetNameParentTokens(name, ActivityNamePrefix) if err != nil { return 0, err } id, err := util.ConvertStringToInt32(tokens[0]) if err != nil { return 0, errors.Errorf("invalid activity ID %q", tokens[0]) } return id, nil }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/router/api/v1/memo_service_filter.go
server/router/api/v1/memo_service_filter.go
package v1
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/router/api/v1/user_service.go
server/router/api/v1/user_service.go
package v1 import ( "context" "crypto/rand" "encoding/hex" "fmt" "net/http" "regexp" "strconv" "strings" "time" "github.com/google/cel-go/cel" "github.com/google/cel-go/common/ast" "github.com/labstack/echo/v4" "github.com/pkg/errors" "golang.org/x/crypto/bcrypt" "google.golang.org/grpc/codes" "google.golang.org/grpc/status" "google.golang.org/protobuf/types/known/emptypb" "google.golang.org/protobuf/types/known/timestamppb" "github.com/usememos/memos/internal/base" "github.com/usememos/memos/internal/util" v1pb "github.com/usememos/memos/proto/gen/api/v1" storepb "github.com/usememos/memos/proto/gen/store" "github.com/usememos/memos/server/auth" "github.com/usememos/memos/store" ) func (s *APIV1Service) ListUsers(ctx context.Context, request *v1pb.ListUsersRequest) (*v1pb.ListUsersResponse, error) { currentUser, err := s.fetchCurrentUser(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get user: %v", err) } if currentUser == nil { return nil, status.Errorf(codes.Unauthenticated, "user not authenticated") } if currentUser.Role != store.RoleHost && currentUser.Role != store.RoleAdmin { return nil, status.Errorf(codes.PermissionDenied, "permission denied") } userFind := &store.FindUser{} if request.Filter != "" { username, err := extractUsernameFromFilter(request.Filter) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid filter: %v", err) } if username != "" { userFind.Username = &username } } users, err := s.Store.ListUsers(ctx, userFind) if err != nil { return nil, status.Errorf(codes.Internal, "failed to list users: %v", err) } // TODO: Implement proper ordering, and pagination // For now, return all users with basic structure response := &v1pb.ListUsersResponse{ Users: []*v1pb.User{}, TotalSize: int32(len(users)), } for _, user := range users { response.Users = append(response.Users, convertUserFromStore(user)) } return response, nil } func (s *APIV1Service) GetUser(ctx context.Context, request *v1pb.GetUserRequest) (*v1pb.User, error) { // Extract identifier from "users/{id_or_username}" identifier := extractUserIdentifierFromName(request.Name) if identifier == "" { return nil, status.Errorf(codes.InvalidArgument, "invalid user name: %s", request.Name) } var user *store.User var err error // Try to parse as numeric ID first if userID, parseErr := strconv.ParseInt(identifier, 10, 32); parseErr == nil { // It's a numeric ID userID32 := int32(userID) user, err = s.Store.GetUser(ctx, &store.FindUser{ ID: &userID32, }) } else { // It's a username user, err = s.Store.GetUser(ctx, &store.FindUser{ Username: &identifier, }) } if err != nil { return nil, status.Errorf(codes.Internal, "failed to get user: %v", err) } if user == nil { return nil, status.Errorf(codes.NotFound, "user not found") } return convertUserFromStore(user), nil } func (s *APIV1Service) CreateUser(ctx context.Context, request *v1pb.CreateUserRequest) (*v1pb.User, error) { // Get current user (might be nil for unauthenticated requests) currentUser, _ := s.fetchCurrentUser(ctx) // Check if there are any existing users (for first-time setup detection) limitOne := 1 allUsers, err := s.Store.ListUsers(ctx, &store.FindUser{Limit: &limitOne}) if err != nil { return nil, status.Errorf(codes.Internal, "failed to list users: %v", err) } isFirstUser := len(allUsers) == 0 // Check registration settings FIRST (unless it's the very first user) if !isFirstUser { // Only allow user registration if it is enabled in the settings, or if the user is a superuser if currentUser == nil || !isSuperUser(currentUser) { instanceGeneralSetting, err := s.Store.GetInstanceGeneralSetting(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get instance general setting, error: %v", err) } if instanceGeneralSetting.DisallowUserRegistration { return nil, status.Errorf(codes.PermissionDenied, "user registration is not allowed") } } } // Determine the role to assign var roleToAssign store.Role if isFirstUser { // First-time setup: create the first user as HOST (no authentication required) roleToAssign = store.RoleHost } else if currentUser != nil && currentUser.Role == store.RoleHost { // Authenticated HOST user can create users with any role specified in request if request.User.Role != v1pb.User_ROLE_UNSPECIFIED { roleToAssign = convertUserRoleToStore(request.User.Role) } else { roleToAssign = store.RoleUser } } else { // Unauthenticated or non-HOST users can only create normal users roleToAssign = store.RoleUser } if !base.UIDMatcher.MatchString(strings.ToLower(request.User.Username)) { return nil, status.Errorf(codes.InvalidArgument, "invalid username: %s", request.User.Username) } // If validate_only is true, just validate without creating if request.ValidateOnly { // Perform validation checks without actually creating the user return &v1pb.User{ Username: request.User.Username, Email: request.User.Email, DisplayName: request.User.DisplayName, Role: convertUserRoleFromStore(roleToAssign), }, nil } passwordHash, err := bcrypt.GenerateFromPassword([]byte(request.User.Password), bcrypt.DefaultCost) if err != nil { return nil, echo.NewHTTPError(http.StatusInternalServerError, "failed to generate password hash").SetInternal(err) } user, err := s.Store.CreateUser(ctx, &store.User{ Username: request.User.Username, Role: roleToAssign, Email: request.User.Email, Nickname: request.User.DisplayName, PasswordHash: string(passwordHash), }) if err != nil { return nil, status.Errorf(codes.Internal, "failed to create user: %v", err) } return convertUserFromStore(user), nil } func (s *APIV1Service) UpdateUser(ctx context.Context, request *v1pb.UpdateUserRequest) (*v1pb.User, error) { if request.UpdateMask == nil || len(request.UpdateMask.Paths) == 0 { return nil, status.Errorf(codes.InvalidArgument, "update mask is empty") } userID, err := ExtractUserIDFromName(request.User.Name) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid user name: %v", err) } currentUser, err := s.fetchCurrentUser(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get user: %v", err) } // Check permission. // Only allow admin or self to update user. if currentUser.ID != userID && currentUser.Role != store.RoleAdmin && currentUser.Role != store.RoleHost { return nil, status.Errorf(codes.PermissionDenied, "permission denied") } user, err := s.Store.GetUser(ctx, &store.FindUser{ID: &userID}) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get user: %v", err) } if user == nil { // Handle allow_missing field if request.AllowMissing { // Could create user if missing, but for now return not found return nil, status.Errorf(codes.NotFound, "user not found") } return nil, status.Errorf(codes.NotFound, "user not found") } currentTs := time.Now().Unix() update := &store.UpdateUser{ ID: user.ID, UpdatedTs: &currentTs, } instanceGeneralSetting, err := s.Store.GetInstanceGeneralSetting(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get instance general setting: %v", err) } for _, field := range request.UpdateMask.Paths { switch field { case "username": if instanceGeneralSetting.DisallowChangeUsername { return nil, status.Errorf(codes.PermissionDenied, "permission denied: disallow change username") } if !base.UIDMatcher.MatchString(strings.ToLower(request.User.Username)) { return nil, status.Errorf(codes.InvalidArgument, "invalid username: %s", request.User.Username) } update.Username = &request.User.Username case "display_name": if instanceGeneralSetting.DisallowChangeNickname { return nil, status.Errorf(codes.PermissionDenied, "permission denied: disallow change nickname") } update.Nickname = &request.User.DisplayName case "email": update.Email = &request.User.Email case "avatar_url": // Validate avatar MIME type to prevent XSS during upload if request.User.AvatarUrl != "" { imageType, _, err := extractImageInfo(request.User.AvatarUrl) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid avatar format: %v", err) } // Only allow safe image formats for avatars allowedAvatarTypes := map[string]bool{ "image/png": true, "image/jpeg": true, "image/jpg": true, "image/gif": true, "image/webp": true, } if !allowedAvatarTypes[imageType] { return nil, status.Errorf(codes.InvalidArgument, "invalid avatar image type: %s. Only PNG, JPEG, GIF, and WebP are allowed", imageType) } } update.AvatarURL = &request.User.AvatarUrl case "description": update.Description = &request.User.Description case "role": // Only allow admin to update role. if currentUser.Role != store.RoleAdmin && currentUser.Role != store.RoleHost { return nil, status.Errorf(codes.PermissionDenied, "permission denied") } role := convertUserRoleToStore(request.User.Role) update.Role = &role case "password": passwordHash, err := bcrypt.GenerateFromPassword([]byte(request.User.Password), bcrypt.DefaultCost) if err != nil { return nil, echo.NewHTTPError(http.StatusInternalServerError, "failed to generate password hash").SetInternal(err) } passwordHashStr := string(passwordHash) update.PasswordHash = &passwordHashStr case "state": rowStatus := convertStateToStore(request.User.State) update.RowStatus = &rowStatus default: return nil, status.Errorf(codes.InvalidArgument, "invalid update path: %s", field) } } updatedUser, err := s.Store.UpdateUser(ctx, update) if err != nil { return nil, status.Errorf(codes.Internal, "failed to update user: %v", err) } return convertUserFromStore(updatedUser), nil } func (s *APIV1Service) DeleteUser(ctx context.Context, request *v1pb.DeleteUserRequest) (*emptypb.Empty, error) { userID, err := ExtractUserIDFromName(request.Name) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid user name: %v", err) } currentUser, err := s.fetchCurrentUser(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get user: %v", err) } if currentUser.ID != userID && currentUser.Role != store.RoleAdmin && currentUser.Role != store.RoleHost { return nil, status.Errorf(codes.PermissionDenied, "permission denied") } user, err := s.Store.GetUser(ctx, &store.FindUser{ID: &userID}) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get user: %v", err) } if user == nil { return nil, status.Errorf(codes.NotFound, "user not found") } if err := s.Store.DeleteUser(ctx, &store.DeleteUser{ ID: user.ID, }); err != nil { return nil, status.Errorf(codes.Internal, "failed to delete user: %v", err) } return &emptypb.Empty{}, nil } func getDefaultUserGeneralSetting() *v1pb.UserSetting_GeneralSetting { return &v1pb.UserSetting_GeneralSetting{ Locale: "en", MemoVisibility: "PRIVATE", Theme: "", } } func (s *APIV1Service) GetUserSetting(ctx context.Context, request *v1pb.GetUserSettingRequest) (*v1pb.UserSetting, error) { // Parse resource name: users/{user}/settings/{setting} userID, settingKey, err := ExtractUserIDAndSettingKeyFromName(request.Name) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid resource name: %v", err) } currentUser, err := s.fetchCurrentUser(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get current user: %v", err) } if currentUser == nil { return nil, status.Errorf(codes.Unauthenticated, "user not authenticated") } // Only allow user to get their own settings if currentUser.ID != userID { return nil, status.Errorf(codes.PermissionDenied, "permission denied") } // Convert setting key string to store enum storeKey, err := convertSettingKeyToStore(settingKey) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid setting key: %v", err) } userSetting, err := s.Store.GetUserSetting(ctx, &store.FindUserSetting{ UserID: &userID, Key: storeKey, }) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get user setting: %v", err) } return convertUserSettingFromStore(userSetting, userID, storeKey), nil } func (s *APIV1Service) UpdateUserSetting(ctx context.Context, request *v1pb.UpdateUserSettingRequest) (*v1pb.UserSetting, error) { // Parse resource name: users/{user}/settings/{setting} userID, settingKey, err := ExtractUserIDAndSettingKeyFromName(request.Setting.Name) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid resource name: %v", err) } currentUser, err := s.fetchCurrentUser(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get current user: %v", err) } if currentUser == nil { return nil, status.Errorf(codes.Unauthenticated, "user not authenticated") } // Only allow user to update their own settings if currentUser.ID != userID { return nil, status.Errorf(codes.PermissionDenied, "permission denied") } if request.UpdateMask == nil || len(request.UpdateMask.Paths) == 0 { return nil, status.Errorf(codes.InvalidArgument, "update mask is empty") } // Convert setting key string to store enum storeKey, err := convertSettingKeyToStore(settingKey) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid setting key: %v", err) } // Only GENERAL settings are supported via UpdateUserSetting // Other setting types have dedicated service methods if storeKey != storepb.UserSetting_GENERAL { return nil, status.Errorf(codes.InvalidArgument, "setting type %s should not be updated via UpdateUserSetting", storeKey.String()) } existingUserSetting, _ := s.Store.GetUserSetting(ctx, &store.FindUserSetting{ UserID: &userID, Key: storeKey, }) generalSetting := &storepb.GeneralUserSetting{} if existingUserSetting != nil { // Start with existing general setting values generalSetting = existingUserSetting.GetGeneral() } updatedGeneral := &v1pb.UserSetting_GeneralSetting{ MemoVisibility: generalSetting.GetMemoVisibility(), Locale: generalSetting.GetLocale(), Theme: generalSetting.GetTheme(), } // Apply updates for fields specified in the update mask incomingGeneral := request.Setting.GetGeneralSetting() for _, field := range request.UpdateMask.Paths { switch field { case "memo_visibility": updatedGeneral.MemoVisibility = incomingGeneral.MemoVisibility case "theme": updatedGeneral.Theme = incomingGeneral.Theme case "locale": updatedGeneral.Locale = incomingGeneral.Locale default: // Ignore unsupported fields } } // Create the updated setting updatedSetting := &v1pb.UserSetting{ Name: request.Setting.Name, Value: &v1pb.UserSetting_GeneralSetting_{ GeneralSetting: updatedGeneral, }, } // Convert API setting to store setting storeSetting, err := convertUserSettingToStore(updatedSetting, userID, storeKey) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "failed to convert setting: %v", err) } // Upsert the setting if _, err := s.Store.UpsertUserSetting(ctx, storeSetting); err != nil { return nil, status.Errorf(codes.Internal, "failed to upsert user setting: %v", err) } return s.GetUserSetting(ctx, &v1pb.GetUserSettingRequest{Name: request.Setting.Name}) } func (s *APIV1Service) ListUserSettings(ctx context.Context, request *v1pb.ListUserSettingsRequest) (*v1pb.ListUserSettingsResponse, error) { userID, err := ExtractUserIDFromName(request.Parent) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid parent name: %v", err) } currentUser, err := s.fetchCurrentUser(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get current user: %v", err) } if currentUser == nil { return nil, status.Errorf(codes.Unauthenticated, "user not authenticated") } // Only allow user to list their own settings if currentUser.ID != userID { return nil, status.Errorf(codes.PermissionDenied, "permission denied") } userSettings, err := s.Store.ListUserSettings(ctx, &store.FindUserSetting{ UserID: &userID, }) if err != nil { return nil, status.Errorf(codes.Internal, "failed to list user settings: %v", err) } settings := make([]*v1pb.UserSetting, 0, len(userSettings)) for _, storeSetting := range userSettings { apiSetting := convertUserSettingFromStore(storeSetting, userID, storeSetting.Key) if apiSetting != nil { settings = append(settings, apiSetting) } } // If no general setting exists, add a default one hasGeneral := false for _, setting := range settings { if setting.GetGeneralSetting() != nil { hasGeneral = true break } } if !hasGeneral { defaultGeneral := &v1pb.UserSetting{ Name: fmt.Sprintf("users/%d/settings/general", userID), Value: &v1pb.UserSetting_GeneralSetting_{ GeneralSetting: getDefaultUserGeneralSetting(), }, } settings = append([]*v1pb.UserSetting{defaultGeneral}, settings...) } response := &v1pb.ListUserSettingsResponse{ Settings: settings, TotalSize: int32(len(settings)), } return response, nil } // ListPersonalAccessTokens retrieves all Personal Access Tokens (PATs) for a user. // // Personal Access Tokens are used for: // - Mobile app authentication // - CLI tool authentication // - API client authentication // - Any programmatic access requiring Bearer token auth // // Security: // - Only the token owner can list their tokens // - Returns token metadata only (not the actual token value) // - Invalid or expired tokens are filtered out // // Authentication: Required (session cookie or access token) // Authorization: User can only list their own tokens. func (s *APIV1Service) ListPersonalAccessTokens(ctx context.Context, request *v1pb.ListPersonalAccessTokensRequest) (*v1pb.ListPersonalAccessTokensResponse, error) { userID, err := ExtractUserIDFromName(request.Parent) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid user name: %v", err) } // Verify permission claims := auth.GetUserClaims(ctx) if claims == nil || claims.UserID != userID { currentUser, _ := s.fetchCurrentUser(ctx) if currentUser == nil || (currentUser.ID != userID && currentUser.Role != store.RoleHost && currentUser.Role != store.RoleAdmin) { return nil, status.Errorf(codes.PermissionDenied, "permission denied") } } tokens, err := s.Store.GetUserPersonalAccessTokens(ctx, userID) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get access tokens: %v", err) } personalAccessTokens := make([]*v1pb.PersonalAccessToken, len(tokens)) for i, token := range tokens { personalAccessTokens[i] = &v1pb.PersonalAccessToken{ Name: fmt.Sprintf("%s/personalAccessTokens/%s", request.Parent, token.TokenId), Description: token.Description, ExpiresAt: token.ExpiresAt, CreatedAt: token.CreatedAt, LastUsedAt: token.LastUsedAt, } } return &v1pb.ListPersonalAccessTokensResponse{PersonalAccessTokens: personalAccessTokens}, nil } // CreatePersonalAccessToken creates a new Personal Access Token (PAT) for a user. // // Use cases: // - User manually creates token in settings for mobile app // - User creates token for CLI tool // - User creates token for third-party integration // // Token properties: // - Random string with memos_pat_ prefix // - SHA-256 hash stored in database // - Optional expiration time (can be never-expiring) // - User-provided description for identification // // Security considerations: // - Full token is only shown ONCE (in this response) // - User should copy and store it securely // - Token can be revoked by deleting it from settings // // Authentication: Required (session cookie or access token) // Authorization: User can only create tokens for themselves. func (s *APIV1Service) CreatePersonalAccessToken(ctx context.Context, request *v1pb.CreatePersonalAccessTokenRequest) (*v1pb.CreatePersonalAccessTokenResponse, error) { userID, err := ExtractUserIDFromName(request.Parent) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid user name: %v", err) } // Verify permission claims := auth.GetUserClaims(ctx) if claims == nil || claims.UserID != userID { currentUser, _ := s.fetchCurrentUser(ctx) if currentUser == nil || currentUser.ID != userID { return nil, status.Errorf(codes.PermissionDenied, "permission denied") } } // Generate PAT tokenID := util.GenUUID() token := auth.GeneratePersonalAccessToken() tokenHash := auth.HashPersonalAccessToken(token) var expiresAt *timestamppb.Timestamp if request.ExpiresInDays > 0 { expiresAt = timestamppb.New(time.Now().AddDate(0, 0, int(request.ExpiresInDays))) } patRecord := &storepb.PersonalAccessTokensUserSetting_PersonalAccessToken{ TokenId: tokenID, TokenHash: tokenHash, Description: request.Description, ExpiresAt: expiresAt, CreatedAt: timestamppb.Now(), } if err := s.Store.AddUserPersonalAccessToken(ctx, userID, patRecord); err != nil { return nil, status.Errorf(codes.Internal, "failed to create access token: %v", err) } return &v1pb.CreatePersonalAccessTokenResponse{ PersonalAccessToken: &v1pb.PersonalAccessToken{ Name: fmt.Sprintf("%s/personalAccessTokens/%s", request.Parent, tokenID), Description: request.Description, ExpiresAt: expiresAt, CreatedAt: patRecord.CreatedAt, }, Token: token, // Only returned on creation }, nil } // DeletePersonalAccessToken revokes a Personal Access Token. // // This endpoint: // 1. Removes the token from the user's access tokens list // 2. Immediately invalidates the token (subsequent API calls with it will fail) // // Use cases: // - User revokes a compromised token // - User removes token for unused app/device // - User cleans up old tokens // // Authentication: Required (session cookie or access token) // Authorization: User can only delete their own tokens. func (s *APIV1Service) DeletePersonalAccessToken(ctx context.Context, request *v1pb.DeletePersonalAccessTokenRequest) (*emptypb.Empty, error) { // Parse name: users/{user_id}/personalAccessTokens/{token_id} parts := strings.Split(request.Name, "/") if len(parts) != 4 || parts[0] != "users" || parts[2] != "personalAccessTokens" { return nil, status.Errorf(codes.InvalidArgument, "invalid personal access token name") } userID, err := util.ConvertStringToInt32(parts[1]) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid user ID: %v", err) } tokenID := parts[3] // Verify permission claims := auth.GetUserClaims(ctx) if claims == nil || claims.UserID != userID { currentUser, _ := s.fetchCurrentUser(ctx) if currentUser == nil || currentUser.ID != userID { return nil, status.Errorf(codes.PermissionDenied, "permission denied") } } if err := s.Store.RemoveUserPersonalAccessToken(ctx, userID, tokenID); err != nil { return nil, status.Errorf(codes.Internal, "failed to delete access token: %v", err) } return &emptypb.Empty{}, nil } func (s *APIV1Service) ListUserWebhooks(ctx context.Context, request *v1pb.ListUserWebhooksRequest) (*v1pb.ListUserWebhooksResponse, error) { userID, err := ExtractUserIDFromName(request.Parent) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid parent: %v", err) } currentUser, err := s.fetchCurrentUser(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get current user: %v", err) } if currentUser == nil { return nil, status.Errorf(codes.Unauthenticated, "user not authenticated") } if currentUser.ID != userID && currentUser.Role != store.RoleHost && currentUser.Role != store.RoleAdmin { return nil, status.Errorf(codes.PermissionDenied, "permission denied") } webhooks, err := s.Store.GetUserWebhooks(ctx, userID) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get user webhooks: %v", err) } userWebhooks := make([]*v1pb.UserWebhook, 0, len(webhooks)) for _, webhook := range webhooks { userWebhooks = append(userWebhooks, convertUserWebhookFromUserSetting(webhook, userID)) } return &v1pb.ListUserWebhooksResponse{ Webhooks: userWebhooks, }, nil } func (s *APIV1Service) CreateUserWebhook(ctx context.Context, request *v1pb.CreateUserWebhookRequest) (*v1pb.UserWebhook, error) { userID, err := ExtractUserIDFromName(request.Parent) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid parent: %v", err) } currentUser, err := s.fetchCurrentUser(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get current user: %v", err) } if currentUser == nil { return nil, status.Errorf(codes.Unauthenticated, "user not authenticated") } if currentUser.ID != userID && currentUser.Role != store.RoleHost && currentUser.Role != store.RoleAdmin { return nil, status.Errorf(codes.PermissionDenied, "permission denied") } if request.Webhook.Url == "" { return nil, status.Errorf(codes.InvalidArgument, "webhook URL is required") } webhookID := generateUserWebhookID() webhook := &storepb.WebhooksUserSetting_Webhook{ Id: webhookID, Title: request.Webhook.DisplayName, Url: strings.TrimSpace(request.Webhook.Url), } err = s.Store.AddUserWebhook(ctx, userID, webhook) if err != nil { return nil, status.Errorf(codes.Internal, "failed to create webhook: %v", err) } return convertUserWebhookFromUserSetting(webhook, userID), nil } func (s *APIV1Service) UpdateUserWebhook(ctx context.Context, request *v1pb.UpdateUserWebhookRequest) (*v1pb.UserWebhook, error) { if request.Webhook == nil { return nil, status.Errorf(codes.InvalidArgument, "webhook is required") } webhookID, userID, err := parseUserWebhookName(request.Webhook.Name) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid webhook name: %v", err) } currentUser, err := s.fetchCurrentUser(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get current user: %v", err) } if currentUser == nil { return nil, status.Errorf(codes.Unauthenticated, "user not authenticated") } if currentUser.ID != userID && currentUser.Role != store.RoleHost && currentUser.Role != store.RoleAdmin { return nil, status.Errorf(codes.PermissionDenied, "permission denied") } // Get existing webhooks webhooks, err := s.Store.GetUserWebhooks(ctx, userID) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get user webhooks: %v", err) } // Find the webhook to update var targetWebhook *storepb.WebhooksUserSetting_Webhook for _, webhook := range webhooks { if webhook.Id == webhookID { targetWebhook = webhook break } } if targetWebhook == nil { return nil, status.Errorf(codes.NotFound, "webhook not found") } // Update the webhook updatedWebhook := &storepb.WebhooksUserSetting_Webhook{ Id: webhookID, Title: targetWebhook.Title, Url: targetWebhook.Url, } if request.UpdateMask != nil { for _, path := range request.UpdateMask.Paths { switch path { case "url": if request.Webhook.Url != "" { updatedWebhook.Url = strings.TrimSpace(request.Webhook.Url) } case "display_name": updatedWebhook.Title = request.Webhook.DisplayName default: // Ignore unsupported fields } } } else { // If no update mask is provided, update all fields if request.Webhook.Url != "" { updatedWebhook.Url = strings.TrimSpace(request.Webhook.Url) } updatedWebhook.Title = request.Webhook.DisplayName } err = s.Store.UpdateUserWebhook(ctx, userID, updatedWebhook) if err != nil { return nil, status.Errorf(codes.Internal, "failed to update webhook: %v", err) } return convertUserWebhookFromUserSetting(updatedWebhook, userID), nil } func (s *APIV1Service) DeleteUserWebhook(ctx context.Context, request *v1pb.DeleteUserWebhookRequest) (*emptypb.Empty, error) { webhookID, userID, err := parseUserWebhookName(request.Name) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid webhook name: %v", err) } currentUser, err := s.fetchCurrentUser(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get current user: %v", err) } if currentUser == nil { return nil, status.Errorf(codes.Unauthenticated, "user not authenticated") } if currentUser.ID != userID && currentUser.Role != store.RoleHost && currentUser.Role != store.RoleAdmin { return nil, status.Errorf(codes.PermissionDenied, "permission denied") } // Get existing webhooks to verify the webhook exists webhooks, err := s.Store.GetUserWebhooks(ctx, userID) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get user webhooks: %v", err) } // Check if webhook exists found := false for _, webhook := range webhooks { if webhook.Id == webhookID { found = true break } } if !found { return nil, status.Errorf(codes.NotFound, "webhook not found") } err = s.Store.RemoveUserWebhook(ctx, userID, webhookID) if err != nil { return nil, status.Errorf(codes.Internal, "failed to delete webhook: %v", err) } return &emptypb.Empty{}, nil } // Helper functions for webhook operations // generateUserWebhookID generates a unique ID for user webhooks. func generateUserWebhookID() string { b := make([]byte, 8) rand.Read(b) return hex.EncodeToString(b) } // parseUserWebhookName parses a webhook name and returns the webhook ID and user ID. // Format: users/{user}/webhooks/{webhook}. func parseUserWebhookName(name string) (string, int32, error) { parts := strings.Split(name, "/") if len(parts) != 4 || parts[0] != "users" || parts[2] != "webhooks" { return "", 0, errors.New("invalid webhook name format") } userID, err := strconv.ParseInt(parts[1], 10, 32) if err != nil { return "", 0, errors.New("invalid user ID in webhook name") } return parts[3], int32(userID), nil } // convertUserWebhookFromUserSetting converts a storepb webhook to a v1pb UserWebhook. func convertUserWebhookFromUserSetting(webhook *storepb.WebhooksUserSetting_Webhook, userID int32) *v1pb.UserWebhook { return &v1pb.UserWebhook{ Name: fmt.Sprintf("users/%d/webhooks/%s", userID, webhook.Id), Url: webhook.Url, DisplayName: webhook.Title, // Note: create_time and update_time are not available in the user setting webhook structure // This is a limitation of storing webhooks in user settings vs the dedicated webhook table } } func convertUserFromStore(user *store.User) *v1pb.User { userpb := &v1pb.User{ Name: fmt.Sprintf("%s%d", UserNamePrefix, user.ID), State: convertStateFromStore(user.RowStatus), CreateTime: timestamppb.New(time.Unix(user.CreatedTs, 0)), UpdateTime: timestamppb.New(time.Unix(user.UpdatedTs, 0)), Role: convertUserRoleFromStore(user.Role), Username: user.Username, Email: user.Email, DisplayName: user.Nickname, AvatarUrl: user.AvatarURL, Description: user.Description, } // Use the avatar URL instead of raw base64 image data to reduce the response size. if user.AvatarURL != "" { // Check if avatar url is base64 format. _, _, err := extractImageInfo(user.AvatarURL) if err == nil { userpb.AvatarUrl = fmt.Sprintf("/file/%s/avatar", userpb.Name) } else { userpb.AvatarUrl = user.AvatarURL } } return userpb } func convertUserRoleFromStore(role store.Role) v1pb.User_Role { switch role { case store.RoleHost: return v1pb.User_HOST case store.RoleAdmin: return v1pb.User_ADMIN case store.RoleUser: return v1pb.User_USER default: return v1pb.User_ROLE_UNSPECIFIED } } func convertUserRoleToStore(role v1pb.User_Role) store.Role { switch role { case v1pb.User_HOST: return store.RoleHost case v1pb.User_ADMIN: return store.RoleAdmin default: return store.RoleUser } } // extractImageInfo extracts image type and base64 data from a data URI. // Data URI format: data:image/png;base64,iVBORw0KGgo... func extractImageInfo(dataURI string) (string, string, error) { dataURIRegex := regexp.MustCompile(`^data:(?P<type>.+);base64,(?P<base64>.+)`) matches := dataURIRegex.FindStringSubmatch(dataURI) if len(matches) != 3 { return "", "", errors.New("invalid data URI format") } imageType := matches[1] base64Data := matches[2] return imageType, base64Data, nil } // Helper functions for user settings // ExtractUserIDAndSettingKeyFromName extracts user ID and setting key from resource name.
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
true
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/router/api/v1/health_service.go
server/router/api/v1/health_service.go
package v1 import ( "context" "google.golang.org/grpc/codes" "google.golang.org/grpc/health/grpc_health_v1" "google.golang.org/grpc/status" ) func (s *APIV1Service) Check(ctx context.Context, _ *grpc_health_v1.HealthCheckRequest) (*grpc_health_v1.HealthCheckResponse, error) { // Check if database is initialized by verifying instance basic setting exists instanceBasicSetting, err := s.Store.GetInstanceBasicSetting(ctx) if err != nil { return nil, status.Errorf(codes.Unavailable, "database not initialized: %v", err) } // Verify schema version is set (empty means database not properly initialized) if instanceBasicSetting.SchemaVersion == "" { return nil, status.Errorf(codes.Unavailable, "schema version not set") } return &grpc_health_v1.HealthCheckResponse{Status: grpc_health_v1.HealthCheckResponse_SERVING}, nil }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/router/api/v1/user_service_stats.go
server/router/api/v1/user_service_stats.go
package v1 import ( "context" "fmt" "time" "github.com/pkg/errors" "google.golang.org/grpc/codes" "google.golang.org/grpc/status" "google.golang.org/protobuf/types/known/timestamppb" v1pb "github.com/usememos/memos/proto/gen/api/v1" "github.com/usememos/memos/store" ) func (s *APIV1Service) ListAllUserStats(ctx context.Context, _ *v1pb.ListAllUserStatsRequest) (*v1pb.ListAllUserStatsResponse, error) { instanceMemoRelatedSetting, err := s.Store.GetInstanceMemoRelatedSetting(ctx) if err != nil { return nil, errors.Wrap(err, "failed to get instance memo related setting") } normalStatus := store.Normal memoFind := &store.FindMemo{ // Exclude comments by default. ExcludeComments: true, ExcludeContent: true, RowStatus: &normalStatus, } currentUser, err := s.fetchCurrentUser(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get user: %v", err) } if currentUser == nil { memoFind.VisibilityList = []store.Visibility{store.Public} } else { if memoFind.CreatorID == nil { filter := fmt.Sprintf(`creator_id == %d || visibility in ["PUBLIC", "PROTECTED"]`, currentUser.ID) memoFind.Filters = append(memoFind.Filters, filter) } else if *memoFind.CreatorID != currentUser.ID { memoFind.VisibilityList = []store.Visibility{store.Public, store.Protected} } } userMemoStatMap := make(map[int32]*v1pb.UserStats) limit := 1000 offset := 0 memoFind.Limit = &limit memoFind.Offset = &offset for { memos, err := s.Store.ListMemos(ctx, memoFind) if err != nil { return nil, status.Errorf(codes.Internal, "failed to list memos: %v", err) } if len(memos) == 0 { break } for _, memo := range memos { // Initialize user stats if not exists if _, exists := userMemoStatMap[memo.CreatorID]; !exists { userMemoStatMap[memo.CreatorID] = &v1pb.UserStats{ Name: fmt.Sprintf("users/%d/stats", memo.CreatorID), TagCount: make(map[string]int32), MemoDisplayTimestamps: []*timestamppb.Timestamp{}, PinnedMemos: []string{}, MemoTypeStats: &v1pb.UserStats_MemoTypeStats{ LinkCount: 0, CodeCount: 0, TodoCount: 0, UndoCount: 0, }, } } stats := userMemoStatMap[memo.CreatorID] // Add display timestamp displayTs := memo.CreatedTs if instanceMemoRelatedSetting.DisplayWithUpdateTime { displayTs = memo.UpdatedTs } stats.MemoDisplayTimestamps = append(stats.MemoDisplayTimestamps, timestamppb.New(time.Unix(displayTs, 0))) // Count memo stats stats.TotalMemoCount++ // Count tags and other properties if memo.Payload != nil { for _, tag := range memo.Payload.Tags { stats.TagCount[tag]++ } if memo.Payload.Property != nil { if memo.Payload.Property.HasLink { stats.MemoTypeStats.LinkCount++ } if memo.Payload.Property.HasCode { stats.MemoTypeStats.CodeCount++ } if memo.Payload.Property.HasTaskList { stats.MemoTypeStats.TodoCount++ } if memo.Payload.Property.HasIncompleteTasks { stats.MemoTypeStats.UndoCount++ } } } // Track pinned memos if memo.Pinned { stats.PinnedMemos = append(stats.PinnedMemos, fmt.Sprintf("users/%d/memos/%d", memo.CreatorID, memo.ID)) } } offset += limit } userMemoStats := []*v1pb.UserStats{} for _, userMemoStat := range userMemoStatMap { userMemoStats = append(userMemoStats, userMemoStat) } response := &v1pb.ListAllUserStatsResponse{ Stats: userMemoStats, } return response, nil } func (s *APIV1Service) GetUserStats(ctx context.Context, request *v1pb.GetUserStatsRequest) (*v1pb.UserStats, error) { userID, err := ExtractUserIDFromName(request.Name) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid user name: %v", err) } currentUser, err := s.fetchCurrentUser(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get user: %v", err) } normalStatus := store.Normal memoFind := &store.FindMemo{ CreatorID: &userID, // Exclude comments by default. ExcludeComments: true, ExcludeContent: true, RowStatus: &normalStatus, } if currentUser == nil { memoFind.VisibilityList = []store.Visibility{store.Public} } else if currentUser.ID != userID { memoFind.VisibilityList = []store.Visibility{store.Public, store.Protected} } instanceMemoRelatedSetting, err := s.Store.GetInstanceMemoRelatedSetting(ctx) if err != nil { return nil, errors.Wrap(err, "failed to get instance memo related setting") } displayTimestamps := []*timestamppb.Timestamp{} tagCount := make(map[string]int32) linkCount := int32(0) codeCount := int32(0) todoCount := int32(0) undoCount := int32(0) pinnedMemos := []string{} totalMemoCount := int32(0) limit := 1000 offset := 0 memoFind.Limit = &limit memoFind.Offset = &offset for { memos, err := s.Store.ListMemos(ctx, memoFind) if err != nil { return nil, status.Errorf(codes.Internal, "failed to list memos: %v", err) } if len(memos) == 0 { break } totalMemoCount += int32(len(memos)) for _, memo := range memos { displayTs := memo.CreatedTs if instanceMemoRelatedSetting.DisplayWithUpdateTime { displayTs = memo.UpdatedTs } displayTimestamps = append(displayTimestamps, timestamppb.New(time.Unix(displayTs, 0))) // Count different memo types based on content. if memo.Payload != nil { for _, tag := range memo.Payload.Tags { tagCount[tag]++ } if memo.Payload.Property != nil { if memo.Payload.Property.HasLink { linkCount++ } if memo.Payload.Property.HasCode { codeCount++ } if memo.Payload.Property.HasTaskList { todoCount++ } if memo.Payload.Property.HasIncompleteTasks { undoCount++ } } } if memo.Pinned { pinnedMemos = append(pinnedMemos, fmt.Sprintf("users/%d/memos/%d", userID, memo.ID)) } } offset += limit } userStats := &v1pb.UserStats{ Name: fmt.Sprintf("users/%d/stats", userID), MemoDisplayTimestamps: displayTimestamps, TagCount: tagCount, PinnedMemos: pinnedMemos, TotalMemoCount: totalMemoCount, MemoTypeStats: &v1pb.UserStats_MemoTypeStats{ LinkCount: linkCount, CodeCount: codeCount, TodoCount: todoCount, UndoCount: undoCount, }, } return userStats, nil }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/router/api/v1/acl_config_test.go
server/router/api/v1/acl_config_test.go
package v1 import ( "testing" "github.com/stretchr/testify/assert" ) // TestPublicMethodsArePublic verifies that methods in PublicMethods are recognized as public. func TestPublicMethodsArePublic(t *testing.T) { publicMethods := []string{ // Auth Service "/memos.api.v1.AuthService/SignIn", "/memos.api.v1.AuthService/RefreshToken", // Instance Service "/memos.api.v1.InstanceService/GetInstanceProfile", "/memos.api.v1.InstanceService/GetInstanceSetting", // User Service "/memos.api.v1.UserService/CreateUser", "/memos.api.v1.UserService/GetUser", "/memos.api.v1.UserService/GetUserAvatar", "/memos.api.v1.UserService/GetUserStats", "/memos.api.v1.UserService/ListAllUserStats", "/memos.api.v1.UserService/SearchUsers", // Identity Provider Service "/memos.api.v1.IdentityProviderService/ListIdentityProviders", // Memo Service "/memos.api.v1.MemoService/GetMemo", "/memos.api.v1.MemoService/ListMemos", } for _, method := range publicMethods { t.Run(method, func(t *testing.T) { assert.True(t, IsPublicMethod(method), "Expected %s to be public", method) }) } } // TestProtectedMethodsRequireAuth verifies that non-public methods are recognized as protected. func TestProtectedMethodsRequireAuth(t *testing.T) { protectedMethods := []string{ // Auth Service - logout and get current user require auth "/memos.api.v1.AuthService/SignOut", "/memos.api.v1.AuthService/GetCurrentUser", // Instance Service - admin operations "/memos.api.v1.InstanceService/UpdateInstanceSetting", // User Service - modification operations "/memos.api.v1.UserService/ListUsers", "/memos.api.v1.UserService/UpdateUser", "/memos.api.v1.UserService/DeleteUser", // Memo Service - write operations "/memos.api.v1.MemoService/CreateMemo", "/memos.api.v1.MemoService/UpdateMemo", "/memos.api.v1.MemoService/DeleteMemo", // Attachment Service - write operations "/memos.api.v1.AttachmentService/CreateAttachment", "/memos.api.v1.AttachmentService/DeleteAttachment", // Shortcut Service "/memos.api.v1.ShortcutService/CreateShortcut", "/memos.api.v1.ShortcutService/ListShortcuts", "/memos.api.v1.ShortcutService/UpdateShortcut", "/memos.api.v1.ShortcutService/DeleteShortcut", // Activity Service "/memos.api.v1.ActivityService/GetActivity", } for _, method := range protectedMethods { t.Run(method, func(t *testing.T) { assert.False(t, IsPublicMethod(method), "Expected %s to require auth", method) }) } } // TestUnknownMethodsRequireAuth verifies that unknown methods default to requiring auth. func TestUnknownMethodsRequireAuth(t *testing.T) { unknownMethods := []string{ "/unknown.Service/Method", "/memos.api.v1.UnknownService/Method", "", "invalid", } for _, method := range unknownMethods { t.Run(method, func(t *testing.T) { assert.False(t, IsPublicMethod(method), "Unknown method %q should require auth", method) }) } }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/router/api/v1/header_carrier.go
server/router/api/v1/header_carrier.go
package v1 import ( "context" "connectrpc.com/connect" "google.golang.org/grpc" "google.golang.org/grpc/metadata" ) // headerCarrierKey is the context key for storing headers to be set in the response. type headerCarrierKey struct{} // HeaderCarrier stores headers that need to be set in the response. // // Problem: The codebase supports two protocols simultaneously: // - Native gRPC: Uses grpc.SetHeader() to set response headers // - Connect-RPC: Uses connect.Response.Header().Set() to set response headers // // Solution: HeaderCarrier provides a protocol-agnostic way to set headers. // - Service methods call SetResponseHeader() regardless of protocol // - For gRPC requests: SetResponseHeader uses grpc.SetHeader directly // - For Connect requests: SetResponseHeader stores headers in HeaderCarrier // - Connect wrappers extract headers from HeaderCarrier and apply to response // // This allows service methods to work with both protocols without knowing which one is being used. type HeaderCarrier struct { headers map[string]string } // newHeaderCarrier creates a new header carrier. func newHeaderCarrier() *HeaderCarrier { return &HeaderCarrier{ headers: make(map[string]string), } } // Set adds a header to the carrier. func (h *HeaderCarrier) Set(key, value string) { h.headers[key] = value } // Get retrieves a header from the carrier. func (h *HeaderCarrier) Get(key string) string { return h.headers[key] } // All returns all headers. func (h *HeaderCarrier) All() map[string]string { return h.headers } // WithHeaderCarrier adds a header carrier to the context. func WithHeaderCarrier(ctx context.Context) context.Context { return context.WithValue(ctx, headerCarrierKey{}, newHeaderCarrier()) } // GetHeaderCarrier retrieves the header carrier from the context. // Returns nil if no carrier is present. func GetHeaderCarrier(ctx context.Context) *HeaderCarrier { if carrier, ok := ctx.Value(headerCarrierKey{}).(*HeaderCarrier); ok { return carrier } return nil } // SetResponseHeader sets a header in the response. // // This function works for both gRPC and Connect protocols: // - For gRPC: Uses grpc.SetHeader to set headers in gRPC metadata // - For Connect: Stores in HeaderCarrier for Connect wrapper to apply later // // The protocol is automatically detected based on whether a HeaderCarrier // exists in the context (injected by Connect wrappers). func SetResponseHeader(ctx context.Context, key, value string) error { // Try Connect first (check if we have a header carrier) if carrier := GetHeaderCarrier(ctx); carrier != nil { carrier.Set(key, value) return nil } // Fall back to gRPC return grpc.SetHeader(ctx, metadata.New(map[string]string{ key: value, })) } // connectWithHeaderCarrier is a helper for Connect service wrappers that need to set response headers. // // It injects a HeaderCarrier into the context, calls the service method, // and applies any headers from the carrier to the Connect response. // // The generic parameter T is the non-pointer protobuf message type (e.g., v1pb.CreateSessionResponse), // while fn returns *T (the pointer type) as is standard for protobuf messages. // // Usage in Connect wrappers: // // func (s *ConnectServiceHandler) CreateSession(ctx context.Context, req *connect.Request[v1pb.CreateSessionRequest]) (*connect.Response[v1pb.CreateSessionResponse], error) { // return connectWithHeaderCarrier(ctx, func(ctx context.Context) (*v1pb.CreateSessionResponse, error) { // return s.APIV1Service.CreateSession(ctx, req.Msg) // }) // } func connectWithHeaderCarrier[T any](ctx context.Context, fn func(context.Context) (*T, error)) (*connect.Response[T], error) { // Inject header carrier for Connect protocol ctx = WithHeaderCarrier(ctx) // Call the service method resp, err := fn(ctx) if err != nil { return nil, convertGRPCError(err) } // Create Connect response connectResp := connect.NewResponse(resp) // Apply any headers set via the header carrier if carrier := GetHeaderCarrier(ctx); carrier != nil { for key, value := range carrier.All() { connectResp.Header().Set(key, value) } } return connectResp, nil }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/router/api/v1/instance_service.go
server/router/api/v1/instance_service.go
package v1 import ( "context" "fmt" "github.com/pkg/errors" "google.golang.org/grpc/codes" "google.golang.org/grpc/status" v1pb "github.com/usememos/memos/proto/gen/api/v1" storepb "github.com/usememos/memos/proto/gen/store" "github.com/usememos/memos/store" ) // GetInstanceProfile returns the instance profile. func (s *APIV1Service) GetInstanceProfile(ctx context.Context, _ *v1pb.GetInstanceProfileRequest) (*v1pb.InstanceProfile, error) { instanceProfile := &v1pb.InstanceProfile{ Version: s.Profile.Version, Mode: s.Profile.Mode, InstanceUrl: s.Profile.InstanceURL, } owner, err := s.GetInstanceOwner(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get instance owner: %v", err) } if owner != nil { instanceProfile.Owner = owner.Name } return instanceProfile, nil } func (s *APIV1Service) GetInstanceSetting(ctx context.Context, request *v1pb.GetInstanceSettingRequest) (*v1pb.InstanceSetting, error) { instanceSettingKeyString, err := ExtractInstanceSettingKeyFromName(request.Name) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid instance setting name: %v", err) } instanceSettingKey := storepb.InstanceSettingKey(storepb.InstanceSettingKey_value[instanceSettingKeyString]) // Get instance setting from store with default value. switch instanceSettingKey { case storepb.InstanceSettingKey_BASIC: _, err = s.Store.GetInstanceBasicSetting(ctx) case storepb.InstanceSettingKey_GENERAL: _, err = s.Store.GetInstanceGeneralSetting(ctx) case storepb.InstanceSettingKey_MEMO_RELATED: _, err = s.Store.GetInstanceMemoRelatedSetting(ctx) case storepb.InstanceSettingKey_STORAGE: _, err = s.Store.GetInstanceStorageSetting(ctx) default: return nil, status.Errorf(codes.InvalidArgument, "unsupported instance setting key: %v", instanceSettingKey) } if err != nil { return nil, status.Errorf(codes.Internal, "failed to get instance setting: %v", err) } instanceSetting, err := s.Store.GetInstanceSetting(ctx, &store.FindInstanceSetting{ Name: instanceSettingKey.String(), }) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get instance setting: %v", err) } if instanceSetting == nil { return nil, status.Errorf(codes.NotFound, "instance setting not found") } // For storage setting, only host can get it. if instanceSetting.Key == storepb.InstanceSettingKey_STORAGE { user, err := s.fetchCurrentUser(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get current user: %v", err) } if user == nil || user.Role != store.RoleHost { return nil, status.Errorf(codes.PermissionDenied, "permission denied") } } return convertInstanceSettingFromStore(instanceSetting), nil } func (s *APIV1Service) UpdateInstanceSetting(ctx context.Context, request *v1pb.UpdateInstanceSettingRequest) (*v1pb.InstanceSetting, error) { user, err := s.fetchCurrentUser(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get current user: %v", err) } if user == nil { return nil, status.Errorf(codes.Unauthenticated, "user not authenticated") } if user.Role != store.RoleHost { return nil, status.Errorf(codes.PermissionDenied, "permission denied") } // TODO: Apply update_mask if specified _ = request.UpdateMask updateSetting := convertInstanceSettingToStore(request.Setting) instanceSetting, err := s.Store.UpsertInstanceSetting(ctx, updateSetting) if err != nil { return nil, status.Errorf(codes.Internal, "failed to upsert instance setting: %v", err) } return convertInstanceSettingFromStore(instanceSetting), nil } func convertInstanceSettingFromStore(setting *storepb.InstanceSetting) *v1pb.InstanceSetting { instanceSetting := &v1pb.InstanceSetting{ Name: fmt.Sprintf("instance/settings/%s", setting.Key.String()), } switch setting.Value.(type) { case *storepb.InstanceSetting_GeneralSetting: instanceSetting.Value = &v1pb.InstanceSetting_GeneralSetting_{ GeneralSetting: convertInstanceGeneralSettingFromStore(setting.GetGeneralSetting()), } case *storepb.InstanceSetting_StorageSetting: instanceSetting.Value = &v1pb.InstanceSetting_StorageSetting_{ StorageSetting: convertInstanceStorageSettingFromStore(setting.GetStorageSetting()), } case *storepb.InstanceSetting_MemoRelatedSetting: instanceSetting.Value = &v1pb.InstanceSetting_MemoRelatedSetting_{ MemoRelatedSetting: convertInstanceMemoRelatedSettingFromStore(setting.GetMemoRelatedSetting()), } } return instanceSetting } func convertInstanceSettingToStore(setting *v1pb.InstanceSetting) *storepb.InstanceSetting { settingKeyString, _ := ExtractInstanceSettingKeyFromName(setting.Name) instanceSetting := &storepb.InstanceSetting{ Key: storepb.InstanceSettingKey(storepb.InstanceSettingKey_value[settingKeyString]), Value: &storepb.InstanceSetting_GeneralSetting{ GeneralSetting: convertInstanceGeneralSettingToStore(setting.GetGeneralSetting()), }, } switch instanceSetting.Key { case storepb.InstanceSettingKey_GENERAL: instanceSetting.Value = &storepb.InstanceSetting_GeneralSetting{ GeneralSetting: convertInstanceGeneralSettingToStore(setting.GetGeneralSetting()), } case storepb.InstanceSettingKey_STORAGE: instanceSetting.Value = &storepb.InstanceSetting_StorageSetting{ StorageSetting: convertInstanceStorageSettingToStore(setting.GetStorageSetting()), } case storepb.InstanceSettingKey_MEMO_RELATED: instanceSetting.Value = &storepb.InstanceSetting_MemoRelatedSetting{ MemoRelatedSetting: convertInstanceMemoRelatedSettingToStore(setting.GetMemoRelatedSetting()), } default: // Keep the default GeneralSetting value } return instanceSetting } func convertInstanceGeneralSettingFromStore(setting *storepb.InstanceGeneralSetting) *v1pb.InstanceSetting_GeneralSetting { if setting == nil { return nil } generalSetting := &v1pb.InstanceSetting_GeneralSetting{ DisallowUserRegistration: setting.DisallowUserRegistration, DisallowPasswordAuth: setting.DisallowPasswordAuth, AdditionalScript: setting.AdditionalScript, AdditionalStyle: setting.AdditionalStyle, WeekStartDayOffset: setting.WeekStartDayOffset, DisallowChangeUsername: setting.DisallowChangeUsername, DisallowChangeNickname: setting.DisallowChangeNickname, } if setting.CustomProfile != nil { generalSetting.CustomProfile = &v1pb.InstanceSetting_GeneralSetting_CustomProfile{ Title: setting.CustomProfile.Title, Description: setting.CustomProfile.Description, LogoUrl: setting.CustomProfile.LogoUrl, } } return generalSetting } func convertInstanceGeneralSettingToStore(setting *v1pb.InstanceSetting_GeneralSetting) *storepb.InstanceGeneralSetting { if setting == nil { return nil } generalSetting := &storepb.InstanceGeneralSetting{ DisallowUserRegistration: setting.DisallowUserRegistration, DisallowPasswordAuth: setting.DisallowPasswordAuth, AdditionalScript: setting.AdditionalScript, AdditionalStyle: setting.AdditionalStyle, WeekStartDayOffset: setting.WeekStartDayOffset, DisallowChangeUsername: setting.DisallowChangeUsername, DisallowChangeNickname: setting.DisallowChangeNickname, } if setting.CustomProfile != nil { generalSetting.CustomProfile = &storepb.InstanceCustomProfile{ Title: setting.CustomProfile.Title, Description: setting.CustomProfile.Description, LogoUrl: setting.CustomProfile.LogoUrl, } } return generalSetting } func convertInstanceStorageSettingFromStore(settingpb *storepb.InstanceStorageSetting) *v1pb.InstanceSetting_StorageSetting { if settingpb == nil { return nil } setting := &v1pb.InstanceSetting_StorageSetting{ StorageType: v1pb.InstanceSetting_StorageSetting_StorageType(settingpb.StorageType), FilepathTemplate: settingpb.FilepathTemplate, UploadSizeLimitMb: settingpb.UploadSizeLimitMb, } if settingpb.S3Config != nil { setting.S3Config = &v1pb.InstanceSetting_StorageSetting_S3Config{ AccessKeyId: settingpb.S3Config.AccessKeyId, AccessKeySecret: settingpb.S3Config.AccessKeySecret, Endpoint: settingpb.S3Config.Endpoint, Region: settingpb.S3Config.Region, Bucket: settingpb.S3Config.Bucket, UsePathStyle: settingpb.S3Config.UsePathStyle, } } return setting } func convertInstanceStorageSettingToStore(setting *v1pb.InstanceSetting_StorageSetting) *storepb.InstanceStorageSetting { if setting == nil { return nil } settingpb := &storepb.InstanceStorageSetting{ StorageType: storepb.InstanceStorageSetting_StorageType(setting.StorageType), FilepathTemplate: setting.FilepathTemplate, UploadSizeLimitMb: setting.UploadSizeLimitMb, } if setting.S3Config != nil { settingpb.S3Config = &storepb.StorageS3Config{ AccessKeyId: setting.S3Config.AccessKeyId, AccessKeySecret: setting.S3Config.AccessKeySecret, Endpoint: setting.S3Config.Endpoint, Region: setting.S3Config.Region, Bucket: setting.S3Config.Bucket, UsePathStyle: setting.S3Config.UsePathStyle, } } return settingpb } func convertInstanceMemoRelatedSettingFromStore(setting *storepb.InstanceMemoRelatedSetting) *v1pb.InstanceSetting_MemoRelatedSetting { if setting == nil { return nil } return &v1pb.InstanceSetting_MemoRelatedSetting{ DisallowPublicVisibility: setting.DisallowPublicVisibility, DisplayWithUpdateTime: setting.DisplayWithUpdateTime, ContentLengthLimit: setting.ContentLengthLimit, EnableDoubleClickEdit: setting.EnableDoubleClickEdit, Reactions: setting.Reactions, } } func convertInstanceMemoRelatedSettingToStore(setting *v1pb.InstanceSetting_MemoRelatedSetting) *storepb.InstanceMemoRelatedSetting { if setting == nil { return nil } return &storepb.InstanceMemoRelatedSetting{ DisallowPublicVisibility: setting.DisallowPublicVisibility, DisplayWithUpdateTime: setting.DisplayWithUpdateTime, ContentLengthLimit: setting.ContentLengthLimit, EnableDoubleClickEdit: setting.EnableDoubleClickEdit, Reactions: setting.Reactions, } } var ownerCache *v1pb.User func (s *APIV1Service) GetInstanceOwner(ctx context.Context) (*v1pb.User, error) { if ownerCache != nil { return ownerCache, nil } hostUserType := store.RoleHost user, err := s.Store.GetUser(ctx, &store.FindUser{ Role: &hostUserType, }) if err != nil { return nil, errors.Wrapf(err, "failed to find owner") } if user == nil { return nil, nil } ownerCache = convertUserFromStore(user) return ownerCache, nil }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/router/api/v1/auth_service_client_info_test.go
server/router/api/v1/auth_service_client_info_test.go
package v1 import ( "context" "testing" "google.golang.org/grpc/metadata" storepb "github.com/usememos/memos/proto/gen/store" ) func TestParseUserAgent(t *testing.T) { service := &APIV1Service{} tests := []struct { name string userAgent string expectedDevice string expectedOS string expectedBrowser string }{ { name: "Chrome on Windows", userAgent: "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36", expectedDevice: "desktop", expectedOS: "Windows 10/11", expectedBrowser: "Chrome 119.0.0.0", }, { name: "Safari on macOS", userAgent: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.0 Safari/605.1.15", expectedDevice: "desktop", expectedOS: "macOS 10.15.7", expectedBrowser: "Safari 17.0", }, { name: "Chrome on Android Mobile", userAgent: "Mozilla/5.0 (Linux; Android 13; SM-G998B) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Mobile Safari/537.36", expectedDevice: "mobile", expectedOS: "Android 13", expectedBrowser: "Chrome 119.0.0.0", }, { name: "Safari on iPhone", userAgent: "Mozilla/5.0 (iPhone; CPU iPhone OS 17_0 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.0 Mobile/15E148 Safari/604.1", expectedDevice: "mobile", expectedOS: "iOS 17.0", expectedBrowser: "Safari 17.0", }, { name: "Firefox on Windows", userAgent: "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/119.0", expectedDevice: "desktop", expectedOS: "Windows 10/11", expectedBrowser: "Firefox 119.0", }, { name: "Edge on Windows", userAgent: "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36 Edg/119.0.0.0", expectedDevice: "desktop", expectedOS: "Windows 10/11", expectedBrowser: "Edge 119.0.0.0", }, { name: "iPad Safari", userAgent: "Mozilla/5.0 (iPad; CPU OS 17_0 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.0 Mobile/15E148 Safari/604.1", expectedDevice: "tablet", expectedOS: "iOS 17.0", expectedBrowser: "Safari 17.0", }, } for _, tt := range tests { t.Run(tt.name, func(t *testing.T) { clientInfo := &storepb.RefreshTokensUserSetting_ClientInfo{} service.parseUserAgent(tt.userAgent, clientInfo) if clientInfo.DeviceType != tt.expectedDevice { t.Errorf("Expected device type %s, got %s", tt.expectedDevice, clientInfo.DeviceType) } if clientInfo.Os != tt.expectedOS { t.Errorf("Expected OS %s, got %s", tt.expectedOS, clientInfo.Os) } if clientInfo.Browser != tt.expectedBrowser { t.Errorf("Expected browser %s, got %s", tt.expectedBrowser, clientInfo.Browser) } }) } } func TestExtractClientInfo(t *testing.T) { service := &APIV1Service{} // Test with metadata containing user agent and IP md := metadata.New(map[string]string{ "user-agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36", "x-forwarded-for": "203.0.113.1, 198.51.100.1", "x-real-ip": "203.0.113.1", }) ctx := metadata.NewIncomingContext(context.Background(), md) clientInfo := service.extractClientInfo(ctx) if clientInfo.UserAgent == "" { t.Error("Expected user agent to be set") } if clientInfo.IpAddress != "203.0.113.1" { t.Errorf("Expected IP address to be 203.0.113.1, got %s", clientInfo.IpAddress) } if clientInfo.DeviceType != "desktop" { t.Errorf("Expected device type to be desktop, got %s", clientInfo.DeviceType) } if clientInfo.Os != "Windows 10/11" { t.Errorf("Expected OS to be Windows 10/11, got %s", clientInfo.Os) } if clientInfo.Browser != "Chrome 119.0.0.0" { t.Errorf("Expected browser to be Chrome 119.0.0.0, got %s", clientInfo.Browser) } } // TestClientInfoExamples demonstrates the enhanced client info extraction with various user agents. func TestClientInfoExamples(t *testing.T) { service := &APIV1Service{} examples := []struct { description string userAgent string }{ { description: "Modern Chrome on Windows 11", userAgent: "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36", }, { description: "Safari on iPhone 15 Pro", userAgent: "Mozilla/5.0 (iPhone; CPU iPhone OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1", }, { description: "Chrome on Samsung Galaxy", userAgent: "Mozilla/5.0 (Linux; Android 14; SM-S918B) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Mobile Safari/537.36", }, { description: "Firefox on Ubuntu", userAgent: "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/120.0", }, { description: "Edge on Windows 10", userAgent: "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Edg/120.0.0.0", }, { description: "Safari on iPad Air", userAgent: "Mozilla/5.0 (iPad; CPU OS 17_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.1 Mobile/15E148 Safari/604.1", }, } for _, example := range examples { t.Run(example.description, func(t *testing.T) { clientInfo := &storepb.RefreshTokensUserSetting_ClientInfo{} service.parseUserAgent(example.userAgent, clientInfo) t.Logf("User Agent: %s", example.userAgent) t.Logf("Device Type: %s", clientInfo.DeviceType) t.Logf("Operating System: %s", clientInfo.Os) t.Logf("Browser: %s", clientInfo.Browser) t.Log("---") // Ensure all fields are populated if clientInfo.DeviceType == "" { t.Error("Device type should not be empty") } if clientInfo.Os == "" { t.Error("OS should not be empty") } if clientInfo.Browser == "" { t.Error("Browser should not be empty") } }) } }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/router/api/v1/activity_service.go
server/router/api/v1/activity_service.go
package v1 import ( "context" "fmt" "time" "google.golang.org/grpc/codes" "google.golang.org/grpc/status" "google.golang.org/protobuf/types/known/timestamppb" v1pb "github.com/usememos/memos/proto/gen/api/v1" storepb "github.com/usememos/memos/proto/gen/store" "github.com/usememos/memos/store" ) func (s *APIV1Service) ListActivities(ctx context.Context, request *v1pb.ListActivitiesRequest) (*v1pb.ListActivitiesResponse, error) { // Set default page size if not specified pageSize := request.PageSize if pageSize <= 0 || pageSize > 1000 { pageSize = 100 } // TODO: Implement pagination with page_token and use pageSize for limiting // For now, we'll fetch all activities and the pageSize will be used in future pagination implementation _ = pageSize // Acknowledge pageSize variable to avoid linter warning activities, err := s.Store.ListActivities(ctx, &store.FindActivity{}) if err != nil { return nil, status.Errorf(codes.Internal, "failed to list activities: %v", err) } var activityMessages []*v1pb.Activity for _, activity := range activities { activityMessage, err := s.convertActivityFromStore(ctx, activity) if err != nil { return nil, status.Errorf(codes.Internal, "failed to convert activity from store: %v", err) } activityMessages = append(activityMessages, activityMessage) } return &v1pb.ListActivitiesResponse{ Activities: activityMessages, // TODO: Implement next_page_token for pagination }, nil } func (s *APIV1Service) GetActivity(ctx context.Context, request *v1pb.GetActivityRequest) (*v1pb.Activity, error) { activityID, err := ExtractActivityIDFromName(request.Name) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid activity name: %v", err) } activity, err := s.Store.GetActivity(ctx, &store.FindActivity{ ID: &activityID, }) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get activity: %v", err) } activityMessage, err := s.convertActivityFromStore(ctx, activity) if err != nil { return nil, status.Errorf(codes.Internal, "failed to convert activity from store: %v", err) } return activityMessage, nil } // convertActivityFromStore converts a storage-layer activity to an API activity. // This handles the mapping between internal activity representation and the public API, // including proper type and level conversions. func (s *APIV1Service) convertActivityFromStore(ctx context.Context, activity *store.Activity) (*v1pb.Activity, error) { payload, err := s.convertActivityPayloadFromStore(ctx, activity.Payload) if err != nil { return nil, status.Errorf(codes.Internal, "failed to convert activity payload from store: %v", err) } // Convert store activity type to proto enum var activityType v1pb.Activity_Type switch activity.Type { case store.ActivityTypeMemoComment: activityType = v1pb.Activity_MEMO_COMMENT default: activityType = v1pb.Activity_TYPE_UNSPECIFIED } // Convert store activity level to proto enum var activityLevel v1pb.Activity_Level switch activity.Level { case store.ActivityLevelInfo: activityLevel = v1pb.Activity_INFO default: activityLevel = v1pb.Activity_LEVEL_UNSPECIFIED } return &v1pb.Activity{ Name: fmt.Sprintf("%s%d", ActivityNamePrefix, activity.ID), Creator: fmt.Sprintf("%s%d", UserNamePrefix, activity.CreatorID), Type: activityType, Level: activityLevel, CreateTime: timestamppb.New(time.Unix(activity.CreatedTs, 0)), Payload: payload, }, nil } // convertActivityPayloadFromStore converts a storage-layer activity payload to an API payload. // This resolves references (e.g., memo IDs) to resource names for the API. func (s *APIV1Service) convertActivityPayloadFromStore(ctx context.Context, payload *storepb.ActivityPayload) (*v1pb.ActivityPayload, error) { v2Payload := &v1pb.ActivityPayload{} if payload.MemoComment != nil { // Fetch the comment memo memo, err := s.Store.GetMemo(ctx, &store.FindMemo{ ID: &payload.MemoComment.MemoId, ExcludeContent: true, }) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get memo: %v", err) } if memo == nil { return nil, status.Errorf(codes.NotFound, "memo does not exist") } // Fetch the related memo (the one being commented on) relatedMemo, err := s.Store.GetMemo(ctx, &store.FindMemo{ ID: &payload.MemoComment.RelatedMemoId, ExcludeContent: true, }) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get related memo: %v", err) } v2Payload.Payload = &v1pb.ActivityPayload_MemoComment{ MemoComment: &v1pb.ActivityMemoCommentPayload{ Memo: fmt.Sprintf("%s%s", MemoNamePrefix, memo.UID), RelatedMemo: fmt.Sprintf("%s%s", MemoNamePrefix, relatedMemo.UID), }, } } return v2Payload, nil }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/router/api/v1/connect_handler.go
server/router/api/v1/connect_handler.go
package v1 import ( "net/http" "connectrpc.com/connect" "google.golang.org/grpc/codes" "google.golang.org/grpc/status" "github.com/usememos/memos/proto/gen/api/v1/apiv1connect" ) // ConnectServiceHandler wraps APIV1Service to implement Connect handler interfaces. // It adapts the existing gRPC service implementations to work with Connect's // request/response wrapper types. // // This wrapper pattern allows us to: // - Reuse existing gRPC service implementations // - Support both native gRPC and Connect protocols // - Maintain a single source of truth for business logic. type ConnectServiceHandler struct { *APIV1Service } // NewConnectServiceHandler creates a new Connect service handler. func NewConnectServiceHandler(svc *APIV1Service) *ConnectServiceHandler { return &ConnectServiceHandler{APIV1Service: svc} } // RegisterConnectHandlers registers all Connect service handlers on the given mux. func (s *ConnectServiceHandler) RegisterConnectHandlers(mux *http.ServeMux, opts ...connect.HandlerOption) { // Register all service handlers handlers := []struct { path string handler http.Handler }{ wrap(apiv1connect.NewInstanceServiceHandler(s, opts...)), wrap(apiv1connect.NewAuthServiceHandler(s, opts...)), wrap(apiv1connect.NewUserServiceHandler(s, opts...)), wrap(apiv1connect.NewMemoServiceHandler(s, opts...)), wrap(apiv1connect.NewAttachmentServiceHandler(s, opts...)), wrap(apiv1connect.NewShortcutServiceHandler(s, opts...)), wrap(apiv1connect.NewActivityServiceHandler(s, opts...)), wrap(apiv1connect.NewIdentityProviderServiceHandler(s, opts...)), } for _, h := range handlers { mux.Handle(h.path, h.handler) } } // wrap converts (path, handler) return value to a struct for cleaner iteration. func wrap(path string, handler http.Handler) struct { path string handler http.Handler } { return struct { path string handler http.Handler }{path, handler} } // convertGRPCError converts gRPC status errors to Connect errors. // This preserves the error code semantics between the two protocols. func convertGRPCError(err error) error { if err == nil { return nil } if st, ok := status.FromError(err); ok { return connect.NewError(grpcCodeToConnectCode(st.Code()), err) } return connect.NewError(connect.CodeInternal, err) } // grpcCodeToConnectCode converts gRPC status codes to Connect error codes. // gRPC and Connect use the same error code semantics, so this is a direct cast. // See: https://connectrpc.com/docs/protocol/#error-codes func grpcCodeToConnectCode(code codes.Code) connect.Code { return connect.Code(code) }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/router/api/v1/memo_relation_service.go
server/router/api/v1/memo_relation_service.go
package v1 import ( "context" "fmt" "github.com/pkg/errors" "google.golang.org/grpc/codes" "google.golang.org/grpc/status" "google.golang.org/protobuf/types/known/emptypb" v1pb "github.com/usememos/memos/proto/gen/api/v1" "github.com/usememos/memos/store" ) func (s *APIV1Service) SetMemoRelations(ctx context.Context, request *v1pb.SetMemoRelationsRequest) (*emptypb.Empty, error) { user, err := s.fetchCurrentUser(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get current user: %v", err) } if user == nil { return nil, status.Errorf(codes.Unauthenticated, "user not authenticated") } memoUID, err := ExtractMemoUIDFromName(request.Name) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid memo name: %v", err) } memo, err := s.Store.GetMemo(ctx, &store.FindMemo{UID: &memoUID}) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get memo") } if memo == nil { return nil, status.Errorf(codes.NotFound, "memo not found") } if memo.CreatorID != user.ID && !isSuperUser(user) { return nil, status.Errorf(codes.PermissionDenied, "permission denied") } referenceType := store.MemoRelationReference // Delete all reference relations first. if err := s.Store.DeleteMemoRelation(ctx, &store.DeleteMemoRelation{ MemoID: &memo.ID, Type: &referenceType, }); err != nil { return nil, status.Errorf(codes.Internal, "failed to delete memo relation") } for _, relation := range request.Relations { // Ignore reflexive relations. if request.Name == relation.RelatedMemo.Name { continue } // Ignore comment relations as there's no need to update a comment's relation. // Inserting/Deleting a comment is handled elsewhere. if relation.Type == v1pb.MemoRelation_COMMENT { continue } relatedMemoUID, err := ExtractMemoUIDFromName(relation.RelatedMemo.Name) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid related memo name: %v", err) } relatedMemo, err := s.Store.GetMemo(ctx, &store.FindMemo{UID: &relatedMemoUID}) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get related memo") } if _, err := s.Store.UpsertMemoRelation(ctx, &store.MemoRelation{ MemoID: memo.ID, RelatedMemoID: relatedMemo.ID, Type: convertMemoRelationTypeToStore(relation.Type), }); err != nil { return nil, status.Errorf(codes.Internal, "failed to upsert memo relation") } } return &emptypb.Empty{}, nil } func (s *APIV1Service) ListMemoRelations(ctx context.Context, request *v1pb.ListMemoRelationsRequest) (*v1pb.ListMemoRelationsResponse, error) { memoUID, err := ExtractMemoUIDFromName(request.Name) if err != nil { return nil, status.Errorf(codes.InvalidArgument, "invalid memo name: %v", err) } memo, err := s.Store.GetMemo(ctx, &store.FindMemo{UID: &memoUID}) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get memo") } currentUser, err := s.fetchCurrentUser(ctx) if err != nil { return nil, status.Errorf(codes.Internal, "failed to get user") } var memoFilter string if currentUser == nil { memoFilter = `visibility == "PUBLIC"` } else { memoFilter = fmt.Sprintf(`creator_id == %d || visibility in ["PUBLIC", "PROTECTED"]`, currentUser.ID) } relationList := []*v1pb.MemoRelation{} tempList, err := s.Store.ListMemoRelations(ctx, &store.FindMemoRelation{ MemoID: &memo.ID, MemoFilter: &memoFilter, }) if err != nil { return nil, err } for _, raw := range tempList { relation, err := s.convertMemoRelationFromStore(ctx, raw) if err != nil { return nil, status.Errorf(codes.Internal, "failed to convert memo relation") } relationList = append(relationList, relation) } tempList, err = s.Store.ListMemoRelations(ctx, &store.FindMemoRelation{ RelatedMemoID: &memo.ID, MemoFilter: &memoFilter, }) if err != nil { return nil, err } for _, raw := range tempList { relation, err := s.convertMemoRelationFromStore(ctx, raw) if err != nil { return nil, status.Errorf(codes.Internal, "failed to convert memo relation") } relationList = append(relationList, relation) } response := &v1pb.ListMemoRelationsResponse{ Relations: relationList, } return response, nil } func (s *APIV1Service) convertMemoRelationFromStore(ctx context.Context, memoRelation *store.MemoRelation) (*v1pb.MemoRelation, error) { memo, err := s.Store.GetMemo(ctx, &store.FindMemo{ID: &memoRelation.MemoID}) if err != nil { return nil, err } memoSnippet, err := s.getMemoContentSnippet(memo.Content) if err != nil { return nil, errors.Wrap(err, "failed to get memo content snippet") } relatedMemo, err := s.Store.GetMemo(ctx, &store.FindMemo{ID: &memoRelation.RelatedMemoID}) if err != nil { return nil, err } relatedMemoSnippet, err := s.getMemoContentSnippet(relatedMemo.Content) if err != nil { return nil, errors.Wrap(err, "failed to get related memo content snippet") } return &v1pb.MemoRelation{ Memo: &v1pb.MemoRelation_Memo{ Name: fmt.Sprintf("%s%s", MemoNamePrefix, memo.UID), Snippet: memoSnippet, }, RelatedMemo: &v1pb.MemoRelation_Memo{ Name: fmt.Sprintf("%s%s", MemoNamePrefix, relatedMemo.UID), Snippet: relatedMemoSnippet, }, Type: convertMemoRelationTypeFromStore(memoRelation.Type), }, nil } func convertMemoRelationTypeFromStore(relationType store.MemoRelationType) v1pb.MemoRelation_Type { switch relationType { case store.MemoRelationReference: return v1pb.MemoRelation_REFERENCE case store.MemoRelationComment: return v1pb.MemoRelation_COMMENT default: return v1pb.MemoRelation_TYPE_UNSPECIFIED } } func convertMemoRelationTypeToStore(relationType v1pb.MemoRelation_Type) store.MemoRelationType { switch relationType { case v1pb.MemoRelation_COMMENT: return store.MemoRelationComment default: return store.MemoRelationReference } }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/router/api/v1/v1.go
server/router/api/v1/v1.go
package v1 import ( "context" "net/http" "connectrpc.com/connect" "github.com/grpc-ecosystem/grpc-gateway/v2/runtime" "github.com/labstack/echo/v4" "github.com/labstack/echo/v4/middleware" "golang.org/x/sync/semaphore" "github.com/usememos/memos/internal/profile" "github.com/usememos/memos/plugin/markdown" v1pb "github.com/usememos/memos/proto/gen/api/v1" "github.com/usememos/memos/server/auth" "github.com/usememos/memos/store" ) type APIV1Service struct { v1pb.UnimplementedInstanceServiceServer v1pb.UnimplementedAuthServiceServer v1pb.UnimplementedUserServiceServer v1pb.UnimplementedMemoServiceServer v1pb.UnimplementedAttachmentServiceServer v1pb.UnimplementedShortcutServiceServer v1pb.UnimplementedActivityServiceServer v1pb.UnimplementedIdentityProviderServiceServer Secret string Profile *profile.Profile Store *store.Store MarkdownService markdown.Service // thumbnailSemaphore limits concurrent thumbnail generation to prevent memory exhaustion thumbnailSemaphore *semaphore.Weighted } func NewAPIV1Service(secret string, profile *profile.Profile, store *store.Store) *APIV1Service { markdownService := markdown.NewService( markdown.WithTagExtension(), ) return &APIV1Service{ Secret: secret, Profile: profile, Store: store, MarkdownService: markdownService, thumbnailSemaphore: semaphore.NewWeighted(3), // Limit to 3 concurrent thumbnail generations } } // RegisterGateway registers the gRPC-Gateway and Connect handlers with the given Echo instance. func (s *APIV1Service) RegisterGateway(ctx context.Context, echoServer *echo.Echo) error { // Auth middleware for gRPC-Gateway - runs after routing, has access to method name. // Uses the same PublicMethods config as the Connect AuthInterceptor. authenticator := auth.NewAuthenticator(s.Store, s.Secret) gatewayAuthMiddleware := func(next runtime.HandlerFunc) runtime.HandlerFunc { return func(w http.ResponseWriter, r *http.Request, pathParams map[string]string) { ctx := r.Context() // Get the RPC method name from context (set by grpc-gateway after routing) rpcMethod, _ := runtime.RPCMethod(ctx) // Extract credentials from HTTP headers authHeader := r.Header.Get("Authorization") result := authenticator.Authenticate(ctx, authHeader) // Enforce authentication for non-public methods if result == nil && !IsPublicMethod(rpcMethod) { http.Error(w, `{"code": 16, "message": "authentication required"}`, http.StatusUnauthorized) return } // Set context based on auth result (may be nil for public endpoints) if result != nil { if result.Claims != nil { // Access Token V2 - stateless, use claims ctx = auth.SetUserClaimsInContext(ctx, result.Claims) ctx = context.WithValue(ctx, auth.UserIDContextKey, result.Claims.UserID) } else if result.User != nil { // PAT - have full user ctx = auth.SetUserInContext(ctx, result.User, result.AccessToken) } r = r.WithContext(ctx) } next(w, r, pathParams) } } // Create gRPC-Gateway mux with auth middleware. gwMux := runtime.NewServeMux( runtime.WithMiddlewares(gatewayAuthMiddleware), ) if err := v1pb.RegisterInstanceServiceHandlerServer(ctx, gwMux, s); err != nil { return err } if err := v1pb.RegisterAuthServiceHandlerServer(ctx, gwMux, s); err != nil { return err } if err := v1pb.RegisterUserServiceHandlerServer(ctx, gwMux, s); err != nil { return err } if err := v1pb.RegisterMemoServiceHandlerServer(ctx, gwMux, s); err != nil { return err } if err := v1pb.RegisterAttachmentServiceHandlerServer(ctx, gwMux, s); err != nil { return err } if err := v1pb.RegisterShortcutServiceHandlerServer(ctx, gwMux, s); err != nil { return err } if err := v1pb.RegisterActivityServiceHandlerServer(ctx, gwMux, s); err != nil { return err } if err := v1pb.RegisterIdentityProviderServiceHandlerServer(ctx, gwMux, s); err != nil { return err } gwGroup := echoServer.Group("") gwGroup.Use(middleware.CORS()) handler := echo.WrapHandler(gwMux) gwGroup.Any("/api/v1/*", handler) gwGroup.Any("/file/*", handler) // Connect handlers for browser clients (replaces grpc-web). logStacktraces := s.Profile.IsDev() connectInterceptors := connect.WithInterceptors( NewMetadataInterceptor(), // Convert HTTP headers to gRPC metadata first NewLoggingInterceptor(logStacktraces), NewRecoveryInterceptor(logStacktraces), NewAuthInterceptor(s.Store, s.Secret), ) connectMux := http.NewServeMux() connectHandler := NewConnectServiceHandler(s) connectHandler.RegisterConnectHandlers(connectMux, connectInterceptors) // Wrap with CORS for browser access corsHandler := middleware.CORSWithConfig(middleware.CORSConfig{ AllowOriginFunc: func(_ string) (bool, error) { return true, nil }, AllowMethods: []string{http.MethodGet, http.MethodPost, http.MethodOptions}, AllowHeaders: []string{"*"}, AllowCredentials: true, }) connectGroup := echoServer.Group("", corsHandler) connectGroup.Any("/memos.api.v1.*", echo.WrapHandler(connectMux)) return nil }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/router/api/v1/common.go
server/router/api/v1/common.go
package v1 import ( "encoding/base64" "github.com/pkg/errors" "google.golang.org/protobuf/proto" v1pb "github.com/usememos/memos/proto/gen/api/v1" "github.com/usememos/memos/store" ) const ( // DefaultPageSize is the default page size for requests. DefaultPageSize = 10 // MaxPageSize is the maximum page size for requests. MaxPageSize = 1000 ) func convertStateFromStore(rowStatus store.RowStatus) v1pb.State { switch rowStatus { case store.Normal: return v1pb.State_NORMAL case store.Archived: return v1pb.State_ARCHIVED default: return v1pb.State_STATE_UNSPECIFIED } } func convertStateToStore(state v1pb.State) store.RowStatus { switch state { case v1pb.State_ARCHIVED: return store.Archived default: return store.Normal } } func getPageToken(limit int, offset int) (string, error) { return marshalPageToken(&v1pb.PageToken{ Limit: int32(limit), Offset: int32(offset), }) } func marshalPageToken(pageToken *v1pb.PageToken) (string, error) { b, err := proto.Marshal(pageToken) if err != nil { return "", errors.Wrapf(err, "failed to marshal page token") } return base64.StdEncoding.EncodeToString(b), nil } func unmarshalPageToken(s string, pageToken *v1pb.PageToken) error { b, err := base64.StdEncoding.DecodeString(s) if err != nil { return errors.Wrapf(err, "failed to decode page token") } if err := proto.Unmarshal(b, pageToken); err != nil { return errors.Wrapf(err, "failed to unmarshal page token") } return nil } func isSuperUser(user *store.User) bool { return user.Role == store.RoleAdmin || user.Role == store.RoleHost }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/router/api/v1/test/idp_service_test.go
server/router/api/v1/test/idp_service_test.go
package test import ( "context" "testing" "github.com/stretchr/testify/require" "google.golang.org/protobuf/types/known/fieldmaskpb" v1pb "github.com/usememos/memos/proto/gen/api/v1" ) func TestCreateIdentityProvider(t *testing.T) { ctx := context.Background() t.Run("CreateIdentityProvider success", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create host user hostUser, err := ts.CreateHostUser(ctx, "admin") require.NoError(t, err) // Set user context ctx := ts.CreateUserContext(ctx, hostUser.ID) // Create OAuth2 identity provider req := &v1pb.CreateIdentityProviderRequest{ IdentityProvider: &v1pb.IdentityProvider{ Title: "Test OAuth2 Provider", IdentifierFilter: "", Type: v1pb.IdentityProvider_OAUTH2, Config: &v1pb.IdentityProviderConfig{ Config: &v1pb.IdentityProviderConfig_Oauth2Config{ Oauth2Config: &v1pb.OAuth2Config{ ClientId: "test-client-id", ClientSecret: "test-client-secret", AuthUrl: "https://example.com/oauth/authorize", TokenUrl: "https://example.com/oauth/token", UserInfoUrl: "https://example.com/oauth/userinfo", Scopes: []string{"openid", "profile", "email"}, FieldMapping: &v1pb.FieldMapping{ Identifier: "id", DisplayName: "name", Email: "email", AvatarUrl: "avatar_url", }, }, }, }, }, } resp, err := ts.Service.CreateIdentityProvider(ctx, req) require.NoError(t, err) require.NotNil(t, resp) require.Equal(t, "Test OAuth2 Provider", resp.Title) require.Equal(t, v1pb.IdentityProvider_OAUTH2, resp.Type) require.Contains(t, resp.Name, "identity-providers/") require.NotNil(t, resp.Config.GetOauth2Config()) require.Equal(t, "test-client-id", resp.Config.GetOauth2Config().ClientId) }) t.Run("CreateIdentityProvider permission denied for non-host user", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create regular user regularUser, err := ts.CreateRegularUser(ctx, "user") require.NoError(t, err) // Set user context ctx := ts.CreateUserContext(ctx, regularUser.ID) req := &v1pb.CreateIdentityProviderRequest{ IdentityProvider: &v1pb.IdentityProvider{ Title: "Test Provider", Type: v1pb.IdentityProvider_OAUTH2, }, } _, err = ts.Service.CreateIdentityProvider(ctx, req) require.Error(t, err) require.Contains(t, err.Error(), "permission denied") }) t.Run("CreateIdentityProvider unauthenticated", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() req := &v1pb.CreateIdentityProviderRequest{ IdentityProvider: &v1pb.IdentityProvider{ Title: "Test Provider", Type: v1pb.IdentityProvider_OAUTH2, }, } _, err := ts.Service.CreateIdentityProvider(ctx, req) require.Error(t, err) require.Contains(t, err.Error(), "permission denied") }) } func TestListIdentityProviders(t *testing.T) { ctx := context.Background() t.Run("ListIdentityProviders empty", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() req := &v1pb.ListIdentityProvidersRequest{} resp, err := ts.Service.ListIdentityProviders(ctx, req) require.NoError(t, err) require.NotNil(t, resp) require.Empty(t, resp.IdentityProviders) }) t.Run("ListIdentityProviders with providers", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create host user hostUser, err := ts.CreateHostUser(ctx, "admin") require.NoError(t, err) // Set user context userCtx := ts.CreateUserContext(ctx, hostUser.ID) // Create a couple of identity providers createReq1 := &v1pb.CreateIdentityProviderRequest{ IdentityProvider: &v1pb.IdentityProvider{ Title: "Provider 1", Type: v1pb.IdentityProvider_OAUTH2, Config: &v1pb.IdentityProviderConfig{ Config: &v1pb.IdentityProviderConfig_Oauth2Config{ Oauth2Config: &v1pb.OAuth2Config{ ClientId: "client1", AuthUrl: "https://example1.com/auth", TokenUrl: "https://example1.com/token", UserInfoUrl: "https://example1.com/user", FieldMapping: &v1pb.FieldMapping{ Identifier: "id", }, }, }, }, }, } createReq2 := &v1pb.CreateIdentityProviderRequest{ IdentityProvider: &v1pb.IdentityProvider{ Title: "Provider 2", Type: v1pb.IdentityProvider_OAUTH2, Config: &v1pb.IdentityProviderConfig{ Config: &v1pb.IdentityProviderConfig_Oauth2Config{ Oauth2Config: &v1pb.OAuth2Config{ ClientId: "client2", AuthUrl: "https://example2.com/auth", TokenUrl: "https://example2.com/token", UserInfoUrl: "https://example2.com/user", FieldMapping: &v1pb.FieldMapping{ Identifier: "id", }, }, }, }, }, } _, err = ts.Service.CreateIdentityProvider(userCtx, createReq1) require.NoError(t, err) _, err = ts.Service.CreateIdentityProvider(userCtx, createReq2) require.NoError(t, err) // List providers listReq := &v1pb.ListIdentityProvidersRequest{} resp, err := ts.Service.ListIdentityProviders(ctx, listReq) require.NoError(t, err) require.NotNil(t, resp) require.Len(t, resp.IdentityProviders, 2) // Verify response contains expected providers titles := []string{resp.IdentityProviders[0].Title, resp.IdentityProviders[1].Title} require.Contains(t, titles, "Provider 1") require.Contains(t, titles, "Provider 2") }) } func TestGetIdentityProvider(t *testing.T) { ctx := context.Background() t.Run("GetIdentityProvider success", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create host user hostUser, err := ts.CreateHostUser(ctx, "admin") require.NoError(t, err) // Set user context userCtx := ts.CreateUserContext(ctx, hostUser.ID) // Create identity provider createReq := &v1pb.CreateIdentityProviderRequest{ IdentityProvider: &v1pb.IdentityProvider{ Title: "Test Provider", Type: v1pb.IdentityProvider_OAUTH2, Config: &v1pb.IdentityProviderConfig{ Config: &v1pb.IdentityProviderConfig_Oauth2Config{ Oauth2Config: &v1pb.OAuth2Config{ ClientId: "test-client", ClientSecret: "test-secret", AuthUrl: "https://example.com/auth", TokenUrl: "https://example.com/token", UserInfoUrl: "https://example.com/user", Scopes: []string{"openid", "profile"}, FieldMapping: &v1pb.FieldMapping{ Identifier: "id", DisplayName: "name", Email: "email", }, }, }, }, }, } created, err := ts.Service.CreateIdentityProvider(userCtx, createReq) require.NoError(t, err) // Get identity provider getReq := &v1pb.GetIdentityProviderRequest{ Name: created.Name, } // Test unauthenticated, should not contain client secret resp, err := ts.Service.GetIdentityProvider(ctx, getReq) require.NoError(t, err) require.NotNil(t, resp) require.Equal(t, created.Name, resp.Name) require.Equal(t, "Test Provider", resp.Title) require.Equal(t, v1pb.IdentityProvider_OAUTH2, resp.Type) require.NotNil(t, resp.Config.GetOauth2Config()) require.Equal(t, "test-client", resp.Config.GetOauth2Config().ClientId) require.Equal(t, "", resp.Config.GetOauth2Config().ClientSecret) // Test as host user, should contain client secret respHostUser, err := ts.Service.GetIdentityProvider(userCtx, getReq) require.NoError(t, err) require.NotNil(t, respHostUser) require.Equal(t, created.Name, respHostUser.Name) require.Equal(t, "Test Provider", respHostUser.Title) require.Equal(t, v1pb.IdentityProvider_OAUTH2, respHostUser.Type) require.NotNil(t, respHostUser.Config.GetOauth2Config()) require.Equal(t, "test-client", respHostUser.Config.GetOauth2Config().ClientId) require.Equal(t, "test-secret", respHostUser.Config.GetOauth2Config().ClientSecret) }) t.Run("GetIdentityProvider not found", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() req := &v1pb.GetIdentityProviderRequest{ Name: "identity-providers/999", } _, err := ts.Service.GetIdentityProvider(ctx, req) require.Error(t, err) require.Contains(t, err.Error(), "not found") }) t.Run("GetIdentityProvider invalid name", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() req := &v1pb.GetIdentityProviderRequest{ Name: "invalid-name", } _, err := ts.Service.GetIdentityProvider(ctx, req) require.Error(t, err) require.Contains(t, err.Error(), "invalid identity provider name") }) } func TestUpdateIdentityProvider(t *testing.T) { ctx := context.Background() t.Run("UpdateIdentityProvider success", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create host user hostUser, err := ts.CreateHostUser(ctx, "admin") require.NoError(t, err) // Set user context userCtx := ts.CreateUserContext(ctx, hostUser.ID) // Create identity provider createReq := &v1pb.CreateIdentityProviderRequest{ IdentityProvider: &v1pb.IdentityProvider{ Title: "Original Provider", IdentifierFilter: "", Type: v1pb.IdentityProvider_OAUTH2, Config: &v1pb.IdentityProviderConfig{ Config: &v1pb.IdentityProviderConfig_Oauth2Config{ Oauth2Config: &v1pb.OAuth2Config{ ClientId: "original-client", AuthUrl: "https://original.com/auth", TokenUrl: "https://original.com/token", UserInfoUrl: "https://original.com/user", FieldMapping: &v1pb.FieldMapping{ Identifier: "id", }, }, }, }, }, } created, err := ts.Service.CreateIdentityProvider(userCtx, createReq) require.NoError(t, err) // Update identity provider updateReq := &v1pb.UpdateIdentityProviderRequest{ IdentityProvider: &v1pb.IdentityProvider{ Name: created.Name, Title: "Updated Provider", IdentifierFilter: "test@example.com", Type: v1pb.IdentityProvider_OAUTH2, Config: &v1pb.IdentityProviderConfig{ Config: &v1pb.IdentityProviderConfig_Oauth2Config{ Oauth2Config: &v1pb.OAuth2Config{ ClientId: "updated-client", ClientSecret: "updated-secret", AuthUrl: "https://updated.com/auth", TokenUrl: "https://updated.com/token", UserInfoUrl: "https://updated.com/user", Scopes: []string{"openid", "profile", "email"}, FieldMapping: &v1pb.FieldMapping{ Identifier: "sub", DisplayName: "given_name", Email: "email", AvatarUrl: "picture", }, }, }, }, }, UpdateMask: &fieldmaskpb.FieldMask{ Paths: []string{"title", "identifier_filter", "config"}, }, } updated, err := ts.Service.UpdateIdentityProvider(userCtx, updateReq) require.NoError(t, err) require.NotNil(t, updated) require.Equal(t, "Updated Provider", updated.Title) require.Equal(t, "test@example.com", updated.IdentifierFilter) require.Equal(t, "updated-client", updated.Config.GetOauth2Config().ClientId) }) t.Run("UpdateIdentityProvider missing update mask", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create host user hostUser, err := ts.CreateHostUser(ctx, "admin") require.NoError(t, err) // Set user context userCtx := ts.CreateUserContext(ctx, hostUser.ID) req := &v1pb.UpdateIdentityProviderRequest{ IdentityProvider: &v1pb.IdentityProvider{ Name: "identity-providers/1", Title: "Updated Provider", }, } _, err = ts.Service.UpdateIdentityProvider(userCtx, req) require.Error(t, err) require.Contains(t, err.Error(), "update_mask is required") }) t.Run("UpdateIdentityProvider invalid name", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create host user hostUser, err := ts.CreateHostUser(ctx, "admin") require.NoError(t, err) // Set user context userCtx := ts.CreateUserContext(ctx, hostUser.ID) req := &v1pb.UpdateIdentityProviderRequest{ IdentityProvider: &v1pb.IdentityProvider{ Name: "invalid-name", Title: "Updated Provider", }, UpdateMask: &fieldmaskpb.FieldMask{ Paths: []string{"title"}, }, } _, err = ts.Service.UpdateIdentityProvider(userCtx, req) require.Error(t, err) require.Contains(t, err.Error(), "invalid identity provider name") }) } func TestDeleteIdentityProvider(t *testing.T) { ctx := context.Background() t.Run("DeleteIdentityProvider success", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create host user hostUser, err := ts.CreateHostUser(ctx, "admin") require.NoError(t, err) // Set user context userCtx := ts.CreateUserContext(ctx, hostUser.ID) // Create identity provider createReq := &v1pb.CreateIdentityProviderRequest{ IdentityProvider: &v1pb.IdentityProvider{ Title: "Provider to Delete", Type: v1pb.IdentityProvider_OAUTH2, Config: &v1pb.IdentityProviderConfig{ Config: &v1pb.IdentityProviderConfig_Oauth2Config{ Oauth2Config: &v1pb.OAuth2Config{ ClientId: "client-to-delete", AuthUrl: "https://example.com/auth", TokenUrl: "https://example.com/token", UserInfoUrl: "https://example.com/user", FieldMapping: &v1pb.FieldMapping{ Identifier: "id", }, }, }, }, }, } created, err := ts.Service.CreateIdentityProvider(userCtx, createReq) require.NoError(t, err) // Delete identity provider deleteReq := &v1pb.DeleteIdentityProviderRequest{ Name: created.Name, } _, err = ts.Service.DeleteIdentityProvider(userCtx, deleteReq) require.NoError(t, err) // Verify deletion getReq := &v1pb.GetIdentityProviderRequest{ Name: created.Name, } _, err = ts.Service.GetIdentityProvider(ctx, getReq) require.Error(t, err) require.Contains(t, err.Error(), "not found") }) t.Run("DeleteIdentityProvider invalid name", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create host user hostUser, err := ts.CreateHostUser(ctx, "admin") require.NoError(t, err) // Set user context userCtx := ts.CreateUserContext(ctx, hostUser.ID) req := &v1pb.DeleteIdentityProviderRequest{ Name: "invalid-name", } _, err = ts.Service.DeleteIdentityProvider(userCtx, req) require.Error(t, err) require.Contains(t, err.Error(), "invalid identity provider name") }) t.Run("DeleteIdentityProvider not found", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create host user hostUser, err := ts.CreateHostUser(ctx, "admin") require.NoError(t, err) // Set user context userCtx := ts.CreateUserContext(ctx, hostUser.ID) req := &v1pb.DeleteIdentityProviderRequest{ Name: "identity-providers/999", } _, err = ts.Service.DeleteIdentityProvider(userCtx, req) require.Error(t, err) // Note: Delete might succeed even if item doesn't exist, depending on store implementation }) } func TestIdentityProviderPermissions(t *testing.T) { ctx := context.Background() t.Run("Only host users can create identity providers", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create regular user regularUser, err := ts.CreateRegularUser(ctx, "regularuser") require.NoError(t, err) // Set user context userCtx := ts.CreateUserContext(ctx, regularUser.ID) req := &v1pb.CreateIdentityProviderRequest{ IdentityProvider: &v1pb.IdentityProvider{ Title: "Test Provider", Type: v1pb.IdentityProvider_OAUTH2, }, } _, err = ts.Service.CreateIdentityProvider(userCtx, req) require.Error(t, err) require.Contains(t, err.Error(), "permission denied") }) t.Run("Authentication required", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() req := &v1pb.CreateIdentityProviderRequest{ IdentityProvider: &v1pb.IdentityProvider{ Title: "Test Provider", Type: v1pb.IdentityProvider_OAUTH2, }, } _, err := ts.Service.CreateIdentityProvider(ctx, req) require.Error(t, err) require.Contains(t, err.Error(), "permission denied") }) }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/router/api/v1/test/memo_relation_service_test.go
server/router/api/v1/test/memo_relation_service_test.go
package test import ( "context" "testing" "github.com/stretchr/testify/require" apiv1 "github.com/usememos/memos/proto/gen/api/v1" ) func TestSetMemoRelations(t *testing.T) { ctx := context.Background() t.Run("SetMemoRelations success by memo owner", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create user user, err := ts.CreateRegularUser(ctx, "user") require.NoError(t, err) userCtx := ts.CreateUserContext(ctx, user.ID) // Create memo1 memo1, err := ts.Service.CreateMemo(userCtx, &apiv1.CreateMemoRequest{ Memo: &apiv1.Memo{ Content: "Test memo 1", Visibility: apiv1.Visibility_PRIVATE, }, }) require.NoError(t, err) require.NotNil(t, memo1) // Create memo2 memo2, err := ts.Service.CreateMemo(userCtx, &apiv1.CreateMemoRequest{ Memo: &apiv1.Memo{ Content: "Test memo 2", Visibility: apiv1.Visibility_PRIVATE, }, }) require.NoError(t, err) require.NotNil(t, memo2) // Set memo relations - should succeed _, err = ts.Service.SetMemoRelations(userCtx, &apiv1.SetMemoRelationsRequest{ Name: memo1.Name, Relations: []*apiv1.MemoRelation{ { RelatedMemo: &apiv1.MemoRelation_Memo{ Name: memo2.Name, }, Type: apiv1.MemoRelation_REFERENCE, }, }, }) require.NoError(t, err) }) t.Run("SetMemoRelations success by host user", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create regular user regularUser, err := ts.CreateRegularUser(ctx, "user") require.NoError(t, err) regularUserCtx := ts.CreateUserContext(ctx, regularUser.ID) // Create host user hostUser, err := ts.CreateHostUser(ctx, "admin") require.NoError(t, err) hostCtx := ts.CreateUserContext(ctx, hostUser.ID) // Create memo by regular user memo, err := ts.Service.CreateMemo(regularUserCtx, &apiv1.CreateMemoRequest{ Memo: &apiv1.Memo{ Content: "Test memo", Visibility: apiv1.Visibility_PRIVATE, }, }) require.NoError(t, err) require.NotNil(t, memo) // Host user can modify relations - should succeed _, err = ts.Service.SetMemoRelations(hostCtx, &apiv1.SetMemoRelationsRequest{ Name: memo.Name, Relations: []*apiv1.MemoRelation{}, }) require.NoError(t, err) }) t.Run("SetMemoRelations permission denied for non-owner", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create user1 user1, err := ts.CreateRegularUser(ctx, "user1") require.NoError(t, err) user1Ctx := ts.CreateUserContext(ctx, user1.ID) // Create user2 user2, err := ts.CreateRegularUser(ctx, "user2") require.NoError(t, err) user2Ctx := ts.CreateUserContext(ctx, user2.ID) // Create memo by user1 memo, err := ts.Service.CreateMemo(user1Ctx, &apiv1.CreateMemoRequest{ Memo: &apiv1.Memo{ Content: "Test memo", Visibility: apiv1.Visibility_PRIVATE, }, }) require.NoError(t, err) require.NotNil(t, memo) // User2 tries to modify relations - should fail _, err = ts.Service.SetMemoRelations(user2Ctx, &apiv1.SetMemoRelationsRequest{ Name: memo.Name, Relations: []*apiv1.MemoRelation{}, }) require.Error(t, err) require.Contains(t, err.Error(), "permission denied") }) t.Run("SetMemoRelations unauthenticated", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create user user, err := ts.CreateRegularUser(ctx, "user") require.NoError(t, err) userCtx := ts.CreateUserContext(ctx, user.ID) // Create memo memo, err := ts.Service.CreateMemo(userCtx, &apiv1.CreateMemoRequest{ Memo: &apiv1.Memo{ Content: "Test memo", Visibility: apiv1.Visibility_PRIVATE, }, }) require.NoError(t, err) require.NotNil(t, memo) // Unauthenticated user tries to modify relations - should fail _, err = ts.Service.SetMemoRelations(ctx, &apiv1.SetMemoRelationsRequest{ Name: memo.Name, Relations: []*apiv1.MemoRelation{}, }) require.Error(t, err) require.Contains(t, err.Error(), "not authenticated") }) t.Run("SetMemoRelations memo not found", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create user user, err := ts.CreateRegularUser(ctx, "user") require.NoError(t, err) userCtx := ts.CreateUserContext(ctx, user.ID) // Try to set relations on non-existent memo - should fail _, err = ts.Service.SetMemoRelations(userCtx, &apiv1.SetMemoRelationsRequest{ Name: "memos/nonexistent-uid-12345", Relations: []*apiv1.MemoRelation{}, }) require.Error(t, err) require.Contains(t, err.Error(), "not found") }) }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/router/api/v1/test/reaction_service_test.go
server/router/api/v1/test/reaction_service_test.go
package test import ( "context" "testing" "github.com/stretchr/testify/require" apiv1 "github.com/usememos/memos/proto/gen/api/v1" ) func TestDeleteMemoReaction(t *testing.T) { ctx := context.Background() t.Run("DeleteMemoReaction success by reaction owner", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create user user, err := ts.CreateRegularUser(ctx, "user") require.NoError(t, err) userCtx := ts.CreateUserContext(ctx, user.ID) // Create memo memo, err := ts.Service.CreateMemo(userCtx, &apiv1.CreateMemoRequest{ Memo: &apiv1.Memo{ Content: "Test memo", Visibility: apiv1.Visibility_PUBLIC, }, }) require.NoError(t, err) require.NotNil(t, memo) // Create reaction reaction, err := ts.Service.UpsertMemoReaction(userCtx, &apiv1.UpsertMemoReactionRequest{ Name: memo.Name, Reaction: &apiv1.Reaction{ ContentId: memo.Name, ReactionType: "👍", }, }) require.NoError(t, err) require.NotNil(t, reaction) // Delete reaction - should succeed _, err = ts.Service.DeleteMemoReaction(userCtx, &apiv1.DeleteMemoReactionRequest{ Name: reaction.Name, }) require.NoError(t, err) }) t.Run("DeleteMemoReaction success by host user", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create regular user regularUser, err := ts.CreateRegularUser(ctx, "user") require.NoError(t, err) regularUserCtx := ts.CreateUserContext(ctx, regularUser.ID) // Create host user hostUser, err := ts.CreateHostUser(ctx, "admin") require.NoError(t, err) hostCtx := ts.CreateUserContext(ctx, hostUser.ID) // Create memo by regular user memo, err := ts.Service.CreateMemo(regularUserCtx, &apiv1.CreateMemoRequest{ Memo: &apiv1.Memo{ Content: "Test memo", Visibility: apiv1.Visibility_PUBLIC, }, }) require.NoError(t, err) require.NotNil(t, memo) // Create reaction by regular user reaction, err := ts.Service.UpsertMemoReaction(regularUserCtx, &apiv1.UpsertMemoReactionRequest{ Name: memo.Name, Reaction: &apiv1.Reaction{ ContentId: memo.Name, ReactionType: "👍", }, }) require.NoError(t, err) require.NotNil(t, reaction) // Host user can delete reaction - should succeed _, err = ts.Service.DeleteMemoReaction(hostCtx, &apiv1.DeleteMemoReactionRequest{ Name: reaction.Name, }) require.NoError(t, err) }) t.Run("DeleteMemoReaction permission denied for non-owner", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create user1 user1, err := ts.CreateRegularUser(ctx, "user1") require.NoError(t, err) user1Ctx := ts.CreateUserContext(ctx, user1.ID) // Create user2 user2, err := ts.CreateRegularUser(ctx, "user2") require.NoError(t, err) user2Ctx := ts.CreateUserContext(ctx, user2.ID) // Create memo by user1 memo, err := ts.Service.CreateMemo(user1Ctx, &apiv1.CreateMemoRequest{ Memo: &apiv1.Memo{ Content: "Test memo", Visibility: apiv1.Visibility_PUBLIC, }, }) require.NoError(t, err) require.NotNil(t, memo) // Create reaction by user1 reaction, err := ts.Service.UpsertMemoReaction(user1Ctx, &apiv1.UpsertMemoReactionRequest{ Name: memo.Name, Reaction: &apiv1.Reaction{ ContentId: memo.Name, ReactionType: "👍", }, }) require.NoError(t, err) require.NotNil(t, reaction) // User2 tries to delete reaction - should fail with permission denied _, err = ts.Service.DeleteMemoReaction(user2Ctx, &apiv1.DeleteMemoReactionRequest{ Name: reaction.Name, }) require.Error(t, err) require.Contains(t, err.Error(), "permission denied") }) t.Run("DeleteMemoReaction unauthenticated", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create user user, err := ts.CreateRegularUser(ctx, "user") require.NoError(t, err) userCtx := ts.CreateUserContext(ctx, user.ID) // Create memo memo, err := ts.Service.CreateMemo(userCtx, &apiv1.CreateMemoRequest{ Memo: &apiv1.Memo{ Content: "Test memo", Visibility: apiv1.Visibility_PUBLIC, }, }) require.NoError(t, err) require.NotNil(t, memo) // Create reaction reaction, err := ts.Service.UpsertMemoReaction(userCtx, &apiv1.UpsertMemoReactionRequest{ Name: memo.Name, Reaction: &apiv1.Reaction{ ContentId: memo.Name, ReactionType: "👍", }, }) require.NoError(t, err) require.NotNil(t, reaction) // Unauthenticated user tries to delete reaction - should fail _, err = ts.Service.DeleteMemoReaction(ctx, &apiv1.DeleteMemoReactionRequest{ Name: reaction.Name, }) require.Error(t, err) require.Contains(t, err.Error(), "not authenticated") }) t.Run("DeleteMemoReaction not found returns permission denied", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create user user, err := ts.CreateRegularUser(ctx, "user") require.NoError(t, err) userCtx := ts.CreateUserContext(ctx, user.ID) // Try to delete non-existent reaction - should fail with permission denied // (not "not found" to avoid information disclosure) // Use new nested resource format: memos/{memo}/reactions/{reaction} _, err = ts.Service.DeleteMemoReaction(userCtx, &apiv1.DeleteMemoReactionRequest{ Name: "memos/nonexistent/reactions/99999", }) require.Error(t, err) require.Contains(t, err.Error(), "permission denied") require.NotContains(t, err.Error(), "not found") }) }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/router/api/v1/test/attachment_service_test.go
server/router/api/v1/test/attachment_service_test.go
package test import ( "context" "testing" "github.com/stretchr/testify/require" v1pb "github.com/usememos/memos/proto/gen/api/v1" ) func TestCreateAttachment(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() ctx := context.Background() user, err := ts.CreateRegularUser(ctx, "test_user") require.NoError(t, err) userCtx := ts.CreateUserContext(ctx, user.ID) // Test case 1: Create attachment with empty type but known extension t.Run("EmptyType_KnownExtension", func(t *testing.T) { attachment, err := ts.Service.CreateAttachment(userCtx, &v1pb.CreateAttachmentRequest{ Attachment: &v1pb.Attachment{ Filename: "test.png", Content: []byte("fake png content"), }, }) require.NoError(t, err) require.Equal(t, "image/png", attachment.Type) }) // Test case 2: Create attachment with empty type and unknown extension, but detectable content t.Run("EmptyType_UnknownExtension_ContentSniffing", func(t *testing.T) { // PNG magic header: 89 50 4E 47 0D 0A 1A 0A pngContent := []byte{0x89, 0x50, 0x4E, 0x47, 0x0D, 0x0A, 0x1A, 0x0A} attachment, err := ts.Service.CreateAttachment(userCtx, &v1pb.CreateAttachmentRequest{ Attachment: &v1pb.Attachment{ Filename: "test.unknown", Content: pngContent, }, }) require.NoError(t, err) require.Equal(t, "image/png", attachment.Type) }) // Test case 3: Empty type, unknown extension, random content -> fallback to application/octet-stream t.Run("EmptyType_Fallback", func(t *testing.T) { randomContent := []byte{0x00, 0x01, 0x02, 0x03} attachment, err := ts.Service.CreateAttachment(userCtx, &v1pb.CreateAttachmentRequest{ Attachment: &v1pb.Attachment{ Filename: "test.data", Content: randomContent, }, }) require.NoError(t, err) require.Equal(t, "application/octet-stream", attachment.Type) }) }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/router/api/v1/test/memo_service_test.go
server/router/api/v1/test/memo_service_test.go
package test import ( "context" "fmt" "slices" "testing" "github.com/stretchr/testify/require" apiv1 "github.com/usememos/memos/proto/gen/api/v1" ) func TestListMemos(t *testing.T) { ctx := context.Background() ts := NewTestService(t) defer ts.Cleanup() // Create userOne userOne, err := ts.CreateRegularUser(ctx, "test-user-1") require.NoError(t, err) require.NotNil(t, userOne) // Create userOne context userOneCtx := ts.CreateUserContext(ctx, userOne.ID) // Create userTwo userTwo, err := ts.CreateRegularUser(ctx, "test-user-2") require.NoError(t, err) require.NotNil(t, userTwo) // Create userTwo context userTwoCtx := ts.CreateUserContext(ctx, userTwo.ID) // Create attachmentOne by userOne attachmentOne, err := ts.Service.CreateAttachment(userOneCtx, &apiv1.CreateAttachmentRequest{ Attachment: &apiv1.Attachment{ Name: "", Filename: "hello.txt", Size: 5, Type: "text/plain", Content: []byte{ 104, 101, 108, 108, 111, }, }, }) require.NoError(t, err) require.NotNil(t, attachmentOne) // Create attachmentTwo by userOne attachmentTwo, err := ts.Service.CreateAttachment(userOneCtx, &apiv1.CreateAttachmentRequest{ Attachment: &apiv1.Attachment{ Name: "", Filename: "world.txt", Size: 5, Type: "text/plain", Content: []byte{ 119, 111, 114, 108, 100, }, }, }) require.NoError(t, err) require.NotNil(t, attachmentTwo) // Create memoOne with two attachments by userOne memoOne, err := ts.Service.CreateMemo(userOneCtx, &apiv1.CreateMemoRequest{ Memo: &apiv1.Memo{ Content: "Hellooo, any words after this sentence won't be in the snippet. This is the next sentence. And I also have two attachments.", Visibility: apiv1.Visibility_PROTECTED, Attachments: []*apiv1.Attachment{ &apiv1.Attachment{ Name: attachmentOne.Name, }, &apiv1.Attachment{ Name: attachmentTwo.Name, }, }, }, }) require.NoError(t, err) require.NotNil(t, memoOne) // Create memoTwo by userTwo referencing memoOne memoTwo, err := ts.Service.CreateMemo(userTwoCtx, &apiv1.CreateMemoRequest{ Memo: &apiv1.Memo{ Content: "This is a memo reminding you to check the attachment attached to memoOne. I have referenced the memo below.⬇️", Visibility: apiv1.Visibility_PROTECTED, Relations: []*apiv1.MemoRelation{ &apiv1.MemoRelation{ RelatedMemo: &apiv1.MemoRelation_Memo{ Name: memoOne.Name, }, }, }, }, }) require.NoError(t, err) require.NotNil(t, memoTwo) // Create memoThree by userOne memoThree, err := ts.Service.CreateMemo(userOneCtx, &apiv1.CreateMemoRequest{ Memo: &apiv1.Memo{ Content: "This is a very popular memo. I have 2 reactions!", Visibility: apiv1.Visibility_PROTECTED, }, }) require.NoError(t, err) require.NotNil(t, memoThree) // Create reaction from userOne on memoThree reactionOne, err := ts.Service.UpsertMemoReaction(userOneCtx, &apiv1.UpsertMemoReactionRequest{ Name: memoThree.Name, Reaction: &apiv1.Reaction{ ContentId: memoThree.Name, ReactionType: "❤️", }, }) require.NoError(t, err) require.NotNil(t, reactionOne) // Create reaction from userTwo on memoThree reactionTwo, err := ts.Service.UpsertMemoReaction(userTwoCtx, &apiv1.UpsertMemoReactionRequest{ Name: memoThree.Name, Reaction: &apiv1.Reaction{ ContentId: memoThree.Name, ReactionType: "👍", }, }) require.NoError(t, err) require.NotNil(t, reactionTwo) memos, err := ts.Service.ListMemos(userOneCtx, &apiv1.ListMemosRequest{PageSize: 10}) require.NoError(t, err) require.NotNil(t, memos) require.Equal(t, 3, len(memos.Memos)) // /////////////// // VERIFY MEMO ONE // /////////////// memoOneResIdx := slices.IndexFunc(memos.Memos, func(m *apiv1.Memo) bool { return m.GetName() == memoOne.GetName() }) require.NotEqual(t, memoOneResIdx, -1) memoOneRes := memos.Memos[memoOneResIdx] require.NotNil(t, memoOneRes) require.Equal(t, fmt.Sprintf("users/%d", userOne.ID), memoOneRes.GetCreator()) require.Equal(t, apiv1.Visibility_PROTECTED, memoOneRes.GetVisibility()) require.Equal(t, memoOne.Content, memoOneRes.GetContent()) require.Equal(t, memoOne.Content[:64]+"...", memoOneRes.GetSnippet(), "memoOne's content is snipped past the 64 char limit") require.Len(t, memoOneRes.Attachments, 2) require.Len(t, memoOneRes.Relations, 1) require.Empty(t, memoOneRes.Reactions) // verify memoOne's attachments // attachment one attachmentOneResIdx := slices.IndexFunc(memoOneRes.Attachments, func(a *apiv1.Attachment) bool { return a.GetName() == attachmentOne.GetName() }) require.NotEqual(t, attachmentOneResIdx, -1) attachmentOneRes := memoOneRes.Attachments[attachmentOneResIdx] require.NotNil(t, attachmentOneRes) require.Equal(t, attachmentOne.GetName(), attachmentOneRes.GetName()) require.Equal(t, attachmentOne.GetContent(), attachmentOneRes.GetContent()) // attachment two attachmentTwoResIdx := slices.IndexFunc(memoOneRes.Attachments, func(a *apiv1.Attachment) bool { return a.GetName() == attachmentTwo.GetName() }) require.NotEqual(t, attachmentTwoResIdx, -1) attachmentTwoRes := memoOneRes.Attachments[attachmentTwoResIdx] require.NotNil(t, attachmentTwoRes) require.Equal(t, attachmentTwo.GetName(), attachmentTwoRes.GetName()) require.Equal(t, attachmentTwo.GetName(), attachmentTwoRes.GetName()) require.Equal(t, attachmentTwo.GetContent(), attachmentTwoRes.GetContent()) // verify memoOne's relations require.Len(t, memoOneRes.Relations, 1) memoOneExpectedRelation := &apiv1.MemoRelation{ Memo: &apiv1.MemoRelation_Memo{Name: memoTwo.GetName()}, RelatedMemo: &apiv1.MemoRelation_Memo{Name: memoOne.GetName()}, } require.Equal(t, memoOneExpectedRelation.Memo.GetName(), memoOneRes.Relations[0].Memo.GetName()) require.Equal(t, memoOneExpectedRelation.RelatedMemo.GetName(), memoOneRes.Relations[0].RelatedMemo.GetName()) // /////////////// // VERIFY MEMO TWO // /////////////// memoTwoResIdx := slices.IndexFunc(memos.Memos, func(m *apiv1.Memo) bool { return m.GetName() == memoTwo.GetName() }) require.NotEqual(t, memoTwoResIdx, -1) memoTwoRes := memos.Memos[memoTwoResIdx] require.NotNil(t, memoTwoRes) require.Equal(t, fmt.Sprintf("users/%d", userTwo.ID), memoTwoRes.GetCreator()) require.Equal(t, apiv1.Visibility_PROTECTED, memoTwoRes.GetVisibility()) require.Equal(t, memoTwo.Content, memoTwoRes.GetContent()) require.Empty(t, memoTwoRes.Attachments) require.Len(t, memoTwoRes.Relations, 1) require.Empty(t, memoTwoRes.Reactions) // verify memoTwo's relations require.Len(t, memoTwoRes.Relations, 1) memoTwoExpectedRelation := &apiv1.MemoRelation{ Memo: &apiv1.MemoRelation_Memo{Name: memoTwo.GetName()}, RelatedMemo: &apiv1.MemoRelation_Memo{Name: memoOne.GetName()}, } require.Equal(t, memoTwoExpectedRelation.Memo.GetName(), memoTwoRes.Relations[0].Memo.GetName()) require.Equal(t, memoTwoExpectedRelation.RelatedMemo.GetName(), memoTwoRes.Relations[0].RelatedMemo.GetName()) // /////////////// // VERIFY MEMO THREE // /////////////// memoThreeResIdx := slices.IndexFunc(memos.Memos, func(m *apiv1.Memo) bool { return m.GetName() == memoThree.GetName() }) require.NotEqual(t, memoThreeResIdx, -1) memoThreeRes := memos.Memos[memoThreeResIdx] require.NotNil(t, memoThreeRes) require.Equal(t, fmt.Sprintf("users/%d", userOne.ID), memoThreeRes.GetCreator()) require.Equal(t, apiv1.Visibility_PROTECTED, memoThreeRes.GetVisibility()) require.Equal(t, memoThree.Content, memoThreeRes.GetContent()) require.Empty(t, memoThreeRes.Attachments) require.Empty(t, memoThreeRes.Relations) require.Len(t, memoThreeRes.Reactions, 2) // verify memoThree's reactions require.Len(t, memoThreeRes.Reactions, 2) // userOne's reaction userOneReactionIdx := slices.IndexFunc(memoThreeRes.Reactions, func(r *apiv1.Reaction) bool { return r.GetCreator() == fmt.Sprintf("users/%d", userOne.ID) }) require.NotEqual(t, userOneReactionIdx, -1) userOneReaction := memoThreeRes.Reactions[userOneReactionIdx] require.NotNil(t, userOneReaction) require.Equal(t, "❤️", userOneReaction.ReactionType) // userTwo's reaction userTwoReactionIdx := slices.IndexFunc(memoThreeRes.Reactions, func(r *apiv1.Reaction) bool { return r.GetCreator() == fmt.Sprintf("users/%d", userTwo.ID) }) require.NotEqual(t, userTwoReactionIdx, -1) userTwoReaction := memoThreeRes.Reactions[userTwoReactionIdx] require.NotNil(t, userTwoReaction) require.Equal(t, "👍", userTwoReaction.ReactionType) }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/router/api/v1/test/memo_attachment_service_test.go
server/router/api/v1/test/memo_attachment_service_test.go
package test import ( "context" "testing" "github.com/stretchr/testify/require" apiv1 "github.com/usememos/memos/proto/gen/api/v1" ) func TestSetMemoAttachments(t *testing.T) { ctx := context.Background() t.Run("SetMemoAttachments success by memo owner", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create user user, err := ts.CreateRegularUser(ctx, "user") require.NoError(t, err) userCtx := ts.CreateUserContext(ctx, user.ID) // Create memo memo, err := ts.Service.CreateMemo(userCtx, &apiv1.CreateMemoRequest{ Memo: &apiv1.Memo{ Content: "Test memo", Visibility: apiv1.Visibility_PRIVATE, }, }) require.NoError(t, err) require.NotNil(t, memo) // Create attachment attachment, err := ts.Service.CreateAttachment(userCtx, &apiv1.CreateAttachmentRequest{ Attachment: &apiv1.Attachment{ Filename: "test.txt", Size: 5, Type: "text/plain", Content: []byte("hello"), }, }) require.NoError(t, err) require.NotNil(t, attachment) // Set memo attachments - should succeed _, err = ts.Service.SetMemoAttachments(userCtx, &apiv1.SetMemoAttachmentsRequest{ Name: memo.Name, Attachments: []*apiv1.Attachment{ {Name: attachment.Name}, }, }) require.NoError(t, err) }) t.Run("SetMemoAttachments success by host user", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create regular user regularUser, err := ts.CreateRegularUser(ctx, "user") require.NoError(t, err) regularUserCtx := ts.CreateUserContext(ctx, regularUser.ID) // Create host user hostUser, err := ts.CreateHostUser(ctx, "admin") require.NoError(t, err) hostCtx := ts.CreateUserContext(ctx, hostUser.ID) // Create memo by regular user memo, err := ts.Service.CreateMemo(regularUserCtx, &apiv1.CreateMemoRequest{ Memo: &apiv1.Memo{ Content: "Test memo", Visibility: apiv1.Visibility_PRIVATE, }, }) require.NoError(t, err) require.NotNil(t, memo) // Host user can modify attachments - should succeed _, err = ts.Service.SetMemoAttachments(hostCtx, &apiv1.SetMemoAttachmentsRequest{ Name: memo.Name, Attachments: []*apiv1.Attachment{}, }) require.NoError(t, err) }) t.Run("SetMemoAttachments permission denied for non-owner", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create user1 user1, err := ts.CreateRegularUser(ctx, "user1") require.NoError(t, err) user1Ctx := ts.CreateUserContext(ctx, user1.ID) // Create user2 user2, err := ts.CreateRegularUser(ctx, "user2") require.NoError(t, err) user2Ctx := ts.CreateUserContext(ctx, user2.ID) // Create memo by user1 memo, err := ts.Service.CreateMemo(user1Ctx, &apiv1.CreateMemoRequest{ Memo: &apiv1.Memo{ Content: "Test memo", Visibility: apiv1.Visibility_PRIVATE, }, }) require.NoError(t, err) require.NotNil(t, memo) // User2 tries to modify attachments - should fail _, err = ts.Service.SetMemoAttachments(user2Ctx, &apiv1.SetMemoAttachmentsRequest{ Name: memo.Name, Attachments: []*apiv1.Attachment{}, }) require.Error(t, err) require.Contains(t, err.Error(), "permission denied") }) t.Run("SetMemoAttachments unauthenticated", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create user user, err := ts.CreateRegularUser(ctx, "user") require.NoError(t, err) userCtx := ts.CreateUserContext(ctx, user.ID) // Create memo memo, err := ts.Service.CreateMemo(userCtx, &apiv1.CreateMemoRequest{ Memo: &apiv1.Memo{ Content: "Test memo", Visibility: apiv1.Visibility_PRIVATE, }, }) require.NoError(t, err) require.NotNil(t, memo) // Unauthenticated user tries to modify attachments - should fail _, err = ts.Service.SetMemoAttachments(ctx, &apiv1.SetMemoAttachmentsRequest{ Name: memo.Name, Attachments: []*apiv1.Attachment{}, }) require.Error(t, err) require.Contains(t, err.Error(), "not authenticated") }) t.Run("SetMemoAttachments memo not found", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create user user, err := ts.CreateRegularUser(ctx, "user") require.NoError(t, err) userCtx := ts.CreateUserContext(ctx, user.ID) // Try to set attachments on non-existent memo - should fail _, err = ts.Service.SetMemoAttachments(userCtx, &apiv1.SetMemoAttachmentsRequest{ Name: "memos/nonexistent-uid-12345", Attachments: []*apiv1.Attachment{}, }) require.Error(t, err) require.Contains(t, err.Error(), "not found") }) }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/router/api/v1/test/user_service_registration_test.go
server/router/api/v1/test/user_service_registration_test.go
package test import ( "context" "testing" "github.com/stretchr/testify/require" apiv1 "github.com/usememos/memos/proto/gen/api/v1" storepb "github.com/usememos/memos/proto/gen/store" ) func TestCreateUserRegistration(t *testing.T) { ctx := context.Background() t.Run("CreateUser success when registration enabled", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // User registration is enabled by default, no need to set it explicitly // Create user without authentication - should succeed _, err := ts.Service.CreateUser(ctx, &apiv1.CreateUserRequest{ User: &apiv1.User{ Username: "newuser", Email: "newuser@example.com", Password: "password123", }, }) require.NoError(t, err) }) t.Run("CreateUser blocked when registration disabled", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create a host user first so we're not in first-user setup mode _, err := ts.CreateHostUser(ctx, "admin") require.NoError(t, err) // Disable user registration _, err = ts.Store.UpsertInstanceSetting(ctx, &storepb.InstanceSetting{ Key: storepb.InstanceSettingKey_GENERAL, Value: &storepb.InstanceSetting_GeneralSetting{ GeneralSetting: &storepb.InstanceGeneralSetting{ DisallowUserRegistration: true, }, }, }) require.NoError(t, err) // Try to create user without authentication - should fail _, err = ts.Service.CreateUser(ctx, &apiv1.CreateUserRequest{ User: &apiv1.User{ Username: "newuser", Email: "newuser@example.com", Password: "password123", }, }) require.Error(t, err) require.Contains(t, err.Error(), "not allowed") }) t.Run("CreateUser succeeds for superuser even when registration disabled", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create host user hostUser, err := ts.CreateHostUser(ctx, "admin") require.NoError(t, err) hostCtx := ts.CreateUserContext(ctx, hostUser.ID) // Disable user registration _, err = ts.Store.UpsertInstanceSetting(ctx, &storepb.InstanceSetting{ Key: storepb.InstanceSettingKey_GENERAL, Value: &storepb.InstanceSetting_GeneralSetting{ GeneralSetting: &storepb.InstanceGeneralSetting{ DisallowUserRegistration: true, }, }, }) require.NoError(t, err) // Host user can create users even when registration is disabled - should succeed _, err = ts.Service.CreateUser(hostCtx, &apiv1.CreateUserRequest{ User: &apiv1.User{ Username: "newuser", Email: "newuser@example.com", Password: "password123", }, }) require.NoError(t, err) }) t.Run("CreateUser regular user cannot create users when registration disabled", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create regular user regularUser, err := ts.CreateRegularUser(ctx, "regularuser") require.NoError(t, err) regularUserCtx := ts.CreateUserContext(ctx, regularUser.ID) // Disable user registration _, err = ts.Store.UpsertInstanceSetting(ctx, &storepb.InstanceSetting{ Key: storepb.InstanceSettingKey_GENERAL, Value: &storepb.InstanceSetting_GeneralSetting{ GeneralSetting: &storepb.InstanceGeneralSetting{ DisallowUserRegistration: true, }, }, }) require.NoError(t, err) // Regular user tries to create user when registration is disabled - should fail _, err = ts.Service.CreateUser(regularUserCtx, &apiv1.CreateUserRequest{ User: &apiv1.User{ Username: "newuser", Email: "newuser@example.com", Password: "password123", }, }) require.Error(t, err) require.Contains(t, err.Error(), "not allowed") }) t.Run("CreateUser host can assign roles", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create host user hostUser, err := ts.CreateHostUser(ctx, "admin") require.NoError(t, err) hostCtx := ts.CreateUserContext(ctx, hostUser.ID) // Host user can create user with specific role - should succeed createdUser, err := ts.Service.CreateUser(hostCtx, &apiv1.CreateUserRequest{ User: &apiv1.User{ Username: "newadmin", Email: "newadmin@example.com", Password: "password123", Role: apiv1.User_ADMIN, }, }) require.NoError(t, err) require.NotNil(t, createdUser) require.Equal(t, apiv1.User_ADMIN, createdUser.Role) }) t.Run("CreateUser unauthenticated user can only create regular user", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create a host user first so we're not in first-user setup mode _, err := ts.CreateHostUser(ctx, "admin") require.NoError(t, err) // User registration is enabled by default // Unauthenticated user tries to create admin user - role should be ignored createdUser, err := ts.Service.CreateUser(ctx, &apiv1.CreateUserRequest{ User: &apiv1.User{ Username: "wannabeadmin", Email: "wannabeadmin@example.com", Password: "password123", Role: apiv1.User_ADMIN, // This should be ignored }, }) require.NoError(t, err) require.NotNil(t, createdUser) require.Equal(t, apiv1.User_USER, createdUser.Role, "Unauthenticated users can only create USER role") }) }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/router/api/v1/test/shortcut_service_test.go
server/router/api/v1/test/shortcut_service_test.go
package test import ( "context" "fmt" "testing" "github.com/stretchr/testify/require" "google.golang.org/protobuf/types/known/fieldmaskpb" v1pb "github.com/usememos/memos/proto/gen/api/v1" ) func TestListShortcuts(t *testing.T) { ctx := context.Background() t.Run("ListShortcuts success", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create a user user, err := ts.CreateRegularUser(ctx, "testuser") require.NoError(t, err) // Set user context userCtx := ts.CreateUserContext(ctx, user.ID) // List shortcuts (should be empty initially) req := &v1pb.ListShortcutsRequest{ Parent: fmt.Sprintf("users/%d", user.ID), } resp, err := ts.Service.ListShortcuts(userCtx, req) require.NoError(t, err) require.NotNil(t, resp) require.Empty(t, resp.Shortcuts) }) t.Run("ListShortcuts permission denied for different user", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create two users user1, err := ts.CreateRegularUser(ctx, "user1") require.NoError(t, err) user2, err := ts.CreateRegularUser(ctx, "user2") require.NoError(t, err) // Set user1 context but try to list user2's shortcuts userCtx := ts.CreateUserContext(ctx, user1.ID) req := &v1pb.ListShortcutsRequest{ Parent: fmt.Sprintf("users/%d", user2.ID), } _, err = ts.Service.ListShortcuts(userCtx, req) require.Error(t, err) require.Contains(t, err.Error(), "permission denied") }) t.Run("ListShortcuts invalid parent format", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create user user, err := ts.CreateRegularUser(ctx, "testuser") require.NoError(t, err) // Set user context userCtx := ts.CreateUserContext(ctx, user.ID) req := &v1pb.ListShortcutsRequest{ Parent: "invalid-parent-format", } _, err = ts.Service.ListShortcuts(userCtx, req) require.Error(t, err) require.Contains(t, err.Error(), "invalid user name") }) t.Run("ListShortcuts unauthenticated", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() req := &v1pb.ListShortcutsRequest{ Parent: "users/1", } _, err := ts.Service.ListShortcuts(ctx, req) require.Error(t, err) require.Contains(t, err.Error(), "permission denied") }) } func TestGetShortcut(t *testing.T) { ctx := context.Background() t.Run("GetShortcut success", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create a user user, err := ts.CreateRegularUser(ctx, "testuser") require.NoError(t, err) // Set user context userCtx := ts.CreateUserContext(ctx, user.ID) // First create a shortcut createReq := &v1pb.CreateShortcutRequest{ Parent: fmt.Sprintf("users/%d", user.ID), Shortcut: &v1pb.Shortcut{ Title: "Test Shortcut", Filter: "tag in [\"test\"]", }, } created, err := ts.Service.CreateShortcut(userCtx, createReq) require.NoError(t, err) // Now get the shortcut getReq := &v1pb.GetShortcutRequest{ Name: created.Name, } resp, err := ts.Service.GetShortcut(userCtx, getReq) require.NoError(t, err) require.NotNil(t, resp) require.Equal(t, created.Name, resp.Name) require.Equal(t, "Test Shortcut", resp.Title) require.Equal(t, "tag in [\"test\"]", resp.Filter) }) t.Run("GetShortcut permission denied for different user", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create two users user1, err := ts.CreateRegularUser(ctx, "user1") require.NoError(t, err) user2, err := ts.CreateRegularUser(ctx, "user2") require.NoError(t, err) // Create shortcut as user1 user1Ctx := ts.CreateUserContext(ctx, user1.ID) createReq := &v1pb.CreateShortcutRequest{ Parent: fmt.Sprintf("users/%d", user1.ID), Shortcut: &v1pb.Shortcut{ Title: "User1 Shortcut", Filter: "tag in [\"user1\"]", }, } created, err := ts.Service.CreateShortcut(user1Ctx, createReq) require.NoError(t, err) // Try to get shortcut as user2 user2Ctx := ts.CreateUserContext(ctx, user2.ID) getReq := &v1pb.GetShortcutRequest{ Name: created.Name, } _, err = ts.Service.GetShortcut(user2Ctx, getReq) require.Error(t, err) require.Contains(t, err.Error(), "permission denied") }) t.Run("GetShortcut invalid name format", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create user user, err := ts.CreateRegularUser(ctx, "testuser") require.NoError(t, err) // Set user context userCtx := ts.CreateUserContext(ctx, user.ID) req := &v1pb.GetShortcutRequest{ Name: "invalid-shortcut-name", } _, err = ts.Service.GetShortcut(userCtx, req) require.Error(t, err) require.Contains(t, err.Error(), "invalid shortcut name") }) t.Run("GetShortcut not found", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create user user, err := ts.CreateRegularUser(ctx, "testuser") require.NoError(t, err) // Set user context userCtx := ts.CreateUserContext(ctx, user.ID) req := &v1pb.GetShortcutRequest{ Name: fmt.Sprintf("users/%d", user.ID) + "/shortcuts/nonexistent", } _, err = ts.Service.GetShortcut(userCtx, req) require.Error(t, err) require.Contains(t, err.Error(), "not found") }) } func TestCreateShortcut(t *testing.T) { ctx := context.Background() t.Run("CreateShortcut success", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create a user user, err := ts.CreateRegularUser(ctx, "testuser") require.NoError(t, err) // Set user context userCtx := ts.CreateUserContext(ctx, user.ID) req := &v1pb.CreateShortcutRequest{ Parent: fmt.Sprintf("users/%d", user.ID), Shortcut: &v1pb.Shortcut{ Title: "My Shortcut", Filter: "tag in [\"important\"]", }, } resp, err := ts.Service.CreateShortcut(userCtx, req) require.NoError(t, err) require.NotNil(t, resp) require.Equal(t, "My Shortcut", resp.Title) require.Equal(t, "tag in [\"important\"]", resp.Filter) require.Contains(t, resp.Name, fmt.Sprintf("users/%d/shortcuts/", user.ID)) // Verify the shortcut was created by listing listReq := &v1pb.ListShortcutsRequest{ Parent: fmt.Sprintf("users/%d", user.ID), } listResp, err := ts.Service.ListShortcuts(userCtx, listReq) require.NoError(t, err) require.Len(t, listResp.Shortcuts, 1) require.Equal(t, "My Shortcut", listResp.Shortcuts[0].Title) }) t.Run("CreateShortcut permission denied for different user", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create two users user1, err := ts.CreateRegularUser(ctx, "user1") require.NoError(t, err) user2, err := ts.CreateRegularUser(ctx, "user2") require.NoError(t, err) // Set user1 context but try to create shortcut for user2 userCtx := ts.CreateUserContext(ctx, user1.ID) req := &v1pb.CreateShortcutRequest{ Parent: fmt.Sprintf("users/%d", user2.ID), Shortcut: &v1pb.Shortcut{ Title: "Forbidden Shortcut", Filter: "tag in [\"forbidden\"]", }, } _, err = ts.Service.CreateShortcut(userCtx, req) require.Error(t, err) require.Contains(t, err.Error(), "permission denied") }) t.Run("CreateShortcut invalid parent format", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create user user, err := ts.CreateRegularUser(ctx, "testuser") require.NoError(t, err) // Set user context userCtx := ts.CreateUserContext(ctx, user.ID) req := &v1pb.CreateShortcutRequest{ Parent: "invalid-parent", Shortcut: &v1pb.Shortcut{ Title: "Test Shortcut", Filter: "tag in [\"test\"]", }, } _, err = ts.Service.CreateShortcut(userCtx, req) require.Error(t, err) require.Contains(t, err.Error(), "invalid user name") }) t.Run("CreateShortcut invalid filter", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create user user, err := ts.CreateRegularUser(ctx, "testuser") require.NoError(t, err) // Set user context userCtx := ts.CreateUserContext(ctx, user.ID) req := &v1pb.CreateShortcutRequest{ Parent: fmt.Sprintf("users/%d", user.ID), Shortcut: &v1pb.Shortcut{ Title: "Invalid Filter Shortcut", Filter: "invalid||filter))syntax", }, } _, err = ts.Service.CreateShortcut(userCtx, req) require.Error(t, err) require.Contains(t, err.Error(), "invalid filter") }) t.Run("CreateShortcut missing title", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create user user, err := ts.CreateRegularUser(ctx, "testuser") require.NoError(t, err) // Set user context userCtx := ts.CreateUserContext(ctx, user.ID) req := &v1pb.CreateShortcutRequest{ Parent: fmt.Sprintf("users/%d", user.ID), Shortcut: &v1pb.Shortcut{ Filter: "tag in [\"test\"]", }, } _, err = ts.Service.CreateShortcut(userCtx, req) require.Error(t, err) require.Contains(t, err.Error(), "title is required") }) } func TestUpdateShortcut(t *testing.T) { ctx := context.Background() t.Run("UpdateShortcut success", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create a user user, err := ts.CreateRegularUser(ctx, "testuser") require.NoError(t, err) // Set user context userCtx := ts.CreateUserContext(ctx, user.ID) // Create a shortcut first createReq := &v1pb.CreateShortcutRequest{ Parent: fmt.Sprintf("users/%d", user.ID), Shortcut: &v1pb.Shortcut{ Title: "Original Title", Filter: "tag in [\"original\"]", }, } created, err := ts.Service.CreateShortcut(userCtx, createReq) require.NoError(t, err) // Update the shortcut updateReq := &v1pb.UpdateShortcutRequest{ Shortcut: &v1pb.Shortcut{ Name: created.Name, Title: "Updated Title", Filter: "tag in [\"updated\"]", }, UpdateMask: &fieldmaskpb.FieldMask{ Paths: []string{"title", "filter"}, }, } updated, err := ts.Service.UpdateShortcut(userCtx, updateReq) require.NoError(t, err) require.NotNil(t, updated) require.Equal(t, "Updated Title", updated.Title) require.Equal(t, "tag in [\"updated\"]", updated.Filter) require.Equal(t, created.Name, updated.Name) }) t.Run("UpdateShortcut permission denied for different user", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create two users user1, err := ts.CreateRegularUser(ctx, "user1") require.NoError(t, err) user2, err := ts.CreateRegularUser(ctx, "user2") require.NoError(t, err) // Create shortcut as user1 user1Ctx := ts.CreateUserContext(ctx, user1.ID) createReq := &v1pb.CreateShortcutRequest{ Parent: fmt.Sprintf("users/%d", user1.ID), Shortcut: &v1pb.Shortcut{ Title: "User1 Shortcut", Filter: "tag in [\"user1\"]", }, } created, err := ts.Service.CreateShortcut(user1Ctx, createReq) require.NoError(t, err) // Try to update shortcut as user2 user2Ctx := ts.CreateUserContext(ctx, user2.ID) updateReq := &v1pb.UpdateShortcutRequest{ Shortcut: &v1pb.Shortcut{ Name: created.Name, Title: "Hacked Title", Filter: "tag in [\"hacked\"]", }, UpdateMask: &fieldmaskpb.FieldMask{ Paths: []string{"title", "filter"}, }, } _, err = ts.Service.UpdateShortcut(user2Ctx, updateReq) require.Error(t, err) require.Contains(t, err.Error(), "permission denied") }) t.Run("UpdateShortcut missing update mask", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create a user and context for authentication user, err := ts.CreateRegularUser(ctx, "testuser") require.NoError(t, err) userCtx := ts.CreateUserContext(ctx, user.ID) req := &v1pb.UpdateShortcutRequest{ Shortcut: &v1pb.Shortcut{ Name: fmt.Sprintf("users/%d/shortcuts/test", user.ID), Title: "Updated Title", }, } _, err = ts.Service.UpdateShortcut(userCtx, req) require.Error(t, err) require.Contains(t, err.Error(), "update mask is required") }) t.Run("UpdateShortcut invalid name format", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() req := &v1pb.UpdateShortcutRequest{ Shortcut: &v1pb.Shortcut{ Name: "invalid-shortcut-name", Title: "Updated Title", }, UpdateMask: &fieldmaskpb.FieldMask{ Paths: []string{"title"}, }, } _, err := ts.Service.UpdateShortcut(ctx, req) require.Error(t, err) require.Contains(t, err.Error(), "invalid shortcut name") }) t.Run("UpdateShortcut invalid filter", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create user user, err := ts.CreateRegularUser(ctx, "testuser") require.NoError(t, err) // Set user context userCtx := ts.CreateUserContext(ctx, user.ID) // Create a shortcut first createReq := &v1pb.CreateShortcutRequest{ Parent: fmt.Sprintf("users/%d", user.ID), Shortcut: &v1pb.Shortcut{ Title: "Test Shortcut", Filter: "tag in [\"test\"]", }, } created, err := ts.Service.CreateShortcut(userCtx, createReq) require.NoError(t, err) // Try to update with invalid filter updateReq := &v1pb.UpdateShortcutRequest{ Shortcut: &v1pb.Shortcut{ Name: created.Name, Filter: "invalid||filter))syntax", }, UpdateMask: &fieldmaskpb.FieldMask{ Paths: []string{"filter"}, }, } _, err = ts.Service.UpdateShortcut(userCtx, updateReq) require.Error(t, err) require.Contains(t, err.Error(), "invalid filter") }) } func TestDeleteShortcut(t *testing.T) { ctx := context.Background() t.Run("DeleteShortcut success", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create a user user, err := ts.CreateRegularUser(ctx, "testuser") require.NoError(t, err) // Set user context userCtx := ts.CreateUserContext(ctx, user.ID) // Create a shortcut first createReq := &v1pb.CreateShortcutRequest{ Parent: fmt.Sprintf("users/%d", user.ID), Shortcut: &v1pb.Shortcut{ Title: "Shortcut to Delete", Filter: "tag in [\"delete\"]", }, } created, err := ts.Service.CreateShortcut(userCtx, createReq) require.NoError(t, err) // Delete the shortcut deleteReq := &v1pb.DeleteShortcutRequest{ Name: created.Name, } _, err = ts.Service.DeleteShortcut(userCtx, deleteReq) require.NoError(t, err) // Verify deletion by listing shortcuts listReq := &v1pb.ListShortcutsRequest{ Parent: fmt.Sprintf("users/%d", user.ID), } listResp, err := ts.Service.ListShortcuts(userCtx, listReq) require.NoError(t, err) require.Empty(t, listResp.Shortcuts) // Also verify by trying to get the deleted shortcut getReq := &v1pb.GetShortcutRequest{ Name: created.Name, } _, err = ts.Service.GetShortcut(userCtx, getReq) require.Error(t, err) require.Contains(t, err.Error(), "not found") }) t.Run("DeleteShortcut permission denied for different user", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create two users user1, err := ts.CreateRegularUser(ctx, "user1") require.NoError(t, err) user2, err := ts.CreateRegularUser(ctx, "user2") require.NoError(t, err) // Create shortcut as user1 user1Ctx := ts.CreateUserContext(ctx, user1.ID) createReq := &v1pb.CreateShortcutRequest{ Parent: fmt.Sprintf("users/%d", user1.ID), Shortcut: &v1pb.Shortcut{ Title: "User1 Shortcut", Filter: "tag in [\"user1\"]", }, } created, err := ts.Service.CreateShortcut(user1Ctx, createReq) require.NoError(t, err) // Try to delete shortcut as user2 user2Ctx := ts.CreateUserContext(ctx, user2.ID) deleteReq := &v1pb.DeleteShortcutRequest{ Name: created.Name, } _, err = ts.Service.DeleteShortcut(user2Ctx, deleteReq) require.Error(t, err) require.Contains(t, err.Error(), "permission denied") }) t.Run("DeleteShortcut invalid name format", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() req := &v1pb.DeleteShortcutRequest{ Name: "invalid-shortcut-name", } _, err := ts.Service.DeleteShortcut(ctx, req) require.Error(t, err) require.Contains(t, err.Error(), "invalid shortcut name") }) t.Run("DeleteShortcut not found", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create user user, err := ts.CreateRegularUser(ctx, "testuser") require.NoError(t, err) // Set user context userCtx := ts.CreateUserContext(ctx, user.ID) req := &v1pb.DeleteShortcutRequest{ Name: fmt.Sprintf("users/%d", user.ID) + "/shortcuts/nonexistent", } _, err = ts.Service.DeleteShortcut(userCtx, req) require.Error(t, err) require.Contains(t, err.Error(), "not found") }) } func TestShortcutFiltering(t *testing.T) { ctx := context.Background() t.Run("CreateShortcut with valid filters", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create user user, err := ts.CreateRegularUser(ctx, "testuser") require.NoError(t, err) // Set user context userCtx := ts.CreateUserContext(ctx, user.ID) // Test various valid filter formats validFilters := []string{ "tag in [\"work\"]", "content.contains(\"meeting\")", "tag in [\"work\"] && content.contains(\"meeting\")", "tag in [\"work\"] || tag in [\"personal\"]", "creator_id == 1", "visibility == \"PUBLIC\"", "has_task_list == true", "has_task_list == false", } for i, filter := range validFilters { req := &v1pb.CreateShortcutRequest{ Parent: fmt.Sprintf("users/%d", user.ID), Shortcut: &v1pb.Shortcut{ Title: "Valid Filter " + string(rune(i)), Filter: filter, }, } _, err = ts.Service.CreateShortcut(userCtx, req) require.NoError(t, err, "Filter should be valid: %s", filter) } }) t.Run("CreateShortcut with invalid filters", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create user user, err := ts.CreateRegularUser(ctx, "testuser") require.NoError(t, err) // Set user context userCtx := ts.CreateUserContext(ctx, user.ID) // Test various invalid filter formats invalidFilters := []string{ "tag in ", // incomplete expression "invalid_field @in [\"value\"]", // unknown field "tag in [\"work\"] &&", // incomplete expression "tag in [\"work\"] || || tag in [\"test\"]", // double operator "((tag in [\"work\"]", // unmatched parentheses "tag in [\"work\"] && )", // mismatched parentheses "tag == \"work\"", // wrong operator (== not supported for tags) "tag in work", // missing brackets } for _, filter := range invalidFilters { req := &v1pb.CreateShortcutRequest{ Parent: fmt.Sprintf("users/%d", user.ID), Shortcut: &v1pb.Shortcut{ Title: "Invalid Filter Test", Filter: filter, }, } _, err = ts.Service.CreateShortcut(userCtx, req) require.Error(t, err, "Filter should be invalid: %s", filter) require.Contains(t, err.Error(), "invalid filter", "Error should mention invalid filter for: %s", filter) } }) } func TestShortcutCRUDComplete(t *testing.T) { ctx := context.Background() t.Run("Complete CRUD lifecycle", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create user user, err := ts.CreateRegularUser(ctx, "testuser") require.NoError(t, err) // Set user context userCtx := ts.CreateUserContext(ctx, user.ID) // 1. Create multiple shortcuts shortcut1Req := &v1pb.CreateShortcutRequest{ Parent: fmt.Sprintf("users/%d", user.ID), Shortcut: &v1pb.Shortcut{ Title: "Work Notes", Filter: "tag in [\"work\"]", }, } shortcut2Req := &v1pb.CreateShortcutRequest{ Parent: fmt.Sprintf("users/%d", user.ID), Shortcut: &v1pb.Shortcut{ Title: "Personal Notes", Filter: "tag in [\"personal\"]", }, } created1, err := ts.Service.CreateShortcut(userCtx, shortcut1Req) require.NoError(t, err) require.Equal(t, "Work Notes", created1.Title) created2, err := ts.Service.CreateShortcut(userCtx, shortcut2Req) require.NoError(t, err) require.Equal(t, "Personal Notes", created2.Title) // 2. List shortcuts and verify both exist listReq := &v1pb.ListShortcutsRequest{ Parent: fmt.Sprintf("users/%d", user.ID), } listResp, err := ts.Service.ListShortcuts(userCtx, listReq) require.NoError(t, err) require.Len(t, listResp.Shortcuts, 2) // 3. Get individual shortcuts getReq1 := &v1pb.GetShortcutRequest{Name: created1.Name} getResp1, err := ts.Service.GetShortcut(userCtx, getReq1) require.NoError(t, err) require.Equal(t, created1.Name, getResp1.Name) require.Equal(t, "Work Notes", getResp1.Title) getReq2 := &v1pb.GetShortcutRequest{Name: created2.Name} getResp2, err := ts.Service.GetShortcut(userCtx, getReq2) require.NoError(t, err) require.Equal(t, created2.Name, getResp2.Name) require.Equal(t, "Personal Notes", getResp2.Title) // 4. Update one shortcut updateReq := &v1pb.UpdateShortcutRequest{ Shortcut: &v1pb.Shortcut{ Name: created1.Name, Title: "Work & Meeting Notes", Filter: "tag in [\"work\"] || tag in [\"meeting\"]", }, UpdateMask: &fieldmaskpb.FieldMask{ Paths: []string{"title", "filter"}, }, } updated, err := ts.Service.UpdateShortcut(userCtx, updateReq) require.NoError(t, err) require.Equal(t, "Work & Meeting Notes", updated.Title) require.Equal(t, "tag in [\"work\"] || tag in [\"meeting\"]", updated.Filter) // 5. Verify update by getting it again getUpdatedReq := &v1pb.GetShortcutRequest{Name: created1.Name} getUpdatedResp, err := ts.Service.GetShortcut(userCtx, getUpdatedReq) require.NoError(t, err) require.Equal(t, "Work & Meeting Notes", getUpdatedResp.Title) require.Equal(t, "tag in [\"work\"] || tag in [\"meeting\"]", getUpdatedResp.Filter) // 6. Delete one shortcut deleteReq := &v1pb.DeleteShortcutRequest{ Name: created2.Name, } _, err = ts.Service.DeleteShortcut(userCtx, deleteReq) require.NoError(t, err) // 7. Verify deletion by listing (should only have 1 left) finalListResp, err := ts.Service.ListShortcuts(userCtx, listReq) require.NoError(t, err) require.Len(t, finalListResp.Shortcuts, 1) require.Equal(t, "Work & Meeting Notes", finalListResp.Shortcuts[0].Title) // 8. Verify deleted shortcut can't be accessed getDeletedReq := &v1pb.GetShortcutRequest{Name: created2.Name} _, err = ts.Service.GetShortcut(userCtx, getDeletedReq) require.Error(t, err) require.Contains(t, err.Error(), "not found") }) }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/router/api/v1/test/instance_service_test.go
server/router/api/v1/test/instance_service_test.go
package test import ( "context" "fmt" "testing" "github.com/stretchr/testify/require" v1pb "github.com/usememos/memos/proto/gen/api/v1" ) func TestGetInstanceProfile(t *testing.T) { ctx := context.Background() t.Run("GetInstanceProfile returns instance profile", func(t *testing.T) { // Create test service for this specific test ts := NewTestService(t) defer ts.Cleanup() // Call GetInstanceProfile directly req := &v1pb.GetInstanceProfileRequest{} resp, err := ts.Service.GetInstanceProfile(ctx, req) // Verify response require.NoError(t, err) require.NotNil(t, resp) // Verify the response contains expected data require.Equal(t, "test-1.0.0", resp.Version) require.Equal(t, "dev", resp.Mode) require.Equal(t, "http://localhost:8080", resp.InstanceUrl) // Owner should be empty since no users are created require.Empty(t, resp.Owner) }) t.Run("GetInstanceProfile with owner", func(t *testing.T) { // Create test service for this specific test ts := NewTestService(t) defer ts.Cleanup() // Create a host user in the store hostUser, err := ts.CreateHostUser(ctx, "admin") require.NoError(t, err) require.NotNil(t, hostUser) // Call GetInstanceProfile directly req := &v1pb.GetInstanceProfileRequest{} resp, err := ts.Service.GetInstanceProfile(ctx, req) // Verify response require.NoError(t, err) require.NotNil(t, resp) // Verify the response contains expected data including owner require.Equal(t, "test-1.0.0", resp.Version) require.Equal(t, "dev", resp.Mode) require.Equal(t, "http://localhost:8080", resp.InstanceUrl) // User name should be "users/{id}" format where id is the user's ID expectedOwnerName := fmt.Sprintf("users/%d", hostUser.ID) require.Equal(t, expectedOwnerName, resp.Owner) }) } func TestGetInstanceProfile_Concurrency(t *testing.T) { ctx := context.Background() t.Run("Concurrent access to service", func(t *testing.T) { // Create test service for this specific test ts := NewTestService(t) defer ts.Cleanup() // Create a host user hostUser, err := ts.CreateHostUser(ctx, "admin") require.NoError(t, err) expectedOwnerName := fmt.Sprintf("users/%d", hostUser.ID) // Make concurrent requests numGoroutines := 10 results := make(chan *v1pb.InstanceProfile, numGoroutines) errors := make(chan error, numGoroutines) for i := 0; i < numGoroutines; i++ { go func() { req := &v1pb.GetInstanceProfileRequest{} resp, err := ts.Service.GetInstanceProfile(ctx, req) if err != nil { errors <- err return } results <- resp }() } // Collect all results for i := 0; i < numGoroutines; i++ { select { case err := <-errors: t.Fatalf("Goroutine returned error: %v", err) case resp := <-results: require.NotNil(t, resp) require.Equal(t, "test-1.0.0", resp.Version) require.Equal(t, "dev", resp.Mode) require.Equal(t, "http://localhost:8080", resp.InstanceUrl) require.Equal(t, expectedOwnerName, resp.Owner) } } }) } func TestGetInstanceSetting(t *testing.T) { ctx := context.Background() t.Run("GetInstanceSetting - general setting", func(t *testing.T) { // Create test service for this specific test ts := NewTestService(t) defer ts.Cleanup() // Call GetInstanceSetting for general setting req := &v1pb.GetInstanceSettingRequest{ Name: "instance/settings/GENERAL", } resp, err := ts.Service.GetInstanceSetting(ctx, req) // Verify response require.NoError(t, err) require.NotNil(t, resp) require.Equal(t, "instance/settings/GENERAL", resp.Name) // The general setting should have a general_setting field generalSetting := resp.GetGeneralSetting() require.NotNil(t, generalSetting) // General setting should have default values require.False(t, generalSetting.DisallowUserRegistration) require.False(t, generalSetting.DisallowPasswordAuth) require.Empty(t, generalSetting.AdditionalScript) }) t.Run("GetInstanceSetting - storage setting", func(t *testing.T) { // Create test service for this specific test ts := NewTestService(t) defer ts.Cleanup() // Create a host user for storage setting access hostUser, err := ts.CreateHostUser(ctx, "testhost") require.NoError(t, err) // Add user to context userCtx := ts.CreateUserContext(ctx, hostUser.ID) // Call GetInstanceSetting for storage setting req := &v1pb.GetInstanceSettingRequest{ Name: "instance/settings/STORAGE", } resp, err := ts.Service.GetInstanceSetting(userCtx, req) // Verify response require.NoError(t, err) require.NotNil(t, resp) require.Equal(t, "instance/settings/STORAGE", resp.Name) // The storage setting should have a storage_setting field storageSetting := resp.GetStorageSetting() require.NotNil(t, storageSetting) }) t.Run("GetInstanceSetting - memo related setting", func(t *testing.T) { // Create test service for this specific test ts := NewTestService(t) defer ts.Cleanup() // Call GetInstanceSetting for memo related setting req := &v1pb.GetInstanceSettingRequest{ Name: "instance/settings/MEMO_RELATED", } resp, err := ts.Service.GetInstanceSetting(ctx, req) // Verify response require.NoError(t, err) require.NotNil(t, resp) require.Equal(t, "instance/settings/MEMO_RELATED", resp.Name) // The memo related setting should have a memo_related_setting field memoRelatedSetting := resp.GetMemoRelatedSetting() require.NotNil(t, memoRelatedSetting) }) t.Run("GetInstanceSetting - invalid setting name", func(t *testing.T) { // Create test service for this specific test ts := NewTestService(t) defer ts.Cleanup() // Call GetInstanceSetting with invalid name req := &v1pb.GetInstanceSettingRequest{ Name: "invalid/setting/name", } _, err := ts.Service.GetInstanceSetting(ctx, req) // Should return an error require.Error(t, err) require.Contains(t, err.Error(), "invalid instance setting name") }) }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/router/api/v1/test/test_helper.go
server/router/api/v1/test/test_helper.go
package test import ( "context" "testing" "github.com/usememos/memos/internal/profile" "github.com/usememos/memos/plugin/markdown" "github.com/usememos/memos/server/auth" apiv1 "github.com/usememos/memos/server/router/api/v1" "github.com/usememos/memos/store" teststore "github.com/usememos/memos/store/test" ) // TestService holds the test service setup for API v1 services. type TestService struct { Service *apiv1.APIV1Service Store *store.Store Profile *profile.Profile Secret string } // NewTestService creates a new test service with SQLite database. func NewTestService(t *testing.T) *TestService { ctx := context.Background() // Create a test store with SQLite testStore := teststore.NewTestingStore(ctx, t) // Create a test profile testProfile := &profile.Profile{ Mode: "dev", Version: "test-1.0.0", InstanceURL: "http://localhost:8080", Driver: "sqlite", DSN: ":memory:", } // Create APIV1Service with nil grpcServer since we're testing direct calls secret := "test-secret" markdownService := markdown.NewService( markdown.WithTagExtension(), ) service := &apiv1.APIV1Service{ Secret: secret, Profile: testProfile, Store: testStore, MarkdownService: markdownService, } return &TestService{ Service: service, Store: testStore, Profile: testProfile, Secret: secret, } } // Cleanup clears caches and closes resources after test. func (ts *TestService) Cleanup() { ts.Store.Close() // Note: Owner cache is package-level in parent package, cannot clear from test package } // CreateHostUser creates a host user for testing. func (ts *TestService) CreateHostUser(ctx context.Context, username string) (*store.User, error) { return ts.Store.CreateUser(ctx, &store.User{ Username: username, Role: store.RoleHost, Email: username + "@example.com", }) } // CreateRegularUser creates a regular user for testing. func (ts *TestService) CreateRegularUser(ctx context.Context, username string) (*store.User, error) { return ts.Store.CreateUser(ctx, &store.User{ Username: username, Role: store.RoleUser, Email: username + "@example.com", }) } // CreateUserContext creates a context with the given user's ID for authentication. func (*TestService) CreateUserContext(ctx context.Context, userID int32) context.Context { // Use the context key from the auth package return context.WithValue(ctx, auth.UserIDContextKey, userID) }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/router/api/v1/test/user_service_stats_test.go
server/router/api/v1/test/user_service_stats_test.go
package test import ( "context" "fmt" "testing" "github.com/stretchr/testify/require" v1pb "github.com/usememos/memos/proto/gen/api/v1" storepb "github.com/usememos/memos/proto/gen/store" "github.com/usememos/memos/store" ) func TestGetUserStats_TagCount(t *testing.T) { ctx := context.Background() // Create test service ts := NewTestService(t) defer ts.Cleanup() // Create a test host user user, err := ts.CreateHostUser(ctx, "test_user") require.NoError(t, err) // Create user context for authentication userCtx := ts.CreateUserContext(ctx, user.ID) // Create a memo with a single tag memo, err := ts.Store.CreateMemo(ctx, &store.Memo{ UID: "test-memo-1", CreatorID: user.ID, Content: "This is a test memo with #test tag", Visibility: store.Public, Payload: &storepb.MemoPayload{ Tags: []string{"test"}, }, }) require.NoError(t, err) require.NotNil(t, memo) // Test GetUserStats userName := fmt.Sprintf("users/%d", user.ID) response, err := ts.Service.GetUserStats(userCtx, &v1pb.GetUserStatsRequest{ Name: userName, }) require.NoError(t, err) require.NotNil(t, response) // Check that the tag count is exactly 1, not 2 require.Contains(t, response.TagCount, "test") require.Equal(t, int32(1), response.TagCount["test"], "Tag count should be 1 for a single occurrence") // Create another memo with the same tag memo2, err := ts.Store.CreateMemo(ctx, &store.Memo{ UID: "test-memo-2", CreatorID: user.ID, Content: "Another memo with #test tag", Visibility: store.Public, Payload: &storepb.MemoPayload{ Tags: []string{"test"}, }, }) require.NoError(t, err) require.NotNil(t, memo2) // Test GetUserStats again response2, err := ts.Service.GetUserStats(userCtx, &v1pb.GetUserStatsRequest{ Name: userName, }) require.NoError(t, err) require.NotNil(t, response2) // Check that the tag count is exactly 2, not 3 require.Contains(t, response2.TagCount, "test") require.Equal(t, int32(2), response2.TagCount["test"], "Tag count should be 2 for two occurrences") // Test with a new unique tag memo3, err := ts.Store.CreateMemo(ctx, &store.Memo{ UID: "test-memo-3", CreatorID: user.ID, Content: "Memo with #unique tag", Visibility: store.Public, Payload: &storepb.MemoPayload{ Tags: []string{"unique"}, }, }) require.NoError(t, err) require.NotNil(t, memo3) // Test GetUserStats for the new tag response3, err := ts.Service.GetUserStats(userCtx, &v1pb.GetUserStatsRequest{ Name: userName, }) require.NoError(t, err) require.NotNil(t, response3) // Check that the unique tag count is exactly 1 require.Contains(t, response3.TagCount, "unique") require.Equal(t, int32(1), response3.TagCount["unique"], "New tag count should be 1 for first occurrence") // The original test tag should still be 2 require.Contains(t, response3.TagCount, "test") require.Equal(t, int32(2), response3.TagCount["test"], "Original tag count should remain 2") }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/router/api/v1/test/auth_test.go
server/router/api/v1/test/auth_test.go
package test import ( "context" "testing" "time" "github.com/stretchr/testify/assert" "github.com/stretchr/testify/require" "google.golang.org/protobuf/types/known/timestamppb" "github.com/usememos/memos/internal/util" storepb "github.com/usememos/memos/proto/gen/store" "github.com/usememos/memos/server/auth" "github.com/usememos/memos/store" ) func TestAuthenticatorAccessTokenV2(t *testing.T) { ctx := context.Background() t.Run("authenticates valid access token v2", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create a test user user, err := ts.CreateRegularUser(ctx, "testuser") require.NoError(t, err) // Generate access token v2 token, _, err := auth.GenerateAccessTokenV2( user.ID, user.Username, string(user.Role), string(user.RowStatus), []byte(ts.Secret), ) require.NoError(t, err) // Authenticate authenticator := auth.NewAuthenticator(ts.Store, ts.Secret) claims, err := authenticator.AuthenticateByAccessTokenV2(token) require.NoError(t, err) assert.NotNil(t, claims) assert.Equal(t, user.ID, claims.UserID) assert.Equal(t, user.Username, claims.Username) assert.Equal(t, string(user.Role), claims.Role) assert.Equal(t, string(user.RowStatus), claims.Status) }) t.Run("fails with invalid token", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() authenticator := auth.NewAuthenticator(ts.Store, ts.Secret) _, err := authenticator.AuthenticateByAccessTokenV2("invalid-token") assert.Error(t, err) }) t.Run("fails with wrong secret", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() user, err := ts.CreateRegularUser(ctx, "testuser") require.NoError(t, err) // Generate token with one secret token, _, err := auth.GenerateAccessTokenV2( user.ID, user.Username, string(user.Role), string(user.RowStatus), []byte("secret-1"), ) require.NoError(t, err) // Try to authenticate with different secret authenticator := auth.NewAuthenticator(ts.Store, "secret-2") _, err = authenticator.AuthenticateByAccessTokenV2(token) assert.Error(t, err) }) } func TestAuthenticatorRefreshToken(t *testing.T) { ctx := context.Background() t.Run("authenticates valid refresh token", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create a test user user, err := ts.CreateRegularUser(ctx, "testuser") require.NoError(t, err) // Create refresh token record in store tokenID := util.GenUUID() refreshTokenRecord := &storepb.RefreshTokensUserSetting_RefreshToken{ TokenId: tokenID, ExpiresAt: timestamppb.New(time.Now().Add(auth.RefreshTokenDuration)), CreatedAt: timestamppb.Now(), } err = ts.Store.AddUserRefreshToken(ctx, user.ID, refreshTokenRecord) require.NoError(t, err) // Generate refresh token JWT token, _, err := auth.GenerateRefreshToken(user.ID, tokenID, []byte(ts.Secret)) require.NoError(t, err) // Authenticate authenticator := auth.NewAuthenticator(ts.Store, ts.Secret) authenticatedUser, returnedTokenID, err := authenticator.AuthenticateByRefreshToken(ctx, token) require.NoError(t, err) assert.NotNil(t, authenticatedUser) assert.Equal(t, user.ID, authenticatedUser.ID) assert.Equal(t, tokenID, returnedTokenID) }) t.Run("fails with revoked token", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() user, err := ts.CreateRegularUser(ctx, "testuser") require.NoError(t, err) tokenID := util.GenUUID() // Generate refresh token JWT but don't store it in database (simulates revocation) token, _, err := auth.GenerateRefreshToken(user.ID, tokenID, []byte(ts.Secret)) require.NoError(t, err) // Try to authenticate authenticator := auth.NewAuthenticator(ts.Store, ts.Secret) _, _, err = authenticator.AuthenticateByRefreshToken(ctx, token) assert.Error(t, err) assert.Contains(t, err.Error(), "revoked") }) t.Run("fails with expired token", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() user, err := ts.CreateRegularUser(ctx, "testuser") require.NoError(t, err) // Create expired refresh token record in store tokenID := util.GenUUID() expiredToken := &storepb.RefreshTokensUserSetting_RefreshToken{ TokenId: tokenID, ExpiresAt: timestamppb.New(time.Now().Add(-1 * time.Hour)), // Expired CreatedAt: timestamppb.Now(), } err = ts.Store.AddUserRefreshToken(ctx, user.ID, expiredToken) require.NoError(t, err) // Generate refresh token JWT (JWT itself isn't expired yet) token, _, err := auth.GenerateRefreshToken(user.ID, tokenID, []byte(ts.Secret)) require.NoError(t, err) // Try to authenticate authenticator := auth.NewAuthenticator(ts.Store, ts.Secret) _, _, err = authenticator.AuthenticateByRefreshToken(ctx, token) assert.Error(t, err) assert.Contains(t, err.Error(), "expired") }) t.Run("fails with archived user", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() user, err := ts.CreateRegularUser(ctx, "testuser") require.NoError(t, err) // Create valid refresh token tokenID := util.GenUUID() refreshTokenRecord := &storepb.RefreshTokensUserSetting_RefreshToken{ TokenId: tokenID, ExpiresAt: timestamppb.New(time.Now().Add(auth.RefreshTokenDuration)), CreatedAt: timestamppb.Now(), } err = ts.Store.AddUserRefreshToken(ctx, user.ID, refreshTokenRecord) require.NoError(t, err) token, _, err := auth.GenerateRefreshToken(user.ID, tokenID, []byte(ts.Secret)) require.NoError(t, err) // Archive the user archivedStatus := store.Archived _, err = ts.Store.UpdateUser(ctx, &store.UpdateUser{ ID: user.ID, RowStatus: &archivedStatus, }) require.NoError(t, err) // Try to authenticate authenticator := auth.NewAuthenticator(ts.Store, ts.Secret) _, _, err = authenticator.AuthenticateByRefreshToken(ctx, token) assert.Error(t, err) assert.Contains(t, err.Error(), "archived") }) } func TestAuthenticatorPAT(t *testing.T) { ctx := context.Background() t.Run("authenticates valid PAT", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Create a test user user, err := ts.CreateRegularUser(ctx, "testuser") require.NoError(t, err) // Generate PAT token := auth.GeneratePersonalAccessToken() tokenHash := auth.HashPersonalAccessToken(token) tokenID := util.GenUUID() // Store PAT in database patRecord := &storepb.PersonalAccessTokensUserSetting_PersonalAccessToken{ TokenId: tokenID, TokenHash: tokenHash, Description: "Test PAT", CreatedAt: timestamppb.Now(), } err = ts.Store.AddUserPersonalAccessToken(ctx, user.ID, patRecord) require.NoError(t, err) // Authenticate authenticator := auth.NewAuthenticator(ts.Store, ts.Secret) authenticatedUser, pat, err := authenticator.AuthenticateByPAT(ctx, token) require.NoError(t, err) assert.NotNil(t, authenticatedUser) assert.NotNil(t, pat) assert.Equal(t, user.ID, authenticatedUser.ID) assert.Equal(t, tokenID, pat.TokenId) }) t.Run("fails with invalid PAT format", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() authenticator := auth.NewAuthenticator(ts.Store, ts.Secret) _, _, err := authenticator.AuthenticateByPAT(ctx, "invalid-token-without-prefix") assert.Error(t, err) assert.Contains(t, err.Error(), "invalid PAT format") }) t.Run("fails with non-existent PAT", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() // Generate a PAT but don't store it token := auth.GeneratePersonalAccessToken() authenticator := auth.NewAuthenticator(ts.Store, ts.Secret) _, _, err := authenticator.AuthenticateByPAT(ctx, token) assert.Error(t, err) }) t.Run("fails with expired PAT", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() user, err := ts.CreateRegularUser(ctx, "testuser") require.NoError(t, err) // Generate and store expired PAT token := auth.GeneratePersonalAccessToken() tokenHash := auth.HashPersonalAccessToken(token) tokenID := util.GenUUID() expiredPAT := &storepb.PersonalAccessTokensUserSetting_PersonalAccessToken{ TokenId: tokenID, TokenHash: tokenHash, Description: "Expired PAT", ExpiresAt: timestamppb.New(time.Now().Add(-1 * time.Hour)), // Expired CreatedAt: timestamppb.Now(), } err = ts.Store.AddUserPersonalAccessToken(ctx, user.ID, expiredPAT) require.NoError(t, err) // Try to authenticate authenticator := auth.NewAuthenticator(ts.Store, ts.Secret) _, _, err = authenticator.AuthenticateByPAT(ctx, token) assert.Error(t, err) assert.Contains(t, err.Error(), "expired") }) t.Run("succeeds with non-expiring PAT", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() user, err := ts.CreateRegularUser(ctx, "testuser") require.NoError(t, err) // Generate and store PAT without expiration token := auth.GeneratePersonalAccessToken() tokenHash := auth.HashPersonalAccessToken(token) tokenID := util.GenUUID() patRecord := &storepb.PersonalAccessTokensUserSetting_PersonalAccessToken{ TokenId: tokenID, TokenHash: tokenHash, Description: "Never-expiring PAT", ExpiresAt: nil, // No expiration CreatedAt: timestamppb.Now(), } err = ts.Store.AddUserPersonalAccessToken(ctx, user.ID, patRecord) require.NoError(t, err) // Authenticate authenticator := auth.NewAuthenticator(ts.Store, ts.Secret) authenticatedUser, pat, err := authenticator.AuthenticateByPAT(ctx, token) require.NoError(t, err) assert.NotNil(t, authenticatedUser) assert.NotNil(t, pat) assert.Nil(t, pat.ExpiresAt) }) t.Run("fails with archived user", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() user, err := ts.CreateRegularUser(ctx, "testuser") require.NoError(t, err) // Generate and store PAT token := auth.GeneratePersonalAccessToken() tokenHash := auth.HashPersonalAccessToken(token) tokenID := util.GenUUID() patRecord := &storepb.PersonalAccessTokensUserSetting_PersonalAccessToken{ TokenId: tokenID, TokenHash: tokenHash, Description: "Test PAT", CreatedAt: timestamppb.Now(), } err = ts.Store.AddUserPersonalAccessToken(ctx, user.ID, patRecord) require.NoError(t, err) // Archive the user archivedStatus := store.Archived _, err = ts.Store.UpdateUser(ctx, &store.UpdateUser{ ID: user.ID, RowStatus: &archivedStatus, }) require.NoError(t, err) // Try to authenticate authenticator := auth.NewAuthenticator(ts.Store, ts.Secret) _, _, err = authenticator.AuthenticateByPAT(ctx, token) assert.Error(t, err) assert.Contains(t, err.Error(), "archived") }) } func TestStoreRefreshTokenMethods(t *testing.T) { ctx := context.Background() t.Run("adds and retrieves refresh token", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() user, err := ts.CreateRegularUser(ctx, "testuser") require.NoError(t, err) tokenID := util.GenUUID() token := &storepb.RefreshTokensUserSetting_RefreshToken{ TokenId: tokenID, ExpiresAt: timestamppb.New(time.Now().Add(30 * 24 * time.Hour)), CreatedAt: timestamppb.Now(), } err = ts.Store.AddUserRefreshToken(ctx, user.ID, token) require.NoError(t, err) // Retrieve tokens tokens, err := ts.Store.GetUserRefreshTokens(ctx, user.ID) require.NoError(t, err) assert.Len(t, tokens, 1) assert.Equal(t, tokenID, tokens[0].TokenId) }) t.Run("retrieves specific refresh token by ID", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() user, err := ts.CreateRegularUser(ctx, "testuser") require.NoError(t, err) tokenID := util.GenUUID() token := &storepb.RefreshTokensUserSetting_RefreshToken{ TokenId: tokenID, ExpiresAt: timestamppb.New(time.Now().Add(30 * 24 * time.Hour)), CreatedAt: timestamppb.Now(), } err = ts.Store.AddUserRefreshToken(ctx, user.ID, token) require.NoError(t, err) // Retrieve specific token retrievedToken, err := ts.Store.GetUserRefreshTokenByID(ctx, user.ID, tokenID) require.NoError(t, err) assert.NotNil(t, retrievedToken) assert.Equal(t, tokenID, retrievedToken.TokenId) }) t.Run("removes refresh token", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() user, err := ts.CreateRegularUser(ctx, "testuser") require.NoError(t, err) tokenID := util.GenUUID() token := &storepb.RefreshTokensUserSetting_RefreshToken{ TokenId: tokenID, ExpiresAt: timestamppb.New(time.Now().Add(30 * 24 * time.Hour)), CreatedAt: timestamppb.Now(), } err = ts.Store.AddUserRefreshToken(ctx, user.ID, token) require.NoError(t, err) // Remove token err = ts.Store.RemoveUserRefreshToken(ctx, user.ID, tokenID) require.NoError(t, err) // Verify removal tokens, err := ts.Store.GetUserRefreshTokens(ctx, user.ID) require.NoError(t, err) assert.Len(t, tokens, 0) }) t.Run("handles multiple refresh tokens", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() user, err := ts.CreateRegularUser(ctx, "testuser") require.NoError(t, err) // Add multiple tokens tokenID1 := util.GenUUID() tokenID2 := util.GenUUID() token1 := &storepb.RefreshTokensUserSetting_RefreshToken{ TokenId: tokenID1, ExpiresAt: timestamppb.New(time.Now().Add(30 * 24 * time.Hour)), CreatedAt: timestamppb.Now(), } token2 := &storepb.RefreshTokensUserSetting_RefreshToken{ TokenId: tokenID2, ExpiresAt: timestamppb.New(time.Now().Add(30 * 24 * time.Hour)), CreatedAt: timestamppb.Now(), } err = ts.Store.AddUserRefreshToken(ctx, user.ID, token1) require.NoError(t, err) err = ts.Store.AddUserRefreshToken(ctx, user.ID, token2) require.NoError(t, err) // Retrieve all tokens tokens, err := ts.Store.GetUserRefreshTokens(ctx, user.ID) require.NoError(t, err) assert.Len(t, tokens, 2) // Remove one token err = ts.Store.RemoveUserRefreshToken(ctx, user.ID, tokenID1) require.NoError(t, err) // Verify only one token remains tokens, err = ts.Store.GetUserRefreshTokens(ctx, user.ID) require.NoError(t, err) assert.Len(t, tokens, 1) assert.Equal(t, tokenID2, tokens[0].TokenId) }) } func TestStorePersonalAccessTokenMethods(t *testing.T) { ctx := context.Background() t.Run("adds and retrieves PAT", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() user, err := ts.CreateRegularUser(ctx, "testuser") require.NoError(t, err) token := auth.GeneratePersonalAccessToken() tokenHash := auth.HashPersonalAccessToken(token) tokenID := util.GenUUID() pat := &storepb.PersonalAccessTokensUserSetting_PersonalAccessToken{ TokenId: tokenID, TokenHash: tokenHash, Description: "Test PAT", CreatedAt: timestamppb.Now(), } err = ts.Store.AddUserPersonalAccessToken(ctx, user.ID, pat) require.NoError(t, err) // Retrieve PATs pats, err := ts.Store.GetUserPersonalAccessTokens(ctx, user.ID) require.NoError(t, err) assert.Len(t, pats, 1) assert.Equal(t, tokenID, pats[0].TokenId) assert.Equal(t, tokenHash, pats[0].TokenHash) }) t.Run("removes PAT", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() user, err := ts.CreateRegularUser(ctx, "testuser") require.NoError(t, err) token := auth.GeneratePersonalAccessToken() tokenHash := auth.HashPersonalAccessToken(token) tokenID := util.GenUUID() pat := &storepb.PersonalAccessTokensUserSetting_PersonalAccessToken{ TokenId: tokenID, TokenHash: tokenHash, Description: "Test PAT", CreatedAt: timestamppb.Now(), } err = ts.Store.AddUserPersonalAccessToken(ctx, user.ID, pat) require.NoError(t, err) // Remove PAT err = ts.Store.RemoveUserPersonalAccessToken(ctx, user.ID, tokenID) require.NoError(t, err) // Verify removal pats, err := ts.Store.GetUserPersonalAccessTokens(ctx, user.ID) require.NoError(t, err) assert.Len(t, pats, 0) }) t.Run("updates PAT last used time", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() user, err := ts.CreateRegularUser(ctx, "testuser") require.NoError(t, err) token := auth.GeneratePersonalAccessToken() tokenHash := auth.HashPersonalAccessToken(token) tokenID := util.GenUUID() pat := &storepb.PersonalAccessTokensUserSetting_PersonalAccessToken{ TokenId: tokenID, TokenHash: tokenHash, Description: "Test PAT", CreatedAt: timestamppb.Now(), } err = ts.Store.AddUserPersonalAccessToken(ctx, user.ID, pat) require.NoError(t, err) // Update last used time lastUsed := timestamppb.Now() err = ts.Store.UpdatePATLastUsed(ctx, user.ID, tokenID, lastUsed) require.NoError(t, err) // Verify update pats, err := ts.Store.GetUserPersonalAccessTokens(ctx, user.ID) require.NoError(t, err) assert.Len(t, pats, 1) assert.NotNil(t, pats[0].LastUsedAt) }) t.Run("handles multiple PATs", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() user, err := ts.CreateRegularUser(ctx, "testuser") require.NoError(t, err) // Add multiple PATs token1 := auth.GeneratePersonalAccessToken() tokenHash1 := auth.HashPersonalAccessToken(token1) tokenID1 := util.GenUUID() token2 := auth.GeneratePersonalAccessToken() tokenHash2 := auth.HashPersonalAccessToken(token2) tokenID2 := util.GenUUID() pat1 := &storepb.PersonalAccessTokensUserSetting_PersonalAccessToken{ TokenId: tokenID1, TokenHash: tokenHash1, Description: "PAT 1", CreatedAt: timestamppb.Now(), } pat2 := &storepb.PersonalAccessTokensUserSetting_PersonalAccessToken{ TokenId: tokenID2, TokenHash: tokenHash2, Description: "PAT 2", CreatedAt: timestamppb.Now(), } err = ts.Store.AddUserPersonalAccessToken(ctx, user.ID, pat1) require.NoError(t, err) err = ts.Store.AddUserPersonalAccessToken(ctx, user.ID, pat2) require.NoError(t, err) // Retrieve all PATs pats, err := ts.Store.GetUserPersonalAccessTokens(ctx, user.ID) require.NoError(t, err) assert.Len(t, pats, 2) // Remove one PAT err = ts.Store.RemoveUserPersonalAccessToken(ctx, user.ID, tokenID1) require.NoError(t, err) // Verify only one PAT remains pats, err = ts.Store.GetUserPersonalAccessTokens(ctx, user.ID) require.NoError(t, err) assert.Len(t, pats, 1) assert.Equal(t, tokenID2, pats[0].TokenId) }) t.Run("finds user by PAT hash", func(t *testing.T) { ts := NewTestService(t) defer ts.Cleanup() user, err := ts.CreateRegularUser(ctx, "testuser") require.NoError(t, err) token := auth.GeneratePersonalAccessToken() tokenHash := auth.HashPersonalAccessToken(token) tokenID := util.GenUUID() pat := &storepb.PersonalAccessTokensUserSetting_PersonalAccessToken{ TokenId: tokenID, TokenHash: tokenHash, Description: "Test PAT", CreatedAt: timestamppb.Now(), } err = ts.Store.AddUserPersonalAccessToken(ctx, user.ID, pat) require.NoError(t, err) // Find user by PAT hash result, err := ts.Store.GetUserByPATHash(ctx, tokenHash) require.NoError(t, err) assert.NotNil(t, result) assert.Equal(t, user.ID, result.UserID) assert.NotNil(t, result.User) assert.Equal(t, user.Username, result.User.Username) assert.NotNil(t, result.PAT) assert.Equal(t, tokenID, result.PAT.TokenId) }) }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/router/fileserver/fileserver.go
server/router/fileserver/fileserver.go
package fileserver import ( "bytes" "context" "encoding/base64" "fmt" "io" "net/http" "os" "path/filepath" "regexp" "strings" "time" "github.com/disintegration/imaging" "github.com/labstack/echo/v4" "github.com/pkg/errors" "golang.org/x/sync/semaphore" "github.com/usememos/memos/internal/profile" "github.com/usememos/memos/internal/util" "github.com/usememos/memos/plugin/storage/s3" storepb "github.com/usememos/memos/proto/gen/store" "github.com/usememos/memos/server/auth" "github.com/usememos/memos/store" ) const ( // ThumbnailCacheFolder is the folder name where the thumbnail images are stored. ThumbnailCacheFolder = ".thumbnail_cache" // thumbnailMaxSize is the maximum size in pixels for the largest dimension of the thumbnail image. thumbnailMaxSize = 600 ) var SupportedThumbnailMimeTypes = []string{ "image/png", "image/jpeg", "image/heic", "image/heif", "image/webp", } // FileServerService handles HTTP file serving with proper range request support. // This service bypasses gRPC-Gateway to use native HTTP serving via http.ServeContent(), // which is required for Safari video/audio playback. type FileServerService struct { Profile *profile.Profile Store *store.Store authenticator *auth.Authenticator // thumbnailSemaphore limits concurrent thumbnail generation to prevent memory exhaustion thumbnailSemaphore *semaphore.Weighted } // NewFileServerService creates a new file server service. func NewFileServerService(profile *profile.Profile, store *store.Store, secret string) *FileServerService { return &FileServerService{ Profile: profile, Store: store, authenticator: auth.NewAuthenticator(store, secret), thumbnailSemaphore: semaphore.NewWeighted(3), // Limit to 3 concurrent thumbnail generations } } // RegisterRoutes registers HTTP file serving routes. func (s *FileServerService) RegisterRoutes(echoServer *echo.Echo) { fileGroup := echoServer.Group("/file") // Serve attachment binary files fileGroup.GET("/attachments/:uid/:filename", s.serveAttachmentFile) // Serve user avatar images fileGroup.GET("/users/:identifier/avatar", s.serveUserAvatar) } // serveAttachmentFile serves attachment binary content using native HTTP. // This properly handles range requests required by Safari for video/audio playback. func (s *FileServerService) serveAttachmentFile(c echo.Context) error { ctx := c.Request().Context() uid := c.Param("uid") thumbnail := c.QueryParam("thumbnail") == "true" // Get attachment from database attachment, err := s.Store.GetAttachment(ctx, &store.FindAttachment{ UID: &uid, GetBlob: true, }) if err != nil { return echo.NewHTTPError(http.StatusInternalServerError, "failed to get attachment").SetInternal(err) } if attachment == nil { return echo.NewHTTPError(http.StatusNotFound, "attachment not found") } // Check permissions - verify memo visibility if attachment belongs to a memo if err := s.checkAttachmentPermission(ctx, c, attachment); err != nil { return err } // Get the binary content blob, err := s.getAttachmentBlob(attachment) if err != nil { return echo.NewHTTPError(http.StatusInternalServerError, "failed to get attachment blob").SetInternal(err) } // Handle thumbnail requests for images if thumbnail && s.isImageType(attachment.Type) { thumbnailBlob, err := s.getOrGenerateThumbnail(ctx, attachment) if err != nil { // Log warning but fall back to original image c.Logger().Warnf("failed to get thumbnail: %v", err) } else { blob = thumbnailBlob } } // Determine content type contentType := attachment.Type if strings.HasPrefix(contentType, "text/") { contentType += "; charset=utf-8" } // Prevent XSS attacks by serving potentially unsafe files as octet-stream unsafeTypes := []string{ "text/html", "text/javascript", "application/javascript", "application/x-javascript", "text/xml", "application/xml", "application/xhtml+xml", "image/svg+xml", } for _, unsafeType := range unsafeTypes { if strings.EqualFold(contentType, unsafeType) { contentType = "application/octet-stream" break } } // Set common headers c.Response().Header().Set("Content-Type", contentType) c.Response().Header().Set("Cache-Control", "public, max-age=3600") // Prevent MIME-type sniffing which could lead to XSS c.Response().Header().Set("X-Content-Type-Options", "nosniff") // Defense-in-depth: prevent embedding in frames and restrict content loading c.Response().Header().Set("X-Frame-Options", "DENY") c.Response().Header().Set("Content-Security-Policy", "default-src 'none'; style-src 'unsafe-inline';") // Support HDR/wide color gamut display for capable browsers if strings.HasPrefix(contentType, "image/") || strings.HasPrefix(contentType, "video/") { c.Response().Header().Set("Color-Gamut", "srgb, p3, rec2020") } // Force download for non-media files to prevent XSS execution if !strings.HasPrefix(contentType, "image/") && !strings.HasPrefix(contentType, "video/") && !strings.HasPrefix(contentType, "audio/") && contentType != "application/pdf" { c.Response().Header().Set("Content-Disposition", fmt.Sprintf("attachment; filename=%q", attachment.Filename)) } // For video/audio: Use http.ServeContent for automatic range request support // This is critical for Safari which REQUIRES range request support if strings.HasPrefix(contentType, "video/") || strings.HasPrefix(contentType, "audio/") { // ServeContent automatically handles: // - Range request parsing // - HTTP 206 Partial Content responses // - Content-Range headers // - Accept-Ranges: bytes header modTime := time.Unix(attachment.UpdatedTs, 0) http.ServeContent(c.Response(), c.Request(), attachment.Filename, modTime, bytes.NewReader(blob)) return nil } // For other files: Simple blob response return c.Blob(http.StatusOK, contentType, blob) } // serveUserAvatar serves user avatar images. // Supports both user ID and username as identifier. func (s *FileServerService) serveUserAvatar(c echo.Context) error { ctx := c.Request().Context() identifier := c.Param("identifier") // Try to find user by ID or username user, err := s.getUserByIdentifier(ctx, identifier) if err != nil { return echo.NewHTTPError(http.StatusInternalServerError, "failed to get user").SetInternal(err) } if user == nil { return echo.NewHTTPError(http.StatusNotFound, "user not found") } if user.AvatarURL == "" { return echo.NewHTTPError(http.StatusNotFound, "avatar not found") } // Extract image info from data URI imageType, base64Data, err := s.extractImageInfo(user.AvatarURL) if err != nil { return echo.NewHTTPError(http.StatusInternalServerError, "failed to extract image info").SetInternal(err) } // Validate avatar MIME type to prevent XSS // Supports standard formats and HDR-capable formats allowedAvatarTypes := map[string]bool{ "image/png": true, "image/jpeg": true, "image/jpg": true, "image/gif": true, "image/webp": true, "image/heic": true, "image/heif": true, } if !allowedAvatarTypes[imageType] { return echo.NewHTTPError(http.StatusBadRequest, "invalid avatar image type") } // Decode base64 data imageData, err := base64.StdEncoding.DecodeString(base64Data) if err != nil { return echo.NewHTTPError(http.StatusInternalServerError, "failed to decode image data").SetInternal(err) } // Set cache headers for avatars c.Response().Header().Set("Content-Type", imageType) c.Response().Header().Set("Cache-Control", "public, max-age=3600") c.Response().Header().Set("X-Content-Type-Options", "nosniff") // Defense-in-depth: prevent embedding in frames c.Response().Header().Set("X-Frame-Options", "DENY") c.Response().Header().Set("Content-Security-Policy", "default-src 'none'; style-src 'unsafe-inline';") return c.Blob(http.StatusOK, imageType, imageData) } // getUserByIdentifier finds a user by either ID or username. func (s *FileServerService) getUserByIdentifier(ctx context.Context, identifier string) (*store.User, error) { // Try to parse as ID first if userID, err := util.ConvertStringToInt32(identifier); err == nil { return s.Store.GetUser(ctx, &store.FindUser{ID: &userID}) } // Otherwise, treat as username return s.Store.GetUser(ctx, &store.FindUser{Username: &identifier}) } // extractImageInfo extracts image type and base64 data from a data URI. // Data URI format: data:image/png;base64,iVBORw0KGgo... func (*FileServerService) extractImageInfo(dataURI string) (string, string, error) { dataURIRegex := regexp.MustCompile(`^data:(?P<type>.+);base64,(?P<base64>.+)`) matches := dataURIRegex.FindStringSubmatch(dataURI) if len(matches) != 3 { return "", "", errors.New("invalid data URI format") } imageType := matches[1] base64Data := matches[2] return imageType, base64Data, nil } // checkAttachmentPermission verifies the user has permission to access the attachment. func (s *FileServerService) checkAttachmentPermission(ctx context.Context, c echo.Context, attachment *store.Attachment) error { // If attachment is not linked to a memo, allow access if attachment.MemoID == nil { return nil } // Check memo visibility memo, err := s.Store.GetMemo(ctx, &store.FindMemo{ ID: attachment.MemoID, }) if err != nil { return echo.NewHTTPError(http.StatusInternalServerError, "failed to find memo").SetInternal(err) } if memo == nil { return echo.NewHTTPError(http.StatusNotFound, "memo not found") } // Public memos are accessible to everyone if memo.Visibility == store.Public { return nil } // For non-public memos, check authentication user, err := s.getCurrentUser(ctx, c) if err != nil { return echo.NewHTTPError(http.StatusInternalServerError, "failed to get current user").SetInternal(err) } if user == nil { return echo.NewHTTPError(http.StatusUnauthorized, "unauthorized access") } // Private memos can only be accessed by the creator if memo.Visibility == store.Private && user.ID != attachment.CreatorID { return echo.NewHTTPError(http.StatusForbidden, "forbidden access") } return nil } // getCurrentUser retrieves the current authenticated user from the Echo context. // Authentication priority: Bearer token (Access Token V2 or PAT) > Refresh token cookie. // Uses the shared Authenticator for consistent authentication logic. func (s *FileServerService) getCurrentUser(ctx context.Context, c echo.Context) (*store.User, error) { // Try Bearer token authentication first authHeader := c.Request().Header.Get("Authorization") if authHeader != "" { token := auth.ExtractBearerToken(authHeader) if token != "" { // Try Access Token V2 (stateless) if !strings.HasPrefix(token, auth.PersonalAccessTokenPrefix) { claims, err := s.authenticator.AuthenticateByAccessTokenV2(token) if err == nil && claims != nil { // Get user from claims user, err := s.Store.GetUser(ctx, &store.FindUser{ID: &claims.UserID}) if err == nil && user != nil { return user, nil } } } // Try PAT if strings.HasPrefix(token, auth.PersonalAccessTokenPrefix) { user, _, err := s.authenticator.AuthenticateByPAT(ctx, token) if err == nil && user != nil { return user, nil } } } } // Fallback: Try refresh token cookie authentication // This allows protected attachments to load even when access token has expired, // as long as the user has a valid refresh token cookie. cookieHeader := c.Request().Header.Get("Cookie") if cookieHeader != "" { refreshToken := auth.ExtractRefreshTokenFromCookie(cookieHeader) if refreshToken != "" { user, _, err := s.authenticator.AuthenticateByRefreshToken(ctx, refreshToken) if err == nil && user != nil { return user, nil } } } // No valid authentication found return nil, nil } // isImageType checks if the mime type is an image that supports thumbnails. // Supports standard formats (PNG, JPEG) and HDR-capable formats (HEIC, HEIF, WebP). func (*FileServerService) isImageType(mimeType string) bool { supportedTypes := map[string]bool{ "image/png": true, "image/jpeg": true, "image/heic": true, "image/heif": true, "image/webp": true, } return supportedTypes[mimeType] } // getAttachmentReader returns a reader for the attachment content. func (s *FileServerService) getAttachmentReader(attachment *store.Attachment) (io.ReadCloser, error) { // For local storage, read the file from the local disk. if attachment.StorageType == storepb.AttachmentStorageType_LOCAL { attachmentPath := filepath.FromSlash(attachment.Reference) if !filepath.IsAbs(attachmentPath) { attachmentPath = filepath.Join(s.Profile.Data, attachmentPath) } file, err := os.Open(attachmentPath) if err != nil { if os.IsNotExist(err) { return nil, errors.Wrap(err, "file not found") } return nil, errors.Wrap(err, "failed to open the file") } return file, nil } // For S3 storage, download the file from S3. if attachment.StorageType == storepb.AttachmentStorageType_S3 { if attachment.Payload == nil { return nil, errors.New("attachment payload is missing") } s3Object := attachment.Payload.GetS3Object() if s3Object == nil { return nil, errors.New("S3 object payload is missing") } if s3Object.S3Config == nil { return nil, errors.New("S3 config is missing") } if s3Object.Key == "" { return nil, errors.New("S3 object key is missing") } s3Client, err := s3.NewClient(context.Background(), s3Object.S3Config) if err != nil { return nil, errors.Wrap(err, "failed to create S3 client") } reader, err := s3Client.GetObjectStream(context.Background(), s3Object.Key) if err != nil { return nil, errors.Wrap(err, "failed to get object from S3") } return reader, nil } // For database storage, return the blob from the database. return io.NopCloser(bytes.NewReader(attachment.Blob)), nil } // getAttachmentBlob retrieves the binary content of an attachment from storage. func (s *FileServerService) getAttachmentBlob(attachment *store.Attachment) ([]byte, error) { // For local storage, read the file from the local disk. if attachment.StorageType == storepb.AttachmentStorageType_LOCAL { attachmentPath := filepath.FromSlash(attachment.Reference) if !filepath.IsAbs(attachmentPath) { attachmentPath = filepath.Join(s.Profile.Data, attachmentPath) } file, err := os.Open(attachmentPath) if err != nil { if os.IsNotExist(err) { return nil, errors.Wrap(err, "file not found") } return nil, errors.Wrap(err, "failed to open the file") } defer file.Close() blob, err := io.ReadAll(file) if err != nil { return nil, errors.Wrap(err, "failed to read the file") } return blob, nil } // For S3 storage, download the file from S3. if attachment.StorageType == storepb.AttachmentStorageType_S3 { if attachment.Payload == nil { return nil, errors.New("attachment payload is missing") } s3Object := attachment.Payload.GetS3Object() if s3Object == nil { return nil, errors.New("S3 object payload is missing") } if s3Object.S3Config == nil { return nil, errors.New("S3 config is missing") } if s3Object.Key == "" { return nil, errors.New("S3 object key is missing") } s3Client, err := s3.NewClient(context.Background(), s3Object.S3Config) if err != nil { return nil, errors.Wrap(err, "failed to create S3 client") } blob, err := s3Client.GetObject(context.Background(), s3Object.Key) if err != nil { return nil, errors.Wrap(err, "failed to get object from S3") } return blob, nil } // For database storage, return the blob from the database. return attachment.Blob, nil } // getOrGenerateThumbnail returns the thumbnail image of the attachment. // Uses semaphore to limit concurrent thumbnail generation and prevent memory exhaustion. func (s *FileServerService) getOrGenerateThumbnail(ctx context.Context, attachment *store.Attachment) ([]byte, error) { thumbnailCacheFolder := filepath.Join(s.Profile.Data, ThumbnailCacheFolder) if err := os.MkdirAll(thumbnailCacheFolder, os.ModePerm); err != nil { return nil, errors.Wrap(err, "failed to create thumbnail cache folder") } filePath := filepath.Join(thumbnailCacheFolder, fmt.Sprintf("%d%s", attachment.ID, filepath.Ext(attachment.Filename))) // Check if thumbnail already exists if _, err := os.Stat(filePath); err == nil { // Thumbnail exists, read and return it thumbnailFile, err := os.Open(filePath) if err != nil { return nil, errors.Wrap(err, "failed to open thumbnail file") } defer thumbnailFile.Close() blob, err := io.ReadAll(thumbnailFile) if err != nil { return nil, errors.Wrap(err, "failed to read thumbnail file") } return blob, nil } else if !os.IsNotExist(err) { return nil, errors.Wrap(err, "failed to check thumbnail image stat") } // Thumbnail doesn't exist, acquire semaphore to limit concurrent generation if err := s.thumbnailSemaphore.Acquire(ctx, 1); err != nil { return nil, errors.Wrap(err, "failed to acquire thumbnail generation semaphore") } defer s.thumbnailSemaphore.Release(1) // Double-check if thumbnail was created while waiting for semaphore if _, err := os.Stat(filePath); err == nil { thumbnailFile, err := os.Open(filePath) if err != nil { return nil, errors.Wrap(err, "failed to open thumbnail file") } defer thumbnailFile.Close() blob, err := io.ReadAll(thumbnailFile) if err != nil { return nil, errors.Wrap(err, "failed to read thumbnail file") } return blob, nil } // Generate the thumbnail reader, err := s.getAttachmentReader(attachment) if err != nil { return nil, errors.Wrap(err, "failed to get attachment reader") } defer reader.Close() // Decode image - this is memory intensive img, err := imaging.Decode(reader, imaging.AutoOrientation(true)) if err != nil { return nil, errors.Wrap(err, "failed to decode thumbnail image") } // The largest dimension is set to thumbnailMaxSize and the smaller dimension is scaled proportionally. // Small images are not enlarged. width := img.Bounds().Dx() height := img.Bounds().Dy() var thumbnailWidth, thumbnailHeight int // Only resize if the image is larger than thumbnailMaxSize if max(width, height) > thumbnailMaxSize { if width >= height { // Landscape or square - constrain width, maintain aspect ratio for height thumbnailWidth = thumbnailMaxSize thumbnailHeight = 0 } else { // Portrait - constrain height, maintain aspect ratio for width thumbnailWidth = 0 thumbnailHeight = thumbnailMaxSize } } else { // Keep original dimensions for small images thumbnailWidth = width thumbnailHeight = height } // Resize the image to the calculated dimensions. thumbnailImage := imaging.Resize(img, thumbnailWidth, thumbnailHeight, imaging.Lanczos) // Save thumbnail to disk if err := imaging.Save(thumbnailImage, filePath); err != nil { return nil, errors.Wrap(err, "failed to save thumbnail file") } // Read the saved thumbnail and return it thumbnailFile, err := os.Open(filePath) if err != nil { return nil, errors.Wrap(err, "failed to open thumbnail file") } defer thumbnailFile.Close() thumbnailBlob, err := io.ReadAll(thumbnailFile) if err != nil { return nil, errors.Wrap(err, "failed to read thumbnail file") } return thumbnailBlob, nil }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
usememos/memos
https://github.com/usememos/memos/blob/e75862de31b65f90007d771fd623e1d23261b2c6/server/router/frontend/frontend.go
server/router/frontend/frontend.go
package frontend import ( "context" "embed" "io/fs" "net/http" "github.com/labstack/echo/v4" "github.com/labstack/echo/v4/middleware" "github.com/usememos/memos/internal/profile" "github.com/usememos/memos/internal/util" "github.com/usememos/memos/store" ) //go:embed dist/* var embeddedFiles embed.FS type FrontendService struct { Profile *profile.Profile Store *store.Store } func NewFrontendService(profile *profile.Profile, store *store.Store) *FrontendService { return &FrontendService{ Profile: profile, Store: store, } } func (*FrontendService) Serve(_ context.Context, e *echo.Echo) { skipper := func(c echo.Context) bool { // Skip API routes. if util.HasPrefixes(c.Path(), "/api", "/memos.api.v1") { return true } // For index.html and root path, set no-cache headers to prevent browser caching // This prevents sensitive data from being accessible via browser back button after logout if c.Path() == "/" || c.Path() == "/index.html" { c.Response().Header().Set(echo.HeaderCacheControl, "no-cache, no-store, must-revalidate") c.Response().Header().Set("Pragma", "no-cache") c.Response().Header().Set("Expires", "0") return false } // Set Cache-Control header for static assets. // Since Vite generates content-hashed filenames (e.g., index-BtVjejZf.js), // we can cache aggressively but use immutable to prevent revalidation checks. // For frequently redeployed instances, use shorter max-age (1 hour) to avoid // serving stale assets after redeployment. c.Response().Header().Set(echo.HeaderCacheControl, "public, max-age=3600, immutable") // 1 hour return false } // Route to serve the main app with HTML5 fallback for SPA behavior. e.Use(middleware.StaticWithConfig(middleware.StaticConfig{ Filesystem: getFileSystem("dist"), HTML5: true, // Enable fallback to index.html Skipper: skipper, })) } func getFileSystem(path string) http.FileSystem { fs, err := fs.Sub(embeddedFiles, path) if err != nil { panic(err) } return http.FS(fs) }
go
MIT
e75862de31b65f90007d771fd623e1d23261b2c6
2026-01-07T08:35:43.552360Z
false
coreybutler/nvm-windows
https://github.com/coreybutler/nvm-windows/blob/883c0dea378ba991c7dc38ea5a39e6d5fc56453f/src/nvm.go
src/nvm.go
package main import ( "bytes" "encoding/json" "errors" "fmt" "io/ioutil" "net/url" "os" "os/exec" "os/signal" "os/user" "path/filepath" "regexp" "strconv" "strings" "sync" "syscall" "time" "unsafe" "nvm/arch" "nvm/author" "nvm/encoding" "nvm/file" "nvm/node" "nvm/upgrade" "nvm/utility" "nvm/web" "github.com/blang/semver" // "github.com/fatih/color" "github.com/coreybutler/go-where" "github.com/ncruces/zenity" "github.com/olekukonko/tablewriter" "golang.org/x/sys/windows" "golang.org/x/sys/windows/registry" ) // Replaced at build time var NvmVersion = "" type Environment struct { settings string root string symlink string arch string node_mirror string npm_mirror string proxy string originalpath string originalversion string verifyssl bool } var home = filepath.Clean(os.Getenv("NVM_HOME") + "\\settings.txt") var symlink = filepath.Clean(os.Getenv("NVM_SYMLINK")) var env = &Environment{ settings: home, root: "", symlink: symlink, arch: strings.ToLower(os.Getenv("PROCESSOR_ARCHITECTURE")), node_mirror: "", npm_mirror: "", proxy: "none", originalpath: "", originalversion: "", verifyssl: true, } func writeToErrorLog(i interface{}, abort ...bool) { exe, _ := os.Executable() file, err := os.OpenFile(filepath.Join(filepath.Dir(exe), "error.log"), os.O_APPEND|os.O_CREATE|os.O_WRONLY, os.ModePerm) if err != nil { panic(err) } defer file.Close() msg := fmt.Sprintf("%v\n", i) if _, ferr := file.WriteString(msg); ferr != nil { panic(ferr) } if len(abort) > 0 && abort[0] { fmt.Println(msg) os.Exit(1) } } type Notification struct { AppID string `json:"app_id"` Title string `json:"title"` Message string `json:"message"` Icon string `json:"icon"` Actions []Action `json:"actions"` Duration string `json:"duration"` Link string `json:"link"` } type Action struct { Type string `json:"type"` Label string `json:"label"` URI string `json:"uri"` } func notify(data Notification) { data.AppID = "NVM for Windows" content, _ := json.Marshal(data) go author.Bridge("notify", string(content)) } func init() { if len(os.Args) > 1 { if strings.HasPrefix(os.Args[1], "nvm://") { // Decode the URL uri, _ := url.Parse(strings.ReplaceAll(os.Args[1], "%26", "&")) action := strings.TrimSpace(uri.Query().Get("action")) switch strings.ToLower(action) { case "install": version := strings.Replace(uri.Query().Get("version"), "v", "", 1) os.Args[1] = "install" if len(os.Args) < 3 { os.Args = append(os.Args, "") } os.Args[2] = version if len(os.Args) < 4 { os.Args = append(os.Args, "") } os.Args[3] = "--show-progress-ui" os.Args = append(os.Args, "--insecure") case "use": version := strings.Replace(uri.Query().Get("version"), "v", "", 1) os.Args[1] = "use" if len(os.Args) < 3 { os.Args = append(os.Args, "") } os.Args[2] = version if len(os.Args) < 4 { os.Args = append(os.Args, "") } os.Args[3] = "--notify" case "upgrade": os.Args[1] = "upgrade" if len(os.Args) < 3 { os.Args = append(os.Args, "") } os.Args[2] = "--show-progress-ui" case "upgrade_notify": notify(Notification{ Title: "Upgrade Complete", Message: fmt.Sprintf("Now running v%v.", NvmVersion), Icon: "success", Actions: []Action{ {Type: "protocol", Label: "Release Notes", URI: fmt.Sprintf("https://github.com/coreybutler/nvm-windows/releases/tag/%v", NvmVersion)}, }, }) time.Sleep(300 * time.Millisecond) os.Exit(0) default: writeToErrorLog(fmt.Sprintf("%s command not recognized", action), true) } } } // Turn on debugging output for _, arg := range os.Args[1:] { if strings.ToLower(strings.ReplaceAll(arg, "-", "")) == "verbose" { utility.EnableDebugLogs() break } } } func main() { utility.DebugLogf("command: %v", strings.Join(os.Args, " ")) args := os.Args detail := "" procarch := arch.Validate(env.arch) // Capture any additional arguments if len(args) > 2 { detail = args[2] } if len(args) > 3 { if args[3] == "32" || args[3] == "arm64" || args[3] == "64" { procarch = args[3] } } if len(args) < 2 { help() return } utility.DebugLogf("arch: %v", procarch) if args[1] != "version" && args[1] != "--version" && args[1] != "v" && args[1] != "-v" && args[1] != "--v" { setup() } // Run the appropriate method switch args[1] { case "i": fallthrough case "install": install(detail, procarch) case "rm": fallthrough case "uninstall": uninstall(detail) case "reinstall": reinstall(detail, procarch) case "u": fallthrough case "use": use(detail, procarch) case "ls": fallthrough case "list": list(detail) case "on": enable() case "off": disable() case "root": if len(args) == 3 { updateRootDir(args[2]) } else { fmt.Println("\nCurrent Root: " + env.root) } case "v": fallthrough case "--version": fallthrough case "-version": fallthrough case "--v": fallthrough case "-v": fallthrough case "version": fmt.Println(NvmVersion) case "arch": if strings.Trim(detail, " \r\n") != "" { detail = strings.Trim(detail, " \r\n") if detail != "32" && detail != "64" && detail != "arm64" { fmt.Println("\"" + detail + "\" is an invalid architecture. Use 32, 64, or arm64.") return } env.arch = detail saveSettings() fmt.Println("Default architecture set to " + detail + "-bit.") return } _, a := node.GetCurrentVersion() fmt.Println("System Default: " + env.arch + "-bit.") fmt.Println("Currently Configured: " + a + "-bit.") case "proxy": if detail == "" { fmt.Println("Current proxy: " + env.proxy) } else { env.proxy = detail saveSettings() } case "current": inuse, _ := node.GetCurrentVersion() v, _ := semver.Make(inuse) err := v.Validate() if err != nil { fmt.Println(inuse) } else if inuse == "Unknown" { fmt.Println("No current version. Run 'nvm use x.x.x' to set a version.") } else { fmt.Println("v" + inuse) } //case "update": update() case "node_mirror": setNodeMirror(detail) case "npm_mirror": setNpmMirror(detail) case "debug": checkLocalEnvironment() case "subscribe": fallthrough case "unsubscribe": author.Bridge(args[1:]...) case "author": author.Bridge(args[2:]...) case "upgrade": upgrade.Run(NvmVersion) default: fmt.Printf(`"%s" is not a valid command.`+"\n", args[1]) help() } } // =============================================================== // BEGIN | CLI functions // =============================================================== func setNodeMirror(uri string) { env.node_mirror = uri saveSettings() } func setNpmMirror(uri string) { env.npm_mirror = uri saveSettings() } func getVersion(version string, cpuarch string, localInstallsOnly ...bool) (string, string, error) { requestedVersion := version cpuarch = strings.ToLower(cpuarch) if cpuarch != "" { if cpuarch != "32" && cpuarch != "64" && cpuarch != "arm64" && cpuarch != "all" { return version, cpuarch, errors.New("\"" + cpuarch + "\" is not a valid CPU architecture. Must be 32, 64, or arm64.") } } else { cpuarch = env.arch } if cpuarch != "all" { cpuarch = arch.Validate(cpuarch) } if version == "" { return "", cpuarch, errors.New("A version argument is required but missing.") } // If user specifies "latest" version, find out what version is if version == "latest" || version == "node" { version = getLatest() fmt.Println(version) } if version == "lts" { version = getLTS() } if version == "newest" { installed := node.GetInstalled(env.root) if len(installed) == 0 { return version, "", errors.New("No versions of node.js found. Try installing the latest by typing nvm install latest.") } version = installed[0] } if version == "32" || version == "64" || version == "arm64" { cpuarch = version v, _ := node.GetCurrentVersion() version = v } version = versionNumberFrom(version) v, err := semver.Make(version) if err == nil { err = v.Validate() } if err == nil { // if the user specifies only the major/minor version, identify the latest // version applicable to what was provided. sv := strings.Split(version, ".") if len(sv) < 3 { version = findLatestSubVersion(version) } else { version = cleanVersion(version) } version = versionNumberFrom(version) } else if strings.Contains(err.Error(), "No Major.Minor.Patch") { latestLocalInstall := false if len(localInstallsOnly) > 0 { latestLocalInstall = localInstallsOnly[0] } version = findLatestSubVersion(version, latestLocalInstall) if len(version) == 0 { err = errors.New("Unrecognized version: \"" + requestedVersion + "\"") } } return version, cpuarch, err } type Status struct { Text string Err error Done bool Help bool } func rollback(version string) error { p := filepath.Join(env.root, "v"+version) _, err := os.Lstat(p) if err != nil { if !os.IsNotExist(err) { writeToErrorLog(err) return fmt.Errorf("Error rolling back node v%s installation: %v.", version, err) } } return nil } func install(version string, cpuarch string) { requestedVersion := version args := os.Args lastarg := args[len(args)-1] if lastarg == "--insecure" { env.verifyssl = false } if strings.HasPrefix(version, "--") { fmt.Println("\"--\" prefixes are unnecessary in NVM for Windows!") version = strings.ReplaceAll(version, "-", "") fmt.Printf("attempting to install \"%v\" instead...\n\n", version) time.Sleep(2 * time.Second) } var exitCode = 0 var status = make(chan Status) var cancel = make(chan bool) var show_progress bool = false var dlg zenity.ProgressDialog wg := &sync.WaitGroup{} wg.Add(1) go func() { defer func() { // Reset the SSL verification env.verifyssl = true // sleep for 1 second to give users a chance to see the completion notice before exiting if show_progress { time.Sleep(1 * time.Second) fmt.Println("exiting installer dialog") } wg.Done() }() for { select { case s := <-status: if s.Err != nil { exitCode = 1 if show_progress && dlg != nil { // Close progress dialog and send error notificaion notify(Notification{ Title: "Node.js Installation Error", Message: s.Err.Error(), Icon: "error", }) dlg.Text(fmt.Sprintf("error: %v", s.Err)) dlg.Close() // Cleanup err := rollback(version) if err != nil { notify(Notification{ Title: "Rollback Error", Message: err.Error(), Icon: "error", Actions: []Action{ {Type: "protocol", Label: "Open Explorer", URI: fmt.Sprintf("file://%s", filepath.ToSlash(filepath.Join(env.root)))}, }, }) } } else { fmt.Printf("error installing %s: %v\n", version, s.Err) if s.Help { fmt.Println(" ") help() } } return } if s.Done { if show_progress && dlg != nil { notify(Notification{ Title: fmt.Sprintf("Node.js v%s", version), Message: "Installation complete.", Icon: "node", Actions: []Action{ {Type: "protocol", Label: "Use", URI: fmt.Sprintf("nvm://launch?action=use%%26version=%s", version)}, {Type: "protocol", Label: "Changelog", URI: fmt.Sprintf("https://github.com/nodejs/node/releases/tag/v%s", version)}, }, }) dlg.Text("Installation complete.") time.Sleep(1 * time.Second) } else { fmt.Printf("Installation complete.\nIf you want to use this version, type:\n\nnvm use %s\n", version) } return } if show_progress && dlg != nil { dlg.Text(s.Text) } else { fmt.Println(s.Text) } case <-cancel: fmt.Printf("Node.js %s installation canceled by user\n", version) if show_progress { notify(Notification{ Title: fmt.Sprintf("Node.js v%s", version), Message: "Installation canceled by user", Icon: "error", Actions: []Action{ {Type: "protocol", Label: "Restart Installation", URI: fmt.Sprintf("nvm://launch?action=install%%26version=%s%%26use=false%%26=show=true", version)}, }, }) } err := rollback(version) if err != nil { if show_progress { notify(Notification{ Title: "Rollback Error", Message: err.Error(), Icon: "error", Actions: []Action{ {Type: "protocol", Label: "Open Explorer", URI: fmt.Sprintf("file://%s", filepath.ToSlash(filepath.Join(env.root)))}, }, }) } else { fmt.Printf("rollback error: %v\n", err) } } else { fmt.Println("Rollback complete.") } if cpuarch == "arm64" && !web.IsNodeArm64bitAvailable(version) { status <- Status{Err: fmt.Errorf("Node.js v%s is only available in 32-bit and 64-bit.", version)} } if !node.IsVersionInstalled(env.root, version, cpuarch) { if !node.IsVersionAvailable(version) { url := web.GetFullNodeUrl("index.json") status <- Status{Err: fmt.Errorf("Version %s is not available.\n\nThe complete list of available versions can be found at %s", version, url)} } } return } } }() // Wait for the prior subroutine to initialize before starting the next dependent thread time.Sleep(300 * time.Millisecond) go func() { v, a, err := getVersion(version, cpuarch) version = v cpuarch = a // Setup signal handling first signalChan := make(chan os.Signal, 1) signal.Notify(signalChan, os.Interrupt, syscall.SIGTERM) defer signal.Stop(signalChan) // Add signal handler go func() { <-signalChan cancel <- true }() // Determine whether to show the progress dialog for _, arg := range os.Args { if arg == "--show-progress-ui" { show_progress = true exe, _ := os.Executable() winIco := filepath.Join(filepath.Dir(exe), "nvm.ico") ico := filepath.Join(filepath.Dir(exe), "nodejs.ico") var perr error dlg, perr = zenity.Progress( zenity.Title(fmt.Sprintf("Installing Node.js v%s", version)), zenity.Icon(ico), zenity.WindowIcon(winIco), zenity.AutoClose(), zenity.NoCancel(), zenity.Pulsate()) if perr != nil { fmt.Println("Failed to create progress dialog") } go func() { for { select { case <-dlg.Done(): if err := dlg.Complete(); err == zenity.ErrCanceled { cancel <- true } return } } }() status <- Status{Text: "Validating version..."} break } } if err != nil { if strings.Contains(err.Error(), "No Major.Minor.Patch") { sv, sverr := semver.Make(version) if sverr == nil { sverr = sv.Validate() } if sverr != nil { version = findLatestSubVersion(version) if len(version) == 0 { sverr = errors.New("Unrecognized version: \"" + requestedVersion + "\"") } } err = sverr } if err != nil { status <- Status{Err: err, Help: true} return } } if err != nil { status <- Status{Err: fmt.Errorf(`"%s" is not a valid version.`+"\n"+`Please use a valid semantic version number, "lts", or "latest".`, requestedVersion)} return } if checkVersionExceedsLatest(version) { status <- Status{Err: fmt.Errorf("Node.js v%s is not yet released or is not available for download yet.", version)} return } if cpuarch == "64" && !web.IsNode64bitAvailable(version) { status <- Status{Err: fmt.Errorf("Node.js v%s is only available in 32-bit.", version)} return } // Check to see if the version is already installed if !node.IsVersionInstalled(env.root, version, cpuarch) { if !node.IsVersionAvailable(version) { url := web.GetFullNodeUrl("index.json") status <- Status{Err: fmt.Errorf("Version %s is not available.\n\nThe complete list of available versions can be found at %s", version, url)} return } // Make the output directories root, err := os.MkdirTemp("", "nvm-install-*") if err != nil { status <- Status{Err: err} } defer os.RemoveAll(root) os.MkdirAll(filepath.Join(root, "v"+version, "node_modules"), os.ModeDir) // os.MkdirAll(filepath.Join(env.root, "v"+version, "node_modules"), os.ModeDir) // Warn the user if they're attempting to install without verifying the remote SSL cert if !env.verifyssl { fmt.Println("\nWARNING: The remote SSL certificate will not be validated during the download process.\n") } // Download node if show_progress { status <- Status{Text: "Downloading & extracting..."} } append32 := node.IsVersionInstalled(env.root, version, "64") append64 := node.IsVersionInstalled(env.root, version, "32") if (cpuarch == "32" || cpuarch == "all") && !node.IsVersionInstalled(root, version, "32") { success := web.GetNodeJS(root, version, "32", append32) if !success { status <- Status{Err: fmt.Errorf("failed to download v%v 32-bit executable", version)} return } } if (cpuarch == "64" || cpuarch == "all") && !node.IsVersionInstalled(root, version, "64") { success := web.GetNodeJS(root, version, "64", append64) if !success { status <- Status{Err: fmt.Errorf("failed to download v%v 64-bit executable", version)} return } } if (cpuarch == "arm64" || cpuarch == "all") && !node.IsVersionInstalled(root, version, "arm64") { success := web.GetNodeJS(root, version, "arm64", append64) if !success { status <- Status{Err: fmt.Errorf("failed to download v%v arm 64-bit executable", version)} return } } if file.Exists(filepath.Join(root, "v"+version, "node_modules", "npm")) { utility.DebugLogf("move %v to %v", filepath.Join(root, "v"+version), filepath.Join(env.root, "v"+version)) if rnerr := utility.Rename(filepath.Join(root, "v"+version), filepath.Join(env.root, "v"+version)); rnerr != nil { status <- Status{Err: err} } utility.DebugFn(func() { utility.DebugLogf("env root: %v", env.root) cmd := exec.Command("cmd", "/C", "dir", filepath.Join(env.root, "v"+version)) out, err := cmd.CombinedOutput() if err != nil { utility.DebugLog(err.Error()) } else { utility.DebugLog(string(out)) } }) if show_progress { status <- Status{Text: "Configuring npm..."} time.Sleep(1 * time.Second) status <- Status{Done: true} } else { npmv := getNpmVersion(version) status <- Status{Text: fmt.Sprintf("npm v%s installed successfully.\n\nIf you want to use this version, type\n\nnvm use %s", npmv, version), Done: true} } } // If successful, add npm status <- Status{Text: "Downloading npm..."} npmv := getNpmVersion(version) success := web.GetNpm(root, getNpmVersion(version)) if success { status <- Status{Text: fmt.Sprintf("Installing npm v%s...", npmv)} // new temp directory under the nvm root tempDir, err := os.MkdirTemp("", "nvm-npm-*") if err != nil { status <- Status{Err: err} } defer os.RemoveAll(tempDir) // Extract npm to the temp directory err = file.Unzip(filepath.Join(tempDir, "npm-v"+npmv+".zip"), filepath.Join(tempDir, "nvm-npm")) if err != nil { status <- Status{Err: err} } // Copy the npm and npm.cmd files to the installation directory tempNpmBin := filepath.Join(tempDir, "nvm-npm", "cli-"+npmv, "bin") // Support npm < 6.2.0 if file.Exists(tempNpmBin) == false { tempNpmBin = filepath.Join(tempDir, "nvm-npm", "npm-"+npmv, "bin") } if file.Exists(tempNpmBin) == false { status <- Status{Err: fmt.Errorf("Failed to extract npm. Could not find %s", tempNpmBin), Done: true} return } // Standard npm support utility.Rename(filepath.Join(tempNpmBin, "npm"), filepath.Join(root, "v"+version, "npm")) utility.Rename(filepath.Join(tempNpmBin, "npm.cmd"), filepath.Join(root, "v"+version, "npm.cmd")) // npx support if _, err := os.Stat(filepath.Join(tempNpmBin, "npx")); err == nil { utility.Rename(filepath.Join(tempNpmBin, "npx"), filepath.Join(root, "v"+version, "npx")) utility.Rename(filepath.Join(tempNpmBin, "npx.cmd"), filepath.Join(root, "v"+version, "npx.cmd")) } npmSourcePath := filepath.Join(tempDir, "nvm-npm", "npm-"+npmv) if file.Exists(npmSourcePath) == false { npmSourcePath = filepath.Join(tempDir, "nvm-npm", "cli-"+npmv) } moveNpmErr := utility.Rename(npmSourcePath, filepath.Join(root, "v"+version, "node_modules", "npm")) if moveNpmErr != nil { // sometimes Windows can take some time to enable access to large amounts of files after unzip, use exponential backoff to wait until it is ready for _, i := range [5]int{1, 2, 4, 8, 16} { time.Sleep(time.Duration(i) * time.Second) moveNpmErr = utility.Rename(npmSourcePath, filepath.Join(root, "v"+version, "node_modules", "npm")) if moveNpmErr == nil { break } } } if err == nil && moveNpmErr == nil { err = utility.Rename(filepath.Join(root, "v"+version), filepath.Join(env.root, "v"+version)) if err != nil { status <- Status{Err: err} } if show_progress { status <- Status{Done: true} } else { status <- Status{Text: fmt.Sprintf("Installation complete. If you want to use this version, type\n\nnvm use %s", version), Done: true} } } else if moveNpmErr != nil { status <- Status{Err: fmt.Errorf("Unable to move directory %s to node_modules: %v", npmSourcePath, moveNpmErr), Done: true} } else { status <- Status{Err: fmt.Errorf("Failed to extract npm: %v", err), Done: true} } } else { err = utility.Rename(filepath.Join(root, "v"+version), filepath.Join(env.root, "v"+version)) if err != nil { status <- Status{Err: err} } npmurl := web.GetFullNpmUrl(version) if show_progress { // Send special error notification with link to npm release when it cannot be downloaded notify(Notification{ Title: "Download Failure (npm)", Message: fmt.Sprintf("Please download npm v%s manually and extract to %s\\v%s", version, env.root, version), Icon: "error", Actions: []Action{ {Type: "protocol", Label: "Manually Download", URI: npmurl}, }, }) status <- Status{Done: true} } else { status <- Status{Err: fmt.Errorf("Could not download npm for node v%s.\nPlease visit %s to download npm.\nIt should be extracted to %s\\v%s", version, npmurl, env.root, version), Done: true} } } } else { status <- Status{Text: "Version " + version + " is already installed.", Done: true} } }() // Wait for the process to complete before exiting wg.Wait() os.Exit(exitCode) } func reinstall(version, cpuarch string) { // Make sure a version is specified if len(version) == 0 { fmt.Println("Provide the version you want to uninstall.") help() return } if strings.ToLower(version) == "latest" || strings.ToLower(version) == "node" { version = getLatest() } else if strings.ToLower(version) == "lts" { version = getLTS() } else if strings.ToLower(version) == "newest" { installed := node.GetInstalled(env.root) if len(installed) == 0 { fmt.Println("No versions of node.js found. Try installing the latest by typing nvm install latest.") return } version = installed[0] } version = cleanVersion(version) // Determine if the version exists and skip if it doesn't if node.IsVersionInstalled(env.root, version, "32") || node.IsVersionInstalled(env.root, version, "64") { v, _ := node.GetCurrentVersion() fmt.Printf("Removing v%v...\n", version) if v == version { // _, err := runElevated(fmt.Sprintf(`"%s" cmd /C rmdir "%s"`, filepath.Join(env.root, "elevate.cmd"), filepath.Clean(env.symlink))) abortOnBadSymlink(env.symlink) _, err := elevatedRun("rmdir", filepath.Clean(env.symlink)) if err != nil { fmt.Println(fmt.Sprint(err)) return } } e := os.RemoveAll(filepath.Join(env.root, "v"+version)) if e != nil { fmt.Printf("error: failed to remove v%v: %v\n", version, e) os.Exit(1) } } else { fmt.Printf("node v%v is not installed. Type \"nvm list\" to see what is installed.\n", version) } install(version, cpuarch) } func uninstall(version string) { // Make sure a version is specified if len(version) == 0 { fmt.Println("Provide the version you want to uninstall.") help() return } if strings.ToLower(version) == "latest" || strings.ToLower(version) == "node" { version = getLatest() } else if strings.ToLower(version) == "lts" { version = getLTS() } else if strings.ToLower(version) == "newest" { installed := node.GetInstalled(env.root) if len(installed) == 0 { fmt.Println("No versions of node.js found. Try installing the latest by typing nvm install latest.") return } version = installed[0] } version = cleanVersion(version) // Determine if the version exists and skip if it doesn't if node.IsVersionInstalled(env.root, version, "32") || node.IsVersionInstalled(env.root, version, "64") || node.IsVersionInstalled(env.root, version, "arm64") { fmt.Printf("Uninstalling node v" + version + "...") v, _ := node.GetCurrentVersion() if v == version { // _, err := runElevated(fmt.Sprintf(`"%s" cmd /C rmdir "%s"`, filepath.Join(env.root, "elevate.cmd"), filepath.Clean(env.symlink))) abortOnBadSymlink(env.symlink) _, err := elevatedRun("rmdir", filepath.Clean(env.symlink)) if err != nil { fmt.Println(fmt.Sprint(err)) return } } e := os.RemoveAll(filepath.Join(env.root, "v"+version)) if e != nil { fmt.Println("Error removing node v" + version) fmt.Println("Manually remove " + filepath.Join(env.root, "v"+version) + ".") } else { fmt.Printf(" done") } } else { fmt.Println("node v" + version + " is not installed. Type \"nvm list\" to see what is installed.") } return } func versionNumberFrom(version string) string { reg, _ := regexp.Compile("[^0-9]") if reg.MatchString(version[:1]) { if version[0:1] != "v" { url := web.GetFullNodeUrl("latest-" + version + "/SHASUMS256.txt") remoteContent, err := web.GetRemoteTextFile(url) if err != nil { fmt.Println(err) os.Exit(1) } content := strings.Split(remoteContent, "\n")[0] if strings.Contains(content, "node") { parts := strings.Split(content, "-") if len(parts) > 1 { if parts[1][0:1] == "v" { return parts[1][1:] } } } fmt.Printf("\"%v\" is not a valid version or known alias.\n", version) fmt.Println("\nAvailable aliases: latest, node (latest), lts\nNamed releases (boron, dubnium, etc) are also supported.") os.Exit(0) } } for reg.MatchString(version[:1]) { version = version[1:] } return version } func splitVersion(version string) map[string]int { parts := strings.Split(version, ".") var result = make([]int, 3) for i, item := range parts { v, _ := strconv.Atoi(item) result[i] = v } return map[string]int{ "major": result[0], "minor": result[1], "patch": result[2], } } func findLatestSubVersion(version string, localOnly ...bool) string { if len(localOnly) > 0 && localOnly[0] { installed := node.GetInstalled(env.root) result := "" for _, v := range installed { if strings.HasPrefix(v, "v"+version) { if result != "" { current, _ := semver.New(versionNumberFrom(result)) next, _ := semver.New(versionNumberFrom(v)) if current.LT(*next) { result = v } } else { result = v } } } if len(strings.TrimSpace(result)) > 0 { return versionNumberFrom(result) } } if len(strings.Split(version, ".")) == 2 { all, _, _, _, _, _ := node.GetAvailable() requested := splitVersion(version + ".0") for _, v := range all { available := splitVersion(v) if requested["major"] == available["major"] { if requested["minor"] == available["minor"] { if available["patch"] > requested["patch"] { requested["patch"] = available["patch"] } } if requested["minor"] > available["minor"] { break } } if requested["major"] > available["major"] { break } } return fmt.Sprintf("%v.%v.%v", requested["major"], requested["minor"], requested["patch"]) } url := web.GetFullNodeUrl("latest-v" + version + ".x" + "/SHASUMS256.txt") content, err := web.GetRemoteTextFile(url) if err != nil { if strings.Contains(err.Error(), "HTTP Status 404") { fmt.Printf("\"%s\" is not a valid version number (or partial version number).\n\nIf you are trying to install a version that was just announced within the last few minutes, it may not be available for download yet (try again in 15 minutes).\n", version) } else { fmt.Println(err) } os.Exit(1) } re := regexp.MustCompile("node-v(.+)+msi") reg := regexp.MustCompile("node-v|-[xa].+") latest := reg.ReplaceAllString(re.FindString(content), "") return latest } func accessDenied(err error) bool { fmt.Println(fmt.Sprintf("%v", err)) if strings.Contains(strings.ToLower(err.Error()), "access is denied") { fmt.Println("See https://bit.ly/nvm4w-help") return true } return false } func isSymlink(path string) (bool, error) { info, err := os.Lstat(path) if err != nil { return false, err } return info.Mode()&os.ModeSymlink != 0, nil } func use(version string, cpuarch string, reload ...bool) { version, cpuarch, err := getVersion(version, cpuarch, true) exitCode := 0 status := make(chan Status) wg := &sync.WaitGroup{} wg.Add(1) notifications := false if os.Args[len(os.Args)-1] == "--notify" { notifications = true } go func() { defer func() { if notifications { time.Sleep(1 * time.Second) } wg.Done() }() for { select { case s := <-status: if s.Err != nil { exitCode = 1 if notifications { // Close progress dialog and send error notificaion notify(Notification{ Title: "Node.js Activation Error", Message: fmt.Sprintf("nvm use %s failed because %v", version, s.Err), Icon: "error", }) } fmt.Printf("activation error: %v\n", s.Err) if s.Help { fmt.Println(" ") help() } return } if s.Done { if s.Err == nil { if notifications { notify(Notification{ Title: "Node.js Activated", Message: fmt.Sprintf("Your system is now configured to use v%s (%v-bit).", version, cpuarch), Icon: "success", Actions: []Action{ {Type: "protocol", Label: "View Changelog", URI: fmt.Sprintf("https://github.com/nodejs/node/releases/tag/v%s", version)}, }, }) } fmt.Printf("Now using node v%s (%v-bit)\n", version, cpuarch) } return } if len(strings.TrimSpace(s.Text)) > 0 { fmt.Println(s.Text) } } } }() time.Sleep(300 * time.Millisecond) go func() { if err != nil { if !strings.Contains(err.Error(), "No Major.Minor.Patch") { status <- Status{Err: err, Done: true} } } // Check if a change is needed curVersion, curCpuarch := node.GetCurrentVersion() if version == curVersion && cpuarch == curCpuarch { fmt.Println("node v" + version + " (" + cpuarch + "-bit) is already in use.") status <- Status{Done: true} return } // Make sure the version is installed. If not, warn. if !node.IsVersionInstalled(env.root, version, cpuarch) { err = fmt.Errorf("node v%s (%v-bit) is not installed.", version, cpuarch) if notifications { status <- Status{Err: err, Done: true} } if (cpuarch == "32" && node.IsVersionInstalled(env.root, version, "64")) || (cpuarch == "64" && node.IsVersionInstalled(env.root, version, "32")) { status <- Status{Err: fmt.Errorf("Did you mean node v%s (%v-bit)?\nIf so, type \"nvm use %s %v\" to use it.", version, cpuarch, version, cpuarch), Done: true} } status <- Status{Err: fmt.Errorf("Version not installed. Run \"nvm ls\" to see available versions."), Done: true} } // Remove symlink if it already exists sym, _ := os.Lstat(env.symlink) if sym != nil { err = validSymlink(env.symlink) if err != nil { status <- Status{Err: err, Done: true} } // _, err := runElevated(fmt.Sprintf(`"%s" cmd /C rmdir "%s"`, filepath.Join(env.root, "elevate.cmd"), filepath.Clean(env.symlink))) _, err := elevatedRun("rmdir", filepath.Clean(env.symlink)) if err != nil { if accessDenied(err) { status <- Status{Err: err, Done: true} } } }
go
MIT
883c0dea378ba991c7dc38ea5a39e6d5fc56453f
2026-01-07T08:35:46.109469Z
true
coreybutler/nvm-windows
https://github.com/coreybutler/nvm-windows/blob/883c0dea378ba991c7dc38ea5a39e6d5fc56453f/src/encoding/encoding.go
src/encoding/encoding.go
package encoding import ( "strings" "unicode/utf8" "github.com/saintfish/chardet" ) func DetectCharset(content []byte) (string, error) { detector := chardet.NewTextDetector() result, err := detector.DetectBest(content) if err != nil { return "", err } return strings.ToUpper(result.Charset), nil } func ToUTF8(content string) []byte { b := make([]byte, len(content)) i := 0 for _, r := range content { i += utf8.EncodeRune(b[i:], r) } return b[:i] } // func ToUTF8(content []byte, ignoreInvalidITF8Chars ...bool) (string, error) { // ignore := false // if len(ignoreInvalidITF8Chars) > 0 { // ignore = ignoreInvalidITF8Chars[0] // } // cs, err := DetectCharset(content) // if err != nil { // if !ignore { // return "", err // } // cs = "UTF-8" // } // bs := string(content) // if ignore { // if !utf8.ValidString(bs) { // v := make([]rune, 0, len(bs)) // for i, r := range bs { // if r == utf8.RuneError { // _, size := utf8.DecodeRuneInString(bs[i:]) // if size == 1 { // continue // } // } // v = append(v, r) // } // bs = string(v) // } // } // if cs == "UTF-8" { // return bs, nil // } // converter, err := iconv.NewConverter(cs, "UTF-8") // if err != nil { // err = errors.New("Failed to convert " + cs + " to UTF-8: " + err.Error()) // return bs, err // } // return converter.ConvertString(bs) // }
go
MIT
883c0dea378ba991c7dc38ea5a39e6d5fc56453f
2026-01-07T08:35:46.109469Z
false
coreybutler/nvm-windows
https://github.com/coreybutler/nvm-windows/blob/883c0dea378ba991c7dc38ea5a39e6d5fc56453f/src/upgrade/register.go
src/upgrade/register.go
package upgrade import ( "fmt" "os" "os/exec" "path/filepath" "strings" ) const ( NODE_LTS_SCHEDULE_NAME = "NVM for Windows Node.js LTS Update Check" NODE_CURRENT_SCHEDULE_NAME = "NVM for Windows Node.js Current Update Check" NVM4W_SCHEDULE_NAME = "NVM for Windows Update Check" AUTHOR_SCHEDULE_NAME = "NVM for Windows Author Update Check" ) type Registration struct { LTS bool Current bool NVM4W bool Author bool } func LoadRegistration(args ...string) *Registration { reg := &Registration{ LTS: false, Current: false, NVM4W: false, Author: false, } for _, arg := range args { arg = strings.ToLower(strings.ReplaceAll(arg, "--", "")) switch arg { case "lts": reg.LTS = true case "current": reg.Current = true case "nvm4w": reg.NVM4W = true case "author": reg.Author = true } } return reg } func abortOnError(err error) { if err != nil { fmt.Println(err) os.WriteFile("./error.log", []byte(err.Error()), os.ModePerm) os.Exit(1) } } func logError(err error) { fmt.Println(err) if err != nil { os.WriteFile("./error.log", []byte(err.Error()), os.ModePerm) } } func Register() { reg := LoadRegistration(os.Args[2:]...) exe, _ := os.Executable() if reg.LTS { abortOnError(ScheduleTask(NODE_LTS_SCHEDULE_NAME, fmt.Sprintf(`"%s" checkForUpdates lts`, exe), "HOURLY", "00:30")) } if reg.Current { abortOnError(ScheduleTask(NODE_CURRENT_SCHEDULE_NAME, fmt.Sprintf(`"%s" checkForUpdates current`, exe), "HOURLY", "00:25")) } if reg.NVM4W { abortOnError(ScheduleTask(NVM4W_SCHEDULE_NAME, fmt.Sprintf(`"%s" checkForUpdates nvm4w`, exe), "HOURLY", "00:15")) } if reg.Author { abortOnError(ScheduleTask(AUTHOR_SCHEDULE_NAME, fmt.Sprintf(`"%s" checkForUpdates author`, exe), "HOURLY", "00:45")) } } func Unregister() { reg := LoadRegistration(os.Args[2:]...) if reg.LTS { abortOnError(UnscheduleTask(NODE_LTS_SCHEDULE_NAME)) } if reg.Current { abortOnError(UnscheduleTask(NODE_CURRENT_SCHEDULE_NAME)) } if reg.NVM4W { abortOnError(UnscheduleTask(NVM4W_SCHEDULE_NAME)) } if reg.Author { abortOnError(UnscheduleTask(AUTHOR_SCHEDULE_NAME)) } } // interval can be: // MINUTE Runs the task every N minutes. Requires /MO (modifier) to specify the interval. // HOURLY Runs the task every N hours. Requires /MO to specify the interval. // DAILY Runs the task every N days. Requires /MO to specify the interval. // WEEKLY Runs the task every N weeks. Requires /MO and /D (days of the week) to specify the schedule. // MONTHLY Runs the task on specific days of the month. Requires /MO, /D, or /M for further specifics. // ONCE Runs the task only once at the specified time. Requires /ST (start time). // ONSTART Runs the task every time the system starts. // ONLOGON Runs the task every time the user logs on. // ONIDLE Runs the task when the system is idle for a specified amount of time. // EVENT Runs the task when a specific event is triggered. Requires /EC (event log) and /ID (event ID). func ScheduleTask(name string, command string, interval string, startTime ...string) error { switch strings.ToUpper(interval) { case "MINUTE": fallthrough case "HOURLY": fallthrough case "DAILY": fallthrough case "WEEKLY": fallthrough case "MONTHLY": fallthrough case "ONCE": fallthrough case "ONSTART": fallthrough case "ONLOGON": fallthrough case "ONIDLE": fallthrough case "EVENT": interval = strings.ToUpper(interval) default: return fmt.Errorf("scheduling error: invalid interval %q", interval) } start := "00:00" if len(startTime) > 0 { start = startTime[0] } tmp, err := os.MkdirTemp("", "nvm4w-regitration-*") if err != nil { return fmt.Errorf("scheduling error: %v", err) } defer os.RemoveAll(tmp) script := fmt.Sprintf(` @echo off set errorlog="error.log" set output="%s\output.log" schtasks /create /tn "%s" /tr "cmd.exe /c %s" /sc %s /st %s /F > %%output%% 2>&1 if not errorlevel 0 ( echo ERROR: Failed to create scheduled task: exit code: %%errorlevel%% >> %%errorlog%% type %%output%% >> %%errorlog%% exit /b %%errorlevel%% ) `, tmp, name, escapeBackslashes(command), strings.ToLower(interval), start) err = os.WriteFile(filepath.Join(tmp, "schedule.bat"), []byte(script), os.ModePerm) if err != nil { return fmt.Errorf("scheduling error: %v", err) } cmd := exec.Command(filepath.Join(tmp, "schedule.bat")) // Capture standard output and standard error out, err := cmd.CombinedOutput() if err != nil { return fmt.Errorf("scheduling error: %v\n%s", err, out) } // fmt.Sprintf(`"%s" task scheduled successfully!`, name) return nil } func UnscheduleTask(name string) error { tmp, err := os.MkdirTemp("", "nvm4w-registration-*") if err != nil { return fmt.Errorf("scheduling error: %v", err) } defer os.RemoveAll(tmp) script := fmt.Sprintf(` @echo off set errorlog="error.log" set output="%s\output.log" schtasks /delete /tn "%s" /f > %%output%% 2>&1 if not errorlevel 0 ( echo failed to remove scheduled task: exit code: %%errorlevel%% >> %%errorlog%% type %%output%% >> %%errorlog%% exit /b %%errorlevel%% ) `, tmp, name) err = os.WriteFile(filepath.Join(tmp, "unschedule.bat"), []byte(script), os.ModePerm) if err != nil { return fmt.Errorf("unscheduling error: %v", err) } cmd := exec.Command(filepath.Join(tmp, "unschedule.bat")) // Capture standard output and standard error out, err := cmd.CombinedOutput() if err != nil { return fmt.Errorf("unscheduling error: %v\n%s", err, out) } return nil }
go
MIT
883c0dea378ba991c7dc38ea5a39e6d5fc56453f
2026-01-07T08:35:46.109469Z
false
coreybutler/nvm-windows
https://github.com/coreybutler/nvm-windows/blob/883c0dea378ba991c7dc38ea5a39e6d5fc56453f/src/upgrade/check.go
src/upgrade/check.go
package upgrade import ( "encoding/json" "fmt" "nvm/node" "nvm/semver" "nvm/web" "os" "path/filepath" "strings" "time" "github.com/dustin/go-humanize" "github.com/go-toast/toast" ) func Check(root string, nvmversion string) { // Store the recognized version to prevent duplicates notices := LoadNotices() defer notices.Save() reg := LoadRegistration(os.Args[2:]...) // Check for Node.js updates if reg.LTS || reg.Current { buf, err := get(web.GetFullNodeUrl("index.json")) abortOnError(err) var data = make([]map[string]interface{}, 0) abortOnError(json.Unmarshal([]byte(buf), &data)) lastLTS := notices.LastLTS() lastCurrent := notices.LastCurrent() installed := node.GetInstalled(root) changes := 0 for _, value := range data { switch value["lts"].(type) { // LTS versions always have the lts attribute as a string case string: if reg.LTS { versionDate, _ := time.Parse("2006-01-02", value["date"].(string)) if versionDate.After(lastLTS) && versionDate.After(time.Now().AddDate(0, -1, 0)) && !in(strings.Replace(value["version"].(string), "v", "", 1), installed) { abortOnError(alertRelease(value)) changes++ } } // Current versions always have the lts attribute as a false boolean case bool: if reg.Current && !value["lts"].(bool) { versionDate, _ := time.Parse("2006-01-02", value["date"].(string)) if versionDate.After(lastCurrent) && versionDate.After(time.Now().AddDate(0, -1, 0)) && !in(strings.Replace(value["version"].(string), "v", "", 1), installed) { abortOnError(alertRelease(value)) changes++ } } } } if changes == 0 { noupdate() return } } // Check for NVM for Windows updates if reg.NVM4W { buf, err := get("https://api.github.com/repos/coreybutler/nvm-windows/releases/latest") abortOnError(err) var data map[string]interface{} abortOnError(json.Unmarshal([]byte(buf), &data)) current, err := semver.New(nvmversion) abortOnError(err) next, err := semver.New(data["tag_name"].(string)) abortOnError(err) notices.NVM4W = current.String() if !next.GT(current) { alertNvmRelease(current, next, data) notices.NVM4W = next.String() } } now := time.Now().Format("2006-01-02") if reg.LTS { notices.LTS = now } if reg.Current { notices.Current = now } } func alertNvmRelease(current, next *semver.Version, data map[string]interface{}) { exe, _ := os.Executable() path := filepath.Dir(exe) iconPath := filepath.Join(path, "nodejs.ico") pubDate, _ := time.Parse("2006-01-02T15:04:05Z", data["published_at"].(string)) age := humanize.Time(pubDate) notification := toast.Notification{ AppID: "NVM for Windows", Title: "NVM for Windows Update Available", Message: fmt.Sprintf("Version %s is was released %s.\n(currently using v%s)", next.String(), age, current.String()), Icon: iconPath, Actions: []toast.Action{ {"protocol", "Install", "nvm://launch?action=upgrade"}, {"protocol", "View", data["html_url"].(string)}, }, } // Display the notification err := notification.Push() if err != nil { abortOnError(err) } } func in(item string, set []string) bool { for _, i := range set { if i == item { return true } } return false } func noupdate() { fmt.Println("no new releases detected") } func UpgradeCompleteAlert(version string) { exe, _ := os.Executable() path := filepath.Dir(exe) iconPath := filepath.Join(path, "checkmark.ico") notification := toast.Notification{ AppID: "NVM for Windows", Title: "Upgrade Complete", Message: fmt.Sprintf("The upgrade to NVM for Windows v%s completed successfully.", version), Icon: iconPath, Actions: []toast.Action{ {"protocol", "Open PowerShell", "nvm://launch?action=open_terminal&amp;type=pwsh"}, {"protocol", "Open CMD Prompt", "nvm://launch?action=open_terminal&amp;type=cmd"}, }, } // Display the notification err := notification.Push() if err != nil { abortOnError(err) } } func alertRelease(data map[string]interface{}) error { version, err := semver.New(data["version"].(string)) if err != nil { return err } exe, _ := os.Executable() path := filepath.Dir(exe) iconPath := filepath.Join(path, "nodejs.ico") releaseName := "" releaseDate, err := time.Parse("2006-01-02", data["date"].(string)) if err != nil { return err } age := humanize.Time(releaseDate) msg := fmt.Sprintf("with npm v%s & V8 v%s\nReleased %s.", data["npm"].(string), data["v8"].(string), age) switch data["lts"].(type) { case string: releaseName = " (LTS " + data["lts"].(string) + ")" } if data["security"].(bool) { msg += "\nThis is a security release." } title := fmt.Sprintf("Node.js v%s Available%s", version.String(), releaseName) notification := toast.Notification{ AppID: "NVM for Windows", Title: title, Message: msg, Icon: iconPath, } // Display the notification err = notification.Push() if err != nil { return err } return nil }
go
MIT
883c0dea378ba991c7dc38ea5a39e6d5fc56453f
2026-01-07T08:35:46.109469Z
false
coreybutler/nvm-windows
https://github.com/coreybutler/nvm-windows/blob/883c0dea378ba991c7dc38ea5a39e6d5fc56453f/src/upgrade/notification.go
src/upgrade/notification.go
package upgrade import ( "encoding/json" "os" "path/filepath" "time" ) type LastNotification struct { outpath string LTS string `json:"lts,omitempty"` Current string `json:"current,omitempty"` NVM4W string `json:"nvm4w,omitempty"` Author string `json:"author,omitempty"` } func LoadNotices() *LastNotification { ln := &LastNotification{} noticedata, err := os.ReadFile(ln.File()) if err != nil { if !os.IsNotExist(err) { abortOnError(err) } } if noticedata != nil { abortOnError(json.Unmarshal(noticedata, &ln)) } return ln } func (ln *LastNotification) Path() string { if ln.outpath == "" { ln.outpath = filepath.Join(os.Getenv("APPDATA"), ".nvm") } return ln.outpath } func (ln *LastNotification) File() string { return filepath.Join(ln.Path(), ".updates.json") } func (ln *LastNotification) Save() { output, err := json.Marshal(ln) abortOnError(err) abortOnError(os.MkdirAll(ln.Path(), os.ModePerm)) abortOnError(os.WriteFile(ln.File(), output, os.ModePerm)) abortOnError(setHidden(ln.Path())) } func (ln *LastNotification) LastLTS() time.Time { if ln.LTS == "" { return time.Now() } t, _ := time.Parse("2006-01-02", ln.LTS) return t } func (ln *LastNotification) LastCurrent() time.Time { if ln.Current == "" { return time.Now() } t, _ := time.Parse("2006-01-02", ln.Current) return t }
go
MIT
883c0dea378ba991c7dc38ea5a39e6d5fc56453f
2026-01-07T08:35:46.109469Z
false
coreybutler/nvm-windows
https://github.com/coreybutler/nvm-windows/blob/883c0dea378ba991c7dc38ea5a39e6d5fc56453f/src/upgrade/upgrade.go
src/upgrade/upgrade.go
package upgrade import ( "archive/zip" "crypto/md5" "encoding/json" "fmt" "io" "net/http" "nvm/author" "nvm/semver" "nvm/utility" "os" "os/exec" "os/signal" "path/filepath" "strings" "sync" "syscall" "time" "unsafe" "github.com/coreybutler/go-fsutil" "github.com/ncruces/zenity" "golang.org/x/sys/windows" ) const ( UPDATE_URL = "https://api.github.com/repos/coreybutler/nvm-windows/releases/latest" ALERTS_URL = "https://author.io/nvm4w/feed/alerts" // Color codes yellow = "\033[33m" reset = "\033[0m" // Windows console modes ENABLE_VIRTUAL_TERMINAL_PROCESSING = 0x0004 FILE_ATTRIBUTE_HIDDEN = 0x2 CREATE_NEW_CONSOLE = 0x00000010 // Create a new console for the child process DETACHED_PROCESS = 0x00000008 // Detach the child process from the parent warningIcon = "⚠️" // exclamationIcon = "❗" ) type Notification struct { AppID string `json:"app_id"` Title string `json:"title"` Message string `json:"message"` Icon string `json:"icon"` Actions []Action `json:"actions"` Duration string `json:"duration"` Link string `json:"link"` } type Action struct { Type string `json:"type"` Label string `json:"label"` URI string `json:"uri"` } func display(data Notification) { data.AppID = "NVM for Windows" content, _ := json.Marshal(data) go author.Bridge("notify", string(content)) } type Update struct { Version string `json:"version"` Assets []string `json:"assets"` Warnings []string `json:"notices"` VersionWarnings []string `json:"versionNotices"` SourceURL string `json:"sourceTpl"` } type Release struct { Version string `json:"name"` Assets []map[string]interface{} `json:"assets"` Publish time.Time `json:"published_at"` } func Run(version string) error { show_progress := false for _, arg := range os.Args[2:] { if strings.ToLower(arg) == "--show-progress-ui" { show_progress = true break } } status := make(chan Status) if !show_progress { // Setup signal handling first signalChan := make(chan os.Signal, 1) signal.Notify(signalChan, os.Interrupt, syscall.SIGTERM) defer signal.Stop(signalChan) // Add signal handler go func() { <-signalChan fmt.Println("Installation canceled by user") os.Exit(0) }() go func() { for { select { case s := <-status: if s.Warn != "" { Warn(s.Warn) } if s.Err != nil { fmt.Println(s.Err) os.Exit(1) } if s.Text != "" { fmt.Println(s.Text) } if s.Done { fmt.Println("Upgrade complete") return } } } }() time.Sleep(300 * time.Millisecond) return run(version, status) } wg := &sync.WaitGroup{} wg.Add(1) var dlg zenity.ProgressDialog var exitCode = 0 var u *Update // Display visual progress UI go func() { defer wg.Done() for { select { case s := <-status: if s.Warn != "" { display(Notification{ Message: s.Warn, Icon: "nvm", }) } if s.Cancel { display(Notification{ Title: "Installation Canceled", Message: fmt.Sprintf("Installation of NVM for Windows v%s was canceled by the user.", u.Version), Icon: "error", Actions: []Action{ {Type: "protocol", Label: "Install Again", URI: fmt.Sprintf("nvm://launch?action=upgrade&version=%s", u.Version)}, }, }) return } if s.Err != nil { exitCode = 1 display(Notification{ Title: "Installation Error", Message: s.Err.Error(), Icon: "error", }) dlg.Text(fmt.Sprintf("error: %v", s.Err)) dlg.Close() // err := restore(status, verbose) // if err != nil { // if show_progress { // display(notify.Notification{ // Title: "Rollback Error", // Message: err.Error(), // Icon: "error", // }) // } else { // fmt.Printf("rollback error: %v\n", err) // } // } return } if s.Done { display(Notification{ Title: "Upgrade Complete", Message: fmt.Sprintf("Now running version %s.", u.Version), Icon: "success", }) dlg.Text("Upgrade complete") time.Sleep(1 * time.Second) return } var empty string if s.Text != empty && len(strings.TrimSpace(s.Text)) > 0 { dlg.Text(s.Text) } } } }() // Wait for the prior subroutine to initialize before starting the next dependent thread time.Sleep(300 * time.Millisecond) // Run the update go func() { exe, _ := os.Executable() winIco := filepath.Join(filepath.Dir(exe), "nvm.ico") ico := filepath.Join(filepath.Dir(exe), "download.ico") var err error u, err = checkForUpdate(UPDATE_URL) if err != nil { display(Notification{ Title: "Update Error", Message: err.Error(), Icon: "error", }) status <- Status{Err: fmt.Errorf("error: failed to obtain update data: %v\n", err)} } var perr error dlg, perr = zenity.Progress( zenity.Title(fmt.Sprintf("Installing NVM for Windows v%s", u.Version)), zenity.Icon(ico), zenity.WindowIcon(winIco), zenity.AutoClose(), zenity.NoCancel(), zenity.Pulsate()) if perr != nil { fmt.Println("Failed to create progress dialog") } go func() { for { select { case <-dlg.Done(): if err := dlg.Complete(); err == zenity.ErrCanceled { status <- Status{Cancel: true} } } } }() status <- Status{Text: "Validating version..."} run(version, status, u) }() wg.Wait() os.Exit(exitCode) return nil } func run(version string, status chan Status, updateMetadata ...*Update) error { args := os.Args[2:] colorize := true if err := EnableVirtualTerminalProcessing(); err != nil { colorize = false } // Retrieve remote metadata var update *Update if len(updateMetadata) > 0 { update = updateMetadata[0] } else { var err error update, err = checkForUpdate(UPDATE_URL) if err != nil { return fmt.Errorf("error: failed to obtain update data: %v\n", err) } } for _, warning := range update.Warnings { status <- Status{Warn: warning} } verbose := false // rollback := false for _, arg := range args { switch strings.ToLower(arg) { case "--verbose": verbose = true // case "rollback": // rollback = true } } // // Check for a backup // if rollback { // if fsutil.Exists(filepath.Join(".", ".update", "nvm4w-backup.zip")) { // fmt.Println("restoring NVM4W backup...") // rbtmp, err := os.MkdirTemp("", "nvm-rollback-*") // if err != nil { // fmt.Printf("error: failed to create rollback directory: %v\n", err) // os.Exit(1) // } // defer os.RemoveAll(rbtmp) // err = unzip(filepath.Join(".", ".update", "nvm4w-backup.zip"), rbtmp) // if err != nil { // fmt.Printf("error: failed to extract backup: %v\n", err) // os.Exit(1) // } // // Copy the backup files to the current directory // err = copyDirContents(rbtmp, ".") // if err != nil { // fmt.Printf("error: failed to restore backup files: %v\n", err) // os.Exit(1) // } // // Remove the restoration directory // os.RemoveAll(filepath.Join(".", ".update")) // fmt.Println("rollback complete") // rbcmd := exec.Command("nvm.exe", "version") // o, err := rbcmd.Output() // if err != nil { // fmt.Println("error running nvm.exe:", err) // os.Exit(1) // } // exec.Command("schtasks", "/delete", "/tn", "\"RemoveNVM4WBackup\"", "/f").Run() // fmt.Printf("rollback to v%s complete\n", string(o)) // os.Exit(0) // } else { // fmt.Println("no backup available: backups are only available for 7 days after upgrading") // os.Exit(0) // } // } currentVersion, err := semver.New(version) if err != nil { return err } updateVersion, err := semver.New(update.Version) if err != nil { return err } if currentVersion.LT(updateVersion) { if len(update.VersionWarnings) > 0 { if len(update.Warnings) > 0 || len(update.VersionWarnings) > 0 { fmt.Println("") } for _, warning := range update.VersionWarnings { status <- Status{Warn: warning} Warn(warning, colorize) } fmt.Println("") } fmt.Printf("upgrading from v%s-->%s\n", version, highlight(update.Version)) status <- Status{Text: "downloading..."} } else { status <- Status{Text: "nvm is up to date", Done: true} return nil } // Make temp directory tmp, err := os.MkdirTemp("", "nvm-upgrade-*") if err != nil { status <- Status{Err: fmt.Errorf("error: failed to create temporary directory: %v\n", err)} } defer os.RemoveAll(tmp) // Download the new app source := update.SourceURL // source := fmt.Sprintf(update.SourceURL, update.Version) // source := fmt.Sprintf(update.SourceURL, "1.1.11") // testing body, err := get(source) if err != nil { status <- Status{Err: fmt.Errorf("error: failed to download new version: %v\n", err)} } os.WriteFile(filepath.Join(tmp, "assets.zip"), body, os.ModePerm) os.Mkdir(filepath.Join(tmp, "assets"), os.ModePerm) source = source + ".checksum.txt" body, err = get(source) if err != nil { return fmt.Errorf("error: failed to download checksum: %v\n", err) } os.WriteFile(filepath.Join(tmp, "assets.zip.checksum.txt"), body, os.ModePerm) filePath := filepath.Join(tmp, "assets.zip") // path to the file you want to validate checksumFile := filepath.Join(tmp, "assets.zip.checksum.txt") // path to the checksum file // Step 1: Compute the MD5 checksum of the file status <- Status{Text: "verifying checksum..."} computedChecksum, err := computeMD5Checksum(filePath) if err != nil { status <- Status{Err: fmt.Errorf("Error computing checksum: %v", err)} } // Step 2: Read the checksum from the .checksum.txt file storedChecksum, err := readChecksumFromFile(checksumFile) if err != nil { status <- Status{Err: err} } // Step 3: Compare the computed checksum with the stored checksum if strings.ToLower(computedChecksum) != strings.ToLower(storedChecksum) { status <- Status{Err: fmt.Errorf("cannot validate update file (checksum mismatch)")} } status <- Status{Text: "extracting update..."} if err := unzip(filepath.Join(tmp, "assets.zip"), filepath.Join(tmp, "assets")); err != nil { status <- Status{Err: err} } // Get any additional assets if len(update.Assets) > 0 { status <- Status{Text: fmt.Sprintf("downloading %d additional assets...", len(update.Assets))} for _, asset := range update.Assets { var assetURL string if !strings.HasPrefix(asset, "http") { assetURL = update.SourceURL // assetURL = fmt.Sprintf(update.SourceURL, asset) } else { assetURL = asset } assetBody, err := get(assetURL) if err != nil { status <- Status{Err: fmt.Errorf("error: failed to download asset: %v\n", err)} } assetPath := filepath.Join(tmp, "assets", asset) os.WriteFile(assetPath, assetBody, os.ModePerm) } } // Debugging if verbose { tree(tmp, "downloaded files (extracted):") nvmtestcmd := exec.Command(filepath.Join(tmp, "assets", "nvm.exe"), "version") nvmtestcmd.Stdout = os.Stdout nvmtestcmd.Stderr = os.Stderr err = nvmtestcmd.Run() if err != nil { fmt.Println("error running nvm.exe:", err) } } // Backup current version to zip status <- Status{Text: "applying update..."} currentExe, _ := os.Executable() currentPath := filepath.Dir(currentExe) bkp, err := os.MkdirTemp("", "nvm-backup-*") if err != nil { status <- Status{Err: fmt.Errorf("error: failed to create backup directory: %v\n", err)} } defer os.RemoveAll(bkp) err = zipDirectory(currentPath, filepath.Join(bkp, "backup.zip")) if err != nil { status <- Status{Err: fmt.Errorf("error: failed to create backup: %v\n", err)} } os.MkdirAll(filepath.Join(currentPath, ".update"), os.ModePerm) copyFile(filepath.Join(bkp, "backup.zip"), filepath.Join(currentPath, ".update", "nvm4w-backup.zip")) // Copy the new files to the current directory // copyFile(currentExe, fmt.Sprintf("%s.%s.bak", currentExe, version)) copyDirContents(filepath.Join(tmp, "assets"), currentPath) copyFile(filepath.Join(tmp, "assets", "nvm.exe"), filepath.Join(currentPath, ".update/nvm.exe")) if verbose { nvmtestcmd := exec.Command(filepath.Join(currentPath, ".update/nvm.exe"), "version") nvmtestcmd.Stdout = os.Stdout nvmtestcmd.Stderr = os.Stderr err = nvmtestcmd.Run() if err != nil { status <- Status{Err: err} } } // Debugging if verbose { tree(currentPath, "final directory contents:") } // Hide the update directory setHidden(filepath.Join(currentPath, ".update")) // If an "update.exe" exists, run it if fsutil.IsExecutable(filepath.Join(tmp, "assets", "update.exe")) { err = copyFile(filepath.Join(tmp, "assets", "update.exe"), filepath.Join(currentPath, ".update", "update.exe")) if err != nil { status <- Status{Err: fmt.Errorf("error: failed to copy update.exe: %v\n", err)} os.Exit(1) } } autoupdate(status) return nil } type Status struct { Text string Err error Done bool Help bool Cancel bool Warn string } func (u *Update) Available(sinceVersion string) (string, bool, error) { currentVersion, err := semver.New(sinceVersion) if err != nil { return "", false, err } updateVersion, err := semver.New(u.Version) if err != nil { return "", false, err } if currentVersion.LT(updateVersion) { return u.Version, true, nil } return "", false, nil } func Warn(msg string, colorized ...bool) { if len(colorized) > 0 && colorized[0] { fmt.Println(warningIcon + " " + highlight(msg)) } else { fmt.Println(strings.ToUpper(msg)) } } func Get() (*Update, error) { return checkForUpdate(UPDATE_URL) } func autoupdate(status chan Status) { currentPath, err := os.Executable() if err != nil { status <- Status{Err: err} fmt.Println("error getting updater path:", err) os.Exit(1) } // Create temporary directory for the updater script tempDir := filepath.Dir(currentPath) // Use the same temp dir as the new executable scriptPath := filepath.Join(tempDir, "updater.bat") // Temporary batch file that deletes the directory and the scheduled task tmp, err := os.MkdirTemp("", "nvm4w-remove-*") if err != nil { status <- Status{Err: err} fmt.Printf("error creating temporary directory: %v", err) os.Exit(1) } // schedule removal of restoration folder for 30 days from now tempBatchFile := filepath.Join(tmp, "remove_backup.bat") now := time.Now() futureDate := now.AddDate(0, 0, 7) formattedDate := futureDate.Format("01/02/2006") batchContent := fmt.Sprintf(` @echo off schtasks /delete /tn "RemoveNVM4WBackup" /f rmdir /s /q "%s" `, escapeBackslashes(filepath.Join(filepath.Dir(currentPath), ".update"))) // Write the batch file to a temporary location err = os.WriteFile(tempBatchFile, []byte(batchContent), os.ModePerm) if err != nil { status <- Status{Err: err} fmt.Printf("error creating temporary batch file: %v", err) os.Exit(1) } updaterScript := fmt.Sprintf(`@echo off setlocal enabledelayedexpansion echo ========= Update Script Started ========= >> error.log echo Started updater script with PID %%1 at %%TIME%% >> error.log echo Source: %%~2 >> error.log echo Target: %%~3 >> error.log :wait timeout /t 1 /nobreak >nul tasklist /fi "PID eq %%1" 2>nul | find "%%1" >nul if not errorlevel 1 ( echo Waiting for PID %%1 to exit at %%TIME%%... >> error.log goto :wait ) echo ========= Starting Copy Operation ========= >> error.log echo Checking if source (%%~2) exists... >> error.log if not exist "%%~2" ( echo ERROR: Source file does not exist: %%~2 >> error.log exit /b 1 ) echo Source file exists >> error.log del "%%~3" >> error.log echo Checking if target location is writable... >> error.log echo Test > "%%~dp3test.txt" 2>>error.log if errorlevel 1 ( echo ERROR: Target location is not writable: %%~dp3 >> error.log exit /b 1 ) del "%%~dp3test.txt" echo Target location is writable >> error.log echo Attempting copy at %%TIME%%... >> error.log echo Running: copy /y "%%~2" "%%~3" >> error.log copy /y "%%~2" "%%~3" >> error.log 2>&1 if errorlevel 1 ( echo ERROR: Copy failed with error level %%errorlevel%% >> error.log exit /b %%errorlevel%% ) echo Verifying copy... >> error.log if not exist "%%~3" ( echo ERROR: Target file does not exist after copy: %%~3 >> error.log exit /b 1 ) del "%%~2" >> error.log if exist "%%~2" ( echo ERROR: Source file still exists after deletion: %%~2 >> error.log exit /b 1 ) :: Schedule the task to delete the directory echo schtasks /create /tn "RemoveNVM4WBackup" /tr "cmd.exe /c %s" /sc once /sd %s /st 12:00 /f >> error.log schtasks /create /tn "RemoveNVM4WBackup" /tr "cmd.exe /c %s" /sc once /sd %s /st 12:00 /f if not errorlevel 0 ( echo ERROR: Failed to create scheduled task: exit code: %%errorlevel%% >> error.log exit /b %%errorlevel%% ) echo Update complete >> error.log del error.log del "%%~f0" start "nvm://launch?action=upgrade_notify" exit /b 0 `, escapeBackslashes(tempBatchFile), formattedDate, escapeBackslashes(tempBatchFile), formattedDate) err = os.WriteFile(scriptPath, []byte(updaterScript), os.ModePerm) // Use standard Windows file permissions if err != nil { status <- Status{Err: err} fmt.Printf("error creating updater script: %v", err) os.Exit(1) } // Start the updater script cmd := exec.Command(scriptPath, fmt.Sprintf("%d", os.Getpid()), filepath.Join(tempDir, ".update", "nvm.exe"), currentPath) err = cmd.Start() if err != nil { status <- Status{Err: err} fmt.Printf("error starting updater script: %v", err) os.Exit(1) } // Exit the current process (delay for cleanup) time.Sleep(300 * time.Millisecond) status <- Status{Text: "restarting app...", Done: true} time.Sleep(2 * time.Second) os.Exit(0) } func escapeBackslashes(path string) string { return strings.Replace(path, "\\", "\\\\", -1) } func tree(dir string, title ...string) { if len(title) > 0 { fmt.Println("\n" + highlight(title[0])) } cmd := exec.Command("tree", dir, "/F") cmd.Stdout = os.Stdout cmd.Stderr = os.Stderr if err := cmd.Run(); err != nil { fmt.Println("Error executing command:", err) } } func get(url string, verbose ...bool) ([]byte, error) { if len(verbose) == 0 || verbose[0] { fmt.Printf(" GET %s\n", url) } client := &http.Client{} req, err := http.NewRequest("GET", url, nil) if err != nil { return []byte{}, err } req.Header.Set("User-Agent", "nvm-windows") req.Header.Set("Cache-Control", "no-cache") req.Header.Set("Pragma", "no-cache") resp, err := client.Do(req) if err != nil { return nil, err } defer resp.Body.Close() if resp.StatusCode != http.StatusOK { return []byte{}, fmt.Errorf("error: received status code %d", resp.StatusCode) } return io.ReadAll(resp.Body) } func checkForUpdate(url string) (*Update, error) { u := Update{Assets: []string{}, Warnings: []string{}, VersionWarnings: []string{}} r := Release{} // Make the HTTP GET request utility.DebugLogf("checking for updates at %s", url) body, err := get(url, false) if err != nil { return &u, fmt.Errorf("error: reading response body: %v", err) } // Parse JSON into the struct utility.DebugLogf("Received:\n%s", string(body)) err = json.Unmarshal(body, &r) if err != nil { return &u, fmt.Errorf("error: parsing release: %v", err) } u.Version = r.Version utility.DebugLogf("latest version: %s", u.Version) // Comment the next line when development is complete // u.Version = "2.0.0" for _, asset := range r.Assets { if value, exists := asset["name"]; exists && value.(string) == "update.exe" { u.Assets = append(u.Assets, value.(string)) } if value, exists := asset["name"]; exists && value.(string) == "nvm-noinstall.zip" { u.SourceURL = asset["browser_download_url"].(string) } } utility.DebugLogf("source URL: %s", u.SourceURL) utility.DebugLogf("assets: %v", u.Assets) // Get alerts utility.DebugLogf("downloading alerts from %s", ALERTS_URL) body, err = get(ALERTS_URL, false) if err != nil { utility.DebugLogf("alert download error: %v", err) return &u, err } utility.DebugLogf("Received:\n%s", string(body)) var alerts map[string][]interface{} err = json.Unmarshal(body, &alerts) if err != nil { utility.DebugLogf("alert parsing error: %v", err) } if value, exists := alerts["all"]; exists { for _, warning := range value { warn := warning.(map[string]interface{}) if v, exists := warn["message"]; exists { u.Warnings = append(u.Warnings, v.(string)) } } } if value, exists := alerts[u.Version]; exists { utility.DebugLogf("version warnings exist for %v\n%v", u.Version, value) for _, warning := range value { utility.DebugLogf("warning: %v", warning) warn := warning.(map[string]interface{}) if v, exists := warn["message"]; exists { u.VersionWarnings = append(u.VersionWarnings, v.(string)) } } } utility.DebugLogf("warnings: %v", u.Warnings) utility.DebugLogf("version warnings: %v", u.VersionWarnings) return &u, nil } func EnableVirtualTerminalProcessing() error { // Get the handle to the standard output handle := windows.Stdout // Retrieve the current console mode var mode uint32 if err := windows.GetConsoleMode(handle, &mode); err != nil { return err } // Enable the virtual terminal processing mode mode |= ENABLE_VIRTUAL_TERMINAL_PROCESSING if err := windows.SetConsoleMode(handle, mode); err != nil { return err } return nil } func highlight(message string) string { return fmt.Sprintf("%s%s%s", yellow, message, reset) } // Unzip function extracts a zip file to a specified directory func unzip(src string, dest string) error { // Open the zip archive for reading r, err := zip.OpenReader(src) if err != nil { return err } defer r.Close() // Iterate over each file in the zip archive for _, f := range r.File { // Build the path for each file in the destination directory fpath := filepath.Join(dest, f.Name) // Check if the file is a directory if f.FileInfo().IsDir() { // Create directory if it doesn't exist if err := os.MkdirAll(fpath, os.ModePerm); err != nil { return err } continue } // Create directories leading to the file if they don't exist if err := os.MkdirAll(filepath.Dir(fpath), os.ModePerm); err != nil { return err } // Open the file in the zip archive rc, err := f.Open() if err != nil { return err } defer rc.Close() // Create the destination file outFile, err := os.Create(fpath) if err != nil { return err } defer outFile.Close() // Copy the file contents from the archive to the destination file _, err = io.Copy(outFile, rc) if err != nil { return err } } return nil } // function to compute the MD5 checksum of a file func computeMD5Checksum(filePath string) (string, error) { file, err := os.Open(filePath) if err != nil { return "", err } defer file.Close() hasher := md5.New() _, err = io.Copy(hasher, file) if err != nil { return "", err } // Return the hex string representation of the MD5 hash return fmt.Sprintf("%x", hasher.Sum(nil)), nil } // function to read the checksum from the .checksum.txt file func readChecksumFromFile(checksumFile string) (string, error) { file, err := os.Open(checksumFile) if err != nil { return "", err } defer file.Close() var checksum string _, err = fmt.Fscan(file, &checksum) if err != nil { return "", err } return checksum, nil } func copyFile(src, dst string) error { // Open the source file sourceFile, err := os.Open(src) if err != nil { return fmt.Errorf("failed to open source file: %v", err) } defer sourceFile.Close() // Create the destination file destinationFile, err := os.Create(dst) if err != nil { return fmt.Errorf("failed to create destination file: %v", err) } defer destinationFile.Close() // Copy contents from the source file to the destination file _, err = io.Copy(destinationFile, sourceFile) if err != nil { return fmt.Errorf("failed to copy file: %v", err) } // Optionally, copy file permissions (this can be skipped if not needed) sourceInfo, err := os.Stat(src) if err != nil { return fmt.Errorf("failed to get source file info: %v", err) } err = os.Chmod(dst, sourceInfo.Mode()) if err != nil { return fmt.Errorf("failed to set file permissions: %v", err) } return nil } // copyDirContents copies all the contents (files and subdirectories) of a source directory to a destination directory. func copyDirContents(srcDir, dstDir string) error { // Ensure destination directory exists err := os.MkdirAll(dstDir, 0755) if err != nil { return fmt.Errorf("failed to create destination directory %s: %v", dstDir, err) } // Walk through the source directory recursively err = filepath.Walk(srcDir, func(srcPath string, info os.FileInfo, err error) error { if err != nil { return fmt.Errorf("error accessing %s: %v", srcPath, err) } // Construct the corresponding path in the destination directory relPath, err := filepath.Rel(srcDir, srcPath) if err != nil { return fmt.Errorf("failed to get relative path for %s: %v", srcPath, err) } dstPath := filepath.Join(dstDir, relPath) // If it's a directory, ensure it's created in the destination if info.IsDir() { return os.MkdirAll(dstPath, info.Mode()) } // If it's a file, copy it return copyFile(srcPath, dstPath) }) return err } // zipDirectory zips the contents of a directory. func zipDirectory(sourceDir, outputZip string) error { // Create the zip file. zipFile, err := os.Create(outputZip) if err != nil { return err } defer zipFile.Close() // Create a new zip writer. zipWriter := zip.NewWriter(zipFile) defer zipWriter.Close() // Walk through the directory. return filepath.Walk(sourceDir, func(path string, info os.FileInfo, err error) error { if err != nil { return err } // Get the relative path. relPath, err := filepath.Rel(sourceDir, path) if err != nil { return err } // Skip the directory itself but include subdirectories. if info.IsDir() { if relPath == "." { return nil } // Add a trailing slash for directories in the zip archive. relPath += "/" } // Create a zip header. header, err := zip.FileInfoHeader(info) if err != nil { return err } header.Name = relPath if info.IsDir() { header.Method = zip.Store } else { header.Method = zip.Deflate } // Create a writer for the file in the zip archive. writer, err := zipWriter.CreateHeader(header) if err != nil { return err } // If the file is not a directory, copy its contents into the archive. if !info.IsDir() { file, err := os.Open(path) if err != nil { return err } defer file.Close() _, err = io.Copy(writer, file) if err != nil { return err } } return nil }) } func setHidden(path string) error { // Convert the path to a UTF-16 encoded string lpFileName, err := syscall.UTF16PtrFromString(path) if err != nil { return fmt.Errorf("failed to encode path: %w", err) } // Call the Windows API function ret, _, err := syscall.NewLazyDLL("kernel32.dll"). NewProc("SetFileAttributesW"). Call( uintptr(unsafe.Pointer(lpFileName)), uintptr(FILE_ATTRIBUTE_HIDDEN), ) // Check the result if ret == 0 { return fmt.Errorf("failed to set hidden attribute: %w", err) } return nil }
go
MIT
883c0dea378ba991c7dc38ea5a39e6d5fc56453f
2026-01-07T08:35:46.109469Z
false
coreybutler/nvm-windows
https://github.com/coreybutler/nvm-windows/blob/883c0dea378ba991c7dc38ea5a39e6d5fc56453f/src/file/file.go
src/file/file.go
package file import ( "archive/zip" "bufio" "io" "log" "os" "path/filepath" "strings" ) // Function courtesy http://stackoverflow.com/users/1129149/swtdrgn func Unzip(src, dest string) error { r, err := zip.OpenReader(src) if err != nil { return err } defer r.Close() for _, f := range r.File { if !strings.Contains(f.Name, "..") { rc, err := f.Open() if err != nil { return err } defer rc.Close() fpath := filepath.Join(dest, f.Name) if f.FileInfo().IsDir() { os.MkdirAll(fpath, f.Mode()) } else { var fdir string if lastIndex := strings.LastIndex(fpath, string(os.PathSeparator)); lastIndex > -1 { fdir = fpath[:lastIndex] } err = os.MkdirAll(fdir, f.Mode()) if err != nil { log.Fatal(err) return err } f, err := os.OpenFile(fpath, os.O_WRONLY|os.O_CREATE|os.O_TRUNC, f.Mode()) if err != nil { return err } defer f.Close() _, err = io.Copy(f, rc) if err != nil { return err } } } else { log.Printf("failed to extract file: %s (cannot validate)\n", f.Name) } } return nil } func ReadLines(path string) ([]string, error) { file, err := os.Open(path) if err != nil { return nil, err } defer file.Close() var lines []string scanner := bufio.NewScanner(file) for scanner.Scan() { lines = append(lines, scanner.Text()) } return lines, scanner.Err() } func Exists(filename string) bool { _, err := os.Stat(filename) return err == nil }
go
MIT
883c0dea378ba991c7dc38ea5a39e6d5fc56453f
2026-01-07T08:35:46.109469Z
false
coreybutler/nvm-windows
https://github.com/coreybutler/nvm-windows/blob/883c0dea378ba991c7dc38ea5a39e6d5fc56453f/src/node/node.go
src/node/node.go
package node import ( "encoding/json" "fmt" "io/ioutil" "nvm/arch" "nvm/file" "nvm/web" "os" "os/exec" "regexp" "strings" // "../semver" "github.com/blang/semver" ) /** * Returns version, architecture */ func GetCurrentVersion() (string, string) { cmd := exec.Command("node", "-v") str, err := cmd.Output() if err == nil { v := strings.Trim(regexp.MustCompile("-.*$").ReplaceAllString(regexp.MustCompile("v").ReplaceAllString(strings.Trim(string(str), " \n\r"), ""), ""), " \n\r") cmd := exec.Command("node", "-p", "console.log(process.execPath)") str, _ := cmd.Output() file := strings.Trim(regexp.MustCompile("undefined").ReplaceAllString(string(str), ""), " \n\r") bit := arch.Bit(file) if bit == "?" { cmd := exec.Command("node", "-e", "console.log(process.arch)") str, err := cmd.Output() if err == nil { if string(str) == "x64" { bit = "64" } else if string(str) == "arm64" { bit = "arm64" } else { bit = "32" } } else { return v, "Unknown" } } return v, bit } return "Unknown", "" } func IsVersionInstalled(root string, version string, cpu string) bool { e32 := file.Exists(root + "\\v" + version + "\\node32.exe") e64 := file.Exists(root + "\\v" + version + "\\node64.exe") used := file.Exists(root + "\\v" + version + "\\node.exe") if cpu == "all" { return ((e32 || e64) && used) || e32 && e64 } if file.Exists(root + "\\v" + version + "\\node" + cpu + ".exe") { return true } if ((e32 || e64) && used) || (e32 && e64) { return true } if !e32 && !e64 && used && arch.Validate(cpu) == arch.Bit(root+"\\v"+version+"\\node.exe") { return true } if cpu == "32" { return e32 } if cpu == "64" { return e64 } return false } func IsVersionAvailable(v string) bool { // Check the service to make sure the version is available avail, _, _, _, _, _ := GetAvailable() for _, b := range avail { if b == v { return true } } return false } func reverseStringArray(str []string) []string { for i := 0; i < len(str)/2; i++ { j := len(str) - i - 1 str[i], str[j] = str[j], str[i] } return str } func GetInstalled(root string) []string { list := make([]semver.Version, 0) files, _ := ioutil.ReadDir(root) for i := len(files) - 1; i >= 0; i-- { if files[i].IsDir() || (files[i].Mode()&os.ModeSymlink == os.ModeSymlink) { isnode, _ := regexp.MatchString("v", files[i].Name()) if isnode { currentVersionString := strings.Replace(files[i].Name(), "v", "", 1) currentVersion, _ := semver.Make(currentVersionString) list = append(list, currentVersion) } } } semver.Sort(list) loggableList := make([]string, 0) for _, version := range list { loggableList = append(loggableList, "v"+version.String()) } loggableList = reverseStringArray(loggableList) return loggableList } // Sorting type BySemanticVersion []string func (s BySemanticVersion) Len() int { return len(s) } func (s BySemanticVersion) Swap(i, j int) { s[i], s[j] = s[j], s[i] } func (s BySemanticVersion) Less(i, j int) bool { v1, _ := semver.Make(s[i]) v2, _ := semver.Make(s[j]) return v1.GTE(v2) } // Identifies a version as "LTS" func isLTS(element map[string]interface{}) bool { switch datatype := element["lts"].(type) { case bool: return datatype case string: return true } return false } // Identifies a version as "current" func isCurrent(element map[string]interface{}) bool { if isLTS(element) { return false } version, _ := semver.Make(element["version"].(string)[1:]) benchmark, _ := semver.Make("1.0.0") if version.LT(benchmark) { return false } return true // return version.Major%2 == 1 } // Identifies a stable old version. func isStable(element map[string]interface{}) bool { if isCurrent(element) { return false } version, _ := semver.Make(element["version"].(string)[1:]) if version.Major != 0 { return false } return version.Minor%2 == 0 } // Identifies an unstable old version. func isUnstable(element map[string]interface{}) bool { if isStable(element) { return false } version, _ := semver.Make(element["version"].(string)[1:]) if version.Major != 0 { return false } return version.Minor%2 != 0 } // Retrieve the remotely available versions func GetAvailable() ([]string, []string, []string, []string, []string, map[string]string) { all := make([]string, 0) lts := make([]string, 0) current := make([]string, 0) stable := make([]string, 0) unstable := make([]string, 0) npm := make(map[string]string) url := web.GetFullNodeUrl("index.json") // Check the service to make sure the version is available text, err := web.GetRemoteTextFile(url) if err != nil { fmt.Println(err) os.Exit(1) } if len(text) == 0 { fmt.Println("Error retrieving version list: \"" + url + "\" returned blank results. This can happen when the remote file is being updated. Please try again in a few minutes.") os.Exit(0) } // Parse var data = make([]map[string]interface{}, 0) err = json.Unmarshal([]byte(text), &data) if err != nil { fmt.Printf("Error retrieving versions from \"%s\": %v", url, err.Error()) os.Exit(1) } for _, element := range data { var version = element["version"].(string)[1:] all = append(all, version) if val, ok := element["npm"].(string); ok { npm[version] = val } if isLTS(element) { lts = append(lts, version) } else if isCurrent(element) { current = append(current, version) } else if isStable(element) { stable = append(stable, version) } else if isUnstable(element) { unstable = append(unstable, version) } } return all, lts, current, stable, unstable, npm }
go
MIT
883c0dea378ba991c7dc38ea5a39e6d5fc56453f
2026-01-07T08:35:46.109469Z
false
coreybutler/nvm-windows
https://github.com/coreybutler/nvm-windows/blob/883c0dea378ba991c7dc38ea5a39e6d5fc56453f/src/author/bridge.go
src/author/bridge.go
package author import ( "bufio" "fmt" "os" "os/exec" "path/filepath" "strings" "syscall" "time" "github.com/coreybutler/go-fsutil" "golang.org/x/sys/windows" ) const ( // Constants for SetWindowPos SWP_NOMOVE = 0x0002 SWP_NOZORDER = 0x0004 SWP_SHOWWINDOW = 0x0040 SW_HIDE = 0 // Hide the window (for the main console window) ) var ( modkernel32 = syscall.NewLazyDLL("kernel32.dll") moduser32 = syscall.NewLazyDLL("user32.dll") procGetConsole = modkernel32.NewProc("GetConsoleWindow") procShowWindow = moduser32.NewProc("ShowWindow") ) // Hide the main console window (the one running the Go app) func hideConsole() { hwnd, _, _ := procGetConsole.Call() if hwnd != 0 { procShowWindow.Call(hwnd, uintptr(SW_HIDE)) // Hide the main console window } } func Bridge(args ...string) { exe, _ := os.Executable() bridge := filepath.Join(filepath.Dir(exe), "author-nvm.exe") if !fsutil.Exists(bridge) { fmt.Println("error: author bridge not found") os.Exit(1) } if len(args) < 2 { if !(len(args) == 1 && args[0] == "version") { fmt.Printf("error: invalid number of arguments passed to author bridge: %d\n", len(args)) os.Exit(1) } } command := args[0] args = args[1:] // fmt.Printf("running author bridge: %s %v\n", command, args) hideConsole() cmd := exec.Command(bridge, append([]string{command}, args...)...) cmd.SysProcAttr = &windows.SysProcAttr{ CreationFlags: windows.CREATE_NEW_PROCESS_GROUP | windows.DETACHED_PROCESS | windows.CREATE_NO_WINDOW, } // Create pipes for Stdout and Stderr stdoutPipe, _ := cmd.StdoutPipe() stderrPipe, _ := cmd.StderrPipe() // Start the command if err := cmd.Start(); err != nil { fmt.Println("error starting bridge command:", err) os.Exit(1) } // Stream Stdout go func() { scanner := bufio.NewScanner(stdoutPipe) for scanner.Scan() { fmt.Println(scanner.Text()) } }() // Stream Stderr go func() { scanner := bufio.NewScanner(stderrPipe) for scanner.Scan() { fmt.Println(scanner.Text()) } }() if command == "upgrade" { for _, arg := range args { if strings.Contains(arg, "--rollback") { fmt.Println("exiting to rollback nvm.exe...") time.Sleep(1 * time.Second) os.Exit(0) } } } // Wait for the command to finish if err := cmd.Wait(); err != nil { fmt.Println("bridge command finished with error:", err) } }
go
MIT
883c0dea378ba991c7dc38ea5a39e6d5fc56453f
2026-01-07T08:35:46.109469Z
false
coreybutler/nvm-windows
https://github.com/coreybutler/nvm-windows/blob/883c0dea378ba991c7dc38ea5a39e6d5fc56453f/src/arch/arch.go
src/arch/arch.go
package arch import ( //"regexp" "os" //"os/exec" "strings" //"fmt" "encoding/hex" ) func SearchBytesInFile( path string, match string, limit int) bool { // Transform to byte array the string toMatch, err := hex.DecodeString(match); if (err != nil) { return false; } // Opening the file and checking if there is an error file, err := os.Open(path) if err != nil { return false; } // Close file upon return defer file.Close() // Allocate 1 byte array to perform the match bit := make([]byte, 1); j := 0 for i := 0; i < limit; i++ { file.Read(bit); if bit[0] != toMatch[j] { j = 0; } if bit[0] == toMatch[j] { j++; if (j >= len(toMatch)) { file.Close(); return true; } } } file.Close(); return false; } func Bit(path string) string { isarm64 := SearchBytesInFile(path, "5045000064AA", 400) is64 := SearchBytesInFile(path, "504500006486", 400); is32 := SearchBytesInFile(path, "504500004C", 400); if isarm64 { return "arm64"; } else if is64 { return "64"; } else if is32 { return "32"; } return "?"; } func Validate(str string) (string){ if str == "" { str = strings.ToLower(os.Getenv("PROCESSOR_ARCHITECTURE")) } if strings.Contains(str, "arm64") { return "arm64" } if strings.Contains(str, "64") { return "64" } return "32" }
go
MIT
883c0dea378ba991c7dc38ea5a39e6d5fc56453f
2026-01-07T08:35:46.109469Z
false
coreybutler/nvm-windows
https://github.com/coreybutler/nvm-windows/blob/883c0dea378ba991c7dc38ea5a39e6d5fc56453f/src/semver/semver.go
src/semver/semver.go
/** * Used under the MIT License. * Semver courtesy Benedikt Lang (https://github.com/blang) */ package semver import ( "errors" "fmt" "strconv" "strings" ) const ( numbers string = "0123456789" alphas = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ-" alphanum = alphas + numbers dot = "." hyphen = "-" plus = "+" ) // Latest fully supported spec version var SPEC_VERSION = Version{ Major: 2, Minor: 0, Patch: 0, } type Version struct { Major uint64 Minor uint64 Patch uint64 Pre []*PRVersion Build []string //No Precedence } // Version to string func (v *Version) String() string { versionArray := []string{ strconv.FormatUint(v.Major, 10), dot, strconv.FormatUint(v.Minor, 10), dot, strconv.FormatUint(v.Patch, 10), } if len(v.Pre) > 0 { versionArray = append(versionArray, hyphen) for i, pre := range v.Pre { if i > 0 { versionArray = append(versionArray, dot) } versionArray = append(versionArray, pre.String()) } } if len(v.Build) > 0 { versionArray = append(versionArray, plus, strings.Join(v.Build, dot)) } return strings.Join(versionArray, "") } // Checks if v is greater than o. func (v *Version) GT(o *Version) bool { return (v.Compare(o) == 1) } // Checks if v is greater than or equal to o. func (v *Version) GTE(o *Version) bool { return (v.Compare(o) >= 0) } // Checks if v is less than o. func (v *Version) LT(o *Version) bool { return (v.Compare(o) == -1) } // Checks if v is less than or equal to o. func (v *Version) LTE(o *Version) bool { return (v.Compare(o) <= 0) } // Compares Versions v to o: // -1 == v is less than o // 0 == v is equal to o // 1 == v is greater than o func (v *Version) Compare(o *Version) int { if v.Major != o.Major { if v.Major > o.Major { return 1 } else { return -1 } } if v.Minor != o.Minor { if v.Minor > o.Minor { return 1 } else { return -1 } } if v.Patch != o.Patch { if v.Patch > o.Patch { return 1 } else { return -1 } } // Quick comparison if a version has no prerelease versions if len(v.Pre) == 0 && len(o.Pre) == 0 { return 0 } else if len(v.Pre) == 0 && len(o.Pre) > 0 { return 1 } else if len(v.Pre) > 0 && len(o.Pre) == 0 { return -1 } else { i := 0 for ; i < len(v.Pre) && i < len(o.Pre); i++ { if comp := v.Pre[i].Compare(o.Pre[i]); comp == 0 { continue } else if comp == 1 { return 1 } else { return -1 } } // If all pr versions are the equal but one has further pr version, this one greater if i == len(v.Pre) && i == len(o.Pre) { return 0 } else if i == len(v.Pre) && i < len(o.Pre) { return -1 } else { return 1 } } } // Validates v and returns error in case func (v *Version) Validate() error { // Major, Minor, Patch already validated using uint64 if len(v.Pre) > 0 { for _, pre := range v.Pre { if !pre.IsNum { //Numeric prerelease versions already uint64 if len(pre.VersionStr) == 0 { return fmt.Errorf("Prerelease can not be empty %q", pre.VersionStr) } if !containsOnly(pre.VersionStr, alphanum) { return fmt.Errorf("Invalid character(s) found in prerelease %q", pre.VersionStr) } } } } if len(v.Build) > 0 { for _, build := range v.Build { if len(build) == 0 { return fmt.Errorf("Build meta data can not be empty %q", build) } if !containsOnly(build, alphanum) { return fmt.Errorf("Invalid character(s) found in build meta data %q", build) } } } return nil } // Alias for Parse, parses version string and returns a validated Version or error func New(s string) (*Version, error) { return Parse(s) } // Parses version string and returns a validated Version or error func Parse(s string) (*Version, error) { s = strings.Replace(s, "v", "", 1) if len(s) == 0 { return nil, errors.New("Version string empty") } // Split into major.minor.(patch+pr+meta) parts := strings.SplitN(s, ".", 3) if len(parts) != 3 { return nil, errors.New("No Major.Minor.Patch elements found") } // Major if !containsOnly(parts[0], numbers) { return nil, fmt.Errorf("Invalid character(s) found in major number %q", parts[0]) } if hasLeadingZeroes(parts[0]) { return nil, fmt.Errorf("Major number must not contain leading zeroes %q", parts[0]) } major, err := strconv.ParseUint(parts[0], 10, 64) if err != nil { return nil, err } // Minor if !containsOnly(parts[1], numbers) { return nil, fmt.Errorf("Invalid character(s) found in minor number %q", parts[1]) } if hasLeadingZeroes(parts[1]) { return nil, fmt.Errorf("Minor number must not contain leading zeroes %q", parts[1]) } minor, err := strconv.ParseUint(parts[1], 10, 64) if err != nil { return nil, err } preIndex := strings.Index(parts[2], "-") buildIndex := strings.Index(parts[2], "+") // Determine last index of patch version (first of pre or build versions) var subVersionIndex int if preIndex != -1 && buildIndex == -1 { subVersionIndex = preIndex } else if preIndex == -1 && buildIndex != -1 { subVersionIndex = buildIndex } else if preIndex == -1 && buildIndex == -1 { subVersionIndex = len(parts[2]) } else { // if there is no actual pr version but a hyphen inside the build meta data if buildIndex < preIndex { subVersionIndex = buildIndex preIndex = -1 // Build meta data before preIndex found implicates there are no prerelease versions } else { subVersionIndex = preIndex } } if !containsOnly(parts[2][:subVersionIndex], numbers) { return nil, fmt.Errorf("Invalid character(s) found in patch number %q", parts[2][:subVersionIndex]) } if hasLeadingZeroes(parts[2][:subVersionIndex]) { return nil, fmt.Errorf("Patch number must not contain leading zeroes %q", parts[2][:subVersionIndex]) } patch, err := strconv.ParseUint(parts[2][:subVersionIndex], 10, 64) if err != nil { return nil, err } v := &Version{} v.Major = major v.Minor = minor v.Patch = patch // There are PreRelease versions if preIndex != -1 { var preRels string if buildIndex != -1 { preRels = parts[2][subVersionIndex+1 : buildIndex] } else { preRels = parts[2][subVersionIndex+1:] } prparts := strings.Split(preRels, ".") for _, prstr := range prparts { parsedPR, err := NewPRVersion(prstr) if err != nil { return nil, err } v.Pre = append(v.Pre, parsedPR) } } // There is build meta data if buildIndex != -1 { buildStr := parts[2][buildIndex+1:] buildParts := strings.Split(buildStr, ".") for _, str := range buildParts { if len(str) == 0 { return nil, errors.New("Build meta data is empty") } if !containsOnly(str, alphanum) { return nil, fmt.Errorf("Invalid character(s) found in build meta data %q", str) } v.Build = append(v.Build, str) } } return v, nil } // PreRelease Version type PRVersion struct { VersionStr string VersionNum uint64 IsNum bool } // Creates a new valid prerelease version func NewPRVersion(s string) (*PRVersion, error) { if len(s) == 0 { return nil, errors.New("Prerelease is empty") } v := &PRVersion{} if containsOnly(s, numbers) { if hasLeadingZeroes(s) { return nil, fmt.Errorf("Numeric PreRelease version must not contain leading zeroes %q", s) } num, err := strconv.ParseUint(s, 10, 64) // Might never be hit, but just in case if err != nil { return nil, err } v.VersionNum = num v.IsNum = true } else if containsOnly(s, alphanum) { v.VersionStr = s v.IsNum = false } else { return nil, fmt.Errorf("Invalid character(s) found in prerelease %q", s) } return v, nil } // Is pre release version numeric? func (v *PRVersion) IsNumeric() bool { return v.IsNum } // Compares PreRelease Versions v to o: // -1 == v is less than o // 0 == v is equal to o // 1 == v is greater than o func (v *PRVersion) Compare(o *PRVersion) int { if v.IsNum && !o.IsNum { return -1 } else if !v.IsNum && o.IsNum { return 1 } else if v.IsNum && o.IsNum { if v.VersionNum == o.VersionNum { return 0 } else if v.VersionNum > o.VersionNum { return 1 } else { return -1 } } else { // both are Alphas if v.VersionStr == o.VersionStr { return 0 } else if v.VersionStr > o.VersionStr { return 1 } else { return -1 } } } // PreRelease version to string func (v *PRVersion) String() string { if v.IsNum { return strconv.FormatUint(v.VersionNum, 10) } return v.VersionStr } func containsOnly(s string, set string) bool { return strings.IndexFunc(s, func(r rune) bool { return !strings.ContainsRune(set, r) }) == -1 } func hasLeadingZeroes(s string) bool { return len(s) > 1 && s[0] == '0' } // Creates a new valid build version func NewBuildVersion(s string) (string, error) { if len(s) == 0 { return "", errors.New("Buildversion is empty") } if !containsOnly(s, alphanum) { return "", fmt.Errorf("Invalid character(s) found in build meta data %q", s) } return s, nil }
go
MIT
883c0dea378ba991c7dc38ea5a39e6d5fc56453f
2026-01-07T08:35:46.109469Z
false
coreybutler/nvm-windows
https://github.com/coreybutler/nvm-windows/blob/883c0dea378ba991c7dc38ea5a39e6d5fc56453f/src/web/web.go
src/web/web.go
package web import ( "crypto/tls" "fmt" "io" "io/ioutil" "net" "net/http" "net/url" "nvm/arch" "nvm/file" "os" "os/exec" "os/signal" "path/filepath" "strconv" "strings" "syscall" "nvm/utility" "archive/zip" "github.com/blang/semver" fs "github.com/coreybutler/go-fsutil" ) var nvmversion = "" var client = &http.Client{} var nodeBaseAddress = "https://nodejs.org/dist/" var npmBaseAddress = "https://github.com/npm/cli/archive/" // var oldNpmBaseAddress = "https://github.com/npm/npm/archive/" func SetProxy(p string, verifyssl bool) { if p != "" && p != "none" { proxyUrl, _ := url.Parse(p) client = &http.Client{Transport: &http.Transport{Proxy: http.ProxyURL(proxyUrl), TLSClientConfig: &tls.Config{InsecureSkipVerify: verifyssl}}} } else { client = &http.Client{Transport: &http.Transport{TLSClientConfig: &tls.Config{InsecureSkipVerify: verifyssl}}} } } func SetMirrors(node_mirror string, npm_mirror string) { if node_mirror != "" && node_mirror != "none" { nodeBaseAddress = node_mirror if strings.ToLower(nodeBaseAddress[0:4]) != "http" { nodeBaseAddress = "http://" + nodeBaseAddress } if !strings.HasSuffix(nodeBaseAddress, "/") { nodeBaseAddress = nodeBaseAddress + "/" } } if npm_mirror != "" && npm_mirror != "none" { npmBaseAddress = npm_mirror if strings.ToLower(npmBaseAddress[0:4]) != "http" { npmBaseAddress = "http://" + npmBaseAddress } if !strings.HasSuffix(npmBaseAddress, "/") { npmBaseAddress = npmBaseAddress + "/" } } } func GetFullNodeUrl(path string) string { return nodeBaseAddress + path } func GetFullNpmUrl(path string) string { return npmBaseAddress + path } func IsLocalIPv6() (bool, error) { conn, err := net.Dial("tcp", "[::1]:80") if err != nil { if strings.Contains(strings.ToLower(err.Error()), "no connection") { return false, nil } return false, err } defer conn.Close() return true, nil // addrs, err := net.InterfaceAddrs() // if err != nil { // return false, err // } // for _, addr := range addrs { // fmt.Println(addr.String()) // if strings.Contains(addr.String(), ":") { // return true, nil // } // } // return false, nil } // Returns whether the address can be pinged and whether it is using IPv6 or not func Ping(url string) bool { req, err := http.NewRequest("HEAD", url, nil) if err != nil { fmt.Println(err) return false } req.Header.Set("User-Agent", "NVM for Windows") response, err := client.Do(req) if err != nil { return false } if response.StatusCode == 200 { return true } return false } func Download(url string, target string, version string) bool { output, err := os.Create(target) if err != nil { fmt.Println("Error while creating", target, "-", err) return false } defer output.Close() req, err := http.NewRequest("GET", url, nil) if err != nil { fmt.Println(err) return false } req.Header.Set("User-Agent", fmt.Sprintf("NVM for Windows %s", nvmversion)) response, err := client.Do(req) if err != nil { fmt.Println("Error while downloading", url, "-", err) return false } defer response.Body.Close() c := make(chan os.Signal, 2) signal.Notify(c, os.Interrupt, syscall.SIGTERM) go func() { <-c fmt.Println("Download interrupted. Rolling back...") output.Close() response.Body.Close() var err error if strings.Contains(target, "node") { err = os.RemoveAll(os.Getenv("NVM_HOME") + "\\v" + version) } else { err = os.Remove(target) } if err != nil { fmt.Println("Error while rolling back", err) } os.Exit(1) }() var body []byte if response.StatusCode != 200 { body, err = ioutil.ReadAll(response.Body) if err != nil { fmt.Println("Failed to read response body: " + err.Error()) } } else { _, err = io.Copy(output, response.Body) if err != nil { fmt.Printf("Error while downloading %s: %v\n", url, err) } } redirect := response.Header.Get("Location") switch response.StatusCode { case 300: if len(redirect) > 0 && redirect != url { return Download(redirect, target, version) } if strings.Contains(url, "/npm/cli/archive/v6.14.17.zip") { return Download("https://github.com/npm/cli/archive/refs/tags/v6.14.17.zip", target, version) } fmt.Printf("\n\nREMOTE SERVER FAILURE\n\n---\nGET %v --> %v\n\n", url, response.StatusCode) for key, val := range response.Header { fmt.Printf("%v: %v\n", key, val) } if len(body) > 0 { fmt.Printf("\n%s", body) } fmt.Println("\n---\n\n") return false case 302: fallthrough case 307: fmt.Println("Redirecting to " + redirect) return Download(redirect, target, version) case 200: // No processing necessary for successful response default: fmt.Println("Download failed. Rolling Back.") err := os.Remove(target) if err != nil { fmt.Println(target) fmt.Println("Rollback failed.", err) } return false } return true } func GetNodeJS(root string, v string, a string, append bool) bool { utility.DebugLogf("running GetNodeJS with root: %v, v%v, arch: %v, append: %v", root, v, a, append) a = arch.Validate(a) vpre := "" vers := strings.Fields(strings.Replace(v, ".", " ", -1)) main, _ := strconv.ParseInt(vers[0], 0, 0) if a == "32" { if main > 0 { vpre = "win-x86/" } else { vpre = "" } } else if a == "64" { if main > 0 { vpre = "win-x64/" } else { vpre = "x64/" } } else if a == "arm64" { if main > 0 { vpre = "win-arm64/" } else { vpre = "arm64/" } } url := getNodeUrl(v, vpre, a, append) utility.DebugLogf("download url: %v", url) if url == "" { //No url should mean this version/arch isn't available fmt.Println("Node.js v" + v + " " + a + "bit isn't available right now.") } else { fileName := root + "\\v" + v + "\\node" + a + ".exe" if strings.HasSuffix(url, ".zip") { fileName = root + "\\v" + v + "\\node.zip" } fmt.Println("Downloading node.js version " + v + " (" + a + "-bit)... ") if Download(url, fileName, v) { utility.DebugLog("download succeeded") // Extract the zip file if strings.HasSuffix(url, ".zip") { fmt.Println("Extracting node and npm...") utility.DebugLogf("extracting %v to %v", fileName, root+"\\v"+v) err := unzip(fileName, root+"\\v"+v) if err != nil { fmt.Println("Error extracting from Node archive: " + err.Error()) err = os.Remove(fileName) if err != nil { fmt.Printf("Failed to remove %v after failed extraction. Please remove manually.", fileName) } utility.DebugLogf("removed %v", fileName) return false } err = os.Remove(fileName) if err != nil { fmt.Printf("Failed to remove %v after successful extraction. Please remove manually.", fileName) } utility.DebugLogf("removed %v", fileName) zip := root + "\\v" + v + "\\" + strings.Replace(filepath.Base(url), ".zip", "", 1) utility.DebugLogf("moving %v to %v", zip, root+"\\v"+v) err = fs.Move(zip, root+"\\v"+v, true) if err != nil { fmt.Println("ERROR moving file: " + err.Error()) } utility.DebugLog("move succeeded") err = os.RemoveAll(zip) if err != nil { fmt.Printf("Failed to remove %v after successful extraction. Please remove manually.", zip) } utility.DebugLogf("removed %v", zip) utility.DebugFn(func() { cmd := exec.Command("cmd", "/C", "dir", root+"\\v"+v) out, err := cmd.CombinedOutput() if err != nil { utility.DebugLog(err.Error()) } else { utility.DebugLog(string(out)) } }) } fmt.Println("Complete") return true } else { utility.DebugLog("download failed") return false } } return false } func GetNpm(root string, v string) bool { url := GetFullNpmUrl("v" + v + ".zip") // temp directory to download the .zip file tempDir := root + "\\temp" utility.DebugLogf("downloading npm from %v to %v", url, tempDir) // if the temp directory doesn't exist, create it if !file.Exists(tempDir) { fmt.Println("Creating " + tempDir + "\n") err := os.Mkdir(tempDir, os.ModePerm) if err != nil { fmt.Println(err) os.Exit(1) } } fileName := tempDir + "\\" + "npm-v" + v + ".zip" fmt.Printf("Downloading npm version " + v + "... ") if Download(url, fileName, v) { utility.DebugLog("npm download succeeded") fmt.Printf("Complete\n") return true } else { utility.DebugLog("npm download failed") return false } } func GetRemoteTextFile(url string) (string, error) { response, httperr := client.Get(url) if httperr != nil { return "", fmt.Errorf("Could not retrieve %v: %v", url, httperr) } if response.StatusCode != 200 { return "", fmt.Errorf("Error retrieving \"%s\": HTTP Status %v\n", url, response.StatusCode) } defer response.Body.Close() contents, readerr := ioutil.ReadAll(response.Body) if readerr != nil { return "", fmt.Errorf("error reading HTTP request body: %v", readerr) } return string(contents), nil } func IsNode64bitAvailable(v string) bool { if v == "latest" { return true } // Anything below version 8 doesn't have a 64 bit version vers := strings.Fields(strings.Replace(v, ".", " ", -1)) main, _ := strconv.ParseInt(vers[0], 0, 0) minor, _ := strconv.ParseInt(vers[1], 0, 0) if main == 0 && minor < 8 { return false } // TODO: fixme. Assume a 64 bit version exists return true } func IsNodeArm64bitAvailable(v string) bool { if v == "latest" { return true } // Anything below version 19.9 doesn't have a arm64 bit version vers := strings.Fields(strings.Replace(v, ".", " ", -1)) main, _ := strconv.ParseInt(vers[0], 0, 0) minor, _ := strconv.ParseInt(vers[1], 0, 0) fmt.Println("main " + strconv.FormatInt(main, 10) + " minor " + strconv.FormatInt(minor, 10)) if main < 19 { return false } if main == 19 && minor < 9 { return false } // TODO: fixme. Assume a 64 bit version exists return true } func getNodeUrl(v string, vpre string, arch string, append bool) string { a := "x86" if arch == "arm64" { a = "arm64" } if arch == "64" { a = "x64" } //url := "http://nodejs.org/dist/v"+v+"/" + vpre + "/node.exe" url := GetFullNodeUrl("v" + v + "/" + vpre + "node.exe") if !append { version, err := semver.Make(v) if err != nil { fmt.Println("Node.js v" + v + " " + a + "bit isn't available right now.") fmt.Println(err.Error()) os.Exit(1) } corepack, _ := semver.Make("16.9.0") if version.GTE(corepack) { url = GetFullNodeUrl("v" + v + "/node-v" + v + "-win-" + a + ".zip") } } // Check online to see if a 64 bit version exists _, err := client.Head(url) if err != nil { return "" } return url } func unzip(src, dest string) error { r, err := zip.OpenReader(src) if err != nil { return err } defer func() { if err := r.Close(); err != nil { panic(err) } }() os.MkdirAll(dest, 0755) // Closure to address file descriptors issue with all the deferred .Close() methods extractAndWriteFile := func(f *zip.File) error { rc, err := f.Open() if err != nil { return err } defer func() { if err := rc.Close(); err != nil { panic(err) } }() path := filepath.Join(dest, f.Name) // Check for ZipSlip (Directory traversal) if !strings.HasPrefix(path, filepath.Clean(dest)+string(os.PathSeparator)) { return fmt.Errorf("illegal file path: %s", path) } if f.FileInfo().IsDir() { os.MkdirAll(path, f.Mode()) } else { os.MkdirAll(filepath.Dir(path), f.Mode()) f, err := os.OpenFile(path, os.O_WRONLY|os.O_CREATE|os.O_TRUNC, f.Mode()) if err != nil { return err } defer func() { if err := f.Close(); err != nil { panic(err) } }() _, err = io.Copy(f, rc) if err != nil { return err } } return nil } for _, f := range r.File { err := extractAndWriteFile(f) if err != nil { return err } } return nil }
go
MIT
883c0dea378ba991c7dc38ea5a39e6d5fc56453f
2026-01-07T08:35:46.109469Z
false
coreybutler/nvm-windows
https://github.com/coreybutler/nvm-windows/blob/883c0dea378ba991c7dc38ea5a39e6d5fc56453f/src/utility/logging.go
src/utility/logging.go
package utility import ( "fmt" "os" "path/filepath" "runtime" "strings" "syscall" ) var debug bool = false var exe string var path string const ( // Enable virtual terminal processing on Windows (required to interpret ANSI escape codes) enableVirtualTerminalProcessing = 0x0004 BOLD = "\033[38;2;255;165;0m" TEXT = "\033[38;2;255;200;100m" RESET = "\033[0m" ) func enableANSI() { kernel32 := syscall.NewLazyDLL("kernel32.dll") setConsoleMode := kernel32.NewProc("SetConsoleMode") stdout := syscall.Stdout // Get the current console mode var mode uint32 err := syscall.GetConsoleMode(stdout, &mode) if err != nil { fmt.Println("Error getting console mode:", err) return } // Enable virtual terminal processing mode |= enableVirtualTerminalProcessing _, _, err = setConsoleMode.Call(uintptr(stdout), uintptr(mode)) if err != nil && err.Error() != "The operation completed successfully." { fmt.Println("Error enabling ANSI:", err) } } func bold(text string) string { return BOLD + text + RESET } func text(txt string) string { return TEXT + txt + RESET } func EnableDebugLogs() { debug = true exe, _ = os.Executable() path = filepath.Join(filepath.Dir(exe), "..") enableANSI() } func DebugLog(args ...interface{}) { if debug { _, file, line, _ := runtime.Caller(1) for _, arg := range args { fmt.Printf(bold("[DEBUG] %v:%v")+" "+text("%v")+"\n", strings.Replace(filepath.ToSlash(file), filepath.ToSlash(path), "..", 1), line, arg) } } } func DebugLogf(tpl string, args ...interface{}) { if debug { _, file, line, _ := runtime.Caller(1) fmt.Printf(bold("[DEBUG] %v:%v")+" "+text("%v")+"\n", strings.Replace(filepath.ToSlash(file), filepath.ToSlash(path), "..", 1), line, fmt.Sprintf(tpl, args...)) } } func DebugFn(fn func()) { if debug { fn() } }
go
MIT
883c0dea378ba991c7dc38ea5a39e6d5fc56453f
2026-01-07T08:35:46.109469Z
false
coreybutler/nvm-windows
https://github.com/coreybutler/nvm-windows/blob/883c0dea378ba991c7dc38ea5a39e6d5fc56453f/src/utility/rename.go
src/utility/rename.go
package utility import ( "fmt" "io" "os" "path/filepath" ) func Rename(old, new string) error { old_drive := filepath.VolumeName(old) new_drive := filepath.VolumeName(new) if old_drive == new_drive { return os.Rename(old, new) } // Get file or directory info info, err := os.Stat(old) if err != nil { return fmt.Errorf("failed to stat source: %w", err) } // If old is a directory, copy recursively if info.IsDir() { err = copyDir(old, new) if err != nil { return fmt.Errorf("failed to copy directory: %w", err) } } else { // Otherwise, copy a single file err = copyFile(old, new) if err != nil { return fmt.Errorf("failed to copy file: %w", err) } } // Remove the original source err = os.RemoveAll(old) if err != nil { return fmt.Errorf("failed to remove source: %w", err) } return nil } // copyFile copies a single file from source (old) to destination (new). func copyFile(old, new string) error { srcFile, err := os.Open(old) if err != nil { return fmt.Errorf("failed to open source file: %w", err) } defer srcFile.Close() // Ensure destination directory exists destDir := filepath.Dir(new) err = os.MkdirAll(destDir, os.ModePerm) if err != nil { return fmt.Errorf("failed to create destination directory: %w", err) } destFile, err := os.Create(new) if err != nil { return fmt.Errorf("failed to create destination file: %w", err) } defer destFile.Close() _, err = io.Copy(destFile, srcFile) if err != nil { return fmt.Errorf("failed to copy data: %w", err) } // Copy file permissions info, err := srcFile.Stat() if err != nil { return fmt.Errorf("failed to get source file info: %w", err) } err = os.Chmod(new, info.Mode()) if err != nil { return fmt.Errorf("failed to set permissions on destination file: %w", err) } return nil } // copyDir recursively copies a directory from old path to new path. func copyDir(old, new string) error { entries, err := os.ReadDir(old) if err != nil { return fmt.Errorf("failed to read source directory: %w", err) } // Ensure destination directory exists err = os.MkdirAll(new, os.ModePerm) if err != nil { return fmt.Errorf("failed to create destination directory: %w", err) } for _, entry := range entries { srcPath := filepath.Join(old, entry.Name()) destPath := filepath.Join(new, entry.Name()) if entry.IsDir() { err = copyDir(srcPath, destPath) if err != nil { return fmt.Errorf("failed to copy subdirectory: %w", err) } } else { err = copyFile(srcPath, destPath) if err != nil { return fmt.Errorf("failed to copy file: %w", err) } } } return nil }
go
MIT
883c0dea378ba991c7dc38ea5a39e6d5fc56453f
2026-01-07T08:35:46.109469Z
false
go-gorm/gorm
https://github.com/go-gorm/gorm/blob/0d9141bad9772c6047ecfdb2819d8a52d27ceb65/statement.go
statement.go
package gorm import ( "context" "database/sql" "database/sql/driver" "fmt" "reflect" "regexp" "sort" "strconv" "strings" "sync" "gorm.io/gorm/clause" "gorm.io/gorm/logger" "gorm.io/gorm/schema" "gorm.io/gorm/utils" ) // Statement statement type Statement struct { *DB TableExpr *clause.Expr Table string Model interface{} Unscoped bool Dest interface{} ReflectValue reflect.Value Clauses map[string]clause.Clause BuildClauses []string Distinct bool Selects []string // selected columns Omits []string // omit columns ColumnMapping map[string]string // map columns Joins []join Preloads map[string][]interface{} Settings sync.Map ConnPool ConnPool Schema *schema.Schema Context context.Context RaiseErrorOnNotFound bool SkipHooks bool SQL strings.Builder Vars []interface{} CurDestIndex int attrs []interface{} assigns []interface{} scopes []func(*DB) *DB Result *result } type join struct { Name string Alias string Conds []interface{} On *clause.Where Selects []string Omits []string Expression clause.Expression JoinType clause.JoinType } // StatementModifier statement modifier interface type StatementModifier interface { ModifyStatement(*Statement) } // WriteString write string func (stmt *Statement) WriteString(str string) (int, error) { return stmt.SQL.WriteString(str) } // WriteByte write byte func (stmt *Statement) WriteByte(c byte) error { return stmt.SQL.WriteByte(c) } // WriteQuoted write quoted value func (stmt *Statement) WriteQuoted(value interface{}) { stmt.QuoteTo(&stmt.SQL, value) } // QuoteTo write quoted value to writer func (stmt *Statement) QuoteTo(writer clause.Writer, field interface{}) { write := func(raw bool, str string) { if raw { writer.WriteString(str) } else { stmt.DB.Dialector.QuoteTo(writer, str) } } switch v := field.(type) { case clause.Table: if v.Name == clause.CurrentTable { if stmt.TableExpr != nil { stmt.TableExpr.Build(stmt) } else if stmt.Table != "" { write(v.Raw, stmt.Table) } else if stmt.AddError(stmt.Parse(stmt.Model)) == nil { write(v.Raw, stmt.Table) } } else { write(v.Raw, v.Name) } if v.Alias != "" { writer.WriteByte(' ') write(v.Raw, v.Alias) } case clause.Column: if v.Table != "" { if v.Table == clause.CurrentTable { write(v.Raw, stmt.Table) } else { write(v.Raw, v.Table) } writer.WriteByte('.') } if v.Name == clause.PrimaryKey { if stmt.Schema == nil { stmt.DB.AddError(ErrModelValueRequired) } else if stmt.Schema.PrioritizedPrimaryField != nil { write(v.Raw, stmt.Schema.PrioritizedPrimaryField.DBName) } else if len(stmt.Schema.DBNames) > 0 { write(v.Raw, stmt.Schema.DBNames[0]) } else { stmt.DB.AddError(ErrModelAccessibleFieldsRequired) //nolint:typecheck,errcheck } } else { write(v.Raw, v.Name) } if v.Alias != "" { writer.WriteString(" AS ") write(v.Raw, v.Alias) } case []clause.Column: writer.WriteByte('(') for idx, d := range v { if idx > 0 { writer.WriteByte(',') } stmt.QuoteTo(writer, d) } writer.WriteByte(')') case clause.Expr: v.Build(stmt) case string: stmt.DB.Dialector.QuoteTo(writer, v) case []string: writer.WriteByte('(') for idx, d := range v { if idx > 0 { writer.WriteByte(',') } stmt.DB.Dialector.QuoteTo(writer, d) } writer.WriteByte(')') default: stmt.DB.Dialector.QuoteTo(writer, fmt.Sprint(field)) } } // Quote returns quoted value func (stmt *Statement) Quote(field interface{}) string { var builder strings.Builder stmt.QuoteTo(&builder, field) return builder.String() } // AddVar add var func (stmt *Statement) AddVar(writer clause.Writer, vars ...interface{}) { for idx, v := range vars { if idx > 0 { writer.WriteByte(',') } switch v := v.(type) { case sql.NamedArg: stmt.Vars = append(stmt.Vars, v.Value) case clause.Column, clause.Table: stmt.QuoteTo(writer, v) case Valuer: reflectValue := reflect.ValueOf(v) if reflectValue.Kind() == reflect.Ptr && reflectValue.IsNil() { stmt.AddVar(writer, nil) } else { stmt.AddVar(writer, v.GormValue(stmt.Context, stmt.DB)) } case clause.Interface: c := clause.Clause{Name: v.Name()} v.MergeClause(&c) c.Build(stmt) case clause.Expression: v.Build(stmt) case driver.Valuer: stmt.Vars = append(stmt.Vars, v) stmt.DB.Dialector.BindVarTo(writer, stmt, v) case []byte: stmt.Vars = append(stmt.Vars, v) stmt.DB.Dialector.BindVarTo(writer, stmt, v) case []interface{}: if len(v) > 0 { writer.WriteByte('(') stmt.AddVar(writer, v...) writer.WriteByte(')') } else { writer.WriteString("(NULL)") } case interface{ getInstance() *DB }: cv := v.getInstance() subdb := cv.Session(&Session{Logger: logger.Discard, DryRun: true}).getInstance() if cv.Statement.SQL.Len() > 0 { var ( vars = subdb.Statement.Vars sql = cv.Statement.SQL.String() ) subdb.Statement.Vars = make([]interface{}, 0, len(vars)) for _, vv := range vars { subdb.Statement.Vars = append(subdb.Statement.Vars, vv) bindvar := strings.Builder{} cv.BindVarTo(&bindvar, subdb.Statement, vv) sql = strings.Replace(sql, bindvar.String(), "?", 1) } subdb.Statement.SQL.Reset() subdb.Statement.Vars = stmt.Vars if strings.Contains(sql, "@") { clause.NamedExpr{SQL: sql, Vars: vars}.Build(subdb.Statement) } else { clause.Expr{SQL: sql, Vars: vars}.Build(subdb.Statement) } } else { subdb.Statement.Vars = append(stmt.Vars, subdb.Statement.Vars...) subdb.callbacks.Query().Execute(subdb) } writer.WriteString(subdb.Statement.SQL.String()) stmt.Vars = subdb.Statement.Vars default: switch rv := reflect.ValueOf(v); rv.Kind() { case reflect.Slice, reflect.Array: if rv.Len() == 0 { writer.WriteString("(NULL)") } else if rv.Type().Elem() == reflect.TypeOf(uint8(0)) { stmt.Vars = append(stmt.Vars, v) stmt.DB.Dialector.BindVarTo(writer, stmt, v) } else { writer.WriteByte('(') for i := 0; i < rv.Len(); i++ { if i > 0 { writer.WriteByte(',') } stmt.AddVar(writer, rv.Index(i).Interface()) } writer.WriteByte(')') } default: stmt.Vars = append(stmt.Vars, v) stmt.DB.Dialector.BindVarTo(writer, stmt, v) } } } } // AddClause add clause func (stmt *Statement) AddClause(v clause.Interface) { if optimizer, ok := v.(StatementModifier); ok { optimizer.ModifyStatement(stmt) } else { name := v.Name() c := stmt.Clauses[name] c.Name = name v.MergeClause(&c) stmt.Clauses[name] = c } } // AddClauseIfNotExists add clause if not exists func (stmt *Statement) AddClauseIfNotExists(v clause.Interface) { if c, ok := stmt.Clauses[v.Name()]; !ok || c.Expression == nil { stmt.AddClause(v) } } // BuildCondition build condition func (stmt *Statement) BuildCondition(query interface{}, args ...interface{}) []clause.Expression { if s, ok := query.(string); ok { // if it is a number, then treats it as primary key if _, err := strconv.Atoi(s); err != nil { if s == "" && len(args) == 0 { return nil } if len(args) == 0 || (len(args) > 0 && strings.Contains(s, "?")) { // looks like a where condition return []clause.Expression{clause.Expr{SQL: s, Vars: args}} } if len(args) > 0 && strings.Contains(s, "@") { // looks like a named query return []clause.Expression{clause.NamedExpr{SQL: s, Vars: args}} } if strings.Contains(strings.TrimSpace(s), " ") { // looks like a where condition return []clause.Expression{clause.Expr{SQL: s, Vars: args}} } if len(args) == 1 { return []clause.Expression{clause.Eq{Column: s, Value: args[0]}} } } } conds := make([]clause.Expression, 0, 4) args = append([]interface{}{query}, args...) for idx, arg := range args { if arg == nil { continue } if valuer, ok := arg.(driver.Valuer); ok { arg, _ = valuer.Value() } curTable := stmt.Table if curTable == "" { curTable = clause.CurrentTable } switch v := arg.(type) { case clause.Expression: conds = append(conds, v) case []clause.Expression: conds = append(conds, v...) case *DB: v.executeScopes() if cs, ok := v.Statement.Clauses["WHERE"]; ok { if where, ok := cs.Expression.(clause.Where); ok { if len(where.Exprs) == 1 { if orConds, ok := where.Exprs[0].(clause.OrConditions); ok { if len(orConds.Exprs) == 1 { where.Exprs[0] = clause.AndConditions(orConds) } } } conds = append(conds, clause.And(where.Exprs...)) } else if cs.Expression != nil { conds = append(conds, cs.Expression) } } case map[interface{}]interface{}: for i, j := range v { conds = append(conds, clause.Eq{Column: i, Value: j}) } case map[string]string: keys := make([]string, 0, len(v)) for i := range v { keys = append(keys, i) } sort.Strings(keys) for _, key := range keys { column := clause.Column{Name: key, Table: curTable} if strings.Contains(key, ".") { column = clause.Column{Name: key} } conds = append(conds, clause.Eq{Column: column, Value: v[key]}) } case map[string]interface{}: keys := make([]string, 0, len(v)) for i := range v { keys = append(keys, i) } sort.Strings(keys) for _, key := range keys { reflectValue := reflect.Indirect(reflect.ValueOf(v[key])) column := clause.Column{Name: key, Table: curTable} if strings.Contains(key, ".") { column = clause.Column{Name: key} } switch reflectValue.Kind() { case reflect.Slice, reflect.Array: if _, ok := v[key].(driver.Valuer); ok { conds = append(conds, clause.Eq{Column: column, Value: v[key]}) } else if _, ok := v[key].(Valuer); ok { conds = append(conds, clause.Eq{Column: column, Value: v[key]}) } else { // optimize reflect value length valueLen := reflectValue.Len() values := make([]interface{}, valueLen) for i := 0; i < valueLen; i++ { values[i] = reflectValue.Index(i).Interface() } conds = append(conds, clause.IN{Column: column, Values: values}) } default: conds = append(conds, clause.Eq{Column: column, Value: v[key]}) } } default: reflectValue := reflect.Indirect(reflect.ValueOf(arg)) for reflectValue.Kind() == reflect.Ptr { reflectValue = reflectValue.Elem() } if s, err := schema.Parse(arg, stmt.DB.cacheStore, stmt.DB.NamingStrategy); err == nil { selectedColumns := map[string]bool{} if idx == 0 { for _, v := range args[1:] { if vs, ok := v.(string); ok { selectedColumns[vs] = true } } } restricted := len(selectedColumns) != 0 switch reflectValue.Kind() { case reflect.Struct: for _, field := range s.Fields { selected := selectedColumns[field.DBName] || selectedColumns[field.Name] if selected || (!restricted && field.Readable) { if v, isZero := field.ValueOf(stmt.Context, reflectValue); !isZero || selected { if field.DBName != "" { conds = append(conds, clause.Eq{Column: clause.Column{Table: curTable, Name: field.DBName}, Value: v}) } else if field.DataType != "" { conds = append(conds, clause.Eq{Column: clause.Column{Table: curTable, Name: field.Name}, Value: v}) } } } } case reflect.Slice, reflect.Array: for i := 0; i < reflectValue.Len(); i++ { for _, field := range s.Fields { selected := selectedColumns[field.DBName] || selectedColumns[field.Name] if selected || (!restricted && field.Readable) { if v, isZero := field.ValueOf(stmt.Context, reflectValue.Index(i)); !isZero || selected { if field.DBName != "" { conds = append(conds, clause.Eq{Column: clause.Column{Table: curTable, Name: field.DBName}, Value: v}) } else if field.DataType != "" { conds = append(conds, clause.Eq{Column: clause.Column{Table: curTable, Name: field.Name}, Value: v}) } } } } } } if restricted { break } } else if !reflectValue.IsValid() { stmt.AddError(ErrInvalidData) } else if len(conds) == 0 { if len(args) == 1 { switch reflectValue.Kind() { case reflect.Slice, reflect.Array: // optimize reflect value length valueLen := reflectValue.Len() values := make([]interface{}, valueLen) for i := 0; i < valueLen; i++ { values[i] = reflectValue.Index(i).Interface() } if len(values) > 0 { conds = append(conds, clause.IN{Column: clause.Column{Table: curTable, Name: clause.PrimaryKey}, Values: values}) return []clause.Expression{clause.And(conds...)} } return nil } } conds = append(conds, clause.IN{Column: clause.Column{Table: curTable, Name: clause.PrimaryKey}, Values: args}) } } } if len(conds) > 0 { return []clause.Expression{clause.And(conds...)} } return nil } // Build build sql with clauses names func (stmt *Statement) Build(clauses ...string) { var firstClauseWritten bool for _, name := range clauses { if c, ok := stmt.Clauses[name]; ok { if firstClauseWritten { stmt.WriteByte(' ') } firstClauseWritten = true if b, ok := stmt.DB.ClauseBuilders[name]; ok { b(c, stmt) } else { c.Build(stmt) } } } } func (stmt *Statement) Parse(value interface{}) (err error) { return stmt.ParseWithSpecialTableName(value, "") } func (stmt *Statement) ParseWithSpecialTableName(value interface{}, specialTableName string) (err error) { if stmt.Schema, err = schema.ParseWithSpecialTableName(value, stmt.DB.cacheStore, stmt.DB.NamingStrategy, specialTableName); err == nil && stmt.Table == "" { if tables := strings.Split(stmt.Schema.Table, "."); len(tables) == 2 { stmt.TableExpr = &clause.Expr{SQL: stmt.Quote(stmt.Schema.Table)} stmt.Table = tables[1] return } stmt.Table = stmt.Schema.Table } return err } func (stmt *Statement) clone() *Statement { newStmt := &Statement{ TableExpr: stmt.TableExpr, Table: stmt.Table, Model: stmt.Model, Unscoped: stmt.Unscoped, Dest: stmt.Dest, ReflectValue: stmt.ReflectValue, Clauses: map[string]clause.Clause{}, Distinct: stmt.Distinct, Selects: stmt.Selects, Omits: stmt.Omits, ColumnMapping: stmt.ColumnMapping, Preloads: map[string][]interface{}{}, ConnPool: stmt.ConnPool, Schema: stmt.Schema, Context: stmt.Context, RaiseErrorOnNotFound: stmt.RaiseErrorOnNotFound, SkipHooks: stmt.SkipHooks, Result: stmt.Result, } if stmt.SQL.Len() > 0 { newStmt.SQL.WriteString(stmt.SQL.String()) newStmt.Vars = make([]interface{}, 0, len(stmt.Vars)) newStmt.Vars = append(newStmt.Vars, stmt.Vars...) } for k, c := range stmt.Clauses { newStmt.Clauses[k] = c } for k, p := range stmt.Preloads { newStmt.Preloads[k] = p } if len(stmt.Joins) > 0 { newStmt.Joins = make([]join, len(stmt.Joins)) copy(newStmt.Joins, stmt.Joins) } if len(stmt.scopes) > 0 { newStmt.scopes = make([]func(*DB) *DB, len(stmt.scopes)) copy(newStmt.scopes, stmt.scopes) } stmt.Settings.Range(func(k, v interface{}) bool { newStmt.Settings.Store(k, v) return true }) return newStmt } // SetColumn set column's value // // stmt.SetColumn("Name", "jinzhu") // Hooks Method // stmt.SetColumn("Name", "jinzhu", true) // Callbacks Method func (stmt *Statement) SetColumn(name string, value interface{}, fromCallbacks ...bool) { if v, ok := stmt.Dest.(map[string]interface{}); ok { v[name] = value } else if v, ok := stmt.Dest.([]map[string]interface{}); ok { for _, m := range v { m[name] = value } } else if stmt.Schema != nil { if field := stmt.Schema.LookUpField(name); field != nil { destValue := reflect.ValueOf(stmt.Dest) for destValue.Kind() == reflect.Ptr { destValue = destValue.Elem() } if stmt.ReflectValue != destValue { if !destValue.CanAddr() { destValueCanAddr := reflect.New(destValue.Type()) destValueCanAddr.Elem().Set(destValue) stmt.Dest = destValueCanAddr.Interface() destValue = destValueCanAddr.Elem() } switch destValue.Kind() { case reflect.Struct: stmt.AddError(field.Set(stmt.Context, destValue, value)) default: stmt.AddError(ErrInvalidData) } } switch stmt.ReflectValue.Kind() { case reflect.Slice, reflect.Array: if len(fromCallbacks) > 0 { for i := 0; i < stmt.ReflectValue.Len(); i++ { stmt.AddError(field.Set(stmt.Context, stmt.ReflectValue.Index(i), value)) } } else { stmt.AddError(field.Set(stmt.Context, stmt.ReflectValue.Index(stmt.CurDestIndex), value)) } case reflect.Struct: if !stmt.ReflectValue.CanAddr() { stmt.AddError(ErrInvalidValue) return } stmt.AddError(field.Set(stmt.Context, stmt.ReflectValue, value)) } } else { stmt.AddError(ErrInvalidField) } } else { stmt.AddError(ErrInvalidField) } } // Changed check model changed or not when updating func (stmt *Statement) Changed(fields ...string) bool { modelValue := stmt.ReflectValue switch modelValue.Kind() { case reflect.Slice, reflect.Array: modelValue = stmt.ReflectValue.Index(stmt.CurDestIndex) } selectColumns, restricted := stmt.SelectAndOmitColumns(false, true) changed := func(field *schema.Field) bool { fieldValue, _ := field.ValueOf(stmt.Context, modelValue) if v, ok := selectColumns[field.DBName]; (ok && v) || (!ok && !restricted) { if mv, mok := stmt.Dest.(map[string]interface{}); mok { if fv, ok := mv[field.Name]; ok { return !utils.AssertEqual(fv, fieldValue) } else if fv, ok := mv[field.DBName]; ok { return !utils.AssertEqual(fv, fieldValue) } } else { destValue := reflect.ValueOf(stmt.Dest) for destValue.Kind() == reflect.Ptr { destValue = destValue.Elem() } if descSchema, err := schema.Parse(stmt.Dest, stmt.DB.cacheStore, stmt.DB.NamingStrategy); err == nil { if destField := descSchema.LookUpField(field.DBName); destField != nil { changedValue, zero := destField.ValueOf(stmt.Context, destValue) if v { return !utils.AssertEqual(changedValue, fieldValue) } return !zero && !utils.AssertEqual(changedValue, fieldValue) } } } } return false } if len(fields) == 0 { for _, field := range stmt.Schema.FieldsByDBName { if changed(field) { return true } } } else { for _, name := range fields { if field := stmt.Schema.LookUpField(name); field != nil { if changed(field) { return true } } } } return false } var matchName = func() func(tableColumn string) (table, column string) { nameMatcher := regexp.MustCompile(`^(?:\W?(\w+?)\W?\.)?(?:(\*)|\W?(\w+?)\W?)$`) return func(tableColumn string) (table, column string) { if matches := nameMatcher.FindStringSubmatch(tableColumn); len(matches) == 4 { table = matches[1] star := matches[2] columnName := matches[3] if star != "" { return table, star } return table, columnName } return "", "" } }() // SelectAndOmitColumns get select and omit columns, select -> true, omit -> false func (stmt *Statement) SelectAndOmitColumns(requireCreate, requireUpdate bool) (map[string]bool, bool) { results := map[string]bool{} notRestricted := false processColumn := func(column string, result bool) { if stmt.Schema == nil { results[column] = result } else if column == "*" { notRestricted = result for _, dbName := range stmt.Schema.DBNames { results[dbName] = result } } else if column == clause.Associations { for _, rel := range stmt.Schema.Relationships.Relations { results[rel.Name] = result } } else if field := stmt.Schema.LookUpField(column); field != nil && field.DBName != "" { results[field.DBName] = result } else if table, col := matchName(column); col != "" && (table == stmt.Table || table == "") { if col == "*" { for _, dbName := range stmt.Schema.DBNames { results[dbName] = result } } else { results[col] = result } } else { results[column] = result } } // select columns for _, column := range stmt.Selects { processColumn(column, true) } // omit columns for _, column := range stmt.Omits { processColumn(column, false) } if stmt.Schema != nil { for _, field := range stmt.Schema.FieldsByName { name := field.DBName if name == "" { name = field.Name } if requireCreate && !field.Creatable { results[name] = false } else if requireUpdate && !field.Updatable { results[name] = false } } } return results, !notRestricted && len(stmt.Selects) > 0 }
go
MIT
0d9141bad9772c6047ecfdb2819d8a52d27ceb65
2026-01-07T08:35:52.485253Z
false
go-gorm/gorm
https://github.com/go-gorm/gorm/blob/0d9141bad9772c6047ecfdb2819d8a52d27ceb65/interfaces.go
interfaces.go
package gorm import ( "context" "database/sql" "gorm.io/gorm/clause" "gorm.io/gorm/schema" ) // Dialector GORM database dialector type Dialector interface { Name() string Initialize(*DB) error Migrator(db *DB) Migrator DataTypeOf(*schema.Field) string DefaultValueOf(*schema.Field) clause.Expression BindVarTo(writer clause.Writer, stmt *Statement, v interface{}) QuoteTo(clause.Writer, string) Explain(sql string, vars ...interface{}) string } // Plugin GORM plugin interface type Plugin interface { Name() string Initialize(*DB) error } type ParamsFilter interface { ParamsFilter(ctx context.Context, sql string, params ...interface{}) (string, []interface{}) } // ConnPool db conns pool interface type ConnPool interface { PrepareContext(ctx context.Context, query string) (*sql.Stmt, error) ExecContext(ctx context.Context, query string, args ...interface{}) (sql.Result, error) QueryContext(ctx context.Context, query string, args ...interface{}) (*sql.Rows, error) QueryRowContext(ctx context.Context, query string, args ...interface{}) *sql.Row } // SavePointerDialectorInterface save pointer interface type SavePointerDialectorInterface interface { SavePoint(tx *DB, name string) error RollbackTo(tx *DB, name string) error } // TxBeginner tx beginner type TxBeginner interface { BeginTx(ctx context.Context, opts *sql.TxOptions) (*sql.Tx, error) } // ConnPoolBeginner conn pool beginner type ConnPoolBeginner interface { BeginTx(ctx context.Context, opts *sql.TxOptions) (ConnPool, error) } // TxCommitter tx committer type TxCommitter interface { Commit() error Rollback() error } // Tx sql.Tx interface type Tx interface { ConnPool TxCommitter StmtContext(ctx context.Context, stmt *sql.Stmt) *sql.Stmt } // Valuer gorm valuer interface type Valuer interface { GormValue(context.Context, *DB) clause.Expr } // GetDBConnector SQL db connector type GetDBConnector interface { GetDBConn() (*sql.DB, error) } // Rows rows interface type Rows interface { Columns() ([]string, error) ColumnTypes() ([]*sql.ColumnType, error) Next() bool Scan(dest ...interface{}) error Err() error Close() error } type ErrorTranslator interface { Translate(err error) error }
go
MIT
0d9141bad9772c6047ecfdb2819d8a52d27ceb65
2026-01-07T08:35:52.485253Z
false
go-gorm/gorm
https://github.com/go-gorm/gorm/blob/0d9141bad9772c6047ecfdb2819d8a52d27ceb65/soft_delete.go
soft_delete.go
package gorm import ( "database/sql" "database/sql/driver" "encoding/json" "reflect" "github.com/jinzhu/now" "gorm.io/gorm/clause" "gorm.io/gorm/schema" ) type DeletedAt sql.NullTime // Scan implements the Scanner interface. func (n *DeletedAt) Scan(value interface{}) error { return (*sql.NullTime)(n).Scan(value) } // Value implements the driver Valuer interface. func (n DeletedAt) Value() (driver.Value, error) { if !n.Valid { return nil, nil } return n.Time, nil } func (n DeletedAt) MarshalJSON() ([]byte, error) { if n.Valid { return json.Marshal(n.Time) } return json.Marshal(nil) } func (n *DeletedAt) UnmarshalJSON(b []byte) error { if string(b) == "null" { n.Valid = false return nil } err := json.Unmarshal(b, &n.Time) if err == nil { n.Valid = true } return err } func (DeletedAt) QueryClauses(f *schema.Field) []clause.Interface { return []clause.Interface{SoftDeleteQueryClause{Field: f, ZeroValue: parseZeroValueTag(f)}} } func parseZeroValueTag(f *schema.Field) sql.NullString { if v, ok := f.TagSettings["ZEROVALUE"]; ok { if _, err := now.Parse(v); err == nil { return sql.NullString{String: v, Valid: true} } } return sql.NullString{Valid: false} } type SoftDeleteQueryClause struct { ZeroValue sql.NullString Field *schema.Field } func (sd SoftDeleteQueryClause) Name() string { return "" } func (sd SoftDeleteQueryClause) Build(clause.Builder) { } func (sd SoftDeleteQueryClause) MergeClause(*clause.Clause) { } func (sd SoftDeleteQueryClause) ModifyStatement(stmt *Statement) { if _, ok := stmt.Clauses["soft_delete_enabled"]; !ok && !stmt.Statement.Unscoped { if c, ok := stmt.Clauses["WHERE"]; ok { if where, ok := c.Expression.(clause.Where); ok && len(where.Exprs) >= 1 { for _, expr := range where.Exprs { if orCond, ok := expr.(clause.OrConditions); ok && len(orCond.Exprs) == 1 { where.Exprs = []clause.Expression{clause.And(where.Exprs...)} c.Expression = where stmt.Clauses["WHERE"] = c break } } } } stmt.AddClause(clause.Where{Exprs: []clause.Expression{ clause.Eq{Column: clause.Column{Table: clause.CurrentTable, Name: sd.Field.DBName}, Value: sd.ZeroValue}, }}) stmt.Clauses["soft_delete_enabled"] = clause.Clause{} } } func (DeletedAt) UpdateClauses(f *schema.Field) []clause.Interface { return []clause.Interface{SoftDeleteUpdateClause{Field: f, ZeroValue: parseZeroValueTag(f)}} } type SoftDeleteUpdateClause struct { ZeroValue sql.NullString Field *schema.Field } func (sd SoftDeleteUpdateClause) Name() string { return "" } func (sd SoftDeleteUpdateClause) Build(clause.Builder) { } func (sd SoftDeleteUpdateClause) MergeClause(*clause.Clause) { } func (sd SoftDeleteUpdateClause) ModifyStatement(stmt *Statement) { if stmt.SQL.Len() == 0 && !stmt.Statement.Unscoped { SoftDeleteQueryClause(sd).ModifyStatement(stmt) } } func (DeletedAt) DeleteClauses(f *schema.Field) []clause.Interface { return []clause.Interface{SoftDeleteDeleteClause{Field: f, ZeroValue: parseZeroValueTag(f)}} } type SoftDeleteDeleteClause struct { ZeroValue sql.NullString Field *schema.Field } func (sd SoftDeleteDeleteClause) Name() string { return "" } func (sd SoftDeleteDeleteClause) Build(clause.Builder) { } func (sd SoftDeleteDeleteClause) MergeClause(*clause.Clause) { } func (sd SoftDeleteDeleteClause) ModifyStatement(stmt *Statement) { if stmt.SQL.Len() == 0 && !stmt.Statement.Unscoped { curTime := stmt.DB.NowFunc() stmt.AddClause(clause.Set{{Column: clause.Column{Name: sd.Field.DBName}, Value: curTime}}) stmt.SetColumn(sd.Field.DBName, curTime, true) if stmt.Schema != nil { _, queryValues := schema.GetIdentityFieldValuesMap(stmt.Context, stmt.ReflectValue, stmt.Schema.PrimaryFields) column, values := schema.ToQueryValues(stmt.Table, stmt.Schema.PrimaryFieldDBNames, queryValues) if len(values) > 0 { stmt.AddClause(clause.Where{Exprs: []clause.Expression{clause.IN{Column: column, Values: values}}}) } if stmt.ReflectValue.CanAddr() && stmt.Dest != stmt.Model && stmt.Model != nil { _, queryValues = schema.GetIdentityFieldValuesMap(stmt.Context, reflect.ValueOf(stmt.Model), stmt.Schema.PrimaryFields) column, values = schema.ToQueryValues(stmt.Table, stmt.Schema.PrimaryFieldDBNames, queryValues) if len(values) > 0 { stmt.AddClause(clause.Where{Exprs: []clause.Expression{clause.IN{Column: column, Values: values}}}) } } } SoftDeleteQueryClause(sd).ModifyStatement(stmt) stmt.AddClauseIfNotExists(clause.Update{}) stmt.Build(stmt.DB.Callback().Update().Clauses...) } }
go
MIT
0d9141bad9772c6047ecfdb2819d8a52d27ceb65
2026-01-07T08:35:52.485253Z
false
go-gorm/gorm
https://github.com/go-gorm/gorm/blob/0d9141bad9772c6047ecfdb2819d8a52d27ceb65/errors.go
errors.go
package gorm import ( "errors" "gorm.io/gorm/logger" ) var ( // ErrRecordNotFound record not found error ErrRecordNotFound = logger.ErrRecordNotFound // ErrInvalidTransaction invalid transaction when you are trying to `Commit` or `Rollback` ErrInvalidTransaction = errors.New("invalid transaction") // ErrNotImplemented not implemented ErrNotImplemented = errors.New("not implemented") // ErrMissingWhereClause missing where clause ErrMissingWhereClause = errors.New("WHERE conditions required") // ErrUnsupportedRelation unsupported relations ErrUnsupportedRelation = errors.New("unsupported relations") // ErrPrimaryKeyRequired primary keys required ErrPrimaryKeyRequired = errors.New("primary key required") // ErrModelValueRequired model value required ErrModelValueRequired = errors.New("model value required") // ErrModelAccessibleFieldsRequired model accessible fields required ErrModelAccessibleFieldsRequired = errors.New("model accessible fields required") // ErrSubQueryRequired sub query required ErrSubQueryRequired = errors.New("sub query required") // ErrInvalidData unsupported data ErrInvalidData = errors.New("unsupported data") // ErrUnsupportedDriver unsupported driver ErrUnsupportedDriver = errors.New("unsupported driver") // ErrRegistered registered ErrRegistered = errors.New("registered") // ErrInvalidField invalid field ErrInvalidField = errors.New("invalid field") // ErrEmptySlice empty slice found ErrEmptySlice = errors.New("empty slice found") // ErrDryRunModeUnsupported dry run mode unsupported ErrDryRunModeUnsupported = errors.New("dry run mode unsupported") // ErrInvalidDB invalid db ErrInvalidDB = errors.New("invalid db") // ErrInvalidValue invalid value ErrInvalidValue = errors.New("invalid value, should be pointer to struct or slice") // ErrInvalidValueOfLength invalid values do not match length ErrInvalidValueOfLength = errors.New("invalid association values, length doesn't match") // ErrPreloadNotAllowed preload is not allowed when count is used ErrPreloadNotAllowed = errors.New("preload is not allowed when count is used") // ErrDuplicatedKey occurs when there is a unique key constraint violation ErrDuplicatedKey = errors.New("duplicated key not allowed") // ErrForeignKeyViolated occurs when there is a foreign key constraint violation ErrForeignKeyViolated = errors.New("violates foreign key constraint") // ErrCheckConstraintViolated occurs when there is a check constraint violation ErrCheckConstraintViolated = errors.New("violates check constraint") )
go
MIT
0d9141bad9772c6047ecfdb2819d8a52d27ceb65
2026-01-07T08:35:52.485253Z
false
go-gorm/gorm
https://github.com/go-gorm/gorm/blob/0d9141bad9772c6047ecfdb2819d8a52d27ceb65/scan.go
scan.go
package gorm import ( "database/sql" "database/sql/driver" "reflect" "strings" "time" "gorm.io/gorm/schema" "gorm.io/gorm/utils" ) // prepareValues prepare values slice func prepareValues(values []interface{}, db *DB, columnTypes []*sql.ColumnType, columns []string) { if db.Statement.Schema != nil { for idx, name := range columns { if field := db.Statement.Schema.LookUpField(name); field != nil { values[idx] = reflect.New(reflect.PointerTo(field.FieldType)).Interface() continue } values[idx] = new(interface{}) } } else if len(columnTypes) > 0 { for idx, columnType := range columnTypes { if columnType.ScanType() != nil { values[idx] = reflect.New(reflect.PointerTo(columnType.ScanType())).Interface() } else { values[idx] = new(interface{}) } } } else { for idx := range columns { values[idx] = new(interface{}) } } } func scanIntoMap(mapValue map[string]interface{}, values []interface{}, columns []string) { for idx, column := range columns { if reflectValue := reflect.Indirect(reflect.Indirect(reflect.ValueOf(values[idx]))); reflectValue.IsValid() { mapValue[column] = reflectValue.Interface() if valuer, ok := mapValue[column].(driver.Valuer); ok { mapValue[column], _ = valuer.Value() } else if b, ok := mapValue[column].(sql.RawBytes); ok { mapValue[column] = string(b) } } else { mapValue[column] = nil } } } func (db *DB) scanIntoStruct(rows Rows, reflectValue reflect.Value, values []interface{}, fields []*schema.Field, joinFields [][]*schema.Field) { for idx, field := range fields { if field != nil { values[idx] = field.NewValuePool.Get() } else if len(fields) == 1 { if reflectValue.CanAddr() { values[idx] = reflectValue.Addr().Interface() } else { values[idx] = reflectValue.Interface() } } } db.RowsAffected++ db.AddError(rows.Scan(values...)) joinedNestedSchemaMap := make(map[string]interface{}) for idx, field := range fields { if field == nil { continue } if len(joinFields) == 0 || len(joinFields[idx]) == 0 { db.AddError(field.Set(db.Statement.Context, reflectValue, values[idx])) } else { // joinFields count is larger than 2 when using join var isNilPtrValue bool var relValue reflect.Value // does not contain raw dbname nestedJoinSchemas := joinFields[idx][:len(joinFields[idx])-1] // current reflect value currentReflectValue := reflectValue fullRels := make([]string, 0, len(nestedJoinSchemas)) for _, joinSchema := range nestedJoinSchemas { fullRels = append(fullRels, joinSchema.Name) relValue = joinSchema.ReflectValueOf(db.Statement.Context, currentReflectValue) if relValue.Kind() == reflect.Ptr { fullRelsName := utils.JoinNestedRelationNames(fullRels) // same nested structure if _, ok := joinedNestedSchemaMap[fullRelsName]; !ok { if value := reflect.ValueOf(values[idx]).Elem(); value.Kind() == reflect.Ptr && value.IsNil() { isNilPtrValue = true break } relValue.Set(reflect.New(relValue.Type().Elem())) joinedNestedSchemaMap[fullRelsName] = nil } } currentReflectValue = relValue } if !isNilPtrValue { // ignore if value is nil f := joinFields[idx][len(joinFields[idx])-1] db.AddError(f.Set(db.Statement.Context, relValue, values[idx])) } } // release data to pool field.NewValuePool.Put(values[idx]) } } // ScanMode scan data mode type ScanMode uint8 // scan modes const ( ScanInitialized ScanMode = 1 << 0 // 1 ScanUpdate ScanMode = 1 << 1 // 2 ScanOnConflictDoNothing ScanMode = 1 << 2 // 4 ) // Scan scan rows into db statement func Scan(rows Rows, db *DB, mode ScanMode) { var ( columns, _ = rows.Columns() values = make([]interface{}, len(columns)) initialized = mode&ScanInitialized != 0 update = mode&ScanUpdate != 0 onConflictDonothing = mode&ScanOnConflictDoNothing != 0 ) if len(db.Statement.ColumnMapping) > 0 { for i, column := range columns { v, ok := db.Statement.ColumnMapping[column] if ok { columns[i] = v } } } db.RowsAffected = 0 switch dest := db.Statement.Dest.(type) { case map[string]interface{}, *map[string]interface{}: if initialized || rows.Next() { columnTypes, _ := rows.ColumnTypes() prepareValues(values, db, columnTypes, columns) db.RowsAffected++ db.AddError(rows.Scan(values...)) mapValue, ok := dest.(map[string]interface{}) if !ok { if v, ok := dest.(*map[string]interface{}); ok { if *v == nil { *v = map[string]interface{}{} } mapValue = *v } } scanIntoMap(mapValue, values, columns) } case *[]map[string]interface{}: columnTypes, _ := rows.ColumnTypes() for initialized || rows.Next() { prepareValues(values, db, columnTypes, columns) initialized = false db.RowsAffected++ db.AddError(rows.Scan(values...)) mapValue := map[string]interface{}{} scanIntoMap(mapValue, values, columns) *dest = append(*dest, mapValue) } case *int, *int8, *int16, *int32, *int64, *uint, *uint8, *uint16, *uint32, *uint64, *uintptr, *float32, *float64, *bool, *string, *time.Time, *sql.NullInt32, *sql.NullInt64, *sql.NullFloat64, *sql.NullBool, *sql.NullString, *sql.NullTime: for initialized || rows.Next() { initialized = false db.RowsAffected++ db.AddError(rows.Scan(dest)) } default: var ( fields = make([]*schema.Field, len(columns)) joinFields [][]*schema.Field sch = db.Statement.Schema reflectValue = db.Statement.ReflectValue ) if reflectValue.Kind() == reflect.Interface { reflectValue = reflectValue.Elem() } reflectValueType := reflectValue.Type() switch reflectValueType.Kind() { case reflect.Array, reflect.Slice: reflectValueType = reflectValueType.Elem() } isPtr := reflectValueType.Kind() == reflect.Ptr if isPtr { reflectValueType = reflectValueType.Elem() } if sch != nil { if reflectValueType != sch.ModelType && reflectValueType.Kind() == reflect.Struct { sch, _ = schema.Parse(db.Statement.Dest, db.cacheStore, db.NamingStrategy) } if len(columns) == 1 { // Is Pluck if _, ok := reflect.New(reflectValueType).Interface().(sql.Scanner); (reflectValueType != sch.ModelType && ok) || // is scanner reflectValueType.Kind() != reflect.Struct || // is not struct sch.ModelType.ConvertibleTo(schema.TimeReflectType) { // is time sch = nil } } // Not Pluck if sch != nil { matchedFieldCount := make(map[string]int, len(columns)) for idx, column := range columns { if field := sch.LookUpField(column); field != nil && field.Readable { fields[idx] = field if count, ok := matchedFieldCount[column]; ok { // handle duplicate fields for _, selectField := range sch.Fields { if selectField.DBName == column && selectField.Readable { if count == 0 { matchedFieldCount[column]++ fields[idx] = selectField break } count-- } } } else { matchedFieldCount[column] = 1 } } else if names := utils.SplitNestedRelationName(column); len(names) > 1 { // has nested relation aliasName := utils.JoinNestedRelationNames(names[0 : len(names)-1]) for _, join := range db.Statement.Joins { if join.Alias == aliasName { names = append(strings.Split(join.Name, "."), names[len(names)-1]) break } } if rel, ok := sch.Relationships.Relations[names[0]]; ok { subNameCount := len(names) // nested relation fields relFields := make([]*schema.Field, 0, subNameCount-1) relFields = append(relFields, rel.Field) for _, name := range names[1 : subNameCount-1] { rel = rel.FieldSchema.Relationships.Relations[name] relFields = append(relFields, rel.Field) } // latest name is raw dbname dbName := names[subNameCount-1] if field := rel.FieldSchema.LookUpField(dbName); field != nil && field.Readable { fields[idx] = field if len(joinFields) == 0 { joinFields = make([][]*schema.Field, len(columns)) } relFields = append(relFields, field) joinFields[idx] = relFields continue } } var val interface{} values[idx] = &val } else { var val interface{} values[idx] = &val } } } } switch reflectValue.Kind() { case reflect.Slice, reflect.Array: var ( elem reflect.Value isArrayKind = reflectValue.Kind() == reflect.Array ) if !update || reflectValue.Len() == 0 { update = false if isArrayKind { db.Statement.ReflectValue.Set(reflect.Zero(reflectValue.Type())) } else { // if the slice cap is externally initialized, the externally initialized slice is directly used here if reflectValue.Cap() == 0 { db.Statement.ReflectValue.Set(reflect.MakeSlice(reflectValue.Type(), 0, 20)) } else { reflectValue.SetLen(0) db.Statement.ReflectValue.Set(reflectValue) } } } for initialized || rows.Next() { BEGIN: initialized = false if update { if int(db.RowsAffected) >= reflectValue.Len() { return } elem = reflectValue.Index(int(db.RowsAffected)) if onConflictDonothing { for _, field := range fields { if _, ok := field.ValueOf(db.Statement.Context, elem); !ok { db.RowsAffected++ goto BEGIN } } } } else { elem = reflect.New(reflectValueType) } db.scanIntoStruct(rows, elem, values, fields, joinFields) if !update { if !isPtr { elem = elem.Elem() } if isArrayKind { if reflectValue.Len() >= int(db.RowsAffected) { reflectValue.Index(int(db.RowsAffected - 1)).Set(elem) } } else { reflectValue = reflect.Append(reflectValue, elem) } } } if !update { db.Statement.ReflectValue.Set(reflectValue) } case reflect.Struct, reflect.Ptr: if initialized || rows.Next() { if mode == ScanInitialized && reflectValue.Kind() == reflect.Struct { db.Statement.ReflectValue.Set(reflect.Zero(reflectValue.Type())) } db.scanIntoStruct(rows, reflectValue, values, fields, joinFields) } default: db.AddError(rows.Scan(dest)) } } if err := rows.Err(); err != nil && err != db.Error { db.AddError(err) } if db.RowsAffected == 0 && db.Statement.RaiseErrorOnNotFound && db.Error == nil { db.AddError(ErrRecordNotFound) } }
go
MIT
0d9141bad9772c6047ecfdb2819d8a52d27ceb65
2026-01-07T08:35:52.485253Z
false
go-gorm/gorm
https://github.com/go-gorm/gorm/blob/0d9141bad9772c6047ecfdb2819d8a52d27ceb65/model.go
model.go
package gorm import "time" // Model a basic GoLang struct which includes the following fields: ID, CreatedAt, UpdatedAt, DeletedAt // It may be embedded into your model or you may build your own model without it // // type User struct { // gorm.Model // } type Model struct { ID uint `gorm:"primarykey"` CreatedAt time.Time UpdatedAt time.Time DeletedAt DeletedAt `gorm:"index"` }
go
MIT
0d9141bad9772c6047ecfdb2819d8a52d27ceb65
2026-01-07T08:35:52.485253Z
false
go-gorm/gorm
https://github.com/go-gorm/gorm/blob/0d9141bad9772c6047ecfdb2819d8a52d27ceb65/finisher_api.go
finisher_api.go
package gorm import ( "context" "database/sql" "errors" "fmt" "hash/maphash" "reflect" "strings" "gorm.io/gorm/clause" "gorm.io/gorm/logger" "gorm.io/gorm/schema" "gorm.io/gorm/utils" ) // Create inserts value, returning the inserted data's primary key in value's id func (db *DB) Create(value interface{}) (tx *DB) { if db.CreateBatchSize > 0 { return db.CreateInBatches(value, db.CreateBatchSize) } tx = db.getInstance() tx.Statement.Dest = value return tx.callbacks.Create().Execute(tx) } // CreateInBatches inserts value in batches of batchSize func (db *DB) CreateInBatches(value interface{}, batchSize int) (tx *DB) { reflectValue := reflect.Indirect(reflect.ValueOf(value)) switch reflectValue.Kind() { case reflect.Slice, reflect.Array: var rowsAffected int64 tx = db.getInstance() // the reflection length judgment of the optimized value reflectLen := reflectValue.Len() callFc := func(tx *DB) error { for i := 0; i < reflectLen; i += batchSize { ends := i + batchSize if ends > reflectLen { ends = reflectLen } subtx := tx.getInstance() subtx.Statement.Dest = reflectValue.Slice(i, ends).Interface() subtx.callbacks.Create().Execute(subtx) if subtx.Error != nil { return subtx.Error } rowsAffected += subtx.RowsAffected } return nil } if tx.SkipDefaultTransaction || reflectLen <= batchSize { tx.AddError(callFc(tx.Session(&Session{}))) } else { tx.AddError(tx.Transaction(callFc)) } tx.RowsAffected = rowsAffected default: tx = db.getInstance() tx.Statement.Dest = value tx = tx.callbacks.Create().Execute(tx) } return } // Save updates value in database. If value doesn't contain a matching primary key, value is inserted. func (db *DB) Save(value interface{}) (tx *DB) { tx = db.getInstance() tx.Statement.Dest = value reflectValue := reflect.Indirect(reflect.ValueOf(value)) for reflectValue.Kind() == reflect.Ptr || reflectValue.Kind() == reflect.Interface { reflectValue = reflect.Indirect(reflectValue) } switch reflectValue.Kind() { case reflect.Slice, reflect.Array: if _, ok := tx.Statement.Clauses["ON CONFLICT"]; !ok { tx = tx.Clauses(clause.OnConflict{UpdateAll: true}) } tx = tx.callbacks.Create().Execute(tx.Set("gorm:update_track_time", true)) case reflect.Struct: if err := tx.Statement.Parse(value); err == nil && tx.Statement.Schema != nil { for _, pf := range tx.Statement.Schema.PrimaryFields { if _, isZero := pf.ValueOf(tx.Statement.Context, reflectValue); isZero { return tx.callbacks.Create().Execute(tx) } } } fallthrough default: selectedUpdate := len(tx.Statement.Selects) != 0 // when updating, use all fields including those zero-value fields if !selectedUpdate { tx.Statement.Selects = append(tx.Statement.Selects, "*") } updateTx := tx.callbacks.Update().Execute(tx.Session(&Session{Initialized: true})) if updateTx.Error == nil && updateTx.RowsAffected == 0 && !updateTx.DryRun && !selectedUpdate { return tx.Session(&Session{SkipHooks: true}).Clauses(clause.OnConflict{UpdateAll: true}).Create(value) } return updateTx } return } // First finds the first record ordered by primary key, matching given conditions conds func (db *DB) First(dest interface{}, conds ...interface{}) (tx *DB) { tx = db.Limit(1).Order(clause.OrderByColumn{ Column: clause.Column{Table: clause.CurrentTable, Name: clause.PrimaryKey}, }) if len(conds) > 0 { if exprs := tx.Statement.BuildCondition(conds[0], conds[1:]...); len(exprs) > 0 { tx.Statement.AddClause(clause.Where{Exprs: exprs}) } } tx.Statement.RaiseErrorOnNotFound = true tx.Statement.Dest = dest return tx.callbacks.Query().Execute(tx) } // Take finds the first record returned by the database in no specified order, matching given conditions conds func (db *DB) Take(dest interface{}, conds ...interface{}) (tx *DB) { tx = db.Limit(1) if len(conds) > 0 { if exprs := tx.Statement.BuildCondition(conds[0], conds[1:]...); len(exprs) > 0 { tx.Statement.AddClause(clause.Where{Exprs: exprs}) } } tx.Statement.RaiseErrorOnNotFound = true tx.Statement.Dest = dest return tx.callbacks.Query().Execute(tx) } // Last finds the last record ordered by primary key, matching given conditions conds func (db *DB) Last(dest interface{}, conds ...interface{}) (tx *DB) { tx = db.Limit(1).Order(clause.OrderByColumn{ Column: clause.Column{Table: clause.CurrentTable, Name: clause.PrimaryKey}, Desc: true, }) if len(conds) > 0 { if exprs := tx.Statement.BuildCondition(conds[0], conds[1:]...); len(exprs) > 0 { tx.Statement.AddClause(clause.Where{Exprs: exprs}) } } tx.Statement.RaiseErrorOnNotFound = true tx.Statement.Dest = dest return tx.callbacks.Query().Execute(tx) } // Find finds all records matching given conditions conds func (db *DB) Find(dest interface{}, conds ...interface{}) (tx *DB) { tx = db.getInstance() if len(conds) > 0 { if exprs := tx.Statement.BuildCondition(conds[0], conds[1:]...); len(exprs) > 0 { tx.Statement.AddClause(clause.Where{Exprs: exprs}) } } tx.Statement.Dest = dest return tx.callbacks.Query().Execute(tx) } // FindInBatches finds all records in batches of batchSize func (db *DB) FindInBatches(dest interface{}, batchSize int, fc func(tx *DB, batch int) error) *DB { var ( tx = db.Order(clause.OrderByColumn{ Column: clause.Column{Table: clause.CurrentTable, Name: clause.PrimaryKey}, }).Session(&Session{}) queryDB = tx rowsAffected int64 batch int ) // user specified offset or limit var totalSize int if c, ok := tx.Statement.Clauses["LIMIT"]; ok { if limit, ok := c.Expression.(clause.Limit); ok { if limit.Limit != nil { totalSize = *limit.Limit } if totalSize > 0 && batchSize > totalSize { batchSize = totalSize } // reset to offset to 0 in next batch tx = tx.Offset(-1).Session(&Session{}) } } for { result := queryDB.Limit(batchSize).Find(dest) rowsAffected += result.RowsAffected batch++ if result.Error == nil && result.RowsAffected != 0 { fcTx := result.Session(&Session{NewDB: true}) fcTx.RowsAffected = result.RowsAffected tx.AddError(fc(fcTx, batch)) } else if result.Error != nil { tx.AddError(result.Error) } if tx.Error != nil || int(result.RowsAffected) < batchSize { break } if totalSize > 0 { if totalSize <= int(rowsAffected) { break } if totalSize/batchSize == batch { batchSize = totalSize % batchSize } } // Optimize for-break resultsValue := reflect.Indirect(reflect.ValueOf(dest)) if result.Statement.Schema.PrioritizedPrimaryField == nil { tx.AddError(ErrPrimaryKeyRequired) break } primaryValue, zero := result.Statement.Schema.PrioritizedPrimaryField.ValueOf(tx.Statement.Context, resultsValue.Index(resultsValue.Len()-1)) if zero { tx.AddError(ErrPrimaryKeyRequired) break } queryDB = tx.Clauses(clause.Gt{Column: clause.Column{Table: clause.CurrentTable, Name: clause.PrimaryKey}, Value: primaryValue}) } tx.RowsAffected = rowsAffected return tx } func (db *DB) assignInterfacesToValue(values ...interface{}) { for _, value := range values { switch v := value.(type) { case []clause.Expression: for _, expr := range v { if eq, ok := expr.(clause.Eq); ok { switch column := eq.Column.(type) { case string: if field := db.Statement.Schema.LookUpField(column); field != nil { db.AddError(field.Set(db.Statement.Context, db.Statement.ReflectValue, eq.Value)) } case clause.Column: if field := db.Statement.Schema.LookUpField(column.Name); field != nil { db.AddError(field.Set(db.Statement.Context, db.Statement.ReflectValue, eq.Value)) } } } else if andCond, ok := expr.(clause.AndConditions); ok { db.assignInterfacesToValue(andCond.Exprs) } } case clause.Expression, map[string]string, map[interface{}]interface{}, map[string]interface{}: if exprs := db.Statement.BuildCondition(value); len(exprs) > 0 { db.assignInterfacesToValue(exprs) } default: if s, err := schema.Parse(value, db.cacheStore, db.NamingStrategy); err == nil { reflectValue := reflect.Indirect(reflect.ValueOf(value)) switch reflectValue.Kind() { case reflect.Struct: for _, f := range s.Fields { if f.Readable { if v, isZero := f.ValueOf(db.Statement.Context, reflectValue); !isZero { if field := db.Statement.Schema.LookUpField(f.Name); field != nil { db.AddError(field.Set(db.Statement.Context, db.Statement.ReflectValue, v)) } } } } } } else if len(values) > 0 { if exprs := db.Statement.BuildCondition(values[0], values[1:]...); len(exprs) > 0 { db.assignInterfacesToValue(exprs) } return } } } } // FirstOrInit finds the first matching record, otherwise if not found initializes a new instance with given conds. // Each conds must be a struct or map. // // FirstOrInit never modifies the database. It is often used with Assign and Attrs. // // // assign an email if the record is not found // db.Where(User{Name: "non_existing"}).Attrs(User{Email: "fake@fake.org"}).FirstOrInit(&user) // // user -> User{Name: "non_existing", Email: "fake@fake.org"} // // // assign email regardless of if record is found // db.Where(User{Name: "jinzhu"}).Assign(User{Email: "fake@fake.org"}).FirstOrInit(&user) // // user -> User{Name: "jinzhu", Age: 20, Email: "fake@fake.org"} func (db *DB) FirstOrInit(dest interface{}, conds ...interface{}) (tx *DB) { queryTx := db.Limit(1).Order(clause.OrderByColumn{ Column: clause.Column{Table: clause.CurrentTable, Name: clause.PrimaryKey}, }) if tx = queryTx.Find(dest, conds...); tx.RowsAffected == 0 { if c, ok := tx.Statement.Clauses["WHERE"]; ok { if where, ok := c.Expression.(clause.Where); ok { tx.assignInterfacesToValue(where.Exprs) } } // initialize with attrs, conds if len(tx.Statement.attrs) > 0 { tx.assignInterfacesToValue(tx.Statement.attrs...) } } // initialize with attrs, conds if len(tx.Statement.assigns) > 0 { tx.assignInterfacesToValue(tx.Statement.assigns...) } return } // FirstOrCreate finds the first matching record, otherwise if not found creates a new instance with given conds. // Each conds must be a struct or map. // // Using FirstOrCreate in conjunction with Assign will result in an update to the database even if the record exists. // // // assign an email if the record is not found // result := db.Where(User{Name: "non_existing"}).Attrs(User{Email: "fake@fake.org"}).FirstOrCreate(&user) // // user -> User{Name: "non_existing", Email: "fake@fake.org"} // // result.RowsAffected -> 1 // // // assign email regardless of if record is found // result := db.Where(User{Name: "jinzhu"}).Assign(User{Email: "fake@fake.org"}).FirstOrCreate(&user) // // user -> User{Name: "jinzhu", Age: 20, Email: "fake@fake.org"} // // result.RowsAffected -> 1 func (db *DB) FirstOrCreate(dest interface{}, conds ...interface{}) (tx *DB) { tx = db.getInstance() queryTx := db.Session(&Session{}).Limit(1).Order(clause.OrderByColumn{ Column: clause.Column{Table: clause.CurrentTable, Name: clause.PrimaryKey}, }) result := queryTx.Find(dest, conds...) if result.Error != nil { tx.Error = result.Error return tx } if result.RowsAffected == 0 { if c, ok := result.Statement.Clauses["WHERE"]; ok { if where, ok := c.Expression.(clause.Where); ok { result.assignInterfacesToValue(where.Exprs) } } // initialize with attrs, conds if len(db.Statement.attrs) > 0 { result.assignInterfacesToValue(db.Statement.attrs...) } // initialize with attrs, conds if len(db.Statement.assigns) > 0 { result.assignInterfacesToValue(db.Statement.assigns...) } return tx.Create(dest) } else if len(db.Statement.assigns) > 0 { exprs := tx.Statement.BuildCondition(db.Statement.assigns[0], db.Statement.assigns[1:]...) assigns := map[string]interface{}{} for i := 0; i < len(exprs); i++ { expr := exprs[i] if eq, ok := expr.(clause.AndConditions); ok { exprs = append(exprs, eq.Exprs...) } else if eq, ok := expr.(clause.Eq); ok { switch column := eq.Column.(type) { case string: assigns[column] = eq.Value case clause.Column: assigns[column.Name] = eq.Value } } } return tx.Model(dest).Updates(assigns) } return tx } // Update updates column with value using callbacks. Reference: https://gorm.io/docs/update.html#Update-Changed-Fields func (db *DB) Update(column string, value interface{}) (tx *DB) { tx = db.getInstance() tx.Statement.Dest = map[string]interface{}{column: value} return tx.callbacks.Update().Execute(tx) } // Updates updates attributes using callbacks. values must be a struct or map. Reference: https://gorm.io/docs/update.html#Update-Changed-Fields func (db *DB) Updates(values interface{}) (tx *DB) { tx = db.getInstance() tx.Statement.Dest = values return tx.callbacks.Update().Execute(tx) } func (db *DB) UpdateColumn(column string, value interface{}) (tx *DB) { tx = db.getInstance() tx.Statement.Dest = map[string]interface{}{column: value} tx.Statement.SkipHooks = true return tx.callbacks.Update().Execute(tx) } func (db *DB) UpdateColumns(values interface{}) (tx *DB) { tx = db.getInstance() tx.Statement.Dest = values tx.Statement.SkipHooks = true return tx.callbacks.Update().Execute(tx) } // Delete deletes value matching given conditions. If value contains primary key it is included in the conditions. If // value includes a deleted_at field, then Delete performs a soft delete instead by setting deleted_at with the current // time if null. func (db *DB) Delete(value interface{}, conds ...interface{}) (tx *DB) { tx = db.getInstance() if len(conds) > 0 { if exprs := tx.Statement.BuildCondition(conds[0], conds[1:]...); len(exprs) > 0 { tx.Statement.AddClause(clause.Where{Exprs: exprs}) } } tx.Statement.Dest = value return tx.callbacks.Delete().Execute(tx) } func (db *DB) Count(count *int64) (tx *DB) { tx = db.getInstance() if tx.Statement.Model == nil { tx.Statement.Model = tx.Statement.Dest defer func() { tx.Statement.Model = nil }() } if selectClause, ok := db.Statement.Clauses["SELECT"]; ok { defer func() { tx.Statement.Clauses["SELECT"] = selectClause }() } else { defer delete(tx.Statement.Clauses, "SELECT") } if len(tx.Statement.Selects) == 0 { tx.Statement.AddClause(clause.Select{Expression: clause.Expr{SQL: "count(*)"}}) } else if !strings.HasPrefix(strings.TrimSpace(strings.ToLower(tx.Statement.Selects[0])), "count(") { expr := clause.Expr{SQL: "count(*)"} if len(tx.Statement.Selects) == 1 { dbName := tx.Statement.Selects[0] fields := strings.FieldsFunc(dbName, utils.IsInvalidDBNameChar) if len(fields) == 1 || (len(fields) == 3 && (strings.ToUpper(fields[1]) == "AS" || fields[1] == ".")) { if tx.Statement.Parse(tx.Statement.Model) == nil { if f := tx.Statement.Schema.LookUpField(dbName); f != nil { dbName = f.DBName } } if tx.Statement.Distinct { expr = clause.Expr{SQL: "COUNT(DISTINCT(?))", Vars: []interface{}{clause.Column{Name: dbName}}} } else if dbName != "*" { expr = clause.Expr{SQL: "COUNT(?)", Vars: []interface{}{clause.Column{Name: dbName}}} } } } tx.Statement.AddClause(clause.Select{Expression: expr}) } if orderByClause, ok := db.Statement.Clauses["ORDER BY"]; ok { if _, ok := db.Statement.Clauses["GROUP BY"]; !ok { delete(tx.Statement.Clauses, "ORDER BY") defer func() { tx.Statement.Clauses["ORDER BY"] = orderByClause }() } } tx.Statement.Dest = count tx = tx.callbacks.Query().Execute(tx) if _, ok := db.Statement.Clauses["GROUP BY"]; ok || tx.RowsAffected != 1 { *count = tx.RowsAffected } return } func (db *DB) Row() *sql.Row { tx := db.getInstance().Set("rows", false) tx = tx.callbacks.Row().Execute(tx) row, ok := tx.Statement.Dest.(*sql.Row) if !ok && tx.DryRun { db.Logger.Error(tx.Statement.Context, ErrDryRunModeUnsupported.Error()) } return row } func (db *DB) Rows() (*sql.Rows, error) { tx := db.getInstance().Set("rows", true) tx = tx.callbacks.Row().Execute(tx) rows, ok := tx.Statement.Dest.(*sql.Rows) if !ok && tx.DryRun && tx.Error == nil { tx.Error = ErrDryRunModeUnsupported } return rows, tx.Error } // Scan scans selected value to the struct dest func (db *DB) Scan(dest interface{}) (tx *DB) { config := *db.Config currentLogger, newLogger := config.Logger, logger.Recorder.New() config.Logger = newLogger tx = db.getInstance() tx.Config = &config if rows, err := tx.Rows(); err == nil { if rows.Next() { tx.ScanRows(rows, dest) } else { tx.RowsAffected = 0 tx.AddError(rows.Err()) } tx.AddError(rows.Close()) } currentLogger.Trace(tx.Statement.Context, newLogger.BeginAt, func() (string, int64) { return newLogger.SQL, tx.RowsAffected }, tx.Error) tx.Logger = currentLogger return } // Pluck queries a single column from a model, returning in the slice dest. E.g.: // // var ages []int64 // db.Model(&users).Pluck("age", &ages) func (db *DB) Pluck(column string, dest interface{}) (tx *DB) { tx = db.getInstance() if tx.Statement.Model != nil { if tx.Statement.Parse(tx.Statement.Model) == nil { if f := tx.Statement.Schema.LookUpField(column); f != nil { column = f.DBName } } } if len(tx.Statement.Selects) != 1 { fields := strings.FieldsFunc(column, utils.IsInvalidDBNameChar) tx.Statement.AddClauseIfNotExists(clause.Select{ Distinct: tx.Statement.Distinct, Columns: []clause.Column{{Name: column, Raw: len(fields) != 1}}, }) } tx.Statement.Dest = dest return tx.callbacks.Query().Execute(tx) } func (db *DB) ScanRows(rows *sql.Rows, dest interface{}) error { tx := db.getInstance() if err := tx.Statement.Parse(dest); !errors.Is(err, schema.ErrUnsupportedDataType) { tx.AddError(err) } tx.Statement.Dest = dest tx.Statement.ReflectValue = reflect.ValueOf(dest) for tx.Statement.ReflectValue.Kind() == reflect.Ptr { elem := tx.Statement.ReflectValue.Elem() if !elem.IsValid() { elem = reflect.New(tx.Statement.ReflectValue.Type().Elem()) tx.Statement.ReflectValue.Set(elem) } tx.Statement.ReflectValue = elem } Scan(rows, tx, ScanInitialized) return tx.Error } // Connection uses a db connection to execute an arbitrary number of commands in fc. When finished, the connection is // returned to the connection pool. func (db *DB) Connection(fc func(tx *DB) error) (err error) { if db.Error != nil { return db.Error } tx := db.getInstance() sqlDB, err := tx.DB() if err != nil { return } conn, err := sqlDB.Conn(tx.Statement.Context) if err != nil { return } defer conn.Close() tx.Statement.ConnPool = conn return fc(tx) } // Transaction start a transaction as a block, return error will rollback, otherwise to commit. Transaction executes an // arbitrary number of commands in fc within a transaction. On success the changes are committed; if an error occurs // they are rolled back. func (db *DB) Transaction(fc func(tx *DB) error, opts ...*sql.TxOptions) (err error) { panicked := true if committer, ok := db.Statement.ConnPool.(TxCommitter); ok && committer != nil { // nested transaction if !db.DisableNestedTransaction { spID := new(maphash.Hash).Sum64() err = db.SavePoint(fmt.Sprintf("sp%d", spID)).Error if err != nil { return } defer func() { // Make sure to rollback when panic, Block error or Commit error if panicked || err != nil { db.RollbackTo(fmt.Sprintf("sp%d", spID)) } }() } err = fc(db.Session(&Session{NewDB: db.clone == 1})) } else { tx := db.Begin(opts...) if tx.Error != nil { return tx.Error } defer func() { // Make sure to rollback when panic, Block error or Commit error if panicked || err != nil { tx.Rollback() } }() if err = fc(tx); err == nil { panicked = false return tx.Commit().Error } } panicked = false return } // Begin begins a transaction with any transaction options opts func (db *DB) Begin(opts ...*sql.TxOptions) *DB { var ( // clone statement tx = db.getInstance().Session(&Session{Context: db.Statement.Context, NewDB: db.clone == 1}) opt *sql.TxOptions err error ) if len(opts) > 0 { opt = opts[0] } ctx := tx.Statement.Context if db.DefaultTransactionTimeout > 0 { if _, ok := ctx.Deadline(); !ok { ctx, _ = context.WithTimeout(ctx, db.DefaultTransactionTimeout) } } switch beginner := tx.Statement.ConnPool.(type) { case TxBeginner: tx.Statement.ConnPool, err = beginner.BeginTx(ctx, opt) case ConnPoolBeginner: tx.Statement.ConnPool, err = beginner.BeginTx(ctx, opt) default: err = ErrInvalidTransaction } if err != nil { tx.AddError(err) } return tx } // Commit commits the changes in a transaction func (db *DB) Commit() *DB { if committer, ok := db.Statement.ConnPool.(TxCommitter); ok && committer != nil && !reflect.ValueOf(committer).IsNil() { db.AddError(committer.Commit()) } else { db.AddError(ErrInvalidTransaction) } return db } // Rollback rollbacks the changes in a transaction func (db *DB) Rollback() *DB { if committer, ok := db.Statement.ConnPool.(TxCommitter); ok && committer != nil { if !reflect.ValueOf(committer).IsNil() { db.AddError(committer.Rollback()) } } else { db.AddError(ErrInvalidTransaction) } return db } func (db *DB) SavePoint(name string) *DB { if savePointer, ok := db.Dialector.(SavePointerDialectorInterface); ok { // close prepared statement, because SavePoint not support prepared statement. // e.g. mysql8.0 doc: https://dev.mysql.com/doc/refman/8.0/en/sql-prepared-statements.html var ( preparedStmtTx *PreparedStmtTX isPreparedStmtTx bool ) // close prepared statement, because SavePoint not support prepared statement. if preparedStmtTx, isPreparedStmtTx = db.Statement.ConnPool.(*PreparedStmtTX); isPreparedStmtTx { db.Statement.ConnPool = preparedStmtTx.Tx } db.AddError(savePointer.SavePoint(db, name)) // restore prepared statement if isPreparedStmtTx { db.Statement.ConnPool = preparedStmtTx } } else { db.AddError(ErrUnsupportedDriver) } return db } func (db *DB) RollbackTo(name string) *DB { if savePointer, ok := db.Dialector.(SavePointerDialectorInterface); ok { // close prepared statement, because RollbackTo not support prepared statement. // e.g. mysql8.0 doc: https://dev.mysql.com/doc/refman/8.0/en/sql-prepared-statements.html var ( preparedStmtTx *PreparedStmtTX isPreparedStmtTx bool ) // close prepared statement, because SavePoint not support prepared statement. if preparedStmtTx, isPreparedStmtTx = db.Statement.ConnPool.(*PreparedStmtTX); isPreparedStmtTx { db.Statement.ConnPool = preparedStmtTx.Tx } db.AddError(savePointer.RollbackTo(db, name)) // restore prepared statement if isPreparedStmtTx { db.Statement.ConnPool = preparedStmtTx } } else { db.AddError(ErrUnsupportedDriver) } return db } // Exec executes raw sql func (db *DB) Exec(sql string, values ...interface{}) (tx *DB) { tx = db.getInstance() tx.Statement.SQL = strings.Builder{} if strings.Contains(sql, "@") { clause.NamedExpr{SQL: sql, Vars: values}.Build(tx.Statement) } else { clause.Expr{SQL: sql, Vars: values}.Build(tx.Statement) } return tx.callbacks.Raw().Execute(tx) }
go
MIT
0d9141bad9772c6047ecfdb2819d8a52d27ceb65
2026-01-07T08:35:52.485253Z
false
go-gorm/gorm
https://github.com/go-gorm/gorm/blob/0d9141bad9772c6047ecfdb2819d8a52d27ceb65/migrator.go
migrator.go
package gorm import ( "reflect" "gorm.io/gorm/clause" "gorm.io/gorm/schema" ) // Migrator returns migrator func (db *DB) Migrator() Migrator { tx := db.getInstance() // apply scopes to migrator for len(tx.Statement.scopes) > 0 { tx = tx.executeScopes() } return tx.Dialector.Migrator(tx.Session(&Session{})) } // AutoMigrate run auto migration for given models func (db *DB) AutoMigrate(dst ...interface{}) error { return db.Migrator().AutoMigrate(dst...) } // ViewOption view option type ViewOption struct { Replace bool // If true, exec `CREATE`. If false, exec `CREATE OR REPLACE` CheckOption string // optional. e.g. `WITH [ CASCADED | LOCAL ] CHECK OPTION` Query *DB // required subquery. } // ColumnType column type interface type ColumnType interface { Name() string DatabaseTypeName() string // varchar ColumnType() (columnType string, ok bool) // varchar(64) PrimaryKey() (isPrimaryKey bool, ok bool) AutoIncrement() (isAutoIncrement bool, ok bool) Length() (length int64, ok bool) DecimalSize() (precision int64, scale int64, ok bool) Nullable() (nullable bool, ok bool) Unique() (unique bool, ok bool) ScanType() reflect.Type Comment() (value string, ok bool) DefaultValue() (value string, ok bool) } type Index interface { Table() string Name() string Columns() []string PrimaryKey() (isPrimaryKey bool, ok bool) Unique() (unique bool, ok bool) Option() string } // TableType table type interface type TableType interface { Schema() string Name() string Type() string Comment() (comment string, ok bool) } // Migrator migrator interface type Migrator interface { // AutoMigrate AutoMigrate(dst ...interface{}) error // Database CurrentDatabase() string FullDataTypeOf(*schema.Field) clause.Expr GetTypeAliases(databaseTypeName string) []string // Tables CreateTable(dst ...interface{}) error DropTable(dst ...interface{}) error HasTable(dst interface{}) bool RenameTable(oldName, newName interface{}) error GetTables() (tableList []string, err error) TableType(dst interface{}) (TableType, error) // Columns AddColumn(dst interface{}, field string) error DropColumn(dst interface{}, field string) error AlterColumn(dst interface{}, field string) error MigrateColumn(dst interface{}, field *schema.Field, columnType ColumnType) error // MigrateColumnUnique migrate column's UNIQUE constraint, it's part of MigrateColumn. MigrateColumnUnique(dst interface{}, field *schema.Field, columnType ColumnType) error HasColumn(dst interface{}, field string) bool RenameColumn(dst interface{}, oldName, field string) error ColumnTypes(dst interface{}) ([]ColumnType, error) // Views CreateView(name string, option ViewOption) error DropView(name string) error // Constraints CreateConstraint(dst interface{}, name string) error DropConstraint(dst interface{}, name string) error HasConstraint(dst interface{}, name string) bool // Indexes CreateIndex(dst interface{}, name string) error DropIndex(dst interface{}, name string) error HasIndex(dst interface{}, name string) bool RenameIndex(dst interface{}, oldName, newName string) error GetIndexes(dst interface{}) ([]Index, error) }
go
MIT
0d9141bad9772c6047ecfdb2819d8a52d27ceb65
2026-01-07T08:35:52.485253Z
false
go-gorm/gorm
https://github.com/go-gorm/gorm/blob/0d9141bad9772c6047ecfdb2819d8a52d27ceb65/association.go
association.go
package gorm import ( "fmt" "reflect" "strings" "gorm.io/gorm/clause" "gorm.io/gorm/schema" "gorm.io/gorm/utils" ) // Association Mode contains some helper methods to handle relationship things easily. type Association struct { DB *DB Relationship *schema.Relationship Unscope bool Error error } func (db *DB) Association(column string) *Association { association := &Association{DB: db, Unscope: db.Statement.Unscoped} table := db.Statement.Table if association.Error = db.Statement.Parse(db.Statement.Model); association.Error == nil { db.Statement.Table = table association.Relationship = db.Statement.Schema.Relationships.Relations[column] if association.Relationship == nil { association.Error = fmt.Errorf("%w: %s", ErrUnsupportedRelation, column) } db.Statement.ReflectValue = reflect.ValueOf(db.Statement.Model) for db.Statement.ReflectValue.Kind() == reflect.Ptr { db.Statement.ReflectValue = db.Statement.ReflectValue.Elem() } } return association } func (association *Association) Unscoped() *Association { return &Association{ DB: association.DB, Relationship: association.Relationship, Error: association.Error, Unscope: true, } } func (association *Association) Find(out interface{}, conds ...interface{}) error { if association.Error == nil { association.Error = association.buildCondition().Find(out, conds...).Error } return association.Error } func (association *Association) Append(values ...interface{}) error { values = expandValues(values) if association.Error == nil { switch association.Relationship.Type { case schema.HasOne, schema.BelongsTo: if len(values) > 0 { association.Error = association.Replace(values...) } default: association.saveAssociation( /*clear*/ false, values...) } } return association.Error } func (association *Association) Replace(values ...interface{}) error { values = expandValues(values) if association.Error == nil { reflectValue := association.DB.Statement.ReflectValue rel := association.Relationship var oldBelongsToExpr clause.Expression // we have to record the old BelongsTo value if association.Unscope && rel.Type == schema.BelongsTo { var foreignFields []*schema.Field for _, ref := range rel.References { if !ref.OwnPrimaryKey { foreignFields = append(foreignFields, ref.ForeignKey) } } if _, fvs := schema.GetIdentityFieldValuesMap(association.DB.Statement.Context, reflectValue, foreignFields); len(fvs) > 0 { column, values := schema.ToQueryValues(rel.FieldSchema.Table, rel.FieldSchema.PrimaryFieldDBNames, fvs) oldBelongsToExpr = clause.IN{Column: column, Values: values} } } // save associations if association.saveAssociation( /*clear*/ true, values...); association.Error != nil { return association.Error } // set old association's foreign key to null switch rel.Type { case schema.BelongsTo: if len(values) == 0 { updateMap := map[string]interface{}{} switch reflectValue.Kind() { case reflect.Slice, reflect.Array: for i := 0; i < reflectValue.Len(); i++ { association.Error = rel.Field.Set(association.DB.Statement.Context, reflectValue.Index(i), reflect.Zero(rel.Field.FieldType).Interface()) } case reflect.Struct: association.Error = rel.Field.Set(association.DB.Statement.Context, reflectValue, reflect.Zero(rel.Field.FieldType).Interface()) } for _, ref := range rel.References { updateMap[ref.ForeignKey.DBName] = nil } association.Error = association.DB.UpdateColumns(updateMap).Error } if association.Unscope && oldBelongsToExpr != nil { association.Error = association.DB.Model(nil).Where(oldBelongsToExpr).Delete(reflect.New(rel.FieldSchema.ModelType).Interface()).Error } case schema.HasOne, schema.HasMany: var ( primaryFields []*schema.Field foreignKeys []string updateMap = map[string]interface{}{} relValues = schema.GetRelationsValues(association.DB.Statement.Context, reflectValue, []*schema.Relationship{rel}) modelValue = reflect.New(rel.FieldSchema.ModelType).Interface() tx = association.DB.Model(modelValue) ) if _, rvs := schema.GetIdentityFieldValuesMap(association.DB.Statement.Context, relValues, rel.FieldSchema.PrimaryFields); len(rvs) > 0 { if column, values := schema.ToQueryValues(rel.FieldSchema.Table, rel.FieldSchema.PrimaryFieldDBNames, rvs); len(values) > 0 { tx.Not(clause.IN{Column: column, Values: values}) } } for _, ref := range rel.References { if ref.OwnPrimaryKey { primaryFields = append(primaryFields, ref.PrimaryKey) foreignKeys = append(foreignKeys, ref.ForeignKey.DBName) updateMap[ref.ForeignKey.DBName] = nil } else if ref.PrimaryValue != "" { tx.Where(clause.Eq{Column: ref.ForeignKey.DBName, Value: ref.PrimaryValue}) } } if _, pvs := schema.GetIdentityFieldValuesMap(association.DB.Statement.Context, reflectValue, primaryFields); len(pvs) > 0 { column, values := schema.ToQueryValues(rel.FieldSchema.Table, foreignKeys, pvs) if association.Unscope { association.Error = tx.Where(clause.IN{Column: column, Values: values}).Delete(modelValue).Error } else { association.Error = tx.Where(clause.IN{Column: column, Values: values}).UpdateColumns(updateMap).Error } } case schema.Many2Many: var ( primaryFields, relPrimaryFields []*schema.Field joinPrimaryKeys, joinRelPrimaryKeys []string modelValue = reflect.New(rel.JoinTable.ModelType).Interface() tx = association.DB.Model(modelValue) ) for _, ref := range rel.References { if ref.PrimaryValue == "" { if ref.OwnPrimaryKey { primaryFields = append(primaryFields, ref.PrimaryKey) joinPrimaryKeys = append(joinPrimaryKeys, ref.ForeignKey.DBName) } else { relPrimaryFields = append(relPrimaryFields, ref.PrimaryKey) joinRelPrimaryKeys = append(joinRelPrimaryKeys, ref.ForeignKey.DBName) } } else { tx.Clauses(clause.Eq{Column: ref.ForeignKey.DBName, Value: ref.PrimaryValue}) } } _, pvs := schema.GetIdentityFieldValuesMap(association.DB.Statement.Context, reflectValue, primaryFields) if column, values := schema.ToQueryValues(rel.JoinTable.Table, joinPrimaryKeys, pvs); len(values) > 0 { tx.Where(clause.IN{Column: column, Values: values}) } else { return ErrPrimaryKeyRequired } _, rvs := schema.GetIdentityFieldValuesMapFromValues(association.DB.Statement.Context, values, relPrimaryFields) if relColumn, relValues := schema.ToQueryValues(rel.JoinTable.Table, joinRelPrimaryKeys, rvs); len(relValues) > 0 { tx.Where(clause.Not(clause.IN{Column: relColumn, Values: relValues})) } association.Error = tx.Delete(modelValue).Error } } return association.Error } func (association *Association) Delete(values ...interface{}) error { values = expandValues(values) if association.Error == nil { var ( reflectValue = association.DB.Statement.ReflectValue rel = association.Relationship primaryFields []*schema.Field foreignKeys []string updateAttrs = map[string]interface{}{} conds []clause.Expression ) for _, ref := range rel.References { if ref.PrimaryValue == "" { primaryFields = append(primaryFields, ref.PrimaryKey) foreignKeys = append(foreignKeys, ref.ForeignKey.DBName) updateAttrs[ref.ForeignKey.DBName] = nil } else { conds = append(conds, clause.Eq{Column: ref.ForeignKey.DBName, Value: ref.PrimaryValue}) } } switch rel.Type { case schema.BelongsTo: associationDB := association.DB.Session(&Session{}) tx := associationDB.Model(reflect.New(rel.Schema.ModelType).Interface()) _, pvs := schema.GetIdentityFieldValuesMap(association.DB.Statement.Context, reflectValue, rel.Schema.PrimaryFields) if pcolumn, pvalues := schema.ToQueryValues(rel.Schema.Table, rel.Schema.PrimaryFieldDBNames, pvs); len(pvalues) > 0 { conds = append(conds, clause.IN{Column: pcolumn, Values: pvalues}) } else { return ErrPrimaryKeyRequired } _, rvs := schema.GetIdentityFieldValuesMapFromValues(association.DB.Statement.Context, values, primaryFields) relColumn, relValues := schema.ToQueryValues(rel.Schema.Table, foreignKeys, rvs) conds = append(conds, clause.IN{Column: relColumn, Values: relValues}) association.Error = tx.Clauses(conds...).UpdateColumns(updateAttrs).Error if association.Unscope { var foreignFields []*schema.Field for _, ref := range rel.References { if !ref.OwnPrimaryKey { foreignFields = append(foreignFields, ref.ForeignKey) } } if _, fvs := schema.GetIdentityFieldValuesMap(association.DB.Statement.Context, reflectValue, foreignFields); len(fvs) > 0 { column, values := schema.ToQueryValues(rel.FieldSchema.Table, rel.FieldSchema.PrimaryFieldDBNames, fvs) association.Error = associationDB.Model(nil).Where(clause.IN{Column: column, Values: values}).Delete(reflect.New(rel.FieldSchema.ModelType).Interface()).Error } } case schema.HasOne, schema.HasMany: model := reflect.New(rel.FieldSchema.ModelType).Interface() tx := association.DB.Model(model) _, pvs := schema.GetIdentityFieldValuesMap(association.DB.Statement.Context, reflectValue, primaryFields) if pcolumn, pvalues := schema.ToQueryValues(rel.FieldSchema.Table, foreignKeys, pvs); len(pvalues) > 0 { conds = append(conds, clause.IN{Column: pcolumn, Values: pvalues}) } else { return ErrPrimaryKeyRequired } _, rvs := schema.GetIdentityFieldValuesMapFromValues(association.DB.Statement.Context, values, rel.FieldSchema.PrimaryFields) relColumn, relValues := schema.ToQueryValues(rel.FieldSchema.Table, rel.FieldSchema.PrimaryFieldDBNames, rvs) conds = append(conds, clause.IN{Column: relColumn, Values: relValues}) if association.Unscope { association.Error = tx.Clauses(conds...).Delete(model).Error } else { association.Error = tx.Clauses(conds...).UpdateColumns(updateAttrs).Error } case schema.Many2Many: var ( primaryFields, relPrimaryFields []*schema.Field joinPrimaryKeys, joinRelPrimaryKeys []string joinValue = reflect.New(rel.JoinTable.ModelType).Interface() ) for _, ref := range rel.References { if ref.PrimaryValue == "" { if ref.OwnPrimaryKey { primaryFields = append(primaryFields, ref.PrimaryKey) joinPrimaryKeys = append(joinPrimaryKeys, ref.ForeignKey.DBName) } else { relPrimaryFields = append(relPrimaryFields, ref.PrimaryKey) joinRelPrimaryKeys = append(joinRelPrimaryKeys, ref.ForeignKey.DBName) } } else { conds = append(conds, clause.Eq{Column: ref.ForeignKey.DBName, Value: ref.PrimaryValue}) } } _, pvs := schema.GetIdentityFieldValuesMap(association.DB.Statement.Context, reflectValue, primaryFields) if pcolumn, pvalues := schema.ToQueryValues(rel.JoinTable.Table, joinPrimaryKeys, pvs); len(pvalues) > 0 { conds = append(conds, clause.IN{Column: pcolumn, Values: pvalues}) } else { return ErrPrimaryKeyRequired } _, rvs := schema.GetIdentityFieldValuesMapFromValues(association.DB.Statement.Context, values, relPrimaryFields) relColumn, relValues := schema.ToQueryValues(rel.JoinTable.Table, joinRelPrimaryKeys, rvs) conds = append(conds, clause.IN{Column: relColumn, Values: relValues}) association.Error = association.DB.Where(clause.Where{Exprs: conds}).Model(nil).Delete(joinValue).Error } if association.Error == nil { // clean up deleted values' foreign key relValuesMap, _ := schema.GetIdentityFieldValuesMapFromValues(association.DB.Statement.Context, values, rel.FieldSchema.PrimaryFields) cleanUpDeletedRelations := func(data reflect.Value) { if _, zero := rel.Field.ValueOf(association.DB.Statement.Context, data); !zero { fieldValue := reflect.Indirect(rel.Field.ReflectValueOf(association.DB.Statement.Context, data)) primaryValues := make([]interface{}, len(rel.FieldSchema.PrimaryFields)) switch fieldValue.Kind() { case reflect.Slice, reflect.Array: validFieldValues := reflect.Zero(rel.Field.IndirectFieldType) for i := 0; i < fieldValue.Len(); i++ { for idx, field := range rel.FieldSchema.PrimaryFields { primaryValues[idx], _ = field.ValueOf(association.DB.Statement.Context, fieldValue.Index(i)) } if _, ok := relValuesMap[utils.ToStringKey(primaryValues...)]; !ok { validFieldValues = reflect.Append(validFieldValues, fieldValue.Index(i)) } } association.Error = rel.Field.Set(association.DB.Statement.Context, data, validFieldValues.Interface()) case reflect.Struct: for idx, field := range rel.FieldSchema.PrimaryFields { primaryValues[idx], _ = field.ValueOf(association.DB.Statement.Context, fieldValue) } if _, ok := relValuesMap[utils.ToStringKey(primaryValues...)]; ok { if association.Error = rel.Field.Set(association.DB.Statement.Context, data, reflect.Zero(rel.FieldSchema.ModelType).Interface()); association.Error != nil { break } if rel.JoinTable == nil { for _, ref := range rel.References { if ref.OwnPrimaryKey || ref.PrimaryValue != "" { association.Error = ref.ForeignKey.Set(association.DB.Statement.Context, fieldValue, reflect.Zero(ref.ForeignKey.FieldType).Interface()) } else { association.Error = ref.ForeignKey.Set(association.DB.Statement.Context, data, reflect.Zero(ref.ForeignKey.FieldType).Interface()) } } } } } } } switch reflectValue.Kind() { case reflect.Slice, reflect.Array: for i := 0; i < reflectValue.Len(); i++ { cleanUpDeletedRelations(reflect.Indirect(reflectValue.Index(i))) } case reflect.Struct: cleanUpDeletedRelations(reflectValue) } } } return association.Error } func (association *Association) Clear() error { return association.Replace() } func (association *Association) Count() (count int64) { if association.Error == nil { association.Error = association.buildCondition().Count(&count).Error } return } type assignBack struct { Source reflect.Value Index int Dest reflect.Value } func (association *Association) saveAssociation(clear bool, values ...interface{}) { var ( reflectValue = association.DB.Statement.ReflectValue assignBacks []assignBack // assign association values back to arguments after save ) appendToRelations := func(source, rv reflect.Value, clear bool) { switch association.Relationship.Type { case schema.HasOne, schema.BelongsTo: switch rv.Kind() { case reflect.Slice, reflect.Array: if rv.Len() > 0 { association.Error = association.Relationship.Field.Set(association.DB.Statement.Context, source, rv.Index(0).Addr().Interface()) if association.Relationship.Field.FieldType.Kind() == reflect.Struct { assignBacks = append(assignBacks, assignBack{Source: source, Dest: rv.Index(0)}) } } case reflect.Struct: if !rv.CanAddr() { association.Error = ErrInvalidValue return } association.Error = association.Relationship.Field.Set(association.DB.Statement.Context, source, rv.Addr().Interface()) if association.Relationship.Field.FieldType.Kind() == reflect.Struct { assignBacks = append(assignBacks, assignBack{Source: source, Dest: rv}) } } case schema.HasMany, schema.Many2Many: elemType := association.Relationship.Field.IndirectFieldType.Elem() oldFieldValue := reflect.Indirect(association.Relationship.Field.ReflectValueOf(association.DB.Statement.Context, source)) var fieldValue reflect.Value if clear { fieldValue = reflect.MakeSlice(oldFieldValue.Type(), 0, oldFieldValue.Cap()) } else { fieldValue = reflect.MakeSlice(oldFieldValue.Type(), oldFieldValue.Len(), oldFieldValue.Cap()) reflect.Copy(fieldValue, oldFieldValue) } appendToFieldValues := func(ev reflect.Value) { if ev.Type().AssignableTo(elemType) { fieldValue = reflect.Append(fieldValue, ev) } else if ev.Type().Elem().AssignableTo(elemType) { fieldValue = reflect.Append(fieldValue, ev.Elem()) } else { association.Error = fmt.Errorf("unsupported data type: %v for relation %s", ev.Type(), association.Relationship.Name) } if elemType.Kind() == reflect.Struct { assignBacks = append(assignBacks, assignBack{Source: source, Dest: ev, Index: fieldValue.Len()}) } } processMap := func(mapv reflect.Value) { child := reflect.New(association.Relationship.FieldSchema.ModelType) switch association.Relationship.Type { case schema.HasMany: for _, ref := range association.Relationship.References { key := reflect.ValueOf(ref.ForeignKey.DBName) if ref.OwnPrimaryKey { v := ref.PrimaryKey.ReflectValueOf(association.DB.Statement.Context, source) mapv.SetMapIndex(key, v) } else if ref.PrimaryValue != "" { mapv.SetMapIndex(key, reflect.ValueOf(ref.PrimaryValue)) } } association.Error = association.DB.Session(&Session{ NewDB: true, }).Model(child.Interface()).Create(mapv.Interface()).Error case schema.Many2Many: association.Error = association.DB.Session(&Session{ NewDB: true, }).Model(child.Interface()).Create(mapv.Interface()).Error for _, key := range mapv.MapKeys() { k := strings.ToLower(key.String()) if f, ok := association.Relationship.FieldSchema.FieldsByDBName[k]; ok { _ = f.Set(association.DB.Statement.Context, child, mapv.MapIndex(key).Interface()) } } appendToFieldValues(child) } } switch rv.Kind() { case reflect.Map: processMap(rv) case reflect.Slice, reflect.Array: for i := 0; i < rv.Len(); i++ { elem := reflect.Indirect(rv.Index(i)) if elem.Kind() == reflect.Map { processMap(elem) continue } appendToFieldValues(elem.Addr()) } case reflect.Struct: if !rv.CanAddr() { association.Error = ErrInvalidValue return } appendToFieldValues(rv.Addr()) } if association.Error == nil { association.Error = association.Relationship.Field.Set(association.DB.Statement.Context, source, fieldValue.Interface()) } } } selectedSaveColumns := []string{association.Relationship.Name} omitColumns := []string{} selectColumns, _ := association.DB.Statement.SelectAndOmitColumns(true, false) for name, ok := range selectColumns { columnName := "" if strings.HasPrefix(name, association.Relationship.Name) { if columnName = strings.TrimPrefix(name, association.Relationship.Name); columnName == ".*" { columnName = name } } else if strings.HasPrefix(name, clause.Associations) { columnName = name } if columnName != "" { if ok { selectedSaveColumns = append(selectedSaveColumns, columnName) } else { omitColumns = append(omitColumns, columnName) } } } for _, ref := range association.Relationship.References { if !ref.OwnPrimaryKey { selectedSaveColumns = append(selectedSaveColumns, ref.ForeignKey.Name) } } associationDB := association.DB.Session(&Session{}).Model(nil) if !association.DB.FullSaveAssociations { associationDB.Select(selectedSaveColumns) } if len(omitColumns) > 0 { associationDB.Omit(omitColumns...) } associationDB = associationDB.Session(&Session{}) switch reflectValue.Kind() { case reflect.Slice, reflect.Array: if len(values) != reflectValue.Len() { // clear old data if clear && len(values) == 0 { for i := 0; i < reflectValue.Len(); i++ { if err := association.Relationship.Field.Set(association.DB.Statement.Context, reflectValue.Index(i), reflect.New(association.Relationship.Field.IndirectFieldType).Interface()); err != nil { association.Error = err break } if association.Relationship.JoinTable == nil { for _, ref := range association.Relationship.References { if !ref.OwnPrimaryKey && ref.PrimaryValue == "" { if err := ref.ForeignKey.Set(association.DB.Statement.Context, reflectValue.Index(i), reflect.Zero(ref.ForeignKey.FieldType).Interface()); err != nil { association.Error = err break } } } } } break } association.Error = ErrInvalidValueOfLength return } for i := 0; i < reflectValue.Len(); i++ { appendToRelations(reflectValue.Index(i), reflect.Indirect(reflect.ValueOf(values[i])), clear) if association.Error != nil { return } // TODO support save slice data, sql with case? association.Error = associationDB.Updates(reflectValue.Index(i).Addr().Interface()).Error } case reflect.Struct: // clear old data if clear && len(values) == 0 { association.Error = association.Relationship.Field.Set(association.DB.Statement.Context, reflectValue, reflect.New(association.Relationship.Field.IndirectFieldType).Interface()) if association.Relationship.JoinTable == nil && association.Error == nil { for _, ref := range association.Relationship.References { if !ref.OwnPrimaryKey && ref.PrimaryValue == "" { association.Error = ref.ForeignKey.Set(association.DB.Statement.Context, reflectValue, reflect.Zero(ref.ForeignKey.FieldType).Interface()) } } } } for idx, value := range values { rv := reflect.Indirect(reflect.ValueOf(value)) appendToRelations(reflectValue, rv, clear && idx == 0) if association.Error != nil { return } } if len(values) > 0 { association.Error = associationDB.Updates(reflectValue.Addr().Interface()).Error } } for _, assignBack := range assignBacks { fieldValue := reflect.Indirect(association.Relationship.Field.ReflectValueOf(association.DB.Statement.Context, assignBack.Source)) if assignBack.Index > 0 { reflect.Indirect(assignBack.Dest).Set(fieldValue.Index(assignBack.Index - 1)) } else { reflect.Indirect(assignBack.Dest).Set(fieldValue) } } } func (association *Association) buildCondition() *DB { var ( queryConds = association.Relationship.ToQueryConditions(association.DB.Statement.Context, association.DB.Statement.ReflectValue) modelValue = reflect.New(association.Relationship.FieldSchema.ModelType).Interface() tx = association.DB.Model(modelValue) ) if association.Relationship.JoinTable != nil { if !tx.Statement.Unscoped && len(association.Relationship.JoinTable.QueryClauses) > 0 { joinStmt := Statement{DB: tx, Context: tx.Statement.Context, Schema: association.Relationship.JoinTable, Table: association.Relationship.JoinTable.Table, Clauses: map[string]clause.Clause{}} for _, queryClause := range association.Relationship.JoinTable.QueryClauses { joinStmt.AddClause(queryClause) } joinStmt.Build("WHERE") if len(joinStmt.SQL.String()) > 0 { tx.Clauses(clause.Expr{SQL: strings.Replace(joinStmt.SQL.String(), "WHERE ", "", 1), Vars: joinStmt.Vars}) } } tx = tx.Session(&Session{QueryFields: true}).Clauses(clause.From{Joins: []clause.Join{{ Table: clause.Table{Name: association.Relationship.JoinTable.Table}, ON: clause.Where{Exprs: queryConds}, }}}) } else { tx.Clauses(clause.Where{Exprs: queryConds}) } return tx } func expandValues(values ...any) (results []any) { appendToResult := func(rv reflect.Value) { // unwrap interface if rv.IsValid() && rv.Kind() == reflect.Interface { rv = rv.Elem() } if rv.IsValid() && rv.Kind() == reflect.Struct { p := reflect.New(rv.Type()) p.Elem().Set(rv) results = append(results, p.Interface()) } else if rv.IsValid() { results = append(results, rv.Interface()) } } // Process each argument; if an argument is a slice/array, expand its elements for _, value := range values { rv := reflect.ValueOf(value) if rv.Kind() == reflect.Slice || rv.Kind() == reflect.Array { for i := 0; i < rv.Len(); i++ { appendToResult(rv.Index(i)) } } else { appendToResult(rv) } } return }
go
MIT
0d9141bad9772c6047ecfdb2819d8a52d27ceb65
2026-01-07T08:35:52.485253Z
false
go-gorm/gorm
https://github.com/go-gorm/gorm/blob/0d9141bad9772c6047ecfdb2819d8a52d27ceb65/prepare_stmt.go
prepare_stmt.go
package gorm import ( "context" "database/sql" "database/sql/driver" "errors" "reflect" "sync" "time" "gorm.io/gorm/internal/stmt_store" ) type PreparedStmtDB struct { Stmts stmt_store.Store Mux *sync.RWMutex ConnPool } // NewPreparedStmtDB creates and initializes a new instance of PreparedStmtDB. // // Parameters: // - connPool: A connection pool that implements the ConnPool interface, used for managing database connections. // - maxSize: The maximum number of prepared statements that can be stored in the statement store. // - ttl: The time-to-live duration for each prepared statement in the store. Statements older than this duration will be automatically removed. // // Returns: // - A pointer to a PreparedStmtDB instance, which manages prepared statements using the provided connection pool and configuration. func NewPreparedStmtDB(connPool ConnPool, maxSize int, ttl time.Duration) *PreparedStmtDB { return &PreparedStmtDB{ ConnPool: connPool, // Assigns the provided connection pool to manage database connections. Stmts: stmt_store.New(maxSize, ttl), // Initializes a new statement store with the specified maximum size and TTL. Mux: &sync.RWMutex{}, // Sets up a read-write mutex for synchronizing access to the statement store. } } // GetDBConn returns the underlying *sql.DB connection func (db *PreparedStmtDB) GetDBConn() (*sql.DB, error) { if sqldb, ok := db.ConnPool.(*sql.DB); ok { return sqldb, nil } if dbConnector, ok := db.ConnPool.(GetDBConnector); ok && dbConnector != nil { return dbConnector.GetDBConn() } return nil, ErrInvalidDB } // Close closes all prepared statements in the store func (db *PreparedStmtDB) Close() { db.Mux.Lock() defer db.Mux.Unlock() for _, key := range db.Stmts.Keys() { db.Stmts.Delete(key) } } // Reset Deprecated use Close instead func (db *PreparedStmtDB) Reset() { db.Close() } func (db *PreparedStmtDB) prepare(ctx context.Context, conn ConnPool, isTransaction bool, query string) (_ *stmt_store.Stmt, err error) { db.Mux.RLock() if db.Stmts != nil { if stmt, ok := db.Stmts.Get(query); ok && (!stmt.Transaction || isTransaction) { db.Mux.RUnlock() return stmt, stmt.Error() } } db.Mux.RUnlock() // retry db.Mux.Lock() if db.Stmts != nil { if stmt, ok := db.Stmts.Get(query); ok && (!stmt.Transaction || isTransaction) { db.Mux.Unlock() return stmt, stmt.Error() } } return db.Stmts.New(ctx, query, isTransaction, conn, db.Mux) } func (db *PreparedStmtDB) BeginTx(ctx context.Context, opt *sql.TxOptions) (ConnPool, error) { if beginner, ok := db.ConnPool.(TxBeginner); ok { tx, err := beginner.BeginTx(ctx, opt) return &PreparedStmtTX{PreparedStmtDB: db, Tx: tx}, err } beginner, ok := db.ConnPool.(ConnPoolBeginner) if !ok { return nil, ErrInvalidTransaction } connPool, err := beginner.BeginTx(ctx, opt) if err != nil { return nil, err } if tx, ok := connPool.(Tx); ok { return &PreparedStmtTX{PreparedStmtDB: db, Tx: tx}, nil } return nil, ErrInvalidTransaction } func (db *PreparedStmtDB) ExecContext(ctx context.Context, query string, args ...interface{}) (result sql.Result, err error) { stmt, err := db.prepare(ctx, db.ConnPool, false, query) if err == nil { result, err = stmt.ExecContext(ctx, args...) if errors.Is(err, driver.ErrBadConn) { db.Stmts.Delete(query) } } return result, err } func (db *PreparedStmtDB) QueryContext(ctx context.Context, query string, args ...interface{}) (rows *sql.Rows, err error) { stmt, err := db.prepare(ctx, db.ConnPool, false, query) if err == nil { rows, err = stmt.QueryContext(ctx, args...) if errors.Is(err, driver.ErrBadConn) { db.Stmts.Delete(query) } } return rows, err } func (db *PreparedStmtDB) QueryRowContext(ctx context.Context, query string, args ...interface{}) *sql.Row { stmt, err := db.prepare(ctx, db.ConnPool, false, query) if err == nil { return stmt.QueryRowContext(ctx, args...) } return &sql.Row{} } func (db *PreparedStmtDB) Ping() error { conn, err := db.GetDBConn() if err != nil { return err } return conn.Ping() } type PreparedStmtTX struct { Tx PreparedStmtDB *PreparedStmtDB } func (db *PreparedStmtTX) GetDBConn() (*sql.DB, error) { return db.PreparedStmtDB.GetDBConn() } func (tx *PreparedStmtTX) Commit() error { if tx.Tx != nil && !reflect.ValueOf(tx.Tx).IsNil() { return tx.Tx.Commit() } return ErrInvalidTransaction } func (tx *PreparedStmtTX) Rollback() error { if tx.Tx != nil && !reflect.ValueOf(tx.Tx).IsNil() { return tx.Tx.Rollback() } return ErrInvalidTransaction } func (tx *PreparedStmtTX) ExecContext(ctx context.Context, query string, args ...interface{}) (result sql.Result, err error) { stmt, err := tx.PreparedStmtDB.prepare(ctx, tx.Tx, true, query) if err == nil { result, err = tx.Tx.StmtContext(ctx, stmt.Stmt).ExecContext(ctx, args...) if errors.Is(err, driver.ErrBadConn) { tx.PreparedStmtDB.Stmts.Delete(query) } } return result, err } func (tx *PreparedStmtTX) QueryContext(ctx context.Context, query string, args ...interface{}) (rows *sql.Rows, err error) { stmt, err := tx.PreparedStmtDB.prepare(ctx, tx.Tx, true, query) if err == nil { rows, err = tx.Tx.StmtContext(ctx, stmt.Stmt).QueryContext(ctx, args...) if errors.Is(err, driver.ErrBadConn) { tx.PreparedStmtDB.Stmts.Delete(query) } } return rows, err } func (tx *PreparedStmtTX) QueryRowContext(ctx context.Context, query string, args ...interface{}) *sql.Row { stmt, err := tx.PreparedStmtDB.prepare(ctx, tx.Tx, true, query) if err == nil { return tx.Tx.StmtContext(ctx, stmt.Stmt).QueryRowContext(ctx, args...) } return &sql.Row{} } func (tx *PreparedStmtTX) Ping() error { conn, err := tx.GetDBConn() if err != nil { return err } return conn.Ping() }
go
MIT
0d9141bad9772c6047ecfdb2819d8a52d27ceb65
2026-01-07T08:35:52.485253Z
false
go-gorm/gorm
https://github.com/go-gorm/gorm/blob/0d9141bad9772c6047ecfdb2819d8a52d27ceb65/generics.go
generics.go
package gorm import ( "context" "database/sql" "errors" "fmt" "reflect" "sort" "strings" "gorm.io/gorm/clause" "gorm.io/gorm/logger" "gorm.io/gorm/schema" ) type result struct { Result sql.Result RowsAffected int64 } func (info *result) ModifyStatement(stmt *Statement) { stmt.Result = info } // Build implements clause.Expression interface func (result) Build(clause.Builder) { } func WithResult() *result { return &result{} } type Interface[T any] interface { Raw(sql string, values ...interface{}) ExecInterface[T] Exec(ctx context.Context, sql string, values ...interface{}) error CreateInterface[T] } type CreateInterface[T any] interface { ExecInterface[T] // chain methods available at start; Select/Omit keep CreateInterface to allow Create chaining Scopes(scopes ...func(db *Statement)) ChainInterface[T] Where(query interface{}, args ...interface{}) ChainInterface[T] Not(query interface{}, args ...interface{}) ChainInterface[T] Or(query interface{}, args ...interface{}) ChainInterface[T] Limit(offset int) ChainInterface[T] Offset(offset int) ChainInterface[T] Joins(query clause.JoinTarget, on func(db JoinBuilder, joinTable clause.Table, curTable clause.Table) error) ChainInterface[T] Preload(association string, query func(db PreloadBuilder) error) ChainInterface[T] Select(query string, args ...interface{}) CreateInterface[T] Omit(columns ...string) CreateInterface[T] MapColumns(m map[string]string) ChainInterface[T] Distinct(args ...interface{}) ChainInterface[T] Group(name string) ChainInterface[T] Having(query interface{}, args ...interface{}) ChainInterface[T] Order(value interface{}) ChainInterface[T] Build(builder clause.Builder) Delete(ctx context.Context) (rowsAffected int, err error) Update(ctx context.Context, name string, value any) (rowsAffected int, err error) Updates(ctx context.Context, t T) (rowsAffected int, err error) Count(ctx context.Context, column string) (result int64, err error) Table(name string, args ...interface{}) CreateInterface[T] Create(ctx context.Context, r *T) error CreateInBatches(ctx context.Context, r *[]T, batchSize int) error Set(assignments ...clause.Assigner) SetCreateOrUpdateInterface[T] } type ChainInterface[T any] interface { ExecInterface[T] Scopes(scopes ...func(db *Statement)) ChainInterface[T] Where(query interface{}, args ...interface{}) ChainInterface[T] Not(query interface{}, args ...interface{}) ChainInterface[T] Or(query interface{}, args ...interface{}) ChainInterface[T] Limit(offset int) ChainInterface[T] Offset(offset int) ChainInterface[T] Joins(query clause.JoinTarget, on func(db JoinBuilder, joinTable clause.Table, curTable clause.Table) error) ChainInterface[T] Preload(association string, query func(db PreloadBuilder) error) ChainInterface[T] Select(query string, args ...interface{}) ChainInterface[T] Omit(columns ...string) ChainInterface[T] MapColumns(m map[string]string) ChainInterface[T] Distinct(args ...interface{}) ChainInterface[T] Group(name string) ChainInterface[T] Having(query interface{}, args ...interface{}) ChainInterface[T] Order(value interface{}) ChainInterface[T] Set(assignments ...clause.Assigner) SetUpdateOnlyInterface[T] Build(builder clause.Builder) Table(name string, args ...interface{}) ChainInterface[T] Delete(ctx context.Context) (rowsAffected int, err error) Update(ctx context.Context, name string, value any) (rowsAffected int, err error) Updates(ctx context.Context, t T) (rowsAffected int, err error) Count(ctx context.Context, column string) (result int64, err error) } // SetUpdateOnlyInterface is returned by Set after chaining; only Update is allowed type SetUpdateOnlyInterface[T any] interface { Update(ctx context.Context) (rowsAffected int, err error) } // SetCreateOrUpdateInterface is returned by Set at start; Create or Update are allowed type SetCreateOrUpdateInterface[T any] interface { Create(ctx context.Context) error Update(ctx context.Context) (rowsAffected int, err error) } type ExecInterface[T any] interface { Scan(ctx context.Context, r interface{}) error First(context.Context) (T, error) Last(ctx context.Context) (T, error) Take(context.Context) (T, error) Find(ctx context.Context) ([]T, error) FindInBatches(ctx context.Context, batchSize int, fc func(data []T, batch int) error) error Row(ctx context.Context) *sql.Row Rows(ctx context.Context) (*sql.Rows, error) } type JoinBuilder interface { Select(...string) JoinBuilder Omit(...string) JoinBuilder Where(query interface{}, args ...interface{}) JoinBuilder Not(query interface{}, args ...interface{}) JoinBuilder Or(query interface{}, args ...interface{}) JoinBuilder } type PreloadBuilder interface { Select(...string) PreloadBuilder Omit(...string) PreloadBuilder Where(query interface{}, args ...interface{}) PreloadBuilder Not(query interface{}, args ...interface{}) PreloadBuilder Or(query interface{}, args ...interface{}) PreloadBuilder Limit(offset int) PreloadBuilder Offset(offset int) PreloadBuilder Order(value interface{}) PreloadBuilder LimitPerRecord(num int) PreloadBuilder } type op func(*DB) *DB func G[T any](db *DB, opts ...clause.Expression) Interface[T] { v := &g[T]{ db: db, ops: make([]op, 0, 5), } if len(opts) > 0 { v.ops = append(v.ops, func(db *DB) *DB { return db.Clauses(opts...) }) } v.createG = &createG[T]{ chainG: chainG[T]{ execG: execG[T]{g: v}, }, } return v } type g[T any] struct { *createG[T] db *DB ops []op } func (g *g[T]) apply(ctx context.Context) *DB { db := g.db if !db.DryRun { db = db.Session(&Session{NewDB: true, Context: ctx}).getInstance() } for _, op := range g.ops { db = op(db) } return db } func (c *g[T]) Raw(sql string, values ...interface{}) ExecInterface[T] { return execG[T]{g: &g[T]{ db: c.db, ops: append(c.ops, func(db *DB) *DB { var r T return db.Model(r).Raw(sql, values...) }), }} } func (c *g[T]) Exec(ctx context.Context, sql string, values ...interface{}) error { var r T return c.apply(ctx).Model(r).Exec(sql, values...).Error } type createG[T any] struct { chainG[T] } func (c createG[T]) Table(name string, args ...interface{}) CreateInterface[T] { return createG[T]{c.with(func(db *DB) *DB { return db.Table(name, args...) })} } func (c createG[T]) Select(query string, args ...interface{}) CreateInterface[T] { return createG[T]{c.with(func(db *DB) *DB { return db.Select(query, args...) })} } func (c createG[T]) Omit(columns ...string) CreateInterface[T] { return createG[T]{c.with(func(db *DB) *DB { return db.Omit(columns...) })} } func (c createG[T]) Set(assignments ...clause.Assigner) SetCreateOrUpdateInterface[T] { return c.processSet(assignments...) } func (c createG[T]) Create(ctx context.Context, r *T) error { return c.g.apply(ctx).Create(r).Error } func (c createG[T]) CreateInBatches(ctx context.Context, r *[]T, batchSize int) error { return c.g.apply(ctx).CreateInBatches(r, batchSize).Error } type chainG[T any] struct { execG[T] } func (c chainG[T]) getInstance() *DB { var r T return c.g.apply(context.Background()).Model(r).getInstance() } func (c chainG[T]) with(v op) chainG[T] { return chainG[T]{ execG: execG[T]{g: &g[T]{ db: c.g.db, ops: append(append([]op(nil), c.g.ops...), v), }}, } } func (c chainG[T]) Table(name string, args ...interface{}) ChainInterface[T] { return c.with(func(db *DB) *DB { return db.Table(name, args...) }) } func (c chainG[T]) Scopes(scopes ...func(db *Statement)) ChainInterface[T] { return c.with(func(db *DB) *DB { for _, fc := range scopes { fc(db.Statement) } return db }) } func (c chainG[T]) Where(query interface{}, args ...interface{}) ChainInterface[T] { return c.with(func(db *DB) *DB { return db.Where(query, args...) }) } func (c chainG[T]) Not(query interface{}, args ...interface{}) ChainInterface[T] { return c.with(func(db *DB) *DB { return db.Not(query, args...) }) } func (c chainG[T]) Or(query interface{}, args ...interface{}) ChainInterface[T] { return c.with(func(db *DB) *DB { return db.Or(query, args...) }) } func (c chainG[T]) Limit(offset int) ChainInterface[T] { return c.with(func(db *DB) *DB { return db.Limit(offset) }) } func (c chainG[T]) Offset(offset int) ChainInterface[T] { return c.with(func(db *DB) *DB { return db.Offset(offset) }) } type joinBuilder struct { db *DB } func (q *joinBuilder) Where(query interface{}, args ...interface{}) JoinBuilder { q.db.Where(query, args...) return q } func (q *joinBuilder) Or(query interface{}, args ...interface{}) JoinBuilder { q.db.Where(query, args...) return q } func (q *joinBuilder) Not(query interface{}, args ...interface{}) JoinBuilder { q.db.Where(query, args...) return q } func (q *joinBuilder) Select(columns ...string) JoinBuilder { q.db.Select(columns) return q } func (q *joinBuilder) Omit(columns ...string) JoinBuilder { q.db.Omit(columns...) return q } type preloadBuilder struct { limitPerRecord int db *DB } func (q *preloadBuilder) Where(query interface{}, args ...interface{}) PreloadBuilder { q.db.Where(query, args...) return q } func (q *preloadBuilder) Or(query interface{}, args ...interface{}) PreloadBuilder { q.db.Where(query, args...) return q } func (q *preloadBuilder) Not(query interface{}, args ...interface{}) PreloadBuilder { q.db.Where(query, args...) return q } func (q *preloadBuilder) Select(columns ...string) PreloadBuilder { q.db.Select(columns) return q } func (q *preloadBuilder) Omit(columns ...string) PreloadBuilder { q.db.Omit(columns...) return q } func (q *preloadBuilder) Limit(limit int) PreloadBuilder { q.db.Limit(limit) return q } func (q *preloadBuilder) Offset(offset int) PreloadBuilder { q.db.Offset(offset) return q } func (q *preloadBuilder) Order(value interface{}) PreloadBuilder { q.db.Order(value) return q } func (q *preloadBuilder) LimitPerRecord(num int) PreloadBuilder { q.limitPerRecord = num return q } func (c chainG[T]) Joins(jt clause.JoinTarget, on func(db JoinBuilder, joinTable clause.Table, curTable clause.Table) error) ChainInterface[T] { return c.with(func(db *DB) *DB { if jt.Table == "" { jt.Table = clause.JoinTable(strings.Split(jt.Association, ".")...).Name } q := joinBuilder{db: db.Session(&Session{NewDB: true, Initialized: true}).Table(jt.Table)} if on != nil { if err := on(&q, clause.Table{Name: jt.Table}, clause.Table{Name: clause.CurrentTable}); err != nil { db.AddError(err) } } j := join{ Name: jt.Association, Alias: jt.Table, Selects: q.db.Statement.Selects, Omits: q.db.Statement.Omits, JoinType: jt.Type, } if where, ok := q.db.Statement.Clauses["WHERE"].Expression.(clause.Where); ok { j.On = &where } if jt.Subquery != nil { joinType := j.JoinType if joinType == "" { joinType = clause.LeftJoin } if db, ok := jt.Subquery.(interface{ getInstance() *DB }); ok { stmt := db.getInstance().Statement if len(j.Selects) == 0 { j.Selects = stmt.Selects } if len(j.Omits) == 0 { j.Omits = stmt.Omits } } expr := clause.NamedExpr{SQL: fmt.Sprintf("%s JOIN (?) AS ?", joinType), Vars: []interface{}{jt.Subquery, clause.Table{Name: j.Alias}}} if j.On != nil { expr.SQL += " ON ?" expr.Vars = append(expr.Vars, clause.AndConditions{Exprs: j.On.Exprs}) } j.Expression = expr } db.Statement.Joins = append(db.Statement.Joins, j) sort.Slice(db.Statement.Joins, func(i, j int) bool { return db.Statement.Joins[i].Name < db.Statement.Joins[j].Name }) return db }) } func (c chainG[T]) Select(query string, args ...interface{}) ChainInterface[T] { return c.with(func(db *DB) *DB { return db.Select(query, args...) }) } func (c chainG[T]) Omit(columns ...string) ChainInterface[T] { return c.with(func(db *DB) *DB { return db.Omit(columns...) }) } func (c chainG[T]) MapColumns(m map[string]string) ChainInterface[T] { return c.with(func(db *DB) *DB { return db.MapColumns(m) }) } func (c chainG[T]) Set(assignments ...clause.Assigner) SetUpdateOnlyInterface[T] { return c.processSet(assignments...) } func (c chainG[T]) Distinct(args ...interface{}) ChainInterface[T] { return c.with(func(db *DB) *DB { return db.Distinct(args...) }) } func (c chainG[T]) Group(name string) ChainInterface[T] { return c.with(func(db *DB) *DB { return db.Group(name) }) } func (c chainG[T]) Having(query interface{}, args ...interface{}) ChainInterface[T] { return c.with(func(db *DB) *DB { return db.Having(query, args...) }) } func (c chainG[T]) Order(value interface{}) ChainInterface[T] { return c.with(func(db *DB) *DB { return db.Order(value) }) } func (c chainG[T]) Preload(association string, query func(db PreloadBuilder) error) ChainInterface[T] { return c.with(func(db *DB) *DB { return db.Preload(association, func(tx *DB) *DB { q := preloadBuilder{db: tx.getInstance()} if query != nil { if err := query(&q); err != nil { db.AddError(err) } } relation, ok := db.Statement.Schema.Relationships.Relations[association] if !ok { if preloadFields := strings.Split(association, "."); len(preloadFields) > 1 { relationships := &db.Statement.Schema.Relationships for _, field := range preloadFields { var ok bool relation, ok = relationships.Relations[field] if ok { relationships = &relation.FieldSchema.Relationships } else { db.AddError(fmt.Errorf("relation %s not found", association)) return nil } } } else { db.AddError(fmt.Errorf("relation %s not found", association)) return nil } } if q.limitPerRecord > 0 { if relation.JoinTable != nil { tx.AddError(fmt.Errorf("many2many relation %s don't support LimitPerRecord", association)) return tx } refColumns := []clause.Column{} for _, rel := range relation.References { if rel.OwnPrimaryKey { refColumns = append(refColumns, clause.Column{Name: rel.ForeignKey.DBName}) } } if len(refColumns) != 0 { selectExpr := clause.CommaExpression{} for _, column := range q.db.Statement.Selects { selectExpr.Exprs = append(selectExpr.Exprs, clause.Expr{SQL: "?", Vars: []interface{}{clause.Column{Name: column}}}) } if len(selectExpr.Exprs) == 0 { selectExpr.Exprs = []clause.Expression{clause.Expr{SQL: "*", Vars: []interface{}{}}} } partitionBy := clause.CommaExpression{} for _, column := range refColumns { partitionBy.Exprs = append(partitionBy.Exprs, clause.Expr{SQL: "?", Vars: []interface{}{clause.Column{Name: column.Name}}}) } rnnColumn := clause.Column{Name: "gorm_preload_rnn"} sql := "ROW_NUMBER() OVER (PARTITION BY ? ?)" vars := []interface{}{partitionBy} if orderBy, ok := q.db.Statement.Clauses["ORDER BY"]; ok { vars = append(vars, orderBy) } else { vars = append(vars, clause.Clause{Name: "ORDER BY", Expression: clause.OrderBy{ Columns: []clause.OrderByColumn{{Column: clause.PrimaryColumn, Desc: true}}, }}) } vars = append(vars, rnnColumn) selectExpr.Exprs = append(selectExpr.Exprs, clause.Expr{SQL: sql + " AS ?", Vars: vars}) q.db.Clauses(clause.Select{Expression: selectExpr}) return q.db.Session(&Session{NewDB: true}).Unscoped().Table("(?) t", q.db).Where("? <= ?", rnnColumn, q.limitPerRecord) } } return q.db }) }) } func (c chainG[T]) Delete(ctx context.Context) (rowsAffected int, err error) { r := new(T) res := c.g.apply(ctx).Delete(r) return int(res.RowsAffected), res.Error } func (c chainG[T]) Update(ctx context.Context, name string, value any) (rowsAffected int, err error) { var r T res := c.g.apply(ctx).Model(r).Update(name, value) return int(res.RowsAffected), res.Error } func (c chainG[T]) Updates(ctx context.Context, t T) (rowsAffected int, err error) { res := c.g.apply(ctx).Updates(t) return int(res.RowsAffected), res.Error } func (c chainG[T]) Count(ctx context.Context, column string) (result int64, err error) { var r T err = c.g.apply(ctx).Model(r).Select(column).Count(&result).Error return } func (c chainG[T]) Build(builder clause.Builder) { subdb := c.getInstance() subdb.Logger = logger.Discard subdb.DryRun = true if stmt, ok := builder.(*Statement); ok { if subdb.Statement.SQL.Len() > 0 { var ( vars = subdb.Statement.Vars sql = subdb.Statement.SQL.String() ) subdb.Statement.Vars = make([]interface{}, 0, len(vars)) for _, vv := range vars { subdb.Statement.Vars = append(subdb.Statement.Vars, vv) bindvar := strings.Builder{} subdb.BindVarTo(&bindvar, subdb.Statement, vv) sql = strings.Replace(sql, bindvar.String(), "?", 1) } subdb.Statement.SQL.Reset() subdb.Statement.Vars = stmt.Vars if strings.Contains(sql, "@") { clause.NamedExpr{SQL: sql, Vars: vars}.Build(subdb.Statement) } else { clause.Expr{SQL: sql, Vars: vars}.Build(subdb.Statement) } } else { subdb.Statement.Vars = append(stmt.Vars, subdb.Statement.Vars...) subdb.callbacks.Query().Execute(subdb) } builder.WriteString(subdb.Statement.SQL.String()) stmt.Vars = subdb.Statement.Vars } } type execG[T any] struct { g *g[T] } func (g execG[T]) First(ctx context.Context) (T, error) { var r T err := g.g.apply(ctx).First(&r).Error return r, err } func (g execG[T]) Scan(ctx context.Context, result interface{}) error { var r T err := g.g.apply(ctx).Model(r).Find(result).Error return err } func (g execG[T]) Last(ctx context.Context) (T, error) { var r T err := g.g.apply(ctx).Last(&r).Error return r, err } func (g execG[T]) Take(ctx context.Context) (T, error) { var r T err := g.g.apply(ctx).Take(&r).Error return r, err } func (g execG[T]) Find(ctx context.Context) ([]T, error) { var r []T err := g.g.apply(ctx).Find(&r).Error return r, err } func (g execG[T]) FindInBatches(ctx context.Context, batchSize int, fc func(data []T, batch int) error) error { var data []T return g.g.apply(ctx).FindInBatches(&data, batchSize, func(tx *DB, batch int) error { return fc(data, batch) }).Error } func (g execG[T]) Row(ctx context.Context) *sql.Row { var r T return g.g.apply(ctx).Model(r).Row() } func (g execG[T]) Rows(ctx context.Context) (*sql.Rows, error) { var r T return g.g.apply(ctx).Model(r).Rows() } func (c chainG[T]) processSet(items ...clause.Assigner) setCreateOrUpdateG[T] { var ( assigns []clause.Assignment assocOps []clause.Association ) for _, item := range items { // Check if it's an AssociationAssigner if assocAssigner, ok := item.(clause.AssociationAssigner); ok { assocOps = append(assocOps, assocAssigner.AssociationAssignments()...) } else { assigns = append(assigns, item.Assignments()...) } } return setCreateOrUpdateG[T]{ c: c, assigns: assigns, assocOps: assocOps, } } // setCreateOrUpdateG[T] is a struct that holds operations to be executed in a batch. // It supports regular assignments and association operations. type setCreateOrUpdateG[T any] struct { c chainG[T] assigns []clause.Assignment assocOps []clause.Association } func (s setCreateOrUpdateG[T]) Update(ctx context.Context) (rowsAffected int, err error) { // Execute association operations for _, assocOp := range s.assocOps { if err := s.executeAssociationOperation(ctx, assocOp); err != nil { return 0, err } } // Execute assignment operations if len(s.assigns) > 0 { var r T res := s.c.g.apply(ctx).Model(r).Clauses(clause.Set(s.assigns)).Updates(map[string]interface{}{}) return int(res.RowsAffected), res.Error } return 0, nil } func (s setCreateOrUpdateG[T]) Create(ctx context.Context) error { // Execute association operations for _, assocOp := range s.assocOps { if err := s.executeAssociationOperation(ctx, assocOp); err != nil { return err } } // Execute assignment operations if len(s.assigns) > 0 { data := make(map[string]interface{}, len(s.assigns)) for _, a := range s.assigns { data[a.Column.Name] = a.Value } var r T return s.c.g.apply(ctx).Model(r).Create(data).Error } return nil } // executeAssociationOperation executes an association operation func (s setCreateOrUpdateG[T]) executeAssociationOperation(ctx context.Context, op clause.Association) error { var r T base := s.c.g.apply(ctx).Model(r) switch op.Type { case clause.OpCreate: return s.handleAssociationCreate(ctx, base, op) case clause.OpUnlink, clause.OpDelete, clause.OpUpdate: return s.handleAssociation(ctx, base, op) default: return fmt.Errorf("unknown association operation type: %v", op.Type) } } func (s setCreateOrUpdateG[T]) handleAssociationCreate(ctx context.Context, base *DB, op clause.Association) error { if len(op.Set) > 0 { return s.handleAssociationForOwners(base, ctx, func(owner T, assoc *Association) error { data := make(map[string]interface{}, len(op.Set)) for _, a := range op.Set { data[a.Column.Name] = a.Value } return assoc.Append(data) }, op.Association) } return s.handleAssociationForOwners(base, ctx, func(owner T, assoc *Association) error { return assoc.Append(op.Values...) }, op.Association) } // handleAssociationForOwners is a helper function that handles associations for all owners func (s setCreateOrUpdateG[T]) handleAssociationForOwners(base *DB, ctx context.Context, handler func(owner T, association *Association) error, associationName string) error { var owners []T if err := base.Find(&owners).Error; err != nil { return err } for _, owner := range owners { assoc := base.Session(&Session{NewDB: true, Context: ctx}).Model(&owner).Association(associationName) if assoc.Error != nil { return assoc.Error } if err := handler(owner, assoc); err != nil { return err } } return nil } func (s setCreateOrUpdateG[T]) handleAssociation(ctx context.Context, base *DB, op clause.Association) error { assoc := base.Association(op.Association) if assoc.Error != nil { return assoc.Error } var ( rel = assoc.Relationship assocModel = reflect.New(rel.FieldSchema.ModelType).Interface() fkNil = map[string]any{} setMap = make(map[string]any, len(op.Set)) ownerPKNames []string ownerFKNames []string primaryColumns []any foreignColumns []any ) for _, a := range op.Set { setMap[a.Column.Name] = a.Value } for _, ref := range rel.References { fkNil[ref.ForeignKey.DBName] = nil if ref.OwnPrimaryKey && ref.PrimaryKey != nil { ownerPKNames = append(ownerPKNames, ref.PrimaryKey.DBName) primaryColumns = append(primaryColumns, clause.Column{Name: ref.PrimaryKey.DBName}) foreignColumns = append(foreignColumns, clause.Column{Name: ref.ForeignKey.DBName}) } else if !ref.OwnPrimaryKey && ref.PrimaryKey != nil { ownerFKNames = append(ownerFKNames, ref.ForeignKey.DBName) primaryColumns = append(primaryColumns, clause.Column{Name: ref.PrimaryKey.DBName}) } } assocDB := s.c.g.db.Session(&Session{NewDB: true, Context: ctx}).Model(assocModel).Where(op.Conditions) switch rel.Type { case schema.HasOne, schema.HasMany: assocDB = assocDB.Where("? IN (?)", foreignColumns, base.Select(ownerPKNames)) switch op.Type { case clause.OpUnlink: return assocDB.Updates(fkNil).Error case clause.OpDelete: return assocDB.Delete(assocModel).Error case clause.OpUpdate: return assocDB.Updates(setMap).Error } case schema.BelongsTo: switch op.Type { case clause.OpDelete: return base.Transaction(func(tx *DB) error { assocDB.Statement.ConnPool = tx.Statement.ConnPool base.Statement.ConnPool = tx.Statement.ConnPool if err := assocDB.Where("? IN (?)", primaryColumns, base.Select(ownerFKNames)).Delete(assocModel).Error; err != nil { return err } return base.Updates(fkNil).Error }) case clause.OpUnlink: return base.Updates(fkNil).Error case clause.OpUpdate: return assocDB.Where("? IN (?)", primaryColumns, base.Select(ownerFKNames)).Updates(setMap).Error } case schema.Many2Many: joinModel := reflect.New(rel.JoinTable.ModelType).Interface() joinDB := base.Session(&Session{NewDB: true, Context: ctx}).Model(joinModel) // EXISTS owners: owners.pk = join.owner_fk for all owner refs ownersExists := base.Session(&Session{NewDB: true, Context: ctx}).Table(rel.Schema.Table).Select("1") for _, ref := range rel.References { if ref.OwnPrimaryKey && ref.PrimaryKey != nil { ownersExists = ownersExists.Where(clause.Eq{ Column: clause.Column{Table: rel.Schema.Table, Name: ref.PrimaryKey.DBName}, Value: clause.Column{Table: rel.JoinTable.Table, Name: ref.ForeignKey.DBName}, }) } } // EXISTS related: related.pk = join.rel_fk for all related refs, plus optional conditions relatedExists := base.Session(&Session{NewDB: true, Context: ctx}).Table(rel.FieldSchema.Table).Select("1") for _, ref := range rel.References { if !ref.OwnPrimaryKey && ref.PrimaryKey != nil { relatedExists = relatedExists.Where(clause.Eq{ Column: clause.Column{Table: rel.FieldSchema.Table, Name: ref.PrimaryKey.DBName}, Value: clause.Column{Table: rel.JoinTable.Table, Name: ref.ForeignKey.DBName}, }) } } relatedExists = relatedExists.Where(op.Conditions) switch op.Type { case clause.OpUnlink, clause.OpDelete: joinDB = joinDB.Where("EXISTS (?)", ownersExists) if len(op.Conditions) > 0 { joinDB = joinDB.Where("EXISTS (?)", relatedExists) } return joinDB.Delete(nil).Error case clause.OpUpdate: // Update related table rows that have join rows matching owners relatedDB := base.Session(&Session{NewDB: true, Context: ctx}).Table(rel.FieldSchema.Table).Where(op.Conditions) // correlated join subquery: join.rel_fk = related.pk AND EXISTS owners joinSub := base.Session(&Session{NewDB: true, Context: ctx}).Table(rel.JoinTable.Table).Select("1") for _, ref := range rel.References { if !ref.OwnPrimaryKey && ref.PrimaryKey != nil { joinSub = joinSub.Where(clause.Eq{ Column: clause.Column{Table: rel.JoinTable.Table, Name: ref.ForeignKey.DBName}, Value: clause.Column{Table: rel.FieldSchema.Table, Name: ref.PrimaryKey.DBName}, }) } } joinSub = joinSub.Where("EXISTS (?)", ownersExists) return relatedDB.Where("EXISTS (?)", joinSub).Updates(setMap).Error } } return errors.New("unsupported relationship") }
go
MIT
0d9141bad9772c6047ecfdb2819d8a52d27ceb65
2026-01-07T08:35:52.485253Z
false
go-gorm/gorm
https://github.com/go-gorm/gorm/blob/0d9141bad9772c6047ecfdb2819d8a52d27ceb65/chainable_api.go
chainable_api.go
package gorm import ( "fmt" "regexp" "strings" "gorm.io/gorm/clause" "gorm.io/gorm/utils" ) // Model specify the model you would like to run db operations // // // update all users's name to `hello` // db.Model(&User{}).Update("name", "hello") // // if user's primary key is non-blank, will use it as condition, then will only update that user's name to `hello` // db.Model(&user).Update("name", "hello") func (db *DB) Model(value interface{}) (tx *DB) { tx = db.getInstance() tx.Statement.Model = value return } // Clauses Add clauses // // This supports both standard clauses (clause.OrderBy, clause.Limit, clause.Where) and more // advanced techniques like specifying lock strength and optimizer hints. See the // [docs] for more depth. // // // add a simple limit clause // db.Clauses(clause.Limit{Limit: 1}).Find(&User{}) // // tell the optimizer to use the `idx_user_name` index // db.Clauses(hints.UseIndex("idx_user_name")).Find(&User{}) // // specify the lock strength to UPDATE // db.Clauses(clause.Locking{Strength: "UPDATE"}).Find(&users) // // [docs]: https://gorm.io/docs/sql_builder.html#Clauses func (db *DB) Clauses(conds ...clause.Expression) (tx *DB) { tx = db.getInstance() var whereConds []interface{} for _, cond := range conds { if c, ok := cond.(clause.Interface); ok { tx.Statement.AddClause(c) } else if optimizer, ok := cond.(StatementModifier); ok { optimizer.ModifyStatement(tx.Statement) } else { whereConds = append(whereConds, cond) } } if len(whereConds) > 0 { tx.Statement.AddClause(clause.Where{Exprs: tx.Statement.BuildCondition(whereConds[0], whereConds[1:]...)}) } return } var tableRegexp = regexp.MustCompile(`(?i)(?:.+? AS (\w+)\s*(?:$|,)|^\w+\s+(\w+)$)`) // Table specify the table you would like to run db operations // // // Get a user // db.Table("users").Take(&result) func (db *DB) Table(name string, args ...interface{}) (tx *DB) { tx = db.getInstance() if strings.Contains(name, " ") || strings.Contains(name, "`") || len(args) > 0 { tx.Statement.TableExpr = &clause.Expr{SQL: name, Vars: args} if results := tableRegexp.FindStringSubmatch(name); len(results) == 3 { if results[1] != "" { tx.Statement.Table = results[1] } else { tx.Statement.Table = results[2] } } } else if tables := strings.Split(name, "."); len(tables) == 2 { tx.Statement.TableExpr = &clause.Expr{SQL: tx.Statement.Quote(name)} tx.Statement.Table = tables[1] } else if name != "" { tx.Statement.TableExpr = &clause.Expr{SQL: tx.Statement.Quote(name)} tx.Statement.Table = name } else { tx.Statement.TableExpr = nil tx.Statement.Table = "" } return } // Distinct specify distinct fields that you want querying // // // Select distinct names of users // db.Distinct("name").Find(&results) // // Select distinct name/age pairs from users // db.Distinct("name", "age").Find(&results) func (db *DB) Distinct(args ...interface{}) (tx *DB) { tx = db.getInstance() tx.Statement.Distinct = true if len(args) > 0 { tx = tx.Select(args[0], args[1:]...) } return } // Select specify fields that you want when querying, creating, updating // // Use Select when you only want a subset of the fields. By default, GORM will select all fields. // Select accepts both string arguments and arrays. // // // Select name and age of user using multiple arguments // db.Select("name", "age").Find(&users) // // Select name and age of user using an array // db.Select([]string{"name", "age"}).Find(&users) func (db *DB) Select(query interface{}, args ...interface{}) (tx *DB) { tx = db.getInstance() switch v := query.(type) { case []string: tx.Statement.Selects = v for _, arg := range args { switch arg := arg.(type) { case string: tx.Statement.Selects = append(tx.Statement.Selects, arg) case []string: tx.Statement.Selects = append(tx.Statement.Selects, arg...) default: tx.AddError(fmt.Errorf("unsupported select args %v %v", query, args)) return } } if clause, ok := tx.Statement.Clauses["SELECT"]; ok { clause.Expression = nil tx.Statement.Clauses["SELECT"] = clause } case string: if strings.Count(v, "?") >= len(args) && len(args) > 0 { tx.Statement.AddClause(clause.Select{ Distinct: db.Statement.Distinct, Expression: clause.Expr{SQL: v, Vars: args}, }) } else if strings.Count(v, "@") > 0 && len(args) > 0 { tx.Statement.AddClause(clause.Select{ Distinct: db.Statement.Distinct, Expression: clause.NamedExpr{SQL: v, Vars: args}, }) } else { tx.Statement.Selects = []string{v} for _, arg := range args { switch arg := arg.(type) { case string: tx.Statement.Selects = append(tx.Statement.Selects, arg) case []string: tx.Statement.Selects = append(tx.Statement.Selects, arg...) default: tx.Statement.AddClause(clause.Select{ Distinct: db.Statement.Distinct, Expression: clause.Expr{SQL: v, Vars: args}, }) return } } if clause, ok := tx.Statement.Clauses["SELECT"]; ok { clause.Expression = nil tx.Statement.Clauses["SELECT"] = clause } } default: tx.AddError(fmt.Errorf("unsupported select args %v %v", query, args)) } return } // Omit specify fields that you want to ignore when creating, updating and querying func (db *DB) Omit(columns ...string) (tx *DB) { tx = db.getInstance() if len(columns) == 1 && strings.ContainsRune(columns[0], ',') { tx.Statement.Omits = strings.FieldsFunc(columns[0], utils.IsInvalidDBNameChar) } else { tx.Statement.Omits = columns } return } // MapColumns modify the column names in the query results to facilitate align to the corresponding structural fields func (db *DB) MapColumns(m map[string]string) (tx *DB) { tx = db.getInstance() tx.Statement.ColumnMapping = m return } // Where add conditions // // See the [docs] for details on the various formats that where clauses can take. By default, where clauses chain with AND. // // // Find the first user with name jinzhu // db.Where("name = ?", "jinzhu").First(&user) // // Find the first user with name jinzhu and age 20 // db.Where(&User{Name: "jinzhu", Age: 20}).First(&user) // // Find the first user with name jinzhu and age not equal to 20 // db.Where("name = ?", "jinzhu").Where("age <> ?", "20").First(&user) // // [docs]: https://gorm.io/docs/query.html#Conditions func (db *DB) Where(query interface{}, args ...interface{}) (tx *DB) { tx = db.getInstance() if conds := tx.Statement.BuildCondition(query, args...); len(conds) > 0 { tx.Statement.AddClause(clause.Where{Exprs: conds}) } return } // Not add NOT conditions // // Not works similarly to where, and has the same syntax. // // // Find the first user with name not equal to jinzhu // db.Not("name = ?", "jinzhu").First(&user) func (db *DB) Not(query interface{}, args ...interface{}) (tx *DB) { tx = db.getInstance() if conds := tx.Statement.BuildCondition(query, args...); len(conds) > 0 { tx.Statement.AddClause(clause.Where{Exprs: []clause.Expression{clause.Not(conds...)}}) } return } // Or add OR conditions // // Or is used to chain together queries with an OR. // // // Find the first user with name equal to jinzhu or john // db.Where("name = ?", "jinzhu").Or("name = ?", "john").First(&user) func (db *DB) Or(query interface{}, args ...interface{}) (tx *DB) { tx = db.getInstance() if conds := tx.Statement.BuildCondition(query, args...); len(conds) > 0 { tx.Statement.AddClause(clause.Where{Exprs: []clause.Expression{clause.Or(clause.And(conds...))}}) } return } // Joins specify Joins conditions // // db.Joins("Account").Find(&user) // db.Joins("JOIN emails ON emails.user_id = users.id AND emails.email = ?", "jinzhu@example.org").Find(&user) // db.Joins("Account", DB.Select("id").Where("user_id = users.id AND name = ?", "someName").Model(&Account{})) func (db *DB) Joins(query string, args ...interface{}) (tx *DB) { return joins(db, clause.LeftJoin, query, args...) } // InnerJoins specify inner joins conditions // db.InnerJoins("Account").Find(&user) func (db *DB) InnerJoins(query string, args ...interface{}) (tx *DB) { return joins(db, clause.InnerJoin, query, args...) } func joins(db *DB, joinType clause.JoinType, query string, args ...interface{}) (tx *DB) { tx = db.getInstance() if len(args) == 1 { if db, ok := args[0].(*DB); ok { j := join{ Name: query, Conds: args, Selects: db.Statement.Selects, Omits: db.Statement.Omits, JoinType: joinType, } if where, ok := db.Statement.Clauses["WHERE"].Expression.(clause.Where); ok { j.On = &where } tx.Statement.Joins = append(tx.Statement.Joins, j) return } } tx.Statement.Joins = append(tx.Statement.Joins, join{Name: query, Conds: args, JoinType: joinType}) return } // Group specify the group method on the find // // // Select the sum age of users with given names // db.Model(&User{}).Select("name, sum(age) as total").Group("name").Find(&results) func (db *DB) Group(name string) (tx *DB) { tx = db.getInstance() fields := strings.FieldsFunc(name, utils.IsInvalidDBNameChar) tx.Statement.AddClause(clause.GroupBy{ Columns: []clause.Column{{Name: name, Raw: len(fields) != 1}}, }) return } // Having specify HAVING conditions for GROUP BY // // // Select the sum age of users with name jinzhu // db.Model(&User{}).Select("name, sum(age) as total").Group("name").Having("name = ?", "jinzhu").Find(&result) func (db *DB) Having(query interface{}, args ...interface{}) (tx *DB) { tx = db.getInstance() tx.Statement.AddClause(clause.GroupBy{ Having: tx.Statement.BuildCondition(query, args...), }) return } // Order specify order when retrieving records from database // // db.Order("name DESC") // db.Order(clause.OrderByColumn{Column: clause.Column{Name: "name"}, Desc: true}) // db.Order(clause.OrderBy{Columns: []clause.OrderByColumn{ // {Column: clause.Column{Name: "name"}, Desc: true}, // {Column: clause.Column{Name: "age"}, Desc: true}, // }}) func (db *DB) Order(value interface{}) (tx *DB) { tx = db.getInstance() switch v := value.(type) { case clause.OrderBy: tx.Statement.AddClause(v) case clause.OrderByColumn: tx.Statement.AddClause(clause.OrderBy{ Columns: []clause.OrderByColumn{v}, }) case string: if v != "" { tx.Statement.AddClause(clause.OrderBy{ Columns: []clause.OrderByColumn{{ Column: clause.Column{Name: v, Raw: true}, }}, }) } } return } // Limit specify the number of records to be retrieved // // Limit conditions can be cancelled by using `Limit(-1)`. // // // retrieve 3 users // db.Limit(3).Find(&users) // // retrieve 3 users into users1, and all users into users2 // db.Limit(3).Find(&users1).Limit(-1).Find(&users2) func (db *DB) Limit(limit int) (tx *DB) { tx = db.getInstance() tx.Statement.AddClause(clause.Limit{Limit: &limit}) return } // Offset specify the number of records to skip before starting to return the records // // Offset conditions can be cancelled by using `Offset(-1)`. // // // select the third user // db.Offset(2).First(&user) // // select the first user by cancelling an earlier chained offset // db.Offset(5).Offset(-1).First(&user) func (db *DB) Offset(offset int) (tx *DB) { tx = db.getInstance() tx.Statement.AddClause(clause.Limit{Offset: offset}) return } // Scopes pass current database connection to arguments `func(DB) DB`, which could be used to add conditions dynamically // // func AmountGreaterThan1000(db *gorm.DB) *gorm.DB { // return db.Where("amount > ?", 1000) // } // // func OrderStatus(status []string) func (db *gorm.DB) *gorm.DB { // return func (db *gorm.DB) *gorm.DB { // return db.Scopes(AmountGreaterThan1000).Where("status in (?)", status) // } // } // // db.Scopes(AmountGreaterThan1000, OrderStatus([]string{"paid", "shipped"})).Find(&orders) func (db *DB) Scopes(funcs ...func(*DB) *DB) (tx *DB) { tx = db.getInstance() tx.Statement.scopes = append(tx.Statement.scopes, funcs...) return tx } func (db *DB) executeScopes() (tx *DB) { scopes := db.Statement.scopes db.Statement.scopes = nil for _, scope := range scopes { db = scope(db) } return db } // Preload preload associations with given conditions // // // get all users, and preload all non-cancelled orders // db.Preload("Orders", "state NOT IN (?)", "cancelled").Find(&users) func (db *DB) Preload(query string, args ...interface{}) (tx *DB) { tx = db.getInstance() if tx.Statement.Preloads == nil { tx.Statement.Preloads = map[string][]interface{}{} } tx.Statement.Preloads[query] = args return } // Attrs provide attributes used in [FirstOrCreate] or [FirstOrInit] // // Attrs only adds attributes if the record is not found. // // // assign an email if the record is not found // db.Where(User{Name: "non_existing"}).Attrs(User{Email: "fake@fake.org"}).FirstOrInit(&user) // // user -> User{Name: "non_existing", Email: "fake@fake.org"} // // // assign an email if the record is not found, otherwise ignore provided email // db.Where(User{Name: "jinzhu"}).Attrs(User{Email: "fake@fake.org"}).FirstOrInit(&user) // // user -> User{Name: "jinzhu", Age: 20} // // [FirstOrCreate]: https://gorm.io/docs/advanced_query.html#FirstOrCreate // [FirstOrInit]: https://gorm.io/docs/advanced_query.html#FirstOrInit func (db *DB) Attrs(attrs ...interface{}) (tx *DB) { tx = db.getInstance() tx.Statement.attrs = attrs return } // Assign provide attributes used in [FirstOrCreate] or [FirstOrInit] // // Assign adds attributes even if the record is found. If using FirstOrCreate, this means that // records will be updated even if they are found. // // // assign an email regardless of if the record is not found // db.Where(User{Name: "non_existing"}).Assign(User{Email: "fake@fake.org"}).FirstOrInit(&user) // // user -> User{Name: "non_existing", Email: "fake@fake.org"} // // // assign email regardless of if record is found // db.Where(User{Name: "jinzhu"}).Assign(User{Email: "fake@fake.org"}).FirstOrInit(&user) // // user -> User{Name: "jinzhu", Age: 20, Email: "fake@fake.org"} // // [FirstOrCreate]: https://gorm.io/docs/advanced_query.html#FirstOrCreate // [FirstOrInit]: https://gorm.io/docs/advanced_query.html#FirstOrInit func (db *DB) Assign(attrs ...interface{}) (tx *DB) { tx = db.getInstance() tx.Statement.assigns = attrs return } // Unscoped disables the global scope of soft deletion in a query. // By default, GORM uses soft deletion, marking records as "deleted" // by setting a timestamp on a specific field (e.g., `deleted_at`). // Unscoped allows queries to include records marked as deleted, // overriding the soft deletion behavior. // Example: // // var users []User // db.Unscoped().Find(&users) // // Retrieves all users, including deleted ones. func (db *DB) Unscoped() (tx *DB) { tx = db.getInstance() tx.Statement.Unscoped = true return } func (db *DB) Raw(sql string, values ...interface{}) (tx *DB) { tx = db.getInstance() tx.Statement.SQL = strings.Builder{} if strings.Contains(sql, "@") { clause.NamedExpr{SQL: sql, Vars: values}.Build(tx.Statement) } else { clause.Expr{SQL: sql, Vars: values}.Build(tx.Statement) } return }
go
MIT
0d9141bad9772c6047ecfdb2819d8a52d27ceb65
2026-01-07T08:35:52.485253Z
false
go-gorm/gorm
https://github.com/go-gorm/gorm/blob/0d9141bad9772c6047ecfdb2819d8a52d27ceb65/callbacks.go
callbacks.go
package gorm import ( "context" "errors" "fmt" "reflect" "sort" "time" "gorm.io/gorm/schema" "gorm.io/gorm/utils" ) func initializeCallbacks(db *DB) *callbacks { return &callbacks{ processors: map[string]*processor{ "create": {db: db}, "query": {db: db}, "update": {db: db}, "delete": {db: db}, "row": {db: db}, "raw": {db: db}, }, } } // callbacks gorm callbacks manager type callbacks struct { processors map[string]*processor } type processor struct { db *DB Clauses []string fns []func(*DB) callbacks []*callback } type callback struct { name string before string after string remove bool replace bool match func(*DB) bool handler func(*DB) processor *processor } func (cs *callbacks) Create() *processor { return cs.processors["create"] } func (cs *callbacks) Query() *processor { return cs.processors["query"] } func (cs *callbacks) Update() *processor { return cs.processors["update"] } func (cs *callbacks) Delete() *processor { return cs.processors["delete"] } func (cs *callbacks) Row() *processor { return cs.processors["row"] } func (cs *callbacks) Raw() *processor { return cs.processors["raw"] } func (p *processor) Execute(db *DB) *DB { // call scopes for len(db.Statement.scopes) > 0 { db = db.executeScopes() } var ( curTime = time.Now() stmt = db.Statement resetBuildClauses bool ) if len(stmt.BuildClauses) == 0 { stmt.BuildClauses = p.Clauses resetBuildClauses = true } if optimizer, ok := stmt.Dest.(StatementModifier); ok { optimizer.ModifyStatement(stmt) } if db.DefaultContextTimeout > 0 { if _, ok := stmt.Context.Deadline(); !ok { stmt.Context, _ = context.WithTimeout(stmt.Context, db.DefaultContextTimeout) } } // assign model values if stmt.Model == nil { stmt.Model = stmt.Dest } else if stmt.Dest == nil { stmt.Dest = stmt.Model } // parse model values if stmt.Model != nil { if err := stmt.Parse(stmt.Model); err != nil && (!errors.Is(err, schema.ErrUnsupportedDataType) || (stmt.Table == "" && stmt.TableExpr == nil && stmt.SQL.Len() == 0)) { if errors.Is(err, schema.ErrUnsupportedDataType) && stmt.Table == "" && stmt.TableExpr == nil { db.AddError(fmt.Errorf("%w: Table not set, please set it like: db.Model(&user) or db.Table(\"users\")", err)) } else { db.AddError(err) } } } // assign stmt.ReflectValue if stmt.Dest != nil { stmt.ReflectValue = reflect.ValueOf(stmt.Dest) for stmt.ReflectValue.Kind() == reflect.Ptr { if stmt.ReflectValue.IsNil() && stmt.ReflectValue.CanAddr() { stmt.ReflectValue.Set(reflect.New(stmt.ReflectValue.Type().Elem())) } stmt.ReflectValue = stmt.ReflectValue.Elem() } if !stmt.ReflectValue.IsValid() { db.AddError(ErrInvalidValue) } } for _, f := range p.fns { f(db) } if stmt.SQL.Len() > 0 { db.Logger.Trace(stmt.Context, curTime, func() (string, int64) { sql, vars := stmt.SQL.String(), stmt.Vars if filter, ok := db.Logger.(ParamsFilter); ok { sql, vars = filter.ParamsFilter(stmt.Context, stmt.SQL.String(), stmt.Vars...) } return db.Dialector.Explain(sql, vars...), db.RowsAffected }, db.Error) } if !stmt.DB.DryRun { stmt.SQL.Reset() stmt.Vars = nil } if resetBuildClauses { stmt.BuildClauses = nil } return db } func (p *processor) Get(name string) func(*DB) { for i := len(p.callbacks) - 1; i >= 0; i-- { if v := p.callbacks[i]; v.name == name && !v.remove { return v.handler } } return nil } func (p *processor) Before(name string) *callback { return &callback{before: name, processor: p} } func (p *processor) After(name string) *callback { return &callback{after: name, processor: p} } func (p *processor) Match(fc func(*DB) bool) *callback { return &callback{match: fc, processor: p} } func (p *processor) Register(name string, fn func(*DB)) error { return (&callback{processor: p}).Register(name, fn) } func (p *processor) Remove(name string) error { return (&callback{processor: p}).Remove(name) } func (p *processor) Replace(name string, fn func(*DB)) error { return (&callback{processor: p}).Replace(name, fn) } func (p *processor) compile() (err error) { var callbacks []*callback removedMap := map[string]bool{} for _, callback := range p.callbacks { if callback.match == nil || callback.match(p.db) { callbacks = append(callbacks, callback) } if callback.remove { removedMap[callback.name] = true } } if len(removedMap) > 0 { callbacks = removeCallbacks(callbacks, removedMap) } p.callbacks = callbacks if p.fns, err = sortCallbacks(p.callbacks); err != nil { p.db.Logger.Error(context.Background(), "Got error when compile callbacks, got %v", err) } return } func (c *callback) Before(name string) *callback { c.before = name return c } func (c *callback) After(name string) *callback { c.after = name return c } func (c *callback) Register(name string, fn func(*DB)) error { c.name = name c.handler = fn c.processor.callbacks = append(c.processor.callbacks, c) return c.processor.compile() } func (c *callback) Remove(name string) error { c.processor.db.Logger.Warn(context.Background(), "removing callback `%s` from %s\n", name, utils.FileWithLineNum()) c.name = name c.remove = true c.processor.callbacks = append(c.processor.callbacks, c) return c.processor.compile() } func (c *callback) Replace(name string, fn func(*DB)) error { c.processor.db.Logger.Info(context.Background(), "replacing callback `%s` from %s\n", name, utils.FileWithLineNum()) c.name = name c.handler = fn c.replace = true c.processor.callbacks = append(c.processor.callbacks, c) return c.processor.compile() } // getRIndex get right index from string slice func getRIndex(strs []string, str string) int { for i := len(strs) - 1; i >= 0; i-- { if strs[i] == str { return i } } return -1 } func sortCallbacks(cs []*callback) (fns []func(*DB), err error) { var ( names, sorted []string sortCallback func(*callback) error ) sort.SliceStable(cs, func(i, j int) bool { if cs[j].before == "*" && cs[i].before != "*" { return true } if cs[j].after == "*" && cs[i].after != "*" { return true } return false }) for _, c := range cs { // show warning message the callback name already exists if idx := getRIndex(names, c.name); idx > -1 && !c.replace && !c.remove && !cs[idx].remove { c.processor.db.Logger.Warn(context.Background(), "duplicated callback `%s` from %s\n", c.name, utils.FileWithLineNum()) } names = append(names, c.name) } sortCallback = func(c *callback) error { if c.before != "" { // if defined before callback if c.before == "*" && len(sorted) > 0 { if curIdx := getRIndex(sorted, c.name); curIdx == -1 { sorted = append([]string{c.name}, sorted...) } } else if sortedIdx := getRIndex(sorted, c.before); sortedIdx != -1 { if curIdx := getRIndex(sorted, c.name); curIdx == -1 { // if before callback already sorted, append current callback just after it sorted = append(sorted[:sortedIdx], append([]string{c.name}, sorted[sortedIdx:]...)...) } else if curIdx > sortedIdx { return fmt.Errorf("conflicting callback %s with before %s", c.name, c.before) } } else if idx := getRIndex(names, c.before); idx != -1 { // if before callback exists cs[idx].after = c.name } } if c.after != "" { // if defined after callback if c.after == "*" && len(sorted) > 0 { if curIdx := getRIndex(sorted, c.name); curIdx == -1 { sorted = append(sorted, c.name) } } else if sortedIdx := getRIndex(sorted, c.after); sortedIdx != -1 { if curIdx := getRIndex(sorted, c.name); curIdx == -1 { // if after callback sorted, append current callback to last sorted = append(sorted, c.name) } else if curIdx < sortedIdx { return fmt.Errorf("conflicting callback %s with before %s", c.name, c.after) } } else if idx := getRIndex(names, c.after); idx != -1 { // if after callback exists but haven't sorted // set after callback's before callback to current callback after := cs[idx] if after.before == "" { after.before = c.name } if err := sortCallback(after); err != nil { return err } if err := sortCallback(c); err != nil { return err } } } // if current callback haven't been sorted, append it to last if getRIndex(sorted, c.name) == -1 { sorted = append(sorted, c.name) } return nil } for _, c := range cs { if err = sortCallback(c); err != nil { return } } for _, name := range sorted { if idx := getRIndex(names, name); !cs[idx].remove { fns = append(fns, cs[idx].handler) } } return } func removeCallbacks(cs []*callback, nameMap map[string]bool) []*callback { callbacks := make([]*callback, 0, len(cs)) for _, callback := range cs { if nameMap[callback.name] { continue } callbacks = append(callbacks, callback) } return callbacks }
go
MIT
0d9141bad9772c6047ecfdb2819d8a52d27ceb65
2026-01-07T08:35:52.485253Z
false
go-gorm/gorm
https://github.com/go-gorm/gorm/blob/0d9141bad9772c6047ecfdb2819d8a52d27ceb65/gorm.go
gorm.go
package gorm import ( "context" "database/sql" "fmt" "reflect" "sort" "sync" "time" "gorm.io/gorm/clause" "gorm.io/gorm/logger" "gorm.io/gorm/schema" ) // for Config.cacheStore store PreparedStmtDB key const preparedStmtDBKey = "preparedStmt" // Config GORM config type Config struct { // GORM perform single create, update, delete operations in transactions by default to ensure database data integrity // You can disable it by setting `SkipDefaultTransaction` to true SkipDefaultTransaction bool DefaultTransactionTimeout time.Duration DefaultContextTimeout time.Duration // NamingStrategy tables, columns naming strategy NamingStrategy schema.Namer // FullSaveAssociations full save associations FullSaveAssociations bool // Logger Logger logger.Interface // NowFunc the function to be used when creating a new timestamp NowFunc func() time.Time // DryRun generate sql without execute DryRun bool // PrepareStmt executes the given query in cached statement PrepareStmt bool // PrepareStmt cache support LRU expired, // default maxsize=int64 Max value and ttl=1h PrepareStmtMaxSize int PrepareStmtTTL time.Duration // DisableAutomaticPing DisableAutomaticPing bool // DisableForeignKeyConstraintWhenMigrating DisableForeignKeyConstraintWhenMigrating bool // IgnoreRelationshipsWhenMigrating IgnoreRelationshipsWhenMigrating bool // DisableNestedTransaction disable nested transaction DisableNestedTransaction bool // AllowGlobalUpdate allow global update AllowGlobalUpdate bool // QueryFields executes the SQL query with all fields of the table QueryFields bool // CreateBatchSize default create batch size CreateBatchSize int // TranslateError enabling error translation TranslateError bool // PropagateUnscoped propagate Unscoped to every other nested statement PropagateUnscoped bool // ClauseBuilders clause builder ClauseBuilders map[string]clause.ClauseBuilder // ConnPool db conn pool ConnPool ConnPool // Dialector database dialector Dialector // Plugins registered plugins Plugins map[string]Plugin callbacks *callbacks cacheStore *sync.Map } // Apply update config to new config func (c *Config) Apply(config *Config) error { if config != c { *config = *c } return nil } // AfterInitialize initialize plugins after db connected func (c *Config) AfterInitialize(db *DB) error { if db != nil { for _, plugin := range c.Plugins { if err := plugin.Initialize(db); err != nil { return err } } } return nil } // Option gorm option interface type Option interface { Apply(*Config) error AfterInitialize(*DB) error } // DB GORM DB definition type DB struct { *Config Error error RowsAffected int64 Statement *Statement clone int } // Session session config when create session with Session() method type Session struct { DryRun bool PrepareStmt bool NewDB bool Initialized bool SkipHooks bool SkipDefaultTransaction bool DisableNestedTransaction bool AllowGlobalUpdate bool FullSaveAssociations bool PropagateUnscoped bool QueryFields bool Context context.Context Logger logger.Interface NowFunc func() time.Time CreateBatchSize int } // Open initialize db session based on dialector func Open(dialector Dialector, opts ...Option) (db *DB, err error) { config := &Config{} sort.Slice(opts, func(i, j int) bool { _, isConfig := opts[i].(*Config) _, isConfig2 := opts[j].(*Config) return isConfig && !isConfig2 }) if len(opts) > 0 { if c, ok := opts[0].(*Config); ok { config = c } else { opts = append([]Option{config}, opts...) } } var skipAfterInitialize bool for _, opt := range opts { if opt != nil { if applyErr := opt.Apply(config); applyErr != nil { return nil, applyErr } defer func(opt Option) { if skipAfterInitialize { return } if errr := opt.AfterInitialize(db); errr != nil { err = errr } }(opt) } } if d, ok := dialector.(interface{ Apply(*Config) error }); ok { if err = d.Apply(config); err != nil { return } } if config.NamingStrategy == nil { config.NamingStrategy = schema.NamingStrategy{IdentifierMaxLength: 64} // Default Identifier length is 64 } if config.Logger == nil { config.Logger = logger.Default } if config.NowFunc == nil { config.NowFunc = func() time.Time { return time.Now().Local() } } if dialector != nil { config.Dialector = dialector } if config.Plugins == nil { config.Plugins = map[string]Plugin{} } if config.cacheStore == nil { config.cacheStore = &sync.Map{} } db = &DB{Config: config, clone: 1} db.callbacks = initializeCallbacks(db) if config.ClauseBuilders == nil { config.ClauseBuilders = map[string]clause.ClauseBuilder{} } if config.Dialector != nil { err = config.Dialector.Initialize(db) if err != nil { if db, _ := db.DB(); db != nil { _ = db.Close() } // DB is not initialized, so we skip AfterInitialize skipAfterInitialize = true return } if config.TranslateError { if _, ok := db.Dialector.(ErrorTranslator); !ok { config.Logger.Warn(context.Background(), "The TranslateError option is enabled, but the Dialector %s does not implement ErrorTranslator.", db.Dialector.Name()) } } } if config.PrepareStmt { preparedStmt := NewPreparedStmtDB(db.ConnPool, config.PrepareStmtMaxSize, config.PrepareStmtTTL) db.cacheStore.Store(preparedStmtDBKey, preparedStmt) db.ConnPool = preparedStmt } db.Statement = &Statement{ DB: db, ConnPool: db.ConnPool, Context: context.Background(), Clauses: map[string]clause.Clause{}, } if err == nil && !config.DisableAutomaticPing { if pinger, ok := db.ConnPool.(interface{ Ping() error }); ok { err = pinger.Ping() } } if err != nil { config.Logger.Error(context.Background(), "failed to initialize database, got error %v", err) } return } // Session create new db session func (db *DB) Session(config *Session) *DB { var ( txConfig = *db.Config tx = &DB{ Config: &txConfig, Statement: db.Statement, Error: db.Error, clone: 1, } ) if config.CreateBatchSize > 0 { tx.Config.CreateBatchSize = config.CreateBatchSize } if config.SkipDefaultTransaction { tx.Config.SkipDefaultTransaction = true } if config.AllowGlobalUpdate { txConfig.AllowGlobalUpdate = true } if config.FullSaveAssociations { txConfig.FullSaveAssociations = true } if config.PropagateUnscoped { txConfig.PropagateUnscoped = true } if config.Context != nil || config.PrepareStmt || config.SkipHooks { tx.Statement = tx.Statement.clone() tx.Statement.DB = tx } if config.Context != nil { tx.Statement.Context = config.Context } if config.PrepareStmt { var preparedStmt *PreparedStmtDB if v, ok := db.cacheStore.Load(preparedStmtDBKey); ok { preparedStmt = v.(*PreparedStmtDB) } else { preparedStmt = NewPreparedStmtDB(db.ConnPool, db.PrepareStmtMaxSize, db.PrepareStmtTTL) db.cacheStore.Store(preparedStmtDBKey, preparedStmt) } switch t := tx.Statement.ConnPool.(type) { case Tx: tx.Statement.ConnPool = &PreparedStmtTX{ Tx: t, PreparedStmtDB: preparedStmt, } default: tx.Statement.ConnPool = &PreparedStmtDB{ ConnPool: db.Config.ConnPool, Mux: preparedStmt.Mux, Stmts: preparedStmt.Stmts, } } txConfig.ConnPool = tx.Statement.ConnPool txConfig.PrepareStmt = true } if config.SkipHooks { tx.Statement.SkipHooks = true } if config.DisableNestedTransaction { txConfig.DisableNestedTransaction = true } if !config.NewDB { tx.clone = 2 } if config.DryRun { tx.Config.DryRun = true } if config.QueryFields { tx.Config.QueryFields = true } if config.Logger != nil { tx.Config.Logger = config.Logger } if config.NowFunc != nil { tx.Config.NowFunc = config.NowFunc } if config.Initialized { tx = tx.getInstance() } return tx } // WithContext change current instance db's context to ctx func (db *DB) WithContext(ctx context.Context) *DB { return db.Session(&Session{Context: ctx}) } // Debug start debug mode func (db *DB) Debug() (tx *DB) { tx = db.getInstance() return tx.Session(&Session{ Logger: db.Logger.LogMode(logger.Info), }) } // Set store value with key into current db instance's context func (db *DB) Set(key string, value interface{}) *DB { tx := db.getInstance() tx.Statement.Settings.Store(key, value) return tx } // Get get value with key from current db instance's context func (db *DB) Get(key string) (interface{}, bool) { return db.Statement.Settings.Load(key) } // InstanceSet store value with key into current db instance's context func (db *DB) InstanceSet(key string, value interface{}) *DB { tx := db.getInstance() tx.Statement.Settings.Store(fmt.Sprintf("%p", tx.Statement)+key, value) return tx } // InstanceGet get value with key from current db instance's context func (db *DB) InstanceGet(key string) (interface{}, bool) { return db.Statement.Settings.Load(fmt.Sprintf("%p", db.Statement) + key) } // Callback returns callback manager func (db *DB) Callback() *callbacks { return db.callbacks } // AddError add error to db func (db *DB) AddError(err error) error { if err != nil { if db.Config.TranslateError { if errTranslator, ok := db.Dialector.(ErrorTranslator); ok { err = errTranslator.Translate(err) } } if db.Error == nil { db.Error = err } else { db.Error = fmt.Errorf("%v; %w", db.Error, err) } } return db.Error } // DB returns `*sql.DB` func (db *DB) DB() (*sql.DB, error) { connPool := db.ConnPool if db.Statement != nil && db.Statement.ConnPool != nil { connPool = db.Statement.ConnPool } if tx, ok := connPool.(*sql.Tx); ok && tx != nil { return (*sql.DB)(reflect.ValueOf(tx).Elem().FieldByName("db").UnsafePointer()), nil } if dbConnector, ok := connPool.(GetDBConnector); ok && dbConnector != nil { if sqldb, err := dbConnector.GetDBConn(); sqldb != nil || err != nil { return sqldb, err } } if sqldb, ok := connPool.(*sql.DB); ok && sqldb != nil { return sqldb, nil } return nil, ErrInvalidDB } func (db *DB) getInstance() *DB { if db.clone > 0 { tx := &DB{Config: db.Config, Error: db.Error} if db.clone == 1 { // clone with new statement tx.Statement = &Statement{ DB: tx, ConnPool: db.Statement.ConnPool, Context: db.Statement.Context, Clauses: map[string]clause.Clause{}, Vars: make([]interface{}, 0, 8), SkipHooks: db.Statement.SkipHooks, } if db.Config.PropagateUnscoped { tx.Statement.Unscoped = db.Statement.Unscoped } } else { // with clone statement tx.Statement = db.Statement.clone() tx.Statement.DB = tx } return tx } return db } // Expr returns clause.Expr, which can be used to pass SQL expression as params func Expr(expr string, args ...interface{}) clause.Expr { return clause.Expr{SQL: expr, Vars: args} } // SetupJoinTable setup join table schema func (db *DB) SetupJoinTable(model interface{}, field string, joinTable interface{}) error { var ( tx = db.getInstance() stmt = tx.Statement modelSchema, joinSchema *schema.Schema ) err := stmt.Parse(model) if err != nil { return err } modelSchema = stmt.Schema err = stmt.Parse(joinTable) if err != nil { return err } joinSchema = stmt.Schema relation, ok := modelSchema.Relationships.Relations[field] isRelation := ok && relation.JoinTable != nil if !isRelation { return fmt.Errorf("failed to find relation: %s", field) } for _, ref := range relation.References { f := joinSchema.LookUpField(ref.ForeignKey.DBName) if f == nil { return fmt.Errorf("missing field %s for join table", ref.ForeignKey.DBName) } f.DataType = ref.ForeignKey.DataType f.GORMDataType = ref.ForeignKey.GORMDataType if f.Size == 0 { f.Size = ref.ForeignKey.Size } ref.ForeignKey = f } for name, rel := range relation.JoinTable.Relationships.Relations { if _, ok := joinSchema.Relationships.Relations[name]; !ok { rel.Schema = joinSchema joinSchema.Relationships.Relations[name] = rel } } relation.JoinTable = joinSchema return nil } // Use use plugin func (db *DB) Use(plugin Plugin) error { name := plugin.Name() if _, ok := db.Plugins[name]; ok { return ErrRegistered } if err := plugin.Initialize(db); err != nil { return err } db.Plugins[name] = plugin return nil } // ToSQL for generate SQL string. // // db.ToSQL(func(tx *gorm.DB) *gorm.DB { // return tx.Model(&User{}).Where(&User{Name: "foo", Age: 20}) // .Limit(10).Offset(5) // .Order("name ASC") // .First(&User{}) // }) func (db *DB) ToSQL(queryFn func(tx *DB) *DB) string { tx := queryFn(db.Session(&Session{DryRun: true, SkipDefaultTransaction: true}).getInstance()) stmt := tx.Statement return db.Dialector.Explain(stmt.SQL.String(), stmt.Vars...) }
go
MIT
0d9141bad9772c6047ecfdb2819d8a52d27ceb65
2026-01-07T08:35:52.485253Z
false
go-gorm/gorm
https://github.com/go-gorm/gorm/blob/0d9141bad9772c6047ecfdb2819d8a52d27ceb65/statement_test.go
statement_test.go
package gorm import ( "fmt" "reflect" "testing" "gorm.io/gorm/clause" ) func TestWhereCloneCorruption(t *testing.T) { for whereCount := 1; whereCount <= 8; whereCount++ { t.Run(fmt.Sprintf("w=%d", whereCount), func(t *testing.T) { s := new(Statement) for w := 0; w < whereCount; w++ { s = s.clone() s.AddClause(clause.Where{ Exprs: s.BuildCondition(fmt.Sprintf("where%d", w)), }) } s1 := s.clone() s1.AddClause(clause.Where{ Exprs: s.BuildCondition("FINAL1"), }) s2 := s.clone() s2.AddClause(clause.Where{ Exprs: s.BuildCondition("FINAL2"), }) if reflect.DeepEqual(s1.Clauses["WHERE"], s2.Clauses["WHERE"]) { t.Errorf("Where conditions should be different") } }) } } func TestNilCondition(t *testing.T) { s := new(Statement) if len(s.BuildCondition(nil)) != 0 { t.Errorf("Nil condition should be empty") } } func TestNameMatcher(t *testing.T) { for k, v := range map[string][]string{ "table.name": {"table", "name"}, "`table`.`name`": {"table", "name"}, "'table'.'name'": {"table", "name"}, "'table'.name": {"table", "name"}, "table1.name_23": {"table1", "name_23"}, "`table_1`.`name23`": {"table_1", "name23"}, "'table23'.'name_1'": {"table23", "name_1"}, "'table23'.name1": {"table23", "name1"}, "'name1'": {"", "name1"}, "`name_1`": {"", "name_1"}, "`Name_1`": {"", "Name_1"}, "`Table`.`nAme`": {"Table", "nAme"}, "my_table.*": {"my_table", "*"}, "`my_table`.*": {"my_table", "*"}, "User__Company.*": {"User__Company", "*"}, "`User__Company`.*": {"User__Company", "*"}, `"User__Company".*`: {"User__Company", "*"}, `"table"."*"`: {"", ""}, } { if table, column := matchName(k); table != v[0] || column != v[1] { t.Errorf("failed to match value: %v, got %v, expect: %v", k, []string{table, column}, v) } } }
go
MIT
0d9141bad9772c6047ecfdb2819d8a52d27ceb65
2026-01-07T08:35:52.485253Z
false
go-gorm/gorm
https://github.com/go-gorm/gorm/blob/0d9141bad9772c6047ecfdb2819d8a52d27ceb65/migrator/index.go
migrator/index.go
package migrator import "database/sql" // Index implements gorm.Index interface type Index struct { TableName string NameValue string ColumnList []string PrimaryKeyValue sql.NullBool UniqueValue sql.NullBool OptionValue string } // Table return the table name of the index. func (idx Index) Table() string { return idx.TableName } // Name return the name of the index. func (idx Index) Name() string { return idx.NameValue } // Columns return the columns of the index func (idx Index) Columns() []string { return idx.ColumnList } // PrimaryKey returns the index is primary key or not. func (idx Index) PrimaryKey() (isPrimaryKey bool, ok bool) { return idx.PrimaryKeyValue.Bool, idx.PrimaryKeyValue.Valid } // Unique returns whether the index is unique or not. func (idx Index) Unique() (unique bool, ok bool) { return idx.UniqueValue.Bool, idx.UniqueValue.Valid } // Option return the optional attribute of the index func (idx Index) Option() string { return idx.OptionValue }
go
MIT
0d9141bad9772c6047ecfdb2819d8a52d27ceb65
2026-01-07T08:35:52.485253Z
false
go-gorm/gorm
https://github.com/go-gorm/gorm/blob/0d9141bad9772c6047ecfdb2819d8a52d27ceb65/migrator/table_type.go
migrator/table_type.go
package migrator import ( "database/sql" ) // TableType table type implements TableType interface type TableType struct { SchemaValue string NameValue string TypeValue string CommentValue sql.NullString } // Schema returns the schema of the table. func (ct TableType) Schema() string { return ct.SchemaValue } // Name returns the name of the table. func (ct TableType) Name() string { return ct.NameValue } // Type returns the type of the table. func (ct TableType) Type() string { return ct.TypeValue } // Comment returns the comment of current table. func (ct TableType) Comment() (comment string, ok bool) { return ct.CommentValue.String, ct.CommentValue.Valid }
go
MIT
0d9141bad9772c6047ecfdb2819d8a52d27ceb65
2026-01-07T08:35:52.485253Z
false
go-gorm/gorm
https://github.com/go-gorm/gorm/blob/0d9141bad9772c6047ecfdb2819d8a52d27ceb65/migrator/migrator.go
migrator/migrator.go
package migrator import ( "context" "database/sql" "errors" "fmt" "reflect" "regexp" "strconv" "strings" "time" "gorm.io/gorm" "gorm.io/gorm/clause" "gorm.io/gorm/logger" "gorm.io/gorm/schema" ) // This regular expression seeks to find a sequence of digits (\d+) among zero or more non-digit characters (\D*), // with a possible trailing non-digit character (\D?). // For example, values that can pass this regular expression are: // - "123" // - "abc456" // -"%$#@789" var regFullDataType = regexp.MustCompile(`\D*(\d+)\D?`) // TODO:? Create const vars for raw sql queries ? var _ gorm.Migrator = (*Migrator)(nil) // Migrator m struct type Migrator struct { Config } // Config schema config type Config struct { CreateIndexAfterCreateTable bool DB *gorm.DB gorm.Dialector } type printSQLLogger struct { logger.Interface } func (l *printSQLLogger) Trace(ctx context.Context, begin time.Time, fc func() (sql string, rowsAffected int64), err error) { sql, _ := fc() fmt.Println(sql + ";") l.Interface.Trace(ctx, begin, fc, err) } // GormDataTypeInterface gorm data type interface type GormDataTypeInterface interface { GormDBDataType(*gorm.DB, *schema.Field) string } // RunWithValue run migration with statement value func (m Migrator) RunWithValue(value interface{}, fc func(*gorm.Statement) error) error { stmt := &gorm.Statement{DB: m.DB} if m.DB.Statement != nil { stmt.Table = m.DB.Statement.Table stmt.TableExpr = m.DB.Statement.TableExpr } if table, ok := value.(string); ok { stmt.Table = table } else if err := stmt.ParseWithSpecialTableName(value, stmt.Table); err != nil { return err } return fc(stmt) } // DataTypeOf return field's db data type func (m Migrator) DataTypeOf(field *schema.Field) string { fieldValue := reflect.New(field.IndirectFieldType) if dataTyper, ok := fieldValue.Interface().(GormDataTypeInterface); ok { if dataType := dataTyper.GormDBDataType(m.DB, field); dataType != "" { return dataType } } return m.Dialector.DataTypeOf(field) } // FullDataTypeOf returns field's db full data type func (m Migrator) FullDataTypeOf(field *schema.Field) (expr clause.Expr) { expr.SQL = m.DataTypeOf(field) if field.NotNull { expr.SQL += " NOT NULL" } if field.HasDefaultValue && (field.DefaultValueInterface != nil || field.DefaultValue != "") { if field.DefaultValueInterface != nil { defaultStmt := &gorm.Statement{Vars: []interface{}{field.DefaultValueInterface}} m.Dialector.BindVarTo(defaultStmt, defaultStmt, field.DefaultValueInterface) expr.SQL += " DEFAULT " + m.Dialector.Explain(defaultStmt.SQL.String(), field.DefaultValueInterface) } else if field.DefaultValue != "(-)" { expr.SQL += " DEFAULT " + field.DefaultValue } } return } func (m Migrator) GetQueryAndExecTx() (queryTx, execTx *gorm.DB) { queryTx = m.DB.Session(&gorm.Session{}) execTx = queryTx if m.DB.DryRun { queryTx.DryRun = false execTx = m.DB.Session(&gorm.Session{Logger: &printSQLLogger{Interface: m.DB.Logger}}) } return queryTx, execTx } // AutoMigrate auto migrate values func (m Migrator) AutoMigrate(values ...interface{}) error { for _, value := range m.ReorderModels(values, true) { queryTx, execTx := m.GetQueryAndExecTx() if !queryTx.Migrator().HasTable(value) { if err := execTx.Migrator().CreateTable(value); err != nil { return err } } else { if err := m.RunWithValue(value, func(stmt *gorm.Statement) error { if stmt.Schema == nil { return errors.New("failed to get schema") } columnTypes, err := queryTx.Migrator().ColumnTypes(value) if err != nil { return err } var ( parseIndexes = stmt.Schema.ParseIndexes() parseCheckConstraints = stmt.Schema.ParseCheckConstraints() ) for _, dbName := range stmt.Schema.DBNames { var foundColumn gorm.ColumnType for _, columnType := range columnTypes { if columnType.Name() == dbName { foundColumn = columnType break } } if foundColumn == nil { // not found, add column if err = execTx.Migrator().AddColumn(value, dbName); err != nil { return err } } else { // found, smartly migrate field := stmt.Schema.FieldsByDBName[dbName] if err = execTx.Migrator().MigrateColumn(value, field, foundColumn); err != nil { return err } } } if !m.DB.DisableForeignKeyConstraintWhenMigrating && !m.DB.IgnoreRelationshipsWhenMigrating { for _, rel := range stmt.Schema.Relationships.Relations { if rel.Field.IgnoreMigration { continue } if constraint := rel.ParseConstraint(); constraint != nil && constraint.Schema == stmt.Schema && !queryTx.Migrator().HasConstraint(value, constraint.Name) { if err := execTx.Migrator().CreateConstraint(value, constraint.Name); err != nil { return err } } } } for _, chk := range parseCheckConstraints { if !queryTx.Migrator().HasConstraint(value, chk.Name) { if err := execTx.Migrator().CreateConstraint(value, chk.Name); err != nil { return err } } } for _, idx := range parseIndexes { if !queryTx.Migrator().HasIndex(value, idx.Name) { if err := execTx.Migrator().CreateIndex(value, idx.Name); err != nil { return err } } } return nil }); err != nil { return err } } } return nil } // GetTables returns tables func (m Migrator) GetTables() (tableList []string, err error) { err = m.DB.Raw("SELECT TABLE_NAME FROM information_schema.tables where TABLE_SCHEMA=?", m.CurrentDatabase()). Scan(&tableList).Error return } // CreateTable create table in database for values func (m Migrator) CreateTable(values ...interface{}) error { for _, value := range m.ReorderModels(values, false) { tx := m.DB.Session(&gorm.Session{}) if err := m.RunWithValue(value, func(stmt *gorm.Statement) (err error) { if stmt.Schema == nil { return errors.New("failed to get schema") } var ( createTableSQL = "CREATE TABLE ? (" values = []interface{}{m.CurrentTable(stmt)} hasPrimaryKeyInDataType bool ) for _, dbName := range stmt.Schema.DBNames { field := stmt.Schema.FieldsByDBName[dbName] if !field.IgnoreMigration { createTableSQL += "? ?" hasPrimaryKeyInDataType = hasPrimaryKeyInDataType || strings.Contains(strings.ToUpper(m.DataTypeOf(field)), "PRIMARY KEY") values = append(values, clause.Column{Name: dbName}, m.DB.Migrator().FullDataTypeOf(field)) createTableSQL += "," } } if !hasPrimaryKeyInDataType && len(stmt.Schema.PrimaryFields) > 0 { createTableSQL += "PRIMARY KEY ?," primaryKeys := make([]interface{}, 0, len(stmt.Schema.PrimaryFields)) for _, field := range stmt.Schema.PrimaryFields { primaryKeys = append(primaryKeys, clause.Column{Name: field.DBName}) } values = append(values, primaryKeys) } for _, idx := range stmt.Schema.ParseIndexes() { if m.CreateIndexAfterCreateTable { defer func(value interface{}, name string) { if err == nil { err = tx.Migrator().CreateIndex(value, name) } }(value, idx.Name) } else { if idx.Class != "" { createTableSQL += idx.Class + " " } createTableSQL += "INDEX ? ?" if idx.Comment != "" { createTableSQL += fmt.Sprintf(" COMMENT '%s'", idx.Comment) } if idx.Option != "" { createTableSQL += " " + idx.Option } createTableSQL += "," values = append(values, clause.Column{Name: idx.Name}, tx.Migrator().(BuildIndexOptionsInterface).BuildIndexOptions(idx.Fields, stmt)) } } if !m.DB.DisableForeignKeyConstraintWhenMigrating && !m.DB.IgnoreRelationshipsWhenMigrating { for _, rel := range stmt.Schema.Relationships.Relations { if rel.Field.IgnoreMigration { continue } if constraint := rel.ParseConstraint(); constraint != nil { if constraint.Schema == stmt.Schema { sql, vars := constraint.Build() createTableSQL += sql + "," values = append(values, vars...) } } } } for _, uni := range stmt.Schema.ParseUniqueConstraints() { createTableSQL += "CONSTRAINT ? UNIQUE (?)," values = append(values, clause.Column{Name: uni.Name}, clause.Expr{SQL: stmt.Quote(uni.Field.DBName)}) } for _, chk := range stmt.Schema.ParseCheckConstraints() { createTableSQL += "CONSTRAINT ? CHECK (?)," values = append(values, clause.Column{Name: chk.Name}, clause.Expr{SQL: chk.Constraint}) } createTableSQL = strings.TrimSuffix(createTableSQL, ",") createTableSQL += ")" if tableOption, ok := m.DB.Get("gorm:table_options"); ok { createTableSQL += fmt.Sprint(tableOption) } err = tx.Exec(createTableSQL, values...).Error return err }); err != nil { return err } } return nil } // DropTable drop table for values func (m Migrator) DropTable(values ...interface{}) error { values = m.ReorderModels(values, false) for i := len(values) - 1; i >= 0; i-- { tx := m.DB.Session(&gorm.Session{}) if err := m.RunWithValue(values[i], func(stmt *gorm.Statement) error { return tx.Exec("DROP TABLE IF EXISTS ?", m.CurrentTable(stmt)).Error }); err != nil { return err } } return nil } // HasTable returns table exists or not for value, value could be a struct or string func (m Migrator) HasTable(value interface{}) bool { var count int64 m.RunWithValue(value, func(stmt *gorm.Statement) error { currentDatabase := m.DB.Migrator().CurrentDatabase() return m.DB.Raw("SELECT count(*) FROM information_schema.tables WHERE table_schema = ? AND table_name = ? AND table_type = ?", currentDatabase, stmt.Table, "BASE TABLE").Row().Scan(&count) }) return count > 0 } // RenameTable rename table from oldName to newName func (m Migrator) RenameTable(oldName, newName interface{}) error { var oldTable, newTable interface{} if v, ok := oldName.(string); ok { oldTable = clause.Table{Name: v} } else { stmt := &gorm.Statement{DB: m.DB} if err := stmt.Parse(oldName); err == nil { oldTable = m.CurrentTable(stmt) } else { return err } } if v, ok := newName.(string); ok { newTable = clause.Table{Name: v} } else { stmt := &gorm.Statement{DB: m.DB} if err := stmt.Parse(newName); err == nil { newTable = m.CurrentTable(stmt) } else { return err } } return m.DB.Exec("ALTER TABLE ? RENAME TO ?", oldTable, newTable).Error } // AddColumn create `name` column for value func (m Migrator) AddColumn(value interface{}, name string) error { return m.RunWithValue(value, func(stmt *gorm.Statement) error { // avoid using the same name field if stmt.Schema == nil { return errors.New("failed to get schema") } f := stmt.Schema.LookUpField(name) if f == nil { return fmt.Errorf("failed to look up field with name: %s", name) } if !f.IgnoreMigration { return m.DB.Exec( "ALTER TABLE ? ADD ? ?", m.CurrentTable(stmt), clause.Column{Name: f.DBName}, m.DB.Migrator().FullDataTypeOf(f), ).Error } return nil }) } // DropColumn drop value's `name` column func (m Migrator) DropColumn(value interface{}, name string) error { return m.RunWithValue(value, func(stmt *gorm.Statement) error { if stmt.Schema != nil { if field := stmt.Schema.LookUpField(name); field != nil { name = field.DBName } } return m.DB.Exec( "ALTER TABLE ? DROP COLUMN ?", m.CurrentTable(stmt), clause.Column{Name: name}, ).Error }) } // AlterColumn alter value's `field` column' type based on schema definition func (m Migrator) AlterColumn(value interface{}, field string) error { return m.RunWithValue(value, func(stmt *gorm.Statement) error { if stmt.Schema != nil { if field := stmt.Schema.LookUpField(field); field != nil { fileType := m.FullDataTypeOf(field) return m.DB.Exec( "ALTER TABLE ? ALTER COLUMN ? TYPE ?", m.CurrentTable(stmt), clause.Column{Name: field.DBName}, fileType, ).Error } } return fmt.Errorf("failed to look up field with name: %s", field) }) } // HasColumn check has column `field` for value or not func (m Migrator) HasColumn(value interface{}, field string) bool { var count int64 m.RunWithValue(value, func(stmt *gorm.Statement) error { currentDatabase := m.DB.Migrator().CurrentDatabase() name := field if stmt.Schema != nil { if field := stmt.Schema.LookUpField(field); field != nil { name = field.DBName } } return m.DB.Raw( "SELECT count(*) FROM INFORMATION_SCHEMA.columns WHERE table_schema = ? AND table_name = ? AND column_name = ?", currentDatabase, stmt.Table, name, ).Row().Scan(&count) }) return count > 0 } // RenameColumn rename value's field name from oldName to newName func (m Migrator) RenameColumn(value interface{}, oldName, newName string) error { return m.RunWithValue(value, func(stmt *gorm.Statement) error { if stmt.Schema != nil { if field := stmt.Schema.LookUpField(oldName); field != nil { oldName = field.DBName } if field := stmt.Schema.LookUpField(newName); field != nil { newName = field.DBName } } return m.DB.Exec( "ALTER TABLE ? RENAME COLUMN ? TO ?", m.CurrentTable(stmt), clause.Column{Name: oldName}, clause.Column{Name: newName}, ).Error }) } // MigrateColumn migrate column func (m Migrator) MigrateColumn(value interface{}, field *schema.Field, columnType gorm.ColumnType) error { if field.IgnoreMigration { return nil } // found, smart migrate fullDataType := strings.TrimSpace(strings.ToLower(m.DB.Migrator().FullDataTypeOf(field).SQL)) realDataType := strings.ToLower(columnType.DatabaseTypeName()) var ( alterColumn bool isSameType = fullDataType == realDataType ) if !field.PrimaryKey { // check type if !strings.HasPrefix(fullDataType, realDataType) { // check type aliases aliases := m.DB.Migrator().GetTypeAliases(realDataType) for _, alias := range aliases { if strings.HasPrefix(fullDataType, alias) { isSameType = true break } } if !isSameType { alterColumn = true } } } if !isSameType { // check size if length, ok := columnType.Length(); length != int64(field.Size) { if length > 0 && field.Size > 0 { alterColumn = true } else { // has size in data type and not equal // Since the following code is frequently called in the for loop, reg optimization is needed here matches2 := regFullDataType.FindAllStringSubmatch(fullDataType, -1) if !field.PrimaryKey && (len(matches2) == 1 && matches2[0][1] != fmt.Sprint(length) && ok) { alterColumn = true } } } } // check precision if realDataType == "decimal" || realDataType == "numeric" && regexp.MustCompile(realDataType+`\(.*\)`).FindString(fullDataType) != "" { // if realDataType has no precision,ignore precision, scale, ok := columnType.DecimalSize() if ok { if !strings.HasPrefix(fullDataType, fmt.Sprintf("%s(%d,%d)", realDataType, precision, scale)) && !strings.HasPrefix(fullDataType, fmt.Sprintf("%s(%d)", realDataType, precision)) { alterColumn = true } } } else { if precision, _, ok := columnType.DecimalSize(); ok && int64(field.Precision) != precision { if regexp.MustCompile(fmt.Sprintf("[^0-9]%d[^0-9]", field.Precision)).MatchString(m.DataTypeOf(field)) { alterColumn = true } } } // check nullable if nullable, ok := columnType.Nullable(); ok && nullable == field.NotNull { // not primary key & current database is non-nullable(to be nullable) if !field.PrimaryKey && !nullable { alterColumn = true } } // check default value if !field.PrimaryKey { currentDefaultNotNull := field.HasDefaultValue && (field.DefaultValueInterface != nil || !strings.EqualFold(field.DefaultValue, "NULL")) dv, dvNotNull := columnType.DefaultValue() if dvNotNull && !currentDefaultNotNull { // default value -> null alterColumn = true } else if !dvNotNull && currentDefaultNotNull { // null -> default value alterColumn = true } else if currentDefaultNotNull || dvNotNull { switch field.GORMDataType { case schema.Time: if !strings.EqualFold(strings.TrimSuffix(dv, "()"), strings.TrimSuffix(field.DefaultValue, "()")) { alterColumn = true } case schema.Bool: v1, _ := strconv.ParseBool(dv) v2, _ := strconv.ParseBool(field.DefaultValue) alterColumn = v1 != v2 case schema.String: if dv != field.DefaultValue && dv != strings.Trim(field.DefaultValue, "'\"") { alterColumn = true } default: alterColumn = dv != field.DefaultValue } } } // check comment if comment, ok := columnType.Comment(); ok && comment != field.Comment { // not primary key if !field.PrimaryKey { alterColumn = true } } if alterColumn { if err := m.DB.Migrator().AlterColumn(value, field.DBName); err != nil { return err } } if err := m.DB.Migrator().MigrateColumnUnique(value, field, columnType); err != nil { return err } return nil } func (m Migrator) MigrateColumnUnique(value interface{}, field *schema.Field, columnType gorm.ColumnType) error { unique, ok := columnType.Unique() if !ok || field.PrimaryKey { return nil // skip primary key } // By default, ColumnType's Unique is not affected by UniqueIndex, so we don't care about UniqueIndex. return m.RunWithValue(value, func(stmt *gorm.Statement) error { // We're currently only receiving boolean values on `Unique` tag, // so the UniqueConstraint name is fixed constraint := m.DB.NamingStrategy.UniqueName(stmt.Table, field.DBName) if unique && !field.Unique { return m.DB.Migrator().DropConstraint(value, constraint) } if !unique && field.Unique { return m.DB.Migrator().CreateConstraint(value, constraint) } return nil }) } // ColumnTypes return columnTypes []gorm.ColumnType and execErr error func (m Migrator) ColumnTypes(value interface{}) ([]gorm.ColumnType, error) { columnTypes := make([]gorm.ColumnType, 0) execErr := m.RunWithValue(value, func(stmt *gorm.Statement) (err error) { rows, err := m.DB.Session(&gorm.Session{}).Table(stmt.Table).Limit(1).Rows() if err != nil { return err } defer func() { err = rows.Close() }() var rawColumnTypes []*sql.ColumnType rawColumnTypes, err = rows.ColumnTypes() if err != nil { return err } for _, c := range rawColumnTypes { columnTypes = append(columnTypes, ColumnType{SQLColumnType: c}) } return }) return columnTypes, execErr } // CreateView create view from Query in gorm.ViewOption. // Query in gorm.ViewOption is a [subquery] // // // CREATE VIEW `user_view` AS SELECT * FROM `users` WHERE age > 20 // q := DB.Model(&User{}).Where("age > ?", 20) // DB.Debug().Migrator().CreateView("user_view", gorm.ViewOption{Query: q}) // // // CREATE OR REPLACE VIEW `users_view` AS SELECT * FROM `users` WITH CHECK OPTION // q := DB.Model(&User{}) // DB.Debug().Migrator().CreateView("user_view", gorm.ViewOption{Query: q, Replace: true, CheckOption: "WITH CHECK OPTION"}) // // [subquery]: https://gorm.io/docs/advanced_query.html#SubQuery func (m Migrator) CreateView(name string, option gorm.ViewOption) error { if option.Query == nil { return gorm.ErrSubQueryRequired } sql := new(strings.Builder) sql.WriteString("CREATE ") if option.Replace { sql.WriteString("OR REPLACE ") } sql.WriteString("VIEW ") m.QuoteTo(sql, name) sql.WriteString(" AS ") m.DB.Statement.AddVar(sql, option.Query) if option.CheckOption != "" { sql.WriteString(" ") sql.WriteString(option.CheckOption) } return m.DB.Exec(m.Explain(sql.String(), m.DB.Statement.Vars...)).Error } // DropView drop view func (m Migrator) DropView(name string) error { return m.DB.Exec("DROP VIEW IF EXISTS ?", clause.Table{Name: name}).Error } // GuessConstraintAndTable guess statement's constraint and it's table based on name // // Deprecated: use GuessConstraintInterfaceAndTable instead. func (m Migrator) GuessConstraintAndTable(stmt *gorm.Statement, name string) (*schema.Constraint, *schema.CheckConstraint, string) { constraint, table := m.GuessConstraintInterfaceAndTable(stmt, name) switch c := constraint.(type) { case *schema.Constraint: return c, nil, table case *schema.CheckConstraint: return nil, c, table default: return nil, nil, table } } // GuessConstraintInterfaceAndTable guess statement's constraint and it's table based on name // nolint:cyclop func (m Migrator) GuessConstraintInterfaceAndTable(stmt *gorm.Statement, name string) (_ schema.ConstraintInterface, table string) { if stmt.Schema == nil { return nil, stmt.Table } checkConstraints := stmt.Schema.ParseCheckConstraints() if chk, ok := checkConstraints[name]; ok { return &chk, stmt.Table } uniqueConstraints := stmt.Schema.ParseUniqueConstraints() if uni, ok := uniqueConstraints[name]; ok { return &uni, stmt.Table } getTable := func(rel *schema.Relationship) string { switch rel.Type { case schema.HasOne, schema.HasMany: return rel.FieldSchema.Table case schema.Many2Many: return rel.JoinTable.Table } return stmt.Table } for _, rel := range stmt.Schema.Relationships.Relations { if constraint := rel.ParseConstraint(); constraint != nil && constraint.Name == name { return constraint, getTable(rel) } } if field := stmt.Schema.LookUpField(name); field != nil { for k := range checkConstraints { if checkConstraints[k].Field == field { v := checkConstraints[k] return &v, stmt.Table } } for k := range uniqueConstraints { if uniqueConstraints[k].Field == field { v := uniqueConstraints[k] return &v, stmt.Table } } for _, rel := range stmt.Schema.Relationships.Relations { if constraint := rel.ParseConstraint(); constraint != nil && rel.Field == field { return constraint, getTable(rel) } } } return nil, stmt.Schema.Table } // CreateConstraint create constraint func (m Migrator) CreateConstraint(value interface{}, name string) error { return m.RunWithValue(value, func(stmt *gorm.Statement) error { constraint, table := m.GuessConstraintInterfaceAndTable(stmt, name) if constraint != nil { vars := []interface{}{clause.Table{Name: table}} if stmt.TableExpr != nil { vars[0] = stmt.TableExpr } sql, values := constraint.Build() return m.DB.Exec("ALTER TABLE ? ADD "+sql, append(vars, values...)...).Error } return nil }) } // DropConstraint drop constraint func (m Migrator) DropConstraint(value interface{}, name string) error { return m.RunWithValue(value, func(stmt *gorm.Statement) error { constraint, table := m.GuessConstraintInterfaceAndTable(stmt, name) if constraint != nil { name = constraint.GetName() } return m.DB.Exec("ALTER TABLE ? DROP CONSTRAINT ?", clause.Table{Name: table}, clause.Column{Name: name}).Error }) } // HasConstraint check has constraint or not func (m Migrator) HasConstraint(value interface{}, name string) bool { var count int64 m.RunWithValue(value, func(stmt *gorm.Statement) error { currentDatabase := m.DB.Migrator().CurrentDatabase() constraint, table := m.GuessConstraintInterfaceAndTable(stmt, name) if constraint != nil { name = constraint.GetName() } return m.DB.Raw( "SELECT count(*) FROM INFORMATION_SCHEMA.table_constraints WHERE constraint_schema = ? AND table_name = ? AND constraint_name = ?", currentDatabase, table, name, ).Row().Scan(&count) }) return count > 0 } // BuildIndexOptions build index options func (m Migrator) BuildIndexOptions(opts []schema.IndexOption, stmt *gorm.Statement) (results []interface{}) { for _, opt := range opts { str := stmt.Quote(opt.DBName) if opt.Expression != "" { str = opt.Expression } else if opt.Length > 0 { str += fmt.Sprintf("(%d)", opt.Length) } if opt.Collate != "" { str += " COLLATE " + opt.Collate } if opt.Sort != "" { str += " " + opt.Sort } results = append(results, clause.Expr{SQL: str}) } return } // BuildIndexOptionsInterface build index options interface type BuildIndexOptionsInterface interface { BuildIndexOptions([]schema.IndexOption, *gorm.Statement) []interface{} } // CreateIndex create index `name` func (m Migrator) CreateIndex(value interface{}, name string) error { return m.RunWithValue(value, func(stmt *gorm.Statement) error { if stmt.Schema == nil { return errors.New("failed to get schema") } if idx := stmt.Schema.LookIndex(name); idx != nil { opts := m.DB.Migrator().(BuildIndexOptionsInterface).BuildIndexOptions(idx.Fields, stmt) values := []interface{}{clause.Column{Name: idx.Name}, m.CurrentTable(stmt), opts} createIndexSQL := "CREATE " if idx.Class != "" { createIndexSQL += idx.Class + " " } createIndexSQL += "INDEX ? ON ??" if idx.Type != "" { createIndexSQL += " USING " + idx.Type } if idx.Comment != "" { createIndexSQL += fmt.Sprintf(" COMMENT '%s'", idx.Comment) } if idx.Option != "" { createIndexSQL += " " + idx.Option } return m.DB.Exec(createIndexSQL, values...).Error } return fmt.Errorf("failed to create index with name %s", name) }) } // DropIndex drop index `name` func (m Migrator) DropIndex(value interface{}, name string) error { return m.RunWithValue(value, func(stmt *gorm.Statement) error { if stmt.Schema != nil { if idx := stmt.Schema.LookIndex(name); idx != nil { name = idx.Name } } return m.DB.Exec("DROP INDEX ? ON ?", clause.Column{Name: name}, m.CurrentTable(stmt)).Error }) } // HasIndex check has index `name` or not func (m Migrator) HasIndex(value interface{}, name string) bool { var count int64 m.RunWithValue(value, func(stmt *gorm.Statement) error { currentDatabase := m.DB.Migrator().CurrentDatabase() if stmt.Schema != nil { if idx := stmt.Schema.LookIndex(name); idx != nil { name = idx.Name } } return m.DB.Raw( "SELECT count(*) FROM information_schema.statistics WHERE table_schema = ? AND table_name = ? AND index_name = ?", currentDatabase, stmt.Table, name, ).Row().Scan(&count) }) return count > 0 } // RenameIndex rename index from oldName to newName func (m Migrator) RenameIndex(value interface{}, oldName, newName string) error { return m.RunWithValue(value, func(stmt *gorm.Statement) error { return m.DB.Exec( "ALTER TABLE ? RENAME INDEX ? TO ?", m.CurrentTable(stmt), clause.Column{Name: oldName}, clause.Column{Name: newName}, ).Error }) } // CurrentDatabase returns current database name func (m Migrator) CurrentDatabase() (name string) { m.DB.Raw("SELECT DATABASE()").Row().Scan(&name) return } // ReorderModels reorder models according to constraint dependencies func (m Migrator) ReorderModels(values []interface{}, autoAdd bool) (results []interface{}) { type Dependency struct { *gorm.Statement Depends []*schema.Schema } var ( modelNames, orderedModelNames []string orderedModelNamesMap = map[string]bool{} parsedSchemas = map[*schema.Schema]bool{} valuesMap = map[string]Dependency{} insertIntoOrderedList func(name string) parseDependence func(value interface{}, addToList bool) ) parseDependence = func(value interface{}, addToList bool) { dep := Dependency{ Statement: &gorm.Statement{DB: m.DB, Dest: value}, } beDependedOn := map[*schema.Schema]bool{} // support for special table name if err := dep.ParseWithSpecialTableName(value, m.DB.Statement.Table); err != nil { m.DB.Logger.Error(context.Background(), "failed to parse value %#v, got error %v", value, err) } if _, ok := parsedSchemas[dep.Statement.Schema]; ok { return } parsedSchemas[dep.Statement.Schema] = true if !m.DB.IgnoreRelationshipsWhenMigrating { for _, rel := range dep.Schema.Relationships.Relations { if rel.Field.IgnoreMigration { continue } if c := rel.ParseConstraint(); c != nil && c.Schema == dep.Statement.Schema && c.Schema != c.ReferenceSchema { dep.Depends = append(dep.Depends, c.ReferenceSchema) } if rel.Type == schema.HasOne || rel.Type == schema.HasMany { beDependedOn[rel.FieldSchema] = true } if rel.JoinTable != nil { // append join value defer func(rel *schema.Relationship, joinValue interface{}) { if !beDependedOn[rel.FieldSchema] { dep.Depends = append(dep.Depends, rel.FieldSchema) } else { fieldValue := reflect.New(rel.FieldSchema.ModelType).Interface() parseDependence(fieldValue, autoAdd) } parseDependence(joinValue, autoAdd) }(rel, reflect.New(rel.JoinTable.ModelType).Interface()) } } } valuesMap[dep.Schema.Table] = dep if addToList { modelNames = append(modelNames, dep.Schema.Table) } } insertIntoOrderedList = func(name string) { if _, ok := orderedModelNamesMap[name]; ok { return // avoid loop } orderedModelNamesMap[name] = true if autoAdd { dep := valuesMap[name] for _, d := range dep.Depends { if _, ok := valuesMap[d.Table]; ok { insertIntoOrderedList(d.Table) } else { parseDependence(reflect.New(d.ModelType).Interface(), autoAdd) insertIntoOrderedList(d.Table) } } } orderedModelNames = append(orderedModelNames, name) } for _, value := range values { if v, ok := value.(string); ok { results = append(results, v) } else { parseDependence(value, true) } } for _, name := range modelNames { insertIntoOrderedList(name) } for _, name := range orderedModelNames { results = append(results, valuesMap[name].Statement.Dest) } return } // CurrentTable returns current statement's table expression func (m Migrator) CurrentTable(stmt *gorm.Statement) interface{} { if stmt.TableExpr != nil { return *stmt.TableExpr } return clause.Table{Name: stmt.Table} } // GetIndexes return Indexes []gorm.Index and execErr error func (m Migrator) GetIndexes(dst interface{}) ([]gorm.Index, error) { return nil, errors.New("not support") } // GetTypeAliases return database type aliases func (m Migrator) GetTypeAliases(databaseTypeName string) []string { return nil } // TableType return tableType gorm.TableType and execErr error func (m Migrator) TableType(dst interface{}) (gorm.TableType, error) { return nil, errors.New("not support") }
go
MIT
0d9141bad9772c6047ecfdb2819d8a52d27ceb65
2026-01-07T08:35:52.485253Z
false
go-gorm/gorm
https://github.com/go-gorm/gorm/blob/0d9141bad9772c6047ecfdb2819d8a52d27ceb65/migrator/column_type.go
migrator/column_type.go
package migrator import ( "database/sql" "reflect" ) // ColumnType column type implements ColumnType interface type ColumnType struct { SQLColumnType *sql.ColumnType NameValue sql.NullString DataTypeValue sql.NullString ColumnTypeValue sql.NullString PrimaryKeyValue sql.NullBool UniqueValue sql.NullBool AutoIncrementValue sql.NullBool LengthValue sql.NullInt64 DecimalSizeValue sql.NullInt64 ScaleValue sql.NullInt64 NullableValue sql.NullBool ScanTypeValue reflect.Type CommentValue sql.NullString DefaultValueValue sql.NullString } // Name returns the name or alias of the column. func (ct ColumnType) Name() string { if ct.NameValue.Valid { return ct.NameValue.String } return ct.SQLColumnType.Name() } // DatabaseTypeName returns the database system name of the column type. If an empty // string is returned, then the driver type name is not supported. // Consult your driver documentation for a list of driver data types. Length specifiers // are not included. // Common type names include "VARCHAR", "TEXT", "NVARCHAR", "DECIMAL", "BOOL", // "INT", and "BIGINT". func (ct ColumnType) DatabaseTypeName() string { if ct.DataTypeValue.Valid { return ct.DataTypeValue.String } return ct.SQLColumnType.DatabaseTypeName() } // ColumnType returns the database type of the column. like `varchar(16)` func (ct ColumnType) ColumnType() (columnType string, ok bool) { return ct.ColumnTypeValue.String, ct.ColumnTypeValue.Valid } // PrimaryKey returns the column is primary key or not. func (ct ColumnType) PrimaryKey() (isPrimaryKey bool, ok bool) { return ct.PrimaryKeyValue.Bool, ct.PrimaryKeyValue.Valid } // AutoIncrement returns the column is auto increment or not. func (ct ColumnType) AutoIncrement() (isAutoIncrement bool, ok bool) { return ct.AutoIncrementValue.Bool, ct.AutoIncrementValue.Valid } // Length returns the column type length for variable length column types func (ct ColumnType) Length() (length int64, ok bool) { if ct.LengthValue.Valid { return ct.LengthValue.Int64, true } return ct.SQLColumnType.Length() } // DecimalSize returns the scale and precision of a decimal type. func (ct ColumnType) DecimalSize() (precision int64, scale int64, ok bool) { if ct.DecimalSizeValue.Valid { return ct.DecimalSizeValue.Int64, ct.ScaleValue.Int64, true } return ct.SQLColumnType.DecimalSize() } // Nullable reports whether the column may be null. func (ct ColumnType) Nullable() (nullable bool, ok bool) { if ct.NullableValue.Valid { return ct.NullableValue.Bool, true } return ct.SQLColumnType.Nullable() } // Unique reports whether the column may be unique. func (ct ColumnType) Unique() (unique bool, ok bool) { return ct.UniqueValue.Bool, ct.UniqueValue.Valid } // ScanType returns a Go type suitable for scanning into using Rows.Scan. func (ct ColumnType) ScanType() reflect.Type { if ct.ScanTypeValue != nil { return ct.ScanTypeValue } return ct.SQLColumnType.ScanType() } // Comment returns the comment of current column. func (ct ColumnType) Comment() (value string, ok bool) { return ct.CommentValue.String, ct.CommentValue.Valid } // DefaultValue returns the default value of current column. func (ct ColumnType) DefaultValue() (value string, ok bool) { return ct.DefaultValueValue.String, ct.DefaultValueValue.Valid }
go
MIT
0d9141bad9772c6047ecfdb2819d8a52d27ceb65
2026-01-07T08:35:52.485253Z
false
go-gorm/gorm
https://github.com/go-gorm/gorm/blob/0d9141bad9772c6047ecfdb2819d8a52d27ceb65/clause/clause_test.go
clause/clause_test.go
package clause_test import ( "reflect" "strings" "sync" "testing" "gorm.io/gorm" "gorm.io/gorm/clause" "gorm.io/gorm/schema" "gorm.io/gorm/utils/tests" ) var db, _ = gorm.Open(tests.DummyDialector{}, nil) func checkBuildClauses(t *testing.T, clauses []clause.Interface, result string, vars []interface{}) { var ( buildNames []string buildNamesMap = map[string]bool{} user, _ = schema.Parse(&tests.User{}, &sync.Map{}, db.NamingStrategy) stmt = gorm.Statement{DB: db, Table: user.Table, Schema: user, Clauses: map[string]clause.Clause{}} ) for _, c := range clauses { if _, ok := buildNamesMap[c.Name()]; !ok { buildNames = append(buildNames, c.Name()) buildNamesMap[c.Name()] = true } stmt.AddClause(c) } stmt.Build(buildNames...) if strings.TrimSpace(stmt.SQL.String()) != result { t.Errorf("SQL expects %v got %v", result, stmt.SQL.String()) } if !reflect.DeepEqual(stmt.Vars, vars) { t.Errorf("Vars expects %+v got %v", stmt.Vars, vars) } }
go
MIT
0d9141bad9772c6047ecfdb2819d8a52d27ceb65
2026-01-07T08:35:52.485253Z
false
go-gorm/gorm
https://github.com/go-gorm/gorm/blob/0d9141bad9772c6047ecfdb2819d8a52d27ceb65/clause/from.go
clause/from.go
package clause // From from clause type From struct { Tables []Table Joins []Join } // Name from clause name func (from From) Name() string { return "FROM" } // Build build from clause func (from From) Build(builder Builder) { if len(from.Tables) > 0 { for idx, table := range from.Tables { if idx > 0 { builder.WriteByte(',') } builder.WriteQuoted(table) } } else { builder.WriteQuoted(currentTable) } for _, join := range from.Joins { builder.WriteByte(' ') join.Build(builder) } } // MergeClause merge from clause func (from From) MergeClause(clause *Clause) { clause.Expression = from }
go
MIT
0d9141bad9772c6047ecfdb2819d8a52d27ceb65
2026-01-07T08:35:52.485253Z
false
go-gorm/gorm
https://github.com/go-gorm/gorm/blob/0d9141bad9772c6047ecfdb2819d8a52d27ceb65/clause/expression_test.go
clause/expression_test.go
package clause_test import ( "database/sql" "fmt" "reflect" "sync" "testing" "gorm.io/gorm" "gorm.io/gorm/clause" "gorm.io/gorm/schema" "gorm.io/gorm/utils/tests" ) func TestExpr(t *testing.T) { results := []struct { SQL string Result string Vars []interface{} }{{ SQL: "create table ? (? ?, ? ?)", Vars: []interface{}{clause.Table{Name: "users"}, clause.Column{Name: "id"}, clause.Expr{SQL: "int"}, clause.Column{Name: "name"}, clause.Expr{SQL: "text"}}, Result: "create table `users` (`id` int, `name` text)", }} for idx, result := range results { t.Run(fmt.Sprintf("case #%v", idx), func(t *testing.T) { user, _ := schema.Parse(&tests.User{}, &sync.Map{}, db.NamingStrategy) stmt := &gorm.Statement{DB: db, Table: user.Table, Schema: user, Clauses: map[string]clause.Clause{}} clause.Expr{SQL: result.SQL, Vars: result.Vars}.Build(stmt) if stmt.SQL.String() != result.Result { t.Errorf("generated SQL is not equal, expects %v, but got %v", result.Result, stmt.SQL.String()) } }) } } func TestNamedExpr(t *testing.T) { type Base struct { Name2 string } type NamedArgument struct { Name1 string Base } results := []struct { SQL string Result string Vars []interface{} ExpectedVars []interface{} }{{ SQL: "create table ? (? ?, ? ?)", Vars: []interface{}{clause.Table{Name: "users"}, clause.Column{Name: "id"}, clause.Expr{SQL: "int"}, clause.Column{Name: "name"}, clause.Expr{SQL: "text"}}, Result: "create table `users` (`id` int, `name` text)", }, { SQL: "name1 = @name AND name2 = @name", Vars: []interface{}{sql.Named("name", "jinzhu")}, Result: "name1 = ? AND name2 = ?", ExpectedVars: []interface{}{"jinzhu", "jinzhu"}, }, { SQL: "name1 = @name AND name2 = @@name", Vars: []interface{}{map[string]interface{}{"name": "jinzhu"}}, Result: "name1 = ? AND name2 = @@name", ExpectedVars: []interface{}{"jinzhu"}, }, { SQL: "name1 = @name1 AND name2 = @name2 AND name3 = @name1", Vars: []interface{}{sql.Named("name1", "jinzhu"), sql.Named("name2", "jinzhu2")}, Result: "name1 = ? AND name2 = ? AND name3 = ?", ExpectedVars: []interface{}{"jinzhu", "jinzhu2", "jinzhu"}, }, { SQL: "name1 = @name1 AND name2 = @name2 AND name3 = @name1", Vars: []interface{}{map[string]interface{}{"name1": "jinzhu", "name2": "jinzhu2"}}, Result: "name1 = ? AND name2 = ? AND name3 = ?", ExpectedVars: []interface{}{"jinzhu", "jinzhu2", "jinzhu"}, }, { SQL: "@@test AND name1 = @name1 AND name2 = @name2 AND name3 = @name1 @notexist", Vars: []interface{}{sql.Named("name1", "jinzhu"), sql.Named("name2", "jinzhu2")}, Result: "@@test AND name1 = ? AND name2 = ? AND name3 = ? @notexist", ExpectedVars: []interface{}{"jinzhu", "jinzhu2", "jinzhu"}, }, { SQL: "@@test AND name1 = @Name1 AND name2 = @Name2 AND name3 = @Name1 @notexist", Vars: []interface{}{NamedArgument{Name1: "jinzhu", Base: Base{Name2: "jinzhu2"}}}, Result: "@@test AND name1 = ? AND name2 = ? AND name3 = ? @notexist", ExpectedVars: []interface{}{"jinzhu", "jinzhu2", "jinzhu"}, }, { SQL: "name in (@names)", Vars: []interface{}{map[string]interface{}{"names": []interface{}{"jinzhu", "jinzhu2"}}}, Result: "name in (?,?)", ExpectedVars: []interface{}{"jinzhu", "jinzhu2"}, }, { SQL: "name in (@names)", Vars: []interface{}{map[string]interface{}{"names": "jinzhu"}}, Result: "name in (?)", ExpectedVars: []interface{}{"jinzhu"}, }, { SQL: "create table ? (? ?, ? ?)", Vars: []interface{}{}, Result: "create table ? (? ?, ? ?)", }, { SQL: "name1 = @name AND name2 = @name;", Vars: []interface{}{sql.Named("name", "jinzhu")}, Result: "name1 = ? AND name2 = ?;", ExpectedVars: []interface{}{"jinzhu", "jinzhu"}, }, { SQL: "name1 = @name1\r\n AND name2 = @name2", Vars: []interface{}{map[string]interface{}{"name1": "jinzhu", "name2": "jinzhu"}}, Result: "name1 = ?\r\n AND name2 = ?", ExpectedVars: []interface{}{"jinzhu", "jinzhu"}, }, { SQL: "name1 = @name1\r AND name2 = @name2", Vars: []interface{}{map[string]interface{}{"name1": "jinzhu", "name2": "jinzhu"}}, Result: "name1 = ?\r AND name2 = ?", ExpectedVars: []interface{}{"jinzhu", "jinzhu"}, }, { SQL: "?", Vars: []interface{}{clause.Column{Table: "table", Name: "col"}}, Result: "`table`.`col`", }, { SQL: "?", Vars: []interface{}{clause.Column{Table: "table", Name: "col", Raw: true}}, Result: "table.col", }, { SQL: "?", Vars: []interface{}{clause.Column{Table: "table", Name: clause.PrimaryKey, Raw: true}}, Result: "table.id", }, { SQL: "?", Vars: []interface{}{clause.Column{Table: "table", Name: "col", Alias: "alias"}}, Result: "`table`.`col` AS `alias`", }, { SQL: "?", Vars: []interface{}{clause.Column{Table: "table", Name: "col", Alias: "alias", Raw: true}}, Result: "table.col AS alias", }, { SQL: "?", Vars: []interface{}{clause.Table{Name: "table", Alias: "alias"}}, Result: "`table` `alias`", }, { SQL: "?", Vars: []interface{}{clause.Table{Name: "table", Alias: "alias", Raw: true}}, Result: "table alias", }} for idx, result := range results { t.Run(fmt.Sprintf("case #%v", idx), func(t *testing.T) { user, _ := schema.Parse(&tests.User{}, &sync.Map{}, db.NamingStrategy) stmt := &gorm.Statement{DB: db, Table: user.Table, Schema: user, Clauses: map[string]clause.Clause{}} clause.NamedExpr{SQL: result.SQL, Vars: result.Vars}.Build(stmt) if stmt.SQL.String() != result.Result { t.Errorf("generated SQL is not equal, expects %v, but got %v", result.Result, stmt.SQL.String()) } if !reflect.DeepEqual(result.ExpectedVars, stmt.Vars) { t.Errorf("generated vars is not equal, expects %v, but got %v", result.ExpectedVars, stmt.Vars) } }) } } func TestExpression(t *testing.T) { column := "column-name" results := []struct { Expressions []clause.Expression ExpectedVars []interface{} Result string }{{ Expressions: []clause.Expression{ clause.Eq{Column: column, Value: "column-value"}, }, ExpectedVars: []interface{}{"column-value"}, Result: "`column-name` = ?", }, { Expressions: []clause.Expression{ clause.Eq{Column: column, Value: nil}, clause.Eq{Column: column, Value: (*string)(nil)}, clause.Eq{Column: column, Value: (*int)(nil)}, clause.Eq{Column: column, Value: (*bool)(nil)}, clause.Eq{Column: column, Value: (interface{})(nil)}, clause.Eq{Column: column, Value: sql.NullString{String: "", Valid: false}}, }, Result: "`column-name` IS NULL", }, { Expressions: []clause.Expression{ clause.Neq{Column: column, Value: "column-value"}, }, ExpectedVars: []interface{}{"column-value"}, Result: "`column-name` <> ?", }, { Expressions: []clause.Expression{ clause.Neq{Column: column, Value: nil}, clause.Neq{Column: column, Value: (*string)(nil)}, clause.Neq{Column: column, Value: (*int)(nil)}, clause.Neq{Column: column, Value: (*bool)(nil)}, clause.Neq{Column: column, Value: (interface{})(nil)}, }, Result: "`column-name` IS NOT NULL", }, { Expressions: []clause.Expression{ clause.Eq{Column: column, Value: []string{"a", "b"}}, }, ExpectedVars: []interface{}{"a", "b"}, Result: "`column-name` IN (?,?)", }, { Expressions: []clause.Expression{ clause.Neq{Column: column, Value: []string{"a", "b"}}, }, ExpectedVars: []interface{}{"a", "b"}, Result: "`column-name` NOT IN (?,?)", }, { Expressions: []clause.Expression{ clause.Eq{Column: column, Value: []string{}}, }, Result: "`column-name` IN (NULL)", }, { Expressions: []clause.Expression{ clause.Eq{Column: clause.Expr{SQL: "SUM(?)", Vars: []interface{}{clause.Column{Name: "id"}}}, Value: 100}, }, ExpectedVars: []interface{}{100}, Result: "SUM(`id`) = ?", }, { Expressions: []clause.Expression{ clause.Gte{Column: clause.Expr{SQL: "SUM(?)", Vars: []interface{}{clause.Column{Table: "users", Name: "id"}}}, Value: 100}, }, ExpectedVars: []interface{}{100}, Result: "SUM(`users`.`id`) >= ?", }} for idx, result := range results { for idy, expression := range result.Expressions { t.Run(fmt.Sprintf("case #%v.%v", idx, idy), func(t *testing.T) { user, _ := schema.Parse(&tests.User{}, &sync.Map{}, db.NamingStrategy) stmt := &gorm.Statement{DB: db, Table: user.Table, Schema: user, Clauses: map[string]clause.Clause{}} expression.Build(stmt) if stmt.SQL.String() != result.Result { t.Errorf("generated SQL is not equal, expects %v, but got %v", result.Result, stmt.SQL.String()) } if !reflect.DeepEqual(result.ExpectedVars, stmt.Vars) { t.Errorf("generated vars is not equal, expects %v, but got %v", result.ExpectedVars, stmt.Vars) } }) } } }
go
MIT
0d9141bad9772c6047ecfdb2819d8a52d27ceb65
2026-01-07T08:35:52.485253Z
false
go-gorm/gorm
https://github.com/go-gorm/gorm/blob/0d9141bad9772c6047ecfdb2819d8a52d27ceb65/clause/limit_test.go
clause/limit_test.go
package clause_test import ( "fmt" "testing" "gorm.io/gorm/clause" ) func TestLimit(t *testing.T) { limit0 := 0 limit10 := 10 limit50 := 50 limitNeg10 := -10 results := []struct { Clauses []clause.Interface Result string Vars []interface{} }{ { []clause.Interface{clause.Select{}, clause.From{}, clause.Limit{ Limit: &limit10, Offset: 20, }}, "SELECT * FROM `users` LIMIT ? OFFSET ?", []interface{}{limit10, 20}, }, { []clause.Interface{clause.Select{}, clause.From{}, clause.Limit{Limit: &limit0}}, "SELECT * FROM `users` LIMIT ?", []interface{}{limit0}, }, { []clause.Interface{clause.Select{}, clause.From{}, clause.Limit{Limit: &limit0}, clause.Limit{Offset: 0}}, "SELECT * FROM `users` LIMIT ?", []interface{}{limit0}, }, { []clause.Interface{clause.Select{}, clause.From{}, clause.Limit{Offset: 20}}, "SELECT * FROM `users` OFFSET ?", []interface{}{20}, }, { []clause.Interface{clause.Select{}, clause.From{}, clause.Limit{Offset: 20}, clause.Limit{Offset: 30}}, "SELECT * FROM `users` OFFSET ?", []interface{}{30}, }, { []clause.Interface{clause.Select{}, clause.From{}, clause.Limit{Offset: 20}, clause.Limit{Limit: &limit10}}, "SELECT * FROM `users` LIMIT ? OFFSET ?", []interface{}{limit10, 20}, }, { []clause.Interface{clause.Select{}, clause.From{}, clause.Limit{Limit: &limit10, Offset: 20}, clause.Limit{Offset: 30}}, "SELECT * FROM `users` LIMIT ? OFFSET ?", []interface{}{limit10, 30}, }, { []clause.Interface{clause.Select{}, clause.From{}, clause.Limit{Limit: &limit10, Offset: 20}, clause.Limit{Offset: 30}, clause.Limit{Offset: -10}}, "SELECT * FROM `users` LIMIT ?", []interface{}{limit10}, }, { []clause.Interface{clause.Select{}, clause.From{}, clause.Limit{Limit: &limit10, Offset: 20}, clause.Limit{Offset: 30}, clause.Limit{Limit: &limitNeg10}}, "SELECT * FROM `users` OFFSET ?", []interface{}{30}, }, { []clause.Interface{clause.Select{}, clause.From{}, clause.Limit{Limit: &limit10, Offset: 20}, clause.Limit{Offset: 30}, clause.Limit{Limit: &limit50}}, "SELECT * FROM `users` LIMIT ? OFFSET ?", []interface{}{limit50, 30}, }, } for idx, result := range results { t.Run(fmt.Sprintf("case #%v", idx), func(t *testing.T) { checkBuildClauses(t, result.Clauses, result.Result, result.Vars) }) } }
go
MIT
0d9141bad9772c6047ecfdb2819d8a52d27ceb65
2026-01-07T08:35:52.485253Z
false
go-gorm/gorm
https://github.com/go-gorm/gorm/blob/0d9141bad9772c6047ecfdb2819d8a52d27ceb65/clause/with.go
clause/with.go
package clause type With struct{}
go
MIT
0d9141bad9772c6047ecfdb2819d8a52d27ceb65
2026-01-07T08:35:52.485253Z
false