repo
stringlengths
6
47
file_url
stringlengths
77
269
file_path
stringlengths
5
186
content
stringlengths
0
32.8k
language
stringclasses
1 value
license
stringclasses
7 values
commit_sha
stringlengths
40
40
retrieved_at
stringdate
2026-01-07 08:35:43
2026-01-07 08:55:24
truncated
bool
2 classes
filebrowser/filebrowser
https://github.com/filebrowser/filebrowser/blob/94ec786d34aaaa924ed34719d4a972520f7fecb5/http/static.go
http/static.go
package fbhttp import ( "encoding/json" "errors" "fmt" "io/fs" "log" "net/http" "os" "path" "path/filepath" "strings" "text/template" "github.com/filebrowser/filebrowser/v2/auth" "github.com/filebrowser/filebrowser/v2/settings" "github.com/filebrowser/filebrowser/v2/storage" "github.com/filebrowser/filebrowser/v2/version" ) func handleWithStaticData(w http.ResponseWriter, _ *http.Request, d *data, fSys fs.FS, file, contentType string) (int, error) { w.Header().Set("Content-Type", contentType) auther, err := d.store.Auth.Get(d.settings.AuthMethod) if err != nil { return http.StatusInternalServerError, err } data := map[string]interface{}{ "Name": d.settings.Branding.Name, "DisableExternal": d.settings.Branding.DisableExternal, "DisableUsedPercentage": d.settings.Branding.DisableUsedPercentage, "Color": d.settings.Branding.Color, "BaseURL": d.server.BaseURL, "Version": version.Version, "StaticURL": path.Join(d.server.BaseURL, "/static"), "Signup": d.settings.Signup, "NoAuth": d.settings.AuthMethod == auth.MethodNoAuth, "AuthMethod": d.settings.AuthMethod, "LogoutPage": d.settings.LogoutPage, "LoginPage": auther.LoginPage(), "CSS": false, "ReCaptcha": false, "Theme": d.settings.Branding.Theme, "EnableThumbs": d.server.EnableThumbnails, "ResizePreview": d.server.ResizePreview, "EnableExec": d.server.EnableExec, "TusSettings": d.settings.Tus, "HideLoginButton": d.settings.HideLoginButton, } if d.settings.Branding.Files != "" { fPath := filepath.Join(d.settings.Branding.Files, "custom.css") _, err := os.Stat(fPath) if err != nil && !os.IsNotExist(err) { log.Printf("couldn't load custom styles: %v", err) } if err == nil { data["CSS"] = true } } if d.settings.AuthMethod == auth.MethodJSONAuth { raw, err := d.store.Auth.Get(d.settings.AuthMethod) if err != nil { return http.StatusInternalServerError, err } auther := raw.(*auth.JSONAuth) if auther.ReCaptcha != nil { data["ReCaptcha"] = auther.ReCaptcha.Key != "" && auther.ReCaptcha.Secret != "" data["ReCaptchaHost"] = auther.ReCaptcha.Host data["ReCaptchaKey"] = auther.ReCaptcha.Key } } b, err := json.Marshal(data) if err != nil { return http.StatusInternalServerError, err } data["Json"] = strings.ReplaceAll(string(b), `'`, `\'`) fileContents, err := fs.ReadFile(fSys, file) if err != nil { if errors.Is(err, os.ErrNotExist) { return http.StatusNotFound, err } return http.StatusInternalServerError, err } index := template.Must(template.New("index").Delims("[{[", "]}]").Parse(string(fileContents))) err = index.Execute(w, data) if err != nil { return http.StatusInternalServerError, err } return 0, nil } func getStaticHandlers(store *storage.Storage, server *settings.Server, assetsFs fs.FS) (index, static http.Handler) { index = handle(func(w http.ResponseWriter, r *http.Request, d *data) (int, error) { if r.Method != http.MethodGet { return http.StatusNotFound, nil } w.Header().Set("x-xss-protection", "1; mode=block") return handleWithStaticData(w, r, d, assetsFs, "public/index.html", "text/html; charset=utf-8") }, "", store, server) static = handle(func(w http.ResponseWriter, r *http.Request, d *data) (int, error) { if r.Method != http.MethodGet { return http.StatusNotFound, nil } if strings.HasSuffix(r.URL.Path, "/") { return http.StatusNotFound, nil } const maxAge = 86400 // 1 day w.Header().Set("Cache-Control", fmt.Sprintf("public, max-age=%v", maxAge)) if d.settings.Branding.Files != "" { if strings.HasPrefix(r.URL.Path, "img/") { fPath := filepath.Join(d.settings.Branding.Files, r.URL.Path) _, err := os.Stat(fPath) if err != nil && !os.IsNotExist(err) { log.Printf("could not load branding file override: %v", err) } else if err == nil { http.ServeFile(w, r, fPath) return 0, nil } } else if r.URL.Path == "custom.css" && d.settings.Branding.Files != "" { http.ServeFile(w, r, filepath.Join(d.settings.Branding.Files, "custom.css")) return 0, nil } } if !strings.HasSuffix(r.URL.Path, ".js") { http.FileServer(http.FS(assetsFs)).ServeHTTP(w, r) return 0, nil } fileContents, err := fs.ReadFile(assetsFs, r.URL.Path+".gz") if err != nil { return http.StatusNotFound, err } w.Header().Set("Content-Encoding", "gzip") w.Header().Set("Content-Type", "application/javascript; charset=utf-8") if _, err := w.Write(fileContents); err != nil { return http.StatusInternalServerError, err } return 0, nil }, "/static/", store, server) return index, static }
go
Apache-2.0
94ec786d34aaaa924ed34719d4a972520f7fecb5
2026-01-07T08:36:13.695467Z
false
filebrowser/filebrowser
https://github.com/filebrowser/filebrowser/blob/94ec786d34aaaa924ed34719d4a972520f7fecb5/http/data.go
http/data.go
package fbhttp import ( "log" "net/http" "strconv" "github.com/tomasen/realip" "github.com/filebrowser/filebrowser/v2/rules" "github.com/filebrowser/filebrowser/v2/runner" "github.com/filebrowser/filebrowser/v2/settings" "github.com/filebrowser/filebrowser/v2/storage" "github.com/filebrowser/filebrowser/v2/users" ) type handleFunc func(w http.ResponseWriter, r *http.Request, d *data) (int, error) type data struct { *runner.Runner settings *settings.Settings server *settings.Server store *storage.Storage user *users.User raw interface{} } // Check implements rules.Checker. func (d *data) Check(path string) bool { if d.user.HideDotfiles && rules.MatchHidden(path) { return false } allow := true for _, rule := range d.settings.Rules { if rule.Matches(path) { allow = rule.Allow } } for _, rule := range d.user.Rules { if rule.Matches(path) { allow = rule.Allow } } return allow } func handle(fn handleFunc, prefix string, store *storage.Storage, server *settings.Server) http.Handler { handler := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { for k, v := range globalHeaders { w.Header().Set(k, v) } settings, err := store.Settings.Get() if err != nil { log.Fatalf("ERROR: couldn't get settings: %v\n", err) return } status, err := fn(w, r, &data{ Runner: &runner.Runner{Enabled: server.EnableExec, Settings: settings}, store: store, settings: settings, server: server, }) if status >= 400 || err != nil { clientIP := realip.FromRequest(r) log.Printf("%s: %v %s %v", r.URL.Path, status, clientIP, err) } if status != 0 { txt := http.StatusText(status) if status == http.StatusBadRequest && err != nil { txt += " (" + err.Error() + ")" } http.Error(w, strconv.Itoa(status)+" "+txt, status) return } }) return stripPrefix(prefix, handler) }
go
Apache-2.0
94ec786d34aaaa924ed34719d4a972520f7fecb5
2026-01-07T08:36:13.695467Z
false
filebrowser/filebrowser
https://github.com/filebrowser/filebrowser/blob/94ec786d34aaaa924ed34719d4a972520f7fecb5/http/share.go
http/share.go
package fbhttp import ( "crypto/rand" "encoding/base64" "encoding/json" "errors" "fmt" "net/http" "sort" "strconv" "strings" "time" "golang.org/x/crypto/bcrypt" fberrors "github.com/filebrowser/filebrowser/v2/errors" "github.com/filebrowser/filebrowser/v2/share" ) func withPermShare(fn handleFunc) handleFunc { return withUser(func(w http.ResponseWriter, r *http.Request, d *data) (int, error) { if !d.user.Perm.Share { return http.StatusForbidden, nil } return fn(w, r, d) }) } var shareListHandler = withPermShare(func(w http.ResponseWriter, r *http.Request, d *data) (int, error) { var ( s []*share.Link err error ) if d.user.Perm.Admin { s, err = d.store.Share.All() } else { s, err = d.store.Share.FindByUserID(d.user.ID) } if errors.Is(err, fberrors.ErrNotExist) { return renderJSON(w, r, []*share.Link{}) } if err != nil { return http.StatusInternalServerError, err } sort.Slice(s, func(i, j int) bool { if s[i].UserID != s[j].UserID { return s[i].UserID < s[j].UserID } return s[i].Expire < s[j].Expire }) return renderJSON(w, r, s) }) var shareGetsHandler = withPermShare(func(w http.ResponseWriter, r *http.Request, d *data) (int, error) { s, err := d.store.Share.Gets(r.URL.Path, d.user.ID) if errors.Is(err, fberrors.ErrNotExist) { return renderJSON(w, r, []*share.Link{}) } if err != nil { return http.StatusInternalServerError, err } return renderJSON(w, r, s) }) var shareDeleteHandler = withPermShare(func(_ http.ResponseWriter, r *http.Request, d *data) (int, error) { hash := strings.TrimSuffix(r.URL.Path, "/") hash = strings.TrimPrefix(hash, "/") if hash == "" { return http.StatusBadRequest, nil } link, err := d.store.Share.GetByHash(hash) if err != nil { return errToStatus(err), err } if link.UserID != d.user.ID && !d.user.Perm.Admin { return http.StatusForbidden, nil } err = d.store.Share.Delete(hash) return errToStatus(err), err }) var sharePostHandler = withPermShare(func(w http.ResponseWriter, r *http.Request, d *data) (int, error) { var s *share.Link var body share.CreateBody if r.Body != nil { if err := json.NewDecoder(r.Body).Decode(&body); err != nil { return http.StatusBadRequest, fmt.Errorf("failed to decode body: %w", err) } defer r.Body.Close() } bytes := make([]byte, 6) _, err := rand.Read(bytes) if err != nil { return http.StatusInternalServerError, err } str := base64.URLEncoding.EncodeToString(bytes) var expire int64 = 0 if body.Expires != "" { num, err := strconv.Atoi(body.Expires) if err != nil { return http.StatusInternalServerError, err } var add time.Duration switch body.Unit { case "seconds": add = time.Second * time.Duration(num) case "minutes": add = time.Minute * time.Duration(num) case "days": add = time.Hour * 24 * time.Duration(num) default: add = time.Hour * time.Duration(num) } expire = time.Now().Add(add).Unix() } hash, status, err := getSharePasswordHash(body) if err != nil { return status, err } var token string if len(hash) > 0 { tokenBuffer := make([]byte, 96) if _, err := rand.Read(tokenBuffer); err != nil { return http.StatusInternalServerError, err } token = base64.URLEncoding.EncodeToString(tokenBuffer) } s = &share.Link{ Path: r.URL.Path, Hash: str, Expire: expire, UserID: d.user.ID, PasswordHash: string(hash), Token: token, } if err := d.store.Share.Save(s); err != nil { return http.StatusInternalServerError, err } return renderJSON(w, r, s) }) func getSharePasswordHash(body share.CreateBody) (data []byte, statuscode int, err error) { if body.Password == "" { return nil, 0, nil } hash, err := bcrypt.GenerateFromPassword([]byte(body.Password), bcrypt.DefaultCost) if err != nil { return nil, http.StatusInternalServerError, fmt.Errorf("failed to hash password: %w", err) } return hash, 0, nil }
go
Apache-2.0
94ec786d34aaaa924ed34719d4a972520f7fecb5
2026-01-07T08:36:13.695467Z
false
filebrowser/filebrowser
https://github.com/filebrowser/filebrowser/blob/94ec786d34aaaa924ed34719d4a972520f7fecb5/http/preview_enum.go
http/preview_enum.go
// Code generated by go-enum // DO NOT EDIT! package fbhttp import ( "database/sql/driver" "fmt" "strings" ) const ( // PreviewSizeThumb is a PreviewSize of type Thumb PreviewSizeThumb PreviewSize = iota // PreviewSizeBig is a PreviewSize of type Big PreviewSizeBig ) const _PreviewSizeName = "thumbbig" var _PreviewSizeNames = []string{ _PreviewSizeName[0:5], _PreviewSizeName[5:8], } // PreviewSizeNames returns a list of possible string values of PreviewSize. func PreviewSizeNames() []string { tmp := make([]string, len(_PreviewSizeNames)) copy(tmp, _PreviewSizeNames) return tmp } var _PreviewSizeMap = map[PreviewSize]string{ 0: _PreviewSizeName[0:5], 1: _PreviewSizeName[5:8], } // String implements the Stringer interface. func (x PreviewSize) String() string { if str, ok := _PreviewSizeMap[x]; ok { return str } return fmt.Sprintf("PreviewSize(%d)", x) } var _PreviewSizeValue = map[string]PreviewSize{ _PreviewSizeName[0:5]: 0, _PreviewSizeName[5:8]: 1, } // ParsePreviewSize attempts to convert a string to a PreviewSize func ParsePreviewSize(name string) (PreviewSize, error) { if x, ok := _PreviewSizeValue[name]; ok { return x, nil } return PreviewSize(0), fmt.Errorf("%s is not a valid PreviewSize, try [%s]", name, strings.Join(_PreviewSizeNames, ", ")) } // MarshalText implements the text marshaller method func (x PreviewSize) MarshalText() ([]byte, error) { return []byte(x.String()), nil } // UnmarshalText implements the text unmarshaller method func (x *PreviewSize) UnmarshalText(text []byte) error { name := string(text) tmp, err := ParsePreviewSize(name) if err != nil { return err } *x = tmp return nil } // Scan implements the Scanner interface. func (x *PreviewSize) Scan(value interface{}) error { var name string switch v := value.(type) { case string: name = v case []byte: name = string(v) case nil: *x = PreviewSize(0) return nil } tmp, err := ParsePreviewSize(name) if err != nil { return err } *x = tmp return nil } // Value implements the driver Valuer interface. func (x PreviewSize) Value() (driver.Value, error) { return x.String(), nil }
go
Apache-2.0
94ec786d34aaaa924ed34719d4a972520f7fecb5
2026-01-07T08:36:13.695467Z
false
filebrowser/filebrowser
https://github.com/filebrowser/filebrowser/blob/94ec786d34aaaa924ed34719d4a972520f7fecb5/http/commands.go
http/commands.go
package fbhttp import ( "bufio" "io" "log" "net/http" "os/exec" "slices" "strings" "time" "github.com/gorilla/websocket" "github.com/filebrowser/filebrowser/v2/runner" ) const ( WSWriteDeadline = 10 * time.Second ) var upgrader = websocket.Upgrader{ ReadBufferSize: 1024, WriteBufferSize: 1024, } var ( cmdNotAllowed = []byte("Command not allowed.") ) func wsErr(ws *websocket.Conn, r *http.Request, status int, err error) { txt := http.StatusText(status) if err != nil || status >= 400 { log.Printf("%s: %v %s %v", r.URL.Path, status, r.RemoteAddr, err) } if err := ws.WriteControl(websocket.CloseInternalServerErr, []byte(txt), time.Now().Add(WSWriteDeadline)); err != nil { log.Print(err) } } var commandsHandler = withUser(func(w http.ResponseWriter, r *http.Request, d *data) (int, error) { conn, err := upgrader.Upgrade(w, r, nil) if err != nil { return http.StatusInternalServerError, err } defer conn.Close() var raw string for { _, msg, err := conn.ReadMessage() if err != nil { wsErr(conn, r, http.StatusInternalServerError, err) return 0, nil } raw = strings.TrimSpace(string(msg)) if raw != "" { break } } // Fail fast if !d.server.EnableExec || !d.user.Perm.Execute { if err := conn.WriteMessage(websocket.TextMessage, cmdNotAllowed); err != nil { wsErr(conn, r, http.StatusInternalServerError, err) } return 0, nil } command, name, err := runner.ParseCommand(d.settings, raw) if err != nil { if err := conn.WriteMessage(websocket.TextMessage, []byte(err.Error())); err != nil { wsErr(conn, r, http.StatusInternalServerError, err) } return 0, nil } if !slices.Contains(d.user.Commands, name) { if err := conn.WriteMessage(websocket.TextMessage, cmdNotAllowed); err != nil { wsErr(conn, r, http.StatusInternalServerError, err) } return 0, nil } cmd := exec.Command(command[0], command[1:]...) cmd.Dir = d.user.FullPath(r.URL.Path) stdout, err := cmd.StdoutPipe() if err != nil { wsErr(conn, r, http.StatusInternalServerError, err) return 0, nil } stderr, err := cmd.StderrPipe() if err != nil { wsErr(conn, r, http.StatusInternalServerError, err) return 0, nil } if err := cmd.Start(); err != nil { wsErr(conn, r, http.StatusInternalServerError, err) return 0, nil } s := bufio.NewScanner(io.MultiReader(stdout, stderr)) for s.Scan() { if err := conn.WriteMessage(websocket.TextMessage, s.Bytes()); err != nil { log.Print(err) } } if err := cmd.Wait(); err != nil { wsErr(conn, r, http.StatusInternalServerError, err) } return 0, nil })
go
Apache-2.0
94ec786d34aaaa924ed34719d4a972520f7fecb5
2026-01-07T08:36:13.695467Z
false
filebrowser/filebrowser
https://github.com/filebrowser/filebrowser/blob/94ec786d34aaaa924ed34719d4a972520f7fecb5/http/preview.go
http/preview.go
//go:generate go-enum --sql --marshal --names --file $GOFILE package fbhttp import ( "bytes" "context" "errors" "fmt" "io" "net/http" "github.com/gorilla/mux" "github.com/filebrowser/filebrowser/v2/files" "github.com/filebrowser/filebrowser/v2/img" ) /* ENUM( thumb big ) */ type PreviewSize int type ImgService interface { FormatFromExtension(ext string) (img.Format, error) Resize(ctx context.Context, in io.Reader, width, height int, out io.Writer, options ...img.Option) error } type FileCache interface { Store(ctx context.Context, key string, value []byte) error Load(ctx context.Context, key string) ([]byte, bool, error) Delete(ctx context.Context, key string) error } func previewHandler(imgSvc ImgService, fileCache FileCache, enableThumbnails, resizePreview bool) handleFunc { return withUser(func(w http.ResponseWriter, r *http.Request, d *data) (int, error) { if !d.user.Perm.Download { return http.StatusAccepted, nil } vars := mux.Vars(r) previewSize, err := ParsePreviewSize(vars["size"]) if err != nil { return http.StatusBadRequest, err } file, err := files.NewFileInfo(&files.FileOptions{ Fs: d.user.Fs, Path: "/" + vars["path"], Modify: d.user.Perm.Modify, Expand: true, ReadHeader: d.server.TypeDetectionByHeader, Checker: d, }) if err != nil { return errToStatus(err), err } setContentDisposition(w, r, file) switch file.Type { case "image": return handleImagePreview(w, r, imgSvc, fileCache, file, previewSize, enableThumbnails, resizePreview) default: return http.StatusNotImplemented, fmt.Errorf("can't create preview for %s type", file.Type) } }) } func handleImagePreview( w http.ResponseWriter, r *http.Request, imgSvc ImgService, fileCache FileCache, file *files.FileInfo, previewSize PreviewSize, enableThumbnails, resizePreview bool, ) (int, error) { if (previewSize == PreviewSizeBig && !resizePreview) || (previewSize == PreviewSizeThumb && !enableThumbnails) { return rawFileHandler(w, r, file) } format, err := imgSvc.FormatFromExtension(file.Extension) // Unsupported extensions directly return the raw data if errors.Is(err, img.ErrUnsupportedFormat) || format == img.FormatGif { return rawFileHandler(w, r, file) } if err != nil { return errToStatus(err), err } cacheKey := previewCacheKey(file, previewSize) resizedImage, ok, err := fileCache.Load(r.Context(), cacheKey) if err != nil { return errToStatus(err), err } if !ok { resizedImage, err = createPreview(imgSvc, fileCache, file, previewSize) if err != nil { return errToStatus(err), err } } w.Header().Set("Cache-Control", "private") http.ServeContent(w, r, file.Name, file.ModTime, bytes.NewReader(resizedImage)) return 0, nil } func createPreview(imgSvc ImgService, fileCache FileCache, file *files.FileInfo, previewSize PreviewSize) ([]byte, error) { fd, err := file.Fs.Open(file.Path) if err != nil { return nil, err } defer fd.Close() var ( width int height int options []img.Option ) switch previewSize { case PreviewSizeBig: width = 1080 height = 1080 options = append(options, img.WithMode(img.ResizeModeFit), img.WithQuality(img.QualityMedium)) case PreviewSizeThumb: width = 256 height = 256 options = append(options, img.WithMode(img.ResizeModeFill), img.WithQuality(img.QualityLow), img.WithFormat(img.FormatJpeg)) default: return nil, img.ErrUnsupportedFormat } buf := &bytes.Buffer{} if err := imgSvc.Resize(context.Background(), fd, width, height, buf, options...); err != nil { return nil, err } go func() { cacheKey := previewCacheKey(file, previewSize) if err := fileCache.Store(context.Background(), cacheKey, buf.Bytes()); err != nil { fmt.Printf("failed to cache resized image: %v", err) } }() return buf.Bytes(), nil } func previewCacheKey(f *files.FileInfo, previewSize PreviewSize) string { return fmt.Sprintf("%x%x%x", f.RealPath(), f.ModTime.Unix(), previewSize) }
go
Apache-2.0
94ec786d34aaaa924ed34719d4a972520f7fecb5
2026-01-07T08:36:13.695467Z
false
filebrowser/filebrowser
https://github.com/filebrowser/filebrowser/blob/94ec786d34aaaa924ed34719d4a972520f7fecb5/http/utils.go
http/utils.go
package fbhttp import ( "encoding/json" "errors" "net/http" "net/url" "os" "strings" libErrors "github.com/filebrowser/filebrowser/v2/errors" imgErrors "github.com/filebrowser/filebrowser/v2/img" ) func renderJSON(w http.ResponseWriter, _ *http.Request, data interface{}) (int, error) { marsh, err := json.Marshal(data) if err != nil { return http.StatusInternalServerError, err } w.Header().Set("Content-Type", "application/json; charset=utf-8") if _, err := w.Write(marsh); err != nil { return http.StatusInternalServerError, err } return 0, nil } func errToStatus(err error) int { switch { case err == nil: return http.StatusOK case os.IsPermission(err): return http.StatusForbidden case os.IsNotExist(err), errors.Is(err, libErrors.ErrNotExist): return http.StatusNotFound case os.IsExist(err), errors.Is(err, libErrors.ErrExist): return http.StatusConflict case errors.Is(err, libErrors.ErrPermissionDenied): return http.StatusForbidden case errors.Is(err, libErrors.ErrInvalidRequestParams): return http.StatusBadRequest case errors.Is(err, libErrors.ErrRootUserDeletion): return http.StatusForbidden case errors.Is(err, imgErrors.ErrImageTooLarge): return http.StatusRequestEntityTooLarge default: return http.StatusInternalServerError } } // This is an adaptation if http.StripPrefix in which we don't // return 404 if the page doesn't have the needed prefix. func stripPrefix(prefix string, h http.Handler) http.Handler { if prefix == "" || prefix == "/" { return h } return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { p := strings.TrimPrefix(r.URL.Path, prefix) rp := strings.TrimPrefix(r.URL.RawPath, prefix) r2 := new(http.Request) *r2 = *r r2.URL = new(url.URL) *r2.URL = *r.URL r2.URL.Path = p r2.URL.RawPath = rp h.ServeHTTP(w, r2) }) }
go
Apache-2.0
94ec786d34aaaa924ed34719d4a972520f7fecb5
2026-01-07T08:36:13.695467Z
false
filebrowser/filebrowser
https://github.com/filebrowser/filebrowser/blob/94ec786d34aaaa924ed34719d4a972520f7fecb5/http/settings.go
http/settings.go
package fbhttp import ( "encoding/json" "net/http" "github.com/filebrowser/filebrowser/v2/rules" "github.com/filebrowser/filebrowser/v2/settings" ) type settingsData struct { Signup bool `json:"signup"` HideLoginButton bool `json:"hideLoginButton"` CreateUserDir bool `json:"createUserDir"` MinimumPasswordLength uint `json:"minimumPasswordLength"` UserHomeBasePath string `json:"userHomeBasePath"` Defaults settings.UserDefaults `json:"defaults"` AuthMethod settings.AuthMethod `json:"authMethod"` Rules []rules.Rule `json:"rules"` Branding settings.Branding `json:"branding"` Tus settings.Tus `json:"tus"` Shell []string `json:"shell"` Commands map[string][]string `json:"commands"` } var settingsGetHandler = withAdmin(func(w http.ResponseWriter, r *http.Request, d *data) (int, error) { data := &settingsData{ Signup: d.settings.Signup, HideLoginButton: d.settings.HideLoginButton, CreateUserDir: d.settings.CreateUserDir, MinimumPasswordLength: d.settings.MinimumPasswordLength, UserHomeBasePath: d.settings.UserHomeBasePath, Defaults: d.settings.Defaults, AuthMethod: d.settings.AuthMethod, Rules: d.settings.Rules, Branding: d.settings.Branding, Tus: d.settings.Tus, Shell: d.settings.Shell, Commands: d.settings.Commands, } return renderJSON(w, r, data) }) var settingsPutHandler = withAdmin(func(_ http.ResponseWriter, r *http.Request, d *data) (int, error) { req := &settingsData{} err := json.NewDecoder(r.Body).Decode(req) if err != nil { return http.StatusBadRequest, err } d.settings.Signup = req.Signup d.settings.CreateUserDir = req.CreateUserDir d.settings.MinimumPasswordLength = req.MinimumPasswordLength d.settings.UserHomeBasePath = req.UserHomeBasePath d.settings.Defaults = req.Defaults d.settings.Rules = req.Rules d.settings.Branding = req.Branding d.settings.Tus = req.Tus d.settings.Shell = req.Shell d.settings.Commands = req.Commands d.settings.HideLoginButton = req.HideLoginButton err = d.store.Settings.Save(d.settings) return errToStatus(err), err })
go
Apache-2.0
94ec786d34aaaa924ed34719d4a972520f7fecb5
2026-01-07T08:36:13.695467Z
false
filebrowser/filebrowser
https://github.com/filebrowser/filebrowser/blob/94ec786d34aaaa924ed34719d4a972520f7fecb5/http/search.go
http/search.go
package fbhttp import ( "context" "encoding/json" "errors" "net/http" "os" "sync" "time" "github.com/filebrowser/filebrowser/v2/search" ) const searchPingInterval = 5 var searchHandler = withUser(func(w http.ResponseWriter, r *http.Request, d *data) (int, error) { response := make(chan map[string]interface{}) ctx, cancel := context.WithCancelCause(r.Context()) var wg sync.WaitGroup wg.Add(1) go func() { defer wg.Done() // Avoid connection timeout timeout := time.NewTimer(searchPingInterval * time.Second) defer timeout.Stop() for { var err error var infoBytes []byte select { case info := <-response: if info == nil { return } infoBytes, err = json.Marshal(info) case <-timeout.C: // Send a heartbeat packet infoBytes = nil case <-ctx.Done(): return } if err != nil { cancel(err) return } _, err = w.Write(infoBytes) if err == nil { _, err = w.Write([]byte("\n")) } if err != nil { cancel(err) return } if flusher, ok := w.(http.Flusher); ok { flusher.Flush() } } }() query := r.URL.Query().Get("query") err := search.Search(ctx, d.user.Fs, r.URL.Path, query, d, func(path string, f os.FileInfo) error { select { case <-ctx.Done(): case response <- map[string]interface{}{ "dir": f.IsDir(), "path": path, }: } return context.Cause(ctx) }) close(response) wg.Wait() if err == nil { err = context.Cause(ctx) } // ignore cancellation errors from user aborts if err != nil && !errors.Is(err, context.Canceled) { return http.StatusInternalServerError, err } return 0, nil })
go
Apache-2.0
94ec786d34aaaa924ed34719d4a972520f7fecb5
2026-01-07T08:36:13.695467Z
false
filebrowser/filebrowser
https://github.com/filebrowser/filebrowser/blob/94ec786d34aaaa924ed34719d4a972520f7fecb5/http/public_test.go
http/public_test.go
package fbhttp import ( "fmt" "net/http" "net/http/httptest" "path/filepath" "testing" "github.com/asdine/storm/v3" "github.com/spf13/afero" "github.com/filebrowser/filebrowser/v2/settings" "github.com/filebrowser/filebrowser/v2/share" "github.com/filebrowser/filebrowser/v2/storage/bolt" "github.com/filebrowser/filebrowser/v2/users" ) func TestPublicShareHandlerAuthentication(t *testing.T) { t.Parallel() const passwordBcrypt = "$2y$10$TFAmdCbyd/mEZDe5fUeZJu.MaJQXRTwdqb/IQV.eTn6dWrF58gCSe" testCases := map[string]struct { share *share.Link req *http.Request expectedStatusCode int }{ "Public share, no auth required": { share: &share.Link{Hash: "h", UserID: 1}, req: newHTTPRequest(t), expectedStatusCode: 200, }, "Private share, no auth provided, 401": { share: &share.Link{Hash: "h", UserID: 1, PasswordHash: passwordBcrypt, Token: "123"}, req: newHTTPRequest(t), expectedStatusCode: 401, }, "Private share, authentication via token": { share: &share.Link{Hash: "h", UserID: 1, PasswordHash: passwordBcrypt, Token: "123"}, req: newHTTPRequest(t, func(r *http.Request) { r.URL.RawQuery = "token=123" }), expectedStatusCode: 200, }, "Private share, authentication via invalid token, 401": { share: &share.Link{Hash: "h", UserID: 1, PasswordHash: passwordBcrypt, Token: "123"}, req: newHTTPRequest(t, func(r *http.Request) { r.URL.RawQuery = "token=1234" }), expectedStatusCode: 401, }, "Private share, authentication via password": { share: &share.Link{Hash: "h", UserID: 1, PasswordHash: passwordBcrypt, Token: "123"}, req: newHTTPRequest(t, func(r *http.Request) { r.Header.Set("X-SHARE-PASSWORD", "password") }), expectedStatusCode: 200, }, "Private share, authentication via invalid password, 401": { share: &share.Link{Hash: "h", UserID: 1, PasswordHash: passwordBcrypt, Token: "123"}, req: newHTTPRequest(t, func(r *http.Request) { r.Header.Set("X-SHARE-PASSWORD", "wrong-password") }), expectedStatusCode: 401, }, } for name, tc := range testCases { for handlerName, handler := range map[string]handleFunc{"public share handler": publicShareHandler, "public dl handler": publicDlHandler} { name, tc, handlerName, handler := name, tc, handlerName, handler t.Run(fmt.Sprintf("%s: %s", handlerName, name), func(t *testing.T) { t.Parallel() dbPath := filepath.Join(t.TempDir(), "db") db, err := storm.Open(dbPath) if err != nil { t.Fatalf("failed to open db: %v", err) } t.Cleanup(func() { if err := db.Close(); err != nil { t.Errorf("failed to close db: %v", err) } }) storage, err := bolt.NewStorage(db) if err != nil { t.Fatalf("failed to get storage: %v", err) } if err := storage.Share.Save(tc.share); err != nil { t.Fatalf("failed to save share: %v", err) } if err := storage.Users.Save(&users.User{Username: "username", Password: "pw"}); err != nil { t.Fatalf("failed to save user: %v", err) } if err := storage.Settings.Save(&settings.Settings{Key: []byte("key")}); err != nil { t.Fatalf("failed to save settings: %v", err) } storage.Users = &customFSUser{ Store: storage.Users, fs: &afero.MemMapFs{}, } recorder := httptest.NewRecorder() handler := handle(handler, "", storage, &settings.Server{}) handler.ServeHTTP(recorder, tc.req) result := recorder.Result() defer result.Body.Close() if result.StatusCode != tc.expectedStatusCode { t.Errorf("expected status code %d, got status code %d", tc.expectedStatusCode, result.StatusCode) } }) } } } func newHTTPRequest(t *testing.T, requestModifiers ...func(*http.Request)) *http.Request { t.Helper() r, err := http.NewRequest(http.MethodGet, "h", http.NoBody) if err != nil { t.Fatalf("failed to construct request: %v", err) } for _, modify := range requestModifiers { modify(r) } return r } type customFSUser struct { users.Store fs afero.Fs } func (cu *customFSUser) Get(baseScope string, id interface{}) (*users.User, error) { user, err := cu.Store.Get(baseScope, id) if err != nil { return nil, err } user.Fs = cu.fs return user, nil }
go
Apache-2.0
94ec786d34aaaa924ed34719d4a972520f7fecb5
2026-01-07T08:36:13.695467Z
false
filebrowser/filebrowser
https://github.com/filebrowser/filebrowser/blob/94ec786d34aaaa924ed34719d4a972520f7fecb5/http/http.go
http/http.go
package fbhttp import ( "io/fs" "net/http" "github.com/gorilla/mux" "github.com/filebrowser/filebrowser/v2/settings" "github.com/filebrowser/filebrowser/v2/storage" ) type modifyRequest struct { What string `json:"what"` // Answer to: what data type? Which []string `json:"which"` // Answer to: which fields? CurrentPassword string `json:"current_password"` // Answer to: user logged password } func NewHandler( imgSvc ImgService, fileCache FileCache, store *storage.Storage, server *settings.Server, assetsFs fs.FS, ) (http.Handler, error) { server.Clean() r := mux.NewRouter() r.Use(func(next http.Handler) http.Handler { return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { w.Header().Set("Content-Security-Policy", `default-src 'self'; style-src 'unsafe-inline';`) next.ServeHTTP(w, r) }) }) index, static := getStaticHandlers(store, server, assetsFs) // NOTE: This fixes the issue where it would redirect if people did not put a // trailing slash in the end. I hate this decision since this allows some awful // URLs https://www.gorillatoolkit.org/pkg/mux#Router.SkipClean r = r.SkipClean(true) monkey := func(fn handleFunc, prefix string) http.Handler { return handle(fn, prefix, store, server) } r.HandleFunc("/health", healthHandler) r.PathPrefix("/static").Handler(static) r.NotFoundHandler = index api := r.PathPrefix("/api").Subrouter() tokenExpirationTime := server.GetTokenExpirationTime(DefaultTokenExpirationTime) api.Handle("/login", monkey(loginHandler(tokenExpirationTime), "")) api.Handle("/signup", monkey(signupHandler, "")) api.Handle("/renew", monkey(renewHandler(tokenExpirationTime), "")) users := api.PathPrefix("/users").Subrouter() users.Handle("", monkey(usersGetHandler, "")).Methods("GET") users.Handle("", monkey(userPostHandler, "")).Methods("POST") users.Handle("/{id:[0-9]+}", monkey(userPutHandler, "")).Methods("PUT") users.Handle("/{id:[0-9]+}", monkey(userGetHandler, "")).Methods("GET") users.Handle("/{id:[0-9]+}", monkey(userDeleteHandler, "")).Methods("DELETE") api.PathPrefix("/resources").Handler(monkey(resourceGetHandler, "/api/resources")).Methods("GET") api.PathPrefix("/resources").Handler(monkey(resourceDeleteHandler(fileCache), "/api/resources")).Methods("DELETE") api.PathPrefix("/resources").Handler(monkey(resourcePostHandler(fileCache), "/api/resources")).Methods("POST") api.PathPrefix("/resources").Handler(monkey(resourcePutHandler, "/api/resources")).Methods("PUT") api.PathPrefix("/resources").Handler(monkey(resourcePatchHandler(fileCache), "/api/resources")).Methods("PATCH") api.PathPrefix("/tus").Handler(monkey(tusPostHandler(), "/api/tus")).Methods("POST") api.PathPrefix("/tus").Handler(monkey(tusHeadHandler(), "/api/tus")).Methods("HEAD", "GET") api.PathPrefix("/tus").Handler(monkey(tusPatchHandler(), "/api/tus")).Methods("PATCH") api.PathPrefix("/tus").Handler(monkey(tusDeleteHandler(), "/api/tus")).Methods("DELETE") api.PathPrefix("/usage").Handler(monkey(diskUsage, "/api/usage")).Methods("GET") api.Path("/shares").Handler(monkey(shareListHandler, "/api/shares")).Methods("GET") api.PathPrefix("/share").Handler(monkey(shareGetsHandler, "/api/share")).Methods("GET") api.PathPrefix("/share").Handler(monkey(sharePostHandler, "/api/share")).Methods("POST") api.PathPrefix("/share").Handler(monkey(shareDeleteHandler, "/api/share")).Methods("DELETE") api.Handle("/settings", monkey(settingsGetHandler, "")).Methods("GET") api.Handle("/settings", monkey(settingsPutHandler, "")).Methods("PUT") api.PathPrefix("/raw").Handler(monkey(rawHandler, "/api/raw")).Methods("GET") api.PathPrefix("/preview/{size}/{path:.*}"). Handler(monkey(previewHandler(imgSvc, fileCache, server.EnableThumbnails, server.ResizePreview), "/api/preview")).Methods("GET") api.PathPrefix("/command").Handler(monkey(commandsHandler, "/api/command")).Methods("GET") api.PathPrefix("/search").Handler(monkey(searchHandler, "/api/search")).Methods("GET") api.PathPrefix("/subtitle").Handler(monkey(subtitleHandler, "/api/subtitle")).Methods("GET") public := api.PathPrefix("/public").Subrouter() public.PathPrefix("/dl").Handler(monkey(publicDlHandler, "/api/public/dl/")).Methods("GET") public.PathPrefix("/share").Handler(monkey(publicShareHandler, "/api/public/share/")).Methods("GET") return stripPrefix(server.BaseURL, r), nil }
go
Apache-2.0
94ec786d34aaaa924ed34719d4a972520f7fecb5
2026-01-07T08:36:13.695467Z
false
filebrowser/filebrowser
https://github.com/filebrowser/filebrowser/blob/94ec786d34aaaa924ed34719d4a972520f7fecb5/http/resource.go
http/resource.go
package fbhttp import ( "context" "errors" "fmt" "io" "io/fs" "log" "net/http" "net/url" "os" "path" "path/filepath" "strings" "github.com/shirou/gopsutil/v4/disk" "github.com/spf13/afero" fberrors "github.com/filebrowser/filebrowser/v2/errors" "github.com/filebrowser/filebrowser/v2/files" "github.com/filebrowser/filebrowser/v2/fileutils" ) var resourceGetHandler = withUser(func(w http.ResponseWriter, r *http.Request, d *data) (int, error) { file, err := files.NewFileInfo(&files.FileOptions{ Fs: d.user.Fs, Path: r.URL.Path, Modify: d.user.Perm.Modify, Expand: true, ReadHeader: d.server.TypeDetectionByHeader, Checker: d, Content: true, }) if err != nil { return errToStatus(err), err } if file.IsDir { file.Sorting = d.user.Sorting file.ApplySort() return renderJSON(w, r, file) } if checksum := r.URL.Query().Get("checksum"); checksum != "" { err := file.Checksum(checksum) if errors.Is(err, fberrors.ErrInvalidOption) { return http.StatusBadRequest, nil } else if err != nil { return http.StatusInternalServerError, err } // do not waste bandwidth if we just want the checksum file.Content = "" } return renderJSON(w, r, file) }) func resourceDeleteHandler(fileCache FileCache) handleFunc { return withUser(func(_ http.ResponseWriter, r *http.Request, d *data) (int, error) { if r.URL.Path == "/" || !d.user.Perm.Delete { return http.StatusForbidden, nil } file, err := files.NewFileInfo(&files.FileOptions{ Fs: d.user.Fs, Path: r.URL.Path, Modify: d.user.Perm.Modify, Expand: false, ReadHeader: d.server.TypeDetectionByHeader, Checker: d, }) if err != nil { return errToStatus(err), err } err = d.store.Share.DeleteWithPathPrefix(file.Path) if err != nil { log.Printf("WARNING: Error(s) occurred while deleting associated shares with file: %s", err) } // delete thumbnails err = delThumbs(r.Context(), fileCache, file) if err != nil { return errToStatus(err), err } err = d.RunHook(func() error { return d.user.Fs.RemoveAll(r.URL.Path) }, "delete", r.URL.Path, "", d.user) if err != nil { return errToStatus(err), err } return http.StatusNoContent, nil }) } func resourcePostHandler(fileCache FileCache) handleFunc { return withUser(func(w http.ResponseWriter, r *http.Request, d *data) (int, error) { if !d.user.Perm.Create || !d.Check(r.URL.Path) { return http.StatusForbidden, nil } // Directories creation on POST. if strings.HasSuffix(r.URL.Path, "/") { err := d.user.Fs.MkdirAll(r.URL.Path, d.settings.DirMode) return errToStatus(err), err } file, err := files.NewFileInfo(&files.FileOptions{ Fs: d.user.Fs, Path: r.URL.Path, Modify: d.user.Perm.Modify, Expand: false, ReadHeader: d.server.TypeDetectionByHeader, Checker: d, }) if err == nil { if r.URL.Query().Get("override") != "true" { return http.StatusConflict, nil } // Permission for overwriting the file if !d.user.Perm.Modify { return http.StatusForbidden, nil } err = delThumbs(r.Context(), fileCache, file) if err != nil { return errToStatus(err), err } } err = d.RunHook(func() error { info, writeErr := writeFile(d.user.Fs, r.URL.Path, r.Body, d.settings.FileMode, d.settings.DirMode) if writeErr != nil { return writeErr } etag := fmt.Sprintf(`"%x%x"`, info.ModTime().UnixNano(), info.Size()) w.Header().Set("ETag", etag) return nil }, "upload", r.URL.Path, "", d.user) if err != nil { _ = d.user.Fs.RemoveAll(r.URL.Path) } return errToStatus(err), err }) } var resourcePutHandler = withUser(func(w http.ResponseWriter, r *http.Request, d *data) (int, error) { if !d.user.Perm.Modify || !d.Check(r.URL.Path) { return http.StatusForbidden, nil } // Only allow PUT for files. if strings.HasSuffix(r.URL.Path, "/") { return http.StatusMethodNotAllowed, nil } exists, err := afero.Exists(d.user.Fs, r.URL.Path) if err != nil { return http.StatusInternalServerError, err } if !exists { return http.StatusNotFound, nil } err = d.RunHook(func() error { info, writeErr := writeFile(d.user.Fs, r.URL.Path, r.Body, d.settings.FileMode, d.settings.DirMode) if writeErr != nil { return writeErr } etag := fmt.Sprintf(`"%x%x"`, info.ModTime().UnixNano(), info.Size()) w.Header().Set("ETag", etag) return nil }, "save", r.URL.Path, "", d.user) return errToStatus(err), err }) func resourcePatchHandler(fileCache FileCache) handleFunc { return withUser(func(_ http.ResponseWriter, r *http.Request, d *data) (int, error) { src := r.URL.Path dst := r.URL.Query().Get("destination") action := r.URL.Query().Get("action") dst, err := url.QueryUnescape(dst) if !d.Check(src) || !d.Check(dst) { return http.StatusForbidden, nil } if err != nil { return errToStatus(err), err } if dst == "/" || src == "/" { return http.StatusForbidden, nil } err = checkParent(src, dst) if err != nil { return http.StatusBadRequest, err } override := r.URL.Query().Get("override") == "true" rename := r.URL.Query().Get("rename") == "true" if !override && !rename { if _, err = d.user.Fs.Stat(dst); err == nil { return http.StatusConflict, nil } } if rename { dst = addVersionSuffix(dst, d.user.Fs) } // Permission for overwriting the file if override && !d.user.Perm.Modify { return http.StatusForbidden, nil } err = d.RunHook(func() error { return patchAction(r.Context(), action, src, dst, d, fileCache) }, action, src, dst, d.user) return errToStatus(err), err }) } func checkParent(src, dst string) error { rel, err := filepath.Rel(src, dst) if err != nil { return err } rel = filepath.ToSlash(rel) if !strings.HasPrefix(rel, "../") && rel != ".." && rel != "." { return fberrors.ErrSourceIsParent } return nil } func addVersionSuffix(source string, afs afero.Fs) string { counter := 1 dir, name := path.Split(source) ext := filepath.Ext(name) base := strings.TrimSuffix(name, ext) for { if _, err := afs.Stat(source); err != nil { break } renamed := fmt.Sprintf("%s(%d)%s", base, counter, ext) source = path.Join(dir, renamed) counter++ } return source } func writeFile(afs afero.Fs, dst string, in io.Reader, fileMode, dirMode fs.FileMode) (os.FileInfo, error) { dir, _ := path.Split(dst) err := afs.MkdirAll(dir, dirMode) if err != nil { return nil, err } file, err := afs.OpenFile(dst, os.O_RDWR|os.O_CREATE|os.O_TRUNC, fileMode) if err != nil { return nil, err } defer file.Close() _, err = io.Copy(file, in) if err != nil { return nil, err } // Gets the info about the file. info, err := file.Stat() if err != nil { return nil, err } return info, nil } func delThumbs(ctx context.Context, fileCache FileCache, file *files.FileInfo) error { for _, previewSizeName := range PreviewSizeNames() { size, _ := ParsePreviewSize(previewSizeName) if err := fileCache.Delete(ctx, previewCacheKey(file, size)); err != nil { return err } } return nil } func patchAction(ctx context.Context, action, src, dst string, d *data, fileCache FileCache) error { switch action { case "copy": if !d.user.Perm.Create { return fberrors.ErrPermissionDenied } return fileutils.Copy(d.user.Fs, src, dst, d.settings.FileMode, d.settings.DirMode) case "rename": if !d.user.Perm.Rename { return fberrors.ErrPermissionDenied } src = path.Clean("/" + src) dst = path.Clean("/" + dst) file, err := files.NewFileInfo(&files.FileOptions{ Fs: d.user.Fs, Path: src, Modify: d.user.Perm.Modify, Expand: false, ReadHeader: false, Checker: d, }) if err != nil { return err } // delete thumbnails err = delThumbs(ctx, fileCache, file) if err != nil { return err } return fileutils.MoveFile(d.user.Fs, src, dst, d.settings.FileMode, d.settings.DirMode) default: return fmt.Errorf("unsupported action %s: %w", action, fberrors.ErrInvalidRequestParams) } } type DiskUsageResponse struct { Total uint64 `json:"total"` Used uint64 `json:"used"` } var diskUsage = withUser(func(w http.ResponseWriter, r *http.Request, d *data) (int, error) { file, err := files.NewFileInfo(&files.FileOptions{ Fs: d.user.Fs, Path: r.URL.Path, Modify: d.user.Perm.Modify, Expand: false, ReadHeader: false, Checker: d, Content: false, }) if err != nil { return errToStatus(err), err } fPath := file.RealPath() if !file.IsDir { return renderJSON(w, r, &DiskUsageResponse{ Total: 0, Used: 0, }) } usage, err := disk.UsageWithContext(r.Context(), fPath) if err != nil { return errToStatus(err), err } return renderJSON(w, r, &DiskUsageResponse{ Total: usage.Total, Used: usage.Used, }) })
go
Apache-2.0
94ec786d34aaaa924ed34719d4a972520f7fecb5
2026-01-07T08:36:13.695467Z
false
filebrowser/filebrowser
https://github.com/filebrowser/filebrowser/blob/94ec786d34aaaa924ed34719d4a972520f7fecb5/http/auth.go
http/auth.go
package fbhttp import ( "encoding/json" "errors" "log" "net/http" "os" "strings" "time" "github.com/golang-jwt/jwt/v5" "github.com/golang-jwt/jwt/v5/request" fbAuth "github.com/filebrowser/filebrowser/v2/auth" fberrors "github.com/filebrowser/filebrowser/v2/errors" "github.com/filebrowser/filebrowser/v2/settings" "github.com/filebrowser/filebrowser/v2/users" ) const ( DefaultTokenExpirationTime = time.Hour * 2 ) type userInfo struct { ID uint `json:"id"` Locale string `json:"locale"` ViewMode users.ViewMode `json:"viewMode"` SingleClick bool `json:"singleClick"` Perm users.Permissions `json:"perm"` Commands []string `json:"commands"` LockPassword bool `json:"lockPassword"` HideDotfiles bool `json:"hideDotfiles"` DateFormat bool `json:"dateFormat"` Username string `json:"username"` AceEditorTheme string `json:"aceEditorTheme"` } type authToken struct { User userInfo `json:"user"` jwt.RegisteredClaims } type extractor []string func (e extractor) ExtractToken(r *http.Request) (string, error) { token, _ := request.HeaderExtractor{"X-Auth"}.ExtractToken(r) // Checks if the token isn't empty and if it contains two dots. // The former prevents incompatibility with URLs that previously // used basic auth. if token != "" && strings.Count(token, ".") == 2 { return token, nil } if r.Method == http.MethodGet { cookie, _ := r.Cookie("auth") if cookie != nil && strings.Count(cookie.Value, ".") == 2 { return cookie.Value, nil } } return "", request.ErrNoTokenInRequest } func renewableErr(err error, d *data) bool { if d.settings.AuthMethod != fbAuth.MethodProxyAuth || err == nil { return false } if d.settings.LogoutPage == settings.DefaultLogoutPage { return false } if !errors.Is(err, jwt.ErrTokenExpired) { return false } return true } func withUser(fn handleFunc) handleFunc { return func(w http.ResponseWriter, r *http.Request, d *data) (int, error) { keyFunc := func(_ *jwt.Token) (interface{}, error) { return d.settings.Key, nil } var tk authToken p := jwt.NewParser(jwt.WithValidMethods([]string{jwt.SigningMethodHS256.Alg()}), jwt.WithExpirationRequired()) token, err := request.ParseFromRequest(r, &extractor{}, keyFunc, request.WithClaims(&tk), request.WithParser(p)) if (err != nil || !token.Valid) && !renewableErr(err, d) { return http.StatusUnauthorized, nil } expiresSoon := tk.ExpiresAt != nil && time.Until(tk.ExpiresAt.Time) < time.Hour updated := tk.IssuedAt != nil && tk.IssuedAt.Unix() < d.store.Users.LastUpdate(tk.User.ID) if expiresSoon || updated { w.Header().Add("X-Renew-Token", "true") } d.user, err = d.store.Users.Get(d.server.Root, tk.User.ID) if err != nil { return http.StatusInternalServerError, err } return fn(w, r, d) } } func withAdmin(fn handleFunc) handleFunc { return withUser(func(w http.ResponseWriter, r *http.Request, d *data) (int, error) { if !d.user.Perm.Admin { return http.StatusForbidden, nil } return fn(w, r, d) }) } func loginHandler(tokenExpireTime time.Duration) handleFunc { return func(w http.ResponseWriter, r *http.Request, d *data) (int, error) { auther, err := d.store.Auth.Get(d.settings.AuthMethod) if err != nil { return http.StatusInternalServerError, err } user, err := auther.Auth(r, d.store.Users, d.settings, d.server) switch { case errors.Is(err, os.ErrPermission): return http.StatusForbidden, nil case err != nil: return http.StatusInternalServerError, err } return printToken(w, r, d, user, tokenExpireTime) } } type signupBody struct { Username string `json:"username"` Password string `json:"password"` } var signupHandler = func(_ http.ResponseWriter, r *http.Request, d *data) (int, error) { if !d.settings.Signup { return http.StatusMethodNotAllowed, nil } if r.Body == nil { return http.StatusBadRequest, nil } info := &signupBody{} err := json.NewDecoder(r.Body).Decode(info) if err != nil { return http.StatusBadRequest, err } if info.Password == "" || info.Username == "" { return http.StatusBadRequest, nil } user := &users.User{ Username: info.Username, } d.settings.Defaults.Apply(user) pwd, err := users.ValidateAndHashPwd(info.Password, d.settings.MinimumPasswordLength) if err != nil { return http.StatusBadRequest, err } user.Password = pwd if d.settings.CreateUserDir { user.Scope = "" } userHome, err := d.settings.MakeUserDir(user.Username, user.Scope, d.server.Root) if err != nil { log.Printf("create user: failed to mkdir user home dir: [%s]", userHome) return http.StatusInternalServerError, err } user.Scope = userHome log.Printf("new user: %s, home dir: [%s].", user.Username, userHome) err = d.store.Users.Save(user) if errors.Is(err, fberrors.ErrExist) { return http.StatusConflict, err } else if err != nil { return http.StatusInternalServerError, err } return http.StatusOK, nil } func renewHandler(tokenExpireTime time.Duration) handleFunc { return withUser(func(w http.ResponseWriter, r *http.Request, d *data) (int, error) { w.Header().Set("X-Renew-Token", "false") return printToken(w, r, d, d.user, tokenExpireTime) }) } func printToken(w http.ResponseWriter, _ *http.Request, d *data, user *users.User, tokenExpirationTime time.Duration) (int, error) { claims := &authToken{ User: userInfo{ ID: user.ID, Locale: user.Locale, ViewMode: user.ViewMode, SingleClick: user.SingleClick, Perm: user.Perm, LockPassword: user.LockPassword, Commands: user.Commands, HideDotfiles: user.HideDotfiles, DateFormat: user.DateFormat, Username: user.Username, AceEditorTheme: user.AceEditorTheme, }, RegisteredClaims: jwt.RegisteredClaims{ IssuedAt: jwt.NewNumericDate(time.Now()), ExpiresAt: jwt.NewNumericDate(time.Now().Add(tokenExpirationTime)), Issuer: "File Browser", }, } token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims) signed, err := token.SignedString(d.settings.Key) if err != nil { return http.StatusInternalServerError, err } w.Header().Set("Content-Type", "text/plain") if _, err := w.Write([]byte(signed)); err != nil { return http.StatusInternalServerError, err } return 0, nil }
go
Apache-2.0
94ec786d34aaaa924ed34719d4a972520f7fecb5
2026-01-07T08:36:13.695467Z
false
filebrowser/filebrowser
https://github.com/filebrowser/filebrowser/blob/94ec786d34aaaa924ed34719d4a972520f7fecb5/http/public.go
http/public.go
package fbhttp import ( "errors" "net/http" "net/url" "path" "path/filepath" "strings" "github.com/spf13/afero" "golang.org/x/crypto/bcrypt" "github.com/filebrowser/filebrowser/v2/files" "github.com/filebrowser/filebrowser/v2/share" ) var withHashFile = func(fn handleFunc) handleFunc { return func(w http.ResponseWriter, r *http.Request, d *data) (int, error) { id, ifPath := ifPathWithName(r) link, err := d.store.Share.GetByHash(id) if err != nil { return errToStatus(err), err } status, err := authenticateShareRequest(r, link) if status != 0 || err != nil { return status, err } user, err := d.store.Users.Get(d.server.Root, link.UserID) if err != nil { return errToStatus(err), err } d.user = user file, err := files.NewFileInfo(&files.FileOptions{ Fs: d.user.Fs, Path: link.Path, Modify: d.user.Perm.Modify, Expand: false, ReadHeader: d.server.TypeDetectionByHeader, CalcImgRes: d.server.TypeDetectionByHeader, Checker: d, Token: link.Token, }) if err != nil { return errToStatus(err), err } // share base path basePath := link.Path // file relative path filePath := "" if file.IsDir { basePath = filepath.Dir(basePath) filePath = ifPath } // set fs root to the shared file/folder d.user.Fs = afero.NewBasePathFs(d.user.Fs, basePath) file, err = files.NewFileInfo(&files.FileOptions{ Fs: d.user.Fs, Path: filePath, Modify: d.user.Perm.Modify, Expand: true, Checker: d, Token: link.Token, }) if err != nil { return errToStatus(err), err } if file.IsDir { // extract name from the last directory in the path name := filepath.Base(strings.TrimRight(link.Path, string(filepath.Separator))) file.Name = name } d.raw = file return fn(w, r, d) } } // ref to https://github.com/filebrowser/filebrowser/pull/727 // `/api/public/dl/MEEuZK-v/file-name.txt` for old browsers to save file with correct name func ifPathWithName(r *http.Request) (id, filePath string) { pathElements := strings.Split(r.URL.Path, "/") // prevent maliciously constructed parameters like `/api/public/dl/XZzCDnK2_not_exists_hash_name` // len(pathElements) will be 1, and golang will panic `runtime error: index out of range` switch len(pathElements) { case 1: return r.URL.Path, "/" default: return pathElements[0], path.Join("/", path.Join(pathElements[1:]...)) } } var publicShareHandler = withHashFile(func(w http.ResponseWriter, r *http.Request, d *data) (int, error) { file := d.raw.(*files.FileInfo) if file.IsDir { file.Sorting = files.Sorting{By: "name", Asc: false} file.ApplySort() return renderJSON(w, r, file) } return renderJSON(w, r, file) }) var publicDlHandler = withHashFile(func(w http.ResponseWriter, r *http.Request, d *data) (int, error) { file := d.raw.(*files.FileInfo) if !file.IsDir { return rawFileHandler(w, r, file) } return rawDirHandler(w, r, d, file) }) func authenticateShareRequest(r *http.Request, l *share.Link) (int, error) { if l.PasswordHash == "" { return 0, nil } if r.URL.Query().Get("token") == l.Token { return 0, nil } password := r.Header.Get("X-SHARE-PASSWORD") password, err := url.QueryUnescape(password) if err != nil { return 0, err } if password == "" { return http.StatusUnauthorized, nil } if err := bcrypt.CompareHashAndPassword([]byte(l.PasswordHash), []byte(password)); err != nil { if errors.Is(err, bcrypt.ErrMismatchedHashAndPassword) { return http.StatusUnauthorized, nil } return 0, err } return 0, nil } func healthHandler(w http.ResponseWriter, _ *http.Request) { w.WriteHeader(http.StatusOK) _, _ = w.Write([]byte(`{"status":"OK"}`)) }
go
Apache-2.0
94ec786d34aaaa924ed34719d4a972520f7fecb5
2026-01-07T08:36:13.695467Z
false
filebrowser/filebrowser
https://github.com/filebrowser/filebrowser/blob/94ec786d34aaaa924ed34719d4a972520f7fecb5/http/tus_handlers.go
http/tus_handlers.go
package fbhttp import ( "context" "errors" "fmt" "io" "net/http" "net/url" "os" "path/filepath" "strconv" "time" "github.com/jellydator/ttlcache/v3" "github.com/spf13/afero" "github.com/filebrowser/filebrowser/v2/files" ) const maxUploadWait = 3 * time.Minute // Tracks active uploads along with their respective upload lengths var activeUploads = initActiveUploads() func initActiveUploads() *ttlcache.Cache[string, int64] { cache := ttlcache.New[string, int64]() cache.OnEviction(func(_ context.Context, reason ttlcache.EvictionReason, item *ttlcache.Item[string, int64]) { if reason == ttlcache.EvictionReasonExpired { fmt.Printf("deleting incomplete upload file: \"%s\"", item.Key()) os.Remove(item.Key()) } }) go cache.Start() return cache } func registerUpload(filePath string, fileSize int64) { activeUploads.Set(filePath, fileSize, maxUploadWait) } func completeUpload(filePath string) { activeUploads.Delete(filePath) } func getActiveUploadLength(filePath string) (int64, error) { item := activeUploads.Get(filePath) if item == nil { return 0, fmt.Errorf("no active upload found for the given path") } return item.Value(), nil } func keepUploadActive(filePath string) func() { stop := make(chan bool) go func() { ticker := time.NewTicker(2 * time.Second) defer ticker.Stop() for { select { case <-stop: return case <-ticker.C: activeUploads.Touch(filePath) } } }() return func() { close(stop) } } func tusPostHandler() handleFunc { return withUser(func(w http.ResponseWriter, r *http.Request, d *data) (int, error) { if !d.user.Perm.Create || !d.Check(r.URL.Path) { return http.StatusForbidden, nil } file, err := files.NewFileInfo(&files.FileOptions{ Fs: d.user.Fs, Path: r.URL.Path, Modify: d.user.Perm.Modify, Expand: false, ReadHeader: d.server.TypeDetectionByHeader, Checker: d, }) switch { case errors.Is(err, afero.ErrFileNotFound): dirPath := filepath.Dir(r.URL.Path) if _, statErr := d.user.Fs.Stat(dirPath); os.IsNotExist(statErr) { if mkdirErr := d.user.Fs.MkdirAll(dirPath, d.settings.DirMode); mkdirErr != nil { return http.StatusInternalServerError, err } } case err != nil: return errToStatus(err), err } fileFlags := os.O_CREATE | os.O_WRONLY // if file exists if file != nil { if file.IsDir { return http.StatusBadRequest, fmt.Errorf("cannot upload to a directory %s", file.RealPath()) } // Existing files will remain untouched unless explicitly instructed to override if r.URL.Query().Get("override") != "true" { return http.StatusConflict, nil } // Permission for overwriting the file if !d.user.Perm.Modify { return http.StatusForbidden, nil } fileFlags |= os.O_TRUNC } openFile, err := d.user.Fs.OpenFile(r.URL.Path, fileFlags, d.settings.FileMode) if err != nil { return errToStatus(err), err } defer openFile.Close() file, err = files.NewFileInfo(&files.FileOptions{ Fs: d.user.Fs, Path: r.URL.Path, Modify: d.user.Perm.Modify, Expand: false, ReadHeader: false, Checker: d, Content: false, }) if err != nil { return errToStatus(err), err } uploadLength, err := getUploadLength(r) if err != nil { return http.StatusBadRequest, fmt.Errorf("invalid upload length: %w", err) } // Enables the user to utilize the PATCH endpoint for uploading file data registerUpload(file.RealPath(), uploadLength) path, err := url.JoinPath("/", d.server.BaseURL, "/api/tus", r.URL.Path) if err != nil { return http.StatusBadRequest, fmt.Errorf("invalid path: %w", err) } w.Header().Set("Location", path) return http.StatusCreated, nil }) } func tusHeadHandler() handleFunc { return withUser(func(w http.ResponseWriter, r *http.Request, d *data) (int, error) { w.Header().Set("Cache-Control", "no-store") if !d.user.Perm.Create || !d.Check(r.URL.Path) { return http.StatusForbidden, nil } file, err := files.NewFileInfo(&files.FileOptions{ Fs: d.user.Fs, Path: r.URL.Path, Modify: d.user.Perm.Modify, Expand: false, ReadHeader: d.server.TypeDetectionByHeader, Checker: d, }) if err != nil { return errToStatus(err), err } uploadLength, err := getActiveUploadLength(file.RealPath()) if err != nil { return http.StatusNotFound, err } w.Header().Set("Upload-Offset", strconv.FormatInt(file.Size, 10)) w.Header().Set("Upload-Length", strconv.FormatInt(uploadLength, 10)) return http.StatusOK, nil }) } func tusPatchHandler() handleFunc { return withUser(func(w http.ResponseWriter, r *http.Request, d *data) (int, error) { if !d.user.Perm.Create || !d.Check(r.URL.Path) { return http.StatusForbidden, nil } if r.Header.Get("Content-Type") != "application/offset+octet-stream" { return http.StatusUnsupportedMediaType, nil } uploadOffset, err := getUploadOffset(r) if err != nil { return http.StatusBadRequest, fmt.Errorf("invalid upload offset") } file, err := files.NewFileInfo(&files.FileOptions{ Fs: d.user.Fs, Path: r.URL.Path, Modify: d.user.Perm.Modify, Expand: false, ReadHeader: d.server.TypeDetectionByHeader, Checker: d, }) switch { case errors.Is(err, afero.ErrFileNotFound): return http.StatusNotFound, nil case err != nil: return errToStatus(err), err } uploadLength, err := getActiveUploadLength(file.RealPath()) if err != nil { return http.StatusNotFound, err } // Prevent the upload from being evicted during the transfer stop := keepUploadActive(file.RealPath()) defer stop() switch { case file.IsDir: return http.StatusBadRequest, fmt.Errorf("cannot upload to a directory %s", file.RealPath()) case file.Size != uploadOffset: return http.StatusConflict, fmt.Errorf( "%s file size doesn't match the provided offset: %d", file.RealPath(), uploadOffset, ) } openFile, err := d.user.Fs.OpenFile(r.URL.Path, os.O_WRONLY|os.O_APPEND, d.settings.FileMode) if err != nil { return http.StatusInternalServerError, fmt.Errorf("could not open file: %w", err) } defer openFile.Close() _, err = openFile.Seek(uploadOffset, 0) if err != nil { return http.StatusInternalServerError, fmt.Errorf("could not seek file: %w", err) } defer r.Body.Close() bytesWritten, err := io.Copy(openFile, r.Body) if err != nil { return http.StatusInternalServerError, fmt.Errorf("could not write to file: %w", err) } newOffset := uploadOffset + bytesWritten w.Header().Set("Upload-Offset", strconv.FormatInt(newOffset, 10)) if newOffset >= uploadLength { completeUpload(file.RealPath()) _ = d.RunHook(func() error { return nil }, "upload", r.URL.Path, "", d.user) } return http.StatusNoContent, nil }) } func tusDeleteHandler() handleFunc { return withUser(func(_ http.ResponseWriter, r *http.Request, d *data) (int, error) { if r.URL.Path == "/" || !d.user.Perm.Create { return http.StatusForbidden, nil } file, err := files.NewFileInfo(&files.FileOptions{ Fs: d.user.Fs, Path: r.URL.Path, Modify: d.user.Perm.Modify, Expand: false, ReadHeader: d.server.TypeDetectionByHeader, Checker: d, }) if err != nil { return errToStatus(err), err } _, err = getActiveUploadLength(file.RealPath()) if err != nil { return http.StatusNotFound, err } err = d.user.Fs.RemoveAll(r.URL.Path) if err != nil { return errToStatus(err), err } completeUpload(file.RealPath()) return http.StatusNoContent, nil }) } func getUploadLength(r *http.Request) (int64, error) { uploadOffset, err := strconv.ParseInt(r.Header.Get("Upload-Length"), 10, 64) if err != nil { return 0, fmt.Errorf("invalid upload length: %w", err) } return uploadOffset, nil } func getUploadOffset(r *http.Request) (int64, error) { uploadOffset, err := strconv.ParseInt(r.Header.Get("Upload-Offset"), 10, 64) if err != nil { return 0, fmt.Errorf("invalid upload offset: %w", err) } return uploadOffset, nil }
go
Apache-2.0
94ec786d34aaaa924ed34719d4a972520f7fecb5
2026-01-07T08:36:13.695467Z
false
filebrowser/filebrowser
https://github.com/filebrowser/filebrowser/blob/94ec786d34aaaa924ed34719d4a972520f7fecb5/http/raw.go
http/raw.go
package fbhttp import ( "errors" "io/fs" "log" "net/http" "net/url" gopath "path" "path/filepath" "strings" "github.com/mholt/archives" "github.com/filebrowser/filebrowser/v2/files" "github.com/filebrowser/filebrowser/v2/fileutils" "github.com/filebrowser/filebrowser/v2/users" ) func slashClean(name string) string { if name == "" || name[0] != '/' { name = "/" + name } return gopath.Clean(name) } func parseQueryFiles(r *http.Request, f *files.FileInfo, _ *users.User) ([]string, error) { var fileSlice []string names := strings.Split(r.URL.Query().Get("files"), ",") if len(names) == 0 { fileSlice = append(fileSlice, f.Path) } else { for _, name := range names { name, err := url.QueryUnescape(strings.ReplaceAll(name, "+", "%2B")) if err != nil { return nil, err } name = slashClean(name) fileSlice = append(fileSlice, filepath.Join(f.Path, name)) } } return fileSlice, nil } func parseQueryAlgorithm(r *http.Request) (string, archives.Archival, error) { switch r.URL.Query().Get("algo") { case "zip", "true", "": return ".zip", archives.Zip{}, nil case "tar": return ".tar", archives.Tar{}, nil case "targz": return ".tar.gz", archives.CompressedArchive{Compression: archives.Gz{}, Archival: archives.Tar{}}, nil case "tarbz2": return ".tar.bz2", archives.CompressedArchive{Compression: archives.Bz2{}, Archival: archives.Tar{}}, nil case "tarxz": return ".tar.xz", archives.CompressedArchive{Compression: archives.Xz{}, Archival: archives.Tar{}}, nil case "tarlz4": return ".tar.lz4", archives.CompressedArchive{Compression: archives.Lz4{}, Archival: archives.Tar{}}, nil case "tarsz": return ".tar.sz", archives.CompressedArchive{Compression: archives.Sz{}, Archival: archives.Tar{}}, nil case "tarbr": return ".tar.br", archives.CompressedArchive{Compression: archives.Brotli{}, Archival: archives.Tar{}}, nil case "tarzst": return ".tar.zst", archives.CompressedArchive{Compression: archives.Zstd{}, Archival: archives.Tar{}}, nil default: return "", nil, errors.New("format not implemented") } } func setContentDisposition(w http.ResponseWriter, r *http.Request, file *files.FileInfo) { if r.URL.Query().Get("inline") == "true" { w.Header().Set("Content-Disposition", "inline") } else { // As per RFC6266 section 4.3 w.Header().Set("Content-Disposition", "attachment; filename*=utf-8''"+url.PathEscape(file.Name)) } } var rawHandler = withUser(func(w http.ResponseWriter, r *http.Request, d *data) (int, error) { if !d.user.Perm.Download { return http.StatusAccepted, nil } file, err := files.NewFileInfo(&files.FileOptions{ Fs: d.user.Fs, Path: r.URL.Path, Modify: d.user.Perm.Modify, Expand: false, ReadHeader: d.server.TypeDetectionByHeader, Checker: d, }) if err != nil { return errToStatus(err), err } if files.IsNamedPipe(file.Mode) { setContentDisposition(w, r, file) return 0, nil } if !file.IsDir { return rawFileHandler(w, r, file) } return rawDirHandler(w, r, d, file) }) func getFiles(d *data, path, commonPath string) ([]archives.FileInfo, error) { if !d.Check(path) { return nil, nil } info, err := d.user.Fs.Stat(path) if err != nil { return nil, err } var archiveFiles []archives.FileInfo if path != commonPath { nameInArchive := strings.TrimPrefix(path, commonPath) nameInArchive = strings.TrimPrefix(nameInArchive, string(filepath.Separator)) nameInArchive = filepath.ToSlash(nameInArchive) archiveFiles = append(archiveFiles, archives.FileInfo{ FileInfo: info, NameInArchive: nameInArchive, Open: func() (fs.File, error) { return d.user.Fs.Open(path) }, }) } if info.IsDir() { f, err := d.user.Fs.Open(path) if err != nil { return nil, err } defer f.Close() names, err := f.Readdirnames(0) if err != nil { return nil, err } for _, name := range names { fPath := filepath.Join(path, name) subFiles, err := getFiles(d, fPath, commonPath) if err != nil { log.Printf("Failed to get files from %s: %v", fPath, err) continue } archiveFiles = append(archiveFiles, subFiles...) } } return archiveFiles, nil } func rawDirHandler(w http.ResponseWriter, r *http.Request, d *data, file *files.FileInfo) (int, error) { filenames, err := parseQueryFiles(r, file, d.user) if err != nil { return http.StatusInternalServerError, err } extension, archiver, err := parseQueryAlgorithm(r) if err != nil { return http.StatusInternalServerError, err } commonDir := fileutils.CommonPrefix(filepath.Separator, filenames...) var allFiles []archives.FileInfo for _, fname := range filenames { archiveFiles, err := getFiles(d, fname, commonDir) if err != nil { log.Printf("Failed to get files from %s: %v", fname, err) continue } allFiles = append(allFiles, archiveFiles...) } name := filepath.Base(commonDir) if name == "." || name == "" || name == string(filepath.Separator) { if file.Name != "" { name = file.Name } else { actual, statErr := file.Fs.Stat(".") if statErr != nil { return http.StatusInternalServerError, statErr } name = actual.Name() } } if len(filenames) > 1 { name = "_" + name } name += extension w.Header().Set("Content-Disposition", "attachment; filename*=utf-8''"+url.PathEscape(name)) if err := archiver.Archive(r.Context(), w, allFiles); err != nil { return http.StatusInternalServerError, err } return 0, nil } func rawFileHandler(w http.ResponseWriter, r *http.Request, file *files.FileInfo) (int, error) { fd, err := file.Fs.Open(file.Path) if err != nil { return http.StatusInternalServerError, err } defer fd.Close() setContentDisposition(w, r, file) w.Header().Add("Content-Security-Policy", `script-src 'none';`) w.Header().Set("Cache-Control", "private") http.ServeContent(w, r, file.Name, file.ModTime, fd) return 0, nil }
go
Apache-2.0
94ec786d34aaaa924ed34719d4a972520f7fecb5
2026-01-07T08:36:13.695467Z
false
filebrowser/filebrowser
https://github.com/filebrowser/filebrowser/blob/94ec786d34aaaa924ed34719d4a972520f7fecb5/http/users.go
http/users.go
package fbhttp import ( "encoding/json" "errors" "log" "net/http" "sort" "strconv" "github.com/gorilla/mux" "golang.org/x/text/cases" "golang.org/x/text/language" "github.com/filebrowser/filebrowser/v2/auth" fberrors "github.com/filebrowser/filebrowser/v2/errors" "github.com/filebrowser/filebrowser/v2/users" ) var ( NonModifiableFieldsForNonAdmin = []string{"Username", "Scope", "LockPassword", "Perm", "Commands", "Rules"} ) type modifyUserRequest struct { modifyRequest Data *users.User `json:"data"` } func getUserID(r *http.Request) (uint, error) { vars := mux.Vars(r) i, err := strconv.ParseUint(vars["id"], 10, 0) if err != nil { return 0, err } return uint(i), err } func getUser(_ http.ResponseWriter, r *http.Request) (*modifyUserRequest, error) { if r.Body == nil { return nil, fberrors.ErrEmptyRequest } req := &modifyUserRequest{} err := json.NewDecoder(r.Body).Decode(req) if err != nil { return nil, err } if req.What != "user" { return nil, fberrors.ErrInvalidDataType } return req, nil } func withSelfOrAdmin(fn handleFunc) handleFunc { return withUser(func(w http.ResponseWriter, r *http.Request, d *data) (int, error) { id, err := getUserID(r) if err != nil { return http.StatusInternalServerError, err } if d.user.ID != id && !d.user.Perm.Admin { return http.StatusForbidden, nil } d.raw = id return fn(w, r, d) }) } var usersGetHandler = withAdmin(func(w http.ResponseWriter, r *http.Request, d *data) (int, error) { users, err := d.store.Users.Gets(d.server.Root) if err != nil { return http.StatusInternalServerError, err } for _, u := range users { u.Password = "" } sort.Slice(users, func(i, j int) bool { return users[i].ID < users[j].ID }) return renderJSON(w, r, users) }) var userGetHandler = withSelfOrAdmin(func(w http.ResponseWriter, r *http.Request, d *data) (int, error) { u, err := d.store.Users.Get(d.server.Root, d.raw.(uint)) if errors.Is(err, fberrors.ErrNotExist) { return http.StatusNotFound, err } if err != nil { return http.StatusInternalServerError, err } u.Password = "" if !d.user.Perm.Admin { u.Scope = "" } return renderJSON(w, r, u) }) var userDeleteHandler = withSelfOrAdmin(func(_ http.ResponseWriter, _ *http.Request, d *data) (int, error) { err := d.store.Users.Delete(d.raw.(uint)) if err != nil { return errToStatus(err), err } return http.StatusOK, nil }) var userPostHandler = withAdmin(func(w http.ResponseWriter, r *http.Request, d *data) (int, error) { req, err := getUser(w, r) if err != nil { return http.StatusBadRequest, err } if d.settings.AuthMethod == auth.MethodJSONAuth { if !users.CheckPwd(req.CurrentPassword, d.user.Password) { return http.StatusBadRequest, fberrors.ErrCurrentPasswordIncorrect } } if len(req.Which) != 0 { return http.StatusBadRequest, nil } if req.Data.Password == "" { return http.StatusBadRequest, fberrors.ErrEmptyPassword } req.Data.Password, err = users.ValidateAndHashPwd(req.Data.Password, d.settings.MinimumPasswordLength) if err != nil { return http.StatusBadRequest, err } userHome, err := d.settings.MakeUserDir(req.Data.Username, req.Data.Scope, d.server.Root) if err != nil { log.Printf("create user: failed to mkdir user home dir: [%s]", userHome) return http.StatusInternalServerError, err } req.Data.Scope = userHome log.Printf("user: %s, home dir: [%s].", req.Data.Username, userHome) err = d.store.Users.Save(req.Data) if err != nil { return http.StatusInternalServerError, err } w.Header().Set("Location", "/settings/users/"+strconv.FormatUint(uint64(req.Data.ID), 10)) return http.StatusCreated, nil }) var userPutHandler = withSelfOrAdmin(func(w http.ResponseWriter, r *http.Request, d *data) (int, error) { req, err := getUser(w, r) if err != nil { return http.StatusBadRequest, err } if d.settings.AuthMethod == auth.MethodJSONAuth { var sensibleFields = map[string]struct{}{ "all": {}, "username": {}, "password": {}, "scope": {}, "lockPassword": {}, "commands": {}, "perm": {}, } for _, field := range req.Which { if _, ok := sensibleFields[field]; ok { if !users.CheckPwd(req.CurrentPassword, d.user.Password) { return http.StatusBadRequest, fberrors.ErrCurrentPasswordIncorrect } break } } } if req.Data.ID != d.raw.(uint) { return http.StatusBadRequest, nil } if len(req.Which) == 0 || (len(req.Which) == 1 && req.Which[0] == "all") { if !d.user.Perm.Admin { return http.StatusForbidden, nil } if req.Data.Password != "" { req.Data.Password, err = users.ValidateAndHashPwd(req.Data.Password, d.settings.MinimumPasswordLength) if err != nil { return http.StatusBadRequest, err } } else { var suser *users.User suser, err = d.store.Users.Get(d.server.Root, d.raw.(uint)) if err != nil { return http.StatusInternalServerError, err } req.Data.Password = suser.Password } req.Which = []string{} } for k, v := range req.Which { v = cases.Title(language.English, cases.NoLower).String(v) req.Which[k] = v if v == "Password" { if !d.user.Perm.Admin && d.user.LockPassword { return http.StatusForbidden, nil } req.Data.Password, err = users.ValidateAndHashPwd(req.Data.Password, d.settings.MinimumPasswordLength) if err != nil { return http.StatusBadRequest, err } } for _, f := range NonModifiableFieldsForNonAdmin { if !d.user.Perm.Admin && v == f { return http.StatusForbidden, nil } } } err = d.store.Users.Update(req.Data, req.Which...) if err != nil { return http.StatusInternalServerError, err } return http.StatusOK, nil })
go
Apache-2.0
94ec786d34aaaa924ed34719d4a972520f7fecb5
2026-01-07T08:36:13.695467Z
false
filebrowser/filebrowser
https://github.com/filebrowser/filebrowser/blob/94ec786d34aaaa924ed34719d4a972520f7fecb5/http/subtitle.go
http/subtitle.go
package fbhttp import ( "bytes" "net/http" "strings" "github.com/asticode/go-astisub" "github.com/filebrowser/filebrowser/v2/files" ) var subtitleHandler = withUser(func(w http.ResponseWriter, r *http.Request, d *data) (int, error) { if !d.user.Perm.Download { return http.StatusAccepted, nil } file, err := files.NewFileInfo(&files.FileOptions{ Fs: d.user.Fs, Path: r.URL.Path, Modify: d.user.Perm.Modify, Expand: false, ReadHeader: d.server.TypeDetectionByHeader, Checker: d, }) if err != nil { return errToStatus(err), err } if file.IsDir { return http.StatusBadRequest, nil } return subtitleFileHandler(w, r, file) }) func subtitleFileHandler(w http.ResponseWriter, r *http.Request, file *files.FileInfo) (int, error) { // if its not a subtitle file, reject if !files.IsSupportedSubtitle(file.Name) { return http.StatusBadRequest, nil } fd, err := file.Fs.Open(file.Path) if err != nil { return http.StatusInternalServerError, err } defer fd.Close() // load subtitle for conversion to vtt var sub *astisub.Subtitles if strings.HasSuffix(file.Name, ".srt") { sub, err = astisub.ReadFromSRT(fd) } else if strings.HasSuffix(file.Name, ".ass") || strings.HasSuffix(file.Name, ".ssa") { sub, err = astisub.ReadFromSSA(fd) } if err != nil { return http.StatusInternalServerError, err } setContentDisposition(w, r, file) w.Header().Add("Content-Security-Policy", `script-src 'none';`) w.Header().Set("Cache-Control", "private") // force type to text/vtt w.Header().Set("Content-Type", "text/vtt") // serve vtt file directly if sub == nil { http.ServeContent(w, r, file.Name, file.ModTime, fd) return 0, nil } // convert others to vtt and serve from buffer var buf = &bytes.Buffer{} err = sub.WriteToWebVTT(buf) if err != nil { return http.StatusInternalServerError, err } http.ServeContent(w, r, file.Name, file.ModTime, bytes.NewReader(buf.Bytes())) return 0, nil }
go
Apache-2.0
94ec786d34aaaa924ed34719d4a972520f7fecb5
2026-01-07T08:36:13.695467Z
false
filebrowser/filebrowser
https://github.com/filebrowser/filebrowser/blob/94ec786d34aaaa924ed34719d4a972520f7fecb5/http/headers.go
http/headers.go
//go:build !dev package fbhttp // global headers to append to every response var globalHeaders = map[string]string{ "Cache-Control": "no-cache, no-store, must-revalidate", }
go
Apache-2.0
94ec786d34aaaa924ed34719d4a972520f7fecb5
2026-01-07T08:36:13.695467Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/pocketbase.go
pocketbase.go
package pocketbase import ( "io" "os" "os/signal" "path/filepath" "strings" "syscall" "time" "github.com/fatih/color" "github.com/pocketbase/pocketbase/cmd" "github.com/pocketbase/pocketbase/core" "github.com/pocketbase/pocketbase/tools/hook" "github.com/pocketbase/pocketbase/tools/list" "github.com/pocketbase/pocketbase/tools/osutils" "github.com/pocketbase/pocketbase/tools/routine" "github.com/spf13/cobra" _ "github.com/pocketbase/pocketbase/migrations" ) var _ core.App = (*PocketBase)(nil) // Version of PocketBase var Version = "(untracked)" // PocketBase defines a PocketBase app launcher. // // It implements [core.App] via embedding and all of the app interface methods // could be accessed directly through the instance (eg. PocketBase.DataDir()). type PocketBase struct { core.App devFlag bool dataDirFlag string encryptionEnvFlag string queryTimeout int hideStartBanner bool // RootCmd is the main console command RootCmd *cobra.Command } // Config is the PocketBase initialization config struct. type Config struct { // hide the default console server info on app startup HideStartBanner bool // optional default values for the console flags DefaultDev bool DefaultDataDir string // if not set, it will fallback to "./pb_data" DefaultEncryptionEnv string DefaultQueryTimeout time.Duration // default to core.DefaultQueryTimeout (in seconds) // optional DB configurations DataMaxOpenConns int // default to core.DefaultDataMaxOpenConns DataMaxIdleConns int // default to core.DefaultDataMaxIdleConns AuxMaxOpenConns int // default to core.DefaultAuxMaxOpenConns AuxMaxIdleConns int // default to core.DefaultAuxMaxIdleConns DBConnect core.DBConnectFunc // default to core.dbConnect } // New creates a new PocketBase instance with the default configuration. // Use [NewWithConfig] if you want to provide a custom configuration. // // Note that the application will not be initialized/bootstrapped yet, // aka. DB connections, migrations, app settings, etc. will not be accessible. // Everything will be initialized when [PocketBase.Start] is executed. // If you want to initialize the application before calling [PocketBase.Start], // then you'll have to manually call [PocketBase.Bootstrap]. func New() *PocketBase { _, isUsingGoRun := inspectRuntime() return NewWithConfig(Config{ DefaultDev: isUsingGoRun, }) } // NewWithConfig creates a new PocketBase instance with the provided config. // // Note that the application will not be initialized/bootstrapped yet, // aka. DB connections, migrations, app settings, etc. will not be accessible. // Everything will be initialized when [PocketBase.Start] is executed. // If you want to initialize the application before calling [PocketBase.Start], // then you'll have to manually call [PocketBase.Bootstrap]. func NewWithConfig(config Config) *PocketBase { // initialize a default data directory based on the executable baseDir if config.DefaultDataDir == "" { baseDir, _ := inspectRuntime() config.DefaultDataDir = filepath.Join(baseDir, "pb_data") } if config.DefaultQueryTimeout == 0 { config.DefaultQueryTimeout = core.DefaultQueryTimeout } executableName := filepath.Base(os.Args[0]) pb := &PocketBase{ RootCmd: &cobra.Command{ Use: executableName, Short: executableName + " CLI", Version: Version, FParseErrWhitelist: cobra.FParseErrWhitelist{ UnknownFlags: true, }, // no need to provide the default cobra completion command CompletionOptions: cobra.CompletionOptions{ DisableDefaultCmd: true, }, }, devFlag: config.DefaultDev, dataDirFlag: config.DefaultDataDir, encryptionEnvFlag: config.DefaultEncryptionEnv, hideStartBanner: config.HideStartBanner, } // replace with a colored stderr writer pb.RootCmd.SetErr(newErrWriter()) // parse base flags // (errors are ignored, since the full flags parsing happens on Execute()) pb.eagerParseFlags(&config) // initialize the app instance pb.App = core.NewBaseApp(core.BaseAppConfig{ IsDev: pb.devFlag, DataDir: pb.dataDirFlag, EncryptionEnv: pb.encryptionEnvFlag, QueryTimeout: time.Duration(pb.queryTimeout) * time.Second, DataMaxOpenConns: config.DataMaxOpenConns, DataMaxIdleConns: config.DataMaxIdleConns, AuxMaxOpenConns: config.AuxMaxOpenConns, AuxMaxIdleConns: config.AuxMaxIdleConns, DBConnect: config.DBConnect, }) // hide the default help command (allow only `--help` flag) pb.RootCmd.SetHelpCommand(&cobra.Command{Hidden: true}) // https://github.com/pocketbase/pocketbase/issues/6136 pb.OnBootstrap().Bind(&hook.Handler[*core.BootstrapEvent]{ Id: ModerncDepsCheckHookId, Func: func(be *core.BootstrapEvent) error { if err := be.Next(); err != nil { return err } // run separately to avoid blocking app := be.App routine.FireAndForget(func() { checkModerncDeps(app) }) return nil }, }) return pb } // Start starts the application, aka. registers the default system // commands (serve, superuser, version) and executes pb.RootCmd. func (pb *PocketBase) Start() error { // register system commands pb.RootCmd.AddCommand(cmd.NewSuperuserCommand(pb)) pb.RootCmd.AddCommand(cmd.NewServeCommand(pb, !pb.hideStartBanner)) return pb.Execute() } // Execute initializes the application (if not already) and executes // the pb.RootCmd with graceful shutdown support. // // This method differs from pb.Start() by not registering the default // system commands! func (pb *PocketBase) Execute() error { if !pb.skipBootstrap() { if err := pb.Bootstrap(); err != nil { return err } } done := make(chan bool, 1) // listen for interrupt signal to gracefully shutdown the application go func() { sigch := make(chan os.Signal, 1) signal.Notify(sigch, os.Interrupt, syscall.SIGTERM) <-sigch done <- true }() // execute the root command go func() { // note: leave to the commands to decide whether to print their error pb.RootCmd.Execute() done <- true }() <-done // trigger cleanups // // @todo consider skipping and just call the finalizer in case OnTerminate was already invoked manually? event := new(core.TerminateEvent) event.App = pb return pb.OnTerminate().Trigger(event, func(e *core.TerminateEvent) error { return e.App.ResetBootstrapState() }) } // eagerParseFlags parses the global app flags before calling pb.RootCmd.Execute(). // so we can have all PocketBase flags ready for use on initialization. func (pb *PocketBase) eagerParseFlags(config *Config) error { pb.RootCmd.PersistentFlags().StringVar( &pb.dataDirFlag, "dir", config.DefaultDataDir, "the PocketBase data directory", ) pb.RootCmd.PersistentFlags().StringVar( &pb.encryptionEnvFlag, "encryptionEnv", config.DefaultEncryptionEnv, "the env variable whose value of 32 characters will be used \nas encryption key for the app settings (default none)", ) pb.RootCmd.PersistentFlags().BoolVar( &pb.devFlag, "dev", config.DefaultDev, "enable dev mode, aka. printing logs and sql statements to the console", ) pb.RootCmd.PersistentFlags().IntVar( &pb.queryTimeout, "queryTimeout", int(config.DefaultQueryTimeout.Seconds()), "the default SELECT queries timeout in seconds", ) return pb.RootCmd.ParseFlags(os.Args[1:]) } // skipBootstrap eagerly checks if the app should skip the bootstrap process: // - already bootstrapped // - is unknown command // - is the default help command // - is the default version command // // https://github.com/pocketbase/pocketbase/issues/404 // https://github.com/pocketbase/pocketbase/discussions/1267 func (pb *PocketBase) skipBootstrap() bool { flags := []string{ "-h", "--help", "-v", "--version", } if pb.IsBootstrapped() { return true // already bootstrapped } cmd, _, err := pb.RootCmd.Find(os.Args[1:]) if err != nil { return true // unknown command } for _, arg := range os.Args { if !list.ExistInSlice(arg, flags) { continue } // ensure that there is no user defined flag with the same name/shorthand trimmed := strings.TrimLeft(arg, "-") if len(trimmed) > 1 && cmd.Flags().Lookup(trimmed) == nil { return true } if len(trimmed) == 1 && cmd.Flags().ShorthandLookup(trimmed) == nil { return true } } return false } // inspectRuntime tries to find the base executable directory and how it was run. // // note: we are using os.Args[0] and not os.Executable() since it could // break existing aliased binaries (eg. the community maintained homebrew package) func inspectRuntime() (baseDir string, withGoRun bool) { if osutils.IsProbablyGoRun() { // probably ran with go run withGoRun = true baseDir, _ = os.Getwd() } else { // probably ran with go build withGoRun = false baseDir = filepath.Dir(os.Args[0]) } return } // newErrWriter returns a red colored stderr writter. func newErrWriter() *coloredWriter { return &coloredWriter{ w: os.Stderr, c: color.New(color.FgRed), } } // coloredWriter is a small wrapper struct to construct a [color.Color] writter. type coloredWriter struct { w io.Writer c *color.Color } // Write writes the p bytes using the colored writer. func (colored *coloredWriter) Write(p []byte) (n int, err error) { colored.c.SetWriter(colored.w) defer colored.c.UnsetWriter(colored.w) return colored.c.Print(string(p)) }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/pocketbase_test.go
pocketbase_test.go
package pocketbase import ( "os" "path/filepath" "testing" "github.com/spf13/cobra" ) func TestNew(t *testing.T) { // copy os.Args originalArgs := make([]string, len(os.Args)) copy(originalArgs, os.Args) defer func() { // restore os.Args os.Args = originalArgs }() // change os.Args os.Args = os.Args[:1] os.Args = append( os.Args, "--dir=test_dir", "--encryptionEnv=test_encryption_env", "--debug=true", ) app := New() if app == nil { t.Fatal("Expected initialized PocketBase instance, got nil") } if app.RootCmd == nil { t.Fatal("Expected RootCmd to be initialized, got nil") } if app.App == nil { t.Fatal("Expected App to be initialized, got nil") } if app.DataDir() != "test_dir" { t.Fatalf("Expected app.DataDir() %q, got %q", "test_dir", app.DataDir()) } if app.EncryptionEnv() != "test_encryption_env" { t.Fatalf("Expected app.EncryptionEnv() test_encryption_env, got %q", app.EncryptionEnv()) } } func TestNewWithConfig(t *testing.T) { app := NewWithConfig(Config{ DefaultDataDir: "test_dir", DefaultEncryptionEnv: "test_encryption_env", HideStartBanner: true, }) if app == nil { t.Fatal("Expected initialized PocketBase instance, got nil") } if app.RootCmd == nil { t.Fatal("Expected RootCmd to be initialized, got nil") } if app.App == nil { t.Fatal("Expected App to be initialized, got nil") } if app.hideStartBanner != true { t.Fatal("Expected app.hideStartBanner to be true, got false") } if app.DataDir() != "test_dir" { t.Fatalf("Expected app.DataDir() %q, got %q", "test_dir", app.DataDir()) } if app.EncryptionEnv() != "test_encryption_env" { t.Fatalf("Expected app.EncryptionEnv() %q, got %q", "test_encryption_env", app.EncryptionEnv()) } } func TestNewWithConfigAndFlags(t *testing.T) { // copy os.Args originalArgs := make([]string, len(os.Args)) copy(originalArgs, os.Args) defer func() { // restore os.Args os.Args = originalArgs }() // change os.Args os.Args = os.Args[:1] os.Args = append( os.Args, "--dir=test_dir_flag", "--encryptionEnv=test_encryption_env_flag", "--debug=false", ) app := NewWithConfig(Config{ DefaultDataDir: "test_dir", DefaultEncryptionEnv: "test_encryption_env", HideStartBanner: true, }) if app == nil { t.Fatal("Expected initialized PocketBase instance, got nil") } if app.RootCmd == nil { t.Fatal("Expected RootCmd to be initialized, got nil") } if app.App == nil { t.Fatal("Expected App to be initialized, got nil") } if app.hideStartBanner != true { t.Fatal("Expected app.hideStartBanner to be true, got false") } if app.DataDir() != "test_dir_flag" { t.Fatalf("Expected app.DataDir() %q, got %q", "test_dir_flag", app.DataDir()) } if app.EncryptionEnv() != "test_encryption_env_flag" { t.Fatalf("Expected app.EncryptionEnv() %q, got %q", "test_encryption_env_flag", app.EncryptionEnv()) } } func TestSkipBootstrap(t *testing.T) { // copy os.Args originalArgs := make([]string, len(os.Args)) copy(originalArgs, os.Args) defer func() { // restore os.Args os.Args = originalArgs }() tempDir := filepath.Join(os.TempDir(), "temp_pb_data") defer os.RemoveAll(tempDir) // already bootstrapped app0 := NewWithConfig(Config{DefaultDataDir: tempDir}) app0.Bootstrap() if v := app0.skipBootstrap(); !v { t.Fatal("[bootstrapped] Expected true, got false") } // unknown command os.Args = os.Args[:1] os.Args = append(os.Args, "demo") app1 := NewWithConfig(Config{DefaultDataDir: tempDir}) app1.RootCmd.AddCommand(&cobra.Command{Use: "test"}) if v := app1.skipBootstrap(); !v { t.Fatal("[unknown] Expected true, got false") } // default flags flagScenarios := []struct { name string short string }{ {"help", "h"}, {"version", "v"}, } for _, s := range flagScenarios { // base flag os.Args = os.Args[:1] os.Args = append(os.Args, "--"+s.name) app1 := NewWithConfig(Config{DefaultDataDir: tempDir}) if v := app1.skipBootstrap(); !v { t.Fatalf("[--%s] Expected true, got false", s.name) } // short flag os.Args = os.Args[:1] os.Args = append(os.Args, "-"+s.short) app2 := NewWithConfig(Config{DefaultDataDir: tempDir}) if v := app2.skipBootstrap(); !v { t.Fatalf("[-%s] Expected true, got false", s.short) } customCmd := &cobra.Command{Use: "custom"} customCmd.PersistentFlags().BoolP(s.name, s.short, false, "") // base flag in custom command os.Args = os.Args[:1] os.Args = append(os.Args, "custom") os.Args = append(os.Args, "--"+s.name) app3 := NewWithConfig(Config{DefaultDataDir: tempDir}) app3.RootCmd.AddCommand(customCmd) if v := app3.skipBootstrap(); v { t.Fatalf("[--%s custom] Expected false, got true", s.name) } // short flag in custom command os.Args = os.Args[:1] os.Args = append(os.Args, "custom") os.Args = append(os.Args, "-"+s.short) app4 := NewWithConfig(Config{DefaultDataDir: tempDir}) app4.RootCmd.AddCommand(customCmd) if v := app4.skipBootstrap(); v { t.Fatalf("[-%s custom] Expected false, got true", s.short) } } }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/modernc_versions_check.go
modernc_versions_check.go
package pocketbase import ( "fmt" "log/slog" "runtime/debug" "github.com/fatih/color" "github.com/pocketbase/pocketbase/core" ) const ( expectedDriverVersion = "v1.41.0" expectedLibcVersion = "v1.66.10" // ModerncDepsCheckHookId is the id of the hook that performs the modernc.org/* deps checks. // It could be used for removing/unbinding the hook if you don't want the checks. ModerncDepsCheckHookId = "pbModerncDepsCheck" ) // checkModerncDeps checks whether the current binary was buit with the // expected and tested modernc driver dependencies. // // This is needed because modernc.org/libc doesn't follow semantic versioning // and using a version different from the one in the go.mod of modernc.org/sqlite // could have unintended side-effects and cause obscure build and runtime bugs // (https://github.com/pocketbase/pocketbase/issues/6136). func checkModerncDeps(app core.App) { info, ok := debug.ReadBuildInfo() if !ok { return // no build info (probably compiled without module support) } var driverVersion, libcVersion string for _, dep := range info.Deps { switch dep.Path { case "modernc.org/libc": libcVersion = dep.Version case "modernc.org/sqlite": driverVersion = dep.Version } // no need to further search if both deps are located if driverVersion != "" && libcVersion != "" { break } } // not using the default driver if driverVersion == "" { return } var msg string if driverVersion != expectedDriverVersion { msg = fmt.Sprintf( "You are using modernc.org/sqlite %s which differs from the expected and tested %s.\n"+ "Make sure to either manually update in your go.mod the dependency version to the expected one OR if you want to keep yours "+ "ensure that its indirect modernc.org/libc dependency has the same version as in the https://gitlab.com/cznic/sqlite/-/blob/master/go.mod, "+ "otherwise it could result in unexpected build or runtime errors.", driverVersion, expectedDriverVersion, ) app.Logger().Warn(msg, slog.String("current", driverVersion), slog.String("expected", expectedDriverVersion)) } else if libcVersion != expectedLibcVersion { msg = fmt.Sprintf( "You are using modernc.org/libc %s which differs from the expected and tested %s.\n"+ "Please update your go.mod and manually set modernc.org/libc to %s, otherwise it could result in unexpected build or runtime errors "+ "(you may have to also run 'go clean -modcache' to clear the cache if the warning persists).", libcVersion, expectedLibcVersion, expectedLibcVersion, ) app.Logger().Warn(msg, slog.String("current", libcVersion), slog.String("expected", expectedLibcVersion)) } // ensure that the message is printed to the default stderr too // (when in dev mode this is not needed because we print all logs) if msg != "" && !app.IsDev() { color.Yellow("\nWARN " + msg + "\n\n") } }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/cmd/superuser.go
cmd/superuser.go
package cmd import ( "errors" "fmt" "github.com/fatih/color" "github.com/go-ozzo/ozzo-validation/v4/is" "github.com/pocketbase/pocketbase/core" "github.com/pocketbase/pocketbase/tools/security" "github.com/spf13/cobra" ) // NewSuperuserCommand creates and returns new command for managing // superuser accounts (create, update, upsert, delete). func NewSuperuserCommand(app core.App) *cobra.Command { command := &cobra.Command{ Use: "superuser", Short: "Manage superusers", } command.AddCommand(superuserUpsertCommand(app)) command.AddCommand(superuserCreateCommand(app)) command.AddCommand(superuserUpdateCommand(app)) command.AddCommand(superuserDeleteCommand(app)) command.AddCommand(superuserOTPCommand(app)) return command } func superuserUpsertCommand(app core.App) *cobra.Command { command := &cobra.Command{ Use: "upsert", Example: "superuser upsert test@example.com 1234567890", Short: "Creates, or updates if email exists, a single superuser", SilenceUsage: true, RunE: func(command *cobra.Command, args []string) error { if len(args) != 2 { return errors.New("missing email and password arguments") } if args[0] == "" || is.EmailFormat.Validate(args[0]) != nil { return errors.New("missing or invalid email address") } superusersCol, err := app.FindCachedCollectionByNameOrId(core.CollectionNameSuperusers) if err != nil { return fmt.Errorf("failed to fetch %q collection: %w", core.CollectionNameSuperusers, err) } superuser, err := app.FindAuthRecordByEmail(superusersCol, args[0]) if err != nil { superuser = core.NewRecord(superusersCol) } superuser.SetEmail(args[0]) superuser.SetPassword(args[1]) if err := app.Save(superuser); err != nil { return fmt.Errorf("failed to upsert superuser account: %w", err) } color.Green("Successfully saved superuser %q!", superuser.Email()) return nil }, } return command } func superuserCreateCommand(app core.App) *cobra.Command { command := &cobra.Command{ Use: "create", Example: "superuser create test@example.com 1234567890", Short: "Creates a new superuser", SilenceUsage: true, RunE: func(command *cobra.Command, args []string) error { if len(args) != 2 { return errors.New("missing email and password arguments") } if args[0] == "" || is.EmailFormat.Validate(args[0]) != nil { return errors.New("missing or invalid email address") } superusersCol, err := app.FindCachedCollectionByNameOrId(core.CollectionNameSuperusers) if err != nil { return fmt.Errorf("failed to fetch %q collection: %w", core.CollectionNameSuperusers, err) } superuser := core.NewRecord(superusersCol) superuser.SetEmail(args[0]) superuser.SetPassword(args[1]) if err := app.Save(superuser); err != nil { return fmt.Errorf("failed to create new superuser account: %w", err) } color.Green("Successfully created new superuser %q!", superuser.Email()) return nil }, } return command } func superuserUpdateCommand(app core.App) *cobra.Command { command := &cobra.Command{ Use: "update", Example: "superuser update test@example.com 1234567890", Short: "Changes the password of a single superuser", SilenceUsage: true, RunE: func(command *cobra.Command, args []string) error { if len(args) != 2 { return errors.New("missing email and password arguments") } if args[0] == "" || is.EmailFormat.Validate(args[0]) != nil { return errors.New("missing or invalid email address") } superuser, err := app.FindAuthRecordByEmail(core.CollectionNameSuperusers, args[0]) if err != nil { return fmt.Errorf("superuser with email %q doesn't exist", args[0]) } superuser.SetPassword(args[1]) if err := app.Save(superuser); err != nil { return fmt.Errorf("failed to change superuser %q password: %w", superuser.Email(), err) } color.Green("Successfully changed superuser %q password!", superuser.Email()) return nil }, } return command } func superuserDeleteCommand(app core.App) *cobra.Command { command := &cobra.Command{ Use: "delete", Example: "superuser delete test@example.com", Short: "Deletes an existing superuser", SilenceUsage: true, RunE: func(command *cobra.Command, args []string) error { if len(args) == 0 || args[0] == "" || is.EmailFormat.Validate(args[0]) != nil { return errors.New("invalid or missing email address") } superuser, err := app.FindAuthRecordByEmail(core.CollectionNameSuperusers, args[0]) if err != nil { color.Yellow("superuser %q is missing or already deleted", args[0]) return nil } if err := app.Delete(superuser); err != nil { return fmt.Errorf("failed to delete superuser %q: %w", superuser.Email(), err) } color.Green("Successfully deleted superuser %q!", superuser.Email()) return nil }, } return command } func superuserOTPCommand(app core.App) *cobra.Command { command := &cobra.Command{ Use: "otp", Example: "superuser otp test@example.com", Short: "Creates a new OTP for the specified superuser", SilenceUsage: true, RunE: func(command *cobra.Command, args []string) error { if len(args) == 0 || args[0] == "" || is.EmailFormat.Validate(args[0]) != nil { return errors.New("invalid or missing email address") } superuser, err := app.FindAuthRecordByEmail(core.CollectionNameSuperusers, args[0]) if err != nil { return fmt.Errorf("superuser with email %q doesn't exist", args[0]) } if !superuser.Collection().OTP.Enabled { return errors.New("OTP auth is not enabled for the _superusers collection") } pass := security.RandomStringWithAlphabet(superuser.Collection().OTP.Length, "1234567890") otp := core.NewOTP(app) otp.SetCollectionRef(superuser.Collection().Id) otp.SetRecordRef(superuser.Id) otp.SetPassword(pass) err = app.Save(otp) if err != nil { return fmt.Errorf("failed to create OTP: %w", err) } color.New(color.BgGreen, color.FgBlack).Printf("Successfully created OTP for superuser %q:", superuser.Email()) color.Green("\n├─ Id: %s", otp.Id) color.Green("├─ Pass: %s", pass) color.Green("└─ Valid: %ds\n\n", superuser.Collection().OTP.Duration) return nil }, } return command }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/cmd/superuser_test.go
cmd/superuser_test.go
package cmd_test import ( "testing" "github.com/pocketbase/pocketbase/cmd" "github.com/pocketbase/pocketbase/core" "github.com/pocketbase/pocketbase/tests" ) func TestSuperuserUpsertCommand(t *testing.T) { t.Parallel() app, _ := tests.NewTestApp() defer app.Cleanup() scenarios := []struct { name string email string password string expectError bool }{ { "empty email and password", "", "", true, }, { "empty email", "", "1234567890", true, }, { "invalid email", "invalid", "1234567890", true, }, { "empty password", "test@example.com", "", true, }, { "short password", "test_new@example.com", "1234567", true, }, { "existing user", "test@example.com", "1234567890!", false, }, { "new user", "test_new@example.com", "1234567890!", false, }, } for _, s := range scenarios { t.Run(s.name, func(t *testing.T) { command := cmd.NewSuperuserCommand(app) command.SetArgs([]string{"upsert", s.email, s.password}) err := command.Execute() hasErr := err != nil if s.expectError != hasErr { t.Fatalf("Expected hasErr %v, got %v (%v)", s.expectError, hasErr, err) } if hasErr { return } // check whether the superuser account was actually upserted superuser, err := app.FindAuthRecordByEmail(core.CollectionNameSuperusers, s.email) if err != nil { t.Fatalf("Failed to fetch superuser %s: %v", s.email, err) } else if !superuser.ValidatePassword(s.password) { t.Fatal("Expected the superuser password to match") } }) } } func TestSuperuserCreateCommand(t *testing.T) { t.Parallel() app, _ := tests.NewTestApp() defer app.Cleanup() scenarios := []struct { name string email string password string expectError bool }{ { "empty email and password", "", "", true, }, { "empty email", "", "1234567890", true, }, { "invalid email", "invalid", "1234567890", true, }, { "duplicated email", "test@example.com", "1234567890", true, }, { "empty password", "test@example.com", "", true, }, { "short password", "test_new@example.com", "1234567", true, }, { "valid email and password", "test_new@example.com", "12345678", false, }, } for _, s := range scenarios { t.Run(s.name, func(t *testing.T) { command := cmd.NewSuperuserCommand(app) command.SetArgs([]string{"create", s.email, s.password}) err := command.Execute() hasErr := err != nil if s.expectError != hasErr { t.Fatalf("Expected hasErr %v, got %v (%v)", s.expectError, hasErr, err) } if hasErr { return } // check whether the superuser account was actually created superuser, err := app.FindAuthRecordByEmail(core.CollectionNameSuperusers, s.email) if err != nil { t.Fatalf("Failed to fetch created superuser %s: %v", s.email, err) } else if !superuser.ValidatePassword(s.password) { t.Fatal("Expected the superuser password to match") } }) } } func TestSuperuserUpdateCommand(t *testing.T) { app, _ := tests.NewTestApp() defer app.Cleanup() scenarios := []struct { name string email string password string expectError bool }{ { "empty email and password", "", "", true, }, { "empty email", "", "1234567890", true, }, { "invalid email", "invalid", "1234567890", true, }, { "nonexisting superuser", "test_missing@example.com", "1234567890", true, }, { "empty password", "test@example.com", "", true, }, { "short password", "test_new@example.com", "1234567", true, }, { "valid email and password", "test@example.com", "12345678", false, }, } for _, s := range scenarios { t.Run(s.name, func(t *testing.T) { command := cmd.NewSuperuserCommand(app) command.SetArgs([]string{"update", s.email, s.password}) err := command.Execute() hasErr := err != nil if s.expectError != hasErr { t.Fatalf("Expected hasErr %v, got %v (%v)", s.expectError, hasErr, err) } if hasErr { return } // check whether the superuser password was actually changed superuser, err := app.FindAuthRecordByEmail(core.CollectionNameSuperusers, s.email) if err != nil { t.Fatalf("Failed to fetch superuser %s: %v", s.email, err) } else if !superuser.ValidatePassword(s.password) { t.Fatal("Expected the superuser password to match") } }) } } func TestSuperuserDeleteCommand(t *testing.T) { app, _ := tests.NewTestApp() defer app.Cleanup() scenarios := []struct { name string email string expectError bool }{ { "empty email", "", true, }, { "invalid email", "invalid", true, }, { "nonexisting superuser", "test_missing@example.com", false, }, { "existing superuser", "test@example.com", false, }, } for _, s := range scenarios { t.Run(s.name, func(t *testing.T) { command := cmd.NewSuperuserCommand(app) command.SetArgs([]string{"delete", s.email}) err := command.Execute() hasErr := err != nil if s.expectError != hasErr { t.Fatalf("Expected hasErr %v, got %v (%v)", s.expectError, hasErr, err) } if hasErr { return } if _, err := app.FindAuthRecordByEmail(core.CollectionNameSuperusers, s.email); err == nil { t.Fatal("Expected the superuser account to be deleted") } }) } } func TestSuperuserOTPCommand(t *testing.T) { app, _ := tests.NewTestApp() defer app.Cleanup() superusersCollection, err := app.FindCollectionByNameOrId(core.CollectionNameSuperusers) if err != nil { t.Fatal(err) } // remove all existing otps otps, err := app.FindAllOTPsByCollection(superusersCollection) if err != nil { t.Fatal(err) } for _, otp := range otps { err = app.Delete(otp) if err != nil { t.Fatal(err) } } scenarios := []struct { name string email string enabled bool expectError bool }{ { "empty email", "", true, true, }, { "invalid email", "invalid", true, true, }, { "nonexisting superuser", "test_missing@example.com", true, true, }, { "existing superuser", "test@example.com", true, false, }, { "existing superuser with disabled OTP", "test@example.com", false, true, }, } for _, s := range scenarios { t.Run(s.name, func(t *testing.T) { command := cmd.NewSuperuserCommand(app) command.SetArgs([]string{"otp", s.email}) superusersCollection.OTP.Enabled = s.enabled if err = app.SaveNoValidate(superusersCollection); err != nil { t.Fatal(err) } err := command.Execute() hasErr := err != nil if s.expectError != hasErr { t.Fatalf("Expected hasErr %v, got %v (%v)", s.expectError, hasErr, err) } if hasErr { return } superuser, err := app.FindAuthRecordByEmail(superusersCollection, s.email) if err != nil { t.Fatal(err) } otps, _ := app.FindAllOTPsByRecord(superuser) if total := len(otps); total != 1 { t.Fatalf("Expected 1 OTP, got %d", total) } }) } }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/cmd/serve.go
cmd/serve.go
package cmd import ( "errors" "net/http" "github.com/pocketbase/pocketbase/apis" "github.com/pocketbase/pocketbase/core" "github.com/spf13/cobra" ) // NewServeCommand creates and returns new command responsible for // starting the default PocketBase web server. func NewServeCommand(app core.App, showStartBanner bool) *cobra.Command { var allowedOrigins []string var httpAddr string var httpsAddr string command := &cobra.Command{ Use: "serve [domain(s)]", Args: cobra.ArbitraryArgs, Short: "Starts the web server (default to 127.0.0.1:8090 if no domain is specified)", SilenceUsage: true, RunE: func(command *cobra.Command, args []string) error { // set default listener addresses if at least one domain is specified if len(args) > 0 { if httpAddr == "" { httpAddr = "0.0.0.0:80" } if httpsAddr == "" { httpsAddr = "0.0.0.0:443" } } else { if httpAddr == "" { httpAddr = "127.0.0.1:8090" } } err := apis.Serve(app, apis.ServeConfig{ HttpAddr: httpAddr, HttpsAddr: httpsAddr, ShowStartBanner: showStartBanner, AllowedOrigins: allowedOrigins, CertificateDomains: args, }) if errors.Is(err, http.ErrServerClosed) { return nil } return err }, } command.PersistentFlags().StringSliceVar( &allowedOrigins, "origins", []string{"*"}, "CORS allowed domain origins list", ) command.PersistentFlags().StringVar( &httpAddr, "http", "", "TCP address to listen for the HTTP server\n(if domain args are specified - default to 0.0.0.0:80, otherwise - default to 127.0.0.1:8090)", ) command.PersistentFlags().StringVar( &httpsAddr, "https", "", "TCP address to listen for the HTTPS server\n(if domain args are specified - default to 0.0.0.0:443, otherwise - default to empty string, aka. no TLS)\nThe incoming HTTP traffic also will be auto redirected to the HTTPS version", ) return command }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/osutils/dir_test.go
tools/osutils/dir_test.go
package osutils_test import ( "io/fs" "os" "path/filepath" "testing" "github.com/pocketbase/pocketbase/tools/list" "github.com/pocketbase/pocketbase/tools/osutils" "github.com/pocketbase/pocketbase/tools/security" ) func TestMoveDirContent(t *testing.T) { testDir := createTestDir(t) defer os.RemoveAll(testDir) exclude := []string{ "missing", "test2", "b", } // missing dest path // --- dir1 := filepath.Join(filepath.Dir(testDir), "a", "b", "c", "d", "_pb_move_dir_content_test_"+security.PseudorandomString(4)) defer os.RemoveAll(dir1) if err := osutils.MoveDirContent(testDir, dir1, exclude...); err == nil { t.Fatal("Expected path error, got nil") } // existing parent dir // --- dir2 := filepath.Join(filepath.Dir(testDir), "_pb_move_dir_content_test_"+security.PseudorandomString(4)) defer os.RemoveAll(dir2) if err := osutils.MoveDirContent(testDir, dir2, exclude...); err != nil { t.Fatalf("Expected dir2 to be created, got error: %v", err) } // find all files files := []string{} filepath.WalkDir(dir2, func(path string, d fs.DirEntry, err error) error { if err != nil { return err } if d.IsDir() { return nil } files = append(files, path) return nil }) expectedFiles := []string{ filepath.Join(dir2, "test1"), filepath.Join(dir2, "a", "a1"), filepath.Join(dir2, "a", "a2"), } if len(files) != len(expectedFiles) { t.Fatalf("Expected %d files, got %d: \n%v", len(expectedFiles), len(files), files) } for _, expected := range expectedFiles { if !list.ExistInSlice(expected, files) { t.Fatalf("Missing expected file %q in \n%v", expected, files) } } } // ------------------------------------------------------------------- // note: make sure to call os.RemoveAll(dir) after you are done // working with the created test dir. func createTestDir(t *testing.T) string { dir, err := os.MkdirTemp(os.TempDir(), "test_dir") if err != nil { t.Fatal(err) } // create sub directories if err := os.MkdirAll(filepath.Join(dir, "a"), os.ModePerm); err != nil { t.Fatal(err) } if err := os.MkdirAll(filepath.Join(dir, "b"), os.ModePerm); err != nil { t.Fatal(err) } { f, err := os.OpenFile(filepath.Join(dir, "test1"), os.O_WRONLY|os.O_CREATE, 0644) if err != nil { t.Fatal(err) } f.Close() } { f, err := os.OpenFile(filepath.Join(dir, "test2"), os.O_WRONLY|os.O_CREATE, 0644) if err != nil { t.Fatal(err) } f.Close() } { f, err := os.OpenFile(filepath.Join(dir, "a/a1"), os.O_WRONLY|os.O_CREATE, 0644) if err != nil { t.Fatal(err) } f.Close() } { f, err := os.OpenFile(filepath.Join(dir, "a/a2"), os.O_WRONLY|os.O_CREATE, 0644) if err != nil { t.Fatal(err) } f.Close() } { f, err := os.OpenFile(filepath.Join(dir, "b/b2"), os.O_WRONLY|os.O_CREATE, 0644) if err != nil { t.Fatal(err) } f.Close() } { f, err := os.OpenFile(filepath.Join(dir, "b/b2"), os.O_WRONLY|os.O_CREATE, 0644) if err != nil { t.Fatal(err) } f.Close() } return dir }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/osutils/cmd_test.go
tools/osutils/cmd_test.go
package osutils_test import ( "fmt" "os" "strings" "testing" "github.com/pocketbase/pocketbase/tools/osutils" ) func TestYesNoPrompt(t *testing.T) { scenarios := []struct { stdin string fallback bool expected bool }{ {"", false, false}, {"", true, true}, // yes {"y", false, true}, {"Y", false, true}, {"Yes", false, true}, {"yes", false, true}, // no {"n", true, false}, {"N", true, false}, {"No", true, false}, {"no", true, false}, // invalid -> no/yes {"invalid|no", true, false}, {"invalid|yes", false, true}, } for _, s := range scenarios { t.Run(fmt.Sprintf("%s_%v", s.stdin, s.fallback), func(t *testing.T) { stdinread, stdinwrite, err := os.Pipe() if err != nil { t.Fatal(err) } parts := strings.Split(s.stdin, "|") for _, p := range parts { if _, err := stdinwrite.WriteString(p + "\n"); err != nil { t.Fatalf("Failed to write test stdin part %q: %v", p, err) } } if err = stdinwrite.Close(); err != nil { t.Fatal(err) } defer func(oldStdin *os.File) { os.Stdin = oldStdin }(os.Stdin) os.Stdin = stdinread result := osutils.YesNoPrompt("test", s.fallback) if result != s.expected { t.Fatalf("Expected %v, got %v", s.expected, result) } }) } }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/osutils/cmd.go
tools/osutils/cmd.go
package osutils import ( "bufio" "fmt" "os" "os/exec" "runtime" "strings" "github.com/go-ozzo/ozzo-validation/v4/is" ) // LaunchURL attempts to open the provided url in the user's default browser. // // It is platform dependent and it uses: // - "open" on macOS // - "rundll32" on Windows // - "xdg-open" on everything else (Linux, FreeBSD, etc.) func LaunchURL(url string) error { if err := is.URL.Validate(url); err != nil { return err } switch runtime.GOOS { case "darwin": return exec.Command("open", url).Start() case "windows": // not sure if this is the best command but seems to be the most reliable based on the comments in // https://stackoverflow.com/questions/3739327/launching-a-website-via-the-windows-commandline#answer-49115945 return exec.Command("rundll32", "url.dll,FileProtocolHandler", url).Start() default: return exec.Command("xdg-open", url).Start() } } // YesNoPrompt performs a console prompt that asks the user for Yes/No answer. // // If the user just press Enter (aka. doesn't type anything) it returns the fallback value. func YesNoPrompt(message string, fallback bool) bool { options := "Y/n" if !fallback { options = "y/N" } r := bufio.NewReader(os.Stdin) var s string for { fmt.Fprintf(os.Stderr, "%s (%s) ", message, options) s, _ = r.ReadString('\n') s = strings.ToLower(strings.TrimSpace(s)) switch s { case "": return fallback case "y", "yes": return true case "n", "no": return false } } }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/osutils/run_test.go
tools/osutils/run_test.go
package osutils import ( "os" "strconv" "testing" ) func TestIsProbablyGoRun(t *testing.T) { scenarios := []struct { arg0 string runDirs []string expected bool }{ {"", nil, false}, {"/a/b", nil, false}, {"/a/b", []string{""}, false}, {"/a/b", []string{"/b/"}, false}, {"/a/b", []string{"/a/"}, true}, {"/a/b", []string{"", "/b/", "/a/"}, true}, } originalArgs := os.Args defer func() { os.Args = originalArgs }() originalRunDirs := runDirs defer func() { runDirs = originalRunDirs }() for i, s := range scenarios { t.Run(strconv.Itoa(i)+"_"+s.arg0, func(t *testing.T) { os.Args = []string{s.arg0} runDirs = s.runDirs result := IsProbablyGoRun() if result != s.expected { t.Fatalf("Expected %v, got %v", s.expected, result) } }) } }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/osutils/run.go
tools/osutils/run.go
package osutils import ( "os" "strings" ) var runDirs = []string{os.TempDir(), cacheDir()} // IsProbablyGoRun loosely checks if the current program was started with "go run". func IsProbablyGoRun() bool { for _, dir := range runDirs { if dir != "" && strings.HasPrefix(os.Args[0], dir) { return true } } return false } func cacheDir() string { dir := os.Getenv("GOCACHE") if dir == "off" { return "" } if dir == "" { dir, _ = os.UserCacheDir() } return dir }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/osutils/dir.go
tools/osutils/dir.go
package osutils import ( "errors" "os" "path/filepath" "github.com/pocketbase/pocketbase/tools/list" ) // MoveDirContent moves the src dir content, that is not listed in the exclude list, // to dest dir (it will be created if missing). // // The rootExclude argument is used to specify a list of src root entries to exclude. // // Note that this method doesn't delete the old src dir. // // It is an alternative to os.Rename() for the cases where we can't // rename/delete the src dir (see https://github.com/pocketbase/pocketbase/issues/2519). func MoveDirContent(src string, dest string, rootExclude ...string) error { entries, err := os.ReadDir(src) if err != nil { return err } // make sure that the dest dir exist manuallyCreatedDestDir := false if _, err := os.Stat(dest); err != nil { if err := os.Mkdir(dest, os.ModePerm); err != nil { return err } manuallyCreatedDestDir = true } moved := map[string]string{} tryRollback := func() []error { errs := []error{} for old, new := range moved { if err := os.Rename(new, old); err != nil { errs = append(errs, err) } } // try to delete manually the created dest dir if all moved files were restored if manuallyCreatedDestDir && len(errs) == 0 { if err := os.Remove(dest); err != nil { errs = append(errs, err) } } return errs } for _, entry := range entries { basename := entry.Name() if list.ExistInSlice(basename, rootExclude) { continue } old := filepath.Join(src, basename) new := filepath.Join(dest, basename) if err := os.Rename(old, new); err != nil { if errs := tryRollback(); len(errs) > 0 { errs = append(errs, err) err = errors.Join(errs...) } return err } moved[old] = new } return nil }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/auth/gitea.go
tools/auth/gitea.go
package auth import ( "context" "encoding/json" "strconv" "github.com/pocketbase/pocketbase/tools/types" "golang.org/x/oauth2" ) func init() { Providers[NameGitea] = wrapFactory(NewGiteaProvider) } var _ Provider = (*Gitea)(nil) // NameGitea is the unique name of the Gitea provider. const NameGitea string = "gitea" // Gitea allows authentication via Gitea OAuth2. type Gitea struct { BaseProvider } // NewGiteaProvider creates new Gitea provider instance with some defaults. func NewGiteaProvider() *Gitea { return &Gitea{BaseProvider{ ctx: context.Background(), displayName: "Gitea", pkce: true, scopes: []string{"read:user", "user:email"}, authURL: "https://gitea.com/login/oauth/authorize", tokenURL: "https://gitea.com/login/oauth/access_token", userInfoURL: "https://gitea.com/api/v1/user", }} } // FetchAuthUser returns an AuthUser instance based on Gitea's user api. // // API reference: https://try.gitea.io/api/swagger#/user/userGetCurrent func (p *Gitea) FetchAuthUser(token *oauth2.Token) (*AuthUser, error) { data, err := p.FetchRawUserInfo(token) if err != nil { return nil, err } rawUser := map[string]any{} if err := json.Unmarshal(data, &rawUser); err != nil { return nil, err } extracted := struct { Name string `json:"full_name"` Username string `json:"login"` Email string `json:"email"` AvatarURL string `json:"avatar_url"` Id int64 `json:"id"` }{} if err := json.Unmarshal(data, &extracted); err != nil { return nil, err } user := &AuthUser{ Id: strconv.FormatInt(extracted.Id, 10), Name: extracted.Name, Username: extracted.Username, Email: extracted.Email, AvatarURL: extracted.AvatarURL, RawUser: rawUser, AccessToken: token.AccessToken, RefreshToken: token.RefreshToken, } user.Expiry, _ = types.ParseDateTime(token.Expiry) return user, nil }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/auth/patreon.go
tools/auth/patreon.go
package auth import ( "context" "encoding/json" "github.com/pocketbase/pocketbase/tools/types" "golang.org/x/oauth2" "golang.org/x/oauth2/endpoints" ) func init() { Providers[NamePatreon] = wrapFactory(NewPatreonProvider) } var _ Provider = (*Patreon)(nil) // NamePatreon is the unique name of the Patreon provider. const NamePatreon string = "patreon" // Patreon allows authentication via Patreon OAuth2. type Patreon struct { BaseProvider } // NewPatreonProvider creates new Patreon provider instance with some defaults. func NewPatreonProvider() *Patreon { return &Patreon{BaseProvider{ ctx: context.Background(), displayName: "Patreon", pkce: true, scopes: []string{"identity", "identity[email]"}, authURL: endpoints.Patreon.AuthURL, tokenURL: endpoints.Patreon.TokenURL, userInfoURL: "https://www.patreon.com/api/oauth2/v2/identity?fields%5Buser%5D=full_name,email,vanity,image_url,is_email_verified", }} } // FetchAuthUser returns an AuthUser instance based on the Patreons's identity api. // // API reference: // https://docs.patreon.com/#get-api-oauth2-v2-identity // https://docs.patreon.com/#user-v2 func (p *Patreon) FetchAuthUser(token *oauth2.Token) (*AuthUser, error) { data, err := p.FetchRawUserInfo(token) if err != nil { return nil, err } rawUser := map[string]any{} if err := json.Unmarshal(data, &rawUser); err != nil { return nil, err } extracted := struct { Data struct { Id string `json:"id"` Attributes struct { Email string `json:"email"` Name string `json:"full_name"` Username string `json:"vanity"` AvatarURL string `json:"image_url"` IsEmailVerified bool `json:"is_email_verified"` } `json:"attributes"` } `json:"data"` }{} if err := json.Unmarshal(data, &extracted); err != nil { return nil, err } user := &AuthUser{ Id: extracted.Data.Id, Username: extracted.Data.Attributes.Username, Name: extracted.Data.Attributes.Name, AvatarURL: extracted.Data.Attributes.AvatarURL, RawUser: rawUser, AccessToken: token.AccessToken, RefreshToken: token.RefreshToken, } user.Expiry, _ = types.ParseDateTime(token.Expiry) if extracted.Data.Attributes.IsEmailVerified { user.Email = extracted.Data.Attributes.Email } return user, nil }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/auth/bitbucket.go
tools/auth/bitbucket.go
package auth import ( "context" "encoding/json" "errors" "io" "github.com/pocketbase/pocketbase/tools/types" "golang.org/x/oauth2" ) func init() { Providers[NameBitbucket] = wrapFactory(NewBitbucketProvider) } var _ Provider = (*Bitbucket)(nil) // NameBitbucket is the unique name of the Bitbucket provider. const NameBitbucket = "bitbucket" // Bitbucket is an auth provider for Bitbucket. type Bitbucket struct { BaseProvider } // NewBitbucketProvider creates a new Bitbucket provider instance with some defaults. func NewBitbucketProvider() *Bitbucket { return &Bitbucket{BaseProvider{ ctx: context.Background(), displayName: "Bitbucket", pkce: false, scopes: []string{"account"}, authURL: "https://bitbucket.org/site/oauth2/authorize", tokenURL: "https://bitbucket.org/site/oauth2/access_token", userInfoURL: "https://api.bitbucket.org/2.0/user", }} } // FetchAuthUser returns an AuthUser instance based on the Bitbucket's user API. // // API reference: https://developer.atlassian.com/cloud/bitbucket/rest/api-group-users/#api-user-get func (p *Bitbucket) FetchAuthUser(token *oauth2.Token) (*AuthUser, error) { data, err := p.FetchRawUserInfo(token) if err != nil { return nil, err } rawUser := map[string]any{} if err := json.Unmarshal(data, &rawUser); err != nil { return nil, err } extracted := struct { UUID string `json:"uuid"` Username string `json:"username"` DisplayName string `json:"display_name"` AccountStatus string `json:"account_status"` Links struct { Avatar struct { Href string `json:"href"` } `json:"avatar"` } `json:"links"` }{} if err := json.Unmarshal(data, &extracted); err != nil { return nil, err } if extracted.AccountStatus != "active" { return nil, errors.New("the Bitbucket user is not active") } email, err := p.fetchPrimaryEmail(token) if err != nil { return nil, err } user := &AuthUser{ Id: extracted.UUID, Name: extracted.DisplayName, Username: extracted.Username, Email: email, AvatarURL: extracted.Links.Avatar.Href, RawUser: rawUser, AccessToken: token.AccessToken, RefreshToken: token.RefreshToken, } user.Expiry, _ = types.ParseDateTime(token.Expiry) return user, nil } // fetchPrimaryEmail sends an API request to retrieve the first // verified primary email. // // NB! This method can succeed and still return an empty email. // Error responses that are result of insufficient scopes permissions are ignored. // // API reference: https://developer.atlassian.com/cloud/bitbucket/rest/api-group-users/#api-user-emails-get func (p *Bitbucket) fetchPrimaryEmail(token *oauth2.Token) (string, error) { response, err := p.Client(token).Get(p.userInfoURL + "/emails") if err != nil { return "", err } defer response.Body.Close() // ignore common http errors caused by insufficient scope permissions // (the email field is optional, aka. return the auth user without it) if response.StatusCode >= 400 { return "", nil } data, err := io.ReadAll(response.Body) if err != nil { return "", err } expected := struct { Values []struct { Email string `json:"email"` IsPrimary bool `json:"is_primary"` } `json:"values"` }{} if err := json.Unmarshal(data, &expected); err != nil { return "", err } for _, v := range expected.Values { if v.IsPrimary { return v.Email, nil } } return "", nil }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/auth/facebook.go
tools/auth/facebook.go
package auth import ( "context" "encoding/json" "github.com/pocketbase/pocketbase/tools/types" "golang.org/x/oauth2" "golang.org/x/oauth2/facebook" ) func init() { Providers[NameFacebook] = wrapFactory(NewFacebookProvider) } var _ Provider = (*Facebook)(nil) // NameFacebook is the unique name of the Facebook provider. const NameFacebook string = "facebook" // Facebook allows authentication via Facebook OAuth2. type Facebook struct { BaseProvider } // NewFacebookProvider creates new Facebook provider instance with some defaults. func NewFacebookProvider() *Facebook { return &Facebook{BaseProvider{ ctx: context.Background(), displayName: "Facebook", pkce: true, scopes: []string{"email"}, authURL: facebook.Endpoint.AuthURL, tokenURL: facebook.Endpoint.TokenURL, userInfoURL: "https://graph.facebook.com/me?fields=name,email,picture.type(large)", }} } // FetchAuthUser returns an AuthUser instance based on the Facebook's user api. // // API reference: https://developers.facebook.com/docs/graph-api/reference/user/ func (p *Facebook) FetchAuthUser(token *oauth2.Token) (*AuthUser, error) { data, err := p.FetchRawUserInfo(token) if err != nil { return nil, err } rawUser := map[string]any{} if err := json.Unmarshal(data, &rawUser); err != nil { return nil, err } extracted := struct { Id string Name string Email string Picture struct { Data struct{ Url string } } }{} if err := json.Unmarshal(data, &extracted); err != nil { return nil, err } user := &AuthUser{ Id: extracted.Id, Name: extracted.Name, Email: extracted.Email, AvatarURL: extracted.Picture.Data.Url, RawUser: rawUser, AccessToken: token.AccessToken, RefreshToken: token.RefreshToken, } user.Expiry, _ = types.ParseDateTime(token.Expiry) return user, nil }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/auth/notion.go
tools/auth/notion.go
package auth import ( "context" "encoding/json" "net/http" "github.com/pocketbase/pocketbase/tools/types" "golang.org/x/oauth2" ) func init() { Providers[NameNotion] = wrapFactory(NewNotionProvider) } var _ Provider = (*Notion)(nil) // NameNotion is the unique name of the Notion provider. const NameNotion string = "notion" // Notion allows authentication via Notion OAuth2. type Notion struct { BaseProvider } // NewNotionProvider creates new Notion provider instance with some defaults. func NewNotionProvider() *Notion { return &Notion{BaseProvider{ ctx: context.Background(), displayName: "Notion", pkce: true, authURL: "https://api.notion.com/v1/oauth/authorize", tokenURL: "https://api.notion.com/v1/oauth/token", userInfoURL: "https://api.notion.com/v1/users/me", }} } // FetchAuthUser returns an AuthUser instance based on the Notion's User api. // API reference: https://developers.notion.com/reference/get-self func (p *Notion) FetchAuthUser(token *oauth2.Token) (*AuthUser, error) { data, err := p.FetchRawUserInfo(token) if err != nil { return nil, err } rawUser := map[string]any{} if err := json.Unmarshal(data, &rawUser); err != nil { return nil, err } extracted := struct { AvatarURL string `json:"avatar_url"` Bot struct { Owner struct { Type string `json:"type"` User struct { AvatarURL string `json:"avatar_url"` Id string `json:"id"` Name string `json:"name"` Person struct { Email string `json:"email"` } `json:"person"` } `json:"user"` } `json:"owner"` WorkspaceName string `json:"workspace_name"` } `json:"bot"` Id string `json:"id"` Name string `json:"name"` Object string `json:"object"` RequestId string `json:"request_id"` Type string `json:"type"` }{} if err := json.Unmarshal(data, &extracted); err != nil { return nil, err } user := &AuthUser{ Id: extracted.Bot.Owner.User.Id, Name: extracted.Bot.Owner.User.Name, Email: extracted.Bot.Owner.User.Person.Email, AvatarURL: extracted.Bot.Owner.User.AvatarURL, RawUser: rawUser, AccessToken: token.AccessToken, RefreshToken: token.RefreshToken, } user.Expiry, _ = types.ParseDateTime(token.Expiry) return user, nil } // FetchRawUserInfo implements Provider.FetchRawUserInfo interface method. // // This differ from BaseProvider because Notion requires a version header for all requests // (https://developers.notion.com/reference/versioning). func (p *Notion) FetchRawUserInfo(token *oauth2.Token) ([]byte, error) { req, err := http.NewRequestWithContext(p.ctx, "GET", p.userInfoURL, nil) if err != nil { return nil, err } req.Header.Set("Notion-Version", "2022-06-28") return p.sendRawUserInfoRequest(req, token) }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/auth/yandex.go
tools/auth/yandex.go
package auth import ( "context" "encoding/json" "github.com/pocketbase/pocketbase/tools/types" "golang.org/x/oauth2" "golang.org/x/oauth2/yandex" ) func init() { Providers[NameYandex] = wrapFactory(NewYandexProvider) } var _ Provider = (*Yandex)(nil) // NameYandex is the unique name of the Yandex provider. const NameYandex string = "yandex" // Yandex allows authentication via Yandex OAuth2. type Yandex struct { BaseProvider } // NewYandexProvider creates new Yandex provider instance with some defaults. // // Docs: https://yandex.ru/dev/id/doc/en/ func NewYandexProvider() *Yandex { return &Yandex{BaseProvider{ ctx: context.Background(), displayName: "Yandex", pkce: true, scopes: []string{"login:email", "login:avatar", "login:info"}, authURL: yandex.Endpoint.AuthURL, tokenURL: yandex.Endpoint.TokenURL, userInfoURL: "https://login.yandex.ru/info", }} } // FetchAuthUser returns an AuthUser instance based on Yandex's user api. // // API reference: https://yandex.ru/dev/id/doc/en/user-information#response-format func (p *Yandex) FetchAuthUser(token *oauth2.Token) (*AuthUser, error) { data, err := p.FetchRawUserInfo(token) if err != nil { return nil, err } rawUser := map[string]any{} if err := json.Unmarshal(data, &rawUser); err != nil { return nil, err } extracted := struct { Id string `json:"id"` Name string `json:"real_name"` Username string `json:"login"` Email string `json:"default_email"` IsAvatarEmpty bool `json:"is_avatar_empty"` AvatarId string `json:"default_avatar_id"` }{} if err := json.Unmarshal(data, &extracted); err != nil { return nil, err } user := &AuthUser{ Id: extracted.Id, Name: extracted.Name, Username: extracted.Username, Email: extracted.Email, RawUser: rawUser, AccessToken: token.AccessToken, RefreshToken: token.RefreshToken, } user.Expiry, _ = types.ParseDateTime(token.Expiry) if !extracted.IsAvatarEmpty { user.AvatarURL = "https://avatars.yandex.net/get-yapic/" + extracted.AvatarId + "/islands-200" } return user, nil }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/auth/spotify.go
tools/auth/spotify.go
package auth import ( "context" "encoding/json" "github.com/pocketbase/pocketbase/tools/types" "golang.org/x/oauth2" "golang.org/x/oauth2/spotify" ) func init() { Providers[NameSpotify] = wrapFactory(NewSpotifyProvider) } var _ Provider = (*Spotify)(nil) // NameSpotify is the unique name of the Spotify provider. const NameSpotify string = "spotify" // Spotify allows authentication via Spotify OAuth2. type Spotify struct { BaseProvider } // NewSpotifyProvider creates a new Spotify provider instance with some defaults. func NewSpotifyProvider() *Spotify { return &Spotify{BaseProvider{ ctx: context.Background(), displayName: "Spotify", pkce: true, scopes: []string{ "user-read-private", // currently Spotify doesn't return information whether the email is verified or not // "user-read-email", }, authURL: spotify.Endpoint.AuthURL, tokenURL: spotify.Endpoint.TokenURL, userInfoURL: "https://api.spotify.com/v1/me", }} } // FetchAuthUser returns an AuthUser instance based on the Spotify's user api. // // API reference: https://developer.spotify.com/documentation/web-api/reference/#/operations/get-current-users-profile func (p *Spotify) FetchAuthUser(token *oauth2.Token) (*AuthUser, error) { data, err := p.FetchRawUserInfo(token) if err != nil { return nil, err } rawUser := map[string]any{} if err := json.Unmarshal(data, &rawUser); err != nil { return nil, err } extracted := struct { Id string `json:"id"` Name string `json:"display_name"` Images []struct { URL string `json:"url"` } `json:"images"` // don't map the email because per the official docs // the email field is "unverified" and there is no proof // that it actually belongs to the user // Email string `json:"email"` }{} if err := json.Unmarshal(data, &extracted); err != nil { return nil, err } user := &AuthUser{ Id: extracted.Id, Name: extracted.Name, RawUser: rawUser, AccessToken: token.AccessToken, RefreshToken: token.RefreshToken, } user.Expiry, _ = types.ParseDateTime(token.Expiry) if len(extracted.Images) > 0 { user.AvatarURL = extracted.Images[0].URL } return user, nil }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/auth/microsoft.go
tools/auth/microsoft.go
package auth import ( "context" "encoding/json" "github.com/pocketbase/pocketbase/tools/types" "golang.org/x/oauth2" "golang.org/x/oauth2/microsoft" ) func init() { Providers[NameMicrosoft] = wrapFactory(NewMicrosoftProvider) } var _ Provider = (*Microsoft)(nil) // NameMicrosoft is the unique name of the Microsoft provider. const NameMicrosoft string = "microsoft" // Microsoft allows authentication via AzureADEndpoint OAuth2. type Microsoft struct { BaseProvider } // NewMicrosoftProvider creates new Microsoft AD provider instance with some defaults. func NewMicrosoftProvider() *Microsoft { endpoints := microsoft.AzureADEndpoint("") return &Microsoft{BaseProvider{ ctx: context.Background(), displayName: "Microsoft", pkce: true, scopes: []string{"User.Read"}, authURL: endpoints.AuthURL, tokenURL: endpoints.TokenURL, userInfoURL: "https://graph.microsoft.com/v1.0/me", }} } // FetchAuthUser returns an AuthUser instance based on the Microsoft's user api. // // API reference: https://learn.microsoft.com/en-us/azure/active-directory/develop/userinfo // Graph explorer: https://developer.microsoft.com/en-us/graph/graph-explorer func (p *Microsoft) FetchAuthUser(token *oauth2.Token) (*AuthUser, error) { data, err := p.FetchRawUserInfo(token) if err != nil { return nil, err } rawUser := map[string]any{} if err := json.Unmarshal(data, &rawUser); err != nil { return nil, err } extracted := struct { Id string `json:"id"` Name string `json:"displayName"` Email string `json:"mail"` }{} if err := json.Unmarshal(data, &extracted); err != nil { return nil, err } user := &AuthUser{ Id: extracted.Id, Name: extracted.Name, Email: extracted.Email, RawUser: rawUser, AccessToken: token.AccessToken, RefreshToken: token.RefreshToken, } user.Expiry, _ = types.ParseDateTime(token.Expiry) return user, nil }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/auth/twitter.go
tools/auth/twitter.go
package auth import ( "context" "encoding/json" "github.com/pocketbase/pocketbase/tools/types" "golang.org/x/oauth2" ) func init() { Providers[NameTwitter] = wrapFactory(NewTwitterProvider) } var _ Provider = (*Twitter)(nil) // NameTwitter is the unique name of the Twitter provider. const NameTwitter string = "twitter" // Twitter allows authentication via Twitter OAuth2. type Twitter struct { BaseProvider } // NewTwitterProvider creates new Twitter provider instance with some defaults. func NewTwitterProvider() *Twitter { return &Twitter{BaseProvider{ ctx: context.Background(), displayName: "X/Twitter", pkce: true, scopes: []string{ "users.read", "users.email", // we don't actually use this scope, but for some reason the `/2/users/me` endpoint fails with 403 without it // (see https://docs.x.com/fundamentals/authentication/guides/v2-authentication-mapping#x-api-v2-authentication-mapping) "tweet.read", }, authURL: "https://x.com/i/oauth2/authorize", tokenURL: "https://api.x.com/2/oauth2/token", userInfoURL: "https://api.x.com/2/users/me?user.fields=id,name,username,profile_image_url,confirmed_email", }} } // FetchAuthUser returns an AuthUser instance based on the Twitter's user api. // // API reference: https://docs.x.com/x-api/users/user-lookup-me func (p *Twitter) FetchAuthUser(token *oauth2.Token) (*AuthUser, error) { data, err := p.FetchRawUserInfo(token) if err != nil { return nil, err } rawUser := map[string]any{} if err := json.Unmarshal(data, &rawUser); err != nil { return nil, err } extracted := struct { Data struct { Id string `json:"id"` Name string `json:"name"` Username string `json:"username"` Email string `json:"confirmed_email"` ProfileImageURL string `json:"profile_image_url"` } `json:"data"` }{} if err := json.Unmarshal(data, &extracted); err != nil { return nil, err } user := &AuthUser{ Id: extracted.Data.Id, Name: extracted.Data.Name, Username: extracted.Data.Username, Email: extracted.Data.Email, AvatarURL: extracted.Data.ProfileImageURL, RawUser: rawUser, AccessToken: token.AccessToken, RefreshToken: token.RefreshToken, } user.Expiry, _ = types.ParseDateTime(token.Expiry) return user, nil }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/auth/gitee.go
tools/auth/gitee.go
package auth import ( "context" "encoding/json" "io" "strconv" "github.com/go-ozzo/ozzo-validation/v4/is" "github.com/pocketbase/pocketbase/tools/types" "golang.org/x/oauth2" ) func init() { Providers[NameGitee] = wrapFactory(NewGiteeProvider) } var _ Provider = (*Gitee)(nil) // NameGitee is the unique name of the Gitee provider. const NameGitee string = "gitee" // Gitee allows authentication via Gitee OAuth2. type Gitee struct { BaseProvider } // NewGiteeProvider creates new Gitee provider instance with some defaults. func NewGiteeProvider() *Gitee { return &Gitee{BaseProvider{ ctx: context.Background(), displayName: "Gitee", pkce: true, scopes: []string{"user_info", "emails"}, authURL: "https://gitee.com/oauth/authorize", tokenURL: "https://gitee.com/oauth/token", userInfoURL: "https://gitee.com/api/v5/user", }} } // FetchAuthUser returns an AuthUser instance based the Gitee's user api. // // API reference: https://gitee.com/api/v5/swagger#/getV5User func (p *Gitee) FetchAuthUser(token *oauth2.Token) (*AuthUser, error) { data, err := p.FetchRawUserInfo(token) if err != nil { return nil, err } rawUser := map[string]any{} if err := json.Unmarshal(data, &rawUser); err != nil { return nil, err } extracted := struct { Login string `json:"login"` Name string `json:"name"` Email string `json:"email"` AvatarURL string `json:"avatar_url"` Id int64 `json:"id"` }{} if err := json.Unmarshal(data, &extracted); err != nil { return nil, err } user := &AuthUser{ Id: strconv.FormatInt(extracted.Id, 10), Name: extracted.Name, Username: extracted.Login, AvatarURL: extracted.AvatarURL, RawUser: rawUser, AccessToken: token.AccessToken, RefreshToken: token.RefreshToken, } user.Expiry, _ = types.ParseDateTime(token.Expiry) if extracted.Email != "" && is.EmailFormat.Validate(extracted.Email) == nil { // valid public primary email user.Email = extracted.Email } else { // send an additional optional request to retrieve the email email, err := p.fetchPrimaryEmail(token) if err != nil { return nil, err } user.Email = email } return user, nil } // fetchPrimaryEmail sends an API request to retrieve the verified primary email, // in case the user hasn't set "Public email address" or has unchecked // the "Access your emails data" permission during authentication. // // NB! This method can succeed and still return an empty email. // Error responses that are result of insufficient scopes permissions are ignored. // // API reference: https://gitee.com/api/v5/swagger#/getV5Emails func (p *Gitee) fetchPrimaryEmail(token *oauth2.Token) (string, error) { client := p.Client(token) response, err := client.Get("https://gitee.com/api/v5/emails") if err != nil { return "", err } defer response.Body.Close() // ignore common http errors caused by insufficient scope permissions if response.StatusCode == 401 || response.StatusCode == 403 || response.StatusCode == 404 { return "", nil } content, err := io.ReadAll(response.Body) if err != nil { return "", err } emails := []struct { Email string State string Scope []string }{} if err := json.Unmarshal(content, &emails); err != nil { // ignore unmarshal error in case "Keep my email address private" // was set because response.Body will be something like: // {"email":"12285415+test@user.noreply.gitee.com"} return "", nil } // extract the first verified primary email for _, email := range emails { for _, scope := range email.Scope { if email.State == "confirmed" && scope == "primary" && is.EmailFormat.Validate(email.Email) == nil { return email.Email, nil } } } return "", nil }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/auth/box.go
tools/auth/box.go
package auth import ( "context" "encoding/json" "fmt" "github.com/pocketbase/pocketbase/tools/types" "golang.org/x/oauth2" ) func init() { Providers[NameBox] = wrapFactory(NewBoxProvider) } var _ Provider = (*Box)(nil) // NameBox is the unique name of the Box provider. const NameBox = "box" // Box is an auth provider for Box. type Box struct { BaseProvider } // NewBoxProvider creates a new Box provider instance with some defaults. func NewBoxProvider() *Box { return &Box{BaseProvider{ ctx: context.Background(), displayName: "Box", pkce: true, scopes: []string{"root_readonly"}, authURL: "https://account.box.com/api/oauth2/authorize", tokenURL: "https://api.box.com/oauth2/token", userInfoURL: "https://api.box.com/2.0/users/me", }} } // FetchAuthUser returns an AuthUser instance based on the Box's user API. // // API reference: https://developer.box.com/reference/get-users-me/ func (p *Box) FetchAuthUser(token *oauth2.Token) (*AuthUser, error) { data, err := p.FetchRawUserInfo(token) if err != nil { return nil, err } rawUser := map[string]any{} if err := json.Unmarshal(data, &rawUser); err != nil { return nil, err } extracted := struct { Id string `json:"id"` Name string `json:"name"` Login string `json:"login"` AvatarURL string `json:"avatar_url"` Status string `json:"status"` }{} if err := json.Unmarshal(data, &extracted); err != nil { return nil, err } if extracted.Status != "active" { return nil, fmt.Errorf("Box user account is not active (status: %q)", extracted.Status) } user := &AuthUser{ Id: extracted.Id, Name: extracted.Name, AvatarURL: extracted.AvatarURL, Email: extracted.Login, // Box requires verified email for OAuth authorization RawUser: rawUser, AccessToken: token.AccessToken, RefreshToken: token.RefreshToken, } user.Expiry, _ = types.ParseDateTime(token.Expiry) return user, nil }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/auth/oidc.go
tools/auth/oidc.go
package auth import ( "context" "encoding/json" "errors" "fmt" "os" "strconv" "time" "github.com/golang-jwt/jwt/v5" "github.com/pocketbase/pocketbase/tools/auth/internal/jwk" "github.com/pocketbase/pocketbase/tools/security" "github.com/pocketbase/pocketbase/tools/types" "github.com/spf13/cast" "golang.org/x/oauth2" ) // idTokenLeeway is the optional leeway for the id_token timestamp fields validation. // // It can be changed externally using the PB_ID_TOKEN_LEEWAY env variable // (the value must be in seconds, e.g. "PB_ID_TOKEN_LEEWAY=60" for 1 minute). var idTokenLeeway time.Duration = 5 * time.Minute func init() { Providers[NameOIDC] = wrapFactory(NewOIDCProvider) Providers[NameOIDC+"2"] = wrapFactory(NewOIDCProvider) Providers[NameOIDC+"3"] = wrapFactory(NewOIDCProvider) if leewayStr := os.Getenv("PB_ID_TOKEN_LEEWAY"); leewayStr != "" { leeway, err := strconv.Atoi(leewayStr) if err == nil { idTokenLeeway = time.Duration(leeway) * time.Second } } } var _ Provider = (*OIDC)(nil) // NameOIDC is the unique name of the OpenID Connect (OIDC) provider. const NameOIDC string = "oidc" // OIDC allows authentication via OpenID Connect (OIDC) OAuth2 provider. // // If specified the user data is fetched from the userInfoURL. // Otherwise - from the id_token payload. // // The provider support the following Extra config options: // - "jwksURL" - url to the keys to validate the id_token signature (optional and used only when reading the user data from the id_token) // - "issuers" - list of valid issuers for the iss id_token claim (optioanl and used only when reading the user data from the id_token) type OIDC struct { BaseProvider } // NewOIDCProvider creates new OpenID Connect (OIDC) provider instance with some defaults. func NewOIDCProvider() *OIDC { return &OIDC{BaseProvider{ ctx: context.Background(), displayName: "OIDC", pkce: true, scopes: []string{ "openid", // minimal requirement to return the id "email", "profile", }, }} } // FetchAuthUser returns an AuthUser instance based the provider's user api. // // API reference: https://openid.net/specs/openid-connect-core-1_0.html#StandardClaims func (p *OIDC) FetchAuthUser(token *oauth2.Token) (*AuthUser, error) { data, err := p.FetchRawUserInfo(token) if err != nil { return nil, err } rawUser := map[string]any{} if err := json.Unmarshal(data, &rawUser); err != nil { return nil, err } extracted := struct { Id string `json:"sub"` Name string `json:"name"` Username string `json:"preferred_username"` Picture string `json:"picture"` Email string `json:"email"` EmailVerified any `json:"email_verified"` // see #6657 }{} if err := json.Unmarshal(data, &extracted); err != nil { return nil, err } user := &AuthUser{ Id: extracted.Id, Name: extracted.Name, Username: extracted.Username, AvatarURL: extracted.Picture, RawUser: rawUser, AccessToken: token.AccessToken, RefreshToken: token.RefreshToken, } user.Expiry, _ = types.ParseDateTime(token.Expiry) if cast.ToBool(extracted.EmailVerified) { user.Email = extracted.Email } return user, nil } // FetchRawUserInfo implements Provider.FetchRawUserInfo interface method. // // It either fetch the data from p.userInfoURL, or if not set - returns the id_token claims. func (p *OIDC) FetchRawUserInfo(token *oauth2.Token) ([]byte, error) { if p.userInfoURL != "" { return p.BaseProvider.FetchRawUserInfo(token) } claims, err := p.parseIdToken(token) if err != nil { return nil, err } return json.Marshal(claims) } func (p *OIDC) parseIdToken(token *oauth2.Token) (jwt.MapClaims, error) { idToken := token.Extra("id_token").(string) if idToken == "" { return nil, errors.New("empty id_token") } claims := jwt.MapClaims{} _, _, err := jwt.NewParser().ParseUnverified(idToken, claims) if err != nil { return nil, err } // validate common claims jwtValidator := jwt.NewValidator( jwt.WithIssuedAt(), jwt.WithLeeway(idTokenLeeway), jwt.WithAudience(p.clientId), ) err = jwtValidator.Validate(claims) if err != nil { return nil, err } // validate iss (if "issuers" extra config is set) issuers := cast.ToStringSlice(p.Extra()["issuers"]) if len(issuers) > 0 { var isIssValid bool claimIssuer, _ := claims.GetIssuer() for _, issuer := range issuers { if security.Equal(claimIssuer, issuer) { isIssValid = true break } } if !isIssValid { return nil, fmt.Errorf("iss must be one of %v, got %#v", issuers, claims["iss"]) } } // validate signature (if "jwksURL" extra config is set) // // note: this step could be technically considered optional because we trust // the token which is a result of direct TLS communication with the provider // (see also https://openid.net/specs/openid-connect-core-1_0.html#IDTokenValidation) jwksURL := cast.ToString(p.Extra()["jwksURL"]) if jwksURL != "" { err = jwk.ValidateTokenSignature(p.ctx, idToken, jwksURL) if err != nil { return nil, fmt.Errorf("id_token validation failed: %w", err) } } return claims, nil }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/auth/base_provider.go
tools/auth/base_provider.go
package auth import ( "context" "fmt" "io" "maps" "net/http" "golang.org/x/oauth2" ) // BaseProvider defines common fields and methods used by OAuth2 client providers. type BaseProvider struct { ctx context.Context clientId string clientSecret string displayName string redirectURL string authURL string tokenURL string userInfoURL string scopes []string pkce bool extra map[string]any } // Context implements Provider.Context() interface method. func (p *BaseProvider) Context() context.Context { return p.ctx } // SetContext implements Provider.SetContext() interface method. func (p *BaseProvider) SetContext(ctx context.Context) { p.ctx = ctx } // PKCE implements Provider.PKCE() interface method. func (p *BaseProvider) PKCE() bool { return p.pkce } // SetPKCE implements Provider.SetPKCE() interface method. func (p *BaseProvider) SetPKCE(enable bool) { p.pkce = enable } // DisplayName implements Provider.DisplayName() interface method. func (p *BaseProvider) DisplayName() string { return p.displayName } // SetDisplayName implements Provider.SetDisplayName() interface method. func (p *BaseProvider) SetDisplayName(displayName string) { p.displayName = displayName } // Scopes implements Provider.Scopes() interface method. func (p *BaseProvider) Scopes() []string { return p.scopes } // SetScopes implements Provider.SetScopes() interface method. func (p *BaseProvider) SetScopes(scopes []string) { p.scopes = scopes } // ClientId implements Provider.ClientId() interface method. func (p *BaseProvider) ClientId() string { return p.clientId } // SetClientId implements Provider.SetClientId() interface method. func (p *BaseProvider) SetClientId(clientId string) { p.clientId = clientId } // ClientSecret implements Provider.ClientSecret() interface method. func (p *BaseProvider) ClientSecret() string { return p.clientSecret } // SetClientSecret implements Provider.SetClientSecret() interface method. func (p *BaseProvider) SetClientSecret(secret string) { p.clientSecret = secret } // RedirectURL implements Provider.RedirectURL() interface method. func (p *BaseProvider) RedirectURL() string { return p.redirectURL } // SetRedirectURL implements Provider.SetRedirectURL() interface method. func (p *BaseProvider) SetRedirectURL(url string) { p.redirectURL = url } // AuthURL implements Provider.AuthURL() interface method. func (p *BaseProvider) AuthURL() string { return p.authURL } // SetAuthURL implements Provider.SetAuthURL() interface method. func (p *BaseProvider) SetAuthURL(url string) { p.authURL = url } // TokenURL implements Provider.TokenURL() interface method. func (p *BaseProvider) TokenURL() string { return p.tokenURL } // SetTokenURL implements Provider.SetTokenURL() interface method. func (p *BaseProvider) SetTokenURL(url string) { p.tokenURL = url } // UserInfoURL implements Provider.UserInfoURL() interface method. func (p *BaseProvider) UserInfoURL() string { return p.userInfoURL } // SetUserInfoURL implements Provider.SetUserInfoURL() interface method. func (p *BaseProvider) SetUserInfoURL(url string) { p.userInfoURL = url } // Extra implements Provider.Extra() interface method. func (p *BaseProvider) Extra() map[string]any { return maps.Clone(p.extra) } // SetExtra implements Provider.SetExtra() interface method. func (p *BaseProvider) SetExtra(data map[string]any) { p.extra = data } // BuildAuthURL implements Provider.BuildAuthURL() interface method. func (p *BaseProvider) BuildAuthURL(state string, opts ...oauth2.AuthCodeOption) string { return p.oauth2Config().AuthCodeURL(state, opts...) } // FetchToken implements Provider.FetchToken() interface method. func (p *BaseProvider) FetchToken(code string, opts ...oauth2.AuthCodeOption) (*oauth2.Token, error) { return p.oauth2Config().Exchange(p.ctx, code, opts...) } // Client implements Provider.Client() interface method. func (p *BaseProvider) Client(token *oauth2.Token) *http.Client { return p.oauth2Config().Client(p.ctx, token) } // FetchRawUserInfo implements Provider.FetchRawUserInfo() interface method. func (p *BaseProvider) FetchRawUserInfo(token *oauth2.Token) ([]byte, error) { req, err := http.NewRequestWithContext(p.ctx, "GET", p.userInfoURL, nil) if err != nil { return nil, err } return p.sendRawUserInfoRequest(req, token) } // sendRawUserInfoRequest sends the specified user info request and return its raw response body. func (p *BaseProvider) sendRawUserInfoRequest(req *http.Request, token *oauth2.Token) ([]byte, error) { client := p.Client(token) res, err := client.Do(req) if err != nil { return nil, err } defer res.Body.Close() result, err := io.ReadAll(res.Body) if err != nil { return nil, err } // http.Client.Get doesn't treat non 2xx responses as error if res.StatusCode >= 400 { return nil, fmt.Errorf( "failed to fetch OAuth2 user profile via %s (%d):\n%s", p.userInfoURL, res.StatusCode, string(result), ) } return result, nil } // oauth2Config constructs a oauth2.Config instance based on the provider settings. func (p *BaseProvider) oauth2Config() *oauth2.Config { return &oauth2.Config{ RedirectURL: p.redirectURL, ClientID: p.clientId, ClientSecret: p.clientSecret, Scopes: p.scopes, Endpoint: oauth2.Endpoint{ AuthURL: p.authURL, TokenURL: p.tokenURL, }, } }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/auth/wakatime.go
tools/auth/wakatime.go
package auth import ( "context" "encoding/json" "github.com/pocketbase/pocketbase/tools/types" "golang.org/x/oauth2" ) func init() { Providers[NameWakatime] = wrapFactory(NewWakatimeProvider) } var _ Provider = (*Wakatime)(nil) // NameWakatime is the unique name of the Wakatime provider. const NameWakatime = "wakatime" // Wakatime is an auth provider for Wakatime. type Wakatime struct { BaseProvider } // NewWakatimeProvider creates a new Wakatime provider instance with some defaults. func NewWakatimeProvider() *Wakatime { return &Wakatime{BaseProvider{ ctx: context.Background(), displayName: "WakaTime", pkce: true, scopes: []string{"email"}, authURL: "https://wakatime.com/oauth/authorize", tokenURL: "https://wakatime.com/oauth/token", userInfoURL: "https://wakatime.com/api/v1/users/current", }} } // FetchAuthUser returns an AuthUser instance based on the Wakatime's user API. // // API reference: https://wakatime.com/developers#users func (p *Wakatime) FetchAuthUser(token *oauth2.Token) (*AuthUser, error) { data, err := p.FetchRawUserInfo(token) if err != nil { return nil, err } rawUser := map[string]any{} if err := json.Unmarshal(data, &rawUser); err != nil { return nil, err } extracted := struct { Data struct { Id string `json:"id"` DisplayName string `json:"display_name"` Username string `json:"username"` Email string `json:"email"` Photo string `json:"photo"` IsPhotoPublic bool `json:"photo_public"` IsEmailConfirmed bool `json:"is_email_confirmed"` } `json:"data"` }{} if err := json.Unmarshal(data, &extracted); err != nil { return nil, err } user := &AuthUser{ Id: extracted.Data.Id, Name: extracted.Data.DisplayName, Username: extracted.Data.Username, RawUser: rawUser, AccessToken: token.AccessToken, RefreshToken: token.RefreshToken, } // note: we don't check for is_email_public field because PocketBase // has its own emailVisibility flag which is false by default if extracted.Data.IsEmailConfirmed { user.Email = extracted.Data.Email } if extracted.Data.IsPhotoPublic { user.AvatarURL = extracted.Data.Photo } user.Expiry, _ = types.ParseDateTime(token.Expiry) return user, nil }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/auth/google.go
tools/auth/google.go
package auth import ( "context" "encoding/json" "github.com/pocketbase/pocketbase/tools/types" "golang.org/x/oauth2" ) func init() { Providers[NameGoogle] = wrapFactory(NewGoogleProvider) } var _ Provider = (*Google)(nil) // NameGoogle is the unique name of the Google provider. const NameGoogle string = "google" // Google allows authentication via Google OAuth2. type Google struct { BaseProvider } // NewGoogleProvider creates new Google provider instance with some defaults. func NewGoogleProvider() *Google { return &Google{BaseProvider{ ctx: context.Background(), displayName: "Google", pkce: true, scopes: []string{ "https://www.googleapis.com/auth/userinfo.profile", "https://www.googleapis.com/auth/userinfo.email", }, authURL: "https://accounts.google.com/o/oauth2/v2/auth", tokenURL: "https://oauth2.googleapis.com/token", userInfoURL: "https://www.googleapis.com/oauth2/v3/userinfo", }} } // FetchAuthUser returns an AuthUser instance based the Google's user api. func (p *Google) FetchAuthUser(token *oauth2.Token) (*AuthUser, error) { data, err := p.FetchRawUserInfo(token) if err != nil { return nil, err } rawUser := map[string]any{} if err := json.Unmarshal(data, &rawUser); err != nil { return nil, err } extracted := struct { Id string `json:"sub"` Name string `json:"name"` Picture string `json:"picture"` Email string `json:"email"` EmailVerified bool `json:"email_verified"` }{} if err := json.Unmarshal(data, &extracted); err != nil { return nil, err } user := &AuthUser{ Id: extracted.Id, Name: extracted.Name, AvatarURL: extracted.Picture, RawUser: rawUser, AccessToken: token.AccessToken, RefreshToken: token.RefreshToken, } user.Expiry, _ = types.ParseDateTime(token.Expiry) if extracted.EmailVerified { user.Email = extracted.Email } return user, nil }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/auth/livechat.go
tools/auth/livechat.go
package auth import ( "context" "encoding/json" "github.com/pocketbase/pocketbase/tools/types" "golang.org/x/oauth2" ) func init() { Providers[NameLivechat] = wrapFactory(NewLivechatProvider) } var _ Provider = (*Livechat)(nil) // NameLivechat is the unique name of the Livechat provider. const NameLivechat = "livechat" // Livechat allows authentication via Livechat OAuth2. type Livechat struct { BaseProvider } // NewLivechatProvider creates new Livechat provider instance with some defaults. func NewLivechatProvider() *Livechat { return &Livechat{BaseProvider{ ctx: context.Background(), displayName: "LiveChat", pkce: true, scopes: []string{}, // default scopes are specified from the provider dashboard authURL: "https://accounts.livechat.com/", tokenURL: "https://accounts.livechat.com/token", userInfoURL: "https://accounts.livechat.com/v2/accounts/me", }} } // FetchAuthUser returns an AuthUser based on the Livechat accounts API. // // API reference: https://developers.livechat.com/docs/authorization func (p *Livechat) FetchAuthUser(token *oauth2.Token) (*AuthUser, error) { data, err := p.FetchRawUserInfo(token) if err != nil { return nil, err } rawUser := map[string]any{} if err := json.Unmarshal(data, &rawUser); err != nil { return nil, err } extracted := struct { Id string `json:"account_id"` Name string `json:"name"` Email string `json:"email"` EmailVerified bool `json:"email_verified"` AvatarURL string `json:"avatar_url"` }{} if err := json.Unmarshal(data, &extracted); err != nil { return nil, err } user := &AuthUser{ Id: extracted.Id, Name: extracted.Name, AvatarURL: extracted.AvatarURL, RawUser: rawUser, AccessToken: token.AccessToken, RefreshToken: token.RefreshToken, } user.Expiry, _ = types.ParseDateTime(token.Expiry) if extracted.EmailVerified { user.Email = extracted.Email } return user, nil }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/auth/linear.go
tools/auth/linear.go
package auth import ( "bytes" "context" "encoding/json" "errors" "net/http" "github.com/pocketbase/pocketbase/tools/types" "golang.org/x/oauth2" ) func init() { Providers[NameLinear] = wrapFactory(NewLinearProvider) } var _ Provider = (*Linear)(nil) // NameLinear is the unique name of the Linear provider. const NameLinear string = "linear" // Linear allows authentication via Linear OAuth2. type Linear struct { BaseProvider } // NewLinearProvider creates new Linear provider instance with some defaults. // // API reference: https://developers.linear.app/docs/oauth/authentication func NewLinearProvider() *Linear { return &Linear{BaseProvider{ ctx: context.Background(), displayName: "Linear", pkce: false, // Linear doesn't support PKCE at the moment and returns an error if enabled scopes: []string{"read"}, authURL: "https://linear.app/oauth/authorize", tokenURL: "https://api.linear.app/oauth/token", userInfoURL: "https://api.linear.app/graphql", }} } // FetchAuthUser returns an AuthUser instance based on the Linear's user api. // // API reference: https://developers.linear.app/docs/graphql/working-with-the-graphql-api#authentication func (p *Linear) FetchAuthUser(token *oauth2.Token) (*AuthUser, error) { data, err := p.FetchRawUserInfo(token) if err != nil { return nil, err } rawUser := map[string]any{} if err := json.Unmarshal(data, &rawUser); err != nil { return nil, err } extracted := struct { Data struct { Viewer struct { Id string `json:"id"` DisplayName string `json:"displayName"` Name string `json:"name"` Email string `json:"email"` AvatarURL string `json:"avatarUrl"` Active bool `json:"active"` } `json:"viewer"` } `json:"data"` }{} if err := json.Unmarshal(data, &extracted); err != nil { return nil, err } if !extracted.Data.Viewer.Active { return nil, errors.New("the Linear user account is not active") } user := &AuthUser{ Id: extracted.Data.Viewer.Id, Name: extracted.Data.Viewer.Name, Username: extracted.Data.Viewer.DisplayName, Email: extracted.Data.Viewer.Email, AvatarURL: extracted.Data.Viewer.AvatarURL, RawUser: rawUser, AccessToken: token.AccessToken, RefreshToken: token.RefreshToken, } user.Expiry, _ = types.ParseDateTime(token.Expiry) return user, nil } // FetchRawUserInfo implements Provider.FetchRawUserInfo interface method. // // Linear doesn't have a UserInfo endpoint and information on the user // is retrieved using their GraphQL API (https://developers.linear.app/docs/graphql/working-with-the-graphql-api#queries-and-mutations) func (p *Linear) FetchRawUserInfo(token *oauth2.Token) ([]byte, error) { query := []byte(`{"query": "query Me { viewer { id displayName name email avatarUrl active } }"}`) bodyReader := bytes.NewReader(query) req, err := http.NewRequestWithContext(p.ctx, "POST", p.userInfoURL, bodyReader) if err != nil { return nil, err } req.Header.Set("Content-Type", "application/json") return p.sendRawUserInfoRequest(req, token) }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/auth/instagram.go
tools/auth/instagram.go
package auth import ( "context" "encoding/json" "github.com/pocketbase/pocketbase/tools/types" "golang.org/x/oauth2" ) func init() { Providers[NameInstagram] = wrapFactory(NewInstagramProvider) } var _ Provider = (*Instagram)(nil) // NameInstagram is the unique name of the Instagram provider. const NameInstagram string = "instagram2" // "2" suffix to avoid conflicts with the old deprecated version // Instagram allows authentication via Instagram Login OAuth2. type Instagram struct { BaseProvider } // NewInstagramProvider creates new Instagram provider instance with some defaults. func NewInstagramProvider() *Instagram { return &Instagram{BaseProvider{ ctx: context.Background(), displayName: "Instagram", pkce: true, scopes: []string{"instagram_business_basic"}, authURL: "https://www.instagram.com/oauth/authorize", tokenURL: "https://api.instagram.com/oauth/access_token", userInfoURL: "https://graph.instagram.com/me?fields=id,username,account_type,user_id,name,profile_picture_url,followers_count,follows_count,media_count", }} } // FetchAuthUser returns an AuthUser instance based on the Instagram Login user api response. // // API reference: https://developers.facebook.com/docs/instagram-platform/instagram-api-with-instagram-login/get-started#fields func (p *Instagram) FetchAuthUser(token *oauth2.Token) (*AuthUser, error) { data, err := p.FetchRawUserInfo(token) if err != nil { return nil, err } rawUser := map[string]any{} if err := json.Unmarshal(data, &rawUser); err != nil { return nil, err } // include list of granted permissions to RawUser's payload if _, ok := rawUser["permissions"]; !ok { if permissions := token.Extra("permissions"); permissions != nil { rawUser["permissions"] = permissions } } extracted := struct { Id string `json:"user_id"` Name string `json:"name"` Username string `json:"username"` AvatarURL string `json:"profile_picture_url"` }{} if err := json.Unmarshal(data, &extracted); err != nil { return nil, err } user := &AuthUser{ Id: extracted.Id, Username: extracted.Username, Name: extracted.Name, AvatarURL: extracted.AvatarURL, RawUser: rawUser, AccessToken: token.AccessToken, RefreshToken: token.RefreshToken, } user.Expiry, _ = types.ParseDateTime(token.Expiry) return user, nil }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/auth/monday.go
tools/auth/monday.go
package auth import ( "bytes" "context" "encoding/json" "errors" "net/http" "github.com/pocketbase/pocketbase/tools/types" "golang.org/x/oauth2" ) func init() { Providers[NameMonday] = wrapFactory(NewMondayProvider) } var _ Provider = (*Monday)(nil) // NameMonday is the unique name of the Monday provider. const NameMonday = "monday" // Monday is an auth provider for monday.com. type Monday struct { BaseProvider } // NewMondayProvider creates a new Monday provider instance with some defaults. func NewMondayProvider() *Monday { return &Monday{BaseProvider{ ctx: context.Background(), displayName: "monday.com", pkce: true, scopes: []string{"me:read"}, authURL: "https://auth.monday.com/oauth2/authorize", tokenURL: "https://auth.monday.com/oauth2/token", userInfoURL: "https://api.monday.com/v2", }} } // FetchAuthUser returns an AuthUser instance based on the Monday's user api. // // API reference: https://developer.monday.com/api-reference/reference/me func (p *Monday) FetchAuthUser(token *oauth2.Token) (*AuthUser, error) { data, err := p.FetchRawUserInfo(token) if err != nil { return nil, err } rawUser := map[string]any{} if err := json.Unmarshal(data, &rawUser); err != nil { return nil, err } extracted := struct { Data struct { Me struct { Id string `json:"id"` Enabled bool `json:"enabled"` Name string `json:"name"` Email string `json:"email"` IsVerified bool `json:"is_verified"` Avatar string `json:"photo_small"` } `json:"me"` } `json:"data"` }{} if err := json.Unmarshal(data, &extracted); err != nil { return nil, err } if !extracted.Data.Me.Enabled { return nil, errors.New("the monday.com user account is not enabled") } user := &AuthUser{ Id: extracted.Data.Me.Id, Name: extracted.Data.Me.Name, AvatarURL: extracted.Data.Me.Avatar, RawUser: rawUser, AccessToken: token.AccessToken, RefreshToken: token.RefreshToken, } if extracted.Data.Me.IsVerified { user.Email = extracted.Data.Me.Email } user.Expiry, _ = types.ParseDateTime(token.Expiry) return user, nil } // FetchRawUserInfo implements Provider.FetchRawUserInfo interface. // // monday.com doesn't have a UserInfo endpoint and information on the user // is retrieved using their GraphQL API (https://developer.monday.com/api-reference/reference/me#queries) func (p *Monday) FetchRawUserInfo(token *oauth2.Token) ([]byte, error) { query := []byte(`{"query": "query { me { id enabled name email is_verified photo_small }}"}`) bodyReader := bytes.NewReader(query) req, err := http.NewRequestWithContext(p.ctx, "POST", p.userInfoURL, bodyReader) if err != nil { return nil, err } req.Header.Set("Content-Type", "application/json") return p.sendRawUserInfoRequest(req, token) }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/auth/kakao.go
tools/auth/kakao.go
package auth import ( "context" "encoding/json" "strconv" "github.com/pocketbase/pocketbase/tools/types" "golang.org/x/oauth2" "golang.org/x/oauth2/kakao" ) func init() { Providers[NameKakao] = wrapFactory(NewKakaoProvider) } var _ Provider = (*Kakao)(nil) // NameKakao is the unique name of the Kakao provider. const NameKakao string = "kakao" // Kakao allows authentication via Kakao OAuth2. type Kakao struct { BaseProvider } // NewKakaoProvider creates a new Kakao provider instance with some defaults. func NewKakaoProvider() *Kakao { return &Kakao{BaseProvider{ ctx: context.Background(), displayName: "Kakao", pkce: true, scopes: []string{"account_email", "profile_nickname", "profile_image"}, authURL: kakao.Endpoint.AuthURL, tokenURL: kakao.Endpoint.TokenURL, userInfoURL: "https://kapi.kakao.com/v2/user/me", }} } // FetchAuthUser returns an AuthUser instance based on the Kakao's user api. // // API reference: https://developers.kakao.com/docs/latest/en/kakaologin/rest-api#req-user-info-response func (p *Kakao) FetchAuthUser(token *oauth2.Token) (*AuthUser, error) { data, err := p.FetchRawUserInfo(token) if err != nil { return nil, err } rawUser := map[string]any{} if err := json.Unmarshal(data, &rawUser); err != nil { return nil, err } extracted := struct { Profile struct { Nickname string `json:"nickname"` ImageURL string `json:"profile_image"` } `json:"properties"` KakaoAccount struct { Email string `json:"email"` IsEmailVerified bool `json:"is_email_verified"` IsEmailValid bool `json:"is_email_valid"` } `json:"kakao_account"` Id int64 `json:"id"` }{} if err := json.Unmarshal(data, &extracted); err != nil { return nil, err } user := &AuthUser{ Id: strconv.FormatInt(extracted.Id, 10), Username: extracted.Profile.Nickname, AvatarURL: extracted.Profile.ImageURL, RawUser: rawUser, AccessToken: token.AccessToken, RefreshToken: token.RefreshToken, } user.Expiry, _ = types.ParseDateTime(token.Expiry) if extracted.KakaoAccount.IsEmailValid && extracted.KakaoAccount.IsEmailVerified { user.Email = extracted.KakaoAccount.Email } return user, nil }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/auth/planningcenter.go
tools/auth/planningcenter.go
package auth import ( "context" "encoding/json" "errors" "github.com/pocketbase/pocketbase/tools/types" "golang.org/x/oauth2" ) func init() { Providers[NamePlanningcenter] = wrapFactory(NewPlanningcenterProvider) } var _ Provider = (*Planningcenter)(nil) // NamePlanningcenter is the unique name of the Planningcenter provider. const NamePlanningcenter string = "planningcenter" // Planningcenter allows authentication via Planningcenter OAuth2. type Planningcenter struct { BaseProvider } // NewPlanningcenterProvider creates a new Planningcenter provider instance with some defaults. func NewPlanningcenterProvider() *Planningcenter { return &Planningcenter{BaseProvider{ ctx: context.Background(), displayName: "Planning Center", pkce: true, scopes: []string{"people"}, authURL: "https://api.planningcenteronline.com/oauth/authorize", tokenURL: "https://api.planningcenteronline.com/oauth/token", userInfoURL: "https://api.planningcenteronline.com/people/v2/me", }} } // FetchAuthUser returns an AuthUser instance based on the Planningcenter's user api. // // API reference: https://developer.planning.center/docs/#/overview/authentication func (p *Planningcenter) FetchAuthUser(token *oauth2.Token) (*AuthUser, error) { data, err := p.FetchRawUserInfo(token) if err != nil { return nil, err } rawUser := map[string]any{} if err := json.Unmarshal(data, &rawUser); err != nil { return nil, err } extracted := struct { Data struct { Id string `json:"id"` Attributes struct { Status string `json:"status"` Name string `json:"name"` AvatarURL string `json:"avatar"` // don't map the email because users can have multiple assigned // and it's not clear if they are verified } } }{} if err := json.Unmarshal(data, &extracted); err != nil { return nil, err } if extracted.Data.Attributes.Status != "active" { return nil, errors.New("the user is not active") } user := &AuthUser{ Id: extracted.Data.Id, Name: extracted.Data.Attributes.Name, AvatarURL: extracted.Data.Attributes.AvatarURL, RawUser: rawUser, AccessToken: token.AccessToken, RefreshToken: token.RefreshToken, } user.Expiry, _ = types.ParseDateTime(token.Expiry) return user, nil }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/auth/trakt.go
tools/auth/trakt.go
package auth import ( "context" "encoding/json" "net/http" "github.com/pocketbase/pocketbase/tools/types" "golang.org/x/oauth2" ) func init() { Providers[NameTrakt] = wrapFactory(NewTraktProvider) } var _ Provider = (*Trakt)(nil) // NameTrakt is the unique name of the Trakt provider. const NameTrakt string = "trakt" // Trakt allows authentication via Trakt OAuth2. type Trakt struct { BaseProvider } // NewTraktProvider creates new Trakt provider instance with some defaults. func NewTraktProvider() *Trakt { return &Trakt{BaseProvider{ ctx: context.Background(), displayName: "Trakt", pkce: true, authURL: "https://trakt.tv/oauth/authorize", tokenURL: "https://api.trakt.tv/oauth/token", userInfoURL: "https://api.trakt.tv/users/settings", }} } // FetchAuthUser returns an AuthUser instance based on Trakt's user settings API. // API reference: https://trakt.docs.apiary.io/#reference/users/settings/retrieve-settings func (p *Trakt) FetchAuthUser(token *oauth2.Token) (*AuthUser, error) { data, err := p.FetchRawUserInfo(token) if err != nil { return nil, err } rawUser := map[string]any{} if err := json.Unmarshal(data, &rawUser); err != nil { return nil, err } extracted := struct { User struct { Username string `json:"username"` Name string `json:"name"` Ids struct { Slug string `json:"slug"` UUID string `json:"uuid"` } `json:"ids"` Images struct { Avatar struct { Full string `json:"full"` } `json:"avatar"` } `json:"images"` } `json:"user"` }{} if err := json.Unmarshal(data, &extracted); err != nil { return nil, err } user := &AuthUser{ Id: extracted.User.Ids.UUID, Username: extracted.User.Username, Name: extracted.User.Name, AvatarURL: extracted.User.Images.Avatar.Full, RawUser: rawUser, AccessToken: token.AccessToken, RefreshToken: token.RefreshToken, } user.Expiry, _ = types.ParseDateTime(token.Expiry) return user, nil } // FetchRawUserInfo implements Provider.FetchRawUserInfo interface method. // // This differ from BaseProvider because Trakt requires a number of // mandatory headers for all requests // (https://trakt.docs.apiary.io/#introduction/required-headers). func (p *Trakt) FetchRawUserInfo(token *oauth2.Token) ([]byte, error) { req, err := http.NewRequestWithContext(p.ctx, "GET", p.userInfoURL, nil) if err != nil { return nil, err } req.Header.Set("Content-type", "application/json") req.Header.Set("trakt-api-key", p.clientId) req.Header.Set("trakt-api-version", "2") return p.sendRawUserInfoRequest(req, token) }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/auth/vk.go
tools/auth/vk.go
package auth import ( "context" "encoding/json" "errors" "fmt" "strconv" "strings" "github.com/pocketbase/pocketbase/tools/types" "golang.org/x/oauth2" "golang.org/x/oauth2/vk" ) func init() { Providers[NameVK] = wrapFactory(NewVKProvider) } var _ Provider = (*VK)(nil) // NameVK is the unique name of the VK provider. const NameVK string = "vk" // VK allows authentication via VK OAuth2. type VK struct { BaseProvider } // NewVKProvider creates new VK provider instance with some defaults. // // Docs: https://dev.vk.com/api/oauth-parameters func NewVKProvider() *VK { return &VK{BaseProvider{ ctx: context.Background(), displayName: "ВКонтакте", pkce: false, // VK currently doesn't support PKCE and throws an error if PKCE params are send scopes: []string{"email"}, authURL: vk.Endpoint.AuthURL, tokenURL: vk.Endpoint.TokenURL, userInfoURL: "https://api.vk.com/method/users.get?fields=photo_max,screen_name&v=5.131", }} } // FetchAuthUser returns an AuthUser instance based on VK's user api. // // API reference: https://dev.vk.com/method/users.get func (p *VK) FetchAuthUser(token *oauth2.Token) (*AuthUser, error) { data, err := p.FetchRawUserInfo(token) if err != nil { return nil, err } rawUser := map[string]any{} if err := json.Unmarshal(data, &rawUser); err != nil { return nil, err } extracted := struct { Response []struct { Id int64 `json:"id"` FirstName string `json:"first_name"` LastName string `json:"last_name"` Username string `json:"screen_name"` AvatarURL string `json:"photo_max"` } `json:"response"` }{} if err := json.Unmarshal(data, &extracted); err != nil { return nil, err } if len(extracted.Response) == 0 { return nil, errors.New("missing response entry") } user := &AuthUser{ Id: strconv.FormatInt(extracted.Response[0].Id, 10), Name: strings.TrimSpace(extracted.Response[0].FirstName + " " + extracted.Response[0].LastName), Username: extracted.Response[0].Username, AvatarURL: extracted.Response[0].AvatarURL, RawUser: rawUser, AccessToken: token.AccessToken, RefreshToken: token.RefreshToken, } user.Expiry, _ = types.ParseDateTime(token.Expiry) if email := token.Extra("email"); email != nil { user.Email = fmt.Sprint(email) } return user, nil }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/auth/twitch.go
tools/auth/twitch.go
package auth import ( "context" "encoding/json" "errors" "net/http" "github.com/pocketbase/pocketbase/tools/types" "golang.org/x/oauth2" "golang.org/x/oauth2/twitch" ) func init() { Providers[NameTwitch] = wrapFactory(NewTwitchProvider) } var _ Provider = (*Twitch)(nil) // NameTwitch is the unique name of the Twitch provider. const NameTwitch string = "twitch" // Twitch allows authentication via Twitch OAuth2. type Twitch struct { BaseProvider } // NewTwitchProvider creates new Twitch provider instance with some defaults. func NewTwitchProvider() *Twitch { return &Twitch{BaseProvider{ ctx: context.Background(), displayName: "Twitch", pkce: true, scopes: []string{"user:read:email"}, authURL: twitch.Endpoint.AuthURL, tokenURL: twitch.Endpoint.TokenURL, userInfoURL: "https://api.twitch.tv/helix/users", }} } // FetchAuthUser returns an AuthUser instance based the Twitch's user api. // // API reference: https://dev.twitch.tv/docs/api/reference#get-users func (p *Twitch) FetchAuthUser(token *oauth2.Token) (*AuthUser, error) { data, err := p.FetchRawUserInfo(token) if err != nil { return nil, err } rawUser := map[string]any{} if err := json.Unmarshal(data, &rawUser); err != nil { return nil, err } extracted := struct { Data []struct { Id string `json:"id"` Login string `json:"login"` DisplayName string `json:"display_name"` Email string `json:"email"` ProfileImageURL string `json:"profile_image_url"` } `json:"data"` }{} if err := json.Unmarshal(data, &extracted); err != nil { return nil, err } if len(extracted.Data) == 0 { return nil, errors.New("failed to fetch AuthUser data") } user := &AuthUser{ Id: extracted.Data[0].Id, Name: extracted.Data[0].DisplayName, Username: extracted.Data[0].Login, Email: extracted.Data[0].Email, AvatarURL: extracted.Data[0].ProfileImageURL, RawUser: rawUser, AccessToken: token.AccessToken, RefreshToken: token.RefreshToken, } user.Expiry, _ = types.ParseDateTime(token.Expiry) return user, nil } // FetchRawUserInfo implements Provider.FetchRawUserInfo interface method. // // This differ from BaseProvider because Twitch requires the Client-Id header. func (p *Twitch) FetchRawUserInfo(token *oauth2.Token) ([]byte, error) { req, err := http.NewRequestWithContext(p.ctx, "GET", p.userInfoURL, nil) if err != nil { return nil, err } req.Header.Set("Client-Id", p.clientId) return p.sendRawUserInfoRequest(req, token) }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/auth/discord.go
tools/auth/discord.go
package auth import ( "context" "encoding/json" "fmt" "github.com/pocketbase/pocketbase/tools/types" "golang.org/x/oauth2" ) func init() { Providers[NameDiscord] = wrapFactory(NewDiscordProvider) } var _ Provider = (*Discord)(nil) // NameDiscord is the unique name of the Discord provider. const NameDiscord string = "discord" // Discord allows authentication via Discord OAuth2. type Discord struct { BaseProvider } // NewDiscordProvider creates a new Discord provider instance with some defaults. func NewDiscordProvider() *Discord { // https://discord.com/developers/docs/topics/oauth2 // https://discord.com/developers/docs/resources/user#get-current-user return &Discord{BaseProvider{ ctx: context.Background(), displayName: "Discord", pkce: true, scopes: []string{"identify", "email"}, authURL: "https://discord.com/api/oauth2/authorize", tokenURL: "https://discord.com/api/oauth2/token", userInfoURL: "https://discord.com/api/users/@me", }} } // FetchAuthUser returns an AuthUser instance from Discord's user api. // // API reference: https://discord.com/developers/docs/resources/user#user-object func (p *Discord) FetchAuthUser(token *oauth2.Token) (*AuthUser, error) { data, err := p.FetchRawUserInfo(token) if err != nil { return nil, err } rawUser := map[string]any{} if err := json.Unmarshal(data, &rawUser); err != nil { return nil, err } extracted := struct { Id string `json:"id"` Username string `json:"username"` Discriminator string `json:"discriminator"` Avatar string `json:"avatar"` Email string `json:"email"` Verified bool `json:"verified"` }{} if err := json.Unmarshal(data, &extracted); err != nil { return nil, err } // Build a full avatar URL using the avatar hash provided in the API response // https://discord.com/developers/docs/reference#image-formatting avatarURL := fmt.Sprintf("https://cdn.discordapp.com/avatars/%s/%s.png", extracted.Id, extracted.Avatar) // Concatenate the user's username and discriminator into a single username string username := fmt.Sprintf("%s#%s", extracted.Username, extracted.Discriminator) user := &AuthUser{ Id: extracted.Id, Name: username, Username: extracted.Username, AvatarURL: avatarURL, RawUser: rawUser, AccessToken: token.AccessToken, RefreshToken: token.RefreshToken, } user.Expiry, _ = types.ParseDateTime(token.Expiry) if extracted.Verified { user.Email = extracted.Email } return user, nil }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/auth/auth.go
tools/auth/auth.go
package auth import ( "context" "encoding/json" "errors" "net/http" "github.com/pocketbase/pocketbase/tools/types" "golang.org/x/oauth2" ) // ProviderFactoryFunc defines a function for initializing a new OAuth2 provider. type ProviderFactoryFunc func() Provider // Providers defines a map with all of the available OAuth2 providers. // // To register a new provider append a new entry in the map. var Providers = map[string]ProviderFactoryFunc{} // NewProviderByName returns a new preconfigured provider instance by its name identifier. func NewProviderByName(name string) (Provider, error) { factory, ok := Providers[name] if !ok { return nil, errors.New("missing provider " + name) } return factory(), nil } // Provider defines a common interface for an OAuth2 client. type Provider interface { // Context returns the context associated with the provider (if any). Context() context.Context // SetContext assigns the specified context to the current provider. SetContext(ctx context.Context) // PKCE indicates whether the provider can use the PKCE flow. PKCE() bool // SetPKCE toggles the state whether the provider can use the PKCE flow or not. SetPKCE(enable bool) // DisplayName usually returns provider name as it is officially written // and it could be used directly in the UI. DisplayName() string // SetDisplayName sets the provider's display name. SetDisplayName(displayName string) // Scopes returns the provider access permissions that will be requested. Scopes() []string // SetScopes sets the provider access permissions that will be requested later. SetScopes(scopes []string) // ClientId returns the provider client's app ID. ClientId() string // SetClientId sets the provider client's ID. SetClientId(clientId string) // ClientSecret returns the provider client's app secret. ClientSecret() string // SetClientSecret sets the provider client's app secret. SetClientSecret(secret string) // RedirectURL returns the end address to redirect the user // going through the OAuth flow. RedirectURL() string // SetRedirectURL sets the provider's RedirectURL. SetRedirectURL(url string) // AuthURL returns the provider's authorization service url. AuthURL() string // SetAuthURL sets the provider's AuthURL. SetAuthURL(url string) // TokenURL returns the provider's token exchange service url. TokenURL() string // SetTokenURL sets the provider's TokenURL. SetTokenURL(url string) // UserInfoURL returns the provider's user info api url. UserInfoURL() string // SetUserInfoURL sets the provider's UserInfoURL. SetUserInfoURL(url string) // Extra returns a shallow copy of any custom config data // that the provider may be need. Extra() map[string]any // SetExtra updates the provider's custom config data. SetExtra(data map[string]any) // Client returns an http client using the provided token. Client(token *oauth2.Token) *http.Client // BuildAuthURL returns a URL to the provider's consent page // that asks for permissions for the required scopes explicitly. BuildAuthURL(state string, opts ...oauth2.AuthCodeOption) string // FetchToken converts an authorization code to token. FetchToken(code string, opts ...oauth2.AuthCodeOption) (*oauth2.Token, error) // FetchRawUserInfo requests and marshalizes into `result` the // the OAuth user api response. FetchRawUserInfo(token *oauth2.Token) ([]byte, error) // FetchAuthUser is similar to FetchRawUserInfo, but normalizes and // marshalizes the user api response into a standardized AuthUser struct. FetchAuthUser(token *oauth2.Token) (user *AuthUser, err error) } // wrapFactory is a helper that wraps a Provider specific factory // function and returns its result as Provider interface. func wrapFactory[T Provider](factory func() T) ProviderFactoryFunc { return func() Provider { return factory() } } // AuthUser defines a standardized OAuth2 user data structure. type AuthUser struct { Expiry types.DateTime `json:"expiry"` RawUser map[string]any `json:"rawUser"` Id string `json:"id"` Name string `json:"name"` Username string `json:"username"` Email string `json:"email"` AvatarURL string `json:"avatarURL"` AccessToken string `json:"accessToken"` RefreshToken string `json:"refreshToken"` // @todo // deprecated: use AvatarURL instead // AvatarUrl will be removed after dropping v0.22 support AvatarUrl string `json:"avatarUrl"` } // MarshalJSON implements the [json.Marshaler] interface. // // @todo remove after dropping v0.22 support func (au AuthUser) MarshalJSON() ([]byte, error) { type alias AuthUser // prevent recursion au2 := alias(au) au2.AvatarUrl = au.AvatarURL // ensure that the legacy field is populated return json.Marshal(au2) }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/auth/lark.go
tools/auth/lark.go
package auth import ( "context" "encoding/json" "github.com/pocketbase/pocketbase/tools/types" "golang.org/x/oauth2" ) func init() { Providers[NameLark] = wrapFactory(NewLarkProvider) } var _ Provider = (*Lark)(nil) // NameLark is the unique name of the Lark provider. const NameLark string = "lark" // Lark allows authentication via Lark OAuth2. type Lark struct { BaseProvider } // NewLarkProvider creates new Lark provider instance with some defaults. func NewLarkProvider() *Lark { return &Lark{BaseProvider{ ctx: context.Background(), displayName: "Lark", pkce: true, // Lark has two domains with the same API: feishu.cn and larksuite.com. // The former is used in China and the latter is used in the other regions. // We choose feishu.cn as a default, matching the behavior of Lark's official SDK. // Endpoint URLs can be overridden from the frontend if needed. // SDK Reference: https://github.com/larksuite/oapi-sdk-go authURL: "https://accounts.feishu.cn/open-apis/authen/v1/authorize", tokenURL: "https://open.feishu.cn/open-apis/authen/v2/oauth/token", userInfoURL: "https://open.feishu.cn/open-apis/authen/v1/user_info", }} } // FetchAuthUser returns an AuthUser instance based the Lark's user api. // // API reference: https://open.feishu.cn/document/server-docs/authentication-management/login-state-management/get func (p *Lark) FetchAuthUser(token *oauth2.Token) (*AuthUser, error) { data, err := p.FetchRawUserInfo(token) if err != nil { return nil, err } rawUser := map[string]any{} if err := json.Unmarshal(data, &rawUser); err != nil { return nil, err } extracted := struct { Data struct { // https://open.feishu.cn/document/platform-overveiw/basic-concepts/user-identity-introduction/introduction#3f2d4b63 UnionId string `json:"union_id"` Name string `json:"name"` AvatarURL string `json:"avatar_url"` } `json:"data"` }{} if err := json.Unmarshal(data, &extracted); err != nil { return nil, err } user := &AuthUser{ Id: extracted.Data.UnionId, Name: extracted.Data.Name, AvatarURL: extracted.Data.AvatarURL, RawUser: rawUser, AccessToken: token.AccessToken, RefreshToken: token.RefreshToken, } user.Expiry, _ = types.ParseDateTime(token.Expiry) return user, nil }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/auth/mailcow.go
tools/auth/mailcow.go
package auth import ( "context" "encoding/json" "errors" "strings" "github.com/pocketbase/pocketbase/tools/types" "golang.org/x/oauth2" ) func init() { Providers[NameMailcow] = wrapFactory(NewMailcowProvider) } var _ Provider = (*Mailcow)(nil) // NameMailcow is the unique name of the mailcow provider. const NameMailcow string = "mailcow" // Mailcow allows authentication via mailcow OAuth2. type Mailcow struct { BaseProvider } // NewMailcowProvider creates a new mailcow provider instance with some defaults. func NewMailcowProvider() *Mailcow { return &Mailcow{BaseProvider{ ctx: context.Background(), displayName: "mailcow", pkce: true, scopes: []string{"profile"}, }} } // FetchAuthUser returns an AuthUser instance based on mailcow's user api. // // API reference: https://github.com/mailcow/mailcow-dockerized/blob/master/data/web/oauth/profile.php func (p *Mailcow) FetchAuthUser(token *oauth2.Token) (*AuthUser, error) { data, err := p.FetchRawUserInfo(token) if err != nil { return nil, err } rawUser := map[string]any{} if err := json.Unmarshal(data, &rawUser); err != nil { return nil, err } extracted := struct { Id string `json:"id"` Username string `json:"username"` Email string `json:"email"` FullName string `json:"full_name"` Active int `json:"active"` }{} if err := json.Unmarshal(data, &extracted); err != nil { return nil, err } if extracted.Active != 1 { return nil, errors.New("the mailcow user is not active") } user := &AuthUser{ Id: extracted.Id, Name: extracted.FullName, Username: extracted.Username, Email: extracted.Email, RawUser: rawUser, AccessToken: token.AccessToken, RefreshToken: token.RefreshToken, } user.Expiry, _ = types.ParseDateTime(token.Expiry) // mailcow usernames are usually just the email adresses, so we just take the part in front of the @ if strings.Contains(user.Username, "@") { user.Username = strings.Split(user.Username, "@")[0] } return user, nil }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/auth/apple.go
tools/auth/apple.go
package auth import ( "context" "encoding/json" "errors" "fmt" "github.com/golang-jwt/jwt/v5" "github.com/pocketbase/pocketbase/tools/auth/internal/jwk" "github.com/pocketbase/pocketbase/tools/types" "github.com/spf13/cast" "golang.org/x/oauth2" ) func init() { Providers[NameApple] = wrapFactory(NewAppleProvider) } var _ Provider = (*Apple)(nil) // NameApple is the unique name of the Apple provider. const NameApple string = "apple" // Apple allows authentication via Apple OAuth2. // // OIDC differences: https://bitbucket.org/openid/connect/src/master/How-Sign-in-with-Apple-differs-from-OpenID-Connect.md. type Apple struct { BaseProvider jwksURL string } // NewAppleProvider creates a new Apple provider instance with some defaults. func NewAppleProvider() *Apple { return &Apple{ BaseProvider: BaseProvider{ ctx: context.Background(), displayName: "Apple", pkce: true, scopes: []string{"name", "email"}, authURL: "https://appleid.apple.com/auth/authorize", tokenURL: "https://appleid.apple.com/auth/token", }, jwksURL: "https://appleid.apple.com/auth/keys", } } // FetchAuthUser returns an AuthUser instance based on the provided token. // // API reference: https://developer.apple.com/documentation/signinwithapple/authenticating-users-with-sign-in-with-apple#Retrieve-the-users-information-from-Apple-ID-servers. func (p *Apple) FetchAuthUser(token *oauth2.Token) (*AuthUser, error) { data, err := p.FetchRawUserInfo(token) if err != nil { return nil, err } rawUser := map[string]any{} if err := json.Unmarshal(data, &rawUser); err != nil { return nil, err } extracted := struct { EmailVerified any `json:"email_verified"` // could be string or bool Email string `json:"email"` Id string `json:"sub"` // not returned at the time of writing and it is usually // manually populated in apis.recordAuthWithOAuth2 Name string `json:"name"` }{} if err := json.Unmarshal(data, &extracted); err != nil { return nil, err } user := &AuthUser{ Id: extracted.Id, Name: extracted.Name, RawUser: rawUser, AccessToken: token.AccessToken, RefreshToken: token.RefreshToken, } user.Expiry, _ = types.ParseDateTime(token.Expiry) if cast.ToBool(extracted.EmailVerified) { user.Email = extracted.Email } return user, nil } // FetchRawUserInfo implements Provider.FetchRawUserInfo interface. // // Note that Apple doesn't have a UserInfo endpoint and claims about // the users are included in the id_token (without the name - see #7090). func (p *Apple) FetchRawUserInfo(token *oauth2.Token) ([]byte, error) { idToken, _ := token.Extra("id_token").(string) claims, err := p.parseAndVerifyIdToken(idToken) if err != nil { return nil, err } return json.Marshal(claims) } func (p *Apple) parseAndVerifyIdToken(idToken string) (jwt.MapClaims, error) { if idToken == "" { return nil, errors.New("empty id_token") } // extract the token claims // --- claims := jwt.MapClaims{} _, _, err := jwt.NewParser().ParseUnverified(idToken, claims) if err != nil { return nil, err } // validate common claims per https://developer.apple.com/documentation/sign_in_with_apple/sign_in_with_apple_rest_api/verifying_a_user#3383769 // --- jwtValidator := jwt.NewValidator( jwt.WithExpirationRequired(), jwt.WithIssuedAt(), jwt.WithLeeway(idTokenLeeway), jwt.WithIssuer("https://appleid.apple.com"), jwt.WithAudience(p.clientId), ) err = jwtValidator.Validate(claims) if err != nil { return nil, err } // validate id_token signature // // note: this step could be technically considered optional because we trust // the token which is a result of direct TLS communication with the provider // (see also https://openid.net/specs/openid-connect-core-1_0.html#IDTokenValidation) // --- err = jwk.ValidateTokenSignature(p.ctx, idToken, p.jwksURL) if err != nil { return nil, fmt.Errorf("id_token validation failed: %w", err) } return claims, nil }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/auth/strava.go
tools/auth/strava.go
package auth import ( "context" "encoding/json" "strconv" "github.com/pocketbase/pocketbase/tools/types" "golang.org/x/oauth2" ) func init() { Providers[NameStrava] = wrapFactory(NewStravaProvider) } var _ Provider = (*Strava)(nil) // NameStrava is the unique name of the Strava provider. const NameStrava string = "strava" // Strava allows authentication via Strava OAuth2. type Strava struct { BaseProvider } // NewStravaProvider creates new Strava provider instance with some defaults. func NewStravaProvider() *Strava { return &Strava{BaseProvider{ ctx: context.Background(), displayName: "Strava", pkce: true, scopes: []string{ "profile:read_all", }, authURL: "https://www.strava.com/oauth/authorize", tokenURL: "https://www.strava.com/api/v3/oauth/token", userInfoURL: "https://www.strava.com/api/v3/athlete", }} } // FetchAuthUser returns an AuthUser instance based on the Strava's user api. // // API reference: https://developers.strava.com/docs/authentication/ func (p *Strava) FetchAuthUser(token *oauth2.Token) (*AuthUser, error) { data, err := p.FetchRawUserInfo(token) if err != nil { return nil, err } rawUser := map[string]any{} if err := json.Unmarshal(data, &rawUser); err != nil { return nil, err } extracted := struct { Id int64 `json:"id"` FirstName string `json:"firstname"` LastName string `json:"lastname"` Username string `json:"username"` ProfileImageURL string `json:"profile"` // At the time of writing, Strava OAuth2 doesn't support returning the user email address // Email string `json:"email"` }{} if err := json.Unmarshal(data, &extracted); err != nil { return nil, err } user := &AuthUser{ Name: extracted.FirstName + " " + extracted.LastName, Username: extracted.Username, AvatarURL: extracted.ProfileImageURL, RawUser: rawUser, AccessToken: token.AccessToken, RefreshToken: token.RefreshToken, } user.Expiry, _ = types.ParseDateTime(token.Expiry) if extracted.Id != 0 { user.Id = strconv.FormatInt(extracted.Id, 10) } return user, nil }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/auth/gitlab.go
tools/auth/gitlab.go
package auth import ( "context" "encoding/json" "strconv" "github.com/pocketbase/pocketbase/tools/types" "golang.org/x/oauth2" ) func init() { Providers[NameGitlab] = wrapFactory(NewGitlabProvider) } var _ Provider = (*Gitlab)(nil) // NameGitlab is the unique name of the Gitlab provider. const NameGitlab string = "gitlab" // Gitlab allows authentication via Gitlab OAuth2. type Gitlab struct { BaseProvider } // NewGitlabProvider creates new Gitlab provider instance with some defaults. func NewGitlabProvider() *Gitlab { return &Gitlab{BaseProvider{ ctx: context.Background(), displayName: "GitLab", pkce: true, scopes: []string{"read_user"}, authURL: "https://gitlab.com/oauth/authorize", tokenURL: "https://gitlab.com/oauth/token", userInfoURL: "https://gitlab.com/api/v4/user", }} } // FetchAuthUser returns an AuthUser instance based the Gitlab's user api. // // API reference: https://docs.gitlab.com/ee/api/users.html#for-admin func (p *Gitlab) FetchAuthUser(token *oauth2.Token) (*AuthUser, error) { data, err := p.FetchRawUserInfo(token) if err != nil { return nil, err } rawUser := map[string]any{} if err := json.Unmarshal(data, &rawUser); err != nil { return nil, err } extracted := struct { Name string `json:"name"` Username string `json:"username"` Email string `json:"email"` AvatarURL string `json:"avatar_url"` Id int64 `json:"id"` }{} if err := json.Unmarshal(data, &extracted); err != nil { return nil, err } user := &AuthUser{ Id: strconv.FormatInt(extracted.Id, 10), Name: extracted.Name, Username: extracted.Username, Email: extracted.Email, AvatarURL: extracted.AvatarURL, RawUser: rawUser, AccessToken: token.AccessToken, RefreshToken: token.RefreshToken, } user.Expiry, _ = types.ParseDateTime(token.Expiry) return user, nil }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/auth/github.go
tools/auth/github.go
package auth import ( "context" "encoding/json" "io" "strconv" "github.com/pocketbase/pocketbase/tools/types" "golang.org/x/oauth2" "golang.org/x/oauth2/github" ) func init() { Providers[NameGithub] = wrapFactory(NewGithubProvider) } var _ Provider = (*Github)(nil) // NameGithub is the unique name of the Github provider. const NameGithub string = "github" // Github allows authentication via Github OAuth2. type Github struct { BaseProvider } // NewGithubProvider creates new Github provider instance with some defaults. func NewGithubProvider() *Github { return &Github{BaseProvider{ ctx: context.Background(), displayName: "GitHub", pkce: true, // technically is not supported yet but it is safe as the PKCE params are just ignored scopes: []string{"read:user", "user:email"}, authURL: github.Endpoint.AuthURL, tokenURL: github.Endpoint.TokenURL, userInfoURL: "https://api.github.com/user", }} } // FetchAuthUser returns an AuthUser instance based the Github's user api. // // API reference: https://docs.github.com/en/rest/reference/users#get-the-authenticated-user func (p *Github) FetchAuthUser(token *oauth2.Token) (*AuthUser, error) { data, err := p.FetchRawUserInfo(token) if err != nil { return nil, err } rawUser := map[string]any{} if err := json.Unmarshal(data, &rawUser); err != nil { return nil, err } extracted := struct { Login string `json:"login"` Name string `json:"name"` Email string `json:"email"` AvatarURL string `json:"avatar_url"` Id int64 `json:"id"` }{} if err := json.Unmarshal(data, &extracted); err != nil { return nil, err } user := &AuthUser{ Id: strconv.FormatInt(extracted.Id, 10), Name: extracted.Name, Username: extracted.Login, Email: extracted.Email, AvatarURL: extracted.AvatarURL, RawUser: rawUser, AccessToken: token.AccessToken, RefreshToken: token.RefreshToken, } user.Expiry, _ = types.ParseDateTime(token.Expiry) // in case user has set "Keep my email address private", send an // **optional** API request to retrieve the verified primary email if user.Email == "" { email, err := p.fetchPrimaryEmail(token) if err != nil { return nil, err } user.Email = email } return user, nil } // fetchPrimaryEmail sends an API request to retrieve the verified // primary email, in case "Keep my email address private" was set. // // NB! This method can succeed and still return an empty email. // Error responses that are result of insufficient scopes permissions are ignored. // // API reference: https://docs.github.com/en/rest/users/emails?apiVersion=2022-11-28 func (p *Github) fetchPrimaryEmail(token *oauth2.Token) (string, error) { client := p.Client(token) response, err := client.Get(p.userInfoURL + "/emails") if err != nil { return "", err } defer response.Body.Close() // ignore common http errors caused by insufficient scope permissions // (the email field is optional, aka. return the auth user without it) if response.StatusCode == 401 || response.StatusCode == 403 || response.StatusCode == 404 { return "", nil } content, err := io.ReadAll(response.Body) if err != nil { return "", err } emails := []struct { Email string Verified bool Primary bool }{} if err := json.Unmarshal(content, &emails); err != nil { return "", err } // extract the verified primary email for _, email := range emails { if email.Verified && email.Primary { return email.Email, nil } } return "", nil }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/auth/auth_test.go
tools/auth/auth_test.go
package auth_test import ( "testing" "github.com/pocketbase/pocketbase/tools/auth" ) func TestProvidersCount(t *testing.T) { expected := 32 if total := len(auth.Providers); total != expected { t.Fatalf("Expected %d providers, got %d", expected, total) } } func TestNewProviderByName(t *testing.T) { var err error var p auth.Provider // invalid p, err = auth.NewProviderByName("invalid") if err == nil { t.Error("Expected error, got nil") } if p != nil { t.Errorf("Expected provider to be nil, got %v", p) } // google p, err = auth.NewProviderByName(auth.NameGoogle) if err != nil { t.Errorf("Expected nil, got error %v", err) } if _, ok := p.(*auth.Google); !ok { t.Error("Expected to be instance of *auth.Google") } // facebook p, err = auth.NewProviderByName(auth.NameFacebook) if err != nil { t.Errorf("Expected nil, got error %v", err) } if _, ok := p.(*auth.Facebook); !ok { t.Error("Expected to be instance of *auth.Facebook") } // github p, err = auth.NewProviderByName(auth.NameGithub) if err != nil { t.Errorf("Expected nil, got error %v", err) } if _, ok := p.(*auth.Github); !ok { t.Error("Expected to be instance of *auth.Github") } // gitlab p, err = auth.NewProviderByName(auth.NameGitlab) if err != nil { t.Errorf("Expected nil, got error %v", err) } if _, ok := p.(*auth.Gitlab); !ok { t.Error("Expected to be instance of *auth.Gitlab") } // twitter p, err = auth.NewProviderByName(auth.NameTwitter) if err != nil { t.Errorf("Expected nil, got error %v", err) } if _, ok := p.(*auth.Twitter); !ok { t.Error("Expected to be instance of *auth.Twitter") } // discord p, err = auth.NewProviderByName(auth.NameDiscord) if err != nil { t.Errorf("Expected nil, got error %v", err) } if _, ok := p.(*auth.Discord); !ok { t.Error("Expected to be instance of *auth.Discord") } // microsoft p, err = auth.NewProviderByName(auth.NameMicrosoft) if err != nil { t.Errorf("Expected nil, got error %v", err) } if _, ok := p.(*auth.Microsoft); !ok { t.Error("Expected to be instance of *auth.Microsoft") } // spotify p, err = auth.NewProviderByName(auth.NameSpotify) if err != nil { t.Errorf("Expected nil, got error %v", err) } if _, ok := p.(*auth.Spotify); !ok { t.Error("Expected to be instance of *auth.Spotify") } // kakao p, err = auth.NewProviderByName(auth.NameKakao) if err != nil { t.Errorf("Expected nil, got error %v", err) } if _, ok := p.(*auth.Kakao); !ok { t.Error("Expected to be instance of *auth.Kakao") } // twitch p, err = auth.NewProviderByName(auth.NameTwitch) if err != nil { t.Errorf("Expected nil, got error %v", err) } if _, ok := p.(*auth.Twitch); !ok { t.Error("Expected to be instance of *auth.Twitch") } // strava p, err = auth.NewProviderByName(auth.NameStrava) if err != nil { t.Errorf("Expected nil, got error %v", err) } if _, ok := p.(*auth.Strava); !ok { t.Error("Expected to be instance of *auth.Strava") } // gitee p, err = auth.NewProviderByName(auth.NameGitee) if err != nil { t.Errorf("Expected nil, got error %v", err) } if _, ok := p.(*auth.Gitee); !ok { t.Error("Expected to be instance of *auth.Gitee") } // livechat p, err = auth.NewProviderByName(auth.NameLivechat) if err != nil { t.Errorf("Expected nil, got error %v", err) } if _, ok := p.(*auth.Livechat); !ok { t.Error("Expected to be instance of *auth.Livechat") } // gitea p, err = auth.NewProviderByName(auth.NameGitea) if err != nil { t.Errorf("Expected nil, got error %v", err) } if _, ok := p.(*auth.Gitea); !ok { t.Error("Expected to be instance of *auth.Gitea") } // oidc p, err = auth.NewProviderByName(auth.NameOIDC) if err != nil { t.Errorf("Expected nil, got error %v", err) } if _, ok := p.(*auth.OIDC); !ok { t.Error("Expected to be instance of *auth.OIDC") } // oidc2 p, err = auth.NewProviderByName(auth.NameOIDC + "2") if err != nil { t.Errorf("Expected nil, got error %v", err) } if _, ok := p.(*auth.OIDC); !ok { t.Error("Expected to be instance of *auth.OIDC") } // oidc3 p, err = auth.NewProviderByName(auth.NameOIDC + "3") if err != nil { t.Errorf("Expected nil, got error %v", err) } if _, ok := p.(*auth.OIDC); !ok { t.Error("Expected to be instance of *auth.OIDC") } // apple p, err = auth.NewProviderByName(auth.NameApple) if err != nil { t.Errorf("Expected nil, got error %v", err) } if _, ok := p.(*auth.Apple); !ok { t.Error("Expected to be instance of *auth.Apple") } // instagram p, err = auth.NewProviderByName(auth.NameInstagram) if err != nil { t.Errorf("Expected nil, got error %v", err) } if _, ok := p.(*auth.Instagram); !ok { t.Error("Expected to be instance of *auth.Instagram") } // vk p, err = auth.NewProviderByName(auth.NameVK) if err != nil { t.Errorf("Expected nil, got error %v", err) } if _, ok := p.(*auth.VK); !ok { t.Error("Expected to be instance of *auth.VK") } // yandex p, err = auth.NewProviderByName(auth.NameYandex) if err != nil { t.Errorf("Expected nil, got error %v", err) } if _, ok := p.(*auth.Yandex); !ok { t.Error("Expected to be instance of *auth.Yandex") } // patreon p, err = auth.NewProviderByName(auth.NamePatreon) if err != nil { t.Errorf("Expected nil, got error %v", err) } if _, ok := p.(*auth.Patreon); !ok { t.Error("Expected to be instance of *auth.Patreon") } // mailcow p, err = auth.NewProviderByName(auth.NameMailcow) if err != nil { t.Errorf("Expected nil, got error %v", err) } if _, ok := p.(*auth.Mailcow); !ok { t.Error("Expected to be instance of *auth.Mailcow") } // bitbucket p, err = auth.NewProviderByName(auth.NameBitbucket) if err != nil { t.Errorf("Expected nil, got error %v", err) } if _, ok := p.(*auth.Bitbucket); !ok { t.Error("Expected to be instance of *auth.Bitbucket") } // planningcenter p, err = auth.NewProviderByName(auth.NamePlanningcenter) if err != nil { t.Errorf("Expected nil, got error %v", err) } if _, ok := p.(*auth.Planningcenter); !ok { t.Error("Expected to be instance of *auth.Planningcenter") } // notion p, err = auth.NewProviderByName(auth.NameNotion) if err != nil { t.Errorf("Expected nil, got error %v", err) } if _, ok := p.(*auth.Notion); !ok { t.Error("Expected to be instance of *auth.Notion") } // monday p, err = auth.NewProviderByName(auth.NameMonday) if err != nil { t.Errorf("Expected nil, got error %v", err) } if _, ok := p.(*auth.Monday); !ok { t.Error("Expected to be instance of *auth.Monday") } // wakatime p, err = auth.NewProviderByName(auth.NameWakatime) if err != nil { t.Errorf("Expected nil, got error %v", err) } if _, ok := p.(*auth.Wakatime); !ok { t.Error("Expected to be instance of *auth.Wakatime") } // box p, err = auth.NewProviderByName(auth.NameBox) if err != nil { t.Errorf("Expected nil, got error %v", err) } if _, ok := p.(*auth.Box); !ok { t.Error("Expected to be instance of *auth.Box") } // linear p, err = auth.NewProviderByName(auth.NameLinear) if err != nil { t.Errorf("Expected nil, got error %v", err) } if _, ok := p.(*auth.Linear); !ok { t.Error("Expected to be instance of *auth.Linear") } // trakt p, err = auth.NewProviderByName(auth.NameTrakt) if err != nil { t.Errorf("Expected nil, got error %v", err) } if _, ok := p.(*auth.Trakt); !ok { t.Error("Expected to be instance of *auth.Trakt") } // lark p, err = auth.NewProviderByName(auth.NameLark) if err != nil { t.Errorf("Expected nil, got error %v", err) } if _, ok := p.(*auth.Lark); !ok { t.Error("Expected to be instance of *auth.Lark") } }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/auth/base_provider_test.go
tools/auth/base_provider_test.go
package auth import ( "bytes" "context" "encoding/json" "testing" "golang.org/x/oauth2" ) func TestContext(t *testing.T) { b := BaseProvider{} before := b.Scopes() if before != nil { t.Errorf("Expected nil context, got %v", before) } b.SetContext(context.Background()) after := b.Scopes() if after != nil { t.Error("Expected non-nil context") } } func TestDisplayName(t *testing.T) { b := BaseProvider{} before := b.DisplayName() if before != "" { t.Fatalf("Expected displayName to be empty, got %v", before) } b.SetDisplayName("test") after := b.DisplayName() if after != "test" { t.Fatalf("Expected displayName to be 'test', got %v", after) } } func TestPKCE(t *testing.T) { b := BaseProvider{} before := b.PKCE() if before != false { t.Fatalf("Expected pkce to be %v, got %v", false, before) } b.SetPKCE(true) after := b.PKCE() if after != true { t.Fatalf("Expected pkce to be %v, got %v", true, after) } } func TestScopes(t *testing.T) { b := BaseProvider{} before := b.Scopes() if len(before) != 0 { t.Fatalf("Expected 0 scopes, got %v", before) } b.SetScopes([]string{"test1", "test2"}) after := b.Scopes() if len(after) != 2 { t.Fatalf("Expected 2 scopes, got %v", after) } } func TestClientId(t *testing.T) { b := BaseProvider{} before := b.ClientId() if before != "" { t.Fatalf("Expected clientId to be empty, got %v", before) } b.SetClientId("test") after := b.ClientId() if after != "test" { t.Fatalf("Expected clientId to be 'test', got %v", after) } } func TestClientSecret(t *testing.T) { b := BaseProvider{} before := b.ClientSecret() if before != "" { t.Fatalf("Expected clientSecret to be empty, got %v", before) } b.SetClientSecret("test") after := b.ClientSecret() if after != "test" { t.Fatalf("Expected clientSecret to be 'test', got %v", after) } } func TestRedirectURL(t *testing.T) { b := BaseProvider{} before := b.RedirectURL() if before != "" { t.Fatalf("Expected RedirectURL to be empty, got %v", before) } b.SetRedirectURL("test") after := b.RedirectURL() if after != "test" { t.Fatalf("Expected RedirectURL to be 'test', got %v", after) } } func TestAuthURL(t *testing.T) { b := BaseProvider{} before := b.AuthURL() if before != "" { t.Fatalf("Expected authURL to be empty, got %v", before) } b.SetAuthURL("test") after := b.AuthURL() if after != "test" { t.Fatalf("Expected authURL to be 'test', got %v", after) } } func TestTokenURL(t *testing.T) { b := BaseProvider{} before := b.TokenURL() if before != "" { t.Fatalf("Expected tokenURL to be empty, got %v", before) } b.SetTokenURL("test") after := b.TokenURL() if after != "test" { t.Fatalf("Expected tokenURL to be 'test', got %v", after) } } func TestUserInfoURL(t *testing.T) { b := BaseProvider{} before := b.UserInfoURL() if before != "" { t.Fatalf("Expected userInfoURL to be empty, got %v", before) } b.SetUserInfoURL("test") after := b.UserInfoURL() if after != "test" { t.Fatalf("Expected userInfoURL to be 'test', got %v", after) } } func TestExtra(t *testing.T) { b := BaseProvider{} before := b.Extra() if before != nil { t.Fatalf("Expected extra to be empty, got %v", before) } extra := map[string]any{"a": 1, "b": 2} b.SetExtra(extra) after := b.Extra() rawExtra, err := json.Marshal(extra) if err != nil { t.Fatal(err) } rawAfter, err := json.Marshal(after) if err != nil { t.Fatal(err) } if !bytes.Equal(rawExtra, rawAfter) { t.Fatalf("Expected extra to be\n%s\ngot\n%s", rawExtra, rawAfter) } // ensure that it was shallow copied after["b"] = 3 if d := b.Extra(); d["b"] != 2 { t.Fatalf("Expected extra to remain unchanged, got\n%v", d) } } func TestBuildAuthURL(t *testing.T) { b := BaseProvider{ authURL: "authURL_test", tokenURL: "tokenURL_test", redirectURL: "redirectURL_test", clientId: "clientId_test", clientSecret: "clientSecret_test", scopes: []string{"test_scope"}, } expected := "authURL_test?access_type=offline&client_id=clientId_test&prompt=consent&redirect_uri=redirectURL_test&response_type=code&scope=test_scope&state=state_test" result := b.BuildAuthURL("state_test", oauth2.AccessTypeOffline, oauth2.ApprovalForce) if result != expected { t.Errorf("Expected auth url %q, got %q", expected, result) } } func TestClient(t *testing.T) { b := BaseProvider{} result := b.Client(&oauth2.Token{}) if result == nil { t.Error("Expected *http.Client instance, got nil") } } func TestOauth2Config(t *testing.T) { b := BaseProvider{ authURL: "authURL_test", tokenURL: "tokenURL_test", redirectURL: "redirectURL_test", clientId: "clientId_test", clientSecret: "clientSecret_test", scopes: []string{"test"}, } result := b.oauth2Config() if result.RedirectURL != b.RedirectURL() { t.Errorf("Expected redirectURL %s, got %s", b.RedirectURL(), result.RedirectURL) } if result.ClientID != b.ClientId() { t.Errorf("Expected clientId %s, got %s", b.ClientId(), result.ClientID) } if result.ClientSecret != b.ClientSecret() { t.Errorf("Expected clientSecret %s, got %s", b.ClientSecret(), result.ClientSecret) } if result.Endpoint.AuthURL != b.AuthURL() { t.Errorf("Expected authURL %s, got %s", b.AuthURL(), result.Endpoint.AuthURL) } if result.Endpoint.TokenURL != b.TokenURL() { t.Errorf("Expected authURL %s, got %s", b.TokenURL(), result.Endpoint.TokenURL) } if len(result.Scopes) != len(b.Scopes()) || result.Scopes[0] != b.Scopes()[0] { t.Errorf("Expected scopes %s, got %s", b.Scopes(), result.Scopes) } }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/auth/internal/jwk/jwk.go
tools/auth/internal/jwk/jwk.go
// Package jwk implements some common utilities for interacting with JWKs // (mostly used with OIDC providers). package jwk import ( "context" "crypto/ed25519" "crypto/rsa" "encoding/base64" "encoding/json" "errors" "fmt" "io" "math/big" "net/http" "strings" "github.com/golang-jwt/jwt/v5" ) type JWK struct { Kty string `json:"kty"` Kid string `json:"kid"` Use string `json:"use"` Alg string `json:"alg"` // RS256 (RSA) E string `json:"e"` N string `json:"n"` // Ed25519 (OKP) Crv string `json:"crv"` X string `json:"x"` } // PublicKey reconstructs and returns the public key from the current JWK. func (key *JWK) PublicKey() (any, error) { switch key.Kty { case "RSA": // RFC 7518 // https://datatracker.ietf.org/doc/html/rfc7518#section-6.3 // https://datatracker.ietf.org/doc/html/rfc7517#appendix-A.1 exponent, err := base64.RawURLEncoding.DecodeString(strings.TrimRight(key.E, "=")) if err != nil { return nil, err } modulus, err := base64.RawURLEncoding.DecodeString(strings.TrimRight(key.N, "=")) if err != nil { return nil, err } return &rsa.PublicKey{ E: int(big.NewInt(0).SetBytes(exponent).Uint64()), N: big.NewInt(0).SetBytes(modulus), }, nil case "OKP": // RFC 8037 // https://datatracker.ietf.org/doc/html/rfc8037#section-2 // https://datatracker.ietf.org/doc/html/rfc8037#appendix-A if key.Crv != "Ed25519" { return nil, fmt.Errorf("unsupported OKP curve (must be Ed25519): %q", key.Crv) } x, err := base64.RawURLEncoding.DecodeString(strings.TrimRight(key.X, "=")) if err != nil { return nil, err } if l := len(x); l != ed25519.PublicKeySize { return nil, fmt.Errorf("invalid Ed25519 key length: %d", l) } return ed25519.PublicKey(x), nil default: return nil, fmt.Errorf("unsupported kty (must be RSA or OKP): %q", key.Kty) } } // Fetch retrieves the JSON Web Key Set located at jwksURL and returns // the first key that matches the specified kid. func Fetch(ctx context.Context, jwksURL string, kid string) (*JWK, error) { req, err := http.NewRequestWithContext(ctx, "GET", jwksURL, nil) if err != nil { return nil, err } res, err := http.DefaultClient.Do(req) if err != nil { return nil, err } defer res.Body.Close() rawBody, err := io.ReadAll(res.Body) if err != nil { return nil, err } // http.Client.Get doesn't treat non 2xx responses as error if res.StatusCode >= 400 { return nil, fmt.Errorf( "failed to fetch JSON Web Key Set from %s (%d):\n%s", jwksURL, res.StatusCode, string(rawBody), ) } jwks := struct { Keys []*JWK }{} err = json.Unmarshal(rawBody, &jwks) if err != nil { return nil, err } for _, key := range jwks.Keys { if key.Kid == kid { return key, nil } } return nil, fmt.Errorf("JWK with kid %q was not found", kid) } // ValidateTokenSignature validates the signature of a token with the // public key retrievied from a remote JWKS. func ValidateTokenSignature(ctx context.Context, token string, jwksURL string) error { // extract the kid token header // --- t, _, err := jwt.NewParser().ParseUnverified(token, jwt.MapClaims{}) if err != nil { return err } kid, _ := t.Header["kid"].(string) if kid == "" { return errors.New("missing kid header value") } // fetch the public key set // --- key, err := Fetch(ctx, jwksURL, kid) if err != nil { return err } // verify the signature // --- parser := jwt.NewParser(jwt.WithValidMethods([]string{key.Alg})) parsedToken, err := parser.Parse(token, func(t *jwt.Token) (any, error) { return key.PublicKey() }) if err != nil { return err } if !parsedToken.Valid { return errors.New("the parsed token is invalid") } return nil }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/auth/internal/jwk/jwk_test.go
tools/auth/internal/jwk/jwk_test.go
package jwk_test import ( "context" "crypto" "crypto/ed25519" "crypto/rand" "crypto/rsa" "encoding/base64" "encoding/json" "fmt" "math/big" "net/http" "net/http/httptest" "strings" "testing" "github.com/golang-jwt/jwt/v5" "github.com/pocketbase/pocketbase/tools/auth/internal/jwk" ) type publicKey interface { Equal(x crypto.PublicKey) bool } func TestJWK_PublicKey(t *testing.T) { t.Parallel() rsaPrivate, err := rsa.GenerateKey(rand.Reader, 1024) if err != nil { t.Fatal(err) } scenarios := []struct { name string key *jwk.JWK expectError bool expectKey crypto.PublicKey }{ { "empty", &jwk.JWK{}, true, nil, }, { "invalid kty", &jwk.JWK{ Kty: "invalid", Alg: "RS256", E: base64.RawURLEncoding.EncodeToString(big.NewInt(int64(rsaPrivate.E)).Bytes()), N: base64.RawURLEncoding.EncodeToString(rsaPrivate.N.Bytes()), }, true, nil, }, { "RSA", &jwk.JWK{ Kty: "RSA", Alg: "RS256", E: base64.RawURLEncoding.EncodeToString(big.NewInt(int64(rsaPrivate.E)).Bytes()), N: base64.RawURLEncoding.EncodeToString(rsaPrivate.N.Bytes()), }, false, &rsaPrivate.PublicKey, }, { "OKP with unsupported curve", &jwk.JWK{ Kty: "OKP", Crv: "invalid", X: base64.RawURLEncoding.EncodeToString([]byte(strings.Repeat("a", ed25519.PublicKeySize))), }, true, nil, }, { "OKP with invalid public key length", &jwk.JWK{ Kty: "OKP", Crv: "Ed25519", X: base64.RawURLEncoding.EncodeToString([]byte(strings.Repeat("a", ed25519.PublicKeySize-1))), }, true, nil, }, { "valid OKP", &jwk.JWK{ Kty: "OKP", Crv: "Ed25519", X: base64.RawURLEncoding.EncodeToString([]byte(strings.Repeat("a", ed25519.PublicKeySize))), }, false, ed25519.PublicKey([]byte(strings.Repeat("a", ed25519.PublicKeySize))), }, } for _, s := range scenarios { t.Run(s.name, func(t *testing.T) { result, err := s.key.PublicKey() hasErr := err != nil if hasErr != s.expectError { t.Fatalf("Expected hasErr %v, got %v (%v)", s.expectError, hasErr, err) } if hasErr && result == nil { return } k, ok := result.(publicKey) if !ok { t.Fatalf("The returned public key %T doesn't satisfy the expected common interface", k) } if !k.Equal(s.expectKey) { t.Fatalf("The returned public key doesn't match with the expected one:\n%v\n%v", k, s.expectKey) } }) } } func TestFetch(t *testing.T) { t.Parallel() server := httptest.NewServer(http.HandlerFunc(func(res http.ResponseWriter, req *http.Request) { if req.URL.Query().Has("error") { res.WriteHeader(http.StatusBadRequest) } fmt.Fprintf(res, `{ "keys": [ { "kid": "abc", "kty": "OKP", "crv": "Ed25519", "x": "test_x" }, { "kid": "def", "kty": "RSA", "alg": "RS256", "n": "test_n", "e": "test_e" } ] }`) })) defer server.Close() scenarios := []struct { name string kid string expectError bool contains []string }{ { "error response", "def", true, nil, }, { "non-matching kid", "missing", true, nil, }, { "matching kid", "def", false, []string{ `"kid":"def"`, `"kty":"RSA"`, `"alg":"RS256"`, `"n":"test_n"`, `"e":"test_e"`, }, }, } for _, s := range scenarios { t.Run(s.name, func(t *testing.T) { url := server.URL if s.expectError { url += "?error" } key, err := jwk.Fetch(context.Background(), url, s.kid) hasErr := err != nil if hasErr != s.expectError { t.Fatalf("Expected hasErr %v, got %v (%v)", s.expectError, hasErr, err) } raw, err := json.Marshal(key) if err != nil { t.Fatal(err) } rawStr := string(raw) for _, substr := range s.contains { if !strings.Contains(rawStr, substr) { t.Fatalf("Missing expected substring\n%s\nin\n%s", substr, rawStr) } } }) } } func TestValidateTokenSignature(t *testing.T) { t.Parallel() rsaPrivate, err := rsa.GenerateKey(rand.Reader, 1024) if err != nil { t.Fatal(err) } ed25519Public, ed25519Private, err := ed25519.GenerateKey(rand.Reader) if err != nil { t.Fatal(err) } nonmatchingKidToken := jwt.New(&jwt.SigningMethodEd25519{}) nonmatchingKidToken.Header["kid"] = "missing" nonmatchingKidTokenStr, err := nonmatchingKidToken.SignedString(ed25519Private) if err != nil { t.Fatal(err) } key1Token := jwt.New(&jwt.SigningMethodEd25519{}) key1Token.Header["kid"] = "key1" key1TokenStr, err := key1Token.SignedString(ed25519Private) if err != nil { t.Fatal(err) } key2Token := jwt.New(jwt.SigningMethodRS256) key2Token.Header["kid"] = "key2" key2TokenStr, err := key2Token.SignedString(rsaPrivate) if err != nil { t.Fatal(err) } server := httptest.NewServer(http.HandlerFunc(func(res http.ResponseWriter, req *http.Request) { _ = json.NewEncoder(res).Encode(map[string]any{"keys": []*jwk.JWK{ { Kid: "key1", Kty: "OKP", Alg: "EdDSA", Crv: "Ed25519", X: base64.RawURLEncoding.EncodeToString(ed25519Public), }, { Kid: "key2", Kty: "RSA", Alg: "RS256", E: base64.RawURLEncoding.EncodeToString(big.NewInt(int64(rsaPrivate.E)).Bytes()), N: base64.RawURLEncoding.EncodeToString(rsaPrivate.N.Bytes()), }, }}) })) defer server.Close() scenarios := []struct { name string token string expectError bool }{ { "empty token", "", true, }, { "invlaid token", "abc", true, }, { "no matching kid", nonmatchingKidTokenStr, true, }, { "valid Ed25519 token", key1TokenStr, false, }, { "valid RSA token", key2TokenStr, false, }, } for _, s := range scenarios { t.Run(s.name, func(t *testing.T) { err := jwk.ValidateTokenSignature( context.Background(), s.token, server.URL, ) hasErr := err != nil if hasErr != s.expectError { t.Fatalf("Expected hasErr %v, got %v (%v)", s.expectError, hasErr, err) } }) } }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/logger/batch_handler_test.go
tools/logger/batch_handler_test.go
package logger import ( "context" "errors" "fmt" "log/slog" "testing" "time" validation "github.com/go-ozzo/ozzo-validation/v4" ) func TestNewBatchHandlerPanic(t *testing.T) { defer func() { if r := recover(); r == nil { t.Errorf("Expected to panic.") } }() NewBatchHandler(BatchOptions{}) } func TestNewBatchHandlerDefaults(t *testing.T) { h := NewBatchHandler(BatchOptions{ WriteFunc: func(ctx context.Context, logs []*Log) error { return nil }, }) if h.options.BatchSize != 100 { t.Fatalf("Expected default BatchSize %d, got %d", 100, h.options.BatchSize) } if h.options.Level != slog.LevelInfo { t.Fatalf("Expected default Level Info, got %v", h.options.Level) } if h.options.BeforeAddFunc != nil { t.Fatal("Expected default BeforeAddFunc to be nil") } if h.options.WriteFunc == nil { t.Fatal("Expected default WriteFunc to be set") } if h.group != "" { t.Fatalf("Expected empty group, got %s", h.group) } if len(h.attrs) != 0 { t.Fatalf("Expected empty attrs, got %v", h.attrs) } if len(h.logs) != 0 { t.Fatalf("Expected empty logs queue, got %v", h.logs) } } func TestBatchHandlerEnabled(t *testing.T) { h := NewBatchHandler(BatchOptions{ Level: slog.LevelWarn, WriteFunc: func(ctx context.Context, logs []*Log) error { return nil }, }) l := slog.New(h) scenarios := []struct { level slog.Level expected bool }{ {slog.LevelDebug, false}, {slog.LevelInfo, false}, {slog.LevelWarn, true}, {slog.LevelError, true}, } for _, s := range scenarios { t.Run(fmt.Sprintf("Level %v", s.level), func(t *testing.T) { result := l.Enabled(context.Background(), s.level) if result != s.expected { t.Fatalf("Expected %v, got %v", s.expected, result) } }) } } func TestBatchHandlerSetLevel(t *testing.T) { h := NewBatchHandler(BatchOptions{ Level: slog.LevelWarn, WriteFunc: func(ctx context.Context, logs []*Log) error { return nil }, }) if h.options.Level != slog.LevelWarn { t.Fatalf("Expected the initial level to be %d, got %d", slog.LevelWarn, h.options.Level) } h.SetLevel(slog.LevelDebug) if h.options.Level != slog.LevelDebug { t.Fatalf("Expected the updated level to be %d, got %d", slog.LevelDebug, h.options.Level) } } func TestBatchHandlerWithAttrsAndWithGroup(t *testing.T) { h0 := NewBatchHandler(BatchOptions{ WriteFunc: func(ctx context.Context, logs []*Log) error { return nil }, }) h1 := h0.WithAttrs([]slog.Attr{slog.Int("test1", 1)}).(*BatchHandler) h2 := h1.WithGroup("h2_group").(*BatchHandler) h3 := h2.WithAttrs([]slog.Attr{slog.Int("test2", 2)}).(*BatchHandler) scenarios := []struct { name string handler *BatchHandler expectedParent *BatchHandler expectedGroup string expectedAttrs int }{ { "h0", h0, nil, "", 0, }, { "h1", h1, h0, "", 1, }, { "h2", h2, h1, "h2_group", 0, }, { "h3", h3, h2, "", 1, }, } for _, s := range scenarios { t.Run(s.name, func(t *testing.T) { if s.handler.group != s.expectedGroup { t.Fatalf("Expected group %q, got %q", s.expectedGroup, s.handler.group) } if s.handler.parent != s.expectedParent { t.Fatalf("Expected parent %v, got %v", s.expectedParent, s.handler.parent) } if totalAttrs := len(s.handler.attrs); totalAttrs != s.expectedAttrs { t.Fatalf("Expected %d attrs, got %d", s.expectedAttrs, totalAttrs) } }) } } func TestBatchHandlerHandle(t *testing.T) { ctx := context.Background() beforeLogs := []*Log{} writeLogs := []*Log{} h := NewBatchHandler(BatchOptions{ BatchSize: 3, BeforeAddFunc: func(_ context.Context, log *Log) bool { beforeLogs = append(beforeLogs, log) // skip test2 log return log.Message != "test2" }, WriteFunc: func(_ context.Context, logs []*Log) error { writeLogs = logs return nil }, }) h.Handle(ctx, slog.NewRecord(time.Now(), slog.LevelInfo, "test1", 0)) h.Handle(ctx, slog.NewRecord(time.Now(), slog.LevelInfo, "test2", 0)) h.Handle(ctx, slog.NewRecord(time.Now(), slog.LevelInfo, "test3", 0)) // no batch write { checkLogMessages([]string{"test1", "test2", "test3"}, beforeLogs, t) checkLogMessages([]string{"test1", "test3"}, h.logs, t) // should be empty because no batch write has happened yet if totalWriteLogs := len(writeLogs); totalWriteLogs != 0 { t.Fatalf("Expected %d writeLogs, got %d", 0, totalWriteLogs) } } // add one more log to trigger the batch write { h.Handle(ctx, slog.NewRecord(time.Now(), slog.LevelInfo, "test4", 0)) // should be empty after the batch write checkLogMessages([]string{}, h.logs, t) checkLogMessages([]string{"test1", "test3", "test4"}, writeLogs, t) } } func TestBatchHandlerWriteAll(t *testing.T) { ctx := context.Background() beforeLogs := []*Log{} writeLogs := []*Log{} h := NewBatchHandler(BatchOptions{ BatchSize: 3, BeforeAddFunc: func(_ context.Context, log *Log) bool { beforeLogs = append(beforeLogs, log) return true }, WriteFunc: func(_ context.Context, logs []*Log) error { writeLogs = logs return nil }, }) h.Handle(ctx, slog.NewRecord(time.Now(), slog.LevelInfo, "test1", 0)) h.Handle(ctx, slog.NewRecord(time.Now(), slog.LevelInfo, "test2", 0)) checkLogMessages([]string{"test1", "test2"}, beforeLogs, t) checkLogMessages([]string{"test1", "test2"}, h.logs, t) checkLogMessages([]string{}, writeLogs, t) // empty because the batch size hasn't been reached // force trigger the batch write h.WriteAll(ctx) checkLogMessages([]string{"test1", "test2"}, beforeLogs, t) checkLogMessages([]string{}, h.logs, t) // reset checkLogMessages([]string{"test1", "test2"}, writeLogs, t) } func TestBatchHandlerAttrsFormat(t *testing.T) { ctx := context.Background() beforeLogs := []*Log{} h0 := NewBatchHandler(BatchOptions{ BeforeAddFunc: func(_ context.Context, log *Log) bool { beforeLogs = append(beforeLogs, log) return true }, WriteFunc: func(_ context.Context, logs []*Log) error { return nil }, }) h1 := h0.WithAttrs([]slog.Attr{slog.Int("a", 1), slog.String("b", "123")}) h2 := h1.WithGroup("sub").WithAttrs([]slog.Attr{ slog.Int("c", 3), slog.Any("d", map[string]any{"d.1": 1}), slog.Any("e", errors.New("example error")), }) record := slog.NewRecord(time.Now(), slog.LevelInfo, "hello", 0) record.AddAttrs(slog.String("name", "test")) h0.Handle(ctx, record) h1.Handle(ctx, record) h2.Handle(ctx, record) // errors serialization checks errorsRecord := slog.NewRecord(time.Now(), slog.LevelError, "details", 0) errorsRecord.Add("validation.Errors", validation.Errors{ "a": validation.NewError("validation_code", "validation_message"), "b": errors.New("plain"), }) errorsRecord.Add("wrapped_validation.Errors", fmt.Errorf("wrapped: %w", validation.Errors{ "a": validation.NewError("validation_code", "validation_message"), "b": errors.New("plain"), })) errorsRecord.Add("map[string]any", map[string]any{ "a": validation.NewError("validation_code", "validation_message"), "b": errors.New("plain"), "c": "test_any", "d": map[string]any{ "nestedA": validation.NewError("nested_code", "nested_message"), "nestedB": errors.New("nested_plain"), }, }) errorsRecord.Add("map[string]error", map[string]error{ "a": validation.NewError("validation_code", "validation_message"), "b": errors.New("plain"), }) errorsRecord.Add("map[string]validation.Error", map[string]validation.Error{ "a": validation.NewError("validation_code", "validation_message"), "b": nil, }) errorsRecord.Add("plain_error", errors.New("plain")) h0.Handle(ctx, errorsRecord) expected := []string{ `{"name":"test"}`, `{"a":1,"b":"123","name":"test"}`, `{"a":1,"b":"123","sub":{"c":3,"d":{"d.1":1},"e":"example error","name":"test"}}`, `{"map[string]any":{"a":"validation_message","b":"plain","c":"test_any","d":{"nestedA":"nested_message","nestedB":"nested_plain"}},"map[string]error":{"a":"validation_message","b":"plain"},"map[string]validation.Error":{"a":"validation_message","b":null},"plain_error":"plain","validation.Errors":{"a":"validation_message","b":"plain"},"wrapped_validation.Errors":{"data":{"a":"validation_message","b":"plain"},"raw":"wrapped: a: validation_message; b: plain."}}`, } if len(beforeLogs) != len(expected) { t.Fatalf("Expected %d logs, got %d", len(expected), len(beforeLogs)) } for i, data := range expected { t.Run(fmt.Sprintf("log handler %d", i), func(t *testing.T) { log := beforeLogs[i] raw, _ := log.Data.MarshalJSON() if string(raw) != data { t.Fatalf("Expected \n%s \ngot \n%s", data, raw) } }) } } func checkLogMessages(expected []string, logs []*Log, t *testing.T) { if len(logs) != len(expected) { t.Fatalf("Expected %d batched logs, got %d (expected: %v)", len(expected), len(logs), expected) } for _, message := range expected { exists := false for _, l := range logs { if l.Message == message { exists = true continue } } if !exists { t.Fatalf("Missing %q log message", message) } } }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/logger/log.go
tools/logger/log.go
package logger import ( "log/slog" "time" "github.com/pocketbase/pocketbase/tools/types" ) // Log is similar to [slog.Record] bit contains the log attributes as // preformatted JSON map. type Log struct { Time time.Time Data types.JSONMap[any] Message string Level slog.Level }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/logger/batch_handler.go
tools/logger/batch_handler.go
package logger import ( "context" "encoding/json" "errors" "log/slog" "sync" validation "github.com/go-ozzo/ozzo-validation/v4" "github.com/pocketbase/pocketbase/tools/types" ) var _ slog.Handler = (*BatchHandler)(nil) // BatchOptions are options for the BatchHandler. type BatchOptions struct { // WriteFunc processes the batched logs. WriteFunc func(ctx context.Context, logs []*Log) error // BeforeAddFunc is optional function that is invoked every time // before a new log is added to the batch queue. // // Return false to skip adding the log into the batch queue. BeforeAddFunc func(ctx context.Context, log *Log) bool // Level reports the minimum level to log. // Levels with lower levels are discarded. // If nil, the Handler uses [slog.LevelInfo]. Level slog.Leveler // BatchSize specifies how many logs to accumulate before calling WriteFunc. // If not set or 0, fallback to 100 by default. BatchSize int } // NewBatchHandler creates a slog compatible handler that writes JSON // logs on batches (default to 100), using the given options. // // Panics if [BatchOptions.WriteFunc] is not defined. // // Example: // // l := slog.New(logger.NewBatchHandler(logger.BatchOptions{ // WriteFunc: func(ctx context.Context, logs []*Log) error { // for _, l := range logs { // fmt.Println(l.Level, l.Message, l.Data) // } // return nil // } // })) // l.Info("Example message", "title", "lorem ipsum") func NewBatchHandler(options BatchOptions) *BatchHandler { h := &BatchHandler{ mux: &sync.Mutex{}, options: &options, } if h.options.WriteFunc == nil { panic("options.WriteFunc must be set") } if h.options.Level == nil { h.options.Level = slog.LevelInfo } if h.options.BatchSize == 0 { h.options.BatchSize = 100 } h.logs = make([]*Log, 0, h.options.BatchSize) return h } // BatchHandler is a slog handler that writes records on batches. // // The log records attributes are formatted in JSON. // // Requires the [BatchOptions.WriteFunc] option to be defined. type BatchHandler struct { mux *sync.Mutex parent *BatchHandler options *BatchOptions group string attrs []slog.Attr logs []*Log } // Enabled reports whether the handler handles records at the given level. // // The handler ignores records whose level is lower. func (h *BatchHandler) Enabled(ctx context.Context, level slog.Level) bool { return level >= h.options.Level.Level() } // WithGroup returns a new BatchHandler that starts a group. // // All logger attributes will be resolved under the specified group name. func (h *BatchHandler) WithGroup(name string) slog.Handler { if name == "" { return h } return &BatchHandler{ parent: h, mux: h.mux, options: h.options, group: name, } } // WithAttrs returns a new BatchHandler loaded with the specified attributes. func (h *BatchHandler) WithAttrs(attrs []slog.Attr) slog.Handler { if len(attrs) == 0 { return h } return &BatchHandler{ parent: h, mux: h.mux, options: h.options, attrs: attrs, } } // Handle formats the slog.Record argument as JSON object and adds it // to the batch queue. // // If the batch queue threshold has been reached, the WriteFunc option // is invoked with the accumulated logs which in turn will reset the batch queue. func (h *BatchHandler) Handle(ctx context.Context, r slog.Record) error { if h.group != "" { h.mux.Lock() attrs := make([]any, 0, len(h.attrs)+r.NumAttrs()) for _, a := range h.attrs { attrs = append(attrs, a) } h.mux.Unlock() r.Attrs(func(a slog.Attr) bool { attrs = append(attrs, a) return true }) r = slog.NewRecord(r.Time, r.Level, r.Message, r.PC) r.AddAttrs(slog.Group(h.group, attrs...)) } else if len(h.attrs) > 0 { r = r.Clone() h.mux.Lock() r.AddAttrs(h.attrs...) h.mux.Unlock() } if h.parent != nil { return h.parent.Handle(ctx, r) } data := make(map[string]any, r.NumAttrs()) r.Attrs(func(a slog.Attr) bool { if err := h.resolveAttr(data, a); err != nil { return false } return true }) log := &Log{ Time: r.Time, Level: r.Level, Message: r.Message, Data: types.JSONMap[any](data), } if h.options.BeforeAddFunc != nil && !h.options.BeforeAddFunc(ctx, log) { return nil } h.mux.Lock() h.logs = append(h.logs, log) totalLogs := len(h.logs) h.mux.Unlock() if totalLogs >= h.options.BatchSize { if err := h.WriteAll(ctx); err != nil { return err } } return nil } // SetLevel updates the handler options level to the specified one. func (h *BatchHandler) SetLevel(level slog.Level) { h.mux.Lock() h.options.Level = level h.mux.Unlock() } // WriteAll writes all accumulated Log entries and resets the batch queue. func (h *BatchHandler) WriteAll(ctx context.Context) error { if h.parent != nil { // invoke recursively the parent level handler since the most // top level one is holding the logs queue. return h.parent.WriteAll(ctx) } h.mux.Lock() totalLogs := len(h.logs) // no logs to write if totalLogs == 0 { h.mux.Unlock() return nil } // create a copy of the logs slice to prevent blocking during write logs := make([]*Log, totalLogs) copy(logs, h.logs) h.logs = h.logs[:0] // reset h.mux.Unlock() return h.options.WriteFunc(ctx, logs) } // resolveAttr writes attr into data. func (h *BatchHandler) resolveAttr(data map[string]any, attr slog.Attr) error { // ensure that the attr value is resolved before doing anything else attr.Value = attr.Value.Resolve() if attr.Equal(slog.Attr{}) { return nil // ignore empty attrs } switch attr.Value.Kind() { case slog.KindGroup: attrs := attr.Value.Group() if len(attrs) == 0 { return nil // ignore empty groups } // create a submap to wrap the resolved group attributes groupData := make(map[string]any, len(attrs)) for _, subAttr := range attrs { h.resolveAttr(groupData, subAttr) } if len(groupData) > 0 { data[attr.Key] = groupData } default: data[attr.Key] = normalizeLogAttrValue(attr.Value.Any()) } return nil } func normalizeLogAttrValue(rawAttrValue any) any { switch attrV := rawAttrValue.(type) { case validation.Errors: out := make(map[string]any, len(attrV)) for k, v := range attrV { out[k] = serializeLogError(v) } return out case map[string]validation.Error: out := make(map[string]any, len(attrV)) for k, v := range attrV { out[k] = serializeLogError(v) } return out case map[string]error: out := make(map[string]any, len(attrV)) for k, v := range attrV { out[k] = serializeLogError(v) } return out case map[string]any: out := make(map[string]any, len(attrV)) for k, v := range attrV { switch vv := v.(type) { case error: out[k] = serializeLogError(vv) default: out[k] = normalizeLogAttrValue(vv) } } return out case error: // check for wrapped validation.Errors var ve validation.Errors if errors.As(attrV, &ve) { out := make(map[string]any, len(ve)) for k, v := range ve { out[k] = serializeLogError(v) } return map[string]any{ "data": out, "raw": serializeLogError(attrV), } } return serializeLogError(attrV) default: return attrV } } func serializeLogError(err error) any { if err == nil { return nil } // prioritize a json structured format (e.g. validation.Errors) jsonErr, ok := err.(json.Marshaler) if ok { return jsonErr } // fallback to its original string representation return err.Error() }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/mailer/html2text.go
tools/mailer/html2text.go
package mailer import ( "regexp" "strings" "github.com/pocketbase/pocketbase/tools/list" "golang.org/x/net/html" ) var whitespaceRegex = regexp.MustCompile(`\s+`) var tagsToSkip = []string{ "style", "script", "iframe", "applet", "object", "svg", "img", "button", "form", "textarea", "input", "select", "option", "template", } var inlineTags = []string{ "a", "span", "small", "strike", "strong", "sub", "sup", "em", "b", "u", "i", } // Very rudimentary auto HTML to Text mail body converter. // // Caveats: // - This method doesn't check for correctness of the HTML document. // - Links will be converted to "[text](url)" format. // - List items (<li>) are prefixed with "- ". // - Indentation is stripped (both tabs and spaces). // - Trailing spaces are preserved. // - Multiple consequence newlines are collapsed as one unless multiple <br> tags are used. func html2Text(htmlDocument string) (string, error) { doc, err := html.Parse(strings.NewReader(htmlDocument)) if err != nil { return "", err } var builder strings.Builder var canAddNewLine bool // see https://pkg.go.dev/golang.org/x/net/html#Parse var f func(*html.Node, *strings.Builder) f = func(n *html.Node, activeBuilder *strings.Builder) { isLink := n.Type == html.ElementNode && n.Data == "a" if isLink { var linkBuilder strings.Builder activeBuilder = &linkBuilder } else if activeBuilder == nil { activeBuilder = &builder } switch n.Type { case html.TextNode: txt := whitespaceRegex.ReplaceAllString(n.Data, " ") // the prev node has new line so it is safe to trim the indentation if !canAddNewLine { txt = strings.TrimLeft(txt, " ") } if txt != "" { activeBuilder.WriteString(txt) canAddNewLine = true } case html.ElementNode: if n.Data == "br" { // always write new lines when <br> tag is used activeBuilder.WriteString("\r\n") canAddNewLine = false } else if canAddNewLine && !list.ExistInSlice(n.Data, inlineTags) { activeBuilder.WriteString("\r\n") canAddNewLine = false } // prefix list items with dash if n.Data == "li" { activeBuilder.WriteString("- ") } } for c := n.FirstChild; c != nil; c = c.NextSibling { if c.Type != html.ElementNode || !list.ExistInSlice(c.Data, tagsToSkip) { f(c, activeBuilder) } } // format links as [label](href) if isLink { linkTxt := strings.TrimSpace(activeBuilder.String()) if linkTxt == "" { linkTxt = "LINK" } builder.WriteString("[") builder.WriteString(linkTxt) builder.WriteString("]") // link href attr extraction for _, a := range n.Attr { if a.Key == "href" { if a.Val != "" { builder.WriteString("(") builder.WriteString(a.Val) builder.WriteString(")") } break } } activeBuilder.Reset() } } f(doc, &builder) return strings.TrimSpace(builder.String()), nil }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/mailer/html2text_test.go
tools/mailer/html2text_test.go
package mailer import ( "testing" ) func TestHTML2Text(t *testing.T) { scenarios := []struct { html string expected string }{ { "", "", }, { "ab c", "ab c", }, { "<!-- test html comment -->", "", }, { "<!-- test html comment --> a ", "a", }, { "<span>a</span>b<span>c</span>", "abc", }, { `<a href="a/b/c">test</span>`, "[test](a/b/c)", }, { `<a href="">test</span>`, "[test]", }, { "<span>a</span> <span>b</span>", "a b", }, { "<span>a</span> b <span>c</span>", "a b c", }, { "<span>a</span> b <div>c</div>", "a b \r\nc", }, { ` <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> <meta name="viewport" content="width=device-width,initial-scale=1" /> <style> body { padding: 0; } </style> </head> <body> <!-- test html comment --> <style> body { padding: 0; } </style> <div class="wrapper"> <div class="content"> <p>Lorem ipsum</p> <p>Dolor sit amet</p> <p> <a href="a/b/c">Verify</a> </p> <br> <p> <a href="a/b/c"><strong>Verify2.1</strong> <strong>Verify2.2</strong></a> </p> <br> <br> <div> <div> <div> <ul> <li>ul.test1</li> <li>ul.test2</li> <li>ul.test3</li> </ul> <ol> <li>ol.test1</li> <li>ol.test2</li> <li>ol.test3</li> </ol> </div> </div> </div> <select> <option>Option 1</option> <option>Option 2</option> </select> <textarea>test</textarea> <input type="text" value="test" /> <button>test</button> <p> Thanks,<br/> PocketBase team </p> </div> </div> </body> </html> `, "Lorem ipsum \r\nDolor sit amet \r\n[Verify](a/b/c) \r\n[Verify2.1 Verify2.2](a/b/c) \r\n\r\n- ul.test1 \r\n- ul.test2 \r\n- ul.test3 \r\n- ol.test1 \r\n- ol.test2 \r\n- ol.test3 \r\nThanks,\r\nPocketBase team", }, } for i, s := range scenarios { result, err := html2Text(s.html) if err != nil { t.Errorf("(%d) Unexpected error %v", i, err) } if result != s.expected { t.Errorf("(%d) Expected \n(%q)\n%v,\n\ngot:\n\n(%q)\n%v", i, s.expected, s.expected, result, result) } } }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/mailer/mailer_test.go
tools/mailer/mailer_test.go
package mailer import ( "fmt" "io" "net/mail" "strings" "testing" ) func TestAddressesToStrings(t *testing.T) { t.Parallel() scenarios := []struct { withName bool addresses []mail.Address expected []string }{ { true, []mail.Address{{Name: "John Doe", Address: "test1@example.com"}, {Name: "Jane Doe", Address: "test2@example.com"}}, []string{`"John Doe" <test1@example.com>`, `"Jane Doe" <test2@example.com>`}, }, { true, []mail.Address{{Name: "John Doe", Address: "test1@example.com"}, {Address: "test2@example.com"}}, []string{`"John Doe" <test1@example.com>`, `test2@example.com`}, }, { false, []mail.Address{{Name: "John Doe", Address: "test1@example.com"}, {Name: "Jane Doe", Address: "test2@example.com"}}, []string{`test1@example.com`, `test2@example.com`}, }, } for _, s := range scenarios { t.Run(fmt.Sprintf("%v_%v", s.withName, s.addresses), func(t *testing.T) { result := addressesToStrings(s.addresses, s.withName) if len(s.expected) != len(result) { t.Fatalf("Expected\n%v\ngot\n%v", s.expected, result) } for k, v := range s.expected { if v != result[k] { t.Fatalf("Expected %d address %q, got %q", k, v, result[k]) } } }) } } func TestDetectReaderMimeType(t *testing.T) { t.Parallel() str := "#!/bin/node\n" + strings.Repeat("a", 10000) // ensure that it is large enough to remain after the signature sniffing r, mime, err := detectReaderMimeType(strings.NewReader(str)) if err != nil { t.Fatal(err) } expectedMime := "text/javascript" if mime != expectedMime { t.Fatalf("Expected mime %q, got %q", expectedMime, mime) } raw, err := io.ReadAll(r) if err != nil { t.Fatal(err) } rawStr := string(raw) if rawStr != str { t.Fatalf("Expected content\n%s\ngot\n%s", str, rawStr) } }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/mailer/smtp_test.go
tools/mailer/smtp_test.go
package mailer import ( "net/smtp" "testing" ) func TestLoginAuthStart(t *testing.T) { auth := smtpLoginAuth{username: "test", password: "123456"} scenarios := []struct { name string serverInfo *smtp.ServerInfo expectError bool }{ { "localhost without tls", &smtp.ServerInfo{TLS: false, Name: "localhost"}, false, }, { "localhost with tls", &smtp.ServerInfo{TLS: true, Name: "localhost"}, false, }, { "127.0.0.1 without tls", &smtp.ServerInfo{TLS: false, Name: "127.0.0.1"}, false, }, { "127.0.0.1 with tls", &smtp.ServerInfo{TLS: false, Name: "127.0.0.1"}, false, }, { "::1 without tls", &smtp.ServerInfo{TLS: false, Name: "::1"}, false, }, { "::1 with tls", &smtp.ServerInfo{TLS: false, Name: "::1"}, false, }, { "non-localhost without tls", &smtp.ServerInfo{TLS: false, Name: "example.com"}, true, }, { "non-localhost with tls", &smtp.ServerInfo{TLS: true, Name: "example.com"}, false, }, } for _, s := range scenarios { t.Run(s.name, func(t *testing.T) { method, resp, err := auth.Start(s.serverInfo) hasErr := err != nil if hasErr != s.expectError { t.Fatalf("Expected hasErr %v, got %v", s.expectError, hasErr) } if hasErr { return } if len(resp) != 0 { t.Fatalf("Expected empty data response, got %v", resp) } if method != "LOGIN" { t.Fatalf("Expected LOGIN, got %v", method) } }) } } func TestLoginAuthNext(t *testing.T) { auth := smtpLoginAuth{username: "test", password: "123456"} { // example|false r1, err := auth.Next([]byte("example:"), false) if err != nil { t.Fatalf("[example|false] Unexpected error %v", err) } if len(r1) != 0 { t.Fatalf("[example|false] Expected empty part, got %v", r1) } // example|true r2, err := auth.Next([]byte("example:"), true) if err != nil { t.Fatalf("[example|true] Unexpected error %v", err) } if len(r2) != 0 { t.Fatalf("[example|true] Expected empty part, got %v", r2) } } // --------------------------------------------------------------- { // username:|false r1, err := auth.Next([]byte("username:"), false) if err != nil { t.Fatalf("[username|false] Unexpected error %v", err) } if len(r1) != 0 { t.Fatalf("[username|false] Expected empty part, got %v", r1) } // username:|true r2, err := auth.Next([]byte("username:"), true) if err != nil { t.Fatalf("[username|true] Unexpected error %v", err) } if str := string(r2); str != auth.username { t.Fatalf("[username|true] Expected %s, got %s", auth.username, str) } // uSeRnAmE:|true r3, err := auth.Next([]byte("uSeRnAmE:"), true) if err != nil { t.Fatalf("[uSeRnAmE|true] Unexpected error %v", err) } if str := string(r3); str != auth.username { t.Fatalf("[uSeRnAmE|true] Expected %s, got %s", auth.username, str) } } // --------------------------------------------------------------- { // password:|false r1, err := auth.Next([]byte("password:"), false) if err != nil { t.Fatalf("[password|false] Unexpected error %v", err) } if len(r1) != 0 { t.Fatalf("[password|false] Expected empty part, got %v", r1) } // password:|true r2, err := auth.Next([]byte("password:"), true) if err != nil { t.Fatalf("[password|true] Unexpected error %v", err) } if str := string(r2); str != auth.password { t.Fatalf("[password|true] Expected %s, got %s", auth.password, str) } // pAsSwOrD:|true r3, err := auth.Next([]byte("pAsSwOrD:"), true) if err != nil { t.Fatalf("[pAsSwOrD|true] Unexpected error %v", err) } if str := string(r3); str != auth.password { t.Fatalf("[pAsSwOrD|true] Expected %s, got %s", auth.password, str) } } }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/mailer/smtp.go
tools/mailer/smtp.go
package mailer import ( "errors" "fmt" "net/smtp" "strings" "github.com/domodwyer/mailyak/v3" "github.com/pocketbase/pocketbase/tools/hook" "github.com/pocketbase/pocketbase/tools/security" ) var _ Mailer = (*SMTPClient)(nil) const ( SMTPAuthPlain = "PLAIN" SMTPAuthLogin = "LOGIN" ) // SMTPClient defines a SMTP mail client structure that implements // `mailer.Mailer` interface. type SMTPClient struct { onSend *hook.Hook[*SendEvent] TLS bool Port int Host string Username string Password string // SMTP auth method to use // (if not explicitly set, defaults to "PLAIN") AuthMethod string // LocalName is optional domain name used for the EHLO/HELO exchange // (if not explicitly set, defaults to "localhost"). // // This is required only by some SMTP servers, such as Gmail SMTP-relay. LocalName string } // OnSend implements [mailer.SendInterceptor] interface. func (c *SMTPClient) OnSend() *hook.Hook[*SendEvent] { if c.onSend == nil { c.onSend = &hook.Hook[*SendEvent]{} } return c.onSend } // Send implements [mailer.Mailer] interface. func (c *SMTPClient) Send(m *Message) error { if c.onSend != nil { return c.onSend.Trigger(&SendEvent{Message: m}, func(e *SendEvent) error { return c.send(e.Message) }) } return c.send(m) } func (c *SMTPClient) send(m *Message) error { var smtpAuth smtp.Auth if c.Username != "" || c.Password != "" { switch c.AuthMethod { case SMTPAuthLogin: smtpAuth = &smtpLoginAuth{c.Username, c.Password} default: smtpAuth = smtp.PlainAuth("", c.Username, c.Password, c.Host) } } // create mail instance var yak *mailyak.MailYak if c.TLS { var tlsErr error yak, tlsErr = mailyak.NewWithTLS(fmt.Sprintf("%s:%d", c.Host, c.Port), smtpAuth, nil) if tlsErr != nil { return tlsErr } } else { yak = mailyak.New(fmt.Sprintf("%s:%d", c.Host, c.Port), smtpAuth) } if c.LocalName != "" { yak.LocalName(c.LocalName) } if m.From.Name != "" { yak.FromName(m.From.Name) } yak.From(m.From.Address) yak.Subject(m.Subject) yak.HTML().Set(m.HTML) if m.Text == "" { // try to generate a plain text version of the HTML if plain, err := html2Text(m.HTML); err == nil { yak.Plain().Set(plain) } } else { yak.Plain().Set(m.Text) } if len(m.To) > 0 { yak.To(addressesToStrings(m.To, true)...) } if len(m.Bcc) > 0 { yak.Bcc(addressesToStrings(m.Bcc, true)...) } if len(m.Cc) > 0 { yak.Cc(addressesToStrings(m.Cc, true)...) } // add regular attachements (if any) for name, data := range m.Attachments { r, mime, err := detectReaderMimeType(data) if err != nil { return err } yak.AttachWithMimeType(name, r, mime) } // add inline attachments (if any) for name, data := range m.InlineAttachments { r, mime, err := detectReaderMimeType(data) if err != nil { return err } yak.AttachInlineWithMimeType(name, r, mime) } // add custom headers (if any) var hasMessageId bool for k, v := range m.Headers { if strings.EqualFold(k, "Message-ID") { hasMessageId = true } yak.AddHeader(k, v) } if !hasMessageId { // add a default message id if missing fromParts := strings.Split(m.From.Address, "@") if len(fromParts) == 2 { yak.AddHeader("Message-ID", fmt.Sprintf("<%s@%s>", security.PseudorandomString(15), fromParts[1], )) } } return yak.Send() } // ------------------------------------------------------------------- // AUTH LOGIN // ------------------------------------------------------------------- var _ smtp.Auth = (*smtpLoginAuth)(nil) // smtpLoginAuth defines an AUTH that implements the LOGIN authentication mechanism. // // AUTH LOGIN is obsolete[1] but some mail services like outlook requires it [2]. // // NB! // It will only send the credentials if the connection is using TLS or is connected to localhost. // Otherwise authentication will fail with an error, without sending the credentials. // // [1]: https://github.com/golang/go/issues/40817 // [2]: https://support.microsoft.com/en-us/office/outlook-com-no-longer-supports-auth-plain-authentication-07f7d5e9-1697-465f-84d2-4513d4ff0145?ui=en-us&rs=en-us&ad=us type smtpLoginAuth struct { username, password string } // Start initializes an authentication with the server. // // It is part of the [smtp.Auth] interface. func (a *smtpLoginAuth) Start(server *smtp.ServerInfo) (string, []byte, error) { // Must have TLS, or else localhost server. // Note: If TLS is not true, then we can't trust ANYTHING in ServerInfo. // In particular, it doesn't matter if the server advertises LOGIN auth. // That might just be the attacker saying // "it's ok, you can trust me with your password." if !server.TLS && !isLocalhost(server.Name) { return "", nil, errors.New("unencrypted connection") } return "LOGIN", nil, nil } // Next "continues" the auth process by feeding the server with the requested data. // // It is part of the [smtp.Auth] interface. func (a *smtpLoginAuth) Next(fromServer []byte, more bool) ([]byte, error) { if more { switch strings.ToLower(string(fromServer)) { case "username:": return []byte(a.username), nil case "password:": return []byte(a.password), nil } } return nil, nil } func isLocalhost(name string) bool { return name == "localhost" || name == "127.0.0.1" || name == "::1" }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/mailer/mailer.go
tools/mailer/mailer.go
package mailer import ( "bytes" "io" "net/mail" "github.com/gabriel-vasile/mimetype" "github.com/pocketbase/pocketbase/tools/hook" ) // Message defines a generic email message struct. type Message struct { From mail.Address `json:"from"` To []mail.Address `json:"to"` Bcc []mail.Address `json:"bcc"` Cc []mail.Address `json:"cc"` Subject string `json:"subject"` HTML string `json:"html"` Text string `json:"text"` Headers map[string]string `json:"headers"` Attachments map[string]io.Reader `json:"attachments"` InlineAttachments map[string]io.Reader `json:"inlineAttachments"` } // Mailer defines a base mail client interface. type Mailer interface { // Send sends an email with the provided Message. Send(message *Message) error } // SendInterceptor is optional interface for registering mail send hooks. type SendInterceptor interface { OnSend() *hook.Hook[*SendEvent] } type SendEvent struct { hook.Event Message *Message } // addressesToStrings converts the provided address to a list of serialized RFC 5322 strings. // // To export only the email part of mail.Address, you can set withName to false. func addressesToStrings(addresses []mail.Address, withName bool) []string { result := make([]string, len(addresses)) for i, addr := range addresses { if withName && addr.Name != "" { result[i] = addr.String() } else { // keep only the email part to avoid wrapping in angle-brackets result[i] = addr.Address } } return result } // detectReaderMimeType reads the first couple bytes of the reader to detect its MIME type. // // Returns a new combined reader from the partial read + the remaining of the original reader. func detectReaderMimeType(r io.Reader) (io.Reader, string, error) { readCopy := new(bytes.Buffer) mime, err := mimetype.DetectReader(io.TeeReader(r, readCopy)) if err != nil { return nil, "", err } return io.MultiReader(readCopy, r), mime.String(), nil }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/mailer/sendmail.go
tools/mailer/sendmail.go
package mailer import ( "bytes" "errors" "mime" "net/http" "os/exec" "strings" "github.com/pocketbase/pocketbase/tools/hook" ) var _ Mailer = (*Sendmail)(nil) // Sendmail implements [mailer.Mailer] interface and defines a mail // client that sends emails via the "sendmail" *nix command. // // This client is usually recommended only for development and testing. type Sendmail struct { onSend *hook.Hook[*SendEvent] } // OnSend implements [mailer.SendInterceptor] interface. func (c *Sendmail) OnSend() *hook.Hook[*SendEvent] { if c.onSend == nil { c.onSend = &hook.Hook[*SendEvent]{} } return c.onSend } // Send implements [mailer.Mailer] interface. func (c *Sendmail) Send(m *Message) error { if c.onSend != nil { return c.onSend.Trigger(&SendEvent{Message: m}, func(e *SendEvent) error { return c.send(e.Message) }) } return c.send(m) } func (c *Sendmail) send(m *Message) error { toAddresses := addressesToStrings(m.To, false) headers := make(http.Header) headers.Set("Subject", mime.QEncoding.Encode("utf-8", m.Subject)) headers.Set("From", m.From.String()) headers.Set("Content-Type", "text/html; charset=UTF-8") headers.Set("To", strings.Join(toAddresses, ",")) cmdPath, err := findSendmailPath() if err != nil { return err } var buffer bytes.Buffer // write // --- if err := headers.Write(&buffer); err != nil { return err } if _, err := buffer.Write([]byte("\r\n")); err != nil { return err } if m.HTML != "" { if _, err := buffer.Write([]byte(m.HTML)); err != nil { return err } } else { if _, err := buffer.Write([]byte(m.Text)); err != nil { return err } } // --- sendmail := exec.Command(cmdPath, strings.Join(toAddresses, ",")) sendmail.Stdin = &buffer return sendmail.Run() } func findSendmailPath() (string, error) { options := []string{ "/usr/sbin/sendmail", "/usr/bin/sendmail", "sendmail", } for _, option := range options { path, err := exec.LookPath(option) if err == nil { return path, err } } return "", errors.New("failed to locate a sendmail executable path") }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/subscriptions/broker.go
tools/subscriptions/broker.go
package subscriptions import ( "fmt" "github.com/pocketbase/pocketbase/tools/list" "github.com/pocketbase/pocketbase/tools/store" ) // Broker defines a struct for managing subscriptions clients. type Broker struct { store *store.Store[string, Client] } // NewBroker initializes and returns a new Broker instance. func NewBroker() *Broker { return &Broker{ store: store.New[string, Client](nil), } } // Clients returns a shallow copy of all registered clients indexed // with their connection id. func (b *Broker) Clients() map[string]Client { return b.store.GetAll() } // ChunkedClients splits the current clients into a chunked slice. func (b *Broker) ChunkedClients(chunkSize int) [][]Client { return list.ToChunks(b.store.Values(), chunkSize) } // TotalClients returns the total number of registered clients. func (b *Broker) TotalClients() int { return b.store.Length() } // ClientById finds a registered client by its id. // // Returns non-nil error when client with clientId is not registered. func (b *Broker) ClientById(clientId string) (Client, error) { client, ok := b.store.GetOk(clientId) if !ok { return nil, fmt.Errorf("no client associated with connection ID %q", clientId) } return client, nil } // Register adds a new client to the broker instance. func (b *Broker) Register(client Client) { b.store.Set(client.Id(), client) } // Unregister removes a single client by its id and marks it as discarded. // // If client with clientId doesn't exist, this method does nothing. func (b *Broker) Unregister(clientId string) { client := b.store.Get(clientId) if client == nil { return } client.Discard() b.store.Remove(clientId) }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/subscriptions/client.go
tools/subscriptions/client.go
package subscriptions import ( "encoding/json" "net/url" "strings" "sync" "github.com/pocketbase/pocketbase/tools/inflector" "github.com/pocketbase/pocketbase/tools/security" "github.com/spf13/cast" ) const optionsParam = "options" // SubscriptionOptions defines the request options (query params, headers, etc.) // for a single subscription topic. type SubscriptionOptions struct { Query map[string]string `json:"query"` Headers map[string]string `json:"headers"` } // Client is an interface for a generic subscription client. type Client interface { // Id Returns the unique id of the client. Id() string // Channel returns the client's communication channel. // // NB! The channel shouldn't be used after calling Discard(). Channel() chan Message // Subscriptions returns a shallow copy of the client subscriptions matching the prefixes. // If no prefix is specified, returns all subscriptions. Subscriptions(prefixes ...string) map[string]SubscriptionOptions // Subscribe subscribes the client to the provided subscriptions list. // // Each subscription can also have "options" (json serialized SubscriptionOptions) as query parameter. // // Example: // // Subscribe( // "subscriptionA", // `subscriptionB?options={"query":{"a":1},"headers":{"x_token":"abc"}}`, // ) Subscribe(subs ...string) // Unsubscribe unsubscribes the client from the provided subscriptions list. Unsubscribe(subs ...string) // HasSubscription checks if the client is subscribed to `sub`. HasSubscription(sub string) bool // Set stores any value to the client's context. Set(key string, value any) // Unset removes a single value from the client's context. Unset(key string) // Get retrieves the key value from the client's context. Get(key string) any // Discard marks the client as "discarded" (and closes its channel), // meaning that it shouldn't be used anymore for sending new messages. // // It is safe to call Discard() multiple times. Discard() // IsDiscarded indicates whether the client has been "discarded" // and should no longer be used. IsDiscarded() bool // Send sends the specified message to the client's channel (if not discarded). Send(m Message) } // ensures that DefaultClient satisfies the Client interface var _ Client = (*DefaultClient)(nil) // DefaultClient defines a generic subscription client. type DefaultClient struct { store map[string]any subscriptions map[string]SubscriptionOptions channel chan Message id string mu sync.RWMutex isDiscarded bool } // NewDefaultClient creates and returns a new DefaultClient instance. func NewDefaultClient() *DefaultClient { return &DefaultClient{ id: security.RandomString(40), store: map[string]any{}, channel: make(chan Message), subscriptions: map[string]SubscriptionOptions{}, } } // Id implements the [Client.Id] interface method. func (c *DefaultClient) Id() string { c.mu.RLock() defer c.mu.RUnlock() return c.id } // Channel implements the [Client.Channel] interface method. func (c *DefaultClient) Channel() chan Message { c.mu.RLock() defer c.mu.RUnlock() return c.channel } // Subscriptions implements the [Client.Subscriptions] interface method. // // It returns a shallow copy of the client subscriptions matching the prefixes. // If no prefix is specified, returns all subscriptions. func (c *DefaultClient) Subscriptions(prefixes ...string) map[string]SubscriptionOptions { c.mu.RLock() defer c.mu.RUnlock() // no prefix -> return copy of all subscriptions if len(prefixes) == 0 { result := make(map[string]SubscriptionOptions, len(c.subscriptions)) for s, options := range c.subscriptions { result[s] = options } return result } result := make(map[string]SubscriptionOptions) for _, prefix := range prefixes { for s, options := range c.subscriptions { // "?" ensures that the options query start character is always there // so that it can be used as an end separator when looking only for the main subscription topic if strings.HasPrefix(s+"?", prefix) { result[s] = options } } } return result } // Subscribe implements the [Client.Subscribe] interface method. // // Empty subscriptions (aka. "") are ignored. func (c *DefaultClient) Subscribe(subs ...string) { c.mu.Lock() defer c.mu.Unlock() for _, s := range subs { if s == "" { continue // skip empty } // extract subscription options (if any) rawOptions := struct { // note: any instead of string to minimize the breaking changes with earlier versions Query map[string]any `json:"query"` Headers map[string]any `json:"headers"` }{} u, err := url.Parse(s) if err == nil { raw := u.Query().Get(optionsParam) if raw != "" { json.Unmarshal([]byte(raw), &rawOptions) } } options := SubscriptionOptions{ Query: make(map[string]string, len(rawOptions.Query)), Headers: make(map[string]string, len(rawOptions.Headers)), } // normalize query // (currently only single string values are supported for consistency with the default routes handling) for k, v := range rawOptions.Query { options.Query[k] = cast.ToString(v) } // normalize headers name and values, eg. "X-Token" is converted to "x_token" // (currently only single string values are supported for consistency with the default routes handling) for k, v := range rawOptions.Headers { options.Headers[inflector.Snakecase(k)] = cast.ToString(v) } c.subscriptions[s] = options } } // Unsubscribe implements the [Client.Unsubscribe] interface method. // // If subs is not set, this method removes all registered client's subscriptions. func (c *DefaultClient) Unsubscribe(subs ...string) { c.mu.Lock() defer c.mu.Unlock() if len(subs) > 0 { for _, s := range subs { delete(c.subscriptions, s) } } else { // unsubscribe all for s := range c.subscriptions { delete(c.subscriptions, s) } } } // HasSubscription implements the [Client.HasSubscription] interface method. func (c *DefaultClient) HasSubscription(sub string) bool { c.mu.RLock() defer c.mu.RUnlock() _, ok := c.subscriptions[sub] return ok } // Get implements the [Client.Get] interface method. func (c *DefaultClient) Get(key string) any { c.mu.RLock() defer c.mu.RUnlock() return c.store[key] } // Set implements the [Client.Set] interface method. func (c *DefaultClient) Set(key string, value any) { c.mu.Lock() defer c.mu.Unlock() c.store[key] = value } // Unset implements the [Client.Unset] interface method. func (c *DefaultClient) Unset(key string) { c.mu.Lock() defer c.mu.Unlock() delete(c.store, key) } // Discard implements the [Client.Discard] interface method. func (c *DefaultClient) Discard() { c.mu.Lock() defer c.mu.Unlock() if c.isDiscarded { return } close(c.channel) c.isDiscarded = true } // IsDiscarded implements the [Client.IsDiscarded] interface method. func (c *DefaultClient) IsDiscarded() bool { c.mu.RLock() defer c.mu.RUnlock() return c.isDiscarded } // Send sends the specified message to the client's channel (if not discarded). func (c *DefaultClient) Send(m Message) { if c.IsDiscarded() { return } // "gracefully" handle panics since channel close is not blocking and could cause races defer func() { recover() }() c.channel <- m }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/subscriptions/client_test.go
tools/subscriptions/client_test.go
package subscriptions_test import ( "encoding/json" "strings" "testing" "time" "github.com/pocketbase/pocketbase/tools/subscriptions" ) func TestNewDefaultClient(t *testing.T) { c := subscriptions.NewDefaultClient() if c.Channel() == nil { t.Errorf("Expected channel to be initialized") } if c.Subscriptions() == nil { t.Errorf("Expected subscriptions map to be initialized") } if c.Id() == "" { t.Errorf("Expected unique id to be set") } } func TestId(t *testing.T) { clients := []*subscriptions.DefaultClient{ subscriptions.NewDefaultClient(), subscriptions.NewDefaultClient(), subscriptions.NewDefaultClient(), subscriptions.NewDefaultClient(), } ids := map[string]struct{}{} for i, c := range clients { // check uniqueness if _, ok := ids[c.Id()]; ok { t.Errorf("(%d) Expected unique id, got %v", i, c.Id()) } else { ids[c.Id()] = struct{}{} } // check length if len(c.Id()) != 40 { t.Errorf("(%d) Expected unique id to have 40 chars length, got %v", i, c.Id()) } } } func TestChannel(t *testing.T) { c := subscriptions.NewDefaultClient() if c.Channel() == nil { t.Fatalf("Expected channel to be initialized, got") } } func TestSubscriptions(t *testing.T) { c := subscriptions.NewDefaultClient() if len(c.Subscriptions()) != 0 { t.Fatalf("Expected subscriptions to be empty") } c.Subscribe("sub1", "sub11", "sub2") scenarios := []struct { prefixes []string expected []string }{ {nil, []string{"sub1", "sub11", "sub2"}}, {[]string{"missing"}, nil}, {[]string{"sub1"}, []string{"sub1", "sub11"}}, {[]string{"sub2"}, []string{"sub2"}}, // with extra query start char } for _, s := range scenarios { t.Run(strings.Join(s.prefixes, ","), func(t *testing.T) { subs := c.Subscriptions(s.prefixes...) if len(subs) != len(s.expected) { t.Fatalf("Expected %d subscriptions, got %d", len(s.expected), len(subs)) } for _, s := range s.expected { if _, ok := subs[s]; !ok { t.Fatalf("Missing subscription %q in \n%v", s, subs) } } }) } } func TestSubscribe(t *testing.T) { c := subscriptions.NewDefaultClient() subs := []string{"", "sub1", "sub2", "sub3"} expected := []string{"sub1", "sub2", "sub3"} c.Subscribe(subs...) // empty string should be skipped if len(c.Subscriptions()) != 3 { t.Fatalf("Expected 3 subscriptions, got %v", c.Subscriptions()) } for i, s := range expected { if !c.HasSubscription(s) { t.Errorf("(%d) Expected sub %s", i, s) } } } func TestSubscribeOptions(t *testing.T) { c := subscriptions.NewDefaultClient() sub1 := "test1" sub2 := `test2?options={"query":{"name":123},"headers":{"X-Token":456}}` c.Subscribe(sub1, sub2) subs := c.Subscriptions() scenarios := []struct { name string expectedOptions string }{ {sub1, `{"query":{},"headers":{}}`}, {sub2, `{"query":{"name":"123"},"headers":{"x_token":"456"}}`}, } for _, s := range scenarios { t.Run(s.name, func(t *testing.T) { options, ok := subs[s.name] if !ok { t.Fatalf("Missing subscription \n%q \nin \n%v", s.name, subs) } rawBytes, err := json.Marshal(options) if err != nil { t.Fatal(err) } rawStr := string(rawBytes) if rawStr != s.expectedOptions { t.Fatalf("Expected options\n%v\ngot\n%v", s.expectedOptions, rawStr) } }) } } func TestUnsubscribe(t *testing.T) { c := subscriptions.NewDefaultClient() c.Subscribe("sub1", "sub2", "sub3") c.Unsubscribe("sub1") if c.HasSubscription("sub1") { t.Fatalf("Expected sub1 to be removed") } c.Unsubscribe( /* all */ ) if len(c.Subscriptions()) != 0 { t.Fatalf("Expected all subscriptions to be removed, got %v", c.Subscriptions()) } } func TestHasSubscription(t *testing.T) { c := subscriptions.NewDefaultClient() if c.HasSubscription("missing") { t.Error("Expected false, got true") } c.Subscribe("sub") if !c.HasSubscription("sub") { t.Error("Expected true, got false") } } func TestSetAndGet(t *testing.T) { c := subscriptions.NewDefaultClient() c.Set("demo", 1) result, _ := c.Get("demo").(int) if result != 1 { t.Errorf("Expected 1, got %v", result) } } func TestDiscard(t *testing.T) { c := subscriptions.NewDefaultClient() if v := c.IsDiscarded(); v { t.Fatal("Expected false, got true") } c.Discard() if v := c.IsDiscarded(); !v { t.Fatal("Expected true, got false") } } func TestSend(t *testing.T) { c := subscriptions.NewDefaultClient() received := []string{} go func() { for m := range c.Channel() { received = append(received, m.Name) } }() c.Send(subscriptions.Message{Name: "m1"}) c.Send(subscriptions.Message{Name: "m2"}) c.Discard() c.Send(subscriptions.Message{Name: "m3"}) c.Send(subscriptions.Message{Name: "m4"}) time.Sleep(5 * time.Millisecond) expected := []string{"m1", "m2"} if len(received) != len(expected) { t.Fatalf("Expected %d messages, got %d", len(expected), len(received)) } for _, name := range expected { var exists bool for _, n := range received { if n == name { exists = true break } } if !exists { t.Fatalf("Missing expected %q message, got %v", name, received) } } }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/subscriptions/message.go
tools/subscriptions/message.go
package subscriptions import ( "io" ) // Message defines a client's channel data. type Message struct { Name string `json:"name"` Data []byte `json:"data"` } // WriteSSE writes the current message in a SSE format into the provided writer. // // For example, writing to a router.Event: // // m := Message{Name: "users/create", Data: []byte{...}} // m.WriteSSE(e.Response, "yourEventId") // e.Flush() func (m *Message) WriteSSE(w io.Writer, eventId string) error { parts := [][]byte{ []byte("id:" + eventId + "\n"), []byte("event:" + m.Name + "\n"), []byte("data:"), m.Data, []byte("\n\n"), } for _, part := range parts { _, err := w.Write(part) if err != nil { return err } } return nil }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/subscriptions/broker_test.go
tools/subscriptions/broker_test.go
package subscriptions_test import ( "testing" "github.com/pocketbase/pocketbase/tools/subscriptions" ) func TestNewBroker(t *testing.T) { b := subscriptions.NewBroker() if b.Clients() == nil { t.Fatal("Expected clients map to be initialized") } } func TestClients(t *testing.T) { b := subscriptions.NewBroker() if total := len(b.Clients()); total != 0 { t.Fatalf("Expected no clients, got %v", total) } b.Register(subscriptions.NewDefaultClient()) b.Register(subscriptions.NewDefaultClient()) // check if it is a shallow copy clients := b.Clients() for k := range clients { delete(clients, k) } // should return a new copy if total := len(b.Clients()); total != 2 { t.Fatalf("Expected 2 clients, got %v", total) } } func TestChunkedClients(t *testing.T) { b := subscriptions.NewBroker() chunks := b.ChunkedClients(2) if total := len(chunks); total != 0 { t.Fatalf("Expected %d chunks, got %d", 0, total) } b.Register(subscriptions.NewDefaultClient()) b.Register(subscriptions.NewDefaultClient()) b.Register(subscriptions.NewDefaultClient()) chunks = b.ChunkedClients(2) if total := len(chunks); total != 2 { t.Fatalf("Expected %d chunks, got %d", 2, total) } if total := len(chunks[0]); total != 2 { t.Fatalf("Expected the first chunk to have 2 clients, got %d", total) } if total := len(chunks[1]); total != 1 { t.Fatalf("Expected the second chunk to have 1 client, got %d", total) } } func TestTotalClients(t *testing.T) { b := subscriptions.NewBroker() if total := b.TotalClients(); total != 0 { t.Fatalf("Expected no clients, got %d", total) } b.Register(subscriptions.NewDefaultClient()) b.Register(subscriptions.NewDefaultClient()) if total := b.TotalClients(); total != 2 { t.Fatalf("Expected %d clients, got %d", 2, total) } } func TestClientById(t *testing.T) { b := subscriptions.NewBroker() clientA := subscriptions.NewDefaultClient() clientB := subscriptions.NewDefaultClient() b.Register(clientA) b.Register(clientB) resultClient, err := b.ClientById(clientA.Id()) if err != nil { t.Fatalf("Expected client with id %s, got error %v", clientA.Id(), err) } if resultClient.Id() != clientA.Id() { t.Fatalf("Expected client %s, got %s", clientA.Id(), resultClient.Id()) } if c, err := b.ClientById("missing"); err == nil { t.Fatalf("Expected error, found client %v", c) } } func TestRegister(t *testing.T) { b := subscriptions.NewBroker() client := subscriptions.NewDefaultClient() b.Register(client) if _, err := b.ClientById(client.Id()); err != nil { t.Fatalf("Expected client with id %s, got error %v", client.Id(), err) } } func TestUnregister(t *testing.T) { b := subscriptions.NewBroker() clientA := subscriptions.NewDefaultClient() clientB := subscriptions.NewDefaultClient() b.Register(clientA) b.Register(clientB) if _, err := b.ClientById(clientA.Id()); err != nil { t.Fatalf("Expected client with id %s, got error %v", clientA.Id(), err) } b.Unregister(clientA.Id()) if c, err := b.ClientById(clientA.Id()); err == nil { t.Fatalf("Expected error, found client %v", c) } // clientB shouldn't have been removed if _, err := b.ClientById(clientB.Id()); err != nil { t.Fatalf("Expected client with id %s, got error %v", clientB.Id(), err) } }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/subscriptions/message_test.go
tools/subscriptions/message_test.go
package subscriptions_test import ( "strings" "testing" "github.com/pocketbase/pocketbase/tools/subscriptions" ) func TestMessageWrite(t *testing.T) { m := subscriptions.Message{ Name: "test_name", Data: []byte("test_data"), } var sb strings.Builder m.WriteSSE(&sb, "test_id") expected := "id:test_id\nevent:test_name\ndata:test_data\n\n" if v := sb.String(); v != expected { t.Fatalf("Expected writer content\n%q\ngot\n%q", expected, v) } }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/routine/routine_test.go
tools/routine/routine_test.go
package routine_test import ( "sync" "testing" "github.com/pocketbase/pocketbase/tools/routine" ) func TestFireAndForget(t *testing.T) { called := false fn := func() { called = true panic("test") } wg := &sync.WaitGroup{} routine.FireAndForget(fn, wg) wg.Wait() if !called { t.Error("Expected fn to be called.") } }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/routine/routine.go
tools/routine/routine.go
package routine import ( "log" "runtime/debug" "sync" ) // FireAndForget executes f() in a new go routine and auto recovers if panic. // // **Note:** Use this only if you are not interested in the result of f() // and don't want to block the parent go routine. func FireAndForget(f func(), wg ...*sync.WaitGroup) { if len(wg) > 0 && wg[0] != nil { wg[0].Add(1) } go func() { if len(wg) > 0 && wg[0] != nil { defer wg[0].Done() } defer func() { if err := recover(); err != nil { log.Printf("RECOVERED FROM PANIC (safe to ignore): %v", err) log.Println(string(debug.Stack())) } }() f() }() }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/hook/hook.go
tools/hook/hook.go
package hook import ( "sort" "sync" "github.com/pocketbase/pocketbase/tools/security" ) // Handler defines a single Hook handler. // Multiple handlers can share the same id. // If Id is not explicitly set it will be autogenerated by Hook.Add and Hook.AddHandler. type Handler[T Resolver] struct { // Func defines the handler function to execute. // // Note that users need to call e.Next() in order to proceed with // the execution of the hook chain. Func func(T) error // Id is the unique identifier of the handler. // // It could be used later to remove the handler from a hook via [Hook.Remove]. // // If missing, an autogenerated value will be assigned when adding // the handler to a hook. Id string // Priority allows changing the default exec priority of the handler within a hook. // // If 0, the handler will be executed in the same order it was registered. Priority int } // Hook defines a generic concurrent safe structure for managing event hooks. // // When using custom event it must embed the base [hook.Event]. // // Example: // // type CustomEvent struct { // hook.Event // SomeField int // } // // h := Hook[*CustomEvent]{} // // h.BindFunc(func(e *CustomEvent) error { // println(e.SomeField) // // return e.Next() // }) // // h.Trigger(&CustomEvent{ SomeField: 123 }) type Hook[T Resolver] struct { handlers []*Handler[T] mu sync.RWMutex } // Bind registers the provided handler to the current hooks queue. // // If handler.Id is empty it is updated with autogenerated value. // // If a handler from the current hook list has Id matching handler.Id // then the old handler is replaced with the new one. func (h *Hook[T]) Bind(handler *Handler[T]) string { h.mu.Lock() defer h.mu.Unlock() var exists bool if handler.Id == "" { handler.Id = generateHookId() // ensure that it doesn't exist DUPLICATE_CHECK: for _, existing := range h.handlers { if existing.Id == handler.Id { handler.Id = generateHookId() goto DUPLICATE_CHECK } } } else { // replace existing for i, existing := range h.handlers { if existing.Id == handler.Id { h.handlers[i] = handler exists = true break } } } // append new if !exists { h.handlers = append(h.handlers, handler) } // sort handlers by Priority, preserving the original order of equal items sort.SliceStable(h.handlers, func(i, j int) bool { return h.handlers[i].Priority < h.handlers[j].Priority }) return handler.Id } // BindFunc is similar to Bind but registers a new handler from just the provided function. // // The registered handler is added with a default 0 priority and the id will be autogenerated. // // If you want to register a handler with custom priority or id use the [Hook.Bind] method. func (h *Hook[T]) BindFunc(fn func(e T) error) string { return h.Bind(&Handler[T]{Func: fn}) } // Unbind removes one or many hook handler by their id. func (h *Hook[T]) Unbind(idsToRemove ...string) { h.mu.Lock() defer h.mu.Unlock() for _, id := range idsToRemove { for i := len(h.handlers) - 1; i >= 0; i-- { if h.handlers[i].Id == id { h.handlers = append(h.handlers[:i], h.handlers[i+1:]...) break // for now stop on the first occurrence since we don't allow handlers with duplicated ids } } } } // UnbindAll removes all registered handlers. func (h *Hook[T]) UnbindAll() { h.mu.Lock() defer h.mu.Unlock() h.handlers = nil } // Length returns to total number of registered hook handlers. func (h *Hook[T]) Length() int { h.mu.RLock() defer h.mu.RUnlock() return len(h.handlers) } // Trigger executes all registered hook handlers one by one // with the specified event as an argument. // // Optionally, this method allows also to register additional one off // handler funcs that will be temporary appended to the handlers queue. // // NB! Each hook handler must call event.Next() in order the hook chain to proceed. func (h *Hook[T]) Trigger(event T, oneOffHandlerFuncs ...func(T) error) error { h.mu.RLock() handlers := make([]func(T) error, 0, len(h.handlers)+len(oneOffHandlerFuncs)) for _, handler := range h.handlers { handlers = append(handlers, handler.Func) } handlers = append(handlers, oneOffHandlerFuncs...) h.mu.RUnlock() event.setNextFunc(nil) // reset in case the event is being reused for i := len(handlers) - 1; i >= 0; i-- { i := i old := event.nextFunc() event.setNextFunc(func() error { event.setNextFunc(old) return handlers[i](event) }) } return event.Next() } func generateHookId() string { return security.PseudorandomString(20) }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/hook/hook_test.go
tools/hook/hook_test.go
package hook import ( "errors" "testing" ) func TestHookAddHandlerAndAdd(t *testing.T) { calls := "" h := Hook[*Event]{} h.BindFunc(func(e *Event) error { calls += "1"; return e.Next() }) h.BindFunc(func(e *Event) error { calls += "2"; return e.Next() }) h3Id := h.BindFunc(func(e *Event) error { calls += "3"; return e.Next() }) h.Bind(&Handler[*Event]{ Id: h3Id, // should replace 3 Func: func(e *Event) error { calls += "3'"; return e.Next() }, }) h.Bind(&Handler[*Event]{ Func: func(e *Event) error { calls += "4"; return e.Next() }, Priority: -2, }) h.Bind(&Handler[*Event]{ Func: func(e *Event) error { calls += "5"; return e.Next() }, Priority: -1, }) h.Bind(&Handler[*Event]{ Func: func(e *Event) error { calls += "6"; return e.Next() }, }) h.Bind(&Handler[*Event]{ Func: func(e *Event) error { calls += "7"; e.Next(); return errors.New("test") }, // error shouldn't stop the chain }) h.Trigger( &Event{}, func(e *Event) error { calls += "8"; return e.Next() }, func(e *Event) error { calls += "9"; return nil }, // skip next func(e *Event) error { calls += "10"; return e.Next() }, ) if total := len(h.handlers); total != 7 { t.Fatalf("Expected %d handlers, found %d", 7, total) } expectedCalls := "45123'6789" if calls != expectedCalls { t.Fatalf("Expected calls sequence %q, got %q", expectedCalls, calls) } } func TestHookLength(t *testing.T) { h := Hook[*Event]{} if l := h.Length(); l != 0 { t.Fatalf("Expected 0 hook handlers, got %d", l) } h.BindFunc(func(e *Event) error { return e.Next() }) h.BindFunc(func(e *Event) error { return e.Next() }) if l := h.Length(); l != 2 { t.Fatalf("Expected 2 hook handlers, got %d", l) } } func TestHookUnbind(t *testing.T) { h := Hook[*Event]{} calls := "" id0 := h.BindFunc(func(e *Event) error { calls += "0"; return e.Next() }) id1 := h.BindFunc(func(e *Event) error { calls += "1"; return e.Next() }) h.BindFunc(func(e *Event) error { calls += "2"; return e.Next() }) h.Bind(&Handler[*Event]{ Func: func(e *Event) error { calls += "3"; return e.Next() }, }) h.Unbind("missing") // should do nothing and not panic if total := len(h.handlers); total != 4 { t.Fatalf("Expected %d handlers, got %d", 4, total) } h.Unbind(id1, id0) if total := len(h.handlers); total != 2 { t.Fatalf("Expected %d handlers, got %d", 2, total) } err := h.Trigger(&Event{}, func(e *Event) error { calls += "4"; return e.Next() }) if err != nil { t.Fatal(err) } expectedCalls := "234" if calls != expectedCalls { t.Fatalf("Expected calls sequence %q, got %q", expectedCalls, calls) } } func TestHookUnbindAll(t *testing.T) { h := Hook[*Event]{} h.UnbindAll() // should do nothing and not panic h.BindFunc(func(e *Event) error { return nil }) h.BindFunc(func(e *Event) error { return nil }) if total := len(h.handlers); total != 2 { t.Fatalf("Expected %d handlers before UnbindAll, found %d", 2, total) } h.UnbindAll() if total := len(h.handlers); total != 0 { t.Fatalf("Expected no handlers after UnbindAll, found %d", total) } } func TestHookTriggerErrorPropagation(t *testing.T) { err := errors.New("test") scenarios := []struct { name string handlers []func(*Event) error expectedError error }{ { "without error", []func(*Event) error{ func(e *Event) error { return e.Next() }, func(e *Event) error { return e.Next() }, }, nil, }, { "with error", []func(*Event) error{ func(e *Event) error { return e.Next() }, func(e *Event) error { e.Next(); return err }, func(e *Event) error { return e.Next() }, }, err, }, } for _, s := range scenarios { t.Run(s.name, func(t *testing.T) { h := Hook[*Event]{} for _, handler := range s.handlers { h.BindFunc(handler) } result := h.Trigger(&Event{}) if result != s.expectedError { t.Fatalf("Expected %v, got %v", s.expectedError, result) } }) } }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/hook/event_test.go
tools/hook/event_test.go
package hook import "testing" func TestEventNext(t *testing.T) { calls := 0 e := Event{} if e.nextFunc() != nil { t.Fatalf("Expected nextFunc to be nil") } e.setNextFunc(func() error { calls++ return nil }) if e.nextFunc() == nil { t.Fatalf("Expected nextFunc to be non-nil") } e.Next() e.Next() if calls != 2 { t.Fatalf("Expected %d calls, got %d", 2, calls) } }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/hook/tagged_test.go
tools/hook/tagged_test.go
package hook import ( "strings" "testing" ) type mockTagsEvent struct { Event tags []string } func (m mockTagsEvent) Tags() []string { return m.tags } func TestTaggedHook(t *testing.T) { calls := "" base := &Hook[*mockTagsEvent]{} base.BindFunc(func(e *mockTagsEvent) error { calls += "f0"; return e.Next() }) hA := NewTaggedHook(base) hA.BindFunc(func(e *mockTagsEvent) error { calls += "a1"; return e.Next() }) hA.Bind(&Handler[*mockTagsEvent]{ Func: func(e *mockTagsEvent) error { calls += "a2"; return e.Next() }, Priority: -1, }) hB := NewTaggedHook(base, "b1", "b2") hB.BindFunc(func(e *mockTagsEvent) error { calls += "b1"; return e.Next() }) hB.Bind(&Handler[*mockTagsEvent]{ Func: func(e *mockTagsEvent) error { calls += "b2"; return e.Next() }, Priority: -2, }) hC := NewTaggedHook(base, "c1", "c2") hC.BindFunc(func(e *mockTagsEvent) error { calls += "c1"; return e.Next() }) hC.Bind(&Handler[*mockTagsEvent]{ Func: func(e *mockTagsEvent) error { calls += "c2"; return e.Next() }, Priority: -3, }) scenarios := []struct { event *mockTagsEvent expectedCalls string }{ { &mockTagsEvent{}, "a2f0a1", }, { &mockTagsEvent{tags: []string{"missing"}}, "a2f0a1", }, { &mockTagsEvent{tags: []string{"b2"}}, "b2a2f0a1b1", }, { &mockTagsEvent{tags: []string{"c1"}}, "c2a2f0a1c1", }, { &mockTagsEvent{tags: []string{"b1", "c2"}}, "c2b2a2f0a1b1c1", }, } for _, s := range scenarios { t.Run(strings.Join(s.event.tags, "_"), func(t *testing.T) { calls = "" // reset err := base.Trigger(s.event) if err != nil { t.Fatalf("Unexpected trigger error: %v", err) } if calls != s.expectedCalls { t.Fatalf("Expected calls sequence %q, got %q", s.expectedCalls, calls) } }) } }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/hook/event.go
tools/hook/event.go
package hook // Resolver defines a common interface for a Hook event (see [Event]). type Resolver interface { // Next triggers the next handler in the hook's chain (if any). Next() error // note: kept only for the generic interface; may get removed in the future nextFunc() func() error setNextFunc(f func() error) } var _ Resolver = (*Event)(nil) // Event implements [Resolver] and it is intended to be used as a base // Hook event that you can embed in your custom typed event structs. // // Example: // // type CustomEvent struct { // hook.Event // // SomeField int // } type Event struct { next func() error } // Next calls the next hook handler. func (e *Event) Next() error { if e.next != nil { return e.next() } return nil } // nextFunc returns the function that Next calls. func (e *Event) nextFunc() func() error { return e.next } // setNextFunc sets the function that Next calls. func (e *Event) setNextFunc(f func() error) { e.next = f }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/hook/tagged.go
tools/hook/tagged.go
package hook import ( "github.com/pocketbase/pocketbase/tools/list" ) // Tagger defines an interface for event data structs that support tags/groups/categories/etc. // Usually used together with TaggedHook. type Tagger interface { Resolver Tags() []string } // wrapped local Hook embedded struct to limit the public API surface. type mainHook[T Tagger] struct { *Hook[T] } // NewTaggedHook creates a new TaggedHook with the provided main hook and optional tags. func NewTaggedHook[T Tagger](hook *Hook[T], tags ...string) *TaggedHook[T] { return &TaggedHook[T]{ mainHook[T]{hook}, tags, } } // TaggedHook defines a proxy hook which register handlers that are triggered only // if the TaggedHook.tags are empty or includes at least one of the event data tag(s). type TaggedHook[T Tagger] struct { mainHook[T] tags []string } // CanTriggerOn checks if the current TaggedHook can be triggered with // the provided event data tags. // // It returns always true if the hook doens't have any tags. func (h *TaggedHook[T]) CanTriggerOn(tagsToCheck []string) bool { if len(h.tags) == 0 { return true // match all } for _, t := range tagsToCheck { if list.ExistInSlice(t, h.tags) { return true } } return false } // Bind registers the provided handler to the current hooks queue. // // It is similar to [Hook.Bind] with the difference that the handler // function is invoked only if the event data tags satisfy h.CanTriggerOn. func (h *TaggedHook[T]) Bind(handler *Handler[T]) string { fn := handler.Func handler.Func = func(e T) error { if h.CanTriggerOn(e.Tags()) { return fn(e) } return e.Next() } return h.mainHook.Bind(handler) } // BindFunc registers a new handler with the specified function. // // It is similar to [Hook.Bind] with the difference that the handler // function is invoked only if the event data tags satisfy h.CanTriggerOn. func (h *TaggedHook[T]) BindFunc(fn func(e T) error) string { return h.mainHook.BindFunc(func(e T) error { if h.CanTriggerOn(e.Tags()) { return fn(e) } return e.Next() }) }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/store/store_test.go
tools/store/store_test.go
package store_test import ( "bytes" "encoding/json" "slices" "strconv" "testing" "github.com/pocketbase/pocketbase/tools/store" ) func TestNew(t *testing.T) { data := map[string]int{"test1": 1, "test2": 2} originalRawData, err := json.Marshal(data) if err != nil { t.Fatal(err) } s := store.New(data) s.Set("test3", 3) // add 1 item s.Remove("test1") // remove 1 item // check if data was shallow copied rawData, _ := json.Marshal(data) if !bytes.Equal(originalRawData, rawData) { t.Fatalf("Expected data \n%s, \ngot \n%s", originalRawData, rawData) } if s.Has("test1") { t.Fatalf("Expected test1 to be deleted, got %v", s.Get("test1")) } if v := s.Get("test2"); v != 2 { t.Fatalf("Expected test2 to be %v, got %v", 2, v) } if v := s.Get("test3"); v != 3 { t.Fatalf("Expected test3 to be %v, got %v", 3, v) } } func TestReset(t *testing.T) { s := store.New(map[string]int{"test1": 1}) data := map[string]int{"test2": 2} originalRawData, err := json.Marshal(data) if err != nil { t.Fatal(err) } s.Reset(data) s.Set("test3", 3) // check if data was shallow copied rawData, _ := json.Marshal(data) if !bytes.Equal(originalRawData, rawData) { t.Fatalf("Expected data \n%s, \ngot \n%s", originalRawData, rawData) } if s.Has("test1") { t.Fatalf("Expected test1 to be deleted, got %v", s.Get("test1")) } if v := s.Get("test2"); v != 2 { t.Fatalf("Expected test2 to be %v, got %v", 2, v) } if v := s.Get("test3"); v != 3 { t.Fatalf("Expected test3 to be %v, got %v", 3, v) } } func TestLength(t *testing.T) { s := store.New(map[string]int{"test1": 1}) s.Set("test2", 2) if v := s.Length(); v != 2 { t.Fatalf("Expected length %d, got %d", 2, v) } } func TestRemoveAll(t *testing.T) { s := store.New(map[string]bool{"test1": true, "test2": true}) keys := []string{"test1", "test2"} s.RemoveAll() for i, key := range keys { if s.Has(key) { t.Errorf("(%d) Expected %q to be removed", i, key) } } } func TestRemove(t *testing.T) { s := store.New(map[string]bool{"test": true}) keys := []string{"test", "missing"} for i, key := range keys { s.Remove(key) if s.Has(key) { t.Errorf("(%d) Expected %q to be removed", i, key) } } } func TestHas(t *testing.T) { s := store.New(map[string]int{"test1": 0, "test2": 1}) scenarios := []struct { key string exist bool }{ {"test1", true}, {"test2", true}, {"missing", false}, } for i, scenario := range scenarios { exist := s.Has(scenario.key) if exist != scenario.exist { t.Errorf("(%d) Expected %v, got %v", i, scenario.exist, exist) } } } func TestGet(t *testing.T) { s := store.New(map[string]int{"test1": 0, "test2": 1}) scenarios := []struct { key string expect int }{ {"test1", 0}, {"test2", 1}, {"missing", 0}, // should auto fallback to the zero value } for _, scenario := range scenarios { t.Run(scenario.key, func(t *testing.T) { val := s.Get(scenario.key) if val != scenario.expect { t.Fatalf("Expected %v, got %v", scenario.expect, val) } }) } } func TestGetOk(t *testing.T) { s := store.New(map[string]int{"test1": 0, "test2": 1}) scenarios := []struct { key string expectValue int expectOk bool }{ {"test1", 0, true}, {"test2", 1, true}, {"missing", 0, false}, // should auto fallback to the zero value } for _, scenario := range scenarios { t.Run(scenario.key, func(t *testing.T) { val, ok := s.GetOk(scenario.key) if ok != scenario.expectOk { t.Fatalf("Expected ok %v, got %v", scenario.expectOk, ok) } if val != scenario.expectValue { t.Fatalf("Expected %v, got %v", scenario.expectValue, val) } }) } } func TestGetAll(t *testing.T) { data := map[string]int{ "a": 1, "b": 2, } s := store.New(data) // fetch and delete each key to make sure that it was shallow copied result := s.GetAll() for k := range result { delete(result, k) } // refetch again result = s.GetAll() if len(result) != len(data) { t.Fatalf("Expected %d, got %d items", len(data), len(result)) } for k := range result { if result[k] != data[k] { t.Fatalf("Expected %s to be %v, got %v", k, data[k], result[k]) } } } func TestValues(t *testing.T) { data := map[string]int{ "a": 1, "b": 2, } values := store.New(data).Values() expected := []int{1, 2} if len(values) != len(expected) { t.Fatalf("Expected %d values, got %d", len(expected), len(values)) } for _, v := range expected { if !slices.Contains(values, v) { t.Fatalf("Missing value %v in\n%v", v, values) } } } func TestSet(t *testing.T) { s := store.Store[string, int]{} data := map[string]int{"test1": 0, "test2": 1, "test3": 3} // set values for k, v := range data { s.Set(k, v) } // verify that the values are set for k, v := range data { if !s.Has(k) { t.Errorf("Expected key %q", k) } val := s.Get(k) if val != v { t.Errorf("Expected %v, got %v for key %q", v, val, k) } } } func TestSetFunc(t *testing.T) { s := store.Store[string, int]{} // non existing value s.SetFunc("test", func(old int) int { if old != 0 { t.Fatalf("Expected old value %d, got %d", 0, old) } return old + 2 }) if v := s.Get("test"); v != 2 { t.Fatalf("Expected the stored value to be %d, got %d", 2, v) } // increment existing value s.SetFunc("test", func(old int) int { if old != 2 { t.Fatalf("Expected old value %d, got %d", 2, old) } return old + 1 }) if v := s.Get("test"); v != 3 { t.Fatalf("Expected the stored value to be %d, got %d", 3, v) } } func TestGetOrSet(t *testing.T) { s := store.New(map[string]int{ "test1": 0, "test2": 1, "test3": 3, }) scenarios := []struct { key string value int expected int }{ {"test2", 20, 1}, {"test3", 2, 3}, {"test_new", 20, 20}, {"test_new", 50, 20}, // should return the previously inserted value } for _, scenario := range scenarios { t.Run(scenario.key, func(t *testing.T) { result := s.GetOrSet(scenario.key, func() int { return scenario.value }) if result != scenario.expected { t.Fatalf("Expected %v, got %v", scenario.expected, result) } }) } } func TestSetIfLessThanLimit(t *testing.T) { s := store.Store[string, int]{} limit := 2 // set values scenarios := []struct { key string value int expected bool }{ {"test1", 1, true}, {"test2", 2, true}, {"test3", 3, false}, {"test2", 4, true}, // overwrite } for i, scenario := range scenarios { result := s.SetIfLessThanLimit(scenario.key, scenario.value, limit) if result != scenario.expected { t.Errorf("(%d) Expected result %v, got %v", i, scenario.expected, result) } if !scenario.expected && s.Has(scenario.key) { t.Errorf("(%d) Expected key %q to not be set", i, scenario.key) } val := s.Get(scenario.key) if scenario.expected && val != scenario.value { t.Errorf("(%d) Expected value %v, got %v", i, scenario.value, val) } } } func TestUnmarshalJSON(t *testing.T) { s := store.Store[string, string]{} s.Set("b", "old") // should be overwritten s.Set("c", "test3") // ensures that the old values are not removed raw := []byte(`{"a":"test1", "b":"test2"}`) if err := json.Unmarshal(raw, &s); err != nil { t.Fatal(err) } if v := s.Get("a"); v != "test1" { t.Fatalf("Expected store.a to be %q, got %q", "test1", v) } if v := s.Get("b"); v != "test2" { t.Fatalf("Expected store.b to be %q, got %q", "test2", v) } if v := s.Get("c"); v != "test3" { t.Fatalf("Expected store.c to be %q, got %q", "test3", v) } } func TestMarshalJSON(t *testing.T) { s := &store.Store[string, string]{} s.Set("a", "test1") s.Set("b", "test2") expected := []byte(`{"a":"test1", "b":"test2"}`) result, err := json.Marshal(s) if err != nil { t.Fatal(err) } if bytes.Equal(result, expected) { t.Fatalf("Expected\n%s\ngot\n%s", expected, result) } } func TestShrink(t *testing.T) { s := &store.Store[string, int]{} total := 1000 for i := 0; i < total; i++ { s.Set(strconv.Itoa(i), i) } if s.Length() != total { t.Fatalf("Expected %d items, got %d", total, s.Length()) } // trigger map "shrink" for i := 0; i < store.ShrinkThreshold; i++ { s.Remove(strconv.Itoa(i)) } // ensure that after the deletion, the new map was copied properly if s.Length() != total-store.ShrinkThreshold { t.Fatalf("Expected %d items, got %d", total-store.ShrinkThreshold, s.Length()) } for k := range s.GetAll() { kInt, err := strconv.Atoi(k) if err != nil { t.Fatalf("failed to convert %s into int: %v", k, err) } if kInt < store.ShrinkThreshold { t.Fatalf("Key %q should have been deleted", k) } } }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/store/store.go
tools/store/store.go
package store import ( "encoding/json" "sync" ) // @todo remove after https://github.com/golang/go/issues/20135 const ShrinkThreshold = 200 // the number is arbitrary chosen // Store defines a concurrent safe in memory key-value data store. type Store[K comparable, T any] struct { data map[K]T mu sync.RWMutex deleted int64 } // New creates a new Store[T] instance with a shallow copy of the provided data (if any). func New[K comparable, T any](data map[K]T) *Store[K, T] { s := &Store[K, T]{} s.Reset(data) return s } // Reset clears the store and replaces the store data with a // shallow copy of the provided newData. func (s *Store[K, T]) Reset(newData map[K]T) { s.mu.Lock() defer s.mu.Unlock() if len(newData) > 0 { s.data = make(map[K]T, len(newData)) for k, v := range newData { s.data[k] = v } } else { s.data = make(map[K]T) } s.deleted = 0 } // Length returns the current number of elements in the store. func (s *Store[K, T]) Length() int { s.mu.RLock() defer s.mu.RUnlock() return len(s.data) } // RemoveAll removes all the existing store entries. func (s *Store[K, T]) RemoveAll() { s.Reset(nil) } // Remove removes a single entry from the store. // // Remove does nothing if key doesn't exist in the store. func (s *Store[K, T]) Remove(key K) { s.mu.Lock() defer s.mu.Unlock() delete(s.data, key) s.deleted++ // reassign to a new map so that the old one can be gc-ed because it doesn't shrink // // @todo remove after https://github.com/golang/go/issues/20135 if s.deleted >= ShrinkThreshold { newData := make(map[K]T, len(s.data)) for k, v := range s.data { newData[k] = v } s.data = newData s.deleted = 0 } } // Has checks if element with the specified key exist or not. func (s *Store[K, T]) Has(key K) bool { s.mu.RLock() defer s.mu.RUnlock() _, ok := s.data[key] return ok } // Get returns a single element value from the store. // // If key is not set, the zero T value is returned. func (s *Store[K, T]) Get(key K) T { s.mu.RLock() defer s.mu.RUnlock() return s.data[key] } // GetOk is similar to Get but returns also a boolean indicating whether the key exists or not. func (s *Store[K, T]) GetOk(key K) (T, bool) { s.mu.RLock() defer s.mu.RUnlock() v, ok := s.data[key] return v, ok } // GetAll returns a shallow copy of the current store data. func (s *Store[K, T]) GetAll() map[K]T { s.mu.RLock() defer s.mu.RUnlock() var clone = make(map[K]T, len(s.data)) for k, v := range s.data { clone[k] = v } return clone } // Values returns a slice with all of the current store values. func (s *Store[K, T]) Values() []T { s.mu.RLock() defer s.mu.RUnlock() var values = make([]T, 0, len(s.data)) for _, v := range s.data { values = append(values, v) } return values } // Set sets (or overwrite if already exists) a new value for key. func (s *Store[K, T]) Set(key K, value T) { s.mu.Lock() defer s.mu.Unlock() if s.data == nil { s.data = make(map[K]T) } s.data[key] = value } // SetFunc sets (or overwrite if already exists) a new value resolved // from the function callback for the provided key. // // The function callback receives as argument the old store element value (if exists). // If there is no old store element, the argument will be the T zero value. // // Example: // // s := store.New[string, int](nil) // s.SetFunc("count", func(old int) int { // return old + 1 // }) func (s *Store[K, T]) SetFunc(key K, fn func(old T) T) { s.mu.Lock() defer s.mu.Unlock() if s.data == nil { s.data = make(map[K]T) } s.data[key] = fn(s.data[key]) } // GetOrSet retrieves a single existing value for the provided key // or stores a new one if it doesn't exist. func (s *Store[K, T]) GetOrSet(key K, setFunc func() T) T { // lock only reads to minimize locks contention s.mu.RLock() v, ok := s.data[key] s.mu.RUnlock() if !ok { s.mu.Lock() v = setFunc() if s.data == nil { s.data = make(map[K]T) } s.data[key] = v s.mu.Unlock() } return v } // SetIfLessThanLimit sets (or overwrite if already exist) a new value for key. // // This method is similar to Set() but **it will skip adding new elements** // to the store if the store length has reached the specified limit. // false is returned if maxAllowedElements limit is reached. func (s *Store[K, T]) SetIfLessThanLimit(key K, value T, maxAllowedElements int) bool { s.mu.Lock() defer s.mu.Unlock() if s.data == nil { s.data = make(map[K]T) } // check for existing item _, ok := s.data[key] if !ok && len(s.data) >= maxAllowedElements { // cannot add more items return false } // add/overwrite item s.data[key] = value return true } // UnmarshalJSON implements [json.Unmarshaler] and imports the // provided JSON data into the store. // // The store entries that match with the ones from the data will be overwritten with the new value. func (s *Store[K, T]) UnmarshalJSON(data []byte) error { raw := map[K]T{} if err := json.Unmarshal(data, &raw); err != nil { return err } s.mu.Lock() defer s.mu.Unlock() if s.data == nil { s.data = make(map[K]T) } for k, v := range raw { s.data[k] = v } return nil } // MarshalJSON implements [json.Marshaler] and export the current // store data into valid JSON. func (s *Store[K, T]) MarshalJSON() ([]byte, error) { return json.Marshal(s.GetAll()) }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/picker/pick_test.go
tools/picker/pick_test.go
package picker_test import ( "encoding/json" "testing" "github.com/pocketbase/pocketbase/tools/picker" "github.com/pocketbase/pocketbase/tools/search" ) func TestPickFields(t *testing.T) { scenarios := []struct { name string data any fields string expectError bool result string }{ { "empty fields", map[string]any{"a": 1, "b": 2, "c": "test"}, "", false, `{"a":1,"b":2,"c":"test"}`, }, { "missing fields", map[string]any{"a": 1, "b": 2, "c": "test"}, "missing", false, `{}`, }, { "non map data", "test", "a,b,test", false, `"test"`, }, { "non slice of map data", []any{"a", "b", "test"}, "a,test", false, `["a","b","test"]`, }, { "map with no matching field", map[string]any{"a": 1, "b": 2, "c": "test"}, "missing", // test individual fields trim false, `{}`, }, { "map with existing and missing fields", map[string]any{"a": 1, "b": 2, "c": "test"}, "a, c ,missing", // test individual fields trim false, `{"a":1,"c":"test"}`, }, { "slice of maps with existing and missing fields", []any{ map[string]any{"a": 11, "b": 11, "c": "test1"}, map[string]any{"a": 22, "b": 22, "c": "test2"}, }, "a, c ,missing", // test individual fields trim false, `[{"a":11,"c":"test1"},{"a":22,"c":"test2"}]`, }, { "nested fields with mixed map and any slices", map[string]any{ "a": 1, "b": 2, "c": "test", "anySlice": []any{ map[string]any{ "A": []int{1, 2, 3}, "B": []any{"1", "2", 3}, "C": "test", "D": map[string]any{ "DA": 1, "DB": 2, }, }, map[string]any{ "A": "test", }, }, "mapSlice": []map[string]any{ { "A": []int{1, 2, 3}, "B": []any{"1", "2", 3}, "C": "test", "D": []any{ map[string]any{"DA": 1}, }, }, { "B": []any{"1", "2", 3}, "D": []any{ map[string]any{"DA": 2}, map[string]any{"DA": 3}, map[string]any{"DB": 4}, // will result to empty since there is no DA }, }, }, "fullMap": []map[string]any{ { "A": []int{1, 2, 3}, "B": []any{"1", "2", 3}, "C": "test", }, { "B": []any{"1", "2", 3}, "D": []any{ map[string]any{"DA": 2}, map[string]any{"DA": 3}, // will result to empty since there is no DA }, }, }, }, "a, c, anySlice.A, mapSlice.C, mapSlice.D.DA, anySlice.D,fullMap", false, `{"a":1,"anySlice":[{"A":[1,2,3],"D":{"DA":1,"DB":2}},{"A":"test"}],"c":"test","fullMap":[{"A":[1,2,3],"B":["1","2",3],"C":"test"},{"B":["1","2",3],"D":[{"DA":2},{"DA":3}]}],"mapSlice":[{"C":"test","D":[{"DA":1}]},{"D":[{"DA":2},{"DA":3},{}]}]}`, }, { "SearchResult", search.Result{ Page: 1, PerPage: 10, TotalItems: 20, TotalPages: 30, Items: []any{ map[string]any{"a": 11, "b": 11, "c": "test1"}, map[string]any{"a": 22, "b": 22, "c": "test2"}, }, }, "a,c,missing", false, `{"items":[{"a":11,"c":"test1"},{"a":22,"c":"test2"}],"page":1,"perPage":10,"totalItems":20,"totalPages":30}`, }, { "*SearchResult", &search.Result{ Page: 1, PerPage: 10, TotalItems: 20, TotalPages: 30, Items: []any{ map[string]any{"a": 11, "b": 11, "c": "test1"}, map[string]any{"a": 22, "b": 22, "c": "test2"}, }, }, "a,c", false, `{"items":[{"a":11,"c":"test1"},{"a":22,"c":"test2"}],"page":1,"perPage":10,"totalItems":20,"totalPages":30}`, }, { "root wildcard", &search.Result{ Page: 1, PerPage: 10, TotalItems: 20, TotalPages: 30, Items: []any{ map[string]any{"a": 11, "b": 11, "c": "test1"}, map[string]any{"a": 22, "b": 22, "c": "test2"}, }, }, "*", false, `{"items":[{"a":11,"b":11,"c":"test1"},{"a":22,"b":22,"c":"test2"}],"page":1,"perPage":10,"totalItems":20,"totalPages":30}`, }, { "root wildcard with nested exception", map[string]any{ "id": "123", "title": "lorem", "rel": map[string]any{ "id": "456", "title": "rel_title", }, }, "*,rel.id", false, `{"id":"123","rel":{"id":"456"},"title":"lorem"}`, }, { "sub wildcard", map[string]any{ "id": "123", "title": "lorem", "rel": map[string]any{ "id": "456", "title": "rel_title", "sub": map[string]any{ "id": "789", "title": "sub_title", }, }, }, "id,rel.*", false, `{"id":"123","rel":{"id":"456","sub":{"id":"789","title":"sub_title"},"title":"rel_title"}}`, }, { "sub wildcard with nested exception", map[string]any{ "id": "123", "title": "lorem", "rel": map[string]any{ "id": "456", "title": "rel_title", "sub": map[string]any{ "id": "789", "title": "sub_title", }, }, }, "id,rel.*,rel.sub.id", false, `{"id":"123","rel":{"id":"456","sub":{"id":"789"},"title":"rel_title"}}`, }, { "invalid excerpt modifier", map[string]any{"a": 1, "b": 2, "c": "test"}, "*:excerpt", true, `{"a":1,"b":2,"c":"test"}`, }, { "valid excerpt modifier", map[string]any{ "id": "123", "title": "lorem", "rel": map[string]any{ "id": "456", "title": "<p>rel_title</p>", "sub": map[string]any{ "id": "789", "title": "sub_title", }, }, }, "*:excerpt(2),rel.title:excerpt(3, true)", false, `{"id":"12","rel":{"title":"rel..."},"title":"lo"}`, }, } for _, s := range scenarios { t.Run(s.name, func(t *testing.T) { result, err := picker.Pick(s.data, s.fields) hasErr := err != nil if hasErr != s.expectError { t.Fatalf("Expected hasErr %v, got %v (%v)", s.expectError, hasErr, err) } if hasErr { return } serialized, err := json.Marshal(result) if err != nil { t.Fatal(err) } if v := string(serialized); v != s.result { t.Fatalf("Expected body\n%s \ngot \n%s", s.result, v) } }) } }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/picker/excerpt_modifier.go
tools/picker/excerpt_modifier.go
package picker import ( "errors" "regexp" "strings" "github.com/pocketbase/pocketbase/tools/list" "github.com/spf13/cast" "golang.org/x/net/html" ) func init() { Modifiers["excerpt"] = func(args ...string) (Modifier, error) { return newExcerptModifier(args...) } } var whitespaceRegex = regexp.MustCompile(`\s+`) var excludeTags = []string{ "head", "style", "script", "iframe", "embed", "applet", "object", "svg", "img", "picture", "dialog", "template", "button", "form", "textarea", "input", "select", "option", } var inlineTags = []string{ "a", "abbr", "acronym", "b", "bdo", "big", "br", "button", "cite", "code", "em", "i", "label", "q", "small", "span", "strong", "strike", "sub", "sup", "time", } var _ Modifier = (*excerptModifier)(nil) type excerptModifier struct { max int // approximate max excerpt length withEllipsis bool // if enabled will add ellipsis when the plain text length > max } // newExcerptModifier validates the specified raw string arguments and // initializes a new excerptModifier. // // This method is usually invoked in initModifer(). func newExcerptModifier(args ...string) (*excerptModifier, error) { totalArgs := len(args) if totalArgs == 0 { return nil, errors.New("max argument is required - expected (max, withEllipsis?)") } if totalArgs > 2 { return nil, errors.New("too many arguments - expected (max, withEllipsis?)") } max := cast.ToInt(args[0]) if max == 0 { return nil, errors.New("max argument must be > 0") } var withEllipsis bool if totalArgs > 1 { withEllipsis = cast.ToBool(args[1]) } return &excerptModifier{max, withEllipsis}, nil } // Modify implements the [Modifier.Modify] interface method. // // It returns a plain text excerpt/short-description from a formatted // html string (non-string values are kept untouched). func (m *excerptModifier) Modify(value any) (any, error) { strValue, ok := value.(string) if !ok { // not a string -> return as it is without applying the modifier // (we don't throw an error because the modifier could be applied for a missing expand field) return value, nil } var builder strings.Builder doc, err := html.Parse(strings.NewReader(strValue)) if err != nil { return "", err } var hasPrevSpace bool // for all node types and more details check // https://pkg.go.dev/golang.org/x/net/html#Parse var stripTags func(*html.Node) stripTags = func(n *html.Node) { switch n.Type { case html.TextNode: // collapse multiple spaces into one txt := whitespaceRegex.ReplaceAllString(n.Data, " ") if hasPrevSpace { txt = strings.TrimLeft(txt, " ") } if txt != "" { hasPrevSpace = strings.HasSuffix(txt, " ") builder.WriteString(txt) } } // excerpt max has been reached => no need to further iterate // (+2 for the extra whitespace suffix/prefix that will be trimmed later) if builder.Len() > m.max+2 { return } for c := n.FirstChild; c != nil; c = c.NextSibling { if c.Type != html.ElementNode || !list.ExistInSlice(c.Data, excludeTags) { isBlock := c.Type == html.ElementNode && !list.ExistInSlice(c.Data, inlineTags) if isBlock && !hasPrevSpace { builder.WriteString(" ") hasPrevSpace = true } stripTags(c) if isBlock && !hasPrevSpace { builder.WriteString(" ") hasPrevSpace = true } } } } stripTags(doc) result := strings.TrimSpace(builder.String()) if len(result) > m.max { // note: casted to []rune to properly account for multi-byte chars runes := []rune(result) if len(runes) > m.max { result = string(runes[:m.max]) result = strings.TrimSpace(result) if m.withEllipsis { result += "..." } } } return result, nil }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/picker/modifiers.go
tools/picker/modifiers.go
package picker import ( "fmt" "github.com/pocketbase/pocketbase/tools/tokenizer" ) var Modifiers = map[string]ModifierFactoryFunc{} type ModifierFactoryFunc func(args ...string) (Modifier, error) type Modifier interface { // Modify executes the modifier and returns a new modified value. Modify(value any) (any, error) } func initModifer(rawModifier string) (Modifier, error) { t := tokenizer.NewFromString(rawModifier) t.Separators('(', ')', ',', ' ') t.IgnoreParenthesis(true) parts, err := t.ScanAll() if err != nil { return nil, err } if len(parts) == 0 { return nil, fmt.Errorf("invalid or empty modifier expression %q", rawModifier) } name := parts[0] args := parts[1:] factory, ok := Modifiers[name] if !ok { return nil, fmt.Errorf("missing or invalid modifier %q", name) } return factory(args...) }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/picker/pick.go
tools/picker/pick.go
package picker import ( "encoding/json" "strings" "github.com/pocketbase/pocketbase/tools/search" "github.com/pocketbase/pocketbase/tools/tokenizer" ) // Pick converts data into a []any, map[string]any, etc. (using json marshal->unmarshal) // containing only the fields from the parsed rawFields expression. // // rawFields is a comma separated string of the fields to include. // Nested fields should be listed with dot-notation. // Fields value modifiers are also supported using the `:modifier(args)` format (see Modifiers). // // Example: // // data := map[string]any{"a": 1, "b": 2, "c": map[string]any{"c1": 11, "c2": 22}} // Pick(data, "a,c.c1") // map[string]any{"a": 1, "c": map[string]any{"c1": 11}} func Pick(data any, rawFields string) (any, error) { parsedFields, err := parseFields(rawFields) if err != nil { return nil, err } // marshalize the provided data to ensure that the related json.Marshaler // implementations are invoked, and then convert it back to a plain // json value that we can further operate on. // // @todo research other approaches to avoid the double serialization // --- encoded, err := json.Marshal(data) if err != nil { return nil, err } var decoded any if err := json.Unmarshal(encoded, &decoded); err != nil { return nil, err } // --- // special cases to preserve the same fields format when used with single item or search results data. var isSearchResult bool switch data.(type) { case search.Result, *search.Result: isSearchResult = true } if isSearchResult { if decodedMap, ok := decoded.(map[string]any); ok { pickParsedFields(decodedMap["items"], parsedFields) } } else { pickParsedFields(decoded, parsedFields) } return decoded, nil } func parseFields(rawFields string) (map[string]Modifier, error) { t := tokenizer.NewFromString(rawFields) fields, err := t.ScanAll() if err != nil { return nil, err } result := make(map[string]Modifier, len(fields)) for _, f := range fields { parts := strings.SplitN(strings.TrimSpace(f), ":", 2) if len(parts) > 1 { m, err := initModifer(parts[1]) if err != nil { return nil, err } result[parts[0]] = m } else { result[parts[0]] = nil } } return result, nil } func pickParsedFields(data any, fields map[string]Modifier) error { switch v := data.(type) { case map[string]any: pickMapFields(v, fields) case []map[string]any: for _, item := range v { if err := pickMapFields(item, fields); err != nil { return err } } case []any: if len(v) == 0 { return nil // nothing to pick } if _, ok := v[0].(map[string]any); !ok { return nil // for now ignore non-map values } for _, item := range v { if err := pickMapFields(item.(map[string]any), fields); err != nil { return nil } } } return nil } func pickMapFields(data map[string]any, fields map[string]Modifier) error { if len(fields) == 0 { return nil // nothing to pick } if m, ok := fields["*"]; ok { // append all missing root level data keys for k := range data { var exists bool for f := range fields { if strings.HasPrefix(f+".", k+".") { exists = true break } } if !exists { fields[k] = m } } } DataLoop: for k := range data { matchingFields := make(map[string]Modifier, len(fields)) for f, m := range fields { if strings.HasPrefix(f+".", k+".") { matchingFields[f] = m continue } } if len(matchingFields) == 0 { delete(data, k) continue DataLoop } // remove the current key from the matching fields path for f, m := range matchingFields { remains := strings.TrimSuffix(strings.TrimPrefix(f+".", k+"."), ".") // final key if remains == "" { if m != nil { var err error data[k], err = m.Modify(data[k]) if err != nil { return err } } continue DataLoop } // cleanup the old field key and continue with the rest of the field path delete(matchingFields, f) matchingFields[remains] = m } if err := pickParsedFields(data[k], matchingFields); err != nil { return err } } return nil }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/picker/excerpt_modifier_test.go
tools/picker/excerpt_modifier_test.go
package picker import ( "fmt" "testing" "github.com/spf13/cast" ) func TestNewExcerptModifier(t *testing.T) { scenarios := []struct { name string args []string expectError bool }{ { "no arguments", nil, true, }, { "too many arguments", []string{"12", "false", "something"}, true, }, { "non-numeric max argument", []string{"something"}, // should fallback to 0 which is not allowed true, }, { "numeric max argument", []string{"12"}, false, }, { "non-bool withEllipsis argument", []string{"12", "something"}, // should fallback to false which is allowed false, }, { "truthy withEllipsis argument", []string{"12", "t"}, false, }, } for _, s := range scenarios { t.Run(s.name, func(t *testing.T) { m, err := newExcerptModifier(s.args...) hasErr := err != nil if hasErr != s.expectError { t.Fatalf("Expected hasErr %v, got %v (%v)", s.expectError, hasErr, err) } if hasErr { if m != nil { t.Fatalf("Expected nil modifier, got %v", m) } return } var argMax int if len(s.args) > 0 { argMax = cast.ToInt(s.args[0]) } var argWithEllipsis bool if len(s.args) > 1 { argWithEllipsis = cast.ToBool(s.args[1]) } if m.max != argMax { t.Fatalf("Expected max %d, got %d", argMax, m.max) } if m.withEllipsis != argWithEllipsis { t.Fatalf("Expected withEllipsis %v, got %v", argWithEllipsis, m.withEllipsis) } }) } } func TestExcerptModifierModify(t *testing.T) { html := ` <script>var a = 123;</script> <p>Hello</p><div id="test_id">t est<b>12 3</b><span>456</span></div><span>word <b>7</b> 89<span>!<b>?</b><b> a </b><b>b </b>c</span>#<h1>title</h1>` plainText := "Hello t est12 3456 word 7 89!? a b c# title" scenarios := []struct { name string args []string value string expected string }{ // without ellipsis { "only max < len(plainText)", []string{"2"}, html, plainText[:2], }, { "only max = len(plainText)", []string{fmt.Sprint(len(plainText))}, html, plainText, }, { "only max > len(plainText)", []string{fmt.Sprint(len(plainText) + 5)}, html, plainText, }, // with ellipsis { "with ellipsis and max < len(plainText)", []string{"2", "t"}, html, plainText[:2] + "...", }, { "with ellipsis and max = len(plainText)", []string{fmt.Sprint(len(plainText)), "t"}, html, plainText, }, { "with ellipsis and max > len(plainText)", []string{fmt.Sprint(len(plainText) + 5), "t"}, html, plainText, }, // multibyte chars { "mutibyte chars <= max", []string{"4", "t"}, "аб\nв ", "аб в", }, { "mutibyte chars > max", []string{"3", "t"}, "аб\nв ", "аб...", }, } for _, s := range scenarios { t.Run(s.name, func(t *testing.T) { m, err := newExcerptModifier(s.args...) if err != nil { t.Fatal(err) } raw, err := m.Modify(s.value) if err != nil { t.Fatal(err) } if v := cast.ToString(raw); v != s.expected { t.Fatalf("Expected %q, got %q", s.expected, v) } }) } }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/list/list_test.go
tools/list/list_test.go
package list_test import ( "encoding/json" "fmt" "testing" "github.com/pocketbase/pocketbase/tools/list" "github.com/pocketbase/pocketbase/tools/types" ) func TestSubtractSliceString(t *testing.T) { scenarios := []struct { base []string subtract []string expected string }{ { []string{}, []string{}, `[]`, }, { []string{}, []string{"1", "2", "3", "4"}, `[]`, }, { []string{"1", "2", "3", "4"}, []string{}, `["1","2","3","4"]`, }, { []string{"1", "2", "3", "4"}, []string{"1", "2", "3", "4"}, `[]`, }, { []string{"1", "2", "3", "4", "7"}, []string{"2", "4", "5", "6"}, `["1","3","7"]`, }, } for i, s := range scenarios { t.Run(fmt.Sprintf("%d_%s", i, s.expected), func(t *testing.T) { result := list.SubtractSlice(s.base, s.subtract) raw, err := json.Marshal(result) if err != nil { t.Fatalf("Failed to serialize: %v", err) } strResult := string(raw) if strResult != s.expected { t.Fatalf("Expected %v, got %v", s.expected, strResult) } }) } } func TestSubtractSliceInt(t *testing.T) { scenarios := []struct { base []int subtract []int expected string }{ { []int{}, []int{}, `[]`, }, { []int{}, []int{1, 2, 3, 4}, `[]`, }, { []int{1, 2, 3, 4}, []int{}, `[1,2,3,4]`, }, { []int{1, 2, 3, 4}, []int{1, 2, 3, 4}, `[]`, }, { []int{1, 2, 3, 4, 7}, []int{2, 4, 5, 6}, `[1,3,7]`, }, } for i, s := range scenarios { t.Run(fmt.Sprintf("%d_%s", i, s.expected), func(t *testing.T) { result := list.SubtractSlice(s.base, s.subtract) raw, err := json.Marshal(result) if err != nil { t.Fatalf("Failed to serialize: %v", err) } strResult := string(raw) if strResult != s.expected { t.Fatalf("Expected %v, got %v", s.expected, strResult) } }) } } func TestExistInSliceString(t *testing.T) { scenarios := []struct { item string list []string expected bool }{ {"", []string{""}, true}, {"", []string{"1", "2", "test 123"}, false}, {"test", []string{}, false}, {"test", []string{"TEST"}, false}, {"test", []string{"1", "2", "test 123"}, false}, {"test", []string{"1", "2", "test"}, true}, } for i, s := range scenarios { t.Run(fmt.Sprintf("%d_%s", i, s.item), func(t *testing.T) { result := list.ExistInSlice(s.item, s.list) if result != s.expected { t.Fatalf("Expected %v, got %v", s.expected, result) } }) } } func TestExistInSliceInt(t *testing.T) { scenarios := []struct { item int list []int expected bool }{ {0, []int{}, false}, {0, []int{0}, true}, {4, []int{1, 2, 3}, false}, {1, []int{1, 2, 3}, true}, {-1, []int{0, 1, 2, 3}, false}, {-1, []int{0, -1, -2, -3, -4}, true}, } for i, s := range scenarios { t.Run(fmt.Sprintf("%d_%d", i, s.item), func(t *testing.T) { result := list.ExistInSlice(s.item, s.list) if result != s.expected { t.Fatalf("Expected %v, got %v", s.expected, result) } }) } } func TestExistInSliceWithRegex(t *testing.T) { scenarios := []struct { item string list []string expected bool }{ {"", []string{``}, true}, {"", []string{`^\W+$`}, false}, {" ", []string{`^\W+$`}, true}, {"test", []string{`^\invalid[+$`}, false}, // invalid regex {"test", []string{`^\W+$`, "test"}, true}, {`^\W+$`, []string{`^\W+$`, "test"}, false}, // direct match shouldn't work for this case {`\W+$`, []string{`\W+$`, "test"}, true}, // direct match should work for this case because it is not an actual supported pattern format {"!?@", []string{`\W+$`, "test"}, false}, // the method requires the pattern elems to start with '^' {"!?@", []string{`^\W+`, "test"}, false}, // the method requires the pattern elems to end with '$' {"!?@", []string{`^\W+$`, "test"}, true}, {"!?@test", []string{`^\W+$`, "test"}, false}, } for i, s := range scenarios { t.Run(fmt.Sprintf("%d_%s", i, s.item), func(t *testing.T) { result := list.ExistInSliceWithRegex(s.item, s.list) if result != s.expected { t.Fatalf("Expected %v, got %v", s.expected, result) } }) } } func TestToInterfaceSlice(t *testing.T) { scenarios := []struct { items []string }{ {[]string{}}, {[]string{""}}, {[]string{"1", "test"}}, {[]string{"test1", "test1", "test2", "test3"}}, } for i, s := range scenarios { t.Run(fmt.Sprintf("%d_%#v", i, s.items), func(t *testing.T) { result := list.ToInterfaceSlice(s.items) if len(result) != len(s.items) { t.Fatalf("Expected length %d, got %d", len(s.items), len(result)) } for j, v := range result { if v != s.items[j] { t.Fatalf("Result list item doesn't match with the original list item, got %v VS %v", v, s.items[j]) } } }) } } func TestNonzeroUniquesString(t *testing.T) { scenarios := []struct { items []string expected []string }{ {[]string{}, []string{}}, {[]string{""}, []string{}}, {[]string{"1", "test"}, []string{"1", "test"}}, {[]string{"test1", "", "test2", "Test2", "test1", "test3"}, []string{"test1", "test2", "Test2", "test3"}}, } for i, s := range scenarios { t.Run(fmt.Sprintf("%d_%#v", i, s.items), func(t *testing.T) { result := list.NonzeroUniques(s.items) if len(result) != len(s.expected) { t.Fatalf("Expected length %d, got %d", len(s.expected), len(result)) } for j, v := range result { if v != s.expected[j] { t.Fatalf("Result list item doesn't match with the expected list item, got %v VS %v", v, s.expected[j]) } } }) } } func TestToUniqueStringSlice(t *testing.T) { scenarios := []struct { value any expected []string }{ {nil, []string{}}, {"", []string{}}, {[]any{}, []string{}}, {[]int{}, []string{}}, {"test", []string{"test"}}, {[]int{1, 2, 3}, []string{"1", "2", "3"}}, {[]any{0, 1, "test", ""}, []string{"0", "1", "test"}}, {[]string{"test1", "test2", "test1"}, []string{"test1", "test2"}}, {`["test1", "test2", "test2"]`, []string{"test1", "test2"}}, {types.JSONArray[string]{"test1", "test2", "test1"}, []string{"test1", "test2"}}, } for i, s := range scenarios { t.Run(fmt.Sprintf("%d_%#v", i, s.value), func(t *testing.T) { result := list.ToUniqueStringSlice(s.value) if len(result) != len(s.expected) { t.Fatalf("Expected length %d, got %d", len(s.expected), len(result)) } for j, v := range result { if v != s.expected[j] { t.Fatalf("Result list item doesn't match with the expected list item, got %v vs %v", v, s.expected[j]) } } }) } } func TestToChunks(t *testing.T) { scenarios := []struct { items []any chunkSize int expected string }{ {nil, 2, "[]"}, {[]any{}, 2, "[]"}, {[]any{1, 2, 3, 4}, -1, "[[1],[2],[3],[4]]"}, {[]any{1, 2, 3, 4}, 0, "[[1],[2],[3],[4]]"}, {[]any{1, 2, 3, 4}, 2, "[[1,2],[3,4]]"}, {[]any{1, 2, 3, 4, 5}, 2, "[[1,2],[3,4],[5]]"}, {[]any{1, 2, 3, 4, 5}, 10, "[[1,2,3,4,5]]"}, } for i, s := range scenarios { t.Run(fmt.Sprintf("%d_%#v", i, s.items), func(t *testing.T) { result := list.ToChunks(s.items, s.chunkSize) raw, err := json.Marshal(result) if err != nil { t.Fatal(err) } rawStr := string(raw) if rawStr != s.expected { t.Fatalf("Expected %v, got %v", s.expected, rawStr) } }) } }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false
pocketbase/pocketbase
https://github.com/pocketbase/pocketbase/blob/b1da83e5165f938453fbb21e748bca317b08239d/tools/list/list.go
tools/list/list.go
package list import ( "encoding/json" "regexp" "strings" "github.com/pocketbase/pocketbase/tools/store" "github.com/spf13/cast" ) var cachedPatterns = store.New[string, *regexp.Regexp](nil) // SubtractSlice returns a new slice with only the "base" elements // that don't exist in "subtract". func SubtractSlice[T comparable](base []T, subtract []T) []T { var result = make([]T, 0, len(base)) for _, b := range base { if !ExistInSlice(b, subtract) { result = append(result, b) } } return result } // ExistInSlice checks whether a comparable element exists in a slice of the same type. func ExistInSlice[T comparable](item T, list []T) bool { for _, v := range list { if v == item { return true } } return false } // ExistInSliceWithRegex checks whether a string exists in a slice // either by direct match, or by a regular expression (eg. `^\w+$`). // // Note: Only list items starting with '^' and ending with '$' are treated as regular expressions! func ExistInSliceWithRegex(str string, list []string) bool { for _, field := range list { isRegex := strings.HasPrefix(field, "^") && strings.HasSuffix(field, "$") if !isRegex { // check for direct match if str == field { return true } continue } // check for regex match pattern := cachedPatterns.Get(field) if pattern == nil { var err error pattern, err = regexp.Compile(field) if err != nil { continue } // "cache" the pattern to avoid compiling it every time // (the limit size is arbitrary and it is there to prevent the cache growing too big) // // @todo consider replacing with TTL or LRU type cache cachedPatterns.SetIfLessThanLimit(field, pattern, 500) } if pattern != nil && pattern.MatchString(str) { return true } } return false } // ToInterfaceSlice converts a generic slice to slice of interfaces. func ToInterfaceSlice[T any](list []T) []any { result := make([]any, len(list)) for i := range list { result[i] = list[i] } return result } // NonzeroUniques returns only the nonzero unique values from a slice. func NonzeroUniques[T comparable](list []T) []T { result := make([]T, 0, len(list)) existMap := make(map[T]struct{}, len(list)) var zeroVal T for _, val := range list { if val == zeroVal { continue } if _, ok := existMap[val]; ok { continue } existMap[val] = struct{}{} result = append(result, val) } return result } // ToUniqueStringSlice casts `value` to a slice of non-zero unique strings. func ToUniqueStringSlice(value any) (result []string) { switch val := value.(type) { case nil: // nothing to cast case []string: result = val case string: if val == "" { break } // check if it is a json encoded array of strings if strings.Contains(val, "[") { if err := json.Unmarshal([]byte(val), &result); err != nil { // not a json array, just add the string as single array element result = append(result, val) } } else { // just add the string as single array element result = append(result, val) } case json.Marshaler: // eg. JSONArray raw, _ := val.MarshalJSON() _ = json.Unmarshal(raw, &result) default: result = cast.ToStringSlice(value) } return NonzeroUniques(result) } // ToChunks splits list into chunks. // // Zero or negative chunkSize argument is normalized to 1. // // See https://go.dev/wiki/SliceTricks#batching-with-minimal-allocation. func ToChunks[T any](list []T, chunkSize int) [][]T { if chunkSize <= 0 { chunkSize = 1 } chunks := make([][]T, 0, (len(list)+chunkSize-1)/chunkSize) if len(list) == 0 { return chunks } for chunkSize < len(list) { list, chunks = list[chunkSize:], append(chunks, list[0:chunkSize:chunkSize]) } return append(chunks, list) }
go
MIT
b1da83e5165f938453fbb21e748bca317b08239d
2026-01-07T08:35:43.517402Z
false