repo
stringlengths
6
65
file_url
stringlengths
81
311
file_path
stringlengths
6
227
content
stringlengths
0
32.8k
language
stringclasses
1 value
license
stringclasses
7 values
commit_sha
stringlengths
40
40
retrieved_at
stringdate
2026-01-04 15:31:58
2026-01-04 20:25:31
truncated
bool
2 classes
vertexclique/lever
https://github.com/vertexclique/lever/blob/690d85eb4790caed0bb2c11faf2b2e3e526bbf09/src/sync/ttas.rs
src/sync/ttas.rs
use super::ifaces::LockIface; use std::fmt; use std::{ cell::UnsafeCell, hint::spin_loop, sync::atomic::{AtomicBool, Ordering}, }; use std::{ marker::PhantomData as marker, ops::{Deref, DerefMut}, thread::ThreadId, time::{Duration, Instant}, }; pub struct TTasGuard<'a, T: ?Sized> { mutex: &'a TTas<T>, marker: marker<&'a mut T>, } impl<'a, T: ?Sized + 'a> Deref for TTasGuard<'a, T> { type Target = T; #[inline] fn deref(&self) -> &T { unsafe { &*self.mutex.data.get() } } } impl<'a, T: ?Sized + 'a> DerefMut for TTasGuard<'a, T> { #[inline] fn deref_mut(&mut self) -> &mut T { unsafe { &mut *self.mutex.data.get() } } } impl<'a, T: ?Sized + 'a> Drop for TTasGuard<'a, T> { #[inline] fn drop(&mut self) { self.mutex.unlock(); } } impl<'a, T: fmt::Debug + ?Sized + 'a> fmt::Debug for TTasGuard<'a, T> { fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { fmt::Debug::fmt(&**self, f) } } impl<'a, T: fmt::Display + ?Sized + 'a> fmt::Display for TTasGuard<'a, T> { fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { (**self).fmt(f) } } pub struct TTas<T> where T: ?Sized, { tid: ThreadId, acquired: AtomicBool, data: UnsafeCell<T>, } impl<T> TTas<T> { #[inline] pub fn new(data: T) -> Self { Self { tid: std::thread::current().id(), acquired: AtomicBool::default(), data: UnsafeCell::new(data), } } #[inline] pub fn into_inner(self) -> T { self.data.into_inner() } #[inline] pub fn get_mut(&mut self) -> &mut T { unsafe { &mut *self.data.get() } } #[inline] unsafe fn guard(&self) -> TTasGuard<'_, T> { TTasGuard { mutex: self, marker, } } #[inline] pub fn lock(&self) -> TTasGuard<'_, T> { // TODO: dispatch directly <Self as LockIface>::lock(self); // SAFETY: The lock is held, as required. unsafe { self.guard() } } #[inline] pub fn try_lock(&self) -> Option<TTasGuard<'_, T>> { if <Self as LockIface>::try_lock(self) { // SAFETY: The lock is held, as required. Some(unsafe { self.guard() }) } else { None } } #[inline] pub unsafe fn force_unlock(&self) { <Self as LockIface>::unlock(&self); } #[inline] pub fn try_write_lock_for(&self, timeout: Duration) -> Option<TTasGuard<'_, T>> { let deadline = Instant::now() .checked_add(timeout) .expect("Deadline can't fit in"); loop { if Instant::now() < deadline { match self.try_lock() { Some(guard) => { break Some(guard); } _ => { std::thread::sleep(timeout / 10); std::thread::yield_now() } }; } else { break None; } } } #[inline] pub fn is_current(&self) -> bool { std::thread::current().id() == self.tid } } unsafe impl<T: ?Sized + Send> Send for TTas<T> {} unsafe impl<T: ?Sized + Send> Sync for TTas<T> {} unsafe impl<T> LockIface for TTas<T> where T: ?Sized, { #[inline] fn lock(&self) { 'lock: loop { while let Some(true) = Some(self.acquired.load(Ordering::SeqCst)) { spin_loop(); } if !self.acquired.swap(true, Ordering::SeqCst) { break 'lock; } } } #[inline] fn try_lock(&self) -> bool { self.acquired .compare_exchange_weak(false, true, Ordering::Acquire, Ordering::Relaxed) .is_ok() } #[inline] fn is_locked(&self) -> bool { self.acquired.load(Ordering::Acquire) } #[inline] fn unlock(&self) { self.acquired.store(false, Ordering::Release); } #[inline] fn try_unlock(&self) -> bool { self.acquired .compare_exchange_weak(true, false, Ordering::Acquire, Ordering::Relaxed) .is_ok() } } #[cfg(test)] mod test_ttas { use super::*; #[test] fn ttas_create_and_lock() { let ttas = TTas::new(42); let data = ttas.try_lock(); assert!(data.is_some()); assert_eq!(*data.unwrap(), 42); } #[test] fn mutual_exclusion() { let ttas = TTas::new(1); let data = ttas.try_lock(); assert!(data.is_some()); assert!(ttas.try_lock().is_none()); assert!(ttas.try_lock().is_none()); core::mem::drop(data); assert!(ttas.try_lock().is_some()); } #[test] fn three_locks() { let ttas1 = TTas::new(1); let ttas2 = TTas::new(2); let ttas3 = TTas::new(3); let data1 = ttas1.try_lock(); let data2 = ttas2.try_lock(); let data3 = ttas3.try_lock(); assert!(data1.is_some()); assert!(data2.is_some()); assert!(data3.is_some()); assert!(ttas1.try_lock().is_none()); assert!(ttas1.try_lock().is_none()); assert!(ttas2.try_lock().is_none()); assert!(ttas2.try_lock().is_none()); assert!(ttas3.try_lock().is_none()); assert!(ttas3.try_lock().is_none()); core::mem::drop(data3); assert!(ttas3.try_lock().is_some()); } }
rust
Apache-2.0
690d85eb4790caed0bb2c11faf2b2e3e526bbf09
2026-01-04T20:21:42.422655Z
false
vertexclique/lever
https://github.com/vertexclique/lever/blob/690d85eb4790caed0bb2c11faf2b2e3e526bbf09/tests/atomics.rs
tests/atomics.rs
#[test] fn atomic_box_data_race_regression_test() { let t = trybuild::TestCases::new(); t.compile_fail("tests/samples/atomic_box_data_race.rs"); }
rust
Apache-2.0
690d85eb4790caed0bb2c11faf2b2e3e526bbf09
2026-01-04T20:21:42.422655Z
false
vertexclique/lever
https://github.com/vertexclique/lever/blob/690d85eb4790caed0bb2c11faf2b2e3e526bbf09/tests/lotable_cc.rs
tests/lotable_cc.rs
use lever::table::prelude::*; use std::sync::Arc; #[test] fn lotable_concurrent() { let lotable = { let table: LOTable<String, u64> = LOTable::new(); table.insert("data".into(), 1_u64); Arc::new(table) }; let mut threads = vec![]; for thread_no in 0..100 { let lotable = lotable.clone(); let t = std::thread::Builder::new() .name(format!("t_{}", thread_no)) .spawn(move || { if thread_no % 2 == 0 { // Reader threads let _data = lotable.get(&"data".to_string()); } else { // Writer threads let data = lotable.get(&"data".to_string()).unwrap(); lotable.insert("data".into(), data + 1); } }) .unwrap(); threads.push(t); } for t in threads.into_iter() { t.join().unwrap(); } }
rust
Apache-2.0
690d85eb4790caed0bb2c11faf2b2e3e526bbf09
2026-01-04T20:21:42.422655Z
false
vertexclique/lever
https://github.com/vertexclique/lever/blob/690d85eb4790caed0bb2c11faf2b2e3e526bbf09/tests/samples/atomic_box_data_race.rs
tests/samples/atomic_box_data_race.rs
use lever::sync::atomics::AtomicBox; use crossbeam_utils::thread; use std::cell::Cell; #[derive(Debug, Clone, Copy)] enum RefOrInt<'a> { Ref(&'a u64), Int(u64), } static SOME_INT: u64 = 123; // https://github.com/vertexclique/lever/issues/15#issue-740069651 // Run this one in release mode for it to fail fn main() { let cell = Cell::new(RefOrInt::Ref(&SOME_INT)); let atomic_box = AtomicBox::new(&cell); thread::scope(|s| { s.spawn(move |_| { let smuggled_cell = atomic_box.get(); loop { // Repeatedly write Ref(&addr) and Int(0xdeadbeef) into the cell. smuggled_cell.set(RefOrInt::Ref(&SOME_INT)); smuggled_cell.set(RefOrInt::Int(0xdeadbeef)); } }); loop { if let RefOrInt::Ref(addr) = cell.get() { // Hope that between the time we pattern match the object as a // `Ref`, it gets written to by the other thread. if addr as *const u64 == &SOME_INT as *const u64 { continue; } // Due to the data race, obtaining Ref(0xdeadbeef) is possible println!("Pointer is now: {:p}", addr); println!("Dereferencing addr will now segfault: {}", *addr); } } }); }
rust
Apache-2.0
690d85eb4790caed0bb2c11faf2b2e3e526bbf09
2026-01-04T20:21:42.422655Z
false
vertexclique/lever
https://github.com/vertexclique/lever/blob/690d85eb4790caed0bb2c11faf2b2e3e526bbf09/benches/read_parameterized_benches.rs
benches/read_parameterized_benches.rs
use criterion::{criterion_group, criterion_main, BenchmarkId, Criterion, Throughput}; use lever::table::prelude::*; use std::sync::Arc; const MAX_THREADS: usize = 8; const OP_RANGES: &'static [usize] = &[100, 300, 500, 700, 1000, 3000, 5000]; fn pure_read(lotable: Arc<LOTable<String, u64>>, key: String, op_count: usize) { (0..op_count).into_iter().for_each(|_| { let _ = lotable.get(&key); }) } fn bench_pure_reads(c: &mut Criterion) { let lotable: Arc<LOTable<String, u64>> = Arc::new(LOTable::new()); let key: String = "CORE".into(); let _ = lotable.insert(key.clone(), 123_456); let mut group = c.benchmark_group("parameterized_read"); (1..MAX_THREADS).for_each(|tid| { for ops in OP_RANGES { group.throughput(Throughput::Elements((tid * *ops) as u64)); group.bench_with_input(BenchmarkId::new(format!("{}", tid), ops), ops, |b, &i| { let pool = rayon::ThreadPoolBuilder::new() .num_threads(tid) .build() .unwrap(); pool.install(|| b.iter(|| pure_read(lotable.clone(), key.clone(), i))); }); } }); } //////////////////////////////// // // fn rw_pareto(lotable: Arc<LOTable<String, u64>>, key: String, dist: f64, thread_count: u64) { // let mut threads = vec![]; // // for thread_no in 0..thread_count { // let lotable = lotable.clone(); // let key = key.clone(); // // let t = std::thread::Builder::new() // .name(format!("t_{}", thread_no)) // .spawn(move || { // if dist < 0.8_f64 { // lotable.get(&key); // } else { // let data = lotable.get(&key).unwrap(); // let _ = lotable.insert(key, data + 1); // } // }) // .unwrap(); // // threads.push(t); // } // // for t in threads.into_iter() { // t.join().unwrap(); // } // } // // fn bench_rw_pareto(c: &mut Criterion) { // let lotable = { // let table: LOTable<String, u64> = LOTable::new(); // table.insert("data".into(), 1_u64); // Arc::new(table) // }; // let key: String = "CORE".into(); // let _ = lotable.insert(key.clone(), 123_456); // // let threads = 8; // // let mut group = c.benchmark_group("lotable_threaded_join_rw_pareto_throughput"); // group.throughput(Throughput::Elements(threads as u64)); // group.bench_function("rw_pareto", move |b| { // b.iter_batched( // || { // let dist: f64 = // 1. / thread_rng().sample(Pareto::new(1., 5.0_f64.log(4.0_f64)).unwrap()); // (lotable.clone(), key.clone(), dist) // }, // |vars| rw_pareto(vars.0, vars.1, vars.2, threads), // BatchSize::SmallInput, // ) // }); // } // // //////////////////////////////// // // fn pure_writes(lotable: Arc<LOTable<String, u64>>, key: String, thread_count: u64) { // let mut threads = vec![]; // // for thread_no in 0..thread_count { // let lotable = lotable.clone(); // let key = key.clone(); // // let t = std::thread::Builder::new() // .name(format!("t_{}", thread_no)) // .spawn(move || { // let _ = lotable.insert(key, thread_no); // }) // .unwrap(); // // threads.push(t); // } // // for t in threads.into_iter() { // t.join().unwrap(); // } // } // // fn bench_lotable_pure_writes(c: &mut Criterion) { // let lotable = { // let table: LOTable<String, u64> = LOTable::new(); // table.insert("data".into(), 1_u64); // Arc::new(table) // }; // let key: String = "CORE".into(); // let _ = lotable.insert(key.clone(), 123_456); // // let threads = 8; // // let mut group = c.benchmark_group("lotable_threaded_join_write_throughput"); // group.throughput(Throughput::Elements(threads as u64)); // group.bench_function("pure writes", move |b| { // b.iter_batched( // || (lotable.clone(), key.clone()), // |vars| pure_writes(vars.0, vars.1, threads), // BatchSize::SmallInput, // ) // }); // } criterion_group! { name = parameterized_benches; config = Criterion::default(); targets = bench_pure_reads // targets = bench_pure_reads, bench_rw_pareto, bench_lotable_pure_writes } criterion_main!(parameterized_benches);
rust
Apache-2.0
690d85eb4790caed0bb2c11faf2b2e3e526bbf09
2026-01-04T20:21:42.422655Z
false
vertexclique/lever
https://github.com/vertexclique/lever/blob/690d85eb4790caed0bb2c11faf2b2e3e526bbf09/benches/arc_rwlock_benches.rs
benches/arc_rwlock_benches.rs
use criterion::{criterion_group, criterion_main, BatchSize, Criterion, Throughput}; use rand::prelude::*; use rand_distr::Pareto; use std::collections::HashMap; use std::sync::{Arc, RwLock}; fn pure_read(lotable: Arc<RwLock<HashMap<String, u64>>>, key: String, thread_count: u64) { let mut threads = vec![]; for thread_no in 0..thread_count { let lotable = lotable.clone(); let key = key.clone(); let t = std::thread::Builder::new() .name(format!("t_{}", thread_no)) .spawn(move || { let loguard = lotable.read().unwrap(); loguard.get(&key); // if let Ok(loguard) = lotable.read() { // loguard.get(&key); // } }) .unwrap(); threads.push(t); } for t in threads.into_iter() { t.join().unwrap(); } } fn bench_arc_rwlock_pure_reads(c: &mut Criterion) { let lotable = { let mut table: HashMap<String, u64> = HashMap::new(); table.insert("data".into(), 1_u64); Arc::new(RwLock::new(table)) }; let key: String = "CORE".into(); let threads = 8; let mut group = c.benchmark_group("arc_rwlock_read_throughput"); group.throughput(Throughput::Elements(threads as u64)); group.bench_function("pure reads", move |b| { b.iter_batched( || (lotable.clone(), key.clone()), |vars| pure_read(vars.0, vars.1, threads), BatchSize::SmallInput, ) }); } //////////////////////////////// fn rw_pareto( lotable: Arc<RwLock<HashMap<String, u64>>>, key: String, dist: f64, thread_count: u64, ) { let mut threads = vec![]; for thread_no in 0..thread_count { let lotable = lotable.clone(); let key = key.clone(); let t = std::thread::Builder::new() .name(format!("t_{}", thread_no)) .spawn(move || { if dist < 0.8_f64 { let loguard = lotable.read().unwrap(); loguard.get(&key); // if let Ok(loguard) = lotable.read() { // loguard.get(&key); // } } else { let loguard = lotable.read().unwrap(); let data: u64 = *loguard.get(&key).unwrap(); // if let Ok(loguard) = lotable.read() { // if let Some(datac) = loguard.get(&key) { // data = *datac; // } // } let mut loguard = lotable.write().unwrap(); loguard.insert(key, data + 1); // if let Ok(mut loguard) = lotable.write() { // loguard.insert(key, data + 1); // } } }) .unwrap(); threads.push(t); } for t in threads.into_iter() { t.join().unwrap(); } } fn bench_arc_rwlock_rw_pareto(c: &mut Criterion) { let lotable = { let mut table: HashMap<String, u64> = HashMap::new(); table.insert("data".into(), 1_u64); Arc::new(RwLock::new(table)) }; let key: String = "CORE".into(); let threads = 8; let mut group = c.benchmark_group("arc_rwlock_rw_pareto_throughput"); group.throughput(Throughput::Elements(threads as u64)); group.bench_function("rw_pareto", move |b| { b.iter_batched( || { let dist: f64 = 1. / thread_rng().sample(Pareto::new(1., 5.0_f64.log(4.0_f64)).unwrap()); (lotable.clone(), key.clone(), dist) }, |vars| rw_pareto(vars.0, vars.1, vars.2, threads), BatchSize::SmallInput, ) }); } //////////////////////////////// fn pure_writes(lotable: Arc<RwLock<HashMap<String, u64>>>, key: String, thread_count: u64) { let mut threads = vec![]; for thread_no in 0..thread_count { let lotable = lotable.clone(); let key = key.clone(); let t = std::thread::Builder::new() .name(format!("t_{}", thread_no)) .spawn(move || { if let Ok(mut loguard) = lotable.write() { loguard.insert(key, thread_no); } }) .unwrap(); threads.push(t); } for t in threads.into_iter() { t.join().unwrap(); } } fn bench_arc_rwlock_pure_writes(c: &mut Criterion) { let lotable = { let mut table: HashMap<String, u64> = HashMap::new(); table.insert("data".into(), 1_u64); Arc::new(RwLock::new(table)) }; let key: String = "CORE".into(); let threads = 8; let mut group = c.benchmark_group("arc_rwlock_write_throughput"); group.throughput(Throughput::Elements(threads as u64)); group.bench_function("pure writes", move |b| { b.iter_batched( || (lotable.clone(), key.clone()), |vars| pure_writes(vars.0, vars.1, threads), BatchSize::SmallInput, ) }); } criterion_group! { name = arc_rwlock_benches; config = Criterion::default(); targets = bench_arc_rwlock_pure_reads, bench_arc_rwlock_rw_pareto, bench_arc_rwlock_pure_writes } criterion_main!(arc_rwlock_benches);
rust
Apache-2.0
690d85eb4790caed0bb2c11faf2b2e3e526bbf09
2026-01-04T20:21:42.422655Z
false
vertexclique/lever
https://github.com/vertexclique/lever/blob/690d85eb4790caed0bb2c11faf2b2e3e526bbf09/benches/zonemap_benches.rs
benches/zonemap_benches.rs
use criterion::{criterion_group, criterion_main, BatchSize, BenchmarkId, Criterion, Throughput}; use lever::index::zonemap::ZoneMap; fn bench_zonemap_selected(c: &mut Criterion) { c.bench_function("bench_unoptimized", move |b| { b.iter_batched( || { let customers: Vec<i32> = vec![vec![1, 0, -1, -2].repeat(500), vec![1, 2, 3, 4].repeat(250)].concat(); let ingestion_data = vec![("customers", customers.as_slice())]; (ZoneMap::from(ingestion_data), customers) }, |(zm, customers)| { let (l, r) = zm.scan_range("customers", 4, 4, &*customers); customers[l..=r].iter().filter(|x| **x >= 4).sum::<i32>() }, BatchSize::LargeInput, ) }); } fn bench_unoptimized(c: &mut Criterion) { c.bench_function("bench_zonemap_selected", move |b| { b.iter_batched( || { let customers: Vec<i32> = vec![vec![1, 0, -1, -2].repeat(500), vec![1, 2, 3, 4].repeat(250)].concat(); let _ingestion_data = vec![("customers", customers.as_slice())]; customers }, |data| { data.as_slice() .into_iter() .filter(|x| **x >= 4) .sum::<i32>() }, BatchSize::LargeInput, ) }); } criterion_group! { name = zonemap_benches; config = Criterion::default(); targets = bench_zonemap_selected, bench_unoptimized } criterion_main!(zonemap_benches);
rust
Apache-2.0
690d85eb4790caed0bb2c11faf2b2e3e526bbf09
2026-01-04T20:21:42.422655Z
false
vertexclique/lever
https://github.com/vertexclique/lever/blob/690d85eb4790caed0bb2c11faf2b2e3e526bbf09/benches/lotable_iter_benches.rs
benches/lotable_iter_benches.rs
use criterion::{criterion_group, criterion_main, BatchSize, Criterion, Throughput}; use lever::table::prelude::*; use rand::prelude::*; use rand_distr::Pareto; use rayon::prelude::*; use std::sync::Arc; const BATCH_SIZE: usize = 50; fn pure_read(lotable: Arc<LOTable<String, u64>>, key: String) { (0..BATCH_SIZE).into_par_iter().for_each(|_| { lotable.get(&key.clone()); }); } fn bench_lotable_pure_reads(c: &mut Criterion) { let lotable = { let table: LOTable<String, u64> = LOTable::new(); let _ = table.insert("data".into(), 1_u64); Arc::new(table) }; let key: String = "CORE".into(); let _ = lotable.insert(key.clone(), 123_456); let mut group = c.benchmark_group("lotable_iter_read_throughput"); group.throughput(Throughput::Elements(BATCH_SIZE as u64)); group.bench_function("pure reads", move |b| { b.iter_batched( || (lotable.clone(), key.clone()), |vars| pure_read(vars.0, vars.1), BatchSize::SmallInput, ) }); } fn rw_pareto(lotable: Arc<LOTable<String, u64>>, key: String, dist: f64) { (0..BATCH_SIZE).into_par_iter().for_each(|_| { if dist < 0.8_f64 { lotable.get(&key.clone()); } else { let data = lotable.get(&key).unwrap(); let _ = lotable.insert(key.clone(), data + 1); } }); } fn bench_lotable_rw_pareto(c: &mut Criterion) { let lotable = { let table: LOTable<String, u64> = LOTable::new(); let _ = table.insert("data".into(), 1_u64); Arc::new(table) }; let key: String = "CORE".into(); let _ = lotable.insert(key.clone(), 123_456); let mut group = c.benchmark_group("lotable_iter_rw_pareto_throughput"); group.throughput(Throughput::Elements(BATCH_SIZE as u64)); group.bench_function("rw_pareto", move |b| { b.iter_batched( || { let dist: f64 = 1. / thread_rng().sample(Pareto::new(1., 5.0_f64.log(4.0_f64)).unwrap()); (lotable.clone(), key.clone(), dist) }, |vars| rw_pareto(vars.0, vars.1, vars.2), BatchSize::SmallInput, ) }); } //////////////////////////////// fn pure_writes(lotable: Arc<LOTable<String, u64>>, key: String) { (0..BATCH_SIZE).into_par_iter().for_each(|i| { let _ = lotable.insert(key.clone(), i as u64); }); } fn bench_lotable_pure_writes(c: &mut Criterion) { let lotable = { let table: LOTable<String, u64> = LOTable::new(); let _ = table.insert("data".into(), 1_u64); Arc::new(table) }; let key: String = "CORE".into(); let _ = lotable.insert(key.clone(), 123_456); let mut group = c.benchmark_group("lotable_iter_write_throughput"); group.throughput(Throughput::Elements(BATCH_SIZE as u64)); group.bench_function("pure writes", move |b| { b.iter_batched( || (lotable.clone(), key.clone()), |vars| pure_writes(vars.0, vars.1), BatchSize::SmallInput, ) }); } criterion_group! { name = lotable_iter_benches; config = Criterion::default(); targets = bench_lotable_pure_reads, bench_lotable_rw_pareto, bench_lotable_pure_writes } criterion_main!(lotable_iter_benches);
rust
Apache-2.0
690d85eb4790caed0bb2c11faf2b2e3e526bbf09
2026-01-04T20:21:42.422655Z
false
vertexclique/lever
https://github.com/vertexclique/lever/blob/690d85eb4790caed0bb2c11faf2b2e3e526bbf09/benches/lotable_threaded_join_benches.rs
benches/lotable_threaded_join_benches.rs
use criterion::{criterion_group, criterion_main, BatchSize, Criterion, Throughput}; use lever::table::prelude::*; use rand::prelude::*; use rand_distr::Pareto; use std::sync::Arc; fn pure_read(lotable: Arc<LOTable<String, u64>>, key: String, thread_count: u64) { let mut threads = vec![]; for thread_no in 0..thread_count { let lotable = lotable.clone(); let key = key.clone(); let t = std::thread::Builder::new() .name(format!("t_{}", thread_no)) .spawn(move || lotable.get(&key)) .unwrap(); threads.push(t); } for t in threads.into_iter() { t.join().unwrap(); } } fn bench_lotable_pure_reads(c: &mut Criterion) { let lotable = { let table: LOTable<String, u64> = LOTable::new(); let _ = table.insert("data".into(), 1_u64); Arc::new(table) }; let key: String = "CORE".into(); let _ = lotable.insert(key.clone(), 123_456); let threads = 8; let mut group = c.benchmark_group("lotable_threaded_join_read_throughput"); group.throughput(Throughput::Elements(threads as u64)); group.bench_function("pure reads", move |b| { b.iter_batched( || (lotable.clone(), key.clone()), |vars| pure_read(vars.0, vars.1, threads), BatchSize::SmallInput, ) }); } //////////////////////////////// fn rw_pareto(lotable: Arc<LOTable<String, u64>>, key: String, dist: f64, thread_count: u64) { let mut threads = vec![]; for thread_no in 0..thread_count { let lotable = lotable.clone(); let key = key.clone(); let t = std::thread::Builder::new() .name(format!("t_{}", thread_no)) .spawn(move || { if dist < 0.8_f64 { lotable.get(&key); } else { let data = lotable.get(&key).unwrap(); let _ = lotable.insert(key, data + 1); } }) .unwrap(); threads.push(t); } for t in threads.into_iter() { t.join().unwrap(); } } fn bench_lotable_rw_pareto(c: &mut Criterion) { let lotable = { let table: LOTable<String, u64> = LOTable::new(); let _ = table.insert("data".into(), 1_u64); Arc::new(table) }; let key: String = "CORE".into(); let _ = lotable.insert(key.clone(), 123_456); let threads = 8; let mut group = c.benchmark_group("lotable_threaded_join_rw_pareto_throughput"); group.throughput(Throughput::Elements(threads as u64)); group.bench_function("rw_pareto", move |b| { b.iter_batched( || { let dist: f64 = 1. / thread_rng().sample(Pareto::new(1., 5.0_f64.log(4.0_f64)).unwrap()); (lotable.clone(), key.clone(), dist) }, |vars| rw_pareto(vars.0, vars.1, vars.2, threads), BatchSize::SmallInput, ) }); } //////////////////////////////// fn pure_writes(lotable: Arc<LOTable<String, u64>>, key: String, thread_count: u64) { let mut threads = vec![]; for thread_no in 0..thread_count { let lotable = lotable.clone(); let key = key.clone(); let t = std::thread::Builder::new() .name(format!("t_{}", thread_no)) .spawn(move || { let _ = lotable.insert(key, thread_no); }) .unwrap(); threads.push(t); } for t in threads.into_iter() { t.join().unwrap(); } } fn bench_lotable_pure_writes(c: &mut Criterion) { let lotable = { let table: LOTable<String, u64> = LOTable::new(); let _ = table.insert("data".into(), 1_u64); Arc::new(table) }; let key: String = "CORE".into(); let _ = lotable.insert(key.clone(), 123_456); let threads = 8; let mut group = c.benchmark_group("lotable_threaded_join_write_throughput"); group.throughput(Throughput::Elements(threads as u64)); group.bench_function("pure writes", move |b| { b.iter_batched( || (lotable.clone(), key.clone()), |vars| pure_writes(vars.0, vars.1, threads), BatchSize::SmallInput, ) }); } criterion_group! { name = lotable_threaded_join_benches; config = Criterion::default(); targets = bench_lotable_pure_reads, bench_lotable_rw_pareto, bench_lotable_pure_writes } criterion_main!(lotable_threaded_join_benches);
rust
Apache-2.0
690d85eb4790caed0bb2c11faf2b2e3e526bbf09
2026-01-04T20:21:42.422655Z
false
vertexclique/lever
https://github.com/vertexclique/lever/blob/690d85eb4790caed0bb2c11faf2b2e3e526bbf09/benches/op_ser_benches.rs
benches/op_ser_benches.rs
use criterion::{criterion_group, criterion_main, BatchSize, Criterion}; use lever::table::ltable::LTable; use lever::txn::prelude::*; use rand::prelude::*; use rand_distr::Pareto; fn pure_read(txn: Txn, tvar: TVar<LTable<String, String>>) -> LTable<String, String> { let res = txn.begin(|t: &mut Txn| t.read(&tvar)); res.unwrap() } fn bench_pure_reads(c: &mut Criterion) { let mut ltable = LTable::<String, String>::create("pure_reads".to_owned()); ltable.insert("Interstellar".into(), "Gravity".into()); let txn = TxnManager::manager().txn_build( TransactionConcurrency::Optimistic, TransactionIsolation::Serializable, 100_usize, 1_usize, "pure_reads".into(), ); c.bench_function("pure_reads", move |b| { b.iter_batched( || { let tvar = TVar::new(ltable.clone()); tvar }, |tvar| pure_read(txn.clone(), tvar), BatchSize::SmallInput, ) }); } fn rw_pareto(txn: Txn, mut vars: (f64, TVar<LTable<String, String>>)) { if vars.0 < 0.8_f64 { txn.begin(|t: &mut Txn| { t.read(&vars.1); }); } else { txn.begin(|t: &mut Txn| { let mut x = t.read(&vars.1); x.insert("RoboCop".into(), "Annihilation".into()); t.write(&mut vars.1, x.clone()); }); } } fn bench_rw_pareto(c: &mut Criterion) { let mut ltable = LTable::<String, String>::create("rw_pareto".to_owned()); ltable.insert("Interstellar".into(), "Gravity".into()); let txn = TxnManager::manager().txn_build( TransactionConcurrency::Optimistic, TransactionIsolation::Serializable, 100_usize, 1_usize, "rw_pareto".into(), ); c.bench_function("rw_pareto", move |b| { b.iter_batched( || { let tvar = TVar::new(ltable.clone()); let dist: f64 = 1. / thread_rng().sample(Pareto::new(1., 5.0_f64.log(4.0_f64)).unwrap()); (dist, tvar) }, |vars| rw_pareto(txn.clone(), vars), BatchSize::SmallInput, ) }); } fn pure_write(txn: Txn, mut vars: TVar<LTable<String, String>>) { txn.begin(|t: &mut Txn| { let mut x = t.read(&vars); x.insert("RoboCop".into(), "Annihilation".into()); t.write(&mut vars, x.clone()); }); } fn bench_pure_write(c: &mut Criterion) { let mut ltable = LTable::<String, String>::create("pure_writes".to_owned()); ltable.insert("Interstellar".into(), "Gravity".into()); let txn = TxnManager::manager().txn_build( TransactionConcurrency::Optimistic, TransactionIsolation::Serializable, 100_usize, 1_usize, "pure_write".into(), ); c.bench_function("pure_writes", move |b| { b.iter_batched( || { let tvar = TVar::new(ltable.clone()); tvar }, |tvar| pure_write(txn.clone(), tvar), BatchSize::SmallInput, ) }); } criterion_group! { name = op_ser_benches; config = Criterion::default(); targets = bench_pure_reads, bench_rw_pareto, bench_pure_write } criterion_main!(op_ser_benches);
rust
Apache-2.0
690d85eb4790caed0bb2c11faf2b2e3e526bbf09
2026-01-04T20:21:42.422655Z
false
vertexclique/lever
https://github.com/vertexclique/lever/blob/690d85eb4790caed0bb2c11faf2b2e3e526bbf09/benches/cuckoo_benches/src/main.rs
benches/cuckoo_benches/src/main.rs
use bustle::*; use std::collections::HashMap; use std::sync::RwLock; use lever::prelude::*; use std::hash::Hash; // RwLock Table #[derive(Clone)] struct RwLockTable<K>(std::sync::Arc<RwLock<HashMap<K, u64>>>); impl<K> Collection for RwLockTable<K> where K: Send + Sync + From<u64> + Copy + 'static + std::hash::Hash + Eq + std::fmt::Debug, { type Handle = Self; fn with_capacity(capacity: usize) -> Self { Self(std::sync::Arc::new(RwLock::new(HashMap::with_capacity( capacity, )))) } fn pin(&self) -> Self::Handle { self.clone() } } impl<K> CollectionHandle for RwLockTable<K> where K: Send + Sync + From<u64> + Copy + 'static + std::hash::Hash + Eq + std::fmt::Debug, { type Key = K; fn get(&mut self, key: &Self::Key) -> bool { self.0.read().unwrap().get(key).is_some() } fn insert(&mut self, key: &Self::Key) -> bool { self.0.write().unwrap().insert(*key, 1).is_none() } fn remove(&mut self, key: &Self::Key) -> bool { self.0.write().unwrap().remove(key).is_some() } fn update(&mut self, key: &Self::Key) -> bool { use std::collections::hash_map::Entry; let mut map = self.0.write().unwrap(); if let Entry::Occupied(mut e) = map.entry(*key) { e.insert(1); true } else { false } } } // LOTable #[derive(Clone)] struct LOBenchTable<K>(std::sync::Arc<LOTable<K, u64>>) where K: 'static + Send + Sync + Clone + Hash + Eq + Ord; impl<K> Collection for LOBenchTable<K> where K: Send + Sync + From<u64> + Copy + 'static + std::hash::Hash + Eq + std::fmt::Debug + Ord, { type Handle = Self; fn with_capacity(capacity: usize) -> Self { Self(std::sync::Arc::new(LOTable::with_capacity(capacity))) } fn pin(&self) -> Self::Handle { self.clone() } } impl<K> CollectionHandle for LOBenchTable<K> where K: Send + Sync + From<u64> + Copy + 'static + std::hash::Hash + Eq + std::fmt::Debug + Ord, { type Key = K; fn get(&mut self, key: &Self::Key) -> bool { self.0.get(key).is_some() } fn insert(&mut self, key: &Self::Key) -> bool { self.0.insert(*key, 1).map(|x| x.is_none()).unwrap() } fn remove(&mut self, key: &Self::Key) -> bool { self.0.remove(key).map(|x| x.is_some()).unwrap() } fn update(&mut self, key: &Self::Key) -> bool { if let Some(_x) = self.0.get(key) { let _ = self.0.insert(*key, 1); true } else { false } } } #[derive(Clone)] struct HOPBenchTable<K>(std::sync::Arc<HOPTable<K, u64>>) where K: 'static + Send + Sync + Clone + Hash + Eq + Ord + std::fmt::Debug; impl<K> Collection for HOPBenchTable<K> where K: Send + Sync + From<u64> + Copy + 'static + std::hash::Hash + Eq + std::fmt::Debug + Ord, { type Handle = Self; fn with_capacity(capacity: usize) -> Self { Self(std::sync::Arc::new(HOPTable::with_capacity(capacity))) } fn pin(&self) -> Self::Handle { self.clone() } } impl<K> CollectionHandle for HOPBenchTable<K> where K: Send + Sync + From<u64> + Copy + 'static + std::hash::Hash + Eq + std::fmt::Debug + Ord, { type Key = K; fn get(&mut self, key: &Self::Key) -> bool { self.0.get(key).is_some() } fn insert(&mut self, key: &Self::Key) -> bool { self.0.insert(*key, 1).map(|x| x.is_some()).unwrap() } fn remove(&mut self, key: &Self::Key) -> bool { self.0.remove(key).map(|x| x.is_some()).unwrap() } fn update(&mut self, key: &Self::Key) -> bool { if let Some(_x) = self.0.get(key) { let _ = self.0.insert(*key, 1); true } else { false } } } fn main() { tracing_subscriber::fmt::init(); // let num_threads = num_cpus::get(); let num_threads = 8; println!("=========== RwLock ============="); // Workload::new(10, Mix::read_heavy()).run::<RwLockTable<u64>>(); for n in 1..=num_threads { Workload::new(n, Mix::read_heavy()).run::<RwLockTable<u64>>(); } println!("=========== LOTable ============="); // for n in 1..=num_threads { // Workload::new(n, Mix::read_heavy()).run::<LOBenchTable<u64>>(); // } println!("=========== HOPTable ============="); // Workload::new(8, Mix::read_heavy()).run::<HOPBenchTable<u64>>(); for n in 1..=num_threads { Workload::new(n, Mix::read_heavy()).run::<HOPBenchTable<u64>>(); } }
rust
Apache-2.0
690d85eb4790caed0bb2c11faf2b2e3e526bbf09
2026-01-04T20:21:42.422655Z
false
vertexclique/lever
https://github.com/vertexclique/lever/blob/690d85eb4790caed0bb2c11faf2b2e3e526bbf09/examples/arc_rwlock.rs
examples/arc_rwlock.rs
use std::collections::HashMap; use std::sync::{Arc, RwLock}; fn main() { let lotable: Arc<RwLock<HashMap<String, u64>>> = Arc::new(RwLock::new(HashMap::default())); // RW from 1_000 threads concurrently. let thread_count = 8; let mut threads = vec![]; for thread_no in 0..thread_count { let lotable = lotable.clone(); let t = std::thread::Builder::new() .name(format!("t_{}", thread_no)) .spawn(move || { let key = format!("{}", thread_no); let mut loguard = lotable.write().unwrap(); loguard.insert(key.clone(), thread_no); drop(loguard); let loguard = lotable.read().unwrap(); let _ = loguard.get(&key).unwrap(); }) .unwrap(); threads.push(t); } for t in threads.into_iter() { t.join().unwrap(); } }
rust
Apache-2.0
690d85eb4790caed0bb2c11faf2b2e3e526bbf09
2026-01-04T20:21:42.422655Z
false
vertexclique/lever
https://github.com/vertexclique/lever/blob/690d85eb4790caed0bb2c11faf2b2e3e526bbf09/examples/basic_txn.rs
examples/basic_txn.rs
use lever::txn::prelude::*; fn main() { let manager = lever::lever().manager(); let txn = manager.txn_build( // Select concurrency scheme TransactionConcurrency::Optimistic, // Select isolation scheme TransactionIsolation::RepeatableRead, // Give timeout for transaction conflict resolution in milliseconds 100_usize, // Work element size inside the given transaction 1_usize, // Name of the transaction "basic_txn".into(), ); let mut customers = TVar::new(123_456); println!("I have {} customers right now.", customers.get_data()); txn.begin(|t| { let mut churned = t.read(&customers); churned += 1; t.write(&mut customers, churned); }); println!( "I have {} customers right now. I gained 1.", customers.get_data() ); // You don't necessarily need to use convenience methods. txn.begin(|t| { let mut churned = *customers; churned -= 123_000; t.write(&mut customers, churned); }); println!( "I have {} customers right now. I think I lost a lot.", customers.get_data() ); }
rust
Apache-2.0
690d85eb4790caed0bb2c11faf2b2e3e526bbf09
2026-01-04T20:21:42.422655Z
false
vertexclique/lever
https://github.com/vertexclique/lever/blob/690d85eb4790caed0bb2c11faf2b2e3e526bbf09/examples/lotable.rs
examples/lotable.rs
use lever::prelude::*; use std::sync::Arc; fn main() { let lotable: Arc<LOTable<String, u64>> = Arc::new(LOTable::new()); // RW from 1_000 threads concurrently. let thread_count = 8; let mut threads = vec![]; for thread_no in 0..thread_count { let lotable = lotable.clone(); let t = std::thread::Builder::new() .name(format!("t_{}", thread_no)) .spawn(move || { let key = format!("{}", thread_no); lotable.insert(key.clone(), thread_no); let _ = lotable.get(&key).unwrap(); }) .unwrap(); threads.push(t); } for t in threads.into_iter() { t.join().unwrap(); } }
rust
Apache-2.0
690d85eb4790caed0bb2c11faf2b2e3e526bbf09
2026-01-04T20:21:42.422655Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/xdb/src/ip_value.rs
xdb/src/ip_value.rs
use std::{error::Error, net::Ipv4Addr, str::FromStr}; pub trait ToUIntIP { fn to_u32_ip(&self) -> Result<u32, Box<dyn Error>>; } impl ToUIntIP for u32 { #[inline(always)] fn to_u32_ip(&self) -> Result<u32, Box<dyn Error>> { Ok(*self) } } impl ToUIntIP for &str { #[inline(always)] fn to_u32_ip(&self) -> Result<u32, Box<dyn Error>> { if let Ok(num) = self.parse::<u32>() { return Ok(num); } Ok(u32::from(Ipv4Addr::from_str(self)?)) } } impl ToUIntIP for Ipv4Addr { #[inline(always)] fn to_u32_ip(&self) -> Result<u32, Box<dyn Error>> { Ok(u32::from(*self)) } } #[cfg(test)] mod test_ip { use super::*; #[test] fn test_ip_str_2_u32() { let ip_str = "1.1.1.1"; let result = ip_str.to_u32_ip().unwrap(); assert_eq!(result, 1 << 24 | 1 << 16 | 1 << 8 | 1); } #[test] fn test_ip_u32_str() { let ip = "12"; let result = ip.to_u32_ip().unwrap(); assert_eq!(result, 12); } #[test] fn test_ip_u32() { let ip: u32 = 33; let result = ip.to_u32_ip().unwrap(); assert_eq!(result, 33); } #[test] fn test_ip_addr() { let ip = Ipv4Addr::from_str("0.0.3.12").unwrap(); let result = ip.to_u32_ip().unwrap(); assert_eq!(result, 3 << 8 | 12) } }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/xdb/src/searcher.rs
xdb/src/searcher.rs
use std::{error::Error, fmt::Display, fs::File, io::Read, path::Path}; use once_cell::sync::OnceCell; use crate::ToUIntIP; const HEADER_INFO_LENGTH: usize = 256; const VECTOR_INDEX_COLS: usize = 256; const VECTOR_INDEX_SIZE: usize = 8; const SEGMENT_INDEX_SIZE: usize = 14; const VECTOR_INDEX_LENGTH: usize = 512 * 1024; const XDB_FILEPATH_ENV: &str = "XDB_FILEPATH"; // 只保留一个缓存,用于存储完整数据 static CACHE: OnceCell<Vec<u8>> = OnceCell::new(); // 添加专门的向量缓存 static VECTOR_CACHE: OnceCell<&'static [u8]> = OnceCell::new(); fn default_detect_xdb_file() -> Result<String, Box<dyn Error>> { let prefix = "../".to_owned(); for recurse in 1..4 { let filepath = prefix.repeat(recurse) + "server/resources/ip2region.xdb"; if Path::new(&filepath).exists() { return Ok(filepath); } } Err("default filepath not find the xdb file".into()) } #[inline(always)] pub fn get_block_by_size(bytes: &[u8], offset: usize, length: usize) -> usize { unsafe { let ptr = bytes.as_ptr().add(offset); match length { 4 => { let mut buf = [0u8; 4]; std::ptr::copy_nonoverlapping(ptr, buf.as_mut_ptr(), 4); u32::from_ne_bytes(buf) as usize }, 2 => { let mut buf = [0u8; 2]; std::ptr::copy_nonoverlapping(ptr, buf.as_mut_ptr(), 2); u16::from_ne_bytes(buf) as usize }, _ => { let mut result = 0usize; std::ptr::copy_nonoverlapping(ptr, &mut result as *mut usize as *mut u8, length); result }, } } } #[inline(always)] pub fn search_by_ip<T>(ip: T) -> Result<String, Box<dyn Error>> where T: ToUIntIP + Display, { let ip = ip.to_u32_ip()?; unsafe { let vector_cache = get_vector_index_cache(); let offset = VECTOR_INDEX_SIZE * ((((ip >> 24) & 0xFF) as usize) * VECTOR_INDEX_COLS + ((ip >> 16) & 0xFF) as usize); // 使用 get_block_by_size 来安全地读取数据 let start_ptr = get_block_by_size(vector_cache, offset, 4); let end_ptr = get_block_by_size(vector_cache, offset + 4, 4); let full_cache = get_full_cache(); let cache_ptr = full_cache.as_ptr().add(start_ptr); let mut left = 0; let mut right = (end_ptr - start_ptr) / SEGMENT_INDEX_SIZE; while left < right { let mid = (left + right) >> 1; let segment_offset = mid * SEGMENT_INDEX_SIZE; let _segment_ptr = cache_ptr.add(segment_offset); // 使用 get_block_by_size 读取所有数据 let start_ip = get_block_by_size(full_cache, start_ptr + segment_offset, 4) as u32; if ip < start_ip { right = mid; continue; } let end_ip = get_block_by_size(full_cache, start_ptr + segment_offset + 4, 4) as u32; if ip > end_ip { left = mid + 1; continue; } let data_len = get_block_by_size(full_cache, start_ptr + segment_offset + 8, 2); let data_offset = get_block_by_size(full_cache, start_ptr + segment_offset + 10, 4); let data = std::slice::from_raw_parts(full_cache.as_ptr().add(data_offset), data_len); return Ok(String::from_utf8_unchecked(data.to_vec())); } Err("not matched".into()) } } // 优化向量索引缓存访问 #[inline(always)] pub fn get_vector_index_cache() -> &'static [u8] { // 使用静态缓存,只计算一次 VECTOR_CACHE.get_or_init(|| unsafe { let full_cache = get_full_cache(); let ptr = full_cache.as_ptr().add(HEADER_INFO_LENGTH); std::slice::from_raw_parts(ptr, VECTOR_INDEX_LENGTH) }) } #[inline(always)] pub fn get_full_cache() -> &'static Vec<u8> { CACHE.get_or_init(|| { let xdb_filepath = std::env::var(XDB_FILEPATH_ENV).unwrap_or_else(|_| default_detect_xdb_file().unwrap()); let size = std::fs::metadata(&xdb_filepath) .map(|m| m.len() as usize) .unwrap_or(1024 * 1024); let mut buffer = Vec::with_capacity(size); File::open(&xdb_filepath) .expect("file open error") .read_to_end(&mut buffer) .expect("load file error"); buffer }) } pub fn searcher_init(xdb_filepath: Option<String>) { let xdb_filepath = xdb_filepath.unwrap_or_else(|| default_detect_xdb_file().unwrap()); std::env::set_var(XDB_FILEPATH_ENV, xdb_filepath); // 初始化并预热两个缓存 let _ = get_full_cache(); let _ = get_vector_index_cache(); } #[cfg(test)] mod tests { use std::{fs::File, io::Read, net::Ipv4Addr, str::FromStr, thread}; use super::*; /// test all types find correct #[test] fn test_multi_type_ip() { searcher_init(None); search_by_ip("2.0.0.0").unwrap(); search_by_ip("32").unwrap(); search_by_ip(4294408949).unwrap(); search_by_ip(Ipv4Addr::from_str("1.1.1.1").unwrap()).unwrap(); } #[test] fn test_match_all_ip_correct() { searcher_init(None); let mut file = File::open("../server/resources/ip.test.txt").unwrap(); let mut contents = String::new(); file.read_to_string(&mut contents).unwrap(); for line in contents.split("\n") { if !line.contains("|") { continue; } let ip_test_line = line.splitn(3, "|").collect::<Vec<&str>>(); let start_ip = Ipv4Addr::from_str(ip_test_line[0]).unwrap(); let end_ip = Ipv4Addr::from_str(ip_test_line[1]).unwrap(); for value in u32::from(start_ip)..u32::from(end_ip) + 1 { let result = search_by_ip(value).unwrap(); assert_eq!(result.as_str(), ip_test_line[2]) } } } #[test] fn test_multi_thread_only_load_xdb_once() { searcher_init(None); let handle = thread::spawn(|| { let result = search_by_ip("2.2.2.2").unwrap(); println!("ip search in spawn: {result}"); }); let r = search_by_ip("1.1.1.1").unwrap(); println!("ip search in main thread: {r}"); handle.join().unwrap(); } #[test] fn test_multi_searcher_init() { for _ in 0..5 { thread::spawn(|| { searcher_init(None); }); } searcher_init(None); searcher_init(Some(String::from("test"))); search_by_ip(123).unwrap(); } }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/xdb/src/lib.rs
xdb/src/lib.rs
mod ip_value; pub use self::ip_value::ToUIntIP; pub mod searcher; pub use searcher::{search_by_ip, searcher_init};
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/xdb/benches/search.rs
xdb/benches/search.rs
use criterion::{black_box, criterion_group, criterion_main, Criterion}; use rand; use xdb::searcher::{ get_block_by_size, get_full_cache, get_vector_index_cache, search_by_ip, searcher_init, }; fn search_by_ip_bench(c: &mut Criterion) { c.bench_function("search_by_ip_bench", |b| { searcher_init(None); b.iter(|| { search_by_ip(rand::random::<u32>()).unwrap(); }) }); } fn get_block_by_size_bench(c: &mut Criterion) { c.bench_function("get_block_by_size_bench", |b| { b.iter(|| { black_box(get_block_by_size( get_full_cache(), rand::random::<u16>() as usize, 4, )); }) }); } fn get_full_cache_bench(c: &mut Criterion) { c.bench_function("get_full_cache_bench", |b| { b.iter(|| { black_box(get_full_cache()); }) }); } fn get_vec_index_cache_bench(c: &mut Criterion) { c.bench_function("get_vec_index_cache_bench", |b| { b.iter(|| { black_box(get_vector_index_cache()); }) }); } criterion_group!( benches, search_by_ip_bench, get_block_by_size_bench, get_full_cache_bench, get_vec_index_cache_bench, ); criterion_main!(benches);
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/sea-orm-adapter/src/lib.rs
sea-orm-adapter/src/lib.rs
pub use adapter::SeaOrmAdapter; pub use migration::{down, up}; mod action; mod adapter; pub mod entity; mod migration;
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/sea-orm-adapter/src/entity.rs
sea-orm-adapter/src/entity.rs
//! `SeaORM` Entity. Generated by sea-orm-codegen 0.12.15 use sea_orm::entity::prelude::*; #[derive(Clone, Debug, PartialEq, DeriveEntityModel, Eq)] #[sea_orm(table_name = "casbin_rule")] pub struct Model { #[sea_orm(primary_key)] pub id: i64, pub ptype: String, pub v0: String, pub v1: String, pub v2: String, pub v3: String, pub v4: String, pub v5: String, } #[derive(Copy, Clone, Debug, EnumIter, DeriveRelation)] pub enum Relation {} impl ActiveModelBehavior for ActiveModel {}
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/sea-orm-adapter/src/adapter.rs
sea-orm-adapter/src/adapter.rs
use async_trait::async_trait; use casbin::{error::AdapterError, Adapter, Error as CasbinError, Filter, Model, Result}; use sea_orm::ConnectionTrait; use crate::{ action::{self, Rule, RuleWithType}, entity, migration, }; pub struct SeaOrmAdapter<C> { conn: C, is_filtered: bool, } impl<C: ConnectionTrait> SeaOrmAdapter<C> { pub async fn new(conn: C) -> Result<Self> { migration::up(&conn) .await .map(|_| Self { conn, is_filtered: false, }) .map_err(|err| CasbinError::from(AdapterError(Box::new(err)))) } } impl<C> SeaOrmAdapter<C> { fn transform_policy_line<'a>(ptype: &'a str, rule: &'a [String]) -> Option<RuleWithType<'a>> { if ptype.trim().is_empty() || rule.is_empty() { return None; } Some(RuleWithType::from_rule(ptype, Rule::from_slice(rule))) } fn normalize_policy(model: &entity::Model) -> Option<Vec<String>> { let policy: Vec<_> = [ &model.v0, &model.v1, &model.v2, &model.v3, &model.v4, &model.v5, ] .iter() .take_while(|&&v| !v.is_empty()) .map(|&s| s.to_owned()) .collect(); if policy.is_empty() { None } else { Some(policy) } } } #[async_trait] impl<C: ConnectionTrait + Send + Sync> Adapter for SeaOrmAdapter<C> { async fn load_policy(&mut self, m: &mut dyn Model) -> Result<()> { let rules = action::load_policy(&self.conn).await?; for rule in &rules { if let Some(sec) = rule.ptype.chars().next().map(|x| x.to_string()) { if let Some(t1) = m.get_mut_model().get_mut(&sec) { if let Some(t2) = t1.get_mut(&rule.ptype) { if let Some(policy) = Self::normalize_policy(rule) { t2.get_mut_policy().insert(policy); } } } } } Ok(()) } async fn load_filtered_policy<'a>(&mut self, m: &mut dyn Model, f: Filter<'a>) -> Result<()> { let rules = action::load_filtered_policy(&self.conn, f).await?; self.is_filtered = true; for rule in &rules { if let Some(sec) = rule.ptype.chars().next().map(|x| x.to_string()) { if let Some(t1) = m.get_mut_model().get_mut(&sec) { if let Some(t2) = t1.get_mut(&rule.ptype) { if let Some(policy) = Self::normalize_policy(rule) { t2.get_mut_policy().insert(policy); } } } } } Ok(()) } async fn save_policy(&mut self, m: &mut dyn Model) -> Result<()> { let mut rules = Vec::new(); let mut process_policy_type = |ptype: &str| { if let Some(ast_map) = m.get_model().get(ptype) { for (ptype, ast) in ast_map { let new_rules = ast .get_policy() .iter() .filter_map(|x| Self::transform_policy_line(ptype, x)); rules.extend(new_rules); } } }; process_policy_type("p"); process_policy_type("g"); action::save_policies(&self.conn, rules).await } async fn clear_policy(&mut self) -> Result<()> { action::clear_policy(&self.conn).await } fn is_filtered(&self) -> bool { self.is_filtered } async fn add_policy(&mut self, _sec: &str, ptype: &str, rule: Vec<String>) -> Result<bool> { if let Some(rule_with_type) = Self::transform_policy_line(ptype, &rule) { action::add_policy(&self.conn, rule_with_type).await } else { Ok(false) } } async fn add_policies( &mut self, _sec: &str, ptype: &str, rules: Vec<Vec<String>>, ) -> Result<bool> { let rules: Vec<_> = rules .iter() .filter_map(|x| Self::transform_policy_line(ptype, x)) .collect(); if rules.is_empty() { return Ok(false); } action::add_policies(&self.conn, rules).await } async fn remove_policy(&mut self, _sec: &str, ptype: &str, rule: Vec<String>) -> Result<bool> { if let Some(rule_with_type) = Self::transform_policy_line(ptype, &rule) { action::remove_policy(&self.conn, rule_with_type).await } else { Ok(false) } } async fn remove_policies( &mut self, _sec: &str, ptype: &str, rules: Vec<Vec<String>>, ) -> Result<bool> { let rules: Vec<_> = rules .iter() .filter_map(|x| Self::transform_policy_line(ptype, x)) .collect(); if rules.is_empty() { return Ok(false); } action::remove_policies(&self.conn, rules).await } async fn remove_filtered_policy( &mut self, _sec: &str, ptype: &str, field_index: usize, field_values: Vec<String>, ) -> Result<bool> { if field_index <= 5 && !field_values.is_empty() && field_values.len() + field_index <= 6 { let rule = Rule::from_slice(&field_values); action::remove_filtered_policy(&self.conn, ptype, field_index, rule).await } else { Ok(false) } } } // Copy from https://github.com/casbin-rs/sqlx-adapter/blob/master/src/adapter.rs #[cfg(test)] mod tests { use std::time::Duration; use casbin::Adapter; use sea_orm::{ConnectOptions, Database}; use crate::adapter::SeaOrmAdapter; fn to_owned(v: Vec<&str>) -> Vec<String> { v.into_iter().map(|x| x.to_owned()).collect() } #[cfg_attr( any(feature = "runtime-tokio-native-tls", feature = "runtime-tokio-rustls"), tokio::test(flavor = "multi_thread") )] #[cfg_attr( any(feature = "runtime-actix-native-tls", feature = "runtime-actix-rustls"), actix_rt::test )] async fn test_adapter() { use casbin::prelude::*; let file_adapter = FileAdapter::new("examples/rbac_policy.csv"); let m = DefaultModel::from_file("examples/rbac_model.conf") .await .unwrap(); let mut e = Enforcer::new(m, file_adapter).await.unwrap(); let db_url = { #[cfg(feature = "postgres")] { "postgresql://soybean:soybean@123.@localhost:35432/soybean-admin-rust-backend" } #[cfg(feature = "mysql")] { "mysql://root:123456@localhost:3306/casbin" } #[cfg(feature = "sqlite")] { "sqlite:casbin.db" } }; let mut opt = ConnectOptions::new(db_url.to_owned()); opt.max_connections(100) .min_connections(5) .connect_timeout(Duration::from_secs(8)) .acquire_timeout(Duration::from_secs(8)) .idle_timeout(Duration::from_secs(8)) .max_lifetime(Duration::from_secs(8)); let db = Database::connect(opt).await.unwrap(); let mut adapter = SeaOrmAdapter::new(db).await.unwrap(); assert!(adapter.save_policy(e.get_mut_model()).await.is_ok()); assert!(adapter .remove_policy("", "p", to_owned(vec!["alice", "data1", "read"])) .await .unwrap()); assert!(adapter .remove_policy("", "p", to_owned(vec!["bob", "data2", "write"])) .await .is_ok()); assert!(adapter .remove_policy("", "p", to_owned(vec!["data2_admin", "data2", "read"])) .await .is_ok()); assert!(adapter .remove_policy("", "p", to_owned(vec!["data2_admin", "data2", "write"])) .await .is_ok()); assert!(adapter .remove_policy("", "g", to_owned(vec!["alice", "data2_admin"])) .await .is_ok()); assert!(adapter .add_policy("", "p", to_owned(vec!["alice", "data1", "read"])) .await .is_ok()); assert!(adapter .add_policy("", "p", to_owned(vec!["bob", "data2", "write"])) .await .is_ok()); assert!(adapter .add_policy("", "p", to_owned(vec!["data2_admin", "data2", "read"])) .await .is_ok()); assert!(adapter .add_policy("", "p", to_owned(vec!["data2_admin", "data2", "write"])) .await .is_ok()); assert!(adapter .remove_policies( "", "p", vec![ to_owned(vec!["alice", "data1", "read"]), to_owned(vec!["bob", "data2", "write"]), to_owned(vec!["data2_admin", "data2", "read"]), to_owned(vec!["data2_admin", "data2", "write"]), ] ) .await .is_ok()); assert!(adapter .add_policies( "", "p", vec![ to_owned(vec!["alice", "data1", "read"]), to_owned(vec!["bob", "data2", "write"]), to_owned(vec!["data2_admin", "data2", "read"]), to_owned(vec!["data2_admin", "data2", "write"]), ] ) .await .is_ok()); assert!(adapter .add_policy("", "g", to_owned(vec!["alice", "data2_admin"])) .await .is_ok()); assert!(adapter .remove_policy("", "p", to_owned(vec!["alice", "data1", "read"])) .await .is_ok()); assert!(adapter .remove_policy("", "p", to_owned(vec!["bob", "data2", "write"])) .await .is_ok()); assert!(adapter .remove_policy("", "p", to_owned(vec!["data2_admin", "data2", "read"])) .await .is_ok()); assert!(adapter .remove_policy("", "p", to_owned(vec!["data2_admin", "data2", "write"])) .await .is_ok()); assert!(adapter .remove_policy("", "g", to_owned(vec!["alice", "data2_admin"])) .await .is_ok()); assert!(!adapter .remove_policy( "", "g", to_owned(vec!["alice", "data2_admin", "not_exists"]) ) .await .unwrap()); assert!(adapter .add_policy("", "g", to_owned(vec!["alice", "data2_admin"])) .await .is_ok()); assert!(adapter .add_policy("", "g", to_owned(vec!["alice", "data2_admin"])) .await .is_err()); assert!(!adapter .remove_filtered_policy( "", "g", 0, to_owned(vec!["alice", "data2_admin", "not_exists"]), ) .await .unwrap()); assert!(adapter .remove_filtered_policy("", "g", 0, to_owned(vec!["alice", "data2_admin"])) .await .unwrap()); assert!(adapter .add_policy( "", "g", to_owned(vec!["alice", "data2_admin", "domain1", "domain2"]), ) .await .is_ok()); assert!(adapter .remove_filtered_policy( "", "g", 1, to_owned(vec!["data2_admin", "domain1", "domain2"]), ) .await .unwrap()); // GitHub issue: https://github.com/casbin-rs/sqlx-adapter/issues/64 assert!(adapter .add_policy("", "g", to_owned(vec!["carol", "data1_admin"]),) .await .is_ok()); assert!(adapter .remove_filtered_policy("", "g", 0, to_owned(vec!["carol"]),) .await .unwrap()); assert_eq!(vec![String::new(); 0], e.get_roles_for_user("carol", None)); // GitHub issue: https://github.com/casbin-rs/sqlx-adapter/pull/90 // add policies: // p, alice_rfp, book_rfp, read_rfp // p, bob_rfp, book_rfp, read_rfp // p, bob_rfp, book_rfp, write_rfp // p, alice_rfp, pen_rfp, get_rfp // p, bob_rfp, pen_rfp, get_rfp // p, alice_rfp, pencil_rfp, get_rfp assert!(adapter .add_policy("", "p", to_owned(vec!["alice_rfp", "book_rfp", "read_rfp"]),) .await .is_ok()); assert!(adapter .add_policy("", "p", to_owned(vec!["bob_rfp", "book_rfp", "read_rfp"]),) .await .is_ok()); assert!(adapter .add_policy("", "p", to_owned(vec!["bob_rfp", "book_rfp", "write_rfp"]),) .await .is_ok()); assert!(adapter .add_policy("", "p", to_owned(vec!["alice_rfp", "pen_rfp", "get_rfp"]),) .await .is_ok()); assert!(adapter .add_policy("", "p", to_owned(vec!["bob_rfp", "pen_rfp", "get_rfp"]),) .await .is_ok()); assert!(adapter .add_policy( "", "p", to_owned(vec!["alice_rfp", "pencil_rfp", "get_rfp"]), ) .await .is_ok()); // should remove (return true) all policies where "book_rfp" is in the second // position assert!(adapter .remove_filtered_policy("", "p", 1, to_owned(vec!["book_rfp"]),) .await .unwrap()); // should remove (return true) all policies which match "alice_rfp" on first // position and "get_rfp" on third position assert!(adapter .remove_filtered_policy("", "p", 0, to_owned(vec!["alice_rfp", "", "get_rfp"]),) .await .unwrap()); // shadow the previous enforcer let mut e = Enforcer::new( "examples/rbac_with_domains_model.conf", "examples/rbac_with_domains_policy.csv", ) .await .unwrap(); assert!(adapter.save_policy(e.get_mut_model()).await.is_ok()); e.set_adapter(adapter).await.unwrap(); let filter = Filter { p: vec!["", "domain1"], g: vec!["", "", "domain1"], }; e.load_filtered_policy(filter).await.unwrap(); assert!(e.enforce(("alice", "domain1", "data1", "read")).unwrap()); assert!(e.enforce(("alice", "domain1", "data1", "write")).unwrap()); assert!(!e.enforce(("alice", "domain1", "data2", "read")).unwrap()); assert!(!e.enforce(("alice", "domain1", "data2", "write")).unwrap()); assert!(!e.enforce(("bob", "domain2", "data2", "read")).unwrap()); assert!(!e.enforce(("bob", "domain2", "data2", "write")).unwrap()); } }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/sea-orm-adapter/src/action.rs
sea-orm-adapter/src/action.rs
use casbin::{error::AdapterError, Error as CasbinError, Filter, Result}; use sea_orm::{ ActiveModelTrait, ActiveValue::{NotSet, Set}, ColumnTrait, Condition, ConnectionTrait, EntityTrait, QueryFilter, }; use crate::entity::{self, Column, Entity}; const COLUMNS: [Column; 6] = [ Column::V0, Column::V1, Column::V2, Column::V3, Column::V4, Column::V5, ]; #[derive(Debug, Default)] pub(crate) struct Rule<'a> { pub(crate) values: [&'a str; 6], } impl<'a> Rule<'a> { pub(crate) fn from_slice<T: AsRef<str>>(value: &'a [T]) -> Self { let mut values = [""; 6]; for (i, v) in value.iter().enumerate().take(6) { values[i] = v.as_ref(); } Rule { values } } } #[derive(Debug, Default)] pub(crate) struct RuleWithType<'a> { pub(crate) ptype: &'a str, pub(crate) rule: Rule<'a>, } impl<'a> RuleWithType<'a> { pub(crate) fn from_rule(ptype: &'a str, rule: Rule<'a>) -> Self { RuleWithType { ptype, rule } } } pub(crate) async fn remove_policy<'conn, 'rule, C: ConnectionTrait>( conn: &'conn C, rule: RuleWithType<'rule>, ) -> Result<bool> { let mut delete = Entity::delete_many().filter(Column::Ptype.eq(rule.ptype)); for (column, value) in COLUMNS.iter().zip(rule.rule.values.iter()) { delete = delete.filter(column.eq(*value)); } delete .exec(conn) .await .map(|count| count.rows_affected == 1) .map_err(|err| CasbinError::from(AdapterError(Box::new(err)))) } pub(crate) async fn remove_policies<'conn, 'rule, C: ConnectionTrait>( conn: &'conn C, rules: Vec<RuleWithType<'rule>>, ) -> Result<bool> { for rule in rules { remove_policy(conn, rule).await?; } Ok(true) } pub(crate) async fn remove_filtered_policy<'conn, 'rule, C: ConnectionTrait>( conn: &'conn C, ptype: &'rule str, index_of_match_start: usize, rule: Rule<'rule>, ) -> Result<bool> { let base_condition = Condition::all().add(Column::Ptype.eq(ptype)); let conditions = rule.values[index_of_match_start..] .iter() .zip(&COLUMNS[index_of_match_start..]) .filter(|(value, _)| !value.is_empty()) .fold(base_condition, |acc, (value, column)| { acc.add(column.eq(*value)) }); Entity::delete_many() .filter(conditions) .exec(conn) .await .map(|count| count.rows_affected >= 1) .map_err(|err| CasbinError::from(AdapterError(Box::new(err)))) } pub(crate) async fn load_policy<C: ConnectionTrait>(conn: &C) -> Result<Vec<entity::Model>> { entity::Entity::find() .all(conn) .await .map_err(|err| CasbinError::from(AdapterError(Box::new(err)))) } pub(crate) async fn load_filtered_policy<'conn, 'filter, C: ConnectionTrait>( conn: &'conn C, filter: Filter<'filter>, ) -> Result<Vec<entity::Model>> { let g_filter = Rule::from_slice(&filter.g); let p_filter = Rule::from_slice(&filter.p); let g_condition = create_condition_from_rule("g", &g_filter); let p_condition = create_condition_from_rule("p", &p_filter); Entity::find() .filter(Condition::any().add(g_condition).add(p_condition)) .all(conn) .await .map_err(|err| CasbinError::from(AdapterError(Box::new(err)))) } fn create_condition_from_rule(prefix: &str, rule: &Rule) -> Condition { rule.values .iter() .zip(COLUMNS.iter()) .filter(|(value, _)| !value.is_empty()) .fold( Condition::all().add(Column::Ptype.starts_with(prefix)), |acc, (value, column)| acc.add(column.eq(*value)), ) } pub(crate) async fn save_policies<'conn, 'rule, C: ConnectionTrait>( conn: &'conn C, rules: Vec<RuleWithType<'rule>>, ) -> Result<()> { clear_policy(conn).await?; add_policies(conn, rules).await?; Ok(()) } pub(crate) async fn add_policy<'conn, 'rule, C: ConnectionTrait>( conn: &'conn C, rule: RuleWithType<'rule>, ) -> Result<bool> { let model = create_active_model(&rule); model .insert(conn) .await .map(|_| true) .map_err(|err| CasbinError::from(AdapterError(Box::new(err)))) } pub(crate) async fn add_policies<'conn, 'rule, C: ConnectionTrait>( conn: &'conn C, rules: Vec<RuleWithType<'rule>>, ) -> Result<bool> { let models: Vec<entity::ActiveModel> = rules.iter().map(create_active_model).collect(); Entity::insert_many(models) .exec(conn) .await .map(|_| true) .map_err(|err| CasbinError::from(AdapterError(Box::new(err)))) } fn create_active_model(rule: &RuleWithType) -> entity::ActiveModel { entity::ActiveModel { id: NotSet, ptype: Set(rule.ptype.to_string()), v0: Set(rule.rule.values[0].to_string()), v1: Set(rule.rule.values[1].to_string()), v2: Set(rule.rule.values[2].to_string()), v3: Set(rule.rule.values[3].to_string()), v4: Set(rule.rule.values[4].to_string()), v5: Set(rule.rule.values[5].to_string()), } } pub(crate) async fn clear_policy<C: ConnectionTrait>(conn: &C) -> Result<()> { Entity::delete_many() .exec(conn) .await .map_err(|err| CasbinError::from(AdapterError(Box::new(err))))?; Ok(()) }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/sea-orm-adapter/src/migration.rs
sea-orm-adapter/src/migration.rs
use sea_orm::{ sea_query::{ColumnDef, Index, Table}, ConnectionTrait, DbErr, DeriveIden, ExecResult, }; #[derive(DeriveIden)] enum CasbinRule { Table, Id, Ptype, V0, V1, V2, V3, V4, V5, } pub async fn up<C: ConnectionTrait>(conn: &C) -> Result<ExecResult, DbErr> { let create_table = Table::create() .if_not_exists() .table(CasbinRule::Table) .col( ColumnDef::new(CasbinRule::Id) .big_integer() .not_null() .auto_increment() .primary_key(), ) // MySQL max key length is `3072` bytes, in `utf8mb4` charset, it's `3072 / 4 = 768` // characters 18 + 125 * 6 = 768 .col(ColumnDef::new(CasbinRule::Ptype).string_len(18).not_null()) .col(ColumnDef::new(CasbinRule::V0).string_len(125).not_null()) .col(ColumnDef::new(CasbinRule::V1).string_len(125).not_null()) .col(ColumnDef::new(CasbinRule::V2).string_len(125).not_null()) .col(ColumnDef::new(CasbinRule::V3).string_len(125).not_null()) .col(ColumnDef::new(CasbinRule::V4).string_len(125).not_null()) .col(ColumnDef::new(CasbinRule::V5).string_len(125).not_null()) .index( Index::create() .name("unique_key_sea_orm_adapter") .unique() .table(CasbinRule::Table) .col(CasbinRule::Ptype) .col(CasbinRule::V0) .col(CasbinRule::V1) .col(CasbinRule::V2) .col(CasbinRule::V3) .col(CasbinRule::V4) .col(CasbinRule::V5), ) .to_owned(); let builder = conn.get_database_backend(); conn.execute(builder.build(&create_table)).await } pub async fn down<C: ConnectionTrait>(conn: &C) -> Result<ExecResult, DbErr> { let drop_table = Table::drop() .if_exists() .table(CasbinRule::Table) .to_owned(); let builder = conn.get_database_backend(); conn.execute(builder.build(&drop_table)).await }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/migration/src/lib.rs
migration/src/lib.rs
pub use sea_orm_migration::prelude::*; mod datas; mod schemas; pub struct Migrator; #[async_trait::async_trait] impl MigratorTrait for Migrator { fn migrations() -> Vec<Box<dyn MigrationTrait>> { vec![ // 架构迁移 Box::new(schemas::m20240815_082808_create_enum_status::Migration), Box::new(schemas::m20240815_082854_create_sys_user::Migration), Box::new(schemas::m20241023_091143_create_sys_menu::Migration), Box::new(schemas::m20241023_091155_create_sys_organization::Migration), Box::new(schemas::m20241023_091109_create_sys_access_key::Migration), Box::new(schemas::m20241023_091115_create_sys_domain::Migration), Box::new(schemas::m20241023_091132_create_sys_endpoint::Migration), Box::new(schemas::m20241023_091138_create_sys_login_log::Migration), Box::new(schemas::m20241023_091149_create_sys_operation_log::Migration), Box::new(schemas::m20241023_090604_create_sys_role::Migration), Box::new(schemas::m20241023_091204_create_sys_tokens::Migration), Box::new(schemas::m20241023_091210_create_sys_user_role::Migration), Box::new(schemas::m20241023_091159_create_sys_role_menu::Migration), // 数据迁移 Box::new(datas::m20241023_102950_insert_sys_domain::Migration), Box::new(datas::m20241024_033005_insert_sys_user::Migration), Box::new(datas::m20241024_034526_insert_sys_role::Migration), Box::new(datas::m20241024_034744_insert_sys_menu::Migration), Box::new(datas::m20241024_033933_insert_sys_user_role::Migration), Box::new(datas::m20241024_034305_insert_sys_role_menu::Migration), Box::new(datas::m20241024_082926_insert_casbin_rule::Migration), ] } }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/migration/src/main.rs
migration/src/main.rs
use sea_orm_migration::prelude::*; #[async_std::main] async fn main() { cli::run_cli(migration::Migrator).await; }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/migration/src/schemas/m20241023_091204_create_sys_tokens.rs
migration/src/schemas/m20241023_091204_create_sys_tokens.rs
use sea_orm_migration::prelude::*; #[derive(DeriveMigrationName)] pub struct Migration; #[async_trait::async_trait] impl MigrationTrait for Migration { async fn up(&self, manager: &SchemaManager) -> Result<(), DbErr> { manager .create_table( Table::create() .table(SysTokens::Table) .if_not_exists() .col( ColumnDef::new(SysTokens::Id) .string() .not_null() .primary_key(), ) .col(ColumnDef::new(SysTokens::AccessToken).string().not_null()) .col(ColumnDef::new(SysTokens::RefreshToken).string().not_null()) .col(ColumnDef::new(SysTokens::Status).string().not_null()) .col(ColumnDef::new(SysTokens::UserId).string().not_null()) .col(ColumnDef::new(SysTokens::Username).string().not_null()) .col(ColumnDef::new(SysTokens::Domain).string().not_null()) .col(ColumnDef::new(SysTokens::LoginTime).timestamp().not_null()) .col(ColumnDef::new(SysTokens::Ip).string().not_null()) .col(ColumnDef::new(SysTokens::Port).integer().null()) .col(ColumnDef::new(SysTokens::Address).string().not_null()) .col(ColumnDef::new(SysTokens::UserAgent).string().not_null()) .col(ColumnDef::new(SysTokens::RequestId).string().not_null()) .col(ColumnDef::new(SysTokens::Type).string().not_null()) .col( ColumnDef::new(SysTokens::CreatedAt) .timestamp() .not_null() .default(Expr::current_timestamp()), ) .col(ColumnDef::new(SysTokens::CreatedBy).string().not_null()) .to_owned(), ) .await } async fn down(&self, manager: &SchemaManager) -> Result<(), DbErr> { manager .drop_table(Table::drop().table(SysTokens::Table).to_owned()) .await } } #[derive(DeriveIden)] enum SysTokens { Table, Id, AccessToken, RefreshToken, Status, UserId, Username, Domain, LoginTime, Ip, Port, Address, UserAgent, RequestId, Type, CreatedAt, CreatedBy, }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/migration/src/schemas/m20241023_091149_create_sys_operation_log.rs
migration/src/schemas/m20241023_091149_create_sys_operation_log.rs
use sea_orm_migration::prelude::*; #[derive(DeriveMigrationName)] pub struct Migration; #[async_trait::async_trait] impl MigrationTrait for Migration { async fn up(&self, manager: &SchemaManager) -> Result<(), DbErr> { manager .create_table( Table::create() .table(SysOperationLog::Table) .if_not_exists() .col( ColumnDef::new(SysOperationLog::Id) .string() .not_null() .primary_key(), ) .col(ColumnDef::new(SysOperationLog::UserId).string().not_null()) .col( ColumnDef::new(SysOperationLog::Username) .string() .not_null(), ) .col(ColumnDef::new(SysOperationLog::Domain).string().not_null()) .col( ColumnDef::new(SysOperationLog::ModuleName) .string() .not_null(), ) .col( ColumnDef::new(SysOperationLog::Description) .string() .not_null(), ) .col( ColumnDef::new(SysOperationLog::RequestId) .string() .not_null(), ) .col(ColumnDef::new(SysOperationLog::Method).string().not_null()) .col(ColumnDef::new(SysOperationLog::Url).string().not_null()) .col(ColumnDef::new(SysOperationLog::Ip).string().not_null()) .col(ColumnDef::new(SysOperationLog::UserAgent).string().null()) .col(ColumnDef::new(SysOperationLog::Params).json_binary().null()) .col(ColumnDef::new(SysOperationLog::Body).json_binary().null()) .col( ColumnDef::new(SysOperationLog::Response) .json_binary() .null(), ) .col( ColumnDef::new(SysOperationLog::StartTime) .timestamp() .not_null(), ) .col( ColumnDef::new(SysOperationLog::EndTime) .timestamp() .not_null(), ) .col( ColumnDef::new(SysOperationLog::Duration) .integer() .not_null(), ) .col( ColumnDef::new(SysOperationLog::CreatedAt) .timestamp() .not_null() .default(Expr::current_timestamp()), ) .to_owned(), ) .await } async fn down(&self, manager: &SchemaManager) -> Result<(), DbErr> { manager .drop_table(Table::drop().table(SysOperationLog::Table).to_owned()) .await } } #[derive(DeriveIden)] enum SysOperationLog { Table, Id, UserId, Username, Domain, ModuleName, Description, RequestId, Method, Url, Ip, UserAgent, Params, Body, Response, StartTime, EndTime, Duration, CreatedAt, }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/migration/src/schemas/m20241023_091143_create_sys_menu.rs
migration/src/schemas/m20241023_091143_create_sys_menu.rs
use sea_orm::Iterable; use sea_orm_migration::prelude::*; use super::m20240815_082808_create_enum_status::{MenuType, Status}; #[derive(DeriveMigrationName)] pub struct Migration; #[async_trait::async_trait] impl MigrationTrait for Migration { async fn up(&self, manager: &SchemaManager) -> Result<(), DbErr> { manager .create_table( Table::create() .table(SysMenu::Table) .if_not_exists() .col( ColumnDef::new(SysMenu::Id) .integer() .not_null() .auto_increment() .primary_key(), ) .col( ColumnDef::new(SysMenu::MenuType) .enumeration(Alias::new("menu_type"), MenuType::iter()) .not_null(), ) .col(ColumnDef::new(SysMenu::MenuName).string().not_null()) .col(ColumnDef::new(SysMenu::IconType).integer().null()) .col(ColumnDef::new(SysMenu::Icon).string().null()) .col( ColumnDef::new(SysMenu::RouteName) .string() .not_null() .unique_key(), ) .col(ColumnDef::new(SysMenu::RoutePath).string().not_null()) .col(ColumnDef::new(SysMenu::Component).string().not_null()) .col(ColumnDef::new(SysMenu::PathParam).string().null()) .col( ColumnDef::new(SysMenu::Status) .enumeration(Alias::new("status"), Status::iter()) .not_null(), ) .col(ColumnDef::new(SysMenu::ActiveMenu).string().null()) .col(ColumnDef::new(SysMenu::HideInMenu).boolean().null()) .col(ColumnDef::new(SysMenu::Pid).string().not_null()) .col(ColumnDef::new(SysMenu::Sequence).integer().not_null()) .col(ColumnDef::new(SysMenu::I18nKey).string().null()) .col(ColumnDef::new(SysMenu::KeepAlive).boolean().null()) .col(ColumnDef::new(SysMenu::Constant).boolean().not_null()) .col(ColumnDef::new(SysMenu::Href).string().null()) .col(ColumnDef::new(SysMenu::MultiTab).boolean().null()) .col( ColumnDef::new(SysMenu::CreatedAt) .timestamp() .not_null() .default(Expr::current_timestamp()), ) .col(ColumnDef::new(SysMenu::CreatedBy).string().not_null()) .col(ColumnDef::new(SysMenu::UpdatedAt).timestamp().null()) .col(ColumnDef::new(SysMenu::UpdatedBy).string().null()) .to_owned(), ) .await } async fn down(&self, manager: &SchemaManager) -> Result<(), DbErr> { manager .drop_table(Table::drop().table(SysMenu::Table).to_owned()) .await } } #[derive(DeriveIden)] enum SysMenu { Table, Id, MenuType, MenuName, IconType, Icon, RouteName, RoutePath, Component, PathParam, Status, ActiveMenu, HideInMenu, Pid, Sequence, I18nKey, KeepAlive, Constant, Href, MultiTab, CreatedAt, CreatedBy, UpdatedAt, UpdatedBy, }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/migration/src/schemas/m20241023_091109_create_sys_access_key.rs
migration/src/schemas/m20241023_091109_create_sys_access_key.rs
use sea_orm::Iterable; use sea_orm_migration::prelude::*; use super::m20240815_082808_create_enum_status::Status; #[derive(DeriveMigrationName)] pub struct Migration; #[async_trait::async_trait] impl MigrationTrait for Migration { async fn up(&self, manager: &SchemaManager) -> Result<(), DbErr> { manager .create_table( Table::create() .table(SysAccessKey::Table) .if_not_exists() .col( ColumnDef::new(SysAccessKey::Id) .string() .not_null() .primary_key(), ) .col(ColumnDef::new(SysAccessKey::Domain).string().not_null()) .col( ColumnDef::new(SysAccessKey::AccessKeyId) .string() .not_null() .unique_key(), ) .col( ColumnDef::new(SysAccessKey::AccessKeySecret) .string() .not_null() .unique_key(), ) .col( ColumnDef::new(SysAccessKey::Status) .enumeration(Alias::new("status"), Status::iter()) .not_null(), ) .col(ColumnDef::new(SysAccessKey::Description).string().null()) .col( ColumnDef::new(SysAccessKey::CreatedAt) .timestamp() .not_null() .default(Expr::current_timestamp()), ) .col(ColumnDef::new(SysAccessKey::CreatedBy).string().not_null()) .to_owned(), ) .await } async fn down(&self, manager: &SchemaManager) -> Result<(), DbErr> { manager .drop_table(Table::drop().table(SysAccessKey::Table).to_owned()) .await } } #[derive(DeriveIden)] enum SysAccessKey { Table, Id, Domain, AccessKeyId, AccessKeySecret, Status, Description, CreatedAt, CreatedBy, }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/migration/src/schemas/m20241023_090604_create_sys_role.rs
migration/src/schemas/m20241023_090604_create_sys_role.rs
use sea_orm::Iterable; use sea_orm_migration::prelude::*; use super::m20240815_082808_create_enum_status::Status; #[derive(DeriveMigrationName)] pub struct Migration; #[async_trait::async_trait] impl MigrationTrait for Migration { async fn up(&self, manager: &SchemaManager) -> Result<(), DbErr> { manager .create_table( Table::create() .table(SysRole::Table) .if_not_exists() .col( ColumnDef::new(SysRole::Id) .string() .not_null() .primary_key(), ) .col( ColumnDef::new(SysRole::Code) .string() .not_null() .unique_key(), ) .col(ColumnDef::new(SysRole::Name).string().not_null()) .col(ColumnDef::new(SysRole::Description).string().null()) .col(ColumnDef::new(SysRole::Pid).string().not_null()) .col( ColumnDef::new(SysRole::Status) .enumeration(Alias::new("status"), Status::iter()) .not_null(), ) .col( ColumnDef::new(SysRole::CreatedAt) .timestamp() .not_null() .default(Expr::current_timestamp()), ) .col(ColumnDef::new(SysRole::CreatedBy).string().not_null()) .col(ColumnDef::new(SysRole::UpdatedAt).timestamp().null()) .col(ColumnDef::new(SysRole::UpdatedBy).string().null()) .to_owned(), ) .await } async fn down(&self, manager: &SchemaManager) -> Result<(), DbErr> { manager .drop_table(Table::drop().table(SysRole::Table).to_owned()) .await } } #[derive(DeriveIden)] enum SysRole { Table, Id, Code, Name, Description, Pid, Status, CreatedAt, CreatedBy, UpdatedAt, UpdatedBy, }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/migration/src/schemas/m20241023_091210_create_sys_user_role.rs
migration/src/schemas/m20241023_091210_create_sys_user_role.rs
use sea_orm_migration::prelude::*; #[derive(DeriveMigrationName)] pub struct Migration; #[async_trait::async_trait] impl MigrationTrait for Migration { async fn up(&self, manager: &SchemaManager) -> Result<(), DbErr> { manager .create_table( Table::create() .table(SysUserRole::Table) .if_not_exists() .col(ColumnDef::new(SysUserRole::UserId).string().not_null()) .col(ColumnDef::new(SysUserRole::RoleId).string().not_null()) .primary_key( Index::create() .col(SysUserRole::UserId) .col(SysUserRole::RoleId), ) .to_owned(), ) .await?; // Add foreign key constraints manager .create_foreign_key( ForeignKey::create() .name("fk_sys_user_role_user_id") .from(SysUserRole::Table, SysUserRole::UserId) .to(Alias::new("sys_user"), Alias::new("id")) .to_owned(), ) .await?; manager .create_foreign_key( ForeignKey::create() .name("fk_sys_user_role_role_id") .from(SysUserRole::Table, SysUserRole::RoleId) .to(Alias::new("sys_role"), Alias::new("id")) .to_owned(), ) .await } async fn down(&self, manager: &SchemaManager) -> Result<(), DbErr> { manager .drop_table(Table::drop().table(SysUserRole::Table).to_owned()) .await } } #[derive(DeriveIden)] enum SysUserRole { Table, UserId, RoleId, }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/migration/src/schemas/m20240815_082808_create_enum_status.rs
migration/src/schemas/m20240815_082808_create_enum_status.rs
use sea_orm::EnumIter; use sea_orm_migration::{ prelude::{sea_query::extension::postgres::Type, *}, sea_orm::{ConnectionTrait, DbBackend}, }; #[derive(DeriveMigrationName)] pub struct Migration; #[async_trait::async_trait] impl MigrationTrait for Migration { async fn up(&self, manager: &SchemaManager) -> Result<(), DbErr> { let db = manager.get_connection(); match db.get_database_backend() { DbBackend::MySql | DbBackend::Sqlite => {}, DbBackend::Postgres => { // Create status enum manager .create_type( Type::create() .as_enum(Alias::new("status")) .values([Status::Enabled, Status::Disabled, Status::Banned]) .to_owned(), ) .await?; // Create menu_type enum manager .create_type( Type::create() .as_enum(Alias::new("menu_type")) .values([MenuType::Directory, MenuType::Menu]) .to_owned(), ) .await?; }, } Ok(()) } async fn down(&self, manager: &SchemaManager) -> Result<(), DbErr> { let db = manager.get_connection(); match db.get_database_backend() { DbBackend::MySql | DbBackend::Sqlite => {}, DbBackend::Postgres => { // Drop status enum manager .drop_type(Type::drop().name(Alias::new("status")).to_owned()) .await?; // Drop menu_type enum manager .drop_type(Type::drop().name(Alias::new("menu_type")).to_owned()) .await?; }, } Ok(()) } } #[derive(DeriveIden, EnumIter)] pub enum Status { #[sea_orm(iden = "status")] Enum, #[sea_orm(iden = "enabled")] Enabled, #[sea_orm(iden = "disabled")] Disabled, #[sea_orm(iden = "banned")] Banned, } #[derive(DeriveIden, EnumIter)] pub enum MenuType { #[sea_orm(iden = "menu_type")] Enum, #[sea_orm(iden = "directory")] Directory, #[sea_orm(iden = "menu")] Menu, }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/migration/src/schemas/m20241023_091138_create_sys_login_log.rs
migration/src/schemas/m20241023_091138_create_sys_login_log.rs
use sea_orm_migration::prelude::*; #[derive(DeriveMigrationName)] pub struct Migration; #[async_trait::async_trait] impl MigrationTrait for Migration { async fn up(&self, manager: &SchemaManager) -> Result<(), DbErr> { manager .create_table( Table::create() .table(SysLoginLog::Table) .if_not_exists() .col( ColumnDef::new(SysLoginLog::Id) .string() .not_null() .primary_key(), ) .col(ColumnDef::new(SysLoginLog::UserId).string().not_null()) .col(ColumnDef::new(SysLoginLog::Username).string().not_null()) .col(ColumnDef::new(SysLoginLog::Domain).string().not_null()) .col( ColumnDef::new(SysLoginLog::LoginTime) .timestamp() .not_null(), ) .col(ColumnDef::new(SysLoginLog::Ip).string().not_null()) .col(ColumnDef::new(SysLoginLog::Port).integer().null()) .col(ColumnDef::new(SysLoginLog::Address).string().not_null()) .col(ColumnDef::new(SysLoginLog::UserAgent).string().not_null()) .col(ColumnDef::new(SysLoginLog::RequestId).string().not_null()) .col(ColumnDef::new(SysLoginLog::Type).string().not_null()) .col( ColumnDef::new(SysLoginLog::CreatedAt) .timestamp() .not_null() .default(Expr::current_timestamp()), ) .col(ColumnDef::new(SysLoginLog::CreatedBy).string().not_null()) .to_owned(), ) .await } async fn down(&self, manager: &SchemaManager) -> Result<(), DbErr> { manager .drop_table(Table::drop().table(SysLoginLog::Table).to_owned()) .await } } #[derive(DeriveIden)] enum SysLoginLog { Table, Id, UserId, Username, Domain, LoginTime, Ip, Port, Address, UserAgent, RequestId, Type, CreatedAt, CreatedBy, }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/migration/src/schemas/m20240815_082854_create_sys_user.rs
migration/src/schemas/m20240815_082854_create_sys_user.rs
use sea_orm::Iterable; use sea_orm_migration::prelude::*; use super::m20240815_082808_create_enum_status::Status; #[derive(DeriveMigrationName)] pub struct Migration; #[async_trait::async_trait] impl MigrationTrait for Migration { async fn up(&self, manager: &SchemaManager) -> Result<(), DbErr> { // 创建表 manager .create_table( Table::create() .table(SysUser::Table) .if_not_exists() .col( ColumnDef::new(SysUser::Id) .string() .not_null() .primary_key(), ) .col( ColumnDef::new(SysUser::Username) .string() .not_null() .unique_key() .comment("用户名"), ) .col( ColumnDef::new(SysUser::Password) .string() .not_null() .comment("密码"), ) .col( ColumnDef::new(SysUser::Domain) .string() .not_null() .comment("域"), ) .col( ColumnDef::new(SysUser::BuiltIn) .boolean() .not_null() .comment("是否内置"), ) .col(ColumnDef::new(SysUser::Avatar).string().comment("头像")) .col( ColumnDef::new(SysUser::Email) .string() .unique_key() .comment("邮箱"), ) .col( ColumnDef::new(SysUser::PhoneNumber) .string() .unique_key() .comment("手机号"), ) .col( ColumnDef::new(SysUser::NickName) .string() .not_null() .comment("昵称"), ) .col( ColumnDef::new(SysUser::Status) .enumeration(Alias::new("status"), Status::iter()) .not_null() .comment("用户状态"), ) .col( ColumnDef::new(SysUser::CreatedAt) .timestamp() .not_null() .default(Expr::current_timestamp()) .comment("创建时间"), ) .col(ColumnDef::new(SysUser::CreatedBy).string().not_null()) .col(ColumnDef::new(SysUser::UpdatedAt).timestamp()) .col(ColumnDef::new(SysUser::UpdatedBy).string()) .to_owned(), ) .await?; // 创建索引 manager .create_index( Index::create() .table(SysUser::Table) .name("idx_sys_user_domain_id") .col(SysUser::Domain) .to_owned(), ) .await?; manager .create_index( Index::create() .table(SysUser::Table) .name("idx_sys_user_username") .col(SysUser::Username) .unique() .to_owned(), ) .await?; Ok(()) } async fn down(&self, manager: &SchemaManager) -> Result<(), DbErr> { manager .drop_table(Table::drop().table(SysUser::Table).to_owned()) .await } } #[derive(DeriveIden)] pub enum SysUser { Table, Id, Username, Password, Domain, BuiltIn, Avatar, Email, PhoneNumber, NickName, Status, CreatedAt, CreatedBy, UpdatedAt, UpdatedBy, }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/migration/src/schemas/m20241023_091132_create_sys_endpoint.rs
migration/src/schemas/m20241023_091132_create_sys_endpoint.rs
use sea_orm_migration::prelude::*; #[derive(DeriveMigrationName)] pub struct Migration; #[async_trait::async_trait] impl MigrationTrait for Migration { async fn up(&self, manager: &SchemaManager) -> Result<(), DbErr> { manager .create_table( Table::create() .table(SysEndpoint::Table) .if_not_exists() .col( ColumnDef::new(SysEndpoint::Id) .string() .not_null() .primary_key(), ) .col(ColumnDef::new(SysEndpoint::Path).string().not_null()) .col(ColumnDef::new(SysEndpoint::Method).string().not_null()) .col(ColumnDef::new(SysEndpoint::Action).string().not_null()) .col(ColumnDef::new(SysEndpoint::Resource).string().not_null()) .col(ColumnDef::new(SysEndpoint::Controller).string().not_null()) .col(ColumnDef::new(SysEndpoint::Summary).string().null()) .col( ColumnDef::new(SysEndpoint::CreatedAt) .timestamp() .not_null() .default(Expr::current_timestamp()), ) .col(ColumnDef::new(SysEndpoint::UpdatedAt).timestamp().null()) .to_owned(), ) .await } async fn down(&self, manager: &SchemaManager) -> Result<(), DbErr> { manager .drop_table(Table::drop().table(SysEndpoint::Table).to_owned()) .await } } #[derive(DeriveIden)] enum SysEndpoint { Table, Id, Path, Method, Action, Resource, Controller, Summary, CreatedAt, UpdatedAt, }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/migration/src/schemas/mod.rs
migration/src/schemas/mod.rs
pub mod m20240815_082808_create_enum_status; pub mod m20240815_082854_create_sys_user; pub mod m20241023_090604_create_sys_role; pub mod m20241023_091109_create_sys_access_key; pub mod m20241023_091115_create_sys_domain; pub mod m20241023_091132_create_sys_endpoint; pub mod m20241023_091138_create_sys_login_log; pub mod m20241023_091143_create_sys_menu; pub mod m20241023_091149_create_sys_operation_log; pub mod m20241023_091155_create_sys_organization; pub mod m20241023_091159_create_sys_role_menu; pub mod m20241023_091204_create_sys_tokens; pub mod m20241023_091210_create_sys_user_role;
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/migration/src/schemas/m20241023_091159_create_sys_role_menu.rs
migration/src/schemas/m20241023_091159_create_sys_role_menu.rs
use sea_orm_migration::prelude::*; #[derive(DeriveMigrationName)] pub struct Migration; #[async_trait::async_trait] impl MigrationTrait for Migration { async fn up(&self, manager: &SchemaManager) -> Result<(), DbErr> { manager .create_table( Table::create() .table(SysRoleMenu::Table) .if_not_exists() .col(ColumnDef::new(SysRoleMenu::RoleId).string().not_null()) .col(ColumnDef::new(SysRoleMenu::MenuId).integer().not_null()) .col(ColumnDef::new(SysRoleMenu::Domain).string().not_null()) .primary_key( Index::create() .col(SysRoleMenu::RoleId) .col(SysRoleMenu::MenuId) .col(SysRoleMenu::Domain), ) .to_owned(), ) .await } async fn down(&self, manager: &SchemaManager) -> Result<(), DbErr> { manager .drop_table(Table::drop().table(SysRoleMenu::Table).to_owned()) .await } } #[derive(DeriveIden)] enum SysRoleMenu { Table, RoleId, MenuId, Domain, }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/migration/src/schemas/m20241023_091115_create_sys_domain.rs
migration/src/schemas/m20241023_091115_create_sys_domain.rs
use sea_orm::Iterable; use sea_orm_migration::prelude::*; use super::m20240815_082808_create_enum_status::Status; #[derive(DeriveMigrationName)] pub struct Migration; #[async_trait::async_trait] impl MigrationTrait for Migration { async fn up(&self, manager: &SchemaManager) -> Result<(), DbErr> { manager .create_table( Table::create() .table(SysDomain::Table) .if_not_exists() .col( ColumnDef::new(SysDomain::Id) .string() .not_null() .primary_key(), ) .col( ColumnDef::new(SysDomain::Code) .string() .not_null() .unique_key(), ) .col(ColumnDef::new(SysDomain::Name).string().not_null()) .col(ColumnDef::new(SysDomain::Description).string().null()) .col( ColumnDef::new(SysDomain::Status) .enumeration(Alias::new("status"), Status::iter()) .not_null(), ) .col( ColumnDef::new(SysDomain::CreatedAt) .timestamp() .not_null() .default(Expr::current_timestamp()), ) .col(ColumnDef::new(SysDomain::CreatedBy).string().not_null()) .col(ColumnDef::new(SysDomain::UpdatedAt).timestamp().null()) .col(ColumnDef::new(SysDomain::UpdatedBy).string().null()) .to_owned(), ) .await } async fn down(&self, manager: &SchemaManager) -> Result<(), DbErr> { manager .drop_table(Table::drop().table(SysDomain::Table).to_owned()) .await } } #[derive(DeriveIden)] enum SysDomain { Table, Id, Code, Name, Description, Status, CreatedAt, CreatedBy, UpdatedAt, UpdatedBy, }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/migration/src/schemas/m20241023_091155_create_sys_organization.rs
migration/src/schemas/m20241023_091155_create_sys_organization.rs
use sea_orm::Iterable; use sea_orm_migration::prelude::*; use super::m20240815_082808_create_enum_status::Status; #[derive(DeriveMigrationName)] pub struct Migration; #[async_trait::async_trait] impl MigrationTrait for Migration { async fn up(&self, manager: &SchemaManager) -> Result<(), DbErr> { manager .create_table( Table::create() .table(SysOrganization::Table) .if_not_exists() .col( ColumnDef::new(SysOrganization::Id) .string() .not_null() .primary_key(), ) .col( ColumnDef::new(SysOrganization::Code) .string() .not_null() .unique_key(), ) .col(ColumnDef::new(SysOrganization::Name).string().not_null()) .col(ColumnDef::new(SysOrganization::Description).string().null()) .col(ColumnDef::new(SysOrganization::Pid).string().not_null()) .col( ColumnDef::new(SysOrganization::Status) .enumeration(Alias::new("status"), Status::iter()) .not_null(), ) .col( ColumnDef::new(SysOrganization::CreatedAt) .timestamp() .not_null() .default(Expr::current_timestamp()), ) .col( ColumnDef::new(SysOrganization::CreatedBy) .string() .not_null(), ) .col( ColumnDef::new(SysOrganization::UpdatedAt) .timestamp() .null(), ) .col(ColumnDef::new(SysOrganization::UpdatedBy).string().null()) .to_owned(), ) .await } async fn down(&self, manager: &SchemaManager) -> Result<(), DbErr> { manager .drop_table(Table::drop().table(SysOrganization::Table).to_owned()) .await } } #[derive(DeriveIden)] enum SysOrganization { Table, Id, Code, Name, Description, Pid, Status, CreatedAt, CreatedBy, UpdatedAt, UpdatedBy, }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/migration/src/datas/m20241024_082926_insert_casbin_rule.rs
migration/src/datas/m20241024_082926_insert_casbin_rule.rs
use sea_orm_migration::{prelude::*, sea_orm::Statement}; #[derive(DeriveMigrationName)] pub struct Migration; #[async_trait::async_trait] impl MigrationTrait for Migration { async fn up(&self, manager: &SchemaManager) -> Result<(), DbErr> { let db = manager.get_connection(); // 执行架构迁移 sea_orm_adapter::up(db).await?; let insert_casbin_rules_stmt = Statement::from_string( manager.get_database_backend(), r#" INSERT INTO casbin_rule (ptype, v0, v1, v2, v3, v4, v5) VALUES ('p', 'ROLE_SUPER', 'built-in', '/domain', 'GET', '', ''), ('p', 'ROLE_SUPER', 'built-in', '/domain', 'POST', '', ''), ('p', 'ROLE_SUPER', 'built-in', '/domain/:id', 'GET', '', ''), ('p', 'ROLE_SUPER', 'built-in', '/domain', 'PUT', '', ''), ('p', 'ROLE_SUPER', 'built-in', '/domain/:id', 'DELETE', '', ''), ('p', 'ROLE_SUPER', 'built-in', '/route', 'GET', '', ''), ('p', 'ROLE_SUPER', 'built-in', '/route', 'POST', '', ''), ('p', 'ROLE_SUPER', 'built-in', '/route/:id', 'GET', '', ''), ('p', 'ROLE_SUPER', 'built-in', '/route', 'PUT', '', ''), ('p', 'ROLE_SUPER', 'built-in', '/route/:id', 'DELETE', '', ''), ('p', 'ROLE_SUPER', 'built-in', '/route/tree', 'GET', '', ''), ('p', 'ROLE_SUPER', 'built-in', '/route/auth-route/:roleId', 'GET', '', ''), ('p', 'ROLE_SUPER', 'built-in', '/role', 'GET', '', ''), ('p', 'ROLE_SUPER', 'built-in', '/role', 'POST', '', ''), ('p', 'ROLE_SUPER', 'built-in', '/role/:id', 'GET', '', ''), ('p', 'ROLE_SUPER', 'built-in', '/role', 'PUT', '', ''), ('p', 'ROLE_SUPER', 'built-in', '/role/:id', 'DELETE', '', ''), ('p', 'ROLE_SUPER', 'built-in', '/user/users', 'GET', '', ''), ('p', 'ROLE_SUPER', 'built-in', '/user', 'GET', '', ''), ('p', 'ROLE_SUPER', 'built-in', '/user', 'POST', '', ''), ('p', 'ROLE_SUPER', 'built-in', '/user/:id', 'GET', '', ''), ('p', 'ROLE_SUPER', 'built-in', '/user', 'PUT', '', ''), ('p', 'ROLE_SUPER', 'built-in', '/user/:id', 'DELETE', '', ''), ('p', 'ROLE_SUPER', 'built-in', '/api-endpoint', 'GET', '', ''), ('p', 'ROLE_SUPER', 'built-in', '/api-endpoint/auth-api-endpoint/:roleCode', 'GET', '', ''), ('p', 'ROLE_SUPER', 'built-in', '/api-endpoint/tree', 'GET', '', ''), ('p', 'ROLE_SUPER', 'built-in', '/access-key', 'GET', '', ''), ('p', 'ROLE_SUPER', 'built-in', '/access-key', 'POST', '', ''), ('p', 'ROLE_SUPER', 'built-in', '/access-key/:id', 'DELETE', '', ''), ('p', 'ROLE_SUPER', 'built-in', '/login-log', 'GET', '', ''), ('p', 'ROLE_SUPER', 'built-in', '/operation-log', 'GET', '', ''), ('p', 'ROLE_SUPER', 'built-in', '/authorization/assign-permission', 'POST', '', ''), ('p', 'ROLE_SUPER', 'built-in', '/authorization/assign-routes', 'POST', '', '') "# .to_string(), ); db.execute(insert_casbin_rules_stmt).await?; Ok(()) } async fn down(&self, manager: &SchemaManager) -> Result<(), DbErr> { let db = manager.get_connection(); // 删除所有数据并重置序列 let truncate_and_reset_stmt = Statement::from_string( manager.get_database_backend(), r#" TRUNCATE TABLE casbin_rule; ALTER SEQUENCE casbin_rule_id_seq RESTART WITH 1; "# .to_string(), ); db.execute(truncate_and_reset_stmt).await?; Ok(()) } }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/migration/src/datas/m20241024_033933_insert_sys_user_role.rs
migration/src/datas/m20241024_033933_insert_sys_user_role.rs
use sea_orm_migration::{prelude::*, sea_orm::Statement}; #[derive(DeriveMigrationName)] pub struct Migration; #[async_trait::async_trait] impl MigrationTrait for Migration { async fn up(&self, manager: &SchemaManager) -> Result<(), DbErr> { let db = manager.get_connection(); let insert_user_role_stmt = Statement::from_string( manager.get_database_backend(), r#" INSERT INTO sys_user_role (user_id, role_id) VALUES ('1', '1'), ('2', '2'), ('3', '3') "# .to_string(), ); db.execute(insert_user_role_stmt).await?; Ok(()) } async fn down(&self, _manager: &SchemaManager) -> Result<(), DbErr> { Ok(()) } }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/migration/src/datas/m20241024_034526_insert_sys_role.rs
migration/src/datas/m20241024_034526_insert_sys_role.rs
use sea_orm_migration::{prelude::*, sea_orm::Statement}; #[derive(DeriveMigrationName)] pub struct Migration; #[async_trait::async_trait] impl MigrationTrait for Migration { async fn up(&self, manager: &SchemaManager) -> Result<(), DbErr> { let db = manager.get_connection(); let insert_role_stmt = Statement::from_string( manager.get_database_backend(), r#" INSERT INTO sys_role (id, code, name, description, pid, status, created_at, created_by, updated_at, updated_by) VALUES ('1', 'ROLE_SUPER', '超级管理员', '超级管理员', 0, 'enabled', '2024-05-15 00:00:00.000', '-1', NULL, NULL), ('2', 'ROLE_ADMIN', '管理员', '管理员', 1, 'enabled', '2024-05-15 00:00:00.000', '-1', NULL, NULL), ('3', 'ROLE_USER', '用户', '用户', 1, 'enabled', '2024-05-15 00:00:00.000', '-1', NULL, NULL) "#.to_string(), ); db.execute(insert_role_stmt).await?; Ok(()) } async fn down(&self, _manager: &SchemaManager) -> Result<(), DbErr> { Ok(()) } }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/migration/src/datas/m20241024_034744_insert_sys_menu.rs
migration/src/datas/m20241024_034744_insert_sys_menu.rs
use sea_orm_migration::{prelude::*, sea_orm::Statement}; #[derive(DeriveMigrationName)] pub struct Migration; #[async_trait::async_trait] impl MigrationTrait for Migration { async fn up(&self, manager: &SchemaManager) -> Result<(), DbErr> { let db = manager.get_connection(); let insert_menu_stmt = Statement::from_string( manager.get_database_backend(), r#" INSERT INTO sys_menu (id, menu_type, menu_name, icon_type, icon, route_name, route_path, component, path_param, status, active_menu, hide_in_menu, pid, sequence, i18n_key, keep_alive, constant, href, multi_tab, created_at, created_by, updated_at, updated_by) VALUES ('1', 'menu', 'login', '1', '', 'login', '/login/:module(pwd-login|code-login|register|reset-pwd|bind-wechat)?', 'layout.blank$view.login', '', 'enabled', '', 'true', '0', '0', 'route.login', 'false', 'true', '', 'false', '2024-05-15 00:00:00.000', '-1', NULL, NULL), ('2', 'menu', '403', '1', '', '403', '/403', 'layout.blank$view.403', '', 'enabled', '', 'true', '0', '0', 'route.403', 'false', 'true', '', 'false', '2024-05-15 00:00:00.000', '-1', NULL, NULL), ('3', 'menu', '404', '1', '', '404', '/404', 'layout.blank$view.404', '', 'enabled', '', 'true', '0', '0', 'route.404', 'false', 'true', '', 'false', '2024-05-15 00:00:00.000', '-1', NULL, NULL), ('4', 'menu', '500', '1', '', '500', '/500', 'layout.blank$view.500', '', 'enabled', '', 'true', '0', '0', 'route.500', 'false', 'true', '', 'false', '2024-05-15 00:00:00.000', '-1', NULL, NULL), ('5', 'menu', 'iframe-page', '1', '', 'iframe-page', '/iframe-page/:url', 'layout.base$view.iframe-page', '', 'enabled', '', 'true', '0', '0', 'route.iframe-page', 'false', 'true', '', 'false', '2024-05-15 00:00:00.000', '-1', NULL, NULL), ('62', 'menu', 'manage_menu', '1', 'material-symbols:route', 'manage_menu', '/manage/menu', 'view.manage_menu', '', 'enabled', '', 'false', '54', '2', 'route.manage_menu', 'true', 'false', '', 'false', '2024-05-15 00:00:00.000', '-1', NULL, NULL), ('65', 'menu', 'manage_user-detail', '1', '', 'manage_user-detail', '/manage/user-detail/:id', 'view.manage_user-detail', '', 'enabled', 'manage_user', 'true', '54', '3', 'route.manage_user-detail', 'false', 'false', '', 'false', '2024-05-15 00:00:00.000', '-1', NULL, NULL), ('50', 'menu', 'home', '1', 'mdi:monitor-dashboard', 'home', '/home', 'layout.base$view.home', '', 'enabled', '', 'false', '0', '0', 'route.home', 'false', 'false', '', 'false', '2024-05-15 00:00:00.000', '-1', NULL, NULL), ('54', 'directory', 'manage', '1', 'carbon:cloud-service-management', 'manage', '/manage', 'layout.base', '', 'enabled', '', 'false', '0', '4', 'route.manage', 'false', 'false', '', 'false', '2024-05-15 00:00:00.000', '-1', NULL, NULL), ('64', 'menu', 'manage_user', '1', 'ic:round-manage-accounts', 'manage_user', '/manage/user', 'view.manage_user', '', 'enabled', '', 'false', '54', '0', 'route.manage_user', 'false', 'false', '', 'false', '2024-05-15 00:00:00.000', '-1', NULL, NULL), ('63', 'menu', 'manage_role', '1', 'carbon:user-role', 'manage_role', '/manage/role', 'view.manage_role', '', 'enabled', '', 'false', '54', '1', 'route.manage_role', 'false', 'false', '', 'false', '2024-05-15 00:00:00.000', '-1', NULL, NULL), ('71', 'menu', 'log_login', '1', 'carbon:login', 'log_login', '/log/login', 'view.log_login', '', 'enabled', '', 'false', '52', '0', 'route.log_login', 'false', 'false', '', 'false', '2024-05-15 00:00:00.000', '-1', NULL, NULL), ('72', 'menu', 'log_operation', '1', 'carbon:operations-record', 'log_operation', '/log/operation', 'view.log_operation', '', 'enabled', '', 'false', '52', '0', 'route.log_operation', 'false', 'false', '', 'false', '2024-05-15 00:00:00.000', '-1', NULL, NULL), ('52', 'directory', 'log', '1', 'carbon:cloud-logging', 'log', '/log', 'layout.base', '', 'enabled', '', 'false', '0', '0', 'route.log', 'false', 'false', '', 'false', '2024-05-15 00:00:00.000', '-1', NULL, NULL), ('51', 'menu', 'access-key', '1', 'carbon:document-signed', 'access-key', '/access-key', 'layout.base$view.access-key', '', 'enabled', '', 'false', '0', '0', 'route.access-key', 'false', 'false', '', 'false', '2024-05-15 00:00:00.000', '-1', NULL, NULL) "#.to_string(), ); db.execute(insert_menu_stmt).await?; Ok(()) } async fn down(&self, _manager: &SchemaManager) -> Result<(), DbErr> { Ok(()) } }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/migration/src/datas/m20241024_033005_insert_sys_user.rs
migration/src/datas/m20241024_033005_insert_sys_user.rs
use sea_orm_migration::{prelude::*, sea_orm::Statement}; #[derive(DeriveMigrationName)] pub struct Migration; #[async_trait::async_trait] impl MigrationTrait for Migration { async fn up(&self, manager: &SchemaManager) -> Result<(), DbErr> { let db = manager.get_connection(); let insert_stmt = Statement::from_string( manager.get_database_backend(), r#" INSERT INTO sys_user (id, username, password, domain, built_in, avatar, email, phone_number, nick_name, status, created_at, created_by, updated_at, updated_by) VALUES ('1', 'Soybean', '$argon2id$v=19$m=19456,t=2,p=1$8TC8kz2KUf0ytBWeFn5CZA$UgL+qvhpeNyijDBfL4A90KjdXOJ7tNP77RrufQhOkgg', 'built-in', true, 'https://minio.bytebytebrew.com/default/Ugly%20Avatar%20Face.png', '111@gmail.com', '18511111111', 'Soybean', 'enabled', '2024-05-15 00:00:00.000', '-1', NULL, NULL), ('2', 'Administrator', '$argon2id$v=19$m=19456,t=2,p=1$8TC8kz2KUf0ytBWeFn5CZA$UgL+qvhpeNyijDBfL4A90KjdXOJ7tNP77RrufQhOkgg', 'built-in', true, 'https://minio.bytebytebrew.com/default/Ugly%20Avatar%20Face.png', '222@gmail.com', '18522222222', 'Admin', 'enabled', '2024-05-15 00:00:00.000', '-1', NULL, NULL), ('3', 'GeneralUser', '$argon2id$v=19$m=19456,t=2,p=1$8TC8kz2KUf0ytBWeFn5CZA$UgL+qvhpeNyijDBfL4A90KjdXOJ7tNP77RrufQhOkgg', 'built-in', true, 'https://minio.bytebytebrew.com/default/Ugly%20Avatar%20Face.png', '333@gmail.com', '18533333333', 'User', 'enabled', '2024-05-15 00:00:00.000', '-1', NULL, NULL) "#.to_string(), ); db.execute(insert_stmt).await?; Ok(()) } async fn down(&self, _manager: &SchemaManager) -> Result<(), DbErr> { Ok(()) } }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/migration/src/datas/mod.rs
migration/src/datas/mod.rs
pub mod m20241023_102950_insert_sys_domain; pub mod m20241024_033005_insert_sys_user; pub mod m20241024_033933_insert_sys_user_role; pub mod m20241024_034305_insert_sys_role_menu; pub mod m20241024_034526_insert_sys_role; pub mod m20241024_034744_insert_sys_menu; pub mod m20241024_082926_insert_casbin_rule;
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/migration/src/datas/m20241024_034305_insert_sys_role_menu.rs
migration/src/datas/m20241024_034305_insert_sys_role_menu.rs
use sea_orm_migration::{prelude::*, sea_orm::Statement}; #[derive(DeriveMigrationName)] pub struct Migration; #[async_trait::async_trait] impl MigrationTrait for Migration { async fn up(&self, manager: &SchemaManager) -> Result<(), DbErr> { let db = manager.get_connection(); let insert_role_menu_stmt = Statement::from_string( manager.get_database_backend(), r#" INSERT INTO sys_role_menu (role_id, menu_id, domain) VALUES ('1', '50', 'built-in'), ('1', '54', 'built-in'), ('1', '62', 'built-in'), ('1', '63', 'built-in'), ('1', '64', 'built-in'), ('1', '65', 'built-in'), ('3', '50', 'built-in'), ('2', '50', 'built-in'), ('2', '62', 'built-in'), ('1', '51', 'built-in'), ('1', '52', 'built-in'), ('1', '71', 'built-in'), ('1', '72', 'built-in') "# .to_string(), ); db.execute(insert_role_menu_stmt).await?; Ok(()) } async fn down(&self, _manager: &SchemaManager) -> Result<(), DbErr> { Ok(()) } }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/migration/src/datas/m20241023_102950_insert_sys_domain.rs
migration/src/datas/m20241023_102950_insert_sys_domain.rs
use sea_orm_migration::{prelude::*, sea_orm::Statement}; #[derive(DeriveMigrationName)] pub struct Migration; #[async_trait::async_trait] impl MigrationTrait for Migration { async fn up(&self, manager: &SchemaManager) -> Result<(), DbErr> { let db = manager.get_connection(); let insert_stmt = Statement::from_string( manager.get_database_backend(), r#" INSERT INTO sys_domain (id, code, name, description, status, created_at, created_by, updated_at, updated_by) VALUES ('1', 'built-in', 'built-in', '内置域,请勿进行任何操作', 'enabled', '2024-05-15 00:00:00.000', '-1', NULL, NULL) "#.to_string(), ); db.execute(insert_stmt).await?; Ok(()) } async fn down(&self, _manager: &SchemaManager) -> Result<(), DbErr> { // 当表被删除时,这些数据自然会被删除,所以这里不需要额外的操作 // 如果需要回滚,可以在这里删除插入的默认数据 // let db = manager.get_connection(); // let delete_stmt = Statement::from_string( // manager.get_database_backend(), // "DELETE FROM sys_domain WHERE id = '1'".to_string(), // ); // db.execute(delete_stmt).await?; Ok(()) } }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/migration/src/datas/m20241023_102950_insert_sys_user_role.rs
migration/src/datas/m20241023_102950_insert_sys_user_role.rs
use sea_orm_migration::prelude::*; use sea_orm_migration::sea_orm::Statement; #[derive(DeriveMigrationName)] pub struct Migration; #[async_trait::async_trait] impl MigrationTrait for Migration { async fn up(&self, manager: &SchemaManager) -> Result<(), DbErr> { let db = manager.get_connection(); // 插入 sys_user_role 数据 let insert_user_role_stmt = Statement::from_string( manager.get_database_backend(), r#" INSERT INTO sys_user_role (user_id, role_id) VALUES ('1', '1'), ('2', '2'), ('3', '3') "#.to_string(), ); db.execute(insert_user_role_stmt).await?; Ok(()) } async fn down(&self, _manager: &SchemaManager) -> Result<(), DbErr> { // 当表被删除时,这些数据自然会被删除,所以这里不需要额外的操作 Ok(()) } }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/axum-casbin/src/lib.rs
axum-casbin/src/lib.rs
pub use casbin; pub use middleware::{CasbinAxumLayer, CasbinAxumMiddleware, CasbinVals}; pub mod middleware;
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/axum-casbin/src/middleware.rs
axum-casbin/src/middleware.rs
use std::{ convert::Infallible, ops::{Deref, DerefMut}, sync::Arc, task::{Context, Poll}, }; #[cfg(feature = "runtime-async-std")] use async_std::sync::RwLock; use axum::{body, response::Response, BoxError}; use bytes::Bytes; use casbin::{ prelude::{TryIntoAdapter, TryIntoModel}, CachedEnforcer, CoreApi, Result as CasbinResult, }; use futures::future::BoxFuture; use http::{Request, StatusCode}; use http_body::Body as HttpBody; use http_body_util::Full; #[cfg(feature = "runtime-tokio")] use tokio::sync::RwLock; use tower::{Layer, Service}; #[derive(Clone)] pub struct CasbinVals { pub subject: Vec<String>, pub domain: Option<String>, } #[derive(Clone)] pub struct CasbinAxumLayer { enforcer: Arc<RwLock<CachedEnforcer>>, } impl CasbinAxumLayer { pub async fn new<M: TryIntoModel, A: TryIntoAdapter>(m: M, a: A) -> CasbinResult<Self> { let enforcer: CachedEnforcer = CachedEnforcer::new(m, a).await?; Ok(CasbinAxumLayer { enforcer: Arc::new(RwLock::new(enforcer)), }) } pub fn get_enforcer(&mut self) -> Arc<RwLock<CachedEnforcer>> { self.enforcer.clone() } pub fn set_enforcer(e: Arc<RwLock<CachedEnforcer>>) -> CasbinAxumLayer { CasbinAxumLayer { enforcer: e } } } impl<S> Layer<S> for CasbinAxumLayer { type Service = CasbinAxumMiddleware<S>; fn layer(&self, inner: S) -> Self::Service { CasbinAxumMiddleware { enforcer: self.enforcer.clone(), inner, } } } impl Deref for CasbinAxumLayer { type Target = Arc<RwLock<CachedEnforcer>>; fn deref(&self) -> &Self::Target { &self.enforcer } } impl DerefMut for CasbinAxumLayer { fn deref_mut(&mut self) -> &mut Self::Target { &mut self.enforcer } } #[derive(Clone)] pub struct CasbinAxumMiddleware<S> { inner: S, enforcer: Arc<RwLock<CachedEnforcer>>, } impl<S, ReqBody, ResBody> Service<Request<ReqBody>> for CasbinAxumMiddleware<S> where S: Service<Request<ReqBody>, Response = Response<ResBody>, Error = Infallible> + Clone + Send + 'static, S::Future: Send + 'static, ReqBody: Send + 'static, Infallible: From<<S as Service<Request<ReqBody>>>::Error>, ResBody: HttpBody<Data = Bytes> + Send + 'static, ResBody::Error: Into<BoxError>, { type Error = Infallible; // `BoxFuture` is a type alias for `Pin<Box<dyn Future + Send + 'a>>` type Future = BoxFuture<'static, Result<Self::Response, Self::Error>>; type Response = Response; fn poll_ready(&mut self, cx: &mut Context<'_>) -> Poll<Result<(), Self::Error>> { self.inner.poll_ready(cx) } fn call(&mut self, req: Request<ReqBody>) -> Self::Future { let cloned_enforcer = self.enforcer.clone(); let not_ready_inner = self.inner.clone(); let mut inner = std::mem::replace(&mut self.inner, not_ready_inner); Box::pin(async move { let path = req.uri().path().to_string(); let action = req.method().as_str().to_string(); let option_vals = req.extensions().get::<CasbinVals>().map(|x| x.to_owned()); let vals = match option_vals { Some(value) => value, None => { return Ok(Response::builder() .status(StatusCode::UNAUTHORIZED) .body(body::Body::new(Full::from("No authentication token was provided. Please ensure your request includes a valid token."))) .unwrap()); }, }; let subject = vals.subject.clone(); if !vals.subject.is_empty() { if let Some(domain) = vals.domain { let mut lock = cloned_enforcer.write().await; let mut authorized = false; let mut enforcement_error = false; for sub in subject.iter() { match lock.enforce_mut(vec![ sub.clone(), domain.clone(), path.clone(), action.clone(), ]) { Ok(true) => { authorized = true; break; }, Ok(false) => continue, Err(_) => { enforcement_error = true; break; }, } } drop(lock); if enforcement_error { Ok(Response::builder() .status(StatusCode::BAD_GATEWAY) .body(body::Body::new(Full::from("We encountered an unexpected error while processing your request. Our team has been notified, and we are investigating the issue."))) .unwrap()) } else if authorized { Ok(inner.call(req).await?.map(body::Body::new)) } else { Ok(Response::builder() .status(StatusCode::FORBIDDEN) .body(body::Body::new(Full::from("You do not have the necessary permissions to access this resource. Please contact support if you believe this is an error."))) .unwrap()) } } else { let mut lock = cloned_enforcer.write().await; let mut authorized = false; let mut enforcement_error = false; for sub in subject.iter() { match lock.enforce_mut(vec![sub.clone(), path.clone(), action.clone()]) { Ok(true) => { authorized = true; break; }, Ok(false) => continue, Err(_) => { enforcement_error = true; break; }, } } drop(lock); if enforcement_error { Ok(Response::builder() .status(StatusCode::BAD_GATEWAY) .body(body::Body::new(Full::from("We encountered an unexpected error while processing your request. Our team has been notified, and we are investigating the issue."))) .unwrap()) } else if authorized { Ok(inner.call(req).await?.map(body::Body::new)) } else { Ok(Response::builder() .status(StatusCode::FORBIDDEN) .body(body::Body::new(Full::from("You do not have the necessary permissions to access this resource. Please contact support if you believe this is an error."))) .unwrap()) } } } else { Ok(Response::builder() .status(StatusCode::UNAUTHORIZED) .body(body::Body::new(Full::from( "No token provided or invalid token type", ))) .unwrap()) } }) } }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/axum-casbin/tests/test_set_enforcer.rs
axum-casbin/tests/test_set_enforcer.rs
use std::{ convert::Infallible, sync::Arc, task::{Context, Poll}, }; #[cfg(feature = "runtime-async-std")] use async_std::sync::RwLock; use axum::{response::Response, routing::get, BoxError, Router}; use axum_casbin::{CasbinAxumLayer, CasbinVals}; use axum_test_helpers::TestClient; use bytes::Bytes; use casbin::{function_map::key_match2, CachedEnforcer, CoreApi, DefaultModel, FileAdapter}; use futures::future::BoxFuture; use http::{Request, StatusCode}; use http_body::Body as HttpBody; #[cfg(feature = "runtime-tokio")] use tokio::sync::RwLock; use tower::{Layer, Service}; #[derive(Clone)] struct FakeAuthLayer; impl<S> Layer<S> for FakeAuthLayer { type Service = FakeAuthMiddleware<S>; fn layer(&self, inner: S) -> Self::Service { FakeAuthMiddleware { inner } } } #[derive(Clone)] struct FakeAuthMiddleware<S> { inner: S, } impl<S, ReqBody, ResBody> Service<Request<ReqBody>> for FakeAuthMiddleware<S> where S: Service<Request<ReqBody>, Response = Response<ResBody>, Error = Infallible> + Clone + Send + 'static, S::Future: Send + 'static, ReqBody: Send + 'static, Infallible: From<<S as Service<Request<ReqBody>>>::Error>, ResBody: HttpBody<Data = Bytes> + Send + 'static, ResBody::Error: Into<BoxError>, { type Error = S::Error; // `BoxFuture` is a type alias for `Pin<Box<dyn Future + Send + 'a>>` type Future = BoxFuture<'static, Result<Self::Response, Self::Error>>; type Response = S::Response; fn poll_ready(&mut self, cx: &mut Context<'_>) -> Poll<Result<(), Self::Error>> { self.inner.poll_ready(cx) } fn call(&mut self, mut req: Request<ReqBody>) -> Self::Future { let not_ready_inner = self.inner.clone(); let mut inner = std::mem::replace(&mut self.inner, not_ready_inner); Box::pin(async move { let vals = CasbinVals { subject: vec!["alice".to_string()], domain: None, }; req.extensions_mut().insert(vals); inner.call(req).await }) } } // Handler that immediately returns an empty `200 OK` response. async fn handler() {} #[cfg_attr(feature = "runtime-tokio", tokio::test)] #[cfg_attr(feature = "runtime-async-std", async_std::test)] async fn test_set_enforcer() { let m = DefaultModel::from_file("examples/rbac_with_pattern_model.conf") .await .unwrap(); let a = FileAdapter::new("examples/rbac_with_pattern_policy.csv"); let enforcer = Arc::new(RwLock::new(CachedEnforcer::new(m, a).await.unwrap())); let casbin_middleware = CasbinAxumLayer::set_enforcer(enforcer); casbin_middleware .write() .await .get_role_manager() .write() .matching_fn(Some(key_match2), None); let app = Router::new() .route("/pen/1", get(handler)) .route("/pen/2", get(handler)) .route("/book/:id", get(handler)) .layer(casbin_middleware) .layer(FakeAuthLayer); let client = TestClient::new(app); let resp_pen_1 = client.get("/pen/1").await; assert_eq!(resp_pen_1.status(), StatusCode::OK); let resp_book = client.get("/book/2").await; assert_eq!(resp_book.status(), StatusCode::OK); let resp_pen_2 = client.get("/pen/2").await; assert_eq!(resp_pen_2.status(), StatusCode::FORBIDDEN); }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/axum-casbin/tests/test_middleware_domain.rs
axum-casbin/tests/test_middleware_domain.rs
use std::{ convert::Infallible, task::{Context, Poll}, }; use axum::{response::Response, routing::get, BoxError, Router}; use axum_casbin::{CasbinAxumLayer, CasbinVals}; use axum_test_helpers::TestClient; use bytes::Bytes; use casbin::{DefaultModel, FileAdapter}; use futures::future::BoxFuture; use http::{Request, StatusCode}; use http_body::Body as HttpBody; use tower::{Layer, Service}; #[derive(Clone)] struct FakeAuthLayer; impl<S> Layer<S> for FakeAuthLayer { type Service = FakeAuthMiddleware<S>; fn layer(&self, inner: S) -> Self::Service { FakeAuthMiddleware { inner } } } #[derive(Clone)] struct FakeAuthMiddleware<S> { inner: S, } impl<S, ReqBody, ResBody> Service<Request<ReqBody>> for FakeAuthMiddleware<S> where S: Service<Request<ReqBody>, Response = Response<ResBody>, Error = Infallible> + Clone + Send + 'static, S::Future: Send + 'static, ReqBody: Send + 'static, Infallible: From<<S as Service<Request<ReqBody>>>::Error>, ResBody: HttpBody<Data = Bytes> + Send + 'static, ResBody::Error: Into<BoxError>, { type Error = S::Error; // `BoxFuture` is a type alias for `Pin<Box<dyn Future + Send + 'a>>` type Future = BoxFuture<'static, Result<Self::Response, Self::Error>>; type Response = S::Response; fn poll_ready(&mut self, cx: &mut Context<'_>) -> Poll<Result<(), Self::Error>> { self.inner.poll_ready(cx) } fn call(&mut self, mut req: Request<ReqBody>) -> Self::Future { let not_ready_inner = self.inner.clone(); let mut inner = std::mem::replace(&mut self.inner, not_ready_inner); Box::pin(async move { let vals = CasbinVals { subject: vec!["alice".to_string()], domain: Option::from(String::from("domain1")), }; req.extensions_mut().insert(vals); inner.call(req).await }) } } // Handler that immediately returns an empty `200 OK` response. async fn handler() {} #[cfg_attr(feature = "runtime-tokio", tokio::test)] #[cfg_attr(feature = "runtime-async-std", async_std::test)] async fn test_middleware_domain() { let m = DefaultModel::from_file("examples/rbac_with_domains_model.conf") .await .unwrap(); let a = FileAdapter::new("examples/rbac_with_domains_policy.csv"); let casbin_middleware = CasbinAxumLayer::new(m, a).await.unwrap(); let app = Router::new() .route("/pen/1", get(handler)) .route("/book/1", get(handler)) .layer(casbin_middleware) .layer(FakeAuthLayer); let client = TestClient::new(app); let resp_pen = client.get("/pen/1").await; assert_eq!(resp_pen.status(), StatusCode::OK); let resp_book = client.get("/book/1").await; assert_eq!(resp_book.status(), StatusCode::FORBIDDEN); }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/axum-casbin/tests/test_middleware.rs
axum-casbin/tests/test_middleware.rs
use std::{ convert::Infallible, task::{Context, Poll}, }; use axum::{response::Response, routing::get, BoxError, Router}; use axum_casbin::{CasbinAxumLayer, CasbinVals}; use axum_test_helpers::TestClient; use bytes::Bytes; use casbin::{function_map::key_match2, CoreApi, DefaultModel, FileAdapter}; use futures::future::BoxFuture; use http::{Request, StatusCode}; use http_body::Body as HttpBody; use tower::{Layer, Service}; #[derive(Clone)] struct FakeAuthLayer; impl<S> Layer<S> for FakeAuthLayer { type Service = FakeAuthMiddleware<S>; fn layer(&self, inner: S) -> Self::Service { FakeAuthMiddleware { inner } } } #[derive(Clone)] struct FakeAuthMiddleware<S> { inner: S, } impl<S, ReqBody, ResBody> Service<Request<ReqBody>> for FakeAuthMiddleware<S> where S: Service<Request<ReqBody>, Response = Response<ResBody>, Error = Infallible> + Clone + Send + 'static, S::Future: Send + 'static, ReqBody: Send + 'static, Infallible: From<<S as Service<Request<ReqBody>>>::Error>, ResBody: HttpBody<Data = Bytes> + Send + 'static, ResBody::Error: Into<BoxError>, { type Error = S::Error; // `BoxFuture` is a type alias for `Pin<Box<dyn Future + Send + 'a>>` type Future = BoxFuture<'static, Result<Self::Response, Self::Error>>; type Response = S::Response; fn poll_ready(&mut self, cx: &mut Context<'_>) -> Poll<Result<(), Self::Error>> { self.inner.poll_ready(cx) } fn call(&mut self, mut req: Request<ReqBody>) -> Self::Future { let not_ready_inner = self.inner.clone(); let mut inner = std::mem::replace(&mut self.inner, not_ready_inner); Box::pin(async move { let vals = CasbinVals { subject: vec!["alice".to_string()], domain: None, }; req.extensions_mut().insert(vals); inner.call(req).await }) } } // Handler that immediately returns an empty `200 OK` response. async fn handler() {} #[cfg_attr(feature = "runtime-tokio", tokio::test)] #[cfg_attr(feature = "runtime-async-std", async_std::test)] async fn test_middleware() { let m = DefaultModel::from_file("examples/rbac_with_pattern_model.conf") .await .unwrap(); let a = FileAdapter::new("examples/rbac_with_pattern_policy.csv"); let casbin_middleware = CasbinAxumLayer::new(m, a).await.unwrap(); casbin_middleware .write() .await .get_role_manager() .write() .matching_fn(Some(key_match2), None); let app = Router::new() .route("/pen/1", get(handler)) .route("/pen/2", get(handler)) .route("/book/:id", get(handler)) .layer(casbin_middleware) .layer(FakeAuthLayer); let client = TestClient::new(app); let resp_pen_1 = client.get("/pen/1").await; assert_eq!(resp_pen_1.status(), StatusCode::OK); let resp_book = client.get("/book/2").await; assert_eq!(resp_book.status(), StatusCode::OK); let resp_pen_2 = client.get("/pen/2").await; assert_eq!(resp_pen_2.status(), StatusCode::FORBIDDEN); }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/constant/src/lib.rs
server/constant/src/lib.rs
pub mod definition;
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/constant/src/definition/consts.rs
server/constant/src/definition/consts.rs
use strum_macros::{AsRefStr, Display, EnumString}; /// Token 状态枚举 #[derive(Debug, Clone, PartialEq, Eq, AsRefStr, Display, EnumString)] #[strum(serialize_all = "SCREAMING_SNAKE_CASE")] pub enum TokenStatus { /// 活跃状态,可以正常使用 Active, /// 已被刷新,表示该 token 已被新 token 替换 Refreshed, /// 已被撤销(手动注销或安全原因) Revoked, } impl TokenStatus { pub fn is_valid(&self) -> bool { matches!(self, TokenStatus::Active) } pub fn can_refresh(&self) -> bool { matches!(self, TokenStatus::Active) } } /// 系统事件类型枚举 #[derive(Debug, Clone, PartialEq, Eq, AsRefStr, Display, EnumString)] #[strum(serialize_all = "snake_case")] pub enum SystemEvent { /// 用户认证登录事件 AuthLoggedInEvent, /// 系统操作日志事件 AuditOperationLoggedEvent, /// API密钥验证事件 AuthApiKeyValidatedEvent, }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/constant/src/definition/mod.rs
server/constant/src/definition/mod.rs
pub use audience_const::Audience; mod audience_const; pub mod consts;
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/constant/src/definition/audience_const.rs
server/constant/src/definition/audience_const.rs
/// Enum to represent different platforms or audiences for JWT authentication. #[derive(Debug, Clone, Copy, PartialEq, Eq, Hash)] pub enum Audience { /// Audience for the official website. OfficialWebsite, /// Audience for the admin control panel. ManagementPlatform, /// Audience for the mobile application. MobileApp, /// Audience for mini-programs or widgets. MiniProgram, } impl Audience { /// Returns the audience string associated with each platform. pub fn as_str(self) -> &'static str { match self { Audience::OfficialWebsite => "official_website", Audience::ManagementPlatform => "management_platform", Audience::MobileApp => "mobile_app", Audience::MiniProgram => "mini_program", } } }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/service/src/lib.rs
server/service/src/lib.rs
pub mod admin; mod helper; pub use server_constant::definition::Audience; pub use server_global::{project_error, project_info}; pub use server_model::admin::entities::sys_endpoint::Model as SysEndpoint;
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/service/src/admin/sys_operation_log_service.rs
server/service/src/admin/sys_operation_log_service.rs
use std::any::Any; use async_trait::async_trait; use sea_orm::{ ActiveModelTrait, ColumnTrait, Condition, EntityTrait, PaginatorTrait, QueryFilter, QueryOrder, Set, }; use server_core::web::{error::AppError, page::PaginatedData}; use server_global::{global::OperationLogContext, project_error}; use server_model::admin::{ entities::{ prelude::SysOperationLog, sys_operation_log::{ ActiveModel as SysOperationLogActiveModel, Column as SysOperationLogColumn, Model as SysOperationLogModel, }, }, input::OperationLogPageRequest, }; use tracing::instrument; use ulid::Ulid; use crate::helper::db_helper; #[async_trait] pub trait TOperationLogService { async fn find_paginated_operation_logs( &self, params: OperationLogPageRequest, ) -> Result<PaginatedData<SysOperationLogModel>, AppError>; async fn handle_operation_log_event(event: &OperationLogContext) -> Result<(), AppError>; } pub struct SysOperationLogService; #[async_trait] impl TOperationLogService for SysOperationLogService { async fn find_paginated_operation_logs( &self, params: OperationLogPageRequest, ) -> Result<PaginatedData<SysOperationLogModel>, AppError> { let db = db_helper::get_db_connection().await?; let mut query = SysOperationLog::find(); if let Some(ref keywords) = params.keywords { let condition = Condition::any() .add(SysOperationLogColumn::Domain.contains(keywords)) .add(SysOperationLogColumn::Username.contains(keywords)) .add(SysOperationLogColumn::Ip.contains(keywords)) .add(SysOperationLogColumn::UserAgent.contains(keywords)); query = query.filter(condition); } query = query.order_by_desc(SysOperationLogColumn::CreatedAt); let total = query .clone() .count(db.as_ref()) .await .map_err(AppError::from)?; let paginator = query.paginate(db.as_ref(), params.page_details.size); let records = paginator .fetch_page(params.page_details.current - 1) .await .map_err(AppError::from)?; Ok(PaginatedData { current: params.page_details.current, size: params.page_details.size, total, records, }) } async fn handle_operation_log_event(event: &OperationLogContext) -> Result<(), AppError> { let db = db_helper::get_db_connection().await?; SysOperationLogActiveModel { id: Set(Ulid::new().to_string()), user_id: Set(event.user_id.clone().unwrap_or_default()), username: Set(event.username.clone().unwrap_or_default()), domain: Set(event.domain.clone().unwrap_or_default()), module_name: Set(event.module_name.clone()), description: Set(event.description.clone()), request_id: Set(event.request_id.clone()), method: Set(event.method.clone()), url: Set(event.url.clone()), ip: Set(event.ip.clone()), user_agent: Set(event.user_agent.clone()), params: Set(event.params.clone()), body: Set(event.body.clone()), response: Set(event.response.clone()), start_time: Set(event.start_time), end_time: Set(event.end_time), duration: Set(event.duration), created_at: Set(event.created_at), } .insert(db.as_ref()) .await .map_err(AppError::from)?; Ok(()) } } #[instrument(skip(rx))] pub async fn sys_operation_log_listener( mut rx: tokio::sync::mpsc::UnboundedReceiver<Box<dyn Any + Send>>, ) { while let Some(event) = rx.recv().await { if let Some(operation_log_context) = event.downcast_ref::<OperationLogContext>() { if let Err(e) = SysOperationLogService::handle_operation_log_event(operation_log_context).await { project_error!("Failed to handle operation log event: {:?}", e); } } else { project_error!("Received unknown event type in operation log listener"); } } }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/service/src/admin/sys_access_key_service.rs
server/service/src/admin/sys_access_key_service.rs
use std::any::Any; use async_trait::async_trait; use chrono::Local; use sea_orm::{ ActiveModelTrait, ColumnTrait, Condition, DatabaseTransaction, EntityTrait, PaginatorTrait, QueryFilter, Set, TransactionTrait, }; use server_core::{ sign::{ApiKeyEvent, ValidatorType}, web::{error::AppError, page::PaginatedData}, }; use server_global::project_info; use server_model::admin::{ entities::{ prelude::SysAccessKey, sys_access_key::{ ActiveModel as SysAccessKeyActiveModel, Column as SysAccessKeyColumn, Model as SysAccessKeyModel, }, }, input::{AccessKeyPageRequest, CreateAccessKeyInput}, }; use tracing::instrument; use ulid::Ulid; use crate::helper::db_helper; use super::sys_access_key_error::AccessKeyError; #[async_trait] pub trait TAccessKeyService { async fn find_paginated_access_keys( &self, params: AccessKeyPageRequest, ) -> Result<PaginatedData<SysAccessKeyModel>, AppError>; async fn create_access_key( &self, input: CreateAccessKeyInput, ) -> Result<SysAccessKeyModel, AppError>; async fn delete_access_key(&self, id: &str) -> Result<(), AppError>; async fn initialize_access_key(&self) -> Result<(), AppError>; } #[derive(Clone)] pub struct SysAccessKeyService; impl SysAccessKeyService { async fn create_access_key_in_transaction( &self, txn: &DatabaseTransaction, access_key: SysAccessKeyActiveModel, ) -> Result<SysAccessKeyModel, AppError> { let result = access_key.insert(txn).await.map_err(AppError::from)?; // 添加到验证器 server_core::sign::add_key(ValidatorType::Simple, &result.access_key_id, None).await; server_core::sign::add_key( ValidatorType::Complex, &result.access_key_id, Some(&result.access_key_secret), ) .await; Ok(result) } async fn delete_access_key_in_transaction( &self, txn: &DatabaseTransaction, id: &str, ) -> Result<(), AppError> { // 先获取 access key 信息 let access_key = SysAccessKey::find_by_id(id) .one(txn) .await .map_err(AppError::from)? .ok_or_else(|| AppError::from(AccessKeyError::AccessKeyNotFound))?; // 从数据库中删除 SysAccessKey::delete_by_id(id) .exec(txn) .await .map_err(AppError::from)?; // 从验证器中移除 server_core::sign::remove_key(ValidatorType::Simple, &access_key.access_key_id).await; server_core::sign::remove_key(ValidatorType::Complex, &access_key.access_key_id).await; Ok(()) } } #[async_trait] impl TAccessKeyService for SysAccessKeyService { async fn find_paginated_access_keys( &self, params: AccessKeyPageRequest, ) -> Result<PaginatedData<SysAccessKeyModel>, AppError> { let db = db_helper::get_db_connection().await?; let mut query = SysAccessKey::find(); if let Some(ref keywords) = params.keywords { let condition = Condition::any().add(SysAccessKeyColumn::Domain.contains(keywords)); query = query.filter(condition); } let total = query .clone() .count(db.as_ref()) .await .map_err(AppError::from)?; let paginator = query.paginate(db.as_ref(), params.page_details.size); let records = paginator .fetch_page(params.page_details.current - 1) .await .map_err(AppError::from)?; Ok(PaginatedData { current: params.page_details.current, size: params.page_details.size, total, records, }) } async fn create_access_key( &self, input: CreateAccessKeyInput, ) -> Result<SysAccessKeyModel, AppError> { let db = db_helper::get_db_connection().await?; let txn = db.begin().await.map_err(AppError::from)?; let access_key_id = format!("AK{}", Ulid::new().to_string()); let access_key_secret = format!("SK{}", Ulid::new().to_string()); let access_key = SysAccessKeyActiveModel { id: Set(Ulid::new().to_string()), domain: Set(input.domain), status: Set(input.status), description: Set(input.description), access_key_id: Set(access_key_id), access_key_secret: Set(access_key_secret), created_at: Set(Local::now().naive_local()), created_by: Set("TODO".to_string()), ..Default::default() }; let result = match self .create_access_key_in_transaction(&txn, access_key) .await { Ok(result) => { txn.commit().await.map_err(AppError::from)?; result }, Err(e) => { txn.rollback().await.map_err(AppError::from)?; return Err(e); }, }; Ok(result) } async fn delete_access_key(&self, id: &str) -> Result<(), AppError> { let db = db_helper::get_db_connection().await?; let txn = db.begin().await.map_err(AppError::from)?; match self.delete_access_key_in_transaction(&txn, id).await { Ok(_) => { txn.commit().await.map_err(AppError::from)?; Ok(()) }, Err(e) => { txn.rollback().await.map_err(AppError::from)?; Err(e) }, } } async fn initialize_access_key(&self) -> Result<(), AppError> { let db = db_helper::get_db_connection().await?; let access_keys = SysAccessKey::find() .all(db.as_ref()) .await .map_err(AppError::from)?; for access_key in access_keys { server_core::sign::add_key(ValidatorType::Simple, &access_key.access_key_id, None) .await; server_core::sign::add_key( ValidatorType::Complex, &access_key.access_key_id, Some(&access_key.access_key_secret), ) .await; } Ok(()) } } #[instrument(skip(rx))] pub async fn api_key_validate_listener( mut rx: tokio::sync::mpsc::UnboundedReceiver<Box<dyn Any + Send>>, ) { while let Some(event) = rx.recv().await { if let Some(api_key_event) = event.downcast_ref::<ApiKeyEvent>() { project_info!("API key validated: {:?}", api_key_event); } } }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/service/src/admin/sys_organization_service.rs
server/service/src/admin/sys_organization_service.rs
use async_trait::async_trait; use sea_orm::{ColumnTrait, Condition, EntityTrait, PaginatorTrait, QueryFilter}; use server_core::web::{error::AppError, page::PaginatedData}; use server_model::admin::{ entities::{ prelude::SysOrganization, sys_organization::{Column as SysOrganizationColumn, Model as SysOrganizationModel}, }, input::OrganizationPageRequest, }; use crate::helper::db_helper; #[async_trait] pub trait TOrganizationService { async fn find_paginated_organizations( &self, params: OrganizationPageRequest, ) -> Result<PaginatedData<SysOrganizationModel>, AppError>; } pub struct SysOrganizationService; #[async_trait] impl TOrganizationService for SysOrganizationService { async fn find_paginated_organizations( &self, params: OrganizationPageRequest, ) -> Result<PaginatedData<SysOrganizationModel>, AppError> { let db = db_helper::get_db_connection().await?; let mut query = SysOrganization::find(); if let Some(ref keywords) = params.keywords { let condition = Condition::any() .add(SysOrganizationColumn::Code.contains(keywords)) .add(SysOrganizationColumn::Name.contains(keywords)) .add(SysOrganizationColumn::Description.contains(keywords)); query = query.filter(condition); } let total = query .clone() .count(db.as_ref()) .await .map_err(AppError::from)?; let paginator = query.paginate(db.as_ref(), params.page_details.size); let records = paginator .fetch_page(params.page_details.current - 1) .await .map_err(AppError::from)?; Ok(PaginatedData { current: params.page_details.current, size: params.page_details.size, total, records, }) } }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/service/src/admin/sys_endpoint_service.rs
server/service/src/admin/sys_endpoint_service.rs
use std::collections::BTreeMap; use async_trait::async_trait; use chrono::Local; use sea_orm::{ ColumnTrait, Condition, DatabaseConnection, DeleteResult, EntityTrait, IntoActiveModel, PaginatorTrait, QueryFilter, Set, }; use server_core::web::{error::AppError, page::PaginatedData}; use server_model::admin::{ entities::{ prelude::SysEndpoint, sys_endpoint::{ ActiveModel as SysEndpointActiveModel, Column as SysEndpointColumn, Model as SysEndpointModel, }, }, input::EndpointPageRequest, output::EndpointTree, }; use crate::helper::db_helper; #[async_trait] pub trait TEndpointService { async fn sync_endpoints(&self, endpoints: Vec<SysEndpointModel>) -> Result<(), AppError>; async fn find_paginated_endpoints( &self, params: EndpointPageRequest, ) -> Result<PaginatedData<SysEndpointModel>, AppError>; async fn tree_endpoint(&self) -> Result<Vec<EndpointTree>, AppError>; } pub struct SysEndpointService; impl SysEndpointService { async fn batch_update_endpoints( &self, db: &DatabaseConnection, endpoints: Vec<SysEndpointModel>, ) -> Result<(), AppError> { let now = Local::now().naive_local(); let active_models: Vec<SysEndpointActiveModel> = endpoints .into_iter() .map(|endpoint| { let mut active_model: SysEndpointActiveModel = endpoint.into_active_model(); active_model.updated_at = Set(Some(now)); active_model }) .collect(); SysEndpoint::insert_many(active_models) .on_conflict( sea_orm::sea_query::OnConflict::column(SysEndpointColumn::Id) .update_columns([ SysEndpointColumn::Path, SysEndpointColumn::Method, SysEndpointColumn::Action, SysEndpointColumn::Resource, SysEndpointColumn::Controller, SysEndpointColumn::Summary, SysEndpointColumn::UpdatedAt, ]) .to_owned(), ) .exec(db) .await .map_err(AppError::from)?; Ok(()) } async fn batch_remove_endpoints( &self, db: &DatabaseConnection, endpoints_to_remove: Vec<String>, ) -> Result<DeleteResult, AppError> { SysEndpoint::delete_many() .filter(SysEndpointColumn::Id.is_in(endpoints_to_remove)) .exec(db) .await .map_err(AppError::from) } fn create_endpoint_tree(&self, endpoints: &[SysEndpointModel]) -> Vec<EndpointTree> { let mut controller_map: BTreeMap<String, EndpointTree> = BTreeMap::new(); for endpoint in endpoints { let controller = endpoint.controller.clone(); let controller_node = controller_map .entry(controller.clone()) .or_insert(EndpointTree { id: format!("controller-{}", controller), path: String::new(), method: String::new(), action: String::new(), resource: String::new(), controller: controller.clone(), summary: None, children: Some(Vec::new()), }); if let Some(children) = &mut controller_node.children { children.push(EndpointTree { id: endpoint.id.to_string(), path: endpoint.path.clone(), method: endpoint.method.clone(), action: endpoint.action.clone(), resource: endpoint.resource.clone(), controller: endpoint.controller.clone(), summary: endpoint.summary.clone(), children: Some(Vec::new()), }); } } controller_map.into_values().collect() } } #[async_trait] impl TEndpointService for SysEndpointService { async fn sync_endpoints(&self, new_endpoints: Vec<SysEndpointModel>) -> Result<(), AppError> { let db = db_helper::get_db_connection().await?; // 获取数据库中现有的所有端点 let existing_endpoints = SysEndpoint::find() .all(db.as_ref()) .await .map_err(AppError::from)?; // 批量更新和插入新的端点 self.batch_update_endpoints(db.as_ref(), new_endpoints.clone()) .await?; // 只有在数据库中已经存在端点的情况下才执行删除操作 if !existing_endpoints.is_empty() { // 找出需要删除的端点 let endpoints_to_remove: Vec<String> = existing_endpoints .iter() .filter(|existing_endpoint| { !new_endpoints.iter().any(|e| { e.path == existing_endpoint.path && e.method == existing_endpoint.method }) }) .map(|endpoint| endpoint.id.clone()) .collect(); // 批量删除不再存在的端点 if !endpoints_to_remove.is_empty() { self.batch_remove_endpoints(db.as_ref(), endpoints_to_remove) .await?; } } Ok(()) } async fn find_paginated_endpoints( &self, params: EndpointPageRequest, ) -> Result<PaginatedData<SysEndpointModel>, AppError> { let db = db_helper::get_db_connection().await?; let mut query = SysEndpoint::find(); if let Some(ref keywords) = params.keywords { let condition = Condition::any() .add(SysEndpointColumn::Path.contains(keywords)) .add(SysEndpointColumn::Method.contains(keywords)) .add(SysEndpointColumn::Controller.contains(keywords)); query = query.filter(condition); } let total = query .clone() .count(db.as_ref()) .await .map_err(AppError::from)?; let paginator = query.paginate(db.as_ref(), params.page_details.size); let records = paginator .fetch_page(params.page_details.current - 1) .await .map_err(AppError::from)?; Ok(PaginatedData { current: params.page_details.current, size: params.page_details.size, total, records, }) } async fn tree_endpoint(&self) -> Result<Vec<EndpointTree>, AppError> { let db = db_helper::get_db_connection().await?; let endpoints = SysEndpoint::find() .all(db.as_ref()) .await .map_err(AppError::from)?; Ok(self.create_endpoint_tree(&endpoints)) } }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/service/src/admin/sys_domain_service.rs
server/service/src/admin/sys_domain_service.rs
use async_trait::async_trait; use chrono::Local; use sea_orm::{ ActiveModelTrait, ColumnTrait, Condition, EntityTrait, PaginatorTrait, QueryFilter, Set, }; use server_core::web::{error::AppError, page::PaginatedData}; use server_model::admin::{ entities::{ prelude::SysDomain, sea_orm_active_enums::Status, sys_domain::{ ActiveModel as SysDomainActiveModel, Column as SysDomainColumn, Model as SysDomainModel, }, }, input::{CreateDomainInput, DomainPageRequest, UpdateDomainInput}, }; use ulid::Ulid; use crate::{admin::sys_domain_error::DomainError, helper::db_helper}; #[async_trait] pub trait TDomainService { async fn find_paginated_domains( &self, params: DomainPageRequest, ) -> Result<PaginatedData<SysDomainModel>, AppError>; async fn create_domain(&self, input: CreateDomainInput) -> Result<SysDomainModel, AppError>; async fn get_domain(&self, id: &str) -> Result<SysDomainModel, AppError>; async fn update_domain(&self, input: UpdateDomainInput) -> Result<SysDomainModel, AppError>; async fn delete_domain(&self, id: &str) -> Result<(), AppError>; } #[derive(Clone)] pub struct SysDomainService; impl SysDomainService { async fn check_domain_exists( &self, id: Option<&str>, code: &str, name: &str, ) -> Result<(), AppError> { let id_str = id.unwrap_or("-1"); let db = db_helper::get_db_connection().await?; let code_exists = SysDomain::find() .filter(SysDomainColumn::Code.eq(code)) .filter(SysDomainColumn::Id.ne(id_str)) .one(db.as_ref()) .await .map_err(AppError::from)? .is_some(); if code_exists { return Err(DomainError::DuplicateCode.into()); } let name_exists = SysDomain::find() .filter(SysDomainColumn::Name.eq(name)) .filter(SysDomainColumn::Id.ne(id_str)) .one(db.as_ref()) .await .map_err(AppError::from)? .is_some(); if name_exists { return Err(DomainError::DuplicateName.into()); } Ok(()) } } #[async_trait] impl TDomainService for SysDomainService { async fn find_paginated_domains( &self, params: DomainPageRequest, ) -> Result<PaginatedData<SysDomainModel>, AppError> { let db = db_helper::get_db_connection().await?; let mut query = SysDomain::find(); if let Some(ref keywords) = params.keywords { let condition = Condition::any().add(SysDomainColumn::Name.contains(keywords)); query = query.filter(condition); } let total = query .clone() .count(db.as_ref()) .await .map_err(AppError::from)?; let paginator = query.paginate(db.as_ref(), params.page_details.size); let records = paginator .fetch_page(params.page_details.current - 1) .await .map_err(AppError::from)?; Ok(PaginatedData { current: params.page_details.current, size: params.page_details.size, total, records, }) } async fn create_domain(&self, input: CreateDomainInput) -> Result<SysDomainModel, AppError> { self.check_domain_exists(None, &input.code, &input.name) .await?; let db = db_helper::get_db_connection().await?; let domain = SysDomainActiveModel { id: Set(Ulid::new().to_string()), code: Set(input.code), name: Set(input.name), description: Set(input.description), status: Set(Status::Enabled), created_at: Set(Local::now().naive_local()), created_by: Set("TODO".to_string()), ..Default::default() }; let result = domain.insert(db.as_ref()).await.map_err(AppError::from)?; Ok(result) } async fn get_domain(&self, id: &str) -> Result<SysDomainModel, AppError> { let db = db_helper::get_db_connection().await?; SysDomain::find_by_id(id) .one(db.as_ref()) .await .map_err(AppError::from)? .ok_or_else(|| DomainError::DomainNotFound.into()) } async fn update_domain(&self, input: UpdateDomainInput) -> Result<SysDomainModel, AppError> { let db = db_helper::get_db_connection().await?; let existing_domain = self.get_domain(&input.id).await?; if existing_domain.code == "built-in" { return Err(DomainError::BuiltInDomain.into()); } self.check_domain_exists(Some(&input.id), &input.domain.code, &input.domain.name) .await?; let mut domain: SysDomainActiveModel = existing_domain.into(); domain.code = Set(input.domain.code); domain.name = Set(input.domain.name); domain.description = Set(input.domain.description); let updated_domain = domain.update(db.as_ref()).await.map_err(AppError::from)?; Ok(updated_domain) } async fn delete_domain(&self, id: &str) -> Result<(), AppError> { let domain = self.get_domain(id).await?; if domain.code == "built-in" { return Err(DomainError::BuiltInDomain.into()); } let db = db_helper::get_db_connection().await?; SysDomain::delete_by_id(id) .exec(db.as_ref()) .await .map_err(AppError::from)?; Ok(()) } }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/service/src/admin/sys_role_service.rs
server/service/src/admin/sys_role_service.rs
use async_trait::async_trait; use chrono::Local; use sea_orm::{ ActiveModelTrait, ColumnTrait, Condition, EntityTrait, PaginatorTrait, QueryFilter, Set, }; use server_core::web::{error::AppError, page::PaginatedData}; use server_model::admin::{ entities::{ prelude::SysRole, sys_role::{ ActiveModel as SysRoleActiveModel, Column as SysRoleColumn, Model as SysRoleModel, }, }, input::{CreateRoleInput, RolePageRequest, UpdateRoleInput}, }; use super::sys_role_error::RoleError; use crate::helper::db_helper; use ulid::Ulid; #[async_trait] pub trait TRoleService { async fn find_paginated_roles( &self, params: RolePageRequest, ) -> Result<PaginatedData<SysRoleModel>, AppError>; async fn create_role(&self, input: CreateRoleInput) -> Result<SysRoleModel, AppError>; async fn get_role(&self, id: &str) -> Result<SysRoleModel, AppError>; async fn update_role(&self, input: UpdateRoleInput) -> Result<SysRoleModel, AppError>; async fn delete_role(&self, id: &str) -> Result<(), AppError>; } #[derive(Clone)] pub struct SysRoleService; impl SysRoleService { async fn check_role_exists(&self, id: Option<&str>, code: &str) -> Result<(), AppError> { let db = db_helper::get_db_connection().await?; let mut query = SysRole::find().filter(SysRoleColumn::Code.eq(code)); if let Some(id) = id { query = query.filter(SysRoleColumn::Id.ne(id)); } let existing_role = query.one(db.as_ref()).await.map_err(AppError::from)?; if existing_role.is_some() { return Err(RoleError::DuplicateRoleCode.into()); } Ok(()) } } #[async_trait] impl TRoleService for SysRoleService { async fn find_paginated_roles( &self, params: RolePageRequest, ) -> Result<PaginatedData<SysRoleModel>, AppError> { let db = db_helper::get_db_connection().await?; let mut query = SysRole::find(); if let Some(ref keywords) = params.keywords { let condition = Condition::any().add(SysRoleColumn::Name.contains(keywords)); query = query.filter(condition); } let total = query .clone() .count(db.as_ref()) .await .map_err(AppError::from)?; let paginator = query.paginate(db.as_ref(), params.page_details.size); let records = paginator .fetch_page(params.page_details.current - 1) .await .map_err(AppError::from)?; Ok(PaginatedData { current: params.page_details.current, size: params.page_details.size, total, records, }) } async fn create_role(&self, input: CreateRoleInput) -> Result<SysRoleModel, AppError> { let db = db_helper::get_db_connection().await?; self.check_role_exists(None, &input.code).await?; let role = SysRoleActiveModel { id: Set(Ulid::new().to_string()), pid: Set(input.pid), code: Set(input.code), name: Set(input.name), status: Set(input.status), description: Set(input.description), created_at: Set(Local::now().naive_local()), created_by: Set("TODO".to_string()), ..Default::default() }; let result = role.insert(db.as_ref()).await.map_err(AppError::from)?; Ok(result) } async fn get_role(&self, id: &str) -> Result<SysRoleModel, AppError> { let db = db_helper::get_db_connection().await?; SysRole::find_by_id(id) .one(db.as_ref()) .await .map_err(AppError::from)? .ok_or_else(|| RoleError::RoleNotFound.into()) } async fn update_role(&self, input: UpdateRoleInput) -> Result<SysRoleModel, AppError> { let db = db_helper::get_db_connection().await?; self.check_role_exists(Some(&input.id), &input.role.code) .await?; let role: SysRoleActiveModel = SysRole::find_by_id(&input.id) .one(db.as_ref()) .await .map_err(AppError::from)? .ok_or_else(|| AppError::from(RoleError::RoleNotFound))? .into(); let role = SysRoleActiveModel { id: Set(input.id.clone()), pid: Set(input.role.pid), code: Set(input.role.code), name: Set(input.role.name), description: Set(input.role.description), updated_at: Set(Some(Local::now().naive_local())), ..role }; let updated_role = role.update(db.as_ref()).await.map_err(AppError::from)?; Ok(updated_role) } async fn delete_role(&self, id: &str) -> Result<(), AppError> { let db = db_helper::get_db_connection().await?; SysRole::delete_by_id(id) .exec(db.as_ref()) .await .map_err(AppError::from)?; Ok(()) } }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/service/src/admin/mod.rs
server/service/src/admin/mod.rs
pub use errors::*; pub use server_model::admin::{ entities::{ prelude::{SysDomain, SysEndpoint, SysMenu, SysRole, SysUser}, sys_access_key::Model as SysAccessKeyModel, sys_domain::Model as SysDomainModel, sys_endpoint::Model as SysEndpointModel, sys_login_log::Model as SysLoginLogModel, sys_menu::Model as SysMenuModel, sys_operation_log::Model as SysOperationLogModel, sys_organization::Model as SysOrganizationModel, sys_role::Model as SysRoleModel, }, input::*, output::*, }; pub use sys_access_key_service::{ api_key_validate_listener, SysAccessKeyService, TAccessKeyService, }; pub use sys_auth_service::{ auth_login_listener, jwt_created_listener, SysAuthService, TAuthService, }; pub use sys_authorization_service::{SysAuthorizationService, TAuthorizationService}; pub use sys_domain_service::{SysDomainService, TDomainService}; pub use sys_endpoint_service::{SysEndpointService, TEndpointService}; pub use sys_login_log_service::{SysLoginLogService, TLoginLogService}; pub use sys_menu_service::{SysMenuService, TMenuService}; pub use sys_operation_log_service::{ sys_operation_log_listener, SysOperationLogService, TOperationLogService, }; pub use sys_organization_service::{SysOrganizationService, TOrganizationService}; pub use sys_role_service::{SysRoleService, TRoleService}; pub use sys_user_service::{SysUserService, TUserService}; pub mod dto; pub mod errors; mod sys_access_key_service; mod sys_auth_service; mod sys_authorization_service; mod sys_domain_service; mod sys_endpoint_service; mod sys_login_log_service; mod sys_menu_service; mod sys_operation_log_service; mod sys_organization_service; mod sys_role_service; mod sys_user_service; mod event_handlers; mod events;
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/service/src/admin/sys_auth_service.rs
server/service/src/admin/sys_auth_service.rs
use std::any::Any; use async_trait::async_trait; use sea_orm::{ ColumnTrait, DatabaseConnection, EntityTrait, JoinType, QueryFilter, QueryOrder, QuerySelect, RelationTrait, }; use server_constant::definition::{consts::SystemEvent, Audience}; use server_core::web::{ auth::Claims, error::AppError, jwt::{JwtError, JwtUtils}, }; use server_global::global; use server_model::admin::{ entities::{ prelude::{SysRole, SysUser}, sea_orm_active_enums::Status, sys_domain::Column as SysDomainColumn, sys_menu::{Column as SysMenuColumn, Entity as SysMenuEntity, Model as SysMenuModel}, sys_role::{Column as SysRoleColumn, Entity as SysRoleEntity, Relation as SysRoleRelation}, sys_role_menu::{Column as SysRoleMenuColumn, Entity as SysRoleMenuEntity}, sys_user::{Column as SysUserColumn, Relation as SysUserRelation}, sys_user_role::Relation as SysUserRoleRelation, }, input::LoginInput, output::{AuthOutput, MenuRoute, RouteMeta, UserRoute, UserWithDomainAndOrgOutput}, }; use server_utils::{SecureUtil, TreeBuilder}; use thiserror::Error; use tokio::sync::mpsc; use tracing::{error, instrument}; use ulid::Ulid; use super::{ dto::sys_auth_dto::LoginContext, event_handlers::auth_event_handler::AuthEventHandler, }; use crate::{ admin::{event_handlers::auth_event_handler::AuthEvent, sys_user_error::UserError}, helper::db_helper, project_error, project_info, }; macro_rules! select_user_with_domain_and_org_info { ($query:expr) => {{ $query .select_only() .column_as(SysUserColumn::Id, "id") .column_as(SysUserColumn::Domain, "domain") .column_as(SysUserColumn::Username, "username") .column_as(SysUserColumn::Password, "password") .column_as(SysUserColumn::NickName, "nick_name") .column_as(SysUserColumn::Avatar, "avatar") .column_as(SysDomainColumn::Code, "domain_code") .column_as(SysDomainColumn::Name, "domain_name") }}; } #[derive(Error, Debug)] pub enum EventError { #[error("Failed to send event: {0}")] SendError(#[from] tokio::sync::mpsc::error::SendError<Box<dyn std::any::Any + Send>>), #[error("Failed to handle login event: {0}")] LoginHandlerError(String), } #[async_trait] pub trait TAuthService: Send + Sync { async fn pwd_login( &self, input: LoginInput, context: LoginContext, ) -> Result<AuthOutput, AppError>; async fn get_user_routes( &self, role_codes: &[String], domain: &str, ) -> Result<UserRoute, AppError>; } #[derive(Clone)] pub struct SysAuthService; impl SysAuthService { /// 查找第一个有效的路由路径 #[allow(dead_code)] fn find_first_valid_route(routes: &[MenuRoute]) -> Option<String> { for route in routes { if !route.path.is_empty() && route.path != "/" { return Some(route.path.clone()); } if let Some(children) = &route.children { if let Some(path) = Self::find_first_valid_route(children) { return Some(path); } } } None } } #[async_trait] impl TAuthService for SysAuthService { #[instrument(skip(self, input), fields(username = %input.identifier, domain = %context.domain))] async fn pwd_login( &self, input: LoginInput, context: LoginContext, ) -> Result<AuthOutput, AppError> { // 验证用户并获取角色 let (user, role_codes) = self .verify_user(&input.identifier, &input.password, &context.domain) .await?; // 生成认证输出 let auth_output = generate_auth_output( user.id.clone(), user.username.clone(), role_codes, user.domain_code.clone(), None, context.audience, ) .await?; // 发送认证事件 self.send_login_event(&user, &auth_output, &context).await; Ok(auth_output) } #[instrument(skip(self), fields(roles = ?role_codes, domain = %domain))] async fn get_user_routes( &self, role_codes: &[String], domain: &str, ) -> Result<UserRoute, AppError> { if role_codes.is_empty() { return Ok(UserRoute { routes: vec![], home: "/home".to_string(), }); } let db = db_helper::get_db_connection().await?; let menu_ids = SysRoleMenuEntity::find() .select_only() .column(SysRoleMenuColumn::MenuId) .join_rev( JoinType::InnerJoin, SysRoleEntity::has_many(SysRoleMenuEntity).into(), ) .filter(SysRoleColumn::Code.is_in(role_codes.to_vec())) .filter(SysRoleMenuColumn::Domain.eq(domain)) .distinct() .into_tuple::<i32>() .all(db.as_ref()) .await?; let menus = SysMenuEntity::find() .filter(SysMenuColumn::Id.is_in(menu_ids)) .filter(SysMenuColumn::Status.eq(Status::Enabled)) .order_by_asc(SysMenuColumn::Sequence) .into_model::<SysMenuModel>() .all(db.as_ref()) .await?; let menu_routes: Vec<MenuRoute> = menus .into_iter() .map(|menu| MenuRoute { name: menu.route_name, path: menu.route_path, component: menu.component, meta: RouteMeta { title: menu.menu_name, i18n_key: menu.i18n_key, keep_alive: menu.keep_alive, constant: menu.constant, icon: menu.icon, order: menu.sequence, href: menu.href, hide_in_menu: menu.hide_in_menu, active_menu: menu.active_menu, multi_tab: menu.multi_tab, }, children: Some(vec![]), id: menu.id, pid: menu.pid, }) .collect(); let menu_routes_ref = menu_routes.clone(); let routes = TreeBuilder::build( menu_routes, |route| route.name.clone(), |route| { if route.pid == "0" { None } else { menu_routes_ref .iter() .find(|m| m.id.to_string() == route.pid) .map(|m| m.name.clone()) } }, |route| route.meta.order, |route, children| { route.children = Some(children); }, ); // let home = Self::find_first_valid_route(&routes).unwrap_or_else(|| "/home".to_string()); let home = "home".to_string(); Ok(UserRoute { routes, home }) } } impl SysAuthService { /// 验证用户身份 async fn verify_user( &self, identifier: &str, password: &str, domain: &str, ) -> Result<(UserWithDomainAndOrgOutput, Vec<String>), AppError> { let db = db_helper::get_db_connection().await?; let user = select_user_with_domain_and_org_info!(SysUser::find()) .filter(SysUserColumn::Username.eq(identifier)) .filter(SysDomainColumn::Code.eq(domain)) .join(JoinType::InnerJoin, SysUserRelation::SysDomain.def()) .into_model::<UserWithDomainAndOrgOutput>() .one(db.as_ref()) .await .map_err(AppError::from)? .ok_or_else(|| AppError::from(UserError::UserNotFound))?; //TODO validate user status and domain status // 验证密码 if !SecureUtil::verify_password(password.as_bytes(), &user.password) .map_err(|_| AppError::from(UserError::AuthenticationFailed))? { return Err(AppError::from(UserError::WrongPassword)); } // 获取角色 let role_codes = self.get_user_roles(&user.id, &db).await?; Ok((user, role_codes)) } /// 获取用户角色 async fn get_user_roles( &self, user_id: &str, db: &DatabaseConnection, ) -> Result<Vec<String>, AppError> { SysRole::find() .join(JoinType::InnerJoin, SysRoleRelation::SysUserRole.def()) .join(JoinType::InnerJoin, SysUserRoleRelation::SysUser.def()) .filter(SysUserColumn::Id.eq(user_id)) .all(db) .await .map(|roles| roles.iter().map(|role| role.code.clone()).collect()) .map_err(AppError::from) } async fn send_login_event( &self, user: &UserWithDomainAndOrgOutput, auth_output: &AuthOutput, context: &LoginContext, ) { let auth_event = AuthEvent { user_id: user.id.clone(), username: user.username.clone(), domain: user.domain_code.clone(), access_token: auth_output.token.clone(), refresh_token: auth_output.refresh_token.clone(), client_ip: context.client_ip.clone(), client_port: context.client_port, address: context.address.clone(), user_agent: context.user_agent.clone(), request_id: context.request_id.clone(), login_type: context.login_type.clone(), }; global::send_dyn_event( SystemEvent::AuthLoggedInEvent.as_ref(), Box::new(auth_event), ); } async fn check_login_security( &self, _username: &str, _client_ip: &str, ) -> Result<(), AppError> { // TODO: 实现登录安全检查 // 1. 检查登录失败次数 // 2. 检查 IP 黑名单 // 3. 检查账号是否被锁定 // 4. 检查是否在允许的时间范围内 Ok(()) } #[allow(dead_code)] async fn pwd_login_with_security( &self, input: LoginInput, context: LoginContext, ) -> Result<AuthOutput, AppError> { self.check_login_security(&input.identifier, &context.client_ip) .await?; self.pwd_login(input, context).await } } #[allow(dead_code)] #[instrument(skip(sender, auth_event))] async fn send_auth_event( sender: mpsc::UnboundedSender<Box<dyn std::any::Any + Send>>, auth_event: AuthEvent, ) -> Result<(), EventError> { sender .send(Box::new(auth_event)) .map_err(EventError::from)?; Ok(()) } pub async fn generate_auth_output( user_id: String, username: String, role_codes: Vec<String>, domain_code: String, organization_name: Option<String>, audience: Audience, ) -> Result<AuthOutput, JwtError> { let claims = Claims::new( user_id, audience.as_str().to_string(), username, role_codes, domain_code, organization_name, ); let token = JwtUtils::generate_token(&claims).await?; Ok(AuthOutput { token, refresh_token: Ulid::new().to_string(), }) } #[instrument(skip(rx))] pub async fn auth_login_listener( mut rx: tokio::sync::mpsc::UnboundedReceiver<Box<dyn Any + Send>>, ) { while let Some(event) = rx.recv().await { if let Some(auth_event) = event.downcast_ref::<AuthEvent>() { if let Err(e) = handle_auth_event(auth_event).await { project_error!("Failed to handle AuthEvent: {:?}", e); } } } } #[instrument(skip(auth_event), fields(user_id = %auth_event.user_id, username = %auth_event.username))] async fn handle_auth_event(auth_event: &AuthEvent) -> Result<(), EventError> { AuthEventHandler::handle_login(AuthEvent { user_id: auth_event.user_id.clone(), username: auth_event.username.clone(), domain: auth_event.domain.clone(), access_token: auth_event.access_token.clone(), refresh_token: auth_event.refresh_token.clone(), client_ip: auth_event.client_ip.clone(), address: auth_event.address.clone(), client_port: auth_event.client_port, user_agent: auth_event.user_agent.clone(), request_id: auth_event.request_id.clone(), login_type: auth_event.login_type.clone(), }) .await .map_err(|e| EventError::LoginHandlerError(format!("{:?}", e))) } #[instrument(skip(rx))] pub async fn jwt_created_listener(mut rx: tokio::sync::mpsc::UnboundedReceiver<String>) { while let Some(jwt) = rx.recv().await { project_info!("JWT created: {}", jwt); // TODO: Consider storing the token into the database } }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/service/src/admin/sys_authorization_service.rs
server/service/src/admin/sys_authorization_service.rs
use std::sync::Arc; use async_trait::async_trait; use axum_casbin::casbin::{CoreApi, MgmtApi, RbacApi}; use sea_orm::{ColumnTrait, EntityTrait, QueryFilter, TransactionTrait}; use server_core::web::error::AppError; use server_model::admin::entities::{ prelude::{SysDomain, SysEndpoint, SysMenu, SysRole, SysRoleMenu, SysUser, SysUserRole}, sys_domain::Column as SysDomainColumn, sys_endpoint::Column as SysEndpointColumn, sys_menu::Column as SysMenuColumn, sys_role::Column as SysRoleColumn, sys_role_menu::{ActiveModel as SysRoleMenuActiveModel, Column as SysRoleMenuColumn}, sys_user_role::{ActiveModel as SysUserRoleActiveModel, Column as SysUserRoleColumn}, }; use thiserror::Error; use tokio::sync::RwLock; use crate::helper::db_helper; #[derive(Error, Debug)] pub enum AuthorizationError { #[error("Domain not found")] DomainNotFound, #[error("Role not found")] RoleNotFound, #[error("One or more permissions not found")] PermissionsNotFound, #[error("One or more routes not found")] RoutesNotFound, #[error("One or more users not found")] UsersNotFound, } impl From<AuthorizationError> for AppError { fn from(error: AuthorizationError) -> Self { AppError { code: 400, message: error.to_string(), } } } #[async_trait] pub trait TAuthorizationService: Send + Sync { /// 为角色分配权限 async fn assign_permission( &self, domain: String, role_id: String, permissions: Vec<String>, enforcer: Arc<RwLock<impl CoreApi + MgmtApi + RbacApi + Send + Sync>>, ) -> Result<(), AppError>; /// 为角色分配路由 async fn assign_routes( &self, domain: String, role_id: String, route_ids: Vec<i32>, ) -> Result<(), AppError>; /// 为角色分配用户 async fn assign_users(&self, role_id: String, user_ids: Vec<String>) -> Result<(), AppError>; } #[derive(Clone)] pub struct SysAuthorizationService; impl SysAuthorizationService { async fn check_domain_and_role( &self, domain_code: &str, role_id: &str, ) -> Result<(String, String, String), AppError> { let db = db_helper::get_db_connection().await?; let domain = SysDomain::find() .filter(SysDomainColumn::Code.eq(domain_code)) .one(db.as_ref()) .await .map_err(AppError::from)?; let domain = domain.ok_or_else(|| AuthorizationError::DomainNotFound)?; let role = SysRole::find() .filter(SysRoleColumn::Id.eq(role_id)) .one(db.as_ref()) .await .map_err(AppError::from)?; let role = role.ok_or_else(|| AuthorizationError::RoleNotFound)?; Ok((domain.code, role_id.to_string(), role.code)) } async fn check_role(&self, role_id: &str) -> Result<String, AppError> { let db = db_helper::get_db_connection().await?; let role = SysRole::find() .filter(SysRoleColumn::Id.eq(role_id)) .one(db.as_ref()) .await .map_err(AppError::from)?; let role = role.ok_or_else(|| AuthorizationError::RoleNotFound)?; Ok(role.code) } /// 同步角色权限 async fn sync_role_permissions( &self, role_code: &str, domain: &str, new_permissions: Vec<server_model::admin::entities::sys_endpoint::Model>, enforcer: Arc<RwLock<impl CoreApi + MgmtApi + RbacApi + Send + Sync>>, ) -> Result<(), AppError> { let mut enforcer_write = enforcer.write().await; let existing_permissions = enforcer_write.get_filtered_policy(0, vec![role_code.to_string(), domain.to_string()]); println!("existing_permissions: {:?}", existing_permissions); let new_policies: Vec<Vec<String>> = new_permissions .iter() .map(|perm| { vec![ role_code.to_string(), domain.to_string(), perm.path.clone(), perm.method.clone(), ] }) .collect(); println!("new_policies: {:?}", new_policies); let existing_policies: Vec<Vec<String>> = existing_permissions .iter() .map(|perm| { vec![ perm[0].clone(), perm[1].clone(), perm[2].clone(), perm[3].clone(), ] }) .collect(); println!("existing_policies: {:?}", existing_policies); let policies_to_remove: Vec<Vec<String>> = existing_policies .iter() .filter(|policy| !new_policies.contains(policy)) .cloned() .collect(); let policies_to_add: Vec<Vec<String>> = new_policies .iter() .filter(|policy| !existing_policies.contains(policy)) .cloned() .collect(); if !policies_to_remove.is_empty() { let _ = enforcer_write .remove_policies(policies_to_remove) .await .map_err(|e| AppError { code: 500, message: e.to_string(), })?; } if !policies_to_add.is_empty() { let _ = enforcer_write .add_policies(policies_to_add) .await .map_err(|e| AppError { code: 500, message: e.to_string(), })?; } Ok(()) } } #[async_trait] impl TAuthorizationService for SysAuthorizationService { async fn assign_permission( &self, domain: String, role_id: String, permissions: Vec<String>, enforcer: Arc<RwLock<impl CoreApi + MgmtApi + RbacApi + Send + Sync>>, ) -> Result<(), AppError> { let (domain_code, _, role_code) = self.check_domain_and_role(&domain, &role_id).await?; let db = db_helper::get_db_connection().await?; let permissions = SysEndpoint::find() .filter(SysEndpointColumn::Id.is_in(permissions)) .all(db.as_ref()) .await .map_err(AppError::from)?; if permissions.is_empty() { return Err(AuthorizationError::PermissionsNotFound.into()); } self.sync_role_permissions(&role_code, &domain_code, permissions, enforcer) .await?; Ok(()) } async fn assign_routes( &self, domain: String, role_id: String, route_ids: Vec<i32>, ) -> Result<(), AppError> { let (domain_code, role_id, _) = self.check_domain_and_role(&domain, &role_id).await?; let db = db_helper::get_db_connection().await?; let routes = SysMenu::find() .filter(SysMenuColumn::Id.is_in(route_ids.clone())) .all(db.as_ref()) .await .map_err(AppError::from)?; if routes.is_empty() { return Err(AuthorizationError::RoutesNotFound.into()); } let existing_routes = SysRoleMenu::find() .filter( SysRoleMenuColumn::RoleId .eq(&role_id) .and(SysRoleMenuColumn::Domain.eq(&domain_code)), ) .all(db.as_ref()) .await .map_err(AppError::from)?; let existing_route_ids: Vec<i32> = existing_routes.iter().map(|r| r.menu_id).collect(); let new_route_ids: Vec<i32> = route_ids .iter() .filter(|id| !existing_route_ids.contains(id)) .cloned() .collect(); let route_ids_to_delete: Vec<i32> = existing_route_ids .iter() .filter(|id| !route_ids.contains(id)) .cloned() .collect(); let txn = db.begin().await.map_err(AppError::from)?; if !new_route_ids.is_empty() { let role_menus: Vec<SysRoleMenuActiveModel> = new_route_ids .iter() .map(|route_id| SysRoleMenuActiveModel { role_id: sea_orm::Set(role_id.clone()), menu_id: sea_orm::Set(*route_id), domain: sea_orm::Set(domain_code.clone()), ..Default::default() }) .collect(); SysRoleMenu::insert_many(role_menus) .exec(&txn) .await .map_err(AppError::from)?; } if !route_ids_to_delete.is_empty() { SysRoleMenu::delete_many() .filter( SysRoleMenuColumn::RoleId .eq(&role_id) .and(SysRoleMenuColumn::Domain.eq(&domain_code)) .and(SysRoleMenuColumn::MenuId.is_in(route_ids_to_delete)), ) .exec(&txn) .await .map_err(AppError::from)?; } txn.commit().await.map_err(AppError::from)?; Ok(()) } async fn assign_users(&self, role_id: String, user_ids: Vec<String>) -> Result<(), AppError> { let _ = self.check_role(&role_id).await?; let db = db_helper::get_db_connection().await?; let users = SysUser::find() .filter(server_model::admin::entities::sys_user::Column::Id.is_in(user_ids.clone())) .all(db.as_ref()) .await .map_err(AppError::from)?; if users.is_empty() { return Err(AuthorizationError::UsersNotFound.into()); } let existing_user_roles = SysUserRole::find() .filter(SysUserRoleColumn::RoleId.eq(&role_id)) .all(db.as_ref()) .await .map_err(AppError::from)?; let existing_user_ids: Vec<String> = existing_user_roles .iter() .map(|r| r.user_id.clone()) .collect(); let new_user_ids: Vec<String> = user_ids .iter() .filter(|id| !existing_user_ids.contains(id)) .cloned() .collect(); let user_ids_to_delete: Vec<String> = existing_user_ids .iter() .filter(|id| !user_ids.contains(id)) .cloned() .collect(); let txn = db.begin().await.map_err(AppError::from)?; if !new_user_ids.is_empty() { let user_roles: Vec<SysUserRoleActiveModel> = new_user_ids .iter() .map(|user_id| SysUserRoleActiveModel { role_id: sea_orm::Set(role_id.clone()), user_id: sea_orm::Set(user_id.clone()), ..Default::default() }) .collect(); SysUserRole::insert_many(user_roles) .exec(&txn) .await .map_err(AppError::from)?; } if !user_ids_to_delete.is_empty() { SysUserRole::delete_many() .filter( SysUserRoleColumn::RoleId .eq(&role_id) .and(SysUserRoleColumn::UserId.is_in(user_ids_to_delete)), ) .exec(&txn) .await .map_err(AppError::from)?; } txn.commit().await.map_err(AppError::from)?; Ok(()) } }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/service/src/admin/sys_login_log_service.rs
server/service/src/admin/sys_login_log_service.rs
use async_trait::async_trait; use sea_orm::{ColumnTrait, Condition, EntityTrait, PaginatorTrait, QueryFilter, QueryOrder}; use server_core::web::{error::AppError, page::PaginatedData}; use server_model::admin::{ entities::{ prelude::SysLoginLog, sys_login_log::{Column as SysLoginLogColumn, Model as SysLoginLogModel}, }, input::LoginLogPageRequest, }; use crate::helper::db_helper; #[async_trait] pub trait TLoginLogService { async fn find_paginated_login_logs( &self, params: LoginLogPageRequest, ) -> Result<PaginatedData<SysLoginLogModel>, AppError>; } pub struct SysLoginLogService; #[async_trait] impl TLoginLogService for SysLoginLogService { async fn find_paginated_login_logs( &self, params: LoginLogPageRequest, ) -> Result<PaginatedData<SysLoginLogModel>, AppError> { let db = db_helper::get_db_connection().await?; let mut query = SysLoginLog::find(); if let Some(ref keywords) = params.keywords { let condition = Condition::any() .add(SysLoginLogColumn::Domain.contains(keywords)) .add(SysLoginLogColumn::Username.contains(keywords)) .add(SysLoginLogColumn::Ip.contains(keywords)) .add(SysLoginLogColumn::Address.contains(keywords)) .add(SysLoginLogColumn::UserAgent.contains(keywords)); query = query.filter(condition); } query = query.order_by_desc(SysLoginLogColumn::CreatedAt); let total = query .clone() .count(db.as_ref()) .await .map_err(AppError::from)?; let paginator = query.paginate(db.as_ref(), params.page_details.size); let records = paginator .fetch_page(params.page_details.current - 1) .await .map_err(AppError::from)?; Ok(PaginatedData { current: params.page_details.current, size: params.page_details.size, total, records, }) } }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/service/src/admin/sys_user_service.rs
server/service/src/admin/sys_user_service.rs
use async_trait::async_trait; use chrono::Local; use sea_orm::{ ActiveModelTrait, ColumnTrait, Condition, EntityTrait, IntoActiveModel, PaginatorTrait, QueryFilter, Set, }; use server_core::web::{error::AppError, page::PaginatedData}; use server_model::admin::{ entities::{ prelude::SysUser, sys_user::{ ActiveModel as SysUserActiveModel, Column as SysUserColumn, Model as SysUserModel, }, }, input::{CreateUserInput, UpdateUserInput, UserPageRequest}, output::UserWithoutPassword, }; use server_utils::SecureUtil; use ulid::Ulid; use super::sys_user_error::UserError; use crate::helper::db_helper; #[async_trait] pub trait TUserService { async fn find_all(&self) -> Result<Vec<UserWithoutPassword>, AppError>; async fn find_paginated_users( &self, params: UserPageRequest, ) -> Result<PaginatedData<UserWithoutPassword>, AppError>; async fn create_user(&self, input: CreateUserInput) -> Result<UserWithoutPassword, AppError>; async fn get_user(&self, id: &str) -> Result<UserWithoutPassword, AppError>; async fn update_user(&self, input: UpdateUserInput) -> Result<UserWithoutPassword, AppError>; async fn delete_user(&self, id: &str) -> Result<(), AppError>; } #[derive(Clone)] pub struct SysUserService; impl SysUserService { async fn check_username_unique(&self, username: &str) -> Result<(), AppError> { let db = db_helper::get_db_connection().await?; let existing_user = SysUser::find() .filter(SysUserColumn::Username.eq(username)) .one(db.as_ref()) .await .map_err(AppError::from)?; if existing_user.is_some() { return Err(UserError::UsernameAlreadyExists.into()); } Ok(()) } async fn get_user_by_id(&self, id: String) -> Result<SysUserModel, AppError> { let db = db_helper::get_db_connection().await?; SysUser::find_by_id(id) .one(db.as_ref()) .await .map_err(AppError::from)? .ok_or_else(|| UserError::UserNotFound.into()) } } #[async_trait] impl TUserService for SysUserService { async fn find_all(&self) -> Result<Vec<UserWithoutPassword>, AppError> { let db = db_helper::get_db_connection().await?; SysUser::find() .all(db.as_ref()) .await .map(|users| users.into_iter().map(UserWithoutPassword::from).collect()) .map_err(AppError::from) } async fn find_paginated_users( &self, params: UserPageRequest, ) -> Result<PaginatedData<UserWithoutPassword>, AppError> { let db = db_helper::get_db_connection().await?; let mut query = SysUser::find(); if let Some(ref keywords) = params.keywords { let condition = Condition::any().add(SysUserColumn::Username.contains(keywords)); query = query.filter(condition); } let total = query .clone() .count(db.as_ref()) .await .map_err(AppError::from)?; let paginator = query.paginate(db.as_ref(), params.page_details.size); let records = paginator .fetch_page(params.page_details.current - 1) .await .map_err(AppError::from)? .into_iter() .map(UserWithoutPassword::from) .collect(); Ok(PaginatedData { current: params.page_details.current, size: params.page_details.size, total, records, }) } async fn create_user(&self, input: CreateUserInput) -> Result<UserWithoutPassword, AppError> { self.check_username_unique(&input.username).await?; let db = db_helper::get_db_connection().await?; let user = SysUserActiveModel { id: Set(Ulid::new().to_string()), domain: Set(input.domain), username: Set(input.username), password: Set(SecureUtil::hash_password(input.password.as_bytes()).unwrap()), built_in: Set(false), nick_name: Set(input.nick_name), avatar: Set(input.avatar), email: Set(input.email), phone_number: Set(input.phone_number), status: Set(input.status), created_at: Set(Local::now().naive_local()), created_by: Set("TODO".to_string()), ..Default::default() }; let user_model = user.insert(db.as_ref()).await.map_err(AppError::from)?; Ok(UserWithoutPassword::from(user_model)) } async fn get_user(&self, id: &str) -> Result<UserWithoutPassword, AppError> { let db = db_helper::get_db_connection().await?; SysUser::find_by_id(id) .one(db.as_ref()) .await .map_err(AppError::from)? .map(UserWithoutPassword::from) .ok_or_else(|| UserError::UserNotFound.into()) } async fn update_user(&self, input: UpdateUserInput) -> Result<UserWithoutPassword, AppError> { let mut user = self.get_user_by_id(input.id).await?.into_active_model(); if input.user.username != *user.username.as_ref() { self.check_username_unique(&input.user.username).await?; } user.domain = Set(input.user.domain); user.username = Set(input.user.username); user.password = Set(input.user.password); // TODO: Note: In a real application, you should hash the password user.nick_name = Set(input.user.nick_name); user.avatar = Set(input.user.avatar); user.email = Set(input.user.email); user.phone_number = Set(input.user.phone_number); user.status = Set(input.user.status); let db = db_helper::get_db_connection().await?; let updated_user = user.update(db.as_ref()).await.map_err(AppError::from)?; Ok(UserWithoutPassword::from(updated_user)) } async fn delete_user(&self, id: &str) -> Result<(), AppError> { let db = db_helper::get_db_connection().await?; let result = SysUser::delete_by_id(id) .exec(db.as_ref()) .await .map_err(AppError::from)?; if result.rows_affected == 0 { return Err(UserError::UserNotFound.into()); } Ok(()) } }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/service/src/admin/sys_menu_service.rs
server/service/src/admin/sys_menu_service.rs
use async_trait::async_trait; use chrono::Local; use sea_orm::{ActiveModelTrait, ColumnTrait, Condition, EntityTrait, QueryFilter, Set}; use server_core::web::{auth::User, error::AppError}; use server_model::admin::{ entities::{ prelude::{SysMenu, SysRoleMenu}, sea_orm_active_enums::Status, sys_menu::{ ActiveModel as SysMenuActiveModel, Column as SysMenuColumn, Model as SysMenuModel, }, sys_role_menu::Column as SysRoleMenuColumn, }, input::{CreateMenuInput, UpdateMenuInput}, output::{MenuRoute, MenuTree, RouteMeta}, }; use server_utils::TreeBuilder; use crate::{admin::sys_menu_error::MenuError, helper::db_helper}; #[async_trait] pub trait TMenuService { async fn tree_menu(&self) -> Result<Vec<MenuTree>, AppError>; async fn get_menu_list(&self) -> Result<Vec<MenuTree>, AppError>; async fn get_constant_routes(&self) -> Result<Vec<MenuRoute>, AppError>; async fn create_menu( &self, input: CreateMenuInput, user: User, ) -> Result<SysMenuModel, AppError>; async fn get_menu(&self, id: i32) -> Result<SysMenuModel, AppError>; async fn update_menu( &self, input: UpdateMenuInput, user: User, ) -> Result<SysMenuModel, AppError>; async fn delete_menu(&self, id: i32, user: User) -> Result<(), AppError>; async fn get_menu_ids_by_role_id( &self, role_id: String, domain: String, ) -> Result<Vec<i32>, AppError>; } #[derive(Clone)] pub struct SysMenuService; impl SysMenuService { fn build_menu_tree(menu: &SysMenuModel) -> MenuTree { MenuTree { id: menu.id, pid: menu.pid.clone(), menu_type: menu.menu_type.clone(), menu_name: menu.menu_name.clone(), icon_type: menu.icon_type.clone(), icon: menu.icon.clone(), route_name: menu.route_name.clone(), route_path: menu.route_path.clone(), component: menu.component.clone(), path_param: menu.path_param.clone(), status: menu.status.clone(), active_menu: menu.active_menu.clone(), hide_in_menu: menu.hide_in_menu, sequence: menu.sequence, i18n_key: menu.i18n_key.clone(), keep_alive: menu.keep_alive, constant: menu.constant, href: menu.href.clone(), multi_tab: menu.multi_tab, created_at: menu.created_at, created_by: menu.created_by.clone(), updated_at: menu.updated_at, updated_by: menu.updated_by.clone(), children: None, } } fn build_tree_structure(menu_trees: Vec<MenuTree>) -> Vec<MenuTree> { TreeBuilder::build( menu_trees, |node| node.id, |node| { if node.pid == "0" { None } else { Some(node.pid.parse::<i32>().unwrap_or(-1)) } }, |node| node.sequence, |node, children| node.children = Some(children), ) } async fn check_menu_exists(&self, id: Option<i32>, route_name: &str) -> Result<(), AppError> { let db = db_helper::get_db_connection().await?; let route_name_exists = SysMenu::find() .filter(SysMenuColumn::RouteName.eq(route_name)) .filter(SysMenuColumn::Id.ne(id.unwrap_or(-1))) .one(db.as_ref()) .await .map_err(AppError::from)? .is_some(); if route_name_exists { return Err(MenuError::DuplicateRouteName.into()); } Ok(()) } } #[async_trait] impl TMenuService for SysMenuService { async fn tree_menu(&self) -> Result<Vec<MenuTree>, AppError> { let db = db_helper::get_db_connection().await?; let menus = SysMenu::find() .filter(SysMenuColumn::Constant.eq(false)) .filter(SysMenuColumn::Status.eq(Status::Enabled)) .all(db.as_ref()) .await .map_err(AppError::from)?; let menu_trees: Vec<MenuTree> = menus.iter().map(Self::build_menu_tree).collect(); Ok(Self::build_tree_structure(menu_trees)) } async fn get_menu_list(&self) -> Result<Vec<MenuTree>, AppError> { let db = db_helper::get_db_connection().await?; let menus = SysMenu::find() .all(db.as_ref()) .await .map_err(AppError::from)?; let menu_trees: Vec<MenuTree> = menus.iter().map(Self::build_menu_tree).collect(); Ok(Self::build_tree_structure(menu_trees)) } async fn get_constant_routes(&self) -> Result<Vec<MenuRoute>, AppError> { let db = db_helper::get_db_connection().await?; let menus: Vec<SysMenuModel> = SysMenu::find() .filter(SysMenuColumn::Constant.eq(true)) .filter(SysMenuColumn::Status.eq(Status::Enabled)) .all(db.as_ref()) .await .map_err(AppError::from)?; let result = menus .into_iter() .map(|menu| MenuRoute { id: menu.id, pid: menu.pid, name: menu.route_name, path: menu.route_path, component: menu.component, meta: RouteMeta { title: menu.menu_name, i18n_key: menu.i18n_key, keep_alive: menu.keep_alive, constant: menu.constant, icon: menu.icon, order: menu.sequence, href: menu.href, hide_in_menu: menu.hide_in_menu, active_menu: menu.active_menu, multi_tab: menu.multi_tab, }, children: vec![].into(), }) .collect(); Ok(result) } async fn create_menu( &self, input: CreateMenuInput, user: User, ) -> Result<SysMenuModel, AppError> { self.check_menu_exists(None, &input.route_name).await?; let db = db_helper::get_db_connection().await?; let menu = SysMenuActiveModel { menu_type: Set(input.menu_type), menu_name: Set(input.menu_name), icon_type: Set(input.icon_type), icon: Set(input.icon), route_name: Set(input.route_name), route_path: Set(input.route_path), component: Set(input.component), path_param: Set(input.path_param), status: Set(input.status), active_menu: Set(input.active_menu), hide_in_menu: Set(input.hide_in_menu), pid: Set(input.pid), sequence: Set(input.sequence), i18n_key: Set(input.i18n_key), keep_alive: Set(input.keep_alive), constant: Set(input.constant), href: Set(input.href), multi_tab: Set(input.multi_tab), created_by: Set(user.user_id()), ..Default::default() }; let result = menu.insert(db.as_ref()).await.map_err(AppError::from)?; Ok(result) } async fn get_menu(&self, id: i32) -> Result<SysMenuModel, AppError> { let db = db_helper::get_db_connection().await?; SysMenu::find_by_id(id) .one(db.as_ref()) .await .map_err(AppError::from)? .ok_or_else(|| MenuError::MenuNotFound.into()) } async fn update_menu( &self, input: UpdateMenuInput, user: User, ) -> Result<SysMenuModel, AppError> { let db = db_helper::get_db_connection().await?; let existing_menu = self.get_menu(input.id).await?; self.check_menu_exists(Some(input.id), &input.menu.route_name) .await?; let mut menu: SysMenuActiveModel = existing_menu.into(); menu.menu_type = Set(input.menu.menu_type); menu.menu_name = Set(input.menu.menu_name); menu.icon_type = Set(input.menu.icon_type); menu.icon = Set(input.menu.icon); menu.route_name = Set(input.menu.route_name); menu.route_path = Set(input.menu.route_path); menu.component = Set(input.menu.component); menu.path_param = Set(input.menu.path_param); menu.status = Set(input.menu.status); menu.active_menu = Set(input.menu.active_menu); menu.hide_in_menu = Set(input.menu.hide_in_menu); menu.pid = Set(input.menu.pid); menu.sequence = Set(input.menu.sequence); menu.i18n_key = Set(input.menu.i18n_key); menu.keep_alive = Set(input.menu.keep_alive); menu.constant = Set(input.menu.constant); menu.href = Set(input.menu.href); menu.multi_tab = Set(input.menu.multi_tab); menu.updated_at = Set(Some(Local::now().naive_local())); menu.updated_by = Set(Some(user.user_id())); let updated_menu = menu.update(db.as_ref()).await.map_err(AppError::from)?; Ok(updated_menu) } async fn delete_menu(&self, id: i32, _user: User) -> Result<(), AppError> { let db = db_helper::get_db_connection().await?; SysMenu::delete_by_id(id) .exec(db.as_ref()) .await .map_err(AppError::from)?; Ok(()) } async fn get_menu_ids_by_role_id( &self, role_id: String, domain: String, ) -> Result<Vec<i32>, AppError> { let db = db_helper::get_db_connection().await?; let role_menus = SysRoleMenu::find() .filter( Condition::all() .add(SysRoleMenuColumn::RoleId.eq(role_id)) .add(SysRoleMenuColumn::Domain.eq(domain)), ) .all(db.as_ref()) .await .map_err(AppError::from)?; let menu_ids: Vec<i32> = role_menus.iter().map(|rm| rm.menu_id).collect(); if menu_ids.is_empty() { return Ok(vec![]); } let menus = SysMenu::find() .filter( Condition::all() .add(SysMenuColumn::Id.is_in(menu_ids)) .add(SysMenuColumn::Status.eq(Status::Enabled)) .add(SysMenuColumn::Constant.eq(false)), ) .all(db.as_ref()) .await .map_err(AppError::from)?; Ok(menus.iter().map(|menu| menu.id).collect()) } }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/service/src/admin/dto/mod.rs
server/service/src/admin/dto/mod.rs
pub mod sys_auth_dto;
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/service/src/admin/dto/sys_auth_dto.rs
server/service/src/admin/dto/sys_auth_dto.rs
use server_constant::definition::Audience; #[derive(Clone, Debug)] pub struct LoginContext { pub client_ip: String, pub client_port: Option<i32>, pub address: String, pub user_agent: String, pub request_id: String, pub audience: Audience, pub login_type: String, pub domain: String, }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/service/src/admin/errors/sys_domain_error.rs
server/service/src/admin/errors/sys_domain_error.rs
use server_core::web::error::{ApiError, AppError}; use thiserror::Error; #[derive(Error, Debug)] pub enum DomainError { #[error("Domain not found")] DomainNotFound, #[error("Domain with this code already exists")] DuplicateCode, #[error("Domain with this name already exists")] DuplicateName, #[error("Cannot modify or delete built-in domain")] BuiltInDomain, } impl ApiError for DomainError { fn code(&self) -> u16 { match self { DomainError::DomainNotFound => 2001, DomainError::DuplicateCode => 2002, DomainError::DuplicateName => 2003, DomainError::BuiltInDomain => 2004, } } fn message(&self) -> String { format!("{}", self) } } impl From<DomainError> for AppError { fn from(err: DomainError) -> Self { AppError { code: err.code(), message: err.message(), } } }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/service/src/admin/errors/sys_user_error.rs
server/service/src/admin/errors/sys_user_error.rs
use server_core::web::error::{ApiError, AppError}; use thiserror::Error; #[derive(Error, Debug)] pub enum UserError { #[error("User not found")] UserNotFound, #[error("Authentication failed: Wrong password")] WrongPassword, #[error("Authentication failed")] AuthenticationFailed, #[error("Username already exists")] UsernameAlreadyExists, #[error("Invalid user status")] InvalidUserStatus, } impl ApiError for UserError { fn code(&self) -> u16 { match self { UserError::UserNotFound => 1001, UserError::WrongPassword => 1002, UserError::AuthenticationFailed => 1003, UserError::UsernameAlreadyExists => 1004, UserError::InvalidUserStatus => 1005, } } fn message(&self) -> String { format!("{}", self) } } impl From<UserError> for AppError { fn from(err: UserError) -> Self { AppError { code: err.code(), message: err.message(), } } }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/service/src/admin/errors/mod.rs
server/service/src/admin/errors/mod.rs
pub mod sys_access_key_error; pub mod sys_domain_error; pub mod sys_menu_error; pub mod sys_role_error; pub mod sys_user_error;
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/service/src/admin/errors/sys_access_key_error.rs
server/service/src/admin/errors/sys_access_key_error.rs
use server_core::web::error::{ApiError, AppError}; use thiserror::Error; #[derive(Error, Debug)] pub enum AccessKeyError { #[error("Access key not found")] AccessKeyNotFound, } impl ApiError for AccessKeyError { fn code(&self) -> u16 { match self { AccessKeyError::AccessKeyNotFound => 5001, } } fn message(&self) -> String { format!("{}", self) } } impl From<AccessKeyError> for AppError { fn from(err: AccessKeyError) -> Self { AppError { code: err.code(), message: err.message(), } } }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/service/src/admin/errors/sys_role_error.rs
server/service/src/admin/errors/sys_role_error.rs
use server_core::web::error::{ApiError, AppError}; use thiserror::Error; #[derive(Debug, Error)] pub enum RoleError { #[error("Role not found")] RoleNotFound, #[error("Duplicate role code")] DuplicateRoleCode, } impl ApiError for RoleError { fn code(&self) -> u16 { match self { RoleError::RoleNotFound => 4001, RoleError::DuplicateRoleCode => 4002, } } fn message(&self) -> String { format!("{}", self) } } impl From<RoleError> for AppError { fn from(err: RoleError) -> Self { AppError { code: err.code(), message: err.message(), } } }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/service/src/admin/errors/sys_menu_error.rs
server/service/src/admin/errors/sys_menu_error.rs
use server_core::web::error::{ApiError, AppError}; use thiserror::Error; #[derive(Debug, Error)] pub enum MenuError { #[error("Menu not found")] MenuNotFound, #[error("Duplicate route name")] DuplicateRouteName, } impl ApiError for MenuError { fn code(&self) -> u16 { match self { MenuError::MenuNotFound => 3001, MenuError::DuplicateRouteName => 3002, } } fn message(&self) -> String { format!("{}", self) } } impl From<MenuError> for AppError { fn from(err: MenuError) -> Self { AppError { code: err.code(), message: err.message(), } } }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/service/src/admin/events/login_log_event.rs
server/service/src/admin/events/login_log_event.rs
use chrono::Local; use sea_orm::{ActiveModelTrait, DatabaseConnection, Set}; use server_core::web::error::AppError; use server_model::admin::entities::sys_login_log::ActiveModel as SysLoginLogActiveModel; use ulid::Ulid; pub struct LoginLogEvent { pub user_id: String, pub username: String, pub domain: String, pub ip: String, pub port: Option<i32>, pub address: String, pub user_agent: String, pub request_id: String, pub login_type: String, } impl LoginLogEvent { pub async fn handle(self, db: &DatabaseConnection) -> Result<(), AppError> { SysLoginLogActiveModel { id: Set(Ulid::new().to_string()), user_id: Set(self.user_id), username: Set(self.username.clone()), domain: Set(self.domain), login_time: Set(Local::now().naive_local()), ip: Set(self.ip), port: Set(self.port), address: Set(self.address), user_agent: Set(self.user_agent), request_id: Set(self.request_id), r#type: Set(self.login_type), created_at: Set(Local::now().naive_local()), created_by: Set(self.username), } .insert(db) .await .map_err(AppError::from)?; Ok(()) } }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/service/src/admin/events/access_token_event.rs
server/service/src/admin/events/access_token_event.rs
use chrono::Local; use sea_orm::{ActiveModelTrait, DatabaseConnection, Set}; use server_constant::definition::consts::TokenStatus; use server_core::web::error::AppError; use server_model::admin::entities::sys_tokens::ActiveModel as SysTokensActiveModel; use ulid::Ulid; pub struct AccessTokenEvent { pub access_token: String, pub refresh_token: String, pub user_id: String, pub username: String, pub domain: String, pub ip: String, pub port: Option<i32>, pub address: String, pub user_agent: String, pub request_id: String, pub login_type: String, } impl AccessTokenEvent { pub async fn handle(self, db: &DatabaseConnection) -> Result<(), AppError> { let now = Local::now().naive_local(); SysTokensActiveModel { id: Set(Ulid::new().to_string()), access_token: Set(self.access_token), refresh_token: Set(self.refresh_token), status: Set(TokenStatus::Active.to_string()), user_id: Set(self.user_id), username: Set(self.username.clone()), domain: Set(self.domain), login_time: Set(now), ip: Set(self.ip), port: Set(self.port), address: Set(self.address), user_agent: Set(self.user_agent), request_id: Set(self.request_id), r#type: Set(self.login_type), created_at: Set(now), created_by: Set(self.username), } .insert(db) .await .map_err(AppError::from)?; Ok(()) } }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/service/src/admin/events/mod.rs
server/service/src/admin/events/mod.rs
pub mod access_token_event; pub mod login_log_event;
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/service/src/admin/event_handlers/auth_event_handler.rs
server/service/src/admin/event_handlers/auth_event_handler.rs
use server_core::web::error::AppError; use crate::{ admin::events::{access_token_event::AccessTokenEvent, login_log_event::LoginLogEvent}, helper::db_helper, }; pub struct AuthEvent { pub user_id: String, pub username: String, pub domain: String, pub access_token: String, pub refresh_token: String, pub client_ip: String, pub client_port: Option<i32>, pub address: String, pub user_agent: String, pub request_id: String, pub login_type: String, } pub struct AuthEventHandler; impl AuthEventHandler { pub async fn handle_login(event: AuthEvent) -> Result<(), AppError> { let db = db_helper::get_db_connection().await?; // 处理登录日志 let login_log_event = LoginLogEvent { user_id: event.user_id.clone(), username: event.username.clone(), domain: event.domain.clone(), ip: event.client_ip.clone(), port: event.client_port, address: event.address.clone(), user_agent: event.user_agent.clone(), request_id: event.request_id.clone(), login_type: event.login_type.clone(), }; login_log_event.handle(&db).await?; // 处理访问令牌 let access_token_event = AccessTokenEvent { access_token: event.access_token, refresh_token: event.refresh_token, user_id: event.user_id, username: event.username, domain: event.domain, ip: event.client_ip, port: event.client_port, address: event.address.clone(), user_agent: event.user_agent, request_id: event.request_id, login_type: event.login_type, }; access_token_event.handle(&db).await?; Ok(()) } }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/service/src/admin/event_handlers/mod.rs
server/service/src/admin/event_handlers/mod.rs
pub mod auth_event_handler;
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/service/src/helper/redis_helper.rs
server/service/src/helper/redis_helper.rs
#![allow(dead_code)] use redis::{aio::MultiplexedConnection, cluster_async::ClusterConnection, ErrorKind, RedisError}; use server_core::web::error::AppError; use server_global::global::{RedisConnection, GLOBAL_PRIMARY_REDIS, GLOBAL_REDIS_POOL}; /// Redis连接来源 #[derive(Debug, Clone)] pub enum RedisSource { /// 主Redis实例 Primary, /// 命名的Redis实例 Named(String), } /// 获取Redis连接 pub async fn get_redis_connection(source: RedisSource) -> Result<MultiplexedConnection, AppError> { match source { RedisSource::Primary => { let redis = GLOBAL_PRIMARY_REDIS.read().await.clone().ok_or_else(|| { AppError::from(RedisError::from(( ErrorKind::IoError, "Primary Redis not initialized", ))) })?; match redis { RedisConnection::Single(client) => { Ok(client.get_multiplexed_async_connection().await?) }, RedisConnection::Cluster(_) => Err(AppError::from(RedisError::from(( ErrorKind::IoError, "Primary Redis is not Single mode", )))), } }, RedisSource::Named(name) => { let pools = GLOBAL_REDIS_POOL.read().await; let redis = pools.get(&name).ok_or_else(|| { AppError::from(RedisError::from(( ErrorKind::IoError, "Redis pool not found", ))) })?; match redis { RedisConnection::Single(client) => { Ok(client.get_multiplexed_async_connection().await?) }, RedisConnection::Cluster(_) => Err(AppError::from(RedisError::from(( ErrorKind::IoError, "Named Redis is not Single mode", )))), } }, } } /// 获取Redis集群连接 pub async fn get_redis_cluster_connection( source: RedisSource, ) -> Result<ClusterConnection, AppError> { match source { RedisSource::Primary => { let redis = GLOBAL_PRIMARY_REDIS.read().await.clone().ok_or_else(|| { AppError::from(RedisError::from(( ErrorKind::IoError, "Primary Redis not initialized", ))) })?; match redis { RedisConnection::Single(_) => Err(AppError::from(RedisError::from(( ErrorKind::IoError, "Primary Redis is not Cluster mode", )))), RedisConnection::Cluster(client) => Ok(client.get_async_connection().await?), } }, RedisSource::Named(name) => { let pools = GLOBAL_REDIS_POOL.read().await; let redis = pools.get(&name).ok_or_else(|| { AppError::from(RedisError::from(( ErrorKind::IoError, "Redis pool not found", ))) })?; match redis { RedisConnection::Single(_) => Err(AppError::from(RedisError::from(( ErrorKind::IoError, "Named Redis is not Cluster mode", )))), RedisConnection::Cluster(client) => Ok(client.get_async_connection().await?), } }, } }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/service/src/helper/db_helper.rs
server/service/src/helper/db_helper.rs
use std::sync::Arc; use sea_orm::{ConnAcquireErr, DatabaseConnection, DbErr}; use server_core::web::error::AppError; use server_global::global::{GLOBAL_DB_POOL, GLOBAL_PRIMARY_DB}; pub async fn get_db_connection() -> Result<Arc<DatabaseConnection>, AppError> { let db = GLOBAL_PRIMARY_DB.read().await; db.as_ref() .cloned() .ok_or_else(|| AppError::from(DbErr::ConnectionAcquire(ConnAcquireErr::Timeout))) } /// 获取命名数据库连接 #[allow(dead_code)] pub async fn get_named_connection(name: &str) -> Result<Arc<DatabaseConnection>, AppError> { let pools = GLOBAL_DB_POOL.read().await; let db = pools.get(name).ok_or_else(|| AppError { code: 500, message: format!("Database pool '{}' not found", name), })?; Ok(db.clone()) }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/service/src/helper/mod.rs
server/service/src/helper/mod.rs
pub mod db_helper; pub mod mongo_helper; pub mod redis_helper;
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/service/src/helper/mongo_helper.rs
server/service/src/helper/mongo_helper.rs
#![allow(dead_code)] use mongodb::{Client, Collection}; use server_core::web::error::AppError; use server_global::global::{GLOBAL_MONGO_POOL, GLOBAL_PRIMARY_MONGO}; /// MongoDB 连接来源 #[derive(Debug, Clone)] pub enum MongoSource { /// 主 MongoDB 实例 Primary, /// 命名的 MongoDB 实例 Named(String), } // ===== 主数据库操作 ===== /// 获取主 MongoDB 客户端 pub async fn get_primary_client() -> Result<Client, AppError> { let client = GLOBAL_PRIMARY_MONGO .read() .await .clone() .ok_or_else(|| AppError { code: 500, message: "Primary MongoDB not initialized".to_string(), })?; Ok(client.as_ref().clone()) } /// 获取主 MongoDB 指定数据库的集合 pub async fn get_primary_collection<T: Send + Sync>( db_name: &str, coll_name: &str, ) -> Result<Collection<T>, AppError> { let client = get_primary_client().await?; Ok(client.database(db_name).collection(coll_name)) } // ===== 命名数据库操作 ===== /// 获取命名 MongoDB 客户端 pub async fn get_named_client(name: &str) -> Result<Client, AppError> { let pools = GLOBAL_MONGO_POOL.read().await; let client = pools.get(name).ok_or_else(|| AppError { code: 500, message: format!("MongoDB pool '{}' not found", name), })?; Ok(client.as_ref().clone()) } /// 获取命名 MongoDB 指定数据库的集合 pub async fn get_named_collection<T: Send + Sync>( pool_name: &str, db_name: &str, coll_name: &str, ) -> Result<Collection<T>, AppError> { let client = get_named_client(pool_name).await?; Ok(client.database(db_name).collection(coll_name)) } // ===== 通用接口 ===== /// 获取 MongoDB 客户端 pub async fn get_client(source: MongoSource) -> Result<Client, AppError> { match source { MongoSource::Primary => get_primary_client().await, MongoSource::Named(name) => get_named_client(&name).await, } } /// 获取 MongoDB 集合 pub async fn get_collection<T: Send + Sync>( source: MongoSource, db_name: &str, coll_name: &str, ) -> Result<Collection<T>, AppError> { match source { MongoSource::Primary => get_primary_collection(db_name, coll_name).await, MongoSource::Named(name) => get_named_collection(&name, db_name, coll_name).await, } }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/global/src/global.rs
server/global/src/global.rs
use std::{ any::{Any, TypeId}, collections::HashMap, future::Future, pin::Pin, sync::Arc, }; use aws_sdk_s3::Client as S3Client; use chrono::NaiveDateTime; use http::Method; use jsonwebtoken::{DecodingKey, EncodingKey, Validation}; use mongodb::Client as MongoClient; use once_cell::sync::Lazy; use redis::{cluster::ClusterClient, Client}; use sea_orm::DatabaseConnection; use serde_json::Value; use tokio::sync::{mpsc, Mutex, OnceCell, RwLock}; use crate::project_info; //***************************************************************************** // 全局配置 //***************************************************************************** pub static GLOBAL_CONFIG: Lazy<RwLock<HashMap<TypeId, Arc<dyn Any + Send + Sync>>>> = Lazy::new(|| RwLock::new(HashMap::new())); pub async fn init_config<T: 'static + Any + Send + Sync>(config: T) { let mut context = GLOBAL_CONFIG.write().await; context.insert(TypeId::of::<T>(), Arc::new(config)); } pub async fn get_config<T: 'static + Any + Send + Sync>() -> Option<Arc<T>> { let context = GLOBAL_CONFIG.read().await; context .get(&TypeId::of::<T>()) .and_then(|config| config.clone().downcast::<T>().ok()) } //***************************************************************************** // 数据库连接 //***************************************************************************** pub static GLOBAL_PRIMARY_DB: Lazy<RwLock<Option<Arc<DatabaseConnection>>>> = Lazy::new(|| RwLock::new(None)); pub static GLOBAL_DB_POOL: Lazy<RwLock<HashMap<String, Arc<DatabaseConnection>>>> = Lazy::new(|| RwLock::new(HashMap::new())); // Redis连接 #[derive(Clone)] pub enum RedisConnection { Single(Arc<Client>), Cluster(Arc<ClusterClient>), } pub static GLOBAL_PRIMARY_REDIS: Lazy<RwLock<Option<RedisConnection>>> = Lazy::new(|| RwLock::new(None)); pub static GLOBAL_REDIS_POOL: Lazy<RwLock<HashMap<String, RedisConnection>>> = Lazy::new(|| RwLock::new(HashMap::new())); // MongoDB 连接 pub static GLOBAL_PRIMARY_MONGO: Lazy<RwLock<Option<Arc<MongoClient>>>> = Lazy::new(|| RwLock::new(None)); pub static GLOBAL_MONGO_POOL: Lazy<RwLock<HashMap<String, Arc<MongoClient>>>> = Lazy::new(|| RwLock::new(HashMap::new())); //***************************************************************************** // AWS S3 Clients //***************************************************************************** // 主要的 S3 客户端 pub static GLOBAL_PRIMARY_S3: Lazy<RwLock<Option<Arc<S3Client>>>> = Lazy::new(|| RwLock::new(None)); // 命名的 S3 客户端池 pub static GLOBAL_S3_POOL: Lazy<RwLock<HashMap<String, Arc<S3Client>>>> = Lazy::new(|| RwLock::new(HashMap::new())); //***************************************************************************** // JWT 密钥和验证 //***************************************************************************** pub struct Keys { pub encoding: EncodingKey, pub decoding: DecodingKey, } impl Keys { pub fn new(secret: &[u8]) -> Self { Self { encoding: EncodingKey::from_secret(secret), decoding: DecodingKey::from_secret(secret), } } } pub static KEYS: OnceCell<Arc<Mutex<Keys>>> = OnceCell::const_new(); pub static VALIDATION: OnceCell<Arc<Mutex<Validation>>> = OnceCell::const_new(); //***************************************************************************** // 事件通道 //***************************************************************************** /// 事件通道条目 struct DynChannelEntry { name: String, tx: mpsc::UnboundedSender<Box<dyn Any + Send>>, } /// 事件通道管理器 struct EventChannels { string_tx: mpsc::UnboundedSender<String>, dyn_channels: Vec<DynChannelEntry>, } static EVENT_CHANNELS: Lazy<Arc<Mutex<EventChannels>>> = Lazy::new(|| { let (string_tx, _) = mpsc::unbounded_channel(); Arc::new(Mutex::new(EventChannels { string_tx, dyn_channels: Vec::new(), })) }); type DynFuture = dyn Future<Output = ()> + Send + 'static; type StringListener = Box<dyn FnOnce(mpsc::UnboundedReceiver<String>) -> Pin<Box<DynFuture>>>; type DynListener = ( String, Box<dyn Fn(mpsc::UnboundedReceiver<Box<dyn Any + Send>>) -> Pin<Box<DynFuture>>>, ); /// 获取字符串事件发送器 #[inline] pub async fn get_string_sender() -> mpsc::UnboundedSender<String> { EVENT_CHANNELS.lock().await.string_tx.clone() } /// 获取动态类型事件发送器 #[inline] pub async fn get_dyn_sender(name: &str) -> Option<mpsc::UnboundedSender<Box<dyn Any + Send>>> { let channels = EVENT_CHANNELS.lock().await; channels .dyn_channels .iter() .find(|entry| entry.name == name) .map(|entry| entry.tx.clone()) } /// 注册事件监听器 pub async fn register_event_listeners( string_listener: StringListener, dyn_listeners: &[DynListener], ) { let mut channels = EVENT_CHANNELS.lock().await; // 设置字符串事件通道 let (string_tx, string_rx) = mpsc::unbounded_channel(); channels.string_tx = string_tx; // 启动字符串事件监听器 tokio::spawn(string_listener(string_rx)); project_info!("String event listener spawned"); // 清空旧的发送器 channels.dyn_channels.clear(); // 为每个监听器创建独立通道 for (name, listener) in dyn_listeners { let (tx, rx) = mpsc::unbounded_channel(); channels.dyn_channels.push(DynChannelEntry { name: name.clone(), tx, }); tokio::spawn(listener(rx)); project_info!("Dynamic event listener '{}' spawned", name); } } //***************************************************************************** // 路由信息收集 //***************************************************************************** #[derive(Clone, Debug)] pub struct RouteInfo { pub path: String, pub method: Method, pub service_name: String, pub summary: String, } impl RouteInfo { pub fn new(path: &str, method: Method, service_name: &str, summary: &str) -> Self { RouteInfo { path: path.to_string(), method, service_name: service_name.to_string(), summary: summary.to_string(), } } } pub static ROUTE_COLLECTOR: Lazy<Mutex<Vec<RouteInfo>>> = Lazy::new(|| Mutex::new(Vec::new())); pub async fn add_route(route: RouteInfo) { ROUTE_COLLECTOR.lock().await.push(route); } pub async fn get_collected_routes() -> Vec<RouteInfo> { ROUTE_COLLECTOR.lock().await.clone() } pub async fn clear_routes() { ROUTE_COLLECTOR.lock().await.clear(); } //***************************************************************************** // 操作日志 //***************************************************************************** #[derive(Debug, Clone)] pub struct OperationLogContext { pub user_id: Option<String>, pub username: Option<String>, pub domain: Option<String>, pub module_name: String, pub description: String, pub request_id: String, pub method: String, pub url: String, pub ip: String, pub user_agent: Option<String>, pub params: Option<Value>, pub body: Option<Value>, pub response: Option<Value>, pub start_time: NaiveDateTime, pub end_time: NaiveDateTime, pub duration: i32, pub created_at: NaiveDateTime, } static OPERATION_LOG_CONTEXT: Lazy<Arc<RwLock<Option<OperationLogContext>>>> = Lazy::new(|| Arc::new(RwLock::new(None))); impl OperationLogContext { pub async fn set(context: OperationLogContext) { let mut writer = OPERATION_LOG_CONTEXT.write().await; *writer = Some(context); } pub async fn get() -> Option<OperationLogContext> { OPERATION_LOG_CONTEXT.read().await.clone() } pub async fn clear() { let mut writer = OPERATION_LOG_CONTEXT.write().await; *writer = None; } } /// 异步发送字符串事件 #[inline] pub fn send_string_event(msg: String) { tokio::spawn(async move { let sender = get_string_sender().await; let _ = sender.send(msg); }); } /// 异步发送动态类型事件 #[inline] pub fn send_dyn_event(event_name: &'static str, event: Box<dyn Any + Send>) { tokio::spawn(async move { if let Some(sender) = get_dyn_sender(event_name).await { let _ = sender.send(event); } }); }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/global/src/lib.rs
server/global/src/lib.rs
pub use jsonwebtoken::Validation; pub mod global; #[macro_export] macro_rules! project_info { ($($arg:tt)+) => {{ let span = tracing::span!( tracing::Level::INFO, module_path!(), file = file!(), line = line!(), ); let _enter = span.enter(); tracing::info!( target: "[soybean-admin-rust]", $($arg)+ ); }} } #[macro_export] macro_rules! project_error { ($($arg:tt)+) => {{ let span = tracing::span!( tracing::Level::ERROR, module_path!(), file = file!(), line = line!(), ); let _enter = span.enter(); tracing::error!( target: "[soybean-admin-rust]", $($arg)+ ); }} }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/resource/src/lib.rs
server/resource/src/lib.rs
use anyhow::Result; use askama::Template; use std::path::PathBuf; #[allow(dead_code)] mod filters { #[allow(dead_code)] pub fn lower(s: &str) -> ::askama::Result<String> { Ok(s.to_lowercase()) } #[allow(dead_code)] pub fn title(s: &str) -> ::askama::Result<String> { Ok(s.to_string()) } } #[derive(Template)] #[template(path = "error.rs.askama", escape = "none")] struct ErrorTemplate { name: String, } impl ErrorTemplate { fn lower(&self) -> String { self.name.to_lowercase() } } #[derive(Template)] #[template(path = "input.rs.askama", escape = "none")] struct InputTemplate { name: String, } impl InputTemplate { fn lower(&self) -> String { self.name.to_lowercase() } } #[derive(Template)] #[template(path = "service.rs.askama", escape = "none")] struct ServiceTemplate { name: String, } impl ServiceTemplate { fn lower(&self) -> String { self.name.to_lowercase() } } #[derive(Template)] #[template(path = "api.rs.askama", escape = "none")] struct ApiTemplate { name: String, } impl ApiTemplate { fn lower(&self) -> String { self.name.to_lowercase() } fn title(&self) -> String { self.name.to_string() } } pub fn generate_code(name: &str, base_path: impl Into<PathBuf>) -> Result<()> { let base_path = base_path.into(); let name = name.to_string(); let error_template = ErrorTemplate { name: name.clone() }; let error_code = error_template.render()?; let error_path = base_path .join("server") .join("service") .join("src") .join("admin") .join("errors") .join(format!("sys_{}_error.rs", name.to_lowercase())); std::fs::create_dir_all(error_path.parent().unwrap())?; std::fs::write(error_path, error_code)?; let input_template = InputTemplate { name: name.clone() }; let input_code = input_template.render()?; let input_path = base_path .join("server") .join("model") .join("src") .join("admin") .join("input") .join(format!("sys_{}.rs", name.to_lowercase())); std::fs::create_dir_all(input_path.parent().unwrap())?; std::fs::write(input_path, input_code)?; let service_template = ServiceTemplate { name: name.clone() }; let service_code = service_template.render()?; let service_path = base_path .join("server") .join("service") .join("src") .join("admin") .join(format!("sys_{}_service.rs", name.to_lowercase())); std::fs::create_dir_all(service_path.parent().unwrap())?; std::fs::write(service_path, service_code)?; let api_template = ApiTemplate { name: name.clone() }; let api_code = api_template.render()?; let api_path = base_path .join("server") .join("api") .join("src") .join("admin") .join(format!("sys_{}_api.rs", name.to_lowercase())); std::fs::create_dir_all(api_path.parent().unwrap())?; std::fs::write(api_path, api_code)?; Ok(()) } #[cfg(test)] mod tests { use super::*; use std::fs; #[test] fn test_code_generation() -> Result<()> { let current_dir = std::env::current_dir()?; println!("当前目录: {:?}", current_dir); generate_code("Role", &current_dir)?; let files_to_check = vec![ current_dir .join("server") .join("service") .join("src") .join("admin") .join("errors") .join("sys_role_error.rs"), current_dir .join("server") .join("model") .join("src") .join("admin") .join("input") .join("sys_role.rs"), current_dir .join("server") .join("service") .join("src") .join("admin") .join("sys_role_service.rs"), current_dir .join("server") .join("api") .join("src") .join("admin") .join("sys_role_api.rs"), ]; println!("检查以下文件:"); for file in &files_to_check { println!(" - {:?}", file); } for file in files_to_check { if !file.exists() { println!("文件不存在: {:?}", file); assert!(file.exists(), "File {:?} should exist", file); } let content = fs::read_to_string(&file)?; assert!(!content.is_empty(), "File {:?} should not be empty", file); assert!( content.contains("Role"), "File {:?} should contain 'Role'", file ); if file.ends_with("sys_role_error.rs") { assert!(content.contains("RoleError")); assert!(content.contains("RoleNotFound")); } else if file.ends_with("sys_role.rs") { assert!(content.contains("RolePageRequest")); assert!(content.contains("RoleInput")); } else if file.ends_with("sys_role_service.rs") { assert!(content.contains("RoleService")); assert!(content.contains("TRoleService")); } else if file.ends_with("sys_role_api.rs") { assert!(content.contains("RoleApi")); assert!(content.contains("get_role")); } } Ok(()) } }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/model/src/lib.rs
server/model/src/lib.rs
pub mod admin;
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/model/src/admin/mod.rs
server/model/src/admin/mod.rs
pub mod input; pub mod entities; pub mod output;
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/model/src/admin/entities/sys_access_key.rs
server/model/src/admin/entities/sys_access_key.rs
//! `SeaORM` Entity, @generated by sea-orm-codegen 1.0.0 use sea_orm::entity::prelude::*; use serde::Serialize; use super::sea_orm_active_enums::Status; #[derive(Clone, Debug, PartialEq, DeriveEntityModel, Eq, Serialize)] #[sea_orm(table_name = "sys_access_key")] pub struct Model { #[sea_orm(primary_key, auto_increment = false, column_type = "Text")] pub id: String, #[sea_orm(column_type = "Text")] pub domain: String, #[sea_orm(column_type = "Text", unique)] pub access_key_id: String, #[sea_orm(column_type = "Text", unique)] pub access_key_secret: String, pub status: Status, #[sea_orm(column_type = "Text", nullable)] pub description: Option<String>, pub created_at: DateTime, #[sea_orm(column_type = "Text")] pub created_by: String, } #[derive(Copy, Clone, Debug, EnumIter, DeriveRelation)] pub enum Relation {} impl ActiveModelBehavior for ActiveModel {}
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/model/src/admin/entities/prelude.rs
server/model/src/admin/entities/prelude.rs
//! `SeaORM` Entity, @generated by sea-orm-codegen 1.0.0 pub use super::{ casbin_rule::Entity as CasbinRule, sys_access_key::Entity as SysAccessKey, sys_domain::Entity as SysDomain, sys_endpoint::Entity as SysEndpoint, sys_login_log::Entity as SysLoginLog, sys_menu::Entity as SysMenu, sys_operation_log::Entity as SysOperationLog, sys_organization::Entity as SysOrganization, sys_role::Entity as SysRole, sys_role_menu::Entity as SysRoleMenu, sys_tokens::Entity as SysTokens, sys_user::Entity as SysUser, sys_user_role::Entity as SysUserRole, };
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/model/src/admin/entities/sys_operation_log.rs
server/model/src/admin/entities/sys_operation_log.rs
//! `SeaORM` Entity, @generated by sea-orm-codegen 1.0.0 use sea_orm::entity::prelude::*; use serde::Serialize; use serde_json::Value as JsonValue; #[derive(Clone, Debug, PartialEq, DeriveEntityModel, Eq, Serialize)] #[sea_orm(table_name = "sys_operation_log")] #[serde(rename_all = "camelCase")] pub struct Model { #[sea_orm(primary_key, auto_increment = false, column_type = "Text")] pub id: String, #[sea_orm(column_type = "Text")] pub user_id: String, #[sea_orm(column_type = "Text")] pub username: String, #[sea_orm(column_type = "Text")] pub domain: String, #[sea_orm(column_type = "Text")] pub module_name: String, #[sea_orm(column_type = "Text")] pub description: String, #[sea_orm(column_type = "Text")] pub request_id: String, #[sea_orm(column_type = "Text")] pub method: String, #[sea_orm(column_type = "Text")] pub url: String, #[sea_orm(column_type = "Text")] pub ip: String, #[sea_orm(column_type = "Text", nullable)] pub user_agent: Option<String>, #[sea_orm(column_type = "JsonBinary", nullable)] pub params: Option<JsonValue>, #[sea_orm(column_type = "JsonBinary", nullable)] pub body: Option<JsonValue>, #[sea_orm(column_type = "JsonBinary", nullable)] pub response: Option<JsonValue>, pub start_time: DateTime, pub end_time: DateTime, pub duration: i32, pub created_at: DateTime, } #[derive(Copy, Clone, Debug, EnumIter, DeriveRelation)] pub enum Relation {} impl ActiveModelBehavior for ActiveModel {}
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/model/src/admin/entities/sea_orm_active_enums.rs
server/model/src/admin/entities/sea_orm_active_enums.rs
//! `SeaORM` Entity, @generated by sea-orm-codegen 1.0.0 use sea_orm::entity::prelude::*; use serde::{Deserialize, Serialize}; #[derive(Debug, Clone, PartialEq, Eq, EnumIter, DeriveActiveEnum, Deserialize, Serialize)] #[sea_orm(rs_type = "String", db_type = "Enum", enum_name = "menu_type")] pub enum MenuType { #[sea_orm(string_value = "directory")] #[serde(rename = "directory")] Directory, #[sea_orm(string_value = "menu")] #[serde(rename = "menu")] Menu, } #[derive(Debug, Clone, PartialEq, Eq, EnumIter, DeriveActiveEnum, Deserialize, Serialize)] // TIPS: pg大小写敏感会存在问题clear 因此项目最初作为soybean-admin-nestjs孪生项目所以枚举最初为大写 现在统一修正为小写 ///PostgreSQL 对标识符(包括自定义类型名、表名、列名等)的命名有明确规则:未加双引号的标识符会自动折叠为小写 。因此,推荐始终使用小写字母和下划线(snake_case)来命名对象,就能避免大小写混淆或关键字冲突的问题。如 Bytebase 风格指南指出,“所有对象名称必须只使用小写字母、下划线和数字,名称必须遵循 snake_case” 。Pigsty 等社区规范也建议:表名、列名等一律小写,避免使用大写或驼峰等需要引用的形式   #[sea_orm(rs_type = "String", db_type = "Enum", enum_name = "status")] pub enum Status { #[sea_orm(string_value = "banned")] #[serde(rename = "banned")] Banned, #[sea_orm(string_value = "disabled")] #[serde(rename = "disabled")] Disabled, #[sea_orm(string_value = "enabled")] #[serde(rename = "enabled")] Enabled, }
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/model/src/admin/entities/sys_user.rs
server/model/src/admin/entities/sys_user.rs
//! `SeaORM` Entity, @generated by sea-orm-codegen 1.1.0 use sea_orm::entity::prelude::*; use serde::Serialize; use super::sea_orm_active_enums::Status; #[derive(Clone, Debug, PartialEq, DeriveEntityModel, Eq, Serialize)] #[sea_orm(table_name = "sys_user")] pub struct Model { #[sea_orm(primary_key, auto_increment = false, column_type = "Text")] pub id: String, #[sea_orm(column_type = "Text", unique)] pub username: String, #[sea_orm(column_type = "Text")] pub password: String, #[sea_orm(column_type = "Text")] pub domain: String, pub built_in: bool, #[sea_orm(column_type = "Text", nullable)] pub avatar: Option<String>, #[sea_orm(column_type = "Text", nullable, unique)] pub email: Option<String>, #[sea_orm(column_type = "Text", nullable, unique)] pub phone_number: Option<String>, #[sea_orm(column_type = "Text")] pub nick_name: String, pub status: Status, pub created_at: DateTime, #[sea_orm(column_type = "Text")] pub created_by: String, pub updated_at: Option<DateTime>, #[sea_orm(column_type = "Text", nullable)] pub updated_by: Option<String>, } #[derive(Copy, Clone, Debug, EnumIter, DeriveRelation)] pub enum Relation { #[sea_orm( belongs_to = "super::sys_domain::Entity", from = "Column::Domain", to = "super::sys_domain::Column::Code" )] SysDomain, #[sea_orm(has_many = "super::sys_user_role::Entity")] SysUserRole, } impl Related<super::sys_domain::Entity> for Entity { fn to() -> RelationDef { Relation::SysDomain.def() } } impl Related<super::sys_user_role::Entity> for Entity { fn to() -> RelationDef { Relation::SysUserRole.def() } } impl ActiveModelBehavior for ActiveModel {}
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/model/src/admin/entities/sys_role.rs
server/model/src/admin/entities/sys_role.rs
//! `SeaORM` Entity, @generated by sea-orm-codegen 1.1.0 use sea_orm::entity::prelude::*; use serde::Serialize; use super::sea_orm_active_enums::Status; #[derive(Clone, Debug, PartialEq, DeriveEntityModel, Eq, Serialize)] #[sea_orm(table_name = "sys_role")] pub struct Model { #[sea_orm(primary_key, auto_increment = false, column_type = "Text")] pub id: String, #[sea_orm(column_type = "Text", unique)] pub code: String, #[sea_orm(column_type = "Text")] pub name: String, #[sea_orm(column_type = "Text", nullable)] pub description: Option<String>, #[sea_orm(column_type = "Text")] pub pid: String, pub status: Status, pub created_at: DateTime, #[sea_orm(column_type = "Text")] pub created_by: String, pub updated_at: Option<DateTime>, #[sea_orm(column_type = "Text", nullable)] pub updated_by: Option<String>, } #[derive(Copy, Clone, Debug, EnumIter, DeriveRelation)] pub enum Relation { #[sea_orm(has_many = "super::sys_role_menu::Entity")] SysRoleMenu, #[sea_orm(has_many = "super::sys_user_role::Entity")] SysUserRole, } impl Related<super::sys_role_menu::Entity> for Entity { fn to() -> RelationDef { Relation::SysRoleMenu.def() } } impl Related<super::sys_user_role::Entity> for Entity { fn to() -> RelationDef { Relation::SysUserRole.def() } } impl ActiveModelBehavior for ActiveModel {}
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/model/src/admin/entities/sys_login_log.rs
server/model/src/admin/entities/sys_login_log.rs
//! `SeaORM` Entity, @generated by sea-orm-codegen 1.0.0 use sea_orm::entity::prelude::*; use serde::Serialize; #[derive(Clone, Debug, PartialEq, DeriveEntityModel, Eq, Serialize)] #[sea_orm(table_name = "sys_login_log")] #[serde(rename_all = "camelCase")] pub struct Model { #[sea_orm(primary_key, auto_increment = false, column_type = "Text")] pub id: String, #[sea_orm(column_type = "Text")] pub user_id: String, #[sea_orm(column_type = "Text")] pub username: String, #[sea_orm(column_type = "Text")] pub domain: String, pub login_time: DateTime, #[sea_orm(column_type = "Text")] pub ip: String, pub port: Option<i32>, #[sea_orm(column_type = "Text")] pub address: String, #[sea_orm(column_type = "Text")] pub user_agent: String, #[sea_orm(column_type = "Text")] pub request_id: String, #[sea_orm(column_type = "Text")] pub r#type: String, pub created_at: DateTime, #[sea_orm(column_type = "Text")] pub created_by: String, } #[derive(Copy, Clone, Debug, EnumIter, DeriveRelation)] pub enum Relation {} impl ActiveModelBehavior for ActiveModel {}
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false
soybeanjs/soybean-admin-rust
https://github.com/soybeanjs/soybean-admin-rust/blob/a560191ee087ba509e2060f17937b9f2c8f9be33/server/model/src/admin/entities/sys_domain.rs
server/model/src/admin/entities/sys_domain.rs
//! `SeaORM` Entity, @generated by sea-orm-codegen 1.1.0 use sea_orm::entity::prelude::*; use serde::Serialize; use super::sea_orm_active_enums::Status; #[derive(Clone, Debug, PartialEq, DeriveEntityModel, Eq, Serialize)] #[sea_orm(table_name = "sys_domain")] pub struct Model { #[sea_orm(primary_key, auto_increment = false, column_type = "Text")] pub id: String, #[sea_orm(column_type = "Text", unique)] pub code: String, #[sea_orm(column_type = "Text")] pub name: String, #[sea_orm(column_type = "Text", nullable)] pub description: Option<String>, pub status: Status, pub created_at: DateTime, #[sea_orm(column_type = "Text")] pub created_by: String, pub updated_at: Option<DateTime>, #[sea_orm(column_type = "Text", nullable)] pub updated_by: Option<String>, } #[derive(Copy, Clone, Debug, EnumIter, DeriveRelation)] pub enum Relation {} impl ActiveModelBehavior for ActiveModel {}
rust
Apache-2.0
a560191ee087ba509e2060f17937b9f2c8f9be33
2026-01-04T20:21:43.261270Z
false