mirror of
https://github.com/usememos/memos.git
synced 2024-12-19 09:02:49 +03:00
4335897367
* chore: remove metrics plugin * chore: update
508 lines
17 KiB
Go
508 lines
17 KiB
Go
package server
|
|
|
|
import (
|
|
"encoding/json"
|
|
"fmt"
|
|
"net/http"
|
|
"strconv"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/pkg/errors"
|
|
"github.com/usememos/memos/api"
|
|
"github.com/usememos/memos/common"
|
|
|
|
"github.com/labstack/echo/v4"
|
|
)
|
|
|
|
func (s *Server) registerMemoRoutes(g *echo.Group) {
|
|
g.POST("/memo", func(c echo.Context) error {
|
|
ctx := c.Request().Context()
|
|
userID, ok := c.Get(getUserIDContextKey()).(int)
|
|
if !ok {
|
|
return echo.NewHTTPError(http.StatusUnauthorized, "Missing user in session")
|
|
}
|
|
|
|
memoCreate := &api.MemoCreate{}
|
|
if err := json.NewDecoder(c.Request().Body).Decode(memoCreate); err != nil {
|
|
return echo.NewHTTPError(http.StatusBadRequest, "Malformatted post memo request").SetInternal(err)
|
|
}
|
|
|
|
if memoCreate.Visibility == "" {
|
|
userMemoVisibilitySetting, err := s.Store.FindUserSetting(ctx, &api.UserSettingFind{
|
|
UserID: userID,
|
|
Key: api.UserSettingMemoVisibilityKey,
|
|
})
|
|
if err != nil {
|
|
return echo.NewHTTPError(http.StatusInternalServerError, "Failed to find user setting").SetInternal(err)
|
|
}
|
|
|
|
if userMemoVisibilitySetting != nil {
|
|
memoVisibility := api.Private
|
|
err := json.Unmarshal([]byte(userMemoVisibilitySetting.Value), &memoVisibility)
|
|
if err != nil {
|
|
return echo.NewHTTPError(http.StatusInternalServerError, "Failed to unmarshal user setting value").SetInternal(err)
|
|
}
|
|
memoCreate.Visibility = memoVisibility
|
|
} else {
|
|
// Private is the default memo visibility.
|
|
memoCreate.Visibility = api.Private
|
|
}
|
|
}
|
|
|
|
// Find system settings
|
|
disablePublicMemosSystemSetting, err := s.Store.FindSystemSetting(ctx, &api.SystemSettingFind{
|
|
Name: api.SystemSettingDisablePublicMemosName,
|
|
})
|
|
if err != nil && common.ErrorCode(err) != common.NotFound {
|
|
return echo.NewHTTPError(http.StatusInternalServerError, "Failed to find system setting").SetInternal(err)
|
|
}
|
|
if disablePublicMemosSystemSetting != nil {
|
|
disablePublicMemos := false
|
|
err = json.Unmarshal([]byte(disablePublicMemosSystemSetting.Value), &disablePublicMemos)
|
|
if err != nil {
|
|
return echo.NewHTTPError(http.StatusInternalServerError, "Failed to unmarshal system setting").SetInternal(err)
|
|
}
|
|
if disablePublicMemos {
|
|
memoCreate.Visibility = api.Private
|
|
}
|
|
}
|
|
|
|
if len(memoCreate.Content) > api.MaxContentLength {
|
|
return echo.NewHTTPError(http.StatusBadRequest, "Content size overflow, up to 1MB").SetInternal(err)
|
|
}
|
|
|
|
memoCreate.CreatorID = userID
|
|
memo, err := s.Store.CreateMemo(ctx, memoCreate)
|
|
if err != nil {
|
|
return echo.NewHTTPError(http.StatusInternalServerError, "Failed to create memo").SetInternal(err)
|
|
}
|
|
if err := s.createMemoCreateActivity(c, memo); err != nil {
|
|
return echo.NewHTTPError(http.StatusInternalServerError, "Failed to create activity").SetInternal(err)
|
|
}
|
|
|
|
for _, resourceID := range memoCreate.ResourceIDList {
|
|
if _, err := s.Store.UpsertMemoResource(ctx, &api.MemoResourceUpsert{
|
|
MemoID: memo.ID,
|
|
ResourceID: resourceID,
|
|
}); err != nil {
|
|
return echo.NewHTTPError(http.StatusInternalServerError, "Failed to upsert memo resource").SetInternal(err)
|
|
}
|
|
}
|
|
|
|
memo, err = s.Store.ComposeMemo(ctx, memo)
|
|
if err != nil {
|
|
return echo.NewHTTPError(http.StatusInternalServerError, "Failed to compose memo").SetInternal(err)
|
|
}
|
|
return c.JSON(http.StatusOK, composeResponse(memo))
|
|
})
|
|
|
|
g.PATCH("/memo/:memoId", func(c echo.Context) error {
|
|
ctx := c.Request().Context()
|
|
userID, ok := c.Get(getUserIDContextKey()).(int)
|
|
if !ok {
|
|
return echo.NewHTTPError(http.StatusUnauthorized, "Missing user in session")
|
|
}
|
|
|
|
memoID, err := strconv.Atoi(c.Param("memoId"))
|
|
if err != nil {
|
|
return echo.NewHTTPError(http.StatusBadRequest, fmt.Sprintf("ID is not a number: %s", c.Param("memoId"))).SetInternal(err)
|
|
}
|
|
|
|
memo, err := s.Store.FindMemo(ctx, &api.MemoFind{
|
|
ID: &memoID,
|
|
})
|
|
if err != nil {
|
|
return echo.NewHTTPError(http.StatusInternalServerError, "Failed to find memo").SetInternal(err)
|
|
}
|
|
if memo.CreatorID != userID {
|
|
return echo.NewHTTPError(http.StatusUnauthorized, "Unauthorized")
|
|
}
|
|
|
|
currentTs := time.Now().Unix()
|
|
memoPatch := &api.MemoPatch{
|
|
ID: memoID,
|
|
UpdatedTs: ¤tTs,
|
|
}
|
|
if err := json.NewDecoder(c.Request().Body).Decode(memoPatch); err != nil {
|
|
return echo.NewHTTPError(http.StatusBadRequest, "Malformatted patch memo request").SetInternal(err)
|
|
}
|
|
|
|
if memoPatch.Content != nil && len(*memoPatch.Content) > api.MaxContentLength {
|
|
return echo.NewHTTPError(http.StatusBadRequest, "Content size overflow, up to 1MB").SetInternal(err)
|
|
}
|
|
|
|
memo, err = s.Store.PatchMemo(ctx, memoPatch)
|
|
if err != nil {
|
|
return echo.NewHTTPError(http.StatusInternalServerError, "Failed to patch memo").SetInternal(err)
|
|
}
|
|
|
|
for _, resourceID := range memoPatch.ResourceIDList {
|
|
if _, err := s.Store.UpsertMemoResource(ctx, &api.MemoResourceUpsert{
|
|
MemoID: memo.ID,
|
|
ResourceID: resourceID,
|
|
}); err != nil {
|
|
return echo.NewHTTPError(http.StatusInternalServerError, "Failed to upsert memo resource").SetInternal(err)
|
|
}
|
|
}
|
|
|
|
memo, err = s.Store.ComposeMemo(ctx, memo)
|
|
if err != nil {
|
|
return echo.NewHTTPError(http.StatusInternalServerError, "Failed to compose memo").SetInternal(err)
|
|
}
|
|
return c.JSON(http.StatusOK, composeResponse(memo))
|
|
})
|
|
|
|
g.GET("/memo", func(c echo.Context) error {
|
|
ctx := c.Request().Context()
|
|
memoFind := &api.MemoFind{}
|
|
if userID, err := strconv.Atoi(c.QueryParam("creatorId")); err == nil {
|
|
memoFind.CreatorID = &userID
|
|
}
|
|
|
|
currentUserID, ok := c.Get(getUserIDContextKey()).(int)
|
|
if !ok {
|
|
if memoFind.CreatorID == nil {
|
|
return echo.NewHTTPError(http.StatusBadRequest, "Missing user id to find memo")
|
|
}
|
|
memoFind.VisibilityList = []api.Visibility{api.Public}
|
|
} else {
|
|
if memoFind.CreatorID == nil {
|
|
memoFind.CreatorID = ¤tUserID
|
|
} else {
|
|
memoFind.VisibilityList = []api.Visibility{api.Public, api.Protected}
|
|
}
|
|
}
|
|
|
|
rowStatus := api.RowStatus(c.QueryParam("rowStatus"))
|
|
if rowStatus != "" {
|
|
memoFind.RowStatus = &rowStatus
|
|
}
|
|
pinnedStr := c.QueryParam("pinned")
|
|
if pinnedStr != "" {
|
|
pinned := pinnedStr == "true"
|
|
memoFind.Pinned = &pinned
|
|
}
|
|
tag := c.QueryParam("tag")
|
|
if tag != "" {
|
|
contentSearch := "#" + tag
|
|
memoFind.ContentSearch = &contentSearch
|
|
}
|
|
visibilityListStr := c.QueryParam("visibility")
|
|
if visibilityListStr != "" {
|
|
visibilityList := []api.Visibility{}
|
|
for _, visibility := range strings.Split(visibilityListStr, ",") {
|
|
visibilityList = append(visibilityList, api.Visibility(visibility))
|
|
}
|
|
memoFind.VisibilityList = visibilityList
|
|
}
|
|
if limit, err := strconv.Atoi(c.QueryParam("limit")); err == nil {
|
|
memoFind.Limit = &limit
|
|
}
|
|
if offset, err := strconv.Atoi(c.QueryParam("offset")); err == nil {
|
|
memoFind.Offset = &offset
|
|
}
|
|
|
|
list, err := s.Store.FindMemoList(ctx, memoFind)
|
|
if err != nil {
|
|
return echo.NewHTTPError(http.StatusInternalServerError, "Failed to fetch memo list").SetInternal(err)
|
|
}
|
|
return c.JSON(http.StatusOK, composeResponse(list))
|
|
})
|
|
|
|
g.GET("/memo/:memoId", func(c echo.Context) error {
|
|
ctx := c.Request().Context()
|
|
memoID, err := strconv.Atoi(c.Param("memoId"))
|
|
if err != nil {
|
|
return echo.NewHTTPError(http.StatusBadRequest, fmt.Sprintf("ID is not a number: %s", c.Param("memoId"))).SetInternal(err)
|
|
}
|
|
|
|
memoFind := &api.MemoFind{
|
|
ID: &memoID,
|
|
}
|
|
memo, err := s.Store.FindMemo(ctx, memoFind)
|
|
if err != nil {
|
|
if common.ErrorCode(err) == common.NotFound {
|
|
return echo.NewHTTPError(http.StatusNotFound, fmt.Sprintf("Memo ID not found: %d", memoID)).SetInternal(err)
|
|
}
|
|
|
|
return echo.NewHTTPError(http.StatusInternalServerError, fmt.Sprintf("Failed to find memo by ID: %v", memoID)).SetInternal(err)
|
|
}
|
|
|
|
userID, ok := c.Get(getUserIDContextKey()).(int)
|
|
if memo.Visibility == api.Private {
|
|
if !ok || memo.CreatorID != userID {
|
|
return echo.NewHTTPError(http.StatusForbidden, "this memo is private only")
|
|
}
|
|
} else if memo.Visibility == api.Protected {
|
|
if !ok {
|
|
return echo.NewHTTPError(http.StatusForbidden, "this memo is protected, missing user in session")
|
|
}
|
|
}
|
|
return c.JSON(http.StatusOK, composeResponse(memo))
|
|
})
|
|
|
|
g.POST("/memo/:memoId/organizer", func(c echo.Context) error {
|
|
ctx := c.Request().Context()
|
|
memoID, err := strconv.Atoi(c.Param("memoId"))
|
|
if err != nil {
|
|
return echo.NewHTTPError(http.StatusBadRequest, fmt.Sprintf("ID is not a number: %s", c.Param("memoId"))).SetInternal(err)
|
|
}
|
|
|
|
userID, ok := c.Get(getUserIDContextKey()).(int)
|
|
if !ok {
|
|
return echo.NewHTTPError(http.StatusUnauthorized, "Missing user in session")
|
|
}
|
|
memoOrganizerUpsert := &api.MemoOrganizerUpsert{}
|
|
if err := json.NewDecoder(c.Request().Body).Decode(memoOrganizerUpsert); err != nil {
|
|
return echo.NewHTTPError(http.StatusBadRequest, "Malformatted post memo organizer request").SetInternal(err)
|
|
}
|
|
memoOrganizerUpsert.MemoID = memoID
|
|
memoOrganizerUpsert.UserID = userID
|
|
|
|
err = s.Store.UpsertMemoOrganizer(ctx, memoOrganizerUpsert)
|
|
if err != nil {
|
|
return echo.NewHTTPError(http.StatusInternalServerError, "Failed to upsert memo organizer").SetInternal(err)
|
|
}
|
|
|
|
memo, err := s.Store.FindMemo(ctx, &api.MemoFind{
|
|
ID: &memoID,
|
|
})
|
|
if err != nil {
|
|
if common.ErrorCode(err) == common.NotFound {
|
|
return echo.NewHTTPError(http.StatusNotFound, fmt.Sprintf("Memo ID not found: %d", memoID)).SetInternal(err)
|
|
}
|
|
|
|
return echo.NewHTTPError(http.StatusInternalServerError, fmt.Sprintf("Failed to find memo by ID: %v", memoID)).SetInternal(err)
|
|
}
|
|
return c.JSON(http.StatusOK, composeResponse(memo))
|
|
})
|
|
|
|
g.POST("/memo/:memoId/resource", func(c echo.Context) error {
|
|
ctx := c.Request().Context()
|
|
memoID, err := strconv.Atoi(c.Param("memoId"))
|
|
if err != nil {
|
|
return echo.NewHTTPError(http.StatusBadRequest, fmt.Sprintf("ID is not a number: %s", c.Param("memoId"))).SetInternal(err)
|
|
}
|
|
|
|
userID, ok := c.Get(getUserIDContextKey()).(int)
|
|
if !ok {
|
|
return echo.NewHTTPError(http.StatusUnauthorized, "Missing user in session")
|
|
}
|
|
memoResourceUpsert := &api.MemoResourceUpsert{}
|
|
if err := json.NewDecoder(c.Request().Body).Decode(memoResourceUpsert); err != nil {
|
|
return echo.NewHTTPError(http.StatusBadRequest, "Malformatted post memo resource request").SetInternal(err)
|
|
}
|
|
resourceFind := &api.ResourceFind{
|
|
ID: &memoResourceUpsert.ResourceID,
|
|
}
|
|
resource, err := s.Store.FindResource(ctx, resourceFind)
|
|
if err != nil {
|
|
return echo.NewHTTPError(http.StatusInternalServerError, "Failed to fetch resource").SetInternal(err)
|
|
}
|
|
if resource == nil {
|
|
return echo.NewHTTPError(http.StatusBadRequest, "Resource not found").SetInternal(err)
|
|
} else if resource.CreatorID != userID {
|
|
return echo.NewHTTPError(http.StatusUnauthorized, "Unauthorized to bind this resource").SetInternal(err)
|
|
}
|
|
|
|
memoResourceUpsert.MemoID = memoID
|
|
currentTs := time.Now().Unix()
|
|
memoResourceUpsert.UpdatedTs = ¤tTs
|
|
if _, err := s.Store.UpsertMemoResource(ctx, memoResourceUpsert); err != nil {
|
|
return echo.NewHTTPError(http.StatusInternalServerError, "Failed to upsert memo resource").SetInternal(err)
|
|
}
|
|
return c.JSON(http.StatusOK, composeResponse(resource))
|
|
})
|
|
|
|
g.GET("/memo/:memoId/resource", func(c echo.Context) error {
|
|
ctx := c.Request().Context()
|
|
memoID, err := strconv.Atoi(c.Param("memoId"))
|
|
if err != nil {
|
|
return echo.NewHTTPError(http.StatusBadRequest, fmt.Sprintf("ID is not a number: %s", c.Param("memoId"))).SetInternal(err)
|
|
}
|
|
|
|
resourceFind := &api.ResourceFind{
|
|
MemoID: &memoID,
|
|
}
|
|
resourceList, err := s.Store.FindResourceList(ctx, resourceFind)
|
|
if err != nil {
|
|
return echo.NewHTTPError(http.StatusInternalServerError, "Failed to fetch resource list").SetInternal(err)
|
|
}
|
|
return c.JSON(http.StatusOK, composeResponse(resourceList))
|
|
})
|
|
|
|
g.GET("/memo/stats", func(c echo.Context) error {
|
|
ctx := c.Request().Context()
|
|
normalStatus := api.Normal
|
|
memoFind := &api.MemoFind{
|
|
RowStatus: &normalStatus,
|
|
}
|
|
if creatorID, err := strconv.Atoi(c.QueryParam("creatorId")); err == nil {
|
|
memoFind.CreatorID = &creatorID
|
|
}
|
|
if memoFind.CreatorID == nil {
|
|
return echo.NewHTTPError(http.StatusBadRequest, "Missing user id to find memo")
|
|
}
|
|
|
|
currentUserID, ok := c.Get(getUserIDContextKey()).(int)
|
|
if !ok {
|
|
memoFind.VisibilityList = []api.Visibility{api.Public}
|
|
} else {
|
|
if *memoFind.CreatorID != currentUserID {
|
|
memoFind.VisibilityList = []api.Visibility{api.Public, api.Protected}
|
|
} else {
|
|
memoFind.VisibilityList = []api.Visibility{api.Public, api.Protected, api.Private}
|
|
}
|
|
}
|
|
|
|
list, err := s.Store.FindMemoList(ctx, memoFind)
|
|
if err != nil {
|
|
return echo.NewHTTPError(http.StatusInternalServerError, "Failed to fetch memo list").SetInternal(err)
|
|
}
|
|
|
|
createdTsList := []int64{}
|
|
for _, memo := range list {
|
|
createdTsList = append(createdTsList, memo.CreatedTs)
|
|
}
|
|
return c.JSON(http.StatusOK, composeResponse(createdTsList))
|
|
})
|
|
|
|
g.GET("/memo/all", func(c echo.Context) error {
|
|
ctx := c.Request().Context()
|
|
memoFind := &api.MemoFind{}
|
|
|
|
_, ok := c.Get(getUserIDContextKey()).(int)
|
|
if !ok {
|
|
memoFind.VisibilityList = []api.Visibility{api.Public}
|
|
} else {
|
|
memoFind.VisibilityList = []api.Visibility{api.Public, api.Protected}
|
|
}
|
|
|
|
pinnedStr := c.QueryParam("pinned")
|
|
if pinnedStr != "" {
|
|
pinned := pinnedStr == "true"
|
|
memoFind.Pinned = &pinned
|
|
}
|
|
tag := c.QueryParam("tag")
|
|
if tag != "" {
|
|
contentSearch := "#" + tag + " "
|
|
memoFind.ContentSearch = &contentSearch
|
|
}
|
|
visibilityListStr := c.QueryParam("visibility")
|
|
if visibilityListStr != "" {
|
|
visibilityList := []api.Visibility{}
|
|
for _, visibility := range strings.Split(visibilityListStr, ",") {
|
|
visibilityList = append(visibilityList, api.Visibility(visibility))
|
|
}
|
|
memoFind.VisibilityList = visibilityList
|
|
}
|
|
if limit, err := strconv.Atoi(c.QueryParam("limit")); err == nil {
|
|
memoFind.Limit = &limit
|
|
}
|
|
if offset, err := strconv.Atoi(c.QueryParam("offset")); err == nil {
|
|
memoFind.Offset = &offset
|
|
}
|
|
|
|
// Only fetch normal status memos.
|
|
normalStatus := api.Normal
|
|
memoFind.RowStatus = &normalStatus
|
|
|
|
list, err := s.Store.FindMemoList(ctx, memoFind)
|
|
if err != nil {
|
|
return echo.NewHTTPError(http.StatusInternalServerError, "Failed to fetch all memo list").SetInternal(err)
|
|
}
|
|
return c.JSON(http.StatusOK, composeResponse(list))
|
|
})
|
|
|
|
g.DELETE("/memo/:memoId", func(c echo.Context) error {
|
|
ctx := c.Request().Context()
|
|
userID, ok := c.Get(getUserIDContextKey()).(int)
|
|
if !ok {
|
|
return echo.NewHTTPError(http.StatusUnauthorized, "Missing user in session")
|
|
}
|
|
memoID, err := strconv.Atoi(c.Param("memoId"))
|
|
if err != nil {
|
|
return echo.NewHTTPError(http.StatusBadRequest, fmt.Sprintf("ID is not a number: %s", c.Param("memoId"))).SetInternal(err)
|
|
}
|
|
|
|
memo, err := s.Store.FindMemo(ctx, &api.MemoFind{
|
|
ID: &memoID,
|
|
})
|
|
if err != nil {
|
|
return echo.NewHTTPError(http.StatusInternalServerError, "Failed to find memo").SetInternal(err)
|
|
}
|
|
if memo.CreatorID != userID {
|
|
return echo.NewHTTPError(http.StatusUnauthorized, "Unauthorized")
|
|
}
|
|
|
|
memoDelete := &api.MemoDelete{
|
|
ID: memoID,
|
|
}
|
|
if err := s.Store.DeleteMemo(ctx, memoDelete); err != nil {
|
|
if common.ErrorCode(err) == common.NotFound {
|
|
return echo.NewHTTPError(http.StatusNotFound, fmt.Sprintf("Memo ID not found: %d", memoID))
|
|
}
|
|
return echo.NewHTTPError(http.StatusInternalServerError, fmt.Sprintf("Failed to delete memo ID: %v", memoID)).SetInternal(err)
|
|
}
|
|
return c.JSON(http.StatusOK, true)
|
|
})
|
|
|
|
g.DELETE("/memo/:memoId/resource/:resourceId", func(c echo.Context) error {
|
|
ctx := c.Request().Context()
|
|
userID, ok := c.Get(getUserIDContextKey()).(int)
|
|
if !ok {
|
|
return echo.NewHTTPError(http.StatusUnauthorized, "Missing user in session")
|
|
}
|
|
memoID, err := strconv.Atoi(c.Param("memoId"))
|
|
if err != nil {
|
|
return echo.NewHTTPError(http.StatusBadRequest, fmt.Sprintf("Memo ID is not a number: %s", c.Param("memoId"))).SetInternal(err)
|
|
}
|
|
resourceID, err := strconv.Atoi(c.Param("resourceId"))
|
|
if err != nil {
|
|
return echo.NewHTTPError(http.StatusBadRequest, fmt.Sprintf("Resource ID is not a number: %s", c.Param("resourceId"))).SetInternal(err)
|
|
}
|
|
|
|
memo, err := s.Store.FindMemo(ctx, &api.MemoFind{
|
|
ID: &memoID,
|
|
})
|
|
if err != nil {
|
|
return echo.NewHTTPError(http.StatusInternalServerError, "Failed to find memo").SetInternal(err)
|
|
}
|
|
if memo.CreatorID != userID {
|
|
return echo.NewHTTPError(http.StatusUnauthorized, "Unauthorized")
|
|
}
|
|
|
|
memoResourceDelete := &api.MemoResourceDelete{
|
|
MemoID: &memoID,
|
|
ResourceID: &resourceID,
|
|
}
|
|
if err := s.Store.DeleteMemoResource(ctx, memoResourceDelete); err != nil {
|
|
return echo.NewHTTPError(http.StatusInternalServerError, "Failed to fetch resource list").SetInternal(err)
|
|
}
|
|
return c.JSON(http.StatusOK, true)
|
|
})
|
|
}
|
|
|
|
func (s *Server) createMemoCreateActivity(c echo.Context, memo *api.Memo) error {
|
|
ctx := c.Request().Context()
|
|
payload := api.ActivityMemoCreatePayload{
|
|
Content: memo.Content,
|
|
Visibility: memo.Visibility.String(),
|
|
}
|
|
payloadBytes, err := json.Marshal(payload)
|
|
if err != nil {
|
|
return errors.Wrap(err, "failed to marshal activity payload")
|
|
}
|
|
activity, err := s.Store.CreateActivity(ctx, &api.ActivityCreate{
|
|
CreatorID: memo.CreatorID,
|
|
Type: api.ActivityMemoCreate,
|
|
Level: api.ActivityInfo,
|
|
Payload: string(payloadBytes),
|
|
})
|
|
if err != nil || activity == nil {
|
|
return errors.Wrap(err, "failed to create activity")
|
|
}
|
|
return err
|
|
}
|