mirror of
https://github.com/memohai/Memoh.git
synced 2026-04-27 07:16:19 +09:00
ea719f7ca7
* refactor: memory provider * fix: migrations * feat: divide collection from different built-in memory * feat: add `MEMORY.md` and `PROFILES.md` * use .env for docker compose. fix #142 (#143) * feat(web): add brand icons for search providers (#144) Add custom FontAwesome icon definitions for all 9 search providers: - Yandex: uses existing faYandex from FA free brands - Tavily, Jina, Exa, Bocha, Serper: custom icons from brand SVGs - DuckDuckGo, SearXNG, Sogou: custom icons from Simple Icons Icons are registered with a custom 'fac' prefix and rendered as monochrome (currentColor) via FontAwesome's standard rendering. * fix: resolve multiple UI bugs (#147) * feat: add email service with multi-adapter support (#146) * feat: add email service with multi-adapter support Implement a full-stack email service with global provider management, per-bot bindings with granular read/write permissions, outbox audit storage, and MCP tool integration for direct mailbox access. Backend: - Email providers: CRUD with dynamic config schema (generic SMTP/IMAP, Mailgun) - Generic adapter: go-mail (SMTP) + go-imap/v2 (IMAP IDLE real-time push via UnilateralDataHandler + UID-based tracking + periodic check fallback) - Mailgun adapter: mailgun-go/v5 with dual inbound mode (webhook + poll) - Bot email bindings: per-bot provider binding with independent r/w permissions - Outbox: outbound email audit log with status tracking - Trigger: inbound emails push notification to bot_inbox (from/subject only, LLM reads full content on demand via MCP tools) - MailboxReader interface: on-demand IMAP queries for listing/reading emails - MCP tools: email_accounts, email_send, email_list (paginated mailbox), email_read (by UID) — all with multi-binding and provider_id selection - Webhook: /email/mailgun/webhook/:config_id (JWT-skipped, signature-verified) - DB migration: 0019_add_email (email_providers, bot_email_bindings, email_outbox) Frontend: - Email Providers page: /email-providers with MasterDetailSidebarLayout - Dynamic config form rendered from ordered provider meta schema with i18n keys - Bot detail: Email tab with bindings management + outbox audit table - Sidebar navigation entry - Full i18n support (en + zh) - Auto-generated SDK from Swagger Closes #17 * feat(email): trigger bot conversation immediately on inbound email Instead of only storing an inbox item and waiting for the next chat, the email trigger now proactively invokes the conversation resolver so the bot processes new emails right away — aligned with the schedule/heartbeat trigger pattern. * fix: lint --------- Co-authored-by: Acbox <acbox0328@gmail.com> * chore: update AGENTS.md * feat: files preview * feat(web): improve MCP details page * refactor(skills): import skill with pure markdown string * merge main into refactor/memory * fix: migration * refactor: temp delete qdrant and bm25 index * fix: clean merge code * fix: update memory handler --------- Co-authored-by: Leohearts <leohearts@leohearts.com> Co-authored-by: Menci <mencici@msn.com> Co-authored-by: Quincy <69751197+dqygit@users.noreply.github.com> Co-authored-by: BBQ <35603386+HoneyBBQ@users.noreply.github.com> Co-authored-by: Ran <16112591+chen-ran@users.noreply.github.com>
230 lines
6.4 KiB
Go
230 lines
6.4 KiB
Go
package bots
|
|
|
|
import (
|
|
"context"
|
|
"testing"
|
|
|
|
"github.com/jackc/pgx/v5"
|
|
"github.com/jackc/pgx/v5/pgconn"
|
|
"github.com/jackc/pgx/v5/pgtype"
|
|
|
|
"github.com/memohai/memoh/internal/db/sqlc"
|
|
)
|
|
|
|
// fakeRow implements pgx.Row with a custom scan function.
|
|
type fakeRow struct {
|
|
scanFunc func(dest ...any) error
|
|
}
|
|
|
|
func (r *fakeRow) Scan(dest ...any) error {
|
|
return r.scanFunc(dest...)
|
|
}
|
|
|
|
// fakeDBTX implements sqlc.DBTX for unit testing.
|
|
type fakeDBTX struct {
|
|
queryRowFunc func(ctx context.Context, sql string, args ...any) pgx.Row
|
|
}
|
|
|
|
func (d *fakeDBTX) Exec(context.Context, string, ...interface{}) (pgconn.CommandTag, error) {
|
|
return pgconn.CommandTag{}, nil
|
|
}
|
|
|
|
func (d *fakeDBTX) Query(context.Context, string, ...interface{}) (pgx.Rows, error) {
|
|
return nil, nil
|
|
}
|
|
|
|
func (d *fakeDBTX) QueryRow(ctx context.Context, sql string, args ...any) pgx.Row {
|
|
if d.queryRowFunc != nil {
|
|
return d.queryRowFunc(ctx, sql, args...)
|
|
}
|
|
return &fakeRow{scanFunc: func(dest ...any) error { return pgx.ErrNoRows }}
|
|
}
|
|
|
|
// makeBotRow creates a fakeRow that populates a sqlc.Bot via Scan.
|
|
// Column order: id, owner_user_id, type, display_name, avatar_url, is_active, status,
|
|
// max_context_load_time, max_context_tokens, max_inbox_items, language, allow_guest,
|
|
// reasoning_enabled, reasoning_effort, chat_model_id, search_provider_id, memory_provider_id,
|
|
// heartbeat_enabled, heartbeat_interval, heartbeat_prompt, metadata, created_at, updated_at
|
|
func makeBotRow(botID, ownerUserID pgtype.UUID, botType string, allowGuest bool) *fakeRow {
|
|
return &fakeRow{
|
|
scanFunc: func(dest ...any) error {
|
|
if len(dest) < 23 {
|
|
return pgx.ErrNoRows
|
|
}
|
|
*dest[0].(*pgtype.UUID) = botID
|
|
*dest[1].(*pgtype.UUID) = ownerUserID
|
|
*dest[2].(*string) = botType
|
|
*dest[3].(*pgtype.Text) = pgtype.Text{String: "test-bot", Valid: true}
|
|
*dest[4].(*pgtype.Text) = pgtype.Text{}
|
|
*dest[5].(*bool) = true
|
|
*dest[6].(*string) = BotStatusReady
|
|
*dest[7].(*int32) = 30 // MaxContextLoadTime
|
|
*dest[8].(*int32) = 4096 // MaxContextTokens
|
|
*dest[9].(*int32) = 10 // MaxInboxItems
|
|
*dest[10].(*string) = "en"
|
|
*dest[11].(*bool) = allowGuest
|
|
*dest[12].(*bool) = false // ReasoningEnabled
|
|
*dest[13].(*string) = "medium" // ReasoningEffort
|
|
*dest[14].(*pgtype.UUID) = pgtype.UUID{} // ChatModelID
|
|
*dest[15].(*pgtype.UUID) = pgtype.UUID{} // SearchProviderID
|
|
*dest[16].(*pgtype.UUID) = pgtype.UUID{} // MemoryProviderID
|
|
*dest[17].(*bool) = false // HeartbeatEnabled
|
|
*dest[18].(*int32) = 30 // HeartbeatInterval
|
|
*dest[19].(*string) = "" // HeartbeatPrompt
|
|
*dest[20].(*[]byte) = []byte(`{}`)
|
|
*dest[21].(*pgtype.Timestamptz) = pgtype.Timestamptz{}
|
|
*dest[22].(*pgtype.Timestamptz) = pgtype.Timestamptz{}
|
|
return nil
|
|
},
|
|
}
|
|
}
|
|
|
|
func makeMemberRow(botID, userID pgtype.UUID) *fakeRow {
|
|
return &fakeRow{
|
|
scanFunc: func(dest ...any) error {
|
|
if len(dest) < 4 {
|
|
return pgx.ErrNoRows
|
|
}
|
|
*dest[0].(*pgtype.UUID) = botID
|
|
*dest[1].(*pgtype.UUID) = userID
|
|
*dest[2].(*string) = MemberRoleMember
|
|
*dest[3].(*pgtype.Timestamptz) = pgtype.Timestamptz{}
|
|
return nil
|
|
},
|
|
}
|
|
}
|
|
|
|
func makeNoRow() *fakeRow {
|
|
return &fakeRow{scanFunc: func(dest ...any) error { return pgx.ErrNoRows }}
|
|
}
|
|
|
|
func mustParseUUID(s string) pgtype.UUID {
|
|
var u pgtype.UUID
|
|
_ = u.Scan(s)
|
|
return u
|
|
}
|
|
|
|
func TestAuthorizeAccess(t *testing.T) {
|
|
ownerUUID := mustParseUUID("00000000-0000-0000-0000-000000000001")
|
|
botUUID := mustParseUUID("00000000-0000-0000-0000-000000000002")
|
|
strangerUUID := mustParseUUID("00000000-0000-0000-0000-000000000003")
|
|
memberUUID := mustParseUUID("00000000-0000-0000-0000-000000000004")
|
|
|
|
ownerID := ownerUUID.String()
|
|
botID := botUUID.String()
|
|
strangerID := strangerUUID.String()
|
|
memberID := memberUUID.String()
|
|
|
|
tests := []struct {
|
|
name string
|
|
userID string
|
|
isAdmin bool
|
|
policy AccessPolicy
|
|
botType string
|
|
allowGst bool
|
|
isMember bool
|
|
wantErr bool
|
|
wantErrIs error
|
|
}{
|
|
{
|
|
name: "owner always allowed",
|
|
userID: ownerID,
|
|
policy: AccessPolicy{},
|
|
botType: BotTypePublic,
|
|
wantErr: false,
|
|
},
|
|
{
|
|
name: "admin always allowed",
|
|
userID: strangerID,
|
|
isAdmin: true,
|
|
policy: AccessPolicy{},
|
|
botType: BotTypePublic,
|
|
wantErr: false,
|
|
},
|
|
{
|
|
name: "stranger denied without guest on public bot",
|
|
userID: strangerID,
|
|
policy: AccessPolicy{AllowGuest: false},
|
|
botType: BotTypePublic,
|
|
allowGst: true,
|
|
wantErr: true,
|
|
wantErrIs: ErrBotAccessDenied,
|
|
},
|
|
{
|
|
name: "stranger denied when bot guest disabled",
|
|
userID: strangerID,
|
|
policy: AccessPolicy{AllowGuest: true},
|
|
botType: BotTypePublic,
|
|
allowGst: false,
|
|
wantErr: true,
|
|
wantErrIs: ErrBotAccessDenied,
|
|
},
|
|
{
|
|
name: "stranger allowed when policy and bot both allow guest",
|
|
userID: strangerID,
|
|
policy: AccessPolicy{AllowGuest: true},
|
|
botType: BotTypePublic,
|
|
allowGst: true,
|
|
wantErr: false,
|
|
},
|
|
{
|
|
name: "guest not allowed on personal bot",
|
|
userID: strangerID,
|
|
policy: AccessPolicy{AllowGuest: true},
|
|
botType: BotTypePersonal,
|
|
allowGst: true,
|
|
wantErr: true,
|
|
wantErrIs: ErrBotAccessDenied,
|
|
},
|
|
{
|
|
name: "member allowed with AllowPublicMember policy",
|
|
userID: memberID,
|
|
policy: AccessPolicy{AllowPublicMember: true},
|
|
botType: BotTypePublic,
|
|
isMember: true,
|
|
wantErr: false,
|
|
},
|
|
{
|
|
name: "non-member denied with AllowPublicMember policy",
|
|
userID: strangerID,
|
|
policy: AccessPolicy{AllowPublicMember: true},
|
|
botType: BotTypePublic,
|
|
isMember: false,
|
|
wantErr: true,
|
|
wantErrIs: ErrBotAccessDenied,
|
|
},
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
db := &fakeDBTX{
|
|
queryRowFunc: func(_ context.Context, sql string, args ...any) pgx.Row {
|
|
// Route to bot or member row based on query.
|
|
if len(args) == 1 {
|
|
return makeBotRow(botUUID, ownerUUID, tt.botType, tt.allowGst)
|
|
}
|
|
if tt.isMember {
|
|
return makeMemberRow(botUUID, memberUUID)
|
|
}
|
|
return makeNoRow()
|
|
},
|
|
}
|
|
svc := NewService(nil, sqlc.New(db))
|
|
|
|
_, err := svc.AuthorizeAccess(context.Background(), tt.userID, botID, tt.isAdmin, tt.policy)
|
|
if tt.wantErr {
|
|
if err == nil {
|
|
t.Fatal("expected error, got nil")
|
|
}
|
|
if tt.wantErrIs != nil && err.Error() != tt.wantErrIs.Error() {
|
|
t.Fatalf("expected error %q, got %q", tt.wantErrIs, err)
|
|
}
|
|
} else {
|
|
if err != nil {
|
|
t.Fatalf("unexpected error: %v", err)
|
|
}
|
|
}
|
|
})
|
|
}
|
|
}
|