use std::fs::{create_dir_all, File}; use std::io::copy; use std::ops::Deref; use std::path::{Path, PathBuf}; use std::sync::Arc; use std::time::Duration; use anyhow::Error; use collab_folder::FolderData; use collab_plugins::cloud_storage::RemoteCollabStorage; use nanoid::nanoid; use tokio::sync::mpsc::Receiver; use tokio::time::timeout; use uuid::Uuid; use zip::ZipArchive; use event_integration::event_builder::EventBuilder; use event_integration::Cleaner; use event_integration::EventIntegrationTest; use flowy_database_deps::cloud::DatabaseCloudService; use flowy_folder_deps::cloud::{FolderCloudService, FolderSnapshot}; use flowy_server::supabase::api::*; use flowy_server::{AppFlowyEncryption, EncryptionImpl}; use flowy_server_config::supabase_config::SupabaseConfiguration; use flowy_user::entities::{AuthenticatorPB, UpdateUserProfilePayloadPB}; use flowy_user::errors::FlowyError; use flowy_user::event_map::UserEvent::*; use flowy_user_deps::cloud::{UserCloudService, UserCloudServiceProvider}; use flowy_user_deps::entities::Authenticator; pub fn get_supabase_config() -> Option { dotenv::from_path(".env.ci").ok()?; SupabaseConfiguration::from_env().ok() } pub struct FlowySupabaseTest { event_test: EventIntegrationTest, } impl FlowySupabaseTest { pub async fn new() -> Option { let _ = get_supabase_config()?; let event_test = EventIntegrationTest::new().await; event_test.set_auth_type(AuthenticatorPB::Supabase); event_test .server_provider .set_authenticator(Authenticator::Supabase); Some(Self { event_test }) } pub async fn update_user_profile( &self, payload: UpdateUserProfilePayloadPB, ) -> Option { EventBuilder::new(self.event_test.clone()) .event(UpdateUserProfile) .payload(payload) .async_send() .await .error() } } impl Deref for FlowySupabaseTest { type Target = EventIntegrationTest; fn deref(&self) -> &Self::Target { &self.event_test } } pub async fn receive_with_timeout(mut receiver: Receiver, duration: Duration) -> Option { timeout(duration, receiver.recv()).await.ok()? } pub fn get_supabase_ci_config() -> Option { dotenv::from_filename("./.env.ci").ok()?; SupabaseConfiguration::from_env().ok() } #[allow(dead_code)] pub fn get_supabase_dev_config() -> Option { dotenv::from_filename("./.env.dev").ok()?; SupabaseConfiguration::from_env().ok() } pub fn collab_service() -> Arc { let (server, encryption_impl) = appflowy_server(None); Arc::new(SupabaseCollabStorageImpl::new( server, None, Arc::downgrade(&encryption_impl), )) } pub fn database_service() -> Arc { let (server, _encryption_impl) = appflowy_server(None); Arc::new(SupabaseDatabaseServiceImpl::new(server)) } pub fn user_auth_service() -> Arc { let (server, _encryption_impl) = appflowy_server(None); Arc::new(SupabaseUserServiceImpl::new(server, vec![], None)) } pub fn folder_service() -> Arc { let (server, _encryption_impl) = appflowy_server(None); Arc::new(SupabaseFolderServiceImpl::new(server)) } #[allow(dead_code)] pub fn encryption_folder_service( secret: Option, ) -> (Arc, Arc) { let (server, encryption_impl) = appflowy_server(secret); let service = Arc::new(SupabaseFolderServiceImpl::new(server)); (service, encryption_impl) } pub fn encryption_collab_service( secret: Option, ) -> (Arc, Arc) { let (server, encryption_impl) = appflowy_server(secret); let service = Arc::new(SupabaseCollabStorageImpl::new( server, None, Arc::downgrade(&encryption_impl), )); (service, encryption_impl) } pub async fn get_folder_data_from_server( uid: &i64, folder_id: &str, encryption_secret: Option, ) -> Result, Error> { let (cloud_service, _encryption) = encryption_folder_service(encryption_secret); cloud_service.get_folder_data(folder_id, uid).await } pub async fn get_folder_snapshots( folder_id: &str, encryption_secret: Option, ) -> Vec { let (cloud_service, _encryption) = encryption_folder_service(encryption_secret); cloud_service .get_folder_snapshots(folder_id, 10) .await .unwrap() } pub fn appflowy_server( encryption_secret: Option, ) -> (SupabaseServerServiceImpl, Arc) { let config = SupabaseConfiguration::from_env().unwrap(); let encryption_impl: Arc = Arc::new(EncryptionImpl::new(encryption_secret)); let encryption = Arc::downgrade(&encryption_impl); let server = Arc::new(RESTfulPostgresServer::new(config, encryption)); (SupabaseServerServiceImpl::new(server), encryption_impl) } pub fn unzip_history_user_db(root: &str, folder_name: &str) -> std::io::Result<(Cleaner, PathBuf)> { // Open the zip file let zip_file_path = format!("{}/{}.zip", root, folder_name); let reader = File::open(zip_file_path)?; let output_folder_path = format!("{}/unit_test_{}", root, nanoid!(6)); // Create a ZipArchive from the file let mut archive = ZipArchive::new(reader)?; // Iterate through each file in the zip for i in 0..archive.len() { let mut file = archive.by_index(i)?; let output_path = Path::new(&output_folder_path).join(file.mangled_name()); if file.name().ends_with('/') { // Create directory create_dir_all(&output_path)?; } else { // Write file if let Some(p) = output_path.parent() { if !p.exists() { create_dir_all(p)?; } } let mut outfile = File::create(&output_path)?; copy(&mut file, &mut outfile)?; } } let path = format!("{}/{}", output_folder_path, folder_name); Ok(( Cleaner::new(PathBuf::from(output_folder_path)), PathBuf::from(path), )) } pub fn generate_test_email() -> String { format!("{}@test.com", Uuid::new_v4()) }