1
0

v20.go 1.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354
  1. package migrations
  2. import (
  3. "github.com/cockroachdb/errors"
  4. "gorm.io/gorm"
  5. "gogs.io/gogs/internal/cryptoutil"
  6. )
  7. func migrateAccessTokenToSHA256(db *gorm.DB) error {
  8. type accessToken struct {
  9. ID int64
  10. Sha1 string
  11. SHA256 string `gorm:"TYPE:VARCHAR(64)"`
  12. }
  13. if db.Migrator().HasColumn(&accessToken{}, "SHA256") {
  14. return errMigrationSkipped
  15. }
  16. return db.Transaction(func(tx *gorm.DB) error {
  17. // 1. Add column without constraints because all rows have NULL values for the
  18. // "sha256" column.
  19. err := tx.Migrator().AddColumn(&accessToken{}, "SHA256")
  20. if err != nil {
  21. return errors.Wrap(err, "add column")
  22. }
  23. // 2. Generate SHA256 for existing rows from their values in the "sha1" column.
  24. var accessTokens []*accessToken
  25. err = tx.Where("sha256 IS NULL").Find(&accessTokens).Error
  26. if err != nil {
  27. return errors.Wrap(err, "list")
  28. }
  29. for _, t := range accessTokens {
  30. sha256 := cryptoutil.SHA256(t.Sha1)
  31. err = tx.Model(&accessToken{}).Where("id = ?", t.ID).Update("sha256", sha256).Error
  32. if err != nil {
  33. return errors.Wrap(err, "update")
  34. }
  35. }
  36. // 3. We are now safe to apply constraints to the "sha256" column.
  37. type accessTokenWithConstraint struct {
  38. SHA256 string `gorm:"type:VARCHAR(64);unique;not null"`
  39. }
  40. err = tx.Table("access_token").AutoMigrate(&accessTokenWithConstraint{})
  41. if err != nil {
  42. return errors.Wrap(err, "auto migrate")
  43. }
  44. return nil
  45. })
  46. }