sqlite_graphrag/commands/
rename.rs1use crate::errors::AppError;
4use crate::i18n::errors_msg;
5use crate::output;
6use crate::output::JsonOutputFormat;
7use crate::paths::AppPaths;
8use crate::storage::connection::open_rw;
9use crate::storage::{memories, versions};
10use serde::Serialize;
11
12#[derive(clap::Args)]
13#[command(after_long_help = "EXAMPLES:\n \
14 # Rename using two positional arguments (NAME NEW)\n \
15 sqlite-graphrag rename onboarding welcome-guide\n\n \
16 # Rename using the positional NAME + --new-name flag\n \
17 sqlite-graphrag rename onboarding --new-name welcome-guide\n\n \
18 # Rename using the named flag form\n \
19 sqlite-graphrag rename --name onboarding --new-name welcome-guide\n\n \
20 # Rename within a specific namespace\n \
21 sqlite-graphrag rename onboarding welcome-guide --namespace my-project")]
22pub struct RenameArgs {
23 #[arg(
25 value_name = "NAME",
26 conflicts_with = "name",
27 help = "Current memory name to rename; alternative to --name/--old"
28 )]
29 pub name_positional: Option<String>,
30 #[arg(long, alias = "old", alias = "from")]
32 pub name: Option<String>,
33 #[arg(
35 value_name = "NEW",
36 conflicts_with = "new_name",
37 help = "New memory name; alternative to --new-name/--new/--to"
38 )]
39 pub new_name_positional: Option<String>,
40 #[arg(long, alias = "new", alias = "to")]
42 pub new_name: Option<String>,
43 #[arg(
44 long,
45 help = "Namespace (env: SQLITE_GRAPHRAG_NAMESPACE, default: global)"
46 )]
47 pub namespace: Option<String>,
48 #[arg(
50 long,
51 value_name = "EPOCH_OR_RFC3339",
52 value_parser = crate::parsers::parse_expected_updated_at,
53 long_help = "Optimistic lock: reject if updated_at does not match. \
54Accepts Unix epoch (e.g. 1700000000) or RFC 3339 (e.g. 2026-04-19T12:00:00Z)."
55 )]
56 pub expected_updated_at: Option<i64>,
57 #[arg(long, value_name = "UUID")]
59 pub session_id: Option<String>,
60 #[arg(long, value_enum, default_value_t = JsonOutputFormat::Json)]
62 pub format: JsonOutputFormat,
63 #[arg(long, hide = true, help = "No-op; JSON is always emitted on stdout")]
64 pub json: bool,
65 #[arg(long, env = "SQLITE_GRAPHRAG_DB_PATH")]
66 pub db: Option<String>,
67}
68
69#[derive(Serialize)]
70struct RenameResponse {
71 memory_id: i64,
72 name: String,
73 action: &'static str,
74 version: i64,
75 elapsed_ms: u64,
77}
78
79pub fn run(args: RenameArgs) -> Result<(), AppError> {
80 let inicio = std::time::Instant::now();
81 let _ = args.format;
82 use crate::constants::*;
83
84 let name = args.name_positional.or(args.name).ok_or_else(|| {
86 AppError::Validation("name required: pass as positional argument or via --name".to_string())
87 })?;
88 let namespace = crate::namespace::resolve_namespace(args.namespace.as_deref())?;
89
90 let raw_new_name = args.new_name.or(args.new_name_positional).ok_or_else(|| {
91 AppError::Validation(
92 "new name required: pass as positional <NEW> or via --new-name/--new/--to".to_string(),
93 )
94 })?;
95
96 let normalized_new_name = {
98 let lower = raw_new_name.to_lowercase().replace(['_', ' '], "-");
99 let trimmed = lower.trim_matches('-').to_string();
100 if trimmed != raw_new_name {
101 tracing::warn!(
102 original = %raw_new_name,
103 normalized = %trimmed,
104 "new_name auto-normalized to kebab-case"
105 );
106 }
107 trimmed
108 };
109
110 if normalized_new_name.starts_with("__") {
111 return Err(AppError::Validation(
112 crate::i18n::validation::reserved_name(),
113 ));
114 }
115
116 if normalized_new_name.is_empty() || normalized_new_name.len() > MAX_MEMORY_NAME_LEN {
117 return Err(AppError::Validation(
118 crate::i18n::validation::new_name_length(MAX_MEMORY_NAME_LEN),
119 ));
120 }
121
122 {
123 let slug_re = regex::Regex::new(crate::constants::NAME_SLUG_REGEX)
124 .map_err(|e| AppError::Internal(anyhow::anyhow!("regex: {e}")))?;
125 if !slug_re.is_match(&normalized_new_name) {
126 return Err(AppError::Validation(
127 crate::i18n::validation::new_name_kebab(&normalized_new_name),
128 ));
129 }
130 }
131
132 let paths = AppPaths::resolve(args.db.as_deref())?;
133 crate::storage::connection::ensure_db_ready(&paths)?;
134 let mut conn = open_rw(&paths.db)?;
135
136 let (memory_id, current_updated_at, _) = memories::find_by_name(&conn, &namespace, &name)?
137 .ok_or_else(|| AppError::NotFound(errors_msg::memory_not_found(&name, &namespace)))?;
138
139 if let Some(expected) = args.expected_updated_at {
140 if expected != current_updated_at {
141 return Err(AppError::Conflict(errors_msg::optimistic_lock_conflict(
142 expected,
143 current_updated_at,
144 )));
145 }
146 }
147
148 let row = memories::read_by_name(&conn, &namespace, &name)?
149 .ok_or_else(|| AppError::Internal(anyhow::anyhow!("memory not found before rename")))?;
150
151 let memory_type = row.memory_type.clone();
152 let description = row.description.clone();
153 let body = row.body.clone();
154 let metadata = row.metadata.clone();
155
156 let tx = conn.transaction_with_behavior(rusqlite::TransactionBehavior::Immediate)?;
157
158 let affected = if let Some(ts) = args.expected_updated_at {
159 tx.execute(
160 "UPDATE memories SET name=?2 WHERE id=?1 AND updated_at=?3 AND deleted_at IS NULL",
161 rusqlite::params![memory_id, normalized_new_name, ts],
162 )?
163 } else {
164 tx.execute(
165 "UPDATE memories SET name=?2 WHERE id=?1 AND deleted_at IS NULL",
166 rusqlite::params![memory_id, normalized_new_name],
167 )?
168 };
169
170 if affected == 0 {
171 return Err(AppError::Conflict(
172 "optimistic lock conflict: memory was modified by another process".to_string(),
173 ));
174 }
175
176 let next_v = versions::next_version(&tx, memory_id)?;
177
178 versions::insert_version(
179 &tx,
180 memory_id,
181 next_v,
182 &normalized_new_name,
183 &memory_type,
184 &description,
185 &body,
186 &metadata,
187 None,
188 "rename",
189 )?;
190
191 tx.commit()?;
192
193 output::emit_json(&RenameResponse {
194 memory_id,
195 name: normalized_new_name,
196 action: "renamed",
197 version: next_v,
198 elapsed_ms: inicio.elapsed().as_millis() as u64,
199 })?;
200
201 Ok(())
202}
203
204#[cfg(test)]
205mod tests {
206 use crate::storage::memories::{insert, NewMemory};
207 use tempfile::TempDir;
208
209 fn setup_db() -> (TempDir, rusqlite::Connection) {
210 crate::storage::connection::register_vec_extension();
211 let dir = TempDir::new().unwrap();
212 let db_path = dir.path().join("test.db");
213 let mut conn = rusqlite::Connection::open(&db_path).unwrap();
214 crate::migrations::runner().run(&mut conn).unwrap();
215 (dir, conn)
216 }
217
218 fn new_memory(name: &str) -> NewMemory {
219 NewMemory {
220 namespace: "global".to_string(),
221 name: name.to_string(),
222 memory_type: "user".to_string(),
223 description: "desc".to_string(),
224 body: "corpo".to_string(),
225 body_hash: format!("hash-{name}"),
226 session_id: None,
227 source: "agent".to_string(),
228 metadata: serde_json::json!({}),
229 }
230 }
231
232 #[test]
233 fn rejects_new_name_with_double_underscore_prefix() {
234 use crate::errors::AppError;
235 let (_dir, conn) = setup_db();
236 insert(&conn, &new_memory("mem-teste")).unwrap();
237 drop(conn);
238
239 let err = AppError::Validation(
240 "names and namespaces starting with __ are reserved for internal use".to_string(),
241 );
242 assert!(err.to_string().contains("__"));
243 assert_eq!(err.exit_code(), 1);
244 }
245
246 #[test]
247 fn optimistic_lock_conflict_returns_exit_3() {
248 use crate::errors::AppError;
249 let err = AppError::Conflict(
250 "optimistic lock conflict: expected updated_at=100, but current is 200".to_string(),
251 );
252 assert_eq!(err.exit_code(), 3);
253 }
254}