sqlite_graphrag/commands/
restore.rs1use crate::errors::AppError;
4use crate::i18n::errors_msg;
5use crate::output;
6use crate::output::JsonOutputFormat;
7use crate::paths::AppPaths;
8use crate::storage::connection::open_rw;
9use crate::storage::memories;
10use crate::storage::versions;
11use rusqlite::params;
12use rusqlite::OptionalExtension;
13use serde::Serialize;
14
15#[derive(clap::Args)]
16#[command(after_long_help = "EXAMPLES:\n \
17 # Restore the latest non-`restore` version of a memory\n \
18 sqlite-graphrag restore --name onboarding\n\n \
19 # Restore a specific version\n \
20 sqlite-graphrag restore --name onboarding --version 3\n\n \
21 # Restore within a specific namespace\n \
22 sqlite-graphrag restore --name onboarding --namespace my-project")]
23pub struct RestoreArgs {
24 #[arg(
26 value_name = "NAME",
27 conflicts_with = "name",
28 help = "Memory name to restore; alternative to --name"
29 )]
30 pub name_positional: Option<String>,
31 #[arg(long)]
33 pub name: Option<String>,
34 #[arg(long)]
38 pub version: Option<i64>,
39 #[arg(
40 long,
41 help = "Namespace (env: SQLITE_GRAPHRAG_NAMESPACE, default: global)"
42 )]
43 pub namespace: Option<String>,
44 #[arg(
46 long,
47 value_name = "EPOCH_OR_RFC3339",
48 value_parser = crate::parsers::parse_expected_updated_at,
49 long_help = "Optimistic lock: reject if updated_at does not match. \
50Accepts Unix epoch (e.g. 1700000000) or RFC 3339 (e.g. 2026-04-19T12:00:00Z)."
51 )]
52 pub expected_updated_at: Option<i64>,
53 #[arg(long, value_enum, default_value_t = JsonOutputFormat::Json)]
55 pub format: JsonOutputFormat,
56 #[arg(long, hide = true, help = "No-op; JSON is always emitted on stdout")]
57 pub json: bool,
58 #[arg(long, env = "SQLITE_GRAPHRAG_DB_PATH")]
59 pub db: Option<String>,
60}
61
62#[derive(Serialize)]
63struct RestoreResponse {
64 action: String,
66 memory_id: i64,
67 name: String,
68 version: i64,
69 restored_from: i64,
70 elapsed_ms: u64,
72}
73
74pub fn run(args: RestoreArgs) -> Result<(), AppError> {
75 let start = std::time::Instant::now();
76 let _ = args.format;
77 let name = args
78 .name_positional
79 .as_deref()
80 .or(args.name.as_deref())
81 .ok_or_else(|| {
82 AppError::Validation(
83 "name required: pass as positional argument or via --name".to_string(),
84 )
85 })?
86 .to_string();
87 let namespace = crate::namespace::resolve_namespace(args.namespace.as_deref())?;
88 let paths = AppPaths::resolve(args.db.as_deref())?;
89 let mut conn = open_rw(&paths.db)?;
90
91 let result: Option<(i64, i64)> = conn
93 .query_row(
94 "SELECT id, updated_at FROM memories WHERE namespace = ?1 AND name = ?2",
95 params![namespace, name],
96 |r| Ok((r.get(0)?, r.get(1)?)),
97 )
98 .optional()?;
99 let (memory_id, current_updated_at) = result
100 .ok_or_else(|| AppError::NotFound(errors_msg::memory_not_found(&name, &namespace)))?;
101
102 if let Some(expected) = args.expected_updated_at {
103 if expected != current_updated_at {
104 return Err(AppError::Conflict(errors_msg::optimistic_lock_conflict(
105 expected,
106 current_updated_at,
107 )));
108 }
109 }
110
111 let target_version: i64 = match args.version {
115 Some(v) => v,
116 None => {
117 let last: Option<i64> = conn
118 .query_row(
119 "SELECT MAX(version) FROM memory_versions
120 WHERE memory_id = ?1 AND change_reason != 'restore'",
121 params![memory_id],
122 |r| r.get(0),
123 )
124 .optional()?
125 .flatten();
126 let v = last.ok_or_else(|| {
127 AppError::NotFound(errors_msg::memory_not_found(&name, &namespace))
128 })?;
129 tracing::info!(
130 "restore --version omitted; using latest non-restore version: {}",
131 v
132 );
133 v
134 }
135 };
136
137 let version_row: (String, String, String, String, String) = {
138 let mut stmt = conn.prepare(
139 "SELECT name, type, description, body, metadata
140 FROM memory_versions
141 WHERE memory_id = ?1 AND version = ?2",
142 )?;
143
144 stmt.query_row(params![memory_id, target_version], |r| {
145 Ok((r.get(0)?, r.get(1)?, r.get(2)?, r.get(3)?, r.get(4)?))
146 })
147 .map_err(|_| AppError::NotFound(errors_msg::version_not_found(target_version, &name)))?
148 };
149
150 let (old_name, old_type, old_description, old_body, old_metadata) = version_row;
151
152 let (cur_name, cur_desc, cur_body): (String, String, String) = conn.query_row(
155 "SELECT name, description, body FROM memories WHERE id = ?1",
156 params![memory_id],
157 |r| Ok((r.get(0)?, r.get(1)?, r.get(2)?)),
158 )?;
159
160 output::emit_progress_i18n(
164 "Re-computing embedding for restored memory...",
165 crate::i18n::validation::runtime_pt::restore_recomputing_embedding(),
166 );
167 let embedding = crate::daemon::embed_passage_or_local(&paths.models, &old_body)?;
168 let snippet: String = old_body.chars().take(300).collect();
169
170 let tx = conn.transaction_with_behavior(rusqlite::TransactionBehavior::Immediate)?;
171
172 let affected = if let Some(ts) = args.expected_updated_at {
174 tx.execute(
175 "UPDATE memories SET name=?2, type=?3, description=?4, body=?5, body_hash=?6, deleted_at=NULL
176 WHERE id=?1 AND updated_at=?7",
177 rusqlite::params![
178 memory_id,
179 old_name,
180 old_type,
181 old_description,
182 old_body,
183 blake3::hash(old_body.as_bytes()).to_hex().to_string(),
184 ts
185 ],
186 )?
187 } else {
188 tx.execute(
189 "UPDATE memories SET name=?2, type=?3, description=?4, body=?5, body_hash=?6, deleted_at=NULL
190 WHERE id=?1",
191 rusqlite::params![
192 memory_id,
193 old_name,
194 old_type,
195 old_description,
196 old_body,
197 blake3::hash(old_body.as_bytes()).to_hex().to_string()
198 ],
199 )?
200 };
201
202 if affected == 0 {
203 return Err(AppError::Conflict(errors_msg::concurrent_process_conflict()));
204 }
205
206 let next_v = versions::next_version(&tx, memory_id)?;
207
208 versions::insert_version(
209 &tx,
210 memory_id,
211 next_v,
212 &old_name,
213 &old_type,
214 &old_description,
215 &old_body,
216 &old_metadata,
217 None,
218 "restore",
219 )?;
220
221 memories::upsert_vec(
223 &tx, memory_id, &namespace, &old_type, &embedding, &old_name, &snippet,
224 )?;
225
226 memories::sync_fts_after_update(
227 &tx,
228 memory_id,
229 &cur_name,
230 &cur_desc,
231 &cur_body,
232 &old_name,
233 &old_description,
234 &old_body,
235 )?;
236
237 tx.commit()?;
238
239 conn.execute_batch("PRAGMA wal_checkpoint(TRUNCATE);")?;
240
241 output::emit_json(&RestoreResponse {
242 action: "restored".to_string(),
243 memory_id,
244 name: old_name,
245 version: next_v,
246 restored_from: target_version,
247 elapsed_ms: start.elapsed().as_millis() as u64,
248 })?;
249
250 Ok(())
251}
252
253#[cfg(test)]
254mod tests {
255 use crate::errors::AppError;
256
257 #[test]
258 fn optimistic_lock_conflict_returns_exit_3() {
259 let err = AppError::Conflict(
260 "optimistic lock conflict: expected updated_at=50, but current is 99".to_string(),
261 );
262 assert_eq!(err.exit_code(), 3);
263 assert!(err.to_string().contains("conflict"));
264 }
265
266 #[test]
267 fn restore_response_includes_action_field() {
268 let resp = super::RestoreResponse {
269 action: "restored".to_string(),
270 memory_id: 1,
271 name: "test-mem".to_string(),
272 version: 3,
273 restored_from: 2,
274 elapsed_ms: 42,
275 };
276 let json = serde_json::to_value(&resp).expect("serialization failed");
277 assert_eq!(json["action"], "restored");
278 assert_eq!(json["memory_id"], 1);
279 assert_eq!(json["version"], 3);
280 assert_eq!(json["restored_from"], 2);
281 }
282}