gothinkster / realworld

"The mother of all demo apps" — Exemplary fullstack Medium.com clone powered by React, Angular, Node, Django, and many more
https://realworld-docs.netlify.app/
MIT License
80.71k stars 7.35k forks source link

[Bug]: articles api is broken #1576

Open tobiu opened 2 months ago

tobiu commented 2 months ago

Relevant scope

Backend specs

Description

not sure if the specs changed.

open: https://demo.realworld.how/

500 internal server error: "\nInvalid prisma.article.count() invocation:\n\n\nError occurred during query execution:\nConnectorError(ConnectorError { user_facing_error: None, kind: QueryError(PostgresError { code: \"26000\", message: \"prepared statement \\"s1555\\" does not exist\", severity: \"ERROR\", detail: None, column: None, hint: None }), transient: false })"

tobiu commented 2 months ago

direct link: https://api.realworld.io/api/articles

geromegrignon commented 2 months ago

Hi @tobiu it happens sometimes since I had to move from a free to a paid database due to the current traffic.

I need to investigate on it (more likely related to PG bouncer) but I don't have free available time for it right now.

The daily server reset sounds fixing it meanwhile.

benmccann commented 2 weeks ago

Update from https://github.com/gothinkster/realworld/issues/1611 states that the API server has been deleted. I can't say that I would envy the responsibility of maintaining such a service, so that's totally understandable. Thank you @geromegrignon for your years of shepherding this project and building it into what it is! I wonder if there might be a way for the community to take over ownership to keep it alive?

A couple of ideas:

secure-code-warrior-for-github[bot] commented 2 weeks ago

Micro-Learning Topic: SQL injection (Detected by phrase)

Matched on "SQLi"

What is this? (2min video)

This is probably one of the two most exploited vulnerabilities in web applications and has led to a number of high profile company breaches. It occurs when an application fails to sanitize or validate input before using it to dynamically construct a statement. An attacker that exploits this vulnerability will be able to gain access to the underlying database and view or modify data without permission.

Try a challenge in Secure Code Warrior

Helpful references