safe-pg-migrations 0.0.1 → 1.2.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
- SHA1:
3
- metadata.gz: 2a18b54460ec7f3977c9183273705d066793df42
4
- data.tar.gz: ed2df6a14d6fc3a880b4629f10b6a22d3f6c105e
2
+ SHA256:
3
+ metadata.gz: e6c0ad1795c94252929d907f94e3cf65617ca9a353414d031fb74a852ee294ea
4
+ data.tar.gz: f2d1045f55ff1896ef045edb4fe2868b7f26bc4e1b7cc542907eaab08da91075
5
5
  SHA512:
6
- metadata.gz: 1d088c3c46622f6fa2f7cc717a8462f06042d3b9cbcd9ae8c0a79fb0f62f2fa1b1b47033050275b25d63add29b4f97795718aeb6dddbc3eae03f66b3614dfa62
7
- data.tar.gz: d4754e18a023d4e38bfc8c4ae0a387c3e2c38646ba6bcdd776a0673983b885b93456654e27c0793c2841d512f6d40e0102878559b65d6b439dfa713a676b44b9
6
+ metadata.gz: 3b32973e6920a5db9d7d48440cc5ac09fbdd511539dcf3ec436584584d6a9b501a1027a212d991a27e47ae9a20e471cabc6d705e42f6324eb79eb1b529186f1f
7
+ data.tar.gz: 0c006975e25f1c318caa3375a05c1aa43a45c50813ef6b03a4d4d7d842b5c5a2188243744a8f4e769196c39ef6ca162c693a22b48dec1c38f13aa4b1d61bfc80
data/README.md CHANGED
@@ -1,17 +1,254 @@
1
1
  # safe-pg-migrations
2
2
 
3
- [![Build Status](https://travis-ci.org/doctolib/safe-pg-migrations.svg?branch=master)](https://travis-ci.org/doctolib/safe-pg-migrations)
3
+ ActiveRecord migrations for Postgres made safe.
4
4
 
5
- ## Compatibility
5
+ ## Requirements
6
6
 
7
- Ruby 2.3+
8
- Rails 5.2+
9
- PostgreSQL 9.3+
7
+ - Ruby 2.5+
8
+ - Rails 5.2+
9
+ - PostgreSQL 9.3+
10
10
 
11
- ## Running tests
11
+ ## Usage
12
+
13
+ Just drop this line in your Gemfile:
14
+
15
+ ```rb
16
+ gem 'safe-pg-migrations'
17
+ ```
18
+
19
+ ## Example
20
+
21
+ Consider the following migration:
22
+
23
+ ```rb
24
+ class AddAdminToUsers < ActiveRecord::Migration[5.2]
25
+ def change
26
+ add_column :users, :admin, :boolean, default: false, null: false
27
+ end
28
+ end
29
+ ```
30
+
31
+ If the `users` table is large, running this migration on a live Postgres 9 database will likely cause downtime. **Safe PG Migrations** hooks into Active Record so that the following gets executed instead:
32
+
33
+ ```rb
34
+ class AddAdminToUsers < ActiveRecord::Migration[5.2]
35
+ # Do not wrap the migration in a transaction so that locks are held for a shorter time.
36
+ disable_ddl_transaction!
37
+
38
+ def change
39
+ # Lower Postgres' lock timeout to avoid statement queueing. Acts like a seatbelt.
40
+ execute "SET lock_timeout TO '5s'" # The lock_timeout duration is customizable.
41
+
42
+ # Add the column without the default value and the not-null constraint.
43
+ add_column :users, :admin, :boolean
44
+
45
+ # Set the column's default value.
46
+ change_column_default :users, :admin, false
47
+
48
+ # Backfill the column in batches.
49
+ User.in_batches.update_all(admin: false)
50
+
51
+ # Add the not-null constraint. Beforehand, set a short statement timeout so that
52
+ # Postgres does not spend too much time performing the full table scan to verify
53
+ # the column contains no nulls.
54
+ execute "SET statement_timeout TO '5s'"
55
+ change_column_null :users, :admin, false
56
+ end
57
+ end
58
+ ```
59
+
60
+ Under the hood, **Safe PG Migrations** patches `ActiveRecord::Migration` and extends `ActiveRecord::Base.connection` to make potentially dangerous methods—like `add_column`—safe.
61
+
62
+ ## Motivation
63
+
64
+ Writing a safe migration can be daunting. Numerous articles have been written on the topic and a few gems are trying to address the problem. Even for someone who has a pretty good command of Postgres, remembering all the subtleties of explicit locking is not a piece of cake.
65
+
66
+ Active Record means developers don't have to be proficient in SQL to interact with a database. In the same way, **Safe PG Migrations** was created so that developers don't have to understand the ins and outs of Postgres to write a safe migration.
67
+
68
+ ## Feature set
69
+
70
+ <details><summary>Lock timeout</summary>
71
+
72
+ Most DDL operations (e.g. adding a column, removing a column or adding a default value to a column) take an `ACCESS EXCLUSIVE` lock on the table they are altering. While these operations wait to acquire their lock, other statements are blocked. Before running a migration, **Safe PG Migrations** sets a short lock timeout (default to 5 seconds) so that statements are not blocked for too long.
73
+
74
+ See [PostgreSQL Alter Table and Long Transactions](http://www.joshuakehn.com/2017/9/9/postgresql-alter-table-and-long-transactions.html) and [Migrations and Long Transactions](https://www.fin.com/post/2018/1/migrations-and-long-transactions) for detailed explanations of the matter.
75
+ </details>
76
+
77
+ <details><summary>Statement timeout</summary>
78
+
79
+ Adding a foreign key or a not-null constraint can take a lot of time on a large table. The problem is that those operations take `ACCESS EXCLUSIVE` locks. We clearly don't want them to hold these locks for too long. Thus, **Safe PG Migrations** runs them with a short statement timeout (default to 5 seconds).
80
+
81
+ See [Zero-downtime Postgres migrations - the hard parts](https://gocardless.com/blog/zero-downtime-postgres-migrations-the-hard-parts/) for a detailed explanation on the subject.
82
+ </details>
83
+
84
+ <details><summary>Prevent wrapping migrations in transaction</summary>
85
+
86
+ When **Safe PG Migrations** is used, migrations are not wrapped in a transaction. This is for several reasons:
87
+
88
+ - We want to release locks as soon as possible.
89
+ - In order to be able to retry statements that have failed because of a lock timeout, we have to be outside a transaction.
90
+ - In order to add an index concurrently, we have to be outside a transaction.
91
+
92
+ Note that if a migration fails, it won't be rollbacked. This can result in migrations being partially applied. In that case, they need to be manually reverted.
93
+
94
+ </details>
95
+
96
+ <details>
97
+ <summary>Safe <code>add_column</code></summary>
98
+
99
+ **Safe PG Migrations** gracefully handle the upgrade to PG11 by **not** backfilling default value for existing rows, as the [database engine is now natively handling it](https://www.postgresql.org/docs/11/ddl-alter.html#DDL-ALTER-ADDING-A-COLUMN).
100
+
101
+ Beware though, when adding a volatile default value:
102
+ ```ruby
103
+ add_column :users, :created_at, default: 'clock_timestamp()'
104
+ ```
105
+ PG will still needs to update every row of the table, and will most likely statement timeout for big table. In this case, your best bet is to add the column without default, set the default, and backfill existing rows.
106
+
107
+ <blockquote>
108
+
109
+ **Note: Pre-postgre 11**
110
+ Adding a column with a default value and a not-null constraint is [dangerous](https://wework.github.io/data/2015/11/05/add-columns-with-default-values-to-large-tables-in-rails-postgres/).
111
+
112
+ **Safe PG Migrations** makes it safe by:
113
+
114
+ 1. Adding the column without the default value and the not null constraint,
115
+ 2. Then set the default value on the column,
116
+ 3. Then backfilling the column,
117
+ 4. And then adding the not null constraint with a short statement timeout.
118
+
119
+ Note: the addition of the not null constraint may timeout. In that case, you may want to add the not-null constraint as initially not valid and validate it in a separate statement. See [Adding a not-null constraint on Postgres with minimal locking](https://medium.com/doctolib-engineering/adding-a-not-null-constraint-on-pg-faster-with-minimal-locking-38b2c00c4d1c).
120
+
121
+ </blockquote>
122
+
123
+ </details>
124
+
125
+ <details><summary id="safe_add_remove_index">Safe <code>add_index</code> and <code>remove_index</code></summary>
126
+
127
+ Creating an index requires a `SHARE` lock on the target table which blocks all write on the table while the index is created (which can take some time on a large table). This is usually not practical in a live environment. Thus, **Safe PG Migrations** ensures indexes are created concurrently.
128
+
129
+ As `CREATE INDEX CONCURRENTLY` and `DROP INDEX CONCURRENTLY` are non-blocking operations (ie: read/write operations on the table are still possible), **Safe PG Migrations** sets a lock timeout to 30 seconds for those 2 specific statements.
130
+
131
+ If you still get lock timeout while adding / removing indexes, it might be for one of those reasons:
132
+
133
+ - Long-running queries are active on the table. To create / remove an index, PG needs to wait for the queries that are actually running to finish before starting the index creation / removal. The blocking activity logger might help you to pinpoint the culprit queries.
134
+ - A vacuum / autovacuum is running on the table, holding a ShareUpdateExclusiveLock, you are most likely out of luck for the current migration, but you may try to [optimize your autovacuums settings](https://www.percona.com/blog/2018/08/10/tuning-autovacuum-in-postgresql-and-autovacuum-internals/).
135
+
136
+ </details>
137
+
138
+ <details><summary id="safe_add_foreign_key">safe <code>add_foreign_key</code> (and <code>add_reference</code>)</summary>
139
+
140
+ Adding a foreign key requires a `SHARE ROW EXCLUSIVE` lock, which **prevent writing in the tables** while the migration is running.
141
+
142
+ Adding the constraint itself is rather fast, the major part of the time is spent on validating this constraint. Thus safe-pg-migrations ensures that adding a foreign key holds blocking locks for the least amount of time by splitting the foreign key creation in two steps:
143
+
144
+ 1. adding the constraint *without validation*, will not validate existing rows;
145
+ 2. validating the constraint, will validate existing rows in the table, without blocking read or write on the table
146
+
147
+ </details>
148
+
149
+ <details><summary>Retry after lock timeout</summary>
150
+
151
+ When a statement fails with a lock timeout, **Safe PG Migrations** retries it (5 times max) [list of retryable statments](https://github.com/doctolib/safe-pg-migrations/blob/66933256252b6bbf12e404b829a361dbba30e684/lib/safe-pg-migrations/plugins/statement_retrier.rb#L5)
152
+ </details>
153
+
154
+ <details><summary>Blocking activity logging</summary>
155
+
156
+ If a statement fails with a lock timeout, **Safe PG Migrations** will try to tell you what was the blocking statement.
157
+ </details>
158
+
159
+ <details><summary>Verbose SQL logging</summary>
160
+
161
+ For any operation, **Safe PG Migrations** can output the performed SQL queries. This feature is enabled by default in a production Rails environment. If you want to explicit enable it, for example in your development environment you can use:
162
+ ```bash
163
+ export SAFE_PG_MIGRATIONS_VERBOSE=1
164
+ ```
165
+
166
+ Instead of the traditional output:
167
+ ```ruby
168
+ add_index :users, :age
169
+
170
+ == 20191215132355 SampleIndex: migrating ======================================
171
+ -- add_index(:users, :age)
172
+ -> add_index("users", :age, {:algorithm=>:concurrently})
173
+ -> 0.0175s
174
+ == 20191215132355 SampleIndex: migrated (0.0200s) =============================
175
+ ```
176
+ **Safe PG Migrations** will output the following logs:
177
+ ```ruby
178
+ add_index :users, :age
179
+
180
+ == 20191215132355 SampleIndex: migrating ======================================
181
+ (0.3ms) SHOW lock_timeout
182
+ (0.3ms) SET lock_timeout TO '5s'
183
+ -- add_index(:users, :age)
184
+ -> add_index("users", :age, {:algorithm=>:concurrently})
185
+ (0.3ms) SHOW statement_timeout
186
+ (0.3ms) SET statement_timeout TO 0
187
+ (0.3ms) SHOW lock_timeout
188
+ (0.3ms) SET lock_timeout TO '30s'
189
+ (3.5ms) CREATE INDEX CONCURRENTLY "index_users_on_age" ON "users" ("age")
190
+ (0.3ms) SET lock_timeout TO '5s'
191
+ (0.2ms) SET statement_timeout TO '1min'
192
+ -> 0.0093s
193
+ (0.2ms) SET lock_timeout TO '0'
194
+ == 20191215132355 SampleIndex: migrated (0.0114s) =============================
195
+ ```
196
+ So you can actually check that the `CREATE INDEX` statement will be performed concurrently, without any statement timeout and with a lock timeout of 30 seconds.
197
+
198
+ *Nb: The `SHOW` statements are used by **Safe PG Migrations** to query settings for their original values in order to restore them after the work is done*
199
+
200
+ </details>
201
+
202
+ ## Configuration
203
+
204
+ **Safe PG Migrations** can be customized, here is an example of a Rails initializer (the values are the default ones):
205
+
206
+ ```ruby
207
+ SafePgMigrations.config.safe_timeout = 5.seconds # Lock and statement timeout used for all DDL operations except from CREATE / DROP INDEX
208
+
209
+ SafePgMigrations.config.blocking_activity_logger_margin = 1.second # Delay to output blocking queries before timeout. Must be shorter than safe_timeout
210
+
211
+ SafePgMigrations.config.batch_size = 1000 # Size of the batches used for backfilling when adding a column with a default value pre-PG11
212
+
213
+ SafePgMigrations.config.retry_delay = 1.minute # Delay between retries for retryable statements
214
+
215
+ SafePgMigrations.config.max_tries = 5 # Number of retries before abortion of the migration
216
+ ```
217
+
218
+ ## Runnings tests
12
219
 
13
220
  ```bash
14
221
  bundle
15
- psql -h localhost -c 'CREATE DATABASE safe_pg_migrations_test'
222
+ psql -h localhost -U postgres -c 'CREATE DATABASE safe_pg_migrations_test'
16
223
  rake test
17
224
  ```
225
+
226
+ ## Authors
227
+
228
+ - [Matthieu Prat](https://github.com/matthieuprat)
229
+ - [Romain Choquet](https://github.com/rchoquet)
230
+ - [Paul-Etienne Coisne](https://github.com/coisnepe)
231
+
232
+ ## License
233
+
234
+ [MIT](https://github.com/doctolib/safe-pg-migrations/blob/master/LICENSE) © [Doctolib](https://github.com/doctolib/)
235
+
236
+ ## Additional resources
237
+
238
+ Alternatives:
239
+
240
+ - https://github.com/gocardless/activerecord-safer_migrations
241
+ - https://github.com/ankane/strong_migrations
242
+ - https://github.com/LendingHome/zero_downtime_migrations
243
+
244
+ Interesting reads:
245
+
246
+ - [When Postgres blocks: 7 tips for dealing with locks](https://www.citusdata.com/blog/2018/02/22/seven-tips-for-dealing-with-postgres-locks/)
247
+ - [Migrations and Long Transactions in Postgres
248
+ ](https://www.fin.com/post/2018/1/migrations-and-long-transactions)
249
+ - [PostgreSQL Alter Table and Long Transactions](http://www.joshuakehn.com/2017/9/9/postgresql-alter-table-and-long-transactions.html)
250
+ - [Adding a NOT NULL CONSTRAINT on PG Faster with Minimal Locking](https://medium.com/doctolib-engineering/adding-a-not-null-constraint-on-pg-faster-with-minimal-locking-38b2c00c4d1c)
251
+ - [Adding columns with default values to really large tables in Postgres + Rails](https://wework.github.io/data/2015/11/05/add-columns-with-default-values-to-large-tables-in-rails-postgres/)
252
+ - [Rails migrations with no downtime](https://pedro.herokuapp.com/past/2011/7/13/rails_migrations_with_no_downtime/)
253
+ - [Safe Operations For High Volume PostgreSQL](https://www.braintreepayments.com/blog/safe-operations-for-high-volume-postgresql/)
254
+ - [Rails Migrations with Zero Downtime](https://blog.codeship.com/rails-migrations-zero-downtime/)
@@ -1,29 +1,42 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  require 'safe-pg-migrations/configuration'
4
+ require 'safe-pg-migrations/plugins/verbose_sql_logger'
4
5
  require 'safe-pg-migrations/plugins/blocking_activity_logger'
5
6
  require 'safe-pg-migrations/plugins/statement_insurer'
6
7
  require 'safe-pg-migrations/plugins/statement_retrier'
8
+ require 'safe-pg-migrations/plugins/idem_potent_statements'
9
+ require 'safe-pg-migrations/plugins/useless_statements_logger'
7
10
 
8
11
  module SafePgMigrations
12
+ # Order matters: the bottom-most plugin will have precedence
9
13
  PLUGINS = [
10
14
  BlockingActivityLogger,
15
+ IdemPotentStatements,
11
16
  StatementRetrier,
12
17
  StatementInsurer,
18
+ UselessStatementsLogger,
13
19
  ].freeze
14
20
 
15
21
  class << self
16
- attr_reader :current_migration
17
- attr_accessor :enabled
22
+ attr_reader :current_migration, :pg_version_num
18
23
 
19
24
  def setup_and_teardown(migration, connection)
25
+ @pg_version_num = get_pg_version_num(connection)
20
26
  @alternate_connection = nil
21
27
  @current_migration = migration
28
+ stdout_sql_logger = VerboseSqlLogger.new.setup if verbose?
22
29
  PLUGINS.each { |plugin| connection.extend(plugin) }
23
- connection.with_setting(:lock_timeout, SafePgMigrations.config.safe_timeout) { yield }
30
+
31
+ connection.with_setting(:lock_timeout, SafePgMigrations.config.pg_safe_timeout) { yield }
24
32
  ensure
25
33
  close_alternate_connection
26
34
  @current_migration = nil
35
+ stdout_sql_logger&.teardown
36
+ end
37
+
38
+ def get_pg_version_num(connection)
39
+ connection.query_value('SHOW server_version_num').to_i
27
40
  end
28
41
 
29
42
  def alternate_connection
@@ -47,9 +60,8 @@ module SafePgMigrations
47
60
  say "#{method}(#{args.map(&:inspect) * ', '})", true
48
61
  end
49
62
 
50
- def enabled?
51
- return ENV['SAFE_PG_MIGRATIONS'] == '1' if ENV['SAFE_PG_MIGRATIONS']
52
- return enabled unless enabled.nil?
63
+ def verbose?
64
+ return ENV['SAFE_PG_MIGRATIONS_VERBOSE'] == '1' if ENV['SAFE_PG_MIGRATIONS_VERBOSE']
53
65
  return Rails.env.production? if defined?(Rails)
54
66
 
55
67
  false
@@ -68,7 +80,8 @@ module SafePgMigrations
68
80
  end
69
81
 
70
82
  def disable_ddl_transaction
71
- SafePgMigrations.enabled? || super
83
+ UselessStatementsLogger.warn_useless '`disable_ddl_transaction`' if super
84
+ true
72
85
  end
73
86
 
74
87
  SAFE_METHODS = %i[execute add_column add_index add_reference add_belongs_to change_column_null].freeze
@@ -5,17 +5,26 @@ require 'active_support/core_ext/numeric/time'
5
5
  module SafePgMigrations
6
6
  class Configuration
7
7
  attr_accessor :safe_timeout
8
- attr_accessor :blocking_activity_logger_delay # Must be close to but smaller than safe_timeout.
8
+ attr_accessor :blocking_activity_logger_margin
9
9
  attr_accessor :batch_size
10
10
  attr_accessor :retry_delay
11
11
  attr_accessor :max_tries
12
12
 
13
13
  def initialize
14
- self.safe_timeout = '5s'
15
- self.blocking_activity_logger_delay = 4.seconds
14
+ self.safe_timeout = 5.seconds
15
+ self.blocking_activity_logger_margin = 1.second
16
16
  self.batch_size = 1000
17
- self.retry_delay = 2.minutes
17
+ self.retry_delay = 1.minute
18
18
  self.max_tries = 5
19
19
  end
20
+
21
+ def pg_safe_timeout
22
+ pg_duration(safe_timeout)
23
+ end
24
+
25
+ def pg_duration(duration)
26
+ value, unit = duration.integer? ? [duration, 's'] : [(duration * 1000).to_i, 'ms']
27
+ "#{value}#{unit}"
28
+ end
20
29
  end
21
30
  end
@@ -3,7 +3,7 @@
3
3
  module SafePgMigrations
4
4
  module BlockingActivityLogger
5
5
  SELECT_BLOCKING_QUERIES_SQL = <<~SQL.squish
6
- SELECT blocking_activity.query
6
+ SELECT blocking_activity.query, blocked_activity.xact_start as start
7
7
  FROM pg_catalog.pg_locks blocked_locks
8
8
  JOIN pg_catalog.pg_stat_activity blocked_activity
9
9
  ON blocked_activity.pid = blocked_locks.pid
@@ -25,8 +25,7 @@ module SafePgMigrations
25
25
  SQL
26
26
 
27
27
  %i[
28
- add_column remove_column add_foreign_key remove_foreign_key change_column_default
29
- change_column_null create_table add_index remove_index
28
+ add_column remove_column add_foreign_key remove_foreign_key change_column_default change_column_null create_table
30
29
  ].each do |method|
31
30
  define_method method do |*args, &block|
32
31
  log_blocking_queries { super(*args, &block) }
@@ -36,10 +35,13 @@ module SafePgMigrations
36
35
  private
37
36
 
38
37
  def log_blocking_queries
38
+ delay_before_logging =
39
+ SafePgMigrations.config.safe_timeout - SafePgMigrations.config.blocking_activity_logger_margin
40
+
39
41
  blocking_queries_retriever_thread =
40
42
  Thread.new do
41
- sleep SafePgMigrations.config.blocking_activity_logger_delay
42
- SafePgMigrations.alternate_connection.query_values(SELECT_BLOCKING_QUERIES_SQL % raw_connection.backend_pid)
43
+ sleep delay_before_logging
44
+ SafePgMigrations.alternate_connection.query(SELECT_BLOCKING_QUERIES_SQL % raw_connection.backend_pid)
43
45
  end
44
46
 
45
47
  yield
@@ -64,11 +66,21 @@ module SafePgMigrations
64
66
  "Statement was being blocked by the following #{'query'.pluralize(queries.size)}:", true
65
67
  )
66
68
  SafePgMigrations.say '', true
67
- queries.each { |query| SafePgMigrations.say " #{query}", true }
69
+ queries.each { |query, start_time| SafePgMigrations.say "#{format_start_time start_time}: #{query}", true }
70
+ SafePgMigrations.say(
71
+ 'Beware, some of those queries might run in a transaction. In this case the locking query might be '\
72
+ 'located elsewhere in the transaction',
73
+ true
74
+ )
68
75
  SafePgMigrations.say '', true
69
76
  end
70
77
 
71
78
  raise
72
79
  end
80
+
81
+ def format_start_time(start_time, reference_time = Time.now)
82
+ duration = (reference_time - start_time).round
83
+ "transaction started #{duration} #{'second'.pluralize(duration)} ago"
84
+ end
73
85
  end
74
86
  end
@@ -0,0 +1,73 @@
1
+ # frozen_string_literal: true
2
+
3
+ module SafePgMigrations
4
+ module IdemPotentStatements
5
+ def add_index(table_name, column_name, **options)
6
+ index_name = options.key?(:name) ? options[:name].to_s : index_name(table_name, index_column_names(column_name))
7
+ return super unless index_name_exists?(table_name, index_name)
8
+
9
+ return if index_valid?(index_name)
10
+
11
+ remove_index(table_name, name: index_name)
12
+ super
13
+ end
14
+
15
+ def add_column(table_name, column_name, type, options = {})
16
+ return super unless column_exists?(table_name, column_name)
17
+
18
+ SafePgMigrations.say("/!\\ Column '#{column_name}' already exists in '#{table_name}'. Skipping statement.", true)
19
+ end
20
+
21
+ def remove_column(table_name, column_name, type = nil, options = {})
22
+ return super if column_exists?(table_name, column_name)
23
+
24
+ SafePgMigrations.say("/!\\ Column '#{column_name}' not found on table '#{table_name}'. Skipping statement.", true)
25
+ end
26
+
27
+ def remove_index(table_name, options = {})
28
+ index_name = options.key?(:name) ? options[:name].to_s : index_name(table_name, options)
29
+
30
+ return super if index_name_exists?(table_name, index_name)
31
+
32
+ SafePgMigrations.say("/!\\ Index '#{index_name}' not found on table '#{table_name}'. Skipping statement.", true)
33
+ end
34
+
35
+ def add_foreign_key(from_table, to_table, **options)
36
+ options_or_to_table = options.slice(:name, :column).presence || to_table
37
+ return super unless foreign_key_exists?(from_table, options_or_to_table)
38
+
39
+ SafePgMigrations.say(
40
+ "/!\\ Foreign key '#{from_table}' -> '#{to_table}' already exists. Skipping statement.",
41
+ true
42
+ )
43
+ end
44
+
45
+ def create_table(table_name, comment: nil, **options)
46
+ return super if options[:force] || !table_exists?(table_name)
47
+
48
+ SafePgMigrations.say "/!\\ Table '#{table_name}' already exists.", true
49
+
50
+ td = create_table_definition(table_name, **options)
51
+
52
+ yield td if block_given?
53
+
54
+ SafePgMigrations.say(td.indexes.empty? ? '-- Skipping statement' : '-- Creating indexes', true)
55
+
56
+ td.indexes.each do |column_name, index_options|
57
+ add_index(table_name, column_name, index_options)
58
+ end
59
+ end
60
+
61
+ private
62
+
63
+ def index_valid?(index_name)
64
+ query_value <<~SQL.squish
65
+ SELECT indisvalid
66
+ FROM pg_index i
67
+ JOIN pg_class c
68
+ ON i.indexrelid = c.oid
69
+ WHERE c.relname = '#{index_name}';
70
+ SQL
71
+ end
72
+ end
73
+ end
@@ -2,23 +2,27 @@
2
2
 
3
3
  module SafePgMigrations
4
4
  module StatementInsurer
5
- %i[change_column_null add_foreign_key create_table].each do |method|
5
+ PG_11_VERSION_NUM = 110_000
6
+
7
+ %i[change_column_null change_column create_table].each do |method|
6
8
  define_method method do |*args, &block|
7
- with_setting(:statement_timeout, SafePgMigrations.config.safe_timeout) { super(*args, &block) }
9
+ with_setting(:statement_timeout, SafePgMigrations.config.pg_safe_timeout) { super(*args, &block) }
8
10
  end
9
11
  end
10
12
 
11
- def add_column(table_name, column_name, type, **options)
12
- default = options.delete(:default)
13
+ def add_column(table_name, column_name, type, **options) # rubocop:disable Metrics/CyclomaticComplexity
14
+ need_default_value_backfill = SafePgMigrations.pg_version_num < PG_11_VERSION_NUM
15
+
16
+ default = options.delete(:default) if need_default_value_backfill
13
17
  null = options.delete(:null)
14
18
 
15
19
  if !default.nil? || null == false
16
- SafePgMigrations.say_method_call(:add_column, table_name, column_name, type, **options)
20
+ SafePgMigrations.say_method_call(:add_column, table_name, column_name, type, options)
17
21
  end
18
22
 
19
23
  super
20
24
 
21
- unless default.nil?
25
+ if need_default_value_backfill && !default.nil?
22
26
  SafePgMigrations.say_method_call(:change_column_default, table_name, column_name, default)
23
27
  change_column_default(table_name, column_name, default)
24
28
 
@@ -32,21 +36,29 @@ module SafePgMigrations
32
36
  end
33
37
  end
34
38
 
39
+ def add_foreign_key(from_table, to_table, **options)
40
+ validate_present = options.key? :validate
41
+ options[:validate] = false unless validate_present
42
+
43
+ with_setting(:statement_timeout, SafePgMigrations.config.pg_safe_timeout) { super }
44
+
45
+ options_or_to_table = options.slice(:name, :column).presence || to_table
46
+ without_statement_timeout { validate_foreign_key from_table, options_or_to_table } unless validate_present
47
+ end
48
+
35
49
  def add_index(table_name, column_name, **options)
36
- if SafePgMigrations.enabled?
37
- options[:algorithm] = :concurrently
38
- SafePgMigrations.say_method_call(:add_index, table_name, column_name, **options)
39
- end
40
- without_statement_timeout { super }
50
+ options[:algorithm] = :concurrently
51
+ SafePgMigrations.say_method_call(:add_index, table_name, column_name, options)
52
+
53
+ without_timeout { super }
41
54
  end
42
55
 
43
56
  def remove_index(table_name, options = {})
44
57
  options = { column: options } unless options.is_a?(Hash)
45
- if SafePgMigrations.enabled?
46
- options[:algorithm] = :concurrently
47
- SafePgMigrations.say_method_call(:remove_index, table_name, **options)
48
- end
49
- without_statement_timeout { super }
58
+ options[:algorithm] = :concurrently
59
+ SafePgMigrations.say_method_call(:remove_index, table_name, options)
60
+
61
+ without_timeout { super }
50
62
  end
51
63
 
52
64
  def backfill_column_default(table_name, column_name)
@@ -86,5 +98,13 @@ module SafePgMigrations
86
98
  def without_statement_timeout
87
99
  with_setting(:statement_timeout, 0) { yield }
88
100
  end
101
+
102
+ def without_lock_timeout
103
+ with_setting(:lock_timeout, 0) { yield }
104
+ end
105
+
106
+ def without_timeout
107
+ without_statement_timeout { without_lock_timeout { yield } }
108
+ end
89
109
  end
90
110
  end
@@ -3,8 +3,7 @@
3
3
  module SafePgMigrations
4
4
  module StatementRetrier
5
5
  RETRIABLE_SCHEMA_STATEMENTS = %i[
6
- add_column remove_column add_foreign_key remove_foreign_key change_column_default
7
- change_column_null
6
+ add_column add_foreign_key remove_foreign_key change_column_default change_column_null remove_column
8
7
  ].freeze
9
8
 
10
9
  RETRIABLE_SCHEMA_STATEMENTS.each do |method|
@@ -0,0 +1,33 @@
1
+ # frozen_string_literal: true
2
+
3
+ module SafePgMigrations
4
+ module UselessStatementsLogger
5
+ def self.warn_useless(action, link = nil, *args)
6
+ SafePgMigrations.say "/!\\ No need to explicitly use #{action}, safe-pg-migrations does it for you", *args
7
+ SafePgMigrations.say "\t see #{link} for more details", *args if link
8
+ end
9
+
10
+ def add_index(*, **options)
11
+ warn_for_index(**options)
12
+ super
13
+ end
14
+
15
+ def remove_index(table_name, options = {})
16
+ warn_for_index(options) if options.is_a? Hash
17
+ super
18
+ end
19
+
20
+ def add_foreign_key(*, **options)
21
+ if options[:validate] == false
22
+ UselessStatementsLogger.warn_useless '`validate: :false`', 'https://github.com/doctolib/safe-pg-migrations#safe_add_foreign_key'
23
+ end
24
+ super
25
+ end
26
+
27
+ def warn_for_index(**options)
28
+ return unless options[:algorithm] == :concurrently
29
+
30
+ UselessStatementsLogger.warn_useless '`algorithm: :concurrently`', 'https://github.com/doctolib/safe-pg-migrations#safe_add_remove_index'
31
+ end
32
+ end
33
+ end
@@ -0,0 +1,43 @@
1
+ # frozen_string_literal: true
2
+
3
+ module SafePgMigrations
4
+ class VerboseSqlLogger
5
+ def setup
6
+ @activerecord_logger_was = ActiveRecord::Base.logger
7
+ @verbose_query_logs_was = ActiveRecord::Base.verbose_query_logs
8
+ @colorize_logging_was = ActiveRecord::LogSubscriber.colorize_logging
9
+
10
+ disable_marginalia if defined?(Marginalia)
11
+
12
+ stdout_logger = Logger.new($stdout, formatter: ->(_severity, _time, _progname, query) { "#{query}\n" })
13
+ ActiveRecord::Base.logger = stdout_logger
14
+ ActiveRecord::LogSubscriber.colorize_logging = colorize_logging?
15
+ # Do not output caller method, we know it is coming from the migration
16
+ ActiveRecord::Base.verbose_query_logs = false
17
+ self
18
+ end
19
+
20
+ def teardown
21
+ ActiveRecord::Base.verbose_query_logs = @verbose_query_logs_was
22
+ ActiveRecord::LogSubscriber.colorize_logging = @colorize_logging_was
23
+ ActiveRecord::Base.logger = @activerecord_logger_was
24
+ enable_marginalia if defined?(Marginalia)
25
+ end
26
+
27
+ private
28
+
29
+ def colorize_logging?
30
+ defined?(Rails) && Rails.env.development?
31
+ end
32
+
33
+ # Marginalia annotations will most likely pollute the output
34
+ def disable_marginalia
35
+ @marginalia_components_were = Marginalia::Comment.components
36
+ Marginalia::Comment.components = []
37
+ end
38
+
39
+ def enable_marginalia
40
+ Marginalia::Comment.components = @marginalia_components_were
41
+ end
42
+ end
43
+ end
@@ -4,7 +4,7 @@ require 'safe-pg-migrations/base'
4
4
 
5
5
  module SafePgMigrations
6
6
  class Railtie < Rails::Railtie
7
- initializer 'sage_pg_migrations.insert_into_active_record' do
7
+ initializer 'safe_pg_migrations.insert_into_active_record' do
8
8
  ActiveSupport.on_load :active_record do
9
9
  ActiveRecord::Migration.prepend(SafePgMigrations::Migration)
10
10
  end
@@ -1,5 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module SafePgMigrations
4
- VERSION = '0.0.1'
4
+ VERSION = '1.2.0'
5
5
  end
metadata CHANGED
@@ -1,15 +1,15 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: safe-pg-migrations
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.0.1
4
+ version: 1.2.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Matthieu Prat
8
8
  - Romain Choquet
9
- autorequire:
9
+ autorequire:
10
10
  bindir: bin
11
11
  cert_chain: []
12
- date: 2018-10-10 00:00:00.000000000 Z
12
+ date: 2020-11-30 00:00:00.000000000 Z
13
13
  dependencies:
14
14
  - !ruby/object:Gem::Dependency
15
15
  name: activerecord
@@ -163,15 +163,18 @@ files:
163
163
  - lib/safe-pg-migrations/base.rb
164
164
  - lib/safe-pg-migrations/configuration.rb
165
165
  - lib/safe-pg-migrations/plugins/blocking_activity_logger.rb
166
+ - lib/safe-pg-migrations/plugins/idem_potent_statements.rb
166
167
  - lib/safe-pg-migrations/plugins/statement_insurer.rb
167
168
  - lib/safe-pg-migrations/plugins/statement_retrier.rb
169
+ - lib/safe-pg-migrations/plugins/useless_statements_logger.rb
170
+ - lib/safe-pg-migrations/plugins/verbose_sql_logger.rb
168
171
  - lib/safe-pg-migrations/railtie.rb
169
172
  - lib/safe-pg-migrations/version.rb
170
173
  homepage: https://github.com/doctolib/safe-pg-migrations
171
174
  licenses:
172
175
  - MIT
173
176
  metadata: {}
174
- post_install_message:
177
+ post_install_message:
175
178
  rdoc_options: []
176
179
  require_paths:
177
180
  - lib
@@ -179,16 +182,16 @@ required_ruby_version: !ruby/object:Gem::Requirement
179
182
  requirements:
180
183
  - - ">="
181
184
  - !ruby/object:Gem::Version
182
- version: '2.3'
185
+ version: '2.5'
183
186
  required_rubygems_version: !ruby/object:Gem::Requirement
184
187
  requirements:
185
188
  - - ">="
186
189
  - !ruby/object:Gem::Version
187
190
  version: '0'
188
191
  requirements: []
189
- rubyforge_project:
190
- rubygems_version: 2.6.14.1
191
- signing_key:
192
+ rubyforge_project:
193
+ rubygems_version: 2.7.3
194
+ signing_key:
192
195
  specification_version: 4
193
196
  summary: Make your PG migrations safe.
194
197
  test_files: []