strong_migrations 0.7.0 → 2.2.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,260 @@
1
+ module StrongMigrations
2
+ self.error_messages = {
3
+ add_column_default:
4
+ "Adding a column with a %{default_type} default blocks %{rewrite_blocks} while the entire table is rewritten.
5
+ Instead, add the column without a default value, then change the default.
6
+
7
+ class %{migration_name} < ActiveRecord::Migration%{migration_suffix}
8
+ def up
9
+ %{add_command}
10
+ %{change_command}
11
+ end
12
+
13
+ def down
14
+ %{remove_command}
15
+ end
16
+ end
17
+
18
+ Then backfill the existing rows in the Rails console or a separate migration with disable_ddl_transaction!.
19
+
20
+ class Backfill%{migration_name} < ActiveRecord::Migration%{migration_suffix}
21
+ disable_ddl_transaction!
22
+
23
+ def up
24
+ %{code}
25
+ end
26
+ end",
27
+
28
+ add_column_default_callable:
29
+ "Strong Migrations does not support inspecting callable default values.
30
+ Please make really sure you're not calling a VOLATILE function,
31
+ then wrap it in a safety_assured { ... } block.",
32
+
33
+ add_column_json:
34
+ "There's no equality operator for the json column type, which can cause errors for
35
+ existing SELECT DISTINCT queries in your application. Use jsonb instead.
36
+
37
+ class %{migration_name} < ActiveRecord::Migration%{migration_suffix}
38
+ def change
39
+ %{command}
40
+ end
41
+ end",
42
+
43
+ add_column_generated_stored:
44
+ "Adding a stored generated column blocks %{rewrite_blocks} while the entire table is rewritten.",
45
+
46
+ add_column_auto_incrementing:
47
+ "Adding an auto-incrementing column blocks %{rewrite_blocks} while the entire table is rewritten.",
48
+
49
+ change_column:
50
+ "Changing the type of an existing column blocks %{rewrite_blocks}
51
+ while the entire table is rewritten. A safer approach is to:
52
+
53
+ 1. Create a new column
54
+ 2. Write to both columns
55
+ 3. Backfill data from the old column to the new column
56
+ 4. Move reads from the old column to the new column
57
+ 5. Stop writing to the old column
58
+ 6. Drop the old column",
59
+
60
+ change_column_with_not_null:
61
+ "Changing the type is safe, but setting NOT NULL is not.",
62
+
63
+ remove_column: "Active Record caches attributes, which causes problems
64
+ when removing columns. Be sure to ignore the column%{column_suffix}:
65
+
66
+ class %{model} < %{base_model}
67
+ %{code}
68
+ end
69
+
70
+ Deploy the code, then wrap this step in a safety_assured { ... } block.
71
+
72
+ class %{migration_name} < ActiveRecord::Migration%{migration_suffix}
73
+ def change
74
+ safety_assured { %{command} }
75
+ end
76
+ end",
77
+
78
+ rename_column:
79
+ "Renaming a column that's in use will cause errors
80
+ in your application. A safer approach is to:
81
+
82
+ 1. Create a new column
83
+ 2. Write to both columns
84
+ 3. Backfill data from the old column to the new column
85
+ 4. Move reads from the old column to the new column
86
+ 5. Stop writing to the old column
87
+ 6. Drop the old column",
88
+
89
+ rename_table:
90
+ "Renaming a table that's in use will cause errors
91
+ in your application. A safer approach is to:
92
+
93
+ 1. Create a new table. Don't forget to recreate indexes from the old table
94
+ 2. Write to both tables
95
+ 3. Backfill data from the old table to the new table
96
+ 4. Move reads from the old table to the new table
97
+ 5. Stop writing to the old table
98
+ 6. Drop the old table",
99
+
100
+ add_reference:
101
+ "%{headline} Instead, use:
102
+
103
+ class %{migration_name} < ActiveRecord::Migration%{migration_suffix}
104
+ disable_ddl_transaction!
105
+
106
+ def change
107
+ %{command}
108
+ end
109
+ end",
110
+
111
+ add_index:
112
+ "Adding an index non-concurrently blocks writes. Instead, use:
113
+
114
+ class %{migration_name} < ActiveRecord::Migration%{migration_suffix}
115
+ disable_ddl_transaction!
116
+
117
+ def change
118
+ %{command}
119
+ end
120
+ end",
121
+
122
+ remove_index:
123
+ "Removing an index non-concurrently blocks writes. Instead, use:
124
+
125
+ class %{migration_name} < ActiveRecord::Migration%{migration_suffix}
126
+ disable_ddl_transaction!
127
+
128
+ def change
129
+ %{command}
130
+ end
131
+ end",
132
+
133
+ add_index_columns:
134
+ "Adding a non-unique index with more than three columns rarely improves performance.
135
+ Instead, start an index with columns that narrow down the results the most.",
136
+
137
+ add_index_corruption:
138
+ "Adding an index concurrently can cause silent data corruption in Postgres 14.0 to 14.3.
139
+ Upgrade Postgres before adding new indexes, or wrap this step in a safety_assured { ... } block
140
+ to accept the risk.",
141
+
142
+ change_table:
143
+ "Strong Migrations does not support inspecting what happens inside a
144
+ change_table block, so cannot help you here. Please make really sure that what
145
+ you're doing is safe before proceeding, then wrap it in a safety_assured { ... } block.",
146
+
147
+ create_table:
148
+ "The force option will destroy existing tables.
149
+ If this is intended, drop the existing table first.
150
+ In any case, remove the force option.",
151
+
152
+ execute:
153
+ "Strong Migrations does not support inspecting what happens inside an
154
+ execute call, so cannot help you here. Please make really sure that what
155
+ you're doing is safe before proceeding, then wrap it in a safety_assured { ... } block.",
156
+
157
+ change_column_default:
158
+ "Partial writes are enabled, which can cause incorrect values
159
+ to be inserted when changing the default value of a column.
160
+ Disable partial writes in config/application.rb:
161
+
162
+ config.active_record.%{config} = false",
163
+
164
+ change_column_null:
165
+ "Passing a default value to change_column_null runs a single UPDATE query,
166
+ which can cause downtime. Instead, backfill the existing rows in the
167
+ Rails console or a separate migration with disable_ddl_transaction!.
168
+
169
+ class Backfill%{migration_name} < ActiveRecord::Migration%{migration_suffix}
170
+ disable_ddl_transaction!
171
+
172
+ def up
173
+ %{code}
174
+ end
175
+ end",
176
+
177
+ change_column_null_postgresql:
178
+ "Setting NOT NULL on an existing column blocks reads and writes while every row is checked.
179
+ Instead, add a check constraint and validate it in a separate migration.
180
+
181
+ class %{migration_name} < ActiveRecord::Migration%{migration_suffix}
182
+ def change
183
+ %{add_constraint_code}
184
+ end
185
+ end
186
+
187
+ class Validate%{migration_name} < ActiveRecord::Migration%{migration_suffix}
188
+ %{validate_constraint_code}
189
+ end",
190
+
191
+ change_column_null_mysql:
192
+ "Setting NOT NULL on an existing column is not safe without strict mode enabled.",
193
+
194
+ add_foreign_key:
195
+ "Adding a foreign key blocks writes on both tables. Instead,
196
+ add the foreign key without validating existing rows,
197
+ then validate them in a separate migration.
198
+
199
+ class %{migration_name} < ActiveRecord::Migration%{migration_suffix}
200
+ def change
201
+ %{add_foreign_key_code}
202
+ end
203
+ end
204
+
205
+ class Validate%{migration_name} < ActiveRecord::Migration%{migration_suffix}
206
+ def change
207
+ %{validate_foreign_key_code}
208
+ end
209
+ end",
210
+
211
+ validate_foreign_key:
212
+ "Validating a foreign key while writes are blocked is dangerous.
213
+ Use disable_ddl_transaction! or a separate migration.",
214
+
215
+ add_check_constraint:
216
+ "Adding a check constraint key blocks reads and writes while every row is checked.
217
+ Instead, add the check constraint without validating existing rows,
218
+ then validate them in a separate migration.
219
+
220
+ class %{migration_name} < ActiveRecord::Migration%{migration_suffix}
221
+ def change
222
+ %{add_check_constraint_code}
223
+ end
224
+ end
225
+
226
+ class Validate%{migration_name} < ActiveRecord::Migration%{migration_suffix}
227
+ def change
228
+ %{validate_check_constraint_code}
229
+ end
230
+ end",
231
+
232
+ add_check_constraint_mysql:
233
+ "Adding a check constraint to an existing table is not safe with your database engine.",
234
+
235
+ validate_check_constraint:
236
+ "Validating a check constraint while writes are blocked is dangerous.
237
+ Use disable_ddl_transaction! or a separate migration.",
238
+
239
+ add_exclusion_constraint:
240
+ "Adding an exclusion constraint blocks reads and writes while every row is checked.",
241
+
242
+ add_unique_constraint:
243
+ "Adding a unique constraint creates a unique index, which blocks reads and writes.
244
+ Instead, create a unique index concurrently, then use it for the constraint.
245
+
246
+ class %{migration_name} < ActiveRecord::Migration%{migration_suffix}
247
+ disable_ddl_transaction!
248
+
249
+ def up
250
+ %{index_command}
251
+ %{constraint_command}
252
+ end
253
+
254
+ def down
255
+ %{remove_command}
256
+ end
257
+ end"
258
+ }
259
+ self.enabled_checks = (error_messages.keys - [:remove_index]).map { |k| [k, {}] }.to_h
260
+ end
@@ -3,17 +3,34 @@ module StrongMigrations
3
3
  def migrate(direction)
4
4
  strong_migrations_checker.direction = direction
5
5
  super
6
+ connection.begin_db_transaction if strong_migrations_checker.transaction_disabled
6
7
  end
7
8
 
8
9
  def method_missing(method, *args)
9
- strong_migrations_checker.perform(method, *args) do
10
+ return super if is_a?(ActiveRecord::Schema)
11
+
12
+ # Active Record 7.0.2+ versioned schema
13
+ return super if defined?(ActiveRecord::Schema::Definition) && is_a?(ActiveRecord::Schema::Definition)
14
+
15
+ catch(:safe) do
16
+ strong_migrations_checker.perform(method, *args) do
17
+ super
18
+ end
19
+ end
20
+ end
21
+ # same as ActiveRecord::Migration
22
+ ruby2_keywords(:method_missing)
23
+
24
+ def revert(*)
25
+ if strong_migrations_checker.version_safe?
26
+ safety_assured { super }
27
+ else
10
28
  super
11
29
  end
12
30
  end
13
- ruby2_keywords(:method_missing) if respond_to?(:ruby2_keywords, true)
14
31
 
15
32
  def safety_assured
16
- strong_migrations_checker.safety_assured do
33
+ strong_migrations_checker.class.safety_assured do
17
34
  yield
18
35
  end
19
36
  end
@@ -1,8 +1,26 @@
1
1
  module StrongMigrations
2
- module DatabaseTasks
3
- def migrate
2
+ module MigrationContext
3
+ def up(...)
4
4
  super
5
5
  rescue => e
6
+ strong_migrations_process_exception(e)
7
+ end
8
+
9
+ def down(...)
10
+ super
11
+ rescue => e
12
+ strong_migrations_process_exception(e)
13
+ end
14
+
15
+ def run(...)
16
+ super
17
+ rescue => e
18
+ strong_migrations_process_exception(e)
19
+ end
20
+
21
+ private
22
+
23
+ def strong_migrations_process_exception(e)
6
24
  if e.cause.is_a?(StrongMigrations::Error)
7
25
  # strip cause and clean backtrace
8
26
  def e.cause
@@ -0,0 +1,21 @@
1
+ module StrongMigrations
2
+ module Migrator
3
+ def ddl_transaction(migration, ...)
4
+ return super unless StrongMigrations.lock_timeout_retries > 0 && use_transaction?(migration)
5
+
6
+ # handle MigrationProxy class
7
+ migration = migration.send(:migration) if migration.respond_to?(:migration, true)
8
+
9
+ checker = migration.send(:strong_migrations_checker)
10
+ return super if checker.skip?
11
+
12
+ # retry migration since the entire transaction needs to be rerun
13
+ checker.retry_lock_timeouts(check_committed: true) do
14
+ # failed transaction reverts timeout, so need to re-apply
15
+ checker.reset
16
+
17
+ super(migration, ...)
18
+ end
19
+ end
20
+ end
21
+ end
@@ -0,0 +1,123 @@
1
+ module StrongMigrations
2
+ module SafeMethods
3
+ def safe_by_default_method?(method)
4
+ StrongMigrations.safe_by_default && [:add_index, :add_belongs_to, :add_reference, :remove_index, :add_foreign_key, :add_check_constraint, :change_column_null].include?(method)
5
+ end
6
+
7
+ def safe_add_index(*args, **options)
8
+ disable_transaction
9
+ @migration.add_index(*args, **options.merge(algorithm: :concurrently))
10
+ end
11
+
12
+ def safe_remove_index(*args, **options)
13
+ disable_transaction
14
+ @migration.remove_index(*args, **options.merge(algorithm: :concurrently))
15
+ end
16
+
17
+ def safe_add_reference(table, reference, *args, **options)
18
+ @migration.reversible do |dir|
19
+ dir.up do
20
+ disable_transaction
21
+ foreign_key = options.delete(:foreign_key)
22
+ @migration.add_reference(table, reference, *args, **options)
23
+ if foreign_key
24
+ # same as Active Record
25
+ name =
26
+ if foreign_key.is_a?(Hash) && foreign_key[:to_table]
27
+ foreign_key[:to_table]
28
+ else
29
+ (ActiveRecord::Base.pluralize_table_names ? reference.to_s.pluralize : reference).to_sym
30
+ end
31
+
32
+ foreign_key_opts = foreign_key.is_a?(Hash) ? foreign_key.except(:to_table) : {}
33
+ if reference
34
+ @migration.add_foreign_key(table, name, column: "#{reference}_id", **foreign_key_opts)
35
+ else
36
+ @migration.add_foreign_key(table, name, **foreign_key_opts)
37
+ end
38
+ end
39
+ end
40
+ dir.down do
41
+ @migration.remove_reference(table, reference)
42
+ end
43
+ end
44
+ end
45
+
46
+ def safe_add_foreign_key(from_table, to_table, *args, **options)
47
+ @migration.reversible do |dir|
48
+ dir.up do
49
+ # validate option is unintentionally ignored for Active Record < 7.1
50
+ # https://github.com/rails/rails/pull/45896
51
+ if !connection.foreign_key_exists?(from_table, to_table, **options.merge(validate: false))
52
+ @migration.add_foreign_key(from_table, to_table, *args, **options.merge(validate: false))
53
+ end
54
+ disable_transaction
55
+ @migration.validate_foreign_key(from_table, to_table, **options.slice(:column, :name))
56
+ end
57
+ dir.down do
58
+ @migration.remove_foreign_key(from_table, to_table, **options.slice(:column, :name))
59
+ end
60
+ end
61
+ end
62
+
63
+ def safe_add_check_constraint(table, expression, *args, add_options, validate_options)
64
+ @migration.reversible do |dir|
65
+ dir.up do
66
+ # only skip invalid constraints
67
+ unless connection.check_constraints(table).any? { |c| c.options[:name] == validate_options[:name] && !c.options[:validate] }
68
+ @migration.add_check_constraint(table, expression, *args, **add_options)
69
+ end
70
+ disable_transaction
71
+ @migration.validate_check_constraint(table, **validate_options)
72
+ end
73
+ dir.down do
74
+ @migration.remove_check_constraint(table, expression, **add_options.except(:validate))
75
+ end
76
+ end
77
+ end
78
+
79
+ def safe_change_column_null(add_args, validate_args, change_args, remove_args, default, constraints)
80
+ @migration.reversible do |dir|
81
+ dir.up do
82
+ unless default.nil?
83
+ raise Error, "default value not supported yet with safe_by_default"
84
+ end
85
+
86
+ add_options = add_args.extract_options!
87
+ validate_options = validate_args.extract_options!
88
+ remove_options = remove_args.extract_options!
89
+
90
+ # only skip invalid constraints
91
+ unless constraints.any? { |c| c.options[:name] == validate_options[:name] && !c.options[:validate] }
92
+ @migration.add_check_constraint(*add_args, **add_options)
93
+ end
94
+ disable_transaction
95
+
96
+ connection.begin_db_transaction
97
+ @migration.validate_check_constraint(*validate_args, **validate_options)
98
+ @migration.change_column_null(*change_args)
99
+ @migration.remove_check_constraint(*remove_args, **remove_options)
100
+ connection.commit_db_transaction
101
+ end
102
+ dir.down do
103
+ down_args = change_args.dup
104
+ down_args[2] = true
105
+ @migration.change_column_null(*down_args)
106
+ end
107
+ end
108
+ end
109
+
110
+ # hard to commit at right time when reverting
111
+ # so just commit at start
112
+ def disable_transaction
113
+ if in_transaction? && !transaction_disabled
114
+ connection.commit_db_transaction
115
+ self.transaction_disabled = true
116
+ end
117
+ end
118
+
119
+ def in_transaction?
120
+ connection.open_transactions > 0
121
+ end
122
+ end
123
+ end
@@ -0,0 +1,32 @@
1
+ module StrongMigrations
2
+ module SchemaDumper
3
+ def initialize(connection, ...)
4
+ return super unless StrongMigrations.alphabetize_schema
5
+
6
+ super(WrappedConnection.new(connection), ...)
7
+ end
8
+ end
9
+
10
+ class WrappedConnection
11
+ delegate_missing_to :@connection
12
+
13
+ def initialize(connection)
14
+ @connection = connection
15
+ end
16
+
17
+ def columns(...)
18
+ @connection.columns(...).sort_by(&:name)
19
+ end
20
+
21
+ # forward private methods with send
22
+ # method_missing cannot tell how method was called
23
+ # this is not ideal, but other solutions have drawbacks
24
+ def send(name, ...)
25
+ if respond_to?(name, true)
26
+ super
27
+ else
28
+ @connection.send(name, ...)
29
+ end
30
+ end
31
+ end
32
+ end
@@ -1,3 +1,3 @@
1
1
  module StrongMigrations
2
- VERSION = "0.7.0"
2
+ VERSION = "2.2.0"
3
3
  end