strong_migrations 0.7.0 → 2.2.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +183 -1
- data/LICENSE.txt +1 -1
- data/README.md +385 -164
- data/lib/generators/strong_migrations/install_generator.rb +25 -0
- data/lib/generators/strong_migrations/templates/initializer.rb.tt +10 -3
- data/lib/strong_migrations/adapters/abstract_adapter.rb +76 -0
- data/lib/strong_migrations/adapters/mariadb_adapter.rb +32 -0
- data/lib/strong_migrations/adapters/mysql_adapter.rb +112 -0
- data/lib/strong_migrations/adapters/postgresql_adapter.rb +232 -0
- data/lib/strong_migrations/checker.rb +190 -440
- data/lib/strong_migrations/checks.rb +475 -0
- data/lib/strong_migrations/error_messages.rb +260 -0
- data/lib/strong_migrations/migration.rb +20 -3
- data/lib/strong_migrations/{database_tasks.rb → migration_context.rb} +20 -2
- data/lib/strong_migrations/migrator.rb +21 -0
- data/lib/strong_migrations/safe_methods.rb +123 -0
- data/lib/strong_migrations/schema_dumper.rb +32 -0
- data/lib/strong_migrations/version.rb +1 -1
- data/lib/strong_migrations.rb +46 -203
- data/lib/tasks/strong_migrations.rake +2 -7
- metadata +17 -83
- data/lib/strong_migrations/alphabetize_columns.rb +0 -11
@@ -0,0 +1,260 @@
|
|
1
|
+
module StrongMigrations
|
2
|
+
self.error_messages = {
|
3
|
+
add_column_default:
|
4
|
+
"Adding a column with a %{default_type} default blocks %{rewrite_blocks} while the entire table is rewritten.
|
5
|
+
Instead, add the column without a default value, then change the default.
|
6
|
+
|
7
|
+
class %{migration_name} < ActiveRecord::Migration%{migration_suffix}
|
8
|
+
def up
|
9
|
+
%{add_command}
|
10
|
+
%{change_command}
|
11
|
+
end
|
12
|
+
|
13
|
+
def down
|
14
|
+
%{remove_command}
|
15
|
+
end
|
16
|
+
end
|
17
|
+
|
18
|
+
Then backfill the existing rows in the Rails console or a separate migration with disable_ddl_transaction!.
|
19
|
+
|
20
|
+
class Backfill%{migration_name} < ActiveRecord::Migration%{migration_suffix}
|
21
|
+
disable_ddl_transaction!
|
22
|
+
|
23
|
+
def up
|
24
|
+
%{code}
|
25
|
+
end
|
26
|
+
end",
|
27
|
+
|
28
|
+
add_column_default_callable:
|
29
|
+
"Strong Migrations does not support inspecting callable default values.
|
30
|
+
Please make really sure you're not calling a VOLATILE function,
|
31
|
+
then wrap it in a safety_assured { ... } block.",
|
32
|
+
|
33
|
+
add_column_json:
|
34
|
+
"There's no equality operator for the json column type, which can cause errors for
|
35
|
+
existing SELECT DISTINCT queries in your application. Use jsonb instead.
|
36
|
+
|
37
|
+
class %{migration_name} < ActiveRecord::Migration%{migration_suffix}
|
38
|
+
def change
|
39
|
+
%{command}
|
40
|
+
end
|
41
|
+
end",
|
42
|
+
|
43
|
+
add_column_generated_stored:
|
44
|
+
"Adding a stored generated column blocks %{rewrite_blocks} while the entire table is rewritten.",
|
45
|
+
|
46
|
+
add_column_auto_incrementing:
|
47
|
+
"Adding an auto-incrementing column blocks %{rewrite_blocks} while the entire table is rewritten.",
|
48
|
+
|
49
|
+
change_column:
|
50
|
+
"Changing the type of an existing column blocks %{rewrite_blocks}
|
51
|
+
while the entire table is rewritten. A safer approach is to:
|
52
|
+
|
53
|
+
1. Create a new column
|
54
|
+
2. Write to both columns
|
55
|
+
3. Backfill data from the old column to the new column
|
56
|
+
4. Move reads from the old column to the new column
|
57
|
+
5. Stop writing to the old column
|
58
|
+
6. Drop the old column",
|
59
|
+
|
60
|
+
change_column_with_not_null:
|
61
|
+
"Changing the type is safe, but setting NOT NULL is not.",
|
62
|
+
|
63
|
+
remove_column: "Active Record caches attributes, which causes problems
|
64
|
+
when removing columns. Be sure to ignore the column%{column_suffix}:
|
65
|
+
|
66
|
+
class %{model} < %{base_model}
|
67
|
+
%{code}
|
68
|
+
end
|
69
|
+
|
70
|
+
Deploy the code, then wrap this step in a safety_assured { ... } block.
|
71
|
+
|
72
|
+
class %{migration_name} < ActiveRecord::Migration%{migration_suffix}
|
73
|
+
def change
|
74
|
+
safety_assured { %{command} }
|
75
|
+
end
|
76
|
+
end",
|
77
|
+
|
78
|
+
rename_column:
|
79
|
+
"Renaming a column that's in use will cause errors
|
80
|
+
in your application. A safer approach is to:
|
81
|
+
|
82
|
+
1. Create a new column
|
83
|
+
2. Write to both columns
|
84
|
+
3. Backfill data from the old column to the new column
|
85
|
+
4. Move reads from the old column to the new column
|
86
|
+
5. Stop writing to the old column
|
87
|
+
6. Drop the old column",
|
88
|
+
|
89
|
+
rename_table:
|
90
|
+
"Renaming a table that's in use will cause errors
|
91
|
+
in your application. A safer approach is to:
|
92
|
+
|
93
|
+
1. Create a new table. Don't forget to recreate indexes from the old table
|
94
|
+
2. Write to both tables
|
95
|
+
3. Backfill data from the old table to the new table
|
96
|
+
4. Move reads from the old table to the new table
|
97
|
+
5. Stop writing to the old table
|
98
|
+
6. Drop the old table",
|
99
|
+
|
100
|
+
add_reference:
|
101
|
+
"%{headline} Instead, use:
|
102
|
+
|
103
|
+
class %{migration_name} < ActiveRecord::Migration%{migration_suffix}
|
104
|
+
disable_ddl_transaction!
|
105
|
+
|
106
|
+
def change
|
107
|
+
%{command}
|
108
|
+
end
|
109
|
+
end",
|
110
|
+
|
111
|
+
add_index:
|
112
|
+
"Adding an index non-concurrently blocks writes. Instead, use:
|
113
|
+
|
114
|
+
class %{migration_name} < ActiveRecord::Migration%{migration_suffix}
|
115
|
+
disable_ddl_transaction!
|
116
|
+
|
117
|
+
def change
|
118
|
+
%{command}
|
119
|
+
end
|
120
|
+
end",
|
121
|
+
|
122
|
+
remove_index:
|
123
|
+
"Removing an index non-concurrently blocks writes. Instead, use:
|
124
|
+
|
125
|
+
class %{migration_name} < ActiveRecord::Migration%{migration_suffix}
|
126
|
+
disable_ddl_transaction!
|
127
|
+
|
128
|
+
def change
|
129
|
+
%{command}
|
130
|
+
end
|
131
|
+
end",
|
132
|
+
|
133
|
+
add_index_columns:
|
134
|
+
"Adding a non-unique index with more than three columns rarely improves performance.
|
135
|
+
Instead, start an index with columns that narrow down the results the most.",
|
136
|
+
|
137
|
+
add_index_corruption:
|
138
|
+
"Adding an index concurrently can cause silent data corruption in Postgres 14.0 to 14.3.
|
139
|
+
Upgrade Postgres before adding new indexes, or wrap this step in a safety_assured { ... } block
|
140
|
+
to accept the risk.",
|
141
|
+
|
142
|
+
change_table:
|
143
|
+
"Strong Migrations does not support inspecting what happens inside a
|
144
|
+
change_table block, so cannot help you here. Please make really sure that what
|
145
|
+
you're doing is safe before proceeding, then wrap it in a safety_assured { ... } block.",
|
146
|
+
|
147
|
+
create_table:
|
148
|
+
"The force option will destroy existing tables.
|
149
|
+
If this is intended, drop the existing table first.
|
150
|
+
In any case, remove the force option.",
|
151
|
+
|
152
|
+
execute:
|
153
|
+
"Strong Migrations does not support inspecting what happens inside an
|
154
|
+
execute call, so cannot help you here. Please make really sure that what
|
155
|
+
you're doing is safe before proceeding, then wrap it in a safety_assured { ... } block.",
|
156
|
+
|
157
|
+
change_column_default:
|
158
|
+
"Partial writes are enabled, which can cause incorrect values
|
159
|
+
to be inserted when changing the default value of a column.
|
160
|
+
Disable partial writes in config/application.rb:
|
161
|
+
|
162
|
+
config.active_record.%{config} = false",
|
163
|
+
|
164
|
+
change_column_null:
|
165
|
+
"Passing a default value to change_column_null runs a single UPDATE query,
|
166
|
+
which can cause downtime. Instead, backfill the existing rows in the
|
167
|
+
Rails console or a separate migration with disable_ddl_transaction!.
|
168
|
+
|
169
|
+
class Backfill%{migration_name} < ActiveRecord::Migration%{migration_suffix}
|
170
|
+
disable_ddl_transaction!
|
171
|
+
|
172
|
+
def up
|
173
|
+
%{code}
|
174
|
+
end
|
175
|
+
end",
|
176
|
+
|
177
|
+
change_column_null_postgresql:
|
178
|
+
"Setting NOT NULL on an existing column blocks reads and writes while every row is checked.
|
179
|
+
Instead, add a check constraint and validate it in a separate migration.
|
180
|
+
|
181
|
+
class %{migration_name} < ActiveRecord::Migration%{migration_suffix}
|
182
|
+
def change
|
183
|
+
%{add_constraint_code}
|
184
|
+
end
|
185
|
+
end
|
186
|
+
|
187
|
+
class Validate%{migration_name} < ActiveRecord::Migration%{migration_suffix}
|
188
|
+
%{validate_constraint_code}
|
189
|
+
end",
|
190
|
+
|
191
|
+
change_column_null_mysql:
|
192
|
+
"Setting NOT NULL on an existing column is not safe without strict mode enabled.",
|
193
|
+
|
194
|
+
add_foreign_key:
|
195
|
+
"Adding a foreign key blocks writes on both tables. Instead,
|
196
|
+
add the foreign key without validating existing rows,
|
197
|
+
then validate them in a separate migration.
|
198
|
+
|
199
|
+
class %{migration_name} < ActiveRecord::Migration%{migration_suffix}
|
200
|
+
def change
|
201
|
+
%{add_foreign_key_code}
|
202
|
+
end
|
203
|
+
end
|
204
|
+
|
205
|
+
class Validate%{migration_name} < ActiveRecord::Migration%{migration_suffix}
|
206
|
+
def change
|
207
|
+
%{validate_foreign_key_code}
|
208
|
+
end
|
209
|
+
end",
|
210
|
+
|
211
|
+
validate_foreign_key:
|
212
|
+
"Validating a foreign key while writes are blocked is dangerous.
|
213
|
+
Use disable_ddl_transaction! or a separate migration.",
|
214
|
+
|
215
|
+
add_check_constraint:
|
216
|
+
"Adding a check constraint key blocks reads and writes while every row is checked.
|
217
|
+
Instead, add the check constraint without validating existing rows,
|
218
|
+
then validate them in a separate migration.
|
219
|
+
|
220
|
+
class %{migration_name} < ActiveRecord::Migration%{migration_suffix}
|
221
|
+
def change
|
222
|
+
%{add_check_constraint_code}
|
223
|
+
end
|
224
|
+
end
|
225
|
+
|
226
|
+
class Validate%{migration_name} < ActiveRecord::Migration%{migration_suffix}
|
227
|
+
def change
|
228
|
+
%{validate_check_constraint_code}
|
229
|
+
end
|
230
|
+
end",
|
231
|
+
|
232
|
+
add_check_constraint_mysql:
|
233
|
+
"Adding a check constraint to an existing table is not safe with your database engine.",
|
234
|
+
|
235
|
+
validate_check_constraint:
|
236
|
+
"Validating a check constraint while writes are blocked is dangerous.
|
237
|
+
Use disable_ddl_transaction! or a separate migration.",
|
238
|
+
|
239
|
+
add_exclusion_constraint:
|
240
|
+
"Adding an exclusion constraint blocks reads and writes while every row is checked.",
|
241
|
+
|
242
|
+
add_unique_constraint:
|
243
|
+
"Adding a unique constraint creates a unique index, which blocks reads and writes.
|
244
|
+
Instead, create a unique index concurrently, then use it for the constraint.
|
245
|
+
|
246
|
+
class %{migration_name} < ActiveRecord::Migration%{migration_suffix}
|
247
|
+
disable_ddl_transaction!
|
248
|
+
|
249
|
+
def up
|
250
|
+
%{index_command}
|
251
|
+
%{constraint_command}
|
252
|
+
end
|
253
|
+
|
254
|
+
def down
|
255
|
+
%{remove_command}
|
256
|
+
end
|
257
|
+
end"
|
258
|
+
}
|
259
|
+
self.enabled_checks = (error_messages.keys - [:remove_index]).map { |k| [k, {}] }.to_h
|
260
|
+
end
|
@@ -3,17 +3,34 @@ module StrongMigrations
|
|
3
3
|
def migrate(direction)
|
4
4
|
strong_migrations_checker.direction = direction
|
5
5
|
super
|
6
|
+
connection.begin_db_transaction if strong_migrations_checker.transaction_disabled
|
6
7
|
end
|
7
8
|
|
8
9
|
def method_missing(method, *args)
|
9
|
-
|
10
|
+
return super if is_a?(ActiveRecord::Schema)
|
11
|
+
|
12
|
+
# Active Record 7.0.2+ versioned schema
|
13
|
+
return super if defined?(ActiveRecord::Schema::Definition) && is_a?(ActiveRecord::Schema::Definition)
|
14
|
+
|
15
|
+
catch(:safe) do
|
16
|
+
strong_migrations_checker.perform(method, *args) do
|
17
|
+
super
|
18
|
+
end
|
19
|
+
end
|
20
|
+
end
|
21
|
+
# same as ActiveRecord::Migration
|
22
|
+
ruby2_keywords(:method_missing)
|
23
|
+
|
24
|
+
def revert(*)
|
25
|
+
if strong_migrations_checker.version_safe?
|
26
|
+
safety_assured { super }
|
27
|
+
else
|
10
28
|
super
|
11
29
|
end
|
12
30
|
end
|
13
|
-
ruby2_keywords(:method_missing) if respond_to?(:ruby2_keywords, true)
|
14
31
|
|
15
32
|
def safety_assured
|
16
|
-
strong_migrations_checker.safety_assured do
|
33
|
+
strong_migrations_checker.class.safety_assured do
|
17
34
|
yield
|
18
35
|
end
|
19
36
|
end
|
@@ -1,8 +1,26 @@
|
|
1
1
|
module StrongMigrations
|
2
|
-
module
|
3
|
-
def
|
2
|
+
module MigrationContext
|
3
|
+
def up(...)
|
4
4
|
super
|
5
5
|
rescue => e
|
6
|
+
strong_migrations_process_exception(e)
|
7
|
+
end
|
8
|
+
|
9
|
+
def down(...)
|
10
|
+
super
|
11
|
+
rescue => e
|
12
|
+
strong_migrations_process_exception(e)
|
13
|
+
end
|
14
|
+
|
15
|
+
def run(...)
|
16
|
+
super
|
17
|
+
rescue => e
|
18
|
+
strong_migrations_process_exception(e)
|
19
|
+
end
|
20
|
+
|
21
|
+
private
|
22
|
+
|
23
|
+
def strong_migrations_process_exception(e)
|
6
24
|
if e.cause.is_a?(StrongMigrations::Error)
|
7
25
|
# strip cause and clean backtrace
|
8
26
|
def e.cause
|
@@ -0,0 +1,21 @@
|
|
1
|
+
module StrongMigrations
|
2
|
+
module Migrator
|
3
|
+
def ddl_transaction(migration, ...)
|
4
|
+
return super unless StrongMigrations.lock_timeout_retries > 0 && use_transaction?(migration)
|
5
|
+
|
6
|
+
# handle MigrationProxy class
|
7
|
+
migration = migration.send(:migration) if migration.respond_to?(:migration, true)
|
8
|
+
|
9
|
+
checker = migration.send(:strong_migrations_checker)
|
10
|
+
return super if checker.skip?
|
11
|
+
|
12
|
+
# retry migration since the entire transaction needs to be rerun
|
13
|
+
checker.retry_lock_timeouts(check_committed: true) do
|
14
|
+
# failed transaction reverts timeout, so need to re-apply
|
15
|
+
checker.reset
|
16
|
+
|
17
|
+
super(migration, ...)
|
18
|
+
end
|
19
|
+
end
|
20
|
+
end
|
21
|
+
end
|
@@ -0,0 +1,123 @@
|
|
1
|
+
module StrongMigrations
|
2
|
+
module SafeMethods
|
3
|
+
def safe_by_default_method?(method)
|
4
|
+
StrongMigrations.safe_by_default && [:add_index, :add_belongs_to, :add_reference, :remove_index, :add_foreign_key, :add_check_constraint, :change_column_null].include?(method)
|
5
|
+
end
|
6
|
+
|
7
|
+
def safe_add_index(*args, **options)
|
8
|
+
disable_transaction
|
9
|
+
@migration.add_index(*args, **options.merge(algorithm: :concurrently))
|
10
|
+
end
|
11
|
+
|
12
|
+
def safe_remove_index(*args, **options)
|
13
|
+
disable_transaction
|
14
|
+
@migration.remove_index(*args, **options.merge(algorithm: :concurrently))
|
15
|
+
end
|
16
|
+
|
17
|
+
def safe_add_reference(table, reference, *args, **options)
|
18
|
+
@migration.reversible do |dir|
|
19
|
+
dir.up do
|
20
|
+
disable_transaction
|
21
|
+
foreign_key = options.delete(:foreign_key)
|
22
|
+
@migration.add_reference(table, reference, *args, **options)
|
23
|
+
if foreign_key
|
24
|
+
# same as Active Record
|
25
|
+
name =
|
26
|
+
if foreign_key.is_a?(Hash) && foreign_key[:to_table]
|
27
|
+
foreign_key[:to_table]
|
28
|
+
else
|
29
|
+
(ActiveRecord::Base.pluralize_table_names ? reference.to_s.pluralize : reference).to_sym
|
30
|
+
end
|
31
|
+
|
32
|
+
foreign_key_opts = foreign_key.is_a?(Hash) ? foreign_key.except(:to_table) : {}
|
33
|
+
if reference
|
34
|
+
@migration.add_foreign_key(table, name, column: "#{reference}_id", **foreign_key_opts)
|
35
|
+
else
|
36
|
+
@migration.add_foreign_key(table, name, **foreign_key_opts)
|
37
|
+
end
|
38
|
+
end
|
39
|
+
end
|
40
|
+
dir.down do
|
41
|
+
@migration.remove_reference(table, reference)
|
42
|
+
end
|
43
|
+
end
|
44
|
+
end
|
45
|
+
|
46
|
+
def safe_add_foreign_key(from_table, to_table, *args, **options)
|
47
|
+
@migration.reversible do |dir|
|
48
|
+
dir.up do
|
49
|
+
# validate option is unintentionally ignored for Active Record < 7.1
|
50
|
+
# https://github.com/rails/rails/pull/45896
|
51
|
+
if !connection.foreign_key_exists?(from_table, to_table, **options.merge(validate: false))
|
52
|
+
@migration.add_foreign_key(from_table, to_table, *args, **options.merge(validate: false))
|
53
|
+
end
|
54
|
+
disable_transaction
|
55
|
+
@migration.validate_foreign_key(from_table, to_table, **options.slice(:column, :name))
|
56
|
+
end
|
57
|
+
dir.down do
|
58
|
+
@migration.remove_foreign_key(from_table, to_table, **options.slice(:column, :name))
|
59
|
+
end
|
60
|
+
end
|
61
|
+
end
|
62
|
+
|
63
|
+
def safe_add_check_constraint(table, expression, *args, add_options, validate_options)
|
64
|
+
@migration.reversible do |dir|
|
65
|
+
dir.up do
|
66
|
+
# only skip invalid constraints
|
67
|
+
unless connection.check_constraints(table).any? { |c| c.options[:name] == validate_options[:name] && !c.options[:validate] }
|
68
|
+
@migration.add_check_constraint(table, expression, *args, **add_options)
|
69
|
+
end
|
70
|
+
disable_transaction
|
71
|
+
@migration.validate_check_constraint(table, **validate_options)
|
72
|
+
end
|
73
|
+
dir.down do
|
74
|
+
@migration.remove_check_constraint(table, expression, **add_options.except(:validate))
|
75
|
+
end
|
76
|
+
end
|
77
|
+
end
|
78
|
+
|
79
|
+
def safe_change_column_null(add_args, validate_args, change_args, remove_args, default, constraints)
|
80
|
+
@migration.reversible do |dir|
|
81
|
+
dir.up do
|
82
|
+
unless default.nil?
|
83
|
+
raise Error, "default value not supported yet with safe_by_default"
|
84
|
+
end
|
85
|
+
|
86
|
+
add_options = add_args.extract_options!
|
87
|
+
validate_options = validate_args.extract_options!
|
88
|
+
remove_options = remove_args.extract_options!
|
89
|
+
|
90
|
+
# only skip invalid constraints
|
91
|
+
unless constraints.any? { |c| c.options[:name] == validate_options[:name] && !c.options[:validate] }
|
92
|
+
@migration.add_check_constraint(*add_args, **add_options)
|
93
|
+
end
|
94
|
+
disable_transaction
|
95
|
+
|
96
|
+
connection.begin_db_transaction
|
97
|
+
@migration.validate_check_constraint(*validate_args, **validate_options)
|
98
|
+
@migration.change_column_null(*change_args)
|
99
|
+
@migration.remove_check_constraint(*remove_args, **remove_options)
|
100
|
+
connection.commit_db_transaction
|
101
|
+
end
|
102
|
+
dir.down do
|
103
|
+
down_args = change_args.dup
|
104
|
+
down_args[2] = true
|
105
|
+
@migration.change_column_null(*down_args)
|
106
|
+
end
|
107
|
+
end
|
108
|
+
end
|
109
|
+
|
110
|
+
# hard to commit at right time when reverting
|
111
|
+
# so just commit at start
|
112
|
+
def disable_transaction
|
113
|
+
if in_transaction? && !transaction_disabled
|
114
|
+
connection.commit_db_transaction
|
115
|
+
self.transaction_disabled = true
|
116
|
+
end
|
117
|
+
end
|
118
|
+
|
119
|
+
def in_transaction?
|
120
|
+
connection.open_transactions > 0
|
121
|
+
end
|
122
|
+
end
|
123
|
+
end
|
@@ -0,0 +1,32 @@
|
|
1
|
+
module StrongMigrations
|
2
|
+
module SchemaDumper
|
3
|
+
def initialize(connection, ...)
|
4
|
+
return super unless StrongMigrations.alphabetize_schema
|
5
|
+
|
6
|
+
super(WrappedConnection.new(connection), ...)
|
7
|
+
end
|
8
|
+
end
|
9
|
+
|
10
|
+
class WrappedConnection
|
11
|
+
delegate_missing_to :@connection
|
12
|
+
|
13
|
+
def initialize(connection)
|
14
|
+
@connection = connection
|
15
|
+
end
|
16
|
+
|
17
|
+
def columns(...)
|
18
|
+
@connection.columns(...).sort_by(&:name)
|
19
|
+
end
|
20
|
+
|
21
|
+
# forward private methods with send
|
22
|
+
# method_missing cannot tell how method was called
|
23
|
+
# this is not ideal, but other solutions have drawbacks
|
24
|
+
def send(name, ...)
|
25
|
+
if respond_to?(name, true)
|
26
|
+
super
|
27
|
+
else
|
28
|
+
@connection.send(name, ...)
|
29
|
+
end
|
30
|
+
end
|
31
|
+
end
|
32
|
+
end
|