2019-05-03 06:17:27 +08:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2018-03-20 15:20:50 +08:00
|
|
|
module Migration; end
|
|
|
|
|
|
|
|
class Discourse::InvalidMigration < StandardError; end
|
|
|
|
|
|
|
|
class Migration::SafeMigrate
|
|
|
|
module SafeMigration
|
|
|
|
UNSAFE_VERSION = 20180321015220
|
|
|
|
@@enable_safe = true
|
|
|
|
|
|
|
|
def self.enable_safe!
|
|
|
|
@@enable_safe = true
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.disable_safe!
|
|
|
|
@@enable_safe = false
|
|
|
|
end
|
|
|
|
|
|
|
|
def migrate(direction)
|
2018-10-08 15:47:38 +08:00
|
|
|
if direction == :up &&
|
|
|
|
version && version > UNSAFE_VERSION &&
|
|
|
|
@@enable_safe != false &&
|
|
|
|
!is_post_deploy_migration?
|
|
|
|
|
2018-03-20 15:20:50 +08:00
|
|
|
Migration::SafeMigrate.enable!
|
|
|
|
end
|
2018-10-08 15:47:38 +08:00
|
|
|
|
2018-03-20 15:20:50 +08:00
|
|
|
super
|
|
|
|
ensure
|
|
|
|
Migration::SafeMigrate.disable!
|
|
|
|
end
|
2018-10-08 15:47:38 +08:00
|
|
|
|
|
|
|
private
|
|
|
|
|
|
|
|
def is_post_deploy_migration?
|
|
|
|
method =
|
|
|
|
if self.respond_to?(:up)
|
|
|
|
:up
|
|
|
|
elsif self.respond_to?(:change)
|
|
|
|
:change
|
|
|
|
end
|
|
|
|
|
|
|
|
self.method(method).source_location.first.include?(
|
|
|
|
Discourse::DB_POST_MIGRATE_PATH
|
|
|
|
)
|
|
|
|
end
|
2018-03-20 15:20:50 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
module NiceErrors
|
|
|
|
def migrate
|
|
|
|
super
|
|
|
|
rescue => e
|
|
|
|
if e.cause.is_a?(Discourse::InvalidMigration)
|
2018-12-04 11:48:13 +08:00
|
|
|
def e.cause
|
|
|
|
nil
|
|
|
|
end
|
2018-03-20 15:20:50 +08:00
|
|
|
def e.backtrace
|
|
|
|
super.reject do |frame|
|
|
|
|
frame =~ /safe_migrate\.rb/ || frame =~ /schema_migration_details\.rb/
|
|
|
|
end
|
|
|
|
end
|
|
|
|
raise e
|
|
|
|
else
|
|
|
|
raise e
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.enable!
|
|
|
|
return if PG::Connection.method_defined?(:exec_migrator_unpatched)
|
|
|
|
|
|
|
|
PG::Connection.class_eval do
|
|
|
|
alias_method :exec_migrator_unpatched, :exec
|
|
|
|
alias_method :async_exec_migrator_unpatched, :async_exec
|
|
|
|
|
|
|
|
def exec(*args, &blk)
|
|
|
|
Migration::SafeMigrate.protect!(args[0])
|
|
|
|
exec_migrator_unpatched(*args, &blk)
|
|
|
|
end
|
|
|
|
|
|
|
|
def async_exec(*args, &blk)
|
|
|
|
Migration::SafeMigrate.protect!(args[0])
|
|
|
|
async_exec_migrator_unpatched(*args, &blk)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.disable!
|
|
|
|
return if !PG::Connection.method_defined?(:exec_migrator_unpatched)
|
|
|
|
PG::Connection.class_eval do
|
|
|
|
alias_method :exec, :exec_migrator_unpatched
|
|
|
|
alias_method :async_exec, :async_exec_migrator_unpatched
|
|
|
|
|
|
|
|
remove_method :exec_migrator_unpatched
|
|
|
|
remove_method :async_exec_migrator_unpatched
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.patch_active_record!
|
|
|
|
ActiveSupport.on_load(:active_record) do
|
|
|
|
ActiveRecord::Migration.prepend(SafeMigration)
|
|
|
|
end
|
|
|
|
|
|
|
|
if defined?(ActiveRecord::Tasks::DatabaseTasks)
|
|
|
|
ActiveRecord::Tasks::DatabaseTasks.singleton_class.prepend(NiceErrors)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.protect!(sql)
|
2018-03-22 00:52:05 +08:00
|
|
|
if sql =~ /^\s*(?:drop\s+table|alter\s+table.*rename\s+to)\s+/i
|
2018-03-20 15:20:50 +08:00
|
|
|
$stdout.puts("", <<~STR)
|
|
|
|
WARNING
|
|
|
|
-------------------------------------------------------------------------------------
|
2018-03-22 00:52:05 +08:00
|
|
|
An attempt was made to drop or rename a table in a migration
|
2018-03-20 15:20:50 +08:00
|
|
|
SQL used was: '#{sql}'
|
2018-10-08 15:47:38 +08:00
|
|
|
Please generate a post deployment migration using `rails g post_migration` to drop
|
2018-03-22 00:52:05 +08:00
|
|
|
or rename the table.
|
2018-03-20 15:20:50 +08:00
|
|
|
|
|
|
|
This protection is in place to protect us against dropping tables that are currently
|
|
|
|
in use by live applications.
|
|
|
|
STR
|
|
|
|
raise Discourse::InvalidMigration, "Attempt was made to drop a table"
|
2018-03-22 00:52:05 +08:00
|
|
|
elsif sql =~ /^\s*alter\s+table.*(?:rename|drop)\s+/i
|
2018-03-20 15:20:50 +08:00
|
|
|
$stdout.puts("", <<~STR)
|
|
|
|
WARNING
|
|
|
|
-------------------------------------------------------------------------------------
|
|
|
|
An attempt was made to drop or rename a column in a migration
|
|
|
|
SQL used was: '#{sql}'
|
2018-10-08 15:47:38 +08:00
|
|
|
|
|
|
|
Please generate a post deployment migration using `rails g post_migration` to drop
|
2018-03-20 15:20:50 +08:00
|
|
|
or rename columns.
|
|
|
|
|
|
|
|
Note, to minimize disruption use self.ignored_columns = ["column name"] on your
|
|
|
|
ActiveRecord model, this can be removed 6 months or so later.
|
|
|
|
|
|
|
|
This protection is in place to protect us against dropping columns that are currently
|
|
|
|
in use by live applications.
|
|
|
|
STR
|
|
|
|
raise Discourse::InvalidMigration, "Attempt was made to rename or delete column"
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|