ls-deno/db/migrations.ts

302 lines
8.2 KiB
TypeScript
Raw Normal View History

2022-11-09 16:55:27 -06:00
import {
createNote,
createUser,
initDatabaseConnectionPool,
queryArray,
} from "@/db/mod.ts";
import { reload } from "@/config.ts";
import { log, setupLoggers } from "@/log.ts";
const [config, configLoadLogCallbacks] = reload();
setupLoggers(config.log);
for (const f of configLoadLogCallbacks) {
f(log);
}
initDatabaseConnectionPool(config.postgres);
2022-09-27 15:49:41 -05:00
2022-10-07 17:23:43 -05:00
const id = "id uuid primary key default generate_ulid()";
2022-09-30 15:14:57 -05:00
2022-10-01 14:03:15 -05:00
interface TableSpec {
columns: string[];
2022-10-05 17:02:21 -05:00
additionalTableStatements?: string[];
2022-10-01 14:03:15 -05:00
additionalStatements?: string[];
prepStatements?: string[];
}
2022-10-07 17:09:13 -05:00
const createdAtTimestamp = "created_at timestamptz not null default now()";
const updatedAtTimestamp = "updated_at timestamptz not null default now()";
const timestamps = [createdAtTimestamp, updatedAtTimestamp];
2022-09-30 15:14:57 -05:00
2022-10-07 23:22:35 -05:00
const extensions = [
"uuid-ossp",
"pgcrypto",
];
const functions = [
`
create or replace function generate_ulid() returns uuid
as $$
select (lpad(to_hex(floor(extract(epoch from clock_timestamp()) * 1000)::bigint), 12, '0') || encode(gen_random_bytes(10), 'hex'))::uuid;
$$ language sql
`,
];
2022-10-01 14:03:15 -05:00
const tables: Record<string, TableSpec> = {
2022-09-30 15:14:57 -05:00
"user": {
columns: [
id,
"username text not null unique",
2022-10-07 17:09:13 -05:00
"password_digest text not null",
2022-10-05 17:02:21 -05:00
"display_name text",
2022-10-01 14:03:15 -05:00
...timestamps,
],
2022-10-07 17:09:13 -05:00
additionalTableStatements: [
2022-10-11 17:12:32 -05:00
"constraint valid_username check (username ~* '^[a-z\\d\\-_]{2,38}$')",
2022-10-07 17:09:13 -05:00
],
2022-10-01 14:03:15 -05:00
},
2022-10-21 03:06:37 -05:00
"token": {
2022-10-05 17:02:21 -05:00
columns: [
2022-10-08 02:01:48 -05:00
"digest bytea not null unique",
"user_id uuid not null",
"data jsonb",
2022-10-07 17:09:13 -05:00
createdAtTimestamp,
],
additionalStatements: [
2022-10-21 03:06:37 -05:00
"create index team_data_type on token using hash ((data->'type'))",
2022-10-08 02:01:48 -05:00
],
additionalTableStatements: [
'constraint fk_user foreign key(user_id) references "user"(id) on delete cascade',
2022-10-05 17:02:21 -05:00
],
},
2022-10-01 14:03:15 -05:00
"team": {
columns: [
id,
2022-10-05 17:02:21 -05:00
"display_name text not null",
2022-10-01 14:03:15 -05:00
...timestamps,
],
additionalStatements: [
2022-10-05 17:02:21 -05:00
'create index display_name_idx on team ("display_name")',
2022-10-01 14:03:15 -05:00
],
},
"team_user": {
prepStatements: [
"drop type if exists team_user_status",
2022-11-10 16:39:48 -06:00
"create type team_user_status as enum ('invited', 'accepted', 'manager', 'owner', 'removed', 'left')",
2022-10-01 14:03:15 -05:00
],
columns: [
"team_id uuid",
"user_id uuid",
2022-10-05 17:02:21 -05:00
"status team_user_status not null",
2022-09-30 15:14:57 -05:00
...timestamps,
],
2022-10-05 17:02:21 -05:00
additionalTableStatements: [
'constraint fk_team foreign key(team_id) references "team"(id) on delete cascade',
'constraint fk_user foreign key(user_id) references "user"(id) on delete cascade',
],
2022-10-01 14:03:15 -05:00
additionalStatements: [
"create index team_user_idx on team_user (team_id) include (user_id)",
"create index team_idx on team_user (team_id)",
"create index user_idx on team_user (user_id)",
"create index status_idx on team_user (status)",
],
2022-09-30 15:14:57 -05:00
},
2022-10-08 02:01:48 -05:00
"note": {
columns: [
id,
"user_id uuid default null",
"content text not null",
...timestamps,
],
additionalTableStatements: [
'constraint fk_user foreign key(user_id) references "user"(id) on delete cascade',
],
},
2022-10-21 03:06:37 -05:00
"playlist": {
columns: [
id,
"display_name text not null",
"team_id uuid not null",
...timestamps,
],
additionalTableStatements: [
'constraint fk_team foreign key(team_id) references "team"(id) on delete cascade',
],
},
"display": {
columns: [
id,
"display_name text default null",
"team_id uuid not null",
"is_frozen boolean default false",
"is_blanked boolean default false",
"playlist_id uuid not null",
"current_song_index integer default 0",
"current_verse_index integer default 0",
...timestamps,
],
additionalTableStatements: [
// TODO: index timestamps?
'constraint fk_playlist foreign key(playlist_id) references "playlist"(id) on delete cascade',
],
},
"song": {
columns: [
id,
"team_id uuid not null",
...timestamps,
],
additionalTableStatements: [
// TODO: index timestamps?
'constraint fk_team foreign key(team_id) references "team"(id) on delete cascade',
],
},
"verse": {
columns: [
id,
"display_name text default null",
"content text not null default ''",
"song_id uuid not null",
...timestamps,
],
additionalTableStatements: [
'constraint fk_song foreign key(song_id) references "song"(id) on delete cascade',
],
},
"map": {
columns: [
id,
"display_name text not null",
"song_id uuid not null",
...timestamps,
],
additionalTableStatements: [
'constraint fk_song foreign key(song_id) references "song"(id) on delete cascade',
],
},
"map_verse": {
columns: [
"map_id uuid",
"verse_id uuid",
'"index" integer not null',
...timestamps,
],
additionalTableStatements: [
// TODO: is there a way to enforce that both of these must have the same song_id?
'constraint fk_map foreign key(map_id) references "map"(id) on delete cascade',
'constraint fk_song foreign key(verse_id) references "verse"(id) on delete cascade',
],
additionalStatements: [
'create index map_verse_idx on "map_verse" (map_id) include (verse_id)',
'create index map_idx on "map_verse" (map_id)',
'create index verse_idx on "map_verse" (verse_id)',
'create unique index map_index_idx on "map_verse" (map_id) include ("index")',
],
},
"playlist_song": {
columns: [
"playlist_id uuid",
"song_id uuid",
"map_id uuid",
'"index" integer not null',
...timestamps,
],
additionalTableStatements: [
// TODO: is there a way to enforce that playlist and song have the same team_id?
// TODO: is there a way to enforce that map.song_id is the same as song.id?
// TODO: if the map is deleted, do we really want to cascade it across playlists?
'constraint fk_playlist foreign key(playlist_id) references "playlist"(id) on delete cascade',
'constraint fk_song foreign key(song_id) references "song"(id) on delete cascade',
'constraint fk_map foreign key(map_id) references "map"(id) on delete cascade',
],
additionalStatements: [
'create index playlist_song_idx on "playlist_song" (playlist_id) include (song_id)',
'create index playlist_idx on "playlist_song" (playlist_id)',
'create index song_idx on "playlist_song" (song_id)',
'create unique index playlist_index_idx on "playlist_song" (playlist_id) include ("index")',
],
},
2022-09-30 15:14:57 -05:00
};
2022-09-27 15:49:41 -05:00
2022-10-07 23:22:35 -05:00
const createExtensions = extensions.map((s) =>
`create extension if not exists "${s.trim()}";`
2022-10-05 17:02:21 -05:00
).join("\n");
2022-10-07 23:22:35 -05:00
const createFunctions = functions.map((s) => s.trim() + ";").join("\n");
2022-10-05 17:02:21 -05:00
2022-10-07 23:22:35 -05:00
const dropTables = Object.entries(tables).reverse().map(([name, _meta]) =>
`drop table if exists "${name.trim()}";`
).join("\n");
const createTables = Object.entries(tables).map(([rawName, meta]) => {
const name = rawName.trim();
return `
2022-10-05 17:02:21 -05:00
-- CREATE TABLE ${name}
2022-10-07 23:22:35 -05:00
${(meta.prepStatements || []).map((s) => `${s.trim()};`).join("\n")}
2022-10-01 14:03:15 -05:00
create table "${name}" (
2022-10-07 23:22:35 -05:00
${
meta.columns.concat(meta.additionalTableStatements || []).map((s) =>
s.trim()
).join(",\n ")
}
2022-10-01 14:03:15 -05:00
);
2022-10-07 23:22:35 -05:00
${(meta.additionalStatements || []).map((s) => `${s.trim()};`).join("\n")}
`;
}).map((s) => s.trim()).join("\n\n");
2022-09-30 15:14:57 -05:00
2022-10-21 03:06:37 -05:00
const cleanupQuery = `
2022-10-05 17:02:21 -05:00
begin;
${dropTables}
2022-10-21 03:06:37 -05:00
commit;
`;
console.log(cleanupQuery);
try {
const setupResult = await queryArray(cleanupQuery);
console.debug(setupResult);
} catch (err) {
console.log("Failed to run migration cleanup query:", { ...err });
throw err;
}
const queryString = `
2022-10-07 23:22:35 -05:00
${createExtensions}
2022-10-07 17:23:43 -05:00
2022-10-07 23:22:35 -05:00
${createFunctions}
2022-10-05 17:02:21 -05:00
${createTables}
2022-10-07 17:09:13 -05:00
commit;
`;
console.log(queryString);
2022-10-07 23:22:35 -05:00
try {
const setupResult = await queryArray(queryString);
console.debug(setupResult);
} catch (err) {
console.log("Failed to run migration setup query:", { ...err });
throw err;
}
try {
2022-10-21 03:06:37 -05:00
const [note, user] = await Promise.all([
createNote({ userId: null, content: "Hello, notes!" }),
createUser({
username: "lytedev",
passwordDigest:
"$2a$10$9fyDAOz6H4a393KHyjbvIe1WFxbhCJhq/CZmlXcEg4d1bE9Ey25WW",
}),
]);
console.debug({ note, user });
2022-10-07 23:22:35 -05:00
} catch (err) {
2022-10-08 00:00:45 -05:00
console.log("Failed to run seed database:", { ...err });
2022-10-07 23:22:35 -05:00
throw err;
}