|
| 1 | +"""Add safety data user system |
| 2 | +
|
| 3 | +Revision ID: a1b2c3d4e5f6 |
| 4 | +Revises: 41af3263a5a3 |
| 5 | +Create Date: 2025-11-24 12:00:00.000000 |
| 6 | +
|
| 7 | +""" |
| 8 | +import datetime |
| 9 | +from sqlalchemy import orm, text |
| 10 | +from sqlalchemy.engine.reflection import Inspector |
| 11 | +from alembic import op |
| 12 | +import sqlalchemy as sa |
| 13 | +from sqlalchemy import text |
| 14 | + |
| 15 | +# revision identifiers, used by Alembic. |
| 16 | +revision = 'a1b2c3d4e5f6' |
| 17 | +down_revision = '41af3263a5a3' |
| 18 | +branch_labels = None |
| 19 | +depends_on = None |
| 20 | +existing_tables = ['users', 'roles', 'organization', 'users_to_roles', 'users_to_organizations'] |
| 21 | +ANYWAY_APP_ID_STR = '0' |
| 22 | +SAFETY_DATA_APP_ID = 1 |
| 23 | + |
| 24 | +def upgrade(): |
| 25 | + # Drop non-PK constraints and non-primary indexes on users (PostgreSQL) |
| 26 | + for table in existing_tables: |
| 27 | + op.execute(f""" |
| 28 | + DO $$ |
| 29 | + DECLARE r RECORD; |
| 30 | + BEGIN |
| 31 | + -- Drop constraints except primary keys |
| 32 | + FOR r IN |
| 33 | + SELECT c.conname, n.nspname, t.relname |
| 34 | + FROM pg_constraint c |
| 35 | + JOIN pg_class t ON c.conrelid = t.oid |
| 36 | + JOIN pg_namespace n ON t.relnamespace = n.oid |
| 37 | + WHERE t.relname = '{table}' AND n.nspname = 'public' AND c.contype <> 'p' |
| 38 | + LOOP |
| 39 | + EXECUTE format('ALTER TABLE %I.%I DROP CONSTRAINT IF EXISTS %I CASCADE', r.nspname, r.relname, r.conname); |
| 40 | + END LOOP; |
| 41 | +
|
| 42 | + -- Drop indexes that are not primary indexes |
| 43 | + FOR r IN |
| 44 | + SELECT n.nspname, i.relname as indexname |
| 45 | + FROM pg_index idx |
| 46 | + JOIN pg_class i ON i.oid = idx.indexrelid |
| 47 | + JOIN pg_class t ON t.oid = idx.indrelid |
| 48 | + JOIN pg_namespace n ON i.relnamespace = n.oid |
| 49 | + WHERE t.relname = '{table}' AND n.nspname = 'public' AND NOT idx.indisprimary |
| 50 | + LOOP |
| 51 | + EXECUTE format('DROP INDEX IF EXISTS %I.%I', r.nspname, r.indexname); |
| 52 | + END LOOP; |
| 53 | + END$$; |
| 54 | + """) |
| 55 | + # Add app column to users table (0 = ANYWAY, 1 = SAFETY_DATA) |
| 56 | + op.add_column('users', sa.Column('app', sa.Integer(), nullable=False, server_default=ANYWAY_APP_ID_STR)) |
| 57 | + op.alter_column('users', 'app', server_default=None) |
| 58 | + op.create_index(op.f('ix_users_email_app'), 'users', ['email', 'app'], unique=True) |
| 59 | + |
| 60 | + # Add app column to roles table (0 = ANYWAY, 1 = SAFETY_DATA) |
| 61 | + op.add_column('roles', sa.Column('app', sa.Integer(), nullable=False, server_default=ANYWAY_APP_ID_STR)) |
| 62 | + op.alter_column('roles', 'app', server_default=None) |
| 63 | + op.create_index(op.f('ix_roles_name_app'), 'roles', ['name', 'app'], unique=True) |
| 64 | + |
| 65 | + # Add app column to organization table (0 = ANYWAY, 1 = SAFETY_DATA) |
| 66 | + op.add_column('organization', sa.Column('app', sa.Integer(), nullable=False, server_default=ANYWAY_APP_ID_STR)) |
| 67 | + op.alter_column('organization', 'app', server_default=None) |
| 68 | + op.create_index(op.f('ix_organization_name_app'), 'organization', ['name', 'app'], unique=True) |
| 69 | + |
| 70 | + # Add app column to users_to_roles table |
| 71 | + op.add_column('users_to_roles', sa.Column('app', sa.Integer(), nullable=False, server_default=ANYWAY_APP_ID_STR)) |
| 72 | + op.alter_column('users_to_roles', 'app', server_default=None) |
| 73 | + # op.drop_constraint('users_to_roles_pkey', 'users_to_roles', type_='primary') |
| 74 | + op.create_index('ix_users_to_roles_user_role_app', 'users_to_roles', ['user_id', 'role_id', 'app'], |
| 75 | + unique=True) |
| 76 | + |
| 77 | + # Add app column to users_to_organizations table |
| 78 | + op.add_column('users_to_organizations', sa.Column('app', sa.Integer(), nullable=False, |
| 79 | + server_default=ANYWAY_APP_ID_STR)) |
| 80 | + op.alter_column('users_to_organizations', 'app', server_default=None) |
| 81 | + op.create_index('ix_users_to_organizations_user_org_app', 'users_to_organizations', |
| 82 | + ['user_id', 'organization_id', 'app'], unique=True) |
| 83 | + |
| 84 | + # Create grants table |
| 85 | + op.create_table('grants', |
| 86 | + sa.Column('id', sa.Integer(), primary_key=True, autoincrement=True, nullable=False), |
| 87 | + sa.Column('name', sa.String(length=100), nullable=False), |
| 88 | + sa.Column('app', sa.Integer(), nullable=False), |
| 89 | + sa.Column('description', sa.String(length=255), nullable=True), |
| 90 | + sa.Column('create_date', sa.DateTime(), server_default=text('now()'), nullable=False), |
| 91 | + ) |
| 92 | + op.create_index(op.f('ix_grants_name_app'), 'grants', ['name', 'app'], unique=True) |
| 93 | + |
| 94 | + # Create users_to_grants table |
| 95 | + op.create_table('users_to_grants', |
| 96 | + sa.Column('user_id', sa.BigInteger(), nullable=False), |
| 97 | + sa.Column('grant_id', sa.Integer(), nullable=False), |
| 98 | + sa.Column('app', sa.Integer(), nullable=False), |
| 99 | + sa.Column('create_date', sa.DateTime(), server_default=text('now()'), nullable=False), |
| 100 | + sa.ForeignKeyConstraint(['grant_id'], ['grants.id'], ), |
| 101 | + sa.ForeignKeyConstraint(['user_id'], ['users.id'], ), |
| 102 | + ) |
| 103 | + op.create_index(op.f('ix_users_to_grants_user_id'), 'users_to_grants', ['user_id'], unique=False) |
| 104 | + op.create_index('ix_users_to_grants_user_grant_app', 'users_to_grants', ['user_id', 'grant_id', 'app'], unique=True) |
| 105 | + |
| 106 | + # Insert default roles for safety_data (app = 1) |
| 107 | + op.execute(f"""INSERT INTO roles (name, description, app, create_date) |
| 108 | + VALUES ('anonymous', 'Anonymous user', {SAFETY_DATA_APP_ID}, now())""") |
| 109 | + op.execute(f"""INSERT INTO roles (name, description, app, create_date) |
| 110 | + VALUES ('authenticated', 'Basic authenticated user', {SAFETY_DATA_APP_ID}, now())""") |
| 111 | + op.execute(f"""INSERT INTO roles (name, description, app, create_date) |
| 112 | + VALUES ('admins', 'Safety-Data administrator', {SAFETY_DATA_APP_ID}, now())""") |
| 113 | + |
| 114 | + add_builtin_safety_data_admin() |
| 115 | + |
| 116 | + |
| 117 | +def downgrade(): |
| 118 | + # Remove default roles (app = 1 for safety_data) |
| 119 | + for table in existing_tables: |
| 120 | + op.execute(f"DELETE FROM {table} WHERE app = 1") |
| 121 | + |
| 122 | + # Revert users_to_grants table |
| 123 | + op.drop_table('users_to_grants') |
| 124 | + op.drop_table('grants') |
| 125 | + |
| 126 | + # users_to_organizations |
| 127 | + op.drop_index('ix_users_to_organizations_user_org_app', table_name='users_to_organizations') |
| 128 | + op.create_index('ix_users_to_organizations_user_org', 'users_to_organizations', ['user_id', 'organization_id'], unique=True) |
| 129 | + op.drop_column('users_to_organizations', 'app') |
| 130 | + |
| 131 | + # Revert users_to_roles table |
| 132 | + op.drop_index('ix_users_to_roles_user_role_app', table_name='users_to_roles') |
| 133 | + op.create_index('ix_users_to_roles_user_role', 'users_to_roles', ['user_id', 'role_id'], unique=True) |
| 134 | + op.drop_column('users_to_roles', 'app') |
| 135 | + |
| 136 | + # Revert organization table |
| 137 | + op.drop_index(op.f('ix_organization_name_app'), table_name='organization') |
| 138 | + op.create_index('ix_organization_name', 'organization', ['name'], unique=True) |
| 139 | + # op.create_unique_constraint('organization_name_key', 'organization', ['name']) # Implicitly created by unique index? |
| 140 | + op.drop_column('organization', 'app') |
| 141 | + |
| 142 | + # Revert roles table |
| 143 | + op.drop_index(op.f('ix_roles_name_app'), table_name='roles') |
| 144 | + op.create_index('ix_roles_name', 'roles', ['name'], unique=True) |
| 145 | + # op.create_unique_constraint('roles_name_key', 'roles', ['name']) |
| 146 | + op.drop_column('roles', 'app') |
| 147 | + |
| 148 | + # Revert users table |
| 149 | + op.drop_index(op.f('ix_users_email_app'), table_name='users') |
| 150 | + op.drop_column('users', 'app') |
| 151 | + |
| 152 | +def add_builtin_safety_data_admin(): |
| 153 | + from anyway.models import Roles, Users, users_to_roles |
| 154 | + |
| 155 | + ADMIN_EMAIL = "anyway@anyway.co.il" |
| 156 | + bind = op.get_bind() |
| 157 | + session = orm.Session(bind=bind) |
| 158 | + |
| 159 | + res = session.query(Users).with_entities(Users.email) \ |
| 160 | + .filter(Users.email == ADMIN_EMAIL, Users.app == SAFETY_DATA_APP_ID).first() |
| 161 | + if res is None: |
| 162 | + user = Users( |
| 163 | + user_register_date=datetime.datetime.now(), |
| 164 | + user_last_login_date=datetime.datetime.now(), |
| 165 | + email=ADMIN_EMAIL, |
| 166 | + oauth_provider_user_name=ADMIN_EMAIL, |
| 167 | + is_active=True, |
| 168 | + oauth_provider="google", |
| 169 | + is_user_completed_registration=True, |
| 170 | + oauth_provider_user_id="unknown-manual-insert", |
| 171 | + app=SAFETY_DATA_APP_ID, |
| 172 | + ) |
| 173 | + session.add(user) |
| 174 | + |
| 175 | + user_id = ( |
| 176 | + session.query(Users).with_entities(Users.id).filter( |
| 177 | + Users.email == ADMIN_EMAIL, Users.app == SAFETY_DATA_APP_ID |
| 178 | + ).first() |
| 179 | + ) |
| 180 | + |
| 181 | + role_id = session.query(Roles).with_entities(Roles.id).filter( |
| 182 | + Roles.name == "admins", Roles.app == SAFETY_DATA_APP_ID |
| 183 | + ).first() |
| 184 | + |
| 185 | + insert_users_to_roles = users_to_roles.insert().values( |
| 186 | + user_id=user_id.id, |
| 187 | + role_id=role_id.id, |
| 188 | + app=SAFETY_DATA_APP_ID, |
| 189 | + create_date=datetime.datetime.now(), |
| 190 | + ) |
| 191 | + session.execute(insert_users_to_roles) |
| 192 | + |
| 193 | + session.commit() |
0 commit comments