-
Notifications
You must be signed in to change notification settings - Fork 928
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
dev->main #1209
dev->main #1209
Conversation
…ering fix: Decompress chunks before altering tables
PR Reviewer Guide 🔍Here are some key observations to aid the review process:
|
WalkthroughThe PR updates SQL migration scripts to streamline the database schema. It focuses on the Changes
Entelligence.ai can learn from your feedback. Simply add 👍 / 👎 emojis to teach it your preferences. More shortcuts belowEmoji Descriptions:
Interact with the Bot:
|
LGTM 👍 |
PR Code Suggestions ✨Explore these optional code suggestions:
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
❌ Changes requested. Reviewed everything up to ed036c2 in 2 minutes and 8 seconds
More details
- Looked at
186
lines of code in2
files - Skipped
0
files when reviewing. - Skipped posting
6
drafted comments based on config settings.
1. memory-store/migrations/000027_add_postgraphile.up.sql:84
- Draft comment:
Parameter naming clash in authenticate: using 'authenticate.email' is ambiguous. Consider renaming the parameter (e.g. to p_email) to avoid confusion. - Reason this comment was not posted:
Comment was not on a location in the diff, so it can't be submitted as a review comment.
2. memory-store/migrations/000027_add_postgraphile.down.sql:12
- Draft comment:
Ensure the removal of 'ALTER TABLE transitions/entries DISABLE ROW LEVEL SECURITY' is intentional and that security settings for these tables are handled elsewhere. - Reason this comment was not posted:
Comment was not on a location in the diff, so it can't be submitted as a review comment.
3. memory-store/migrations/000027_add_postgraphile.up.sql:84
- Draft comment:
Change 'a.email = authenticate.email' to 'a.email = email' to correctly reference the function parameter. - Reason this comment was not posted:
Comment was not on a location in the diff, so it can't be submitted as a review comment.
4. memory-store/migrations/000027_add_postgraphile.up.sql:240
- Draft comment:
Review the policy condition 'execution_id = current_developer_id_by_execution_id(execution_id)'; it compares an execution ID with a developer ID, which may be incorrect. - Reason this comment was not posted:
Comment was not on a location in the diff, so it can't be submitted as a review comment.
5. memory-store/migrations/000027_add_postgraphile.up.sql:246
- Draft comment:
Review the policy condition 'session_id = current_developer_id_by_session_id(session_id)'; it appears to compare a session ID to a developer ID, which may be a logical error. - Reason this comment was not posted:
Comment was on unchanged code.
6. memory-store/migrations/000027_add_postgraphile.up.sql:84
- Draft comment:
Typographical error detected: In the authenticate function, on the SELECT statement (line 84), the parameter 'email' is incorrectly referenced as 'authenticate.email'. Please change it to 'email' to correctly reference the function parameter. - Reason this comment was not posted:
Comment was not on a location in the diff, so it can't be submitted as a review comment.
Workflow ID: wflow_YdEDpsG0zuGXgddk
Want Ellipsis to fix these issues? Tag @ellipsis-dev
in a comment. You can customize Ellipsis with 👍 / 👎 feedback, review rules, user-specific overrides, quiet
mode, and more.
@@ -1,3 +1,6 @@ | |||
BEGIN; | |||
COMMENT ON TABLE public.entries IS ''; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Inconsistent table comments: down migration sets empty comments while up migration uses @omit
. Ensure consistency to avoid confusion.
COMMENT ON TABLE public.entries IS ''; | |
COMMENT ON TABLE public.entries IS '@omit'; |
PR Type
Bug fix, Enhancement
Description
Removed GraphQL exposure for
entries
andtransitions
tables.Added comments to
entries
andtransitions
tables for omission.Removed unnecessary policies and functions related to
entries
andtransitions
.Simplified and cleaned up SQL migration scripts.
Changes walkthrough 📝
000027_add_postgraphile.down.sql
Cleaned up `entries` and `transitions` in down migration
memory-store/migrations/000027_add_postgraphile.down.sql
entries
andtransitions
tables.entries
andtransitions
.entries
andtransitions
.BEGIN
andCOMMIT
.000027_add_postgraphile.up.sql
Cleaned up `entries` and `transitions` in up migration
memory-store/migrations/000027_add_postgraphile.up.sql
entries
andtransitions
.entries
andtransitions
tables for omission.entries
andtransitions
.BEGIN
andCOMMIT
.Important
Updates SQL migrations to manage roles, policies, and permissions for
postgraphile
, focusing onentries
andtransitions
tables.000027_add_postgraphile.up.sql
, adds comments topublic.entries
andpublic.transitions
to omit them and revokes all permissions frompostgraphile
.000027_add_postgraphile.down.sql
, removes comments frompublic.entries
andpublic.transitions
and revokes all permissions frompostgraphile
.current_developer_id_by_transition_id()
and associated policies inup.sql
.current_developer_id_by_execution_id()
andcurrent_developer_id_by_session_id()
functions inup.sql
.entries
andtransitions
inup.sql
.postgraphile
andno_access_role
if not existing inup.sql
.postgraphile
andno_access_role
indown.sql
.pgcrypto
extension in bothup.sql
anddown.sql
.This description was created by
for ed036c2. It will automatically update as commits are pushed.
EntelligenceAI PR Summary
The recent PR focuses on optimizing the database schema by updating SQL migration scripts. Key changes include revoking unnecessary permissions, removing row-level security and compression settings, and adding comments to the
entries
andtransitions
tables to streamline operations and improve security management.