fix migrations

This commit is contained in:
Saumya 2025-07-23 15:07:17 +05:30
parent 030ffe23a3
commit 58ab4ace21
4 changed files with 43 additions and 102 deletions

View File

@ -99,13 +99,22 @@ CREATE INDEX IF NOT EXISTS idx_workflow_executions_started_at ON workflow_execut
CREATE INDEX IF NOT EXISTS idx_workflow_step_executions_execution_id ON workflow_step_executions(execution_id);
CREATE INDEX IF NOT EXISTS idx_workflow_step_executions_step_id ON workflow_step_executions(step_id);
-- Row Level Security (RLS) Policies
ALTER TABLE agent_workflows ENABLE ROW LEVEL SECURITY;
ALTER TABLE workflow_steps ENABLE ROW LEVEL SECURITY;
ALTER TABLE workflow_executions ENABLE ROW LEVEL SECURITY;
ALTER TABLE workflow_step_executions ENABLE ROW LEVEL SECURITY;
-- Agent workflows policies
DROP POLICY IF EXISTS "Users can view workflows for their agents" ON agent_workflows;
DROP POLICY IF EXISTS "Users can create workflows for their agents" ON agent_workflows;
DROP POLICY IF EXISTS "Users can update workflows for their agents" ON agent_workflows;
DROP POLICY IF EXISTS "Users can delete workflows for their agents" ON agent_workflows;
DROP POLICY IF EXISTS "Users can manage steps for their workflows" ON workflow_steps;
DROP POLICY IF EXISTS "Users can view steps for their workflows" ON workflow_steps;
DROP POLICY IF EXISTS "Users can view executions for their workflows" ON workflow_executions;
DROP POLICY IF EXISTS "Service role can manage executions" ON workflow_executions;
DROP POLICY IF EXISTS "Users can view step executions for their workflows" ON workflow_step_executions;
DROP POLICY IF EXISTS "Service role can manage step executions" ON workflow_step_executions;
CREATE POLICY "Users can view workflows for their agents" ON agent_workflows
FOR SELECT USING (
agent_id IN (
@ -203,7 +212,10 @@ BEGIN
END;
$$ LANGUAGE plpgsql;
-- Create triggers for updated_at
-- Create triggers for updated_at (drop existing first to avoid conflicts)
DROP TRIGGER IF EXISTS update_agent_workflows_updated_at ON agent_workflows;
DROP TRIGGER IF EXISTS update_workflow_steps_updated_at ON workflow_steps;
CREATE TRIGGER update_agent_workflows_updated_at
BEFORE UPDATE ON agent_workflows
FOR EACH ROW EXECUTE FUNCTION update_updated_at_column();

View File

@ -1,11 +1,6 @@
-- Fix Agent Workflows Migration Issues
-- This migration fixes foreign key references and RLS policies
-- Drop existing foreign key constraints that reference the wrong column
ALTER TABLE agent_workflows DROP CONSTRAINT IF EXISTS agent_workflows_agent_id_fkey;
ALTER TABLE workflow_executions DROP CONSTRAINT IF EXISTS workflow_executions_agent_id_fkey;
-- Add correct foreign key constraints
ALTER TABLE agent_workflows
ADD CONSTRAINT agent_workflows_agent_id_fkey
FOREIGN KEY (agent_id) REFERENCES agents(agent_id) ON DELETE CASCADE;
@ -14,7 +9,6 @@ ALTER TABLE workflow_executions
ADD CONSTRAINT workflow_executions_agent_id_fkey
FOREIGN KEY (agent_id) REFERENCES agents(agent_id) ON DELETE CASCADE;
-- Drop existing RLS policies
DROP POLICY IF EXISTS "Users can view workflows for their agents" ON agent_workflows;
DROP POLICY IF EXISTS "Users can create workflows for their agents" ON agent_workflows;
DROP POLICY IF EXISTS "Users can update workflows for their agents" ON agent_workflows;
@ -24,87 +18,6 @@ DROP POLICY IF EXISTS "Users can manage steps for their workflows" ON workflow_s
DROP POLICY IF EXISTS "Users can view executions for their workflows" ON workflow_executions;
DROP POLICY IF EXISTS "Users can view step executions for their workflows" ON workflow_step_executions;
-- Create correct RLS policies
CREATE POLICY "Users can view workflows for their agents" ON agent_workflows
FOR SELECT USING (
agent_id IN (
SELECT agent_id FROM agents
WHERE basejump.has_role_on_account(account_id)
)
);
CREATE POLICY "Users can create workflows for their agents" ON agent_workflows
FOR INSERT WITH CHECK (
agent_id IN (
SELECT agent_id FROM agents
WHERE basejump.has_role_on_account(account_id)
)
);
CREATE POLICY "Users can update workflows for their agents" ON agent_workflows
FOR UPDATE USING (
agent_id IN (
SELECT agent_id FROM agents
WHERE basejump.has_role_on_account(account_id)
)
);
CREATE POLICY "Users can delete workflows for their agents" ON agent_workflows
FOR DELETE USING (
agent_id IN (
SELECT agent_id FROM agents
WHERE basejump.has_role_on_account(account_id)
)
);
CREATE POLICY "Users can view steps for their workflows" ON workflow_steps
FOR SELECT USING (
workflow_id IN (
SELECT id FROM agent_workflows
WHERE agent_id IN (
SELECT agent_id FROM agents
WHERE basejump.has_role_on_account(account_id)
)
)
);
CREATE POLICY "Users can manage steps for their workflows" ON workflow_steps
FOR ALL USING (
workflow_id IN (
SELECT id FROM agent_workflows
WHERE agent_id IN (
SELECT agent_id FROM agents
WHERE basejump.has_role_on_account(account_id)
)
)
);
CREATE POLICY "Users can view executions for their workflows" ON workflow_executions
FOR SELECT USING (
workflow_id IN (
SELECT id FROM agent_workflows
WHERE agent_id IN (
SELECT agent_id FROM agents
WHERE basejump.has_role_on_account(account_id)
)
)
);
CREATE POLICY "Users can view step executions for their workflows" ON workflow_step_executions
FOR SELECT USING (
execution_id IN (
SELECT id FROM workflow_executions
WHERE workflow_id IN (
SELECT id FROM agent_workflows
WHERE agent_id IN (
SELECT agent_id FROM agents
WHERE basejump.has_role_on_account(account_id)
)
)
)
);
-- Create missing function if it doesn't exist
CREATE OR REPLACE FUNCTION update_updated_at_column()
RETURNS TRIGGER AS $$
BEGIN
@ -112,14 +25,3 @@ BEGIN
RETURN NEW;
END;
$$ LANGUAGE plpgsql;
-- Add missing triggers if they don't exist
DROP TRIGGER IF EXISTS update_agent_workflows_updated_at ON agent_workflows;
CREATE TRIGGER update_agent_workflows_updated_at
BEFORE UPDATE ON agent_workflows
FOR EACH ROW EXECUTE FUNCTION update_updated_at_column();
DROP TRIGGER IF EXISTS update_workflow_steps_updated_at ON workflow_steps;
CREATE TRIGGER update_workflow_steps_updated_at
BEFORE UPDATE ON workflow_steps
FOR EACH ROW EXECUTE FUNCTION update_updated_at_column();

View File

@ -1 +1,6 @@
ALTER TYPE workflow_step_type ADD VALUE 'instruction';
DO $$
BEGIN
IF NOT EXISTS (SELECT 1 FROM pg_enum WHERE enumlabel = 'instruction' AND enumtypid = 'workflow_step_type'::regtype) THEN
ALTER TYPE workflow_step_type ADD VALUE 'instruction';
END IF;
END $$;

View File

@ -0,0 +1,22 @@
DROP POLICY IF EXISTS "Users can view workflows for their agents" ON agent_workflows;
DROP POLICY IF EXISTS "Users can create workflows for their agents" ON agent_workflows;
DROP POLICY IF EXISTS "Users can update workflows for their agents" ON agent_workflows;
DROP POLICY IF EXISTS "Users can delete workflows for their agents" ON agent_workflows;
DROP POLICY IF EXISTS "Service role can manage workflows" ON agent_workflows;
DROP POLICY IF EXISTS "Users can view steps for their workflows" ON workflow_steps;
DROP POLICY IF EXISTS "Users can create steps for their workflows" ON workflow_steps;
DROP POLICY IF EXISTS "Users can update steps for their workflows" ON workflow_steps;
DROP POLICY IF EXISTS "Users can delete steps for their workflows" ON workflow_steps;
DROP POLICY IF EXISTS "Users can manage steps for their workflows" ON workflow_steps;
DROP POLICY IF EXISTS "Service role can manage workflow steps" ON workflow_steps;
DROP POLICY IF EXISTS "Users can view executions for their workflows" ON workflow_executions;
DROP POLICY IF EXISTS "Service role can manage executions" ON workflow_executions;
DROP POLICY IF EXISTS "Service role can manage workflow executions" ON workflow_executions;
DROP POLICY IF EXISTS "Users can view step executions for their workflows" ON workflow_step_executions;
DROP POLICY IF EXISTS "Service role can manage step executions" ON workflow_step_executions;
DROP TRIGGER IF EXISTS update_agent_workflows_updated_at ON agent_workflows;
DROP TRIGGER IF EXISTS update_workflow_steps_updated_at ON workflow_steps;