-
Notifications
You must be signed in to change notification settings - Fork 690
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Better migration
API
#343
Comments
I think we should start binding migrations to crate versions, which should be relative easy after: paritytech/substrate#7208 This means, instead of having one extra storage item per migration, we just use the crate version to check which migrations should be executed. |
However, this would require that we always bump some part of the crate version for any major change, but I think this should be doable. |
So it this would be guideline:
That means pallet will be released with some version: 3.0.4 for instance if 4 migration were written during the developement of the version 3 of the pallet. Is that an OK guideline ? |
In general I would say that you should bump the minor version for stuff that requires migrations. Maybe some really small stuff can only bump the patch version, but that should normally only be used for bug fixes. |
My intuition is also to bump (at least) the minor version for new migrations/storage changes and only use patches for fixes. |
ok, if polkadot still follows master that means we have to bump minor version on every PR which does migration/storage changes, even when the minor version is not published. I'm ok with this. |
related paritytech/substrate#7208 |
I think this PR can be closed due to paritytech/substrate#7208 The strategy now should be:
fn on_runtime_upgrade() {
const LATEST_SUPPORTED = StorageVersion::new(x, y, z);
let storage_version = match Self::storage_version() {
Some(v) if v >= LATEST_SUPPORTED => v,
_ => // Log some error and return
};
if storage_version < PalletVersion::new(a, b, c) {
// Do some migration.
}
...
if storage_version < PalletVersion::new($new_crate_version) {
// New migration to write
}
} (the code should be adapted if we support migrating from no storage version, but this should be temporary as now pallet automatically write their version in storage). |
I wonder whether we want to offer even more convenient APIs based on the versions introduced by paritytech/substrate#7208? // migration is only executed if the pallet storage version is 2.0.0
#[migration(pallet=System, from=(2,0,0))]
fn migrate_to_u32_refcount() -> frame_support::weights::Weight {
Account::<T>::translate::<(T::Index, u8, T::AccountData), _>(|_key, (nonce, rc, data)|
Some(AccountInfo { nonce, refcount: rc as RefCount, data })
);
T::MaximumBlockWeight::get()
} |
I'm ok to introduce new syntax but what you propose doesn't seems to work: but how could the second migration be written: from 3.0.0 or from 2.0.0, and should the first migration write to storage the version 2.0.0 so that the second migration can be triggered. Maybe we can write something like: |
related to #353 |
…tech#343) * fixz * Add subscribe script * Add MMR proof+leaves * add offchain relay workers * decode mmr proofs * update readme * fix config * update README (paritytech#297) * improve get authorities * get more data in script * Add commitment log * tests use incentivized channel id * relayer log more * test query epoch * generate lightclientbridge contract bindings * implement parachain chain for testing * add keypair getter to eth connection * add parachain to relay * update go.mod, go.sum * drop relayer from start-services script (testing) * add lightclientbridge to truffle migration * send initial verification tx to eth contract * BeefyCommitmentInfo type, msg builder methods * add BeefyBlockDelay to config * implement WriteCompleteSignatureCommitment * integrate beefy listener, poll eth blocks + events * add beefy chan, update chain interface for compile * generate validatorregistry contract * generate mmr proof offchain * sync header before polling eth blocks * listener compile * update config * generate mmr proof onchain + verify val registry * implement WriteCompleteSignatureCommitment * add block hash helper function * writer test * update go.mod/go.sum * deploy val registry contract with params * rename parachain to relaychain * integrate latest contracts * rename contract to PolkadotRelayChainBridge * query onchain beefy authorities * in-memory database * refactor substrate listener * refactor ethereum listener/writer * update chain interface * refactor relay.go * bump go.mod, go.sum * remove checks in polkadotrelaychainbridge contract * delete relaychain package * delete relaychain package * fix pending nonce conflict * update tests * implement random seed for completion tx * remove duplicated fields on Beefy/BeefyItem * handle edge case: use intended completion block * fix conditional statment * parachain, relaychain abstractions * remove validatorregistry contract for now * initial ethereum revisons * remove relayconn from chain interface * update mmr -> merkle * update configuration * update parachain tests * fix relaychain init error * update parachain test endpoints * close relaychain lister, database * use database.stop * fetch BLOCK_WAIT_PERIOD directly from contract * remove block number from tx sent log * update beefy naming conventions * normal channels * only process events from our node * move authorities to types file * remove extra param * update contracts to latest * comment out bridge verification checks * clean up * wait until block is finalized to send complete tx * refactor eth writer cron job * update writer test * start relayer with start-service script * ignore relaychain init channels * combine msgs/BEEFY msgs write loops * clean up * minor fixes * update polkadot version * Fix event forwarding Co-authored-by: Denali Marsh <[email protected]> Co-authored-by: Vincent Geddes <[email protected]>
* Switch to one-to-one block mapping in db * Remove old comment
Right now for migration code that exists within pallets we have the
on_runtime_upgrade
function. While convenient, this is a little problematic since code inside it need not contain any guard that would prevent it from being run repeatedly on later upgrades if not removed by then. Instead, the per-pallet migration API should ensure that any migration logic is contained only under a storage guard. This means ensconcing the current pattern exemplified with the latest democracy pallet into an API in thedecl_module
macro):would become:
This might be a bit tricky at present since it would need to combine elements from both
decl_module
anddecl_storage
. It could also be that the migrations are declared in thedecl_storage
macro, if it's easier to wire them into theon_runtime_upgrade
than it is the other way around.The text was updated successfully, but these errors were encountered: