Skip to content

feat(migration): add project-level resource migrations#186

Open
premtsd-code wants to merge 16 commits into
add-webhook-migrationfrom
add-policies-migration
Open

feat(migration): add project-level resource migrations#186
premtsd-code wants to merge 16 commits into
add-webhook-migrationfrom
add-policies-migration

Conversation

@premtsd-code
Copy link
Copy Markdown
Contributor

@premtsd-code premtsd-code commented May 20, 2026

Adds support for migrating project-level Appwrite resources end-to-end.

Singleton resource per project carrying the 7 auth-method flags
(email/password, magic URL, email OTP, anonymous, invites, JWT, phone).
Source reads via raw GET /v1/project (no SDK get() method exposed);
destination flips each flag via Project::updateAuthMethod().

Renames destination $project (string) -> $projectId so $project can
hold the Project SDK service, matching the source-side convention.
Singleton settings resource carrying REST/GraphQL/WebSocket flags.
Source reads via raw GET /v1/project; destination flips each via
Project::updateProtocol(). Lives in GROUP_SETTINGS.
Singleton settings resource carrying the project's RBAC label array.
Source reads via raw GET /v1/project; destination overwrites via
Project::updateLabels() (wholesale replace).
Singleton settings resource carrying 17 per-service enable/disable flags
(Account, Avatars, Databases, TablesDB, Locale, Health, Project, Storage,
Teams, Users, VCS, Sites, Functions, Proxy, GraphQL, Migrations, Messaging).
Source reads via raw GET /v1/project; destination flips each via
Project::updateService().
The SDK Client's endpoint already includes /v1; calling $this->call('GET',
'/v1/project') produced http://host/v1/v1/project and 404'd. Existing
'/health/version' caller already follows the prefix-less convention.

Affects all five project-singleton sources (AuthMethods, Policies,
Protocols, Labels, Services).
passwordHistory / sessionsLimit / userLimit treat 0 as "disabled" in the
source's project document, but the server policy validators reject 0 —
they accept a positive int or null. Disabled policies were round-tripping
as 0 and the destination rejected the update with:

  Invalid `total` param: Value must be a valid range between 1 and 5,000
  or null

Coerce 0 -> null at the SDK call site so the disabled state preserves
correctly across the migration.
Replace 9 SDK setter calls (updatePasswordHistoryPolicy, etc.) with a
single dbForPlatform->updateDocument('projects', ...) write. Matches
the convention used by Webhook / Platform / ProjectVariable / ApiKey
destinations — every other project-singleton resource already writes
directly to the project document instead of going through the API.

Drops two server-side workarounds along the way:
- SDK setters return MODEL_PROJECT, which carries cloud's empty
  billingLimits as {} that strict-typed SDKs reject ("Missing required
  field bandwidth"). Direct DB write never deserializes a Project,
  so the bug is irrelevant.
- PasswordHistory / SessionLimit / UserLimit endpoints reject total: 0
  even though 0 is the storage convention for "disabled" (see response
  model description). Direct DB write writes 0 straight to storage,
  bypassing the validator mismatch.

Note: cloud spec fix (appwrite-labs/cloud#4068) and validator fix
(separate appwrite/appwrite PR for Range(0, ...)) are still worth
landing — they help any other SDK consumer hitting the same paths —
but the migration no longer depends on either.
The platform 'projects' collection has document-level permissions
restricted to team-owner roles. The migration worker has no team
context, so the updateDocument call was being silently rejected by
the authorization validator — the migration reported success because
no exception bubbled up, but the destination project's auths attribute
was left unchanged.

Match the upstream Policies/Labels controllers' pattern by wrapping the
write in $dbForPlatform->getAuthorization()->skip(...).
- composer.json: appwrite/appwrite ^23 -> ^24
- composer.lock: appwrite/appwrite 23.1.0 -> 24.1.0
- AuthMethod  -> ProjectAuthMethodId
- ProtocolId  -> ProjectProtocolId
- ServiceId   -> ProjectServiceId

24.1.0 brings the BillingLimits nullable + Project.consoleAccessedAt
fix that was blocking the policies migration, and adds Project::get
and Project::getPolicy methods used by the source-side refactor.
The /v1/project response doesn't expose per-policy fields at the top
level — they live inside the project document's `auths` attribute
which the public Project response model omits.

Switch from a raw `GET /v1/project` call to per-policy SDK methods
(Project::getPolicy(ProjectPolicyId::*)) which return typed policy
models (PolicyPasswordHistory, PolicySessionAlert, etc.). Each of the
9 sub-policies maps to one method call.
@greptile-apps
Copy link
Copy Markdown
Contributor

greptile-apps Bot commented May 20, 2026

Greptile Summary

This PR adds end-to-end migration support for six new project-level Appwrite resources: AuthMethods, Policies, Protocols, Labels, and Services. It bumps the SDK dependency to 24.x to gain the Project service and new enum types, renames the $project string field to $projectId on the destination to avoid a collision with the new Project service instance, and wires all six resource types through Transfer's group constants, the source's estimate/export methods, and the destination's import switches.

  • Six new singleton resource classes are introduced (AuthMethods, Policies, Protocols, Labels, Services), each mapping cleanly from SDK response shapes to the destination's internal DB attribute keys.
  • createAuthMethods and createPolicies share the project's auths attribute via a read-merge-write pattern; their key sets are disjoint so sequential writes compose correctly without data loss.
  • createProtocols and createServices use the same read-merge-write approach against apis and services attributes respectively, preserving unknown keys on the destination.

Confidence Score: 5/5

Safe to merge; new resource types are additive and isolated, the read-merge-write patterns for shared DB attributes are correct, and all group-constant/switch wiring is symmetric between source and destination.

No correctness defects were found in the new code paths. The read-merge-write patterns for shared auths, apis, and services attributes are safe because each pair of methods operates on disjoint key sets and execution is sequential. The SDK bump is constrained to 24.x in composer.json.

No files require special attention.

Important Files Changed

Filename Overview
src/Migration/Sources/Appwrite.php Adds export logic for AUTH_METHODS, POLICIES (via getPolicy SDK calls) and PROTOCOLS, LABELS, SERVICES (via project.get()); each of the three new settings exports calls project.get() independently, causing redundant API calls.
src/Migration/Destinations/Appwrite.php Adds createAuthMethods, createPolicies (sharing the auths map via read-merge-write with disjoint key sets), and createProtocols, createLabels, createServices (direct DB writes using SDK enum keys); renames $project field to $projectId to avoid collision with new Project service instance.
src/Migration/Resources/Auth/AuthMethods.php New singleton resource class for project auth-method flags; clean implementation with fromArray defaults all methods to true.
src/Migration/Resources/Auth/Policies.php New singleton resource class for project security policies (password rules, session settings, membership privacy); all 13 fields covered with correct types.
src/Migration/Resources/Settings/Services.php New singleton resource class carrying the 17 per-service enable/disable flags; all services enumerated correctly.
src/Migration/Transfer.php New resource types correctly distributed across GROUP_AUTH_RESOURCES, GROUP_SETTINGS_RESOURCES, and ALL_PUBLIC_RESOURCES constants.

Reviews (5): Last reviewed commit: "chore: fix import ordering (Pint)" | Re-trigger Greptile

Comment on lines +1650 to +1708
code: $e->getCode(),
previous: $e
));
}
}

if (\in_array(Resource::TYPE_WEBHOOK, $resources)) {
try {
$this->exportWebhooks($batchSize);
} catch (\Throwable $e) {
$this->addError(new Exception(
Resource::TYPE_WEBHOOK,
Transfer::GROUP_SETTINGS,
message: $e->getMessage(),
code: $e->getCode(),
previous: $e
));
}
}

try {
if (\in_array(Resource::TYPE_PROTOCOLS, $resources)) {
$this->exportProtocols();
}
} catch (\Throwable $e) {
$this->addError(new Exception(
Resource::TYPE_PROTOCOLS,
Transfer::GROUP_SETTINGS,
message: $e->getMessage(),
code: $e->getCode(),
previous: $e
));
}

try {
if (\in_array(Resource::TYPE_LABELS, $resources)) {
$this->exportLabels();
}
} catch (\Throwable $e) {
$this->addError(new Exception(
Resource::TYPE_LABELS,
Transfer::GROUP_SETTINGS,
message: $e->getMessage(),
code: $e->getCode(),
previous: $e
));
}

try {
if (\in_array(Resource::TYPE_SERVICES, $resources)) {
$this->exportServices();
}
} catch (\Throwable $e) {
$this->addError(new Exception(
Resource::TYPE_SERVICES,
Transfer::GROUP_SETTINGS,
message: $e->getMessage(),
code: $e->getCode(),
previous: $e
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P2 Inconsistent error-code handling in exportGroupSettings

All five addError calls in this method pass code: $e->getCode() directly. Every other export method in this file — including the two new auth handlers above (AUTH_METHODS, POLICIES) at lines 633 and 647 — uses code: (int) $e->getCode() ?: Exception::CODE_INTERNAL. The Exception constructor only remaps a string code that looks non-numeric; an integer 0 (the default for most PHP exceptions) passes through unchanged. This means any unhandled exception from a settings export will produce an error object with code 0 rather than 500, making it invisible to any consumer that filters by HTTP-style status code.

Comment thread src/Migration/Sources/Appwrite.php Outdated
…rvices/Labels

Replaces 4 raw 'GET /v1/project' HTTP calls with the typed Project model
from SDK 24.1.0. Each resource iterates the typed authMethods/protocols/
services arrays (each containing typed ProjectAuthMethod/ProjectProtocol/
ProjectService models with id+enabled fields) and builds an id->enabled
lookup keyed by the corresponding Project*Id enum.

Brings the source side fully in line with policies: all 5 settings
resources now read via the SDK only, no raw HTTP calls remain.
Comment thread src/Migration/Destinations/Appwrite.php
Comment thread src/Migration/Destinations/Appwrite.php Outdated
Unifies the destination side: Protocols, Labels, Services, AuthMethods,
and Policies now all write to the project document directly via
dbForPlatform->updateDocument(...) wrapped in getAuthorization()->skip().

Each resource bundles its fields into ONE document write instead of N
SDK round-trips:
  - Protocols  3 SDK calls -> 1 document update
  - Services  17 SDK calls -> 1 document update
  - AuthMethods 7 SDK calls -> 1 document update
  - Labels      1 SDK call  -> 1 document update (with array_unique dedupe)
  - Policies (unchanged: was already direct DB)

Field mapping mirrors the upstream server handlers:
  - Protocols   -> project.apis (map)
  - Services    -> project.services (map)
  - Labels      -> project.labels (array, deduped)
  - AuthMethods -> project.auths (map; keys from app/config/auth.php)
  - Policies    -> project.auths (map; shares same attribute as AuthMethods)

AuthMethods and Policies both read-then-merge the auths map so they
coexist when both ship in the same migration.
@premtsd-code premtsd-code changed the base branch from main to add-webhook-migration May 20, 2026 11:32
Existing private/protected migration functions carry at most a one-line
description (most have just @throws). The recent docblocks I added were
over-explaining what the code already says.

Kept only the two non-obvious WHYs:
  - createAuthMethods: storage keys differ from SDK enum values; shares
    the auths map with createPolicies.
  - createPolicies: SDK setters reject 0 even though 0 = disabled in
    storage.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant