Add protocol for migration service
This commit is contained in:
@@ -48,7 +48,69 @@ import DataLiteC
|
||||
///
|
||||
/// This approach allows you to build reusable service layers on top of a safe, transactional,
|
||||
/// and serialized foundation.
|
||||
open class DatabaseService: DatabaseServiceProtocol {
|
||||
///
|
||||
/// ## Error Handling
|
||||
///
|
||||
/// All database access is serialized using an internal dispatch queue to ensure thread safety.
|
||||
/// If a database corruption or decryption failure is detected (e.g., `SQLITE_NOTADB`), the
|
||||
/// service attempts to re-establish the connection and, in case of transaction blocks,
|
||||
/// retries the entire transaction block exactly once. If the problem persists, the error
|
||||
/// is rethrown.
|
||||
///
|
||||
/// ## Encryption Key Management
|
||||
///
|
||||
/// If a `keyProvider` is set, the service will use it to retrieve and apply encryption keys
|
||||
/// when establishing or re-establishing a database connection. Any error that occurs while
|
||||
/// retrieving or applying the encryption key is reported to the provider via
|
||||
/// `databaseService(_:didReceive:)`. Non-encryption-related errors (e.g., file access
|
||||
/// issues) are not reported to the provider.
|
||||
///
|
||||
/// ## Reconnect Behavior
|
||||
///
|
||||
/// The service can automatically reconnect to the database, but this happens only in very specific
|
||||
/// circumstances. Reconnection is triggered only when you run a transactional operation using
|
||||
/// ``perform(in:closure:)``, and a decryption error (`SQLITE_NOTADB`) occurs during
|
||||
/// the transaction. Even then, reconnection is possible only if you have set a ``keyProvider``,
|
||||
/// and only if the provider allows it by returning `true` from its
|
||||
/// ``DatabaseServiceKeyProvider/databaseServiceShouldReconnect(_:)-84qfz``
|
||||
/// method.
|
||||
///
|
||||
/// When this happens, the service will ask the key provider for a new encryption key, create a new
|
||||
/// database connection, and then try to re-run your transaction block one more time. If the second
|
||||
/// attempt also fails with the same decryption error, or if reconnection is not allowed, the error is
|
||||
/// returned to your code as usual, and no further attempts are made.
|
||||
///
|
||||
/// It's important to note that reconnection and retrying of transactions never happens outside of
|
||||
/// transactional operations, and will never be triggered for other types of errors. All of this logic
|
||||
/// runs on the service’s internal queue, so you don’t have to worry about thread safety.
|
||||
///
|
||||
/// - Important: Because a transaction block can be executed more than once when this
|
||||
/// mechanism is triggered, make sure that your block is idempotent and doesn't cause any
|
||||
/// side effects outside the database itself.
|
||||
///
|
||||
/// ## Topics
|
||||
///
|
||||
/// ### Initializers
|
||||
///
|
||||
/// - ``init(provider:queue:)``
|
||||
/// - ``init(connection:queue:)``
|
||||
///
|
||||
/// ### Key Management
|
||||
///
|
||||
/// - ``DatabaseServiceKeyProvider``
|
||||
/// - ``keyProvider``
|
||||
///
|
||||
/// ### Connection Management
|
||||
///
|
||||
/// - ``ConnectionProvider``
|
||||
/// - ``reconnect()``
|
||||
///
|
||||
/// ### Database Operations
|
||||
///
|
||||
/// - ``DatabaseServiceProtocol/Perform``
|
||||
/// - ``perform(_:)``
|
||||
/// - ``perform(in:closure:)``
|
||||
open class DatabaseService: DatabaseServiceProtocol, @unchecked Sendable {
|
||||
/// A closure that provides a new database connection when invoked.
|
||||
///
|
||||
/// `ConnectionProvider` is used to defer the creation of a `Connection` instance
|
||||
@@ -62,58 +124,33 @@ open class DatabaseService: DatabaseServiceProtocol {
|
||||
// MARK: - Properties
|
||||
|
||||
private let provider: ConnectionProvider
|
||||
private var connection: Connection
|
||||
private let queue: DispatchQueue
|
||||
private let queueKey = DispatchSpecificKey<Void>()
|
||||
private var connection: Connection
|
||||
|
||||
/// The object that provides the encryption key for the database connection.
|
||||
/// Provides the encryption key for the database connection.
|
||||
///
|
||||
/// When this property is set, the service attempts to retrieve an encryption key from the
|
||||
/// provider and apply it to the current database connection. This operation is performed
|
||||
/// synchronously on the service’s internal queue to ensure thread safety.
|
||||
/// When this property is set, the service synchronously retrieves and applies an encryption
|
||||
/// key from the provider to the current database connection on the service’s internal queue,
|
||||
/// ensuring thread safety.
|
||||
///
|
||||
/// If an error occurs during key retrieval or application, the service notifies the provider
|
||||
/// by calling `databaseService(_:didReceive:)`.
|
||||
/// If an error occurs during key retrieval or application (for example, if biometric
|
||||
/// authentication is cancelled, the key is unavailable, or decryption fails due to an
|
||||
/// incorrect key), the service notifies the provider by calling
|
||||
/// ``DatabaseServiceKeyProvider/databaseService(_:didReceive:)-xbrk``.
|
||||
///
|
||||
/// This enables external management of encryption keys, including features such as key rotation,
|
||||
/// user-scoped encryption, or error handling delegation.
|
||||
///
|
||||
/// - Important: The service does not retry failed key applications. Ensure the provider is
|
||||
/// correctly configured and able to supply a valid key when needed.
|
||||
/// This mechanism enables external management of encryption keys, supporting scenarios such
|
||||
/// as key rotation, user-specific encryption, or custom error handling.
|
||||
public weak var keyProvider: DatabaseServiceKeyProvider? {
|
||||
didSet {
|
||||
perform { connection in
|
||||
do {
|
||||
if let key = try keyProvider?.databaseServiceKey(self) {
|
||||
try connection.apply(key)
|
||||
}
|
||||
} catch {
|
||||
keyProvider?.databaseService(self, didReceive: error)
|
||||
}
|
||||
withConnection { connection in
|
||||
try? applyKey(to: connection)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// MARK: - Inits
|
||||
|
||||
/// Creates a new `DatabaseService` using the given connection provider and optional queue.
|
||||
///
|
||||
/// This convenience initializer wraps the provided autoclosure in a `ConnectionProvider`
|
||||
/// and delegates to the designated initializer. It is useful when passing a simple
|
||||
/// connection expression.
|
||||
///
|
||||
/// - Parameters:
|
||||
/// - provider: A closure that returns a `Connection` instance and may throw.
|
||||
/// - queue: An optional dispatch queue used as a target for internal serialization. If `nil`,
|
||||
/// a default serial queue with `.utility` QoS is created internally.
|
||||
/// - Throws: Rethrows any error thrown by the connection provider.
|
||||
public convenience init(
|
||||
connection provider: @escaping @autoclosure ConnectionProvider,
|
||||
queue: DispatchQueue? = nil
|
||||
) rethrows {
|
||||
try self.init(provider: provider, queue: queue)
|
||||
}
|
||||
|
||||
/// Creates a new `DatabaseService` with the specified connection provider and dispatch queue.
|
||||
///
|
||||
/// This initializer immediately invokes the `provider` closure to establish the initial database
|
||||
@@ -139,85 +176,88 @@ open class DatabaseService: DatabaseServiceProtocol {
|
||||
}
|
||||
}
|
||||
|
||||
/// Creates a new `DatabaseService` using the given connection provider and optional queue.
|
||||
///
|
||||
/// This convenience initializer wraps the provided autoclosure in a `ConnectionProvider`
|
||||
/// and delegates to the designated initializer. It is useful when passing a simple
|
||||
/// connection expression.
|
||||
///
|
||||
/// - Parameters:
|
||||
/// - provider: A closure that returns a `Connection` instance and may throw.
|
||||
/// - queue: An optional dispatch queue used as a target for internal serialization. If `nil`,
|
||||
/// a default serial queue with `.utility` QoS is created internally.
|
||||
/// - Throws: Rethrows any error thrown by the connection provider.
|
||||
public convenience init(
|
||||
connection provider: @escaping @autoclosure ConnectionProvider,
|
||||
queue: DispatchQueue? = nil
|
||||
) rethrows {
|
||||
try self.init(provider: provider, queue: queue)
|
||||
}
|
||||
|
||||
// MARK: - Methods
|
||||
|
||||
/// Re-establishes the database connection using the stored connection provider.
|
||||
///
|
||||
/// This method creates a new `Connection` instance by invoking the original provider. If a
|
||||
/// `keyProvider` is set, the method attempts to retrieve and apply an encryption key to the new
|
||||
/// connection. The new connection replaces the existing one.
|
||||
/// This method synchronously creates a new ``Connection`` instance by invoking the original
|
||||
/// provider on the service’s internal queue. If a ``keyProvider`` is set, the service attempts
|
||||
/// to retrieve and apply an encryption key to the new connection.
|
||||
/// If any error occurs during key retrieval or application, the provider is notified via
|
||||
/// ``DatabaseServiceKeyProvider/databaseService(_:didReceive:)-xbrk``,
|
||||
/// and the error is rethrown.
|
||||
///
|
||||
/// The operation is executed synchronously on the internal dispatch queue via `perform(_:)`
|
||||
/// The new connection replaces the existing one only if all steps succeed without errors.
|
||||
///
|
||||
/// This operation is always executed on the internal dispatch queue (see ``perform(_:)``)
|
||||
/// to ensure thread safety.
|
||||
///
|
||||
/// - Throws: Any error thrown during connection creation or while retrieving or applying the
|
||||
/// encryption key.
|
||||
/// - Throws: Any error thrown during connection creation or while retrieving or applying
|
||||
/// the encryption key. Only encryption-related errors are reported to the ``keyProvider``.
|
||||
public func reconnect() throws {
|
||||
try perform { _ in
|
||||
try withConnection { _ in
|
||||
let connection = try provider()
|
||||
if let key = try keyProvider?.databaseServiceKey(self) {
|
||||
try connection.apply(key)
|
||||
}
|
||||
try applyKey(to: connection)
|
||||
self.connection = connection
|
||||
}
|
||||
}
|
||||
|
||||
/// Executes the given closure using the active database connection.
|
||||
///
|
||||
/// This method ensures thread-safe access to the underlying `Connection` by synchronizing
|
||||
/// execution on an internal serial dispatch queue. If the call is already on that queue, the
|
||||
/// closure is executed directly to avoid unnecessary dispatching.
|
||||
///
|
||||
/// If the closure throws a `SQLiteError` with code `SQLITE_NOTADB` (e.g., when the database file
|
||||
/// is corrupted or invalid), the service attempts to re-establish the connection by calling
|
||||
/// ``reconnect()``. The error is still rethrown after reconnection.
|
||||
/// Ensures thread-safe access to the underlying ``Connection`` by synchronizing execution on
|
||||
/// the service’s internal serial dispatch queue. If the call is already running on this queue,
|
||||
/// the closure is executed directly to avoid unnecessary dispatching.
|
||||
///
|
||||
/// - Parameter closure: A closure that takes the active connection and returns a result.
|
||||
/// - Returns: The value returned by the closure.
|
||||
/// - Throws: Any error thrown by the closure or during reconnection logic.
|
||||
/// - Throws: Any error thrown by the closure.
|
||||
public func perform<T>(_ closure: Perform<T>) rethrows -> T {
|
||||
do {
|
||||
switch DispatchQueue.getSpecific(key: queueKey) {
|
||||
case .none: return try queue.asyncAndWait { try closure(connection) }
|
||||
case .some: return try closure(connection)
|
||||
}
|
||||
} catch {
|
||||
switch error {
|
||||
case let error as Connection.Error:
|
||||
if error.code == SQLITE_NOTADB {
|
||||
try reconnect()
|
||||
}
|
||||
fallthrough
|
||||
default:
|
||||
throw error
|
||||
}
|
||||
}
|
||||
try withConnection(closure)
|
||||
}
|
||||
|
||||
/// Executes a closure inside a transaction if the connection is in autocommit mode.
|
||||
///
|
||||
/// If the current connection is in autocommit mode, a new transaction of the specified type
|
||||
/// is started, and the closure is executed within it. If the closure completes successfully,
|
||||
/// the transaction is committed. If an error is thrown, the transaction is rolled back.
|
||||
/// If the connection is in autocommit mode, starts a new transaction of the specified type,
|
||||
/// executes the closure within it, and commits the transaction on success. If the closure
|
||||
/// throws, the transaction is rolled back.
|
||||
///
|
||||
/// If the thrown error is a `SQLiteError` with code `SQLITE_NOTADB`, the service attempts to
|
||||
/// reconnect and retries the entire transaction block exactly once.
|
||||
/// If the closure throws a `Connection.Error` with code `SQLITE_NOTADB` and reconnecting is
|
||||
/// allowed, the service attempts to reconnect and retries the entire transaction block once.
|
||||
///
|
||||
/// If the connection is already within a transaction (i.e., not in autocommit mode),
|
||||
/// the closure is executed directly without starting a new transaction.
|
||||
/// If already inside a transaction (not in autocommit mode), executes the closure directly
|
||||
/// without starting a new transaction.
|
||||
///
|
||||
/// - Parameters:
|
||||
/// - transaction: The type of transaction to begin (e.g., `deferred`, `immediate`, `exclusive`).
|
||||
/// - transaction: The type of transaction to begin.
|
||||
/// - closure: A closure that takes the active connection and returns a result.
|
||||
/// - Returns: The value returned by the closure.
|
||||
/// - Throws: Any error thrown by the closure, transaction control statements,
|
||||
/// or reconnect logic.
|
||||
/// - Throws: Any error thrown by the closure, transaction control statements, or reconnect logic.
|
||||
///
|
||||
/// - Important: The closure may be executed more than once. Ensure it is idempotent.
|
||||
public func perform<T>(
|
||||
in transaction: TransactionType,
|
||||
closure: Perform<T>
|
||||
) rethrows -> T {
|
||||
if connection.isAutocommit {
|
||||
try perform { connection in
|
||||
try withConnection { connection in
|
||||
if connection.isAutocommit {
|
||||
do {
|
||||
try connection.beginTransaction(transaction)
|
||||
let result = try closure(connection)
|
||||
@@ -226,12 +266,13 @@ open class DatabaseService: DatabaseServiceProtocol {
|
||||
} catch {
|
||||
try connection.rollbackTransaction()
|
||||
guard let error = error as? Connection.Error,
|
||||
error.code == SQLITE_NOTADB
|
||||
error.code == SQLITE_NOTADB,
|
||||
shouldReconnect
|
||||
else { throw error }
|
||||
|
||||
try reconnect()
|
||||
|
||||
return try perform { connection in
|
||||
return try withConnection { connection in
|
||||
do {
|
||||
try connection.beginTransaction(transaction)
|
||||
let result = try closure(connection)
|
||||
@@ -243,9 +284,35 @@ open class DatabaseService: DatabaseServiceProtocol {
|
||||
}
|
||||
}
|
||||
}
|
||||
} else {
|
||||
return try closure(connection)
|
||||
}
|
||||
} else {
|
||||
try perform(closure)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
private extension DatabaseService {
|
||||
var shouldReconnect: Bool {
|
||||
keyProvider?.databaseServiceShouldReconnect(self) ?? false
|
||||
}
|
||||
|
||||
func withConnection<T>(_ closure: Perform<T>) rethrows -> T {
|
||||
switch DispatchQueue.getSpecific(key: queueKey) {
|
||||
case .none: try queue.asyncAndWait { try closure(connection) }
|
||||
case .some: try closure(connection)
|
||||
}
|
||||
}
|
||||
|
||||
func applyKey(to connection: Connection) throws {
|
||||
do {
|
||||
if let key = try keyProvider?.databaseServiceKey(self) {
|
||||
let sql = "SELECT count(*) FROM sqlite_master"
|
||||
try connection.apply(key)
|
||||
try connection.execute(raw: sql)
|
||||
}
|
||||
} catch {
|
||||
keyProvider?.databaseService(self, didReceive: error)
|
||||
throw error
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
@@ -1,110 +1,113 @@
|
||||
import Foundation
|
||||
import DataLiteCore
|
||||
|
||||
/// A service responsible for managing and applying database migrations in a versioned manner.
|
||||
/// Thread-safe service for executing ordered database schema migrations.
|
||||
///
|
||||
/// `MigrationService` manages a collection of migrations identified by versions and script URLs,
|
||||
/// and applies them sequentially to update the database schema. It ensures that each migration
|
||||
/// is applied only once, and in the correct version order based on the current database version.
|
||||
/// `MigrationService` stores registered migrations and applies them sequentially
|
||||
/// to update the database schema. Each migration runs only once, in version order,
|
||||
/// based on the current schema version stored in the database.
|
||||
///
|
||||
/// This service is generic over a `VersionStorage` implementation that handles storing and
|
||||
/// retrieving the current database version. Migrations must have unique versions and script URLs
|
||||
/// to prevent duplication.
|
||||
/// The service is generic over:
|
||||
/// - `Service`: a database service conforming to ``DatabaseServiceProtocol``
|
||||
/// - `Storage`: a version storage conforming to ``VersionStorage``
|
||||
///
|
||||
/// Migrations are identified by version and script URL. Both must be unique
|
||||
/// across all registered migrations.
|
||||
///
|
||||
/// Execution is performed inside a single `.exclusive` transaction, ensuring
|
||||
/// that either all pending migrations are applied successfully or none are.
|
||||
/// On error, the database state is rolled back to the original version.
|
||||
///
|
||||
/// This type is safe to use from multiple threads.
|
||||
///
|
||||
/// ```swift
|
||||
/// let connection = try Connection(location: .inMemory, options: .readwrite)
|
||||
/// let storage = UserVersionStorage<BitPackVersion>()
|
||||
/// let service = MigrationService(storage: storage, connection: connection)
|
||||
/// let service = MigrationService(service: connectionService, storage: storage)
|
||||
///
|
||||
/// try service.add(Migration(version: "1.0.0", byResource: "v_1_0_0.sql")!)
|
||||
/// try service.add(Migration(version: "1.0.1", byResource: "v_1_0_1.sql")!)
|
||||
/// try service.add(Migration(version: "1.1.0", byResource: "v_1_1_0.sql")!)
|
||||
/// try service.add(Migration(version: "1.2.0", byResource: "v_1_2_0.sql")!)
|
||||
///
|
||||
/// try service.migrate()
|
||||
/// ```
|
||||
///
|
||||
/// ### Custom Versions and Storage
|
||||
///
|
||||
/// You can customize versioning by providing your own `Version` type conforming to
|
||||
/// ``VersionRepresentable``, which supports comparison, hashing, and identity checks.
|
||||
///
|
||||
/// The storage backend (`VersionStorage`) defines how the version is persisted, such as
|
||||
/// in a pragma, table, or metadata.
|
||||
///
|
||||
/// This allows using semantic versions, integers, or other schemes, and storing them
|
||||
/// in custom places.
|
||||
public final class MigrationService<Service: DatabaseServiceProtocol, Storage: VersionStorage> {
|
||||
/// The version type used by this migration service, derived from the storage type.
|
||||
/// You can supply a custom `Version` type conforming to ``VersionRepresentable``
|
||||
/// and a `VersionStorage` implementation that determines how and where the
|
||||
/// version is persisted (e.g., `PRAGMA user_version`, metadata table, etc.).
|
||||
public final class MigrationService<
|
||||
Service: DatabaseServiceProtocol,
|
||||
Storage: VersionStorage
|
||||
>:
|
||||
MigrationServiceProtocol,
|
||||
@unchecked Sendable
|
||||
{
|
||||
/// Schema version type used for migration ordering.
|
||||
public typealias Version = Storage.Version
|
||||
|
||||
/// Errors that may occur during migration registration or execution.
|
||||
public enum Error: Swift.Error {
|
||||
/// A migration with the same version or script URL was already registered.
|
||||
case duplicateMigration(Migration<Version>)
|
||||
|
||||
/// Migration execution failed, with optional reference to the failed migration.
|
||||
case migrationFailed(Migration<Version>?, Swift.Error)
|
||||
|
||||
/// The migration script is empty.
|
||||
case emptyMigrationScript(Migration<Version>)
|
||||
}
|
||||
|
||||
// MARK: - Properties
|
||||
|
||||
private let service: Service
|
||||
private let storage: Storage
|
||||
private var mutex = pthread_mutex_t()
|
||||
private var migrations = Set<Migration<Version>>()
|
||||
|
||||
/// The encryption key provider delegated to the underlying database service.
|
||||
/// Encryption key provider delegated to the underlying database service.
|
||||
public weak var keyProvider: DatabaseServiceKeyProvider? {
|
||||
get { service.keyProvider }
|
||||
set { service.keyProvider = newValue }
|
||||
}
|
||||
|
||||
// MARK: - Inits
|
||||
|
||||
/// Creates a new migration service with the given database service and version storage.
|
||||
/// Creates a migration service with the given database service and storage.
|
||||
///
|
||||
/// - Parameters:
|
||||
/// - service: The database service used to perform migrations.
|
||||
/// - storage: The version storage implementation used to track the current schema version.
|
||||
/// - service: Database service used to execute migrations.
|
||||
/// - storage: Version storage for reading and writing schema version.
|
||||
public init(
|
||||
service: Service,
|
||||
storage: Storage
|
||||
) {
|
||||
self.service = service
|
||||
self.storage = storage
|
||||
pthread_mutex_init(&mutex, nil)
|
||||
}
|
||||
|
||||
// MARK: - Migration Management
|
||||
deinit {
|
||||
pthread_mutex_destroy(&mutex)
|
||||
}
|
||||
|
||||
/// Registers a new migration.
|
||||
///
|
||||
/// Ensures that no other migration with the same version or script URL has been registered.
|
||||
/// Registers a new migration, ensuring version and script URL uniqueness.
|
||||
///
|
||||
/// - Parameter migration: The migration to register.
|
||||
/// - Throws: ``Error/duplicateMigration(_:)`` if the migration version or script URL duplicates an existing one.
|
||||
public func add(_ migration: Migration<Version>) throws {
|
||||
/// - Throws: ``MigrationError/duplicateMigration(_:)`` if the migration's
|
||||
/// version or script URL is already registered.
|
||||
public func add(_ migration: Migration<Version>) throws(MigrationError<Version>) {
|
||||
pthread_mutex_lock(&mutex)
|
||||
defer { pthread_mutex_unlock(&mutex) }
|
||||
guard !migrations.contains(where: {
|
||||
$0.version == migration.version
|
||||
|| $0.scriptURL == migration.scriptURL
|
||||
}) else {
|
||||
throw Error.duplicateMigration(migration)
|
||||
throw .duplicateMigration(migration)
|
||||
}
|
||||
migrations.insert(migration)
|
||||
}
|
||||
|
||||
/// Executes all pending migrations in ascending version order.
|
||||
/// Executes all pending migrations inside a single exclusive transaction.
|
||||
///
|
||||
/// This method retrieves the current schema version from the storage, filters and sorts
|
||||
/// pending migrations, executes each migration script within a single exclusive transaction,
|
||||
/// and updates the schema version on success.
|
||||
/// This method retrieves the current schema version from storage, then determines
|
||||
/// which migrations have a higher version. The selected migrations are sorted in
|
||||
/// ascending order and each one's SQL script is executed in sequence. When all
|
||||
/// scripts complete successfully, the stored version is updated to the highest
|
||||
/// applied migration.
|
||||
///
|
||||
/// If a migration script is empty or a migration fails, the process aborts and rolls back changes.
|
||||
/// If a script is empty or execution fails, the process aborts and the transaction
|
||||
/// is rolled back, leaving the database unchanged.
|
||||
///
|
||||
/// - Throws: ``Error/migrationFailed(_:_:)`` if a migration script fails or if updating the version fails.
|
||||
public func migrate() throws {
|
||||
/// - Throws: ``MigrationError/emptyMigrationScript(_:)`` if a script is empty.
|
||||
/// - Throws: ``MigrationError/migrationFailed(_:_:)`` if execution or version
|
||||
/// update fails.
|
||||
public func migrate() throws(MigrationError<Version>) {
|
||||
pthread_mutex_lock(&mutex)
|
||||
defer { pthread_mutex_unlock(&mutex) }
|
||||
do {
|
||||
try service.perform(in: .exclusive) { connection in
|
||||
try storage.prepare(connection)
|
||||
@@ -116,12 +119,12 @@ public final class MigrationService<Service: DatabaseServiceProtocol, Storage: V
|
||||
for migration in migrations {
|
||||
let script = try migration.script
|
||||
guard !script.isEmpty else {
|
||||
throw Error.emptyMigrationScript(migration)
|
||||
throw MigrationError.emptyMigrationScript(migration)
|
||||
}
|
||||
do {
|
||||
try connection.execute(sql: script)
|
||||
} catch {
|
||||
throw Error.migrationFailed(migration, error)
|
||||
throw MigrationError.migrationFailed(migration, error)
|
||||
}
|
||||
}
|
||||
|
||||
@@ -129,10 +132,10 @@ public final class MigrationService<Service: DatabaseServiceProtocol, Storage: V
|
||||
try storage.setVersion(connection, version)
|
||||
}
|
||||
}
|
||||
} catch let error as Error {
|
||||
} catch let error as MigrationError<Version> {
|
||||
throw error
|
||||
} catch {
|
||||
throw Error.migrationFailed(nil, error)
|
||||
throw .migrationFailed(nil, error)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
@@ -44,7 +44,11 @@ import DataLiteCoder
|
||||
/// `RowDatabaseService` encourages a reusable, type-safe pattern for
|
||||
/// model-based interaction with SQLite while preserving thread safety
|
||||
/// and transactional integrity.
|
||||
open class RowDatabaseService: DatabaseService, RowDatabaseServiceProtocol {
|
||||
open class RowDatabaseService:
|
||||
DatabaseService,
|
||||
RowDatabaseServiceProtocol,
|
||||
@unchecked Sendable
|
||||
{
|
||||
// MARK: - Properties
|
||||
|
||||
/// The encoder used to serialize values into row representations.
|
||||
|
||||
@@ -13,7 +13,7 @@ import DataLiteCore
|
||||
/// defined by the application.
|
||||
public final class UserVersionStorage<
|
||||
Version: VersionRepresentable & RawRepresentable
|
||||
>: VersionStorage where Version.RawValue == UInt32 {
|
||||
>: Sendable, VersionStorage where Version.RawValue == UInt32 {
|
||||
/// Errors related to reading or decoding the version.
|
||||
public enum Error: Swift.Error {
|
||||
/// The stored `user_version` could not be decoded into a valid `Version` case.
|
||||
|
||||
Reference in New Issue
Block a user