Closed diox closed 6 years ago
Note that it's different from https://github.com/mozilla/addons/issues/3600 which is about doing the complete switch to django migrations. We just need the existing migrations from django applied at the moment, nothing more.
So it looks safe overall, just need to check the auth
ones.
Note: locally, anyone that built their container fairly recently has all those migrations marked as applied, since the database was built from a syncdb
. It's only dev/stage/prod that are problematic.
I did some testing and ended up running:
Both completed successfully.
As we're not using django migrations yet (that's https://github.com/mozilla/addons/issues/3600) I don't want to start requiring it in deploy yet, so my plan is to check that everything is ok on dev, then run the migrate --fake-initial
once on stage & prod as well, and stop there for now.
@diox should I look at something specific for this?
@AlexandraMoga I was waiting for https://github.com/mozilla/addons/issues/5962 to be verified. There is nothing specific to check, just keep an eye out for anything out of the ordinary. I'll mark this one as qa not needed.
Also ran the migrations on stage, and left a note in the release docs to do it on prod.
We currently only use schematic and don't apply django migrations at all at deploy time. This is causing issues like https://github.com/mozilla/addons/issues/5962 because we do depend on some django models.
The current list of unapplied django migrations on dev is:
We need to review them and apply them (or fake some we might not want, but would need to be very careful about doing that as it will introduce inconsistencies).
FWIW the one blocking mozilla/addons#5962 is
0002_remove_content_type_name
.