-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
add soft delete for users and permissions #952
base: main
Are you sure you want to change the base?
Conversation
This stack of pull requests is managed by Graphite. Learn more about stacking. |
Datadog ReportBranch report: ✅ 0 Failed, 257 Passed, 36 Skipped, 45.46s Total Time |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
curious, it seems like this solution isn't "audit complete".
For example, how do we handle situation where agency wants to restore a user's permission for a site's resource? we cannot add another record due to ResourcePermission's @@unique([userId, siteId, resourceId, role])
. We can remove the deletedAt
but it will mean remove the audit trail aspect of it
It's alright if this is a stopgap measure, but just want to clarify that this is intentional
Not urgent but we might also want to add a backlog ticket to write a script to automate this.
@adriangohjw this measure is to support soft deletes for now. In terms of audit completeness, we will have to re-look into that in ISOM-1072 To re-store a user's permissions, we will need to remove the Couple the above with Ops email/Slack request, there is still some kind of full audit picture. Lmk if that makes sense! |
6f97b13
to
11d220c
Compare
Notes
Problem
Closes ISOM-1701
Solution
Breaking Changes
Features:
deletedAt
columnImprovements:
Bug Fixes:
Tests
New scripts:
20241220130729_add_deletedat_user_perms
: Adds deletedAt columns to User and ResourcePermission tables