feat(db): V010 audit infrastructure + temporal tables
Applied to SIGCM2 (dev) and SIGCM2_Test.
V010__audit_infrastructure.sql (idempotent, ~280 LoC):
- Filegroups AUDIT_HOT + AUDIT_COLD with physical files (per-DB logical names
via DB_NAME() prefix to avoid collision in dev/test).
- pf/ps_AuditEvent_Monthly + pf/ps_SecurityEvent_Monthly (RANGE RIGHT,
DATETIME2(3), 14 boundaries 2026-01..2027-02 → 15 partitions). Job extends
forward monthly in B11.
- dbo.AuditEvent (partitioned, clustered PK on OccurredAt+Id) + 4 indexes
(Actor/Target/Action/Correlation) with PAGE compression.
- dbo.SecurityEvent (partitioned) + 3 indexes (Actor/Action_Result/Ip_Failure).
- CHECK constraints: Action LIKE '%.%', ISJSON(Metadata), Result IN (success|failure).
- SYSTEM_VERSIONING ON in Usuario/Rol/Permiso/RolPermiso with 10 YEARS retention +
PAGE compression in history tables.
- No hard FK on ActorUserId → Usuario.Id (soft FK — audit must survive user deletion).
V010_ROLLBACK.sql: emergency reversal (WARNING: destroys all audit history).
database/README.md: migration order + V010 prod-apply notes.
tests/SIGCM2.TestSupport/SqlTestFixture.cs:
- EnsureV010SchemaAsync() validates audit infra is applied (fails fast with
clear message if not — migration itself requires ALTER DATABASE privileges
and is applied manually via sqlcmd).
- Respawn TablesToIgnore extended with *_History (engine rejects direct DELETE
on system-versioned history tables).
tests/SIGCM2.Api.Tests/Audit/V010MigrationTests.cs — 5 smoke tests:
- AuditEvent insert+roundtrip with CorrelationId.
- CK_AuditEvent_Action rejects Action without '.'.
- CK_AuditEvent_Metadata rejects non-JSON.
- CK_SecurityEvent_Result rejects invalid Result.
- Usuario SYSTEM_VERSIONING: temporal query FOR SYSTEM_TIME AS OF returns
pre-update state + Usuario_History populated.
Suite: 130/130 passing (previous 124 + spike B0 + 5 new B1). No regressions.
Refs: sdd/udt-010-auditoria-trazabilidad/{spec#REQ-AUD-1,2, #REQ-SEC-1,
design#D-4, tasks}
This commit is contained in:
85
database/README.md
Normal file
85
database/README.md
Normal file
@@ -0,0 +1,85 @@
|
||||
# `database/` — SIG-CM 2.0
|
||||
|
||||
Todo el DDL del sistema vive acá: migraciones versionadas, stored procedures, functions, seeds.
|
||||
|
||||
## Estructura
|
||||
|
||||
```
|
||||
database/
|
||||
├── migrations/ # Migraciones versionadas V0XX__<descripcion>.sql (SQL puro, idempotentes)
|
||||
├── procedures/ # Stored procedures — creados/alterados por UDTs específicas
|
||||
├── functions/ # User-defined functions
|
||||
├── seeds/ # Data de referencia no-versionada
|
||||
└── schemas/ # Extracciones de schema (referencia)
|
||||
```
|
||||
|
||||
## Migraciones aplicadas (orden obligatorio)
|
||||
|
||||
| Versión | Archivo | UDT | Descripción |
|
||||
|---|---|---|---|
|
||||
| V001 | `V001__create_usuario.sql` | UDT-001 | Tabla Usuario + IX_Usuario_Username_Activo |
|
||||
| V002 | `V002__create_refresh_token.sql` | UDT-002 | Tabla RefreshToken |
|
||||
| V003 | `V003__create_rol.sql` | UDT-004 | Tabla Rol + 8 roles canónicos |
|
||||
| V004 | `V004__alter_usuario_rol_fk.sql` | UDT-004 | FK Usuario.Rol → Rol.Codigo |
|
||||
| V005 | `V005__create_permiso.sql` | UDT-005 | Tabla Permiso + 18 permisos canónicos |
|
||||
| V006 | `V006__create_rol_permiso.sql` | UDT-005 | Tabla RolPermiso + seed 36 rows |
|
||||
| V007 | `V007__add_admin_permissions_udt006.sql` | UDT-006 | 3 permisos administrativos RBAC |
|
||||
| V008 | `V008__add_mustchangepassword_and_indexes.sql` | UDT-008 | Usuario.MustChangePassword + IX_Usuario_Activo_Rol |
|
||||
| V009 | `V009__activate_permisos_overrides.sql` | UDT-009 | Migración shape `PermisosJson` `{grant, deny}` |
|
||||
| **V010** | **`V010__audit_infrastructure.sql`** | **UDT-010** | **Infra de auditoría + Temporal Tables. Ver nota abajo.** |
|
||||
|
||||
## Convenciones
|
||||
|
||||
- **SQL puro** ejecutado manualmente (no hay runner automático; decisión arquitectónica).
|
||||
- **Idempotentes**: cada migración usa `IF NOT EXISTS` / `MERGE` / `IF NOT EXISTS (SELECT 1 FROM sys....)`. Re-ejecutarlas es seguro.
|
||||
- **Boilerplate** inicial: `SET QUOTED_IDENTIFIER ON; SET ANSI_NULLS ON; SET NOCOUNT ON; GO`.
|
||||
- **Naming**: `PK_*`, `UQ_*`, `FK_*`, `DF_*`, `CK_*`, `IX_*`.
|
||||
- **Se aplican a AMBAS bases**: `SIGCM2` (dev) y `SIGCM2_Test` (integration tests). El orden debe ser idéntico.
|
||||
|
||||
## Cómo aplicar migraciones
|
||||
|
||||
### En dev (manual)
|
||||
|
||||
```bash
|
||||
# Con sqlcmd:
|
||||
sqlcmd -S TECNICA3 -d SIGCM2 -U desarrollo -P desarrollo2026 -i database/migrations/V010__audit_infrastructure.sql
|
||||
sqlcmd -S TECNICA3 -d SIGCM2_Test -U desarrollo -P desarrollo2026 -i database/migrations/V010__audit_infrastructure.sql
|
||||
```
|
||||
|
||||
O desde SSMS: abrir el archivo, conectar a cada base, F5.
|
||||
|
||||
### En integration tests
|
||||
|
||||
`tests/SIGCM2.TestSupport/SqlTestFixture.cs` aplica automáticamente el schema necesario en `SIGCM2_Test` al inicializar el fixture (`EnsureV008SchemaAsync`, `EnsureV009SchemaAsync`, `EnsureV010SchemaAsync`…). **NO** hace falta correr el script manualmente.
|
||||
|
||||
### En producción (roadmap futuro)
|
||||
|
||||
1. Backup completo de la base.
|
||||
2. Revisar notas específicas de la migración (ver abajo).
|
||||
3. Ventana de mantenimiento si la migración lo requiere.
|
||||
4. `sqlcmd` + script + verify que los `PRINT` salieron esperados.
|
||||
5. Smoke test post-migración.
|
||||
|
||||
## ⚠️ Notas especiales por migración
|
||||
|
||||
### V010 — Infraestructura de Auditoría
|
||||
|
||||
**Riesgos específicos**:
|
||||
- Activa `SYSTEM_VERSIONING` en `Usuario`, `Rol`, `Permiso`, `RolPermiso`. Tablas con datos. `ALTER TABLE ADD PERIOD FOR SYSTEM_TIME` toma **Sch-M lock** (schema modification). En dev con pocos usuarios el lock es milisegundos; en prod con conexiones activas puede generar espera.
|
||||
- Crea filegroups `AUDIT_HOT` y `AUDIT_COLD` con archivos físicos `<DB>_AUDIT_HOT.ndf` y `<DB>_AUDIT_COLD.ndf` en el default data path del server.
|
||||
- Crea 2 partition functions + schemes mensuales (boundaries 2026-01..2027-02). El job `AuditPartitionManagerJob` (B11) extiende la ventana mes a mes.
|
||||
|
||||
**Para aplicar en prod**:
|
||||
1. **Backup completo previo** (no negociable).
|
||||
2. **Ventana de mantenimiento ≥ 10 min** (los ALTER de SYSTEM_VERSIONING son rápidos pero pueden caer en timeouts si hay transacciones largas).
|
||||
3. Ejecutar el script + verificar todos los `PRINT` "created/applied".
|
||||
4. Smoke test post: `SELECT TOP 1 * FROM dbo.AuditEvent` (vacío OK); `SELECT temporal_type FROM sys.tables WHERE name = 'Usuario'` (debe devolver `2` = system-versioned).
|
||||
5. Si algo falla → `V010_ROLLBACK.sql` (pierde toda la historia) o restore de backup.
|
||||
|
||||
**Catálogo de entidades auditables** (source of truth): `Obsidian/02-ARQUITECTURA-y-TECH-STACK/2.5 📋 Auditoría.md`. Cada UDT nueva que introduzca entidades de negocio debe agregar esas tablas al catálogo y activar `SYSTEM_VERSIONING` en su migración.
|
||||
|
||||
## Recursos
|
||||
|
||||
- Design autoritativo: `Obsidian/02-ARQUITECTURA-y-TECH-STACK/2.5 📋 Auditoría.md`
|
||||
- Decisión persistida (engram): `sig-cm2/audit-architecture`
|
||||
- SDD artifacts UDT-010 (engram): `sdd/udt-010-auditoria-trazabilidad/{explore,proposal,spec,design,tasks,apply-progress}`
|
||||
183
database/migrations/V010_ROLLBACK.sql
Normal file
183
database/migrations/V010_ROLLBACK.sql
Normal file
@@ -0,0 +1,183 @@
|
||||
-- V010_ROLLBACK.sql
|
||||
-- Reversa de V010__audit_infrastructure.sql.
|
||||
--
|
||||
-- ⚠️ ADVERTENCIA: ejecutar este script ELIMINA toda la historia auditada.
|
||||
-- - dbo.AuditEvent y dbo.SecurityEvent se dropean (junto con datos).
|
||||
-- - History tables (Usuario_History, Rol_History, Permiso_History, RolPermiso_History) se dropean.
|
||||
-- - Particionamiento, filegroups y archivos físicos se desmontan.
|
||||
--
|
||||
-- Uso intended: ROLLBACK de emergencia en entornos NO-productivos.
|
||||
-- En prod futuro, este script NO se ejecuta: si hace falta revertir, se hace
|
||||
-- restore de backup previo a V010.
|
||||
|
||||
SET QUOTED_IDENTIFIER ON;
|
||||
SET ANSI_NULLS ON;
|
||||
SET NOCOUNT ON;
|
||||
GO
|
||||
|
||||
-- ═══════════════════════════════════════════════════════════════════════
|
||||
-- 1. Apagar SYSTEM_VERSIONING + remover columnas PERIOD en las 4 tablas
|
||||
-- ═══════════════════════════════════════════════════════════════════════
|
||||
|
||||
-- Usuario
|
||||
IF EXISTS (SELECT 1 FROM sys.tables WHERE object_id = OBJECT_ID('dbo.Usuario') AND temporal_type = 2)
|
||||
BEGIN
|
||||
ALTER TABLE dbo.Usuario SET (SYSTEM_VERSIONING = OFF);
|
||||
PRINT 'Usuario: SYSTEM_VERSIONING OFF.';
|
||||
END
|
||||
GO
|
||||
|
||||
IF EXISTS (SELECT 1 FROM sys.periods WHERE object_id = OBJECT_ID('dbo.Usuario'))
|
||||
BEGIN
|
||||
ALTER TABLE dbo.Usuario DROP PERIOD FOR SYSTEM_TIME;
|
||||
PRINT 'Usuario: PERIOD FOR SYSTEM_TIME dropped.';
|
||||
END
|
||||
GO
|
||||
|
||||
IF COL_LENGTH('dbo.Usuario', 'ValidFrom') IS NOT NULL
|
||||
BEGIN
|
||||
ALTER TABLE dbo.Usuario DROP CONSTRAINT IF EXISTS DF_Usuario_ValidFrom;
|
||||
ALTER TABLE dbo.Usuario DROP CONSTRAINT IF EXISTS DF_Usuario_ValidTo;
|
||||
ALTER TABLE dbo.Usuario DROP COLUMN ValidFrom, ValidTo;
|
||||
PRINT 'Usuario: ValidFrom/ValidTo dropped.';
|
||||
END
|
||||
GO
|
||||
|
||||
IF OBJECT_ID(N'dbo.Usuario_History', N'U') IS NOT NULL
|
||||
BEGIN
|
||||
DROP TABLE dbo.Usuario_History;
|
||||
PRINT 'Usuario_History dropped.';
|
||||
END
|
||||
GO
|
||||
|
||||
-- Rol
|
||||
IF EXISTS (SELECT 1 FROM sys.tables WHERE object_id = OBJECT_ID('dbo.Rol') AND temporal_type = 2)
|
||||
ALTER TABLE dbo.Rol SET (SYSTEM_VERSIONING = OFF);
|
||||
GO
|
||||
|
||||
IF EXISTS (SELECT 1 FROM sys.periods WHERE object_id = OBJECT_ID('dbo.Rol'))
|
||||
ALTER TABLE dbo.Rol DROP PERIOD FOR SYSTEM_TIME;
|
||||
GO
|
||||
|
||||
IF COL_LENGTH('dbo.Rol', 'ValidFrom') IS NOT NULL
|
||||
BEGIN
|
||||
ALTER TABLE dbo.Rol DROP CONSTRAINT IF EXISTS DF_Rol_ValidFrom;
|
||||
ALTER TABLE dbo.Rol DROP CONSTRAINT IF EXISTS DF_Rol_ValidTo;
|
||||
ALTER TABLE dbo.Rol DROP COLUMN ValidFrom, ValidTo;
|
||||
END
|
||||
GO
|
||||
|
||||
IF OBJECT_ID(N'dbo.Rol_History', N'U') IS NOT NULL DROP TABLE dbo.Rol_History;
|
||||
GO
|
||||
|
||||
-- Permiso
|
||||
IF EXISTS (SELECT 1 FROM sys.tables WHERE object_id = OBJECT_ID('dbo.Permiso') AND temporal_type = 2)
|
||||
ALTER TABLE dbo.Permiso SET (SYSTEM_VERSIONING = OFF);
|
||||
GO
|
||||
|
||||
IF EXISTS (SELECT 1 FROM sys.periods WHERE object_id = OBJECT_ID('dbo.Permiso'))
|
||||
ALTER TABLE dbo.Permiso DROP PERIOD FOR SYSTEM_TIME;
|
||||
GO
|
||||
|
||||
IF COL_LENGTH('dbo.Permiso', 'ValidFrom') IS NOT NULL
|
||||
BEGIN
|
||||
ALTER TABLE dbo.Permiso DROP CONSTRAINT IF EXISTS DF_Permiso_ValidFrom;
|
||||
ALTER TABLE dbo.Permiso DROP CONSTRAINT IF EXISTS DF_Permiso_ValidTo;
|
||||
ALTER TABLE dbo.Permiso DROP COLUMN ValidFrom, ValidTo;
|
||||
END
|
||||
GO
|
||||
|
||||
IF OBJECT_ID(N'dbo.Permiso_History', N'U') IS NOT NULL DROP TABLE dbo.Permiso_History;
|
||||
GO
|
||||
|
||||
-- RolPermiso
|
||||
IF EXISTS (SELECT 1 FROM sys.tables WHERE object_id = OBJECT_ID('dbo.RolPermiso') AND temporal_type = 2)
|
||||
ALTER TABLE dbo.RolPermiso SET (SYSTEM_VERSIONING = OFF);
|
||||
GO
|
||||
|
||||
IF EXISTS (SELECT 1 FROM sys.periods WHERE object_id = OBJECT_ID('dbo.RolPermiso'))
|
||||
ALTER TABLE dbo.RolPermiso DROP PERIOD FOR SYSTEM_TIME;
|
||||
GO
|
||||
|
||||
IF COL_LENGTH('dbo.RolPermiso', 'ValidFrom') IS NOT NULL
|
||||
BEGIN
|
||||
ALTER TABLE dbo.RolPermiso DROP CONSTRAINT IF EXISTS DF_RolPermiso_ValidFrom;
|
||||
ALTER TABLE dbo.RolPermiso DROP CONSTRAINT IF EXISTS DF_RolPermiso_ValidTo;
|
||||
ALTER TABLE dbo.RolPermiso DROP COLUMN ValidFrom, ValidTo;
|
||||
END
|
||||
GO
|
||||
|
||||
IF OBJECT_ID(N'dbo.RolPermiso_History', N'U') IS NOT NULL DROP TABLE dbo.RolPermiso_History;
|
||||
GO
|
||||
|
||||
-- ═══════════════════════════════════════════════════════════════════════
|
||||
-- 2. Drop AuditEvent + SecurityEvent
|
||||
-- ═══════════════════════════════════════════════════════════════════════
|
||||
|
||||
IF OBJECT_ID(N'dbo.AuditEvent', N'U') IS NOT NULL
|
||||
BEGIN
|
||||
DROP TABLE dbo.AuditEvent;
|
||||
PRINT 'Table dbo.AuditEvent dropped.';
|
||||
END
|
||||
GO
|
||||
|
||||
IF OBJECT_ID(N'dbo.SecurityEvent', N'U') IS NOT NULL
|
||||
BEGIN
|
||||
DROP TABLE dbo.SecurityEvent;
|
||||
PRINT 'Table dbo.SecurityEvent dropped.';
|
||||
END
|
||||
GO
|
||||
|
||||
-- ═══════════════════════════════════════════════════════════════════════
|
||||
-- 3. Drop partition schemes + functions
|
||||
-- ═══════════════════════════════════════════════════════════════════════
|
||||
|
||||
IF EXISTS (SELECT 1 FROM sys.partition_schemes WHERE name = 'ps_AuditEvent_Monthly')
|
||||
DROP PARTITION SCHEME ps_AuditEvent_Monthly;
|
||||
GO
|
||||
|
||||
IF EXISTS (SELECT 1 FROM sys.partition_functions WHERE name = 'pf_AuditEvent_Monthly')
|
||||
DROP PARTITION FUNCTION pf_AuditEvent_Monthly;
|
||||
GO
|
||||
|
||||
IF EXISTS (SELECT 1 FROM sys.partition_schemes WHERE name = 'ps_SecurityEvent_Monthly')
|
||||
DROP PARTITION SCHEME ps_SecurityEvent_Monthly;
|
||||
GO
|
||||
|
||||
IF EXISTS (SELECT 1 FROM sys.partition_functions WHERE name = 'pf_SecurityEvent_Monthly')
|
||||
DROP PARTITION FUNCTION pf_SecurityEvent_Monthly;
|
||||
GO
|
||||
|
||||
-- ═══════════════════════════════════════════════════════════════════════
|
||||
-- 4. Remover archivos físicos y filegroups
|
||||
-- ═══════════════════════════════════════════════════════════════════════
|
||||
|
||||
DECLARE @dbName NVARCHAR(128) = DB_NAME();
|
||||
DECLARE @hotLogical NVARCHAR(128) = @dbName + N'_AUDIT_HOT';
|
||||
DECLARE @coldLogical NVARCHAR(128) = @dbName + N'_AUDIT_COLD';
|
||||
DECLARE @sql NVARCHAR(MAX);
|
||||
|
||||
IF EXISTS (SELECT 1 FROM sys.database_files WHERE name = @hotLogical)
|
||||
BEGIN
|
||||
SET @sql = N'ALTER DATABASE CURRENT REMOVE FILE [' + @hotLogical + N'];';
|
||||
EXEC sp_executesql @sql;
|
||||
PRINT 'File ' + @hotLogical + ' removed.';
|
||||
END
|
||||
|
||||
IF EXISTS (SELECT 1 FROM sys.database_files WHERE name = @coldLogical)
|
||||
BEGIN
|
||||
SET @sql = N'ALTER DATABASE CURRENT REMOVE FILE [' + @coldLogical + N'];';
|
||||
EXEC sp_executesql @sql;
|
||||
PRINT 'File ' + @coldLogical + ' removed.';
|
||||
END
|
||||
|
||||
IF EXISTS (SELECT 1 FROM sys.filegroups WHERE name = 'AUDIT_HOT')
|
||||
EXEC sp_executesql N'ALTER DATABASE CURRENT REMOVE FILEGROUP AUDIT_HOT;';
|
||||
|
||||
IF EXISTS (SELECT 1 FROM sys.filegroups WHERE name = 'AUDIT_COLD')
|
||||
EXEC sp_executesql N'ALTER DATABASE CURRENT REMOVE FILEGROUP AUDIT_COLD;';
|
||||
GO
|
||||
|
||||
PRINT '';
|
||||
PRINT 'V010 rolled back. Audit infrastructure removed. All audit history is permanently LOST.';
|
||||
GO
|
||||
434
database/migrations/V010__audit_infrastructure.sql
Normal file
434
database/migrations/V010__audit_infrastructure.sql
Normal file
@@ -0,0 +1,434 @@
|
||||
-- V010__audit_infrastructure.sql
|
||||
-- UDT-010: Infraestructura de Auditoría y Trazabilidad (Fase 0.5 — transversal).
|
||||
--
|
||||
-- Cambios:
|
||||
-- 1. Filegroups AUDIT_HOT y AUDIT_COLD (archivos físicos en default data path).
|
||||
-- 2. Partition functions + schemes mensuales (RANGE RIGHT) para AuditEvent y SecurityEvent.
|
||||
-- 3. dbo.AuditEvent particionada + 4 índices + CHECK constraints.
|
||||
-- 4. dbo.SecurityEvent particionada + 3 índices + CHECK constraints.
|
||||
-- 5. SYSTEM_VERSIONING en dbo.Usuario, dbo.Rol, dbo.Permiso, dbo.RolPermiso
|
||||
-- con HISTORY_RETENTION_PERIOD = 10 YEARS y PAGE compression en history tables.
|
||||
--
|
||||
-- Source of truth del diseño: Obsidian/02-ARQUITECTURA-y-TECH-STACK/2.5 📋 Auditoría.md
|
||||
-- Idempotente: seguro para re-ejecutar.
|
||||
-- Reversa: V010_ROLLBACK.sql (pierde TODA la historia auditada).
|
||||
-- Run on: SIGCM2 (dev) y SIGCM2_Test (integration tests). Para producción futuro,
|
||||
-- revisar database/README.md (ventana de mantenimiento + backup previo).
|
||||
|
||||
SET QUOTED_IDENTIFIER ON;
|
||||
SET ANSI_NULLS ON;
|
||||
SET NOCOUNT ON;
|
||||
GO
|
||||
|
||||
-- ═══════════════════════════════════════════════════════════════════════
|
||||
-- 1. FILEGROUPS + ARCHIVOS FÍSICOS
|
||||
-- ═══════════════════════════════════════════════════════════════════════
|
||||
-- Usamos el default data path del server + DB_NAME como prefijo lógico,
|
||||
-- así SIGCM2 y SIGCM2_Test coexisten sin colisión de logical file names.
|
||||
|
||||
DECLARE @dbName NVARCHAR(128) = DB_NAME();
|
||||
DECLARE @dataPath NVARCHAR(260) = CAST(SERVERPROPERTY('InstanceDefaultDataPath') AS NVARCHAR(260));
|
||||
DECLARE @hotLogical NVARCHAR(128) = @dbName + N'_AUDIT_HOT';
|
||||
DECLARE @coldLogical NVARCHAR(128) = @dbName + N'_AUDIT_COLD';
|
||||
DECLARE @hotPhysical NVARCHAR(260) = @dataPath + @hotLogical + N'.ndf';
|
||||
DECLARE @coldPhysical NVARCHAR(260) = @dataPath + @coldLogical + N'.ndf';
|
||||
DECLARE @sql NVARCHAR(MAX);
|
||||
|
||||
-- Filegroup AUDIT_HOT
|
||||
IF NOT EXISTS (SELECT 1 FROM sys.filegroups WHERE name = 'AUDIT_HOT')
|
||||
BEGIN
|
||||
EXEC sp_executesql N'ALTER DATABASE CURRENT ADD FILEGROUP AUDIT_HOT;';
|
||||
PRINT 'Filegroup AUDIT_HOT created.';
|
||||
END
|
||||
ELSE
|
||||
PRINT 'Filegroup AUDIT_HOT already exists — skip.';
|
||||
|
||||
IF NOT EXISTS (SELECT 1 FROM sys.database_files WHERE name = @hotLogical)
|
||||
BEGIN
|
||||
SET @sql = N'ALTER DATABASE CURRENT ADD FILE (
|
||||
NAME = N''' + @hotLogical + N''',
|
||||
FILENAME = N''' + @hotPhysical + N''',
|
||||
SIZE = 64MB,
|
||||
FILEGROWTH = 64MB
|
||||
) TO FILEGROUP AUDIT_HOT;';
|
||||
EXEC sp_executesql @sql;
|
||||
PRINT 'File ' + @hotLogical + ' added to filegroup AUDIT_HOT.';
|
||||
END
|
||||
ELSE
|
||||
PRINT 'File ' + @hotLogical + ' already exists — skip.';
|
||||
|
||||
-- Filegroup AUDIT_COLD
|
||||
IF NOT EXISTS (SELECT 1 FROM sys.filegroups WHERE name = 'AUDIT_COLD')
|
||||
BEGIN
|
||||
EXEC sp_executesql N'ALTER DATABASE CURRENT ADD FILEGROUP AUDIT_COLD;';
|
||||
PRINT 'Filegroup AUDIT_COLD created.';
|
||||
END
|
||||
ELSE
|
||||
PRINT 'Filegroup AUDIT_COLD already exists — skip.';
|
||||
|
||||
IF NOT EXISTS (SELECT 1 FROM sys.database_files WHERE name = @coldLogical)
|
||||
BEGIN
|
||||
SET @sql = N'ALTER DATABASE CURRENT ADD FILE (
|
||||
NAME = N''' + @coldLogical + N''',
|
||||
FILENAME = N''' + @coldPhysical + N''',
|
||||
SIZE = 64MB,
|
||||
FILEGROWTH = 64MB
|
||||
) TO FILEGROUP AUDIT_COLD;';
|
||||
EXEC sp_executesql @sql;
|
||||
PRINT 'File ' + @coldLogical + ' added to filegroup AUDIT_COLD.';
|
||||
END
|
||||
ELSE
|
||||
PRINT 'File ' + @coldLogical + ' already exists — skip.';
|
||||
GO
|
||||
|
||||
-- ═══════════════════════════════════════════════════════════════════════
|
||||
-- 2. PARTITION FUNCTIONS + SCHEMES (mensuales, RANGE RIGHT)
|
||||
-- ═══════════════════════════════════════════════════════════════════════
|
||||
-- Boundaries iniciales: 14 valores de 2026-01-01 a 2027-02-01 → 15 particiones.
|
||||
-- AuditPartitionManagerJob (B11) extiende mes a mes automáticamente.
|
||||
|
||||
IF NOT EXISTS (SELECT 1 FROM sys.partition_functions WHERE name = 'pf_AuditEvent_Monthly')
|
||||
BEGIN
|
||||
CREATE PARTITION FUNCTION pf_AuditEvent_Monthly (DATETIME2(3))
|
||||
AS RANGE RIGHT FOR VALUES (
|
||||
'2026-01-01T00:00:00.000', '2026-02-01T00:00:00.000', '2026-03-01T00:00:00.000',
|
||||
'2026-04-01T00:00:00.000', '2026-05-01T00:00:00.000', '2026-06-01T00:00:00.000',
|
||||
'2026-07-01T00:00:00.000', '2026-08-01T00:00:00.000', '2026-09-01T00:00:00.000',
|
||||
'2026-10-01T00:00:00.000', '2026-11-01T00:00:00.000', '2026-12-01T00:00:00.000',
|
||||
'2027-01-01T00:00:00.000', '2027-02-01T00:00:00.000'
|
||||
);
|
||||
PRINT 'Partition function pf_AuditEvent_Monthly created.';
|
||||
END
|
||||
ELSE
|
||||
PRINT 'Partition function pf_AuditEvent_Monthly already exists — skip.';
|
||||
GO
|
||||
|
||||
IF NOT EXISTS (SELECT 1 FROM sys.partition_schemes WHERE name = 'ps_AuditEvent_Monthly')
|
||||
BEGIN
|
||||
CREATE PARTITION SCHEME ps_AuditEvent_Monthly
|
||||
AS PARTITION pf_AuditEvent_Monthly ALL TO ([AUDIT_HOT]);
|
||||
PRINT 'Partition scheme ps_AuditEvent_Monthly created.';
|
||||
END
|
||||
ELSE
|
||||
PRINT 'Partition scheme ps_AuditEvent_Monthly already exists — skip.';
|
||||
GO
|
||||
|
||||
IF NOT EXISTS (SELECT 1 FROM sys.partition_functions WHERE name = 'pf_SecurityEvent_Monthly')
|
||||
BEGIN
|
||||
CREATE PARTITION FUNCTION pf_SecurityEvent_Monthly (DATETIME2(3))
|
||||
AS RANGE RIGHT FOR VALUES (
|
||||
'2026-01-01T00:00:00.000', '2026-02-01T00:00:00.000', '2026-03-01T00:00:00.000',
|
||||
'2026-04-01T00:00:00.000', '2026-05-01T00:00:00.000', '2026-06-01T00:00:00.000',
|
||||
'2026-07-01T00:00:00.000', '2026-08-01T00:00:00.000', '2026-09-01T00:00:00.000',
|
||||
'2026-10-01T00:00:00.000', '2026-11-01T00:00:00.000', '2026-12-01T00:00:00.000',
|
||||
'2027-01-01T00:00:00.000', '2027-02-01T00:00:00.000'
|
||||
);
|
||||
PRINT 'Partition function pf_SecurityEvent_Monthly created.';
|
||||
END
|
||||
ELSE
|
||||
PRINT 'Partition function pf_SecurityEvent_Monthly already exists — skip.';
|
||||
GO
|
||||
|
||||
IF NOT EXISTS (SELECT 1 FROM sys.partition_schemes WHERE name = 'ps_SecurityEvent_Monthly')
|
||||
BEGIN
|
||||
CREATE PARTITION SCHEME ps_SecurityEvent_Monthly
|
||||
AS PARTITION pf_SecurityEvent_Monthly ALL TO ([AUDIT_HOT]);
|
||||
PRINT 'Partition scheme ps_SecurityEvent_Monthly created.';
|
||||
END
|
||||
ELSE
|
||||
PRINT 'Partition scheme ps_SecurityEvent_Monthly already exists — skip.';
|
||||
GO
|
||||
|
||||
-- ═══════════════════════════════════════════════════════════════════════
|
||||
-- 3. dbo.AuditEvent (eventos de dominio, retention 10 años)
|
||||
-- ═══════════════════════════════════════════════════════════════════════
|
||||
|
||||
IF OBJECT_ID(N'dbo.AuditEvent', N'U') IS NULL
|
||||
BEGIN
|
||||
CREATE TABLE dbo.AuditEvent (
|
||||
Id BIGINT IDENTITY(1,1) NOT NULL,
|
||||
OccurredAt DATETIME2(3) NOT NULL CONSTRAINT DF_AuditEvent_OccurredAt DEFAULT(SYSUTCDATETIME()),
|
||||
ActorUserId INT NULL, -- NULL solo para eventos del sistema (jobs)
|
||||
ActorRoleId INT NULL, -- rol efectivo al momento del evento (denormalizado)
|
||||
Action VARCHAR(100) NOT NULL, -- "usuario.create", "cliente.deactivate"
|
||||
TargetType VARCHAR(50) NOT NULL, -- "Usuario", "Cliente", "Factura"
|
||||
TargetId VARCHAR(100) NOT NULL, -- PK del target como string (soporta INT/GUID)
|
||||
CorrelationId UNIQUEIDENTIFIER NULL, -- linkea eventos de una misma operación
|
||||
IpAddress VARCHAR(45) NULL, -- IPv4/IPv6
|
||||
UserAgent VARCHAR(500) NULL,
|
||||
Metadata NVARCHAR(MAX) NULL, -- JSON libre (ya sanitizado por la app)
|
||||
CONSTRAINT PK_AuditEvent PRIMARY KEY CLUSTERED (OccurredAt, Id)
|
||||
ON ps_AuditEvent_Monthly(OccurredAt),
|
||||
CONSTRAINT CK_AuditEvent_Action CHECK (Action LIKE '%.%'),
|
||||
CONSTRAINT CK_AuditEvent_Metadata CHECK (Metadata IS NULL OR ISJSON(Metadata) = 1)
|
||||
) ON ps_AuditEvent_Monthly(OccurredAt);
|
||||
PRINT 'Table dbo.AuditEvent created (partitioned monthly on OccurredAt).';
|
||||
END
|
||||
ELSE
|
||||
PRINT 'Table dbo.AuditEvent already exists — skip.';
|
||||
GO
|
||||
|
||||
-- Índices (cubren 95% de queries: actor / target / action / correlation)
|
||||
IF NOT EXISTS (SELECT 1 FROM sys.indexes WHERE name = 'IX_AuditEvent_Actor' AND object_id = OBJECT_ID('dbo.AuditEvent'))
|
||||
BEGIN
|
||||
CREATE NONCLUSTERED INDEX IX_AuditEvent_Actor
|
||||
ON dbo.AuditEvent(ActorUserId, OccurredAt DESC)
|
||||
INCLUDE (Action, TargetType, TargetId, CorrelationId)
|
||||
WITH (DATA_COMPRESSION = PAGE)
|
||||
ON ps_AuditEvent_Monthly(OccurredAt);
|
||||
PRINT 'Index IX_AuditEvent_Actor created.';
|
||||
END
|
||||
GO
|
||||
|
||||
IF NOT EXISTS (SELECT 1 FROM sys.indexes WHERE name = 'IX_AuditEvent_Target' AND object_id = OBJECT_ID('dbo.AuditEvent'))
|
||||
BEGIN
|
||||
CREATE NONCLUSTERED INDEX IX_AuditEvent_Target
|
||||
ON dbo.AuditEvent(TargetType, TargetId, OccurredAt DESC)
|
||||
INCLUDE (ActorUserId, Action, CorrelationId)
|
||||
WITH (DATA_COMPRESSION = PAGE)
|
||||
ON ps_AuditEvent_Monthly(OccurredAt);
|
||||
PRINT 'Index IX_AuditEvent_Target created.';
|
||||
END
|
||||
GO
|
||||
|
||||
IF NOT EXISTS (SELECT 1 FROM sys.indexes WHERE name = 'IX_AuditEvent_Action' AND object_id = OBJECT_ID('dbo.AuditEvent'))
|
||||
BEGIN
|
||||
CREATE NONCLUSTERED INDEX IX_AuditEvent_Action
|
||||
ON dbo.AuditEvent(Action, OccurredAt DESC)
|
||||
INCLUDE (ActorUserId, TargetType, TargetId)
|
||||
WITH (DATA_COMPRESSION = PAGE)
|
||||
ON ps_AuditEvent_Monthly(OccurredAt);
|
||||
PRINT 'Index IX_AuditEvent_Action created.';
|
||||
END
|
||||
GO
|
||||
|
||||
IF NOT EXISTS (SELECT 1 FROM sys.indexes WHERE name = 'IX_AuditEvent_Correlation' AND object_id = OBJECT_ID('dbo.AuditEvent'))
|
||||
BEGIN
|
||||
CREATE NONCLUSTERED INDEX IX_AuditEvent_Correlation
|
||||
ON dbo.AuditEvent(CorrelationId)
|
||||
WHERE CorrelationId IS NOT NULL
|
||||
ON ps_AuditEvent_Monthly(OccurredAt);
|
||||
PRINT 'Index IX_AuditEvent_Correlation (filtered) created.';
|
||||
END
|
||||
GO
|
||||
|
||||
-- ═══════════════════════════════════════════════════════════════════════
|
||||
-- 4. dbo.SecurityEvent (eventos de seguridad, retention 5 años)
|
||||
-- ═══════════════════════════════════════════════════════════════════════
|
||||
|
||||
IF OBJECT_ID(N'dbo.SecurityEvent', N'U') IS NULL
|
||||
BEGIN
|
||||
CREATE TABLE dbo.SecurityEvent (
|
||||
Id BIGINT IDENTITY(1,1) NOT NULL,
|
||||
OccurredAt DATETIME2(3) NOT NULL CONSTRAINT DF_SecurityEvent_OccurredAt DEFAULT(SYSUTCDATETIME()),
|
||||
ActorUserId INT NULL, -- NULL si login falló y user no existe
|
||||
AttemptedUsername VARCHAR(256) NULL, -- para login failures
|
||||
SessionId UNIQUEIDENTIFIER NULL,
|
||||
Action VARCHAR(100) NOT NULL, -- "login", "logout", "refresh.reuse_detected", "permission.denied"
|
||||
Result VARCHAR(20) NOT NULL, -- "success" | "failure"
|
||||
FailureReason VARCHAR(200) NULL, -- "invalid_password", "account_locked"
|
||||
IpAddress VARCHAR(45) NULL,
|
||||
UserAgent VARCHAR(500) NULL,
|
||||
Metadata NVARCHAR(MAX) NULL,
|
||||
CONSTRAINT PK_SecurityEvent PRIMARY KEY CLUSTERED (OccurredAt, Id)
|
||||
ON ps_SecurityEvent_Monthly(OccurredAt),
|
||||
CONSTRAINT CK_SecurityEvent_Result CHECK (Result IN ('success','failure')),
|
||||
CONSTRAINT CK_SecurityEvent_Metadata CHECK (Metadata IS NULL OR ISJSON(Metadata) = 1)
|
||||
) ON ps_SecurityEvent_Monthly(OccurredAt);
|
||||
PRINT 'Table dbo.SecurityEvent created (partitioned monthly on OccurredAt).';
|
||||
END
|
||||
ELSE
|
||||
PRINT 'Table dbo.SecurityEvent already exists — skip.';
|
||||
GO
|
||||
|
||||
IF NOT EXISTS (SELECT 1 FROM sys.indexes WHERE name = 'IX_SecurityEvent_Actor' AND object_id = OBJECT_ID('dbo.SecurityEvent'))
|
||||
BEGIN
|
||||
CREATE NONCLUSTERED INDEX IX_SecurityEvent_Actor
|
||||
ON dbo.SecurityEvent(ActorUserId, OccurredAt DESC)
|
||||
INCLUDE (Action, Result, SessionId)
|
||||
WITH (DATA_COMPRESSION = PAGE)
|
||||
ON ps_SecurityEvent_Monthly(OccurredAt);
|
||||
PRINT 'Index IX_SecurityEvent_Actor created.';
|
||||
END
|
||||
GO
|
||||
|
||||
IF NOT EXISTS (SELECT 1 FROM sys.indexes WHERE name = 'IX_SecurityEvent_Action_Result' AND object_id = OBJECT_ID('dbo.SecurityEvent'))
|
||||
BEGIN
|
||||
CREATE NONCLUSTERED INDEX IX_SecurityEvent_Action_Result
|
||||
ON dbo.SecurityEvent(Action, Result, OccurredAt DESC)
|
||||
INCLUDE (ActorUserId, IpAddress)
|
||||
WITH (DATA_COMPRESSION = PAGE)
|
||||
ON ps_SecurityEvent_Monthly(OccurredAt);
|
||||
PRINT 'Index IX_SecurityEvent_Action_Result created.';
|
||||
END
|
||||
GO
|
||||
|
||||
IF NOT EXISTS (SELECT 1 FROM sys.indexes WHERE name = 'IX_SecurityEvent_Ip_Failure' AND object_id = OBJECT_ID('dbo.SecurityEvent'))
|
||||
BEGIN
|
||||
CREATE NONCLUSTERED INDEX IX_SecurityEvent_Ip_Failure
|
||||
ON dbo.SecurityEvent(IpAddress, OccurredAt DESC)
|
||||
WHERE Result = 'failure'
|
||||
ON ps_SecurityEvent_Monthly(OccurredAt);
|
||||
PRINT 'Index IX_SecurityEvent_Ip_Failure (filtered) created.';
|
||||
END
|
||||
GO
|
||||
|
||||
-- ═══════════════════════════════════════════════════════════════════════
|
||||
-- 5. SYSTEM_VERSIONING — Usuario, Rol, Permiso, RolPermiso
|
||||
-- ═══════════════════════════════════════════════════════════════════════
|
||||
-- Patrón: (a) agregar PERIOD FOR SYSTEM_TIME con columnas HIDDEN,
|
||||
-- (b) activar SYSTEM_VERSIONING con HISTORY_RETENTION_PERIOD 10 YEARS,
|
||||
-- (c) rebuild history con PAGE compression.
|
||||
-- Tablas con datos: los registros existentes reciben ValidFrom = instante del ALTER.
|
||||
|
||||
-- ─── Usuario ───────────────────────────────────────────────────────────
|
||||
IF COL_LENGTH('dbo.Usuario', 'ValidFrom') IS NULL
|
||||
BEGIN
|
||||
ALTER TABLE dbo.Usuario
|
||||
ADD
|
||||
ValidFrom DATETIME2(3) GENERATED ALWAYS AS ROW START HIDDEN NOT NULL
|
||||
CONSTRAINT DF_Usuario_ValidFrom DEFAULT(SYSUTCDATETIME()),
|
||||
ValidTo DATETIME2(3) GENERATED ALWAYS AS ROW END HIDDEN NOT NULL
|
||||
CONSTRAINT DF_Usuario_ValidTo DEFAULT(CONVERT(DATETIME2(3), '9999-12-31 23:59:59.999')),
|
||||
PERIOD FOR SYSTEM_TIME (ValidFrom, ValidTo);
|
||||
PRINT 'Usuario: PERIOD FOR SYSTEM_TIME added.';
|
||||
END
|
||||
GO
|
||||
|
||||
IF NOT EXISTS (SELECT 1 FROM sys.tables WHERE object_id = OBJECT_ID('dbo.Usuario') AND temporal_type = 2)
|
||||
BEGIN
|
||||
ALTER TABLE dbo.Usuario
|
||||
SET (SYSTEM_VERSIONING = ON (
|
||||
HISTORY_TABLE = dbo.Usuario_History,
|
||||
HISTORY_RETENTION_PERIOD = 10 YEARS
|
||||
));
|
||||
PRINT 'Usuario: SYSTEM_VERSIONING = ON (history: dbo.Usuario_History, retention: 10 years).';
|
||||
END
|
||||
ELSE
|
||||
PRINT 'Usuario: SYSTEM_VERSIONING already ON — skip.';
|
||||
GO
|
||||
|
||||
IF EXISTS (SELECT 1 FROM sys.tables WHERE name = 'Usuario_History' AND schema_id = SCHEMA_ID('dbo'))
|
||||
AND NOT EXISTS (
|
||||
SELECT 1 FROM sys.partitions p
|
||||
JOIN sys.tables t ON t.object_id = p.object_id
|
||||
WHERE t.name = 'Usuario_History' AND p.data_compression = 2
|
||||
)
|
||||
BEGIN
|
||||
ALTER TABLE dbo.Usuario_History REBUILD WITH (DATA_COMPRESSION = PAGE);
|
||||
PRINT 'Usuario_History: rebuilt with PAGE compression.';
|
||||
END
|
||||
GO
|
||||
|
||||
-- ─── Rol ───────────────────────────────────────────────────────────────
|
||||
IF COL_LENGTH('dbo.Rol', 'ValidFrom') IS NULL
|
||||
BEGIN
|
||||
ALTER TABLE dbo.Rol
|
||||
ADD
|
||||
ValidFrom DATETIME2(3) GENERATED ALWAYS AS ROW START HIDDEN NOT NULL
|
||||
CONSTRAINT DF_Rol_ValidFrom DEFAULT(SYSUTCDATETIME()),
|
||||
ValidTo DATETIME2(3) GENERATED ALWAYS AS ROW END HIDDEN NOT NULL
|
||||
CONSTRAINT DF_Rol_ValidTo DEFAULT(CONVERT(DATETIME2(3), '9999-12-31 23:59:59.999')),
|
||||
PERIOD FOR SYSTEM_TIME (ValidFrom, ValidTo);
|
||||
PRINT 'Rol: PERIOD FOR SYSTEM_TIME added.';
|
||||
END
|
||||
GO
|
||||
|
||||
IF NOT EXISTS (SELECT 1 FROM sys.tables WHERE object_id = OBJECT_ID('dbo.Rol') AND temporal_type = 2)
|
||||
BEGIN
|
||||
ALTER TABLE dbo.Rol
|
||||
SET (SYSTEM_VERSIONING = ON (
|
||||
HISTORY_TABLE = dbo.Rol_History,
|
||||
HISTORY_RETENTION_PERIOD = 10 YEARS
|
||||
));
|
||||
PRINT 'Rol: SYSTEM_VERSIONING = ON.';
|
||||
END
|
||||
GO
|
||||
|
||||
IF EXISTS (SELECT 1 FROM sys.tables WHERE name = 'Rol_History' AND schema_id = SCHEMA_ID('dbo'))
|
||||
AND NOT EXISTS (
|
||||
SELECT 1 FROM sys.partitions p JOIN sys.tables t ON t.object_id = p.object_id
|
||||
WHERE t.name = 'Rol_History' AND p.data_compression = 2
|
||||
)
|
||||
BEGIN
|
||||
ALTER TABLE dbo.Rol_History REBUILD WITH (DATA_COMPRESSION = PAGE);
|
||||
PRINT 'Rol_History: rebuilt with PAGE compression.';
|
||||
END
|
||||
GO
|
||||
|
||||
-- ─── Permiso ───────────────────────────────────────────────────────────
|
||||
IF COL_LENGTH('dbo.Permiso', 'ValidFrom') IS NULL
|
||||
BEGIN
|
||||
ALTER TABLE dbo.Permiso
|
||||
ADD
|
||||
ValidFrom DATETIME2(3) GENERATED ALWAYS AS ROW START HIDDEN NOT NULL
|
||||
CONSTRAINT DF_Permiso_ValidFrom DEFAULT(SYSUTCDATETIME()),
|
||||
ValidTo DATETIME2(3) GENERATED ALWAYS AS ROW END HIDDEN NOT NULL
|
||||
CONSTRAINT DF_Permiso_ValidTo DEFAULT(CONVERT(DATETIME2(3), '9999-12-31 23:59:59.999')),
|
||||
PERIOD FOR SYSTEM_TIME (ValidFrom, ValidTo);
|
||||
PRINT 'Permiso: PERIOD FOR SYSTEM_TIME added.';
|
||||
END
|
||||
GO
|
||||
|
||||
IF NOT EXISTS (SELECT 1 FROM sys.tables WHERE object_id = OBJECT_ID('dbo.Permiso') AND temporal_type = 2)
|
||||
BEGIN
|
||||
ALTER TABLE dbo.Permiso
|
||||
SET (SYSTEM_VERSIONING = ON (
|
||||
HISTORY_TABLE = dbo.Permiso_History,
|
||||
HISTORY_RETENTION_PERIOD = 10 YEARS
|
||||
));
|
||||
PRINT 'Permiso: SYSTEM_VERSIONING = ON.';
|
||||
END
|
||||
GO
|
||||
|
||||
IF EXISTS (SELECT 1 FROM sys.tables WHERE name = 'Permiso_History' AND schema_id = SCHEMA_ID('dbo'))
|
||||
AND NOT EXISTS (
|
||||
SELECT 1 FROM sys.partitions p JOIN sys.tables t ON t.object_id = p.object_id
|
||||
WHERE t.name = 'Permiso_History' AND p.data_compression = 2
|
||||
)
|
||||
BEGIN
|
||||
ALTER TABLE dbo.Permiso_History REBUILD WITH (DATA_COMPRESSION = PAGE);
|
||||
PRINT 'Permiso_History: rebuilt with PAGE compression.';
|
||||
END
|
||||
GO
|
||||
|
||||
-- ─── RolPermiso ────────────────────────────────────────────────────────
|
||||
IF COL_LENGTH('dbo.RolPermiso', 'ValidFrom') IS NULL
|
||||
BEGIN
|
||||
ALTER TABLE dbo.RolPermiso
|
||||
ADD
|
||||
ValidFrom DATETIME2(3) GENERATED ALWAYS AS ROW START HIDDEN NOT NULL
|
||||
CONSTRAINT DF_RolPermiso_ValidFrom DEFAULT(SYSUTCDATETIME()),
|
||||
ValidTo DATETIME2(3) GENERATED ALWAYS AS ROW END HIDDEN NOT NULL
|
||||
CONSTRAINT DF_RolPermiso_ValidTo DEFAULT(CONVERT(DATETIME2(3), '9999-12-31 23:59:59.999')),
|
||||
PERIOD FOR SYSTEM_TIME (ValidFrom, ValidTo);
|
||||
PRINT 'RolPermiso: PERIOD FOR SYSTEM_TIME added.';
|
||||
END
|
||||
GO
|
||||
|
||||
IF NOT EXISTS (SELECT 1 FROM sys.tables WHERE object_id = OBJECT_ID('dbo.RolPermiso') AND temporal_type = 2)
|
||||
BEGIN
|
||||
ALTER TABLE dbo.RolPermiso
|
||||
SET (SYSTEM_VERSIONING = ON (
|
||||
HISTORY_TABLE = dbo.RolPermiso_History,
|
||||
HISTORY_RETENTION_PERIOD = 10 YEARS
|
||||
));
|
||||
PRINT 'RolPermiso: SYSTEM_VERSIONING = ON.';
|
||||
END
|
||||
GO
|
||||
|
||||
IF EXISTS (SELECT 1 FROM sys.tables WHERE name = 'RolPermiso_History' AND schema_id = SCHEMA_ID('dbo'))
|
||||
AND NOT EXISTS (
|
||||
SELECT 1 FROM sys.partitions p JOIN sys.tables t ON t.object_id = p.object_id
|
||||
WHERE t.name = 'RolPermiso_History' AND p.data_compression = 2
|
||||
)
|
||||
BEGIN
|
||||
ALTER TABLE dbo.RolPermiso_History REBUILD WITH (DATA_COMPRESSION = PAGE);
|
||||
PRINT 'RolPermiso_History: rebuilt with PAGE compression.';
|
||||
END
|
||||
GO
|
||||
|
||||
PRINT '';
|
||||
PRINT 'V010 applied successfully — audit infrastructure + temporal tables active.';
|
||||
PRINT 'Next: runs in B2 onwards (Application.Audit abstractions).';
|
||||
GO
|
||||
149
tests/SIGCM2.Api.Tests/Audit/V010MigrationTests.cs
Normal file
149
tests/SIGCM2.Api.Tests/Audit/V010MigrationTests.cs
Normal file
@@ -0,0 +1,149 @@
|
||||
using Dapper;
|
||||
using FluentAssertions;
|
||||
using Microsoft.Data.SqlClient;
|
||||
using Xunit;
|
||||
|
||||
namespace SIGCM2.Api.Tests.Audit;
|
||||
|
||||
/// UDT-010 Batch 1 — V010 migration integration smoke tests.
|
||||
/// Validates:
|
||||
/// REQ-AUD-1: SYSTEM_VERSIONING active on catalog entities (smoke: Usuario + Usuario_History query).
|
||||
/// REQ-AUD-2: dbo.AuditEvent exists, accepts valid INSERT, CHECK constraints reject invalid data.
|
||||
/// REQ-SEC-1: dbo.SecurityEvent exists, CK_SecurityEvent_Result rejects invalid Result.
|
||||
public sealed class V010MigrationTests : IClassFixture<SIGCM2.TestSupport.TestWebAppFactory>
|
||||
{
|
||||
private const string ConnectionString =
|
||||
"Server=TECNICA3;Database=SIGCM2_Test;User Id=desarrollo;Password=desarrollo2026;TrustServerCertificate=True;";
|
||||
|
||||
public V010MigrationTests(SIGCM2.TestSupport.TestWebAppFactory _)
|
||||
{
|
||||
// Depend on the factory so SqlTestFixture.InitializeAsync runs (validates V010 applied + resets DB).
|
||||
}
|
||||
|
||||
[Fact]
|
||||
public async Task AuditEvent_Insert_WithValidData_Persists()
|
||||
{
|
||||
await using var conn = new SqlConnection(ConnectionString);
|
||||
await conn.OpenAsync();
|
||||
|
||||
var correlationId = Guid.NewGuid();
|
||||
var insertedId = await conn.ExecuteScalarAsync<long>("""
|
||||
INSERT INTO dbo.AuditEvent (ActorUserId, Action, TargetType, TargetId, CorrelationId, Metadata)
|
||||
VALUES (@ActorUserId, @Action, @TargetType, @TargetId, @CorrelationId, @Metadata);
|
||||
SELECT CAST(SCOPE_IDENTITY() AS BIGINT);
|
||||
""",
|
||||
new
|
||||
{
|
||||
ActorUserId = 1,
|
||||
Action = "usuario.create",
|
||||
TargetType = "Usuario",
|
||||
TargetId = "42",
|
||||
CorrelationId = correlationId,
|
||||
Metadata = """{"after":{"username":"juan"}}"""
|
||||
});
|
||||
|
||||
insertedId.Should().BeGreaterThan(0);
|
||||
|
||||
var roundtrip = await conn.QuerySingleAsync<(string Action, string TargetType, string TargetId, Guid? CorrelationId)>(
|
||||
"SELECT Action, TargetType, TargetId, CorrelationId FROM dbo.AuditEvent WHERE Id = @Id",
|
||||
new { Id = insertedId });
|
||||
roundtrip.Action.Should().Be("usuario.create");
|
||||
roundtrip.TargetType.Should().Be("Usuario");
|
||||
roundtrip.TargetId.Should().Be("42");
|
||||
roundtrip.CorrelationId.Should().Be(correlationId);
|
||||
}
|
||||
|
||||
[Fact]
|
||||
public async Task AuditEvent_Insert_WithInvalidActionFormat_FailsCheckConstraint()
|
||||
{
|
||||
await using var conn = new SqlConnection(ConnectionString);
|
||||
await conn.OpenAsync();
|
||||
|
||||
var act = async () => await conn.ExecuteAsync("""
|
||||
INSERT INTO dbo.AuditEvent (ActorUserId, Action, TargetType, TargetId)
|
||||
VALUES (1, 'invalid_no_dot', 'Usuario', '1');
|
||||
""");
|
||||
|
||||
await act.Should().ThrowAsync<SqlException>()
|
||||
.Where(e => e.Message.Contains("CK_AuditEvent_Action"));
|
||||
}
|
||||
|
||||
[Fact]
|
||||
public async Task AuditEvent_Insert_WithNonJsonMetadata_FailsCheckConstraint()
|
||||
{
|
||||
await using var conn = new SqlConnection(ConnectionString);
|
||||
await conn.OpenAsync();
|
||||
|
||||
var act = async () => await conn.ExecuteAsync("""
|
||||
INSERT INTO dbo.AuditEvent (ActorUserId, Action, TargetType, TargetId, Metadata)
|
||||
VALUES (1, 'usuario.create', 'Usuario', '1', 'not-json');
|
||||
""");
|
||||
|
||||
await act.Should().ThrowAsync<SqlException>()
|
||||
.Where(e => e.Message.Contains("CK_AuditEvent_Metadata"));
|
||||
}
|
||||
|
||||
[Fact]
|
||||
public async Task SecurityEvent_Insert_WithInvalidResult_FailsCheckConstraint()
|
||||
{
|
||||
await using var conn = new SqlConnection(ConnectionString);
|
||||
await conn.OpenAsync();
|
||||
|
||||
var act = async () => await conn.ExecuteAsync("""
|
||||
INSERT INTO dbo.SecurityEvent (ActorUserId, Action, Result)
|
||||
VALUES (1, 'login', 'neutral');
|
||||
""");
|
||||
|
||||
await act.Should().ThrowAsync<SqlException>()
|
||||
.Where(e => e.Message.Contains("CK_SecurityEvent_Result"));
|
||||
}
|
||||
|
||||
[Fact]
|
||||
public async Task Usuario_SystemVersioning_IsActive_And_TemporalQueryReturnsHistory()
|
||||
{
|
||||
await using var conn = new SqlConnection(ConnectionString);
|
||||
await conn.OpenAsync();
|
||||
|
||||
// Seed: insert a scratch user and wait long enough for ValidFrom to be in the past
|
||||
var username = "b1spike_" + Guid.NewGuid().ToString("N")[..8];
|
||||
var newId = await conn.ExecuteScalarAsync<int>("""
|
||||
INSERT INTO dbo.Usuario (Username, PasswordHash, Nombre, Apellido, Rol, PermisosJson)
|
||||
VALUES (@u, 'hash', 'Temp', 'User', 'admin', '{"grant":[],"deny":[]}');
|
||||
SELECT CAST(SCOPE_IDENTITY() AS INT);
|
||||
""", new { u = username });
|
||||
|
||||
// Capture a timestamp *after* creation but *before* update
|
||||
await Task.Delay(50);
|
||||
var snapshotTime = DateTime.UtcNow;
|
||||
await Task.Delay(50);
|
||||
|
||||
// Update the email
|
||||
await conn.ExecuteAsync(
|
||||
"UPDATE dbo.Usuario SET Email = @e WHERE Id = @id",
|
||||
new { e = "new@example.com", id = newId });
|
||||
|
||||
// Temporal query: state at snapshotTime should NOT yet have the new email
|
||||
var historicalEmail = await conn.ExecuteScalarAsync<string?>("""
|
||||
SELECT Email FROM dbo.Usuario
|
||||
FOR SYSTEM_TIME AS OF @ts
|
||||
WHERE Id = @id
|
||||
""", new { ts = snapshotTime, id = newId });
|
||||
|
||||
historicalEmail.Should().BeNull("the historical snapshot predates the email update");
|
||||
|
||||
// Current state HAS the new email
|
||||
var currentEmail = await conn.ExecuteScalarAsync<string?>(
|
||||
"SELECT Email FROM dbo.Usuario WHERE Id = @id",
|
||||
new { id = newId });
|
||||
currentEmail.Should().Be("new@example.com");
|
||||
|
||||
// Usuario_History must have at least one row for this user
|
||||
var historyCount = await conn.ExecuteScalarAsync<int>(
|
||||
"SELECT COUNT(*) FROM dbo.Usuario_History WHERE Id = @id",
|
||||
new { id = newId });
|
||||
historyCount.Should().BeGreaterThan(0);
|
||||
|
||||
// Cleanup: Respawn will reset between test runs, but this test could run alone — best-effort delete.
|
||||
await conn.ExecuteAsync("DELETE FROM dbo.Usuario WHERE Id = @id", new { id = newId });
|
||||
}
|
||||
}
|
||||
@@ -32,16 +32,25 @@ public sealed class SqlTestFixture : IAsyncLifetime
|
||||
// V009: update PermisosJson DEFAULT constraint and migrate legacy rows
|
||||
await EnsureV009SchemaAsync();
|
||||
|
||||
// V010 (UDT-010): verify audit infrastructure + temporal tables are active.
|
||||
// Applied manually via: sqlcmd ... -i database/migrations/V010__audit_infrastructure.sql
|
||||
await EnsureV010SchemaAsync();
|
||||
|
||||
_respawner = await Respawner.CreateAsync(_connection, new RespawnerOptions
|
||||
{
|
||||
DbAdapter = DbAdapter.SqlServer,
|
||||
// Rol is a lookup table seeded by migration V003 — never wipe or Usuario FK breaks.
|
||||
// Permiso and RolPermiso are seeded by V005/V006 — never wipe or integration tests lose the permission catalog.
|
||||
// *_History tables: UDT-010 system-versioned — Respawn cannot DELETE them directly (engine rejects).
|
||||
TablesToIgnore =
|
||||
[
|
||||
new Respawn.Graph.Table("dbo", "Rol"),
|
||||
new Respawn.Graph.Table("dbo", "Permiso"),
|
||||
new Respawn.Graph.Table("dbo", "RolPermiso"),
|
||||
new Respawn.Graph.Table("dbo", "Usuario_History"),
|
||||
new Respawn.Graph.Table("dbo", "Rol_History"),
|
||||
new Respawn.Graph.Table("dbo", "Permiso_History"),
|
||||
new Respawn.Graph.Table("dbo", "RolPermiso_History"),
|
||||
]
|
||||
});
|
||||
|
||||
@@ -232,6 +241,29 @@ public sealed class SqlTestFixture : IAsyncLifetime
|
||||
await _connection.ExecuteAsync(sql);
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// UDT-010 (V010): verifies that the audit infrastructure is present.
|
||||
/// Does NOT re-apply the migration (the ALTER DATABASE ADD FILEGROUP/FILE + partition
|
||||
/// function/scheme creation requires the full script). If missing, fails with a clear
|
||||
/// message pointing to the migration script.
|
||||
/// </summary>
|
||||
private async Task EnsureV010SchemaAsync()
|
||||
{
|
||||
const string check = """
|
||||
SELECT
|
||||
CAST(CASE WHEN OBJECT_ID('dbo.AuditEvent','U') IS NULL THEN 0 ELSE 1 END AS BIT) AS HasAuditEvent,
|
||||
CAST(CASE WHEN OBJECT_ID('dbo.SecurityEvent','U') IS NULL THEN 0 ELSE 1 END AS BIT) AS HasSecurityEvent,
|
||||
CAST(CASE WHEN EXISTS (SELECT 1 FROM sys.tables WHERE object_id = OBJECT_ID('dbo.Usuario') AND temporal_type = 2) THEN 1 ELSE 0 END AS BIT) AS UsuarioVersioned
|
||||
""";
|
||||
var result = await _connection.QuerySingleAsync<(bool HasAuditEvent, bool HasSecurityEvent, bool UsuarioVersioned)>(check);
|
||||
if (!result.HasAuditEvent || !result.HasSecurityEvent || !result.UsuarioVersioned)
|
||||
{
|
||||
throw new InvalidOperationException(
|
||||
"V010 audit infrastructure is not applied in the test database. " +
|
||||
"Run: sqlcmd -S <server> -d SIGCM2_Test -U <user> -P <pass> -i database/migrations/V010__audit_infrastructure.sql");
|
||||
}
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Applies V009 schema changes idempotently to the test database.
|
||||
/// Mirrors V009__activate_permisos_overrides.sql.
|
||||
|
||||
Reference in New Issue
Block a user