2023-04-23 21:23:45 +05:30
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
|
|
require 'spec_helper'
|
|
|
|
|
2023-05-27 22:25:52 +05:30
|
|
|
RSpec.describe Gitlab::Database::TablesLocker, :suppress_gitlab_schemas_validate_connection, :silence_stdout,
|
|
|
|
feature_category: :pods do
|
|
|
|
let(:default_lock_writes_manager) do
|
2023-04-23 21:23:45 +05:30
|
|
|
instance_double(Gitlab::Database::LockWritesManager, lock_writes: nil, unlock_writes: nil)
|
|
|
|
end
|
|
|
|
|
|
|
|
before do
|
2023-05-27 22:25:52 +05:30
|
|
|
allow(Gitlab::Database::LockWritesManager).to receive(:new).with(any_args).and_return(default_lock_writes_manager)
|
|
|
|
# Limiting the scope of the tests to a subset of the database tables
|
|
|
|
allow(Gitlab::Database::GitlabSchema).to receive(:tables_to_schema).and_return({
|
|
|
|
'application_setttings' => :gitlab_main_clusterwide,
|
|
|
|
'projects' => :gitlab_main,
|
|
|
|
'security_findings' => :gitlab_main,
|
|
|
|
'ci_builds' => :gitlab_ci,
|
|
|
|
'ci_jobs' => :gitlab_ci,
|
|
|
|
'loose_foreign_keys_deleted_records' => :gitlab_shared,
|
|
|
|
'ar_internal_metadata' => :gitlab_internal
|
|
|
|
})
|
2023-04-23 21:23:45 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
before(:all) do
|
2023-05-27 22:25:52 +05:30
|
|
|
create_partition_sql = <<~SQL
|
|
|
|
CREATE TABLE IF NOT EXISTS #{Gitlab::Database::DYNAMIC_PARTITIONS_SCHEMA}.security_findings_test_partition
|
|
|
|
PARTITION OF security_findings
|
|
|
|
FOR VALUES IN (0)
|
|
|
|
SQL
|
|
|
|
|
|
|
|
ApplicationRecord.connection.execute(create_partition_sql)
|
|
|
|
Ci::ApplicationRecord.connection.execute(create_partition_sql)
|
|
|
|
|
2023-04-23 21:23:45 +05:30
|
|
|
create_detached_partition_sql = <<~SQL
|
2023-05-27 22:25:52 +05:30
|
|
|
CREATE TABLE IF NOT EXISTS #{Gitlab::Database::DYNAMIC_PARTITIONS_SCHEMA}._test_gitlab_main_part_202201 (
|
2023-04-23 21:23:45 +05:30
|
|
|
id bigserial primary key not null
|
|
|
|
)
|
|
|
|
SQL
|
|
|
|
|
|
|
|
ApplicationRecord.connection.execute(create_detached_partition_sql)
|
|
|
|
Ci::ApplicationRecord.connection.execute(create_detached_partition_sql)
|
|
|
|
|
|
|
|
Gitlab::Database::SharedModel.using_connection(ApplicationRecord.connection) do
|
|
|
|
Postgresql::DetachedPartition.create!(
|
|
|
|
table_name: '_test_gitlab_main_part_20220101',
|
|
|
|
drop_after: Time.current
|
|
|
|
)
|
|
|
|
end
|
2023-05-27 22:25:52 +05:30
|
|
|
Gitlab::Database::SharedModel.using_connection(Ci::ApplicationRecord.connection) do
|
|
|
|
Postgresql::DetachedPartition.create!(
|
|
|
|
table_name: '_test_gitlab_main_part_20220101',
|
|
|
|
drop_after: Time.current
|
|
|
|
)
|
|
|
|
end
|
2023-04-23 21:23:45 +05:30
|
|
|
end
|
|
|
|
|
2023-05-27 22:25:52 +05:30
|
|
|
shared_examples "lock tables" do |gitlab_schema, database_name|
|
|
|
|
let(:connection) { Gitlab::Database.database_base_models[database_name].connection }
|
|
|
|
let(:tables_to_lock) do
|
|
|
|
Gitlab::Database::GitlabSchema
|
|
|
|
.tables_to_schema.filter_map { |table_name, schema| table_name if schema == gitlab_schema }
|
|
|
|
end
|
2023-04-23 21:23:45 +05:30
|
|
|
|
2023-05-27 22:25:52 +05:30
|
|
|
it "locks table in schema #{gitlab_schema} and database #{database_name}" do
|
|
|
|
expect(tables_to_lock).not_to be_empty
|
2023-04-23 21:23:45 +05:30
|
|
|
|
2023-05-27 22:25:52 +05:30
|
|
|
tables_to_lock.each do |table_name|
|
|
|
|
lock_writes_manager = instance_double(Gitlab::Database::LockWritesManager, lock_writes: nil)
|
|
|
|
|
|
|
|
expect(Gitlab::Database::LockWritesManager).to receive(:new).with(
|
|
|
|
table_name: table_name,
|
|
|
|
connection: connection,
|
|
|
|
database_name: database_name,
|
|
|
|
with_retries: true,
|
|
|
|
logger: anything,
|
|
|
|
dry_run: anything
|
|
|
|
).once.and_return(lock_writes_manager)
|
|
|
|
expect(lock_writes_manager).to receive(:lock_writes).once
|
|
|
|
end
|
|
|
|
|
|
|
|
subject
|
2023-04-23 21:23:45 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2023-05-27 22:25:52 +05:30
|
|
|
shared_examples "unlock tables" do |gitlab_schema, database_name|
|
|
|
|
let(:connection) { Gitlab::Database.database_base_models[database_name].connection }
|
|
|
|
|
|
|
|
let(:tables_to_unlock) do
|
2023-04-23 21:23:45 +05:30
|
|
|
Gitlab::Database::GitlabSchema
|
2023-05-27 22:25:52 +05:30
|
|
|
.tables_to_schema.filter_map { |table_name, schema| table_name if schema == gitlab_schema }
|
|
|
|
end
|
|
|
|
|
|
|
|
it "unlocks table in schema #{gitlab_schema} and database #{database_name}" do
|
|
|
|
expect(tables_to_unlock).not_to be_empty
|
|
|
|
|
|
|
|
tables_to_unlock.each do |table_name|
|
|
|
|
lock_writes_manager = instance_double(Gitlab::Database::LockWritesManager, unlock_writes: nil)
|
|
|
|
|
|
|
|
expect(Gitlab::Database::LockWritesManager).to receive(:new).with(
|
|
|
|
table_name: table_name,
|
|
|
|
connection: anything,
|
|
|
|
database_name: database_name,
|
|
|
|
with_retries: true,
|
|
|
|
logger: anything,
|
|
|
|
dry_run: anything
|
|
|
|
).once.and_return(lock_writes_manager)
|
|
|
|
expect(lock_writes_manager).to receive(:unlock_writes)
|
|
|
|
end
|
|
|
|
|
|
|
|
subject
|
2023-04-23 21:23:45 +05:30
|
|
|
end
|
2023-05-27 22:25:52 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
shared_examples "lock partitions" do |partition_identifier, database_name|
|
|
|
|
let(:connection) { Gitlab::Database.database_base_models[database_name].connection }
|
2023-04-23 21:23:45 +05:30
|
|
|
|
2023-05-27 22:25:52 +05:30
|
|
|
it 'locks the partition' do
|
|
|
|
lock_writes_manager = instance_double(Gitlab::Database::LockWritesManager, lock_writes: nil)
|
2023-04-23 21:23:45 +05:30
|
|
|
|
|
|
|
expect(Gitlab::Database::LockWritesManager).to receive(:new).with(
|
2023-05-27 22:25:52 +05:30
|
|
|
table_name: partition_identifier,
|
|
|
|
connection: connection,
|
|
|
|
database_name: database_name,
|
2023-04-23 21:23:45 +05:30
|
|
|
with_retries: true,
|
|
|
|
logger: anything,
|
|
|
|
dry_run: anything
|
|
|
|
).once.and_return(lock_writes_manager)
|
|
|
|
expect(lock_writes_manager).to receive(:lock_writes)
|
|
|
|
|
|
|
|
subject
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2023-05-27 22:25:52 +05:30
|
|
|
shared_examples "unlock partitions" do |partition_identifier, database_name|
|
|
|
|
let(:connection) { Gitlab::Database.database_base_models[database_name].connection }
|
2023-04-23 21:23:45 +05:30
|
|
|
|
2023-05-27 22:25:52 +05:30
|
|
|
it 'unlocks the partition' do
|
|
|
|
lock_writes_manager = instance_double(Gitlab::Database::LockWritesManager, unlock_writes: nil)
|
2023-04-23 21:23:45 +05:30
|
|
|
|
|
|
|
expect(Gitlab::Database::LockWritesManager).to receive(:new).with(
|
2023-05-27 22:25:52 +05:30
|
|
|
table_name: partition_identifier,
|
|
|
|
connection: connection,
|
|
|
|
database_name: database_name,
|
2023-04-23 21:23:45 +05:30
|
|
|
with_retries: true,
|
|
|
|
logger: anything,
|
|
|
|
dry_run: anything
|
|
|
|
).once.and_return(lock_writes_manager)
|
|
|
|
expect(lock_writes_manager).to receive(:unlock_writes)
|
|
|
|
|
|
|
|
subject
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when running on single database' do
|
|
|
|
before do
|
|
|
|
skip_if_multiple_databases_are_setup(:ci)
|
|
|
|
end
|
|
|
|
|
|
|
|
describe '#lock_writes' do
|
|
|
|
subject { described_class.new.lock_writes }
|
|
|
|
|
2023-05-27 22:25:52 +05:30
|
|
|
it 'does not lock any table' do
|
|
|
|
expect(Gitlab::Database::LockWritesManager).to receive(:new)
|
|
|
|
.with(any_args).and_return(default_lock_writes_manager)
|
|
|
|
expect(default_lock_writes_manager).not_to receive(:lock_writes)
|
2023-04-23 21:23:45 +05:30
|
|
|
|
|
|
|
subject
|
|
|
|
end
|
|
|
|
|
2023-05-27 22:25:52 +05:30
|
|
|
it_behaves_like 'unlock tables', :gitlab_main, 'main'
|
|
|
|
it_behaves_like 'unlock tables', :gitlab_ci, 'main'
|
|
|
|
it_behaves_like 'unlock tables', :gitlab_main_clusterwide, 'main'
|
|
|
|
it_behaves_like 'unlock tables', :gitlab_shared, 'main'
|
|
|
|
it_behaves_like 'unlock tables', :gitlab_internal, 'main'
|
2023-04-23 21:23:45 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
describe '#unlock_writes' do
|
|
|
|
subject { described_class.new.lock_writes }
|
|
|
|
|
|
|
|
it 'does call Gitlab::Database::LockWritesManager.unlock_writes' do
|
2023-05-27 22:25:52 +05:30
|
|
|
expect(Gitlab::Database::LockWritesManager).to receive(:new)
|
|
|
|
.with(any_args).and_return(default_lock_writes_manager)
|
|
|
|
expect(default_lock_writes_manager).to receive(:unlock_writes)
|
|
|
|
expect(default_lock_writes_manager).not_to receive(:lock_writes)
|
2023-04-23 21:23:45 +05:30
|
|
|
|
|
|
|
subject
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when running on multiple databases' do
|
|
|
|
before do
|
|
|
|
skip_if_multiple_databases_not_setup(:ci)
|
|
|
|
end
|
|
|
|
|
|
|
|
describe '#lock_writes' do
|
|
|
|
subject { described_class.new.lock_writes }
|
|
|
|
|
2023-05-27 22:25:52 +05:30
|
|
|
it_behaves_like 'lock tables', :gitlab_ci, 'main'
|
|
|
|
it_behaves_like 'lock tables', :gitlab_main, 'ci'
|
|
|
|
it_behaves_like 'lock tables', :gitlab_main_clusterwide, 'ci'
|
|
|
|
|
|
|
|
it_behaves_like 'unlock tables', :gitlab_main_clusterwide, 'main'
|
|
|
|
it_behaves_like 'unlock tables', :gitlab_main, 'main'
|
|
|
|
it_behaves_like 'unlock tables', :gitlab_ci, 'ci'
|
|
|
|
it_behaves_like 'unlock tables', :gitlab_shared, 'main'
|
|
|
|
it_behaves_like 'unlock tables', :gitlab_shared, 'ci'
|
|
|
|
it_behaves_like 'unlock tables', :gitlab_internal, 'main'
|
|
|
|
it_behaves_like 'unlock tables', :gitlab_internal, 'ci'
|
|
|
|
|
|
|
|
gitlab_main_partition = "#{Gitlab::Database::DYNAMIC_PARTITIONS_SCHEMA}.security_findings_test_partition"
|
|
|
|
it_behaves_like 'unlock partitions', gitlab_main_partition, 'main'
|
|
|
|
it_behaves_like 'lock partitions', gitlab_main_partition, 'ci'
|
|
|
|
|
|
|
|
gitlab_main_detached_partition = "#{Gitlab::Database::DYNAMIC_PARTITIONS_SCHEMA}._test_gitlab_main_part_20220101"
|
|
|
|
it_behaves_like 'unlock partitions', gitlab_main_detached_partition, 'main'
|
|
|
|
it_behaves_like 'lock partitions', gitlab_main_detached_partition, 'ci'
|
2023-04-23 21:23:45 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
describe '#unlock_writes' do
|
|
|
|
subject { described_class.new.unlock_writes }
|
|
|
|
|
2023-05-27 22:25:52 +05:30
|
|
|
it_behaves_like "unlock tables", :gitlab_ci, 'main'
|
|
|
|
it_behaves_like "unlock tables", :gitlab_main, 'ci'
|
|
|
|
it_behaves_like "unlock tables", :gitlab_main, 'main'
|
|
|
|
it_behaves_like "unlock tables", :gitlab_ci, 'ci'
|
|
|
|
it_behaves_like "unlock tables", :gitlab_shared, 'main'
|
|
|
|
it_behaves_like "unlock tables", :gitlab_shared, 'ci'
|
|
|
|
it_behaves_like "unlock tables", :gitlab_internal, 'main'
|
|
|
|
it_behaves_like "unlock tables", :gitlab_internal, 'ci'
|
|
|
|
|
|
|
|
gitlab_main_partition = "#{Gitlab::Database::DYNAMIC_PARTITIONS_SCHEMA}.security_findings_test_partition"
|
|
|
|
it_behaves_like 'unlock partitions', gitlab_main_partition, 'main'
|
|
|
|
it_behaves_like 'unlock partitions', gitlab_main_partition, 'ci'
|
|
|
|
|
|
|
|
gitlab_main_detached_partition = "#{Gitlab::Database::DYNAMIC_PARTITIONS_SCHEMA}._test_gitlab_main_part_20220101"
|
|
|
|
it_behaves_like 'unlock partitions', gitlab_main_detached_partition, 'main'
|
|
|
|
it_behaves_like 'unlock partitions', gitlab_main_detached_partition, 'ci'
|
2023-04-23 21:23:45 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
context 'when running in dry_run mode' do
|
|
|
|
subject { described_class.new(dry_run: true).lock_writes }
|
|
|
|
|
2023-05-27 22:25:52 +05:30
|
|
|
it 'passes dry_run flag to LockWritesManager' do
|
2023-04-23 21:23:45 +05:30
|
|
|
expect(Gitlab::Database::LockWritesManager).to receive(:new).with(
|
2023-05-27 22:25:52 +05:30
|
|
|
table_name: 'security_findings',
|
2023-04-23 21:23:45 +05:30
|
|
|
connection: anything,
|
|
|
|
database_name: 'ci',
|
|
|
|
with_retries: true,
|
|
|
|
logger: anything,
|
|
|
|
dry_run: true
|
2023-05-27 22:25:52 +05:30
|
|
|
).and_return(default_lock_writes_manager)
|
|
|
|
expect(default_lock_writes_manager).to receive(:lock_writes)
|
2023-04-23 21:23:45 +05:30
|
|
|
|
|
|
|
subject
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when running on multiple shared databases' do
|
|
|
|
subject { described_class.new.lock_writes }
|
|
|
|
|
|
|
|
before do
|
|
|
|
allow(::Gitlab::Database).to receive(:db_config_share_with).and_return(nil)
|
|
|
|
ci_db_config = Ci::ApplicationRecord.connection_db_config
|
|
|
|
allow(::Gitlab::Database).to receive(:db_config_share_with).with(ci_db_config).and_return('main')
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'does not lock any tables if the ci database is shared with main database' do
|
2023-05-27 22:25:52 +05:30
|
|
|
expect(Gitlab::Database::LockWritesManager).to receive(:new)
|
|
|
|
.with(any_args).and_return(default_lock_writes_manager)
|
|
|
|
expect(default_lock_writes_manager).not_to receive(:lock_writes)
|
2023-04-23 21:23:45 +05:30
|
|
|
|
|
|
|
subject
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when geo database is configured' do
|
|
|
|
let(:geo_table) do
|
|
|
|
Gitlab::Database::GitlabSchema
|
|
|
|
.tables_to_schema.filter_map { |table_name, schema| table_name if schema == :gitlab_geo }
|
|
|
|
.first
|
|
|
|
end
|
|
|
|
|
|
|
|
subject { described_class.new.unlock_writes }
|
|
|
|
|
|
|
|
before do
|
|
|
|
skip "Geo database is not configured" unless Gitlab::Database.has_config?(:geo)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'does not lock table in geo database' do
|
|
|
|
expect(Gitlab::Database::LockWritesManager).not_to receive(:new).with(
|
|
|
|
table_name: geo_table,
|
|
|
|
connection: anything,
|
|
|
|
database_name: 'geo',
|
|
|
|
with_retries: true,
|
|
|
|
logger: anything,
|
|
|
|
dry_run: anything
|
|
|
|
)
|
|
|
|
|
|
|
|
subject
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|