2020-04-08 14:13:33 +05:30
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
|
|
require 'digest'
|
2023-01-13 00:05:48 +05:30
|
|
|
require 'msgpack'
|
2020-04-08 14:13:33 +05:30
|
|
|
|
|
|
|
module Gitlab
|
|
|
|
module SidekiqMiddleware
|
|
|
|
module DuplicateJobs
|
|
|
|
# This class defines an identifier of a job in a queue
|
|
|
|
# The identifier based on a job's class and arguments.
|
|
|
|
#
|
|
|
|
# As strategy decides when to keep track of the job in redis and when to
|
|
|
|
# remove it.
|
|
|
|
#
|
|
|
|
# Storing the deduplication key in redis can be done by calling `check!`
|
|
|
|
# check returns the `jid` of the job if it was scheduled, or the `jid` of
|
|
|
|
# the duplicate job if it was already scheduled
|
|
|
|
#
|
|
|
|
# When new jobs can be scheduled again, the strategy calls `#delete`.
|
|
|
|
class DuplicateJob
|
2021-11-11 11:23:49 +05:30
|
|
|
include Gitlab::Utils::StrongMemoize
|
|
|
|
|
2021-12-11 22:18:48 +05:30
|
|
|
DEFAULT_DUPLICATE_KEY_TTL = 6.hours
|
2020-06-23 00:09:42 +05:30
|
|
|
DEFAULT_STRATEGY = :until_executing
|
2021-09-04 01:27:46 +05:30
|
|
|
STRATEGY_NONE = :none
|
2021-11-11 11:23:49 +05:30
|
|
|
|
2020-04-08 14:13:33 +05:30
|
|
|
attr_reader :existing_jid
|
|
|
|
|
2020-06-23 00:09:42 +05:30
|
|
|
def initialize(job, queue_name)
|
2020-04-08 14:13:33 +05:30
|
|
|
@job = job
|
|
|
|
@queue_name = queue_name
|
|
|
|
end
|
|
|
|
|
|
|
|
# This will continue the middleware chain if the job should be scheduled
|
|
|
|
# It will return false if the job needs to be cancelled
|
|
|
|
def schedule(&block)
|
|
|
|
Strategies.for(strategy).new(self).schedule(job, &block)
|
|
|
|
end
|
|
|
|
|
|
|
|
# This will continue the server middleware chain if the job should be
|
|
|
|
# executed.
|
|
|
|
# It will return false if the job should not be executed.
|
|
|
|
def perform(&block)
|
|
|
|
Strategies.for(strategy).new(self).perform(job, &block)
|
|
|
|
end
|
|
|
|
|
|
|
|
# This method will return the jid that was set in redis
|
2021-12-11 22:18:48 +05:30
|
|
|
def check!(expiry = duplicate_key_ttl)
|
2023-01-13 00:05:48 +05:30
|
|
|
my_cookie = {
|
|
|
|
'jid' => jid,
|
|
|
|
'offsets' => {},
|
|
|
|
'wal_locations' => {},
|
|
|
|
'existing_wal_locations' => job_wal_locations
|
|
|
|
}
|
|
|
|
|
|
|
|
# There are 3 possible scenarios. In order of decreasing likelyhood:
|
|
|
|
# 1. SET NX succeeds.
|
|
|
|
# 2. SET NX fails, GET succeeds.
|
|
|
|
# 3. SET NX fails, the key expires and GET fails. In this case we must retry.
|
|
|
|
actual_cookie = {}
|
|
|
|
while actual_cookie.empty?
|
|
|
|
set_succeeded = with_redis { |r| r.set(cookie_key, my_cookie.to_msgpack, nx: true, ex: expiry) }
|
|
|
|
actual_cookie = set_succeeded ? my_cookie : get_cookie
|
2020-04-08 14:13:33 +05:30
|
|
|
end
|
|
|
|
|
2021-09-04 01:27:46 +05:30
|
|
|
job['idempotency_key'] = idempotency_key
|
|
|
|
|
2023-01-13 00:05:48 +05:30
|
|
|
self.existing_wal_locations = actual_cookie['existing_wal_locations']
|
|
|
|
self.existing_jid = actual_cookie['jid']
|
2020-04-08 14:13:33 +05:30
|
|
|
end
|
|
|
|
|
2021-11-11 11:23:49 +05:30
|
|
|
def update_latest_wal_location!
|
|
|
|
return unless job_wal_locations.present?
|
|
|
|
|
2023-01-13 00:05:48 +05:30
|
|
|
argv = []
|
|
|
|
job_wal_locations.each do |connection_name, location|
|
|
|
|
argv += [connection_name, pg_wal_lsn_diff(connection_name), location]
|
2021-11-11 11:23:49 +05:30
|
|
|
end
|
2023-01-13 00:05:48 +05:30
|
|
|
|
|
|
|
with_redis { |r| r.eval(UPDATE_WAL_COOKIE_SCRIPT, keys: [cookie_key], argv: argv) }
|
2021-11-11 11:23:49 +05:30
|
|
|
end
|
|
|
|
|
2023-01-13 00:05:48 +05:30
|
|
|
# Generally speaking, updating a Redis key by deserializing and
|
|
|
|
# serializing it on the Redis server is bad for performance. However in
|
|
|
|
# the case of DuplicateJobs we know that key updates are rare, and the
|
|
|
|
# most common operations are setting, getting and deleting the key. The
|
|
|
|
# aim of this design is to make the common operations as fast as
|
|
|
|
# possible.
|
|
|
|
UPDATE_WAL_COOKIE_SCRIPT = <<~LUA
|
|
|
|
local cookie_msgpack = redis.call("get", KEYS[1])
|
|
|
|
if not cookie_msgpack then
|
|
|
|
return
|
|
|
|
end
|
|
|
|
local cookie = cmsgpack.unpack(cookie_msgpack)
|
|
|
|
|
|
|
|
for i = 1, #ARGV, 3 do
|
|
|
|
local connection = ARGV[i]
|
|
|
|
local current_offset = cookie.offsets[connection]
|
|
|
|
local new_offset = tonumber(ARGV[i+1])
|
|
|
|
if not current_offset or current_offset < new_offset then
|
|
|
|
cookie.offsets[connection] = new_offset
|
|
|
|
cookie.wal_locations[connection] = ARGV[i+2]
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
redis.call("set", KEYS[1], cmsgpack.pack(cookie), "ex", redis.call("ttl", KEYS[1]))
|
|
|
|
LUA
|
|
|
|
|
2021-11-11 11:23:49 +05:30
|
|
|
def latest_wal_locations
|
|
|
|
return {} unless job_wal_locations.present?
|
|
|
|
|
|
|
|
strong_memoize(:latest_wal_locations) do
|
2023-01-13 00:05:48 +05:30
|
|
|
get_cookie.fetch('wal_locations', {})
|
2021-11-11 11:23:49 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-04-08 14:13:33 +05:30
|
|
|
def delete!
|
2023-01-13 00:05:48 +05:30
|
|
|
with_redis { |redis| redis.del(cookie_key) }
|
2020-04-08 14:13:33 +05:30
|
|
|
end
|
|
|
|
|
2021-12-11 22:18:48 +05:30
|
|
|
def reschedule
|
|
|
|
Gitlab::SidekiqLogging::DeduplicationLogger.instance.rescheduled_log(job)
|
|
|
|
|
|
|
|
worker_klass.perform_async(*arguments)
|
|
|
|
end
|
|
|
|
|
2020-06-23 00:09:42 +05:30
|
|
|
def scheduled?
|
|
|
|
scheduled_at.present?
|
|
|
|
end
|
|
|
|
|
2020-04-08 14:13:33 +05:30
|
|
|
def duplicate?
|
|
|
|
raise "Call `#check!` first to check for existing duplicates" unless existing_jid
|
|
|
|
|
|
|
|
jid != existing_jid
|
|
|
|
end
|
|
|
|
|
2021-12-11 22:18:48 +05:30
|
|
|
def set_deduplicated_flag!(expiry = duplicate_key_ttl)
|
|
|
|
return unless reschedulable?
|
|
|
|
|
2023-01-13 00:05:48 +05:30
|
|
|
with_redis { |redis| redis.eval(DEDUPLICATED_SCRIPT, keys: [cookie_key]) }
|
2021-12-11 22:18:48 +05:30
|
|
|
end
|
|
|
|
|
2023-01-13 00:05:48 +05:30
|
|
|
DEDUPLICATED_SCRIPT = <<~LUA
|
|
|
|
local cookie_msgpack = redis.call("get", KEYS[1])
|
|
|
|
if not cookie_msgpack then
|
|
|
|
return
|
2021-12-11 22:18:48 +05:30
|
|
|
end
|
2023-01-13 00:05:48 +05:30
|
|
|
local cookie = cmsgpack.unpack(cookie_msgpack)
|
|
|
|
cookie.deduplicated = "1"
|
2023-07-09 08:55:56 +05:30
|
|
|
local ttl = redis.call("ttl", KEYS[1])
|
|
|
|
if ttl > 0 then
|
|
|
|
redis.call("set", KEYS[1], cmsgpack.pack(cookie), "ex", ttl)
|
|
|
|
end
|
2023-01-13 00:05:48 +05:30
|
|
|
LUA
|
|
|
|
|
|
|
|
def should_reschedule?
|
|
|
|
reschedulable? && get_cookie['deduplicated'].present?
|
2021-12-11 22:18:48 +05:30
|
|
|
end
|
|
|
|
|
2020-06-23 00:09:42 +05:30
|
|
|
def scheduled_at
|
|
|
|
job['at']
|
|
|
|
end
|
|
|
|
|
|
|
|
def options
|
|
|
|
return {} unless worker_klass
|
|
|
|
return {} unless worker_klass.respond_to?(:get_deduplication_options)
|
|
|
|
|
|
|
|
worker_klass.get_deduplication_options
|
2020-04-08 14:13:33 +05:30
|
|
|
end
|
|
|
|
|
2021-02-22 17:27:13 +05:30
|
|
|
def idempotent?
|
|
|
|
return false unless worker_klass
|
|
|
|
return false unless worker_klass.respond_to?(:idempotent?)
|
|
|
|
|
|
|
|
worker_klass.idempotent?
|
|
|
|
end
|
|
|
|
|
2021-12-11 22:18:48 +05:30
|
|
|
def duplicate_key_ttl
|
|
|
|
options[:ttl] || DEFAULT_DUPLICATE_KEY_TTL
|
|
|
|
end
|
|
|
|
|
2020-04-08 14:13:33 +05:30
|
|
|
private
|
|
|
|
|
2021-11-18 22:05:49 +05:30
|
|
|
attr_writer :existing_wal_locations
|
2020-06-23 00:09:42 +05:30
|
|
|
attr_reader :queue_name, :job
|
2020-04-08 14:13:33 +05:30
|
|
|
attr_writer :existing_jid
|
|
|
|
|
2020-06-23 00:09:42 +05:30
|
|
|
def worker_klass
|
|
|
|
@worker_klass ||= worker_class_name.to_s.safe_constantize
|
|
|
|
end
|
|
|
|
|
2021-11-18 22:05:49 +05:30
|
|
|
def job_wal_locations
|
|
|
|
job['wal_locations'] || {}
|
|
|
|
end
|
|
|
|
|
2021-11-11 11:23:49 +05:30
|
|
|
def pg_wal_lsn_diff(connection_name)
|
2023-01-13 00:05:48 +05:30
|
|
|
model = Gitlab::Database.database_base_models[connection_name.to_sym]
|
2021-12-11 22:18:48 +05:30
|
|
|
|
|
|
|
model.connection.load_balancer.wal_diff(
|
|
|
|
job_wal_locations[connection_name],
|
|
|
|
existing_wal_locations[connection_name]
|
|
|
|
)
|
2021-11-11 11:23:49 +05:30
|
|
|
end
|
|
|
|
|
2020-06-23 00:09:42 +05:30
|
|
|
def strategy
|
|
|
|
return DEFAULT_STRATEGY unless worker_klass
|
|
|
|
return DEFAULT_STRATEGY unless worker_klass.respond_to?(:idempotent?)
|
2021-09-04 01:27:46 +05:30
|
|
|
return STRATEGY_NONE unless worker_klass.deduplication_enabled?
|
2020-06-23 00:09:42 +05:30
|
|
|
|
|
|
|
worker_klass.get_deduplicate_strategy
|
|
|
|
end
|
|
|
|
|
2020-04-08 14:13:33 +05:30
|
|
|
def worker_class_name
|
|
|
|
job['class']
|
|
|
|
end
|
|
|
|
|
|
|
|
def arguments
|
|
|
|
job['args']
|
|
|
|
end
|
|
|
|
|
|
|
|
def jid
|
|
|
|
job['jid']
|
|
|
|
end
|
|
|
|
|
2023-01-13 00:05:48 +05:30
|
|
|
def cookie_key
|
2023-06-20 00:43:36 +05:30
|
|
|
# This duplicates `Gitlab::Redis::Queues::SIDEKIQ_NAMESPACE` both here and in `#idempotency_key`
|
|
|
|
# This is because `Sidekiq.redis` used to add this prefix automatically through `redis-namespace`
|
|
|
|
# and we did not notice this in https://gitlab.com/gitlab-org/gitlab/-/merge_requests/25447
|
|
|
|
# Now we're keeping this as-is to avoid a key-migration when redis-namespace gets
|
|
|
|
# removed from Sidekiq: https://gitlab.com/groups/gitlab-com/gl-infra/-/epics/944
|
|
|
|
"#{Gitlab::Redis::Queues::SIDEKIQ_NAMESPACE}:#{idempotency_key}:cookie:v2"
|
2021-11-11 11:23:49 +05:30
|
|
|
end
|
|
|
|
|
2023-01-13 00:05:48 +05:30
|
|
|
def get_cookie
|
|
|
|
with_redis { |redis| MessagePack.unpack(redis.get(cookie_key) || "\x80") }
|
2021-11-11 11:23:49 +05:30
|
|
|
end
|
|
|
|
|
2020-04-08 14:13:33 +05:30
|
|
|
def idempotency_key
|
2021-09-04 01:27:46 +05:30
|
|
|
@idempotency_key ||= job['idempotency_key'] || "#{namespace}:#{idempotency_hash}"
|
2020-04-08 14:13:33 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
def idempotency_hash
|
|
|
|
Digest::SHA256.hexdigest(idempotency_string)
|
|
|
|
end
|
|
|
|
|
|
|
|
def namespace
|
|
|
|
"#{Gitlab::Redis::Queues::SIDEKIQ_NAMESPACE}:duplicate:#{queue_name}"
|
|
|
|
end
|
|
|
|
|
|
|
|
def idempotency_string
|
2021-09-30 23:02:18 +05:30
|
|
|
"#{worker_class_name}:#{Sidekiq.dump_json(arguments)}"
|
2020-04-08 14:13:33 +05:30
|
|
|
end
|
2021-11-11 11:23:49 +05:30
|
|
|
|
2021-11-18 22:05:49 +05:30
|
|
|
def existing_wal_locations
|
|
|
|
@existing_wal_locations ||= {}
|
2021-11-11 11:23:49 +05:30
|
|
|
end
|
|
|
|
|
2021-12-11 22:18:48 +05:30
|
|
|
def reschedulable?
|
|
|
|
!scheduled? && options[:if_deduplicated] == :reschedule_once
|
|
|
|
end
|
2022-07-23 23:45:48 +05:30
|
|
|
|
2023-04-23 21:23:45 +05:30
|
|
|
def with_redis(&block)
|
2023-06-20 00:43:36 +05:30
|
|
|
Gitlab::Redis::Queues.with(&block) # rubocop:disable Cop/RedisQueueUsage, CodeReuse/ActiveRecord
|
2022-07-23 23:45:48 +05:30
|
|
|
end
|
2020-04-08 14:13:33 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|