# frozen_string_literal: true module Ci class RetryJobService < ::BaseService include Gitlab::Utils::StrongMemoize def execute(job, variables: []) if job.retryable? job.ensure_scheduling_type! new_job = retry_job(job, variables: variables) ServiceResponse.success(payload: { job: new_job }) else ServiceResponse.error( message: 'Job cannot be retried', payload: { job: job, reason: :not_retryable } ) end end # rubocop: disable CodeReuse/ActiveRecord def clone!(job, variables: [], enqueue_if_actionable: false) # Cloning a job requires a strict type check to ensure # the attributes being used for the clone are taken straight # from the model and not overridden by other abstractions. raise TypeError unless job.instance_of?(Ci::Build) || job.instance_of?(Ci::Bridge) check_access!(job) new_job = job.clone(current_user: current_user, new_job_variables_attributes: variables) if Feature.enabled?(:ci_retry_job_fix, project) && enqueue_if_actionable && new_job.action? new_job.set_enqueue_immediately! end new_job.run_after_commit do ::Ci::CopyCrossDatabaseAssociationsService.new.execute(job, new_job) ::Deployments::CreateForBuildService.new.execute(new_job) ::MergeRequests::AddTodoWhenBuildFailsService .new(project: project) .close(new_job) end ::Ci::Pipelines::AddJobService.new(job.pipeline).execute!(new_job) do |processable| BulkInsertableAssociations.with_bulk_insert do processable.save! end end job.reset # refresh the data to get new values of `retried` and `processed`. new_job end # rubocop: enable CodeReuse/ActiveRecord private def check_assignable_runners!(job); end def retry_job(job, variables: []) clone!(job, variables: variables, enqueue_if_actionable: true).tap do |new_job| check_assignable_runners!(new_job) if new_job.is_a?(Ci::Build) next if new_job.failed? Gitlab::OptimisticLocking.retry_lock(new_job, name: 'retry_build', &:enqueue) if Feature.disabled?( :ci_retry_job_fix, project) AfterRequeueJobService.new(project, current_user).execute(job) if Feature.enabled?(:ci_retry_job_fix, project) Ci::PipelineCreation::StartPipelineService.new(job.pipeline).execute new_job.reset end end end def check_access!(job) unless can?(current_user, :update_build, job) raise Gitlab::Access::AccessDeniedError, '403 Forbidden' end end end end Ci::RetryJobService.prepend_mod_with('Ci::RetryJobService')