mirror of
https://gitlab.com/gitlab-org/gitlab-foss.git
synced 2025-08-13 13:31:19 +00:00
380 lines
13 KiB
Ruby
380 lines
13 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
require 'spec_helper'
|
|
|
|
RSpec.describe Gitlab::Database::LockWritesManager, :delete, feature_category: :cell do
|
|
let(:connection) { ApplicationRecord.connection }
|
|
let(:test_table) { '_test_table' }
|
|
let(:non_existent_table) { 'non_existent' }
|
|
let(:skip_table_creation) { false }
|
|
let(:logger) { instance_double(Logger) }
|
|
let(:dry_run) { false }
|
|
let(:force) { true }
|
|
|
|
subject(:lock_writes_manager) do
|
|
described_class.new(
|
|
table_name: test_table,
|
|
connection: connection,
|
|
database_name: 'main',
|
|
with_retries: true,
|
|
logger: logger,
|
|
dry_run: dry_run,
|
|
force: force
|
|
)
|
|
end
|
|
|
|
before do
|
|
allow(connection).to receive(:execute).and_call_original
|
|
allow(logger).to receive(:info)
|
|
|
|
unless skip_table_creation
|
|
connection.execute(<<~SQL)
|
|
CREATE TABLE #{test_table} (id integer NOT NULL, value integer NOT NULL DEFAULT 0);
|
|
|
|
INSERT INTO #{test_table} (id, value)
|
|
VALUES (1, 1), (2, 2), (3, 3)
|
|
SQL
|
|
end
|
|
end
|
|
|
|
after do
|
|
ApplicationRecord.connection.execute("DROP TABLE IF EXISTS #{test_table}") unless skip_table_creation
|
|
end
|
|
|
|
describe "#table_locked_for_writes?" do
|
|
it 'returns false for a table that is not locked for writes' do
|
|
expect(subject.table_locked_for_writes?).to eq(false)
|
|
end
|
|
|
|
it 'returns true for a table that is locked for writes' do
|
|
expect { subject.lock_writes }.to change { subject.table_locked_for_writes? }.from(false).to(true)
|
|
end
|
|
|
|
context 'for detached partition tables in another schema' do
|
|
let(:test_table) { 'gitlab_partitions_dynamic._test_table_20220101' }
|
|
|
|
it 'returns true for a table that is locked for writes' do
|
|
expect { subject.lock_writes }.to change { subject.table_locked_for_writes? }.from(false).to(true)
|
|
end
|
|
end
|
|
end
|
|
|
|
describe '#lock_writes' do
|
|
it 'prevents any writes on the table' do
|
|
expect(subject.lock_writes).to eq(
|
|
{ action: "locked", database: "main", dry_run: dry_run, table: test_table }
|
|
)
|
|
|
|
expect do
|
|
connection.execute("delete from #{test_table}")
|
|
end.to raise_error(ActiveRecord::StatementInvalid, /Table: "#{test_table}" is write protected/)
|
|
end
|
|
|
|
it 'prevents truncating the table' do
|
|
subject.lock_writes
|
|
|
|
expect do
|
|
connection.execute("truncate #{test_table}")
|
|
end.to raise_error(ActiveRecord::StatementInvalid, /Table: "#{test_table}" is write protected/)
|
|
end
|
|
|
|
it 'adds 3 triggers to the ci schema tables on the main database' do
|
|
expect do
|
|
subject.lock_writes
|
|
end.to change {
|
|
number_of_triggers_on(connection, test_table)
|
|
}.by(3) # Triggers to block INSERT / UPDATE / DELETE
|
|
# Triggers on TRUNCATE are not added to the information_schema.triggers
|
|
# See https://www.postgresql.org/message-id/16934.1568989957%40sss.pgh.pa.us
|
|
end
|
|
|
|
it 'logs the write locking' do
|
|
expect(logger).to receive(:info).with("Database: 'main', Table: '_test_table': Lock Writes")
|
|
|
|
subject.lock_writes
|
|
end
|
|
|
|
it 'retries again if it receives a statement_timeout a few number of times' do
|
|
error_message = "PG::QueryCanceled: ERROR: canceling statement due to statement timeout"
|
|
call_count = 0
|
|
expect(connection).to receive(:execute).twice.with(
|
|
/^CREATE OR REPLACE TRIGGER gitlab_schema_write_trigger_for_/
|
|
) do
|
|
call_count += 1
|
|
raise(ActiveRecord::QueryCanceled, error_message) if call_count.odd?
|
|
end
|
|
subject.lock_writes
|
|
|
|
expect(call_count).to eq(2) # The first call fails, the 2nd call succeeds
|
|
end
|
|
|
|
it 'logs retried errors as skipped' do
|
|
error_message = "PG::QueryCanceled: ERROR: canceling statement due to statement timeout"
|
|
allow(connection).to receive(:execute).with(/^CREATE OR REPLACE TRIGGER gitlab_schema_write_trigger_for_/) do
|
|
raise(ActiveRecord::QueryCanceled, error_message)
|
|
end
|
|
|
|
expect(logger).to receive(:warn).with(
|
|
/Failed lock_writes, because #{test_table} raised an error. Error:/
|
|
)
|
|
expect(connection).to receive(:execute).with(/CREATE OR REPLACE TRIGGER/)
|
|
|
|
expect do
|
|
result = subject.lock_writes
|
|
expect(result).to eq({ action: "skipped", database: "main", dry_run: false, table: test_table })
|
|
end.not_to change {
|
|
number_of_triggers_on(connection, test_table)
|
|
}
|
|
end
|
|
|
|
context 'when running in force mode' do
|
|
it 'replaces the trigger if the table is already locked' do
|
|
subject.lock_writes
|
|
|
|
expect(connection).to receive(:execute).with(/CREATE OR REPLACE TRIGGER/)
|
|
|
|
expect do
|
|
result = subject.lock_writes
|
|
expect(result).to eq({ action: "locked", database: "main", dry_run: false, table: test_table })
|
|
end.not_to change {
|
|
number_of_triggers_on(connection, test_table)
|
|
}
|
|
end
|
|
|
|
context 'when table does not exist' do
|
|
let(:skip_table_creation) { true }
|
|
let(:test_table) { non_existent_table }
|
|
|
|
# In tests if we don't add the fake table to the gitlab schema then our test only schema checks will fail.
|
|
before do
|
|
allow(Gitlab::Database::GitlabSchema).to receive(:table_schema).and_call_original
|
|
allow(Gitlab::Database::GitlabSchema).to receive(:table_schema).with(
|
|
non_existent_table
|
|
).and_return(:gitlab_main_cell)
|
|
end
|
|
|
|
it 'tries to lock the table anyways, and logs the failure' do
|
|
expect(logger).to receive(:warn).with(
|
|
/Failed lock_writes, because #{test_table} raised an error. Error:/
|
|
)
|
|
expect(connection).to receive(:execute).with(/CREATE OR REPLACE TRIGGER/)
|
|
|
|
expect do
|
|
result = subject.lock_writes
|
|
expect(result).to eq({ action: "skipped", database: "main", dry_run: false, table: test_table })
|
|
end.not_to change {
|
|
number_of_triggers_on(connection, test_table)
|
|
}
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'when running in force mode false' do
|
|
let(:force) { false }
|
|
|
|
it 'skips the operation if the table is already locked for writes' do
|
|
subject.lock_writes
|
|
|
|
expect(logger).to receive(:info).with(
|
|
"Skipping lock_writes, because #{test_table} is already locked for writes"
|
|
)
|
|
expect(connection).not_to receive(:execute).with(/CREATE OR REPLACE TRIGGER/)
|
|
|
|
expect do
|
|
result = subject.lock_writes
|
|
expect(result).to eq({ action: "skipped", database: "main", dry_run: false, table: test_table })
|
|
end.not_to change {
|
|
number_of_triggers_on(connection, test_table)
|
|
}
|
|
end
|
|
|
|
context 'when table does not exist' do
|
|
let(:skip_table_creation) { true }
|
|
let(:test_table) { non_existent_table }
|
|
|
|
# In tests if we don't add the fake table to the gitlab schema then our test only schema checks will fail.
|
|
before do
|
|
allow(Gitlab::Database::GitlabSchema).to receive(:table_schema).and_call_original
|
|
allow(Gitlab::Database::GitlabSchema).to receive(:table_schema).with(
|
|
non_existent_table
|
|
).and_return(:gitlab_main_cell)
|
|
end
|
|
|
|
it 'skips locking table' do
|
|
expect(logger).to receive(:info).with("Skipping lock_writes, because #{test_table} does not exist")
|
|
expect(connection).not_to receive(:execute).with(/CREATE OR REPLACE TRIGGER/)
|
|
|
|
expect do
|
|
result = subject.lock_writes
|
|
expect(result).to eq({ action: "skipped", database: "main", dry_run: false, table: test_table })
|
|
end.not_to change {
|
|
number_of_triggers_on(connection, test_table)
|
|
}
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'when running in dry_run mode' do
|
|
let(:dry_run) { true }
|
|
|
|
it 'prints the sql statement to the logger' do
|
|
expect(logger).to receive(:info).with("Database: 'main', Table: '#{test_table}': Lock Writes")
|
|
expected_sql_statement = <<~SQL
|
|
CREATE OR REPLACE TRIGGER gitlab_schema_write_trigger_for_#{test_table}
|
|
BEFORE INSERT OR UPDATE OR DELETE OR TRUNCATE
|
|
ON #{test_table}
|
|
FOR EACH STATEMENT EXECUTE FUNCTION gitlab_schema_prevent_write();
|
|
SQL
|
|
expect(logger).to receive(:info).with(expected_sql_statement)
|
|
|
|
subject.lock_writes
|
|
end
|
|
|
|
it 'does not lock the tables for writes' do
|
|
subject.lock_writes
|
|
|
|
expect do
|
|
connection.execute("delete from #{test_table}")
|
|
connection.execute("truncate #{test_table}")
|
|
end.not_to raise_error
|
|
end
|
|
|
|
it 'returns result hash with action needs_lock' do
|
|
expect(subject.lock_writes).to eq(
|
|
{ action: "needs_lock", database: "main", dry_run: true, table: test_table }
|
|
)
|
|
end
|
|
end
|
|
end
|
|
|
|
describe '#unlock_writes' do
|
|
before do
|
|
allow(logger).to receive(:warn).with(/Failed lock_writes, because #{test_table} raised an error. Error:/)
|
|
|
|
# In tests if we don't add the fake table to the gitlab schema then our test only schema checks will fail.
|
|
allow(Gitlab::Database::GitlabSchema).to receive(:table_schema).and_call_original
|
|
allow(Gitlab::Database::GitlabSchema).to receive(:table_schema).with(test_table).and_return(:gitlab_main_cell)
|
|
|
|
# Locking the table without the considering the value of dry_run
|
|
described_class.new(
|
|
table_name: test_table,
|
|
connection: connection,
|
|
database_name: 'main',
|
|
with_retries: true,
|
|
logger: logger,
|
|
dry_run: false
|
|
).lock_writes
|
|
end
|
|
|
|
it 'allows writing on the table again' do
|
|
expect(subject.unlock_writes).to eq(
|
|
{ action: "unlocked", database: "main", dry_run: dry_run, table: test_table }
|
|
)
|
|
|
|
expect do
|
|
connection.execute("delete from #{test_table}")
|
|
end.not_to raise_error
|
|
end
|
|
|
|
it 'removes the write protection triggers from the gitlab_main tables on the ci database' do
|
|
expect do
|
|
subject.unlock_writes
|
|
end.to change {
|
|
number_of_triggers_on(connection, test_table)
|
|
}.by(-3) # Triggers to block INSERT / UPDATE / DELETE
|
|
# Triggers on TRUNCATE are not added to the information_schema.triggers
|
|
# See https://www.postgresql.org/message-id/16934.1568989957%40sss.pgh.pa.us
|
|
end
|
|
|
|
it 'logs the write unlocking' do
|
|
expect(logger).to receive(:info).with("Database: 'main', Table: '_test_table': Allow Writes")
|
|
|
|
subject.unlock_writes
|
|
end
|
|
|
|
context 'when running in force mode true' do
|
|
it 'idempotently drops the lock even if it does not exist' do
|
|
subject.unlock_writes
|
|
|
|
expect(subject).to receive(:execute_sql_statement)
|
|
expect(subject.unlock_writes).to eq(
|
|
{ action: "unlocked", database: "main", dry_run: dry_run, table: test_table }
|
|
)
|
|
end
|
|
|
|
context 'when table does not exist' do
|
|
let(:skip_table_creation) { true }
|
|
let(:test_table) { non_existent_table }
|
|
|
|
it 'tries to unlock the table which postgres handles gracefully' do
|
|
expect(subject).to receive(:execute_sql_statement).and_call_original
|
|
|
|
expect(subject.unlock_writes).to eq(
|
|
{ action: "unlocked", database: "main", dry_run: false, table: test_table }
|
|
)
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'when running in force mode false' do
|
|
let(:force) { false }
|
|
|
|
it 'skips unlocking the table if the table was already unlocked for writes' do
|
|
subject.unlock_writes
|
|
|
|
expect(subject).not_to receive(:execute_sql_statement)
|
|
expect(subject.unlock_writes).to eq(
|
|
{ action: "skipped", database: "main", dry_run: dry_run, table: test_table }
|
|
)
|
|
end
|
|
|
|
context 'when table does not exist' do
|
|
let(:skip_table_creation) { true }
|
|
let(:test_table) { non_existent_table }
|
|
|
|
it 'skips unlocking table' do
|
|
subject.unlock_writes
|
|
|
|
expect(subject).not_to receive(:execute_sql_statement)
|
|
expect(subject.unlock_writes).to eq(
|
|
{ action: "skipped", database: "main", dry_run: dry_run, table: test_table }
|
|
)
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'when running in dry_run mode' do
|
|
let(:dry_run) { true }
|
|
|
|
it 'prints the sql statement to the logger' do
|
|
expect(logger).to receive(:info).with("Database: 'main', Table: '#{test_table}': Allow Writes")
|
|
expected_sql_statement = <<~SQL
|
|
DROP TRIGGER IF EXISTS gitlab_schema_write_trigger_for_#{test_table} ON #{test_table};
|
|
SQL
|
|
expect(logger).to receive(:info).with(expected_sql_statement)
|
|
|
|
subject.unlock_writes
|
|
end
|
|
|
|
it 'does not unlock the tables for writes' do
|
|
subject.unlock_writes
|
|
|
|
expect do
|
|
connection.execute("delete from #{test_table}")
|
|
end.to raise_error(ActiveRecord::StatementInvalid, /Table: "#{test_table}" is write protected/)
|
|
end
|
|
|
|
it 'returns result hash with dry_run true' do
|
|
expect(subject.unlock_writes).to eq(
|
|
{ action: "needs_unlock", database: "main", dry_run: true, table: test_table }
|
|
)
|
|
end
|
|
end
|
|
end
|
|
|
|
def number_of_triggers_on(connection, table_name)
|
|
connection
|
|
.select_value("SELECT count(*) FROM information_schema.triggers WHERE event_object_table=$1", nil, [table_name])
|
|
end
|
|
end
|