Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
G
gitlab-ce
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
1
Merge Requests
1
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
nexedi
gitlab-ce
Commits
2d921f7e
Commit
2d921f7e
authored
Sep 13, 2021
by
Matt Kasa
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Propagate locked from pipeline to job artifacts
Relates to
https://gitlab.com/gitlab-org/gitlab/-/issues/327281
parent
c547531d
Changes
9
Show whitespace changes
Inline
Side-by-side
Showing
9 changed files
with
386 additions
and
93 deletions
+386
-93
app/services/ci/job_artifacts/create_service.rb
app/services/ci/job_artifacts/create_service.rb
+23
-14
app/services/ci/unlock_artifacts_service.rb
app/services/ci/unlock_artifacts_service.rb
+87
-13
app/workers/ci/pipeline_success_unlock_artifacts_worker.rb
app/workers/ci/pipeline_success_unlock_artifacts_worker.rb
+4
-1
app/workers/ci/ref_delete_unlock_artifacts_worker.rb
app/workers/ci/ref_delete_unlock_artifacts_worker.rb
+4
-1
config/feature_flags/development/ci_update_unlocked_job_artifacts.yml
...re_flags/development/ci_update_unlocked_job_artifacts.yml
+8
-0
spec/factories/ci/pipelines.rb
spec/factories/ci/pipelines.rb
+8
-0
spec/services/ci/job_artifacts/create_service_spec.rb
spec/services/ci/job_artifacts/create_service_spec.rb
+2
-0
spec/services/ci/unlock_artifacts_service_spec.rb
spec/services/ci/unlock_artifacts_service_spec.rb
+217
-63
spec/workers/ci/ref_delete_unlock_artifacts_worker_spec.rb
spec/workers/ci/ref_delete_unlock_artifacts_worker_spec.rb
+33
-1
No files found.
app/services/ci/job_artifacts/create_service.rb
View file @
2d921f7e
...
@@ -19,6 +19,7 @@ module Ci
...
@@ -19,6 +19,7 @@ module Ci
def
initialize
(
job
)
def
initialize
(
job
)
@job
=
job
@job
=
job
@project
=
job
.
project
@project
=
job
.
project
@pipeline
=
job
.
pipeline
if
::
Feature
.
enabled?
(
:ci_update_unlocked_job_artifacts
,
@project
)
end
end
def
authorize
(
artifact_type
:,
filesize:
nil
)
def
authorize
(
artifact_type
:,
filesize:
nil
)
...
@@ -53,7 +54,7 @@ module Ci
...
@@ -53,7 +54,7 @@ module Ci
private
private
attr_reader
:job
,
:project
attr_reader
:job
,
:project
,
:pipeline
def
validate_requirements
(
artifact_type
:,
filesize
:)
def
validate_requirements
(
artifact_type
:,
filesize
:)
return
too_large_error
if
too_large?
(
artifact_type
,
filesize
)
return
too_large_error
if
too_large?
(
artifact_type
,
filesize
)
...
@@ -85,24 +86,32 @@ module Ci
...
@@ -85,24 +86,32 @@ module Ci
expire_in
=
params
[
'expire_in'
]
||
expire_in
=
params
[
'expire_in'
]
||
Gitlab
::
CurrentSettings
.
current_application_settings
.
default_artifacts_expire_in
Gitlab
::
CurrentSettings
.
current_application_settings
.
default_artifacts_expire_in
artifact
=
Ci
::
JobArtifact
.
new
(
artifact
_attributes
=
{
job_id:
job
.
id
,
job_id:
job
.
id
,
project:
project
,
project:
project
,
expire_in:
expire_in
}
artifact_attributes
[
:locked
]
=
pipeline
.
locked
if
::
Feature
.
enabled?
(
:ci_update_unlocked_job_artifacts
,
project
)
artifact
=
Ci
::
JobArtifact
.
new
(
artifact_attributes
.
merge
(
file:
artifacts_file
,
file:
artifacts_file
,
file_type:
params
[
:artifact_type
],
file_type:
params
[
:artifact_type
],
file_format:
params
[
:artifact_format
],
file_format:
params
[
:artifact_format
],
file_sha256:
artifacts_file
.
sha256
,
file_sha256:
artifacts_file
.
sha256
expire_in:
expire_in
)
)
)
artifact_metadata
=
if
metadata_file
artifact_metadata
=
if
metadata_file
Ci
::
JobArtifact
.
new
(
Ci
::
JobArtifact
.
new
(
job_id:
job
.
id
,
artifact_attributes
.
merge
(
project:
project
,
file:
metadata_file
,
file:
metadata_file
,
file_type: :metadata
,
file_type: :metadata
,
file_format: :gzip
,
file_format: :gzip
,
file_sha256:
metadata_file
.
sha256
,
file_sha256:
metadata_file
.
sha256
expire_in:
expire_in
)
)
)
end
end
[
artifact
,
artifact_metadata
]
[
artifact
,
artifact_metadata
]
...
...
app/services/ci/unlock_artifacts_service.rb
View file @
2d921f7e
...
@@ -5,6 +5,27 @@ module Ci
...
@@ -5,6 +5,27 @@ module Ci
BATCH_SIZE
=
100
BATCH_SIZE
=
100
def
execute
(
ci_ref
,
before_pipeline
=
nil
)
def
execute
(
ci_ref
,
before_pipeline
=
nil
)
results
=
{
unlocked_pipelines:
0
,
unlocked_job_artifacts:
0
}
if
::
Feature
.
enabled?
(
:ci_update_unlocked_job_artifacts
,
ci_ref
.
project
)
loop
do
unlocked_pipelines
=
[]
unlocked_job_artifacts
=
[]
::
Ci
::
Pipeline
.
transaction
do
unlocked_pipelines
=
unlock_pipelines
(
ci_ref
,
before_pipeline
)
unlocked_job_artifacts
=
unlock_job_artifacts
(
unlocked_pipelines
)
end
break
if
unlocked_pipelines
.
empty?
results
[
:unlocked_pipelines
]
+=
unlocked_pipelines
.
length
results
[
:unlocked_job_artifacts
]
+=
unlocked_job_artifacts
.
length
end
else
query
=
<<~
SQL
.
squish
query
=
<<~
SQL
.
squish
UPDATE "ci_pipelines"
UPDATE "ci_pipelines"
SET "locked" =
#{
::
Ci
::
Pipeline
.
lockeds
[
:unlocked
]
}
SET "locked" =
#{
::
Ci
::
Pipeline
.
lockeds
[
:unlocked
]
}
...
@@ -17,10 +38,51 @@ module Ci
...
@@ -17,10 +38,51 @@ module Ci
SQL
SQL
loop
do
loop
do
break
if
Ci
::
Pipeline
.
connection
.
exec_query
(
query
).
empty?
unlocked_pipelines
=
Ci
::
Pipeline
.
connection
.
exec_query
(
query
)
break
if
unlocked_pipelines
.
empty?
results
[
:unlocked_pipelines
]
+=
unlocked_pipelines
.
length
end
end
end
end
results
end
# rubocop:disable CodeReuse/ActiveRecord
def
unlock_job_artifacts_query
(
pipeline_ids
)
ci_job_artifacts
=
::
Ci
::
JobArtifact
.
arel_table
build_ids
=
::
Ci
::
Build
.
select
(
:id
).
where
(
commit_id:
pipeline_ids
)
returning
=
Arel
::
Nodes
::
Grouping
.
new
(
ci_job_artifacts
[
:id
])
Arel
::
UpdateManager
.
new
.
table
(
ci_job_artifacts
)
.
where
(
ci_job_artifacts
[
:job_id
].
in
(
Arel
.
sql
(
build_ids
.
to_sql
)))
.
set
([[
ci_job_artifacts
[
:locked
],
::
Ci
::
JobArtifact
.
lockeds
[
:unlocked
]]])
.
to_sql
+
" RETURNING
#{
returning
.
to_sql
}
"
end
# rubocop:enable CodeReuse/ActiveRecord
# rubocop:disable CodeReuse/ActiveRecord
def
unlock_pipelines_query
(
ci_ref
,
before_pipeline
)
ci_pipelines
=
::
Ci
::
Pipeline
.
arel_table
pipelines_scope
=
ci_ref
.
pipelines
.
artifacts_locked
pipelines_scope
=
pipelines_scope
.
before_pipeline
(
before_pipeline
)
if
before_pipeline
pipelines_scope
=
pipelines_scope
.
select
(
:id
).
limit
(
BATCH_SIZE
).
lock
(
'FOR UPDATE SKIP LOCKED'
)
returning
=
Arel
::
Nodes
::
Grouping
.
new
(
ci_pipelines
[
:id
])
Arel
::
UpdateManager
.
new
.
table
(
ci_pipelines
)
.
where
(
ci_pipelines
[
:id
].
in
(
Arel
.
sql
(
pipelines_scope
.
to_sql
)))
.
set
([[
ci_pipelines
[
:locked
],
::
Ci
::
Pipeline
.
lockeds
[
:unlocked
]]])
.
to_sql
+
" RETURNING
#{
returning
.
to_sql
}
"
end
# rubocop:enable CodeReuse/ActiveRecord
private
private
def
collect_pipelines
(
ci_ref
,
before_pipeline
)
def
collect_pipelines
(
ci_ref
,
before_pipeline
)
...
@@ -29,5 +91,17 @@ module Ci
...
@@ -29,5 +91,17 @@ module Ci
pipeline_scope
.
artifacts_locked
pipeline_scope
.
artifacts_locked
end
end
def
unlock_job_artifacts
(
pipelines
)
return
if
pipelines
.
empty?
::
Ci
::
JobArtifact
.
connection
.
exec_query
(
unlock_job_artifacts_query
(
pipelines
.
rows
.
flatten
)
)
end
def
unlock_pipelines
(
ci_ref
,
before_pipeline
)
::
Ci
::
Pipeline
.
connection
.
exec_query
(
unlock_pipelines_query
(
ci_ref
,
before_pipeline
))
end
end
end
end
end
app/workers/ci/pipeline_success_unlock_artifacts_worker.rb
View file @
2d921f7e
...
@@ -15,9 +15,12 @@ module Ci
...
@@ -15,9 +15,12 @@ module Ci
::
Ci
::
Pipeline
.
find_by_id
(
pipeline_id
).
try
do
|
pipeline
|
::
Ci
::
Pipeline
.
find_by_id
(
pipeline_id
).
try
do
|
pipeline
|
break
unless
pipeline
.
has_archive_artifacts?
break
unless
pipeline
.
has_archive_artifacts?
::
Ci
::
UnlockArtifactsService
results
=
::
Ci
::
UnlockArtifactsService
.
new
(
pipeline
.
project
,
pipeline
.
user
)
.
new
(
pipeline
.
project
,
pipeline
.
user
)
.
execute
(
pipeline
.
ci_ref
,
pipeline
)
.
execute
(
pipeline
.
ci_ref
,
pipeline
)
log_extra_metadata_on_done
(
:unlocked_pipelines
,
results
[
:unlocked_pipelines
])
log_extra_metadata_on_done
(
:unlocked_job_artifacts
,
results
[
:unlocked_job_artifacts
])
end
end
end
end
end
end
...
...
app/workers/ci/ref_delete_unlock_artifacts_worker.rb
View file @
2d921f7e
...
@@ -15,9 +15,12 @@ module Ci
...
@@ -15,9 +15,12 @@ module Ci
::
Project
.
find_by_id
(
project_id
).
try
do
|
project
|
::
Project
.
find_by_id
(
project_id
).
try
do
|
project
|
::
User
.
find_by_id
(
user_id
).
try
do
|
user
|
::
User
.
find_by_id
(
user_id
).
try
do
|
user
|
project
.
ci_refs
.
find_by_ref_path
(
ref_path
).
try
do
|
ci_ref
|
project
.
ci_refs
.
find_by_ref_path
(
ref_path
).
try
do
|
ci_ref
|
::
Ci
::
UnlockArtifactsService
results
=
::
Ci
::
UnlockArtifactsService
.
new
(
project
,
user
)
.
new
(
project
,
user
)
.
execute
(
ci_ref
)
.
execute
(
ci_ref
)
log_extra_metadata_on_done
(
:unlocked_pipelines
,
results
[
:unlocked_pipelines
])
log_extra_metadata_on_done
(
:unlocked_job_artifacts
,
results
[
:unlocked_job_artifacts
])
end
end
end
end
end
end
...
...
config/feature_flags/development/ci_update_unlocked_job_artifacts.yml
0 → 100644
View file @
2d921f7e
---
name
:
ci_update_unlocked_job_artifacts
introduced_by_url
:
https://gitlab.com/gitlab-org/gitlab/-/merge_requests/70235
rollout_issue_url
:
https://gitlab.com/gitlab-org/gitlab/-/issues/343465
milestone
:
'
14.5'
type
:
development
group
:
group::testing
default_enabled
:
false
spec/factories/ci/pipelines.rb
View file @
2d921f7e
...
@@ -213,6 +213,14 @@ FactoryBot.define do
...
@@ -213,6 +213,14 @@ FactoryBot.define do
end
end
end
end
trait
:with_persisted_artifacts
do
status
{
:success
}
after
(
:create
)
do
|
pipeline
,
evaluator
|
pipeline
.
builds
<<
create
(
:ci_build
,
:artifacts
,
pipeline:
pipeline
,
project:
pipeline
.
project
)
end
end
trait
:with_job
do
trait
:with_job
do
after
(
:build
)
do
|
pipeline
,
evaluator
|
after
(
:build
)
do
|
pipeline
,
evaluator
|
pipeline
.
builds
<<
build
(
:ci_build
,
pipeline:
pipeline
,
project:
pipeline
.
project
)
pipeline
.
builds
<<
build
(
:ci_build
,
pipeline:
pipeline
,
project:
pipeline
.
project
)
...
...
spec/services/ci/job_artifacts/create_service_spec.rb
View file @
2d921f7e
...
@@ -49,6 +49,7 @@ RSpec.describe Ci::JobArtifacts::CreateService do
...
@@ -49,6 +49,7 @@ RSpec.describe Ci::JobArtifacts::CreateService do
expect
(
new_artifact
.
file_type
).
to
eq
(
params
[
'artifact_type'
])
expect
(
new_artifact
.
file_type
).
to
eq
(
params
[
'artifact_type'
])
expect
(
new_artifact
.
file_format
).
to
eq
(
params
[
'artifact_format'
])
expect
(
new_artifact
.
file_format
).
to
eq
(
params
[
'artifact_format'
])
expect
(
new_artifact
.
file_sha256
).
to
eq
(
artifacts_sha256
)
expect
(
new_artifact
.
file_sha256
).
to
eq
(
artifacts_sha256
)
expect
(
new_artifact
.
locked
).
to
eq
(
job
.
pipeline
.
locked
)
end
end
it
'does not track the job user_id'
do
it
'does not track the job user_id'
do
...
@@ -75,6 +76,7 @@ RSpec.describe Ci::JobArtifacts::CreateService do
...
@@ -75,6 +76,7 @@ RSpec.describe Ci::JobArtifacts::CreateService do
expect
(
new_artifact
.
file_type
).
to
eq
(
'metadata'
)
expect
(
new_artifact
.
file_type
).
to
eq
(
'metadata'
)
expect
(
new_artifact
.
file_format
).
to
eq
(
'gzip'
)
expect
(
new_artifact
.
file_format
).
to
eq
(
'gzip'
)
expect
(
new_artifact
.
file_sha256
).
to
eq
(
artifacts_sha256
)
expect
(
new_artifact
.
file_sha256
).
to
eq
(
artifacts_sha256
)
expect
(
new_artifact
.
locked
).
to
eq
(
job
.
pipeline
.
locked
)
end
end
it
'sets expiration date according to application settings'
do
it
'sets expiration date according to application settings'
do
...
...
spec/services/ci/unlock_artifacts_service_spec.rb
View file @
2d921f7e
...
@@ -3,35 +3,39 @@
...
@@ -3,35 +3,39 @@
require
'spec_helper'
require
'spec_helper'
RSpec
.
describe
Ci
::
UnlockArtifactsService
do
RSpec
.
describe
Ci
::
UnlockArtifactsService
do
describe
'#execute'
do
using
RSpec
::
Parameterized
::
TableSyntax
subject
(
:execute
)
{
described_class
.
new
(
pipeline
.
project
,
pipeline
.
user
).
execute
(
ci_ref
,
before_pipeline
)
}
before
do
where
(
:tag
,
:ci_update_unlocked_job_artifacts
)
do
stub_const
(
"
#{
described_class
}
::BATCH_SIZE"
,
1
)
false
|
false
false
|
true
true
|
false
true
|
true
end
end
[
true
,
false
].
each
do
|
tag
|
with_them
do
context
"when tag is
#{
tag
}
"
do
let
(
:ref
)
{
'master'
}
let
(
:ref
)
{
'master'
}
let
(
:ref_path
)
{
tag
?
"
#{
::
Gitlab
::
Git
::
TAG_REF_PREFIX
}#{
ref
}
"
:
"
#{
::
Gitlab
::
Git
::
BRANCH_REF_PREFIX
}#{
ref
}
"
}
let
(
:ref_path
)
{
tag
?
"
#{
::
Gitlab
::
Git
::
TAG_REF_PREFIX
}#{
ref
}
"
:
"
#{
::
Gitlab
::
Git
::
BRANCH_REF_PREFIX
}#{
ref
}
"
}
let
(
:ci_ref
)
{
create
(
:ci_ref
,
ref_path:
ref_path
)
}
let
(
:ci_ref
)
{
create
(
:ci_ref
,
ref_path:
ref_path
)
}
let
(
:project
)
{
ci_ref
.
project
}
let!
(
:old_unlocked_pipeline
)
{
create
(
:ci_pipeline
,
ref:
ref
,
tag:
tag
,
project:
ci_ref
.
project
,
locked: :unlocked
)
}
let
(
:source_job
)
{
create
(
:ci_build
,
pipeline:
pipeline
)
}
let!
(
:older_pipeline
)
{
create
(
:ci_pipeline
,
ref:
ref
,
tag:
tag
,
project:
ci_ref
.
project
,
locked: :artifacts_locked
)
}
let!
(
:older_ambiguous_pipeline
)
{
create
(
:ci_pipeline
,
ref:
ref
,
tag:
!
tag
,
project:
ci_ref
.
project
,
locked: :artifacts_locked
)
}
let!
(
:old_unlocked_pipeline
)
{
create
(
:ci_pipeline
,
:with_persisted_artifacts
,
ref:
ref
,
tag:
tag
,
project:
project
,
locked: :unlocked
)
}
let!
(
:pipeline
)
{
create
(
:ci_pipeline
,
ref:
ref
,
tag:
tag
,
project:
ci_ref
.
project
,
locked: :artifacts_locked
)
}
let!
(
:older_pipeline
)
{
create
(
:ci_pipeline
,
:with_persisted_artifacts
,
ref:
ref
,
tag:
tag
,
project:
project
,
locked: :artifacts_locked
)
}
let!
(
:child_pipeline
)
{
create
(
:ci_pipeline
,
ref:
ref
,
tag:
tag
,
project:
ci_ref
.
project
,
locked: :artifacts_locked
)
}
let!
(
:older_ambiguous_pipeline
)
{
create
(
:ci_pipeline
,
:with_persisted_artifacts
,
ref:
ref
,
tag:
!
tag
,
project:
project
,
locked: :artifacts_locked
)
}
let!
(
:newer_pipeline
)
{
create
(
:ci_pipeline
,
ref:
ref
,
tag:
tag
,
project:
ci_ref
.
project
,
locked: :artifacts_locked
)
}
let!
(
:pipeline
)
{
create
(
:ci_pipeline
,
:with_persisted_artifacts
,
ref:
ref
,
tag:
tag
,
project:
project
,
locked: :artifacts_locked
)
}
let!
(
:other_ref_pipeline
)
{
create
(
:ci_pipeline
,
ref:
'other_ref'
,
tag:
tag
,
project:
ci_ref
.
project
,
locked: :artifacts_locked
)
}
let!
(
:child_pipeline
)
{
create
(
:ci_pipeline
,
:with_persisted_artifacts
,
ref:
ref
,
tag:
tag
,
project:
project
,
locked: :artifacts_locked
)
}
let!
(
:newer_pipeline
)
{
create
(
:ci_pipeline
,
:with_persisted_artifacts
,
ref:
ref
,
tag:
tag
,
project:
project
,
locked: :artifacts_locked
)
}
let!
(
:other_ref_pipeline
)
{
create
(
:ci_pipeline
,
:with_persisted_artifacts
,
ref:
'other_ref'
,
tag:
tag
,
project:
project
,
locked: :artifacts_locked
)
}
let!
(
:sources_pipeline
)
{
create
(
:ci_sources_pipeline
,
source_job:
source_job
,
source_project:
project
,
pipeline:
child_pipeline
,
project:
project
)
}
before
do
before
do
create
(
:ci_sources_pipeline
,
stub_const
(
"
#{
described_class
}
::BATCH_SIZE"
,
1
)
source_job:
create
(
:ci_build
,
pipeline:
pipeline
),
stub_feature_flags
(
ci_update_unlocked_job_artifacts:
ci_update_unlocked_job_artifacts
)
source_project:
ci_ref
.
project
,
pipeline:
child_pipeline
,
project:
ci_ref
.
project
)
end
end
describe
'#execute'
do
subject
(
:execute
)
{
described_class
.
new
(
pipeline
.
project
,
pipeline
.
user
).
execute
(
ci_ref
,
before_pipeline
)
}
context
'when running on a ref before a pipeline'
do
context
'when running on a ref before a pipeline'
do
let
(
:before_pipeline
)
{
pipeline
}
let
(
:before_pipeline
)
{
pipeline
}
...
@@ -62,6 +66,12 @@ RSpec.describe Ci::UnlockArtifactsService do
...
@@ -62,6 +66,12 @@ RSpec.describe Ci::UnlockArtifactsService do
it
'does not unlock artifacts for child pipeline'
do
it
'does not unlock artifacts for child pipeline'
do
expect
{
execute
}.
not_to
change
{
child_pipeline
.
reload
.
locked
}.
from
(
'artifacts_locked'
)
expect
{
execute
}.
not_to
change
{
child_pipeline
.
reload
.
locked
}.
from
(
'artifacts_locked'
)
end
end
it
'unlocks job artifact records'
do
pending
unless
ci_update_unlocked_job_artifacts
expect
{
execute
}.
to
change
{
::
Ci
::
JobArtifact
.
artifact_unlocked
.
count
}.
from
(
0
).
to
(
2
)
end
end
end
context
'when running on just the ref'
do
context
'when running on just the ref'
do
...
@@ -90,6 +100,150 @@ RSpec.describe Ci::UnlockArtifactsService do
...
@@ -90,6 +100,150 @@ RSpec.describe Ci::UnlockArtifactsService do
it
'does not unlock artifacts for other refs'
do
it
'does not unlock artifacts for other refs'
do
expect
{
execute
}.
not_to
change
{
other_ref_pipeline
.
reload
.
locked
}.
from
(
'artifacts_locked'
)
expect
{
execute
}.
not_to
change
{
other_ref_pipeline
.
reload
.
locked
}.
from
(
'artifacts_locked'
)
end
end
it
'unlocks job artifact records'
do
pending
unless
ci_update_unlocked_job_artifacts
expect
{
execute
}.
to
change
{
::
Ci
::
JobArtifact
.
artifact_unlocked
.
count
}.
from
(
0
).
to
(
8
)
end
end
end
describe
'#unlock_pipelines_query'
do
subject
{
described_class
.
new
(
pipeline
.
project
,
pipeline
.
user
).
unlock_pipelines_query
(
ci_ref
,
before_pipeline
)
}
context
'when running on a ref before a pipeline'
do
let
(
:before_pipeline
)
{
pipeline
}
it
'produces the expected SQL string'
do
expect
(
subject
.
squish
).
to
eq
<<~
SQL
.
squish
UPDATE
"ci_pipelines"
SET
"locked" = 0
WHERE
"ci_pipelines"."id" IN
(SELECT
"ci_pipelines"."id"
FROM
"ci_pipelines"
WHERE
"ci_pipelines"."ci_ref_id" =
#{
ci_ref
.
id
}
AND "ci_pipelines"."locked" = 1
AND (ci_pipelines.id <
#{
before_pipeline
.
id
}
)
AND "ci_pipelines"."id" NOT IN
(WITH RECURSIVE
"base_and_descendants"
AS
((SELECT
"ci_pipelines".*
FROM
"ci_pipelines"
WHERE
"ci_pipelines"."id" =
#{
before_pipeline
.
id
}
)
UNION
(SELECT
"ci_pipelines".*
FROM
"ci_pipelines",
"base_and_descendants",
"ci_sources_pipelines"
WHERE
"ci_sources_pipelines"."pipeline_id" = "ci_pipelines"."id"
AND "ci_sources_pipelines"."source_pipeline_id" = "base_and_descendants"."id"
AND "ci_sources_pipelines"."source_project_id" = "ci_sources_pipelines"."project_id"))
SELECT
"id"
FROM
"base_and_descendants"
AS
"ci_pipelines")
LIMIT 1
FOR UPDATE
SKIP LOCKED)
RETURNING ("ci_pipelines"."id")
SQL
end
end
context
'when running on just the ref'
do
let
(
:before_pipeline
)
{
nil
}
it
'produces the expected SQL string'
do
expect
(
subject
.
squish
).
to
eq
<<~
SQL
.
squish
UPDATE
"ci_pipelines"
SET
"locked" = 0
WHERE
"ci_pipelines"."id" IN
(SELECT
"ci_pipelines"."id"
FROM
"ci_pipelines"
WHERE
"ci_pipelines"."ci_ref_id" =
#{
ci_ref
.
id
}
AND "ci_pipelines"."locked" = 1
LIMIT 1
FOR UPDATE
SKIP LOCKED)
RETURNING
("ci_pipelines"."id")
SQL
end
end
end
describe
'#unlock_job_artifacts_query'
do
subject
{
described_class
.
new
(
pipeline
.
project
,
pipeline
.
user
).
unlock_job_artifacts_query
(
pipeline_ids
)
}
context
'when running on a ref before a pipeline'
do
let
(
:before_pipeline
)
{
pipeline
}
let
(
:pipeline_ids
)
{
[
older_pipeline
.
id
]
}
it
'produces the expected SQL string'
do
expect
(
subject
.
squish
).
to
eq
<<~
SQL
.
squish
UPDATE
"ci_job_artifacts"
SET
"locked" = 0
WHERE
"ci_job_artifacts"."job_id" IN
(SELECT
"ci_builds"."id"
FROM
"ci_builds"
WHERE
"ci_builds"."type" = 'Ci::Build'
AND "ci_builds"."commit_id" =
#{
older_pipeline
.
id
}
)
RETURNING
("ci_job_artifacts"."id")
SQL
end
end
context
'when running on just the ref'
do
let
(
:before_pipeline
)
{
nil
}
let
(
:pipeline_ids
)
{
[
older_pipeline
.
id
,
newer_pipeline
.
id
,
pipeline
.
id
]
}
it
'produces the expected SQL string'
do
expect
(
subject
.
squish
).
to
eq
<<~
SQL
.
squish
UPDATE
"ci_job_artifacts"
SET
"locked" = 0
WHERE
"ci_job_artifacts"."job_id" IN
(SELECT
"ci_builds"."id"
FROM
"ci_builds"
WHERE
"ci_builds"."type" = 'Ci::Build'
AND "ci_builds"."commit_id" IN (
#{
pipeline_ids
.
join
(
', '
)
}
))
RETURNING
("ci_job_artifacts"."id")
SQL
end
end
end
end
end
end
...
...
spec/workers/ci/ref_delete_unlock_artifacts_worker_spec.rb
View file @
2d921f7e
...
@@ -4,7 +4,9 @@ require 'spec_helper'
...
@@ -4,7 +4,9 @@ require 'spec_helper'
RSpec
.
describe
Ci
::
RefDeleteUnlockArtifactsWorker
do
RSpec
.
describe
Ci
::
RefDeleteUnlockArtifactsWorker
do
describe
'#perform'
do
describe
'#perform'
do
subject
(
:perform
)
{
described_class
.
new
.
perform
(
project_id
,
user_id
,
ref
)
}
subject
(
:perform
)
{
worker
.
perform
(
project_id
,
user_id
,
ref
)
}
let
(
:worker
)
{
described_class
.
new
}
let
(
:ref
)
{
'refs/heads/master'
}
let
(
:ref
)
{
'refs/heads/master'
}
...
@@ -40,6 +42,36 @@ RSpec.describe Ci::RefDeleteUnlockArtifactsWorker do
...
@@ -40,6 +42,36 @@ RSpec.describe Ci::RefDeleteUnlockArtifactsWorker do
expect
(
service
).
to
have_received
(
:execute
).
with
(
ci_ref
)
expect
(
service
).
to
have_received
(
:execute
).
with
(
ci_ref
)
end
end
context
'when a locked pipeline with persisted artifacts exists'
do
let!
(
:pipeline
)
{
create
(
:ci_pipeline
,
:with_persisted_artifacts
,
ref:
'master'
,
project:
project
,
locked: :artifacts_locked
)
}
context
'with ci_update_unlocked_job_artifacts disabled'
do
before
do
stub_feature_flags
(
ci_update_unlocked_job_artifacts:
false
)
end
it
'logs the correct extra metadata'
do
expect
(
worker
).
to
receive
(
:log_extra_metadata_on_done
).
with
(
:unlocked_pipelines
,
1
)
expect
(
worker
).
to
receive
(
:log_extra_metadata_on_done
).
with
(
:unlocked_job_artifacts
,
0
)
perform
end
end
context
'with ci_update_unlocked_job_artifacts enabled'
do
before
do
stub_feature_flags
(
ci_update_unlocked_job_artifacts:
true
)
end
it
'logs the correct extra metadata'
do
expect
(
worker
).
to
receive
(
:log_extra_metadata_on_done
).
with
(
:unlocked_pipelines
,
1
)
expect
(
worker
).
to
receive
(
:log_extra_metadata_on_done
).
with
(
:unlocked_job_artifacts
,
2
)
perform
end
end
end
end
end
context
'when ci ref does not exist for the given project'
do
context
'when ci ref does not exist for the given project'
do
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment