Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
G
gitlab-ce
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
1
Merge Requests
1
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
nexedi
gitlab-ce
Commits
717b9f4e
Commit
717b9f4e
authored
Nov 19, 2020
by
Michael Eddington
Committed by
Adam Hegyi
Nov 19, 2020
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Update index secure for API Fuzzing telemetry
parent
4777f8e0
Changes
4
Show whitespace changes
Inline
Side-by-side
Showing
4 changed files
with
34 additions
and
1 deletion
+34
-1
changelogs/unreleased/210345-update-index-adding-api-fuzzing.yml
...ogs/unreleased/210345-update-index-adding-api-fuzzing.yml
+5
-0
db/post_migrate/20201113105000_update_index_secure_for_api_fuzzing_telemetry.rb
...13105000_update_index_secure_for_api_fuzzing_telemetry.rb
+27
-0
db/schema_migrations/20201113105000
db/schema_migrations/20201113105000
+1
-0
db/structure.sql
db/structure.sql
+1
-1
No files found.
changelogs/unreleased/210345-update-index-adding-api-fuzzing.yml
0 → 100644
View file @
717b9f4e
---
title
:
Add index for API Fuzzing usage data
merge_request
:
47692
author
:
type
:
performance
db/post_migrate/20201113105000_update_index_secure_for_api_fuzzing_telemetry.rb
0 → 100644
View file @
717b9f4e
# frozen_string_literal: true
class
UpdateIndexSecureForApiFuzzingTelemetry
<
ActiveRecord
::
Migration
[
6.0
]
include
Gitlab
::
Database
::
MigrationHelpers
DOWNTIME
=
false
disable_ddl_transaction!
OLD_SECURE_INDEX_NAME
=
'index_secure_ci_builds_on_user_id_created_at_parser_features'
NEW_SECURE_INDEX_NAME
=
'index_secure_ci_builds_on_user_id_name_created_at'
def
up
add_concurrent_index
(
:ci_builds
,
[
:user_id
,
:name
,
:created_at
],
where:
"(((type)::text = 'Ci::Build'::text) AND ((name)::text = ANY (ARRAY[('container_scanning'::character varying)::text, ('dast'::character varying)::text, ('dependency_scanning'::character varying)::text, ('license_management'::character varying)::text, ('license_scanning'::character varying)::text, ('sast'::character varying)::text, ('coverage_fuzzing'::character varying)::text, ('apifuzzer_fuzz'::character varying)::text, ('apifuzzer_fuzz_dnd'::character varying)::text, ('secret_detection'::character varying)::text])))"
,
name:
NEW_SECURE_INDEX_NAME
)
remove_concurrent_index_by_name
:ci_builds
,
OLD_SECURE_INDEX_NAME
end
def
down
add_concurrent_index
(
:ci_builds
,
[
:user_id
,
:created_at
],
where:
"(((type)::text = 'Ci::Build'::text) AND ((name)::text = ANY (ARRAY[('container_scanning'::character varying)::text, ('dast'::character varying)::text, ('dependency_scanning'::character varying)::text, ('license_management'::character varying)::text, ('license_scanning'::character varying)::text, ('sast'::character varying)::text, ('secret_detection'::character varying)::text])))"
,
name:
OLD_SECURE_INDEX_NAME
)
remove_concurrent_index_by_name
:ci_builds
,
NEW_SECURE_INDEX_NAME
end
end
db/schema_migrations/20201113105000
0 → 100644
View file @
717b9f4e
9f2c60df8e89f89d721f7f7917048eb914fa7c7726ec42dcb772ff7a90c54a9c
\ No newline at end of file
db/structure.sql
View file @
717b9f4e
...
@@ -21945,7 +21945,7 @@ CREATE UNIQUE INDEX index_scim_identities_on_user_id_and_group_id ON scim_identi
...
@@ -21945,7 +21945,7 @@ CREATE UNIQUE INDEX index_scim_identities_on_user_id_and_group_id ON scim_identi
CREATE
UNIQUE
INDEX
index_scim_oauth_access_tokens_on_group_id_and_token_encrypted
ON
scim_oauth_access_tokens
USING
btree
(
group_id
,
token_encrypted
);
CREATE
UNIQUE
INDEX
index_scim_oauth_access_tokens_on_group_id_and_token_encrypted
ON
scim_oauth_access_tokens
USING
btree
(
group_id
,
token_encrypted
);
CREATE
INDEX
index_secure_ci_builds_on_user_id_
created_at_parser_features
ON
ci_builds
USING
btree
(
user_id
,
created_at
)
WHERE
(((
type
)::
text
=
'Ci::Build'
::
text
)
AND
((
name
)::
text
=
ANY
(
ARRAY
[(
'container_scanning'
::
character
varying
)::
text
,
(
'dast'
::
character
varying
)::
text
,
(
'dependency_scanning'
::
character
varying
)::
text
,
(
'license_management'
::
character
varying
)::
text
,
(
'license_scanning'
::
character
varying
)::
text
,
(
'sast'
::
character
varying
)::
text
,
(
'coverage_fuzzing
'
::
character
varying
)::
text
,
(
'secret_detection'
::
character
varying
)::
text
])));
CREATE
INDEX
index_secure_ci_builds_on_user_id_
name_created_at
ON
ci_builds
USING
btree
(
user_id
,
name
,
created_at
)
WHERE
(((
type
)::
text
=
'Ci::Build'
::
text
)
AND
((
name
)::
text
=
ANY
(
ARRAY
[(
'container_scanning'
::
character
varying
)::
text
,
(
'dast'
::
character
varying
)::
text
,
(
'dependency_scanning'
::
character
varying
)::
text
,
(
'license_management'
::
character
varying
)::
text
,
(
'license_scanning'
::
character
varying
)::
text
,
(
'sast'
::
character
varying
)::
text
,
(
'coverage_fuzzing'
::
character
varying
)::
text
,
(
'apifuzzer_fuzz'
::
character
varying
)::
text
,
(
'apifuzzer_fuzz_dnd
'
::
character
varying
)::
text
,
(
'secret_detection'
::
character
varying
)::
text
])));
CREATE
INDEX
index_security_ci_builds_on_name_and_id_parser_features
ON
ci_builds
USING
btree
(
name
,
id
)
WHERE
(((
name
)::
text
=
ANY
(
ARRAY
[(
'container_scanning'
::
character
varying
)::
text
,
(
'dast'
::
character
varying
)::
text
,
(
'dependency_scanning'
::
character
varying
)::
text
,
(
'license_management'
::
character
varying
)::
text
,
(
'sast'
::
character
varying
)::
text
,
(
'secret_detection'
::
character
varying
)::
text
,
(
'coverage_fuzzing'
::
character
varying
)::
text
,
(
'license_scanning'
::
character
varying
)::
text
]))
AND
((
type
)::
text
=
'Ci::Build'
::
text
));
CREATE
INDEX
index_security_ci_builds_on_name_and_id_parser_features
ON
ci_builds
USING
btree
(
name
,
id
)
WHERE
(((
name
)::
text
=
ANY
(
ARRAY
[(
'container_scanning'
::
character
varying
)::
text
,
(
'dast'
::
character
varying
)::
text
,
(
'dependency_scanning'
::
character
varying
)::
text
,
(
'license_management'
::
character
varying
)::
text
,
(
'sast'
::
character
varying
)::
text
,
(
'secret_detection'
::
character
varying
)::
text
,
(
'coverage_fuzzing'
::
character
varying
)::
text
,
(
'license_scanning'
::
character
varying
)::
text
]))
AND
((
type
)::
text
=
'Ci::Build'
::
text
));
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment