Class: Gitlab::Database::QueryAnalyzers::PreventCrossDatabaseModification
- Inherits:
-
Base
- Object
- Base
- Gitlab::Database::QueryAnalyzers::PreventCrossDatabaseModification
show all
- Defined in:
- lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb
Constant Summary
collapse
- CrossDatabaseModificationAcrossUnsupportedTablesError =
Class.new(QueryAnalyzerError)
- QUERY_LIMIT =
10
Constants inherited
from Base
Base::QueryAnalyzerError
Class Method Summary
collapse
Methods inherited from Base
analyzer_key, context, context_key, end!, suppress=, suppress_key, suppressed?, with_suppressed
Class Method Details
.add_to_queries(sql) ⇒ Object
178
179
180
181
182
|
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 178
def self.add_to_queries(sql)
return unless dev_or_test_env?
context[:queries].push(sql)
end
|
.allow_cross_database_modification_within_transaction(url:, &blk) ⇒ Object
This method will allow cross database modifications within the block Example:
allow_cross_database_modification_within_transaction(url: ‘url-to-an-issue’) do
create(:build)
end
16
17
18
|
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 16
def self.allow_cross_database_modification_within_transaction(url:, &blk)
self.with_suppressed(true, &blk)
end
|
.analyze(parsed) ⇒ Object
rubocop:disable Metrics/AbcSize
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
|
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 62
def self.analyze(parsed)
database = ::Gitlab::Database.db_config_name(parsed.connection)
sql = parsed.sql
if self.transaction_begin?(parsed)
context[:transaction_depth_by_db][database] += 1
return
elsif self.transaction_end?(parsed)
context[:transaction_depth_by_db][database] -= 1
if context[:transaction_depth_by_db][database] == 0
context[:modified_tables_by_db][database].clear
clear_queries
::CrossDatabaseModification::TransactionStackTrackRecord.log_gitlab_transactions_stack(action: :end_of_transaction)
elsif context[:transaction_depth_by_db][database] < 0
context[:transaction_depth_by_db][database] = 0
raise CrossDatabaseModificationAcrossUnsupportedTablesError, "Misaligned cross-DB transactions discovered at query #{sql}. This could be a bug in #{self.class} or a valid issue to investigate. Read more at https://docs.gitlab.com/ee/development/database/multiple_databases.html#removing-cross-database-transactions ."
end
return
end
return unless self.in_transaction?
return if in_factory_bot_create?
tables = sql.downcase.include?(' for update') ? parsed.pg.tables : parsed.pg.dml_tables
tables -= %w[plans gitlab_subscriptions]
tables -= context[:ignored_tables].to_a
return if tables.empty?
return if tables == ['schema_migrations']
add_to_queries(sql)
context[:modified_tables_by_db][database].merge(tables)
all_tables = context[:modified_tables_by_db].values.flat_map(&:to_a)
schemas = ::Gitlab::Database::GitlabSchema.table_schemas!(all_tables)
schemas += ApplicationRecord.gitlab_transactions_stack
unless ::Gitlab::Database::GitlabSchema.cross_transactions_allowed?(schemas)
messages = []
messages << "Cross-database data modification of '#{schemas.to_a.join(", ")}' were detected within " \
"a transaction modifying the '#{all_tables.to_a.join(", ")}' tables. "
messages << "Please refer to https://docs.gitlab.com/ee/development/database/multiple_databases.html#removing-cross-database-transactions " \
"for details on how to resolve this exception."
messages += cleaned_queries
raise CrossDatabaseModificationAcrossUnsupportedTablesError, messages.join("\n\n")
end
rescue CrossDatabaseModificationAcrossUnsupportedTablesError => e
::Gitlab::ErrorTracking.track_exception(e, { gitlab_schemas: schemas, tables: all_tables, query: parsed.sql })
raise if dev_or_test_env?
end
|
.begin! ⇒ Object
40
41
42
43
44
45
46
47
48
49
|
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 40
def self.begin!
super
context.merge!({
transaction_depth_by_db: Hash.new { |h, k| h[k] = 0 },
modified_tables_by_db: Hash.new { |h, k| h[k] = Set.new },
ignored_tables: [],
queries: []
})
end
|
.cleaned_queries ⇒ Object
184
185
186
187
188
189
190
|
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 184
def self.cleaned_queries
return [] unless dev_or_test_env?
context[:queries].last(QUERY_LIMIT).each_with_index.map do |sql, i|
"#{i}: #{sql}"
end
end
|
.clear_queries ⇒ Object
172
173
174
175
176
|
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 172
def self.clear_queries
return unless dev_or_test_env?
context[:queries].clear
end
|
.dev_or_test_env? ⇒ Boolean
168
169
170
|
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 168
def self.dev_or_test_env?
Gitlab.dev_or_test_env?
end
|
.enabled? ⇒ Boolean
51
52
53
54
|
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 51
def self.enabled?
::Feature::FlipperFeature.table_exists? &&
Feature.enabled?(:detect_cross_database_modification, type: :ops)
end
|
.in_factory_bot_create? ⇒ Boolean
We ignore execution in the #create method from FactoryBot because it is not representative of real code we run in production. There are far too many false positives caused by instantiating objects in different ‘gitlab_schema` in a FactoryBot `create`.
201
202
203
204
205
206
207
208
|
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 201
def self.in_factory_bot_create?
Rails.env.test? && caller_locations.any? do |l|
l.path.end_with?('lib/factory_bot/evaluation.rb') && l.label == 'create' ||
l.path.end_with?('lib/factory_bot/strategy/create.rb') ||
l.path.end_with?('lib/factory_bot/strategy/build.rb') ||
l.path.end_with?('shoulda/matchers/active_record/validate_uniqueness_of_matcher.rb') && l.label == 'create_existing_record'
end
end
|
.in_transaction? ⇒ Boolean
192
193
194
|
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 192
def self.in_transaction?
context[:transaction_depth_by_db].values.any?(&:positive?)
end
|
.requires_tracking?(parsed) ⇒ Boolean
56
57
58
59
|
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 56
def self.requires_tracking?(parsed)
self.transaction_begin?(parsed) || self.transaction_end?(parsed)
end
|
.temporary_ignore_tables_in_transaction(tables, url:, &blk) ⇒ Object
This method will temporary ignore the given tables in a current transaction This is meant to disable ‘PreventCrossDB` check for some well known failures
28
29
30
31
32
33
34
35
36
37
38
|
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 28
def self.temporary_ignore_tables_in_transaction(tables, url:, &blk)
return yield unless context&.dig(:ignored_tables)
begin
prev_ignored_tables = context[:ignored_tables]
context[:ignored_tables] = prev_ignored_tables + tables
yield
ensure
context[:ignored_tables] = prev_ignored_tables
end
end
|
.transaction_begin?(parsed) ⇒ Boolean
rubocop:enable Metrics/AbcSize
132
133
134
135
136
137
138
139
140
141
142
143
|
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 132
def self.transaction_begin?(parsed)
unless Rails.env.test?
return true if transaction_stmt?(parsed, :TRANS_STMT_BEGIN)
return true if transaction_stmt?(parsed, :TRANS_STMT_START)
end
return true if transaction_stmt?(parsed, :TRANS_STMT_SAVEPOINT)
false
end
|
.transaction_end?(parsed) ⇒ Boolean
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
|
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 145
def self.transaction_end?(parsed)
unless Rails.env.test?
return true if transaction_stmt?(parsed, :TRANS_STMT_COMMIT)
return true if transaction_stmt?(parsed, :TRANS_STMT_COMMIT_PREPARED)
return true if transaction_stmt?(parsed, :TRANS_STMT_ROLLBACK)
return true if transaction_stmt?(parsed, :TRANS_STMT_ROLLBACK_PREPARED)
end
return true if transaction_stmt?(parsed, :TRANS_STMT_RELEASE)
return true if transaction_stmt?(parsed, :TRANS_STMT_ROLLBACK_TO)
false
end
|
.transaction_stmt?(parsed, kind) ⇒ Boolean
162
163
164
165
166
|
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 162
def self.transaction_stmt?(parsed, kind)
parsed.pg.tree.stmts.map(&:stmt).any? do |stmt|
stmt.node == :transaction_stmt && stmt.transaction_stmt.kind == kind
end
end
|
.with_cross_database_modification_prevented(&blk) ⇒ Object
This method will prevent cross database modifications within the block if it was allowed previously
22
23
24
|
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 22
def self.with_cross_database_modification_prevented(&blk)
self.with_suppressed(false, &blk)
end
|