Class: Gitlab::Database::QueryAnalyzers::PreventCrossDatabaseModification

Inherits:
Base
  • Object
show all
Defined in:
lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb

Constant Summary collapse

CrossDatabaseModificationAcrossUnsupportedTablesError =
Class.new(QueryAnalyzerError)
QUERY_LIMIT =
10

Constants inherited from Base

Base::QueryAnalyzerError

Class Method Summary collapse

Methods inherited from Base

analyzer_key, context, context_key, end!, suppress=, suppress_key, suppress_schema_issues_for_decomposed_tables, suppressed?, with_suppressed

Class Method Details

.add_to_queries(sql) ⇒ Object



181
182
183
184
185
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 181

def self.add_to_queries(sql)
  return unless dev_or_test_env?

  context[:queries].push(sql)
end

.allow_cross_database_modification_within_transaction(url:, &blk) ⇒ Object

This method will allow cross database modifications within the block Example:

allow_cross_database_modification_within_transaction(url: ‘url-to-an-issue’) do

create(:build) # inserts ci_build and project record in one transaction

end



16
17
18
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 16

def self.allow_cross_database_modification_within_transaction(url:, &blk)
  self.with_suppressed(true, &blk)
end

.analyze(parsed) ⇒ Object

rubocop:disable Metrics/AbcSize



62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 62

def self.analyze(parsed)
  # This analyzer requires the PgQuery parsed query to be present
  return unless parsed.pg

  database = ::Gitlab::Database.db_config_name(parsed.connection)
  sql = parsed.sql

  # We ignore BEGIN in tests as this is the outer transaction for
  # DatabaseCleaner
  if self.transaction_begin?(parsed)
    context[:transaction_depth_by_db][database] += 1

    return
  elsif self.transaction_end?(parsed)
    context[:transaction_depth_by_db][database] -= 1
    if context[:transaction_depth_by_db][database] == 0
      context[:modified_tables_by_db][database].clear
      clear_queries

      # Attempt to troubleshoot https://gitlab.com/gitlab-org/gitlab/-/issues/351531
      ::CrossDatabaseModification::TransactionStackTrackRecord.log_gitlab_transactions_stack(action: :end_of_transaction)
    elsif context[:transaction_depth_by_db][database] < 0
      context[:transaction_depth_by_db][database] = 0
      raise CrossDatabaseModificationAcrossUnsupportedTablesError, "Misaligned cross-DB transactions discovered at query #{sql}. This could be a bug in #{self.class} or a valid issue to investigate. Read more at https://docs.gitlab.com/ee/development/database/multiple_databases.html#removing-cross-database-transactions ."
    end

    return
  end

  return unless self.in_transaction?
  return if Thread.current[:factory_bot_objects] && Thread.current[:factory_bot_objects] > 0

  # PgQuery might fail in some cases due to limited nesting:
  # https://github.com/pganalyze/pg_query/issues/209
  tables = sql.downcase.include?(' for update') ? parsed.pg.tables : parsed.pg.dml_tables

  # We have some code where plans and gitlab_subscriptions are lazily
  # created and this causes lots of spec failures
  # https://gitlab.com/gitlab-org/gitlab/-/issues/343394
  tables -= %w[plans gitlab_subscriptions]

  # Ignore some tables
  tables -= context[:ignored_tables].to_a

  return if tables.empty?

  # All migrations will write to schema_migrations in the same transaction.
  # It's safe to ignore this since schema_migrations exists in all
  # databases
  return if tables == ['schema_migrations']

  add_to_queries(sql)
  context[:modified_tables_by_db][database].merge(tables)
  all_tables = context[:modified_tables_by_db].values.flat_map(&:to_a)
  schemas = ::Gitlab::Database::GitlabSchema.table_schemas!(all_tables)
  schemas += ApplicationRecord.gitlab_transactions_stack

  unless ::Gitlab::Database::GitlabSchema.cross_transactions_allowed?(schemas, all_tables)
    messages = []
    messages << "Cross-database data modification of '#{schemas.to_a.join(', ')}' were detected within " \
                "a transaction modifying the '#{all_tables.to_a.join(', ')}' tables. "
    messages << "Please refer to https://docs.gitlab.com/ee/development/database/multiple_databases.html#removing-cross-database-transactions " \
                "for details on how to resolve this exception."
    messages += cleaned_queries

    raise CrossDatabaseModificationAcrossUnsupportedTablesError, messages.join("\n\n")
  end
rescue CrossDatabaseModificationAcrossUnsupportedTablesError => e
  ::Gitlab::ErrorTracking.track_exception(e, { gitlab_schemas: schemas, tables: all_tables, query: parsed.sql })
  raise if dev_or_test_env?
end

.begin!Object



40
41
42
43
44
45
46
47
48
49
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 40

def self.begin!
  super

  context.merge!({
    transaction_depth_by_db: Hash.new { |h, k| h[k] = 0 },
    modified_tables_by_db: Hash.new { |h, k| h[k] = Set.new },
    ignored_tables: [],
    queries: []
  })
end

.cleaned_queriesObject



187
188
189
190
191
192
193
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 187

def self.cleaned_queries
  return [] unless dev_or_test_env?

  context[:queries].last(QUERY_LIMIT).each_with_index.map do |sql, i|
    "#{i}: #{sql}"
  end
end

.clear_queriesObject



175
176
177
178
179
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 175

def self.clear_queries
  return unless dev_or_test_env?

  context[:queries].clear
end

.dev_or_test_env?Boolean

Returns:

  • (Boolean)


171
172
173
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 171

def self.dev_or_test_env?
  Gitlab.dev_or_test_env?
end

.enabled?Boolean

Returns:

  • (Boolean)


51
52
53
54
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 51

def self.enabled?
  ::Feature::FlipperFeature.table_exists? &&
    Feature.enabled?(:detect_cross_database_modification, type: :ops)
end

.in_transaction?Boolean

Returns:

  • (Boolean)


195
196
197
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 195

def self.in_transaction?
  context[:transaction_depth_by_db].values.any?(&:positive?)
end

.requires_tracking?(parsed) ⇒ Boolean

Returns:

  • (Boolean)


56
57
58
59
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 56

def self.requires_tracking?(parsed)
  # The transaction boundaries always needs to be tracked regardless of suppress behavior
  self.transaction_begin?(parsed) || self.transaction_end?(parsed)
end

.temporary_ignore_tables_in_transaction(tables, url:, &blk) ⇒ Object

This method will temporary ignore the given tables in a current transaction This is meant to disable ‘PreventCrossDB` check for some well known failures



28
29
30
31
32
33
34
35
36
37
38
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 28

def self.temporary_ignore_tables_in_transaction(tables, url:, &blk)
  return yield unless context&.dig(:ignored_tables)

  begin
    prev_ignored_tables = context[:ignored_tables]
    context[:ignored_tables] = prev_ignored_tables + tables.map(&:to_s)
    yield
  ensure
    context[:ignored_tables] = prev_ignored_tables
  end
end

.transaction_begin?(parsed) ⇒ Boolean

rubocop:enable Metrics/AbcSize

Returns:

  • (Boolean)


135
136
137
138
139
140
141
142
143
144
145
146
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 135

def self.transaction_begin?(parsed)
  # We ignore BEGIN or START in tests
  unless Rails.env.test?
    return true if transaction_stmt?(parsed, :TRANS_STMT_BEGIN)
    return true if transaction_stmt?(parsed, :TRANS_STMT_START)
  end

  # SAVEPOINT
  return true if transaction_stmt?(parsed, :TRANS_STMT_SAVEPOINT)

  false
end

.transaction_end?(parsed) ⇒ Boolean

Returns:

  • (Boolean)


148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 148

def self.transaction_end?(parsed)
  # We ignore ROLLBACK or COMMIT in tests
  unless Rails.env.test?
    return true if transaction_stmt?(parsed, :TRANS_STMT_COMMIT)
    return true if transaction_stmt?(parsed, :TRANS_STMT_COMMIT_PREPARED)
    return true if transaction_stmt?(parsed, :TRANS_STMT_ROLLBACK)
    return true if transaction_stmt?(parsed, :TRANS_STMT_ROLLBACK_PREPARED)
  end

  # RELEASE (SAVEPOINT) or ROLLBACK TO (SAVEPOINT)
  return true if transaction_stmt?(parsed, :TRANS_STMT_RELEASE)
  return true if transaction_stmt?(parsed, :TRANS_STMT_ROLLBACK_TO)

  false
end

.transaction_stmt?(parsed, kind) ⇒ Boolean

Returns:

  • (Boolean)


165
166
167
168
169
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 165

def self.transaction_stmt?(parsed, kind)
  parsed.pg.tree.stmts.map(&:stmt).any? do |stmt|
    stmt.node == :transaction_stmt && stmt.transaction_stmt.kind == kind
  end
end

.with_cross_database_modification_prevented(&blk) ⇒ Object

This method will prevent cross database modifications within the block if it was allowed previously



22
23
24
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 22

def self.with_cross_database_modification_prevented(&blk)
  self.with_suppressed(false, &blk)
end