Class: Gitlab::Database::QueryAnalyzers::PreventCrossDatabaseModification
- Inherits:
-
Base
- Object
- Base
- Gitlab::Database::QueryAnalyzers::PreventCrossDatabaseModification
show all
- Defined in:
- lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb
Constant Summary
collapse
- CrossDatabaseModificationAcrossUnsupportedTablesError =
Class.new(QueryAnalyzerError)
- QUERY_LIMIT =
10
Constants inherited
from Base
Base::QueryAnalyzerError
Class Method Summary
collapse
Methods inherited from Base
analyzer_key, context, context_key, end!, suppress=, suppress_key, suppress_schema_issues_for_decomposed_tables, suppressed?, with_suppressed
Class Method Details
.add_to_queries(sql) ⇒ Object
181
182
183
184
185
|
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 181
def self.add_to_queries(sql)
return unless dev_or_test_env?
context[:queries].push(sql)
end
|
.allow_cross_database_modification_within_transaction(url:, &blk) ⇒ Object
This method will allow cross database modifications within the block Example:
allow_cross_database_modification_within_transaction(url: ‘url-to-an-issue’) do
create(:build)
end
16
17
18
|
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 16
def self.allow_cross_database_modification_within_transaction(url:, &blk)
self.with_suppressed(true, &blk)
end
|
.analyze(parsed) ⇒ Object
rubocop:disable Metrics/AbcSize
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
|
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 62
def self.analyze(parsed)
return unless parsed.pg
database = ::Gitlab::Database.db_config_name(parsed.connection)
sql = parsed.sql
if self.transaction_begin?(parsed)
context[:transaction_depth_by_db][database] += 1
return
elsif self.transaction_end?(parsed)
context[:transaction_depth_by_db][database] -= 1
if context[:transaction_depth_by_db][database] == 0
context[:modified_tables_by_db][database].clear
clear_queries
::CrossDatabaseModification::TransactionStackTrackRecord.log_gitlab_transactions_stack(action: :end_of_transaction)
elsif context[:transaction_depth_by_db][database] < 0
context[:transaction_depth_by_db][database] = 0
raise CrossDatabaseModificationAcrossUnsupportedTablesError, "Misaligned cross-DB transactions discovered at query #{sql}. This could be a bug in #{self.class} or a valid issue to investigate. Read more at https://docs.gitlab.com/ee/development/database/multiple_databases.html#removing-cross-database-transactions ."
end
return
end
return unless self.in_transaction?
return if Thread.current[:factory_bot_objects] && Thread.current[:factory_bot_objects] > 0
tables = sql.downcase.include?(' for update') ? parsed.pg.tables : parsed.pg.dml_tables
tables -= %w[plans gitlab_subscriptions]
tables -= context[:ignored_tables].to_a
return if tables.empty?
return if tables == ['schema_migrations']
add_to_queries(sql)
context[:modified_tables_by_db][database].merge(tables)
all_tables = context[:modified_tables_by_db].values.flat_map(&:to_a)
schemas = ::Gitlab::Database::GitlabSchema.table_schemas!(all_tables)
schemas += ApplicationRecord.gitlab_transactions_stack
unless ::Gitlab::Database::GitlabSchema.cross_transactions_allowed?(schemas, all_tables)
messages = []
messages << "Cross-database data modification of '#{schemas.to_a.join(', ')}' were detected within " \
"a transaction modifying the '#{all_tables.to_a.join(', ')}' tables. "
messages << "Please refer to https://docs.gitlab.com/ee/development/database/multiple_databases.html#removing-cross-database-transactions " \
"for details on how to resolve this exception."
messages += cleaned_queries
raise CrossDatabaseModificationAcrossUnsupportedTablesError, messages.join("\n\n")
end
rescue CrossDatabaseModificationAcrossUnsupportedTablesError => e
::Gitlab::ErrorTracking.track_exception(e, { gitlab_schemas: schemas, tables: all_tables, query: parsed.sql })
raise if dev_or_test_env?
end
|
.begin! ⇒ Object
40
41
42
43
44
45
46
47
48
49
|
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 40
def self.begin!
super
context.merge!({
transaction_depth_by_db: Hash.new { |h, k| h[k] = 0 },
modified_tables_by_db: Hash.new { |h, k| h[k] = Set.new },
ignored_tables: [],
queries: []
})
end
|
.cleaned_queries ⇒ Object
187
188
189
190
191
192
193
|
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 187
def self.cleaned_queries
return [] unless dev_or_test_env?
context[:queries].last(QUERY_LIMIT).each_with_index.map do |sql, i|
"#{i}: #{sql}"
end
end
|
.clear_queries ⇒ Object
175
176
177
178
179
|
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 175
def self.clear_queries
return unless dev_or_test_env?
context[:queries].clear
end
|
.dev_or_test_env? ⇒ Boolean
171
172
173
|
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 171
def self.dev_or_test_env?
Gitlab.dev_or_test_env?
end
|
.enabled? ⇒ Boolean
51
52
53
54
|
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 51
def self.enabled?
::Feature::FlipperFeature.table_exists? &&
Feature.enabled?(:detect_cross_database_modification, type: :ops)
end
|
.in_transaction? ⇒ Boolean
195
196
197
|
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 195
def self.in_transaction?
context[:transaction_depth_by_db].values.any?(&:positive?)
end
|
.requires_tracking?(parsed) ⇒ Boolean
56
57
58
59
|
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 56
def self.requires_tracking?(parsed)
self.transaction_begin?(parsed) || self.transaction_end?(parsed)
end
|
.temporary_ignore_tables_in_transaction(tables, url:, &blk) ⇒ Object
This method will temporary ignore the given tables in a current transaction This is meant to disable ‘PreventCrossDB` check for some well known failures
28
29
30
31
32
33
34
35
36
37
38
|
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 28
def self.temporary_ignore_tables_in_transaction(tables, url:, &blk)
return yield unless context&.dig(:ignored_tables)
begin
prev_ignored_tables = context[:ignored_tables]
context[:ignored_tables] = prev_ignored_tables + tables.map(&:to_s)
yield
ensure
context[:ignored_tables] = prev_ignored_tables
end
end
|
.transaction_begin?(parsed) ⇒ Boolean
rubocop:enable Metrics/AbcSize
135
136
137
138
139
140
141
142
143
144
145
146
|
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 135
def self.transaction_begin?(parsed)
unless Rails.env.test?
return true if transaction_stmt?(parsed, :TRANS_STMT_BEGIN)
return true if transaction_stmt?(parsed, :TRANS_STMT_START)
end
return true if transaction_stmt?(parsed, :TRANS_STMT_SAVEPOINT)
false
end
|
.transaction_end?(parsed) ⇒ Boolean
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
|
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 148
def self.transaction_end?(parsed)
unless Rails.env.test?
return true if transaction_stmt?(parsed, :TRANS_STMT_COMMIT)
return true if transaction_stmt?(parsed, :TRANS_STMT_COMMIT_PREPARED)
return true if transaction_stmt?(parsed, :TRANS_STMT_ROLLBACK)
return true if transaction_stmt?(parsed, :TRANS_STMT_ROLLBACK_PREPARED)
end
return true if transaction_stmt?(parsed, :TRANS_STMT_RELEASE)
return true if transaction_stmt?(parsed, :TRANS_STMT_ROLLBACK_TO)
false
end
|
.transaction_stmt?(parsed, kind) ⇒ Boolean
165
166
167
168
169
|
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 165
def self.transaction_stmt?(parsed, kind)
parsed.pg.tree.stmts.map(&:stmt).any? do |stmt|
stmt.node == :transaction_stmt && stmt.transaction_stmt.kind == kind
end
end
|
.with_cross_database_modification_prevented(&blk) ⇒ Object
This method will prevent cross database modifications within the block if it was allowed previously
22
23
24
|
# File 'lib/gitlab/database/query_analyzers/prevent_cross_database_modification.rb', line 22
def self.with_cross_database_modification_prevented(&blk)
self.with_suppressed(false, &blk)
end
|