2018-08-03 03:15:25 -04:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2015-08-25 21:42:46 -04:00
|
|
|
module Ci
|
2020-01-10 13:07:43 -05:00
|
|
|
class Build < Ci::Processable
|
2019-01-28 07:37:09 -05:00
|
|
|
include Ci::Metadatable
|
2019-03-02 09:29:04 -05:00
|
|
|
include Ci::Contextable
|
2019-04-25 04:23:39 -04:00
|
|
|
include Ci::PipelineDelegator
|
2016-08-08 06:01:25 -04:00
|
|
|
include TokenAuthenticatable
|
2016-10-13 06:45:16 -04:00
|
|
|
include AfterCommitQueue
|
2018-02-26 14:14:00 -05:00
|
|
|
include ObjectStorage::BackgroundMove
|
2017-01-09 15:47:15 -05:00
|
|
|
include Presentable
|
2017-09-01 04:54:07 -04:00
|
|
|
include Importable
|
2020-03-13 11:09:21 -04:00
|
|
|
include Ci::HasRef
|
2019-12-01 01:06:11 -05:00
|
|
|
include IgnorableColumns
|
2016-08-08 06:01:25 -04:00
|
|
|
|
2018-09-02 10:35:15 -04:00
|
|
|
BuildArchivedError = Class.new(StandardError)
|
|
|
|
|
2019-12-01 01:06:11 -05:00
|
|
|
ignore_columns :artifacts_file, :artifacts_file_store, :artifacts_metadata, :artifacts_metadata_store, :artifacts_size, :commands, remove_after: '2019-12-15', remove_with: '12.7'
|
2018-09-02 10:35:15 -04:00
|
|
|
|
2018-01-14 02:18:50 -05:00
|
|
|
belongs_to :project, inverse_of: :builds
|
2016-10-18 17:20:36 -04:00
|
|
|
belongs_to :runner
|
|
|
|
belongs_to :trigger_request
|
2016-02-16 02:39:20 -05:00
|
|
|
belongs_to :erased_by, class_name: 'User'
|
2019-12-19 10:07:55 -05:00
|
|
|
belongs_to :resource_group, class_name: 'Ci::ResourceGroup', inverse_of: :builds
|
2020-02-10 10:08:54 -05:00
|
|
|
belongs_to :pipeline, class_name: 'Ci::Pipeline', foreign_key: :commit_id
|
2015-08-25 21:42:46 -04:00
|
|
|
|
2018-07-30 11:26:56 -04:00
|
|
|
RUNNER_FEATURES = {
|
2019-03-21 09:08:32 -04:00
|
|
|
upload_multiple_artifacts: -> (build) { build.publishes_artifacts_reports? },
|
|
|
|
refspecs: -> (build) { build.merge_request_ref? }
|
2018-07-30 11:26:56 -04:00
|
|
|
}.freeze
|
|
|
|
|
2019-10-30 17:07:58 -04:00
|
|
|
DEFAULT_RETRIES = {
|
|
|
|
scheduler_failure: 2
|
|
|
|
}.freeze
|
|
|
|
|
2020-03-24 14:07:55 -04:00
|
|
|
CODE_NAVIGATION_JOB_NAME = 'code_navigation'
|
|
|
|
|
2018-11-04 19:37:40 -05:00
|
|
|
has_one :deployment, as: :deployable, class_name: 'Deployment'
|
2019-12-19 10:07:55 -05:00
|
|
|
has_one :resource, class_name: 'Ci::Resource', inverse_of: :build
|
2017-09-25 12:54:08 -04:00
|
|
|
has_many :trace_sections, class_name: 'Ci::BuildTraceSection'
|
2018-04-26 04:25:20 -04:00
|
|
|
has_many :trace_chunks, class_name: 'Ci::BuildTraceChunk', foreign_key: :build_id
|
2016-11-04 11:35:22 -04:00
|
|
|
|
2018-03-20 19:03:50 -04:00
|
|
|
has_many :job_artifacts, class_name: 'Ci::JobArtifact', foreign_key: :job_id, dependent: :destroy, inverse_of: :job # rubocop:disable Cop/ActiveRecordDependent
|
2019-07-29 03:43:10 -04:00
|
|
|
has_many :job_variables, class_name: 'Ci::JobVariable', foreign_key: :job_id
|
2019-10-16 05:07:51 -04:00
|
|
|
has_many :sourced_pipelines, class_name: 'Ci::Sources::Pipeline', foreign_key: :source_job_id
|
2018-07-27 01:04:35 -04:00
|
|
|
|
|
|
|
Ci::JobArtifact.file_types.each do |key, value|
|
|
|
|
has_one :"job_artifacts_#{key}", -> { where(file_type: value) }, class_name: 'Ci::JobArtifact', inverse_of: :job, foreign_key: :job_id
|
|
|
|
end
|
2017-09-21 04:34:12 -04:00
|
|
|
|
2018-07-05 09:55:10 -04:00
|
|
|
has_one :runner_session, class_name: 'Ci::BuildRunnerSession', validate: true, inverse_of: :build
|
|
|
|
|
2019-11-29 07:10:06 -05:00
|
|
|
accepts_nested_attributes_for :runner_session, update_only: true
|
2019-07-29 03:43:10 -04:00
|
|
|
accepts_nested_attributes_for :job_variables
|
2018-07-05 09:55:10 -04:00
|
|
|
|
|
|
|
delegate :url, to: :runner_session, prefix: true, allow_nil: true
|
|
|
|
delegate :terminal_specification, to: :runner_session, allow_nil: true
|
2018-04-19 11:31:46 -04:00
|
|
|
delegate :gitlab_deploy_token, to: :project
|
2018-09-04 03:51:00 -04:00
|
|
|
delegate :trigger_short_token, to: :trigger_request, allow_nil: true
|
2018-03-26 13:26:52 -04:00
|
|
|
|
2018-03-27 07:05:29 -04:00
|
|
|
##
|
2019-02-03 19:41:26 -05:00
|
|
|
# Since Gitlab 11.5, deployments records started being created right after
|
|
|
|
# `ci_builds` creation. We can look up a relevant `environment` through
|
2020-03-03 19:07:52 -05:00
|
|
|
# `deployment` relation today.
|
2019-09-18 10:02:45 -04:00
|
|
|
# (See more https://gitlab.com/gitlab-org/gitlab-foss/merge_requests/22380)
|
2018-03-27 07:05:29 -04:00
|
|
|
#
|
2020-03-03 19:07:52 -05:00
|
|
|
# Since Gitlab 12.9, we started persisting the expanded environment name to
|
|
|
|
# avoid repeated variables expansion in `action: stop` builds as well.
|
2016-12-08 11:21:16 -05:00
|
|
|
def persisted_environment
|
2018-03-29 08:46:27 -04:00
|
|
|
return unless has_environment?
|
|
|
|
|
|
|
|
strong_memoize(:persisted_environment) do
|
2019-02-03 19:41:26 -05:00
|
|
|
deployment&.environment ||
|
|
|
|
Environment.find_by(name: expanded_environment_name, project: project)
|
2018-03-29 08:46:27 -04:00
|
|
|
end
|
2016-12-08 11:21:16 -05:00
|
|
|
end
|
|
|
|
|
2017-07-03 10:01:41 -04:00
|
|
|
serialize :options # rubocop:disable Cop/ActiveRecordSerialize
|
|
|
|
serialize :yaml_variables, Gitlab::Serializer::Ci::Variables # rubocop:disable Cop/ActiveRecordSerialize
|
2015-08-25 21:42:46 -04:00
|
|
|
|
2017-02-22 17:35:08 -05:00
|
|
|
delegate :name, to: :project, prefix: true
|
|
|
|
|
2015-08-25 21:42:46 -04:00
|
|
|
validates :coverage, numericality: true, allow_blank: true
|
2017-02-21 19:40:04 -05:00
|
|
|
validates :ref, presence: true
|
2015-08-25 21:42:46 -04:00
|
|
|
|
2019-09-17 10:16:34 -04:00
|
|
|
scope :not_interruptible, -> do
|
|
|
|
joins(:metadata).where('ci_builds_metadata.id NOT IN (?)',
|
|
|
|
Ci::BuildMetadata.scoped_build.with_interruptible.select(:id))
|
|
|
|
end
|
|
|
|
|
2015-08-25 21:42:46 -04:00
|
|
|
scope :unstarted, ->() { where(runner_id: nil) }
|
2015-10-02 07:46:38 -04:00
|
|
|
scope :ignore_failures, ->() { where(allow_failure: false) }
|
2018-03-15 05:03:37 -04:00
|
|
|
scope :with_artifacts_archive, ->() do
|
2019-03-22 08:38:45 -04:00
|
|
|
where('EXISTS (?)', Ci::JobArtifact.select(1).where('ci_builds.id = ci_job_artifacts.job_id').archive)
|
2017-09-21 04:34:12 -04:00
|
|
|
end
|
2018-06-03 01:21:50 -04:00
|
|
|
|
2018-09-27 17:15:08 -04:00
|
|
|
scope :with_existing_job_artifacts, ->(query) do
|
|
|
|
where('EXISTS (?)', ::Ci::JobArtifact.select(1).where('ci_builds.id = ci_job_artifacts.job_id').merge(query))
|
|
|
|
end
|
|
|
|
|
2018-08-16 10:28:47 -04:00
|
|
|
scope :with_archived_trace, ->() do
|
2018-09-27 17:15:08 -04:00
|
|
|
with_existing_job_artifacts(Ci::JobArtifact.trace)
|
2018-08-16 10:28:47 -04:00
|
|
|
end
|
|
|
|
|
2018-06-03 01:21:50 -04:00
|
|
|
scope :without_archived_trace, ->() do
|
|
|
|
where('NOT EXISTS (?)', Ci::JobArtifact.select(1).where('ci_builds.id = ci_job_artifacts.job_id').trace)
|
|
|
|
end
|
|
|
|
|
2019-04-16 07:06:52 -04:00
|
|
|
scope :with_reports, ->(reports_scope) do
|
|
|
|
with_existing_job_artifacts(reports_scope)
|
2018-09-27 17:15:08 -04:00
|
|
|
.eager_load_job_artifacts
|
2018-08-02 02:05:07 -04:00
|
|
|
end
|
|
|
|
|
2018-09-27 17:15:08 -04:00
|
|
|
scope :eager_load_job_artifacts, -> { includes(:job_artifacts) }
|
2020-02-18 01:09:06 -05:00
|
|
|
scope :eager_load_job_artifacts_archive, -> { includes(:job_artifacts_archive) }
|
2018-09-27 17:15:08 -04:00
|
|
|
|
2019-11-25 19:06:28 -05:00
|
|
|
scope :eager_load_everything, -> do
|
|
|
|
includes(
|
|
|
|
[
|
|
|
|
{ pipeline: [:project, :user] },
|
|
|
|
:job_artifacts_archive,
|
|
|
|
:metadata,
|
|
|
|
:trigger_request,
|
|
|
|
:project,
|
|
|
|
:user,
|
|
|
|
:tags
|
|
|
|
]
|
|
|
|
)
|
|
|
|
end
|
|
|
|
|
2019-10-21 11:05:58 -04:00
|
|
|
scope :with_exposed_artifacts, -> do
|
|
|
|
joins(:metadata).merge(Ci::BuildMetadata.with_exposed_artifacts)
|
|
|
|
.includes(:metadata, :job_artifacts_metadata)
|
|
|
|
end
|
|
|
|
|
2018-03-15 05:03:37 -04:00
|
|
|
scope :with_artifacts_not_expired, ->() { with_artifacts_archive.where('artifacts_expire_at IS NULL OR artifacts_expire_at > ?', Time.now) }
|
|
|
|
scope :with_expired_artifacts, ->() { with_artifacts_archive.where('artifacts_expire_at < ?', Time.now) }
|
2016-07-07 06:56:02 -04:00
|
|
|
scope :last_month, ->() { where('created_at > ?', Date.today - 1.month) }
|
2018-10-01 02:27:34 -04:00
|
|
|
scope :manual_actions, ->() { where(when: :manual, status: COMPLETED_STATUSES + %i[manual]) }
|
|
|
|
scope :scheduled_actions, ->() { where(when: :delayed, status: COMPLETED_STATUSES + %i[scheduled]) }
|
2017-08-29 02:56:03 -04:00
|
|
|
scope :ref_protected, -> { where(protected: true) }
|
2018-06-02 00:08:34 -04:00
|
|
|
scope :with_live_trace, -> { where('EXISTS (?)', Ci::BuildTraceChunk.where('ci_builds.id = ci_build_trace_chunks.build_id').select(1)) }
|
2019-08-01 08:05:02 -04:00
|
|
|
scope :with_stale_live_trace, -> { with_live_trace.finished_before(12.hours.ago) }
|
|
|
|
scope :finished_before, -> (date) { finished.where('finished_at < ?', date) }
|
2017-07-31 10:25:11 -04:00
|
|
|
|
2019-10-11 11:06:41 -04:00
|
|
|
scope :with_secure_reports_from_options, -> (job_type) { where('options like :job_type', job_type: "%:artifacts:%:reports:%:#{job_type}:%") }
|
|
|
|
|
|
|
|
scope :with_secure_reports_from_config_options, -> (job_types) do
|
|
|
|
joins(:metadata).where("ci_builds_metadata.config_options -> 'artifacts' -> 'reports' ?| array[:job_types]", job_types: job_types)
|
|
|
|
end
|
|
|
|
|
2017-11-30 17:17:41 -05:00
|
|
|
scope :matches_tag_ids, -> (tag_ids) do
|
|
|
|
matcher = ::ActsAsTaggableOn::Tagging
|
2018-11-17 10:14:36 -05:00
|
|
|
.where(taggable_type: CommitStatus.name)
|
2017-11-30 17:17:41 -05:00
|
|
|
.where(context: 'tags')
|
|
|
|
.where('taggable_id = ci_builds.id')
|
|
|
|
.where.not(tag_id: tag_ids).select('1')
|
|
|
|
|
|
|
|
where("NOT EXISTS (?)", matcher)
|
|
|
|
end
|
|
|
|
|
|
|
|
scope :with_any_tags, -> do
|
|
|
|
matcher = ::ActsAsTaggableOn::Tagging
|
2018-11-17 10:14:36 -05:00
|
|
|
.where(taggable_type: CommitStatus.name)
|
2017-11-30 17:17:41 -05:00
|
|
|
.where(context: 'tags')
|
|
|
|
.where('taggable_id = ci_builds.id').select('1')
|
|
|
|
|
|
|
|
where("EXISTS (?)", matcher)
|
|
|
|
end
|
|
|
|
|
2019-05-20 11:03:34 -04:00
|
|
|
scope :queued_before, ->(time) { where(arel_table[:queued_at].lt(time)) }
|
2019-11-25 19:06:28 -05:00
|
|
|
scope :order_id_desc, -> { order('ci_builds.id DESC') }
|
2019-05-20 11:03:34 -04:00
|
|
|
|
2020-02-20 13:08:51 -05:00
|
|
|
scope :preload_project_and_pipeline_project, -> do
|
|
|
|
preload(Ci::Pipeline::PROJECT_ROUTE_AND_NAMESPACE_ROUTE,
|
|
|
|
pipeline: Ci::Pipeline::PROJECT_ROUTE_AND_NAMESPACE_ROUTE)
|
|
|
|
end
|
2020-01-24 07:09:01 -05:00
|
|
|
|
2020-03-18 05:09:31 -04:00
|
|
|
scope :with_coverage, -> { where.not(coverage: nil) }
|
|
|
|
|
2015-08-25 21:42:46 -04:00
|
|
|
acts_as_taggable
|
|
|
|
|
2019-03-06 07:18:53 -05:00
|
|
|
add_authentication_token_field :token, encrypted: :optional
|
2016-08-08 06:01:25 -04:00
|
|
|
|
|
|
|
before_save :ensure_token
|
2017-02-03 10:21:10 -05:00
|
|
|
before_destroy { unscoped_project }
|
2016-01-05 14:38:35 -05:00
|
|
|
|
2018-01-05 08:48:50 -05:00
|
|
|
after_create unless: :importing? do |build|
|
2017-08-23 02:32:44 -04:00
|
|
|
run_after_commit { BuildHooksWorker.perform_async(build.id) }
|
2017-08-22 04:57:52 -04:00
|
|
|
end
|
|
|
|
|
2015-08-25 21:42:46 -04:00
|
|
|
class << self
|
2017-05-16 07:41:15 -04:00
|
|
|
# This is needed for url_for to work,
|
|
|
|
# as the controller is JobsController
|
|
|
|
def model_name
|
|
|
|
ActiveModel::Name.new(self, nil, 'job')
|
|
|
|
end
|
|
|
|
|
2015-08-25 21:42:46 -04:00
|
|
|
def first_pending
|
|
|
|
pending.unstarted.order('created_at ASC').first
|
|
|
|
end
|
|
|
|
|
2017-02-13 07:01:52 -05:00
|
|
|
def retry(build, current_user)
|
2018-08-27 11:31:01 -04:00
|
|
|
# rubocop: disable CodeReuse/ServiceClass
|
2017-02-14 04:38:17 -05:00
|
|
|
Ci::RetryBuildService
|
|
|
|
.new(build.project, current_user)
|
|
|
|
.execute(build)
|
2018-08-27 11:31:01 -04:00
|
|
|
# rubocop: enable CodeReuse/ServiceClass
|
2015-08-25 21:42:46 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2016-08-11 09:22:35 -04:00
|
|
|
state_machine :status do
|
2019-03-03 18:56:20 -05:00
|
|
|
event :enqueue do
|
2019-12-24 07:08:01 -05:00
|
|
|
transition [:created, :skipped, :manual, :scheduled] => :waiting_for_resource, if: :requires_resource?
|
2019-03-03 18:56:20 -05:00
|
|
|
transition [:created, :skipped, :manual, :scheduled] => :preparing, if: :any_unmet_prerequisites?
|
|
|
|
end
|
|
|
|
|
2019-12-24 07:08:01 -05:00
|
|
|
event :enqueue_scheduled do
|
|
|
|
transition scheduled: :waiting_for_resource, if: :requires_resource?
|
|
|
|
transition scheduled: :preparing, if: :any_unmet_prerequisites?
|
|
|
|
transition scheduled: :pending
|
|
|
|
end
|
|
|
|
|
|
|
|
event :enqueue_waiting_for_resource do
|
|
|
|
transition waiting_for_resource: :preparing, if: :any_unmet_prerequisites?
|
|
|
|
transition waiting_for_resource: :pending
|
|
|
|
end
|
|
|
|
|
|
|
|
event :enqueue_preparing do
|
|
|
|
transition preparing: :pending
|
|
|
|
end
|
|
|
|
|
2017-03-03 08:35:19 -05:00
|
|
|
event :actionize do
|
|
|
|
transition created: :manual
|
2017-02-28 10:48:39 -05:00
|
|
|
end
|
|
|
|
|
2018-09-20 22:17:37 -04:00
|
|
|
event :schedule do
|
|
|
|
transition created: :scheduled
|
|
|
|
end
|
|
|
|
|
|
|
|
event :unschedule do
|
|
|
|
transition scheduled: :manual
|
|
|
|
end
|
|
|
|
|
2019-12-24 07:08:01 -05:00
|
|
|
before_transition on: :enqueue_scheduled do |build|
|
|
|
|
build.scheduled_at.nil? || build.scheduled_at.past? # If false is returned, it stops the transition
|
2018-09-20 22:17:37 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
before_transition scheduled: any do |build|
|
2018-09-24 07:02:26 -04:00
|
|
|
build.scheduled_at = nil
|
|
|
|
end
|
|
|
|
|
|
|
|
before_transition created: :scheduled do |build|
|
2018-09-25 01:21:41 -04:00
|
|
|
build.scheduled_at = build.options_scheduled_at
|
2018-09-24 07:02:26 -04:00
|
|
|
end
|
|
|
|
|
2019-12-24 07:08:01 -05:00
|
|
|
before_transition any => :waiting_for_resource do |build|
|
|
|
|
build.waiting_for_resource_at = Time.now
|
|
|
|
end
|
|
|
|
|
|
|
|
before_transition on: :enqueue_waiting_for_resource do |build|
|
|
|
|
next unless build.requires_resource?
|
|
|
|
|
|
|
|
build.resource_group.assign_resource_to(build) # If false is returned, it stops the transition
|
|
|
|
end
|
|
|
|
|
|
|
|
after_transition any => :waiting_for_resource do |build|
|
|
|
|
build.run_after_commit do
|
|
|
|
Ci::ResourceGroups::AssignResourceFromResourceGroupWorker
|
|
|
|
.perform_async(build.resource_group_id)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
before_transition on: :enqueue_preparing do |build|
|
2020-01-15 10:08:32 -05:00
|
|
|
!build.any_unmet_prerequisites? # If false is returned, it stops the transition
|
2019-12-24 07:08:01 -05:00
|
|
|
end
|
|
|
|
|
2018-09-24 07:02:26 -04:00
|
|
|
after_transition created: :scheduled do |build|
|
|
|
|
build.run_after_commit do
|
|
|
|
Ci::BuildScheduleWorker.perform_at(build.scheduled_at, build.id)
|
|
|
|
end
|
2018-09-20 22:17:37 -04:00
|
|
|
end
|
|
|
|
|
2019-03-03 18:56:20 -05:00
|
|
|
after_transition any => [:preparing] do |build|
|
|
|
|
build.run_after_commit do
|
|
|
|
Ci::BuildPrepareWorker.perform_async(id)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2016-12-14 10:06:50 -05:00
|
|
|
after_transition any => [:pending] do |build|
|
|
|
|
build.run_after_commit do
|
2016-12-15 16:29:47 -05:00
|
|
|
BuildQueueWorker.perform_async(id)
|
2016-12-14 10:06:50 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2016-02-19 11:38:47 -05:00
|
|
|
after_transition pending: :running do |build|
|
2018-11-04 19:37:40 -05:00
|
|
|
build.deployment&.run
|
|
|
|
|
2016-10-13 06:58:25 -04:00
|
|
|
build.run_after_commit do
|
2019-11-19 22:06:28 -05:00
|
|
|
build.pipeline.persistent_ref.create
|
|
|
|
|
2016-10-13 06:58:25 -04:00
|
|
|
BuildHooksWorker.perform_async(id)
|
|
|
|
end
|
2015-12-07 07:23:23 -05:00
|
|
|
end
|
|
|
|
|
2019-12-24 07:08:01 -05:00
|
|
|
after_transition any => ::Ci::Build.completed_statuses do |build|
|
|
|
|
next unless build.resource_group_id.present?
|
|
|
|
next unless build.resource_group.release_resource_from(build)
|
|
|
|
|
|
|
|
build.run_after_commit do
|
|
|
|
Ci::ResourceGroups::AssignResourceFromResourceGroupWorker
|
|
|
|
.perform_async(build.resource_group_id)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2016-02-19 11:38:47 -05:00
|
|
|
after_transition any => [:success, :failed, :canceled] do |build|
|
2016-10-13 06:58:25 -04:00
|
|
|
build.run_after_commit do
|
2016-10-14 06:53:51 -04:00
|
|
|
BuildFinishedWorker.perform_async(id)
|
2016-10-13 06:58:25 -04:00
|
|
|
end
|
2015-08-25 21:42:46 -04:00
|
|
|
end
|
2016-06-10 17:36:54 -04:00
|
|
|
|
2016-06-14 08:44:09 -04:00
|
|
|
after_transition any => [:success] do |build|
|
2018-11-04 19:37:40 -05:00
|
|
|
build.deployment&.succeed
|
|
|
|
|
2016-10-13 06:58:25 -04:00
|
|
|
build.run_after_commit do
|
2018-11-07 01:26:41 -05:00
|
|
|
BuildSuccessWorker.perform_async(id)
|
2018-06-04 15:49:39 -04:00
|
|
|
PagesWorker.perform_async(:deploy, id) if build.pages_generator?
|
2016-06-10 17:36:54 -04:00
|
|
|
end
|
|
|
|
end
|
2017-07-17 07:00:32 -04:00
|
|
|
|
2017-07-17 07:30:49 -04:00
|
|
|
before_transition any => [:failed] do |build|
|
2017-11-24 10:30:08 -05:00
|
|
|
next unless build.project
|
2019-01-18 05:15:00 -05:00
|
|
|
next unless build.deployment
|
2018-11-04 19:37:40 -05:00
|
|
|
|
2019-01-18 05:15:00 -05:00
|
|
|
begin
|
|
|
|
build.deployment.drop!
|
|
|
|
rescue => e
|
2019-12-16 07:07:43 -05:00
|
|
|
Gitlab::ErrorTracking.track_and_raise_for_dev_exception(e, build_id: build.id)
|
2019-01-18 05:15:00 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
true
|
2018-12-13 07:25:14 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
after_transition any => [:failed] do |build|
|
|
|
|
next unless build.project
|
2018-11-04 19:37:40 -05:00
|
|
|
|
2018-09-15 08:02:43 -04:00
|
|
|
if build.retry_failure?
|
2018-03-19 09:17:46 -04:00
|
|
|
begin
|
|
|
|
Ci::Build.retry(build, build.user)
|
|
|
|
rescue Gitlab::Access::AccessDeniedError => ex
|
2019-07-10 15:26:47 -04:00
|
|
|
Rails.logger.error "Unable to auto-retry job #{build.id}: #{ex}" # rubocop:disable Gitlab/RailsLogger
|
2018-03-19 09:17:46 -04:00
|
|
|
end
|
2017-07-17 07:00:32 -04:00
|
|
|
end
|
|
|
|
end
|
2017-09-03 10:35:37 -04:00
|
|
|
|
2018-04-17 09:51:53 -04:00
|
|
|
after_transition pending: :running do |build|
|
2018-03-26 11:47:46 -04:00
|
|
|
build.ensure_metadata.update_timeout_state
|
2018-02-28 15:36:01 -05:00
|
|
|
end
|
2018-07-05 09:55:10 -04:00
|
|
|
|
|
|
|
after_transition running: any do |build|
|
|
|
|
Ci::BuildRunnerSession.where(build: build).delete_all
|
|
|
|
end
|
2018-11-04 19:37:40 -05:00
|
|
|
|
|
|
|
after_transition any => [:skipped, :canceled] do |build|
|
|
|
|
build.deployment&.cancel
|
|
|
|
end
|
2015-08-25 21:42:46 -04:00
|
|
|
end
|
|
|
|
|
2016-12-08 11:52:24 -05:00
|
|
|
def detailed_status(current_user)
|
2016-12-13 07:24:25 -05:00
|
|
|
Gitlab::Ci::Status::Build::Factory
|
|
|
|
.new(self, current_user)
|
|
|
|
.fabricate!
|
2016-12-08 03:51:36 -05:00
|
|
|
end
|
|
|
|
|
2018-10-04 04:52:36 -04:00
|
|
|
def other_manual_actions
|
2016-07-20 10:38:38 -04:00
|
|
|
pipeline.manual_actions.where.not(name: name)
|
2016-07-16 19:48:51 -04:00
|
|
|
end
|
|
|
|
|
2018-10-04 04:52:36 -04:00
|
|
|
def other_scheduled_actions
|
|
|
|
pipeline.scheduled_actions.where.not(name: name)
|
2016-07-16 19:48:51 -04:00
|
|
|
end
|
|
|
|
|
2018-06-04 15:49:39 -04:00
|
|
|
def pages_generator?
|
|
|
|
Gitlab.config.pages.enabled &&
|
|
|
|
self.name == 'pages'
|
|
|
|
end
|
|
|
|
|
2019-03-02 09:29:04 -05:00
|
|
|
def runnable?
|
|
|
|
true
|
|
|
|
end
|
|
|
|
|
2018-10-23 06:58:41 -04:00
|
|
|
def archived?
|
|
|
|
return true if degenerated?
|
|
|
|
|
|
|
|
archive_builds_older_than = Gitlab::CurrentSettings.current_application_settings.archive_builds_older_than
|
|
|
|
archive_builds_older_than.present? && created_at < archive_builds_older_than
|
|
|
|
end
|
|
|
|
|
2016-07-16 12:39:58 -04:00
|
|
|
def playable?
|
2018-10-23 06:58:41 -04:00
|
|
|
action? && !archived? && (manual? || scheduled? || retryable?)
|
2017-02-28 10:48:39 -05:00
|
|
|
end
|
|
|
|
|
2018-09-18 02:36:03 -04:00
|
|
|
def schedulable?
|
2018-11-02 07:32:45 -04:00
|
|
|
self.when == 'delayed' && options[:start_in].present?
|
2018-09-18 02:36:03 -04:00
|
|
|
end
|
|
|
|
|
2018-09-25 01:21:41 -04:00
|
|
|
def options_scheduled_at
|
2018-09-18 02:36:03 -04:00
|
|
|
ChronicDuration.parse(options[:start_in])&.seconds&.from_now
|
2017-02-28 10:48:39 -05:00
|
|
|
end
|
|
|
|
|
2017-03-03 08:35:19 -05:00
|
|
|
def action?
|
2018-09-26 06:12:48 -04:00
|
|
|
%w[manual delayed].include?(self.when)
|
2017-03-02 07:45:01 -05:00
|
|
|
end
|
|
|
|
|
2018-08-27 11:31:01 -04:00
|
|
|
# rubocop: disable CodeReuse/ServiceClass
|
2019-07-29 03:43:10 -04:00
|
|
|
def play(current_user, job_variables_attributes = nil)
|
2017-04-12 05:46:24 -04:00
|
|
|
Ci::PlayBuildService
|
|
|
|
.new(project, current_user)
|
2019-07-29 03:43:10 -04:00
|
|
|
.execute(self, job_variables_attributes)
|
2016-07-16 12:39:58 -04:00
|
|
|
end
|
2018-08-27 11:31:01 -04:00
|
|
|
# rubocop: enable CodeReuse/ServiceClass
|
2016-07-16 12:39:58 -04:00
|
|
|
|
2016-12-08 04:40:56 -05:00
|
|
|
def cancelable?
|
2018-08-10 07:59:38 -04:00
|
|
|
active? || created?
|
2016-12-08 04:40:56 -05:00
|
|
|
end
|
|
|
|
|
2015-11-03 05:44:07 -05:00
|
|
|
def retryable?
|
2019-06-05 07:09:51 -04:00
|
|
|
!archived? && (success? || failed? || canceled?)
|
2015-11-03 05:44:07 -05:00
|
|
|
end
|
2017-07-17 06:38:21 -04:00
|
|
|
|
|
|
|
def retries_count
|
|
|
|
pipeline.builds.retried.where(name: self.name).count
|
|
|
|
end
|
|
|
|
|
2019-10-30 17:07:58 -04:00
|
|
|
def retry_failure?
|
|
|
|
max_allowed_retries = nil
|
|
|
|
max_allowed_retries ||= options_retry_max if retry_on_reason_or_always?
|
|
|
|
max_allowed_retries ||= DEFAULT_RETRIES.fetch(failure_reason.to_sym, 0)
|
|
|
|
|
|
|
|
max_allowed_retries > 0 && retries_count < max_allowed_retries
|
2017-07-17 06:38:21 -04:00
|
|
|
end
|
2015-11-03 05:44:07 -05:00
|
|
|
|
2019-10-30 17:07:58 -04:00
|
|
|
def options_retry_max
|
|
|
|
options_retry[:max]
|
2018-09-15 07:39:55 -04:00
|
|
|
end
|
|
|
|
|
2019-10-30 17:07:58 -04:00
|
|
|
def options_retry_when
|
|
|
|
options_retry.fetch(:when, ['always'])
|
|
|
|
end
|
2018-09-15 08:02:43 -04:00
|
|
|
|
2019-10-30 17:07:58 -04:00
|
|
|
def retry_on_reason_or_always?
|
|
|
|
options_retry_when.include?(failure_reason.to_s) ||
|
|
|
|
options_retry_when.include?('always')
|
2017-07-17 06:38:21 -04:00
|
|
|
end
|
2015-11-03 05:44:07 -05:00
|
|
|
|
2019-03-03 18:56:20 -05:00
|
|
|
def any_unmet_prerequisites?
|
|
|
|
prerequisites.present?
|
|
|
|
end
|
|
|
|
|
|
|
|
def prerequisites
|
|
|
|
Gitlab::Ci::Build::Prerequisite::Factory.new(self).unmet
|
|
|
|
end
|
|
|
|
|
2016-11-16 18:23:05 -05:00
|
|
|
def expanded_environment_name
|
2018-03-29 08:46:27 -04:00
|
|
|
return unless has_environment?
|
|
|
|
|
|
|
|
strong_memoize(:expanded_environment_name) do
|
2020-03-03 19:07:52 -05:00
|
|
|
# We're using a persisted expanded environment name in order to avoid
|
|
|
|
# variable expansion per request.
|
|
|
|
if Feature.enabled?(:ci_persisted_expanded_environment_name, project, default_enabled: true) &&
|
|
|
|
metadata&.expanded_environment_name.present?
|
|
|
|
metadata.expanded_environment_name
|
|
|
|
else
|
|
|
|
ExpandVariables.expand(environment, -> { simple_variables })
|
|
|
|
end
|
2018-03-27 07:05:29 -04:00
|
|
|
end
|
2016-11-16 18:23:05 -05:00
|
|
|
end
|
|
|
|
|
2019-12-03 13:06:49 -05:00
|
|
|
def expanded_kubernetes_namespace
|
|
|
|
return unless has_environment?
|
|
|
|
|
|
|
|
namespace = options.dig(:environment, :kubernetes, :namespace)
|
|
|
|
|
|
|
|
if namespace.present?
|
|
|
|
strong_memoize(:expanded_kubernetes_namespace) do
|
|
|
|
ExpandVariables.expand(namespace, -> { simple_variables })
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-12-24 07:08:01 -05:00
|
|
|
def requires_resource?
|
2019-12-31 01:09:12 -05:00
|
|
|
Feature.enabled?(:ci_resource_group, project, default_enabled: true) &&
|
2019-12-24 07:08:01 -05:00
|
|
|
self.resource_group_id.present?
|
|
|
|
end
|
|
|
|
|
2016-11-17 06:08:28 -05:00
|
|
|
def has_environment?
|
2016-12-16 07:24:03 -05:00
|
|
|
environment.present?
|
2016-11-17 06:08:28 -05:00
|
|
|
end
|
|
|
|
|
2016-11-16 18:23:05 -05:00
|
|
|
def starts_environment?
|
2016-11-17 06:08:28 -05:00
|
|
|
has_environment? && self.environment_action == 'start'
|
2016-11-16 18:23:05 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
def stops_environment?
|
2016-11-17 06:08:28 -05:00
|
|
|
has_environment? && self.environment_action == 'stop'
|
2016-11-16 18:23:05 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
def environment_action
|
2016-12-08 11:52:24 -05:00
|
|
|
self.options.fetch(:environment, {}).fetch(:action, 'start') if self.options
|
2016-11-16 18:23:05 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
def outdated_deployment?
|
2018-11-04 19:37:40 -05:00
|
|
|
success? && !deployment.try(:last?)
|
2016-11-04 11:35:22 -04:00
|
|
|
end
|
2016-11-02 18:25:19 -04:00
|
|
|
|
2016-01-14 13:45:43 -05:00
|
|
|
def depends_on_builds
|
|
|
|
# Get builds of the same type
|
2016-06-02 10:19:18 -04:00
|
|
|
latest_builds = self.pipeline.builds.latest
|
2016-01-14 13:45:43 -05:00
|
|
|
|
|
|
|
# Return builds from previous stages
|
|
|
|
latest_builds.where('stage_idx < ?', stage_idx)
|
|
|
|
end
|
|
|
|
|
2017-11-06 12:47:05 -05:00
|
|
|
def triggered_by?(current_user)
|
2017-11-06 08:20:44 -05:00
|
|
|
user == current_user
|
|
|
|
end
|
|
|
|
|
2018-11-04 19:37:40 -05:00
|
|
|
def on_stop
|
|
|
|
options&.dig(:environment, :on_stop)
|
|
|
|
end
|
|
|
|
|
2018-03-27 07:05:29 -04:00
|
|
|
##
|
|
|
|
# All variables, including persisted environment variables.
|
|
|
|
#
|
|
|
|
def variables
|
2019-02-14 01:25:10 -05:00
|
|
|
strong_memoize(:variables) do
|
|
|
|
Gitlab::Ci::Variables::Collection.new
|
|
|
|
.concat(persisted_variables)
|
|
|
|
.concat(scoped_variables)
|
2019-07-29 03:43:10 -04:00
|
|
|
.concat(job_variables)
|
2020-02-25 16:09:23 -05:00
|
|
|
.concat(environment_changed_page_variables)
|
2019-02-14 01:25:10 -05:00
|
|
|
.concat(persisted_environment_variables)
|
|
|
|
.to_runner_variables
|
|
|
|
end
|
2018-03-27 07:05:29 -04:00
|
|
|
end
|
|
|
|
|
2019-08-31 15:57:00 -04:00
|
|
|
CI_REGISTRY_USER = 'gitlab-ci-token'
|
2019-03-02 09:29:04 -05:00
|
|
|
|
|
|
|
def persisted_variables
|
|
|
|
Gitlab::Ci::Variables::Collection.new.tap do |variables|
|
|
|
|
break variables unless persisted?
|
|
|
|
|
|
|
|
variables
|
|
|
|
.concat(pipeline.persisted_variables)
|
|
|
|
.append(key: 'CI_JOB_ID', value: id.to_s)
|
|
|
|
.append(key: 'CI_JOB_URL', value: Gitlab::Routing.url_helpers.project_job_url(project, self))
|
2019-03-07 12:08:17 -05:00
|
|
|
.append(key: 'CI_JOB_TOKEN', value: token.to_s, public: false, masked: true)
|
2019-03-02 09:29:04 -05:00
|
|
|
.append(key: 'CI_BUILD_ID', value: id.to_s)
|
2019-03-07 12:08:17 -05:00
|
|
|
.append(key: 'CI_BUILD_TOKEN', value: token.to_s, public: false, masked: true)
|
2019-03-02 09:29:04 -05:00
|
|
|
.append(key: 'CI_REGISTRY_USER', value: CI_REGISTRY_USER)
|
2019-03-07 12:08:17 -05:00
|
|
|
.append(key: 'CI_REGISTRY_PASSWORD', value: token.to_s, public: false, masked: true)
|
2019-03-02 09:29:04 -05:00
|
|
|
.append(key: 'CI_REPOSITORY_URL', value: repo_url.to_s, public: false)
|
|
|
|
.concat(deploy_token_variables)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def persisted_environment_variables
|
|
|
|
Gitlab::Ci::Variables::Collection.new.tap do |variables|
|
|
|
|
break variables unless persisted? && persisted_environment.present?
|
|
|
|
|
|
|
|
variables.concat(persisted_environment.predefined_variables)
|
|
|
|
|
|
|
|
# Here we're passing unexpanded environment_url for runner to expand,
|
|
|
|
# and we need to make sure that CI_ENVIRONMENT_NAME and
|
|
|
|
# CI_ENVIRONMENT_SLUG so on are available for the URL be expanded.
|
|
|
|
variables.append(key: 'CI_ENVIRONMENT_URL', value: environment_url) if environment_url
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-02-25 16:09:23 -05:00
|
|
|
def environment_changed_page_variables
|
|
|
|
Gitlab::Ci::Variables::Collection.new.tap do |variables|
|
|
|
|
break variables unless environment_status
|
|
|
|
|
|
|
|
variables.append(key: 'CI_MERGE_REQUEST_CHANGED_PAGE_PATHS', value: environment_status.changed_paths.join(','))
|
|
|
|
variables.append(key: 'CI_MERGE_REQUEST_CHANGED_PAGE_URLS', value: environment_status.changed_urls.join(','))
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-03-02 09:29:04 -05:00
|
|
|
def deploy_token_variables
|
|
|
|
Gitlab::Ci::Variables::Collection.new.tap do |variables|
|
|
|
|
break variables unless gitlab_deploy_token
|
|
|
|
|
|
|
|
variables.append(key: 'CI_DEPLOY_USER', value: gitlab_deploy_token.username)
|
2019-03-07 12:08:17 -05:00
|
|
|
variables.append(key: 'CI_DEPLOY_PASSWORD', value: gitlab_deploy_token.token, public: false, masked: true)
|
2019-03-02 09:29:04 -05:00
|
|
|
end
|
2016-12-08 11:21:16 -05:00
|
|
|
end
|
|
|
|
|
2017-09-27 10:01:33 -04:00
|
|
|
def features
|
|
|
|
{ trace_sections: true }
|
|
|
|
end
|
|
|
|
|
2015-12-08 00:10:17 -05:00
|
|
|
def merge_request
|
2020-03-19 11:09:41 -04:00
|
|
|
strong_memoize(:merge_request) do
|
|
|
|
merge_requests = MergeRequest.includes(:latest_merge_request_diff)
|
|
|
|
.where(source_branch: ref, source_project: pipeline.project)
|
|
|
|
.reorder(iid: :desc)
|
2017-05-29 03:58:20 -04:00
|
|
|
|
2020-03-19 11:09:41 -04:00
|
|
|
merge_requests.find do |merge_request|
|
|
|
|
merge_request.commit_shas.include?(pipeline.sha)
|
2017-05-23 11:10:07 -04:00
|
|
|
end
|
2020-03-19 11:09:41 -04:00
|
|
|
end
|
2015-12-08 00:10:17 -05:00
|
|
|
end
|
|
|
|
|
2015-08-25 21:42:46 -04:00
|
|
|
def repo_url
|
2018-11-14 12:55:38 -05:00
|
|
|
return unless token
|
|
|
|
|
|
|
|
auth = "gitlab-ci-token:#{token}@"
|
2018-01-27 00:35:53 -05:00
|
|
|
project.http_url_to_repo.sub(%r{^https?://}) do |prefix|
|
2015-12-04 06:55:23 -05:00
|
|
|
prefix + auth
|
|
|
|
end
|
2015-08-25 21:42:46 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
def allow_git_fetch
|
2015-12-04 06:55:23 -05:00
|
|
|
project.build_allow_git_fetch
|
2015-08-25 21:42:46 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
def update_coverage
|
2017-04-06 12:20:27 -04:00
|
|
|
coverage = trace.extract_coverage(coverage_regex)
|
2018-07-02 06:43:06 -04:00
|
|
|
update(coverage: coverage) if coverage.present?
|
2015-08-25 21:42:46 -04:00
|
|
|
end
|
|
|
|
|
2018-08-27 11:31:01 -04:00
|
|
|
# rubocop: disable CodeReuse/ServiceClass
|
2017-09-25 12:54:08 -04:00
|
|
|
def parse_trace_sections!
|
2017-10-06 06:33:10 -04:00
|
|
|
ExtractSectionsFromBuildTraceService.new(project, user).execute(self)
|
2017-09-25 12:54:08 -04:00
|
|
|
end
|
2018-08-27 11:31:01 -04:00
|
|
|
# rubocop: enable CodeReuse/ServiceClass
|
2017-09-25 12:54:08 -04:00
|
|
|
|
2017-04-06 12:20:27 -04:00
|
|
|
def trace
|
|
|
|
Gitlab::Ci::Trace.new(self)
|
2016-06-21 07:12:02 -04:00
|
|
|
end
|
|
|
|
|
2016-02-02 06:12:03 -05:00
|
|
|
def has_trace?
|
2017-04-06 12:20:27 -04:00
|
|
|
trace.exist?
|
2016-08-25 07:53:20 -04:00
|
|
|
end
|
|
|
|
|
2019-07-18 05:22:46 -04:00
|
|
|
def has_live_trace?
|
|
|
|
trace.live_trace_exist?
|
|
|
|
end
|
|
|
|
|
|
|
|
def has_archived_trace?
|
|
|
|
trace.archived_trace_exist?
|
|
|
|
end
|
|
|
|
|
2019-03-22 08:38:45 -04:00
|
|
|
def artifacts_file
|
|
|
|
job_artifacts_archive&.file
|
|
|
|
end
|
|
|
|
|
|
|
|
def artifacts_size
|
|
|
|
job_artifacts_archive&.size
|
|
|
|
end
|
|
|
|
|
|
|
|
def artifacts_metadata
|
|
|
|
job_artifacts_metadata&.file
|
|
|
|
end
|
|
|
|
|
|
|
|
def artifacts?
|
|
|
|
!artifacts_expired? && artifacts_file&.exists?
|
|
|
|
end
|
|
|
|
|
|
|
|
def artifacts_metadata?
|
|
|
|
artifacts? && artifacts_metadata&.exists?
|
|
|
|
end
|
|
|
|
|
2018-09-27 17:15:08 -04:00
|
|
|
def has_job_artifacts?
|
|
|
|
job_artifacts.any?
|
2018-07-27 01:04:35 -04:00
|
|
|
end
|
|
|
|
|
2018-07-03 01:00:25 -04:00
|
|
|
def has_old_trace?
|
|
|
|
old_trace.present?
|
|
|
|
end
|
|
|
|
|
2017-04-06 12:20:27 -04:00
|
|
|
def trace=(data)
|
|
|
|
raise NotImplementedError
|
2016-03-31 07:24:14 -04:00
|
|
|
end
|
|
|
|
|
2017-04-06 12:20:27 -04:00
|
|
|
def old_trace
|
|
|
|
read_attribute(:trace)
|
2016-03-29 09:34:18 -04:00
|
|
|
end
|
|
|
|
|
2017-04-06 12:20:27 -04:00
|
|
|
def erase_old_trace!
|
2018-07-06 02:25:59 -04:00
|
|
|
return unless has_old_trace?
|
2018-07-03 01:00:25 -04:00
|
|
|
|
2018-03-19 09:48:09 -04:00
|
|
|
update_column(:trace, nil)
|
2015-08-25 21:42:46 -04:00
|
|
|
end
|
|
|
|
|
2019-10-21 11:05:58 -04:00
|
|
|
def artifacts_expose_as
|
|
|
|
options.dig(:artifacts, :expose_as)
|
|
|
|
end
|
|
|
|
|
|
|
|
def artifacts_paths
|
|
|
|
options.dig(:artifacts, :paths)
|
|
|
|
end
|
|
|
|
|
2016-10-27 11:05:02 -04:00
|
|
|
def needs_touch?
|
|
|
|
Time.now - updated_at > 15.minutes.to_i
|
|
|
|
end
|
|
|
|
|
2016-05-18 18:43:00 -04:00
|
|
|
def valid_token?(token)
|
2019-06-25 13:54:42 -04:00
|
|
|
self.token && ActiveSupport::SecurityUtils.secure_compare(token, self.token)
|
2015-10-12 17:47:32 -04:00
|
|
|
end
|
|
|
|
|
2016-05-06 03:17:27 -04:00
|
|
|
def has_tags?
|
|
|
|
tag_list.any?
|
|
|
|
end
|
|
|
|
|
2015-10-12 15:12:31 -04:00
|
|
|
def any_runners_online?
|
2016-06-08 03:19:49 -04:00
|
|
|
project.any_runners? { |runner| runner.active? && runner.online? && runner.can_pick?(self) }
|
2015-10-12 15:12:31 -04:00
|
|
|
end
|
|
|
|
|
2016-03-09 10:24:02 -05:00
|
|
|
def stuck?
|
2015-10-12 15:12:31 -04:00
|
|
|
pending? && !any_runners_online?
|
|
|
|
end
|
|
|
|
|
2015-12-07 07:23:23 -05:00
|
|
|
def execute_hooks
|
2016-02-19 11:38:47 -05:00
|
|
|
return unless project
|
2017-11-14 04:02:39 -05:00
|
|
|
|
2019-12-05 07:07:43 -05:00
|
|
|
project.execute_hooks(build_data.dup, :job_hooks) if project.has_active_hooks?(:job_hooks)
|
|
|
|
project.execute_services(build_data.dup, :job_hooks) if project.has_active_services?(:job_hooks)
|
2015-12-07 07:23:23 -05:00
|
|
|
end
|
|
|
|
|
2017-06-08 01:29:35 -04:00
|
|
|
def browsable_artifacts?
|
|
|
|
artifacts_metadata?
|
|
|
|
end
|
|
|
|
|
2016-01-20 15:48:22 -05:00
|
|
|
def artifacts_metadata_entry(path, **options)
|
2018-07-09 07:34:18 -04:00
|
|
|
artifacts_metadata.open do |metadata_stream|
|
2017-06-08 01:29:35 -04:00
|
|
|
metadata = Gitlab::Ci::Build::Artifacts::Metadata.new(
|
2018-07-09 07:34:18 -04:00
|
|
|
metadata_stream,
|
2017-06-08 01:29:35 -04:00
|
|
|
path,
|
|
|
|
**options)
|
2016-06-28 07:16:48 -04:00
|
|
|
|
2017-06-08 01:29:35 -04:00
|
|
|
metadata.to_entry
|
|
|
|
end
|
2015-12-28 04:35:51 -05:00
|
|
|
end
|
|
|
|
|
2018-09-27 17:15:08 -04:00
|
|
|
# and use that for `ExpireBuildInstanceArtifactsWorker`?
|
|
|
|
def erase_erasable_artifacts!
|
|
|
|
job_artifacts.erasable.destroy_all # rubocop: disable DestroyAll
|
2018-07-27 01:04:35 -04:00
|
|
|
end
|
|
|
|
|
2016-02-16 02:39:20 -05:00
|
|
|
def erase(opts = {})
|
|
|
|
return false unless erasable?
|
|
|
|
|
2018-09-27 17:15:08 -04:00
|
|
|
job_artifacts.destroy_all # rubocop: disable DestroyAll
|
2016-02-16 02:39:20 -05:00
|
|
|
erase_trace!
|
|
|
|
update_erased!(opts[:erased_by])
|
|
|
|
end
|
|
|
|
|
|
|
|
def erasable?
|
2018-09-27 17:15:08 -04:00
|
|
|
complete? && (artifacts? || has_job_artifacts? || has_trace?)
|
2016-02-16 02:39:20 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
def erased?
|
|
|
|
!self.erased_at.nil?
|
|
|
|
end
|
|
|
|
|
2016-05-18 16:21:51 -04:00
|
|
|
def artifacts_expired?
|
2016-06-10 08:40:25 -04:00
|
|
|
artifacts_expire_at && artifacts_expire_at < Time.now
|
2016-05-18 16:21:51 -04:00
|
|
|
end
|
|
|
|
|
2016-06-10 08:25:54 -04:00
|
|
|
def artifacts_expire_in
|
|
|
|
artifacts_expire_at - Time.now if artifacts_expire_at
|
|
|
|
end
|
|
|
|
|
|
|
|
def artifacts_expire_in=(value)
|
2016-06-10 15:45:06 -04:00
|
|
|
self.artifacts_expire_at =
|
|
|
|
if value
|
2017-02-16 10:40:13 -05:00
|
|
|
ChronicDuration.parse(value)&.seconds&.from_now
|
2016-06-10 15:45:06 -04:00
|
|
|
end
|
2016-06-10 08:25:54 -04:00
|
|
|
end
|
|
|
|
|
2020-02-03 16:09:00 -05:00
|
|
|
def has_expiring_archive_artifacts?
|
|
|
|
has_expiring_artifacts? && job_artifacts_archive.present?
|
2017-01-09 04:58:45 -05:00
|
|
|
end
|
|
|
|
|
2016-06-08 11:18:54 -04:00
|
|
|
def keep_artifacts!
|
2016-05-18 16:21:51 -04:00
|
|
|
self.update(artifacts_expire_at: nil)
|
2017-12-03 06:02:11 -05:00
|
|
|
self.job_artifacts.update_all(expire_at: nil)
|
2016-05-18 16:21:51 -04:00
|
|
|
end
|
|
|
|
|
2018-10-02 13:01:26 -04:00
|
|
|
def artifacts_file_for_type(type)
|
2019-03-22 08:38:45 -04:00
|
|
|
job_artifacts.find_by(file_type: Ci::JobArtifact.file_types[type])&.file
|
2018-10-02 13:01:26 -04:00
|
|
|
end
|
|
|
|
|
2016-11-13 22:56:39 -05:00
|
|
|
def coverage_regex
|
2016-12-12 23:53:12 -05:00
|
|
|
super || project.try(:build_coverage_regex)
|
2016-11-13 22:56:39 -05:00
|
|
|
end
|
|
|
|
|
2017-02-15 19:05:44 -05:00
|
|
|
def steps
|
2017-03-07 06:30:34 -05:00
|
|
|
[Gitlab::Ci::Build::Step.from_commands(self),
|
|
|
|
Gitlab::Ci::Build::Step.from_after_script(self)].compact
|
2017-02-15 19:05:44 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
def image
|
2017-03-02 11:44:15 -05:00
|
|
|
Gitlab::Ci::Build::Image.from_image(self)
|
2017-02-15 19:05:44 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
def services
|
2017-03-02 11:44:15 -05:00
|
|
|
Gitlab::Ci::Build::Image.from_services(self)
|
2017-02-15 19:05:44 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
def cache
|
2018-01-04 13:43:31 -05:00
|
|
|
cache = options[:cache]
|
|
|
|
|
|
|
|
if cache && project.jobs_cache_index
|
|
|
|
cache = cache.merge(
|
2018-02-21 08:01:02 -05:00
|
|
|
key: "#{cache[:key]}-#{project.jobs_cache_index}")
|
2017-12-22 17:06:15 -05:00
|
|
|
end
|
2018-01-04 13:43:31 -05:00
|
|
|
|
|
|
|
[cache]
|
2017-02-15 19:05:44 -05:00
|
|
|
end
|
|
|
|
|
2016-11-20 14:43:50 -05:00
|
|
|
def credentials
|
2016-11-21 10:02:08 -05:00
|
|
|
Gitlab::Ci::Build::Credentials::Factory.new(self).create!
|
2016-11-20 14:43:50 -05:00
|
|
|
end
|
|
|
|
|
2019-12-17 19:08:09 -05:00
|
|
|
def all_dependencies
|
|
|
|
(dependencies + cross_dependencies).uniq
|
|
|
|
end
|
|
|
|
|
2017-03-16 09:45:05 -04:00
|
|
|
def dependencies
|
2017-04-05 08:07:10 -04:00
|
|
|
return [] if empty_dependencies?
|
|
|
|
|
2017-03-16 09:45:05 -04:00
|
|
|
depended_jobs = depends_on_builds
|
|
|
|
|
2019-08-02 07:28:59 -04:00
|
|
|
# find all jobs that are needed
|
2020-02-14 07:09:03 -05:00
|
|
|
if Feature.enabled?(:ci_dag_support, project, default_enabled: true) && scheduling_type_dag?
|
2019-11-27 10:06:45 -05:00
|
|
|
depended_jobs = depended_jobs.where(name: needs.artifacts.select(:name))
|
2019-08-01 10:26:49 -04:00
|
|
|
end
|
2017-03-16 09:45:05 -04:00
|
|
|
|
2019-08-02 07:28:59 -04:00
|
|
|
# find all jobs that are dependent on
|
|
|
|
if options[:dependencies].present?
|
|
|
|
depended_jobs = depended_jobs.where(name: options[:dependencies])
|
2017-03-16 09:45:05 -04:00
|
|
|
end
|
2019-08-01 10:26:49 -04:00
|
|
|
|
2019-11-27 10:06:45 -05:00
|
|
|
# if both needs and dependencies are used,
|
|
|
|
# the end result will be an intersection between them
|
2019-08-01 10:26:49 -04:00
|
|
|
depended_jobs
|
2017-03-16 09:45:05 -04:00
|
|
|
end
|
|
|
|
|
2019-12-17 19:08:09 -05:00
|
|
|
def cross_dependencies
|
|
|
|
[]
|
|
|
|
end
|
|
|
|
|
2017-04-05 08:07:10 -04:00
|
|
|
def empty_dependencies?
|
|
|
|
options[:dependencies]&.empty?
|
|
|
|
end
|
|
|
|
|
2018-07-30 10:31:02 -04:00
|
|
|
def has_valid_build_dependencies?
|
2018-08-01 04:56:12 -04:00
|
|
|
return true if Feature.enabled?('ci_disable_validates_dependencies')
|
2018-07-17 06:58:57 -04:00
|
|
|
|
2018-08-01 04:56:12 -04:00
|
|
|
dependencies.all?(&:valid_dependency?)
|
2017-09-04 04:56:49 -04:00
|
|
|
end
|
|
|
|
|
2018-08-01 04:56:12 -04:00
|
|
|
def valid_dependency?
|
2017-12-02 02:23:19 -05:00
|
|
|
return false if artifacts_expired?
|
|
|
|
return false if erased?
|
|
|
|
|
|
|
|
true
|
|
|
|
end
|
|
|
|
|
2019-10-17 14:08:05 -04:00
|
|
|
def invalid_dependencies
|
|
|
|
dependencies.reject(&:valid_dependency?)
|
|
|
|
end
|
|
|
|
|
2018-07-30 11:26:56 -04:00
|
|
|
def runner_required_feature_names
|
|
|
|
strong_memoize(:runner_required_feature_names) do
|
|
|
|
RUNNER_FEATURES.select do |feature, method|
|
|
|
|
method.call(self)
|
|
|
|
end.keys
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-07-17 06:58:57 -04:00
|
|
|
def supported_runner?(features)
|
2018-07-30 11:26:56 -04:00
|
|
|
runner_required_feature_names.all? do |feature_name|
|
2018-07-17 08:00:54 -04:00
|
|
|
features&.dig(feature_name)
|
2018-07-17 06:58:57 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-07-30 11:18:28 -04:00
|
|
|
def publishes_artifacts_reports?
|
2018-07-30 11:26:56 -04:00
|
|
|
options&.dig(:artifacts, :reports)&.any?
|
2018-07-30 11:18:28 -04:00
|
|
|
end
|
|
|
|
|
2017-04-06 12:20:27 -04:00
|
|
|
def hide_secrets(trace)
|
|
|
|
return unless trace
|
|
|
|
|
|
|
|
trace = trace.dup
|
2017-09-06 07:26:15 -04:00
|
|
|
Gitlab::Ci::MaskSecret.mask!(trace, project.runners_token) if project
|
2018-11-14 12:55:38 -05:00
|
|
|
Gitlab::Ci::MaskSecret.mask!(trace, token) if token
|
2017-04-06 12:20:27 -04:00
|
|
|
trace
|
|
|
|
end
|
|
|
|
|
2017-09-05 11:10:57 -04:00
|
|
|
def serializable_hash(options = {})
|
2017-09-06 04:16:11 -04:00
|
|
|
super(options).merge(when: read_attribute(:when))
|
2017-09-05 11:10:57 -04:00
|
|
|
end
|
|
|
|
|
2018-07-05 09:55:10 -04:00
|
|
|
def has_terminal?
|
|
|
|
running? && runner_session_url.present?
|
|
|
|
end
|
|
|
|
|
2018-08-02 02:05:07 -04:00
|
|
|
def collect_test_reports!(test_reports)
|
|
|
|
test_reports.get_suite(group_name).tap do |test_suite|
|
2018-09-27 17:15:08 -04:00
|
|
|
each_report(Ci::JobArtifact::TEST_REPORT_FILE_TYPES) do |file_type, blob|
|
2018-11-05 08:45:36 -05:00
|
|
|
Gitlab::Ci::Parsers.fabricate!(file_type).parse!(blob, test_suite)
|
2018-08-02 02:05:07 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-03-17 14:09:44 -04:00
|
|
|
def collect_coverage_reports!(coverage_report)
|
|
|
|
each_report(Ci::JobArtifact::COVERAGE_REPORT_FILE_TYPES) do |file_type, blob|
|
|
|
|
Gitlab::Ci::Parsers.fabricate!(file_type).parse!(blob, coverage_report)
|
|
|
|
end
|
|
|
|
|
|
|
|
coverage_report
|
|
|
|
end
|
|
|
|
|
2019-05-24 20:08:53 -04:00
|
|
|
def report_artifacts
|
|
|
|
job_artifacts.with_reports
|
|
|
|
end
|
|
|
|
|
2018-08-20 09:15:53 -04:00
|
|
|
# Virtual deployment status depending on the environment status.
|
|
|
|
def deployment_status
|
2019-02-08 07:19:53 -05:00
|
|
|
return unless starts_environment?
|
2018-08-20 09:15:53 -04:00
|
|
|
|
|
|
|
if success?
|
|
|
|
return successful_deployment_status
|
2018-11-04 19:37:40 -05:00
|
|
|
elsif failed?
|
2018-08-20 09:15:53 -04:00
|
|
|
return :failed
|
|
|
|
end
|
|
|
|
|
|
|
|
:creating
|
|
|
|
end
|
|
|
|
|
2019-10-30 17:07:58 -04:00
|
|
|
# Consider this object to have a structural integrity problems
|
|
|
|
def doom!
|
|
|
|
update_columns(
|
|
|
|
status: :failed,
|
|
|
|
failure_reason: :data_integrity_failure)
|
|
|
|
end
|
|
|
|
|
2016-02-16 02:39:20 -05:00
|
|
|
private
|
|
|
|
|
2019-12-05 07:07:43 -05:00
|
|
|
def build_data
|
|
|
|
@build_data ||= Gitlab::DataBuilder::Build.build(self)
|
|
|
|
end
|
|
|
|
|
2018-08-20 09:15:53 -04:00
|
|
|
def successful_deployment_status
|
2018-11-04 19:37:40 -05:00
|
|
|
if deployment&.last?
|
|
|
|
:last
|
|
|
|
else
|
|
|
|
:out_of_date
|
2018-08-20 09:15:53 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-09-27 17:15:08 -04:00
|
|
|
def each_report(report_types)
|
|
|
|
job_artifacts_for_types(report_types).each do |report_artifact|
|
|
|
|
report_artifact.each_blob do |blob|
|
2019-12-17 04:07:48 -05:00
|
|
|
yield report_artifact.file_type, blob, report_artifact
|
2018-08-02 02:05:07 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-09-27 17:15:08 -04:00
|
|
|
def job_artifacts_for_types(report_types)
|
|
|
|
# Use select to leverage cached associations and avoid N+1 queries
|
|
|
|
job_artifacts.select { |artifact| artifact.file_type.in?(report_types) }
|
|
|
|
end
|
|
|
|
|
2016-02-16 02:39:20 -05:00
|
|
|
def erase_trace!
|
2017-04-06 12:20:27 -04:00
|
|
|
trace.erase!
|
2016-02-16 02:39:20 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
def update_erased!(user = nil)
|
2016-06-08 11:18:54 -04:00
|
|
|
self.update(erased_by: user, erased_at: Time.now, artifacts_expire_at: nil)
|
2016-02-16 02:39:20 -05:00
|
|
|
end
|
|
|
|
|
2017-02-03 10:21:10 -05:00
|
|
|
def unscoped_project
|
2017-03-17 19:06:11 -04:00
|
|
|
@unscoped_project ||= Project.unscoped.find_by(id: project_id)
|
2017-02-03 10:21:10 -05:00
|
|
|
end
|
|
|
|
|
2017-06-21 06:03:42 -04:00
|
|
|
def environment_url
|
2017-06-21 08:22:26 -04:00
|
|
|
options&.dig(:environment, :url) || persisted_environment&.external_url
|
2017-06-21 06:03:42 -04:00
|
|
|
end
|
|
|
|
|
2020-02-25 16:09:23 -05:00
|
|
|
def environment_status
|
|
|
|
strong_memoize(:environment_status) do
|
|
|
|
if has_environment? && merge_request
|
|
|
|
EnvironmentStatus.new(project, persisted_environment, merge_request, pipeline.sha)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-11-05 13:36:51 -05:00
|
|
|
# The format of the retry option changed in GitLab 11.5: Before it was
|
|
|
|
# integer only, after it is a hash. New builds are created with the new
|
|
|
|
# format, but builds created before GitLab 11.5 and saved in database still
|
|
|
|
# have the old integer only format. This method returns the retry option
|
|
|
|
# normalized as a hash in 11.5+ format.
|
2019-10-30 17:07:58 -04:00
|
|
|
def options_retry
|
|
|
|
strong_memoize(:options_retry) do
|
2018-09-02 10:35:15 -04:00
|
|
|
value = options&.dig(:retry)
|
|
|
|
value = value.is_a?(Integer) ? { max: value } : value.to_h
|
|
|
|
value.with_indifferent_access
|
|
|
|
end
|
2018-11-05 11:28:25 -05:00
|
|
|
end
|
2020-02-03 16:09:00 -05:00
|
|
|
|
|
|
|
def has_expiring_artifacts?
|
|
|
|
artifacts_expire_at.present? && artifacts_expire_at > Time.now
|
|
|
|
end
|
2015-08-25 21:42:46 -04:00
|
|
|
end
|
|
|
|
end
|
2019-09-13 09:26:31 -04:00
|
|
|
|
|
|
|
Ci::Build.prepend_if_ee('EE::Ci::Build')
|