2018-10-22 03:00:50 -04:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2017-06-16 12:42:41 -04:00
|
|
|
require 'base64'
|
|
|
|
|
2017-02-05 13:04:23 -05:00
|
|
|
require 'gitaly'
|
2018-01-21 18:34:09 -05:00
|
|
|
require 'grpc/health/v1/health_pb'
|
|
|
|
require 'grpc/health/v1/health_services_pb'
|
2017-02-05 13:04:23 -05:00
|
|
|
|
|
|
|
module Gitlab
|
|
|
|
module GitalyClient
|
2018-01-29 06:33:08 -05:00
|
|
|
include Gitlab::Metrics::Methods
|
2017-05-31 17:06:01 -04:00
|
|
|
|
2017-09-19 06:55:37 -04:00
|
|
|
class TooManyInvocationsError < StandardError
|
|
|
|
attr_reader :call_site, :invocation_count, :max_call_stack
|
|
|
|
|
|
|
|
def initialize(call_site, invocation_count, max_call_stack, most_invoked_stack)
|
|
|
|
@call_site = call_site
|
|
|
|
@invocation_count = invocation_count
|
|
|
|
@max_call_stack = max_call_stack
|
|
|
|
stacks = most_invoked_stack.join('\n') if most_invoked_stack
|
|
|
|
|
|
|
|
msg = "GitalyClient##{call_site} called #{invocation_count} times from single request. Potential n+1?"
|
2018-10-22 03:00:50 -04:00
|
|
|
msg = "#{msg}\nThe following call site called into Gitaly #{max_call_stack} times:\n#{stacks}\n" if stacks
|
2017-09-19 06:55:37 -04:00
|
|
|
|
|
|
|
super(msg)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-12-19 05:36:06 -05:00
|
|
|
PEM_REGEX = /\-+BEGIN CERTIFICATE\-+.+?\-+END CERTIFICATE\-+/m
|
2018-11-20 07:29:56 -05:00
|
|
|
SERVER_VERSION_FILE = 'GITALY_SERVER_VERSION'
|
2019-02-22 09:51:27 -05:00
|
|
|
MAXIMUM_GITALY_CALLS = 30
|
2017-10-06 13:16:20 -04:00
|
|
|
CLIENT_NAME = (Sidekiq.server? ? 'gitlab-sidekiq' : 'gitlab-web').freeze
|
2017-03-13 10:04:46 -04:00
|
|
|
|
2017-05-10 08:18:59 -04:00
|
|
|
MUTEX = Mutex.new
|
2017-03-30 10:26:30 -04:00
|
|
|
|
2017-10-18 07:26:00 -04:00
|
|
|
class << self
|
2017-11-07 09:13:48 -05:00
|
|
|
attr_accessor :query_time
|
2017-10-18 07:26:00 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
self.query_time = 0
|
2017-11-07 09:13:48 -05:00
|
|
|
|
2018-01-18 07:49:33 -05:00
|
|
|
define_histogram :gitaly_controller_action_duration_seconds do
|
|
|
|
docstring "Gitaly endpoint histogram by controller and action combination"
|
|
|
|
base_labels Gitlab::Metrics::Transaction::BASE_LABELS.merge(gitaly_service: nil, rpc: nil)
|
2017-11-07 09:13:48 -05:00
|
|
|
end
|
2017-10-18 07:26:00 -04:00
|
|
|
|
2017-05-10 08:18:59 -04:00
|
|
|
def self.stub(name, storage)
|
|
|
|
MUTEX.synchronize do
|
|
|
|
@stubs ||= {}
|
|
|
|
@stubs[storage] ||= {}
|
|
|
|
@stubs[storage][name] ||= begin
|
2018-01-21 18:34:09 -05:00
|
|
|
klass = stub_class(name)
|
|
|
|
addr = stub_address(storage)
|
2018-10-25 10:35:04 -04:00
|
|
|
creds = stub_creds(storage)
|
2019-01-07 05:40:54 -05:00
|
|
|
klass.new(addr, creds, interceptors: interceptors)
|
2017-03-30 10:26:30 -04:00
|
|
|
end
|
|
|
|
end
|
2017-03-22 13:23:40 -04:00
|
|
|
end
|
|
|
|
|
2019-01-07 05:40:54 -05:00
|
|
|
def self.interceptors
|
|
|
|
return [] unless Gitlab::Tracing.enabled?
|
|
|
|
|
|
|
|
[Gitlab::Tracing::GRPCInterceptor.instance]
|
|
|
|
end
|
|
|
|
private_class_method :interceptors
|
|
|
|
|
2018-12-19 12:07:33 -05:00
|
|
|
def self.stub_cert_paths
|
2018-12-11 06:41:03 -05:00
|
|
|
cert_paths = Dir["#{OpenSSL::X509::DEFAULT_CERT_DIR}/*"]
|
|
|
|
cert_paths << OpenSSL::X509::DEFAULT_CERT_FILE if File.exist? OpenSSL::X509::DEFAULT_CERT_FILE
|
2018-12-19 12:07:33 -05:00
|
|
|
cert_paths
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.stub_certs
|
|
|
|
return @certs if @certs
|
2018-12-11 06:41:03 -05:00
|
|
|
|
2018-12-19 12:07:33 -05:00
|
|
|
@certs = stub_cert_paths.flat_map do |cert_file|
|
2018-12-19 05:36:06 -05:00
|
|
|
File.read(cert_file).scan(PEM_REGEX).map do |cert|
|
2019-03-13 09:42:43 -04:00
|
|
|
OpenSSL::X509::Certificate.new(cert).to_pem
|
|
|
|
rescue OpenSSL::OpenSSLError => e
|
|
|
|
Rails.logger.error "Could not load certificate #{cert_file} #{e}"
|
|
|
|
Gitlab::Sentry.track_exception(e, extra: { cert_file: cert_file })
|
|
|
|
nil
|
2018-12-19 05:36:06 -05:00
|
|
|
end.compact
|
|
|
|
end.uniq.join("\n")
|
2018-11-19 06:57:48 -05:00
|
|
|
end
|
|
|
|
|
2018-10-25 10:35:04 -04:00
|
|
|
def self.stub_creds(storage)
|
|
|
|
if URI(address(storage)).scheme == 'tls'
|
2018-12-19 05:36:06 -05:00
|
|
|
GRPC::Core::ChannelCredentials.new stub_certs
|
2018-10-25 10:35:04 -04:00
|
|
|
else
|
|
|
|
:this_channel_is_insecure
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-01-21 18:34:09 -05:00
|
|
|
def self.stub_class(name)
|
|
|
|
if name == :health_check
|
|
|
|
Grpc::Health::V1::Health::Stub
|
|
|
|
else
|
|
|
|
Gitaly.const_get(name.to_s.camelcase.to_sym).const_get(:Stub)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.stub_address(storage)
|
2018-12-19 05:36:06 -05:00
|
|
|
address(storage).sub(%r{^tcp://|^tls://}, '')
|
2018-01-21 18:34:09 -05:00
|
|
|
end
|
|
|
|
|
2017-05-10 08:18:59 -04:00
|
|
|
def self.clear_stubs!
|
|
|
|
MUTEX.synchronize do
|
|
|
|
@stubs = nil
|
|
|
|
end
|
2017-02-05 13:04:23 -05:00
|
|
|
end
|
|
|
|
|
2018-03-27 05:48:11 -04:00
|
|
|
def self.random_storage
|
|
|
|
Gitlab.config.repositories.storages.keys.sample
|
|
|
|
end
|
|
|
|
|
2017-05-10 08:18:59 -04:00
|
|
|
def self.address(storage)
|
|
|
|
params = Gitlab.config.repositories.storages[storage]
|
|
|
|
raise "storage not found: #{storage.inspect}" if params.nil?
|
2017-03-30 10:26:30 -04:00
|
|
|
|
2017-05-10 08:18:59 -04:00
|
|
|
address = params['gitaly_address']
|
|
|
|
unless address.present?
|
|
|
|
raise "storage #{storage.inspect} is missing a gitaly_address"
|
|
|
|
end
|
2017-03-24 13:22:42 -04:00
|
|
|
|
2018-10-25 10:35:04 -04:00
|
|
|
unless URI(address).scheme.in?(%w(tcp unix tls))
|
|
|
|
raise "Unsupported Gitaly address: #{address.inspect} does not use URL scheme 'tcp' or 'unix' or 'tls'"
|
2017-03-30 10:26:30 -04:00
|
|
|
end
|
|
|
|
|
2017-05-10 08:18:59 -04:00
|
|
|
address
|
2017-02-05 13:04:23 -05:00
|
|
|
end
|
|
|
|
|
2017-11-22 05:19:42 -05:00
|
|
|
def self.address_metadata(storage)
|
2019-01-25 07:10:04 -05:00
|
|
|
Base64.strict_encode64(JSON.dump(storage => connection_data(storage)))
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.connection_data(storage)
|
|
|
|
{ 'address' => address(storage), 'token' => token(storage) }
|
2017-11-22 05:19:42 -05:00
|
|
|
end
|
|
|
|
|
2017-06-20 11:31:49 -04:00
|
|
|
# All Gitaly RPC call sites should use GitalyClient.call. This method
|
|
|
|
# makes sure that per-request authentication headers are set.
|
2017-10-16 05:21:42 -04:00
|
|
|
#
|
|
|
|
# This method optionally takes a block which receives the keyword
|
|
|
|
# arguments hash 'kwargs' that will be passed to gRPC. This allows the
|
|
|
|
# caller to modify or augment the keyword arguments. The block must
|
|
|
|
# return a hash.
|
|
|
|
#
|
|
|
|
# For example:
|
|
|
|
#
|
|
|
|
# GitalyClient.call(storage, service, rpc, request) do |kwargs|
|
|
|
|
# kwargs.merge(deadline: Time.now + 10)
|
|
|
|
# end
|
|
|
|
#
|
2017-11-29 04:12:12 -05:00
|
|
|
def self.call(storage, service, rpc, request, remote_storage: nil, timeout: nil)
|
2017-11-07 09:13:48 -05:00
|
|
|
start = Gitlab::Metrics::System.monotonic_time
|
2018-03-08 07:10:59 -05:00
|
|
|
request_hash = request.is_a?(Google::Protobuf::MessageExts) ? request.to_h : {}
|
2018-03-06 09:02:18 -05:00
|
|
|
|
2017-09-19 06:55:37 -04:00
|
|
|
enforce_gitaly_request_limits(:call)
|
|
|
|
|
2017-11-29 04:12:12 -05:00
|
|
|
kwargs = request_kwargs(storage, timeout, remote_storage: remote_storage)
|
2017-10-16 05:21:42 -04:00
|
|
|
kwargs = yield(kwargs) if block_given?
|
2017-11-22 05:19:42 -05:00
|
|
|
|
2017-10-16 05:21:42 -04:00
|
|
|
stub(service, storage).__send__(rpc, request, kwargs) # rubocop:disable GitlabSecurity/PublicSend
|
2017-10-18 07:26:00 -04:00
|
|
|
ensure
|
2017-11-07 09:13:48 -05:00
|
|
|
duration = Gitlab::Metrics::System.monotonic_time - start
|
|
|
|
|
2018-11-15 05:13:50 -05:00
|
|
|
# Keep track, separately, for the performance bar
|
2017-11-07 09:13:48 -05:00
|
|
|
self.query_time += duration
|
2018-01-18 07:49:33 -05:00
|
|
|
gitaly_controller_action_duration_seconds.observe(
|
2017-11-07 09:13:48 -05:00
|
|
|
current_transaction_labels.merge(gitaly_service: service.to_s, rpc: rpc.to_s),
|
|
|
|
duration)
|
2018-03-08 07:10:59 -05:00
|
|
|
|
2018-11-20 07:29:56 -05:00
|
|
|
add_call_details(feature: "#{service}##{rpc}", duration: duration, request: request_hash, rpc: rpc)
|
2017-11-07 09:13:48 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
def self.current_transaction_labels
|
|
|
|
Gitlab::Metrics::Transaction.current&.labels || {}
|
2017-06-16 12:42:41 -04:00
|
|
|
end
|
2017-11-07 09:13:48 -05:00
|
|
|
private_class_method :current_transaction_labels
|
2017-07-21 03:36:31 -04:00
|
|
|
|
2018-08-29 15:53:44 -04:00
|
|
|
# For some time related tasks we can't rely on `Time.now` since it will be
|
|
|
|
# affected by Timecop in some tests, and the clock of some gitaly-related
|
|
|
|
# components (grpc's c-core and gitaly server) use system time instead of
|
|
|
|
# timecop's time, so tests will fail.
|
|
|
|
# `Time.at(Process.clock_gettime(Process::CLOCK_REALTIME))` will circumvent
|
|
|
|
# timecop.
|
|
|
|
def self.real_time
|
|
|
|
Time.at(Process.clock_gettime(Process::CLOCK_REALTIME))
|
|
|
|
end
|
|
|
|
private_class_method :real_time
|
|
|
|
|
|
|
|
def self.authorization_token(storage)
|
|
|
|
token = token(storage).to_s
|
|
|
|
issued_at = real_time.to_i.to_s
|
|
|
|
hmac = OpenSSL::HMAC.hexdigest(OpenSSL::Digest::SHA256.new, token, issued_at)
|
|
|
|
|
|
|
|
"v2.#{hmac}.#{issued_at}"
|
|
|
|
end
|
|
|
|
private_class_method :authorization_token
|
|
|
|
|
2017-11-29 04:12:12 -05:00
|
|
|
def self.request_kwargs(storage, timeout, remote_storage: nil)
|
2017-10-06 13:16:20 -04:00
|
|
|
metadata = {
|
2018-08-29 15:53:44 -04:00
|
|
|
'authorization' => "Bearer #{authorization_token(storage)}",
|
2017-10-06 13:16:20 -04:00
|
|
|
'client_name' => CLIENT_NAME
|
|
|
|
}
|
|
|
|
|
|
|
|
feature_stack = Thread.current[:gitaly_feature_stack]
|
|
|
|
feature = feature_stack && feature_stack[0]
|
|
|
|
metadata['call_site'] = feature.to_s if feature
|
2017-11-22 05:19:42 -05:00
|
|
|
metadata['gitaly-servers'] = address_metadata(remote_storage) if remote_storage
|
2018-12-07 16:57:56 -05:00
|
|
|
metadata['x-gitlab-correlation-id'] = Gitlab::CorrelationId.current_id if Gitlab::CorrelationId.current_id
|
2017-10-06 13:16:20 -04:00
|
|
|
|
2018-06-01 05:37:03 -04:00
|
|
|
metadata.merge!(server_feature_flags)
|
2018-05-16 04:20:14 -04:00
|
|
|
|
2017-11-29 04:12:12 -05:00
|
|
|
result = { metadata: metadata }
|
|
|
|
|
|
|
|
# nil timeout indicates that we should use the default
|
|
|
|
timeout = default_timeout if timeout.nil?
|
|
|
|
|
|
|
|
return result unless timeout > 0
|
|
|
|
|
2018-08-29 15:53:44 -04:00
|
|
|
deadline = real_time + timeout
|
2017-11-29 04:12:12 -05:00
|
|
|
result[:deadline] = deadline
|
|
|
|
|
|
|
|
result
|
2017-06-16 12:42:41 -04:00
|
|
|
end
|
|
|
|
|
2019-02-27 15:03:23 -05:00
|
|
|
SERVER_FEATURE_FLAGS = %w[go-find-all-tags].freeze
|
2018-05-16 04:20:14 -04:00
|
|
|
|
2018-06-01 05:37:03 -04:00
|
|
|
def self.server_feature_flags
|
|
|
|
SERVER_FEATURE_FLAGS.map do |f|
|
|
|
|
["gitaly-feature-#{f.tr('_', '-')}", feature_enabled?(f).to_s]
|
|
|
|
end.to_h
|
2018-05-16 04:20:14 -04:00
|
|
|
end
|
|
|
|
|
2017-06-16 12:42:41 -04:00
|
|
|
def self.token(storage)
|
|
|
|
params = Gitlab.config.repositories.storages[storage]
|
|
|
|
raise "storage not found: #{storage.inspect}" if params.nil?
|
|
|
|
|
|
|
|
params['gitaly_token'].presence || Gitlab.config.gitaly['token']
|
|
|
|
end
|
|
|
|
|
2018-11-20 07:29:56 -05:00
|
|
|
def self.feature_enabled?(feature_name)
|
2019-03-05 12:09:48 -05:00
|
|
|
Feature::FlipperFeature.table_exists? && Feature.enabled?("gitaly_#{feature_name}")
|
|
|
|
rescue ActiveRecord::NoDatabaseError
|
|
|
|
false
|
2017-09-19 06:55:37 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
# Ensures that Gitaly is not being abuse through n+1 misuse etc
|
|
|
|
def self.enforce_gitaly_request_limits(call_site)
|
|
|
|
# Only count limits in request-response environments (not sidekiq for example)
|
2018-09-20 18:40:15 -04:00
|
|
|
return unless Gitlab::SafeRequestStore.active?
|
2017-09-19 06:55:37 -04:00
|
|
|
|
|
|
|
# This is this actual number of times this call was made. Used for information purposes only
|
|
|
|
actual_call_count = increment_call_count("gitaly_#{call_site}_actual")
|
|
|
|
|
2019-03-11 17:15:03 -04:00
|
|
|
return unless enforce_gitaly_request_limits?
|
2017-09-19 06:55:37 -04:00
|
|
|
|
|
|
|
# Check if this call is nested within a allow_n_plus_1_calls
|
|
|
|
# block and skip check if it is
|
|
|
|
return if get_call_count(:gitaly_call_count_exception_block_depth) > 0
|
|
|
|
|
|
|
|
# This is the count of calls outside of a `allow_n_plus_1_calls` block
|
|
|
|
# It is used for enforcement but not statistics
|
|
|
|
permitted_call_count = increment_call_count("gitaly_#{call_site}_permitted")
|
|
|
|
|
|
|
|
count_stack
|
|
|
|
|
|
|
|
return if permitted_call_count <= MAXIMUM_GITALY_CALLS
|
|
|
|
|
|
|
|
raise TooManyInvocationsError.new(call_site, actual_call_count, max_call_count, max_stacks)
|
|
|
|
end
|
|
|
|
|
2019-03-11 17:15:03 -04:00
|
|
|
def self.enforce_gitaly_request_limits?
|
|
|
|
# We typically don't want to enforce request limits in production
|
|
|
|
# However, we have some production-like test environments, i.e., ones
|
|
|
|
# where `Rails.env.production?` returns `true`. We do want to be able to
|
|
|
|
# check if the limit is being exceeded while testing in those environments
|
|
|
|
# In that case we can use a feature flag to indicate that we do want to
|
|
|
|
# enforce request limits.
|
|
|
|
return true if feature_enabled?('enforce_requests_limits')
|
|
|
|
|
|
|
|
!(Rails.env.production? || ENV["GITALY_DISABLE_REQUEST_LIMITS"])
|
|
|
|
end
|
|
|
|
private_class_method :enforce_gitaly_request_limits?
|
|
|
|
|
2017-09-19 06:55:37 -04:00
|
|
|
def self.allow_n_plus_1_calls
|
2018-09-20 18:40:15 -04:00
|
|
|
return yield unless Gitlab::SafeRequestStore.active?
|
2017-09-19 06:55:37 -04:00
|
|
|
|
|
|
|
begin
|
|
|
|
increment_call_count(:gitaly_call_count_exception_block_depth)
|
|
|
|
yield
|
|
|
|
ensure
|
|
|
|
decrement_call_count(:gitaly_call_count_exception_block_depth)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.get_call_count(key)
|
2018-09-20 18:40:15 -04:00
|
|
|
Gitlab::SafeRequestStore[key] || 0
|
2017-09-19 06:55:37 -04:00
|
|
|
end
|
|
|
|
private_class_method :get_call_count
|
|
|
|
|
|
|
|
def self.increment_call_count(key)
|
2018-09-20 18:40:15 -04:00
|
|
|
Gitlab::SafeRequestStore[key] ||= 0
|
|
|
|
Gitlab::SafeRequestStore[key] += 1
|
2017-09-19 06:55:37 -04:00
|
|
|
end
|
|
|
|
private_class_method :increment_call_count
|
|
|
|
|
|
|
|
def self.decrement_call_count(key)
|
2018-09-20 18:40:15 -04:00
|
|
|
Gitlab::SafeRequestStore[key] -= 1
|
2017-09-19 06:55:37 -04:00
|
|
|
end
|
|
|
|
private_class_method :decrement_call_count
|
|
|
|
|
2018-11-20 07:29:56 -05:00
|
|
|
# Returns the of the number of Gitaly calls made for this request
|
2017-09-19 06:55:37 -04:00
|
|
|
def self.get_request_count
|
2018-11-20 07:29:56 -05:00
|
|
|
get_call_count("gitaly_call_actual")
|
2017-09-19 06:55:37 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
def self.reset_counts
|
2018-09-20 18:40:15 -04:00
|
|
|
return unless Gitlab::SafeRequestStore.active?
|
2017-09-19 06:55:37 -04:00
|
|
|
|
2018-11-20 07:29:56 -05:00
|
|
|
Gitlab::SafeRequestStore["gitaly_call_actual"] = 0
|
|
|
|
Gitlab::SafeRequestStore["gitaly_call_permitted"] = 0
|
2017-02-24 10:53:44 -05:00
|
|
|
end
|
2017-03-13 10:04:46 -04:00
|
|
|
|
2018-03-06 09:02:18 -05:00
|
|
|
def self.add_call_details(details)
|
2018-11-20 07:29:56 -05:00
|
|
|
return unless Gitlab::SafeRequestStore[:peek_enabled]
|
2018-03-06 09:02:18 -05:00
|
|
|
|
2018-11-20 07:40:45 -05:00
|
|
|
Gitlab::SafeRequestStore['gitaly_call_details'] ||= []
|
|
|
|
Gitlab::SafeRequestStore['gitaly_call_details'] << details
|
2018-03-06 09:02:18 -05:00
|
|
|
end
|
|
|
|
|
2018-03-08 07:10:59 -05:00
|
|
|
def self.list_call_details
|
2018-11-20 07:40:45 -05:00
|
|
|
return [] unless Gitlab::SafeRequestStore[:peek_enabled]
|
2018-03-06 09:02:18 -05:00
|
|
|
|
2018-11-20 07:40:45 -05:00
|
|
|
Gitlab::SafeRequestStore['gitaly_call_details'] || []
|
2018-03-06 09:02:18 -05:00
|
|
|
end
|
|
|
|
|
2017-03-13 10:04:46 -04:00
|
|
|
def self.expected_server_version
|
|
|
|
path = Rails.root.join(SERVER_VERSION_FILE)
|
|
|
|
path.read.chomp
|
|
|
|
end
|
2017-07-25 17:33:06 -04:00
|
|
|
|
2018-07-04 10:02:01 -04:00
|
|
|
def self.timestamp(time)
|
|
|
|
Google::Protobuf::Timestamp.new(seconds: time.to_i)
|
2017-09-11 04:17:49 -04:00
|
|
|
end
|
|
|
|
|
2017-11-29 04:12:12 -05:00
|
|
|
# The default timeout on all Gitaly calls
|
|
|
|
def self.default_timeout
|
2018-07-24 07:40:35 -04:00
|
|
|
return no_timeout if Sidekiq.server?
|
2017-11-29 04:12:12 -05:00
|
|
|
|
|
|
|
timeout(:gitaly_timeout_default)
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.fast_timeout
|
|
|
|
timeout(:gitaly_timeout_fast)
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.medium_timeout
|
|
|
|
timeout(:gitaly_timeout_medium)
|
|
|
|
end
|
|
|
|
|
2018-07-24 07:40:35 -04:00
|
|
|
def self.no_timeout
|
|
|
|
0
|
|
|
|
end
|
|
|
|
|
2017-11-29 04:12:12 -05:00
|
|
|
def self.timeout(timeout_name)
|
|
|
|
Gitlab::CurrentSettings.current_application_settings[timeout_name]
|
|
|
|
end
|
|
|
|
private_class_method :timeout
|
|
|
|
|
2017-09-19 06:55:37 -04:00
|
|
|
# Count a stack. Used for n+1 detection
|
|
|
|
def self.count_stack
|
2018-09-20 18:40:15 -04:00
|
|
|
return unless Gitlab::SafeRequestStore.active?
|
2017-09-19 06:55:37 -04:00
|
|
|
|
2018-07-04 11:11:47 -04:00
|
|
|
stack_string = Gitlab::Profiler.clean_backtrace(caller).drop(1).join("\n")
|
2017-09-19 06:55:37 -04:00
|
|
|
|
2018-09-20 18:40:15 -04:00
|
|
|
Gitlab::SafeRequestStore[:stack_counter] ||= Hash.new
|
2017-09-19 06:55:37 -04:00
|
|
|
|
2018-09-20 18:40:15 -04:00
|
|
|
count = Gitlab::SafeRequestStore[:stack_counter][stack_string] || 0
|
|
|
|
Gitlab::SafeRequestStore[:stack_counter][stack_string] = count + 1
|
2017-09-19 06:55:37 -04:00
|
|
|
end
|
|
|
|
private_class_method :count_stack
|
|
|
|
|
|
|
|
# Returns a count for the stack which called Gitaly the most times. Used for n+1 detection
|
|
|
|
def self.max_call_count
|
2018-09-20 18:40:15 -04:00
|
|
|
return 0 unless Gitlab::SafeRequestStore.active?
|
2017-09-19 06:55:37 -04:00
|
|
|
|
2018-09-20 18:40:15 -04:00
|
|
|
stack_counter = Gitlab::SafeRequestStore[:stack_counter]
|
2017-09-19 06:55:37 -04:00
|
|
|
return 0 unless stack_counter
|
|
|
|
|
|
|
|
stack_counter.values.max
|
|
|
|
end
|
|
|
|
private_class_method :max_call_count
|
|
|
|
|
|
|
|
# Returns the stacks that calls Gitaly the most times. Used for n+1 detection
|
|
|
|
def self.max_stacks
|
2019-02-08 07:19:53 -05:00
|
|
|
return unless Gitlab::SafeRequestStore.active?
|
2017-09-19 06:55:37 -04:00
|
|
|
|
2018-09-20 18:40:15 -04:00
|
|
|
stack_counter = Gitlab::SafeRequestStore[:stack_counter]
|
2019-02-08 07:19:53 -05:00
|
|
|
return unless stack_counter
|
2017-09-19 06:55:37 -04:00
|
|
|
|
|
|
|
max = max_call_count
|
2019-02-08 07:19:53 -05:00
|
|
|
return if max.zero?
|
2017-09-19 06:55:37 -04:00
|
|
|
|
|
|
|
stack_counter.select { |_, v| v == max }.keys
|
|
|
|
end
|
|
|
|
private_class_method :max_stacks
|
2017-02-05 13:04:23 -05:00
|
|
|
end
|
|
|
|
end
|