# frozen_string_literal: true module Ci class RetryBuildService < ::BaseService def self.clone_accessors %i[pipeline project ref tag options name allow_failure stage stage_id stage_idx trigger_request yaml_variables when environment coverage_regex description tag_list protected needs_attributes resource_group scheduling_type].freeze end def self.extra_accessors [] end def execute(build) build.ensure_scheduling_type! reprocess!(build).tap do |new_build| check_assignable_runners!(new_build) next if new_build.failed? Gitlab::OptimisticLocking.retry_lock(new_build, name: 'retry_build', &:enqueue) AfterRequeueJobService.new(project, current_user).execute(build) ::MergeRequests::AddTodoWhenBuildFailsService .new(project: project, current_user: current_user) .close(new_build) end end # rubocop: disable CodeReuse/ActiveRecord def reprocess!(build) check_access!(build) new_build = clone_build(build) ::Ci::Pipelines::AddJobService.new(build.pipeline).execute!(new_build) do |job| BulkInsertableAssociations.with_bulk_insert do job.save! end end build.reset # refresh the data to get new values of `retried` and `processed`. new_build end # rubocop: enable CodeReuse/ActiveRecord private def check_access!(build) unless can?(current_user, :update_build, build) raise Gitlab::Access::AccessDeniedError end end def check_assignable_runners!(build); end def clone_build(build) project.builds.new(build_attributes(build)).tap do |new_build| new_build.assign_attributes(::Gitlab::Ci::Pipeline::Seed::Build.environment_attributes_for(new_build)) end end def build_attributes(build) attributes = self.class.clone_accessors.to_h do |attribute| [attribute, build.public_send(attribute)] # rubocop:disable GitlabSecurity/PublicSend end attributes[:user] = current_user attributes end end end Ci::RetryBuildService.prepend_mod_with('Ci::RetryBuildService')