472 lines
16 KiB
Ruby
472 lines
16 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
require 'fast_spec_helper'
|
|
require 'rspec-parameterized'
|
|
|
|
require_relative '../../support/stub_settings_source'
|
|
require_relative '../../../sidekiq_cluster/cli'
|
|
require_relative '../../support/helpers/next_instance_of'
|
|
|
|
RSpec.describe Gitlab::SidekiqCluster::CLI, stub_settings_source: true do # rubocop:disable RSpec/FilePath
|
|
include NextInstanceOf
|
|
|
|
let(:cli) { described_class.new('/dev/null') }
|
|
let(:timeout) { Gitlab::SidekiqCluster::DEFAULT_SOFT_TIMEOUT_SECONDS }
|
|
let(:default_options) do
|
|
{ env: 'test', directory: Dir.pwd, max_concurrency: 50, min_concurrency: 0, dryrun: false, timeout: timeout }
|
|
end
|
|
|
|
let(:sidekiq_exporter_enabled) { false }
|
|
let(:sidekiq_exporter_port) { '3807' }
|
|
let(:sidekiq_health_checks_port) { '3807' }
|
|
|
|
let(:config_file) { Tempfile.new('gitlab.yml') }
|
|
let(:config) do
|
|
{
|
|
'test' => {
|
|
'monitoring' => {
|
|
'sidekiq_exporter' => {
|
|
'address' => 'localhost',
|
|
'enabled' => sidekiq_exporter_enabled,
|
|
'port' => sidekiq_exporter_port
|
|
},
|
|
'sidekiq_health_checks' => {
|
|
'address' => 'localhost',
|
|
'enabled' => sidekiq_exporter_enabled,
|
|
'port' => sidekiq_health_checks_port
|
|
}
|
|
}
|
|
}
|
|
}
|
|
end
|
|
|
|
let(:supervisor) { instance_double(Gitlab::SidekiqCluster::SidekiqProcessSupervisor) }
|
|
let(:metrics_cleanup_service) { instance_double(Prometheus::CleanupMultiprocDirService, execute: nil) }
|
|
|
|
before do
|
|
stub_env('RAILS_ENV', 'test')
|
|
|
|
config_file.write(YAML.dump(config))
|
|
config_file.close
|
|
|
|
allow(::Settings).to receive(:source).and_return(config_file.path)
|
|
::Settings.reload!
|
|
|
|
allow(Gitlab::ProcessManagement).to receive(:write_pid)
|
|
allow(Gitlab::SidekiqCluster::SidekiqProcessSupervisor).to receive(:instance).and_return(supervisor)
|
|
allow(supervisor).to receive(:supervise)
|
|
|
|
allow(Prometheus::CleanupMultiprocDirService).to receive(:new).and_return(metrics_cleanup_service)
|
|
end
|
|
|
|
after do
|
|
config_file.unlink
|
|
end
|
|
|
|
describe '#run' do
|
|
context 'without any arguments' do
|
|
it 'raises CommandError' do
|
|
expect { cli.run([]) }.to raise_error(described_class::CommandError)
|
|
end
|
|
end
|
|
|
|
context 'with arguments' do
|
|
it 'starts the Sidekiq workers' do
|
|
expect(Gitlab::SidekiqCluster).to receive(:start)
|
|
.with([['foo']], default_options)
|
|
.and_return([])
|
|
|
|
cli.run(%w(foo))
|
|
end
|
|
|
|
it 'allows the special * selector' do
|
|
worker_queues = %w(foo bar baz)
|
|
|
|
expect(Gitlab::SidekiqConfig::CliMethods)
|
|
.to receive(:worker_queues).and_return(worker_queues)
|
|
|
|
expect(Gitlab::SidekiqCluster)
|
|
.to receive(:start).with([worker_queues], default_options).and_return([])
|
|
|
|
cli.run(%w(*))
|
|
end
|
|
|
|
it 'raises an error when the arguments contain newlines' do
|
|
invalid_arguments = [
|
|
["foo\n"],
|
|
["foo\r"],
|
|
%W[foo b\nar]
|
|
]
|
|
|
|
invalid_arguments.each do |arguments|
|
|
expect { cli.run(arguments) }.to raise_error(described_class::CommandError)
|
|
end
|
|
end
|
|
|
|
context 'with --negate flag' do
|
|
it 'starts Sidekiq workers for all queues in all_queues.yml except the ones in argv' do
|
|
expect(Gitlab::SidekiqConfig::CliMethods).to receive(:worker_queues).and_return(['baz'])
|
|
expect(Gitlab::SidekiqCluster).to receive(:start)
|
|
.with([['baz']], default_options)
|
|
.and_return([])
|
|
|
|
cli.run(%w(foo -n))
|
|
end
|
|
end
|
|
|
|
context 'with --max-concurrency flag' do
|
|
it 'starts Sidekiq workers for specified queues with a max concurrency' do
|
|
expect(Gitlab::SidekiqConfig::CliMethods).to receive(:worker_queues).and_return(%w(foo bar baz))
|
|
expect(Gitlab::SidekiqCluster).to receive(:start)
|
|
.with([%w(foo bar baz), %w(solo)], default_options.merge(max_concurrency: 2))
|
|
.and_return([])
|
|
|
|
cli.run(%w(foo,bar,baz solo -m 2))
|
|
end
|
|
end
|
|
|
|
context 'with --min-concurrency flag' do
|
|
it 'starts Sidekiq workers for specified queues with a min concurrency' do
|
|
expect(Gitlab::SidekiqConfig::CliMethods).to receive(:worker_queues).and_return(%w(foo bar baz))
|
|
expect(Gitlab::SidekiqCluster).to receive(:start)
|
|
.with([%w(foo bar baz), %w(solo)], default_options.merge(min_concurrency: 2))
|
|
.and_return([])
|
|
|
|
cli.run(%w(foo,bar,baz solo --min-concurrency 2))
|
|
end
|
|
end
|
|
|
|
context 'with --timeout flag' do
|
|
it 'when given', 'starts Sidekiq workers with given timeout' do
|
|
expect(Gitlab::SidekiqCluster).to receive(:start)
|
|
.with([['foo']], default_options.merge(timeout: 10))
|
|
.and_return([])
|
|
|
|
cli.run(%w(foo --timeout 10))
|
|
end
|
|
|
|
it 'when not given', 'starts Sidekiq workers with default timeout' do
|
|
expect(Gitlab::SidekiqCluster).to receive(:start)
|
|
.with([['foo']], default_options.merge(timeout: Gitlab::SidekiqCluster::DEFAULT_SOFT_TIMEOUT_SECONDS))
|
|
.and_return([])
|
|
|
|
cli.run(%w(foo))
|
|
end
|
|
end
|
|
|
|
context 'with --list-queues flag' do
|
|
it 'errors when given --list-queues and --dryrun' do
|
|
expect { cli.run(%w(foo --list-queues --dryrun)) }.to raise_error(described_class::CommandError)
|
|
end
|
|
|
|
it 'prints out a list of queues in alphabetical order' do
|
|
expected_queues = [
|
|
'epics:epics_update_epics_dates',
|
|
'epics_new_epic_issue',
|
|
'new_epic',
|
|
'todos_destroyer:todos_destroyer_confidential_epic'
|
|
]
|
|
|
|
allow(Gitlab::SidekiqConfig::CliMethods).to receive(:query_queues).and_return(expected_queues.shuffle)
|
|
|
|
expect(cli).to receive(:puts).with([expected_queues])
|
|
|
|
cli.run(%w(--queue-selector feature_category=epics --list-queues))
|
|
end
|
|
end
|
|
|
|
context 'queue namespace expansion' do
|
|
it 'starts Sidekiq workers for all queues in all_queues.yml with a namespace in argv' do
|
|
expect(Gitlab::SidekiqConfig::CliMethods).to receive(:worker_queues).and_return(['cronjob:foo', 'cronjob:bar'])
|
|
expect(Gitlab::SidekiqCluster).to receive(:start)
|
|
.with([['cronjob', 'cronjob:foo', 'cronjob:bar']], default_options)
|
|
.and_return([])
|
|
|
|
cli.run(%w(cronjob))
|
|
end
|
|
end
|
|
|
|
context "with --queue-selector" do
|
|
where do
|
|
{
|
|
'memory-bound queues' => {
|
|
query: 'resource_boundary=memory',
|
|
included_queues: %w(project_export),
|
|
excluded_queues: %w(merge)
|
|
},
|
|
'memory- or CPU-bound queues' => {
|
|
query: 'resource_boundary=memory,cpu',
|
|
included_queues: %w(auto_merge:auto_merge_process project_export),
|
|
excluded_queues: %w(merge)
|
|
},
|
|
'high urgency CI queues' => {
|
|
query: 'feature_category=continuous_integration&urgency=high',
|
|
included_queues: %w(pipeline_cache:expire_job_cache pipeline_cache:expire_pipeline_cache),
|
|
excluded_queues: %w(merge)
|
|
},
|
|
'CPU-bound high urgency CI queues' => {
|
|
query: 'feature_category=continuous_integration&urgency=high&resource_boundary=cpu',
|
|
included_queues: %w(pipeline_cache:expire_pipeline_cache),
|
|
excluded_queues: %w(pipeline_cache:expire_job_cache merge)
|
|
},
|
|
'CPU-bound high urgency non-CI queues' => {
|
|
query: 'feature_category!=continuous_integration&urgency=high&resource_boundary=cpu',
|
|
included_queues: %w(new_issue),
|
|
excluded_queues: %w(pipeline_cache:expire_pipeline_cache)
|
|
},
|
|
'CI and SCM queues' => {
|
|
query: 'feature_category=continuous_integration|feature_category=source_code_management',
|
|
included_queues: %w(pipeline_cache:expire_job_cache merge),
|
|
excluded_queues: %w(mailers)
|
|
}
|
|
}
|
|
end
|
|
|
|
with_them do
|
|
it 'expands queues by attributes' do
|
|
expect(Gitlab::SidekiqCluster).to receive(:start) do |queues, opts|
|
|
expect(opts).to eq(default_options)
|
|
expect(queues.first).to include(*included_queues)
|
|
expect(queues.first).not_to include(*excluded_queues)
|
|
|
|
[]
|
|
end
|
|
|
|
cli.run(%W(--queue-selector #{query}))
|
|
end
|
|
|
|
it 'works when negated' do
|
|
expect(Gitlab::SidekiqCluster).to receive(:start) do |queues, opts|
|
|
expect(opts).to eq(default_options)
|
|
expect(queues.first).not_to include(*included_queues)
|
|
expect(queues.first).to include(*excluded_queues)
|
|
|
|
[]
|
|
end
|
|
|
|
cli.run(%W(--negate --queue-selector #{query}))
|
|
end
|
|
end
|
|
|
|
it 'expands multiple queue groups correctly' do
|
|
expect(Gitlab::SidekiqCluster)
|
|
.to receive(:start)
|
|
.with([['chat_notification'], ['project_export']], default_options)
|
|
.and_return([])
|
|
|
|
cli.run(%w(--queue-selector feature_category=chatops&has_external_dependencies=true resource_boundary=memory&feature_category=importers))
|
|
end
|
|
|
|
it 'allows the special * selector' do
|
|
worker_queues = %w(foo bar baz)
|
|
|
|
expect(Gitlab::SidekiqConfig::CliMethods)
|
|
.to receive(:worker_queues).and_return(worker_queues)
|
|
|
|
expect(Gitlab::SidekiqCluster)
|
|
.to receive(:start).with([worker_queues], default_options).and_return([])
|
|
|
|
cli.run(%w(--queue-selector *))
|
|
end
|
|
|
|
it 'errors when the selector matches no queues' do
|
|
expect(Gitlab::SidekiqCluster).not_to receive(:start)
|
|
|
|
expect { cli.run(%w(--queue-selector has_external_dependencies=true&has_external_dependencies=false)) }
|
|
.to raise_error(described_class::CommandError)
|
|
end
|
|
|
|
it 'errors on an invalid query multiple queue groups correctly' do
|
|
expect(Gitlab::SidekiqCluster).not_to receive(:start)
|
|
|
|
expect { cli.run(%w(--queue-selector unknown_field=chatops)) }
|
|
.to raise_error(Gitlab::SidekiqConfig::WorkerMatcher::QueryError)
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'metrics server' do
|
|
let(:trapped_signals) { described_class::TERMINATE_SIGNALS + described_class::FORWARD_SIGNALS }
|
|
let(:metrics_dir) { Dir.mktmpdir }
|
|
|
|
before do
|
|
stub_env('prometheus_multiproc_dir', metrics_dir)
|
|
end
|
|
|
|
after do
|
|
FileUtils.rm_rf(metrics_dir, secure: true)
|
|
end
|
|
|
|
context 'starting the server' do
|
|
context 'without --dryrun' do
|
|
before do
|
|
allow(Gitlab::SidekiqCluster).to receive(:start).and_return([])
|
|
end
|
|
|
|
it 'wipes the metrics directory before starting workers' do
|
|
expect(metrics_cleanup_service).to receive(:execute).ordered
|
|
expect(Gitlab::SidekiqCluster).to receive(:start).ordered.and_return([])
|
|
|
|
cli.run(%w(foo))
|
|
end
|
|
|
|
context 'when there are no sidekiq_health_checks settings set' do
|
|
let(:sidekiq_exporter_enabled) { true }
|
|
|
|
it 'does not start a sidekiq metrics server' do
|
|
expect(MetricsServer).not_to receive(:start_for_sidekiq)
|
|
|
|
cli.run(%w(foo))
|
|
end
|
|
end
|
|
|
|
context 'when the sidekiq_exporter.port setting is not set' do
|
|
let(:sidekiq_exporter_enabled) { true }
|
|
|
|
it 'does not start a sidekiq metrics server' do
|
|
expect(MetricsServer).not_to receive(:start_for_sidekiq)
|
|
|
|
cli.run(%w(foo))
|
|
end
|
|
end
|
|
|
|
context 'when sidekiq_exporter.enabled setting is not set' do
|
|
let(:config) do
|
|
{
|
|
'test' => {
|
|
'monitoring' => {
|
|
'sidekiq_exporter' => {},
|
|
'sidekiq_health_checks' => {
|
|
'address' => 'localhost',
|
|
'enabled' => sidekiq_exporter_enabled,
|
|
'port' => sidekiq_health_checks_port
|
|
}
|
|
}
|
|
}
|
|
}
|
|
end
|
|
|
|
it 'does not start a sidekiq metrics server' do
|
|
expect(MetricsServer).not_to receive(:start_for_sidekiq)
|
|
|
|
cli.run(%w(foo))
|
|
end
|
|
end
|
|
|
|
context 'with a blank sidekiq_exporter setting' do
|
|
let(:config) do
|
|
{
|
|
'test' => {
|
|
'monitoring' => {
|
|
'sidekiq_exporter' => nil,
|
|
'sidekiq_health_checks' => nil
|
|
}
|
|
}
|
|
}
|
|
end
|
|
|
|
it 'does not start a sidekiq metrics server' do
|
|
expect(MetricsServer).not_to receive(:start_for_sidekiq)
|
|
|
|
cli.run(%w(foo))
|
|
end
|
|
|
|
it 'does not throw an error' do
|
|
expect { cli.run(%w(foo)) }.not_to raise_error
|
|
end
|
|
end
|
|
|
|
context 'with valid settings' do
|
|
using RSpec::Parameterized::TableSyntax
|
|
|
|
where(:sidekiq_exporter_enabled, :sidekiq_exporter_port, :sidekiq_health_checks_port, :start_metrics_server) do
|
|
true | '3807' | '3907' | true
|
|
true | '3807' | '3807' | false
|
|
false | '3807' | '3907' | false
|
|
false | '3807' | '3907' | false
|
|
end
|
|
|
|
with_them do
|
|
specify do
|
|
if start_metrics_server
|
|
expect(MetricsServer).to receive(:start_for_sidekiq).with(metrics_dir: metrics_dir, reset_signals: trapped_signals)
|
|
else
|
|
expect(MetricsServer).not_to receive(:start_for_sidekiq)
|
|
end
|
|
|
|
cli.run(%w(foo))
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'when a PID is specified' do
|
|
it 'writes the PID to a file' do
|
|
expect(Gitlab::ProcessManagement).to receive(:write_pid).with('/dev/null')
|
|
|
|
cli.option_parser.parse!(%w(-P /dev/null))
|
|
cli.run(%w(foo))
|
|
end
|
|
end
|
|
|
|
context 'when no PID is specified' do
|
|
it 'does not write a PID' do
|
|
expect(Gitlab::ProcessManagement).not_to receive(:write_pid)
|
|
|
|
cli.run(%w(foo))
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'with --dryrun set' do
|
|
let(:sidekiq_exporter_enabled) { true }
|
|
|
|
it 'does not start the server' do
|
|
expect(MetricsServer).not_to receive(:start_for_sidekiq)
|
|
|
|
cli.run(%w(foo --dryrun))
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'supervising the cluster' do
|
|
let(:sidekiq_exporter_enabled) { true }
|
|
let(:sidekiq_health_checks_port) { '3907' }
|
|
let(:metrics_server_pid) { 99 }
|
|
let(:sidekiq_worker_pids) { [2, 42] }
|
|
|
|
before do
|
|
allow(Gitlab::SidekiqCluster).to receive(:start).and_return(sidekiq_worker_pids)
|
|
end
|
|
|
|
it 'stops the entire process cluster if one of the workers has been terminated' do
|
|
expect(supervisor).to receive(:alive).and_return(true)
|
|
expect(supervisor).to receive(:supervise).and_yield([2])
|
|
expect(MetricsServer).to receive(:start_for_sidekiq).once.and_return(metrics_server_pid)
|
|
expect(Gitlab::ProcessManagement).to receive(:signal_processes).with([42, 99], :TERM)
|
|
|
|
cli.run(%w(foo))
|
|
end
|
|
|
|
context 'when the supervisor is alive' do
|
|
it 'restarts the metrics server when it is down' do
|
|
expect(supervisor).to receive(:alive).and_return(true)
|
|
expect(supervisor).to receive(:supervise).and_yield([metrics_server_pid])
|
|
expect(MetricsServer).to receive(:start_for_sidekiq).twice.and_return(metrics_server_pid)
|
|
|
|
cli.run(%w(foo))
|
|
end
|
|
end
|
|
|
|
context 'when the supervisor is shutting down' do
|
|
it 'does not restart the metrics server' do
|
|
expect(supervisor).to receive(:alive).and_return(false)
|
|
expect(supervisor).to receive(:supervise).and_yield([metrics_server_pid])
|
|
expect(MetricsServer).to receive(:start_for_sidekiq).once.and_return(metrics_server_pid)
|
|
|
|
cli.run(%w(foo))
|
|
end
|
|
end
|
|
end
|
|
end
|
|
end
|