diff --git a/db/docs/batched_background_migrations/backfill_finding_initial_pipeline_id.yml b/db/docs/batched_background_migrations/backfill_finding_initial_pipeline_id.yml deleted file mode 100644 index df232cd02334c4f0c036e2ac0a505a5da5209f73..0000000000000000000000000000000000000000 --- a/db/docs/batched_background_migrations/backfill_finding_initial_pipeline_id.yml +++ /dev/null @@ -1,14 +0,0 @@ ---- -migration_job_name: BackfillFindingInitialPipelineId -description: >- - We need to ensure that all existing vulnerability findings have - their initial_finding_pipeline_id column backfilled before dropping - the vulnerability_occurrence_pipelines table. - - We do not expect any circumstance under which a - vulnerability_occurrence cannot have these fields fields filled in. -feature_category: vulnerability_management -introduced_by_url: https://gitlab.com/gitlab-org/gitlab/-/merge_requests/147220 -milestone: '17.1' -queued_migration_version: 20240514030609 -finalized_by: 20240709060152 diff --git a/db/post_migrate/20240514030609_queue_backfill_finding_initial_pipeline_id.rb b/db/post_migrate/20240514030609_queue_backfill_finding_initial_pipeline_id.rb deleted file mode 100644 index b59aa25629e54fa349573a2c0c8111918f18ecd4..0000000000000000000000000000000000000000 --- a/db/post_migrate/20240514030609_queue_backfill_finding_initial_pipeline_id.rb +++ /dev/null @@ -1,32 +0,0 @@ -# frozen_string_literal: true - -class QueueBackfillFindingInitialPipelineId < Gitlab::Database::Migration[2.2] - milestone '17.1' - - MIGRATION = "BackfillFindingInitialPipelineId" - DELAY_INTERVAL = 2.minutes - BATCH_SIZE = 1000 - SUB_BATCH_SIZE = 250 - - disable_ddl_transaction! - restrict_gitlab_migration gitlab_schema: :gitlab_main - - def up - Gitlab::Database::QueryAnalyzers::RestrictAllowedSchemas.with_suppressed do - queue_batched_background_migration( - MIGRATION, - :vulnerability_occurrences, - :id, - job_interval: DELAY_INTERVAL, - batch_size: BATCH_SIZE, - sub_batch_size: SUB_BATCH_SIZE - ) - end - end - - def down - Gitlab::Database::QueryAnalyzers::RestrictAllowedSchemas.with_suppressed do - delete_batched_background_migration(MIGRATION, :vulnerability_occurrences, :id, []) - end - end -end diff --git a/db/post_migrate/20240709060152_finalize_backfill_finding_initial_pipeline_id.rb b/db/post_migrate/20240709060152_finalize_backfill_finding_initial_pipeline_id.rb deleted file mode 100644 index 658604281e36d973abbfc274a57f461155f9ee76..0000000000000000000000000000000000000000 --- a/db/post_migrate/20240709060152_finalize_backfill_finding_initial_pipeline_id.rb +++ /dev/null @@ -1,23 +0,0 @@ -# frozen_string_literal: true - -class FinalizeBackfillFindingInitialPipelineId < Gitlab::Database::Migration[2.2] - MIGRATION = 'BackfillFindingInitialPipelineId' - - disable_ddl_transaction! - restrict_gitlab_migration gitlab_schema: :gitlab_main - milestone '17.3' - - def up - ensure_batched_background_migration_is_finished( - job_class_name: MIGRATION, - table_name: :vulnerability_occurrences, - column_name: :id, - job_arguments: [], - finalize: true - ) - end - - def down - # no-op - end -end diff --git a/db/post_migrate/20240724182445_update_finish_status_for_bbm_migrations.rb b/db/post_migrate/20240724182445_update_finish_status_for_bbm_migrations.rb index b1d0f15e034c5f24a970ab1184edb278eeca5214..a6c4802dd0a8bb62161852ff55f689d0ba593e45 100644 --- a/db/post_migrate/20240724182445_update_finish_status_for_bbm_migrations.rb +++ b/db/post_migrate/20240724182445_update_finish_status_for_bbm_migrations.rb @@ -25,7 +25,6 @@ class UpdateFinishStatusForBbmMigrations < Gitlab::Database::Migration[2.2] BackfillEpicDatesToWorkItemDatesSources BackfillEpicIssuesIntoWorkItemParentLinks BackfillFindingIdInVulnerabilities - BackfillFindingInitialPipelineId BackfillHasIssuesForExternalIssueLinks BackfillHasRemediationsOfVulnerabilityReads BackfillIssueSearchDataNamespaceId diff --git a/db/schema_migrations/20240514030609 b/db/schema_migrations/20240514030609 deleted file mode 100644 index 180bb7177165df49f864ec13e5326b7f305a3da8..0000000000000000000000000000000000000000 --- a/db/schema_migrations/20240514030609 +++ /dev/null @@ -1 +0,0 @@ -e4e421745bb30426b1cf80e2c28518f7e01b64270c459ffc9c271bd8183e8eb5 \ No newline at end of file diff --git a/db/schema_migrations/20240709060152 b/db/schema_migrations/20240709060152 deleted file mode 100644 index 0e8c37ca32ce7e74176c30b3faa72a159a3e5ee8..0000000000000000000000000000000000000000 --- a/db/schema_migrations/20240709060152 +++ /dev/null @@ -1 +0,0 @@ -d910f07c89002c56103abdd7042d3b482a40710cde3a19c8fd8a2ec20298ff93 \ No newline at end of file diff --git a/ee/lib/ee/gitlab/background_migration/backfill_finding_initial_pipeline_id.rb b/ee/lib/ee/gitlab/background_migration/backfill_finding_initial_pipeline_id.rb deleted file mode 100644 index 71e7d434f7daf1fb6025f9b8deb61d7c0422fbe5..0000000000000000000000000000000000000000 --- a/ee/lib/ee/gitlab/background_migration/backfill_finding_initial_pipeline_id.rb +++ /dev/null @@ -1,98 +0,0 @@ -# frozen_string_literal: true - -module EE - module Gitlab - module BackgroundMigration - module BackfillFindingInitialPipelineId - extend ActiveSupport::Concern - extend ::Gitlab::Utils::Override - - prepended do - scope_to ->(relation) do - relation.where(initial_pipeline_id: nil).or( - relation.where(latest_pipeline_id: nil) - ) - end - operation_name :backfill_finding_initial_and_latest_pipeline_id - feature_category :vulnerability_management - end - - override :perform - def perform - ::Gitlab::Database.allow_cross_joins_across_databases( - url: 'https://gitlab.com/gitlab-org/gitlab/-/issues/480364' - ) do - each_sub_batch do |sub_batch| - connection.exec_update(update_initial_sql(sub_batch)) - connection.exec_update(update_latest_sql(sub_batch)) - end - end - end - - private - - def update_initial_sql(sub_batch) - <<~SQL - WITH cte AS ( - SELECT - occurrence_pipelines.* - FROM - vulnerability_occurrences, - LATERAL ( - SELECT - occurrence_id, - pipeline_id - FROM - vulnerability_occurrence_pipelines - WHERE - vulnerability_occurrence_pipelines.occurrence_id = vulnerability_occurrences.id - ORDER BY - pipeline_id ASC - LIMIT 1) AS occurrence_pipelines - WHERE - vulnerability_occurrences.id IN (#{sub_batch.select(:id).to_sql})) - UPDATE - vulnerability_occurrences f - SET - initial_pipeline_id = c.pipeline_id - FROM - cte c - WHERE - f.id = c.occurrence_id - SQL - end - - def update_latest_sql(sub_batch) - <<~SQL - WITH cte AS ( - SELECT - occurrence_pipelines.* - FROM - vulnerability_occurrences, - LATERAL ( - SELECT - occurrence_id, - pipeline_id - FROM - vulnerability_occurrence_pipelines - WHERE - vulnerability_occurrence_pipelines.occurrence_id = vulnerability_occurrences.id - ORDER BY - pipeline_id DESC - LIMIT 1) AS occurrence_pipelines - WHERE - vulnerability_occurrences.id IN (#{sub_batch.select(:id).to_sql})) - UPDATE - vulnerability_occurrences f - SET - latest_pipeline_id = c.pipeline_id - FROM - cte c - WHERE - f.id = c.occurrence_id - SQL - end - end - end - end -end diff --git a/ee/spec/lib/ee/gitlab/background_migration/backfill_finding_initial_pipeline_id_spec.rb b/ee/spec/lib/ee/gitlab/background_migration/backfill_finding_initial_pipeline_id_spec.rb deleted file mode 100644 index 9198765e5d90f6ef64aa096ea9d637307953e581..0000000000000000000000000000000000000000 --- a/ee/spec/lib/ee/gitlab/background_migration/backfill_finding_initial_pipeline_id_spec.rb +++ /dev/null @@ -1,149 +0,0 @@ -# frozen_string_literal: true - -require 'spec_helper' - -RSpec.describe Gitlab::BackgroundMigration::BackfillFindingInitialPipelineId, feature_category: :vulnerability_management, schema: 20240514030609 do - subject(:perform_migration) { described_class.new(**args).perform } - - let(:args) do - { - start_id: vulnerability_findings.first.id, - end_id: vulnerability_findings.last.id, - batch_table: :vulnerability_occurrences, - batch_column: :id, - sub_batch_size: total_findings_count, - pause_ms: 0, - connection: ApplicationRecord.connection - } - end - - let(:projects) { table(:projects) } - let(:namespaces) { table(:namespaces) } - let(:scanners) { table(:vulnerability_scanners) } - let(:vulnerability_identifiers) { table(:vulnerability_identifiers) } - let(:vulnerability_findings) { table(:vulnerability_occurrences) } - let(:vulnerability_finding_pipelines) { table(:vulnerability_occurrence_pipelines) } - - let(:group_namespace) { namespaces.create!(name: 'gitlab-org', path: 'gitlab-org', type: 'Group') } - let(:project) { create_project('gitlab', group_namespace) } - - let!(:finding1) do - create_finding.tap do |finding| - create_finding_pipeline!(finding_id: finding.id, pipeline_id: 1) # initial - create_finding_pipeline!(finding_id: finding.id, pipeline_id: 2) - create_finding_pipeline!(finding_id: finding.id, pipeline_id: 3) # latest - end - end - - let!(:finding2) do - create_finding.tap do |finding| - create_finding_pipeline!(finding_id: finding.id, pipeline_id: 4) # initial and latest - end - end - - # no pipeline as a sanity check to make sure nothing blows up - let!(:finding3) { create_finding } - let!(:finding4) do - create_finding(initial_pipeline_id: 5, latest_pipeline_id: 5).tap do |finding| - # initial_pipeline_id is already set to 5, so it should - # not update to 555 - create_finding_pipeline!(finding_id: finding.id, pipeline_id: 555) - end - end - - let(:total_findings_count) { vulnerability_findings.all.count } - - it 'backfills initial_pipeline_id and latest_pipeline_id', :aggregate_failures do - # .to(1) because finding3 has no pipeline - expect { perform_migration }.to change { - vulnerability_findings.where(initial_pipeline_id: nil).count - }.from(3).to(1).and change { vulnerability_findings.where(initial_pipeline_id: nil).count }.from(3).to(1) - - expect(finding1.reload.initial_pipeline_id).to eq(1) - expect(finding2.reload.initial_pipeline_id).to eq(4) - expect(finding3.reload.initial_pipeline_id).to be_nil - expect(finding4.reload.initial_pipeline_id).to eq(5) - - expect(finding1.latest_pipeline_id).to eq(3) - expect(finding2.latest_pipeline_id).to eq(4) - expect(finding3.latest_pipeline_id).to be_nil - expect(finding4.latest_pipeline_id).to eq(5) - end - - it 'does not have N+1 queries' do - def run_migration(end_id: vulnerability_findings.last.id) - described_class.new(**args.merge(end_id: end_id)).perform - end - - control = ::ActiveRecord::QueryRecorder.new { run_migration } - - # reset backfilled rows to nil - vulnerability_findings.update_all(initial_pipeline_id: nil, latest_pipeline_id: nil) - create_finding.tap do |finding| - create_finding_pipeline!(finding_id: finding.id, pipeline_id: 91) - end - - expect { run_migration }.not_to exceed_query_limit(control) - end - - context 'when a sub-batch only contains findings without an associated pipeline' do - # finding3 has no pipeline associated with it - let(:args) { super().merge(start_id: finding3.id, end_id: finding3.id) } - - it 'does not raise an error' do - expect { perform_migration }.not_to raise_error - end - end - - def create_finding(initial_pipeline_id: nil, latest_pipeline_id: nil) - scanner = scanners.find_or_create_by!(name: 'bar') do |scanner| - scanner.project_id = project.id - scanner.external_id = 'foo' - end - - identifier = vulnerability_identifiers.create!( - project_id: project.id, - external_id: "CVE-2018-1234", - external_type: "CVE", - name: "CVE-2018-1234", - fingerprint: SecureRandom.hex(20) - ) - - vulnerability_findings.create!( - project_id: project.id, - scanner_id: scanner.id, - severity: 5, # medium - confidence: 2, # unknown, - report_type: 99, # generic - primary_identifier_id: identifier.id, - project_fingerprint: SecureRandom.hex(20), - location_fingerprint: SecureRandom.hex(20), - uuid: SecureRandom.uuid, - name: "CVE-2018-1234", - raw_metadata: "{}", - metadata_version: "test:1.0", - initial_pipeline_id: initial_pipeline_id, - latest_pipeline_id: latest_pipeline_id - ) - end - - def create_finding_pipeline!(finding_id:, pipeline_id:) - vulnerability_finding_pipelines.create!(pipeline_id: pipeline_id, occurrence_id: finding_id) - end - - def create_project(name, group) - project_namespace = namespaces.create!( - name: name, - path: name, - type: 'Project' - ) - - projects.create!( - namespace_id: group.id, - project_namespace_id: project_namespace.id, - name: name, - path: name, - archived: false - ) - end -end diff --git a/spec/migrations/20240402030609_queue_backfill_finding_initial_pipeline_id_spec.rb b/spec/migrations/20240402030609_queue_backfill_finding_initial_pipeline_id_spec.rb deleted file mode 100644 index d3f30f65291731b3a19518ec0073fd1d7592d774..0000000000000000000000000000000000000000 --- a/spec/migrations/20240402030609_queue_backfill_finding_initial_pipeline_id_spec.rb +++ /dev/null @@ -1,26 +0,0 @@ -# frozen_string_literal: true - -require 'spec_helper' -require_migration! - -RSpec.describe QueueBackfillFindingInitialPipelineId, feature_category: :vulnerability_management do - let!(:batched_migration) { described_class::MIGRATION } - - it 'schedules a new batched migration' do - reversible_migration do |migration| - migration.before -> { - expect(batched_migration).not_to have_scheduled_batched_migration - } - - migration.after -> { - expect(batched_migration).to have_scheduled_batched_migration( - table_name: :vulnerability_occurrences, - column_name: :id, - interval: described_class::DELAY_INTERVAL, - batch_size: described_class::BATCH_SIZE, - sub_batch_size: described_class::SUB_BATCH_SIZE - ) - } - end - end -end