Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
G
gitlab-ce
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
1
Merge Requests
1
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
nexedi
gitlab-ce
Commits
72f93dbf
Commit
72f93dbf
authored
Jun 04, 2021
by
Dmitry Gruzd
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Remove old Advanced Search migrations [part 3]
parent
2171930d
Changes
11
Hide whitespace changes
Inline
Side-by-side
Showing
11 changed files
with
21 additions
and
838 deletions
+21
-838
ee/elastic/migrate/20210127154600_remove_permissions_data_from_notes_documents.rb
...127154600_remove_permissions_data_from_notes_documents.rb
+1
-127
ee/elastic/migrate/20210128163600_add_permissions_data_to_notes_documents.rb
...20210128163600_add_permissions_data_to_notes_documents.rb
+1
-101
ee/lib/elastic/latest/note_class_proxy.rb
ee/lib/elastic/latest/note_class_proxy.rb
+1
-1
ee/lib/elastic/latest/note_instance_proxy.rb
ee/lib/elastic/latest/note_instance_proxy.rb
+2
-6
ee/spec/elastic/migrate/20210127154600_remove_permissions_data_from_notes_documents_spec.rb
...4600_remove_permissions_data_from_notes_documents_spec.rb
+0
-184
ee/spec/elastic/migrate/20210128163600_add_permissions_data_to_notes_documents_spec.rb
...128163600_add_permissions_data_to_notes_documents_spec.rb
+0
-206
ee/spec/elastic/migrate/20210421140400_add_new_data_to_merge_requests_documents_spec.rb
...21140400_add_new_data_to_merge_requests_documents_spec.rb
+1
-1
ee/spec/models/concerns/elastic/note_spec.rb
ee/spec/models/concerns/elastic/note_spec.rb
+0
-12
ee/spec/services/search/global_service_spec.rb
ee/spec/services/search/global_service_spec.rb
+7
-95
ee/spec/services/search/group_service_spec.rb
ee/spec/services/search/group_service_spec.rb
+4
-53
ee/spec/services/search/project_service_spec.rb
ee/spec/services/search/project_service_spec.rb
+4
-52
No files found.
ee/elastic/migrate/20210127154600_remove_permissions_data_from_notes_documents.rb
View file @
72f93dbf
# frozen_string_literal: true
class
RemovePermissionsDataFromNotesDocuments
<
Elastic
::
Migration
batched!
throttle_delay
1
.
minute
QUERY_BATCH_SIZE
=
5000
UPDATE_BATCH_SIZE
=
100
def
migrate
log
"Removing permission data from notes migration starting"
if
completed?
log
"Skipping removing permission data from notes documents migration since it is already applied"
return
end
log
"Removing permission data from notes documents for batch of
#{
QUERY_BATCH_SIZE
}
documents"
# use filter query to prevent scores from being calculated
query
=
{
size:
QUERY_BATCH_SIZE
,
query:
{
bool:
{
filter:
{
bool:
{
must:
note_type_filter
,
should:
[
field_exists
(
'visibility_level'
),
field_exists_for_type
(
'issues_access_level'
,
'Issue'
),
field_exists_for_type
(
'repository_access_level'
,
'Commit'
),
field_exists_for_type
(
'merge_requests_access_level'
,
'MergeRequest'
),
field_exists_for_type
(
'snippets_access_level'
,
'Snippet'
)
],
minimum_should_match:
1
}
}
}
}
}
results
=
client
.
search
(
index:
helper
.
target_index_name
,
body:
query
)
hits
=
results
.
dig
(
'hits'
,
'hits'
)
||
[]
document_references
=
hits
.
map
do
|
hit
|
id
=
hit
.
dig
(
'_source'
,
'id'
)
es_id
=
hit
.
dig
(
'_id'
)
es_parent
=
hit
.
dig
(
'_source'
,
'join_field'
,
'parent'
)
# ensure that any notes missing from the database will be removed from Elasticsearch
# as the data is back-filled
Gitlab
::
Elastic
::
DocumentReference
.
new
(
Note
,
id
,
es_id
,
es_parent
)
end
document_references
.
each_slice
(
UPDATE_BATCH_SIZE
)
do
|
refs
|
Elastic
::
ProcessBookkeepingService
.
track!
(
*
refs
)
end
log
"Removing permission data from notes documents is completed for batch of
#{
document_references
.
size
}
documents"
end
def
completed?
log
"completed check: Refreshing
#{
helper
.
target_index_name
}
"
helper
.
refresh_index
(
index_name:
helper
.
target_index_name
)
query
=
{
size:
0
,
query:
note_type_filter
,
aggs:
{
notes:
{
filter:
{
bool:
{
should:
[
field_exists
(
'visibility_level'
),
field_exists_for_type
(
'issues_access_level'
,
'Issue'
),
field_exists_for_type
(
'repository_access_level'
,
'Commit'
),
field_exists_for_type
(
'merge_requests_access_level'
,
'MergeRequest'
),
field_exists_for_type
(
'snippets_access_level'
,
'Snippet'
)
],
minimum_should_match:
1
}
}
}
}
}
results
=
client
.
search
(
index:
helper
.
target_index_name
,
body:
query
)
doc_count
=
results
.
dig
(
'aggregations'
,
'notes'
,
'doc_count'
)
log
"Migration has
#{
doc_count
}
documents remaining"
if
doc_count
doc_count
&&
doc_count
==
0
end
private
def
note_type_filter
{
term:
{
type:
{
value:
'note'
}
}
}
end
def
field_exists
(
field
)
{
bool:
{
must:
[
{
exists:
{
field:
field
}
}
]
}
}
end
def
field_exists_for_type
(
field
,
type
)
query
=
field_exists
(
field
)
query
[
:bool
][
:must
]
<<
{
term:
{
noteable_type:
{
value:
type
}
}
}
query
end
include
Elastic
::
MigrationObsolete
end
ee/elastic/migrate/20210128163600_add_permissions_data_to_notes_documents.rb
View file @
72f93dbf
# frozen_string_literal: true
class
AddPermissionsDataToNotesDocuments
<
Elastic
::
Migration
batched!
throttle_delay
3
.
minutes
QUERY_BATCH_SIZE
=
6_000
UPDATE_BATCH_SIZE
=
100
def
migrate
if
completed?
log
"Skipping adding permission data to notes documents migration since it is already applied"
return
end
log
"Adding permission data to notes documents for batch of
#{
QUERY_BATCH_SIZE
}
documents"
query
=
es_query
.
merge
(
size:
QUERY_BATCH_SIZE
)
results
=
client
.
search
(
index:
helper
.
target_index_name
,
body:
query
)
hits
=
results
.
dig
(
'hits'
,
'hits'
)
||
[]
document_references
=
hits
.
map
do
|
hit
|
id
=
hit
.
dig
(
'_source'
,
'id'
)
es_id
=
hit
.
dig
(
'_id'
)
es_parent
=
hit
.
dig
(
'_source'
,
'join_field'
,
'parent'
)
# ensure that any notes missing from the database will be removed from Elasticsearch
# as the data is back-filled
Gitlab
::
Elastic
::
DocumentReference
.
new
(
Note
,
id
,
es_id
,
es_parent
)
end
document_references
.
each_slice
(
UPDATE_BATCH_SIZE
)
do
|
refs
|
Elastic
::
ProcessInitialBookkeepingService
.
track!
(
*
refs
)
end
log
"Adding permission data to notes documents is completed for batch of
#{
document_references
.
size
}
documents"
end
def
completed?
log
"completed check: Refreshing
#{
helper
.
target_index_name
}
"
helper
.
refresh_index
(
index_name:
helper
.
target_index_name
)
results
=
client
.
count
(
index:
helper
.
target_index_name
,
body:
es_query
)
doc_count
=
results
.
dig
(
'count'
)
log
"Migration has
#{
doc_count
}
documents remaining"
if
doc_count
doc_count
&&
doc_count
==
0
end
private
def
es_query
{
query:
{
bool:
{
filter:
{
bool:
{
must:
note_type_filter
,
should:
[
field_does_not_exist_for_type
(
'visibility_level'
,
'Issue'
),
field_does_not_exist_for_type
(
'visibility_level'
,
'Commit'
),
field_does_not_exist_for_type
(
'visibility_level'
,
'MergeRequest'
),
field_does_not_exist_for_type
(
'visibility_level'
,
'Snippet'
),
field_does_not_exist_for_type
(
'issues_access_level'
,
'Issue'
),
field_does_not_exist_for_type
(
'repository_access_level'
,
'Commit'
),
field_does_not_exist_for_type
(
'merge_requests_access_level'
,
'MergeRequest'
),
field_does_not_exist_for_type
(
'snippets_access_level'
,
'Snippet'
)
],
minimum_should_match:
1
}
}
}
}
}
end
def
note_type_filter
{
term:
{
type:
{
value:
'note'
}
}
}
end
def
field_does_not_exist_for_type
(
field
,
type
)
{
bool:
{
must:
{
term:
{
noteable_type:
{
value:
type
}
}
},
must_not:
{
exists:
{
field:
field
}
}
}
}
end
include
Elastic
::
MigrationObsolete
end
ee/lib/elastic/latest/note_class_proxy.rb
View file @
72f93dbf
...
...
@@ -13,7 +13,7 @@ module Elastic
options
[
:in
]
=
[
'note'
]
query_hash
=
basic_query_hash
(
%w[note]
,
query
,
count_only:
options
[
:count_only
])
options
[
:no_join_project
]
=
Elastic
::
DataMigrationService
.
migration_has_finished?
(
:add_permissions_data_to_notes_documents
)
options
[
:no_join_project
]
=
true
context
.
name
(
:note
)
do
query_hash
=
context
.
name
(
:authorized
)
{
project_ids_filter
(
query_hash
,
options
)
}
query_hash
=
context
.
name
(
:confidentiality
)
{
confidentiality_filter
(
query_hash
,
options
)
}
...
...
ee/lib/elastic/latest/note_instance_proxy.rb
View file @
72f93dbf
...
...
@@ -28,12 +28,8 @@ module Elastic
}
end
# do not add the permission fields unless the `remove_permissions_data_from_notes_documents`
# migration has completed otherwise the migration will never finish
if
Elastic
::
DataMigrationService
.
migration_has_finished?
(
:remove_permissions_data_from_notes_documents
)
data
[
'visibility_level'
]
=
target
.
project
&
.
visibility_level
||
Gitlab
::
VisibilityLevel
::
PRIVATE
merge_project_feature_access_level
(
data
)
end
data
[
'visibility_level'
]
=
target
.
project
&
.
visibility_level
||
Gitlab
::
VisibilityLevel
::
PRIVATE
merge_project_feature_access_level
(
data
)
data
.
merge
(
generic_attributes
)
end
...
...
ee/spec/elastic/migrate/20210127154600_remove_permissions_data_from_notes_documents_spec.rb
deleted
100644 → 0
View file @
2171930d
# frozen_string_literal: true
require
'spec_helper'
require
File
.
expand_path
(
'ee/elastic/migrate/20210127154600_remove_permissions_data_from_notes_documents.rb'
)
RSpec
.
describe
RemovePermissionsDataFromNotesDocuments
,
:elastic
,
:sidekiq_inline
do
let
(
:version
)
{
20210127154600
}
let
(
:migration
)
{
described_class
.
new
(
version
)
}
let
(
:helper
)
{
Gitlab
::
Elastic
::
Helper
.
new
}
before
do
stub_ee_application_setting
(
elasticsearch_search:
true
,
elasticsearch_indexing:
true
)
allow
(
migration
).
to
receive
(
:helper
).
and_return
(
helper
)
set_elasticsearch_migration_to
:remove_permissions_data_from_notes_documents
,
including:
false
end
describe
'migration_options'
do
it
'has migration options set'
,
:aggregate_failures
do
expect
(
migration
.
batched?
).
to
be_truthy
expect
(
migration
.
throttle_delay
).
to
eq
(
1
.
minute
)
end
end
describe
'#migrate'
do
let!
(
:note_on_commit
)
{
create
(
:note_on_commit
)
}
let!
(
:note_on_issue
)
{
create
(
:note_on_issue
)
}
let!
(
:note_on_merge_request
)
{
create
(
:note_on_merge_request
)
}
let!
(
:note_on_snippet
)
{
create
(
:note_on_project_snippet
)
}
before
do
ensure_elasticsearch_index!
end
context
'when migration is completed'
do
before
do
remove_permission_data_for_notes
([
note_on_commit
,
note_on_issue
,
note_on_merge_request
,
note_on_snippet
])
end
it
'does not queue documents for indexing'
,
:aggregate_failures
do
expect
(
migration
.
completed?
).
to
be_truthy
expect
(
::
Elastic
::
ProcessBookkeepingService
).
not_to
receive
(
:track!
)
migration
.
migrate
end
end
context
'migration process'
do
before
do
add_permission_data_for_notes
([
note_on_commit
,
note_on_issue
,
note_on_merge_request
,
note_on_snippet
])
# migrations are completed by default in test environments
# required to prevent the `as_indexed_json` method from populating the permissions fields
set_elasticsearch_migration_to
version
,
including:
false
end
it
'queues documents for indexing'
do
# track calls are batched in groups of 100
expect
(
::
Elastic
::
ProcessBookkeepingService
).
to
receive
(
:track!
).
once
do
|*
tracked_refs
|
expect
(
tracked_refs
.
count
).
to
eq
(
4
)
end
migration
.
migrate
end
it
'only queues documents for indexing that contain permission data'
,
:aggregate_failures
do
remove_permission_data_for_notes
([
note_on_issue
,
note_on_snippet
,
note_on_merge_request
])
expected
=
[
Gitlab
::
Elastic
::
DocumentReference
.
new
(
Note
,
note_on_commit
.
id
,
note_on_commit
.
es_id
,
note_on_commit
.
es_parent
)]
expect
(
::
Elastic
::
ProcessBookkeepingService
).
to
receive
(
:track!
).
with
(
*
expected
).
once
migration
.
migrate
end
it
'processes in batches until completed'
do
stub_const
(
"
#{
described_class
}
::QUERY_BATCH_SIZE"
,
2
)
stub_const
(
"
#{
described_class
}
::UPDATE_BATCH_SIZE"
,
1
)
allow
(
::
Elastic
::
ProcessBookkeepingService
).
to
receive
(
:track!
).
and_call_original
migration
.
migrate
expect
(
::
Elastic
::
ProcessBookkeepingService
).
to
have_received
(
:track!
).
exactly
(
2
).
times
ensure_elasticsearch_index!
migration
.
migrate
expect
(
::
Elastic
::
ProcessBookkeepingService
).
to
have_received
(
:track!
).
exactly
(
4
).
times
ensure_elasticsearch_index!
migration
.
migrate
# The migration should have already finished so there are no more items to process
expect
(
::
Elastic
::
ProcessBookkeepingService
).
to
have_received
(
:track!
).
exactly
(
4
).
times
expect
(
migration
).
to
be_completed
end
end
end
describe
'#completed?'
do
let!
(
:note_on_commit
)
{
create
(
:note_on_commit
)
}
before
do
ensure_elasticsearch_index!
end
subject
{
migration
.
completed?
}
context
'when no documents have permissions data'
do
before
do
remove_permission_data_for_notes
([
note_on_commit
])
end
it
{
is_expected
.
to
be_truthy
}
end
context
'when documents have permissions data'
do
before
do
add_permission_data_for_notes
([
note_on_commit
])
end
it
{
is_expected
.
to
be_falsey
}
end
it
'refreshes the index'
do
expect
(
helper
).
to
receive
(
:refresh_index
)
subject
end
end
private
def
add_permission_data_for_notes
(
notes
)
script
=
{
source:
"ctx._source['visibility_level'] = params.visibility_level; ctx._source['issues_access_level'] = params.visibility_level; ctx._source['merge_requests_access_level'] = params.visibility_level; ctx._source['snippets_access_level'] = params.visibility_level; ctx._source['repository_access_level'] = params.visibility_level;"
,
lang:
"painless"
,
params:
{
visibility_level:
Gitlab
::
VisibilityLevel
::
PRIVATE
}
}
update_by_query
(
notes
,
script
)
end
def
remove_permission_data_for_notes
(
notes
)
script
=
{
source:
"ctx._source.remove('visibility_level'); ctx._source.remove('repository_access_level'); ctx._source.remove('snippets_access_level'); ctx._source.remove('merge_requests_access_level'); ctx._source.remove('issues_access_level');"
}
update_by_query
(
notes
,
script
)
end
def
update_by_query
(
notes
,
script
)
note_ids
=
notes
.
map
{
|
i
|
i
.
id
}
client
=
Note
.
__elasticsearch__
.
client
client
.
update_by_query
({
index:
Note
.
__elasticsearch__
.
index_name
,
wait_for_completion:
true
,
# run synchronously
refresh:
true
,
# make operation visible to search
body:
{
script:
script
,
query:
{
bool:
{
must:
[
{
terms:
{
id:
note_ids
}
},
{
term:
{
type:
{
value:
'note'
}
}
}
]
}
}
}
})
end
end
ee/spec/elastic/migrate/20210128163600_add_permissions_data_to_notes_documents_spec.rb
deleted
100644 → 0
View file @
2171930d
# frozen_string_literal: true
require
'spec_helper'
require
File
.
expand_path
(
'ee/elastic/migrate/20210128163600_add_permissions_data_to_notes_documents.rb'
)
RSpec
.
describe
AddPermissionsDataToNotesDocuments
,
:elastic
,
:sidekiq_inline
do
let
(
:version
)
{
20210128163600
}
let
(
:migration
)
{
described_class
.
new
(
version
)
}
before
do
stub_ee_application_setting
(
elasticsearch_search:
true
,
elasticsearch_indexing:
true
)
set_elasticsearch_migration_to
:add_permissions_data_to_notes_documents
,
including:
false
end
describe
'migration_options'
do
it
'has migration options set'
,
:aggregate_failures
do
expect
(
migration
.
batched?
).
to
be_truthy
expect
(
migration
.
throttle_delay
).
to
eq
(
3
.
minutes
)
end
end
describe
'#migrate'
do
let
(
:notes
)
{
[
note_on_commit
,
note_on_issue
,
note_on_merge_request
,
note_on_snippet
]
}
let!
(
:note_on_commit
)
{
create
(
:note_on_commit
)
}
let!
(
:note_on_issue
)
{
create
(
:note_on_issue
)
}
let!
(
:note_on_merge_request
)
{
create
(
:note_on_merge_request
)
}
let!
(
:note_on_snippet
)
{
create
(
:note_on_project_snippet
)
}
before
do
ensure_elasticsearch_index!
end
context
'when migration is completed'
do
it
'does not queue documents for indexing'
do
expect
(
migration
.
completed?
).
to
be_truthy
expect
(
::
Elastic
::
ProcessInitialBookkeepingService
).
not_to
receive
(
:track!
)
migration
.
migrate
end
end
context
'migration process'
do
before
do
remove_permission_data_for_notes
(
notes
)
end
it
'queues documents for indexing'
do
expect
(
::
Elastic
::
ProcessInitialBookkeepingService
).
to
receive
(
:track!
).
once
do
|*
tracked_refs
|
expect
(
tracked_refs
.
count
).
to
eq
(
4
)
end
migration
.
migrate
end
it
'only queues documents for indexing that are missing permission data'
,
:aggregate_failures
do
add_permission_data_for_notes
([
note_on_issue
,
note_on_snippet
,
note_on_merge_request
])
expected
=
[
Gitlab
::
Elastic
::
DocumentReference
.
new
(
Note
,
note_on_commit
.
id
,
note_on_commit
.
es_id
,
note_on_commit
.
es_parent
)]
expect
(
::
Elastic
::
ProcessInitialBookkeepingService
).
to
receive
(
:track!
).
with
(
*
expected
).
once
migration
.
migrate
end
it
'processes in batches until completed'
,
:aggregate_failures
do
stub_const
(
"
#{
described_class
}
::QUERY_BATCH_SIZE"
,
2
)
stub_const
(
"
#{
described_class
}
::UPDATE_BATCH_SIZE"
,
1
)
allow
(
::
Elastic
::
ProcessInitialBookkeepingService
).
to
receive
(
:track!
).
and_call_original
migration
.
migrate
expect
(
::
Elastic
::
ProcessInitialBookkeepingService
).
to
have_received
(
:track!
).
exactly
(
2
).
times
ensure_elasticsearch_index!
migration
.
migrate
expect
(
::
Elastic
::
ProcessInitialBookkeepingService
).
to
have_received
(
:track!
).
exactly
(
4
).
times
ensure_elasticsearch_index!
migration
.
migrate
# The migration should have already finished so there are no more items to process
expect
(
::
Elastic
::
ProcessInitialBookkeepingService
).
to
have_received
(
:track!
).
exactly
(
4
).
times
expect
(
migration
).
to
be_completed
end
end
end
describe
'#completed?'
do
using
RSpec
::
Parameterized
::
TableSyntax
let
(
:helper
)
{
Gitlab
::
Elastic
::
Helper
.
new
}
subject
{
migration
.
completed?
}
before
do
allow
(
migration
).
to
receive
(
:helper
).
and_return
(
helper
)
end
it
'refreshes the index'
do
expect
(
helper
).
to
receive
(
:refresh_index
)
subject
end
# Only affected note types are issue, commit, merge requests, project snippets and completed? should return
# false if documents are missing data. The completed? method will be true for all other types
where
(
:note_type
,
:expected_result
)
do
:diff_note_on_commit
|
false
:diff_note_on_design
|
true
:diff_note_on_merge_request
|
false
:discussion_note_on_commit
|
false
:discussion_note_on_issue
|
false
:discussion_note_on_merge_request
|
false
:discussion_note_on_personal_snippet
|
true
:discussion_note_on_project_snippet
|
false
:discussion_note_on_vulnerability
|
true
:legacy_diff_note_on_commit
|
false
:legacy_diff_note_on_merge_request
|
false
:note_on_alert
|
true
:note_on_commit
|
false
:note_on_design
|
true
:note_on_epic
|
true
:note_on_issue
|
false
:note_on_merge_request
|
false
:note_on_personal_snippet
|
true
:note_on_project_snippet
|
false
:note_on_vulnerability
|
true
end
with_them
do
let!
(
:note
)
{
create
(
note_type
)
}
# rubocop:disable Rails/SaveBang
context
'when documents are missing permissions data'
do
before
do
ensure_elasticsearch_index!
remove_permission_data_for_notes
([
note
])
end
it
{
is_expected
.
to
eq
(
expected_result
)
}
end
context
'when no documents are missing permissions data'
do
before
do
ensure_elasticsearch_index!
end
it
{
is_expected
.
to
be_truthy
}
end
end
end
private
def
add_permission_data_for_notes
(
notes
)
script
=
{
source:
"ctx._source['visibility_level'] = params.visibility_level; ctx._source['issues_access_level'] = params.visibility_level; ctx._source['merge_requests_access_level'] = params.visibility_level; ctx._source['snippets_access_level'] = params.visibility_level; ctx._source['repository_access_level'] = params.visibility_level;"
,
lang:
"painless"
,
params:
{
visibility_level:
Gitlab
::
VisibilityLevel
::
PRIVATE
}
}
update_by_query
(
notes
,
script
)
end
def
remove_permission_data_for_notes
(
notes
)
script
=
{
source:
"ctx._source.remove('visibility_level'); ctx._source.remove('repository_access_level'); ctx._source.remove('snippets_access_level'); ctx._source.remove('merge_requests_access_level'); ctx._source.remove('issues_access_level');"
}
update_by_query
(
notes
,
script
)
end
def
update_by_query
(
notes
,
script
)
note_ids
=
notes
.
map
(
&
:id
)
client
=
Note
.
__elasticsearch__
.
client
client
.
update_by_query
({
index:
Note
.
__elasticsearch__
.
index_name
,
wait_for_completion:
true
,
# run synchronously
refresh:
true
,
# make operation visible to search
body:
{
script:
script
,
query:
{
bool:
{
must:
[
{
terms:
{
id:
note_ids
}
},
{
term:
{
type:
{
value:
'note'
}
}
}
]
}
}
}
})
end
end
ee/spec/elastic/migrate/20210421140400_add_new_data_to_merge_requests_documents_spec.rb
View file @
72f93dbf
...
...
@@ -10,7 +10,7 @@ RSpec.describe AddNewDataToMergeRequestsDocuments, :elastic, :sidekiq_inline do
before
do
stub_ee_application_setting
(
elasticsearch_search:
true
,
elasticsearch_indexing:
true
)
set_elasticsearch_migration_to
:add_
permissions_data_to_note
s_documents
,
including:
false
set_elasticsearch_migration_to
:add_
new_data_to_merge_request
s_documents
,
including:
false
# ensure merge_requests are indexed
merge_requests
...
...
ee/spec/models/concerns/elastic/note_spec.rb
View file @
72f93dbf
...
...
@@ -158,18 +158,6 @@ RSpec.describe Note, :elastic do
project
.
project_feature
.
update_attribute
(
access_level
.
to_sym
,
project_feature_permission
)
if
access_level
.
present?
end
it
'does not contain permissions if remove_permissions_data_from_notes_documents is not finished'
do
allow
(
Elastic
::
DataMigrationService
).
to
receive
(
:migration_has_finished?
)
.
with
(
:remove_permissions_data_from_notes_documents
)
.
and_return
(
false
)
allow
(
Elastic
::
DataMigrationService
).
to
receive
(
:migration_has_finished?
)
.
with
(
:migrate_notes_to_separate_index
)
.
and_return
(
false
)
expect
(
note_json
).
not_to
have_key
(
access_level
)
if
access_level
.
present?
expect
(
note_json
).
not_to
have_key
(
'visibility_level'
)
end
it
'contains the correct permissions'
,
:aggregate_failures
do
if
access_level
expect
(
note_json
).
to
have_key
(
access_level
)
...
...
ee/spec/services/search/global_service_spec.rb
View file @
72f93dbf
...
...
@@ -18,12 +18,6 @@ RSpec.describe Search::GlobalService do
let
(
:service
)
{
described_class
.
new
(
user
,
params
)
}
end
context
'notes search'
do
let
(
:results
)
{
described_class
.
new
(
nil
,
search:
'*'
).
execute
.
objects
(
'notes'
)
}
it_behaves_like
'search query applies joins based on migrations shared examples'
,
:add_permissions_data_to_notes_documents
end
context
'merge_requests search'
do
let
(
:results
)
{
described_class
.
new
(
nil
,
search:
'*'
).
execute
.
objects
(
'merge_requests'
)
}
...
...
@@ -122,17 +116,7 @@ RSpec.describe Search::GlobalService do
end
with_them
do
context
'when add_permissions_data_to_notes_documents migration is finished'
do
it_behaves_like
'search respects visibility'
end
context
'when add_permissions_data_to_notes_documents migration is not finished'
do
before
do
set_elasticsearch_migration_to
:add_permissions_data_to_notes_documents
,
including:
false
end
it_behaves_like
'search respects visibility'
end
it_behaves_like
'search respects visibility'
end
end
...
...
@@ -144,17 +128,7 @@ RSpec.describe Search::GlobalService do
end
with_them
do
context
'when add_permissions_data_to_notes_documents migration is finished'
do
it_behaves_like
'search respects visibility'
end
context
'when add_permissions_data_to_notes_documents migration is not finished'
do
before
do
set_elasticsearch_migration_to
:add_permissions_data_to_notes_documents
,
including:
false
end
it_behaves_like
'search respects visibility'
end
it_behaves_like
'search respects visibility'
end
end
...
...
@@ -171,17 +145,7 @@ RSpec.describe Search::GlobalService do
project
.
repository
.
index_commits_and_blobs
end
context
'when add_permissions_data_to_notes_documents migration is finished'
do
it_behaves_like
'search respects visibility'
end
context
'when add_permissions_data_to_notes_documents migration is not finished'
do
before
do
set_elasticsearch_migration_to
:add_permissions_data_to_notes_documents
,
including:
false
end
it_behaves_like
'search respects visibility'
end
it_behaves_like
'search respects visibility'
end
end
...
...
@@ -193,17 +157,7 @@ RSpec.describe Search::GlobalService do
end
with_them
do
context
'when add_permissions_data_to_notes_documents migration is finished'
do
it_behaves_like
'search respects visibility'
end
context
'when add_permissions_data_to_notes_documents migration is not finished'
do
before
do
set_elasticsearch_migration_to
:add_permissions_data_to_notes_documents
,
including:
false
end
it_behaves_like
'search respects visibility'
end
it_behaves_like
'search respects visibility'
end
end
end
...
...
@@ -427,61 +381,19 @@ RSpec.describe Search::GlobalService do
context
'with notes on issues'
do
let
(
:noteable
)
{
create
:issue
,
project:
project
}
context
'when add_permissions_data_to_notes_documents migration has not finished'
do
before
do
set_elasticsearch_migration_to
:add_permissions_data_to_notes_documents
,
including:
false
end
it_behaves_like
'search notes shared examples'
,
:note_on_issue
end
context
'when add_permissions_data_to_notes_documents migration has finished'
do
before
do
set_elasticsearch_migration_to
:add_permissions_data_to_notes_documents
,
including:
true
end
it_behaves_like
'search notes shared examples'
,
:note_on_issue
end
it_behaves_like
'search notes shared examples'
,
:note_on_issue
end
context
'with notes on merge requests'
do
let
(
:noteable
)
{
create
:merge_request
,
target_project:
project
,
source_project:
project
}
context
'when add_permissions_data_to_notes_documents migration has not finished'
do
before
do
set_elasticsearch_migration_to
:add_permissions_data_to_notes_documents
,
including:
false
end
it_behaves_like
'search notes shared examples'
,
:note_on_merge_request
end
context
'when add_permissions_data_to_notes_documents migration has finished'
do
before
do
set_elasticsearch_migration_to
:add_permissions_data_to_notes_documents
,
including:
true
end
it_behaves_like
'search notes shared examples'
,
:note_on_merge_request
end
it_behaves_like
'search notes shared examples'
,
:note_on_merge_request
end
context
'with notes on commits'
do
let
(
:noteable
)
{
create
(
:commit
,
project:
project
)
}
context
'when add_permissions_data_to_notes_documents migration has not finished'
do
before
do
set_elasticsearch_migration_to
:add_permissions_data_to_notes_documents
,
including:
false
end
it_behaves_like
'search notes shared examples'
,
:note_on_commit
end
context
'when add_permissions_data_to_notes_documents migration has finished'
do
before
do
set_elasticsearch_migration_to
:add_permissions_data_to_notes_documents
,
including:
true
end
it_behaves_like
'search notes shared examples'
,
:note_on_commit
end
it_behaves_like
'search notes shared examples'
,
:note_on_commit
end
end
end
ee/spec/services/search/group_service_spec.rb
View file @
72f93dbf
...
...
@@ -67,15 +67,6 @@ RSpec.describe Search::GroupService do
end
end
context
'notes search'
,
:elastic
,
:clean_gitlab_redis_shared_state
do
let_it_be
(
:group
)
{
create
(
:group
)
}
let_it_be
(
:project
)
{
create
(
:project
,
namespace:
group
)
}
let
(
:results
)
{
described_class
.
new
(
nil
,
group
,
search:
'test'
).
execute
.
objects
(
'notes'
)
}
it_behaves_like
'search query applies joins based on migrations shared examples'
,
:add_permissions_data_to_notes_documents
end
context
'visibility'
,
:elastic_delete_by_query
,
:clean_gitlab_redis_shared_state
,
:sidekiq_inline
do
include_context
'ProjectPolicyTable context'
...
...
@@ -154,17 +145,7 @@ RSpec.describe Search::GroupService do
end
with_them
do
context
'when add_permissions_data_to_notes_documents migration is finished'
do
it_behaves_like
'search respects visibility'
end
context
'when add_permissions_data_to_notes_documents migration is not finished'
do
before
do
set_elasticsearch_migration_to
:add_permissions_data_to_notes_documents
,
including:
false
end
it_behaves_like
'search respects visibility'
end
it_behaves_like
'search respects visibility'
end
end
...
...
@@ -177,17 +158,7 @@ RSpec.describe Search::GroupService do
end
with_them
do
context
'when add_permissions_data_to_notes_documents migration is finished'
do
it_behaves_like
'search respects visibility'
end
context
'when add_permissions_data_to_notes_documents migration is not finished'
do
before
do
set_elasticsearch_migration_to
:add_permissions_data_to_notes_documents
,
including:
false
end
it_behaves_like
'search respects visibility'
end
it_behaves_like
'search respects visibility'
end
end
...
...
@@ -207,17 +178,7 @@ RSpec.describe Search::GroupService do
project2
.
repository
.
index_commits_and_blobs
end
context
'when add_permissions_data_to_notes_documents migration is finished'
do
it_behaves_like
'search respects visibility'
end
context
'when add_permissions_data_to_notes_documents migration is not finished'
do
before
do
set_elasticsearch_migration_to
:add_permissions_data_to_notes_documents
,
including:
false
end
it_behaves_like
'search respects visibility'
end
it_behaves_like
'search respects visibility'
end
end
...
...
@@ -230,17 +191,7 @@ RSpec.describe Search::GroupService do
end
with_them
do
context
'when add_permissions_data_to_notes_documents migration is finished'
do
it_behaves_like
'search respects visibility'
end
context
'when add_permissions_data_to_notes_documents migration is not finished'
do
before
do
set_elasticsearch_migration_to
:add_permissions_data_to_notes_documents
,
including:
false
end
it_behaves_like
'search respects visibility'
end
it_behaves_like
'search respects visibility'
end
end
end
...
...
ee/spec/services/search/project_service_spec.rb
View file @
72f93dbf
...
...
@@ -34,14 +34,6 @@ RSpec.describe Search::ProjectService do
end
end
context
'notes search'
do
let_it_be
(
:project
)
{
create
(
:project
)
}
let
(
:results
)
{
described_class
.
new
(
project
,
nil
,
search:
'test'
).
execute
.
objects
(
'notes'
)
}
it_behaves_like
'search query applies joins based on migrations shared examples'
,
:add_permissions_data_to_notes_documents
end
context
'visibility'
,
:elastic_delete_by_query
,
:sidekiq_inline
do
include_context
'ProjectPolicyTable context'
...
...
@@ -121,17 +113,7 @@ RSpec.describe Search::ProjectService do
end
with_them
do
context
'when add_permissions_data_to_notes_documents migration is finished'
do
it_behaves_like
'search respects visibility'
end
context
'when add_permissions_data_to_notes_documents migration is not finished'
do
before
do
set_elasticsearch_migration_to
:add_permissions_data_to_notes_documents
,
including:
false
end
it_behaves_like
'search respects visibility'
end
it_behaves_like
'search respects visibility'
end
end
...
...
@@ -144,17 +126,7 @@ RSpec.describe Search::ProjectService do
end
with_them
do
context
'when add_permissions_data_to_notes_documents migration is finished'
do
it_behaves_like
'search respects visibility'
end
context
'when add_permissions_data_to_notes_documents migration is not finished'
do
before
do
set_elasticsearch_migration_to
:add_permissions_data_to_notes_documents
,
including:
false
end
it_behaves_like
'search respects visibility'
end
it_behaves_like
'search respects visibility'
end
end
...
...
@@ -174,17 +146,7 @@ RSpec.describe Search::ProjectService do
project2
.
repository
.
index_commits_and_blobs
end
context
'when add_permissions_data_to_notes_documents migration is finished'
do
it_behaves_like
'search respects visibility'
end
context
'when add_permissions_data_to_notes_documents migration is not finished'
do
before
do
set_elasticsearch_migration_to
:add_permissions_data_to_notes_documents
,
including:
false
end
it_behaves_like
'search respects visibility'
end
it_behaves_like
'search respects visibility'
end
end
...
...
@@ -197,17 +159,7 @@ RSpec.describe Search::ProjectService do
end
with_them
do
context
'when add_permissions_data_to_notes_documents migration is finished'
do
it_behaves_like
'search respects visibility'
end
context
'when add_permissions_data_to_notes_documents migration is not finished'
do
before
do
set_elasticsearch_migration_to
:add_permissions_data_to_notes_documents
,
including:
false
end
it_behaves_like
'search respects visibility'
end
it_behaves_like
'search respects visibility'
end
end
end
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment