diff options
Diffstat (limited to 'app/workers/authorized_project_update/user_refresh_over_user_range_worker.rb')
-rw-r--r-- | app/workers/authorized_project_update/user_refresh_over_user_range_worker.rb | 39 |
1 files changed, 35 insertions, 4 deletions
diff --git a/app/workers/authorized_project_update/user_refresh_over_user_range_worker.rb b/app/workers/authorized_project_update/user_refresh_over_user_range_worker.rb index 9bd1ad2ed30..6635c322ab8 100644 --- a/app/workers/authorized_project_update/user_refresh_over_user_range_worker.rb +++ b/app/workers/authorized_project_update/user_refresh_over_user_range_worker.rb @@ -1,18 +1,49 @@ # frozen_string_literal: true module AuthorizedProjectUpdate - class UserRefreshOverUserRangeWorker + class UserRefreshOverUserRangeWorker # rubocop:disable Scalability/IdempotentWorker + # When the feature flag named `periodic_project_authorization_update_via_replica` is enabled, + # this worker checks if a specific user requires an update to their project_authorizations records. + # This check is done via the data read from the database replica (and not from the primary). + # If this check returns true, a completely new Sidekiq job is enqueued for this specific user + # so as to update its project_authorizations records. + + # There is a possibility that the data in the replica is lagging behind the primary + # and hence it becomes very important that we check if an update is indeed required for this user + # once again via the primary database, which is the reason why we enqueue a completely new Sidekiq job + # via `UserRefreshWithLowUrgencyWorker` for this user. + include ApplicationWorker feature_category :authentication_and_authorization urgency :low queue_namespace :authorized_project_update + # This job will not be deduplicated since it is marked with + # `data_consistency :delayed` and not `idempotent!` + # See https://gitlab.com/gitlab-org/gitlab/-/issues/325291 deduplicate :until_executing, including_scheduled: true - - idempotent! + data_consistency :delayed, feature_flag: :periodic_project_authorization_update_via_replica def perform(start_user_id, end_user_id) - AuthorizedProjectUpdate::RecalculateForUserRangeService.new(start_user_id, end_user_id).execute + if Feature.enabled?(:periodic_project_authorization_update_via_replica) + User.where(id: start_user_id..end_user_id).find_each do |user| # rubocop: disable CodeReuse/ActiveRecord + enqueue_project_authorizations_refresh(user) if project_authorizations_needs_refresh?(user) + end + else + AuthorizedProjectUpdate::RecalculateForUserRangeService.new(start_user_id, end_user_id).execute + end + end + + private + + def project_authorizations_needs_refresh?(user) + AuthorizedProjectUpdate::FindRecordsDueForRefreshService.new(user).needs_refresh? + end + + def enqueue_project_authorizations_refresh(user) + with_context(user: user) do + AuthorizedProjectUpdate::UserRefreshWithLowUrgencyWorker.perform_async(user.id) + end end end end |