diff options
author | GitLab Bot <gitlab-bot@gitlab.com> | 2020-03-31 03:07:51 +0000 |
---|---|---|
committer | GitLab Bot <gitlab-bot@gitlab.com> | 2020-03-31 03:07:51 +0000 |
commit | 83a3209c3f8e5bc055acf80f3440335d2b97133b (patch) | |
tree | 0bb8d48ee018534d319311358f7dab6549b752e1 /scripts/review_apps | |
parent | f6e2f302412fcb32b644b379778964791789cb62 (diff) | |
download | gitlab-ce-83a3209c3f8e5bc055acf80f3440335d2b97133b.tar.gz |
Add latest changes from gitlab-org/gitlab@master
Diffstat (limited to 'scripts/review_apps')
-rwxr-xr-x | scripts/review_apps/gcp_cleanup.sh | 153 |
1 files changed, 153 insertions, 0 deletions
diff --git a/scripts/review_apps/gcp_cleanup.sh b/scripts/review_apps/gcp_cleanup.sh new file mode 100755 index 00000000000..ea6b60ed5ff --- /dev/null +++ b/scripts/review_apps/gcp_cleanup.sh @@ -0,0 +1,153 @@ +#!/bin/bash + +source scripts/utils.sh + +# These scripts require the following environment variables: +# - REVIEW_APPS_GCP_REGION - e.g `us-central1` +# - KUBE_NAMESPACE - e.g `review-apps-ee` + +function delete_firewall_rules() { + if [[ ${#@} -eq 0 ]]; then + echoinfo "No firewall rules to be deleted" true + return + fi + + echoinfo "Deleting firewall rules:" true + echo "${@}" + + if [[ ${DRY_RUN} = 1 ]]; then + echo "[DRY RUN] gcloud compute firewall-rules delete -q" "${@}" + else + gcloud compute firewall-rules delete -q "${@}" + fi +} + +function delete_forwarding_rules() { + if [[ ${#@} -eq 0 ]]; then + echoinfo "No forwarding rules to be deleted" true + return + fi + + echoinfo "Deleting forwarding rules:" true + echo "${@}" + + if [[ ${DRY_RUN} = 1 ]]; then + echo "[DRY RUN] gcloud compute forwarding-rules delete -q" "${@}" "--region ${REVIEW_APPS_GCP_REGION}" + else + gcloud compute forwarding-rules delete -q "${@}" --region "${REVIEW_APPS_GCP_REGION}" + fi +} + +function delete_target_pools() { + if [[ ${#@} -eq 0 ]]; then + echoinfo "No target pools to be deleted" true + return + fi + + echoinfo "Deleting target pools:" true + echo "${@}" + + if [[ ${DRY_RUN} = 1 ]]; then + echo "[DRY RUN] gcloud compute target-pools delete -q" "${@}" "--region ${REVIEW_APPS_GCP_REGION}" + else + gcloud compute target-pools delete -q "${@}" --region "${REVIEW_APPS_GCP_REGION}" + fi +} + +function delete_http_health_checks() { + if [[ ${#@} -eq 0 ]]; then + echoinfo "No http health checks to be deleted" true + return + fi + + echoinfo "Deleting http health checks:" true + echo "${@}" + + if [[ ${DRY_RUN} = 1 ]]; then + echo "[DRY RUN] gcloud compute http-health-checks delete -q" "${@}" + else + gcloud compute http-health-checks delete -q "${@}" + fi +} + +function get_related_firewall_rules() { + local forwarding_rule=${1} + + gcloud compute firewall-rules list --filter "name~${forwarding_rule}" --format "value(name)" +} + +function get_service_name_in_forwarding_rule() { + local forwarding_rule=${1} + + gcloud compute forwarding-rules describe "${forwarding_rule}" --region "${REVIEW_APPS_GCP_REGION}" --format "value(description)" | jq -r '.["kubernetes.io/service-name"]' +} + +function forwarding_rule_k8s_service_exists() { + local namespace="${KUBE_NAMESPACE}" + local namespaced_service_name=$(get_service_name_in_forwarding_rule "$forwarding_rule") + + if [[ ! $namespaced_service_name =~ ^"${namespace}" ]]; then + return 0 # this prevents `review-apps-ee` pipeline from deleting `review-apps-ce` resources and vice versa + fi + + local service_name=$(echo "${namespaced_service_name}" | sed -e "s/${namespace}\///g") + + kubectl get svc "${service_name}" -n "${namespace}" >/dev/null 2>&1 + local status=$? + + return $status +} + +function gcp_cleanup() { + if [[ ! $(command -v kubectl) ]]; then + echoerr "kubectl executable not found" + return 1 + fi + + if [[ -z "${REVIEW_APPS_GCP_REGION}" ]]; then + echoerr "REVIEW_APPS_GCP_REGION is not set." + return 1 + fi + + if [[ -z "${KUBE_NAMESPACE}" ]]; then + echoerr "KUBE_NAMESPACE is not set." + return 1 + fi + + if [[ -n "${DRY_RUN}" ]]; then + echoinfo "Running in DRY_RUN" + fi + + local target_pools_to_delete=() + local firewall_rules_to_delete=() + local forwarding_rules_to_delete=() + local http_health_checks_to_delete=() + + for forwarding_rule in $(gcloud compute forwarding-rules list --filter="region:(${REVIEW_APPS_GCP_REGION})" --format "value(name)"); do + echoinfo "Inspecting forwarding rule ${forwarding_rule}" true + + # We perform clean up when there is no more kubernetes service that require the resources. + # To identify the kubernetes service using the resources, + # we find the service name indicated in the forwarding rule description, e.g: + # + # $ gcloud compute forwarding-rules describe aff68b997da1211e984a042010af0019 + # # ... + # description: '{"kubernetes.io/service-name":"review-apps-ee/review-winh-eslin-809vqz-nginx-ingress-controller"}' + # # ... + if forwarding_rule_k8s_service_exists "${forwarding_rule}"; then + echoinfo "Skip clean up for ${forwarding_rule}" + else + echoinfo "Queuing forwarding rule, firewall rule, target pool and health check for ${forwarding_rule} to be cleaned up" + + firewall_rules_to_delete+=($(get_related_firewall_rules "${forwarding_rule}")) + forwarding_rules_to_delete+=(${forwarding_rule}) + target_pools_to_delete+=(${forwarding_rule}) + http_health_checks_to_delete+=(${forwarding_rule}) + fi + done + + delete_firewall_rules "${firewall_rules_to_delete[@]}" + delete_forwarding_rules "${forwarding_rules_to_delete[@]}" + delete_target_pools "${target_pools_to_delete[@]}" + delete_http_health_checks "${http_health_checks_to_delete[@]}" +} |