summaryrefslogtreecommitdiff
path: root/scripts/review_apps
diff options
context:
space:
mode:
authorGitLab Bot <gitlab-bot@gitlab.com>2020-03-31 03:07:51 +0000
committerGitLab Bot <gitlab-bot@gitlab.com>2020-03-31 03:07:51 +0000
commit83a3209c3f8e5bc055acf80f3440335d2b97133b (patch)
tree0bb8d48ee018534d319311358f7dab6549b752e1 /scripts/review_apps
parentf6e2f302412fcb32b644b379778964791789cb62 (diff)
downloadgitlab-ce-83a3209c3f8e5bc055acf80f3440335d2b97133b.tar.gz
Add latest changes from gitlab-org/gitlab@master
Diffstat (limited to 'scripts/review_apps')
-rwxr-xr-xscripts/review_apps/gcp_cleanup.sh153
1 files changed, 153 insertions, 0 deletions
diff --git a/scripts/review_apps/gcp_cleanup.sh b/scripts/review_apps/gcp_cleanup.sh
new file mode 100755
index 00000000000..ea6b60ed5ff
--- /dev/null
+++ b/scripts/review_apps/gcp_cleanup.sh
@@ -0,0 +1,153 @@
+#!/bin/bash
+
+source scripts/utils.sh
+
+# These scripts require the following environment variables:
+# - REVIEW_APPS_GCP_REGION - e.g `us-central1`
+# - KUBE_NAMESPACE - e.g `review-apps-ee`
+
+function delete_firewall_rules() {
+ if [[ ${#@} -eq 0 ]]; then
+ echoinfo "No firewall rules to be deleted" true
+ return
+ fi
+
+ echoinfo "Deleting firewall rules:" true
+ echo "${@}"
+
+ if [[ ${DRY_RUN} = 1 ]]; then
+ echo "[DRY RUN] gcloud compute firewall-rules delete -q" "${@}"
+ else
+ gcloud compute firewall-rules delete -q "${@}"
+ fi
+}
+
+function delete_forwarding_rules() {
+ if [[ ${#@} -eq 0 ]]; then
+ echoinfo "No forwarding rules to be deleted" true
+ return
+ fi
+
+ echoinfo "Deleting forwarding rules:" true
+ echo "${@}"
+
+ if [[ ${DRY_RUN} = 1 ]]; then
+ echo "[DRY RUN] gcloud compute forwarding-rules delete -q" "${@}" "--region ${REVIEW_APPS_GCP_REGION}"
+ else
+ gcloud compute forwarding-rules delete -q "${@}" --region "${REVIEW_APPS_GCP_REGION}"
+ fi
+}
+
+function delete_target_pools() {
+ if [[ ${#@} -eq 0 ]]; then
+ echoinfo "No target pools to be deleted" true
+ return
+ fi
+
+ echoinfo "Deleting target pools:" true
+ echo "${@}"
+
+ if [[ ${DRY_RUN} = 1 ]]; then
+ echo "[DRY RUN] gcloud compute target-pools delete -q" "${@}" "--region ${REVIEW_APPS_GCP_REGION}"
+ else
+ gcloud compute target-pools delete -q "${@}" --region "${REVIEW_APPS_GCP_REGION}"
+ fi
+}
+
+function delete_http_health_checks() {
+ if [[ ${#@} -eq 0 ]]; then
+ echoinfo "No http health checks to be deleted" true
+ return
+ fi
+
+ echoinfo "Deleting http health checks:" true
+ echo "${@}"
+
+ if [[ ${DRY_RUN} = 1 ]]; then
+ echo "[DRY RUN] gcloud compute http-health-checks delete -q" "${@}"
+ else
+ gcloud compute http-health-checks delete -q "${@}"
+ fi
+}
+
+function get_related_firewall_rules() {
+ local forwarding_rule=${1}
+
+ gcloud compute firewall-rules list --filter "name~${forwarding_rule}" --format "value(name)"
+}
+
+function get_service_name_in_forwarding_rule() {
+ local forwarding_rule=${1}
+
+ gcloud compute forwarding-rules describe "${forwarding_rule}" --region "${REVIEW_APPS_GCP_REGION}" --format "value(description)" | jq -r '.["kubernetes.io/service-name"]'
+}
+
+function forwarding_rule_k8s_service_exists() {
+ local namespace="${KUBE_NAMESPACE}"
+ local namespaced_service_name=$(get_service_name_in_forwarding_rule "$forwarding_rule")
+
+ if [[ ! $namespaced_service_name =~ ^"${namespace}" ]]; then
+ return 0 # this prevents `review-apps-ee` pipeline from deleting `review-apps-ce` resources and vice versa
+ fi
+
+ local service_name=$(echo "${namespaced_service_name}" | sed -e "s/${namespace}\///g")
+
+ kubectl get svc "${service_name}" -n "${namespace}" >/dev/null 2>&1
+ local status=$?
+
+ return $status
+}
+
+function gcp_cleanup() {
+ if [[ ! $(command -v kubectl) ]]; then
+ echoerr "kubectl executable not found"
+ return 1
+ fi
+
+ if [[ -z "${REVIEW_APPS_GCP_REGION}" ]]; then
+ echoerr "REVIEW_APPS_GCP_REGION is not set."
+ return 1
+ fi
+
+ if [[ -z "${KUBE_NAMESPACE}" ]]; then
+ echoerr "KUBE_NAMESPACE is not set."
+ return 1
+ fi
+
+ if [[ -n "${DRY_RUN}" ]]; then
+ echoinfo "Running in DRY_RUN"
+ fi
+
+ local target_pools_to_delete=()
+ local firewall_rules_to_delete=()
+ local forwarding_rules_to_delete=()
+ local http_health_checks_to_delete=()
+
+ for forwarding_rule in $(gcloud compute forwarding-rules list --filter="region:(${REVIEW_APPS_GCP_REGION})" --format "value(name)"); do
+ echoinfo "Inspecting forwarding rule ${forwarding_rule}" true
+
+ # We perform clean up when there is no more kubernetes service that require the resources.
+ # To identify the kubernetes service using the resources,
+ # we find the service name indicated in the forwarding rule description, e.g:
+ #
+ # $ gcloud compute forwarding-rules describe aff68b997da1211e984a042010af0019
+ # # ...
+ # description: '{"kubernetes.io/service-name":"review-apps-ee/review-winh-eslin-809vqz-nginx-ingress-controller"}'
+ # # ...
+ if forwarding_rule_k8s_service_exists "${forwarding_rule}"; then
+ echoinfo "Skip clean up for ${forwarding_rule}"
+ else
+ echoinfo "Queuing forwarding rule, firewall rule, target pool and health check for ${forwarding_rule} to be cleaned up"
+
+ firewall_rules_to_delete+=($(get_related_firewall_rules "${forwarding_rule}"))
+ forwarding_rules_to_delete+=(${forwarding_rule})
+ target_pools_to_delete+=(${forwarding_rule})
+ http_health_checks_to_delete+=(${forwarding_rule})
+ fi
+ done
+
+ delete_firewall_rules "${firewall_rules_to_delete[@]}"
+ delete_forwarding_rules "${forwarding_rules_to_delete[@]}"
+ delete_target_pools "${target_pools_to_delete[@]}"
+ delete_http_health_checks "${http_health_checks_to_delete[@]}"
+}