2018-09-25 10:32:53 -04:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
|
|
require 'gitlab'
|
2020-07-06 17:08:51 -04:00
|
|
|
require_relative File.expand_path('../../tooling/lib/tooling/helm3_client.rb', __dir__)
|
|
|
|
require_relative File.expand_path('../../tooling/lib/tooling/kubernetes_client.rb', __dir__)
|
2018-09-25 10:32:53 -04:00
|
|
|
|
|
|
|
class AutomatedCleanup
|
2018-10-15 12:06:44 -04:00
|
|
|
attr_reader :project_path, :gitlab_token
|
|
|
|
|
|
|
|
DEPLOYMENTS_PER_PAGE = 100
|
|
|
|
IGNORED_HELM_ERRORS = [
|
|
|
|
'transport is closing',
|
2020-04-09 08:09:24 -04:00
|
|
|
'error upgrading connection',
|
|
|
|
'not found'
|
2018-10-15 12:06:44 -04:00
|
|
|
].freeze
|
|
|
|
IGNORED_KUBERNETES_ERRORS = [
|
|
|
|
'NotFound'
|
|
|
|
].freeze
|
|
|
|
|
|
|
|
def self.ee?
|
2019-09-24 11:06:34 -04:00
|
|
|
# Support former project name for `dev`
|
|
|
|
%w[gitlab gitlab-ee].include?(ENV['CI_PROJECT_NAME'])
|
2018-10-15 12:06:44 -04:00
|
|
|
end
|
2018-09-25 10:32:53 -04:00
|
|
|
|
2021-02-05 07:09:31 -05:00
|
|
|
# $GITLAB_PROJECT_REVIEW_APP_CLEANUP_API_TOKEN => `Automated Review App Cleanup` project token
|
|
|
|
def initialize(project_path: ENV['CI_PROJECT_PATH'], gitlab_token: ENV['GITLAB_PROJECT_REVIEW_APP_CLEANUP_API_TOKEN'])
|
2018-09-25 10:32:53 -04:00
|
|
|
@project_path = project_path
|
|
|
|
@gitlab_token = gitlab_token
|
|
|
|
end
|
|
|
|
|
|
|
|
def gitlab
|
|
|
|
@gitlab ||= begin
|
|
|
|
Gitlab.configure do |config|
|
|
|
|
config.endpoint = 'https://gitlab.com/api/v4'
|
|
|
|
# gitlab-bot's token "GitLab review apps cleanup"
|
|
|
|
config.private_token = gitlab_token
|
|
|
|
end
|
|
|
|
|
|
|
|
Gitlab
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-10-15 12:06:44 -04:00
|
|
|
def review_apps_namespace
|
2020-06-30 11:08:48 -04:00
|
|
|
'review-apps'
|
2018-10-15 12:06:44 -04:00
|
|
|
end
|
|
|
|
|
2018-09-25 10:32:53 -04:00
|
|
|
def helm
|
2020-07-06 17:08:51 -04:00
|
|
|
@helm ||= Tooling::Helm3Client.new(namespace: review_apps_namespace)
|
2018-09-25 10:32:53 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
def kubernetes
|
2020-07-06 17:08:51 -04:00
|
|
|
@kubernetes ||= Tooling::KubernetesClient.new(namespace: review_apps_namespace)
|
2018-09-25 10:32:53 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
def perform_gitlab_environment_cleanup!(days_for_stop:, days_for_delete:)
|
2020-03-04 16:07:54 -05:00
|
|
|
puts "Checking for Review Apps not updated in the last #{days_for_stop} days..."
|
2018-09-25 10:32:53 -04:00
|
|
|
|
|
|
|
checked_environments = []
|
|
|
|
delete_threshold = threshold_time(days: days_for_delete)
|
|
|
|
stop_threshold = threshold_time(days: days_for_stop)
|
2019-10-24 05:06:18 -04:00
|
|
|
deployments_look_back_threshold = threshold_time(days: days_for_delete * 5)
|
|
|
|
|
2019-10-24 11:06:02 -04:00
|
|
|
releases_to_delete = []
|
|
|
|
|
2019-10-24 05:06:18 -04:00
|
|
|
gitlab.deployments(project_path, per_page: DEPLOYMENTS_PER_PAGE, sort: 'desc').auto_paginate do |deployment|
|
|
|
|
break if Time.parse(deployment.created_at) < deployments_look_back_threshold
|
2018-09-25 10:32:53 -04:00
|
|
|
|
2018-10-15 12:06:44 -04:00
|
|
|
environment = deployment.environment
|
2018-09-25 10:32:53 -04:00
|
|
|
|
2019-10-23 05:06:03 -04:00
|
|
|
next unless environment
|
|
|
|
next unless environment.name.start_with?('review/')
|
2018-10-15 12:06:44 -04:00
|
|
|
next if checked_environments.include?(environment.slug)
|
|
|
|
|
|
|
|
last_deploy = deployment.created_at
|
|
|
|
deployed_at = Time.parse(last_deploy)
|
2018-09-25 10:32:53 -04:00
|
|
|
|
|
|
|
if deployed_at < delete_threshold
|
2019-11-21 07:06:40 -05:00
|
|
|
deleted_environment = delete_environment(environment, deployment)
|
|
|
|
if deleted_environment
|
2020-07-06 17:08:51 -04:00
|
|
|
release = Tooling::Helm3Client::Release.new(environment.slug, 1, deployed_at.to_s, nil, nil, review_apps_namespace)
|
2019-11-21 04:06:16 -05:00
|
|
|
releases_to_delete << release
|
|
|
|
end
|
2018-09-25 10:32:53 -04:00
|
|
|
else
|
2020-03-10 11:08:08 -04:00
|
|
|
if deployed_at >= stop_threshold
|
|
|
|
print_release_state(subject: 'Review App', release_name: environment.slug, release_date: last_deploy, action: 'leaving')
|
|
|
|
else
|
|
|
|
environment_state = fetch_environment(environment)&.state
|
|
|
|
stop_environment(environment, deployment) if environment_state && environment_state != 'stopped'
|
|
|
|
end
|
2018-09-25 10:32:53 -04:00
|
|
|
end
|
2018-10-15 12:06:44 -04:00
|
|
|
|
|
|
|
checked_environments << environment.slug
|
2018-09-25 10:32:53 -04:00
|
|
|
end
|
2019-10-24 11:06:02 -04:00
|
|
|
|
|
|
|
delete_helm_releases(releases_to_delete)
|
2018-09-25 10:32:53 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
def perform_helm_releases_cleanup!(days:)
|
2020-04-09 08:09:24 -04:00
|
|
|
puts "Checking for Helm releases that are failed or not updated in the last #{days} days..."
|
2018-09-25 10:32:53 -04:00
|
|
|
|
2020-03-04 16:07:54 -05:00
|
|
|
threshold = threshold_time(days: days)
|
2018-09-25 10:32:53 -04:00
|
|
|
|
2019-10-24 11:06:02 -04:00
|
|
|
releases_to_delete = []
|
|
|
|
|
2018-10-15 12:06:44 -04:00
|
|
|
helm_releases.each do |release|
|
2019-10-24 05:06:18 -04:00
|
|
|
# Prevents deleting `dns-gitlab-review-app` releases or other unrelated releases
|
|
|
|
next unless release.name.start_with?('review-')
|
|
|
|
|
2020-04-21 14:09:31 -04:00
|
|
|
if release.status == 'failed' || release.last_update < threshold
|
2019-10-24 11:06:02 -04:00
|
|
|
releases_to_delete << release
|
2018-09-25 10:32:53 -04:00
|
|
|
else
|
|
|
|
print_release_state(subject: 'Release', release_name: release.name, release_date: release.last_update, action: 'leaving')
|
|
|
|
end
|
|
|
|
end
|
2019-10-24 11:06:02 -04:00
|
|
|
|
|
|
|
delete_helm_releases(releases_to_delete)
|
2018-09-25 10:32:53 -04:00
|
|
|
end
|
|
|
|
|
2021-01-13 13:10:55 -05:00
|
|
|
def perform_stale_pvc_cleanup!(days:)
|
|
|
|
kubernetes.cleanup_by_created_at(resource_type: 'pvc', created_before: threshold_time(days: days), wait: false)
|
|
|
|
end
|
|
|
|
|
2018-10-15 12:06:44 -04:00
|
|
|
private
|
|
|
|
|
2020-03-10 11:08:08 -04:00
|
|
|
def fetch_environment(environment)
|
|
|
|
gitlab.environment(project_path, environment.id)
|
|
|
|
rescue Errno::ETIMEDOUT => ex
|
|
|
|
puts "Failed to fetch '#{environment.name}' / '#{environment.slug}' (##{environment.id}):\n#{ex.message}"
|
|
|
|
nil
|
|
|
|
end
|
|
|
|
|
2018-10-15 12:06:44 -04:00
|
|
|
def delete_environment(environment, deployment)
|
|
|
|
print_release_state(subject: 'Review app', release_name: environment.slug, release_date: deployment.created_at, action: 'deleting')
|
|
|
|
gitlab.delete_environment(project_path, environment.id)
|
2019-11-21 04:06:16 -05:00
|
|
|
|
|
|
|
rescue Gitlab::Error::Forbidden
|
2020-03-10 11:08:08 -04:00
|
|
|
puts "Review app '#{environment.name}' / '#{environment.slug}' (##{environment.id}) is forbidden: skipping it"
|
2018-10-15 12:06:44 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
def stop_environment(environment, deployment)
|
|
|
|
print_release_state(subject: 'Review app', release_name: environment.slug, release_date: deployment.created_at, action: 'stopping')
|
|
|
|
gitlab.stop_environment(project_path, environment.id)
|
2019-11-21 04:06:16 -05:00
|
|
|
|
|
|
|
rescue Gitlab::Error::Forbidden
|
2020-03-10 11:08:08 -04:00
|
|
|
puts "Review app '#{environment.name}' / '#{environment.slug}' (##{environment.id}) is forbidden: skipping it"
|
2018-10-15 12:06:44 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
def helm_releases
|
2020-04-09 08:09:24 -04:00
|
|
|
args = ['--all', '--date']
|
2018-10-15 12:06:44 -04:00
|
|
|
|
|
|
|
helm.releases(args: args)
|
|
|
|
end
|
|
|
|
|
2019-10-24 11:06:02 -04:00
|
|
|
def delete_helm_releases(releases)
|
|
|
|
return if releases.empty?
|
|
|
|
|
|
|
|
releases.each do |release|
|
|
|
|
print_release_state(subject: 'Release', release_name: release.name, release_status: release.status, release_date: release.last_update, action: 'cleaning')
|
|
|
|
end
|
|
|
|
|
|
|
|
releases_names = releases.map(&:name)
|
|
|
|
helm.delete(release_name: releases_names)
|
2021-01-13 13:10:55 -05:00
|
|
|
kubernetes.cleanup_by_release(release_name: releases_names, wait: false)
|
2019-10-24 11:06:02 -04:00
|
|
|
|
2020-07-06 17:08:51 -04:00
|
|
|
rescue Tooling::Helm3Client::CommandFailedError => ex
|
2018-10-15 12:06:44 -04:00
|
|
|
raise ex unless ignore_exception?(ex.message, IGNORED_HELM_ERRORS)
|
|
|
|
|
|
|
|
puts "Ignoring the following Helm error:\n#{ex}\n"
|
2020-07-06 17:08:51 -04:00
|
|
|
rescue Tooling::KubernetesClient::CommandFailedError => ex
|
2018-10-15 12:06:44 -04:00
|
|
|
raise ex unless ignore_exception?(ex.message, IGNORED_KUBERNETES_ERRORS)
|
|
|
|
|
|
|
|
puts "Ignoring the following Kubernetes error:\n#{ex}\n"
|
|
|
|
end
|
|
|
|
|
2018-09-25 10:32:53 -04:00
|
|
|
def threshold_time(days:)
|
|
|
|
Time.now - days * 24 * 3600
|
|
|
|
end
|
|
|
|
|
2018-10-15 12:06:44 -04:00
|
|
|
def ignore_exception?(exception_message, exceptions_ignored)
|
|
|
|
exception_message.match?(/(#{exceptions_ignored})/)
|
|
|
|
end
|
|
|
|
|
|
|
|
def print_release_state(subject:, release_name:, release_date:, action:, release_status: nil)
|
|
|
|
puts "\n#{subject} '#{release_name}' #{"(#{release_status}) " if release_status}was last deployed on #{release_date}: #{action} it.\n"
|
2018-09-25 10:32:53 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def timed(task)
|
|
|
|
start = Time.now
|
|
|
|
yield(self)
|
|
|
|
puts "#{task} finished in #{Time.now - start} seconds.\n"
|
|
|
|
end
|
|
|
|
|
|
|
|
automated_cleanup = AutomatedCleanup.new
|
|
|
|
|
2020-03-04 16:07:54 -05:00
|
|
|
timed('Review Apps cleanup') do
|
|
|
|
automated_cleanup.perform_gitlab_environment_cleanup!(days_for_stop: 5, days_for_delete: 6)
|
2018-09-25 10:32:53 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
puts
|
|
|
|
|
|
|
|
timed('Helm releases cleanup') do
|
2020-03-04 16:07:54 -05:00
|
|
|
automated_cleanup.perform_helm_releases_cleanup!(days: 7)
|
2018-09-25 10:32:53 -04:00
|
|
|
end
|
|
|
|
|
2021-01-13 13:10:55 -05:00
|
|
|
timed('Stale PVC cleanup') do
|
|
|
|
automated_cleanup.perform_stale_pvc_cleanup!(days: 30)
|
|
|
|
end
|
|
|
|
|
2018-09-25 10:32:53 -04:00
|
|
|
exit(0)
|