2020-01-01 13:55:28 +05:30
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
|
|
require 'spec_helper'
|
|
|
|
|
2020-07-28 23:09:34 +05:30
|
|
|
RSpec.describe Clusters::Cleanup::ProjectNamespaceService do
|
2020-01-01 13:55:28 +05:30
|
|
|
describe '#execute' do
|
|
|
|
subject { service.execute }
|
|
|
|
|
|
|
|
let!(:service) { described_class.new(cluster) }
|
|
|
|
let!(:cluster) { create(:cluster, :with_environments, :cleanup_removing_project_namespaces) }
|
|
|
|
let!(:logger) { service.send(:logger) }
|
|
|
|
let(:log_meta) do
|
|
|
|
{
|
|
|
|
service: described_class.name,
|
|
|
|
cluster_id: cluster.id,
|
|
|
|
execution_count: 0
|
|
|
|
}
|
|
|
|
end
|
2020-10-24 23:57:45 +05:30
|
|
|
|
2020-01-01 13:55:28 +05:30
|
|
|
let(:kubeclient_instance_double) do
|
|
|
|
instance_double(Gitlab::Kubernetes::KubeClient, delete_namespace: nil, delete_service_account: nil)
|
|
|
|
end
|
|
|
|
|
|
|
|
before do
|
|
|
|
allow_any_instance_of(Clusters::Cluster).to receive(:kubeclient).and_return(kubeclient_instance_double)
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when cluster has namespaces to be deleted' do
|
|
|
|
it 'deletes namespaces from cluster' do
|
|
|
|
expect(kubeclient_instance_double).to receive(:delete_namespace)
|
|
|
|
.with cluster.kubernetes_namespaces[0].namespace
|
|
|
|
expect(kubeclient_instance_double).to receive(:delete_namespace)
|
|
|
|
.with(cluster.kubernetes_namespaces[1].namespace)
|
|
|
|
|
|
|
|
subject
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'deletes namespaces from database' do
|
|
|
|
expect { subject }.to change { cluster.kubernetes_namespaces.exists? }.from(true).to(false)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'schedules ::ServiceAccountWorker' do
|
|
|
|
expect(Clusters::Cleanup::ServiceAccountWorker).to receive(:perform_async).with(cluster.id)
|
|
|
|
subject
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'logs all events' do
|
|
|
|
expect(logger).to receive(:info)
|
|
|
|
.with(
|
|
|
|
log_meta.merge(
|
|
|
|
event: :deleting_project_namespace,
|
|
|
|
namespace: cluster.kubernetes_namespaces[0].namespace))
|
|
|
|
expect(logger).to receive(:info)
|
|
|
|
.with(
|
|
|
|
log_meta.merge(
|
|
|
|
event: :deleting_project_namespace,
|
|
|
|
namespace: cluster.kubernetes_namespaces[1].namespace))
|
|
|
|
|
|
|
|
subject
|
|
|
|
end
|
2021-12-11 22:18:48 +05:30
|
|
|
|
|
|
|
context 'when cluster.kubeclient is nil' do
|
|
|
|
let(:kubeclient_instance_double) { nil }
|
|
|
|
|
|
|
|
it 'schedules ::ServiceAccountWorker' do
|
|
|
|
expect(Clusters::Cleanup::ServiceAccountWorker).to receive(:perform_async).with(cluster.id)
|
|
|
|
subject
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'deletes namespaces from database' do
|
|
|
|
expect { subject }.to change { cluster.kubernetes_namespaces.exists? }.from(true).to(false)
|
|
|
|
end
|
|
|
|
end
|
2020-01-01 13:55:28 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
context 'when cluster has no namespaces' do
|
|
|
|
let!(:cluster) { create(:cluster, :cleanup_removing_project_namespaces) }
|
|
|
|
|
|
|
|
it 'schedules Clusters::Cleanup::ServiceAccountWorker' do
|
|
|
|
expect(Clusters::Cleanup::ServiceAccountWorker).to receive(:perform_async).with(cluster.id)
|
|
|
|
|
|
|
|
subject
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'transitions to cleanup_removing_service_account' do
|
|
|
|
expect { subject }
|
|
|
|
.to change { cluster.reload.cleanup_status_name }
|
|
|
|
.from(:cleanup_removing_project_namespaces)
|
|
|
|
.to(:cleanup_removing_service_account)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'does not try to delete namespaces' do
|
|
|
|
expect(kubeclient_instance_double).not_to receive(:delete_namespace)
|
|
|
|
|
|
|
|
subject
|
|
|
|
end
|
|
|
|
end
|
2022-01-26 12:08:38 +05:30
|
|
|
|
|
|
|
context 'when there is a Kubeclient::HttpError' do
|
|
|
|
let(:kubeclient_instance_double) do
|
|
|
|
instance_double(Gitlab::Kubernetes::KubeClient)
|
|
|
|
end
|
|
|
|
|
|
|
|
['Unauthorized', 'forbidden', 'Certificate verify Failed'].each do |message|
|
|
|
|
it 'schedules ::ServiceAccountWorker with accepted errors' do
|
|
|
|
allow(kubeclient_instance_double)
|
|
|
|
.to receive(:delete_namespace)
|
|
|
|
.and_raise(Kubeclient::HttpError.new(401, message, nil))
|
|
|
|
|
|
|
|
expect(Clusters::Cleanup::ServiceAccountWorker).to receive(:perform_async).with(cluster.id)
|
|
|
|
|
|
|
|
subject
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'raises error with unaccepted errors' do
|
|
|
|
allow(kubeclient_instance_double)
|
|
|
|
.to receive(:delete_namespace)
|
|
|
|
.and_raise(Kubeclient::HttpError.new(401, 'unexpected message', nil))
|
|
|
|
|
|
|
|
expect { subject }.to raise_error(Kubeclient::HttpError)
|
|
|
|
end
|
|
|
|
end
|
2020-01-01 13:55:28 +05:30
|
|
|
end
|
|
|
|
end
|