For the includers of HyperTagMethods, this changes the authorization code and object_tag member validation code to look at the project_id column for the object, instead of looking a row with the project and object in the access_tag table. This removes all calls to associate_with_project, other than those for Account. It removes the projects association for the includers of HyperTagMethods, and adds a project association to the models that didn't already have one, since there is only a single project for each object now. Most HyperTagMethods code is inlined into Account, since it is only user of the code now. Temporarily, other models will still include HyperTagMethods for the before_destroy hook, but eventually it will go away completely. The associations in Projects that previous used access_tag as a join table, are changed from many_to_many to one_to_many, except for Account (which still uses the join table). Project#has_resources now needs separate queries for all of the resource classes to see if there any associated objects. This causes a lot of fallout in the specs, but unfortunately that is unavoidable due the extensive use of projects.first in the specs to get the related project for the objects, as well as the extensive use of associate_with_project.
370 lines
19 KiB
Ruby
370 lines
19 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
require_relative "../../model/spec_helper"
|
|
|
|
RSpec.describe Prog::Postgres::PostgresResourceNexus do
|
|
subject(:nx) { described_class.new(Strand.new(id: "8148ebdf-66b8-8ed0-9c2f-8cfe93f5aa77")) }
|
|
|
|
let(:postgres_resource) {
|
|
instance_double(
|
|
PostgresResource,
|
|
ubid: "pgnjbsrja7ka4nk7ptcg03szg2",
|
|
location: "hetzner-fsn1",
|
|
root_cert_1: "root cert 1",
|
|
root_cert_key_1: nil,
|
|
root_cert_2: "root cert 2",
|
|
root_cert_key_2: nil,
|
|
server_cert: "server cert",
|
|
server_cert_key: nil,
|
|
parent: nil,
|
|
servers: [instance_double(
|
|
PostgresServer,
|
|
vm: instance_double(
|
|
Vm,
|
|
vcpus: 2,
|
|
vm_host: instance_double(VmHost, id: "dd9ef3e7-6d55-8371-947f-a8478b42a17d"),
|
|
private_subnets: [instance_double(PrivateSubnet, id: "627a23ee-c1fb-86d9-a261-21cc48415916")]
|
|
)
|
|
)],
|
|
representative_server: instance_double(
|
|
PostgresServer,
|
|
vm: instance_double(
|
|
Vm,
|
|
vcpus: 2,
|
|
private_subnets: [instance_double(PrivateSubnet, id: "627a23ee-c1fb-86d9-a261-21cc48415916")]
|
|
)
|
|
),
|
|
private_subnet: instance_double(PrivateSubnet, firewalls: [instance_double(Firewall)])
|
|
).as_null_object
|
|
}
|
|
|
|
before do
|
|
allow(nx).to receive(:postgres_resource).and_return(postgres_resource)
|
|
end
|
|
|
|
describe ".assemble" do
|
|
let(:customer_project) { Project.create_with_id(name: "default") }
|
|
let(:postgres_project) { Project.create_with_id(name: "default") }
|
|
|
|
it "validates input" do
|
|
expect(Config).to receive(:postgres_service_project_id).and_return(postgres_project.id).at_least(:once)
|
|
|
|
expect {
|
|
described_class.assemble(project_id: "26820e05-562a-4e25-a51b-de5f78bd00af", location: "hetzner-fsn1", name: "pg-name", target_vm_size: "standard-2", target_storage_size_gib: 128)
|
|
}.to raise_error RuntimeError, "No existing project"
|
|
|
|
expect {
|
|
described_class.assemble(project_id: customer_project.id, location: "hetzner-xxx", name: "pg-name", target_vm_size: "standard-2", target_storage_size_gib: 128)
|
|
}.to raise_error Validation::ValidationFailed, "Validation failed for following fields: provider"
|
|
|
|
expect {
|
|
described_class.assemble(project_id: customer_project.id, location: "hetzner-fsn1", name: "pg/server/name", target_vm_size: "standard-2", target_storage_size_gib: 128)
|
|
}.to raise_error Validation::ValidationFailed, "Validation failed for following fields: name"
|
|
|
|
expect {
|
|
described_class.assemble(project_id: customer_project.id, location: "hetzner-fsn1", name: "pg-name", target_vm_size: "standard-128", target_storage_size_gib: 128)
|
|
}.to raise_error Validation::ValidationFailed, "Validation failed for following fields: size"
|
|
|
|
expect {
|
|
described_class.assemble(project_id: customer_project.id, location: "hetzner-fsn1", name: "pg-name", target_vm_size: "standard-2", target_storage_size_gib: 128)
|
|
}.not_to raise_error
|
|
|
|
expect {
|
|
described_class.assemble(project_id: customer_project.id, location: "hetzner-fsn1", name: "pg-name", target_vm_size: "standard-2", target_storage_size_gib: 128, parent_id: "69c0f4cd-99c1-8ed0-acfe-7b013ce2fa0b")
|
|
}.to raise_error RuntimeError, "No existing parent"
|
|
|
|
expect {
|
|
parent = described_class.assemble(project_id: customer_project.id, location: "hetzner-fsn1", name: "pg-parent-name", target_vm_size: "standard-2", target_storage_size_gib: 128).subject
|
|
expect(PostgresResource).to receive(:[]).with(parent.id).and_return(parent)
|
|
described_class.assemble(project_id: customer_project.id, location: "hetzner-fsn1", name: "pg-name", target_vm_size: "standard-2", target_storage_size_gib: 128, parent_id: parent.id, restore_target: Time.now)
|
|
}.to raise_error Validation::ValidationFailed, "Validation failed for following fields: restore_target"
|
|
end
|
|
|
|
it "does not allow giving different version than parent for restore" do
|
|
expect(Config).to receive(:postgres_service_project_id).and_return(postgres_project.id).at_least(:once)
|
|
parent = described_class.assemble(project_id: customer_project.id, location: "hetzner-fsn1", name: "pg-parent-name", target_vm_size: "standard-2", target_storage_size_gib: 128, version: "16").subject
|
|
expect(PostgresResource).to receive(:[]).with(parent.id).and_return(parent)
|
|
expect {
|
|
described_class.assemble(project_id: customer_project.id, location: "hetzner-fsn1", name: "pg-name", target_vm_size: "standard-2", target_storage_size_gib: 128, parent_id: parent.id, version: "17", restore_target: Time.now)
|
|
}.to raise_error Validation::ValidationFailed, "Validation failed for following fields: version"
|
|
end
|
|
|
|
it "validates storage size during restore if the storage size is different from the parent" do
|
|
expect(Config).to receive(:postgres_service_project_id).and_return(postgres_project.id).at_least(:once)
|
|
parent = described_class.assemble(project_id: customer_project.id, location: "hetzner-fsn1", name: "pg-parent-name", target_vm_size: "standard-2", target_storage_size_gib: 128).subject
|
|
parent.update(target_storage_size_gib: 1024)
|
|
expect(parent.timeline).to receive(:earliest_restore_time).and_return(Time.now - 10 * 60)
|
|
expect(PostgresResource).to receive(:[]).with(parent.id).and_return(parent).at_least(:once)
|
|
expect(Prog::Postgres::PostgresServerNexus).to receive(:assemble).with(hash_including(timeline_id: parent.timeline.id, timeline_access: "fetch")).and_return(instance_double(Strand, subject: postgres_resource.representative_server))
|
|
|
|
expect {
|
|
described_class.assemble(project_id: customer_project.id, location: "hetzner-fsn1", name: "pg-name", target_vm_size: "standard-2", target_storage_size_gib: 1024, parent_id: parent.id, restore_target: Time.now)
|
|
}.not_to raise_error
|
|
|
|
expect {
|
|
described_class.assemble(project_id: customer_project.id, location: "hetzner-fsn1", name: "pg-name", target_vm_size: "standard-2", target_storage_size_gib: 2048, parent_id: parent.id, restore_target: Time.now)
|
|
}.to raise_error Validation::ValidationFailed, "Validation failed for following fields: storage_size"
|
|
end
|
|
|
|
it "passes timeline of parent resource if parent is passed" do
|
|
expect(Config).to receive(:postgres_service_project_id).and_return(postgres_project.id).at_least(:once)
|
|
|
|
parent = described_class.assemble(project_id: customer_project.id, location: "hetzner-fsn1", name: "pg-name", target_vm_size: "standard-2", target_storage_size_gib: 128).subject
|
|
restore_target = Time.now
|
|
expect(parent.timeline).to receive(:earliest_restore_time).and_return(restore_target - 10 * 60)
|
|
expect(PostgresResource).to receive(:[]).with(parent.id).and_return(parent)
|
|
expect(Prog::Postgres::PostgresServerNexus).to receive(:assemble).with(hash_including(timeline_id: parent.timeline.id, timeline_access: "fetch")).and_return(instance_double(Strand, subject: postgres_resource.representative_server))
|
|
|
|
described_class.assemble(project_id: customer_project.id, location: "hetzner-fsn1", name: "pg-name-2", target_vm_size: "standard-2", target_storage_size_gib: 128, parent_id: parent.id, restore_target: restore_target)
|
|
end
|
|
end
|
|
|
|
describe "#before_run" do
|
|
it "hops to destroy and stops billing records when needed" do
|
|
br = instance_double(BillingRecord)
|
|
expect(br).to receive(:finalize).twice
|
|
expect(postgres_resource).to receive(:active_billing_records).and_return([br, br])
|
|
expect(nx).to receive(:when_destroy_set?).and_yield
|
|
expect { nx.before_run }.to hop("destroy")
|
|
end
|
|
|
|
it "does not hop to destroy if already in the destroy state" do
|
|
expect(nx).to receive(:when_destroy_set?).and_yield
|
|
expect(nx.strand).to receive(:label).and_return("destroy")
|
|
expect { nx.before_run }.not_to hop("destroy")
|
|
end
|
|
end
|
|
|
|
describe "#start" do
|
|
it "naps if vm not ready" do
|
|
expect(postgres_resource.representative_server.vm).to receive(:strand).and_return(instance_double(Strand, label: "prep"))
|
|
expect { nx.start }.to nap(5)
|
|
end
|
|
|
|
it "registers deadline and hops" do
|
|
expect(postgres_resource.representative_server.vm).to receive(:strand).and_return(instance_double(Strand, label: "wait"))
|
|
expect(nx).to receive(:register_deadline)
|
|
expect { nx.start }.to hop("refresh_dns_record")
|
|
end
|
|
|
|
it "buds trigger_pg_current_xact_id_on_parent if it has parent" do
|
|
expect(postgres_resource.representative_server.vm).to receive(:strand).and_return(instance_double(Strand, label: "wait"))
|
|
expect(nx).to receive(:register_deadline)
|
|
expect(postgres_resource).to receive(:parent).and_return(instance_double(PostgresResource))
|
|
expect(nx).to receive(:bud).with(described_class, {}, :trigger_pg_current_xact_id_on_parent)
|
|
expect { nx.start }.to hop("refresh_dns_record")
|
|
end
|
|
end
|
|
|
|
describe "#trigger_pg_current_xact_id_on_parent" do
|
|
it "triggers pg_current_xact_id and pops" do
|
|
representative_server = instance_double(PostgresServer)
|
|
expect(representative_server).to receive(:run_query).with("SELECT pg_current_xact_id()")
|
|
expect(postgres_resource).to receive(:parent).and_return(instance_double(PostgresResource, representative_server: representative_server))
|
|
|
|
expect { nx.trigger_pg_current_xact_id_on_parent }.to exit({"msg" => "triggered pg_current_xact_id"})
|
|
end
|
|
end
|
|
|
|
describe "#refresh_dns_record" do
|
|
it "creates dns records and hops" do
|
|
expect(postgres_resource.representative_server.vm).to receive(:ephemeral_net4).and_return("1.1.1.1")
|
|
expect(postgres_resource).to receive(:hostname).and_return("pg-name.postgres.ubicloud.com.").twice
|
|
dns_zone = instance_double(DnsZone)
|
|
expect(dns_zone).to receive(:delete_record).with(record_name: "pg-name.postgres.ubicloud.com.")
|
|
expect(dns_zone).to receive(:insert_record).with(record_name: "pg-name.postgres.ubicloud.com.", type: "A", ttl: 10, data: "1.1.1.1")
|
|
expect(described_class).to receive(:dns_zone).and_return(dns_zone).twice
|
|
expect(nx).to receive(:when_initial_provisioning_set?).and_yield
|
|
expect { nx.refresh_dns_record }.to hop("initialize_certificates")
|
|
end
|
|
|
|
it "hops even if dns zone is not configured" do
|
|
expect(described_class).to receive(:dns_zone).and_return(nil).twice
|
|
expect { nx.refresh_dns_record }.to hop("wait")
|
|
end
|
|
|
|
it "hops to wait if initial_provisioning is not set" do
|
|
expect(nx).to receive(:when_initial_provisioning_set?)
|
|
expect { nx.refresh_dns_record }.to hop("wait")
|
|
end
|
|
end
|
|
|
|
describe "#initialize_certificates" do
|
|
it "hops to wait_servers after creating certificates" do
|
|
postgres_resource = PostgresResource.create_with_id(
|
|
project_id: "e3e333dd-bd9a-82d2-acc1-1c7c1ee9781f",
|
|
location: "hetzner-fsn1",
|
|
name: "pg-name",
|
|
target_vm_size: "standard-2",
|
|
target_storage_size_gib: 128,
|
|
superuser_password: "dummy-password"
|
|
)
|
|
|
|
expect(nx).to receive(:postgres_resource).and_return(postgres_resource).at_least(:once)
|
|
expect(described_class).to receive(:dns_zone).and_return("something").at_least(:once)
|
|
|
|
expect(Util).to receive(:create_root_certificate).with(duration: 60 * 60 * 24 * 365 * 5, common_name: "#{postgres_resource.ubid} Root Certificate Authority").and_call_original
|
|
expect(Util).to receive(:create_root_certificate).with(duration: 60 * 60 * 24 * 365 * 10, common_name: "#{postgres_resource.ubid} Root Certificate Authority").and_call_original
|
|
expect(nx).to receive(:create_certificate).and_call_original
|
|
|
|
expect { nx.initialize_certificates }.to hop("wait_servers")
|
|
end
|
|
|
|
it "naps if there are children" do
|
|
expect(Util).to receive(:create_root_certificate).twice
|
|
expect(nx).to receive(:create_certificate)
|
|
expect(nx).to receive(:leaf?).and_return(false)
|
|
expect { nx.initialize_certificates }.to nap(5)
|
|
end
|
|
end
|
|
|
|
describe "#refresh_certificates" do
|
|
it "rotates root certificate if root_cert_1 is close to expiration" do
|
|
expect(OpenSSL::X509::Certificate).to receive(:new).with("root cert 1").and_return(instance_double(OpenSSL::X509::Certificate, not_after: Time.now + 60 * 60 * 24 * 30 * 4))
|
|
expect(OpenSSL::X509::Certificate).to receive(:new).with("server cert").and_return(instance_double(OpenSSL::X509::Certificate, not_after: Time.now + 60 * 60 * 24 * 30 * 4))
|
|
|
|
expect(Util).to receive(:create_root_certificate).with(duration: 60 * 60 * 24 * 365 * 10, common_name: "#{postgres_resource.ubid} Root Certificate Authority")
|
|
expect(postgres_resource.servers).to all(receive(:incr_refresh_certificates))
|
|
|
|
expect { nx.refresh_certificates }.to hop("wait")
|
|
end
|
|
|
|
it "rotates server certificate if it is close to expiration" do
|
|
expect(OpenSSL::X509::Certificate).to receive(:new).with("root cert 1").and_return(instance_double(OpenSSL::X509::Certificate, not_after: Time.now + 60 * 60 * 24 * 365 * 4))
|
|
expect(OpenSSL::X509::Certificate).to receive(:new).with("server cert").and_return(instance_double(OpenSSL::X509::Certificate, not_after: Time.now + 60 * 60 * 24 * 29))
|
|
|
|
expect(nx).to receive(:create_certificate)
|
|
expect(postgres_resource.servers).to all(receive(:incr_refresh_certificates))
|
|
|
|
expect { nx.refresh_certificates }.to hop("wait")
|
|
end
|
|
|
|
it "rotates server certificate using root_cert_2 if root_cert_1 is close to expiration" do
|
|
root_cert_2 = instance_double(OpenSSL::X509::Certificate)
|
|
expect(OpenSSL::X509::Certificate).to receive(:new).with("root cert 1").twice.and_return(instance_double(OpenSSL::X509::Certificate, not_after: Time.now + 60 * 60 * 24 * 360))
|
|
expect(OpenSSL::X509::Certificate).to receive(:new).with("root cert 2").and_return(root_cert_2)
|
|
expect(OpenSSL::X509::Certificate).to receive(:new).with("server cert").and_return(instance_double(OpenSSL::X509::Certificate, not_after: Time.now + 60 * 60 * 24 * 29))
|
|
|
|
expect(Util).to receive(:create_certificate).with(hash_including(issuer_cert: root_cert_2)).and_return([instance_double(OpenSSL::X509::Certificate, to_pem: "server cert")])
|
|
expect(postgres_resource.servers).to all(receive(:incr_refresh_certificates))
|
|
|
|
expect { nx.refresh_certificates }.to hop("wait")
|
|
end
|
|
end
|
|
|
|
describe "#wait_servers" do
|
|
it "naps if server not ready" do
|
|
expect(postgres_resource.servers).to all(receive(:strand).and_return(instance_double(Strand, label: "start")))
|
|
|
|
expect { nx.wait_servers }.to nap(5)
|
|
end
|
|
|
|
it "hops if server is ready" do
|
|
expect(postgres_resource.servers).to all(receive(:strand).and_return(instance_double(Strand, label: "wait")))
|
|
expect { nx.wait_servers }.to hop("create_billing_record")
|
|
end
|
|
end
|
|
|
|
describe "#create_billing_record" do
|
|
it "creates billing record for cores and storage then hops" do
|
|
expect(postgres_resource).to receive(:required_standby_count).and_return(1)
|
|
expect(postgres_resource).to receive(:flavor).and_return("standard").at_least(:once)
|
|
|
|
expect(BillingRecord).to receive(:create_with_id).with(
|
|
project_id: postgres_resource.project_id,
|
|
resource_id: postgres_resource.id,
|
|
resource_name: postgres_resource.name,
|
|
billing_rate_id: BillingRate.from_resource_properties("PostgresVCpu", "standard", postgres_resource.location)["id"],
|
|
amount: postgres_resource.representative_server.vm.vcpus
|
|
)
|
|
|
|
expect(BillingRecord).to receive(:create_with_id).with(
|
|
project_id: postgres_resource.project_id,
|
|
resource_id: postgres_resource.id,
|
|
resource_name: postgres_resource.name,
|
|
billing_rate_id: BillingRate.from_resource_properties("PostgresStandbyVCpu", "standard", postgres_resource.location)["id"],
|
|
amount: postgres_resource.representative_server.vm.vcpus
|
|
)
|
|
|
|
expect(BillingRecord).to receive(:create_with_id).with(
|
|
project_id: postgres_resource.project_id,
|
|
resource_id: postgres_resource.id,
|
|
resource_name: postgres_resource.name,
|
|
billing_rate_id: BillingRate.from_resource_properties("PostgresStorage", "standard", postgres_resource.location)["id"],
|
|
amount: postgres_resource.target_storage_size_gib
|
|
)
|
|
|
|
expect(BillingRecord).to receive(:create_with_id).with(
|
|
project_id: postgres_resource.project_id,
|
|
resource_id: postgres_resource.id,
|
|
resource_name: postgres_resource.name,
|
|
billing_rate_id: BillingRate.from_resource_properties("PostgresStandbyStorage", "standard", postgres_resource.location)["id"],
|
|
amount: postgres_resource.target_storage_size_gib
|
|
)
|
|
|
|
expect { nx.create_billing_record }.to hop("wait")
|
|
end
|
|
end
|
|
|
|
describe "#wait" do
|
|
before do
|
|
allow(postgres_resource).to receive_messages(certificate_last_checked_at: Time.now, required_standby_count: 0)
|
|
end
|
|
|
|
it "exclude primary server's host while creating standbys" do
|
|
expect(postgres_resource).to receive(:required_standby_count).and_return(1)
|
|
expect(Prog::Postgres::PostgresServerNexus).to receive(:assemble).with(hash_including(exclude_host_ids: [postgres_resource.servers.first.vm.vm_host.id]))
|
|
expect { nx.wait }.to nap(30)
|
|
end
|
|
|
|
it "does not exclude any hosts in development" do
|
|
expect(postgres_resource).to receive(:required_standby_count).and_return(1)
|
|
expect(Config).to receive(:development?).and_return(true)
|
|
expect(Prog::Postgres::PostgresServerNexus).to receive(:assemble).with(hash_including(exclude_host_ids: []))
|
|
expect { nx.wait }.to nap(30)
|
|
end
|
|
|
|
it "hops to refresh_dns_record when refresh_dns_record is set" do
|
|
expect(nx).to receive(:when_refresh_dns_record_set?).and_yield
|
|
expect { nx.wait }.to hop("refresh_dns_record")
|
|
end
|
|
|
|
it "hops to refresh_certificates if the certificate is checked more than 1 months ago" do
|
|
expect(postgres_resource).to receive(:certificate_last_checked_at).and_return(Time.now - 60 * 60 * 24 * 30 - 1)
|
|
expect { nx.wait }.to hop("refresh_certificates")
|
|
end
|
|
|
|
it "calls set_firewall_rules method of the postgres resource when update_firewall_rules is set" do
|
|
expect(nx).to receive(:when_update_firewall_rules_set?).and_yield
|
|
expect(postgres_resource).to receive(:set_firewall_rules)
|
|
expect { nx.wait }.to nap(30)
|
|
end
|
|
end
|
|
|
|
describe "#destroy" do
|
|
it "triggers server deletion and waits until it is deleted" do
|
|
dns_zone = instance_double(DnsZone)
|
|
expect(described_class).to receive(:dns_zone).and_return(dns_zone)
|
|
|
|
expect(postgres_resource.private_subnet.firewalls).to all(receive(:destroy))
|
|
expect(postgres_resource.private_subnet).to receive(:incr_destroy)
|
|
expect(postgres_resource.servers).to all(receive(:incr_destroy))
|
|
|
|
expect(postgres_resource).to receive(:hostname)
|
|
expect(dns_zone).to receive(:delete_record)
|
|
expect(postgres_resource).to receive(:destroy)
|
|
|
|
expect { nx.destroy }.to exit({"msg" => "postgres resource is deleted"})
|
|
end
|
|
|
|
it "completes destroy even if dns zone is not configured" do
|
|
expect(described_class).to receive(:dns_zone).and_return(nil)
|
|
expect(postgres_resource.private_subnet.firewalls).to all(receive(:destroy))
|
|
expect(postgres_resource.private_subnet).to receive(:incr_destroy)
|
|
expect(postgres_resource).to receive(:servers).and_return([])
|
|
|
|
expect { nx.destroy }.to exit({"msg" => "postgres resource is deleted"})
|
|
end
|
|
end
|
|
end
|