Class: ProjectDestroyWorker
- Inherits:
-
Object
- Object
- ProjectDestroyWorker
- Includes:
- ApplicationWorker, ExceptionBacktrace
- Defined in:
- app/workers/project_destroy_worker.rb
Constant Summary
Constants included from ApplicationWorker
ApplicationWorker::LOGGING_EXTRA_KEY, ApplicationWorker::SAFE_PUSH_BULK_LIMIT
Constants included from Gitlab::Loggable
Constants included from WorkerAttributes
WorkerAttributes::DEFAULT_DATA_CONSISTENCY, WorkerAttributes::DEFAULT_DATA_CONSISTENCY_PER_DB, WorkerAttributes::DEFAULT_DEFER_DELAY, WorkerAttributes::LOAD_BALANCED_DATA_CONSISTENCIES, WorkerAttributes::NAMESPACE_WEIGHTS, WorkerAttributes::VALID_DATA_CONSISTENCIES, WorkerAttributes::VALID_RESOURCE_BOUNDARIES, WorkerAttributes::VALID_URGENCIES
Instance Method Summary collapse
Methods included from Gitlab::Loggable
Methods included from Gitlab::SidekiqVersioning::Worker
Methods included from WorkerContext
Instance Method Details
#perform(project_id, user_id, params) ⇒ Object
16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 |
# File 'app/workers/project_destroy_worker.rb', line 16 def perform(project_id, user_id, params) params = params.symbolize_keys Gitlab::QueryLimiting.disable!('https://gitlab.com/gitlab-org/gitlab/-/issues/333366') project = Project.find(project_id) user = User.find(user_id) # AdjournedProjectDeletionWorker will destroy projects days after they are scheduled for deletion. # If admin_mode is enabled, it will potentially halt group and project deletion. # The admin_mode flag allows bypassing this check (but no other policy checks), since the admin_mode # check should have been run when the job was scheduled, not whenever Sidekiq gets around to it. Gitlab::Auth::CurrentUserMode.optionally_run_in_admin_mode(user) do ::Projects::DestroyService.new(project, user, params).execute end rescue ActiveRecord::RecordNotFound => error logger.error("Failed to delete project (#{project_id}): #{error.}") end |