mirror of
https://github.com/vmware-tanzu/velero.git
synced 2025-12-23 06:15:21 +00:00
Some checks failed
Run the E2E test on kind / build (push) Failing after 6m23s
Run the E2E test on kind / setup-test-matrix (push) Successful in 3s
Run the E2E test on kind / run-e2e-test (push) Has been skipped
Main CI / Build (push) Failing after 38s
Close stale issues and PRs / stale (push) Successful in 9s
Trivy Nightly Scan / Trivy nightly scan (velero, main) (push) Failing after 1m5s
Trivy Nightly Scan / Trivy nightly scan (velero-restore-helper, main) (push) Failing after 55s
* Add labels as a criteria for volume policy Signed-off-by: Shubham Pampattiwar <spampatt@redhat.com> add changelog file Signed-off-by: Shubham Pampattiwar <spampatt@redhat.com> handle err Signed-off-by: Shubham Pampattiwar <spampatt@redhat.com> use labels selector.matches Signed-off-by: Shubham Pampattiwar <spampatt@redhat.com> make update Signed-off-by: Shubham Pampattiwar <spampatt@redhat.com> remove fetching pvc from volume policy filtering Signed-off-by: Shubham Pampattiwar <spampatt@redhat.com> add more ut coverage Signed-off-by: Shubham Pampattiwar <spampatt@redhat.com> * minor updates Signed-off-by: Shubham Pampattiwar <spampatt@redhat.com> use VolumeFilterData struct in GetMatchAction func Signed-off-by: Shubham Pampattiwar <spampatt@redhat.com> update parsePVC func and add more ut Signed-off-by: Shubham Pampattiwar <spampatt@redhat.com> lint fix Signed-off-by: Shubham Pampattiwar <spampatt@redhat.com> --------- Signed-off-by: Shubham Pampattiwar <spampatt@redhat.com>
102 lines
2.7 KiB
Go
102 lines
2.7 KiB
Go
/*
|
|
Copyright The Velero Contributors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
package resourcepolicies
|
|
|
|
import (
|
|
"fmt"
|
|
"io"
|
|
|
|
"github.com/pkg/errors"
|
|
"gopkg.in/yaml.v3"
|
|
)
|
|
|
|
const currentSupportDataVersion = "v1"
|
|
|
|
type csiVolumeSource struct {
|
|
Driver string `yaml:"driver,omitempty"`
|
|
// CSI volume attributes
|
|
VolumeAttributes map[string]string `yaml:"volumeAttributes,omitempty"`
|
|
}
|
|
|
|
type nFSVolumeSource struct {
|
|
// Server is the hostname or IP address of the NFS server
|
|
Server string `yaml:"server,omitempty"`
|
|
// Path is the exported NFS share
|
|
Path string `yaml:"path,omitempty"`
|
|
}
|
|
|
|
// volumeConditions defined the current format of conditions we parsed
|
|
type volumeConditions struct {
|
|
Capacity string `yaml:"capacity,omitempty"`
|
|
StorageClass []string `yaml:"storageClass,omitempty"`
|
|
NFS *nFSVolumeSource `yaml:"nfs,omitempty"`
|
|
CSI *csiVolumeSource `yaml:"csi,omitempty"`
|
|
VolumeTypes []SupportedVolume `yaml:"volumeTypes,omitempty"`
|
|
PVCLabels map[string]string `yaml:"pvcLabels,omitempty"`
|
|
}
|
|
|
|
func (c *capacityCondition) validate() error {
|
|
// [0, a]
|
|
// [a, b]
|
|
// [b, 0]
|
|
// ==> low <= upper or upper is zero
|
|
if (c.capacity.upper.Cmp(c.capacity.lower) >= 0) ||
|
|
(!c.capacity.lower.IsZero() && c.capacity.upper.IsZero()) {
|
|
return nil
|
|
}
|
|
return errors.Errorf("illegal values for capacity %v", c.capacity)
|
|
}
|
|
|
|
func (s *storageClassCondition) validate() error {
|
|
// validate by yamlv3
|
|
return nil
|
|
}
|
|
|
|
func (c *nfsCondition) validate() error {
|
|
// validate by yamlv3
|
|
return nil
|
|
}
|
|
|
|
func (c *csiCondition) validate() error {
|
|
if c != nil && c.csi != nil && c.csi.Driver == "" && c.csi.VolumeAttributes != nil {
|
|
return errors.New("csi driver should not be empty when filtering by volume attributes")
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// decodeStruct restric validate the keys in decoded mappings to exist as fields in the struct being decoded into
|
|
func decodeStruct(r io.Reader, s any) error {
|
|
dec := yaml.NewDecoder(r)
|
|
dec.KnownFields(true)
|
|
return dec.Decode(s)
|
|
}
|
|
|
|
// validate check action format
|
|
func (a *Action) validate() error {
|
|
// validate Type
|
|
valid := false
|
|
if a.Type == Skip || a.Type == Snapshot || a.Type == FSBackup {
|
|
valid = true
|
|
}
|
|
if !valid {
|
|
return fmt.Errorf("invalid action type %s", a.Type)
|
|
}
|
|
|
|
// TODO validate parameters
|
|
return nil
|
|
}
|