mirror of
https://github.com/vmware-tanzu/velero.git
synced 2025-12-23 06:15:21 +00:00
Refactors the framework package to implement the plugin versioning changes needed for BIA v1 and overall package refactoring to support plugin versions in different packages. This should be all that's needed to move on to v2 for BackupItemAction. The remaining plugin types still need similar refactoring to what's being done here for BIA before attempting a v2 implementation. Signed-off-by: Scott Seago <sseago@redhat.com>
143 lines
4.8 KiB
Go
143 lines
4.8 KiB
Go
/*
|
|
Copyright 2020 the Velero contributors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package delete
|
|
|
|
import (
|
|
"io"
|
|
|
|
"github.com/vmware-tanzu/velero/pkg/plugin/framework"
|
|
|
|
"github.com/pkg/errors"
|
|
"github.com/sirupsen/logrus"
|
|
"k8s.io/apimachinery/pkg/labels"
|
|
"k8s.io/apimachinery/pkg/runtime/schema"
|
|
"k8s.io/apimachinery/pkg/util/sets"
|
|
|
|
velerov1api "github.com/vmware-tanzu/velero/pkg/apis/velero/v1"
|
|
"github.com/vmware-tanzu/velero/pkg/archive"
|
|
"github.com/vmware-tanzu/velero/pkg/discovery"
|
|
"github.com/vmware-tanzu/velero/pkg/plugin/velero"
|
|
"github.com/vmware-tanzu/velero/pkg/util/filesystem"
|
|
)
|
|
|
|
// Context provides the necessary environment to run DeleteItemAction plugins
|
|
type Context struct {
|
|
Backup *velerov1api.Backup
|
|
BackupReader io.Reader
|
|
Actions []velero.DeleteItemAction
|
|
Filesystem filesystem.Interface
|
|
Log logrus.FieldLogger
|
|
DiscoveryHelper discovery.Helper
|
|
resolvedActions []framework.DeleteItemResolvedAction
|
|
}
|
|
|
|
func InvokeDeleteActions(ctx *Context) error {
|
|
var err error
|
|
resolver := framework.NewDeleteItemActionResolver(ctx.Actions)
|
|
ctx.resolvedActions, err = resolver.ResolveActions(ctx.DiscoveryHelper, ctx.Log)
|
|
// No actions installed and no error means we don't have to continue;
|
|
// just do the backup deletion without worrying about plugins.
|
|
if len(ctx.resolvedActions) == 0 && err == nil {
|
|
ctx.Log.Debug("No delete item actions present, proceeding with rest of backup deletion process")
|
|
return nil
|
|
} else if err != nil {
|
|
return errors.Wrapf(err, "error resolving actions")
|
|
}
|
|
|
|
// get items out of backup tarball into a temp directory
|
|
dir, err := archive.NewExtractor(ctx.Log, ctx.Filesystem).UnzipAndExtractBackup(ctx.BackupReader)
|
|
if err != nil {
|
|
return errors.Wrapf(err, "error extracting backup")
|
|
}
|
|
defer ctx.Filesystem.RemoveAll(dir)
|
|
ctx.Log.Debugf("Downloaded and extracted the backup file to: %s", dir)
|
|
|
|
backupResources, err := archive.NewParser(ctx.Log, ctx.Filesystem).Parse(dir)
|
|
if existErr := errors.Is(err, archive.ErrNotExist); existErr {
|
|
ctx.Log.Debug("ignore invoking delete item actions: ", err)
|
|
return nil
|
|
} else if err != nil {
|
|
return errors.Wrapf(err, "error parsing backup %q", dir)
|
|
}
|
|
processdResources := sets.NewString()
|
|
|
|
for resource := range backupResources {
|
|
groupResource := schema.ParseGroupResource(resource)
|
|
|
|
// We've already seen this group/resource, so don't process it again.
|
|
if processdResources.Has(groupResource.String()) {
|
|
continue
|
|
}
|
|
|
|
// Get a list of all items that exist for this resource
|
|
resourceList := backupResources[groupResource.String()]
|
|
if resourceList == nil {
|
|
continue
|
|
}
|
|
|
|
// Iterate over all items, grouped by namespace.
|
|
for namespace, items := range resourceList.ItemsByNamespace {
|
|
nsLog := ctx.Log.WithField("namespace", namespace)
|
|
nsLog.Info("Starting to check for items in namespace")
|
|
|
|
// Filter applicable actions based on namespace only once per namespace.
|
|
actions := ctx.getApplicableActions(groupResource, namespace)
|
|
|
|
// Process individual items from the backup
|
|
for _, item := range items {
|
|
itemPath := archive.GetItemFilePath(dir, resource, namespace, item)
|
|
|
|
// obj is the Unstructured item from the backup
|
|
obj, err := archive.Unmarshal(ctx.Filesystem, itemPath)
|
|
if err != nil {
|
|
return errors.Wrapf(err, "Could not unmarshal item: %v", item)
|
|
}
|
|
|
|
itemLog := nsLog.WithField("item", obj.GetName())
|
|
itemLog.Infof("invoking DeleteItemAction plugins")
|
|
|
|
for _, action := range actions {
|
|
if !action.Selector.Matches(labels.Set(obj.GetLabels())) {
|
|
continue
|
|
}
|
|
err = action.DeleteItemAction.Execute(&velero.DeleteItemActionExecuteInput{
|
|
Item: obj,
|
|
Backup: ctx.Backup,
|
|
})
|
|
// Since we want to keep looping even on errors, log them instead of just returning.
|
|
if err != nil {
|
|
itemLog.WithError(err).Error("plugin error")
|
|
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// getApplicableActions takes resolved DeleteItemActions and filters them for a given group/resource and namespace.
|
|
func (ctx *Context) getApplicableActions(groupResource schema.GroupResource, namespace string) []framework.DeleteItemResolvedAction {
|
|
var actions []framework.DeleteItemResolvedAction
|
|
for _, action := range ctx.resolvedActions {
|
|
if action.ShouldUse(groupResource, namespace, nil, ctx.Log) {
|
|
actions = append(actions, action)
|
|
}
|
|
}
|
|
return actions
|
|
}
|