Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

cleanup application profiles with missing wlid or instance id annotation (when relevancy is enabled) #182

Merged
merged 5 commits into from
Dec 24, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
5 changes: 4 additions & 1 deletion main.go
Original file line number Diff line number Diff line change
Expand Up @@ -81,7 +81,10 @@ func main() {
intervalDuration = time.Hour * 24
logger.L().Info("failed to parse cleanup interval, falling back to default", helpers.Error(err), helpers.String("interval", intervalDuration.String()))
}
cleanupHandler := cleanup.NewResourcesCleanupHandler(osFs, file.DefaultStorageRoot, pool, intervalDuration, kubernetesAPI)

relevancyEnabled := clusterData.RelevantImageVulnerabilitiesEnabled != nil && *clusterData.RelevantImageVulnerabilitiesEnabled

cleanupHandler := cleanup.NewResourcesCleanupHandler(osFs, file.DefaultStorageRoot, pool, intervalDuration, kubernetesAPI, relevancyEnabled)
go cleanupHandler.StartCleanupTask(ctx)

logger.L().Info("APIServer started")
Expand Down
118 changes: 79 additions & 39 deletions pkg/cleanup/cleanup.go
Original file line number Diff line number Diff line change
Expand Up @@ -25,49 +25,61 @@ const (

type TypeCleanupHandlerFunc func(kind, path string, metadata *metav1.ObjectMeta, resourceMaps ResourceMaps) bool

var resourceKindToHandler = map[string]TypeCleanupHandlerFunc{
// configurationscansummaries is virtual
// vulnerabilitysummaries is virtual
"applicationactivities": deleteByTemplateHashOrWlid,
"applicationprofiles": deleteByTemplateHashOrWlid,
"applicationprofilesummaries": deleteDeprecated,
"networkneighborses": deleteDeprecated,
"networkneighborhoods": deleteByTemplateHashOrWlid,
"openvulnerabilityexchangecontainers": deleteByImageId,
"sbomspdxv2p3filtereds": deleteDeprecated,
"sbomspdxv2p3filtered": deleteDeprecated,
"sbomspdxv2p3s": deleteDeprecated,
"sbomspdxv2p3": deleteDeprecated,
"sbomsyftfiltered": deleteByInstanceId,
"sbomsyft": deleteByImageId,
"sbomsummaries": deleteDeprecated,
"seccompprofiles": deleteByTemplateHashOrWlid,
"vulnerabilitymanifests": deleteByImageIdOrInstanceId,
"vulnerabilitymanifestsummaries": deleteByWlidAndContainer,
"workloadconfigurationscans": deleteByWlid,
"workloadconfigurationscansummaries": deleteByWlid,
}

type TypeDeleteFunc func(appFs afero.Fs, path string)

type ResourcesCleanupHandler struct {
appFs afero.Fs
root string // root directory to start the cleanup task
pool *sqlitemigration.Pool
interval time.Duration // runs the cleanup task every Interval
resources ResourceMaps
fetcher ResourcesFetcher
deleteFunc TypeDeleteFunc
appFs afero.Fs
root string // root directory to start the cleanup task
pool *sqlitemigration.Pool
interval time.Duration // runs the cleanup task every Interval
resources ResourceMaps
fetcher ResourcesFetcher
deleteFunc TypeDeleteFunc
resourceToKindHandler map[string][]TypeCleanupHandlerFunc
}

func NewResourcesCleanupHandler(appFs afero.Fs, root string, pool *sqlitemigration.Pool, interval time.Duration, fetcher ResourcesFetcher) *ResourcesCleanupHandler {
func initResourceToKindHandler(relevancyEnabled bool) map[string][]TypeCleanupHandlerFunc {
resourceKindToHandler := map[string][]TypeCleanupHandlerFunc{
// configurationscansummaries is virtual
// vulnerabilitysummaries is virtual
"applicationactivities": []TypeCleanupHandlerFunc{deleteByTemplateHashOrWlid},
"applicationprofiles": []TypeCleanupHandlerFunc{deleteByTemplateHashOrWlid},
"applicationprofilesummaries": []TypeCleanupHandlerFunc{deleteDeprecated},
"networkneighborses": []TypeCleanupHandlerFunc{deleteDeprecated},
"networkneighborhoods": []TypeCleanupHandlerFunc{deleteByTemplateHashOrWlid},
"openvulnerabilityexchangecontainers": []TypeCleanupHandlerFunc{deleteByImageId},
"sbomspdxv2p3filtereds": []TypeCleanupHandlerFunc{deleteDeprecated},
"sbomspdxv2p3filtered": []TypeCleanupHandlerFunc{deleteDeprecated},
"sbomspdxv2p3s": []TypeCleanupHandlerFunc{deleteDeprecated},
"sbomspdxv2p3": []TypeCleanupHandlerFunc{deleteDeprecated},
"sbomsyftfiltered": []TypeCleanupHandlerFunc{deleteByInstanceId},
"sbomsyft": []TypeCleanupHandlerFunc{deleteByImageId},
"sbomsummaries": []TypeCleanupHandlerFunc{deleteDeprecated},
"seccompprofiles": []TypeCleanupHandlerFunc{deleteByTemplateHashOrWlid},
"vulnerabilitymanifests": []TypeCleanupHandlerFunc{deleteByImageIdOrInstanceId},
"vulnerabilitymanifestsummaries": []TypeCleanupHandlerFunc{deleteByWlidAndContainer},
"workloadconfigurationscans": []TypeCleanupHandlerFunc{deleteByWlid},
"workloadconfigurationscansummaries": []TypeCleanupHandlerFunc{deleteByWlid},
}

// only if relevancy is enabled, we need to delete application profiles with missing instanceId or wlid annotations
if relevancyEnabled {
logger.L().Debug("relevancy is enabled, adding additional cleanup handlers")
resourceKindToHandler["applicationprofiles"] = append(resourceKindToHandler["applicationprofiles"], deleteMissingInstanceIdAnnotation, deleteMissingWlidAnnotation)
}
return resourceKindToHandler
}

func NewResourcesCleanupHandler(appFs afero.Fs, root string, pool *sqlitemigration.Pool, interval time.Duration, fetcher ResourcesFetcher, relevancyEnabled bool) *ResourcesCleanupHandler {

return &ResourcesCleanupHandler{
appFs: appFs,
interval: interval,
root: root,
pool: pool,
fetcher: fetcher,
deleteFunc: deleteFile,
appFs: appFs,
interval: interval,
root: root,
pool: pool,
fetcher: fetcher,
deleteFunc: deleteFile,
resourceToKindHandler: initResourceToKindHandler(relevancyEnabled),
}
}

Expand All @@ -82,7 +94,7 @@ func (h *ResourcesCleanupHandler) StartCleanupTask(ctx context.Context) {
continue
}

for resourceKind, handler := range resourceKindToHandler {
for resourceKind, handlers := range h.resourceToKindHandler {
v1beta1ApiVersionPath := filepath.Join(h.root, softwarecomposition.GroupName, resourceKind)
exists, _ := afero.DirExists(h.appFs, v1beta1ApiVersionPath)
if !exists {
Expand Down Expand Up @@ -149,7 +161,14 @@ func (h *ResourcesCleanupHandler) StartCleanupTask(ctx context.Context) {
return nil
}

toDelete := handler(resourceKind, path, metadata, h.resources)
// either run single handler, or perform OR operation on multiple handlers
var toDelete bool
if len(handlers) == 1 {
toDelete = handlers[0](resourceKind, path, metadata, h.resources)
} else {
toDelete = or(handlers, resourceKind, path, metadata, h.resources)
}

if toDelete {
logger.L().Debug("deleting", helpers.String("kind", resourceKind), helpers.String("namespace", metadata.Namespace), helpers.String("name", metadata.Name))
h.deleteFunc(h.appFs, path)
Expand All @@ -172,6 +191,15 @@ func (h *ResourcesCleanupHandler) StartCleanupTask(ctx context.Context) {
}
}

func or(funcs []TypeCleanupHandlerFunc, kind, path string, metadata *metav1.ObjectMeta, resourceMaps ResourceMaps) bool {
for _, f := range funcs {
if f(kind, path, metadata, resourceMaps) {
return true
}
}
return false
}

func deleteFile(appFs afero.Fs, path string) {
if err := appFs.Remove(path); err != nil {
logger.L().Error("failed deleting file", helpers.Error(err))
Expand Down Expand Up @@ -231,3 +259,15 @@ func deleteByTemplateHashOrWlid(_, _ string, metadata *metav1.ObjectMeta, resour
// fallback to wlid
return deleteByWlid("", "", metadata, resourceMaps)
}

// deleteMissingInstanceIdAnnotation deletes resources that have missing instanceId annotation
func deleteMissingInstanceIdAnnotation(_, _ string, metadata *metav1.ObjectMeta, resourceMaps ResourceMaps) bool {
_, ok := metadata.Annotations[helpersv1.InstanceIDMetadataKey]
return !ok
}

// deleteMissingInstanceIdAnnotation deletes resources that have missing wlid annotation
func deleteMissingWlidAnnotation(_, _ string, metadata *metav1.ObjectMeta, resourceMaps ResourceMaps) bool {
_, ok := metadata.Annotations[helpersv1.WlidMetadataKey]
return !ok
}
11 changes: 6 additions & 5 deletions pkg/cleanup/cleanup_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -50,11 +50,12 @@ func TestCleanupTask(t *testing.T) {
}

handler := &ResourcesCleanupHandler{
appFs: memFs,
pool: file.NewTestPool(t.TempDir()),
root: file.DefaultStorageRoot,
fetcher: &ResourcesFetchMock{},
deleteFunc: deleteFunc,
appFs: memFs,
pool: file.NewTestPool(t.TempDir()),
root: file.DefaultStorageRoot,
fetcher: &ResourcesFetchMock{},
deleteFunc: deleteFunc,
resourceToKindHandler: initResourceToKindHandler(false),
}
handler.StartCleanupTask(context.TODO())

Expand Down
Loading