Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: conditionally write data to file instead of keeping it in memory #5497

Merged
merged 1 commit into from
Oct 3, 2024

Conversation

j-luong
Copy link
Contributor

@j-luong j-luong commented Sep 17, 2024

Pull Request Submission

Risk assessment is low as this feature is only enabled for GAF workflows larger than 512MB by default and can be manually disabled

Please check the boxes once done.

The pull request must:

  • Reviewer Documentation
    • follow CONTRIBUTING rules
    • be accompanied by a detailed description of the changes
    • contain a risk assessment of the change (Low | Medium | High) with regards to breaking existing functionality. A change e.g. of an underlying language plugin can completely break the functionality for that language, but appearing as only a version change in the dependencies.
    • highlight breaking API if applicable
    • contain a link to the automatic tests that cover the updated functionality.
    • contain testing instructions in case that the reviewer wants to manual verify as well, to add to the manual testing done by the author.
    • link to the link to the PR for the User-facing documentation
  • User facing Documentation
    • update any relevant documentation in gitbook by submitting a gitbook PR, and including the PR link here
    • ensure that the message of the final single commit is descriptive and prefixed with either feat: or fix: , others might be used in rare occasions as well, if there is no need to document the changes in the release notes. The changes or fixes should be described in detail in the commit message for the changelog & release notes.
  • Testing
    • Changes, removals and additions to functionality must be covered by acceptance / integration tests or smoke tests - either already existing ones, or new ones, created by the author of the PR.

Pull Request Review

All pull requests must undergo a thorough review process before being merged.
The review process of the code PR should include code review, testing, and any necessary feedback or revisions.
Pull request reviews of functionality developed in other teams only review the given documentation and test reports.

Manual testing will not be performed by the reviewing team, and is the responsibility of the author of the PR.

For Node projects: It’s important to make sure changes in package.json are also affecting package-lock.json correctly.

If a dependency is not necessary, don’t add it.

When adding a new package as a dependency, make sure that the change is absolutely necessary. We would like to refrain from adding new dependencies when possible.
Documentation PRs in gitbook are reviewed by Snyk's content team. They will also advise on the best phrasing and structuring if needed.

Pull Request Approval

Once a pull request has been reviewed and all necessary revisions have been made, it is approved for merging into
the main codebase. The merging of the code PR is performed by the code owners, the merging of the documentation PR
by our content writers.

What does this PR do?

This PR adds a new capability to set a threshold in bytes which determines whether to keep GAF workflow data items in memory, or write to disk.

It also fixes a bug that arises from this where the analytics are being sent after cleaning up temp directories.

Where should the reviewer start?

See related GAF changes.

2 new parameters are considered when conditionally writing data to disk:

  • SNYK_TMP_PATH - determines the temp path to write data to, will use the OS specific cache dir if not defined
  • INTERNAL_IN_MEMORY_THRESHOLD_BYTES - threshold in bytes to determine whether to write data to disk or keep in memory. Defaults to 512MB if not defined; a value of -1 disables this feature.

How should this be manually tested?

  1. Checkout this branch
  2. run make clean build
  3. run SNYK_LOG_LEVEL=trace ./binary-releases/snyk-<ARCH> code test -d
    a. include the env vars SNYK_TMP_DIR_PATH and INTERNAL_IN_MEMORY_THRESHOLD_BYTES as appropriate for each test case

Test case 1 - Set SNYK_TMP_DIR_PATH, do not set INTERNAL_IN_MEMORY_THRESHOLD_BYTES

Expected behaviour

native code workflow passes the configuration when creating new data so should take into account the SNYK_TMP_DIR_PATH and use the default 512MB memory threshold

all other workflows do not pass the configuration when creating new data so should have this feature disabled. i.e. they should all read from memory

Validation

Look for the log messages:
a. internal.cleanup:4 - Deleted temporary directory: <SNYK_TMP_DIR_PATH>
b. code.test:1 - payload is []byte, comparing payload size (<SIZE> bytes) to threshold (536870912 bytes)
c. output:2 - memory threshold feature disabled, keeping payload in memory

Test case 2 - Set INTERNAL_IN_MEMORY_THRESHOLD_BYTES, do not set SNYK_TMP_DIR_PATH

Expected behaviour

native code workflow uses the INTERNAL_IN_MEMORY_THRESHOLD_BYTES value and uses the default SNYK_TMP_DIR_PATH value

all other workflows should have this feature disabled. i.e. they should all read from memory

Validation

Look for the log messages:
a. internal.cleanup:4 - Deleted temporary directory: <OS_SPECIFIC_CACHE_DIR>
b. code.test:1 - payload is []byte, comparing payload size (<SIZE> bytes) to threshold (<INTERNAL_IN_MEMORY_THRESHOLD_BYTES> bytes)
c. output:2 - memory threshold feature disabled, keeping payload in memory

Test case 3 - Set SNYK_TMP_DIR_PATH and INTERNAL_IN_MEMORY_THRESHOLD_BYTES

Expected behaviour

native code workflow passes the configuration when creating new data so should take into account both SNYK_TMP_DIR_PATH and INTERNAL_IN_MEMORY_THRESHOLD_BYTES

all other workflows should have this feature disabled. i.e. they should all read from memory

Validation

Look for the log messages:
a. internal.cleanup:4 - Deleted temporary directory: <SNYK_TMP_DIR_PATH>
b. code.test:1 - payload is []byte, comparing payload size (<SIZE> bytes) to threshold (<INTERNAL_IN_MEMORY_THRESHOLD_BYTES> bytes)
c. output:2 - memory threshold feature disabled, keeping payload in memory

Test case 4 - do not set SNYK_TMP_DIR_PATH or INTERNAL_IN_MEMORY_THRESHOLD_BYTES

Expected behaviour

native code workflow passes the configuration when creating new data so should use the default SNYK_TMP_DIR_PATH and INTERNAL_IN_MEMORY_THRESHOLD

all other workflows should have this feature disabled. i.e. they should all read from memory

Validation

Look for the log messages:
a. internal.cleanup:4 - Deleted temporary directory: <OS_SPECIFIC_CACHE_DIR>
b. code.test:1 - payload is []byte, comparing payload size (<SIZE> bytes) to threshold (536870912 bytes)
c. output:2 - memory threshold feature disabled, keeping payload in memory

Test case 5 - Set INTERNAL_IN_MEMORY_THRESHOLD_BYTES=-1

Expected behaviour

all workflows should have feature disabled. i.e. they should all read from memory

Validation

Look for the log messages:
a. internal.cleanup:4 - Deleted temporary directory: <OS_SPECIFIC_CACHE_DIR>
b. code.test:1 - memory threshold feature disabled, keeping payload in memory
c. output:2 - memory threshold feature disabled, keeping payload in memory

Any background context you want to provide?

What are the relevant tickets?

CLI-508

Screenshots

Additional questions

@j-luong j-luong force-pushed the feat/CLI-508_writeDataToFile branch 3 times, most recently from 1343688 to 5a848b3 Compare September 18, 2024 09:16
@j-luong j-luong marked this pull request as ready for review September 18, 2024 09:16
@j-luong j-luong requested a review from a team as a code owner September 18, 2024 09:16
@j-luong j-luong force-pushed the feat/CLI-508_writeDataToFile branch 8 times, most recently from bf80858 to 3adddbf Compare September 25, 2024 12:35
@j-luong j-luong force-pushed the feat/CLI-508_writeDataToFile branch 4 times, most recently from eb28715 to cac14d7 Compare October 2, 2024 12:34
@j-luong j-luong force-pushed the feat/CLI-508_writeDataToFile branch 2 times, most recently from 573a627 to 0cb9007 Compare October 2, 2024 13:46
@thisislawatts thisislawatts force-pushed the feat/CLI-508_writeDataToFile branch from 0cb9007 to eaa2adb Compare October 2, 2024 21:14
@j-luong j-luong force-pushed the feat/CLI-508_writeDataToFile branch from eaa2adb to 7f11919 Compare October 3, 2024 08:59
@j-luong j-luong enabled auto-merge October 3, 2024 09:38
@j-luong j-luong merged commit ede28ab into main Oct 3, 2024
9 checks passed
@j-luong j-luong deleted the feat/CLI-508_writeDataToFile branch October 3, 2024 10:08
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants