Requires Go version 1.20.x (1.20.11 or higher) - download for your development environment here.
This repository uses Go modules.
Refer to this guide for detailed instructions on running the e2e tests in a local CodeReady Containers cluster.
The e2e tests are executed against host and member operators running in OpenShift. The operators are built from the host-operator and member-operator repositories.
Since the changes in the e2e repo sometimes require changes in some of the operator repositories at the same time, the logic that executes the e2e tests supports a feature of pairing the e2e PR with one other PR based on branch names. Before the e2e tests are executed in openshift-ci, the logic automatically tries to pair a PR opened for this (toolchain-e2e) repository with a branch of the same name that potentially could exist in any of the developer’s fork of the operator repositories.
For example, if a developer with GH account cooljohn
opens a PR (for toolchain-e2e repo) from a branch fix-reconcile
, then the logic checks if there is a branch fix-reconcile
also in the cooljohn/host-operator
and cooljohn/member-operator
forks.
Let’s say that cooljohn/host-operator
contains such a branch but cooljohn/member-operator
doesn’t, then the logic:
-
clones latest changes of both repos codeready-toolchain/host-operator and codeready-toolchain/member-operator
-
fetches the
fix-reconcile
branch fromcooljohn/host-operator
fork -
merges
master
branch with the changes fromfix-reconcile
branch inside ofhost-operator
repo -
builds images from the merge branch of
host-operator
repo and frommaster
branch ofmember-operator
repo & deploys them to OpenShift -
runs e2e tests taken from the opened PR
It would work analogically also for the case when none of the repositories contain the branch name. However, if both repositories contain the branch name then it will result in an error. This is by design because OLM does not ensure that both the host-operator and member-operator will be updated at the same time in production. Prohibiting PR pairing with more than one repo helps ensure they do not depend on one another and can be updated separately.
If you still don’t know what to do with e2e tests in some use-cases, go to What To Do section where all use-cases are covered.
Note
|
You can also pair a toolchain-e2e PR with a PR from the https://github.com/kubesaw/ksctl repository, but this is one-directional only (e2e tests are not yet executed in the ksctl repo). To rely on a locally installed version of the ksctl binary, set USE_INSTALLED_KSCTL=true . If you want to build and use the ksctl binary from your local kubesaw/ksctl repository, set the KSCTL_REPO_PATH variable to point to your kubesaw/ksctl folder.
|
Prerequisites:
-
Install the required tools.
-
Configure your quay account for dev deployment.
See the procedure to install the Dev Sandbox in a development environment here.
-
Configure your quay account for dev deployment Although the e2e tests are in the separated repository than the actual operators are, it’s still possible to run them against the current code that is at HEAD of the operator repositories. There are multiple Makefile targets that will execute the e2e tests, they just differ in where the operators' code is taken from:
-
make test-e2e
- this target clones the latest changes from both repos host-operator and member-operator, builds images from the master, deploys to OpenShift and runs e2e tests against them. -
make test-e2e-local
- this target doesn’t clone anything, but it builds operator images from the directories../host-operator
and../member-operator
. These images deploys to OpenShift and runs e2e tests against them. -
make test-e2e-member-local
- this target clones only the host-operator repo and builds an image from it. For member-operator, it builds the image from../member-operator
directory. These images deploys to OpenShift and runs e2e tests against them. -
make test-e2e-host-local
- this target clones only the member-operator repo and builds an image from it. For host-operator, it builds the image from../host-operator
directory. These images deploys to OpenShift and runs e2e tests against them.
-
The e2e tests will take care of creating all needed namespaces with random names (or see below for enforcing some specific namespace names). It will also create all required CRDs, role and role bindings for the service accounts, build the Docker images for both operators and push them to the OpenShift container registry. Finally, it will deploy the operators and run the tests using the operator-sdk.
Note
|
you can override the default namespace names where the end-to-end tests are going to be executed - eg.: make test-e2e HOST_NS=my-host MEMBER_NS=my-member file.
|
Note
|
you can disable SSL/TLS certificate verification in tests setting the DISABLE_KUBE_CLIENT_TLS_VERIFY variable to true - eg.: make test-e2e DISABLE_KUBE_CLIENT_TLS_VERIFY=true . This flag helps when you test in clusters using Self-Signed Certificates.
|
Note
|
you can specify a regular expression to selectively run particular test cases by setting the TESTS_RUN_FILTER_REGEXP variable. eg.: make test-e2e TESTS_RUN_FILTER_REGEXP="TestSetupMigration" . For more information see the go test -run documentation.
|
Note
|
you should not override SECOND_MEMBER_MODE in test-e2e, since the e2e tests require a second member operator.
|
In order to run/debug tests from your IDE you’ll need to export some required env variables, those will be used by the test framework to interact with the operator namespaces and the other toolchain resources in you cluster. Following snippet of code should be TEMPORARILY added at the top of the test you want to run/debug from your IDE:
os.Setenv("MEMBER_NS","toolchain-member-18161051")
// `SECOND_MEMBER_MODE` should be set to true, since the e2e tests require a second member operator.
os.Setenv("SECOND_MEMBER_MODE","true")
os.Setenv("MEMBER_NS_2","toolchain-member2-18161051")
os.Setenv("HOST_NS","toolchain-host-18161051")
os.Setenv("REGISTRATION_SERVICE_NS","toolchain-host-18161051")
os.Setenv("KUBECONFIG", "~/aws-cluster-test/my-devsandbox/auth/kubeconfig")
example of Test case code containing the debugging env variables:
package parallel
import (
"context"
"os"
"testing"
)
func TestCreateSpaceRequest(t *testing.T) {
os.Setenv("MEMBER_NS","toolchain-member-18161051")
os.Setenv("SECOND_MEMBER_MODE","true")
os.Setenv("MEMBER_NS_2","toolchain-member2-18161051")
os.Setenv("HOST_NS","toolchain-host-18161051")
os.Setenv("REGISTRATION_SERVICE_NS","toolchain-host-18161051")
os.Setenv("KUBECONFIG", "~/aws-cluster-test/my-devsandbox/auth/kubeconfig")
// some more code here ...
t.Run("create space request", func(t *testing.T) {
// test case implementation here ...
....
Note
|
replace the values with the ones from your dev/test environment and REMEMBER TO REMOVE THE SNIPPET BEFORE COMMITTING THE CODE OR OPENING A PR IN GH :) |
If you are still confused by the different e2e/operator location, execution and branch pairing, see the following cases and needed steps:
-
Working locally:
-
Need to verify changes in e2e tests against the latest version of both operators:
-
run
make test-e2e
-
-
You are working in both repos
toolchain-e2e
andmember-operator
, so you need to run e2e tests against your current code located in../member-operator
directory:-
run
make test-e2e-member-local
-
-
You are working in both repos
toolchain-e2e
andhost-operator
, so you need to run e2e tests against your current code located in../host-operator
directory:-
run
make test-e2e-host-local
-
-
You are working in all three repos
toolchain-e2e
,host-operator
andmember-operator
, so you need to run e2e tests against your current code located in both directories../host-operator
and../member-operator
:-
run
make test-e2e-local
-
-
-
Creating PRs:
-
Your PR doesn’t need any changes in host-operator repo nor member-operator repo:
-
1. check the name of a branch you are going to create a PR for
-
2. make sure that your forks of both repos (host-operator and member-operator) don’t contain a branch with the same name
-
3. create a PR
-
-
Your PR requires changes in host-operator repo but not in member-operator repo:
-
1. check the name of a branch you are going to create a PR for
-
2. create a branch with the same name within your fork of host-operator repo and put all necessary changes there
-
3. make sure that your fork of member-operator repo doesn’t contain a branch with the same name
-
4. push all changes into both forks of the repositories toolchain-e2e and host-operator
-
5. create a PR for toolchain-e2e
-
6. create a PR for host-operator
-
-
Your PR requires changes in member-operator repo but not in host-operator repo:
-
See the previous case and just swap member-operator and host-operator.
-
-
Your PR requires changes in both repos host-operator and member-operator:
-
This is prohibited and will result in an error like
ERROR WHILE TRYING TO PAIR PRs
in the CI build. See the reasoning behind this in the End-to-End Tests section.
-
-
All e2e resources (host operator, member operator, registration-service, CRDs, etc) can be deployed without running tests:
-
make dev-deploy-e2e-local
- deploys the same resources asmake test-e2e-local
in dev environment but doesn’t run tests. -
make dev-deploy-e2e
- deploys the same resources asmake test-e2e
in dev environment but doesn’t run tests. -
make deploy-toolchain-resources-e2e
- deploys the same resources asmake test-e2e
but doesn’t run tests.
Note
|
By default these targets deploy resources to toolchain-host-operator and toolchain-member-operator namespaces.
|
Note
|
If running in CodeReady Containers eval $(crc oc-env) is required.
|
Note
|
By default, SECOND_MEMBER_MODE is set to false.
|
-
Get a cluster and setup the following env vars
-
export QUAY_NAMESPACE=<your-quay-namespace>
-
export KUBECONFIG=<location-to-kubeconfig>
-
-
Run
docker login quay.io
-
Create IdP
-
If you need to change any of the default configuration, modify the ToolchainConfig in deploy/host-operator/dev/toolchainconfig.yaml
-
To set working notification/verification secrets, modify them in deploy/host-operator/dev/secrets.yaml
-
Run
make dev-deploy-e2e-local
-
Go to the registration-service link and sign in
-
Click on the
Get Started With CodeReady Toolchain
button -
Approve your usersignup found on the
<username>-host-operator
namespace