With the exception of unit tests, all the osbuild-composer tests are shipped in a dedicated RPM: osbulid-composer-tests, and they are meant to be installed onto a pristine system and executed from there, rather than executed from a git checkout.
Test cases are found in test/cases
. They are intended to be independent of
each other and they are installed into /usr/libexec/tests/osbuild-composer/
,
with any supporting test-data in /usr/share/tests/osbuild-composer/
, and
helper binaries in /usr/libexec/osbuild-composer-test/
.
Provisioning and orchestration of test-systems, as well as configuring what distros, versions and architectures to test against is out of scope of the tests themselves. For osbuild-composer CI, schutzbot is used, which can be found in the directory by the same name.
Test binaries, regardless of their scope/type (e.g. unit, API, integration)
that are written in Golang must follow the syntax of the Go
testing package, that is implement only
TestXxx
functions with their setup/teardown when necessary in a yyy_test.go
file.
Test scenario discovery, execution and reporting will be handled by go test
.
Some test files will be executed directly by go test
during rpm build time
and/or in CI. These are usually unit tests. Scenarios which require more complex
setup, e.g. a running osbuild-composer are not intented to be executed directly
by go test
at build time. Instead they are intended to be executed as
stand-alone test binaries on a clean system which has been configured in
advance (because this is easier/more feasible). These stand-alone test binaries
are also compiled via go test -c -o
during rpm build or via make build
.
See Integration testing for more information.
When comparing for expected values in test functions you should use the testify/assert or testify/require packages. Both of them provide an impressive array of assertions with the possibility to use formatted strings as error messages. For example:
assert.Nilf(t, err, "Failed to set up temporary repository: %v", err)
If you want to fail immediately, not doing any more of the asserts use the
require
package instead of the assert
package, otherwise you'll end up with
panics and nil pointer memory problems.
Stand-alone test binaries also have the -test.failfast
option.
Code coverage is recorded in
codecov.io.
This information comes only from unit tests and for the time being
we're not concerned with collecting coverage information from integration
tests, see .github/workflows/tests.yml
.
The distributions and images are defined in a separate repository at https://github.com/osbuild/images. When making changes in that repository, you may want to test them against osbuild-composer. You can update the vendored code for osbuild/images as follows:
go mod edit -replace github.com/osbuild/images=<path to your local checkout of osbuild/images>
./tools/prepare-source.sh
Alternatively, you can also use a remote fork/branch of the code:
go mod edit -replace github.com/osbuild/images=github.com/<username>/images@<commit>
./tools/prepare-source.sh
Using the URL of the remote fork and branch will allow you to open a test PR and run the osbuild-composer integration tests against your updated code.
Make sure you modify any code in osbuild-composer to adapt to the changes in the images repository. The images API is not considered stable and changes can occur frequently. A good quick check that everything compiles and mostly runs correctly is by running the unit tests:
go test ./...
and some static checks:
go vet ./...
The changes to the go.mod
, go.sum
, and vendor/
directory should be added
in a separate commit from any other changes. The PR should not be merged with
the replace
command in place.
In the test/data/manifests
directory, sample image manifests are collected
for the various distros, architectures, configuration we support.
Each file contains a sample manifest for an image configuration and some metadata describing the request that created the manifest and all the content (packages, containers, ostree commits).
To (re)generate these test cases use the tool cmd/gen-manifests
.
go run ./cmd/gen-manifests
will generate all manifests using the default options.
Manifest generation can be restricted to only some distributions, architectures, or image types using command line flags.
The command uses the configurations in
tools/test-case-generators/format-request-map.json
and repositories defined
in tools/test-case-generators/repos.json
.
By default, the vhd images are run locally using qemu. However, when the right set of environment flags is passed to the osbuild-image-tests, it uploads the image to Azure, boots it and tries to ssh into it.
AZURE_STORAGE_ACCOUNT
AZURE_STORAGE_ACCESS_KEY
AZURE_CONTAINER_NAME
AZURE_SUBSCRIPTION_ID
V2_AZURE_CLIENT_ID
V2_AZURE_CLIENT_SECRET
AZURE_TENANT_ID
AZURE_LOCATION
AZURE_RESOURCE_GROUP
-
Firstly, go to Subscriptions in the left-side menu. Here you can find the
AZURE_SUBSCRIPTION_ID
. -
Now, you need to create a new resource group. In the left-side menu, select Resource groups. Click on Add above the resource group list. The name you choose is your
AZURE_RESOURCE_GROUP
. The region you choose is yourAZURE_LOCATION
. However, it must be in the "machine-readable form". You can list all the locations with their machine-readable names using Azure CLI:az account list-locations -o table
. E.g. the machine-readable name of US East location iseastus
.Note that terms location and region are synonyms in Azure's context.
-
Storage time! Go to Storage accounts in the left-side menu. Click on Add above the list. Use the resource group you created in the previous step. Also, the region should be the same. The name you choose is your
AZURE_STORAGE_ACCOUNT
.After the storage account is created, open it. Select Settings > Access keys. Choose one of the keys, this is your
AZURE_STORAGE_ACCESS_KEY
. Select Blob service > Containers and create a new one. Its name is yourAZURE_CONTAINER_NAME
. -
Now it’s time to create an application. This is needed because Azure uses OAuth to do authorization. In the left-side menu, choose Azure Active Directory. Go to Manage > App registrations and register a new application.
When it’s created, open it. In the overview, you can see the Application (client) ID and the Directory (tenant) ID. These are your
V2_AZURE_CLIENT_ID
andAZURE_TENANT_ID
.Now, go to Manage > Certificates & Secrets under your new application and create a new client secret. The is your
V2_AZURE_CLIENT_SECRET
. -
The last step is to give the new application access to the resource group. This step must be done by Azure administrator (@larskarlitski): Go to the Access control (IAM) section under the newly created resource group. Here, add the new application with the Developer role.
The following environment variables are required
GCP_BUCKET
GCP_REGION
GOOGLE_APPLICATION_CREDENTIALS
The following environment variables are required
OS_AUTH_URL
OS_USERNAME
OS_PASSWORD
OS_PROJECT_ID
OS_DOMAIN_NAME
The following environment variables are required
GOVC_URL
- vCenter hostnameGOVC_USERNAME
GOVC_PASSWORD
GOVC_DATACENTER
GOVC_CLUSTER
GOVC_NETWORK
GOVC_DATASTORE
GOVC_FOLDER
GOVC_INSECURE
- value of 1 will skip checking SSL certificates
WARNING: when configuring the credentials for Schutzbot we've experienced an issue where the first line in the credentials file gets lost resulting in incomplete credentials. The work-around is to define a dummy ENV variable on the first line!
Cloud cleaner is a tool designed to clean leftover cloud resources in order to reduce our costs.
Some tests deploy images to different clouds. After the tests run, these images get removed by the same tests. But if something fails during these, or a pipeline gets canceled, those images could get left behind in the cloud, wasting resources.
Cloud cleaner is being executed every hour (on the CI of it's own repo), and it cleans resources that are not tagged with persist=true
Since osbuild-composer
externally provides two types of API, there also
multiple types of integration tests available.
Types of APIs tested:
- Weldr API - the original API provided by
lorax-composer
, for whichosbuild-composer
is a drop-in replacement. This API is mostly tested through thecomposer-cli
tool, which consumes the Weldr API. - Cloud API - the brand new API provided by
osbuild-composer
, which is currently used by the Image Builder service.
This will consume the osbuild-composer Weldr API surface via the composer-cli
command line interface. Implementation is under
cmd/osbuild-composer-cli-tests/
.
The easiest way to get started with integration testing from a git checkout is:
dnf -y install rpm-build
dnf -y builddep osbuild-composer.spec
make rpm
to build the software under testdnf install rpmbuild/RPMS/x86_64/osbuild-composer-*.rpm
- this will install both osbuild-composer, its -debuginfo, -debugsource and -tests packagessystemctl start osbuild-composer
/usr/libexec/osbuild-composer-test/osbuild-composer-cli-tests
to execute the test suite.
It is best that you use a fresh system for installing and running the tests!
NOTE:
The easiest way to start osbuild-composer is via systemd because it takes care of setting up the UNIX socket for the API server.
If you are working on a pull request that adds more integration tests (without modifying osbuild-composer itself) then you can execute the test suite from the local directory without installing it:
make build
- will build everything undercmd/
./osbuild-composer-cli-tests
- will execute the freshly built integration test suite
Cloud API integration tests use the new REST API of osbuild-composer
to request
an image build for a selected footprint. If the target is a public cloud environment
then the image is uploaded to the specific cloud provider as part of the compose.
The easiest way to get started with integration testing from a git checkout is:
dnf -y install rpm-build
dnf -y builddep osbuild-composer.spec
make rpm
to build the software under testdnf install rpmbuild/RPMS/x86_64/osbuild-composer-*.rpm
- this will install both osbuild-composer, its -debuginfo, -debugsource and -tests packagessystemctl start osbuild-composer
/usr/libexec/tests/osbuild-composer/api.sh <CLOUD_PROVIDER>
to execute the integration testing with a specific cloud provider. ValidCLOUD_PROVIDER
values areaws
andgcp
.
It is best that you use a fresh system for installing and running the tests!
The Cloud API integration testing usually consists from:
- Test existing Cloud API endpoints and their responses.
- Request a new compose.
- Test uploading of the image to specific cloud provider and sharing of the image with specified accounts.
- Optionally there are additional tests performed on the image, such as:
- Create a VM instance with the cloud provider and uploaded image.
- Run various checks on the VM instance.
- The last step is cleanup of resources uploaded and created with the cloud provider as part of the integration test.
The following environment variables are required
AWS_REGION
AWS_BUCKET
V2_AWS_ACCESS_KEY_ID
V2_AWS_SECRET_ACCESS_KEY
AWS_API_TEST_SHARE_ACCOUNT
To execute the AWS integration tests, complete steps from Cloud API integration testing
section and run /usr/libexec/tests/osbuild-composer/api.sh aws
.
The following environment variables are required:
GOOGLE_APPLICATION_CREDENTIALS
- path to Google authentication credentials file.GCP_REGION
GCP_BUCKET
GCP_API_TEST_SHARE_ACCOUNT
To execute the GCP integration tests, complete steps from Cloud API integration testing
section and run /usr/libexec/tests/osbuild-composer/api.sh gcp
.
To make it easier for us to test & verify downstream builds we are going to move most of the work upstream and apply the following rules:
- Preferably the 1st commit of any PR will contain a bug reproducer. First push a draft PR only containing that commit which will cause CI to FAIL.
- QE will review and approve the reproducer (can happen in parallel with next item)
- Subsequent commits provide bug fixes without modifying the reproducer and CI reports PASS. Push these on top of the approved reproducer.
- QE has done final review and approved the PR; RHBZ status is set to
MODIFIED + Verified=Tested
- Devel has done final review and approved the PR
NOTES for devel:
Pull requests related to new functionality may add their automated tests together or after commit(s) adding said functionality!
All PRs containing commits referencing rhbz#
number and/or
all PRs against a dedicated rhel-
branch should follow the above rules!
NOTE for QE:
CI results are also reported against each commit and these can be used to review the test automation state during a PR lifecycle.
qa_ack+
on RHBZ will be granted after a reproducer has been
identified and with the mutual understanding that PRs related to
that RHBZ must include an automated test reproducer. A good example is
BZ #1951192 while
a bad example is
BZ #1942029 b/c
is is missing lots of details!
- @atodorov - QE lead; osbuild, osbuild-composer, weldr-client, composer-cli, image-builder, image-builder-frontend, bug testing & verification, anything else
- @jrusz - testing across the board; backup for @atodorov; osbuild, osbuild-composer, weldr-client, composer-cli, image-builder, image-builder-frontend, bug testing & verification, anything else
- @henrywang - everything related to testing RHEL for Edge images
- @yih-redhat - everything related to testing RHEL for Edge images; backup for @henrywang
In Gitlab CI we're using rules to define which stages and jobs are ran when. For running the test suite on internal RHEL builds we're using schedules that run the test suite on latest nightly using the rpms that are shipped with it.
We're using a link to latest nightly build. It's possible to manually override it with COMPOSE_URL
to use a different build instead.
This variable can be changed in the pipeline schedule settings. It is advised to create
a new schedule if you want to try something or change the value, set it as inactive and then
just trigger it manually.