A comprehensive test framework used for Service Delivery to test all aspects of Managed OpenShift Clusters (OpenShift Dedicated). The data generated by the different test coverage is used to inform product releases and decisions.
OSDe2e key features are:
When osde2e is invoked, the standard workflow is followed:
Prior to running osde2e, make sure you meet the minimal prerequisites defined below:
OCM_TOKEN
for later usageOSDe2e can be invoked by one of two ways. Refer to each section below to learn how to run it.
Running from source requires you to build the osde2e binary. Follow the steps below to do this:
git clone https://github.com/openshift/osde2e.git
cd osde2e
go mod tidy
make build
On completion of the make build
target, the generated binary will reside in the
directory ./out/
. Where you can then invoke osde2e ./out/osde2e --help
.
Running from a container image using a container engine (e.g. docker, podman). You can either build the image locally or consume the public image available on quay.io.
export CONTAINER_ENGINE=<docker|podman>
# Build Image
make build-image
$CONTAINER_ENGINE run quay.io/redhat-services-prod/osde2e-cicada-tenant/osde2e:latest <args>
# Pull Image
$CONTAINER_ENGINE pull quay.io/redhat-services-prod/osde2e-cicada-tenant/osde2e:latest
$CONTAINER_ENGINE run quay.io/redhat-services-prod/osde2e-cicada-tenant/osde2e:latest <args>
OSDe2e provides multiple ways for you to provide input to tailor what test workflows you wish to validate. It provides four ways for you to provide input (order is lowest to highest precedence):
It is highly recommended to leave sensitive settings as environment variables (e.g. OCM_TOKEN
).
This way the chance of these settings defined in a custom config file are not checked into
source control.
The configs package provides pre-canned default configs available for you to use. These config files are named based on what action they are performing. Within the config file can contain multiple settings to tailor osde2e.
Example config stage:
This default config is telling osde2e to use the stage OCM environment.
ocm:
env: stage
You can provide N+1 pre-canned configs to osde2e. Example below will deploy a OSD cluster within the OCM stage environment.
./out/osde2e test --configs aws,stage
The composable configs consist of a number of small YAML files that can all be loaded together.
Rather than using the built in configs, you can also elect to build your own custom YAML file
and provide that using the --custom-config
CLI option.
osde2e test --custom-config ./osde2e.yaml
The custom config below is a basic example for deploying a ROSA STS cluster and running all of the OSD operators tests that do not have the informing label associated to them.
dryRun: false
provider: rosa
cloudProvider:
providerId: aws
region: us-east-1
rosa:
env: stage
STS: true
cluster:
name: osde2e
tests:
ginkgoLabelFilter: Operators && !Informing
You can use both pre-canned default configs and your own custom configs:
./out/osde2e test --configs aws --custom-config ./osde2e.yaml
Any config option can be passed in using environment variables. Please refer to the config package for exact environment variable names.
Below is an example to spin up a OSD cluster and test it:
OCM_TOKEN=<ocm-token> \
OSD_ENV=prod \
CLUSTER_NAME=my-cluster \
CLUSTER_VERSION=4.12.0 \
osde2e test
These also can be combined with pre-canned default configs and custom configs:
OCM_TOKEN=<ocm-token> \
CLUSTER_VERSION=4.12.0 \
osde2e test --configs prod,e2e-suite
OCM_TOKEN=<ocm-token> \
CLUSTER_VERSION=4.12.0 \
osde2e test --configs prod,e2e-suite
A list of commonly used environment variables are included in Config variables.
Some configuration settings are also exposed as command-line options.
A full list can be displayed by providing --help
after the command.
Below is an example of using options for the test
command:
./out/osde2e test --cluster-id <cluster-id> \
--provider stage \
--skip-health-check \
--focus-tests "RBAC Operator"
Another example below is you can skip cluster health check, must gather as follows.
POLLING_TIMEOUT=1 \
./out/osde2e test --cluster-id=<cluster-id> \
--configs stage \
--skip-must-gather \
--skip-health-check \
--focus-tests="rh-api-lb-test"
A list of commonly used CLI flags are included in Config variables.
To see more examples of configuring input for osde2e, refer to the prowgen jobs in the OpenShift release repository owned by the team. These will be always up to date with the latest changes osde2e has to offer.
OSDe2e provides native support for deploying the following cluster types:
You can have osde2e deploy the cluster if a cluster ID is not provided or you can leverage an existing cluster by giving the cluster ID as input at runtime.
You can also provide it a kubeconfig file and osde2e can attempt to target that cluster.
export TEST_KUBECONFIG=<kubeconfig-file>
./out/osde2e test <args>
It may be possible to test against a non Managed OpenShift cluster (a traditional OpenShift Container Platform cluster). Though this will require you to alter the input settings as non managed clusters will not have certain items applied to them like a Managed cluster would (e.g. OSD operators, health checks, etc).
OSDe2e currently holds all core and operator specific tests and are maintained by the CICD team. Test types range from core OSD verification, OSD operators to scale/conformance.
Currently in flight: OSD operator tests will no longer reside in osde2e repository and live directly alongside the operator source code in its repository
OSDe2e supports a couple different ways you can select which tests you would like to run. Below presents the commonly used methods for this:
E2E
label applied.# Command line option
osde2e test --label-filter E2E
# Passed in using a custom config file
tests:
ginkgoLabelFilter: E2E
# Command line option
osde2e test --focus-tests "OCM Agent Operator"
# Custom config file
tests:
focus: "OCM Agent Operator"
# Command line options
osde2e test --label-filter "Operators && !Upgrade" --focus-tests "OCM Agent Operator"
# Custom config file
tests:
ginkgoLabelFilter: "Operators && !Upgrade"
focus: "OCM Agent Operator"
Refer to the Writing Tests document for guidelines and standards.
Third-party (Addon) tests are built as containers that spin up and report back results to OSDe2e.
These containers are built and maintained by external groups looking to get CI signal for
their product within OSD. The definition of a third-party test is maintained within
the managed-tenants
repo and is returned via the Add-Ons API.
For more information please see the OSDE2E Test Harness repository to learn more for writing add on tests.
Each time osde2e runs it captures as much data that it possible can. Data can include cluster/pod logs, prometheus metrics, test data generated, hive version and osde2e version to identify any possible flakiness in the environment.
Each time tests are executed a JUnit XML file will be generated to capture all the tests that ran and statistics about them (e.g. pass/fail, duration). These XML files will be later used by external applications to present metrics and data for others to see into. An example of this is they are used to present data in TestGrid Dashboards.
Periodic jobs are run daily validating Managed OpenShift clusters, using
osde2e
. Check out the CI Jobs page to learn more.