Files
ubicloud/prog/test/vm_group.rb
Maciek Sarnowicz 9917c13ad1 Adding E2E tests for slices
Updating E2E tests to validate VM creation inside a slice. The test switches the host's `accept_slices` flag to true and sets the project flag to use slices, then runs the standard VM test to create VMs and test them. Those VMs are creted inside slices on a host. An additional verification is added into VmGroup to check the validity of the slices - `VmHostSlices`.
2025-01-29 15:21:18 -08:00

148 lines
3.9 KiB
Ruby

# frozen_string_literal: true
require "net/ssh"
class Prog::Test::VmGroup < Prog::Test::Base
def self.assemble(boot_images:, storage_encrypted: true, test_reboot: true, test_slices: false)
Strand.create_with_id(
prog: "Test::VmGroup",
label: "start",
stack: [{
"storage_encrypted" => storage_encrypted,
"test_reboot" => test_reboot,
"test_slices" => test_slices,
"vms" => [],
"boot_images" => boot_images
}]
)
end
label def start
hop_setup_vms
end
label def setup_vms
project = Project.create_with_id(name: "project-1")
test_slices = frame.fetch("test_slices")
project.set_ff_use_slices_for_allocation(test_slices)
subnets = Array.new(2) { Prog::Vnet::SubnetNexus.assemble(project.id, name: "subnet-#{_1}", location: "hetzner-fsn1") }
encrypted = frame.fetch("storage_encrypted", true)
boot_images = frame.fetch("boot_images")
storage_options = [
[{encrypted:, skip_sync: true}, {encrypted:, size_gib: 5}],
[{encrypted:, skip_sync: false, max_read_mbytes_per_sec: 200, max_write_mbytes_per_sec: 150, max_ios_per_sec: 25600}],
[{encrypted:, skip_sync: false}]
]
vm_count = [boot_images.size, storage_options.size].max
vms = Array.new(vm_count) do |index|
Prog::Vm::Nexus.assemble_with_sshable(
"ubi", project.id,
private_subnet_id: subnets[index % subnets.size].id,
storage_volumes: storage_options[index % storage_options.size],
boot_image: boot_images[index % boot_images.size],
enable_ip4: true
)
end
update_stack({
"vms" => vms.map(&:id),
"subnets" => subnets.map(&:id),
"project_id" => project.id
})
hop_wait_vms
end
label def wait_vms
nap 10 if frame["vms"].any? { Vm[_1].display_state != "running" }
hop_verify_vms
end
label def verify_vms
frame["vms"].each { bud(Prog::Test::Vm, {subject_id: _1}) }
hop_wait_verify_vms
end
label def wait_verify_vms
reap
hop_verify_vm_host_slices if leaf?
donate
end
label def verify_vm_host_slices
test_slices = frame.fetch("test_slices")
if !test_slices || (retval&.dig("msg") == "Verified VM Host Slices!")
hop_verify_firewall_rules
end
slices = frame["vms"].map { Vm[_1].vm_host_slice.id }
push Prog::Test::VmHostSlices, {"slices" => slices}
end
label def verify_firewall_rules
if retval&.dig("msg") == "Verified Firewall Rules!"
hop_verify_connected_subnets
end
push Prog::Test::FirewallRules, {subject_id: PrivateSubnet[frame["subnets"].first].firewalls.first.id}
end
label def verify_connected_subnets
if retval&.dig("msg") == "Verified Connected Subnets!"
if frame["test_reboot"]
hop_test_reboot
else
hop_destroy_resources
end
end
ps1, ps2 = frame["subnets"].map { PrivateSubnet[_1] }
push Prog::Test::ConnectedSubnets, {subnet_id_multiple: ((ps1.vms.count > 1) ? ps1.id : ps2.id), subnet_id_single: ((ps1.vms.count > 1) ? ps2.id : ps1.id)}
end
label def test_reboot
vm_host.incr_reboot
hop_wait_reboot
end
label def wait_reboot
if vm_host.strand.label == "wait" && vm_host.strand.semaphores.empty?
# Run VM tests again, but avoid rebooting again
update_stack({"test_reboot" => false})
hop_verify_vms
end
nap 20
end
label def destroy_resources
frame["vms"].each { Vm[_1].incr_destroy }
frame["subnets"].each { PrivateSubnet[_1].tap { |ps| ps.firewalls.each { |fw| fw.destroy } }.incr_destroy }
hop_wait_resources_destroyed
end
label def wait_resources_destroyed
unless frame["vms"].all? { Vm[_1].nil? } && frame["subnets"].all? { PrivateSubnet[_1].nil? }
nap 5
end
hop_finish
end
label def finish
Project[frame["project_id"]].destroy
pop "VmGroup tests finished!"
end
label def failed
nap 15
end
def vm_host
@vm_host ||= Vm[frame["vms"].first].vm_host
end
end