Skip to main content

Using Sonobuoy for KaaS conformance tests

Motivation

With the k8s-cluster-api-provider, the SCS provides a tool to generate and manage k8s clusters on top of its IaaS infrastructure. As part of the application, Sonobuoy is used as a test suite to execute the official Kubernetes e2e tests. We expect that current and future tests derived from SCS standards will benefit from (or even require) the testing mechanisms that Sonobuoy provides.

Apart from running the Kubernetes e2e tests, Sonobuoy also allows users to write their own tests and apply them as a self-managed plugin. All tests not provided by the e2e test plugin could therefore be written by the respective SCS teams responsible for the standards or tests and then be made executable with Sonobuoy. Hence, Sonobuoy could provide both a pre-done test suite and a framework to write additional conformance tests required for SCS.

Short Sonobuoy Introduction

The main objective of Sonobuoy plugins is to present test results in a consolidated way. To do this, Sonobuoy integrates the test into a pod, which is then applied to the K8s cluster under test. A Sonobuoy worker supervises this pod and forwards all test results to the aggregator module. It does this by waiting for a specific "Done" file to be created. Once this file is recognized, the worker forwards the results to the aggregator, using a predefined location for the results file within a folder, as seen in following image: image search api

In order to use the existing conformance tests as a Sonobuoy plugin, a wrapper around the individual test scripts would be required. This wrapper would need to have the following effects:

  • gathers all test results and provides them in the results file
  • run tests in sequence and signal the worker when it's finished by generating a "Done" file

Apart from providing the test results, a plugin container must also forward the status of each test by setting a status flag in the results file. Additionally, the tests would need to be able to run inside a pod in the K8s cluster under test.

Design Considerations

There are different approaches to create a Sonobuoy plugin, which are discussed below in order to find a best practice for the SCS project. The documented approaches show one example each in order to give a better representation to the reader.

Sonobuoy provides plugin examples in the plugins repository, which are referenced throughout this section.

Option 1 Golang based approach 1: Pick a framework from the Sonobuoy plugin examples

The seemingly most interesting plugin is the e2e-skeleton, which uses the kubernetes-sigs/e2e-framework. The kubernetes-sigs/e2e-framework is a stand-alone project that is separate from the official Kubernetes e2e tests. The framework provides proper documentation as well as helper functions that abstract client functionalities, similar to those found in "kubernetes/kubernetes/test/e2e/framework" repository.

As mentioned in the motivation of the e2e-framework, the project was created to circumvent the disadvantages of Kubernetes' own e2e-tests, which are described in more detail in the goals.

PROS:

  • arguments in favor of this framework can also be found under the goals description of the documentation
  • e2e-framework is a well-defined framework, that allows the handling of resource creation and deletion
  • official framework provided by "Kubernetes-sigs"

CONS:

  • arguments not in favor of this framework can be derived from the Non-Goals description of the documentation:
    • "no responsibility for bootstrapping or the execution of the tests themselves" can be ignored, as this is partly taken over by Sonobuoy
    • "no mock or fake cluster components" can be ignored, since the e2e tests of SCS should be used to test real clusters and their functionality
    • for this test procedure, the Sonobuoy e2e plugin should be run in addition to the SCS KaaS conformance tests

proof of concept: ../Tests/kaas/kaas-sonobuoy-go-example-e2e-framework/

Option 2 Golang based approach 2: Reuse the Kubernetes own e2e test infrastructure and framework

The existing Sonobuoy e2e plugin already provides a vast number of tests that could be adapted or reused for the SCS project.

If these e2e tests are to be reused in a customized structure, a framework like ginkgo must be used as it is used by the Kubernetes e2e test infrastructure. This could use the implementation of the build process responsible for the Docker image containing the e2e tests. The setup could be copied from kubernetes/test/conformance/image and adapted to the projects requirements. The mentioned build process must use the files of the following directories from the Kubernetes repository:

PROS:

CONS:

  • not easy to implement, as we would have to copy part of the Kubernetes repository and track the changes from the upstream
  • according to README.md, part of it seems to be outdated and might change with a future version

TODO: provide proof of concept: kaas-sonobuoy-go-example-k8s-e2e

Option 3 Write Python scripts for tests

Sonobuoy makes it possible to write tests in Python and execute them like other tests in a pod on the K8s cluster. It would therefore be possible to keep on writing conformance tests in Python.

This option would require a wrapper in order to make the tests scripts executable as Sonobuoy plugins. This wrapper, as mentioned earlier, would need to capture the collection of test results as well as the generation of the "Done" file after the test execution is finished. This could be managed by executing each test script in a sequential order.

The wrapper as well as the python tests and test framework could then be stored in a container image and uploaded to a registry in order to be usable by Sonobuoy within the k8s-cluster-api-provider.

This approach also leaves the decision open as to which test framework should be used for Python, which should be decided in a secondary Decision Record.

proof of work: ../Tests/kaas/k8s-default-storage-class

PROS:

  • continue using the already available Python tests
    • only a small number of tests is implemented thus far

CONS:

  • no "native" support in Sonobuoy, a wrapper is needed
  • decision for a framework is still not done

Approaches to providing a Sonobuoy plugin image

The following section showcases both ways to provide a Sonobuoy plugin image. Option 1 would most likely be used, if an image is published to be used by an end user. Option 2 is the expected way for local development and testing.

Option 1 Public container registry

The image can be made available via a public container registry, which would require a regular job (e.g. CI/CD) to build and publish the image.

Option 2 Local image upload

Create the image locally on the "clusterctl admin control node" and then upload it manually to the Kubernetes cluster under test.

Both approaches are useful in different ways. While the usage of a container registry allows easy distribution of tests and guarantees new images through the usage of a CI/CD job, it also makes it harder to test changes quickly, since a wait time could be necessary to let the CI/CD job run through and access the image. This can be solved by using the "Local image upload" or a combination of both approaches.

Decision

The KaaS conformance test MUST be provided as a test suite holding the test cases for the Kubernetes clusters to be checked. Furthermore, the test cases themselves MUST be wrapped by a test framework to:

  • handle the creation and deletion of resources
  • collect and present results
  • consolidate redundant code across test cases
  • support the creation of test cases through predefined structures

As with the k8s-cluster-api-provider the SCS provides a tooling to generate its KaaS infrastructure. Part of the k8s-cluster-api-provider is the usage of Sonobuoy as a test suite to execute the Kubernetes own e2e tests. Investigating those e2e test lead to the conclusion that they are not always reusable. The main purpose of Kubernetes own e2e tests is to test the functionality of the Kubernetes code itself and not the resources and setup of a specific KaaS infrastructure as it is the aim of the SCS KaaS conformance test.

However, considering that the SCS has an ongoing process of defining standards and implementing test cases to check their compliance, that means in some cases future standards might already be covered by the e2e test inside the Kubernetes repository. Hence, before writing tests, a developer SHOULD check the Kubernetes e2e tests for existing test cases that might cover conformance of a standard currently being worked on.

As described above, Sonobuoy offers the possibility to generate custom plugins that provide self-created test cases. Therefore, future conformance tests MUST be executable by Sonobuoy by wrapping them in a Sonobuoy plugin. Moreover, three options for the implementation of the SCS KaaS compliance test cases are described above so that it can be decided within this decision record which options should be used.

As a first decision, "Option 2 Go Approach 2: Reuse Kubernetes' own e2e test infrastructure and framework" is the least viable, as it would mean copying almost all the files used from the Kubernetes e2e tests. This framework is closely linked to the development of the Kubernetes code. Therefore, changes to its structure mainly are in line with its usage in the Kubernetes repository itself and is most likely not relevant for other parties. Changes in the framework cloud have a greater impact on our side as they are predictable. The development effort gained by reusing these examples could be outweighed by the investment necessary to adapt tests to the corresponding framework changes.

This leaves "Option 1 Go approach 1: Pick framework from the Sonobuoy plugin examples" and "Option 3 Write Python scripts for tests" as methods for implementing test cases. It is possible to use both approaches in parallel, which would enable usage of both Python and Go code. This could possibly generate two Sonobuoy plugins, but this isn't a necessity.