This test suite exercises a full Cloud Foundry deployment using the golang cf
CLI and curl
. It is restricted to testing user-facing features such as a user interacting with the system via the CLI.
For example, one test pushes an app with cf push
, hits an endpoint on the app with curl
that causes it to crash, and asserts that we eventually see a crash event registered in cf events
.
Tests that will NOT be introduced here are ones which could be tested at the component level, such as basic CRUD of an object in the Cloud Controller. These tests belong with that component.
These tests are not intended for use against production systems, they are intended for acceptance environments for teams developing Cloud Foundry itself. While these tests attempt to clean up after themselves, there is no guarantee that they will not mutate state of your system in an undesirable way. For lightweight system tests that are safe to run against a production environment, please use the CF Smoke Tests.
NOTE: Because we want to parallelize execution, tests should be written in such a way as to be runnable individually. This means that tests should not depend on state in other tests, and should not modify the CF state in such a way as to impact other tests.
-
Install golang >= 1.6. Set up your golang development environment, per golang.org.
-
Install preferred SCM program in order to
go get
source code. -
Install the
cf CLI
. Make sure that it is accessible in your$PATH
. -
Install curl
-
Check out a copy of
cf-acceptance-tests
and make sure that it is added to your$GOPATH
. The recommended way to do this is to run:go get -d github.com/cloudfoundry/cf-acceptance-tests
You will receive a warning
no buildable Go source files
; this can be ignored as there is no compilable go source code in the package, only test code. - Ensure all submodules are checked out to the correct SHA. The easiest way to do this is by running:./bin/update_submodules
-
Install a running Cloud Foundry deployment to run these acceptance tests against. For example, bosh-lite.
All go
dependencies required by CATs are vendored in the vendor
directory.
Install gvt and make sure it is available in your $PATH. The recommended way to do this is to run:
go get -u github.com/FiloSottile/gvt
In order to update a current dependency to a specific version, do the following:
cd cf-acceptance-tests
gvt delete <import_path>
gvt fetch -revision <revision_number> <import_path>
If you'd like to add a new dependency just gvt fetch
You must set an environment variable $CONFIG
which points to a JSON file that contains several pieces of data that will be used to configure the acceptance tests, e.g. telling the tests how to target your running Cloud Foundry deployment and what tests to run.
You can see all available config keys here and their defaults here.
The following can be pasted into a terminal and will set up a sufficient $CONFIG
to run the core test suites against a BOSH-Lite deployment of CF.
cat > integration_config.json <<EOF
{
"api": "api.bosh-lite.com",
"apps_domain": "bosh-lite.com",
"admin_user": "admin",
"admin_password": "admin",
"skip_ssl_validation": true,
"use_http": true,
"include_apps": true,
"include_backend_compatibility": true,
"include_container_networking": true,
"include_detect": true,
"include_docker": true,
"include_internet_dependent": true,
"include_privileged_container_support": true,
"include_route_services": true,
"include_routing": true,
"include_security_groups": true,
"include_services": true,
"include_ssh": true,
"include_sso": true,
"include_tasks": true,
"include_v3": true,
"include_zipkin": true
}
EOF
export CONFIG=$PWD/integration_config.json
api
: Cloud Controller API endpoint.admin_user
: Name of a user in your CF instance with admin credentials. This admin user must have thedoppler.firehose
scope.admin_password
: Password of the admin user above.apps_domain
: A shared domain that tests can use to create subdomains that will route to applications also created in the tests.skip_ssl_validation
: Set to true if using an invalid (e.g. self-signed) cert for traffic routed to your CF instance; this is generally always true for BOSH-Lite deployments of CF.
include_*
parameters are used to specify whether to skip tests based on how a deployment is configured.
include_apps
: Flag to include the apps test group.include_backend_compatibility
: Flag to include whether we check DEA/Diego interoperability.include_container_networking
: Flag to include tests related to container networking.include_security_groups
must also be set for tests to run.include_detect
: Flag to include tests in the detect group.include_docker
: Flag to include tests related to running Docker apps on Diego. Diego must be deployed and the CC API docker_diego feature flag must be enabled for these tests to pass.include_internet_dependent
: Flag to include tests that require the deployment to have internet access.include_privileged_container_support
: Flag to include privileged container tests. Requires capi.nsync.diego_privileged_containers and capi.stager.diego_privileged_containers to be enabled for tests to pass.include_route_services
: Flag to include the route services tests. Diego must be deployed for these tests to pass.include_routing
: Flag to include the routing tests.include_security_groups
: Flag to include tests for security groups.include_services
: Flag to include test for the services API.include_ssh
: Flag to include tests for Diego container ssh feature.include_sso
: Flag to include the services tests that integrate with Single Sign On.include_services
must also be set for tests to run.include_tasks
: Flag to include the v3 task tests.include_v3
must also be set for tests to run. The CC API task_creation feature flag must be enabled for these tests to pass.include_v3
: Flag to include tests for the the v3 API.include_zipkin
: Flag to include tests for Zipkin tracing.include_routing
must also be set for tests to run. CF must be deployed withrouter.tracing.enable_zipkin
set for tests to pass.include_isolation_segments
: Flag to include isolation segment tests.backend
: App tests push their apps using the backend specified. Incompatible tests will be skipped based on which backend is chosen. If left unspecified the default backend will be used where none is specified; all tests that specify a particular backend will be skipped.use_http
: Set to true if you would like CF Acceptance Tests to use HTTP when making api and application requests. (default is HTTPS)use_existing_user
: The admin user configured above will normally be used to create a temporary user (with lesser permissions) to perform actions (such as push applications) during tests, and then delete said user after the tests have run; set this totrue
if you want to use an existing user, configured via the following properties.keep_user_at_suite_end
: If using an existing user (see above), set this totrue
unless you are okay having your existing user being deleted at the end. You can also set this totrue
when not using an existing user if you want to leave the temporary user around for debugging purposes after the test teardown.existing_user
: Name of the existing user to use.existing_user_password
: Password for the existing user to use.persistent_app_host
: See below.persistent_app_space
: See below.persistent_app_org
: See below.persistent_app_quota_name
: See below.artifacts_directory
: If set,cf
CLI trace output from test runs will be captured in files and placed in this directory. See below for more.default_timeout
: Default time (in seconds) to wait for polling assertions that wait for asynchronous results.cf_push_timeout
: Default time (in minutes) to wait forcf push
commands to succeed.long_curl_timeout
: Default time (in seconds) to wait for assertions thatcurl
slow endpoints of test applications.broker_start_timeout
(only relevant forservices
test group): Time (in seconds) to wait for service broker test app to start.async_service_operation_timeout
(only relevant for theservices
test group): Time (in seconds) to wait for an asynchronous service operation to complete.test_password
: Used to set the password for the test user. This may be needed if your CF installation has password policies.timeout_scale
: Used primarily to scale default timeouts for test setup and teardown actions (e.g. creating an org) as opposed to main test actions (e.g. pushing an app).isolation_segment_name
: Name of the isolation segment to use for the isolation segments test.staticfile_buildpack_name
See below.java_buildpack_name
See below.ruby_buildpack_name
See below.nodejs_buildpack_name
See below.go_buildpack_name
See below.python_buildpack_name
See below.php_buildpack_name
See below.binary_buildpack_name
See below.
The tests in one_push_many_restarts_test.go
operate on an app that is supposed to persist between runs of the CF Acceptance tests. If these tests are run, they will create an org, space, and quota and push the app to this space. The test config will provide default names for these entities, but to configure them, set values for persistent_app_host
, persistent_app_space
, persistent_app_org
, and persistent_app_quota_name
.
Many tests specify a buildpack when pushing an app, so that on diego the app staging process completes in less time. The default names for the buildpacks are as follows; if you have buildpacks with different names, you can override them by setting different names:
staticfile_buildpack_name: staticfile_buildpack
java_buildpack_name: java_buildpack
ruby_buildpack_name: ruby_buildpack
nodejs_buildpack_name: nodejs_buildpack
go_buildpack_name: go_buildpack
python_buildpack_name: python_buildpack
php_buildpack_name: php_buildpack
binary_buildpack_name: binary_buildpack
The route_services
test group pushes applications which must be able to reach the load balancer of your Cloud Foundry deployment. This requires configuring application security groups to support this. Your deployment manifest should include the following data if you are running the route_services
group:
...
properties:
...
cc:
...
security_group_definitions:
- name: load_balancer
rules:
- protocol: all
destination: IP_OF_YOUR_LOAD_BALANCER # (e.g. 10.244.0.34 for a standard deployment of Cloud Foundry on BOSH-Lite)
default_running_security_groups: ["load_balancer"]
When a test fails, look for the test group name ([services]
in the example below) in the test output:
• Failure in Spec Setup (BeforeEach) [34.662 seconds]
[services] Service Instance Lifecycle
If you set a value for artifacts_directory
in your $CONFIG
file, then you will be able to capture cf
trace output from failed test runs, this output may be useful in cases where the normal test output is not enough to debug an issue. The cf
trace output for the tests in these specs will be found in CF-TRACE-Applications-*.txt
in the artifacts_directory
.
To execute all test groups, run the following from the root directory of cf-acceptance-tests:
./bin/test
To execute all test groups, and have tests run in parallel across four processes one would run:
./bin/test -nodes=4
Be careful with this number, as it's effectively "how many apps to push at once", as nearly every example pushes an app.
If you are already familiar with CATs you probably know that there are many test groups. You may not wish to run all the tests in all contexts, and sometimes you may want to focus individual test groups to pinpoint a failure. To execute a specific group of acceptance tests, e.g. routing/
, edit your integration_config.json
file and set all include_*
values to false
except for include_routing
then run the following:
./bin/test
To execute tests in a single file use an FDescribe
block around the tests in that file:
var _ = BackendCompatibilityDescribe("Backend Compatibility", func() {
FDescribe("Focused tests", func() { // Add this line here
// ... rest of file
}) // Close here
})
The test group names correspond to directory names.
To see verbose output from ginkgo
, use the -v
flag.
./bin/test -v
You can of course combine the -v
flag with the -nodes=N
flag.
Test Group Name | Compatable Backend | Description |
---|---|---|
apps |
DEA or Diego | Tests the core functionalities of Cloud Foundry: staging, running, logging, routing, buildpacks, etc. This test group should always pass against a sound Cloud Foundry deployment. |
backend_compatibility |
DEA and Diego are required simultaneously | Tests interoperability of droplets staged on Diego or the DEAs |
detect |
DEA or Diego | Tests the ability of the platform to detect the correct buildpack for compiling an application if no buildpack is explicitly specified. |
docker |
Diego | Test our ability to run docker containers on diego and that we handle docker metadata correctly. |
internet_dependent |
DEA or Diego | This test group tests the feature of being able to specify a buildpack via a Github URL. As such, this depends on your Cloud Foundry application containers having access to the Internet. You should take into account the configuration of the network into which you've deployed your Cloud Foundry, as well as any security group settings applied to application containers. |
routing |
DEA or Diego | This package contains routing specific acceptance tests (Context path, wildcard, SSL termination, sticky sessions, zipkin tracing). |
route_services |
Diego | This package contains route services acceptance tests. |
security_groups |
DEA or Diego | This test group tests the security groups feature of Cloud Foundry that lets you apply rules-based controls to network traffic in and out of your containers. These should pass for most recent Cloud Foundry installations. cf-release versions v200 and up should have support for most security group specs to pass. |
services |
DEA or Diego | This test group tests various features related to services, e.g. registering a service broker via the service broker API. Some of these tests exercise special integrations, such as Single Sign-On authentication; you may wish to run some tests in this package but selectively skip others if you haven't configured the required integrations. |
ssh |
Diego | This test group tests our ability to communicate with Diego apps via ssh, scp, and sftp. |
v3 |
Diego | This test group contains tests for the next-generation v3 Cloud Controller API. As of this writing, the v3 API is not officially supported. |
isolation_segments |
Diego | This test group requires that Diego be deployed with a minimum of 2 cells. One of those cells must have been deployed with a placement_tag . Finally, the isolation_segment_name must be set in the CATs properties to match this placement tag. |
This repository uses gvt to manage go
dependencies.
All go
dependencies required by CATs are vendored in the vendor
directory.
When making changes to the test suite that bring in additional go
packages,
you should use the workflow described in the
gvt documentation.
There are a number of conventions we recommend developers of CF acceptance tests adopt:
- When pushing an app:
- set the backend,
- set the memory requirement, and use the suite's
DEFAULT_MEMORY_LIMIT
unless the test specifically needs to test a different value, - set the buildpack unless the test specifically needs to test the case where a buildpack is unspecified, and use one of
config.RubyBuildpack
,config.JavaBuildpack
, etc. unless the test specifically needs to use a buildpack name or URL specific to the test, - set the domain, and use the
Config.AppsDomain
unless the test specifically needs to test a different app domain.
For example:
Expect(cf.Cf("push", appName,
"--no-start" // don't start before setting backend
"-b", buildpackName, // specify buildpack
"-m", DEFAULT_MEMORY_LIMIT, // specify memory limit
"-d", Config.AppsDomain, // specify app domain
).Wait(Config.DefaultTimeoutDuration())).To(Exit(0))
//use the config-file specified backend when starting this app
app_helpers.SetBackend(appName)
Expect(cf.Cf("start", appName).Wait(Config.CfPushTimeoutDuration())).To(Exit(0))
-
Delete all resources that are created, e.g. apps, routes, quotas, etc. This is in order to leave the system in the same state it was found in. For example, to delete apps and their associated routes:
Expect(cf.Cf("delete", myAppName, "-f", "-r").Wait(Config.DefaultTimeoutDuration())).To(Exit(0))
-
Specifically for apps, before tearing them down, print the app guid and recent application logs. There is a helper method
AppReport
provided in theapp_helpers
package for this purpose.AfterEach(func() { app_helpers.AppReport(appName, Config.DefaultTimeoutDuration()) })
-
Document the purpose of your test groups in this repo's README.md. This is especially important when changing the explicit behavior of existing test groups or adding new test groups.
-
Document all changes to the config object in this repo's README.md.
-
Document the compatible backends in this repo's README.md.
-
If you add a test that requires a new minimum
cf
CLI version, update theminCliVersion
incats_suite_test.go
. -
If you add a test that is unsupported on a particular backend, add a ginkgo Skip() in an if Config.Backend != "your_backend" {} clause, see Ginkgo's skip.