Skip to content

Latest commit

 

History

History
599 lines (492 loc) · 21.8 KB

Plugin-test.md

File metadata and controls

599 lines (492 loc) · 21.8 KB

Plugin automatic test framework

Plugin test frameworks is designed for verifying the plugin function and compatible status. As there are dozens of plugins and hundreds versions need to be verified, it is impossible to do manually. The test framework uses container based tech stack, requires a set of real services with agent installed, then the test mock OAP backend is running to check the segment and register data sent from agents.

Every plugin maintained in the main repo is required having its test cases, also matching the versions in the supported list doc.

Environment Requirements

  1. MacOS/Linux
  2. jdk 8+
  3. Docker
  4. Docker Compose

Case Base Image Introduction

The test framework provides JVM-container and Tomcat-container base images. You could choose the suitable one for your test case, if either is suitable, recommend choose JVM-container.

JVM-container Image Introduction

JVM-container uses openjdk:8 as the base image. The test case project is required to be packaged as project-name.zip, including startup.sh and uber jar, by using mvn clean package.

Take the following test projects as good examples

Tomcat-container Image Introduction

Tomcat-container uses tomcat:8.5.42-jdk8-openjdk as the base image. The test case project is required to be packaged as project-name.war by using mvn package.

Take the following test project as a good example

Test project hierarchical structure

The test case is an independent maven project, and it is required to be packaged as a war tar ball or zip file, depends on the chosen base image. Also, two external accessible endpoints, mostly two URLs, are required.

All test case codes should be in org.apache.skywalking.apm.testcase.* package, unless there are some codes expected being instrumented, then the classes could be in test.org.apache.skywalking.apm.testcase.* package.

JVM-container test project hierarchical structure

[plugin-scenario]
    |- [bin]
        |- startup.sh
    |- [config]
        |- expectedData.yaml
    |- [src]
        |- [main]
            |- ...
        |- [resource]
            |- log4j2.xml
    |- pom.xml
    |- configuration.yaml
    |- support-version.list

[] = directory

Tomcat-container test project hierarchical structure

[plugin-scenario]
    |- [config]
        |- expectedData.yaml
    |- [src]
        |- [main]
            |- ...
        |- [resource]
            |- log4j2.xml
        |- [webapp]
            |- [WEB-INF]
                |- web.xml
    |- pom.xml
    |- configuration.yaml
    |- support-version.list

[] = directory

Test case configuration files

The following files are required in every test case.

File Name Descriptions
configuration.yml Declare the basic case inform, including, case name, entrance endpoints, mode, dependencies.
expectedData.yaml Describe the expected Segment(s), including two major parts, (1) Register metadata (2) Segments
support-version.list List the target versions for this case
startup.sh JVM-container only, don't need this when useTomcat-container

* support-version.list format requires every line for a single version. Could use # to comment out this version.

configuration.yml

Field description
type Image type, options, jvm or tomcat. Required.
entryService The entrance endpoint(URL) for test case access. Required.
healthCheck The health check endpoint(URL) for test case access. Required.
startScript Path of start up script. Required in type: jvm only.
framework Case name.
runningMode Running mode whether with the optional plugin, options, default(default), with_optional, with_bootstrap
withPlugins Plugin selector rule. eg:apm-spring-annotation-plugin-*.jar. Required when runningMode=with_optional or runningMode=with_bootstrap.
environment Same as docker-compose#environment.
depends_on Same as docker-compose#depends_on.
dependencies Same as docker-compose#services, image、links、hostname、environment、depends_on are supported.

Notice:, docker-compose active only when dependencies is only blank.

runningMode option description.

Option description
default Active all plugins in plugin folder like the official distribution agent.
with_optional Active default and plugins in optional-plugin by the give selector.
with_bootstrap Active default and plugins in bootstrap-plugin by the give selector.

with_optional/with_bootstrap supports multiple selectors, separated by ;.

File Format

type:
entryService:
healthCheck:
startScript:
framework:
runningMode:
withPlugins:
environment:
  ...
depends_on:
  ...
dependencies:
  service1:
    image:
    hostname: 
    expose:
      ...
    environment:
      ...
    depends_on:
      ...
    links:
      ...
    entrypoint:
      ...
    healthcheck:
      ...
  • dependencies supports docker compose healthcheck. But the format is a little difference. We need - as the start of every config item, and describe it as a string line.

Such as in official doc, the health check is

healthcheck:
  test: ["CMD", "curl", "-f", "http://localhost"]
  interval: 1m30s
  timeout: 10s
  retries: 3
  start_period: 40s

The here, you should write as

healthcheck:
  - 'test: ["CMD", "curl", "-f", "http://localhost"]'
  - "interval: 1m30s"
  - "timeout: 10s"
  - "retries: 3"
  - "start_period: 40s"

In some cases, the dependency service, mostly 3rd party server like SolrJ server, is required to keep the same version as client lib version, which defined as ${test.framework.version} in pom. Could use ${CASE_SERVER_IMAGE_VERSION} as the version number, it will be changed in the test for every version.

Don't support resource related configurations, such as volumes, ports and ulimits. Because in test scenarios, don't need mapping any port to the host VM, or mount any folder.

Take following test cases as examples

expectedData.yaml

Operator for number

Operator Description
nq Not equal
eq Equal(default)
ge Greater than or equal
gt Greater than

Operator for String

Operator Description
not null Not null
null Null or empty String
eq Equal(default)

Register verify description format

registryItems:
  services:
  - { SERVICE_NAME: SERVICE_ID(int) }
  ...
  instances:
  - { SERVICE_CODE: INSTANCE_COUNT(int) }
  ...
  operationNames:
  - SERVICE_CODE: [ ENTRY_SPAN_OPERATION(string), ... ]
  ...
Field Description
services The registered service codes. Normally, not 0 should be enough.
instances The number of service instances exists in this test case.
operationNames Operation names of entry spans. Since 6.6.0, only these span name would do register, due to they are real endpoints.

Segment verify description format

segments:
-
  serviceName: SERVICE_CODE(string)
  segmentSize: SEGMENT_SIZE(int)
  segments:
  - segmentId: SEGMENT_ID(string)
    spans:
        ...
Field Description
serviceName Service code.
segmentSize The number of segments is expected.
segmentId trace ID.
spans segment span list. Follow the next section to see how to describe every span.

Span verify description format

Notice: The order of span list should follow the order of the span finish time.

    operationName: OPERATION_NAME(string)
    operationId: SPAN_ID(int)
    parentSpanId: PARENT_SPAN_ID(int)
    spanId: SPAN_ID(int)
    startTime: START_TIME(int)
    endTime: END_TIME(int)
    isError: IS_ERROR(string: true, false)
    spanLayer: SPAN_LAYER(string: DB, RPC_FRAMEWORK, HTTP, MQ, CACHE)
    spanType: SPAN_TYPE(string: Exit, Entry, Local )
    componentName: COMPONENT_NAME(string)
    componentId: COMPONENT_ID(int)
    tags:
    - {key: TAG_KEY(string), value: TAG_VALUE(string)}
    ...
    logs:
    - {key: LOG_KEY(string), value: LOG_VALUE(string)}
    ...
    peer: PEER(string)
    peerId: PEER_ID(int)
    refs:
    - {
       parentSpanId: PARENT_SPAN_ID(int),
       parentTraceSegmentId: PARENT_TRACE_SEGMENT_ID(string),
       entryServiceInstanceId: ENTRY_SERVICE_INSTANCE_ID(int)
       parentServiceInstanceId: PARENT_SERVICE_INSTANCE_ID(int),
       networkAddress: NETWORK_ADDRESS(string),
       networkAddressId: NETWORK_ADDRESS_ID(int),
       parentEndpoint: PARENT_ENDPOINT_NAME(string),
       parentEndpointId: PARENT_ENDPOINT_ID(int),
       entryEndpoint: ENTRY_ENDPOINT_NAME(string),
       entryServiceInstanceId: ENTRY_ENDPOINT_ID(int),
     }
   ...
Field Description
operationName Span Operation Name
operationId Should be 0 for now
parentSpanId Parent span id. Notice: The parent span id of the first span should be -1.
spanId Span Id. Notice, start from 0.
startTime Span start time. It is impossible to get the accurate time, not 0 should be enough.
endTime Span finish time. It is impossible to get the accurate time, not 0 should be enough.
isError Span status, true or false.
componentName Component name, should be null in most cases, use component id instead.
componentId Component id for your plugin.
tags Span tag list. Notice, Keep in the same order as the plugin coded.
logs Span log list. Notice, Keep in the same order as the plugin coded.
SpanLayer Options, DB, RPC_FRAMEWORK, HTTP, MQ, CACHE
SpanType Span type, options, Exit, Entry or Local
peer Remote network address, IP + port mostly. For exit span, this should be required.
peerId Not 0 for now.

The verify description for SegmentRef,

Field Description
parentSpanId Parent SpanID, pointing to the span id in the parent segment.
entryServiceInstanceId/parentServiceInstanceId Not 0 should be enough
networkAddress/networkAddressId The peer value of parent exit span. networkAddressId should be 0, as the mock tool doesn't do register for real.
parentEndpoint/parentEndpointId The endpoint of parent/downstream service. Usually set parentEndpoint as literal string name, unless there is no parent endpoint, set parentEndpointId as -1.
entryEndpoint/entryServiceInstanceId The endpoint of first service in the distributed chain. Usually set entryEndpoint as literal string name, unless there is no endpoint at the entry service, set entryServiceInstanceId as -1.

startup.sh

This script provide a start point to JVM based service, most of them starts by a java -jar, with some variables. The following system environment variables are available in the shell.

Variable Description
agent_opts Agent plugin opts, check the detail in plugin doc or the same opt added in this PR.
SCENARIO_NAME Service name. Default same as the case folder name
SCENARIO_VERSION Version
SCENARIO_ENTRY_SERVICE Entrance URL to access this service
SCENARIO_HEALTH_CHECK_URL Health check URL

${agent_opts} is required to add into your java -jar command, which including the parameter injected by test framework, and make agent installed. All other parameters should be added after ${agent_opts}.

The test framework will set the service name as the test case folder name by default, but in some cases, there are more than one test projects are required to run in different service codes, could set it explicitly like the following example.

Example

home="$(cd "$(dirname $0)"; pwd)"

java -jar ${agent_opts} "-Dskywalking.agent.service_name=jettyserver-scenario" ${home}/../libs/jettyserver-scenario.jar &
sleep 1

java -jar ${agent_opts} "-Dskywalking.agent.service_name=jettyclient-scenario"  ${home}/../libs/jettyclient-scenario.jar &

Only set this or use other skywalking options when it is really necessary.

Take the following test cases as examples

Best Practices

How To Use The Archetype To Create A Test Case Project

We provided archetypes and a script to make creating a project easier. It creates a completed project of a test case. So that we only need to focus on cases. First, we can use followed command to get usage about the script.

bash ${SKYWALKING_HOME}/test/plugin/generator.sh

Then, runs and generates a project, named by scenario_name, in ./scenarios.

Recommendations for pom

    <properties>
        <!-- Provide and use this property in the pom. -->
        <!-- This version should match the library version, -->
        <!-- in this case, http components lib version 4.3. -->
        <test.framework.version>4.3</test.framework.version>
    </properties>
    <dependencies>
        <dependency>
            <groupId>org.apache.httpcomponents</groupId>
            <artifactId>httpclient</artifactId>
            <version>${test.framework.version}</version>
        </dependency>
        ...
    </dependencies>

    <build>
        <!-- Set the package final name as same as the test case folder case. -->
        <finalName>httpclient-4.3.x-scenario</finalName>
        ....
    </build>

How To Implement Heartbeat Service

Heartbeat service is designed for checking the service available status. This service is a simple HTTP service, returning 200 means the target service is ready. Then the traffic generator will access the entry service and verify the expected data. User should consider to use this service to detect such as whether the dependent services are ready, especially when dependent services are database or cluster.

Notice, because heartbeat service could be traced fully or partially, so, segmentSize in expectedData.yaml should use ge as the operator, and don't include the segments of heartbeat service in the expected segment data.

The example Process of Writing Expected Data

Expected data file, expectedData.yaml, includes RegistryItems and SegmentIntems.

We are using the HttpClient plugin to show how to write the expected data.

There are two key points of testing

  1. Whether is HttpClient span created.
  2. Whether the ContextCarrier created correctly, and propagates across processes.
+-------------+         +------------------+            +-------------------------+
|   Browser   |         |  Case Servlet    |            | ContextPropagateServlet |
|             |         |                  |            |                         |
+-----|-------+         +---------|--------+            +------------|------------+
      |                           |                                  |
      |                           |                                  |
      |       WebHttp            +-+                                 |
      +------------------------> |-|         HttpClient             +-+
      |                          |--------------------------------> |-|
      |                          |-|                                |-|
      |                          |-|                                |-|
      |                          |-| <--------------------------------|
      |                          |-|                                +-+
      | <--------------------------|                                 |
      |                          +-+                                 |
      |                           |                                  |
      |                           |                                  |
      |                           |                                  |
      |                           |                                  |
      +                           +                                  +

RegistryItems

HttpClient test case is running in Tomcat container, only one instance exists, so

  1. instance number is 1
  2. applicationId is not 0
  3. Because we have two servlet mapping paths, so two operation names. No health check operation name here.
registryItems:
  services:
  - {httpclient-case: nq 0}
  instances:
  - {httpclient-case: 1}
  operationNames:
  - httpclient-case: [/httpclient-case/case/httpclient,/httpclient-case/case/context-propagate] 

segmentItems

By following the flow of HttpClient case, there should be two segments created.

  1. Segment represents the CaseServlet access. Let's name it as SegmentA.
  2. Segment represents the ContextPropagateServlet access. Let's name it as SegmentB.
segments:
  - serviceName: httpclient-case
    segmentSize: ge 2 # Could have more than one health check segments, because, the dependency is not standby.

Because Tomcat plugin is a default plugin of SkyWalking, so, in SegmentA, there are two spans

  1. Tomcat entry span
  2. HttpClient exit span

SegmentA span list should like following

    - segmentId: not null
      spans:
        - operationName: /httpclient-case/case/context-propagate
          operationId: eq 0
          parentSpanId: 0
          spanId: 1
          startTime: nq 0
          endTime: nq 0
          isError: false
          spanLayer: Http
          spanType: Exit
          componentName: null
          componentId: eq 2
          tags:
            - {key: url, value: 'http://127.0.0.1:8080/httpclient-case/case/context-propagate'}
            - {key: http.method, value: GET}
          logs: []
          peer: null
          peerId: eq 0
        - operationName: /httpclient-case/case/httpclient
          operationId: eq 0
          parentSpanId: -1
          spanId: 0
          startTime: nq 0
          endTime: nq 0
          spanLayer: Http
          isError: false
          spanType: Entry
          componentName: null
          componentId: 1
          tags:
            - {key: url, value: 'http://localhost:{SERVER_OUTPUT_PORT}/httpclient-case/case/httpclient'}
            - {key: http.method, value: GET}
          logs: []
          peer: null
          peerId: eq 0

SegmentB should only have one Tomcat entry span, but includes the Ref pointing to SegmentA.

SegmentB span list should like following

- segmentId: not null
  spans:
  -
   operationName: /httpclient-case/case/context-propagate
   operationId: eq 0
   parentSpanId: -1
   spanId: 0
   tags:
   - {key: url, value: 'http://127.0.0.1:8080/httpclient-case/case/context-propagate'}
   - {key: http.method, value: GET}
   logs: []
   startTime: nq 0
   endTime: nq 0
   spanLayer: Http
   isError: false
   spanType: Entry
   componentName: null
   componentId: 1
   peer: null
   peerId: eq 0
   refs:
   - {parentSpanId: 1, parentTraceSegmentId: "${httpclient-case[0]}", entryServiceName: "/httpclient-case/case/httpclient", networkAddress: "127.0.0.1:8080",parentServiceName: "/httpclient-case/case/httpclient",entryApplicationInstanceId: nq 0 }

Local Test and Pull Request To The Upstream

First of all, the test case project could be compiled successfully, with right project structure and be able to deploy. The developer should test the start script could run in Linux/MacOS, and entryService/health services are able to provide the response.

You could run test by using following commands

cd ${SKYWALKING_HOME}
bash ./test/pugin/run.sh -f ${scenario_name}

Notice,if codes in ./apm-sniffer have been changed, no matter because your change or git update, please recompile the skywalking-agent. Because the test framework will use the existing skywalking-agent folder, rather than recompiling it every time.

Use ${SKYWALKING_HOME}/test/plugin/run.sh -h to know more command options.

If the local test passed, then you could add it to .github/workflows/plugins-test.yaml file, which will drive the tests running on the Github Action of official SkyWalking repository. Please check the prev agent related PRs, and add your case to the fastest group, in order to make the whole test finished as soon as possible.

Every test case is a Github Action Step. Please use the scenario name, version range and version number to combine the name, take the existing one as a reference.

For example:

Here is a group named 'Kafka'. The latest step is Kafka scenario.

  Kafka:
    runs-on: ubuntu-18.04
    timeout-minutes: 90
    strategy:
      fail-fast: true
    steps:
      - uses: actions/checkout@v2
      # In the checkout@v2, it doesn't support git submodule. Execute the commands manually.
      - name: checkout submodules
        shell: bash
        run: |
          git submodule sync --recursive
          git -c protocol.version=2 submodule update --init --force --recursive --depth=1
      - uses: actions/cache@v1
        with:
          path: ~/.m2/repository
          key: ${{ runner.os }}-maven-${{ hashFiles('**/pom.xml') }}
          restore-keys: |
            ${{ runner.os }}-maven-
      - uses: actions/setup-java@v1
        with:
          java-version: 8
      - name: Build SkyWalking Agent
        run: ./mvnw clean package -DskipTests -Pagent >/dev/null
      - name: Build the Docker image
        run: ./mvnw -f test/plugin/pom.xml clean package -DskipTests docker:build -DBUILD_NO=local >/dev/null
      - name: Run kafka 0.11.0.0-2.3.0 (16)
        run: bash test/plugin/run.sh kafka-scenario