This repository contains default configuration for running Molecule tests for SURF Research Cloud (SRC) Components and Catalog Items. The repository is meant to be included into other repositories as a subtree.
Follow the installation and setup instructions below, then run:
molecule -c molecule/ext/molecule-src/molecule.yml test -s <scenario-name>
...where <scenario-name>
is the name of one of the subdirectories of the molecule
directory, e.g. playbook-security_updates
.
- Docker and/or Podman (to spin up test containers)
- Python and pip
- Ansible
- Molecule
- Access to the test container images
Before you start, run:
pip install -r molecule/ext/molecule-src/requirements.txt
to install Molecule itself and other python dependencies.ansible-galaxy install -r molecule/ext/molecule-src/requirements.yml
to install Ansible collection dependencies.
The default molecule.yml
is configured to use the images from this package, but you can override this to use other images.
The default molecule.yml
is configured to use the images from this package, but you can also override this to use other images. There are two ways to provide Molecule with access to the right images:
- Manually pull the images from the container registry. If the images are already available locally, there is no need to authenticate with the container registry.
docker login ghcr.io
(orpodman login
)- enter your github username and a valid token
docker pull <imgname>
(orpodman pull
)- See the package for the image names
- If you set the right variables when running
molecule
, it will pull the images automatically.export DOCKER_REGISTRY=ghcr.io
export DOCKER_USER=githubusername
export DOCKER_PW=githubtoken
NB: this is not necessary for running tests on a repository already containing the configuration files from this repository, only to add tests to a repository that does not contain them yet.
To add Molecule tests to your SRC component or catalog item repository, follow these steps:
- create a
molecule
directory in your repository's root:mkdir molecule
- include the contents of this repository as a subtree, under
molecule/ext/molecule-src
git remote add molecule-src https://github.com/UtrechtUniversity/SRC-molecule.git
git subtree add --prefix molecule/ext/molecule-src molecule-src main --squash
- copy the default
.env.yml
file to your repository root:cp molecule/ext/molecule-src/default.env.yml .env.yml
- optionally edit the contents of
.env.yml
, if your playbooks are not in the default location (the repository root)
- optionally edit the contents of
- run
pip install -r molecule/ext/molecule-src/requirements.txt
That's it for setup! You're now ready to start adding your own scenarios.
Molecule runs tests for each scenario defined under the molecule
directory. You can think of each scenario as a self-contained test suite. A scenario is just a subdirectory of the molecule
directory that contains a number of configuration files and playbooks. For our purposes, these are minimally:
molecule.yml
- sets general configuration variables for the test suite (e.g. what platform to run on). Overrides the defaults inmolecule/ext/molecule-src/molecule.yml
.prepare.yml
- a playbook used to make preparations on the container before running the Ansible code that we want to test on it.converge.yml
- a playbook that specifies how to deploy the Ansible role or playbook that we want to test on the container.verify.yml
- a playbook that contains additional test assertions after theconverge
step is run.
We want to test our SURF Research Cloud (SRC) components in a specific way, namely by:
- copying them onto the workspace
- then executing them with Ansible on the workspace (as opposed to using Ansible on the host).
We want this procedure because that is how components are actually deployed onto SRC workspaces.
To help us achieve this, the default
scenario contains a prepare.yml
that takes care of 1., and a converge.yml
that takes care of 2. Each individual scenario will automatically use these default playbooks, as long as molecule
is run with the -c molecule/default/molecule.yml
.
To create a Molecule scenario to test, just create a subdirectory of the molecule
directory, e.g.:
mkdir molecule/my-component
Now add a molecule.yml
file to the my-component
subdirectory, with contents like the following:
provisioner:
name: ansible
env:
components:
- name: my-component
path: my-component.yaml
parameters: # Define all parameters needed by the component here
my_component_param1: 'Foo'
- name: my-git-component # You can also provide components that should be cloned onto the workspace using git
git: https://github.com/foo/bar.git
version: my_branch
path: playbook.ymk
The above config file does not provide a platforms
key, so tests for this scenario will use the default platforms (containers) specified in molecule/ext/molecule-src/molecule.yml
(Ubuntu Focal and Ubuntu Jammy). You can override this by adding your own platform definition, e.g.:
platforms:
- name: workspace-src-ubuntu_focal-desktop
image: ghcr.io/utrechtuniversity/src-test-workspace:ubuntu_focal-desktop # You can also change this to another image
pre_build_image: true
# The following lines are an example of how to specify a container registry to pull the image from, if it is not already available locally.
registry:
url: $DOCKER_REGISTRY # Use environment variables to define the URL and credentials
credentials:
username: $DOCKER_USER
Note that you can also define multiple platforms.
The molecule tests can use either Docker or Podman (default). You can override the default driver in your scenario's molecule.yml
. Or even easier: set an environment variable like DRIVER=docker
.
Sometimes it may be helpful to perform certain tasks before the converge
step. The default prepare.yml
playbook will check if the user has set the extra_prepare_tasks
key in the scenario's molecule.yml
env
section. Set this key to a relative path to a playbook (relative to the location of the default molecule configuration), and the tasks in that playbook will be executed at the end of the prepare
step.
You can a verify.yml
to your scenario to perform additional assertions. See the Molecule docs.
The main thing we are testing using Molecule is whether our playbooks are deployable on SRC workspaces. Since Ansible itself checks whether each task is actually successful (i.e. changes the target in the required way), we do not need to assert that everything we do in a playbook actually happens: when a playbook contains the instruction to e.g. install a certain package, and the playbook deploys on our test containers without error, we know that the container is in the required state.
However, in some cases, it may be desirable to perform additional assertions after deployment is complete. Molecule allows you to do this by adding a verify.yml
playbook to your scenario. You can use this perform assertions either using Ansible's own assert module, or using testinfra.
What can/should be tested in a verify.yml
? For instance:
- behaviour that is conditional on certain parameters, and therefore not already triggered by simply executing the playbook on the test container (in
converge.yml
) - lower level behaviour: e.g., not whether service
apache2
is running (we know that it is, since we require this in our playbook), but whether connecting to port 80 actually yields the desired webservice (e.g. a Jupyter notebook).
For debugging and development purposes, it can be useful to inspect what's going on on a container after executing a playbook or role on it. There are two ways of doing this:
- Run
molecule
with thecreate
command instead of thetest
command:molecule -c molecule/default/molecule.yml create -s <scenario-name>
- Run
molecule
with the--destroy=never
flag:molecule -c molecule/default/molecule.yml test -s <scenario-name> --destroy=never
Both of these methods ensure that the container is not destroyed after molecule is done. This means you can then login to the container and see what's going on. For instance, after molecule is done, you can:
docker container list
- see that the container
workspace-src-ubuntu_focal
is still running
docker exec -it workspace-src-ubuntu_focal bash
- login to the container as root
Problem: the converge
step fails with the following error message in Ansible's stderr
result:
'ERROR! the playbook: /rsc/plugins/componentname/playbookname.yml could not be found'
This can occassionally occur when Molecule thinks it has already run the prepare
step on your container, but actually hasn't. (This happens, for instance, when the converge
step uses as an old container that is still running because you used --destroy=never
in a previous run.)
Try resetting your molecule cache:
molecule -c molecule/ext/molecule-src/molecule.yml reset -s playbook-aptly
This will stop the container and flush the cache. Sometimes manually removing the cache may also be useful during troubleshooting:
rm -rf ~/.cache/molecule
Molecule runs sometimes fail with an error message like the following:
task path: /home/user/researchcloud-items/molecule/ext/molecule-src/prepare.yml:2
fatal: [workspace-src-ubuntu_jammy]: UNREACHABLE! => changed=false
msg: 'Failed to create temporary directory. In some cases, you may have been able to authenticate and did not have permissions on the target directory. Consider changing the remote tmp path in ansible.cfg to a path rooted in "/tmp", for more error information use -vvv. Failed command was: ( umask 77 && mkdir -p "` echo ~/.ansible/tmp `"&& mkdir "` echo ~/.ansible/tmp/ansible-tmp-1710760454.6766412-70112-138145577949983 `" && echo ansible-tmp-1710760454.6766412-70112-138145577949983="` echo ~/.ansible/tmp/ansible-tmp-1710760454.6766412-70112-138145577949983 `" ), exited with result 1'
unreachable: true
This may occur when trying to initalize a container with the command parameter set to /sbin/init
, i.e. when trying to run a container controlled by systemd
. Some component tests may need this, because they are testing functionality of systemd
services. However, in some circumstances, starting a container with /sbin/init
fails:
- Docker support for
systemd
is not excellent, try using Podman instead. - The error also occurs when using container emulation (e.g. using an
amd64
image on anarm64
host). Get a native image instead. - Adding the
privileged: true
option to the platform usually takes care of the problem (even when using Docker!), but this is only recommended as a workaround for security reasons.