Skip to content

Conversation

@richm
Copy link
Contributor

@richm richm commented Jun 3, 2025

NOTE: This also requires upgrading to tox-lsr 3.10.0, and some
hacks to workaround a podman issue in ubuntu.

These tests run the role during a bootc container image build, deploy
the container into a QEMU VM, boot that, and validate the expected
configuration there. They run in two different tox environments, and
thus have to be run in two steps (preparation in buildah, validation in
QEMU). The preparation is expected to output a qcow2 image in
tests/tmp/TESTNAME/qcow2/disk.qcow2, i.e. the output structure of
https://github.com/osbuild/bootc-image-builder.

There are two possibilities:

  • Have separate bootc end-to-end tests. These are tagged with
    tests::bootc-e2 and are skipped in the normal qemu-* scenarios.
    They run as part of the container-* ones.

  • Modify an existing test: These need to build a qcow2 image exactly
    once (via calling bootc-buildah-qcow.sh) and skip setup/cleanup
    and role invocations in validation mode, i.e. when
    __bootc_validation is true.

In the container scenario, run the QEMU validation as a separate step in
the workflow.

See https://issues.redhat.com/browse/RHEL-88396

@richm richm requested a review from ueno as a code owner June 3, 2025 18:25
@richm richm self-assigned this Jun 3, 2025
@sourcery-ai
Copy link

sourcery-ai bot commented Jun 3, 2025

Reviewer's Guide

This PR enhances GitHub Actions workflows to support bootc end-to-end validation tests by upgrading the tox-lsr dependency, applying a temporary podman 5.x workaround on Ubuntu, and extending the qemu-kvm integration workflow with a dedicated QEMU validation step for bootc images.

Sequence Diagram of the bootc CI End-to-End Test Execution

sequenceDiagram
    actor User as "Developer/User"
    participant GA as "GitHub Actions Workflow"
    participant ToxPrep as "Tox (Preparation Environment)"
    participant Builder as "Buildah / bootc-image-builder"
    participant ArtifactStorage as "Artifact Storage (e.g., tests/tmp/...)"
    participant ToxVal as "Tox (Validation Environment)"
    participant QEMU as "QEMU VM"

    User->>+GA: Pushes code / Creates PR
    GA->>+ToxPrep: Trigger Preparation Phase
    ToxPrep->>+Builder: Invoke role & bootc image build script (bootc-buildah-qcow.sh)
    Builder-->>ArtifactStorage: Store disk.qcow2
    ArtifactStorage-->>ToxPrep: disk.qcow2 path
    ToxPrep-->>-GA: Preparation Phase Complete

    GA->>+ToxVal: Trigger Validation Phase (with disk.qcow2 path)
    ToxVal->>+QEMU: Deploy & Boot disk.qcow2
    activate QEMU
    QEMU-->>ToxVal: VM Booted Successfully
    ToxVal->>QEMU: Run Validation Scripts
    QEMU-->>ToxVal: Validation Results
    deactivate QEMU
    ToxVal-->>-GA: Validation Phase Complete
    GA-->>-User: Report Overall Test Status
Loading

File-Level Changes

Change Details Files
Upgrade tox-lsr to version 3.10.0 across CI workflows
  • Bump pip3 install URL for tox-lsr in qemu-kvm-integration-tests.yml
  • Update tox-lsr version in ansible-lint.yml
  • Update tox-lsr version in ansible-managed-var-comment.yml
  • Update tox-lsr version in ansible-test.yml
  • Update tox-lsr version in python-unit-test.yml
.github/workflows/qemu-kvm-integration-tests.yml
.github/workflows/ansible-lint.yml
.github/workflows/ansible-managed-var-comment.yml
.github/workflows/ansible-test.yml
.github/workflows/python-unit-test.yml
Add Ubuntu podman 5.x compatibility hack for bootc scenarios
  • Inject temporary plucky sources via sed for podman upgrade
  • Pin podman and related packages to plucky release
  • Install updated podman, crun, conmon, and containers-storage
.github/workflows/qemu-kvm-integration-tests.yml
Integrate bootc end-to-end validation tests into QEMU workflow
  • Exclude bootc-e2e tests from standard QEMU build runs via skip-tags
  • Add ‘Run bootc validation tests in QEMU’ step for container-bootc images
  • Loop over generated qcow2 images and invoke tox with __bootc_validation flag
  • Capture and archive PASS/FAIL logs per test
.github/workflows/qemu-kvm-integration-tests.yml

Tips and commands

Interacting with Sourcery

  • Trigger a new review: Comment @sourcery-ai review on the pull request.
  • Continue discussions: Reply directly to Sourcery's review comments.
  • Generate a GitHub issue from a review comment: Ask Sourcery to create an
    issue from a review comment by replying to it. You can also reply to a
    review comment with @sourcery-ai issue to create an issue from it.
  • Generate a pull request title: Write @sourcery-ai anywhere in the pull
    request title to generate a title at any time. You can also comment
    @sourcery-ai title on the pull request to (re-)generate the title at any time.
  • Generate a pull request summary: Write @sourcery-ai summary anywhere in
    the pull request body to generate a PR summary at any time exactly where you
    want it. You can also comment @sourcery-ai summary on the pull request to
    (re-)generate the summary at any time.
  • Generate reviewer's guide: Comment @sourcery-ai guide on the pull
    request to (re-)generate the reviewer's guide at any time.
  • Resolve all Sourcery comments: Comment @sourcery-ai resolve on the
    pull request to resolve all Sourcery comments. Useful if you've already
    addressed all the comments and don't want to see them anymore.
  • Dismiss all Sourcery reviews: Comment @sourcery-ai dismiss on the pull
    request to dismiss all existing Sourcery reviews. Especially useful if you
    want to start fresh with a new review - don't forget to comment
    @sourcery-ai review to trigger a new review!

Customizing Your Experience

Access your dashboard to:

  • Enable or disable review features such as the Sourcery-generated pull request
    summary, the reviewer's guide, and others.
  • Change the review language.
  • Add, remove or edit custom review instructions.
  • Adjust other review settings.

Getting Help

Copy link

@sourcery-ai sourcery-ai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hey @richm - I've reviewed your changes - here's some feedback:

  • There are repeated pip install tox-lsr@3.10.0 invocations across multiple workflow files – consider extracting the version into a shared variable or reusable step to reduce duplication.
  • The Podman 5.x pinning workaround manipulates apt sources and preference files without cleanup – please add a cleanup step or a clear TODO to remove this hack once Ubuntu 26.04 LTS is used.
  • The new QEMU validation step loops over qcow2 images but doesn’t handle the case where no images are found – consider adding a guard or informative message to avoid silent skips.
Here's what I looked at during the review
  • 🟢 General issues: all looks good
  • 🟢 Security: all looks good
  • 🟢 Review instructions: all looks good
  • 🟢 Testing: all looks good
  • 🟢 Documentation: all looks good

Sourcery is free for open source - if you like our reviews please consider sharing them ✨
Help me be more useful! Please click 👍 or 👎 on each comment and I'll use the feedback to improve your reviews.

NOTE: This also requires upgrading to tox-lsr 3.10.0, and some
hacks to workaround a podman issue in ubuntu.

These tests run the role during a bootc container image build, deploy
the container into a QEMU VM, boot that, and validate the expected
configuration there. They run in two different tox environments, and
thus have to be run in two steps (preparation in buildah, validation in
QEMU). The preparation is expected to output a qcow2 image in
`tests/tmp/TESTNAME/qcow2/disk.qcow2`, i.e. the output structure of
<https://github.com/osbuild/bootc-image-builder>.

There are two possibilities:

* Have separate bootc end-to-end tests. These are tagged with
`tests::bootc-e2` and are skipped in the normal qemu-* scenarios.
They run as part of the container-* ones.

* Modify an existing test: These need to build a qcow2 image exactly
*once* (via calling `bootc-buildah-qcow.sh`) and skip setup/cleanup
and role invocations in validation mode, i.e. when
`__bootc_validation` is true.

In the container scenario, run the QEMU validation as a separate step in
the workflow.

See https://issues.redhat.com/browse/RHEL-88396

Signed-off-by: Rich Megginson <rmeggins@redhat.com>
@richm richm force-pushed the changes-20250603-1 branch from 9047058 to 9d2707f Compare June 3, 2025 19:30
@richm richm merged commit ca41f0b into main Jun 3, 2025
33 checks passed
@richm richm deleted the changes-20250603-1 branch June 3, 2025 22:31
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants