Skip to content

Commit

Permalink
feat(RHIDP-3674): Add MVP scenario that matches latest v1.2 version o…
Browse files Browse the repository at this point in the history
…f RHDH

Signed-off-by: Pavel Macík <[email protected]>
  • Loading branch information
pmacik committed Sep 9, 2024
1 parent cdf411d commit 916dc39
Show file tree
Hide file tree
Showing 6 changed files with 347 additions and 14 deletions.
2 changes: 1 addition & 1 deletion Makefile
Original file line number Diff line number Diff line change
Expand Up @@ -175,7 +175,7 @@ test: $(TMP_DIR) $(ARTIFACT_DIR)
ifneq ($(shell test '$(AUTH_PROVIDER)' == 'keycloak' && echo 1 || echo 0),0)
$(eval key_pass := $(shell oc -n rhdh-performance get secret perf-test-secrets -o template --template='{{.data.keycloak_user_pass}}' | base64 -d))
$(eval key_host := $(shell oc -n rhdh-performance get routes/keycloak -o template --template='{{.spec.host}}' ))
$(eval LOCUST_EXTRA_CMD := --keycloak-host $(key_host) --keycloak-password $(key_pass) )
$(eval LOCUST_EXTRA_CMD := $(LOCUST_EXTRA_CMD) --keycloak-host $(key_host) --keycloak-password $(key_pass) )
ifneq ($(shell test $(USERS) -gt $(WORKERS) && echo 1 || echo 0),0)
@echo "users greater than workers "
else
Expand Down
2 changes: 1 addition & 1 deletion ci-scripts/rhdh-setup/create_resource.sh
Original file line number Diff line number Diff line change
Expand Up @@ -279,7 +279,7 @@ get_token() {
log_token_err "Unable to get token, re-attempting"
fi
else
keycloak_pass=$(oc -n "${RHDH_NAMESPACE}" get secret credential-example-sso -o template --template='{{.data.ADMIN_PASSWORD}}' | base64 -d)
keycloak_pass=$(oc -n "${RHDH_NAMESPACE}" get secret credential-rhdh-sso -o template --template='{{.data.ADMIN_PASSWORD}}' | base64 -d)
if ! keycloak_token >"$token_file"; then
log_token_err "Unable to get token, re-attempting"
fi
Expand Down
2 changes: 1 addition & 1 deletion ci-scripts/rhdh-setup/template/keycloak/keycloak.yaml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
apiVersion: keycloak.org/v1alpha1
kind: Keycloak
metadata:
name: example-sso
name: rhdh-sso
labels:
app: sso
spec:
Expand Down
43 changes: 43 additions & 0 deletions scenarios/mvp-1dot2.metrics.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,43 @@
# Results
{%macro results_scenario(name) -%}
- name: results.{{name}}.locust_requests_avg_response_time
monitoring_query: locust_requests_avg_response_time{name="{{name}}"}
monitoring_step: 15
- name: results.{{name}}.locust_requests_avg_content_length
monitoring_query: locust_requests_avg_content_length{name="{{name}}"}
monitoring_step: 15
- name: results.{{name}}.locust_requests_current_rps
monitoring_query: locust_requests_current_rps{name="{{name}}"}
monitoring_step: 15
- name: results.{{name}}.locust_requests_current_fail_per_sec
monitoring_query: locust_requests_current_fail_per_sec{name="{{name}}"}
monitoring_step: 15
- name: results.{{name}}.locust_requests_num_failures
monitoring_query: locust_requests_num_failures{name="{{name}}"}
monitoring_step: 15
- name: results.{{name}}.locust_errors
monitoring_query: locust_errors{name="{{name}}"}
monitoring_step: 15
{%- endmacro %}

{{ results_scenario('/api/catalog/entities/by-query') }}
{{ results_scenario('/api/catalog/entities/by-query?limit=0&filter=kind%3Dapi') }}
{{ results_scenario('/api/catalog/entities/by-query?limit=20&orderField=metadata.name%2Casc&filter=kind%3Dapi') }}
{{ results_scenario('/api/catalog/entities/by-query?limit=0&filter=kind%3Dcomponent') }}
{{ results_scenario('/api/catalog/entities/by-query?limit=20&orderField=metadata.name%2Casc&filter=kind%3Dcomponent') }}
{{ results_scenario('/api/catalog/entity-facets') }}
{{ results_scenario('/api/catalog/entity-facets?facet=kind') }}
{{ results_scenario('/api/catalog/entity-facets?facet=metadata.namespace') }}
{{ results_scenario('/api/catalog/entity-facets?facet=metadata.namespace&filter=kind%3Dapi') }}
{{ results_scenario('/api/catalog/entity-facets?facet=metadata.namespace&filter=kind%3Dcomponent') }}
{{ results_scenario('/api/catalog/entity-facets?facet=metadata.tags') }}
{{ results_scenario('/api/catalog/entity-facets?facet=metadata.tags&filter=kind%3Dapi') }}
{{ results_scenario('/api/catalog/entity-facets?facet=metadata.tags&filter=kind%3Dcomponent') }}
{{ results_scenario('/api/catalog/entity-facets?facet=relations.ownedBy') }}
{{ results_scenario('/api/catalog/entity-facets?facet=spec.lifecycle') }}
{{ results_scenario('/api/catalog/entity-facets?facet=spec.lifecycle&filter=kind%3Dapi') }}
{{ results_scenario('/api/catalog/entity-facets?facet=spec.lifecycle&filter=kind%3Dcomponent') }}
{{ results_scenario('/api/catalog/entity-facets?facet=spec.type&filter=kind%3Dapi') }}
{{ results_scenario('/api/catalog/entity-facets?facet=spec.type&filter=kind%3Dcomponent') }}
{{ results_scenario('/api/catalog/entities/by-refs') }}
#... to be continued
290 changes: 290 additions & 0 deletions scenarios/mvp-1dot2.py
Original file line number Diff line number Diff line change
@@ -0,0 +1,290 @@
from locust import HttpUser, events, task
from locust.runners import MasterRunner, WorkerRunner
from urllib3.exceptions import InsecureRequestWarning
import urllib.parse
import json
import re
import urllib3

urllib3.disable_warnings(InsecureRequestWarning)

__version__ = "1"

usernames = []

entity_facets_params = {}

entity_facets_params["kind"] = {
"facet": "kind",
}

entity_facets_params["relations.ownedBy"] = {
"facet": "relations.ownedBy",
}

entity_facets_params["metadata.namespace"] = {
"facet": "metadata.namespace",
}

entity_facets_params["spec.lifecycle"] = {
"facet": "spec.lifecycle",
}

entity_facets_params["metadata.tags"] = {
"facet": "metadata.tags",
}

entity_facets_params["component/spec.lifecycle"] = {
"facet": "spec.lifecycle",
"filter": "kind=component"
}

entity_facets_params["component/spec.type"] = {
"facet": "spec.type",
"filter": "kind=component"
}

entity_facets_params["component/metadata.namespace"] = {
"facet": "metadata.namespace",
"filter": "kind=component"
}

entity_facets_params["component/metadata.tags"] = {
"facet": "metadata.tags",
"filter": "kind=component"
}

entity_facets_params["api/spec.lifecycle"] = {
"facet": "spec.lifecycle",
"filter": "kind=api"
}

entity_facets_params["api/spec.type"] = {
"facet": "spec.type",
"filter": "kind=api"
}

entity_facets_params["api/metadata.namespace"] = {
"facet": "metadata.namespace",
"filter": "kind=api"
}

entity_facets_params["api/metadata.tags"] = {
"facet": "metadata.tags",
"filter": "kind=api"
}


def get_entities_by_query_params(kind, limit=0, user_ref=None, group_ref=None, spec_type=None):
filter = f"kind={kind}"
if user_ref is not None:
filter += f",relations.ownedBy={user_ref}"
if group_ref is not None:
filter += f",relations.ownedBy={group_ref}"
params = {}
params["limit"] = limit
if limit > 0:
params["orderField"] = "metadata.name,asc"
params["filter"] = filter
return params


base_path_facets = "/api/catalog/entity-facets"
base_path_entities = "/api/catalog/entities"


def setup_test_users(environment, msg, **kwargs):
# Fired when the worker receives a message of type 'test_users'
usernames.extend(map(lambda u: u, msg.data))


@events.init.add_listener
def on_locust_init(environment, **_kwargs):
if not isinstance(environment.runner, MasterRunner):
environment.runner.register_message("test_users", setup_test_users)


@events.test_start.add_listener
def on_test_start(environment, **_kwargs):
# When the test is started, evenly divides list between
# worker nodes to ensure unique data across threads
if not isinstance(environment.runner, WorkerRunner):
users = []
for i in range(1, int(environment.runner.target_user_count)+1):
users.append(f"test{i}")

worker_count = environment.runner.worker_count
chunk_size = int(len(users) / worker_count)

for i, worker in enumerate(environment.runner.clients):
start_index = i * chunk_size

if i + 1 < worker_count:
end_index = start_index + chunk_size
else:
end_index = len(users)

data = users[start_index:end_index]
environment.runner.send_message("test_users", data, worker)


@events.init_command_line_parser.add_listener
def _(parser):
parser.add_argument("--keycloak-host", type=str, default="")
parser.add_argument("--keycloak-password", is_secret=True, default="")
parser.add_argument("--debug", type=bool, default=False)


class MVP_1dot2_Test(HttpUser):

def on_start(self):
self.client.verify = False
if self.environment.parsed_options.keycloak_host:
r = self.client.get('/api/auth/oauth2Proxy/refresh', verify=False)
qs_str = urllib.parse.parse_qs(r.url)
STATE = qs_str['state']
login_cookies = r.cookies
pattern = r'action="([^"]*)"'
LOGIN_URL_tmp = re.findall(pattern, str(r.content))[0]
LOGIN_URL = LOGIN_URL_tmp.replace("&amp;", "&")
qs_str = urllib.parse.parse_qs(LOGIN_URL)
TAB_ID = qs_str['tab_id']
EXECUTION = qs_str['execution']

param = {'client_id': self.CLIENTID,
'tab_id': TAB_ID, 'execution': EXECUTION}
form = {'username': self.USERNAME,
'password': self.PASSWORD, 'credentialId': ''}
r = self.client.post(LOGIN_URL, verify=False,
data=form, params=param)

r = self.client.get(self.REFRESH_URL, verify=False)
json_dict = json.loads(r.content)
TOKEN = json_dict['backstageIdentity']['token']
idetity_refs = json_dict['backstageIdentity']['identity']['ownershipEntityRefs']
for id_ref in idetity_refs:
if str(id_ref).startswith("group"):
self.GROUP_REF = id_ref
continue
if str(id_ref).startswith("user"):
self.USER_REF = id_ref

self.HEADER = {'Authorization': 'Bearer ' + TOKEN}
else:
r = self.client.get('/api/auth/guest/refresh', verify=False)
json_dict = json.loads(r.content)
TOKEN = json_dict['backstageIdentity']['token']

idetity_refs = json_dict['backstageIdentity']['identity']['ownershipEntityRefs']
for id_ref in idetity_refs:
if str(id_ref).startswith("group"):
self.GROUP_REF = id_ref
continue
if str(id_ref).startswith("user"):
self.USER_REF = id_ref

self.HEADER = {'Authorization': 'Bearer ' + TOKEN}

def __init__(self, parent):
super().__init__(parent)
self.HEADER = ''
if self.environment.parsed_options.keycloak_host:
self.USERNAME = usernames.pop()
host = self.environment.parsed_options.keycloak_host
self.KEYCLOAK_URL = f'https://{host}/auth'
host = self.environment.host
self.REDIRECT_URL = f'{host}/oauth2/callback'
host = self.environment.host
self.REFRESH_URL = f'{host}/api/auth/oauth2Proxy/refresh'

self.PASSWORD = self.environment.parsed_options.keycloak_password
self.REALM = "backstage"
self.CLIENTID = "backstage"

def entitiy_facets(self, query) -> None:
self.client.get(base_path_facets,
verify=False,
headers=self.HEADER,
params=entity_facets_params[query])

def entities_by_query(self, kind, limit=0, user_ref=None, group_ref=None, spec_type=None) -> None:
r = self.client.get(f"{base_path_entities}/by-query",
verify=False,
headers=self.HEADER,
params=get_entities_by_query_params(kind, limit, user_ref, group_ref, spec_type))
if self.environment.parsed_options.debug:
size = sum(len(chunk) for chunk in r.iter_content(8196))
debug_output = f"\n[DEBUG][entities_by_query]"
debug_output += f" kind={kind}"
debug_output += f", limit={limit}"
debug_output += f", user_ref={user_ref}"
debug_output += f", group_ref={group_ref}"
debug_output += f", spec_type={spec_type}"
debug_output += f", response_size={size}"
debug_output += f", response={r.content}\n"
print(debug_output)

def entities_by_refs(self, refs=[]):
entity_refs = {"entityRefs": refs}
r = self.client.post(f"{base_path_entities}/by-refs",
verify=False,
headers=self.HEADER,
json=entity_refs)
if self.environment.parsed_options.debug:
size = sum(len(chunk) for chunk in r.iter_content(8196))
debug_output = f"\n[DEBUG][entities_by_refs]"
debug_output += f", response_size={size}"
debug_output += f", response={r.content}\n"
print(debug_output)

@task
def execute(self) -> None:
# Load Catalog
self.entitiy_facets("relations.ownedBy")
self.entitiy_facets("kind")
self.entitiy_facets("spec.lifecycle")
self.entitiy_facets("metadata.tags")
self.entitiy_facets("metadata.namespace")
self.entities_by_query(kind="component", limit=20)
self.entities_by_query(kind="component", limit=20)
self.entitiy_facets("component/spec.type")
self.entities_by_query(
kind="component",
limit=0, user_ref=self.USER_REF, group_ref=self.GROUP_REF)
self.entities_by_query(kind="component", limit=0)
self.entitiy_facets("component/spec.lifecycle")
self.entitiy_facets("component/metadata.tags")
self.entitiy_facets("component/metadata.namespace")
self.entities_by_refs([self.GROUP_REF])
self.entities_by_query(
kind="component",
limit=20, user_ref=self.USER_REF, group_ref=self.GROUP_REF)

# Switch to API
self.entities_by_query(
kind="api",
limit=20, user_ref=self.USER_REF, group_ref=self.GROUP_REF)
self.entitiy_facets("api/spec.type")
self.entities_by_query(
kind="api",
limit=0, user_ref=self.USER_REF, group_ref=self.GROUP_REF)
self.entities_by_query(kind="api", limit=0)
self.entitiy_facets("api/spec.lifecycle")
self.entitiy_facets("api/metadata.tags")
self.entitiy_facets("api/metadata.namespace")

# Switch to Component
self.entities_by_query(
kind="component",
limit=20, user_ref=self.USER_REF, group_ref=self.GROUP_REF)
self.entitiy_facets("component/spec.lifecycle")
self.entities_by_query(
kind="component",
limit=0, user_ref=self.USER_REF, group_ref=self.GROUP_REF)
self.entities_by_query(kind="component", limit=0)
self.entitiy_facets("component/spec.lifecycle")
self.entitiy_facets("component/metadata.tags")
self.entitiy_facets("component/metadata.namespace")

# Select library
# ... to be continued
Loading

0 comments on commit 916dc39

Please sign in to comment.