Project

General

Profile

Wiki » History » Revision 22

Revision 21 (dheidler, 2019-07-02 11:15) → Revision 22/423 (dheidler, 2019-07-02 11:15)

# test results overview 
 * Latest report based on openQA test results http://s.qa.suse.de/test-status , SLE12: http://s.qa.suse.de/test-status-sle12 , SLE15: http://s.qa.suse.de/test-status-sle15 


 # QA SLE Functional - Team description 

 {{toc}} 

 **QSF (QA SLE Functional)** is a virtual team focusing on QA of the "functional" domain of the SUSE SLE products. The virtual team is mainly comprised of members of [SUSE QA SLE Nbg](https://wiki.suse.net/index.php/SUSE-Quality_Assurance/Organization/Members_and_Responsibilities#QA_SLE_NBG_Team) including members from [SUSE QA SLE Prg](https://wiki.suse.net/index.php/SUSE-Quality_Assurance/Organization/Members_and_Responsibilities#QA_SLE_PRG_Team). The [SLE Departement](https://wiki.suse.net/index.php/SUSE-Quality_Assurance/SLE_Department#QSF_.28QA_SLE_Functional.29) page describes our QA responsibilities. We focus on our automatic tests running in [openQA](https://openqa.suse.de) under the job groups "Functional" as well as "Autoyast" for the respective products, for example [SLE 15 / Functional](https://openqa.suse.de/group_overview/110) and [SLE 15 / Autoyast](https://openqa.suse.de/group_overview/129). We back our automatic tests with exploratory manual tests, especially for the product milestone builds. Additionally we care about corresponding openSUSE openQA tests (see as well https://openqa.opensuse.org). 

 * long-term roadmap: http://s.qa.suse.de/qa-long-term 
 * overview of current openQA SLE12SP5 tests with progress ticket references: https://openqa.suse.de/tests/overview?distri=sle&version=12-SP5&groupid=139&groupid=142 
 * fate tickets for SLE12SP5 feature testing: based on http://s.qa.suse.de/qa_sle_functional_feature_tests_sle12sp5 new report based on all tickets with milestone before SLE12SP5 GM, http://s.qa.suse.de/qa_sle_functional_feature_tests_sle15sp1 for SLE15SP1 
 * only "blocker" or "shipstopper" bugs on "interesting products" for SLE15 http://s.qa.suse.de/qa_sle_functional_bug_query_sle15_2, http://s.qa/qa_sle_bugs_sle12_2 for SLE12 
 * Better organization of planned work can be seen at the [SUSE QA](https://progress.opensuse.org/projects/suseqa) project (which is not public). 

 # Test plan 

 When looking for coverage of certain components or use cases keep the [openQA glossary](http://open.qa/docs/#concept) in mind. It is important to understand that "tests in openQA" could be a scenario, for example a "textmode installation run", a combined multi-machine scenario, for example "a remote ssh based installation using X-forwarding", or a test module, for example "vim", which checks if the vim editor is correctly installed, provides correct rendering and basic functionality. You are welcome to contact any member of the team to ask for more clarification about this. 

 In detail the following areas are tested as part of "SLE functional": 

 * different hardware setups (UEFI, acpi) 
 * support for localization 
 * openSUSE: virtualization - some "virtualization" tests are active on o3 with reduced set compared to SLE coverage (on behalf of QA SLE virtualization due to team capacity constraints, clarified in QA SLE coordination meeting 2018-03-28) 
 * openSUSE: migration - comparable to "virtualization", a reduced set compared to SLE coverage is active on o3 (on behalf of QA SLE migration due to team capacity constraints, clarified in QA SLE coordination meeting 2018-04) 


 ## QSF-y 
 List of the tested areas: 
 * Installation testing 
 * RAID (levels 0, 1, 10, 5, 6) 
 * USBinstall 
 * allpatterns 
 * autoyast (installer features, profile features, reinstall, tftp, …) 
 * filesystems (btrfs, ext4, xfs; btrfs features: snapper, qgroups, balancing, send-receive) 
 * lvm (+RAID, resize, full-encrypt, cryptlvm, activate existing) 
 * dud_sdk 
 * YaST configuration modules including services 
 * default installation (gnome installation) 
 * partition layouts (GPT) 
 * medium checks (rescue system, mediacheck with integrity, memtest) 
 * Addon, extension and module selection and registration (different repository sources) 
 * Basic install and functionality tests of SLE modules, for example public cloud module, etc. 
 * registration of installed system 
 * minimal server installation 
 * SMT (only installation) 
 * remote installation (VNC, SSH, SSH+X-Forwarding) 
 * PXE-Boot 
 * different system roles (KVM, XEN) 
 * installer self-update 
 * installation system features (activation of existing volumes, hostname setting, SSH key import, etc.) 
 * special network/disk devices (zfcp, nvme, multipath, iSCSI) 
 * the SLE product ["RT"](https://progress.opensuse.org/issues/43199) 

 Detailed test plan for SLES and RT can be found here: [SLES_Integration_Level_Testplan.md](https://gitlab.suse.de/riafarov/qa-sle-functional-y/blob/master/SLES_Integration_Level_Testplan.md) 

 * Latest report based on openQA test results SLE12: http://s.qa.suse.de/test-status-sle12-yast , SLE15: http://s.qa.suse.de/test-status-sle15-yast 


 ## QSF-u 

 "Testing is the future, and the future starts with you" 

 * basic operations (firefox, zypper, logout/reboot/shutdown) 
 * boot_to_snapshot 
 * functional application tests (kdump, gpg, ipv6, java, git, openssl, openvswitch, VNC) 
 * NIS (server, client) 
 * toolchain (development module) 
 * systemd 
 * "transactional-updates" as part of the corresponding SLE server role, not CaaSP 

 * Latest report based on openQA test results SLE12: http://s.qa.suse.de/test-status-sle12-functional , SLE15: http://s.qa.suse.de/test-status-sle15-functional 


 ## Explicitly not covered by QSF 

 * quarterly updated media: Expected to be covered by Maintenance + QAM 


 ### What we do 

 We collected opinions, personal experiences and preferences starting with the following four topics: What are fun-tasks ("new tests", "collaborate", "do it right"), what parts are annoying ("old & sporadic issues"), what do we think is expected from qsf-u ("be quick", "keep stuff running", "assess quality") and what we should definitely keep doing to prevent stakeholders becoming disappointed ("build validation", "communication & support"). 

 #### How we work on our backlog 

 * no "due date" 
 * we pick up tickets that have not been previously discussed 
 * more flexible choice 
 * WIP-limits: 
  * global limit of 10 tickets "In Progress" 

 * target numbers or "guideline", "should be", in priorities: 
  1. New, untriaged: 0 
  2. Workable: 40 
  3. New, assigned to [u]: ideally less than 200 (should not stop you from triaging) 

 * SLAs for priority tickets - how to ensure to work on tickets which are more urgent? 
  * "taken": <1d: immediate -> looking daily 
  * 2-3d: urgent 
  * first goal is "urgency removal": <1d: immediate, 1w: urgent 

 * our current "cycle time" is 1h - 1y (maximum, with interruptions) 

 * everybody should set priority + milestone in obvious cases, e.g. new reproducible test failures in multiple critical scenarios, in general case the PO decides 

 #### How we like to choose our battles 

 We self-assessed our tasks on a scale from "administrative" to "creative" and found in the following descending order: daily test review (very "administrative"), ticket triaging, milestone validation, code review, create needles, infrastructure issues, fix and cleanup tests, find bugs while fixing failing tests, find bugs while designing new tests, new automated tests (very "creative"). Then we found we appreciate if our work has a fair share of both sides. Probably a good ratio is 60% creative plus 40% administrative tasks. Both types have their advantages and we should try to keep the healthy balance. 


 #### What "product(s)" do we (really) *care* about? 

 Brainstorming results: 

 * openSUSE Krypton -> good example of something that we only remotely care about or not at all even though we see the connection point, e.g. test plasma changes early before they reach TW or Leap as operating systems we rely on or SLE+packagehub which SUSE does not receive direct revenue from but indirect benefit. Should be "community only", that includes members from QSF though 
 * openQA -> (like OBS), helps to provide ROI for SUSE 
 * SLE(S) (in development versions) 
 * Tumbleweed 
 * Leap, because we use it 
 * SLES HA 
 * SLE migration 
 * os-autoinst-distri-opensuse+backend+needles 

 From this list strictly no "product" gives us direct revenue however most likely SLE(S) (as well as SLES HA and SLE migration) are good examples of direct connection to revenue (based on SLE subscriptions). Conducting a poll in the team has revealed that 3 persons see "SLE(S)" as our main product and 3 see "os-autoinst-distri-opensuse+backend+needles" as the main product. We mainly agreed that however we can not *own* a product like "SLE" because that product is mainly not under our control. 

 Visualizing "cost of testing" vs. "risk of business impact" showed that both metrics have an inverse dependency, e.g. on a range from "upstream source code" over "package self-tests", "openSUSE Factory staging", "Tumbleweed", "SLE" we consider SLE to have the highest business risk attached and therefore defines our priority however testing at upstream source level is considered most effective to prevent higher cost of bugs or issues. Our conclusion is that we must ensure that the high-risk SLE base has its quality assured while supporting a quality assurance process as early as possible in the development process. package self-tests as well as the openQA staging tests are seen as a useful approach in that direction as well as "domain specfic specialist QA engineers" working closely together with according in-house development parties. 

 # Documentation 

 This documentation should only be interesting for the team QA SLE functional. If you find that some of the following topics are interesting for other people, please extract those topics to another wiki section. 

 ### QA SLE functional Dashboards 

 In room 3.2.15 from Nuremberg office are two dedicated laptops each with a monitor attached showing a selected overview of openQA test resuls with important builds from SLE and openSUSE. 
 Such laptops are configured with a root account with the default password for production machines. First point of contact: [slindomansilla.suse.com](mailto:slindomansilla@suse.com), (okurz@suse.de)[mailto:okurz@suse.de] 

 * ''dashboard-osd-3215.suse.de'': Showing current view of openqa.suse.de filtered for some job group results, e.g. "Functional" 
 * ''dashboard-o3-3215.suse.de'': Showing current view of openqa.opensuse.org filtered for some job group results which we took responsibility to review and are mostly interested in 


 #### dashboard-osd-3215 

 * OS: openSUSE Tumbleweed 
 * Services: ssh, mosh, vnc, x2x 
 * Users: 
 ** root 
 ** dashboard 
 * VNC: `vncviewer dashboard-osd-3215` 
 * X2X: `ssh -XC dashboard@dashboard-osd-3215 x2x -west -to :0.0` 
 ** (attaches the dashboard monitor as an extra display to the left of your screens. Then move the mouse over and the attached X11 server will capture mouse and keyboard) 


 #### Content of /home/dashboard/.xinitrc 

 ``` 
 # 
 # Source common code shared between the 
 # X session and X init scripts 
 # 
 . /etc/X11/xinit/xinitrc.common 

 xset -dpms 
 xset s off 
 xset s noblank 
 [...] 
 # 
 # Add your own lines here... 
 # 
 $HOME/bin/osd_dashboard & 
 ``` 

 #### Content of /home/dashboard/bin/osd_dashboard 

 ``` 
 #!/bin/bash 

 DISPLAY=:0 unclutter & 

 DISPLAY=:0 xset -dpms 
 DISPLAY=:0 xset s off 
 DISPLAY=:0 xset s noblank 

 url="${url:-"https://openqa.suse.de/?group=SLE+15+%2F+%28Functional%7CAutoyast%29&default_expanded=1&limit_builds=3&time_limit_days=14&show_tags=1&fullscreen=1#"}" 
 DISPLAY=:0 chromium --kiosk "$url" 
 ``` 

 #### Cron job: 

 ``` 
 Min       H         DoM       Mo        DoW       Command 
 * 	 * 	 * 	 * 	 * 	 /home/dashboard/bin/reload_midori 
 ``` 

 #### Content of /home/dashboard/bin/reload_chromium 

 ``` 
 #!/bin/bash 

 DISPLAY=:0 xset -dpms 
 DISPLAY=:0 xset s off 
 DISPLAY=:0 xset s noblank 

 DISPLAY=:0 xdotool windowactivate $(DISPLAY=:0 xdotool search --class Chromium) 
                                                                                                                                    
 DISPLAY=:0 xdotool key F5 
 DISPLAY=:0 xdotool windowactivate $(DISPLAY=:0 xdotool getactivewindow) 
 ``` 

 #### Issues: 

 * ''When the screen shows a different part of the web page'' 
 ** a simple mouse scroll through vnc or x2x may suffice. 
 * ''When the builds displayed are freeze without showing a new build, it usually means that midori, the browser displaying the info on the screen, crashed.'' 
 ** you can try to restart midori this way: 
 *** ps aux | grep midori 
 *** kill $pid 
 *** /home/dashboard/bin/osd_dashboard 
 ** If this also doesn't work, restart the machine.