Azure Compatible Linux Images validations
Перейти к файлу
navpreetkaur1098 8e04be98a3
Add validation tasks to check the correctness of the offertype and client package (#35)
* Added tasks to check repolist in the image

* ADded validation tasks to check  offertype according to client pkg

* Added task for repo validation

* Added task for repo validation

* Updated debug task in the per-vm validation file

* Added a condition to check the client pkg acc to offertype except for base and byol

* Added task to validate for base offertype

* Made a correction in variable offertype

* Added a condition to check the client pkg acc to offertype except for base and byol

* Added correct variables in the repo validation tasks

* Added correct variables in the repo validation tasks

* Removed debug task

* Added tasks for byos and base offer types

* Added debug statement and conditionals

* Added debug statement and conditionals

* Added debug statement and conditionals

* Commented the task for base package validation

* Corrected the variable name

* Added conditional statement in the ansible task

* Modified the task to check offertype according to client pkg

* Modified the task to check offertype according to client pkg

* Made corrections related to syntax

* Made corrections related to syntax

* Made corrections related to syntax

* Modifed the ansible validation task for repo-clint pkg mapping

* Modifed the ansible validation task for repo-clint pkg mapping

* Added validation task for arm64 based architecture packages

* Added ansible.builtin.shell in the tasks

* Added ansible.builtin.shell in the tasks

* Added validation task for client packages against given offertype

* Added log statements for more clarity in output of conditionals

* Modified the logic to validate offertype against client pkg when offer is other than base and byol

* Debuging template error

* Debuging template error

* Debuging template error

* Debuging template error

* Debuging template error

* Debuging template error

* Debuging template error

* Debuging template error

* Debuging template error

* Debuging template error

* Debuging template error

* Debuging template error

* Debuging template error

* Debuging template error

* Debuging template error

* Debuging template error

* Debuging template error

* Debuging template error

* Debuging template error

* Debuging template error

* Debuging template error

* Debuging template error

* Debuging template error

* Debuging template error

* Adding variables in the task for validation of client pkg

* Adding variables in the task for validation of client pkg

* Adding architecture variable

* Added architecture parameter in validation to validate arm64 pkgs also

* Added architecture parameter in validation to validate arm64 pkgs also

* added validation of client pkg against ofeertype when architecture is arm64

* Added debug statement

* Added debug statement

* Added debug statement

* Added variable in the ansible validation task

* Added variable in the ansible validation task

* Added comments to explain the logic of the ansible tasks

* Added comments to explain the logic of the ansible tasks

* Revamping the logic

* Revamping the logic

* Revamping the logic

* Revamping the logic

* Revamping the logic

* Corrected the variable value

* Revamped the logic

* added debug statement

* added debug statement

* added debug statement

* added debug statement

* added debug statement

* added debug statement

* added debug statement

* added debug statement

* added debug statement

* added debug statement

* added debug statement

* added debug statement

* corrected variables

* Added comments in the task, corrected variable naming in the task

* Added comments in the task, corrected variable naming in the task

* Added comments in the task, corrected variable naming in the task

* Added comments in the task, corrected variable naming in the task

* Updated repo-package mapping task

* Updated repo-package mapping task

* Updated repo-package mapping task

* Updated repo-package mapping task

* Added additional check

* Updated comments in the task

* Updated comments in the task

* Updated comments in the task

* Updated the logic

* Added additional comments to get clarity of the validation tasks

* Added a separate file to include the task of repo-validation

* Print variables in repo-validation task

* Print variables in repo-validation task

* Print variables in repo-validation task

* Added debug statements

* Removed a conditional statement

* Added more debug statements

* Added variables in the repo-validation task

* Updated variables in the ansible task

* Updated variables in the ansible task

* Added more comments in the repo-validation task

* Added more comments in the repo-validation task

* Added more comments in the repo-validation task

* Added more comments in the repo-validation task
2024-08-22 14:15:10 +05:30
.github Added the sample PR template to increase productivity and improve PR and review quality (#25) 2023-01-14 20:14:01 +05:30
ansible_image_validation Add validation tasks to check the correctness of the offertype and client package (#35) 2024-08-22 14:15:10 +05:30
azure reverting to spaces for easy management 2020-04-20 22:34:38 +05:30
samples/output output: Add output json file instead of pasting in README.md (#9) 2020-08-03 22:14:14 +05:30
validations User/lmuppa/movefrom test subto prod sub (#11) 2020-11-04 21:22:26 +05:30
.gitignore Adding signing to the commits (#12) 2021-04-21 18:41:38 +05:30
CODE_OF_CONDUCT.md Initial CODE_OF_CONDUCT.md commit 2020-04-17 11:01:08 -07:00
LICENSE Initial LICENSE commit 2020-04-17 11:01:09 -07:00
README.md output: Add output json file instead of pasting in README.md (#9) 2020-08-03 22:14:14 +05:30
SECURITY.md Initial SECURITY.md commit 2020-04-17 11:01:11 -07:00
azure-pipelines.yml Bug on updating variables 2020-05-06 14:51:37 +05:30

README.md

Validations for Linux Images on Azure (Vhd Supported)

Use this script/pipeline to check if your custom linux image (Vhd) built works on Azure.

Table of Contents

  1. Motivation
  2. Requirements
    1. Linux / macOS / Windows
    2. Azure Pipelines
    3. Azure Cloud Shell
  3. Installation
  4. Working
    1. Setup
      1. Current Setup
      2. Future Setup
    2. Output
      1. Current Available Output
      2. Future Enhancement
      3. Example
    3. Validations
      1. Current Available Validations
      2. Future Support / Enhancement
  5. Contributing to the Repository
    1. Areas of contribution
    2. Feature Request, Issue and Bug Reporting
    3. Code Optimizations / Enhancements
    4. Microsoft OpenSource code of conduct
  6. Maintainers

Motivation

We wish to help our customers and also the community who are using Azure to use their Linux Virtual Machines with custom images and generalized images with less hassle. Hence the requirement of this pipeline which the customer/community can fork in their repositories and run as part of their regular validations.

This can also be used by Support teams across and outside Microsoft to validate incoming customers' images using Azure Cloud Shell

Requirements

Linux / macOS / Windows

  1. Terraform
    1. Azure Provider
  2. Azure Account
    1. Azure AAD Appliation Id Setup
    2. Currently AAD Application ID and Client Secret is Supported
    3. Ensure that Azure App has contributor access

Azure Pipelines

  1. Ensure that Terraform is available on Azure pipeline
  2. Ensure that relevant pipeline variables are set

Azure Cloud Shell

All requirements are met. Terraform is already installed by default.

Installation

  1. Ensure that Requirements is met
  2. clone the repo using the following command
    git clone https://github.com/Azure/linux-image-validations
    
  3. Tar the validations folder using the following command
    tar -cvzf validations/* validator.tar.gz
    
  4. Ensure that validator.tar.gz is present inside an Azure Storage Account.
    https://storage_account.blob.core.windows.net/container/validator.tar.gz
    
  5. Create a file called validate_upload.sh with the following details and place it inside the storage account
    #!/bin/bash -e
    generation=$2
    vhdName=$1
    sudo $(which tar) -xzf validator.tar.gz
    
    [[ -n "$(uname -a | grep -i $distro)" || -n "$(uname -a | grep -i debian)" ]] && sudo $(which python) validate.py
    [[ -n "$(uname -a | grep -i $redhat)" || -n "$(uname -a | grep -i centos)" ]] && sudo $(which platform_python) validate.py 
    
    cat logs.json
    
    # Example of a curl call
    echo "https://contoso.com/images/$vhdName/validation/$generation"
    curl --location --request POST "https://contoso.com/images/$vhdName/validation/$generation" \
    --header 'Content-Type: application/json' -d @logs.json
    
    
  6. For folks who wish to run from commandline. Do note that this is to be performed after previous steps are in place.
    1. Deploying Resources (Terraform variables / Environment variables can also be used)
    cd linux-image-validations/azure
    terraform apply
    
    1. Cleanup of Resources
    cd linux-image-validations/azure
    terraform destroy
    

Working

Terraform is used in setting up of the infrastructure. Python is used to run the scripts inside the Virtual Machine using the Azure Custom Script Extension By doing so will perform the inherent validations such as WALinuxAgent Availability

Setup

Current Setup

  1. Single VM
  2. Single nic support
  3. Testing of Generation 1 and Generation 2 Virtual Machine.
  4. HA Not supported
  5. Input is currently the SAS Uri to the Linux VHD.

Future Setup

  1. High Availability with cluster
  2. Multiple NIC support

Output

Output is currently rendered in JSON We are currently in the Information Gathering wherein most of the details is not validated rather than displayed directly. The output details are currently available in logs.json

Currently Available

System
  1. /proc/cmdline - This is used to check if the VM supports Serial console
  2. Grub configuration - This is used to check if the VM supports Serial console
  3. OS Release and Kernel Version
  4. Disk Usage Report
  5. MBR/EFI Boot
Package Manager
  1. Repo availability - (yum and dnf)

Future Support

  1. Driver details
  2. Cloud-Init details
  3. Instance Metadata Service (IMDS)

Example

JSON Output

Validations

Current Validations Performed

  1. Generation 1 and Generation 2 VM Bootability
  2. WALinuxAgent Availability.
  3. Network Connectivity
  4. Repo Availability (Currently Yum and dnf supported)

Future Validations

  1. Azure Site Recovery
  2. Cloud-Init validation

Linux Distribution Supported

Current

  1. RedHat
  2. CentOS

Future Support

  1. SLES
  2. OpenSUSE
  3. Ubuntu - (Works - E2E testing is required)
  4. Debian - (Works - E2E testing is required)

Contributing

We sincerely welcome contributions from our customers and community. Together we believe that we can make this a better validation system for Linux Images on Azure.

Areas

  1. Documentation
  2. Code Enhancement
  3. Testing and Bug Reports

Issue and Bug Reporting

Issue Template to report Bugs and bugs are tracked on issues tab. This can also be used to propose new feature request. Please turn the feature-request flag

[Issue Occurrence - Optional]
Short one-liner issue statement

[Environment]
1. Linux / Windows / OS X
2. Azure Pipelines
3. CloudShell

[Description]
Provide Detailed Description explaining the issue statement
Add Screenshots / Snippets / Error messages if available

[Steps to Reproduce]

[Severity]

Code Enhancement

  1. naming convention for terraform scripts - snake_case for variables
  2. PEP-8 for Python is followed
  3. Commit Message format.
    <Repo Name / Work Name>: Short one-liner of the work
    
    Description:
    <Provide your description in brief>
    
    Signed-off-by: 
    
    Multiple file changes involving multiple work should be submitted with multiple commits.

Code of Conduct

This project welcomes contributions and suggestions. Most contributions require you to agree to a Contributor License Agreement (CLA) declaring that you have the right to, and actually do, grant us the rights to use your contribution. For details, visit https://cla.opensource.microsoft.com.

When you submit a pull request, a CLA bot will automatically determine whether you need to provide a CLA and decorate the PR appropriately (e.g., status check, comment). Simply follow the instructions provided by the bot. You will only need to do this once across all repos using our CLA.

This project has adopted the Microsoft Open Source Code of Conduct. For more information see the Code of Conduct FAQ or contact opencode@microsoft.com with any additional questions or comments.

Maintainers

  1. Sriharsha B S
  2. Pankaj Basnal
  3. Abhilash Gopal