Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Upgrade xk6-browser to v1.0.2 #3235

Merged
merged 6 commits into from
Aug 9, 2023
Merged

Upgrade xk6-browser to v1.0.2 #3235

merged 6 commits into from
Aug 9, 2023

Conversation

ka3de
Copy link
Contributor

@ka3de ka3de commented Jul 28, 2023

What?

This PR upgrades the xk6-browser extension version to v1.0.2. Being this one the latest release for the extension.

Additionally, it also removes the requirement for the K6_BROWSER_ENABLED environment variable in order to execute tests that use the experimental browser module.

Why?

Upgrade
Keep xk6-browser extension version up to date in k6.

Removal of K6_BROWSER_ENABLED flag
Currently (as of xk6-browser v1.0.2) the browser extension requires the definition of the browser type parameter inside the options element for every scenario that wants to use the browser module. Therefore the usage of K6_BROWSER_ENABLED flag as an explicit approval to use the browser module has become redundant, as both parameters have to be set, being the scenario one more restrictive.

Checklist

  • I have performed a self-review of my code.
  • I have added tests for my changes. (N/A)
  • I have run linter locally (make ci-like-lint) and all checks pass.
  • I have run tests locally (make tests) and all tests pass.
  • I have commented on my code, particularly in hard-to-understand areas.

Related PR(s)/Issue(s)

Closes #3197

@codecov-commenter
Copy link

codecov-commenter commented Jul 28, 2023

Codecov Report

Merging #3235 (bfcd055) into master (fcb19fb) will decrease coverage by 0.18%.
The diff coverage is n/a.

❗ Current head bfcd055 differs from pull request most recent head 0837ee5. Consider uploading reports for the commit 0837ee5 to get more accurate results

@@            Coverage Diff             @@
##           master    #3235      +/-   ##
==========================================
- Coverage   73.22%   73.05%   -0.18%     
==========================================
  Files         259      256       -3     
  Lines       19899    19882      -17     
==========================================
- Hits        14572    14524      -48     
- Misses       4403     4426      +23     
- Partials      924      932       +8     
Flag Coverage Δ
ubuntu ?
windows 73.05% <ø> (-0.03%) ⬇️

Flags with carried forward coverage won't be shown. Click here to find out more.

Files Changed Coverage Δ
js/jsmodules.go 100.00% <ø> (ø)

... and 12 files with indirect coverage changes

@@ -1827,80 +1827,6 @@ func BenchmarkReadResponseBody(b *testing.B) {
cmd.ExecuteWithGlobalState(ts.GlobalState)
}

func TestBrowserPermissions(t *testing.T) {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can we actually have a test with the scenarios options instead?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

+1 for having an e2e coverage

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I've tried to create a test but now I think i've found an issue with the events channel from the new event loop that the browser module subscribes to.

After creating a simple test

Simple test
func TestBrowserPermissions(t *testing.T) {
	t.Parallel()

	tests := []struct {
		name             string
		expectedExitCode exitcodes.ExitCode
		expectedError    string
	}{
		{
			name:             "browser option not set",
			expectedExitCode: 0,
			expectedError:    "GoError: browser not found in registry. make sure to set browser type option in scenario definition in order to use the browser module",
		},
	}

	for _, tt := range tests {
		tt := tt
		t.Run(tt.name, func(t *testing.T) {
			t.Parallel()
			script := `
			import { browser } from 'k6/experimental/browser';

			export default function() {
			  browser.isConnected();
			};
			`

			ts := getSingleFileTestState(t, script, []string{}, tt.expectedExitCode)
			cmd.ExecuteWithGlobalState(ts.GlobalState)
			loglines := ts.LoggerHook.Drain()

			if tt.expectedError == "" {
				require.Len(t, loglines, 0)
				return
			}

			assert.Contains(t, loglines[0].Message, tt.expectedError)
		})
	}
}

The output of the test is:

found unexpected goroutines:
[Goroutine 69 in state chan receive, with github.com/grafana/xk6-browser/browser.(*browserRegistry).handleIterEvents on top of the stack:
goroutine 69 [chan receive]:
github.com/grafana/xk6-browser/browser.(*browserRegistry).handleIterEvents(0x14001fb6b00, 0x0?, 0x14000b7f6e0)
	/Users/ankuragarwal/go/src/github.com/grafana/k6/vendor/github.com/grafana/xk6-browser/browser/registry.go:239 +0xa4
created by github.com/grafana/xk6-browser/browser.newBrowserRegistry
	/Users/ankuragarwal/go/src/github.com/grafana/k6/vendor/github.com/grafana/xk6-browser/browser/registry.go:226 +0x2f8

 Goroutine 60 in state chan receive, with github.com/grafana/xk6-browser/browser.(*browserRegistry).handleIterEvents on top of the stack:
goroutine 60 [chan receive]:
github.com/grafana/xk6-browser/browser.(*browserRegistry).handleIterEvents(0x14001fd90c0, 0x105b12700?, 0x14000d0de30)
	/Users/ankuragarwal/go/src/github.com/grafana/k6/vendor/github.com/grafana/xk6-browser/browser/registry.go:239 +0xa4
created by github.com/grafana/xk6-browser/browser.newBrowserRegistry
	/Users/ankuragarwal/go/src/github.com/grafana/k6/vendor/github.com/grafana/xk6-browser/browser/registry.go:226 +0x2f8
]

So it would seem that the channel the browser module gets after subscribing isn't being closed when the test exits, am i correct in thinking that? I'd prefer to suppress this error for now and work on the fix in the next cycle.

WDYT?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

isn't being closed when the test exits, am i correct in thinking that?

Yes, it seems you're right. Do you have a guess why this is happening? I see the code for unsubscribing is implemented on the core and invoked from the browser.

I'd prefer to suppress this error for now and work on the fix in the next cycle.

How do you intend to suppress it? Do you want to remove the e2e test? I would prefer if at least we understand the root of the problem and we open an issue so we can classify it as non-critical with confidence.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ok, I'll take a look.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I've created a new issue. I believe the issue actually lies within the browser module scope and so we will work on it asap.

When the test run completes, does the k6 processes exit, or can it ever be reused? The reason I'm asking is because these uncleared goroutines will leak if the k6 process is reused. If it isn't then this is non-critical issue, but we will not be able to add the e2e test in this release.

Copy link
Contributor

@ankur22 ankur22 Aug 2, 2023

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We have a fix for the leaky goroutines in grafana/xk6-browser#990. As soon as that has been merged into main, i'll upgrade this PR to work with the latest commit from main, and finally add the e2e tests for this PR.

Copy link
Contributor

@ankur22 ankur22 Aug 3, 2023

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I've updated this branch to work with v1.0.1 of xk6-browser which contains the fix for the goroutine leaks. I've also added an e2e test.

It's worth noting that the e2e test will start a chrome process in the background.

Also, i'm looking at this data race now 😓

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This has now been resolved in a32cc6f. Could you please take a look @mstoykov and @codebien?

mstoykov
mstoykov previously approved these changes Jul 28, 2023
Copy link
Contributor

@mstoykov mstoykov left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I would still prefer to have a test that the options enable the browser and without them it won't work.

@ka3de ka3de requested review from inancgumus and ankur22 July 28, 2023 11:00
inancgumus
inancgumus previously approved these changes Jul 28, 2023
oleiade
oleiade previously approved these changes Jul 28, 2023
@mstoykov mstoykov added this to the v0.46.0 milestone Jul 31, 2023
js/jsmodules.go Outdated Show resolved Hide resolved
@@ -1827,80 +1827,6 @@ func BenchmarkReadResponseBody(b *testing.B) {
cmd.ExecuteWithGlobalState(ts.GlobalState)
}

func TestBrowserPermissions(t *testing.T) {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

+1 for having an e2e coverage

ankur22 added a commit that referenced this pull request Aug 1, 2023
@ankur22 ankur22 dismissed stale reviews from oleiade, inancgumus, and mstoykov via 8e31247 August 1, 2023 11:30
@ankur22 ankur22 changed the title Upgrade xk6-browser to v1.0.0 Upgrade xk6-browser to v1.0.1 Aug 3, 2023
Copy link
Contributor

@andrewslotin andrewslotin left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@ka3de, could you also drop K6_BROWSER_ENABLED from the Dockerfile?

andrewslotin
andrewslotin previously approved these changes Aug 7, 2023
@ka3de
Copy link
Contributor Author

ka3de commented Aug 7, 2023

@ka3de, could you also drop K6_BROWSER_ENABLED from the Dockerfile?

Done in 85af866.

inancgumus
inancgumus previously approved these changes Aug 7, 2023
Currently (as of grafana/xk6-browser@v1.0.0) the browser extension
requires the definition of the browser type parameter inside the options
element for every scenario that wants to use the browser module.
Therefore the K6_BROWSER_ENABLED flag has become redundant, as both
parameters have to be set, being the scenario one more restrictive.

Because we no longer have to parse the environment variable, the module
wrapper implementation can be removed completely and use the xk6-browser
root module constructor directly instead.
This includes some fixes for the goroutine leaks that we were seeing
when we tried to create the e2e tests for the browser module in k6.
This test ensures that an error occurs and the test ends when the
browser module is imported but the options are missing, otherwise
when setup correctly the browser test runs.
@ankur22 ankur22 dismissed stale reviews from inancgumus and andrewslotin via 5eee08d August 7, 2023 16:00
@ankur22 ankur22 changed the title Upgrade xk6-browser to v1.0.1 Upgrade xk6-browser to v1.0.2 Aug 8, 2023
This contains a fix for the race condition where the ctx was being
read before the vu was setup.
@codebien codebien merged commit 9598ef5 into master Aug 9, 2023
22 checks passed
@codebien codebien deleted the upgrade/k6-latest-1-0-0 branch August 9, 2023 07:41
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

K6_BROWSER_ENABLED flag is redundant with browser type scenario option
8 participants