![Maven Central Adds Sigstore Signature Validation](https://cdn.sanity.io/images/cgdhsj6q/production/7da3bc8a946cfb5df15d7fcf49767faedc72b483-1024x1024.webp?w=400&fit=max&auto=format)
Security News
Maven Central Adds Sigstore Signature Validation
Maven Central now validates Sigstore signatures, making it easier for developers to verify the provenance of Java packages.
github.com/hashicorp/consul/test/integration/consul-container
The goal of upgrade tests is to ensure problem-free upgrades on supported upgrade paths. At any given time, Consul supports the latest minor release, and two older minor releases, e.g. 1.15, 1.14, and 1.13. Upgrades to any higher version are permitted, including skipping a minor version e.g. from 1.13 to 1.15.
The upgrade tests also aim to highlight errors that may occur as users attempt to upgrade their current version to a newer version.
This diagram illustrates the deployment architecture of an upgrade test, where two consul agents (one server and one client), a static-server, static-client, and envoy sidecars are deployed.
Note that all consul agents and user workloads such as application services, mesh-gateway are running in docker containers.
In general, each upgrade test has the following steps:
target-version
and restart the Envoy sidecars
(we restart Envoy sidecar to ensure the upgraded Consul binary can read the state from
the previous version and generate the correct Envoy configurations)To run the upgrade test, the following tools are required:
golangci-lint
Makefile
Docker
required to run tests locallymake dev-docker
cd test/integration/consul-container
docker build -t consul-envoy:latest-version \
--build-arg CONSUL_IMAGE=docker.mirror.hashicorp.services/consul:1.20.0-rc1 \
--build-arg ENVOY_VERSION=1.31.2 -f ./assets/Dockerfile-consul-envoy ./assets
go test -v -timeout 30m -run ^TestACL_Upgrade_Node_Token$ ./.../upgrade/
go test -v -timeout 30m -run ./.../upgrade
To specify targets and latest image pass --target-version
and --latest-version
to the tests. By default, it uses the consul
docker image with respectively
local
and latest
tags.
To use dev consul image, pass target-image
and target-version
:
-target-image hashicorppreview/consul -target-version 1.15-dev
By default, all container's logs are written to either stdout
, or stderr
;
this makes it hard to debug, when the test case creates many containers. To
disable following container logs, run the test with -follow-log false
.
Below are the supported CLI options
Flags | Default value | Description |
---|---|---|
--latest-image | consul in CE, hashicorp/consulenterprise in ENT | Name of the Docker image to deploy initially. |
--latest-version | latest | Tag of the Docker image to deploy initially. |
--target-image | consul in Ce, hashicorp/consulenterprise in ENT | Name of the Docker image to upgrade to. |
--target-version | local | Tag of the Docker image to upgrade to. local is the tag built by make dev-docker above. |
-follow-log | true | Emit all container logs. These can be noisy, so we recommend --follow-log=false for local development. |
All upgrade tests are defined in test/integration/consul-container/test/upgrade subdirectory.
Following is a guide for adding a new upgrade test case.
// NewCluster creates a single cluster
cluster, _, _ := libtopology.NewCluster(t, &libtopology.ClusterConfig{
NumServers: 1,
NumClients: 1,
BuildOpts: &libcluster.BuildOptions{
Datacenter: "dc1",
ConsulVersion: utils.LatestVersion,
},
})
Or
// BasicPeeringTwoClustersSetup creates two peered clusters, named accpeting and dialing
accepting, dialing := libtopology.BasicPeeringTwoClustersSetup(t, utils.LatestVersion, false)
Some workloads may require extra resources. They should be created in this setup section. For example, [https://github.com/hashicorp/consul-enterprise/blob/19e515db29541132dbbda73efb7a458cd29d705f/test/integration/consul-container/test/upgrade/peering_http_test.go#L30-L41](this peering test creates a second static-server).
libassert.HTTPServiceEchoes(t, "localhost", port, "")
libassert.AssertFortioName(t, fmt.Sprintf("http://localhost:%d", appPort), "static-server-2-v2", "")
StandardUpgrade
method and check that the upgrade succeeded.
We also restart the Envoy proxy to make sure the upgraded agent can generate
the correct Envoy configurations. require.NoError(t,
cluster.StandardUpgrade(t, context.Background(), utils.TargetVersion))
require.NoError(t, staticServerConnectProxy.Restart())
require.NoError(t, staticClientConnectProxy.Restart())
libassert.HTTPServiceEchoes(t, "localhost", port, "")
libassert.AssertFortioName(t, fmt.Sprintf("http://localhost:%d", appPort), "static-server-2-v2", "")
For longer verifications, it can be nice to make a local function instead:
tests := func() {
libassert.HTTPServiceEchoes(t, "localhost", port, "")
libassert.AssertFortioName(t, fmt.Sprintf("http://localhost:%d", appPort), "static-server-2-v2", "")
}
tests()
// ... do upgrade
tests()
There are some caveats for special error handling of versions prior to 1.14
.
Upgrade tests for features such as peering had API changes that return an error if an upgrade is attempted, and should be accounted for in upgrade tests. If running upgrade tests for any version before 1.14
, the following lines of code need to be added to skip it or it will not pass.
fromVersion, err := version.NewVersion(utils.LatestVersion)
require.NoError(t, err)
if fromVersion.LessThan(utils.Version_1_14) {
t.Skip("...")
}
See example here
To write tests for bugs found during upgrades, see example on how to add a testcase for those scenarios here.
Q. Are containers' ports (e.g., consul's 8500, envoy sidecar's admin port
or local upstream port) exposed on the docker host?
A. Yes, they are exposed. However, they are exposed through a pod container.
That is, a consul agent and the envoy proxy containers registered with the agent
share the same Linux network namespace (i.e., they share localhost
) as the pod container.
The pod container use the same prefix as the consul agent in its name.
Q. To troubleshoot, how can I send API request or consul command to the deployed cluster?
A. To send an API request or command to the deployed cluster, ensure that a cluster, services and sidecars have been created. See example below:
cluster, _, _ := topology.NewCluster()
clientService := createServices(t, cluster)
_, port := clientService.GetAddr()
_, adminPort := clientService.GetAdminAddr()
...
time.Sleep(900 * time.Second)
fmt.Println(port, adminPort)
Then in your terminal docker ps -a | grep consul
to get the running services and cluster. Exec in the cluster and run commands directly or make API request to localhost:port
to relevant service or localhost:adminPort
for envoy.
Q. To troubleshoot, how can I access the envoy admin page?
A. To access envoy admin page, ensure that a cluster, services and sidecars have been created. Then get the adminPort for the client or server sidecar. See example on how to get the port above. Then navigate to a browser and go to the url http://localhost:adminPort/
Q. My test is stuck with the error "could not start or join all agents: container 0: port not found"?
A. Simply re-run the tests. If the error persists, prune docker images docker system prune
, run make dev-docker
, then re-run tests again.
Q. How to clean up the resources created the upgrade test?
A. Run the command docker ps | grep consul
to find all left over resources, then docker stop {CONTAINER_ID} && docker rm {CONTAINER_ID}
FAQs
Unknown package
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Maven Central now validates Sigstore signatures, making it easier for developers to verify the provenance of Java packages.
Security News
CISOs are racing to adopt AI for cybersecurity, but hurdles in budgets and governance may leave some falling behind in the fight against cyber threats.
Research
Security News
Socket researchers uncovered a backdoored typosquat of BoltDB in the Go ecosystem, exploiting Go Module Proxy caching to persist undetected for years.