Consul is a distributed, highly available, and data center aware solution to connect and configure applications across dynamic, distributed infrastructure.
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 
Michael Zalimeni 905e371607
[NET-5146] security: Update Go version to 1.20.7 and `x/net` to 0.13.0 (#18358)
1 year ago
..
case-api-gateway-http-hostnames xds: generate endpoints directly from API gateway snapshot (#17390) 2 years ago
case-api-gateway-http-simple xds: generate endpoints directly from API gateway snapshot (#17390) 2 years ago
case-api-gateway-http-splitter-targets
case-api-gateway-http-tls-overlapping-hosts xds: generate endpoints directly from API gateway snapshot (#17390) 2 years ago
case-api-gateway-tcp-conflicted
case-api-gateway-tcp-simple xds: generate endpoints directly from API gateway snapshot (#17390) 2 years ago
case-api-gateway-tcp-tls-overlapping-hosts xds: generate endpoints directly from API gateway snapshot (#17390) 2 years ago
case-badauthz
case-basic
case-centralconf
case-cfg-resolver-cluster-peering-failover
case-cfg-resolver-dc-failover-gateways-none
case-cfg-resolver-dc-failover-gateways-remote
case-cfg-resolver-defaultsubset
case-cfg-resolver-features
case-cfg-resolver-subset-onlypassing
case-cfg-resolver-subset-redirect
case-cfg-resolver-svc-failover
case-cfg-resolver-svc-redirect-http
case-cfg-resolver-svc-redirect-tcp
case-cfg-router-features
case-cfg-splitter-cluster-peering
case-cfg-splitter-features
case-cfg-splitter-peering-ingress-gateways
case-consul-exec
case-cross-peer-control-plane-mgw
case-cross-peers
case-cross-peers-http
case-cross-peers-http-router
case-cross-peers-resolver-redirect-tcp
case-dogstatsd-udp Envoy Integration Test Windows (#18007) 1 year ago
case-expose-checks
case-gateway-without-services
case-gateways-local Envoy Integration Test Windows (#18007) 1 year ago
case-gateways-remote
case-grpc Envoy Integration Test Windows (#18007) 1 year ago
case-http Support Envoy's MaxEjectionPercent and BaseEjectionTime config entries for passive health checks (#15979) 2 years ago
case-http-badauthz Envoy Integration Test Windows (#18007) 1 year ago
case-ingress-gateway-grpc
case-ingress-gateway-http
case-ingress-gateway-multiple-services
case-ingress-gateway-peering-failover
case-ingress-gateway-sds
case-ingress-gateway-simple
case-ingress-gateway-tls Envoy Integration Test Windows (#18007) 1 year ago
case-ingress-mesh-gateways-resolver
case-l7-intentions
case-lua
case-mesh-to-lambda Wasm Envoy HTTP extension (#16877) 2 years ago
case-multidc-rsa-ca
case-prometheus
case-property-override Improve Prop Override docs examples (#17799) 1 year ago
case-stats-proxy docs: Fix some comments (#17118) 1 year ago
case-statsd-udp
case-terminating-gateway-hostnames
case-terminating-gateway-simple
case-terminating-gateway-subsets
case-terminating-gateway-without-services
case-upstream-config Support Envoy's MaxEjectionPercent and BaseEjectionTime config entries for passive health checks (#15979) 2 years ago
case-wanfed-gw Envoy Integration Test Windows (#18007) 1 year ago
case-wasm [COMPLIANCE] Add Copyright and License Headers (#16854) 2 years ago
case-zipkin Envoy Integration Test Windows (#18007) 1 year ago
consul-base-cfg
docs Envoy Integration Test Windows (#18007) 1 year ago
test-sds-server [NET-5146] security: Update Go version to 1.20.7 and `x/net` to 0.13.0 (#18358) 1 year ago
.gitignore
Dockerfile-bats
Dockerfile-consul-envoy
Dockerfile-consul-envoy-windows Envoy Integration Test Windows (#18007) 1 year ago
Dockerfile-tcpdump
Dockerfile-tcpdump-windows Envoy Integration Test Windows (#18007) 1 year ago
Dockerfile-test-sds-server-windows Envoy Integration Test Windows (#18007) 1 year ago
README.md
WINDOWS-TEST.md Envoy Integration Test Windows (#18007) 1 year ago
defaults.sh
docker-windows.md Envoy Integration Test Windows (#18007) 1 year ago
down.sh
helpers.bash Add Prop Override Envoy extension integration test (#17569) 1 year ago
helpers.windows.bash Envoy Integration Test Windows (#18007) 1 year ago
main_test.go Envoy Integration Test Windows (#18007) 1 year ago
run-tests.sh ci: remove test-integrations CircleCI workflow (#16928) 2 years ago
run-tests.windows.sh Envoy Integration Test Windows (#18007) 1 year ago
windows-troubleshooting.md Envoy Integration Test Windows (#18007) 1 year ago

README.md

Envoy Integration Tests

Overview

These tests validate that Consul is configuring Envoy correctly. They set up various scenarios using Docker containers and then run Bats (a Bash test framework) tests to validate the expected results.

Running Tests

To run the tests locally, cd into the root of the repo and run:

make test-envoy-integ

To run a specific test, run:

make test-envoy-integ GO_TEST_FLAGS="-run TestEnvoy/case-basic"

Where case-basic can be replaced by any directory name from this directory.

How Do These Tests Work

  1. The tests are all run through Go test via the main_test.go file. Each directory prefixed by case- is a subtest, for example, TestEnvoy/case-basic and TestEnvoy/case-wanfed-gw.
  2. The real framework for this test suite lives in run-tests.sh. Under the hood, main_test.go just runs run-tests.sh with various arguments.
  3. The tests use your local code by building a Docker image from your local directory just before executing. Note: this is implemented as the docker-envoy-integ Makefile target which is a prerequisite to the test-envoy-integ target, so if you are running the tests by invoking run-tests.sh or go test manually, be sure to rebuild the Docker image to ensure you are running your latest code.
  4. The tests run Docker containers connected by a shared Docker network. All tests have at least one Consul server running and then depending on the test case they will spin up additional services or gateways. Some tests run multiple Consul servers to test multi-DC setups. See the case-wanfed-gateway test for an example of this.
  5. At a high level, tests are set up by executing the setup.sh script in each directory. This script uses helper functions defined in helpers.bash. Once the test case is set up, the validations in verify.bats are run.
  6. If there exists a vars.sh file in the top-level of the case directory, the test runner will source it prior to invoking the run_tests, test_teardown and capture_logs phases of the test scenario.
  7. If there exists a capture.sh file in the top-level of the case directory, it will be executed after the test is done, but prior to the containers being removed. This is useful for capturing logs or Envoy snapshots for debugging test failures.
  8. Any files matching the *.hcl glob will be copied to the container $WORKDIR/$CLUSTER/consul directory prior to running the tests. This is useful for defining Consul configuration for each agent process to load on start up.
  9. In CI, the tests are executed against different Envoy versions and with both XDS_TARGET=client and XDS_TARGET=server. If set to client, a Consul server and client are run, and services are registered against the client. If set to server, only a Consul server is run, and services are registered against the server. By default, XDS_TARGET is set to server. See this comment for more information.

Investigating Test Failures

  • When tests fail in CI, logs and additional debugging data are available in the artifacts of the test run.
  • You can re-run the tests locally by running make test-envoy-integ GO_TEST_FLAGS="-run TestEnvoy/<case-directory>" where <case-directory> is replaced with the name of the directory, e.g. case-basic.
  • Locally, all the logs of the failed test will be available in workdir in this directory.
  • You can run with DEBUG=1 to print out all the commands being run, e.g. DEBUG=1 make test-envoy-integ GO_TEST_FLAGS="-run TestEnvoy/case-basic".
  • If you want to prevent the Docker containers from being spun down after test failure, add a sleep 9999 to the verify.bats test case that's failing.

Creating a New Test

Below is a rough outline for creating a new test. For the example, assume our test case will be called my-feature.

  1. Create a new directory named case-my-feature
  2. If the test involves multiple datacenters/clusters, create a separate subdirectory for each cluster (eg. case-my-feature/{dc1,dc2})
  3. Add any necessary configuration to *.hcl files in the respective cluster subdirectory (or the test case directory when using a single cluster).
  4. Create a setup.sh file in the case directory
  5. Create a capture.sh file in the case directory
  6. Create a verify.bats file in the case directory
  7. Populate the setup.sh, capture.sh and verify.bats files with the appropriate code for running your test, validating its state and capturing any logs or snapshots.