import org.elasticsearch.gradle.test.NodeInfo import org.elasticsearch.gradle.test.RestIntegTestTask import org.elasticsearch.gradle.Version import java.nio.charset.StandardCharsets import java.util.regex.Matcher // Apply the java plugin to this project so the sources can be edited in an IDE apply plugin: 'elasticsearch.build' test.enabled = false dependencies { testCompile project(path: ':x-pack-elasticsearch:plugin:core', configuration: 'runtime') testCompile project(path: ':x-pack-elasticsearch:plugin:security', configuration: 'runtime') testCompile project(path: ':x-pack-elasticsearch:plugin:core', configuration: 'testArtifacts') // to be moved in a later commit } Closure waitWithAuth = { NodeInfo node, AntBuilder ant -> File tmpFile = new File(node.cwd, 'wait.success') // wait up to two minutes final long stopTime = System.currentTimeMillis() + (2 * 60000L); Exception lastException = null; while (System.currentTimeMillis() < stopTime) { lastException = null; // we use custom wait logic here as the elastic user is not available immediately and ant.get will fail when a 401 is returned HttpURLConnection httpURLConnection = null; try { // TODO this sucks having to hardcode number of nodes, but node.config.numNodes isn't necessarily accurate for rolling httpURLConnection = (HttpURLConnection) new URL("http://${node.httpUri()}/_cluster/health?wait_for_nodes=2&wait_for_status=yellow").openConnection(); httpURLConnection.setRequestProperty("Authorization", "Basic " + Base64.getEncoder().encodeToString("test_user:x-pack-test-password".getBytes(StandardCharsets.UTF_8))); httpURLConnection.setRequestMethod("GET"); httpURLConnection.setConnectTimeout(1000); httpURLConnection.setReadTimeout(30000); // read needs to wait for nodes! httpURLConnection.connect(); if (httpURLConnection.getResponseCode() == 200) { tmpFile.withWriter StandardCharsets.UTF_8.name(), { it.write(httpURLConnection.getInputStream().getText(StandardCharsets.UTF_8.name())) } break; } } catch (Exception e) { logger.debug("failed to call cluster health", e) lastException = e } finally { if (httpURLConnection != null) { httpURLConnection.disconnect(); } } // did not start, so wait a bit before trying again Thread.sleep(500L); } if (tmpFile.exists() == false && lastException != null) { logger.error("final attempt of calling cluster health failed", lastException) } return tmpFile.exists() } Project mainProject = project compileTestJava.options.compilerArgs << "-Xlint:-cast,-deprecation,-rawtypes,-try,-unchecked" /** * Subdirectories of this project are test rolling upgrades with various * configuration options based on their name. */ subprojects { // TODO remove after backport ext.bwc_tests_enabled = false Matcher m = project.name =~ /with(out)?-system-key/ if (false == m.matches()) { throw new InvalidUserDataException("Invalid project name [${project.name}]") } boolean withSystemKey = m.group(1) == null apply plugin: 'elasticsearch.standalone-test' // Use resources from the rolling-upgrade project in subdirectories sourceSets { test { java { srcDirs = ["${mainProject.projectDir}/src/test/java"] } resources { srcDirs = ["${mainProject.projectDir}/src/test/resources"] } } } String outputDir = "generated-resources/${project.name}" // This is a top level task which we will add dependencies to below. // It is a single task that can be used to backcompat tests against all versions. task bwcTest { description = 'Runs backwards compatibility tests.' group = 'verification' } String output = "generated-resources/${project.name}" task copyTestNodeKeystore(type: Copy) { from project(':x-pack-elasticsearch:plugin:core') .file('src/test/resources/org/elasticsearch/xpack/security/transport/ssl/certs/simple/testnode.jks') into outputDir } for (Version version : versionCollection.versionsWireCompatibleWithCurrent) { String baseName = "v${version}" Task oldClusterTest = tasks.create(name: "${baseName}#oldClusterTest", type: RestIntegTestTask) { mustRunAfter(precommit) } Object extension = extensions.findByName("${baseName}#oldClusterTestCluster") configure(extensions.findByName("${baseName}#oldClusterTestCluster")) { dependsOn copyTestNodeKeystore plugin ':x-pack-elasticsearch:plugin' setupCommand 'setupTestUser', 'bin/x-pack/users', 'useradd', 'test_user', '-p', 'x-pack-test-password', '-r', 'superuser' distribution = 'zip' bwcVersion = version numBwcNodes = 2 numNodes = 2 minimumMasterNodes = { 2 } clusterName = 'rolling-upgrade' waitCondition = waitWithAuth setting 'xpack.monitoring.collection.interval', '-1' setting 'xpack.monitoring.exporters._http.type', 'http' setting 'xpack.monitoring.exporters._http.enabled', 'false' setting 'xpack.monitoring.exporters._http.auth.username', 'test_user' setting 'xpack.monitoring.exporters._http.auth.password', 'x-pack-test-password' setting 'xpack.security.transport.ssl.enabled', 'true' setting 'xpack.security.authc.token.enabled', 'true' setting 'xpack.ssl.keystore.path', 'testnode.jks' setting 'xpack.ssl.keystore.password', 'testnode' dependsOn copyTestNodeKeystore extraConfigFile 'testnode.jks', new File(outputDir + '/testnode.jks') if (withSystemKey) { if (version.onOrAfter('5.1.0') && version.before('6.0.0')) { // The setting didn't exist until 5.1.0 setting 'xpack.security.system_key.required', 'true' } if (version.onOrAfter('6.0.0')) { setupCommand 'create-elasticsearch-keystore', 'bin/elasticsearch-keystore', 'create' setupCommand 'add-key-elasticsearch-keystore', 'bin/elasticsearch-keystore', 'add-file', 'xpack.watcher.encryption_key', "${mainProject.projectDir}/src/test/resources/system_key" } else { extraConfigFile 'x-pack/system_key', "${mainProject.projectDir}/src/test/resources/system_key" } setting 'xpack.watcher.encrypt_sensitive_data', 'true' } } Task oldClusterTestRunner = tasks.getByName("${baseName}#oldClusterTestRunner") oldClusterTestRunner.configure { systemProperty 'tests.rest.suite', 'old_cluster' } Task mixedClusterTest = tasks.create(name: "${baseName}#mixedClusterTest", type: RestIntegTestTask) configure(extensions.findByName("${baseName}#mixedClusterTestCluster")) { dependsOn oldClusterTestRunner, "${baseName}#oldClusterTestCluster#node1.stop" plugin ':x-pack-elasticsearch:plugin' setupCommand 'setupTestUser', 'bin/x-pack/users', 'useradd', 'test_user', '-p', 'x-pack-test-password', '-r', 'superuser' distribution = 'zip' clusterName = 'rolling-upgrade' unicastTransportUri = { seedNode, node, ant -> oldClusterTest.nodes.get(0).transportUri() } minimumMasterNodes = { 2 } dataDir = { nodeNumber -> oldClusterTest.nodes[1].dataDir } waitCondition = waitWithAuth setting 'xpack.monitoring.collection.interval', '-1' setting 'xpack.monitoring.exporters._http.type', 'http' setting 'xpack.monitoring.exporters._http.enabled', 'false' setting 'xpack.monitoring.exporters._http.auth.username', 'test_user' setting 'xpack.monitoring.exporters._http.auth.password', 'x-pack-test-password' setting 'xpack.security.transport.ssl.enabled', 'true' setting 'xpack.ssl.keystore.path', 'testnode.jks' keystoreSetting 'xpack.ssl.keystore.secure_password', 'testnode' setting 'node.attr.upgraded', 'first' setting 'xpack.security.authc.token.enabled', 'true' dependsOn copyTestNodeKeystore extraConfigFile 'testnode.jks', new File(outputDir + '/testnode.jks') if (withSystemKey) { setting 'xpack.watcher.encrypt_sensitive_data', 'true' setupCommand 'create-elasticsearch-keystore', 'bin/elasticsearch-keystore', 'create' setupCommand 'add-key-elasticsearch-keystore', 'bin/elasticsearch-keystore', 'add-file', 'xpack.watcher.encryption_key', "${mainProject.projectDir}/src/test/resources/system_key" } } Task mixedClusterTestRunner = tasks.getByName("${baseName}#mixedClusterTestRunner") mixedClusterTestRunner.configure { systemProperty 'tests.rest.suite', 'mixed_cluster' finalizedBy "${baseName}#oldClusterTestCluster#node0.stop" } Task upgradedClusterTest = tasks.create(name: "${baseName}#upgradedClusterTest", type: RestIntegTestTask) configure(extensions.findByName("${baseName}#upgradedClusterTestCluster")) { dependsOn(mixedClusterTestRunner, "${baseName}#oldClusterTestCluster#node0.stop") plugin ':x-pack-elasticsearch:plugin' setupCommand 'setupTestUser', 'bin/x-pack/users', 'useradd', 'test_user', '-p', 'x-pack-test-password', '-r', 'superuser' distribution = 'zip' clusterName = 'rolling-upgrade' unicastTransportUri = { seedNode, node, ant -> mixedClusterTest.nodes.get(0).transportUri() } minimumMasterNodes = { 2 } dataDir = { nodeNumber -> oldClusterTest.nodes[0].dataDir } waitCondition = waitWithAuth setting 'xpack.monitoring.collection.interval', '-1' setting 'xpack.monitoring.exporters._http.type', 'http' setting 'xpack.monitoring.exporters._http.enabled', 'false' setting 'xpack.monitoring.exporters._http.auth.username', 'test_user' setting 'xpack.monitoring.exporters._http.auth.password', 'x-pack-test-password' setting 'xpack.security.transport.ssl.enabled', 'true' setting 'xpack.ssl.keystore.path', 'testnode.jks' keystoreSetting 'xpack.ssl.keystore.secure_password', 'testnode' setting 'xpack.security.authc.token.enabled', 'true' dependsOn copyTestNodeKeystore extraConfigFile 'testnode.jks', new File(outputDir + '/testnode.jks') if (withSystemKey) { setting 'xpack.watcher.encrypt_sensitive_data', 'true' setupCommand 'create-elasticsearch-keystore', 'bin/elasticsearch-keystore', 'create' setupCommand 'add-key-elasticsearch-keystore', 'bin/elasticsearch-keystore', 'add-file', 'xpack.watcher.encryption_key', "${mainProject.projectDir}/src/test/resources/system_key" } } Task upgradedClusterTestRunner = tasks.getByName("${baseName}#upgradedClusterTestRunner") upgradedClusterTestRunner.configure { systemProperty 'tests.rest.suite', 'upgraded_cluster' // migration tests should only run when the original/old cluster nodes where versions < 5.2.0. // this stinks but we do the check here since our rest tests do not support conditionals // otherwise we could check the index created version String versionStr = project.extensions.findByName("${baseName}#oldClusterTestCluster").properties.get('bwcVersion') String[] versionParts = versionStr.split('\\.') if (versionParts[0].equals("5")) { Integer minor = Integer.parseInt(versionParts[1]) if (minor >= 2) { systemProperty 'tests.rest.blacklist', '/20_security/Verify default password migration results in upgraded cluster' } } // only need to kill the mixed cluster tests node here because we explicitly told it to not stop nodes upon completion finalizedBy "${baseName}#mixedClusterTestCluster#stop" } Task versionBwcTest = tasks.create(name: "${baseName}#bwcTest") { dependsOn = [upgradedClusterTest] } if (project.bwc_tests_enabled) { bwcTest.dependsOn(versionBwcTest) } } test.enabled = false // no unit tests for rolling upgrades, only the rest integration test // basic integ tests includes testing bwc against the most recent version task integTest { if (project.bwc_tests_enabled) { for (final def version : versionCollection.basicIntegrationTestVersions) { dependsOn "v${version}#bwcTest" } } } check.dependsOn(integTest) dependencies { testCompile project(path: ':x-pack-elasticsearch:plugin:core', configuration: 'runtime') testCompile project(path: ':x-pack-elasticsearch:plugin:core', configuration: 'testArtifacts') testCompile project(path: ':x-pack-elasticsearch:plugin:watcher') } compileTestJava.options.compilerArgs << "-Xlint:-cast,-deprecation,-rawtypes,-try,-unchecked" // copy x-pack plugin info so it is on the classpath and security manager has the right permissions task copyXPackRestSpec(type: Copy) { dependsOn(project.configurations.restSpec, 'processTestResources') from project(':x-pack-elasticsearch:plugin:core').sourceSets.test.resources include 'rest-api-spec/api/**' into project.sourceSets.test.output.resourcesDir } task copyXPackPluginProps(type: Copy) { dependsOn(copyXPackRestSpec) from project(':x-pack-elasticsearch:plugin:core').file('src/main/plugin-metadata') from project(':x-pack-elasticsearch:plugin:core').tasks.pluginProperties into outputDir } project.sourceSets.test.output.dir(outputDir, builtBy: copyXPackPluginProps) repositories { maven { url "https://artifacts.elastic.co/maven" } } }