This repository contains a Dockerized version of the Pact Broker. You can pull the pactfoundation/pact-broker
image from Dockerhub. If you're viewing these docs on Dockerhub, here is a link to the github repository.
Note: On 3 May 2023, the format of the docker tag changed from starting with the Pact Broker gem version (
2.107.0.1
), to ending with the Pact Broker gem version (2.107.1-pactbroker2.107.1
). Read about the new versioning scheme here.
If you want to try out a Pact Broker that can be accessed by all your teams, without having to fill in requisition forms and wait for 3 months, you can get a free trial at pactflow.io. Built by a group of core Pact maintainers, PactFlow is a fork of the OSS Pact Broker with extra goodies like an improved UI, user and team management, secrets, field level verification results and federated login. It's also fully supported, and that means when something goes wrong, someone else gets woken up in the middle of the afternoon to fix it...
The pactfoundation/pact-broker
image is a forked version of the dius/pact-broker
image. It is smaller (as it runs on Alpine Linux with Puma instead of the larger Passenger Phusion base image), and does not need root permissions.
All the environment variables used for dius/pact-broker
are compatible with pactfoundation/pact-broker
. The only breaking change is that the default port has changed from 80
to 9292
(because a user without root permisisons cannot bind to a port under 1024). If you wish to expose port 80 (or 443) you can deploy Ngnix in front of it (see the docker-compose file for an example).
Multi-platform images are available
-
--platform=linux/amd64
-
--platform=linux/arm/v7
-
--platform=linux/arm64
docker run --rm -it --entrypoint /bin/sh pactfoundation/pact-broker:latest -c 'uname -sm'
- A running Postgresql database (v9.4 or later) and the ability to connect to it (see POSTGRESQL.md).
- Install Docker with Docker Engine 20.10.0 or later. NOTE: Docker 19 is no longer supported by Docker, and the Pact Broker image will not run on it as the base image requires 20.10.0 or later.
- Create a Postgres database (Postgres 9.6 or later).
- Setup the Pact Broker connection to the database using the environment variables described below.
On an instance of Postgres version 10 or later, connect as a user with administrator privileges and run:
CREATE DATABASE pact_broker;
CREATE ROLE pact_broker WITH LOGIN PASSWORD 'CHANGE_ME';
GRANT ALL PRIVILEGES ON DATABASE pact_broker TO pact_broker;
You can either set the PACT_BROKER_DATABASE_URL
in the format driver://username:password@host[:port]/database
(eg. postgres://user1:pass1@myhost/mydb
) or, you can set the credentials individually using the following environment variables:
PACT_BROKER_DATABASE_ADAPTER
(optional, defaults to 'postgres', see note below.)PACT_BROKER_DATABASE_USERNAME
PACT_BROKER_DATABASE_PASSWORD
PACT_BROKER_DATABASE_HOST
PACT_BROKER_DATABASE_NAME
PACT_BROKER_DATABASE_PORT
(optional, defaults to the default port for the specified adapter)
Adapter can be 'postgres' (recommended) or 'sqlite' (non production use only).
For investigations/spikes you can use SQlite. It is not supported as a production database, as it does not support concurrent requests. Additionally, unless you mount it from an external volume, the database will be disposed of when the container shuts down.
-
PACT_BROKER_DATABASE_ADAPTER="sqlite"
-
PACT_BROKER_DATABASE_NAME="/tmp/pact_broker.sqlite3"
(arbitrary file a directory which is writeable by the application process, recommended to use/tmp
)OR
-
PACT_BROKER_DATABASE_URL="sqlite:////tmp/pact_broker.sqlte3"
See the database section of the Pact Broker configuration docs for all the database configuration options available.
- The application makes use of the Puma application server.
- Apart from creating a database no further preparation is required.
- The image does not need root privileges to run, however, the root filesystem (or at least, the /tmp directory) must be writeable for Puma to temporarily store files when processing large requests. See this issue.
The Pact Broker comes with 2 configurable basic auth users - one with read/write privileges, and one with read only privileges. The read only credentials should be distributed to the developers for use from development machines, and the read/write credentials should be used for CI/CD.
See the Authentication and authorization section of the Pact Broker documentation for more details.
Note that the verification status badges are not protected by basic auth, so that you may embed them in README markdown.
The heartbeat is available at /diagnostic/status/heartbeat
. No database connection will be made during the execution of this endpoint.
If you have enabled basic auth, and you are running the Pact Broker within an AWS autoscaling group or similar and you need to make a heartbeat URL publicly available, set PACT_BROKER_PUBLIC_HEARTBEAT=true
.
See the Pact Broker configuration documentation.
Set the environment variable PACT_BROKER_LOG_LEVEL
to one of DEBUG
, INFO
, WARN
, ERROR
, or FATAL
.
See the Webhooks section of the Pact Broker documentation. The only setting that you need to customize is the webhook_host_whitelist
.
See the Pact Broker Configuration Settings page for a full list of available settings.
PACT_BROKER_PORT
- the port that the Pact Broker application runs on. Defaults to 9292.PACT_BROKER_BASE_URL
- optional but strongly recommended when deploying the Pact Broker to production as it prevents some security vulnerabilities. If you find that the URLs generated by the API are using an IP instead of a hostname, you can set this environment variable to force the desired base URL. Must include the port if it's a non-standard one. eg.https://my-broker:9292
. This can also be used if you are mounting the Docker container so that it runs on a non root context eg.https://my-company.com/pact-broker
. Not that this setting does not change where the application is mounted within the Docker container - it just changes the links.PACT_BROKER_PUMA_PERSISTENT_TIMEOUT
- allows configuration of the Puma persistent timeout.
Documentation for the Pact Broker application itself can be found in the Pact Broker docs.
Performance can degrade when too much data accumulates in the Pact Broker. To read about the automatic data clean up feature, please see the Maintenance page of the Pact Broker documentation.
You will need version 2.79.1.1
or later of the pactfoundation/pact-broker Docker image for this feature.
If you have exactly one Pact Broker container running at a time, you can configure cron on the container to run the clean up.
PACT_BROKER_DATABASE_CLEAN_ENABLED
: set totrue
to enable the clean. Default isfalse
.PACT_BROKER_DATABASE_CLEAN_CRON_SCHEDULE
: set to a cron schedule that will run when your Broker is under the least operational load. Default is 2:15am -15 2 * * *
PACT_BROKER_DATABASE_CLEAN_DELETION_LIMIT
: The maximum number of records to delete at a time for each of the categories listed in the Categories of removable data. Defaults to500
.PACT_BROKER_DATABASE_CLEAN_OVERWRITTEN_DATA_MAX_AGE
: The maximum number of days to keep "overwritten" data as described in the Categories of removable dataPACT_BROKER_DATABASE_CLEAN_KEEP_VERSION_SELECTORS
: a JSON string containing a list of the "keep" selectors described in Configuring the keep selectors e.g[{"latest": true, "branch": true}, { "max_age": 90 }, { "deployed" : true }, { "released" : true }]
(remember to escape the quotes if necessary in your configuration files/console).PACT_BROKER_DATABASE_CLEAN_DRY_RUN
: defaults tofalse
. Set totrue
to see the output of what would have been deleted if the task had run. This is helpful when experimenting with or fine tuning the clean feature. As nothing is deleted when in dry-run mode, the same output will be printed in the logs each time the task runs.
If you are running more than one Pact Broker Docker container at a time for the same database, then you will end up with two clean up tasks fighting with each other to delete the data. In this situation, it is best to run the clean task from an external location at a regular interval. To do this, run an instance of the pact-broker docker image with the entrypoint clean
, the same database connection credentials as the application, and the same environment variables described in the section above except the PACT_BROKER_DATABASE_CLEAN_ENABLED and PACT_BROKER_DATABASE_CLEAN_CRON_SCHEDULE vars.
You can see a working example in the docker-compose-clean.yml file. To run the example locally, run:
docker compose -f docker-compose-clean.yml up pact-broker
# in another console
docker compose -f docker-compose-clean.yml up clean
- When the pact-broker docker container gets restarted because of an internal error, another supercronic (the application that runs the cron task in the background) process seems to get started each time, leading to multiple clean tasks running at once. This issue has been noticed in local testing, but we do not know if it is likely to be an issue under normal production use. Please raise an issue if you are observing it. The mitigation for this is to run the clean from an external source as documented above.
For a quick start with the Pact Broker and Postgres, we have an example Docker Compose setup you can use:
- Modify the
docker-compose.yml
file as required. - Run
docker compose build
to build the pact_broker container locally. - Run
docker compose up
to get a running Pact Broker and a clean Postgres database.
Now you can access your local broker:
curl -v http://localhost # you can visit in your browser too!
# SSL endpoint, note that URLs in response contain https:// protocol
curl -v -k https://localhost:8443
NOTE: this image should be modified before using in Production, in particular, the use of hard-coded credentials
If you call your service "pact_broker", an environment variable called PACT_BROKER_PORT
will be created which will conflict with the Docker image's PACT_BROKER_PORT
(see this issue for background). In this case, you have two options.
- Give your service a name that is not "pact_broker".
- Use different environment variable names
See pact-broker-openshift for an example config file.
-
Please read the docs about running Puma on Kubernetes.
-
If you call your service "pact_broker", an environment variable called
PACT_BROKER_PORT
will be created which will conflict with the Docker image'sPACT_BROKER_PORT
(see this issue for background). In this case, you have two options.- Give your service a name that is not "pact_broker".
- Use different environment variable names
Heroku provides the database connection string as the environment variable DATABASE_URL
, and the port as PORT
. See the section on Using different environment variable names to allow the Pact Broker to use these environment variables instead of PACT_BROKER_PORT
and PACT_BROKER_DATABASE_URL
.
There is a community supported project that provides a Pact Broker Helm Chart. Please note that this is not an official Pact Foundation supported project at this stage.
If you are running the Docker image behind an ALB with an idle timeout, you may need to set the Puma persistent timeout using the PACT_BROKER_PUMA_PERSISTENT_TIMEOUT
environment variable. See issue 26 for details.
You will also want to make use of the Heartbeat URL
The following implementation is community provided & supported by @learnautomatedtesting
Leverage GitLab & AWK CDK to publish and deploy a serverless framework of the Pact Broker and postgres database
Pre-Requisites
- AWS account with proper access
- AWS CLI and AWS CDK installed
- Docker installed for local container image management
- Basic understanding of Docker, AWS ECS, and networking
Solution
- Amazon ECS with an ALB: Hosts both the Pact Broker and PostgreSQL in containers, with one click on your AWS environment (public ALB for demo purposes)
- API Examples Provider, two static results once deployed via AWS CDK with an expected verifier and wrong output
If you are running your Docker container in a managed environment, you may not be able to control the names of the environment variables that are set by that software.
In this case, you can tell the application to use different environment variables to source the following configuration options.
To allow the port of the Pact Broker to be set by a different environment variable, set PACT_BROKER_PORT_ENVIRONMENT_VARIABLE_NAME
to the name of your chosen variable, and then set that variable. eg.
PACT_BROKER_PORT_ENVIRONMENT_VARIABLE_NAME=PACT_BROKER_APPLICATION_PORT
PACT_BROKER_APPLICATION_PORT=5000
To allow the URL of the database to be set by a different environment variable, set PACT_BROKER_DATABASE_URL_ENVIRONMENT_VARIABLE_NAME
to the name of your chosen variable, and then set that variable. eg.
PACT_BROKER_DATABASE_URL_ENVIRONMENT_VARIABLE_NAME=DATABASE_URL
DATABASE_URL=...
The Pact Broker auto migrates on startup, and will always do so in a way that is backwards compatible, to support architectures that run multiple instances of the application at a time (eg. AWS auto scaling).
You can use a custom entrypoint to the Pact Broker Docker image to perform a rollback. A rollback would be required if you needed to downgrade your Pact Broker image. The db-migrate entrypoint is support in versions 2.76.1.1 and later. To perform the rollback, you must use at minimum the version of the Docker image that performed the migrations in the first place. You can always use the latest image to rollback.
To work out which migration to rollback to, select the tag of the Pact Broker gem version you want at https://github.com/pact-foundation/pact_broker and then look in the db/migrations
directory. Find the very last migration in the directory, and take the numbers at the start of the file name. This is your "target".
# You can use the PACT_BROKER_DATABASE_URL or the separate environment variables as listed in the Getting Started section.
docker run --rm \
-e PACT_BROKER_DATABASE_URL=<url> \
-e PACT_BROKER_MIGRATION_TARGET=<target> \
--entrypoint db-migrate \
pactfoundation/pact-broker
To get the current version of the database run:
docker run --rm \
-e PACT_BROKER_DATABASE_URL=<url> \
--entrypoint db-version \
pactfoundation/pact-broker
- We use bundler audit on the underlying Pact Broker codebase
- We use trivy in our release workflow
- We also use Snyk
The Docker image tag uses a semantic-like versioning scheme (Docker tags don't support the +
symbol, so we cannot implement a strict semantic version). The format of the tag is M.m.p-pactbroker<pact_broker_version>
eg. 2.109.0-pactbroker2.107.1
. The M.m.p
(eg. 2.109.0
) is the semantic part of the tag number, while the -pactbroker<pact_broker_version>
suffix is purely informational.
The major version will be bumped for:
- Major increments of the Pact Broker gem
- Major increments of the base image that contain backwards incompatible changes (eg. dropping support for Docker 19)
- Any other backwards incompatible changes made for any reason (eg. environment variable mappings, entrypoints, tasks, supported auth)
The minor version will be bumped for:
- Minor increments of the Pact Broker gem
- Additional non-breaking functionality added to the Docker image
The patch version will be bumped for:
- Patch increments of the Pact Broker gem
- Other fixes to the Docker image
Until May 2023, the versioning scheme used the M.m.p
from the Pact Broker gem, with an additional RELEASE
number at the end (eg. 2.107.0.1
). This scheme was replace by the current scheme because it was unable to semantically convey changes made to the Docker image that were unrelated to a Pact Broker gem version change (eg. alpine upgrades).
See the Troubleshooting page on the docs site.