Upgrade and Rollback
This page describes a low-risk upgrade approach.
Scope
Upgrade surface usually includes:
- control plane images (
gateway,relay) - host/client runtime binaries
- desktop app packages
Pre-Upgrade Checklist
- capture current version inventory
- confirm backups for persistent control-plane data
- define rollback trigger thresholds
- ensure release artifact checksums are verified
- validate staging rollout first
Control Plane Upgrade (Docker)
- Set target tag:
export WAVRY_CONTROL_PLANE_TAG=vX.Y.Z
- Pull and deploy:
docker compose -f docker/control-plane.compose.yml pull
docker compose -f docker/control-plane.compose.yml up -d
- Validate:
curl -fsS http://127.0.0.1:3000/health
docker compose -f docker/control-plane.compose.yml ps
Runtime Upgrade
- deploy host/runtime changes to canary set
- compare session quality metrics before/after
- expand rollout gradually
Rollback Process
Trigger rollback when thresholds are exceeded (for example: session failures, latency spikes, handshake regressions).
Rollback steps:
- restore previous known-good image tag/artifact version
- redeploy previous version
- verify health and session setup path
- keep incident notes for root-cause follow-up
Post-Upgrade Review
- confirm stability over agreed observation window
- compare direct/relay ratio and latency distribution
- close rollout only after metrics remain within expected bounds