Coder Social home page Coder Social logo

deployr's Introduction

Go Report Card license Release

Table of Contents

deployr

deployr is a simple utility which is designed to allow you to easily automate simple application-deployment via SSH.

The core idea behind deployr is that installing (simple) software upon remote hosts frequently consists of a small number of steps:

  • Uploading a small number of files, for example:
    • A binary application.
    • A configuration-file.
    • A systemd unit-file
    • etc.
  • Running a small number of commands, some conditionally, for example:
    • Enable the systemd unit-file.
    • Start the service.

This is particularly true for golang-based applications which frequently consist of an single binary, a single configuration file, and an init-file to ensure the service can be controlled.

If you want to keep your deployment recipes automatable, and reproducible, then scripting them with a tool like this is ideal. (Though you might prefer something more popular & featureful such as ansible, fabric, salt, etc.)

"Competing" systems tend to offer more facilities, such as the ability to add Unix users, setup MySQL database, add cron-entries, etc. Although it isn't impossible to do those things in deployr it is not as natural as other solutions. (For example you can add a cron-entry by uploading a file to /etc/cron.d/my-service, or you can add a user via Run adduser bob 2>/dev/null.)

One obvious facility that most similar systems, such as ansible, offer is the ability to perform looping operations, and comparisons. We don't offer that and I'm not sure we ever will - even if we did add the ability to add cronjobs, etc.

In short think of this as an alternative to using a bash-script, which invokes scp/rsync/ssh. It is not going to compete with ansible, or similar. (Though it is reasonably close in spirit to fabric albeit with a smaller set of primitives.)

Installation & Dependencies

There are two ways to install this project from source, which depend on the version of the go version you're using.

Source Installation go <= 1.11

If you're using go before 1.11 then the following command should fetch/update deployr, and install it upon your system:

 $ go get -u github.com/skx/deployr

Source installation go >= 1.12

If you're using a more recent version of go (which is highly recommended), you need to clone to a directory which is not present upon your GOPATH:

git clone https://github.com/skx/deployr
cd deployr
go install

If you don't have a golang environment setup you should be able to download a binary for GNU/Linux from our release page.

Overview

deployr has various sub-commands, the most useful is the run command which allows you to execute a recipe-file:

$ deployr run [options] recipe1 recipe2 .. recipeN

Each specified recipe is parsed and the primitives inside them are then executed line by line. The following primitives/commands are available:

  • CopyFile local/path remote/path
    • Copy the specified local file to the specified path on the remote system.
    • If the local & remote files were identical, such that no change was made, then this fact will be noted.
    • See later note on globs.
  • CopyTemplate local/path remote/path
    • Copy the specified local file to the specified path on the remote system, expanding variables prior to running the copy.
    • If the local & remote files were identical, such that no change was made, then this fact will be noted.
    • See later note on globs.
  • DeployTo [user@]hostname[:port]
    • Specify the details of the host to connect to, this is useful if a particular recipe should only be applied against a single host.
    • If you don't specify a target within your recipe itself you can instead pass it upon the command-line via the -target flag.
  • IfChanged "Command"
    • The CopyFile and CopyTemplate primitives record whether they made a change to the remote system.
    • The IfChanged primitive will execute the specified command if the previous copy-operation resulted in the remote system being changed.
  • Run "Command"
    • Run the given command (unconditionally) upon the remote-host.
  • Set name "value"
    • Set the variable "name" to have the value "value".
    • Once set a variable can be used in the recipe, or as part of template-expansion.
  • Sudo may be added as a prefix to Run and IfChanged.
    • If present this will ensure the specified command runs as root.
    • The sudo example found beneath examples/sudo/ demonstrates usage.

Authentication

Public-Key authentication is only supported mechanism for connecting to a remote host, or remote hosts. There is zero support for authentication via passwords.

By default ~/.ssh/id_rsa will be used as the key to connect with, but if you prefer you can specify a different private-key with the -identity flag to the run sub-command:

$ deployr run -identity ~/.ssh/host

In addition to using a key specified via the command-line deployr also supports the use of ssh-agent. Simply set the environmental-variable SSH_AUTH_SOCK to the path of your agent's socket. On Windows deployr supports pageant, which is a Windows-specific implementation of SSH Agent. If pageant is running, deployr will detect it and use it for authentication.

Examples

There are several examples included beneath examples/, the shortest one examples/simple/ is a particularly good recipe to examine to get a feel for the system:

$ cd ./examples/simple/
$ deployr run -target [user@]host.example.com[:port] ./deployr.recipe

For more verbose output the -verbose flag may be added:

$ cd ./examples/simple/
$ deployr run -target [user@]host.example.com[:port] -verbose ./deployr.recipe

Some other flags are also available, consult "deployr help run" for details.

File Globs

Both the CopyFile and CopyTemplate primitives allow the use of file-globs, which allows you to write a line like this:

CopyFile lib/systemd/system/* /lib/systemd/system/

Assuming you have the following input this will copy all the files, as you would expect:

  ├── deploy.recipe
  └── lib
      └── systemd
          └── system
              ├── overseer-enqueue.service
              ├── overseer-enqueue.timer
              ├── overseer-worker.service
              └── purppura-bridge.service

NOTE That this wildcard support is not the same as a recursive copy, that is not supported.

The IfChanged primitive will regard a previous copy operation as having resulted in a change if any single file changes during the run of a copy operation that involves a glob.

Variables

It is often useful to allow values to be stored in variables, for example if you're used to pulling a file from a remote host you might make the version of that release a variable.

Variables are defined with the Set primitive, which takes two arguments:

  • The name of the variable.
  • The value to set for that variable.
    • Values will be set as strings, in fact our mini-language only understands strings.

In the following example we declare the variable called "RELEASE" to have the value "1.2", and then use it in a command-execution:

Set RELEASE "1.2"
Run "wget -O /usr/local/bin/app-${RELEASE} \
       https://example.com/dist/app-${RELEASE}"

It is possible to override the value of a particular variable via a command-line argument, for example:

$ deployr run --set "ENVIRONMENT=PRODUCTION" ...

If you do this any attempt to Set the variable inside the recipe itself will be silently ignored. (i.e. A variable which is set on the command-line will become essentially read-only.) This is useful if you have a recipe where the only real difference is the set of configuration files, and the destination host. For example you could write all your copies like so:

#
# Lack of recursive copy is a pain here.
# See:
#   https://github.com/skx/deployr/issues/6
#
CopyFile files/${ENVIRONMENT}/etc/apache2.conf /etc/apache2/conf
CopyFile files/${ENVIRONMENT}/etc/redis.conf   /etc/redis/redis.conf
..

Then have a tree of files:

  ├── files
      ├── development
      │   ├── apache2.conf
      │   └── redis.conf
      └── production
          ├── apache2.conf
          └── redis.conf

Another case where this come in handy is when dealing the secrets. Pass your secrets via command-line arguments instead of setting them in the recipe so you don't commit them by mistake, for example:

    $ deployr run --set "API_KEY=foobar" ...

Then use the API_KEY:

    Run "curl api.example.com/releases/latest -H 'Authorization: Bearer ${API_KEY}'"

In a CI environnement, use command-line arguments to retrieve environnement variables available in the CI.

    $ deployr run --set "RELEASE=$CI_COMMIT_TAG" ...

Predefined Variables

The following variables are defined by default:

  • host
    • The host being deployed to.
  • now
    • An instance of the golang time object.
  • port
    • The port used to connect to the remote host (22 by default).
  • user
    • The username we login to the remote host as (root by default).

Template Expansion

In addition to copying files literally from the local system to the remote host it is also possible perform some limited template-expansion.

To copy a file literally you'd use the CopyFile primitive which copies the file with no regards to the contents (handling binary content):

CopyFile local.txt /tmp/remote.txt

To copy a file with template-expansion you should use the CopyTemplate primitive instead:

CopyTemplate local.txt /tmp/remote.txt

The file being copied will then be processed with the text/template library which means you can access values like so:

#
# This is a configuration file blah.conf
# We can expand variables like so:
#
# Deployed version {{get "RELEASE"}} on Host:{{get "host"}}:{{get "port"}}
# at {{now.UTC.Day}} {{now.UTC.Month}} {{now.UTC.Year}}
#

In short you write {{get "variable-name-here"}} and the value of the variable will be output inline.

Any variable defined with Set (or via a command-line argument) will be available to you, as well as the predefined variables noted above.

Missing Primitives?

If there are primitives you think would be useful to add then please do file a bug.

Alternatives

There are many alternatives to this simple approach. The most obvious two would be:

  • ansible
    • Uses YAML to let you run commands on multiple remote hosts via SSH.
    • Very featureful, but also a bit hard to be readable due to the YAML use.
  • fabric
    • Another Python-based project, which defines some simple primitive functions such as run and put to run commands, and upload files respectively.

As a very simple alternative I put together marionette which allows running commands, and setting file-content, but this works on the local system only - no SSH involved.

For large-scale deployments you'll probably want to consider Puppet, Chef, or something more established and powerful. Still this system has its place.

Github Setup

This repository is configured to run tests upon every commit, and when pull-requests are created/updated. The testing is carried out via .github/run-tests.sh which is used by the github-action-tester action.

Releases are automated in a similar fashion via .github/build, and the github-action-publish-binaries action.

Steve

deployr's People

Contributors

0xflotus avatar jjeffery avatar mlcdf avatar mtgxx avatar skx avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

deployr's Issues

It would be nice to set values on the command-line.

I've got a couple of recipes which are almost 100% identical, and I launch them like so:

 deployr run ./recipe.dev

vs.

  deployr run ./recipe.prod

The only difference is the release number "1.2" vs "latest", and that I copy files from:

 CopyFile ./dev/etc/systemd/.. ...

If I were to define a variable I could then use:

 CopyFile ${ENVIRONMENT}/etc/systemd

But of course I'd want to set that in the file so that I had:

 Set ENVIRONMENT "production"
 Set RELEASE "1.2"

And if I added a "--set RELEASE=1.2" I'd need to make sure that wasn't overridden. In short variables set on the command line should be read-only and not changed.

No support for sudo

We connect as one user - often root - and have no facility for doing things as other users. Short of the obvious:

Run "su - nobody -s /bin/sh -c /usr/bin/id"

It might be nice to allow "Sudo" as an alternative to "Run". Of course if we're prompted for a password it become complex again, quickly..

If we do go down this road we'd need:

  • Sudo "command"
  • SudoIfChanged "command"

At that point it might be worth taking a step back and removing IfChanged, instead adding If support. So we could just run:

if ( CopyFile .... )  {
   Run "blah"
   Sudo "blah"
}

Of course that's a slippery slope, but perhaps one worth sliding down. Comments welcome.

Feature requests / questions welcome!

For my own personal needs I think this project is pretty much complete as-is, despite the young age.

  • There might be bugs, which will be fixed.
  • There will almost certainly be improvements to the code-quality, and the addition of tests, but from an end-user perspective these are internal details which don't matter.

Anyway if the documentation is lacking/incomplete, or you have feature-requests/questions, please do report an issue :)

Detect pageant when running on Windows

When deciding when to use SSH Agent, the environment variable SSH_SOCK_AUTH is checked. This works fine on Unix-based systems but not on Windows. Given that the simplessh package uses pageant, it would be good if the Windows version checked for pageant when deciding to use SSH Agent.

No stderr on command failure

When a command fails, the only information we have is the return code. This makes it hard to know why that command failed.

$ deployr run -verbose ./deploy.recipe 
Run("program_who_failed")
Error running program
failed to run command 'program_who_failed': Process exited with status 127

I would be useful to also have the stderr.

Run("program_who_failed")
Error running program
failed to run command 'program_who_failed': Process exited with status 127
bash: program_who_failed: commande inconnue... # stderr

CopyFile ignores missing file silently

If you use CopyFile a.txt /tmp/a.txt and a.txt doesn't exists on the local system, deployr silently ignores the problem. This is confusing. It maybe a good idea to fail, if the local file is missing. An impolite solution could look like this:

index 26e15b0..e3f502b 100644
--- a/evaluator/evaluator.go
+++ b/evaluator/evaluator.go
@@ -422,6 +422,11 @@ func (e *Evaluator) copyFiles(pattern string, destination string, expand bool) b
                return false
        }
 
+       if len(files) < 1 {
+               fmt.Printf("Local file missing: %s\n", pattern)
+               os.Exit(11)
+       }
+
        //
        // Did we receive more than one file?
        //```

Use a real lexer.

We should use a lexer & parser to process our input files.

There would be no functional change, but we'd be able to report upon errors (unknown commands, and bogus-arguments) when we read the recipe-file.

We can then also add tests for our parser, as at the moment we have zero tests.

Allow copying directories

Right now:

 CopyFile blah/1.conf /etc/blah/conf.d/1.conf
 CopyFile blah/2.conf /etc/blah/conf.d/2.conf
 CopyFile blah/3.conf /etc/blah/conf.d/3.conf

Would be better if I could allow:

 CopyFile blah/ /etc/blah/conf.d/

This is a compromise because allowing looping-constructs would solve this problem, but that would be a considerable rise in complexity.

Shows sudo password in clear text

Thanks for writing deployr!
When using Sudo in a recipe deployrasks for the password - all fine. But it echos the typed password on the terminal. I think this is dangerous and very unexpected behavior.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.