rory-deploy 1.8.4.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +7 -0
- data/.gitignore +10 -0
- data/CONTRIBUTORS.md +77 -0
- data/Gemfile +5 -0
- data/LICENSE +19 -0
- data/README.md +574 -0
- data/Rakefile +15 -0
- data/bin/rory +80 -0
- data/bin/rory-gen-config +79 -0
- data/lib/capistrano_dsl.rb +91 -0
- data/lib/centurion.rb +9 -0
- data/lib/centurion/deploy.rb +139 -0
- data/lib/centurion/deploy_dsl.rb +180 -0
- data/lib/centurion/docker_registry.rb +89 -0
- data/lib/centurion/docker_server.rb +79 -0
- data/lib/centurion/docker_server_group.rb +33 -0
- data/lib/centurion/docker_via_api.rb +166 -0
- data/lib/centurion/docker_via_cli.rb +81 -0
- data/lib/centurion/dogestry.rb +92 -0
- data/lib/centurion/logging.rb +28 -0
- data/lib/centurion/service.rb +218 -0
- data/lib/centurion/shell.rb +46 -0
- data/lib/centurion/version.rb +3 -0
- data/lib/core_ext/numeric_bytes.rb +94 -0
- data/lib/tasks/centurion.rake +15 -0
- data/lib/tasks/deploy.rake +250 -0
- data/lib/tasks/info.rake +24 -0
- data/lib/tasks/list.rake +56 -0
- data/rory-deploy.gemspec +33 -0
- data/spec/capistrano_dsl_spec.rb +67 -0
- data/spec/deploy_dsl_spec.rb +184 -0
- data/spec/deploy_spec.rb +212 -0
- data/spec/docker_registry_spec.rb +105 -0
- data/spec/docker_server_group_spec.rb +31 -0
- data/spec/docker_server_spec.rb +92 -0
- data/spec/docker_via_api_spec.rb +246 -0
- data/spec/docker_via_cli_spec.rb +91 -0
- data/spec/dogestry_spec.rb +73 -0
- data/spec/logging_spec.rb +41 -0
- data/spec/service_spec.rb +288 -0
- data/spec/spec_helper.rb +7 -0
- data/spec/support/matchers/capistrano_dsl_matchers.rb +13 -0
- data/spec/support/matchers/exit_code_matches.rb +38 -0
- metadata +214 -0
checksums.yaml
ADDED
@@ -0,0 +1,7 @@
|
|
1
|
+
---
|
2
|
+
SHA1:
|
3
|
+
metadata.gz: ee9cb9eb9869b7178ba48e01ad3a37475abba0bb
|
4
|
+
data.tar.gz: 5d9d656af71896e63b1f361da86b596b90140ce2
|
5
|
+
SHA512:
|
6
|
+
metadata.gz: 31910e1843a61237f658b02acc7692e27d9d475350d288754dc7091aceba2f3631dbcf0860b54a8fea3d9a214c659725dfa46c33c5c9f92186b251cc1d3e1b44
|
7
|
+
data.tar.gz: d914407cd09ace69d4af9e2f9ee137c38b7eba6792627bf5c1ddb96e46a015e5be6104bf38c3e6ae4c17c34a0526df642ffd4d2f7478ce3b347f63a42f150638
|
data/.gitignore
ADDED
data/CONTRIBUTORS.md
ADDED
@@ -0,0 +1,77 @@
|
|
1
|
+
Contributors
|
2
|
+
============
|
3
|
+
|
4
|
+
Post-release
|
5
|
+
------------
|
6
|
+
|
7
|
+
Your name could be here!
|
8
|
+
|
9
|
+
* [Tom Dooner][tdooner]
|
10
|
+
* [Jonathan Chauncey][jchauncey]
|
11
|
+
* [Matt Sanford][mzsanford]
|
12
|
+
* [Suren Karapetyan][skarap]
|
13
|
+
* [Jon Wood][jellybob]
|
14
|
+
* [Mark Borcherding][markborcherding]
|
15
|
+
* [Nick Laferriere][laferrieren]
|
16
|
+
* [Hugo Chinchilla][hugochinchilla]
|
17
|
+
|
18
|
+
Pre-release
|
19
|
+
-----------
|
20
|
+
|
21
|
+
A lot of work was done on Centurion before its public release. Those statistics
|
22
|
+
are not reflected in the current history. Many of the ideas for the project
|
23
|
+
originally came from Nic Benders and the Insights team at New Relic. At the
|
24
|
+
time of public release, here's how the contributors list looked:
|
25
|
+
|
26
|
+
* 343 commits
|
27
|
+
* 12 branches
|
28
|
+
* 0 releases
|
29
|
+
* 19 contributors
|
30
|
+
|
31
|
+
Contributor | Commits | Additions | Deletions
|
32
|
+
----------------------------------------------|------------|-----------|----------
|
33
|
+
[Karl Matthias][relistan] | 97 commits | 3,870 ++ | 3,658 --
|
34
|
+
[Nic Benders][benders] | 36 commits | 1,481 ++ | 971 --
|
35
|
+
[Bryan Stearns][bryanstearns] | 15 commits | 355 ++ | 236 --
|
36
|
+
[Andrew Bloomgarden][aughr] | 47 commits | 326 ++ | 55 --
|
37
|
+
[Jesse Dearing][jessedearing] | 31 commits | 300 ++ | 152 --
|
38
|
+
[Jon Guymon][gnarg] | 17 commits | 242 ++ | 26 --
|
39
|
+
[David Kerr][kerr23] | 7 commits | 212 ++ | 6 --
|
40
|
+
[Aaron Bento][rkive] | 2 commits | 111 ++ | 23 --
|
41
|
+
[Bill Kayser][bkayser] | 7 commits | 106 ++ | 74 --
|
42
|
+
[Joe Lepper][joeLepper] | 7 commits | 96 ++ | 46 --
|
43
|
+
[Didip Kerabat][didip] | 5 commits | 93 ++ | 18 --
|
44
|
+
[David Celis][davidcelis] | 4 commits | 66 ++ | 12 --
|
45
|
+
[Jonathan Thurman][jthurman42] | 2 commits | 40 ++ | 6 --
|
46
|
+
[Amjith Ramanujam][amjith] | 7 commits | 38 ++ | 22 --
|
47
|
+
[Brett Holt][holtbp] | 1 commit | 26 ++ | 0 --
|
48
|
+
[Merlyn Albery-Speyer][curious-attempt-bunny] | 2 commits | 15 ++ | 2 --
|
49
|
+
[Jonathan Owens][intjonathan] | 1 commit | 13 ++ | 10 --
|
50
|
+
[Emily Hyland][duien] | 5 commits | 6 ++ | 2 --
|
51
|
+
[Franky Wahl][frankywahl] | 1 commit | 2 ++ | 0 --
|
52
|
+
|
53
|
+
[relistan]: https://github.com/relistan
|
54
|
+
[benders]: https://github.com/benders
|
55
|
+
[bryanstearns]: https://github.com/bryanstearns
|
56
|
+
[aughr]: https://github.com/aughr
|
57
|
+
[jessedearing]: https://github.com/jessedearing
|
58
|
+
[gnarg]: https://github.com/gnarg
|
59
|
+
[kerr23]: https://github.com/kerr23
|
60
|
+
[rkive]: https://github.com/rkive
|
61
|
+
[bkayser]: https://github.com/bkayser
|
62
|
+
[joeLepper]: https://github.com/joeLepper
|
63
|
+
[didip]: https://github.com/didip
|
64
|
+
[davidcelis]: https://github.com/davidcelis
|
65
|
+
[jthurman42]: https://github.com/jthurman42
|
66
|
+
[amjith]: https://github.com/amjith
|
67
|
+
[holtbp]: https://github.com/holtbp
|
68
|
+
[curious-attempt-bunny]: https://github.com/curious-attempt-bunny
|
69
|
+
[intjonathan]: https://github.com/intjonathan
|
70
|
+
[duien]: https://github.com/duien
|
71
|
+
[frankywahl]: https://github.com/frankywahl
|
72
|
+
[tdooner]: https://github.com/tdooner
|
73
|
+
[jchauncey]: https://github.com/jchauncey
|
74
|
+
[mzsanford]: https://github.com/mzsanford
|
75
|
+
[skarap]: https://github.com/skarap
|
76
|
+
[jellybob]: https://github.com/jellybob
|
77
|
+
[markborcherding]: https://github.com/markborcherding
|
data/Gemfile
ADDED
data/LICENSE
ADDED
@@ -0,0 +1,19 @@
|
|
1
|
+
Copyright (c) 2014 New Relic, Inc.
|
2
|
+
|
3
|
+
Permission is hereby granted, free of charge, to any person obtaining a copy
|
4
|
+
of this software and associated documentation files (the "Software"), to deal
|
5
|
+
in the Software without restriction, including without limitation the rights
|
6
|
+
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
7
|
+
copies of the Software, and to permit persons to whom the Software is
|
8
|
+
furnished to do so, subject to the following conditions:
|
9
|
+
|
10
|
+
The above copyright notice and this permission notice shall be included in
|
11
|
+
all copies or substantial portions of the Software.
|
12
|
+
|
13
|
+
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
14
|
+
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
15
|
+
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
16
|
+
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
17
|
+
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
18
|
+
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
19
|
+
THE SOFTWARE.
|
data/README.md
ADDED
@@ -0,0 +1,574 @@
|
|
1
|
+
Rory
|
2
|
+
=========
|
3
|
+
|
4
|
+
This is a fork of [centurion by newrelic](https://github.com/newrelic/centurion/).
|
5
|
+
|
6
|
+
It includes some modifications needed for deploying our applications at Habitissimo. We will try to get all our modifications included in the newrelic upstream but as we can not wait for the newrelic team to accept our patches we need to keep our own fork.
|
7
|
+
|
8
|
+
The name of the fork is based on the character [Rory Williams](https://en.wikipedia.org/wiki/Rory_Williams) from Doctor Who, which became "The last centurion".
|
9
|
+
|
10
|
+
Original documentation is appended below, **remember to replace centurion with rory for all commands listed in it**.
|
11
|
+
|
12
|
+
Centurion
|
13
|
+
=========
|
14
|
+
|
15
|
+
A deployment tool for Docker. Takes containers from a Docker registry and runs
|
16
|
+
them on a fleet of hosts with the correct environment variables, host volume
|
17
|
+
mappings, and port mappings. Supports rolling deployments out of the box, and
|
18
|
+
makes it easy to ship applications to Docker servers.
|
19
|
+
|
20
|
+
We're using it to run our production infrastructure.
|
21
|
+
|
22
|
+
Centurion works in a two part deployment process where the build process ships
|
23
|
+
a container to the registry, and Centurion ships containers from the registry
|
24
|
+
to the Docker fleet. Registry support is handled by the Docker command line
|
25
|
+
tools directly so you can use anything they currently support via the normal
|
26
|
+
registry mechanism.
|
27
|
+
|
28
|
+
If you haven't been using a registry, you should read up on how to do that
|
29
|
+
before trying to deploy anything with Centurion.
|
30
|
+
|
31
|
+
Commercial Docker Registry Providers:
|
32
|
+
- Docker, Inc. [provides repositories](https://index.docker.io/), and hosts the
|
33
|
+
main public Docker repository.
|
34
|
+
- [Quay.io](https://quay.io) from the CoreOS team
|
35
|
+
|
36
|
+
Open-source:
|
37
|
+
- The [Docker registry](https://github.com/dotcloud/docker-registry) project,
|
38
|
+
built and maintained by Docker. You host this yourself.
|
39
|
+
- (*NEW!*) [Dogestry](https://github.com/dogestry/dogestry) is an
|
40
|
+
s3-backed Docker registry alternative that removes the requirement to set up
|
41
|
+
a centralized registry service or host anything yourself.
|
42
|
+
|
43
|
+
Status
|
44
|
+
------
|
45
|
+
|
46
|
+
This project is under active development! The initial release on GitHub contains
|
47
|
+
one roll-up commit of all our internal code. But all internal development will
|
48
|
+
now be on public GitHub. See the CONTRIBUTORS file for the contributors to the
|
49
|
+
original internal project.
|
50
|
+
|
51
|
+
The **current stable release** is 1.8.0.
|
52
|
+
|
53
|
+
Installation
|
54
|
+
------------
|
55
|
+
|
56
|
+
Centurion is a Ruby gem. It assumes that you have a working, modern-ish Ruby
|
57
|
+
(1.9.3 or higher). On Ubuntu 12.04 you can install this with the `ruby-1.9.1`
|
58
|
+
system package, for example. On OSX this is best accomplished via `rbenv` and
|
59
|
+
`ruby-build` which can be installed with [Homebrew](http://brew.sh/) or from
|
60
|
+
[GitHub](https://github.com/sstephenson/rbenv).
|
61
|
+
|
62
|
+
Once you have a running, modern Ruby, you simply:
|
63
|
+
|
64
|
+
```
|
65
|
+
$ gem install centurion
|
66
|
+
```
|
67
|
+
|
68
|
+
With rbenv you will now need to do an `rbenv rehash` and the commands should
|
69
|
+
be available. With a non-rbenv install, assuming the gem dir is in your path,
|
70
|
+
the commands should just work now.
|
71
|
+
|
72
|
+
Configuration
|
73
|
+
-------------
|
74
|
+
|
75
|
+
Centurion expects to find configuration tasks in the current working directory
|
76
|
+
tree.
|
77
|
+
|
78
|
+
We recommend putting all your configuration for multiple applications into a
|
79
|
+
single repo rather than spreading it around by project. This allows a central
|
80
|
+
choke point on configuration changes between applications and tends to work
|
81
|
+
well with the hand-off in many organizations between the build and deploy
|
82
|
+
steps. If you only have one application, or don't need this you can
|
83
|
+
decentralize the config into each repo.
|
84
|
+
|
85
|
+
It will look for configuration files in either `./config/centurion` or `.`.
|
86
|
+
|
87
|
+
The pattern at New Relic is to have a configs repo with a `Gemfile` that
|
88
|
+
sources the Centurion gem. If you want Centurion to set up the structure for
|
89
|
+
you and to create a sample config, you can simply run `centurionize` once you
|
90
|
+
have the Ruby Gem installed.
|
91
|
+
|
92
|
+
Centurion ships with a simple scaffolding tool that will setup a new config repo for
|
93
|
+
you, as well as scaffold individual project configs. Here's how you run it:
|
94
|
+
|
95
|
+
```bash
|
96
|
+
$ centurionize -p <your_project>
|
97
|
+
```
|
98
|
+
|
99
|
+
`centurionize` relies on Bundler being installed already. Running the command
|
100
|
+
will have the following effects:
|
101
|
+
|
102
|
+
* Ensure that a `config/centurion` directory exists
|
103
|
+
* Scaffold an example config for your project (you can specify the registry)
|
104
|
+
* Ensure that a Gemfile is present
|
105
|
+
* Ensure that Centurion is in the Gemfile (if absent it just appends it)
|
106
|
+
|
107
|
+
Any time you add a new project you can scaffold it in the same manner even
|
108
|
+
in the same repo.
|
109
|
+
|
110
|
+
### Writing configs
|
111
|
+
|
112
|
+
If you used `centurionize` you will have a base config scaffolded for you.
|
113
|
+
But you'll still need to specify all of your configuration.
|
114
|
+
|
115
|
+
Configs are in the form of a Rake task that uses a built-in DSL to make them
|
116
|
+
easy to write. Here's a sample config for a project called "radio-radio" that
|
117
|
+
would go into `config/centurion/radio-radio.rake`:
|
118
|
+
|
119
|
+
```ruby
|
120
|
+
namespace :environment do
|
121
|
+
task :common do
|
122
|
+
set :image, 'example.com/newrelic/radio-radio'
|
123
|
+
host 'docker-server-1.example.com'
|
124
|
+
host 'docker-server-2.example.com'
|
125
|
+
end
|
126
|
+
|
127
|
+
desc 'Staging environment'
|
128
|
+
task :staging => :common do
|
129
|
+
set_current_environment(:staging)
|
130
|
+
env_vars YOUR_ENV: 'staging'
|
131
|
+
env_vars MY_DB: 'radio-db.example.com'
|
132
|
+
host_port 10234, container_port: 9292
|
133
|
+
host_port 10235, container_port: 9293
|
134
|
+
host_volume '/mnt/volume1', container_volume: '/mnt/volume2'
|
135
|
+
end
|
136
|
+
|
137
|
+
desc 'Production environment'
|
138
|
+
task :production => :common do
|
139
|
+
set_current_environment(:production)
|
140
|
+
env_vars YOUR_ENV: 'production'
|
141
|
+
env_vars MY_DB: 'radio-db-prod.example.com'
|
142
|
+
host_port 22234, container_port: 9292
|
143
|
+
host_port 23235, container_port: 9293
|
144
|
+
command ['/bin/bash', '-c', '/path/to/server -e production']
|
145
|
+
end
|
146
|
+
end
|
147
|
+
```
|
148
|
+
|
149
|
+
This sets up a staging and production environment and defines a `common` task
|
150
|
+
that will be run in either case. Note the dependency call in the task
|
151
|
+
definition for the `production` and `staging` tasks. Additionally, it defines
|
152
|
+
some host ports to map, sets which servers to deploy to, and sets a custom
|
153
|
+
command. Some configuration will be provided to the containers at startup time,
|
154
|
+
in the form of environment variables.
|
155
|
+
|
156
|
+
Most of the DSL items (`host_port`, `host_volume`, `env_vars`, `host`) can be
|
157
|
+
specified more than once and will append to the configuration. However, there
|
158
|
+
can only be one `command`; the last one will take priority.
|
159
|
+
|
160
|
+
You can cause your container to be started with a specific DNS server
|
161
|
+
IP address (the equivalent of `docker run --dns 172.17.42.1 ...`) like this:
|
162
|
+
```ruby
|
163
|
+
task :production => :common do
|
164
|
+
set :dns, '172.17.42.1'
|
165
|
+
# ...
|
166
|
+
end
|
167
|
+
```
|
168
|
+
|
169
|
+
### Container Names
|
170
|
+
|
171
|
+
This is the name that shows up in the `docker ps` output. It's the name
|
172
|
+
of the container, not the hostname inside the container. By default
|
173
|
+
the container will be named using the name of the project as the base
|
174
|
+
of the name.
|
175
|
+
|
176
|
+
If you want to name your container something other than the project name,
|
177
|
+
use the `name` setting. The actual name for the created container will
|
178
|
+
have a random hex string appended, to avoid name conflicts when you repeatedly
|
179
|
+
deploy a project:
|
180
|
+
|
181
|
+
```ruby
|
182
|
+
task :common do
|
183
|
+
set :name, 'backend'
|
184
|
+
# ...
|
185
|
+
end
|
186
|
+
```
|
187
|
+
With this, the container will be named something like `backend-4f692997`.
|
188
|
+
|
189
|
+
### Container Hostnames
|
190
|
+
|
191
|
+
If you don't specify a hostname to use inside your container, the container
|
192
|
+
will be given a hostname matching the container ID. This probably is good for
|
193
|
+
a lot of situations, but it might not be good for yours. If you need to have
|
194
|
+
a specific hostname, you can ask Centurion to do that:
|
195
|
+
|
196
|
+
```ruby
|
197
|
+
set :container_hostname, 'yourhostname'
|
198
|
+
```
|
199
|
+
|
200
|
+
That will make *all* of your containers named 'yourhostname'. If you want to do
|
201
|
+
something more dynamic, you can pass a `Proc` or a lambda like this:
|
202
|
+
|
203
|
+
```ruby
|
204
|
+
set :container_hostname, ->(hostname) { "#{hostname}.example.com" }
|
205
|
+
```
|
206
|
+
|
207
|
+
The lambda will be passed the current server's hostname. So, this example will
|
208
|
+
cause ".example.com" to be appended to the hostname of each Docker host during
|
209
|
+
deployment.
|
210
|
+
|
211
|
+
*If you want to restore the old behavior from Centurion 1.6.0* and earlier, you
|
212
|
+
can do the following:
|
213
|
+
|
214
|
+
```ruby
|
215
|
+
set :container_hostname, ->(hostname) { hostname }
|
216
|
+
```
|
217
|
+
|
218
|
+
That will cause the container hostname to match the server's hostname.
|
219
|
+
|
220
|
+
### Network modes
|
221
|
+
|
222
|
+
You may specify the network mode you would like a container to use via:
|
223
|
+
|
224
|
+
```ruby
|
225
|
+
set :network_mode, 'networkmode'
|
226
|
+
```
|
227
|
+
|
228
|
+
Docker (and therefore Centurion) supports one of `bridge` (the default), `host`,
|
229
|
+
and `container:<container-id>` for this argument.
|
230
|
+
|
231
|
+
*Note:* While `host_port` remains required, the mappings specified in it are
|
232
|
+
*ignored* when using `host` and `container...` network modes.
|
233
|
+
|
234
|
+
### CGroup Resource Constraints
|
235
|
+
|
236
|
+
Limits on memory and CPU can be specified with the `memory` and `cpu_shares`
|
237
|
+
settings. Both of these expect a 64-bit integer describing the number of
|
238
|
+
bytes, and the number of CPU shares, respectively.
|
239
|
+
|
240
|
+
For example, to limit the memory to 1G, and the cpu time slice to half the
|
241
|
+
normal length, include the following:
|
242
|
+
|
243
|
+
```ruby
|
244
|
+
memory 1.gigabyte
|
245
|
+
cpu_shares 512
|
246
|
+
```
|
247
|
+
|
248
|
+
For more information on Docker's CGroup limits see [the Docker
|
249
|
+
docs](https://docs.docker.com/reference/run/#runtime-constraints-on-cpu-and-memory).
|
250
|
+
|
251
|
+
### Adding Extended Capabilities
|
252
|
+
|
253
|
+
Additional kernel capabilities may be granted to containers, permitting them
|
254
|
+
device access they do not normally have. You may specify these as follows:
|
255
|
+
|
256
|
+
```ruby
|
257
|
+
add_capability 'SOME_CAPABILITY'
|
258
|
+
add_capability 'ANOTHER_CAPABILITY'
|
259
|
+
drop_capability 'SOMEOTHER_CAPABILITY'
|
260
|
+
```
|
261
|
+
|
262
|
+
You may also ask for all but a few capabilities as follows:
|
263
|
+
|
264
|
+
```ruby
|
265
|
+
add_capability 'ALL'
|
266
|
+
drop_capability 'SOME_CAPABILITY'
|
267
|
+
```
|
268
|
+
|
269
|
+
For more information on which kernel capabilities may be specified, see the
|
270
|
+
[Docker docs](https://docs.docker.com/reference/run/#runtime-privilege-linux-capabilities-and-lxc-configuration).
|
271
|
+
|
272
|
+
### Interpolation
|
273
|
+
|
274
|
+
Currently there a couple of special strings for interpolation that can be added
|
275
|
+
to any `env_var` value in the DSL. `%DOCKER_HOSTNAME%` will be replaced with
|
276
|
+
the current server's hostname in the environment variable at deployment time.
|
277
|
+
Also `%DOCKER_HOST_IP%` will be replaced with the *public* IP address of the
|
278
|
+
Docker server using a `getaddrinfo` call on the client.
|
279
|
+
|
280
|
+
### Use TLS certificate
|
281
|
+
|
282
|
+
Centurion can use your existing Docker TLS certificates when using Docker with
|
283
|
+
TLS support. In doing so you have 2 choices.
|
284
|
+
|
285
|
+
#### Your certificate files are in `~/.docker/`
|
286
|
+
|
287
|
+
You just need to enable the tls mode as the following:
|
288
|
+
|
289
|
+
```ruby
|
290
|
+
task :production => :common do
|
291
|
+
set :tlsverify, true
|
292
|
+
# ...
|
293
|
+
end
|
294
|
+
```
|
295
|
+
|
296
|
+
Centurion will only set the `--tlsverify` to true and Docker will read your
|
297
|
+
certificate from the `~/.docker/` path.
|
298
|
+
|
299
|
+
#### Your certificate files are not in `~/.docker/`
|
300
|
+
|
301
|
+
Given your files are in `/usr/local/certs/`
|
302
|
+
You have to set the following keys:
|
303
|
+
|
304
|
+
```ruby
|
305
|
+
task :production => :common do
|
306
|
+
set :tlscacert, '/usr/local/certs/ca.pem'
|
307
|
+
set :tlscert, '/usr/local/certs/ssl.crt'
|
308
|
+
set :tlskey, '/usr/local/certs/ssl.key'
|
309
|
+
# ...
|
310
|
+
end
|
311
|
+
```
|
312
|
+
|
313
|
+
Deploying
|
314
|
+
---------
|
315
|
+
|
316
|
+
Centurion supports a number of tasks out of the box that make working with
|
317
|
+
distributed containers easy. Here are some examples:
|
318
|
+
|
319
|
+
###Do a rolling deployment to a fleet of Docker servers
|
320
|
+
|
321
|
+
A rolling deployment will stop and start each container one at a time to make
|
322
|
+
sure that the application stays available from the viewpoint of the load
|
323
|
+
balancer. As the deploy runs, a health check will hit each container to ensure
|
324
|
+
that the application booted correctly. By default, this will be a GET request to
|
325
|
+
the root path of the application. The healthcheck endpoint is configurable by adding
|
326
|
+
`set(:status_endpoint, '/somewhere/else')` in your config. The status endpoint
|
327
|
+
must respond with a valid response in the 200 status range.
|
328
|
+
|
329
|
+
````bash
|
330
|
+
$ bundle exec centurion -p radio-radio -e staging -a rolling_deploy
|
331
|
+
````
|
332
|
+
|
333
|
+
**Custom Health Check**:
|
334
|
+
You can use a custom health check by specifying a callable object (anything that
|
335
|
+
responds to :call), e.g. a Proc, lambda, or method. This method will be invoked with
|
336
|
+
the host url, the port that needs to be checked, and the specified endpoint(via
|
337
|
+
`set(:status_endpoint, '/somewhere/else')`). If the port is ready, health check
|
338
|
+
should return a truthy value, falsey otherwise. Here's an example of a custom
|
339
|
+
health check that verifies that an elasticsearch node is up and has joined the
|
340
|
+
cluster.
|
341
|
+
|
342
|
+
````ruby
|
343
|
+
def cluster_green?(target_server, port, endpoint)
|
344
|
+
response = begin
|
345
|
+
Excon.get("http://#{target_server.hostname}:#{port}#{endpoint}")
|
346
|
+
rescue Excon::Errors::SocketError
|
347
|
+
warn "Elasticsearch node not yet up"
|
348
|
+
nil
|
349
|
+
end
|
350
|
+
|
351
|
+
return false unless response
|
352
|
+
!JSON.parse(response)['timed_out']
|
353
|
+
end
|
354
|
+
|
355
|
+
task :production => :common do
|
356
|
+
set_current_environment(:production)
|
357
|
+
set :status_endpoint, "/_cluster/health?wait_for_status=green&wait_for_nodes=2"
|
358
|
+
health_check method(:cluster_green?)
|
359
|
+
host_port 9200, container_port: 9200
|
360
|
+
host 'es-01.example.com'
|
361
|
+
host 'es-02.example.com'
|
362
|
+
end
|
363
|
+
````
|
364
|
+
|
365
|
+
**Rolling Deployment Settings**:
|
366
|
+
You can change the following settings in your config to tune how the rolling
|
367
|
+
deployment behaves. Each of these is controlled with `set(:var_name, 'value')`.
|
368
|
+
These can be different for each environment or put into a common block if they
|
369
|
+
are the same everywhere. Settings are per-project.
|
370
|
+
|
371
|
+
* `rolling_deploy_check_interval` => Controls how long Centurion will wait after
|
372
|
+
seeing a container as up before moving on to the next one. This should be
|
373
|
+
slightly longer than your load balancer check interval. Value in seconds.
|
374
|
+
Defaults to 5 seconds.
|
375
|
+
* `rolling_deploy_wait_time` => The amount of time to wait between unsuccessful
|
376
|
+
health checks before retrying. Value in seconds. Defaults to 5 seconds.
|
377
|
+
* `rolling_deploy_retries` => The number of times to retry a health check on
|
378
|
+
the container once it is running. This count multiplied by the
|
379
|
+
`rolling_deployment_wait_time` is the total time Centurion will wait for
|
380
|
+
an individual container to come up before giving up as a failure. Defaults
|
381
|
+
to 24 attempts.
|
382
|
+
* `rolling_deploy_skip_ports` => Either a single port, or an array of ports
|
383
|
+
that should be skipped for status checks. By default status checking assumes
|
384
|
+
an HTTP server is on the other end and if you are deploying a container where some
|
385
|
+
ports are not HTTP services, this allows you to only health check the ports
|
386
|
+
that are. The default is an empty array. If you have non-HTTP services that you
|
387
|
+
want to check, see Custom Health Checks in the previous section.
|
388
|
+
|
389
|
+
###Deploy a project to a fleet of Docker servers
|
390
|
+
|
391
|
+
This will hard stop, then start containers on all the specified hosts. This
|
392
|
+
is not recommended for apps where one endpoint needs to be available at all
|
393
|
+
times. It is fast.
|
394
|
+
|
395
|
+
````bash
|
396
|
+
$ bundle exec centurion -p radio-radio -e staging -a deploy
|
397
|
+
````
|
398
|
+
|
399
|
+
###Deploy a bash console on a host
|
400
|
+
|
401
|
+
This will give you a command line shell with all of your existing environment
|
402
|
+
passed to the container. The `CMD` from the `Dockerfile` will be replaced
|
403
|
+
with `/bin/bash`. It will use the first host from the host list.
|
404
|
+
|
405
|
+
````bash
|
406
|
+
$ bundle exec centurion -p radio-radio -e staging -a deploy_console
|
407
|
+
````
|
408
|
+
|
409
|
+
###List all the tags running on your servers for a particular project
|
410
|
+
|
411
|
+
Returns a nicely-formatted list of all the current tags and which machines they
|
412
|
+
are running on. Gives a unique list of tags across all hosts as well. This is
|
413
|
+
useful for validating the state of the deployment in the case where something
|
414
|
+
goes wrong mid-deploy.
|
415
|
+
|
416
|
+
```bash
|
417
|
+
$ bundle exec centurion -p radio-radio -e staging -a list:running_container_tags
|
418
|
+
```
|
419
|
+
|
420
|
+
###List all the containers currently running for this project
|
421
|
+
|
422
|
+
Returns a (as yet not very nicely formatted) list of all the containers for
|
423
|
+
this project on each of the servers from the config.
|
424
|
+
|
425
|
+
```bash
|
426
|
+
$ bundle exec centurion -p radio-radio -e staging -a list:running_containers
|
427
|
+
```
|
428
|
+
|
429
|
+
###List registry images
|
430
|
+
|
431
|
+
Returns a list of all the images for this project in the registry.
|
432
|
+
|
433
|
+
````bash
|
434
|
+
$ bundle exec centurion -p radio-radio -e staging -a list
|
435
|
+
````
|
436
|
+
|
437
|
+
### Registry
|
438
|
+
|
439
|
+
Centurion needs to have access to some registry in order to pull images to
|
440
|
+
remote Docker servers. This needs to be either a hosted registry (public or
|
441
|
+
private), or [Dogestry](https://github.com/dogestry/dogestry).
|
442
|
+
|
443
|
+
#### Access to the registry
|
444
|
+
|
445
|
+
If you are not using either Dogestry, or the public registry, you may need to
|
446
|
+
provide authentication credentials. Centurion needs to access the Docker
|
447
|
+
registry hosting your images directly to retrive image ids and tags. This is
|
448
|
+
supported in both the config file and also as command line arguments.
|
449
|
+
|
450
|
+
The command line arguments are:
|
451
|
+
* `--registry-user` => The username to pass to the registry
|
452
|
+
* `--registry-password` => The password
|
453
|
+
|
454
|
+
These correspond to the following settings:
|
455
|
+
|
456
|
+
* `registry_user`
|
457
|
+
* `registry_password`
|
458
|
+
|
459
|
+
#### Alternative Docker Registry
|
460
|
+
|
461
|
+
Centurion normally uses the built-in registry support in the Docker daemon to
|
462
|
+
handle pushing and pulling images. But Centurion also has the ability to use
|
463
|
+
external tooling to support hosting your registry on Amazon S3. That tooling is
|
464
|
+
from a project called [Dogestry](https://github.com/dogestry/dogestry).
|
465
|
+
We have recently improved that tooling substantially in coordination with the
|
466
|
+
Centurion support.
|
467
|
+
|
468
|
+
Dogestry uses the Docker daemon's import/export functionality in combination
|
469
|
+
with Amazon S3 to provide reliable hosting of images. Setting Centurion up to
|
470
|
+
use Dogestry is pretty trivial:
|
471
|
+
|
472
|
+
1. Create an S3 bucket and download the credentials to let you access the
|
473
|
+
bucket. Generally these are IAM user keys.
|
474
|
+
1. Install Dogestry binaries on the client from which Dogestry is run.
|
475
|
+
Binaries are provided in the [GitHub release](https://github.com/dogestry/dogestry).
|
476
|
+
1. Add the settings necessary to get Centurion to pull from Dogestry. A config
|
477
|
+
example is provided below:
|
478
|
+
|
479
|
+
```ruby
|
480
|
+
namespace :environment do
|
481
|
+
task :common do
|
482
|
+
registry :dogestry # Required
|
483
|
+
set :aws_access_key_id, 'abc123' # Required
|
484
|
+
set :aws_secret_key, 'xyz' # Required
|
485
|
+
set :s3_bucket, 'docker-images-bucket' # Required
|
486
|
+
set :s3_region, 'us-east-1' # Optional
|
487
|
+
end
|
488
|
+
end
|
489
|
+
```
|
490
|
+
|
491
|
+
**TLS with Dogestry**: Because this involves a little passing around of both
|
492
|
+
settings and environment variables, there are a couple of things to verify to
|
493
|
+
make sure everything is passed properly between Centurion and Dogestry. If your
|
494
|
+
keys have the default names and are in located in the path represented by
|
495
|
+
`DOCKER_CERT_PATH` in your environment, this should just work. Otherwise you'll
|
496
|
+
need to be sure to `set :tlsverify, true` and *also* set the TLS cert names as
|
497
|
+
decribed above.
|
498
|
+
|
499
|
+
Development
|
500
|
+
-----------
|
501
|
+
|
502
|
+
Centurion supports a few features to make development easier when
|
503
|
+
building your deployment tooling or debugging your containers.
|
504
|
+
|
505
|
+
#### Overriding Environment Variables
|
506
|
+
|
507
|
+
Sometimes when you're doing development you want to try out some configuration
|
508
|
+
settings in environment variables that aren't in the config yet. Or perhaps you
|
509
|
+
want to override existing settings to test with. You can provide the
|
510
|
+
`--override-env` command line flag with some overrides or new variables to set.
|
511
|
+
Here's how to use it:
|
512
|
+
|
513
|
+
```bash
|
514
|
+
$ centurion -e development -a deploy -p radio-radio --override-env=SERVICE_PORT=8080,NAME=radio
|
515
|
+
```
|
516
|
+
|
517
|
+
Centurion is aimed at repeatable deployments so we don't recommend that you use
|
518
|
+
this functionality for production deployments. It will work, but it means that
|
519
|
+
the config is not the whole source of truth for your container configuration.
|
520
|
+
Caveat emptor.
|
521
|
+
|
522
|
+
#### Exporting Environment Variables Locally
|
523
|
+
|
524
|
+
Sometimes you need to test how your code works inside the container and you
|
525
|
+
need to have all of your configuration exported. Centurion includes an action
|
526
|
+
that will let you do that. It exports all of your environment settings for the
|
527
|
+
environment you specify. It then partially sanitizes them to preserve things
|
528
|
+
like `rbenv` settings. Then it executes `/bin/bash` locally.
|
529
|
+
|
530
|
+
The action is named `dev:export_only` and you call it like this:
|
531
|
+
|
532
|
+
```bash
|
533
|
+
$ bundle exec centurion -e development -p testing_project -a dev:export_only
|
534
|
+
$ bundle exec rake spec
|
535
|
+
```
|
536
|
+
|
537
|
+
It's important to note that the second line is actually being invoked with new
|
538
|
+
environment exported.
|
539
|
+
|
540
|
+
Future Additions
|
541
|
+
----------------
|
542
|
+
|
543
|
+
We're currently looking at the following feature additions:
|
544
|
+
|
545
|
+
* [etcd](https://github.com/coreos/etcd) integration for configs and discovery
|
546
|
+
* Add the ability to show all the available tasks on the command line
|
547
|
+
|
548
|
+
Contributions
|
549
|
+
-------------
|
550
|
+
|
551
|
+
Contributions are more than welcome. Bug reports with specific reproduction
|
552
|
+
steps are great. If you have a code contribution you'd like to make, open a
|
553
|
+
pull request with suggested code.
|
554
|
+
|
555
|
+
Pull requests should:
|
556
|
+
|
557
|
+
* Clearly state their intent in the title
|
558
|
+
* Have a description that explains the need for the changes
|
559
|
+
* Include tests!
|
560
|
+
* Not break the public API
|
561
|
+
* Add yourself to the CONTRIBUTORS file. I might forget.
|
562
|
+
|
563
|
+
If you are simply looking to contribute to the project, taking on one of the
|
564
|
+
items in the "Future Additions" section above would be a great place to start.
|
565
|
+
Ping us to let us know you're working on it by opening a GitHub Issue on the
|
566
|
+
project.
|
567
|
+
|
568
|
+
By contributing to this project you agree that you are granting New Relic a
|
569
|
+
non-exclusive, non-revokable, no-cost license to use the code, algorithms,
|
570
|
+
patents, and ideas in that code in our products if we so choose. You also agree
|
571
|
+
the code is provided as-is and you provide no warranties as to its fitness or
|
572
|
+
correctness for any purpose
|
573
|
+
|
574
|
+
Copyright (c) 2014-2015 New Relic, Inc. All rights reserved.
|