subilo

Crates.iosubilo
lib.rssubilo
version0.2.1
sourcesrc
created_at2020-07-02 19:08:34.602518
updated_at2020-10-14 21:09:54.095604
descriptionTiny deployment agent
homepagehttps://github.com/huemul/subilo
repositoryhttps://github.com/huemul/subilo
max_upload_size
id260733
size107,576
Christian Gill (gillchristian)

documentation

README

Subilo

Rust

🛳 Deployment automation agent

Subilo is a tool to setup continuous deployments for applications running on machines with no external integrations, like IoT devices and VPSs.

How it works

The Subilo agent is a small server that lives on your application's machine and listens for secure HTTP webhooks. These webhooks have information about what application to deploy matching the Subilo configuration file (.subilorc). The file also defines what steps should be taken to successfully deploy an application, for example: git pull or pull the latest Docker image, restart the application and send a notification.

Basic example

Configuration (.subilorc):

[[projects]]
name = "foo-app"
path = "~/apps/foo-app"
commands = [
  "git pull",
  "./restart-serever.sh",
  "echo 'Pulled changes and restarted server successfully'",
]

Webhook:

This webhook is usually sent from a CI run after the tests passed.

curl -X POST 'https://subilo.yourdomain.com/webhook' \
  -H 'Authorization: Bearer ********' \
  -H 'Content-Type: application/json' \
  -d '{ "name": "foo-app" }'

Status and logs of these deployments can then be seen in the Dashboard using the URL and the authentication token provided by the Subilo agent.

Install

Install script

curl -s -L https://raw.githubusercontent.com/huemul/subilo/master/install.sh | bash

This command runs the install script. The script downloads the latest Subilo release and attempts to add the Subilo bin path to the $PATH in the correct profile file (~/.profile, ~/.bashrc, ~/.bash_profile, ~/.zshrc or ~/.config/fish/config.fish)

Cargo

cargo install subilo

Manually

Download the latest released binary and add executable permissions:

wget -O subilo "https://github.com/huemul/subilo/releases/download/v0.1.2/subilo-x86-64-linux"
chmod +x subilo

Use

Command line interface

Now that Subilo is available, the help subcommand can be run to display the CLI information:

subilo --help
subilo 0.0.1
Tiny deployment agent

USAGE:
    subilo [FLAGS] [OPTIONS] <SUBCOMMAND>

FLAGS:
    -h, --help       Prints help information
    -V, --version    Prints version information
    -v, --verbose    Makes Subilo verbose. Useful for debugging and seeing what's going on "under the hood"

OPTIONS:
    -s, --secret <secret>    Secret to generate and authenticate the token

SUBCOMMANDS:
    help     Prints this message or the help of the given subcommand(s)
    serve    Start subilo agent
    token    Create a token based on the secret to authorize agent connections

Configuration

Create a .subilorc file with the required configuration. An example can be found here.

Start

To start the agent the serve command should be used specifying the authentication secret, the port (optional), config file and logs directory (optional).

Example:

subilo --secret super-secret serve --port 8089 --config /path/to/.subilorc

NOTE: at the moment, the API to display the deployment jobs status and logs is based on these logs files.

Authentication

To get access to the agent endpoints, create an authentication token using the token command in the CLI.

Token with write permissions:

This token is used to access the POST /webhook endpoint and deploy an application using the predefined commands in .subilorc.

Example:

subilo --secret "super-secret" token --permissions "job:write"

Token with only read permissions:

By default, the token only has read parmissions. In other words, only access the logs and information endpoints. These endpoints can be used to see the status and logs of the deployment jobs. They are what powers the subilo.io website.

Example:

subilo --secret "super-secret" token

Systemd configuration (Optional)

We recommend running Subilo with systemd to easily manage it. But that's completely optional, you may run it however suits you.

Create a systemd service file (/etc/systemd/system/subilo.service) with the following attributes:

[Unit]
Description=Subilo

[Service]
ExecStart=/path/to/subilo -s super-secret-secret serve -l /path/to/subilo-logs -p 8080 -c /path/to/.subilorc

[Install]
WantedBy=multi-user.target

Then enable and start Subilo service:

# Might require sudo
systemctl enable /etc/systemd/system/subilo.service
systemctl start subilo

To read logs and check status from systemctl, the following commands can be used:

systemctl status subilo
journalctl -u subilo -b

Setup deployment webhooks

Once Subilo is running and exposed to the internet, deployment jobs can be triggered by a POST request to the /webhook endpoint wiht the application's name on the payload.

curl -X POST 'https://subilo.yourdomain.com/webhook' \
  -H 'Authorization: Bearer ********' \
  -H 'Content-Type: application/json' \
  -d '{ "name": "foo-app" }'

The name is matched against the .subilorc configuration file and the specified commands are run to deploy the app.

CI

Usually, this webhook is trigger from a CI run, so after the application's tests passed, it can be safely deployed. Store the token as a secret in the CI configuration and add a curl command to POST to the /webhook endpoint to trigger a deploy.

Development

Run

cargo run

# Watch mode
cargo watch -x run

# Setting CLI options
cargo run -- --port 9090 --logs-dir ./logs

Test

cargo test

# Watch mode
cargo watch -x test

LICENSE

MIT License © Christian Gill and Nicoals Del Valle

Commit count: 116

cargo fmt