Security News
Fluent Assertions Faces Backlash After Abandoning Open Source Licensing
Fluent Assertions is facing backlash after dropping the Apache license for a commercial model, leaving users blindsided and questioning contributor rights.
weco-deploy helps us deploy applications as Docker images within Amazon ECS.
This tool only makes sense in the context of how we tag and deploy images, so this README explains our broad approach and how we use weco-deploy.
We package applications as Docker images. Images are automatically pushed on every merge to a main branch, and pushed to an ECR repository.
Within our ECR repository, we have three types of tag. Here's a list of images, to serve as an example:
Here's how we tag images:
Every image has a tag starting ref
; this is the Git commit has that was used to build a given image.
This helps us match an image to its source code.
The latest
tag points to the last image that was pushed to this repository.
It helps us know what the newest version of our code is.
This tag is updated by our CI/CD pipeline.
The env
tags point to the image being used in a particular environment.
For example, we can see here there are images with an env.stage
and an env.prod
tag – these are the images used in our staging and prod environment, respectively.
These are floating tags set by weco-deploy.
Within our ECS task definitions, we point to an env
tag as the Docker image to use.
{
"containerDefinitions": [
{
"image": "{ECR repository prefix}/our_app:env.stage",
...
}
],
...
}
weco-deploy gives us tools for updating these floating env
tags.
This is easiest to explain with some example scenarios:
Example #1: We've pushed some new code, and we want to deploy it to our staging environment.
First our CI/CD pipeline builds new Docker images, publishes them to an ECR repository, and tags them with latest
.
Then we ask weco-deploy to update the env.stage
tag to point to the images that are currently tagged latest
.
Finally, weco-deploy tells ECS to redeploy any services using that tag, which causes them to pull the new Docker image.
Example #2: We've tested the code in staging, we're satisfied it works, and we want to deploy it to production.
First we ask weco-deploy to update the env.prod
tag to point to the images that are currently tagged env.stage
.
Then, weco-deploy tells ECS to redeploy any services using that tag, which causes them to pull the new Docker image.
weco-deploy also tracks all the deployments, so we can see what code was deployed when.
These are the terms which are used by weco-deploy, which have a fairly specific meaning in this context:
weco-deploy is published as a package to PyPI, so you can install it with pip:
$ pip3 install weco-deploy
Most of our use of weco-deploy is automated in Buildkite, so manual use is rare.
The most useful subcommands are:
$ # create a new release, but don't deploy it
$ weco-deploy prepare
$ # deploy a previously created release
$ weco-deploy deploy
$ # create a new release and deploy it straight to ECS
$ weco-deploy release-deploy
You can select a project/label using command-line flags, or if not the tool will prompt you for the required inputs.
FAQs
A tool for deploying ECS services at the Wellcome Collection
We found that weco-deploy demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Fluent Assertions is facing backlash after dropping the Apache license for a commercial model, leaving users blindsided and questioning contributor rights.
Research
Security News
Socket researchers uncover the risks of a malicious Python package targeting Discord developers.
Security News
The UK is proposing a bold ban on ransomware payments by public entities to disrupt cybercrime, protect critical services, and lead global cybersecurity efforts.