projen-pipelines
v0.2.2
Published
[![npm version](https://badge.fury.io/js/projen-pipelines.svg)](https://www.npmjs.com/package/projen-pipelines)
Downloads
1,275
Readme
Projen Pipelines
Projen Pipelines is an open-source project that automates the generation of CI/CD pipelines using Projen, a project configuration tool created by the inventor of AWS CDK. It provides high-level abstractions for defining continuous delivery (CD) pipelines for applications, specifically designed to work with the projen project configuration engine.
Key Features
- Automates code generation for CI/CD pipelines
- Supports multiple CI/CD platforms (currently GitHub Actions and GitLab CI, with more in development)
- Provides baked-in proven defaults for pipeline configurations
- Enables compliance-as-code integration
- Allows easy switching between different CI/CD platforms without rewriting pipeline configurations
- Handles complex deployment scenarios with less code
- Manages AWS infrastructure more efficiently and straightforwardly
Benefits
- Reduces repetitive work in writing and maintaining pipeline configurations
- Ensures consistency across projects by using proven defaults
- Simplifies compliance management by integrating it directly into pipeline definitions
- Facilitates platform migrations (e.g., from GitHub to GitLab) by abstracting pipeline definitions
Beyond AWS CDK: A Vision for Universal CI/CD Pipeline Generation
While Projen Pipelines currently focuses on AWS CDK applications, our vision extends far beyond this initial scope. We aim to evolve into a universal CI/CD pipeline generator capable of supporting a wide variety of application types and deployment targets.
Future Direction:
- Diverse Application Support: We plan to expand our capabilities to generate pipelines for various application types, including but not limited to:
- Traditional web applications
- Terraform / OpenTOFU projects
- Winglang applications
- Multi-Cloud Deployment: While we started with AWS, we aim to support deployments to other major cloud providers like Azure, Google Cloud Platform, and others.
- On-Premises and Hybrid Scenarios: We recognize the importance of on-premises and hybrid cloud setups and plan to cater to these deployment models.
- Framework Agnostic: Our goal is to make Projen Pipelines adaptable to work with various development frameworks and tools, not just those related to AWS or cloud deployments.
- Extensibility: We're designing the system to be easily extensible, allowing the community to contribute modules for new application types, deployment targets, or CI/CD platforms.
By broadening our scope, we aim to create a tool that can standardize and simplify CI/CD pipeline creation across the entire spectrum of modern application development and deployment scenarios. We invite the community to join us in this journey, contributing ideas, use cases, and code to help realize this vision.
How Projen Pipelines work
Under the hood, after you define the pipeline and select the target engine you want to work on, we use code generation methods to create the required CI/CD pipeline in your project.
We are considering allowing the selection of multiple engines going forward - please let us know if this is a feature you would use!
Getting Started
Installation
To install the package, add the package projen-pipelines
to your projects devDeps in your projen configuration file.
After installing the package, you can import and use the constructs to define your CDK Pipelines.
You will also have to setup an IAM role that can be used by GitHub Actions. You can find a tutorial on how set this up here: Configuring OpenID Connect in Amazon Web Services
Usage with AWS CDK
You can start using the constructs provided by Projen Pipelines in your AWS CDK applications. Here's a brief example:
import { awscdk } from 'projen';
import { GithubCDKPipeline } from 'projen-pipelines';
// Define your AWS CDK TypeScript App
const app = new awscdk.AwsCdkTypeScriptApp({
cdkVersion: '2.150.0',
name: 'my-awesome-app',
defaultReleaseBranch: 'main',
devDeps: [
'projen-pipelines',
],
});
// Create the pipeline
new GithubCDKPipeline(app, {
stackPrefix: 'MyApp',
iamRoleArns: {
default: 'arn:aws:iam::123456789012:role/GithubDeploymentRole',
},
pkgNamespace: '@company-assemblies',
useGithubPackagesForAssembly: true,
stages: [
{
name: 'dev',
env: { account: '123456789012', region: 'eu-central-1' },
}, {
name: 'prod',
manualApproval: true,
env: {account: '123456789012', region: 'eu-central-1' },
}],
});
After running projen (npx projen
) a new file called src/app.ts
will be created and contain a specialized CDK App class for your project.
You can then use this in your main.ts
to configure your deployment.
import { PipelineApp } from './app';
import { BackendStack } from './stack';
const app = new PipelineApp({
provideDevStack: (scope, id, props) => {
return new BackendStack(scope, id, {
...props,
apiHostname: 'api-dev',
myConfigSetting: 'value-for-dev',
});
},
provideProdStack: (scope, id, props) => {
return new BackendStack(scope, id, {
...props,
apiHostname: 'api',
myConfigSetting: 'value-for-prod',
});
},
providePersonalStack: (scope, id, props) => {
return new BackendStack(scope, id, {
...props,
apiHostname: `api-${props.stageName}`,
myConfigSetting: 'value-for-personal-stage',
});
},
});
app.synth();
Setting Up Trust Relationships Between Accounts
When planning to manage multiple staging environments, you will need to establish trust relationships. This process centralizes deployment control, improving operational efficiency and security by consolidating deployment management through a singular, monitored channel. Here is a simplified diagram for the setup:
Step 1: Bootstrapping Each Account
Bootstrapping initializes the AWS CDK environment in each account. It prepares the account to work with AWS CDK apps deployed from other accounts. Use the cdk bootstrap
command for this purpose. Replace <deployment_account_id>
with the actual AWS account ID of your deployment account.
You can use the CloudShell to bootstrap each staging account:
cdk bootstrap --trust <deployment_account_id> --cloudformation-execution-policies "arn:aws:iam::aws:policy/AdministratorAccess"
Note:
While AdministratorAccess
grants full access to all AWS services and resources, it's not recommended for production environments due to security risks. Instead, create custom IAM policies that grant only the necessary permissions required for deployment operations.
Deployment
The <Engine>CDKPipeline
class creates and adds several tasks to the projen project that then can be used in your pipeline to deploy your application to AWS.
Here's a brief description of each one:
deploy:personal - This task deploys the application's personal stage, which is a distinct, isolated deployment of the application. The personal stage is intended for personal use, such as testing and development.
watch:personal - This task deploys the personal stage of the application in watch mode. In this mode, the AWS CDK monitors your application source files for changes, automatically re-synthesizing and deploying when it detects any changes.
diff:personal - This task compares the deployed personal stage with the current state of the application code. It's used to understand what changes would be made if the application were deployed.
destroy:personal - This task destroys the resources created for the personal stage of the application.
deploy:feature - This task deploys the application's feature stage. The feature stage is used for new features testing before these are merged into the main branch.
diff:feature - This task is similar to
diff:personal
, but for the feature stage.destroy:feature - This task destroys the resources created for the feature stage of the application.
deploy: - This task deploys a specific stage of the application (like 'dev' or 'prod').
diff: - This task compares the specified application stage with the current state of the application code.
publish:assets - This task publishes the CDK assets to all accounts. This is useful when the CDK application uses assets like Docker images or files from the S3 bucket.
bump - This task bumps the version based on the latest git tag and pushes the updated tag to the git repository.
release:push-assembly - This task creates a manifest, bumps the version without creating a git tag, and publishes the cloud assembly to your registry.
Remember that these tasks are created and managed automatically by the CDKPipeline
class. You can run these tasks using the npx projen TASK_NAME
command.
Current Status
Projen-Pipelines is currently in version 0.x, awaiting Projen's 1.0 release. Despite its pre-1.0 status, it's being used in several production environments.
Contributing
By raising feature requests or issues
Use the Github integrated "Issues" view to create an item that you would love to have added to our open source project.
No request is too big or too small - get your thoughts created and we'll get back to you if we have questions!
By committing code
We welcome all contributions to Projen Pipelines! Here's how you can get started:
Fork the Repository: Click the 'Fork' button at the top right of this page to duplicate this repository in your GitHub account.
Clone your Fork: Clone the forked repository to your local machine.
git clone https://github.com/<your_username>/projen-pipelines.git
- Create a Branch: To keep your work organized, create a branch for your contribution.
git checkout -b my-branch
Make your Changes: Make your changes, additions, or fixes to the codebase. Remember to follow the existing code style.
Test your Changes: Before committing your changes, make sure to test them to ensure they work as expected and do not introduce bugs.
Commit your Changes: Commit your changes with a descriptive commit message using conventional commit messages.
git commit -m "feat: Your descriptive commit message"
- Push to your Fork: Push your commits to the branch in your forked repository.
git push -u origin my-branch
- Submit a Pull Request: Once your changes are ready to be reviewed, create a pull request from your forked repository's branch into the
main
branch of this repository.
Your pull request will be reviewed and hopefully merged quickly. Thanks for contributing!
How to test changes?
The best way currently is to test things locally or - if you have a working stall of all supported CI/CD tools - manually test the functionalities there in diferent projects.
For local testing:
Using yalc push
you can install the project locally to your local yalc package manager. You can also use npm run local-push
instead of this.
With yalc add projen-pipelines
you can then use it in a local project.
Future Plans
- Move the project to the Open Construct Foundation for broader community involvement
- Continue expanding support for different CI/CD platforms and project types
Join us in elevating CI/CD pipeline discussions from implementation details to fundamental building blocks, and help create a more efficient, standardized approach to pipeline development!
Known issues
Environment variable not recognized during npx projen
When attempting to run npx projen
, users may encounter an error related to environment variable substitution within configuration files. Specifically, the ${GITHUB_TOKEN}
placeholder fails to be replaced.
Solution
To resolve this issue, prefix the npx projen
command with the GITHUB_TOKEN=
environment variable:
GITHUB_TOKEN= npx projen