- Amazon ECR Docker Credential Helper
- HashiCorp Terraform
- AWS CLI (Command Line Interface)
- kubectl - The Kubernetes command-line tool
- cli53 - Command line tool for Amazon Route 53
- aws-env - Secure way to handle environment variables in Docker
I'm using the official Docker repository. Please visit https://github.com/docker-library/docker for more information.
The Amazon ECR Docker Credential Helper is a credential helper for the Docker daemon that makes it easier to use Amazon EC2 Container Registry (ECR).
The AECH (Amazon ECR Docker Credential Helper) is baked into this Docker in Docker image.
If you want to know how the Credential Helper works and what else it needed to use the helper successfully, please visit https://github.com/awslabs/amazon-ecr-credential-helper.
Remember to set the AWS environment variables.
Terraform is a tool for building, changing, and versioning infrastructure safely and efficiently. Terraform can manage existing and popular service providers as well as custom in-house solutions. Please visit https://www.terraform.io/ for more information.
We will always build the latest version of Terraform.
The latest 0.11.x binary is available under /usr/local/bin/terraform0.11
.
The AWS Command Line Interface (CLI) is a unified tool to manage your AWS services. Please visit https://aws.amazon.com/cli/?nc1=h_ls for more information.
The Kubernetes command-line tool, kubectl, allows you to run commands against Kubernetes clusters. You can use kubectl to deploy applications, inspect and manage cluster resources, and view logs.
cli53 provides import and export from BIND format and simple command line management of Route 53 domains. Please visit https://github.com/barnybug/cli53 for more information.
aws-env is a small utility that tries to solve problem of passing environment variables to applications in a secure way, especially in a Docker containers. It uses AWS Parameter Store to securely store applications' configuration -- ideal for storing all kind of secrets. Please visit https://github.com/Droplr/aws-env for more information.
Add something like the following to your .gitlab-ci.yml
:
before_script:
- eval $(ssh-agent) && setup_ssh.sh s3-bucket/path/to/your/private_ssh_key
script:
- deploy_to_docker.sh "deploy/app.yml" "user@host"
The Docker compose file cannot be named docker-compose.yml
because the filename will be used to namespace the service names.
Specify your S3 bucket without 's3://'.
before_script:
- eval $(ssh-agent) && setup_ssh.sh s3-bucket/path/to/your/private_ssh_key
script:
- deploy_to_swarm.sh "app-name" "[email protected]" [ssm/path/to/your/credentials]
Specify your S3 bucket without 's3://'.
before_script:
- aws s3 cp s3://path-to-your-k8s/config ~/.kube
- export NAMESPACE=live
script:
- deploy_to_kubernetes.sh k8s
The "k8s" in deploy_to_kubernetes.sh k8s
is either a file or directory to your K8s manifests.