Skip to content

A Jenkins CI server configured to provide tools to manage OpenMRS servers

License

Notifications You must be signed in to change notification settings

rbuisson/openmrs-cd

 
 

Repository files navigation

alt tag

OpenMRS CD 3 (OCD3)

A dockerized Jenkins server ready to manage dockerized OpenMRS and Bahmni instances.

OCD3 in a nutshell:

  • Builds and deploys all OpenMRS or Bahmni related software artifacts.
  • Provides a definition framework for OpenMRS and Bahmni servers.
  • Delivers server instances to Linux-powered hosts.
  • Tracks code and configuration changes and propagates them to its managed server instances.

User guide

How to build and deploy a project?

There are multiple options depending of the type of project you are deploying, but mainly the 3 following ones should cover 99% of cases:

  • default
  • maven
  • distribution

The build is triggered by a Webhook that must be added to your hosting SCM service (GitHub, GitLab...).

How to configure Webhook for OCD3 on GitHub?

Add Webhook

Create Webhook

Verify Webhook

See here for additional documentation.

default:

The default project type should cover most cases. It assumes that build and deploy instructions are provided in a custom file present at the root of the project and named .ocd3.yml (or .ocd3.yaml)

The .ocd3.yml file should display as below:

version: 1
build:
  bash_commands: <bash command>
deploy:
  bash_commands: <bash command>
  artifact:
    groupId: <a group ID>
    artifactId: <a artifact ID>
    version: <a version>
rebuildOnDependencyChange: true|false

Note that the artifact section is required only if your project is not a Maven project. Note that the rebuildOnDependencyChangeif set to true will parse the project's POM file and save its dependencies so to later rebuild when any dependending artifact has changed.

See an example for a Maven project:

version: 1
build:
  bash_commands: "mvn clean test"
deploy:
  bash_commands: "mvn clean deploy -DskipTests -DaltDeploymentRepository=mks-nexus::default::https://nexus.mekomsolutions.net/repository/maven-snapshots"
rebuildOnDependencyChange: "true"
Show webhook URL:
https://<user>:<password>@openmrs-cd.mekomsolutions.net/generic-webhook-trigger/invoke

maven:

This project type will suit to most Maven projects that simply need to apply standard Maven commands:

  • mvn clean install
  • mvn clean deploy -DaltDeploymentRepository=...
  • with some additional nuances
Show webhook URL:
https://<user>:<password>@openmrs-cd.mekomsolutions.net/generic-webhook-trigger/invoke?projectType=maven

distribution:

A special project type to not only build the project using standard Maven commands but also save its Maven dependencies in a way that the distribution is rebuilt anytime one of the dependency has been rebuilt.

Show webhook URL:
https://<user>:<password>@openmrs-cd.mekomsolutions.net/generic-webhook-trigger/invoke?projectType=distribution

openmrsmodule, initializer, odooaddon...:

There are other types available but most of them are now deprecated, being replaced by the 3 ones described above.

The full list can be found in the src/pipeline1/impl/ folder.

How to deploy a server?

(WIP)

Using secrets in the Instance Event:

To avoid entering clear text secrets in an instance event, one can configure Jenkins Credentials functionality and use the special syntax jenkinsCredentials(<path>) anywhere in the instance. See more on Jenkins Credentials here. For example:

{
  group: hsc
  type: dev
  envVars:{
    "OPENMRS_USERNAME": "jenkinsCredentials(openmrs.password)",
    "PROXY_PORT": "80",
    ...
  }
}

This will allow to substitute the placeholder with the matching Jenkins Credentials secret value.

However, Jenkins needs to be configured in a specific way for the secrets to be picked up.

  • Credentials must be of type "Secret text".
  • The name of the Credentials must either be a group or a pair group_type
  • The "Secret" (text) should be a JSON object. The secret object will then be accessible in the instance event and can be navigated through using dot notation. Any amount of depth is allowed.

In the example above, the secret would look like:

{
  "openmrs": {
    "password": "password123",
    ...
  },
  ...
}

To be made available in an instance definition, the Jenkins Credential should either be named after the instance group (eg, hsc) or the pair group_type (eg, hsc_dev). All instances matching the group or group/type pair will be able to use the secret.

If providing conflicting secret keys, a merge strategy is applied and the group/type credentials will take precedence over the group.

Developer Guide

OCD3 is a Dockerized Jenkins with preconfigured jobs. Those jobs run Node JS scripts or Node-generated Bash scripts.

This explains the structure and content of the root folder of the project:

.
├── docker
├── jenkins
└── node-scripts

node-scripts is the Node JS scripts area, docker holds the Dockerfile (and other resources needed to configure the container) and jenkins contains the parts of Jenkins home that are preconfigured, as well as the pipelines' Jenkinsfiles.

Gradle is used to run all build tasks and package all artifacts that make OCD3.

Working out of the sources directly

When developing on the CD the best is to mount the Docker volumes right out of the sources.

1 - Clone the openmrs-cd repository:

Note: we assume that cloned repositories should go into the home ~/repos folder. Adapt the commands below in accordance to your own local setup.

mkdir -p ~/repos && cd ~/repos && \
  git clone https://github.com/mekomsolutions/openmrs-cd && cd openmrs-cd

2 - Build the Node scripts:

./gradlew node-scripts:build

3 - Run the openmrscd container:

docker-compose up

The 'node-scripts' component

Developing on OCD3 means working in here most of the time. That is because the bulk of the logic of what OCD3 does lives here. Almost all Jenkins jobs are built on the following pattern:

Jenkins jobs run Node scripts that generate Bash scripts that in turn perform the core CD tasks.

This is how one would build the underlying Node JS scripts:

gradle node-scripts:build

And this must be done before submitting code commits. However note that the code base is not really built into anything since the container links directly to /node-scripts, but this formats the code and runs the test suite.

A detailed developer guide about the Node scripts can be found here.

The 'docker' component

See here.

The 'jenkins' component

OCD3 not only needs a Docker image for its binaries but also requires a 'Jenkins home' folder that provides a pre-configured Jenkins setup:

gradle jenkins:build

This will package a zip archive of the jenkins folder.

Note: Developing with the jenkins component may require to use git clean -Xdf from time to time. Please read the note for developpers first.

The parent project (root folder)

Finally it is possible to build everything at once from the root level:

./gradlew build

This will cascade down to all child builds and run them.

To then deploy:

export mksRepoUrl=...
export mksRepoUsername=...
export mksRepoPassword=...
./gradlew deploy

Starting OCD3 for production

The following steps describe a way to gather OCD3 artifacts locally and run the Docker container based on them. In a Un*x shell:

1 - Set the target version:

export VERSION=3.0.0-SNAPSHOT

2 - Copy the artifacts out of the Nexus repo into the local Maven repo:

mvn dependency:get \
  -DgroupId=net.mekomsolutions \
  -DartifactId=openmrs-cd \
  -Dversion=$VERSION \
  -Dpackaging=zip \
  -DremoteRepositories=https://nexus.mekomsolutions.net/repository/maven-public

3 - Unpack everything into openmrs-cd on the home folder:

mvn dependency:copy -Dartifact=net.mekomsolutions:openmrs-cd:$VERSION:zip -DoutputDirectory=/tmp/ && unzip /tmp/openmrs-cd-$VERSION.zip -d /tmp/ && rm /tmp/openmrs-cd-$VERSION.zip && rsync -av --delete /tmp/openmrs-cd-$VERSION/ ~/openmrs-cd/ && rm -r /tmp/openmrs-cd-$VERSION

4 - Run the openmrscd container:

docker run -dti --name openmrscd  -p 8080:8080 \
  -v ~/openmrs-cd/node-scripts:/opt/node-scripts \
  -v ~/openmrs-cd/jenkins_home:/var/jenkins_home \
  -v ~/openmrs-cd/app_data:/var/lib/openmrs_cd/app_data \
  mekomsolutions/openmrscd:$VERSION

After the container has started, the customized Jenkins instance will be accessible at http://localhost:8080 with the following credentials: admin / password.

Authorize 'jenkins' user to write to the app_data folder:

docker exec -it openmrscd \
  bash -c "sudo chown -R jenkins:jenkins /var/lib/openmrs_cd/app_data/"

Attention: The app data folder will contain the CD's file-based database. Make sure to keep it in a safe location.

5 - Setup your Maven repo: You must configure the coordinates of your Maven repo if you intend to deploy your own Maven artifacts with the CD. Launch the artifact_repo.js script to configure the artifacts repository credentials and artifacts upload URLs:

docker exec -it openmrscd \
  bash -c "cd /usr/share/jenkins/ && npm install && node artifact_repo.js"

And answer the prompted questions.

Note: If you do not want to enter the artifacts repository URLs and authentication details by hand (through the CLI) you can just edit usr/share/jenkins/artifact_repo_default.json (see the default one here as an example) with your own repo URLs and ID and then run the script again. It will detect the file and ask you to use it.

About

A Jenkins CI server configured to provide tools to manage OpenMRS servers

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • JavaScript 99.4%
  • Other 0.6%