Skip to content
This repository has been archived by the owner on Apr 27, 2021. It is now read-only.

Latest commit

 

History

History
293 lines (202 loc) · 18 KB

File metadata and controls

293 lines (202 loc) · 18 KB

The Messaging Service ShowCase (MSSC) Application

The Messaging Service Showcase application is quite simple. It is 2 node.js APIs (CMSG - see NR Email Microservice and CHES - see ches-backend) and a React.js UI (see frontend). In production, both backends and the frontend are placed behind a reverse proxy (see reverse-proxy).

For the frontend, we provide a set of npm scripts in package.json file; the most important of which is: npm run build. The reverse proxy has no installation scripts (but does have runtime configuration requirements, see ../reverse-proxy).

OpenShift

The showcase application is deployed to OpenShift. Here you will find documentation about how this application is built and deployed. Since this application is ready for deployment, we will also give some pointers on how to transistion from nothing in OpenShift to having ready-to-go build and deploy configurations. It is assumed that you are familiar with OpenShift commands and resources (ex. buildconfigs, deployconfigs, imagestreams, secrets, configmaps).

Our builds and deployments are performed via Jenkins (see tools). And see Jenkinsfile or Jenkinsfile.cicd to see how the templates are used for building and deploying in our CI/CD pipeline.

Prepare the namespace/environment

There are some requirements for each namespace/environment, that are NOT built and deployed by the CI/CD process. For this project, we need to ensure each namespace has a secret (credentials to connect to the Common Messaging Service - CMSG), and we need a configmap that we can use to set environment variables.

At a minimum, you will need to have your a Service Client ID and secret, and the OAuth Url for that client/environment (basically who, where, how we authenticate). The service client id and password will be created through Get Token. You will need to get the Common Messaging Service (CMSG) api url and the OAuth url for whichever Common Services environment you are targeting. You will also use Get Token to get your service client and url configurations for CHES (Common Hosted Email Service).

Please see Email Microservice OpenShift Readme for more details on secrets, configmap and other configuration details. We use the default names for secrets and config maps.

Secrets/Environment variables

The following oc command creates a new secret, cmsg-client, that will be used to set environment variables in the application.

cmsg-client.username sets environment variable CMSG_CLIENT_ID cmsg-client.password sets environment variable CMSG_CLIENT_SECRET

oc create secret -n <namespace> generic cmsg-client --from-literal=username=<client id> --from-literal=password=<client secret> --type=kubernetes.io/basic-auth

The following oc command creates a new secret, ches-client, that will be used to set environment variables in the application.

ches-client.username sets environment variable CHES_CLIENT_ID ches-client.password sets environment variable CHES_CLIENT_SECRET

oc create secret -n <namespace> generic ches-client --from-literal=username=<ches client id> --from-literal=password=<ches client secret> --type=kubernetes.io/basic-auth

The following oc command creates a new secret, mssc-keycloak-client, that will be used to set environment variables in the application. Note that the username/password (client id/secret) should be the same values and for the same client as we use when setting up the NR Email Microservice Config (see below).

mssc-keycloak-client.username sets environment variable KC_CLIENTID mssc-keycloak-client.password sets environment variable KC_CLIENTSECRET

oc create secret -n <namespace> generic mssc-keycloak-client --from-literal=username=<ches client id> --from-literal=password=<ches client secret> --type=kubernetes.io/basic-auth

ConfigMap/Environment variables

The following oc command creates a new configmap, cmsg-config, that will be used to set environment variables in the application. OAUTH_TOKEN_URL and CMSG_TOP_LEVEL_URL must be set. These will be available as environment variables matching their name (hence the Uppercase underscore convention for their names).

oc create configmap -n <namespace> cmsg-config --from-literal=OAUTH_TOKEN_URL=<oauth token url> --from-literal=CMSG_TOP_LEVEL_URL=<common messaging api top level url>

The following oc command creates a new configmap, ches-config, that will be used to set environment variables in the application for the CHES backend.

oc create configmap -n <namespace> ches-config --from-literal=CHES_API_URL=<ches token url> --from-literal=CHES_TOKEN_URL=<ches authorization token url> --from-literal=SERVER_BODYLIMIT=30mb

The following oc command creates a new configmap, mssc-keycloak-config, that will be used to set environment variables in the application for the CHES backend.

oc create configmap -n <namespace> mssc-keycloak-config --from-literal=KC_REALM=<KeyCloak Realm ID> --from-literal=KC_SERVERURL=<KeyCloak Auth. URL ex. https://dev.oidc.gov.bc.ca/auth>

Backend - NR Email Microservice Config

We also need to set up secrets and config map for our backend deployment. See User Authentication Secrets and ConfigMap in the microservice project for more. Note that the username/password (client id/secret) should be the same values and for the same client as we use when setting up the MSSC - CHES Backend (mssc-keycloak-client secret) (see above).

Overview

To deploy the 3 components (backend, frontend, reverse-proxy), into multiple enviroments (one per pull-request, one each for master in dev, test, and prod); we use a series of templates that allows us to configure these deployments. We do our builds and deploys through Jenkins, and the coordination and configuration of the templates is done in Jenkinsfiles. See Jenkinsfile and Jenkinsfile.cicd to see how the templates are used for building and deploying in our CI/CD pipeline.

Since we employ node.js for both the backend and frontend builds, we have used chained builds to help reduce the time to deploy. That is, we create an image that contains our required npm installs and we only re-build that image if the package.json changes. Downloading and installing all the npm modules can be time consuming, so we do not want to incur that hit for each deployment. Once we have our valid npm image, we can use that for our frontend build.

The overall build/deployment process is:

  1. Create/Update NPM Images (if needed)
  2. "Compile"/Build Frontend production bundle
  3. Create Runtime images for Backend, Frontend, Reverse Proxy
  4. Deploy Runtime image and service for Backend
  5. Deploy Runtime image and service for Frontend
  6. Deploy Runtime image, service, and route for Reverse Proxy

Templates

Build Template - Backend (Email Microservice)

The backend runtime is NR Email Microservice. We use their build config and we provide parameters specific for our needs.

We pass the following to the build template:

Name Description
SOURCE_REPO_REF this is which tag, or release of the microservice we are building
APP_LABEL we want this to reflect our MSSC app label (ex. mssc-pr-5, mssc-master)
IMAGE_NAME this is the name we use for the objects required for the microservice (ex. mssc-pr-5-backend or mssc-master-backend)

Build Template - frontend-npm.bc.yaml

This template is used to create our Frontend specific NPM image. This image will only be created and updated if the frontend/package.json changes. This becomes the "base" image for our Frontend Builder image. We use an inline Dockerfile to create a fairly slim node.js container with libraries required to build our Frontend static file bundle.

The template expects 5 parameters:

Name Description
REPO_NAME name of the repository
JOB_NAME this will be master or a pull request (ex. pr-3)
SOURCE_REPO_URL complete url to the repo (including .git)
SOURCE_REPO_REF master or pull request ref (ex. pull/3/head)
APP_NAME name of the application: mssc

Build Template - frontend-builder.bc.yaml

This template is used to create our Frontend Builder image, it is 2nd in the Frontend chained build and is based on frontend-npm.bc.yaml. This image will only be created and updated if the frontend/* code changes - basically if we update any Frontend code. This will call our frontend "npm run build" script and produce a minified React production bundle. In order to have this bundle configured correctly, we need to tell it the relative path to our backend. This is done with and parameter named PATH_ROOT that will subsequently be used to configure an environment variable: REACT_APP_API_ROOT that is compiled into the application.

The template expects 7 parameters:

Name Description
REPO_NAME name of the repository
JOB_NAME this will be master or a pull request (ex. pr-3)
SOURCE_REPO_URL complete url to the repo (including .git)
SOURCE_REPO_REF master or pull request ref (ex. pull/3/head)
APP_NAME name of the application: mssc
NAMESPACE the Openshift namespace where we can source our Frontend NPM image (ex. z208i4-tools)
PATH_ROOT compiled into our React code, the path were we will be hosting the backend and frontend (ex. /pr-3 or /mssc)

Build Template - ches-backend.bc.yaml

This template is used to create our CHES backend Runtime image.

The template expects 4 parameters:

Name Description
JOB_NAME this will be master or a pull request (ex. pr-3)
SOURCE_REPO_URL complete url to the repo (including .git)
SOURCE_REPO_REF master or pull request ref (ex. pull/3/head)
APP_NAME name of the application: mssc

Build Template - frontend.bc.yaml

This template is used to create our Frontend Runtime image, it is 3rd in the Frontend chained build and uses frontend-builder.bc.yaml. This image will only be created and updated if the frontend/* code changes - basically if we update any Frontend code. The minified React production bundle is copied into a new image that is a Caddy server, which serves that static file.

The template expects 6 parameters:

Name Description
REPO_NAME name of the repository
JOB_NAME this will be master or a pull request (ex. pr-3)
SOURCE_REPO_URL complete url to the repo (including .git)
SOURCE_REPO_REF master or pull request ref (ex. pull/3/head)
APP_NAME name of the application: mssc
NAMESPACE the Openshift namespace where we can source our Frontend Builder image (ex. z208i4-tools)

Build Template - reverse-proxy.bc.yaml

This template is used to create our Reverse Proxy Runtime image. Our source (a Caddyfile) is copied into a BcGov Caddy base image.

The template expects 5 parameters:

Name Description
REPO_NAME name of the repository
JOB_NAME this will be master or a pull request (ex. pr-3)
SOURCE_REPO_URL complete url to the repo (including .git)
SOURCE_REPO_REF master or pull request ref (ex. pull/3/head)
APP_NAME name of the application: mssc

Deploy Template - Backend (Email Microservice)

This template deploys our Backend Runtime image (nodejs server) and creates a service for it. This service is internal and used by the Reverse Proxy to handle backend requests.

We provide the following parameters to the deployment config:

Name Description
APP_LABEL we want this to reflect our MSSC app label (ex. mssc-pr-5, mssc-master)
IMAGE_NAME this is the name we use for the objects required for the microservice (ex. mssc-pr-5-backend or mssc-master-backend)
NAMESPACE the Openshift namespace to which these objects are deployed (ex. z208i4-dev)
SECRET_NAME this is the name of our secrets for CMSG Service Client: cmsg-client
CONFIG_MAP_NAME this is the name of our config map for CMSG Service Client Urls: cmsg-config
CMSG_SENDER the email address we use as our default sender. NR.CommonServiceShowcase@gov.bc.ca
HOST_URL this is the full url that will be exposed by our reverse proxy. (ex. https://${HOST_ROUTE}${PATH_ROOT})

Deploy Template - frontend.dc.yaml

This template deploys our Frontend Runtime image (Caddy static files server) and creates a service for it. This service is internal and used by the Reverse Proxy to handle frontend requests.

The template expects 5 parameters:

Name Description
REPO_NAME name of the repository
JOB_NAME this will be master or a pull request (ex. pr-3)
APP_NAME name of the application: mssc
NAMESPACE the Openshift namespace to which these objects are deployed (ex. z208i4-dev)
PATH_ROOT Same as we used to build the React code, the path were we will be hosting the backend and frontend (ex. /pr-3 or /mssc)

Deploy Template - ches-backend.dc.yaml

This template deploys our CHES Backend Runtime image creates a service for it. This service is internal and used by the Reverse Proxy to handle ches api requests.

The template expects 4 parameters:

Name Description
JOB_NAME this will be master or a pull request (ex. pr-3)
APP_NAME name of the application: mssc
NAMESPACE the Openshift namespace to which these objects are deployed (ex. z208i4-dev)
SERVER_HOST_URL this is the full url that will be exposed by our reverse proxy. (ex. https://${HOST_ROUTE}${PATH_ROOT})

Deploy Template - reverse-proxy.dc.yaml

This template deploys our Reverse Proxy Runtime image (Caddy reverse proxy server), creates a service for it and exposes a route (publicly accessible Url).

The template expects 6 parameters:

Name Description
REPO_NAME name of the repository
JOB_NAME this will be master or a pull request (ex. pr-3)
APP_NAME name of the application: mssc
HOST_ROUTE domain for this instance (ex. z208i4-dev.pathfinder.gov.bc.ca)
PATH_ROOT Same as we used to build the React code, the path were we will be hosting the backend and frontend (ex. /pr-3 or /mssc)

HOST_ROUTE and PATH_ROOT are combined to make the Url.

Notes

The deployment templates also accept parameters for resource limits and requests, so they can be adjusted per environment/deployment.

Examples

Please see Email Microservice OpenShift Readme for examples on how one would call openshift templates and provide parameters on the command line. The following demonstrates calls to test a branch before a pull request is made. Not all possible parameters are passed in, we make use of some defaults for secrets and config map names.

cd openshift

export proj=<project namespace>

export REPO_NAME=nr-email-microservice
export JOB_NAME=pr-x
export SOURCE_REPO_URL=https://github.com/bcgov/nr-email-microservice.git
export SOURCE_REPO_REF=feature/oidc-auth
export APP_NAME=mssc
export NAMESPACE=$proj
export PATH_ROOT=/pr-x
export HOST_URL=https://$APP_NAME-dev.pathfinder.gov.bc.ca$PATH_ROOT


oc -n $proj process -f frontend-npm.bc.yaml -p REPO_NAME=$REPO_NAME -p JOB_NAME=$JOB_NAME -p SOURCE_REPO_URL=$SOURCE_REPO_URL -p SOURCE_REPO_REF=$SOURCE_REPO_REF -p APP_NAME=$APP_NAME -o yaml | oc -n $proj create -f -

  imagestream.image.openshift.io/mssc-pr-x-frontend-npm created
  buildconfig.build.openshift.io/mssc-pr-x-frontend-npm created

oc -n $proj start-build mssc-pr-x-frontend-npm

  build.build.openshift.io/mssc-pr-x-frontend-npm-1 started

oc logs build/mssc-pr-x-frontend-npm-1 --follow


oc -n $proj process -f frontend-builder.bc.yaml -p REPO_NAME=$REPO_NAME -p JOB_NAME=$JOB_NAME -p SOURCE_REPO_URL=$SOURCE_REPO_URL -p SOURCE_REPO_REF=$SOURCE_REPO_REF -p APP_NAME=$APP_NAME -p PATH_ROOT=$PATH_ROOT -p NAMESPACE=$NAMESPACE -o yaml | oc -n $proj create -f -

  imagestream.image.openshift.io/mssc-pr-x-frontend-builder created
  buildconfig.build.openshift.io/mssc-pr-x-frontend-builder created

oc -n $proj start-build mssc-pr-x-frontend-builder

  build.build.openshift.io/mssc-pr-x-frontend-builder-1 started

oc logs build/mssc-pr-x-frontend-builder-1 --follow

oc -n $proj process -f frontend.bc.yaml -p REPO_NAME=$REPO_NAME -p JOB_NAME=$JOB_NAME -p SOURCE_REPO_URL=$SOURCE_REPO_URL -p SOURCE_REPO_REF=$SOURCE_REPO_REF -p APP_NAME=$APP_NAME -p NAMESPACE=$NAMESPACE -o yaml | oc -n $proj create -f -

  imagestream.image.openshift.io/mssc-pr-x-frontend created
  buildconfig.build.openshift.io/mssc-pr-x-frontend created

oc -n $proj start-build mssc-pr-x-frontend

  build.build.openshift.io/mssc-pr-x-frontend-1 started

oc logs build/mssc-pr-x-frontend-1 --follow

oc -n $proj process -f ches-backend.bc.yaml -p JOB_NAME=$JOB_NAME -p SOURCE_REPO_URL=$SOURCE_REPO_URL -p SOURCE_REPO_REF=$SOURCE_REPO_REF -p APP_NAME=$APP_NAME -o yaml | oc -n $proj create -f -
oc -n $proj start-build mssc-pr-x-ches-backend
oc logs build/mssc-pr-x-ches-backend-1 --follow

oc -n $proj process -f ches-backend.dc.yaml -p JOB_NAME=$JOB_NAME -p APP_NAME=$APP_NAME -p NAMESPACE=$NAMESPACE -p HOST_URL=$HOST_URL  -o yaml | oc -n $proj create -f -
oc -n $proj rollout latest dc/mssc-pr-x-ches-backend

oc -n $proj process -f frontend.dc.yaml -p REPO_NAME=$REPO_NAME -p JOB_NAME=$JOB_NAME -p APP_NAME=$APP_NAME -p NAMESPACE=$NAMESPACE -p PATH_ROOT=$PATH_ROOT -p HOST_URL=$HOST_URL -o yaml | oc -n $proj create -f -

  service/mssc-pr-x-frontend created
  deploymentconfig.apps.openshift.io/mssc-pr-x-frontend created

oc -n $proj rollout latest dc/mssc-pr-x-frontend

oc -n $proj  delete all,template,secret,configmap,pvc,serviceaccount,rolebinding --selector app=$APP_NAME-$JOB_NAME