Skip to main content

a dead-simple backplane for Dockerized applications

Project description

logo

backplane

WebsiteDocumentationSource Code

A batteries-included launchpad for your Docker Compose services - with free SSL and Git-based continuous delivery. Run any Docker app manually or from backplane's app-store in no time.

"Version" "p3r. Slack"


Get started

🚀 Check out our Examples section for quick-start templates for Wordpress, Sonarqube and more

pip install backplane
backplane init
backplane up

You can now visit the dashboards of Traefik and Portainer in your browser:

Configure your Docker Compose services

Exposing one of your services through backplane is easy:

  • add it to the backplane Docker network
  • add a label backplane.enabled with value true

backplane will automatically pick up the service's name (e.g. whoami) and exposes it as a subdomain of your backplane domain (defaults to 127-0-0-1.ns0.co).

NOTE: this assumes that your service is accessible on port 80 inside the container. If that is NOT the case, see Advanced configuration

version: "3.3"

services:
  whoami:
    image: "traefik/whoami"
    container_name: "whoami"
    networks:
      - backplane
    labels:
      - "backplane.enabled=true"

networks:
  backplane:
    external: true

Your service will be exposed as http://whoami.127-0-0-1.ns0.co.

Use backplane with HTTPS

Use --https and add a mail address for LetsEncrypt on installation to enable additional security for your applications. An optional --domain can be set on installation (defaults to $SERVER_IP.ns0.co, e.g. 193-43-54-23.ns0.co if --https is set).

backplane init --https --mail letsencrypt@mydomain.com [--domain mydomain.com]
backplane up

This enables the following additional features:

  • access your Docker Compose services as subdomains of mydomain.com
  • automatic SSL for your Docker Compose services through LetsEncrypt (HTTP-Validation, so this doesn't work on your developer machine unless you deal with the necessary port-forwardings)
  • automatic HTTP to HTTPS redirect
  • sane security defaults

The Docker Compose stack definition doesn't change from the one without --https. backplane deals with the necessary configuration.

version: "3.3"

services:
  whoami:
    image: "traefik/whoami"
    container_name: "whoami"
    networks:
      - backplane
    labels:
      - "backplane.enabled=true"

networks:
  backplane:
    external: true

Your container will be exposed as https://whoami.mydomain.com.

Authentication

The default username for authentication with backplane services is admin, the default password is backplane.

Assuming you don't want to roll with the defaults when running backplane on a public server, you can add --user and --password to the init command to specify your own values.

backplane init --https --user testuser --password testpassword

Authentication for your services

Traefik comes with a BasicAuth Middleware that you can use to protect your services with the username and password configured above. All you need to do is to activate the Traefik middleware for your service:

version: "3.3"

services:
  whoami:
    image: "traefik/whoami"
    container_name: "whoami"
    networks:
      - backplane
    labels:
      - "backplane.enabled=true"
      - "traefik.http.routers.whoami.middlewares=auth@docker"

networks:
  backplane:
    external: true

When initalized with --https, authentication will be activated for Traefik and Portainer automatically.

Deploy to backplane (Experimental)

NOTE: this is still WIP and subject to change. We try to provide an unopinonated wrapper around docker-compose with a few "augmentations" that is fully compatible with standard Docker Compose stacks. We also plan to integrate with Portainer's templating system to make installing applications even easier.

backplane offers multiple ways to launch your applications. They all expect your application to live inside a repository (i.e. a directory). backplane can deploy from a plain directory or local and remote git repositories.

backplane implements a simple workflow around docker-compose to "install" your applications to a Docker engine it has access to. Basically backplane does this:

  • load variables from .env
  • augment with global configuration (i.e. BACKPLANE_DOMAIN=127-0-0-1.ns0.co)
  • use --build if necessary (i.e. if there's a build: section in docker-compose.yml)
  • run docker-compose up -d

backplane (as of now) does not take care of the lifecycle of the application. To interface with it, use the bundled Portainer to manage your application from a UI or fall back to standard docker/docker-compose tooling.

Installed applications will be saved to your local backplane config (default: ~/.backplane/contexts/default/backplane.yml).

An application that can be installed with backplane should contain:

  • a docker-compose.yml file
  • an optional .env file configuring your stack
  • the application code
  • an optional Dockerfile to build the application (backplane expects the build: section of the docker-compose.yml file to be correctly configured)

Here are a few examples:

With the CLI

backplane can deploy an application directly from its repository directory. Assuming your application provides the necessary files, just run the following command from within your application directory:

backplane install

Optional arguments:

  • --name: the name of your application (translates to the docker-compose project, i.e. -p NAME); defaults to the name of the application directory (i.e. $PWD)
  • --to (or -t): the destination path of your application; defaults to the current directory (i.e. $PWD)
  • --from (or -f): a git repository, directory or URL where backplane can find the application; defaults to the current directory
  • --compose-file (or -c): the compose file to be used for installation (defaults to docker-compose.yml)
  • app name: if specified, backplane ignores the path argument and tries to install the application by cloning the repository from the given source to ~/.backplane/contexts/default/apps/$NAME, where $NAME equals to the NAME argument (if given) or defaults to the name of the git repository

Examples

local directory, custom name:

backplane install --name my-awesome-app-beta --from $HOME/development/my-awesome-app
  • sets the application name to my-awesome-app-beta
  • installs the application from $HOME/development/my-awesome-app

remote git repository, default name:

backplane install --from https://github.com/backplane-apps/registry
  • clones https://github.com/backplane-apps/registry to ~/.backplane/contexts/default/apps/registry
  • installs the application from ~/.backplane/contexts/default/apps/registry

local git repository, default name:

backplane install --from $HOME/development/my-awesome-app
  • clones $HOME/development/my-awesome-app to ~/.backplane/contexts/default/apps/my-awesome-app
  • installs the application from ~/.backplane/contexts/default/apps/my-awesome-app

This mechanism is used by the backplane service running alongside Traefik and Portainer. This service enables you to git push to your backplane. Read more about this in the next section.

backplane app registry, default name:

We're building a central registry for backplane-comtatible applications on GitHub. Installing one of those is as easy as running:

backplane install loki
  • clones https://github.com/backplane-apps/loki to ~/.backplane/contexts/default/apps/loki
  • installs the application from ~/.backplane/contexts/default/apps/loki

Our plan is to keep these apps compatible to Portainer's templating system to make them available as one-click installations from within the Portainer UI. One issue we currently face with this is that Portainer templates are only compatible with docker-compose configuration version "2".

With git

backplane contains a small Git Repository service with a dead-simple CI/CD workflow for your applications. The following section explains how to push your code to a remote backplane where it then will be automatically built and deployed according to the workflows described in the previous sections.

This might also make sense on local development machines, but is primarily meant as a method to deploy your applications to remote backplane hosts in a safe way. For the following parts we assume that you have a server somewhere in the internet that you have access to via SSH (public-key authentication) and you want to use backplane to deploy and run your Docker Compose services on that server.

Let's assume our remote backplane has the following attributes:

  • ip: 1.2.3.4
  • backplane-domain: 1-2-3-4.ns0.co
  • https: enabled

ATTENTION: the Git Repository service uses ~/.ssh of the user that initialized backplane (i.e. backplane init) to determine the authorized_keys that are eligible to push to backplane via git. Make sure to add all relevant public keys to ~/.ssh/authorized_keys on your backplane host

TIP: cat ~/.ssh/id_rsa.pub | pbcopy copies your SSH public key to your clipboard

Update your ssh config

Add the following to your local ~/.ssh/config file. This allows you to reach your remote backplane under backplane without further configuration.

Host backplane
    HostName 1.2.3.4
    User backplane
    Port 2222

Wrapup:

  • our remote backplane (on 1.2.3.4) is now available as backplane when connecting with ssh
  • backplane runs on port 2222; ports ins git remote-urls can cause problems which is why we mask port and ip behind the backplane hostname

NOTE: replace the value of "HostName" with your server's IP or hostname. For convenience, we're using ns0 here to provide wildcard DNS on IP basis

Update your git remote

Assuming your application repository is called whoami, this is how you add your remote backplane to your git remotes:

git remote add origin "git@backplane:whoami"

Wrapup:

  • our previously configured remote backplane becomes our new git remote-url
  • we're connecting as user git
  • our repository on the remote it called whoami

Deploy to your server

HINT: as you see, we're using the Conventional Commit format here. This will likely be a part of backplane's future roadmap in the form of automated versioning based on commits. Just FYI.

git commit -am "feat: figured out who I am"
git push backplane master

That's it! backplane will build and deploy your application and expose it automatically as https://whoami.1-2-3-4.ns0.co.

What is backplane

backplane consists of 3 main services running as Docker containers on your host:

  • Traefik, a very popular, cloud-native reverse-proxy
  • Portainer, a very popular management interface for Docker
  • backplane, this software

It aims to provide simple access to core prerequisites of modern app development:

  • Endpoint exposure
  • Container management
  • Deployment workflows

To develop and run modern web-based applications you need a few core ingredients, like a reverse-proxy handling request routing, a way to manage containers and a way to deploy your code. backplane offers this for local development as well as on production nodes in a seemless way.

backplane makes it easy to bypass long CI pipelines and deploy your application to a remote backplane host with ease.

backplane is mainly aimed at small to medium sized development teams or solo-developers that don't require complex infrastructure. Use it for rapid prototyping or simple deployment scenarios where the full weight of modern CI/CD and PaaS offerings just isn't bearable.

You can migrate from local development to production with a simple git push when using backplane on both ends. Think of it as a micro-PaaS that you can use locally.

What backplane is NOT

  • a PaaS solution; backplane only provides a well-configured reverse-proxy and a management interface for containers
  • meant for production use. You can, though, but at your own risk

Advanced configuration

backplane is only a thin wrapper around Traefik and Portainer. If you require more complex routing scenarios or have more complex service setups (e.g. multiple domains per container), simply use Traefik's label-based configuration.

Read more in the docs.

Expose containers with non-standard ports

backplane expects your services to listen to port 80 inside their containers. If that is not the case, you need to tell the backplane about it. Add the following additional labels to tell backplane your service is accessible on port 9000:

labels:
  - backplane.enabled=true
  - "traefik.http.services.custom-http.loadbalancer.server.port=9000"

Examples

In the examples directory you'll find examples showing how to integrate backplane with your existing services

Change to any of the example folders and run backplane install. The example's README will hold additional information on how to use it.

Development

Dependencies

pip install poetry
poetry shell
poetry install

Build

poetry build

Build Docker

docker build --build-arg BUILD_DATE=$(date -u +'%Y-%m-%dT%H:%M:%SZ') --build-arg BUILD_VERSION=$(backplane --version) --build-arg VCS_REF=$(git rev-parse --short HEAD) -t wearep3r/backplane .
docker tag wearep3r/backplane wearep3r/backplane:$(backplane --version)
docker push wearep3r/backplane:$(backplane --version)
docker tag wearep3r/backplane wearep3r/backplane:latest
docker push wearep3r/backplane:latest

Multi-Arch

docker buildx ls
docker buildx create --name wearep3r --use
docker buildx inspect --bootstrap
docker buildx build --platform linux/amd64,linux/arm64

Generate release

semantic-release version

Publish release

semantic-release publish

Author

Fabian Peter, p3r.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

backplane-0.9.0.tar.gz (28.2 kB view hashes)

Uploaded Source

Built Distribution

backplane-0.9.0-py3-none-any.whl (25.1 kB view hashes)

Uploaded Python 3

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page