Skip to main content

Deployment configs as code. GitLab CI & GitHub Actions variable management CLI.

Project description

DeployLane

Deployment configs as code. GitLab CI variables as code. Reproducible deploys every time.

DeployLane is a CLI for teams deploying containerized apps to Linux servers with Docker Compose and GitLab CI. It replaces scattered shell scripts and manually managed CI variables with a single, version-controlled workflow.

pip install deploylane
dlane login --host https://gitlab.example.com
dlane scaffold my-service
dlane deploy push my-service --yes

Is this for you?

DeployLane fits your stack if:

  • ✅ You deploy Docker Compose apps to Linux servers (VPS, bare metal, cloud VMs)
  • ✅ You use GitLab CI to build and push images
  • ✅ You manage CI variables manually in the GitLab UI and it's becoming a mess
  • ✅ You want zero-downtime blue-green deploys without Kubernetes complexity

It's probably not for you if you're on Kubernetes, AWS ECS, or a fully managed PaaS.


The problem it solves

Most teams start with a deploy.sh script that "just works." Over time it becomes:

  • Different versions on different servers
  • CI variables scattered across projects with no history
  • "Works on staging, broken on prod" because someone changed something manually
  • New team member spends a day figuring out how deployment actually works

DeployLane makes the entire deployment setup version-controlled and reproducible.


How it works

Your workstation                  GitLab CI                  Server
────────────────                  ─────────────              ──────
dlane scaffold                                           .env
  deploy.yml     → dlane deploy push →                  docker-compose.yml
  vars.yml                                               deploy.sh
  compose/       → dlane deploy install →               nginx.conf
  nginx/                                                 install.sh (run once)

dlane vars apply → GitLab CI variables ← Pipeline uses these
                                              ↓
                                          deploy.sh (zero-downtime or restart)
  1. dlane scaffold generates all server-side files from a single deploy.yml
  2. dlane vars apply pushes your local vars.yml to GitLab CI variables
  3. dlane deploy push syncs configs to the server
  4. GitLab CI builds the image and calls deploy.sh — that's it

Installation

pip install deploylane

Requires Python 3.10+. Works on macOS and Linux.


Quick start (5 minutes)

1. Login

dlane login --host https://gitlab.example.com
# optionally name your profile and set a registry host
dlane login --profile prod --host https://gitlab.example.com --registry-host registry.example.com

2. Create a workspace

A workspace tracks multiple services together.

mkdir ops && cd ops
dlane init
dlane add gateway --gitlab-project acme/gateway --strategy bluegreen
dlane add api     --gitlab-project acme/api     --strategy plain

3. Scaffold a service

dlane scaffold gateway

This generates .workspace/gateway/.deploylane/ with:

  • deploy.yml — targets, ports, strategy (edit this to match your server)
  • vars.yml — CI variable definitions (edit values, then vars apply)
  • compose/, nginx/, scripts/deploy.sh, ci/.gitlab-ci.yml

4. Configure your server details

Edit .workspace/gateway/.deploylane/deploy.yml:

version: 1
strategy: bluegreen
project: acme/gateway

app:
  name: gateway
  registry_host: registry.acme.com

targets:
  prod:
    host: 10.0.0.1
    user: deploy
    deploy_dir: /home/deploy/gateway
    ports:
      blue: 8080
      green: 8081

5. Push CI variables

dlane vars plan gateway     # preview what would change
dlane vars apply gateway    # push to GitLab

6. Push files to server & install (once per server)

dlane deploy push gateway --yes       # .env + docker-compose.yml + deploy.sh
dlane deploy install gateway --yes    # nginx + sudoers + runs install.sh

7. Add the CI pipeline

dlane ci push gateway    # opens an MR in acme/gateway with the generated .gitlab-ci.yml

Or copy .workspace/gateway/.deploylane/ci/.gitlab-ci.yml manually to your repo. GitLab CI will now build, push, and deploy automatically on every push.


Deployment strategies

Strategy How it works When to use
bluegreen Two containers, nginx switches traffic — zero downtime Production
plain Single container, docker compose up -d Staging, internal tools

CI variable management

Stop clicking through the GitLab UI. Manage variables as code:

dlane vars get gateway       # pull current GitLab variables → vars.yml
dlane vars diff gateway      # see what's different between local and GitLab
dlane vars plan gateway      # preview creates / updates / orphans
dlane vars apply gateway     # push local vars.yml → GitLab
dlane vars prune gateway     # remove GitLab variables not in vars.yml

vars.yml is version-controlled. Every variable change is a git commit.

Variable naming convention:

Variable Purpose
{TARGET}_HOST Server IP — e.g. PROD_HOST, STAGING_HOST
{TARGET}_USER SSH user
{TARGET}_DEPLOY_DIR Deploy directory on server
{TARGET}_SSH_KEY Base64-encoded private key
REGISTRY_HOST Docker registry hostname
REGISTRY_USER Registry login user
REGISTRY_PASS Registry login password

Multi-service workspaces

dlane list                          # show all services and their status
dlane list --tag api                # filter by tag
dlane deploy push --all --yes       # push all services at once
dlane vars apply --all              # apply variables for all services

Local overrides

Keep production secrets out of git with .local.env files:

# .workspace/gateway/.deploylane/env/prod.local.env  (gitignored)
APP_PORT=9090     # override a port without touching the base env
DEBUG=false       # environment-specific toggle

Local env is merged on top of the base env before pushing. Use this for machine-specific or temporary overrides — keep secrets and connection strings in GitLab CI variables via vars.yml.


Deploy safety

deploy push protects against accidental overwrites:

  • compose — checks server version before pushing. If server differs from local, push is blocked: run 'dlane deploy pull' first
  • .env — never overwritten if it already exists on the server (contains runtime state like ACTIVE_COLOR)
  • --force — bypasses compose check when you know what you're doing
dlane deploy pull gateway     # fetch compose + env + nginx from all targets
dlane deploy push gateway --yes          # protected push
dlane deploy push gateway --yes --force  # skip check
dlane deploy status gateway   # show running containers and active color

Workspace profiles

Each workspace can be pinned to a specific profile in workspace.yml:

default_profile: prod   # always uses this profile, regardless of active global profile

All vars and ci commands use the workspace profile automatically. A warning is shown if it differs from the globally active profile.


Security

  • GitLab token stored at ~/.config/deploylane/config.toml with 0600 permissions
  • Masked variables shown as <masked> in all output
  • deploy push is dry-run by default — requires explicit --yes
  • deploy install requires explicit --yes and prompts for sudo password interactively
  • .local.env files are gitignored automatically

Add to your .gitignore:

.workspace/

Command reference

Auth

Command Description
dlane login Store credentials locally and verify against the API
dlane logout Remove stored credentials
dlane whoami Show current user for the active profile
dlane status Show active profile and login status
dlane profile list List stored profiles
dlane profile use <name> Switch active profile

Workspace

Command Description
dlane init Create workspace in current directory
dlane add <name> Add a service to the workspace
dlane update <name> Update service fields
dlane remove <name> Remove a service
dlane list List services with status
dlane scaffold <name> Generate / refresh deployment files

Variables

Command Description
dlane vars get <name> Fetch GitLab variables → vars.yml
dlane vars plan <name> Preview what would change
dlane vars diff <name> Diff local vs GitLab
dlane vars apply <name> Push vars.yml → GitLab
dlane vars prune <name> Delete GitLab vars not in vars.yml

Deploy

Command Description
dlane deploy pull <name> Fetch compose, env, nginx from server (all targets)
dlane deploy push <name> Push compose + deploy.sh to server (pull-first protected)
dlane deploy install <name> One-time server setup (nginx + sudoers + install.sh)
dlane deploy status <name> Show running containers and active color per target
dlane deploy history <name> Show deployment history

CI

Command Description
dlane ci pull <name> Fetch .gitlab-ci.yml from GitLab repo → local
dlane ci push <name> Push local .gitlab-ci.yml to GitLab via MR

Tools

Command Description
dlane --version Show installed version
dlane gitlab list Browse GitLab projects

Development

git clone https://github.com/yourorg/deploylane
cd deploylane
pip install -e ".[dev]"
python -m build

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

deploylane-0.3.0.tar.gz (57.3 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

deploylane-0.3.0-py3-none-any.whl (67.0 kB view details)

Uploaded Python 3

File details

Details for the file deploylane-0.3.0.tar.gz.

File metadata

  • Download URL: deploylane-0.3.0.tar.gz
  • Upload date:
  • Size: 57.3 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.12.10

File hashes

Hashes for deploylane-0.3.0.tar.gz
Algorithm Hash digest
SHA256 afffc3c2741603cb602dda7125e44c7336a74321d384c3f6f7df8b82520ebfad
MD5 94d065d5cbb685177cc7c6451836e5d5
BLAKE2b-256 178604a0235c78f5c77853396580ec9dad214c970c79ea1a857afb748f8f99cb

See more details on using hashes here.

File details

Details for the file deploylane-0.3.0-py3-none-any.whl.

File metadata

  • Download URL: deploylane-0.3.0-py3-none-any.whl
  • Upload date:
  • Size: 67.0 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.12.10

File hashes

Hashes for deploylane-0.3.0-py3-none-any.whl
Algorithm Hash digest
SHA256 3addbde8f5c878a2572f2b06e577a335abebcc06c008c53a8d7c2dac51a6a41d
MD5 430b1cc231b81099a254be20ed6b2acd
BLAKE2b-256 4df0594de1808c6ee5d791d8022ad577007043fb48564cc57bd4ea799f940cec

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page