Skip to main content

CI/CD Automation Framework

Project description


Servicer is a configuration-based CI automation framework that runs inside popular CI platforms, such as Bitbucket Pipelines, Jenkins, and CircleCI. Servicer may be the right tool to use if you find yourself in any these situations:

  • Writing a lot of Bash to augment your CI/CD jobs.
  • Have dependent services building from the same repository (common in mono-repos).
  • Want to speed up your CI job times by building services in parallel, or avoiding building services that have not changed.

Core Features:

  • Run and debug your CI jobs locally (very helpful for isolating or testing build issues before you deploy).
  • CI provider agnostic configuration (make your build process portable between multiple CI providers).
  • Map your branches and tags to independent service environments, allowing you to use an identical process to deploy production, testing, and development environments.
  • Interpolate dynamic values that change from environment to environment, allowing you to re-use the same configuration for your environments.
  • Configure intelligent Change Detection, to only build the services and dependencies you need for the changes made (great for mono-repos!).

Servicer executes a set of service-steps you define in .servicer/services.yaml. A servicer CI job will roughly do the following:

  1. Normalize the current CI environment (by standardizing environment variables).
  2. Determine the current Service Environment, if it exists.
  3. Construct the complete servicer configuration (interpolating dynamic value tokens).
  4. Determine which services can be ignored by Change Detection.
  5. Build a dependency graph of remaining service-steps.
  6. Execute each service-step in the order determined by the dependency graph, if it is appropriate for the current Service Environment.

Contributing Servicer is an open-source project. Feel free to fork and open a PR at any time. Each PR should have an associated Issue linked for reference.

Separation of Concerns

Servicer is separated into three main components: adapters, services, and the project environment.

Adapters are interfaces that allow Servicer to use or interact with external systems, like Google Cloud Platform, GitHub, Jenkins, Docker, etc. Three kinds of adapters exist: CI adapters (for CI providers), auth adapters (to manage credentials), and service adapters (for everything else). These are written as reusable python modules, and are located in servicer/builtin.

Configuration is the primary building block of your project. Services are defined in the .servicer/services.yaml file in your project, and these definitions include the configuration and commands needed to build, test and deploy each service. Additionally, dependencies may be defined to automate the order service-steps are executed in.

Your project environment should contain environment variables for holding credentials and other secrets that should not be committed to source control. These can be configured on your CI tool, or, if you are running Servicer locally, from a .servicer/*.env.yaml file.

Using Servicer

For the simplest use case, use the command below. With it, Servicer will execute every step for every service you've defined in .servicer/services.yaml.


If you want Servicer to execute all steps for one or more specific services, like my_docker_image and my_python_package, specify those services in the command.

servicer --service=my_docker_image,my_python_package

Steps, like build and unit_test, can also be specified.

servicer --step=build,unit_test

When combined, you can execute a single service-step:

servicer --service=my_docker_image --step=build

These commands can be run locally or in the context of a CI job.

By default, all service-step dependencies will also be executed. If you will like to disable this behavior, use the --ignore_dependencies flag.

If you would like to execute a test run of servicer without actually executing any service-steps, you can add the --dry flag.

To set the desired logging level (debug, info, warn, error), use the --log_level flag.

For a complete list of flags and options that can be provided to the servicer command, please see servicer --help.


By default, Servicer will look for .servicer/services.yaml at the root of your project. servicer/builtin/defaults.yaml ( contains default values and descriptions of the values you can provide in .servicer/services.yaml.

Within this section of the README, consider each of these subsections to compose the services.yaml on one project.


The environment section of services.yaml will let you define environment variables that you're ok with existing in source control. Additionally, you can control the branch -> service_environment settings, allowing you to change the defaults. Consider the example below.

  # In this example, SERVICE_ENVIRONMENT will be `production` if the branch is `master`.
  # SERVICE_ENVIRONMENT will be `develop` if the branch is `develop`.
  # Otherwise, if the branch matches `env-*`, SERVICE_ENVIRONMENT will be the sanitized branch name.
  # If the CI provider supports tag based builds, servicer will also set the SERVICE_ENVIRONMENT if a version tag is found.
    - tag: '*.*.*'             # match a version tag -> 1.2.3
    - branch: master
      environment: production  # master -> production
    - branch: develop          # develop -> develop
    - branch: env-*            # env-my-branch -> env-my-branch

  # Define environment variables here.
    FOO: BAR

Servicer requires several environment variables to be configured which control the parameters of each service. Some of these environment variables will be automatically pulled from your CI environment and standardized by the CI Adapter it is using. Check the relevant adapter file in servicer/builtin/ci_adapters. The remaining variables may be specific to each service adapter, and will need to be configured in your CI environment, or defined in the environment section of services.yaml, or be provided locally in your .servicer/.env.yaml file.

CI Adapters

In order to standardize the environment Servicer runs in, a CI Adapter is used. Each CIAdapter is a python class that populates an instance variable called env_map, which contains key value pairs mapping environment variable names to their standardized Servicer equivalents.

Servicer provides default CI Adapters for your convenience. Please explore the servicer/builtin/ci_adapters directory to see what's available for each CI provider. In order to customize servicer to your needs, you can create your own CI Adapters in your project. By default, servicer will prefer CI Adapters found in the .servicer/ci_adapters directory of your project. See the Advanced Servicer Use Cases for more information on adapter overrides.


Steps are sets of actions that share some configuration between services. For example, the 'deploy' step may only be executed when a Service Environment is present. Steps are declared project-wide in services.yaml. In the example below, several steps are defined.

  - name: build
  - name: test
  - name: deploy
      service_environment: '*'              # will only be executed within a service environment (based on environment mappings)
  - name: cleanup
      auxiliary: true                       # can only be explicitly executed (using the --step argument)

Steps are available for any service to implement. Given the above definition, during the first step, build, Servicer will look at every service and include its build step as a service-step in the complete dependency graph, if it exists. These service-steps will later be executed in the correct order.

Steps can be configured to be disregarded unless they are being run within an environment that matches one of the mappings defined in environment above. Given the environment defined above, any deploy service-steps will be disregarded unless Servicer is running in a matching Service Environment (any Service Environment will match the '*'). This syntax accepts glob and regex notations, and multiple matchers can be provided as a list. If there are multiple matchers, any match will allow execution of that particular service-step.


Services are abstract containers for pieces of your project. They can be a set of commands, or utilize a python module that wraps an integration with a 3rd party tool. Builtin service adapters automatically available through servicer are defined in servicer/builtin/service_adapters. You can also add your own service adapter within your project by adding it to your .servicer/service_adapters directory. However, you may decide to use Servicer as a command orchestrator, without leveraging any service adapters, and that is perfectly fine.

The service below builds a Docker image, and pushes/deploys it to the Google Container Registry.

  my_docker_image:                     # User chosen name to uniquely identify this service
      - gcloud                         # Initializes the given provider entry before running steps, useful for re-usable Auth
    service_type: gcloud/docker_image  # Optional, maps to the corresponding service adapter defined in servicer/builtin/service_adapters/
    steps:                             # Steps defined here must match a step defined in the `steps` list explained above
          # All config defined here is passed to the __init__ function of the corresponding service adapter.
            - type: build
                image: demo-image
                dockerfile: Dockerfile
        commands:   # Commands are executed before the chosen service adapter is executed
          - docker login -u _json_key -p "$(cat /path/to/keyfile.json)"
          # All config defined here is passed to the __init__ function of the corresponding service adapter.
          registry_path: my-gcp-project/this-project
            - type: push
                image: demo-image
                  - latest

The providers key is an optional key that allows you to specify one or more provider dependencies for the service. These entries should match the keys listed in the providers section of your services.yaml. For each entry here, servicer will ensure that the correct provider has been initialized before the steps for the service are executed.

Here is a service that builds a python package, and deploys it to Artifactory.

    service_type: package/pypi

          - rm -rf python_example/dist
          - python sdist
          # service adapter tasks map to functions available within the service adapter
            - type: read_package_info
          - pypi-credentials:credentials

            - type: upload
                server: artifactory
                path: dist/*.tar.gz

Using depends_on gives you control over how Servicer's dependency graph is built. In the above example, Servicer will ensure that the my_python_package:deploy service-step is executed after the pypi-credentials:credentials service-step. The my_python_packge:deploy service-step also has an implicit dependency on the my_python_packge:build service-step, because the two service-steps belong to the same service, and the build step is defined before the deploy step in the steps list above.

A wildcard may also be provided in the place of a service name. For example, *:test means that the given service or service-step depends on the completion of all other test service-steps.


Any service_type is able to execute arbitrary commands via the shell by using the commands key. You can avoid providing a service_type if all you want is a service wrapper for a set of commands. The commands key will execute commands before a service adapter config, while the post_commands key will execute commands after.

The commands list optionally accepts a raw string, or map containing a context providing more customization.

          - docker build -f Dockerfile -t my-image .
          - context:
              # interpolate all commands in this context using the given template
              template: '/bin/sh -c "%s"'
              # run all commands in this context in the provided docker context
                image: my-image
                name: # defaults to a random string
                command: /bin/sh -c 'while sleep 5; do :; done'   # command to start the container with, sleep forever
                    - MY_ENV_VAR
                    - $HOME/.ssh:/root/.ssh/
              - echo 'Hi I'm running in a container!'
              - echo 'Me too!'

# final commands:
# docker run -d --env=MY_ENV_VAR --volume=$HOME/.ssh:/root/.ssh --name=H6GHGiXYjMwbAWEw my-image /bin/sh -c 'while sleep 5; do :; done'
# docker exec H6GHGiXYjMwbAWEw /bin/sh -c "echo 'Hi I'm running in a container!'"
# docker exec H6GHGiXYjMwbAWEw /bin/sh -c "echo 'Me too!'"
# docker stop H6GHGiXYjMwbAWEw
# docker rm H6GHGiXYjMwbAWEw

Config File Management

Ultimately, Servicer runs with one compiled configuration file (this can be printed by running servicer --show_config). The heart of this is services.yaml. For convenience, extends and includes are two tools that can be used to merge other config files into services.yaml.

The extends key allows you to inherit from another YAML file. The structure of each file will be deep-merged, with values in the extending file overwriting values in the extended file. Lists are not merged, and will be completely overwritten.

In the example below, a file called base.yaml is essentially providing the top half of the services.yaml file.

# base.yaml

    - bitbucket
  image: python:3.6.4

      - awscli==1.15.49
      - boto3==1.7.48
    auth_script: auth/
      - google-api-python-client==1.6.5
# services.yaml

extends: base.yaml

    provider: aws
    service_type: rds_instance

    docker: true
      - postgres
    provider: gcloud
    service_type: kube_cluster

The includes key can also inherit from a different YAML file. However, unlike extends, values from the included file will overwrite values in the including file if there are key conflicts.

In the example below, kube-service.yaml includes configuration values for a service, and those values are being inherited by the api-django service.

# kube-service.yaml

docker: true
  - postgres
provider: gcloud
service_type: kube_cluster
# services.yaml

extends: base.yaml

    includes: kube-service.yaml

An optional params key may be used for interpolation, allowing for re-usable, generic config files. The example below is equivalent to the example above.

# kube-service.yaml

docker: true
  - ${db}
provider: ${provider}
service_type: kube_cluster
# services.yaml

extends: base.yaml

      path: kube-service.yaml
        db: postres
        provider: gcloud

Variable Interpolation

All configuration files support variable interpolation using the ${MY_VAR} format. To pull from an environment variable, use ${MY_ENV_VAR}. To fall back to a default value if the chosen environment variable does not exist, use ${MY_ENV_VAR:"my-default-value"}

Testing the Job

To make it easy to test deployments in your local environment, servicer will automatically read from an .env.yaml file in your servicer configuration directory, if it exists. It is recommended to add this file to your .gitignore, as it is only intended to be used for local development and manual environment creation.


# .servicer/.env.yaml
BRANCH: env-test
GCLOUD_KEY_FILE_PATH: /Users/me/my_gcloud_credentials.json
GCLOUD_REGION: us-central1
GCLOUD_ZONE: us-central1-f
PROJECT_NAME: my-project

.env.yaml can also be defined at ~/.servicer/.env.yaml to support multi-project defaults. Values in the project level .env.yaml will take precedence over values in your user folder.

Git Integration

Servicer provides a few handy Git integrations to optimize jobs. By default, git integration is disabled. To enable it, set git: enabled: true.

Change Detection

Servicer can use a git diff to determine which services in your project are different between the current commit and either the commit associated with its last successful job, or one passed to Servicer by an environment variable. This second commit is Servicer's reference point, and the list presented by git diff provides Servicer its change detection.

By default, Servicer will maintain its own set of git tags that identify commits it should use as reference points. The format of these tags is servicer-<BRANCH>-<BUILD_DATE>-<BUILD_NUMBER>. Servicer relies upon the CI framework it is working on (like Jenkins) to provide the BRANCH and BUILD_NUMBER variables. Alternatively, the GIT_DIFF_REF environment variable can be set manually.

Servicer will use the first reference point it can find, and attempts to find it in this order:

  1. The GIT_DIFF_REF environment variable, if it’s set and is a valid commit.
  2. The latest servicer git tag matching the current branch, if git: diff-tagging-enabled: true.
  3. The latest servicer git tag matching any branch, if git: diff-defaults-to-latest-tag: true.

Servicer will also attempt to remove any stale tags automatically. Tags present only on deleted branches, or tags that are no longer the latest tag for a branch will be removed.

Skipping Steps for Unchanged Services

When using Git integration, Servicer can skip steps for the services that haven't changed (unless those steps are explicit dependencies). Here is an example of configuring this.

  enabled: true
  config: servicer   # The name Servicer will use when committing to the repo.
  ignore-unchanged: true  # Determine whether to skip unchanged services or not.
  ignore_paths:           # When running git diff, Servicer will ignore files that are matched by
    - *          # values in this array.

  my_python_package:      # Name shared by this service and the relevant directory within the repo.
    provider: pypi
    service_type: pypi

      watch_paths:              # When running git diff, Servicer will consider this service changed if
        - my_python_package/*   # any non-ignored paths returned are matched by any value in this array.
          - echo 'I must have changed!'

In this case, Servicer will only execute my_python_package's steps (only build is present) if any file within the my_python_package directory, except, was returned by Servicer's git diff.

Supported formats for watch_paths and ignore_paths are simple text with * as a wildcard, and full regexes in the format /.*/.

Automatic Versioning

Warning: This is an experimental feature. Automatic versioning requires Servicer to make automated commits back to your repository with updated version numbers for package services. This can have unintended side effects with your CI solution unless "you know what you're doing".

As part of git integration, Servicer can automatically increase the version number of the packages it manages and commit the new version numbers to the repository. When Servicer is being run on a CI pipeline, ignore-servicer-commits can be set to true to have servicer inspect the commit authors, and self-terminate if the job was initiated in response to a commit made by Servicer.

Below is an example of a PyPi service that inherits from the Package Service Adapter and implements autoversioning.

      package_file_path: ${package_directory}/
        - type: set_auto_version
      - rm -rf ${package_directory}/dist
      - python3 ${package_directory}/ sdist --dist-dir=${package_directory}/dist
      package_file_path: ${package_directory}/
        - type: upload
            server: artifactory
            path: ${package_directory}/dist/*.tar.gz
        - config:
            - type: commit_and_push_changes

Environment Destruction

Because every environment setup is unique, environment destruction is not automated. However, by configuring the destroy step for services, you can condense the complete destruction of a service environment into a single command:

SERVICE_ENVIRONMENT=my-env servicer --destroy

Example kubernetes destroy configuration, assuming your services exist within a kubernetes namespace that matches your service_environment name:

        - kubectl delete ns ${SERVICE_ENVIRONMENT}

The destroy step is a magic step that does not need to be defined in your .servicer/services.yaml.

Advanced Servicer Use Cases

Servicer's core interface with external CI's, cloud provider APIs, etc, exists as a collection of python modules called Adapters. These Adapters can be found in the builtin directory of the project, and may be overridden or extended if they do not meet your needs.

To override an Adapter, simply mirror the directory structure of builtin directly inside your .servicer folder.

    aws/  # this overrides servicer's builtin rds_instance adapter
  services.yaml can also inherit from servicer's builtin adapter classes, and selectively override just the functionality that isn't working for you.

from servicer.builtin.service_adapters.task_service import Service as BaseService

class Service(BaseService):
    # overrides task_service.Service's up() method, but still calls it
    def up(self):

        print('my custom logic here!')

    def foo(self):

Then you can utilize your custom service adapters like you normally would with builtin adapters:

    service_type: aws/custom_task_service

Project details

Release history Release notifications | RSS feed

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

servicer-0.11.14.tar.gz (56.2 kB view hashes)

Uploaded source

Supported by

AWS AWS Cloud computing Datadog Datadog Monitoring Facebook / Instagram Facebook / Instagram PSF Sponsor Fastly Fastly CDN Google Google Object Storage and Download Analytics Huawei Huawei PSF Sponsor Microsoft Microsoft PSF Sponsor NVIDIA NVIDIA PSF Sponsor Pingdom Pingdom Monitoring Salesforce Salesforce PSF Sponsor Sentry Sentry Error logging StatusPage StatusPage Status page