DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Please enter at least three characters to search
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Because the DevOps movement has redefined engineering responsibilities, SREs now have to become stewards of observability strategy.

Apache Cassandra combines the benefits of major NoSQL databases to support data management needs not covered by traditional RDBMS vendors.

The software you build is only as secure as the code that powers it. Learn how malicious code creeps into your software supply chain.

Generative AI has transformed nearly every industry. How can you leverage GenAI to improve your productivity and efficiency?

Related

  • Running a Java App With MySQL in Any Docker Environment
  • How to Activate New User Accounts by Email
  • Spring Config Integration With a PCF Application: A Step-by-Step Guide
  • AOT Compilation Make Java More Power

Trending

  • Advancing Robot Vision and Control
  • A Guide to Auto-Tagging and Lineage Tracking With OpenMetadata
  • The Future of Java and AI: Coding in 2025
  • Navigating and Modernizing Legacy Codebases: A Developer's Guide to AI-Assisted Code Understanding
  1. DZone
  2. Testing, Deployment, and Maintenance
  3. Deployment
  4. Automate Spring Boot App Deployment With GitLab CI and Docker

Automate Spring Boot App Deployment With GitLab CI and Docker

Take a look at how you can use Spring Boot and Gitlab CI with Docker to build and automate the deployment of an application.

By 
Jasmin Tankić user avatar
Jasmin Tankić
·
Updated May. 19, 20 · Tutorial
Likes (8)
Comment
Save
Tweet
Share
44.3K Views

Join the DZone community and get the full member experience.

Join For Free


In this guide, we will walk through the process of the automated deployment of a Spring Boot application using GitLab CI. 

Docker and Spring Boot is a very popular combination, and we will take advantage of GitLab CI and automatically build, push and run a Docker image on application server.

GitLab CI

The Gitlab CI/CD service is the part of GitLab that builds, tests, and places the latest changes in the desired environment whenever the developer pushes code to the GitLab repository.

Some of the main reasons why GitLab CI is a good choice:

  1. It is easy to learn, use and scalable
  2. Maintenance is easy
  3. Integration of new jobs is easy
  4. The CI is fully part of the repository
  5. Good Docker integration
  6. Container registry - basically your own private Docker hub
  7. It's economically a good solution. Each month you have 2000 minutes of build time for free, which is more than enough for certain projects

Why GitLab CI Over Jenkins

This is for sure a wide and debatable topic, but in this article, we won't dive deeply into that. Both GitLab CI and Jenkins have pros and cons and they are for sure very powerful tools. 

Let's try to point out use cases where GitLab might be wiser choice. 

As it is previously mentioned, CI is fully part of GitLab repository, which means it's not needed to install it and maintenance is minimum. Once the .yml script is finished, you are more or less done with everything. 

Jenkins can be overhead for small projects as you have to set up and configure everything by yourself. You also usually need a dedicated Jenkins server, and that is also extra maintenance, cost, and another thing to worry about.

What You’ll Need 

In order to successfully follow this guide, there are few prerequisites. If any help is needed related to these prerequisites I've included a link to the appropriate guide, so feel free to visit it if necessary.

  1. You have Spring Boot project pushed on GitLab
  2. You have Docker installed on application servers (guide)
  3. You have container registry for Docker images (in this guide Docker hub will be used)
  4. You have generated SSH RSA key on your servers (guide)

What You’ll Build

You will basically create a Dockerfile and .gitlab-ci.yml, which will be used to automatically:

  1. Build application Jar file for each successful deployment, which will be easily downloadable from GitLib
  2. Build the Docker image
  3. Push the image to the Docker repository
  4. Run image on an application server

Basic Project Info

Spring Boot application for this guide is generated via Spring Initializr. Basically it is a Maven project built on Java 8 or 11. We will cover later how Java 8 and 11 affects the Docker image.

Dockerfile

Let's start with the Dockerfile.

Dockerfile
 




xxxxxxxxxx
1
16


 
1
FROM maven:3.6.3-jdk-11-slim AS MAVEN_BUILD
2
#FROM maven:3.5.2-jdk-8-alpine AS MAVEN_BUILD FOR JAVA 8
3
 
          
4
ARG SPRING_ACTIVE_PROFILE
5
 
          
6
MAINTAINER Jasmin
7
COPY pom.xml /build/
8
COPY src /build/src/
9
WORKDIR /build/
10
RUN mvn clean install -Dspring.profiles.active=$SPRING_ACTIVE_PROFILE && mvn package -B -e -Dspring.profiles.active=$SPRING_ACTIVE_PROFILE
11
FROM openjdk:11-slim
12
#FROM openjdk:8-alpine FOR JAVA 8
13
WORKDIR /app
14
 
          
15
COPY --from=MAVEN_BUILD /build/target/appdemo-*.jar /app/appdemo.jar
16
ENTRYPOINT ["java", "-jar", "appdemo.jar"]


There are few things nice to know related to this Dockerfile.

Java Version

Let's see what from Docker's point of view is different between Java 8 and 11. Long story short: it's the Docker image size and deployment time. 

Docker images built on Java 8 will be noticeably smaller than ones on Java 11. That also means build and deploy times will be faster for Java 8 projects.

  • Java 8 - Build time: ~ 4 min with image size of  ~180 MB 
  • Java 11 - Build time: ~ 14 min with image size of ~480 MB

Note: These stats are related to plain Spring Boot projects that are used for the purpose of this guide; on a real application these numbers will be probably a bit different.

Docker Images

As it is already seen in previous example, we have huge difference for app image size and build time just because of the Java version. The actual reason behind that is Docker images used in Dockerfile.

If we take another look at the Dockerfile, the real reason behind the large Java 11 image size is because there is no verified/tested Alpine version of open-jdk:11 image. Instead, we had to use a open-jdk:11-slim image which produces larger images. 

If you are not familiar with the OpenJDK image versions, I suggest taking look at the official OpenJDK Docker documentation. There you can find an explanation for each OpenJDK version of image. 

Additional Notes

ARG SPRING_ACTIVE_PROFILE is used so it's possible to build and package an application with correct environment-related properties. 

Unfortunately, at the time when this guide is written, there is no clean way to use that variable in  ENTRYPOINT , and in order to run an application on different environments, it's mandatory. Basically the  ENTRYPOINT  would look like this:

Java
 




xxxxxxxxxx
1


 
1
ENTRYPOINT ["java", "-Dspring.profiles.active=development", "-jar", "appdemo.jar"]


And to make it dynamic, what you naturally would expect is to simply convert it to:

Java
 




xxxxxxxxxx
1


 
1
ENTRYPOINT ["java", "-Dspring.profiles.active=$SPRINT_ACTIVE_PROFILE", "-jar", "appdemo.jar"]
2
 
          


As already-mentioned, unfortunately, this is not possible, but fortunately this problem can be easily solved when running an image with the Docker. This will covered in .gitlab-ci.yml.

gitlab-ci.yml

Before writing this file there are few things to prepare first. Basically what we want to achieve is that whenever code is pushed, an automatic deployment is started on the corresponding environment. 

Create .env Files and Branches

We need first to create branches and .env files that contain environment-related variables. Each branch will actually represent the environment where our application is running. 

We will deploy our application on three different environments: development, QA, and production. That means we need to create three "main" branches. We already have the master branch which represents the production environment, so simply create 2 more branches: development and QA. 

Our dev, QA, and prod applications will run on different servers and they will have different Docker container tags, ports and SSH Keys. That means our gitlab-ci.yml file will need to be dynamic, lets solve that problem by creating .env file for each environment that we have. 

.develop.env
.qa.env
.master.env

IMPORTANT: There is one simple rule when naming these files: they need to be named by the branch on GitLab, so a file name should be like this: .$BRANCH_NAME.env

For example this is .develop.env file.

Java
 




xxxxxxxxxx
1


 
1
export SPRING_ACTIVE_PROFILE='development'
2
export DOCKER_REPO='username/demo_app:dev'
3
export APP_NAME='demo_app_dev'
4
export PORT='8080'
5
export SERVER_IP='000.11.222.33'
6
export SERVER_SSH_KEY="$DEV_SSH_PRIVATE_KEY"


Important notes related to .env file: 

SPRING_ACTIVE_PROFILE: self-explanatory, which Spring application properties we want to use.
DOCKER_REPO: This is a repository for the Docker image. Since we are using one repository we will use tags to distinguish between images used on different environments, so that means we will have 3 different tags: dev, qa and production.

And our Docker hub looks like this.

Docker hub

As you can see there is a repository with three different tags, and each tag (application version) is being updated whenever the code is pushed on a GitLab branch.

  • APP_NAME: This property is very important because it allows us to name our running container. Based on it we will be able to stop and re-run latest Docker image on application server.
    If you do not set this property, Docker will randomly give name to your container. That can be an issue because you wont be able to automatically stop running container on a clean way.
  • PORT: This is the port where we want our Docker container to be run at.
  • SERVER_IP: IP of the server where application is going to live. Usually each environment will be on different server. 
  • SERVER_SSH_KEY: This is SSH key that we already generated on each of our servers. It is a bit different than previous keys, because it does not contain hard-coded value,  $DEV_SSH_PRIVATE_KEY is actually a variable that comes from GitLab repository. Below there will be more details about that.

Create GitLab Variables

The last step that needs to be done is creating GitLab variables. Here it's recommended to keep variables that you do not want everyone to see. We will keep here some credentials and ssh keys.

Open your GitLab repository and go to: Settings -> CI/CD. In the Variables section add new variables:

  • DOCKER_USER: username for accessing Docker hub or any other container registry
  • DOCKER_PASSWORD: password for accessing same container registry
  • $ENV_SSH_PRIVATE_KEY:  SSH private key that you previously generated on your servers. Your key should look like this.

Important notes for SSH KEY: 

  • You need to copy full key value including:
    -----BEGIN RSA PRIVATE KEY----- and -----END RSA PRIVATE KEY-----

At the end, your GitLab variables should look like this.

Github variables

Create the gitlab-ci.yml File

And finally, let's create the file that will put together all this.

YAML
 




xxxxxxxxxx
1
42


 
1
services:
2
  - docker:19.03.7-dind
3
 
          
4
stages:
5
  - build jar
6
  - build and push docker image
7
  - deploy
8
 
          
9
build:
10
  image: maven:3.6.3-jdk-11-slim
11
  stage: build jar
12
  before_script:
13
    - source .${CI_COMMIT_REF_NAME}.env
14
  script:
15
    - mvn clean install -Dspring.profiles.active=$SPRING_ACTIVE_PROFILE && mvn package -B -e -Dspring.profiles.active=$SPRING_ACTIVE_PROFILE
16
  artifacts:
17
    paths:
18
      - target/*.jar
19
 
          
20
docker build:
21
  image: docker:stable
22
  stage: build and push docker image
23
  before_script:
24
    - source .${CI_COMMIT_REF_NAME}.env
25
  script:
26
    - docker build --build-arg SPRING_ACTIVE_PROFILE=$SPRING_ACTIVE_PROFILE -t $DOCKER_REPO .
27
    - docker login -u $DOCKER_USER -p $DOCKER_PASSWORD docker.io
28
    - docker push $DOCKER_REPO
29
 
          
30
deploy:
31
  image: ubuntu:latest
32
  stage: deploy
33
  before_script:
34
    - 'which ssh-agent || ( apt-get update -y && apt-get install openssh-client -y )'
35
    - eval $(ssh-agent -s)
36
    - echo "$SSH_PRIVATE_KEY" | tr -d '\r' | ssh-add -
37
    - mkdir -p ~/.ssh
38
    - chmod 700 ~/.ssh
39
    - echo -e "Host *\n\tStrictHostKeyChecking no\n\n" > ~/.ssh/config
40
    - source .${CI_COMMIT_REF_NAME}.env
41
  script:
42
    - ssh root@$SERVER "docker login -u $DOCKER_USER -p $DOCKER_PASSWORD docker.io; docker stop $APP_NAME; docker system prune -a -f; docker pull $DOCKER_REPO; docker container run -d --name $APP_NAME -p $PORT:8080 -e SPRING_PROFILES_ACTIVE=$SPRING_ACTIVE_PROFILE $DOCKER_REPO; docker logout"
1
services:


Let's explain what is happening here:

services:
- docker:19.03.7-dind

This is actually a service that allows us to use Docker in Docker. Running Docker in Docker is generally not a good idea, but for this use case it's totally fine, since we will just build the image and push it to the repository. You can get more information about Docker in Docker here.

stages:
- build jar
- build and push Docker image
 - deploy

For each gitlab-ci.yml file, it's mandatory first to define stages. Stages will be executed in the order defined under stages part of the script.

In every stage we will have to add this part:
before_script:
    - source .${CI_COMMIT_REF_NAME}.env

This simply loads previously created env. files, and it will enable the usage of variables that are defined inside. Depending on which branch build is running variables are automatically injected. (That is the reason why we had to name .env files by exact branch name)

These are the actual stages in our deployment process.

Stages in deployment

As you can see under the stages, there are three circles with a green check marks, which means all the stages are executed successfully.

Java
 




xxxxxxxxxx
1
10


 
1
build:
2
  image: maven:3.6.3-jdk-11-slim
3
  stage: build jar
4
  before_script:
5
    - source .${CI_COMMIT_REF_NAME}.env
6
  script:
7
    - mvn clean install -Dspring.profiles.active=$SPRING_ACTIVE_PROFILE && mvn package -B -e -Dspring.profiles.active=$SPRING_ACTIVE_PROFILE
8
  artifacts:
9
    paths:
10
      - target/*.jar


This is part of the code that executes the first stage, building a jar file that can be downloaded and used later for whatever you need it. This is actually an optional stage, and it's used just to demonstrate how easy it is to build jar and download it from GitLab.

The second stage is building and pushing the Docker image on the Docker repository.

Shell
 




xxxxxxxxxx
1


 
1
docker build:
2
  image: docker:stable
3
  stage: build and push docker image
4
  before_script:
5
    - source .${CI_COMMIT_REF_NAME}.env
6
  script:
7
    - docker build --build-arg SPRING_ACTIVE_PROFILE=$SPRING_ACTIVE_PROFILE -t $DOCKER_REPO .
8
    - docker login -u $DOCKER_USER -p $DOCKER_PASSWORD docker.io
9
    - docker push $DOCKER_REPO


Because of this step, we had to use docker:19.03.7-dind service. As you can see we are using the latest stable version of Docker, and we are simply building our image for an adequate environment, then we are authenticated to our Dockerhub and pushing image.

The final part of our script is:

Shell
 




xxxxxxxxxx
1
13


 
1
deploy:
2
  image: ubuntu:latest
3
  stage: deploy
4
  before_script:
5
    - 'which ssh-agent || ( apt-get update -y && apt-get install openssh-client -y )'
6
    - eval $(ssh-agent -s)
7
    - echo "$SSH_PRIVATE_KEY" | tr -d '\r' | ssh-add -
8
    - mkdir -p ~/.ssh
9
    - chmod 700 ~/.ssh
10
    - echo -e "Host *\n\tStrictHostKeyChecking no\n\n" > ~/.ssh/config
11
    - source .${CI_COMMIT_REF_NAME}.env
12
  script:
13
    - ssh root@$SERVER "docker stop $APP_NAME; docker system prune -a -f; docker pull $DOCKER_REPO; docker container run -d --name $APP_NAME -p $PORT:8080 -e SPRING_PROFILES_ACTIVE=$SPRING_ACTIVE_PROFILE $DOCKER_REPO"
6
    - eval $(ssh-agent -s)


In this step, we are using the Ubuntu Docker image so we can ssh to our application server and run a few (Docker) commands. Part of the code in  before_script is mostly taken from the official documentation, but, of course, we had to adjust to it a bit for our needs. In order to avoid making private key verified, this line of the code is added:

Shell
 




xxxxxxxxxx
1


 
1
- echo -e "Host *\n\tStrictHostKeyChecking no\n\n" > ~/.ssh/config


But if you do not like it, you can follow this guide and verify your private key.
As you can see in the last stage of the script, we are executing a few Docker commands.

  1. Stop the running Docker container by executing command:docker stop $APP_NAME. (This is the reason why we defined  APP_NAME in our .env file)
  2. Delete all the Docker images that are not running by executing  docker system prune -a -f. This is actually not mandatory, but I wanted to remove all unused images on my server.
  3. Pull the latest version of the Docker image (that was built and pushed in the previous stage). 
  4. Finally, run the Docker image with the following command:
    docker container run -d --name $APP_NAME -p $PORT:8080 -e SPRING_PROFILES_ACTIVE=$SPRING_ACTIVE_PROFILE $DOCKER_REPO

I hope this guide will help you to better understand and implement GitLab CI in your projects. If you have any questions or suggestions feel free to contact me or leave a comment. 

Docker (software) Continuous Integration/Deployment Spring Framework GitLab Spring Boot application Java (programming language) app

Opinions expressed by DZone contributors are their own.

Related

  • Running a Java App With MySQL in Any Docker Environment
  • How to Activate New User Accounts by Email
  • Spring Config Integration With a PCF Application: A Step-by-Step Guide
  • AOT Compilation Make Java More Power

Partner Resources

×

Comments
Oops! Something Went Wrong

The likes didn't load as expected. Please refresh the page and try again.

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends:

Likes
There are no likes...yet! 👀
Be the first to like this post!
It looks like you're not logged in.
Sign in to see who liked this post!