Empire is a control layer on top of Amazon EC2 Container Service (ECS) that provides a Heroku like workflow. It conforms to a subset of the Heroku Platform API, which means you can use the same tools and processes that you use with Heroku, but with all the power of EC2 and Docker.
Empire is targeted at small to medium sized startups that are running a large number of microservices and need more flexibility than what Heroku provides. You can read the original blog post about why we built empire on the Remind engineering blog.
To use Empire, you'll need to have an ECS cluster running. See the quickstart guide for more information.
Empire aims to make it trivially easy to deploy a container based microservices architecture, without all of the complexities of managing systems like Mesos or Kubernetes. ECS takes care of much of that work, but Empire attempts to enhance the interface to ECS for deploying and maintaining applications, allowing you to deploy Docker images as easily as:
$ emp deploy remind101/acme-inc:master
Heroku API compatibility
Empire supports a subset of the Heroku Platform API, which means any tool that uses the Heroku API can probably be used with Empire, if the endpoint is supported.
As an example, you can use the
hk CLI with Empire like this:
$ HEROKU_API_URL=<empire_url> hk ...
However, the best user experience will be by using the emp command, which is a fork of
hk with Empire specific features.
Empire's routing layer is backed by internal ELBs. Any application that specifies a web process will get an internal ELB attached to its associated ECS Service. When a new version of the app is deployed, ECS manages spinning up the new versions of the process, waiting for old connections to drain, then killing the old release.
When a new internal ELB is created, an associated CNAME record will be created in Route53 under the internal TLD, which means you can use DNS for service discovery. If we deploy an app named
feed then it will be available at
http://feed within the ECS cluster.
Apps default to only being exposed internally, unless you add a custom domain to them. Adding a custom domain will create a new external ELB for the ECS service.
Any tagged Docker image can be deployed to Empire as an app. Empire doesn't enforce how you tag your Docker images, but we recommend tagging the image with the git sha that it was built from (any any immutable identifier), and deploying that.
When you deploy a Docker image to Empire, it will extract a
Procfile from the WORKDIR. Like Heroku, you can specify different process types that compose your service (e.g.
worker), and scale them individually. Each process type in the Procfile maps directly to an ECS Service.
Pull requests are more than welcome! For help with setting up a development environment, see CONTRIBUTING.md
We have a google group, empire-dev, where you can ask questions and engage with the Empire community.
You can also join our Slack team for discussions and support.
The current authentication model used by
emp login relies on a deprecated GitHub endpoint that is scheduled to be deactivated in November 2020. Therefore both the client and the server need to be updated to support the web authentication flow
The web flow works like this
- The user runs a command like
- The client starts up a HTTP listener on a free local port
- The client opens a browser window on the local machine to
- The port parameter specifies where the client is listening
- The browser executes a GET against the URL
- The Empire server sees the request and constructs an OAuth request URL that will hit the GitHub OAuth endpoint and returns it as a redirect
- The browser makes the request to the GitHub auth endpoint, which shows the UI a request to authorize the application
- If they've previously authorized it will just immediately grant the request
- GitHub redirects the browser back to the redirect URL specified in the configuration, meaning back to the Empire server
- The Empire server receives the browser request and can now perform the code exchange to turn the provided code into an actual authentication token
- This is just like it would have received from the old endpoint. However, it's not usable yet because it still isn't in the possession of the client, only the browser
- The Empire server now redirects the browser back to
localhoston the original port provided by the client
- The client receives the token, but can't use it directly. The Empire server expects it to be wrapped in a JSON Web Token that only the server can create.
- The client can now make a request directly to the Empire server (its first in this sequence) providing the token and requesting a JSON Web Token in response
- The client stores the received token just as it would have with the response to an
- The client is authenticated
In theory the Empire server could construct the JWT directly after the code exchange and push that directly to the client, but the abstraction doesn't really seem to easily support that flow