Post

DevOps and Azure IaC Series: Centralised Pipelines

DevOps and Azure IaC Series: Centralised Pipelines

DevOps and Azure IaC Series: Centralised Pipelines

Welcome back to our DevOps and Azure IaC series! In our previous article, we delved into the Deploy phase, exploring effective approaches for deploying infrastructure using DevOps and Azure IaC. Today, we’ll focus on a crucial aspect of DevOps practices: centralised pipelines. These standardised workflows can significantly enhance your team’s efficiency, consistency, and governance when managing infrastructure as code.

What are Centralised Pipelines?

Centralised pipelines are reusable CI/CD workflows that standardise your build, validation, and deployment processes across multiple projects or teams. Rather than having each team create their own unique pipelines, centralised pipelines establish a consistent approach that can be leveraged across your organisation. This is particularly valuable for infrastructure as code, where consistency and standardisation are essential for maintaining security and compliance.

Overview of centralised pipelines:

flowchart LR
    subgraph "Central Pipeline Repository"
        direction LR
        CP[Central Pipelines]
        CP --> |Contains| B[Build Templates]
        CP --> |Contains| V[Validation Templates]
        CP --> |Contains| D[Deployment Templates]
    end

    subgraph "Team Projects"
        P1[Project 1 Repository]
        P2[Project 2 Repository]
        P3[Project 3 Repository]
        P4[Project 4 Repository]
    end

    CP --> |Referenced by| P1
    CP --> |Referenced by| P2
    CP --> |Referenced by| P3
    CP --> |Referenced by| P4

    classDef central fill:#00796b,stroke:#000,stroke-width:2px
    classDef projects fill:#0d47a1,color:#fff, stroke:#000,stroke-width:2px
    class CP,B,V,D central
    class P1,P2,P3,P4 projects

Benefits of Centralised Pipelines

Centralised pipelines offer several key benefits for managing infrastructure as code:

  • Consistency and Standardisation: Centralised pipelines enforce uniform infrastructure deployment practices across all teams. This standardisation prevents inconsistencies and reduces the risk of human error in pipeline setup.

  • Reduced Maintenance Overhead: With centralised pipelines, you only need to update and maintain one set of workflows rather than updating numerous similar pipelines across projects. When security requirements change or new best practices emerge, you can implement these changes in one place.

  • Built-in Governance: Centralised pipelines allow you to embed governance controls directly into your deployment processes. These controls can include:

    • Mandatory security scans
    • Policy compliance checks
    • Approval workflows
    • Audit logging
    • Cost management validations
  • Knowledge Sharing: Centralised pipelines document your organisation’s best practices in code, making it easier for new team members to understand deployment standards and quickly become productive.

Illustrating the benefits of centralised pipelines:

graph TD
    subgraph "Traditional Approach"
    direction TB
        T1[Team 1 Pipeline] --> TM1[Maintenance]
        T2[Team 2 Pipeline] --> TM2[Maintenance]
        T3[Team 3 Pipeline] --> TM3[Maintenance]
        T4[Team 4 Pipeline] --> TM4[Maintenance]
    end

    classDef traditional fill:#ff6f00,color:#fff, stroke:#000,stroke-width:2px
    class T1,T2,T3,T4,TM1,TM2,TM3,TM4 traditional
graph TD
    subgraph "Centralised Approach"
    direction LR
        CP[Centralised Pipeline Repository]
        CP --> CM[Single Maintenance Point]
        CP --> |Used by| TP1[Team 1 Project]
        CP --> |Used by| TP2[Team 2 Project]
        CP --> |Used by| TP3[Team 3 Project]
        CP --> |Used by| TP4[Team 4 Project]
    end

    classDef centralised fill:#c62828,color:#fff, stroke:#000,stroke-width:2px
    class CP,CM,TP1,TP2,TP3,TP4 centralised

Implementing Centralised Pipelines in GitHub

The example below demonstrates how to implement centralised pipelines using GitHub’s reusable workflows feature. This approach allows you to define core workflows that can be called from individual repositories.

This has been illustrated in the following diagram:

flowchart TD
  subgraph "Central Repository"
    CW[Central Workflows]
    CW --> |Contains| BW[build.yml]
    CW --> |Contains| DW[deploy.yml]
    CW --> |Contains| VW[validate.yml]
  end

  subgraph "Project Repository"
    PW[Project Workflow]
    PW --> |References| BW
    PW --> |References| DW
    PW --> |References| VW
    PW --> |Contains| IC[Infrastructure Code]
  end

  GH[GitHub Actions] --> |Executes| PW
  PW --> |Triggers| E[Execution]
  E --> |Uses| CW

  classDef central fill:#00796b,color:#fff,stroke:#000,stroke-width:2px
  classDef project fill:#0d47a1,color:#fff, stroke:#000,stroke-width:2px
  classDef execution fill:#388e3c,color:#fff,stroke:#000,stroke-width:2px
  class CW,BW,DW,VW central
  class PW,IC project
  class GH,E execution

Code snippets for implementing centralised pipelines in GitHub:

Centralised Pipeline Reusable Workflow

Here is an example of a centralised pipeline reusable workflow that deploys a Bicep template:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
name: deploy

on:
  workflow_call:
    inputs:
      environment:
        description: "github environment for deployment jobs"
        type: string
        required: true
      location:
        description: "location for resource deployment"
        type: string
        default: ""
      subscription_id:
        description: "azure subscription id used for deployments"
        type: string
        default: ""
      template_file_name:
        description: "name of the template file to be deploy (assume its been built from bicep into json)"
        type: string
        required: false
      deployment_name:
        description: "name of the arm deployment"
        type: string
        required: true
      az_deployment_type:
        description: "type of azure deployment"
        type: string
        required: false
        default: subscription
      management_group_id:
        description: "management group id for azure deployment"
        type: string
        required: false
        default: ""
      resource_group_name:
        description: "resource group name for azure deployment"
        type: string
        required: false
        default: ""
      oidc_app_reg_client_id:
        description: "client id of the azure application registration used to authenticate to azure using oidc, refer to https://learn.microsoft.com/en-us/azure/active-directory/develop/workload-identity-federation-create-trust?pivots=identity-wif-apps-methods-azp#github-actions"
        type: string
        required: true
      azure_tenant_id:
        description: "entra id tenant/directory id"
        type: string
        required: true

jobs:
  run_deploy:
    runs-on: ubuntu-latest
    if: github.ref == 'refs/heads/main'
    environment:
      name: ${{ inputs.environment }}
    steps:
      - name: Checkout
        uses: actions/checkout@v4

      - name: Download Artifact
        uses: actions/download-artifact@v4
        with:
          name: deploy
          path: ${{ github.workspace }}/deploy

      - name: Login to Azure
        uses: azure/login@v2
        with:
          client-id: ${{ inputs.oidc_app_reg_client_id }}
          tenant-id: ${{ inputs.azure_tenant_id }}
          allow-no-subscriptions: true

      - name: Deploy to Azure
        run: |
          $ErrorActionPreference = 'stop'
          $paramFile = Get-ChildItem ${{ github.workspace }}/deploy | Where-Object {$_.Name -like "*.parameters.json"} # get the parameters file (assumes only one)
          $template = "${{ inputs.template_file_name }}".Replace(".bicep",".json")

          if ('${{ inputs.az_deployment_type }}' -eq 'subscription' ){
            az account set --subscription ${{ inputs.subscription_id}}
            az deployment sub create `
              --name '${{ inputs.deployment_name }}' `
              --location '${{ inputs.location }}' `
              --subscription '${{ inputs.subscription_id }}' `
              --template-file ${{ github.workspace }}/deploy/$template --parameters $paramFile
          }
          if ('${{ inputs.az_deployment_type }}' -eq 'tenant' ){
            az deployment tenant create `
              --name '${{ inputs.deployment_name }}' `
              --location '${{ inputs.location }}' `
              --template-file ${{ github.workspace }}/deploy/$template --parameters $paramFile
          }
          if ('${{ inputs.az_deployment_type }}' -eq 'managementgroup'){
          az deployment mg create `
            --name '${{ inputs.deployment_name }}' `
            --location '${{ inputs.location }}' `
            --management-group-id '${{ inputs.management_group_id }}' `
            --template-file ${{ github.workspace }}/deploy/$template --parameters $paramFile
          }
          if ('${{ inputs.az_deployment_type }}' -eq 'resourcegroup' ){
            az account set --subscription '${{ inputs.subscription_id }}'
            az deployment group create `
              --name '${{ inputs.deployment_name }}' `
              --resource-group '${{ inputs.resource_group_name }}' `
              --template-file ${{ github.workspace }}/deploy/$template --parameters $paramFile
          }
        shell: pwsh

Calling Centralised Pipelines

Individual repositories can then call these centralised pipelines, providing only the required parameters:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
name: Azure Infrastructure Deployment

on:
  workflow_dispatch:
  push:
    branches:
      - main
    paths:
      - bicep/infra/*
  pull_request:
    branches:
      - main
    paths:
      - bicep/infra/*

env:
  template_folder_path: bicep/infra
  template_file_name: azure_infra.bicep
  parameter_file_path: bicep/infra/azure_infra.bicepparam
  subscription_id: 00000000-0000-0000-0000-000000000000
  oidc_app_reg_client_id: AppClientId
  azure_tenant_id: EntraTenantId
  environment: demo
  location: eastus
  deployment_name: "deploy_azure_infra"

jobs:
  initialise_vars:
    runs-on: ubuntu-latest
    outputs:
      template_folder_path: ${{ env.template_folder_path }}
      template_file_name: ${{ env.template_file_name }}
      parameter_file_path: ${{ env.parameter_file_path }}
      location: ${{ env.location }}
      subscription_id: ${{ env.subscription_id }}
      oidc_app_reg_client_id: ${{ env.oidc_app_reg_client_id }}
      azure_tenant_id: ${{ env.azure_tenant_id }}
      environment: ${{ env.environment }}
      deployment_name: ${{ env.deployment_name }}
    steps:
      - name: Initialise Variables
        run: echo "Initialising environment variables"

  build_and_validate:
    needs: initialise_vars
    permissions:
      id-token: write
      contents: read
    uses: tw3lveparsecs/central-pipelines/.github/workflows/build.yml@v1.0.0
    with:
      test_trigger: ${{ github.event_name }}
      template_file_path: ${{ needs.initialise_vars.outputs.template_folder_path }}/${{ needs.initialise_vars.outputs.template_file_name }}
      parameter_file_path: ${{ needs.initialise_vars.outputs.parameter_file_path }}
      oidc_app_reg_client_id: ${{ needs.initialise_vars.outputs.oidc_app_reg_client_id }}
      azure_tenant_id: ${{ needs.initialise_vars.outputs.azure_tenant_id }}
      location: ${{ needs.initialise_vars.outputs.location }}
      subscription_id: ${{ needs.initialise_vars.outputs.subscription_id }}
      deployment_name: ${{ needs.initialise_vars.outputs.deployment_name }}

  deploy:
    needs: [initialise_vars, build_and_validate]
    if: ${{ github.ref == 'refs/heads/main' }}
    permissions:
      id-token: write
      contents: read
    uses: tw3lveparsecs/central-pipelines/.github/workflows/deploy.yml@v1.0.0
    with:
      environment: ${{ needs.initialise_vars.outputs.environment }}
      location: ${{ needs.initialise_vars.outputs.location }}
      subscription_id: ${{ needs.initialise_vars.outputs.subscription_id }}
      management_group_id: ${{ needs.initialise_vars.outputs.management_group_id }}
      template_file_name: ${{ needs.initialise_vars.outputs.template_file_name }}
      deployment_name: ${{ needs.initialise_vars.outputs.deployment_name }}
      oidc_app_reg_client_id: ${{ needs.initialise_vars.outputs.oidc_app_reg_client_id }}
      azure_tenant_id: ${{ needs.initialise_vars.outputs.azure_tenant_id }}

Implementing Centralised Pipelines in Azure DevOps

The example below demonstrates how to implement centralised pipelines using Azure DevOps’s pipeline template feature. This approach allows you to define core workflows that can be called from individual repositories.

This has been illustrated in the following diagram:

flowchart TD
  subgraph "Central Template Repository"
    CT[Central Templates]
    CT --> |Contains| BT[bicep-build.yml]
    CT --> |Contains| DT[bicep-deploy.yml]
    CT --> |Contains| VT[bicep-validate.yml]
  end

  subgraph "Project Repository"
    PP[azure-pipelines.yml]
    PP --> |References| BT
    PP --> |References| DT
    PP --> |Contains| IC[Infrastructure Code]
  end

  AD[Azure DevOps] --> |Executes| PP
  PP --> |Triggers| E[Execution]
  E --> |Uses| CT

  classDef central fill:#00796b,color:#fff,stroke:#000,stroke-width:2px
  classDef project fill:#0d47a1,color:#fff, stroke:#000,stroke-width:2px
  classDef execution fill:#388e3c,color:#fff,stroke:#000,stroke-width:2px
  class CT,BT,DT,VT central
  class PP,IC project
  class AD,E execution

Centralised Pipeline Template

Here’s an example of a reusable template for deploying Bicep files.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
parameters:
  - name: stage # Stage Name
    type: string
  - name: dependsOn # Stage Dependencies
    type: string
  - name: condition # Stage Conditions
    type: string
  - name: adoEnvironment # Azure DevOps Environment for Deployment Jobs
    type: string
  - name: location # Where the deployment metadata will be saved
    type: string
    default: ""
  - name: subscriptionId # SubscriptionId to deploy to
    type: string
    default: ""
  - name: templateFileName # Name of the file (assume its a built bicep into json)
    type: string
  - name: deploymentName # Name for ARM Deployment
    type: string
  - name: svcConnection # Service Connection
    type: string
  - name: azDeploymentType # Type of Azure deployment
    type: string
    default: subscription
    values:
      - subscription
      - tenant
      - managementGroup
      - resourceGroup
  - name: managementGroupId # Management Group Id to deploy to
    type: string
    default: ""
  - name: resourceGroupName # Name of resource group for RG deployments
    type: string
    default: ""

stages:
  - stage: ${{ parameters.stage }}
    dependsOn: ${{ parameters.dependsOn }}
    condition: ${{ parameters.condition }}
    jobs:
      - deployment: ${{ parameters.stage }}
        displayName: ${{ parameters.stage }}
        pool:
          vmImage: ubuntu-latest
        environment: ${{ parameters.adoEnvironment }}
        strategy:
          runOnce:
            deploy:
              steps:
                - checkout: self

                - download: current
                  artifact: deploy

                - task: AzureCLI@2
                  displayName: Deploy to Azure
                  inputs:
                    azureSubscription: ${{ parameters.svcConnection }}
                    scriptType: "pscore"
                    scriptLocation: "inlineScript"
                    inlineScript: |
                      $ErrorActionPreference = 'stop'
                      $paramFile = Get-ChildItem $(Pipeline.Workspace)/deploy | Where-Object {$_.Name -like "*.parameters.json"}
                      $template = "${{ parameters.templateFileName }}".Replace(".bicep",".json")

                      if ('${{ parameters.azDeploymentType }}' -eq "subscription" ){
                        az account set --subscription ${{ parameters.subscriptionId}}
                        az deployment sub create `
                          --name '${{ parameters.deploymentName }}' `
                          --location '${{ parameters.location }}' `
                          --subscription '${{ parameters.subscriptionId }}' `
                          --template-file $(Pipeline.Workspace)/deploy/$template --parameters $paramFile
                      }
                      if ('${{ parameters.azDeploymentType }}' -eq "tenant" ){
                        az deployment tenant create `
                          --name '${{ parameters.deploymentName }}' `
                          --location '${{ parameters.location }}' `
                          --template-file $(Pipeline.Workspace)/deploy/$template --parameters $paramFile
                      }
                      if ('${{ parameters.azDeploymentType }}' -eq "managementGroup" ){
                      az deployment mg create `
                        --name '${{ parameters.deploymentName }}' `
                        --location '${{ parameters.location }}' `
                        --management-group-id '${{ parameters.managementGroupId }}' `
                        --template-file $(Pipeline.Workspace)/deploy/$template --parameters $paramFile
                      }
                      if ('${{ parameters.azDeploymentType }}' -eq "resourceGroup" ){
                        az account set --subscription '${{ parameters.subscriptionId }}'
                        az deployment group create `
                          --name '${{ parameters.deploymentName }}' `
                          --resource-group '${{ parameters.resourceGroupName }}' `
                          --template-file $(Pipeline.Workspace)/deploy/$template --parameters $paramFile
                      }

Using Templates in Azure DevOps Pipelines

Here’s how to reference and use the template from a project pipeline:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
resources:
  repositories:
    - repository: central-pipelines
      type: git
      name: azure/central-pipelines
      ref: refs/heads/main

pr:
  branches:
    include:
      - main
  paths:
    include:
      - bicep/infra

trigger:
  branches:
    include:
      - main
  paths:
    include:
      - bicep/infra

variables:
  templateFolderPath: $(Pipeline.Workspace)/s/bicep/infra
  templateFileName: azure_infra.bicep
  parameterFilePath: $(Pipeline.Workspace)/s/bicep/infra/azure_infra.bicepparam
  location: "eastus"
  subscriptionId: "00000000-0000-0000-0000-000000000000"
  svcConnection: "ServiceConnection"
  adoEnvironment: "demo"
  deploymentName: "deploy_azure_infra"

stages:
  - template: /azure-pipelines/templates/build.yml@central-pipelines
    parameters:
      templateFilePath: "$(templateFolderPath)/$(templateFileName)"
      parameterFilePath: $(parameterFilePath)
      svcConnection: $(svcConnection)
      location: $(location)
      subscriptionId: $(subscriptionId)
      deploymentName: $(deploymentName)

  - template: /azure-pipelines/templates/deploy.yml@central-pipelines
    parameters:
      stage: Deploy
      dependsOn: "Build_and_Validate"
      condition: and(succeeded(), or(eq(variables['Build.SourceBranch'], 'refs/heads/main'), eq(variables['Build.Reason'], 'Manual')))
      svcConnection: $(svcConnection)
      subscriptionId: $(subscriptionId)
      location: $(location)
      adoEnvironment: $(adoEnvironment)
      templateFileName: "$(templateFileName)"
      deploymentName: $(deploymentName)

Building a Central Pipeline Repository

To effectively implement centralised pipelines, create a dedicated repository that contains:

  1. Central Pipelines: Core pipeline definitions for common tasks like build, validation, and deployment.
  2. Documentation: Clear guidelines explaining how to use the pipelines and their requirements.
  3. Templates: Sample implementation templates to help teams get started quickly.
  4. Validation Scripts: Common validation tools and scripts that enforce best practices.
graph LR
  R[Central Repository] --> W[pipelines/]
  R --> D[docs/]
  R --> E[examples/]
  R --> S[scripts/]

  W --> B[build/]
  W --> V[validate/]
  W --> DP[deploy/]

  B --> |Contains| BG[build.github.yml]
  B --> |Contains| BA[build.azuredevops.yml]

  V --> |Contains| VS[security-scan.yml]
  V --> |Contains| VP[lint-check.yml]

  DP --> |Contains| DM[deploy.github.sub.yml]
  DP --> |Contains| DS[deploy.azuredevops.sub.yml]

  D --> |Contains| RD[README.md]
  D --> |Contains| CM[CONTRIBUTING.md]

  E --> |Contains| EG[github-example.yml]
  E --> |Contains| EA[azuredevops-example.yml]

  S --> |Contains| SV[version-check.sh]
  S --> |Contains| SS[security-scan.sh]

  classDef folder fill:#b71c1c,color:#fff,stroke:#333,stroke-width:1px
  classDef file fill:#424242,color:#fff,stroke:#333,stroke-width:1px
  class R,W,D,E,S,B,V,DP folder
  class BG,BA,VS,VP,DM,DS,DR,RD,UD,CM,EG,EA,SV,SS file

Pipeline Versioning Strategy

When implementing centralised pipelines, it’s important to establish a versioning strategy. This allows teams to adopt updates on their own schedule while ensuring stability. Consider these approaches:

  1. Semantic Versioning: Tag your pipeline releases (v1.0.0, v1.1.0, etc.) and allow teams to reference specific versions.
  2. Branch-Based: Create stable branches (main, release, etc.) that teams can reference.
  3. Immutable Tags: Use immutable tags for major versions to prevent breaking changes.
graph LR
  subgraph "Semantic Versioning"
    V["Central Repo"] --> V1["v1.0.0"]
    V --> V11["v1.1.0"]
    V --> V2["v2.0.0"]

    P1["Project A"] --> V1
    P2["Project B"] --> V11
    P3["Project C"] --> V2
  end

  subgraph "Branch-based Strategy"
    M["Main Branch"]
    D["Development Branch"]
    R["Release Branch"]

    D --> |"Merge when stable"| M
    M --> |"Create for release"| R

    PD["Test Project"] --> D
    PM["Prod Project A"] --> M
    PR["Prod Project B"] --> R
  end

  classDef version fill:#81D4FA,color:#fff,stroke:#333,stroke-width:1px
  classDef branch fill:#A5D6A7,color:#fff,stroke:#333,stroke-width:1px
  classDef project fill:#FFB74D,color:#fff,stroke:#333,stroke-width:1px
  class V,V1,V11,V2 version
  class M,D,R branch
  class P1,P2,P3,PD,PM,PR project

Change Management

Centralised pipelines require careful change management to avoid disrupting teams who depend on them:

  1. Announce Changes: Communicate upcoming changes well in advance.
  2. Breaking vs. Non-Breaking: Clearly distinguish between breaking and non-breaking changes.
  3. Testing: Thoroughly test changes before releasing them.
  4. Migration Guides: Provide documentation to help teams adopt new versions.
graph TD
  PR[Propose Change PR] --> TS[Test in Staging]
  TS --> |"Fails"| PR
  TS --> |"Passes"| A[Announce Changes]
  A --> |"Major Change"| MC[New Major Version]
  A --> |"Minor Change"| NC[New Minor Version]

  MC --> DM[Documentation & Migration Guide]
  NC --> DM

  DM --> RT[Release Tags]
  RT --> |"Teams adopt when ready"| T1[Team 1 Adopts]
  RT --> |"Teams adopt when ready"| T2[Team 2 Adopts]
  RT --> |"Teams adopt when ready"| T3[Team 3 Adopts]

  classDef change fill:#795548,color:#fff,stroke:#333,stroke-width:1px
  classDef test fill:#00695c,color:#fff,stroke:#333,stroke-width:1px
  classDef doc fill:#6a1b9a,color:#fff,stroke:#333,stroke-width:1px
  classDef teams fill:#33691e,color:#fff,stroke:#333,stroke-width:1px
  class PR,A,MC,NC change
  class TS test
  class DM,RT doc
  class T1,T2,T3 teams

Conclusion

Centralised pipelines are a powerful tool for standardising and scaling your infrastructure as code practices across teams. By implementing these shared workflows, we can enforce governance, reduce maintenance overhead, and accelerate onboarding while maintaining consistency in your deployments.

In our next post, we’ll explore how to integrate security scanning and other validation mechanisms into our centralised pipelines to further enhance our governance posture. Stay tuned!

For practical examples and implementation guidance, check out the DevOps and Azure IaC repository, which contains centralised pipelines in both GitHub reusable workflows and Azure DevOps templates for Azure IaC deployments.

This post is licensed under CC BY 4.0 by the author.