Skip to main content

Deployment

Once you've created and configured your ActiveState project, you need to deploy it to your local development environment or production systems. This section covers all deployment methods and integration options.

Deployment Methods

Local Development

Production and Distribution

Development Environment Integration

  • IDE Integration - Connect projects to popular development environments:
    • Visual Studio Code
    • PyCharm
    • Jupyter Notebooks

Key Concepts

Runtime Deployment

When you deploy an ActiveState project, you're installing:

  • Language runtime - The core interpreter/compiler (Python, Perl, etc.)
  • Packages and dependencies - All libraries and tools specified in your project
  • Platform-specific binaries - Compiled components for your target OS/architecture
  • Configuration - Environment variables and settings

Deployment Strategies

  • Isolated from system packages
  • Use state shell to activate
  • Safe for experimentation
  • Easy to clean up

System Integration

  • Use state use to set as default
  • Available system-wide
  • Affects global environment
  • Good for primary development runtime

Containerized Deployment

  • Fully isolated environments
  • Reproducible across systems
  • Good for production deployments
  • Integrates with CI/CD pipelines

Deployment Locations

Local Checkout Directory

  • Contains activestate.yaml configuration file
  • Lightweight reference to your project
  • Used for project management commands

Runtime Cache Directory

  • Contains actual runtime binaries and packages
  • Managed automatically by State Tool
  • Shared across multiple checkouts of the same project

Platform Support

ActiveState projects support deployment on:

  • Windows - Windows 10/11, Windows Server
  • macOS - macOS 10.15+ (Intel and Apple Silicon)
  • Linux - Various distributions with compatible glibc

Security Considerations

Network Requirements

  • Initial download requires internet connectivity
  • Offline installers work in air-gapped environments
  • Corporate firewalls may need configuration

Permissions

  • User-level installation (no admin rights required)
  • Isolated from system packages
  • Configurable installation paths

Supply Chain Security

  • All packages are built and tested by ActiveState
  • Cryptographic verification of downloads