Kubernetes development workflow made easy
Project description
kubedev
DevOps command line tool that standardizes workflows for Microservices in Kubernetes for teams:
Develop, Build, Secure, Deploy.
It builds on well-known and field-proven tools:
kubedev Principles
kubedev
wants to help you quickly and easily build microservices that are independent, but at the same time follow a common pattern in regards to building, documenting and deploying. This makes it easier to add new services, and to onboard new developers.kubedev
aims to be a thin wrapper around the commands it builds on, and just wants to make it easier for teams to call them appropriately.kubedev
always prints the commands that it executes, so that you know what is going on.kubedev
heavily relies on environment variables for service configuration.kubedev
helps you build your services "secure by default".
Current state of development
kubedev
is in early development and used internally by Gira.
Synopsis
kubedev
commands are based on the definitions found in kubedev.json
, which include the minimum necessary information that is required to execute common cloud-dev related tasks.
A kubedev.json describes an "Service", which in turn can contain "Apps" that may be deployments, daemonsets or cronjobs.
Schema of kubedev.json:
{
"name": "myservice",
"description": "My fancy service 🎆",
"imagePullSecrets": "foo-creds", # Your docker registry auth credentials
"imageRegistry": "foo-registry", # Your docker registry
"helmReleaseName": "myservice-v1", # An optional name of the helm release. If not specified, 'name' will be used.
"securityChecks": {
"polaris": { # Optional, specify a custom polaris configuration
"configFile": "polaris-config-cli.yaml", # Local file name of the polaris config
"configDownload": { # Optional, download the polaris config to the local file before running the audit
"url": "https://url-to-your-polaris-config",
"headers": { # Optional, specify headers added to the GET request to download the polaris config
"Authentication": "Bearer ${YOUR_BEARER_TOKEN}"
}
}
}
},
"required-envs": {
"MYSERVICE_ENV": {
"documentation": "Describe MYSERVICE_ENV here, so that other devs on your team know how to set them in their own env",
"container": true, # Use this environment variable when running containers
"build": true # Use this environment variable for building the container
}
},
"deployments": {
"mydeploy": { # An App `mydeploy' of type deployment
"usedFrameworks": ["python", "pipenv", "npm", "vue"], # Not implemented, yet. usedFrameworks are used to e.g. fill in Tiltfile live_update, ignore, etc.
"ports": {
"https": {
"container": "8081", # This is the port that your actual dockerized service is bound to
"service": "8082", # This is the port that the Kubernetes service serves on. Will be redirected to the container-port of the pods.
"dev": "8083" # This is the port used for local development by either `tilt` or `kubedev run`. Will be available on localhost when using `tilt up` or `kubedev run`.
}
},
"volumes": {
"dev": {
"host_path": "/container/path" # Mount local directories to container directories when running via `kubedev run`
}
},
"required-envs": {
"MYDEPLOY_FLASK_ENV": {
"documentation": "..."
}
}
}
},
"daemonsets": {
# … not implemented, yet
},
"cronjobs": {
# … not implemented, yet
}
}
Naming conventions
kubedev
will work with artifacts that follow certain naming conventions that are built from the <service name> (top level "name"), the <app name> (the "name" inside of "deployments", "daemonsets" and "cronjobs") and a tag, which will be used as the image tag.
Artifact | Naming Convention |
---|---|
helm chart name | The helm chart is generated with the name <service name> . |
helm release name | The release name is either directly specified using helmReleaseName in kubedev.json , or is the same as the helm chart name if helmReleaseName is not specified. |
kubernetes labels | All kubernetes definitions include the labels kubedev-deployment (<service name>) and kubedev-app <app name>. |
image name | The image name is built using <imageRegistry>/<service name>-<app name> , except when <app name> is the same as <service name>, in which case it is collapsed to just <imageRegistry>/<app name> |
image tag | The tag is either built using "${CI_COMMIT_SHORT_SHA}_${CI_COMMIT_REF_NAME}" , if both these environment variables are set, or to none otherwise. |
kubedev generate
Creates artifacts that kick-starts your microservice development.
The following files are created for by - with secure defaults:
- Tiltfile
- .gitlab-ci.yml
- helm-chart/ with all required kubernetes ressources
- <your-service>/Dockerfile
See Naming Conventions.
The following "usedFrameworks" are supported by kubedev generate
.
pipenv
When "pipenv" is included in the "usedFrameworks" by either a deployment or globally, the following files are generated inside the <app>'s sub-directory:
File | Description |
---|---|
Dockerfile | Includes pipenv-specific instructions |
app.py | An empty python script |
Pipfile | A Pipfile using python 3.8. No packages or dev-packages are added. |
Pipfile.lock | The result of locking the empty Pipfile. |
kubedev check
Reads kubedev.json and checks whether all environment variables from the configuration is set in the current environment. It prints missing variables, including it's documentation.
kubedev audit
Audits the k8s specification using Fairwind's Polaris.
A custom configuration file can be specified via the configuration options securityChecks.polaris
, see the example.
Possible configuration options:
JSON field | Description |
---|---|
securityChecks.polaris.configFile |
A path to a local configuration file that is passed to polaris . The file must exist or configDownload must be specified. Environment variables will be expanded. |
securityChecks.polaris.configDownload |
An optional object that can be used to specify a download path where kubedev audit will fetch the polaris configuration from. |
securityChecks.polaris.configDownload.url |
The URL to the polaris config. Environment variables will be expanded. When the object configDownload exists, the field url is mandatory. |
securityChecks.polaris.configDownload.headers |
An optional dictionary that can contain custom headers that will be passed to the polaris config download. Both the header names and values can include environment variables. |
Note: The polaris executable needs to be available in your $PATH.
kubedev build <app>
Runs docker build
for <app> with all docker build args as defined in kubedev.json.
See Naming Conventions.
This commands writes the content of ${DOCKER_AUTH_CONFIG}
to the file ${HOME}/.docker/config.json
, if:
~/.docker/config.json
does not exist.- The environment variable
${CI}
is set. - The environment variable
{DOCKER_AUTH_CONFIG}
is set.
kubedev build
is used inside the CI/CD build jobs generated by kubedev generate
and internally by the kubedev run
command.
kubedev push <app>
Runs docker push
for <app>.
See Naming Conventions.
This commands writes the content of ${DOCKER_AUTH_CONFIG}
to the file ${HOME}/.docker/config.json
, if:
~/.docker/config.json
does not exist.- The environment variable
${HOME}
is set. - The environment variable
${CI}
is set. - The environment variable
${DOCKER_AUTH_CONFIG}
is set.
kubedev push
is used inside the CI/CD build jobs generated by kubedev generate
.
kubedev run <app>
Builds an image using kubedev build
with a random tag and then runs it.
The following parameters are passed to docker run
, some of them can be configured in kubedev.json
:
--interactive
and--rm
are always passed- If kubedev is called from a terminal,
--tty
is passed. required-envs
are forwarded to the container.- All
ports.\<port-name\>.dev
will be forwarded toports.\<port-name\>.container
volumes.dev
are passed to the container. kubedev will auto-detect a WSL + Docker Desktop environment and convert the source path to a Windows path usingwsl-path -w
.
kubedev deploy
Reads a kube config from the env var $KUBEDEV_KUBECONFIG (required) and optionally a context from $KUBEDEV_KUBECONTEXT and then runs helm upgrade --install
with appropriate arguments and all env vars from kubedev.json
.
See Naming Conventions.
The generated image tag is passed to the template using the environment variable KUBEDEV_TAG.
kubedev deploy
is used inside the CI/CD build jobs generated by kubedev generate
.
kubedev template
Basically runs helm template
with appropriate arguments and env vars from kubedev.json
.
See Naming Conventions.
The generated image tag is passed to the template using the environment variable KUBEDEV_TAG.
kubedev template
is used inside the Tiltfile generated by kubedev generate
.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file kubedev-0.5.739232665.tar.gz
.
File metadata
- Download URL: kubedev-0.5.739232665.tar.gz
- Upload date:
- Size: 15.9 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/3.2.0 pkginfo/1.6.1 requests/2.24.0 setuptools/47.3.1 requests-toolbelt/0.9.1 tqdm/4.51.0 CPython/3.6.7
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 983f0f5e5c4aa219c4983592e064ab11ac9019c8ae522212564b052c1acf3318 |
|
MD5 | 3c129566062e8b9e94fd0f11a6933bed |
|
BLAKE2b-256 | a7b91060ad4e006338b7a7ef1cf60463f819b36c21ceef8626e1e192aad3bfe2 |
File details
Details for the file kubedev-0.5.739232665-py3-none-any.whl
.
File metadata
- Download URL: kubedev-0.5.739232665-py3-none-any.whl
- Upload date:
- Size: 20.0 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/3.2.0 pkginfo/1.6.1 requests/2.24.0 setuptools/47.3.1 requests-toolbelt/0.9.1 tqdm/4.51.0 CPython/3.6.7
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 18494691caa794ab75c183f5dec46148b2f55b4ad9877f127770b9452b7994c5 |
|
MD5 | 04286df71631de4c61fbf95f2018bacf |
|
BLAKE2b-256 | b32f10fbee0753b144d23af899d6b7f309037944c2a225e3331d408acad295e5 |