• This repository has been archived on 07/Feb/2024
  • Stars
    star
    288
  • Rank 139,065 (Top 3 %)
  • Language Starlark
  • License
    Apache License 2.0
  • Created over 6 years ago
  • Updated about 1 year ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

This repository contains rules for interacting with Kubernetes configurations / clusters.

(ARCHIVED) Bazel Kubernetes Rules

This repository is no longer maintained.

Prow Bazel CI
Build status Build status

Rules

Overview

This repository contains rules for interacting with Kubernetes configurations / clusters.

Setup

Add the following to your WORKSPACE file to add the necessary external dependencies:

load("@bazel_tools//tools/build_defs/repo:http.bzl", "http_archive")

# https://github.com/bazelbuild/rules_docker/#setup
# http_archive("io_bazel_rules_docker", ...)

http_archive(
    name = "io_bazel_rules_k8s",
    strip_prefix = "rules_k8s-0.5",
    urls = ["https://github.com/bazelbuild/rules_k8s/archive/v0.5.tar.gz"],
    sha256 = "773aa45f2421a66c8aa651b8cecb8ea51db91799a405bd7b913d77052ac7261a",
)

load("@io_bazel_rules_k8s//k8s:k8s.bzl", "k8s_repositories")

k8s_repositories()

load("@io_bazel_rules_k8s//k8s:k8s_go_deps.bzl", k8s_go_deps = "deps")

k8s_go_deps()

Kubernetes Authentication

As is somewhat standard for Bazel, the expectation is that the kubectl toolchain is preconfigured to authenticate with any clusters you might interact with.

For more information on how to configure kubectl authentication, see the Kubernetes documentation.

NOTE: we are currently experimenting with toolchain features in these rules so there will be changes upcoming to how this configuration is performed

Container Engine Authentication

For Google Container Engine (GKE), the gcloud CLI provides a simple command for setting up authentication:

gcloud container clusters get-credentials <CLUSTER NAME>

NOTE: we are currently experimenting with toolchain features in these rules so there will be changes upcoming to how this configuration is performed

Dependencies

New: Starting https://github.com/bazelbuild/rules_k8s/commit/ff2cbf09ae1f0a9c7ebdfc1fa337044158a7f57b

These rules can either use a pre-installed kubectl tool (default) or build the kubectl tool from sources.

The kubectl tool is used when executing the run action from bazel.

The kubectl tool is configured via a toolchain rule. Read more about the kubectl toolchain here.

If GKE is used, also the gcloud sdk needs to be installed.

NOTE: we are currently experimenting with toolchain features in these rules so there will be changes upcoming to how this configuration is performed

Examples

Basic "deployment" objects

load("@io_bazel_rules_k8s//k8s:object.bzl", "k8s_object")

k8s_object(
  name = "dev",
  kind = "deployment",

  # A template of a Kubernetes Deployment object yaml.
  template = ":deployment.yaml",

  # An optional collection of docker_build images to publish
  # when this target is bazel run.  The digest of the published
  # image is substituted as a part of the resolution process.
  images = {
    "gcr.io/rules_k8s/server:dev": "//server:image"
  },
)

Aliasing (e.g. k8s_deploy)

In your WORKSPACE you can set up aliases for a more readable short-hand:

load("@io_bazel_rules_k8s//k8s:k8s.bzl", "k8s_defaults")

k8s_defaults(
  # This becomes the name of the @repository and the rule
  # you will import in your BUILD files.
  name = "k8s_deploy",
  kind = "deployment",
  # This is the name of the cluster as it appears in:
  #   kubectl config view --minify -o=jsonpath='{.contexts[0].context.cluster}'
  cluster = "my-gke-cluster",
)

Then in place of the above, you can use the following in your BUILD file:

load("@k8s_deploy//:defaults.bzl", "k8s_deploy")

k8s_deploy(
  name = "dev",
  template = ":deployment.yaml",
  images = {
    "gcr.io/rules_k8s/server:dev": "//server:image"
  },
)

Note that in load("@k8s_deploy//:defaults.bzl", "k8s_deploy") both k8s_deploy's are references to the name parameter passed to k8s_defaults. If you change name = "k8s_deploy" to something else, you will need to change the load statement in both places.

Multi-Object Actions

It is common practice in the Kubernetes world to have multiple objects that comprise an application. There are two main ways that we support interacting with these kinds of objects.

The first is to simply use a template file that contains your N objects delimited with ---, and omitting kind="...".

The second is through the use of k8s_objects, which aggregates N k8s_object rules:

# Note the plurality of "objects" here.
load("@io_bazel_rules_k8s//k8s:objects.bzl", "k8s_objects")

k8s_objects(
   name = "deployments",
   objects = [
      ":foo-deployment",
      ":bar-deployment",
      ":baz-deployment",
   ]
)

k8s_objects(
   name = "services",
   objects = [
      ":foo-service",
      ":bar-service",
      ":baz-service",
   ]
)

# These rules can be nested
k8s_objects(
   name = "everything",
   objects = [
      ":deployments",
      ":services",
      ":configmaps",
      ":ingress",
   ]
)

This can be useful when you want to be able to stand up a full environment, which includes resources that are expensive to recreate (e.g. LoadBalancer), but still want to be able to quickly iterate on parts of your application.

Developer Environments

A common practice to avoid clobbering other users is to do your development against an isolated environment. Two practices are fairly common-place.

  1. Individual development clusters
  2. Development "namespaces"

To support these scenarios, the rules support using "stamping" variables to customize these arguments to k8s_defaults or k8s_object.

For per-developer clusters, you might use:

k8s_defaults(
  name = "k8s_dev_deploy",
  kind = "deployment",
  cluster = "gke_dev-proj_us-central5-z_{BUILD_USER}",
)

For per-developer namespaces, you might use:

k8s_defaults(
  name = "k8s_dev_deploy",
  kind = "deployment",
  cluster = "shared-cluster",
  namespace = "{BUILD_USER}",
)

You can customize the stamp variables that are available at a repository level by leveraging --workspace_status_command. One pattern for this is to check in the following:

$ cat .bazelrc
build --workspace_status_command="bash ./print-workspace-status.sh"

$ cat print-workspace-status.sh
cat <<EOF
VAR1 value1
# This can be overriden by users if they "export VAR2_OVERRIDE"
VAR2 ${VAR2_OVERRIDE:-default-value2}
EOF

For more information on "stamping", you can see also the rules_docker documentation on stamping here.

Don't tread on my tags

Another ugly problem remains, which is that image references are still shared across developers, and while our resolution to digests avoids races, we may not want them trampling on the same tag, or on production tags if shared templates are being used.

Moreover, developers may not have access to push to the images referenced in a particular template, or the development cluster to which they are deploying may not be able to pull them (e.g. clusters in different GCP projects).

To resolve this, we enable developers to "chroot" the image references, publishing them instead to that reference under another repository.

Consider the following, where developers use GCP projects named company-{BUILD_USER}:

k8s_defaults(
  name = "k8s_dev_deploy",
  kind = "deployment",
  cluster = "gke_company-{BUILD_USER}_us-central5-z_da-cluster",
  image_chroot = "us.gcr.io/company-{BUILD_USER}/dev",
)

In this example, the k8s_dev_deploy rules will target the developer's cluster in their project, and images will all be published under the image_chroot.

For example, if the BUILD file contains:

k8s_deploy(
  name = "dev",
  template = ":deployment.yaml",
  images = {
    "gcr.io/rules_k8s/server:dev": "//server:image"
  },
)

Then the references to gcr.io/rules_k8s/server:dev will be replaced with one to: us.gcr.io/company-{BUILD_USER}/dev/gcr.io/rules_k8s/server@sha256:....

Custom resolvers

Sometimes, you need to replace additional runtime parameters in the YAML file. While you can use expand_template for parameters known to the build system, you'll need a custom resolver if the parameter is determined at deploy time. A common example is Google Cloud Endpoints service versions, which are determined by the server.

You can pass a custom resolver executable as the resolver argument of all rules:

sh_binary(
  name = "my_script",
  ...
)

k8s_deploy(
  name = "dev"
  template = ":deployment.yaml",
  images = {
    "gcr.io/rules_k8s/server:dev": "//server:image"
  },
  resolver = "//my_script",
)

This script may need to invoke the default resolver (//k8s/go/cmd/resolver) with all its arguments. It may capture the default resolver's output and apply additional modifications to the YAML, printing the final YAML to stdout.

Usage

The k8s_object[s] rules expose a collection of actions. We will follow the :dev target from the example above.

Build

Build builds all of the constituent elements, and makes the template available as {name}.yaml. If template is a generated input, it will be built. Likewise, any docker_build images referenced from the images={} attribute will be built.

bazel build :dev

Resolve

Deploying with tags, especially in production, is a bad practice because they are mutable. If a tag changes, it can lead to inconsistent versions of your app running after auto-scaling or auto-healing events. Thankfully in v2 of the Docker Registry, digests were introduced. Deploying by digest provides cryptographic guarantees of consistency across the replicas of a deployment.

You can "resolve" your resource template by running:

bazel run :dev

The resolved template will be printed to STDOUT.

This command will publish any images = {} present in your rule, substituting those exact digests into the yaml template, and for other images resolving the tags to digests by reaching out to the appropriate registry. Any images that cannot be found or accessed are left unresolved.

This process only supports fully-qualified tag names. This means you must always specify tag and registry domain names (no implicit :latest).

Create

Users can create an environment by running:

bazel run :dev.create

This deploys the resolved template, which includes publishing images.

Update

Users can update (replace) their environment by running:

bazel run :dev.replace

Like .create this deploys the resolved template, which includes republishing images. This action is intended to be the workhorse of fast-iteration development (rebuilding / republishing / redeploying).

Apply

Users can "apply" a configuration by running:

bazel run :dev.apply

:dev.apply maps to kubectl apply, which will create or replace an existing configuration. For more information see the kubectl documentation.

This applies the resolved template, which includes republishing images. This action is intended to be the workhorse of fast-iteration development (rebuilding / republishing / redeploying).

Delete

Users can tear down their environment by running:

bazel run :dev.delete

It is notable that despite deleting the deployment, this will NOT delete any services currently load balancing over the deployment; this is intentional as creating load balancers can be slow.

Describe (k8s_object-only)

Users can "describe" their environment by running:

bazel run :dev.describe

Diff

Users can "diff" a configuration by running:

bazel run :dev.diff

:dev.diff maps to kubectl diff, which will diff the live against the would-be applied version. For more information see the kubectl documentation.

This diffs the resolved template, but does not include republishing images.

k8s_object

k8s_object(name, kind, template)

A rule for interacting with Kubernetes objects.

Attributes
name

Name, required

Unique name for this rule.

kind

Kind, required

The kind of the Kubernetes object in the yaml.

If this is omitted, the apply, create, replace, delete, describe actions will not exist.

cluster

string, optional

The name of the cluster to which create, replace, delete, describe should speak. Subject to "Make" variable substitution.

If this is omitted, the apply, create, replace, delete, describe actions will not exist.

context

string, optional

The name of a kubeconfig context to use. Subject to "Make" variable substitution.

If this is omitted, the current context will be used.

namespace

string, optional

The namespace on the cluster within which the actions are performed. Subject to "Make" variable substitution.

If this is omitted, it will default to the value specified in the template or if also unspecified there, to the value "default".

user

string, optional

The user to authenticate to the cluster as configured with kubectl. Subject to "Make" variable substitution.

If this is omitted, kubectl will authenticate as the user from the current context.

kubeconfig

kubeconfig file, optional

The kubeconfig file to pass to the `kubectl` tool via the `--kubeconfig` option. Can be useful if the `kubeconfig` is generated by another target.

substitutions

string_dict, optional

Substitutions to make when expanding the template.

Follows the same rules as expand_template Values are "make variable substituted." You can also use the Bazel command line option --define to define your own custom variables.

  # Example
  k8s_object(
    name = "my_ingress",
    kind = "ingress",
# A template of a Kubernetes ingress object yaml.
template = ":ingress.yaml",

# An optional collection of docker_build images to publish
# when this target is bazel run.  The digest of the published
# image is substituted as a part of the resolution process.
substitutions = {
  "%{expand_template_variable}": "$(make_expanded_variable}",
})

Which is then invoked with bazel run --define make_expanded_variable=value :target and will replace any occurrences of the literal token %{expand_template_variable} in your template with the value "value" by way of first make variable substitution and then string replacement.

Any stamp variables are also replaced with their values. This is done after make variable substitution.

template

yaml or json file; required

The yaml or json for a Kubernetes object.

images

string to label dictionary

When this target is bazel run the images referenced by label will be published to the tag key.

The published digests of these images will be substituted directly, so as to avoid a race in the resolution process

Subject to "Make" variable substitution

image_chroot

string, optional

The repository under which to actually publish Docker images.

resolver

target, optional

A build target for the binary that's called to resolves references inside the Kubernetes YAML files.

args

string_list, optional

Additional arguments to pass to the kubectl command at execution.

NOTE: You can also pass args via the cli by run something like: bazel run some_target -- some_args

NOTE: Not all options are available for all kubectl commands. To view the list of global options run: kubectl options

resolver_args

string_list, optional

Additional arguments to pass to the resolver directly.

NOTE: This option is to pass the specific arguments to the resolver directly, such as --allow_unused_images.

k8s_objects

k8s_objects(name, objects)

A rule for interacting with multiple Kubernetes objects.

Attributes
name

Name, required

Unique name for this rule.

objects

Label list or dict; required

The list of objects on which actions are taken.

When bazel run this target resolves each of the object targets which includes publishing their associated images, and will print a --- delimited yaml.

If a dict is provided it will be converted to a select statement.

k8s_defaults

k8s_defaults(name, kind)

A repository rule that allows users to alias k8s_object with default values.

Attributes
name

Name, required

The name of the repository that this rule will create.

Also the name of rule imported from @name//:defaults.bzl

kind

Kind, optional

The kind of objects the alias of k8s_object handles.

cluster

string, optional

The name of the cluster to which create, replace, delete, describe should speak.

This should match the cluster name as it would appear in kubectl config view --minify -o=jsonpath='{.contexts[0].context.cluster}'

context

string, optional

The name of a kubeconfig context to use.

namespace

string, optional

The namespace on the cluster within which the actions are performed.

user

string, optional

The user to authenticate to the cluster as configured with kubectl.

image_chroot

string, optional

The repository under which to actually publish Docker images.

resolver

target, optional

A build target for the binary that's called to resolves references inside the Kubernetes YAML files.

Testing

To test rules_k8s, you can run the provided e2e tests locally on Linux by following these instructions.

Support

Users find on stackoverflow, slack and Google Group mailing list.

Stackoverflow

Stackoverflow is a great place for developers to help each other.

Search through existing questions to see if someone else has had the same issue as you.

If you have a new question, please [ask] the stackoverflow community. Include rules_k8s in the title and add [bazel] and [kubernetes] tags.

Google group mailing list

The general bazel support options links to the official bazel-discuss Google group mailing list.

Slack and IRC

Slack and IRC are great places for developers to chat with each other.

There is a #bazel channel in the kubernetes slack. Visit the kubernetes community page to find the slack.k8s.io invitation link.

There is also a #bazel channel on Freenode IRC, although we have found the slack channel more engaging.

Adopters

Here's a (non-exhaustive) list of companies that use rules_k8s in production. Don't see yours? You can add it in a PR!

More Repositories

1

bazel

a fast, scalable, multi-language and extensible build system
Java
22,451
star
2

starlark

Starlark Language
Starlark
2,242
star
3

bazelisk

A user-friendly launcher for Bazel.
Go
1,899
star
4

rules_go

Go rules for Bazel
Go
1,335
star
5

bazel-gazelle

Gazelle is a Bazel build file generator for Bazel projects. It natively supports Go and protobuf, and it may be extended to support new languages and custom rule sets.
Go
1,132
star
6

rules_docker

Rules for building and handling Docker images with Bazel
Starlark
1,062
star
7

buildtools

A bazel BUILD file formatter and editor
Go
975
star
8

examples

Examples for Bazel
Starlark
784
star
9

intellij

IntelliJ plugin for Bazel projects
Java
749
star
10

rules_nodejs

NodeJS toolchain for Bazel.
Starlark
719
star
11

rules_foreign_cc

Build rules for interfacing with "foreign" (non-Bazel) build systems (CMake, configure-make, GNU Make, boost, ninja, Meson)
Starlark
639
star
12

bazel-buildfarm

Bazel remote caching and execution service
Java
624
star
13

rules_rust

Rust rules for Bazel
Starlark
613
star
14

tulsi

An Xcode Project Generator For Bazel
Swift
547
star
15

rules_python

Bazel Python Rules
Starlark
500
star
16

rules_apple

Bazel rules to build apps for Apple platforms.
Starlark
477
star
17

bazel-watcher

Tools for building Bazel targets when source files change.
Go
414
star
18

sandboxfs

A virtual file system for sandboxing
Rust
367
star
19

bazel-skylib

Common useful functions and rules for Bazel
Starlark
366
star
20

rules_scala

Scala rules for Bazel
Starlark
354
star
21

rules_kotlin

Bazel rules for Kotlin
Kotlin
324
star
22

rules_jvm_external

Bazel rules to resolve, fetch and export Maven artifacts
Starlark
309
star
23

remote-apis

An API for caching and execution of actions on a remote system.
Starlark
300
star
24

rules_swift

Bazel rules to build Swift on Apple and Linux platforms
Starlark
298
star
25

rules_typescript

MOVED to https://github.com/bazelbuild/rules_nodejs/tree/3.x/third_party/github.com/bazelbuild/rules_typescript
TypeScript
275
star
26

continuous-integration

Bazel's Continuous Integration Setup
Python
249
star
27

vscode-bazel

Bazel support for Visual Studio Code
TypeScript
226
star
28

bazel-central-registry

The central registry of Bazel modules for the Bzlmod external dependency system.
Starlark
220
star
29

rules_pkg

Bazel rules for creating packages of many types (zip, tar, deb, rpm, ...)
Starlark
202
star
30

rules_dotnet

.NET rules for Bazel
Starlark
180
star
31

bazel-toolchains

Repository that hosts Bazel toolchain configs for remote execution and related support tools.
Go
179
star
32

rules_android

Android rules for Bazel
Starlark
174
star
33

rules_cc

C++ Rules for Bazel
Starlark
166
star
34

rules_proto

Protocol buffer rules for Bazel
Starlark
158
star
35

rules_closure

Closure rules for Bazel
Java
151
star
36

vim-bazel

Vim support for Bazel
Vim Script
138
star
37

platforms

Constraint values for specifying platforms and toolchains
Starlark
102
star
38

proposals

Index of all Bazel proposals and design documents
102
star
39

stardoc

Stardoc: Starlark Documentation Generator
Java
101
star
40

rules_webtesting

Bazel rules to allow testing against a browser with WebDriver.
Go
94
star
41

rules_fuzzing

Bazel Starlark extensions for defining fuzz tests in Bazel projects
Starlark
79
star
42

emacs-bazel-mode

Emacs mode for Bazel
Emacs Lisp
75
star
43

rules_license

Starlark
70
star
44

apple_support

Apple support for Bazel rules
Starlark
70
star
45

rules_jsonnet

Jsonnet rules for Bazel
Starlark
64
star
46

rules_java

Java rules for Bazel
Starlark
64
star
47

setup-bazelisk

Set up your GitHub Actions workflow with a specific version of Bazelisk
TypeScript
56
star
48

rules_sass

Sass rules for Bazel
Starlark
50
star
49

bazel-federation

Starlark
47
star
50

skydoc

Documentation generator for Skylark
Python
46
star
51

reclient

Go
46
star
52

remote-apis-sdks

This repository contains client libraries for the Remote Execution API https://github.com/bazelbuild/remote-apis
Go
45
star
53

migration-tooling

Migration tools for Bazel
Java
44
star
54

BUILD_file_generator

Generate BUILD files for your Java files
Java
39
star
55

codelabs

Shell
37
star
56

eclipse

Eclipse For Bazel (deprecated, see https://github.com/salesforce/bazel-eclipse instead)
Java
32
star
57

bazel-integration-testing

Framework for integration tests that call Bazel
Java
32
star
58

rules_android_ndk

Starlark
29
star
59

rules_appengine

AppEngine rules for Bazel
Starlark
29
star
60

tools_remote

Java
28
star
61

vim-ft-bzl

Vim Script
27
star
62

bazel-bench

Benchmarking tool for bazel
Python
26
star
63

tools_android

Tools for use with building Android apps with Bazel
Starlark
24
star
64

homebrew-tap

This repository contains a collection of Homebrew (aka, Brew) "formulae" for Bazel
24
star
65

rules_d

D rules for Bazel
Starlark
24
star
66

rules_perl

Perl rules for Bazel
Starlark
23
star
67

bzlmod

Go
20
star
68

bazel-blog

Content of the Bazel blog
HTML
19
star
69

rules_gwt

Bazel rules for GWT
Starlark
19
star
70

rules_testing

Starlark testing framework and utility libraries
Starlark
19
star
71

bazel-website

Website for Bazel, a fast, scalable, multi-language and extensible build system
HTML
17
star
72

bazelcon

Artifacts from BazelCon
15
star
73

java_tools

Python
12
star
74

rules_groovy

Groovy rules for Bazel
Starlark
11
star
75

rules_postcss

PostCSS rules for Bazel
Starlark
10
star
76

bazel_metrics

Python
7
star
77

community

Resources for community management efforts, such as SIGs
6
star
78

rules_angular

OBSOLETE see https://github.com/angular/angular/tree/master/packages/bazel
Python
5
star
79

gmaven_rules

This repository is deprecated. Please instead use https://github.com/bazelbuild/rules_jvm_external
Python
3
star
80

rules_platform

Starlark
3
star
81

rules_utp

Starlark
2
star
82

.allstar

1
star
83

.github

1
star