Note
If you are migrating from v.0.3 to v.0.4, you can use the confix
command to
migrate your config. See the ConFix section for more details.
Update container image references in git repositories, based on recieved events.
Kobold is meant to be used as a companion to other gitops tools, like ArgoCD or Flux. It keeps image references in your gitops repos up to date, while delegating the actual deployment to your gitops tool of choice.
Typically you would configure your container registry to send events to kobolds webhook endpoint, whenever a new image is pushed.
In servermode Kobold exposes a webhook endpoint at
$KOBOLD_ADDR_WEBHOOK/events/<channel>
. The channel is used to identify the
pipelines to run. It accepts any content in the body since it is the channels
decoder's responsibility to parse the body.
For example below is a request to a channel using the plain lines decoder.
POST /events/plain HTTP/1.1
Host: kobold.myorg.io:8080
docker.io/library/busybox:v1.4@sha256:220611111e8c9bbe242e9dc1367c0fa89eef83f26203ee3f7c3764046e02b248
Kobold uses special inline comments in yaml files, to identify image references that should be updated. It will match the reference from the incoming event, against the rules in the comment, and update the reference if a match is found.
apiVersion: v1
kind: Pod
metadata:
name: my-pod
spec:
containers:
- name: my-app
image: my.org/amazing/app # kobold: tag: ^1; type: semver
The comments parsed by kobold have the following format:
# kobold: tag: <tag-name>; type: <tag-type>
The tag-type can be either exact
, semver
, or regex
, and specifies how
kobold should interpret the tag-name.
For example, if tag-type is semver, the tag-name can include common semantic versioning semantics, such as ^1 to denote that any tag between v1 and v2 should be matched (not including v2).
Note that the regex type will add ^
and $
to the tag-name, to ensure the
regex matches the entire tag, so dont include them in the tag-name.
It is also possible to update only a part of a given image reference. For
example it is common for helm charts to split the reference across field, like
repo
and tag
.
image:
tag: "1.0" # kobold: tag: ^1; type: semver; part: tag; context: docker.io/library/busybox
---
In this case, the part
field specifies the part of the image reference to be
updated, and the context
field specifies the image reference to be updated.
Next to tag
, digest
and tag+digest
, are also supported.
Kobold is configured by setting up named channels, and pipelines to run whenever a message is recieved on a channel. The pipeline will clone the repo, and run a krm filter, before potentially pushing the changes back to the repo.
In the below example, the example
pipeline is run, whenever a message is
recieved on the a
or b
channel.
version = "2"
[[channel]]
name = "a"
[[channel]]
name = "b"
[[pipeline]]
name = "example"
repo_uri = "git@github.com:bluebrown/example.git?ref=main"
channels = ["a", "b"]
Messages received on a channel have to be decoded, before they can be processed by the pipeline. By default, each line in a message is treated as a fully qualified image reference. You can change this behaviour by providing a decoder in the channel config. See the builtin section for more details.
[[channel]]
name = "example"
decoder = "builtin.distribution@v1"
Optionally, you can set a destination branch, to push the changes to. If you dont set a destination branch, the changes will be pushed to the source branch.
[[pipeline]]
name = "example"
dest_branch = "release"
If you want to perform an action after the changes have been pushed to git, you can attach a post hook to the pipeline. See the builtin section for more details.
[[pipeline]]
name = "example"
post_hook = "builtin.github-pr@v1"
Pipelines are scoped through the following URI format. Note the package is optional.
<repo>?ref=<ref>[&pkg=<pkg>]
If you want to scope a pipline beyond a sub directory (package), you can place a .krmignore file at the package root, ignoring parts of the package.
ignoreFilesMatcher handles
.krmignore
files, which allows for ignoring files or folders in a package. The format of this file is a subset of the gitignore format, with recursive patterns (like a/**/c) not supported. If a file or folder matches any of the patterns in the .krmignore file for the package, it will be excluded.
For example, you have a helm like below, and want to ignore its template directory:
. (package root)
├── charts
│ ├── my-chart
│ └── .krmignore
└── pod.yaml
Then you would place the following in the charts/.krmignore
file:
/*/charts/
/*/templates/
This works because the presense of a .krmignore
makes the direcotry,
containing the file, a sub package, and kobold will recurse into it.
There are a few builtin decoders and post hooks, to support some common use cases. For example decoding events from a oci distribution registry, or opening a pull request on github.
The starlark code for the builtins can be reviewed in the builtin directory.
The lines reads lines of image references:
docker.io/bluebrown/busybox:v1.3@sha256:220611111e8c9bbe242e9dc1367c0fa89eef83f26203ee3f7c3764046e02b248
test.azurecr.io/nginx:v1.1.1@sha256:220611111e8c9bbe242e9dc1367c0fa89eef83f26203ee3f7c3764046e02b248
The distribution decoder parses a json message using the schema defined in https://github.com/distribution/distribution.
It understands single events:
{
"request": { "host": "example.azurecr.io" },
"target": {
"digest": "sha256:xxxxd5c8786bb9e621a45ece0dbxxxx1cdc624ad20da9fe62e9d25490f33xxxx",
"repository": "bluebrown/busybox",
"tag": "v1"
}
}
Or wrapped in an envelope:
{"events": [{"..."}]}
The dockerhub decoder parses a json message using the schema defined in https://docs.docker.com/docker-hub/webhooks/#push-event.
{
"push_data": {
"tag": "v1"
},
"repository": {
"repo_name": "bluebrown/busybox"
}
}
Warning
Since dockerhub does not set the image digest in the payload, kobold will update only the tag of matched image references. This will not work as expected when pusing the same tag repeatedly.
Performs a github pull request. It requires the GITHUB_TOKEN
environment
variable to be set.
Performs a azure devops pull request. It requires the ADO_USR
and ADO_PAT
environment variables to be set.
Performs a gitea pull request. It requires theGITEA_HOST
and
GITEA_AUTH_HEADER
environment variable to be set.
Kobold is designed to be extended. You can write your own decoders and post hooks.
For example, below is the builtin lines decoder. It simply splits the message recieved on the channel by newlines, and returns the resulting list. Treating each line as a fully qalified image reference.
[[decoder]]
name = "builtin.lines@v1"
script = """
def main(input):
return input.split("\n")
"""
This post hook does nothing, but print the message to stdout.
[[post_hook]]
name = "builtin.print@v1"
script = """
def main(repo, src_branch, dest_branch, title, body, changes, warnings):
print(repo, src_branch, dest_branch, title, body, changes, warnings)
"""
This allows to integrate with any event producer and any git provider, since producer and provider specific logic can be implemented in starlark.
Kobold uses the git command line tool to interact with git. That means you can
configure the underlying git client directly and according to gits
documentation. For example you can mount a file to /.gitconfig
in the kobold
container, or set git specific environment variables.
This section showcases some common use cases.
To use ssh, you can mount a directory to /etc/kobold/.ssh
in the kobold container.
The directory should, at least contain, a known_hosts file and a default identity file. The default identity file is usually named id_rsa. If more than one key is required, you can place a config file in the .ssh directory, and configure the identity file for each host.
# this dir will be mounted
mkdir -p .ssh
# scan your git providers host key
ssh-keyscan github.com > .ssh/known_hosts
# generate a key (dont forget to add it to your git provider)
ssh-keygen -t ed25519 -f .ssh/id_ed25519 -N ''
# set the permission to the kobold user
chown -R 65532:65532 .ssh
# run kobold
docker run -v "$(pwd)/.ssh:/etc/kobold/.ssh" ...
You can provide the credentials in the git uri, but this is not recommended, since it will be stored in the kobold database.
Alternatively, you can configure gits credentails helper, to use a file as
backend. For example via /etc/kobold/.gitconfig
:
[credential]
helper = store --file ~/.git-credentials
When doing this, you can mount a credentials file to
/etc/kobold/.git-credentials
in the kobold container.
Below is an example entry in the credentials file:
https://bob:s3cre7@mygithost
For a pull request setup, you want to set the destination branch to something
other than the source branch. Then you can run a post hook, opening the pull
request. There is already, amongst others, a builtin post hook
for github, using the GITHUB_TOKEN
environment variable, to authenticate.
[[pipeline]]
name = "my-github-pr"
channels = ["example"]
repo_uri = "git@github.com:bluebrown/foobar.git?ref=main&pkg=manifests"
dest_branch = "kobold"
post_hook = "builtin.github-pr@v1"
The below example uses package scoping, to perform different actions based on the environment. For stage, the updated image ref is directly applied to the cluster. For prod, a pull request is opened, and the image ref is updated after the pull request is merged.
[[pipeline]]
name = "stage"
channels = ["distribution"]
repo_uri = "http://gitea/dev/test.git?ref=main&pkg=stage"
[[pipeline]]
name = "prod"
channels = ["distribution"]
repo_uri = "http://gitea/dev/test.git?ref=main&pkg=prod"
dest_branch = "release"
post_hook = "builtin.gitea-pr@v1"
Note
You can use flags or environment variables to customize the kobold deployment. See the server synopsis for more info.
The kobold manifests come with a few secrets and config maps intended to be overwritten by the user. They are mostly empty by default, but mounted to the right location, so any values provided will be picked up.
Resources | Description | Mount Location |
---|---|---|
configmap/kobold-confd | multiple .toml files containing kobold configs | /etc/kobold/conf.d |
configmap/kobold-gitconfig | .gitconfig key containing the git config |
/etc/kobold/.gitconfig |
secret/kobold-gitcreds | .git-credentials key containing the git credentials |
/etc/kobold/.git-credentials |
secret/kobold-ssh | arbitrary keys representing the contents of .ssh |
/etc/kobold/.ssh |
secret/kobold-env | arbitrary environment variables | used as env vars |
You can use kustomize to merge your own configs into the kobold manifests. For example:
apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization
resources:
- https://github.com/bluebrown/kobold/releases/latest/download/kobold-manifests.yaml
configMapGenerator:
- name: kobold-confd
behavior: merge
files:
- team-a.toml
- team-b.toml
secretGenerator:
- name: kobold-env
behavior: merge
literals:
- GITHUB_TOKEN=xxx
Warning
Kobold has not built in security mechanism. If you are planning to expose kobold via ingress, you should secure these endpoints via ingress controller.
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: kobold-ingress
annotations:
# https://kubernetes.github.io/ingress-nginx/examples/auth/basic/
nginx.ingress.kubernetes.io/auth-type: basic
nginx.ingress.kubernetes.io/auth-secret: kobold-basic-auth
nginx.ingress.kubernetes.io/auth-realm: Authentication Required
spec:
ingressClassName: nginx
rules:
- host: kobold.myorg.dev
http:
paths:
- path: /events/<mychannel>
pathType: Exact
backend:
service:
name: kobold-webhook
port:
number: 80
# Caution! Exposing this endpoint
# should not be required in most cases.
# Do it only for a good reason.
- path: /
pathType: Prefix
backend:
service:
name: kobold-api
port:
number: 80
Kobold exposes prometheus metrics on the $KOBOLD_ADDR_API/metrics
endpoint.
The metrics are prefixed with kobold_
.
# HELP kobold_git_fetch_total number of git fetches
# TYPE kobold_git_fetch_total counter
kobold_git_fetch_total{repo="git@github.com:bluebrown/foobar"} 3
kobold_git_fetch_total{repo="git@ssh.dev.azure.com:v3/myorg/myproject/kobold-test"} 3
# HELP kobold_git_push_total number of git pushes
# TYPE kobold_git_push_total counter
kobold_git_push_total{repo="git@github.com:bluebrown/foobar"} 4
# HELP kobold_image_seen_total number of images seen
# TYPE kobold_image_seen_total counter
kobold_image_seen_total{ref="library/busybox"} 5
# HELP kobold_msg_recv_total number of messages received
# TYPE kobold_msg_recv_total counter
kobold_msg_recv_total{channel="dockerhub",rejected="false"} 5
# HELP kobold_run_active number of active runs
# TYPE kobold_run_active gauge
kobold_run_active 0
# HELP kobold_run_status_total run status (task groups)
# TYPE kobold_run_status_total counter
kobold_run_status_total{repo="git@github.com:bluebrown/foobar",status="success"} 6
kobold_run_status_total{repo="git@ssh.dev.azure.com:v3/myorg/myproject/kobold-test",status="success"} 3
In server mode, kobold exposes a json over http api. The api docs are available
at $KOBOLD_ADDR_API/api/docs/
. Note the trailing slash.
Kobold uses sqlite3 as a database. You can interact with the database using the sqlite cli, built into the kobold container.
# inspect the db of a running kobold server
docker exec -ti my-kobold sqlite3 ~/.config/kobold.db
# inspect local db files
docker run -ti -v "$HOME/.config/kobold:/tmp" bluebrown/kobold sqlite3 /tmp/kobold.db
If you want to use your own sqlite binary, make sure that you have the uuid
and sha1
extensions enabled.
GOBIN="$(pwd)/bin" go install ./cmd/...
The server is the main kobold binary. It runs a webhook server, decoding and emitting events received on an http endpoint. Decoded events are sheduled and processed in groups after a debounce period. This ensures the minimum amount of git operations are performed.
bin/server
Usage of server:
-addr-api string
api listen address (env: KOBOLD_ADDR_API) (default ":9090")
-addr-webhook string
webhook listen address (env: KOBOLD_ADDR_WEBHOOK) (default ":8080")
-confd string
path to config dir (env: KOBOLD_CONFD)
-config string
path to config file (env: KOBOLD_CONFIG)
-db string
path to sqlite db file (env: KOBOLD_DB) (default "~/.config/kobold/kobold.sqlite3")
-debounce duration
debounce interval for webhook events (env: KOBOLD_DEBOUNCE) (default 1m0s)
-handler value
task handler, one of: print, kobold, error (env: KOBOLD_HANDLER)
-logfmt string
log format, one of: json, text (env: KOBOLD_LOGFMT) (default "json")
-loglvl int
log level (env: KOBOLD_LOGLVL)
-maxprocs int
max number of concurrent runs (env: KOBOLD_MAXPROCS) (default 10)
-prefix string
prefix for all routes, must NOT contain trailing slash (env: KOBOLD_PREFIX)
The CLI, reads messages from stdin. One message per line. The messages are treated according to the kobold.toml. The same way they would in the server binary.
The difference is, that the cli will not wrap the pool in the scheduler, meaning the task will run immedaitly after grouping them. The cli will exit after all messages have been processed.
bin/cli -channel default -handler print < testdata/events.txt
The image-ref-updater
command is kobolds business logic, as a standalone krm
filter, that can be used by other tools like kpt or kustomize.
It will update image references in the provided resources list. Image
references to match against, are read from the functionConfig
, which has the
following format:
apiVersion: kobold/v1alpha3
kind: List
metadata:
name: my-fn-config
items:
- docker.io/bluebrown/busybox:latest@sha256:220611111e8c9bbe242e9dc1367c0fa89eef83f26203ee3f7c3764046e02b248
- test.azurecr.io/nginx:v1@sha256:993518ca49ede3c4e751fe799837ede16e60bc410452e3922602ebceda9b4c73
The confix command can be used to help with migrating the configration to a newer version. Incremental updates be required as the binrary only knows the last versions config.
bin/confix -w -f kobold.toml
The above command reads a file and writes the converted format to back to the
file, due to the -w
flag. The -f
flag is used to specify the file to read.
You can start a local kind cluster for an end to end setp. The gitea page can
be viewed at http://localhost:8080 with the credentials dev:dev123
.
make e2e
docker tag $(docker pull busybox -q) localhost:8080/library/busybox:v1.2.3
docker push localhost:8080/library/busybox:v1.2.3