# rules_k8s **Repository Path**: mirrors_atlassian/rules_k8s ## Basic Information - **Project Name**: rules_k8s - **Description**: No description available - **Primary Language**: Unknown - **License**: Apache-2.0 - **Default Branch**: master - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 0 - **Created**: 2020-08-08 - **Last Updated**: 2026-01-24 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README # Bazel Kubernetes Rules Travis CI | Bazel CI :---: | :---: [![Build Status](https://travis-ci.org/bazelbuild/rules_k8s.svg?branch=master)](https://travis-ci.org/bazelbuild/rules_k8s) | [![Build status](https://badge.buildkite.com/4eafd3b619b9febae679bac4ce75b6b74643d48384e7f36eeb.svg)](https://buildkite.com/bazel/k8s-rules-k8s-postsubmit) ## Rules * [k8s_defaults](#k8s_defaults) * [k8s_object](#k8s_object) * [k8s_objects](#k8s_objects) ## Overview This repository contains rules for interacting with Kubernetes configurations / clusters. ## Setup Add the following to your `WORKSPACE` file to add the necessary external dependencies: ```python git_repository( name = "io_bazel_rules_docker", commit = "{HEAD}", remote = "https://github.com/bazelbuild/rules_docker.git", ) load( "@io_bazel_rules_docker//container:container.bzl", container_repositories = "repositories", ) container_repositories() # This requires rules_docker to be fully instantiated before # it is pulled in. git_repository( name = "io_bazel_rules_k8s", commit = "{HEAD}", remote = "https://github.com/bazelbuild/rules_k8s.git", ) load("@io_bazel_rules_k8s//k8s:k8s.bzl", "k8s_repositories") k8s_repositories() ``` ## Kubernetes Authentication As is somewhat standard for Bazel, the expectation is that the `kubectl` toolchain is preconfigured to authenticate with any clusters you might interact with. For more information on how to configure `kubectl` authentication, see the Kubernetes [documentation](https://kubernetes.io/docs/admin/authentication/). ### Container Engine Authentication For Google Container Engine (GKE), the `gcloud` CLI provides a [simple command](https://cloud.google.com/sdk/gcloud/reference/container/clusters/get-credentials) for setting up authentication: ```shell gcloud container clusters get-credentials ``` ## Dependencies The rules will require the `kubectl` tool when executing the `run` action from bazel. If GKE is used, also the `gcloud` sdk need to be installed. ## Examples ### Basic "deployment" objects ```python load("@io_bazel_rules_k8s//k8s:object.bzl", "k8s_object") k8s_object( name = "dev", kind = "deployment", # A template of a Kubernetes Deployment object yaml. template = ":deployment.yaml", # An optional collection of docker_build images to publish # when this target is bazel run. The digest of the published # image is substituted as a part of the resolution process. images = { "gcr.io/rules_k8s/server:dev": "//server:image" }, ) ``` ### Aliasing (e.g. `k8s_deploy`) In your `WORKSPACE` you can set up aliases for a more readable short-hand: ```python load("@io_bazel_rules_k8s//k8s:k8s.bzl", "k8s_defaults") k8s_defaults( # This becomes the name of the @repository and the rule # you will import in your BUILD files. name = "k8s_deploy", kind = "deployment", # This is the name of the cluster as it appears in: # kubectl config current-context cluster = "my-gke-cluster", ) ``` Then in place of the above, you can use the following in your `BUILD` file: ```python load("@k8s_deploy//:defaults.bzl", "k8s_deploy") k8s_deploy( name = "dev", template = ":deployment.yaml", images = { "gcr.io/rules_k8s/server:dev": "//server:image" }, ) ``` Note that in `load("@k8s_deploy//:defaults.bzl", "k8s_deploy")` both `k8s_deploy`'s are references to the `name` parameter passed to `k8s_defaults`. If you change `name = "k8s_deploy"` to something else, you will need to change the `load` statement in both places. ### Multi-Object Actions It is common practice in the Kubernetes world to have multiple objects that comprise an application. There are two main ways that we support interacting with these kinds of objects. The first is to simply use a template file that contains your N objects delimited with `---`, and omitting `kind="..."`. The second is through the use of `k8s_objects`, which aggregates N `k8s_object` rules: ```python # Note the plurality of "objects" here. load("@io_bazel_rules_k8s//k8s:objects.bzl", "k8s_objects") k8s_objects( name = "deployments", objects = [ ":foo-deployment", ":bar-deployment", ":baz-deployment", ] ) k8s_objects( name = "services", objects = [ ":foo-service", ":bar-service", ":baz-service", ] ) # These rules can be nested k8s_objects( name = "everything", objects = [ ":deployments", ":services", ":configmaps", ":ingress", ] ) ``` This can be useful when you want to be able to stand up a full environment, which includes resources that are expensive to recreate (e.g. LoadBalancer), but still want to be able to quickly iterate on parts of your application. ### Developer Environments A common practice to avoid clobbering other users is to do your development against an isolated environment. Two practices are fairly common-place. 1. Individual development clusters 1. Development "namespaces" To support these scenarios, the rules support using "stamping" variables to customize these arguments to `k8s_defaults` or `k8s_object`. For per-developer clusters, you might use: ```python k8s_defaults( name = "k8s_dev_deploy", kind = "deployment", cluster = "gke_dev-proj_us-central5-z_{BUILD_USER}", ) ``` For per-developer namespaces, you might use: ```python k8s_defaults( name = "k8s_dev_deploy", kind = "deployment", cluster = "shared-cluster", namespace = "{BUILD_USER}", ) ``` You can customize the stamp variables that are available at a repository level by leveraging `--workspace_status_command`. One pattern for this is to check in the following: ```shell $ cat .bazelrc build --workspace_status_command=./print-workspace-status.sh $ cat print-workspace-status.sh cat < ## k8s_object ```python k8s_object(name, kind, template) ``` A rule for interacting with Kubernetes objects.
Attributes
name

Name, required

Unique name for this rule.

kind

Kind, required

The kind of the Kubernetes object in the yaml.

If this is omitted, the create, replace, delete, describe actions will not exist.

cluster

string, optional

The name of the cluster to which create, replace, delete, describe should speak.

If this is omitted, the create, replace, delete, describe actions will not exist.

namespace

string, optional

The namespace on the cluster within which the actions are performed.

If this is omitted, it will default to the value specified in the template or if also unspecified there, to the value "default".

template

yaml or json file; required

The yaml or json for a Kubernetes object.

images

string to label dictionary; required

When this target is bazel run the images referenced by label will be published to the tag key.

The published digests of these images will be substituted directly, so as to avoid a race in the resolution process

image_chroot

string, optional

The repository under which to actually publish Docker images.

## k8s_objects ```python k8s_objects(name, objects) ``` A rule for interacting with multiple Kubernetes objects.
Attributes
name

Name, required

Unique name for this rule.

objects

Label list; required

The list of objects on which actions are taken.

When bazel run this target resolves each of the object targets which includes publishing their associated images, and will print a --- delimited yaml.

## k8s_defaults ```python k8s_defaults(name, kind) ``` A repository rule that allows users to alias `k8s_object` with default values.
Attributes
name

Name, required

The name of the repository that this rule will create.

Also the name of rule imported from @name//:defaults.bzl

kind

Kind, optional

The kind of objects the alias of k8s_object handles.

cluster

string, optional

The name of the cluster to which create, replace, delete, describe should speak.

This should match the cluster name as it would appear in kubectl config current-context

namespace

string, optional

The namespace on the cluster within which the actions are performed.

image_chroot

string, optional

The repository under which to actually publish Docker images.

resolver

target, optional

A build target for the binary that's called to resolves references inside the Kubernetes YAML files.