Bret Fisher 097e3df462 Merge in upstream refactor for multiplatform awesomesauce (#42)
* Changes stern to point to stern/stern

* ♻️ Update Stern to use stern/stern; get it from the GHCR image; update curl commands

* Update README to mention Bret's fork which supports ARM

* ♻️ Bump up versions and fix krew missing from PATH

Fixes #12

* Add alias k=kubectl + completion

Closes #11

* Update shpod.yaml

Remove `imagePullPolicy`; it will default to `Always` since we're using the `:latest` tag.

* ✏️  Change default editor (for kubectl edit) to vim

*  Update krew install URL

* ⚙️  Add GHA workflow to build+push to GHCR and Docker Hub

* 🏭️ Refactor Dockerfile to log as non-root

Multiple improvements here:
- start a shell with the k8s user instead of root
- when running without a tty, start an SSH server instead of a login shell
- move shell setup to bash_profile instead of Dockerfile
- add a helper script to set up tailhist
- add motd support

*  Add 'tree' and 'kustomize'

*  Upgrade to Compose v2 and add completion for a bunch of tools

* 🔧 Minor fixes and tweaks

*  Add regclient tools (regbot, regctl, regsync)

* 📃 Generate kubeconfig + update docs

*  Add kube-linter

* ♻️  Refactor Dockerfile to leverage BuildKit parallelism

* 🧹 Build httping instead of using a sketchy binary

* 🧹 Move jid version to an env var

* 🏭️ Rewrite Dockerfile to support multi-arch and cross-compilation

*  Add Docker CLI

* ♻️  Move version numbers to their individual build stage for better caching

* 🐞 Fix multi-arch support for krew

* 📃 Update documentation

*  Add crane, ngrok, and skopeo

*  Add yq and switch versions to ARG instead of ENV

Thanks @soulshake for the suggestion!

*  Update kubeseal

* 🐞 Fix kubeconfig download logic

*  Remove fftw (it's huge and doesn't bring much benefit to httping)

* 🐞 Tiny typo fix in motd

*  Add k9s; rollback kubeseal version

* 📃 Add info to install packages in motd

* ✂️  Remove skopeo (it's rarely used and it's juse one 'apk add' away)

*  Add iputils so that ping runs without sudo

* 🔑 Increase MaxAuthTries in SSH for folks with many keys

* push on pr

* auth on pr's

* only latest if on default branch

Co-authored-by: onlinejudge95 <onlinejudge95@gmail.com>
Co-authored-by: Jérôme Petazzoni <jerome.petazzoni@gmail.com>
2022-01-14 17:30:06 -05:00
2019-12-01 11:44:02 -06:00
2021-03-09 18:56:26 -05:00
2019-11-24 17:25:40 -05:00

shpod

GitHub Super-Linter Build and Push Image

TL,DR: curl https://k8smastery.com/shpod.sh | sh

If you are looking for an image that works on the ARM architecture (like the Raspberry Pi or the Apple M1), have a look at BretFisher/shpod instead. Bret's fork is also a state-of-the-art example of a multi-arch Dockerfile!

What's this?

shpod is a container image based on the Alpine distribution and embarking a bunch of tools useful when working with containers, Docker, and Kubernetes.

It includes:

  • ab (ApacheBench)
  • bash
  • crane
  • curl
  • Docker CLI
  • Docker Compose
  • git
  • Helm
  • jid
  • jq
  • kubectl
  • kubectx + kubens
  • kube-linter
  • kube-ps1
  • kubeseal
  • kustomize
  • ngrok
  • popeye
  • regctl
  • ship
  • skaffold
  • skopeo
  • SSH
  • stern
  • tilt
  • tmux
  • yq

It also includes completion for most of these tools.

Its goal is to provide a normalized environment, to go with the training materials at kubernetesmastery.com, so that you can get all the tools you need regardless of your exact Kubernetes setup.

To use it, you need a Kubernetes cluster. You can use Minikube, microk8s, Docker Desktop, AKS, EKS, GKE, anything you like, really.

If it runs with a pseudo-terminal, it will spawn a shell, and you can attach to that shell. If it runs without a pseudo-terminal, it will start an SSH server, and you can connect to that SSH server to obtain the shell.

Using with a pseudo-terminal

Run it in a Pod and attach directly to it:

kubectl run shpod --restart=Never --rm -it --image=bretfisher/shpod

This should give you a shell in a pod, with all the tools installed. Most Kubernetes commands won't work (you will get permission errors) until you create an appropriate RoleBinding or ClusterRoleBinding (see below for details).

Using without a pseudo-terminal

Run as a Pod (or Deployment), then expose (or port-forward) to port 22 in that Pod, and connect with an SSH client:

kubectl run shpod --image=bretfisher/shpod
kubectl wait pod shpod --for=condition=ready
kubectl port-forward pod/shpod 2222:22
ssh -l k8s -p 2222 localhost # the default password is "k8s"

Note: you can change the password by setting the PASSWORD environment variable.

Granting permissions

By default, shpod uses the ServiceAccount of the Pod that it's running in; and by default (on most clusters) that ServiceAccount won't have much permissions, meaning that you will get errors like the following one:

$ kubectl get pods
Error from server (Forbidden): pods is forbidden: User "system:serviceaccount:default:default" cannot list resource "pods" in API group "" in the namespace "default"

If you want to use Kubernetes commands within shpod, you need to give permissions to that ServiceAccount.

Assuming that you are running shpod in the default namespace and with the default ServiceAccount, you can run the following command to give cluster-admin privileges (=all privileges) to the commands running in shpod:

kubectl create clusterrolebinding shpod \
        --clusterrole=shpod \
        --serviceaccount=default:default

You can also use the one-liner below.

One-liner usage

The shpod.sh script will:

  • apply the shpod.yaml manifest to your cluster,
  • wait for the pod shpod to be ready,
  • attach to that pod,
  • delete resources created by the manifest when you exit the pod.

The manifest will:

  • create the shpod Namespace,
  • create the shpod ServiceAccount in that Namespace,
  • create the shpod ClusterRoleBinding giving cluster-admin privileges to that ServiceAccount,
  • create a Pod named shpod, using that ServiceAccount, with a terminal (so that you can attach to that Pod and get a shell).

To execute it:

curl https://k8smastery.com/shpod.sh | sh

If you don't like curl|sh, and/or if you want to execute things step by step, check the next section.

Step-by-step usage

  1. Deploy the shpod pod:

    kubectl apply -f https://k8smastery.com/shpod.yaml
    
  2. Attach to the shpod pod:

    kubectl attach --namespace=shpod -ti shpod
    
  3. Enjoy!

Clean up

If you are using the shell script above, when you exit shpod, the script will delete the resources that were created.

If you want to delete the resources manually, you can use kubectl delete -f shpod.yaml, or delete the namespace shpod and the ClusterRoleBinding with the same name:

kubectl delete clusterrolebinding,ns shpod

Internal details

The YAML file is a Kubernetes manifest for a Pod, a ServiceAccount, a ClusterRoleBinding, and a Namespace to hold the Pod and ServiceAccount.

The Pod uses image bretfisher/shpod on the Docker Hub, built from this repository github.com/bretfisher/shpod.

Opening multiple sessions

Shpod tries to detect if it is already running; and if it's the case, it will try to start another process using kubectl exec. Note that if the first shpod process exits, Kubernetes will terminate all the other processes.

Thanks to @jpetazzo for this great open source

Special handling of kubeconfig

If you have a ConfigMap named kubeconfig in the Namespace where shpod is running, it will extract the first file from that ConfigMap and use it to populate ~/.kube/config.

This lets you inject a custom kubeconfig file into shpod.

Support for other architectures

As of November 2021, the Dockerfile in this repository should be able to build images for other architectures. However, when trying to install a compiled binary that is not available for another architecture, a dummy placeholder will be installed instead.

Description
Container image to get a consistent training environment to work on Kubernetes
Readme 278 KiB
Languages
Dockerfile 54.9%
Shell 44.6%
Vim Script 0.5%