Security News
PyPI’s New Archival Feature Closes a Major Security Gap
PyPI now allows maintainers to archive projects, improving security and helping users make informed decisions about their dependencies.
github.com/replicatedhq/ship
Kots provides the core functionality of Ship, but with a different architecture. While Ship will continue to be supported, it is no longer under active development.
Replicated Ship is a Kubernetes app deployment and automation tool that can:
Read on for more details on Ship features and objectives, or skip ahead to getting started.
Ship enables cluster operators to automatically stay in sync with upstream changes while preserving their custom configurations and extensions (adds, deletes and edits) without git merge conflicts. This is possible because of how the three operating modes of Ship invoke, store and apply Kustomizations, a type of Kubernetes specific patch, produced by a cluster operator.
Ship exposes the power of Kustomize as an advanced custom configuration management tool for Helm charts, Kubernetes manifests and Knative applications. The easy-to-use UI of Ship (launched via ship init
) calculates the minimal patch YAML required to build an overlay and previews the diff that will be the result of applying the drafted overlay.
Additionally, the unfork
command can migrate forked manifests and environment versions to Kustomize.
The output of the init
and unfork
modes will result in the creation of a directory that includes the finalized overlay YAML files, a kustomization.yaml and a Ship state.json.
Configuration workflow ship.yaml
files can be included in Kubernetes manifest or Helm chart repos, to customize the initial ship init
experience. See Customizing the Configuration Experience for more details or check out the examples in the github.com/shipapps org.
Ship is packaged as a single binary, and Linux and MacOS versions are distributed:
curl -sSL https://github.com/replicatedhq/ship/releases/download/v0.51.2/ship_0.51.2_linux_amd64.tar.gz | tar zxv && sudo mv ship /usr/local/bin
curl -sSL https://github.com/replicatedhq/ship/releases/download/v0.51.2/ship_0.51.2_darwin_amd64.tar.gz | tar zxv && sudo mv ship /usr/local/bin
brew install ship
Alternately, you can run Ship in Docker, in which case you can pull the latest ship image with:
docker pull replicated/ship
After Ship is installed, create a directory for the application you'll be managing with Ship, and launch Ship from there, specifying an upstream Helm chart or Kubernetes yaml:
mkdir -p ~/my-ship/example
cd ~/my-ship/example
ship init <path-to-chart> # github.com/helm/charts/tree/master/stable/grafana
Alternately, the same command run through Docker:
mkdir -p ~/my-ship/example
cd ~/my-ship/example
docker run -p 8800:8800 -v "$PWD":/wd -w /wd \
replicated/ship init <path-to-chart> # github.com/helm/charts/tree/master/stable/grafana
Note: you may need to point your browser to http://127.0.0.1:8800 if ship's suggested localhost URL doesn't resolve.
You'll be prompted to open a browser and walk through the steps to configure site-specific values for your installation, updating Helm values (if it's a chart), and making direct edits to the Kubernetes yaml (or Helm-generated yaml), which will be converted to patches to apply via Kustomize.
After completing the guided 'ship init' workflow, you'll see that Ship has generated several directories and files within the current working directory.
├── .ship
│ └── state.json
├── base
│ ├── clusterrole.yaml
│ ├── ...
│ └── serviceaccount.yaml
├── overlays
│ └── ship
│ └── kustomization.yaml
└── rendered.yaml
.ship/state.json
- maintains all the configuration decisions made within the ship init
flow, including the path to the upstream, the upstream's original values.yaml
, any modifications made to values.yaml
, and any patch directives configured in the Kustomize phase.
The base/
and overlays/
folders contain the various files that drive the Kustomization process.
The rendered.yaml
file is the final output, suitable to deploy to your Kubernetes cluster via
kubectl apply -f rendered.yaml
If you need to revise any of the configuration details, you can re-invoke ship init <path-to-chart>
to start fresh, or ship update --headed
to walk through the configuration steps again, starting with your previously entered values & patches as a baseline.
Prepares a new application for deployment. Use for:
Polls an upstream source, blocking until any change has been published. Use for:
Updates an existing application by merging the latest release with the local state and overlays. Use for:
Another initialization option is to start with a Helm chart or Kubernetes manifest that has been forked from an upstream source, and to "unfork" it.
ship unfork <path-to-forked> --upstream <path-to-upstream>
or
docker run -v "$PWD":/wd -w /wd \
replicated/ship unfork <path-to-forked> \
--upstream <path-to-upstream>
With this workflow, Ship will attempt to move the changes that prompted the fork into 'overlays' that can be applied as patches onto the unmodified upstream base. You can inspect the rendered.yaml
to verify the final output, or run through ship update --headed
to review the generated overlays in the Ship admin console.
Once you've prepared an application using ship init
, a simple starting CI/CD workflow could be:
ship watch && ship update
or
docker run -v "$PWD":/wd -w /wd replicated/ship watch && \
docker run -v "$PWD":/wd -w /wd replicated/ship update
The watch
command is a trigger for CI/CD processes, watching the upstream application for changes. Running ship watch
will load the local state file (which includes a content hash of the most recently used upstream) and periodically poll the upstream application and exit when it finds a change. ship update
will regenerate the deployable application assets, using the most recent upstream version of the application, and any local configuration from state.json
. The new rendered.yaml
output can be deployed directly to the cluster, or submitted as a pull request into a GitOps repo.
With chart repo you have commit privileges on, you, you can see this flow in action by running ship init <path-to-chart>
and going through the workflow, then ship watch --interval 10s && ship update
to start polling, then commit a change to the upstream chart and see the ship watch
process exit, with rendered.yaml
updated to reflect the change.
Maintainers of OTS (Off the Shelf) software can customize the ship init
experience by including a ship.yaml
manifest alongside a Helm Chart or Kubernetes manifest. The Replicated Ship YAML format allows further customization of the installation process, including infrastructure automation steps to spin up and configure clusters to deploy to. (If you're wondering about some of the more obscure Ship CLI option flags, these mostly apply to ship.yaml features)
For those not interested in operating and maintaining a fleet of Ship instances, Ship Cloud is available as a hosted solution for free. With Ship Cloud, teams can collaborate and manage multiple OTS Kubernetes application settings in one place, with Ship watching and updating on any upstream or local configuration changes, and creating Pull Requests and other integrations into CI/CD systems.
For instructions for building the project and making contributions, see Contributing.
For questions about using Ship, there's a Replicated Community forum, and a #kots channel in Kubernetes Slack.
For bug reports, please open an issue in this repo.
FAQs
Unknown package
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
PyPI now allows maintainers to archive projects, improving security and helping users make informed decisions about their dependencies.
Research
Security News
Malicious npm package postcss-optimizer delivers BeaverTail malware, targeting developer systems; similarities to past campaigns suggest a North Korean connection.
Security News
CISA's KEV data is now on GitHub, offering easier access, API integration, commit history tracking, and automated updates for security teams and researchers.