1
0
Fork 0
salty-dog/docs/getting-started.md

16 KiB

Getting Started With salty-dog

Contents

Installing & Running

You can run salty-dog from a container or install it as an npm package. The container is the recommended method and comes complete with the recommended version of node and default rules.

# to print the CLI help
> podman run --rm docker.io/ssube/salty-dog:master --help

Usage: salty-dog <mode> [options]

Commands:
...

# to list the included rules
> podman run --entrypoint sh --rm docker.io/ssube/salty-dog:master -c 'ls /salty-dog/rules'

ansible.yml
gitlab-ci.yml
grafana.yml
...

You can create an alias for this container and mount the current working directory:

> alias salty-dog='podman run --rm -v "${PWD}:${PWD}:ro" -w "${PWD}" docker.io/ssube/salty-dog:master'

Note: using volumes with Podman on MacOS requires an SSHFS mount.

You can also create your own container FROM docker.io/ssube/salty-dog in order to include your own rules or install additional modules.

Container images are available for each branch and release tag. When using the container for CI, you do not need to install NodeJS elsewhere, and should pin your image reference to a specific tag - tools like RenovateBot can automatically update those tags in a testable way.

Installing npm Package

The npm package installs a binary command, which can be called as yarn salty-dog within the installing project, and exports most of the symbols for usage as a library.

> yarn add -D salty-dog

Unless you want to ship salty-dog as a production library without bundling, it should typically be installed as a development dependency.

Import the main module using:

import { main } from 'salty-dog/app';

Installing as a global package is not recommended, since it makes managing versions difficult and updates will effect multiple projects.

Using Within Gitlab CI

Using the Docker or Kubernetes executors, you should define a job using the latest image tag and run salty-dog as a global command:

validate:
  image: docker.io/ssube/salty-dog:v0.9.1
  script:
    - salty-dog --rules /salty-dog/rules/kubernetes.yml --tag kubernetes --source ${CI_PROJECT_DIR}/file-to-validate.yml 2> >(bunyan)

Redirecting standard error through bunyan will pretty-print the logs, while leaving the output as plain YAML:

[2022-04-24T22:31:15.189Z]  INFO: salty-dog/23 on 71f0bb07fa7e: rule passed (rule=salty-dog-rule)
[2022-04-24T22:31:15.189Z]  INFO: salty-dog/23 on 71f0bb07fa7e: rule passed (rule=salty-dog-rule)
[2022-04-24T22:31:15.200Z]  INFO: salty-dog/23 on 71f0bb07fa7e: rule passed (rule=salty-dog-source)
[2022-04-24T22:31:15.200Z]  INFO: salty-dog/23 on 71f0bb07fa7e: all rules passed
name: salty-dog-meta
definitions:
  log-level:
    type: string

Loading Rules

Like many lint tools, salty-dog checks your documents against a set of rules. Each rule uses a different schema, and may only check sub-paths within the document. Rules have a brief name used in the logs, a friendly description meant for people, a severity level, and some tags. You can easily include a group of related rules by giving them the same tag.

Rules can be loaded from YAML files or node modules, but most rules will come from a file and contain a JSON schema, used to validate part or all of the source document. Rule files can also be loaded from a directory.

# load a single file
> salty-dog --rules /salty-dog/rules/kubernetes.yml
# or
> salty-dog --rule-path rules/

Including & Excluding Rules

Once rules have been loaded, they also need to be included before they will be run. This allows you to put rules into a few larger files and selectively enable some topics, or exclude rules by name.

Using tags and log level makes it easy to create logical groups with more and less important rules. For example:

name: example-rules
rules:
  - name: limit-cpu
    level: error
    tags:
      - apps
      - resources
  - name: limit-memory
    level: error
    tags:
      - apps
      - resources
  - name: limit-name
    level: info
    tags:
      - apps
      - names

If you want run the most important rules and check an app's resource limits while skipping the name, you can use:

> salty-dog --tag resources
# or
> salty-dog --include-tag apps --exclude-tag names

Either one will include the limit-cpu and limit-memory rules and exclude the limit-name rule. The --tag option is shorthand for --include-tag.

Rules that are specifically excluded will not be run, even if they were previously included. That is, exclusions take priority.

Using Check Mode

This is the basic lint mode: each of the rules you have included will be run and the program will exit with a success or failure code, depending on whether the source documents have passed all of the rules. Any errors will be logged, and if the source documents are valid, they will be written out to the destination.

> salty-dog --source test/examples/kubernetes-resources-some.yml --rules rules/kubernetes.yml --tag kubernetes | bunyan

...
[2022-04-24T20:59:17.374Z]  INFO: salty-dog/175 on ceebfd6fbf03:
    rule errors
    kubernetes-resources: 1
    kubernetes-labels: 1
[2022-04-24T20:59:17.374Z] ERROR: salty-dog/175 on ceebfd6fbf03: some rules failed (count=2)

Formatting The Output

Logs from salty-dog are structured JSON and will be written to standard error by default, but you can configure the output streams in order to write them to a file or standard output instead. The raw JSON is not the easiest to read without pretty-printing, and there are a few tools that can help. The container image contains both bunyan and jq, for formatting and filtering, respectively.

> salty-dog --source test/examples/kubernetes-resources-some.yml --rules rules/kubernetes.yml --tag kubernetes --dest /tmp/valid-app.yml 2>&1 | yarn bunyan

[2022-04-24T22:16:17.236Z]  INFO: salty-dog/1365 on ceebfd6fbf03: version info
    build: {
      "job": "",
      "node": "v16.14.2",
      "runner": ""
    }
    --
    git: {
      "branch": "master",
      "commit": "a8bfb58d2ddbc12b040eaa39ee36abfa598e30e6"
    }
    --
    package: {
      "name": "salty-dog",
      "version": "0.9.1"
    }
...
[2022-04-24T22:16:02.280Z]  INFO: salty-dog/1325 on ceebfd6fbf03: no errors to report
[2022-04-24T22:16:02.280Z]  INFO: salty-dog/1325 on ceebfd6fbf03: all rules passed

# or with jq
> salty-dog --source test/examples/kubernetes-resources-some.yml --rules rules/kubernetes.yml --tag kubernetes --dest /tmp/valid-app.yml 2>&1 | jq .

{
  "name": "salty-dog",
  "hostname": "4c8d1249ca96",
  "pid": 1,
  "level": 30,
  "build": {
    "job": "",
    "node": "v16.14.2",
    "runner": ""
  },
...
  "msg": "some rules failed",
  "time": "2022-04-24T20:51:08.597Z",
  "v": 0
}

Redirecting Source & Destination

Source and destination can each be a file or standard input/output stream. If not specified, both will default to the standard streams for use with shell pipes:

> wget https://example.com/trusted-app.yml | salty-dog --rules rules/kubernetes.yml --tag kubernetes | kubectl apply -f -

The mode and options can also be explicitly set, so that short command is equivalent to:

> wget https://example.com/trusted-app.yml | salty-dog check --source - --dest - --rules rules/kubernetes.yml --tag kubernetes | kubectl apply -f -

To read the input from a file, set the --source path:

> salty-dog --source test/examples/kubernetes-resources-high.yml --rules rules/kubernetes.yml --tag kubernetes | kubectl apply -f -

To write the output to a file, set the --destination path:

> wget https://example.com/trusted-app.yml | salty-dog --rules rules/kubernetes.yml --tag kubernetes --dest /tmp/valid-app.yml

Since output and logs are written to standard output and error, respectively, shell redirection works normally. To ignore output and format logs with bunyan:

> salty-dog --source test/examples/kubernetes-resources-high.yml --rules rules/kubernetes.yml --tag kubernetes 2>&1 1>/dev/null | bunyan

Using Fix Mode

Fix mode will execute the same rules, but it will also attempt to insert default values into the source documents, if the defaults would make them pass the rules. This can be used to add commonly forgotten fields, or interpolate from environment variables, which can be especially helpful in CI.

Using the kubernetes-container-pull-policy rule as an example, you can add a default pull policy to containers that are missing their own. Modifying the default rule to include a default:

- name: kubernetes-container-pull-policy
  desc: all containers should have a pull policy
  level: info
  tags:
    - kubernetes
    - image
    - optional

  select: '$..containers.*'
  check:
    type: object
    required: [image, imagePullPolicy]
    properties:
      imagePullPolicy:
        type: string
        default: IfNotPresent     # this line has been added
        enum:
          - Always
          - IfNotPresent
          - Never

Then running with a brief pod spec that does not have the imagePullPolicy field:

apiVersion: v1
kind: Pod
metadata:
  name: example
  labels: {}
spec:
  template:
    spec:
      containers:
        - name: test
          image: foo
          resources:
            limits:
              cpu: 4000m
              memory: 5Gi
            requests:
              cpu: 4000m
              memory: 5Gi

Should fix up the output to produce:

> salty-dog fix --source test/examples/kubernetes-resources-pull.yml --rules rules/kubernetes-fix.yml --tag image

apiVersion: v1
kind: Pod
metadata:
  name: example
  labels: {}
spec:
  template:
    spec:
      containers:
        - name: test
          image: foo
          resources:
            limits:
              cpu: 4000m
              memory: 5Gi
            requests:
              cpu: 4000m
              memory: 5Gi
          imagePullPolicy: IfNotPresent

Using Defaults With Alternatives

JSON schema supports a few alternative keywords, such as allOf, anyOf, and oneOf. salty-dog uses the ajv library to validate schemas and insert defaults. Fix mode is specific to ajv and not part of the JSON schema spec, and so may not be portable to other tools - use with care.

Because of the order in which ajv checks alternative schemas, only one of the sub-schemas will apply its defaults. Once the source document has matched that alternative, it will not modify the data to match any others. Keep this order in mind while writing checks.

Writing Custom Rules

Custom rules can be loaded from YAML files or ES modules. Rules loaded from a file are currently limited to JSON schema rules, which support most common use-cases. When rules need more complex logic, you can implement them with in a module and write the check in code, which allows pretty much anything.

This will cover the basics of writing custom rules. Please see the full documentation on the rule format for more details.

Schema Checks

Most rules use JSON schema and the check field contains the schema to be enforced. Selected elements that do not match the schema will fail the rule, and some information shown about the field(s) that did not match.

Please see the ajv documentation for the full JSON schema reference.

Rules that check an object should start with a type: object and specify its properties:

check:
  type: object
  required: [image, imagePullPolicy]
  properties:
    image:
      type: string
    imagePullPolicy:
      type: string
      enum:
        - Always
        - IfNotPresent
        - Never

This rule checks for two required properties, image and imagePullPolicy, and defines the type for each. There are only a few valid values for imagePullPolicy, which are enumerated.

This rule could be extended to check the format of the image and warn against using the :latest tag, like the kubernetes-image-latest rule does, or to insert a default value for the imagePullPolicy if one is not provided in the source.

Selecting & Filtering Elements

Rules do not always apply to the whole source document and may be partial schemas for a certain path. Elements within that path can be further filtered, allowing exclusion by name or annotations. Only elements that are selected and pass the filter will be checked for errors and have defaults inserted.

select: '$.compilerOptions'
filter:
  type: object
  required: [strict]
  properties:
    strict:
      type: boolean
      const: true

check:
  not:
    anyOf:
      # from https://www.typescriptlang.org/docs/handbook/compiler-options.html
      - required: [alwaysStrict]
      - required: [noImplicitAny]
      - required: [noImplicitThis]
      - required: [strictBindCallApply]
      - required: [strictNullChecks]
      - required: [strictFunctionTypes]
      - required: [strictPropertyInitialization]

This rule is scoped to the $.compilerOptions element within the source document, and will skip the compilerOptions if it does not have strict: true set. If strict is set, the individual strict options become redundant, so the rule checks to make sure none of them exist.

Other Examples

Much of this guide uses Kubernetes resources as examples, but there are many other JSON and YAML formats that desperately need schema validation. salty-dog should support most of them, although it cannot parse files that use custom YAML schema extensions, such as Gitlab's !reference.

Checking Grafana Dashboard Tags

Since YAML is a superset of JSON, salty-dog can validate JSON files equally well. If you want to use fix mode and need the output to be in JSON, you will need to use a tool like yq to encode the output - salty-dog does not yet support JSON output directly.

> salty-dog check --source ./dashboards/nodes.json --rules rules/grafana.yml --tag grafana | yq -o=json '.'
# or for older versions of yq
> salty-dog check --source ./dashboards/nodes.json --rules rules/grafana.yml --tag grafana | yq '.'

Checking salty-dog Rules

You can use the rules schema to validate itself or your custom rules:

> salty-dog check --source rules/salty-dog.yml --rules rules/salty-dog.yml --tag salty-dog

...
[2022-04-24T21:25:10.431Z]  INFO: salty-dog/278 on ceebfd6fbf03: no errors to report
[2022-04-24T21:25:10.432Z]  INFO: salty-dog/278 on ceebfd6fbf03: all rules passed

Checking Gitlab CI Jobs

TODO: example