Naiserator

Naiserator is a Kubernetes operator that handles the lifecycle of nais.io/Application and nais.io/Naisjob.
The main goal of Naiserator is to simplify application deployment by providing a high-level abstraction tailored for the Nais platform.
When an Application resource is created in Kubernetes, usually with Nais deploy,
Naiserator will generate several other Kubernetes resources that work together to form a complete deployment.
The contents of these resources are heavily dependent on per-cluster and per-application configuration.
Resources will remain in Kubernetes until the Application resource is deleted, upon which they will be removed.
Additionally, any unneeded resources will be automatically deleted upon next deploy
if disabled by feature flags or is lacking in a application manifest.
Generated resources
Kubernetes built-ins:
Deployment, Job or CronJob that runs program executables,
HorizontalPodAutoscaler for automatic application scaling,
Ingress adding TLS termination and virtualhost support,
NetworkPolicy for firewall configuration,
PodDisruptionBudget for controlling how the application should be shut down or restart by Kubernetes,
PodMonitor for Prometheus integration,
Role and RoleBinding needed for Leader election sidecar,
Secret for stuff that shouldn't be shared with anyone,
ServiceAccount for granting correct permissions to managed resources,
Service which points to the application endpoint.
Nais resources for external system provisioning:
Google CNRM resources for Google Cloud Platform provisioning:
BigQueryDataset for BigQuery,
IAMServiceAccount, IAMPolicy and IAMPolicyMember for workload identity,
PubSubSubscription for PubSub,
SQLInstance, SQLUser and SqlDatabase for Cloud SQL,
StorageBucket for Storage Buckets
Documentation
The entire specification for the manifest is
generated by Naiserator's companion library, liberator,
and committed to the Nais end-user documentation.
Deployment
Runs on Kubernetes v1.30.0 or later.
When GCP features are enabled, Naiserator must run on Google Kubernetes Engine together with CNRM.
See charts/naiserator for a installable Helm chart.
Development
Try these:
mise run test
mise run build
mise run local
Verifying the Naiserator image and its contents
The image is signed "keylessly" (is that a word?) using Sigstore cosign.
To verify its authenticity run
cosign verify \
--certificate-identity "https://github.com/nais/naiserator/.github/workflows/deploy.yaml@refs/heads/master" \
--certificate-oidc-issuer "https://token.actions.githubusercontent.com" \
ghcr.io/nais/naiserator/naiserator@sha256:<shasum>
The images are also attested with SBOMs in the CycloneDX format.
You can verify these by running
cosign verify-attestation --type cyclonedx \
--certificate-identity "https://github.com/nais/naiserator/.github/workflows/deploy.yaml@refs/heads/master" \
--certificate-oidc-issuer "https://token.actions.githubusercontent.com" \
ghcr.io/nais/naiserator/naiserator@sha256:<shasum>