| name | deployment-git |
| description | Kailash Rust deployment + Git — Docker, K8s, CI/CD, releases. Manual deploy steps BLOCKED. |
Deployment & Git Workflows
Deployment patterns and Git workflows for the Kailash Rust SDK.
Overview
Production deployment patterns for:
- Docker multi-stage builds (Rust → minimal runtime image)
- Kubernetes orchestration
- Git workflows and branching strategies
- CI/CD with cargo and self-hosted runners
- Environment management
Reference Documentation
Deployment Lifecycle
-
deployment-onboarding - Deployment onboarding process
- Codebase analysis
- Structured questions for human architect
- Research current best practices
- Create deployment-config.md
-
deployment-packages - Package release workflow
- PyPI and GitHub release process
- Version bumping and changelog
- CI-triggered releases
- Rollback procedures
-
deployment-cloud - Cloud deployment principles
- CLI SSO authentication (AWS, Azure, GCP)
- Managed vs self-hosted decisions
- Right-sizing and cost optimization
- SSL, monitoring, security baseline
Docker Deployment
Kubernetes Deployment
Git Workflow
Version Bumps
- rust-version-bump - Canonical procedure for raising rustc MSRV or adding/dropping a CPython target in the PyO3 wheel matrix. Cross-SDK counterpart to kailash-py's
python-version-bump.
Project Management
Docker Quick Reference
Multi-Stage Rust Dockerfile
FROM rust:1.82-slim AS builder
WORKDIR /app
RUN apt-get update && apt-get install -y pkg-config libssl-dev \
&& rm -rf /var/lib/apt/lists/*
COPY . .
RUN cargo build --release --bin my-service
FROM debian:bookworm-slim
RUN apt-get update && apt-get install -y ca-certificates libssl3 curl \
&& rm -rf /var/lib/apt/lists/*
RUN useradd -r -s /bin/false appuser
USER appuser
COPY --from=builder /app/target/release/my-service /usr/local/bin/
EXPOSE 3000
HEALTHCHECK --interval=30s --timeout=3s CMD curl -f http://localhost:3000/health || exit 1
CMD ["my-service"]
Pre-Commit Quality Pipeline
cargo fmt --all --check && \
cargo clippy --workspace -- -D warnings && \
cargo test --workspace && \
cargo audit
Critical Rules
Docker
- Use multi-stage builds (final image ~50MB)
- Rust binaries cold-start in ~10ms
- Unified Runtime (no sync/async split)
- Implement health checks via Nexus
/health
- Use secrets for sensitive data
- NEVER commit secrets to images
- NEVER run as root user
Git
- Use conventional commits:
feat(core): description
- Pre-commit validation is MANDATORY
- Security review before EVERY commit
- NEVER commit directly to main
- NEVER force push to shared branches
Related Skills
Support
For deployment help, invoke:
release-specialist - Deployment onboarding, package/cloud releases, Docker, K8s, CI runners
release-specialist - Git workflows, cargo publish, CI pipeline
nexus-specialist - Nexus server configuration