1
0
mirror of https://github.com/containers/youki synced 2024-11-22 17:02:00 +01:00
Container runtime written in Rust
Go to file
2024-10-17 17:54:57 +05:30
.cargo feature(main): add release strip 2023-11-05 23:06:58 +08:00
.devcontainer follow building best practices (#2856) 2024-07-21 12:31:50 +00:00
.github .github/workflows/basic: check unused deps on 'check' job 2024-10-01 02:32:33 +00:00
crates Bump the patch group with 3 updates 2024-10-10 00:30:28 +00:00
cross Fix cgroups determination in exec implementation (#2720) 2024-04-27 21:49:58 +09:00
docs Add the affiliations of youki maintainers (#2947) 2024-10-08 11:31:07 +00:00
experiment seccomp: Update experiment seccomp program (#2946) 2024-10-13 13:53:29 +09:00
hack Fix cgroups determination in exec implementation (#2720) 2024-04-27 21:49:58 +09:00
scripts Add seccomp into feature flags of youki to be compiled in (#2924) 2024-10-08 12:21:53 +09:00
tests Bump uuid from 1.10.0 to 1.11.0 2024-10-17 00:12:02 +00:00
tools/wasm-sample fix the warns from cargo clippy 2023-02-12 20:15:56 +09:00
.codecov.yml Ignore autogenerated code 2022-01-04 20:12:53 +01:00
.git-blame-ignore-revs Add .git-blame-ignore-revs 2024-05-15 17:48:50 +01:00
.gitignore Name the test tools contest (#2486) 2024-01-12 14:28:47 +05:30
.gitmodules Name the test tools contest (#2486) 2024-01-12 14:28:47 +05:30
.tagpr [tagpr] prepare for the next release 2024-09-02 07:02:49 +00:00
.typos.toml Fix typos and bump version for typos ci (#2839) 2024-07-01 21:20:47 +05:30
Cargo.lock Bump uuid from 1.10.0 to 1.11.0 2024-10-17 00:12:02 +00:00
Cargo.toml Init a selinux project (#2800) 2024-06-21 20:22:38 +09:00
CHANGELOG.md [tagpr] update CHANGELOG.md 2024-09-02 07:02:50 +00:00
CODE-OF-CONDUCT.md Add the governance (#2806) 2024-06-05 21:37:12 +09:00
Cross.toml Fix cgroups determination in exec implementation (#2720) 2024-04-27 21:49:58 +09:00
justfile Remove unnecessary chdir (#2780) 2024-05-15 12:20:27 +00:00
LICENSE Change the license from MIT to Apache 2.0 2021-08-13 18:02:15 +09:00
MirgationGuide.md podman rootless with dbus native (#2370) 2023-10-05 21:08:06 +09:00
README.md remove incorrect dependency in readme 2024-09-30 13:21:43 +05:30
rust-toolchain.toml Rust 1.80.0 (#2869) 2024-08-12 16:50:14 -07:00
rustfmt.toml Add rustfmt.toml to standardize formatting 2024-05-15 14:59:06 +01:00
SECURITY.md Add CODE-OF-CONDUCT.md and SECURITY.md 2021-06-13 17:56:20 +09:00
Vagrantfile add missing dependencies in Vagrantfile 2023-05-24 17:20:13 +08:00
Vagrantfile.containerd2youki Remove unnecessary chdir (#2780) 2024-05-15 12:20:27 +00:00
Vagrantfile.podmane2e Update go version in podman CI and vagrantfile (#2828) 2024-06-25 15:26:02 -07:00
Vagrantfile.root add missing dependencies in Vagrantfile 2023-05-24 17:20:13 +08:00

youki: A container runtime in Rust

Discord GitHub contributors Github CI codecov

youki is an implementation of the OCI runtime-spec in Rust, similar to runc.
Your ideas are welcome here.

🏷️ About the name

youki is pronounced as /joʊki/ or yoh-key. youki is named after the Japanese word 'youki', which means 'a container'. In Japanese language, youki also means 'cheerful', 'merry', or 'hilarious'.

🚀 Quick Start

Tip

You can immediately set up your environment with youki on GitHub Codespaces and try it out.

Open in GitHub Codespaces

$ just build
$ docker run --runtime youki hello-world
$ sudo podman run --cgroup-manager=cgroupfs --runtime /workspaces/youki/youki hello-world

User Documentation

🎯 Motivation

Here is why we are writing a new container runtime in Rust.

  • Rust is one of the best languages to implement the oci-runtime spec. Many very nice container tools are currently written in Go. However, the container runtime requires the use of system calls, which requires a bit of special handling when implemented in Go. This tricky (e.g. namespaces(7), fork(2)); with Rust too, but it's not that tricky. And, unlike in C, Rust provides the benefit of memory safety. While Rust is not yet a major player in the container field, it has the potential to contribute a lot: something this project attempts to exemplify.

  • youki has the potential to be faster and use less memory than runc, and therefore work in environments with tight memory usage requirements. Here is a simple benchmark of a container from creation to deletion.

    Runtime Time (mean ± σ) Range (min … max) vs youki(mean) Version
    youki 111.5 ms ± 11.6 ms 84.0 ms ± 142.5 ms 100% 0.3.3
    runc 224.6 ms ± 12.0 ms 190.5 ms ± 255.4 ms 200% 1.1.7
    crun 47.3 ms ± 2.8 ms 42.4 ms ± 56.2 ms 42% 1.15
    Details about the benchmark
    • A command used for the benchmark

      hyperfine --prepare 'sudo sync; echo 3 | sudo tee /proc/sys/vm/drop_caches' --warmup 10 --min-runs 100 'sudo ./youki create -b tutorial a && sudo ./youki start a && sudo ./youki delete -f a'
      
    • Environment

      $ ./youki info
      Version           0.3.3
      Commit            4f3c8307
      Kernel-Release    6.5.0-35-generic
      Kernel-Version    #35~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Tue May  7 09:00:52 UTC 2
      Architecture      x86_64
      Operating System  Ubuntu 22.04.4 LTS
      Cores             16
      Total Memory      63870
      Cgroup setup      unified
      Cgroup mounts
      Namespaces        enabled
        mount           enabled
        uts             enabled
        ipc             enabled
        user            enabled
        pid             enabled
        network         enabled
        cgroup          enabled
      Capabilities
      CAP_BPF           available
      CAP_PERFMON       available
      CAP_CHECKPOINT_RESTORE available
      
  • I have fun implementing this. In fact, this may be the most important.

📍 Status of youki

youki has aced real-world use cases, including containerd's e2e test, and is now adopted by several production environments. We have our roadmap.

youki demo

🔗 Related project

🎨 Design and implementation of youki

The User and Developer Documentation for youki is hosted at https://containers.github.io/youki/

Architecture

🎬 Getting Started

Local build is only supported on Linux. For other platforms, please use the Vagrantfile that we have prepared. You can also spin up a fully preconfigured development environment in the cloud with GitHub Codespaces.

Requires

  • Rust(See here), edition 2021
  • linux kernel ≥ 5.3

Dependencies

To install just, follow the instruction here.

$ sudo apt-get install    \
      pkg-config          \
      libsystemd-dev      \
      build-essential     \
      libelf-dev          \
      libseccomp-dev      \
      libclang-dev        \
      libssl-dev
$ sudo dnf install          \
      pkg-config            \
      systemd-devel         \
      elfutils-libelf-devel \
      libseccomp-devel      \
      clang-devel           \
      openssl-devel

Build

git clone git@github.com:containers/youki.git
cd youki
just youki-dev # or youki-release
./youki -h # you can get information about youki command

Tutorial

Requires

Create and run a container

Let's try to run a container that executes sleep 30 with youki. This tutorial may need root permission.

git clone git@github.com:containers/youki.git
cd youki
just youki-dev # or youki-release

mkdir -p tutorial/rootfs
cd tutorial
# use docker to export busybox into the rootfs directory
docker export $(docker create busybox) | tar -C rootfs -xvf -

Then, we need to prepare a configuration file. This file contains metadata and specs for a container, such as the process to run, environment variables to inject, sandboxing features to use, etc.

../youki spec  # will generate a spec file named config.json

We can edit the config.json to add customized behaviors for container. Here, we modify the process field to run sleep 30.

  "process": {
    ...
    "args": [
      "sleep", "30"
    ],

  ...
  }

Then we can explore the lifecycle of a container:

cd ..                                                # go back to the repository root
sudo ./youki create -b tutorial tutorial_container   # create a container with name `tutorial_container`
sudo ./youki state tutorial_container                # you can see the state the container is `created`
sudo ./youki start tutorial_container                # start the container
sudo ./youki list                                    # will show the list of containers, the container is `running`
sudo ./youki delete tutorial_container               # delete the container

Change the command to be executed in config.json and try something other than sleep 30.

Rootless container

youki provides the ability to run containers as non-root user(rootless mode). To run a container in rootless mode, we need to add some extra options in config.json, other steps are same with above:

$ mkdir -p tutorial/rootfs
$ cd tutorial
# use docker to export busybox into the rootfs directory
$ docker export $(docker create busybox) | tar -C rootfs -xvf -

$ ../youki spec --rootless          # will generate a spec file named config.json with rootless mode
## Modify the `args` field as you like

$ ../youki run rootless-container   # will create and run a container with rootless mode

Usage

Start the docker daemon.

dockerd --experimental --add-runtime="youki=$(pwd)/youki"

If you get an error like the below, that means your normal Docker daemon is running, and it needs to be stopped. Do that with your init system (i.e., with systemd, run systemctl stop docker, as root if necessary).

failed to start daemon: pid file found, ensure docker is not running or delete /var/run/docker.pid

Now repeat the command, which should start the docker daemon.

You can use youki in a different terminal to start the container.

docker run -it --rm --runtime youki busybox

Afterwards, you can close the docker daemon process in other the other terminal. To restart normal docker daemon (if you had stopped it before), run:

systemctl start docker # might need root permission

Integration Tests

Go and node-tap are required to run integration tests. See the opencontainers/runtime-tools README for details.

git submodule update --init --recursive
just test-oci

Setting up Vagrant

You can try youki on platforms other than Linux by using the Vagrantfile we have prepared. We have prepared two environments for vagrant, namely rootless mode and rootful mode

git clone git@github.com:containers/youki.git
cd youki

# If you want to develop in rootless mode, and this is the default mode
vagrant up
vagrant ssh

# or if you want to develop in rootful mode
VAGRANT_VAGRANTFILE=Vagrantfile.root vagrant up
VAGRANT_VAGRANTFILE=Vagrantfile.root vagrant ssh

# in virtual machine
cd youki
just youki-dev # or youki-release

👥 Community and Contributing

Please refer to our community page.

Thanks to all the people who already contributed!