mirror of
https://github.com/marcoallegretti/karapace.git
synced 2026-03-27 05:53:10 +00:00
docs: comprehensive public documentation
- docs/getting-started.md — install per distro, first use, common workflows - docs/architecture.md — 9-crate dependency graph, design decisions, data flow - docs/manifest-spec.md — manifest v1 specification - docs/lock-spec.md — lock file v2 specification - docs/store-spec.md — store format v2 specification - docs/hash-contract.md — two-phase identity hashing algorithm - docs/security-model.md — threat model, mount/device/env policy, privilege model - docs/cli-stability.md — 23 stable commands, exit codes, stability guarantees - docs/protocol-v1.md — remote protocol v1 draft - docs/layer-limitations-v1.md — phase 1 layer limitations - docs/api-reference.md — public API reference (Engine, D-Bus) - docs/versioning-policy.md — semantic versioning, deprecation policy - docs/verification.md — release artifact verification (SHA256, cosign, SBOM) - docs/e2e-testing.md — E2E test guide with distro-specific prerequisites - README.md — project overview, features, quick start, installation - CONTRIBUTING.md — development setup, architecture principles, code standards - CHANGELOG.md — full changelog for 0.1.0 and 2.0 hardening
This commit is contained in:
parent
155efdf7c9
commit
5306963cce
17 changed files with 2048 additions and 0 deletions
99
CHANGELOG.md
Normal file
99
CHANGELOG.md
Normal file
|
|
@ -0,0 +1,99 @@
|
||||||
|
# Changelog
|
||||||
|
|
||||||
|
All notable changes to Karapace will be documented in this file.
|
||||||
|
|
||||||
|
The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.1.0/).
|
||||||
|
|
||||||
|
## [Unreleased] — 2.0 Hardening
|
||||||
|
|
||||||
|
### Breaking Changes
|
||||||
|
|
||||||
|
- **Store format v2** — `STORE_FORMAT_VERSION` bumped to 2. New `staging/` and `wal/` directories. Version 1 stores require rebuild.
|
||||||
|
- **CLI pruned to 23 commands** — removed legacy commands: `init`, `preset`, `list-presets`, `export-app`, `unexport-app`, `quick`, `validate`, `verify-lock`, `export`, `list-images`, `remove-image`, `remote-list`, `tui`.
|
||||||
|
- **Content-addressed layers** — `LayerStore::put()` now returns the blake3 content hash used as filename. Callers must use the returned hash for references.
|
||||||
|
- **`Engine::gc()` requires `&StoreLock`** — compile-time enforcement that callers hold the store lock before garbage collection.
|
||||||
|
- **MetadataStore checksum** — `EnvMetadata` now includes an optional `checksum` field (blake3). Written on every `put()`, verified on every `get()`. Backward-compatible via `serde(default)`.
|
||||||
|
|
||||||
|
### Added — 2.0 Hardening (M1–M8)
|
||||||
|
|
||||||
|
- **M1: WAL Crash Safety** — Fixed race windows in `build()` and `restore()` (rollback registered before side-effects). Added WAL protection to `destroy()`, `commit()` (layer manifest rollback), and `gc()` (WAL marker). 8 new WAL crash-safety tests.
|
||||||
|
- **M2: Integrity Hardening** — `LayerStore::get()` verifies blake3 hash on every read. `MetadataStore` embeds and verifies blake3 checksum. `verify_store_integrity()` expanded to check objects, layers, and metadata. 4 new integrity tests.
|
||||||
|
- **M3: GC Safety** — `Engine::gc()` now requires `&StoreLock` parameter (type-enforced). Snapshot layers whose parent is a live base layer are preserved during GC.
|
||||||
|
- **M4: Remote Protocol** — `X-Karapace-Protocol: 1` header sent on all HTTP backend requests (PUT, GET, HEAD). `PROTOCOL_VERSION` constant exported from `karapace-remote`. 4 new header/auth verification tests via header-capturing mock server.
|
||||||
|
- **M5: unwrap() Audit** — 0 `unwrap()` in production `src/` code. 4 `Mutex::lock().unwrap()` calls in `MockBackend` replaced with proper `RuntimeError` propagation.
|
||||||
|
- **M6: Failure Mode Testing** — 11 new tests: WAL write failure on read-only dir, build failure when WAL dir is read-only (disk-full simulation), stop() SIGTERM with real process (ESRCH path), stop() with non-existent PID, permission denied on object read, read-only metadata dir, concurrent GC lock contention, layer corruption detection, metadata corruption detection, destroy nonexistent env, invalid manifest.
|
||||||
|
- **M7: Coverage Expansion** — `verify_store_integrity()` now checks objects + layers + metadata (was objects-only). `IntegrityReport` expanded with `layers_checked/passed` and `metadata_checked/passed` fields. New tests: freeze/archive state transitions, rename environment, verify-store after fresh build, rebuild preserves new and cleans old, HTTP list_blobs, large (1MB) blob roundtrip.
|
||||||
|
- **Total: 417 tests** (24 ignored, require privileged operations). Clippy `-D warnings` clean. `cargo fmt` clean. Release build OK.
|
||||||
|
|
||||||
|
### Added — 1.0 Preparation
|
||||||
|
|
||||||
|
- **Real tar layers** — `pack_layer()`/`unpack_layer()` in karapace-store: deterministic tar creation (sorted entries, zero timestamps, owner 0:0) for regular files, directories, and symlinks. Content-addressed via blake3.
|
||||||
|
- **Snapshot system** — `Engine::commit()` captures overlay upper as a tar snapshot; `Engine::restore()` atomically unpacks a snapshot via staging directory swap; `Engine::list_snapshots()` lists snapshots for an environment.
|
||||||
|
- **CLI: `snapshots` and `restore`** — new commands for snapshot management.
|
||||||
|
- **Write-ahead log (WAL)** — `store/wal/{op_id}.json` tracks in-flight operations with rollback steps. `Engine::new()` auto-recovers on startup. Integrated into `build()`, `commit()`, `restore()`.
|
||||||
|
- **Newtype wrappers threaded through all structs** — `EnvId`, `ShortId`, `ObjectHash`, `LayerHash` now used in `EnvMetadata` across all 8 crates. Transparent serde for backward compatibility.
|
||||||
|
- **Engine::push/pull** — transfer logic moved from `karapace-remote` to `Engine` methods. `karapace-remote` is now pure I/O.
|
||||||
|
- **CoreError::Remote** — new error variant for remote operation failures.
|
||||||
|
- **CLI stability contract** — `docs/cli-stability.md` defines stable command signatures for 1.x.
|
||||||
|
- **Remote protocol spec** — `docs/protocol-v1.md` (v1-draft) documents blob store routes, push/pull protocol, registry format.
|
||||||
|
- **Layer limitations doc** — `docs/layer-limitations-v1.md` documents Phase 1 limits (no xattrs, device nodes, hardlinks).
|
||||||
|
|
||||||
|
### Changed
|
||||||
|
|
||||||
|
- **CLI monolith decomposition** — split `main.rs` into ~30 command modules under `commands/`, thin dispatcher in `main.rs`.
|
||||||
|
- **Error type cleanup** — added `StoreError::InvalidName` and `StoreError::NameConflict` variants; removed `Io(Error::other)` hacks.
|
||||||
|
- **D-Bus serialization cleanup** — replaced hand-rolled JSON with typed `serde` response structs.
|
||||||
|
- **Engine store caching** — `MetadataStore`, `ObjectStore`, and `LayerStore` cached as fields on `Engine`.
|
||||||
|
- **Remote integrity verification** — `pull_env` verifies blake3 hash of each downloaded object and layer.
|
||||||
|
- **Store spec updated** — `docs/store-spec.md` reflects v2 format with WAL, staging, tar_hash, name field.
|
||||||
|
- **README updated** — reflects 23 commands, snapshot workflow, remote push/pull examples.
|
||||||
|
|
||||||
|
## [0.1.0] — 2026-02-20
|
||||||
|
|
||||||
|
### Added
|
||||||
|
|
||||||
|
- **Deterministic environment engine** — content-addressed, hash-based environment identity from resolved lock files.
|
||||||
|
- **Manifest v1** — declarative TOML manifest with strict schema validation, deterministic normalization, and canonical serialization.
|
||||||
|
- **Lock file v2** — resolved packages with pinned versions, base image content digest (not tag), dual verification (integrity + manifest intent).
|
||||||
|
- **Content-addressable store** — blake3 hashing, atomic writes (NamedTempFile + persist), integrity verification on read, reference counting, garbage collection with signal cancellation.
|
||||||
|
- **CLI commands** — `build`, `rebuild`, `enter`, `exec`, `destroy`, `stop`, `freeze`, `archive`, `list`, `inspect`, `diff`, `snapshots`, `commit`, `restore`, `gc`, `verify-store`, `push`, `pull`, `rename`, `completions`, `man-pages`, `doctor`, `migrate`.
|
||||||
|
- **`quick` command** — one-step environment creation for casual users (`karapace quick rolling -p git,curl --enter`). Generates a real manifest + lock file, preserving determinism while matching Distrobox-like simplicity.
|
||||||
|
- **Example manifests** — `examples/minimal.toml`, `examples/dev.toml`, `examples/gui-dev.toml`, `examples/ubuntu-dev.toml`, `examples/rust-dev.toml` for common use cases.
|
||||||
|
- **Multi-distro image support** — openSUSE Tumbleweed/Leap, Ubuntu (20.04–24.10), Debian (Bookworm/Trixie/Sid), Fedora (40–42), Arch Linux, custom URLs.
|
||||||
|
- **Runtime backends** — user namespace (`unshare` + `fuse-overlayfs` + `chroot`), OCI (`crun`/`runc`/`youki`), mock (for testing).
|
||||||
|
- **Host integration** — Wayland, X11, PipeWire, PulseAudio, D-Bus session bus, GPU (`/dev/dri`), audio (`/dev/snd`), SSH agent, fonts, themes, cursor themes, GTK/icon themes.
|
||||||
|
- **Desktop app export** — export GUI applications from environments as `.desktop` files on the host.
|
||||||
|
- **Overlay drift control** — diff, freeze, commit, export writable layer changes.
|
||||||
|
- **D-Bus desktop integration** — socket-activated `org.karapace.Manager1` service (feature-gated, opt-in).
|
||||||
|
- **Security model** — mount whitelist, device policy, environment variable allow/deny lists, resource limits, no privilege escalation.
|
||||||
|
- **Structured logging** — `log` + `env_logger` with `KARAPACE_LOG` env var and `--verbose`/`-v` CLI flag.
|
||||||
|
- **Concurrency safety** — `StoreLock` file locking on all mutating CLI and D-Bus operations, GC protects active/archived environments.
|
||||||
|
- **Automated tests** — unit tests, integration tests, crash injection tests, concurrent build safety, GC safety, reproducibility.
|
||||||
|
- **Shell completions** — `karapace completions bash|zsh|fish|elvish|powershell` for tab completion.
|
||||||
|
- **Man page generation** — `karapace man-pages <dir>` generates man pages for all commands.
|
||||||
|
- **Prerequisite detection** — early check for `unshare`, `fuse-overlayfs`, `curl` with distro-aware install instructions.
|
||||||
|
- **CI pipeline** — GitHub Actions workflow: format, clippy, test, release build with artifact upload.
|
||||||
|
|
||||||
|
### Security
|
||||||
|
|
||||||
|
- Shell injection prevention via POSIX single-quote escaping (`shell_quote`) on all sandbox script interpolation.
|
||||||
|
- Environment variable key validation (`[a-zA-Z0-9_]` only).
|
||||||
|
- Image download integrity — blake3 digest stored on download, `verify_image()` detects corruption.
|
||||||
|
- Destroy guard — cannot destroy a running environment (must stop first).
|
||||||
|
- Atomic rebuild — new environment built before old one is destroyed (no data loss on failure).
|
||||||
|
- PID cast safety — `i32::try_from()` instead of `as i32` for `libc::kill()`.
|
||||||
|
- Zero `unwrap()` in production code — all error paths handled gracefully.
|
||||||
|
- Input validation in `quick` command — image and package names validated against TOML injection.
|
||||||
|
- `Cargo.lock` committed for reproducible builds.
|
||||||
|
|
||||||
|
### Documentation
|
||||||
|
|
||||||
|
- Manifest v0.1 specification (`docs/manifest-spec.md`)
|
||||||
|
- Lock file v2 specification (`docs/lock-spec.md`)
|
||||||
|
- Store format specification (`docs/store-spec.md`)
|
||||||
|
- Hash contract (`docs/hash-contract.md`)
|
||||||
|
- Security model with threat model and attack surface (`docs/security-model.md`)
|
||||||
|
- Public API reference (`docs/api-reference.md`)
|
||||||
|
- Versioning policy (`docs/versioning-policy.md`)
|
||||||
|
- `CONTRIBUTING.md` — development workflow, architecture principles, code standards.
|
||||||
|
- `LICENSE` — European Union Public Licence v1.2 (EUPL-1.2).
|
||||||
97
CONTRIBUTING.md
Normal file
97
CONTRIBUTING.md
Normal file
|
|
@ -0,0 +1,97 @@
|
||||||
|
# Contributing to Karapace
|
||||||
|
|
||||||
|
## Development Setup
|
||||||
|
|
||||||
|
```bash
|
||||||
|
# Clone and build
|
||||||
|
git clone https://github.com/marcoallegretti/karapace.git
|
||||||
|
cd karapace
|
||||||
|
cargo build
|
||||||
|
|
||||||
|
# Run tests
|
||||||
|
cargo test --workspace
|
||||||
|
|
||||||
|
# Full verification (must pass before submitting)
|
||||||
|
cargo fmt --all --check
|
||||||
|
cargo clippy --workspace --all-targets -- -D warnings
|
||||||
|
cargo test --workspace
|
||||||
|
cargo build --release --workspace
|
||||||
|
```
|
||||||
|
|
||||||
|
## Project Structure
|
||||||
|
|
||||||
|
```
|
||||||
|
crates/
|
||||||
|
karapace-schema/ # Manifest parsing, normalization, lock file, identity hashing
|
||||||
|
karapace-store/ # Content-addressable store, metadata, layers, GC, integrity
|
||||||
|
karapace-runtime/ # Container runtime: images, sandbox, host integration, security
|
||||||
|
karapace-core/ # Build engine, lifecycle state machine, drift control, concurrency
|
||||||
|
karapace-remote/ # Remote store client, push/pull, registry
|
||||||
|
karapace-server/ # Reference remote server (tiny_http)
|
||||||
|
karapace-tui/ # Terminal UI (ratatui)
|
||||||
|
karapace-cli/ # CLI interface (23 commands)
|
||||||
|
karapace-dbus/ # D-Bus desktop integration (optional)
|
||||||
|
docs/ # Public documentation and specifications
|
||||||
|
examples/ # Ready-to-use manifest examples
|
||||||
|
data/ # systemd and D-Bus service files
|
||||||
|
```
|
||||||
|
|
||||||
|
## Architecture Principles
|
||||||
|
|
||||||
|
Before implementing any feature, verify it aligns with these principles:
|
||||||
|
|
||||||
|
1. **Determinism first.** Same manifest + lock = identical environment, always.
|
||||||
|
2. **No hidden mutable state.** All state changes are explicit and tracked.
|
||||||
|
3. **No silent drift.** Overlay changes are visible via `diff` and must be committed explicitly.
|
||||||
|
4. **No privilege escalation.** Everything runs as the unprivileged user.
|
||||||
|
5. **Convenience must not break reproducibility.** If there's a conflict, determinism wins.
|
||||||
|
|
||||||
|
See [Architecture Overview](docs/architecture.md) for the full design.
|
||||||
|
|
||||||
|
## Code Standards
|
||||||
|
|
||||||
|
- **Zero warnings**: `cargo clippy --workspace --all-targets -- -D warnings` must pass.
|
||||||
|
- **Formatted**: `cargo fmt --all --check` must pass.
|
||||||
|
- **No `unwrap()` in production code** (test code is fine).
|
||||||
|
- **No `TODO`/`FIXME`/`HACK`** in committed code.
|
||||||
|
- **All values interpolated into shell scripts must use `shell_quote()`.**
|
||||||
|
- **All mutating operations must hold a `StoreLock`.**
|
||||||
|
- **All file writes must be atomic** (use `NamedTempFile` + `persist()`).
|
||||||
|
|
||||||
|
## Testing
|
||||||
|
|
||||||
|
- All new features must include tests.
|
||||||
|
- Run the full test suite: `cargo test --workspace`
|
||||||
|
- Integration tests go in `crates/karapace-core/tests/`.
|
||||||
|
- Unit tests go in the relevant module as `#[cfg(test)] mod tests`.
|
||||||
|
|
||||||
|
## Submitting Changes
|
||||||
|
|
||||||
|
1. Fork the repository.
|
||||||
|
2. Create a feature branch from `main`.
|
||||||
|
3. Make your changes, ensuring all verification checks pass.
|
||||||
|
4. Submit a pull request with a clear description.
|
||||||
|
|
||||||
|
## Building the D-Bus Service
|
||||||
|
|
||||||
|
The D-Bus service is not compiled by default:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
# Core CLI only (default)
|
||||||
|
cargo build --release
|
||||||
|
|
||||||
|
# Include D-Bus service
|
||||||
|
cargo build --release --workspace
|
||||||
|
```
|
||||||
|
|
||||||
|
## Generating Shell Completions
|
||||||
|
|
||||||
|
```bash
|
||||||
|
karapace completions bash > /etc/bash_completion.d/karapace
|
||||||
|
karapace completions zsh > /usr/share/zsh/site-functions/_karapace
|
||||||
|
karapace completions fish > ~/.config/fish/completions/karapace.fish
|
||||||
|
```
|
||||||
|
|
||||||
|
## License
|
||||||
|
|
||||||
|
By contributing, you agree that your contributions will be licensed under the European Union Public Licence v1.2 (EUPL-1.2).
|
||||||
222
README.md
Normal file
222
README.md
Normal file
|
|
@ -0,0 +1,222 @@
|
||||||
|
# Karapace
|
||||||
|
|
||||||
|
[](https://github.com/marcoallegretti/karapace/actions/workflows/ci.yml)
|
||||||
|
[](LICENSE)
|
||||||
|
|
||||||
|
A deterministic container environment engine for immutable Linux systems.
|
||||||
|
|
||||||
|
Karapace creates isolated, reproducible development environments using Linux namespaces and overlay filesystems — no root, no daemon, no Docker. Environments are content-addressed artifacts derived from declarative TOML manifests, with full host integration for GPU, audio, Wayland, and desktop applications.
|
||||||
|
|
||||||
|
## What Karapace Is (and Isn't)
|
||||||
|
|
||||||
|
Karapace is **the identity and certainty layer** for reproducible environments. It is not a general-purpose container runtime.
|
||||||
|
|
||||||
|
| Need | Tool |
|
||||||
|
|---|---|
|
||||||
|
| Full system container lifecycle, advanced networking, snapshots | Incus, LXD, Podman |
|
||||||
|
| Deterministic, content-addressed, reproducible environments | **Karapace** |
|
||||||
|
| Quick disposable containers with zero config | Distrobox |
|
||||||
|
| Determinism + simplicity for casual use | **Karapace** `quick` command |
|
||||||
|
|
||||||
|
Karapace is **complementary** — it can sit on top of or alongside any container runtime. Users needing full container features use a runtime; users needing reproducibility and traceability use Karapace. The `quick` command bridges the gap for users who want both simplicity and determinism.
|
||||||
|
|
||||||
|
## Features
|
||||||
|
|
||||||
|
- **Real container isolation** — Linux user namespaces (`unshare`), `fuse-overlayfs`, `chroot`
|
||||||
|
- **No root required** — runs entirely as an unprivileged user
|
||||||
|
- **No daemon** — direct CLI, no background service needed
|
||||||
|
- **Multi-distro images** — openSUSE, Ubuntu, Debian, Fedora, Arch from LXC image servers
|
||||||
|
- **Package installation** — `zypper`, `apt`, `dnf`, `pacman` inside the container
|
||||||
|
- **Host integration** — home directory, Wayland, PipeWire, D-Bus, GPU (`/dev/dri`), audio (`/dev/snd`), SSH agent, fonts, themes
|
||||||
|
- **Desktop app export** — export GUI apps as `.desktop` files on the host
|
||||||
|
- **OCI runtime support** — optional `crun`/`runc`/`youki` backend
|
||||||
|
- **Content-addressable store** — deterministic hashing, deduplication, integrity verification
|
||||||
|
- **Overlay drift control** — diff, freeze, commit, export writable layer changes
|
||||||
|
- **OSC 777 terminal markers** — container-aware terminal integration (Konsole, etc.)
|
||||||
|
|
||||||
|
## Crate Layout
|
||||||
|
|
||||||
|
| Crate | Purpose |
|
||||||
|
|---|---|
|
||||||
|
| `karapace-schema` | Manifest v1 parsing, normalization, identity hashing, lock file |
|
||||||
|
| `karapace-store` | Content-addressable store, layers, metadata, GC, integrity |
|
||||||
|
| `karapace-runtime` | Container runtime: image download, sandbox, host integration, app export |
|
||||||
|
| `karapace-core` | Build engine, lifecycle state machine, drift control, concurrency |
|
||||||
|
| `karapace-cli` | Full CLI interface (23 commands) |
|
||||||
|
| `karapace-dbus` | Socket-activated D-Bus desktop integration (**optional**, feature-gated) |
|
||||||
|
| `karapace-remote` | Remote content-addressable store, push/pull, registry |
|
||||||
|
| `karapace-server` | Reference remote server implementing protocol v1 (tiny_http) |
|
||||||
|
| `karapace-tui` | Terminal UI for environment management (ratatui) |
|
||||||
|
|
||||||
|
## CLI Commands (23)
|
||||||
|
|
||||||
|
```
|
||||||
|
karapace build [manifest] # Build environment from manifest
|
||||||
|
karapace rebuild [manifest] # Destroy + rebuild
|
||||||
|
karapace enter <env_id> [-- cmd...] # Enter environment (or run a command)
|
||||||
|
karapace exec <env_id> -- <cmd...> # Execute command inside environment
|
||||||
|
karapace destroy <env_id> # Destroy environment
|
||||||
|
karapace stop <env_id> # Stop a running environment
|
||||||
|
karapace freeze <env_id> # Freeze environment
|
||||||
|
karapace archive <env_id> # Archive environment (preserve, prevent entry)
|
||||||
|
karapace list # List all environments
|
||||||
|
karapace inspect <env_id> # Show environment metadata
|
||||||
|
karapace diff <env_id> # Show overlay drift
|
||||||
|
karapace snapshots <env_id> # List snapshots for an environment
|
||||||
|
karapace commit <env_id> # Commit overlay drift as snapshot
|
||||||
|
karapace restore <env_id> <snapshot> # Restore overlay from snapshot
|
||||||
|
karapace gc [--dry-run] # Garbage collect store
|
||||||
|
karapace verify-store # Check store integrity
|
||||||
|
karapace push <env_id> [--tag name@tag] # Push environment to remote store
|
||||||
|
karapace pull <reference> [--remote url] # Pull environment from remote store
|
||||||
|
karapace rename <env_id> <name> # Rename environment
|
||||||
|
karapace doctor # Run diagnostic checks on system and store
|
||||||
|
karapace migrate # Check store version and migration guidance
|
||||||
|
karapace completions <shell> # Generate shell completions
|
||||||
|
karapace man-pages [dir] # Generate man pages
|
||||||
|
```
|
||||||
|
|
||||||
|
All commands support `--json` for structured output, `--store <path>` for custom store location, `--verbose` / `-v` for debug logging, and `--trace` for trace-level output.
|
||||||
|
|
||||||
|
Set `KARAPACE_LOG=debug` (or `info`, `warn`, `error`, `trace`) for fine-grained log control.
|
||||||
|
|
||||||
|
## Quick Start
|
||||||
|
|
||||||
|
```bash
|
||||||
|
# Build (core CLI only — D-Bus service is opt-in)
|
||||||
|
cargo build --release
|
||||||
|
|
||||||
|
# Build with D-Bus desktop integration
|
||||||
|
cargo build --release --workspace
|
||||||
|
```
|
||||||
|
|
||||||
|
```bash
|
||||||
|
# Write a manifest
|
||||||
|
cat > karapace.toml << 'EOF'
|
||||||
|
manifest_version = 1
|
||||||
|
|
||||||
|
[base]
|
||||||
|
image = "rolling" # openSUSE Tumbleweed (or "ubuntu/24.04", "fedora/41", "arch", etc.)
|
||||||
|
|
||||||
|
[system]
|
||||||
|
packages = ["git", "curl", "vim"]
|
||||||
|
|
||||||
|
[hardware]
|
||||||
|
gpu = true
|
||||||
|
audio = true
|
||||||
|
|
||||||
|
[runtime]
|
||||||
|
backend = "namespace"
|
||||||
|
EOF
|
||||||
|
|
||||||
|
karapace build
|
||||||
|
karapace enter <env_id>
|
||||||
|
|
||||||
|
# Run a command inside without interactive shell
|
||||||
|
karapace exec <env_id> -- git --version
|
||||||
|
|
||||||
|
# Snapshot and restore
|
||||||
|
karapace commit <env_id>
|
||||||
|
karapace snapshots <env_id>
|
||||||
|
karapace restore <env_id> <snapshot_hash>
|
||||||
|
|
||||||
|
# Push/pull to remote
|
||||||
|
karapace push <env_id> --tag my-env@latest
|
||||||
|
karapace pull my-env@latest
|
||||||
|
|
||||||
|
# List environments
|
||||||
|
karapace list
|
||||||
|
```
|
||||||
|
|
||||||
|
## Example Manifests
|
||||||
|
|
||||||
|
Ready-to-use manifests in `examples/`:
|
||||||
|
|
||||||
|
| File | Description |
|
||||||
|
|---|---|
|
||||||
|
| `examples/minimal.toml` | Bare openSUSE system, no extras |
|
||||||
|
| `examples/dev.toml` | Developer tools (git, vim, tmux, gcc, clang) |
|
||||||
|
| `examples/gui-dev.toml` | GUI development with GPU + audio passthrough |
|
||||||
|
| `examples/ubuntu-dev.toml` | Ubuntu-based with Node.js, Python, build-essential |
|
||||||
|
| `examples/rust-dev.toml` | Rust development environment |
|
||||||
|
|
||||||
|
## Shell Completions
|
||||||
|
|
||||||
|
```bash
|
||||||
|
# Bash
|
||||||
|
karapace completions bash > /etc/bash_completion.d/karapace
|
||||||
|
|
||||||
|
# Zsh
|
||||||
|
karapace completions zsh > /usr/share/zsh/site-functions/_karapace
|
||||||
|
|
||||||
|
# Fish
|
||||||
|
karapace completions fish > ~/.config/fish/completions/karapace.fish
|
||||||
|
```
|
||||||
|
|
||||||
|
## Man Pages
|
||||||
|
|
||||||
|
```bash
|
||||||
|
karapace man-pages /usr/share/man/man1
|
||||||
|
```
|
||||||
|
|
||||||
|
## Installation
|
||||||
|
|
||||||
|
### From Source (recommended)
|
||||||
|
|
||||||
|
```bash
|
||||||
|
git clone https://github.com/marcoallegretti/karapace.git
|
||||||
|
cd karapace
|
||||||
|
cargo build --release
|
||||||
|
sudo install -Dm755 target/release/karapace /usr/local/bin/karapace
|
||||||
|
```
|
||||||
|
|
||||||
|
### With D-Bus Service
|
||||||
|
|
||||||
|
```bash
|
||||||
|
cargo build --release --workspace
|
||||||
|
sudo install -Dm755 target/release/karapace /usr/local/bin/karapace
|
||||||
|
sudo install -Dm755 target/release/karapace-dbus /usr/local/bin/karapace-dbus
|
||||||
|
sudo install -Dm644 data/dbus/org.karapace.Manager1.service /usr/share/dbus-1/services/
|
||||||
|
sudo install -Dm644 data/systemd/karapace-dbus.service /usr/lib/systemd/user/
|
||||||
|
```
|
||||||
|
|
||||||
|
### Via Cargo
|
||||||
|
|
||||||
|
```bash
|
||||||
|
cargo install --git https://github.com/marcoallegretti/karapace.git karapace-cli
|
||||||
|
```
|
||||||
|
|
||||||
|
## Prerequisites
|
||||||
|
|
||||||
|
- Linux with user namespace support (`CONFIG_USER_NS=y`)
|
||||||
|
- `fuse-overlayfs` (for overlay filesystem)
|
||||||
|
- `curl` (for image downloads)
|
||||||
|
- Optional: `crun`/`runc`/`youki` (for OCI backend)
|
||||||
|
|
||||||
|
Karapace checks for missing prerequisites at startup and provides distro-specific install instructions.
|
||||||
|
|
||||||
|
## Documentation
|
||||||
|
|
||||||
|
- **[Getting Started Guide](docs/getting-started.md)** — installation, first use, common workflows
|
||||||
|
- [Architecture Overview](docs/architecture.md)
|
||||||
|
- [Manifest v1 Specification](docs/manifest-spec.md)
|
||||||
|
- [Lock File v2 Specification](docs/lock-spec.md)
|
||||||
|
- [Store Format v2 Specification](docs/store-spec.md)
|
||||||
|
- [Hash Contract](docs/hash-contract.md)
|
||||||
|
- [Security Model](docs/security-model.md)
|
||||||
|
- [CLI Stability Contract](docs/cli-stability.md)
|
||||||
|
- [Remote Protocol v1 (Draft)](docs/protocol-v1.md)
|
||||||
|
- [Layer Limitations (Phase 1)](docs/layer-limitations-v1.md)
|
||||||
|
- [Public API Reference](docs/api-reference.md)
|
||||||
|
- [Versioning Policy](docs/versioning-policy.md)
|
||||||
|
- [Verification & Supply Chain](docs/verification.md)
|
||||||
|
- [E2E Testing](docs/e2e-testing.md)
|
||||||
|
|
||||||
|
## Verification
|
||||||
|
|
||||||
|
```bash
|
||||||
|
cargo fmt --all --check
|
||||||
|
cargo clippy --workspace --all-targets -- -D warnings
|
||||||
|
cargo test --workspace
|
||||||
|
cargo build --release --workspace
|
||||||
|
```
|
||||||
213
docs/api-reference.md
Normal file
213
docs/api-reference.md
Normal file
|
|
@ -0,0 +1,213 @@
|
||||||
|
# Karapace Public API Reference
|
||||||
|
|
||||||
|
## CLI Commands
|
||||||
|
|
||||||
|
### Environment Lifecycle
|
||||||
|
|
||||||
|
#### `karapace init [manifest]`
|
||||||
|
Initialize an environment from a manifest without building. Creates metadata and a preliminary lock file.
|
||||||
|
- **Default manifest**: `karapace.toml`
|
||||||
|
|
||||||
|
#### `karapace build [manifest]`
|
||||||
|
Build an environment. Resolves dependencies, computes canonical identity, creates store objects/layers, and writes the lock file.
|
||||||
|
- **Default manifest**: `karapace.toml`
|
||||||
|
|
||||||
|
#### `karapace enter <env_id> [-- cmd...]`
|
||||||
|
Enter a built environment interactively, or run a command if `-- cmd` is provided. Transitions state to Running, then back to Built on exit.
|
||||||
|
- Accepts full env_id or short_id prefix.
|
||||||
|
|
||||||
|
#### `karapace exec <env_id> -- <cmd...>`
|
||||||
|
Execute a command inside a built environment (non-interactive). Prints stdout/stderr.
|
||||||
|
|
||||||
|
#### `karapace rebuild [manifest]`
|
||||||
|
Atomically rebuild an environment. Builds the new environment first; the old one is only destroyed after a successful build.
|
||||||
|
- Produces the same env_id for the same resolved manifest.
|
||||||
|
- If the build fails, the existing environment is preserved.
|
||||||
|
|
||||||
|
#### `karapace stop <env_id>`
|
||||||
|
Stop a running environment by sending SIGTERM/SIGKILL to its process.
|
||||||
|
|
||||||
|
#### `karapace freeze <env_id>`
|
||||||
|
Freeze an environment, preventing further entry. Transitions to Frozen state.
|
||||||
|
|
||||||
|
#### `karapace archive <env_id>`
|
||||||
|
Archive an environment. Preserves it in the store but prevents entry. Can be rebuilt later.
|
||||||
|
|
||||||
|
#### `karapace destroy <env_id>`
|
||||||
|
Destroy an environment's overlay and decrement its reference count.
|
||||||
|
- **Cannot destroy a running environment** — stop it first.
|
||||||
|
|
||||||
|
### Drift Control
|
||||||
|
|
||||||
|
#### `karapace diff <env_id>`
|
||||||
|
Show drift in the writable overlay. Lists added, modified, and removed files.
|
||||||
|
|
||||||
|
#### `karapace commit <env_id>`
|
||||||
|
Commit overlay drift into the content store as a snapshot layer.
|
||||||
|
- Only works on Built or Frozen environments.
|
||||||
|
|
||||||
|
#### `karapace export <env_id> <dest>`
|
||||||
|
Copy the writable overlay contents to a destination directory.
|
||||||
|
|
||||||
|
### Store Management
|
||||||
|
|
||||||
|
#### `karapace gc [--dry-run]`
|
||||||
|
Run garbage collection. Removes orphaned environments, layers, and objects.
|
||||||
|
- `--dry-run`: report only, do not delete.
|
||||||
|
|
||||||
|
#### `karapace verify-store`
|
||||||
|
Verify integrity of all objects in the store (blake3 content hash check).
|
||||||
|
|
||||||
|
#### `karapace verify-lock [manifest]`
|
||||||
|
Verify lock file integrity (recomputed env_id matches) and manifest consistency (no drift between manifest and lock).
|
||||||
|
|
||||||
|
### Inspection
|
||||||
|
|
||||||
|
#### `karapace inspect <env_id>`
|
||||||
|
Show environment metadata: state, layers, ref count, timestamps.
|
||||||
|
|
||||||
|
#### `karapace list`
|
||||||
|
List all known environments with short_id, state, and env_id.
|
||||||
|
|
||||||
|
#### `karapace validate [manifest]`
|
||||||
|
Validate a manifest file and print its preliminary env_id.
|
||||||
|
|
||||||
|
### Desktop Integration
|
||||||
|
|
||||||
|
#### `karapace export-app <env_id> <name> <binary>`
|
||||||
|
Export a GUI application from an environment as a `.desktop` file on the host.
|
||||||
|
|
||||||
|
#### `karapace unexport-app <env_id> <name>`
|
||||||
|
Remove an exported application's `.desktop` file from the host.
|
||||||
|
|
||||||
|
### Image Management
|
||||||
|
|
||||||
|
#### `karapace list-images`
|
||||||
|
List cached container images with status and size.
|
||||||
|
|
||||||
|
#### `karapace remove-image <name>`
|
||||||
|
Remove a cached container image from the store.
|
||||||
|
|
||||||
|
### Quick Start
|
||||||
|
|
||||||
|
#### `karapace quick [image] [-p packages] [--gpu] [--audio] [--enter]`
|
||||||
|
One-step environment creation for casual users. Generates a manifest from CLI flags, builds, and optionally enters.
|
||||||
|
- **Default image**: `rolling` (openSUSE Tumbleweed)
|
||||||
|
- `-p` / `--packages`: Comma-separated list of packages to install.
|
||||||
|
- `--gpu`: Enable GPU passthrough.
|
||||||
|
- `--audio`: Enable audio passthrough.
|
||||||
|
- `-e` / `--enter`: Enter the environment immediately after building.
|
||||||
|
- A real manifest and lock file are still generated (determinism is preserved).
|
||||||
|
|
||||||
|
Examples:
|
||||||
|
```bash
|
||||||
|
karapace quick rolling -p git,curl --enter
|
||||||
|
karapace quick ubuntu/24.04 -p build-essential,cmake --gpu
|
||||||
|
karapace quick fedora/41 --enter
|
||||||
|
```
|
||||||
|
|
||||||
|
### Tooling
|
||||||
|
|
||||||
|
#### `karapace completions <shell>`
|
||||||
|
Generate shell completions for the specified shell. Supported: `bash`, `zsh`, `fish`, `elvish`, `powershell`.
|
||||||
|
|
||||||
|
```bash
|
||||||
|
karapace completions bash > /etc/bash_completion.d/karapace
|
||||||
|
karapace completions zsh > /usr/share/zsh/site-functions/_karapace
|
||||||
|
karapace completions fish > ~/.config/fish/completions/karapace.fish
|
||||||
|
```
|
||||||
|
|
||||||
|
#### `karapace man-pages [dir]`
|
||||||
|
Generate man pages for all commands in the specified directory.
|
||||||
|
- **Default directory**: `man`
|
||||||
|
|
||||||
|
#### `karapace push <env_id> [--tag <name@tag>] [--remote <url>]`
|
||||||
|
Push an environment (metadata + layers + objects) to a remote store. Skips blobs that already exist remotely.
|
||||||
|
- **`--tag`**: Publish under a registry key (e.g. `my-env@latest`).
|
||||||
|
- **`--remote`**: Remote store URL (overrides `~/.config/karapace/remote.json`).
|
||||||
|
|
||||||
|
#### `karapace pull <reference> [--remote <url>]`
|
||||||
|
Pull an environment from a remote store. Reference can be a registry key (e.g. `my-env@latest`) or a raw env_id.
|
||||||
|
- **`--remote`**: Remote store URL (overrides config).
|
||||||
|
|
||||||
|
#### `karapace remote-list [--remote <url>]`
|
||||||
|
List environments in the remote registry.
|
||||||
|
|
||||||
|
## Global Flags
|
||||||
|
|
||||||
|
| Flag | Description |
|
||||||
|
|---|---|
|
||||||
|
| `--store <path>` | Custom store location (default: `~/.local/share/karapace`). |
|
||||||
|
| `--json` | Structured JSON output for all applicable commands. |
|
||||||
|
| `--verbose` / `-v` | Enable debug-level logging output. |
|
||||||
|
|
||||||
|
### Environment Variables
|
||||||
|
|
||||||
|
| Variable | Description |
|
||||||
|
|---|---|
|
||||||
|
| `KARAPACE_LOG` | Log level filter: `error`, `warn` (default), `info`, `debug`, `trace`. |
|
||||||
|
| `KARAPACE_STORE` | Override default store path (used by the D-Bus service). |
|
||||||
|
|
||||||
|
## Exit Codes
|
||||||
|
|
||||||
|
| Code | Meaning |
|
||||||
|
|---|---|
|
||||||
|
| `0` | Success. |
|
||||||
|
| `1` | General error. |
|
||||||
|
| `2` | Manifest validation error. |
|
||||||
|
| `3` | Store integrity error. |
|
||||||
|
|
||||||
|
## D-Bus API (Optional)
|
||||||
|
|
||||||
|
Interface: `org.karapace.Manager1`
|
||||||
|
Path: `/org/karapace/Manager1`
|
||||||
|
|
||||||
|
The D-Bus service exits after 30 seconds of idle (socket activation). Build with `cargo build -p karapace-dbus`.
|
||||||
|
|
||||||
|
All methods return proper D-Bus errors (`org.freedesktop.DBus.Error.Failed`) on failure. Mutating methods acquire the store lock automatically. Methods accepting `id_or_name` resolve by env_id, short_id, name, or prefix.
|
||||||
|
|
||||||
|
Desktop notifications are sent on build success/failure via `org.freedesktop.Notifications`.
|
||||||
|
|
||||||
|
### Properties
|
||||||
|
|
||||||
|
| Property | Type | Description |
|
||||||
|
|---|---|---|
|
||||||
|
| `ApiVersion` | `u32` | API version (currently `1`). |
|
||||||
|
| `StoreRoot` | `String` | Path to the store directory. |
|
||||||
|
|
||||||
|
### Methods
|
||||||
|
|
||||||
|
| Method | Signature | Description |
|
||||||
|
|---|---|---|
|
||||||
|
| `ListEnvironments` | `() → String` | JSON array of `{env_id, short_id, name?, state}`. |
|
||||||
|
| `GetEnvironmentStatus` | `(id_or_name) → String` | JSON status. Resolves by name. |
|
||||||
|
| `GetEnvironmentHash` | `(id_or_name) → String` | Returns env_id hash. Resolves by name. |
|
||||||
|
| `BuildEnvironment` | `(manifest_path) → String` | Build from manifest path. Sends notification. |
|
||||||
|
| `BuildNamedEnvironment` | `(manifest_path, name) → String` | Build and assign a name. Sends notification. |
|
||||||
|
| `DestroyEnvironment` | `(id_or_name) → String` | Destroy environment. Resolves by name. |
|
||||||
|
| `RunEnvironment` | `(id_or_name) → String` | Enter environment. Resolves by name. |
|
||||||
|
| `RenameEnvironment` | `(id_or_name, new_name) → String` | Rename an environment. |
|
||||||
|
| `ListPresets` | `() → String` | JSON array of `{name, description}` for built-in presets. |
|
||||||
|
| `GarbageCollect` | `(dry_run) → String` | Run GC. Acquires store lock. |
|
||||||
|
| `VerifyStore` | `() → String` | Verify store integrity. Returns `{checked, passed, failed}`. |
|
||||||
|
|
||||||
|
## Rust Crate API
|
||||||
|
|
||||||
|
### `karapace-core::Engine`
|
||||||
|
|
||||||
|
- `Engine::new(store_root)` — Create engine instance
|
||||||
|
- `Engine::init(manifest_path)` — Initialize environment (Defined state)
|
||||||
|
- `Engine::build(manifest_path)` — Full resolve → lock → build pipeline
|
||||||
|
- `Engine::enter(env_id)` — Enter environment interactively
|
||||||
|
- `Engine::exec(env_id, command)` — Execute command in environment
|
||||||
|
- `Engine::rebuild(manifest_path)` — Destroy + rebuild
|
||||||
|
- `Engine::stop(env_id)` — Stop running environment
|
||||||
|
- `Engine::freeze(env_id)` — Freeze environment
|
||||||
|
- `Engine::archive(env_id)` — Archive environment (preserve, prevent entry)
|
||||||
|
- `Engine::commit(env_id)` — Commit overlay drift
|
||||||
|
- `Engine::destroy(env_id)` — Destroy environment
|
||||||
|
- `Engine::inspect(env_id)` — Get environment metadata
|
||||||
|
- `Engine::list()` — List all environments
|
||||||
|
- `Engine::gc(dry_run)` — Garbage collection (caller must hold store lock)
|
||||||
|
- `Engine::set_name(env_id, name)` — Set or clear environment name
|
||||||
|
- `Engine::rename(env_id, new_name)` — Rename environment
|
||||||
90
docs/architecture.md
Normal file
90
docs/architecture.md
Normal file
|
|
@ -0,0 +1,90 @@
|
||||||
|
# Karapace Architecture
|
||||||
|
|
||||||
|
## Overview
|
||||||
|
|
||||||
|
Karapace is a deterministic container environment engine organized as a Cargo workspace of 9 crates. Each crate has a single responsibility and clean dependency boundaries.
|
||||||
|
|
||||||
|
## Crate Dependency Graph
|
||||||
|
|
||||||
|
```
|
||||||
|
karapace-cli ─────┬──▶ karapace-core ──┬──▶ karapace-schema
|
||||||
|
│ ├──▶ karapace-store
|
||||||
|
│ ├──▶ karapace-runtime
|
||||||
|
│ └──▶ karapace-remote
|
||||||
|
├──▶ karapace-remote ──▶ karapace-store
|
||||||
|
└──▶ karapace-tui ────▶ karapace-core
|
||||||
|
|
||||||
|
karapace-dbus ────────▶ karapace-core
|
||||||
|
karapace-server ──────▶ karapace-store (standalone HTTP server)
|
||||||
|
```
|
||||||
|
|
||||||
|
## Crate Responsibilities
|
||||||
|
|
||||||
|
### `karapace-schema`
|
||||||
|
Manifest v1 parsing (TOML), normalization, canonical JSON serialization, environment identity hashing, lock file v2 (resolved packages, integrity/intent verification), and built-in presets.
|
||||||
|
|
||||||
|
### `karapace-store`
|
||||||
|
Content-addressable object store (blake3), layer manifests, environment metadata (with naming, ref-counting, state machine), garbage collection with signal cancellation, and store integrity verification. All writes are atomic via `NamedTempFile` + `persist`.
|
||||||
|
|
||||||
|
### `karapace-runtime`
|
||||||
|
Container runtime abstraction (`RuntimeBackend` trait) with three backends:
|
||||||
|
- **Namespace** — `unshare` + `fuse-overlayfs` + `chroot` (unprivileged)
|
||||||
|
- **OCI** — `crun`/`runc`/`youki`
|
||||||
|
- **Mock** — deterministic test backend
|
||||||
|
|
||||||
|
Also handles image downloading, sandbox scripting, host integration (Wayland, GPU, audio, D-Bus), security policy enforcement, and desktop app export.
|
||||||
|
|
||||||
|
### `karapace-core`
|
||||||
|
The `Engine` struct orchestrates the full lifecycle: init → resolve → lock → build → enter/exec → freeze → archive → destroy. Caches `MetadataStore`, `ObjectStore`, and `LayerStore` as fields. Handles drift detection (diff/commit/export via overlay upper_dir scanning) and garbage collection delegation.
|
||||||
|
|
||||||
|
### `karapace-cli`
|
||||||
|
23 CLI commands, each in its own file under `commands/`. Shared helpers in `commands/mod.rs` (spinners, colored output, environment resolution, JSON formatting). `main.rs` is a thin dispatcher. Exit codes: 0 (success), 1 (failure), 2 (manifest error), 3 (store error).
|
||||||
|
|
||||||
|
### `karapace-dbus`
|
||||||
|
Socket-activated D-Bus service (`org.karapace.Manager1`) with 11 methods. Typed serde response structs. Desktop notifications via `notify-rust`. 30-second idle timeout for socket activation. Hardened systemd unit file.
|
||||||
|
|
||||||
|
### `karapace-remote`
|
||||||
|
Remote content-addressable store with `RemoteBackend` trait, HTTP backend (ureq), push/pull transfer with blake3 integrity verification on pull, and a JSON registry for name@tag references.
|
||||||
|
|
||||||
|
### `karapace-tui`
|
||||||
|
Interactive terminal UI (ratatui + crossterm) with list/detail/help views, vim-style keybindings, search/filter, sort cycling, freeze/archive/rename actions, and confirmation dialogs.
|
||||||
|
|
||||||
|
## Key Design Decisions
|
||||||
|
|
||||||
|
1. **Content-addressed identity** — `env_id` is computed from the *resolved* lock file (pinned versions + base image content digest), not from unresolved manifest data.
|
||||||
|
|
||||||
|
2. **Atomic operations** — All store writes use `NamedTempFile` + `persist` for crash safety. Rebuild builds the new environment before destroying the old one.
|
||||||
|
|
||||||
|
3. **No `unwrap()` in production** — All error paths are handled with proper error types (`StoreError`, `CoreError`, `RemoteError`, `RuntimeError`).
|
||||||
|
|
||||||
|
4. **Store locking** — `StoreLock` file lock on all mutating operations (CLI + D-Bus). GC respects active/archived environments.
|
||||||
|
|
||||||
|
5. **Layered security** — Mount whitelist, device policy, env var allow/deny, resource limits. No privilege escalation.
|
||||||
|
|
||||||
|
## Data Flow
|
||||||
|
|
||||||
|
```
|
||||||
|
Manifest (TOML)
|
||||||
|
│
|
||||||
|
▼
|
||||||
|
NormalizedManifest (canonical JSON)
|
||||||
|
│
|
||||||
|
▼ resolve (RuntimeBackend)
|
||||||
|
ResolutionResult (base_image_digest + resolved_packages)
|
||||||
|
│
|
||||||
|
▼
|
||||||
|
LockFile v2 (pinned, verifiable)
|
||||||
|
│
|
||||||
|
▼ compute_identity()
|
||||||
|
EnvIdentity (env_id = blake3 of canonical lock)
|
||||||
|
│
|
||||||
|
▼ build (store objects + layers + metadata)
|
||||||
|
Built Environment (overlay filesystem)
|
||||||
|
```
|
||||||
|
|
||||||
|
### `karapace-server`
|
||||||
|
Reference remote server implementing protocol v1 over HTTP (tiny_http). Provides blob storage, registry, and list endpoints. Used for testing push/pull workflows.
|
||||||
|
|
||||||
|
## Test Coverage
|
||||||
|
|
||||||
|
417 tests across all crates. 24 ignored tests require privileged operations (real `unshare`, `fuse-overlayfs`, ENOSPC simulation, namespace access).
|
||||||
84
docs/cli-stability.md
Normal file
84
docs/cli-stability.md
Normal file
|
|
@ -0,0 +1,84 @@
|
||||||
|
# Karapace CLI Stability Contract
|
||||||
|
|
||||||
|
## Scope
|
||||||
|
|
||||||
|
This document defines the stability guarantee for the Karapace CLI between 1.x releases.
|
||||||
|
|
||||||
|
## Stable Commands (21)
|
||||||
|
|
||||||
|
The following commands have **stable signatures** — no breaking changes to arguments, flags, or output format between 1.x releases:
|
||||||
|
|
||||||
|
| Command | Description |
|
||||||
|
|---------|-------------|
|
||||||
|
| `build` | Build environment from manifest |
|
||||||
|
| `rebuild` | Destroy + rebuild environment |
|
||||||
|
| `enter` | Enter environment interactively |
|
||||||
|
| `exec` | Execute command inside environment |
|
||||||
|
| `destroy` | Destroy environment |
|
||||||
|
| `stop` | Stop a running environment |
|
||||||
|
| `freeze` | Freeze environment (read-only overlay) |
|
||||||
|
| `archive` | Archive environment (preserve, prevent entry) |
|
||||||
|
| `list` | List all environments |
|
||||||
|
| `inspect` | Show environment metadata |
|
||||||
|
| `diff` | Show overlay drift |
|
||||||
|
| `snapshots` | List snapshots for an environment |
|
||||||
|
| `commit` | Commit overlay drift as snapshot |
|
||||||
|
| `restore` | Restore overlay from snapshot |
|
||||||
|
| `gc` | Garbage collect orphaned store data |
|
||||||
|
| `verify-store` | Check store integrity |
|
||||||
|
| `push` | Push environment to remote store |
|
||||||
|
| `pull` | Pull environment from remote store |
|
||||||
|
| `rename` | Rename environment |
|
||||||
|
| `doctor` | Run diagnostic checks on system and store |
|
||||||
|
| `migrate` | Check store version and show migration guidance |
|
||||||
|
|
||||||
|
## Zero-Maintenance Commands (2)
|
||||||
|
|
||||||
|
These commands are auto-generated and have no hand-maintained logic:
|
||||||
|
|
||||||
|
| Command | Description |
|
||||||
|
|---------|-------------|
|
||||||
|
| `completions` | Generate shell completions (bash/zsh/fish/elvish/powershell) |
|
||||||
|
| `man-pages` | Generate man pages |
|
||||||
|
|
||||||
|
**Total: 23 commands.**
|
||||||
|
|
||||||
|
## Global Flags
|
||||||
|
|
||||||
|
All commands accept these flags (stable):
|
||||||
|
|
||||||
|
- `--store <path>` — custom store location (default: `~/.local/share/karapace`)
|
||||||
|
- `--json` — structured JSON output on all query and store commands
|
||||||
|
- `--verbose` / `-v` — enable debug logging
|
||||||
|
- `--trace` — enable trace-level logging (more detailed than `--verbose`)
|
||||||
|
|
||||||
|
## What "Stable" Means
|
||||||
|
|
||||||
|
- **No removed flags** — existing flags continue to work.
|
||||||
|
- **No changed flag semantics** — same flag produces same behavior.
|
||||||
|
- **No changed exit codes** — exit code meanings are fixed.
|
||||||
|
- **No changed JSON output keys** — new keys may be added, existing keys are never removed or renamed.
|
||||||
|
- **New flags may be added** — additive changes are allowed.
|
||||||
|
|
||||||
|
## What May Change
|
||||||
|
|
||||||
|
- Human-readable (non-JSON) output formatting.
|
||||||
|
- Spinner and progress indicator appearance.
|
||||||
|
- Error message wording (not error codes).
|
||||||
|
- Addition of new commands.
|
||||||
|
- Addition of new optional flags to existing commands.
|
||||||
|
|
||||||
|
## Removed Commands
|
||||||
|
|
||||||
|
The following commands were removed before 1.0 and will not return:
|
||||||
|
|
||||||
|
`init`, `preset`, `list-presets`, `export-app`, `unexport-app`, `quick`, `validate`, `verify-lock`, `export`, `list-images`, `remove-image`, `remote-list`, `tui`
|
||||||
|
|
||||||
|
## Exit Codes
|
||||||
|
|
||||||
|
| Code | Meaning |
|
||||||
|
|------|---------|
|
||||||
|
| 0 | Success |
|
||||||
|
| 1 | General failure |
|
||||||
|
| 2 | Manifest error (parse, validation) |
|
||||||
|
| 3 | Store error (integrity, version mismatch) |
|
||||||
77
docs/e2e-testing.md
Normal file
77
docs/e2e-testing.md
Normal file
|
|
@ -0,0 +1,77 @@
|
||||||
|
# End-to-End Testing
|
||||||
|
|
||||||
|
Karapace includes end-to-end tests that exercise the real namespace backend with `unshare`, `fuse-overlayfs`, and actual container images.
|
||||||
|
|
||||||
|
## Prerequisites
|
||||||
|
|
||||||
|
- Linux with user namespace support (`CONFIG_USER_NS=y`)
|
||||||
|
- `fuse-overlayfs` installed
|
||||||
|
- `curl` installed
|
||||||
|
- Network access (images are downloaded from `images.linuxcontainers.org`)
|
||||||
|
|
||||||
|
### Install on openSUSE Tumbleweed
|
||||||
|
|
||||||
|
```bash
|
||||||
|
sudo zypper install fuse-overlayfs curl
|
||||||
|
```
|
||||||
|
|
||||||
|
### Install on Ubuntu/Debian
|
||||||
|
|
||||||
|
```bash
|
||||||
|
sudo apt-get install fuse-overlayfs curl
|
||||||
|
```
|
||||||
|
|
||||||
|
### Install on Fedora
|
||||||
|
|
||||||
|
```bash
|
||||||
|
sudo dnf install fuse-overlayfs curl
|
||||||
|
```
|
||||||
|
|
||||||
|
## Running E2E Tests
|
||||||
|
|
||||||
|
E2E tests are `#[ignore]` by default. Run them explicitly:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
cargo test --test e2e -- --ignored --test-threads=1
|
||||||
|
```
|
||||||
|
|
||||||
|
The `--test-threads=1` flag is important: E2E tests mount overlays and download images, so parallel execution can cause resource conflicts.
|
||||||
|
|
||||||
|
## Test Descriptions
|
||||||
|
|
||||||
|
| Test | What it does |
|
||||||
|
|---|---|
|
||||||
|
| `e2e_build_minimal_namespace` | Build a minimal openSUSE Tumbleweed environment with no packages |
|
||||||
|
| `e2e_exec_in_namespace` | Build + exec `echo hello` inside the container |
|
||||||
|
| `e2e_destroy_cleans_up` | Build + destroy, verify env_dir is removed |
|
||||||
|
| `e2e_rebuild_determinism` | Build + rebuild, verify env_id is identical |
|
||||||
|
| `e2e_build_with_packages` | Build with `which` package, verify resolved versions in lock file |
|
||||||
|
|
||||||
|
## CI
|
||||||
|
|
||||||
|
The GitHub Actions CI workflow includes an E2E job that runs on `ubuntu-latest`:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
e2e:
|
||||||
|
name: E2E Tests
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
needs: [test]
|
||||||
|
steps:
|
||||||
|
- uses: actions/checkout@v4
|
||||||
|
- uses: dtolnay/rust-toolchain@stable
|
||||||
|
- uses: Swatinem/rust-cache@v2
|
||||||
|
- name: Install prerequisites
|
||||||
|
run: |
|
||||||
|
sudo apt-get update -qq
|
||||||
|
sudo apt-get install -y -qq fuse-overlayfs curl
|
||||||
|
sudo sysctl -w kernel.unprivileged_userns_clone=1 || true
|
||||||
|
- name: Run E2E tests
|
||||||
|
run: cargo test --test e2e -- --ignored --test-threads=1
|
||||||
|
```
|
||||||
|
|
||||||
|
## Troubleshooting
|
||||||
|
|
||||||
|
- **"unshare: user namespaces not available"** — Enable with `sysctl kernel.unprivileged_userns_clone=1`
|
||||||
|
- **"fuse-overlayfs not found"** — Install the `fuse-overlayfs` package
|
||||||
|
- **"failed to download image"** — Check network connectivity and DNS
|
||||||
|
- **Stale mounts after failed test** — Run `fusermount3 -u /path/to/merged` or reboot
|
||||||
282
docs/getting-started.md
Normal file
282
docs/getting-started.md
Normal file
|
|
@ -0,0 +1,282 @@
|
||||||
|
# Getting Started with Karapace
|
||||||
|
|
||||||
|
Karapace creates isolated, reproducible development environments on Linux using
|
||||||
|
namespaces and overlay filesystems. No root, no daemon, no Docker.
|
||||||
|
|
||||||
|
This guide walks you through installation, first use, and common workflows.
|
||||||
|
|
||||||
|
## Prerequisites
|
||||||
|
|
||||||
|
Karapace requires a Linux system with:
|
||||||
|
|
||||||
|
- **User namespace support** (`CONFIG_USER_NS=y` — enabled on all major distros)
|
||||||
|
- **fuse-overlayfs** (overlay filesystem in userspace)
|
||||||
|
- **curl** (for downloading base images)
|
||||||
|
|
||||||
|
Optional:
|
||||||
|
|
||||||
|
- **crun**, **runc**, or **youki** (only if using the OCI backend)
|
||||||
|
|
||||||
|
### Install prerequisites by distro
|
||||||
|
|
||||||
|
**openSUSE Tumbleweed / Leap:**
|
||||||
|
```bash
|
||||||
|
sudo zypper install fuse-overlayfs curl
|
||||||
|
```
|
||||||
|
|
||||||
|
**Ubuntu / Debian:**
|
||||||
|
```bash
|
||||||
|
sudo apt install fuse-overlayfs curl
|
||||||
|
```
|
||||||
|
|
||||||
|
**Fedora:**
|
||||||
|
```bash
|
||||||
|
sudo dnf install fuse-overlayfs curl
|
||||||
|
```
|
||||||
|
|
||||||
|
**Arch Linux:**
|
||||||
|
```bash
|
||||||
|
sudo pacman -S fuse-overlayfs curl
|
||||||
|
```
|
||||||
|
|
||||||
|
Run `karapace doctor` at any time to check that all prerequisites are met.
|
||||||
|
|
||||||
|
## Installation
|
||||||
|
|
||||||
|
### From source (recommended)
|
||||||
|
|
||||||
|
```bash
|
||||||
|
git clone https://github.com/marcoallegretti/karapace.git
|
||||||
|
cd karapace
|
||||||
|
cargo build --release
|
||||||
|
sudo install -Dm755 target/release/karapace /usr/local/bin/karapace
|
||||||
|
```
|
||||||
|
|
||||||
|
### Via cargo install
|
||||||
|
|
||||||
|
```bash
|
||||||
|
cargo install --git https://github.com/marcoallegretti/karapace.git karapace-cli
|
||||||
|
```
|
||||||
|
|
||||||
|
### Shell completions
|
||||||
|
|
||||||
|
```bash
|
||||||
|
# Bash
|
||||||
|
karapace completions bash > ~/.local/share/bash-completion/completions/karapace
|
||||||
|
|
||||||
|
# Zsh
|
||||||
|
karapace completions zsh > ~/.local/share/zsh/site-functions/_karapace
|
||||||
|
|
||||||
|
# Fish
|
||||||
|
karapace completions fish > ~/.config/fish/completions/karapace.fish
|
||||||
|
```
|
||||||
|
|
||||||
|
## Your first environment
|
||||||
|
|
||||||
|
### 1. Write a manifest
|
||||||
|
|
||||||
|
Create a file called `karapace.toml`:
|
||||||
|
|
||||||
|
```toml
|
||||||
|
manifest_version = 1
|
||||||
|
|
||||||
|
[base]
|
||||||
|
image = "rolling" # openSUSE Tumbleweed
|
||||||
|
|
||||||
|
[system]
|
||||||
|
packages = ["git", "curl"]
|
||||||
|
|
||||||
|
[runtime]
|
||||||
|
backend = "namespace"
|
||||||
|
```
|
||||||
|
|
||||||
|
Available base images: `"rolling"` (openSUSE Tumbleweed), `"ubuntu/24.04"`,
|
||||||
|
`"debian/12"`, `"fedora/41"`, `"arch"`.
|
||||||
|
|
||||||
|
### 2. Build the environment
|
||||||
|
|
||||||
|
```bash
|
||||||
|
karapace build
|
||||||
|
```
|
||||||
|
|
||||||
|
This downloads the base image, installs the requested packages, and produces
|
||||||
|
a content-addressed environment. The output shows the environment ID (`env_id`)
|
||||||
|
and a short ID for convenience.
|
||||||
|
|
||||||
|
### 3. Enter the environment
|
||||||
|
|
||||||
|
```bash
|
||||||
|
karapace enter <env_id>
|
||||||
|
```
|
||||||
|
|
||||||
|
You can use the short ID (first 8 characters) or a name instead of the full ID.
|
||||||
|
Inside the environment you have a full Linux userspace with the packages you
|
||||||
|
requested.
|
||||||
|
|
||||||
|
### 4. Run a single command
|
||||||
|
|
||||||
|
```bash
|
||||||
|
karapace exec <env_id> -- git --version
|
||||||
|
```
|
||||||
|
|
||||||
|
## Naming environments
|
||||||
|
|
||||||
|
By default, environments are identified by their content hash. You can assign
|
||||||
|
a human-readable name:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
karapace build --name mydev
|
||||||
|
karapace enter mydev
|
||||||
|
```
|
||||||
|
|
||||||
|
Or rename an existing environment:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
karapace rename <env_id> mydev
|
||||||
|
```
|
||||||
|
|
||||||
|
## Common workflows
|
||||||
|
|
||||||
|
### Snapshot and restore
|
||||||
|
|
||||||
|
After making changes inside an environment (installing extra packages, editing
|
||||||
|
config files), you can snapshot and later restore:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
# See what changed
|
||||||
|
karapace diff mydev
|
||||||
|
|
||||||
|
# Save a snapshot
|
||||||
|
karapace commit mydev
|
||||||
|
|
||||||
|
# List snapshots
|
||||||
|
karapace snapshots mydev
|
||||||
|
|
||||||
|
# Restore a previous snapshot
|
||||||
|
karapace restore mydev <snapshot_hash>
|
||||||
|
```
|
||||||
|
|
||||||
|
### Freeze and archive
|
||||||
|
|
||||||
|
```bash
|
||||||
|
# Freeze: prevent further changes (still enterable in read-only mode)
|
||||||
|
karapace freeze mydev
|
||||||
|
|
||||||
|
# Archive: preserve metadata but prevent entry
|
||||||
|
karapace archive mydev
|
||||||
|
```
|
||||||
|
|
||||||
|
### Rebuild from scratch
|
||||||
|
|
||||||
|
If you change your manifest, rebuild destroys the old environment and builds
|
||||||
|
a new one:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
karapace rebuild
|
||||||
|
```
|
||||||
|
|
||||||
|
### Push and pull (remote sharing)
|
||||||
|
|
||||||
|
```bash
|
||||||
|
# Push to a remote store
|
||||||
|
karapace push mydev --tag my-env@latest
|
||||||
|
|
||||||
|
# Pull on another machine
|
||||||
|
karapace pull my-env@latest --remote https://your-server.example.com
|
||||||
|
```
|
||||||
|
|
||||||
|
### GUI application export
|
||||||
|
|
||||||
|
Export a GUI application from inside the container to your host desktop:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
karapace exec mydev -- karapace-export-app firefox
|
||||||
|
```
|
||||||
|
|
||||||
|
This creates a `.desktop` file on the host that launches the app inside the
|
||||||
|
container with GPU and audio passthrough.
|
||||||
|
|
||||||
|
## Hardware passthrough
|
||||||
|
|
||||||
|
Enable GPU and audio in your manifest:
|
||||||
|
|
||||||
|
```toml
|
||||||
|
[hardware]
|
||||||
|
gpu = true # Passes /dev/dri into the container
|
||||||
|
audio = true # Passes PipeWire/PulseAudio socket
|
||||||
|
```
|
||||||
|
|
||||||
|
Karapace also forwards Wayland, X11, D-Bus session bus, SSH agent, fonts,
|
||||||
|
and GTK/icon themes automatically when available.
|
||||||
|
|
||||||
|
## Custom bind mounts
|
||||||
|
|
||||||
|
Mount host directories into the container:
|
||||||
|
|
||||||
|
```toml
|
||||||
|
[mounts]
|
||||||
|
workspace = "~/projects:/workspace"
|
||||||
|
data = "/data/datasets:/datasets"
|
||||||
|
```
|
||||||
|
|
||||||
|
## Built-in presets
|
||||||
|
|
||||||
|
For quick setup without writing a manifest:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
# List available presets
|
||||||
|
karapace list-presets
|
||||||
|
|
||||||
|
# Build from a preset
|
||||||
|
karapace preset dev-rust
|
||||||
|
```
|
||||||
|
|
||||||
|
Available presets: `dev`, `dev-rust`, `dev-python`, `gui-app`, `gaming`, `minimal`.
|
||||||
|
|
||||||
|
## Quick one-liner
|
||||||
|
|
||||||
|
The `quick` command combines build + enter in a single step:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
karapace quick
|
||||||
|
```
|
||||||
|
|
||||||
|
This uses the `karapace.toml` in the current directory (or creates a minimal one).
|
||||||
|
|
||||||
|
## Diagnostics
|
||||||
|
|
||||||
|
```bash
|
||||||
|
# Check system prerequisites
|
||||||
|
karapace doctor
|
||||||
|
|
||||||
|
# Verify store integrity
|
||||||
|
karapace verify-store
|
||||||
|
|
||||||
|
# List all environments
|
||||||
|
karapace list
|
||||||
|
|
||||||
|
# Inspect an environment
|
||||||
|
karapace inspect mydev
|
||||||
|
|
||||||
|
# Garbage collect unused objects
|
||||||
|
karapace gc --dry-run
|
||||||
|
karapace gc
|
||||||
|
```
|
||||||
|
|
||||||
|
## Environment variables
|
||||||
|
|
||||||
|
| Variable | Effect |
|
||||||
|
|----------|--------|
|
||||||
|
| `KARAPACE_LOG` | Log level: `error`, `warn`, `info`, `debug`, `trace` |
|
||||||
|
| `KARAPACE_STORE` | Custom store directory (default: `~/.local/share/karapace`) |
|
||||||
|
|
||||||
|
Or use CLI flags: `--verbose` / `-v` for debug, `--trace` for trace,
|
||||||
|
`--store <path>` for a custom store, `--json` for machine-readable output.
|
||||||
|
|
||||||
|
## Next steps
|
||||||
|
|
||||||
|
- [Manifest v1 Specification](manifest-spec.md) — full manifest reference
|
||||||
|
- [Architecture Overview](architecture.md) — how Karapace works internally
|
||||||
|
- [CLI Stability Contract](cli-stability.md) — which commands are stable
|
||||||
|
- [Security Model](security-model.md) — isolation guarantees and threat model
|
||||||
|
- [Verification](verification.md) — verifying release artifact integrity
|
||||||
60
docs/hash-contract.md
Normal file
60
docs/hash-contract.md
Normal file
|
|
@ -0,0 +1,60 @@
|
||||||
|
# Karapace Hash Contract
|
||||||
|
|
||||||
|
## Overview
|
||||||
|
|
||||||
|
The environment identity (`env_id`) is a deterministic blake3 hash that uniquely identifies an environment's fully resolved state. Two identical lock files on any machine must produce the same `env_id`.
|
||||||
|
|
||||||
|
## Algorithm
|
||||||
|
|
||||||
|
Blake3 (256-bit output, hex-encoded, 64 characters).
|
||||||
|
|
||||||
|
## Two-Phase Identity
|
||||||
|
|
||||||
|
Karapace computes identity in two phases:
|
||||||
|
|
||||||
|
### Preliminary Identity (`compute_env_id`)
|
||||||
|
|
||||||
|
Used only during `init` (before resolution) and for internal lookup. Computed from unresolved manifest data. **Not the canonical identity.**
|
||||||
|
|
||||||
|
### Canonical Identity (`LockFile::compute_identity`)
|
||||||
|
|
||||||
|
The authoritative identity used after `build`. Computed from the fully resolved lock file state. This is what gets stored in metadata and the lock file.
|
||||||
|
|
||||||
|
## Canonical Hash Input
|
||||||
|
|
||||||
|
The canonical hash includes the following inputs, fed in order:
|
||||||
|
|
||||||
|
1. **Base image content digest**: `base_digest:<blake3_of_rootfs>` — real content hash, not a tag name hash.
|
||||||
|
2. **Resolved packages**: each as `pkg:<name>@<version>` (sorted by name).
|
||||||
|
3. **Resolved apps**: each as `app:<name>` (sorted).
|
||||||
|
4. **Hardware policy**: `hw:gpu` if GPU enabled, `hw:audio` if audio enabled.
|
||||||
|
5. **Mount policy**: each as `mount:<label>:<host_path>:<container_path>` (sorted by label).
|
||||||
|
6. **Runtime backend**: `backend:<name>` (lowercased).
|
||||||
|
7. **Network isolation**: `net:isolated` if enabled.
|
||||||
|
8. **CPU shares**: `cpu:<value>` if set.
|
||||||
|
9. **Memory limit**: `mem:<value>` if set.
|
||||||
|
|
||||||
|
## Hash MUST NOT Include
|
||||||
|
|
||||||
|
- Writable overlay state (mutable drift).
|
||||||
|
- Timestamps (creation, modification).
|
||||||
|
- Host-specific non-declared paths.
|
||||||
|
- Machine identifiers (hostname, MAC, etc.).
|
||||||
|
- Store location.
|
||||||
|
- Unresolved package names without versions.
|
||||||
|
|
||||||
|
## Properties
|
||||||
|
|
||||||
|
- **Deterministic**: same resolved inputs → same hash, always.
|
||||||
|
- **Stable**: consistent across identical systems with same resolved packages.
|
||||||
|
- **Immutable**: once built, the env_id never changes for that lock state.
|
||||||
|
- **Version-sensitive**: different package versions produce different identities.
|
||||||
|
|
||||||
|
## Short ID
|
||||||
|
|
||||||
|
The `short_id` is the first 12 hex characters of `env_id`. Used for display and prefix-matching in the CLI.
|
||||||
|
|
||||||
|
## Implementation
|
||||||
|
|
||||||
|
- **Canonical**: `karapace-schema/src/lock.rs::LockFile::compute_identity()`
|
||||||
|
- **Preliminary**: `karapace-schema/src/identity.rs::compute_env_id()`
|
||||||
77
docs/layer-limitations-v1.md
Normal file
77
docs/layer-limitations-v1.md
Normal file
|
|
@ -0,0 +1,77 @@
|
||||||
|
# Karapace Layer Limitations — Phase 1 (v1.0)
|
||||||
|
|
||||||
|
## Overview
|
||||||
|
|
||||||
|
Karapace 1.0 ships with Phase 1 layer support: deterministic tar-based content-addressed layers. This document describes what is supported, what is not, and what is planned for future phases.
|
||||||
|
|
||||||
|
## Supported (Phase 1)
|
||||||
|
|
||||||
|
- **Regular files** — full content preservation, deterministic packing.
|
||||||
|
- **Directories** — including empty directories.
|
||||||
|
- **Symbolic links** — target path preserved exactly.
|
||||||
|
- **Deterministic packing** — sorted entries, zero timestamps (`mtime = 0`), owner `0:0`, consistent permissions.
|
||||||
|
- **Content addressing** — blake3 hash of the tar archive.
|
||||||
|
- **Snapshot layers** — `commit` captures overlay upper directory as a tar, `restore` unpacks it atomically.
|
||||||
|
- **Composite snapshot identity** — snapshot layer hash is `blake3("snapshot:{env_id}:{base_layer}:{tar_hash}")` to prevent collision with base layers.
|
||||||
|
- **Atomic restore** — unpack to staging directory, then rename-swap with the upper directory.
|
||||||
|
|
||||||
|
## Not Supported (Phase 1)
|
||||||
|
|
||||||
|
The following filesystem features are **silently dropped** during `pack_layer`:
|
||||||
|
|
||||||
|
| Feature | Status | Planned |
|
||||||
|
|---------|--------|---------|
|
||||||
|
| Extended attributes (xattrs) | Dropped | Phase 2 (1.1) |
|
||||||
|
| Device nodes | Dropped | Phase 2 (1.1) |
|
||||||
|
| Hardlinks | Stored as regular files (deduplicated content) | Phase 2 (1.1) |
|
||||||
|
| SELinux labels | Dropped | Phase 2 (1.1) |
|
||||||
|
| ACLs | Dropped | Phase 2 (1.1) |
|
||||||
|
| Sparse files | Stored as full files | Phase 2 (1.1) |
|
||||||
|
| UID/GID remapping | Not supported | Phase 3 (2.0) |
|
||||||
|
| Per-file dedup | Not supported | Phase 3 (2.0) |
|
||||||
|
| Whiteout files (overlay deletion markers) | Included as regular files | Phase 2 (1.1) |
|
||||||
|
|
||||||
|
## Implications
|
||||||
|
|
||||||
|
### Security-Sensitive Workloads
|
||||||
|
|
||||||
|
Environments relying on SELinux labels, xattrs for capabilities (`security.capability`), or ACLs will not have those attributes preserved across `commit`/`restore` cycles. This is acceptable for development environments but not for production container images.
|
||||||
|
|
||||||
|
### Hardlinks
|
||||||
|
|
||||||
|
If two files in the upper directory are hardlinked, they will be stored as separate regular files in the tar. This means:
|
||||||
|
- Restoring from a snapshot may increase disk usage.
|
||||||
|
- File identity (inode sharing) is not preserved.
|
||||||
|
|
||||||
|
### Device Nodes
|
||||||
|
|
||||||
|
Device nodes (`/dev/*`) created inside the environment are dropped during packing. This is intentional — device nodes are host-specific and should not be stored in content-addressed layers.
|
||||||
|
|
||||||
|
### Whiteout Handling
|
||||||
|
|
||||||
|
Overlay whiteout files (`.wh.*` and `.wh..wh..opq`) are currently stored as-is in the tar. They are only meaningful when applied on top of the correct base layer. Restoring a snapshot to a different base layer may produce incorrect results.
|
||||||
|
|
||||||
|
## Determinism Guarantees
|
||||||
|
|
||||||
|
| Property | Guaranteed |
|
||||||
|
|----------|-----------|
|
||||||
|
| Same directory content → same tar bytes | Yes |
|
||||||
|
| Same tar bytes → same blake3 hash | Yes |
|
||||||
|
| Roundtrip fidelity (regular files, dirs, symlinks) | Yes |
|
||||||
|
| Timestamp preservation | No (zeroed for determinism) |
|
||||||
|
| Owner/group preservation | No (set to 0:0) |
|
||||||
|
| Permission preservation | Yes (mode bits preserved) |
|
||||||
|
|
||||||
|
## Phase 2 Roadmap (1.1)
|
||||||
|
|
||||||
|
- Extended attribute support via `tar` crate's xattr feature.
|
||||||
|
- Hardlink detection and deduplication within a single layer.
|
||||||
|
- Overlay whiteout awareness (proper deletion semantics).
|
||||||
|
- Device node opt-in for privileged builds.
|
||||||
|
- SELinux label preservation.
|
||||||
|
|
||||||
|
## Phase 3 Roadmap (2.0)
|
||||||
|
|
||||||
|
- UID/GID remapping for rootless environments.
|
||||||
|
- Per-file content deduplication across layers.
|
||||||
|
- Layer diffing and incremental snapshots.
|
||||||
94
docs/lock-spec.md
Normal file
94
docs/lock-spec.md
Normal file
|
|
@ -0,0 +1,94 @@
|
||||||
|
# Karapace Lock File Specification (v2)
|
||||||
|
|
||||||
|
## Overview
|
||||||
|
|
||||||
|
The lock file (`karapace.lock`) captures the fully resolved state of an environment at build time. It ensures reproducible builds by pinning all dependency versions and the base image content digest.
|
||||||
|
|
||||||
|
The environment identity (`env_id`) is computed from the **locked** state — resolved package versions and content digest — not from unresolved manifest data. This guarantees: same lockfile → same env_id → same environment.
|
||||||
|
|
||||||
|
## Format
|
||||||
|
|
||||||
|
TOML with the following fields:
|
||||||
|
|
||||||
|
| Field | Type | Description |
|
||||||
|
|---|---|---|
|
||||||
|
| `lock_version` | `u32` | Lock format version. Must be `2`. |
|
||||||
|
| `env_id` | `string` | Full 64-character blake3 hex digest computed from locked state. |
|
||||||
|
| `short_id` | `string` | First 12 characters of `env_id`. |
|
||||||
|
| `base_image` | `string` | Base image identifier from manifest (e.g. `"rolling"`). |
|
||||||
|
| `base_image_digest` | `string` | Blake3 content digest of the actual base image rootfs. |
|
||||||
|
| `resolved_packages` | `array` | Sorted list of `{ name, version }` tables with pinned versions. |
|
||||||
|
| `resolved_apps` | `string[]` | Sorted, deduplicated list of resolved GUI apps. |
|
||||||
|
| `runtime_backend` | `string` | Normalized runtime backend name (lowercased). |
|
||||||
|
| `hardware_gpu` | `bool` | Whether GPU passthrough is requested. |
|
||||||
|
| `hardware_audio` | `bool` | Whether audio passthrough is requested. |
|
||||||
|
| `network_isolation` | `bool` | Whether network is isolated. |
|
||||||
|
| `mounts` | `array` | Sorted list of `{ label, host_path, container_path }` tables. |
|
||||||
|
| `cpu_shares` | `u64?` | CPU shares limit (optional). |
|
||||||
|
| `memory_limit_mb` | `u64?` | Memory limit in MB (optional). |
|
||||||
|
|
||||||
|
## Resolved Packages
|
||||||
|
|
||||||
|
Each entry in `resolved_packages` is a table:
|
||||||
|
|
||||||
|
```toml
|
||||||
|
[[resolved_packages]]
|
||||||
|
name = "git"
|
||||||
|
version = "2.44.0-1"
|
||||||
|
|
||||||
|
[[resolved_packages]]
|
||||||
|
name = "clang"
|
||||||
|
version = "17.0.6-1"
|
||||||
|
```
|
||||||
|
|
||||||
|
Versions are queried from the actual package manager inside the base image during the resolve phase. This ensures identity is based on real installed versions, not just package names.
|
||||||
|
|
||||||
|
## Invariants
|
||||||
|
|
||||||
|
- The lock file contains **content digests**, not tags or mutable references.
|
||||||
|
- `base_image_digest` is a blake3 hash of the actual rootfs content, not a hash of the image tag name.
|
||||||
|
- `env_id` is computed from all locked fields via `LockFile::compute_identity()`.
|
||||||
|
- Verification is split into two checks:
|
||||||
|
- **Integrity**: `verify_integrity()` — recomputes `env_id` and compares to the stored value.
|
||||||
|
- **Manifest intent**: `verify_manifest_intent()` — checks that the manifest hasn't drifted from what was locked.
|
||||||
|
|
||||||
|
## Generation
|
||||||
|
|
||||||
|
- Generated automatically by `karapace init` (with preliminary unresolved versions) and `karapace build` (with fully resolved versions).
|
||||||
|
- Written atomically (tempfile + rename) to the same directory as the manifest.
|
||||||
|
- Should be committed to version control for reproducible builds.
|
||||||
|
|
||||||
|
## Manual Override
|
||||||
|
|
||||||
|
- The lock file can only be regenerated by re-running `karapace build`.
|
||||||
|
- There is no `karapace lock --update` command; rebuilding is the only path.
|
||||||
|
- `karapace verify-lock` checks both integrity and manifest consistency.
|
||||||
|
|
||||||
|
## Example
|
||||||
|
|
||||||
|
```toml
|
||||||
|
lock_version = 2
|
||||||
|
env_id = "46e1d96fdd6fd988092fbcd19b1d89f2b080f3e74d0f4984b4ba45ca5b95e594"
|
||||||
|
short_id = "46e1d96fdd6f"
|
||||||
|
base_image = "rolling"
|
||||||
|
base_image_digest = "a1b2c3d4e5f6..."
|
||||||
|
runtime_backend = "namespace"
|
||||||
|
hardware_gpu = true
|
||||||
|
hardware_audio = false
|
||||||
|
network_isolation = false
|
||||||
|
|
||||||
|
[[resolved_packages]]
|
||||||
|
name = "clang"
|
||||||
|
version = "17.0.6-1"
|
||||||
|
|
||||||
|
[[resolved_packages]]
|
||||||
|
name = "git"
|
||||||
|
version = "2.44.0-1"
|
||||||
|
|
||||||
|
resolved_apps = ["debugger", "ide"]
|
||||||
|
|
||||||
|
[[mounts]]
|
||||||
|
label = "workspace"
|
||||||
|
host_path = "./"
|
||||||
|
container_path = "/workspace"
|
||||||
|
```
|
||||||
113
docs/manifest-spec.md
Normal file
113
docs/manifest-spec.md
Normal file
|
|
@ -0,0 +1,113 @@
|
||||||
|
# Karapace Manifest v0.1 Specification
|
||||||
|
|
||||||
|
## Overview
|
||||||
|
|
||||||
|
The Karapace manifest is a TOML file (typically `karapace.toml`) that declaratively defines an environment. It is the single source of truth for environment identity.
|
||||||
|
|
||||||
|
## Schema
|
||||||
|
|
||||||
|
### Required Fields
|
||||||
|
|
||||||
|
| Field | Type | Description |
|
||||||
|
|---|---|---|
|
||||||
|
| `manifest_version` | `u32` | Must be `1`. |
|
||||||
|
| `base.image` | `string` | Base image identifier. Must not be empty. |
|
||||||
|
|
||||||
|
### Optional Sections
|
||||||
|
|
||||||
|
#### `[system]`
|
||||||
|
|
||||||
|
| Field | Type | Default | Description |
|
||||||
|
|---|---|---|---|
|
||||||
|
| `packages` | `string[]` | `[]` | System packages to install. Duplicates are deduplicated during normalization. |
|
||||||
|
|
||||||
|
#### `[gui]`
|
||||||
|
|
||||||
|
| Field | Type | Default | Description |
|
||||||
|
|---|---|---|---|
|
||||||
|
| `apps` | `string[]` | `[]` | GUI applications to install. |
|
||||||
|
|
||||||
|
#### `[hardware]`
|
||||||
|
|
||||||
|
| Field | Type | Default | Description |
|
||||||
|
|---|---|---|---|
|
||||||
|
| `gpu` | `bool` | `false` | Request GPU passthrough (`/dev/dri`). |
|
||||||
|
| `audio` | `bool` | `false` | Request audio device passthrough (`/dev/snd`). |
|
||||||
|
|
||||||
|
#### `[mounts]`
|
||||||
|
|
||||||
|
Flat key-value pairs. Each key is a label; each value is `<host_path>:<container_path>`.
|
||||||
|
|
||||||
|
- Labels must not be empty.
|
||||||
|
- The `:` separator is required.
|
||||||
|
- Absolute host paths are validated against the mount whitelist.
|
||||||
|
- Relative host paths (e.g. `./`) are always permitted.
|
||||||
|
|
||||||
|
#### `[runtime]`
|
||||||
|
|
||||||
|
| Field | Type | Default | Description |
|
||||||
|
|---|---|---|---|
|
||||||
|
| `backend` | `string` | `"namespace"` | Runtime backend: `namespace`, `oci`, or `mock`. |
|
||||||
|
| `network_isolation` | `bool` | `false` | Isolate network from host. |
|
||||||
|
|
||||||
|
#### `[runtime.resource_limits]`
|
||||||
|
|
||||||
|
| Field | Type | Default | Description |
|
||||||
|
|---|---|---|---|
|
||||||
|
| `cpu_shares` | `u64?` | `null` | CPU shares limit. |
|
||||||
|
| `memory_limit_mb` | `u64?` | `null` | Memory limit in MB. |
|
||||||
|
|
||||||
|
## Validation Rules
|
||||||
|
|
||||||
|
1. `manifest_version` must equal `1`.
|
||||||
|
2. Unknown fields at any level cause a parse error (`deny_unknown_fields`).
|
||||||
|
3. `base.image` must not be empty or whitespace-only.
|
||||||
|
4. Mount specs must contain exactly one `:` with non-empty sides.
|
||||||
|
|
||||||
|
## Normalization
|
||||||
|
|
||||||
|
During normalization:
|
||||||
|
|
||||||
|
- All string values are trimmed.
|
||||||
|
- `system.packages` and `gui.apps` are sorted, deduplicated.
|
||||||
|
- Mounts are sorted by label.
|
||||||
|
- `runtime.backend` is lowercased.
|
||||||
|
|
||||||
|
The normalized form is serialized to canonical JSON for hashing.
|
||||||
|
|
||||||
|
## Example
|
||||||
|
|
||||||
|
```toml
|
||||||
|
manifest_version = 1
|
||||||
|
|
||||||
|
[base]
|
||||||
|
image = "rolling"
|
||||||
|
|
||||||
|
[system]
|
||||||
|
packages = ["clang", "cmake", "git"]
|
||||||
|
|
||||||
|
[gui]
|
||||||
|
apps = ["ide", "debugger"]
|
||||||
|
|
||||||
|
[hardware]
|
||||||
|
gpu = true
|
||||||
|
audio = true
|
||||||
|
|
||||||
|
[mounts]
|
||||||
|
workspace = "./:/workspace"
|
||||||
|
|
||||||
|
[runtime]
|
||||||
|
backend = "namespace"
|
||||||
|
network_isolation = false
|
||||||
|
|
||||||
|
[runtime.resource_limits]
|
||||||
|
cpu_shares = 1024
|
||||||
|
memory_limit_mb = 4096
|
||||||
|
```
|
||||||
|
|
||||||
|
## Versioning
|
||||||
|
|
||||||
|
- The manifest format is versioned via `manifest_version`.
|
||||||
|
- Only version `1` is supported in Karapace 0.1.
|
||||||
|
- Future versions will increment this field.
|
||||||
|
- Backward-incompatible changes require a version bump.
|
||||||
109
docs/protocol-v1.md
Normal file
109
docs/protocol-v1.md
Normal file
|
|
@ -0,0 +1,109 @@
|
||||||
|
# Karapace Remote Protocol v1 (Draft)
|
||||||
|
|
||||||
|
> **Status: v1-draft** — This protocol is subject to change before 1.1.
|
||||||
|
|
||||||
|
## Overview
|
||||||
|
|
||||||
|
The Karapace remote protocol defines how environments are transferred between local stores and a remote HTTP backend. It is a content-addressable blob store with an optional registry index for named references.
|
||||||
|
|
||||||
|
## Blob Types
|
||||||
|
|
||||||
|
| Kind | Key | Content |
|
||||||
|
|------|-----|---------|
|
||||||
|
| `Object` | blake3 hex hash | Raw object data (tar layers, manifests) |
|
||||||
|
| `Layer` | layer hash | JSON `LayerManifest` |
|
||||||
|
| `Metadata` | env_id | JSON `EnvMetadata` |
|
||||||
|
|
||||||
|
## HTTP Routes
|
||||||
|
|
||||||
|
All routes are relative to the remote base URL.
|
||||||
|
|
||||||
|
### Blobs
|
||||||
|
|
||||||
|
| Method | Route | Description |
|
||||||
|
|--------|-------|-------------|
|
||||||
|
| `PUT` | `/blobs/{kind}/{key}` | Upload a blob |
|
||||||
|
| `GET` | `/blobs/{kind}/{key}` | Download a blob |
|
||||||
|
| `HEAD` | `/blobs/{kind}/{key}` | Check if blob exists |
|
||||||
|
| `GET` | `/blobs/{kind}` | List blob keys |
|
||||||
|
|
||||||
|
### Registry
|
||||||
|
|
||||||
|
| Method | Route | Description |
|
||||||
|
|--------|-------|-------------|
|
||||||
|
| `PUT` | `/registry` | Upload registry index |
|
||||||
|
| `GET` | `/registry` | Download registry index |
|
||||||
|
|
||||||
|
## Push Protocol
|
||||||
|
|
||||||
|
1. Read local `EnvMetadata` for the target env_id.
|
||||||
|
2. Collect layer hashes: `base_layer` + `dependency_layers`.
|
||||||
|
3. For each layer, collect `object_refs`.
|
||||||
|
4. Upload objects (skip if `HEAD` returns 200).
|
||||||
|
5. Upload layer manifests (skip if `HEAD` returns 200).
|
||||||
|
6. Upload metadata blob.
|
||||||
|
7. If a registry tag is provided, download current registry, merge entry, upload updated registry.
|
||||||
|
|
||||||
|
## Pull Protocol
|
||||||
|
|
||||||
|
1. Download `Metadata` blob for the target env_id.
|
||||||
|
2. Collect layer hashes from metadata.
|
||||||
|
3. Download layer manifests (skip if local store has them).
|
||||||
|
4. Collect `object_refs` from all layers.
|
||||||
|
5. Download objects (skip if local store has them).
|
||||||
|
6. **Verify integrity**: compute blake3 hash of each downloaded object; reject if hash does not match key.
|
||||||
|
7. Store metadata locally.
|
||||||
|
|
||||||
|
## Registry Format
|
||||||
|
|
||||||
|
```json
|
||||||
|
{
|
||||||
|
"entries": {
|
||||||
|
"my-env@latest": {
|
||||||
|
"env_id": "abc123...",
|
||||||
|
"short_id": "abc123def456",
|
||||||
|
"name": "my-env",
|
||||||
|
"pushed_at": "2026-01-15T12:00:00Z"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
### Reference Resolution
|
||||||
|
|
||||||
|
References follow the format `name@tag` (default tag: `latest`). Resolution:
|
||||||
|
1. Parse reference into `(name, tag)`.
|
||||||
|
2. Look up `{name}@{tag}` in the registry.
|
||||||
|
3. Return the associated `env_id`.
|
||||||
|
|
||||||
|
## Integrity
|
||||||
|
|
||||||
|
- All objects are keyed by their blake3 hash.
|
||||||
|
- On pull, every downloaded object is re-hashed and compared to its key.
|
||||||
|
- Mismatches produce `RemoteError::IntegrityFailure`.
|
||||||
|
- Layer manifests and metadata are JSON — no hash verification (they are keyed by logical identifiers, not content hashes).
|
||||||
|
|
||||||
|
## Headers
|
||||||
|
|
||||||
|
| Header | Value | When |
|
||||||
|
|--------|-------|------|
|
||||||
|
| `Content-Type` | `application/octet-stream` | Blob uploads/downloads |
|
||||||
|
| `Content-Type` | `application/json` | Registry uploads/downloads |
|
||||||
|
|
||||||
|
## Version Negotiation
|
||||||
|
|
||||||
|
Not yet implemented. The protocol version will be negotiated via a `X-Karapace-Protocol` header in 1.1.
|
||||||
|
|
||||||
|
## Error Responses
|
||||||
|
|
||||||
|
| Status | Meaning |
|
||||||
|
|--------|---------|
|
||||||
|
| 200 | Success |
|
||||||
|
| 404 | Blob or registry not found |
|
||||||
|
| 500 | Server error |
|
||||||
|
|
||||||
|
## Security Considerations
|
||||||
|
|
||||||
|
- No authentication in v1-draft. Authentication headers will be added in 1.1.
|
||||||
|
- HTTPS is strongly recommended for all remote URLs.
|
||||||
|
- Object integrity is verified client-side via blake3.
|
||||||
83
docs/security-model.md
Normal file
83
docs/security-model.md
Normal file
|
|
@ -0,0 +1,83 @@
|
||||||
|
# Karapace Security Model
|
||||||
|
|
||||||
|
## Core Invariants
|
||||||
|
|
||||||
|
1. **Host filesystem protected by default.** No writes outside the store and overlay.
|
||||||
|
2. **No implicit `/dev` access.** Device passthrough is explicit and opt-in.
|
||||||
|
3. **GPU passthrough requires `hardware.gpu = true`** in the manifest.
|
||||||
|
4. **Audio passthrough requires `hardware.audio = true`** in the manifest.
|
||||||
|
5. **Network isolation is configurable** via `runtime.network_isolation`.
|
||||||
|
6. **No permanent root daemon required.** All operations are rootless.
|
||||||
|
7. **No SUID binaries required.**
|
||||||
|
|
||||||
|
## Mount Policy
|
||||||
|
|
||||||
|
- Absolute host paths are checked against a whitelist.
|
||||||
|
- Default allowed prefixes: `/home`, `/tmp`.
|
||||||
|
- Relative paths (e.g. `./`) are always allowed.
|
||||||
|
- Mounts outside the whitelist are rejected at build time.
|
||||||
|
|
||||||
|
## Device Policy
|
||||||
|
|
||||||
|
- Default policy denies all device access.
|
||||||
|
- `hardware.gpu = true` adds `/dev/dri` to allowed devices.
|
||||||
|
- `hardware.audio = true` adds `/dev/snd` to allowed devices.
|
||||||
|
- No implicit device passthrough.
|
||||||
|
|
||||||
|
## Environment Variable Control
|
||||||
|
|
||||||
|
- A whitelist of safe environment variables is passed to the environment:
|
||||||
|
`TERM`, `LANG`, `HOME`, `USER`, `PATH`, `SHELL`, `XDG_RUNTIME_DIR`.
|
||||||
|
- A denylist prevents sensitive variables from leaking:
|
||||||
|
`SSH_AUTH_SOCK`, `GPG_AGENT_INFO`, `AWS_SECRET_ACCESS_KEY`, `DOCKER_HOST`.
|
||||||
|
- Only whitelisted, non-denied variables are propagated.
|
||||||
|
|
||||||
|
## Resource Limits
|
||||||
|
|
||||||
|
- CPU shares and memory limits are declared in the manifest.
|
||||||
|
- The security policy enforces upper bounds.
|
||||||
|
- Exceeding policy limits causes a build failure, not a silent cap.
|
||||||
|
|
||||||
|
## Privilege Model
|
||||||
|
|
||||||
|
- No privileged escalation at any point.
|
||||||
|
- User namespaces provide isolation without root.
|
||||||
|
- The OCI backend uses rootless runtimes (crun, runc, youki).
|
||||||
|
|
||||||
|
## Threat Model
|
||||||
|
|
||||||
|
### Privilege Boundary
|
||||||
|
|
||||||
|
- Karapace operates entirely within the user's privilege level.
|
||||||
|
- The store is owned by the user and protected by filesystem permissions.
|
||||||
|
- No daemon runs with elevated privileges.
|
||||||
|
|
||||||
|
### Attack Surface
|
||||||
|
|
||||||
|
- **Manifest parsing**: strict TOML parser with `deny_unknown_fields`.
|
||||||
|
- **Store integrity**: blake3 verification on every object read.
|
||||||
|
- **Image integrity**: blake3 digest stored on download, verified on cache hit.
|
||||||
|
- **Shell injection**: all paths and values in sandbox scripts use POSIX single-quote escaping (`shell_quote`). Environment variable keys are validated against `[a-zA-Z0-9_]`.
|
||||||
|
- **Mount injection**: prevented by whitelist enforcement.
|
||||||
|
- **Environment variable leakage**: prevented by deny/allow lists.
|
||||||
|
- **Concurrent access**: file locking on all mutating CLI and D-Bus operations.
|
||||||
|
- **Process safety**: cannot destroy a running environment (must stop first).
|
||||||
|
- **Rebuild atomicity**: new environment is built before the old one is destroyed.
|
||||||
|
|
||||||
|
### Isolation Assumptions
|
||||||
|
|
||||||
|
- The host kernel provides functioning user namespaces.
|
||||||
|
- The filesystem permissions on the store directory are correct.
|
||||||
|
- The OCI runtime (if used) is trusted and correctly installed.
|
||||||
|
|
||||||
|
### Security Review Checklist
|
||||||
|
|
||||||
|
- [x] No SUID binaries.
|
||||||
|
- [x] No root daemon.
|
||||||
|
- [x] Mount whitelist enforced.
|
||||||
|
- [x] Device passthrough explicit.
|
||||||
|
- [x] Environment variables controlled.
|
||||||
|
- [x] Resource limits supported.
|
||||||
|
- [x] Store integrity verified.
|
||||||
|
- [x] Concurrent access safe.
|
||||||
|
- [x] Signal handling (SIGINT/SIGTERM) clean.
|
||||||
150
docs/store-spec.md
Normal file
150
docs/store-spec.md
Normal file
|
|
@ -0,0 +1,150 @@
|
||||||
|
# Karapace Store Format Specification (v2)
|
||||||
|
|
||||||
|
## Overview
|
||||||
|
|
||||||
|
The Karapace store is a content-addressable filesystem structure that holds all environment data: objects, layers, metadata, environment directories, and crash recovery state.
|
||||||
|
|
||||||
|
## Directory Layout
|
||||||
|
|
||||||
|
```
|
||||||
|
<store_root>/
|
||||||
|
store/
|
||||||
|
version # JSON: { "format_version": 2 }
|
||||||
|
.lock # flock(2) file for exclusive access
|
||||||
|
objects/<hash> # Content-addressable blobs (blake3)
|
||||||
|
layers/<hash> # Layer manifests (JSON)
|
||||||
|
metadata/<env_id> # Environment metadata (JSON)
|
||||||
|
staging/ # Temporary workspace for atomic operations
|
||||||
|
wal/ # Write-ahead log entries (JSON)
|
||||||
|
env/
|
||||||
|
<env_id>/
|
||||||
|
upper/ # Writable overlay layer (fuse-overlayfs upperdir)
|
||||||
|
lower -> ... # Symlink to base image rootfs
|
||||||
|
work/ # Overlay workdir (ephemeral)
|
||||||
|
merged/ # Overlay mount point
|
||||||
|
images/
|
||||||
|
<cache_key>/
|
||||||
|
rootfs/ # Extracted base image rootfs
|
||||||
|
```
|
||||||
|
|
||||||
|
## Format Version
|
||||||
|
|
||||||
|
- Current version: **2**
|
||||||
|
- Stored in `store/version` as JSON.
|
||||||
|
- Checked on every store access; mismatches are rejected.
|
||||||
|
- Version 1 stores are not auto-migrated; a clean rebuild is required.
|
||||||
|
|
||||||
|
## Objects
|
||||||
|
|
||||||
|
- Keyed by blake3 hex digest of their content.
|
||||||
|
- Written atomically: write to tempfile, then rename.
|
||||||
|
- Integrity verified on every read: content re-hashed and compared to filename.
|
||||||
|
- Idempotent: writing the same content twice is a no-op.
|
||||||
|
|
||||||
|
## Layers
|
||||||
|
|
||||||
|
Each layer is a JSON manifest:
|
||||||
|
|
||||||
|
```json
|
||||||
|
{
|
||||||
|
"hash": "<layer_hash>",
|
||||||
|
"kind": "Base" | "Dependency" | "Policy" | "Snapshot",
|
||||||
|
"parent": "<parent_hash>" | null,
|
||||||
|
"object_refs": ["<hash>", ...],
|
||||||
|
"read_only": true,
|
||||||
|
"tar_hash": "<blake3_hash>"
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
- `tar_hash` (v2): blake3 hash of the deterministic tar archive stored in the object store.
|
||||||
|
- Base layers have no parent. Their `hash` equals their `tar_hash`.
|
||||||
|
- Dependency layers reference a base parent.
|
||||||
|
- Snapshot layers are created by `commit`. Their `hash` is a composite identity: `blake3("snapshot:{env_id}:{base_layer}:{tar_hash}")` to prevent collision with base layers.
|
||||||
|
|
||||||
|
## Metadata
|
||||||
|
|
||||||
|
Each environment has a JSON metadata file:
|
||||||
|
|
||||||
|
```json
|
||||||
|
{
|
||||||
|
"env_id": "...",
|
||||||
|
"short_id": "...",
|
||||||
|
"name": "my-env",
|
||||||
|
"state": "Defined" | "Built" | "Running" | "Frozen" | "Archived",
|
||||||
|
"manifest_hash": "<object_hash>",
|
||||||
|
"base_layer": "<layer_hash>",
|
||||||
|
"dependency_layers": ["<hash>", ...],
|
||||||
|
"policy_layer": null | "<hash>",
|
||||||
|
"created_at": "RFC3339",
|
||||||
|
"updated_at": "RFC3339",
|
||||||
|
"ref_count": 1
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
- `name` is optional (`#[serde(default)]`). Old metadata without this field deserializes correctly.
|
||||||
|
|
||||||
|
## Atomic Write Contract
|
||||||
|
|
||||||
|
All writes follow the pattern:
|
||||||
|
1. Create `NamedTempFile` in the target directory.
|
||||||
|
2. Write full content.
|
||||||
|
3. `flush()`.
|
||||||
|
4. `persist()` (atomic rename).
|
||||||
|
|
||||||
|
This ensures no partial files are visible.
|
||||||
|
|
||||||
|
## Garbage Collection
|
||||||
|
|
||||||
|
- Environments with `ref_count == 0` and state not in {`Running`, `Archived`} are eligible for collection.
|
||||||
|
- Layers not referenced by any live environment are orphaned.
|
||||||
|
- Objects not referenced by any live layer or live metadata (`manifest_hash`) are orphaned.
|
||||||
|
- GC never deletes running or archived environments.
|
||||||
|
- GC supports graceful cancellation via signal handler (`SIGINT`/`SIGTERM`).
|
||||||
|
- `--dry-run` reports what would be removed without acting.
|
||||||
|
- The caller must hold the store lock before running GC.
|
||||||
|
|
||||||
|
## Write-Ahead Log (WAL)
|
||||||
|
|
||||||
|
The `store/wal/` directory contains JSON entries for in-flight mutating operations. Each entry tracks:
|
||||||
|
|
||||||
|
```json
|
||||||
|
{
|
||||||
|
"op_id": "20260215120000123-a1b2c3d4",
|
||||||
|
"kind": "Build" | "Rebuild" | "Commit" | "Restore" | "Destroy",
|
||||||
|
"env_id": "...",
|
||||||
|
"timestamp": "RFC3339",
|
||||||
|
"rollback_steps": [
|
||||||
|
{ "RemoveDir": "/path/to/orphaned/dir" },
|
||||||
|
{ "RemoveFile": "/path/to/orphaned/file" }
|
||||||
|
]
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
### Recovery Protocol
|
||||||
|
|
||||||
|
1. On `Engine::new()`, the WAL directory is scanned for incomplete entries.
|
||||||
|
2. Each entry's rollback steps are executed in **reverse order**.
|
||||||
|
3. The WAL entry is then removed.
|
||||||
|
4. Corrupt or unreadable WAL entries are silently deleted.
|
||||||
|
|
||||||
|
### Invariants
|
||||||
|
|
||||||
|
- **INV-W1**: Kill during rebuild → next startup rolls back orphaned env_dir.
|
||||||
|
- **INV-W2**: Kill during build → orphaned env_dir cleaned.
|
||||||
|
- **INV-W3**: Successful operations leave zero WAL entries.
|
||||||
|
|
||||||
|
## Staging Directory
|
||||||
|
|
||||||
|
The `store/staging/` directory is a temporary workspace used for atomic operations:
|
||||||
|
|
||||||
|
- **Restore**: snapshot tar is unpacked into `staging/restore-{env_id}`, then renamed to replace the overlay upper directory.
|
||||||
|
- **Layer packing**: temporary files during tar creation.
|
||||||
|
|
||||||
|
The staging directory is cleaned up after each operation. Leftover staging data is safe to delete.
|
||||||
|
|
||||||
|
## Backward Compatibility
|
||||||
|
|
||||||
|
- Layout changes require a format version bump.
|
||||||
|
- Karapace 1.0 requires format version 2.
|
||||||
|
- Version 1 stores are not auto-migrated; environments must be rebuilt.
|
||||||
|
- The `name` and `tar_hash` fields use `#[serde(default)]` for forward-compatible deserialization.
|
||||||
132
docs/verification.md
Normal file
132
docs/verification.md
Normal file
|
|
@ -0,0 +1,132 @@
|
||||||
|
# Verifying Karapace Downloads
|
||||||
|
|
||||||
|
Every tagged release includes signed binaries for both glibc and musl (static) targets,
|
||||||
|
SHA256 checksums, and in-toto provenance attestations. All artifacts are signed with
|
||||||
|
cosign using GitHub Actions OIDC — no manual keys involved.
|
||||||
|
|
||||||
|
These instructions are mechanically verified in CI: the `verify-docs-executable` job
|
||||||
|
in `supply-chain-test.yml` executes these exact commands on every PR.
|
||||||
|
|
||||||
|
## Choosing a Binary
|
||||||
|
|
||||||
|
| Binary | Linking | Use Case |
|
||||||
|
|--------|---------|----------|
|
||||||
|
| `karapace-linux-x86_64-gnu` | Dynamic (glibc) | Standard Linux distributions |
|
||||||
|
| `karapace-linux-x86_64-musl` | Static (musl) | Minimal containers, Alpine, any distro |
|
||||||
|
| `karapace-dbus-linux-x86_64-gnu` | Dynamic (glibc) | D-Bus service on standard distros |
|
||||||
|
| `karapace-dbus-linux-x86_64-musl` | Static (musl) | D-Bus service in containers |
|
||||||
|
|
||||||
|
The musl binaries are fully statically linked and require no system libraries.
|
||||||
|
|
||||||
|
## 1. Verify SHA256 Checksums
|
||||||
|
|
||||||
|
```bash
|
||||||
|
# For glibc binaries:
|
||||||
|
sha256sum -c SHA256SUMS-gnu
|
||||||
|
|
||||||
|
# For musl binaries:
|
||||||
|
sha256sum -c SHA256SUMS-musl
|
||||||
|
```
|
||||||
|
|
||||||
|
Both `karapace` and `karapace-dbus` must show `OK`.
|
||||||
|
|
||||||
|
## 2. Verify Cosign Signatures
|
||||||
|
|
||||||
|
Install [cosign](https://docs.sigstore.dev/cosign/system_config/installation/):
|
||||||
|
|
||||||
|
```bash
|
||||||
|
# Verify karapace binary (use -gnu or -musl suffix as appropriate)
|
||||||
|
cosign verify-blob karapace-linux-x86_64-gnu \
|
||||||
|
--signature karapace-gnu.sig \
|
||||||
|
--certificate karapace-gnu.crt \
|
||||||
|
--certificate-identity-regexp 'https://github.com/marcoallegretti/karapace' \
|
||||||
|
--certificate-oidc-issuer https://token.actions.githubusercontent.com
|
||||||
|
|
||||||
|
# Verify karapace-dbus binary
|
||||||
|
cosign verify-blob karapace-dbus-linux-x86_64-gnu \
|
||||||
|
--signature karapace-dbus-gnu.sig \
|
||||||
|
--certificate karapace-dbus-gnu.crt \
|
||||||
|
--certificate-identity-regexp 'https://github.com/marcoallegretti/karapace' \
|
||||||
|
--certificate-oidc-issuer https://token.actions.githubusercontent.com
|
||||||
|
```
|
||||||
|
|
||||||
|
Both commands must print `Verified OK`. Replace `-gnu` with `-musl` for static binaries.
|
||||||
|
|
||||||
|
## 3. Verify Provenance Attestation
|
||||||
|
|
||||||
|
```bash
|
||||||
|
cosign verify-blob provenance-gnu.json \
|
||||||
|
--signature provenance-gnu.json.sig \
|
||||||
|
--certificate provenance-gnu.json.crt \
|
||||||
|
--certificate-identity-regexp 'https://github.com/marcoallegretti/karapace' \
|
||||||
|
--certificate-oidc-issuer https://token.actions.githubusercontent.com
|
||||||
|
```
|
||||||
|
|
||||||
|
Inspect the provenance to verify the build origin:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
python3 -c "
|
||||||
|
import json
|
||||||
|
with open('provenance-gnu.json') as f:
|
||||||
|
prov = json.load(f)
|
||||||
|
src = prov['predicate']['invocation']['configSource']
|
||||||
|
print(f'Commit: {src[\"digest\"][\"sha1\"]}')
|
||||||
|
print(f'Repo: {src[\"uri\"]}')
|
||||||
|
print(f'Workflow: {src[\"entryPoint\"]}')
|
||||||
|
print(f'Builder: {prov[\"predicate\"][\"builder\"][\"id\"]}')
|
||||||
|
"
|
||||||
|
```
|
||||||
|
|
||||||
|
## 4. Inspect SBOM
|
||||||
|
|
||||||
|
The CycloneDX SBOM lists all Rust dependencies and their versions:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
python3 -m json.tool karapace_bom.json | head -50
|
||||||
|
```
|
||||||
|
|
||||||
|
## Build Reproducibility
|
||||||
|
|
||||||
|
All CI release builds enforce:
|
||||||
|
- `CARGO_INCREMENTAL=0` — disables incremental compilation
|
||||||
|
- `cargo clean` before every release build — eliminates stale intermediate artifacts
|
||||||
|
- `SOURCE_DATE_EPOCH=0` — deterministic timestamps
|
||||||
|
- `--remap-path-prefix` — eliminates runner-specific filesystem paths
|
||||||
|
- `strip = true` + `lto = "thin"` — deterministic output
|
||||||
|
|
||||||
|
**Reproducibility requirement:** Build invocations must use identical `-p` flags.
|
||||||
|
Building `-p karapace-cli` alone may produce a different binary than
|
||||||
|
`-p karapace-cli -p karapace-dbus` due to codegen unit ordering.
|
||||||
|
|
||||||
|
Both glibc and musl builds are verified for same-run and cross-run reproducibility
|
||||||
|
(ubuntu-latest vs ubuntu-22.04). Musl static builds are expected to be fully
|
||||||
|
runner-independent since they have no dynamic library dependencies.
|
||||||
|
|
||||||
|
## Local Development Builds
|
||||||
|
|
||||||
|
Local dev builds use `.cargo/config.toml` to remap dependency paths via `--remap-path-prefix`.
|
||||||
|
This eliminates local filesystem paths from release binaries. The remapping is configured for
|
||||||
|
the project maintainer's paths; other developers should update the paths in `.cargo/config.toml`
|
||||||
|
or set `RUSTFLAGS` directly.
|
||||||
|
|
||||||
|
**Local builds are for development only. CI builds are the authoritative release artifacts.**
|
||||||
|
|
||||||
|
## Release Artifacts
|
||||||
|
|
||||||
|
Each GitHub release contains artifacts for both `x86_64-unknown-linux-gnu` (glibc) and
|
||||||
|
`x86_64-unknown-linux-musl` (static) targets:
|
||||||
|
|
||||||
|
| File | Description |
|
||||||
|
|------|-------------|
|
||||||
|
| `karapace-linux-x86_64-gnu` | CLI binary (glibc) |
|
||||||
|
| `karapace-linux-x86_64-musl` | CLI binary (static musl) |
|
||||||
|
| `karapace-dbus-linux-x86_64-gnu` | D-Bus service binary (glibc) |
|
||||||
|
| `karapace-dbus-linux-x86_64-musl` | D-Bus service binary (static musl) |
|
||||||
|
| `SHA256SUMS-gnu` | SHA256 checksums for glibc binaries |
|
||||||
|
| `SHA256SUMS-musl` | SHA256 checksums for musl binaries |
|
||||||
|
| `karapace-gnu.sig` / `.crt` | Cosign signature + certificate (glibc CLI) |
|
||||||
|
| `karapace-musl.sig` / `.crt` | Cosign signature + certificate (musl CLI) |
|
||||||
|
| `karapace-dbus-gnu.sig` / `.crt` | Cosign signature + certificate (glibc D-Bus) |
|
||||||
|
| `karapace-dbus-musl.sig` / `.crt` | Cosign signature + certificate (musl D-Bus) |
|
||||||
|
| `provenance-gnu.json` / `.sig` / `.crt` | Provenance attestation (glibc) |
|
||||||
|
| `provenance-musl.json` / `.sig` / `.crt` | Provenance attestation (musl) |
|
||||||
66
docs/versioning-policy.md
Normal file
66
docs/versioning-policy.md
Normal file
|
|
@ -0,0 +1,66 @@
|
||||||
|
# Karapace Versioning Policy
|
||||||
|
|
||||||
|
## Versioned Artifacts
|
||||||
|
|
||||||
|
Karapace versions three independent artifacts:
|
||||||
|
|
||||||
|
| Artifact | Current Version | Location |
|
||||||
|
|---|---|---|
|
||||||
|
| Manifest format | `1` | `manifest_version` field in manifest |
|
||||||
|
| Store layout | `2` | `store/version` file |
|
||||||
|
| DBus API | `1` | `org.karapace.Manager1` interface |
|
||||||
|
| Remote protocol | `v1-draft` | `X-Karapace-Protocol` header |
|
||||||
|
|
||||||
|
## Freeze Policies
|
||||||
|
|
||||||
|
### Store Format Freeze
|
||||||
|
|
||||||
|
- **Store layout v2 is frozen as of Karapace 1.0.**
|
||||||
|
- No breaking changes to the store directory layout, object naming scheme, or metadata JSON schema within 1.x releases.
|
||||||
|
- New optional fields may be added to metadata JSON with `#[serde(default)]`.
|
||||||
|
- Store v1 is not supported; Karapace 1.0+ rejects v1 stores with a clear error.
|
||||||
|
- If a future major version changes the store format, `karapace migrate` will be provided.
|
||||||
|
|
||||||
|
### Remote Protocol Freeze
|
||||||
|
|
||||||
|
- **Remote protocol v1 is currently `v1-draft`** and may change before Karapace 1.1.
|
||||||
|
- The protocol will be frozen (declared stable) in Karapace 1.1.
|
||||||
|
- After freeze: blob routes, registry format, and integrity checking are stable.
|
||||||
|
- New optional endpoints may be added without a version bump.
|
||||||
|
- Breaking changes require a protocol version bump and `X-Karapace-Protocol` negotiation.
|
||||||
|
|
||||||
|
## Compatibility Rules
|
||||||
|
|
||||||
|
### Manifest Format
|
||||||
|
|
||||||
|
- The `manifest_version` field is required and checked on parse.
|
||||||
|
- Only version `1` is supported in Karapace 0.1.
|
||||||
|
- Adding optional fields is a backward-compatible change (no version bump).
|
||||||
|
- Removing or renaming fields requires a version bump.
|
||||||
|
- Changing normalization or hashing behavior requires a version bump.
|
||||||
|
|
||||||
|
### Store Layout
|
||||||
|
|
||||||
|
- The store format version is stored in `store/version`.
|
||||||
|
- Karapace refuses to operate on a store with a different version.
|
||||||
|
- Adding new file types to the store is backward-compatible.
|
||||||
|
- Changing the object naming scheme or layout requires a version bump.
|
||||||
|
|
||||||
|
### DBus API
|
||||||
|
|
||||||
|
- The API version is returned by `ApiVersion()`.
|
||||||
|
- Adding new methods is backward-compatible.
|
||||||
|
- Changing method signatures requires a version bump.
|
||||||
|
- The interface name includes the major version (`Manager1`).
|
||||||
|
|
||||||
|
## Release Policy
|
||||||
|
|
||||||
|
- **Patch releases** (0.1.x): bug fixes only, no format changes.
|
||||||
|
- **Minor releases** (0.x.0): may add backward-compatible features.
|
||||||
|
- **Major releases** (x.0.0): may break backward compatibility with version bumps.
|
||||||
|
|
||||||
|
## Migration
|
||||||
|
|
||||||
|
- Karapace 0.1 does not support migration from other tools.
|
||||||
|
- Future versions may include `karapace migrate` for store upgrades.
|
||||||
|
- Manifest version migration is the user's responsibility.
|
||||||
Loading…
Reference in a new issue