runj is an experimental, proof-of-concept OCI-compatible runtime for FreeBSD jails.
Important: runj is a proof-of-concept and the implementation has not been evaluated for its security. Do not use runj on a production system. Do not run workloads inside runj that rely on a secure configuration. This is a personal project, not backed by the author's employer.
runj is in early development and is functional, but has very limited features.
runj currently supports the following parts of the OCI runtime spec:
- Commands
- Create
- Delete
- Start
- State
- Kill
- Config
- Root path
- Process args
- Process environment
- Process terminal
- Hostname
- Mounts
runj also supports the following experimental FreeBSD-specific extensions to the OCI runtime spec:
- Config
- IPv4 mode
- IPv4 addresses
To run a jail with runj, you must prepare an OCI bundle. Bundles consist of a
root filesystem and a JSON-formatted configuration file called config.json
.
Experimental FreeBSD-specific extensions may be added directly to the
config.json
if desired, or may optionally be added to a runj-specific file
located in the bundle directory called runj.ext.json
.
The root filesystem can consist either of a regular FreeBSD userland or a
reduced set of FreeBSD-compatible programs. For experimentation,
statically-linked programs from /recovery
may be copied into your bundle. You
can obtain a regular FreeBSD userland suitable for use with runj from
http://ftp.freebsd.org/pub/FreeBSD/releases/$ARCH/$VERSION/base.txz
(where
$ARCH
and $VERSION
are replaced by your architecture and desired version
respectively). Several demo
convenience commands have been provided in runj
to assist in experimentation; you can use runj demo download
to retrieve a
working root filesystem from the FreeBSD website.
runj
supports a limited number of configuration parameters for jails.
The OCI runtime spec does not currently include support for FreeBSD, however
runj adds experimental support for some FreeBSD capabilities. In the spirit of
"rough consensus and working code", runj serves as a testbed for future
proposals to extend the specification. For now, the extensions are documented
here.
You can use runj demo spec
to generate an example config file for your bundle.
Once you have a config file, edit the root path and process args to your desired values.
Create a container with runj create $ID $BUNDLE
where $ID
is the identifier
you picked for your container and $BUNDLE
is the bundle directory with a valid
config.json
.
Start your container with runj start $ID
. The process defined in the
config.json
will be started.
Inspect the state of your container with runj state $ID
.
Send a signal to your container process (or all processes in the container) with
runj kill $ID
.
Remove your container with runj delete $ID
.
Along with the main runj
OCI runtime, this repository also contains an
experimental shim that can be used with containerd. The shim is available as
containerd-shim-runj-v1
and can be used from the ctr
command-line tool by
specifying --runtime wtf.sbk.runj.v1
.
containerd 1.5 or later is required as earlier versions do not have all the
necessary patches for FreeBSD support. Additional functionality may be
available in a development build of containerd. If you prefer to build from
source, you can find the latest commits in the
main
branch of containerd.
A base OCI image for FreeBSD 12.1-RELEASE on the amd64
architecture is
available in the
Amazon ECR public gallery. You
can pull the image with the ctr
tool like this:
$ sudo ctr image pull public.ecr.aws/samuelkarp/freebsd:12.1-RELEASE
If you prefer to build your own image, need an image for a different
architecture, or want to try out a different version of FreeBSD, runj
contains
a utility that can convert a FreeBSD root filesystem into an OCI image. You
can download, convert, and import an image as follows:
$ runj demo download --output rootfs.txz
Found arch: amd64
Found version: 12.1-RELEASE
Downloading image for amd64 12.1-RELEASE into rootfs.txz
[...output elided...]
$ runj demo oci-image --input rootfs.txz
Creating OCI image in file image.tar
extracting...
compressing...
computing layer digest...
writing blob sha256:f585dd296aa9697b5acaf9db7b40701a6377a3ccf4d29065cbfd3d2b80395733
writing blob sha256:413cc9413157f822242a4bb2c86ea50d20b8343964b5cf1d86182e132b51f78b
tar...
$ sudo ctr image import --index-name freebsd image.tar
unpacking freebsd (sha256:5ac2e259d1e84a9b955f7630ef499c8b6896f8409b6ac9d9a21542cb883387c0)...done
With containerd, runj
, and the containerd-shim-runj-v1
binary installed, you
can use the ctr
command-line tool to run containers like this:
$ sudo ctr run \
--runtime wtf.sbk.runj.v1 \
--rm \
public.ecr.aws/samuelkarp/freebsd:13.1-RELEASE \
my-container \
sh -c 'echo "Hello from the container!"'
Hello from the container!
ctr
can also be used to test the experimental FreeBSD-specific extensions by
creating a runj.ext.json
file as documented in oci.md
and
passing the path with --runtime-config-path
. For example, to run a container
interactively with access to the host's IPv4 networking stack (similar to the
--net-host
networking mode on Linux):
$ cat <<EOF >runj.ext.json
{"network":{"ipv4":{"mode":"inherit"}}}
EOF
$ sudo ctr run \
--runtime wtf.sbk.runj.v1 \
--rm \
--tty \
--runtime-config-path $(pwd)/runj.ext.json \
public.ecr.aws/samuelkarp/freebsd:13.1-RELEASE \
my-container \
sh
Note that containerd
and runj
will not automatically create an
/etc/resolv.conf
file inside your container. If your container image does not
include one, you may need to add one yourself for name resolution to function
properly. A very simple /etc/resolv.conf
file using Google's public DNS
resolver is as follows:
nameserver 8.8.8.8
runj uses both FreeBSD's userland utilities for managing jails and jail-related
syscalls. You must have working versions of jail(8)
, jls(8)
, jexec(8)
,
and ps(1)
installed on your system. runj kill
makes use of the kill(1)
command inside the jail's rootfs; if this command does not exist (or is not
functional), runj kill
will not work.
runj builds largely with standard go build
invocations, except for the
integ-inside
integration test helper which must be statically linked. A
Makefile
is available for use which correctly sets the expected build options.
The following targets are available:
all
(or justmake
without additional arguments) - Build all binaries and generate aNOTICE
file.NOTICE
- Generate theNOTICE
file based on included Go dependencies.install
- Install the runj binaries to the standard filesystem locations.lint
- Rungolangci-lint
which includes a number of linters.test
- Run all unit tests.integ-test
- Run integration tests. Note that this target must be run as root as it creates jails, creates and configures network interfaces, and manipulatespf
rules. It also expects working Internet access to reach8.8.8.8
for verification of a working network.clean
- Remove built artifacts.
runj normally expects to be built from a git
checkout so that appropriate
revision and module information is built in. If building runj from an extracted
tar instead, you may populate the REV_OVERRIDE
file with an appropriate value
as a substitute for the normal revision provided from git
.
Please see the contribution policy.
Resource limits on FreeBSD can be configured using the kernel's RCTL interface.
runj does not currently use this, but may add support for it via rctl(8)
in
the future.
runj itself is licensed under the same license as the FreeBSD project. Some dependencies are licensed under other terms. The OCI runtime specification and reference code is licensed under the Apache License, 2.0; copies of that reference code incorporated and modified in this repository remain under the original license.