「 须臾水面明月出,沧江万顷琉璃寒 」
For production, I fully recommand you to use tools like crun, youki, containerd, docker, podman, LXC, bubblewrap, they are more secure and stable. This is a non-OCI tool and, you take your own risk using it when you really need. The whole project is experimental!
This project is not for you. If you don't know and don't want to know what's chroot/unshare/namespace/PID/capability/cgroup, you also can't know what's 换根/取消共享/命名空间/进程编号/能力/控制组. And I currently have no time to mantain multi-language docs. But as this is an open-source project, you are welcome to make your own fork with your preferred language :)
* Your warranty is void.
* I am not responsible for anything that may happen to your device by using this program.
* You do it at your own risk and take the responsibility upon yourself.
* This project is open source, you can make your own fork/rewrite but not to blame the author.
* This program has no Super Cow Powers.
"Bugs will happen, if they don’t happen in hardware, they will happen in software and if they don’t happen in your software and they will happen in somebody else’s software." --Torvalds
If you think something does not work as expected, please Open a new isssue
ruri was part of termux-container(now daijin), as a container implementation on rooted Android phone, it's more secure than chroot/unshare.
The goal of ruri is Not Only Better-chroot
. I hope it become a powerful tool, for developing, for devices that can't run docker, and for people who want to learn about Linux container.
Was a toy, to be a tool.
ruri is pronounced as luli
, or you can call it [瑠璃/琉璃]
(るり) in Chinese or Japanese as well.
ruri is acronym to Lightweight, User-friendly Linux-container Implementation.
ruri is a powerful container implementation that runs on almost any Linux device, even with incomplete kernel configurations or minimal storage space.
rurima was planned to be the ruri manager, but since it now has a full integration of ruri, you can use it as an enhanced version of ruri. Note that rurima is still WIP.
- Powerful Features
- Basic container features are all supported, chroot, unshare with pivot_root, capability control, basic cgroup support, no_new_privs, auto set environment variables and change user/workdir, built-in seccomp profile, and more...
- Built-in support for binfmt_misc & QEMU, so you can run multi-arch container easily.
- Built-in rootless mode support (need user ns support).
- Powerful mount option, you can mount image/partition as root, and you can choose every mountpoint to be read-only or rw.
- Built-in support for config file.
- Ultra-lightweight, Zero runtime Dependencies, Ready Out-of-the-Box
- Only rootless container need an optional runtime dependency
uidmap
, all feature of chroot/unshare container can be built-in to an all-in-one binary. - Ruri provides statically linked binaries for arm64, armv7, armhf, riscv64, i386, loong64, s390x, ppc64le and x86_64 devices.
- The binary of ruri is very small, after upx, it can even be less than 200k, but it can provide over 30 options and even more features.
- Only rootless container need an optional runtime dependency
- Flexibility, for More Platform
- From Android devices to IoT gadgets, from amd64 to s390x, ruri can provide basic container support on almost every Linux platforms, the only thing it need is root privilege.
- Secure by Design
- Built-in rootless container support.
- Built-in security options, to make container more secure.
- Built-in read-only filesystem options for more protection.
- Simple for Beginner
- You can just use ruri as an instead of
chroot
command, and ruri will do all things for you. - Ruri empowers you with the freedom to configure everything, but that do not means you need to learn every option to use it.
- You can just use ruri as an instead of
On AMD Ryzen 5 5500U, Windows 11, Ubuntu 22.04.5 WSL 2
# uname -m
x86_64
# /usr/bin/time -f "Time: %E\nMax memory: %M KB" ./ruri ../t /bin/true
Time: 0:00.01
Max memory: 860 KB
ruri | crun | % | |
---|---|---|---|
(noupx) | 454K | 3.0M | -84.9% |
(withupx) | 147K | 1.3M | -88.7% |
Alphabet | ruri used | % |
---|---|---|
52 | 44 | 85% |
You can get ruri binary (statically linked) for arm64, armv7, armhf, riscv64, i386, loong64, s390x, ppc64le and x86_64 devices in Release. Or you can run the following command to download ruri automatically
. <(curl -sL https://get.ruri.zip/ruri)
This will automatically download ruri binary to ./ruri
.
See USAGE to explore all features of ruri.
BSD style usage is partially supported now, for example, you can use -pW /root
, but -W/root
is not allowed.
See Enhance Container Security.
Ruri provides statically linked binary, but if you want to build it yourself, see Build.
ruri is ready to integrate into other projects, with the MIT License, it is compatiblte to be redistribute with almost all license, or commercial/closed source. An example is ruri's own build action , it runs containers for 9 different architectures to build itself, that shows its broad application prospects. Another example is rurima, I made ruri built-in into it, so it can be run as a subcommand. See Integration for a guide to integrate ruri into your projects.
After initing the container, ruri will create a file /.rurienv by default, this config can unify container config, but it will also cover some of the command-line args, you can use --no-rurienv
to disable it, or see rurienv.md to see its behavior.
You might cannot remove this file unless you run chattr -i .rurienv
, but don't worry, after umounting conainer by ruri -U
, this config file will be removed automatically.
If you want to change the container config, just use -U to umount it and re-run the container.
. <(curl -sL https://get.ruri.zip/rurima)
./rurima lxc pull -o alpine -v edge -s /tmp/alpine
sudo tar -xvf rootfs.tar.xz -C /tmp/alpine
sudo ruri /tmp/alpine
For unshare container
sudo ruri -u /tmp/alpine
Very simple as you can see.
For command line examples, please see ruri -H
.
# Run chroot container
sudo ruri /tmp/alpine
# Very simple as you can see.
# About the capabilities
# Run privileged chroot container
sudo ruri -p /tmp/alpine
# If you want to run privileged chroot container,
# but you don't want to give the container cap_sys_chroot privileges
sudo ruri -p -d cap_sys_chroot /tmp/alpine
# If you want to run chroot container with common privileges,
# but you want cap_sys_admin to be kept
sudo ruri -k cap_sys_admin /tmp/alpine
# About unshare
# Unshare container's capability options are same with chroot.
# Run unshare container
sudo ruri -u /tmp/alpine
# Finally, umount the container
sudo ruri -U /tmp/alpine
License of code
- Licensed under the MIT License
- Copyright (c) 2022-2024 Moe-hacker
License of clang-format config file
- GPL-2.0
「 咲誇る花 美しく、
散り行く運命 知りながら、
僅かな時の彩を 」
(>_×)