21 unstable releases (3 breaking)
Uses old Rust 2015
0.4.2 | Apr 16, 2019 |
---|---|
0.4.1 | Apr 13, 2019 |
0.4.0 | Mar 18, 2019 |
0.3.2 | Dec 17, 2018 |
0.1.5 | Nov 19, 2018 |
#1702 in Development tools
67KB
1.5K
SLoC
playbook-rs
YAML driven container workflow orchestration
Features
- Designed to work with
nvidia-docker2
and operationalize very complex GPU workflows - Language agnostic symbol namespace (notice the
whitelist
and#[playbook(something)]
) - Static/dynamic impersonation (setuid and optionally create&reference host user) to ensure correct privileges
- Internal security hardening by whitelisting a small subset of super user capabilities
- SETUID, SETGID, CHOWN
- X11 Graphics by setting
gui: ture
- Each step can run in a different container (or on host) to support imcompatible dependencies in the same workflow
- Support specifying IPC and network namespace
- Simple action call convention:
awesome_func(ctx)
- Minimal command line arguments to launch a workflow:
playbook some.yml
- Colorful logging for readability
Dependencies
- (Optional) Docker CE
In a nutshell
- Add a function
def something(ctx)
. Current execution context is inctx
as dict. Keys can also be accessed as attributes to save a lot of brackets and quotes. And be sure to declare this function to playbook as a symbol.
## hello_world.py ##
#[playbook(something)]
def something(ctx):
print(ctx.message)
- Add the source file path to the
whitelist
.
## main.yml ##
whitelist:
- src: hello_world.py
- Add an entry to your YAML file in
steps
whereaction
is the step function name
## main.yml ##
whitelist:
- src: hello_world.py
steps:
- name: Some description here
action: something
message: Hello World!
- Run it!
$ playbook main.yml
Check Wiki for more details and examples.
FAQ
What's the difference between this and _____?
Docker-compose
There are features such as impersonate (aka container user provisioning) and others security enhancements,
which make this a better level of abstraction for research & development use.
Try and use -vv
to see for yourself how many options we are using in the docker commands / API invocations to run things more carefully and properly.
Viewing these as repetitive work that needs to be automated, this project is created!
All of it can be done absolutely with just docker or docker-compose (which is exactly how this works), but perhaps not without more boilerplates and scripting in every single project to be containerized.
Besides, we also aim to assist global system resource coordination, especially in a shared system. In the long term, we aim to support Kubernetes, SLURM, HTCondor or any other system we are interested in using.
Kubernetes
Kubernetes focuses on workload, this focuses on workflow.
Why Rust?
Firstly, any scripting language is out of the question because it is much more difficult to build a system with high reliability and sustainability requirements with languages so dynamic and tolerant to errors. We want the system to crash hard when there is the slightest amount of outdated codes or data structures and it better does not even compile, so that we become aware of it in the earliest time possible, as opposed to well after built into containers and delivered to users.
Secondly, the best AOT compiled commitment-free languages out there, imo, are C++, Rust and Go.
Lastly, we want to have a nice package manager, so Rust is the only option here.
Dependencies
~8–18MB
~233K SLoC