Rooz is a CLI tool that enables you to work in containers. It is intended for developers and DevOps engineers. Because of that, it comes with a built-in support for git repositories, SSH keys generation, support for git-safe secrets, shared caches, sidecar containers, declarative configuration, and a robust CLI. Rooz is designed to share as little as possible with the host so it can also orchestrate your workspaces on remote Docker/Podman hosts.
curl -sSL https://github.com/queil/rooz/releases/latest/download/rooz-aarch64-apple-darwin -o ./rooz && chmod +x ./rooz && sudo mv ./rooz /usr/local/bin
curl -sSL https://github.com/queil/rooz/releases/latest/download/rooz-x86_64-unknown-linux-gnu -o ./rooz && chmod +x ./rooz && sudo mv ./rooz /usr/local/bin
To initialize rooz run the following command:
rooz system init
The command creates:
-
an SSH key pair (ed25519) intended to use for auth wherever SSH keys can be used (like github.com)
The generated key gets stored in a volume and then mounted under
~/.ssh
to all rooz containers. -
an age encryption key pair intended to use for encryption of sensitive config data (i.e. secrets)
The generated key gets stored in a volume and then mounted under
~/.age
to all rooz containers.ℹ️ It's important to back up the generated age identity (
~/.age/age.key
). If the key is lost all the existing config files with encrypted vars won't decrypt and re-encrypting will be required. To init rooz with an existing age identity use the--age-identity
switch.
You can regenerate the keys by specifying the --force
parameter. Please note that the existing keys will be wiped out.
ℹ️ Read more in the Configuration section
Rooz works best with user's provided custom image(s).
You can pass image, shell, and user via cli parameters but it's much more convenient to set it up
in your host's ~/.bashrc
(or a non-bash equivalent), and only override it via cli when required.
export ROOZ_USER=queil
export ROOZ_IMAGE=ghcr.io/queil/image:latest
export ROOZ_SHELL=bash
export ROOZ_CACHES='~/.local/share/containers/storage/'
rooz new myworkspace
rooz new -g [email protected]:your/repo myworkspace2
rooz enter myworkspace2
rooz tmp --image alpine --shell sh
ℹ️ Rooz supports both toml
and yaml
as configuration formats. The examples here are all in toml
.
Most of the settings can be configured via:
- environment variables
- a config file in the cloned repository (if any) (
.rooz.toml
,.rooz.yaml
) - a config file specified via
--config
(onrooz new
) (toml/yaml
) :information_source: it can be a local file path or a remote git file like:[email protected]/my/configs//path/in/repo/config.rooz.yaml
- cmd-line parameters
The configuration file provides the most options: example
ℹ️ the default image is docker.io/bitnami/git:latest
There are a few ways of specifying images:
-
via the
ROOZ_IMAGE
env variable -
via the
--image
cmd-line parameter -
if creating a workspace with a git repository via
.rooz.toml
in the root of that repository:image = "ghcr.io/queil/image:dotnet" shell = "bash"
rooz
runs as uid 1000
(always - it's hard-coded) so make sure it exists in your image
(with rooz_user
as the name - it can be overridden via ROOZ_USER
or --user
)
The default shell is bash
but you can override it via:
ROOZ_SHELL
env var--shell
cmd-line parameter (onrooz enter
)- in
.rooz.toml
viashell
rooz
supports basic path-keyed shared caches. It can be set per-repo like:
caches = [
"~/.nuget"
]
All the repos specifying a cache path will share a container volume mounted at that path enabling cache reuse.
It also can be set globally via ROOZ_CACHES
(comma-separated paths). The global paths get combined with repo-specific paths.
Port mappings for the work container can be specified via .rooz.toml
only:
ports = [
"80:8080",
"22:8022"
]
Rooz supports basic variable replacement/templating:
- handlebars syntax is used
- variables are declared via
vars
- secrets are declared via
secrets
- secrets are decrypted before expanding
- handlebars can be used everywhere in the file as long as it results in a valid syntax of a given format
- vars/secrets replacement works within
vars
themselves too. However, only if the var usage is below the var definition (in the document order). - the secret section does not support var/secrets replacement
secrets:
sqlPassword: '----BEGIN AGE ENCRYPTED FILE-----|YWdlLWVuY3J ... truncated'
vars:
sqlUser: admin
sqlConnectionString: "uid={{ sqlUser }};pwd={{ sqlPassword }}"
env:
SQL_CONNECTION_A: "database=A;{{ sqlConnectionString }}"
SQL_CONNECTION_B: "database=B;{{ sqlConnectionString }}"
sidecars:
tool:
env:
SQL_USER: "{{ sqlUser }}"
SQL_PASSWORD: "{{ sqlPassword }}"
Rooz uses age encryption to safely store sensitive data (like API keys) in config files.
Make sure your rooz has been initiated with rooz system init
Run touch example.yaml
and rooz config edit example.yaml
. Your default editor should open.
Paste the following config, save & quit.
secrets:
apiKey: 1744420283158995
env:
API_URL: https://api.rooz.dev/v1
API_KEY: "{{ apiKey }}"
Now cat example.yaml
and you should see something like the below:
secrets:
apiKey: '----BEGIN AGE ENCRYPTED FILE-----|YWdlLWVuY3J ... truncated'
env:
API_URL: https://api.rooz.dev/v1
API_KEY: "{{ apiKey }}"
Now, we can create a new workspace like:
rooz new secrets-test --config ./example.yaml
And enter the container and the API_KEY
var is value gets decrypted and injected:
rooz enter secrets-test
> echo $API_KEY
1744420283158995
It's similar to docker-compose but super simple and limited to bare minimum.
-
rooz
has a limited support for sidecars (containers running along). It is only available via.rooz.toml
/.rooz.yaml
:[sidecars.sql] image = "my:sql" command = ["--some"] [sidecars.sql.env] TEST="true" [sidecars.tools] image = "my:tools"
All containers within a workspace are connected to a workspace-wide network. They can talk to each other using sidecar names. In the above examples that would be
sql
andtools
. Also the usual container ID and IP works too, but it is not as convenient. -
the
enter
command now lets you specify--container
to enter (otherwise it enters the work container).
Supported keywords:
image
- set containers imageenv
- set environment variablescommand
- override container commandmounts
- mount automatically-named rw volumes at the specified paths (so they can survive container restarts/deletes).ports
- port bindings in the"8080:8080"
formatwork_dir
- set working directorymount_work
(bool
) - if true then the work volume is mounted at/work
-
cloned git repos are under
/work/{repo_name}
whererepo_name
is the default one generated bygit
during cloning. -
you can enable
rooz
debug logging by setting theRUST_LOG=rooz
env variable -
if
rooz
misbehaves you can go nuclear and runrooz system prune
to remove ALL the rooz containers and volumes. You can also remove just the workspaces, (leaving shared caches volumes, and the ssh volume untouched), by:rooz rm --all --force
⚠️ rooz system prune
deletes all your state held withrooz
so make sure everything important is stored before.
-
When a volume is first crated container automatically populates it from the image (assuming there are any files in the corresponding directory in the image). It only happens if the volume is empty. So if you try to mount pre-existing volumes to a container with a new image the volumes' contents won't be updated. It is particularly annoying with the home dir volume as it holds user-specific configurations and may be wildly different from one image to another. A workaround could be to drop the home dir volume so that it gets recreated with the new content, however that way we lose things like
.bash_history
. To be resolved... -
auto-resizing rooz session to fit the terminal window (if resized) is not implemented. Workaround: exit the session, resize the window to your liking, enter the container.
Rooz connects to a local Docker daemon by default. However, it can connect to remote hosts via SSH and forward a local unix socket to the remote's Docker/Podman socket.
-
In
~/.bashrc
at the top:- For Docker as root:
export DOCKER_HOST=/var/run/docker.sock
- For rootless Docker:
export DOCKER_HOST=/run/user/1000/docker.sock
(assuming your-user has uid=1000) - For Podman:
export DOCKER_HOST=/run/user/1000/podman/podman.sock
(assuming your-user has uid=1000)
- For Docker as root:
Add to your ~/.bashrc
:
export ROOZ_REMOTE_SSH_URL=ssh://your-user@remote-host
export DOCKER_HOST=unix:///home/your-user/.rooz/remote.sock
Now run: rooz remote
. If any remote containers
expose ports, these will be automatically forwarded.
ℹ️ To enable VsCode to attach to remote containers also set the below in settings.json
:
"docker.host": "unix:///home/your-user/.rooz/remote.sock"
- Make sure podman remote socket is enabled:
podman info
should contain the following YAML:
remoteSocket:
exists: true
path: /run/user/1000/podman/podman.sock
If exists: true
is missing, try this command: systemctl --user enable --now podman.socket
- Make sure you have the podman socket exposed as the
DOCKER_HOST
env var like:
export DOCKER_HOST=unix:///run/user/1000/podman/podman.sock
-
Use fully-qualified image names or define unqualified-search registries
/etc/containers/registries.conf
-
When running more complex podman in podman scenarios (like networking) you may need to run rooz with
--privileged
switch more info.