Skip to content

Define and run Docker Compose-like stacks in Python — with logic, dry-run, checks, no YAML / no hacks.

License

Notifications You must be signed in to change notification settings

sebastienjust/containup-py

Repository files navigation

containup

Write Compose-like stacks in Python — when static files fall short.

Same Docker, same containers, same behaviour — just no more hacks around static YAML. Use real code instead.

For developers and DevOps: when Compose YAML hits its limits, but Kubernetes is overkill.

Containup isn’t a replacement for Compose. It’s what you reach for when Compose isn’t enough anymore.

  • If your docker-compose.yml still does the job, stick with it.
  • But if you’ve added a Makefile, envsubst, or shell wrappers — maybe it’s no longer “simple”. That’s where Containup comes in: one file, your logic, no glue, no guessing.

PyPI version Downloads/month License: GPL-3.0-or-later CI

Important

⚠️ This project is under active development — the API may change frequently.

Summary

❌ With Compose YAML

  • You need .env, envsubst, shell, Makefiles...
  • Can’t branch, can’t loop, can’t fetch a secret
  • Logic spread across files and scripts
  • No preview of what will run

✅ With Containup

  • One Python script — your script, readable, testable, versionable
  • Real logic — if, for, variables, secrets, external calls, reusability
  • Safe preview — --dry-run with warnings and human reporting
  • No glue, no guessing

🛠 Write it

from containup import Stack, Service, containup_run
stack = Stack("demo").add(Service(name="web", image="nginx:alpine"))
containup_run(stack)

🚀 Run it

./your-stack.py up --dry-run   # ✅ dry-run to inspect → flaky images, secret access, env logic
./your-stack.py up             # 🚀 launch your stack

🧠 Heads up
Containup is not a CLI. You don’t run containup.
You write and run your own Python script — stack.py. That’s your new Compose file.

Try it now

curl -sSL -o containup-try.sh https://raw.githubusercontent.com/sebastienjust/containup-py/main/samples/containup-try.sh && bash ./containup-try.sh 

🔥 Ready in 10s — launches an example of a full n8n stack with PostgreSQL, Traefik, and pgAdmin.

Requires Python >= 3.9 + Docker installed and running on your machine.

Example source: sample_n8n.py

This stack includes:

  • n8n, PostgreSQL, pgAdmin, Traefik
  • Environment-aware logic (dev/staging/prod) without duplicating files
  • Centralized routing logic: one function handles all service domains
  • Dynamic DNS configuration per environment
  • Conditional service inclusion (e.g. pgAdmin only in dev)
  • Secret handling and runtime checks
  • Human-readable dry-run preview before launching anything

What you will see (condensed):

📦 Volumes: pgdata 🟢 created
🚀 Containers: postgres, n8n, pgadmin, traefik
❌ Warning: bind mount on /etc/postgresql is read-write

Interested in containup?

Want more?


Motivations

Docker Compose is great for simple, static setups: define services, volumes, networks — and run.

But the moment you need logic — secrets, conditional mounts, environment-based configs — the model starts to break.

So you add .env files, then sed, envsubst, templating, wrapper scripts. A Makefile, maybe.

At some point, you’re not describing a stack anymore — you’re managing the machinery around it.

What was supposed to be a simple declarative file becomes a small system of indirection and tooling.

Describing dynamic systems in static files that can’t even branch. What could go wrong? 🙃

IMHO, the paradox is this: Docker Compose is a static format trying to describe dynamic behavior. But real-world deployments are dynamic: logic, context, secrets, runtime conditions. So we build layers on top of YAML to simulate what a real programming language would do natively.

At some point, I was writing more shell than YAML. So I dropped the templates and wrote real code instead. It turned out simpler — and much easier to reason about. And since I wanted to reuse it, I turned it into a library: Containup.

That's what Containup solves (in my use-cases anyway), by taking the opposite approach. It exposes a Python API designed to be declarative — so declarative, in fact, that your Python code can look almost like Compose YAML:

from containup import Service, Stack
Stack("mystack").add(Service(
    name="db",
    image="postgres:15",
    volumes=["dbdata:/var/lib/postgresql/data"],
    networks=["backend"]
))

You write your stack file in Python — a language you're maybe already using, already good at, already documented. And if you don't know Python, it doesn't matter because the syntax you need for basic things is, in fact, no more complicated than YAML (and for sure sed or awk or anything like this).

You express logic directly. No interpolation, no templating, no escaping, no hacks.

But behind that simplicity, it’s real code. You can loop, branch, query, fetch secrets, load configs — everything you already know, or can learn, in Python. The API stays close to the mental model of Compose, but frees you from its constraints.

from containup import Stack, Service, Volume
stack = Stack("mystack")
stack.add(Service(
    name="db",
    image="myservice:latest",
    volumes=["myservice-data:/opt/application_data"],
    environment={
        "PG_PASSWORD": gopass("postgres/admin"),
        "PG_URL": myvault("where_is_postgres")
    },
    networks = ["backend"]
))
stack.add(Volume("myservice-data", external=True if dev else False))

Know what you do before launching

But I was still hesitant before running my stacks… What happens when someone else runs it in staging or production — when environments that “should be the same” aren’t, really? Can I simulate that locally? Can I see what will happen, before it actually does? That’s why I added a dry-run mode.

One key pain point with Compose — and container tooling in general — is that you often don’t know exactly what’s going to be created until you run it.

In DevOps workflows, this lack of visibility is risky. You want a plan, not just a launch.

That’s why Containup includes a human-readable --dry-run mode: it shows exactly what would be created — volumes, networks, containers, ports — and emits warnings when something looks off: an image without a tag, a container without a healthcheck, a writable bind mount on a critical path…

Usage

Create your script and use containup

In any directory, create your file (we like to call them containup-stack.py but it can be whatever you want).

Make the file executable if needed (chmod u+x ./containup-stack.py)

Make sure you install containupeither globally on the machine :

pip install containup

or with a local venv to not pollute the host with extra stuff.

python -m venv .venv
source .venv/bin/activate  # Unix/macOS
## .venv\Scripts\activate    # Windows
pip install --upgrade pip
pip install git+https://github.com/sebastienjust/containup-py.git

Script example

#!/usr/bin/env python3

# Elements to import
from containup import Stack, Service, Volume, Network, containup_run, VolumeMount
import logging

# Configure logging so you can have log output as you wish
logging.basicConfig(
    level=logging.INFO,
    format="%(asctime)s %(name)s [%(levelname)s] %(message)s"
)

# This is your moment, your business logic. You grab what you need from your
# machine, remote services, command-line arguments, environment variables,
# whatever you need.
password = passwords.find("mybddpassword")

# Define your service, volumes, networks, like you do with docker-compose

# Create the stack (think of a docker-compose file)
stack = Stack("mystack")

# Then, add elements. Order doesn't matter

# If you need add one or more volumes (you can use "if", "for loops")
# Default behaviour is to create them if they not exist, or else, reuse them.
stack.add(Volume("dbdata", driver="local"))

# If you need add one or more networks (you can use "if", "for loops")
# Default behaviour is to create them if they not exist, or else, reuse them.
stack.add(Network("backend"))

# Describe your own services. Containup API syntax tries to stick with
# docker-compose naming and syntax, so you can guess what you need to do.
# Containup library is strongly typed: if you use Pylance for example,
# don't worry, your IDE will help autocompleting your code.
stack.add(Service(
    name="db",
    image="postgres:15",
    volumes=[VolumeMount("dbdata", "/var/lib/postgresql/data")],
    network="backend"
))
stack.add(Service(
    name="app",
    image="myorg/myapp:latest",
    depends_on=["db"],
    network="backend",
    environment={"DATABASE_URL": f"postgres://user:{password}@db:5432/db"}
))

# Now that we have the stack declared, we can run the commands on the stack
containup_run(stack)

--dry-run

# Check everything
./containup-stack.py up --dry-run 

One recurring pain point in container workflows is this:
You don’t know what will be created — until it’s already running.

Docker Compose doesn’t show you a plan. It just runs.
You launch, then you find out what happened.

But DevOps needs visibility. Whether you're scripting a deployment, reviewing a config, debugging CI, or syncing with a teammate — you want to see first, run second.

Containup provides a --dry-run mode to do exactly that. It prints a clean, readable preview of what the stack will create: volumes, networks, containers, ports, mounts, environment variables, and more — without touching your system.

Tip

The following example can be run immediately if you "git clone" this project (see instructions for checkout below):

$ python3 samples/sample_n8n.py up --dry-run

🧱 Stack: n8n-stack (dry-run) up 

📦 Volumes
  - pg_data      : 🟢 created   
  - n8n_data     : 🟢 created   
  - pgadmin_data : 🟢 created   

🔗 Networks
  - n8n          : 🟢 created  

🚀 Containers

1. postgres (image: postgres:17.5)
    Network    : n8n
    Network    : 5432/tcp
    Mounts     : /var/lib/postgresql/data → (volume) pg_data (read-write)
    Environment: POSTGRES_USER=n8n
                 POSTGRES_PASSWORD=<Secret: postgres password>
                 POSTGRES_DB=n8n
    Healthcheck: (shell) pg_isready -U n8n

2. n8n (image: docker.n8n.io/n8nio/n8n:1.93.0)
    Network    : n8n
    Network    : 5678:5678/tcp
    Mounts     : /home/node/.n8n → (volume) n8n_data (read-write)
    Environment: DB_TYPE=postgresdb
                 DB_POSTGRESDB_HOST=postgres
                 DB_POSTGRESDB_PORT=5432
                 DB_POSTGRESDB_DATABASE=n8n
                 DB_POSTGRESDB_USER=n8n
                 DB_POSTGRESDB_PASSWORD=<Secret: db_password>
                 GENERIC_TIMEZONE=Europe/Paris
                 TZ=Europe/Paris
                 N8N_LOG_LEVEL=debug
                 N8N_SECURE_COOKIE=false
                 N8N_PROXY_HOPS=1
    Depends on : postgres
    Healthcheck: 🛈  no healthcheck
    Labels     : traefik.http.routers.n8n.rule=Host(`n8n.docker.local`)
                 traefik.enable=true

3. pgadmin (image: dpage/pgadmin4 ❌  image has no explicit tag (defaults to :latest))
    Network    : n8n
    Network    : 5050:80/tcp
    Mounts     : /var/lib/pgadmin → (volume) pgadmin_data (read-write)
    Environment: [email protected]
                 PGADMIN_DEFAULT_PASSWORD=<Secret: PGADMIN_DEFAULT_PASSWORD>
    Healthcheck: 🛈  no healthcheck
    Labels     : traefik.http.routers.pgadmin.rule=Host(`pgadmin.docker.local`)
                 traefik.enable=true

4. traefik (image: traefik:v3.4)
    Network    : n8n
    Network    : 80:80/tcp, 8080:8080/tcp
    Mounts     : /var/run/docker.sock → (bind) /var/run/docker.sock (read-write)
                     ❌  sensitive host path
                     ⚠️  default to read-write, make it explicit
    Commands   : --api.insecure=true --providers.docker=true --entrypoints.web.address=:80 --providers.docker.exposedbydefault=false
    Healthcheck: 🛈  no healthcheck

5. traefik-whoami (image: traefik/whoami ❌  image has no explicit tag (defaults to :latest))
    Network    : n8n
    Depends on : traefik
                     ⚠️  traefik has no healthcheck
    Healthcheck: 🛈  no healthcheck
    Labels     : traefik.http.routers.whoami.rule=Host(`whoami.docker.local`)
                 traefik.enable=true

Tip

Secrets, when declared with secret(), are reacted in reports, logs, and exceptions.

What is this useful for?

--dry-run is more than a preview. It’s your plan + linter in one.

--dry-run is for humans. It gives you a clear, shareable, verifiable view of what Containup will do — before it does it.

You can use it to:

  • debug and understand your stack logic,
  • explain what will happen in a merge request or ops meeting,
  • share a deployment plan with colleagues,
  • validate changes in CI before they reach production,
  • as DevOps, validate changes made by developers,
  • as Developer, communicate with DevOps,
  • catch mistakes like bad tags, dangerous mounts, or missing readiness checks,
  • document in seconds.

In practice, this removes a common DevOps fear:

"If I run this, what exactly is it going to do?"

Dry-run gives you the confidence to say: "Here’s what it will do, line by line."

What does it check?

Containup dry-run emits warnings when it sees patterns known to cause trouble:

  • ❌ image has no tag (defaults to :latest)
  • ⚠️ image uses unstable or vague tag (dev, nightly, etc.)
  • ❌ bind mount over sensitive host path (/etc, /var, /root)
  • ❌ conflicting mount paths
  • ❌ relative mount paths
  • ⚠️ bind mount is read-write by default — make it explicit
  • 🛈 no healthcheck — Docker will consider the service healthy as soon as it starts

Upcoming (not in this release)

  • ⚠️ port exposed without fixed host binding
  • ❌ Environment variables with plaintext secrets

These checks don’t block anything. They just make the implicit explicit — so you can catch it early, and fix it while it’s still safe.

--dry-run + --live-check

--dry-run tells you what containup will do without talking to Docker. It is useful when you want to check what containup will do, without anything being installed on the host.

--live-check option tells what it will do against running Docker containers.

For example, if an image is not available on the host, --live-check will verify if the image is available, then tell you that image will be downladed. Same for containers, if the container is running, --live-check will tell :

3. pgadmin
   Container  : 🟢 exists → 🔴 removed → 🟢 run
   Image      : dpage/pgadmin4 🟢 exists

...

5. traefik-whoami
   Container  : ⚫ missing → 🟢 run
   Image      : traefik/whoami ⚫ missing → 📥 pulled

▶️ Use your script

# Starts everything
./containup-stack.py up
# Stops everything
./containup-stack.py down
# Starts only myservice
./containup-stack.py up --service myservice
# Stops only myservice
./containup-stack.py down --service myservice
# Starts everything and give yourself parameters
# you should not need a lot of parameters since your script can get what it
# needs programmatically.
./containup-stack.py up -- --myprofile=staging

API usage

You can add elements to your stack in multiple ways:

from containup import Stack, Service, Volume, Network, containup_run

stack = Stack("mystack")
stack.add(Volume("myvolume1"))
stack.add(Volume("myvolume2"))
stack.add(Network("network1"))
stack.add(Network("network2"))
stack.add(Service(name="myservice", image="nginx:latest"))
containup_run(stack)

or you can chain calls as add is a builder method:

from containup import Stack, Service, Volume, Network, containup_run

stack = Stack("mystack").add(
    Volume("myvolume2")).add(
    Volume("myvolume1")).add(
    Network("network1")).add(
    Network("network2")).add(
    Service(name="myservice", image="nginx:latest"))
containup_run(stack)

or add elements as lists:

from containup import Stack, Service, Volume, Network, containup_run

stack = Stack("mystack").add([
    Volume("myvolume1"),
    Volume("myvolume2"),
    Network("network1"),
    Network("network2"),
    Service(name="myservice", image="nginx:latest")
])
containup_run(stack)

or a combination of everything:

from containup import Stack, Service, Volume, Network, containup_run

stack = Stack("mystack").add([
    Volume("myvolume1"),
    Volume("myvolume2"),
    Network("network1"),
]).add(
    Service(name="myservice", image="nginx:latest")
)

if something:
    stack.add(Network("network2"))

if other_thing:
    stack.add([
        Volume("monitoring_data"),
        Network("monitoring_network"),
        Service(name="monitoring")
    ])
containup_run(stack)

Creating services tips and tricks

Mostly you will get help of IDE and you'll find everything you need in class Stack.

Some differences on things you may be used to:

Service volume mapping

Docker manages 3 types of "volumes" :

  • bind: maps one of the container's directory to your host in another directory
  • volume: maps one of the container's directory to a Docker volume (a virtual hard disk)
  • tmpfs: creates a temporary, in-memory, filesystem.

It's often unclear to know which parameters to use in which case. That's why we declare those like this:

If the directory to map is a Docker volume, use VolumeMount

from containup import Stack, Service, VolumeMount, Volume, containup_run

stack = Stack("yourstack")
stack.add(Volume("postgres-data"))
stack.add(Service(
    "postgres",
    image="postgres:17",
    volumes=[VolumeMount("postgres-data", "/var/lib/postgresql/data")]
))
containup_run(stack)

If the directory to map is your host's hard drive, it's bind:

from containup import Stack, Service, BindMount, containup_run

Stack("yourstack").add(Service(
    "postgres",
    image="postgres:17",
    volumes=[BindMount("/home/mycomputer/postgres", "/var/lib/postgresql/data")]
))
containup_run(stack)

And for TmpFS

from containup import Stack, Service, TmpfsMount, containup_run

stack = Stack("yourstack", config).add(Service(
    "postgres",
    image="postgres:17",
    volumes=[TmpfsMount("/var/lib/postgresql/data")]
))
containup_run(stack)

In each scenario, you can pass additional parameters, but only the parameters that matches the type of mount.

Port Mapping

To avoid confusion between the port "inside" the container (which needs to be exposed) and the port "outside" the container (from which you can access the container services), use explicit notation like this:

from containup import Stack, Service, port, containup_cli, containup_run

stack = Stack("yourstack", config).add(Service(
    name="caddy",
    image="caddy:latest",
    ports=[
        port(container_port=80, host_port=8080),
        port(container_port=443, host_port=8443),
        port(container_port=9000),
    ],
))
containup_run(stack)

You have some small factory methods in containup you can use to create the port mappings, use them to make your stack structure more readable.

You can also use the full ServicePortMapping class that allow precise configuration.

How-to

Project layout

This repo follows standard Python packaging practices:

containup-py/
  containup/
    __init__.py
    stack.py
    docker_interface.py
  pyproject.toml
  README.md
  LICENSE

Development toolchain

This library uses the following tools:

Tool Usage
ruff linter
black formatter
pyright static typing verification
pytest unit tests
pre-commit pre-commit hooks
bumpver Bump version numbers in project files

Development external documentation

Some bookmarks.

Docker documentation and specs:

License

This project is licensed under the GNU General Public License v3.0. See the LICENSE file for details.

About

Define and run Docker Compose-like stacks in Python — with logic, dry-run, checks, no YAML / no hacks.

Topics

Resources

License

Stars

Watchers

Forks