Write Compose-like stacks in Python — when static files fall short.
Same Docker, same containers, same behaviour — just no more hacks around static YAML. Use real code instead.
For developers and DevOps: when Compose YAML hits its limits, but Kubernetes is overkill.
Containup isn’t a replacement for Compose. It’s what you reach for when Compose isn’t enough anymore.
- If your
docker-compose.yml
still does the job, stick with it. - But if you’ve added a
Makefile
,envsubst
, or shell wrappers — maybe it’s no longer “simple”. That’s where Containup comes in: one file, your logic, no glue, no guessing.
Important
❌ With Compose YAML
- You need
.env
,envsubst
,shell
,Makefiles
... - Can’t branch, can’t loop, can’t fetch a secret
- Logic spread across files and scripts
- No preview of what will run
✅ With Containup
- One Python script — your script, readable, testable, versionable
- Real logic —
if
,for
, variables, secrets, external calls, reusability - Safe preview —
--dry-run
with warnings and human reporting - No glue, no guessing
🛠 Write it
from containup import Stack, Service, containup_run
stack = Stack("demo").add(Service(name="web", image="nginx:alpine"))
containup_run(stack)
🚀 Run it
./your-stack.py up --dry-run # ✅ dry-run to inspect → flaky images, secret access, env logic
./your-stack.py up # 🚀 launch your stack
🧠 Heads up
Containup is not a CLI. You don’t run containup.
You write and run your own Python script —stack.py
. That’s your new Compose file.
curl -sSL -o containup-try.sh https://raw.githubusercontent.com/sebastienjust/containup-py/main/samples/containup-try.sh && bash ./containup-try.sh
🔥 Ready in 10s — launches an example of a full n8n stack with PostgreSQL, Traefik, and pgAdmin.
Requires Python >= 3.9 + Docker installed and running on your machine.
Example source: sample_n8n.py
This stack includes:
- n8n, PostgreSQL, pgAdmin, Traefik
- Environment-aware logic (dev/staging/prod) without duplicating files
- Centralized routing logic: one function handles all service domains
- Dynamic DNS configuration per environment
- Conditional service inclusion (e.g. pgAdmin only in dev)
- Secret handling and runtime checks
- Human-readable dry-run preview before launching anything
What you will see (condensed):
📦 Volumes: pgdata 🟢 created
🚀 Containers: postgres, n8n, pgadmin, traefik
❌ Warning: bind mount on /etc/postgresql is read-write
Want more?
- ⭐️ Star the repo to follow updates,
- 💬 Give feedback or suggest features.
Docker Compose is great for simple, static setups: define services, volumes, networks — and run.
But the moment you need logic — secrets, conditional mounts, environment-based configs — the model starts to break.
So you add .env
files, then sed
, envsubst
, templating, wrapper scripts. A Makefile
, maybe.
At some point, you’re not describing a stack anymore — you’re managing the machinery around it.
What was supposed to be a simple declarative file becomes a small system of indirection and tooling.
Describing dynamic systems in static files that can’t even branch. What could go wrong? 🙃
IMHO, the paradox is this: Docker Compose is a static format trying to describe dynamic behavior. But real-world deployments are dynamic: logic, context, secrets, runtime conditions. So we build layers on top of YAML to simulate what a real programming language would do natively.
At some point, I was writing more shell than YAML. So I dropped the templates and wrote real code instead. It turned out simpler — and much easier to reason about. And since I wanted to reuse it, I turned it into a library: Containup.
That's what Containup solves (in my use-cases anyway), by taking the opposite approach. It exposes a Python API designed to be declarative — so declarative, in fact, that your Python code can look almost like Compose YAML:
from containup import Service, Stack
Stack("mystack").add(Service(
name="db",
image="postgres:15",
volumes=["dbdata:/var/lib/postgresql/data"],
networks=["backend"]
))
You write your stack file in Python — a language you're maybe already using,
already good at, already documented. And if you don't know Python, it doesn't
matter because the syntax you need for basic things is, in fact, no more
complicated than YAML (and for sure sed
or awk
or anything like this).
You express logic directly. No interpolation, no templating, no escaping, no hacks.
But behind that simplicity, it’s real code. You can loop, branch, query, fetch secrets, load configs — everything you already know, or can learn, in Python. The API stays close to the mental model of Compose, but frees you from its constraints.
from containup import Stack, Service, Volume
stack = Stack("mystack")
stack.add(Service(
name="db",
image="myservice:latest",
volumes=["myservice-data:/opt/application_data"],
environment={
"PG_PASSWORD": gopass("postgres/admin"),
"PG_URL": myvault("where_is_postgres")
},
networks = ["backend"]
))
stack.add(Volume("myservice-data", external=True if dev else False))
But I was still hesitant before running my stacks… What happens when someone else runs it in staging or production — when environments that “should be the same” aren’t, really? Can I simulate that locally? Can I see what will happen, before it actually does? That’s why I added a dry-run mode.
One key pain point with Compose — and container tooling in general — is that you often don’t know exactly what’s going to be created until you run it.
In DevOps workflows, this lack of visibility is risky. You want a plan, not just a launch.
That’s why Containup includes a human-readable --dry-run
mode: it shows exactly what would be
created — volumes, networks, containers, ports — and emits warnings when something looks off:
an image without a tag, a container without a healthcheck, a writable bind mount on a critical path…
In any directory, create your file (we like to call them containup-stack.py
but it can be whatever you want).
Make the file executable if needed (chmod u+x ./containup-stack.py
)
Make sure you install containup
either globally on the machine :
pip install containup
or with a local venv
to not pollute the host with extra stuff.
python -m venv .venv
source .venv/bin/activate # Unix/macOS
## .venv\Scripts\activate # Windows
pip install --upgrade pip
pip install git+https://github.com/sebastienjust/containup-py.git
#!/usr/bin/env python3
# Elements to import
from containup import Stack, Service, Volume, Network, containup_run, VolumeMount
import logging
# Configure logging so you can have log output as you wish
logging.basicConfig(
level=logging.INFO,
format="%(asctime)s %(name)s [%(levelname)s] %(message)s"
)
# This is your moment, your business logic. You grab what you need from your
# machine, remote services, command-line arguments, environment variables,
# whatever you need.
password = passwords.find("mybddpassword")
# Define your service, volumes, networks, like you do with docker-compose
# Create the stack (think of a docker-compose file)
stack = Stack("mystack")
# Then, add elements. Order doesn't matter
# If you need add one or more volumes (you can use "if", "for loops")
# Default behaviour is to create them if they not exist, or else, reuse them.
stack.add(Volume("dbdata", driver="local"))
# If you need add one or more networks (you can use "if", "for loops")
# Default behaviour is to create them if they not exist, or else, reuse them.
stack.add(Network("backend"))
# Describe your own services. Containup API syntax tries to stick with
# docker-compose naming and syntax, so you can guess what you need to do.
# Containup library is strongly typed: if you use Pylance for example,
# don't worry, your IDE will help autocompleting your code.
stack.add(Service(
name="db",
image="postgres:15",
volumes=[VolumeMount("dbdata", "/var/lib/postgresql/data")],
network="backend"
))
stack.add(Service(
name="app",
image="myorg/myapp:latest",
depends_on=["db"],
network="backend",
environment={"DATABASE_URL": f"postgres://user:{password}@db:5432/db"}
))
# Now that we have the stack declared, we can run the commands on the stack
containup_run(stack)
# Check everything
./containup-stack.py up --dry-run
One recurring pain point in container workflows is this:
You don’t know what will be created — until it’s already running.
Docker Compose doesn’t show you a plan. It just runs.
You launch, then you find out what happened.
But DevOps needs visibility. Whether you're scripting a deployment, reviewing a config, debugging CI, or syncing with a teammate — you want to see first, run second.
Containup provides a --dry-run
mode to do exactly that.
It prints a clean, readable preview of what the stack will create:
volumes, networks, containers, ports, mounts, environment variables, and more — without touching your system.
Tip
The following example can be run immediately if you "git clone" this project (see instructions for checkout below):
$ python3 samples/sample_n8n.py up --dry-run
🧱 Stack: n8n-stack (dry-run) up
📦 Volumes
- pg_data : 🟢 created
- n8n_data : 🟢 created
- pgadmin_data : 🟢 created
🔗 Networks
- n8n : 🟢 created
🚀 Containers
1. postgres (image: postgres:17.5)
Network : n8n
Network : 5432/tcp
Mounts : /var/lib/postgresql/data → (volume) pg_data (read-write)
Environment: POSTGRES_USER=n8n
POSTGRES_PASSWORD=<Secret: postgres password>
POSTGRES_DB=n8n
Healthcheck: (shell) pg_isready -U n8n
2. n8n (image: docker.n8n.io/n8nio/n8n:1.93.0)
Network : n8n
Network : 5678:5678/tcp
Mounts : /home/node/.n8n → (volume) n8n_data (read-write)
Environment: DB_TYPE=postgresdb
DB_POSTGRESDB_HOST=postgres
DB_POSTGRESDB_PORT=5432
DB_POSTGRESDB_DATABASE=n8n
DB_POSTGRESDB_USER=n8n
DB_POSTGRESDB_PASSWORD=<Secret: db_password>
GENERIC_TIMEZONE=Europe/Paris
TZ=Europe/Paris
N8N_LOG_LEVEL=debug
N8N_SECURE_COOKIE=false
N8N_PROXY_HOPS=1
Depends on : postgres
Healthcheck: 🛈 no healthcheck
Labels : traefik.http.routers.n8n.rule=Host(`n8n.docker.local`)
traefik.enable=true
3. pgadmin (image: dpage/pgadmin4 ❌ image has no explicit tag (defaults to :latest))
Network : n8n
Network : 5050:80/tcp
Mounts : /var/lib/pgadmin → (volume) pgadmin_data (read-write)
Environment: [email protected]
PGADMIN_DEFAULT_PASSWORD=<Secret: PGADMIN_DEFAULT_PASSWORD>
Healthcheck: 🛈 no healthcheck
Labels : traefik.http.routers.pgadmin.rule=Host(`pgadmin.docker.local`)
traefik.enable=true
4. traefik (image: traefik:v3.4)
Network : n8n
Network : 80:80/tcp, 8080:8080/tcp
Mounts : /var/run/docker.sock → (bind) /var/run/docker.sock (read-write)
❌ sensitive host path
⚠️ default to read-write, make it explicit
Commands : --api.insecure=true --providers.docker=true --entrypoints.web.address=:80 --providers.docker.exposedbydefault=false
Healthcheck: 🛈 no healthcheck
5. traefik-whoami (image: traefik/whoami ❌ image has no explicit tag (defaults to :latest))
Network : n8n
Depends on : traefik
⚠️ traefik has no healthcheck
Healthcheck: 🛈 no healthcheck
Labels : traefik.http.routers.whoami.rule=Host(`whoami.docker.local`)
traefik.enable=true
Tip
Secrets, when declared with secret()
, are reacted in reports, logs, and exceptions.
--dry-run
is more than a preview. It’s your plan + linter in one.
--dry-run
is for humans. It gives you a clear, shareable, verifiable view of what
Containup will do — before it does it.
You can use it to:
- debug and understand your stack logic,
- explain what will happen in a merge request or ops meeting,
- share a deployment plan with colleagues,
- validate changes in CI before they reach production,
- as DevOps, validate changes made by developers,
- as Developer, communicate with DevOps,
- catch mistakes like bad tags, dangerous mounts, or missing readiness checks,
- document in seconds.
In practice, this removes a common DevOps fear:
"If I run this, what exactly is it going to do?"
Dry-run gives you the confidence to say: "Here’s what it will do, line by line."
Containup dry-run emits warnings when it sees patterns known to cause trouble:
- ❌ image has no tag (defaults to
:latest
) ⚠️ image uses unstable or vague tag (dev
,nightly
, etc.)- ❌ bind mount over sensitive host path (
/etc
,/var
,/root
) - ❌ conflicting mount paths
- ❌ relative mount paths
⚠️ bind mount is read-write by default — make it explicit- 🛈 no healthcheck — Docker will consider the service healthy as soon as it starts
Upcoming (not in this release)
⚠️ port exposed without fixed host binding- ❌ Environment variables with plaintext secrets
These checks don’t block anything. They just make the implicit explicit — so you can catch it early, and fix it while it’s still safe.
--dry-run
tells you what containup will do without talking to Docker.
It is useful when you want to check what containup will do, without anything being
installed on the host.
--live-check
option tells what it will do against running Docker containers.
For example, if an image is not available on the host, --live-check
will verify
if the image is available, then tell you that image will be downladed. Same for
containers, if the container is running, --live-check
will tell :
3. pgadmin
Container : 🟢 exists → 🔴 removed → 🟢 run
Image : dpage/pgadmin4 🟢 exists
...
5. traefik-whoami
Container : ⚫ missing → 🟢 run
Image : traefik/whoami ⚫ missing → 📥 pulled
# Starts everything
./containup-stack.py up
# Stops everything
./containup-stack.py down
# Starts only myservice
./containup-stack.py up --service myservice
# Stops only myservice
./containup-stack.py down --service myservice
# Starts everything and give yourself parameters
# you should not need a lot of parameters since your script can get what it
# needs programmatically.
./containup-stack.py up -- --myprofile=staging
You can add elements to your stack in multiple ways:
from containup import Stack, Service, Volume, Network, containup_run
stack = Stack("mystack")
stack.add(Volume("myvolume1"))
stack.add(Volume("myvolume2"))
stack.add(Network("network1"))
stack.add(Network("network2"))
stack.add(Service(name="myservice", image="nginx:latest"))
containup_run(stack)
or you can chain calls as add
is a builder method:
from containup import Stack, Service, Volume, Network, containup_run
stack = Stack("mystack").add(
Volume("myvolume2")).add(
Volume("myvolume1")).add(
Network("network1")).add(
Network("network2")).add(
Service(name="myservice", image="nginx:latest"))
containup_run(stack)
or add elements as lists:
from containup import Stack, Service, Volume, Network, containup_run
stack = Stack("mystack").add([
Volume("myvolume1"),
Volume("myvolume2"),
Network("network1"),
Network("network2"),
Service(name="myservice", image="nginx:latest")
])
containup_run(stack)
or a combination of everything:
from containup import Stack, Service, Volume, Network, containup_run
stack = Stack("mystack").add([
Volume("myvolume1"),
Volume("myvolume2"),
Network("network1"),
]).add(
Service(name="myservice", image="nginx:latest")
)
if something:
stack.add(Network("network2"))
if other_thing:
stack.add([
Volume("monitoring_data"),
Network("monitoring_network"),
Service(name="monitoring")
])
containup_run(stack)
Mostly you will get help of IDE and you'll find everything you need in class Stack.
Some differences on things you may be used to:
Docker manages 3 types of "volumes" :
- bind: maps one of the container's directory to your host in another directory
- volume: maps one of the container's directory to a Docker volume (a virtual hard disk)
- tmpfs: creates a temporary, in-memory, filesystem.
It's often unclear to know which parameters to use in which case. That's why we declare those like this:
If the directory to map is a Docker volume, use VolumeMount
from containup import Stack, Service, VolumeMount, Volume, containup_run
stack = Stack("yourstack")
stack.add(Volume("postgres-data"))
stack.add(Service(
"postgres",
image="postgres:17",
volumes=[VolumeMount("postgres-data", "/var/lib/postgresql/data")]
))
containup_run(stack)
If the directory to map is your host's hard drive, it's bind:
from containup import Stack, Service, BindMount, containup_run
Stack("yourstack").add(Service(
"postgres",
image="postgres:17",
volumes=[BindMount("/home/mycomputer/postgres", "/var/lib/postgresql/data")]
))
containup_run(stack)
And for TmpFS
from containup import Stack, Service, TmpfsMount, containup_run
stack = Stack("yourstack", config).add(Service(
"postgres",
image="postgres:17",
volumes=[TmpfsMount("/var/lib/postgresql/data")]
))
containup_run(stack)
In each scenario, you can pass additional parameters, but only the parameters that matches the type of mount.
To avoid confusion between the port "inside" the container (which needs to be exposed) and the port "outside" the container (from which you can access the container services), use explicit notation like this:
from containup import Stack, Service, port, containup_cli, containup_run
stack = Stack("yourstack", config).add(Service(
name="caddy",
image="caddy:latest",
ports=[
port(container_port=80, host_port=8080),
port(container_port=443, host_port=8443),
port(container_port=9000),
],
))
containup_run(stack)
You have some small factory methods in containup you can use to create the port mappings, use them to make your stack structure more readable.
You can also use the full ServicePortMapping
class that allow precise configuration.
- Parse your own command line arguments
- Handle container inter-dependencies
- Launch Multiple Instances of a Service (scale containers)
This repo follows standard Python packaging practices:
containup-py/
containup/
__init__.py
stack.py
docker_interface.py
pyproject.toml
README.md
LICENSE
This library uses the following tools:
Tool | Usage |
---|---|
ruff | linter |
black | formatter |
pyright | static typing verification |
pytest | unit tests |
pre-commit | pre-commit hooks |
bumpver | Bump version numbers in project files |
Some bookmarks.
Docker documentation and specs:
- Docker Engine API reference
- Docker Engine API spec 1.49
- Docker Python SDK
- Docker Compose file Reference
This project is licensed under the GNU General Public License v3.0. See the LICENSE file for details.