Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.stacyide.xyz/llms.txt

Use this file to discover all available pages before exploring further.

Runtime Certification

Phase 7 treats runtime certification as a required host-level check before a provider is marked production-ready. Run dependency checks:
scripts/certify-runtime.sh all
scripts/certify-runtime.sh docker
scripts/certify-runtime.sh firecracker
scripts/certify-runtime.sh proot
Generate a durable artifact for release or host signoff:
scripts/certify-runtime.sh docker --format markdown --output docker-certification.md
scripts/certify-runtime.sh firecracker --format json --output firecracker-certification.json
For Phase 14 worker identity signoff, run the signed-token lifecycle smoke:
scripts/certify-worker-identity.sh worker-a
scripts/certify-worker-identity.sh worker-a --format markdown --output worker-identity-certification.md
This verifies token issue, inspect, verify, revocation rejection, and rotation-plan generation using secret files. Set STACYVM_WORKER_SIGNING_KEY_FILE, STACYVM_OLD_WORKER_SIGNING_KEY_FILE, STACYVM_WORKER_IDENTITY_AUDIENCE, or STACYVM_WORKER_IDENTITY_TTL to point at deployment-specific values. Workers that receive signed tokens from an external issuer can run with stacyvm worker --worker-token-file /run/secrets/stacyvm-worker-token. The worker reloads that file for every heartbeat and lease-renewal request, allowing a sidecar to replace short-lived token files before expiry without a worker restart. The script exits non-zero when any required check fails. Warnings are included in the artifact but do not fail the command. Attach the generated artifact to the release checklist, support ticket, or infrastructure change record for the host being certified. For Firecracker and PRoot, set optional paths to make host validation stricter:
STACYVM_FIRECRACKER_KERNEL=/var/lib/stacyvm/vmlinux.bin \
  scripts/certify-runtime.sh firecracker --format markdown --output firecracker-certification.md

STACYVM_PROOT_ROOTFS=/var/lib/stacyvm/rootfs \
STACYVM_PROOT_WORKSPACE_BASE=/var/lib/stacyvm/workspaces \
  scripts/certify-runtime.sh proot --format markdown --output proot-certification.md

Certification Matrix

RuntimeChecksProduction signoff
DockerCLI, daemon reachability, seccomp visibilityPass on target host, then run provider conformance with Docker enabled
gVisorDocker daemon reachability and runtime discovery for runsc/gVisorPass discovery and run Docker provider with runtime configured
KataDocker daemon reachability and runtime discovery for KataPass discovery and run Docker provider with runtime configured
FirecrackerBinary, /dev/kvm, optional kernel pathPass on Linux/KVM host with configured kernel/rootfs/agent
PRootproot binary, optional rootfs/workspace pathsPass with configured rootfs and workspace base
stacyvm doctor --production remains the operator-facing readiness command. Docker provider integration tests are opt-in to keep default CI independent of Docker Hub and host daemon state. Run them on a certified Docker host with STACYVM_DOCKER_INTEGRATION=1 make test. The certification script is the lower-level host check for runtime dependencies that may not exist in CI or on developer laptops.

Required Phase 8 Signoff Artifacts

Before calling a single-node host production-ready, collect:
  • stacyvm config lint --production --file <config>
  • stacyvm upgrade rehearse --config <config> --database <db> --backup-output <path>
  • stacyvm doctor --production
  • scripts/certify-runtime.sh <runtime> --format markdown --output <runtime>-certification.md
  • scripts/certify-worker-identity.sh <worker-id> --format markdown --output worker-identity-certification.md
  • Provider conformance or smoke output for the configured runtime.
Store these artifacts with the deployment record. Do not treat a runtime as certified because CI passed on another host; runtime certification is per-host and depends on kernel, daemon, KVM, rootfs, and installed runtime state.