Skip to content

Provisioning

Shed supports in-repo provisioning scripts that run automatically when sheds start. These scripts are version-controlled with your code.

Provisioning works with all three backends:

  • Docker: Hooks execute via docker exec
  • Firecracker: Hooks execute via vsock
  • VZ: Hooks execute via vsock (same mechanism as Firecracker)

Shed Lifecycle

Understanding the full sequence of events during shed operations helps you know what's available at each stage — for example, credentials are set up before hooks run, so your install script can use SSH keys or API tokens.

Create Sequence

When you run shed create, the following steps execute in order:

Step Docker Firecracker VZ
1. Storage setup Create named volume (or bind mount for --local-dir) Copy base rootfs to instance directory Copy base rootfs to instance directory
2. Container/VM start Create and start container Spawn Firecracker process, allocate TAP device and IP, wait for agent health Spawn vfkit process, wait for agent health
3. Local-dir mount Already bind-mounted at container creation Not supported VirtioFS mount at /workspace
4. Credential setup Already bind-mounted at container creation All credentials transferred via tar-over-vsock Directory credentials mounted via VirtioFS; single-file credentials transferred via tar-over-vsock
5. Repo clone git clone in /workspace (skipped if --local-dir) Same Same
6. Install hook Runs via docker exec; state file marks completion Runs via vsock; state file marks completion Same as Firecracker
7. PATH capture Captures installed tool paths to /etc/profile.d/shed-installed-tools.sh Same Same
8. Startup hook Runs via docker exec Runs via vsock Same as Firecracker
9. Auto-sync Default sync profile from ~/.shed/sync.yaml runs (unless --no-sync) Same Same

Steps 1–8 are server-side. Step 9 runs on the CLI client after the server returns.

Start Sequence

When you run shed start on a stopped shed, the sequence is shorter:

Step Docker Firecracker VZ
1. Container/VM start Start existing container Spawn Firecracker process, wait for agent health Spawn vfkit process, wait for agent health
2. Local-dir re-mount Bind mount persists across restarts Not supported VirtioFS re-mount (mounts do not persist across VM reboots)
3. Credential refresh Bind mounts persist (no action needed) All credentials re-transferred via tar-over-vsock Directory credentials re-mounted via VirtioFS; file credentials re-transferred via tar
4. Startup hook Runs (install hook skipped — state file records it already ran) Same Same

No storage setup, repo clone, install hook, or auto-sync on start.

Stop Sequence

Step Docker Firecracker VZ
1. Shutdown hook Not supported — Docker sends SIGTERM directly Runs via vsock (budget: half of stop timeout, max 30s) Same as Firecracker
2. Agent drain N/A 5-second drain timeout for in-flight operations Same as Firecracker
3. Process stop docker stop (SIGTERM, then SIGKILL after timeout) Firecracker API shutdown, SIGKILL fallback vfkit SIGTERM, then SIGKILL fallback

Delete Sequence

shed delete calls stop (running the shutdown hook if supported), then removes all resources — container and volume for Docker, instance directory for VM backends.

Backend Differences at a Glance

Feature Docker Firecracker VZ
Credential mechanism Bind mount Tar-over-vsock VirtioFS (directories) + tar-over-vsock (files)
Local-dir support Bind mount Not supported VirtioFS
Shutdown hook Not supported Supported Supported
Credential live sync Automatic via bind mount Bidirectional via fsnotify + vsock VirtioFS for directories; fsnotify + vsock for tar-transferred files
Workspace persistence Named volume (survives stop/start) Rootfs image (survives stop/start) Rootfs image (survives stop/start)

Error Handling

Not all failures during create are fatal:

Step On failure
Storage setup, container/VM start, agent health check Fatal — create fails, resources cleaned up
Local-dir mount (VZ) Fatal — VM stopped, create fails
Credential setup Warning logged, create continues
Repo clone Warning logged, create continues
Provisioning hooks Warning logged, create continues
Auto-sync Warning logged, create continues

Quick Start

Create .shed/provision.yaml in your repository root:

hooks:
  install: scripts/provision/install.sh
  startup: scripts/provision/startup.sh
  shutdown: scripts/provision/shutdown.sh

env:
  MY_VAR: "my_value"

Configuration

Provision File Location

Place .shed/provision.yaml in your repository root. Shed detects and executes it automatically.

Fields

Field Type Description
hooks.install string Script that runs once on shed create
hooks.startup string Script that runs on every start
hooks.shutdown string Script that runs before shed stop
env map Custom environment variables

Hooks

Install Hook

Runs once when the shed is created. Use for one-time setup:

  • Installing packages
  • Creating databases
  • Initial configuration

Startup Hook

Runs every time the shed starts. Use for:

  • Starting services
  • Verifying dependencies
  • Runtime configuration

Shutdown Hook

Runs before the shed stops (on shed stop and shed delete). Use for:

  • Gracefully stopping databases (e.g., pg_ctl stop)
  • Flushing caches (e.g., redis-cli shutdown)
  • Saving application state

The shutdown hook has a time budget of half the configured stop timeout (capped at 30s). If the hook exceeds this budget or fails, the shed still stops — hook failures are logged as warnings.

Note: The shutdown hook is supported on the Firecracker and VZ backends. Docker containers stop via docker stop, which sends SIGTERM directly.

After the shutdown hook completes, the agent enforces a 5-second drain timeout on active connections before the VM exits. This gives in-flight exec and file transfer operations time to finish cleanly.

PATH Propagation

After the install hook completes, shed captures the PATH (including any additions made by installers to ~/.bashrc) and persists it to /etc/profile.d/shed-installed-tools.sh. This ensures tools installed by the install hook are available to the startup hook and subsequent commands.

For example, if your install hook runs curl -fsSL https://bun.sh/install | bash, bun's installer adds ~/.bun/bin to ~/.bashrc. Shed detects this and writes:

export PATH="/home/shed/.bun/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin"

to /etc/profile.d/shed-installed-tools.sh. Since startup hooks run as login shells (bash --login -c), they automatically source this file and inherit the installed tools.

Shed also detects mise shims. If your install hook uses mise use --global to install tools, the mise shims directory (~/.local/share/mise/shims) is automatically included in the captured PATH.

Debugging: If tools installed by the install hook aren't found during the startup hook, check the captured PATH:

shed exec myproject -- cat /etc/profile.d/shed-installed-tools.sh

Example: PostgreSQL Setup

.shed/provision.yaml:

hooks:
  install: scripts/provision/install.sh
  startup: scripts/provision/startup.sh

env:
  DATABASE_URL: "postgresql://localhost/myapp"

scripts/provision/install.sh:

#!/bin/bash
set -euo pipefail

# Install PostgreSQL
sudo apt-get update
sudo apt-get install -y postgresql-16

# Create database
sudo -u postgres createdb myapp || true

echo "PostgreSQL installed"

scripts/provision/startup.sh:

#!/bin/bash
set -euo pipefail

# Clean stale PostgreSQL state from prior stop
sudo rm -rf /var/run/postgresql
sudo mkdir -p /var/run/postgresql
sudo chown postgres:postgres /var/run/postgresql 2>/dev/null || true
sudo rm -f /var/lib/postgresql/16/main/postmaster.pid 2>/dev/null || true

# Start PostgreSQL if not running
if ! pg_isready -q 2>/dev/null; then
    echo "Starting PostgreSQL..."
    sudo pg_ctlcluster 16 main start

    for i in {1..10}; do
        pg_isready -q && break
        sleep 1
    done
fi

echo "PostgreSQL is ready"

Startup Hook Best Practices

Handling Stale State After Stop/Start

When services aren't stopped gracefully before shed stop, they leave stale PID files, sockets, and shared memory. On the next shed start, these stale files can prevent services from restarting.

The best approach is to use a shutdown hook to stop services gracefully before the VM exits. The startup hook then serves as a safety net for cases where the shutdown hook wasn't available or failed:

hooks:
  startup: .shed/scripts/startup.sh
  shutdown: .shed/scripts/shutdown.sh

Your startup hook should still clean stale runtime state before starting services (backward compatibility):

#!/bin/bash
set -euo pipefail

# Clean stale PostgreSQL state from prior stop
sudo rm -rf /var/run/postgresql
sudo mkdir -p /var/run/postgresql
sudo chown postgres:postgres /var/run/postgresql 2>/dev/null || true
sudo rm -f /var/lib/postgresql/16/main/postmaster.pid 2>/dev/null || true

# Start PostgreSQL
if ! pg_isready -q 2>/dev/null; then
    sudo pg_ctlcluster 16 main start
fi

Key points:

  • Remove and recreate runtime directories (/var/run/<service>) with correct ownership
  • Remove stale PID files from data directories (e.g., postmaster.pid)
  • Guard commands with 2>/dev/null || true so cleanup is safe on first boot (e.g., chown won't fail if the service user doesn't exist yet, rm won't fail if PID files are missing)
  • This startup-hook stale-state cleanup pattern works identically on Docker, Firecracker, and VZ

Environment Variables

Shed sets these variables automatically:

Variable Description
SHED_CONTAINER Always true in shed containers
SHED_NAME Container name (e.g., myproject)
SHED_WORKSPACE Workspace path (/workspace)

Add custom variables in provision.yaml:

env:
  DATABASE_URL: "postgresql://localhost/myapp"
  NODE_ENV: "development"

Skipping Provisioning

shed create myproject --repo github.com/user/repo --no-provision

Debugging

If provisioning fails, check the logs in the container:

shed console myproject
cat /var/log/shed/install.log
cat /var/log/shed/startup.log
cat /var/log/shed/shutdown.log

Common issues:

  • Script not executable: Shed automatically runs chmod +x before executing
  • Missing dependencies: Install script should handle all dependencies
  • Non-zero exit: Hook failures are logged as warnings but container creation continues

Environment Detection

Check if running in a shed container using [ "$SHED_CONTAINER" = "true" ].