From 7a28e627092c9e13b898b48b9c12c85f7347dead Mon Sep 17 00:00:00 2001 From: Ievgen Popovych Date: Wed, 15 Apr 2020 23:45:10 +0300 Subject: [PATCH] images: Introduce Ubuntu LTS images This adds Ubuntu 16.04, 18.04 and 20.04 images that play well with toolbox: password-less sudo, able to resolve its own hostname, SELinux is masked off, etc. Since 18.04 Ubuntu images on docker hub are 'minimized', so we have to undo that. --- images/ubuntu/16.04/Dockerfile | 39 +++++++ images/ubuntu/16.04/README.md | 160 +++++++++++++++++++++++++++++ images/ubuntu/16.04/extra-packages | 8 ++ images/ubuntu/18.04/Dockerfile | 40 ++++++++ images/ubuntu/18.04/README.md | 160 +++++++++++++++++++++++++++++ images/ubuntu/18.04/extra-packages | 8 ++ images/ubuntu/20.04/Dockerfile | 37 +++++++ images/ubuntu/20.04/README.md | 160 +++++++++++++++++++++++++++++ images/ubuntu/20.04/extra-packages | 8 ++ 9 files changed, 620 insertions(+) create mode 100644 images/ubuntu/16.04/Dockerfile create mode 100644 images/ubuntu/16.04/README.md create mode 100644 images/ubuntu/16.04/extra-packages create mode 100644 images/ubuntu/18.04/Dockerfile create mode 100644 images/ubuntu/18.04/README.md create mode 100644 images/ubuntu/18.04/extra-packages create mode 100644 images/ubuntu/20.04/Dockerfile create mode 100644 images/ubuntu/20.04/README.md create mode 100644 images/ubuntu/20.04/extra-packages diff --git a/images/ubuntu/16.04/Dockerfile b/images/ubuntu/16.04/Dockerfile new file mode 100644 index 000000000..69ad1c47a --- /dev/null +++ b/images/ubuntu/16.04/Dockerfile @@ -0,0 +1,39 @@ +FROM docker.io/library/ubuntu:16.04 + +LABEL com.github.containers.toolbox="true" \ + com.github.debarshiray.toolbox="true" \ + name="ubuntu-toolbox" \ + version="16.04" \ + usage="This image is meant to be used with the toolbox command" \ + summary="Base image for creating Ubuntu toolbox containers" \ + maintainer="Ievgen Popovych " + +COPY README.md / + +# remove some container-optimized apt configuration; +# removing docker-gzip-indexes specifically helps with command-not-found +RUN rm /etc/apt/apt.conf.d/docker-gzip-indexes /etc/apt/apt.conf.d/docker-no-languages + +# Install ubuntu-minimal & ubuntu-standard (recommendations are welcome) +# Ask resolvconf maintainer script not to touch resolve.conf file +# Install extra packages as well as libnss-myhostname +COPY extra-packages / +RUN apt-get update && \ + echo "resolvconf resolvconf/linkify-resolvconf boolean false" | debconf-set-selections && \ + DEBIAN_FRONTEND=noninteractive apt-get install -y \ + ubuntu-minimal ubuntu-standard \ + libnss-myhostname \ + $(cat extra-packages | xargs) && \ + rm -rd /var/lib/apt/lists/* +RUN rm /extra-packages + +# Enable myhostname plugin for clean hostname resolution w/o patching hosts (at least for sudo) +RUN sed -i '/^hosts:/s/$/ myhostname/' /etc/nsswitch.conf + +# Allow authentication with empty password, promptless +RUN sed -i '/^auth.*pam_unix.so/s/nullok_secure/try_first_pass nullok/' /etc/pam.d/common-auth + +# Fix empty bind-mount to clear selinuxfs (see #337) +RUN mkdir /usr/share/empty + +CMD /bin/sh diff --git a/images/ubuntu/16.04/README.md b/images/ubuntu/16.04/README.md new file mode 100644 index 000000000..6f6b6fb23 --- /dev/null +++ b/images/ubuntu/16.04/README.md @@ -0,0 +1,160 @@ +Toolbox logo landscape + +[Toolbox](https://github.com/containers/toolbox) is a tool that offers a +familiar package based environment for developing and debugging software that +runs fully unprivileged using [Podman](https://podman.io/). + +The toolbox container is a fully *mutable* container; when you see +`yum install ansible` for example, that's something you can do inside your +toolbox container, without affecting the base operating system. + +This is particularly useful on +[OSTree](https://ostree.readthedocs.io/en/latest/) based operating systems like +[CoreOS](https://coreos.fedoraproject.org/) and +[Silverblue](https://silverblue.fedoraproject.org/). The intention of these +systems is to discourage installation of software on the host, and instead +install software as (or in) containers. + +However, this tool doesn't *require* using an OSTree based system — it +works equally well if you're running e.g. existing Fedora Workstation or +Server, and that's a useful way to incrementally adopt containerization. + +The toolbox environment is based on an [OCI](https://www.opencontainers.org/) +image. On Fedora this is the `fedora-toolbox` image. This image is used to +create a toolbox container that seamlessly integrates with the rest of the +operating system. + +## Usage + +### Create your toolbox container: +``` +[user@hostname ~]$ toolbox create +Created container: fedora-toolbox-30 +Enter with: toolbox enter +[user@hostname ~]$ +``` +This will create a container called `fedora-toolbox-`. + +### Enter the toolbox: +``` +[user@hostname ~]$ toolbox enter +⬢[user@toolbox ~]$ +``` + +## Goals and Use Cases + +### High Level Goals + +- Provide a CLI convenience interface to run containers (via `podman`) easily +- Support for Developer and Debugging/Management use cases +- Support for multiple distros + - toolbox package in multiple distros + - toolbox containers for multiple distros + +### Non-Goals - Anti Use Cases + +- Supporting multiple container runtimes. `toolbox` will use `podman` exclusively +- Adding significant features on top of `podman` + - Significant feature requests should be driven into `podman` upstream +- To run containers that aren't tightly integrated with the host + - i.e. extremely sandboxed containers become specific to the user quickly + +### Developer Use Cases + +- I’m a developer hacking on source code and building/testing code + - Most cases: user doesn't need root, rootless containers work fine + - Some cases: user needs root for testing +- Desktop Development: + - developers need things like dbus, display, etc, to be forwarded into the toolbox +- Headless Development: + - toolbox works properly in headless environments (no display, etc) +- Need development tools like gdb, strace, etc to work + +### Debugging/System management Use Cases + +- Inspecting Host Processes/Kernel + - Typically need root access + - Need bpftrace, strace on host processes to work + - Ideally even do things like helping get kernel-debuginfo data for the host kernel +- Managing system services + - systemctl restart foo.service + - journalctl +- Managing updates to the host + - rpm-ostree + - dnf/yum (classic systems) + +### Specific environments + +- Fedora Silverblue + - Silverblue comes with a subset of packages and discourages host software changes + - Users need a toolbox container as a working environment + - Future: use toolbox container by default when a user opens a shell +- Fedora CoreOS + - Similar to silverblue, but non-graphical and smaller package set +- RHEL CoreOS + - Similar to Fedora CoreOS. Based on RHEL content and the underlying OS for OpenShift + - Need to [use default authfile on pull](https://github.com/coreos/toolbox/pull/58/commits/413f83f7240d3c31121b557bfd55e489fad24489) + - Need to ensure compatibility with the rhel7/support-tools container + - currently not a toolbox image, opportunity for collaboration + - Alignment with `oc debug node/` (OpenShift) + - `oc debug node` opens a shell on a kubernetes node + - Value in having a consistent environment for both `toolbox` in debugging mode and `oc debug node` + +## Distro support + +By default, Toolbox creates the container using an +[OCI](https://www.opencontainers.org/) image called +`-toolbox:`, where `` and `` are taken from the +host's `/usr/lib/os-release`. For example, the default image on a Fedora 30 +host would be `fedora-toolbox:30`. + +This default can be overridden by the `--image` option in `toolbox create`, +but operating system distributors should provide an adequately configured +default image to ensure a smooth user experience. + +## Image requirements + +Toolbox customizes newly created containers in a certain way. This requires +certain tools and paths to be present and have certain characteristics inside +the OCI image. + +Tools: +* `getent(1)` +* `id(1)` +* `ln(1)` +* `mkdir(1)`: for hosts where `/home` is a symbolic link to `/var/home` +* `passwd(1)` +* `readlink(1)` +* `rm(1)` +* `rmdir(1)`: for hosts where `/home` is a symbolic link to `/var/home` +* `sleep(1)` +* `test(1)` +* `touch(1)` +* `unlink(1)` +* `useradd(8)` + +Paths: +* `/etc/host.conf`: optional, if present not a bind mount +* `/etc/hosts`: optional, if present not a bind mount +* `/etc/krb5.conf.d`: directory, not a bind mount +* `/etc/localtime`: optional, if present not a bind mount +* `/etc/resolv.conf`: optional, if present not a bind mount +* `/etc/timezone`: optional, if present not a bind mount + +The image should have `sudo(8)` enabled for users belonging to either the +`sudo` or `wheel` groups, and the group itself should exist. File an +[issue](https://github.com/containers/toolbox/issues/new) if you really need +support for a different group. However, it's preferable to keep this list as +short as possible. + +Since Toolbox only works with OCI images that fulfill certain requirements, +it will refuse images that aren't tagged with +`com.github.containers.toolbox="true"` and +`com.github.debarshiray.toolbox="true"` labels. These labels are meant to be +used by the maintainer of the image to indicate that they have read this +document and tested that the image works with Toolbox. You can use the +following snippet in a Dockerfile for this: +``` +LABEL com.github.containers.toolbox="true" \ + com.github.debarshiray.toolbox="true" +``` diff --git a/images/ubuntu/16.04/extra-packages b/images/ubuntu/16.04/extra-packages new file mode 100644 index 000000000..4f16fc167 --- /dev/null +++ b/images/ubuntu/16.04/extra-packages @@ -0,0 +1,8 @@ +git +keyutils +gnupg2 +tree +unzip +zip +zsh +curl diff --git a/images/ubuntu/18.04/Dockerfile b/images/ubuntu/18.04/Dockerfile new file mode 100644 index 000000000..73fbd8169 --- /dev/null +++ b/images/ubuntu/18.04/Dockerfile @@ -0,0 +1,40 @@ +FROM docker.io/library/ubuntu:18.04 + +LABEL com.github.containers.toolbox="true" \ + com.github.debarshiray.toolbox="true" \ + name="ubuntu-toolbox" \ + version="18.04" \ + usage="This image is meant to be used with the toolbox command" \ + summary="Base image for creating Ubuntu toolbox containers" \ + maintainer="Ievgen Popovych " + +COPY README.md / + +# remove some container-optimized apt configuration; +# removing docker-gzip-indexes specifically helps with command-not-found +RUN rm /etc/apt/apt.conf.d/docker-gzip-indexes /etc/apt/apt.conf.d/docker-no-languages + +# Restore documentation but do not upgrade all packages, that's not appropriate; +# unminimize will install ubuntu-minimal & ubuntu-standard, but leave it for clarity +# Install extra packages as well as libnss-myhostname +COPY extra-packages / +RUN sed -Ei '/apt-get (update|upgrade)/s/^/#/' /usr/local/sbin/unminimize && \ + apt-get update && \ + yes | /usr/local/sbin/unminimize && \ + DEBIAN_FRONTEND=noninteractive apt-get -y install \ + ubuntu-minimal ubuntu-standard \ + libnss-myhostname \ + $(cat extra-packages | xargs) && \ + rm -rd /var/lib/apt/lists/* +RUN rm /extra-packages + +# Enable myhostname plugin for clean hostname resolution w/o patching hosts (at least for sudo) +RUN sed -i '/^hosts:/s/$/ myhostname/' /etc/nsswitch.conf + +# Allow authentication with empty password, promptless +RUN sed -i '/^auth.*pam_unix.so/s/nullok_secure/try_first_pass nullok/' /etc/pam.d/common-auth + +# Fix empty bind-mount to clear selinuxfs (see #337) +RUN mkdir /usr/share/empty + +CMD /bin/sh diff --git a/images/ubuntu/18.04/README.md b/images/ubuntu/18.04/README.md new file mode 100644 index 000000000..6f6b6fb23 --- /dev/null +++ b/images/ubuntu/18.04/README.md @@ -0,0 +1,160 @@ +Toolbox logo landscape + +[Toolbox](https://github.com/containers/toolbox) is a tool that offers a +familiar package based environment for developing and debugging software that +runs fully unprivileged using [Podman](https://podman.io/). + +The toolbox container is a fully *mutable* container; when you see +`yum install ansible` for example, that's something you can do inside your +toolbox container, without affecting the base operating system. + +This is particularly useful on +[OSTree](https://ostree.readthedocs.io/en/latest/) based operating systems like +[CoreOS](https://coreos.fedoraproject.org/) and +[Silverblue](https://silverblue.fedoraproject.org/). The intention of these +systems is to discourage installation of software on the host, and instead +install software as (or in) containers. + +However, this tool doesn't *require* using an OSTree based system — it +works equally well if you're running e.g. existing Fedora Workstation or +Server, and that's a useful way to incrementally adopt containerization. + +The toolbox environment is based on an [OCI](https://www.opencontainers.org/) +image. On Fedora this is the `fedora-toolbox` image. This image is used to +create a toolbox container that seamlessly integrates with the rest of the +operating system. + +## Usage + +### Create your toolbox container: +``` +[user@hostname ~]$ toolbox create +Created container: fedora-toolbox-30 +Enter with: toolbox enter +[user@hostname ~]$ +``` +This will create a container called `fedora-toolbox-`. + +### Enter the toolbox: +``` +[user@hostname ~]$ toolbox enter +⬢[user@toolbox ~]$ +``` + +## Goals and Use Cases + +### High Level Goals + +- Provide a CLI convenience interface to run containers (via `podman`) easily +- Support for Developer and Debugging/Management use cases +- Support for multiple distros + - toolbox package in multiple distros + - toolbox containers for multiple distros + +### Non-Goals - Anti Use Cases + +- Supporting multiple container runtimes. `toolbox` will use `podman` exclusively +- Adding significant features on top of `podman` + - Significant feature requests should be driven into `podman` upstream +- To run containers that aren't tightly integrated with the host + - i.e. extremely sandboxed containers become specific to the user quickly + +### Developer Use Cases + +- I’m a developer hacking on source code and building/testing code + - Most cases: user doesn't need root, rootless containers work fine + - Some cases: user needs root for testing +- Desktop Development: + - developers need things like dbus, display, etc, to be forwarded into the toolbox +- Headless Development: + - toolbox works properly in headless environments (no display, etc) +- Need development tools like gdb, strace, etc to work + +### Debugging/System management Use Cases + +- Inspecting Host Processes/Kernel + - Typically need root access + - Need bpftrace, strace on host processes to work + - Ideally even do things like helping get kernel-debuginfo data for the host kernel +- Managing system services + - systemctl restart foo.service + - journalctl +- Managing updates to the host + - rpm-ostree + - dnf/yum (classic systems) + +### Specific environments + +- Fedora Silverblue + - Silverblue comes with a subset of packages and discourages host software changes + - Users need a toolbox container as a working environment + - Future: use toolbox container by default when a user opens a shell +- Fedora CoreOS + - Similar to silverblue, but non-graphical and smaller package set +- RHEL CoreOS + - Similar to Fedora CoreOS. Based on RHEL content and the underlying OS for OpenShift + - Need to [use default authfile on pull](https://github.com/coreos/toolbox/pull/58/commits/413f83f7240d3c31121b557bfd55e489fad24489) + - Need to ensure compatibility with the rhel7/support-tools container + - currently not a toolbox image, opportunity for collaboration + - Alignment with `oc debug node/` (OpenShift) + - `oc debug node` opens a shell on a kubernetes node + - Value in having a consistent environment for both `toolbox` in debugging mode and `oc debug node` + +## Distro support + +By default, Toolbox creates the container using an +[OCI](https://www.opencontainers.org/) image called +`-toolbox:`, where `` and `` are taken from the +host's `/usr/lib/os-release`. For example, the default image on a Fedora 30 +host would be `fedora-toolbox:30`. + +This default can be overridden by the `--image` option in `toolbox create`, +but operating system distributors should provide an adequately configured +default image to ensure a smooth user experience. + +## Image requirements + +Toolbox customizes newly created containers in a certain way. This requires +certain tools and paths to be present and have certain characteristics inside +the OCI image. + +Tools: +* `getent(1)` +* `id(1)` +* `ln(1)` +* `mkdir(1)`: for hosts where `/home` is a symbolic link to `/var/home` +* `passwd(1)` +* `readlink(1)` +* `rm(1)` +* `rmdir(1)`: for hosts where `/home` is a symbolic link to `/var/home` +* `sleep(1)` +* `test(1)` +* `touch(1)` +* `unlink(1)` +* `useradd(8)` + +Paths: +* `/etc/host.conf`: optional, if present not a bind mount +* `/etc/hosts`: optional, if present not a bind mount +* `/etc/krb5.conf.d`: directory, not a bind mount +* `/etc/localtime`: optional, if present not a bind mount +* `/etc/resolv.conf`: optional, if present not a bind mount +* `/etc/timezone`: optional, if present not a bind mount + +The image should have `sudo(8)` enabled for users belonging to either the +`sudo` or `wheel` groups, and the group itself should exist. File an +[issue](https://github.com/containers/toolbox/issues/new) if you really need +support for a different group. However, it's preferable to keep this list as +short as possible. + +Since Toolbox only works with OCI images that fulfill certain requirements, +it will refuse images that aren't tagged with +`com.github.containers.toolbox="true"` and +`com.github.debarshiray.toolbox="true"` labels. These labels are meant to be +used by the maintainer of the image to indicate that they have read this +document and tested that the image works with Toolbox. You can use the +following snippet in a Dockerfile for this: +``` +LABEL com.github.containers.toolbox="true" \ + com.github.debarshiray.toolbox="true" +``` diff --git a/images/ubuntu/18.04/extra-packages b/images/ubuntu/18.04/extra-packages new file mode 100644 index 000000000..4f16fc167 --- /dev/null +++ b/images/ubuntu/18.04/extra-packages @@ -0,0 +1,8 @@ +git +keyutils +gnupg2 +tree +unzip +zip +zsh +curl diff --git a/images/ubuntu/20.04/Dockerfile b/images/ubuntu/20.04/Dockerfile new file mode 100644 index 000000000..29af97e0c --- /dev/null +++ b/images/ubuntu/20.04/Dockerfile @@ -0,0 +1,37 @@ +FROM docker.io/library/ubuntu:20.04 + +LABEL com.github.containers.toolbox="true" \ + com.github.debarshiray.toolbox="true" \ + name="ubuntu-toolbox" \ + version="20.04" \ + usage="This image is meant to be used with the toolbox command" \ + summary="Base image for creating Ubuntu toolbox containers" \ + maintainer="Ievgen Popovych " + +COPY README.md / + +# remove some container-optimized apt configuration; +# removing docker-gzip-indexes specifically helps with command-not-found +RUN rm /etc/apt/apt.conf.d/docker-gzip-indexes /etc/apt/apt.conf.d/docker-no-languages + +# Restore documentation but do not upgrade all packages, that's not appropriate; +# Install ubuntu-minimal & ubuntu-standard +# Install extra packages as well as libnss-myhostname +COPY extra-packages / +RUN sed -Ei '/apt-get (update|upgrade)/s/^/#/' /usr/local/sbin/unminimize && \ + apt-get update && \ + yes | /usr/local/sbin/unminimize && \ + DEBIAN_FRONTEND=noninteractive apt-get -y install \ + ubuntu-minimal ubuntu-standard \ + libnss-myhostname \ + $(cat extra-packages | xargs) && \ + rm -rd /var/lib/apt/lists/* +RUN rm /extra-packages + +# Allow authentication with empty password, promptless +RUN sed -i '/^auth.*pam_unix.so/s/nullok_secure/try_first_pass nullok/' /etc/pam.d/common-auth + +# Fix empty bind-mount to clear selinuxfs (see #337) +RUN mkdir /usr/share/empty + +CMD /bin/sh diff --git a/images/ubuntu/20.04/README.md b/images/ubuntu/20.04/README.md new file mode 100644 index 000000000..6f6b6fb23 --- /dev/null +++ b/images/ubuntu/20.04/README.md @@ -0,0 +1,160 @@ +Toolbox logo landscape + +[Toolbox](https://github.com/containers/toolbox) is a tool that offers a +familiar package based environment for developing and debugging software that +runs fully unprivileged using [Podman](https://podman.io/). + +The toolbox container is a fully *mutable* container; when you see +`yum install ansible` for example, that's something you can do inside your +toolbox container, without affecting the base operating system. + +This is particularly useful on +[OSTree](https://ostree.readthedocs.io/en/latest/) based operating systems like +[CoreOS](https://coreos.fedoraproject.org/) and +[Silverblue](https://silverblue.fedoraproject.org/). The intention of these +systems is to discourage installation of software on the host, and instead +install software as (or in) containers. + +However, this tool doesn't *require* using an OSTree based system — it +works equally well if you're running e.g. existing Fedora Workstation or +Server, and that's a useful way to incrementally adopt containerization. + +The toolbox environment is based on an [OCI](https://www.opencontainers.org/) +image. On Fedora this is the `fedora-toolbox` image. This image is used to +create a toolbox container that seamlessly integrates with the rest of the +operating system. + +## Usage + +### Create your toolbox container: +``` +[user@hostname ~]$ toolbox create +Created container: fedora-toolbox-30 +Enter with: toolbox enter +[user@hostname ~]$ +``` +This will create a container called `fedora-toolbox-`. + +### Enter the toolbox: +``` +[user@hostname ~]$ toolbox enter +⬢[user@toolbox ~]$ +``` + +## Goals and Use Cases + +### High Level Goals + +- Provide a CLI convenience interface to run containers (via `podman`) easily +- Support for Developer and Debugging/Management use cases +- Support for multiple distros + - toolbox package in multiple distros + - toolbox containers for multiple distros + +### Non-Goals - Anti Use Cases + +- Supporting multiple container runtimes. `toolbox` will use `podman` exclusively +- Adding significant features on top of `podman` + - Significant feature requests should be driven into `podman` upstream +- To run containers that aren't tightly integrated with the host + - i.e. extremely sandboxed containers become specific to the user quickly + +### Developer Use Cases + +- I’m a developer hacking on source code and building/testing code + - Most cases: user doesn't need root, rootless containers work fine + - Some cases: user needs root for testing +- Desktop Development: + - developers need things like dbus, display, etc, to be forwarded into the toolbox +- Headless Development: + - toolbox works properly in headless environments (no display, etc) +- Need development tools like gdb, strace, etc to work + +### Debugging/System management Use Cases + +- Inspecting Host Processes/Kernel + - Typically need root access + - Need bpftrace, strace on host processes to work + - Ideally even do things like helping get kernel-debuginfo data for the host kernel +- Managing system services + - systemctl restart foo.service + - journalctl +- Managing updates to the host + - rpm-ostree + - dnf/yum (classic systems) + +### Specific environments + +- Fedora Silverblue + - Silverblue comes with a subset of packages and discourages host software changes + - Users need a toolbox container as a working environment + - Future: use toolbox container by default when a user opens a shell +- Fedora CoreOS + - Similar to silverblue, but non-graphical and smaller package set +- RHEL CoreOS + - Similar to Fedora CoreOS. Based on RHEL content and the underlying OS for OpenShift + - Need to [use default authfile on pull](https://github.com/coreos/toolbox/pull/58/commits/413f83f7240d3c31121b557bfd55e489fad24489) + - Need to ensure compatibility with the rhel7/support-tools container + - currently not a toolbox image, opportunity for collaboration + - Alignment with `oc debug node/` (OpenShift) + - `oc debug node` opens a shell on a kubernetes node + - Value in having a consistent environment for both `toolbox` in debugging mode and `oc debug node` + +## Distro support + +By default, Toolbox creates the container using an +[OCI](https://www.opencontainers.org/) image called +`-toolbox:`, where `` and `` are taken from the +host's `/usr/lib/os-release`. For example, the default image on a Fedora 30 +host would be `fedora-toolbox:30`. + +This default can be overridden by the `--image` option in `toolbox create`, +but operating system distributors should provide an adequately configured +default image to ensure a smooth user experience. + +## Image requirements + +Toolbox customizes newly created containers in a certain way. This requires +certain tools and paths to be present and have certain characteristics inside +the OCI image. + +Tools: +* `getent(1)` +* `id(1)` +* `ln(1)` +* `mkdir(1)`: for hosts where `/home` is a symbolic link to `/var/home` +* `passwd(1)` +* `readlink(1)` +* `rm(1)` +* `rmdir(1)`: for hosts where `/home` is a symbolic link to `/var/home` +* `sleep(1)` +* `test(1)` +* `touch(1)` +* `unlink(1)` +* `useradd(8)` + +Paths: +* `/etc/host.conf`: optional, if present not a bind mount +* `/etc/hosts`: optional, if present not a bind mount +* `/etc/krb5.conf.d`: directory, not a bind mount +* `/etc/localtime`: optional, if present not a bind mount +* `/etc/resolv.conf`: optional, if present not a bind mount +* `/etc/timezone`: optional, if present not a bind mount + +The image should have `sudo(8)` enabled for users belonging to either the +`sudo` or `wheel` groups, and the group itself should exist. File an +[issue](https://github.com/containers/toolbox/issues/new) if you really need +support for a different group. However, it's preferable to keep this list as +short as possible. + +Since Toolbox only works with OCI images that fulfill certain requirements, +it will refuse images that aren't tagged with +`com.github.containers.toolbox="true"` and +`com.github.debarshiray.toolbox="true"` labels. These labels are meant to be +used by the maintainer of the image to indicate that they have read this +document and tested that the image works with Toolbox. You can use the +following snippet in a Dockerfile for this: +``` +LABEL com.github.containers.toolbox="true" \ + com.github.debarshiray.toolbox="true" +``` diff --git a/images/ubuntu/20.04/extra-packages b/images/ubuntu/20.04/extra-packages new file mode 100644 index 000000000..4f16fc167 --- /dev/null +++ b/images/ubuntu/20.04/extra-packages @@ -0,0 +1,8 @@ +git +keyutils +gnupg2 +tree +unzip +zip +zsh +curl