2019-04-04 13:40:27 +00:00
|
|
|
|
<img src="data/logo/toolbox-logo-landscape.svg" alt="Toolbox logo landscape" width="800"/>
|
2018-09-13 12:17:34 +00:00
|
|
|
|
|
2020-10-22 15:27:04 +00:00
|
|
|
|
[![Zuul](https://zuul-ci.org/gated.svg)](https://softwarefactory-project.io/zuul/t/local/builds?project=containers/toolbox)
|
|
|
|
|
[![Daily Pipeline](https://img.shields.io/badge/zuul-periodic-informational)](https://softwarefactory-project.io/zuul/t/local/builds?project=containers%2Ftoolbox&pipeline=periodic)
|
|
|
|
|
|
|
|
|
|
[![Arch Linux package](https://img.shields.io/archlinux/v/community/x86_64/toolbox)](https://www.archlinux.org/packages/community/x86_64/toolbox/)
|
|
|
|
|
[![Fedora package](https://img.shields.io/fedora/v/toolbox/rawhide)](https://src.fedoraproject.org/rpms/toolbox/)
|
|
|
|
|
|
2019-10-10 13:40:34 +00:00
|
|
|
|
[Toolbox](https://github.com/containers/toolbox) is a tool that offers a
|
2019-10-14 10:49:29 +00:00
|
|
|
|
familiar package based environment for developing and debugging software that
|
|
|
|
|
runs fully unprivileged using [Podman](https://podman.io/).
|
2019-01-26 09:57:26 +00:00
|
|
|
|
|
|
|
|
|
The toolbox container is a fully *mutable* container; when you see
|
|
|
|
|
`yum install ansible` for example, that's something you can do inside your
|
|
|
|
|
toolbox container, without affecting the base operating system.
|
|
|
|
|
|
|
|
|
|
This is particularly useful on
|
2019-10-14 10:49:29 +00:00
|
|
|
|
[OSTree](https://ostree.readthedocs.io/en/latest/) based operating systems like
|
2020-10-15 14:48:41 +00:00
|
|
|
|
[Fedora CoreOS](https://coreos.fedoraproject.org/) and
|
2019-01-26 09:57:26 +00:00
|
|
|
|
[Silverblue](https://silverblue.fedoraproject.org/). The intention of these
|
|
|
|
|
systems is to discourage installation of software on the host, and instead
|
|
|
|
|
install software as (or in) containers.
|
|
|
|
|
|
2019-02-28 19:34:11 +00:00
|
|
|
|
However, this tool doesn't *require* using an OSTree based system — it
|
2019-01-26 09:57:26 +00:00
|
|
|
|
works equally well if you're running e.g. existing Fedora Workstation or
|
|
|
|
|
Server, and that's a useful way to incrementally adopt containerization.
|
2018-09-13 12:17:34 +00:00
|
|
|
|
|
2019-02-19 14:16:28 +00:00
|
|
|
|
The toolbox environment is based on an [OCI](https://www.opencontainers.org/)
|
2019-05-10 18:38:46 +00:00
|
|
|
|
image. On Fedora this is the `fedora-toolbox` image. This image is used to
|
|
|
|
|
create a toolbox container that seamlessly integrates with the rest of the
|
|
|
|
|
operating system.
|
2018-08-31 16:02:49 +00:00
|
|
|
|
|
|
|
|
|
## Usage
|
|
|
|
|
|
2019-02-15 15:36:30 +00:00
|
|
|
|
### Create your toolbox container:
|
2020-10-27 15:45:27 +00:00
|
|
|
|
```console
|
2019-02-15 15:36:30 +00:00
|
|
|
|
[user@hostname ~]$ toolbox create
|
2020-10-22 16:12:25 +00:00
|
|
|
|
Created container: fedora-toolbox-33
|
2019-05-10 18:38:46 +00:00
|
|
|
|
Enter with: toolbox enter
|
2019-01-21 16:07:02 +00:00
|
|
|
|
[user@hostname ~]$
|
2018-08-31 16:02:49 +00:00
|
|
|
|
```
|
2019-05-10 18:38:46 +00:00
|
|
|
|
This will create a container called `fedora-toolbox-<version-id>`.
|
2018-08-31 16:02:49 +00:00
|
|
|
|
|
2019-02-15 15:36:30 +00:00
|
|
|
|
### Enter the toolbox:
|
2020-10-27 15:45:27 +00:00
|
|
|
|
```console
|
2019-02-15 15:36:30 +00:00
|
|
|
|
[user@hostname ~]$ toolbox enter
|
2019-05-16 12:46:21 +00:00
|
|
|
|
⬢[user@toolbox ~]$
|
2018-08-31 16:02:49 +00:00
|
|
|
|
```
|
2019-10-14 11:51:19 +00:00
|
|
|
|
|
2020-10-22 16:07:32 +00:00
|
|
|
|
### Remove a toolbox container:
|
2020-10-27 15:45:27 +00:00
|
|
|
|
```console
|
2020-10-22 16:12:25 +00:00
|
|
|
|
[user@hostname ~]$ toolbox rm fedora-toolbox-33
|
2020-10-22 16:07:32 +00:00
|
|
|
|
[user@hostname ~]$
|
|
|
|
|
```
|
|
|
|
|
|
2020-07-07 17:18:54 +00:00
|
|
|
|
## Dependencies and Installation
|
|
|
|
|
|
|
|
|
|
Toolbox requires at least Podman 1.4.0 to work, and uses the Meson build
|
|
|
|
|
system.
|
|
|
|
|
|
|
|
|
|
The following dependencies are required to build it:
|
|
|
|
|
- meson
|
|
|
|
|
- go-md2man
|
|
|
|
|
- systemd
|
|
|
|
|
|
|
|
|
|
The following dependencies enable various optional features:
|
|
|
|
|
- bash-completion
|
|
|
|
|
|
|
|
|
|
It can be built and installed as any other typical Meson-based project:
|
2020-10-27 15:45:27 +00:00
|
|
|
|
```console
|
2020-07-07 17:18:54 +00:00
|
|
|
|
[user@hostname toolbox]$ meson -Dprofile_dir=/etc/profile.d builddir
|
|
|
|
|
[user@hostname toolbox]$ ninja -C builddir
|
2020-07-27 13:38:21 +00:00
|
|
|
|
[user@hostname toolbox]$ sudo ninja -C builddir install
|
2020-07-07 17:18:54 +00:00
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
Toolbox is written in Go. Consult the
|
|
|
|
|
[src/go.mod](https://github.com/containers/toolbox/blob/master/src/go.mod) file
|
|
|
|
|
for a full list of all the Go dependencies.
|
|
|
|
|
|
|
|
|
|
By default, Toolbox uses Go modules and all the required Go packages are
|
|
|
|
|
automatically downloaded as part of the build. There's no need to worry about
|
|
|
|
|
the Go dependencies, unless the build environment doesn't have network access
|
|
|
|
|
or any such peculiarities.
|
|
|
|
|
|
2019-10-23 20:42:11 +00:00
|
|
|
|
## Goals and Use Cases
|
|
|
|
|
|
|
|
|
|
### High Level Goals
|
|
|
|
|
|
|
|
|
|
- Provide a CLI convenience interface to run containers (via `podman`) easily
|
|
|
|
|
- Support for Developer and Debugging/Management use cases
|
|
|
|
|
- Support for multiple distros
|
|
|
|
|
- toolbox package in multiple distros
|
|
|
|
|
- toolbox containers for multiple distros
|
|
|
|
|
|
|
|
|
|
### Non-Goals - Anti Use Cases
|
|
|
|
|
|
|
|
|
|
- Supporting multiple container runtimes. `toolbox` will use `podman` exclusively
|
|
|
|
|
- Adding significant features on top of `podman`
|
|
|
|
|
- Significant feature requests should be driven into `podman` upstream
|
|
|
|
|
- To run containers that aren't tightly integrated with the host
|
|
|
|
|
- i.e. extremely sandboxed containers become specific to the user quickly
|
|
|
|
|
|
|
|
|
|
### Developer Use Cases
|
|
|
|
|
|
|
|
|
|
- I’m a developer hacking on source code and building/testing code
|
|
|
|
|
- Most cases: user doesn't need root, rootless containers work fine
|
|
|
|
|
- Some cases: user needs root for testing
|
|
|
|
|
- Desktop Development:
|
|
|
|
|
- developers need things like dbus, display, etc, to be forwarded into the toolbox
|
|
|
|
|
- Headless Development:
|
|
|
|
|
- toolbox works properly in headless environments (no display, etc)
|
|
|
|
|
- Need development tools like gdb, strace, etc to work
|
|
|
|
|
|
|
|
|
|
### Debugging/System management Use Cases
|
|
|
|
|
|
|
|
|
|
- Inspecting Host Processes/Kernel
|
|
|
|
|
- Typically need root access
|
|
|
|
|
- Need bpftrace, strace on host processes to work
|
|
|
|
|
- Ideally even do things like helping get kernel-debuginfo data for the host kernel
|
|
|
|
|
- Managing system services
|
|
|
|
|
- systemctl restart foo.service
|
|
|
|
|
- journalctl
|
|
|
|
|
- Managing updates to the host
|
|
|
|
|
- rpm-ostree
|
|
|
|
|
- dnf/yum (classic systems)
|
|
|
|
|
|
|
|
|
|
### Specific environments
|
|
|
|
|
|
|
|
|
|
- Fedora Silverblue
|
|
|
|
|
- Silverblue comes with a subset of packages and discourages host software changes
|
|
|
|
|
- Users need a toolbox container as a working environment
|
|
|
|
|
- Future: use toolbox container by default when a user opens a shell
|
|
|
|
|
- Fedora CoreOS
|
|
|
|
|
- Similar to silverblue, but non-graphical and smaller package set
|
|
|
|
|
- RHEL CoreOS
|
|
|
|
|
- Similar to Fedora CoreOS. Based on RHEL content and the underlying OS for OpenShift
|
|
|
|
|
- Need to [use default authfile on pull](https://github.com/coreos/toolbox/pull/58/commits/413f83f7240d3c31121b557bfd55e489fad24489)
|
|
|
|
|
- Need to ensure compatibility with the rhel7/support-tools container
|
|
|
|
|
- currently not a toolbox image, opportunity for collaboration
|
|
|
|
|
- Alignment with `oc debug node/` (OpenShift)
|
|
|
|
|
- `oc debug node` opens a shell on a kubernetes node
|
|
|
|
|
- Value in having a consistent environment for both `toolbox` in debugging mode and `oc debug node`
|
|
|
|
|
|
2019-10-14 11:51:19 +00:00
|
|
|
|
## Distro support
|
|
|
|
|
|
|
|
|
|
By default, Toolbox creates the container using an
|
|
|
|
|
[OCI](https://www.opencontainers.org/) image called
|
|
|
|
|
`<ID>-toolbox:<VERSION-ID>`, where `<ID>` and `<VERSION-ID>` are taken from the
|
2020-10-22 16:12:25 +00:00
|
|
|
|
host's `/usr/lib/os-release`. For example, the default image on a Fedora 33
|
|
|
|
|
host would be `fedora-toolbox:33`.
|
2019-10-14 11:51:19 +00:00
|
|
|
|
|
|
|
|
|
This default can be overridden by the `--image` option in `toolbox create`,
|
|
|
|
|
but operating system distributors should provide an adequately configured
|
|
|
|
|
default image to ensure a smooth user experience.
|
|
|
|
|
|
|
|
|
|
## Image requirements
|
|
|
|
|
|
|
|
|
|
Toolbox customizes newly created containers in a certain way. This requires
|
|
|
|
|
certain tools and paths to be present and have certain characteristics inside
|
|
|
|
|
the OCI image.
|
|
|
|
|
|
|
|
|
|
Tools:
|
|
|
|
|
* `getent(1)`
|
|
|
|
|
* `id(1)`
|
|
|
|
|
* `ln(1)`
|
|
|
|
|
* `mkdir(1)`: for hosts where `/home` is a symbolic link to `/var/home`
|
|
|
|
|
* `passwd(1)`
|
|
|
|
|
* `readlink(1)`
|
|
|
|
|
* `rm(1)`
|
|
|
|
|
* `rmdir(1)`: for hosts where `/home` is a symbolic link to `/var/home`
|
|
|
|
|
* `sleep(1)`
|
|
|
|
|
* `test(1)`
|
|
|
|
|
* `touch(1)`
|
|
|
|
|
* `unlink(1)`
|
|
|
|
|
* `useradd(8)`
|
2020-08-30 14:26:07 +00:00
|
|
|
|
* `usermod(8)`
|
2019-10-14 11:51:19 +00:00
|
|
|
|
|
|
|
|
|
Paths:
|
|
|
|
|
* `/etc/host.conf`: optional, if present not a bind mount
|
|
|
|
|
* `/etc/hosts`: optional, if present not a bind mount
|
|
|
|
|
* `/etc/krb5.conf.d`: directory, not a bind mount
|
|
|
|
|
* `/etc/localtime`: optional, if present not a bind mount
|
|
|
|
|
* `/etc/resolv.conf`: optional, if present not a bind mount
|
|
|
|
|
* `/etc/timezone`: optional, if present not a bind mount
|
|
|
|
|
|
2020-08-21 15:41:28 +00:00
|
|
|
|
Toolbox enables `sudo(8)` access inside containers. The following is necessary
|
|
|
|
|
for that to work:
|
|
|
|
|
|
|
|
|
|
* The image should have `sudo(8)` enabled for users belonging to either the
|
|
|
|
|
`sudo` or `wheel` groups, and the group itself should exist. File an
|
|
|
|
|
[issue](https://github.com/containers/toolbox/issues/new) if you really need
|
|
|
|
|
support for a different group. However, it's preferable to keep this list as
|
|
|
|
|
short as possible.
|
|
|
|
|
|
|
|
|
|
* The image should allow empty passwords for `sudo(8)`. This can be achieved
|
|
|
|
|
by either adding the `nullok` option to the `PAM(8)` configuration, or by
|
|
|
|
|
add the `NOPASSWD` tag to the `sudoers(5)` configuration.
|
2019-10-14 11:51:19 +00:00
|
|
|
|
|
|
|
|
|
Since Toolbox only works with OCI images that fulfill certain requirements,
|
|
|
|
|
it will refuse images that aren't tagged with
|
|
|
|
|
`com.github.containers.toolbox="true"` and
|
|
|
|
|
`com.github.debarshiray.toolbox="true"` labels. These labels are meant to be
|
|
|
|
|
used by the maintainer of the image to indicate that they have read this
|
|
|
|
|
document and tested that the image works with Toolbox. You can use the
|
|
|
|
|
following snippet in a Dockerfile for this:
|
2020-10-27 15:45:27 +00:00
|
|
|
|
```Dockerfile
|
2019-10-14 11:51:19 +00:00
|
|
|
|
LABEL com.github.containers.toolbox="true" \
|
|
|
|
|
com.github.debarshiray.toolbox="true"
|
|
|
|
|
```
|