https://github.com/ublue-os/boxkit
Build your own custom OCI distrobox container
https://github.com/ublue-os/boxkit
alpine bash boxkit dotfiles linux oci shell
Last synced: 30 days ago
JSON representation
Build your own custom OCI distrobox container
- Host: GitHub
- URL: https://github.com/ublue-os/boxkit
- Owner: ublue-os
- License: apache-2.0
- Created: 2023-01-12T06:10:22.000Z (over 2 years ago)
- Default Branch: main
- Last Pushed: 2025-02-23T17:21:48.000Z (2 months ago)
- Last Synced: 2025-02-23T18:29:39.489Z (2 months ago)
- Topics: alpine, bash, boxkit, dotfiles, linux, oci, shell
- Language: Shell
- Homepage: https://universal-blue.org
- Size: 105 KB
- Stars: 189
- Watchers: 5
- Forks: 92
- Open Issues: 3
-
Metadata Files:
- Readme: README.md
- Changelog: CHANGELOG.md
- License: LICENSE
- Code of conduct: CODE_OF_CONDUCT.md
Awesome Lists containing this project
- awesome-starred - ublue-os/boxkit - Build your own custom OCI distrobox container (shell)
README
# boxkit
## What is boxkit ?
boxkit is a set of GitHub actions and skeleton files to build custom toolbox and distrobox images. Basically, clone this repo, make any changes you need, and then generate your custom images.
Note that boxkit can be used independently of Fedora or uBlue OS.
boxkit requires you atleast understand the basics of [ContainerFiles](https://www.mankier.com/5/Containerfile) and [shell scripting.](https://www.shellscript.sh/)## Base images
You can use the Docker/OCI container image of practically any distribution as your base image to build your custom image off of. Note that the base images can also be used directly with distrobox/toolbox without any modifications.
Here is a list of some base images you can use:
- [toolbx Community images](https://github.com/toolbx-images/images)
- [uBlue toolboxes](https://github.com/ublue-os/toolboxes)Try to derive your custom images from these base images so we can all help maintain them over time, you can't have bling without good stock!
Tag your image with `boxkit` to share with others!
## How to use boxkit
### How everything is organized
- The ContainerFiles for the custom images are stored in the `ContainerFiles/` folder.
- The setup scripts for the custom images (if needed) are stored in the `scripts/` folder.
- The package lists for the setup scripts (if needed) are stored in the `packages/` folder.
- The Github workflow that generates the images is `.github/workflows/build-boxkit.yml`### How to make your own images
1. Fork this repo.
2. Add the ContainerFiles for your custom images to the `ContainerFiles/` folder.
3. Add the setup scripts you want to use for your custom images (if needed) to the `scripts/` folder.
4. Add the package list you want to use for your custom images (if needed) to the `packages/` folder.
5. Add the name of the ContainerFiles of your custom images to the following section in `build-boxkit.yml`:```yaml
jobs:
strategy:
matrix:
containerfile:
- [your_custom_image_1]
- [your_custom_image_2]
```**Note:**
- You can choose to only generate a single custom image if you want.
- You can remove the boxkit and fedora-example images provided in the boxkit repo and only generate your own custom images.
- The `scripts/` and `packages/` folders are optional, you can generate your custom images without them, but they are highly recommended to use.
- The name of your custom image and ContainerFile **MUST** be the same.e.g. If you want to create a custom image named *appbox-debian*, the corresponding ContainerFile must be named `appbox-debian` and must be stored inside the `ContainerFiles/` folder.
- The URL for the generated images will be `ghcr.io//` by default.### Signing your images
Although optional, it is **Highly recommended** you use container signing for your images.
To sign your images, follow the steps below:1. [Install `cosign`.](https://docs.sigstore.dev/cosign/system_config/installation/)
2. Generate cosign keypairs.
When it asks you to enter a password, **DONOT ENTER A PASSWORD,** Just press enter.```bash
cosign generate-key-pair
```This will create two files named `cosign.pub` and `cosign.key`, which are your public and private keys, respectively.
3. Go to the repository settings of your forked boxkit github repo. (**NOT your GitHub/Account settings**)
- Go to *Security* > *Secrets and variables* > *Actions*
- Click on *New repository secret*
- Create a new secret named `SIGNING_SECRET`
- Copy the content inside your `cosign.key` file to the textbox that appears when you create the `SIGNING_SECRET` repository secret.
- Alternatively, you can use GitHub's CLI client.
```bash
gh secret set SIGNING_SECRET < cosign.key
```**DONOT SHARE YOUR `cosign.key` FILE OR `SIGNING_SECRET` PUBLICLY, STORE THE `cosign.key` FILE SOMEWHERE SECURE AND DONOT INCLUDE IT IN YOUR GIT REPOSITORY.**
4. Delete the `cosign.pub` key that exists on the repository's root folder and copy the `cosign.pub` file you created to the repository's root folder.
Congratulations, you have successfully enabled container signing for all your custom images.
## Using the custom images
We use the default boxkit image as an example to show you how to create a distrobox/toolbox container using a custom image.
If you use distrobox:
distrobox create -i ghcr.io/ublue-os/boxkit -n boxkit
distrobox enter boxkit
If you use toolbox:toolbox create -i ghcr.io/ublue-os/boxkit -c boxkit
toolbox enter boxkit**NOTE:**
- You can use `chezmoi` to pull down your dotfiles and set up git sync.
- It is recommended to use the [Ptyxis](https://flathub.org/apps/app.devsuite.Ptyxis) terminal, which provides seamless integration with various podman/distrobox/toolbx containers.## Custom images built with boxkit
Here is a list of some awesome custom images built using boxkit.
- [DaVinci Box](https://github.com/zelikos/davincibox) - Container for DaVinci Resolve installation and runtime dependencies on Linux.
- [obs-studio-portable](https://github.com/ublue-os/obs-studio-portable) - OCI container image of OBS Studio that bundles a curated collection of 3rd party plugins.
- [bazzite-arch](https://github.com/ublue-os/bazzite-arch) - A ready-to-game Arch Linux based OCI designed for use exclusively in distrobox.## Verification
These images are signed with sisgstore's [cosign](https://docs.sigstore.dev/quickstart/quickstart-cosign/). You can verify the signature by downloading the `cosign.pub` key from this repo and running the following command:
cosign verify --key cosign.pub ghcr.io/ublue-os/boxkit
If you're forking this repo you should [read the docs](https://docs.github.com/en/actions/security-guides/encrypted-secrets) on keeping secrets in github. You need to [generate a new keypair](https://docs.sigstore.dev/cosign/key_management/signing_with_self-managed_keys/) with cosign. The public key can be in your public repo (your users need it to check the signatures), and you can paste the private key in Settings -> Secrets -> Actions.