5eb93c9127
If /tmp is mounted with noexec, use ~/.local/share/Conty as a working directory. And if HOME is also mounted with noexec, then show an error and exit. |
||
---|---|---|
.gitattributes | ||
conty-start.sh | ||
create-arch-bootstrap.sh | ||
create-conty.sh | ||
create-utils.sh | ||
LICENSE | ||
README.md | ||
utils.tar |
Conty
This is an easy to use unprivileged Linux container compressed into squashfs and packed into a single executable that runs (or at least should run) on most Linux distros. It's designed to be as simple and user-friendly as possible.
You can use it to run any applications, including games (Vulkan and OpenGL).
Besides, due to bubblewrap, Conty also supports true filesystem sandboxing, so you can even use it to isolate applications.
It uses two technologies:
- SquashFS (using squashfuse)
- Linux namespaces (using bubblewrap)
Features
- Single executable - download (or create) and run, nothing else is required.
- Root rights are not required.
- Compressed into squashfs, so it takes much less disk space than uncompressed containers.
- Contains many libraries and packages so it can run almost everything. And you don't need to install anything on your main (host) system. You can even run 32-bit applications on pure 64-bit systems.
- Based on Arch Linux, so it contains latest software, including latest videodrivers.
- Almost completely seamless experience. All applications that you run with Conty read and store their configs in your HOME directory as if you weren't using the container at all.
- No performance overhead. Since it's just a container, there is almost no overhead, thus all applications will run at full speed.
- Supports filesystem sandboxing (thanks to bubblewrap).
Requirements
The only requirements are bash, fuse2, tar and coreutils. And your /tmp directory should allow files execution (which it does by default on most distros).
Besides, your Linux kernel should support unprivileged user namespaces. On some Linux distros this feature is disabled by default and can be enabled with sysfs:
sysctl kernel.unprivileged_userns_clone=1
or
echo 1 > /proc/sys/kernel/unprivileged_userns_clone
Even if unprivileged user namespaces are not supported in your kernel, you can still use Conty if you have bwrap with SUID bit in your system, in this case just tell Conty to use system-wide bwrap and squashfuse instead of the builtin ones.
export USE_SYS_UTILS=1
./conty.sh command command_arguments
Usage
Either download ready-to-use executable from the releases page or create your own (the instructions are below). Make it executable before run.
chmod +x conty.sh
./conty.sh command command_arguments
For example, if you want to run an application from somewhere on your storage run something like:
./conty.sh /path/to/a/binary
Conty also contains Steam, Lutris, PlayOnLinux, Wine-Staging-TkG and many more.
./conty.sh steam
./conty.sh lutris
./conty.sh playonlinux
./conty.sh wine app.exe
It has a builtin file manager (pcmanfm):
./conty.sh pcmanfm
Want to check if graphics acceleration works (OpenGL and Vulkan)? Run glxinfo, glxgears, vulkaninfo and vkcube:
./conty.sh glxinfo -B
./conty.sh glxgears
./conty.sh vulkaninfo
./conty.sh vkcube
You can even use Conty for compilation:
./conty.sh gcc src.c
./conty.sh git clone https://something.git
cd something && ./conty.sh ./configure
./conty.sh make
There are many more integrated programs. You can list all of them with:
./conty.sh ls /usr/bin
Let me know if you want something else to be included in the container.
There are some other features, see the internal help for more information.
./conty.sh --help
Sandbox
Conty uses bubblewrap and thus supports filesystem sandboxing. By default it's disabled and almost all directories on your system are available for the container.
Here are the environment variables that you can use to control the sandbox:
- SANDBOX - enables the sandboxing feature itself. Isolates all directories, creates a fake temporary home directory (in RAM), which is destroyed after closing the container.
- DISABLE_NET - completely disables internet access.
- HOME_DIR - sets a custom home directory. If you set this, HOME inside the container will still appear as /home/username, but actually a custom directory will be used for it.
- BIND - list of files/directories (separated by space) to bind to the container. You can use this variable to allow access to any files or directories.
Example:
export SANDBOX=1
export BIND="/home/username/.steam /home/username/.local/share/Steam"
./conty.sh steam
Another example:
mkdir "/home/username/custom_home_dir"
export DISABLE_NET=1
export SANDBOX=1
export HOME_DIR="/home/username/custom_home_dir"
./conty.sh lutris
If you just want a sandboxing functionality but don't need a container with a full-size Linux distro inside (which is what Conty mainly is), i recommend to take a look directly at these projects: bubblewrap and firejail. Sandboxing is a good additional feature of Conty, but is not its main purpose.
Known issues
Nvidia users will experience problems if their Nvidia kernel module version mismatches the version of the Nvidia libraries inside Conty.
For example, if the version of your Nvidia kernel module is 460.56 and the libraries inside the container are from 460.67 version, then graphics acceleration will not work.
There is an experimental solution for this problem in the latest Conty release that can be enabled with the NVIDIA_FIX variable. If you encounter this problem, please let me know if this feature does or doesn't fix it for you.
export NVIDIA_FIX=1
./conty.sh glxgears
How to create your own Conty executables
If you want to create Arch-based container, then use the create-arch-bootstrap.sh script. Root rights are required for this step, because chrooting is used here.
./create-arch-bootstrap.sh
You can edit the script if you want to include different set of packages inside the container.
If you want to use some other distro, then you need to manually obtain it from somewhere.
For the sake of convenience, there are compiled binaries of bwrap and squashfuse and their dependencies (utils.tar) uploaded in this repo, you can use them or you can use your own binaries. Use the create-utils.sh script to easily compile your own bwrap and squashfuse. Just make sure to set the correct size of the utils.tar in the conty-start.sh.
./create-utils.sh
When distro bootsrap and utils.tar are obtained, use the create-conty.sh script to pack everything into a single executable.
./create-conty.sh
Done!