Skip to content

This repository contains my custom development images for Kasm Workspaces and webtop.

License

Notifications You must be signed in to change notification settings

kbdharun/kasm-images

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

72 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

kasm-images

This repository contains my custom development images for Kasm Workspaces and webtop.

Quick Reference

Images

Note

The images in this repository are not official images and are not supported by Kasm Technologies. If you have any issues with these images, please open an issue in this repository and not upstream. All images are built with Linuxserver.io images as a base.

Debian image

This image is based on the Linuxserver.io Debian image using XFCE as the desktop environment along with additional packages of programming languages for development.

Available via:

  • GHCR (GitHub Container Registry): ghcr.io/kbdharun/kasm-dev-debian:latest
  • DockerHub: docker.io/kbdharun/kasm-dev-debian:latest
  • Quay: quay.io/kbdharun/kasm-dev-debian:latest

To verify the container image using cosign (download the cosign.pub file from here and execute the following command):

  • For GHCR (GitHub Container Registry) image:
cosign verify --key cosign.pub ghcr.io/kbdharun/kasm-dev-debian:latest
  • For DockerHub image:
cosign verify --key cosign.pub docker.io/kbdharun/kasm-dev-debian:latest
  • For Quay image:
cosign verify --key cosign.pub quay.io/kbdharun/kasm-dev-debian:latest

Ubuntu image

This image is based on the Linuxserver.io Ubuntu image using XFCE as the desktop environment along with additional packages of programming languages for development.

Available via:

  • GHCR (GitHub Container Registry): ghcr.io/kbdharun/kasm-dev-ubuntu:latest
  • DockerHub: docker.io/kbdharun/kasm-dev-ubuntu:latest
  • Quay: quay.io/kbdharun/kasm-dev-ubuntu:latest

To verify the container image using cosign (download the cosign.pub file from here and execute the following command):

  • For GHCR (GitHub Container Registry) image:
cosign verify --key cosign.pub ghcr.io/kbdharun/kasm-dev-ubuntu:latest
  • For DockerHub image:
cosign verify --key cosign.pub docker.io/kbdharun/kasm-dev-ubuntu:latest
  • For Quay image:
cosign verify --key cosign.pub quay.io/kbdharun/kasm-dev-ubuntu:latest

Fedora image

There are two images based on the Linuxserver.io Fedora image. One uses XFCE as the desktop environment and the other uses KDE Plasma as the desktop environment. Both images have additional packages of programming languages for development.

Available via:

  • GHCR (GitHub Container Registry): ghcr.io/kbdharun/kasm-dev-fedora:latest and ghcr.io/kbdharun/kasm-dev-fedora-kde:latest
  • DockerHub: docker.io/kbdharun/kasm-dev-fedora:latest and docker.io/kbdharun/kasm-dev-fedora-kde:latest
  • Quay: quay.io/kbdharun/kasm-dev-fedora:latest and quay.io/kbdharun/kasm-dev-fedora-kde:latest

To verify the container image using cosign (download the cosign.pub file from here and execute the following command):

  • For GHCR (GitHub Container Registry) image:
cosign verify --key cosign.pub ghcr.io/kbdharun/kasm-dev-fedora:latest
cosign verify --key cosign.pub ghcr.io/kbdharun/kasm-dev-fedora-kde:latest
  • For DockerHub image:
cosign verify --key cosign.pub docker.io/kbdharun/kasm-dev-fedora:latest
cosign verify --key cosign.pub docker.io/kbdharun/kasm-dev-fedora-kde:latest
  • For Quay image:
cosign verify --key cosign.pub quay.io/kbdharun/kasm-dev-fedora:latest
cosign verify --key cosign.pub quay.io/kbdharun/kasm-dev-fedora-kde:latest

Image Build Attestation

All the image builds/pushes are attested for provenance and integrity using actions/attest-build-provenance. They can be verfied by downloading the recent bundle from the attestations page and having the latest version of GitHub CLI installed in your system. Then, execute the following command:

gh attestation verify oci://<insert-image-url> --owner kbdharun --bundle <path/to/attestation_file.sigstore.json>

Where, <insert-image-url> is the URL of the image you want to verify (don't specify a tag) and <path/to/attestation_file.sigstore.json> is the path to the downloaded attestation file.

Using as webtop

You can use these images as webtop by using the following these steps and replacing the image name with any image from this repository.