Clone your workstation environment to an isolated VM with selective apps, paths and services
Project description
CloneBox ๐ฆ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ ____ _ ____ โ
โ / ___|| | ___ _ __ ___| _ \ ___ __ __ โ
โ | | | | / _ \ | '_ \ / _ \ |_) |/ _ \\ \/ / โ
โ | |___ | || (_) || | | | __/ _ <| (_) |> < โ
โ \____||_| \___/ |_| |_|\___|_| \_\\___//_/\_\ โ
โ โ
โ Clone your workstation to an isolated VM โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
Clone your workstation environment to an isolated VM in 60 seconds using bind mounts instead of disk cloning.
CloneBox lets you create isolated virtual machines with only the applications, directories and services you need - using bind mounts instead of full disk cloning. Perfect for development, testing, or creating reproducible environments.
Features
- ๐ฏ Selective cloning - Choose exactly which paths, services and apps to include
- ๐ Auto-detection - Automatically detects running services, applications, and project directories
- ๐ Bind mounts - Share directories with the VM without copying data
- โ๏ธ Cloud-init - Automatic package installation and service setup
- ๐ฅ๏ธ GUI support - SPICE graphics with virt-viewer integration
- โก Fast creation - No full disk cloning, VMs are ready in seconds
- ๐ฅ Auto-download - Automatically downloads and caches Ubuntu cloud images (stored in ~/Downloads)
- ๐ Health monitoring - Built-in health checks for packages, services, and mounts
- ๐ Self-healing - Automatic monitoring and repair of apps and services
- ๐ Live monitoring - Real-time dashboard for running applications and services
- ๐ง Repair tools - One-click fix for common VM issues (audio, permissions, mounts)
- ๐ VM migration - Export/import VMs with data between workstations
- ๐งช Configuration testing - Validate VM settings and functionality
- ๐ App data sync - Include browser profiles, IDE settings, and app configs
GUI - cloned ubuntu
Use Cases
CloneBox excels in scenarios where developers need:
- Isolated sandbox environments for testing AI agents, edge computing simulations, or integration workflows without risking host system stability
- Reproducible development setups that can be quickly spun up with identical configurations across different machines
- Safe experimentation with system-level changes that can be discarded by simply deleting the VM
- Quick onboarding for new team members who need a fully configured development environment
What's New in v1.1
v1.1.2 is production-ready with two full runtimes and P2P secure sharing:
| Feature | Status |
|---|---|
| ๐ฅ๏ธ VM Runtime (libvirt/QEMU) | โ Stable |
| ๐ณ Container Runtime (Podman/Docker) | โ Stable |
| ๐ Web Dashboard (FastAPI + HTMX + Tailwind) | โ Stable |
๐๏ธ Profiles System (ml-dev, web-stack) |
โ Stable |
| ๐ Auto-detection (services, apps, paths) | โ Stable |
| ๐ P2P Secure Transfer (AES-256) | โ NEW |
| ๐ธ Snapshot Management | โ NEW |
| ๐ฅ Health Check System | โ NEW |
| ๐งช 95%+ Test Coverage | โ |
P2P Secure VM Sharing
Share VMs between workstations with AES-256 encryption:
# Generate team encryption key (once per team)
clonebox keygen
# ๐ Key saved: ~/.clonebox.key
# Export encrypted VM
clonebox export-encrypted my-dev-vm -o team-env.enc --user-data
# Transfer via SCP/SMB/USB
scp team-env.enc user@workstationB:~/
# Import on another machine (needs same key)
clonebox import-encrypted team-env.enc --name my-dev-copy
# Or use P2P commands directly
clonebox export-remote user@hostA my-vm -o local.enc --encrypted
clonebox import-remote local.enc user@hostB --encrypted
clonebox sync-key user@hostB # Sync encryption key
clonebox list-remote user@hostB # List remote VMs
Snapshot Management
Save and restore VM states:
# Create snapshot before risky operation
clonebox snapshot create my-vm --name "before-upgrade" --user
# List all snapshots
clonebox snapshot list my-vm --user
# Restore to previous state
clonebox snapshot restore my-vm --name "before-upgrade" --user
# Delete old snapshot
clonebox snapshot delete my-vm --name "before-upgrade" --user
Health Checks
Configure health probes in .clonebox.yaml:
health_checks:
- name: nginx
type: http
url: http://localhost:80/health
expected_status: 200
- name: postgres
type: tcp
host: localhost
port: 5432
- name: redis
type: command
exec: "redis-cli ping"
expected_output: "PONG"
Run health checks:
clonebox health my-vm --user
Roadmap
- v1.2.0: Resource limits, progress bars, secrets isolation
- v1.3.0: Multi-VM orchestration, cluster mode
- v2.0.0: Cloud provider support (AWS, GCP, Azure), Windows WSL2 support
See TODO.md for detailed roadmap and CONTRIBUTING.md for contribution guidelines.
CloneBox to narzฤdzie CLI do szybkiego klonowania aktualnego ลrodowiska workstation do izolowanej maszyny wirtualnej (VM). Zamiast peลnego kopiowania dysku, uลผywa bind mounts (udostฤpnianie katalogรณw na ลผywo) i cloud-init do selektywnego przeniesienia tylko potrzebnych elementรณw: uruchomionych usลug (Docker, PostgreSQL, nginx), aplikacji, ลcieลผek projektรณw i konfiguracji. Automatycznie pobiera obrazy Ubuntu, instaluje pakiety i uruchamia VM z SPICE GUI. Idealne dla deweloperรณw na Linuxie โ VM powstaje w minuty, bez duplikowania danych.
Kluczowe komendy:
cloneboxโ interaktywny wizard (detect + create + start)clonebox detectโ skanuje usลugi/apps/ลcieลผkiclonebox clone . --user --runโ szybki klon bieลผฤ cego katalogu z uลผytkownikiem i autostartemclonebox watch . --userโ monitoruj na ลผywo aplikacje i usลugi w VMclonebox repair . --userโ napraw problemy z uprawnieniami, audio, usลugamiclonebox container up|ps|stop|rmโ lekki runtime kontenerowy (podman/docker)clonebox dashboardโ lokalny dashboard (VM + containers)
Dlaczego wirtualne klony workstation majฤ sens?
Problem: Developerzy/Vibecoderzy nie izolujฤ ลrodowisk dev/test (np. dla AI agentรณw), bo rฤczne odtwarzanie setupu to bรณl โ godziny na instalacjฤ apps, usลug, configรณw, dotfiles. Przechodzenie z fizycznego PC na VM wymagaลoby peลnego rebuilda, co blokuje workflow.
Rozwiฤ
zanie CloneBox: Automatycznie skanuje i klonuje stan "tu i teraz" (usลugi z ps, dockery z docker ps, projekty z git/.env). VM dziedziczy ลrodowisko bez kopiowania caลego ลmietnika โ tylko wybrane bind mounty.
Korzyลci w twoim kontekลcie (embedded/distributed systems, AI automation):
- Sandbox dla eksperymentรณw: Testuj AI agenty, edge computing (RPi/ESP32 symulacje) czy Camel/ERP integracje w izolacji, bez psucia hosta.
- Reprodukcja workstation: Na firmowym PC masz setup z domu (Python/Rust/Go envs, Docker compose, Postgres dev DB) โ klonujesz i pracujesz identycznie.
- Szybkoลฤ > dotfiles: Dotfiles odtwarzajฤ configi, ale nie ลapiฤ runtime stanu (uruchomione serwery, otwarte projekty). CloneBox to "snapshot na sterydach".
- Bezpieczeลstwo/cost-optymalizacja: Izolacja od plikรณw hosta (tylko mounts), zero downtime, tanie w zasobach (libvirt/QEMU). Dla SME: szybki onboarding dev env bez migracji fizycznej.
- AI-friendly: Agenci LLMs (jak te z twoich hobby) mogฤ dziaลaฤ w VM z peลnym kontekstem, bez ryzyka "zasmiecania" main PC.
Przykลad: Masz uruchomiony Kubernetes Podman z twoim home labem + projekt automotive leasing. clonebox clone ~/projects --run โ VM gotowa w 30s, z tymi samymi serwisami, ale izolowana. Lepsze niลผ Docker (brak GUI/full OS) czy peลna migracja.
Dlaczego ludzie tego nie robiฤ ? Brak automatyzacji โ nikt nie chce rฤcznie rebuildowaฤ.
- CloneBox rozwiฤ zuje to jednym poleceniem. Super match dla twoich interesรณw (distributed infra, AI tools, business automation).
Installation
Quick Setup (Recommended)
Run the setup script to automatically install dependencies and configure the environment:
# Clone the repository
git clone https://github.com/wronai/clonebox.git
cd clonebox
# Run the setup script
./setup.sh
The setup script will:
- Install all required packages (QEMU, libvirt, Python, etc.)
- Add your user to the necessary groups
- Configure libvirt networks
- Install clonebox in development mode
Manual Installation
Prerequisites
# Install libvirt and QEMU/KVM
sudo apt install qemu-kvm libvirt-daemon-system libvirt-clients bridge-utils virt-manager virt-viewer
# Enable and start libvirtd
sudo systemctl enable --now libvirtd
# Add user to libvirt group
sudo usermod -aG libvirt $USER
newgrp libvirt
# Install genisoimage for cloud-init
sudo apt install genisoimage
Install CloneBox
# From source
git clone https://github.com/wronai/clonebox.git
cd clonebox
pip install -e .
# Or directly
pip install clonebox
Dashboard ma opcjonalne zaleลผnoลci:
pip install "clonebox[dashboard]"
lub
# Aktywuj venv
source .venv/bin/activate
# Interaktywny tryb (wizard)
clonebox
# Lub poszczegรณlne komendy
clonebox detect # Pokaลผ wykryte usลugi/apps/ลcieลผki
clonebox list # Lista VM
clonebox create --config ... # Utwรณrz VM z JSON config
clonebox start <name> # Uruchom VM
clonebox stop <name> # Zatrzymaj VM
clonebox delete <name> # Usuล VM
Development and Testing
Running Tests
CloneBox has comprehensive test coverage with unit tests and end-to-end tests:
# Run unit tests only (fast, no libvirt required)
make test
# Run fast unit tests (excludes slow tests)
make test-unit
# Run end-to-end tests (requires libvirt/KVM)
make test-e2e
# Run all tests including e2e
make test-all
# Run tests with coverage
make test-cov
# Run tests with verbose output
make test-verbose
Test Categories
Tests are organized with pytest markers:
- Unit tests: Fast tests that mock libvirt/system calls (default)
- E2E tests: End-to-end tests requiring actual VM creation (marked with
@pytest.mark.e2e) - Slow tests: Tests that take longer to run (marked with
@pytest.mark.slow)
E2E tests are automatically skipped when:
- libvirt is not installed
/dev/kvmis not available- Running in CI environment (
CI=trueorGITHUB_ACTIONS=true)
Manual Test Execution
# Run only unit tests (exclude e2e)
pytest tests/ -m "not e2e"
# Run only e2e tests
pytest tests/e2e/ -m "e2e" -v
# Run specific test file
pytest tests/test_cloner.py -v
# Run with coverage
pytest tests/ -m "not e2e" --cov=clonebox --cov-report=html
Quick Start
Interactive Mode (Recommended)
Simply run clonebox to start the interactive wizard:
clonebox
clonebox clone . --user --run --replace --base-image ~/ubuntu-22.04-cloud.qcow2 --disk-size-gb 30
# Sprawdลบ diagnostykฤ na ลผywo
clonebox watch . --user
clonebox test . --user --validate --require-running-apps
# Uruchom peลnฤ
walidacjฤ (wykorzystuje QGA do sprawdzenia serwisรณw wewnฤ
trz)
clonebox test . --user --validate --smoke-test
Profiles (Reusable presets)
Profiles pozwalajฤ
trzymaฤ gotowe presety dla VM/container (np. ml-dev, web-dev) i nakลadaฤ je na bazowฤ
konfiguracjฤ.
# Przykลad: uruchom kontener z profilem
clonebox container up . --profile ml-dev --engine podman
# Przykลad: generuj VM config z profilem
clonebox clone . --profile ml-dev --user --run
Domyลlne lokalizacje profili:
~/.clonebox.d/<name>.yaml./.clonebox.d/<name>.yaml- wbudowane:
src/clonebox/templates/profiles/<name>.yaml
Dashboard
clonebox dashboard --port 8080
# http://127.0.0.1:8080
The wizard will:
- Detect running services (Docker, PostgreSQL, nginx, etc.)
- Detect running applications and their working directories
- Detect project directories and config files
- Let you select what to include in the VM
- Create and optionally start the VM
Command Line
# Create VM with specific config
clonebox create --name my-dev-vm --config '{
"paths": {
"/home/user/projects": "/mnt/projects",
"/home/user/.config": "/mnt/config"
},
"packages": ["python3", "nodejs", "docker.io"],
"services": ["docker"]
}' --ram 4096 --vcpus 4 --disk-size-gb 20 --start
# Create VM with larger root disk
clonebox create --name my-dev-vm --disk-size-gb 30 --config '{"paths": {}, "packages": [], "services": []}'
# List VMs
clonebox list
# Start/Stop VM
clonebox start my-dev-vm
clonebox stop my-dev-vm
# Delete VM
clonebox delete my-dev-vm
# Detect system state (useful for scripting)
clonebox detect --json
Usage Examples
Basic Workflow
# 1. Clone current directory with auto-detection
clonebox clone . --user
# 2. Review generated config
cat .clonebox.yaml
# 3. Create and start VM
clonebox start . --user --viewer
# 4. Check VM status
clonebox status . --user
# 5. Open VM window later
clonebox open . --user
# 6. Stop VM when done
clonebox stop . --user
# 7. Delete VM if needed
clonebox delete . --user --yes
Development Environment with Browser Profiles
# Clone with app data (browser profiles, IDE settings)
clonebox clone . --user --run
# VM will have:
# - All your project directories
# - Browser profiles (Chrome, Firefox) with bookmarks and passwords
# - IDE settings (PyCharm, VSCode)
# - Docker containers and services
# Access in VM:
ls ~/.config/google-chrome # Chrome profile
# Firefox profile (Ubuntu czฤsto uลผywa snap):
ls ~/snap/firefox/common/.mozilla/firefox
ls ~/.mozilla/firefox
# PyCharm profile (snap):
ls ~/snap/pycharm-community/common/.config/JetBrains
ls ~/.config/JetBrains
Container workflow (podman/docker)
# Start a dev container (auto-detect engine if not specified)
clonebox container up . --engine podman --detach
# List running containers
clonebox container ps
# Stop/remove
clonebox container stop <name>
clonebox container rm <name>
Full validation (VM)
clonebox test weryfikuje, ลผe VM faktycznie ma zamontowane ลcieลผki i speลnia wymagania z .clonebox.yaml.
clonebox test . --user --validate
Walidowane kategorie:
- Mounts (9p)
- Packages (apt)
- Snap packages
- Services (enabled + running)
- Apps (instalacja + dostฤpnoลฤ profilu: Firefox/PyCharm/Chrome)
Testing and Validating VM Configuration
# Quick test - basic checks
clonebox test . --user --quick
# Full validation - checks EVERYTHING against YAML config
clonebox test . --user --validate
# Validation checks:
# โ
All mount points (paths + app_data_paths) are mounted and accessible
# โ
All APT packages are installed
# โ
All snap packages are installed
# โ
All services are enabled and running
# โ
Reports file counts for each mount
# โ
Shows package versions
# โ
Comprehensive summary table
# Example output:
# ๐พ Validating Mount Points...
# โโโโโโโโโโโโโโโโโโโโโโโโโโโฌโโโโโโโโโโฌโโโโโโโโโโโโโฌโโโโโโโโโ
# โ Guest Path โ Mounted โ Accessible โ Files โ
# โโโโโโโโโโโโโโโโโโโโโโโโโโโผโโโโโโโโโโผโโโโโโโโโโโโโผโโโโโโโโโค
# โ /home/ubuntu/Downloads โ โ
โ โ
โ 199 โ
# โ ~/.config/JetBrains โ โ
โ โ
โ 45 โ
# โโโโโโโโโโโโโโโโโโโโโโโโโโโดโโโโโโโโโโดโโโโโโโโโโโโโดโโโโโโโโโ
# 12/14 mounts working
#
# ๐ฆ Validating APT Packages...
# โโโโโโโโโโโโโโโโโโโฌโโโโโโโโโโโโโโโฌโโโโโโโโโโโโโ
# โ Package โ Status โ Version โ
# โโโโโโโโโโโโโโโโโโโผโโโโโโโโโโโโโโโผโโโโโโโโโโโโโค
# โ firefox โ โ
Installed โ 122.0+b... โ
# โ docker.io โ โ
Installed โ 24.0.7-... โ
# โโโโโโโโโโโโโโโโโโโดโโโโโโโโโโโโโโโดโโโโโโโโโโโโโ
# 8/8 packages installed
#
# ๐ Validation Summary
# โโโโโโโโโโโโโโโโโโฌโโโโโโโโโฌโโโโโโโโโฌโโโโโโโโ
# โ Category โ Passed โ Failed โ Total โ
# โโโโโโโโโโโโโโโโโโผโโโโโโโโโผโโโโโโโโโผโโโโโโโโค
# โ Mounts โ 12 โ 2 โ 14 โ
# โ APT Packages โ 8 โ 0 โ 8 โ
# โ Snap Packages โ 2 โ 0 โ 2 โ
# โ Services โ 5 โ 1 โ 6 โ
# โ TOTAL โ 27 โ 3 โ 30 โ
# โโโโโโโโโโโโโโโโโโดโโโโโโโโโดโโโโโโโโโดโโโโโโโโ
VM Health Monitoring and Mount Validation
# Check overall status including mount validation
clonebox status . --user
# Output shows:
# ๐ VM State: running
# ๐ Network and IP address
# โ๏ธ Cloud-init: Complete
# ๐พ Mount Points status table:
# โโโโโโโโโโโโโโโโโโโโโโโโโโโฌโโโโโโโโโโโโโโโฌโโโโโโโโโ
# โ Guest Path โ Status โ Files โ
# โโโโโโโโโโโโโโโโโโโโโโโโโโโผโโโโโโโโโโโโโโโผโโโโโโโโโค
# โ /home/ubuntu/Downloads โ โ
Mounted โ 199 โ
# โ /home/ubuntu/Documents โ โ Not mountedโ ? โ
# โ ~/.config/JetBrains โ โ
Mounted โ 45 โ
# โโโโโโโโโโโโโโโโโโโโโโโโโโโดโโโโโโโโโโโโโโโดโโโโโโโโโ
# 12/14 mounts active
# ๐ฅ Health Check Status: OK
# Trigger full health check
clonebox status . --user --health
# If mounts are missing, remount or rebuild:
# In VM: sudo mount -a
# Or rebuild: clonebox clone . --user --run --replace
๐ Monitoring and Self-Healing
CloneBox includes continuous monitoring and automatic self-healing capabilities for both GUI applications and system services.
Monitor Running Applications and Services
# Watch real-time status of apps and services
clonebox watch . --user
# Output shows live dashboard:
# โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
# โ CloneBox Live Monitor โ
# โ โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโฃ
# โ ๐ฅ๏ธ GUI Apps: โ
# โ โ
pycharm-community PID: 1234 Memory: 512MB โ
# โ โ
firefox PID: 5678 Memory: 256MB โ
# โ โ chromium Not running โ
# โ โ
# โ ๐ง System Services: โ
# โ โ
docker Active: 2h 15m โ
# โ โ
nginx Active: 1h 30m โ
# โ โ
uvicorn Active: 45m (port 8000) โ
# โ โ
# โ ๐ Last check: 2024-01-31 13:25:30 โ
# โ ๐ Next check in: 25 seconds โ
# โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
# Check detailed status with logs
clonebox status . --user --verbose
# View monitor logs from host
./scripts/clonebox-logs.sh # Interactive log viewer
# Or via SSH:
ssh ubuntu@<IP_VM> "tail -f /var/log/clonebox-monitor.log"
Repair and Troubleshooting
# Run automatic repair from host
clonebox repair . --user
# This triggers the repair script inside VM which:
# - Fixes directory permissions (pulse, ibus, dconf)
# - Restarts audio services (PulseAudio/PipeWire)
# - Reconnects snap interfaces
# - Remounts missing filesystems
# - Resets GNOME keyring if needed
# Interactive repair menu (via SSH)
ssh ubuntu@<IP_VM> "clonebox-repair"
# Manual repair options from host:
clonebox repair . --user --auto # Full automatic repair
clonebox repair . --user --perms # Fix permissions only
clonebox repair . --user --audio # Fix audio only
clonebox repair . --user --snaps # Reconnect snaps only
clonebox repair . --user --mounts # Remount filesystems only
# Check repair status (via SSH)
ssh ubuntu@<IP_VM> "cat /var/run/clonebox-status"
# View repair logs
./scripts/clonebox-logs.sh # Interactive viewer
# Or via SSH:
ssh ubuntu@<IP_VM> "tail -n 50 /var/log/clonebox-boot.log"
Monitor Configuration
The monitoring system is configured through environment variables in .env:
# Enable/disable monitoring
CLONEBOX_ENABLE_MONITORING=true
CLONEBOX_MONITOR_INTERVAL=30 # Check every 30 seconds
CLONEBOX_AUTO_REPAIR=true # Auto-restart failed services
CLONEBOX_WATCH_APPS=true # Monitor GUI apps
CLONEBOX_WATCH_SERVICES=true # Monitor system services
Inside the VM - Manual Controls
# Check monitor service status
systemctl --user status clonebox-monitor
# View monitor logs
journalctl --user -u clonebox-monitor -f
tail -f /var/log/clonebox-monitor.log
# Stop/start monitoring
systemctl --user stop clonebox-monitor
systemctl --user start clonebox-monitor
# Check last status
cat /var/run/clonebox-monitor-status
# Run repair manually
clonebox-repair --all # Run all fixes
clonebox-repair --status # Show current status
clonebox-repair --logs # Show recent logs
Export/Import Workflow
# On workstation A - Export VM with all data
clonebox export . --user --include-data -o my-dev-env.tar.gz
# Transfer file to workstation B, then import
clonebox import my-dev-env.tar.gz --user
# Start VM on new workstation
clonebox start . --user
clonebox open . --user
# VM includes:
# - Complete disk image
# - All browser profiles and settings
# - Project files
# - Docker images and containers
Troubleshooting Common Issues
# If mounts are empty after reboot:
clonebox status . --user # Check VM status
# Then in VM:
sudo mount -a # Remount all fstab entries
# If browser profiles don't sync:
rm .clonebox.yaml
clonebox clone . --user --run --replace
# If GUI doesn't open:
clonebox open . --user # Easiest way
# or:
virt-viewer --connect qemu:///session clone-clonebox
# Check VM details:
clonebox list # List all VMs
virsh --connect qemu:///session dominfo clone-clonebox
# Restart VM if needed:
clonebox restart . --user # Easiest - stop and start
clonebox stop . --user && clonebox start . --user # Manual restart
clonebox restart . --user --open # Restart and open GUI
virsh --connect qemu:///session reboot clone-clonebox # Direct reboot
virsh --connect qemu:///session reset clone-clonebox # Hard reset if frozen
Legacy Examples (Manual Config)
These examples use the older create command with manual JSON config. For most users, the clone command with auto-detection is easier.
Python Development Environment
clonebox create --name python-dev --config '{
"paths": {
"/home/user/my-python-project": "/workspace",
"/home/user/.pyenv": "/root/.pyenv"
},
"packages": ["python3", "python3-pip", "python3-venv", "build-essential"],
"services": []
}' --ram 2048 --start
Docker Development
clonebox create --name docker-dev --config '{
"paths": {
"/home/user/docker-projects": "/projects",
"/var/run/docker.sock": "/var/run/docker.sock"
},
"packages": ["docker.io", "docker-compose"],
"services": ["docker"]
}' --ram 4096 --start
Full Stack (Node.js + PostgreSQL)
clonebox create --name fullstack --config '{
"paths": {
"/home/user/my-app": "/app",
"/home/user/pgdata": "/var/lib/postgresql/data"
},
"packages": ["nodejs", "npm", "postgresql"],
"services": ["postgresql"]
}' --ram 4096 --vcpus 4 --start
Inside the VM
After the VM boots, shared directories are automatically mounted via fstab entries. You can check their status:
# Check mount status
mount | grep 9p
# View health check report
cat /var/log/clonebox-health.log
# Re-run health check manually
clonebox-health
# Check cloud-init status
sudo cloud-init status
# Manual mount (if needed)
sudo mkdir -p /mnt/projects
sudo mount -t 9p -o trans=virtio,version=9p2000.L,nofail mount0 /mnt/projects
Health Check System
CloneBox includes automated health checks that verify:
- Package installation (apt/snap)
- Service status
- Mount points accessibility
- GUI readiness
Health check logs are saved to /var/log/clonebox-health.log with a summary in /var/log/clonebox-health-status.
Architecture
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ HOST SYSTEM โ
โ โโโโโโโโโโโโโโโโ โโโโโโโโโโโโโโโโ โโโโโโโโโโโโโโโโ โ
โ โ /home/user/ โ โ /var/www/ โ โ Docker โ โ
โ โ projects/ โ โ html/ โ โ Socket โ โ
โ โโโโโโโโฌโโโโโโโโ โโโโโโโโฌโโโโโโโโ โโโโโโโโฌโโโโโโโโ โ
โ โ โ โ โ
โ โ 9p/virtio โ โ โ
โ โ bind mounts โ โ โ
โ โโโโโโโโผโโโโโโโโโโโโโโโโโโผโโโโโโโโโโโโโโโโโโผโโโโโโโโ โ
โ โ CloneBox VM โ โ
โ โ โโโโโโโโโโโโโโ โโโโโโโโโโโโโโ โโโโโโโโโโโโโโ โ โ
โ โ โ /mnt/proj โ โ /mnt/www โ โ /var/run/ โ โ โ
โ โ โ โ โ โ โ docker.sockโ โ โ
โ โ โโโโโโโโโโโโโโ โโโโโโโโโโโโโโ โโโโโโโโโโโโโโ โ โ
โ โ โ โ
โ โ cloud-init installed packages & services โ โ
โ โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
Quick Clone (Recommended)
The fastest way to clone your current working directory:
# Clone current directory - generates .clonebox.yaml and asks to create VM
# Base OS image is automatically downloaded to ~/Downloads on first run
clonebox clone .
# Increase VM disk size (recommended for GUI + large tooling)
clonebox clone . --user --disk-size-gb 30
# Clone specific path
clonebox clone ~/projects/my-app
# Clone with custom name and auto-start
clonebox clone ~/projects/my-app --name my-dev-vm --run
# Clone and edit config before creating
clonebox clone . --edit
# Replace existing VM (stops, deletes, and recreates)
clonebox clone . --replace
# Use custom base image instead of auto-download
clonebox clone . --base-image ~/ubuntu-22.04-cloud.qcow2
# User session mode (no root required)
clonebox clone . --user
Later, start the VM from any directory with .clonebox.yaml:
# Start VM from config in current directory
clonebox start .
# Start VM from specific path
clonebox start ~/projects/my-app
Export YAML Config
# Export detected state as YAML (with deduplication)
clonebox detect --yaml --dedupe
# Save to file
clonebox detect --yaml --dedupe -o my-config.yaml
Base Images
CloneBox automatically downloads a bootable Ubuntu cloud image on first run:
# Auto-download (default) - downloads Ubuntu 22.04 to ~/Downloads on first run
clonebox clone .
# Use custom base image
clonebox clone . --base-image ~/my-custom-image.qcow2
# Manual download (optional - clonebox does this automatically)
wget -O ~/Downloads/clonebox-ubuntu-jammy-amd64.qcow2 \
https://cloud-images.ubuntu.com/jammy/current/jammy-server-cloudimg-amd64.img
Base image behavior:
- If no
--base-imageis specified, Ubuntu 22.04 cloud image is auto-downloaded - Downloaded images are cached in
~/Downloads/clonebox-ubuntu-jammy-amd64.qcow2 - Subsequent VMs reuse the cached image (no re-download)
- Each VM gets its own disk using the base image as a backing file (copy-on-write)
VM Login Credentials
VM credentials are managed through .env file for security:
Setup:
-
Copy
.env.exampleto.env:cp .env.example .env
-
Edit
.envand set your password:# .env file VM_PASSWORD=your_secure_password VM_USERNAME=ubuntu
-
The
.clonebox.yamlfile references the password from.env:vm: username: ubuntu password: ${VM_PASSWORD} # Loaded from .env
Default credentials (if .env not configured):
- Username:
ubuntu - Password:
ubuntu
Security notes:
.envis automatically gitignored (never committed)- Username is stored in YAML (not sensitive)
- Password is stored in
.env(sensitive, not committed) - Change password after first login:
passwd - User has passwordless sudo access
User Session & Networking
CloneBox supports creating VMs in user session (no root required) with automatic network fallback:
# Create VM in user session (uses ~/.local/share/libvirt/images)
clonebox clone . --user
# Explicitly use user-mode networking (slirp) - works without libvirt network
clonebox clone . --user --network user
# Force libvirt default network (may fail in user session)
clonebox clone . --network default
# Auto mode (default): tries libvirt network, falls back to user-mode if unavailable
clonebox clone . --network auto
Network modes:
auto(default): Uses libvirt default network if available, otherwise falls back to user-mode (slirp)default: Forces use of libvirt default networkuser: Uses user-mode networking (slirp) - no bridge setup required
Commands Reference
| Command | Description |
|---|---|
clonebox |
Interactive VM creation wizard |
clonebox clone <path> |
Generate .clonebox.yaml from path + running processes |
clonebox clone . --run |
Clone and immediately start VM |
clonebox clone . --edit |
Clone, edit config, then create |
clonebox clone . --replace |
Replace existing VM (stop, delete, recreate) |
clonebox clone . --user |
Clone in user session (no root) |
clonebox clone . --base-image <path> |
Use custom base image |
clonebox clone . --disk-size-gb <gb> |
Set root disk size in GB (generated configs default to 20GB) |
clonebox clone . --network user |
Use user-mode networking (slirp) |
clonebox clone . --network auto |
Auto-detect network mode (default) |
clonebox create --config <json> --disk-size-gb <gb> |
Create VM from JSON config with specified disk size |
clonebox start . |
Start VM from .clonebox.yaml in current dir |
clonebox start . --viewer |
Start VM and open GUI window |
clonebox start <name> |
Start existing VM by name |
clonebox stop . |
Stop VM from .clonebox.yaml in current dir |
clonebox stop . -f |
Force stop VM |
clonebox delete . |
Delete VM from .clonebox.yaml in current dir |
clonebox delete . --yes |
Delete VM without confirmation |
clonebox list |
List all VMs |
clonebox detect |
Show detected services/apps/paths |
clonebox detect --yaml |
Output as YAML config |
clonebox detect --yaml --dedupe |
YAML with duplicates removed |
clonebox detect --json |
Output as JSON |
clonebox container up . |
Start a dev container for given path |
clonebox container ps |
List containers |
clonebox container stop <name> |
Stop a container |
clonebox container rm <name> |
Remove a container |
clonebox dashboard |
Run local dashboard (VM + containers) |
clonebox status . --user |
Check VM health, cloud-init, IP, and mount status |
clonebox status . --user --health |
Check VM status and run full health check |
clonebox test . --user |
Test VM configuration (basic checks) |
clonebox test . --user --validate |
Full validation: mounts, packages, services vs YAML |
clonebox export . --user |
Export VM for migration to another workstation |
clonebox export . --user --include-data |
Export VM with browser profiles and configs |
clonebox import archive.tar.gz --user |
Import VM from export archive |
clonebox open . --user |
Open GUI viewer for VM (same as virt-viewer) |
virt-viewer --connect qemu:///session <vm> |
Open GUI for running VM |
virsh --connect qemu:///session console <vm> |
Open text console (Ctrl+] to exit) |
Requirements
- Linux with KVM support (
/dev/kvm) - libvirt daemon running
- Python 3.8+
- User in
libvirtgroup
Troubleshooting
Critical: Insufficient Disk Space
If you install a full desktop environment and large development tools (e.g. ubuntu-desktop-minimal, docker.io, large snaps like pycharm-community/chromium), you may hit low disk space warnings inside the VM.
Recommended fix:
- Set a larger root disk in
.clonebox.yaml:
vm:
disk_size_gb: 30
You can also set it during config generation:
clonebox clone . --user --disk-size-gb 30
Notes:
- New configs generated by
clonebox clonedefault todisk_size_gb: 20. - You can override this by setting
vm.disk_size_gbin.clonebox.yaml.
Workaround for an existing VM (host-side resize + guest filesystem grow):
clonebox stop . --user
qemu-img resize ~/.local/share/libvirt/images/<vm-name>/root.qcow2 +10G
clonebox start . --user
Inside the VM:
sudo growpart /dev/vda 1
sudo resize2fs /dev/vda1
df -h /
Known Issue: IBus Preferences crash
During validation you may occasionally see a crash dialog from IBus Preferences in the Ubuntu desktop environment.
This is an upstream issue related to the input method daemon (ibus-daemon) and obsolete system packages (e.g. libglib2.0, libssl3, libxml2, openssl).
It does not affect CloneBox functionality and the VM operates normally.
Workaround:
- Dismiss the crash dialog
- Or run
sudo apt upgradeinside the VM to update system packages
Snap Apps Not Launching (PyCharm, Chromium, Firefox)
If snap-installed applications (e.g., PyCharm, Chromium) are installed but don't launch when clicked, the issue is usually disconnected snap interfaces. This happens because snap interfaces are not auto-connected when installing via cloud-init.
New VMs created with updated CloneBox automatically connect snap interfaces, but for older VMs or manual installs:
# Check snap interface connections
snap connections pycharm-community
# If you see "-" instead of ":desktop", interfaces are NOT connected
# Connect required interfaces
sudo snap connect pycharm-community:desktop :desktop
sudo snap connect pycharm-community:desktop-legacy :desktop-legacy
sudo snap connect pycharm-community:x11 :x11
sudo snap connect pycharm-community:wayland :wayland
sudo snap connect pycharm-community:home :home
sudo snap connect pycharm-community:network :network
# Restart snap daemon and try again
sudo systemctl restart snapd
snap run pycharm-community
For Chromium/Firefox:
sudo snap connect chromium:desktop :desktop
sudo snap connect chromium:x11 :x11
sudo snap connect firefox:desktop :desktop
sudo snap connect firefox:x11 :x11
Debug launch:
PYCHARM_DEBUG=true snap run pycharm-community 2>&1 | tee /tmp/pycharm-debug.log
Nuclear option (reinstall):
snap remove pycharm-community
rm -rf ~/snap/pycharm-community
sudo snap install pycharm-community --classic
sudo snap connect pycharm-community:desktop :desktop
Network Issues
If you encounter "Network not found" or "network 'default' is not active" errors:
# Option 1: Use user-mode networking (no setup required)
clonebox clone . --user --network user
# Option 2: Run the network fix script
./fix-network.sh
# Or manually fix:
virsh --connect qemu:///session net-destroy default 2>/dev/null
virsh --connect qemu:///session net-undefine default 2>/dev/null
virsh --connect qemu:///session net-define /tmp/default-network.xml
virsh --connect qemu:///session net-start default
Permission Issues
If you get permission errors:
# Ensure user is in libvirt and kvm groups
sudo usermod -aG libvirt $USER
sudo usermod -aG kvm $USER
# Log out and log back in for groups to take effect
VM Already Exists
If you get "VM already exists" error:
# Option 1: Use --replace flag to automatically replace it
clonebox clone . --replace
# Option 2: Delete manually first
clonebox delete <vm-name>
# Option 3: Use virsh directly
virsh --connect qemu:///session destroy <vm-name>
virsh --connect qemu:///session undefine <vm-name>
# Option 4: Start the existing VM instead
clonebox start <vm-name>
virt-viewer not found
If GUI doesn't open:
# Install virt-viewer
sudo apt install virt-viewer
# Then connect manually
virt-viewer --connect qemu:///session <vm-name>
Browser Profiles and PyCharm Not Working
If browser profiles or PyCharm configs aren't available, or you get permission errors:
Root cause: VM was created with old version without proper mount permissions.
Solution - Rebuild VM with latest fixes:
# Stop and delete old VM
clonebox stop . --user
clonebox delete . --user --yes
# Recreate VM with fixed permissions and app data mounts
clonebox clone . --user --run --replace
After rebuild, verify mounts in VM:
# Check all mounts are accessible
ls ~/.config/google-chrome # Chrome profile
ls ~/.mozilla/firefox # Firefox profile
ls ~/.config/JetBrains # PyCharm settings
ls ~/Downloads # Downloads folder
ls ~/Documents # Documents folder
What changed in v0.1.12:
- All mounts use
uid=1000,gid=1000for ubuntu user access - Both
pathsandapp_data_pathsare properly mounted - No sudo needed to access any shared directories
Mount Points Empty or Permission Denied
If you get "must be superuser to use mount" error when accessing Downloads/Documents:
Solution: VM was created with old mount configuration. Recreate VM:
# Stop and delete old VM
clonebox stop . --user
clonebox delete . --user --yes
# Recreate with fixed permissions
clonebox clone . --user --run --replace
What was fixed:
- Mounts now use
uid=1000,gid=1000so ubuntu user has access - No need for sudo to access shared directories
- Applies to new VMs created after v0.1.12
Mount Points Empty After Reboot
If shared directories appear empty after VM restart:
-
Check fstab entries:
cat /etc/fstab | grep 9p
-
Mount manually:
sudo mount -a
-
Verify access mode:
- VMs created with
accessmode="mapped"allow any user to access mounts - Mount options include
uid=1000,gid=1000for user access
- VMs created with
Advanced Usage
VM Migration Between Workstations
Export your complete VM environment:
# Export VM with all data
clonebox export . --user --include-data -o my-dev-env.tar.gz
# Transfer to new workstation, then import
clonebox import my-dev-env.tar.gz --user
clonebox start . --user
Testing VM Configuration
Validate your VM setup:
# Quick test (basic checks)
clonebox test . --user --quick
# Full test (includes health checks)
clonebox test . --user --verbose
Monitoring VM Health
Check VM status from workstation:
# Check VM state, IP, cloud-init, and health
clonebox status . --user
# Trigger health check in VM
clonebox status . --user --health
Reopening VM Window
If you close the VM window, you can reopen it:
# Open GUI viewer (easiest)
clonebox open . --user
# Start VM and open GUI (if VM is stopped)
clonebox start . --user --viewer
# Open GUI for running VM
virt-viewer --connect qemu:///session clone-clonebox
# List VMs to get the correct name
clonebox list
# Text console (no GUI)
virsh --connect qemu:///session console clone-clonebox
# Press Ctrl + ] to exit console
Exporting to Proxmox
To use CloneBox VMs in Proxmox, you need to convert the qcow2 disk image to Proxmox format.
Step 1: Locate VM Disk Image
# Find VM disk location
clonebox list
# Check VM details for disk path
virsh --connect qemu:///session dominfo clone-clonebox
# Typical locations:
# User session: ~/.local/share/libvirt/images/<vm-name>/<vm-name>.qcow2
# System session: /var/lib/libvirt/images/<vm-name>/<vm-name>.qcow2
Step 2: Export VM with CloneBox
# Export VM with all data (from current directory with .clonebox.yaml)
clonebox export . --user --include-data -o clonebox-vm.tar.gz
# Or export specific VM by name
clonebox export safetytwin-vm --include-data -o safetytwin.tar.gz
# Extract to get the disk image
tar -xzf clonebox-vm.tar.gz
cd clonebox-clonebox
ls -la # Should show disk.qcow2, vm.xml, etc.
Step 3: Convert to Proxmox Format
# Install qemu-utils if not installed
sudo apt install qemu-utils
# Convert qcow2 to raw format (Proxmox preferred)
qemu-img convert -f qcow2 -O raw disk.qcow2 vm-disk.raw
# Or convert to qcow2 with compression for smaller size
qemu-img convert -f qcow2 -O qcow2 -c disk.qcow2 vm-disk-compressed.qcow2
Step 4: Transfer to Proxmox Host
# Using scp (replace with your Proxmox host IP)
scp vm-disk.raw root@proxmox:/var/lib/vz/template/iso/
# Or using rsync for large files
rsync -avh --progress vm-disk.raw root@proxmox:/var/lib/vz/template/iso/
Step 5: Create VM in Proxmox
-
Log into Proxmox Web UI
-
Create new VM:
- Click "Create VM"
- Enter VM ID and Name
- Set OS: "Do not use any media"
-
Configure Hardware:
- Hard Disk:
- Delete default disk
- Click "Add" โ "Hard Disk"
- Select your uploaded image file
- Set Disk size (can be larger than image)
- Set Bus: "VirtIO SCSI"
- Set Cache: "Write back" for better performance
- Hard Disk:
-
CPU & Memory:
- Set CPU cores (match original VM config)
- Set Memory (match original VM config)
-
Network:
- Set Model: "VirtIO (paravirtualized)"
-
Confirm: Click "Finish" to create VM
Step 6: Post-Import Configuration
-
Start the VM in Proxmox
-
Update network configuration:
# In VM console, update network interfaces sudo nano /etc/netplan/01-netcfg.yaml # Example for Proxmox bridge: network: version: 2 renderer: networkd ethernets: ens18: # Proxmox typically uses ens18 dhcp4: true
-
Apply network changes:
sudo netplan apply
-
Update mount points (if needed):
# Mount points will fail in Proxmox, remove them sudo nano /etc/fstab # Comment out or remove 9p mount entries # Reboot to apply changes sudo reboot
Alternative: Direct Import to Proxmox Storage
If you have Proxmox with shared storage:
# On Proxmox host
# Create a temporary directory
mkdir /tmp/import
# Copy disk directly to Proxmox storage (example for local-lvm)
scp vm-disk.raw root@proxmox:/tmp/import/
# On Proxmox host, create VM using CLI
qm create 9000 --name clonebox-vm --memory 4096 --cores 4 --net0 virtio,bridge=vmbr0
# Import disk to VM
qm importdisk 9000 /tmp/import/vm-disk.raw local-lvm
# Attach disk to VM
qm set 9000 --scsihw virtio-scsi-pci --scsi0 local-lvm:vm-9000-disk-0
# Set boot disk
qm set 9000 --boot c --bootdisk scsi0
Troubleshooting
- VM won't boot: Check if disk format is compatible (raw is safest)
- Network not working: Update network configuration for Proxmox's NIC naming
- Performance issues: Use VirtIO drivers and set cache to "Write back"
- Mount errors: Remove 9p mount entries from /etc/fstab as they won't work in Proxmox
Notes
- CloneBox's bind mounts (9p filesystem) are specific to libvirt/QEMU and won't work in Proxmox
- Browser profiles and app data exported with
--include-datawill be available in the VM disk - For shared folders in Proxmox, use Proxmox's shared folders or network shares instead
License
Apache License - see LICENSE file.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file clonebox-1.1.9.tar.gz.
File metadata
- Download URL: clonebox-1.1.9.tar.gz
- Upload date:
- Size: 167.5 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.13.5
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
cf197dc75ef5653388dae6dee9c4ed851872bf7ac3f73c2b81147f010391fb7a
|
|
| MD5 |
84699bbc24530b82cb727a53f818e64d
|
|
| BLAKE2b-256 |
ac330a3b75946457c3c9bdcd2856b0741acb5a430a2f383f25b628620a0bd239
|
File details
Details for the file clonebox-1.1.9-py3-none-any.whl.
File metadata
- Download URL: clonebox-1.1.9-py3-none-any.whl
- Upload date:
- Size: 131.3 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.13.5
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
d56f5c01045b3dfef64a7f9efe819f315345005d37ef8825991fe56aaa6317ba
|
|
| MD5 |
ec156eda4bbbf89856e6dc2150a4722f
|
|
| BLAKE2b-256 |
6b4f543e875a55bdda7d99949f976d12a6ca13d407b3b4be9f8d686641e926e0
|