Before a sandbox starts doing real work, you can prepare it three ways. Scripts bundle reusable commands. Patches modify the rootfs before the VM boots. A custom init system (systemd, OpenRC, s6) can run as PID 1 instead of microsandbox’s minimal agent. All three are defined at creation time and keep the base image untouched.Documentation Index
Fetch the complete documentation index at: https://docs.microsandbox.dev/llms.txt
Use this file to discover all available pages before exploring further.
Scripts
Scripts are files mounted at/.msb/scripts/ inside the sandbox. The directory is on PATH, so each script is callable by name through exec() or shell().
It provides a clean way to bundle setup procedures or entry points with a sandbox without baking them into the image.
Patches
Patches modify the rootfs before the VM boots. Write config files, copy directories from the host, create symlinks, append to existing files, remove things you don’t need. The base image stays untouched since patches are written to the writable layer on top. Patches are applied in order and work with OCI images and bind-mounted rootfs. They’re not supported with disk image roots (QCOW2, Raw).Available operations
The patch builder is invoked throughSandboxBuilder.patch(p => ...). Each method appends an operation; calls are chainable.
| Method | Description |
|---|---|
text(path, content, opts?) | Write text content to a file |
file(path, bytes, opts?) | Write raw bytes to a file |
mkdir(path, opts?) | Create a directory (idempotent) |
append(path, content) | Append content to an existing file |
copyFile(src, dst, opts?) | Copy a file from the host into the rootfs |
copyDir(src, dst, opts?) | Recursively copy a directory from the host |
symlink(target, link, opts?) | Create a symlink |
remove(path) | Delete a file or directory (idempotent) |
opts accepts { mode?: number; replace?: boolean } for text / file / copyFile, { replace?: boolean } for copyDir / symlink, and { mode?: number } for mkdir.
Custom init system
By default the microsandbox agent runs as PID 1 inside the guest — small, fast, and minimal. For workloads that expect a real init (systemd, OpenRC, s6, runit) — long-lived daemons, system service tests, dbus-using tools — you can hand PID 1 over to the init binary of your choice. The agent does the boot-time setup (mount filesystems, configure network, prepare runtime dirs), then forks. The parent execs your init and becomes PID 1; the agent continues as a normal child process serving host requests over the same channel. The simplest entry point isauto, which probes a small list of well-known paths inside the guest rootfs and picks the first one that exists:
/sbin/init/lib/systemd/systemd/usr/lib/systemd/systemd
/proc/1/comm inside the sandbox — it should print the init’s name (systemd, init, etc.):
--init=auto can’t find anything in its candidate list, agentd fails boot with a clear error in kernel.log listing every path it checked. Switch to an explicit path (--init=/lib/systemd/systemd) when you know exactly where the init lives, or follow the image-picking guidance below to choose an image that actually ships one.
Argv and env
Pass extra argv to the init viainit_with (Rust/TypeScript) or by giving init= an InitConfig (Python). On the CLI, repeat --init-arg once per entry and --init-env KEY=VAL for env vars. Argv defaults to [<cmd>] when no --init-arg is given; env is merged on top of the inherited environment.
Picking an image
Most slim Docker base images (debian:bookworm-slim, ubuntu:24.04, python:3.12-slim) are stripped of init binaries — they’re built for “one process per container” and don’t ship systemd at all. If you point --init at a path the image doesn’t contain, the agent’s pre-flight check fails boot with a clear error in the kernel log, no kernel panic.
Two ways to get an image with an init:
Build a small custom image:
jrei/systemd-debian:12, jrei/systemd-ubuntu:22.04). These work out of the box but are published by community maintainers, not the distros themselves — vet them like any other third-party image before running real workloads.
For a sanity check that doesn’t need systemd, alpine:3.20 ships BusyBox at /sbin/init, which is enough to exercise the handoff mechanics:
Shutdown semantics
In default (no-handoff) mode, microsandbox shuts the guest down by remounting root read-only and callingreboot(RB_POWER_OFF) — typically <100 ms. With handoff, the agent isn’t PID 1 anymore, so it asks your init to shut down via SIGRTMIN+4 (systemd’s poweroff signal) with a SIGTERM fallback. Your init then runs its own teardown — stop services, unmount, halt — which is slower:
| Init | Typical shutdown |
|---|---|
| BusyBox / s6 / runit | <100 ms |
| OpenRC | 50–500 ms |
| systemd | 1–5 s |
Init and entrypoint
--init and --entrypoint are orthogonal. --init controls PID 1 — what runs the system. --entrypoint (and the trailing -- cmd) controls what your workload runs. They can be combined: boot systemd as PID 1 and have microsandbox exec calls land your shell, scripts, or app inside the systemd-managed environment.