2016-10-03 17:07:33 +00:00
|
|
|
# Examples of using the docker tools to build packages.
|
|
|
|
#
|
|
|
|
# This file defines several docker images. In order to use an image,
|
|
|
|
# build its derivation with `nix-build`, and then load the result with
|
|
|
|
# `docker load`. For example:
|
|
|
|
#
|
|
|
|
# $ nix-build '<nixpkgs>' -A dockerTools.examples.redis
|
|
|
|
# $ docker load < result
|
|
|
|
|
2020-12-02 11:16:56 +00:00
|
|
|
{ pkgs, buildImage, buildLayeredImage, fakeNss, pullImage, shadowSetup, buildImageWithNixDb, pkgsCross }:
|
2016-10-03 17:07:33 +00:00
|
|
|
|
|
|
|
rec {
|
|
|
|
# 1. basic example
|
|
|
|
bash = buildImage {
|
|
|
|
name = "bash";
|
2018-07-06 14:31:59 +00:00
|
|
|
tag = "latest";
|
2016-10-03 17:07:33 +00:00
|
|
|
contents = pkgs.bashInteractive;
|
|
|
|
};
|
|
|
|
|
|
|
|
# 2. service example, layered on another image
|
|
|
|
redis = buildImage {
|
|
|
|
name = "redis";
|
|
|
|
tag = "latest";
|
|
|
|
|
|
|
|
# for example's sake, we can layer redis on top of bash or debian
|
|
|
|
fromImage = bash;
|
|
|
|
# fromImage = debian;
|
|
|
|
|
|
|
|
contents = pkgs.redis;
|
|
|
|
runAsRoot = ''
|
|
|
|
mkdir -p /data
|
|
|
|
'';
|
|
|
|
|
|
|
|
config = {
|
|
|
|
Cmd = [ "/bin/redis-server" ];
|
|
|
|
WorkingDir = "/data";
|
|
|
|
Volumes = {
|
|
|
|
"/data" = {};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
# 3. another service example
|
|
|
|
nginx = let
|
|
|
|
nginxPort = "80";
|
|
|
|
nginxConf = pkgs.writeText "nginx.conf" ''
|
2020-12-02 11:16:56 +00:00
|
|
|
user nobody nobody;
|
2016-10-03 17:07:33 +00:00
|
|
|
daemon off;
|
|
|
|
error_log /dev/stdout info;
|
|
|
|
pid /dev/null;
|
|
|
|
events {}
|
|
|
|
http {
|
|
|
|
access_log /dev/stdout;
|
|
|
|
server {
|
|
|
|
listen ${nginxPort};
|
|
|
|
index index.html;
|
|
|
|
location / {
|
|
|
|
root ${nginxWebRoot};
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
'';
|
|
|
|
nginxWebRoot = pkgs.writeTextDir "index.html" ''
|
|
|
|
<html><body><h1>Hello from NGINX</h1></body></html>
|
|
|
|
'';
|
|
|
|
in
|
2020-12-02 11:16:56 +00:00
|
|
|
buildLayeredImage {
|
2016-10-03 17:07:33 +00:00
|
|
|
name = "nginx-container";
|
2018-07-06 14:31:59 +00:00
|
|
|
tag = "latest";
|
2020-12-02 11:16:56 +00:00
|
|
|
contents = [
|
|
|
|
fakeNss
|
|
|
|
pkgs.nginx
|
|
|
|
];
|
2016-10-03 17:07:33 +00:00
|
|
|
|
2020-05-13 08:24:36 +00:00
|
|
|
extraCommands = ''
|
|
|
|
# nginx still tries to read this directory even if error_log
|
|
|
|
# directive is specifying another file :/
|
|
|
|
mkdir -p var/log/nginx
|
|
|
|
mkdir -p var/cache/nginx
|
|
|
|
'';
|
2016-10-03 17:07:33 +00:00
|
|
|
|
|
|
|
config = {
|
|
|
|
Cmd = [ "nginx" "-c" nginxConf ];
|
|
|
|
ExposedPorts = {
|
|
|
|
"${nginxPort}/tcp" = {};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
# 4. example of pulling an image. could be used as a base for other images
|
2017-08-25 09:47:28 +00:00
|
|
|
nixFromDockerHub = pullImage {
|
2017-05-26 16:06:24 +00:00
|
|
|
imageName = "nixos/nix";
|
2019-03-06 08:18:35 +00:00
|
|
|
imageDigest = "sha256:85299d86263a3059cf19f419f9d286cc9f06d3c13146a8ebbb21b3437f598357";
|
2021-06-01 13:10:10 +00:00
|
|
|
sha256 = "19fw0n3wmddahzr20mhdqv6jkjn1kanh6n2mrr08ai53dr8ph5n7";
|
2019-03-06 08:18:35 +00:00
|
|
|
finalImageTag = "2.2.1";
|
2019-03-26 09:35:21 +00:00
|
|
|
finalImageName = "nix";
|
2017-05-26 16:06:24 +00:00
|
|
|
};
|
2021-09-29 12:37:31 +00:00
|
|
|
# Same example, but re-fetches every time the fetcher implementation changes.
|
|
|
|
# NOTE: Only use this for testing, or you'd be wasting a lot of time, network and space.
|
|
|
|
testNixFromDockerHub = pkgs.invalidateFetcherByDrvHash pullImage {
|
|
|
|
imageName = "nixos/nix";
|
|
|
|
imageDigest = "sha256:85299d86263a3059cf19f419f9d286cc9f06d3c13146a8ebbb21b3437f598357";
|
|
|
|
sha256 = "19fw0n3wmddahzr20mhdqv6jkjn1kanh6n2mrr08ai53dr8ph5n7";
|
|
|
|
finalImageTag = "2.2.1";
|
|
|
|
finalImageName = "nix";
|
|
|
|
};
|
2016-10-03 17:07:33 +00:00
|
|
|
|
|
|
|
# 5. example of multiple contents, emacs and vi happily coexisting
|
|
|
|
editors = buildImage {
|
|
|
|
name = "editors";
|
|
|
|
contents = [
|
|
|
|
pkgs.coreutils
|
|
|
|
pkgs.bash
|
|
|
|
pkgs.emacs
|
|
|
|
pkgs.vim
|
|
|
|
pkgs.nano
|
|
|
|
];
|
|
|
|
};
|
2017-08-25 09:47:28 +00:00
|
|
|
|
2018-01-01 08:13:40 +00:00
|
|
|
# 6. nix example to play with the container nix store
|
2017-08-25 09:47:28 +00:00
|
|
|
# docker run -it --rm nix nix-store -qR $(nix-build '<nixpkgs>' -A nix)
|
|
|
|
nix = buildImageWithNixDb {
|
|
|
|
name = "nix";
|
2018-07-06 14:31:59 +00:00
|
|
|
tag = "latest";
|
2017-08-25 09:47:28 +00:00
|
|
|
contents = [
|
2017-09-25 07:39:15 +00:00
|
|
|
# nix-store uses cat program to display results as specified by
|
|
|
|
# the image env variable NIX_PAGER.
|
|
|
|
pkgs.coreutils
|
2017-08-25 09:47:28 +00:00
|
|
|
pkgs.nix
|
2020-06-18 15:29:21 +00:00
|
|
|
pkgs.bash
|
2017-08-25 09:47:28 +00:00
|
|
|
];
|
2017-09-25 07:39:15 +00:00
|
|
|
config = {
|
2019-12-05 08:45:51 +00:00
|
|
|
Env = [
|
|
|
|
"NIX_PAGER=cat"
|
|
|
|
# A user is required by nix
|
|
|
|
# https://github.com/NixOS/nix/blob/9348f9291e5d9e4ba3c4347ea1b235640f54fd79/src/libutil/util.cc#L478
|
|
|
|
"USER=nobody"
|
|
|
|
];
|
2017-09-25 07:39:15 +00:00
|
|
|
};
|
2017-08-25 09:47:28 +00:00
|
|
|
};
|
2018-02-01 15:13:05 +00:00
|
|
|
|
|
|
|
# 7. example of adding something on top of an image pull by our
|
|
|
|
# dockerTools chain.
|
|
|
|
onTopOfPulledImage = buildImage {
|
|
|
|
name = "onTopOfPulledImage";
|
2018-07-06 14:31:59 +00:00
|
|
|
tag = "latest";
|
2018-02-01 15:13:05 +00:00
|
|
|
fromImage = nixFromDockerHub;
|
|
|
|
contents = [ pkgs.hello ];
|
|
|
|
};
|
2018-05-23 00:25:04 +00:00
|
|
|
|
|
|
|
# 8. regression test for erroneous use of eval and string expansion.
|
|
|
|
# See issue #34779 and PR #40947 for details.
|
|
|
|
runAsRootExtraCommands = pkgs.dockerTools.buildImage {
|
|
|
|
name = "runAsRootExtraCommands";
|
2018-07-06 14:31:59 +00:00
|
|
|
tag = "latest";
|
2018-05-23 00:25:04 +00:00
|
|
|
contents = [ pkgs.coreutils ];
|
|
|
|
# The parens here are to create problematic bash to embed and eval. In case
|
|
|
|
# this is *embedded* into the script (with nix expansion) the initial quotes
|
|
|
|
# will close the string and the following parens are unexpected
|
|
|
|
runAsRoot = ''echo "(runAsRoot)" > runAsRoot'';
|
|
|
|
extraCommands = ''echo "(extraCommand)" > extraCommands'';
|
|
|
|
};
|
2018-09-20 17:02:22 +00:00
|
|
|
|
|
|
|
# 9. Ensure that setting created to now results in a date which
|
|
|
|
# isn't the epoch + 1
|
|
|
|
unstableDate = pkgs.dockerTools.buildImage {
|
|
|
|
name = "unstable-date";
|
|
|
|
tag = "latest";
|
|
|
|
contents = [ pkgs.coreutils ];
|
|
|
|
created = "now";
|
|
|
|
};
|
2018-09-27 18:16:23 +00:00
|
|
|
|
|
|
|
# 10. Create a layered image
|
|
|
|
layered-image = pkgs.dockerTools.buildLayeredImage {
|
|
|
|
name = "layered-image";
|
|
|
|
tag = "latest";
|
2018-12-25 22:04:16 +00:00
|
|
|
extraCommands = ''echo "(extraCommand)" > extraCommands'';
|
2018-09-27 18:16:23 +00:00
|
|
|
config.Cmd = [ "${pkgs.hello}/bin/hello" ];
|
dockerTools.buildImage: support using a layered image in fromImage
Docker images used to be, essentially, a linked list of layers. Each
layer would have a tarball and a json document pointing to its parent,
and the image pointed to the top layer:
imageA ----> layerA
|
v
layerB
|
v
layerC
The current image spec changed this format to where the Image defined
the order and set of layers:
imageA ---> layerA
|--> layerB
`--> layerC
For backwards compatibility, docker produces images which follow both
specs: layers point to parents, and images also point to the entire
list:
imageA ---> layerA
| |
| v
|--> layerB
| |
| v
`--> layerC
This is nice for tooling which supported the older version and never
updated to support the newer format.
Our `buildImage` code only supported the old version, so in order for
`buildImage` to properly generate an image based on another image
with `fromImage`, the parent image's layers must fully support the old
mechanism.
This is not a problem in general, but is a problem with
`buildLayeredImage`.
`buildLayeredImage` creates images with newer image spec, because
individual store paths don't have a guaranteed parent layer. Including
a specific parent ID in the layer's json makes the output less likely
to cache hit when published or pulled.
This means until now, `buildLayeredImage` could not be the input to
`buildImage`.
The changes in this PR change `buildImage` to only use the layer's
manifest when locating parent IDs. This does break buildImage on
extremely old Docker images, though I do wonder how many of these
exist.
This work has been sponsored by Target.
2018-12-04 17:18:06 +00:00
|
|
|
contents = [ pkgs.hello pkgs.bash pkgs.coreutils ];
|
|
|
|
};
|
|
|
|
|
|
|
|
# 11. Create an image on top of a layered image
|
|
|
|
layered-on-top = pkgs.dockerTools.buildImage {
|
|
|
|
name = "layered-on-top";
|
|
|
|
tag = "latest";
|
|
|
|
fromImage = layered-image;
|
|
|
|
extraCommands = ''
|
|
|
|
mkdir ./example-output
|
|
|
|
chmod 777 ./example-output
|
|
|
|
'';
|
|
|
|
config = {
|
|
|
|
Env = [ "PATH=${pkgs.coreutils}/bin/" ];
|
|
|
|
WorkingDir = "/example-output";
|
|
|
|
Cmd = [
|
|
|
|
"${pkgs.bash}/bin/bash" "-c" "echo hello > foo; cat foo"
|
|
|
|
];
|
|
|
|
};
|
2018-09-27 18:16:23 +00:00
|
|
|
};
|
2018-12-27 10:10:53 +00:00
|
|
|
|
2021-03-08 20:36:13 +00:00
|
|
|
# 12 Create a layered image on top of a layered image
|
|
|
|
layered-on-top-layered = pkgs.dockerTools.buildLayeredImage {
|
|
|
|
name = "layered-on-top-layered";
|
|
|
|
tag = "latest";
|
|
|
|
fromImage = layered-image;
|
|
|
|
extraCommands = ''
|
|
|
|
mkdir ./example-output
|
|
|
|
chmod 777 ./example-output
|
|
|
|
'';
|
|
|
|
config = {
|
|
|
|
Env = [ "PATH=${pkgs.coreutils}/bin/" ];
|
|
|
|
WorkingDir = "/example-output";
|
|
|
|
Cmd = [
|
|
|
|
"${pkgs.bash}/bin/bash" "-c" "echo hello > foo; cat foo"
|
|
|
|
];
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
# 13. example of running something as root on top of a parent image
|
2018-12-27 10:10:53 +00:00
|
|
|
# Regression test related to PR #52109
|
|
|
|
runAsRootParentImage = buildImage {
|
|
|
|
name = "runAsRootParentImage";
|
|
|
|
tag = "latest";
|
|
|
|
runAsRoot = "touch /example-file";
|
|
|
|
fromImage = bash;
|
|
|
|
};
|
2019-04-29 22:46:00 +00:00
|
|
|
|
2021-03-08 20:36:13 +00:00
|
|
|
# 14. example of 3 layers images This image is used to verify the
|
2019-04-29 22:46:00 +00:00
|
|
|
# order of layers is correct.
|
|
|
|
# It allows to validate
|
|
|
|
# - the layer of parent are below
|
|
|
|
# - the order of parent layer is preserved at image build time
|
|
|
|
# (this is why there are 3 images)
|
|
|
|
layersOrder = let
|
|
|
|
l1 = pkgs.dockerTools.buildImage {
|
|
|
|
name = "l1";
|
|
|
|
tag = "latest";
|
|
|
|
extraCommands = ''
|
|
|
|
mkdir -p tmp
|
|
|
|
echo layer1 > tmp/layer1
|
|
|
|
echo layer1 > tmp/layer2
|
|
|
|
echo layer1 > tmp/layer3
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
l2 = pkgs.dockerTools.buildImage {
|
|
|
|
name = "l2";
|
|
|
|
fromImage = l1;
|
|
|
|
tag = "latest";
|
|
|
|
extraCommands = ''
|
|
|
|
mkdir -p tmp
|
|
|
|
echo layer2 > tmp/layer2
|
|
|
|
echo layer2 > tmp/layer3
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
in pkgs.dockerTools.buildImage {
|
|
|
|
name = "l3";
|
|
|
|
fromImage = l2;
|
|
|
|
tag = "latest";
|
|
|
|
contents = [ pkgs.coreutils ];
|
|
|
|
extraCommands = ''
|
|
|
|
mkdir -p tmp
|
|
|
|
echo layer3 > tmp/layer3
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2021-03-08 20:36:13 +00:00
|
|
|
# 15. Environment variable inheritance.
|
2020-05-08 09:49:16 +00:00
|
|
|
# Child image should inherit parents environment variables,
|
|
|
|
# optionally overriding them.
|
2021-03-08 20:36:13 +00:00
|
|
|
environmentVariablesParent = pkgs.dockerTools.buildImage {
|
|
|
|
name = "parent";
|
|
|
|
tag = "latest";
|
|
|
|
config = {
|
|
|
|
Env = [
|
|
|
|
"FROM_PARENT=true"
|
|
|
|
"LAST_LAYER=parent"
|
|
|
|
];
|
2020-05-08 09:49:16 +00:00
|
|
|
};
|
2021-03-08 20:36:13 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
environmentVariables = pkgs.dockerTools.buildImage {
|
|
|
|
name = "child";
|
|
|
|
fromImage = environmentVariablesParent;
|
|
|
|
tag = "latest";
|
|
|
|
contents = [ pkgs.coreutils ];
|
|
|
|
config = {
|
|
|
|
Env = [
|
|
|
|
"FROM_CHILD=true"
|
|
|
|
"LAST_LAYER=child"
|
|
|
|
];
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
environmentVariablesLayered = pkgs.dockerTools.buildLayeredImage {
|
2020-05-08 09:49:16 +00:00
|
|
|
name = "child";
|
2021-03-08 20:36:13 +00:00
|
|
|
fromImage = environmentVariablesParent;
|
2020-05-08 09:49:16 +00:00
|
|
|
tag = "latest";
|
|
|
|
contents = [ pkgs.coreutils ];
|
|
|
|
config = {
|
|
|
|
Env = [
|
|
|
|
"FROM_CHILD=true"
|
|
|
|
"LAST_LAYER=child"
|
|
|
|
];
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2021-03-08 20:36:13 +00:00
|
|
|
# 16. Create another layered image, for comparing layers with image 10.
|
2019-06-06 08:39:50 +00:00
|
|
|
another-layered-image = pkgs.dockerTools.buildLayeredImage {
|
|
|
|
name = "another-layered-image";
|
|
|
|
tag = "latest";
|
|
|
|
config.Cmd = [ "${pkgs.hello}/bin/hello" ];
|
|
|
|
};
|
|
|
|
|
2021-03-08 20:36:13 +00:00
|
|
|
# 17. Create a layered image with only 2 layers
|
2020-01-30 09:42:13 +00:00
|
|
|
two-layered-image = pkgs.dockerTools.buildLayeredImage {
|
|
|
|
name = "two-layered-image";
|
|
|
|
tag = "latest";
|
|
|
|
config.Cmd = [ "${pkgs.hello}/bin/hello" ];
|
|
|
|
contents = [ pkgs.bash pkgs.hello ];
|
|
|
|
maxLayers = 2;
|
|
|
|
};
|
2020-01-29 21:56:05 +00:00
|
|
|
|
2021-03-08 20:36:13 +00:00
|
|
|
# 18. Create a layered image with more packages than max layers.
|
2020-01-30 21:35:16 +00:00
|
|
|
# coreutils and hello are part of the same layer
|
|
|
|
bulk-layer = pkgs.dockerTools.buildLayeredImage {
|
|
|
|
name = "bulk-layer";
|
|
|
|
tag = "latest";
|
|
|
|
contents = with pkgs; [
|
|
|
|
coreutils hello
|
|
|
|
];
|
|
|
|
maxLayers = 2;
|
|
|
|
};
|
|
|
|
|
2021-03-08 20:36:13 +00:00
|
|
|
# 19. Create a layered image with a base image and more packages than max
|
|
|
|
# layers. coreutils and hello are part of the same layer
|
|
|
|
layered-bulk-layer = pkgs.dockerTools.buildLayeredImage {
|
|
|
|
name = "layered-bulk-layer";
|
|
|
|
tag = "latest";
|
|
|
|
fromImage = two-layered-image;
|
|
|
|
contents = with pkgs; [
|
|
|
|
coreutils hello
|
|
|
|
];
|
|
|
|
maxLayers = 4;
|
|
|
|
};
|
|
|
|
|
|
|
|
# 20. Create a "layered" image without nix store layers. This is not
|
2020-02-23 23:41:55 +00:00
|
|
|
# recommended, but can be useful for base images in rare cases.
|
|
|
|
no-store-paths = pkgs.dockerTools.buildLayeredImage {
|
|
|
|
name = "no-store-paths";
|
|
|
|
tag = "latest";
|
|
|
|
extraCommands = ''
|
|
|
|
# This removes sharing of busybox and is not recommended. We do this
|
|
|
|
# to make the example suitable as a test case with working binaries.
|
|
|
|
cp -r ${pkgs.pkgsStatic.busybox}/* .
|
2021-10-01 11:47:01 +00:00
|
|
|
|
|
|
|
# This is a "build" dependency that will not appear in the image
|
|
|
|
${pkgs.hello}/bin/hello
|
2020-02-23 23:41:55 +00:00
|
|
|
'';
|
|
|
|
};
|
2020-06-18 15:29:21 +00:00
|
|
|
|
|
|
|
nixLayered = pkgs.dockerTools.buildLayeredImageWithNixDb {
|
|
|
|
name = "nix-layered";
|
|
|
|
tag = "latest";
|
|
|
|
contents = [
|
|
|
|
# nix-store uses cat program to display results as specified by
|
|
|
|
# the image env variable NIX_PAGER.
|
|
|
|
pkgs.coreutils
|
|
|
|
pkgs.nix
|
|
|
|
pkgs.bash
|
|
|
|
];
|
|
|
|
config = {
|
|
|
|
Env = [
|
|
|
|
"NIX_PAGER=cat"
|
|
|
|
# A user is required by nix
|
|
|
|
# https://github.com/NixOS/nix/blob/9348f9291e5d9e4ba3c4347ea1b235640f54fd79/src/libutil/util.cc#L478
|
|
|
|
"USER=nobody"
|
|
|
|
];
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2021-03-08 20:36:13 +00:00
|
|
|
# 21. Support files in the store on buildLayeredImage
|
2020-07-04 10:00:57 +00:00
|
|
|
# See: https://github.com/NixOS/nixpkgs/pull/91084#issuecomment-653496223
|
2020-07-06 04:59:58 +00:00
|
|
|
filesInStore = pkgs.dockerTools.buildLayeredImageWithNixDb {
|
2020-07-04 10:00:57 +00:00
|
|
|
name = "file-in-store";
|
|
|
|
tag = "latest";
|
2020-07-06 04:59:58 +00:00
|
|
|
contents = [
|
|
|
|
pkgs.coreutils
|
|
|
|
pkgs.nix
|
|
|
|
(pkgs.writeScriptBin "myscript" ''
|
|
|
|
#!${pkgs.runtimeShell}
|
|
|
|
cat ${pkgs.writeText "somefile" "some data"}
|
|
|
|
'')
|
2020-07-04 10:00:57 +00:00
|
|
|
];
|
2020-07-06 04:59:58 +00:00
|
|
|
config = {
|
|
|
|
Cmd = [ "myscript" ];
|
|
|
|
# For some reason 'nix-store --verify' requires this environment variable
|
|
|
|
Env = [ "USER=root" ];
|
|
|
|
};
|
2020-07-04 10:00:57 +00:00
|
|
|
};
|
2020-07-09 07:34:18 +00:00
|
|
|
|
2021-03-08 20:36:13 +00:00
|
|
|
# 22. Ensure that setting created to now results in a date which
|
2020-07-09 07:34:18 +00:00
|
|
|
# isn't the epoch + 1 for layered images.
|
|
|
|
unstableDateLayered = pkgs.dockerTools.buildLayeredImage {
|
|
|
|
name = "unstable-date-layered";
|
|
|
|
tag = "latest";
|
|
|
|
contents = [ pkgs.coreutils ];
|
|
|
|
created = "now";
|
|
|
|
};
|
|
|
|
|
2021-12-18 01:26:53 +00:00
|
|
|
# 23. Ensure that layers are unpacked in the correct order before the
|
|
|
|
# runAsRoot script is executed.
|
|
|
|
layersUnpackOrder =
|
|
|
|
let
|
|
|
|
layerOnTopOf = parent: layerName:
|
|
|
|
pkgs.dockerTools.buildImage {
|
|
|
|
name = "layers-unpack-order-${layerName}";
|
|
|
|
tag = "latest";
|
|
|
|
fromImage = parent;
|
|
|
|
contents = [ pkgs.coreutils ];
|
|
|
|
runAsRoot = ''
|
|
|
|
#!${pkgs.runtimeShell}
|
|
|
|
echo -n "${layerName}" >> /layer-order
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
# When executing the runAsRoot script when building layer C, if layer B is
|
|
|
|
# not unpacked on top of layer A, the contents of /layer-order will not be
|
|
|
|
# "ABC".
|
|
|
|
layerA = layerOnTopOf null "a";
|
|
|
|
layerB = layerOnTopOf layerA "b";
|
|
|
|
layerC = layerOnTopOf layerB "c";
|
|
|
|
in layerC;
|
|
|
|
|
2020-07-11 13:51:58 +00:00
|
|
|
# buildImage without explicit tag
|
|
|
|
bashNoTag = pkgs.dockerTools.buildImage {
|
|
|
|
name = "bash-no-tag";
|
|
|
|
contents = pkgs.bashInteractive;
|
|
|
|
};
|
|
|
|
|
|
|
|
# buildLayeredImage without explicit tag
|
|
|
|
bashNoTagLayered = pkgs.dockerTools.buildLayeredImage {
|
|
|
|
name = "bash-no-tag-layered";
|
|
|
|
contents = pkgs.bashInteractive;
|
|
|
|
};
|
|
|
|
|
|
|
|
# buildImage without explicit tag
|
|
|
|
bashNoTagStreamLayered = pkgs.dockerTools.streamLayeredImage {
|
|
|
|
name = "bash-no-tag-stream-layered";
|
|
|
|
contents = pkgs.bashInteractive;
|
|
|
|
};
|
|
|
|
|
2020-07-30 15:18:41 +00:00
|
|
|
# buildLayeredImage with non-root user
|
|
|
|
bashLayeredWithUser =
|
|
|
|
let
|
|
|
|
nonRootShadowSetup = { user, uid, gid ? uid }: with pkgs; [
|
|
|
|
(
|
|
|
|
writeTextDir "etc/shadow" ''
|
|
|
|
root:!x:::::::
|
|
|
|
${user}:!:::::::
|
|
|
|
''
|
|
|
|
)
|
|
|
|
(
|
|
|
|
writeTextDir "etc/passwd" ''
|
|
|
|
root:x:0:0::/root:${runtimeShell}
|
|
|
|
${user}:x:${toString uid}:${toString gid}::/home/${user}:
|
|
|
|
''
|
|
|
|
)
|
|
|
|
(
|
|
|
|
writeTextDir "etc/group" ''
|
|
|
|
root:x:0:
|
|
|
|
${user}:x:${toString gid}:
|
|
|
|
''
|
|
|
|
)
|
|
|
|
(
|
|
|
|
writeTextDir "etc/gshadow" ''
|
|
|
|
root:x::
|
|
|
|
${user}:x::
|
|
|
|
''
|
|
|
|
)
|
|
|
|
];
|
|
|
|
in
|
|
|
|
pkgs.dockerTools.buildLayeredImage {
|
|
|
|
name = "bash-layered-with-user";
|
|
|
|
tag = "latest";
|
2020-08-14 09:06:00 +00:00
|
|
|
contents = [ pkgs.bash pkgs.coreutils ] ++ nonRootShadowSetup { uid = 999; user = "somebody"; };
|
2020-07-30 15:18:41 +00:00
|
|
|
};
|
|
|
|
|
2020-11-19 16:31:38 +00:00
|
|
|
# basic example, with cross compilation
|
2020-11-20 10:57:56 +00:00
|
|
|
cross = let
|
|
|
|
# Cross compile for x86_64 if on aarch64
|
|
|
|
crossPkgs =
|
|
|
|
if pkgs.system == "aarch64-linux" then pkgsCross.gnu64
|
|
|
|
else pkgsCross.aarch64-multiplatform;
|
|
|
|
in crossPkgs.dockerTools.buildImage {
|
2020-11-19 16:31:38 +00:00
|
|
|
name = "hello-cross";
|
|
|
|
tag = "latest";
|
2020-11-20 10:57:56 +00:00
|
|
|
contents = crossPkgs.hello;
|
2020-11-19 16:31:38 +00:00
|
|
|
};
|
|
|
|
|
2021-01-04 20:33:32 +00:00
|
|
|
# layered image where a store path is itself a symlink
|
|
|
|
layeredStoreSymlink =
|
|
|
|
let
|
|
|
|
target = pkgs.writeTextDir "dir/target" "Content doesn't matter.";
|
2021-08-15 15:12:23 +00:00
|
|
|
symlink = pkgs.runCommand "symlink" {} "ln -s ${target} $out";
|
2021-01-04 20:33:32 +00:00
|
|
|
in
|
|
|
|
pkgs.dockerTools.buildLayeredImage {
|
|
|
|
name = "layeredstoresymlink";
|
|
|
|
tag = "latest";
|
|
|
|
contents = [ pkgs.bash symlink ];
|
|
|
|
} // { passthru = { inherit symlink; }; };
|
2021-03-09 18:32:54 +00:00
|
|
|
|
|
|
|
# image with registry/ prefix
|
|
|
|
prefixedImage = pkgs.dockerTools.buildImage {
|
|
|
|
name = "registry-1.docker.io/image";
|
|
|
|
tag = "latest";
|
|
|
|
config.Cmd = [ "${pkgs.hello}/bin/hello" ];
|
|
|
|
};
|
|
|
|
|
|
|
|
# layered image with registry/ prefix
|
|
|
|
prefixedLayeredImage = pkgs.dockerTools.buildLayeredImage {
|
|
|
|
name = "registry-1.docker.io/layered-image";
|
|
|
|
tag = "latest";
|
|
|
|
config.Cmd = [ "${pkgs.hello}/bin/hello" ];
|
|
|
|
};
|
2021-04-07 09:11:02 +00:00
|
|
|
|
|
|
|
# layered image with files owned by a user other than root
|
|
|
|
layeredImageWithFakeRootCommands = pkgs.dockerTools.buildLayeredImage {
|
|
|
|
name = "layered-image-with-fake-root-commands";
|
|
|
|
tag = "latest";
|
|
|
|
contents = [
|
|
|
|
pkgs.pkgsStatic.busybox
|
|
|
|
];
|
|
|
|
fakeRootCommands = ''
|
|
|
|
mkdir -p ./home/jane
|
|
|
|
chown 1000 ./home/jane
|
2021-12-02 22:26:05 +00:00
|
|
|
ln -s ${pkgs.hello.overrideAttrs (o: {
|
|
|
|
# A unique `hello` to make sure that it isn't included via another mechanism by accident.
|
|
|
|
configureFlags = o.configureFlags or "" + " --program-prefix=layeredImageWithFakeRootCommands-";
|
|
|
|
doCheck = false;
|
|
|
|
})} ./hello
|
2021-04-07 09:11:02 +00:00
|
|
|
'';
|
|
|
|
};
|
2021-03-30 09:37:17 +00:00
|
|
|
|
|
|
|
# tarball consisting of both bash and redis images
|
|
|
|
mergedBashAndRedis = pkgs.dockerTools.mergeImages [
|
|
|
|
bash
|
|
|
|
redis
|
|
|
|
];
|
|
|
|
|
|
|
|
# tarball consisting of bash (without tag) and redis images
|
|
|
|
mergedBashNoTagAndRedis = pkgs.dockerTools.mergeImages [
|
|
|
|
bashNoTag
|
|
|
|
redis
|
|
|
|
];
|
|
|
|
|
|
|
|
# tarball consisting of bash and layered image with different owner of the
|
|
|
|
# /home/jane directory
|
|
|
|
mergedBashFakeRoot = pkgs.dockerTools.mergeImages [
|
|
|
|
bash
|
|
|
|
layeredImageWithFakeRootCommands
|
|
|
|
];
|
2021-05-25 13:04:45 +00:00
|
|
|
|
|
|
|
helloOnRoot = pkgs.dockerTools.streamLayeredImage {
|
|
|
|
name = "hello";
|
|
|
|
tag = "latest";
|
|
|
|
contents = [
|
|
|
|
(pkgs.buildEnv {
|
|
|
|
name = "hello-root";
|
|
|
|
paths = [ pkgs.hello ];
|
|
|
|
})
|
|
|
|
];
|
|
|
|
config.Cmd = [ "hello" ];
|
|
|
|
};
|
|
|
|
|
|
|
|
helloOnRootNoStore = pkgs.dockerTools.streamLayeredImage {
|
|
|
|
name = "hello";
|
|
|
|
tag = "latest";
|
|
|
|
contents = [
|
|
|
|
(pkgs.buildEnv {
|
|
|
|
name = "hello-root";
|
|
|
|
paths = [ pkgs.hello ];
|
|
|
|
})
|
|
|
|
];
|
|
|
|
config.Cmd = [ "hello" ];
|
|
|
|
includeStorePaths = false;
|
|
|
|
};
|
2021-05-08 11:49:39 +00:00
|
|
|
|
|
|
|
# Example export of the bash image
|
|
|
|
exportBash = pkgs.dockerTools.exportImage { fromImage = bash; };
|
2021-10-18 10:39:51 +00:00
|
|
|
|
2021-10-01 13:53:30 +00:00
|
|
|
imageViaFakeChroot = pkgs.dockerTools.streamLayeredImage {
|
|
|
|
name = "image-via-fake-chroot";
|
|
|
|
tag = "latest";
|
|
|
|
config.Cmd = [ "hello" ];
|
2021-12-04 13:17:56 +00:00
|
|
|
enableFakechroot = true;
|
2021-10-01 13:53:30 +00:00
|
|
|
# Crucially, instead of a relative path, this creates /bin, which is
|
|
|
|
# intercepted by fakechroot.
|
|
|
|
# This functionality is not available on darwin as of 2021.
|
|
|
|
fakeRootCommands = ''
|
|
|
|
mkdir /bin
|
|
|
|
ln -s ${pkgs.hello}/bin/hello /bin/hello
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2021-10-18 10:39:51 +00:00
|
|
|
build-image-with-path = buildImage {
|
|
|
|
name = "build-image-with-path";
|
|
|
|
tag = "latest";
|
|
|
|
contents = [ pkgs.bashInteractive ./test-dummy ];
|
|
|
|
};
|
|
|
|
|
|
|
|
layered-image-with-path = pkgs.dockerTools.streamLayeredImage {
|
|
|
|
name = "layered-image-with-path";
|
|
|
|
tag = "latest";
|
|
|
|
contents = [ pkgs.bashInteractive ./test-dummy ];
|
|
|
|
};
|
2016-10-03 17:07:33 +00:00
|
|
|
}
|