1# this test creates a simple GNU image with docker tools and sees if it executes
2
3import ./make-test-python.nix (
4 { pkgs, ... }:
5 let
6 # nixpkgs#214434: dockerTools.buildImage fails to unpack base images
7 # containing duplicate layers when those duplicate tarballs
8 # appear under the manifest's 'Layers'. Docker can generate images
9 # like this even though dockerTools does not.
10 repeatedLayerTestImage =
11 let
12 # Rootfs diffs for layers 1 and 2 are identical (and empty)
13 layer1 = pkgs.dockerTools.buildImage { name = "empty"; };
14 layer2 = layer1.overrideAttrs (_: {
15 fromImage = layer1;
16 });
17 repeatedRootfsDiffs =
18 pkgs.runCommand "image-with-links.tar"
19 {
20 nativeBuildInputs = [ pkgs.jq ];
21 }
22 ''
23 mkdir contents
24 tar -xf "${layer2}" -C contents
25 cd contents
26 first_rootfs=$(jq -r '.[0].Layers[0]' manifest.json)
27 second_rootfs=$(jq -r '.[0].Layers[1]' manifest.json)
28 target_rootfs=$(sha256sum "$first_rootfs" | cut -d' ' -f 1).tar
29
30 # Replace duplicated rootfs diffs with symlinks to one tarball
31 chmod -R ug+w .
32 mv "$first_rootfs" "$target_rootfs"
33 rm "$second_rootfs"
34 ln -s "../$target_rootfs" "$first_rootfs"
35 ln -s "../$target_rootfs" "$second_rootfs"
36
37 # Update manifest's layers to use the symlinks' target
38 cat manifest.json | \
39 jq ".[0].Layers[0] = \"$target_rootfs\"" |
40 jq ".[0].Layers[1] = \"$target_rootfs\"" > manifest.json.new
41 mv manifest.json.new manifest.json
42
43 tar --sort=name --hard-dereference -cf $out .
44 '';
45 in
46 pkgs.dockerTools.buildImage {
47 fromImage = repeatedRootfsDiffs;
48 name = "repeated-layer-test";
49 tag = "latest";
50 copyToRoot = pkgs.bash;
51 # A runAsRoot script is required to force previous layers to be unpacked
52 runAsRoot = ''
53 echo 'runAsRoot has run.'
54 '';
55 };
56
57 chownTestImage = pkgs.dockerTools.streamLayeredImage {
58 name = "chown-test";
59 tag = "latest";
60 enableFakechroot = true;
61 fakeRootCommands = ''
62 touch /testfile
63 chown 12345:12345 /testfile
64 '';
65 config.Cmd = [
66 "${pkgs.coreutils}/bin/stat"
67 "-c"
68 "%u:%g"
69 "/testfile"
70 ];
71 };
72
73 nonRootTestImage = pkgs.dockerTools.streamLayeredImage {
74 name = "non-root-test";
75 tag = "latest";
76 uid = 1000;
77 gid = 1000;
78 uname = "user";
79 gname = "user";
80 config = {
81 User = "user";
82 Cmd = [
83 "${pkgs.coreutils}/bin/stat"
84 "-c"
85 "%u:%g"
86 "${pkgs.coreutils}/bin/stat"
87 ];
88 };
89 };
90 in
91 {
92 name = "docker-tools";
93 meta = with pkgs.lib.maintainers; {
94 maintainers = [
95 lnl7
96 roberth
97 ];
98 };
99
100 nodes = {
101 docker =
102 { ... }:
103 {
104 virtualisation = {
105 diskSize = 3072;
106 docker.enable = true;
107 };
108 };
109 };
110
111 testScript = with pkgs.dockerTools; ''
112 unix_time_second1 = "1970-01-01T00:00:01Z"
113
114 docker.wait_for_unit("sockets.target")
115
116 with subtest("includeStorePath"):
117 with subtest("assumption"):
118 docker.succeed("${examples.helloOnRoot} | docker load")
119 docker.succeed("docker run --rm hello | grep -i hello")
120 docker.succeed("docker image rm hello:latest")
121
122 with subtest("includeStorePath = false; breaks example"):
123 docker.succeed("${examples.helloOnRootNoStore} | docker load")
124 docker.fail("docker run --rm hello | grep -i hello")
125 docker.succeed("docker image rm hello:latest")
126 with subtest("includeStorePath = false; breaks example (fakechroot)"):
127 docker.succeed("${examples.helloOnRootNoStoreFakechroot} | docker load")
128 docker.fail("docker run --rm hello | grep -i hello")
129 docker.succeed("docker image rm hello:latest")
130
131 with subtest("Ensure ZERO paths are added to the store"):
132 docker.fail("${examples.helloOnRootNoStore} | ${pkgs.crane}/bin/crane export - - | tar t | grep 'nix/store/'")
133 with subtest("Ensure ZERO paths are added to the store (fakechroot)"):
134 docker.fail("${examples.helloOnRootNoStoreFakechroot} | ${pkgs.crane}/bin/crane export - - | tar t | grep 'nix/store/'")
135
136 with subtest("includeStorePath = false; works with mounted store"):
137 docker.succeed("${examples.helloOnRootNoStore} | docker load")
138 docker.succeed("docker run --rm --volume ${builtins.storeDir}:${builtins.storeDir}:ro hello | grep -i hello")
139 docker.succeed("docker image rm hello:latest")
140 with subtest("includeStorePath = false; works with mounted store (fakechroot)"):
141 docker.succeed("${examples.helloOnRootNoStoreFakechroot} | docker load")
142 docker.succeed("docker run --rm --volume ${builtins.storeDir}:${builtins.storeDir}:ro hello | grep -i hello")
143 docker.succeed("docker image rm hello:latest")
144
145 with subtest("Ensure Docker images use a stable date by default"):
146 docker.succeed(
147 "docker load --input='${examples.bash}'"
148 )
149 assert unix_time_second1 in docker.succeed(
150 "docker inspect ${examples.bash.imageName} "
151 + "| ${pkgs.jq}/bin/jq -r .[].Created",
152 )
153
154 docker.succeed("docker run --rm ${examples.bash.imageName} bash --version")
155 # Check imageTag attribute matches image
156 docker.succeed("docker images --format '{{.Tag}}' | grep -F '${examples.bash.imageTag}'")
157 docker.succeed("docker rmi ${examples.bash.imageName}")
158
159 # The remaining combinations
160 with subtest("Ensure imageTag attribute matches image"):
161 docker.succeed(
162 "docker load --input='${examples.bashNoTag}'"
163 )
164 docker.succeed(
165 "docker images --format '{{.Tag}}' | grep -F '${examples.bashNoTag.imageTag}'"
166 )
167 docker.succeed("docker rmi ${examples.bashNoTag.imageName}:${examples.bashNoTag.imageTag}")
168
169 docker.succeed(
170 "docker load --input='${examples.bashNoTagLayered}'"
171 )
172 docker.succeed(
173 "docker images --format '{{.Tag}}' | grep -F '${examples.bashNoTagLayered.imageTag}'"
174 )
175 docker.succeed("docker rmi ${examples.bashNoTagLayered.imageName}:${examples.bashNoTagLayered.imageTag}")
176
177 docker.succeed(
178 "${examples.bashNoTagStreamLayered} | docker load"
179 )
180 docker.succeed(
181 "docker images --format '{{.Tag}}' | grep -F '${examples.bashNoTagStreamLayered.imageTag}'"
182 )
183 docker.succeed(
184 "docker rmi ${examples.bashNoTagStreamLayered.imageName}:${examples.bashNoTagStreamLayered.imageTag}"
185 )
186
187 docker.succeed(
188 "docker load --input='${examples.nixLayered}'"
189 )
190 docker.succeed("docker images --format '{{.Tag}}' | grep -F '${examples.nixLayered.imageTag}'")
191 docker.succeed("docker rmi ${examples.nixLayered.imageName}")
192
193 with subtest("Check that images with alternative compression schemas load"):
194 docker.succeed(
195 "docker load --input='${examples.bashZstdCompressed}'",
196 "docker rmi ${examples.bashZstdCompressed.imageName}",
197 )
198 docker.succeed(
199 "docker load --input='${examples.bashUncompressed}'",
200 "docker rmi ${examples.bashUncompressed.imageName}",
201 )
202 docker.succeed(
203 "docker load --input='${examples.bashLayeredUncompressed}'",
204 "docker rmi ${examples.bashLayeredUncompressed.imageName}",
205 )
206 docker.succeed(
207 "docker load --input='${examples.bashLayeredZstdCompressed}'",
208 "docker rmi ${examples.bashLayeredZstdCompressed.imageName}",
209 )
210
211 with subtest(
212 "Check if the nix store is correctly initialized by listing "
213 "dependencies of the installed Nix binary"
214 ):
215 docker.succeed(
216 "docker load --input='${examples.nix}'",
217 "docker run --rm ${examples.nix.imageName} nix-store -qR ${pkgs.nix}",
218 "docker rmi ${examples.nix.imageName}",
219 )
220
221 with subtest(
222 "Ensure (layered) nix store has correct permissions "
223 "and that the container starts when its process does not have uid 0"
224 ):
225 docker.succeed(
226 "docker load --input='${examples.bashLayeredWithUser}'",
227 "docker run -u somebody --rm ${examples.bashLayeredWithUser.imageName} ${pkgs.bash}/bin/bash -c 'test 755 == $(stat --format=%a /nix) && test 755 == $(stat --format=%a /nix/store)'",
228 "docker rmi ${examples.bashLayeredWithUser.imageName}",
229 )
230
231 with subtest("The nix binary symlinks are intact"):
232 docker.succeed(
233 "docker load --input='${examples.nix}'",
234 "docker run --rm ${examples.nix.imageName} ${pkgs.bash}/bin/bash -c 'test nix == $(readlink ${pkgs.nix}/bin/nix-daemon)'",
235 "docker rmi ${examples.nix.imageName}",
236 )
237
238 with subtest("The nix binary symlinks are intact when the image is layered"):
239 docker.succeed(
240 "docker load --input='${examples.nixLayered}'",
241 "docker run --rm ${examples.nixLayered.imageName} ${pkgs.bash}/bin/bash -c 'test nix == $(readlink ${pkgs.nix}/bin/nix-daemon)'",
242 "docker rmi ${examples.nixLayered.imageName}",
243 )
244
245 with subtest("The pullImage tool works"):
246 docker.succeed(
247 "docker load --input='${examples.testNixFromDockerHub}'",
248 "docker run --rm nix:2.2.1 nix-store --version",
249 "docker rmi nix:2.2.1",
250 )
251
252 with subtest("runAsRoot and entry point work"):
253 docker.succeed(
254 "docker load --input='${examples.nginx}'",
255 "docker run --name nginx -d -p 8000:80 ${examples.nginx.imageName}",
256 )
257 docker.wait_until_succeeds("curl -f http://localhost:8000/")
258 docker.succeed(
259 "docker rm --force nginx",
260 "docker rmi '${examples.nginx.imageName}'",
261 )
262
263 with subtest("A pulled image can be used as base image"):
264 docker.succeed(
265 "docker load --input='${examples.onTopOfPulledImage}'",
266 "docker run --rm ontopofpulledimage hello",
267 "docker rmi ontopofpulledimage",
268 )
269
270 with subtest("Regression test for issue #34779"):
271 docker.succeed(
272 "docker load --input='${examples.runAsRootExtraCommands}'",
273 "docker run --rm runasrootextracommands cat extraCommands",
274 "docker run --rm runasrootextracommands cat runAsRoot",
275 "docker rmi '${examples.runAsRootExtraCommands.imageName}'",
276 )
277
278 with subtest("Ensure Docker images can use an unstable date"):
279 docker.succeed(
280 "docker load --input='${examples.unstableDate}'"
281 )
282 assert unix_time_second1 not in docker.succeed(
283 "docker inspect ${examples.unstableDate.imageName} "
284 + "| ${pkgs.jq}/bin/jq -r .[].Created"
285 )
286
287 with subtest("Ensure Layered Docker images can use an unstable date"):
288 docker.succeed(
289 "docker load --input='${examples.unstableDateLayered}'"
290 )
291 assert unix_time_second1 not in docker.succeed(
292 "docker inspect ${examples.unstableDateLayered.imageName} "
293 + "| ${pkgs.jq}/bin/jq -r .[].Created"
294 )
295
296 with subtest("Ensure Layered Docker images work"):
297 docker.succeed(
298 "docker load --input='${examples.layered-image}'",
299 "docker run --rm ${examples.layered-image.imageName}",
300 "docker run --rm ${examples.layered-image.imageName} cat extraCommands",
301 )
302
303 with subtest("Ensure images built on top of layered Docker images work"):
304 docker.succeed(
305 "docker load --input='${examples.layered-on-top}'",
306 "docker run --rm ${examples.layered-on-top.imageName}",
307 )
308
309 with subtest("Ensure layered images built on top of layered Docker images work"):
310 docker.succeed(
311 "docker load --input='${examples.layered-on-top-layered}'",
312 "docker run --rm ${examples.layered-on-top-layered.imageName}",
313 )
314
315
316 def set_of_layers(image_name):
317 return set(
318 docker.succeed(
319 f"docker inspect {image_name} "
320 + "| ${pkgs.jq}/bin/jq -r '.[] | .RootFS.Layers | .[]'"
321 ).split()
322 )
323
324
325 with subtest("Ensure layers are shared between images"):
326 docker.succeed(
327 "docker load --input='${examples.another-layered-image}'"
328 )
329 layers1 = set_of_layers("${examples.layered-image.imageName}")
330 layers2 = set_of_layers("${examples.another-layered-image.imageName}")
331 assert bool(layers1 & layers2)
332
333 with subtest("Ensure order of layers is correct"):
334 docker.succeed(
335 "docker load --input='${examples.layersOrder}'"
336 )
337
338 for index in 1, 2, 3:
339 assert f"layer{index}" in docker.succeed(
340 f"docker run --rm ${examples.layersOrder.imageName} cat /tmp/layer{index}"
341 )
342
343 with subtest("Ensure layers unpacked in correct order before runAsRoot runs"):
344 assert "abc" in docker.succeed(
345 "docker load --input='${examples.layersUnpackOrder}'",
346 "docker run --rm ${examples.layersUnpackOrder.imageName} cat /layer-order"
347 )
348
349 with subtest("Ensure repeated base layers handled by buildImage"):
350 docker.succeed(
351 "docker load --input='${repeatedLayerTestImage}'",
352 "docker run --rm ${repeatedLayerTestImage.imageName} /bin/bash -c 'exit 0'"
353 )
354
355 with subtest("Ensure environment variables are correctly inherited"):
356 docker.succeed(
357 "docker load --input='${examples.environmentVariables}'"
358 )
359 out = docker.succeed("docker run --rm ${examples.environmentVariables.imageName} env")
360 env = out.splitlines()
361 assert "FROM_PARENT=true" in env, "envvars from the parent should be preserved"
362 assert "FROM_CHILD=true" in env, "envvars from the child should be preserved"
363 assert "LAST_LAYER=child" in env, "envvars from the child should take priority"
364
365 with subtest("Ensure environment variables of layered images are correctly inherited"):
366 docker.succeed(
367 "docker load --input='${examples.environmentVariablesLayered}'"
368 )
369 out = docker.succeed("docker run --rm ${examples.environmentVariablesLayered.imageName} env")
370 env = out.splitlines()
371 assert "FROM_PARENT=true" in env, "envvars from the parent should be preserved"
372 assert "FROM_CHILD=true" in env, "envvars from the child should be preserved"
373 assert "LAST_LAYER=child" in env, "envvars from the child should take priority"
374
375 with subtest(
376 "Ensure inherited environment variables of layered images are correctly resolved"
377 ):
378 # Read environment variables as stored in image config
379 config = docker.succeed(
380 "tar -xOf ${examples.environmentVariablesLayered} manifest.json | ${pkgs.jq}/bin/jq -r .[].Config"
381 ).strip()
382 out = docker.succeed(
383 f"tar -xOf ${examples.environmentVariablesLayered} {config} | ${pkgs.jq}/bin/jq -r '.config.Env | .[]'"
384 )
385 env = out.splitlines()
386 assert (
387 sum(entry.startswith("LAST_LAYER") for entry in env) == 1
388 ), "envvars overridden by child should be unique"
389
390 with subtest("Ensure image with only 2 layers can be loaded"):
391 docker.succeed(
392 "docker load --input='${examples.two-layered-image}'"
393 )
394
395 with subtest(
396 "Ensure the bulk layer doesn't miss store paths (regression test for #78744)"
397 ):
398 docker.succeed(
399 "docker load --input='${pkgs.dockerTools.examples.bulk-layer}'",
400 # Ensure the two output paths (ls and hello) are in the layer
401 "docker run bulk-layer ls /bin/hello",
402 )
403
404 with subtest(
405 "Ensure the bulk layer with a base image respects the number of maxLayers"
406 ):
407 docker.succeed(
408 "docker load --input='${pkgs.dockerTools.examples.layered-bulk-layer}'",
409 # Ensure the image runs correctly
410 "docker run layered-bulk-layer ls /bin/hello",
411 )
412
413 # Ensure the image has the correct number of layers
414 assert len(set_of_layers("layered-bulk-layer")) == 4
415
416 with subtest("Ensure only minimal paths are added to the store"):
417 # TODO: make an example that has no store paths, for example by making
418 # busybox non-self-referential.
419
420 # This check tests that buildLayeredImage can build images that don't need a store.
421 docker.succeed(
422 "docker load --input='${pkgs.dockerTools.examples.no-store-paths}'"
423 )
424
425 docker.succeed("docker run --rm no-store-paths ls / >/dev/console")
426
427 # If busybox isn't self-referential, we need this line
428 # docker.fail("docker run --rm no-store-paths ls /nix/store >/dev/console")
429 # However, it currently is self-referential, so we check that it is the
430 # only store path.
431 docker.succeed("diff <(docker run --rm no-store-paths ls /nix/store) <(basename ${pkgs.pkgsStatic.busybox}) >/dev/console")
432
433 with subtest("Ensure buildLayeredImage does not change store path contents."):
434 docker.succeed(
435 "docker load --input='${pkgs.dockerTools.examples.filesInStore}'",
436 "docker run --rm file-in-store nix-store --verify --check-contents",
437 "docker run --rm file-in-store |& grep 'some data'",
438 )
439
440 with subtest("Ensure cross compiled image can be loaded and has correct arch."):
441 docker.succeed(
442 "docker load --input='${pkgs.dockerTools.examples.cross}'",
443 )
444 assert (
445 docker.succeed(
446 "docker inspect ${pkgs.dockerTools.examples.cross.imageName} "
447 + "| ${pkgs.jq}/bin/jq -r .[].Architecture"
448 ).strip()
449 == "${if pkgs.stdenv.hostPlatform.system == "aarch64-linux" then "amd64" else "arm64"}"
450 )
451
452 with subtest("buildLayeredImage doesn't dereference /nix/store symlink layers"):
453 docker.succeed(
454 "docker load --input='${examples.layeredStoreSymlink}'",
455 "docker run --rm ${examples.layeredStoreSymlink.imageName} bash -c 'test -L ${examples.layeredStoreSymlink.passthru.symlink}'",
456 "docker rmi ${examples.layeredStoreSymlink.imageName}",
457 )
458
459 with subtest("buildImage supports registry/ prefix in image name"):
460 docker.succeed(
461 "docker load --input='${examples.prefixedImage}'"
462 )
463 docker.succeed(
464 "docker images --format '{{.Repository}}' | grep -F '${examples.prefixedImage.imageName}'"
465 )
466
467 with subtest("buildLayeredImage supports registry/ prefix in image name"):
468 docker.succeed(
469 "docker load --input='${examples.prefixedLayeredImage}'"
470 )
471 docker.succeed(
472 "docker images --format '{{.Repository}}' | grep -F '${examples.prefixedLayeredImage.imageName}'"
473 )
474
475 with subtest("buildLayeredImage supports running chown with fakeRootCommands"):
476 docker.succeed(
477 "docker load --input='${examples.layeredImageWithFakeRootCommands}'"
478 )
479 docker.succeed(
480 "docker run --rm ${examples.layeredImageWithFakeRootCommands.imageName} sh -c 'stat -c '%u' /home/alice | grep -E ^1000$'"
481 )
482
483 with subtest("Ensure docker load on merged images loads all of the constituent images"):
484 docker.succeed(
485 "docker load --input='${examples.mergedBashAndRedis}'"
486 )
487 docker.succeed(
488 "docker images --format '{{.Repository}}-{{.Tag}}' | grep -F '${examples.bash.imageName}-${examples.bash.imageTag}'"
489 )
490 docker.succeed(
491 "docker images --format '{{.Repository}}-{{.Tag}}' | grep -F '${examples.redis.imageName}-${examples.redis.imageTag}'"
492 )
493 docker.succeed("docker run --rm ${examples.bash.imageName} bash --version")
494 docker.succeed("docker run --rm ${examples.redis.imageName} redis-cli --version")
495 docker.succeed("docker rmi ${examples.bash.imageName}")
496 docker.succeed("docker rmi ${examples.redis.imageName}")
497
498 with subtest(
499 "Ensure docker load on merged images loads all of the constituent images (missing tags)"
500 ):
501 docker.succeed(
502 "docker load --input='${examples.mergedBashNoTagAndRedis}'"
503 )
504 docker.succeed(
505 "docker images --format '{{.Repository}}-{{.Tag}}' | grep -F '${examples.bashNoTag.imageName}-${examples.bashNoTag.imageTag}'"
506 )
507 docker.succeed(
508 "docker images --format '{{.Repository}}-{{.Tag}}' | grep -F '${examples.redis.imageName}-${examples.redis.imageTag}'"
509 )
510 # we need to explicitly specify the generated tag here
511 docker.succeed(
512 "docker run --rm ${examples.bashNoTag.imageName}:${examples.bashNoTag.imageTag} bash --version"
513 )
514 docker.succeed("docker run --rm ${examples.redis.imageName} redis-cli --version")
515 docker.succeed("docker rmi ${examples.bashNoTag.imageName}:${examples.bashNoTag.imageTag}")
516 docker.succeed("docker rmi ${examples.redis.imageName}")
517
518 with subtest("mergeImages preserves owners of the original images"):
519 docker.succeed(
520 "docker load --input='${examples.mergedBashFakeRoot}'"
521 )
522 docker.succeed(
523 "docker run --rm ${examples.layeredImageWithFakeRootCommands.imageName} sh -c 'stat -c '%u' /home/alice | grep -E ^1000$'"
524 )
525
526 with subtest("The image contains store paths referenced by the fakeRootCommands output"):
527 docker.succeed(
528 "docker run --rm ${examples.layeredImageWithFakeRootCommands.imageName} /hello/bin/layeredImageWithFakeRootCommands-hello"
529 )
530
531 with subtest("mergeImage correctly deals with varying compression schemas in inputs"):
532 docker.succeed("docker load --input='${examples.mergeVaryingCompressor}'")
533
534 for sub_image, tag in [
535 ("${examples.redis.imageName}", "${examples.redis.imageTag}"),
536 ("${examples.bashUncompressed.imageName}", "${examples.bashUncompressed.imageTag}"),
537 ("${examples.bashZstdCompressed.imageName}", "${examples.bashZstdCompressed.imageTag}"),
538 ]:
539 docker.succeed(f"docker images --format '{{{{.Repository}}}}-{{{{.Tag}}}}' | grep -F '{sub_image}-{tag}'")
540 docker.succeed(f"docker rmi {sub_image}")
541
542
543 with subtest("exportImage produces a valid tarball"):
544 docker.succeed(
545 "tar -tf ${examples.exportBash} | grep '\./bin/bash' > /dev/null"
546 )
547
548 with subtest("layered image fakeRootCommands with fakechroot works"):
549 docker.succeed("${examples.imageViaFakeChroot} | docker load")
550 docker.succeed("docker run --rm image-via-fake-chroot | grep -i hello")
551 docker.succeed("docker image rm image-via-fake-chroot:latest")
552
553 with subtest("Ensure bare paths in contents are loaded correctly"):
554 docker.succeed(
555 "docker load --input='${examples.build-image-with-path}'",
556 "docker run --rm build-image-with-path bash -c '[[ -e /hello.txt ]]'",
557 "docker rmi build-image-with-path",
558 )
559 docker.succeed(
560 "${examples.layered-image-with-path} | docker load",
561 "docker run --rm layered-image-with-path bash -c '[[ -e /hello.txt ]]'",
562 "docker rmi layered-image-with-path",
563 )
564
565 with subtest("Ensure correct architecture is present in manifests."):
566 docker.succeed("""
567 docker load --input='${examples.build-image-with-architecture}'
568 docker inspect build-image-with-architecture \
569 | ${pkgs.jq}/bin/jq -er '.[] | select(.Architecture=="arm64").Architecture'
570 docker rmi build-image-with-architecture
571 """)
572 docker.succeed("""
573 ${examples.layered-image-with-architecture} | docker load
574 docker inspect layered-image-with-architecture \
575 | ${pkgs.jq}/bin/jq -er '.[] | select(.Architecture=="arm64").Architecture'
576 docker rmi layered-image-with-architecture
577 """)
578
579 with subtest("etc"):
580 docker.succeed("${examples.etc} | docker load")
581 docker.succeed("docker run --rm etc | grep localhost")
582 docker.succeed("docker image rm etc:latest")
583
584 with subtest("image-with-certs"):
585 docker.succeed("<${examples.image-with-certs} docker load")
586 docker.succeed("docker run --rm image-with-certs:latest test -r /etc/ssl/certs/ca-bundle.crt")
587 docker.succeed("docker run --rm image-with-certs:latest test -r /etc/ssl/certs/ca-certificates.crt")
588 docker.succeed("docker run --rm image-with-certs:latest test -r /etc/pki/tls/certs/ca-bundle.crt")
589 docker.succeed("docker image rm image-with-certs:latest")
590
591 with subtest("streamLayeredImage: chown is persistent in fakeRootCommands"):
592 docker.succeed(
593 "${chownTestImage} | docker load",
594 "docker run --rm ${chownTestImage.imageName} | diff /dev/stdin <(echo 12345:12345)"
595 )
596
597 with subtest("streamLayeredImage: with non-root user"):
598 docker.succeed(
599 "${nonRootTestImage} | docker load",
600 "docker run --rm ${chownTestImage.imageName} | diff /dev/stdin <(echo 12345:12345)"
601 )
602 '';
603 }
604)