We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Spun out of #132 (comment)
Right now we add cacert and iana-etc from nixpkgs into every image (see builder/builder.go).
cacert
iana-etc
builder/builder.go
We sometimes add a /usr/bin/env symlink (if coreutils is part of the container), should will become available in nixpkgs as dockerTools.usrBinEnv.
/usr/bin/env
coreutils
dockerTools.usrBinEnv
Maybe we also should add dockerTools.{binSh,fakeNss} too, to add /bin/sh, and workaround some annoying nss-related problems.
/bin/sh
Related, we might want to set the SSL_CERT_FILE environment variable to pkgs.cacert.out}/etc/ssl/certs/ca-bundle.crt to fix #101.
SSL_CERT_FILE
pkgs.cacert.out}/etc/ssl/certs/ca-bundle.crt
Once we agree on this, we should document all this, so people know what they can expect from these containers.
The text was updated successfully, but these errors were encountered:
No branches or pull requests
Spun out of #132 (comment)
Right now we add
cacert
andiana-etc
from nixpkgs into every image (seebuilder/builder.go
).We sometimes add a
/usr/bin/env
symlink (ifcoreutils
is part of the container), should will become available in nixpkgs asdockerTools.usrBinEnv
.Maybe we also should add dockerTools.{binSh,fakeNss} too, to add
/bin/sh
, and workaround some annoying nss-related problems.Related, we might want to set the
SSL_CERT_FILE
environment variable topkgs.cacert.out}/etc/ssl/certs/ca-bundle.crt
to fix #101.Once we agree on this, we should document all this, so people know what they can expect from these containers.
The text was updated successfully, but these errors were encountered: