Compare commits

...

4 Commits

Author SHA1 Message Date
Sangbum Kim 9f027901a1 fix cargo license part 2025-03-04 22:58:52 +09:00
Sangbum Kim af41359925 readme cleanup 2025-03-04 22:50:52 +09:00
Sangbum Kim 77f64e0218 apply crates version to v1.0.0 2025-03-04 22:44:52 +09:00
Sangbum Kim 992ca749f4 Merge branch 'develop' 2025-03-04 22:41:07 +09:00
2 changed files with 23 additions and 9 deletions

View File

@ -1,11 +1,21 @@
[package] [package]
name = "kwd" name = "kwd"
version = "0.1.1" version = "1.0.0"
edition = "2021" edition = "2021"
license = "MIT"
authors = ["Sangbum Kim <sangbumkim@amuz.es>"]
repository = "https://github.com/spi-ca/kwd"
include = [
"src/**/*",
"Cargo.toml",
"README.md",
"LICENSE"
]
[dependencies] [dependencies]
regex-lite = "^0.1" regex-lite = "^0.1"
path-clean = "^1.0" path-clean = "^1.0"
[profile.release] [profile.release]
lto = true # Enable Link Time Optimization lto = true # Enable Link Time Optimization
codegen-units = 1 # Reduce number of codegen units to increase optimizations. codegen-units = 1 # Reduce number of codegen units to increase optimizations.

View File

@ -1,17 +1,21 @@
# kwd [![Crates.io][crates-badge]][crates-url] [![hub.docker.com][docker-badge]][docker-url] [![MIT licensed][mit-badge]][mit-url] # kwd [![Crates.io][crates-badge]][crates-url] [![hub.docker.com][docker-badge]][docker-url] [![MIT licensed][mit-badge]][mit-url]
[crates-badge]: https://img.shields.io/crates/v/kwd.svg [crates-badge]: https://img.shields.io/crates/v/kwd.svg
[crates-url]: https://crates.io/crates/kwd [crates-url]: https://crates.io/crates/kwd
[mit-badge]: https://img.shields.io/badge/license-MIT-blue.svg [mit-badge]: https://img.shields.io/badge/license-MIT-blue.svg
[mit-url]: https://github.com/spi-ca/kwd/blob/main/LICENSE [mit-url]: https://github.com/spi-ca/kwd/blob/main/LICENSE
[docker-badge]: https://img.shields.io/docker/v/sangbumkim/kwd [docker-badge]: https://img.shields.io/docker/v/sangbumkim/kwd
[docker-url]: https://hub.docker.com/r/sangbumkim/kwd [docker-url]: https://hub.docker.com/r/sangbumkim/kwd
## Description ## Description
This is a tool that performs destination tasks when attaching multiple tags to a single kaniko image build. This is a tool that performs destination tasks when attaching multiple tags to a single kaniko image build.
## Configuration ## Configuration
kwd is basically a binary wrapper for kaniko. kwd is basically a binary wrapper for kaniko.
@ -19,10 +23,10 @@ kwd is basically a binary wrapper for kaniko.
When running kwd, it reads the environment variables specified below and passes the corresponding arguments to kaniko. When running kwd, it reads the environment variables specified below and passes the corresponding arguments to kaniko.
If execution arguments are given to kwd, these are passed transparently to the kaniko process. If execution arguments are given to kwd, these are passed transparently to the kaniko process.
| Environment variables | Default Value | Description | | Environment variables | Required | Default Value | Description |
|------------------------------------|----------------------------------| ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | |---------------------------|----------|--------------------|---------------------------------------------------------------------------------------------------------------|
| `KANIKO_BIN` | `/kaniko/executor` | Specifies the path to `kaniko` binary. By default, the path used by `gcr.io/kaniko-project/executor` is used. | | `KANIKO_BIN` | no | `/kaniko/executor` | Specifies the path to `kaniko` binary. By default, the path used by `gcr.io/kaniko-project/executor` is used. |
| `KANIKO_IMAGE_REPOSITORY` | | Enable TLS or not. Delete the `ssl-redirect` annotations in `expose.ingress.annotations` when TLS is disabled and `expose.type` is `ingress`. Note: if the `expose.type` is `ingress` and TLS is disabled, the port must be included in the command when pulling/pushing images. Refer to https://github.com/goharbor/harbor/issues/5291 for details. | | `KANIKO_IMAGE_REPOSITORY` | yes | | Indicates the repository prefix to be used for Docker image push. e.g. `gcr.io/google-containers` |
| `KANIKO_IMAGE_NAME` | | The source of the TLS certificate. Set as `auto`, `secret` or `none` and fill the information in the corresponding section: 1) auto: generate the TLS certificate automatically 2) secret: read the TLS certificate from the specified secret. The TLS certificate can be generated manually or by cert manager 3) none: configure no TLS certificate for the ingress. If the default TLS certificate is configured in the ingress controller, choose this option| | `KANIKO_IMAGE_NAME` | yes | | Indicates the repository name to be used for Docker image push. e.g. `pause` |
| `KANIKO_IMAGE_TAGS` | | The common name used to generate the certificate, it's necessary when the type isn't `ingress` | | `KANIKO_IMAGE_TAGS` | yes | | Specifies a comma-separated list of container image tags. e.g. `latest,v1.0.0,v1.0.0-1` |