Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update Kaniko to v1.5.2 #715

Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion docs/build.md
Original file line number Diff line number Diff line change
Expand Up @@ -302,7 +302,7 @@ Please consider the description of the attributes under `.spec.runtime`:
> Specifying the runtime section will cause a `BuildRun` to push `spec.output.image` twice. First, the image produced by chosen `BuildStrategy` is pushed, and next it gets reused to construct the runtime-image, which is pushed again, overwriting `BuildStrategy` outcome.
> Be aware, specially in situations where the image push action triggers automation steps. Since the same tag will be reused, you might need to take this in consideration when using runtime-images.

Under the cover, the runtime image will be an additional step in the generated Task spec of the TaskRun. It uses [Kaniko](https://github.com/GoogleContainerTools/kaniko) to run a container build using the `gcr.io/kaniko-project/executor:v1.5.1` image. You can overwrite this image by adding the environment variable `KANIKO_CONTAINER_IMAGE` to the [build controller deployment](../deploy/controller.yaml).
Under the cover, the runtime image will be an additional step in the generated Task spec of the TaskRun. It uses [Kaniko](https://github.com/GoogleContainerTools/kaniko) to run a container build using the `gcr.io/kaniko-project/executor:v1.5.2` image. You can overwrite this image by adding the environment variable `KANIKO_CONTAINER_IMAGE` to the [build controller deployment](../deploy/controller.yaml).

## BuildRun deletion

Expand Down
4 changes: 2 additions & 2 deletions docs/buildstrategies.md
Original file line number Diff line number Diff line change
Expand Up @@ -165,7 +165,7 @@ metadata:
spec:
buildSteps:
- name: build-and-push
image: gcr.io/kaniko-project/executor:v1.5.1
image: gcr.io/kaniko-project/executor:v1.5.2
workingDir: /workspace/source
securityContext:
runAsUser: 0
Expand Down Expand Up @@ -210,7 +210,7 @@ metadata:
spec:
buildSteps:
- name: build-and-push
image: gcr.io/kaniko-project/executor:v1.5.1
image: gcr.io/kaniko-project/executor:v1.5.2
workingDir: /workspace/source
securityContext:
runAsUser: 0
Expand Down
2 changes: 1 addition & 1 deletion docs/configuration.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ The following environment variables are available:
| Environment Variable | Description |
| --- | --- |
| `CTX_TIMEOUT` | Override the default context timeout used for all Custom Resource Definition reconciliation operations. |
| `KANIKO_CONTAINER_IMAGE` | Specify the Kaniko container image to be used for the runtime image build instead of the default, for example `gcr.io/kaniko-project/executor:v1.5.1`. |
| `KANIKO_CONTAINER_IMAGE` | Specify the Kaniko container image to be used for the runtime image build instead of the default, for example `gcr.io/kaniko-project/executor:v1.5.2`. |
| `BUILD_CONTROLLER_LEADER_ELECTION_NAMESPACE` | Set the namespace to be used to store the `shipwright-build-controller` lock, by default it is in the same namespace as the controller itself. |
| `BUILD_CONTROLLER_LEASE_DURATION` | Override the `LeaseDuration`, which is the duration that non-leader candidates will wait to force acquire leadership. |
| `BUILD_CONTROLLER_RENEW_DEADLINE` | Override the `RenewDeadline`, which is the duration that the acting leader will retry refreshing leadership before giving up. |
Expand Down
2 changes: 1 addition & 1 deletion pkg/config/config.go
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ const (
// E.g. if 5 seconds is wanted, the CTX_TIMEOUT=5
contextTimeoutEnvVar = "CTX_TIMEOUT"

kanikoDefaultImage = "gcr.io/kaniko-project/executor:v1.5.1"
kanikoDefaultImage = "gcr.io/kaniko-project/executor:v1.5.2"
kanikoImageEnvVar = "KANIKO_CONTAINER_IMAGE"

// environment variable to override the buckets
Expand Down
2 changes: 1 addition & 1 deletion samples/buildstrategy/kaniko/buildstrategy_kaniko_cr.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ metadata:
spec:
buildSteps:
- name: build-and-push
image: gcr.io/kaniko-project/executor:v1.5.1
image: gcr.io/kaniko-project/executor:v1.5.2
workingDir: /workspace/source
securityContext:
runAsUser: 0
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -30,7 +30,7 @@ spec:
env:
- name: DOCKER_CONFIG
value: /tekton/home/.docker
image: gcr.io/kaniko-project/executor:v1.5.1
image: gcr.io/kaniko-project/executor:v1.5.2
name: build-and-push
securityContext:
runAsUser: 0
Expand Down
6 changes: 3 additions & 3 deletions test/clusterbuildstrategy_samples.go
Original file line number Diff line number Diff line change
Expand Up @@ -123,7 +123,7 @@ metadata:
spec:
buildSteps:
- name: step-build-and-push
image: gcr.io/kaniko-project/executor:v1.5.1
image: gcr.io/kaniko-project/executor:v1.5.2
workingDir: /workspace/source
securityContext:
runAsUser: 0
Expand Down Expand Up @@ -173,7 +173,7 @@ metadata:
spec:
buildSteps:
- name: step-build-and-push
image: gcr.io/kaniko-project/executor:v1.5.1
image: gcr.io/kaniko-project/executor:v1.5.2
workingDir: /workspace/source
securityContext:
runAsUser: 0
Expand Down Expand Up @@ -288,7 +288,7 @@ metadata:
spec:
buildSteps:
- name: step-build-and-push
image: gcr.io/kaniko-project/executor:v1.5.1
image: gcr.io/kaniko-project/executor:v1.5.2
workingDir: /workspace/source
securityContext:
runAsUser: 0
Expand Down