createHelmReleaseCmd.Flags().StringVar(&helmReleaseArgs.name,"release-name","","name used for the Helm release, defaults to a composition of '[<target-namespace>-]<HelmRelease-name>'")
createHelmReleaseCmd.Flags().StringVar(&helmReleaseArgs.name,"release-name","","name used for the Helm release, defaults to a composition of '[<target-namespace>-]<HelmRelease-name>'")
flags.StringVar(&imagePolicyArgs.numeric,"select-numeric","","use numeric sorting to select image; either \"asc\" meaning select the last, or \"desc\" meaning select the first")
flags.StringVar(&imagePolicyArgs.numeric,"select-numeric","","use numeric sorting to select image; either \"asc\" meaning select the last, or \"desc\" meaning select the first")
flags.StringVar(&imagePolicyArgs.filterRegex,"filter-regex","","regular expression pattern used to filter the image tags")
flags.StringVar(&imagePolicyArgs.filterRegex,"filter-regex","","regular expression pattern used to filter the image tags")
flags.StringVar(&imagePolicyArgs.filterExtract,"filter-extract","","replacement pattern (using capture groups from --filter-regex) to use for sorting")
flags.StringVar(&imagePolicyArgs.filterExtract,"filter-extract","","replacement pattern (using capture groups from --filter-regex) to use for sorting")
flags.StringVar(&imagePolicyArgs.reflectDigest,"reflect-digest","","the digest reflection policy to use when observing latest image tags (one of 'Never', 'IfNotPresent', 'Never')")
flags.DurationVar(&imagePolicyArgs.interval,"interval",0,"the interval at which to check for new image digests when the policy is set to 'Always'")
"when enabled, configures the GitRepository source to initialize and include Git submodules in the artifact it produces")
"when enabled, configures the GitRepository source to initialize and include Git submodules in the artifact it produces")
createSourceGitCmd.Flags().BoolVarP(&sourceGitArgs.silent,"silent","s",false,"assumes the deploy key is already setup, skips confirmation")
createSourceGitCmd.Flags().BoolVarP(&sourceGitArgs.silent,"silent","s",false,"assumes the deploy key is already setup, skips confirmation")
createSourceGitCmd.Flags().StringSliceVar(&sourceGitArgs.ignorePaths,"ignore-paths",nil,"set paths to ignore in git resource (can specify multiple paths with commas: path1,path2)")
createSourceGitCmd.Flags().StringSliceVar(&sourceGitArgs.ignorePaths,"ignore-paths",nil,"set paths to ignore in git resource (can specify multiple paths with commas: path1,path2)")
createSourceGitCmd.Flags().StringSliceVar(&sourceGitArgs.sparseCheckoutPaths,"sparse-checkout-paths",nil,"set paths to sparse checkout in git resource (can specify multiple paths with commas: path1,path2)")
diffArtifactCmd.Flags().StringVar(&diffArtifactArgs.creds,"creds","","credentials for OCI registry in the format <username>[:<password>] if --provider is generic")
diffArtifactCmd.Flags().StringVar(&diffArtifactArgs.creds,"creds","","credentials for OCI registry in the format <username>[:<password>] if --provider is generic")
listArtifactsCmd.Flags().StringVar(&listArtifactArgs.regexFilter,"filter-regex","","filter tags returned from the oci repository using regex")
listArtifactsCmd.Flags().StringVar(&listArtifactArgs.regexFilter,"filter-regex","","filter tags returned from the oci repository using regex")
listArtifactsCmd.Flags().StringVar(&listArtifactArgs.creds,"creds","","credentials for OCI registry in the format <username>[:<password>] if --provider is generic")
listArtifactsCmd.Flags().StringVar(&listArtifactArgs.creds,"creds","","credentials for OCI registry in the format <username>[:<password>] if --provider is generic")
@ -44,7 +43,6 @@ The command can read the credentials from '~/.docker/config.json' but they can a
typepullArtifactFlagsstruct{
typepullArtifactFlagsstruct{
outputstring
outputstring
credsstring
credsstring
insecurebool
providerflags.SourceOCIProvider
providerflags.SourceOCIProvider
}
}
@ -60,7 +58,6 @@ func init() {
pullArtifactCmd.Flags().StringVarP(&pullArtifactArgs.output,"output","o","","path where the artifact content should be extracted.")
pullArtifactCmd.Flags().StringVarP(&pullArtifactArgs.output,"output","o","","path where the artifact content should be extracted.")
pullArtifactCmd.Flags().StringVar(&pullArtifactArgs.creds,"creds","","credentials for OCI registry in the format <username>[:<password>] if --provider is generic")
pullArtifactCmd.Flags().StringVar(&pullArtifactArgs.creds,"creds","","credentials for OCI registry in the format <username>[:<password>] if --provider is generic")
@ -113,7 +115,6 @@ type pushArtifactFlags struct {
outputstring
outputstring
debugbool
debugbool
reproduciblebool
reproduciblebool
insecurebool
}
}
varpushArtifactArgs=newPushArtifactFlags()
varpushArtifactArgs=newPushArtifactFlags()
@ -136,7 +137,6 @@ func init() {
"the format in which the artifact digest should be printed, can be 'json' or 'yaml'")
"the format in which the artifact digest should be printed, can be 'json' or 'yaml'")
pushArtifactCmd.Flags().BoolVarP(&pushArtifactArgs.debug,"debug","",false,"display logs from underlying library")
pushArtifactCmd.Flags().BoolVarP(&pushArtifactArgs.debug,"debug","",false,"display logs from underlying library")
pushArtifactCmd.Flags().BoolVar(&pushArtifactArgs.reproducible,"reproducible",false,"ensure reproducible image digests by setting the created timestamp to '1970-01-01T00:00:00Z'")
pushArtifactCmd.Flags().BoolVar(&pushArtifactArgs.reproducible,"reproducible",false,"ensure reproducible image digests by setting the created timestamp to '1970-01-01T00:00:00Z'")
pushArtifactCmd.Flags().BoolVar(&pushArtifactArgs.insecure,"insecure-registry",false,"allows artifacts to be pushed without TLS")
podinfo-semver ghcr.io/stefanprodan/podinfo:5.0.3 True Latest image tag for ghcr.io/stefanprodan/podinfo resolved to 5.0.3 with digest sha256:8704da90172710d422af855049175c1a8295731cbe2ad3b9a1c1074feecf8c10
podinfo-semver ghcr.io/stefanprodan/podinfo:5.0.3 True Latest image tag for 'ghcr.io/stefanprodan/podinfo' resolved to 5.0.3
Some files were not shown because too many files have changed in this diff
Show More