Skip to content

Commit

Permalink
Use the same kaniko version everywhere (and update to latest)
Browse files Browse the repository at this point in the history
We were using different versions everywhere between the docs, tests, tasks and
pipelineruns.

Update it to latest version of kaniko at the same time.

Signed-off-by: Chmouel Boudjnah <[email protected]>
  • Loading branch information
chmouel authored and tekton-robot committed Jan 10, 2020
1 parent 2826423 commit c13b254
Show file tree
Hide file tree
Showing 7 changed files with 8 additions and 8 deletions.
4 changes: 2 additions & 2 deletions docs/taskruns.md
Original file line number Diff line number Diff line change
Expand Up @@ -89,7 +89,7 @@ spec:
type: git
steps:
- name: build-and-push
image: gcr.io/kaniko-project/executor:v0.9.0
image: gcr.io/kaniko-project/executor:v0.15.0
# specifying DOCKER_CONFIG is required to allow kaniko to detect docker credential
env:
- name: "DOCKER_CONFIG"
Expand Down Expand Up @@ -447,7 +447,7 @@ spec:
type: git
steps:
- name: build-and-push
image: gcr.io/kaniko-project/executor:v0.9.0
image: gcr.io/kaniko-project/executor:v0.15.0
# specifying DOCKER_CONFIG is required to allow kaniko to detect docker credential
env:
- name: "DOCKER_CONFIG"
Expand Down
2 changes: 1 addition & 1 deletion docs/tutorial.md
Original file line number Diff line number Diff line change
Expand Up @@ -178,7 +178,7 @@ spec:
type: image
steps:
- name: build-and-push
image: gcr.io/kaniko-project/executor:v0.14.0
image: gcr.io/kaniko-project/executor:v0.15.0
# specifying DOCKER_CONFIG is required to allow kaniko to detect docker credential
env:
- name: "DOCKER_CONFIG"
Expand Down
2 changes: 1 addition & 1 deletion examples/pipelineruns/pipelinerun.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -92,7 +92,7 @@ spec:
type: image
steps:
- name: build-and-push
image: gcr.io/kaniko-project/executor:v0.9.0
image: gcr.io/kaniko-project/executor:v0.15.0
# specifying DOCKER_CONFIG is required to allow kaniko to detect docker credential
env:
- name: "DOCKER_CONFIG"
Expand Down
2 changes: 1 addition & 1 deletion examples/taskruns/build-push-kaniko.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -43,7 +43,7 @@ spec:
type: image
steps:
- name: build-and-push
image: gcr.io/kaniko-project/executor:v0.13.0
image: gcr.io/kaniko-project/executor:v0.15.0
# specifying DOCKER_CONFIG is required to allow kaniko to detect docker credential
env:
- name: "DOCKER_CONFIG"
Expand Down
2 changes: 1 addition & 1 deletion tekton/publish.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -46,7 +46,7 @@ spec:
steps:

- name: build-push-base-images
image: gcr.io/kaniko-project/executor:v0.9.0
image: gcr.io/kaniko-project/executor:v0.15.0
command:
- /kaniko/executor
args:
Expand Down
2 changes: 1 addition & 1 deletion test/helm_task_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -157,7 +157,7 @@ func getCreateImageTask(namespace string) *v1alpha1.Task {
return tb.Task(createImageTaskName, namespace, tb.TaskSpec(
tb.TaskInputs(tb.InputsResource("gitsource", v1alpha1.PipelineResourceTypeGit)),
tb.TaskOutputs(tb.OutputsResource("builtimage", v1alpha1.PipelineResourceTypeImage)),
tb.Step("kaniko", "gcr.io/kaniko-project/executor:v0.9.0", tb.StepArgs(
tb.Step("kaniko", "gcr.io/kaniko-project/executor:v0.15.0", tb.StepArgs(
"--dockerfile=/workspace/gitsource/test/gohelloworld/Dockerfile",
"--context=/workspace/gitsource/",
"--destination=$(outputs.resources.builtimage.url)",
Expand Down
2 changes: 1 addition & 1 deletion test/kaniko_task_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -155,7 +155,7 @@ func getTask(repo, namespace string) *v1alpha1.Task {
),
tb.StepSecurityContext(&corev1.SecurityContext{RunAsUser: &root}),
}
step := tb.Step("kaniko", "gcr.io/kaniko-project/executor:v0.13.0", stepOps...)
step := tb.Step("kaniko", "gcr.io/kaniko-project/executor:v0.15.0", stepOps...)
taskSpecOps = append(taskSpecOps, step)
sidecar := tb.Sidecar("registry", "registry")
taskSpecOps = append(taskSpecOps, sidecar)
Expand Down

0 comments on commit c13b254

Please sign in to comment.