Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Mutual tls #1

Open
wants to merge 139 commits into
base: mutual-tls
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
139 commits
Select commit Hold shift + click to select a range
421182c
build(deps): Bump github.com/go-logr/logr from 1.2.2 to 1.2.3
dependabot[bot] Mar 21, 2022
a55a9fb
build(deps): Bump k8s.io/apimachinery from 0.23.4 to 0.23.5
dependabot[bot] Mar 21, 2022
aa8f99e
build(deps): Bump k8s.io/klog/v2 from 2.40.1 to 2.60.1
dependabot[bot] Mar 21, 2022
4300301
Revert change of k8s-pkg-credentialprovider
joaopapereira Mar 28, 2022
4d20a39
Merge pull request #364 from vmware-tanzu/20210328-upgrade-dependencies
joaopapereira Mar 29, 2022
8b2764e
be able to add legible tags based on original repo name using flag
Mar 31, 2022
95a4797
Update linter version
joaopapereira Apr 1, 2022
4522bba
Merge pull request #370 from vmware-tanzu/correct-transport-for-mount…
joaopapereira Apr 4, 2022
aa85e17
update linter version
Apr 4, 2022
b055760
Merge pull request #369 from alexgaganashvili/add-legible-tags
joaopapereira Apr 4, 2022
7ba3765
Copy registry implementation from ggcr 0.7.0
joaopapereira Apr 5, 2022
72509f5
Change in ggcr to ensure blobs existance is validated with repo
joaopapereira Nov 5, 2021
b643a67
Update registry package to version 0.8.0 of ggcr
joaopapereira Apr 6, 2022
f98b548
Ensure the correct credentials are provided while mounting a blob
joaopapereira Apr 6, 2022
5c2a4a1
Performance test use local registry
joaopapereira Apr 7, 2022
b2c7c07
Set permission when pulling image (#366)
joaopapereira Apr 7, 2022
b819572
Merge pull request #372 from vmware-tanzu/correct-transport-for-mount…
cppforlife Apr 8, 2022
9248c77
Add a new struct builder for the SimpleRegistry (#363)
joaopapereira Apr 14, 2022
da2e490
Separate messages for Copy and Push options regarding lock output flag
vicmarbev Apr 20, 2022
b683748
Add comments to new functions
vicmarbev Apr 22, 2022
90cbdb9
Change the permissions of the created folder to pull images (#376)
joaopapereira Apr 25, 2022
68ebc6e
Merge pull request #377 from vicmarbev/fix-push-copy-lockoutputflag
joaopapereira Apr 28, 2022
8e2a01d
Bump go-cli-ui to newer version
joaopapereira Apr 28, 2022
e6b06d6
Bump testify
joaopapereira Apr 28, 2022
a915520
Bump apimachinary
joaopapereira Apr 28, 2022
6253775
Bump counterfeiter
joaopapereira Apr 29, 2022
cd3404e
Merge pull request #381 from vmware-tanzu/bump-go-cli-ui
joaopapereira Apr 29, 2022
f811f02
Bump version of go to 1.18
joaopapereira Apr 29, 2022
534ea17
Ensure Insecure taken into consideration
joaopapereira May 4, 2022
449c476
Merge pull request #382 from vmware-tanzu/update-go-version
joaopapereira May 5, 2022
d196674
Bump version of go-containerregistry to 0.8.0
joaopapereira May 5, 2022
196fc93
Merge pull request #385 from vmware-tanzu/bump-gocontainerregistry
joaopapereira May 6, 2022
415c0b7
Merge pull request #384 from vmware-tanzu/registry-insecure-not-working
joaopapereira May 9, 2022
53b3202
gitignore all imgpkg binaries
May 11, 2022
2af2672
Merge pull request #387 from benmoss/gitignore-binaries
joaopapereira May 11, 2022
dd35924
Remove -buildid from build
joaopapereira May 11, 2022
714912c
Missing removal of buildid in build.sh
joaopapereira May 11, 2022
c86a6da
Fix undefined variable in build script
May 11, 2022
d575388
Don't dirty the working directory with checksums
May 11, 2022
2fcf08d
Merge pull request #389 from benmoss/fix-verify-checksums
joaopapereira May 11, 2022
9e7a96a
Add CompletionCmd before configuring UI
praveenrewar Jun 21, 2022
32d4ad4
Merge pull request #402 from vmware-tanzu/bash-completion-tty
joaopapereira Jun 23, 2022
9151667
Update dependencies for 06/28/2022
joaopapereira Jun 28, 2022
2272e19
Merge pull request #407 from vmware-tanzu/deps-062322
joaopapereira Jun 28, 2022
60a7345
Let use know that imgpkg still needs to tag images after copy (#408)
joaopapereira Jun 30, 2022
20cb48d
Add image and layer information to warning of non distributable layer…
joaopapereira Jul 7, 2022
42442ef
Ensure that pushed images can be pulled in different OS
joaopapereira Jul 15, 2022
023dbaa
Fix tests that were using assert instead of require
joaopapereira Jul 19, 2022
4b743bf
Merge pull request #415 from vmware-tanzu/fix-os-push-pull
cppforlife Jul 19, 2022
fd62344
Bump dependencies of multiple packages
joaopapereira Jul 19, 2022
d0e3ab7
Merge pull request #417 from vmware-tanzu/bump-dependencies-07192022
joaopapereira Jul 20, 2022
75b21c5
Add feature to allow resume of copy to tar
joaopapereira Jul 21, 2022
af1b1ab
Add workflow to add new issues and prs to project
aaronshurley Jul 26, 2022
5ab79e0
Bump time for performance test
joaopapereira Jul 27, 2022
c6fae29
Merge pull request #418 from vmware-tanzu/imgpkg-resume-tar-flag
joaopapereira Jul 28, 2022
41f257a
Issue 420 - Adds progress bar for image push
shaheerkootteeri Jul 27, 2022
bbcc0d1
fixes the end to E2E test failures
shaheerkootteeri Aug 8, 2022
75cdcd7
adds review comments
shaheerkootteeri Aug 10, 2022
c98dbca
Merge pull request #421 from shaheerkootteeri/Issue440-progress-imgpk…
joaopapereira Aug 11, 2022
1b1611d
use pull_request_target to allow access to secrets
aaronshurley Aug 16, 2022
3441fdb
Update backlog link
aaronshurley Aug 16, 2022
b614f7a
Add pull API
joaopapereira Aug 11, 2022
a720c9d
Change logging througout
joaopapereira Aug 16, 2022
4f0d315
Correct linter issues
joaopapereira Aug 16, 2022
a64f2b5
Remove --output-type option from pull
joaopapereira Aug 17, 2022
96a99c0
Merge pull request #424 from vmware-tanzu/is-cacheable-image
joaopapereira Aug 19, 2022
1a62d41
Bump go-containerregistry, remove k8s-pkg-credentialprovider
Jun 27, 2022
915cc06
Fix test registry
Jun 29, 2022
1cf5b97
Add back ability to disable iaas auth providers
Jun 30, 2022
5d61736
Move URLsMatch fns to separate package
Jul 6, 2022
67715da
Make keychains loaded only when asked
joaopapereira Aug 31, 2022
6127a0b
Remove deprecated ioutil functions
joaopapereira Aug 31, 2022
228bd3c
Remove unneeded message. Set error output to Stderr
vicmarbev Sep 1, 2022
c4a526d
Change name of v1.Status to v1.PullStatus to provide a more acurate name
joaopapereira Sep 1, 2022
851e560
Fixed typos and logic from PR comments
joaopapereira Sep 1, 2022
7387d02
Merge pull request #431 from vmware-tanzu/remove-vdemeester
joaopapereira Sep 2, 2022
1588576
Merge pull request #433 from vmware-tanzu/change-status-name
joaopapereira Sep 2, 2022
416340f
build(deps): Bump github.com/mattn/go-isatty from 0.0.14 to 0.0.16
dependabot[bot] Sep 2, 2022
50780c3
Create describe API
joaopapereira Sep 2, 2022
c03b14a
Ensure yaml output is provided when tty is false on describe
joaopapereira Sep 2, 2022
23739f1
Merge pull request #435 from vmware-tanzu/describe-fix
joaopapereira Sep 2, 2022
8b7e495
Merge pull request #425 from vmware-tanzu/dependabot/go_modules/githu…
joaopapereira Sep 2, 2022
d5f19e5
build(deps): Bump github.com/google/go-containerregistry
dependabot[bot] Sep 2, 2022
17a7ea2
Merge pull request #419 from vmware-tanzu/dependabot/go_modules/githu…
joaopapereira Sep 2, 2022
eaf8aba
Remove credentialprovider patch check on build-binaries
joaopapereira Sep 2, 2022
1a210f4
Don't print 'Succeeded' on help, autocomplete
vicmarbev Sep 5, 2022
721c425
update project docs (#437)
aaronshurley Sep 7, 2022
7361dbf
Use cobrautil lib to check if non-root command to output success
vicmarbev Sep 16, 2022
46d1867
Set specific version for cobrautil
vicmarbev Sep 16, 2022
9e919a1
Merge branch 'develop' into remove-completion-unneeded-messages
vicmarbev Sep 16, 2022
1b868b8
Update dependencies from develop
vicmarbev Sep 16, 2022
c27fec3
Bump go to 1.19.1
joaopapereira Sep 19, 2022
d5c9d0c
Merge pull request #438 from vmware-tanzu/bump-go-19-1
joaopapereira Sep 19, 2022
006d04d
Add tag list to the API (#436)
joaopapereira Sep 29, 2022
85daa94
Keychains parsing was parsing the wrong variable (#440)
joaopapereira Sep 29, 2022
f44c4c6
Run go mod vendor to get dependencies right
vicmarbev Oct 4, 2022
c40b443
build(deps): Bump github.com/spf13/cobra from 1.5.0 to 1.6.0
dependabot[bot] Oct 17, 2022
39517d1
Merge pull request #442 from vmware-tanzu/dependabot/go_modules/githu…
joaopapereira Oct 18, 2022
b28a630
Bump cobrautil version
vicmarbev Oct 26, 2022
84ac0d2
Merge pull request #432 from vicmarbev/remove-completion-unneeded-mes…
joaopapereira Oct 26, 2022
137c769
build(deps): Bump github.com/google/go-containerregistry
dependabot[bot] Oct 26, 2022
8fd2680
Merge pull request #444 from vmware-tanzu/dependabot/go_modules/githu…
joaopapereira Oct 26, 2022
12f7330
build(deps): Bump github.com/stretchr/testify from 1.7.5 to 1.8.1
dependabot[bot] Oct 26, 2022
637f971
Merge pull request #445 from vmware-tanzu/dependabot/go_modules/githu…
joaopapereira Oct 27, 2022
7a6ed29
Collect access denied errors on describe (#443)
joaopapereira Nov 2, 2022
0f3f5de
build(deps): Bump github.com/google/go-containerregistry
dependabot[bot] Nov 14, 2022
1674c86
build(deps): Bump golang.org/x/sys from 0.1.0 to 0.2.0
dependabot[bot] Nov 14, 2022
24c42ad
Merge pull request #450 from vmware-tanzu/dependabot/go_modules/golan…
joaopapereira Nov 14, 2022
133c7e1
Merge pull request #449 from vmware-tanzu/dependabot/go_modules/githu…
joaopapereira Nov 14, 2022
4590f82
build(deps): Bump github.com/spf13/cobra from 1.6.0 to 1.6.1
dependabot[bot] Nov 14, 2022
1a4690b
Merge pull request #447 from vmware-tanzu/dependabot/go_modules/githu…
joaopapereira Nov 15, 2022
329150b
Introduce inclusive naming check and update existing language
aaronshurley Nov 16, 2022
52606f8
Merge pull request #451 from vmware-tanzu/inclusive-naming
joaopapereira Nov 21, 2022
408f7fe
add synchronize event to inclusive language check
aaronshurley Nov 21, 2022
98d979d
Merge pull request #452 from vmware-tanzu/aaronshurley-patch-1
joaopapereira Nov 21, 2022
2365872
Bump Go to v1.19.3
praveenrewar Nov 30, 2022
1a9a172
Merge pull request #454 from vmware-tanzu/bump-deps
joaopapereira Nov 30, 2022
7511f77
build(deps): Bump golang.org/x/sys from 0.2.0 to 0.3.0
dependabot[bot] Dec 5, 2022
0be13bb
Merge pull request #458 from vmware-tanzu/dependabot/go_modules/golan…
joaopapereira Dec 5, 2022
ee8a239
Bump go version to 1.19.4
joaopapereira Dec 12, 2022
d811922
Bump x/net version
joaopapereira Dec 12, 2022
e7065e7
Remove workaround for windows for SystemCertPool utility
Dec 13, 2022
564e7f0
Remove workaround for windows for SystemCertPool utility
Dec 13, 2022
eeaf079
Merge pull request #460 from vmware-tanzu/bump-deps
cppforlife Dec 14, 2022
8089d99
Merge pull request #463 from Vandy-P/develop
joaopapereira Dec 15, 2022
57675ae
First commit to add the internal tag filter
alexbarbato Dec 22, 2022
f6dff75
build(deps): Bump github.com/mattn/go-isatty from 0.0.16 to 0.0.17
dependabot[bot] Jan 2, 2023
6130a99
Adding in the tests for the internal imgpkg list
alexbarbato Jan 3, 2023
d6441c0
Merge pull request #465 from alexbarbato/459-internal-imgpkg-tags
joaopapereira Jan 5, 2023
c13db9b
Merge pull request #466 from vmware-tanzu/dependabot/go_modules/githu…
joaopapereira Jan 5, 2023
56240d1
build(deps): Bump golang.org/x/sys from 0.3.0 to 0.4.0
dependabot[bot] Jan 9, 2023
d6067ad
Merge pull request #467 from vmware-tanzu/dependabot/go_modules/golan…
joaopapereira Jan 17, 2023
a75f9da
Change linter config and correct warnings
joaopapereira Jan 18, 2023
0716843
Add builder for registry.Opts
joaopapereira Jan 18, 2023
5ad94d1
Merge pull request #468 from vmware-tanzu/add-registry-opts-builder
joaopapereira Jan 18, 2023
1856c8b
bump go to 1.19.5
joaopapereira Jan 18, 2023
0e7bf34
Merge pull request #469 from vmware-tanzu/bump-devel-to-go-1.19.5
joaopapereira Jan 19, 2023
d6df503
Add in registry mutual tls
Mar 23, 2022
3c1dc50
add mutual tls to options struct clone
Feb 7, 2023
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
18 changes: 18 additions & 0 deletions .github/workflows/add-to-project.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,18 @@
---
name: Add issues to project

on:
issues:
types: ['opened']
pull_request_target:
types: ['opened']

jobs:
add-to-project:
name: Add issue to project
runs-on: ubuntu-latest
steps:
- uses: actions/add-to-project@v0.3.0
with:
project-url: https://github.com/orgs/vmware-tanzu/projects/16
github-token: ${{ secrets.CARVEL_ADD_TO_PROJECT_TOKEN }}
6 changes: 3 additions & 3 deletions .github/workflows/gh-test-external-registry.yml
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ on:
branches:
- develop
pull_request_target:
types: [opened, reopened, synchronize]
types: [opened, reopened, synchronize, edited]
permissions:
contents: read
actions: none
Expand All @@ -26,7 +26,7 @@ jobs:
- name: Set up Go 1.x
uses: actions/setup-go@v1
with:
go-version: "1.17"
go-version: "1.19.5"
- name: Check out code into the Go module directory
uses: actions/checkout@v2
with:
Expand Down Expand Up @@ -63,7 +63,7 @@ jobs:
- name: Set up Go 1.x
uses: actions/setup-go@v1
with:
go-version: "1.17"
go-version: "1.19.5"
- name: Check out code into the Go module directory
uses: actions/checkout@v2
with:
Expand Down
4 changes: 2 additions & 2 deletions .github/workflows/gh-test.yml
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ jobs:
- name: Set up Go 1.x
uses: actions/setup-go@v1
with:
go-version: "1.17"
go-version: "1.19.5"
- name: Check out code into the Go module directory
uses: actions/checkout@v2
with:
Expand All @@ -37,7 +37,7 @@ jobs:
- name: Set up Go 1.x
uses: actions/setup-go@v1
with:
go-version: "1.17"
go-version: "1.19.5"
- name: Check out code into the Go module directory
uses: actions/checkout@v2
with:
Expand Down
4 changes: 2 additions & 2 deletions .github/workflows/golangci-lint.yml
Original file line number Diff line number Diff line change
Expand Up @@ -15,12 +15,12 @@ jobs:
- name: Set up Go 1.x
uses: actions/setup-go@v1
with:
go-version: "1.17"
go-version: "1.19.5"
- uses: actions/checkout@v2
with:
fetch-depth: '0'
- name: golangci-lint
uses: golangci/golangci-lint-action@v2
with:
version: v1.41.1
version: v1.45.2
args: -v
10 changes: 10 additions & 0 deletions .github/workflows/inclusive-language-check.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
---
name: Check inclusive language

on:
pull_request:
types: ['opened', 'reopened', 'synchronize']

jobs:
check-inclusive-language:
uses: vmware-tanzu/carvel-release-scripts/.github/workflows/inclusive-language-check.yml@main
8 changes: 4 additions & 4 deletions .github/workflows/release.yml
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ jobs:
- name: Set up Go
uses: actions/setup-go@v2
with:
go-version: 1.17.0
go-version: 1.19.5
- name: Run GoReleaser
uses: goreleaser/goreleaser-action@5e15885530fb01d81d1f24e8a6f54ebbd0fed7eb
if: startsWith(github.ref, 'refs/tags/')
Expand Down Expand Up @@ -87,9 +87,9 @@ jobs:
set -e -x
VERSION=`echo ${{ github.ref }} | grep -Eo '[0-9].*'`

./hack/build-binaries.sh "$VERSION" > ./go-checksums
cat ./go-checksums
diff ./go-checksums <(cat <<EOF
./hack/build-binaries.sh "$VERSION" > /tmp/go-checksums
cat /tmp/go-checksums
diff /tmp/go-checksums <(cat <<EOF
${{steps.get-checksums-from-draft-release.outputs.result}}
EOF
)
2 changes: 1 addition & 1 deletion .github/workflows/trivy-scan.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ jobs:
with:
repo: vmware-tanzu/carvel-imgpkg
tool: imgpkg
goVersion: 1.17.0
goVersion: 1.19.5
secrets:
githubToken: ${{ secrets.GITHUB_TOKEN }}
slackWebhookURL: ${{ secrets.SLACK_WEBHOOK_URL }}
6 changes: 1 addition & 5 deletions .gitignore
Original file line number Diff line number Diff line change
@@ -1,8 +1,4 @@
/imgpkg
/imgpkg-darwin-amd64
/imgpkg-darwin-arm64
/imgpkg-linux-amd64
/imgpkg-windows-amd64.exe
/imgpkg*
/tmp
.DS_Store
/test/e2e/assets/simple-app/empty-dir
Expand Down
2 changes: 0 additions & 2 deletions .golangci.yml
Original file line number Diff line number Diff line change
Expand Up @@ -2,11 +2,9 @@ linters:
enable:
- goheader
- revive
- deadcode
- unused
- staticcheck
- typecheck
- structcheck
- govet
disable-all: true
# all available settings of specific linters
Expand Down
1 change: 0 additions & 1 deletion .goreleaser.yml
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,6 @@ builds:
- -trimpath

ldflags:
- -buildid=
- -X github.com/vmware-tanzu/carvel-imgpkg/pkg/imgpkg/cmd.Version={{ .Version }}

archives:
Expand Down
2 changes: 2 additions & 0 deletions .wokeignore
Original file line number Diff line number Diff line change
@@ -0,0 +1,2 @@
# out of our control
vendor/
77 changes: 1 addition & 76 deletions CODE_OF_CONDUCT.md
Original file line number Diff line number Diff line change
@@ -1,76 +1 @@
# Contributor Covenant Code of Conduct

## Our Pledge

In the interest of fostering an open and welcoming environment, we as
contributors and maintainers pledge to making participation in this project
and our community a harassment-free experience for everyone, regardless of
age, body size, disability, ethnicity, sex characteristics, gender identity and
expression, level of experience, education, socio-economic status, nationality,
personal appearance, race, religion, or sexual identity and orientation.

## Our Standards

Examples of behavior that contributes to creating a positive environment
include:

* Using welcoming and inclusive language
* Being respectful of differing viewpoints and experiences
* Gracefully accepting constructive criticism
* Focusing on what is best for the community
* Showing empathy towards other community members

Examples of unacceptable behavior by participants include:

* The use of sexualized language or imagery and unwelcome sexual attention or
advances
* Trolling, insulting/derogatory comments, and personal or political attacks
* Public or private harassment
* Publishing others' private information, such as a physical or electronic
address, without explicit permission
* Other conduct which could reasonably be considered inappropriate in a
professional setting

## Our Responsibilities

Project maintainers are responsible for clarifying the standards of acceptable
behavior and are expected to take appropriate and fair corrective action in
response to any instances of unacceptable behavior.

Project maintainers have the right and responsibility to remove, edit, or
reject comments, commits, code, wiki edits, issues, and other contributions
that are not aligned to this Code of Conduct, or to ban temporarily or
permanently any contributor for other behaviors that they deem inappropriate,
threatening, offensive, or harmful.

## Scope

This Code of Conduct applies both within project spaces and in public spaces
when an individual is representing the project or its community. Examples of
representing a project or community include using an official project e-mail
address, posting via an official social media account, or acting as an appointed
representative at an online or offline event. Representation of a project may be
further defined and clarified by project maintainers.

## Enforcement

Instances of abusive, harassing, or otherwise unacceptable behavior may be
reported by contacting the project team at oss-coc@vmware.com. All
complaints will be reviewed and investigated and will result in a response that
is deemed necessary and appropriate to the circumstances. The project team is
obligated to maintain confidentiality with regard to the reporter of an incident.
Further details of specific enforcement policies may be posted separately.

Project maintainers who do not follow or enforce the Code of Conduct in good
faith may face temporary or permanent repercussions as determined by other
members of the project's leadership.

## Attribution

This Code of Conduct is adapted from the [Contributor Covenant][homepage], version 1.4,
available at https://www.contributor-covenant.org/version/1/4/code-of-conduct.html

[homepage]: https://www.contributor-covenant.org

For answers to common questions about this code of conduct, see
https://www.contributor-covenant.org/faq
https://carvel.dev/shared/docs/latest/code-of-conduct/
28 changes: 1 addition & 27 deletions CONTRIBUTING.md
Original file line number Diff line number Diff line change
@@ -1,27 +1 @@
# How to Contribute

We’d love to accept your patches and contributions to this project. Please review the following guidelines you'll need to follow in order to make a contribution.

# Communication

We prefer communicating asynchronously through GitHub issues and the [k14s Slack channel](https://kubernetes.slack.com/archives/CH8KCCKA5). In order to be inclusive to the community, if a conversation related to an issue happens outside of these channels, we appreciate summarizing the conversation's context and adding it to an issue.

# Propose a Change

Pull requests are welcome for all changes. When adding new functionality, we encourage including test coverage. If significant effort will be involved, we suggest beginning by submitting an issue so any high level feedback can be addressed early.

Please submit feature requests and bug reports by using GitHub issues.

Before submitting an issue, please search through open ones to ensure others have not submitted something similar. If a similar issue exists, please add any additional information as a comment.

## Issues Lifecycle

Once an issue is labeled with `in-progress`, a team member has begun investigating it. We keep `in-progress` issues open until they have been resolved and released. Once released, a comment containing release information will be posted in the issue's thread.

# Contributor License Agreement

All contributors to this project must have a signed Contributor License Agreement (**"CLA"**) on file with us. The CLA grants us the permissions we need to use and redistribute your contributions as part of the project; you or your employer retain the copyright to your contribution. Before a PR can pass all required checks, our CLA action will prompt you to accept the agreement. Head over to https://cla.vmware.com/ to see your current agreement(s) on file or to sign a new one.

We generally only need you (or your employer) to sign our CLA once and once signed, you should be able to submit contributions to any VMware project.

Note: if you would like to submit an "_obvious fix_" for something like a typo, formatting issue or spelling mistake, you may not need to sign the CLA.
https://carvel.dev/shared/docs/latest/contributing/
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
- Slack: [#carvel in Kubernetes slack](https://kubernetes.slack.com/archives/CH8KCCKA5)
- [Docs](https://carvel.dev/imgpkg/docs/latest/) with example workflow and other details
- Install: Grab prebuilt binaries from the [Releases page](https://github.com/vmware-tanzu/carvel-imgpkg/releases) or [Homebrew Carvel tap](https://github.com/vmware-tanzu/homebrew-carvel)
- Backlog: [See what we're up to](https://app.zenhub.com/workspaces/carvel-backlog-6013063a24147d0011410709/board?repos=219018453). (Note: we use ZenHub which requires GitHub authorization).
- Backlog: [See what we're up to](https://github.com/orgs/vmware-tanzu/projects/16/views/1?filterQuery=repo%3A%22vmware-tanzu%2Fcarvel-imgpkg%22).

`imgpkg` (pronounced: "image package") is a tool that allows users to store a set of arbitrary files as an OCI image. One of the driving use cases is to store Kubernetes configuration (plain YAML, ytt templates, Helm templates, etc.) in OCI registry as an image.

Expand Down
4 changes: 1 addition & 3 deletions SECURITY.md
Original file line number Diff line number Diff line change
@@ -1,3 +1 @@
## Vulnerability Disclosure

If you believe you have found a security issue in `imgpkg`, please privately and responsibly disclose it by following the directions in our [security policy](https://carvel.dev/shared/docs/latest/security-policy/).
https://carvel.dev/shared/docs/latest/security-policy/
13 changes: 11 additions & 2 deletions cmd/imgpkg/imgpkg.go
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,7 @@ import (
"os"
"time"

"github.com/cppforlife/cobrautil"
uierrs "github.com/cppforlife/go-cli-ui/errors"
"github.com/cppforlife/go-cli-ui/ui"
"github.com/vmware-tanzu/carvel-imgpkg/pkg/imgpkg/cmd"
Expand All @@ -28,11 +29,19 @@ func main() {

command := cmd.NewDefaultImgpkgCmd(confUI)

// Deprecation warning section
_, found := os.LookupEnv("IMGPKG_ENABLE_IAAS_AUTH")
if found {
confUI.PrintLinef("IMGPKG_ENABLE_IAAS_AUTH environment variable will be deprecated, please use the flag --activate-keychain to activate the needed keychains")
}
// End

err := command.Execute()
if err != nil {
confUI.ErrorLinef("imgpkg: Error: %v", uierrs.NewMultiLineError(err))
os.Exit(1)
}

confUI.PrintLinef("Succeeded")
if !cobrautil.IsCobraManagedCommand(os.Args) {
confUI.PrintLinef("Succeeded")
}
}
Loading