Skip to content
This repository has been archived by the owner on Jan 8, 2024. It is now read-only.

Commit

Permalink
Update UX message regarding injection of entrypoint & when Kaniko is …
Browse files Browse the repository at this point in the history
…executed for the pull.
  • Loading branch information
paladin-devops committed Apr 27, 2022
1 parent ddead0a commit e64363d
Showing 1 changed file with 2 additions and 4 deletions.
6 changes: 2 additions & 4 deletions builtin/docker/pull/kaniko.go
Original file line number Diff line number Diff line change
Expand Up @@ -90,6 +90,7 @@ func (b *Builder) pullWithKaniko(
refPath := reference.Path(ref)

if !b.config.DisableCEB {
step.Update("Injecting entrypoint...")
// For Kaniko we can use our runtime arch because the image we build
// always matches the architecture of our Kaniko environment.
assetName, ok := assets.CEBArch[runtime.GOARCH]
Expand All @@ -103,7 +104,6 @@ func (b *Builder) pullWithKaniko(
return nil, status.Errorf(codes.Internal, "unable to restore custom entrypoint binary: %s", err)
}

step.Done()
step = sg.Add("Testing registry and uploading entrypoint layer")

err = oci.SetupEntrypointLayer(refPath, data)
Expand Down Expand Up @@ -138,9 +138,7 @@ func (b *Builder) pullWithKaniko(
}

log.Debug("executing kaniko", "args", args)

step.Done()
step = sg.Add("Executing Kaniko...")
step.Update("Executing Kaniko...")

// Command output should go to the step
cmd := exec.CommandContext(ctx, args[0], args[1:]...)
Expand Down

0 comments on commit e64363d

Please sign in to comment.