You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Add limit readers for readers that consume data from external sources. (#2042)
This adds a safety layer to tune resource usage for any reads of APKs,
APK indexes, or other external data sources.
These are all optional flags, that default to a default value if not
set.
@@ -116,6 +118,7 @@ Along the image, apko will generate SBOMs (software bill of materials) describin
116
118
build.WithTempDir(tmp),
117
119
build.WithIncludePaths(includePaths),
118
120
build.WithIgnoreSignatures(ignoreSignatures),
121
+
build.WithSizeLimits(sizeLimits),
119
122
)
120
123
},
121
124
}
@@ -136,6 +139,7 @@ Along the image, apko will generate SBOMs (software bill of materials) describin
136
139
cmd.Flags().StringVar(&lockfile, "lockfile", "", "a path to .lock.json file (e.g. produced by apko lock) that constraints versions of packages to the listed ones (default '' means no additional constraints)")
137
140
cmd.Flags().StringSliceVar(&includePaths, "include-paths", []string{}, "Additional include paths where to look for input files (config, base image, etc.). By default apko will search for paths only in workdir. Include paths may be absolute, or relative. Relative paths are interpreted relative to workdir. For adding extra paths for packages, use --repository-append.")
0 commit comments