diff --git a/README.md b/README.md
index 7471646010..256d56686b 100644
--- a/README.md
+++ b/README.md
@@ -5,7 +5,11 @@
[![Go Report Card](https://goreportcard.com/badge/ko-build/ko)](https://goreportcard.com/report/ko-build/ko)
[![SLSA 3](https://slsa.dev/images/gh-badge-level3.svg)](https://slsa.dev/images/gh-badge-level3.svg)
-
+
+
+---
+
+> 🎉 Google has applied for `ko` to join the Cloud Native Computing Foundation as a Sandbox project! Learn more [here](https://opensource.googleblog.com/2022/10/ko-applies-to-become-a-cncf-sandbox-project.html)!
`ko` is a simple, fast container image builder for Go applications.
@@ -17,605 +21,16 @@ dependencies).
and as such doesn't require `docker` to be installed. This can make it a good
fit for lightweight CI/CD use cases.
-`ko` also includes support for simple YAML templating which makes it a powerful
-tool for Kubernetes applications ([See below](#Kubernetes-Integration)).
-
-# Setup
-
-## Install
-
-### Install from [GitHub Releases](https://github.com/ko-build/ko/releases)
-
-```
-$ VERSION=TODO # choose the latest version
-$ OS=Linux # or Darwin
-$ ARCH=x86_64 # or arm64, i386, s390x
-```
-
-We generate [SLSA3 provenance](slsa.dev) using the OpenSSF's [slsa-framework/slsa-github-generator](https://github.com/slsa-framework/slsa-github-generator). To verify our release, install the verification tool from [slsa-framework/slsa-verifier#installation](https://github.com/slsa-framework/slsa-verifier#installation) and verify as follows:
-
-
-```shell
-$ curl -sL "https://github.com/ko-build/ko/releases/download/v${VERSION}/ko_${VERSION}_${OS}_${ARCH}.tar.gz" > ko.tar.gz
-$ curl -sL https://github.com/ko-build/ko/releases/download/v${VERSION}/attestation.intoto.jsonl > provenance.intoto.jsonl
-$ slsa-verifier -artifact-path ko.tar.gz -provenance provenance.intoto.jsonl -source github.com/google/ko -tag "v${VERSION}"
- PASSED: Verified SLSA provenance
-```
-
-```shell
-$ tar xzf ko.tar.gz ko
-$ chmod +x ./ko
-```
-
-### Install using [Homebrew](https://brew.sh)
-
-```
-brew install ko
-```
-
-### Install on [Alpine Linux](https://www.alpinelinux.org)
-
-Installation on Alpine requires using the [`testing` repository](https://wiki.alpinelinux.org/wiki/Enable_Community_Repository#Using_testing_repositories)
-
-```
-echo https://dl-cdn.alpinelinux.org/alpine/edge/testing/ >> /etc/apk/repositories
-apk update
-apk add ko
-```
-
-### Build and Install from Source
-
-With Go 1.18+, build and install the latest released version:
-
-```
-go install github.com/google/ko@latest
-```
-
-### Setup on GitHub Actions
-
-You can use the [`setup-ko`](https://github.com/imjasonh/setup-ko) action
-to install `ko` and setup auth to [GitHub Container
-Registry](https://github.com/features/packages) in a GitHub Action workflow:
-
-```
-steps:
-- uses: imjasonh/setup-ko@v0.6
-```
-
-## Authenticate
-
-`ko` depends on the authentication configured in your Docker config (typically
-`~/.docker/config.json`). If you can push an image with `docker push`, you are
-already authenticated for `ko`.
-
-Since `ko` doesn't require `docker`, `ko login` also provides a surface for
-logging in to a container image registry with a username and password, similar
-to
-[`docker login`](https://docs.docker.com/engine/reference/commandline/login/).
-
-Additionally, if auth is not configured in the Docker config, `ko` includes
-built-in support for authenticating to the following container registries using
-credentials configured in the environment:
-
-- Google Container Registry and Artifact Registry
- - using [Application Default Credentials](https://cloud.google.com/docs/authentication/production) or auth configured in `gcloud`.
-- Amazon Elastic Container Registry
- - using [AWS credentials](https://github.com/awslabs/amazon-ecr-credential-helper/#aws-credentials)
-- Azure Container Registry
- - using [environment variables](https://github.com/chrismellard/docker-credential-acr-env/)
-- GitHub Container Registry
- - using the `GITHUB_TOKEN` environment variable
-
-## Choose Destination
-
-`ko` depends on an environment variable, `KO_DOCKER_REPO`, to identify where it
-should push images that it builds. Typically this will be a remote registry,
-e.g.:
-
-- `KO_DOCKER_REPO=gcr.io/my-project`, or
-- `KO_DOCKER_REPO=my-dockerhub-user`
-
-`ko` will default to storing sboms in the same repo as the image it is building. But there is an environment variable
-named `COSIGN_REPOSITORY` that enables you to specify a different repository for storing sboms.
-
-`KO_DOCKER_REPO=my-dockerhub-user COSIGN_REPOSITORY=gcr.io/my-project/sboms`
-
-# Build an Image
-
-`ko build ./cmd/app` builds and pushes a container image, and prints the
-resulting image digest to stdout.
-
-In this example, `./cmd/app` must be a `package main` that defines `func main()`.
-
-```
-ko build ./cmd/app
-...
-gcr.io/my-project/app-099ba5bcefdead87f92606265fb99ac0@sha256:6e398316742b7aa4a93161dce4a23bc5c545700b862b43347b941000b112ec3e
-```
-
-> NB: Prior to v0.10, the command was called `ko publish` -- this is equivalent
-> to `ko build`, and both commands will work and do the same thing.
-
-The executable binary that was built from `./cmd/app` is available in the image at `/ko-app/app` -- the binary name matches the base import path name -- and that binary is the image's entrypoint.
-
-Because the output of `ko build` is an image reference, you can easily pass it
-to other tools that expect to take an image reference.
-
-To run the container locally:
-
-```
-docker run -p 8080:8080 $(ko build ./cmd/app)
-```
-
-Or to deploy it to other services like
-[Cloud Run](https://cloud.google.com/run):
-
-```
-gcloud run deploy --image=$(ko build ./cmd/app)
-```
-
-* Note: The image must be pushed to [Google Container Registry](https://cloud.google.com/container-registry) or [Artifact Registry](https://cloud.google.com/artifact-registry).
-
-Or [fly.io](https://fly.io):
-
-```
-flyctl launch --image=$(ko build ./cmd/app)
-```
-
-* Note: The image must be publicly available.
-
-Or [AWS Lambda](https://aws.amazon.com/lambda/):
-
-```
-aws lambda update-function-code \
- --function-name=my-function-name \
- --image-uri=$(ko build ./cmd/app)
-```
-
-* Note: The image must be pushed to [ECR](https://aws.amazon.com/ecr/), based on the AWS provided base image, and use the [`aws-lambda-go`](https://github.com/aws/aws-lambda-go) framework.
-See [official docs](https://docs.aws.amazon.com/lambda/latest/dg/go-image.html) for more information.
-
-Or [Azure Container Apps](https://azure.microsoft.com/services/container-apps/):
-
-```
-az containerapp update \
- --name my-container-app
- --resource-group my-resource-group
- --image $(ko build ./cmd/app)
-```
-
-* Note: The image must be pushed to [ACR](https://azure.microsoft.com/services/container-registry/) or other registry service.
-See [official docs](https://docs.microsoft.com/azure/container-apps/) for more information.
-
-## Configuration
-
-Aside from `KO_DOCKER_REPO`, you can configure `ko`'s behavior using a
-`.ko.yaml` file. The location of this file can be overridden with
-`KO_CONFIG_PATH`.
-
-### Overriding Base Images
-
-By default, `ko` bases images on `gcr.io/distroless/static:nonroot`. This is a
-small image that provides the bare necessities to run your Go binary.
-
-You can override this base image in two ways:
-
-1. To override the base image for all images `ko` builds, add this line to your
- `.ko.yaml` file:
-
-```yaml
-defaultBaseImage: registry.example.com/base/image
-```
-
-2. To override the base image for certain importpaths:
-
-```yaml
-baseImageOverrides:
- github.com/my-user/my-repo/cmd/app: registry.example.com/base/for/app
- github.com/my-user/my-repo/cmd/foo: registry.example.com/base/for/foo
-```
-
-### Overriding Go build settings
-
-By default, `ko` builds the binary with no additional build flags other than
-`-trimpath`. You can replace the default build
-arguments by providing build flags and ldflags using a
-[GoReleaser](https://github.com/goreleaser/goreleaser) influenced `builds`
-configuration section in your `.ko.yaml`.
-
-```yaml
-builds:
-- id: foo
- dir: . # default is .
- main: ./foobar/foo
- env:
- - GOPRIVATE=git.internal.example.com,source.developers.google.com
- flags:
- - -tags
- - netgo
- ldflags:
- - -s -w
- - -extldflags "-static"
- - -X main.version={{.Env.VERSION}}
-- id: bar
- dir: ./bar
- main: . # default is .
- env:
- - GOCACHE=/workspace/.gocache
- ldflags:
- - -s
- - -w
-```
-
-If your repository contains multiple modules (multiple `go.mod` files in
-different directories), use the `dir` field to specify the directory where
-`ko` should run `go build`.
-
-`ko` picks the entry from `builds` based on the import path you request. The
-import path is matched against the result of joining `dir` and `main`.
-
-The paths specified in `dir` and `main` are relative to the working directory
-of the `ko` process.
-
-The `ldflags` default value is `[]`.
-
-_Please note:_ Even though the configuration section is similar to the
-[GoReleaser `builds` section](https://goreleaser.com/customization/build/),
-only the `env`, `flags` and `ldflags` fields are currently supported. Also, the
-templating support is currently limited to using environment variables only.
-
-## Naming Images
-
-`ko` provides a few different strategies for naming the image it pushes, to
-workaround certain registry limitations and user preferences:
-
-Given `KO_DOCKER_REPO=registry.example.com/repo`, by default,
-`ko build ./cmd/app` will produce an image named like
-`registry.example.com/repo/app-`, which includes the MD5 hash of the full
-import path, to avoid collisions.
-
-- `--preserve-import-path` (`-P`) will include the entire importpath:
- `registry.example.com/repo/github.com/my-user/my-repo/cmd/app`
-- `--base-import-paths` (`-B`) will omit the MD5 portion:
- `registry.example.com/repo/app`
-- `--bare` will only include the `KO_DOCKER_REPO`: `registry.example.com/repo`
-
-## Local Publishing Options
-
-`ko` is normally used to publish images to container image registries,
-identified by `KO_DOCKER_REPO`.
-
-`ko` can also load images to a local Docker daemon, if available, by setting
-`KO_DOCKER_REPO=ko.local`, or by passing the `--local` (`-L`) flag.
-
-Local images can be used as a base image for other `ko` images:
-
-```yaml
-defaultBaseImage: ko.local/example/base/image
-```
-
-`ko` can also load images into a local [KinD](https://kind.sigs.k8s.io)
-cluster, if available, by setting `KO_DOCKER_REPO=kind.local`. By default this
-loads into the default KinD cluster name (`kind`). To load into another KinD
-cluster, set `KIND_CLUSTER_NAME=my-other-cluster`.
-
-## Multi-Platform Images
-
-Because Go supports cross-compilation to other CPU architectures and operating
-systems, `ko` excels at producing multi-platform images.
-
-To build and push an image for all platforms supported by the configured base
-image, simply add `--platform=all`. This will instruct `ko` to look up all the
-supported platforms in the base image, execute
-`GOOS= GOARCH= GOARM= go build` for each platform, and
-produce a manifest list containing an image for each platform.
-
-You can also select specific platforms, for example,
-`--platform=linux/amd64,linux/arm64`
-
-## Generating SBOMs
-
-A [Software Bill of Materials](https://en.wikipedia.org/wiki/Software_bill_of_materials) (SBOM) is a list of software components that a software artifact depends on.
-Having a list of dependencies can be helpful in determining whether any vulnerable components were used to build the software artifact.
-
-From v0.9+, `ko` generates and uploads an SBOM for every image it produces by default.
-
-`ko` will generate an SBOM in the [SPDX](https://spdx.dev/) format by default, but you can select the [CycloneDX](https://cyclonedx.org/) format instead with the `--sbom=cyclonedx` flag. To disable SBOM generation, pass `--sbom=none`.
-
-These SBOMs can be downloaded using the [`cosign download sbom`](https://github.com/sigstore/cosign/blob/main/doc/cosign_download_sbom.md) command.
-
-But you can prefer to write SBOM to disk by giving the `--sbom-dir` flag instead of uploading it to registry, and `ko` will decide the extension based on the format you defined in the `--sbom` flag and file name based on the import path of your project.
-
-## Static Assets
-
-`ko` can also bundle static assets into the images it produces.
-
-By convention, any contents of a directory named `/kodata/` will be
-bundled into the image, and the path where it's available in the image will be
-identified by the environment variable `KO_DATA_PATH`.
-
-As an example, you can bundle and serve static contents in your image:
-
-```
-cmd/
- app/
- main.go
- kodata/
- favicon.ico
- index.html
-```
-
-Then, in your `main.go`:
-
-```go
-func main() {
- http.Handle("/", http.FileServer(http.Dir(os.Getenv("KO_DATA_PATH"))))
- log.Fatal(http.ListenAndServe(":8080", nil))
-}
-```
-
-You can simulate `ko`'s behavior outside of the container image by setting the
-`KO_DATA_PATH` environment variable yourself:
-
-```
-KO_DATA_PATH=cmd/app/kodata/ go run ./cmd/app
-```
-
-**Tip:** Symlinks in `kodata` are followed and included as well. For example,
-you can include Git commit information in your image with:
-
-```
-ln -s -r .git/HEAD ./cmd/app/kodata/
-```
-
-Also note that `http.FileServer` will not serve the `Last-Modified` header
-(or validate `If-Modified-Since` request headers) because `ko` does not embed
-timestamps by default.
-
-This can be supported by manually setting the `KO_DATA_DATE_EPOCH` environment
-variable during build ([See below](#Why-are-my-images-all-created-in-1970)).
-
-# Kubernetes Integration
-
-You could stop at just building and pushing images.
-
-But, because building images is so _easy_ with `ko`, and because building with
-`ko` only requires a string importpath to identify the image, we can integrate
-this with YAML generation to make Kubernetes use cases much simpler.
-
-## YAML Changes
-
-Traditionally, you might have a Kubernetes deployment, defined in a YAML file,
-that runs an image:
-
-```yaml
-apiVersion: apps/v1
-kind: Deployment
-metadata:
- name: my-deployment
-spec:
- replicas: 3
- ...
- template:
- spec:
- containers:
- - name: my-app
- image: registry.example.com/my-app:v1.2.3
-```
-
-...which you apply to your cluster with `kubectl apply`:
-
-```
-kubectl apply -f deployment.yaml
-```
-
-With `ko`, you can instead reference your Go binary by its importpath, prefixed
-with `ko://`:
-
-```yaml
- ...
- spec:
- containers:
- - name: my-app
- image: ko://github.com/my-user/my-repo/cmd/app
-```
-
-## `ko resolve`
-
-With this small change, running `ko resolve -f deployment.yaml` will instruct
-`ko` to:
-
-1. scan the YAML file(s) for values with the `ko://` prefix,
-2. for each unique `ko://`-prefixed string, execute `ko build ` to
- build and push an image,
-3. replace `ko://`-prefixed string(s) in the input YAML with the fully-specified
- image reference of the built image(s), for example:
-
-```yaml ...
-spec:
- containers:
- - name: my-app
- image: registry.example.com/github.com/my-user/my-repo/cmd/app@sha256:deadb33f...
-```
-
-4. Print the resulting resolved YAML to stdout.
-
-The result can be redirected to a file, to distribute to others:
-
-```
-ko resolve -f config/ > release.yaml
-```
-
-Taken together, `ko resolve` aims to make packaging, pushing, and referencing
-container images an invisible implementation detail of your Kubernetes
-deployment, and let you focus on writing code in Go.
-
-## `ko apply`
-
-To apply the resulting resolved YAML config, you can redirect the output of
-`ko resolve` to `kubectl apply`:
-
-```
-ko resolve -f config/ | kubectl apply -f -
-```
-
-Since this is a relatively common use case, the same functionality is available
-using `ko apply`:
-
-```
-ko apply -f config/
-```
-
-Also, any flags passed after `--` are passed to `kubectl apply` directly, for example to specify context and kubeconfig:
-```
-ko apply -f config -- --context=foo --kubeconfig=cfg.yaml
-```
-
-**NB:** This requires that `kubectl` is available.
-
-## `ko delete`
-
-To teardown resources applied using `ko apply`, you can run `ko delete`:
-
-```
-ko delete -f config/
-```
-
-This is purely a convenient alias for `kubectl delete`, and doesn't perform any
-builds, or delete any previously built images.
-
-# Frequently Asked Questions
-
-## How can I set `ldflags`?
-
-[Using -ldflags](https://blog.cloudflare.com/setting-go-variables-at-compile-time/)
-is a common way to embed version info in go binaries (In fact, we do this for
-`ko`!). Unfortunately, because `ko` wraps `go build`, it's not possible to use
-this flag directly; however, you can use the `GOFLAGS` environment variable
-instead:
-
-```sh
-GOFLAGS="-ldflags=-X=main.version=1.2.3" ko build .
-```
-
-## How can I set multiple `ldflags`?
-
-Currently, there is a limitation that does not allow to set multiple arguments
-in `ldflags` using `GOFLAGS`. Using `-ldflags` multiple times also does not
-work. In this use case, it works best to use the [`builds` section](#overriding-go-build-settings)
-in the `.ko.yaml` file.
-
-## Why are my images all created in 1970?
-
-In order to support [reproducible builds](https://reproducible-builds.org), `ko`
-doesn't embed timestamps in the images it produces by default.
-
-However, `ko` does respect the [`SOURCE_DATE_EPOCH`](https://reproducible-builds.org/docs/source-date-epoch/)
-environment variable, which will set the container image's timestamp
-accordingly.
-
-Similarly, the `KO_DATA_DATE_EPOCH` environment variable can be used to set
-the _modtime_ timestamp of the files in `KO_DATA_PATH`.
-
-For example, you can set the container image's timestamp to the current
-timestamp by executing:
-
-```
-export SOURCE_DATE_EPOCH=$(date +%s)
-```
-
-or set the timestamp of the files in `KO_DATA_PATH` to the latest git commit's
-timestamp with:
-
-```
-export KO_DATA_DATE_EPOCH=$(git log -1 --format='%ct')
-```
-
-## Can I build Windows containers?
-
-Yes, but support for Windows containers is new, experimental, and tenuous. Be prepared to file bugs. 🐛
-
-The default base image does not provide a Windows image.
-You can try out building a Windows container image by [setting the base image](#overriding-base-images) to a Windows base image and building with `--platform=windows/amd64` or `--platform=all`:
-
-For example, to build a Windows container image for `ko`, from within this repo:
-
-```
-ko build ./ --platform=windows/amd64
-```
-
-This works because the `ko` image is configured in [`.ko.yaml`](./.ko.yaml) to be based on a `golang` base image, which provides platform-specific images for both Linux and Windows.
-
-### Known issues 🐛
-
-- Symlinks in `kodata` are ignored when building Windows images; only regular files and directories will be included in the Windows image.
-
-## Can I optimize images for [eStargz support](https://github.com/containerd/stargz-snapshotter/blob/v0.7.0/docs/stargz-estargz.md)?
-
-Yes! Set the environment variable `GGCR_EXPERIMENT_ESTARGZ=1` to produce
-eStargz-optimized images.
-
-## Does `ko` support autocompletion?
-
-Yes! `ko completion` generates a Bash/Zsh/Fish/PowerShell completion script.
-You can get how to load it from help document.
-
-```
-ko completion [bash|zsh|fish|powershell] --help
-```
-
-Or, you can source it directly:
-
-```bash
-source <(ko completion)
-```
-
-## Does `ko` work with [Kustomize](https://kustomize.io/)?
-
-Yes! `ko resolve -f -` will read and process input from stdin, so you can have
-`ko` easily process the output of the `kustomize` command.
-
-```
-kustomize build config | ko resolve -f -
-```
-
-## Does `ko` integrate with other build and development tools?
-
-Oh, you betcha. Here's a partial list:
-
-- `ko` support in [Carvel's `kbld`](https://carvel.dev/kbld/docs/latest/config/#ko)
-- `ko` support in [Skaffold](https://skaffold.dev/docs/pipeline-stages/builders/ko/)
-- `ko` extension for [Tilt](https://github.com/tilt-dev/tilt-extensions/tree/master/ko)
-- `ko` support for [goreleaser](https://github.com/goreleaser/goreleaser/pull/2564) (proposed)
-
-## Does `ko` work with [OpenShift Internal Registry](https://docs.openshift.com/container-platform/latest/registry/registry-options.html#registry-integrated-openshift-registry_registry-options)?
-
-Yes! Follow these steps:
-
-- Connect to your OpenShift installation:
- https://docs.openshift.com/container-platform/latest/cli_reference/openshift_cli/getting-started-cli.html#cli-logging-in_cli-developer-commands
-- Expose the OpenShift Internal Registry so you can push to it:
- https://docs.openshift.com/container-platform/latest/registry/securing-exposing-registry.html
-- Export your token to `$HOME/.docker/config.json`:
-
-```sh
-oc registry login --to=$HOME/.docker/config.json
-```
-
-- Create a namespace where you will push your images, i.e: `ko-images`
-- Execute this command to set `KO_DOCKER_REPO` to publish images to the internal
- registry.
+`ko` makes [multi-platform builds](https://ko.build/features/multi-platform/) easy, produces [SBOMs](https://ko.build/features/sboms/) by default, and includes support for simple YAML templating which makes it a powerful tool for [Kubernetes applications](https://ko.build/features/k8s/).
-```sh
- export KO_DOCKER_REPO=$(oc registry info --public)/ko-images
-```
+# [Install `ko`](https://ko.build/install/) and [get started](https://ko.build/get-started/)!
-# Acknowledgements
+### Acknowledgements
This work is based heavily on experience from having built the [Docker](https://github.com/bazelbuild/rules_docker) and [Kubernetes](https://github.com/bazelbuild/rules_k8s) support for [Bazel](https://bazel.build).
That work was presented [here](https://www.youtube.com/watch?v=RS1aiQqgUTA).
-# Discuss
+### Discuss
Questions? Comments? Ideas?
Come discuss `ko` with us in the `#ko-project` channel on the [Kubernetes Slack](https://slack.k8s.io)!
diff --git a/docs/index.md b/docs/index.md
index 9f84ecb03e..741903ac24 100644
--- a/docs/index.md
+++ b/docs/index.md
@@ -2,6 +2,8 @@
ko_meta: true
---
+> 🎉 Google has applied for `ko` to join the Cloud Native Computing Foundation as a Sandbox project! Learn more [here](https://opensource.googleblog.com/2022/10/ko-applies-to-become-a-cncf-sandbox-project.html)!
+
# Introduction
`ko` makes building Go container images easy, fast, and secure by default.
@@ -15,7 +17,7 @@ It's ideal for use cases where your image contains a single Go application witho
`ko` builds images by executing `go build` on your local machine, and as such doesn't require `docker` to be installed.
This can make it a good fit for lightweight CI/CD use cases.
-`ko` also includes support for simple YAML templating which makes it a powerful tool for [Kubernetes applications](./features/k8s).
+`ko` makes [multi-platform builds](https://ko.build/features/multi-platform/) easy, produces [SBOMs](https://ko.build/features/sboms/) by default, and includes support for simple YAML templating which makes it a powerful tool for [Kubernetes applications](https://ko.build/features/k8s/).
---
@@ -28,8 +30,9 @@ This can make it a good fit for lightweight CI/CD use cases.
- [Knative](https://knative.dev)
- [Tekton](https://tekton.dev)
- [Karpenter](https://karpenter.sh)
+- [Kyverno](https://kyverno.io)
- [Sigstore](https://sigstore.dev)
- [Shipwright](https://shipwright.io)
-[_Add your project here!_](https://github.com/imjasonh/ko.build/edit/main/docs/index.md)
+[_Add your project here!_](https://github.com/ko-build/ko/edit/main/docs/index.md)
diff --git a/docs/install.md b/docs/install.md
index d687c28361..91779586a5 100644
--- a/docs/install.md
+++ b/docs/install.md
@@ -53,6 +53,6 @@ You can use the [setup-ko](https://github.com/imjasonh/setup-ko) action to insta
```plaintext
steps:
-- uses: imjasonh/setup-ko@v0.4
+- uses: imjasonh/setup-ko@v0.6
```
diff --git a/mkdocs.yml b/mkdocs.yml
index 1f6d7bff30..4467e8487f 100644
--- a/mkdocs.yml
+++ b/mkdocs.yml
@@ -34,7 +34,6 @@ nav:
- 'ko build': reference/ko_build.md
- 'ko create': reference/ko_create.md
- 'ko delete': reference/ko_delete.md
- - 'ko deps': reference/ko_deps.md
- 'ko login': reference/ko_login.md
- 'ko resolve': reference/ko_resolve.md
- 'ko run': reference/ko_run.md