1
0
mirror of https://github.com/ko-build/ko.git synced 2025-11-23 22:35:11 +02:00

another docs update (#856)

* another docs update

- remove duplicate content from README.md
- mention CNCF announcement in README and index.md
- mention Kyverno adoption
- drop broken ko deps link
- mention SBOMs and multi-platform in intro section

* rename k8s slack channel
This commit is contained in:
Jason Hall
2022-10-21 16:31:27 -04:00
committed by GitHub
parent e03e4448be
commit 600d003dca
4 changed files with 16 additions and 599 deletions

605
README.md
View File

@@ -5,7 +5,11 @@
[![Go Report Card](https://goreportcard.com/badge/ko-build/ko)](https://goreportcard.com/report/ko-build/ko) [![Go Report Card](https://goreportcard.com/badge/ko-build/ko)](https://goreportcard.com/report/ko-build/ko)
[![SLSA 3](https://slsa.dev/images/gh-badge-level3.svg)](https://slsa.dev/images/gh-badge-level3.svg) [![SLSA 3](https://slsa.dev/images/gh-badge-level3.svg)](https://slsa.dev/images/gh-badge-level3.svg)
<img src="./logo/ko.png" width="300"> <img src="./docs/images/demo.png" width="100%">
---
> 🎉 Google has applied for `ko` to join the Cloud Native Computing Foundation as a Sandbox project! Learn more [here](https://opensource.googleblog.com/2022/10/ko-applies-to-become-a-cncf-sandbox-project.html)!
`ko` is a simple, fast container image builder for Go applications. `ko` is a simple, fast container image builder for Go applications.
@@ -17,606 +21,17 @@ dependencies).
and as such doesn't require `docker` to be installed. This can make it a good and as such doesn't require `docker` to be installed. This can make it a good
fit for lightweight CI/CD use cases. fit for lightweight CI/CD use cases.
`ko` also includes support for simple YAML templating which makes it a powerful `ko` makes [multi-platform builds](https://ko.build/features/multi-platform/) easy, produces [SBOMs](https://ko.build/features/sboms/) by default, and includes support for simple YAML templating which makes it a powerful tool for [Kubernetes applications](https://ko.build/features/k8s/).
tool for Kubernetes applications ([See below](#Kubernetes-Integration)).
# Setup # [Install `ko`](https://ko.build/install/) and [get started](https://ko.build/get-started/)!
## Install ### Acknowledgements
### Install from [GitHub Releases](https://github.com/ko-build/ko/releases)
```
$ VERSION=TODO # choose the latest version
$ OS=Linux # or Darwin
$ ARCH=x86_64 # or arm64, i386, s390x
```
We generate [SLSA3 provenance](slsa.dev) using the OpenSSF's [slsa-framework/slsa-github-generator](https://github.com/slsa-framework/slsa-github-generator). To verify our release, install the verification tool from [slsa-framework/slsa-verifier#installation](https://github.com/slsa-framework/slsa-verifier#installation) and verify as follows:
```shell
$ curl -sL "https://github.com/ko-build/ko/releases/download/v${VERSION}/ko_${VERSION}_${OS}_${ARCH}.tar.gz" > ko.tar.gz
$ curl -sL https://github.com/ko-build/ko/releases/download/v${VERSION}/attestation.intoto.jsonl > provenance.intoto.jsonl
$ slsa-verifier -artifact-path ko.tar.gz -provenance provenance.intoto.jsonl -source github.com/google/ko -tag "v${VERSION}"
PASSED: Verified SLSA provenance
```
```shell
$ tar xzf ko.tar.gz ko
$ chmod +x ./ko
```
### Install using [Homebrew](https://brew.sh)
```
brew install ko
```
### Install on [Alpine Linux](https://www.alpinelinux.org)
Installation on Alpine requires using the [`testing` repository](https://wiki.alpinelinux.org/wiki/Enable_Community_Repository#Using_testing_repositories)
```
echo https://dl-cdn.alpinelinux.org/alpine/edge/testing/ >> /etc/apk/repositories
apk update
apk add ko
```
### Build and Install from Source
With Go 1.18+, build and install the latest released version:
```
go install github.com/google/ko@latest
```
### Setup on GitHub Actions
You can use the [`setup-ko`](https://github.com/imjasonh/setup-ko) action
to install `ko` and setup auth to [GitHub Container
Registry](https://github.com/features/packages) in a GitHub Action workflow:
```
steps:
- uses: imjasonh/setup-ko@v0.6
```
## Authenticate
`ko` depends on the authentication configured in your Docker config (typically
`~/.docker/config.json`). If you can push an image with `docker push`, you are
already authenticated for `ko`.
Since `ko` doesn't require `docker`, `ko login` also provides a surface for
logging in to a container image registry with a username and password, similar
to
[`docker login`](https://docs.docker.com/engine/reference/commandline/login/).
Additionally, if auth is not configured in the Docker config, `ko` includes
built-in support for authenticating to the following container registries using
credentials configured in the environment:
- Google Container Registry and Artifact Registry
- using [Application Default Credentials](https://cloud.google.com/docs/authentication/production) or auth configured in `gcloud`.
- Amazon Elastic Container Registry
- using [AWS credentials](https://github.com/awslabs/amazon-ecr-credential-helper/#aws-credentials)
- Azure Container Registry
- using [environment variables](https://github.com/chrismellard/docker-credential-acr-env/)
- GitHub Container Registry
- using the `GITHUB_TOKEN` environment variable
## Choose Destination
`ko` depends on an environment variable, `KO_DOCKER_REPO`, to identify where it
should push images that it builds. Typically this will be a remote registry,
e.g.:
- `KO_DOCKER_REPO=gcr.io/my-project`, or
- `KO_DOCKER_REPO=my-dockerhub-user`
`ko` will default to storing sboms in the same repo as the image it is building. But there is an environment variable
named `COSIGN_REPOSITORY` that enables you to specify a different repository for storing sboms.
`KO_DOCKER_REPO=my-dockerhub-user COSIGN_REPOSITORY=gcr.io/my-project/sboms`
# Build an Image
`ko build ./cmd/app` builds and pushes a container image, and prints the
resulting image digest to stdout.
In this example, `./cmd/app` must be a `package main` that defines `func main()`.
```
ko build ./cmd/app
...
gcr.io/my-project/app-099ba5bcefdead87f92606265fb99ac0@sha256:6e398316742b7aa4a93161dce4a23bc5c545700b862b43347b941000b112ec3e
```
> NB: Prior to v0.10, the command was called `ko publish` -- this is equivalent
> to `ko build`, and both commands will work and do the same thing.
The executable binary that was built from `./cmd/app` is available in the image at `/ko-app/app` -- the binary name matches the base import path name -- and that binary is the image's entrypoint.
Because the output of `ko build` is an image reference, you can easily pass it
to other tools that expect to take an image reference.
To run the container locally:
```
docker run -p 8080:8080 $(ko build ./cmd/app)
```
Or to deploy it to other services like
[Cloud Run](https://cloud.google.com/run):
```
gcloud run deploy --image=$(ko build ./cmd/app)
```
* Note: The image must be pushed to [Google Container Registry](https://cloud.google.com/container-registry) or [Artifact Registry](https://cloud.google.com/artifact-registry).
Or [fly.io](https://fly.io):
```
flyctl launch --image=$(ko build ./cmd/app)
```
* Note: The image must be publicly available.
Or [AWS Lambda](https://aws.amazon.com/lambda/):
```
aws lambda update-function-code \
--function-name=my-function-name \
--image-uri=$(ko build ./cmd/app)
```
* Note: The image must be pushed to [ECR](https://aws.amazon.com/ecr/), based on the AWS provided base image, and use the [`aws-lambda-go`](https://github.com/aws/aws-lambda-go) framework.
See [official docs](https://docs.aws.amazon.com/lambda/latest/dg/go-image.html) for more information.
Or [Azure Container Apps](https://azure.microsoft.com/services/container-apps/):
```
az containerapp update \
--name my-container-app
--resource-group my-resource-group
--image $(ko build ./cmd/app)
```
* Note: The image must be pushed to [ACR](https://azure.microsoft.com/services/container-registry/) or other registry service.
See [official docs](https://docs.microsoft.com/azure/container-apps/) for more information.
## Configuration
Aside from `KO_DOCKER_REPO`, you can configure `ko`'s behavior using a
`.ko.yaml` file. The location of this file can be overridden with
`KO_CONFIG_PATH`.
### Overriding Base Images
By default, `ko` bases images on `gcr.io/distroless/static:nonroot`. This is a
small image that provides the bare necessities to run your Go binary.
You can override this base image in two ways:
1. To override the base image for all images `ko` builds, add this line to your
`.ko.yaml` file:
```yaml
defaultBaseImage: registry.example.com/base/image
```
2. To override the base image for certain importpaths:
```yaml
baseImageOverrides:
github.com/my-user/my-repo/cmd/app: registry.example.com/base/for/app
github.com/my-user/my-repo/cmd/foo: registry.example.com/base/for/foo
```
### Overriding Go build settings
By default, `ko` builds the binary with no additional build flags other than
`-trimpath`. You can replace the default build
arguments by providing build flags and ldflags using a
[GoReleaser](https://github.com/goreleaser/goreleaser) influenced `builds`
configuration section in your `.ko.yaml`.
```yaml
builds:
- id: foo
dir: . # default is .
main: ./foobar/foo
env:
- GOPRIVATE=git.internal.example.com,source.developers.google.com
flags:
- -tags
- netgo
ldflags:
- -s -w
- -extldflags "-static"
- -X main.version={{.Env.VERSION}}
- id: bar
dir: ./bar
main: . # default is .
env:
- GOCACHE=/workspace/.gocache
ldflags:
- -s
- -w
```
If your repository contains multiple modules (multiple `go.mod` files in
different directories), use the `dir` field to specify the directory where
`ko` should run `go build`.
`ko` picks the entry from `builds` based on the import path you request. The
import path is matched against the result of joining `dir` and `main`.
The paths specified in `dir` and `main` are relative to the working directory
of the `ko` process.
The `ldflags` default value is `[]`.
_Please note:_ Even though the configuration section is similar to the
[GoReleaser `builds` section](https://goreleaser.com/customization/build/),
only the `env`, `flags` and `ldflags` fields are currently supported. Also, the
templating support is currently limited to using environment variables only.
## Naming Images
`ko` provides a few different strategies for naming the image it pushes, to
workaround certain registry limitations and user preferences:
Given `KO_DOCKER_REPO=registry.example.com/repo`, by default,
`ko build ./cmd/app` will produce an image named like
`registry.example.com/repo/app-<md5>`, which includes the MD5 hash of the full
import path, to avoid collisions.
- `--preserve-import-path` (`-P`) will include the entire importpath:
`registry.example.com/repo/github.com/my-user/my-repo/cmd/app`
- `--base-import-paths` (`-B`) will omit the MD5 portion:
`registry.example.com/repo/app`
- `--bare` will only include the `KO_DOCKER_REPO`: `registry.example.com/repo`
## Local Publishing Options
`ko` is normally used to publish images to container image registries,
identified by `KO_DOCKER_REPO`.
`ko` can also load images to a local Docker daemon, if available, by setting
`KO_DOCKER_REPO=ko.local`, or by passing the `--local` (`-L`) flag.
Local images can be used as a base image for other `ko` images:
```yaml
defaultBaseImage: ko.local/example/base/image
```
`ko` can also load images into a local [KinD](https://kind.sigs.k8s.io)
cluster, if available, by setting `KO_DOCKER_REPO=kind.local`. By default this
loads into the default KinD cluster name (`kind`). To load into another KinD
cluster, set `KIND_CLUSTER_NAME=my-other-cluster`.
## Multi-Platform Images
Because Go supports cross-compilation to other CPU architectures and operating
systems, `ko` excels at producing multi-platform images.
To build and push an image for all platforms supported by the configured base
image, simply add `--platform=all`. This will instruct `ko` to look up all the
supported platforms in the base image, execute
`GOOS=<os> GOARCH=<arch> GOARM=<variant> go build` for each platform, and
produce a manifest list containing an image for each platform.
You can also select specific platforms, for example,
`--platform=linux/amd64,linux/arm64`
## Generating SBOMs
A [Software Bill of Materials](https://en.wikipedia.org/wiki/Software_bill_of_materials) (SBOM) is a list of software components that a software artifact depends on.
Having a list of dependencies can be helpful in determining whether any vulnerable components were used to build the software artifact.
From v0.9+, `ko` generates and uploads an SBOM for every image it produces by default.
`ko` will generate an SBOM in the [SPDX](https://spdx.dev/) format by default, but you can select the [CycloneDX](https://cyclonedx.org/) format instead with the `--sbom=cyclonedx` flag. To disable SBOM generation, pass `--sbom=none`.
These SBOMs can be downloaded using the [`cosign download sbom`](https://github.com/sigstore/cosign/blob/main/doc/cosign_download_sbom.md) command.
But you can prefer to write SBOM to disk by giving the `--sbom-dir` flag instead of uploading it to registry, and `ko` will decide the extension based on the format you defined in the `--sbom` flag and file name based on the import path of your project.
## Static Assets
`ko` can also bundle static assets into the images it produces.
By convention, any contents of a directory named `<importpath>/kodata/` will be
bundled into the image, and the path where it's available in the image will be
identified by the environment variable `KO_DATA_PATH`.
As an example, you can bundle and serve static contents in your image:
```
cmd/
app/
main.go
kodata/
favicon.ico
index.html
```
Then, in your `main.go`:
```go
func main() {
http.Handle("/", http.FileServer(http.Dir(os.Getenv("KO_DATA_PATH"))))
log.Fatal(http.ListenAndServe(":8080", nil))
}
```
You can simulate `ko`'s behavior outside of the container image by setting the
`KO_DATA_PATH` environment variable yourself:
```
KO_DATA_PATH=cmd/app/kodata/ go run ./cmd/app
```
**Tip:** Symlinks in `kodata` are followed and included as well. For example,
you can include Git commit information in your image with:
```
ln -s -r .git/HEAD ./cmd/app/kodata/
```
Also note that `http.FileServer` will not serve the `Last-Modified` header
(or validate `If-Modified-Since` request headers) because `ko` does not embed
timestamps by default.
This can be supported by manually setting the `KO_DATA_DATE_EPOCH` environment
variable during build ([See below](#Why-are-my-images-all-created-in-1970)).
# Kubernetes Integration
You could stop at just building and pushing images.
But, because building images is so _easy_ with `ko`, and because building with
`ko` only requires a string importpath to identify the image, we can integrate
this with YAML generation to make Kubernetes use cases much simpler.
## YAML Changes
Traditionally, you might have a Kubernetes deployment, defined in a YAML file,
that runs an image:
```yaml
apiVersion: apps/v1
kind: Deployment
metadata:
name: my-deployment
spec:
replicas: 3
...
template:
spec:
containers:
- name: my-app
image: registry.example.com/my-app:v1.2.3
```
...which you apply to your cluster with `kubectl apply`:
```
kubectl apply -f deployment.yaml
```
With `ko`, you can instead reference your Go binary by its importpath, prefixed
with `ko://`:
```yaml
...
spec:
containers:
- name: my-app
image: ko://github.com/my-user/my-repo/cmd/app
```
## `ko resolve`
With this small change, running `ko resolve -f deployment.yaml` will instruct
`ko` to:
1. scan the YAML file(s) for values with the `ko://` prefix,
2. for each unique `ko://`-prefixed string, execute `ko build <importpath>` to
build and push an image,
3. replace `ko://`-prefixed string(s) in the input YAML with the fully-specified
image reference of the built image(s), for example:
```yaml ...
spec:
containers:
- name: my-app
image: registry.example.com/github.com/my-user/my-repo/cmd/app@sha256:deadb33f...
```
4. Print the resulting resolved YAML to stdout.
The result can be redirected to a file, to distribute to others:
```
ko resolve -f config/ > release.yaml
```
Taken together, `ko resolve` aims to make packaging, pushing, and referencing
container images an invisible implementation detail of your Kubernetes
deployment, and let you focus on writing code in Go.
## `ko apply`
To apply the resulting resolved YAML config, you can redirect the output of
`ko resolve` to `kubectl apply`:
```
ko resolve -f config/ | kubectl apply -f -
```
Since this is a relatively common use case, the same functionality is available
using `ko apply`:
```
ko apply -f config/
```
Also, any flags passed after `--` are passed to `kubectl apply` directly, for example to specify context and kubeconfig:
```
ko apply -f config -- --context=foo --kubeconfig=cfg.yaml
```
**NB:** This requires that `kubectl` is available.
## `ko delete`
To teardown resources applied using `ko apply`, you can run `ko delete`:
```
ko delete -f config/
```
This is purely a convenient alias for `kubectl delete`, and doesn't perform any
builds, or delete any previously built images.
# Frequently Asked Questions
## How can I set `ldflags`?
[Using -ldflags](https://blog.cloudflare.com/setting-go-variables-at-compile-time/)
is a common way to embed version info in go binaries (In fact, we do this for
`ko`!). Unfortunately, because `ko` wraps `go build`, it's not possible to use
this flag directly; however, you can use the `GOFLAGS` environment variable
instead:
```sh
GOFLAGS="-ldflags=-X=main.version=1.2.3" ko build .
```
## How can I set multiple `ldflags`?
Currently, there is a limitation that does not allow to set multiple arguments
in `ldflags` using `GOFLAGS`. Using `-ldflags` multiple times also does not
work. In this use case, it works best to use the [`builds` section](#overriding-go-build-settings)
in the `.ko.yaml` file.
## Why are my images all created in 1970?
In order to support [reproducible builds](https://reproducible-builds.org), `ko`
doesn't embed timestamps in the images it produces by default.
However, `ko` does respect the [`SOURCE_DATE_EPOCH`](https://reproducible-builds.org/docs/source-date-epoch/)
environment variable, which will set the container image's timestamp
accordingly.
Similarly, the `KO_DATA_DATE_EPOCH` environment variable can be used to set
the _modtime_ timestamp of the files in `KO_DATA_PATH`.
For example, you can set the container image's timestamp to the current
timestamp by executing:
```
export SOURCE_DATE_EPOCH=$(date +%s)
```
or set the timestamp of the files in `KO_DATA_PATH` to the latest git commit's
timestamp with:
```
export KO_DATA_DATE_EPOCH=$(git log -1 --format='%ct')
```
## Can I build Windows containers?
Yes, but support for Windows containers is new, experimental, and tenuous. Be prepared to file bugs. 🐛
The default base image does not provide a Windows image.
You can try out building a Windows container image by [setting the base image](#overriding-base-images) to a Windows base image and building with `--platform=windows/amd64` or `--platform=all`:
For example, to build a Windows container image for `ko`, from within this repo:
```
ko build ./ --platform=windows/amd64
```
This works because the `ko` image is configured in [`.ko.yaml`](./.ko.yaml) to be based on a `golang` base image, which provides platform-specific images for both Linux and Windows.
### Known issues 🐛
- Symlinks in `kodata` are ignored when building Windows images; only regular files and directories will be included in the Windows image.
## Can I optimize images for [eStargz support](https://github.com/containerd/stargz-snapshotter/blob/v0.7.0/docs/stargz-estargz.md)?
Yes! Set the environment variable `GGCR_EXPERIMENT_ESTARGZ=1` to produce
eStargz-optimized images.
## Does `ko` support autocompletion?
Yes! `ko completion` generates a Bash/Zsh/Fish/PowerShell completion script.
You can get how to load it from help document.
```
ko completion [bash|zsh|fish|powershell] --help
```
Or, you can source it directly:
```bash
source <(ko completion)
```
## Does `ko` work with [Kustomize](https://kustomize.io/)?
Yes! `ko resolve -f -` will read and process input from stdin, so you can have
`ko` easily process the output of the `kustomize` command.
```
kustomize build config | ko resolve -f -
```
## Does `ko` integrate with other build and development tools?
Oh, you betcha. Here's a partial list:
- `ko` support in [Carvel's `kbld`](https://carvel.dev/kbld/docs/latest/config/#ko)
- `ko` support in [Skaffold](https://skaffold.dev/docs/pipeline-stages/builders/ko/)
- `ko` extension for [Tilt](https://github.com/tilt-dev/tilt-extensions/tree/master/ko)
- `ko` support for [goreleaser](https://github.com/goreleaser/goreleaser/pull/2564) (proposed)
## Does `ko` work with [OpenShift Internal Registry](https://docs.openshift.com/container-platform/latest/registry/registry-options.html#registry-integrated-openshift-registry_registry-options)?
Yes! Follow these steps:
- Connect to your OpenShift installation:
https://docs.openshift.com/container-platform/latest/cli_reference/openshift_cli/getting-started-cli.html#cli-logging-in_cli-developer-commands
- Expose the OpenShift Internal Registry so you can push to it:
https://docs.openshift.com/container-platform/latest/registry/securing-exposing-registry.html
- Export your token to `$HOME/.docker/config.json`:
```sh
oc registry login --to=$HOME/.docker/config.json
```
- Create a namespace where you will push your images, i.e: `ko-images`
- Execute this command to set `KO_DOCKER_REPO` to publish images to the internal
registry.
```sh
export KO_DOCKER_REPO=$(oc registry info --public)/ko-images
```
# Acknowledgements
This work is based heavily on experience from having built the [Docker](https://github.com/bazelbuild/rules_docker) and [Kubernetes](https://github.com/bazelbuild/rules_k8s) support for [Bazel](https://bazel.build). This work is based heavily on experience from having built the [Docker](https://github.com/bazelbuild/rules_docker) and [Kubernetes](https://github.com/bazelbuild/rules_k8s) support for [Bazel](https://bazel.build).
That work was presented [here](https://www.youtube.com/watch?v=RS1aiQqgUTA). That work was presented [here](https://www.youtube.com/watch?v=RS1aiQqgUTA).
# Discuss ### Discuss
Questions? Comments? Ideas? Questions? Comments? Ideas?
Come discuss `ko` with us in the `#ko-project` channel on the [Kubernetes Slack](https://slack.k8s.io)! Come discuss `ko` with us in the `#ko-build` channel on the [Kubernetes Slack](https://slack.k8s.io)!
See you there! See you there!

View File

@@ -2,6 +2,8 @@
ko_meta: true ko_meta: true
--- ---
> 🎉 Google has applied for `ko` to join the Cloud Native Computing Foundation as a Sandbox project! Learn more [here](https://opensource.googleblog.com/2022/10/ko-applies-to-become-a-cncf-sandbox-project.html)!
# Introduction # Introduction
`ko` makes building Go container images easy, fast, and secure by default. `ko` makes building Go container images easy, fast, and secure by default.
@@ -15,7 +17,7 @@ It's ideal for use cases where your image contains a single Go application witho
`ko` builds images by executing `go build` on your local machine, and as such doesn't require `docker` to be installed. `ko` builds images by executing `go build` on your local machine, and as such doesn't require `docker` to be installed.
This can make it a good fit for lightweight CI/CD use cases. This can make it a good fit for lightweight CI/CD use cases.
`ko` also includes support for simple YAML templating which makes it a powerful tool for [Kubernetes applications](./features/k8s). `ko` makes [multi-platform builds](https://ko.build/features/multi-platform/) easy, produces [SBOMs](https://ko.build/features/sboms/) by default, and includes support for simple YAML templating which makes it a powerful tool for [Kubernetes applications](https://ko.build/features/k8s/).
--- ---
@@ -28,8 +30,9 @@ This can make it a good fit for lightweight CI/CD use cases.
- [Knative](https://knative.dev) - [Knative](https://knative.dev)
- [Tekton](https://tekton.dev) - [Tekton](https://tekton.dev)
- [Karpenter](https://karpenter.sh) - [Karpenter](https://karpenter.sh)
- [Kyverno](https://kyverno.io)
- [Sigstore](https://sigstore.dev) - [Sigstore](https://sigstore.dev)
- [Shipwright](https://shipwright.io) - [Shipwright](https://shipwright.io)
[_Add your project here!_](https://github.com/imjasonh/ko.build/edit/main/docs/index.md) [_Add your project here!_](https://github.com/ko-build/ko/edit/main/docs/index.md)

View File

@@ -53,6 +53,6 @@ You can use the [setup-ko](https://github.com/imjasonh/setup-ko) action to insta
```plaintext ```plaintext
steps: steps:
- uses: imjasonh/setup-ko@v0.4 - uses: imjasonh/setup-ko@v0.6
``` ```

View File

@@ -34,7 +34,6 @@ nav:
- 'ko build': reference/ko_build.md - 'ko build': reference/ko_build.md
- 'ko create': reference/ko_create.md - 'ko create': reference/ko_create.md
- 'ko delete': reference/ko_delete.md - 'ko delete': reference/ko_delete.md
- 'ko deps': reference/ko_deps.md
- 'ko login': reference/ko_login.md - 'ko login': reference/ko_login.md
- 'ko resolve': reference/ko_resolve.md - 'ko resolve': reference/ko_resolve.md
- 'ko run': reference/ko_run.md - 'ko run': reference/ko_run.md