Skip to content

Releases: carvel-dev/kapp-controller

v0.53.1

05 Sep 08:13
Compare
Choose a tag to compare

Installation and signature verification

Installation of kctrl

By downloading binary from the release

For instance, if you are using Linux on an AMD64 architecture:

# Download the binary
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.53.1/kctrl-linux-amd64
# Move the binary in to your PATH
mv kctrl-linux-amd64 /usr/local/bin/kctrl
# Make the binary executable
chmod +x /usr/local/bin/kctrl

Via Homebrew (macOS or Linux)

$ brew tap carvel-dev/carvel
$ brew install kctrl
$ kctrl version

Verify checksums file signature

Install cosign on your system https://docs.sigstore.dev/system_config/installation/

The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:

# Download the checksums file, certificate, and signature
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.53.1/checksums.txt
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.53.1/checksums.txt.pem
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.53.1/checksums.txt.sig

### Verify the checksums file
cosign verify-blob checksums.txt --certificate checksums.txt.pem --signature checksums.txt.sig --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com 

Verify binary integrity

To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature. For instance, if you are using Linux on an AMD64 architecture:

# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missing

Installation of kapp-controller

kapp-controller can be installed by using kapp

kapp deploy -a kc -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.53.1/release.yml

or by using kubectl

kubectl deploy -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.53.1/release.yml

Container Images

Kapp-controller and Kapp-controller-package-bundle images are available in Github Container Registry.

OCI Image URLs

  • ghcr.io/carvel-dev/kapp-controller@sha256:da1ac76b07c0961ec0a1573615cb8c121fd0a4c443a0bb7f73780242d05161f0
  • ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:3d0a4b6be92b0037248b99195b7776e8e39e3e073999c6a44efda9e7587f85b8

Verify container image signature

The container images are signed using Cosign with GitHub OIDC. To validate the signature of OCI images, run the following commands:

# Verifying kapp-controller image
cosign verify ghcr.io/carvel-dev/kapp-controller@sha256:da1ac76b07c0961ec0a1573615cb8c121fd0a4c443a0bb7f73780242d05161f0 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text

# Verifying kapp-controller-package-bundle image
cosign verify ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:3d0a4b6be92b0037248b99195b7776e8e39e3e073999c6a44efda9e7587f85b8 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text

✨ What's new

Full Changelog: v0.53.0...v0.53.1

📂 Files Checksum

d09229fec56445e891d586236f56802a7b3b7b7db69ef3410f3c4e2d3abc9a8c  ./release.yml
a04c9e50130c0822d5b940aca1d3031fd6d3e065c907d70cd7b33b91199ff521  ./kctrl-darwin-amd64
08b0e63e3f2948ae9ef108d1c0407ffe1c0c35eb635c0347bb0b17263b24e353  ./kctrl-darwin-arm64
008e8543a1389ab29a75470a6f602b569e28fa866f72ddb214df32d57e09ed1c  ./kctrl-linux-amd64
3536d4fce287e8979d1c93d44309cf86db88e720b416e38f9346ddc5dfd95b28  ./kctrl-linux-arm64
e89a7b3c402c554397ad8a9169e92d878a978e1d857c59f3c29fb05f46d55c57  ./kctrl-windows-amd64.exe
d63f30752b629ea056af037d32e03975e95858476e875c751a963dd34627ad0e  ./package.yml
7a6aa35600459a1797a6f0564ae89954e6da035fe54e19b72c573f5b31938a8c  ./package-metadata.yml

v0.53.0

23 Jul 09:43
Compare
Choose a tag to compare

Installation and signature verification

Installation of kctrl

By downloading binary from the release

For instance, if you are using Linux on an AMD64 architecture:

# Download the binary
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.53.0/kctrl-linux-amd64
# Move the binary in to your PATH
mv kctrl-linux-amd64 /usr/local/bin/kctrl
# Make the binary executable
chmod +x /usr/local/bin/kctrl

Via Homebrew (macOS or Linux)

$ brew tap carvel-dev/carvel
$ brew install kctrl
$ kctrl version

Verify checksums file signature

Install cosign on your system https://docs.sigstore.dev/system_config/installation/

The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:

# Download the checksums file, certificate, and signature
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.53.0/checksums.txt
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.53.0/checksums.txt.pem
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.53.0/checksums.txt.sig

### Verify the checksums file
cosign verify-blob checksums.txt --certificate checksums.txt.pem --signature checksums.txt.sig --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com 

Verify binary integrity

To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature. For instance, if you are using Linux on an AMD64 architecture:

# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missing

Installation of kapp-controller

kapp-controller can be installed by using kapp

kapp deploy -a kc -f https://github.com/carvel-dev/kapp-controller/releases/v0.53.0/download/release.yml

or by using kubectl

kubectl deploy -f https://github.com/carvel-dev/kapp-controller/releases/v0.53.0/download/release.yml

Container Images

Kapp-controller and Kapp-controller-package-bundle images are available in Github Container Registry.

OCI Image URLs

  • ghcr.io/carvel-dev/kapp-controller@sha256:2368019cd18fdd82c08c48f5ba7cf6c2df50e35d7e92a16ec1f36c97538985f3
  • ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:9a39f5df36e21514b5d86e6c02849186a3b0f1b72c68651b70d73f2babde6835

Verify container image signature

The container images are signed using Cosign with GitHub OIDC. To validate the signature of OCI images, run the following commands:

# Verifying kapp-controller image
cosign verify ghcr.io/carvel-dev/kapp-controller@sha256:2368019cd18fdd82c08c48f5ba7cf6c2df50e35d7e92a16ec1f36c97538985f3 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text

# Verifying kapp-controller-package-bundle image
cosign verify ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:9a39f5df36e21514b5d86e6c02849186a3b0f1b72c68651b70d73f2babde6835 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text

✨ What's new

  • Added partial support for DownwardsAPI with kctrl package release command by @100mik in #1580
  • Add defaults for version flag while installing packages using kctrl by @100mik in #1588
  • Bumping dependencies and golang by @rohitagg2020 in #1600

Full Changelog: v0.52.0...v0.53.0

📂 Files Checksum

2457bed3b40c46ede4f8c44823dcf5eb05cc4cd1e8b30da05348df4aac2864c7  ./release.yml
0bee8254d2055bc833a197c777d2d79efc06c675c821da196765dacdae5ebeb0  ./kctrl-darwin-amd64
70a2cb40122f4ac750fb21d9e741e056344fcc463e38c7b9981f5a2fdd74bef6  ./kctrl-darwin-arm64
9c33cfaae971718221c44feeca85faa703e7399f2e9d3fc98c9b1160ee765fb3  ./kctrl-linux-amd64
0e8fde1c937c1ad49dd42de8f4a9a41ccbeb3514ced8c83ad15dc04e3f2a9a96  ./kctrl-linux-arm64
b276621bfd1857ed0c841e96f3d4c17de1e450609f227ad3b882af0cc13d7c5f  ./kctrl-windows-amd64.exe
883313f4580e7f45865b1a438fba2c3b9c142cd8bb6fb626dfa861ee58b3a335  ./package.yml
7a6aa35600459a1797a6f0564ae89954e6da035fe54e19b72c573f5b31938a8c  ./package-metadata.yml

v0.50.6

10 Sep 11:34
74ee426
Compare
Choose a tag to compare

Installation and signature verification

Installation of kctrl

By downloading binary from the release

For instance, if you are using Linux on an AMD64 architecture:

# Download the binary
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.50.6/kctrl-linux-amd64
# Move the binary in to your PATH
mv kctrl-linux-amd64 /usr/local/bin/kctrl
# Make the binary executable
chmod +x /usr/local/bin/kctrl

Via Homebrew (macOS or Linux)

$ brew tap carvel-dev/carvel
$ brew install kctrl
$ kctrl version

Verify checksums file signature

Install cosign on your system https://docs.sigstore.dev/system_config/installation/

The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:

# Download the checksums file, certificate, and signature
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.50.6/checksums.txt
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.50.6/checksums.txt.pem
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.50.6/checksums.txt.sig

### Verify the checksums file
cosign verify-blob checksums.txt --certificate checksums.txt.pem --signature checksums.txt.sig --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com 

Verify binary integrity

To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature. For instance, if you are using Linux on an AMD64 architecture:

# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missing

Installation of kapp-controller

kapp-controller can be installed by using kapp

kapp deploy -a kc -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.50.6/release.yml

or by using kubectl

kubectl deploy -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.50.6/release.yml

Container Images

Kapp-controller and Kapp-controller-package-bundle images are available in Github Container Registry.

OCI Image URLs

  • ghcr.io/carvel-dev/kapp-controller@sha256:3cead02490923568114691444b2ad7b5883948461fdd6b8e2c89e156bf407e47
  • ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:3364d1229cd0fcf8ffa81653786b8da2c3eb40627a60dfe926eb90d7cc28e38a

Verify container image signature

The container images are signed using Cosign with GitHub OIDC. To validate the signature of OCI images, run the following commands:

# Verifying kapp-controller image
cosign verify ghcr.io/carvel-dev/kapp-controller@sha256:3cead02490923568114691444b2ad7b5883948461fdd6b8e2c89e156bf407e47 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text

# Verifying kapp-controller-package-bundle image
cosign verify ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:3364d1229cd0fcf8ffa81653786b8da2c3eb40627a60dfe926eb90d7cc28e38a --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text

✨ What's new

Full Changelog: v0.50.5...v0.50.6

📂 Files Checksum

94d0a61c7c254262562a40103e40f775aa6000bb3e11660b0582c2d0696c8985  ./release.yml
fcf0ca77df0b33e598a9df467a53da8ba50ba71a1bdaeab048832824dd0ec902  ./kctrl-darwin-amd64
be2e3579f12e6df72e2fbe4a943a2d7ec372c102bfc5fd75bad22ceb77b8d12c  ./kctrl-darwin-arm64
789de8f69498a2625a9753c66c7c528b919c9ab82ad0bc8c69bf09f8df007c5d  ./kctrl-linux-amd64
624c44c4a711a9c7cd0133ae39da77d5d6788ebd0c03af90f469cb345ab85bd5  ./kctrl-linux-arm64
c411a55e675893d3ee274c7fc49538d5933425a244178e85214f41a6b714bdec  ./kctrl-windows-amd64.exe
05193b54ecd32b010651dd64e56be49af94d3603f84e50741a3176ea91e2f177  ./package.yml
7a6aa35600459a1797a6f0564ae89954e6da035fe54e19b72c573f5b31938a8c  ./package-metadata.yml

v0.50.5

19 Jul 05:14
92697df
Compare
Choose a tag to compare

Installation and signature verification

Installation of kctrl

By downloading binary from the release

For instance, if you are using Linux on an AMD64 architecture:

# Download the binary
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.50.5/kctrl-linux-amd64
# Move the binary in to your PATH
mv kctrl-linux-amd64 /usr/local/bin/kctrl
# Make the binary executable
chmod +x /usr/local/bin/kctrl

Via Homebrew (macOS or Linux)

$ brew tap carvel-dev/carvel
$ brew install kctrl
$ kctrl version

Verify checksums file signature

Install cosign on your system https://docs.sigstore.dev/system_config/installation/

The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:

# Download the checksums file, certificate, and signature
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.50.5/checksums.txt
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.50.5/checksums.txt.pem
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.50.5/checksums.txt.sig

### Verify the checksums file
cosign verify-blob checksums.txt --certificate checksums.txt.pem --signature checksums.txt.sig --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com 

Verify binary integrity

To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature. For instance, if you are using Linux on an AMD64 architecture:

# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missing

Installation of kapp-controller

kapp-controller can be installed by using kapp

kapp deploy -a kc -f https://github.com/carvel-dev/kapp-controller/releases/v0.50.5/download/release.yml

or by using kubectl

kubectl deploy -f https://github.com/carvel-dev/kapp-controller/releases/v0.50.5/download/release.yml

Container Images

Kapp-controller and Kapp-controller-package-bundle images are available in Github Container Registry.

OCI Image URLs

  • ghcr.io/carvel-dev/kapp-controller@sha256:d0cfb16343114064d8d6d78a2aa6b5e4112f921744f9edf5cf7ff66bca27a616
  • ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:4c8786d670bc5111edcd711e5d6628edef51bdf3ab6ed4a7453d46f0fc5a0aa5

Verify container image signature

The container images are signed using Cosign with GitHub OIDC. To validate the signature of OCI images, run the following commands:

# Verifying kapp-controller image
cosign verify ghcr.io/carvel-dev/kapp-controller@sha256:d0cfb16343114064d8d6d78a2aa6b5e4112f921744f9edf5cf7ff66bca27a616 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text

# Verifying kapp-controller-package-bundle image
cosign verify ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:4c8786d670bc5111edcd711e5d6628edef51bdf3ab6ed4a7453d46f0fc5a0aa5 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text

What's Changed

Full Changelog: v0.50.4...v0.50.5

📂 Files Checksum

69ed9280284b258f45a68afb4929f3e8e2eb1aa26b1498853425b140e42dcad9  ./release.yml
cef462e3d5778f303c51951d81e28ce3a6014105bf21cd3d7813a2911b26834a  ./kctrl-darwin-amd64
942e1e4c0289f4f9e71b991fe0d1e113b6fef3448b5fdd32c3d0c6b549e1f535  ./kctrl-darwin-arm64
f55f54eb0711dc5e7972801316044663a48ac4b6569bcb9f7e682a92e6c85b40  ./kctrl-linux-amd64
3c233ee05a28932f74bca9e9350f01922114f1fcc91067fe7a056f4e471b206a  ./kctrl-linux-arm64
646d0b444ae1924ee6b84e6a6b08861a402d8e10ee633a7c523703dec07c8cf4  ./kctrl-windows-amd64.exe
f64cb915ae5e3d1ca558e229ea5cc295d1fd7b248c2f8c437f2e79227a989e65  ./package.yml
7a6aa35600459a1797a6f0564ae89954e6da035fe54e19b72c573f5b31938a8c  ./package-metadata.yml

v0.52.0

13 May 05:34
e081d6a
Compare
Choose a tag to compare

Installation and signature verification

Installation of kctrl

By downloading binary from the release

For instance, if you are using Linux on an AMD64 architecture:

# Download the binary
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.52.0/kctrl-linux-amd64
# Move the binary in to your PATH
mv kctrl-linux-amd64 /usr/local/bin/kctrl
# Make the binary executable
chmod +x /usr/local/bin/kctrl

Via Homebrew (macOS or Linux)

$ brew tap carvel-dev/carvel
$ brew install kctrl
$ kctrl version

Verify checksums file signature

Install cosign on your system https://docs.sigstore.dev/system_config/installation/

The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:

# Download the checksums file, certificate, and signature
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.52.0/checksums.txt
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.52.0/checksums.txt.pem
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.52.0/checksums.txt.sig

### Verify the checksums file
cosign verify-blob checksums.txt --certificate checksums.txt.pem --signature checksums.txt.sig --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com 

Verify binary integrity

To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature. For instance, if you are using Linux on an AMD64 architecture:

# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missing

Installation of kapp-controller

kapp-controller can be installed by using kapp

kapp deploy -a kc -f https://github.com/carvel-dev/kapp-controller/releases/v0.52.0/download/release.yml

or by using kubectl

kubectl deploy -f https://github.com/carvel-dev/kapp-controller/releases/v0.52.0/download/release.yml

Container Images

Kapp-controller and Kapp-controller-package-bundle images are available in Github Container Registry.

OCI Image URLs

  • ghcr.io/carvel-dev/kapp-controller@sha256:b83bd139c42777bb4428c2ae421f93675a7d6147dff3147471d1be112d9c1eec
  • ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:2f18114d24b1c6d5aff1395bec8873c5177fec672f6c45c9c49eb83a6bdc1e58

Verify container image signature

The container images are signed using Cosign with GitHub OIDC. To validate the signature of OCI images, run the following commands:

# Verifying kapp-controller image
cosign verify ghcr.io/carvel-dev/kapp-controller@sha256:b83bd139c42777bb4428c2ae421f93675a7d6147dff3147471d1be112d9c1eec --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text

# Verifying kapp-controller-package-bundle image
cosign verify ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:2f18114d24b1c6d5aff1395bec8873c5177fec672f6c45c9c49eb83a6bdc1e58 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text

✨ What's new

  • The go module name is changed to carvel.dev/kapp-controller by #1390 by @joaopapereira in #1557
    • 🚨 For library users 🚨 note that this is a breaking change on this version, no impact for users that only use the binaries

Full Changelog: v0.51.0...v0.52.0

📂 Files Checksum

4deb3b2a3f579666daa0ee5a289a85dc0da35274d244035e7d2bedc95997b92f  ./release.yml
2e631dbaea16186bb6cec158d781748705ea425bd2e89d0a6c173f8ca2be3ca9  ./kctrl-darwin-amd64
4ad82f494d00aba3aa2e471a8721d2dde14e5390064230d418041f693f4bf1dc  ./kctrl-darwin-arm64
355e239fd2c8fe952620c301792098b4bcaebdd965d760a1a8283dd0824a3782  ./kctrl-linux-amd64
1959ba7885afb826c3f8760e69cb28a8b8917cb84075c85791c841d8f8f52c94  ./kctrl-linux-arm64
67d4c82c803553cc0ebdb7e9a3c142ca0d65b8685de310e19d9f6d9cdaad5af1  ./kctrl-windows-amd64.exe
e69ca728ee463cc2507bba91279ab986ff1e07e837165d669221462894311e50  ./package.yml
7a6aa35600459a1797a6f0564ae89954e6da035fe54e19b72c573f5b31938a8c  ./package-metadata.yml

v0.51.3

10 Sep 12:00
55f10e2
Compare
Choose a tag to compare

Installation and signature verification

Installation of kctrl

By downloading binary from the release

For instance, if you are using Linux on an AMD64 architecture:

# Download the binary
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.51.3/kctrl-linux-amd64
# Move the binary in to your PATH
mv kctrl-linux-amd64 /usr/local/bin/kctrl
# Make the binary executable
chmod +x /usr/local/bin/kctrl

Via Homebrew (macOS or Linux)

$ brew tap carvel-dev/carvel
$ brew install kctrl
$ kctrl version

Verify checksums file signature

Install cosign on your system https://docs.sigstore.dev/system_config/installation/

The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:

# Download the checksums file, certificate, and signature
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.51.3/checksums.txt
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.51.3/checksums.txt.pem
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.51.3/checksums.txt.sig

### Verify the checksums file
cosign verify-blob checksums.txt --certificate checksums.txt.pem --signature checksums.txt.sig --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com 

Verify binary integrity

To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature. For instance, if you are using Linux on an AMD64 architecture:

# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missing

Installation of kapp-controller

kapp-controller can be installed by using kapp

kapp deploy -a kc -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.51.3/release.yml

or by using kubectl

kubectl deploy -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.51.3/release.yml

Container Images

Kapp-controller and Kapp-controller-package-bundle images are available in Github Container Registry.

OCI Image URLs

  • ghcr.io/carvel-dev/kapp-controller@sha256:80f5ff5a2f2e030a8e5798e9919c00abfd23b4ba672dd854c0c27d4eaf769b18
  • ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:eb161072db8014b262acd33641aea01432f59af046fd71e6e043cb7117bb52a1

Verify container image signature

The container images are signed using Cosign with GitHub OIDC. To validate the signature of OCI images, run the following commands:

# Verifying kapp-controller image
cosign verify ghcr.io/carvel-dev/kapp-controller@sha256:80f5ff5a2f2e030a8e5798e9919c00abfd23b4ba672dd854c0c27d4eaf769b18 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text

# Verifying kapp-controller-package-bundle image
cosign verify ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:eb161072db8014b262acd33641aea01432f59af046fd71e6e043cb7117bb52a1 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text

✨ What's new

Full Changelog: v0.51.2...v0.51.3

📂 Files Checksum

c4c176ad62cb1fba708bd55d4a670d8b6258d77d67b7e6a2ef5c8a1073a463ba  ./release.yml
e2bfbad57dcc0731418c5479cc177d6a5b1e7abe028ab108810e2036741e010e  ./kctrl-darwin-amd64
e9cda39b601dd8f1338a10c921821cb9fb790814107fd9769def39666305600c  ./kctrl-darwin-arm64
00194617ddafe83ffb1dbe3048709dcb26562f48032568deba2811e80dcaaac0  ./kctrl-linux-amd64
3be24f8d0bed89935d8964c88bc7e34b4b71a7bc65ca4839de160e18dc7b1adf  ./kctrl-linux-arm64
5999a4bf3158185973ae3ff0a015e981b420966e92ed55e84a3461d4e7b2dbc2  ./kctrl-windows-amd64.exe
e1bf1f8678e9b3fb2650b97ec0fed56dd5b47f882c945bd544b02ec272a24b88  ./package.yml
7a6aa35600459a1797a6f0564ae89954e6da035fe54e19b72c573f5b31938a8c  ./package-metadata.yml

v0.51.2

19 Jul 05:42
1201992
Compare
Choose a tag to compare

Installation and signature verification

Installation of kctrl

By downloading binary from the release

For instance, if you are using Linux on an AMD64 architecture:

# Download the binary
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.51.2/kctrl-linux-amd64
# Move the binary in to your PATH
mv kctrl-linux-amd64 /usr/local/bin/kctrl
# Make the binary executable
chmod +x /usr/local/bin/kctrl

Via Homebrew (macOS or Linux)

$ brew tap carvel-dev/carvel
$ brew install kctrl
$ kctrl version

Verify checksums file signature

Install cosign on your system https://docs.sigstore.dev/system_config/installation/

The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:

# Download the checksums file, certificate, and signature
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.51.2/checksums.txt
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.51.2/checksums.txt.pem
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.51.2/checksums.txt.sig

### Verify the checksums file
cosign verify-blob checksums.txt --certificate checksums.txt.pem --signature checksums.txt.sig --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com 

Verify binary integrity

To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature. For instance, if you are using Linux on an AMD64 architecture:

# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missing

Installation of kapp-controller

kapp-controller can be installed by using kapp

kapp deploy -a kc -f https://github.com/carvel-dev/kapp-controller/releases/v0.51.2/download/release.yml

or by using kubectl

kubectl deploy -f https://github.com/carvel-dev/kapp-controller/releases/v0.51.2/download/release.yml

Container Images

Kapp-controller and Kapp-controller-package-bundle images are available in Github Container Registry.

OCI Image URLs

  • ghcr.io/carvel-dev/kapp-controller@sha256:56f4675eff64fba3d4524b8617bb4c3839a9d05b97014d8e7a02b63f37e0f6b7
  • ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:c200581ffcdb7106cf5a65ed0d42b7e9d2870655d32a8c11534f5543b1ab5811

Verify container image signature

The container images are signed using Cosign with GitHub OIDC. To validate the signature of OCI images, run the following commands:

# Verifying kapp-controller image
cosign verify ghcr.io/carvel-dev/kapp-controller@sha256:56f4675eff64fba3d4524b8617bb4c3839a9d05b97014d8e7a02b63f37e0f6b7 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text

# Verifying kapp-controller-package-bundle image
cosign verify ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:c200581ffcdb7106cf5a65ed0d42b7e9d2870655d32a8c11534f5543b1ab5811 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text

✨ What's new

Full Changelog: v0.51.1...v0.51.2

📂 Files Checksum

7a1618d8bdedff2cc2a1d1339c6b88b011bc9794aee1e6c8c005fd8549723d8a  ./release.yml
572393e641ef43455a093790bff328be44182389f2b48c071cf8f778f56b4db7  ./kctrl-darwin-amd64
1c4f354e33f9a0fc2c708979deb33e132a56a279f85e59a4f4f284e1249d9ac4  ./kctrl-darwin-arm64
f7baed2f35f751c6c92d03ff8d9f2d0239ac1d711ed3ac215c0c26cdf8774043  ./kctrl-linux-amd64
7e837eedd7419507d8882f2a0d4a6588d66984a1b88058daeec1524fe36b9d31  ./kctrl-linux-arm64
81761e7f65652d2f479231e73706a79b24dfa1eb047bb934cbf4d0a678963911  ./kctrl-windows-amd64.exe
0daaedc87bd8537095b288cd579878a258d9b4a89197fea0ccb3c2b7d3eb810f  ./package.yml
7a6aa35600459a1797a6f0564ae89954e6da035fe54e19b72c573f5b31938a8c  ./package-metadata.yml

v0.51.1

17 Jun 08:00
4b7c546
Compare
Choose a tag to compare

Installation and signature verification

Installation of kctrl

By downloading binary from the release

For instance, if you are using Linux on an AMD64 architecture:

# Download the binary
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.51.1/kctrl-linux-amd64
# Move the binary in to your PATH
mv kctrl-linux-amd64 /usr/local/bin/kctrl
# Make the binary executable
chmod +x /usr/local/bin/kctrl

Via Homebrew (macOS or Linux)

$ brew tap carvel-dev/carvel
$ brew install kctrl
$ kctrl version

Verify checksums file signature

Install cosign on your system https://docs.sigstore.dev/system_config/installation/

The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:

# Download the checksums file, certificate, and signature
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.51.1/checksums.txt
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.51.1/checksums.txt.pem
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.51.1/checksums.txt.sig

### Verify the checksums file
cosign verify-blob checksums.txt --certificate checksums.txt.pem --signature checksums.txt.sig --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com 

Verify binary integrity

To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature. For instance, if you are using Linux on an AMD64 architecture:

# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missing

Installation of kapp-controller

kapp-controller can be installed by using kapp

kapp deploy -a kc -f https://github.com/carvel-dev/kapp-controller/releases/v0.51.1/download/release.yml

or by using kubectl

kubectl deploy -f https://github.com/carvel-dev/kapp-controller/releases/v0.51.1/download/release.yml

Container Images

Kapp-controller and Kapp-controller-package-bundle images are available in Github Container Registry.

OCI Image URLs

  • ghcr.io/carvel-dev/kapp-controller@sha256:bb72e77120569dcb9f51a6a65c9a91a8a4a56fedc1c2939c583dc458d716b718
  • ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:265c7dfa7367384dc8e6d152985305d69425970b5f02ce626d5db8002f11199c

Verify container image signature

The container images are signed using Cosign with GitHub OIDC. To validate the signature of OCI images, run the following commands:

# Verifying kapp-controller image
cosign verify ghcr.io/carvel-dev/kapp-controller@sha256:bb72e77120569dcb9f51a6a65c9a91a8a4a56fedc1c2939c583dc458d716b718 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text

# Verifying kapp-controller-package-bundle image
cosign verify ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:265c7dfa7367384dc8e6d152985305d69425970b5f02ce626d5db8002f11199c --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text

✨ What's new

Full Changelog: v0.51.0...v0.51.1

📂 Files Checksum

32b4585a33beccd30e2d5409d9bdd2059c045f8dd059badf29913afaf7e6bd0a  ./release.yml
1afd2c7676f0f52b31fad067265fc407368b49d0451b5054a01d7228f773835f  ./kctrl-darwin-amd64
cbcfd347879c6e8b21ed9488a5ef4b43fd5818c40efba574d14d50b1de948b80  ./kctrl-darwin-arm64
99013610f7959d741be971d2fa917c705baec0e97e82aad35e067cdc284276fa  ./kctrl-linux-amd64
61aacd3143a73f97d7f190e1b692e7653951c51f1640f9e076a38712b7a81adc  ./kctrl-linux-arm64
b7e667dc652e8d1f059850aead71518468f42fbba8a3b2547652fc7ca0569629  ./kctrl-windows-amd64.exe
92916f0d9ea3a5f40aed2b861b6f63be4eb17757feae5fe3b5d873143363e025  ./package.yml
7a6aa35600459a1797a6f0564ae89954e6da035fe54e19b72c573f5b31938a8c  ./package-metadata.yml

v0.51.0

18 Apr 09:13
a8f75d9
Compare
Choose a tag to compare

Installation and signature verification

Installation of kctrl

By downloading binary from the release

For instance, if you are using Linux on an AMD64 architecture:

# Download the binary
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.51.0/kctrl-linux-amd64
# Move the binary in to your PATH
mv kctrl-linux-amd64 /usr/local/bin/kctrl
# Make the binary executable
chmod +x /usr/local/bin/kctrl

Via Homebrew (macOS or Linux)

$ brew tap carvel-dev/carvel
$ brew install kctrl
$ kctrl version

Verify checksums file signature

Install cosign on your system https://docs.sigstore.dev/system_config/installation/

The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:

# Download the checksums file, certificate, and signature
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.51.0/checksums.txt
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.51.0/checksums.txt.pem
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.51.0/checksums.txt.sig

### Verify the checksums file
cosign verify-blob checksums.txt --certificate checksums.txt.pem --signature checksums.txt.sig --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com 

Verify binary integrity

To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature. For instance, if you are using Linux on an AMD64 architecture:

# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missing

Installation of kapp-controller

kapp-controller can be installed by using kapp

kapp deploy -a kc -f https://github.com/carvel-dev/kapp-controller/releases/v0.51.0/download/release.yml

or by using kubectl

kubectl deploy -f https://github.com/carvel-dev/kapp-controller/releases/v0.51.0/download/release.yml

Container Images

Kapp-controller and Kapp-controller-package-bundle images are available in Github Container Registry.

OCI Image URLs

  • ghcr.io/carvel-dev/kapp-controller@sha256:6431627458a455aa3ef5f323ce07f7878aa6ae182a75bc709858d31d559fbba3
  • ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:0b184aed340144ac2837685b400834b77538446497974b44fa3734a12b823bee

Verify container image signature

The container images are signed using Cosign with GitHub OIDC. To validate the signature of OCI images, run the following commands:

# Verifying kapp-controller image
cosign verify ghcr.io/carvel-dev/kapp-controller@sha256:6431627458a455aa3ef5f323ce07f7878aa6ae182a75bc709858d31d559fbba3 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text

# Verifying kapp-controller-package-bundle image
cosign verify ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:0b184aed340144ac2837685b400834b77538446497974b44fa3734a12b823bee --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text

✨ What's new

🔈 Callouts

Full Changelog: v0.50.0...v0.51.0

📂 Files Checksum

79467aa1c0bfe48144dccf2908a66474b019ff562e7998645d46c628b1e3d458  ./release.yml
015a3f9807852cd3d1ca4d6f949f89407e8f44a8ba196b463162a97dc2300b41  ./kctrl-darwin-amd64
e02077e560747ee9dbfa2edbced39bd4fdcab756a9546062befa41641f9e71d8  ./kctrl-darwin-arm64
2de0eeada145888f8ac911c1f8a4e1d1b6b4202afd63cbca7f81bdc50d110b72  ./kctrl-linux-amd64
bdb68052e1791552bcb23231d0fefa45e98daf278555393a955bcbf1ebcd91ee  ./kctrl-linux-arm64
f5208f18edbd7634223f277077dd521a4a984d34352b2a7798b4e13c6d433980  ./kctrl-windows-amd64.exe
7a2225eb264313fb3ae199386488f50f7b21b54cd791486a237f156387d74682  ./package.yml
7a6aa35600459a1797a6f0564ae89954e6da035fe54e19b72c573f5b31938a8c  ./package-metadata.yml

v0.46.10

16 May 12:23
bc96c23
Compare
Choose a tag to compare

What's Changed

Full Changelog: v0.46.9...v0.46.10

📂 Files Checksum

61780b2fc495289444a76351f0e97bd550d8b39bd570564ab0db9358b74373eb  ./release.yml
d81675ab15fdd37545e8cc63b91850afed5bf4ae3d8d39f7057598da81eb7953  ./kctrl-darwin-amd64
cd68af86082f3c6be104126d5cbe057b8aba966f438ea0263cc9f44a28868892  ./kctrl-darwin-arm64
d34a84f10798ad9933dfb9bdf4f4d91814ddedf53b61769dad7685b03c19cf45  ./kctrl-linux-amd64
148b87430cbe3ace427fc5b8a2ae7ef5de8eb35b0568bf8176b56f46f7fd4bf8  ./kctrl-linux-arm64
7279656d1a71af272650ad1805a7331a667f04d3408253e31dcbea2091deff65  ./kctrl-windows-amd64.exe
439bd9511d3d4b19f8c6c822cb693f92311cb1f8704beed502ca89ce11f7c0cb  ./package.yml
7a6aa35600459a1797a6f0564ae89954e6da035fe54e19b72c573f5b31938a8c  ./package-metadata.yml