Releases: carvel-dev/kapp-controller
v0.59.3
Installation and signature verification
Installation of kctrl
By downloading binary from the release
For instance, if you are using Linux on an AMD64 architecture:
# Download the binary
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.3/kctrl-linux-amd64
# Move the binary in to your PATH
mv kctrl-linux-amd64 /usr/local/bin/kctrl
# Make the binary executable
chmod +x /usr/local/bin/kctrlVia Homebrew (macOS or Linux)
$ brew tap carvel-dev/carvel
$ brew install kctrl
$ kctrl versionVerify checksums file signature
Install cosign on your system https://docs.sigstore.dev/system_config/installation/
The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:
# Download the checksums file, certificate, and signature
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.3/checksums.txt
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.3/checksums.txt.pem
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.3/checksums.txt.sig
### Verify the checksums file
cosign verify-blob checksums.txt --bundle release/checksums.json --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com Verify binary integrity
To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature. For instance, if you are using Linux on an AMD64 architecture:
# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missingInstallation of kapp-controller
kapp-controller can be installed by using kapp
kapp deploy -a kc -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.3/release.ymlor by using kubectl
kubectl deploy -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.3/release.ymlContainer Images
Kapp-controller and Kapp-controller-package-bundle images are available in Github Container Registry.
OCI Image URLs
- ghcr.io/carvel-dev/kapp-controller@sha256:f9f2a86926f0fe8eee07134fbfbcdc77da21e4db361cedd9483bde2941d89215
- ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:e3d2fc391d5d4653b6e9dad7b49192359de14c85bd1a4a32daeb90c4f56f4069
Verify container image signature
The container images are signed using Cosign with GitHub OIDC. To validate the signature of OCI images, run the following commands:
# Verifying kapp-controller image
cosign verify ghcr.io/carvel-dev/kapp-controller@sha256:f9f2a86926f0fe8eee07134fbfbcdc77da21e4db361cedd9483bde2941d89215 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text
# Verifying kapp-controller-package-bundle image
cosign verify ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:e3d2fc391d5d4653b6e9dad7b49192359de14c85bd1a4a32daeb90c4f56f4069 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text✨ What's new
- Downgrade helm from v4.1.1 to v3.19.5
- Update carvel kbld dependency to v0.47.2
Full Changelog: v0.59.2...v0.59.3
📂 Files Checksum
f9cc0cb7af6aa7330282cc65157f0e1c0b84fc829b42ba18f0342463109a9dcc ./release.yml
5524ef6ec2ad87c8b6491275d344dcdec897973e9df20ce42dd11a7e958441e9 ./kctrl-darwin-amd64
8f8016c4ce351e1065811c491dcb687174d82efe8b6205bcd9552582d9e86bc3 ./kctrl-darwin-arm64
94ad503a023c5df10095e72f681f0fc564ffed361538ce666db21ed11958ee01 ./kctrl-linux-amd64
06b41d8bd1313610be2412be971af01abd89f0a41befc27f51331defcec7adf8 ./kctrl-linux-arm64
3f7f2dd35ba78b4ac069d13c0a0b26ca422cf164a996e17a71072c675d0fd1a7 ./kctrl-windows-amd64.exe
81c5f515063a48964c87e8de1789d5278afe18a851f2bed02715e293cc0aa7b7 ./package.yml
7a6aa35600459a1797a6f0564ae89954e6da035fe54e19b72c573f5b31938a8c ./package-metadata.yml
v0.59.2
Installation and signature verification
Installation of kctrl
By downloading binary from the release
For instance, if you are using Linux on an AMD64 architecture:
# Download the binary
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.2/kctrl-linux-amd64
# Move the binary in to your PATH
mv kctrl-linux-amd64 /usr/local/bin/kctrl
# Make the binary executable
chmod +x /usr/local/bin/kctrlVia Homebrew (macOS or Linux)
$ brew tap carvel-dev/carvel
$ brew install kctrl
$ kctrl versionVerify checksums file signature
Install cosign on your system https://docs.sigstore.dev/system_config/installation/
The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:
# Download the checksums file, certificate, and signature
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.2/checksums.txt
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.2/checksums.txt.pem
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.2/checksums.txt.sig
### Verify the checksums file
cosign verify-blob checksums.txt --certificate checksums.txt.pem --signature checksums.txt.sig --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com Verify binary integrity
To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature. For instance, if you are using Linux on an AMD64 architecture:
# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missingInstallation of kapp-controller
kapp-controller can be installed by using kapp
kapp deploy -a kc -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.2/release.ymlor by using kubectl
kubectl deploy -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.2/release.ymlContainer Images
Kapp-controller and Kapp-controller-package-bundle images are available in Github Container Registry.
OCI Image URLs
- ghcr.io/carvel-dev/kapp-controller@sha256:ff4368366d7bd932acd80133138144166831ed25f08fb3a563c1256e1d9da933
- ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:98f6510b17f8f3028d325ba33e72eba259e8b434a51761fe04f2102d4558aeef
Verify container image signature
The container images are signed using Cosign with GitHub OIDC. To validate the signature of OCI images, run the following commands:
# Verifying kapp-controller image
cosign verify ghcr.io/carvel-dev/kapp-controller@sha256:ff4368366d7bd932acd80133138144166831ed25f08fb3a563c1256e1d9da933 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text
# Verifying kapp-controller-package-bundle image
cosign verify ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:98f6510b17f8f3028d325ba33e72eba259e8b434a51761fe04f2102d4558aeef --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text✨ What's new
- Bump golang 1.25.7 by @sameerforge in #1784
- Bump Carvel Dependencies by @CodesbyUnnati in #1789
New Contributors
- @sameerforge made their first contribution in #1784
Full Changelog: v0.59.1...v0.59.2
📂 Files Checksum
101988693b9a8215b5353dc871e95f095fc59eaab8ce2acc6da3be8ef39b235b ./release.yml
5da30f0f61837bf4df57c85ac455b4714351d4110fe9612763a2b1100e676691 ./kctrl-darwin-amd64
25d3c21f588ee5d339f96da210ad955f3958ea4bcfe6b36e2cb473ddfce0e6d3 ./kctrl-darwin-arm64
38d0da769836ec9b4a556ed88937c2357928d701c708ceb034bd04fc94a77872 ./kctrl-linux-amd64
b5690024b2a11149c0ed3c4c07b4a070abae76bdb2eb102f0c042ee0ebd8e354 ./kctrl-linux-arm64
41b31b0d60eb1f93f573e29f292f6cc439ca80e15203cca318a82800f81d7aaf ./kctrl-windows-amd64.exe
f30a8cc9d1fb747efe563d5694428e1c7aa07e229a79ab79dd38a0a32752922c ./package.yml
7a6aa35600459a1797a6f0564ae89954e6da035fe54e19b72c573f5b31938a8c ./package-metadata.yml
v0.59.1
Installation and signature verification
Installation of kctrl
By downloading binary from the release
For instance, if you are using Linux on an AMD64 architecture:
# Download the binary
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.1/kctrl-linux-amd64
# Move the binary in to your PATH
mv kctrl-linux-amd64 /usr/local/bin/kctrl
# Make the binary executable
chmod +x /usr/local/bin/kctrlVia Homebrew (macOS or Linux)
$ brew tap carvel-dev/carvel
$ brew install kctrl
$ kctrl versionVerify checksums file signature
Install cosign on your system https://docs.sigstore.dev/system_config/installation/
The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:
# Download the checksums file, certificate, and signature
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.1/checksums.txt
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.1/checksums.txt.pem
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.1/checksums.txt.sig
### Verify the checksums file
cosign verify-blob checksums.txt --certificate checksums.txt.pem --signature checksums.txt.sig --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com Verify binary integrity
To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature. For instance, if you are using Linux on an AMD64 architecture:
# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missingInstallation of kapp-controller
kapp-controller can be installed by using kapp
kapp deploy -a kc -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.1/release.ymlor by using kubectl
kubectl deploy -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.1/release.ymlContainer Images
Kapp-controller and Kapp-controller-package-bundle images are available in Github Container Registry.
OCI Image URLs
- ghcr.io/carvel-dev/kapp-controller@sha256:366640afc68a791bb6e91d249c7b6c02de3695ef738a6fe9f8ed99ac65aefdb6
- ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:7cf9e176aac02bf8f355ccae379332a51ea35571121cd60271e345d7d9d75c22
Verify container image signature
The container images are signed using Cosign with GitHub OIDC. To validate the signature of OCI images, run the following commands:
# Verifying kapp-controller image
cosign verify ghcr.io/carvel-dev/kapp-controller@sha256:366640afc68a791bb6e91d249c7b6c02de3695ef738a6fe9f8ed99ac65aefdb6 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text
# Verifying kapp-controller-package-bundle image
cosign verify ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:7cf9e176aac02bf8f355ccae379332a51ea35571121cd60271e345d7d9d75c22 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text✨ What's new
- Bump golang version and fix CVEs by @CodesbyUnnati in #1778
- Bump kapp, kbld, vendir, helm, cue-lang/cue dependencies by @dependabot[bot] in #1775
New Contributors
- @CodesbyUnnati made their first contribution in #1778
Full Changelog: v0.59.0...v0.59.1
📂 Files Checksum
281b31fc6ab5910af6414e85c95da5f73bdd6e6b9c890f179db6c790b4160c3a ./release.yml
1c306be0cabd69b83efc4022ed9c57bd38c9abab4a9b3144def1796926f6def4 ./kctrl-darwin-amd64
0d32b880e37745d1fff2d92d2388054fb6c7aa96be0333f29c1c1e8db51458be ./kctrl-darwin-arm64
3cf09ba4ea90e3b44de569ddacaeaa9b1cf930772dee67dbb2a4deefa3c187a8 ./kctrl-linux-amd64
efd2d439701ccbb63738d584f14509a234f8df94ab34c4700de2e27ce78a7bbd ./kctrl-linux-arm64
bb8082b41e75c3907c8ebeecd09df83734cc1d4cbdcf76c82f590ccab0ff8d5a ./kctrl-windows-amd64.exe
c6f73bf696d6d781add7172717670ed2acfe004945e383c94c901a2bc076a61b ./package.yml
7a6aa35600459a1797a6f0564ae89954e6da035fe54e19b72c573f5b31938a8c ./package-metadata.yml
v0.59.0
Installation and signature verification
Installation of kctrl
By downloading binary from the release
For instance, if you are using Linux on an AMD64 architecture:
# Download the binary
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.0/kctrl-linux-amd64
# Move the binary in to your PATH
mv kctrl-linux-amd64 /usr/local/bin/kctrl
# Make the binary executable
chmod +x /usr/local/bin/kctrlVia Homebrew (macOS or Linux)
$ brew tap carvel-dev/carvel
$ brew install kctrl
$ kctrl versionVerify checksums file signature
Install cosign on your system https://docs.sigstore.dev/system_config/installation/
The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:
# Download the checksums file, certificate, and signature
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.0/checksums.txt
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.0/checksums.txt.pem
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.0/checksums.txt.sig
### Verify the checksums file
cosign verify-blob checksums.txt --certificate checksums.txt.pem --signature checksums.txt.sig --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com Verify binary integrity
To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature. For instance, if you are using Linux on an AMD64 architecture:
# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missingInstallation of kapp-controller
kapp-controller can be installed by using kapp
kapp deploy -a kc -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.0/release.ymlor by using kubectl
kubectl deploy -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.0/release.ymlContainer Images
Kapp-controller and Kapp-controller-package-bundle images are available in Github Container Registry.
OCI Image URLs
- ghcr.io/carvel-dev/kapp-controller@sha256:8fd68cf144f0fb2236785be395783976c7ba21b9c6ab804322789f7557f9e6ea
- ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:cbf6be793f9cca3e3a2aaa87877bc31700add7731bf8b0c42bebe9f03dcfc71a
Verify container image signature
The container images are signed using Cosign with GitHub OIDC. To validate the signature of OCI images, run the following commands:
# Verifying kapp-controller image
cosign verify ghcr.io/carvel-dev/kapp-controller@sha256:8fd68cf144f0fb2236785be395783976c7ba21b9c6ab804322789f7557f9e6ea --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text
# Verifying kapp-controller-package-bundle image
cosign verify ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:cbf6be793f9cca3e3a2aaa87877bc31700add7731bf8b0c42bebe9f03dcfc71a --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text✨ What's new
- Add retry logic for App CR updates to handle optimistic concurrency conflicts by @mdzhigarov in #1766
- Bump minimum k8s version, images and helm chart in tests by @praveenrewar in #1767
- Bump ytt, helm, sops, cue-lang dependencies by @dependabot[bot] in #1733
Full Changelog: v0.58.1...v0.59.0
📂 Files Checksum
1ccc86aa37548cdeb7e09e24f92b1a67fc0b9198893d257b68c7763782576c2c ./release.yml
47cbb16acae187d11bdc6af8612f9a278f367033cb5e4d459ea5336e3c7a7061 ./kctrl-darwin-amd64
25035cd7f32bcba588ee2f96aafa635ddd8963dc1cef4b5096eae4752119620a ./kctrl-darwin-arm64
96d098ab5e897acba8e7b36f6e9be731b53517cfc3f34380c5f3f24a7ac2a8dc ./kctrl-linux-amd64
f78201bc2f56c3010a05e6cd2bea9cbb39ad2249ca38a40cebec19ea5eb058b4 ./kctrl-linux-arm64
6e1c50452ee6538c9b7ba0fcbf7f179a3ca40173f5156770130eae1ddf24f1dc ./kctrl-windows-amd64.exe
0e7b0ea7f13f991cc6e2e9bed2a1d03a1c477fcae6d95a84d3200b854841e546 ./package.yml
7a6aa35600459a1797a6f0564ae89954e6da035fe54e19b72c573f5b31938a8c ./package-metadata.yml
v0.58.2
✨ What's New
- Bump minimum k8s version, hardcoded bitnami images and helm charts by @CodesbyUnnati in #1782
Full Changelog: v0.58.1...v0.58.2
Installation and signature verification
Installation of kctrl
By downloading binary from the release
For instance, if you are using Linux on an AMD64 architecture:
# Download the binary
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.58.2/kctrl-linux-amd64
# Move the binary in to your PATH
mv kctrl-linux-amd64 /usr/local/bin/kctrl
# Make the binary executable
chmod +x /usr/local/bin/kctrlVia Homebrew (macOS or Linux)
$ brew tap carvel-dev/carvel
$ brew install kctrl
$ kctrl versionVerify checksums file signature
Install cosign on your system https://docs.sigstore.dev/system_config/installation/
The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:
# Download the checksums file, certificate, and signature
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.58.2/checksums.txt
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.58.2/checksums.txt.pem
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.58.2/checksums.txt.sig
### Verify the checksums file
cosign verify-blob checksums.txt --certificate checksums.txt.pem --signature checksums.txt.sig --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com Verify binary integrity
To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature. For instance, if you are using Linux on an AMD64 architecture:
# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missingInstallation of kapp-controller
kapp-controller can be installed by using kapp
kapp deploy -a kc -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.58.2/release.ymlor by using kubectl
kubectl deploy -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.58.2/release.ymlContainer Images
Kapp-controller and Kapp-controller-package-bundle images are available in Github Container Registry.
OCI Image URLs
- ghcr.io/carvel-dev/kapp-controller@sha256:62067a466170ccb7d5f5376fe44e20f3dc2f4a6a805018657f0975dff3075bd8
- ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:e7e5d090c01291c7339dcfd3beb76caf8f9eaf182cb3d14e788189808c1baf07
Verify container image signature
The container images are signed using Cosign with GitHub OIDC. To validate the signature of OCI images, run the following commands:
# Verifying kapp-controller image
cosign verify ghcr.io/carvel-dev/kapp-controller@sha256:62067a466170ccb7d5f5376fe44e20f3dc2f4a6a805018657f0975dff3075bd8 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text
# Verifying kapp-controller-package-bundle image
cosign verify ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:e7e5d090c01291c7339dcfd3beb76caf8f9eaf182cb3d14e788189808c1baf07 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text📂 Files Checksum
212e6a69726d97b82af8a31fc74dadc4e9b93954c2136501fa3d24f149b70af2 ./release.yml
902d763216276eaa5102dfd533da6d022a4b077c76bf9cab3f89011c9a9832ba ./kctrl-darwin-amd64
9fe6b476c3bbd7f88eb37faf73627564ef23e9746837c066e019d3700bda0ee4 ./kctrl-darwin-arm64
b84cd677eba558aebbae5fae9b408eb77d13c90d6e6ea887109f0cfd35017371 ./kctrl-linux-amd64
e67117bfab025cf4cfcc64d4157b9df1f5dd330092fddd3181226b2a13a7e233 ./kctrl-linux-arm64
aa683f4650bea1b68ff5f0556e27644324ad348e82399489c652a4d5e558d8a4 ./kctrl-windows-amd64.exe
4ca90bcaed05ab975d420be2c3e614956a39da2cc4ac6e451ad33ea999af063c ./package.yml
7a6aa35600459a1797a6f0564ae89954e6da035fe54e19b72c573f5b31938a8c ./package-metadata.yml
v0.58.1
Installation and signature verification
Installation of kctrl
By downloading binary from the release
For instance, if you are using Linux on an AMD64 architecture:
# Download the binary
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.58.1/kctrl-linux-amd64
# Move the binary in to your PATH
mv kctrl-linux-amd64 /usr/local/bin/kctrl
# Make the binary executable
chmod +x /usr/local/bin/kctrlVia Homebrew (macOS or Linux)
$ brew tap carvel-dev/carvel
$ brew install kctrl
$ kctrl versionVerify checksums file signature
Install cosign on your system https://docs.sigstore.dev/system_config/installation/
The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:
# Download the checksums file, certificate, and signature
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.58.1/checksums.txt
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.58.1/checksums.txt.pem
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.58.1/checksums.txt.sig
### Verify the checksums file
cosign verify-blob checksums.txt --certificate checksums.txt.pem --signature checksums.txt.sig --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com Verify binary integrity
To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature. For instance, if you are using Linux on an AMD64 architecture:
# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missingInstallation of kapp-controller
kapp-controller can be installed by using kapp
kapp deploy -a kc -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.58.1/release.ymlor by using kubectl
kubectl deploy -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.58.1/release.ymlContainer Images
Kapp-controller and Kapp-controller-package-bundle images are available in Github Container Registry.
OCI Image URLs
- ghcr.io/carvel-dev/kapp-controller@sha256:9ed60b14380798ef3e781f4998a49b77b28c763bf924fcc42c6fb1dc6755997e
- ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:189417be78f908f6b532b2a1b8fb41d65eda2bc1bdc00f4834033d87ffbf6db7
Verify container image signature
The container images are signed using Cosign with GitHub OIDC. To validate the signature of OCI images, run the following commands:
# Verifying kapp-controller image
cosign verify ghcr.io/carvel-dev/kapp-controller@sha256:9ed60b14380798ef3e781f4998a49b77b28c763bf924fcc42c6fb1dc6755997e --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text
# Verifying kapp-controller-package-bundle image
cosign verify ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:189417be78f908f6b532b2a1b8fb41d65eda2bc1bdc00f4834033d87ffbf6db7 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text📂 Files Checksum
4b331cd958699b575df506651e359db459f79414a979247a75c39bdb8e1cd89d ./release.yml
85f6ab96d7db39384d78d8998efbe8652063405e76792f1163e9a61a52c8caf3 ./kctrl-darwin-amd64
89f2c5fef2067295684e34592c4c25a1e3b7f88d4fb529310007d001098f96a9 ./kctrl-darwin-arm64
978fc078d53a827716dacde7483294d1265c3d42ace0c2582df62b5c38dd17ae ./kctrl-linux-amd64
a9cb74f12effb45c56d16b56551aaf50e96fac0359b5ace6ec8e40d370762ac8 ./kctrl-linux-arm64
5c03eead9cac258d65af2baa8f182c1eb3ced3cd25ae90dd690db677d91fffd4 ./kctrl-windows-amd64.exe
d4083bb063c00aeaa65f64e96bd17ed2093bb2ecbc4e340f9402a5cd4c610688 ./package.yml
7a6aa35600459a1797a6f0564ae89954e6da035fe54e19b72c573f5b31938a8c ./package-metadata.yml
What's Changed
- Bump sigstore/cosign-installer from 3.8.2 to 3.9.1 by @dependabot[bot] in #1738
- Bump softprops/action-gh-release from 2.2.2 to 2.3.2 by @dependabot[bot] in #1735
- Fix PKGI reconciliation taking old App status during upgrade by @mdzhigarov in #1751
New Contributors
- @mdzhigarov made their first contribution in #1751
Full Changelog: v0.58.0...v0.58.1
v0.58.0
Installation and signature verification
Installation of kctrl
By downloading binary from the release
For instance, if you are using Linux on an AMD64 architecture:
# Download the binary
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.58.0/kctrl-linux-amd64
# Move the binary in to your PATH
mv kctrl-linux-amd64 /usr/local/bin/kctrl
# Make the binary executable
chmod +x /usr/local/bin/kctrlVia Homebrew (macOS or Linux)
$ brew tap carvel-dev/carvel
$ brew install kctrl
$ kctrl versionVerify checksums file signature
Install cosign on your system https://docs.sigstore.dev/system_config/installation/
The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:
# Download the checksums file, certificate, and signature
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.58.0/checksums.txt
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.58.0/checksums.txt.pem
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.58.0/checksums.txt.sig
### Verify the checksums file
cosign verify-blob checksums.txt --certificate checksums.txt.pem --signature checksums.txt.sig --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com Verify binary integrity
To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature. For instance, if you are using Linux on an AMD64 architecture:
# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missingInstallation of kapp-controller
kapp-controller can be installed by using kapp
kapp deploy -a kc -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.58.0/release.ymlor by using kubectl
kubectl deploy -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.58.0/release.ymlContainer Images
Kapp-controller and Kapp-controller-package-bundle images are available in Github Container Registry.
OCI Image URLs
- ghcr.io/carvel-dev/kapp-controller@sha256:52ecad550cd3e98b6a27ca85e851c5b0884b04d99003ea201a289f75e33d9232
- ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:65973945afcd3f7c104f0506eade52d032f9851737c573bafd3556aed02c8bcc
Verify container image signature
The container images are signed using Cosign with GitHub OIDC. To validate the signature of OCI images, run the following commands:
# Verifying kapp-controller image
cosign verify ghcr.io/carvel-dev/kapp-controller@sha256:52ecad550cd3e98b6a27ca85e851c5b0884b04d99003ea201a289f75e33d9232 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text
# Verifying kapp-controller-package-bundle image
cosign verify ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:65973945afcd3f7c104f0506eade52d032f9851737c573bafd3556aed02c8bcc --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text✨ What's new
Full Changelog: v0.57.0...v0.58.0
📂 Files Checksum
e49152835e085221e9f9646a6c23ee0f13040cbcdf758b3301541bdd7fabd0d9 ./release.yml
e6f2cf55d12974f7fff268e47e1f0d924f9a69b3b8f78589b6941f908b4da0fe ./kctrl-darwin-amd64
bc75e2c25ff2a01ba86a5889746887642bfb7fab27fa58614d3ae6af57196929 ./kctrl-darwin-arm64
ede5d31ac4dfe73e82364cf430ef5016de309185606c981cbdbdbeab42589ca0 ./kctrl-linux-amd64
f253f9accf118dfeaabbaffc71d9c7bcb5f4c0e87ba4bd4bfd95edd7ab0af700 ./kctrl-linux-arm64
0842451df69c7503d423cf8ed25d66f4e072b8d22082eb48ab08d48e8c528bb7 ./kctrl-windows-amd64.exe
fe7bac5abaa4f8bdbb7067619a2cd104903a6ec53d4573a322e09c16e4ed03cf ./package.yml
7a6aa35600459a1797a6f0564ae89954e6da035fe54e19b72c573f5b31938a8c ./package-metadata.yml
v0.57.0
Installation and signature verification
Installation of kctrl
By downloading binary from the release
For instance, if you are using Linux on an AMD64 architecture:
# Download the binary
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.57.0/kctrl-linux-amd64
# Move the binary in to your PATH
mv kctrl-linux-amd64 /usr/local/bin/kctrl
# Make the binary executable
chmod +x /usr/local/bin/kctrlVia Homebrew (macOS or Linux)
$ brew tap carvel-dev/carvel
$ brew install kctrl
$ kctrl versionVerify checksums file signature
Install cosign on your system https://docs.sigstore.dev/system_config/installation/
The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:
# Download the checksums file, certificate, and signature
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.57.0/checksums.txt
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.57.0/checksums.txt.pem
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.57.0/checksums.txt.sig
### Verify the checksums file
cosign verify-blob checksums.txt --certificate checksums.txt.pem --signature checksums.txt.sig --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com Verify binary integrity
To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature. For instance, if you are using Linux on an AMD64 architecture:
# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missingInstallation of kapp-controller
kapp-controller can be installed by using kapp
kapp deploy -a kc -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.57.0/release.ymlor by using kubectl
kubectl deploy -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.57.0/release.ymlContainer Images
Kapp-controller and Kapp-controller-package-bundle images are available in Github Container Registry.
OCI Image URLs
- ghcr.io/carvel-dev/kapp-controller@sha256:80589bbd88400f3dd5eed5b772f8e4cd9ab2b721fd30684566a40e4761b1247d
- ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:875688d03244e9a7ce8d071d29718946334d2afa3492f26c065b04a374747b73
Verify container image signature
The container images are signed using Cosign with GitHub OIDC. To validate the signature of OCI images, run the following commands:
# Verifying kapp-controller image
cosign verify ghcr.io/carvel-dev/kapp-controller@sha256:80589bbd88400f3dd5eed5b772f8e4cd9ab2b721fd30684566a40e4761b1247d --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text
# Verifying kapp-controller-package-bundle image
cosign verify ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:875688d03244e9a7ce8d071d29718946334d2afa3492f26c065b04a374747b73 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text✨ What's new
- Allow users to choose platform when using kbld @cppforlife #1726
Full Changelog: v0.56.1...v0.57.0
📂 Files Checksum
e8a6dc5b13f5b827602698e1497f275aeff85dc93bccf862c6202d875d116b20 ./release.yml
34175c88f2d14cadced624906a1c31581e09530b3ad1e6cea854e5a0c9ae5276 ./kctrl-darwin-amd64
bccf148ab53aaf1b5547efb8caa75facb15fd363c3c5d070d9d8bcfa426ce6f6 ./kctrl-darwin-arm64
35d96da8f8076efbb245c8cb6fed350e748789c670d34e792d1258584c56a8c1 ./kctrl-linux-amd64
9eb6d6903c8ea4fd474d2668805627b9d22c1bf750dde2e842e07884e37af615 ./kctrl-linux-arm64
6ffa07cd3ddee82fb23d90e2ac80d3dc6ecca4837c957b0b1f23e8ab58af873d ./kctrl-windows-amd64.exe
eb0a35028a441d7baaf799a85732bd0201d03eb17224c19b12e23a9a9f2d95ee ./package.yml
7a6aa35600459a1797a6f0564ae89954e6da035fe54e19b72c573f5b31938a8c ./package-metadata.yml
v0.56.1
Installation and signature verification
Installation of kctrl
By downloading binary from the release
For instance, if you are using Linux on an AMD64 architecture:
# Download the binary
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.56.1/kctrl-linux-amd64
# Move the binary in to your PATH
mv kctrl-linux-amd64 /usr/local/bin/kctrl
# Make the binary executable
chmod +x /usr/local/bin/kctrlVia Homebrew (macOS or Linux)
$ brew tap carvel-dev/carvel
$ brew install kctrl
$ kctrl versionVerify checksums file signature
Install cosign on your system https://docs.sigstore.dev/system_config/installation/
The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:
# Download the checksums file, certificate, and signature
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.56.1/checksums.txt
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.56.1/checksums.txt.pem
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.56.1/checksums.txt.sig
### Verify the checksums file
cosign verify-blob checksums.txt --certificate checksums.txt.pem --signature checksums.txt.sig --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com Verify binary integrity
To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature. For instance, if you are using Linux on an AMD64 architecture:
# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missingInstallation of kapp-controller
kapp-controller can be installed by using kapp
kapp deploy -a kc -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.56.1/release.ymlor by using kubectl
kubectl deploy -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.56.1/release.ymlContainer Images
Kapp-controller and Kapp-controller-package-bundle images are available in Github Container Registry.
OCI Image URLs
- ghcr.io/carvel-dev/kapp-controller@sha256:009899e04dfe72636b819d8db572c00d37f8c8da098262d630600964a37325c3
- ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:e1dce848011ce345eccd91d45ade2fa817ad467a3dde38f0ef37204eb1956200
Verify container image signature
The container images are signed using Cosign with GitHub OIDC. To validate the signature of OCI images, run the following commands:
# Verifying kapp-controller image
cosign verify ghcr.io/carvel-dev/kapp-controller@sha256:009899e04dfe72636b819d8db572c00d37f8c8da098262d630600964a37325c3 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text
# Verifying kapp-controller-package-bundle image
cosign verify ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:e1dce848011ce345eccd91d45ade2fa817ad467a3dde38f0ef37204eb1956200 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text✨ What's new
- Fix version of kctrl by @joaopapereira in #1710
Full Changelog: v0.56.0...v0.56.1
📂 Files Checksum
5d830a1c520a4798c960f8638fc3979135fe6d23b02c637717a4c161f59cc695 ./release.yml
0cc78563d79c2efc04187d909ea253a762cb974492b6983d804ea16f6a07e52f ./kctrl-darwin-amd64
eb73bfb06383b88b85a882c9bce080f965c3eabeed735b63709c27ae25e463ed ./kctrl-darwin-arm64
0adb8e1060fbd3b9cc7c4f926863732ac0be2ae1e746e7232f0e5cd61da00b34 ./kctrl-linux-amd64
43a11bed3e52028b268aa101cc546c915adc5bc3ab586bdad01a6f4fde554bd1 ./kctrl-linux-arm64
ea305c725f548ea09f83e89c8f8fb5b8138dc09b2da9598b703d385895eb8555 ./kctrl-windows-amd64.exe
628d24a4b745009009cf141e12bd942605bda0aa16d0e01e606529c7ad1a23f1 ./package.yml
7a6aa35600459a1797a6f0564ae89954e6da035fe54e19b72c573f5b31938a8c ./package-metadata.yml
v0.56.0
Installation and signature verification
Installation of kctrl
By downloading binary from the release
For instance, if you are using Linux on an AMD64 architecture:
# Download the binary
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.56.0/kctrl-linux-amd64
# Move the binary in to your PATH
mv kctrl-linux-amd64 /usr/local/bin/kctrl
# Make the binary executable
chmod +x /usr/local/bin/kctrlVia Homebrew (macOS or Linux)
$ brew tap carvel-dev/carvel
$ brew install kctrl
$ kctrl versionVerify checksums file signature
Install cosign on your system https://docs.sigstore.dev/system_config/installation/
The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:
# Download the checksums file, certificate, and signature
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.56.0/checksums.txt
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.56.0/checksums.txt.pem
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.56.0/checksums.txt.sig
### Verify the checksums file
cosign verify-blob checksums.txt --certificate checksums.txt.pem --signature checksums.txt.sig --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com Verify binary integrity
To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature. For instance, if you are using Linux on an AMD64 architecture:
# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missingInstallation of kapp-controller
kapp-controller can be installed by using kapp
kapp deploy -a kc -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.56.0/release.ymlor by using kubectl
kubectl deploy -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.56.0/release.ymlContainer Images
Kapp-controller and Kapp-controller-package-bundle images are available in Github Container Registry.
OCI Image URLs
- ghcr.io/carvel-dev/kapp-controller@sha256:bbb938d7e0b064bc3249497349ca4f790198c926a7691bb181f7ce0248a2a405
- ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:b20531ce64f3e5d0d3d6041d483b7b642f768d8ea81319a779bd9dc6aaec061f
Verify container image signature
The container images are signed using Cosign with GitHub OIDC. To validate the signature of OCI images, run the following commands:
# Verifying kapp-controller image
cosign verify ghcr.io/carvel-dev/kapp-controller@sha256:bbb938d7e0b064bc3249497349ca4f790198c926a7691bb181f7ce0248a2a405 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text
# Verifying kapp-controller-package-bundle image
cosign verify ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:b20531ce64f3e5d0d3d6041d483b7b642f768d8ea81319a779bd9dc6aaec061f --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text✨ What's new
- Add the column
pausedto the status by @randomvariable in #1701 - Bump different libraries and dependencies
Full Changelog: v0.55.1...v0.56.0
📂 Files Checksum
267ca94cadf9ed6bb87be2853d79dc8e07d72cd5556cea12a265ea17e4aab097 ./release.yml
be7fab03592db11dfd5dbfd66fdfc5e8957b6173964dda23e829fa577b6171b9 ./kctrl-darwin-amd64
4a493b3d6d625fdcb77d64abcd50e6f28ce0eeb5b293c6106643ccdb609741cd ./kctrl-darwin-arm64
1cdbcfd35898e47af268294bb76f6d27111ab58fe5bf1e2e9d4b988823e858ca ./kctrl-linux-amd64
1812d74fb548479b10e66d968f97e7819c534d3ae290d428f210e970dd52cfa0 ./kctrl-linux-arm64
25de1874d509f92e5b56ad3d9b991794da1e12891b9e9530c58d272f78daa300 ./kctrl-windows-amd64.exe
ea702bcdd5d47cd730b19b1eb8818cf192d9769b3066c5fbeda67aa4fe2a47e5 ./package.yml
7a6aa35600459a1797a6f0564ae89954e6da035fe54e19b72c573f5b31938a8c ./package-metadata.yml