Releases: carvel-dev/kapp-controller
v0.59.7
Installation and signature verification
Installation of kctrl
By downloading binary from the release
For instance, if you are using Linux on an AMD64 architecture:
# Download the binary
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.7/kctrl-linux-amd64
# Move the binary in to your PATH
mv kctrl-linux-amd64 /usr/local/bin/kctrl
# Make the binary executable
chmod +x /usr/local/bin/kctrlVia Homebrew (macOS or Linux)
$ brew tap carvel-dev/carvel
$ brew install kctrl
$ kctrl versionVerify checksums file signature
Install cosign on your system https://docs.sigstore.dev/system_config/installation/
The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:
# Download the checksums file, certificate, and signature
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.7/checksums.txt
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.7/checksums.txt.pem
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.7/checksums.txt.sig
### Verify the checksums file
cosign verify-blob checksums.txt --bundle release/checksums.json --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com Verify binary integrity
To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature. For instance, if you are using Linux on an AMD64 architecture:
# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missingInstallation of kapp-controller
kapp-controller can be installed by using kapp
kapp deploy -a kc -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.7/release.ymlor by using kubectl
kubectl deploy -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.7/release.ymlContainer Images
Kapp-controller and Kapp-controller-package-bundle images are available in Github Container Registry.
OCI Image URLs
- ghcr.io/carvel-dev/kapp-controller@sha256:66c23f160bebd70b782fbca976964bb45bc6db2de61fe60f40d0d378ce8f34e3
- ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:ca423ca836ae20d35dbd5e4b67ef0a4f41d1bdf57a1f13ecfd360266fd11b100
Verify container image signature
The container images are signed using Cosign with GitHub OIDC. To validate the signature of OCI images, run the following commands:
# Verifying kapp-controller image
cosign verify ghcr.io/carvel-dev/kapp-controller@sha256:66c23f160bebd70b782fbca976964bb45bc6db2de61fe60f40d0d378ce8f34e3 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text
# Verifying kapp-controller-package-bundle image
cosign verify ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:ca423ca836ae20d35dbd5e4b67ef0a4f41d1bdf57a1f13ecfd360266fd11b100 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o textWhat's Changed
- fix(apiserver): register OpenAPI v2 spec for aggregation by @himsngh in #1803
- feat(apiserver): implement APIService caBundle reconciliation by @himsngh in #1808
New Contributors
Full Changelog: v0.59.6...v0.59.7
📂 Files Checksum
837d376191eedfb127fa2968b342f25ba412ae64e4f62e5c3673f6e9ee7664d8 ./release.yml
baa96a29f9bd3ffdc6018fcde6eb56a0dd88d6eea2a6178d04f8de0ed4f450ed ./kctrl-darwin-amd64
bf600514eaadef905a51d3e9547a74073272da5ee4712cf95e06d79b6f6afa39 ./kctrl-darwin-arm64
74df30b10d8575e1b59e71ccf22e844a321d2eb0a163d9e92371404c8b2e6fd8 ./kctrl-linux-amd64
577add084a82ad22664ce810e5a54ce09e30350fe74b646542d8ab51855a82bb ./kctrl-linux-arm64
4fe5d95cf627ffe20644570fd53f0fd93d5d74f11000a6dbaae3275ee9dd3fd9 ./kctrl-windows-amd64.exe
936aeb21f728d13fd357de7874dbf55d18fd3f451d47a708d9b8231767990fc4 ./package.yml
7a6aa35600459a1797a6f0564ae89954e6da035fe54e19b72c573f5b31938a8c ./package-metadata.yml
v0.59.6
Installation and signature verification
Installation of kctrl
By downloading binary from the release
For instance, if you are using Linux on an AMD64 architecture:
# Download the binary
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.6/kctrl-linux-amd64
# Move the binary in to your PATH
mv kctrl-linux-amd64 /usr/local/bin/kctrl
# Make the binary executable
chmod +x /usr/local/bin/kctrlVia Homebrew (macOS or Linux)
$ brew tap carvel-dev/carvel
$ brew install kctrl
$ kctrl versionVerify checksums file signature
Install cosign on your system https://docs.sigstore.dev/system_config/installation/
The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:
# Download the checksums file, certificate, and signature
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.6/checksums.txt
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.6/checksums.txt.pem
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.6/checksums.txt.sig
### Verify the checksums file
cosign verify-blob checksums.txt --bundle release/checksums.json --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com Verify binary integrity
To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature. For instance, if you are using Linux on an AMD64 architecture:
# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missingInstallation of kapp-controller
kapp-controller can be installed by using kapp
kapp deploy -a kc -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.6/release.ymlor by using kubectl
kubectl deploy -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.6/release.ymlContainer Images
Kapp-controller and Kapp-controller-package-bundle images are available in Github Container Registry.
OCI Image URLs
- ghcr.io/carvel-dev/kapp-controller@sha256:9f61958b67460200f8ad677b2860aa2d7df1d8181ccd276ec7997f3cac54c3ca
- ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:34bb3128c9203c5b89aa52d349d7179139501818754ea2ad09a7be0de7fcacca
Verify container image signature
The container images are signed using Cosign with GitHub OIDC. To validate the signature of OCI images, run the following commands:
# Verifying kapp-controller image
cosign verify ghcr.io/carvel-dev/kapp-controller@sha256:9f61958b67460200f8ad677b2860aa2d7df1d8181ccd276ec7997f3cac54c3ca --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text
# Verifying kapp-controller-package-bundle image
cosign verify ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:34bb3128c9203c5b89aa52d349d7179139501818754ea2ad09a7be0de7fcacca --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o textWhat's Changed
- Fix zombie process race condition in sidecar container by @mdzhigarov in #1806
- Use v0.29.0 of buildkit in release process by @praveenrewar in #1810
Full Changelog: v0.59.3...v0.59.6
📂 Files Checksum
a92c047d2addc58165767366d95657672b4f8c344bb497c3c5b9919536cbc419 ./release.yml
249d054e7e790307cfa8b04f8655f1deac93c570a6533d521ab6b057a4b2c4ae ./kctrl-darwin-amd64
a3679119576b4517bdd00f8b7d3b87678b364f8dd441b27d37518a63325b0234 ./kctrl-darwin-arm64
c4b0aa1985d4b00ff60e89e7e2ef3e11349f8878878f406c33febf8459b5dd2d ./kctrl-linux-amd64
10fc4961e1188defb80bd000d01ad463065645a96a87b30a90abf10c28c84704 ./kctrl-linux-arm64
b1cd7c0c2bd6a2bb277af7715d50f92c6cd5248c794d1d23672d5410054740f8 ./kctrl-windows-amd64.exe
dd59c4a501e1ffa7f29adf466f1c0620b9aebaa44cb682a152bbcdd16a4e1c4a ./package.yml
7a6aa35600459a1797a6f0564ae89954e6da035fe54e19b72c573f5b31938a8c ./package-metadata.yml
v0.59.3
Installation and signature verification
Installation of kctrl
By downloading binary from the release
For instance, if you are using Linux on an AMD64 architecture:
# Download the binary
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.3/kctrl-linux-amd64
# Move the binary in to your PATH
mv kctrl-linux-amd64 /usr/local/bin/kctrl
# Make the binary executable
chmod +x /usr/local/bin/kctrlVia Homebrew (macOS or Linux)
$ brew tap carvel-dev/carvel
$ brew install kctrl
$ kctrl versionVerify checksums file signature
Install cosign on your system https://docs.sigstore.dev/system_config/installation/
The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:
# Download the checksums file, certificate, and signature
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.3/checksums.txt
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.3/checksums.txt.pem
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.3/checksums.txt.sig
### Verify the checksums file
cosign verify-blob checksums.txt --bundle release/checksums.json --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com Verify binary integrity
To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature. For instance, if you are using Linux on an AMD64 architecture:
# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missingInstallation of kapp-controller
kapp-controller can be installed by using kapp
kapp deploy -a kc -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.3/release.ymlor by using kubectl
kubectl deploy -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.3/release.ymlContainer Images
Kapp-controller and Kapp-controller-package-bundle images are available in Github Container Registry.
OCI Image URLs
- ghcr.io/carvel-dev/kapp-controller@sha256:f9f2a86926f0fe8eee07134fbfbcdc77da21e4db361cedd9483bde2941d89215
- ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:e3d2fc391d5d4653b6e9dad7b49192359de14c85bd1a4a32daeb90c4f56f4069
Verify container image signature
The container images are signed using Cosign with GitHub OIDC. To validate the signature of OCI images, run the following commands:
# Verifying kapp-controller image
cosign verify ghcr.io/carvel-dev/kapp-controller@sha256:f9f2a86926f0fe8eee07134fbfbcdc77da21e4db361cedd9483bde2941d89215 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text
# Verifying kapp-controller-package-bundle image
cosign verify ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:e3d2fc391d5d4653b6e9dad7b49192359de14c85bd1a4a32daeb90c4f56f4069 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text✨ What's new
- Downgrade helm from v4.1.1 to v3.19.5
- Update carvel kbld dependency to v0.47.2
Full Changelog: v0.59.2...v0.59.3
📂 Files Checksum
f9cc0cb7af6aa7330282cc65157f0e1c0b84fc829b42ba18f0342463109a9dcc ./release.yml
5524ef6ec2ad87c8b6491275d344dcdec897973e9df20ce42dd11a7e958441e9 ./kctrl-darwin-amd64
8f8016c4ce351e1065811c491dcb687174d82efe8b6205bcd9552582d9e86bc3 ./kctrl-darwin-arm64
94ad503a023c5df10095e72f681f0fc564ffed361538ce666db21ed11958ee01 ./kctrl-linux-amd64
06b41d8bd1313610be2412be971af01abd89f0a41befc27f51331defcec7adf8 ./kctrl-linux-arm64
3f7f2dd35ba78b4ac069d13c0a0b26ca422cf164a996e17a71072c675d0fd1a7 ./kctrl-windows-amd64.exe
81c5f515063a48964c87e8de1789d5278afe18a851f2bed02715e293cc0aa7b7 ./package.yml
7a6aa35600459a1797a6f0564ae89954e6da035fe54e19b72c573f5b31938a8c ./package-metadata.yml
v0.59.2
Installation and signature verification
Installation of kctrl
By downloading binary from the release
For instance, if you are using Linux on an AMD64 architecture:
# Download the binary
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.2/kctrl-linux-amd64
# Move the binary in to your PATH
mv kctrl-linux-amd64 /usr/local/bin/kctrl
# Make the binary executable
chmod +x /usr/local/bin/kctrlVia Homebrew (macOS or Linux)
$ brew tap carvel-dev/carvel
$ brew install kctrl
$ kctrl versionVerify checksums file signature
Install cosign on your system https://docs.sigstore.dev/system_config/installation/
The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:
# Download the checksums file, certificate, and signature
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.2/checksums.txt
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.2/checksums.txt.pem
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.2/checksums.txt.sig
### Verify the checksums file
cosign verify-blob checksums.txt --certificate checksums.txt.pem --signature checksums.txt.sig --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com Verify binary integrity
To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature. For instance, if you are using Linux on an AMD64 architecture:
# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missingInstallation of kapp-controller
kapp-controller can be installed by using kapp
kapp deploy -a kc -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.2/release.ymlor by using kubectl
kubectl deploy -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.2/release.ymlContainer Images
Kapp-controller and Kapp-controller-package-bundle images are available in Github Container Registry.
OCI Image URLs
- ghcr.io/carvel-dev/kapp-controller@sha256:ff4368366d7bd932acd80133138144166831ed25f08fb3a563c1256e1d9da933
- ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:98f6510b17f8f3028d325ba33e72eba259e8b434a51761fe04f2102d4558aeef
Verify container image signature
The container images are signed using Cosign with GitHub OIDC. To validate the signature of OCI images, run the following commands:
# Verifying kapp-controller image
cosign verify ghcr.io/carvel-dev/kapp-controller@sha256:ff4368366d7bd932acd80133138144166831ed25f08fb3a563c1256e1d9da933 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text
# Verifying kapp-controller-package-bundle image
cosign verify ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:98f6510b17f8f3028d325ba33e72eba259e8b434a51761fe04f2102d4558aeef --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text✨ What's new
- Bump golang 1.25.7 by @sameerforge in #1784
- Bump Carvel Dependencies by @CodesbyUnnati in #1789
New Contributors
- @sameerforge made their first contribution in #1784
Full Changelog: v0.59.1...v0.59.2
📂 Files Checksum
101988693b9a8215b5353dc871e95f095fc59eaab8ce2acc6da3be8ef39b235b ./release.yml
5da30f0f61837bf4df57c85ac455b4714351d4110fe9612763a2b1100e676691 ./kctrl-darwin-amd64
25d3c21f588ee5d339f96da210ad955f3958ea4bcfe6b36e2cb473ddfce0e6d3 ./kctrl-darwin-arm64
38d0da769836ec9b4a556ed88937c2357928d701c708ceb034bd04fc94a77872 ./kctrl-linux-amd64
b5690024b2a11149c0ed3c4c07b4a070abae76bdb2eb102f0c042ee0ebd8e354 ./kctrl-linux-arm64
41b31b0d60eb1f93f573e29f292f6cc439ca80e15203cca318a82800f81d7aaf ./kctrl-windows-amd64.exe
f30a8cc9d1fb747efe563d5694428e1c7aa07e229a79ab79dd38a0a32752922c ./package.yml
7a6aa35600459a1797a6f0564ae89954e6da035fe54e19b72c573f5b31938a8c ./package-metadata.yml
v0.59.1
Installation and signature verification
Installation of kctrl
By downloading binary from the release
For instance, if you are using Linux on an AMD64 architecture:
# Download the binary
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.1/kctrl-linux-amd64
# Move the binary in to your PATH
mv kctrl-linux-amd64 /usr/local/bin/kctrl
# Make the binary executable
chmod +x /usr/local/bin/kctrlVia Homebrew (macOS or Linux)
$ brew tap carvel-dev/carvel
$ brew install kctrl
$ kctrl versionVerify checksums file signature
Install cosign on your system https://docs.sigstore.dev/system_config/installation/
The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:
# Download the checksums file, certificate, and signature
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.1/checksums.txt
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.1/checksums.txt.pem
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.1/checksums.txt.sig
### Verify the checksums file
cosign verify-blob checksums.txt --certificate checksums.txt.pem --signature checksums.txt.sig --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com Verify binary integrity
To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature. For instance, if you are using Linux on an AMD64 architecture:
# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missingInstallation of kapp-controller
kapp-controller can be installed by using kapp
kapp deploy -a kc -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.1/release.ymlor by using kubectl
kubectl deploy -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.1/release.ymlContainer Images
Kapp-controller and Kapp-controller-package-bundle images are available in Github Container Registry.
OCI Image URLs
- ghcr.io/carvel-dev/kapp-controller@sha256:366640afc68a791bb6e91d249c7b6c02de3695ef738a6fe9f8ed99ac65aefdb6
- ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:7cf9e176aac02bf8f355ccae379332a51ea35571121cd60271e345d7d9d75c22
Verify container image signature
The container images are signed using Cosign with GitHub OIDC. To validate the signature of OCI images, run the following commands:
# Verifying kapp-controller image
cosign verify ghcr.io/carvel-dev/kapp-controller@sha256:366640afc68a791bb6e91d249c7b6c02de3695ef738a6fe9f8ed99ac65aefdb6 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text
# Verifying kapp-controller-package-bundle image
cosign verify ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:7cf9e176aac02bf8f355ccae379332a51ea35571121cd60271e345d7d9d75c22 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text✨ What's new
- Bump golang version and fix CVEs by @CodesbyUnnati in #1778
- Bump kapp, kbld, vendir, helm, cue-lang/cue dependencies by @dependabot[bot] in #1775
New Contributors
- @CodesbyUnnati made their first contribution in #1778
Full Changelog: v0.59.0...v0.59.1
📂 Files Checksum
281b31fc6ab5910af6414e85c95da5f73bdd6e6b9c890f179db6c790b4160c3a ./release.yml
1c306be0cabd69b83efc4022ed9c57bd38c9abab4a9b3144def1796926f6def4 ./kctrl-darwin-amd64
0d32b880e37745d1fff2d92d2388054fb6c7aa96be0333f29c1c1e8db51458be ./kctrl-darwin-arm64
3cf09ba4ea90e3b44de569ddacaeaa9b1cf930772dee67dbb2a4deefa3c187a8 ./kctrl-linux-amd64
efd2d439701ccbb63738d584f14509a234f8df94ab34c4700de2e27ce78a7bbd ./kctrl-linux-arm64
bb8082b41e75c3907c8ebeecd09df83734cc1d4cbdcf76c82f590ccab0ff8d5a ./kctrl-windows-amd64.exe
c6f73bf696d6d781add7172717670ed2acfe004945e383c94c901a2bc076a61b ./package.yml
7a6aa35600459a1797a6f0564ae89954e6da035fe54e19b72c573f5b31938a8c ./package-metadata.yml
v0.59.0
Installation and signature verification
Installation of kctrl
By downloading binary from the release
For instance, if you are using Linux on an AMD64 architecture:
# Download the binary
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.0/kctrl-linux-amd64
# Move the binary in to your PATH
mv kctrl-linux-amd64 /usr/local/bin/kctrl
# Make the binary executable
chmod +x /usr/local/bin/kctrlVia Homebrew (macOS or Linux)
$ brew tap carvel-dev/carvel
$ brew install kctrl
$ kctrl versionVerify checksums file signature
Install cosign on your system https://docs.sigstore.dev/system_config/installation/
The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:
# Download the checksums file, certificate, and signature
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.0/checksums.txt
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.0/checksums.txt.pem
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.0/checksums.txt.sig
### Verify the checksums file
cosign verify-blob checksums.txt --certificate checksums.txt.pem --signature checksums.txt.sig --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com Verify binary integrity
To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature. For instance, if you are using Linux on an AMD64 architecture:
# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missingInstallation of kapp-controller
kapp-controller can be installed by using kapp
kapp deploy -a kc -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.0/release.ymlor by using kubectl
kubectl deploy -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.59.0/release.ymlContainer Images
Kapp-controller and Kapp-controller-package-bundle images are available in Github Container Registry.
OCI Image URLs
- ghcr.io/carvel-dev/kapp-controller@sha256:8fd68cf144f0fb2236785be395783976c7ba21b9c6ab804322789f7557f9e6ea
- ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:cbf6be793f9cca3e3a2aaa87877bc31700add7731bf8b0c42bebe9f03dcfc71a
Verify container image signature
The container images are signed using Cosign with GitHub OIDC. To validate the signature of OCI images, run the following commands:
# Verifying kapp-controller image
cosign verify ghcr.io/carvel-dev/kapp-controller@sha256:8fd68cf144f0fb2236785be395783976c7ba21b9c6ab804322789f7557f9e6ea --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text
# Verifying kapp-controller-package-bundle image
cosign verify ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:cbf6be793f9cca3e3a2aaa87877bc31700add7731bf8b0c42bebe9f03dcfc71a --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text✨ What's new
- Add retry logic for App CR updates to handle optimistic concurrency conflicts by @mdzhigarov in #1766
- Bump minimum k8s version, images and helm chart in tests by @praveenrewar in #1767
- Bump ytt, helm, sops, cue-lang dependencies by @dependabot[bot] in #1733
Full Changelog: v0.58.1...v0.59.0
📂 Files Checksum
1ccc86aa37548cdeb7e09e24f92b1a67fc0b9198893d257b68c7763782576c2c ./release.yml
47cbb16acae187d11bdc6af8612f9a278f367033cb5e4d459ea5336e3c7a7061 ./kctrl-darwin-amd64
25035cd7f32bcba588ee2f96aafa635ddd8963dc1cef4b5096eae4752119620a ./kctrl-darwin-arm64
96d098ab5e897acba8e7b36f6e9be731b53517cfc3f34380c5f3f24a7ac2a8dc ./kctrl-linux-amd64
f78201bc2f56c3010a05e6cd2bea9cbb39ad2249ca38a40cebec19ea5eb058b4 ./kctrl-linux-arm64
6e1c50452ee6538c9b7ba0fcbf7f179a3ca40173f5156770130eae1ddf24f1dc ./kctrl-windows-amd64.exe
0e7b0ea7f13f991cc6e2e9bed2a1d03a1c477fcae6d95a84d3200b854841e546 ./package.yml
7a6aa35600459a1797a6f0564ae89954e6da035fe54e19b72c573f5b31938a8c ./package-metadata.yml
v0.58.2
✨ What's New
- Bump minimum k8s version, hardcoded bitnami images and helm charts by @CodesbyUnnati in #1782
Full Changelog: v0.58.1...v0.58.2
Installation and signature verification
Installation of kctrl
By downloading binary from the release
For instance, if you are using Linux on an AMD64 architecture:
# Download the binary
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.58.2/kctrl-linux-amd64
# Move the binary in to your PATH
mv kctrl-linux-amd64 /usr/local/bin/kctrl
# Make the binary executable
chmod +x /usr/local/bin/kctrlVia Homebrew (macOS or Linux)
$ brew tap carvel-dev/carvel
$ brew install kctrl
$ kctrl versionVerify checksums file signature
Install cosign on your system https://docs.sigstore.dev/system_config/installation/
The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:
# Download the checksums file, certificate, and signature
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.58.2/checksums.txt
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.58.2/checksums.txt.pem
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.58.2/checksums.txt.sig
### Verify the checksums file
cosign verify-blob checksums.txt --certificate checksums.txt.pem --signature checksums.txt.sig --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com Verify binary integrity
To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature. For instance, if you are using Linux on an AMD64 architecture:
# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missingInstallation of kapp-controller
kapp-controller can be installed by using kapp
kapp deploy -a kc -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.58.2/release.ymlor by using kubectl
kubectl deploy -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.58.2/release.ymlContainer Images
Kapp-controller and Kapp-controller-package-bundle images are available in Github Container Registry.
OCI Image URLs
- ghcr.io/carvel-dev/kapp-controller@sha256:62067a466170ccb7d5f5376fe44e20f3dc2f4a6a805018657f0975dff3075bd8
- ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:e7e5d090c01291c7339dcfd3beb76caf8f9eaf182cb3d14e788189808c1baf07
Verify container image signature
The container images are signed using Cosign with GitHub OIDC. To validate the signature of OCI images, run the following commands:
# Verifying kapp-controller image
cosign verify ghcr.io/carvel-dev/kapp-controller@sha256:62067a466170ccb7d5f5376fe44e20f3dc2f4a6a805018657f0975dff3075bd8 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text
# Verifying kapp-controller-package-bundle image
cosign verify ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:e7e5d090c01291c7339dcfd3beb76caf8f9eaf182cb3d14e788189808c1baf07 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text📂 Files Checksum
212e6a69726d97b82af8a31fc74dadc4e9b93954c2136501fa3d24f149b70af2 ./release.yml
902d763216276eaa5102dfd533da6d022a4b077c76bf9cab3f89011c9a9832ba ./kctrl-darwin-amd64
9fe6b476c3bbd7f88eb37faf73627564ef23e9746837c066e019d3700bda0ee4 ./kctrl-darwin-arm64
b84cd677eba558aebbae5fae9b408eb77d13c90d6e6ea887109f0cfd35017371 ./kctrl-linux-amd64
e67117bfab025cf4cfcc64d4157b9df1f5dd330092fddd3181226b2a13a7e233 ./kctrl-linux-arm64
aa683f4650bea1b68ff5f0556e27644324ad348e82399489c652a4d5e558d8a4 ./kctrl-windows-amd64.exe
4ca90bcaed05ab975d420be2c3e614956a39da2cc4ac6e451ad33ea999af063c ./package.yml
7a6aa35600459a1797a6f0564ae89954e6da035fe54e19b72c573f5b31938a8c ./package-metadata.yml
v0.58.1
Installation and signature verification
Installation of kctrl
By downloading binary from the release
For instance, if you are using Linux on an AMD64 architecture:
# Download the binary
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.58.1/kctrl-linux-amd64
# Move the binary in to your PATH
mv kctrl-linux-amd64 /usr/local/bin/kctrl
# Make the binary executable
chmod +x /usr/local/bin/kctrlVia Homebrew (macOS or Linux)
$ brew tap carvel-dev/carvel
$ brew install kctrl
$ kctrl versionVerify checksums file signature
Install cosign on your system https://docs.sigstore.dev/system_config/installation/
The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:
# Download the checksums file, certificate, and signature
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.58.1/checksums.txt
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.58.1/checksums.txt.pem
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.58.1/checksums.txt.sig
### Verify the checksums file
cosign verify-blob checksums.txt --certificate checksums.txt.pem --signature checksums.txt.sig --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com Verify binary integrity
To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature. For instance, if you are using Linux on an AMD64 architecture:
# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missingInstallation of kapp-controller
kapp-controller can be installed by using kapp
kapp deploy -a kc -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.58.1/release.ymlor by using kubectl
kubectl deploy -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.58.1/release.ymlContainer Images
Kapp-controller and Kapp-controller-package-bundle images are available in Github Container Registry.
OCI Image URLs
- ghcr.io/carvel-dev/kapp-controller@sha256:9ed60b14380798ef3e781f4998a49b77b28c763bf924fcc42c6fb1dc6755997e
- ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:189417be78f908f6b532b2a1b8fb41d65eda2bc1bdc00f4834033d87ffbf6db7
Verify container image signature
The container images are signed using Cosign with GitHub OIDC. To validate the signature of OCI images, run the following commands:
# Verifying kapp-controller image
cosign verify ghcr.io/carvel-dev/kapp-controller@sha256:9ed60b14380798ef3e781f4998a49b77b28c763bf924fcc42c6fb1dc6755997e --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text
# Verifying kapp-controller-package-bundle image
cosign verify ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:189417be78f908f6b532b2a1b8fb41d65eda2bc1bdc00f4834033d87ffbf6db7 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text📂 Files Checksum
4b331cd958699b575df506651e359db459f79414a979247a75c39bdb8e1cd89d ./release.yml
85f6ab96d7db39384d78d8998efbe8652063405e76792f1163e9a61a52c8caf3 ./kctrl-darwin-amd64
89f2c5fef2067295684e34592c4c25a1e3b7f88d4fb529310007d001098f96a9 ./kctrl-darwin-arm64
978fc078d53a827716dacde7483294d1265c3d42ace0c2582df62b5c38dd17ae ./kctrl-linux-amd64
a9cb74f12effb45c56d16b56551aaf50e96fac0359b5ace6ec8e40d370762ac8 ./kctrl-linux-arm64
5c03eead9cac258d65af2baa8f182c1eb3ced3cd25ae90dd690db677d91fffd4 ./kctrl-windows-amd64.exe
d4083bb063c00aeaa65f64e96bd17ed2093bb2ecbc4e340f9402a5cd4c610688 ./package.yml
7a6aa35600459a1797a6f0564ae89954e6da035fe54e19b72c573f5b31938a8c ./package-metadata.yml
What's Changed
- Bump sigstore/cosign-installer from 3.8.2 to 3.9.1 by @dependabot[bot] in #1738
- Bump softprops/action-gh-release from 2.2.2 to 2.3.2 by @dependabot[bot] in #1735
- Fix PKGI reconciliation taking old App status during upgrade by @mdzhigarov in #1751
New Contributors
- @mdzhigarov made their first contribution in #1751
Full Changelog: v0.58.0...v0.58.1
v0.58.0
Installation and signature verification
Installation of kctrl
By downloading binary from the release
For instance, if you are using Linux on an AMD64 architecture:
# Download the binary
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.58.0/kctrl-linux-amd64
# Move the binary in to your PATH
mv kctrl-linux-amd64 /usr/local/bin/kctrl
# Make the binary executable
chmod +x /usr/local/bin/kctrlVia Homebrew (macOS or Linux)
$ brew tap carvel-dev/carvel
$ brew install kctrl
$ kctrl versionVerify checksums file signature
Install cosign on your system https://docs.sigstore.dev/system_config/installation/
The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:
# Download the checksums file, certificate, and signature
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.58.0/checksums.txt
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.58.0/checksums.txt.pem
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.58.0/checksums.txt.sig
### Verify the checksums file
cosign verify-blob checksums.txt --certificate checksums.txt.pem --signature checksums.txt.sig --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com Verify binary integrity
To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature. For instance, if you are using Linux on an AMD64 architecture:
# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missingInstallation of kapp-controller
kapp-controller can be installed by using kapp
kapp deploy -a kc -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.58.0/release.ymlor by using kubectl
kubectl deploy -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.58.0/release.ymlContainer Images
Kapp-controller and Kapp-controller-package-bundle images are available in Github Container Registry.
OCI Image URLs
- ghcr.io/carvel-dev/kapp-controller@sha256:52ecad550cd3e98b6a27ca85e851c5b0884b04d99003ea201a289f75e33d9232
- ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:65973945afcd3f7c104f0506eade52d032f9851737c573bafd3556aed02c8bcc
Verify container image signature
The container images are signed using Cosign with GitHub OIDC. To validate the signature of OCI images, run the following commands:
# Verifying kapp-controller image
cosign verify ghcr.io/carvel-dev/kapp-controller@sha256:52ecad550cd3e98b6a27ca85e851c5b0884b04d99003ea201a289f75e33d9232 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text
# Verifying kapp-controller-package-bundle image
cosign verify ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:65973945afcd3f7c104f0506eade52d032f9851737c573bafd3556aed02c8bcc --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text✨ What's new
Full Changelog: v0.57.0...v0.58.0
📂 Files Checksum
e49152835e085221e9f9646a6c23ee0f13040cbcdf758b3301541bdd7fabd0d9 ./release.yml
e6f2cf55d12974f7fff268e47e1f0d924f9a69b3b8f78589b6941f908b4da0fe ./kctrl-darwin-amd64
bc75e2c25ff2a01ba86a5889746887642bfb7fab27fa58614d3ae6af57196929 ./kctrl-darwin-arm64
ede5d31ac4dfe73e82364cf430ef5016de309185606c981cbdbdbeab42589ca0 ./kctrl-linux-amd64
f253f9accf118dfeaabbaffc71d9c7bcb5f4c0e87ba4bd4bfd95edd7ab0af700 ./kctrl-linux-arm64
0842451df69c7503d423cf8ed25d66f4e072b8d22082eb48ab08d48e8c528bb7 ./kctrl-windows-amd64.exe
fe7bac5abaa4f8bdbb7067619a2cd104903a6ec53d4573a322e09c16e4ed03cf ./package.yml
7a6aa35600459a1797a6f0564ae89954e6da035fe54e19b72c573f5b31938a8c ./package-metadata.yml
v0.57.0
Installation and signature verification
Installation of kctrl
By downloading binary from the release
For instance, if you are using Linux on an AMD64 architecture:
# Download the binary
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.57.0/kctrl-linux-amd64
# Move the binary in to your PATH
mv kctrl-linux-amd64 /usr/local/bin/kctrl
# Make the binary executable
chmod +x /usr/local/bin/kctrlVia Homebrew (macOS or Linux)
$ brew tap carvel-dev/carvel
$ brew install kctrl
$ kctrl versionVerify checksums file signature
Install cosign on your system https://docs.sigstore.dev/system_config/installation/
The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:
# Download the checksums file, certificate, and signature
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.57.0/checksums.txt
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.57.0/checksums.txt.pem
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.57.0/checksums.txt.sig
### Verify the checksums file
cosign verify-blob checksums.txt --certificate checksums.txt.pem --signature checksums.txt.sig --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com Verify binary integrity
To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature. For instance, if you are using Linux on an AMD64 architecture:
# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missingInstallation of kapp-controller
kapp-controller can be installed by using kapp
kapp deploy -a kc -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.57.0/release.ymlor by using kubectl
kubectl deploy -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.57.0/release.ymlContainer Images
Kapp-controller and Kapp-controller-package-bundle images are available in Github Container Registry.
OCI Image URLs
- ghcr.io/carvel-dev/kapp-controller@sha256:80589bbd88400f3dd5eed5b772f8e4cd9ab2b721fd30684566a40e4761b1247d
- ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:875688d03244e9a7ce8d071d29718946334d2afa3492f26c065b04a374747b73
Verify container image signature
The container images are signed using Cosign with GitHub OIDC. To validate the signature of OCI images, run the following commands:
# Verifying kapp-controller image
cosign verify ghcr.io/carvel-dev/kapp-controller@sha256:80589bbd88400f3dd5eed5b772f8e4cd9ab2b721fd30684566a40e4761b1247d --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text
# Verifying kapp-controller-package-bundle image
cosign verify ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:875688d03244e9a7ce8d071d29718946334d2afa3492f26c065b04a374747b73 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text✨ What's new
- Allow users to choose platform when using kbld @cppforlife #1726
Full Changelog: v0.56.1...v0.57.0
📂 Files Checksum
e8a6dc5b13f5b827602698e1497f275aeff85dc93bccf862c6202d875d116b20 ./release.yml
34175c88f2d14cadced624906a1c31581e09530b3ad1e6cea854e5a0c9ae5276 ./kctrl-darwin-amd64
bccf148ab53aaf1b5547efb8caa75facb15fd363c3c5d070d9d8bcfa426ce6f6 ./kctrl-darwin-arm64
35d96da8f8076efbb245c8cb6fed350e748789c670d34e792d1258584c56a8c1 ./kctrl-linux-amd64
9eb6d6903c8ea4fd474d2668805627b9d22c1bf750dde2e842e07884e37af615 ./kctrl-linux-arm64
6ffa07cd3ddee82fb23d90e2ac80d3dc6ecca4837c957b0b1f23e8ab58af873d ./kctrl-windows-amd64.exe
eb0a35028a441d7baaf799a85732bd0201d03eb17224c19b12e23a9a9f2d95ee ./package.yml
7a6aa35600459a1797a6f0564ae89954e6da035fe54e19b72c573f5b31938a8c ./package-metadata.yml