v0.50.2
✨ What's new
- Bumping etcd to 3.5.9 in v0.50.x line by @sethiyash in #1507
- Bumping helm to v3.14.3 in v0.50.x line by @sethiyash in #1514
Full Changelog: v0.50.0...v0.50.2
Installation and signature verification
Installation of kctrl
By downloading binary from the release
For instance, if you are using Linux on an AMD64 architecture:
# Download the binary
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.50.2/kctrl-linux-amd64
# Move the binary in to your PATH
mv kctrl-linux-amd64 /usr/local/bin/kctrl
# Make the binary executable
chmod +x /usr/local/bin/kctrl
Via Homebrew (macOS or Linux)
$ brew tap carvel-dev/carvel
$ brew install kctrl
$ kctrl version
Verify checksums file signature
Install cosign on your system https://docs.sigstore.dev/system_config/installation/
The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:
# Download the checksums file, certificate, and signature
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.50.2/checksums.txt
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.50.2/checksums.txt.pem
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.50.2/checksums.txt.sig
### Verify the checksums file
cosign verify-blob checksums.txt --certificate checksums.txt.pem --signature checksums.txt.sig --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com
Verify binary integrity
To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature. For instance, if you are using Linux on an AMD64 architecture:
# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missing
Installation of kapp-controller
kapp-controller can be installed by using kapp
kapp deploy -a kc -f https://github.com/carvel-dev/kapp-controller/releases/v0.50.2/download/release.yml
or by using kubectl
kubectl deploy -f https://github.com/carvel-dev/kapp-controller/releases/v0.50.2/download/release.yml
Container Images
Kapp-controller and Kapp-controller-package-bundle images are available in Github Container Registry.
OCI Image URLs
- ghcr.io/carvel-dev/kapp-controller@sha256:d6fb6a6cb91ce6a578cf2cd9eaea3454c2d67a32a227bb9d131ee189456cc8af
- ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:a769f3865c59780fcfdb0fc360b705fd337e654e73fcc288c448828ab1e1b47c
Verify container image signature
The container images are signed using Cosign with GitHub OIDC. To validate the signature of OCI images, run the following commands:
# Verifying kapp-controller image
cosign verify ghcr.io/carvel-dev/kapp-controller@sha256:d6fb6a6cb91ce6a578cf2cd9eaea3454c2d67a32a227bb9d131ee189456cc8af --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text
# Verifying kapp-controller-package-bundle image
cosign verify ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:a769f3865c59780fcfdb0fc360b705fd337e654e73fcc288c448828ab1e1b47c --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text
📂 Files Checksum
4f419392e0ae2d0d4d7c1d88f7ad59b6ec19d87d8ec796ca06136531a268c4b2 ./release.yml
81cc3a73fe9031650506dab614002c240effe1957b7739f8e622f03d08b1e42d ./kctrl-darwin-amd64
25d89eb2a5df97e5539429eaba48f7ce3b984e7357516dd5a62532b09d7bc224 ./kctrl-darwin-arm64
d399b865ad2081cc4761d57de00d0d93ef297d7198e7e329c3f195e47af79573 ./kctrl-linux-amd64
1ee3a40b740fc78d88502b23d36036c66bae479829065a3ccbacd081a6074137 ./kctrl-linux-arm64
55c3089810ba8b9792aa481780126ee938d32105721986e6be193407d94e3bc9 ./kctrl-windows-amd64.exe
34423834adfe046b10acd0caf3bb0d8b18c3ed3af0d21d287ad0aa34a7f728c1 ./package.yml
7a6aa35600459a1797a6f0564ae89954e6da035fe54e19b72c573f5b31938a8c ./package-metadata.yml