Installation and signature verification
Installation of kctrl
By downloading binary from the release
For instance, if you are using Linux on an AMD64 architecture:
# Download the binary
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.55.1/kctrl-linux-amd64
# Move the binary in to your PATH
mv kctrl-linux-amd64 /usr/local/bin/kctrl
# Make the binary executable
chmod +x /usr/local/bin/kctrl
Via Homebrew (macOS or Linux)
$ brew tap carvel-dev/carvel
$ brew install kctrl
$ kctrl version
Verify checksums file signature
Install cosign on your system https://docs.sigstore.dev/system_config/installation/
The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:
# Download the checksums file, certificate, and signature
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.55.1/checksums.txt
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.55.1/checksums.txt.pem
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.55.1/checksums.txt.sig
### Verify the checksums file
cosign verify-blob checksums.txt --certificate checksums.txt.pem --signature checksums.txt.sig --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com
Verify binary integrity
To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature. For instance, if you are using Linux on an AMD64 architecture:
# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missing
Installation of kapp-controller
kapp-controller can be installed by using kapp
kapp deploy -a kc -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.55.1/release.yml
or by using kubectl
kubectl deploy -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.55.1/release.yml
Container Images
Kapp-controller and Kapp-controller-package-bundle images are available in Github Container Registry.
OCI Image URLs
- ghcr.io/carvel-dev/kapp-controller@sha256:cf250cb1d03ba0f391fa35a9424ace7327a07bd69b41c94d62e69c58d143566e
- ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:6d665f598fbb7c92c4a3f0b8d3f769c326e55a8f03cf1aefc6b0a52303c1fe6b
Verify container image signature
The container images are signed using Cosign with GitHub OIDC. To validate the signature of OCI images, run the following commands:
# Verifying kapp-controller image
cosign verify ghcr.io/carvel-dev/kapp-controller@sha256:cf250cb1d03ba0f391fa35a9424ace7327a07bd69b41c94d62e69c58d143566e --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text
# Verifying kapp-controller-package-bundle image
cosign verify ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:6d665f598fbb7c92c4a3f0b8d3f769c326e55a8f03cf1aefc6b0a52303c1fe6b --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text
✨ What's new
- Bump golang version to 1.23.6 by @devanshuVmware in #1691
Full Changelog: v0.55.0...v0.55.1
📂 Files Checksum
3c9aab3defcb809a8b5de871a63a65a19e10c86ff7da30132924bd87456f0d80 ./release.yml
11a2bef71846a18d84975a2e0a4cc549223a166c24297248547879bab01b0fcc ./kctrl-darwin-amd64
5fe357c530cd850e3c8f63a60d29667d9b9e12ad8572324e38ef7d4af963ac1c ./kctrl-darwin-arm64
39dd9593f3a7435ea2a9014dd832b5c9ed1eb1aba52e22c2b6186a0170c52f34 ./kctrl-linux-amd64
234bcab23f6d8349855bf1dfd27dd0d1617ff2188034be8c37e984026893d9e1 ./kctrl-linux-arm64
751cb9516d3e1bb40faf962058ace7dc4877ead394ab985b841452245b892b18 ./kctrl-windows-amd64.exe
10f38a843896faa440fc9b3a1a17ee1c322e8f2933793d9bf4d2a79d3eee4e8e ./package.yml
7a6aa35600459a1797a6f0564ae89954e6da035fe54e19b72c573f5b31938a8c ./package-metadata.yml