Releases: carvel-dev/imgpkg
v0.47.0
Installation and signature verification
Installation
By downloading binary from the release
For instance, if you are using Linux on an AMD64 architecture:
# Download the binary
curl -LO https://github.com/carvel-dev/imgpkg/releases/download/v0.47.0/imgpkg-linux-amd64
# Move the binary in to your PATH
mv imgpkg-linux-amd64 /usr/local/bin/imgpkg
# Make the binary executable
chmod +x /usr/local/bin/imgpkgVia Homebrew (macOS or Linux)
$ brew tap carvel-dev/carvel
$ brew install imgpkg
$ imgpkg versionVerify checksums file signature
Install cosign on your system https://docs.sigstore.dev/system_config/installation/
The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:
# Download the checksums file, certificate and signature
curl -LO https://github.com/carvel-dev/imgpkg/releases/download/v0.47.0/checksums.txt
curl -LO https://github.com/carvel-dev/imgpkg/releases/download/v0.47.0/checksums.txt.pem
curl -LO https://github.com/carvel-dev/imgpkg/releases/download/v0.47.0/checksums.txt.sig
# Verify the checksums file
cosign verify-blob checksums.txt \
--certificate checksums.txt.pem \
--signature checksums.txt.sig \
--certificate-identity-regexp=https://github.com/carvel-dev \
--certificate-oidc-issuer=https://token.actions.githubusercontent.comVerify binary integrity
To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature.
# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missingWhat's Changed
- Allow shallow-copy of a bundle by @rosenhouse in #758
- Add layer and image size information to describe command by @mdzhigarov in #760
- Bump golang.org/x/sys from 0.32.0 to 0.33.0 by @dependabot in #740
- Bump golang.org/x/sync from 0.13.0 to 0.14.0 by @dependabot in #741
- Bump golang to 1.24.9 by @devanshuVmware in #759
New Contributors
- @rosenhouse made their first contribution in #758
Full Changelog: v0.46.0...v0.47.0
📂 Files Checksum
14d0083027eeba54a4804c561fb41d0c723f908ec91e073e88f3a64c52b54544 ./imgpkg-linux-arm64
465b4843ae762c6a693fffe250a13bef37536cf6fd218d791165a919214447c5 ./imgpkg-darwin-arm64
5e03036ecc48c3385618f6020bad13554493019dbb472062f6ccab28e4b01162 ./imgpkg-darwin-amd64
754abc5ed6d3dcab5791107ed355e10ba30041ba8ede1f5d94b9a733c71eae48 ./imgpkg-windows-amd64.exe
7602b6af24a818265dcb2cc0dc7f6117a3591f26e2c266f294800f99ae433da1 ./imgpkg-linux-amd64
v0.46.1
Installation and signature verification
Installation
By downloading binary from the release
For instance, if you are using Linux on an AMD64 architecture:
# Download the binary
curl -LO https://github.com/carvel-dev/imgpkg/releases/download/v0.46.1/imgpkg-linux-amd64
# Move the binary in to your PATH
mv imgpkg-linux-amd64 /usr/local/bin/imgpkg
# Make the binary executable
chmod +x /usr/local/bin/imgpkgVia Homebrew (macOS or Linux)
$ brew tap carvel-dev/carvel
$ brew install imgpkg
$ imgpkg versionVerify checksums file signature
Install cosign on your system https://docs.sigstore.dev/system_config/installation/
The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:
# Download the checksums file, certificate and signature
curl -LO https://github.com/carvel-dev/imgpkg/releases/download/v0.46.1/checksums.txt
curl -LO https://github.com/carvel-dev/imgpkg/releases/download/v0.46.1/checksums.txt.pem
curl -LO https://github.com/carvel-dev/imgpkg/releases/download/v0.46.1/checksums.txt.sig
# Verify the checksums file
cosign verify-blob checksums.txt \
--certificate checksums.txt.pem \
--signature checksums.txt.sig \
--certificate-identity-regexp=https://github.com/carvel-dev \
--certificate-oidc-issuer=https://token.actions.githubusercontent.comVerify binary integrity
To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature.
# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missingWhat's Changed
- Bump go version to 1.23.8 by @devanshuVmware in #739
Full Changelog: v0.46.0...v0.46.1
📂 Files Checksum
14dfc45cc3927a64c99d5a0b473fc74539ca7027f2f0acfef9a8edc5fff50f44 ./imgpkg-windows-amd64.exe
1bc6b735dbdd940a5c78661781f937090bd5fbc89172f01e600ee91fe122edbe ./imgpkg-linux-amd64
3e7cfba3cc55401ad1bbc80c7710e67a0376c56d8a72dc81864ffbbe64b30aba ./imgpkg-linux-arm64
7d72601f46827ba7cb65ba2f0cc07fb1ccfdcc99d7b6cdb5923ecedb692f7c31 ./imgpkg-darwin-amd64
db44c36ee72481afe70105cda10989e441ad23f6292b9ff1de815c9e1e3a3416 ./imgpkg-darwin-arm64
v0.46.0
Installation and signature verification
Installation
By downloading binary from the release
For instance, if you are using Linux on an AMD64 architecture:
# Download the binary
curl -LO https://github.com/carvel-dev/imgpkg/releases/download/v0.46.0/imgpkg-linux-amd64
# Move the binary in to your PATH
mv imgpkg-linux-amd64 /usr/local/bin/imgpkg
# Make the binary executable
chmod +x /usr/local/bin/imgpkgVia Homebrew (macOS or Linux)
$ brew tap carvel-dev/carvel
$ brew install imgpkg
$ imgpkg versionVerify checksums file signature
Install cosign on your system https://docs.sigstore.dev/system_config/installation/
The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:
# Download the checksums file, certificate and signature
curl -LO https://github.com/carvel-dev/imgpkg/releases/download/v0.46.0/checksums.txt
curl -LO https://github.com/carvel-dev/imgpkg/releases/download/v0.46.0/checksums.txt.pem
curl -LO https://github.com/carvel-dev/imgpkg/releases/download/v0.46.0/checksums.txt.sig
# Verify the checksums file
cosign verify-blob checksums.txt \
--certificate checksums.txt.pem \
--signature checksums.txt.sig \
--certificate-identity-regexp=https://github.com/carvel-dev \
--certificate-oidc-issuer=https://token.actions.githubusercontent.comVerify binary integrity
To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature.
# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missingWhat's Changed
- Make resume option faster by reusing the tar file instead of copying it to the side
Full Changelog: v0.45.0...v0.46.0
📂 Files Checksum
0a2fc4faef18c342d310357a948766818fda2c0753d42b26e23a58afa9cbf761 ./imgpkg-darwin-amd64
2f7543d3873e60776a8dfb5e4f329c7d2f476413247bb11f6e816a649be1d7a1 ./imgpkg-darwin-arm64
8b8801eecbcea1206e2e3d6c391288b092108eab93f8ff0d9bacd5059af697df ./imgpkg-windows-amd64.exe
a57004ab4a52c3e9b3b1c2eeab76113b3cbffaa46142f56261bbf2d2fedc182a ./imgpkg-linux-arm64
e21cb5f3ff185b6a5e93ce6114cd7120e8bafe658916a1b549d7c54fce806ced ./imgpkg-linux-amd64
v0.45.0
Installation and signature verification
Installation
By downloading binary from the release
For instance, if you are using Linux on an AMD64 architecture:
# Download the binary
curl -LO https://github.com/carvel-dev/imgpkg/releases/download/v0.45.0/imgpkg-linux-amd64
# Move the binary in to your PATH
mv imgpkg-linux-amd64 /usr/local/bin/imgpkg
# Make the binary executable
chmod +x /usr/local/bin/imgpkgVia Homebrew (macOS or Linux)
$ brew tap carvel-dev/carvel
$ brew install imgpkg
$ imgpkg versionVerify checksums file signature
Install cosign on your system https://docs.sigstore.dev/system_config/installation/
The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:
# Download the checksums file, certificate and signature
curl -LO https://github.com/carvel-dev/imgpkg/releases/download/v0.45.0/checksums.txt
curl -LO https://github.com/carvel-dev/imgpkg/releases/download/v0.45.0/checksums.txt.pem
curl -LO https://github.com/carvel-dev/imgpkg/releases/download/v0.45.0/checksums.txt.sig
# Verify the checksums file
cosign verify-blob checksums.txt \
--certificate checksums.txt.pem \
--signature checksums.txt.sig \
--certificate-identity-regexp=https://github.com/carvel-dev \
--certificate-oidc-issuer=https://token.actions.githubusercontent.comVerify binary integrity
To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature.
# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missingWhat's Changed
- In the past we were supposed to change the behavior of the flag
--layersfrom the describe command, but we only changed the text and not the default value. - Maintenance update of libraries
- Fix the
--resumeflag behavior to effectively resume. There was an issue with the implementation that was causing resume not to do what it was supposed to do
Full Changelog: v0.44.2...v0.45.0
📂 Files Checksum
1238477e9067cf68143ef6bce3279e983c72eb0eb0a7513b5ca1f23a2f4aa6c1 ./imgpkg-darwin-amd64
51dbff787fd64d25869737e92516b4d2e31d4ae2b2f0773dae032217e3e1bf58 ./imgpkg-linux-arm64
9ad0814e1e8742ee40c6affa5324f6b62d565a1c19cbc782446bff9eb15ced7a ./imgpkg-windows-amd64.exe
c06708b47baf4e647ec7d88def7eca21c4d7732b369e832131b1649ab2a4a180 ./imgpkg-linux-amd64
e351f9c590008eea4719c22ce19ee505d97fc32f43373d1a3ed518267d6a0ccc ./imgpkg-darwin-arm64
v0.44.2
Installation and signature verification
Installation
By downloading binary from the release
For instance, if you are using Linux on an AMD64 architecture:
# Download the binary
curl -LO https://github.com/carvel-dev/imgpkg/releases/download/v0.44.2/imgpkg-linux-amd64
# Move the binary in to your PATH
mv imgpkg-linux-amd64 /usr/local/bin/imgpkg
# Make the binary executable
chmod +x /usr/local/bin/imgpkgVia Homebrew (macOS or Linux)
$ brew tap carvel-dev/carvel
$ brew install imgpkg
$ imgpkg versionVerify checksums file signature
Install cosign on your system https://docs.sigstore.dev/system_config/installation/
The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:
# Download the checksums file, certificate and signature
curl -LO https://github.com/carvel-dev/imgpkg/releases/download/v0.44.2/checksums.txt
curl -LO https://github.com/carvel-dev/imgpkg/releases/download/v0.44.2/checksums.txt.pem
curl -LO https://github.com/carvel-dev/imgpkg/releases/download/v0.44.2/checksums.txt.sig
# Verify the checksums file
cosign verify-blob checksums.txt \
--certificate checksums.txt.pem \
--signature checksums.txt.sig \
--certificate-identity-regexp=https://github.com/carvel-dev \
--certificate-oidc-issuer=https://token.actions.githubusercontent.comVerify binary integrity
To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature.
# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missingWhat's Changed
- Maintenance update of libraries and go version
Full Changelog: v0.44.0...v0.44.2
📂 Files Checksum
133cc95fe9baa7a3fa41cdaab6e5ef60a1f54c76731be5f1b0cac577c360cc8d ./imgpkg-darwin-amd64
4aff1dea4d9f2e84ba321e2ff9a0194660508fe9267c44d9cd57e89d5eb3d8ee ./imgpkg-linux-arm64
51e2b75f809b10191afd7566bdcb7390fa6aec2d34287685ef53ec29f6569657 ./imgpkg-darwin-arm64
904bcc6ab88257be95970ca33cf03a49a07e717872deda4292ff963d0cc338ce ./imgpkg-linux-amd64
c0709f09be57989c2ddbccfa77b7183eb4e9f4b97b2ed5a596b6a533baca5e17 ./imgpkg-windows-amd64.exe
v0.44.0
Installation and signature verification
Installation
By downloading binary from the release
For instance, if you are using Linux on an AMD64 architecture:
# Download the binary
curl -LO https://github.com/carvel-dev/imgpkg/releases/download/v0.44.0/imgpkg-linux-amd64
# Move the binary in to your PATH
mv imgpkg-linux-amd64 /usr/local/bin/imgpkg
# Make the binary executable
chmod +x /usr/local/bin/imgpkgVia Homebrew (macOS or Linux)
$ brew tap carvel-dev/carvel
$ brew install imgpkg
$ imgpkg versionVerify checksums file signature
Install cosign on your system https://docs.sigstore.dev/system_config/installation/
The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:
# Download the checksums file, certificate and signature
curl -LO https://github.com/carvel-dev/imgpkg/releases/download/v0.44.0/checksums.txt
curl -LO https://github.com/carvel-dev/imgpkg/releases/download/v0.44.0/checksums.txt.pem
curl -LO https://github.com/carvel-dev/imgpkg/releases/download/v0.44.0/checksums.txt.sig
# Verify the checksums file
cosign verify-blob checksums.txt \
--certificate checksums.txt.pem \
--signature checksums.txt.sig \
--certificate-identity-regexp=https://github.com/carvel-dev \
--certificate-oidc-issuer=https://token.actions.githubusercontent.comVerify binary integrity
To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature.
# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missingWhat's Changed
- Move tag mechanism out of internal in #701 by @joaopapereira
- Bump go to version 1.23 in #703 by @joaopapereira
Full Changelog: v0.43.0...v0.44.0
📂 Files Checksum
036870d2489abec4b7d4fd4fdde7bc88d3945d55743d0a9282f3a47dc78eac53 ./imgpkg-darwin-amd64
15ca4f8ec4c7a1c6ecf06740a942149887a73845565f0ffbf6ccbf013b65a58a ./imgpkg-linux-amd64
8e113eb80ebb6c7fc508304b919fc6cc3e4151718beebd16260671ad6d5a199b ./imgpkg-windows-amd64.exe
afa82893d76cd390be622a32d5e33f10f483437e963060e59e22c8f5da3090d2 ./imgpkg-darwin-arm64
f772b6eb10654f45d15d2166d5be81cf18529aece59df906c25dcb364f508ebe ./imgpkg-linux-arm64
v0.43.1
Installation and signature verification
Installation
By downloading binary from the release
For instance, if you are using Linux on an AMD64 architecture:
# Download the binary
curl -LO https://github.com/carvel-dev/imgpkg/releases/download/v0.43.1/imgpkg-linux-amd64
# Move the binary in to your PATH
mv imgpkg-linux-amd64 /usr/local/bin/imgpkg
# Make the binary executable
chmod +x /usr/local/bin/imgpkgVia Homebrew (macOS or Linux)
$ brew tap carvel-dev/carvel
$ brew install imgpkg
$ imgpkg versionVerify checksums file signature
Install cosign on your system https://docs.sigstore.dev/system_config/installation/
The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:
# Download the checksums file, certificate and signature
curl -LO https://github.com/carvel-dev/imgpkg/releases/download/v0.43.1/checksums.txt
curl -LO https://github.com/carvel-dev/imgpkg/releases/download/v0.43.1/checksums.txt.pem
curl -LO https://github.com/carvel-dev/imgpkg/releases/download/v0.43.1/checksums.txt.sig
# Verify the checksums file
cosign verify-blob checksums.txt \
--certificate checksums.txt.pem \
--signature checksums.txt.sig \
--certificate-identity-regexp=https://github.com/carvel-dev \
--certificate-oidc-issuer=https://token.actions.githubusercontent.comVerify binary integrity
To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature.
# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missingWhat's Changed
- Fixing CVE by @rohitagg2020 in #691
Full Changelog: v0.43.0...v0.43.1
📂 Files Checksum
578b81cedbba68057fbd5b917a337fb34c8ed7406931839efc01608668aa9bd0 ./imgpkg-darwin-amd64
649eda706a172b520307c2189ee04bdc0d2b255b9b076482873ddaa2120afc18 ./imgpkg-windows-amd64.exe
7cd1ecf4b394770ccfedc38f3b4f97a1a3d49447fa0bfe1e28a4f99751597ddf ./imgpkg-linux-arm64
9cfd34a67048dd71498d2075969592f7db181e639848239c47a47426ebbb03be ./imgpkg-darwin-arm64
d36ccfcc54143d2475cf09b0247c88bccf24a7aeb062bd9bb8cab7cb58135fcf ./imgpkg-linux-amd64
v0.43.0
Installation and signature verification
Installation
By downloading binary from the release
For instance, if you are using Linux on an AMD64 architecture:
# Download the binary
curl -LO https://github.com/carvel-dev/imgpkg/releases/download/v0.43.0/imgpkg-linux-amd64
# Move the binary in to your PATH
mv imgpkg-linux-amd64 /usr/local/bin/imgpkg
# Make the binary executable
chmod +x /usr/local/bin/imgpkgVia Homebrew (macOS or Linux)
$ brew tap carvel-dev/carvel
$ brew install imgpkg
$ imgpkg versionVerify checksums file signature
Install cosign on your system https://docs.sigstore.dev/system_config/installation/
The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:
# Download the checksums file, certificate and signature
curl -LO https://github.com/carvel-dev/imgpkg/releases/download/v0.43.0/checksums.txt
curl -LO https://github.com/carvel-dev/imgpkg/releases/download/v0.43.0/checksums.txt.pem
curl -LO https://github.com/carvel-dev/imgpkg/releases/download/v0.43.0/checksums.txt.sig
# Verify the checksums file
cosign verify-blob checksums.txt \
--certificate checksums.txt.pem \
--signature checksums.txt.sig \
--certificate-identity-regexp=https://github.com/carvel-dev \
--certificate-oidc-issuer=https://token.actions.githubusercontent.comVerify binary integrity
To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature.
# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missingWhat's Changed
- Get image layer from Primary Location in #660 by @rcmadhankumar
- Limit session IDs to a non-negative, pseudo-random int32 in #664 by @mamachanko
- Introduction of the copy API in #668 by @joaopapereira
Full Changelog: v0.42.0...v0.43.0
📂 Files Checksum
02a7e3fd0142c1053c14a87084820c1940f34c7372c16d883ef54091a37ac30d ./imgpkg-darwin-amd64
099627a79b7edf9ba99321f4dc4e43404bc83c42930864c9db650070e65cfb5a ./imgpkg-linux-arm64
2a0c2adb6edf0d67a0677c6dcf036c34d1f26af2858cacd9d114669829cc4848 ./imgpkg-darwin-arm64
4f87f219012e48b917d7aaf8b0ee71729f2572fc1a3deb7483bd8744fe2e1a06 ./imgpkg-linux-amd64
c07608dd4c1b534aaebe5aaf3993ae1a6e0af44691f06d4cd035836c868084c6 ./imgpkg-windows-amd64.exe
v0.42.2
Installation and signature verification
Installation
By downloading binary from the release
For instance, if you are using Linux on an AMD64 architecture:
# Download the binary
curl -LO https://github.com/carvel-dev/imgpkg/releases/download/v0.42.2/imgpkg-linux-amd64
# Move the binary in to your PATH
mv imgpkg-linux-amd64 /usr/local/bin/imgpkg
# Make the binary executable
chmod +x /usr/local/bin/imgpkgVia Homebrew (macOS or Linux)
$ brew tap carvel-dev/carvel
$ brew install imgpkg
$ imgpkg versionVerify checksums file signature
Install cosign on your system https://docs.sigstore.dev/system_config/installation/
The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:
# Download the checksums file, certificate and signature
curl -LO https://github.com/carvel-dev/imgpkg/releases/download/v0.42.2/checksums.txt
curl -LO https://github.com/carvel-dev/imgpkg/releases/download/v0.42.2/checksums.txt.pem
curl -LO https://github.com/carvel-dev/imgpkg/releases/download/v0.42.2/checksums.txt.sig
# Verify the checksums file
cosign verify-blob checksums.txt \
--certificate checksums.txt.pem \
--signature checksums.txt.sig \
--certificate-identity-regexp=https://github.com/carvel-dev \
--certificate-oidc-issuer=https://token.actions.githubusercontent.comVerify binary integrity
To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature.
# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missingWhat's Changed
- Bump golang to 1.22.4 #672 by @rohitagg2020
Full Changelog: v0.42.1...v0.42.2
📂 Files Checksum
493f0931964e800aab255fe32256d044369c997537e7fdc8fcc93ac978c5462e ./imgpkg-linux-arm64
59f0af401217f3dc36163c31e093b5bdceeaf9397576e894b591a014480b9c1b ./imgpkg-darwin-amd64
bea6e08f5f6bf8b2a7f31486c41b34715e5dd6e4319e15968e25cd570daf5446 ./imgpkg-linux-amd64
cae062487d5c16d52f6ec70b455b6e53202e021928c061568d4e976ff7ad1a19 ./imgpkg-windows-amd64.exe
cf10c7cb2ef202e1f4fb1f334e350c760690c21883c79f8485c488ff9007aca2 ./imgpkg-darwin-arm64
v0.42.3
Installation and signature verification
Installation
By downloading binary from the release
For instance, if you are using Linux on an AMD64 architecture:
# Download the binary
curl -LO https://github.com/carvel-dev/imgpkg/releases/download/v0.42.3/imgpkg-linux-amd64
# Move the binary in to your PATH
mv imgpkg-linux-amd64 /usr/local/bin/imgpkg
# Make the binary executable
chmod +x /usr/local/bin/imgpkgVia Homebrew (macOS or Linux)
$ brew tap carvel-dev/carvel
$ brew install imgpkg
$ imgpkg versionVerify checksums file signature
Install cosign on your system https://docs.sigstore.dev/system_config/installation/
The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:
# Download the checksums file, certificate and signature
curl -LO https://github.com/carvel-dev/imgpkg/releases/download/v0.42.3/checksums.txt
curl -LO https://github.com/carvel-dev/imgpkg/releases/download/v0.42.3/checksums.txt.pem
curl -LO https://github.com/carvel-dev/imgpkg/releases/download/v0.42.3/checksums.txt.sig
# Verify the checksums file
cosign verify-blob checksums.txt \
--certificate checksums.txt.pem \
--signature checksums.txt.sig \
--certificate-identity-regexp=https://github.com/carvel-dev \
--certificate-oidc-issuer=https://token.actions.githubusercontent.comVerify binary integrity
To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature.
# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missingWhat's Changed
- Bump go version to 1.22.5 #695 by @devanshuVmware
Full Changelog: v0.42.2...v0.42.3
📂 Files Checksum
0cb732863d7e9fa263a232f89ff162886d0c88d585ea27f2f51526f531b4707d ./imgpkg-linux-arm64
9429779c0ffdbf295e4aa10591184bab1ab3f2145153205532ad080ea3135566 ./imgpkg-linux-amd64
b0382798d3045f3641f3f5c0f28ba57fb378fed8a6a1fc2d8991883ce8384a3a ./imgpkg-windows-amd64.exe
b96ad7f72a2b6cdc59f508cf606bb280f70b81f1a5024840d4cc8fcd9f63fdca ./imgpkg-darwin-arm64
ce21316a0345219b19186b9bf40947f4c19aaa50b18ed775717b80512b0b4476 ./imgpkg-darwin-amd64