@@ -3,11 +3,9 @@ title: Download Kubernetes
3
3
type : docs
4
4
---
5
5
6
- # Core Kubernetes components
7
-
8
6
Kubernetes ships binaries for each component as well as a standard set of client
9
7
applications to bootstrap or interact with a cluster. Components like the
10
- Kube API Server are capable of running within container images inside of a
8
+ API server are capable of running within container images inside of a
11
9
cluster. Those components are also shipped in container images as part of the
12
10
official release process. All binaries as well as container images are available
13
11
for multiple operating systems as well as hardware architectures.
@@ -20,7 +18,7 @@ container registry.
20
18
21
19
{{< feature-state for_k8s_version="v1.24" state="alpha" >}}
22
20
23
- From the beginning of Kubernetes {{< param "version" >}}, the following
21
+ For Kubernetes {{< param "version" >}}, the following
24
22
container images are signed using [ cosign] ( https://github.com/sigstore/cosign )
25
23
signatures:
26
24
@@ -75,13 +73,13 @@ in SBoM (Software Bill of Materials) format.
75
73
You can fetch that list using:
76
74
77
75
``` shell
78
- curl -Ls https://sbom.k8s.io/$( curl -Ls https://dl.k8s.io/release/latest.txt) /release | grep ' PackageName: k8s.gcr.io/ ' | awk ' {print $2}'
76
+ curl -Ls " https://sbom.k8s.io/$( curl -Ls https://dl.k8s.io/release/latest.txt) /release" | awk ' / PackageName: k8s.gcr.io\// {print $2}'
79
77
```
80
78
For Kubernetes v{{< skew currentVersion >}}, the only kind of code artifact that
81
79
you can verify integrity for is a container image, using the experimental
82
80
signing support.
83
81
84
- To manually verify signed container images of Kubernetes core components, please refer to
82
+ To manually verify signed container images of Kubernetes core components, refer to
85
83
[ Verify Signed Container Images] ( /docs/tasks/administer-cluster/verify-signed-images ) .
86
84
87
85
0 commit comments