Skip to main content
Version: 0.4 (Next)

Konstruct 0.3.4

Released: February 26, 2026

Highlights

  • GitHub App Authentication (Foundation) - Groundwork for GitHub App auth across operators; will be delivered with 0.3.5
  • Operator Stability - Rate limiting eliminated, Prometheus metrics added, reconciliation hardened
  • Cluster Management - Workload cluster directory cleanup, provisioning scoped to IaC and bootstrap apps
  • Platform UX - License key activation, self-hosted mode, app repository view and edit, and UI polish
  • Deployment Reliability - ArgoCD sync fixes, RBAC improvements, and production promotion hardening

GitHub App Authentication (Foundation)

This release includes foundation work for GitHub App authentication across Konstruct operators. Full GitHub App support — including the UI onboarding flow and migration tooling — will be delivered with 0.3.5.

What Changed

  1. GitAccount operator supports storing GitHub App credentials (App ID, installation ID, private key) in Vault
  2. All operators can read auth credentials from a platform git config instead of per-user PATs
  3. Konstruct API adds initial GitHub App auth endpoints

Affected Components

  • gitaccount-operator
  • application-operator
  • workloadcluster-operator
  • team-management-operator
  • konstruct-api
Migration in 0.3.5

Existing PAT-based configurations continue to work. A guided migration path from PATs to GitHub App auth will be available in 0.3.5.

Operator Stability and Observability

Rate Limiting Eliminated

All operators now use CloneOrOpen helpers and condition guards to avoid redundant GitHub API calls. This eliminates rate limiting issues in environments with many repositories.

Prometheus Metrics

GitHub operations across all operators now expose Prometheus metrics:

  • github_api_requests_total - Total API calls by operator and method
  • github_api_errors_total - Failed API calls
  • github_clone_duration_seconds - Repository clone/open latency

New Observability Additions

Platform observability has been extended with additional metrics and alerting foundations across operators to support production monitoring workflows.

Reconciliation Fixes

  • Environment reconciliation uses single-pass, generation-aware logic to prevent duplicate processing
  • CatalogDeployment supports public repositories and fixes status race conditions
  • CRD field sync ensures repoClonedPath propagates correctly across Helm chart values

Cluster Management

Workload Cluster Directory Cleanup

The workloadcluster-operator now cleans up GitOps repository directories when a workload cluster is deleted. Previously, stale cluster directories remained in the GitOps repo after cluster deletion.

Provisioning Detail Scoped to IaC and Bootstrap Apps

Cluster provisioning status now considers only infrastructure-as-code (Terraform) and bootstrap application readiness. Platform apps managed by ArgoCD are excluded from provisioning detail, providing a more accurate view of cluster readiness during creation.

Workload Cluster Infrastructure

  • Workloadcluster-operator uses a distroless debug image for secure kubectl exec operations
  • Platform GitOps repository references are now used during workload cluster provisioning

Platform UX Improvements

License Key Activation

Konstruct now supports license key activation with:

  • Activation flow with error handling
  • Support contact information on failure
  • License status visible in the UI

Self-Hosted Configuration

A new selfHosted configuration flag controls sidebar and layout behavior for self-hosted deployments.

App Repositories

  • View and edit app repository details directly in the UI
  • Manage repository configurations without leaving the Konstruct dashboard

Application Management

  • Shared DeleteDialog and BulkDeleteDialog components for consistent delete workflows

UI Polish

  • Environment table loading states
  • Standardized date formatting across all views
  • GitOps catalog icon refresh
  • Dependency updates

Deployment Reliability

ArgoCD Sync Fixes

Removed ServerSideApply from ArgoCD configuration to fix PipelineTemplate sync loops that caused continuous reconciliation.

RBAC Improvements

Namespace-scoped ClusterRole and ClusterRoleBinding resources now use consistent naming conventions to prevent conflicts across environments.

Documentation and Brand Alignment

  • Domain migrated from civonetes.com to konstruct.civo.com
  • Clean URL serving with Nginx and trailing slash redirects
  • SEO hardening with canonical tags and version indexing
  • Typesense search integration
  • Civo brand alignment (colors, typography, logos)

Upgrading from 0.3.x

Update the Konstruct chart version in your GitOps desired state:

  1. Open your Konstruct ArgoCD Application manifest (typically in registry/<cluster>/konstruct-components/konstruct.yaml or similar)
  2. Update the targetRevision to 0.3.4:
spec:
source:
chart: konstruct
repoURL: oci://europe-west2-docker.pkg.dev/civo-com/charts
targetRevision: 0.3.4
  1. Commit and push — ArgoCD syncs the new version automatically

Existing PAT-based git configurations continue to work without changes.