Package Search Help

You can use boolean logic (e.g. AND/OR/NOT) for complex search queries. For more help and examples, see the search documentation.

Search by package name:
my-package (implicit)
name:my-package (explicit)

Search by package filename:
filename:my-package.ext 

Search by package tag:
tag:latest 

Search by package version:
version:1.0.0  prerelease:true (prereleases)
prerelease:false (no prereleases)

Search by package architecture:
architecture:x86_64 

Search by package distribution:
distribution:el 

Search by package license:
license:MIT 

Search by package format:
format:deb 

Search by package status:
status:in_progress 

Search by package file checksum:
checksum:5afba 

Search by package security status:
severity:critical 

Search by package vulnerabilities:
vulnerabilities:>1 
vulnerabilities:<1000 

Search by # of package downloads:
downloads:>8 
downloads:<100 

Search by package type:
type:binary 
type:source 

Search by package size (bytes):
size:>50000 
size:<10000 

Search by dependency name/version:
dependency:log4j 
dependency:log4j=1.0.0 
dependency:log4j>1.0.0 

Search by uploaded date:
uploaded:>"1 day ago" 
uploaded:<"August 14, 2022 EST" 

Search by entitlement token (identifier):
entitlement:3lKPVJPosCsY 

Search by policy violation:
policy_violated:true
deny_policy_violated:true
license_policy_violated:true
vulnerability_policy_violated:true

Search by repository:
repository:repo-name

Search queries for all Debian-specific (and related) package types

Search by component:
deb_component:unstable

Search queries for all Maven-specific (and related) package types

Search by group ID:
maven_group_id:org.apache

Search queries for all Docker-specific (and related) package types

Search by image digest:
docker_image_digest:sha256:7c5..6d4
(full hashref only)

Search by layer digest:
docker_layer_digest:sha256:4c4..ae4
(full hashref only)

Field type modifiers (depending on the type, you can influence behaviour)

For all queries, you can use:
~foo for negation

For string queries, you can use:
^foo to anchor to start of term
foo$ to anchor to end of term
foo*bar for fuzzy matching

For number/date or version queries, you can use:
>foo for values greater than
>=foo for values greater / equal
<foo for values less than
<=foo for values less / equal

Need a secure and centralised artifact repository to deliver Alpine, Cargo, CocoaPods, Composer, Conan, Conda, CRAN, Dart, Debian, Docker, Go, Helm, Hex, LuaRocks, Maven, npm, NuGet, P2, Python, RedHat, Ruby, Swift, Terraform, Vagrant, Raw & More packages?

Cloudsmith is the new standard in Package / Artifact Management and Software Distribution.

With support for all major package formats, you can trust us to manage your software supply chain.

Start My Free Trial
 Public eventstore eventstore (Kurrent) / kurrent-latest
A certifiably-awesome public package repository curated by Kurrent, hosted by Cloudsmith.

Docker logo kurrentdb-operator  c8451fd817bfa1edafde57df5f2…

One-liner (summary)

A certifiably-awesome package curated by Chris Channing, hosted by Cloudsmith.

Description

A certifiably-awesome package curated by Chris Channing, hosted by Cloudsmith.

License

Unknown

Size

30.0 MB

Downloads

12

Tags

image amd64 linux

Status  Completed
Checksum (MD5) 1c2e523ea4b73668354ce5e63a3ef230
Checksum (SHA-1) 074c65be214866d9f5229f14ee67b887618c8b6e
Checksum (SHA-256) c8451fd817bfa1edafde57df5f20f51269a9d0f0343b658164e4b6625cba8b6e
Checksum (SHA-512) fba9e0ea64405b2e169e1245a24064d1d9299aa6a824ba0ff52851d145ea506634…
GPG Signature
GPG Fingerprint 02a89004460aa252035d6b7d094442d90ad50bcd
Storage Region  Dublin, Ireland
Type  Binary (contains binaries and binary artifacts)
Uploaded At 1 month, 2 weeks ago
Uploaded By chris-channing
Slug Id kurrentdb-operator-8rif
Unique Id xK9E0AVzwO20
Version (Raw) c8451fd817bfa1edafde57df5f20f51269a9d0f0343b658164e4b6625cba8b6e
Version (Parsed)
  • Type: Unknown
  docker-specific metadata
Image Digest sha256:c8451fd817bfa1edafde57df5f20f51269a9d0f0343b658164e4b6625cba8b6e
Config Digest sha256:88fab10f57904995c30255ea45e067cb75785ea41e8452b6a56ae37232851102
V1 OCI Index Digest sha256:1157c4f282fbd26825107b2d5d1d56eb8dc6917211b29d3c767d4d8da24707cd
V1 Distribution (Signed) Digest sha256:f3eabde7c5a8b849d87dcfe832331697256ea691bbd421fabadf90dc98f1405d
V1 OCI Digest sha256:4680fe1ebee545a577b7a0fcc66d4fd90f57735b7a0d0c11802e1fce4d89aa6a
V2 Distribution List Digest sha256:ac0436c767a859a06e76941d558318243e3e5f94ff1f5a3f1e70a189af5a92c9
V1 Distribution Digest sha256:9f184e0a5a9a5704d85926f792f17a10212a73214dc971d684d156f24524c6d1
V2 Distribution Digest sha256:c8451fd817bfa1edafde57df5f20f51269a9d0f0343b658164e4b6625cba8b6e
  extended metadata
Manifest Type V2 Distribution
Architecture amd64
Config
Created 2025-04-30 09:19:52 UTC
Os linux

This package was uploaded with the following V2 Distribution manifest:

{
  "schemaVersion": 2,
  "mediaType": "application/vnd.docker.distribution.manifest.v2+json",
  "config": {
    "mediaType": "application/vnd.docker.container.image.v1+json",
    "digest": "sha256:e5bac88fd19b09c4604c8c092849a95423242a6d1ceaf4e54dd9d54e8d9620f5",
    "size": 2154
  },
  "layers": [
    {
      "mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
      "digest": "sha256:3d78e577de35c8bf231e34862a13cde36cd7b253b6a7af2158035251d2dc48c0",
      "size": 104235
    },
    {
      "mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
      "digest": "sha256:bfb59b82a9b65e47d485e53b3e815bca3b3e21a095bd0cb88ced9ac0b48062bf",
      "size": 13356
    },
    {
      "mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
      "digest": "sha256:4eff9a62d888790350b2481ff4a4f38f9c94b3674d26b2f2c85ca39cdef43fd9",
      "size": 547593
    },
    {
      "mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
      "digest": "sha256:a62778643d563b511190663ef9a77c30d46d282facfdce4f3a7aecc03423c1f3",
      "size": 67
    },
    {
      "mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
      "digest": "sha256:7c12895b777bcaa8ccae0605b4de635b68fc32d60fa08f421dc3818bf55ee212",
      "size": 188
    },
    {
      "mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
      "digest": "sha256:3214acf345c0cc6bbdb56b698a41ccdefc624a09d6beb0d38b5de0b2303ecaf4",
      "size": 123
    },
    {
      "mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
      "digest": "sha256:5664b15f108bf9436ce3312090a767300800edbbfd4511aa1a6d64357024d5dd",
      "size": 168
    },
    {
      "mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
      "digest": "sha256:0bab15eea81d0fe6ab56ebf5fba14e02c4c1775a7f7436fbddd3505add4e18fa",
      "size": 93
    },
    {
      "mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
      "digest": "sha256:4aa0ea1413d37a58615488592a0b827ea4b2e48fa5a77cf707d0e35f025e613f",
      "size": 385
    },
    {
      "mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
      "digest": "sha256:da7816fa955ea24533c388143c78804c28682eef99b4ee3723b548c70148bba6",
      "size": 321
    },
    {
      "mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
      "digest": "sha256:9aee425378d2c16cd44177dc54a274b312897f5860a8e78fdfda555a0d79dd71",
      "size": 130495
    },
    {
      "mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
      "digest": "sha256:d2faffcaf5e712bc14c9e18aa46b4a9a94b1b683ae69dd49c5354dc423c71c04",
      "size": 30659473
    }
  ]
}
Digest: sha256:3d78e577de35c8bf231e34862a13cde36cd7b253b6a7af2158035251d2dc48c0
Command: /bin/sh NOP
101.8 KB
Digest: sha256:bfb59b82a9b65e47d485e53b3e815bca3b3e21a095bd0cb88ced9ac0b48062bf
Command: /bin/sh NOP
13.0 KB
Digest: sha256:4eff9a62d888790350b2481ff4a4f38f9c94b3674d26b2f2c85ca39cdef43fd9
Command: /bin/sh NOP
534.8 KB
Digest: sha256:a62778643d563b511190663ef9a77c30d46d282facfdce4f3a7aecc03423c1f3
Command: /bin/sh NOP
67 bytes
Digest: sha256:7c12895b777bcaa8ccae0605b4de635b68fc32d60fa08f421dc3818bf55ee212
Command: /bin/sh NOP
188 bytes
Digest: sha256:3214acf345c0cc6bbdb56b698a41ccdefc624a09d6beb0d38b5de0b2303ecaf4
Command: /bin/sh NOP
123 bytes
Digest: sha256:5664b15f108bf9436ce3312090a767300800edbbfd4511aa1a6d64357024d5dd
Command: /bin/sh NOP
168 bytes
Digest: sha256:0bab15eea81d0fe6ab56ebf5fba14e02c4c1775a7f7436fbddd3505add4e18fa
Command: /bin/sh NOP
93 bytes
Digest: sha256:4aa0ea1413d37a58615488592a0b827ea4b2e48fa5a77cf707d0e35f025e613f
Command: /bin/sh NOP
385 bytes
Digest: sha256:da7816fa955ea24533c388143c78804c28682eef99b4ee3723b548c70148bba6
Command: /bin/sh NOP
321 bytes
Digest: sha256:9aee425378d2c16cd44177dc54a274b312897f5860a8e78fdfda555a0d79dd71
Command: /bin/sh NOP
127.4 KB
Digest: sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: WORKDIR /
32 bytes
Digest: sha256:d2faffcaf5e712bc14c9e18aa46b4a9a94b1b683ae69dd49c5354dc423c71c04
Command: COPY /workspace/build . # buildkit
29.2 MB
Digest: sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: USER 65532:65532
32 bytes
Digest: sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: ENTRYPOINT ["/kurrentdb-operator"]
32 bytes

Security Scanning:
You can't see this because your subscription doesn't include this feature, sorry!

With Security Scanning, Cloudsmith will scan your artifacts for vulnerabilities when they're uploaded. These are then presented to you via the UI and the API, so that you can build rules into your CI/CD pipelines to decide how to handle low, medium, high and critical software vulnerabilities.

If you'd like to trial or ask about the Security Scanning feature, just ask us. We'll be happy to help!

Last scanned

1 day, 15 hours ago

Scan result

Vulnerable

Vulnerability count

5

Max. severity

Critical
Target:
HIGH

CVE-7853-35314: library: vulnerability title



Package Name: package_name
Installed Version: 1.9.30
Fixed Version: 2.6.29

References: www.riggs.com martinez-stewart.com reyes.net
MEDIUM

CVE-6832-91050: library: vulnerability title



Package Name: package_name
Installed Version: 1.8.52
Fixed Version: 2.8.56

References: www.morris.com www.crane.com hernandez.com
MEDIUM

CVE-3731-55093: library: vulnerability title



Package Name: package_name
Installed Version: 1.3.81
Fixed Version: 2.6.3

References: www.dixon.com matthews.com www.may.org
MEDIUM

CVE-4552-97464: library: vulnerability title



Package Name: package_name
Installed Version: 1.7.41
Fixed Version: 2.2.94

References: martinez.com young.com parker-jones.com
MEDIUM

CVE-4900-26322: library: vulnerability title



Package Name: package_name
Installed Version: 1.4.19
Fixed Version: 2.6.10

References: craig.com petty-johnson.net alexander.com

These instructions assume you have setup the repository first (or read it).

To pull kurrentdb-operator @ reference/tag sha256:c8451fd817bfa1edafde57df5f20f51269a9d0f0343b658164e4b6625cba8b6e:

docker pull docker.cloudsmith.io/eventstore/kurrent-latest/kurrentdb-operator@sha256:c8451fd817bfa1edafde57df5f20f51269a9d0f0343b658164e4b6625cba8b6e

You can also pull the latest version of this image (if it exists):

docker pull docker.cloudsmith.io/eventstore/kurrent-latest/kurrentdb-operator:latest

To refer to this image after pulling in a Dockerfile, specify the following:

FROM docker.cloudsmith.io/eventstore/kurrent-latest/kurrentdb-operator@sha256:c8451fd817bfa1edafde57df5f20f51269a9d0f0343b658164e4b6625cba8b6e
Top