Package Search Help

You can use boolean logic (e.g. AND/OR/NOT) for complex search queries. For more help and examples, see the search documentation.

Search by package name:
my-package (implicit)
name:my-package (explicit)

Search by package filename:
my-package.ext (implicit)
filename:my-package.ext (explicit)

Search by package tag:
latest (implicit)
tag:latest (explicit)

Search by package version:
1.0.0 (implicit)
version:1.0.0 (explicit)
prerelease:true (prereleases)
prerelease:false (no prereleases)

Search by package architecture:
architecture:x86_64 

Search by package distribution:
distribution:el 

Search by package license:
license:MIT 

Search by package format:
format:deb 

Search by package status:
status:in_progress 

Search by package file checksum:
checksum:5afba 

Search by package security status:
severity:critical 

Search by package vulnerabilities:
vulnerabilities:>1 
vulnerabilities:<1000 

Search by # of package downloads:
downloads:>8 
downloads:<100 

Search by package type:
type:binary 
type:source 

Search by package size (bytes):
size:>50000 
size:<10000 

Search by dependency name/version:
dependency:log4j 
dependency:log4j=1.0.0 
dependency:log4j>1.0.0 

Search by uploaded date:
uploaded:>"1 day ago" 
uploaded:<"August 14, 2022 EST" 

Search by entitlement token (identifier):
entitlement:3lKPVJPosCsY 

Search by policy violation:
policy_violated:true
deny_policy_violated:true
license_policy_violated:true
vulnerability_policy_violated:true

Search by repository:
repository:repo-name

Search queries for all Debian-specific (and related) package types

Search by component:
deb_component:unstable

Search queries for all Maven-specific (and related) package types

Search by group ID:
maven_group_id:org.apache

Search queries for all Docker-specific (and related) package types

Search by image digest:
docker_image_digest:sha256:7c5..6d4
(full hashref only)

Search by layer digest:
docker_layer_digest:sha256:4c4..ae4
(full hashref only)

Field type modifiers (depending on the type, you can influence behaviour)

For all queries, you can use:
~foo for negation

For string queries, you can use:
^foo to anchor to start of term
foo$ to anchor to end of term
foo*bar for fuzzy matching

For number/date or version queries, you can use:
>foo for values greater than
>=foo for values greater / equal
<foo for values less than
<=foo for values less / equal

Need a secure and centralised artifact repository to deliver Alpine, Cargo, CocoaPods, Composer, Conan, Conda, CRAN, Dart, Debian, Docker, Go, Helm, Hex, LuaRocks, Maven, npm, NuGet, P2, Python, RedHat, Ruby, Swift, Terraform, Vagrant, Raw & More packages?

Cloudsmith is the new standard in Package / Artifact Management and Software Distribution.

With support for all major package formats, you can trust us to manage your software supply chain.

Start My Free Trial
 Open-Source isc isc (ISC - Internet Systems Consortium) / keama Project
The Kea Migration Assistant is a tool that will partially translate a working configuration for ISC DHCP to an equivalent configuration for Kea. It is not possible to automatically translate the entire configuration, so the result will require some manual fix-ups. See https://kb.isc.org/docs/migrating-from-isc-dhcp-to-kea-dhcp-using-the-migration-assistant for more advice on migrating. See https://gitlab.isc.org/isc-projects/dhcp/tree/master/keama for a quick guide on using the Migration Assistant.
Note: Packages in this repository are licensed as ISC License (dependencies may be licensed differently).

Docker logo keama  4.5.0

One-liner (summary)

A certifiably-awesome package curated by Marcin Godzina, hosted by Cloudsmith.

Description

A certifiably-awesome package curated by Marcin Godzina, hosted by Cloudsmith.

License

Unknown

Size

78.5 MB

Downloads

26

Tags

image amd64 linux

Status  Completed
GPG Signature
Storage Region  Dublin, Ireland
Type  Binary (contains binaries and binary artifacts)
Uploaded At 7 months, 1 week ago
Uploaded By marcin-godzina
Slug Id keama-docker-450targz-MNk
Unique Id GjNouioxuGDv
Version (Raw) 4.5.0
Version (Parsed)
  • Major: 4
  • Minor: 5
  • Patch: 0
  • Type: SemVer (Strict)
Orig Version (Raw) 1ce87368b16d528a0f6c64b48e5316caaa21bccca99bfe7a3e9b368eaa6b1f1f
Orig Version (Parsed)
  • Type: Unknown
  docker-specific metadata
Image Digest sha256:1ce87368b16d528a0f6c64b48e5316caaa21bccca99bfe7a3e9b368eaa6b1f1f
Config Digest sha256:7a2c425637bc39fa1c12cd83fe12b65ff730a9fbba24c1fb4be72278bf7e70fc
V1 OCI Index Digest sha256:76e2cf3e59f558ff8241430b36959b910d37382b8c825bb3b78eb8cc7cf3b4e5
V1 Distribution (Signed) Digest sha256:352f940d1ba31ec72237af7277ea9feb5369447973f5a390c4471e92f5fa247b
V1 OCI Digest sha256:c9d892ea539bd1d8b0f81c1f15b0b4f515738ca7f891a9ec209d82f9898743c9
V2 Distribution List Digest sha256:cb59d141e582848d2c6d6100800aba3514f7cf2dc58cf63c57142f8ebcab0202
V2 Distribution Digest sha256:1ce87368b16d528a0f6c64b48e5316caaa21bccca99bfe7a3e9b368eaa6b1f1f
V1 Distribution Digest sha256:a62227775a0357efd69de4a0c6dab9c4825a9c6b93f83d5c297e29af89d14c29
  extended metadata
Manifest Type UNKNOWN
Architecture amd64
Config
Created 2023-09-19 12:11:07 UTC
Os linux

The manifest for this package isn't available yet.

Digest: sha256:4693057ce2364720d39e57e85a5b8e0bd9ac3573716237736d6470ec5b7b7230
Command: /bin/sh -c #(nop) ADD file:32ff5e7a78b890996ee4681cc0a26185d3e9acdb4eb1e2aaccb2411f922fed6b in /
7.3 MB
Digest: sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: /bin/sh -c #(nop) CMD ["/bin/sh"]
32 bytes
Digest: sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: ENV PATH=/usr/local/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
32 bytes
Digest: sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: ENV LANG=C.UTF-8
32 bytes
Digest: sha256:9ad60c84bfbe59560a0018da71b8c4bc5f02e2ed03f356e920a47d00ebe8cb32
Command: RUN /bin/sh -c set -eux; apk add --no-cache ca-certificates tzdata ; # buildkit
2.6 MB
Digest: sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: ENV GPG_KEY=A035C8C19219BA821ECEA86B64E628F8D684696D
32 bytes
Digest: sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: ENV PYTHON_VERSION=3.11.5
32 bytes
Digest: sha256:ce0f4c80e9b7069c29422e92514e33c08ec3d731e2e02767f3e4f8c6349837fb
Command: RUN /bin/sh -c set -eux; apk add --no-cache --virtual .build-deps gnupg tar xz bluez-dev bzip2-dev dpkg-dev dpkg expat-dev findutils gcc gdbm-dev libc-dev libffi-dev libnsl-dev libtirpc-dev linux-headers make ncurses-dev openssl-dev pax-utils readline-dev sqlite-dev tcl-dev tk tk-dev util-linux-dev xz-dev zlib-dev ; wget -O python.tar.xz "https://www.python.org/ftp/python/${PYTHON_VERSION%%[a-z]*}/Python-$PYTHON_VERSION.tar.xz"; wget -O python.tar.xz.asc "https://www.python.org/ftp/python/${PYTHON_VERSION%%[a-z]*}/Python-$PYTHON_VERSION.tar.xz.asc"; GNUPGHOME="$(mktemp -d)"; export GNUPGHOME; gpg --batch --keyserver hkps://keys.openpgp.org --recv-keys "$GPG_KEY"; gpg --batch --verify python.tar.xz.asc python.tar.xz; gpgconf --kill all; rm -rf "$GNUPGHOME" python.tar.xz.asc; mkdir -p /usr/src/python; tar --extract --directory /usr/src/python --strip-components=1 --file python.tar.xz; rm python.tar.xz; cd /usr/src/python; gnuArch="$(dpkg-architecture --query DEB_BUILD_GNU_TYPE)"; ./configure --build="$gnuArch" --enable-loadable-sqlite-extensions --enable-optimizations --enable-option-checking=fatal --enable-shared --with-lto --with-system-expat --without-ensurepip ; nproc="$(nproc)"; EXTRA_CFLAGS="-DTHREAD_STACK_SIZE=0x100000"; LDFLAGS="${LDFLAGS:--Wl},--strip-all"; make -j "$nproc" "EXTRA_CFLAGS=${EXTRA_CFLAGS:-}" "LDFLAGS=${LDFLAGS:-}" "PROFILE_TASK=${PROFILE_TASK:-}" ; rm python; make -j "$nproc" "EXTRA_CFLAGS=${EXTRA_CFLAGS:-}" "LDFLAGS=${LDFLAGS:--Wl},-rpath='\$\$ORIGIN/../lib'" "PROFILE_TASK=${PROFILE_TASK:-}" python ; make install; cd /; rm -rf /usr/src/python; find /usr/local -depth \( \( -type d -a \( -name test -o -name tests -o -name idle_test \) \) -o \( -type f -a \( -name '*.pyc' -o -name '*.pyo' -o -name 'libpython*.a' \) \) \) -exec rm -rf '{}' + ; find /usr/local -type f -executable -not \( -name '*tkinter*' \) -exec scanelf --needed --nobanner --format '%n#p' '{}' ';' | tr ',' '\n' | sort -u | awk 'system("[ -e /usr/local/lib/" $1 " ]") == 0 { next } { print "so:" $1 }' | xargs -rt apk add --no-network --virtual .python-rundeps ; apk del --no-network .build-deps; python3 --version # buildkit
31.5 MB
Digest: sha256:7acf52b2a13c76d64944bb1d78af02a1f8cb2f1d1cda9d8410bb56589408b15a
Command: RUN /bin/sh -c set -eux; for src in idle3 pydoc3 python3 python3-config; do dst="$(echo "$src" | tr -d 3)"; [ -s "/usr/local/bin/$src" ]; [ ! -e "/usr/local/bin/$dst" ]; ln -svT "$src" "/usr/local/bin/$dst"; done # buildkit
5.0 KB
Digest: sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: ENV PYTHON_PIP_VERSION=23.2.1
32 bytes
Digest: sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: ENV PYTHON_SETUPTOOLS_VERSION=65.5.1
32 bytes
Digest: sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: ENV PYTHON_GET_PIP_URL=https://github.com/pypa/get-pip/raw/9af82b715db434abb94a0a6f3569f43e72157346/public/get-pip.py
32 bytes
Digest: sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: ENV PYTHON_GET_PIP_SHA256=45a2bb8bf2bb5eff16fdd00faef6f29731831c7c59bd9fc2bf1f3bed511ff1fe
32 bytes
Digest: sha256:08928985481f34cf9612e3c14bcce2388ec0e3d25ac49f407f75ce364358cac9
Command: RUN /bin/sh -c set -eux; wget -O get-pip.py "$PYTHON_GET_PIP_URL"; echo "$PYTHON_GET_PIP_SHA256 *get-pip.py" | sha256sum -c -; export PYTHONDONTWRITEBYTECODE=1; python get-pip.py --disable-pip-version-check --no-cache-dir --no-compile "pip==$PYTHON_PIP_VERSION" "setuptools==$PYTHON_SETUPTOOLS_VERSION" ; rm -f get-pip.py; pip --version # buildkit
11.2 MB
Digest: sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: CMD ["python3"]
32 bytes
Digest: sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: ARG IMAGE_VERSION=4.4.3-git
32 bytes
Digest: sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: LABEL org.opencontainers.image.authors=Kea Developers <kea-dev@lists.isc.org>
32 bytes
Digest: sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: LABEL org.opencontainers.image.title=KeaMA web interface
32 bytes
Digest: sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: LABEL org.opencontainers.image.description=KeaMA web interface
32 bytes
Digest: sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: LABEL org.opencontainers.image.version=4.5.0
32 bytes
Digest: sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: LABEL org.opencontainers.image.url=https://gitlab.isc.org/isc-projects/keama-docker
32 bytes
Digest: sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: LABEL org.opencontainers.image.documentation=https://gitlab.isc.org/isc-projects/keama-docker
32 bytes
Digest: sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: LABEL org.opencontainers.image.source=https://gitlab.isc.org/isc-projects/keama-docker
32 bytes
Digest: sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: LABEL org.opencontainers.image.licenses=MPL-2.0
32 bytes
Digest: sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: LABEL org.opencontainers.image.base.name=docker.io/library/python:alpine
32 bytes
Digest: sha256:5ec2b6ad82fc5b6d056bbdfe8df7e2cf4374d52b401787086469a3554f017449
Command: RUN |1 IMAGE_VERSION=4.5.0 /bin/sh -c pip install --upgrade pip # buildkit
10.6 MB
Digest: sha256:93e941bcf99c24dd1543dc405bd0f9e0ce0e76d3e65e8b48a708caa6df753f7c
Command: RUN |1 IMAGE_VERSION=4.5.0 /bin/sh -c pip install gunicorn # buildkit
1.2 MB
Digest: sha256:7a035d71faa710b36a1f08f3d64926b580a68977d9303ae6a0faee7f34c2fa5b
Command: RUN |1 IMAGE_VERSION=4.5.0 /bin/sh -c pip install flask # buildkit
5.7 MB
Digest: sha256:7c6163cebb0d41f5ac4289ed3f1eca72ea1fbd3ba81bd417e9f96cc095da8915
Command: RUN |1 IMAGE_VERSION=4.5.0 /bin/sh -c apk add curl # buildkit
5.4 MB
Digest: sha256:e7ef1cabbf9498ffae03e3170974bdb530589598970aa5b2a19ee8ad6b5c3d18
Command: RUN |1 IMAGE_VERSION=4.5.0 /bin/sh -c adduser -D nonroot # buildkit
11.5 KB
Digest: sha256:c5051f4705eb63cdd44839f045888dc2df9caf6409eb1ac58109a7d778eb6461
Command: RUN |1 IMAGE_VERSION=4.5.0 /bin/sh -c mkdir /home/keama/ && chown -R nonroot:nonroot /home/keama && mkdir /home/keama/app && chown -R nonroot:nonroot /home/keama/app # buildkit
3.0 KB
Digest: sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef
Command: WORKDIR /home/keama/app
1.0 KB
Digest: sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: USER nonroot
32 bytes
Digest: sha256:90a28ccb02af0b65ff3f5e737308354f4dfae9d91e498b48c984fc859cd9a0de
Command: COPY /keama/keama/keama ./ # buildkit
774.0 KB
Digest: sha256:39d33fd03e246fc221304ed2066794f61c12390fa55c8748873ddfc18c2c578b
Command: COPY /keama/web/ ./ # buildkit
423.5 KB
Digest: sha256:c0b9bed066c43742699221ef4b869d955bc7825bbc2ff6eaf4e7c03d7096fceb
Command: COPY /keama/ChangeLog.md ../ # buildkit
7.5 KB
Digest: sha256:bd647b24d22c7db9c0094f59c06537bbfa34c773f51b69fc230f6f9363eb7869
Command: RUN |1 IMAGE_VERSION=4.5.0 /bin/sh -c pip install -r requirements.txt # buildkit
1.7 MB
Digest: sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: EXPOSE map[8080/tcp:{}]
32 bytes
Digest: sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: CMD ["gunicorn" "-w" "4" "-t" "60" "-b" "0.0.0.0:8080" "app:app"]
32 bytes
  Docker logo
keama
 4.5.0
image amd64 linux
26 marcin-godzina

Security Scanning:
You can't see this because your subscription doesn't include this feature, sorry!

With Security Scanning, Cloudsmith will scan your artifacts for vulnerabilities when they're uploaded. These are then presented to you via the UI and the API, so that you can build rules into your CI/CD pipelines to decide how to handle low, medium, high and critical software vulnerabilities.

If you'd like to trial or ask about the Security Scanning feature, just ask us. We'll be happy to help!

Last scanned

4 days, 18 hours ago

Scan result

Vulnerable

Vulnerability count

4

Max. severity

High
Target:
HIGH

CVE-5761-65354: library: vulnerability title



Package Name: package_name
Installed Version: 1.3.46
Fixed Version: 2.3.19

References: martinez.biz baker-stuart.org www.watkins.com
MEDIUM

CVE-3465-60773: library: vulnerability title



Package Name: package_name
Installed Version: 1.10.17
Fixed Version: 2.1.45

References: www.boyd.com martin.org smith.com
MEDIUM

CVE-4160-72031: library: vulnerability title



Package Name: package_name
Installed Version: 1.2.35
Fixed Version: 2.2.14

References: andrews-cooper.info www.harris.com www.gutierrez-underwood.org
MEDIUM

CVE-6207-22427: library: vulnerability title



Package Name: package_name
Installed Version: 1.5.10
Fixed Version: 2.2.49

References: acevedo.com bryant.net lucas.com
Loading...

You can embed a badge in another website that shows this or the latest version of this package.

To embed the badge for this specific package version, use the following:

[![This version of 'keama' @ Cloudsmith](https://api-prd.cloudsmith.io/v1/badges/version/isc/keama/docker/keama/4.5.0/a=amd64;xpo=linux/?render=true)](https://cloudsmith.io/~isc/repos/keama/packages/detail/docker/keama/1ce87368b16d528a0f6c64b48e5316caaa21bccca99bfe7a3e9b368eaa6b1f1f/a=amd64;xpo=linux/)
|This version of 'keama' @ Cloudsmith|
.. |This version of 'keama' @ Cloudsmith| image:: https://api-prd.cloudsmith.io/v1/badges/version/isc/keama/docker/keama/4.5.0/a=amd64;xpo=linux/?render=true
   :target: https://cloudsmith.io/~isc/repos/keama/packages/detail/docker/keama/1ce87368b16d528a0f6c64b48e5316caaa21bccca99bfe7a3e9b368eaa6b1f1f/a=amd64;xpo=linux/
image::https://api-prd.cloudsmith.io/v1/badges/version/isc/keama/docker/keama/4.5.0/a=amd64;xpo=linux/?render=true[link="https://cloudsmith.io/~isc/repos/keama/packages/detail/docker/keama/1ce87368b16d528a0f6c64b48e5316caaa21bccca99bfe7a3e9b368eaa6b1f1f/a=amd64;xpo=linux/",title="This version of 'keama' @ Cloudsmith"]
<a href="https://cloudsmith.io/~isc/repos/keama/packages/detail/docker/keama/1ce87368b16d528a0f6c64b48e5316caaa21bccca99bfe7a3e9b368eaa6b1f1f/a=amd64;xpo=linux/"><img src="https://api-prd.cloudsmith.io/v1/badges/version/isc/keama/docker/keama/4.5.0/a=amd64;xpo=linux/?render=true" alt="This version of 'keama' @ Cloudsmith" /></a>

rendered as: This version of 'keama' @ Cloudsmith

To embed the badge for the latest package version, use the following:

[![Latest version of 'keama' @ Cloudsmith](https://api-prd.cloudsmith.io/v1/badges/version/isc/keama/docker/keama/latest/a=amd64;xpo=linux/?render=true&show_latest=true)](https://cloudsmith.io/~isc/repos/keama/packages/detail/docker/keama/latest/a=amd64;xpo=linux/)
|Latest version of 'keama' @ Cloudsmith|
.. |Latest version of 'keama' @ Cloudsmith| image:: https://api-prd.cloudsmith.io/v1/badges/version/isc/keama/docker/keama/latest/a=amd64;xpo=linux/?render=true&show_latest=true
   :target: https://cloudsmith.io/~isc/repos/keama/packages/detail/docker/keama/latest/a=amd64;xpo=linux/
image::https://api-prd.cloudsmith.io/v1/badges/version/isc/keama/docker/keama/latest/a=amd64;xpo=linux/?render=true&show_latest=true[link="https://cloudsmith.io/~isc/repos/keama/packages/detail/docker/keama/latest/a=amd64;xpo=linux/",title="Latest version of 'keama' @ Cloudsmith"]
<a href="https://cloudsmith.io/~isc/repos/keama/packages/detail/docker/keama/latest/a=amd64;xpo=linux/"><img src="https://api-prd.cloudsmith.io/v1/badges/version/isc/keama/docker/keama/latest/a=amd64;xpo=linux/?render=true&show_latest=true" alt="Latest version of 'keama' @ Cloudsmith" /></a>

rendered as: Latest version of 'keama' @ Cloudsmith

These instructions assume you have setup the repository first (or read it).

To pull keama @ reference/tag 4.5.0:

docker pull docker.cloudsmith.io/isc/keama/keama:4.5.0

You can also pull the latest version of this image (if it exists):

docker pull docker.cloudsmith.io/isc/keama/keama:latest

To refer to this image after pulling in a Dockerfile, specify the following:

FROM docker.cloudsmith.io/isc/keama/keama:4.5.0
Previous Version
Next Version
Top