You can use boolean logic (e.g. AND/OR/NOT) for complex search queries. For more help and examples, see the search documentation.
Search by package name:
my-package
(implicit)
name:my-package
(explicit)
Search by package filename:
my-package.ext
(implicit)
filename:my-package.ext
(explicit)
Search by package tag:
latest
(implicit)
tag:latest
(explicit)
Search by package version:
1.0.0
(implicit)
version:1.0.0
(explicit)
prerelease:true
(prereleases)
prerelease:false
(no prereleases)
Search by package architecture:
architecture:x86_64
Search by package distribution:
distribution:el
Search by package license:
license:MIT
Search by package format:
format:deb
Search by package status:
status:in_progress
Search by package file checksum:
checksum:5afba
Search by package security status:
severity:critical
Search by package vulnerabilities:
vulnerabilities:>1
vulnerabilities:<1000
Search by # of package downloads:
downloads:>8
downloads:<100
Search by package type:
type:binary
type:source
Search by package size (bytes):
size:>50000
size:<10000
Search by dependency name/version:
dependency:log4j
dependency:log4j=1.0.0
dependency:log4j>1.0.0
Search by uploaded date:
uploaded:>"1 day ago"
uploaded:<"August 14, 2022 EST"
Search by entitlement token (identifier):
entitlement:3lKPVJPosCsY
Search by policy violation:
policy_violated:true
deny_policy_violated:true
license_policy_violated:true
vulnerability_policy_violated:true
Search by repository:
repository:repo-name
Search queries for all Debian-specific (and related) package types
Search by component:
deb_component:unstable
Search queries for all Maven-specific (and related) package types
Search by group ID:
maven_group_id:org.apache
Search queries for all Docker-specific (and related) package types
Search by image digest:
docker_image_digest:sha256:7c5..6d4
(full hashref only)
Search by layer digest:
docker_layer_digest:sha256:4c4..ae4
(full hashref only)
Field type modifiers (depending on the type, you can influence behaviour)
For all queries, you can use:
~foo
for negation
For string queries, you can use:
^foo
to anchor to start of term
foo$
to anchor to end of term
foo*bar
for fuzzy matching
For number/date or version queries, you can use:
>foo
for values greater than
>=foo
for values greater / equal
<foo
for values less than
<=foo
for values less / equal
Need a secure and centralised artifact repository to deliver Alpine,
Cargo,
CocoaPods,
Composer,
Conan,
Conda,
CRAN,
Dart,
Debian,
Docker,
Go,
Helm,
Hex,
LuaRocks,
Maven,
npm,
NuGet,
P2,
Python,
RedHat,
Ruby,
Swift,
Terraform,
Vagrant,
Raw & More packages?
Cloudsmith is the new standard in Package / Artifact Management and Software Distribution.
With support for all major package formats, you can trust us to manage your software supply chain.
horizon 69a7e1dd40cae977112f5b18c12…
One-liner (summary)
Description
The manifest for this package isn't available yet.
Digest:
sha256:0683de2821778aa9546bf3d3e6944df779daba1582631b7ea3517bb36f9e4007
Command: /bin/sh -c #(nop) ADD file:aa54047c80ba30064fe59adf4c978a929f38480be77af9ac644074bd5288ef18 in / |
233.6 MB | ||
Digest:
sha256:c140aa279cfd8a784fbc28c396147b0d75bd5d01d9a0e3903330853e6b11c46a
Command: /bin/sh -c #(nop) LABEL org.label-schema.schema-version=1.0 org.label-schema.name=CentOS Base Image org.label-schema.vendor=CentOS org.label-schema.license=GPLv2 org.label-schema.build-date=20200114 org.opencontainers.image.title=CentOS Base Image org.opencontainers.image.vendor=CentOS org.opencontainers.image.licenses=GPL-2.0-only org.opencontainers.image.created=2020-01-14 00:00:00-08:00 |
124.5 MB | ||
Digest:
sha256:13b9289f7ac051ca8ae877c66e2b31f57b4061a5b5a311dc513339a69741b649
Command: /bin/sh -c #(nop) CMD ["/bin/bash"] |
299.5 MB | ||
Digest:
sha256:25151fad88774af7ef307ef7f694f1b4427692a618446fee7f6c061ea0cdead3
Command: /bin/sh -c #(nop) ARG VERSION= |
5.6 MB | ||
Digest:
sha256:f097367c76e81292edf2a000b6341da931a8585dfcb4a4e06dca1a05652d6a7d
Command: |1 VERSION=8 /bin/sh -c dnf -y --nodocs update && dnf clean all && rm -rf /var/cache/yum |
836.5 MB | ||
Digest:
sha256:ad8bf70ee65de0d5d8ac828587eb9c2b51b7311706dc19a75abaab7296a90613
Command: /bin/sh -c #(nop) ARG BUILD_DATE=1970-01-01T00:00:00+0000 |
77.0 KB | ||
Digest:
sha256:fb4c3339a3c914201403a1da70f5d5c0f72ae15cda8e8d013b24f6aa9e98ff92
Command: /bin/sh -c #(nop) ARG SOURCE |
2.8 MB | ||
Digest:
sha256:7841edb167c69787059acfab323f4b90f892ef2570d07a0feb5ec0335ea82df3
Command: /bin/sh -c #(nop) ARG REVISION |
4.0 KB | ||
Digest:
sha256:e6d377a61cf92f85a3b0e6ead08d3d4eb939514470b920592cda9a4c2987eb63
Command: /bin/sh -c #(nop) ARG BUILD_JOB_ID |
3.0 KB | ||
Digest:
sha256:3c9dbc5fc3bae322958a8e5a1ebe48bbfd730c8a04160b42c226999b23a54f18
Command: /bin/sh -c #(nop) ARG BUILD_NUMBER |
958.0 MB | ||
Digest:
sha256:b2d4c37e55f001818e1c62416c8176ee8dd1eaa55c60df5311b2e6a2781997df
Command: /bin/sh -c #(nop) ARG BUILD_URL |
17.0 KB | ||
Digest:
sha256:e50e39cc8e2758092bb9891680b67fe6d5831839118cff3fc0268f8e576198f2
Command: /bin/bash -c #(nop) EXPOSE 10514/udp 1162/udp 8101/tcp 8980/tcp |
9.5 KB |
horizon |
0 |
Security Scanning:
You can't see this because your subscription doesn't include this feature, sorry!
With Security Scanning, Cloudsmith will scan your artifacts for vulnerabilities when they're uploaded. These are then presented to you via the UI and the API, so that you can build rules into your CI/CD pipelines to decide how to handle low, medium, high and critical software vulnerabilities.
If you'd like to trial or ask about the Security Scanning feature, just ask us. We'll be happy to help!
Last scanned
3 days, 18 hours ago
Scan result
Clean
Vulnerability count
0
Max. severity
LowThese instructions assume you have setup the repository first (or read it).
To pull horizon @ reference/tag latest:
docker pull docker.cloudsmith.io/opennms/opennms-26/horizon:latest
To refer to this image after pulling in a Dockerfile, specify the following:
FROM docker.cloudsmith.io/opennms/opennms-26/horizon:latest