You can use boolean logic (e.g. AND/OR/NOT) for complex search queries. For more help and examples, see the search documentation.
Search by package name:
my-package
(implicit)
name:my-package
(explicit)
Search by package filename:
my-package.ext
(implicit)
filename:my-package.ext
(explicit)
Search by package tag:
latest
(implicit)
tag:latest
(explicit)
Search by package version:
1.0.0
(implicit)
version:1.0.0
(explicit)
prerelease:true
(prereleases)
prerelease:false
(no prereleases)
Search by package architecture:
architecture:x86_64
Search by package distribution:
distribution:el
Search by package license:
license:MIT
Search by package format:
format:deb
Search by package status:
status:in_progress
Search by package file checksum:
checksum:5afba
Search by package security status:
severity:critical
Search by package vulnerabilities:
vulnerabilities:>1
vulnerabilities:<1000
Search by # of package downloads:
downloads:>8
downloads:<100
Search by package type:
type:binary
type:source
Search by package size (bytes):
size:>50000
size:<10000
Search by dependency name/version:
dependency:log4j
dependency:log4j=1.0.0
dependency:log4j>1.0.0
Search by uploaded date:
uploaded:>"1 day ago"
uploaded:<"August 14, 2022 EST"
Search by entitlement token (identifier):
entitlement:3lKPVJPosCsY
Search by policy violation:
policy_violated:true
deny_policy_violated:true
license_policy_violated:true
vulnerability_policy_violated:true
Search by repository:
repository:repo-name
Search queries for all Debian-specific (and related) package types
Search by component:
deb_component:unstable
Search queries for all Maven-specific (and related) package types
Search by group ID:
maven_group_id:org.apache
Search queries for all Docker-specific (and related) package types
Search by image digest:
docker_image_digest:sha256:7c5..6d4
(full hashref only)
Search by layer digest:
docker_layer_digest:sha256:4c4..ae4
(full hashref only)
Field type modifiers (depending on the type, you can influence behaviour)
For all queries, you can use:
~foo
for negation
For string queries, you can use:
^foo
to anchor to start of term
foo$
to anchor to end of term
foo*bar
for fuzzy matching
For number/date or version queries, you can use:
>foo
for values greater than
>=foo
for values greater / equal
<foo
for values less than
<=foo
for values less / equal
Need a secure and centralised artifact repository to deliver Alpine,
Cargo,
CocoaPods,
Composer,
Conan,
Conda,
CRAN,
Dart,
Debian,
Docker,
Go,
Helm,
Hex,
LuaRocks,
Maven,
npm,
NuGet,
P2,
Python,
RedHat,
Ruby,
Swift,
Terraform,
Vagrant,
Raw & More packages?
Cloudsmith is the new standard in Package / Artifact Management and Software Distribution.
With support for all major package formats, you can trust us to manage your software supply chain.

app_sidecar_ubuntu_jammy
b4df78f38a1f902e707dcedf248…
One-liner (summary)
Description
Status | Completed |
---|---|
GPG Signature | |
Storage Region | Dublin, Ireland |
Type | Binary (contains binaries and binary artifacts) |
Uploaded At | 1 year, 5 months ago |
Uploaded By |
![]() |
Slug Id | app_sidecar_ubuntu_jammy-zDq |
Unique Id | kjRY0P2JUj5c |
Version (Raw) | b4df78f38a1f902e707dcedf2483bdbc668b66c0d76c93c50165b92fc3a3e629 |
Version (Parsed) |
|
docker-specific metadata | |
Image Digest | sha256:b4df78f38a1f902e707dcedf2483bdbc668b66c0d76c93c50165b92fc3a3e629 |
Config Digest | sha256:f72a3eb338445399501ef1e37cc4acb82dca75e4f162936dd4c8a097c3c5efa2 |
V1 OCI Index Digest | sha256:52de29642ab7d5c360bfc36b1ded279056555a2d2a3fd682ee9c7f9a1cb728f5 |
V1 Distribution (Signed) Digest | sha256:51720bb70a98d2a219e7089db65ac8815bf9527f8c224ced341e65ffab2085a8 |
V1 OCI Digest | sha256:3cfecd4f0e74c41a3fe8511c85a7bb710f8e646ce5d20b455832d46b80947a10 |
V2 Distribution List Digest | sha256:0aa8ec1250a707e4a6eabe6ecfc64b9ed9a428cf73b96b493059a349515bc3fc |
V1 Distribution Digest | sha256:989fadb04d818405c4306bb6e234dbf3bc1c055d321a0ecc7176e29cc91faa33 |
V2 Distribution Digest | sha256:b4df78f38a1f902e707dcedf2483bdbc668b66c0d76c93c50165b92fc3a3e629 |
Cosign Manifests | |
SIG | app_sidecar_ubuntu_jammy (sha256:2f62be420852f517a89ab84fdc7a8659b32a59b06f04988119a1004a4785e480) |
extended metadata | |
Manifest Type | V2 Distribution |
Architecture | amd64 |
Config | |
Created | 2023-12-07 02:31:21 UTC |
Os | linux |
This package was uploaded with the following V2 Distribution manifest:
{
"schemaVersion": 2,
"mediaType": "application/vnd.docker.distribution.manifest.v2+json",
"config": {
"mediaType": "application/vnd.docker.container.image.v1+json",
"size": 5209,
"digest": "sha256:17436b1a05ed600b822506d437f321c03653976c5bad8d31664262909ed36f81"
},
"layers": [
{
"mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
"size": 30439111,
"digest": "sha256:43f89b94cd7df92a2f7e565b8fb1b7f502eff2cd225508cbd7ea2d36a9a3a601"
},
{
"mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
"size": 10706150,
"digest": "sha256:090da38e4b8f7293995b6aa305bffbc5b96fd1675c293428910c5cd35b4a811e"
},
{
"mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
"size": 624,
"digest": "sha256:a82415818e080c54b533a640e9be10913003242e5b1943455e0d1b4a0a128fd8"
},
{
"mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
"size": 4285,
"digest": "sha256:78283ff6386a341fbce963181da326db5c2e3bdc43b22803a36c97f855d3d37f"
},
{
"mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
"size": 19345,
"digest": "sha256:82ec42f366128707af7e17b524209e2fc9db697e77fec5639740741c37961acb"
},
{
"mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
"size": 2843,
"digest": "sha256:a06e7f2bee133c132d9c70ad9e7909630de4a088622b6557a830d45366f9f24e"
},
{
"mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
"size": 43045171,
"digest": "sha256:a599c1d5cc7244fec10359d7907be583223e8dd4478c9b27750730ba29894ef8"
},
{
"mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
"size": 44540966,
"digest": "sha256:ab1c3d5296745f5f17a65375122c0a798107eeefed2e44d396722ae4d7334a1a"
},
{
"mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
"size": 214,
"digest": "sha256:1d8f6cee01aedfabeef0902670554ee1a15a1d33511a19af455591e128b05fc3"
},
{
"mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
"size": 958,
"digest": "sha256:f8ac344e82187dfd804fe8413f3042622376b5ee9fac080c30a7d5d8b4bd8d2c"
},
{
"mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
"size": 8273505,
"digest": "sha256:8417b1b76417d1c4619d05c1a4cf9b9516fb615b9940d3ee7946c802acd8dccb"
},
{
"mediaType": "application/vnd.docker.image.rootfs.diff.tar.gzip",
"size": 8866291,
"digest": "sha256:8da08e768bef946eb3f98d0211c4a0a10ef88195b6a7f10c2e3f41abef84e838"
}
]
}
Digest:
sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: /bin/sh -c #(nop) ARG RELEASE |
32 bytes | ||
Digest:
sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: /bin/sh -c #(nop) ARG LAUNCHPAD_BUILD_ARCH |
32 bytes | ||
Digest:
sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: /bin/sh -c #(nop) LABEL org.opencontainers.image.ref.name=ubuntu |
32 bytes | ||
Digest:
sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: /bin/sh -c #(nop) LABEL org.opencontainers.image.version=22.04 |
32 bytes | ||
Digest:
sha256:43f89b94cd7df92a2f7e565b8fb1b7f502eff2cd225508cbd7ea2d36a9a3a601
Command: /bin/sh -c #(nop) ADD file:63d5ab3ef0aab308c0e71cb67292c5467f60deafa9b0418cbb220affcd078444 in / |
29.0 MB | ||
Digest:
sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: /bin/sh -c #(nop) CMD ["/bin/bash"] |
32 bytes | ||
Digest:
sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: ENV DEBIAN_FRONTEND=noninteractive |
32 bytes | ||
Digest:
sha256:090da38e4b8f7293995b6aa305bffbc5b96fd1675c293428910c5cd35b4a811e
Command: RUN /bin/sh -c apt-get update && apt-get install --no-install-recommends -y ca-certificates curl iptables iproute2 iputils-ping knot-dnsutils netcat tcpdump conntrack bsdmainutils net-tools lsof sudo && apt-get upgrade -y && apt-get clean && rm -rf /var/log/*log /var/lib/apt/lists/* /var/log/apt/* /var/lib/dpkg/*-old /var/cache/debconf/*-old # buildkit |
10.2 MB | ||
Digest:
sha256:a82415818e080c54b533a640e9be10913003242e5b1943455e0d1b4a0a128fd8
Command: RUN /bin/sh -c if [ -f /usr/sbin/iptables-legacy ]; then update-alternatives --set iptables /usr/sbin/iptables-legacy && update-alternatives --set ip6tables /usr/sbin/ip6tables-legacy; fi # buildkit |
624 bytes | ||
Digest:
sha256:78283ff6386a341fbce963181da326db5c2e3bdc43b22803a36c97f855d3d37f
Command: RUN /bin/sh -c useradd -m --uid 1338 application && echo "application ALL=NOPASSWD: ALL" >> /etc/sudoers # buildkit |
4.2 KB | ||
Digest:
sha256:82ec42f366128707af7e17b524209e2fc9db697e77fec5639740741c37961acb
Command: COPY certs/ /var/lib/istio/ # buildkit |
18.9 KB | ||
Digest:
sha256:a06e7f2bee133c132d9c70ad9e7909630de4a088622b6557a830d45366f9f24e
Command: COPY certs/default/ /var/run/secrets/istio/ # buildkit |
2.8 KB | ||
Digest:
sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: ARG TARGETARCH |
32 bytes | ||
Digest:
sha256:a599c1d5cc7244fec10359d7907be583223e8dd4478c9b27750730ba29894ef8
Command: COPY amd64/istio-sidecar.deb /tmp/istio-sidecar.deb # buildkit |
41.1 MB | ||
Digest:
sha256:ab1c3d5296745f5f17a65375122c0a798107eeefed2e44d396722ae4d7334a1a
Command: RUN |1 TARGETARCH=amd64 /bin/sh -c dpkg -i /tmp/istio-sidecar.deb && rm /tmp/istio-sidecar.deb # buildkit |
42.5 MB | ||
Digest:
sha256:1d8f6cee01aedfabeef0902670554ee1a15a1d33511a19af455591e128b05fc3
Command: COPY sudoers /etc/sudoers # buildkit |
214 bytes | ||
Digest:
sha256:f8ac344e82187dfd804fe8413f3042622376b5ee9fac080c30a7d5d8b4bd8d2c
Command: COPY echo-start.sh /usr/local/bin/echo-start.sh # buildkit |
958 bytes | ||
Digest:
sha256:8417b1b76417d1c4619d05c1a4cf9b9516fb615b9940d3ee7946c802acd8dccb
Command: COPY amd64/client /usr/local/bin/client # buildkit |
7.9 MB | ||
Digest:
sha256:8da08e768bef946eb3f98d0211c4a0a10ef88195b6a7f10c2e3f41abef84e838
Command: COPY amd64/server /usr/local/bin/server # buildkit |
8.5 MB | ||
Digest:
sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: ENTRYPOINT ["/usr/local/bin/echo-start.sh"] |
32 bytes |
Security Scanning:
You can't see this because your subscription doesn't include this feature, sorry!
With Security Scanning, Cloudsmith will scan your artifacts for vulnerabilities when they're uploaded. These are then presented to you via the UI and the API, so that you can build rules into your CI/CD pipelines to decide how to handle low, medium, high and critical software vulnerabilities.
If you'd like to trial or ask about the Security Scanning feature, just ask us. We'll be happy to help!
Last scanned
4 days, 17 hours ago
Scan result
Vulnerable
Vulnerability count
5
Max. severity
LowTarget: | ||
LOW |
CVE-3418-82584: library: vulnerability titlePackage Name: package_name Installed Version: 1.5.74 Fixed Version: 2.1.72 References: riley.com www.nelson.com cruz.com |
|
LOW |
CVE-1873-50589: library: vulnerability titlePackage Name: package_name Installed Version: 1.1.85 Fixed Version: 2.1.52 References: sanchez.com le.info www.coleman.com |
|
LOW |
CVE-5720-80448: library: vulnerability titlePackage Name: package_name Installed Version: 1.4.92 Fixed Version: 2.7.21 References: www.spencer.com smith.com berry.com |
|
LOW |
CVE-5573-40011: library: vulnerability titlePackage Name: package_name Installed Version: 1.7.72 Fixed Version: 2.5.27 References: www.velasquez.biz fitzpatrick-cross.com hess-vasquez.com |
|
LOW |
CVE-5928-39165: library: vulnerability titlePackage Name: package_name Installed Version: 1.7.74 Fixed Version: 2.8.71 References: www.davis-hernandez.com ware.net cook.biz |
These instructions assume you have setup the repository first (or read it).
To pull app_sidecar_ubuntu_jammy @ reference/tag sha256:b4df78f38a1f902e707dcedf2483bdbc668b66c0d76c93c50165b92fc3a3e629:
docker pull containers.istio.tetratelabs.com/app_sidecar_ubuntu_jammy@sha256:b4df78f38a1f902e707dcedf2483bdbc668b66c0d76c93c50165b92fc3a3e629
You can also pull the latest version of this image (if it exists):
docker pull containers.istio.tetratelabs.com/app_sidecar_ubuntu_jammy:latest
To refer to this image after pulling in a Dockerfile, specify the following:
FROM containers.istio.tetratelabs.com/app_sidecar_ubuntu_jammy@sha256:b4df78f38a1f902e707dcedf2483bdbc668b66c0d76c93c50165b92fc3a3e629