Package Search Help

You can use boolean logic (e.g. AND/OR/NOT) for complex search queries. For more help and examples, see the search documentation.

Search by package name:
my-package (implicit)
name:my-package (explicit)

Search by package filename:
filename:my-package.ext 

Search by package tag:
tag:latest 

Search by package version:
version:1.0.0  prerelease:true (prereleases)
prerelease:false (no prereleases)

Search by package architecture:
architecture:x86_64 

Search by package distribution:
distribution:el 

Search by package license:
license:MIT 

Search by package format:
format:deb 

Search by package status:
status:in_progress 

Search by package file checksum:
checksum:5afba 

Search by package security status:
severity:critical 

Search by package vulnerabilities:
vulnerabilities:>1 
vulnerabilities:<1000 

Search by # of package downloads:
downloads:>8 
downloads:<100 

Search by package type:
type:binary 
type:source 

Search by package size (bytes):
size:>50000 
size:<10000 

Search by dependency name/version:
dependency:log4j 
dependency:log4j=1.0.0 
dependency:log4j>1.0.0 

Search by uploaded date:
uploaded:>"1 day ago" 
uploaded:<"August 14, 2022 EST" 

Search by entitlement token (identifier):
entitlement:3lKPVJPosCsY 

Search by policy violation:
policy_violated:true
deny_policy_violated:true
license_policy_violated:true
vulnerability_policy_violated:true

Search by repository:
repository:repo-name

Search queries for all Debian-specific (and related) package types

Search by component:
deb_component:unstable

Search queries for all Maven-specific (and related) package types

Search by group ID:
maven_group_id:org.apache

Search queries for all Docker-specific (and related) package types

Search by image digest:
docker_image_digest:sha256:7c5..6d4
(full hashref only)

Search by layer digest:
docker_layer_digest:sha256:4c4..ae4
(full hashref only)

Field type modifiers (depending on the type, you can influence behaviour)

For all queries, you can use:
~foo for negation

For string queries, you can use:
^foo to anchor to start of term
foo$ to anchor to end of term
foo*bar for fuzzy matching

For number/date or version queries, you can use:
>foo for values greater than
>=foo for values greater / equal
<foo for values less than
<=foo for values less / equal

Need a secure and centralised artifact repository to deliver Alpine, Cargo, CocoaPods, Composer, Conan, Conda, CRAN, Dart, Debian, Docker, Go, Helm, Hex, LuaRocks, Maven, npm, NuGet, P2, Python, RedHat, Ruby, Swift, Terraform, Vagrant, Raw & More packages?

Cloudsmith is the new standard in Package / Artifact Management and Software Distribution.

With support for all major package formats, you can trust us to manage your software supply chain.

Start My Free Trial
 Public tetrate tetrate (Tetrate) / getistio-containers
Tetrate Istio Distro project (formerly GetIstio) container images registry

Docker logo pilot  3970518ca77bdfeecc6312f7642…

One-liner (summary)

A certifiably-awesome package curated by Bender Rodriguez, hosted by Cloudsmith.

Description

A certifiably-awesome package curated by Bender Rodriguez, hosted by Cloudsmith.

License

Unknown

Size

26.2 MB

Downloads

2

Tags

image arm64 linux

Status  Completed
Checksum (MD5) 2685fd8117ae3e4fe3436cdb6138eb27
Checksum (SHA-1) bf205e6000c3e925e07a212f15a3793162193516
Checksum (SHA-256) 3970518ca77bdfeecc6312f76423cd4d9c78a3aed421d7a252cbafb4f9f301bb
Checksum (SHA-512) f0593a8005a4b844efb70ca87c7df2ebd3964f8d02dec7de3738812b3c963a0434…
GPG Signature
GPG Fingerprint 7490c226a7c21a19bb1d09e800b3a57eef287d7b
Storage Region  Dublin, Ireland
Type  Binary (contains binaries and binary artifacts)
Uploaded At 5 months, 2 weeks ago
Uploaded By tetrate-ci
Slug Id pilot-jz4a
Unique Id CjjVq5bpd5rz
Version (Raw) 3970518ca77bdfeecc6312f76423cd4d9c78a3aed421d7a252cbafb4f9f301bb
Version (Parsed)
  • Type: Unknown
  docker-specific metadata
Image Digest sha256:3970518ca77bdfeecc6312f76423cd4d9c78a3aed421d7a252cbafb4f9f301bb
Config Digest sha256:5560b3c5673cc7e5452aefc2972c6853af4fbf897e023b0e38496f006f02f168
V1 OCI Index Digest sha256:8b5678a1da703a90a99b286de45317c6aadc6cccdd2d3e253852a353f7315ab2
V1 Distribution (Signed) Digest sha256:3a0613b27fc60e3bf5013001da084ea2715834b78bb74dbc8205e33941b43bb2
V1 OCI Digest sha256:78ed7b26bf8107cb81f718390bb762e8d2515534e090ba56eb988c1829f6fc75
V2 Distribution List Digest sha256:2d09e66cd93bd32f585f3343417c695dd94f20d8c19aebc61cc4fcc133e9d44f
V1 Distribution Digest sha256:7580a26a0eb11cd7985b426faeaa2c991a2375077c036a71489cc330d0e4bbe4
V2 Distribution Digest sha256:3970518ca77bdfeecc6312f76423cd4d9c78a3aed421d7a252cbafb4f9f301bb
  extended metadata
Manifest Type V2 Distribution
Architecture arm64
Config
Created 2025-01-02 03:00:05 UTC
Os linux

This package was uploaded with the following V2 Distribution manifest:

{"schemaVersion":2,"mediaType":"application/vnd.docker.distribution.manifest.v2+json","config":{"mediaType":"application/vnd.docker.container.image.v1+json","size":3759,"digest":"sha256:41159b470dd9458243945bfb7ad0d2c75e0d8412ad5a40bc7cee3f5a7dde3791"},"layers":[{"mediaType":"application/vnd.docker.image.rootfs.diff.tar.gzip","size":103772,"digest":"sha256:138efa92a1a885b92dcc9a1ceff968681fea8863e924a1f96e7eca6531c23be8"},{"mediaType":"application/vnd.docker.image.rootfs.diff.tar.gzip","size":21192,"digest":"sha256:e33bce57de289fffd2380f73997dfb7e1ec193877904bed99f28c715d071fdc4"},{"mediaType":"application/vnd.docker.image.rootfs.diff.tar.gzip","size":755285,"digest":"sha256:473d8557b1b27974f7dc7c4b4e1a209df0e27e8cae1e3e33b7bb45c969b6fc7e"},{"mediaType":"application/vnd.docker.image.rootfs.diff.tar.gzip","size":83,"digest":"sha256:54e6e6b3b3915686a45868275ea2e3a1195571182f288ac23a31ee6f8fe75c87"},{"mediaType":"application/vnd.docker.image.rootfs.diff.tar.gzip","size":201,"digest":"sha256:ab4403e442bffb2ce0a44f9463d0891337d0784e2d5d50f0677e903622591609"},{"mediaType":"application/vnd.docker.image.rootfs.diff.tar.gzip","size":136,"digest":"sha256:86d03bd6344168c148233c4f8adaf4b89aa08c01a05d30269ed367f113794ca7"},{"mediaType":"application/vnd.docker.image.rootfs.diff.tar.gzip","size":174,"digest":"sha256:52873439a13501a6a358c47eefe68330258edbf019125aec597b713deb259bb5"},{"mediaType":"application/vnd.docker.image.rootfs.diff.tar.gzip","size":103,"digest":"sha256:68d6cfd04225ec378e86f390e84392094483e5e35386baea4ce1becf4d570709"},{"mediaType":"application/vnd.docker.image.rootfs.diff.tar.gzip","size":385,"digest":"sha256:4aa0ea1413d37a58615488592a0b827ea4b2e48fa5a77cf707d0e35f025e613f"},{"mediaType":"application/vnd.docker.image.rootfs.diff.tar.gzip","size":331,"digest":"sha256:088f84a7313c99ae5b7167a6432686081b584b41fac067213c52523ef3314410"},{"mediaType":"application/vnd.docker.image.rootfs.diff.tar.gzip","size":130552,"digest":"sha256:eeac61b2cc6b5e28e7d909bf8680b03bcbf02eee644a64ce2790c7628519993f"},{"mediaType":"application/vnd.docker.image.rootfs.diff.tar.gzip","size":233,"digest":"sha256:b2ea982cfd4ab5f779e2734a2fb2d6443b9eb05808a3c5aa0b6106ed220b3379"},{"mediaType":"application/vnd.docker.image.rootfs.diff.tar.gzip","size":198,"digest":"sha256:ed8fc430091b9bce59ed8b96e8d008138812924ec0ebd7004312f6b41edc2ada"},{"mediaType":"application/vnd.docker.image.rootfs.diff.tar.gzip","size":39,"digest":"sha256:89732bc7504122601f40269fc9ddfb70982e633ea9caf641ae45736f2846b004"},{"mediaType":"application/vnd.docker.image.rootfs.diff.tar.gzip","size":26441810,"digest":"sha256:b213d072514507f2834b280929d05313b901ca886dd53fe273efa65257c9d010"},{"mediaType":"application/vnd.docker.image.rootfs.diff.tar.gzip","size":5205,"digest":"sha256:0ee40dfd3c7921cea4c6748e0d5d9570ffda31171af53767fcb03f244785b859"},{"mediaType":"application/vnd.docker.image.rootfs.diff.tar.gzip","size":2374,"digest":"sha256:1bba3e5e6a1021ab1320b7b049c63befdefdcf7ba1aeecca4ad636dffb321790"}]}
Digest: sha256:138efa92a1a885b92dcc9a1ceff968681fea8863e924a1f96e7eca6531c23be8
Command: /bin/sh NOP
101.3 KB
Digest: sha256:e33bce57de289fffd2380f73997dfb7e1ec193877904bed99f28c715d071fdc4
Command: /bin/sh NOP
20.7 KB
Digest: sha256:473d8557b1b27974f7dc7c4b4e1a209df0e27e8cae1e3e33b7bb45c969b6fc7e
Command: /bin/sh NOP
737.6 KB
Digest: sha256:54e6e6b3b3915686a45868275ea2e3a1195571182f288ac23a31ee6f8fe75c87
Command: /bin/sh NOP
83 bytes
Digest: sha256:ab4403e442bffb2ce0a44f9463d0891337d0784e2d5d50f0677e903622591609
Command: /bin/sh NOP
201 bytes
Digest: sha256:86d03bd6344168c148233c4f8adaf4b89aa08c01a05d30269ed367f113794ca7
Command: /bin/sh NOP
136 bytes
Digest: sha256:52873439a13501a6a358c47eefe68330258edbf019125aec597b713deb259bb5
Command: /bin/sh NOP
174 bytes
Digest: sha256:68d6cfd04225ec378e86f390e84392094483e5e35386baea4ce1becf4d570709
Command: /bin/sh NOP
103 bytes
Digest: sha256:4aa0ea1413d37a58615488592a0b827ea4b2e48fa5a77cf707d0e35f025e613f
Command: /bin/sh NOP
385 bytes
Digest: sha256:088f84a7313c99ae5b7167a6432686081b584b41fac067213c52523ef3314410
Command: /bin/sh NOP
331 bytes
Digest: sha256:eeac61b2cc6b5e28e7d909bf8680b03bcbf02eee644a64ce2790c7628519993f
Command: /bin/sh NOP
127.5 KB
Digest: sha256:b2ea982cfd4ab5f779e2734a2fb2d6443b9eb05808a3c5aa0b6106ed220b3379
Command: COPY /home/etc/passwd /etc/passwd # buildkit
233 bytes
Digest: sha256:ed8fc430091b9bce59ed8b96e8d008138812924ec0ebd7004312f6b41edc2ada
Command: COPY /home/etc/group /etc/group # buildkit
198 bytes
Digest: sha256:89732bc7504122601f40269fc9ddfb70982e633ea9caf641ae45736f2846b004
Command: COPY /home/nonroot /home/nonroot # buildkit
39 bytes
Digest: sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: ARG TARGETARCH
32 bytes
Digest: sha256:b213d072514507f2834b280929d05313b901ca886dd53fe273efa65257c9d010
Command: COPY arm64/pilot-discovery /usr/local/bin/pilot-discovery # buildkit
25.2 MB
Digest: sha256:0ee40dfd3c7921cea4c6748e0d5d9570ffda31171af53767fcb03f244785b859
Command: COPY envoy_bootstrap.json /var/lib/istio/envoy/envoy_bootstrap_tmpl.json # buildkit
5.1 KB
Digest: sha256:1bba3e5e6a1021ab1320b7b049c63befdefdcf7ba1aeecca4ad636dffb321790
Command: COPY gcp_envoy_bootstrap.json /var/lib/istio/envoy/gcp_envoy_bootstrap_tmpl.json # buildkit
2.3 KB
Digest: sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: USER 1337:1337
32 bytes
Digest: sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: ENTRYPOINT ["/usr/local/bin/pilot-discovery"]
32 bytes
Docker logo
pilot
5 tetrate-ci
Docker logo
pilot
image arm64 linux
2 tetrate-ci
Docker logo
pilot
image amd64 linux
9 tetrate-ci
Docker logo
pilot
image arm64 linux
2 tetrate-ci
Docker logo
pilot
image amd64 linux
9 tetrate-ci
Docker logo
pilot
image arm64 linux
2 tetrate-ci
Docker logo
pilot
image arm64 linux
3 tetrate-ci
Docker logo
pilot
image amd64 linux
17 tetrate-ci
Docker logo
pilot
image arm64 linux
2 tetrate-ci
Docker logo
pilot
image arm64 linux
3 tetrate-ci
Docker logo
pilot
image arm64 linux
2 tetrate-ci
Docker logo
pilot
image amd64 linux
2 tetrate-ci
Docker logo
pilot
50 tetrate-ci
Docker logo
pilot
image amd64 linux
2 tetrate-ci
Docker logo
pilot
236 tetrate-ci
Docker logo
pilot
image amd64 linux
3 tetrate-ci
Docker logo
pilot
255 tetrate-ci
Docker logo
pilot
image amd64 linux
2 tetrate-ci
Docker logo
pilot
image amd64 linux
3 tetrate-ci
Docker logo
pilot
49 tetrate-ci

Security Scanning:
You can't see this because your subscription doesn't include this feature, sorry!

With Security Scanning, Cloudsmith will scan your artifacts for vulnerabilities when they're uploaded. These are then presented to you via the UI and the API, so that you can build rules into your CI/CD pipelines to decide how to handle low, medium, high and critical software vulnerabilities.

If you'd like to trial or ask about the Security Scanning feature, just ask us. We'll be happy to help!

Last scanned

4 days, 2 hours ago

Scan result

Vulnerable

Vulnerability count

5

Max. severity

Medium
Target:
MEDIUM

CVE-8618-46221: library: vulnerability title



Package Name: package_name
Installed Version: 1.9.14
Fixed Version: 2.6.5

References: www.reid.com turner.com www.williams.com
MEDIUM

CVE-9234-75210: library: vulnerability title



Package Name: package_name
Installed Version: 1.9.34
Fixed Version: 2.10.45

References: www.lyons-thomas.com hill.com www.russell.com
MEDIUM

CVE-7065-75144: library: vulnerability title



Package Name: package_name
Installed Version: 1.4.25
Fixed Version: 2.1.52

References: www.sanchez.org www.carr.com lane.biz
LOW

CVE-9987-69396: library: vulnerability title



Package Name: package_name
Installed Version: 1.8.69
Fixed Version: 2.2.28

References: www.bryan.com www.guerra.net harrington-newman.net
LOW

CVE-3267-26566: library: vulnerability title



Package Name: package_name
Installed Version: 1.1.93
Fixed Version: 2.10.85

References: rivers.org www.gill.info www.roberts.com

These instructions assume you have setup the repository first (or read it).

To pull pilot @ reference/tag sha256:3970518ca77bdfeecc6312f76423cd4d9c78a3aed421d7a252cbafb4f9f301bb:

docker pull containers.istio.tetratelabs.com/pilot@sha256:3970518ca77bdfeecc6312f76423cd4d9c78a3aed421d7a252cbafb4f9f301bb

You can also pull the latest version of this image (if it exists):

docker pull containers.istio.tetratelabs.com/pilot:latest

To refer to this image after pulling in a Dockerfile, specify the following:

FROM containers.istio.tetratelabs.com/pilot@sha256:3970518ca77bdfeecc6312f76423cd4d9c78a3aed421d7a252cbafb4f9f301bb