Package Search Help

You can use boolean logic (e.g. AND/OR/NOT) for complex search queries. For more help and examples, see the search documentation.

Search by package name:
my-package (implicit)
name:my-package (explicit)

Search by package filename:
filename:my-package.ext 

Search by package tag:
tag:latest 

Search by package version:
version:1.0.0  prerelease:true (prereleases)
prerelease:false (no prereleases)

Search by package architecture:
architecture:x86_64 

Search by package distribution:
distribution:el 

Search by package license:
license:MIT 

Search by package format:
format:deb 

Search by package status:
status:in_progress 

Search by package file checksum:
checksum:5afba 

Search by package security status:
severity:critical 

Search by package vulnerabilities:
vulnerabilities:>1 
vulnerabilities:<1000 

Search by # of package downloads:
downloads:>8 
downloads:<100 

Search by package type:
type:binary 
type:source 

Search by package size (bytes):
size:>50000 
size:<10000 

Search by dependency name/version:
dependency:log4j 
dependency:log4j=1.0.0 
dependency:log4j>1.0.0 

Search by uploaded date:
uploaded:>"1 day ago" 
uploaded:<"August 14, 2022 EST" 

Search by entitlement token (identifier):
entitlement:3lKPVJPosCsY 

Search by policy violation:
policy_violated:true
deny_policy_violated:true
license_policy_violated:true
vulnerability_policy_violated:true

Search by repository:
repository:repo-name

Search queries for all Debian-specific (and related) package types

Search by component:
deb_component:unstable

Search queries for all Maven-specific (and related) package types

Search by group ID:
maven_group_id:org.apache

Search queries for all Docker-specific (and related) package types

Search by image digest:
docker_image_digest:sha256:7c5..6d4
(full hashref only)

Search by layer digest:
docker_layer_digest:sha256:4c4..ae4
(full hashref only)

Field type modifiers (depending on the type, you can influence behaviour)

For all queries, you can use:
~foo for negation

For string queries, you can use:
^foo to anchor to start of term
foo$ to anchor to end of term
foo*bar for fuzzy matching

For number/date or version queries, you can use:
>foo for values greater than
>=foo for values greater / equal
<foo for values less than
<=foo for values less / equal

Need a secure and centralised artifact repository to deliver Alpine, Cargo, CocoaPods, Composer, Conan, Conda, CRAN, Dart, Debian, Docker, Go, Helm, Hex, Hugging Face, LuaRocks, Maven, npm, NuGet, P2, Python, RedHat, Ruby, Swift, Terraform, Vagrant, Raw & More packages?

Cloudsmith is the new standard in Package / Artifact Management and Software Distribution.

With support for all major package formats, you can trust us to manage your software supply chain.

Start My Free Trial
 Public tetrate tetrate (Tetrate) / getistio-containers
Tetrate Istio Distro project (formerly GetIstio) container images registry

Docker logo proxyv2  0009ee5aaf1597b6d6b4e4c741a…

One-liner (summary)

A certifiably-awesome package curated by Bender Rodriguez, hosted by Cloudsmith.

Description

A certifiably-awesome package curated by Bender Rodriguez, hosted by Cloudsmith.

License

Unknown

Size

39.2 MB

Downloads

4

Tags

image arm64 linux

Status  Completed
Checksum (MD5) 8d6ca4b44295c1412523e0f7cf49ba64
Checksum (SHA-1) d4a87e0f01e8da19569fbbc68adc4151f734faa5
Checksum (SHA-256) 0009ee5aaf1597b6d6b4e4c741ae25c57ea470c95132188f26547bed510489ea
Checksum (SHA-512) bedc12b665a21c7ebcd8e152f5e1d1497d0a76ed040236d8107885127a33f753be…
GPG Signature
GPG Fingerprint 7490c226a7c21a19bb1d09e800b3a57eef287d7b
Storage Region  Dublin, Ireland
Type  Binary (contains binaries and binary artifacts)
Uploaded At 4 months, 3 weeks ago
Uploaded By tetrate-ci
Slug Id proxyv2-shlo
Unique Id O7RwELTR92u6
Version (Raw) 0009ee5aaf1597b6d6b4e4c741ae25c57ea470c95132188f26547bed510489ea
Version (Parsed)
  • Type: Unknown
  docker-specific metadata
Image Digest sha256:0009ee5aaf1597b6d6b4e4c741ae25c57ea470c95132188f26547bed510489ea
Config Digest sha256:3978844aff5b59f06a91073894a3b90374ce0b6fcfaac26e3fb621c41b404d7c
V1 OCI Index Digest sha256:b5221ee499f03156825542d8792511d2f7f1e98b2fcc140d29c348c4500c593a
V1 Distribution (Signed) Digest sha256:75c103de94152a38cb5011739f8e6da38874c24cb3e0d70a99a4a6b1a0774378
V1 OCI Digest sha256:7c8e5faceb539cf804c63f866d4f03f38d1cc3da4391fd6b6ec5dbcb01cadf0e
V2 Distribution List Digest sha256:7cba9497b09d893f2b1ff404b26dadaca39c41bd5da56235e14db5774df378bc
V1 Distribution Digest sha256:3a7ebf27953efb4d9964ca8b9490692b2816f3d5f2c58865a87eb06233ca1fac
V2 Distribution Digest sha256:0009ee5aaf1597b6d6b4e4c741ae25c57ea470c95132188f26547bed510489ea
  extended metadata
Manifest Type V2 Distribution
Architecture arm64
Author github.com/chainguard-dev/apko
Config
Created 2025-04-17 07:10:39 UTC
Os linux

This package was uploaded with the following V2 Distribution manifest:

{"schemaVersion":2,"mediaType":"application/vnd.docker.distribution.manifest.v2+json","config":{"mediaType":"application/vnd.docker.container.image.v1+json","size":2798,"digest":"sha256:94a86530c61b0ef8c25031d029905d7b58486c643aca35c956514b1e6fb2e1bd"},"layers":[{"mediaType":"application/vnd.docker.image.rootfs.diff.tar.gzip","size":4087605,"digest":"sha256:f64f8cd1bf5346ea6d145f4ec2fe0a4ec9b194cc31f1f6e37f7fea8604f49c97"},{"mediaType":"application/vnd.docker.image.rootfs.diff.tar.gzip","size":4874,"digest":"sha256:36be48ad701483b007c8d79220a0db716c084278188247def505aa786a4cc249"},{"mediaType":"application/vnd.docker.image.rootfs.diff.tar.gzip","size":27614177,"digest":"sha256:25c016daf497eaa273883b233f137ce42198e7441410b2711ca17be397414938"},{"mediaType":"application/vnd.docker.image.rootfs.diff.tar.gzip","size":9359464,"digest":"sha256:3b731ede8c410f86b918d6a1756ccc3bd8af6aa75d2f016d9c9b1ed4e77be056"}]}
Digest: sha256:f64f8cd1bf5346ea6d145f4ec2fe0a4ec9b194cc31f1f6e37f7fea8604f49c97
Command: apko
3.9 MB
Digest: sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: WORKDIR /
32 bytes
Digest: sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: ARG proxy_version
32 bytes
Digest: sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: ARG SIDECAR=envoy
32 bytes
Digest: sha256:36be48ad701483b007c8d79220a0db716c084278188247def505aa786a4cc249
Command: COPY envoy_bootstrap.json /var/lib/istio/envoy/envoy_bootstrap_tmpl.json # buildkit
4.8 KB
Digest: sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: ARG TARGETARCH
32 bytes
Digest: sha256:25c016daf497eaa273883b233f137ce42198e7441410b2711ca17be397414938
Command: COPY arm64/envoy /usr/local/bin/envoy # buildkit
26.3 MB
Digest: sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: ENV ISTIO_META_ISTIO_PROXY_SHA=8d14f6fc8fe9703ff17d4377d9053b3cbbe85dea
32 bytes
Digest: sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: ARG TARGETARCH
32 bytes
Digest: sha256:3b731ede8c410f86b918d6a1756ccc3bd8af6aa75d2f016d9c9b1ed4e77be056
Command: COPY arm64/pilot-agent /usr/local/bin/pilot-agent # buildkit
8.9 MB
Digest: sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4
Command: ENTRYPOINT ["/usr/local/bin/pilot-agent"]
32 bytes
Docker logo
proxyv2
109 tetrate-ci
Docker logo
proxyv2
image amd64 linux
2 tetrate-ci
Docker logo
proxyv2
681 tetrate-ci
Docker logo
proxyv2
image amd64 linux
8 tetrate-ci
Docker logo
proxyv2
488 tetrate-ci
Docker logo
proxyv2
image amd64 linux
2 tetrate-ci
Docker logo
proxyv2
image amd64 linux
3 tetrate-ci
Docker logo
proxyv2
49 tetrate-ci
Docker logo
proxyv2
26 tetrate-ci
Docker logo
proxyv2
image amd64 linux
4 tetrate-ci
Docker logo
proxyv2
39 tetrate-ci
Docker logo
proxyv2
image amd64 linux
17 tetrate-ci
Docker logo
proxyv2
image arm64 linux
1 tetrate-ci
Docker logo
proxyv2
image arm64 linux
1 tetrate-ci
Docker logo
proxyv2
image amd64 linux
33 tetrate-ci
Docker logo
proxyv2
image amd64 linux
23 tetrate-ci
Docker logo
proxyv2
image arm64 linux
0 tetrate-ci
Docker logo
proxyv2
image arm64 linux
1 tetrate-ci
Docker logo
proxyv2
image amd64 linux
23 tetrate-ci
Docker logo
proxyv2
image arm64 linux
4 tetrate-ci

Security Scanning:
You can't see this because your subscription doesn't include this feature, sorry!

With Security Scanning, Cloudsmith will scan your artifacts for vulnerabilities when they're uploaded. These are then presented to you via the UI and the API, so that you can build rules into your CI/CD pipelines to decide how to handle low, medium, high and critical software vulnerabilities.

If you'd like to trial or ask about the Security Scanning feature, just ask us. We'll be happy to help!

Last scanned

4 days, 5 hours ago

Scan result

Vulnerable

Vulnerability count

1

Max. severity

Critical
Target:
HIGH

CVE-2995-78708: library: vulnerability title



Package Name: package_name
Installed Version: 1.8.81
Fixed Version: 2.7.35

References: www.booth-porter.com fitzgerald-diaz.org evans-wallace.com
Loading...

These instructions assume you have setup the repository first (or read it).

To pull proxyv2 @ reference/tag sha256:0009ee5aaf1597b6d6b4e4c741ae25c57ea470c95132188f26547bed510489ea:

docker pull containers.istio.tetratelabs.com/proxyv2@sha256:0009ee5aaf1597b6d6b4e4c741ae25c57ea470c95132188f26547bed510489ea

You can also pull the latest version of this image (if it exists):

docker pull containers.istio.tetratelabs.com/proxyv2:latest

To refer to this image after pulling in a Dockerfile, specify the following:

FROM containers.istio.tetratelabs.com/proxyv2@sha256:0009ee5aaf1597b6d6b4e4c741ae25c57ea470c95132188f26547bed510489ea
Top