Skip to content


Switch branches/tags

Latest commit


Git stats


Failed to load latest commit information.
Latest commit message
Commit time

Packages Auto Update Status Latest Release Slack Community


Cloud Posse

Cloud Posse distribution of awesome apps.

This project is part of our comprehensive "SweetOps" approach towards DevOps.

It's 100% Open Source and licensed under the APACHE2.


Use this repo to easily install releases of popular Open Source apps. We provide a few ways to use it.

  1. Make Based Installer. This installer works regardless of your OS and distribution. It downloads packages directly from their GitHub source repos and installs them to your INSTALL_PATH.
  2. Alpine Linux Packages. Use our Alpine repository to install prebuilt packages that use the original source binary (where possible) from the maintainers' official GitHub repo releases.
  3. Docker Image. Use our docker image as a base-image or as part of a multi-stage docker build. The docker image always distributes the latest linux binaries for x86_64 architectures.

See examples below for usage.

Is one of our packages out of date?

Open up an issue or submit a PR (preferred). We'll review quickly!


Package repository hosting is graciously provided by cloudsmith. Cloudsmith is the only fully hosted, cloud-native, universal package management solution, that enables your organization to create, store and share packages in any format, to any place, with total confidence. We believe there’s a better way to manage software assets and packages, and they’re making it happen!


Alpine Repository (recommended)

A public Alpine repository is provided by Cloud Posse. The repository is hosted on Amazon S3 and fronted by CloudFlare's CDN with end-to-end TLS. This ensures insane availability with DDoS mitigation and low-cost hosting. Using this alpine repository is ultimately more reliable than depending on GitHub for availability and provides an easier way to manage dependencies pinned at multiple versions.

The repository itself is managed using alpinist, which takes care of the heavy lifting of building repository indexes. You can self-host your own Alpine repository using this strategy.

Configure the alpine repository:

The Easy Way

We provide a bootstrap script to configure the alpine repository for your version of alpine.

curl -sSL | bash

NOTE: Requires bash and curl to run:

For Docker

Add the following to your Dockerfile near the top.

# Install the cloudposse alpine repository
ADD /etc/apk/keys/
RUN echo "@cloudposse" >> /etc/apk/repositories

NOTE: we support alpine 3.7, 3.8, 3.9, 3.10, and 3.11 packages at this time

Installing Alpine Packages

When adding packages, we recommend using apk add --update $package to update the repository index before installing packages.

Simply install any package as normal:

apk add gomplate

But we recommend that you use version pinning:

apk add gomplate==3.0.0-r0

And maybe even repository pinning, so you know that you get our versions:

apk add gomplate@cloudposse==3.0.0-r0

Makefile Interface

The Makefile interface works on OSX and Linux. It's a great way to distribute binaries in an OS-agnostic way which does not depend on a package manager (e.g. no brew or apt-get).

This method is ideal for local development environments (which is how we use it) where you need the dependencies installed natively for your OS/architecture, such as installing a package on OSX.

See all available packages:

make -C install help

Install everything...

make -C install all

Install specific packages:

make -C install aws-vault chamber

Install to a specific folder:

make -C install aws-vault INSTALL_PATH=/usr/bin

Uninstall a specific package

make -C uninstall yq

Rebuilding GitHub Action Workflows

The GitHub Action workflows are compiled from the .github/package-template.yml file by running make -C .github workflows. It's also run automatically when rebuilding the with make readme.

Run this make target anytime the package-template.yml changes or any new packages are added to the vendor/ folder.

IMPORTANT: The package-template.yml supports a single macro for interpolation %PACKAGE_NAME% which is replaced using a sed expression. Since the workflow uses a combation of gotemplate-like interpolations as well as inlines shell scripts, we used the %VAR% form of interpolation to avoid the need for endless escaping of interpolation specifiers.

Testing Locally


$ make docker/build/apk/shell
$ make -C vendor/<package> apk


$ make docker/build/deb/shell
$ make -C vendor/<package> deb


$ make -C vendor/<package> install


Docker Multi-stage Build

Add this to a Dockerfile to install packages using a multi-stage build process:

FROM cloudposse/packages:latest AS packages

COPY --from=packages /packages/bin/kubectl /usr/local/bin/

Docker with Git Clone

Or... add this to a Dockerfile to easily install packages on-demand:

RUN git clone --depth=1 -b master /packages && \
    rm -rf /packages/.git && \
    make -C /packages/install kubectl

Makefile Inclusion

Sometimes it's necessary to install some binary dependencies when building projects. For example, we frequently rely on gomplate or helm to build chart packages.

Here's a stub you can include into a Makefile to make it easier to install binary dependencies.

export PACKAGES_VERSION ?= master
export PACKAGES_PATH ?= packages/

## Install packages
        @if [ ! -d $(PACKAGES_PATH) ]; then \
          echo "Installing packages $(PACKAGES_VERSION)..."; \
          rm -rf $(PACKAGES_PATH); \
          git clone --depth=1 -b $(PACKAGES_VERSION) $(PACKAGES_PATH); \
          rm -rf $(PACKAGES_PATH)/.git; \

## Install package (e.g. helm, helmfile, kubectl)
packages/install/%: packages/install
        @make -C $(PACKAGES_PATH)/install $(subst packages/install/,,$@)

## Uninstall package (e.g. helm, helmfile, kubectl)
        @make -C $(PACKAGES_PATH)/uninstall $(subst packages/uninstall/,,$@)

Contributing Additional Packages

In addition to following the Contributing section, the following steps can be used to add new packages for review (via a PR). If possible (and it usually is), you want to find an existing package with similarly packaged release (.tar, .gz, uncompressed binary, etc.), and copy and edit its Makefile.

  1. Copy the Makefile from an existing, similar, package within the vendors directory. Name the new folder with the same name as the binary package being installed.
  2. Edit the Makefile, ensuring the DOWNLOAD_URL is properly formatted
  3. Run make init from within the directory to create the DESCRIPTION, LICENSE, RELEASE, and VERSION files.
  4. Ensure that a test task exists in the package Makefile. It should check the version number of the installed binary if possible.
  5. Test the install and ensure that it downloads and runs as expected (make -C install <your_package> INSTALL_PATH=/tmp)
  6. Test the apk build (see below)
  7. Update the (make init readme/deps readme)

Testing apk builds

To validate that a new package will build into an apk you can use the following steps;

make docker/build/apk/shell
make -C vendor/<appname> apk
# Some temp build files in the volume mount set user/group to nobody/nobody for apk building.
# It is easier to remove them while within the docker container.
rm -rf ./tmp/build.*

Troubleshooting Package Addition

Here are some solutions to several common problems that may occur when adding a new package:

  1. When adding a new app, the `make -C vendor/ apk` command fails, claiming it can't find the app's binary file, even though it is in the expected place.

    Part of the make -C vendor/<app> apk command is building a package for the binary file inside an Alpine Linux container. Since Alpine Linux uses musl as its C library, this often leads to situations where binaries built against libc might not function on Alpine. What's more, binaries from projects written in Go will not be found by the Alpine package builder at all if they are missing any necessary libraries, like libc. The solution to this problem is to add an export APKBUILD_DEPENDS += libc6-compat line to the top of your new package's associated Makefile.

  2. When adding a new binary, the `make builder TARGETS=readme` command fails with `Unable to find image 'cloudposse/build-harness:sha-[some_SHA_stub]' locally`.

    This can occur when you have the cloudposse/build-harness repository checked out somewhere on your machine. make builder TARGETS=readme will end up looking for a docker image tagged with the SHA that the HEAD ref of your buld-harness points to. To correct this behavior, just run make init in the cloudposse/packages directory prior to running make builder TARGETS=readme.

Package Build Status

Build Status Version Description
amazon-ecr-credential-helper 0.6.0 Automatically gets credentials for Amazon ECR on docker push/docker pull
amtool 0.24.0 Tool for interacting with the Alertmanager API
argocd 2.4.9 Declarative GitOpts for Kubernetes
assume-role 0.3.2 Easily assume AWS roles in your terminal.
atlantis 0.19.7 Terraform For Teams
atmos 1.4.25 Universal Tool for DevOps and Cloud Automation
awless 0.1.11 A Mighty CLI for AWS
aws-iam-authenticator 0.5.9 A tool to use AWS IAM credentials to authenticate to a Kubernetes cluster
aws-vault 6.6.0 A vault for securely storing and accessing AWS credentials in development environments
cfssl 1.6.1 Cloudflare's PKI and TLS toolkit
cfssljson 1.6.1 Cloudflare's PKI and TLS toolkit json parser
chamber 2.10.12 CLI for managing secrets
cli53 0.8.18 Command line tool for Amazon Route 53
cloudflared 2022.8.0 Argo Tunnel client
cloudposse-atlantis Terraform For Teams, enhanced by Cloud Posse
codefresh 0.79.2 Codefresh CLI
conftest 0.34.0 Test your configuration files using Open Policy Agent
consul 1.13.1 Hashicorp consul
ctop 0.7.7 Top-like interface for container metrics
direnv 2.32.1 Unclutter your .profile
doctl 1.79.0 A command line tool for DigitalOcean services
duffle 0.3.5b1 CNAB installer
ec2-instance-selector 2.4.0 A CLI tool and go library which recommends instance types based on resource criteria like vcpus and memory
emailcli 1.0.3 Command line email sending client written in Go.
envcli 0.7.1 A simple wrapper that allows you to run commands within ethereal docker containers
fargate 0.3.2 CLI for AWS Fargate
fetch 0.4.5 fetch makes it easy to download files, folders, and release assets from a specific public git commit, branch, or tag
figurine 1.2.0 Print your name in style
fzf 0.23.1 A command-line fuzzy finder
gh 2.14.4 The GitHub CLI
ghr 0.14.0 Upload multiple artifacts to GitHub Releases in parallel
github-commenter 0.10.1 Command line utility for creating GitHub comments on Commits, Pull Request Reviews or Issues
github-release 0.10.0 Commandline app to create and edit releases on Github (and upload artifacts)
github-status-updater 0.7.0 Command line utility for updating GitHub commit statuses and enabling required status checks for pull requests
gitleaks 1.2.0 Audit git repos for secrets 🔑
go-jsonnet 0.18.0 This an implementation of Jsonnet in pure Go.
gomplate 3.11.2 A flexible commandline tool for template rendering. Supports lots of local and remote datasources.
gonsul 1.0.2 A stand-alone alternative to git2consul
goofys 0.24.0 a high-performance, POSIX-ish Amazon S3 file system written in Go
gosu 1.14.0 Simple Go-based setuid+setgid+setgroups+exec
gotop 3.0.0 A terminal based graphical activity monitor inspired by gtop and vtop
grpcurl 1.8.7 Like cURL, but for gRPC: Command-line tool for interacting with gRPC servers
hcledit 0.2.6 A command line editor for HCL
helm 3.9.3 The Kubernetes Package Manager
helm2 2.17.0 The Kubernetes Package Manager
helm3 3.9.3 The Kubernetes Package Manager
helmfile 0.144.0 Deploy Kubernetes Helm Charts
htmltest 0.16.0 Test generated HTML for problems
hugo 0.101.0 The world’s fastest framework for building websites.
infracost 0.10.10 Cloud cost estimates for Terraform
jp 0.2.1 Command line interface to JMESPath
jq 1.6.0 Command-line JSON processor
json2hcl 0.0.6 Convert JSON to HCL, and vice versa
jx 3.3.4 Jenkins-X
k3d 5.4.4 Little helper to run Rancher Lab's k3s in Docker
k6 0.39.0 A modern load testing tool, using Go and JavaScript -
k9s 0.26.3 Kubernetes CLI To Manage Your Clusters In Style
katafygio 0.8.3 K8s continuous backup to git
kfctl 1.2.0 Machine Learning Toolkit for Kubernetes
kind 0.14.0 A tool for running local Kubernetes clusters using Docker
kops 1.24.1 Kubernetes Operations (kops) - Production Grade K8s Installation, Upgrades, and Management
krew 0.4.1 Kubectl plugin manager
kubecron 2.0.0 Utilities to manage kubernetes cronjobs. Run a CronJob manually for test purposes. Suspend/unsuspend a CronJob
kubectl 1.24.3 Production-Grade Container Scheduling and Management
kubectl-1.13 1.13.12 Production-Grade Container Scheduling and Management (v1.13)
kubectl-1.14 1.14.10 Production-Grade Container Scheduling and Management (v1.14)
kubectl-1.15 1.15.12 Production-Grade Container Scheduling and Management (v1.15)
kubectl-1.16 1.16.15 Production-Grade Container Scheduling and Management (v1.16)
kubectl-1.17 1.17.17 Production-Grade Container Scheduling and Management (v1.17)
kubectl-1.18 1.18.20 Production-Grade Container Scheduling and Management (v1.18)
kubectl-1.19 1.19.16 Production-Grade Container Scheduling and Management (v1.19)
kubectl-1.20 1.20.15 Production-Grade Container Scheduling and Management (v1.20)
kubectl-1.21 1.21.14 Production-Grade Container Scheduling and Management (v1.21)
kubectl-1.22 1.22.12 Production-Grade Container Scheduling and Management (v1.22)
kubectx 0.9.4 Switch faster between clusters and namespaces in kubectl
kubens 0.9.4 Switch faster between clusters and namespaces in kubectl
kubeval 0.16.1 Validate your Kubernetes configuration files, supports multiple Kubernetes versions
lazydocker 0.18.1 The lazier way to manage everything docker
lectl 0.21.0 Script to check issued certificates by Let's Encrypt on CTL (Certificate Transparency Log) using
minikube 1.26.1 Run Kubernetes locally
misspell 0.3.4 Correct commonly misspelled English words in source files
opa 0.43.0 An open source project to policy-enable your service.
pack 0.27.0 Create cloud native Buildpacks
packer 1.8.3 Packer is a tool for creating identical machine images for multiple platforms from a single source configuration.
pandoc 2.19 Universal markup converter
pgmetrics 1.13.1 Postgres metrics
pluto 5.10.3 A cli tool to help discover deprecated apiVersions in Kubernetes
popeye 0.10.1 A Kubernetes cluster resource sanitizer
promtool 2.37.0 Prometheus CLI tool
rainbow-text 1.2.1 Tasty rainbows for your terminal! (lolcat clone)
rakkess 0.5.0 Review Access - kubectl plugin to show an access matrix for all available resources
rancher 2.6.5 Rancher CLI
rbac-lookup 0.9.0 Find Kubernetes roles and cluster roles bound to any user, service account, or group name.
saml2aws 2.36.0 CLI tool which enables you to login and retrieve AWS temporary credentials using a SAML IDP
scenery 0.1.5 A Terraform plan output prettifier
sentry-cli 2.5.0 A command line utility to work with Sentry.
shellcheck 0.8.0 ShellCheck, a static analysis tool for shell scripts
shfmt 3.5.1 A shell parser, formatter and interpreter (POSIX/Bash/mksh)
slack-notifier 0.4.0 Command line utility to send messages with attachments to Slack channels via Incoming Webhooks
sops 3.7.3 Secrets management stinks, use some sops!
spacectl 0.10.0 client and CLI
spotctl 0.25.0 A unified CLI to manage your Spot resources.
sshm 1.2.2 Easy connect on EC2 instances thanks to AWS System Manager Agent
stern 1.11.0 ⎈ Multi pod and container log tailing for Kubernetes
sudosh 0.3.0 Shell wrapper to run a login shell with sudo as the current user for the purpose of audit logging
teleport 10.1.4 Secure Access for Developers that doesn't get in the way.
teleport-4.2 4.2.12 Privileged access management for elastic infrastructure.
teleport-4.3 4.3.10 Privileged access management for elastic infrastructure.
teleport-4.4 4.4.12 Privileged access management for elastic infrastructure.
teleport-5.0 5.0.2 Secure Access for Developers that doesn't get in the way.
terraform 1.2.7 Terraform is a tool for building, changing, and combining infrastructure safely and efficiently.
terraform-0.11 0.11.15 Terraform is a tool for building, changing, and combining infrastructure safely and efficiently.
terraform-0.12 0.12.31 Terraform is a tool for building, changing, and combining infrastructure safely and efficiently.
terraform-0.13 0.13.7 Terraform is a tool for building, changing, and combining infrastructure safely and efficiently.
terraform-0.14 0.14.11 Terraform is a tool for building, changing, and combining infrastructure safely and efficiently.
terraform-0.15 0.15.5 Terraform is a tool for building, changing, and combining infrastructure safely and efficiently.
terraform-1 1.2.7 Terraform enables you to safely and predictably create, change, and improve infrastructure.
terraform-config-inspect 0.0.20211115214459+git90acf1ca460f A helper library for shallow inspection of Terraform configurations
terraform-docs 0.16.0 Generate docs from terraform modules
terraform-module-versions 3.1.13 CLI tool that checks Terraform code for module updates. Single binary, no dependencies. linux, osx, windows.
terraform_0.11 0.11.15 Terraform (Deprecated package. Use terraform-0.11 instead)
terraform_0.12 0.12.31 Terraform (Deprecated package. Use terraform-0.12 instead)
terraform_0.13 0.13.7 Terraform (Deprecated package. Use terraform-0.13 instead)
terragrunt 0.38.7 Terragrunt is a thin wrapper for Terraform that provides extra tools for working with multiple Terraform modules.
terrahelp 0.7.5 Terrahelp is as a command line utility that provides useful tricks like masking of terraform output.
tfenv 0.4.0 Transform environment variables for use with Terraform (e.g. HOSTNAMETF_VAR_hostname)
tflint 0.39.3 A Pluggable Terraform Linter
tfmask 0.7.0 Terraform utility to mask select output from terraform plan and terraform apply
tfschema 0.7.5 A schema inspector for Terraform providers
tfsec 1.27.1 Security scanner for your Terraform code
thanos 0.27.0 Highly available Prometheus setup with long term storage capabilities. CNCF Sandbox project.
trivy 0.30.4 A Simple and Comprehensive Vulnerability Scanner for Containers, Suitable for CI
turf 0.18.0 Turf is Cloud Posse's command-line automation helper.
variant 0.38.0 Variant is a Universal CLI tool that works like a task runner
variant2 0.38.0 Second major version of Variant, a Universal CLI tool that works like a task runner
vault 1.11.2 Hashicorp vault
vendir 0.30.0 Easy way to vendor portions of git repos, github releases, helm charts, docker image contents, etc. declaratively.
venona 1.7.4 Codefresh runtime-environment agent
vert 0.1.0 Simple CLI for comparing two or more versions
yajsv 1.4.0 Yet Another JSON Schema Validator [CLI]
yq 4.27.2 yq is a portable command-line YAML processor

Share the Love

Like this project? Please give it a ★ on our GitHub! (it helps us a lot)

Are you using this project or any of our other projects? Consider leaving a testimonial. =)

Related Projects

Check out these related projects.

  • build-harness - Collection of Makefiles to facilitate building Golang projects, Dockerfiles, Helm charts, and more
  • geodesic - Geodesic is the fastest way to get up and running with a rock solid, production grade cloud platform built on strictly Open Source tools.


Got a question? We got answers.

File a GitHub issue, send us an email or join our Slack Community.

README Commercial Support

DevOps Accelerator for Startups

We are a DevOps Accelerator. We'll help you build your cloud infrastructure from the ground up so you can own it. Then we'll show you how to operate it and stick around for as long as you need us.

Learn More

Work directly with our team of DevOps experts via email, slack, and video conferencing.

We deliver 10x the value for a fraction of the cost of a full-time engineer. Our track record is not even funny. If you want things done right and you need it done FAST, then we're your best bet.

  • Reference Architecture. You'll get everything you need from the ground up built using 100% infrastructure as code.
  • Release Engineering. You'll have end-to-end CI/CD with unlimited staging environments.
  • Site Reliability Engineering. You'll have total visibility into your apps and microservices.
  • Security Baseline. You'll have built-in governance with accountability and audit logs for all changes.
  • GitOps. You'll be able to operate your infrastructure via Pull Requests.
  • Training. You'll receive hands-on training so your team can operate what we build.
  • Questions. You'll have a direct line of communication between our teams via a Shared Slack channel.
  • Troubleshooting. You'll get help to triage when things aren't working.
  • Code Reviews. You'll receive constructive feedback on Pull Requests.
  • Bug Fixes. We'll rapidly work with you to fix any bugs in our projects.

Slack Community

Join our Open Source Community on Slack. It's FREE for everyone! Our "SweetOps" community is where you get to talk with others who share a similar vision for how to rollout and manage infrastructure. This is the best place to talk shop, ask questions, solicit feedback, and work together as a community to build totally sweet infrastructure.

Discourse Forums

Participate in our Discourse Forums. Here you'll find answers to commonly asked questions. Most questions will be related to the enormous number of projects we support on our GitHub. Come here to collaborate on answers, find solutions, and get ideas about the products and services we value. It only takes a minute to get started! Just sign in with SSO using your GitHub account.


Sign up for our newsletter that covers everything on our technology radar. Receive updates on what we're up to on GitHub as well as awesome new projects we discover.

Office Hours

Join us every Wednesday via Zoom for our weekly "Lunch & Learn" sessions. It's FREE for everyone!



Bug Reports & Feature Requests

Please use the issue tracker to report any bugs or file feature requests.


If you are interested in being a contributor and want to get involved in developing this project or help out with our other projects, we would love to hear from you! Shoot us an email.

In general, PRs are welcome. We follow the typical "fork-and-pull" Git workflow.

  1. Fork the repo on GitHub
  2. Clone the project to your own machine
  3. Commit changes to your own branch
  4. Push your work back up to your fork
  5. Submit a Pull Request so that we can review your changes

NOTE: Be sure to merge the latest changes from "upstream" before making a pull request!


Copyright © 2017-2022 Cloud Posse, LLC



See LICENSE for full details.

Licensed to the Apache Software Foundation (ASF) under one
or more contributor license agreements.  See the NOTICE file
distributed with this work for additional information
regarding copyright ownership.  The ASF licenses this file
to you under the Apache License, Version 2.0 (the
"License"); you may not use this file except in compliance
with the License.  You may obtain a copy of the License at

Unless required by applicable law or agreed to in writing,
software distributed under the License is distributed on an
KIND, either express or implied.  See the License for the
specific language governing permissions and limitations
under the License.


All other trademarks referenced herein are the property of their respective owners.


This project is maintained and funded by Cloud Posse, LLC. Like it? Please let us know by leaving a testimonial!

Cloud Posse

We're a DevOps Professional Services company based in Los Angeles, CA. We ❤️ Open Source Software.

We offer paid support on all of our projects.

Check out our other projects, follow us on twitter, apply for a job, or hire us to help with your cloud strategy and implementation.


Erik Osterman
Erik Osterman
Igor Rodionov
Igor Rodionov
Andriy Knysh
Andriy Knysh

README Footer Beacon