You can use boolean logic (e.g. AND/OR/NOT) for complex search queries. For more help and examples, see the search documentation.
Search by package name:
my-package
(implicit)
name:my-package
(explicit)
Search by package filename:
my-package.ext
(implicit)
filename:my-package.ext
(explicit)
Search by package tag:
latest
(implicit)
tag:latest
(explicit)
Search by package version:
1.0.0
(implicit)
version:1.0.0
(explicit)
prerelease:true
(prereleases)
prerelease:false
(no prereleases)
Search by package architecture:
architecture:x86_64
Search by package distribution:
distribution:el
Search by package license:
license:MIT
Search by package format:
format:deb
Search by package status:
status:in_progress
Search by package file checksum:
checksum:5afba
Search by package security status:
severity:critical
Search by package vulnerabilities:
vulnerabilities:>1
vulnerabilities:<1000
Search by # of package downloads:
downloads:>8
downloads:<100
Search by package type:
type:binary
type:source
Search by package size (bytes):
size:>50000
size:<10000
Search by dependency name/version:
dependency:log4j
dependency:log4j=1.0.0
dependency:log4j>1.0.0
Search by uploaded date:
uploaded:>"1 day ago"
uploaded:<"August 14, 2022 EST"
Search by entitlement token (identifier):
entitlement:3lKPVJPosCsY
Search by policy violation:
policy_violated:true
deny_policy_violated:true
license_policy_violated:true
vulnerability_policy_violated:true
Search by repository:
repository:repo-name
Search queries for all Debian-specific (and related) package types
Search by component:
deb_component:unstable
Search queries for all Maven-specific (and related) package types
Search by group ID:
maven_group_id:org.apache
Search queries for all Docker-specific (and related) package types
Search by image digest:
docker_image_digest:sha256:7c5..6d4
(full hashref only)
Search by layer digest:
docker_layer_digest:sha256:4c4..ae4
(full hashref only)
Field type modifiers (depending on the type, you can influence behaviour)
For all queries, you can use:
~foo
for negation
For string queries, you can use:
^foo
to anchor to start of term
foo$
to anchor to end of term
foo*bar
for fuzzy matching
For number/date or version queries, you can use:
>foo
for values greater than
>=foo
for values greater / equal
<foo
for values less than
<=foo
for values less / equal
Need a secure and centralised artifact repository to deliver Alpine,
Cargo,
CocoaPods,
Composer,
Conan,
Conda,
CRAN,
Dart,
Debian,
Docker,
Go,
Helm,
Hex,
LuaRocks,
Maven,
npm,
NuGet,
P2,
Python,
RedHat,
Ruby,
Swift,
Terraform,
Vagrant,
Raw & More packages?
Cloudsmith is the new standard in Package / Artifact Management and Software Distribution.
With support for all major package formats, you can trust us to manage your software supply chain.
Tool-Specific Instructions
Although we use GPG (and RSA) keys across each repository and package format, client-side tools might have specific instructions that differ (or require manual steps). To add or use the signing key for these tools, please click on the package format specific tabs above.
Public GPG Key
GPG-based keys/signatures are used by:
The public GPG key for the opencpn/earthexplorer-alpha is:
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v2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=Z1WY
-----END PGP PUBLIC KEY BLOCK-----
It has the following long (20 bytes) and short (8 bytes) fingerprints:
0938F4E67B9D043141C80DF1027638416090F297
027638416090F297
You can download the GPG key or fetch it via the command-line:
curl -1sLf 'https://dl.cloudsmith.io/public/opencpn/earthexplorer-alpha/gpg.027638416090F297.key'
Public RSA Key
RSA-based keys/signatures are used by:
The public RSA key for the opencpn/earthexplorer-alpha is:
-----BEGIN PUBLIC KEY-----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-----END PUBLIC KEY-----
It has the following long (16 bytes) and short (8 bytes) fingerprints:
A52CAD23E44C0F0A4AE409FEA8AF2EB0
4AE409FEA8AF2EB0
You can download the RSA key or fetch it via the command-line:
curl -1sLf 'https://dl.cloudsmith.io/public/opencpn/earthexplorer-alpha/rsa.4AE409FEA8AF2EB0.key'
Need Help?
If you couldn't find what you needed in our documentation, then you can always chat to a member of our team instead. It's our mission to be your dedicated off-site team for package management, and we mean it. Come and chat with us, anytime.
What's this page? All Cloudsmith repositories and packages are signed using GPG (or RSA) keys where supported. GPG (or RSA) signatures and checksums provide reliable mechanisms to ensure that the packages that you download/install are neither corrupt nor modified. GPG is generally preferred, but RSA is used for some package formats (such as Alpine). Learn more in the signing keys documentation.