You can use boolean logic (e.g. AND/OR/NOT) for complex search queries. For more help and examples, see the search documentation.
Search by package name:
my-package
(implicit)
name:my-package
(explicit)
Search by package filename:
filename:my-package.ext
Search by package tag:
tag:latest
Search by package version:
version:1.0.0
prerelease:true
(prereleases)
prerelease:false
(no prereleases)
Search by package architecture:
architecture:x86_64
Search by package distribution:
distribution:el
Search by package license:
license:MIT
Search by package format:
format:deb
Search by package status:
status:in_progress
Search by package file checksum:
checksum:5afba
Search by package security status:
severity:critical
Search by package vulnerabilities:
vulnerabilities:>1
vulnerabilities:<1000
Search by # of package downloads:
downloads:>8
downloads:<100
Search by package type:
type:binary
type:source
Search by package size (bytes):
size:>50000
size:<10000
Search by dependency name/version:
dependency:log4j
dependency:log4j=1.0.0
dependency:log4j>1.0.0
Search by uploaded date:
uploaded:>"1 day ago"
uploaded:<"August 14, 2022 EST"
Search by entitlement token (identifier):
entitlement:3lKPVJPosCsY
Search by policy violation:
policy_violated:true
deny_policy_violated:true
license_policy_violated:true
vulnerability_policy_violated:true
Search by repository:
repository:repo-name
Search queries for all Debian-specific (and related) package types
Search by component:
deb_component:unstable
Search queries for all Maven-specific (and related) package types
Search by group ID:
maven_group_id:org.apache
Search queries for all Docker-specific (and related) package types
Search by image digest:
docker_image_digest:sha256:7c5..6d4
(full hashref only)
Search by layer digest:
docker_layer_digest:sha256:4c4..ae4
(full hashref only)
Field type modifiers (depending on the type, you can influence behaviour)
For all queries, you can use:
~foo
for negation
For string queries, you can use:
^foo
to anchor to start of term
foo$
to anchor to end of term
foo*bar
for fuzzy matching
For number/date or version queries, you can use:
>foo
for values greater than
>=foo
for values greater / equal
<foo
for values less than
<=foo
for values less / equal
Need a secure and centralised artifact repository to deliver Alpine,
Cargo,
CocoaPods,
Composer,
Conan,
Conda,
CRAN,
Dart,
Debian,
Docker,
Go,
Helm,
Hex,
LuaRocks,
Maven,
npm,
NuGet,
P2,
Python,
RedHat,
Ruby,
Swift,
Terraform,
Vagrant,
Raw & More packages?
Cloudsmith is the new standard in Package / Artifact Management and Software Distribution.
With support for all major package formats, you can trust us to manage your software supply chain.

Tool-Specific Instructions
Although we use GPG (and RSA) keys across each repository and package format, client-side tools might have specific instructions that differ (or require manual steps). To add or use the signing key for these tools, please click on the package format specific tabs above.
Public GPG Key
GPG-based keys/signatures are used by:
The public GPG key for the qmfrederik/gnustep is:
-----BEGIN PGP PUBLIC KEY BLOCK-----
mQGNBGhsMZcBDADGB+hRS3cfgrHwXGFMU0VSqDra+znPLOAiKenn6A2OgCr4oqM5
1Glcp6+bYj6FEFrNezdTGo4W67AJQTHKR/1J79i4iemNWLWwS47GwPxMLJ0IHQ3l
nwIKIbyVy2FvDl/CkizN4vLYXTFr3l1b1DFLBs+YkKv8jfRuAoVatEgwaxojAEWQ
pxbPArfRzU6V8z3FKVI2NYEZyX9amX6wrC8aeJ7+LzxNCVZCnJ/YHNk1K8hlwH5G
DnAZQ9EZMm4OdK3Y10qnMaM/U93s4H+7iRtYSJEc7Ywe0Qq588FyiqoLHKctva+c
Kvc0yu2wx82ekJTPPV+bJ0YkNOVLB4m25JOGcsNg/1F725RUX1eXLKzh59pB4WPz
xE9YRKloL3Kx/cKGbilK4veCkqPuXcxWgZ5IhtxLui8RYWXGIUxmEUWV120jQN6z
fx2yeFtsQ1auMk7UX8a0MqQzDA61ONcpfXYhDnsvVZNj6OuRS4cjLAC3sqX5vBol
s07PgSgZNfzg3bcAEQEAAbQ/Q2xvdWRzbWl0aCBQYWNrYWdlIChxbWZyZWRlcmlr
L2dudXN0ZXApIDxzdXBwb3J0QGNsb3Vkc21pdGguaW8+iQHOBBMBCAA4FiEEmPaM
Crb0ivjNmx9klRrsVEG5VPsFAmhsMZcCGy8FCwkIBwMFFQoJCAsFFgIDAQACHgEC
F4AACgkQlRrsVEG5VPvRoQv/Q1+MyRVcqyHmdlWQVP2vJwE3TvY0me3fqCONKumE
K9eLtjpylFjew1ELVPCL2wUoc0oHmUm0Ry0MGHL15u3jcug4K+fFleVdZHma1tKj
JD5dIacgH/JxZuENcUdl5RszMpia/SUj0LDHNBrosQZ9r2n9Ini1o9pljYaaYUDB
k0C+QnIrS3bhxKxgKOB4W90EodCRL1wPQHCNrnRHkE7GAQIjcEAX2mn3H5TxmZDn
KxM6sXj7RxYzJmZLGkB30Rg03Bbe8uD7X375B36cxVLvMcWzHJeMjLjBlSwI8ULO
2DiYjJz+Tv4kNI07EbdvtdxPijBD00ChQ8eYhXMO3VM+2387iveABet9dvzI+VAj
2Ir3twyHEi0QeTR+lrS7Ph4xIMCLsxkcSHz8vS7AyM8nHgl9IAMEOFfQ7BNIq2J0
swIV7QSTkDhO2J4nurWFeD1f8fn6XJdVLW47jDlU9YCgYeNhDT+uH5kx4/091RUQ
TDVqCCJVPy/9t4bjEA8uMWgw
=ogV8
-----END PGP PUBLIC KEY BLOCK-----
It has the following long (20 bytes) and short (8 bytes) fingerprints:
98F68C0AB6F48AF8CD9B1F64951AEC5441B954FB
951AEC5441B954FB
You can download the GPG key or fetch it via the command-line:
curl -1sLf 'https://dl.cloudsmith.io/public/qmfrederik/gnustep/gpg.951AEC5441B954FB.key'
Public RSA Key
RSA-based keys/signatures are used by:
The public RSA key for the qmfrederik/gnustep is:
-----BEGIN PUBLIC KEY-----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-----END PUBLIC KEY-----
It has the following long (16 bytes) and short (8 bytes) fingerprints:
85D1AE023F479F9C067E5D8824013E90
067E5D8824013E90
You can download the RSA key or fetch it via the command-line:
curl -1sLf 'https://dl.cloudsmith.io/public/qmfrederik/gnustep/rsa.067E5D8824013E90.key'
Public ECDSA Key
ECDSA-based keys/signatures are used by:
The public ECDSA OpenSSH key for the qmfrederik/gnustep is:
-----BEGIN PUBLIC KEY-----
MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAErJbFE4MeCX6TlRjt5/fb/elI8uXq
HU7+VnqJZ9lBEa3/NN+4ORCY3Y21dP05DGlctlQ1U4++X3z/fxH8L3PLJQ==
-----END PUBLIC KEY-----
It has the following long (16 bytes) and short (8 bytes) fingerprints:
A83FA496E8F514AD35332D445D3423C1
35332D445D3423C1
You can download the ECDSA key or fetch it via the command-line:
curl -1sLf 'https://dl.cloudsmith.io/public/qmfrederik/gnustep/ecdsa.35332D445D3423C1.key'
Please note however that the NPM client does not require this key to be installed system-wide in order to allow for package verification - NPM tooling will handle keys automatically.
Need Help?
If you couldn't find what you needed in our documentation, then you can always chat to a member of our team instead. It's our mission to be your dedicated off-site team for package management, and we mean it. Come and chat with us, anytime.
What's this page? All Cloudsmith repositories and packages are signed using GPG, RSA or ECDSA keys where supported. Signatures and checksums provide reliable mechanisms to ensure that the packages that you download/install are neither corrupt nor modified. GPG is generally preferred, but RSA or ECDSA is used for some package formats (such as Alpine or NPM). Learn more in the signing keys documentation.