You can use boolean logic (e.g. AND/OR/NOT) for complex search queries. For more help and examples, see the search documentation.
Search by package name:
my-package
(implicit)
name:my-package
(explicit)
Search by package filename:
my-package.ext
(implicit)
filename:my-package.ext
(explicit)
Search by package tag:
latest
(implicit)
tag:latest
(explicit)
Search by package version:
1.0.0
(implicit)
version:1.0.0
(explicit)
prerelease:true
(prereleases)
prerelease:false
(no prereleases)
Search by package architecture:
architecture:x86_64
Search by package distribution:
distribution:el
Search by package license:
license:MIT
Search by package format:
format:deb
Search by package status:
status:in_progress
Search by package file checksum:
checksum:5afba
Search by package security status:
severity:critical
Search by package vulnerabilities:
vulnerabilities:>1
vulnerabilities:<1000
Search by # of package downloads:
downloads:>8
downloads:<100
Search by package type:
type:binary
type:source
Search by package size (bytes):
size:>50000
size:<10000
Search by dependency name/version:
dependency:log4j
dependency:log4j=1.0.0
dependency:log4j>1.0.0
Search by uploaded date:
uploaded:>"1 day ago"
uploaded:<"August 14, 2022 EST"
Search by entitlement token (identifier):
entitlement:3lKPVJPosCsY
Search by policy violation:
policy_violated:true
deny_policy_violated:true
license_policy_violated:true
vulnerability_policy_violated:true
Search by repository:
repository:repo-name
Search queries for all Debian-specific (and related) package types
Search by component:
deb_component:unstable
Search queries for all Maven-specific (and related) package types
Search by group ID:
maven_group_id:org.apache
Search queries for all Docker-specific (and related) package types
Search by image digest:
docker_image_digest:sha256:7c5..6d4
(full hashref only)
Search by layer digest:
docker_layer_digest:sha256:4c4..ae4
(full hashref only)
Field type modifiers (depending on the type, you can influence behaviour)
For all queries, you can use:
~foo
for negation
For string queries, you can use:
^foo
to anchor to start of term
foo$
to anchor to end of term
foo*bar
for fuzzy matching
For number/date or version queries, you can use:
>foo
for values greater than
>=foo
for values greater / equal
<foo
for values less than
<=foo
for values less / equal
Need a secure and centralised artifact repository to deliver Alpine,
Cargo,
CocoaPods,
Composer,
Conan,
Conda,
CRAN,
Dart,
Debian,
Docker,
Go,
Helm,
Hex,
LuaRocks,
Maven,
npm,
NuGet,
P2,
Python,
RedHat,
Ruby,
Swift,
Terraform,
Vagrant,
Raw & More packages?
Cloudsmith is the new standard in Package / Artifact Management and Software Distribution.
With support for all major package formats, you can trust us to manage your software supply chain.
Tool-Specific Instructions
Although we use GPG (and RSA) keys across each repository and package format, client-side tools might have specific instructions that differ (or require manual steps). To add or use the signing key for these tools, please click on the package format specific tabs above.
Public GPG Key
GPG-based keys/signatures are used by:
The public GPG key for the tetrate/getistio is:
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v2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=QpPv
-----END PGP PUBLIC KEY BLOCK-----
It has the following long (20 bytes) and short (8 bytes) fingerprints:
727F9283366A4D3B77DADDFC9026D4D9DAC9A9B1
9026D4D9DAC9A9B1
You can download the GPG key or fetch it via the command-line:
curl -1sLf 'https://dl.getistio.io/public/gpg.9026D4D9DAC9A9B1.key'
Public RSA Key
RSA-based keys/signatures are used by:
The public RSA key for the tetrate/getistio is:
-----BEGIN PUBLIC KEY-----
MIIBojANBgkqhkiG9w0BAQEFAAOCAY8AMIIBigKCAYEAzscdzw8+EfPzh7CS3rlc
EXlXA/86QX6W2wUw+rfJJn7f/SazbDEkGSkQdh4Q/V0GQQzve1Mc9Cv/CFG5b8Ai
+uBBKs703Ev+NPIJuINr5kQedLfm9SR3kgUF2GV1e56L7xUt4dniHjVInF/oElRv
lvXBgFfADcH2yQxFN/KJfiSHTu98qV/5GdbT2sZ3klsf3XA4eZnRnpcLs/4tRXxW
B1EfkcN7i9ZC+UNUOUw9hr+hGMMmdUkZ8DJmf7fh8ePHPN/02S+w/jeWV8/9AQCQ
RdbYDiH9UiC7y7dfpbqbnx+7VcH2n6zu6os/xq8Fc7uK2DZ+0C19EhUaRjYFRvJZ
r77R06ebAojqp7DCkeuTMPP9YsZ6fs5FXt3WVD+FL3gyoZMOjhQqiFHILux2Aamc
1lr4JTjSrxgWJCn6Xk49TDWnLEVl5K09MrEqrhilJmsHQDmOUWnU/PaTEPMc2zGl
dFsQCvjOsZFALHnVVXOq/o05Gd+0M/c80oM0DwZBT+xxAgMBAAE=
-----END PUBLIC KEY-----
It has the following long (16 bytes) and short (8 bytes) fingerprints:
854A1293B7E6A8AB8E031CF6C5BC0768
8E031CF6C5BC0768
You can download the RSA key or fetch it via the command-line:
curl -1sLf 'https://dl.getistio.io/public/rsa.8E031CF6C5BC0768.key'
Need Help?
If you couldn't find what you needed in our documentation, then you can always chat to a member of our team instead. It's our mission to be your dedicated off-site team for package management, and we mean it. Come and chat with us, anytime.
What's this page? All Cloudsmith repositories and packages are signed using GPG (or RSA) keys where supported. GPG (or RSA) signatures and checksums provide reliable mechanisms to ensure that the packages that you download/install are neither corrupt nor modified. GPG is generally preferred, but RSA is used for some package formats (such as Alpine). Learn more in the signing keys documentation.