Skip to content
Authorization service and frontend for Docker registry (v2)
Branch: master
Clone or download
mssola Merge pull request #2189 from mssola/update-packaging-templates
packaging/suse: updated the templates for the release script
Latest commit a1b9f2e May 2, 2019
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
.github github: add documentation in the exemptLabels Sep 3, 2018
app db: changed tag size column type to bigint Mar 15, 2019
bin ci: separate unit and integration tests Jan 22, 2019
config Add OpenID Connect auth. (#2154) Feb 20, 2019
db db: changed tag size column type to bigint Mar 15, 2019
doc doc: updated image from erd Jan 16, 2019
docker Upgraded to ruby 2.5.3 Feb 8, 2019
examples examples/compose: added clarification on volumes Jan 21, 2019
lib Fixed tests Feb 22, 2019
packaging/suse packaging/suse: updated the templates for the release script May 2, 2019
public change the default robots.txt so that Portus cannot be crawled by search Feb 15, 2018
spec db: changed tag size column type to bigint Mar 15, 2019
vendor/assets ui: improved sidebar highlight Jan 22, 2019
.babelrc js: upgraded dev packages Jul 17, 2018
.dockerignore ldap: added support for groupOfNames and tests Jan 11, 2019
.editorconfig added .editorconfig Mar 5, 2017
.env Added an examples directory Jul 10, 2017
.erdconfig Integrated rails-erd into development Apr 11, 2016
.eslintignore Moved from Coffeescript to Javascript Feb 26, 2017
.eslintrc Introducing Vue.js for the frontend Jul 18, 2017
.gitignore Upgrade to Rails 5 Nov 8, 2018
.rspec Added the .rspec file Jun 15, 2015
.rubocop.yml rubocop: updated gem and some cops Dec 27, 2018
.ruby-version Upgrade to ruby 2.6.2 Apr 11, 2019
.travis.yml ci: use a more specific ruby version Apr 12, 2019
CHANGELOG.md Update changelog and README Jan 17, 2019
CONTRIBUTING.md github: added templates for issues and PRs Feb 20, 2018
Dockerfile Fixed Dockerfile for development Feb 13, 2019
Gemfile Add OpenID Connect auth. (#2154) Feb 20, 2019
Gemfile.lock Updated gems Apr 18, 2019
Guardfile rubocop: bring it closer to upstream Dec 12, 2017
LICENSE Add licensing details Apr 22, 2015
README.md Update README with the latest stable release Mar 19, 2019
Rakefile Updated rubocop to 0.53.0 Mar 13, 2018
VERSION Preparing for the next version Oct 2, 2018
Vagrantfile Upgrade to Rails 5 Nov 8, 2018
config.ru rubocop: bring it closer to upstream Dec 12, 2017
docker-compose.yml dev: update the webpack image to be used Jul 20, 2018
package.json ui: improved namespace transfer workflow Nov 30, 2018
yarn.lock ui: improved namespace transfer workflow Nov 30, 2018

README.md

Portus

Portus is an authorization server and a user interface for the next generation of the Docker registry. Portus targets version 2 of the Docker Registry API. The minimum required version of Registry is 2.1, which is the first version supporting soft deletes of blobs.

master v2.4 Code Climate
Build Status Build Status Code Climate Test Coverage

Features

Fine-grained control of permissions

Portus supports the concept of users and teams. Users have their own personal Docker namespace where they have both read (aka docker pull) and write (aka docker push) access. A team is a group of users that have read and write access to a certain namespace. You can read more about this in our documentation page about it.

Portus implements the token based authentication system described by the new version of the Docker registry. This can be used to have full control over the images served by an instance of the Docker registry.

Web interface for Docker registry

Portus provides quick access to all the images available on your private instance of Docker registry. User's privileges are taken into account to make sure private images (the ones requiring special rights also for docker pull) are not shown to unauthorized personnel.

Self-hosted

Portus allows you to host everything on your servers, on your own infrastructure. You don't have to trust a third-party service, just own everything yourself. Take a look at our documentation to read the different setups in which you can deploy Portus.

And more!

Some highlights:

Take a tour by our documentation site to read more about this.

Contributing

There are multiple ways of setting up a development environment. We recommend using docker-compose, so you only need to perform:

$ docker-compose up

You can read more about this environment here.

Also, make sure to understand our contribution guidelines, as explained in this document.

Testing

Unit tests

Unit tests are located in the spec directory. To run them, simply:

$ bundle exec rspec spec

Make sure to install phantomjs from your Linux distribution before running unit tests, since feature tests rely on PhantomJS being installed. All the other ruby dependencies are already covered by our Gemfile.

We also have tests in the frontend. For this, you have to install yarn from your Linux distribution and run:

$ yarn test

Integration tests

Check this document in order to better understand how integration tests work. For development, though, if you have already installed Docker, docker-composer and bats, running the following should just work:

$ chmod +x bin/test-integration.sh
$ ./bin/test-integration.sh

Other checks

A common pitfall for developers is to forget about code style. For that, make sure to run rubocop:

$ bundle exec rubocop -a

Note that the command above includes the -a flag. This flag will automatically fix small issues for you. We also run a code style check for the frontend code:

$ yarn eslint

We also run brakeman in order to detect security vulnerabilities:

$ bundle exec brakeman

Last but not least, make sure that your git commit follows a proper style. To ensure this, you can run the following task:

$ bundle exec rake test:git

Continuous Integration

We use Travis CI for continuous integration. You can run what we run in Travis locally:

$ chmod +x bin/ci/run.sh
$ ./bin/ci/run.sh

This script simply executes all the tests and checks that we have presented above.

Licensing

Portus is licensed under the Apache License, Version 2.0. See LICENSE for the full license text.

You can’t perform that action at this time.