# zot [![Build Status](https://travis-ci.org/anuvu/zot.svg?branch=master)](https://travis-ci.org/anuvu/zot) [![codecov.io](http://codecov.io/github/anuvu/zot/coverage.svg?branch=master)](http://codecov.io/github/anuvu/zot?branch=master) **zot** is a vendor-neutral OCI image repository server purely based on [OCI Distribution Specification](https://github.com/opencontainers/distribution-spec). * Conforms to [OCI distribution spec](https://github.com/opencontainers/distribution-spec) APIs * Uses [OCI storage layout](https://github.com/opencontainers/image-spec/blob/master/image-layout.md) for storage layout * TLS support * Authentication via TLS mutual authentication and HTTP *BASIC* (local _htpasswd_ and LDAP) * Doesn't require _root_ privileges * Swagger based documentation * Can run compliance checks against registries * Released under Apache 2.0 License * ```go get -u github.com/anuvu/zot/cmd/zot``` # Presentations * [OCI Weekly Discussion - Oct 2, 2019](https://hackmd.io/El8Dd2xrTlCaCG59ns5cwg#October-2-2019) # Build and install binary (using host's toolchain) ``` go get -u github.com/anuvu/zot/cmd/zot ``` # Full CI/CD Build * Build inside a container (preferred) ``` make binary-container ``` * Alternatively, build inside a container using [stacker](https://github.com/anuvu/stacker) (preferred) ``` make binary-stacker ``` * Build using host's toolchain ``` make ``` Build artifacts are in bin/ # Serving ``` bin/zot serve _config-file_ ``` Examples of config files are available in [examples/](examples/) dir. # Compliance checks ``` bin/zot compliance -H hostIP -P port [-V "all"] [--json] ``` Compliance is important for the following reasons: 1. A standards-based client code can be implemented that can then interact with compliant registries. 2. Customers benefit from the ability to move and locate their images across compliant registries. ## Methodology * A _positive_ compliance means the registry is compliant and meaningful work can be accomplished when interacting with that registry. * A _negative_ compliance means the registry is compliant, however, it only returns errors that are compliant and no meaningful work can be performed when interacting with that registry. The focus of compliance tests is _positive_ compliance. ## Compliance Reports Registry | Notes ---------|------ zot | docker | quay | TBD # Ecosystem ## skopeo [skopeo](https://github.com/containers/skopeo) is a tool to work with remote image repositories. We have a [patched version](https://github.com/anuvu/skopeo) available that works with _zot_. ``` git clone https://github.com/anuvu/skopeo cd skopeo make GO111MODULE=on binary-local ``` ## cri-o [cri-o](https://github.com/cri-o/cri-o) is a OCI-based Kubernetes container runtime interface. We have a [patched version](https://github.com/anuvu/image) of containers/image available that works with _zot_ which must be linked with cri-o. ``` git clone https://github.com/cri-o/cri-o cd cri-o echo 'replace github.com/containers/image => github.com/anuvu/image v1.5.2-0.20190827234748-f71edca6153a' >> go.mod make bin/crio crio.conf GO111MODULE=on ``` # Caveats * go 1.12+ * The OCI distribution spec is still WIP, and we try to keep up