Open-source universal artifact registry. Drop-in Artifactory/Nexus alternative with 40+ package formats, security scanning, WASM plugins, and edge replication. https://artifactkeeper.com
Find a file
Brandon Geraci e9d5c50524
Add OCI manifest DELETE handler (#769)
* feat: add OCI manifest DELETE handler

The OCI Distribution Spec requires DELETE /v2/{name}/manifests/{reference}
returning 202 Accepted. This was missing from the handler, causing
Docker/OCI clients to fail when deleting images.

The handler accepts both tag names and sha256 digests as the reference.
It removes all oci_tags rows for the digest and soft-deletes the
corresponding artifact record (is_deleted = true) so the manifest
no longer appears in tag listings or GET requests.

* ci: retry on clean runner
2026-04-16 21:53:24 -05:00
.assets feat(ci): Implement staged testing strategy with tiered CI/CD (#19) 2026-01-18 11:35:00 -06:00
.cargo fix: unblock v1.1.2 release (bergshamra revert + wasmtime 24.0.7) (#690) 2026-04-10 16:08:02 -05:00
.claude/agents chore: add testing infrastructure, agent definitions, and test plan (#216) 2026-02-18 18:27:43 -06:00
.github chore: use self-hosted runners (ak-ci-runners) for CI (#768) 2026-04-16 18:36:42 -05:00
.sqlx Add OCI manifest DELETE handler (#769) 2026-04-16 21:53:24 -05:00
.vex fix: address code scanning alerts #16 and #39 (#307) 2026-02-27 20:34:17 -06:00
backend Add OCI manifest DELETE handler (#769) 2026-04-16 21:53:24 -05:00
docker Bump grype from 0.110.0 to 0.111.0 in container images (#748) 2026-04-15 17:12:56 -05:00
docs chore: remove superpowers docs and add to .gitignore (#589) 2026-03-26 21:33:01 -05:00
scripts feat: add OCI tags/list and _catalog endpoints (#642) 2026-04-15 20:21:07 -05:00
.clippy.toml feat: implement indiana-jones artifact registry backend 2026-01-15 12:29:33 -05:00
.dockerignore fix: keep scripts/openscap-wrapper.py in Docker build context (#559) 2026-03-23 15:44:52 -05:00
.env.example feat: configurable password expiry notifications for local users (#727) 2026-04-16 14:31:11 -05:00
.env.local-dev fix: Resolve sqlx compile errors and add local-dev compose profile 2026-01-30 18:05:03 -06:00
.gitguardian.yaml test: push backend unit test coverage toward 80% (#153) 2026-02-14 10:20:52 -06:00
.gitignore chore: remove superpowers docs and add to .gitignore (#589) 2026-03-26 21:33:01 -05:00
.mergify.yml ci(mergify): upgrade configuration to current format (#615) 2026-04-01 06:27:37 -05:00
Cargo.lock chore: update rustls-webpki 0.103.10 -> 0.103.12 (RUSTSEC-2026-0098, RUSTSEC-2026-0099) 2026-04-15 09:20:21 -05:00
Cargo.toml feat: add SMTP email delivery service (#681) (#718) 2026-04-12 19:51:21 -05:00
CHANGELOG.md fix: unblock v1.1.2 release (bergshamra revert + wasmtime 24.0.7) (#690) 2026-04-10 16:08:02 -05:00
CLAUDE.md docs: add shallow clone pattern and pre-push checklist to CLAUDE.md 2026-04-12 15:35:01 -05:00
CODE_OF_CONDUCT.md chore: Add CONTRIBUTING.md, CODE_OF_CONDUCT.md, and clean up repo 2026-02-04 09:10:13 -06:00
CONTRIBUTING.md docs: update clippy command to match CI (--all-targets -D warnings) (#572) 2026-03-25 15:34:31 -05:00
docker-compose.e2e-syspkg.yml feat: Add system package E2E tests with native Docker containers 2026-01-30 22:31:21 -06:00
docker-compose.local-dev.yml fix: pin Trivy image to 0.69.3 from GHCR (#585) (#597) 2026-03-28 13:56:53 -05:00
docker-compose.mesh-e2e.yml fix: replace insecure default passwords in E2E test scripts (#639) 2026-04-02 10:53:52 -05:00
docker-compose.s3-maven-test.yml fix: enable fail-on-err for S3 storage to surface error details (#361) (#528) 2026-03-23 06:29:46 -05:00
docker-compose.test.yml fix: replace insecure default passwords in E2E test scripts (#639) 2026-04-02 10:53:52 -05:00
docker-compose.yml fix: pin Trivy image to 0.69.3 from GHCR (#585) (#597) 2026-03-28 13:56:53 -05:00
LICENSE chore: Change license from Apache-2.0 to MIT 2026-01-30 15:32:24 -06:00
README.md docs: add Sponsors section to README with Backer tier supporters (#620) 2026-04-01 07:44:19 -05:00
REDTEAM.md feat: Add red team security testing suite (#52) 2026-02-06 21:04:09 -06:00
rustfmt.toml feat: implement indiana-jones artifact registry backend 2026-01-15 12:29:33 -05:00
SECURITY.md docs: add SECURITY.md with vulnerability reporting policy 2026-02-13 21:07:38 -06:00
SETUP-CI.md chore: Add launch epic, CI setup guide, and housekeeping checklist 2026-02-03 14:39:58 -06:00
sonar-project.properties feat: quality of life improvements (9 features) (#298) 2026-02-28 09:07:30 -06:00
TESTING.md chore: Remove frontend references from CI, deploy configs, and docs 2026-02-02 19:27:46 -06:00

Artifact Keeper

CI Quality Gate Security Rating Vulnerabilities Lines of Code License Rust Docker Sponsor

An enterprise-grade, open-source artifact registry supporting 45+ package formats. Built with Rust.

Documentation | Demo | Website

Highlights

  • 45+ Package Formats - Native protocol support for Maven, PyPI, NPM, Docker/OCI, Cargo, Go, Helm, and 38 more
  • WASM Plugin System - Extend with custom format handlers via WebAssembly (WIT-based, Wasmtime runtime)
  • Security Scanning - Automated vulnerability detection with Trivy and Grype, policy engine, quarantine workflow
  • Hardened Containers - All images built on DISA STIG-approved Red Hat UBI 9 base images, non-root execution, no shell or package manager in runtime
  • Borg Replication - Recursive peer mesh with swarm-based artifact distribution and P2P transfers
  • Full-Text Search - Meilisearch-powered search across all repositories and artifacts
  • Multi-Auth - JWT, OpenID Connect, LDAP, SAML 2.0, and API token support
  • Artifactory Migration - Built-in tooling to migrate repositories, artifacts, and permissions from JFrog Artifactory
  • Artifact Signing - GPG and RSA signing integrated into Debian, RPM, Alpine, and Conda handlers

System Architecture

graph LR
    Client["CLI / Package Manager / Frontend"]
    Backend["Backend<br/>Rust · Axum<br/>45+ format handlers"]
    DB[(PostgreSQL 16)]
    Storage["Storage<br/>Filesystem / S3"]
    Meili["Meilisearch<br/>Full-text search"]
    Trivy["Trivy<br/>Container & FS scanning"]
    Grype["Grype<br/>Dependency scanning"]
    OpenSCAP["OpenSCAP<br/>Compliance scanning"]
    Peer1["Peer Instance"]
    Peer2["Peer Instance"]

    Client --> Backend
    Backend --> DB
    Backend --> Storage
    Backend --> Meili
    Backend --> Trivy
    Backend --> Grype
    Backend --> OpenSCAP
    Backend <-->|Borg Replication| Peer1
    Backend <-->|Borg Replication| Peer2
    Peer1 <-->|P2P Mesh| Peer2

Backend Architecture

The backend follows a layered architecture with a middleware pipeline processing every request.

flowchart TD
    REQ["HTTP Request"] --> MW["Middleware Pipeline"]

    subgraph MW["Middleware"]
        direction LR
        CORS["CORS"] --> AUTH["Auth<br/>JWT · OIDC · LDAP<br/>SAML · API Key"]
        AUTH --> RL["Rate Limiter"]
        RL --> TRACE["Tracing<br/>+ Metrics"]
        TRACE --> DEMO["Demo Mode<br/>Guard"]
    end

    MW --> ROUTER["Router<br/>50+ route groups"]

    subgraph HANDLERS["Handler Layer"]
        FMT["Format Handlers<br/>Maven · PyPI · NPM<br/>Docker · 41 more"]
        CORE["Core Handlers<br/>Repos · Artifacts<br/>Users · Auth"]
        ADV["Advanced Handlers<br/>Security · Plugins<br/>Peers · Migration"]
    end

    ROUTER --> HANDLERS

    subgraph SERVICES["Service Layer"]
        direction LR
        ART["Artifact<br/>Service"]
        REPO["Repository<br/>Service"]
        SCAN["Scanner<br/>Service"]
        PLUG["Plugin<br/>Service"]
        SEARCH["Search<br/>Service"]
    end

    HANDLERS --> SERVICES

    subgraph DATA["Data Layer"]
        direction LR
        PG[(PostgreSQL)]
        FS["Storage<br/>FS / S3"]
        MS["Meilisearch"]
        SC["Trivy / Grype / OpenSCAP"]
    end

    SERVICES --> DATA

Supported Package Formats

45+ formats organized by ecosystem. Each has a native protocol handler that speaks the package manager's wire protocol.

Languages & Runtimes

Format Aliases Ecosystem
Maven Gradle Java, Kotlin, Scala
NPM Yarn, Bower, pnpm JavaScript, TypeScript
PyPI Poetry, Conda Python
NuGet Chocolatey, PowerShell .NET, C#
Cargo Rust
Go Go modules
RubyGems Ruby
Hex Elixir, Erlang
Composer PHP
Pub Dart, Flutter
CocoaPods iOS, macOS
Swift Swift Package Manager
CRAN R
SBT Ivy Scala, Java

Containers & Infrastructure

Format Aliases Ecosystem
Docker / OCI Podman, Buildx, ORAS, WASM OCI, Helm OCI Container images
Helm Kubernetes charts
Terraform OpenTofu Infrastructure modules
Vagrant VM boxes

System Packages

Format Ecosystem
RPM RHEL, Fedora, CentOS
Debian Ubuntu, Debian
Alpine Alpine Linux (APK)
Conda Conda channels
OPKG OpenWrt, embedded Linux

Configuration Management

Format Ecosystem
Chef Chef Supermarket
Puppet Puppet Forge
Ansible Ansible Galaxy

ML / AI

Format Ecosystem
HuggingFace Models, datasets
ML Model Generic ML artifacts

Editor Extensions

Format Aliases Ecosystem
VS Code Extension marketplace (VS Code, Cursor, Windsurf, Kiro)
JetBrains Plugin repository

Schemas

Format Ecosystem
Protobuf / BSR Buf Schema Registry, Connect RPC

Other

Format Ecosystem
Conan C, C++
Git LFS Large file storage
Bazel Bazel modules
P2 Eclipse plugins
Generic Any file type

Custom formats can be added via the WASM plugin system.

Security Scanning Pipeline

Every artifact upload is automatically scanned for known vulnerabilities.

flowchart LR
    UP["Artifact<br/>Upload"] --> HASH{"SHA-256<br/>Dedup"}
    HASH -->|New artifact| T["Trivy<br/>FS Scanner"]
    HASH -->|New artifact| G["Grype<br/>Dependency Scanner"]
    HASH -->|Already scanned| CACHE["Cached<br/>Results"]
    T --> SCORE["Vulnerability<br/>Score A-F"]
    G --> SCORE
    CACHE --> SCORE
    SCORE --> POL{"Policy<br/>Engine"}
    POL -->|Pass| OK["Stored"]
    POL -->|Fail| Q["Quarantined"]
  • Dual scanner - Trivy for filesystem/container analysis, Grype for dependency trees
  • Scoring - A through F grades based on finding severity and count
  • Policies - Configurable rules that block or quarantine artifacts
  • Signing - GPG/RSA signing for Debian, RPM, Alpine, and Conda packages

Borg Replication

Recursive peer-to-peer replication where every node is a full Artifact Keeper instance. No thin caches — each peer runs the same stack and can serve as an origin for other peers.

graph TD
    P1["Peer<br/>US-West"]
    P2["Peer<br/>EU-Central"]
    P3["Peer<br/>AP-Southeast"]
    P4["Peer<br/>US-East"]

    P1 <-->|"Chunked Transfer"| P2
    P1 <-->|"Chunked Transfer"| P4
    P2 <-->|"Chunked Transfer"| P3
    P3 <-->|"Chunked Transfer"| P4
    P1 <-->|"P2P Mesh"| P3
    P2 <-->|"P2P Mesh"| P4
  • Recursive peers - Every peer is a full instance (backend, DB, storage) that can originate replication to other peers
  • Swarm-based distribution - Artifacts replicate across the mesh based on demand
  • Chunked transfers - Large artifacts split for reliable delivery over unstable links
  • Network-aware scheduling - Bandwidth and latency profiling for optimal routing

WASM Plugin System

Extend Artifact Keeper with custom format handlers compiled to WebAssembly.

  • WIT-based interface - Plugins implement a well-defined FormatHandler contract
  • Wasmtime runtime - Sandboxed execution with fuel-based CPU limits and memory caps
  • Hot reload - Install, enable, disable, and reload plugins without restart
  • Sources - Load from Git repositories or ZIP uploads

Quick Start

Get running in 5 minutes with Docker Compose: Quickstart Guide

Documentation

Project Structure

artifact-keeper/
├── backend/          # Rust backend (Axum, SQLx, 6,400+ unit tests)
│   ├── src/
│   │   ├── api/      # Handlers, middleware, routes
│   │   ├── formats/  # 45+ format handler implementations
│   │   ├── services/ # Business logic (68 services)
│   │   ├── models/   # Data models (21 types)
│   │   └── storage/  # FS and S3 backends
│   └── migrations/   # 69 PostgreSQL migrations
├── edge/             # Peer replication service (Rust)
├── scripts/          # Test runners, native client tests, stress tests
└── .github/          # CI/CD workflows

Technology Choices

Layer Choice Why
Backend language Rust Memory safety, performance, strong type system
Web framework Axum Tower middleware ecosystem, async-first
Database PostgreSQL 16 JSONB for metadata, mature ecosystem
Search Meilisearch Fast full-text search, easy to operate
Security scanning Trivy + Grype + OpenSCAP Complementary coverage, industry standard
Plugin runtime Wasmtime Sandboxed, portable, WIT contract system
Storage Filesystem / S3 Simple default, cloud-ready upgrade path

CI/CD Pipeline

Seven GitHub Actions workflows handle testing, publishing, and deployment.

flowchart TD
    subgraph TRIGGER["Triggers"]
        PUSH["Push / PR<br/>to main"]
        TAG["Tag v*"]
        CRON["Daily 2 AM UTC"]
        SITE_PUSH["Push to site/**"]
    end

    subgraph CI["ci.yml — Every Push/PR"]
        direction TB
        LINT["🦀 Lint Rust<br/>fmt + clippy"]
        UNIT["🧪 Unit Tests<br/>cargo test --lib"]
        INTEG["🔗 Integration Tests<br/>+ PostgreSQL<br/>(main push only)"]
        SMOKE["🔥 Smoke E2E<br/>PyPI · npm · Cargo<br/>docker-compose.test.yml"]
        AUDIT["🔒 Security Audit<br/>cargo audit"]
        CI_OK["✅ CI Complete"]

        LINT --> UNIT
        LINT --> INTEG
        UNIT --> SMOKE
        SMOKE --> CI_OK
        AUDIT --> CI_OK
    end

    subgraph DOCKER["docker-publish.yml — Push to main / tags"]
        direction TB
        BE_BUILD["Backend<br/>amd64 + arm64"]
        OS_BUILD["OpenSCAP<br/>amd64 + arm64"]
        BE_MERGE["Multi-Arch<br/>Manifest"]
        OS_MERGE["Multi-Arch<br/>Manifest"]

        BE_BUILD --> BE_MERGE
        OS_BUILD --> OS_MERGE
    end

    subgraph E2E["e2e.yml — Manual / called by release"]
        direction TB
        PKI["🔐 Setup PKI<br/>TLS + GPG"]
        NATIVE["📦 Native Client Tests<br/>10 formats"]
        STRESS["🔥 Stress Tests<br/>100 concurrent uploads"]
        FAILURE["💥 Failure Tests<br/>crash · db · storage"]

        PKI --> NATIVE
        NATIVE --> STRESS
        NATIVE --> FAILURE
    end

    subgraph RELEASE["release.yml — Tags v*"]
        direction TB
        E2E_GATE["🚦 E2E Gate<br/>all formats + stress + failure"]
        BINARIES["📦 Build Binaries<br/>linux + macOS<br/>amd64 + arm64"]
        GH_RELEASE["🚀 GitHub Release<br/>binaries + checksums"]

        E2E_GATE --> BINARIES
        BINARIES --> GH_RELEASE
    end

    subgraph NIGHTLY["scheduled-tests.yml — Daily"]
        direction TB
        NIGHTLY_E2E["🌙 Nightly Smoke E2E"]
        DEP_CHECK["🔍 Dependency Check"]
        SEC_SCAN["🔒 Security Scan"]
    end

    subgraph SITE["site.yml"]
        PAGES["📄 Build + Deploy<br/>GitHub Pages"]
    end

    subgraph AMI["ami-build.yml"]
        PACKER["🖥️ Packer Build AMI"]
    end

    PUSH --> CI
    PUSH --> DOCKER
    TAG --> RELEASE
    TAG --> DOCKER
    CRON --> NIGHTLY
    SITE_PUSH --> SITE
    GH_RELEASE -.->|"on release published"| AMI

    classDef trigger fill:#6f42c1,color:#fff,stroke:#6f42c1
    classDef ci fill:#2ea44f,color:#fff,stroke:#2ea44f
    classDef docker fill:#0969da,color:#fff,stroke:#0969da
    classDef release fill:#d97706,color:#fff,stroke:#d97706

    class PUSH,TAG,CRON,SITE_PUSH trigger
    class LINT,UNIT,INTEG,SMOKE,AUDIT,CI_OK ci
    class BE_BUILD,OS_BUILD,BE_MERGE,OS_MERGE docker
    class E2E_GATE,BINARIES,GH_RELEASE release
Workflow Trigger What It Does
ci.yml Every push/PR Lint, unit tests, integration tests, smoke E2E (PyPI, npm, Cargo)
docker-publish.yml Push to main, tags Multi-arch Docker images (backend + OpenSCAP) to ghcr.io
e2e.yml Manual or called by release Full E2E: 10 native client formats, stress, failure injection
release.yml Tags v* E2E gate, cross-platform binaries, GitHub Release
scheduled-tests.yml Daily 2 AM UTC Nightly smoke E2E, dependency check, security scan
site.yml Push to site/** Build and deploy docs to GitHub Pages
ami-build.yml On release published Bake AWS AMI with Packer

Sponsors

Thank you to our sponsors for supporting ongoing development of Artifact Keeper.

Backers


Ash A.

Gabriel Rodriguez

Become a sponsor to support the project and get your name listed here.

Contributing

We welcome contributions! See CONTRIBUTING.md for guidelines.

Have questions or ideas? Join the conversation in GitHub Discussions.

License

MIT License - see LICENSE for details.


Built with Rust. "JFrog" and "Artifactory" are trademarks of JFrog Ltd. Artifact Keeper is not affiliated with or endorsed by JFrog.