The Docker Registry is available on Cyberwave Enterprise plans. Contact us at info@cyberwave.com to enable it for your organization.
Cyberwave hosts a private Docker registry at registry.cyberwave.com. You use it to store and distribute the container images that run on your robots and cloud nodes — drivers, ML models, custom ROS packages, and anything else your edge devices need.Authentication uses the same CYBERWAVE_API_KEY you already use for the REST API and MQTT. Your workspace role determines what you can do:
Workspace role
Registry access
READER
Pull images
WRITER
Pull and push images
ADMIN
Pull, push, and delete images
OWNER
Full access
There are no separate registry passwords. The same API key and workspace membership that govern REST and MQTT access also govern registry access.
docker login <server> targets that specific registry, not Docker Hub. Credentials are cached locally until they expire or you run docker logout registry.cyberwave.com.
If you have access, the pull succeeds. If not, it fails with 403 — the same behavior as trying to access a REST endpoint or MQTT topic without the right role.
If the credential helper is configured, no separate login step is needed. The Cyberwave Token Service validates your API key, checks your workspace role, and authorizes the push.
Version tags (e.g. v1.2.3) are immutable — once pushed, they cannot be overwritten. Use mutable tags like dev or latest during development.
Edge Core pulls the image automatically when the twin connects. If the image is private, the edge device authenticates using the API key configured during device setup.
The token service is a standard Docker Registry v2 token endpoint backed by the Cyberwave auth and ACL system. Harbor handles image storage, vulnerability scanning, replication, and retention policies.