{"id":38018717,"url":"https://github.com/bloodorangeio/reggie","last_synced_at":"2026-01-16T19:27:12.658Z","repository":{"id":45270696,"uuid":"228914702","full_name":"bloodorangeio/reggie","owner":"bloodorangeio","description":"Simple Go HTTP client for OCI Distribution, built on top of Resty","archived":false,"fork":false,"pushed_at":"2023-07-18T16:19:17.000Z","size":90,"stargazers_count":24,"open_issues_count":1,"forks_count":6,"subscribers_count":2,"default_branch":"main","last_synced_at":"2024-06-19T00:33:12.584Z","etag":null,"topics":["client","docker","docker-registry","go","golang","http","oci","opencontainers","registry","resty"],"latest_commit_sha":null,"homepage":"","language":"Go","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"apache-2.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/bloodorangeio.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2019-12-18T20:16:15.000Z","updated_at":"2024-02-16T00:11:05.000Z","dependencies_parsed_at":"2024-06-19T00:16:13.107Z","dependency_job_id":"153800f0-ff9e-4270-a731-ad829daca3ae","html_url":"https://github.com/bloodorangeio/reggie","commit_stats":null,"previous_names":[],"tags_count":13,"template":false,"template_full_name":null,"purl":"pkg:github/bloodorangeio/reggie","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/bloodorangeio%2Freggie","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/bloodorangeio%2Freggie/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/bloodorangeio%2Freggie/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/bloodorangeio%2Freggie/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/bloodorangeio","download_url":"https://codeload.github.com/bloodorangeio/reggie/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/bloodorangeio%2Freggie/sbom","scorecard":{"id":243966,"data":{"date":"2025-08-11","repo":{"name":"github.com/bloodorangeio/reggie","commit":"a277a9357ad144a16a6dc34ea422b6f94c7c62b1"},"scorecard":{"version":"v5.2.1-40-gf6ed084d","commit":"f6ed084d17c9236477efd66e5b258b9d4cc7b389"},"score":4.7,"checks":[{"name":"Code-Review","score":5,"reason":"Found 11/19 approved changesets -- score normalized to 5","details":null,"documentation":{"short":"Determines if the project requires human code review before pull requests (aka merge requests) are merged.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#code-review"}},{"name":"Binary-Artifacts","score":10,"reason":"no binaries found in the repo","details":null,"documentation":{"short":"Determines if the project has generated executable (binary) artifacts in the source repository.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#binary-artifacts"}},{"name":"Packaging","score":-1,"reason":"packaging workflow not detected","details":["Warn: no GitHub/GitLab publishing workflow detected."],"documentation":{"short":"Determines if the project is published as a package that others can easily download, install, easily update, and uninstall.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#packaging"}},{"name":"Maintained","score":0,"reason":"0 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0","details":null,"documentation":{"short":"Determines if the project is \"actively maintained\".","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#maintained"}},{"name":"Token-Permissions","score":0,"reason":"detected GitHub workflow tokens with excessive permissions","details":["Warn: no topLevel permission defined: .github/workflows/build-pr.yml:1","Warn: no topLevel permission defined: .github/workflows/build.yml:1","Info: no jobLevel write permissions found"],"documentation":{"short":"Determines if the project's workflows follow the principle of least privilege.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#token-permissions"}},{"name":"Dangerous-Workflow","score":10,"reason":"no dangerous workflow patterns detected","details":null,"documentation":{"short":"Determines if the project's GitHub Action workflows avoid dangerous patterns.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#dangerous-workflow"}},{"name":"Pinned-Dependencies","score":10,"reason":"all dependencies are pinned","details":["Info:   6 out of   6 GitHub-owned GitHubAction dependencies pinned"],"documentation":{"short":"Determines if the project has declared and pinned the dependencies of its build process.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#pinned-dependencies"}},{"name":"CII-Best-Practices","score":0,"reason":"no effort to earn an OpenSSF best practices badge detected","details":null,"documentation":{"short":"Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#cii-best-practices"}},{"name":"Fuzzing","score":0,"reason":"project is not fuzzed","details":["Warn: no fuzzer integrations found"],"documentation":{"short":"Determines if the project uses fuzzing.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#fuzzing"}},{"name":"License","score":10,"reason":"license file detected","details":["Info: project has a license file: LICENSE:0","Info: FSF or OSI recognized license: Apache License 2.0: LICENSE:0"],"documentation":{"short":"Determines if the project has defined a license.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#license"}},{"name":"Signed-Releases","score":-1,"reason":"no releases found","details":null,"documentation":{"short":"Determines if the project cryptographically signs release artifacts.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#signed-releases"}},{"name":"Branch-Protection","score":-1,"reason":"internal error: error during branchesHandler.setup: internal error: githubv4.Query: Resource not accessible by integration","details":null,"documentation":{"short":"Determines if the default and release branches are protected with GitHub's branch protection settings.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#branch-protection"}},{"name":"Security-Policy","score":10,"reason":"security policy file detected","details":["Info: security policy file detected: github.com/bloodorangeio/.github/SECURITY.md:1","Info: Found linked content: github.com/bloodorangeio/.github/SECURITY.md:1","Info: Found disclosure, vulnerability, and/or timelines in security policy: github.com/bloodorangeio/.github/SECURITY.md:1","Info: Found text in security policy: github.com/bloodorangeio/.github/SECURITY.md:1"],"documentation":{"short":"Determines if the project has published a security policy.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#security-policy"}},{"name":"Vulnerabilities","score":0,"reason":"11 existing vulnerabilities detected","details":["Warn: Project is vulnerable to: GO-2022-0288","Warn: Project is vulnerable to: GO-2022-0969 / GHSA-69cg-p879-7622","Warn: Project is vulnerable to: GO-2022-1144 / GHSA-xrjj-mj9h-534m","Warn: Project is vulnerable to: GO-2023-1571 / GHSA-vvpx-j8f3-3w6h","Warn: Project is vulnerable to: GO-2023-1988 / GHSA-2wrh-6pvc-2jm9","Warn: Project is vulnerable to: GO-2023-2102 / GHSA-4374-p667-p6c8","Warn: Project is vulnerable to: GHSA-qppj-fm5r-hxr3","Warn: Project is vulnerable to: GO-2024-2687 / GHSA-4v7x-pqxf-cx7m","Warn: Project is vulnerable to: GO-2024-3333","Warn: Project is vulnerable to: GO-2025-3503 / GHSA-qxp5-gwg8-xv66","Warn: Project is vulnerable to: GO-2025-3595 / GHSA-vvgc-356p-c3xw"],"documentation":{"short":"Determines if the project has open, known unfixed vulnerabilities.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#vulnerabilities"}},{"name":"SAST","score":0,"reason":"SAST tool is not run on all commits -- score normalized to 0","details":["Warn: 0 commits out of 23 are checked with a SAST tool"],"documentation":{"short":"Determines if the project uses static code analysis.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#sast"}}]},"last_synced_at":"2025-08-17T07:10:41.469Z","repository_id":45270696,"created_at":"2025-08-17T07:10:41.469Z","updated_at":"2025-08-17T07:10:41.469Z"},"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":28481694,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-01-16T11:59:17.896Z","status":"ssl_error","status_checked_at":"2026-01-16T11:55:55.838Z","response_time":107,"last_error":"SSL_read: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["client","docker","docker-registry","go","golang","http","oci","opencontainers","registry","resty"],"created_at":"2026-01-16T19:27:11.709Z","updated_at":"2026-01-16T19:27:12.651Z","avatar_url":"https://github.com/bloodorangeio.png","language":"Go","readme":"# Reggie\n\n[![GitHub Actions status](https://github.com/bloodorangeio/reggie/workflows/build/badge.svg)](https://github.com/bloodorangeio/reggie/actions?query=workflow%3Abuild) [![GoDoc](https://godoc.org/github.com/bloodorangeio/reggie?status.svg)](https://godoc.org/github.com/bloodorangeio/reggie)\n\n![](https://raw.githubusercontent.com/bloodorangeio/reggie/master/reggie.png)\n\nReggie is a dead simple Go HTTP client designed to be used against [OCI Distribution](https://github.com/opencontainers/distribution-spec), built on top of [Resty](https://github.com/go-resty/resty).\n\nThere is also built-in support for both basic auth and \"Docker-style\" token auth.\n\n*Note: Authentication/authorization is not part of the distribution spec, but it has been implemented similarly across registry providers targeting the Docker client.*\n\n## Getting Started\n\nFirst import the library:\n```go\nimport \"github.com/bloodorangeio/reggie\"\n```\n\nThen construct a client:\n\n```go\nclient, err := reggie.NewClient(\"http://localhost:5000\")\n```\n\nYou may also construct the client with a number of options related to authentication, etc:\n\n```go\nclient, err := reggie.NewClient(\"https://r.mysite.io\",\n    reggie.WithUsernamePassword(\"myuser\", \"mypass\"),  // registry credentials\n    reggie.WIthDefaultName(\"myorg/myrepo\"),           // default repo name\n    reggie.WithInsecureSkipTLSVerify(true),           // skip TLS verification\n    reggie.WithDebug(true))                           // enable debug logging\n```\n\n## Making Requests\n\nReggie uses a domain-specific language to supply various parts of the URI path in order to provide visual parity with [the spec](https://github.com/opencontainers/distribution-spec/blob/master/spec.md).\n\nFor example, to list all tags for the repo `megacorp/superapp`, you might do the following:\n\n```go\nreq := client.NewRequest(reggie.GET, \"/v2/\u003cname\u003e/tags/list\",\n    reggie.WithName(\"megacorp/superapp\"))\n```\n\nThis will result in a request object built for `GET /v2/megacorp/superapp/tags/list`.\n\nFinally, execute the request, which will return a response object:\n```go\nresp, err := client.Do(req)\nfmt.Println(\"Status Code:\", resp.StatusCode())\n```\n\n## Path Substitutions\n\nBelow is a table of all of the possible URI parameter substitutions and associated methods:\n\n\n| URI Parameter | Description | Option method |\n|-|-|-|\n| `\u003cname\u003e` | Namespace of a repository within a registry | `WithDefaultName` (`Client`) or\u003cbr\u003e`WithName` (`Request`) |\n| `\u003cdigest\u003e` | Content-addressable identifier | `WithDigest` (`Request`) |\n| `\u003creference\u003e` | Tag or digest | `WithReference` (`Request`) |\n| `\u003csession_id\u003e` | Session ID for upload | `WithSessionID` (`Request`) |\n\n## Auth\n\nAll requests are first attempted without any authentication. If an endpoint returns a `401 Unauthorized`, and the client has been constructed with a username and password (via `reggie.WithUsernamePassword`), the request is retried with an `Authorization` header.\n\nIncluded in the 401 response, registries should return a `Www-Authenticate` header describing how to to authenticate.\n\nFor more info about the `Www-Authenticate` header and general HTTP auth topics, please see IETF RFCs [7235](https://tools.ietf.org/html/rfc7235) and [6749](https://tools.ietf.org/html/rfc6749).\n\n### Basic Auth\n\n If the `Www-Authenticate` header contains the string \"Basic\", then the header used in the retried request will be formatted as `Authorization: Basic \u003ccredentials\u003e`, where credentials is the base64 encoding of the username and password joined by a single colon.\n\n### \"Docker-style\" Token Auth\n*Note: most commercial registries use this method.*\n\nIf the`Www-Authenticate` contains the string \"Bearer\", an attempt is made to retrieve a token from an authorization service endpoint, the URL of which should be provided in the `Realm` field of the header. The header then used in the retried request will be formatted as `Authorization: Bearer \u003ctoken\u003e`, where token is the one returned from the token endpoint.\n\nHere is a visual of this auth flow copied from the [Docker docs](https://docs.docker.com/registry/spec/auth/token/):\n\n![](./v2-registry-auth.png)\n\n#### Custom Auth Scope\n\n It may be necessary to override the `scope` obtained from the `Www-Authenticate` header in the registry's response. This can be done on the client level:\n\n ```\nclient, err := reggie.NewClient(\"http://localhost:5000\",\n    reggie.WithAuthScope(\"repository:mystuff/myrepo:pull,push\"))\n ```\n\n## Other Features\n\n### Method Chaining\n\nEach of the types provided by this package (`Client`, `Request`, \u0026 `Response`) are all built on top of types provided by Resty. In most cases, methods provided by Resty should just work on these objects (see the [godoc](https://godoc.org/github.com/go-resty/resty) for more info).\n\nThe following commonly-used methods have been wrapped in order to allow for method chaining:\n\n- `req.Header`\n- `req.SetQueryParam`\n- `req.SetBody`\n\nThe following is an example of using method chaining to build a request:\n```go\nreq := client.NewRequest(reggie.PUT, lastResponse.GetRelativeLocation()).\n    SetHeader(\"Content-Length\", configContentLength).\n    SetHeader(\"Content-Type\", \"application/octet-stream\").\n    SetQueryParam(\"digest\", configDigest).\n    SetBody(configContent)\n```\n\n### Location Header Parsing\n\nFor certain types of requests, such as chunked uploads, the `Location` header is needed in order to make follow-up requests.\n\nReggie provides two helper methods to obtain the redirect location:\n```go\nfmt.Println(\"Relative location:\", resp.GetRelativeLocation())  // /v2/...\nfmt.Println(\"Absolute location:\", resp.GetAbsoluteLocation())  // https://...\n```\n\n### Error Parsing\n\nOn the response object, you may call the `Errors()` method which will attempt to parse the response body into a list of [OCI ErrorInfo](https://github.com/opencontainers/distribution-spec/blob/master/specs-go/v1/error.go#L36) objects:\n```go\nfor _, e := range resp.Errors() {\n    fmt.Println(\"Code:\",    e.Code)\n    fmt.Println(\"Message:\", e.Message)\n    fmt.Println(\"Detail:\",  e.Detail)\n}\n```\n\n### HTTP Method Constants\n\nSimply-named constants are provided for the following HTTP request methods:\n```go\nreggie.GET     // \"GET\"\nreggie.PUT     // \"PUT\"\nreggie.PATCH   // \"PATCH\"\nreggie.DELETE  // \"DELETE\"\nreggie.POST    // \"POST\"\nreggie.HEAD    // \"HEAD\"\nreggie.OPTIONS // \"OPTIONS\"\n```\n\n### Custom User-Agent\n\nBy default, requests made by Reggie will use a default value for the `User-Agent` header in order for registry providers to identify incoming requests:\n```\nUser-Agent: reggie/0.3.0 (https://github.com/bloodorangeio/reggie)\n```\n\nIf you wish to use a custom value for `User-Agent`, such as \"my-agent\" for example, you can do the following:\n```go\nclient, err := reggie.NewClient(\"http://localhost:5000\",\n    reggie.WithUserAgent(\"my-agent\"))\n```\n\n## Example\n\nThe following is an example of a resumable blob upload and subsequent manifest upload:\n\n```go\npackage main\n\nimport (\n\t\"fmt\"\n\n\t\"github.com/bloodorangeio/reggie\"\n\tgodigest \"github.com/opencontainers/go-digest\"\n)\n\nfunc main() {\n\t// construct client pointing to your registry\n\tclient, err := reggie.NewClient(\"http://localhost:5000\",\n\t\treggie.WithDefaultName(\"myorg/myrepo\"),\n\t\treggie.WithDebug(true))\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\t// get the session URL\n\treq := client.NewRequest(reggie.POST, \"/v2/\u003cname\u003e/blobs/uploads/\")\n\tresp, err := client.Do(req)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\t// a blob for an empty manifest config, separated into 2 chunks (\"{\" and \"}\")\n\tblob := []byte(\"{}\")\n\tblobChunk1 := blob[:1]\n\tblobChunk1Range := fmt.Sprintf(\"0-%d\", len(blobChunk1)-1)\n\tblobChunk2 := blob[1:]\n\tblobChunk2Range := fmt.Sprintf(\"%d-%d\", len(blobChunk1), len(blob)-1)\n\tblobDigest := godigest.FromBytes(blob).String()\n\n\t// upload the first chunk\n\treq = client.NewRequest(reggie.PATCH, resp.GetRelativeLocation()).\n\t\tSetHeader(\"Content-Type\", \"application/octet-stream\").\n\t\tSetHeader(\"Content-Length\", fmt.Sprintf(\"%d\", len(blobChunk1))).\n\t\tSetHeader(\"Content-Range\", blobChunk1Range).\n\t\tSetBody(blobChunk1)\n\tresp, err = client.Do(req)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\t// upload the final chunk and close the session\n\treq = client.NewRequest(reggie.PUT, resp.GetRelativeLocation()).\n\t\tSetHeader(\"Content-Length\", fmt.Sprintf(\"%d\", len(blobChunk2))).\n\t\tSetHeader(\"Content-Range\", blobChunk2Range).\n\t\tSetHeader(\"Content-Type\", \"application/octet-stream\").\n\t\tSetQueryParam(\"digest\", blobDigest).\n\t\tSetBody(blobChunk2)\n\tresp, err = client.Do(req)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\t// validate the uploaded blob content\n\treq = client.NewRequest(reggie.GET, \"/v2/\u003cname\u003e/blobs/\u003cdigest\u003e\",\n\t\treggie.WithDigest(blobDigest))\n\tresp, err = client.Do(req)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tfmt.Printf(\"Blob content:\\n%s\\n\", resp.String())\n\n\t// upload the manifest (referencing the uploaded blob)\n\tref := \"mytag\"\n\tmanifest := []byte(fmt.Sprintf(\n\t\t\"{ \\\"mediaType\\\": \\\"application/vnd.oci.image.manifest.v1+json\\\", \\\"config\\\":  { \\\"digest\\\": \\\"%s\\\", \"+\n\t\t\t\"\\\"mediaType\\\": \\\"application/vnd.oci.image.config.v1+json\\\",\"+\" \\\"size\\\": %d }, \\\"layers\\\": [], \"+\n\t\t\t\"\\\"schemaVersion\\\": 2 }\",\n\t\tblobDigest, len(blob)))\n\treq = client.NewRequest(reggie.PUT, \"/v2/\u003cname\u003e/manifests/\u003creference\u003e\",\n\t\treggie.WithReference(ref)).\n\t\tSetHeader(\"Content-Type\", \"application/vnd.oci.image.manifest.v1+json\").\n\t\tSetBody(manifest)\n\tresp, err = client.Do(req)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\t// validate the uploaded manifest content\n\treq = client.NewRequest(reggie.GET, \"/v2/\u003cname\u003e/manifests/\u003creference\u003e\",\n\t\treggie.WithReference(ref)).\n\t\tSetHeader(\"Accept\", \"application/vnd.oci.image.manifest.v1+json\")\n\tresp, err = client.Do(req)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tfmt.Printf(\"Manifest content:\\n%s\\n\", resp.String())\n}\n```\n\n## Development\n\nTo develop bloodorangeio/reggie, you will need to have [Go installed](https://golang.org/doc/install).\nYou should then fork the repository, clone the fork, and checkout a new branch.\n\n```bash\ngit clone https://github.com/\u003cusername\u003e/reggie\ncd reggie \ngit checkout -b add/my-new-feature\n```\n\nYou can then make changes to the code, and build as needed. But if you are just\nmaking local changes that you want to test alongside the library, you should edit\n[client_test.go](client_test.go) and then run tests.\n\n```bash\n$ go test\n2020/10/19 15:11:34.226399 WARN RESTY Using Basic Auth in HTTP mode is not secure, use HTTPS\n2020/10/19 15:11:34.227171 WARN RESTY Using Basic Auth in HTTP mode is not secure, use HTTPS\n2020/10/19 15:11:34.227620 WARN RESTY Using Basic Auth in HTTP mode is not secure, use HTTPS\n2020/10/19 15:11:34.228231 WARN RESTY Using Basic Auth in HTTP mode is not secure, use HTTPS\n2020/10/19 15:11:34.228650 WARN RESTY Using Basic Auth in HTTP mode is not secure, use HTTPS\n2020/10/19 15:11:34.229178 WARN RESTY Using Basic Auth in HTTP mode is not secure, use HTTPS\nPASS\nok  \tgithub.com/bloodorangeio/reggie\t0.006s\n```\n\nBefore submitting a pull request, make sure to format the code.\n\n```bash\ngo fmt\n```\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fbloodorangeio%2Freggie","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fbloodorangeio%2Freggie","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fbloodorangeio%2Freggie/lists"}