Host and secure your private Ruby Gems registry
Ruby powers some of the world's largest applications, including Shopify's commerce platform. Cloudsmith gives Ruby teams a fully managed, private gem registry with built-in security scanning, upstream proxying, and granular access control - so you can ship gems with confidence.
Ruby Gems, plus everything else your teams ship. Cloudsmith is a secure, centralized store for all your packages, containers, and artifacts.
- Use Ruby Gems + 30 other formats in one registry
- Proxy and cache rubygems.org upstream packages for faster, more reliable builds
- Store Docker containers and ML models alongside your gems in the same platform
How we support Ruby Gems
Why teams choose Cloudsmith for Ruby Gems
Signs you're ready to switch to Cloudsmith for Ruby Gems
Get started with Ruby Gems on Cloudsmith
Frequently asked questions
Add a source block in your Gemfile pointing to your Cloudsmith repository URL. For Entitlement Token authentication use the format: source 'https://dl.cloudsmith.io/TOKEN/OWNER/REPOSITORY/ruby/' do gem 'your-gem' end. For HTTP Basic Auth with an API key, use: source 'https://USERNAME:API-KEY@dl.cloudsmith.io/basic/OWNER/REPOSITORY/ruby/'. Cloudsmith recommends passing credentials via environment variables rather than committing them into the Gemfile directly.
Cloudsmith supports four authentication methods for Ruby repositories: Entitlement Token Authentication (recommended for read-only distribution and CI pulls), HTTP Basic Auth with your username and password, HTTP Basic Auth with your username and API key, and HTTP Basic Auth using a token credential. For CI/CD pipelines, Cloudsmith also supports OIDC authentication, which lets your build system authenticate without storing any long-lived secrets in your CI configuration.
You publish to Cloudsmith using the standard gem push command. First, add your Cloudsmith credentials to your $HOME/.gem/credentials file - you can use the key name :cloudsmith: and then pass --key cloudsmith during the push. Alternatively, you can authenticate interactively when running gem push without pre-stored credentials. Cloudsmith also supports publishing via the Cloudsmith CLI, which is useful for scripted or CI-driven publishing workflows.
Yes. You can configure rubygems.org (or any other upstream Ruby repository) as an upstream proxy on your Cloudsmith repository. When a gem is requested that is not in your private repository, Cloudsmith fetches it from the upstream, caches it, and serves it from your repository going forward. This means your builds are no longer dependent on rubygems.org availability and benefit from Cloudsmith's globally distributed CDN for faster pull times. Cached packages are also subject to your repository's scanning and policy rules.
Yes. Cloudsmith scans every gem for known CVEs and malware, both on upload and on a continuous rescan basis as new vulnerability data becomes available. You can configure policy rules using Cloudsmith's OPA Rego-based policy engine to automatically quarantine, block, or send alerts for packages that exceed a defined severity threshold. This applies to privately published gems as well as gems fetched and cached from upstream sources like rubygems.org.
Yes. Shopify - which runs one of the world's largest Ruby on Rails applications and is a major contributor to the Ruby core, Rails framework, and RubyGems toolchain - is a Cloudsmith customer. Shopify's engineering teams use Cloudsmith to manage artifacts across their software supply chain. If your team is building with Ruby at any scale, Cloudsmith gives you the security controls, audit trail, and performance that the public rubygems.org registry simply cannot provide.
Yes. Cloudsmith Entitlement Tokens are designed exactly for this use case. You can create scoped tokens with configurable download limits, expiry dates, and IP restrictions, then share them with customers or partners without exposing your internal API key or user credentials. Tokens can be revoked instantly from the Cloudsmith UI, and all download activity is logged per token so you have full visibility over who is consuming your gems.
Cloudsmith supports OIDC natively, meaning CI/CD platforms like GitHub Actions and CircleCI can authenticate to your Ruby repository without storing long-lived API tokens as secrets. Your CI provider issues a short-lived OIDC token, which Cloudsmith validates to grant access. This eliminates the risk of token leakage from CI secrets stores, removes the need for manual token rotation, and gives you more granular control over which workflows can push or pull from your gem repository.
Yes. Cloudsmith repositories are multi-format by design. A single repository can store Ruby gems, Docker container images, npm packages, Maven artifacts, and over 30 other formats simultaneously. This means your team manages one platform, one set of access policies, and one audit log - rather than running a separate gem server, container registry, and Maven repo with separate authentication, permissions, and support overhead.
Self-hosted gem servers like geminabox give you a private registry but require you to manage the infrastructure, keep it available, handle scaling, and build security controls yourself. Cloudsmith is fully managed: uptime, scaling, CDN delivery, CVE scanning, policy enforcement, audit logging, OIDC auth, and entitlement token management are all included. There is no server to patch, no disk to provision, and no on-call rotation for your artifact infrastructure.