diff --git a/data/database.py b/data/database.py
index ff647aeb1..6d7b7e3b2 100644
--- a/data/database.py
+++ b/data/database.py
@@ -341,7 +341,6 @@ class QuayUserField(ForeignKeyField):
     super(QuayUserField, self).__init__(*args, **kwargs)
 
 
-# @TODO: Generates client-side enum
 class EnumField(ForeignKeyField):
   """ Create a cached python Enum from an EnumTable """
   def __init__(self, rel_model, enum_key_field='name', *args, **kwargs):
@@ -549,12 +548,17 @@ class Visibility(BaseModel):
   name = CharField(index=True, unique=True)
 
 
+class RepositoryKind(BaseModel):
+  name = CharField(index=True, unique=True)
+
+
 class Repository(BaseModel):
   namespace_user = QuayUserField(null=True)
   name = FullIndexedCharField(match_function=db_match_func)
   visibility = ForeignKeyField(Visibility)
   description = FullIndexedTextField(match_function=db_match_func, null=True)
   badge_token = CharField(default=uuid_generator)
+  kind = EnumField(RepositoryKind)
 
   class Meta:
     database = db
diff --git a/data/interfaces/v1.py b/data/interfaces/v1.py
index b59142975..abc3fb858 100644
--- a/data/interfaces/v1.py
+++ b/data/interfaces/v1.py
@@ -10,9 +10,15 @@ from util.morecollections import AttrDict
 
 
 class Repository(namedtuple('Repository', ['id', 'name', 'namespace_name', 'description',
-                                           'is_public'])):
+                                           'is_public', 'kind'])):
   """
   Repository represents a namespaced collection of tags.
+  :type id: int
+  :type name: string
+  :type namespace_name: string
+  :type description: string
+  :type is_public: bool
+  :type kind: string
   """
 
 
@@ -383,8 +389,9 @@ class PreOCIModel(DockerRegistryV1DataInterface):
     return bool(model.oauth.validate_access_token(token))
 
   def get_sorted_matching_repositories(self, search_term, filter_username=None, offset=0, limit=25):
-    repos = model.repository.get_filtered_matching_repositories(search_term, filter_username,
-                                                                offset, limit)
+    repos = model.repository.get_filtered_matching_repositories(search_term,
+                                                                filter_username=filter_username,
+                                                                offset=offset, limit=limit)
     return [_repository_for_repo(repo) for repo in repos]
 
 
@@ -395,7 +402,8 @@ def _repository_for_repo(repo):
     name=repo.name,
     namespace_name=repo.namespace_user.username,
     description=repo.description,
-    is_public=model.repository.is_repository_public(repo)
+    is_public=model.repository.is_repository_public(repo),
+    kind=model.repository.get_repo_kind_name(repo),
   )
 
 
diff --git a/data/interfaces/v2.py b/data/interfaces/v2.py
index cb16334d6..afd77597e 100644
--- a/data/interfaces/v2.py
+++ b/data/interfaces/v2.py
@@ -13,9 +13,15 @@ _MEDIA_TYPE = "application/vnd.docker.distribution.manifest.v1+prettyjws"
 
 
 class Repository(namedtuple('Repository', ['id', 'name', 'namespace_name', 'description',
-                                           'is_public'])):
+                                           'is_public', 'kind'])):
   """
   Repository represents a namespaced collection of tags.
+  :type id: int
+  :type name: string
+  :type namespace_name: string
+  :type description: string
+  :type is_public: bool
+  :type kind: string
   """
 
 class ManifestJSON(namedtuple('ManifestJSON', ['digest', 'json', 'media_type'])):
@@ -70,14 +76,6 @@ class DockerRegistryV2DataInterface(object):
     """
     pass
 
-  @abstractmethod
-  def repository_is_public(self, namespace_name, repo_name):
-    """
-    Returns true if the repository with the given name under the given namespace has public
-    visibility.
-    """
-    pass
-
   @abstractmethod
   def get_repository(self, namespace_name, repo_name):
     """
@@ -271,9 +269,6 @@ class PreOCIModel(DockerRegistryV2DataInterface):
   def create_repository(self, namespace_name, repo_name, creating_user=None):
     return model.repository.create_repository(namespace_name, repo_name, creating_user)
 
-  def repository_is_public(self, namespace_name, repo_name):
-    return model.repository.repository_is_public(namespace_name, repo_name)
-
   def get_repository(self, namespace_name, repo_name):
     repo = model.repository.get_repository(namespace_name, repo_name)
     if repo is None:
@@ -392,7 +387,8 @@ class PreOCIModel(DockerRegistryV2DataInterface):
     return [_tag_view(tag) for tag in tags_query]
 
   def get_visible_repositories(self, username, limit, offset):
-    query = model.repository.get_visible_repositories(username, include_public=(username is None))
+    query = model.repository.get_visible_repositories(username, repo_kind='image',
+                                                      include_public=(username is None))
     query = query.limit(limit).offset(offset)
     return [_repository_for_repo(repo) for repo in query]
 
@@ -538,7 +534,8 @@ def _repository_for_repo(repo):
     name=repo.name,
     namespace_name=repo.namespace_user.username,
     description=repo.description,
-    is_public=model.repository.is_repository_public(repo)
+    is_public=model.repository.is_repository_public(repo),
+    kind=model.repository.get_repo_kind_name(repo),
   )
 
 
diff --git a/data/interfaces/verbs.py b/data/interfaces/verbs.py
index f5758352e..6222f46b7 100644
--- a/data/interfaces/verbs.py
+++ b/data/interfaces/verbs.py
@@ -9,6 +9,19 @@ from data import model
 from image.docker.v1 import DockerV1Metadata
 
 
+class Repository(namedtuple('Repository', ['id', 'name', 'namespace_name', 'description',
+                                           'is_public', 'kind'])):
+  """
+  Repository represents a namespaced collection of tags.
+  :type id: int
+  :type name: string
+  :type namespace_name: string
+  :type description: string
+  :type is_public: bool
+  :type kind: string
+  """
+
+
 class DerivedImage(namedtuple('DerivedImage', ['ref', 'blob', 'internal_source_image_db_id'])):
   """
   DerivedImage represents a user-facing alias for an image which was derived from another image.
@@ -43,9 +56,10 @@ class VerbsDataInterface(object):
   verbs.
   """
   @abstractmethod
-  def repository_is_public(self, namespace_name, repo_name):
+  def get_repository(self, namespace_name, repo_name):
     """
-    Returns a boolean for whether the repository with the given name and namespace is public.
+    Returns a repository tuple for the repository with the given name under the given namespace.
+    Returns None if no such repository was found.
     """
     pass
 
@@ -144,8 +158,12 @@ class PreOCIModel(VerbsDataInterface):
   before it was changed to support the OCI specification.
   """
 
-  def repository_is_public(self, namespace_name, repo_name):
-    return model.repository.repository_is_public(namespace_name, repo_name)
+  def get_repository(self, namespace_name, repo_name):
+    repo = model.repository.get_repository(namespace_name, repo_name)
+    if repo is None:
+      return None
+
+    return _repository_for_repo(repo)
 
   def get_manifest_layers_with_blobs(self, repo_image):
     repo_image_record = model.image.get_image_by_id(repo_image.repository.namespace_name,
@@ -320,3 +338,14 @@ def _blob(blob_record):
     uploading=blob_record.uploading,
     locations=locations,
   )
+
+def _repository_for_repo(repo):
+  """ Returns a Repository object representing the Pre-OCI data model repo instance given. """
+  return Repository(
+    id=repo.id,
+    name=repo.name,
+    namespace_name=repo.namespace_user.username,
+    description=repo.description,
+    is_public=model.repository.is_repository_public(repo),
+    kind=model.repository.get_repo_kind_name(repo),
+  )
diff --git a/data/migrations/migration.sh b/data/migrations/migration.sh
index 19c8df4a3..56f42e61e 100755
--- a/data/migrations/migration.sh
+++ b/data/migrations/migration.sh
@@ -10,9 +10,9 @@ up_mysql() {
   # Run a SQL database on port 3306 inside of Docker.
   docker run --name mysql -p 3306:3306 -e MYSQL_ROOT_PASSWORD=password -d mysql
 
-  # Sleep for 10s to get MySQL get started.
-  echo 'Sleeping for 20...'
-  sleep 20
+  # Sleep for 25s to get MySQL get started.
+  echo 'Sleeping for 25...'
+  sleep 25
 
   # Add the database to mysql.
   docker run --rm --link mysql:mysql mysql sh -c 'echo "create database genschema" | mysql -h"$MYSQL_PORT_3306_TCP_ADDR" -P"$MYSQL_PORT_3306_TCP_PORT" -uroot -ppassword'
@@ -27,9 +27,9 @@ up_mariadb() {
   # Run a SQL database on port 3306 inside of Docker.
   docker run --name mariadb -p 3306:3306 -e MYSQL_ROOT_PASSWORD=password -d mariadb
 
-  # Sleep for 20s to get MySQL get started.
-  echo 'Sleeping for 20...'
-  sleep 20
+  # Sleep for 25s to get MySQL get started.
+  echo 'Sleeping for 25...'
+  sleep 25
 
   # Add the database to mysql.
   docker run --rm --link mariadb:mariadb mariadb sh -c 'echo "create database genschema" | mysql -h"$MARIADB_PORT_3306_TCP_ADDR" -P"$MARIADB_PORT_3306_TCP_PORT" -uroot -ppassword'
@@ -45,8 +45,8 @@ up_percona() {
   docker run --name percona -p 3306:3306 -e MYSQL_ROOT_PASSWORD=password -d percona
 
   # Sleep for 20s
-  echo 'Sleeping for 20...'
-  sleep 20
+  echo 'Sleeping for 25...'
+  sleep 25
 
   # Add the daabase to mysql.
   docker run --rm --link percona:percona percona sh -c 'echo "create database genschema" | mysql -h $PERCONA_PORT_3306_TCP_ADDR -uroot -ppassword'
diff --git a/data/migrations/versions/7a525c68eb13_add_oci_app_models.py b/data/migrations/versions/7a525c68eb13_add_oci_app_models.py
index 8abe4648c..8ece0be27 100644
--- a/data/migrations/versions/7a525c68eb13_add_oci_app_models.py
+++ b/data/migrations/versions/7a525c68eb13_add_oci_app_models.py
@@ -300,9 +300,9 @@ def upgrade(tables):
   op.bulk_insert(
     tables.tagkind,
     [
-      {'name': 'tag', 'id': 1},
-      {'name': 'release', 'id': 2},
-      {'name': 'channel', 'id': 3},
+      {'id': 1, 'name': 'tag'},
+      {'id': 2, 'name': 'release'},
+      {'id': 3, 'name': 'channel'},
     ]
   )
 
diff --git a/data/migrations/versions/b4df55dea4b3_add_repository_kind.py b/data/migrations/versions/b4df55dea4b3_add_repository_kind.py
new file mode 100644
index 000000000..16123975f
--- /dev/null
+++ b/data/migrations/versions/b4df55dea4b3_add_repository_kind.py
@@ -0,0 +1,44 @@
+"""add repository kind
+
+Revision ID: b4df55dea4b3
+Revises: 7a525c68eb13
+Create Date: 2017-03-19 12:59:41.484430
+
+"""
+
+# revision identifiers, used by Alembic.
+revision = 'b4df55dea4b3'
+down_revision = 'b8ae68ad3e52'
+
+from alembic import op
+import sqlalchemy as sa
+from sqlalchemy.dialects import mysql
+
+
+def upgrade(tables):
+  op.create_table(
+    'repositorykind',
+    sa.Column('id', sa.Integer(), nullable=False),
+    sa.Column('name', sa.String(length=255), nullable=False),
+    sa.PrimaryKeyConstraint('id', name=op.f('pk_repositorykind'))
+  )
+  op.create_index('repositorykind_name', 'repositorykind', ['name'], unique=True)
+
+  op.bulk_insert(
+    tables.repositorykind,
+    [
+      {'id': 1, 'name': 'image'},
+      {'id': 2, 'name': 'application'},
+    ],
+  )
+
+  op.add_column(u'repository', sa.Column('kind_id', sa.Integer(), nullable=False, server_default='1'))
+  op.create_index('repository_kind_id', 'repository', ['kind_id'], unique=False)
+  op.create_foreign_key(op.f('fk_repository_kind_id_repositorykind'), 'repository', 'repositorykind', ['kind_id'], ['id'])
+
+
+def downgrade(tables):
+  op.drop_constraint(op.f('fk_repository_kind_id_repositorykind'), 'repository', type_='foreignkey')
+  op.drop_index('repository_kind_id', table_name='repository')
+  op.drop_column(u'repository', 'kind_id')
+  op.drop_table('repositorykind')
diff --git a/data/model/_basequery.py b/data/model/_basequery.py
index 59de01a3b..d53c14434 100644
--- a/data/model/_basequery.py
+++ b/data/model/_basequery.py
@@ -3,14 +3,23 @@ from cachetools import lru_cache
 
 from data.model import DataModelException
 from data.database import (Repository, User, Team, TeamMember, RepositoryPermission, TeamRole,
-                           Namespace, Visibility, ImageStorage, Image, db_for_update)
+                           Namespace, Visibility, ImageStorage, Image, RepositoryKind,
+                           db_for_update)
 
 
-def get_existing_repository(namespace_name, repository_name, for_update=False):
+def get_existing_repository(namespace_name, repository_name, for_update=False, kind_filter=None):
   query = (Repository
            .select(Repository, Namespace)
            .join(Namespace, on=(Repository.namespace_user == Namespace.id))
-           .where(Namespace.username == namespace_name, Repository.name == repository_name))
+           .where(Namespace.username == namespace_name,
+                  Repository.name == repository_name))
+
+  if kind_filter:
+    query = (query
+             .switch(Repository)
+             .join(RepositoryKind)
+             .where(RepositoryKind.name == kind_filter))
+
   if for_update:
     query = db_for_update(query)
 
@@ -27,11 +36,14 @@ def _lookup_team_role(name):
   return TeamRole.get(name=name)
 
 
-def filter_to_repos_for_user(query, username=None, namespace=None, include_public=True,
-                             start_id=None):
+def filter_to_repos_for_user(query, username=None, namespace=None, repo_kind='image',
+                             include_public=True, start_id=None):
   if not include_public and not username:
     return Repository.select().where(Repository.id == '-1')
 
+  # Filter on the type of repository.
+  query = query.where(Repository.kind == Repository.kind.get_id(repo_kind))
+
   # Add the start ID if necessary.
   if start_id is not None:
     query = query.where(Repository.id >= start_id)
@@ -121,5 +133,3 @@ def calculate_image_aggregate_size(ancestors_str, image_size, parent_image):
     return None
 
   return ancestor_size + image_size
-
-
diff --git a/data/model/repository.py b/data/model/repository.py
index b25ac69ff..fbd47aeef 100644
--- a/data/model/repository.py
+++ b/data/model/repository.py
@@ -18,6 +18,11 @@ from util.itertoolrecipes import take
 
 logger = logging.getLogger(__name__)
 
+
+def get_repo_kind_name(repo):
+  return Repository.kind.get_name(repo.kind_id)
+
+
 def get_repository_count():
   return Repository.select().count()
 
@@ -26,10 +31,11 @@ def get_public_repo_visibility():
   return _basequery.get_public_repo_visibility()
 
 
-def create_repository(namespace, name, creating_user, visibility='private'):
+def create_repository(namespace, name, creating_user, visibility='private', repo_kind='image'):
   private = Visibility.get(name=visibility)
   namespace_user = User.get(username=namespace)
-  repo = Repository.create(name=name, visibility=private, namespace_user=namespace_user)
+  repo = Repository.create(name=name, visibility=private, namespace_user=namespace_user,
+                           kind=Repository.kind.get_id(repo_kind))
   admin = Role.get(name='admin')
 
   yesterday = datetime.now() - timedelta(days=1)
@@ -44,9 +50,10 @@ def create_repository(namespace, name, creating_user, visibility='private'):
   return repo
 
 
-def get_repository(namespace_name, repository_name):
+def get_repository(namespace_name, repository_name, kind_filter=None):
   try:
-    return _basequery.get_existing_repository(namespace_name, repository_name)
+    return _basequery.get_existing_repository(namespace_name, repository_name,
+                                              kind_filter=kind_filter)
   except Repository.DoesNotExist:
     return None
 
@@ -103,7 +110,7 @@ def _get_gc_expiration_policies():
 
 def get_random_gc_policy():
   """ Return a single random policy from the database to use when garbage collecting.
-      """
+  """
   return random.choice(_get_gc_expiration_policies())
 
 
@@ -259,7 +266,7 @@ def unstar_repository(user, repository):
     raise DataModelException('Star not found.')
 
 
-def get_user_starred_repositories(user):
+def get_user_starred_repositories(user, repo_kind='image'):
   """ Retrieves all of the repositories a user has starred. """
   query = (Repository
            .select(Repository, User, Visibility, Repository.id.alias('rid'))
@@ -268,7 +275,8 @@ def get_user_starred_repositories(user):
            .join(User)
            .switch(Repository)
            .join(Visibility)
-           .where(Star.user == user))
+           .where(Star.user == user,
+                  Repository.kind == Repository.kind.get_id(repo_kind)))
 
   return query
 
@@ -302,8 +310,8 @@ def get_when_last_modified(repository_ids):
   return last_modified_map
 
 
-def get_visible_repositories(username, namespace=None, include_public=False, start_id=None,
-                             limit=None):
+def get_visible_repositories(username, namespace=None, repo_kind='image', include_public=False,
+                             start_id=None, limit=None):
   """ Returns the repositories visible to the given user (if any).
   """
   if not include_public and not username:
@@ -313,7 +321,8 @@ def get_visible_repositories(username, namespace=None, include_public=False, sta
 
   query = (Repository
            .select(Repository.name, Repository.id.alias('rid'),
-                   Repository.description, Namespace.username, Repository.visibility)
+                   Repository.description, Namespace.username, Repository.visibility,
+                   Repository.kind)
            .switch(Repository)
            .join(Namespace, on=(Repository.namespace_user == Namespace.id)))
 
@@ -321,7 +330,7 @@ def get_visible_repositories(username, namespace=None, include_public=False, sta
     # Note: We only need the permissions table if we will filter based on a user's permissions.
     query = query.switch(Repository).distinct().join(RepositoryPermission, JOIN_LEFT_OUTER)
 
-  query = _basequery.filter_to_repos_for_user(query, username, namespace, include_public,
+  query = _basequery.filter_to_repos_for_user(query, username, namespace, repo_kind, include_public,
                                               start_id=start_id)
 
   if limit is not None:
@@ -330,14 +339,15 @@ def get_visible_repositories(username, namespace=None, include_public=False, sta
   return query
 
 
-def get_filtered_matching_repositories(lookup_value, filter_username=None, offset=0, limit=25):
+def get_filtered_matching_repositories(lookup_value, filter_username=None, repo_kind='image',
+                                       offset=0, limit=25):
   """ Returns an iterator of all repositories matching the given lookup value, with optional
       filtering to a specific user. If the user is unspecified, only public repositories will
       be returned.
   """
 
   # Build the unfiltered search query.
-  unfiltered_query = _get_sorted_matching_repositories(lookup_value,
+  unfiltered_query = _get_sorted_matching_repositories(lookup_value, repo_kind=repo_kind,
                                                        include_private=filter_username is not None)
 
   # Add a filter to the iterator, if necessary.
@@ -395,7 +405,7 @@ def _filter_repositories_visible_to_username(unfiltered_query, filter_username,
     iteration_count = iteration_count + 1
 
 
-def _get_sorted_matching_repositories(lookup_value, include_private=False):
+def _get_sorted_matching_repositories(lookup_value, repo_kind='image', include_private=False):
   """ Returns a query of repositories matching the given lookup string, with optional inclusion of
       private repositories. Note that this method does *not* filter results based on visibility
       to users.
@@ -405,7 +415,8 @@ def _get_sorted_matching_repositories(lookup_value, include_private=False):
   query = (Repository
            .select(Repository, Namespace)
            .join(Namespace, on=(Namespace.id == Repository.namespace_user))
-           .where(Repository.name.match(lookup_value) | Repository.description.match(lookup_value))
+           .where(Repository.name.match(lookup_value) | Repository.description.match(lookup_value),
+                  Repository.kind == Repository.kind.get_id(repo_kind))
            .group_by(Repository.id, Namespace.id))
 
   if not include_private:
@@ -438,7 +449,8 @@ def repository_is_public(namespace_name, repository_name):
      .join(Namespace, on=(Repository.namespace_user == Namespace.id))
      .switch(Repository)
      .join(Visibility)
-     .where(Namespace.username == namespace_name, Repository.name == repository_name,
+     .where(Namespace.username == namespace_name,
+            Repository.name == repository_name,
             Visibility.name == 'public')
      .get())
     return True
@@ -461,7 +473,8 @@ def get_email_authorized_for_repo(namespace, repository, email):
             .select(RepositoryAuthorizedEmail, Repository, Namespace)
             .join(Repository)
             .join(Namespace, on=(Repository.namespace_user == Namespace.id))
-            .where(Namespace.username == namespace, Repository.name == repository,
+            .where(Namespace.username == namespace,
+                   Repository.name == repository,
                    RepositoryAuthorizedEmail.email == email)
             .get())
   except RepositoryAuthorizedEmail.DoesNotExist:
@@ -495,7 +508,7 @@ def confirm_email_authorization_for_repo(code):
   return found
 
 
-def list_popular_public_repos(action_count_threshold, time_span):
+def list_popular_public_repos(action_count_threshold, time_span, repo_kind='image'):
   cutoff = datetime.now() - time_span
   return (Repository
           .select(Namespace.username, Repository.name)
@@ -503,7 +516,8 @@ def list_popular_public_repos(action_count_threshold, time_span):
           .switch(Repository)
           .join(RepositoryActionCount)
           .where(RepositoryActionCount.date >= cutoff,
-                 Repository.visibility == get_public_repo_visibility())
+                 Repository.visibility == get_public_repo_visibility(),
+                 Repository.kind == Repository.kind.get_id(repo_kind))
           .group_by(RepositoryActionCount.repository, Repository.name, Namespace.username)
           .having(fn.Sum(RepositoryActionCount.count) >= action_count_threshold)
           .tuples())
diff --git a/data/model/test/test_repository.py b/data/model/test/test_repository.py
new file mode 100644
index 000000000..f15f6236d
--- /dev/null
+++ b/data/model/test/test_repository.py
@@ -0,0 +1,14 @@
+import pytest
+
+from peewee import IntegrityError
+
+from endpoints.test.fixtures import database_uri, init_db_path, sqlitedb_file
+from data.model.repository import create_repository
+
+def test_duplicate_repository_different_kinds(database_uri):
+  # Create an image repo.
+  create_repository('devtable', 'somenewrepo', None, repo_kind='image')
+
+  # Try to create an app repo with the same name, which should fail.
+  with pytest.raises(IntegrityError):
+    create_repository('devtable', 'somenewrepo', None, repo_kind='application')
diff --git a/endpoints/api/__init__.py b/endpoints/api/__init__.py
index 6a9369d8d..f7e23eba5 100644
--- a/endpoints/api/__init__.py
+++ b/endpoints/api/__init__.py
@@ -22,7 +22,7 @@ from auth.auth_context import get_authenticated_user, get_validated_oauth_token
 from auth.process import process_oauth
 from endpoints.csrf import csrf_protect
 from endpoints.exception import (ApiException, Unauthorized, InvalidRequest, InvalidResponse,
-                                 FreshLoginRequired)
+                                 FreshLoginRequired, NotFound)
 from endpoints.decorators import check_anon_protection
 from util.metrics.metricqueue import time_decorator
 from util.names import parse_namespace_repository
@@ -200,6 +200,20 @@ class RepositoryParamResource(ApiResource):
   method_decorators = [check_anon_protection, parse_repository_name]
 
 
+def disallow_for_app_repositories(func):
+  @wraps(func)
+  def wrapped(self, namespace, repository, *args, **kwargs):
+    # Lookup the repository with the given namespace and name and ensure it is not an application
+    # repository.
+    repo = model.repository.get_repository(namespace, repository, kind_filter='application')
+    if repo:
+      abort(501)
+
+    return func(self, namespace, repository, *args, **kwargs)
+
+  return wrapped
+
+
 def require_repo_permission(permission_class, scope, allow_public=False):
   def wrapper(func):
     @add_method_metadata('oauth2_scope', scope)
diff --git a/endpoints/api/build.py b/endpoints/api/build.py
index ca7866f85..1bb575a4f 100644
--- a/endpoints/api/build.py
+++ b/endpoints/api/build.py
@@ -14,7 +14,7 @@ from buildtrigger.basehandler import BuildTriggerHandler
 from endpoints.api import (RepositoryParamResource, parse_args, query_param, nickname, resource,
                            require_repo_read, require_repo_write, validate_json_request,
                            ApiResource, internal_only, format_date, api, path_param,
-                           require_repo_admin, abort)
+                           require_repo_admin, abort, disallow_for_app_repositories)
 from endpoints.exception import Unauthorized, NotFound, InvalidRequest
 from endpoints.building import start_build, PreparedBuild, MaximumBuildsQueuedException
 from data import database
@@ -200,6 +200,7 @@ class RepositoryBuildList(RepositoryParamResource):
   @query_param('limit', 'The maximum number of builds to return', type=int, default=5)
   @query_param('since', 'Returns all builds since the given unix timecode', type=int, default=None)
   @nickname('getRepoBuilds')
+  @disallow_for_app_repositories
   def get(self, namespace, repository, parsed_args):
     """ Get the list of repository builds. """
     limit = parsed_args.get('limit', 5)
@@ -215,6 +216,7 @@ class RepositoryBuildList(RepositoryParamResource):
 
   @require_repo_write
   @nickname('requestRepoBuild')
+  @disallow_for_app_repositories
   @validate_json_request('RepositoryBuildRequest')
   def post(self, namespace, repository):
     """ Request that a repository be built and pushed from the specified input. """
@@ -315,6 +317,7 @@ class RepositoryBuildResource(RepositoryParamResource):
   """ Resource for dealing with repository builds. """
   @require_repo_read
   @nickname('getRepoBuild')
+  @disallow_for_app_repositories
   def get(self, namespace, repository, build_uuid):
     """ Returns information about a build. """
     try:
@@ -329,6 +332,7 @@ class RepositoryBuildResource(RepositoryParamResource):
 
   @require_repo_admin
   @nickname('cancelRepoBuild')
+  @disallow_for_app_repositories
   def delete(self, namespace, repository, build_uuid):
     """ Cancels a repository build. """
     try:
@@ -352,6 +356,7 @@ class RepositoryBuildStatus(RepositoryParamResource):
   """ Resource for dealing with repository build status. """
   @require_repo_read
   @nickname('getRepoBuildStatus')
+  @disallow_for_app_repositories
   def get(self, namespace, repository, build_uuid):
     """ Return the status for the builds specified by the build uuids. """
     build = model.build.get_repository_build(build_uuid)
@@ -392,6 +397,7 @@ class RepositoryBuildLogs(RepositoryParamResource):
   """ Resource for loading repository build logs. """
   @require_repo_write
   @nickname('getRepoBuildLogs')
+  @disallow_for_app_repositories
   def get(self, namespace, repository, build_uuid):
     """ Return the build logs for the build specified by the build uuid. """
     build = model.build.get_repository_build(build_uuid)
diff --git a/endpoints/api/image.py b/endpoints/api/image.py
index 0d6e59425..35c346ff1 100644
--- a/endpoints/api/image.py
+++ b/endpoints/api/image.py
@@ -4,7 +4,7 @@ import json
 
 from collections import defaultdict
 from endpoints.api import (resource, nickname, require_repo_read, RepositoryParamResource,
-                           format_date, path_param)
+                           format_date, path_param, disallow_for_app_repositories)
 from endpoints.exception import NotFound
 from data import model
 
@@ -49,6 +49,7 @@ class RepositoryImageList(RepositoryParamResource):
   """ Resource for listing repository images. """
   @require_repo_read
   @nickname('listRepositoryImages')
+  @disallow_for_app_repositories
   def get(self, namespace, repository):
     """ List the images for the specified repository. """
     repo = model.repository.get_repository(namespace, repository)
@@ -89,6 +90,7 @@ class RepositoryImage(RepositoryParamResource):
   """ Resource for handling repository images. """
   @require_repo_read
   @nickname('getImage')
+  @disallow_for_app_repositories
   def get(self, namespace, repository, image_id):
     """ Get the information available for the specified image. """
     image = model.image.get_repo_image_extended(namespace, repository, image_id)
diff --git a/endpoints/api/manifest.py b/endpoints/api/manifest.py
index aede35bda..e96283f7f 100644
--- a/endpoints/api/manifest.py
+++ b/endpoints/api/manifest.py
@@ -4,7 +4,8 @@ from app import label_validator
 from flask import request
 from endpoints.api import (resource, nickname, require_repo_read, require_repo_write,
                            RepositoryParamResource, log_action, validate_json_request,
-                           path_param, parse_args, query_param, truthy_bool, abort, api)
+                           path_param, parse_args, query_param, truthy_bool, abort, api,
+                           disallow_for_app_repositories)
 from endpoints.exception import NotFound
 from data import model
 
@@ -59,6 +60,7 @@ class RepositoryManifestLabels(RepositoryParamResource):
 
   @require_repo_read
   @nickname('listManifestLabels')
+  @disallow_for_app_repositories
   @parse_args()
   @query_param('filter', 'If specified, only labels matching the given prefix will be returned',
                type=str, default=None)
@@ -75,6 +77,7 @@ class RepositoryManifestLabels(RepositoryParamResource):
 
   @require_repo_write
   @nickname('addManifestLabel')
+  @disallow_for_app_repositories
   @validate_json_request('AddLabel')
   def post(self, namespace, repository, manifestref):
     """ Adds a new label into the tag manifest. """
@@ -121,6 +124,7 @@ class ManageRepositoryManifestLabel(RepositoryParamResource):
   """ Resource for managing the labels on a specific repository manifest. """
   @require_repo_read
   @nickname('getManifestLabel')
+  @disallow_for_app_repositories
   def get(self, namespace, repository, manifestref, labelid):
     """ Retrieves the label with the specific ID under the manifest. """
     try:
@@ -137,6 +141,7 @@ class ManageRepositoryManifestLabel(RepositoryParamResource):
 
   @require_repo_write
   @nickname('deleteManifestLabel')
+  @disallow_for_app_repositories
   def delete(self, namespace, repository, manifestref, labelid):
     """ Deletes an existing label from a manifest. """
     try:
diff --git a/endpoints/api/repository.py b/endpoints/api/repository.py
index d8b08483b..98a056a4b 100644
--- a/endpoints/api/repository.py
+++ b/endpoints/api/repository.py
@@ -14,7 +14,7 @@ from endpoints.api import (truthy_bool, format_date, nickname, log_action, valid
                            require_repo_read, require_repo_write, require_repo_admin,
                            RepositoryParamResource, resource, query_param, parse_args, ApiResource,
                            request_error, require_scope, path_param, page_support, parse_args,
-                           query_param, truthy_bool)
+                           query_param, truthy_bool, disallow_for_app_repositories)
 from endpoints.exception import Unauthorized, NotFound, InvalidRequest, ExceedsLicenseException
 from endpoints.api.billing import lookup_allowed_private_repos, get_namespace_plan
 from endpoints.api.subscribe import check_repository_usage
@@ -77,6 +77,11 @@ class RepositoryList(ApiResource):
           'type': 'string',
           'description': 'Markdown encoded description for the repository',
         },
+        'kind': {
+          'type': 'string',
+          'description': 'The kind of repository',
+          'enum': ['image', 'application'],
+        }
       },
     },
   }
@@ -111,7 +116,9 @@ class RepositoryList(ApiResource):
       if not REPOSITORY_NAME_REGEX.match(repository_name):
         raise InvalidRequest('Invalid repository name')
 
-      repo = model.repository.create_repository(namespace_name, repository_name, owner, visibility)
+      kind = req.get('kind', 'image')
+      repo = model.repository.create_repository(namespace_name, repository_name, owner, visibility,
+                                                repo_kind=kind)
       repo.description = req['description']
       repo.save()
 
@@ -354,6 +361,7 @@ class Repository(RepositoryParamResource):
 
   @require_repo_admin
   @nickname('deleteRepository')
+  @disallow_for_app_repositories
   def delete(self, namespace, repository):
     """ Delete a repository. """
     model.repository.purge_repository(namespace, repository)
diff --git a/endpoints/api/repositorynotification.py b/endpoints/api/repositorynotification.py
index 1a68ec20d..ac14ec2e0 100644
--- a/endpoints/api/repositorynotification.py
+++ b/endpoints/api/repositorynotification.py
@@ -7,7 +7,7 @@ from flask import request
 from app import notification_queue
 from endpoints.api import (RepositoryParamResource, nickname, resource, require_repo_admin,
                            log_action, validate_json_request, request_error,
-                           path_param)
+                           path_param, disallow_for_app_repositories)
 from endpoints.exception import NotFound
 from endpoints.notificationevent import NotificationEvent
 from endpoints.notificationmethod import (NotificationMethod,
@@ -80,6 +80,7 @@ class RepositoryNotificationList(RepositoryParamResource):
 
   @require_repo_admin
   @nickname('createRepoNotification')
+  @disallow_for_app_repositories
   @validate_json_request('NotificationCreateRequest')
   def post(self, namespace, repository):
     """ Create a new notification for the specified repository. """
@@ -110,6 +111,7 @@ class RepositoryNotificationList(RepositoryParamResource):
 
   @require_repo_admin
   @nickname('listRepoNotifications')
+  @disallow_for_app_repositories
   def get(self, namespace, repository):
     """ List the notifications for the specified repository. """
     notifications = model.notification.list_repo_notifications(namespace, repository)
@@ -125,6 +127,7 @@ class RepositoryNotification(RepositoryParamResource):
   """ Resource for dealing with specific notifications. """
   @require_repo_admin
   @nickname('getRepoNotification')
+  @disallow_for_app_repositories
   def get(self, namespace, repository, uuid):
     """ Get information for the specified notification. """
     try:
@@ -140,6 +143,7 @@ class RepositoryNotification(RepositoryParamResource):
 
   @require_repo_admin
   @nickname('deleteRepoNotification')
+  @disallow_for_app_repositories
   def delete(self, namespace, repository, uuid):
     """ Deletes the specified notification. """
     deleted = model.notification.delete_repo_notification(namespace, repository, uuid)
@@ -158,6 +162,7 @@ class TestRepositoryNotification(RepositoryParamResource):
   """ Resource for queuing a test of a notification. """
   @require_repo_admin
   @nickname('testRepoNotification')
+  @disallow_for_app_repositories
   def post(self, namespace, repository, uuid):
     """ Queues a test notification for this repository. """
     try:
diff --git a/endpoints/api/secscan.py b/endpoints/api/secscan.py
index 7295e6604..9ec9dafb2 100644
--- a/endpoints/api/secscan.py
+++ b/endpoints/api/secscan.py
@@ -7,7 +7,7 @@ from app import secscan_api
 from data import model
 from endpoints.api import (require_repo_read, path_param,
                            RepositoryParamResource, resource, nickname, show_if, parse_args,
-                           query_param, truthy_bool)
+                           query_param, truthy_bool, disallow_for_app_repositories)
 from endpoints.exception import NotFound, DownstreamIssue
 from endpoints.api.manifest import MANIFEST_DIGEST_ROUTE
 from util.secscan.api import APIRequestFailure
@@ -67,6 +67,7 @@ class RepositoryImageSecurity(RepositoryParamResource):
 
   @require_repo_read
   @nickname('getRepoImageSecurity')
+  @disallow_for_app_repositories
   @parse_args()
   @query_param('vulnerabilities', 'Include vulnerabilities informations', type=truthy_bool,
                default=False)
@@ -88,6 +89,7 @@ class RepositoryManifestSecurity(RepositoryParamResource):
 
   @require_repo_read
   @nickname('getRepoManifestSecurity')
+  @disallow_for_app_repositories
   @parse_args()
   @query_param('vulnerabilities', 'Include vulnerabilities informations', type=truthy_bool,
                default=False)
diff --git a/endpoints/api/tag.py b/endpoints/api/tag.py
index bbc88ebcf..014052ad7 100644
--- a/endpoints/api/tag.py
+++ b/endpoints/api/tag.py
@@ -4,7 +4,8 @@ from flask import request, abort
 
 from endpoints.api import (resource, nickname, require_repo_read, require_repo_write,
                            RepositoryParamResource, log_action, validate_json_request,
-                           path_param, parse_args, query_param, truthy_bool)
+                           path_param, parse_args, query_param, truthy_bool,
+                           disallow_for_app_repositories)
 from endpoints.exception import NotFound
 from endpoints.api.image import image_view
 from data import model
@@ -18,6 +19,7 @@ class ListRepositoryTags(RepositoryParamResource):
   """ Resource for listing full repository tag history, alive *and dead*. """
 
   @require_repo_read
+  @disallow_for_app_repositories
   @parse_args()
   @query_param('specificTag', 'Filters the tags to the specific tag.', type=str, default='')
   @query_param('limit', 'Limit to the number of results to return per page. Max 100.', type=int, default=50)
@@ -82,6 +84,7 @@ class RepositoryTag(RepositoryParamResource):
   }
 
   @require_repo_write
+  @disallow_for_app_repositories
   @nickname('changeTagImage')
   @validate_json_request('MoveTag')
   def put(self, namespace, repository, tag):
@@ -116,6 +119,7 @@ class RepositoryTag(RepositoryParamResource):
     return 'Updated', 201
 
   @require_repo_write
+  @disallow_for_app_repositories
   @nickname('deleteFullTag')
   def delete(self, namespace, repository, tag):
     """ Delete the specified repository tag. """
@@ -136,6 +140,7 @@ class RepositoryTagImages(RepositoryParamResource):
   """ Resource for listing the images in a specific repository tag. """
   @require_repo_read
   @nickname('listTagImages')
+  @disallow_for_app_repositories
   @parse_args()
   @query_param('owned', 'If specified, only images wholely owned by this tag are returned.',
                type=truthy_bool, default=False)
@@ -206,6 +211,7 @@ class RestoreTag(RepositoryParamResource):
   }
 
   @require_repo_write
+  @disallow_for_app_repositories
   @nickname('restoreTag')
   @validate_json_request('RestoreTag')
   def post(self, namespace, repository, tag):
diff --git a/endpoints/api/test/__init__.py b/endpoints/api/test/__init__.py
new file mode 100644
index 000000000..e69de29bb
diff --git a/endpoints/api/test/shared.py b/endpoints/api/test/shared.py
new file mode 100644
index 000000000..110f1044c
--- /dev/null
+++ b/endpoints/api/test/shared.py
@@ -0,0 +1,58 @@
+import datetime
+import json
+
+from contextlib import contextmanager
+
+from data import model
+from endpoints.api import api
+
+CSRF_TOKEN_KEY = '_csrf_token'
+CSRF_TOKEN = '123csrfforme'
+
+
+@contextmanager
+def client_with_identity(auth_username, client):
+  with client.session_transaction() as sess:
+    if auth_username:
+      if auth_username is not None:
+        loaded = model.user.get_user(auth_username)
+        sess['user_id'] = loaded.uuid
+        sess['login_time'] = datetime.datetime.now()
+        sess[CSRF_TOKEN_KEY] = CSRF_TOKEN
+
+  yield client
+
+  with client.session_transaction() as sess:
+    sess['user_id'] = None
+    sess['login_time'] = None
+    sess[CSRF_TOKEN_KEY] = None
+
+
+def add_csrf_param(params):
+  """ Returns a params dict with the CSRF parameter added. """
+  params = params or {}
+  params[CSRF_TOKEN_KEY] = CSRF_TOKEN
+  return params
+
+
+def conduct_api_call(client, resource, method, params, body=None, expected_code=200):
+  """ Conducts an API call to the given resource via the given client, and ensures its returned
+      status matches the code given.
+
+      Returns the response.
+  """
+  params = add_csrf_param(params)
+
+  final_url = api.url_for(resource, **params)
+
+  headers = {}
+  headers.update({"Content-Type": "application/json"})
+
+  if body is not None:
+    body = json.dumps(body)
+
+  rv = client.open(final_url, method=method, data=body, headers=headers)
+  msg = '%s %s: got %s expected: %s | %s' % (method, final_url, rv.status_code, expected_code,
+                                             rv.data)
+  assert rv.status_code == expected_code, msg
+  return rv
diff --git a/endpoints/api/test/test_disallow_for_apps.py b/endpoints/api/test/test_disallow_for_apps.py
new file mode 100644
index 000000000..a9e3b4d00
--- /dev/null
+++ b/endpoints/api/test/test_disallow_for_apps.py
@@ -0,0 +1,80 @@
+import pytest
+
+from data import model
+from endpoints.api.repository import Repository
+from endpoints.api.build import (RepositoryBuildList, RepositoryBuildResource,
+                                 RepositoryBuildStatus, RepositoryBuildLogs)
+from endpoints.api.image import RepositoryImageList, RepositoryImage
+from endpoints.api.manifest import RepositoryManifestLabels, ManageRepositoryManifestLabel
+from endpoints.api.repositorynotification import (RepositoryNotification,
+                                                  RepositoryNotificationList,
+                                                  TestRepositoryNotification)
+from endpoints.api.secscan import RepositoryImageSecurity, RepositoryManifestSecurity
+from endpoints.api.tag import ListRepositoryTags, RepositoryTag, RepositoryTagImages, RestoreTag
+from endpoints.api.trigger import (BuildTriggerList, BuildTrigger, BuildTriggerSubdirs,
+                                   BuildTriggerActivate, BuildTriggerAnalyze, ActivateBuildTrigger,
+                                   TriggerBuildList, BuildTriggerFieldValues, BuildTriggerSources,
+                                   BuildTriggerSourceNamespaces)
+from endpoints.api.test.shared import client_with_identity, conduct_api_call
+from endpoints.test.fixtures import app, appconfig, database_uri, init_db_path, sqlitedb_file
+
+BUILD_ARGS = {'build_uuid': '1234'}
+IMAGE_ARGS = {'imageid': '1234', 'image_id': 1234}
+MANIFEST_ARGS = {'manifestref': 'sha256:abcd1234'}
+LABEL_ARGS = {'manifestref': 'sha256:abcd1234', 'labelid': '1234'}
+NOTIFICATION_ARGS = {'uuid': '1234'}
+TAG_ARGS = {'tag': 'foobar'}
+TRIGGER_ARGS = {'trigger_uuid': '1234'}
+FIELD_ARGS = {'trigger_uuid': '1234', 'field_name': 'foobar'}
+
+@pytest.mark.parametrize('resource, method, params', [
+  (Repository, 'delete', None),
+  (RepositoryBuildList, 'get', None),
+  (RepositoryBuildList, 'post', None),
+  (RepositoryBuildResource, 'get', BUILD_ARGS),
+  (RepositoryBuildResource, 'delete', BUILD_ARGS),
+  (RepositoryBuildStatus, 'get', BUILD_ARGS),
+  (RepositoryBuildLogs, 'get', BUILD_ARGS),
+  (RepositoryImageList, 'get', None),
+  (RepositoryImage, 'get', IMAGE_ARGS),
+  (RepositoryManifestLabels, 'get', MANIFEST_ARGS),
+  (RepositoryManifestLabels, 'post', MANIFEST_ARGS),
+  (ManageRepositoryManifestLabel, 'get', LABEL_ARGS),
+  (ManageRepositoryManifestLabel, 'delete', LABEL_ARGS),
+  (RepositoryNotificationList, 'get', None),
+  (RepositoryNotificationList, 'post', None),
+  (RepositoryNotification, 'get', NOTIFICATION_ARGS),
+  (RepositoryNotification, 'delete', NOTIFICATION_ARGS),
+  (TestRepositoryNotification, 'post', NOTIFICATION_ARGS),
+  (RepositoryImageSecurity, 'get', IMAGE_ARGS),
+  (RepositoryManifestSecurity, 'get', MANIFEST_ARGS),
+  (ListRepositoryTags, 'get', None),
+  (RepositoryTag, 'put', TAG_ARGS),
+  (RepositoryTag, 'delete', TAG_ARGS),
+  (RepositoryTagImages, 'get', TAG_ARGS),
+  (RestoreTag, 'post', TAG_ARGS),
+  (BuildTriggerList, 'get', None),
+  (BuildTrigger, 'get', TRIGGER_ARGS),
+  (BuildTrigger, 'delete', TRIGGER_ARGS),
+  (BuildTriggerSubdirs, 'post', TRIGGER_ARGS),
+  (BuildTriggerActivate, 'post', TRIGGER_ARGS),
+  (BuildTriggerAnalyze, 'post', TRIGGER_ARGS),
+  (ActivateBuildTrigger, 'post', TRIGGER_ARGS),
+  (TriggerBuildList, 'get', TRIGGER_ARGS),
+  (BuildTriggerFieldValues, 'post', FIELD_ARGS),
+  (BuildTriggerSources, 'post', TRIGGER_ARGS),
+  (BuildTriggerSourceNamespaces, 'get', TRIGGER_ARGS),
+])
+def test_disallowed_for_apps(resource, method, params, client):
+  namespace = 'devtable'
+  repository = 'someapprepo'
+
+  devtable = model.user.get_user('devtable')
+  model.repository.create_repository(namespace, repository, devtable, repo_kind='application')
+
+  params = params or {}
+  params['repository'] = '%s/%s' % (namespace, repository)
+
+  with client_with_identity('devtable', client) as cl:
+    conduct_api_call(cl, resource, method, params, None, 501)
+
diff --git a/endpoints/api/test/test_security.py b/endpoints/api/test/test_security.py
index 2d2babbe7..e14051a23 100644
--- a/endpoints/api/test/test_security.py
+++ b/endpoints/api/test/test_security.py
@@ -1,44 +1,29 @@
-import datetime
-
 import pytest
 
-from data import model
-from endpoints.api import api
+from endpoints.api.test.shared import client_with_identity, conduct_api_call
 from endpoints.api.superuser import SuperUserRepositoryBuildLogs, SuperUserRepositoryBuildResource
 from endpoints.api.superuser import SuperUserRepositoryBuildStatus
 from endpoints.test.fixtures import app, appconfig, database_uri, init_db_path, sqlitedb_file
 
+TEAM_PARAMS = {'orgname': 'buynlarge', 'teamname': 'owners'}
+BUILD_PARAMS = {'build_uuid': 'test-1234'}
 
-def client_with_identity(auth_username, client):
-  with client.session_transaction() as sess:
-    if auth_username:
-      if auth_username is not None:
-        loaded = model.user.get_user(auth_username)
-        sess['user_id'] = loaded.uuid
-        sess['login_time'] = datetime.datetime.now()
-  return client
+@pytest.mark.parametrize('resource,method,params,body,identity,expected', [
+  (SuperUserRepositoryBuildLogs, 'GET', BUILD_PARAMS, None, None, 401),
+  (SuperUserRepositoryBuildLogs, 'GET', BUILD_PARAMS, None, 'freshuser', 403),
+  (SuperUserRepositoryBuildLogs, 'GET', BUILD_PARAMS, None, 'reader', 403),
+  (SuperUserRepositoryBuildLogs, 'GET', BUILD_PARAMS, None, 'devtable', 400),
 
+  (SuperUserRepositoryBuildStatus, 'GET', BUILD_PARAMS, None, None, 401),
+  (SuperUserRepositoryBuildStatus, 'GET', BUILD_PARAMS, None, 'freshuser', 403),
+  (SuperUserRepositoryBuildStatus, 'GET', BUILD_PARAMS, None, 'reader', 403),
+  (SuperUserRepositoryBuildStatus, 'GET', BUILD_PARAMS, None, 'devtable', 400),
 
-@pytest.mark.parametrize('resource,identity,expected', [
-  (SuperUserRepositoryBuildLogs, None, 401),
-  (SuperUserRepositoryBuildLogs, 'freshuser', 403),
-  (SuperUserRepositoryBuildLogs, 'reader', 403),
-  (SuperUserRepositoryBuildLogs, 'devtable', 400),
-
-  (SuperUserRepositoryBuildStatus, None, 401),
-  (SuperUserRepositoryBuildStatus, 'freshuser', 403),
-  (SuperUserRepositoryBuildStatus, 'reader', 403),
-  (SuperUserRepositoryBuildStatus, 'devtable', 400),
-
-  (SuperUserRepositoryBuildResource, None, 401),
-  (SuperUserRepositoryBuildResource, 'freshuser', 403),
-  (SuperUserRepositoryBuildResource, 'reader', 403),
-  (SuperUserRepositoryBuildResource, 'devtable', 404),
+  (SuperUserRepositoryBuildResource, 'GET', BUILD_PARAMS, None, None, 401),
+  (SuperUserRepositoryBuildResource, 'GET', BUILD_PARAMS, None, 'freshuser', 403),
+  (SuperUserRepositoryBuildResource, 'GET', BUILD_PARAMS, None, 'reader', 403),
+  (SuperUserRepositoryBuildResource, 'GET', BUILD_PARAMS, None,  'devtable', 404),
 ])
-def test_super_user_build_endpoints(resource, identity, expected, client):
-  cl = client_with_identity(identity, client)
-  final_url = api.url_for(resource, build_uuid='1234')
-  rv = cl.open(final_url)
-  msg = '%s %s: %s expected: %s' % ('GET', final_url, rv.status_code, expected)
-  assert rv.status_code == expected, msg
-
+def test_api_security(resource, method, params, body, identity, expected, client):
+  with client_with_identity(identity, client) as cl:
+    conduct_api_call(cl, resource, method, params, body, expected)
diff --git a/endpoints/api/trigger.py b/endpoints/api/trigger.py
index f695e5538..2698bbb3b 100644
--- a/endpoints/api/trigger.py
+++ b/endpoints/api/trigger.py
@@ -15,7 +15,8 @@ from buildtrigger.triggerutil import (TriggerDeactivationException,
                                       RepositoryReadException, TriggerStartException)
 from endpoints.api import (RepositoryParamResource, nickname, resource, require_repo_admin,
                            log_action, request_error, query_param, parse_args, internal_only,
-                           validate_json_request, api, path_param, abort)
+                           validate_json_request, api, path_param, abort,
+                           disallow_for_app_repositories)
 from endpoints.exception import NotFound, Unauthorized, InvalidRequest
 from endpoints.api.build import build_status_view, trigger_view, RepositoryBuildStatus
 from endpoints.building import start_build, MaximumBuildsQueuedException
@@ -40,6 +41,7 @@ class BuildTriggerList(RepositoryParamResource):
   """ Resource for listing repository build triggers. """
 
   @require_repo_admin
+  @disallow_for_app_repositories
   @nickname('listBuildTriggers')
   def get(self, namespace_name, repo_name):
     """ List the triggers for the specified repository. """
@@ -56,6 +58,7 @@ class BuildTrigger(RepositoryParamResource):
   """ Resource for managing specific build triggers. """
 
   @require_repo_admin
+  @disallow_for_app_repositories
   @nickname('getBuildTrigger')
   def get(self, namespace_name, repo_name, trigger_uuid):
     """ Get information for the specified build trigger. """
@@ -67,6 +70,7 @@ class BuildTrigger(RepositoryParamResource):
     return trigger_view(trigger, can_admin=True)
 
   @require_repo_admin
+  @disallow_for_app_repositories
   @nickname('deleteBuildTrigger')
   def delete(self, namespace_name, repo_name, trigger_uuid):
     """ Delete the specified build trigger. """
@@ -110,6 +114,7 @@ class BuildTriggerSubdirs(RepositoryParamResource):
   }
 
   @require_repo_admin
+  @disallow_for_app_repositories
   @nickname('listBuildTriggerSubdirs')
   @validate_json_request('BuildTriggerSubdirRequest')
   def post(self, namespace_name, repo_name, trigger_uuid):
@@ -170,6 +175,7 @@ class BuildTriggerActivate(RepositoryParamResource):
   }
 
   @require_repo_admin
+  @disallow_for_app_repositories
   @nickname('activateBuildTrigger')
   @validate_json_request('BuildTriggerActivateRequest')
   def post(self, namespace_name, repo_name, trigger_uuid):
@@ -271,6 +277,7 @@ class BuildTriggerAnalyze(RepositoryParamResource):
   }
 
   @require_repo_admin
+  @disallow_for_app_repositories
   @nickname('analyzeBuildTrigger')
   @validate_json_request('BuildTriggerAnalyzeRequest')
   def post(self, namespace_name, repo_name, trigger_uuid):
@@ -420,6 +427,7 @@ class ActivateBuildTrigger(RepositoryParamResource):
   }
 
   @require_repo_admin
+  @disallow_for_app_repositories
   @nickname('manuallyStartBuildTrigger')
   @validate_json_request('RunParameters')
   def post(self, namespace_name, repo_name, trigger_uuid):
@@ -460,6 +468,7 @@ class ActivateBuildTrigger(RepositoryParamResource):
 class TriggerBuildList(RepositoryParamResource):
   """ Resource to represent builds that were activated from the specified trigger. """
   @require_repo_admin
+  @disallow_for_app_repositories
   @parse_args()
   @query_param('limit', 'The maximum number of builds to return', type=int, default=5)
   @nickname('listTriggerRecentBuilds')
@@ -479,6 +488,7 @@ FIELD_VALUE_LIMIT = 30
 class BuildTriggerFieldValues(RepositoryParamResource):
   """ Custom verb to fetch a values list for a particular field name. """
   @require_repo_admin
+  @disallow_for_app_repositories
   @nickname('listTriggerFieldValues')
   def post(self, namespace_name, repo_name, trigger_uuid, field_name):
     """ List the field values for a custom run field. """
@@ -522,6 +532,7 @@ class BuildTriggerSources(RepositoryParamResource):
   }
 
   @require_repo_admin
+  @disallow_for_app_repositories
   @nickname('listTriggerBuildSources')
   @validate_json_request('BuildTriggerSourcesRequest')
   def post(self, namespace_name, repo_name, trigger_uuid):
@@ -555,6 +566,7 @@ class BuildTriggerSources(RepositoryParamResource):
 class BuildTriggerSourceNamespaces(RepositoryParamResource):
   """ Custom verb to fetch the list of namespaces (orgs, projects, etc) for the trigger config. """
   @require_repo_admin
+  @disallow_for_app_repositories
   @nickname('listTriggerBuildSourceNamespaces')
   def get(self, namespace_name, repo_name, trigger_uuid):
     """ List the build sources for the trigger configuration thus far. """
diff --git a/endpoints/building.py b/endpoints/building.py
index 9ad61f8a1..a1e17897d 100644
--- a/endpoints/building.py
+++ b/endpoints/building.py
@@ -29,6 +29,9 @@ class MaximumBuildsQueuedException(Exception):
 
 
 def start_build(repository, prepared_build, pull_robot_name=None):
+  if repository.kind.name != 'image':
+    raise Exception('Attempt to start a build for application repository %s' % repository.id)
+
   if MAX_BUILD_QUEUE_RATE_ITEMS > 0 and MAX_BUILD_QUEUE_RATE_SECS > 0:
     queue_item_canonical_name = [repository.namespace_user.username, repository.name]
     now = datetime.utcnow()
diff --git a/endpoints/githubtrigger.py b/endpoints/githubtrigger.py
index 43b11e14d..7b4b12bb0 100644
--- a/endpoints/githubtrigger.py
+++ b/endpoints/githubtrigger.py
@@ -31,6 +31,8 @@ def attach_github_build_trigger(namespace_name, repo_name):
     if not repo:
       msg = 'Invalid repository: %s/%s' % (namespace_name, repo_name)
       abort(404, message=msg)
+    elif repo.kind.name != 'image':
+      abort(501)
 
     trigger = model.build.create_build_trigger(repo, 'github', token, current_user.db_user())
     repo_path = '%s/%s' % (namespace_name, repo_name)
diff --git a/endpoints/gitlabtrigger.py b/endpoints/gitlabtrigger.py
index 2626a068d..9f0f395c1 100644
--- a/endpoints/gitlabtrigger.py
+++ b/endpoints/gitlabtrigger.py
@@ -44,6 +44,8 @@ def attach_gitlab_build_trigger():
     if not repo:
       msg = 'Invalid repository: %s/%s' % (namespace, repository)
       abort(404, message=msg)
+    elif repo.kind.name != 'image':
+      abort(501)
 
     trigger = model.build.create_build_trigger(repo, 'gitlab', token, current_user.db_user())
     repo_path = '%s/%s' % (namespace, repository)
diff --git a/endpoints/v1/index.py b/endpoints/v1/index.py
index 028379554..2b5f6245f 100644
--- a/endpoints/v1/index.py
+++ b/endpoints/v1/index.py
@@ -182,6 +182,10 @@ def create_repository(namespace_name, repo_name):
             message='You do not have permission to modify repository %(namespace)s/%(repository)s',
             issue='no-repo-write-permission',
             namespace=namespace_name, repository=repo_name)
+    elif repo.kind != 'image':
+      msg = 'This repository is for managing %s resources and not container images.' % repo.kind
+      abort(405, message=msg, namespace=namespace_name)
+
   else:
     create_perm = CreateRepositoryPermission(namespace_name)
     if not create_perm.can():
@@ -223,6 +227,9 @@ def update_images(namespace_name, repo_name):
     if not repo:
       # Make sure the repo actually exists.
       abort(404, message='Unknown repository', issue='unknown-repo')
+    elif repo.kind != 'image':
+      msg = 'This repository is for managing %s resources and not container images.' % repo.kind
+      abort(405, message=msg, namespace=namespace_name)
 
     # Generate a job for each notification that has been added to this repo
     logger.debug('Adding notifications for repository')
@@ -255,6 +262,9 @@ def get_repository_images(namespace_name, repo_name):
     repo = model.get_repository(namespace_name, repo_name)
     if not repo:
       abort(404, message='Unknown repository', issue='unknown-repo')
+    elif repo.kind != 'image':
+      msg = 'This repository is for managing %s resources and not container images.' % repo.kind
+      abort(405, message=msg, namespace=namespace_name)
 
     logger.debug('Building repository image response')
     resp = make_response(json.dumps([]), 200)
diff --git a/endpoints/v1/registry.py b/endpoints/v1/registry.py
index f0bcc11b8..8cabb0507 100644
--- a/endpoints/v1/registry.py
+++ b/endpoints/v1/registry.py
@@ -83,6 +83,11 @@ def head_image_layer(namespace, repository, image_id, headers):
 
   logger.debug('Checking repo permissions')
   if permission.can() or model.repository_is_public(namespace, repository):
+    repo = model.get_repository(namespace, repository)
+    if repo.kind != 'image':
+      msg = 'This repository is for managing %s resources and not container images.' % repo.kind
+      abort(405, message=msg, image_id=image_id)
+
     logger.debug('Looking up placement locations')
     locations, _ = model.placement_locations_and_path_docker_v1(namespace, repository, image_id)
     if locations is None:
@@ -116,6 +121,11 @@ def get_image_layer(namespace, repository, image_id, headers):
 
   logger.debug('Checking repo permissions')
   if permission.can() or model.repository_is_public(namespace, repository):
+    repo = model.get_repository(namespace, repository)
+    if repo.kind != 'image':
+      msg = 'This repository is for managing %s resources and not container images.' % repo.kind
+      abort(405, message=msg, image_id=image_id)
+
     logger.debug('Looking up placement locations and path')
     locations, path = model.placement_locations_and_path_docker_v1(namespace, repository, image_id)
     if not locations or not path:
@@ -151,6 +161,11 @@ def put_image_layer(namespace, repository, image_id):
   if not permission.can():
     abort(403)
 
+  repo = model.get_repository(namespace, repository)
+  if repo.kind != 'image':
+    msg = 'This repository is for managing %s resources and not container images.' % repo.kind
+    abort(405, message=msg, image_id=image_id)
+
   logger.debug('Retrieving image')
   if model.storage_exists(namespace, repository, image_id):
     exact_abort(409, 'Image already exists')
@@ -255,6 +270,11 @@ def put_image_checksum(namespace, repository, image_id):
   if not permission.can():
     abort(403)
 
+  repo = model.get_repository(namespace, repository)
+  if repo.kind != 'image':
+    msg = 'This repository is for managing %s resources and not container images.' % repo.kind
+    abort(405, message=msg, image_id=image_id)
+
   # Docker Version < 0.10 (tarsum+sha):
   old_checksum = request.headers.get('X-Docker-Checksum')
 
@@ -324,6 +344,11 @@ def get_image_json(namespace, repository, image_id, headers):
   if not permission.can() and not model.repository_is_public(namespace, repository):
     abort(403)
 
+  repo = model.get_repository(namespace, repository)
+  if repo.kind != 'image':
+    msg = 'This repository is for managing %s resources and not container images.' % repo.kind
+    abort(405, message=msg, image_id=image_id)
+
   logger.debug('Looking up repo image')
   v1_metadata = model.docker_v1_metadata(namespace, repository, image_id)
   if v1_metadata is None:
@@ -353,6 +378,11 @@ def get_image_ancestry(namespace, repository, image_id, headers):
   if not permission.can() and not model.repository_is_public(namespace, repository):
     abort(403)
 
+  repo = model.get_repository(namespace, repository)
+  if repo.kind != 'image':
+    msg = 'This repository is for managing %s resources and not container images.' % repo.kind
+    abort(405, message=msg, image_id=image_id)
+
   ancestry_docker_ids = model.image_ancestry(namespace, repository, image_id)
   if ancestry_docker_ids is None:
     abort(404, 'Image %(image_id)s not found', issue='unknown-image', image_id=image_id)
@@ -373,6 +403,11 @@ def put_image_json(namespace, repository, image_id):
   if not permission.can():
     abort(403)
 
+  repo = model.get_repository(namespace, repository)
+  if repo.kind != 'image':
+    msg = 'This repository is for managing %s resources and not container images.' % repo.kind
+    abort(405, message=msg, image_id=image_id)
+
   logger.debug('Parsing image JSON')
   try:
     uploaded_metadata = request.data
diff --git a/endpoints/v1/tag.py b/endpoints/v1/tag.py
index 917cc6a6f..73eed61ee 100644
--- a/endpoints/v1/tag.py
+++ b/endpoints/v1/tag.py
@@ -27,6 +27,11 @@ def get_tags(namespace_name, repo_name):
   permission = ReadRepositoryPermission(namespace_name, repo_name)
 
   if permission.can() or model.repository_is_public(namespace_name, repo_name):
+    repo = model.get_repository(namespace_name, repo_name)
+    if repo.kind != 'image':
+      msg = 'This repository is for managing %s resources and not container images.' % repo.kind
+      abort(405, message=msg, namespace=namespace_name)
+
     tags = model.list_tags(namespace_name, repo_name)
     tag_map = {tag.name: tag.image.docker_image_id for tag in tags}
     return jsonify(tag_map)
@@ -42,6 +47,11 @@ def get_tag(namespace_name, repo_name, tag):
   permission = ReadRepositoryPermission(namespace_name, repo_name)
 
   if permission.can() or model.repository_is_public(namespace_name, repo_name):
+    repo = model.get_repository(namespace_name, repo_name)
+    if repo.kind != 'image':
+      msg = 'This repository is for managing %s resources and not container images.' % repo.kind
+      abort(405, message=msg, namespace=namespace_name)
+
     image_id = model.find_image_id_by_tag(namespace_name, repo_name, tag)
     if image_id is None:
       abort(404)
@@ -64,6 +74,11 @@ def put_tag(namespace_name, repo_name, tag):
     if not TAG_REGEX.match(tag):
       abort(400, TAG_ERROR)
 
+    repo = model.get_repository(namespace_name, repo_name)
+    if repo.kind != 'image':
+      msg = 'This repository is for managing %s resources and not container images.' % repo.kind
+      abort(405, message=msg, namespace=namespace_name)
+
     image_id = json.loads(request.data)
     model.create_or_update_tag(namespace_name, repo_name, image_id, tag)
 
@@ -86,6 +101,11 @@ def delete_tag(namespace_name, repo_name, tag):
   permission = ModifyRepositoryPermission(namespace_name, repo_name)
 
   if permission.can():
+    repo = model.get_repository(namespace_name, repo_name)
+    if repo.kind != 'image':
+      msg = 'This repository is for managing %s resources and not container images.' % repo.kind
+      abort(405, message=msg, namespace=namespace_name)
+
     model.delete_tag(namespace_name, repo_name, tag)
     track_and_log('delete_tag', model.get_repository(namespace_name, repo_name), tag=tag)
     return make_response('Deleted', 200)
diff --git a/endpoints/v2/__init__.py b/endpoints/v2/__init__.py
index d6af69db0..483265818 100644
--- a/endpoints/v2/__init__.py
+++ b/endpoints/v2/__init__.py
@@ -15,9 +15,9 @@ from auth.auth_context import get_grant_context
 from auth.permissions import (ReadRepositoryPermission, ModifyRepositoryPermission,
                               AdministerRepositoryPermission)
 from auth.registry_jwt_auth import process_registry_jwt_auth, get_auth_headers
-from data import model
+from data.interfaces.v2 import pre_oci_model as model
 from endpoints.decorators import anon_protect, anon_allowed
-from endpoints.v2.errors import V2RegistryException, Unauthorized
+from endpoints.v2.errors import V2RegistryException, Unauthorized, Unsupported, NameUnknown
 from util.http import abort
 from util.metrics.metricqueue import time_blueprint
 from util.registry.dockerver import docker_version
@@ -96,13 +96,21 @@ def _require_repo_permission(permission_class, scopes=None, allow_public=False):
     def wrapped(namespace_name, repo_name, *args, **kwargs):
       logger.debug('Checking permission %s for repo: %s/%s', permission_class,
                    namespace_name, repo_name)
+      repository = namespace_name + '/' + repo_name
+      repo = model.get_repository(namespace_name, repo_name)
+      if repo is None:
+        raise Unauthorized(repository=repository, scopes=scopes)
+
       permission = permission_class(namespace_name, repo_name)
       if (permission.can() or
           (allow_public and
-           model.repository.repository_is_public(namespace_name, repo_name))):
+           repo.is_public)):
+        if repo.kind != 'image':
+          msg = 'This repository is for managing %s resources and not container images.' % repo.kind
+          raise Unsupported(detail=msg)
         return func(namespace_name, repo_name, *args, **kwargs)
-      repository = namespace_name + '/' + repo_name
       raise Unauthorized(repository=repository, scopes=scopes)
+
     return wrapped
   return wrapper
 
diff --git a/endpoints/v2/tag.py b/endpoints/v2/tag.py
index 6b1ce20ad..683480ac2 100644
--- a/endpoints/v2/tag.py
+++ b/endpoints/v2/tag.py
@@ -3,7 +3,6 @@ from flask import jsonify
 from auth.registry_jwt_auth import process_registry_jwt_auth
 from endpoints.common import parse_repository_name
 from endpoints.v2 import v2_bp, require_repo_read, paginate
-from endpoints.v2.errors import NameUnknown
 from endpoints.decorators import anon_protect
 from data.interfaces.v2 import pre_oci_model as model
 
@@ -14,10 +13,6 @@ from data.interfaces.v2 import pre_oci_model as model
 @anon_protect
 @paginate()
 def list_all_tags(namespace_name, repo_name, limit, offset, pagination_callback):
-  repo = model.get_repository(namespace_name, repo_name)
-  if repo is None:
-    raise NameUnknown()
-
   tags = model.repository_tags(namespace_name, repo_name, limit, offset)
   response = jsonify({
     'name': '{0}/{1}'.format(namespace_name, repo_name),
diff --git a/endpoints/v2/v2auth.py b/endpoints/v2/v2auth.py
index 3469044c4..9478ae785 100644
--- a/endpoints/v2/v2auth.py
+++ b/endpoints/v2/v2auth.py
@@ -91,15 +91,25 @@ def generate_registry_jwt():
 
     final_actions = []
 
+    repo = model.get_repository(namespace, reponame)
+
+    repo_is_public = repo is not None and repo.is_public
+    invalid_repo_message = ''
+    if repo is not None and repo.kind != 'image':
+      invalid_repo_message = (('This repository is for managing %s resources ' +
+                               'and not container images.') % repo.kind)
+
     if 'push' in actions:
       # If there is no valid user or token, then the repository cannot be
       # accessed.
       if user is not None or token is not None:
         # Lookup the repository. If it exists, make sure the entity has modify
         # permission. Otherwise, make sure the entity has create permission.
-        repo = model.get_repository(namespace, reponame)
         if repo:
           if ModifyRepositoryPermission(namespace, reponame).can():
+            if repo.kind != 'image':
+              abort(405, invalid_repo_message)
+
             final_actions.append('push')
           else:
             logger.debug('No permission to modify repository %s/%s', namespace, reponame)
@@ -113,19 +123,24 @@ def generate_registry_jwt():
 
     if 'pull' in actions:
       # Grant pull if the user can read the repo or it is public.
-      if (ReadRepositoryPermission(namespace, reponame).can() or
-          model.repository_is_public(namespace, reponame)):
+      if ReadRepositoryPermission(namespace, reponame).can() or repo_is_public:
+        if repo is not None and repo.kind != 'image':
+          abort(405, invalid_repo_message)
+
         final_actions.append('pull')
       else:
         logger.debug('No permission to pull repository %s/%s', namespace, reponame)
 
     if '*' in actions:
       # Grant * user is admin
-      if (AdministerRepositoryPermission(namespace, reponame).can()):
+      if AdministerRepositoryPermission(namespace, reponame).can():
+        if repo is not None and repo.kind != 'image':
+          abort(405, invalid_repo_message)
+
         final_actions.append('*')
       else:
         logger.debug("No permission to administer repository %s/%s", namespace, reponame)
-        
+
     # Add the access for the JWT.
     access.append({
       'type': 'repository',
diff --git a/endpoints/verbs/__init__.py b/endpoints/verbs/__init__.py
index ff2c28f76..1c6f0af92 100644
--- a/endpoints/verbs/__init__.py
+++ b/endpoints/verbs/__init__.py
@@ -154,29 +154,35 @@ def _torrent_repo_verb(repo_image, tag, verb, **kwargs):
     abort(406)
 
   # Return the torrent.
-  public_repo = model.repository_is_public(repo_image.repository.namespace_name,
-                                           repo_image.repository.name)
-  torrent = _torrent_for_blob(derived_image.blob, public_repo)
+  repo = model.get_repository(repo_image.repository.namespace_name,
+                              repo_image.repository.name)
+  repo_is_public = repo is not None and repo.is_public
+  torrent = _torrent_for_blob(derived_image.blob, repo_is_public)
 
   # Log the action.
   track_and_log('repo_verb', repo_image.repository, tag=tag, verb=verb, torrent=True, **kwargs)
   return torrent
 
 
-def _verify_repo_verb(_, namespace, repository, tag, verb, checker=None):
-  permission = ReadRepositoryPermission(namespace, repository)
-  if not permission.can() and not model.repository_is_public(namespace, repository):
+def _verify_repo_verb(_, namespace, repo_name, tag, verb, checker=None):
+  permission = ReadRepositoryPermission(namespace, repo_name)
+  repo = model.get_repository(namespace, repo_name)
+  repo_is_public = repo is not None and repo.is_public
+  if not permission.can() and not repo_is_public:
     abort(403)
 
   # Lookup the requested tag.
-  tag_image = model.get_tag_image(namespace, repository, tag)
+  tag_image = model.get_tag_image(namespace, repo_name, tag)
   if tag_image is None:
     abort(404)
 
+  if repo is not None and repo.kind != 'image':
+    abort(405)
+
   # If there is a data checker, call it first.
   if checker is not None:
     if not checker(tag_image):
-      logger.debug('Check mismatch on %s/%s:%s, verb %s', namespace, repository, tag, verb)
+      logger.debug('Check mismatch on %s/%s:%s, verb %s', namespace, repo_name, tag, verb)
       abort(404)
 
   return tag_image
@@ -345,19 +351,24 @@ def get_squashed_tag(namespace, repository, tag):
 @process_auth
 @parse_repository_name()
 def get_tag_torrent(namespace_name, repo_name, digest):
+  repo = model.get_repository(namespace_name, repo_name)
+  repo_is_public = repo is not None and repo.is_public
+
   permission = ReadRepositoryPermission(namespace_name, repo_name)
-  public_repo = model.repository_is_public(namespace_name, repo_name)
-  if not permission.can() and not public_repo:
+  if not permission.can() and not repo_is_public:
     abort(403)
 
   user = get_authenticated_user()
-  if user is None and not public_repo:
+  if user is None and not repo_is_public:
     # We can not generate a private torrent cluster without a user uuid (e.g. token auth)
     abort(403)
 
+  if repo is not None and repo.kind != 'image':
+    abort(405)
+
   blob = model.get_repo_blob_by_digest(namespace_name, repo_name, digest)
   if blob is None:
     abort(404)
 
   metric_queue.repository_pull.Inc(labelvalues=[namespace_name, repo_name, 'torrent', True])
-  return _torrent_for_blob(blob, public_repo)
+  return _torrent_for_blob(blob, repo_is_public)
diff --git a/endpoints/web.py b/endpoints/web.py
index a0ad23755..ccae5e9dd 100644
--- a/endpoints/web.py
+++ b/endpoints/web.py
@@ -426,9 +426,12 @@ def confirm_recovery():
 @anon_protect
 def build_status_badge(namespace_name, repo_name):
   token = request.args.get('token', None)
+  repo = model.repository.get_repository(namespace_name, repo_name)
+  if repo and repo.kind.name != 'image':
+    abort(404)
+
   is_public = model.repository.repository_is_public(namespace_name, repo_name)
   if not is_public:
-    repo = model.repository.get_repository(namespace_name, repo_name)
     if not repo or token != repo.badge_token:
       abort(404)
 
@@ -628,6 +631,8 @@ def attach_bitbucket_trigger(namespace_name, repo_name):
     if not repo:
       msg = 'Invalid repository: %s/%s' % (namespace_name, repo_name)
       abort(404, message=msg)
+    elif repo.kind.name != 'image':
+      abort(501)
 
     trigger = model.build.create_build_trigger(repo, BitbucketBuildTrigger.service_name(), None,
                                                current_user.db_user())
@@ -661,6 +666,8 @@ def attach_custom_build_trigger(namespace_name, repo_name):
     if not repo:
       msg = 'Invalid repository: %s/%s' % (namespace_name, repo_name)
       abort(404, message=msg)
+    elif repo.kind.name != 'image':
+      abort(501)
 
     trigger = model.build.create_build_trigger(repo, CustomBuildTrigger.service_name(),
                                                None, current_user.db_user())
diff --git a/initdb.py b/initdb.py
index 55f55314b..0a284ae4a 100644
--- a/initdb.py
+++ b/initdb.py
@@ -19,7 +19,8 @@ from data.database import (db, all_models, beta_classes, Role, TeamRole, Visibil
                            ImageStorageTransformation, ImageStorageSignatureKind,
                            ExternalNotificationEvent, ExternalNotificationMethod, NotificationKind,
                            QuayRegion, QuayService, UserRegion, OAuthAuthorizationCode,
-                           ServiceKeyApprovalType, MediaType, LabelSourceType, UserPromptKind)
+                           ServiceKeyApprovalType, MediaType, LabelSourceType, UserPromptKind,
+                           RepositoryKind, TagKind, BlobPlacementLocation)
 from data import model
 from data.queue import WorkQueue
 from app import app, storage as store, tf
@@ -350,6 +351,9 @@ def initialize_database():
   ImageStorageLocation.create(name='local_eu')
   ImageStorageLocation.create(name='local_us')
 
+  BlobPlacementLocation.create(name='local_eu')
+  BlobPlacementLocation.create(name='local_us')
+
   ImageStorageTransformation.create(name='squash')
   ImageStorageTransformation.create(name='aci')
 
@@ -396,6 +400,15 @@ def initialize_database():
   MediaType.create(name='text/plain')
   MediaType.create(name='application/json')
   MediaType.create(name='text/markdown')
+  MediaType.create(name='application/vnd.cnr.blob.v0.tar+gzip')
+  MediaType.create(name='application/vnd.cnr.package-manifest.helm.v0.json')
+  MediaType.create(name='application/vnd.cnr.package-manifest.kpm.v0.json')
+  MediaType.create(name='application/vnd.cnr.package-manifest.docker-compose.v0.json')
+  MediaType.create(name='application/vnd.cnr.package.kpm.v0.tar+gzip')
+  MediaType.create(name='application/vnd.cnr.package.helm.v0.tar+gzip')
+  MediaType.create(name='application/vnd.cnr.package.docker-compose.v0.tar+gzip')
+  MediaType.create(name='application/vnd.cnr.manifests.v0.json')
+  MediaType.create(name='application/vnd.cnr.manifest.list.v0.json')
 
   LabelSourceType.create(name='manifest')
   LabelSourceType.create(name='api', mutable=True)
@@ -405,6 +418,13 @@ def initialize_database():
   UserPromptKind.create(name='enter_name')
   UserPromptKind.create(name='enter_company')
 
+  RepositoryKind.create(name='image')
+  RepositoryKind.create(name='application')
+
+  TagKind.create(name='tag')
+  TagKind.create(name='release')
+  TagKind.create(name='channel')
+
 
 def wipe_database():
   logger.debug('Wiping all data from the DB.')
diff --git a/test/data/test.db b/test/data/test.db
index b62a29fd2..874875be8 100644
Binary files a/test/data/test.db and b/test/data/test.db differ
diff --git a/test/registry_tests.py b/test/registry_tests.py
index a391535d2..2805b92e8 100644
--- a/test/registry_tests.py
+++ b/test/registry_tests.py
@@ -168,6 +168,7 @@ class FailureCodes:
   INVALID_REGISTRY = ('invalidregistry', 404, 404)
   DOES_NOT_EXIST = ('doesnotexist', 404, 404)
   INVALID_REQUEST = ('invalidrequest', 400, 400)
+  APP_REPOSITORY = ('apprepository', 405, 405)
 
 def _get_expected_code(expected_failure, version, success_status_code):
   """ Returns the HTTP status code for the expected failure under the specified protocol version
@@ -545,6 +546,8 @@ class V2RegistryPushMixin(V2RegistryMixin):
     expected_auth_code = 200
     if expect_failure == FailureCodes.INVALID_REGISTRY:
       expected_auth_code = 400
+    elif expect_failure == FailureCodes.APP_REPOSITORY:
+      expected_auth_code = 405
 
     self.do_auth(username, password, namespace, repository, scopes=scopes or ['push', 'pull'],
                  expected_code=expected_auth_code)
@@ -685,6 +688,8 @@ class V2RegistryPullMixin(V2RegistryMixin):
     expected_auth_code = 200
     if expect_failure == FailureCodes.UNAUTHENTICATED:
       expected_auth_code = 401
+    elif expect_failure == FailureCodes.APP_REPOSITORY:
+      expected_auth_code = 405
 
     self.do_auth(username, password, namespace, repository, scopes=['pull'],
                  expected_code=expected_auth_code)
@@ -765,6 +770,26 @@ class V2RegistryLoginMixin(object):
 
 
 class RegistryTestsMixin(object):
+  def test_application_repo(self):
+    # Create an application repository via the API.
+    self.conduct_api_login('devtable', 'password')
+    data = {
+      'repository': 'someapprepo',
+      'visibility': 'private',
+      'kind': 'application',
+      'description': 'test app repo',
+    }
+    self.conduct('POST', '/api/v1/repository', json_data=data, expected_code=201)
+
+    # Try to push to the repo, which should fail with a 405.
+    self.do_push('devtable', 'someapprepo', 'devtable', 'password',
+                 expect_failure=FailureCodes.APP_REPOSITORY)
+
+    # Try to pull from the repo, which should fail with a 405.
+    self.do_pull('devtable', 'someapprepo', 'devtable', 'password',
+                 expect_failure=FailureCodes.APP_REPOSITORY)
+
+
   def test_middle_layer_different_sha(self):
     if self.push_version == 'v1':
       # No SHAs to munge in V1.
diff --git a/test/specs.py b/test/specs.py
index abbfe04de..d7bb79061 100644
--- a/test/specs.py
+++ b/test/specs.py
@@ -508,3 +508,101 @@ def build_v2_index_specs():
     IndexV2TestSpec('v2.cancel_upload', 'DELETE', ANOTHER_ORG_REPO, upload_uuid=FAKE_UPLOAD_ID).
       request_status(401, 401, 401, 401, 404),
   ]
+
+
+class VerbTestSpec(object):
+  def __init__(self, index_name, method_name, repo_name, rpath=False, **kwargs):
+    self.index_name = index_name
+    self.repo_name = repo_name
+    self.method_name = method_name
+    self.single_repository_path = rpath
+
+    self.kwargs = kwargs
+
+    self.anon_code = 401
+    self.no_access_code = 403
+    self.read_code = 200
+    self.admin_code = 200
+    self.creator_code = 200
+
+  def request_status(self, anon_code=401, no_access_code=403, read_code=200, creator_code=200,
+                     admin_code=200):
+    self.anon_code = anon_code
+    self.no_access_code = no_access_code
+    self.read_code = read_code
+    self.creator_code = creator_code
+    self.admin_code = admin_code
+    return self
+
+  def get_url(self):
+    if self.single_repository_path:
+      return url_for(self.index_name, repository=self.repo_name, **self.kwargs)
+    else:
+      (namespace, repo_name) = self.repo_name.split('/')
+      return url_for(self.index_name, namespace=namespace, repository=repo_name, **self.kwargs)
+
+  def gen_basic_auth(self, username, password):
+    encoded = b64encode('%s:%s' % (username, password))
+    return 'basic %s' % encoded
+
+ACI_ARGS = {
+  'server': 'someserver',
+  'tag': 'fake',
+  'os': 'linux',
+  'arch': 'x64',
+}
+
+def build_verbs_specs():
+  return [
+    # get_aci_signature
+    VerbTestSpec('verbs.get_aci_signature', 'GET', PUBLIC_REPO, **ACI_ARGS).
+      request_status(404, 404, 404, 404, 404),
+
+    VerbTestSpec('verbs.get_aci_signature', 'GET', PRIVATE_REPO, **ACI_ARGS).
+      request_status(403, 403, 404, 403, 404),
+
+    VerbTestSpec('verbs.get_aci_signature', 'GET', ORG_REPO, **ACI_ARGS).
+      request_status(403, 403, 404, 403, 404),
+
+    VerbTestSpec('verbs.get_aci_signature', 'GET', ANOTHER_ORG_REPO, **ACI_ARGS).
+      request_status(403, 403, 403, 403, 404),
+
+    # get_aci_image
+    VerbTestSpec('verbs.get_aci_image', 'GET', PUBLIC_REPO, **ACI_ARGS).
+      request_status(404, 404, 404, 404, 404),
+
+    VerbTestSpec('verbs.get_aci_image', 'GET', PRIVATE_REPO, **ACI_ARGS).
+      request_status(403, 403, 404, 403, 404),
+
+    VerbTestSpec('verbs.get_aci_image', 'GET', ORG_REPO, **ACI_ARGS).
+      request_status(403, 403, 404, 403, 404),
+
+    VerbTestSpec('verbs.get_aci_image', 'GET', ANOTHER_ORG_REPO, **ACI_ARGS).
+      request_status(403, 403, 403, 403, 404),
+
+    # get_squashed_tag
+    VerbTestSpec('verbs.get_squashed_tag', 'GET', PUBLIC_REPO, tag='fake').
+      request_status(404, 404, 404, 404, 404),
+
+    VerbTestSpec('verbs.get_squashed_tag', 'GET', PRIVATE_REPO, tag='fake').
+      request_status(403, 403, 404, 403, 404),
+
+    VerbTestSpec('verbs.get_squashed_tag', 'GET', ORG_REPO, tag='fake').
+      request_status(403, 403, 404, 403, 404),
+
+    VerbTestSpec('verbs.get_squashed_tag', 'GET', ANOTHER_ORG_REPO, tag='fake').
+      request_status(403, 403, 403, 403, 404),
+
+    # get_tag_torrent
+    VerbTestSpec('verbs.get_tag_torrent', 'GET', PUBLIC_REPO, digest='sha256:1234', rpath=True).
+      request_status(404, 404, 404, 404, 404),
+
+    VerbTestSpec('verbs.get_tag_torrent', 'GET', PRIVATE_REPO, digest='sha256:1234', rpath=True).
+      request_status(403, 403, 404, 403, 404),
+
+    VerbTestSpec('verbs.get_tag_torrent', 'GET', ORG_REPO, digest='sha256:1234', rpath=True).
+      request_status(403, 403, 404, 403, 404),
+
+    VerbTestSpec('verbs.get_tag_torrent', 'GET', ANOTHER_ORG_REPO, digest='sha256:1234', rpath=True).
+      request_status(403, 403, 403, 403, 404),
+  ]
diff --git a/test/test_api_usage.py b/test/test_api_usage.py
index fe8d56bd1..dd0094b8d 100644
--- a/test/test_api_usage.py
+++ b/test/test_api_usage.py
@@ -2551,8 +2551,8 @@ class TestRepoBuilds(ApiTestCase):
   def test_getrepo_nobuilds(self):
     self.login(ADMIN_ACCESS_USER)
 
-    # Queries: Permission + the list query
-    with assert_query_count(2):
+    # Queries: Permission + the list query + app check
+    with assert_query_count(3):
       json = self.getJsonResponse(RepositoryBuildList,
                                   params=dict(repository=ADMIN_ACCESS_USER + '/simple'))
 
@@ -2561,8 +2561,8 @@ class TestRepoBuilds(ApiTestCase):
   def test_getrepobuilds(self):
     self.login(ADMIN_ACCESS_USER)
 
-    # Queries: Permission + the list query
-    with assert_query_count(2):
+    # Queries: Permission + the list query + app check
+    with assert_query_count(3):
       json = self.getJsonResponse(RepositoryBuildList,
                                   params=dict(repository=ADMIN_ACCESS_USER + '/building'))
 
diff --git a/test/test_verbs_endpoint_security.py b/test/test_verbs_endpoint_security.py
new file mode 100644
index 000000000..ac6ac36b9
--- /dev/null
+++ b/test/test_verbs_endpoint_security.py
@@ -0,0 +1,100 @@
+import unittest
+
+import endpoints.decorated # Register the various exceptions via decorators.
+
+from app import app
+from endpoints.verbs import verbs
+from initdb import setup_database_for_testing, finished_database_for_testing
+from test.specs import build_verbs_specs
+
+app.register_blueprint(verbs, url_prefix='/c1')
+
+NO_ACCESS_USER = 'freshuser'
+READ_ACCESS_USER = 'reader'
+ADMIN_ACCESS_USER = 'devtable'
+CREATOR_ACCESS_USER = 'creator'
+
+
+class EndpointTestCase(unittest.TestCase):
+  def setUp(self):
+    setup_database_for_testing(self)
+
+  def tearDown(self):
+    finished_database_for_testing(self)
+
+
+class _SpecTestBuilder(type):
+  @staticmethod
+  def _test_generator(url, test_spec, attrs):
+    def test(self):
+      with app.test_client() as c:
+        headers = {}
+
+        if attrs['auth_username']:
+          headers['Authorization'] = test_spec.gen_basic_auth(attrs['auth_username'], 'password')
+
+        expected_status = getattr(test_spec, attrs['result_attr'])
+
+        rv = c.open(url, headers=headers, method=test_spec.method_name)
+        msg = '%s %s: got %s, expected: %s (auth: %s | headers %s)' % (test_spec.method_name,
+          test_spec.index_name, rv.status_code, expected_status, attrs['auth_username'],
+          headers)
+
+        self.assertEqual(rv.status_code, expected_status, msg)
+
+    return test
+
+
+  def __new__(cls, name, bases, attrs):
+    with app.test_request_context() as ctx:
+      specs = attrs['spec_func']()
+      for test_spec in specs:
+        test_name = '%s_%s_%s_%s_%s' % (test_spec.index_name, test_spec.method_name,
+                                        test_spec.repo_name, attrs['auth_username'] or 'anon',
+                                        attrs['result_attr'])
+        test_name = test_name.replace('/', '_').replace('-', '_')
+
+        test_name = 'test_' + test_name.lower().replace('verbs.', 'verbs_')
+        url = test_spec.get_url()
+        attrs[test_name] = _SpecTestBuilder._test_generator(url, test_spec, attrs)
+
+    return type(name, bases, attrs)
+
+
+class TestAnonymousAccess(EndpointTestCase):
+  __metaclass__ = _SpecTestBuilder
+  spec_func = build_verbs_specs
+  result_attr = 'anon_code'
+  auth_username = None
+
+
+class TestNoAccess(EndpointTestCase):
+  __metaclass__ = _SpecTestBuilder
+  spec_func = build_verbs_specs
+  result_attr = 'no_access_code'
+  auth_username = NO_ACCESS_USER
+
+
+class TestReadAccess(EndpointTestCase):
+  __metaclass__ = _SpecTestBuilder
+  spec_func = build_verbs_specs
+  result_attr = 'read_code'
+  auth_username = READ_ACCESS_USER
+
+
+class TestCreatorAccess(EndpointTestCase):
+  __metaclass__ = _SpecTestBuilder
+  spec_func = build_verbs_specs
+  result_attr = 'creator_code'
+  auth_username = CREATOR_ACCESS_USER
+
+
+class TestAdminAccess(EndpointTestCase):
+  __metaclass__ = _SpecTestBuilder
+  spec_func = build_verbs_specs
+  result_attr = 'admin_code'
+  auth_username = ADMIN_ACCESS_USER
+
+
+if __name__ == '__main__':
+  unittest.main()