Use this action to configure Amazon Elastic Container Registry (ECR) credentials for use in CloudBees workflows.
This action logs in a local container configuration file to one or more ECR private registries, or to an ECR public registry.
Make sure to add the following to your YAML file:
- name: Check out repo
uses: actions/checkout@v1
- name: Configure AWS credentials
uses: cloudbees-io/configure-aws-credentials@v1
with:
role-to-assume: arn:aws:iam::123456789012:role/my-cloudbees-actions-role
aws-region: aws-region-1
Input name | Data type | Required? | Description |
---|---|---|---|
|
String |
No |
The registry ID. |
Log in to an ECR private registry, then build, tag, and push a container image to it.
In your YAML file, add:
- name: Log in to ECR
id: login-ecr
uses: cloudbees-io/configure-ecr-credentials@v1
- name: Build, tag, and push a container image to ECR
uses: cloudbees-io/kaniko@v1
with:
destination: 123456789012.dkr.ecr.us-east-1.amazonaws.com/my-ecr-repo:latest
Log in to an ECR private registry, and then package and push a Helm chart to it.
In your YAML file, add:
- name: Log in to ECR
id: login-ecr
uses: cloudbees-io/configure-ecr-credentials@v1
- name: Package and push helm chart to ECR
env:
REGISTRY: ${{ steps.login-ecr.outputs.registry }}
REPOSITORY: my-ecr-repo
uses: docker://alpine/helm:latest
run: |
helm package my-ecr-repo
helm push my-ecr-repo-0.1.0.tgz oci://123456789012.dkr.ecr.us-east-1.amazonaws.com
Note
|
(for Kaniko users) Helm and Kaniko use the same credential store, so you can use the same credentials for both. |
Add the AWS credentials configuration action, and then provide cross-account access.
In your YAML file, add:
- name: Configure AWS credentials
uses: cloudbees-io/configure-aws-credentials@v1
with:
role-to-assume: arn:aws:iam::123456789012:role/my-cloudbees-actions-role
aws-region: aws-region-1
- name: Log in to ECR
id: login-ecr
uses: cloudbees-io/configure-ecr-credentials@v1
with:
registries: "123456789012,998877665544"
Note
|
The repository on account Refer to AWS documentation on allowing secondary account access for how to correctly configure ECR policies. |
This code is made available under the MIT license.
-
Learn more about using actions in CloudBees workflows.
-
Learn about the CloudBees platform.