Use this action to configure Amazon Elastic Container Registry (ECR) credentials for use in CloudBees workflows.
This action logs in a local container configuration file to one or more ECR private registries, or to an ECR public registry.
Make sure to add the following to your YAML file:
- name: Check out repo
uses: actions/checkout@v1
- name: Configure AWS credentials
uses: cloudbees-io/configure-aws-credentials@v1
with:
role-to-assume: arn:aws:iam::123456789012:role/my-cloudbees-actions-role
aws-region: your-aws-region| Input name | Data type | Required? | Description |
|---|---|---|---|
|
String |
No |
A comma-delimited list of ECR Private registry hostnames (for example,
|
Log in to an ECR private registry, then build, tag, and push a container image to it, as in the following example:
- name: Log in to ECR
id: login-ecr
uses: cloudbees-io/configure-ecr-credentials@v1
- name: Build, tag, and push a container image to ECR
uses: cloudbees-io/kaniko@v1
with:
destination: 123456789012.dkr.ecr.us-east-1.amazonaws.com/my-ecr-repo:latestLog in to an ECR private registry, and then package and push a Helm chart to it, as in the following example:
- name: Log in to ECR
id: login-ecr
uses: cloudbees-io/configure-ecr-credentials@v1
- name: Package and push helm chart to ECR
env:
REGISTRY: ${{ steps.login-ecr.outputs.registry }}
REPOSITORY: my-ecr-repo
uses: docker://alpine/helm:latest
run: |
helm package my-ecr-repo
helm push my-ecr-repo-0.1.0.tgz oci://123456789012.dkr.ecr.us-east-1.amazonaws.com|
Note
|
(for Kaniko users) Helm and Kaniko use the same credential store, so you can use the same credentials for both. |
Add the AWS credentials configuration action, and then provide cross-account access by listing each target registry as a fully-qualified hostname, as in the following example:
- name: Configure AWS credentials
uses: cloudbees-io/configure-aws-credentials@v1
with:
role-to-assume: arn:aws:iam::123456789012:role/my-cloudbees-actions-role
aws-region: eu-west-2
- name: Log in to ECR
id: login-ecr
uses: cloudbees-io/configure-ecr-credentials@v1
with:
registries: "123456789012.dkr.ecr.eu-west-2.amazonaws.com,998877665544.dkr.ecr.eu-west-2.amazonaws.com"|
Note
|
The repository on account Refer to AWS documentation on allowing secondary account access for how to correctly configure ECR policies. |
By default, only the current AWS region is configured. To configure multiple regions, provide a comma-separated list of the regions, as in the following example:
- name: Configure AWS credentials
uses: cloudbees-io/configure-aws-credentials@v1
with:
role-to-assume: arn:aws:iam::123456789012:role/my-cloudbees-actions-role
aws-region: us-east-1
- name: Log in to ECR
id: login-ecr
uses: cloudbees-io/configure-ecr-credentials@v1
with:
regions: eu-west-2,ap-south-2,ap-southeast-2This code is made available under the MIT license.
-
Learn more about using actions in CloudBees workflows.
-
Learn about the CloudBees platform.