Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commit7ca286a

Browse files
authored
Update amazon-ecr.md (#832)
* Update amazon-ecr.mdEdited content for IAM role requirements* Update amazon-ecr.md* Update amazon-ecr.mdEdited IAM prereq after feedback* Update amazon-ecr.md
1 parente2b4521 commit7ca286a

File tree

1 file changed

+13
-9
lines changed

1 file changed

+13
-9
lines changed

‎_docs/gitops-integrations/container-registries/amazon-ecr.md‎

Lines changed: 13 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -30,23 +30,27 @@ For detailed information, see [How Amazon Elastic Container Registry Works with
3030

3131

3232
###IAM Role integration
33-
Before you configure settings in Codefresh to integrate Amazon ECR:
34-
*[Create an IAM (Identity and Access Management) role](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html){:target="\_blank"}
3533

36-
Define the role in trusted relationships with`Effect: Allow` and`Action: sts:AssumeRole` on the EKS cluster.
37-
For example:
34+
* IAM Role for ECR integration
35+
Amazon ECR integration in Codefresh requires an Identity and Access Management (IAM) Role with permissions to the ECR registry.
36+
For details, see[Create the ECR integration IAM role](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html){:target="\_blank"}.
37+
38+
* Other IAM roles
39+
Once you have an ECR integration IAM Role, you can use a different IAM role if that Role can assume the ECR integration IAM Role.
40+
To use an IAM Role assigned to the Service Account used by app-proxy for example, the Role must be explicitly configured with a trust relationship to assume the ECR integration IAM Role - even if the other IAM Role is the ECR integration IAM Role.
41+
42+
For example:
3843
```yaml
3944
{
4045
"Effect":"Allow",
4146
"Principal":{
42-
"AWS":"arn:aws:iam::XXXXX:role/eksctl-awscluster-ServiceRole-XXXXXX"
47+
"AWS":"arn:aws:iam::XXXXX:role/eksctl-awscluster-ServiceRole-XXXXXX"# IAM role for ECR integration
4348
},
44-
"Action":"sts:AssumeRole",
45-
"Condition":{}
49+
"Action":"sts:AssumeRole",
50+
"Condition":{}
4651
}
4752
```
4853

49-
5054
###Access Key integration
5155
You must generate an access key ID and the access secret for the IAM user, and download or copy them to a secure location.
5256

@@ -76,7 +80,7 @@ The table describes the arguments required for GitOps integrations with Amazon E
7680
| ----------| --------|
7781
|**Integration name**| A friendly name for the integration. This is the name you will reference in the third-party CI platform/tool.|
7882
|**All Runtimes/Selected Runtimes**| {::nomarkdown} The runtimes in the account with which to share the integration resource. <br>The integration resource is created in the Git repository with the shared configuration, within <codeclass="highlighter-rouge">resources</code>. The exact location depends on whether the integration is shared with all or specific runtimes: <br><ul><li>All runtimes: Created in <codeclass="highlighter-rouge">resources/all-runtimes-all-clusters/</code></li><li>Selected runtimes: Created in <codeclass="highlighter-rouge">resources/runtimes/<runtime-name></code></li></ul> You can reference the Docker Hub integration in the CI tool. {:/}|
79-
|**IAM Role settings**| IAM Role integration is not supported for Hosted GitOps Runtimes.{::nomarkdown}<ul><li><b>IAM Role</b>: The name of the IAM role you defined with the specific permissions for authentication to the ECR registry.</li><li><b>Region</b>: The geographic region hosting the container registry. Define the region nearest to you.</li></ul>{:/}|
83+
|**IAM Role settings**| IAM Role integration is not supported for Hosted GitOps Runtimes.{::nomarkdown}<ul><li><b>IAM Role</b>: The name of the IAM role you definedfor ECR integrationwith the specific permissions for authentication to the ECR registry.</li><li><b>Region</b>: The geographic region hosting the container registry. Define the region nearest to you.</li></ul>{:/}|
8084
|**Access Key settings**| Access Key integration is supported for both Hosted and Hybrid GitOps Runtimes.{::nomarkdown}<ul><li><b>Access Key ID</b>: The access key generated for the IAM user, and paired with the <b>Secret Access Key</b> for authentication to the ECR registry.</li><li><b>Secret Access Key</b>: The secret access key generated for and paired with the <b>Access Key</b> for authentication to the ECR registry.</li><li><b>Region</b>: The geographic region hosting the ECR registry. Define the region nearest to you.</li></ul>{:/}|
8185
|**Test connection**| Click to verify that you can connect to the specified instance before you commit changes.|
8286

0 commit comments

Comments
 (0)

[8]ページ先頭

©2009-2025 Movatter.jp