CDK construct to deploy docker image to Amazon ECR
Project description
cdk-ecr-deployment
CDK construct to synchronize single docker image between docker registries.
[!IMPORTANT]
Please use the latest version of this package, which is
v4.(Older versions are no longer supported).
Features
- Copy image or multi-architecture image index from ECR/external registry to (another) ECR/external registry
- Copy an archive tarball image from s3 to ECR/external registry
Examples
from aws_cdk.aws_ecr_assets import DockerImageAsset
image = DockerImageAsset(self, "CDKDockerImage",
directory=path.join(__dirname, "docker")
)
# Copy from cdk docker image asset to another ECR.
ecrdeploy.ECRDeployment(self, "DeployDockerImage1",
src=ecrdeploy.DockerImageName(image.image_uri),
dest=ecrdeploy.DockerImageName(f"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest")
)
# Copy from docker registry to ECR.
ecrdeploy.ECRDeployment(self, "DeployDockerImage2",
src=ecrdeploy.DockerImageName("nginx:latest"),
dest=ecrdeploy.DockerImageName(f"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest")
)
# Copy from private docker registry to ECR.
# The format of secret in aws secrets manager must be either:
# - plain text in format <username>:<password>
# - json in format {"username":"<username>","password":"<password>"}
ecrdeploy.ECRDeployment(self, "DeployDockerImage3",
src=ecrdeploy.DockerImageName("javacs3/nginx:latest", "username:password"),
# src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),
# src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),
dest=ecrdeploy.DockerImageName(f"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest")
).add_to_principal_policy(iam.PolicyStatement(
effect=iam.Effect.ALLOW,
actions=["secretsmanager:GetSecretValue"
],
resources=["*"]
))
# Copy multi-architecture image index (manifest) with all architectures.
ecrdeploy.ECRDeployment(self, "DeployDockerImage4",
src=ecrdeploy.DockerImageName("public.ecr.aws/nginx/nginx:latest"),
dest=ecrdeploy.DockerImageName(f"{cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx4:manifest"),
copy_image_index=True,
arch_image_tags={
"amd64": "my-nginx-amd64",
"arm64": "my-nginx-arm64"
}
)
Sample: test/example.ecr-deployment.ts
After cloning the repository, install dependencies and run a full build:
yarn --frozen-lockfile --check-files
yarn build
Then run the example like this:
# Run the following command to try the sample.
npx cdk deploy -a "npx ts-node -P tsconfig.dev.json --prefer-ts-exts test/example.ecr-deployment.ts"
To run the DockerHub example you will first need to setup a Secret in AWS Secrets Manager to provide DockerHub credentials.
Replace username:access-token with your credentials.
Please note that Secrets will occur a cost.
aws secretsmanager create-secret --name DockerHubCredentials --secret-string "username:access-token"
From the output, copy the ARN of your new secret and export it as env variable
export DOCKERHUB_SECRET_ARN="<ARN>"
Finally run:
# Run the following command to try the sample.
npx cdk deploy -a "npx ts-node -P tsconfig.dev.json --prefer-ts-exts test/dockerhub-example.ecr-deployment.ts"
If your Secret is encrypted, you might have to adjust the example to also grant decrypt permissions.
API
Tech Details & Contribution
The core of this project relies on containers/image which is used by Skopeo. Please take a look at those projects before contribution.
To support a new docker image source(like docker tarball in s3), you need to implement image transport interface. You could take a look at docker-archive transport for a good start.
Any error in the custom resource provider will show up in the CloudFormation error log as Invalid PhysicalResourceId, because of this: https://github.com/aws/aws-lambda-go/issues/107. You need to go into the CloudWatch Log Group to find the real error.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file cdk_ecr_deployment-4.1.0.tar.gz.
File metadata
- Download URL: cdk_ecr_deployment-4.1.0.tar.gz
- Upload date:
- Size: 20.8 MB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.14.2
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
27e3e739f4908a40424027a4acbbd7f266223cb1d0c4c1a9c8877d1cef7e8ef6
|
|
| MD5 |
d037df79c6eb6e7b84a1bfc604c688a4
|
|
| BLAKE2b-256 |
0608e5b5a8442341626e60860c0eec6f842d7d4cec7beab562e7673ef00ad63f
|
Provenance
The following attestation bundles were made for cdk_ecr_deployment-4.1.0.tar.gz:
Publisher:
release.yml on cdklabs/cdk-ecr-deployment
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
cdk_ecr_deployment-4.1.0.tar.gz -
Subject digest:
27e3e739f4908a40424027a4acbbd7f266223cb1d0c4c1a9c8877d1cef7e8ef6 - Sigstore transparency entry: 868803151
- Sigstore integration time:
-
Permalink:
cdklabs/cdk-ecr-deployment@a24c6669cd2da71816960362f535a6a0118c23c8 -
Branch / Tag:
refs/heads/main - Owner: https://github.com/cdklabs
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
release.yml@a24c6669cd2da71816960362f535a6a0118c23c8 -
Trigger Event:
push
-
Statement type:
File details
Details for the file cdk_ecr_deployment-4.1.0-py3-none-any.whl.
File metadata
- Download URL: cdk_ecr_deployment-4.1.0-py3-none-any.whl
- Upload date:
- Size: 20.8 MB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.14.2
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
20a860613cfd67e18e5171196599c04e106c2ce99e87bed738e4f945cab7fc73
|
|
| MD5 |
842a97a9e27ce1cba04c26da3028f2b9
|
|
| BLAKE2b-256 |
e95e88add5962f3ac51643fe23adc5aff552f73b77f7e16205ba09503c565feb
|
Provenance
The following attestation bundles were made for cdk_ecr_deployment-4.1.0-py3-none-any.whl:
Publisher:
release.yml on cdklabs/cdk-ecr-deployment
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
cdk_ecr_deployment-4.1.0-py3-none-any.whl -
Subject digest:
20a860613cfd67e18e5171196599c04e106c2ce99e87bed738e4f945cab7fc73 - Sigstore transparency entry: 868803106
- Sigstore integration time:
-
Permalink:
cdklabs/cdk-ecr-deployment@a24c6669cd2da71816960362f535a6a0118c23c8 -
Branch / Tag:
refs/heads/main - Owner: https://github.com/cdklabs
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
release.yml@a24c6669cd2da71816960362f535a6a0118c23c8 -
Trigger Event:
push
-
Statement type: