-
Notifications
You must be signed in to change notification settings - Fork 473
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
support private registry in the ecs task definition #17119
Conversation
9c71da8
to
4b68f9a
Compare
## Using a private container image repository | ||
|
||
First create an AWS Secrets Manager Secret with your preferred method, for example: | ||
```shell |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Do you prefer this method over creating the secretsmanager secret as a terraform resource and then recommending either a secretsmanager secret version or setting the version on the created secret via the AWS CLI?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I suppose I was conflicted about how to go about this. Since its not like a database secret that can be generated randomly, this needs to be supplied and I didn't want to have a strong opinion on how the user creates the secret (thus supplying the secret material).
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We can go forward with this as-is. This way the secret can be created either via terraform or via the CLI. The only complication would be if a custom KMS key were used on the user-created resource. This is at least covers probably 95% of the use-case.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Assuming this is fully tested, we should get this in place. We have examples that use a "fleetdm/fleet:" image, and we should never recommend that without authentication for pull-rate reasons.
Hi everyone, Can we have any update on this issue ? Is this going to be include in the next major release (4.49) ? Thank you 🙏 |
I'll fix the conflicts and try to get it tested today. Sorry it fell off my radar a bit. Thanks for your patience. |
All good, thanks! |
4b68f9a
to
025004b
Compare
@rfairburn @edwardsb Should this be merged? |
I need to stand up an environment that uses a private registry via credentials (over IAM). I hopefully can have that done today. |
This is good to go. Tested with private docker image on Dockerhub. |
@edwardsb Looks like just a minor conflict to resolve then we can merge this in. Thanks! cc @rfairburn |
025004b
to
568a795
Compare
I still need to run through testing this but its essentially ready for review.