-
Notifications
You must be signed in to change notification settings - Fork 9.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
New data source aws_ecr_authorization_token #12395
New data source aws_ecr_authorization_token #12395
Conversation
Verified acceptance tests: $ make testacc TEST=./aws/ TESTARGS='-run=TestAccAWSEcrDataSource_ecrAuthorizationToken'
==> Checking that code complies with gofmt requirements...
TF_ACC=1 go test ./aws/ -v -count 1 -parallel 20 -run=TestAccAWSEcrDataSource_ecrAuthorizationToken -timeout 120m
=== RUN TestAccAWSEcrDataSource_ecrAuthorizationToken
--- PASS: TestAccAWSEcrDataSource_ecrAuthorizationToken (41.01s)
PASS
ok github.com/terraform-providers/terraform-provider-aws/aws 41.049s |
Thanks for reviewing!, I'll implement the changes ASAP. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for the latest updates @edgarpoce, LGTM 👍
Output of acceptance test:
--- PASS: TestAccAWSEcrAuthorizationTokenDataSource_basic (32.09s)
Hi @edgarpoce, in using this data-source in practice such that it's attributes are used as input's to the |
@anGie44 , If I understand the problem you are mentioning correctly I think it's bug in the Docker provider. |
@edgarpoce thanks for pointing to the PR in the docker provider! I can now confirm that building that provider from your PR branch and using this new data-source works as I'd expect 👍 e.g.
|
538ebee
to
4d7afdf
Compare
hi @edgarpoce! do you mind fixing the conflicts that have emerged? (I made an attempt here but found it more involved than I expected so reverted to how it was last). I'd like to get this into the next release :) |
@anGie44 , the conflict is fixed now. Thanks! |
This has been released in version 2.67.0 of the Terraform AWS provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template for triage. Thanks! |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thanks! |
Community Note
Summary
Add a new data source called aws_ecr_authorization_token that provides the necessary credentials to access private ECR repositories
see https://docs.aws.amazon.com/AmazonECR/latest/APIReference/API_GetAuthorizationToken.html
Reasoning for change
As a terraform user I want to manage Docker images in private ECR repositories. In order to do this I need to get the credentials of the private repository.
The end goal is to be able to build and manage remote docker images fully in Terraform.
e.g.
Relates OR Closes #11332
Release note for CHANGELOG:
Output from acceptance testing: