Join GitHub today
GitHub is home to over 40 million developers working together to host and review code, manage projects, and build software together.Sign up
Allow pulling images from private Docker registry #71
As per the documentation for Fargate using private docker registries
I have tested this with
NOTE this PR does not change the execution task role to allow permissions for AWS Secrets Manager access and instead leaves up to the caller to ensure this by using the
As per the documentation for Fargate using private docker registries this commit introduces a new variable `repository_credentials_secret_arn` used to pass in the AWS Secrets Manager path to your credentials secret. Note that this also requires the Lambda function execution task role to have access to this secret.  https://aws.amazon.com/blogs/compute/introducing-private-registry-authentication-support-for-aws-fargate/
We need the role name rather than the ARN of the role to attach policies to it later. Yes we could infer the name from the ARN using split etc but meh, just output it.