https://github.com/cdklabs/cdk-ecr-deployment
A CDK construct to deploy docker image to Amazon ECR
https://github.com/cdklabs/cdk-ecr-deployment
aws cdk deployment docker ecr transport
Last synced: 3 months ago
JSON representation
A CDK construct to deploy docker image to Amazon ECR
- Host: GitHub
- URL: https://github.com/cdklabs/cdk-ecr-deployment
- Owner: cdklabs
- License: apache-2.0
- Created: 2021-04-13T12:28:33.000Z (about 4 years ago)
- Default Branch: main
- Last Pushed: 2025-04-14T00:35:53.000Z (3 months ago)
- Last Synced: 2025-04-14T22:15:05.807Z (3 months ago)
- Topics: aws, cdk, deployment, docker, ecr, transport
- Language: Go
- Homepage:
- Size: 4.09 MB
- Stars: 171
- Watchers: 16
- Forks: 38
- Open Issues: 12
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# cdk-ecr-deployment
[](https://github.com/cdklabs/cdk-ecr-deployment/actions/workflows/release.yml)
[](https://www.npmjs.com/package/cdk-ecr-deployment)
[](https://pypi.org/project/cdk-ecr-deployment)
[](https://www.npmjs.com/package/cdk-ecr-deployment)
[](https://pypi.org/project/cdk-ecr-deployment)CDK construct to synchronize single docker image between docker registries.
> [!IMPORTANT]
>
> Please use the latest version of this package, which is `v4`.
>
> (Older versions are no longer supported).## Features
- Copy image from ECR/external registry to (another) ECR/external registry
- Copy an archive tarball image from s3 to ECR/external registry## Examples
```ts
import { DockerImageAsset } from 'aws-cdk-lib/aws-ecr-assets';const image = new DockerImageAsset(this, 'CDKDockerImage', {
directory: path.join(__dirname, 'docker'),
});// Copy from cdk docker image asset to another ECR.
new ecrdeploy.ECRDeployment(this, 'DeployDockerImage1', {
src: new ecrdeploy.DockerImageName(image.imageUri),
dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx:latest`),
});// Copy from docker registry to ECR.
new ecrdeploy.ECRDeployment(this, 'DeployDockerImage2', {
src: new ecrdeploy.DockerImageName('nginx:latest'),
dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx2:latest`),
});// Copy from private docker registry to ECR.
// The format of secret in aws secrets manager must be either:
// - plain text in format :
// - json in format {"username":"","password":""}
new ecrdeploy.ECRDeployment(this, 'DeployDockerImage3', {
src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'username:password'),
// src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'aws-secrets-manager-secret-name'),
// src: new ecrdeploy.DockerImageName('javacs3/nginx:latest', 'arn:aws:secretsmanager:us-west-2:000000000000:secret:id'),
dest: new ecrdeploy.DockerImageName(`${cdk.Aws.ACCOUNT_ID}.dkr.ecr.us-west-2.amazonaws.com/my-nginx3:latest`),
}).addToPrincipalPolicy(new iam.PolicyStatement({
effect: iam.Effect.ALLOW,
actions: [
'secretsmanager:GetSecretValue',
],
resources: ['*'],
}));
```## Sample: [test/example.ecr-deployment.ts](./test/example.ecr-deployment.ts)
After cloning the repository, install dependencies and run a full build:
```console
yarn --frozen-lockfile --check-files
yarn build
```Then run the example like this:
```shell
# Run the following command to try the sample.
npx cdk deploy -a "npx ts-node -P tsconfig.dev.json --prefer-ts-exts test/example.ecr-deployment.ts"
```To run the DockerHub example you will first need to setup a Secret in AWS Secrets Manager to provide DockerHub credentials.
Replace `username:access-token` with your credentials.
**Please note that Secrets will occur a cost.**```console
aws secretsmanager create-secret --name DockerHubCredentials --secret-string "username:access-token"
```From the output, copy the ARN of your new secret and export it as env variable
```console
export DOCKERHUB_SECRET_ARN=""
```Finally run:
```shell
# Run the following command to try the sample.
npx cdk deploy -a "npx ts-node -P tsconfig.dev.json --prefer-ts-exts test/dockerhub-example.ecr-deployment.ts"
```If your Secret is encrypted, you might have to adjust the example to also grant decrypt permissions.
## [API](./API.md)
## Tech Details & Contribution
The core of this project relies on [containers/image](https://github.com/containers/image) which is used by [Skopeo](https://github.com/containers/skopeo).
Please take a look at those projects before contribution.To support a new docker image source(like docker tarball in s3), you need to implement [image transport interface](https://github.com/containers/image/blob/master/types/types.go). You could take a look at [docker-archive](https://github.com/containers/image/blob/ccb87a8d0f45cf28846e307eb0ec2b9d38a458c2/docker/archive/transport.go) transport for a good start.
Any error in the custom resource provider will show up in the CloudFormation error log as `Invalid PhysicalResourceId`, because of this: . You need to go into the CloudWatch Log Group to find the real error.