ecr
clouddrove/ecr/aws
This terraform module is used to create ECR on AWS.
Terraform AWS ECR This terraform module is used to create ECR on AWS. We eat, drink, sleep and most importantly love DevOps. We are working towards strategies for standardizing architecture while ensuring security for the infrastructure. We are strong believer of the philosophy Bigger problems are always solved by breaking them into smaller manageable problems . Resonating with microservices architecture, it is considered best-practice to run database, cluster, storage in smaller connected yet manageable pieces within the infrastructure. This module is basically combination of Terraform open source and includes automatation tests and examples. It also helps to create and improve your infrastructure with minimalistic code instead of maintaining the whole infrastructure code yourself. We hav
| Name | Type | Description | Default |
|---|---|---|---|
| managedby | string | ManagedBy, eg 'CloudDrove' | "anmol@clouddrove.com" |
| delimiter | string | Delimiter to be used between `organization`, `environment`, `name` and `attribut | "-" |
| max_image_count | number | How many Docker Image versions AWS ECR will store. | 10 |
| max_untagged_image_count | number | How many Untagged Docker Image versions AWS ECR will store. | 1 |
| principals_full_access | list(any) | Principal ARN to provide with full access to the ECR. | [] |
| repository_force_delete | bool | If `true`, will delete the repository even if it contains images. Defaults to `f | false |
| name | string | Name (e.g. `app` or `cluster`). | "" |
| label_order | list(any) | Label order, e.g. `name`,`application`. | [
"name",
"environment"
] |
| principals_readonly_access | list(any) | Principal ARN to provide with readonly access to the ECR. | [] |
| scan_on_push | bool | Indicates whether images are scanned after being pushed to the repository (true) | true |
| repository | string | Terraform current module repo | "https://github.com/clouddrove/terraform |
| image_tag_mutability | string | The tag mutability setting for the repository. | "IMMUTABLE" |
| environment | string | Environment (e.g. `prod`, `dev`, `staging`). | "test" |
| kms_key | string | The ARN of the KMS key to use when encryption_type is `KMS`. If not specified, u | null |
| enable_public_ecr | bool | Set to false to prevent the module from creating any resources. | false |
| public_repository_catalog_data | any | Catalog data configuration for the repository | {} |
| attributes | list(any) | Additional attributes (e.g. `1`). | [
"environment",
"name"
] |
| enable | bool | Set to false to prevent the module from creating any resources. | true |
| enable_private_ecr | bool | Set to false to prevent the module from creating any resources. | false |
| use_fullname | string | Set 'true' to use `namespace-stage-name` for ecr repository name, else `name`. | "" |
repository_name — Registry name.arn — Registry ARN.tags — A mapping of tags to assign to the resource.registry_id — Registry ID.registry_url — Registry URL.Azure landing zones Terraform module
Terraform supermodule for the Terraform platform engineering for Azure
Terraform module to deploy landing zone subscriptions (and much more) in Azure
Terraform Module to define a consistent naming convention by (namespace, stage,