ecr
clowdhaus/ecr/aws
Terraform module to create AWS ECR resources πΊπ¦
Amazon ECR Terraform module Terraform module which creates Amazon ECR resources. Usage See examples directory for working examples to reference: Private Repository ``hcl module "ecr" { source = "terraform-aws-modules/ecr/aws" repository_name = "private-example" repository_read_write_access_arns = ["arn:aws:iam::012345678901:role/terraform"] repository_lifecycle_policy = jsonencode({ rules = [ { rulePriority = 1, description = "Keep last 30 images", selection = { tagStatus = "tagged", tagPrefixList = ["v"], countType = "imageCountMoreThan", countNumber = 30 }, action = { type = "expire" } } ] }) tags = { Terraform = "true" Environment = "dev" } } ` Public Repository `hcl module "public_ecr" { source = "terraform-aws-modules/ecr/aws" repository_name = "public-example" repository_type = "publ
| Name | Type | Description | Default |
|---|---|---|---|
| repository_policy | string | The JSON policy to apply to the repository. If not specified, uses the default p | null |
| repository_force_delete | bool | If `true`, will delete the repository even if it contains images. Defaults to `f | null |
| repository_read_access_arns | list(string) | The ARNs of the IAM users/roles that have read access to the repository | [] |
| repository_lifecycle_policy | string | The policy document. This is a JSON formatted string. See more details about [Po | "" |
| create_registry_policy | bool | Determines whether a registry policy will be created | false |
| registry_policy | string | The policy document. This is a JSON formatted string | null |
| registry_pull_through_cache_rules | map(map(string)) | List of pull through cache rules to create | {} |
| repository_type | string | The type of repository to create. Either `public` or `private` | "private" |
| repository_name | string | The name of the repository | "" |
| repository_encryption_type | string | The encryption type for the repository. Must be one of: `KMS` or `AES256`. Defau | null |
| attach_repository_policy | bool | Determines whether a repository policy will be attached to the repository | true |
| create_repository_policy | bool | Determines whether a repository policy will be created | true |
| repository_lambda_read_access_arns | list(string) | The ARNs of the Lambda service roles that have read access to the repository | [] |
| create_lifecycle_policy | bool | Determines whether a lifecycle policy will be created | true |
| registry_scan_type | string | the scanning type to set for the registry. Can be either `ENHANCED` or `BASIC` | "ENHANCED" |
| manage_registry_scanning_configuration | bool | Determines whether the registry scanning configuration will be managed | false |
| registry_scan_rules | any | One or multiple blocks specifying scanning rules to determine which repository f | [] |
| create_registry_replication_configuration | bool | Determines whether a registry replication configuration will be created | false |
| registry_replication_rules | any | The replication rules for a replication configuration. A maximum of 10 are allow | [] |
| create | bool | Determines whether resources will be created (affects all resources) | true |
repository_name β Name of the repositoryrepository_arn β Full ARN of the repositoryrepository_registry_id β The registry ID where the repository was createdrepository_url β The URL of the repositoryAzure landing zones Terraform module
Terraform supermodule for the Terraform platform engineering for Azure
Terraform module to deploy landing zone subscriptions (and much more) in Azure
Terraform Module to define a consistent naming convention by (namespace, stage,