Create
cancel
Showing results for 
Search instead for 
Did you mean: 
Sign up Log in
Deleted user
0 / 0 points
Next:
badges earned

Your Points Tracker
Challenges
Leaderboard
  • Global
  • Feed

Badge for your thoughts?

You're enrolled in our new beta rewards program. Join our group to get the inside scoop and share your feedback.

Join group
Recognition
Give the gift of kudos
You have 0 kudos available to give
Who do you want to recognize?
Why do you want to recognize them?
Kudos
Great job appreciating your peers!
Check back soon to give more kudos.

Past Kudos Given
No kudos given
You haven't given any kudos yet. Share the love above and you'll see it here.

It's not the same without you

Join the community to find out what other Atlassian users are discussing, debating and creating.

Atlassian Community Hero Image Collage

Build image from ECR with assume-role

In the documentation it states you can use images from ECR for your pipeline.

Is it possible to get the images with AWS assume-role configured?

 

Documentation:

image:
  name: <aws_account_id>.dkr.ecr.<region>.amazonaws.com/openjdk:8
  aws: 
    access-key: $AWS_ACCESS_KEY
    secret-key: $AWS_SECRET_KEY

 

3 answers

Follow up; we have faced same problem.

Suggested solution; allow to assume as a role

image:
  name: <aws_account_id>.dkr.ecr.<region>.amazonaws.com/openjdk:8
  aws: 
assume-role: $AWS_ROLE access-key: $AWS_ACCESS_KEY secret-key: $AWS_SECRET_KEY
0 votes
Alex Tran Atlassian Team Jul 29, 2019

Are you asking if the credentials given could be for a IAM role instead of a IAM user ?

We've got the following setup:

Account A: IAM Users

Account B: ECR with container images and IAM Role to be assumed

 

So what I am looking for:

- Provide credentials for IAM User in Account A

- Provide IAM Role to assume in Account B 

- Use container image from Account B for the bitbucket pipeline

 

This currently can't be done, forcing me to add a user in account B to be able to access the image.

I tried it without the assume role part, but that still fails because it will search for IAM Users in Account B.

It also doesn't work if you grant access to users via ECR policy on account B. This is because docker login is done only against account A. Aws CLI has a solution for this via `--registry-id` flag. Can we somehow get that functionality here?

Suggest an answer

Log in or Sign up to answer
TAGS
Community showcase
Published in Bitbucket Pipelines

Bitbucket Pipelines Runners is now in open beta

We are excited to announce the open beta program for self-hosted runners. Bitbucket Pipelines Runners is available to everyone. Please try it and let us know your feedback. If you have any issue...

755 views 15 10
Read article

Community Events

Connect with like-minded Atlassian users at free events near you!

Find an event

Connect with like-minded Atlassian users at free events near you!

Unfortunately there are no Community Events near you at the moment.

Host an event

You're one step closer to meeting fellow Atlassian users at your local event. Learn more about Community Events

Events near you