Skip to content

Latest commit

 

History

History
15 lines (11 loc) · 816 Bytes

cloud-aws-ECR.md

File metadata and controls

15 lines (11 loc) · 816 Bytes

INFO

Amazon Elastic Container Registry - Docker container registry aws ecr get-login aws ecr get-login-password | docker login --username AWS --password-stdin XXXXXXXXX.dkr.ecr.eu-west-1.amazonaws.com/some-registry && docker pull XXXXXXXX.dkr.ecr.eu-west-1.amazonaws.com/docker-test:latest && docker inspect docker-test aws ecr list-images --repository-name REPO_NAME --registry-id ACCOUNT_ID aws ecr batch-get-image --repository-name XXXX --registry-id XXXX --image-ids imageTag=latest aws ecr get-download-url-for-layer --repository-name XXXX --registry-id XXXX --layer-digest "sha256:XXXXX"

TOOLS

After AWS credentials compromised

docker run -it -v ~/.aws:/root/.aws/ -v /var/run/docker.sock:/var/run/docker.sock -v ${PWD}:/app/ rhinosecuritylabs/ccat:latest