404

[ Avaa Bypassed ]




Upload:

Command:

botdev@18.225.254.112: ~ $
**Example 1: To create a repository**

The following ``create-repository`` example creates a repository inside the specified namespace in the default registry for an account. ::

    aws ecr create-repository \
        --repository-name project-a/nginx-web-app

Output::

    {
        "repository": {
            "registryId": "123456789012",
            "repositoryName": "sample-repo",
            "repositoryArn": "arn:aws:ecr:us-west-2:123456789012:repository/project-a/nginx-web-app"
        }
    }

For more information, see `Creating a Repository <https://docs.aws.amazon.com/AmazonECR/latest/userguide/repository-create.html>`__ in the *Amazon ECR User Guide*.

**Example 2: To create a repository configured with image tag immutability**

The following ``create-repository`` example creates a repository configured for tag immutability in the default registry for an account. ::

    aws ecr create-repository \
        --repository-name sample-repo \
        --image-tag-mutability IMMUTABLE

Output::

    {
        "repository": {
            "registryId": "123456789012",
            "repositoryName": "sample-repo",
            "repositoryArn": "arn:aws:ecr:us-west-2:123456789012:repository/sample-repo",
            "imageTagMutability": "IMMUTABLE"
        }
    }

For more information, see `Image Tag Mutability <https://docs.aws.amazon.com/AmazonECR/latest/userguide/image-tag-mutability.html>`__ in the *Amazon ECR User Guide*.

**Example 3: To create a repository configured with a scanning configuration**

The following ``create-repository`` example creates a repository configured to perform a vulnerability scan on image push in the default registry for an account. ::

    aws ecr create-repository \
        --repository-name sample-repo \
        --image-scanning-configuration scanOnPush=true

Output::

    {
        "repository": {
            "registryId": "123456789012",
            "repositoryName": "sample-repo",
            "repositoryArn": "arn:aws:ecr:us-west-2:123456789012:repository/sample-repo",
            "imageScanningConfiguration": {
                "scanOnPush": true
            }
        }
    }

For more information, see `Image Scanning <https://docs.aws.amazon.com/AmazonECR/latest/userguide/image-scanning.html>`__ in the *Amazon ECR User Guide*.

Filemanager

Name Type Size Permission Actions
batch-check-layer-availability.rst File 836 B 0644
batch-delete-image.rst File 1.29 KB 0644
batch-get-image.rst File 3.1 KB 0644
complete-layer-upload.rst File 664 B 0644
create-repository.rst File 2.25 KB 0644
delete-lifecycle-policy.rst File 647 B 0644
delete-repository-policy.rst File 675 B 0644
delete-repository.rst File 702 B 0644
describe-image-scan-findings.rst File 2.32 KB 0644
describe-images.rst File 767 B 0644
describe-repositories.rst File 612 B 0644
get-authorization-token.rst File 491 B 0644
get-download-url-for-layer.rst File 1 KB 0644
get-lifecycle-policy-preview.rst File 1.22 KB 0644
get-lifecycle-policy.rst File 888 B 0644
get-login-password.rst File 894 B 0644
get-login-password_description.rst File 914 B 0644
get-login_description.rst File 1.06 KB 0644
get-repository-policy.rst File 686 B 0644
initiate-layer-upload.rst File 344 B 0644
list-images.rst File 798 B 0644
list-tags-for-resource.rst File 433 B 0644
put-image-scanning-configuration.rst File 672 B 0644
put-image-tag-mutability.rst File 686 B 0644
put-image.rst File 6.26 KB 0644
put-lifecycle-policy.rst File 1.35 KB 0644
set-repository-policy.rst File 1.16 KB 0644
start-image-scan.rst File 810 B 0644
start-lifecycle-policy-preview.rst File 1.45 KB 0644
tag-resource.rst File 334 B 0644
untag-resource.rst File 319 B 0644
upload-layer-part.rst File 680 B 0644