I have desperately looked for documentation, examples, and posts that hint at a way to restrict certain policies to certain Docker image tags, but haven't been able to find a single example or even a request where someone else has sought to do the same. It's also unfortunate that so much documentation for AWS metadata-type tags (The wrong type of tag) shows up in the search result.
I naively tried to set the tag into the resource value, but was able to access it fro ma test-user without a problem. Of course, I may have inadvertently added the wrong kind of access, too, but then I found it difficult to determine which permissions were generally responsible for allowing docker-pulls and which permissions specifically related to pulling tags (if any).
My attempt involved attaching both the "AmazonEC2ContainerRegistryReadOnly" managed-policy and a second policy that had the following:
{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Sid": "VisualEditor0",
            "Effect": "Allow",
            "Action": [
                "ecr:DescribeImageScanFindings",
                "ecr:GetLifecyclePolicyPreview",
                "ecr:GetDownloadUrlForLayer",
                "ecr:BatchGetImage",
                "ecr:DescribeImages",
                "ecr:BatchCheckLayerAvailability",
                "ecr:GetRepositoryPolicy",
                "ecr:GetLifecyclePolicy"
            ],
            "Resource": "arn:aws:ecr:us-east-1:326764833890:repository/*:development-latest"
        },
        {
            "Sid": "VisualEditor1",
            "Effect": "Allow",
            "Action": [
                "ecr:GetRegistryPolicy",
                "ecr:DescribeRegistry",
                "ecr:GetAuthorizationToken"
            ],
            "Resource": "*"
        }
    ]
}
Is restricting to certain Docker-image tags supported? Am I missing something else, above?
Thank you.