k8s-ecr-login-renew icon indicating copy to clipboard operation
k8s-ecr-login-renew copied to clipboard

Renews Docker login credentials for an AWS ECR container registry.

Results 11 k8s-ecr-login-renew issues
Sort by recently updated
recently updated
newest added

### Changes - Added `zap` logger for logging. - We're using the development zap logger because it's pretty unstructured and not logging using JSON. ### Reviewer(s) to verify - Logging...

what do you think about creating simple helm chart with cronjob/serviceaccount deployment and put it here in /deploy folder and maybe to some public chart museum. it would be easier...

I have seen many versions of this script where the default service account of each namespace would be updated with the image pull secrets to avoid replacing chart values Maybe...

These builds are surprisingly slow. I wonder if there's any way to speed them up?

Hi, I am wondering how the pod or deployment is creating with imagepullsecret. I have enabled the few namespace as target in cronjob and all the namespace there is secret...

A common scenario for utilizing this tool involves refreshing AWS ECR credentials within a Kubernetes deployment outside of AWS. Presently, the deployment assumes the presence of the ACCOUNT_ID environment variable,...

When deploying k8s-ecr-login-renew via the helm chart (and likely any other method), it's advantageous to execute an initial job run immediately after installation. This aligns with the standard practice that...

When `targetNamespace` in values.yaml only contains '*', helm will raise error when trying to install or upgrade, ref: https://stackoverflow.com/a/71176695 ``` $ helm upgrade --install k8s-ecr-login-renew nabsul/k8s-ecr-login-renew \ --namespace aws-${awsAccountId} \...

Hi, I'd like your tiny tool to create the ECR secret in EVERY namespace EXCEPT those contained in a blacklist. Is it difficult to implement? Thanks for your attention

Is there any chance you could implement the ability for this app/chart to have the ability to leverage the [aws-pod-identity-webhook ](https://github.com/aws/amazon-eks-pod-identity-webhook) which implements [iRSA](https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html) ? It should be pretty straight...