Skip to content

Instantly share code, notes, and snippets.

@moosh3
Created March 3, 2020 20:04
Show Gist options
  • Save moosh3/8a4ad1d0507a064b95a7a1a1ab430a6e to your computer and use it in GitHub Desktop.
Save moosh3/8a4ad1d0507a064b95a7a1a1ab430a6e to your computer and use it in GitHub Desktop.
apiVersion: apps/v1
kind: Deployment
metadata:
name: registry-creds
namespace: kube-system
spec:
replicas: 1
selector:
matchLabels:
name: registry-creds
template:
metadata:
labels:
name: registry-creds
spec:
containers:
- image: upmcenterprises/registry-creds:1.10
name: registry-creds
imagePullPolicy: Always
env:
- name: AWS_ACCESS_KEY_ID
valueFrom:
secretKeyRef:
name: registry-creds-ecr
key: AWS_ACCESS_KEY_ID
- name: AWS_SECRET_ACCESS_KEY
valueFrom:
secretKeyRef:
name: registry-creds-ecr
key: AWS_SECRET_ACCESS_KEY
- name: awsaccount
valueFrom:
secretKeyRef:
name: registry-creds-ecr
key: aws-account
- name: awsregion
valueFrom:
secretKeyRef:
name: registry-creds-ecr
key: aws-region
- name: aws_assume_role
valueFrom:
secretKeyRef:
name: registry-creds-ecr
key: aws-assume-role
---
apiVersion: v1
kind: Secret
metadata:
name: registry-creds-ecr
namespace: kube-system
labels:
app: registry-creds
cloud: ecr
data:
AWS_ACCESS_KEY_ID: Y2hhbmdlbWU=
AWS_SECRET_ACCESS_KEY: Y2hhbmdlbWU=
AWS_SESSION_TOKEN: Y2hhbmdlbWU=
aws-account: Y2hhbmdlbWU=
aws-region: Y2hhbmdlbWU=
aws-assume-role: Y2hhbmdlbWU=
AWS_SESSION_TOKEN: ""
type: Opaque
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment