110.00 b

Description: I'm writing this after seeing and learning how to get permissions to the private registry very easily when the CI pipeline is running, especially if you know credStore well.

#100#Infra#110#DevOps_Engineer_Infra#110.00#Docker#110.00 b#Docker_credential_credsStore__with_Kaniko

What is that credential way credsStore. this

image: alpine
stages:
  - build_and_push
build and push docker image:
  stage: build_and_push
  variables: 
    AWS_DEFAULT_REGION: ap-northeast-2
    CI_REGISTRY_IMAGE: 123456784321.dkr.ecr.ap-northeast-2.amazonaws.com/appname
  image:
    name: gcr.io/kaniko-project/executor:debug
    entrypoint: [""]
  script:
    -  mkdir -p /kaniko/.docker
    -  echo "{\"credsStore\":\"ecr-login\"}" > /kaniko/.docker/config.json
    -  /kaniko/executor
      --context "${CI_PROJECT_DIR}"
      --dockerfile "${CI_PROJECT_DIR}/Dockerfile"
      --destination "${CI_REGISTRY_IMAGE}:${CI_COMMIT_TAG}"

credsStore is some external helper for saving data securely. So we don't have to save secure data in yaml.
My guess Kaniko has already install helpers for this process, So this image doesn't has to install eks command.

Kubernetes 1.29 now create record correctly. but 1.28 create correct
even ingress success, and pod log say It's ok.
No Clue