Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Use gke cloud credentials #9

Merged

Conversation

sboschman
Copy link
Contributor

@sboschman sboschman commented Jul 12, 2022

Description of your changes

The terraform provider cloud credential secret attribute to connect with GKE is misleading. It tricks Terrajet in generating a k8 secret, which makes it impossible to supply the 'rancher id' of the cloud credential object to use. This pr marks this attribute as non-sensitive, so Terrajet generates a plain string field for it and you are able to supply the cloud credential id.

Fixes #5
Requires #7 to be merged first as this PR build on top of it.

I have:

  • Read and followed Crossplane's contribution process.
  • Run make reviewable test to ensure this PR is ready for review.

How has this code been tested

Running crossplane + provider locally in k3s, connecting to an upstream rancher instance with a custom XR.

@sboschman sboschman mentioned this pull request Jul 12, 2022
Copy link
Collaborator

@ytsarev ytsarev left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

As #7 is merged could you please rebase with main?

@sboschman sboschman mentioned this pull request Jul 13, 2022
2 tasks
@ytsarev ytsarev merged commit 0482f7a into crossplane-contrib:main Jul 15, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Unable to pass cloud credentials for GKE cluster import
2 participants