Closed nabuskey closed 4 months ago
I am very unsure about introducing a special behaviour in Spec.Credentials.SecretRef.Key
because it requires users to know implementation details of this provider. Furthermore it is not longer possible to reference a token from a generic username
field.
With https://github.com/crossplane-contrib/provider-argocd/pull/66 we are providing support for kubeconfig authentication. Does that suffice your use case?
If not we should make the API more explicit by adding some kind of CredentialsType
parameter and have username and password extracted from a single key, i.e. as base64 encoded string or as a configuration file (https://github.com/crossplane-contrib/provider-aws is extracting the credentials from a .ini file).
Crossplane does not currently have enough maintainers to address every issue and pull request. This pull request has been automatically marked as stale
because it has had no activity in the last 90 days. It will be closed in 7 days if no further activity occurs. closed in 7 days if no further activity occurs. Adding a comment starting with /fresh
will mark this PR as not stale.
Sorry for the late reply. I would like to work on this but maybe sometime in the future when I have more time. I will close this for now.
@nabuskey Given that Issue #13 was fixed by #66, what remains to be done?
This is still a WIP but wanted to get some feedback before I invest any more time.
The provider config spec is a bit difficult to expand without introducing weirdness in spec so I've opted to a implicit approach. If this doesn't work let me know.
This implements a wrapper controller for Provider Config.
Flow is:
Spec.Credentials.SecretRef.Key
) specifies "username", then:Does this apprach look okay to you?
Fixes #13
I have:
make reviewable test
to ensure this PR is ready for review.How has this code been tested