crossplane-contrib / provider-jet-rancher

Apache License 2.0
3 stars 4 forks source link

Use gke cloud credentials #9

Closed sboschman closed 2 years ago

sboschman commented 2 years ago

Description of your changes

The terraform provider cloud credential secret attribute to connect with GKE is misleading. It tricks Terrajet in generating a k8 secret, which makes it impossible to supply the 'rancher id' of the cloud credential object to use. This pr marks this attribute as non-sensitive, so Terrajet generates a plain string field for it and you are able to supply the cloud credential id.

Fixes #5 Requires #7 to be merged first as this PR build on top of it.

I have:

How has this code been tested

Running crossplane + provider locally in k3s, connecting to an upstream rancher instance with a custom XR.