The terraform provider cloud credential secret attribute to connect with GKE is misleading. It tricks Terrajet in generating a k8 secret, which makes it impossible to supply the 'rancher id' of the cloud credential object to use. This pr marks this attribute as non-sensitive, so Terrajet generates a plain string field for it and you are able to supply the cloud credential id.
Fixes #5
Requires #7 to be merged first as this PR build on top of it.
Description of your changes
The terraform provider cloud credential secret attribute to connect with GKE is misleading. It tricks Terrajet in generating a k8 secret, which makes it impossible to supply the 'rancher id' of the cloud credential object to use. This pr marks this attribute as non-sensitive, so Terrajet generates a plain string field for it and you are able to supply the cloud credential id.
Fixes #5 Requires #7 to be merged first as this PR build on top of it.
I have:
make reviewable test
to ensure this PR is ready for review.How has this code been tested
Running crossplane + provider locally in k3s, connecting to an upstream rancher instance with a custom XR.