The Secret.generic.vault.jet.crossplane.io resource is automatically configured by Terrajet to use the SecretKeySelector type from crossplane-runtime. This type requires selecting a specific key from a secret.
This creates a heavy burden on platform-operators and/or development teams to explicitly create a Secret.generic.vault.jet.crossplane.io for every key in a connection detail they might need in their secret store.
How could Vault Provider help solve your problem?
Allow consuming all fields from a secret instead of individual keys, as in this example:
What problem are you facing?
The
Secret.generic.vault.jet.crossplane.io
resource is automatically configured by Terrajet to use theSecretKeySelector
type from crossplane-runtime. This type requires selecting a specific key from a secret.This creates a heavy burden on platform-operators and/or development teams to explicitly create a Secret.generic.vault.jet.crossplane.io for every key in a connection detail they might need in their secret store.
How could Vault Provider help solve your problem?
Allow consuming all fields from a secret instead of individual keys, as in this example:
The resulting secret in vault would look like this: