You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Dec 15, 2022. It is now read-only.
# store aws access and secret keys in creds.conf file
AWS_PROFILE=default && echo -e "[default]\naws_access_key_id = $(aws configure get aws_access_key_id --profile $AWS_PROFILE)\naws_secret_access_key = $(aws configure get aws_secret_access_key --profile $AWS_PROFILE)" > creds.conf
#create a provider secret
kubectl create secret generic aws-creds -n crossplane-system --from-file=creds=./creds.conf
# apply provider config to use that secret
kubectl apply -f providerconfig.yaml
Simple s3 bucket creation: Tried to run the s3 example given by provider-jet-aws
apiVersion: s3.aws.jet.crossplane.io/v1alpha2
kind: Bucket
metadata:
name: sample-bucket-by-asa
annotations:
# This will be the actual bucket name. It must be globally unique, so you
# probably want to change it before trying to apply this example.
crossplane.io/external-name: crossplane-example-bucket-by-asa
spec:
forProvider:
region: us-west-1
acl: private
tags:
Name: SampleBucket
writeConnectionSecretToRef:
name: s3connectiondetails
namespace: crossplane-system
This creates a blank secret with no data such as region and endpoint, whereas in iam accesskey example, accesskeys are propagated in the secret.
Conclusion/ Observation -
Implementation for secret propagation seems missing for s3 bucket.
The text was updated successfully, but these errors were encountered:
Expected behaviour
S3 bucket resource needs to store connection details such as region and endpoint to k8s secret , similar to IAM resource example.
Actual behaviour
When a resource is created, it creates a blank k8s secret with no data propagated.
Steps to reproduce
Installation
check latest version from releases
configuration
Simple s3 bucket creation: Tried to run the s3 example given by provider-jet-aws
This creates a blank secret with no data such as region and endpoint, whereas in iam accesskey example, accesskeys are propagated in the secret.
Conclusion/ Observation -
Implementation for secret propagation seems missing for s3 bucket.
The text was updated successfully, but these errors were encountered: