-
Notifications
You must be signed in to change notification settings - Fork 102
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support for Secrets Manager #294
Comments
are there any updates on this? We have a need to be able to create a cloud secret manager secret declaratively where we can enforce some standards and set permissions. For our case we expect the secret value to be provided in a different way (not in this manifest). |
Wasn't crossplane meant to have 100% coverage for cloud resources? https://blog.upbound.io/cloud-service-coverage/ |
@dsiguero We have achieved 100% coverage with the new Terrajet providers, as highlighted in the blog post that you mentioned:
Note that provider-jet-gcp is another provider, this is the provider-gcp. We are currently trying to simplify this for our users by merging them (crossplane/crossplane#2930), but currently we have two separate ones:
|
What problem are you facing?
Similar to crossplane-contrib/provider-aws#405 for GCP
How could Crossplane help solve your problem?
By supporting Secrets Manager
I would like to take this issue up. Please assign it to me.cc : @jbw976 @hasheddan
The text was updated successfully, but these errors were encountered: