-
Notifications
You must be signed in to change notification settings - Fork 291
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[vSphere] Store provider config variables in secrets #9
Comments
@roberthbailey: GitHub didn't allow me to assign the following users: karan. Note that only kubernetes-sigs members and repo collaborators can be assigned. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
From @karan on May 31, 2018 23:45 After a little more thought, this might not work since the provider config will still need to exist on the objects. So we can't actually have them only in secrets. |
- Adds new field vsphereCredentialSecret that can be specified to point to the secret that holds the credentials Resolves #9 Change-Id: I8e43864302a51386f7f11725b0a966cc9e436c59
…-owners Update OWNERS
From @karan on May 29, 2018 17:13
This is for security and safety, since the provider config blob can contain sensitive credentials.
/kind feature
/assign @karan
Copied from original issue: kubernetes-sigs/cluster-api#226
The text was updated successfully, but these errors were encountered: