Skip to content

Allow writeConnectionSecretToRef to be compatible with SQL community provider #1189

@Keralin

Description

@Keralin

What problem are you facing?

Using the community provider for SQL can't connect to the cluster created if we reference the secrets generated by writeConnectionSecretToRef to the provider because it will search for password and username instead of master_username and attribute.master_password (as is required in their doc) so it requires so manual action modifying the secret and can't be solved in a GitOps way.

How the secrets should be stored:

apiVersion: v1
kind: Secret
data:
  endpoint: xxxxxx
  password: xxxxxx
  port: xxxxxx
  readerEndpoint: xxxxxx
  username: xxxxxx

How are the secrets stored:

apiVersion: v1
kind: Secret
data:
  endpoint: xxxxxx
  attribute.master_password: xxxxxx
  port: xxxxxx
  readerEndpoint: xxxxxx
  master_username: xxxxxx

How could Official AWS Provider help solve your problem?

Enabling a feature to allow configuring how that secret or parameters should be stored, thus allowing the choice to save the connection with a username and password to be compatible with the community SQL provider like other community providers do.

Metadata

Metadata

Assignees

No one assigned

    Labels

    enhancementNew feature or request

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions