Decouple API token and cloud provider token from secrets #122
Labels
emergent
An issue that was added to the current milestone after planning
kind/enhancement
Improvements or new features
resolution/fixed
This issue was fixed
Milestone
Currently the stack CRD makes a strong assumption that the API token and cloud provider tokens are supplied through secrets which limits flexibility. If the operator could read these secrets from the filesystem it would allow it to work with a variety of secret management systems, e.g: (k8s secret mapped to volume, injected from Vault, AWS Secret Manager, Google Secret Manager).
The text was updated successfully, but these errors were encountered: