-
Notifications
You must be signed in to change notification settings - Fork 13
/
disposablerequest-jwt.yaml
36 lines (32 loc) · 1.43 KB
/
disposablerequest-jwt.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
apiVersion: http.crossplane.io/v1alpha2
kind: DisposableRequest
metadata:
name: obtain-jwt-token
spec:
deletionPolicy: Orphan
forProvider:
insecureSkipTLSVerify: true
# Injecting data from secrets is possible, simply use the following syntax: {{ name:namespace:key }} (supported for body and headers only)
headers:
Authorization:
- "Basic {{ basic-auth:crossplane-system:token }}"
url: http://flask-api.default.svc.cluster.local/v1/login
method: POST
# Indicates whether the reconciliation should loop indefinitely. If `rollbackRetriesLimit` is set and the request returns an error, it will stop reconciliation once the limit is reached.
shouldLoopInfinitely: true
# Specifies the duration after which the next reconcile should occur.
nextReconcile: 72h # 3 days
# waitTimeout: 5m
# Secrets receiving patches from response data
secretInjectionConfigs:
- secretRef:
name: obtained-token
namespace: crossplane-system
secretKey: token
responsePath: .body.token
# setOwnerReference determines if the secret should be deleted when the associated resource is deleted.
# When injecting multiple keys into the same secret, ensure this field is set consistently for all keys.
setOwnerReference: true
providerConfigRef:
name: http-conf
# TODO: check if it's possible to modify the deletionPolicy to be orphan by default.