Skip to content

Commit 74ce12d

Browse files
committed
Remove reference to importing resources
This page was deleted (for now). Signed-off-by: Nic Cope <[email protected]>
1 parent 82f9842 commit 74ce12d

File tree

4 files changed

+4
-134
lines changed

4 files changed

+4
-134
lines changed

content/v2.0-preview/concepts/compositions.md

Lines changed: 0 additions & 52 deletions
Original file line numberDiff line numberDiff line change
@@ -310,15 +310,6 @@ When resources inside a Composition create connection details Crossplane creates
310310
a Kubernetes secret object for each managed resource generating connection
311311
details.
312312

313-
{{<hint "note">}}
314-
This section discusses creating Kubernetes secrets.
315-
Crossplane also supports using external secret stores like
316-
[HashiCorp Vault](https://www.vaultproject.io/).
317-
318-
Read the [external secrets store guide]({{<ref "../guides/vault-as-secret-store">}}) for more information on using Crossplane
319-
with an external secret store.
320-
{{</hint >}}
321-
322313
#### Composed resource secrets
323314

324315
Inside the `spec` of each resource producing connection details, define the
@@ -366,49 +357,6 @@ key1 connection.crossplane.io/v1alpha1 4 4m30s
366357
Remember to create a unique name for each secret.
367358
{{< /hint >}}
368359

369-
#### External secret stores
370-
371-
Crossplane
372-
[External Secret Stores]({{<ref "../guides/vault-as-secret-store" >}})
373-
write secrets and connection details to external secret stores like HashiCorp
374-
Vault.
375-
376-
{{<hint "important" >}}
377-
External Secret Stores are an alpha feature.
378-
379-
They're not recommended for production use. Crossplane disables External Secret
380-
Stores by default.
381-
{{< /hint >}}
382-
383-
Use `publishConnectionDetailsWithStoreConfigRef` in place of
384-
`writeConnectionSecretsToNamespace` to define the `StoreConfig` to save
385-
connection details to.
386-
387-
For example, using a `StoreConfig` with the `name` "vault," use
388-
`publishConnectionDetailsWithStoreConfigRef.name` matching the
389-
`StoreConfig.name`, in this example, "vault."
390-
391-
392-
```yaml {label="gcp-storeconfig",copy-lines="none"}
393-
apiVersion: gcp.crossplane.io/v1alpha1
394-
kind: StoreConfig
395-
metadata:
396-
name: vault
397-
# Removed for brevity.
398-
---
399-
apiVersion: apiextensions.crossplane.io/v1
400-
kind: Composition
401-
# Removed for Brevity
402-
spec:
403-
publishConnectionDetailsWithStoreConfigRef:
404-
name: vault
405-
# Removed for brevity
406-
```
407-
408-
For more details read the
409-
[External Secret Stores]({{<ref "../guides/vault-as-secret-store" >}})
410-
integration guide.
411-
412360
## Test a composition
413361

414362
You can preview the output of any composition using the Crossplane CLI. You

content/v2.0-preview/concepts/managed-resources.md

Lines changed: 2 additions & 39 deletions
Original file line numberDiff line numberDiff line change
@@ -438,7 +438,7 @@ Crossplane supports the following policies:
438438
| `Create` | If the external resource doesn't exist, Crossplane creates it based on the managed resource settings. |
439439
| `Delete` | Crossplane can delete the external resource when deleting the managed resource. |
440440
| `LateInitialize` | Crossplane initializes some external resource settings not defined in the `spec.forProvider` of the managed resource. See [the late initialization]({{<ref "./managed-resources#late-initialization" >}}) section for more details. |
441-
| `Observe` | Crossplane only observes the resource and doesn't make any changes. Used for [observe only resources]({{<ref "../guides/import-existing-resources#import-resources-automatically">}}). |
441+
| `Observe` | Crossplane only observes the resource and doesn't make any changes. Used for observe only resources. |
442442
| `Update` | Crossplane changes the external resource when changing the managed resource. |
443443
{{</table >}}
444444

@@ -454,7 +454,7 @@ The following is a list of common policy combinations:
454454
| {{<check>}} | | {{<check>}} | {{<check>}} | | Crossplane doesn't delete the external resource when deleting the managed resource. Crossplane doesn't apply changes to the external resource after creation. |
455455
| {{<check>}} | | | {{<check>}} | {{<check>}} | Crossplane doesn't delete the external resource when deleting the managed resource. Crossplane doesn't import any settings from the external resource. |
456456
| {{<check>}} | | | {{<check>}} | | Crossplane creates the external resource but doesn't apply any changes to the external resource or managed resource. Crossplane can't delete the resource. |
457-
| | | | {{<check>}} | | Crossplane only observes a resource. Used for [observe only resources]({{<ref "../guides/import-existing-resources#import-resources-automatically">}}). |
457+
| | | | {{<check>}} | | Crossplane only observes a resource. |
458458
| | | | | | No policy set. An alternative method for [pausing](#paused) a resource. |
459459
{{< /table >}}
460460

@@ -615,43 +615,6 @@ spec:
615615
annotation-tag: annotation-value
616616
```
617617

618-
#### Publish secrets to an external secrets store
619-
620-
Publishing secrets data to an external secret store like
621-
[HashiCorp Vault](https://www.vaultproject.io/) relies on a
622-
{{<hover label="configref" line="8">}}publishConnectionDetailsTo.configRef{{</hover>}}.
623-
624-
The
625-
{{<hover label="configref" line="9">}}configRef.name{{</hover>}} references a
626-
{{<hover label="storeconfig" line="4">}}StoreConfig{{</hover>}}
627-
object.
628-
629-
```yaml {label="configref",copy-lines="none"}
630-
apiVersion: rds.aws.upbound.io/v1beta1
631-
kind: Instance
632-
spec:
633-
forProvider:
634-
# Removed for brevity
635-
publishConnectionDetailsTo:
636-
name: rds-kubernetes-secret
637-
configRef:
638-
name: my-vault-storeconfig
639-
```
640-
641-
```yaml {label="storeconfig",copy-lines="none"}
642-
apiVersion: secrets.crossplane.io/v1alpha1
643-
kind: StoreConfig
644-
metadata:
645-
name: my-vault-storeconfig
646-
# Removed for brevity
647-
```
648-
649-
{{<hint "tip" >}}
650-
Read the
651-
[Vault as an External Secrets Store]({{<ref "../guides/vault-as-secret-store">}})
652-
guide for details on using StoreConfig objects.
653-
{{< /hint >}}
654-
655618
## Annotations
656619

657620
Crossplane applies a standard set of Kubernetes `annotations` to managed

content/v2.0-preview/concepts/providers.md

Lines changed: 2 additions & 42 deletions
Original file line numberDiff line numberDiff line change
@@ -618,45 +618,13 @@ Reason: UnknownPackageRevisionHealth
618618

619619
Providers have two different types of configurations:
620620

621-
* _Controller configurations_ that change the settings of the Provider pod
621+
* _Runtime configurations_ that change the settings of the Provider pod
622622
running inside the Kubernetes cluster. For example, setting a `toleration` on
623623
the Provider pod.
624624

625625
* _Provider configurations_ that change settings used when communicating with
626626
an external provider. For example, cloud provider authentication.
627627

628-
{{<hint "important" >}}
629-
Apply `ControllerConfig` objects to Providers.
630-
631-
Apply `ProviderConfig` objects to managed resources.
632-
{{< /hint >}}
633-
634-
### Controller configuration
635-
636-
{{< hint "important" >}}
637-
<!-- vale write-good.Passive = NO -->
638-
<!-- vale gitlab.FutureTense = NO -->
639-
The `ControllerConfig` type was deprecated in v1.11 and will be removed in
640-
a future release.
641-
<!-- vale write-good.Passive = YES -->
642-
<!-- vale gitlab.FutureTense = YES -->
643-
644-
[`DeploymentRuntimeConfig`]({{<ref "#runtime-configuration" >}}) is the
645-
replacement for Controller configuration and is available in v1.14+.
646-
{{< /hint >}}
647-
648-
Applying a Crossplane `ControllerConfig` to a Provider changes the settings of
649-
the Provider's pod. The
650-
[Crossplane ControllerConfig schema]({{< ref "../api#ControllerConfig-spec" >}})
651-
defines the supported set of ControllerConfig settings.
652-
653-
The most common use case for ControllerConfigs are providing `args` to a
654-
Provider's pod enabling optional services. For example, enabling
655-
[external secret stores]({{< ref "../guides/vault-as-secret-store#enable-external-secret-stores-in-the-provider" >}})
656-
for a Provider.
657-
658-
Each Provider determines their supported set of `args`.
659-
660628
### Runtime configuration
661629

662630
{{<hint "important" >}}
@@ -667,22 +635,14 @@ It's on by default, and you can disable it by passing
667635
{{< /hint >}}
668636

669637
Runtime configuration is a generalized mechanism for configuring the runtime for
670-
Crossplane packages with a runtime, namely `Providers` and `Functions`. It
671-
replaces the deprecated `ControllerConfig` type and is available in v1.14+.
638+
Crossplane packages with a runtime, namely `Providers` and `Functions`.
672639

673640
With its default configuration, Crossplane uses Kubernetes Deployments to
674641
deploy runtime for packages, more specifically, a controller for a `Provider`
675642
or a gRPC server for a `Function`. It's possible to configure the runtime
676643
manifest by applying a `DeploymentRuntimeConfig` and referencing it in the
677644
`Provider` or `Function` object.
678645

679-
{{<hint "note" >}}
680-
Different from `ControllerConfig`, `DeploymentRuntimeConfig` embed the whole
681-
Kubernetes Deployment spec, which allows for more flexibility in configuring
682-
the runtime. Refer to the [design document](https://github.com/crossplane/crossplane/blob/2c5e7f07ba9e3d83d1c85169bbde685de8514ab8/design/one-pager-package-runtime-config.md)
683-
for more details.
684-
{{< /hint >}}
685-
686646
As an example, to enable the external secret stores alpha feature for a `Provider`
687647
by adding the `--enable-external-secret-stores` argument to the controller,
688648
one can apply the following:

content/v2.0-preview/guides/crossplane-with-argo-cd.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -133,7 +133,6 @@ data:
133133
"Composition",
134134
"CompositionRevision",
135135
"DeploymentRuntimeConfig",
136-
"ControllerConfig",
137136
"ProviderConfig",
138137
"ProviderConfigUsage"
139138
}

0 commit comments

Comments
 (0)