-
Notifications
You must be signed in to change notification settings - Fork 44
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Accept secrets #1506
Comments
This affects AWS as well and is fairly convoluted at the moment. I would request a design doc on this (can collab).
Not obviously true. |
I'd be happy to work with you on a design doc. This isn't a proposal, as much as a placeholder for one.
It is a prerequisite other strategies, when implemented in the bridge. The engine could implement these without the bridge supporting secrets. |
Awesome. Let's do a design here to consider a few options where we can go, also cover AWS issues and issues with secrets in Invoke and Configure. |
#1621 worth picking up soon-ish? I think this makes sense long-term for completeness but can be a bit time-consuming to thoroughly test. For now relying on the engine to discover and re-inject secrets continues to work mostly OK, and with pulumi/pulumi#15032 we can simplify this a fair bit which brings us to the better place. |
Linking the related issues with AWS tagsAll causing pressure on bulk-encryption in pulumi/pulumi#15498 |
Related to pulumi/pulumi#17440 (comment). |
Hello!
Issue details
Customizations such as pulumi/pulumi-gcp#1316 require knowing what input fields are secret. To enable these kinds of customizations, we should support secrets in the bridge.
This is a prerequisite for implementing other secret strategies in the bridge, such as secret-by-value.
Affected area/feature
The text was updated successfully, but these errors were encountered: