Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Adding support for secrets in all values in DeploymentSettings #467

Merged
merged 2 commits into from
Dec 12, 2024

Conversation

IaroslavTitov
Copy link
Contributor

@IaroslavTitov IaroslavTitov commented Dec 10, 2024

Summary

  • Adding support for all values in Deployment Settings to be read in as secrets
  • Cut ticket Add secret support to all fiels #468 to implement the same for ALL resources
  • Added some folders to .gitignore that were getting created after .ci-mgmt onboarding
  • Added some digits to TemplateSource examples to remove flakiness

Testing

  • Manual test
  • Edited integ test to test secret support every time

Copy link

Does the PR have any schema changes?

Looking good! No breaking changes found.
No new resources/functions.

Maintainer note: consult the runbook for dealing with any breaking changes.

@IaroslavTitov IaroslavTitov force-pushed the iaro/secrets branch 6 times, most recently from 21a754d to 50bc90f Compare December 10, 2024 21:42
@IaroslavTitov IaroslavTitov marked this pull request as ready for review December 10, 2024 21:51
@IaroslavTitov IaroslavTitov merged commit 49003fc into main Dec 12, 2024
24 checks passed
@IaroslavTitov IaroslavTitov deleted the iaro/secrets branch December 12, 2024 16:45
Copy link

codecov bot commented Dec 12, 2024

Codecov Report

All modified and coverable lines are covered by tests ✅

Please upload report for BASE (main@4154a6a). Learn more about missing BASE report.

Additional details and impacted files
@@          Coverage Diff          @@
##             main   #467   +/-   ##
=====================================
  Coverage        ?      0           
=====================================
  Files           ?      0           
  Lines           ?      0           
  Branches        ?      0           
=====================================
  Hits            ?      0           
  Misses          ?      0           
  Partials        ?      0           

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

IaroslavTitov added a commit that referenced this pull request Dec 13, 2024
### Summary
- Fixes: #447
(kinda)
- The reason secret was failing to create is due to this c# specific bug
- pulumi/pulumi-dotnet#22
- A secret among env vars made the whole object secret and it was
skipped
- Recent change #467
actually made the issue worse - it is creating the env vars, but NOT
secret (Thankfully I never released after that PR! 😅 )
- This PR adds cascading logic to envVars and username values - they are
the only ones that are optionally secret

### Testing 
- Manual test
@pulumi-bot
Copy link

This PR has been shipped in release v0.27.4.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants