Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

Adding support for secrets in all values in DeploymentSettings #467

Merged
merged 2 commits into from
Dec 12, 2024

Conversation

IaroslavTitov
Copy link
Contributor

@IaroslavTitov IaroslavTitov commented Dec 10, 2024

Summary

  • Adding support for all values in Deployment Settings to be read in as secrets
  • Cut ticket Add secret support to all fiels #468 to implement the same for ALL resources
  • Added some folders to .gitignore that were getting created after .ci-mgmt onboarding
  • Added some digits to TemplateSource examples to remove flakiness

Testing

  • Manual test
  • Edited integ test to test secret support every time

Copy link

Does the PR have any schema changes?

Looking good! No breaking changes found.
No new resources/functions.

Maintainer note: consult the runbook for dealing with any breaking changes.

@IaroslavTitov IaroslavTitov force-pushed the iaro/secrets branch 6 times, most recently from 21a754d to 50bc90f Compare December 10, 2024 21:42
@IaroslavTitov IaroslavTitov marked this pull request as ready for review December 10, 2024 21:51
@IaroslavTitov IaroslavTitov merged commit 49003fc into main Dec 12, 2024
24 checks passed
@IaroslavTitov IaroslavTitov deleted the iaro/secrets branch December 12, 2024 16:45
Copy link

codecov bot commented Dec 12, 2024

Codecov Report

All modified and coverable lines are covered by tests ✅

Please upload report for BASE (main@4154a6a). Learn more about missing BASE report.

Additional details and impacted files
@@          Coverage Diff          @@
##             main   #467   +/-   ##
=====================================
  Coverage        ?      0           
=====================================
  Files           ?      0           
  Lines           ?      0           
  Branches        ?      0           
=====================================
  Hits            ?      0           
  Misses          ?      0           
  Partials        ?      0           

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

IaroslavTitov added a commit that referenced this pull request Dec 13, 2024
### Summary
- Fixes: #447
(kinda)
- The reason secret was failing to create is due to this c# specific bug
- pulumi/pulumi-dotnet#22
- A secret among env vars made the whole object secret and it was
skipped
- Recent change #467
actually made the issue worse - it is creating the env vars, but NOT
secret (Thankfully I never released after that PR! 😅 )
- This PR adds cascading logic to envVars and username values - they are
the only ones that are optionally secret

### Testing 
- Manual test
@pulumi-bot
Copy link

This PR has been shipped in release v0.27.4.

# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants