Fix handling of default secrets providers
This commit is contained in:
parent
5ad2024703
commit
b80d49476b
|
@ -53,7 +53,7 @@ func getStackSecretsManager(s backend.Stack) (secrets.Manager, error) {
|
|||
return nil, err
|
||||
}
|
||||
|
||||
if ps.SecretsProvider != "default" && ps.SecretsProvider != "passphrase" {
|
||||
if ps.SecretsProvider != "default" && ps.SecretsProvider != "passphrase" && ps.SecretsProvider != "" {
|
||||
return newCloudSecretsManager(s.Ref().Name(), stackConfigFile, ps.SecretsProvider)
|
||||
}
|
||||
|
||||
|
|
|
@ -104,7 +104,7 @@ func createStack(
|
|||
if _, pharseErr := newPassphraseSecretsManager(stackRef.Name(), stackConfigFile); pharseErr != nil {
|
||||
return nil, pharseErr
|
||||
}
|
||||
} else if secretsProvider != "" {
|
||||
} else if secretsProvider != "" && secretsProvider != "default" {
|
||||
// All other non-default secrets providers are handled by the cloud secrets provider which
|
||||
// uses a URL schema to identify the provider
|
||||
if _, secretsErr := newCloudSecretsManager(stackRef.Name(), stackConfigFile, secretsProvider); secretsErr != nil {
|
||||
|
|
Loading…
Reference in a new issue