Fix handling of default secrets providers

This commit is contained in:
Luke Hoban 2019-07-29 12:58:25 -07:00
parent 5ad2024703
commit b80d49476b
2 changed files with 2 additions and 2 deletions

View file

@ -53,7 +53,7 @@ func getStackSecretsManager(s backend.Stack) (secrets.Manager, error) {
return nil, err
}
if ps.SecretsProvider != "default" && ps.SecretsProvider != "passphrase" {
if ps.SecretsProvider != "default" && ps.SecretsProvider != "passphrase" && ps.SecretsProvider != "" {
return newCloudSecretsManager(s.Ref().Name(), stackConfigFile, ps.SecretsProvider)
}

View file

@ -104,7 +104,7 @@ func createStack(
if _, pharseErr := newPassphraseSecretsManager(stackRef.Name(), stackConfigFile); pharseErr != nil {
return nil, pharseErr
}
} else if secretsProvider != "" {
} else if secretsProvider != "" && secretsProvider != "default" {
// All other non-default secrets providers are handled by the cloud secrets provider which
// uses a URL schema to identify the provider
if _, secretsErr := newCloudSecretsManager(stackRef.Name(), stackConfigFile, secretsProvider); secretsErr != nil {