pulumi/tests/integration
Luke Hoban 6ed4bac5af
Support additional cloud secrets providers (#2994)
Adds support for additional cloud secrets providers (AWS KMS, Azure KeyVault, Google Cloud KMS, and HashiCorp Vault) as the encryption backend for Pulumi secrets. This augments the previous choice between using the app.pulumi.com-managed secrets encryption or a fully-client-side local passphrase encryption.

This is implemented using the Go Cloud Development Kit support for pluggable secrets providers.

Like our cloud storage backend support which also uses Go Cloud Development Kit, this PR also bleeds through to users the URI scheme's that the Go CDK defines for specifying each of secrets providers - like `awskms://alias/LukeTesting?region=us-west-2` or `azurekeyvault://mykeyvaultname.vault.azure.net/keys/mykeyname`.

Also like our cloud storage backend support, this PR doesn't solve for how to configure the cloud provider client used to resolve the URIs above - the standard ambient credentials are used in both cases. Eventually, we will likely need to provide ways for both of these features to be configured independently of each other and of the providers used for resource provisioning.
2019-08-02 16:12:16 -07:00
..
aliases Add python aliases support. (#2974) 2019-07-25 11:21:06 -07:00
cloud_secrets_provider Support additional cloud secrets providers (#2994) 2019-08-02 16:12:16 -07:00
config_basic Remove existing lock files 2018-11-12 15:33:58 -08:00
config_capture_e2e/nodejs Remove existing lock files 2018-11-12 15:33:58 -08:00
delete_before_create Consistent dependencies (#2517) 2019-03-05 20:34:51 -08:00
dependency_steps Consistent dependencies (#2517) 2019-03-05 20:34:51 -08:00
double_pending_delete Consistent dependencies (#2517) 2019-03-05 20:34:51 -08:00
duplicate_urns Consistent dependencies (#2517) 2019-03-05 20:34:51 -08:00
dynamic/python Python Dynamic Providers (#2900) 2019-07-19 10:18:25 -07:00
ee_perf Use prefered new pulumi.Config() form 2019-01-31 16:11:57 -08:00
empty Remove existing lock files 2018-11-12 15:33:58 -08:00
explicit_provider Consistent dependencies (#2517) 2019-03-05 20:34:51 -08:00
get_created Consistent dependencies (#2517) 2019-03-05 20:34:51 -08:00
invalid_package_json Remove existing lock files 2018-11-12 15:33:58 -08:00
partial_state Consistent dependencies (#2517) 2019-03-05 20:34:51 -08:00
project_main Remove existing lock files 2018-11-12 15:33:58 -08:00
project_main_abs Fix pending delete replacement failure (#658) 2017-12-07 09:44:38 -08:00
project_main_parent Fix pending delete replacement failure (#658) 2017-12-07 09:44:38 -08:00
protect_resources Consistent dependencies (#2517) 2019-03-05 20:34:51 -08:00
provider_secret_config Do not pass arguments as secrets to CheckConfig/Configure 2019-05-17 16:42:29 -07:00
query Implement listResourceOutputs in the Node.js SDK 2019-06-03 14:56:49 -07:00
read Add support for importing existing resources. (#2893) 2019-07-12 11:12:01 -07:00
recreate_resource_check Consistent dependencies (#2517) 2019-03-05 20:34:51 -08:00
secret_outputs Correctly flow secretness across POJO serliazation for stack outputs 2019-06-26 15:16:07 -07:00
single_resource Suppress JSON outputs in preview correctly (#2771) 2019-05-25 12:10:38 +02:00
stack_bad_parenting Consistent dependencies (#2517) 2019-03-05 20:34:51 -08:00
stack_dependencies Remove existing lock files 2018-11-12 15:33:58 -08:00
stack_outputs Remove existing lock files 2018-11-12 15:33:58 -08:00
stack_parenting Consistent dependencies (#2517) 2019-03-05 20:34:51 -08:00
stack_project_name Consistent dependencies (#2517) 2019-03-05 20:34:51 -08:00
stack_reference Make it possible to get a StackReference output promptly (#2824) 2019-06-17 12:25:56 -07:00
steps Consistent dependencies (#2517) 2019-03-05 20:34:51 -08:00
integration_test.go Support additional cloud secrets providers (#2994) 2019-08-02 16:12:16 -07:00