pulumi/pkg/backend
Matt Ellis 70e16a2acd Allow using the passphrase secrets manager with the pulumi service
This change allows using the passphrase secrets manager when creating
a stack managed by the Pulumi service.  `pulumi stack init`, `pulumi
new` and `pulumi up` all learned a new optional argument
`--secrets-provider` which can be set to "passphrase" to force the
passphrase based secrets provider to be used.  When unset the default
secrets provider is used based on the backend (for local stacks this
is passphrase, for remote stacks, it is the key managed by the pulumi
service).

As part of this change, we also initialize the secrets manager when a
stack is created, instead of waiting for the first time a secret
config value is stored. We do this so that if an update is run using
`pulumi.secret` before any secret configuration values are used, we
already have the correct encryption method selected for a stack.
2019-05-10 17:07:52 -07:00
..
display Encrypt secret values in deployments 2019-05-10 17:07:52 -07:00
filestate Do not depend on backend package from client package 2019-05-10 17:07:52 -07:00
httpstate Remove unused method 2019-05-10 17:07:52 -07:00
state Add license headers 2018-05-22 15:02:47 -07:00
apply.go Don't print error prefix when a confirmation prompt is declined 2019-03-26 15:17:18 -07:00
backend.go Do not depend on backend package from client package 2019-05-10 17:07:52 -07:00
backend_test.go Refactor config loading out of the backend 2019-05-10 17:07:52 -07:00
snapshot.go Retain the SecretsManager that was used to deserialize a deployment 2019-05-10 17:07:52 -07:00
snapshot_test.go Retain the SecretsManager that was used to deserialize a deployment 2019-05-10 17:07:52 -07:00
stack.go Allow using the passphrase secrets manager with the pulumi service 2019-05-10 17:07:52 -07:00
updates.go Add detection of Azure Pipelines (#2705) 2019-05-07 11:49:13 -07:00