pulumi/pkg
Matt Ellis 8a865acf11 Don' fail early when loading passphrase secrets managers from state
This is helpful some round trip cases where we many not be able to
build the encrypter or decrypter but we will end up not needing
them. When we fail to load the manager, we return a manager that has
the correct state, but will error when it tries to preform any
operations.  However, if there are no secrets in the deployment, these
methods will never be called and we'll be able to correctly roundtrip
checkpoints even without having access to the password (since there
were no secret values to decrypt or encrypt).
2019-05-10 17:07:52 -07:00
..
apitype Rename SecretOutputs to AdditionalSecretOutputs 2019-05-10 17:07:52 -07:00
backend Fix --json output 2019-05-10 17:07:52 -07:00
diag Revert "Revert "Use result.Result pattern in more places. (#2573)" (#2575)" (#2577) 2019-03-21 13:23:46 -07:00
encoding Add license headers 2018-05-22 15:02:47 -07:00
engine Retain the SecretsManager that was used to deserialize a deployment 2019-05-10 17:07:52 -07:00
graph Add license headers 2018-05-22 15:02:47 -07:00
operations Collect logs from Google Cloud Functions 2019-04-08 09:44:05 -07:00
resource Remove acceptsSecrets from InvokeRequest 2019-05-10 17:07:52 -07:00
secrets Don' fail early when loading passphrase secrets managers from state 2019-05-10 17:07:52 -07:00
testing Set a passphrase in more tests 2019-05-10 17:07:52 -07:00
tokens Adopt golangci-lint and address issues 2018-11-08 14:11:47 -08:00
tools Add a WriteString method to tools/GenWriter. (#1839) 2018-08-29 14:43:20 -07:00
util Do not depend on backend package from client package 2019-05-10 17:07:52 -07:00
version Add license headers 2018-05-22 15:02:47 -07:00
workspace Load default providers deterministically (#2590) 2019-03-26 13:29:34 -07:00