pulumi/pkg/apitype
Matt Ellis 307ee72b5f Use existing secrets manager when roundtripping
There are a few operations we do (stack rename, importing and edits)
where we will materialize a `deploy.Snapshot` from an existing
deployment, mutate it in somewhay, and then store it.

In these cases, we will just re-use the secrets manager that was used
to build the snapshot when we re-serialize it. This is less than ideal
in some cases, because many of these operations could run on an
"encrypted" copy of the Snapshot, where Inputs and Outputs have not
been decrypted.

Unfortunately, our system now is not set up in a great way to support
this and adding something like a `deploy.EncryptedSnapshot` would
require large scale code duplications.

So, for now, we'll take the hit of decrypting and re-encrypting, but
long term introducing a `deploy.EncryptedSnapshot` may be nice as it
would let us elide the encryption/decryption steps in some places and
would also make it clear what parts of our system have access to the
plaintext values of secrets.
2019-05-10 17:07:52 -07:00
..
migrate Add API types for the V3 checkpoint (#2384) 2019-01-23 13:33:25 -08:00
cli.go Warn when pulumi is out of date 2018-08-13 13:18:02 -07:00
core.go Use existing secrets manager when roundtripping 2019-05-10 17:07:52 -07:00
errors.go Expand ErrorResponse type (#1720) 2018-08-07 10:43:18 -07:00
events.go Filter diff keys based on provider info (#2526) 2019-03-06 16:41:19 -08:00
history.go Fix spelling (#2567) 2019-03-19 11:35:17 -07:00
logs.go Remove references to Pulumi private clouds (#2095) 2018-10-24 13:50:35 -07:00
stacks.go Add projectName member of StackSummary API type 2019-01-08 12:52:09 -08:00
updates.go Add apitype for stack rename request 2019-03-11 14:44:15 -07:00