pulumi/pkg/resource/deploy
Matt Ellis f705dde7fb Remove acceptsSecrets from InvokeRequest
In our system, we model secrets as outputs with an additional bit of
metadata that says they are secret. For Read and Register resource
calls, our RPC interface says if the client side of the interface can
handle secrets being returned (i.e. the language SDK knows how to
sniff for the special signiture and resolve the output with the
special bit set).

For Invoke, we have no such model. Instead, we return a `Promise<T>`
where T's shape has just regular property fields.  There's no place
for us to tack the secretness onto, since there are no Outputs.

So, for now, don't even return secret values back across the invoke
channel. We can still take them as arguments (which is good) but we
can't even return secrets as part of invoke calls. This is not ideal,
but given the way we model these sources, there's no way around
this.  Fortunately, the result of these invoke calls are not stored in
the checkpoint and since the type is not Output<T> it will be clear
that the underlying value is just present in plaintext. A user that
wants to pass the result of an invoke into a resource can turn an
existing property into a secret via `pulumi.secret`.
2019-05-10 17:07:52 -07:00
..
deploytest Expose resource outputs through invoke 2019-05-02 18:08:08 -07:00
providers Load specific provider versions if requested (#2648) 2019-04-17 11:25:02 -07:00
builtins.go Expose resource outputs through invoke 2019-05-02 18:08:08 -07:00
plan.go Expose resource outputs through invoke 2019-05-02 18:08:08 -07:00
plan_executor.go Revert "Revert "Use result.Result pattern in more places. (#2573)" (#2575)" (#2577) 2019-03-21 13:23:46 -07:00
plan_test.go Retain the SecretsManager that was used to deserialize a deployment 2019-05-10 17:07:52 -07:00
snapshot.go Retain the SecretsManager that was used to deserialize a deployment 2019-05-10 17:07:52 -07:00
source.go Rename SecretOutputs to AdditionalSecretOutputs 2019-05-10 17:07:52 -07:00
source_error.go Use result.Result in more places. (#2568) 2019-03-19 16:21:50 -07:00
source_eval.go Remove acceptsSecrets from InvokeRequest 2019-05-10 17:07:52 -07:00
source_eval_test.go Augment secret outputs based on per request options 2019-05-10 17:07:52 -07:00
source_fixed.go Use result.Result in more places. (#2568) 2019-03-19 16:21:50 -07:00
source_null.go Use result.Result in more places. (#2568) 2019-03-19 16:21:50 -07:00
source_query.go Remove acceptsSecrets from InvokeRequest 2019-05-10 17:07:52 -07:00
source_query_test.go Formally specify querySource with tests 2019-05-02 18:08:08 -07:00
step.go Rename SecretOutputs to AdditionalSecretOutputs 2019-05-10 17:07:52 -07:00
step_executor.go Rename SecretOutputs to AdditionalSecretOutputs 2019-05-10 17:07:52 -07:00
step_generator.go Rename SecretOutputs to AdditionalSecretOutputs 2019-05-10 17:07:52 -07:00
target.go Add license headers 2018-05-22 15:02:47 -07:00