pulumi/sdk/proto
Matt Ellis f705dde7fb Remove acceptsSecrets from InvokeRequest
In our system, we model secrets as outputs with an additional bit of
metadata that says they are secret. For Read and Register resource
calls, our RPC interface says if the client side of the interface can
handle secrets being returned (i.e. the language SDK knows how to
sniff for the special signiture and resolve the output with the
special bit set).

For Invoke, we have no such model. Instead, we return a `Promise<T>`
where T's shape has just regular property fields.  There's no place
for us to tack the secretness onto, since there are no Outputs.

So, for now, don't even return secret values back across the invoke
channel. We can still take them as arguments (which is good) but we
can't even return secrets as part of invoke calls. This is not ideal,
but given the way we model these sources, there's no way around
this.  Fortunately, the result of these invoke calls are not stored in
the checkpoint and since the type is not Output<T> it will be clear
that the underlying value is just present in plaintext. A user that
wants to pass the result of an invoke into a resource can turn an
existing property into a secret via `pulumi.secret`.
2019-05-10 17:07:52 -07:00
..
go Remove acceptsSecrets from InvokeRequest 2019-05-10 17:07:52 -07:00
analyzer.proto Add license headers 2018-05-22 15:02:47 -07:00
Dockerfile Use nightly protoc gRPC plugin for node (#1948) 2018-09-17 15:16:31 -07:00
engine.proto Update the provider RPC interface (#2512) 2019-03-05 10:49:24 -08:00
errors.proto Allow dynamic-provider to send structured errors 2018-07-02 13:32:23 -07:00
generate.sh Work around commonjs protoc bug (#2403) 2019-01-29 17:07:47 -08:00
grpc_version.txt Add Cancel to gRPC resource provider interface 2018-07-15 11:05:44 -10:00
language.proto Add query mode to the language protocol 2019-05-02 18:08:08 -07:00
plugin.proto Add license headers 2018-05-22 15:02:47 -07:00
provider.proto Remove acceptsSecrets from InvokeRequest 2019-05-10 17:07:52 -07:00
resource.proto Rename SecretOutputs to AdditionalSecretOutputs 2019-05-10 17:07:52 -07:00
status.proto Allow dynamic-provider to send structured errors 2018-07-02 13:32:23 -07:00