agreeable-notebook-99278
06/22/2022, 8:30 AMazure
which is hella confusing having
azure:config1
azure:config2
etc… in the Pulumi.yml filekind-keyboard-17263
06/22/2022, 11:02 AMpulumi login
the procedure happens correctly; but if I try to provide a cloud bucket (pulumi login gs://<bucket name>
) the authentication goes somehow wrong, with a different result, and when I try to run whatever command (eg: pulumi preview
) I receive a 403 because it thinkgs I am logged in (gcp) with the wrong identity (while it's not true, because I have tested this while also anonymous). I don't understand how the login procedure can be different when passing the bucket (which has already been used with success). Also, when I login without bucket info, the message such that I recognize the proper username, while if I login with gs info, I obtain:
Logged in to DESKTOP-UOHVP03 as bruno (gs://<bucket name>)
This is the non working setup (the bruno usernema is totally wrong), while:
Logged in to <http://pulumi.com|pulumi.com> as xxxx (address)
is the working one. It looks like the gs option triggers a local version of the authentication.
Thanks for help !little-belgium-31679
06/22/2022, 11:57 AMcuddly-application-90445
06/22/2022, 12:05 PMastonishing-dentist-11149
06/22/2022, 1:33 PMastonishing-dentist-11149
06/22/2022, 3:13 PMmicroscopic-postman-4756
06/22/2022, 7:28 PMable-train-72108
06/22/2022, 7:47 PMlemon-morning-98620
06/22/2022, 7:47 PMgentle-piano-13039
06/22/2022, 8:29 PMTypeError: Cannot read properties of undefined (reading 'map')
It seems like other folks are also running into the problem:
https://github.com/pulumi/pulumi-kubernetes/issues/2038
Seems recent, any ideas what might be happening?big-magazine-43532
06/22/2022, 10:24 PMpulumi config -s uat --config-file target-accounts/Pulumi.uat.yaml set project:dbPassword value --secret
. When I run pulumi config -s uat --config-file target-accounts/Pulumi.uat.yaml --show-secrets
the secret is successfully decrypted. However, when someone else (another human and our pipeline) runs the second command they get this error:
error: failed to decrypt encrypted configuration value 'project:dbPassword': [400] Message authentication failed
This can occur when a secret is copied from one stack to another. Encryption of secrets is done per-stack and
it is not possible to share an encrypted configuration value across stacks
Can anyone suggest what may be wrong?bored-vase-40478
06/22/2022, 10:25 PMcuddly-magician-97620
06/22/2022, 10:25 PMretainOnDelete
as described here., but it gives me
error TS2345: Argument of type '{ retainOnDelete: boolean; }' is not assignable to parameter of type 'CustomResourceOptions'.
Object literal may only specify known properties, and 'retainOnDelete' does not exist in type 'CustomResourceOptions'.
Pulumi v3.34.1
Any idea why?late-nest-59850
06/23/2022, 9:39 AMbig-psychiatrist-43588
06/23/2022, 11:52 AMmost-mouse-38002
06/23/2022, 12:10 PMancient-solstice-53934
06/23/2022, 12:23 PMsparse-intern-71089
06/23/2022, 12:35 PMgentle-toddler-99412
06/23/2022, 12:56 PMbrainy-ocean-38960
06/23/2022, 1:16 PMbrainy-ocean-38960
06/23/2022, 1:16 PMswift-intern-18856
06/23/2022, 3:33 PMclusterIP
state. Obviously, this isn’t usually tracked in an IaC template as it’s dynamically set, and so I’m confused why the recreate strategy keeps getting chosen. I’d really like to make this switch over zero downtime, so looking for a solution here, or wondering if anyone else has run into this before. Thanks!most-mouse-38002
06/23/2022, 4:24 PMmysterious-glass-98830
06/23/2022, 5:27 PMacoustic-spring-42110
06/23/2022, 6:06 PMaws.appautoscaling.Target
, an aws.appautoscaling.Policy
that's set to StepScaling
and a aws.cloudwatch.MetricAlarm
that has its alarmActions
set to the ARN of the policy... pulumi compiles just fine, I see the resources in the stack.. but like.. I DONT see the autoscaling policy attached to the cluster in the AWS console and I'm not totally sure why. I've been staring at this for a couple hours, so I'm just kinda stepping away to clear my head before I jump back to it.little-book-13693
06/23/2022, 6:56 PMlittle-book-13693
06/23/2022, 6:56 PMif "my_output_value" in stack_reference.outputs:
little-book-13693
06/23/2022, 6:56 PMlittle-book-13693
06/23/2022, 6:58 PMlittle-book-13693
06/23/2022, 7:01 PMif "foo" in outputs:
TypeError: argument of type 'Output' is not iterable
little-book-13693
06/23/2022, 7:01 PMif "foo" in outputs:
TypeError: argument of type 'Output' is not iterable
billowy-army-68599
06/23/2022, 7:10 PMstack_reference.output.apply(lambda: i if i // do something
little-book-13693
06/23/2022, 7:11 PMbillowy-army-68599
06/23/2022, 7:12 PMlittle-book-13693
06/23/2022, 7:13 PMoutputs = stack_reference.outputs.apply(lambda outputs: [output for output in outputs])
pulumi.export("outputs", outputs)
def stack_contains_output(stack_reference, output_name):
return outputs.apply(lambda outputs: True if output_name in outputs else False)
billowy-army-68599
06/23/2022, 7:16 PMapply
you can treat the object like a standard object because it's now resolved, so you can check however you'd likelittle-book-13693
06/23/2022, 7:17 PMbillowy-army-68599
06/23/2022, 7:18 PMlittle-book-13693
06/23/2022, 7:19 PM