sparse-intern-71089
01/22/2020, 5:30 AMwhite-balloon-205
additionalSecretOutputs
to ensure outputs are secret (unless they were also inputs which were provided a secret value).
https://github.com/pulumi/pulumi-terraform-bridge/issues/10 will make it so that this additional annotation is not required, and "Sensitive" outputs from upstream providers will automatically be marked as secret.elegant-dress-88912
01/22/2020, 5:33 AMelegant-dress-88912
01/22/2020, 5:49 AMrandom.RandomPassword
and tls.PrivateKey
(which are from terraform modules), but didn't work for k8s.Secret. Any idea? Code:
const vaultAuthAccount = new k8s.core.v1.ServiceAccount(
...
// read from created account token secret
export const vaultAuthToken64 = k8s.core.v1.Secret.get(
"vault-auth-token",
pulumi.interpolate`${vaultAuthAccount.metadata.namespace}/${vaultAuthAccount.secrets[0].name}`,
{
additionalSecretOutputs: ["data"]
}
).data.apply(d => (d as { token: string }).token);
elegant-dress-88912
01/22/2020, 5:51 AMget
of https://www.pulumi.com/docs/reference/pkg/nodejs/pulumi/kubernetes/core/v1/#Secret does not honor this optionelegant-dress-88912
01/22/2020, 5:52 AMOutput
from non-secure Output
? I could use this as w/a.white-balloon-205
get
not respecting this option).elegant-dress-88912
01/22/2020, 5:53 AMwhite-balloon-205
mb there is some way to create secureYeah -from non-secureOutput
?Output
pulumi.secret(output)
should work.elegant-dress-88912
01/22/2020, 5:54 AMelegant-dress-88912
01/22/2020, 6:34 AM