This message was deleted.
# general
s
This message was deleted.
g
Generally the best way to disable the ambient providers is to set fake values for its configuration - e.g.
pulumi config set azure:environment invalid
.
We have an issue at https://github.com/pulumi/pulumi/issues/3383 to make this more explicit.
n
pulumi config set kubernetes:kubeconfig invalid
This works, thanks! I like the fact that is is in pulumi.yaml and that I can commit that to git. What about disabling azure.core.getClientConfig({}) in my pulumi code ? (environment: invalid - doesn't allow that to go away)
To clarify - if pulumi needs to access that internally (e.g. to get credentials for executing 'up') that's fine, I just want to reliably ban uses of that from the checked-in pulumi program.
g
I'm not sure if Pulumi requires that internally and don't know of a way to disable it.