sparse-intern-71089
11/24/2020, 2:38 PMlittle-cartoon-10569
11/24/2020, 7:57 PMA Warning: Using Secrets in Code
On pulumi up, secret values are decrypted and made available in plaintext at runtime. These may be read through any of the standard pulumi.Config getters shown above. While it is possible to read a secret using the ordinary non-secret getters, this is almost certainly not what you want. Use the secret variants of the configuration APIs instead, since this ensures that all transitive uses of that secret are themselves also marked as secrets.
little-cartoon-10569
11/24/2020, 7:58 PMrequireObject
or other non-secret variations to get outputs that aren't marked as secret. You'll only be able to see the values during up
.little-cartoon-10569
11/24/2020, 7:58 PMsteep-angle-29984
11/25/2020, 8:07 AMlittle-cartoon-10569
11/25/2020, 7:49 PMapply
, the value is no longer secret. The only effect of secret that I'm aware of is to mask output values on the console. So you could work around an output being secret by using
secretOutput.apply(x => <http://pulumi.log.info|pulumi.log.info>(`The secret value is ${x}`));