you could also use the protect: true on those thin...
# general
b
you could also use the protect: true on those things once you're happy with them (https://www.pulumi.com/docs/intro/concepts/resources/#protect)
f
Yeah considered that too. But it's easy to just remove it (though that might not be a refactoring but more deliberate altering)
w
I'm not sure if you're aware (I wasn't), it's not the same as a terraform
prevent_destroy
, you have to use the CLI to remove it... making it quite useful when combined with users not have access to the CLI
i.e. once you've added it, it's there, you can't just remove the code and it will destroy it.
In Azure I've coupled that with a lock on the resource for extra protection.
f
This also works in CI scenarios?
interesting.
Thanks for info 🙂
w
I've hit it in CI (which is where I noticed it), but I was using the Azure Blob backend, I'm not sure if that's a nuance of the Azure blob backend though.
https://www.pulumi.com/docs/reference/cli/pulumi_state_unprotect/ When you look at the CLI though, it does seem to suggest that it's the only way to remove the protect bit from the state