-
Notifications
You must be signed in to change notification settings - Fork 844
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Resources should support a 'delete' action #362
Comments
Hi there! We use Pivotal Tracker to provide visibility into what our team is working on. A story for this issue has been automatically created. The current status is as follows:
This comment, as well as the labels on the issue, will be automatically updated as the status in Tracker changes. |
There are multiple resource that need to solve this problem. I think the right way to solve this it is for concourse to support That would map more obviously to the underlying operation, rather than relying on esoteric params in the |
See this issue for more details: concourse/concourse#362
👍 to @robdimsdale - this feels more appropriate with a |
@vito is a |
👍 to you both. A first-class |
Consolidating into #362 |
@vito Now that this issue is closed, where is the feature being tracked so I can follow along? |
#534 - messed up my link On Thu, Jul 14, 2016, 12:28 PM Glenn Oppegard notifications@github.com
|
Use Case
I'm working on a terraform resource which includes an option to run terraform destroy via a 'put':
This action destroys the infrastructure, removes the state file from S3, and returns the current timestamp as the
version
. Prior to the destroy step theversion
is the last modified time of the state file.Issue
The
put
action is followed by an implicitget
. In the normal case, aget
would return an error if that state file could not be found. However, the implicitget
should no-op after aput
destroys the state file. My current workaround is to useget_params
to tellget
to no-op:This works, but requiring the user to specify a duplicate
get_params
action is confusing / error-prone. I think this problem would also apply to other resources that could destroy things like the CloudFormation and bosh-deployment resources.Updated Suggestion from @vito and @robdimsdale
Supporting a
delete
resource option in addition toget
andput
clearly describes the intent of the action and avoids hacky patterns around destructiveput
operations.Original Suggestion
One possible fix could be allowing resource authors to disable the implicit
get
following a destructiveput
via a newout
field:Thanks!
The text was updated successfully, but these errors were encountered: