Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We鈥檒l occasionally send you account related emails.

Already on GitHub? Sign in to your account

Secret Providers for Mainline Desktop Keyrings #8673

Open
tdaniely-dn opened this issue Jan 2, 2022 · 0 comments
Open

Secret Providers for Mainline Desktop Keyrings #8673

tdaniely-dn opened this issue Jan 2, 2022 · 0 comments
Labels
area/cli UX of using the CLI (args, output, logs) area/secrets kind/enhancement Improvements or new features

Comments

@tdaniely-dn
Copy link

Hello!

  • Vote on this issue by adding a 馃憤 reaction
  • If you want to implement this feature, comment to let us know (we'll work with you on design, scheduling, etc.)

Issue details

My solution has a kubernetes cluster in infra stacks, and app stacks that deploy on it.
For prototyping / testing app stack, and for use by developers, a local stack of the app can be deployed on a local k8s with pulumi login --local.
In this scenario would be nice to not need to type in the secret password all the time.
This can be resolved by adding secret providers for mainline desktop keyring (e.g osxkeyring, wincred, gnu secrets).

Affected area/feature

Pulumi CLI

@tdaniely-dn tdaniely-dn added the kind/enhancement Improvements or new features label Jan 2, 2022
@stack72 stack72 added area/cli UX of using the CLI (args, output, logs) area/secrets labels Jan 5, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/cli UX of using the CLI (args, output, logs) area/secrets kind/enhancement Improvements or new features
Projects
None yet
Development

No branches or pull requests

2 participants