-
Notifications
You must be signed in to change notification settings - Fork 10
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ActionsOrganizationSecret: Updates delete but do not create the secret. #250
Comments
Forgot to mention that using the TF provider directly works as expected. So it appears to be specific to the bridged provider. Here's TF code that can be used to test:
|
Previously, replacements were deleting the secret after the replacement had completed, meaning the secret itself is no longer present See pulumi/pulumi-github#250
The same behavior occurs with |
This is definitely still a problem, is there any ETA on fixing this? For our case, it keeps recreating secrets that we gave a value through the Github UI, which is definitely not ideal and makes it unusable for managing secrets. |
Thanks for flagging this up and sorry you've hit this. This looks like an instance of pulumi/pulumi#918 and pulumi/pulumi#15982 We need to add DeleteBeforeReplace by default to the affected resources, similar to pulumi/pulumi-gcp#2498 The workaround for anyone affected is to specify |
That did not seem to work in our case, it still flagged it as being deleted. Should it respect the |
@MagnusHJensen for your case I believe you need to refresh the resource - ignore changes tells the engine to use the old value for the property: https://www.pulumi.com/docs/iac/concepts/options/ignorechanges/#:~:text=The%20ignoreChanges%20resource%20option%20specifies,update%20or%20replace%20is%20needed. In your case the old value is not the one you want, hence it tries to replace the resource. |
I can see the ignoreChanges might not work as expected as to my original thought. However I do know refreshing did not work, as our CI refreshes all resources before running |
@MagnusHJensen, it sounds like your problem is not the same as in the original Github issue - could you please open a new issue with step by step instructions on how to reproduce your problem? |
What happened?
An update to a github.ActionsOrganizationSecret resource results in the resource being replaced (expected) but the secret is deleted and then not recreated and no error message is given. Pulumi indicates that everything worked as expected but going to github to see the secret shows it is deleted.
Steps to reproduce
Using the code provided below, do the following:
pulumi up -y
pulumi up -y
(this will require replacing the secret)deleteBeforeReplace
resource option.TEST CODE:
Expected Behavior
Without the
deleteBeforeReplace
setting, I would expect some error to be presented instead of silently failing with indications of success.Actual Behavior
The
pulumi up
that replaces the secret completes with no error message but the secret is deleted and not recreated.Output of
pulumi about
Additional context
Workaround is to use
deleteBeforeReplace: true
Contributing
Vote on this issue by adding a 👍 reaction.
To contribute a fix for this issue, leave a comment (and link to your pull request, if you've opened one already).
The text was updated successfully, but these errors were encountered: