-
Notifications
You must be signed in to change notification settings - Fork 880
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix AWS OIDC TS example #1719
Fix AWS OIDC TS example #1719
Conversation
It's not possible to have a single stack which handles both the use case of creating a new OIDC provider and also adding an audience if none exists. This change removes the conditional creation of an OIDC provider and assumes none exists.
🍹 The Update for pulumi/k8s-ci-cluster/fdb201748d90389a09c344ae2fa45e94322adf06-284 was successful. Resource Changes Name Type Operation
+ k8s-ci-cluster-fdb201748d90389a09c344ae2fa45e94322adf06-284 pulumi:pulumi:Stack create
+ multicloud pulumi-kubernetes:ci:GkeCluster create
+ password random:index/randomPassword:RandomPassword create
+ ephemeral-ci-cluster gcp:container/cluster:Cluster create
+ primary-node-pool gcp:container/nodePool:NodePool create
+ gke pulumi:providers:kubernetes create
|
🍹 The Destroy for pulumi/k8s-ci-cluster/fdb201748d90389a09c344ae2fa45e94322adf06-284 was successful. Resource Changes Name Type Operation
- gke pulumi:providers:kubernetes delete
- primary-node-pool gcp:container/nodePool:NodePool delete
- ephemeral-ci-cluster gcp:container/cluster:Cluster delete
- multicloud pulumi-kubernetes:ci:GkeCluster delete
- password random:index/randomPassword:RandomPassword delete
- k8s-ci-cluster-fdb201748d90389a09c344ae2fa45e94322adf06-284 pulumi:pulumi:Stack delete
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Couple of linting errors to fix
🍹 The Update for pulumi/k8s-ci-cluster/692fcd077b28ae64c4589969d982c6f195733c31-289 was successful. Resource Changes Name Type Operation
+ primary-node-pool gcp:container/nodePool:NodePool create
+ gke pulumi:providers:kubernetes create
+ k8s-ci-cluster-692fcd077b28ae64c4589969d982c6f195733c31-289 pulumi:pulumi:Stack create
+ multicloud pulumi-kubernetes:ci:GkeCluster create
+ password random:index/randomPassword:RandomPassword create
+ ephemeral-ci-cluster gcp:container/cluster:Cluster create
|
🍹 The Destroy for pulumi/k8s-ci-cluster/692fcd077b28ae64c4589969d982c6f195733c31-289 was successful. Resource Changes Name Type Operation
- k8s-ci-cluster-692fcd077b28ae64c4589969d982c6f195733c31-289 pulumi:pulumi:Stack delete
- gke pulumi:providers:kubernetes delete
- primary-node-pool gcp:container/nodePool:NodePool delete
- ephemeral-ci-cluster gcp:container/cluster:Cluster delete
- multicloud pulumi-kubernetes:ci:GkeCluster delete
- password random:index/randomPassword:RandomPassword delete
|
Looks good. Thanks for this! Would love to see an update to the README that explains this limitation. |
Merging for @jkodroff per request. |
It's not possible to have a single stack which handles both the use case of creating a new OIDC provider and also adding an audience if none exists. This change removes the conditional creation of an OIDC provider and assumes none exists.