Pulumi

Latest version: v3.143.0

Safety actively analyzes 688694 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 47 of 64

2.2.1

- Add new brew target to fix homebrew builds
[4633](https://github.com/pulumi/pulumi/pull/4633)

2.2.0

- Fixed ResourceOptions issue with stack references in Python SDK
[4553](https://github.com/pulumi/pulumi/pull/4553)

- Add runTask to F Deployment module
[3858](https://github.com/pulumi/pulumi/pull/3858)

- Add support for generating Fish completions
[4401](https://github.com/pulumi/pulumi/pull/4401)

- Support map-typed inputs in RegisterResource for Go SDK
[4522](https://github.com/pulumi/pulumi/pull/4522)

- Don't call IMocks.NewResourceAsync for the root stack resource
[4527](https://github.com/pulumi/pulumi/pull/4527)

- Add ResourceOutput type to Go SDK
[4575](https://github.com/pulumi/pulumi/pull/4575)

- Allow secrets to be decrypted when exporting a stack
[4046](https://github.com/pulumi/pulumi/pull/4046)

- Commands checking for a confirmation or requiring a `--yes` flag can now be
skipped by setting `PULUMI_SKIP_CONFIRMATIONS` to `1` or `true`.
[4477](https://github.com/pulumi/pulumi/pull/4477)

2.1.1

- Add retry support when writing to state buckets
[4494](https://github.com/pulumi/pulumi/pull/4494)

2.1.0

- Fix infinite recursion bug for Go SDK
[4516](https://github.com/pulumi/pulumi/pull/4516)

- Order secretOutputNames when used in stack references
[4489](https://github.com/pulumi/pulumi/pull/4489)

- Add support for a `PULUMI_CONSOLE_DOMAIN` environment variable to override the
behavior for how URLs to the Pulumi Console are generated.
[4410](https://github.com/pulumi/pulumi/pull/4410)

- Protect against panic when unprotecting non-existant resources
[4441](https://github.com/pulumi/pulumi/pull/4441)

- Add flag to `pulumi stack` to output only the stack name
[4450](https://github.com/pulumi/pulumi/pull/4450)

- Ensure Go accessor methods correctly support nested fields of optional outputs
[4456](https://github.com/pulumi/pulumi/pull/4456)

- Improve `ResourceOptions.merge` type in Python SDK
[4484](https://github.com/pulumi/pulumi/pull/4484)

- Ensure generated Python module names are keyword-safe.
[4473](https://github.com/pulumi/pulumi/pull/4473)

- Explicitly set XDG_CONFIG_HOME and XDG_CACHE_HOME env vars for helm in the
pulumi docker image
[4474](https://github.com/pulumi/pulumi/pull/4474)

- Increase the MaxCallRecvMsgSize for all RPC calls.
[4455](https://github.com/pulumi/pulumi/pull/4455)

2.0.0

- CLI behavior change. Commands in non-interactive mode (i.e. when `pulumi` has its output piped to
another process or running on CI) will not default to assuming that `--yes` was passed in. `--yes` is now
explicitly required to proceed in non-interactive scenarios. This affects:
* `pulumi destroy`
* `pulumi new`
* `pulumi refresh`
* `pulumi up`

- Fixed [crashes and hangs](https://github.com/pulumi/pulumi/issues/3528) introduced by usage of
another library.

- pulumi/pulumi now requires Node.js version >=10.10.0.

- All data-source invocations are now asynchronous (Promise-returning) by default.

- C code generation switched to schema.

- .NET API: replace `IDeployment` interface with `DeploymentInstance` class.

- Fix Go SDK secret propagation for Resource inputs/outputs.
[4387](https://github.com/pulumi/pulumi/pull/4387)

- Fix Go codegen to emit config packages
[4388](https://github.com/pulumi/pulumi/pull/4388)

- Treat config values set with `--path` that start with '0' as strings rather than numbers.
[4393](https://github.com/pulumi/pulumi/pull/4393)

- Switch .NET projects to .NET Core 3.1
[4400](https://github.com/pulumi/pulumi/pull/4400)

- Avoid unexpected replace on resource with `import` applied on second update.
[4403](https://github.com/pulumi/pulumi/pull/4403)

1.14.1

- Propagate `additionalSecretOutputs` opt to Read in NodeJS.
[4307](https://github.com/pulumi/pulumi/pull/4307)

- Fix handling of `nil` values in Outputs in Go.
[4268](https://github.com/pulumi/pulumi/pull/4268)

- Include usage hints for Input types in Go SDK
[4279](https://github.com/pulumi/pulumi/pull/4279)

- Fix secretness propagation in Python `apply`.
[4273](https://github.com/pulumi/pulumi/pull/4273)

- Fix the `call` mock in Python.
[4274](https://github.com/pulumi/pulumi/pull/4274)

- Fix handling of secret values in mock-based tests.
[4272](https://github.com/pulumi/pulumi/pull/4272)

- Automatic plugin acquisition for Go
[4297](https://github.com/pulumi/pulumi/pull/4297)

- Define merge behavior for resource options in Go SDK
[4316](https://github.com/pulumi/pulumi/pull/4316)

- Add overloads to Output.All in .NET
[4321](https://github.com/pulumi/pulumi/pull/4321)

- Make prebuilt executables opt-in only for the Go SDK
[4338](https://github.com/pulumi/pulumi/pull/4338)

- Support the `binary` option (prebuilt executables) for the .NET SDK
[4355](https://github.com/pulumi/pulumi/pull/4355)

- Add helper methods for stack outputs in the Go SDK
[4341](https://github.com/pulumi/pulumi/pull/4341)

- Add additional overloads to Deployment.RunAsync in .NET API.
[4286](https://github.com/pulumi/pulumi/pull/4286)

- Automate execution of `go mod download` for `pulumi new` Go templates
[4353](https://github.com/pulumi/pulumi/pull/4353)

- Fix `pulumi up -r -t $URN` not refreshing only the target
[4217](https://github.com/pulumi/pulumi/pull/4217)

- Fix logout with file backend when state is deleted
[4218](https://github.com/pulumi/pulumi/pull/4218)

- Fix specific flags for `pulumi stack` being global
[4294](https://github.com/pulumi/pulumi/pull/4294)

- Fix error when setting config without value in non-interactive mode
[4358](https://github.com/pulumi/pulumi/pull/4358)

- Propagate unknowns in Go SDK during marshal operations
[4369](https://github.com/pulumi/pulumi/pull/4369/files)

- Fix Go SDK stack reference helpers to handle nil values
[4370](https://github.com/pulumi/pulumi/pull/4370)

- Fix propagation of unknown status for secrets
[4377](https://github.com/pulumi/pulumi/pull/4377)

Page 47 of 64

Links

Releases

Has known vulnerabilities

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.