pulumi/pkg/backend/httpstate
stack72 30c8718098 Using a decryptAll functionality when deserializing a deployment
Fixes: #6445

Previously, when a deserialisation operation, e.g, `pulumi stack` command
was carried out, each service based secret in the stack was decrypted one at a time
causing n times the number of API requests to the Pulumi service

This meant the following to the user:

```
Calling [pulumi stack] with [1000] secrets took [210.04] seconds.
```

With this new code, we now scan all the inputs and outputs for secrets,
and make a bulk secret decryption dequest to the service and then use
the secrets as a lookup for the deserialization operation. This means
we have a single API request to the service and now means the following
to the user:

```
Calling [pulumi stack] with [1000] secrets took [16.30] seconds.
```
2022-01-04 13:32:13 +00:00
..
client Using a decryptAll functionality when deserializing a deployment 2022-01-04 13:32:13 +00:00
backend.go Update error handling (#8406) 2021-11-12 18:37:17 -08:00
backend_test.go Update error handling (#8406) 2021-11-12 18:37:17 -08:00
console.go Add support for a PULUMI_CONSOLE_DOMAIN env var (#4410) 2020-04-17 11:50:00 -07:00
console_test.go Add support for a PULUMI_CONSOLE_DOMAIN env var (#4410) 2020-04-17 11:50:00 -07:00
doc.go Document Go packages (#6009) 2021-01-11 11:07:59 -07:00
policypack.go Update error handling (#8406) 2021-11-12 18:37:17 -08:00
snapshot.go Update error handling (#8406) 2021-11-12 18:37:17 -08:00
stack.go Watch Command - Added `--path` Argument (#7247) 2021-06-21 17:34:21 +10:00
state.go Update error handling (#8406) 2021-11-12 18:37:17 -08:00