Conversation
| * false (same as null) | ||
| * true (parameter is secret) |
There was a problem hiding this comment.
| * false (same as null) | |
| * true (parameter is secret) | |
| * `false` (same as null) | |
| * `true` (parameter is secret) |
| If the value of `secret` is a string, this is a lookup key to | ||
| be used to fetch a secret value from the workflow platform |
There was a problem hiding this comment.
| If the value of `secret` is a string, this is a lookup key to | |
| be used to fetch a secret value from the workflow platform | |
| If the value of `secret` is a string, this is a lookup key that can | |
| be used to fetch a secret value from the workflow platform |
| implementation specific and out of scope for this document. | ||
|
|
||
| If the input parameter is a secret, the `type` of the input | ||
| parameter must only consist of `string`, `array<string>`, or |
There was a problem hiding this comment.
| parameter must only consist of `string`, `array<string>`, or | |
| parameter must only consist of `string`, `string[]`, or |
|
From discussion, should limit to only resolving the top level. Marius: maybe this should be called "protected". |
|
Another idea: Instead of putting the key in the workflow inputs Specify the secret in the input document: Use |
|
I have a question about secret. How to behave when the secret strings are written in files? |
|
New idea. Get rid of "confidential" and introduce "SecretText" record that is passed through and dereferenced to get "plaintext" only when needed. |
No description provided.