Results 90 comments of Aaron Roydhouse

Hi @brianbordini, I think you are mixing up container image build tools with [container runtimes](https://kubernetes.io/docs/setup/production-environment/container-runtimes/). `podman` and `buildah` are not alternative runtimes for Kubernetes, but you can choose to use...

You're not wrong @beanaroo! `prevent_destroy` is I think broken and arguably unusable in it's current form. The problem is that `prevent_destroy` doesn't just keep the flagged resource from being destroyed...

@dguisinger yes that is what we are doing, only using terraform for resources that are not calamitous if destroyed. Or in one strategy we have two terraform deployments, with one...

@ketzacoatl #3874 is the earlier request (2015!) and has the most participants (~40) and +1's (~100), so I would suggest keeping that one.

Thanks @ckyoog `keep_on_destroy` sounds great. If the current `prevent_destroy` behavior is by design, then I can’t personally see a use case for it?Maybe rename `prevent_any_destroy_plan_that_would_also_destroy_this`.

@sbidy I bought a Squire to test and they're pretty nice as mood / uplights! They would be awesome in HA if the two lights were exposed separately, and it...

@rohanmangal Kubernetes supports dynamic binding of file-based Secrets within containers, so if you deploy to EKS you can use that to rotate secrets without restarting containers. You can further use...

More examples: BitBucket enabled `userns` for BitBucket Pipelines which broke multi-stage builds. https://bitbucket.org/site/master/issues/17319/docker-builds-started-failing-with https://bitbucket.org/site/master/issues/17241/copying-files-in-multistage-docker

I just created and an account and have tried creating two API keys and neither work with the suggested test command. ``` $ curl -X GET -H "Authorization: Bearer XXXXXXX"...

> I just pushed a bunch of changes to both platform + the API. New keys are confirmed to work - if you still have an issue with an old...