feat: use secrets in submit with arguments dialog#1767
Conversation
f8de3f0 to
ff72e68
Compare
c717675 to
b341078
Compare
ff72e68 to
76e1ba3
Compare
a6f7d6e to
dea5ac6
Compare
ffe4c37 to
8de520a
Compare
dea5ac6 to
8834c6c
Compare
8de520a to
a166e29
Compare
764e981 to
bf0f4c9
Compare
a166e29 to
211cc35
Compare
211cc35 to
fd03b48
Compare
bf0f4c9 to
07cdf48
Compare
fd03b48 to
b89e896
Compare
07cdf48 to
76e0840
Compare
| ), | ||
| ), | ||
| taskArguments: executionData?.rootDetails?.task_spec.arguments, | ||
| // The generated API types don't include SecretArgument but the backend supports it |
There was a problem hiding this comment.
can we re-generate the types? npm run generate-api I believe
There was a problem hiding this comment.
yeah, that's done in a later PRs - this was created before backend was ready.
There was a problem hiding this comment.
But in general it is a broader problem that we have two sets of types to describe the same thing - ComponentSpec one from generated api, one manually written
There was a problem hiding this comment.
Agree with this ^ Wish we had a singular automatic solution for a type interface when dealing with the api/backend
There was a problem hiding this comment.
We can set this as agenda item for Frontend Sync
76e0840 to
95d86dc
Compare
27f3a22 to
cd0cdde
Compare
95d86dc to
23a6f7b
Compare
ce8e281 to
e4936a3
Compare
|
@camielvs Yes, Secret can be set only for Argument. And Arguments in our case are applicable only when submitting the ComponentSpec as a TaskSpec. So there is no way to set Secret directly onto the input - it simply is not supported by the spec and backend. |
|
@camielvs It will not be copied. So at this moment secrets need to be set manually each time. I will explore this in a follow up PR |
How are task arguments achieving this in a way that would be different to input nodes? I wouldn't be surprised if this is something users ask for. Maybe it would be mitigated if we make "Submit run with arguments" the default behaviour for the submit button.
That's fine. I tried this in #1771 and nothing happened except a "success" toast appearing. I would recommend removing the toast if nothing actually gets updated. |
|
>I would recommend removing the toast if nothing actually gets updated. |
|
Maybe a different message/colour will suffice? e.g. "No arguments to copy" or something like that. |
e4936a3 to
b23b20e
Compare
0ea1669 to
dd2207d
Compare
b23b20e to
aa2a04f
Compare
|
>Maybe a different message/colour will suffice? e.g. "No arguments to copy" or something like that. |
dd2207d to
a213ecb
Compare
6addd92 to
a6041e7
Compare
6918412 to
963e0c9
Compare
a6041e7 to
5e51121
Compare
963e0c9 to
1f48e66
Compare
5e51121 to
b7596cf
Compare
b7596cf to
50a917d
Compare
Merge activity
|



Description
Added support for SecretArguments in pipeline rerun functionality. This enhancement allows users to securely pass secret values when rerunning pipelines by integrating with the existing secrets management system. The implementation includes UI components for selecting secrets and proper handling of secret arguments throughout the pipeline submission process.
Type of Change
Checklist
Screenshots
Screen Recording 2026-02-17 at 4.51.13 PM.mov (uploaded via Graphite)
Test Instructions
Additional Comments
This change properly handles SecretArgument types in the pipeline rerun flow, fixing type issues with the API and ensuring secrets are preserved during resubmission. The UI now shows a lock icon for secret values and provides an option to select secrets for parameters.