Skip to content

each adoption handler only sees its own secret#410

Open
steven-rand wants to merge 2 commits intoauthzed:mainfrom
steven-rand:deconflict-secret-adoption
Open

each adoption handler only sees its own secret#410
steven-rand wants to merge 2 commits intoauthzed:mainfrom
steven-rand:deconflict-secret-adoption

Conversation

@steven-rand
Copy link
Copy Markdown

Description

Intended to fix #409. Limits each secret adoption handler to managing its own secret, and prevents each one from discarding another secret managed by the operator as extra.

Testing

Added unit test which failed prior to the change and succeeds after.

References

@github-actions
Copy link
Copy Markdown

github-actions Bot commented Apr 9, 2026

CLA Assistant Lite bot All contributors have signed the CLA ✍️ ✅

@steven-rand
Copy link
Copy Markdown
Author

I have read the CLA Document and I hereby sign the CLA

authzedbot added a commit to authzed/cla that referenced this pull request Apr 9, 2026
@steven-rand
Copy link
Copy Markdown
Author

Hi @ecordell @alecmerdler, I was wondering whether either of you would be the right person to review this change since I saw that you worked on #403. Happy to provide any context if that's useful, although hopefully the write-up in #409 describes the behavior we're seeing

@alecmerdler
Copy link
Copy Markdown
Contributor

@steven-rand Thanks for your contribution! We'll try and take a look at this as soon as possible.

@steven-rand
Copy link
Copy Markdown
Author

Hi @alecmerdler, I was wondering whether you've had a chance to take a look here? I'm not married to this particular solution; more just interested in finding some solution to the problem described in #409

@ecordell
Copy link
Copy Markdown
Contributor

ecordell commented May 1, 2026

Hi @steven-rand - thanks for your patience here, took a while to get to this

The approach in this PR is okay but not ideal - it means that if other processes created objects with duplicate labels (say you accidentally deploy two spicedb-operators at the same time, or do a backup/restore of objects), the operator won't necessarily identify the right one to remove.

I made #417 as an attempt to solve this in a way that lines up with the existing adoption handler behavior - each role a secret can have is tracked with a separate field manager / label / index, so each adoption handler then works "normally".

@steven-rand
Copy link
Copy Markdown
Author

Thanks @ecordell, I'll close this PR out in favor of yours, which I see just merged. Do you have a sense for when your change will make it into a release? We'd be interested in getting this change deployed to our environments as soon as that's possible

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

secret adoption handlers conflict with each other

3 participants