Skip to content

Conversation

@weiminyu
Copy link
Collaborator

@weiminyu weiminyu commented Feb 10, 2026

The current SQL credential store was designed to support automatic password rotation without any disruption to the applications. For that goal, the credentials are stored with one level of indirection, and the secret name of the actual credential data may change automatically.

The automatic password rotation feature has been dropped. In the meantime, the need arises that we use sidecar SQL proxy to get around the Enterprise Plus edition's post-maintenance reconnection failures by the socket factory library. This is hampered by the indirection in storage.

This PR removes the indirection. This change is transparent to the rest of the code base. We will manually populate the secret manager with the new secrets in all environments after submissiion of this PR.


This change is Reviewable

The current SQL credential store was designed to support automatic
password rotation without any disruption to the applications. For that
goal, the credentials are stored with one level of indirection, and the
secret name of the actual credential data may change automatically.

The automatic password rotation feature has been dropped. In the
meantime, the need arises that we use sidecar SQL proxy to get around
the Enterprise Plus edition's post-maintenance reconnection failures
by the socket factory library. This is hampered by the indirection in
storage.

This PR removes the indirection. This change is transparent to the rest
of the code base. We will manually populate the secret manager with the
new secrets in all environments after submissiion of this PR.
@weiminyu weiminyu requested a review from ptkach February 10, 2026 18:54
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant