Skip to content

Conversation

@aljoscha
Copy link
Contributor

@aljoscha aljoscha commented Dec 4, 2025

Motivation

Tips for reviewer

Checklist

  • This PR has adequate test coverage / QA involvement has been duly considered. (trigger-ci for additional test/nightly runs)
  • This PR has an associated up-to-date design doc, is a design doc (template), or is sufficiently small to not require a design.
  • If this PR evolves an existing $T ⇔ Proto$T mapping (possibly in a backwards-incompatible way), then it is tagged with a T-proto label.
  • If this PR will require changes to cloud orchestration or tests, there is a companion cloud PR to account for those changes that is tagged with the release-blocker label (example).
  • If this PR includes major user-facing behavior changes, I have pinged the relevant PM to schedule a changelog post.

This one is really a no-op, for now, because secrets are stored in the
controller even _before_ the catalog transaction.
@aljoscha aljoscha requested a review from a team as a code owner December 4, 2025 14:04
@aljoscha aljoscha requested a review from SangJunBak December 4, 2025 14:04
@aljoscha aljoscha changed the title ada\ter adapter: handle easy objects using catalog implications Dec 4, 2025
@aljoscha aljoscha requested review from ggevay and teskje December 4, 2025 14:05
@aljoscha aljoscha force-pushed the adapter-implications-follow-up branch from 3833722 to f8590a8 Compare December 4, 2025 15:20
);
// Connection alterations (like rotate keys) are handled via
// secrets_controller without catalog changes to the connection
// details structure, so no action needed here.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm not familiar with these things, but I see a ConnectionDetails::AwsPrivatelink code block in sequence_alter_connection_stage_finish, which does stuff with the cloud_resource_controller. (It seems similar to the migrated code block from sequence_create_connection_stage_finish.) Should that be also migrated here, similar to vpc_endpoints_to_create?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Indeed, the main difference seems to be that the code "transaction side effects" are not included in a catalog_transact_with_side_effects call, but are run after the transaction. Which... I think is functionally the same?

Comment on lines +372 to +374
// No action needed: altering a secret updates the payload via
// secrets_controller.ensure() without a catalog transaction,
// so we shouldn't see AlterSecret updates here.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Seems worth adding a soft assert or error log, so we can catch if this ever changes?

Comment on lines +544 to +548
tracing::warn!(?err, "failed to ensure vpc endpoint!");
}
}
} else {
tracing::warn!(
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I know both of these are warns in the original code as well, but I'm wondering if we shouldn't make them errors instead? Seems like we should complain pretty loudly if we fail here, since we've already reported to the user that the command was successful.

);
// Connection alterations (like rotate keys) are handled via
// secrets_controller without catalog changes to the connection
// details structure, so no action needed here.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Indeed, the main difference seems to be that the code "transaction side effects" are not included in a catalog_transact_with_side_effects call, but are run after the transaction. Which... I think is functionally the same?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants