feat: add GCP Secret Manager OpenFeature provider#1772
feat: add GCP Secret Manager OpenFeature provider#1772mahpatil wants to merge 5 commits intoopen-feature:mainfrom
Conversation
There was a problem hiding this comment.
Code Review
This pull request introduces a new OpenFeature provider for Google Cloud Secret Manager, enabling feature flags to be managed as GCP secrets. The changes include the core provider implementation with caching and value conversion, along with comprehensive unit and integration tests, and a sample application. Feedback suggests adding an initial entry to the new module's CHANGELOG.md, refining the spotbugs-exclusions.xml to only include relevant exclusions, and improving the testability of FlagCache by injecting a Clock instance instead of relying on Instant.now() and Thread.sleep().
1c0fd8d to
0d10a01
Compare
|
/gemini review |
There was a problem hiding this comment.
Code Review
This pull request introduces a new OpenFeature provider for Google Cloud Secret Manager, enabling feature flags to be stored and managed as secrets. The implementation includes a TTL-based in-memory cache to optimize API usage and a converter to handle various OpenFeature data types. Feedback identifies several improvement opportunities, including fixing duplicate entries in the changelog, addressing a race condition and a potential 'thundering herd' issue in the caching logic, and strengthening input validation for the secret version configuration.
| @Test | ||
| @DisplayName("converts numeric string to Integer") | ||
| void numericString() { | ||
| assertThat(FlagValueConverter.convert("42", Integer.class)).isEqualTo(42); |
There was a problem hiding this comment.
Maybe we should also add a test for negative numbers
There was a problem hiding this comment.
@chrfwow there is already negativeNumericString below?
| @Test | ||
| @DisplayName("converts numeric string to Double") | ||
| void numericString() { | ||
| assertThat(FlagValueConverter.convert("3.14", Double.class)).isEqualTo(3.14); |
There was a problem hiding this comment.
Do we also want to support the exponential format, e.g. 3141.5e-3? We should add tests accordingly
| @Override public Instant instant() { return now.get(); } | ||
| }; | ||
|
|
||
| FlagCache cache = new FlagCache(Duration.ofSeconds(30), 100, controllableClock); |
There was a problem hiding this comment.
What do we need this cache for?
There was a problem hiding this comment.
i think this has changed now. getAfterTtlExpiry is the only one that uses timedCache to check if cache is empty after TTL.
| // Thread B: get() triggers expiry-removal of the old entry | ||
| () -> sharedCache.get("key")); | ||
|
|
||
| // After both threads complete, either the new value is present or the cache is |
There was a problem hiding this comment.
After a thread completes that puts a new value to the cache, I would not expect the cache to be empty. Am I missing something here?
| // Thread A: re-insert fresh value for the same key | ||
| () -> sharedCache.put("key", "new-value"), | ||
| // Thread B: get() triggers expiry-removal of the old entry | ||
| () -> sharedCache.get("key")); |
There was a problem hiding this comment.
I believe this should either return nothing or the new value, and we should assert that
There was a problem hiding this comment.
This may be an outdated comment now based on new quote. Thread A's value should not have expired regardless of the order so it should stay as get-check-remove now synchronized.
|
The build pipeline currently fails for two reasons: |
bcefaa7 to
6af66e7
Compare
Signed off commits to fix DCO |
- TTL-based in-memory FlagCache with Clock injection for deterministic testing - Thread-safe cache: synchronized get/remove block eliminates check-then-act race - Double-checked locking in fetchWithCache prevents thundering herd on GCP API - FlagValueConverter uses Boolean.parseBoolean for boolean flag values - secretVersion validation added to GcpSecretManagerProviderOptions - VmLens concurrent cache test covering concurrent get/put/expiry scenarios - Tests for negative and exponential number formats in FlagValueConverterTest - Integration test null guard for provider Signed-off-by: Mahesh Patil <maheshfinity@gmail.com>
- Move all setup (clock, cache, expired entry) inside the VmLens loop
so each interleaving starts with a clean, deterministic state
- Replace the conditional assertion with an unconditional check:
assertThat(cache.get("key")).isPresent().hasValue("new-value")
After Thread A's put() completes, the new value must always be present;
the previous if-present guard would silently pass a correctness bug
- Remove unused outer cache/controllableClock/now variables and the
redundant sharedCache/freshClock inside the loop
Signed-off-by: Mahesh Patil <maheshfinity@gmail.com>
… test" This reverts commit 58cf2a6. Signed-off-by: Mahesh Patil <maheshfinity@gmail.com>
The previous implementation had several structural problems:
- clock, cache (and an unused outer cache) were recreated inside the
VmLens while-loop. VmLens needs stable object references across
iterations to correctly track which shared memory locations are
concurrently accessed; recreating objects each iteration means VmLens
sees different heap addresses and cannot build a reliable access model.
- now.set(now.get().plusSeconds(31)) inside the loop kept advancing the
clock monotonically, so state was never cleanly reset between
interleavings and could allow "new-value" entries to expire.
- The assertion was too weak: if (result.isPresent()) { ... } would
silently pass even when the cache is empty, hiding the exact bug the
test is meant to catch.
Fixed by:
- Creating clock and cache once outside the loop (stable references)
- Resetting state inside the loop to fixed instants (t0/t1) via
cache.clear() + now.set(t0) before each interleaving
- Using an unconditional assertion:
assertThat(cache.get("key")).isPresent().hasValue("new-value")
After Runner.runParallel returns, Thread A's put() has completed so
"new-value" must always survive Thread B's expiry-removal.
Signed-off-by: Mahesh Patil <maheshfinity@gmail.com>
74e41c0 to
1d65ba5
Compare
Adds getOnTimedOutEntryWhileConcurrentInsertNeverReturnsStaleValue following the FlagdProviderCTest pattern: shared state prepared once before the interleaving loop in @beforeeach, only Runner.runParallel inside the loop, and assertions embedded in the parallel lambdas. Verifies that get() on a timed-out entry concurrent with a put() of the same key never returns the stale value — result must be empty or the freshly inserted value. Signed-off-by: Mahesh Patil <maheshfinity@gmail.com>
|
I hope all comments have been addressed now. Please let me know if there's anything outstanding. |
Summary
samples/gcp-secret-manager-sample/with setup/teardown scriptsProvider Details
providers/gcp-secret-managerGcpSecretManagerProviderTest plan
FlagCache,FlagValueConverter, andGcpSecretManagerProviderGcpSecretManagerProviderIntegrationTest) requires a real GCP project — setGCP_PROJECT_IDenv var to runsamples/gcp-secret-manager-sample/README.mdto run end-to-end