Skip to content

feat: add GCP Secret Manager OpenFeature provider#1772

Open
mahpatil wants to merge 7 commits intoopen-feature:mainfrom
mahpatil:feat/gcp-secret-manager
Open

feat: add GCP Secret Manager OpenFeature provider#1772
mahpatil wants to merge 7 commits intoopen-feature:mainfrom
mahpatil:feat/gcp-secret-manager

Conversation

@mahpatil
Copy link
Copy Markdown

@mahpatil mahpatil commented Apr 9, 2026

Summary

  • Adds a new OpenFeature provider for GCP Secret Manager that reads feature flags from GCP Secret Manager secrets
  • Includes flag caching, value conversion for all OpenFeature types (bool, string, int, double, object), and background polling for updates
  • Adds a sample application under samples/gcp-secret-manager-sample/ with setup/teardown scripts

Provider Details

  • Package: providers/gcp-secret-manager
  • Class: GcpSecretManagerProvider
  • Supports all OpenFeature flag types via structured or plain-text secret values
  • Configurable poll interval and GCP project settings

Test plan

  • Unit tests for FlagCache, FlagValueConverter, and GcpSecretManagerProvider
  • Integration test (GcpSecretManagerProviderIntegrationTest) requires a real GCP project — set GCP_PROJECT_ID env var to run
  • Sample app: follow samples/gcp-secret-manager-sample/README.md to run end-to-end

@mahpatil mahpatil requested a review from a team as a code owner April 9, 2026 05:18
Copy link
Copy Markdown
Contributor

@gemini-code-assist gemini-code-assist Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code Review

This pull request introduces a new OpenFeature provider for Google Cloud Secret Manager, enabling feature flags to be managed as GCP secrets. The changes include the core provider implementation with caching and value conversion, along with comprehensive unit and integration tests, and a sample application. Feedback suggests adding an initial entry to the new module's CHANGELOG.md, refining the spotbugs-exclusions.xml to only include relevant exclusions, and improving the testability of FlagCache by injecting a Clock instance instead of relying on Instant.now() and Thread.sleep().

Comment thread providers/gcp-secret-manager/CHANGELOG.md
Comment thread providers/gcp-secret-manager/spotbugs-exclusions.xml Outdated
@mahpatil mahpatil force-pushed the feat/gcp-secret-manager branch from 1c0fd8d to 0d10a01 Compare April 11, 2026 20:44
@aepfli
Copy link
Copy Markdown
Member

aepfli commented Apr 13, 2026

/gemini review

Copy link
Copy Markdown
Contributor

@gemini-code-assist gemini-code-assist Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code Review

This pull request introduces a new OpenFeature provider for Google Cloud Secret Manager, enabling feature flags to be stored and managed as secrets. The implementation includes a TTL-based in-memory cache to optimize API usage and a converter to handle various OpenFeature data types. Feedback identifies several improvement opportunities, including fixing duplicate entries in the changelog, addressing a race condition and a potential 'thundering herd' issue in the caching logic, and strengthening input validation for the secret version configuration.

Comment thread providers/gcp-secret-manager/CHANGELOG.md Outdated
@Override public Instant instant() { return now.get(); }
};

FlagCache cache = new FlagCache(Duration.ofSeconds(30), 100, controllableClock);
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

What do we need this cache for?

Copy link
Copy Markdown
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

i think this has changed now. getAfterTtlExpiry is the only one that uses timedCache to check if cache is empty after TTL.

// Thread A: re-insert fresh value for the same key
() -> sharedCache.put("key", "new-value"),
// Thread B: get() triggers expiry-removal of the old entry
() -> sharedCache.get("key"));
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I believe this should either return nothing or the new value, and we should assert that

Copy link
Copy Markdown
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This may be an outdated comment now based on new quote. Thread A's value should not have expired regardless of the order so it should stay as get-check-remove now synchronized.

@chrfwow
Copy link
Copy Markdown
Contributor

chrfwow commented Apr 21, 2026

The build pipeline currently fails for two reasons:
The commits are not signed off. To fix this, you will need to sign off all your changes and force push them on this branch
The type check fails, this can be fixed automatically when you run the spotlessApply command

@mahpatil mahpatil force-pushed the feat/gcp-secret-manager branch from bcefaa7 to 6af66e7 Compare April 24, 2026 08:54
@mahpatil
Copy link
Copy Markdown
Author

The build pipeline currently fails for two reasons: The commits are not signed off. To fix this, you will need to sign off all your changes and force push them on this branch The type check fails, this can be fixed automatically when you run the spotlessApply command

Signed off commits to fix DCO

- TTL-based in-memory FlagCache with Clock injection for deterministic testing
- Thread-safe cache: synchronized get/remove block eliminates check-then-act race
- Double-checked locking in fetchWithCache prevents thundering herd on GCP API
- FlagValueConverter uses Boolean.parseBoolean for boolean flag values
- secretVersion validation added to GcpSecretManagerProviderOptions
- VmLens concurrent cache test covering concurrent get/put/expiry scenarios
- Tests for negative and exponential number formats in FlagValueConverterTest
- Integration test null guard for provider

Signed-off-by: Mahesh Patil <maheshfinity@gmail.com>
- Move all setup (clock, cache, expired entry) inside the VmLens loop
  so each interleaving starts with a clean, deterministic state
- Replace the conditional assertion with an unconditional check:
  assertThat(cache.get("key")).isPresent().hasValue("new-value")
  After Thread A's put() completes, the new value must always be present;
  the previous if-present guard would silently pass a correctness bug
- Remove unused outer cache/controllableClock/now variables and the
  redundant sharedCache/freshClock inside the loop

Signed-off-by: Mahesh Patil <maheshfinity@gmail.com>
… test"

This reverts commit 58cf2a6.

Signed-off-by: Mahesh Patil <maheshfinity@gmail.com>
The previous implementation had several structural problems:

- clock, cache (and an unused outer cache) were recreated inside the
  VmLens while-loop. VmLens needs stable object references across
  iterations to correctly track which shared memory locations are
  concurrently accessed; recreating objects each iteration means VmLens
  sees different heap addresses and cannot build a reliable access model.

- now.set(now.get().plusSeconds(31)) inside the loop kept advancing the
  clock monotonically, so state was never cleanly reset between
  interleavings and could allow "new-value" entries to expire.

- The assertion was too weak: if (result.isPresent()) { ... } would
  silently pass even when the cache is empty, hiding the exact bug the
  test is meant to catch.

Fixed by:
- Creating clock and cache once outside the loop (stable references)
- Resetting state inside the loop to fixed instants (t0/t1) via
  cache.clear() + now.set(t0) before each interleaving
- Using an unconditional assertion:
  assertThat(cache.get("key")).isPresent().hasValue("new-value")
  After Runner.runParallel returns, Thread A's put() has completed so
  "new-value" must always survive Thread B's expiry-removal.

Signed-off-by: Mahesh Patil <maheshfinity@gmail.com>
@mahpatil mahpatil force-pushed the feat/gcp-secret-manager branch from 74e41c0 to 1d65ba5 Compare April 24, 2026 22:18
Adds getOnTimedOutEntryWhileConcurrentInsertNeverReturnsStaleValue following
the FlagdProviderCTest pattern: shared state prepared once before the
interleaving loop in @beforeeach, only Runner.runParallel inside the loop,
and assertions embedded in the parallel lambdas.

Verifies that get() on a timed-out entry concurrent with a put() of the
same key never returns the stale value — result must be empty or the
freshly inserted value.

Signed-off-by: Mahesh Patil <maheshfinity@gmail.com>
@mahpatil
Copy link
Copy Markdown
Author

I hope all comments have been addressed now. Please let me know if there's anything outstanding.

}
};

FlagCache cache = new FlagCache(Duration.ofSeconds(30), 100, clock);
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Why do we create a cache, clock and now when all of that is already done in the setup method?

@mahpatil
Copy link
Copy Markdown
Author

Good catch — removed the duplicate now, clock, and cache setup from concurrentExpiryAndInsertDoNotLoseNewEntry and switched to the T0/T1 constants and instance fields already initialised in @BeforeEach.

…oseNewEntry

Signed-off-by: Mahesh Patil <maheshfinity@gmail.com>
@mahpatil mahpatil force-pushed the feat/gcp-secret-manager branch from d01ff47 to ea481a2 Compare April 27, 2026 15:41
@toddbaert
Copy link
Copy Markdown
Member

Re: #1771 (cc @aepfli @chrfwow @mahpatil)

Looking at #1771 + #1772 side by side, I think there's been a small misunderstanding of @aepfli's earlier feedback. IIUC he asked for the PR to be split for review hygiene ("a pull request is small, and provides just one additional feature"), not necessarily for two separate Maven modules. The split-PRs ask has been honoured; the split-modules part was an additional interpretation.

@chrfwow already raised the same question on #1771. Posting here too since this is where active review is happening, and IMO it's much cheaper to settle before #1772 merges than after.

Let's keep 2 PRs but land them in one module.

  • The two PRs duplicate ~80% of code (FlagCache, FlagValueConverter, the provider scaffolding, tests). They're already drifting (Clock injection, STATIC vs CACHED, exception cause, log4j versions).
  • The GCP client deps are technically different artifacts, but their transitive trees overlap heavily (gax, gRPC, protobuf, auth, etc.); the incremental footprint of having both on the classpath is small.
  • One module = one CHANGELOG, one release, one set of internals to maintain. Two modules = ongoing duplication tax. A third gcp-common module is overkill for what's effectively one shared FlagCache.

@mahpatil - to keep things reviewable, suggest stacking the branches: rework this PR (#1772) to add a single providers/gcp module with pom.xml, shared internals (FlagCache, FlagValueConverter), and the Secret Manager provider. Then rebase #1771 on top, so it only adds the Parameter Manager provider on top of the shared scaffolding. SM-first makes sense since this PR is closer to approval. That way each PR stays small and focused, and the shared scaffolding only shows up in the diff once.

Suggested module name: providers/gcp (artifact gcp). Short, accurate, and leaves room if other GCP-backed providers ever land later. gcp-secret-and-parameter-manager works too but is mouthful-y. WDYT?

@aepfli - was your earlier ask only about the PR split, or did you also intend two artifacts? Happy to discuss if there's a packaging reason I'm missing.

@toddbaert toddbaert requested a review from aepfli April 30, 2026 15:02
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants