improvement(secret-rotation): validate conflicts before rotating external credentials#5461
Merged
victorvhs017 merged 1 commit intomainfrom Feb 18, 2026
Merged
Conversation
…hance validation checks - Updated the transaction parameter to be optional in the secret rotation service factory. - Improved validation logic to ensure no conflicting secrets exist before credential rotation, including checks for existing rotations and mapped names. - Added comments for clarity on validation steps.
Collaborator
✅ Snyk checks have passed. No issues have been found so far.
💻 Catch issues earlier using the plugins for VS Code, JetBrains IDEs, Visual Studio, and Eclipse. |
Contributor
Greptile OverviewGreptile SummaryThis PR adds an important validation check before rotating external credentials to prevent a confusing scenario where credentials are changed on external systems but the rotation record creation fails. Key Changes:
Impact: Confidence Score: 5/5
Important Files Changed
|
akhilmhdh
approved these changes
Feb 18, 2026
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Context
When creating a new secret rotation, if validation checks fail (e.g., rotation with the same name already exists, or secrets with mapped names already exist), the error is returned, but the resource credentials have already been changed.
This happens because the validation for conflicting secrets was only performed inside the transaction callback, which executes after the external credential rotation has already occurred. This leaves users in a confusing state where their password was changed on the external system, but no rotation record was created in Infisical.
To fix this we added a check before the rotation to fail fast.
Steps to verify the change
DB_PASSWORDDB_PASSWORDat the same pathType
Checklist
type(scope): short description(scope is optional, e.g.,fix: prevent crash on syncorfix(api): handle null response).