feat: Add type in ACL Secret#117
Merged
Merged
Conversation
298c5b8 to
86e7af1
Compare
Signed-off-by: Deepak Punjabi <deepakpunjabi13@gmail.com>
86e7af1 to
812dffe
Compare
Collaborator
|
Thanks for raising this! I think it makes complete sense. Is it possible to introduce a test for this? |
Signed-off-by: Deepak Punjabi <deepakpunjabi13@gmail.com>
Contributor
Author
My bad. Added test for validating |
sandeepkunusoth
approved these changes
Mar 21, 2026
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Currently,

valkeycluster_controllerwatches over all secrets for which it has access to. As current default deployment manifests provide access to clusterRole, this can end up watching over thousands of secrets in production kubernetes clusters.Apart from that, this forces controller to do busy work which is not relevant to the controller goals.
This PR add a secret type
valkey.io/aclto only reconcile secrets of interest to address above concerns. This can also be used with future filtering and validation usecases.