Conversation
…ts in AWS sync Track which secrets are created, updated, and deleted at the destination during AWS Secrets Manager and AWS Parameter Store sync operations. The sync functions now return a TSyncSecretsResult containing the three key arrays, which are included in the SECRET_SYNC_SYNC_SECRETS audit log metadata for full visibility into what changed at the destination. Made-with: Cursor
Collaborator
✅ Snyk checks have passed. No issues have been found so far.
💻 Catch issues earlier using the plugins for VS Code, JetBrains IDEs, Visual Studio, and Eclipse. |
Contributor
Greptile SummaryThis PR adds granular audit log visibility for AWS secret sync operations by tracking which specific secret keys were created, updated, or deleted during each sync cycle. A new
Confidence Score: 4/5
Important Files Changed
Last reviewed commit: ed11a8b |
backend/src/services/secret-sync/aws-parameter-store/aws-parameter-store-sync-fns.ts
Show resolved
Hide resolved
…in AWS PS sync Moves deletedSecretKeys population to after deleteParametersBatch returns, ensuring consistency with the AWS SM path and preventing inaccurate key tracking if the batch call fails mid-execution. Made-with: Cursor
varonix0
requested changes
Mar 17, 2026
backend/src/services/secret-sync/aws-parameter-store/aws-parameter-store-sync-fns.ts
Outdated
Show resolved
Hide resolved
backend/src/services/secret-sync/aws-parameter-store/aws-parameter-store-sync-fns.ts
Outdated
Show resolved
Hide resolved
backend/src/services/secret-sync/aws-secrets-manager/aws-secrets-manager-sync-fns.ts
Outdated
Show resolved
Hide resolved
…tion in AWS SM sync
…yncSecretsResult annotation in AWS PS sync
varonix0
approved these changes
Mar 18, 2026
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Context
Resolves SECRETS-151
When secrets are synced to AWS (Secrets Manager or Parameter Store), the audit log previously only recorded that a sync happened with a success/failure status. There was no visibility into which specific secrets were created, updated, or deleted at the destination.
This PR modifies the AWS sync functions to track and return the secret keys affected during each sync, then surfaces them in the existing
SECRET_SYNC_SYNC_SECRETSaudit log event metadata.Example flow: Secret is deleted from Infisical → secret sync runs → secret is deleted from AWS SM/PS → audit log now includes the deleted secret key for visibility.
Changes
TSyncSecretsResulttype withcreatedSecretKeys,updatedSecretKeys, anddeletedSecretKeysarrayssyncSecretsnow returns which keys were created, updated, or deleted (both OneToOne and ManyToOne mapping behaviors)syncSecretsnow returns which keys were created, updated, or deletedSecretSyncFns.syncSecretsdispatcher return type updated toPromise<TSyncSecretsResult | void>(non-breaking for other 28+ destinations)SecretSyncSyncSecretsEventtype extended with three optional fieldsNo frontend changes needed — the existing audit log JSON renderer automatically surfaces the new fields.
Steps to verify the change
createdSecretKeysupdatedSecretKeysdeletedSecretKeysdisableSecretDeletionenabled —deletedSecretKeysshould be[]Type
Checklist
type(scope): short description(scope is optional, e.g.,fix: prevent crash on syncorfix(api): handle null response).