DevOps Engineer living in Perth, Western Austalia

Automatic rotation of CloudSQL passwords with Secret Manager

Posted on April 27, 2021
4 minute read

A pile of gold and silver keys.
Photo by Samantha Lam on Unsplash

I came across a problem over the past few weeks regarding password rotation for Cloud SQL. Whilst automated provisions exist for SSL/TLS certificates as well as being able to connect with the Cloud SQL proxy the ability to rotate passwords is not a feature that’s offered by GCP, and probably for good reason. Passwords as a means of authentications is out and certificates are in, but that’s a discussion for another time.

After some thought, I came up with a hacky(?) solution to automate the current manual task of rotating the db password.

Currently, compute workloads - be they functions, containers or whatever - would request the database credential when they start by reaching out to Secret Manager. They then connect to the database, with the credentials returned. When a rotation needs to occur, currently a human (gasp!) needs to go into Secret Manager and update the password and then ensures the database has that new password. Here be dragons. A person shouldn’t have that kind of access to a running database. We need to automate this situation to ensure we don’t have to have someone with access to production database passwords.

Even better, a serverless solution!

Architecture diagram depicting the flow of data through the automated system

To describe what’s going on above, there’s a Cloud Scheduler event which is triggered based on a Unix cron format of your choosing so that you can decide when the password needs rotating. Cloud scheduler notifies Cloud Pub/Sub which will be our message broker to notify downstream subscribers who are interested in the event. At this time, there’s just the one subscriber which is our Cloud Function. The function has three tasks.

  1. The first is to generate a “random” password, or sufficiently lengthy set of characters to make the secret long enough that it constitutes a complex enough password suitable for your database.
  2. The second task is to update the database password which is stored in secrets manager.
  3. Finally, it’s last task is to store the updated password in the running database as the new password to use.

Here’s some code I hacked together from the various documentation for our purposes, in Go.

package pwrotator

import (
  secretmanager ""
  secretmanagerpb ""

// PubSubMessage is the payload of a Pub/Sub event.
// See the documentation for more details:
type PubSubMessage struct {
  Data []byte `json:"data"`

// SecretsUpdater consumes a Pub/Sub message and updates a secret.
func SecretsUpdater(ctx context.Context, m PubSubMessage) error {
  parent := "projects/<PROJECT_NUMBER>/secrets/my-test-secret-1"
  password := []byte("insert your generated password here")
  addSecretVersion(parent, password)
  return nil

// addSecretVersion adds a new secret version to the given secret with the
// provided payload.
func addSecretVersion(parent string, payload []byte) error {
  // Create the client.
  ctx := context.Background()
  client, err := secretmanager.NewClient(ctx)
  if err != nil {
    return fmt.Errorf("failed to create secretmanager client: %v", err)

  // Build the request.
  req := &secretmanagerpb.AddSecretVersionRequest{
    Parent: parent,
    Payload: &secretmanagerpb.SecretPayload{
      Data: payload,

  // Call the API.
  result, err := client.AddSecretVersion(ctx, req)
  if err != nil {
    return fmt.Errorf("failed to add secret version: %v", err)
  log.Println("Updated the secret version")
  return nil

func updateCloudSQL(password []byte) {
  ctx := context.Background()
  c, err := google.DefaultClient(ctx, sqladmin.CloudPlatformScope)
  if err != nil {

  sqladminService, err := sqladmin.New(c)
  if err != nil {

  // Project ID of the project that contains the instance.
  project := "<PROJECT_NUMBER>"
  // Database instance ID. This does not include the project ID.
  instance := "my-db-instance"
  rb := &sqladmin.User{
    Host:     "%",
    Name:     "root",
    Password: string(password[:]),

  resp, err := sqladminService.Users.Update(project, instance, rb).Context(ctx).Do()
  if err != nil {

  fmt.Printf("%#v\n", resp)

Hopefully the comments in the functions are helpful point out what the various pieces are doing.

I want to make clear as I mentioned at the start of the post, that using SSL certificates with TLS for connections is the “modern” way you should be connecting to a SQL database. Additionally rotation is built in as a feature of Cloud SQL instances. Finally DB engines that are worth using, support using two certificates at once, so you don’t need to worry about downtime. Since password authentication generally validates the credentials before every SQL command, it will mean downtime before the application can be rebooted or the pods bounced as they’ll need to re-fetch the secret.

If your application is very smart, then you could build in a failsafe here. For example

if (passwordIsNotValid) {
  newPassword = fetchPasswordFromSecretsManager;

… but that would probably add unacceptable latency to your application whilst it’s refetching the password, then doing the database query before responding to your user.

I hope you got something out of this. As many organisations are moving to the cloud, legacy applications which need solutions and security without immediate rework sometimes need solutions which are a bit left field. Or as the meme says:

Man in suit and tie pointing at camera with mouth open mid-sentence