@@ -11,15 +11,15 @@ import (
1111)
1212
1313// Provide fetches GCP secrets and adds them to the envVars map.
14- func (p * GCPProvider ) Provide (cfg * config.RootConfig , envVars map [string ]string ) {
14+ func (p * GCPProvider ) Provide (cfg * config.RootConfig , envVars map [string ]string ) error {
1515 if ! hasGCPSecrets (cfg ) {
16- return
16+ return nil
1717 }
1818
1919 ctx := context .Background ()
2020 client , err := secretmanager .NewClient (ctx )
2121 if err != nil {
22- log . Fatalf ( "Failed to create Secret Manager client: %v " , err )
22+ return fmt . Errorf ( "failed to create Secret Manager client: %w " , err )
2323 }
2424 defer client .Close ()
2525
@@ -34,7 +34,7 @@ func (p *GCPProvider) Provide(cfg *config.RootConfig, envVars map[string]string)
3434 }
3535
3636 if project == "" && cfg .Defaults .GCP .Project == "" {
37- log .Printf ("Error : No GCP project found for secret '%s'" , env .Name )
37+ log .Printf ("Warning : No GCP project found for secret '%s', skipping " , env .Name )
3838 continue
3939 } else if project == "" {
4040 project = cfg .Defaults .GCP .Project
@@ -46,13 +46,14 @@ func (p *GCPProvider) Provide(cfg *config.RootConfig, envVars map[string]string)
4646 Name : reqName ,
4747 })
4848 if err != nil {
49- log .Printf ("Error accessing GCP secret '%s' version '%s': %v" , name , version , err )
49+ log .Printf ("Warning: Failed to access GCP secret '%s' version '%s': %v" , name , version , err )
5050 continue
5151 }
5252
5353 envVars [env .Name ] = string (resp .Payload .Data )
5454 }
5555 }
56+ return nil
5657}
5758
5859func hasGCPSecrets (cfg * config.RootConfig ) bool {
0 commit comments