|
@@ -39,6 +39,7 @@ const (
|
|
|
|
|
|
|
|
errGCPSMStore = "received invalid GCPSM SecretStore resource"
|
|
errGCPSMStore = "received invalid GCPSM SecretStore resource"
|
|
|
errGCPSMCredSecretName = "invalid GCPSM SecretStore resource: missing GCP Secret Access Key"
|
|
errGCPSMCredSecretName = "invalid GCPSM SecretStore resource: missing GCP Secret Access Key"
|
|
|
|
|
+ errClientClose = "unable to close SecretManager client: %w"
|
|
|
errInvalidClusterStoreMissingSAKNamespace = "invalid ClusterSecretStore: missing GCP SecretAccessKey Namespace"
|
|
errInvalidClusterStoreMissingSAKNamespace = "invalid ClusterSecretStore: missing GCP SecretAccessKey Namespace"
|
|
|
errFetchSAKSecret = "could not fetch SecretAccessKey secret: %w"
|
|
errFetchSAKSecret = "could not fetch SecretAccessKey secret: %w"
|
|
|
errMissingSAK = "missing SecretAccessKey"
|
|
errMissingSAK = "missing SecretAccessKey"
|
|
@@ -195,6 +196,14 @@ func (sm *ProviderGCP) GetSecretMap(ctx context.Context, ref esv1alpha1.External
|
|
|
return secretData, nil
|
|
return secretData, nil
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
|
|
+func (sm *ProviderGCP) Close() error {
|
|
|
|
|
+ err := sm.SecretManagerClient.Close()
|
|
|
|
|
+ if err != nil {
|
|
|
|
|
+ return fmt.Errorf(errClientClose, err)
|
|
|
|
|
+ }
|
|
|
|
|
+ return nil
|
|
|
|
|
+}
|
|
|
|
|
+
|
|
|
func init() {
|
|
func init() {
|
|
|
schema.Register(&ProviderGCP{}, &esv1alpha1.SecretStoreProvider{
|
|
schema.Register(&ProviderGCP{}, &esv1alpha1.SecretStoreProvider{
|
|
|
GCPSM: &esv1alpha1.GCPSMProvider{},
|
|
GCPSM: &esv1alpha1.GCPSMProvider{},
|