From 0b642fad5300c2c7f839e40f9e5337797296f2b7 Mon Sep 17 00:00:00 2001 From: Pablo Deymonnaz Date: Wed, 2 Oct 2024 18:42:30 -0300 Subject: [PATCH] Avoid panic in ReadStringFromSecretManager in secretmanager.go (#344) --- aws/secretmanager/secretmanager.go | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/aws/secretmanager/secretmanager.go b/aws/secretmanager/secretmanager.go index 593abdad..3710bd0a 100644 --- a/aws/secretmanager/secretmanager.go +++ b/aws/secretmanager/secretmanager.go @@ -2,8 +2,8 @@ package secretmanager import ( "context" - "log" + "github.com/Layr-Labs/eigensdk-go/utils" "github.com/aws/aws-sdk-go-v2/aws" "github.com/aws/aws-sdk-go-v2/config" "github.com/aws/aws-sdk-go-v2/service/secretsmanager" @@ -12,7 +12,7 @@ import ( func ReadStringFromSecretManager(ctx context.Context, secretName, region string) (string, error) { config, err := config.LoadDefaultConfig(ctx, config.WithRegion(region)) if err != nil { - log.Fatal(err) + return "", utils.WrapError("error while loading default config", err) } // Create Secrets Manager client @@ -27,7 +27,7 @@ func ReadStringFromSecretManager(ctx context.Context, secretName, region string) if err != nil { // For a list of exceptions thrown, see // https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_GetSecretValue.html - return "", err + return "", utils.WrapError("error while loading default config", err) } // Decrypts secret using the associated KMS key.