cleanup: client cert decoding is not required

Signed-off-by: Praveen M <m.praveen@ibm.com>
This commit is contained in:
Praveen M 2024-04-15 12:54:48 +05:30 committed by mergify[bot]
parent c1dd15ae59
commit 29f1fbeb84

View File

@ -18,7 +18,6 @@ package kms
import ( import (
"context" "context"
"encoding/base64"
"errors" "errors"
"fmt" "fmt"
@ -106,19 +105,11 @@ func initAzureKeyVaultKMS(args ProviderInitArgs) (EncryptionKMS, error) {
return nil, fmt.Errorf("failed to get secrets for %T, %w", kms, err) return nil, fmt.Errorf("failed to get secrets for %T, %w", kms, err)
} }
var encodedClientCertificate string err = setConfigString(&kms.clientCertificate, secrets, azureClientCertificate)
err = setConfigString(&encodedClientCertificate, secrets, azureClientCertificate)
if err != nil { if err != nil {
return nil, err return nil, err
} }
clientCertificate, err := base64.StdEncoding.DecodeString(encodedClientCertificate)
if err != nil {
return nil, fmt.Errorf("failed to decode client certificate: %w", err)
}
kms.clientCertificate = string(clientCertificate)
return kms, nil return kms, nil
} }