cleanup: client cert decoding is not required

Signed-off-by: Praveen M <m.praveen@ibm.com>
(cherry picked from commit 29f1fbeb84)
This commit is contained in:
Praveen M 2024-04-15 12:54:48 +05:30 committed by mergify[bot]
parent a3a10855da
commit 2ccb57a1cc

View File

@ -18,7 +18,6 @@ package kms
import ( import (
"context" "context"
"encoding/base64"
"errors" "errors"
"fmt" "fmt"
@ -106,19 +105,11 @@ func initAzureKeyVaultKMS(args ProviderInitArgs) (EncryptionKMS, error) {
return nil, fmt.Errorf("failed to get secrets for %T, %w", kms, err) return nil, fmt.Errorf("failed to get secrets for %T, %w", kms, err)
} }
var encodedClientCertificate string err = setConfigString(&kms.clientCertificate, secrets, azureClientCertificate)
err = setConfigString(&encodedClientCertificate, secrets, azureClientCertificate)
if err != nil { if err != nil {
return nil, err return nil, err
} }
clientCertificate, err := base64.StdEncoding.DecodeString(encodedClientCertificate)
if err != nil {
return nil, fmt.Errorf("failed to decode client certificate: %w", err)
}
kms.clientCertificate = string(clientCertificate)
return kms, nil return kms, nil
} }