@@ -73,7 +73,7 @@ func createAzureCredential(cfg Config) (azcore.TokenCredential, error) {
7373
7474// GetSecret retrieves a secret from Azure Key Vault
7575func (m * AzureManager ) GetSecret (ctx context.Context , key string ) (string , error ) {
76- secretName := m . normalizeSecretName (key )
76+ secretName := normalizeSecretName (key )
7777
7878 // Get the latest version of the secret
7979 resp , err := m .client .GetSecret (ctx , secretName , emptyString , nil )
@@ -105,7 +105,7 @@ func (m *AzureManager) GetSecrets(ctx context.Context, keys []string) (map[strin
105105
106106// SetSecret stores a secret in Azure Key Vault
107107func (m * AzureManager ) SetSecret (ctx context.Context , key , value string ) error {
108- secretName := m . normalizeSecretName (key )
108+ secretName := normalizeSecretName (key )
109109
110110 parameters := azsecrets.SetSecretParameters {
111111 Value : & value ,
@@ -121,7 +121,7 @@ func (m *AzureManager) SetSecret(ctx context.Context, key, value string) error {
121121
122122// normalizeSecretName ensures the secret name follows Azure Key Vault naming rules
123123// Secret names can only contain alphanumeric characters and dashes
124- func ( m * AzureManager ) normalizeSecretName (name string ) string {
124+ func normalizeSecretName (name string ) string {
125125 // Replace invalid characters with dashes
126126 normalized := strings .Map (func (r rune ) rune {
127127 if (r >= 'a' && r <= 'z' ) || (r >= 'A' && r <= 'Z' ) || (r >= '0' && r <= '9' ) || r == dashRune {
0 commit comments