From d802001f4508957249cad46d8089da18a7cb6d0a Mon Sep 17 00:00:00 2001 From: miampf Date: Mon, 8 Jan 2024 15:00:09 +0100 Subject: [PATCH] removed forgotten zap references --- joinservice/internal/kms/kms.go | 6 ++---- 1 file changed, 2 insertions(+), 4 deletions(-) diff --git a/joinservice/internal/kms/kms.go b/joinservice/internal/kms/kms.go index 6f79ee65f..a3a28147d 100644 --- a/joinservice/internal/kms/kms.go +++ b/joinservice/internal/kms/kms.go @@ -12,9 +12,7 @@ import ( "fmt" "log/slog" - "github.com/edgelesssys/constellation/v2/internal/logger" "github.com/edgelesssys/constellation/v2/keyservice/keyserviceproto" - "go.uber.org/zap" "google.golang.org/grpc" "google.golang.org/grpc/credentials/insecure" ) @@ -37,10 +35,10 @@ func New(log *slog.Logger, endpoint string) Client { // GetDataKey returns a data encryption key for the given UUID. func (c Client) GetDataKey(ctx context.Context, keyID string, length int) ([]byte, error) { - log := c.log.With(zap.String("keyID", keyID), zap.String("endpoint", c.endpoint)) + log := c.log.With(slog.String("keyID", keyID), slog.String("endpoint", c.endpoint)) // the KMS does not use aTLS since traffic is only routed through the Constellation cluster // cluster internal connections are considered trustworthy - log.Info("Connecting to KMS at %s", c.endpoint) + log.Info(fmt.Sprintf("Connecting to KMS at %s", c.endpoint)) conn, err := grpc.DialContext(ctx, c.endpoint, grpc.WithTransportCredentials(insecure.NewCredentials())) if err != nil { return nil, err