From 08882e5fc2291fad54f2e25aa59b27a447efd1a7 Mon Sep 17 00:00:00 2001 From: James Munnelly Date: Thu, 29 Nov 2018 01:18:43 +0000 Subject: [PATCH] Wrap missing secret data errors with Invalid Signed-off-by: James Munnelly --- pkg/util/kube/pki.go | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkg/util/kube/pki.go b/pkg/util/kube/pki.go index 39ec25633..d8db406d0 100644 --- a/pkg/util/kube/pki.go +++ b/pkg/util/kube/pki.go @@ -82,7 +82,7 @@ func SecretTLSKeyPair(secretLister corelisters.SecretLister, namespace, name str keyBytes, ok := secret.Data[api.TLSPrivateKeyKey] if !ok { - return nil, nil, fmt.Errorf("no private key data for %q in secret '%s/%s'", api.TLSCertKey, namespace, name) + return nil, nil, errors.NewInvalidData("no private key data for %q in secret '%s/%s'", api.TLSCertKey, namespace, name) } key, err := pki.DecodePrivateKeyBytes(keyBytes) if err != nil { @@ -91,7 +91,7 @@ func SecretTLSKeyPair(secretLister corelisters.SecretLister, namespace, name str certBytes, ok := secret.Data[api.TLSCertKey] if !ok { - return nil, key, fmt.Errorf("no certificate data for %q in secret '%s/%s'", api.TLSCertKey, namespace, name) + return nil, key, errors.NewInvalidData("no certificate data for %q in secret '%s/%s'", api.TLSCertKey, namespace, name) } cert, err := pki.DecodeX509CertificateBytes(certBytes) if err != nil {