From 7fd1c2a0e39afbae9ea0966f3fff98bdd2a6a143 Mon Sep 17 00:00:00 2001 From: James Munnelly Date: Tue, 15 Jan 2019 14:44:11 +0000 Subject: [PATCH] Fix issuing a certificate into a pre-existing secret Signed-off-by: James Munnelly --- pkg/util/kube/pki.go | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/pkg/util/kube/pki.go b/pkg/util/kube/pki.go index 97f897a05..4b64c3fdf 100644 --- a/pkg/util/kube/pki.go +++ b/pkg/util/kube/pki.go @@ -19,7 +19,6 @@ package kube import ( "crypto" "crypto/x509" - "fmt" api "k8s.io/api/core/v1" corelisters "k8s.io/client-go/listers/core/v1" @@ -39,7 +38,7 @@ func SecretTLSKeyRef(secretLister corelisters.SecretLister, namespace, name, key keyBytes, ok := secret.Data[keyName] if !ok { - return nil, fmt.Errorf("no data for %q in secret '%s/%s'", keyName, namespace, name) + return nil, errors.NewInvalidData("no data for %q in secret '%s/%s'", keyName, namespace, name) } key, err := pki.DecodePrivateKeyBytes(keyBytes) if err != nil {