diff --git a/cmd/kubeadm/app/phases/copycerts/copycerts.go b/cmd/kubeadm/app/phases/copycerts/copycerts.go index bd1b119ea83..d15033a48de 100644 --- a/cmd/kubeadm/app/phases/copycerts/copycerts.go +++ b/cmd/kubeadm/app/phases/copycerts/copycerts.go @@ -204,7 +204,7 @@ func getDataFromDisk(cfg *kubeadmapi.InitConfiguration, key []byte) (map[string] secretData := map[string][]byte{} for certName, certPath := range certsToTransfer(cfg) { cert, err := loadAndEncryptCert(certPath, key) - if err == nil || (err != nil && os.IsNotExist(err)) { + if err == nil || os.IsNotExist(err) { secretData[certOrKeyNameToSecretName(certName)] = cert } else { return nil, err diff --git a/cmd/kubeadm/app/util/pkiutil/pki_helpers.go b/cmd/kubeadm/app/util/pkiutil/pki_helpers.go index 6e49a924eb1..170c0fa4583 100644 --- a/cmd/kubeadm/app/util/pkiutil/pki_helpers.go +++ b/cmd/kubeadm/app/util/pkiutil/pki_helpers.go @@ -480,8 +480,7 @@ func parseCSRPEM(pemCSR []byte) (*x509.CertificateRequest, error) { } if block.Type != certutil.CertificateRequestBlockType { - var block *pem.Block - return nil, errors.Errorf("expected block type %q, but PEM had type %v", certutil.CertificateRequestBlockType, block.Type) + return nil, errors.Errorf("expected block type %q, but PEM had type %q", certutil.CertificateRequestBlockType, block.Type) } return x509.ParseCertificateRequest(block.Bytes)