mirror of
				https://github.com/minio/minio.git
				synced 2025-11-04 02:01:05 +01:00 
			
		
		
		
	Currently when connections to vault fail, client perpetually retries this leads to assumptions that the server has issues and masks the problem. Re-purpose *crypto.Error* type to send appropriate errors back to the client.
		
			
				
	
	
		
			93 lines
		
	
	
		
			3.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			93 lines
		
	
	
		
			3.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// MinIO Cloud Storage, (C) 2015, 2016, 2017, 2018 MinIO, Inc.
 | 
						|
//
 | 
						|
// Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
// you may not use this file except in compliance with the License.
 | 
						|
// You may obtain a copy of the License at
 | 
						|
//
 | 
						|
//    http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
//
 | 
						|
// Unless required by applicable law or agreed to in writing, software
 | 
						|
// distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
// See the License for the specific language governing permissions and
 | 
						|
// limitations under the License.
 | 
						|
 | 
						|
package crypto
 | 
						|
 | 
						|
import (
 | 
						|
	"fmt"
 | 
						|
)
 | 
						|
 | 
						|
// Error is the generic type for any error happening during decrypting
 | 
						|
// an object. It indicates that the object itself or its metadata was
 | 
						|
// modified accidentally or maliciously.
 | 
						|
type Error struct {
 | 
						|
	err error
 | 
						|
}
 | 
						|
 | 
						|
// Errorf - formats according to a format specifier and returns
 | 
						|
// the string as a value that satisfies error of type crypto.Error
 | 
						|
func Errorf(format string, a ...interface{}) error {
 | 
						|
	return Error{err: fmt.Errorf(format, a...)}
 | 
						|
}
 | 
						|
 | 
						|
// Unwrap the internal error.
 | 
						|
func (e Error) Unwrap() error { return e.err }
 | 
						|
 | 
						|
// Error 'error' compatible method.
 | 
						|
func (e Error) Error() string {
 | 
						|
	if e.err == nil {
 | 
						|
		return "crypto: cause <nil>"
 | 
						|
	}
 | 
						|
	return e.err.Error()
 | 
						|
}
 | 
						|
 | 
						|
var (
 | 
						|
	// ErrInvalidEncryptionMethod indicates that the specified SSE encryption method
 | 
						|
	// is not supported.
 | 
						|
	ErrInvalidEncryptionMethod = Errorf("The encryption method is not supported")
 | 
						|
 | 
						|
	// ErrInvalidCustomerAlgorithm indicates that the specified SSE-C algorithm
 | 
						|
	// is not supported.
 | 
						|
	ErrInvalidCustomerAlgorithm = Errorf("The SSE-C algorithm is not supported")
 | 
						|
 | 
						|
	// ErrMissingCustomerKey indicates that the HTTP headers contains no SSE-C client key.
 | 
						|
	ErrMissingCustomerKey = Errorf("The SSE-C request is missing the customer key")
 | 
						|
 | 
						|
	// ErrMissingCustomerKeyMD5 indicates that the HTTP headers contains no SSE-C client key
 | 
						|
	// MD5 checksum.
 | 
						|
	ErrMissingCustomerKeyMD5 = Errorf("The SSE-C request is missing the customer key MD5")
 | 
						|
 | 
						|
	// ErrInvalidCustomerKey indicates that the SSE-C client key is not valid - e.g. not a
 | 
						|
	// base64-encoded string or not 256 bits long.
 | 
						|
	ErrInvalidCustomerKey = Errorf("The SSE-C client key is invalid")
 | 
						|
 | 
						|
	// ErrSecretKeyMismatch indicates that the provided secret key (SSE-C client key / SSE-S3 KMS key)
 | 
						|
	// does not match the secret key used during encrypting the object.
 | 
						|
	ErrSecretKeyMismatch = Errorf("The secret key does not match the secret key used during upload")
 | 
						|
 | 
						|
	// ErrCustomerKeyMD5Mismatch indicates that the SSE-C key MD5 does not match the
 | 
						|
	// computed MD5 sum. This means that the client provided either the wrong key for
 | 
						|
	// a certain MD5 checksum or the wrong MD5 for a certain key.
 | 
						|
	ErrCustomerKeyMD5Mismatch = Errorf("The provided SSE-C key MD5 does not match the computed MD5 of the SSE-C key")
 | 
						|
	// ErrIncompatibleEncryptionMethod indicates that both SSE-C headers and SSE-S3 headers were specified, and are incompatible
 | 
						|
	// The client needs to remove the SSE-S3 header or the SSE-C headers
 | 
						|
	ErrIncompatibleEncryptionMethod = Errorf("Server side encryption specified with both SSE-C and SSE-S3 headers")
 | 
						|
)
 | 
						|
 | 
						|
var (
 | 
						|
	errMissingInternalIV            = Errorf("The object metadata is missing the internal encryption IV")
 | 
						|
	errMissingInternalSealAlgorithm = Errorf("The object metadata is missing the internal seal algorithm")
 | 
						|
 | 
						|
	errInvalidInternalIV            = Errorf("The internal encryption IV is malformed")
 | 
						|
	errInvalidInternalSealAlgorithm = Errorf("The internal seal algorithm is invalid and not supported")
 | 
						|
 | 
						|
	errMissingUpdatedKey = Errorf("The key update returned no error but also no sealed key")
 | 
						|
)
 | 
						|
 | 
						|
var (
 | 
						|
	// errOutOfEntropy indicates that the a source of randomness (PRNG) wasn't able
 | 
						|
	// to produce enough random data. This is fatal error and should cause a panic.
 | 
						|
	errOutOfEntropy = Errorf("Unable to read enough randomness from the system")
 | 
						|
)
 |