aboutsummaryrefslogtreecommitdiff
path: root/errors.go
blob: 4aadab62b5ae53654bbc6a05c6662b0a4369d49e (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
package acme

import (
	"encoding/json"
	"errors"
	"io"
)

// Problem description
type Problem struct {
	Type     string `json:"type"`
	Detail   string `json:"detail"`
	Instance string `json:"instance"`
	Err      error  `json:"-"`
}

func (p Problem) Error() string {
	return p.Detail
}

var (
	ErrBadCSR         = errors.New("CSR is unacceptable")
	ErrBadNonce       = errors.New("Client sent an unacceptable anti-replay nonce")
	ErrConnection     = errors.New("Server could not connect to the client for DV")
	ErrDNSSEC         = errors.New("Server could not validate a DNSSEC signed domain")
	ErrMalformed      = errors.New("Request message was malformed")
	ErrServerInternal = errors.New("Server experienced an internal error")
	ErrTLS            = errors.New("Server experienced a TLS error during DV")
	ErrUnauthorized   = errors.New("Client lacks sufficient authorization")
	ErrUnknownHost    = errors.New("Server could not resolve a domain name")
)

// Errors
var urnErrors = map[string]error{
	"urn:acme:error:badCSR":         ErrBadCSR,
	"urn:acme:error:badNonce":       ErrBadNonce,
	"urn:acme:error:connection":     ErrConnection,
	"urn:acme:error:dnssec":         ErrDNSSEC,
	"urn:acme:error:malformed":      ErrMalformed,
	"urn:acme:error:serverInternal": ErrServerInternal,
	"urn:acme:error:tls":            ErrTLS,
	"urn:acme:error:unauthorized":   ErrUnauthorized,
	"urn:acme:error:unknownHost":    ErrUnknownHost,
}

func problem(r io.Reader) error {
	var p Problem
	if err := json.NewDecoder(r).Decode(&p); err != nil {
		return err
	}
	p.Err = urnErrors[p.Type]
	return p
}