Refactor extraction of JSON template syntax errors

pull/792/head
Herman Slatman 2 years ago
parent a5455d3572
commit 0475a4d26f
No known key found for this signature in database
GPG Key ID: F4D8A44EA0A75A4F

@ -200,10 +200,9 @@ func (a *Authority) SignSSH(ctx context.Context, key ssh.PublicKey, opts provisi
} }
// explicitly check for unmarshaling errors, which are most probably caused by JSON template syntax errors // explicitly check for unmarshaling errors, which are most probably caused by JSON template syntax errors
if strings.HasPrefix(err.Error(), "error unmarshaling certificate") { if strings.HasPrefix(err.Error(), "error unmarshaling certificate") {
msg := strings.TrimSpace(strings.TrimPrefix(err.Error(), "error unmarshaling certificate:")) return nil, errs.InternalServerErr(templatingError(err),
return nil, errs.ApplyOptions(
errs.InternalServer("authority.Sign: failed to apply certificate template: %s", msg),
errs.WithKeyVal("signOptions", signOpts), errs.WithKeyVal("signOptions", signOpts),
errs.WithMessage("error applying certificate template"),
) )
} }
return nil, errs.Wrap(http.StatusInternalServerError, err, "authority.SignSSH") return nil, errs.Wrap(http.StatusInternalServerError, err, "authority.SignSSH")

@ -7,7 +7,9 @@ import (
"crypto/x509" "crypto/x509"
"encoding/asn1" "encoding/asn1"
"encoding/base64" "encoding/base64"
"encoding/json"
"encoding/pem" "encoding/pem"
"fmt"
"net/http" "net/http"
"strings" "strings"
"time" "time"
@ -127,13 +129,12 @@ func (a *Authority) Sign(csr *x509.CertificateRequest, signOpts provisioner.Sign
errs.WithKeyVal("signOptions", signOpts), errs.WithKeyVal("signOptions", signOpts),
) )
} }
// explicitly check for unmarshaling errors, which are most probably caused by JSON template syntax errors // explicitly check for unmarshaling errors, which are most probably caused by JSON template (syntax) errors
if strings.HasPrefix(err.Error(), "error unmarshaling certificate") { if strings.HasPrefix(err.Error(), "error unmarshaling certificate") {
msg := strings.TrimSpace(strings.TrimPrefix(err.Error(), "error unmarshaling certificate:")) return nil, errs.InternalServerErr(templatingError(err),
return nil, errs.ApplyOptions(
errs.InternalServer("authority.Sign: failed to apply certificate template: %s", msg),
errs.WithKeyVal("csr", csr), errs.WithKeyVal("csr", csr),
errs.WithKeyVal("signOptions", signOpts), errs.WithKeyVal("signOptions", signOpts),
errs.WithMessage("error applying certificate template"),
) )
} }
return nil, errs.Wrap(http.StatusInternalServerError, err, "authority.Sign", opts...) return nil, errs.Wrap(http.StatusInternalServerError, err, "authority.Sign", opts...)
@ -559,3 +560,16 @@ func (a *Authority) GetTLSCertificate() (*tls.Certificate, error) {
tlsCrt.Leaf = resp.Certificate tlsCrt.Leaf = resp.Certificate
return &tlsCrt, nil return &tlsCrt, nil
} }
// templatingError tries to extract more information about the cause of
// an error related to (most probably) malformed template data and adds
// this to the error message.
func templatingError(err error) error {
cause := errors.Cause(err)
var syntaxError *json.SyntaxError
if errors.As(err, &syntaxError) {
// offset is arguably not super clear to the user, but it's the best we can do here
cause = fmt.Errorf("%s at offset %d", cause.Error(), syntaxError.Offset)
}
return errors.Wrap(cause, "error applying certificate template")
}

@ -421,7 +421,7 @@ ZYtQ9Ot36qc=
csr: csr, csr: csr,
extraOpts: testExtraOpts, extraOpts: testExtraOpts,
signOpts: signOpts, signOpts: signOpts,
err: errors.New("authority.Sign: failed to apply certificate template"), err: errors.New("error applying certificate template"),
code: http.StatusInternalServerError, code: http.StatusInternalServerError,
} }
}, },

Loading…
Cancel
Save