-
Notifications
You must be signed in to change notification settings - Fork 298
dm(encrypt): refine error message for secret key not initialized #12476
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
dm(encrypt): refine error message for secret key not initialized #12476
Conversation
Improve the error message when dmctl encrypt/decrypt is called without initializing the secret key. The new message provides actionable steps to resolve the issue: 1. Create a 32-byte hexadecimal AES-256 secret key file 2. Set 'secret-key-path' in DM-master configuration 3. Restart DM-master to apply the configuration 4. Link to documentation for details This helps users quickly understand how to fix the issue instead of just seeing "secret key is not initialized". Fixes pingcap#12046 Signed-off-by: Gregorius Bima Kharisma Wicaksana <[email protected]>
|
Hi @bimakw. Thanks for your PR. I'm waiting for a pingcap member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
|
Welcome @bimakw! |
Summary of ChangesHello @bimakw, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed! This pull request focuses on improving the user experience by refining an unhelpful error message related to uninitialized secret keys for encryption. The change provides clear, actionable guidance directly within the error output, helping users quickly resolve configuration issues and align with best practices for command-line interface feedback. This enhancement ensures that users are not left guessing when encountering encryption-related setup problems. Highlights
🧠 New Feature in Public Preview: You can now enable Memory to help Gemini Code Assist learn from your team's feedback. This makes future code reviews more consistent and personalized to your project's style. Click here to enable Memory in your admin console. Using Gemini Code AssistThe full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips. Invoking Gemini You can request assistance from Gemini at any point by creating a comment using either
Customization To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a Limitations & Feedback Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for Github and other Google products, sign up here. You can also get AI-powered code generation, chat, as well as code reviews directly in the IDE at no cost with the Gemini Code Assist IDE Extension. Footnotes
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Code Review
This pull request significantly improves the user experience by providing a much more helpful and actionable error message when the secret key for encryption is not initialized. The change is clear, and the corresponding test update is correct. I have one suggestion to make the Go code more idiomatic and slightly more performant.
| const secretKeyNotInitializedError = `secret key not initialized. To enable encryption: | ||
| 1. Create a file containing a 32-byte (64-character) hexadecimal AES-256 secret key. | ||
| 2. Set 'secret-key-path' in DM-master's configuration file to point to this key file. | ||
| 3. Restart DM-master to apply the configuration. | ||
| For details, see: https://docs.pingcap.com/tidb/stable/dm-customized-secret-key` | ||
|
|
||
| func (n *notInitializedCipher) Encrypt([]byte) ([]byte, error) { | ||
| return nil, errors.New("secret key is not initialized") | ||
| return nil, errors.New(secretKeyNotInitializedError) | ||
| } | ||
|
|
||
| func (n *notInitializedCipher) Decrypt([]byte) ([]byte, error) { | ||
| return nil, errors.New("secret key is not initialized") | ||
| return nil, errors.New(secretKeyNotInitializedError) | ||
| } |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
While the new error message is a great improvement, the implementation can be made more idiomatic and performant. Instead of defining a const string and creating a new error with errors.New() on each call, it's better to define a package-level error variable. This avoids repeated memory allocations and allows for error identity checking with errors.Is, which is a common Go practice.
| const secretKeyNotInitializedError = `secret key not initialized. To enable encryption: | |
| 1. Create a file containing a 32-byte (64-character) hexadecimal AES-256 secret key. | |
| 2. Set 'secret-key-path' in DM-master's configuration file to point to this key file. | |
| 3. Restart DM-master to apply the configuration. | |
| For details, see: https://docs.pingcap.com/tidb/stable/dm-customized-secret-key` | |
| func (n *notInitializedCipher) Encrypt([]byte) ([]byte, error) { | |
| return nil, errors.New("secret key is not initialized") | |
| return nil, errors.New(secretKeyNotInitializedError) | |
| } | |
| func (n *notInitializedCipher) Decrypt([]byte) ([]byte, error) { | |
| return nil, errors.New("secret key is not initialized") | |
| return nil, errors.New(secretKeyNotInitializedError) | |
| } | |
| var errSecretKeyNotInitialized = errors.New(`secret key not initialized. To enable encryption: | |
| 1. Create a file containing a 32-byte (64-character) hexadecimal AES-256 secret key. | |
| 2. Set 'secret-key-path' in DM-master's configuration file to point to this key file. | |
| 3. Restart DM-master to apply the configuration. | |
| For details, see: https://docs.pingcap.com/tidb/stable/dm-customized-secret-key`) | |
| func (n *notInitializedCipher) Encrypt([]byte) ([]byte, error) { | |
| return nil, errSecretKeyNotInitialized | |
| } | |
| func (n *notInitializedCipher) Decrypt([]byte) ([]byte, error) { | |
| return nil, errSecretKeyNotInitialized | |
| } |
|
/ok-to-test |
|
tbh this error just gets converted to string via |
|
/retest |
|
/retest pull-dm-integration-test |
|
@bimakw: The Use DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
|
/lgtm |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: D3Hunter, lance6716 The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Summary
Improve the error message when
dmctl encrypt/decryptis called without initializing the secret key.Before:
After:
Changes
dm/pkg/encrypt/encrypt.go: Updated error message with actionable stepsdm/tests/dmctl_basic/run.sh: Updated test to match new error messageIssue Number: close #12046
Release Note