verror: addressing https://github.com/veyron/release-issues/issues/1080

MultiPart: 1/3
Change-Id: I190b1dd5004025dac6acfd58f59483588bf70d9d
diff --git a/runtimes/google/ipc/server.go b/runtimes/google/ipc/server.go
index fc974f8..6e3e628 100644
--- a/runtimes/google/ipc/server.go
+++ b/runtimes/google/ipc/server.go
@@ -140,7 +140,7 @@
 		s.state = next
 		return nil
 	}
-	return verror.New(verror.BadState, s.ctx, fmt.Sprintf("%s called out of order or more than once", method))
+	return verror.New(verror.ErrBadState, s.ctx, fmt.Sprintf("%s called out of order or more than once", method))
 }
 
 func (s *server) isStopState() bool {
@@ -369,7 +369,7 @@
 	defer vlog.LogCall()()
 	useProxy := len(listenSpec.Proxy) > 0
 	if !useProxy && len(listenSpec.Addrs) == 0 {
-		return nil, verror.New(verror.BadArg, s.ctx, "ListenSpec contains no proxy or addresses to listen on")
+		return nil, verror.New(verror.ErrBadArg, s.ctx, "ListenSpec contains no proxy or addresses to listen on")
 	}
 
 	s.Lock()
@@ -420,7 +420,7 @@
 		}
 	}
 	if !found && !useProxy {
-		return nil, verror.New(verror.BadArg, s.ctx, "failed to create any listeners")
+		return nil, verror.New(verror.ErrBadArg, s.ctx, "failed to create any listeners")
 	}
 
 	if roaming && s.dhcpState == nil && listenSpec.StreamPublisher != nil {
@@ -515,7 +515,7 @@
 			s.publisher.RemoveServer(iep.String())
 			s.Lock()
 			if err != nil {
-				s.proxies[proxy] = proxyState{iep, verror.New(verror.NoServers, s.ctx, err)}
+				s.proxies[proxy] = proxyState{iep, verror.New(verror.ErrNoServers, s.ctx, err)}
 			} else {
 				// err will be nill if we're stopping.
 				s.proxies[proxy] = proxyState{iep, nil}
@@ -746,11 +746,11 @@
 func (s *server) Serve(name string, obj interface{}, authorizer security.Authorizer) error {
 	defer vlog.LogCall()()
 	if obj == nil {
-		return verror.New(verror.BadArg, s.ctx, "nil object")
+		return verror.New(verror.ErrBadArg, s.ctx, "nil object")
 	}
 	invoker, err := objectToInvoker(obj)
 	if err != nil {
-		return verror.New(verror.BadArg, s.ctx, fmt.Sprintf("bad object: %v", err))
+		return verror.New(verror.ErrBadArg, s.ctx, fmt.Sprintf("bad object: %v", err))
 	}
 	return s.ServeDispatcher(name, &leafDispatcher{invoker, authorizer})
 }
@@ -758,7 +758,7 @@
 func (s *server) ServeDispatcher(name string, disp ipc.Dispatcher) error {
 	defer vlog.LogCall()()
 	if disp == nil {
-		return verror.New(verror.BadArg, s.ctx, "nil dispatcher")
+		return verror.New(verror.ErrBadArg, s.ctx, "nil dispatcher")
 	}
 	s.Lock()
 	defer s.Unlock()
@@ -776,7 +776,7 @@
 func (s *server) AddName(name string) error {
 	defer vlog.LogCall()()
 	if len(name) == 0 {
-		return verror.New(verror.BadArg, s.ctx, "name is empty")
+		return verror.New(verror.ErrBadArg, s.ctx, "name is empty")
 	}
 	s.Lock()
 	defer s.Unlock()
@@ -897,7 +897,7 @@
 	defer s.Unlock()
 	s.disp = nil
 	if firstErr != nil {
-		return verror.New(verror.Internal, s.ctx, firstErr)
+		return verror.New(verror.ErrInternal, s.ctx, firstErr)
 	}
 	s.state = stopped
 	s.cancel()
@@ -1016,7 +1016,7 @@
 	// Decode the initial request.
 	var req ipc.Request
 	if err := fs.dec.Decode(&req); err != nil {
-		return nil, verror.New(verror.BadProtocol, fs.T, newErrBadRequest(fs.T, err))
+		return nil, verror.New(verror.ErrBadProtocol, fs.T, newErrBadRequest(fs.T, err))
 	}
 	return &req, nil
 }
@@ -1065,11 +1065,11 @@
 		return nil, err
 	}
 	if called, want := req.NumPosArgs, uint64(len(argptrs)); called != want {
-		return nil, verror.New(verror.BadProtocol, fs.T, newErrBadNumInputArgs(fs.T, fs.suffix, fs.method, called, want))
+		return nil, verror.New(verror.ErrBadProtocol, fs.T, newErrBadNumInputArgs(fs.T, fs.suffix, fs.method, called, want))
 	}
 	for ix, argptr := range argptrs {
 		if err := fs.dec.Decode(argptr); err != nil {
-			return nil, verror.New(verror.BadProtocol, fs.T, newErrBadInputArg(fs.T, fs.suffix, fs.method, uint64(ix), err))
+			return nil, verror.New(verror.ErrBadProtocol, fs.T, newErrBadInputArg(fs.T, fs.suffix, fs.method, uint64(ix), err))
 		}
 	}
 	// Check application's authorization policy.
@@ -1125,7 +1125,7 @@
 		case obj != nil:
 			invoker, err := objectToInvoker(obj)
 			if err != nil {
-				return nil, nil, verror.New(verror.Internal, fs.T, "invalid received object", err)
+				return nil, nil, verror.New(verror.ErrInternal, fs.T, "invalid received object", err)
 			}
 			return invoker, auth, nil
 		}
@@ -1147,7 +1147,7 @@
 	// If additional credentials are provided, make them available in the context
 	blessings, err := security.NewBlessings(req.GrantedBlessings)
 	if err != nil {
-		return verror.New(verror.BadProtocol, fs.T, newErrBadBlessings(fs.T, err))
+		return verror.New(verror.ErrBadProtocol, fs.T, newErrBadBlessings(fs.T, err))
 	}
 	fs.blessings = blessings
 	// Detect unusable blessings now, rather then discovering they are unusable on
@@ -1158,7 +1158,7 @@
 	// this - should servers be able to assume that a blessing is something that
 	// does not have the authorizations that the server's own identity has?
 	if blessings != nil && !reflect.DeepEqual(blessings.PublicKey(), fs.flow.LocalPrincipal().PublicKey()) {
-		return verror.New(verror.NoAccess, fs.T, fmt.Sprintf("blessing granted not bound to this server(%v vs %v)", blessings.PublicKey(), fs.flow.LocalPrincipal().PublicKey()))
+		return verror.New(verror.ErrNoAccess, fs.T, fmt.Sprintf("blessing granted not bound to this server(%v vs %v)", blessings.PublicKey(), fs.flow.LocalPrincipal().PublicKey()))
 	}
 	fs.clientBlessings, err = serverDecodeBlessings(fs.flow.VCDataCache(), req.Blessings, fs.server.stats)
 	if err != nil {
@@ -1167,7 +1167,7 @@
 		// TODO(suharshs,toddw): Figure out a way to only shutdown the current VC, instead
 		// of all VCs connected to the RemoteEndpoint.
 		fs.server.streamMgr.ShutdownEndpoint(fs.RemoteEndpoint())
-		return verror.New(verror.BadProtocol, fs.T, newErrBadBlessingsCache(fs.T, err))
+		return verror.New(verror.ErrBadProtocol, fs.T, newErrBadBlessingsCache(fs.T, err))
 	}
 	if fs.clientBlessings != nil {
 		fs.ackBlessings = true
@@ -1176,7 +1176,7 @@
 	for i, d := range req.Discharges {
 		dis, err := security.NewDischarge(d)
 		if err != nil {
-			return verror.New(verror.BadProtocol, fs.T, newErrBadDischarge(fs.T, uint64(i), err))
+			return verror.New(verror.ErrBadProtocol, fs.T, newErrBadDischarge(fs.T, uint64(i), err))
 		}
 		fs.discharges[dis.ID()] = dis
 	}
@@ -1200,7 +1200,7 @@
 	}
 	if err := auth.Authorize(ctx); err != nil {
 		// TODO(ataly, ashankar): For privacy reasons, should we hide the authorizer error?
-		return verror.New(verror.NoAccess, ctx.Context(), newErrBadAuth(ctx.Context(), ctx.Suffix(), ctx.Method(), err))
+		return verror.New(verror.ErrNoAccess, ctx.Context(), newErrBadAuth(ctx.Context(), ctx.Suffix(), ctx.Method(), err))
 	}
 	return nil
 }