You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Vault should have unsealed, successfully reading previous leases
Actual Behavior:
Vault failed to unseal with an error referencing a path to a directory matching a database role with the name "_system"
Steps to Reproduce:
Configure Vault for operation, with a File backend.
Create a role in a database with a name that begins with an underscore.
Request some credentials.
Restart Vault.
Unseal.
Important Factoids:
The database in question uses a custom, in-house plugin to allow user/role management within ArangoDB. _system is a reserved table in ArangoDB, which defines other databases and users.
Please take note of the fact that I haven't tested this with other plugins, but this behaviour appears to be core to Vault (with the plugin having no interaction with the backend)
Contents of the _system directory were as follows:
# ls -lh _system/
total 4
-rw------- 1 root root 891 Oct 19 12:44 _d3916017-658c-29e3-3ee4-4214a765af4d
Removing the _system directory from sys/expire/id/database/creds/ allowed Vault to start cleanly, albeit trashing all previous leases for the _system role/database.
The text was updated successfully, but these errors were encountered:
I don't really have an opinion on what would be the correct fix for this. Perhaps just refusing to create a role with a name that starts with an underscore would be sufficient.
I can work around the issue by special-casing the _system table or modifying the way a role maps to a database within the plugin for now though.
Environment:
Vault v0.8.3 ('6b29fb2b7f70ed538ee2b3c057335d706b6d4e36')
Vault Config File:
Startup Log Output:
Expected Behavior:
Vault should have unsealed, successfully reading previous leases
Actual Behavior:
Vault failed to unseal with an error referencing a path to a directory matching a database role with the name "_system"
Steps to Reproduce:
Important Factoids:
The database in question uses a custom, in-house plugin to allow user/role management within ArangoDB.
_system
is a reserved table in ArangoDB, which defines other databases and users.Please take note of the fact that I haven't tested this with other plugins, but this behaviour appears to be core to Vault (with the plugin having no interaction with the backend)
Contents of the _system directory were as follows:
Removing the
_system
directory fromsys/expire/id/database/creds/
allowed Vault to start cleanly, albeit trashing all previous leases for the_system
role/database.The text was updated successfully, but these errors were encountered: