-
Notifications
You must be signed in to change notification settings - Fork 4.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
plugin tls init: error="error during token unwrap request: secret is nil #3483
Comments
Hi @bernielomax Could you also share the vault configuration file you are using? As well as any vault environment variables that may be set? |
Hi @briankassouf , Sorry for the late reply. My config looks like:
Environment variables:
I have |
Could you try setting the redirect_addr setting in the consul stanza? Like so:
|
Hey @briankassouf, Thanks for your last post. I finally got a chance to test it out and seems to have fixed the issue. I now get:
Which should be cool because my plugin doesnt actually do anything yet. Im a little confused about what adding the |
Glad that fixed it! Since plugins use the vault API to unwrap a response wrapping token, they need to know the address of the api. #3499 is filed to make this a little less confusing in the configuration file. |
Closing this since the config now (as of 0.9.0) supports the top-level |
I am experiencing an issue whilst trying to get a custom plugin to work. My plugin so far is just a copy of the mock plugin defined in the source.
I have been able to successfully build and add the plugin to Vault using:
I can also mount the plugin:
vault mount -path=foo -plugin-name=my-plugin plugin
But when I try and read the mount point I get the following:
The log line in Vault shows:
2017/10/23 00:49:45.175905 [ERROR] plugin.my-plugin: plugin tls init: error="error during token unwrap request: secret is nil
I can confirm that my client certificates work when setting them as environment variables and by calling vault API commands via the vault client. I.e. by using:
VAULT_CLIENT_CERT=/certs/client/plugin.crt
VAULT_CLIENT_KEY=/certs/client/plugin.key
VAULT_CACERT=/certs/ca/ca.crt
VAULT_ADDR=https://vault.local:8200
This appears to be similar to hashicorp/vault-plugin-auth-kubernetes#5 but the solution does not appear to have worked in my case.
I can also confirm that using
-tls-skip-verify
makes no difference.I am also using the
apiClientMeta.GetTLSConfig()
The text was updated successfully, but these errors were encountered: