-
Notifications
You must be signed in to change notification settings - Fork 32
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
safe fails to set/get secrets when used against a Vault v0.10.0 dev server #138
Comments
Yeah, it definitely looks like 0.10.0 is a breaking change, at least if you didn't run Might I recommend 0.9.x, or running On a deeper level, this is more troubling for our future with Vault, since they seem to be advocating for versioned secrets. 0.10.x looks (on the surface) like a marked departure from previous behavior, and a dismissal of our "dumb key-value storage" model of interacting with Vault everywhere. It might be time to start looking at alternate backends for credentials storage. |
Strange question, and maybe not the correct medium to ask this, but what's so wrong about versioned secrets? I agree that not all of their reasons are sound ("This made it difficult to recover from unintentional data loss", backups anyone?), but password rotation would benefit a lot from this... |
Versioned secrets are great, until you aren't sure which ones are in use. |
To clarify my somewhat terse response: credentials rotation is a definite boon, but you don't need versioned secrets for that. I haven't read a ton into their implementation to know if its indefinite history or configurable, but either way, keeping your passwords around indefinitely can lead to confusion as to which credential is in force. As you rightly point out, backups are a better way of doing this, and we have a ticket (#133) to work on a safe-native way of doing backups that doesn't leave the backed-up credentials easily accessible without restoring the backup. I think that's the best solution because you still have your old secrets, but you can't use them easily, which prevents people form just referencing the specific version of a password and actively working against the rotation scheme. |
0.10.0 works on v1.0.0. kv v2 is supported in v1.0.0 |
safe
fails to set/get secrets when used against a Vault v0.10.0 dev server. The version is just 12 days old so it might not be impacting users with already running vault instances. I can confirm it works against Vault v0.9.6Steps to reproduce
Failing scenario
Versions
Running the cmd
DEBUG=on safe set secret/ssh username=system
exits
1
with the following trace:Working scenario
Versions
Running the same cmd
DEBUG=on safe set secret/ssh username=system
exits
0
with the following trace:Hopefully I'm not exposing any secrets in those traces 😅as the dev server is already dead 😜
Looks like Vault's UI have a similar issue (hashicorp/vault#4348) and it might be due to a misalignment with any new possible API changes, it also looks like Vault may not be following semver and they might had introduced a breaking change in v0.10.0. Here the CHANGELOG in case it helps 👉https://github.com/hashicorp/vault/blob/v0.10.0/CHANGELOG.md
Please let me know if I can help any further 😄
The text was updated successfully, but these errors were encountered: