Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[1.15.0] kv secrets not showing in the UI #23463

Closed
hillen opened this issue Oct 3, 2023 · 4 comments · Fixed by #23585
Closed

[1.15.0] kv secrets not showing in the UI #23463

hillen opened this issue Oct 3, 2023 · 4 comments · Fixed by #23585
Labels

Comments

@hillen
Copy link

hillen commented Oct 3, 2023

Describe the bug
After upgrading to vault version 1.15.0, kv secrets are no longer shown in the UI

To Reproduce
Upgrade to vault 1.15.0. After the upgrade, secrets using a kv engine are no longer shown

I believe that this is related to PR 22559

There are several secrets in the secret mount point and as seen in the screen shot the UI is not showing these secrets. There is a mismatch in the kv version between what the UI is showing and the configuration of the engine. This is a version 1 secret, not version 2.

Screenshot from 2023-10-03 11-44-57

Screenshot from 2023-10-03 11-44-35

Expected behavior
Secrets to continue to be shown in the UI after upgrading to 1.15.0

Environment:

  • Vault Server Version "1.15.0"
  • Vault CLI Version Vault v1.15.0 (b4d0727), built 2023-09-22T16:53:10Z
  • Server Operating System/Architecture: Running the vault container in kubernetes using the vault:1.15.0 tag from the hashicorp/vault docker location

Vault server configuration file(s):

seal "azurekeyvault" {
  tenant_id      = ""
  vault_name     = ""
  key_name       = ""
}
storage "mysql" {
  address                 = ""
  database                = "vault"
  table                   = "vault"
  tls_ca_file             = "/vault/userconfig/mysql-cert/mysql.crt"
  max_parallel            = "128"
  max_idle_connections    = "0"
  max_connection_lifetime = "0"
  username                = ""
  password                = ""
  ha_enabled              = "true"
  lock_table              = "vault_lock"
}
telemetry {
  prometheus_retention_time = "30s"
  disable_hostname = true
}
disable_mlock = true
ui = true
listener "tcp" {
  address = "[::]:8200"
  cluster_address = "[::]:8201"
  telemetry {
    unauthenticated_metrics_access = "true"
  }
  tls_cert_file = "/vault/userconfig/vault-tools-cert/tls.crt"
  tls_key_file  = "/vault/userconfig/vault-tools-cert/tls.key"
}

**Additional context**
None
@divyaac divyaac added the ui label Oct 3, 2023
@ed-ud
Copy link

ed-ud commented Oct 5, 2023

Also seeing this problem - all of our secrets are KV v1 so the UI is now useless for us.

@ed-ud
Copy link

ed-ud commented Oct 5, 2023

I think the problem may stem from the fact that after the 1.15.0 update, all of my KV v1 mounts show as "Version 2" in the UI.

I notice that when you create a KV v2 mount with the 1.15.0 UI, the mount gets an extra internal setting according to:

% vault read sys/mounts/<mount-name>

... which shows up as:

options map[version:2]

When I create a KV v1 mount with the 1.15.0 UI I see:

options map[version:1]

On my existing KV v1 mounts, options was nil.

Potential workaround:

% vault secrets tune -options="version=1" <mount-name>

After adding this setting, the secrets show up in the UI once I reload the "Secrets Engines" page and click into the mount.

@tdviet
Copy link

tdviet commented Oct 8, 2023

Potential workaround:

% vault secrets tune -options="version=1" <mount-name>

Thank you very much for the workaround., it works correctly for me. I had the same issue after upgrading and was going to rollback to the older version, and the workaround saved a lot of times

@jayunit100
Copy link

I also noticed this earlier , thanks for the report

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging a pull request may close this issue.

5 participants