You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
tokens generated in that namespace will be unable to use the UI due to permisisons errors.
assuming the chroot namespace is prod, the UI thinks the token belongs to prod/prod instead of prod (which the UI should see as root ns)
This issue is present for OIDC tokens,
but it's also present for userpass tokens, but only if you log in, copy the token, and then use the token to log in
I havent tried other types of tokens.
log in
UI makes get request to auth/token/lookup-self, with no namespace header. the response contains field data.namespace_path = prod
localstorage->vault-token☃1 has field userRootNamespace = prod
all future requests use localstorage->vault-token☃1.userRootNamespace to add header X-Vault-Namespace: prod to all requests
because of the chroot namespace, vault server treats the requests as asking for namespace prod/prod, which fails
manually setting localstorage->vault-token☃1.userRootNamespace to empty makes vault behave correctly, requests are successful (because UI now tries to access root namespace, which vault transforms into prod)
Expected behavior
A clear and concise description of what you expected to happen.
Environment:
Vault Server Version: 1.19.3+ent
Server Operating System/Architecture: docker on ARM, kernel 6.13.6-200.fc41.aarch64
Hello! Since you're an Enterprise customer, I recommend opening a ticket with support to get the fastest response time. Please feel free to share this issue ID with them as well. Thanks! :)
Describe the bug
if you have a chroot namespace set up like this:
tokens generated in that namespace will be unable to use the UI due to permisisons errors.
assuming the chroot namespace is
prod
, the UI thinks the token belongs toprod/prod
instead ofprod
(which the UI should see as root ns)This issue is present for OIDC tokens,
but it's also present for userpass tokens, but only if you log in, copy the token, and then use the token to log in
I havent tried other types of tokens.
auth/token/lookup-self
, with no namespace header. the response contains fielddata.namespace_path
=prod
localstorage->vault-token☃1
has fielduserRootNamespace
=prod
localstorage->vault-token☃1.userRootNamespace
to add headerX-Vault-Namespace: prod
to all requestsprod/prod
, which failslocalstorage->vault-token☃1.userRootNamespace
to empty makes vault behave correctly, requests are successful (because UI now tries to access root namespace, which vault transforms intoprod
)Expected behavior
A clear and concise description of what you expected to happen.
Environment:
1.19.3+ent
Vault server configuration file(s):
docker-compose.yml
The text was updated successfully, but these errors were encountered: