Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Vault UI, kv1 do not show second page #29442

Open
Mmladshev opened this issue Jan 29, 2025 · 0 comments
Open

Vault UI, kv1 do not show second page #29442

Mmladshev opened this issue Jan 29, 2025 · 0 comments

Comments

@Mmladshev
Copy link

Mmladshev commented Jan 29, 2025

Describe the bug
When we use web Ui for some purposes i can not open the second page of kv because it redirects to https://<vault_url>/ui/vault/secrets/secret/list/secret?page=2 instead of full path where i am now.
So if I'm inside secret/responsible_platform_ops/patroni/ that will redirect me to not existing path instead of ...page=N of current "folder"

To Reproduce
Can not reproduce in root folder of kv, dive deeper.
Steps to reproduce the behavior:

  1. Opent the vault UI
  2. Navigate to "folder" where more then 1 page, in my case it is secret/responsible_platform_ops/patroni/
  3. Click to the second page button or > in the bottom
  4. Image
  5. Get error. The url of 2d page button and > button is https://<vault_url>/ui/vault/secrets/secret/list/secret?page=2

Image

Expected behavior
When I face more than one page of secrets in KV "folder" pressing 2,3,4 etc and > will properly open the page

Environment:

  • Vault Server Version (retrieve with vault status): Version 1.18.3
  • Vault CLI Version (retrieve with vault version): Vault v1.18.3 (7ae4eca), built 2024-12-16T14:00:53Z
  • Server Operating System/Architecture: CentOS Stream 9 / Kernel: Linux 5.14.0-331.el9.x86_64

Vault server configuration file(s):

storage "raft" {
  path    = "/var/lib/vault"
  node_id = "node_1"
  retry_join {
    leader_api_addr = "https://node2:8200"
    leader_ca_cert_file = "/etc/vault.d/ca.pem"
    leader_client_cert_file = "/etc/vault.d/cert.pem"
    leader_client_key_file = "/etc/vault.d/cert.key"
  }
  retry_join {
    leader_api_addr = "https://node3:8200"
    leader_ca_cert_file = "/etc/vault.d/ca.pem"
    leader_client_cert_file = "/etc/vault.d/cert.pem"
    leader_client_key_file = "/etc/vault.d/cert.key"
  }
}
seal "azurekeyvault" {
  tenant_id       = "xxx"
  client_id       = "xxx"
  client_secret   = "xxx"
  vault_name      = "xxx"
  key_name        = "xxx"
  subscription_id = "xxxx"
}
telemetry {
  disable_hostname = true
  prometheus_retention_time = "12h"
}
listener "tcp" {
  address         = "0.0.0.0:8200"
  cluster_address = "0.0.0.0:8201"
  tls_cert_file   = "/etc/vault.d/cert.pem"
  tls_key_file    = "/etc/vault.d/cert.key"
  tls_client_ca_file = "/etc/vault.d/ca.pem"
}
ui = true
max_lease_ttl = "25920h"
disable_mlock = true
cluster_addr = "https://node_name:8201"
api_addr = "https://node_name:8200"

Additional context

vault kv list secret/responsible_platform_ops/patroni | wc -l
123
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants