-
Notifications
You must be signed in to change notification settings - Fork 4.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Policy behavior are reflected differently via CLI and web UI #7571
Comments
@catsby This issue appears to still hold true for Not only that, but it appears the setup based on the documentation doesn't work at all for UI access. To reproduceFollow pattern in documentation WITH OP's fix path "test-secret/metadata/*" {
capabilities = ["list"]
}
path "test-secret/data/foobar/*" {
capabilities = ["read"]
}
path "test-secret/metadata/foobar/*" {
capabilities = ["list"]
}
Workaround policy
path "test-secret/metadata/*" {
capabilities = ["list"]
}
path "test-secret/data/foobar" {
capabilities = ["read"]
} Maybe I'm misreading the documentation? Thanks |
@dvmonroe Thank you for the extra details. We have made quite a few changes to the KV secret engine since the 1.3 release. Most noteable re: metadata is this PR in 1.9 that added a metadata specific tab. This feature solved several permission issues. A note on the policies you listed: The reason the first policy does not work is because of the This can be confirmed by looking in the dev console and seeing the permissions error in the network request. Here is the network request to read "foobar". And here is the network request to read the secret at "foobar/hello" @GonzalezAndrew let me know if you're still hitting permissions issues on a newer version of Vault. As this PR was made quite a while ago, we will close the ticket in 6 months if there are no new comments or confirmation of this still being an issue. |
@Monkeychip Thank you for the update. I no longer work at the company where I was seeing this issue with Vault. This issue can be closed out if need be. |
Describe the bug
When using ACL template policies, both the Vault CLI and web UI are showing different behaviors. I am trying to establish a secret shared environment that allows users to create their own secrets but not see any other users secrets or pathing. The Vault CLI correctly illustrates this but the web UI throws a permission denied statement indicating the user does not have the right credentials.
To Reproduce
Steps to reproduce the behavior:
1.c) create the user
Expected behavior
Both Vault CLI and web UI should allow users to create their own secrets in the shared environment while not being able to see each others secrets or pathing.
Environment:
vault status
):vault version
):Vault server configuration file(s):
Additional context
The only work around I have been able to find was to allow all users in the shared environment to list the metadata. Of course this will show everyones name and with a large number of users can become overwhelming.
Documentation & resources I used to create my template policies:
https://www.vaultproject.io/docs/concepts/policies.html
https://www.vaultproject.io/docs/secrets/identity/index.html
https://learn.hashicorp.com/vault/identity-access-management/iam-identity
The text was updated successfully, but these errors were encountered: