You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Describe the bug
When using the new ACL wildcard paths like secret/data/foo/+/baz, the preflight check will fail, at least in the CLI using vault kv get, even though the vault read command succeeds
To Reproduce
Steps to reproduce the behavior:
Run vault dev server with the KV v2 secrets engine enabled at secret/
Create a token with that policy: vault token create -orphan -policy=policy
Using that token, run the following commands and receive the following results:
$ vault kv get secret/foo/bar/baz
Error making API request.
URL: GET http://localhost:8200/v1/sys/internal/ui/mounts/secret/foo/bar/baz
Code: 403. Errors:
* preflight capability check returned 403, please ensure client's policies grant access to path "secret/foo/bar/baz/"
$ vault read secret/data/foo/bar/baz
Key Value
--- -----
data map[value:data]
metadata map[deletion_time: destroyed:false version:1 created_time:2019-04-03T13:59:28.5410372Z]
Expected behavior
The preflight check should succeed.
Environment:
Vault Server Version (retrieve with vault status): 1.1.0
Vault CLI Version (retrieve with vault version): 1.1.0
Server Operating System/Architecture: Debian Stretch
The text was updated successfully, but these errors were encountered:
Describe the bug
When using the new ACL wildcard paths like
secret/data/foo/+/baz
, the preflight check will fail, at least in the CLI usingvault kv get
, even though thevault read
command succeedsTo Reproduce
Steps to reproduce the behavior:
secret/
vault kv put secret/foo/bar/baz value=data
vault token create -orphan -policy=policy
Expected behavior
The preflight check should succeed.
Environment:
vault status
): 1.1.0vault version
): 1.1.0The text was updated successfully, but these errors were encountered: