Skip to content

Commit 3fcb114

Browse files
Add 1.21.x GUI kvv2 known issues (#1202)
Adds known issues for 1.21 GUI kvv2 metadata list failures
2 parents 504c08a + c35b9ab commit 3fcb114

File tree

2 files changed

+59
-1
lines changed

2 files changed

+59
-1
lines changed

content/vault/global/partials/important-changes/summary-tables/1_21.mdx

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,3 +19,5 @@ Found | Fixed | Workaround | Edition | Issue
1919
------ |--------| ---------- | ---------- | -----
2020
1.21.0 | No | **Yes** | Enterprise | [Missed events with multiple event clients](/vault/docs/v1.21.x/updates/important-changes#missed-events)
2121
1.21.0 | No | **Yes** | Enterprise | [Azure static roles fail to parse metadata as a map](/vault/docs/v1.21.x/updates/important-changes#azure-static-roles)
22+
1.21.0 | No | **Yes** | All | [GUI KV v2 metadata list request fails for some policies](/vault/docs/v1.21.x/updates/important-changes#gui-kvv2-metadata-policy)
23+
1.21.0 | No | **Yes** | Enterprise | [GUI KV v2 listing secrets fails in namespaces](/vault/docs/v1.21.x/updates/important-changes#gui-kvv2-list-namespaces)

content/vault/v1.21.x/content/docs/updates/important-changes.mdx

Lines changed: 57 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -82,4 +82,60 @@ filters you have two options:
8282
1. Spread them out among the nodes of the Vault cluster.
8383
1. Only subscribe to events on the active node of the cluster.
8484

85-
@include '../../../global/partials/important-changes/known-issue/azure-static-roles.mdx'
85+
@include '../../../global/partials/important-changes/known-issue/azure-static-roles.mdx'
86+
87+
### GUI KV v2 metadata list request fails for some policies ((#gui-kvv2-metadata-policy))
88+
89+
| Change | Affected version | Fixed version
90+
| ----------- | ---------------- | -------------
91+
| Known issue | 1.21.0 | None
92+
93+
#### Issue
94+
95+
Users cannot list KV v2 secrets in the GUI when the policy granting `list`
96+
access to metadata does not include a trailing slash. For example:
97+
98+
```
99+
path "secret/metadata/:path" {
100+
capabilities = ["list"]
101+
}
102+
```
103+
104+
#### Workaround
105+
106+
Option 1: Use the API explorer to list KV v2 secrets instead of the KV v2 GUI page:
107+
108+
1. Select **Tools** from the Vault GUI sidebar.
109+
1. Click **API Explorer**.
110+
1. Enter the KV v2 plugin mount path in the "Filter by tag" search bar.
111+
1. Expand the `GET /:mount/metadata/{path}/` endpoint and click **Try it out**.
112+
1. Input the secret `path` click **Execute** to perform the HTTP request.
113+
114+
Option 2: Add a trailing slash to the policy path:
115+
116+
```
117+
path "secret/metadata/:path/" {
118+
capabilities = ["list"]
119+
}
120+
```
121+
122+
123+
124+
### GUI KV v2 listing secrets fails in namespaces ((#gui-kvv2-list-namespaces)) <EnterpriseAlert inline="true" />
125+
126+
| Change | Affected version | Fixed version
127+
| ----------- | ---------------- | -------------
128+
| Known issue | 1.21.0+ent | None
129+
130+
#### Issue
131+
132+
The GUI displays "No secrets yet" message for KV v2 engines with existing secrets when
133+
users navigate to the plugins secret list in a namespace.
134+
135+
#### Workaround
136+
137+
Use the CLI emulator to list KV v2 secrets:
138+
139+
1. Navigate to the desired namespace.
140+
1. Toggle open the web REPL.
141+
1. Input the command `list <mount_path_to_kv_plugin_2>/metadata` and press **Enter**.

0 commit comments

Comments
 (0)