Skip to content

Commit 3ffc6ab

Browse files
committed
add known issue
1 parent 782235a commit 3ffc6ab

File tree

2 files changed

+59
-1
lines changed

2 files changed

+59
-1
lines changed

content/vault/global/partials/important-changes/summary-tables/1_21.mdx

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,3 +19,5 @@ Found | Fixed | Workaround | Edition | Issue
1919
------ |--------| ---------- | ---------- | -----
2020
1.21.0 | No | **Yes** | Enterprise | [Missed events with multiple event clients](/vault/docs/v1.21.x/updates/important-changes#missed-events)
2121
1.21.0 | No | **Yes** | Enterprise | [Azure static roles fail to parse metadata as a map](/vault/docs/v1.21.x/updates/important-changes#azure-static-roles)
22+
1.21.0 | No | **Yes** | All | [GUI KV v2 metadata list request fails for some policies](/vault/docs/v1.21.x/updates/important-changes#gui-kvv2-metadata-policy)
23+
1.21.0 | No | **Yes** | Enterprise | [GUI KV v2 listing secrets fails in namespaces](/vault/docs/v1.21.x/updates/important-changes#gui-kvv2-list-namespaces)

content/vault/v1.21.x/content/docs/updates/important-changes.mdx

Lines changed: 57 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -82,4 +82,60 @@ filters you have two options:
8282
1. Spread them out among the nodes of the Vault cluster.
8383
1. Only subscribe to events on the active node of the cluster.
8484

85-
@include '../../../global/partials/important-changes/known-issue/azure-static-roles.mdx'
85+
@include '../../../global/partials/important-changes/known-issue/azure-static-roles.mdx'
86+
87+
### GUI KV v2 metadata list request fails for some policies ((#gui-kvv2-metadata-policy))
88+
89+
| Change | Affected version | Fixed version
90+
| ----------- | ---------------- | -------------
91+
| Known issue | 1.21.0 | None
92+
93+
#### Issue
94+
95+
Users cannot list KV v2 secrets in the GUI if their policy grants `list` access to metadata
96+
but the policy path does not include a trailing slash.
97+
98+
Example of a policy that previously granted users list access and now returns an error:
99+
100+
```
101+
path "secret/metadata/:path" {
102+
capabilities = ["list"]
103+
}
104+
```
105+
106+
#### Workaround
107+
108+
To resolve the policy issue, add a trailing slash to the policy path until the fix is released:
109+
110+
```
111+
path "secret/metadata/:path/" {
112+
capabilities = ["list"]
113+
}
114+
```
115+
116+
You can also use the API explorer to list KV v2 secrets:
117+
118+
1. Select **Tools** from the Vault GUI sidebar.
119+
1. Click **API Explorer**.
120+
1. Enter the KV v2 plugin mount path in the "Filter by tag" search bar.
121+
1. Expand the `GET /:mount/metadata/{path}/` endpoint and click **Try it out**.
122+
1. Input the secret `path` click **Execute** to perform the HTTP request.
123+
124+
### GUI KV v2 listing secrets fails in namespaces ((#gui-kvv2-list-namespaces)) <EnterpriseAlert inline="true" />
125+
126+
| Change | Affected version | Fixed version
127+
| ----------- | ---------------- | -------------
128+
| Known issue | 1.21.0+ent | None
129+
130+
#### Issue
131+
132+
The GUI displays a "No secrets yet" message for KV v2 engines with existing secrets when
133+
users navigate to the list secrets in a namespace.
134+
135+
#### Workaround
136+
137+
You can use the web REPL to list KV v2 secrets:
138+
139+
1. Navigate to the desired namespace.
140+
1. Toggle open the web REPL.
141+
1. Input the command `list <mount_path_to_kv_plugin_2>/metadata` and press **Enter**.

0 commit comments

Comments
 (0)