Skip to content

Commit 9e6abb5

Browse files
committed
vault/auth: add known issue for local auth mounts
1 parent 65ddc6f commit 9e6abb5

File tree

2 files changed

+69
-1
lines changed

2 files changed

+69
-1
lines changed

content/vault/v1.19.x/content/docs/updates/important-changes.mdx

Lines changed: 34 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -467,3 +467,37 @@ due to improper credential refreshes and stale connections in the connection poo
467467
When two or more concurrent operations occur, Vault tries to reuse an idle
468468
connection from the pool and the request fails due to session timeout in the
469469
Snowflake database.
470+
471+
### Writing configuration to local auth mount (ldap, aws, gcp, azure) ignores local flag ((#local-auth-known-issue))
472+
473+
| Change | Affected version | Fixed version |
474+
| :--- | :--- | :--- |
475+
| Known issue | 1.20.x, 1.19.x | None |
476+
477+
Write operations targeting a local auth mount on a performance replication secondary
478+
cluster are incorrectly forwarded to the primary cluster for processing. This
479+
prevents the independent configuration of local mounts on secondary clusters.
480+
481+
The following auth methods are affected:
482+
- Azure
483+
- GCP
484+
- AWS
485+
- LDAP
486+
487+
This behavior leads to two distinct failure modes. If a local auth mount with the
488+
same path exists on the primary, the write operation is incorrectly applied to
489+
the primary's mount. If the auth mount path does not exist on the primary, the
490+
secondary cluster panics with a `nil pointer dereference` error, causing the
491+
Vault node to crash.
492+
493+
As a result, it is not possible to maintain independent configurations for
494+
local mounts that share the same path across a primary and its secondaries.
495+
Furthermore, attempting to use unique paths on the secondary that do not exist
496+
on the primary leads to a panic as Vault will forward the request.
497+
498+
#### Recommendation
499+
500+
There is currently no known workaround for this issue. Do not attempt to
501+
configure local auth mounts on performance replication secondaries until a fix
502+
is available.
503+

content/vault/v1.20.x/content/docs/updates/important-changes.mdx

Lines changed: 35 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -348,7 +348,41 @@ then performs a second password update.
348348
While users still receive the latest password, the secondary update may lead to
349349
unexpected LDAP activity and cause confusion interpreting audit logs.
350350

351-
### Recommendation
351+
#### Recommendation
352352

353353
Send check-in requests directly to the active node of the primary cluster to
354354
prevent duplicate password rotations on the LDAP server.
355+
356+
### Writing configuration to local auth mount (ldap, aws, gcp, azure) ignores local flag ((#local-auth-known-issue))
357+
358+
| Change | Affected version | Fixed version |
359+
| :--- | :--- | :--- |
360+
| Known issue | 1.20.x, 1.19.x | None |
361+
362+
Write operations targeting a local auth mount on a performance replication secondary
363+
cluster are incorrectly forwarded to the primary cluster for processing. This
364+
prevents the independent configuration of local mounts on secondary clusters.
365+
366+
The following auth methods are affected:
367+
- Azure
368+
- GCP
369+
- AWS
370+
- LDAP
371+
372+
This behavior leads to two distinct failure modes. If a local auth mount with the
373+
same path exists on the primary, the write operation is incorrectly applied to
374+
the primary's mount. If the auth mount path does not exist on the primary, the
375+
secondary cluster panics with a `nil pointer dereference` error, causing the
376+
Vault node to crash.
377+
378+
As a result, it is not possible to maintain independent configurations for
379+
local mounts that share the same path across a primary and its secondaries.
380+
Furthermore, attempting to use unique paths on the secondary that do not exist
381+
on the primary leads to a panic as Vault will forward the request.
382+
383+
#### Recommendation
384+
385+
There is currently no known workaround for this issue. Do not attempt to
386+
configure local auth mounts on performance replication secondaries until a fix
387+
is available.
388+

0 commit comments

Comments
 (0)