-
Notifications
You must be signed in to change notification settings - Fork 14.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Hashicorp Vault: VAULT_CAPATH & VAULT_CACERT broken by pre-creating session to pass along #37611
Comments
Sorry, this should've been a provider bug. |
Not sure I get what you mean. |
@tungbq maybe you can look into this issue ? |
Sure, I will take a look |
Hi @Blizzke thanks for catching and opening the issue. Could you please provide the detailed script/function you are using when specifying a VAULT_CAPATH and the error log you are facing? It would help me understand/debug the issue better. Thanks! |
I found related issue. I don't know if I need to create another issue, please let me know if it is required. Apache Airflow version2.9.1 What happened?We use Hashicorp Vault as secrets backend and pass certificate via paramter verify, like: I believe the original problem of @Blizzke is similar. Although, VAULT_CAPATH is variable of hvac cleint, and probably original problem can be fixed in hvac repo, prioritizing argument "verify" to session.verify. What you think should happen instead?Parameter "verify" is correctly used, via passing it to Session constructor. Or, session is not created in vault_client.py (created in hvac client). How to reproducePass certificate with keyword parameter "verify" to VaultHook constructor. Versions of Apache Airflow Providersapache-airflow-providers-hashicorp==3.6.4 Code of Conduct
|
@tungbq are you still working on this issue? |
Apache Airflow version
2.8.1
If "Other Airflow 2 version" selected, which one?
No response
What happened?
When specifying a VAULT_CAPATH for self signed certificates, they are correctly loaded by the HCP vault client, but because the AF internal client pre-creates a session and passes that along, the adapter throws that value away in favor of the one from the session.
Since the internal client does not read those environment settings, and does nothing to "correctly" configure the session.verify, it is impossible to specify a certificate / a path to certificates to the vault client
What you think should happen instead?
Being able to control the verify behavior.
How to reproduce
Use a self signed certificate for your vault and try to specify it using the environment variables
Operating System
arch
Versions of Apache Airflow Providers
apache-airflow-providers-hashicorp==3.6.3
Deployment
Docker-Compose
Deployment details
No response
Anything else?
No response
Are you willing to submit PR?
Code of Conduct
The text was updated successfully, but these errors were encountered: