You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Note that the Group default/bar-reader appears to have read/execute permission, which means members of that group (including the default/foo host) should be able to see and view the value of default/bar:
Logout of the UI
Login to the UI using the username host/default/foo, and the API key captured above.
Reload the Variable page in Firefox, and note that the page loads as expected.
Expected Results
Privileges in policy are technically allowed to be anything. We use the strings read, execute, and update to define permissions enable a variable to be shown, see the variable value, and update a value.
Setting the privileges to a string instead of an array is technically permitted, but feels at odds with the intended outcome. I propose the following change:
privileges values must be provided as an array.
privilege (if supported) must be provide as a string.
privileges/privilege values only support non-accented alphabetic characters.
Actual Results
A clear and concise description of what actually did happen. Include logs and
screens shots, whenever possible
Reproducible
Always
Sometimes
Non-Reproducible
Version/Tag number
What version of the product are you running? Any version info that you can
share is helpful. For example, you might give the version from Docker logs,
the Docker tag, a specific download URL, the output of the /info route, etc.
Environment setup
Can you describe the environment in which this product is running? Is it running on a VM / in a container / in a cloud?
Which cloud provider? Which container orchestrator (including version)?
The more info you can share about your runtime environment, the better we may be able to reproduce the issue.
Additional Information
Add any other context about the problem here.
The text was updated successfully, but these errors were encountered:
Summary
This issue arose from a customer call. The customer had created a
Permit
in the following form:instead of the correct form:
When the customer attempted to retrieve the variable value, they received an error that the host did not have execute permission.
Steps to Reproduce
These steps were run using the conjurdemos/dap-intro project.
bin/dap --provision-master
.default/foo
host and save it for future use.bar
in the UI: https://localhost/ui/secrets/default%2Fbardefault/bar-reader
appears to have read/execute permission, which means members of that group (including thedefault/foo
host) should be able to see and view the value ofdefault/bar
:host/default/foo
, and the API key captured above.default/bar
in the UI: https://localhost/ui/secrets/default%2Fbar.Expected Results
Privileges in policy are technically allowed to be anything. We use the strings
read
,execute
, andupdate
to define permissions enable a variable to be shown, see the variable value, and update a value.Setting the privileges to a string instead of an array is technically permitted, but feels at odds with the intended outcome. I propose the following change:
privileges
values must be provided as an array.privilege
(if supported) must be provide as a string.privileges
/privilege
values only support non-accented alphabetic characters.Actual Results
A clear and concise description of what actually did happen. Include logs and
screens shots, whenever possible
Reproducible
Version/Tag number
What version of the product are you running? Any version info that you can
share is helpful. For example, you might give the version from Docker logs,
the Docker tag, a specific download URL, the output of the
/info
route, etc.Environment setup
Additional Information
Add any other context about the problem here.
The text was updated successfully, but these errors were encountered: