-
Notifications
You must be signed in to change notification settings - Fork 4.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Vault panic in github.com/hashicorp/vault/vault.(*Router).MatchingSystemView #7969
Comments
Hey @bradbl - thanks for opening this! In general, we should absolutely check for Before we do dig in, could you elaborate on this part:
Removed it from where, and how did you do this? The details probably don't really impact the code change to fix this, but I'd like to reproduce and verify as well. Thanks! |
The plugin binary is placed into the Vault plugin directory. The Vault binary and plugin binary are bundled into a single Docker image and deployed together. The change here was inadvertently removing the plugin binary from the container but leaving it registered in the plugin catalog. |
Hi @bradbl! Does the panic occur immediately/shortly after server startup, or does it get triggered when making certain requests (e.g. |
I can't say definitively, but the crashes were occurring often enough that it would have been triggered by a common path, like login, instead of tune. |
I see, thanks for the info! I brought up tune since that's where the panic stemmed from this in case ( |
@bradbl sorry to keep bugging you, but I was not able to repro the panic. Would you be able to give me a bit more detail around this?
Edit: The Vault version was given in the first post. |
I was able to reproduce the panic reported. Currently working on a fix, and will link back to this issue once the PR is out. Thanks for the report! |
Describe the bug
Under some conditions, Vault can panic during the request path. The stack trace is
It appears the
backend
field of arouteEntry
can benil
, but this isn't checked.To Reproduce
We observed this by enabling a custom auth plugin and then making a change which removed the plugin binary.
Expected behavior
No panics
Environment:
vault status
): v1.3.0The text was updated successfully, but these errors were encountered: