Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Can't init 1.13.2 with awskms #20644

Closed
pcsgithubid opened this issue May 17, 2023 · 4 comments · Fixed by #20897
Closed

Can't init 1.13.2 with awskms #20644

pcsgithubid opened this issue May 17, 2023 · 4 comments · Fixed by #20897
Assignees
Labels
core Issues and Pull-Requests specific to Vault Core

Comments

@pcsgithubid
Copy link

pcsgithubid commented May 17, 2023

When running vault init with the web UI on a new install of 1.13.2 errors with "* parameters secret_shares,secret_threshold not applicable to seal type awskms".

Environment:

Vault Server Version (retrieve with vault status): 1.13.2

Vault server configuration file(s):

ui = true
disable_mlock = true

cluster_addr = "https://...:8201"
api_addr = "https://...:8200"
listener "tcp" {
address = "0.0.0.0:8200"
tls_disable = false
tls_cert_file = "/opt/vault/tls/certificates/....crt"
tls_key_file = "/opt/vault/tls/certificates/....key"
tls_disable_client_certs = true
}

plugin_directory = "/opt/vault/plugins"

seal "awskms" {
region = "us-east-1"
kms_key_id = "arn:aws:kms:us-east-1..."
}

@pcsgithubid
Copy link
Author

Screen Shot 2023-05-17 at 6 52 28 PM

@pcsgithubid pcsgithubid changed the title Can't init 1.13.0 with awskms Can't init 1.13.2 with awskms May 18, 2023
@maxb
Copy link
Contributor

maxb commented May 19, 2023

This was also raised in https://discuss.hashicorp.com/t/cant-init-1-13-2-with-awskms/54000. I looked at it there, and it looks like initializing an auto-unseal cluster via the web UI may have regressed since v1.12.0, possible triggering PR #16379.

@marcboudreau marcboudreau added the core Issues and Pull-Requests specific to Vault Core label May 19, 2023
@marcboudreau marcboudreau self-assigned this May 23, 2023
@marcboudreau
Copy link
Contributor

Thank you for bringing this issue to our attention. I am working on reproducing this environment on our systems in order to better understand the root cause.

@marcboudreau
Copy link
Contributor

I have been able to reproduce this issue locally. For the community's benefit, I wanted to confirm that this issue is not unique to the AWSKMS seal type.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
core Issues and Pull-Requests specific to Vault Core
Projects
None yet
Development

Successfully merging a pull request may close this issue.

3 participants