We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
Describe the bug After upgrade to 1.2.1 Vault is crashing when trying to authenticate with Radius server.
To Reproduce Steps to reproduce the behavior:
vault auth enable radius
vault write auth/radius/config host=radius.internal dial_timeout=10 nas_port=10 port=1812 read_timeout=10 unregistered_user_policies="" secret=supersecret
echo -n "$PASSWORD-$TOKEN" | vault login -method=userpass -path=radius username=$VUSER password=-
Expected behavior I should be able to log in via this enpoint as in previous version 1.0.3
Environment:
vault status
vault version
Vault server configuration file(s):
None
Additional context
2019-08-09T08:25:45.988+0200 [INFO] http: panic serving 127.0.0.1:40002: runtime error: invalid memory address or nil pointer dereference goroutine 714 [running]: net/http.(*conn).serve.func1(0xc0000cc820) /goroot/src/net/http/server.go:1769 +0x139 panic(0x2c13560, 0x5b6b250) /goroot/src/runtime/panic.go:522 +0x1b5 github.com/hashicorp/vault/builtin/credential/radius.(*backend).pathLogin(0xc000aaa018, 0x37b8580, 0xc0008d9980, 0xc00004e8c0, 0xc0001d5890, 0x10, 0xc0001d5890, 0xc0009d0b20) /gopath/src/github.com/hashicorp/vault/builtin/credential/radius/path_login.go:127 +0x74a github.com/hashicorp/vault/helper/mfa.(*backend).wrapLoginHandler.func1(0x37b8580, 0xc0008d9980, 0xc00004e8c0, 0xc0001d5890, 0xc0002450c8, 0x5b7b67, 0xc0009d0d10) /gopath/src/github.com/hashicorp/vault/helper/mfa/mfa.go:69 +0x61 github.com/hashicorp/vault/vendor/github.com/hashicorp/vault/sdk/framework.(*Backend).HandleRequest(0xc0002455f0, 0x37b8580, 0xc0008d9980, 0xc00004e8c0, 0x0, 0x0, 0x0) /gopath/src/github.com/hashicorp/vault/vendor/github.com/hashicorp/vault/sdk/framework/backend.go:253 +0x492 github.com/hashicorp/vault/builtin/plugin.(*PluginBackend).HandleRequest.func1(0x0, 0x28) /gopath/src/github.com/hashicorp/vault/builtin/plugin/backend.go:198 +0x5a github.com/hashicorp/vault/builtin/plugin.(*PluginBackend).lazyLoadBackend(0xc000b1b9a0, 0x37b8580, 0xc0008d9980, 0x37b9000, 0xc0008cce80, 0xc0009d0e20, 0x0, 0x0) /gopath/src/github.com/hashicorp/vault/builtin/plugin/backend.go:160 +0x8c github.com/hashicorp/vault/builtin/plugin.(*PluginBackend).HandleRequest(0xc000b1b9a0, 0x37b8580, 0xc0008d9980, 0xc00004e8c0, 0x0, 0xc0008baec0, 0xc) /gopath/src/github.com/hashicorp/vault/builtin/plugin/backend.go:196 +0xbb github.com/hashicorp/vault/vault.(*Router).routeCommon(0xc0003db040, 0x37b8580, 0xc0008d9980, 0xc00004e8c0, 0x0, 0x0, 0x0, 0x0, 0x0) /gopath/src/github.com/hashicorp/vault/vault/router.go:676 +0x919 github.com/hashicorp/vault/vault.(*Router).Route(...) /gopath/src/github.com/hashicorp/vault/vault/router.go:476 github.com/hashicorp/vault/vault.(*Core).doRouting(0xc00010bb80, 0x37b8580, 0xc0008d9980, 0xc00004e8c0, 0xc000a4a0f0, 0x0, 0x0) /gopath/src/github.com/hashicorp/vault/vault/request_handling.go:558 +0x5a github.com/hashicorp/vault/vault.(*Core).handleLoginRequest(0xc00010bb80, 0x37b8580, 0xc0008d9980, 0xc00004e8c0, 0x0, 0x0, 0x0, 0x0) /gopath/src/github.com/hashicorp/vault/vault/request_handling.go:977 +0xacc github.com/hashicorp/vault/vault.(*Core).handleCancelableRequest(0xc00010bb80, 0x37b8580, 0xc0008d9980, 0x5b70a40, 0xc00004e8c0, 0x5b70a40, 0x37b8580, 0xc0008d9980) /gopath/src/github.com/hashicorp/vault/vault/request_handling.go:448 +0x1ed github.com/hashicorp/vault/vault.(*Core).switchedLockHandleRequest(0xc00010bb80, 0x37b8580, 0xc0008d97a0, 0xc00004e8c0, 0x1, 0x0, 0x0, 0x0) /gopath/src/github.com/hashicorp/vault/vault/request_handling.go:417 +0x288 github.com/hashicorp/vault/vault.(*Core).HandleRequest(...) /gopath/src/github.com/hashicorp/vault/vault/request_handling.go:382 github.com/hashicorp/vault/http.request(0xc00010bb80, 0x37992c0, 0xc00012c000, 0xc0001db600, 0xc00004e8c0, 0x0, 0x0) /gopath/src/github.com/hashicorp/vault/http/handler.go:620 +0x80 github.com/hashicorp/vault/http.handleLogicalInternal.func1(0x37992c0, 0xc00012c000, 0xc0001db600) /gopath/src/github.com/hashicorp/vault/http/logical.go:278 +0x32d net/http.HandlerFunc.ServeHTTP(0xc000a71580, 0x37992c0, 0xc00012c000, 0xc0001db600) /goroot/src/net/http/server.go:1995 +0x44 github.com/hashicorp/vault/http.handleRequestForwarding.func1(0x37992c0, 0xc00012c000, 0xc0001db600) /gopath/src/github.com/hashicorp/vault/http/handler.go:545 +0x2b7 net/http.HandlerFunc.ServeHTTP(0xc000a715a0, 0x37992c0, 0xc00012c000, 0xc0001db600) /goroot/src/net/http/server.go:1995 +0x44 net/http.(*ServeMux).ServeHTTP(0xc0007375c0, 0x37992c0, 0xc00012c000, 0xc0001db600) /goroot/src/net/http/server.go:2375 +0x1d6 github.com/hashicorp/vault/http.wrapHelpHandler.func1(0x37992c0, 0xc00012c000, 0xc0001db600) /gopath/src/github.com/hashicorp/vault/http/help.go:24 +0x156 net/http.HandlerFunc.ServeHTTP(0xc000a71640, 0x37992c0, 0xc00012c000, 0xc0001db600) /goroot/src/net/http/server.go:1995 +0x44 github.com/hashicorp/vault/http.wrapCORSHandler.func1(0x37992c0, 0xc00012c000, 0xc0001db600) /gopath/src/github.com/hashicorp/vault/http/cors.go:29 +0x9e1 net/http.HandlerFunc.ServeHTTP(0xc000a71660, 0x37992c0, 0xc00012c000, 0xc0001db600) /goroot/src/net/http/server.go:1995 +0x44 github.com/hashicorp/vault/http.wrapGenericHandler.func1(0x37992c0, 0xc00012c000, 0xc0001db400) /gopath/src/github.com/hashicorp/vault/http/handler.go:204 +0x339 net/http.HandlerFunc.ServeHTTP(0xc000a74b10, 0x37992c0, 0xc00012c000, 0xc0001db400) /goroot/src/net/http/server.go:1995 +0x44 github.com/hashicorp/vault/vendor/github.com/hashicorp/go-cleanhttp.PrintablePathCheckHandler.func1(0x37992c0, 0xc00012c000, 0xc0001db400) /gopath/src/github.com/hashicorp/vault/vendor/github.com/hashicorp/go-cleanhttp/handlers.go:42 +0xbb net/http.HandlerFunc.ServeHTTP(0xc000a71680, 0x37992c0, 0xc00012c000, 0xc0001db400) /goroot/src/net/http/server.go:1995 +0x44 net/http.serverHandler.ServeHTTP(0xc000b14dd0, 0x37992c0, 0xc00012c000, 0xc0001db400) /goroot/src/net/http/server.go:2774 +0xa8 net/http.(*conn).serve(0xc0000cc820, 0x37b84c0, 0xc000216b80) /goroot/src/net/http/server.go:1878 +0x851 created by net/http.(*Server).Serve /goroot/src/net/http/server.go:2884 #+0x2f4
The text was updated successfully, but these errors were encountered:
Hi @2easy,
Thanks for the detailed bug report. We'll include a fix in 1.2.2.
Sorry, something went wrong.
ncabatoff
Successfully merging a pull request may close this issue.
Describe the bug
After upgrade to 1.2.1 Vault is crashing when trying to authenticate with Radius server.
To Reproduce
Steps to reproduce the behavior:
vault auth enable radius
vault write auth/radius/config host=radius.internal dial_timeout=10 nas_port=10 port=1812 read_timeout=10 unregistered_user_policies="" secret=supersecret
echo -n "$PASSWORD-$TOKEN" | vault login -method=userpass -path=radius username=$VUSER password=-
Expected behavior
I should be able to log in via this enpoint as in previous version 1.0.3
Environment:
vault status
): 1.2.1vault version
): 1.2.1Vault server configuration file(s):
None
Additional context
The text was updated successfully, but these errors were encountered: