mirror of
https://github.com/optim-enterprises-bv/vault.git
synced 2025-10-30 02:02:43 +00:00
fix a bug reading auth mount using sys/internal/ui/mount endpoint when filter paths are enforced (#23802)
* fix a bug reading auth mount using sys/internal/ui/mount endpoint * CL * fix CL
This commit is contained in:
3
changelog/23802.txt
Normal file
3
changelog/23802.txt
Normal file
@@ -0,0 +1,3 @@
|
|||||||
|
```release-note:bug
|
||||||
|
core/mounts: Fix reading an "auth" mount using "sys/internal/ui/mounts/" when filter paths are enforced returns 500 error code from the secondary
|
||||||
|
```
|
||||||
@@ -4551,7 +4551,12 @@ func (b *SystemBackend) pathInternalUIMountRead(ctx context.Context, req *logica
|
|||||||
return errResp, logical.ErrPermissionDenied
|
return errResp, logical.ErrPermissionDenied
|
||||||
}
|
}
|
||||||
|
|
||||||
filtered, err := b.Core.checkReplicatedFiltering(ctx, me, "")
|
var routerPrefix string
|
||||||
|
if strings.HasPrefix(me.APIPathNoNamespace(), credentialRoutePrefix) {
|
||||||
|
routerPrefix = credentialRoutePrefix
|
||||||
|
}
|
||||||
|
|
||||||
|
filtered, err := b.Core.checkReplicatedFiltering(ctx, me, routerPrefix)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user