-
Notifications
You must be signed in to change notification settings - Fork 60
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Secrets cannot be pushed to the vault (external) in the data transfer request #1826
Comments
Hi @FaheemBhatti , can you give some information on which version you observed the behavior? |
@lgblaumeiser The edc version is
We have also tried it with this configurations
|
@FaheemBhatti could you share also the two connectors hashicorp related settings ( |
@ndr-brt Yess ofcourse, The producer connector
The consumer connector
With this configuration, the EDC can read and write the secret inside the vault, but the data transfer request somehow fails and provides the vault error in the logs. Also, in our vault, the secret paths are /v1/secret/data/ssh-internal-test-entity-1/data |
Description
We have configured a central vault that is integrated with multiple TX-EDC instances. They successfully read and write secrets in the provider-case. However, in a transfer scenario, when the consumer attempts to push the relevant generated secret (EDR-tokens) to the vault, it fails with the logs below [1].
Even when roles are reversed (i.e., the provider is made the consumer), the same issue persists. The producer can push secrets, but the consumer is unable to do so.
This suggests that either a configuration setting or an issue in the EDC implementation is preventing the consumer from writing secrets to the vault. Extensive testing confirms that our vault configuration does not contain any errors or misconfigurations, indicating the issue lies within the EDC connector behavior or setup.
Steps to Reproduce
Expected Behavior
The provider and consumer connectors should be able to push secrets to the vault as required.
Actual Behavior
The consumer cannot push secrets to the vault, while the provider can do so without issues.
Role reversal does not resolve the problem.
Impact
The issue prevents the successful completion of transfer requests, potentially blocking further development.
Security risks may arise if the required secrets cannot be stored appropriately.
Possible Causes
A configuration setting within the EDC connector may restrict the consumer’s ability to push secrets.
An underlying bug in the EDC implementation affects secret storage for consumer connectors.
Attachments
[1]
[2]
Vault Configuration
[3]
Provider Logs:
Consumer Logs
[4]
Also, a new secret is added to the vault in the provider's secret data space
The text was updated successfully, but these errors were encountered: