You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
After much trial and error, I gave up trying to get it to work /w Hashicorp's image. I rolled my own container of Vault using Ubuntu as the base instead of alpine.
Apart from the below warning, everything works, but Keeper devs have some updating to do. For anyone interested, I attached my Dockerfile to this ticket: hashicorp/vault#26550
vault-server_1 | 2024-04-19T21:48:25.565Z [DEBUG] core: attempting to load backend plugin: name=vault-plugin-secrets-ksm
vault-server_1 | 2024-04-19T21:48:25.565Z [DEBUG] core: spawning a new plugin process: plugin_name=vault-plugin-secrets-ksm id=2HcWuiKynM
vault-server_1 | 2024-04-19T21:48:25.929Z [DEBUG] core: failed to dispense v5 backend plugin: name=vault-plugin-secrets-ksm
vault-server_1 | error=
vault-server_1 | | Unrecognized remote plugin message:
vault-server_1 | | Failed to read any lines from plugin's stdout
vault-server_1 | | This usually means
vault-server_1 | | the plugin was not compiled for this architecture,
vault-server_1 | | the plugin is missing dynamic-link libraries necessary to run,
vault-server_1 | | the plugin is not executable by this process due to file permissions, or
vault-server_1 | | the plugin failed to negotiate the initial go-plugin protocol handshake
vault-server_1 | |
vault-server_1 | | Additional notes about plugin:
vault-server_1 | | Path: /opt/vault/plugins/vault-plugin-secrets-ksm
vault-server_1 | | Mode: -rwxr-xr-x
vault-server_1 | | Owner: 0 [root] (current: 0 [root])
vault-server_1 | | Group: 0 [root] (current: 0 [root])
vault-server_1 | | ELF architecture: EM_X86_64 (current architecture: amd64)
vault-server_1 |
vault-server_1 | 2024-04-19T21:48:26.038Z [DEBUG] core: successfully dispensed v4 backend plugin: name=vault-plugin-secrets-ksm
I am trying to deploy a Hashicorp Vault container that uses Keeper as the backend.
When I try to register the plugin, I get this:
But the vault server log shows this:
Sure enough, when I try to execute it myself, I get this:
/vault/plugins # ./vault-plugin-secrets-ksm
/bin/sh: ./vault-plugin-secrets-ksm: not found
If I deploy vault on a regular VM, I do not have this issue.
After a great deal of research (These were particularly useful: hashicorp/vault#8009, hashicorp/vault#17250, https://megamorf.gitlab.io/2019/09/08/alpine-go-builds-with-cgo-enabled/), the issue apparently has something to do with alpine linux used in the container, and that it handles dynamic libraries differently than expected.
The solution is to compile the plugin statically linked instead of dynamically.
The text was updated successfully, but these errors were encountered: