You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Describe the Bug
When implementing a Vault authentication plugin, the RemoteAddr field correctly reflects the IP address of the Vault client. However, the RemotePort field always returns 0, regardless of the client's actual port.
This makes it impossible to implement functionality that distinguishes between privileged and unprivileged client ports, even though the RemotePort field is present in the API.
Expected Behavior
The RemotePort field should reflect the actual ephemeral port used by the Vault client, similar to how it is captured in Vault audit logs. For example, an expected output might show:
Describe the Bug
When implementing a Vault authentication plugin, the
RemoteAddr
field correctly reflects the IP address of the Vault client. However, theRemotePort
field always returns0
, regardless of the client's actual port.This makes it impossible to implement functionality that distinguishes between privileged and unprivileged client ports, even though the
RemotePort
field is present in the API.Steps to Reproduce
req.Connection.RemotePort
, as shown below:./docker-test.sh
.docker logs $(docker ps -lq)
. The logs will showremotePort=0
, e.g.:Expected Behavior
The
RemotePort
field should reflect the actual ephemeral port used by the Vault client, similar to how it is captured in Vault audit logs. For example, an expected output might show:This would allow developers to differentiate between privileged (≤1023) and unprivileged (≥1024) ports.
Environment
hashicorp/vault:latest
(1.18.2)./docker-test.sh
. Relevant portion shown below:Additional Notes
The text was updated successfully, but these errors were encountered: