-
Notifications
You must be signed in to change notification settings - Fork 4.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
vault 1.5.0 go mod error #9575
Comments
Yeah doesn't look like commit 1a16f3c is on the 1.5 tag HEAD. |
I met the same error,how to solve the problem? |
No one should be importing Since we haven't been creating new version tags for api and sdk very often, I suggest using the tip of the branch if you want to use the latest, i.e.
|
E.g. the |
Same problem here - go mod tidy fails for my vault plugin. Adding |
Is there another way to get TestCoreUnsealed to be able to do unit tests against vault? This is a huge thing (advocated by your founder) that is the only reason I'm importing vault. |
Ah, TestCoreUnsealed/NewTestCluster are indeed excellent reasons to import vault. I'll talk it over with the rest of the team and see if we can come up with a way to improve the situation. |
I also have a dependency on the I'm also facing the reported issue when trying to upgrade to |
@ncabatoff Any update? I've had to avoid updating packages because of this issue. |
This also fixes go mod error due to hashicorp/vault#9575, by removing hashicorp/vault dependency and instead running vault test server with `vault` command.
I've fallen into this as well. In my case I'm using
in tests. |
At a minimum, it would be really nice to have some guidance in the
After reading through this issue, a |
Update the dependencies to address the following security issues: * CVE-2021-41802 * CVE-2021-38554 * CVE-2021-32923 Also fix the go dependencies by dropping the requirement for vault and using instead vault/api@ and vault/sdk as recommended in the issue hashicorp/vault#9575 Signed-off-by: Davide Madrisan <[email protected]>
Update the dependencies to address the following security issues: * CVE-2021-41802 * CVE-2021-38554 * CVE-2021-32923 Also fix the go dependencies by dropping the requirement for vault and using instead vault/api@ and vault/sdk as recommended in the issue hashicorp/vault#9575 Signed-off-by: Davide Madrisan <[email protected]>
Is there a recommendation on how we can continue using the |
lib-vault depends on `github.com/hashicorp/vault` for test purproses. However, according the vault maintiners (hashicorp/vault#9575 (comment)) > No one should be importing github.com/hashicorp/vault, only the api and sdk modules. The top-level vault module is not intended to be a dependency for other projects, we're using go.mod solely to manage our own dependencies here. Also, the current referenced vault version has critical CVEs, and we are unable to upgrade it: Some failed trials: ``` ❯ go get -u github.com/hashicorp/vault go get: github.com/hashicorp/[email protected] requires github.com/hashicorp/vault/api/auth/[email protected]: invalid version: unknown revision 000000000000 ``` ``` go get github.com/hashicorp/[email protected] go: downloading github.com/hashicorp/go-secure-stdlib/base62 v0.1.1 go: downloading github.com/hashicorp/go-secure-stdlib/password v0.1.1 go: downloading github.com/evanphx/json-patch/v5 v5.5.0 go: downloading github.com/hashicorp/go-secure-stdlib/tlsutil v0.1.1 github.com/hashicorp/vault imports github.com/hashicorp/vault/command imports github.com/hashicorp/vault/builtin/credential/aws imports github.com/hashicorp/vault/sdk/helper/awsutil: cannot find module providing package github.com/hashicorp/vault/sdk/helper/awsutil ```
* Remove dependency to vault root package lib-vault depends on `github.com/hashicorp/vault` for test purproses. However, according the vault maintiners (hashicorp/vault#9575 (comment)) > No one should be importing github.com/hashicorp/vault, only the api and sdk modules. The top-level vault module is not intended to be a dependency for other projects, we're using go.mod solely to manage our own dependencies here. Also, the current referenced vault version has critical CVEs, and we are unable to upgrade it: Some failed trials: ``` ❯ go get -u github.com/hashicorp/vault go get: github.com/hashicorp/[email protected] requires github.com/hashicorp/vault/api/auth/[email protected]: invalid version: unknown revision 000000000000 ``` ``` go get github.com/hashicorp/[email protected] go: downloading github.com/hashicorp/go-secure-stdlib/base62 v0.1.1 go: downloading github.com/hashicorp/go-secure-stdlib/password v0.1.1 go: downloading github.com/evanphx/json-patch/v5 v5.5.0 go: downloading github.com/hashicorp/go-secure-stdlib/tlsutil v0.1.1 github.com/hashicorp/vault imports github.com/hashicorp/vault/command imports github.com/hashicorp/vault/builtin/credential/aws imports github.com/hashicorp/vault/sdk/helper/awsutil: cannot find module providing package github.com/hashicorp/vault/sdk/helper/awsutil ``` * Split Vault engine v1 & v2 on distinct packages Co-authored-by: jawher <[email protected]>
…rk - so removing this test case will solve it for now. See hashicorp/vault#9575 for more about the issue Signed-off-by: Gaardsholt <[email protected]>
This issue is quite old and may no longer be relevant, so I'm going to close it for now.
Running
I've tried retroactively fixing |
Describe the bug
Error upgrading go mod dependency from vault 1.4.3 to vault 1.5.0
To Reproduce
Write simple code that calls vault api at v1.5.0. You may likely run into this issue during go mod tidy.
Expected behavior
Expected
go mod tidy
command to go through fine. I got the following error:The error goes away if I use following replace statements in
go.mod
file:Environment:
vault status
):vault version
):Vault server configuration file(s):
Additional context
Add any other context about the problem here.
The text was updated successfully, but these errors were encountered: