backport of commit 87376a1f5c676c9a54e1050b3e71e32c4ac92595 (#23790)
Co-authored-by: Hamid Ghaf <83242695+hghaf099@users.noreply.github.com>
This commit is contained in:
parent
bcb56630e7
commit
a7f5d0c8ea
|
@ -99,7 +99,7 @@ func (b *backend) pathLoginResolveRole(ctx context.Context, req *logical.Request
|
|||
return nil, err
|
||||
}
|
||||
if roleIDIndex == nil {
|
||||
return logical.ErrorResponse("invalid role ID"), nil
|
||||
return logical.ErrorResponse("invalid role or secret ID"), nil
|
||||
}
|
||||
|
||||
roleName := roleIDIndex.Name
|
||||
|
@ -113,7 +113,7 @@ func (b *backend) pathLoginResolveRole(ctx context.Context, req *logical.Request
|
|||
return nil, err
|
||||
}
|
||||
if role == nil {
|
||||
return logical.ErrorResponse("invalid role ID"), nil
|
||||
return logical.ErrorResponse("invalid role or secret ID"), nil
|
||||
}
|
||||
|
||||
return logical.ResolveRoleResponse(roleName)
|
||||
|
@ -134,7 +134,7 @@ func (b *backend) pathLoginUpdate(ctx context.Context, req *logical.Request, dat
|
|||
return nil, err
|
||||
}
|
||||
if roleIDIndex == nil {
|
||||
return logical.ErrorResponse("invalid role ID"), nil
|
||||
return logical.ErrorResponse("invalid role or secret ID"), nil
|
||||
}
|
||||
|
||||
roleName := roleIDIndex.Name
|
||||
|
@ -148,7 +148,7 @@ func (b *backend) pathLoginUpdate(ctx context.Context, req *logical.Request, dat
|
|||
return nil, err
|
||||
}
|
||||
if role == nil {
|
||||
return logical.ErrorResponse("invalid role ID"), nil
|
||||
return logical.ErrorResponse("invalid role or secret ID"), nil
|
||||
}
|
||||
|
||||
metadata := make(map[string]string)
|
||||
|
@ -184,7 +184,7 @@ func (b *backend) pathLoginUpdate(ctx context.Context, req *logical.Request, dat
|
|||
return nil, err
|
||||
}
|
||||
if entry == nil {
|
||||
return logical.ErrorResponse("invalid secret id"), logical.ErrInvalidCredentials
|
||||
return logical.ErrorResponse("invalid role or secret ID"), logical.ErrInvalidCredentials
|
||||
}
|
||||
|
||||
// If a secret ID entry does not have a corresponding accessor
|
||||
|
@ -204,7 +204,7 @@ func (b *backend) pathLoginUpdate(ctx context.Context, req *logical.Request, dat
|
|||
return nil, err
|
||||
}
|
||||
if entry == nil {
|
||||
return logical.ErrorResponse("invalid secret id"), nil
|
||||
return logical.ErrorResponse("invalid role or secret ID"), nil
|
||||
}
|
||||
|
||||
accessorEntry, err := b.secretIDAccessorEntry(ctx, req.Storage, entry.SecretIDAccessor, role.SecretIDPrefix)
|
||||
|
@ -217,7 +217,7 @@ func (b *backend) pathLoginUpdate(ctx context.Context, req *logical.Request, dat
|
|||
return nil, fmt.Errorf("error deleting secret ID %q from storage: %w", secretIDHMAC, err)
|
||||
}
|
||||
}
|
||||
return logical.ErrorResponse("invalid secret id"), nil
|
||||
return logical.ErrorResponse("invalid role or secret ID"), nil
|
||||
}
|
||||
|
||||
switch {
|
||||
|
|
|
@ -354,7 +354,7 @@ func TestAppRole_RoleDoesNotExist(t *testing.T) {
|
|||
t.Fatal("Error not part of response.")
|
||||
}
|
||||
|
||||
if !strings.Contains(errString, "invalid role ID") {
|
||||
if !strings.Contains(errString, "invalid role or secret ID") {
|
||||
t.Fatalf("Error was not due to invalid role ID. Error: %s", errString)
|
||||
}
|
||||
}
|
||||
|
|
|
@ -0,0 +1,3 @@
|
|||
```release-note:change
|
||||
auth/approle: Normalized error response messages when invalid credentials are provided
|
||||
```
|
Loading…
Reference in New Issue