Closed
Description
Describe the bug
vault token create -policy=mypolicy -ttl=1d
fails with error:
invalid value "1d" for flag -ttl: time: unknown unit "ds" in duration "1ds"
The same command works fine if 'd' is replaced with 'h'.
To Reproduce
Steps to reproduce the behavior:
- Run
vault token create -policy=mypolicy -ttl=1d
(note: result is the same regardless if the policy exists or not)
Expected behavior
token gets created with a 1 day ttl.
Environment:
-
Vault Server Version (retrieve with
vault status
):
Version 1.12.2
Build Date 2022-11-23T12:53:46Z -
Vault CLI Version (retrieve with
vault version
):
Vault v1.13.0 (a4cf0dc), built 2023-03-01T14:58:13Z -
Server Operating System/Architecture:
Ubuntu 20.04.5 LTS
Vault server configuration file(s):
api_addr = "https://10.100.12.8"
cluster_addr = "https://10.100.12.19:8201"
log_level = "trace"
ui = true
seal "gcpckms" {
project = "rd-vault-development"
region = "europe-west4"
key_ring = "vault-f5287fb63ff07b0c"
crypto_key = "vault-init"
}
storage "gcs" {
bucket = "rd-vault-development-vault-storage"
ha_enabled = "true"
}
listener "tcp" {
address = "127.0.0.1:8200"
tls_disable = "true"
telemetry {
prometheus_retention_time = "1h"
disable_hostname = true
unauthenticated_metrics_access = true
}
}
listener "tcp" {
address = "10.100.12.19:8200"
tls_disable = "true"
telemetry {
prometheus_retention_time = "1h"
disable_hostname = true
unauthenticated_metrics_access = true
}
}
listener "tcp" {
address = "10.100.12.8:8200"
tls_disable = "true"
telemetry {
prometheus_retention_time = "1h"
disable_hostname = true
unauthenticated_metrics_access = true
}
}
telemetry {
prometheus_retention_time = "300s",
disable_hostname = true
}
Activity