Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Panic with github.com/denisenkom/go-mssqldb.passthroughConn.SetWriteDeadline(...) #12830

Closed
mrcooperpcf opened this issue Oct 14, 2021 · 8 comments · Fixed by #12839
Closed
Labels
bug Used to indicate a potential bug dependencies Pull requests that update a dependency file secret/database/mssql
Milestone

Comments

@mrcooperpcf
Copy link

Describe the bug
After upgrading to 1.8 from 1.7 we frequently get error “panic not implemented” (see details below). We also have frequent restarts that appear related to this panic. 31 restarts in 4 days. After some searching I learned the denisenkom package is not compatible with go 1.16. Read here Not implemented panic in go 1.16 · Issue #639 · denisenkom/go-mssqldb · GitHub. When will Vault fix this issue? I’m considering down revving to try to get back to a stable platform. We primarily use Vault for dynamic DB credentials.

github.com/denisenkom/go-mssqldb.passthroughConn.SetWriteDeadline(...)
/gopath/pkg/mod/github.com/denisenkom/go-mssqldb@v0.0.0-20200428022330-06a60b6afbbc/net.go:167

To Reproduce
Steps to reproduce the behavior:

  1. Request a dynamic credential vault read /creds/
  2. See error

Expected behavior
To get a credential and to not get a panic error.

Environment:
/ $ vault status
Key Value


Recovery Seal Type shamir
Initialized true
Sealed false
Total Recovery Shares 5
Threshold 3
Version 1.8.3
Storage Type raft
Cluster Name vault-cluster-83fa7ee4
Cluster ID c31e1e9a-6f03-159b-08c7-69528604793c
HA Enabled true
HA Cluster https://vault-3.vault-internal:8201
HA Mode active
Active Since 2021-10-14T11:16:42.273387483Z
Raft Committed Index 2164966
Raft Applied Index 2164966

Vault server configuration file(s):

# Paste your Vault config here.
# Be sure to scrub any sensitive values

disable_mlock = true
ui = true

listener "tcp" {
tls_disable = 1
address = "0.0.0.0:8200"
cluster_address = "0.0.0.0:8201"
}

storage "raft" {
path = "/vault/data"
retry_join {
leader_api_addr = "http://vault-0.vault-internal:8200"
}
retry_join {
leader_api_addr = "http://vault-1.vault-internal:8200"
}
retry_join {
leader_api_addr = "http://vault-2.vault-internal:8200"
}
retry_join {
leader_api_addr = "http://vault-3.vault-internal:8200"
}
retry_join {
leader_api_addr = "http://vault-4.vault-internal:8200"
}
}

service_registration "kubernetes" {
namespace = "vault"
}

seal "azurekeyvault" {
client_id = "redacted"
client_secret = "redacted"
tenant_id = "redacted"
vault_name = "redacted"
key_name = "redacted"
}

autopilot {
cleanup_dead_servers = "true"
last_contact_threshold = "200ms"
last_contact_failure_threshold = "10m"
max_trailing_logs = 250000
min_quorum = 3
server_stabilization_time = "10s"
}

@ncabatoff
Copy link
Collaborator

This is the issue in question: denisenkom/go-mssqldb#639

@ncabatoff ncabatoff added this to the 1.8.5 milestone Oct 14, 2021
@ncabatoff ncabatoff added bug Used to indicate a potential bug secret/database/mssql labels Oct 14, 2021
@mrcooperpcf
Copy link
Author

Yes sir - it is! Question is will Vault update the dependency? The only "solution" I see at the moment is to downgrade to vault 1.7.5 which uses go 1.15.

@hsimon-hashicorp hsimon-hashicorp added the dependencies Pull requests that update a dependency file label Oct 18, 2021
@calvn
Copy link
Member

calvn commented Oct 18, 2021

@hsimon-hashicorp heads-up that this may be addressed by #12839 since we happen to update he go-mssqldb dependency on that PR.

@hsimon-hashicorp
Copy link
Contributor

Thanks for that, @calvn! Hugely appreciated.

@ncabatoff
Copy link
Collaborator

@calvn will #12839 be backported to older branches?

@calvn
Copy link
Member

calvn commented Oct 19, 2021

Yes, the dep upgrade will be backported to older branches, up to 1.6.x.

@mrcooperpcf
Copy link
Author

When will this get deployed to GA? Is it going to be part of release 1.8.5?

@calvn
Copy link
Member

calvn commented Nov 23, 2021

@mrcooperpcf sorry for the late reply, but yes it should be on 1.9.0, 1.8.5, and 1.7.6!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Used to indicate a potential bug dependencies Pull requests that update a dependency file secret/database/mssql
Projects
None yet
4 participants