-
Notifications
You must be signed in to change notification settings - Fork 701
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Ensure OAuth1 authorized roles are respected
Without this patch, when an OAuth1 request token is authorized with a limited set of roles, the roles for the access token are ignored when the user uses it to request a keystone token. This means that user of an access token can use it to escallate their role assignments beyond what was authorized by the creator. This patch fixes the issue by ensuring the token model accounts for an OAuth1-scoped token and correctly populating the roles for it. Change-Id: I02f9836fbd4d7e629653977fc341476cfd89859e Closes-bug: #1873290
- Loading branch information
Showing
3 changed files
with
50 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,19 @@ | ||
--- | ||
security: | ||
- | | ||
[`bug 1873290 <https://bugs.launchpad.net/keystone/+bug/1873290>`_] | ||
[`bug 1872735 <https://bugs.launchpad.net/keystone/+bug/1872735>`_] | ||
Fixed the token model to respect the roles authorized OAuth1 access tokens. | ||
Previously, the list of roles authorized for an OAuth1 access token were | ||
ignored, so when an access token was used to request a keystone token, the | ||
keystone token would contain every role assignment the creator had for the | ||
project. This also fixed EC2 credentials to respect those roles as well. | ||
fixes: | ||
- | | ||
[`bug 1873290 <https://bugs.launchpad.net/keystone/+bug/1873290>`_] | ||
[`bug 1872735 <https://bugs.launchpad.net/keystone/+bug/1872735>`_] | ||
Fixed the token model to respect the roles authorized OAuth1 access tokens. | ||
Previously, the list of roles authorized for an OAuth1 access token were | ||
ignored, so when an access token was used to request a keystone token, the | ||
keystone token would contain every role assignment the creator had for the | ||
project. This also fixed EC2 credentials to respect those roles as well. |