File: allow-expired-5ddbabcffc5678af.yaml

package info (click to toggle)
python-keystonemiddleware 10.9.0-2
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 1,288 kB
  • sloc: python: 10,017; makefile: 93; sh: 2
file content (30 lines) | stat: -rw-r--r-- 1,774 bytes parent folder | download | duplicates (5)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
---
prelude: >
    Fetching expired tokens when using a valid service token is now allowed.
    This will help with long running operations that must continue between
    services longer than the original expiry of the token.
features:
  - AuthToken middleware will now allow fetching an expired token when a valid
    service token is present. This service token must contain any one of the
    roles specified in ``service_token_roles``.
  - Service tokens are compared against a list of possible roles for validity.
    This will ensure that only services are submitting tokens as an
    ``X-Service-Token``.
    For backwards compatibility, if ``service_token_roles_required`` is not set,
    a warning will be emitted. To enforce the check properly, set
    ``service_token_roles_required`` to ``True``. It currently defaults to
    ``False``
upgrade:
  - Set the ``service_token_roles`` to a list of roles that services may have.
    The likely list is ``service`` or ``admin``. Any ``service_token_roles`` may
    apply to accept the service token. Ensure service users have one of these
    roles so interservice communication continues to work correctly. When verified,
    set the ``service_token_roles_required`` flag to ``True`` to enforce this
    behaviour. This will become the default setting in future releases.
deprecations:
  - For backwards compatibility the ``service_token_roles_required`` option in
    ``[keystone_authtoken]`` was added. The option defaults to ``False`` and
    has been immediately deprecated. This will allow the current behaviour
    that service tokens are validated but not checked for roles to continue.
    The option should be set to ``True`` as soon as possible. The option will
    default to ``True`` in a future release.