Current Series Release Notes¶
12.0.0-8¶
Upgrade Notes¶
The deprecated AuthTokenPlugin has been removed. Due to this removal, the following configuration options, used by this plugin, have been also removed.
auth_hostauth_portauth_admin_prefixauth_protocolidentity_uriadmin_tokenadmin_useradmin_passwordadmin_tenant_name
The deprecated
[keystone_authtoken] auth_urioption was removed.
The
service_token_roles_requiredoption now defaults toTrue. This means that service tokens must contain a role from theservice_token_roleslist (default:['service']) to be considered valid. Operators should verify that:Service users have one of the roles listed in
service_token_roles(by default, theservicerole).If your deployment intentionally relied on the previous permissive behavior (accepting any valid token as a service token), you can restore it by explicitly setting
service_token_roles_required=Falsein the[keystone_authtoken]section, though this is strongly discouraged for security reasons.
If service tokens are rejected after upgrading, ensure the service users have the appropriate role assigned in Keystone.
Security Issues¶
The
service_token_roles_requiredoption in[keystone_authtoken]now defaults toTrueinstead ofFalse. This fixes a security issue where any valid token could be used as a service token when the default wasFalse. With the previous default, a user token placed inX-Service-Tokenwould be accepted as a valid service token, which could bypass application credential access-rules checks and weaken composite-auth protections intended to distinguish service-to-service requests from end-user requests.