Note de la release actuelle¶
12.0.0-8¶
Upgrade Notes¶
The deprecated AuthTokenPlugin has been removed. Due to this removal, the following configuration options, used by this plugin, have been also removed.
auth_hostauth_portauth_admin_prefixauth_protocolidentity_uriadmin_tokenadmin_useradmin_passwordadmin_tenant_name
The deprecated
[keystone_authtoken] auth_urioption was removed.
The
service_token_roles_requiredoption now defaults toTrue. This means that service tokens must contain a role from theservice_token_roleslist (default:['service']) to be considered valid. Operators should verify that:Service users have one of the roles listed in
service_token_roles(by default, theservicerole).If your deployment intentionally relied on the previous permissive behavior (accepting any valid token as a service token), you can restore it by explicitly setting
service_token_roles_required=Falsein the[keystone_authtoken]section, though this is strongly discouraged for security reasons.
If service tokens are rejected after upgrading, ensure the service users have the appropriate role assigned in Keystone.
Problèmes de sécurités¶
The
service_token_roles_requiredoption in[keystone_authtoken]now defaults toTrueinstead ofFalse. This fixes a security issue where any valid token could be used as a service token when the default wasFalse. With the previous default, a user token placed inX-Service-Tokenwould be accepted as a valid service token, which could bypass application credential access-rules checks and weaken composite-auth protections intended to distinguish service-to-service requests from end-user requests.