Activity log for bug #1460187

Date Who What changed Old value New value Message
2015-05-29 19:28:31 Kim Jensen bug added bug
2015-05-30 17:41:09 Kiall Mac Innes designate: milestone liberty-1
2015-05-30 17:41:11 Kiall Mac Innes designate: importance Undecided Critical
2015-05-30 17:41:17 Kiall Mac Innes nominated for series designate/kilo
2015-05-30 17:41:17 Kiall Mac Innes bug task added designate/kilo
2015-05-30 17:41:23 Kiall Mac Innes designate/kilo: importance Undecided Critical
2015-05-31 22:25:00 Clayton O'Neill bug added subscriber Clayton O'Neill
2015-06-01 16:15:37 Kim Jensen description Uses with an unscoped project token are authorized to list and create designate domains. Based on the policy file, this shoudl not be allowed. If a user gets a token that is not scoped to a project, that user is able to list and create designate domains. I would expect that only token scoped to a tenant with the required role should be authorized to successfully make the create and get domain calls. For example: POST https://KEYSTONE_ENDPOINT:35357/v2.0/tokens HTTP/1.1 Connection: close Content-Type: application/json Content-Length: 150 { "auth":{ "passwordCredentials":{ "username":"testUserName", "password":"password" } } } Response: {"access": { "token": { "issued_at": "2015-05-29T19:12:41.885602", "expires": "2015-05-29T21:12:41Z", "id": "a2ce8e93ac6b43d0b0e84fd07863a8b9", "audit_ids": ["zus4wLUbSK6mjF6cTe_R9Q"] }, ... Create domain POST https://DESIGNATE_ENDPOINT:9001/v1/domains HTTP/1.1 Connection: close X-Auth-Token: a2ce8e93ac6b43d0b0e84fd07863a8b9 Content-Type: application/json Content-Length: 85 { "name": "test-tc21abc.org.", "ttl": 3600, "email": "myemail@gmail.com" } Response: HTTP/1.1 200 OK Content-Type: application/json Content-Length: 248 Location: http://DESIGNATE_ENDPOINT:9001/v1/domains/6e1f4190-9901-488b-a9f4-489bf1030067 X-Openstack-Request-Id: req-22ee36ba-f5db-4c9f-b26c-732a39bdca85 Date: Fri, 29 May 2015 19:12:43 GMT Connection: close { "created_at": "2015-05-29T19:12:43.000000", "description": null, "email": "myemail@gmail.com", "id": "6e1f4190-9901-488b-a9f4-489bf1030067", "name": "test-tc21abc.org.", "serial": 1432926762, "ttl": 3600, "updated_at": null } Get domains GET https://DESIGNATE_ENDPOINT:9001/v1/domains HTTP/1.1 Connection: close X-Auth-Token: a2ce8e93ac6b43d0b0e84fd07863a8b9 Response: HTTP/1.1 200 OK Content-Type: application/json Content-Length: 311 X-Openstack-Request-Id: req-0f8cea71-05d0-43f1-954d-c2d6d014900c Date: Fri, 29 May 2015 19:12:43 GMT Connection: close { "domains": [ { "created_at": "2015-05-29T19:12:43.000000", "description": null, "email": "myemail@gmail.com", "id": "6e1f4190-9901-488b-a9f4-489bf1030067", "name": "test-tc21abc.org.", "serial": 1432926762, "ttl": 3600, "updated_at": null } ] } Users with an unscoped project token are authorized to list and create designate domains. Based on the policy file, this shoudl not be allowed. If a user gets a token that is not scoped to a project, that user is able to list and create designate domains. I would expect that only token scoped to a tenant with the required role should be authorized to successfully make the create and get domain calls. For example: POST https://KEYSTONE_ENDPOINT:35357/v2.0/tokens HTTP/1.1 Connection: close Content-Type: application/json Content-Length: 150 {    "auth":{       "passwordCredentials":{          "username":"testUserName",          "password":"password"       }    } } Response: {"access": {    "token": {       "issued_at": "2015-05-29T19:12:41.885602",       "expires": "2015-05-29T21:12:41Z",       "id": "a2ce8e93ac6b43d0b0e84fd07863a8b9",       "audit_ids": ["zus4wLUbSK6mjF6cTe_R9Q"]    }, ... Create domain POST https://DESIGNATE_ENDPOINT:9001/v1/domains HTTP/1.1 Connection: close X-Auth-Token: a2ce8e93ac6b43d0b0e84fd07863a8b9 Content-Type: application/json Content-Length: 85 {   "name": "test-tc21abc.org.",   "ttl": 3600,   "email": "myemail@gmail.com" } Response: HTTP/1.1 200 OK Content-Type: application/json Content-Length: 248 Location: http://DESIGNATE_ENDPOINT:9001/v1/domains/6e1f4190-9901-488b-a9f4-489bf1030067 X-Openstack-Request-Id: req-22ee36ba-f5db-4c9f-b26c-732a39bdca85 Date: Fri, 29 May 2015 19:12:43 GMT Connection: close {   "created_at": "2015-05-29T19:12:43.000000",   "description": null,   "email": "myemail@gmail.com",   "id": "6e1f4190-9901-488b-a9f4-489bf1030067",   "name": "test-tc21abc.org.",   "serial": 1432926762,   "ttl": 3600,   "updated_at": null } Get domains GET https://DESIGNATE_ENDPOINT:9001/v1/domains HTTP/1.1 Connection: close X-Auth-Token: a2ce8e93ac6b43d0b0e84fd07863a8b9 Response: HTTP/1.1 200 OK Content-Type: application/json Content-Length: 311 X-Openstack-Request-Id: req-0f8cea71-05d0-43f1-954d-c2d6d014900c Date: Fri, 29 May 2015 19:12:43 GMT Connection: close {   "domains": [     {       "created_at": "2015-05-29T19:12:43.000000",       "description": null,       "email": "myemail@gmail.com",       "id": "6e1f4190-9901-488b-a9f4-489bf1030067",       "name": "test-tc21abc.org.",       "serial": 1432926762,       "ttl": 3600,       "updated_at": null     }   ] }
2015-06-02 12:27:57 Kiall Mac Innes information type Public Public Security
2015-06-02 12:28:40 Kiall Mac Innes bug task added designate (Ubuntu)
2015-06-02 13:07:42 OpenStack Infra designate: status New In Progress
2015-06-02 13:07:42 OpenStack Infra designate: assignee Endre Karlson (endre-karlson)
2015-06-02 17:14:12 Graham Hayes designate/kilo: status New Triaged
2015-06-06 14:56:38 OpenStack Infra designate: status In Progress Fix Committed
2015-06-07 13:37:52 OpenStack Infra designate/kilo: status Triaged In Progress
2015-06-07 13:37:52 OpenStack Infra designate/kilo: assignee Kiall Mac Innes (kiall)
2015-06-07 14:05:51 Kiall Mac Innes designate (Ubuntu): status New Confirmed
2015-06-07 14:52:43 OpenStack Infra designate/kilo: status In Progress Fix Committed
2015-06-24 12:36:24 Thierry Carrez designate: status Fix Committed Fix Released
2015-10-02 12:25:00 James Page designate (Ubuntu): status Confirmed Fix Released
2015-10-15 08:28:31 Thierry Carrez designate: milestone liberty-1 1.0.0