exception.BadStoreUri exposes sensitive information to end users
Bug #1012268 reported by
Brian Waldon
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Glance |
Fix Released
|
High
|
Alex Meade | ||
Essex |
Fix Released
|
High
|
Brian Waldon | ||
glance (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | ||
Precise |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
Wherever BadStoreUri is translated to a HTTPBadRequest and returned to the user, the store uri and some relevant explanation are given to the user. This will typically contain some of the configured swift credentials, which we do not want to present to the end-user.
Related branches
lp:~openstack-ubuntu-testing/glance/precise-essex-proposed
- Ubuntu Server Developers: Pending requested
-
Diff: 31 lines (+10/-3)2 files modifieddebian/changelog (+6/-0)
debian/glance-common.postinst (+4/-3)
Changed in glance: | |
assignee: | nobody → Alex Meade (alex-meade) |
Changed in glance: | |
status: | Confirmed → In Progress |
Changed in glance: | |
status: | Fix Committed → Fix Released |
Changed in glance (Ubuntu): | |
status: | New → Fix Released |
Changed in glance (Ubuntu Precise): | |
status: | New → Confirmed |
Changed in glance: | |
milestone: | folsom-2 → 2012.2 |
To post a comment you must log in.
Fix proposed to branch: master /review. openstack. org/8562
Review: https:/