Activity log for bug #1946787

Date Who What changed Old value New value Message
2021-10-12 18:48:43 Corey Bryant bug added bug
2021-10-12 18:52:39 Corey Bryant nominated for series Ubuntu Impish
2021-10-12 18:52:39 Corey Bryant bug task added barbican (Ubuntu Impish)
2021-10-12 18:52:54 Corey Bryant barbican (Ubuntu Impish): status New Triaged
2021-10-12 18:52:58 Corey Bryant barbican (Ubuntu Impish): importance Undecided High
2021-10-12 18:53:30 Corey Bryant nominated for series Ubuntu Hirsute
2021-10-12 18:53:30 Corey Bryant bug task added barbican (Ubuntu Hirsute)
2021-10-12 18:53:35 Corey Bryant barbican (Ubuntu Hirsute): status New Triaged
2021-10-12 18:53:38 Corey Bryant barbican (Ubuntu Hirsute): importance Undecided High
2021-10-12 18:53:41 Corey Bryant barbican (Ubuntu Impish): status Triaged Fix Released
2021-10-12 18:53:43 Corey Bryant barbican (Ubuntu Impish): importance High Undecided
2021-10-12 18:54:03 Corey Bryant bug task added cloud-archive
2021-10-12 18:54:14 Corey Bryant nominated for series cloud-archive/xena
2021-10-12 18:54:14 Corey Bryant bug task added cloud-archive/xena
2021-10-12 18:54:14 Corey Bryant nominated for series cloud-archive/wallaby
2021-10-12 18:54:14 Corey Bryant bug task added cloud-archive/wallaby
2021-10-12 18:54:25 Corey Bryant cloud-archive/xena: status New Fix Released
2021-10-12 18:54:30 Corey Bryant cloud-archive/wallaby: status New Triaged
2021-10-12 18:54:33 Corey Bryant cloud-archive/wallaby: importance Undecided High
2021-10-12 19:01:22 Corey Bryant description [Impact] [Test Case] [Where things could go wrong] [Impact] This SRU corresponds with the following story for upstream barbican https://storyboard.openstack.org/#!/story/2008335. The problem is not all secrets were being stored in plaintext prior to this change, resulting in the inability to decode some payloads. This is fixed by always storing secrets in plaintext and decoding inconsistently stored data as needed when getting secrets. [Test Case] [Where things could go wrong]
2021-10-12 19:02:14 Corey Bryant description [Impact] This SRU corresponds with the following story for upstream barbican https://storyboard.openstack.org/#!/story/2008335. The problem is not all secrets were being stored in plaintext prior to this change, resulting in the inability to decode some payloads. This is fixed by always storing secrets in plaintext and decoding inconsistently stored data as needed when getting secrets. [Test Case] [Where things could go wrong] [Impact] This SRU corresponds with the following story for upstream barbican https://storyboard.openstack.org/#!/story/2008335. The problem is some secrets were stored in plaintext and some were stored encoded. This resulted in the inability to decode some payloads. This is fixed by always storing secrets in plaintext and decoding inconsistently stored data as needed when getting secrets. [Test Case] [Where things could go wrong]
2021-10-12 19:02:25 Corey Bryant description [Impact] This SRU corresponds with the following story for upstream barbican https://storyboard.openstack.org/#!/story/2008335. The problem is some secrets were stored in plaintext and some were stored encoded. This resulted in the inability to decode some payloads. This is fixed by always storing secrets in plaintext and decoding inconsistently stored data as needed when getting secrets. [Test Case] [Where things could go wrong] [Impact] This SRU corresponds with the following story for upstream barbican https://storyboard.openstack.org/#!/story/2008335. The problem is some secrets were stored in plaintext and some were stored encoded. This resulted in the inability to decode some secrets. This is fixed by always storing secrets in plaintext and decoding inconsistently stored data as needed when getting secrets. [Test Case] [Where things could go wrong]
2021-10-12 19:17:49 Corey Bryant description [Impact] This SRU corresponds with the following story for upstream barbican https://storyboard.openstack.org/#!/story/2008335. The problem is some secrets were stored in plaintext and some were stored encoded. This resulted in the inability to decode some secrets. This is fixed by always storing secrets in plaintext and decoding inconsistently stored data as needed when getting secrets. [Test Case] [Where things could go wrong] [Impact] This SRU corresponds with the following story for upstream barbican https://storyboard.openstack.org/#!/story/2008335. The problem is some secrets were stored in plaintext and some were stored encoded. This resulted in the inability to decode some secrets. This is fixed by always storing secrets in plaintext and decoding inconsistently stored data as needed when getting secrets. [Test Case] [Where things could go wrong] If things were to go wrong it would probably be in the get_secret() method which calls _ensure_legacy_base64(). _ensure_legacy_base64() assumes that anything that is not a key was stored base64 encoded. Presumably this is correct, but there was a path added to catch a UnicodeDecodeError exception to handle unexpected non-base64-encoded secrets.
2021-10-12 19:18:34 Corey Bryant description [Impact] This SRU corresponds with the following story for upstream barbican https://storyboard.openstack.org/#!/story/2008335. The problem is some secrets were stored in plaintext and some were stored encoded. This resulted in the inability to decode some secrets. This is fixed by always storing secrets in plaintext and decoding inconsistently stored data as needed when getting secrets. [Test Case] [Where things could go wrong] If things were to go wrong it would probably be in the get_secret() method which calls _ensure_legacy_base64(). _ensure_legacy_base64() assumes that anything that is not a key was stored base64 encoded. Presumably this is correct, but there was a path added to catch a UnicodeDecodeError exception to handle unexpected non-base64-encoded secrets. [Impact] This SRU corresponds with the following story for upstream barbican https://storyboard.openstack.org/#!/story/2008335. The problem is some secrets were stored in plaintext and some were stored encoded. This resulted in the inability to decode some secrets. This is fixed by always storing secrets in plaintext and decoding inconsistently stored data as needed when getting secrets. [Test Case] TBD [Where things could go wrong] If things were to go wrong it would probably be in the get_secret() method which calls _ensure_legacy_base64(). _ensure_legacy_base64() assumes that anything that is not a key was stored base64 encoded. Presumably this is correct, but there was a path added to catch a UnicodeDecodeError exception to handle unexpected non-base64-encoded secrets.
2021-10-12 19:39:03 Corey Bryant bug added subscriber Ubuntu Stable Release Updates Team
2021-10-18 15:35:43 Edward Hope-Morley description [Impact] This SRU corresponds with the following story for upstream barbican https://storyboard.openstack.org/#!/story/2008335. The problem is some secrets were stored in plaintext and some were stored encoded. This resulted in the inability to decode some secrets. This is fixed by always storing secrets in plaintext and decoding inconsistently stored data as needed when getting secrets. [Test Case] TBD [Where things could go wrong] If things were to go wrong it would probably be in the get_secret() method which calls _ensure_legacy_base64(). _ensure_legacy_base64() assumes that anything that is not a key was stored base64 encoded. Presumably this is correct, but there was a path added to catch a UnicodeDecodeError exception to handle unexpected non-base64-encoded secrets. [Impact] This SRU corresponds with the following story for upstream barbican https://storyboard.openstack.org/#!/story/2008335. The problem is some secrets were stored in plaintext and some were stored encoded. This resulted in the inability to decode some secrets. This is fixed by always storing secrets in plaintext and decoding inconsistently stored data as needed when getting secrets. [Test Case] * deploy Openstack with Barbican using Vault as a backend * openstack volume type create --encryption-provider nova.volume.encryptors.luks.LuksEncryptor --encryption-cipher aes-xts-plain64 --encryption-key-size 256 --encryption-control-location front-end LUKS * openstack volume create --size 1 --type LUKS luks_vol1 * ensure volume created successfully * openstack volume show luks_vol1 * create vm and attach volume * mkfs and mount then test can read/write [Where things could go wrong] If things were to go wrong it would probably be in the get_secret() method which calls _ensure_legacy_base64(). _ensure_legacy_base64() assumes that anything that is not a key was stored base64 encoded. Presumably this is correct, but there was a path added to catch a UnicodeDecodeError exception to handle unexpected non-base64-encoded secrets.
2021-10-18 18:54:57 Edward Hope-Morley nominated for series cloud-archive/ussuri
2021-10-18 18:54:57 Edward Hope-Morley bug task added cloud-archive/ussuri
2021-10-18 18:54:57 Edward Hope-Morley nominated for series cloud-archive/victoria
2021-10-18 18:54:57 Edward Hope-Morley bug task added cloud-archive/victoria
2021-10-18 18:55:39 Edward Hope-Morley nominated for series Ubuntu Focal
2021-10-18 18:55:39 Edward Hope-Morley bug task added barbican (Ubuntu Focal)
2021-10-19 18:47:19 Brian Murray barbican (Ubuntu Hirsute): status Triaged Fix Committed
2021-10-19 18:47:22 Brian Murray bug added subscriber SRU Verification
2021-10-19 18:47:26 Brian Murray tags verification-needed verification-needed-hirsute
2021-10-19 21:19:41 Corey Bryant cloud-archive/wallaby: status Triaged Fix Committed
2021-10-19 21:19:42 Corey Bryant tags verification-needed verification-needed-hirsute verification-needed verification-needed-hirsute verification-wallaby-needed
2021-10-31 22:09:12 Mathew Hodson barbican (Ubuntu Focal): importance Undecided High
2021-10-31 22:09:16 Mathew Hodson barbican (Ubuntu Impish): importance Undecided High
2021-10-31 22:09:22 Mathew Hodson barbican (Ubuntu): importance Undecided High
2021-11-01 17:43:18 Liam Young tags verification-needed verification-needed-hirsute verification-wallaby-needed verification-done-hirsute verification-needed verification-wallaby-needed
2021-11-01 18:37:29 Liam Young tags verification-done-hirsute verification-needed verification-wallaby-needed verification-done-hirsute verification-needed verification-wallaby-done
2021-11-01 19:43:59 Launchpad Janitor barbican (Ubuntu Hirsute): status Fix Committed Fix Released
2021-11-01 19:44:03 Brian Murray removed subscriber Ubuntu Stable Release Updates Team
2021-11-01 19:55:58 Corey Bryant cloud-archive/wallaby: status Fix Committed Fix Released
2021-11-01 20:25:59 Corey Bryant cloud-archive/victoria: status New Fix Committed
2021-11-01 20:26:00 Corey Bryant tags verification-done-hirsute verification-needed verification-wallaby-done verification-done-hirsute verification-needed verification-victoria-needed verification-wallaby-done
2021-11-01 20:39:07 Corey Bryant bug added subscriber Ubuntu Stable Release Updates Team
2021-11-01 20:39:09 Corey Bryant barbican (Ubuntu Focal): status New Triaged
2021-11-01 20:39:12 Corey Bryant cloud-archive/ussuri: status New Triaged
2021-11-01 20:39:16 Corey Bryant cloud-archive/ussuri: importance Undecided High
2021-11-01 20:39:22 Corey Bryant cloud-archive/victoria: importance Undecided High
2021-11-01 20:39:25 Corey Bryant cloud-archive/xena: importance Undecided High
2021-11-01 20:39:27 Corey Bryant cloud-archive: importance Undecided High
2021-11-01 23:07:10 Nobuto Murata bug added subscriber Nobuto Murata
2021-11-02 11:43:36 Liam Young tags verification-done-hirsute verification-needed verification-victoria-needed verification-wallaby-done verification-done-hirsute verification-needed verification-victoria-done verification-wallaby-done
2021-11-05 23:20:29 Steve Langasek barbican (Ubuntu Focal): status Triaged Fix Committed
2021-11-05 23:20:38 Steve Langasek tags verification-done-hirsute verification-needed verification-victoria-done verification-wallaby-done verification-done-hirsute verification-needed verification-needed-focal verification-victoria-done verification-wallaby-done
2021-11-08 13:52:06 Corey Bryant cloud-archive/victoria: status Fix Committed Fix Released
2021-11-08 13:54:11 Corey Bryant cloud-archive/ussuri: status Triaged Fix Committed
2021-11-08 13:54:13 Corey Bryant tags verification-done-hirsute verification-needed verification-needed-focal verification-victoria-done verification-wallaby-done verification-done-hirsute verification-needed verification-needed-focal verification-ussuri-needed verification-victoria-done verification-wallaby-done
2021-11-23 11:38:05 Edward Hope-Morley tags verification-done-hirsute verification-needed verification-needed-focal verification-ussuri-needed verification-victoria-done verification-wallaby-done verification-done-focal verification-done-hirsute verification-needed verification-ussuri-needed verification-victoria-done verification-wallaby-done
2021-11-25 11:01:04 Launchpad Janitor barbican (Ubuntu Focal): status Fix Committed Fix Released
2021-11-25 14:22:01 Edward Hope-Morley tags verification-done-focal verification-done-hirsute verification-needed verification-ussuri-needed verification-victoria-done verification-wallaby-done verification-done verification-done-focal verification-done-hirsute verification-ussuri-done verification-victoria-done verification-wallaby-done
2021-11-29 14:35:35 Corey Bryant cloud-archive/ussuri: status Fix Committed Fix Released