2017-10-27 12:04:04 |
lahari |
bug |
|
|
added bug |
2017-10-27 12:07:17 |
Sudheer Kalla |
attachment added |
|
testing.png https://bugs.launchpad.net/horizon/+bug/1728031/+attachment/4997850/+files/testing.png |
|
2017-10-27 12:07:31 |
Sudheer Kalla |
horizon: status |
New |
Confirmed |
|
2017-10-27 12:07:41 |
Sudheer Kalla |
horizon: status |
Confirmed |
New |
|
2017-10-27 20:06:37 |
Gary W. Smith |
tags |
|
keystone |
|
2017-10-27 20:08:05 |
Gary W. Smith |
summary |
unable to change user password |
Unable to change user password when ENFORCE_PASSWORD_CHECK is True |
|
2017-10-30 05:54:48 |
Sudheer Kalla |
bug |
|
|
added subscriber Sudheer Kalla |
2017-10-31 05:50:41 |
Sudheer Kalla |
attachment added |
|
Bug.png https://bugs.launchpad.net/horizon/+bug/1728031/+attachment/5000722/+files/Bug.png |
|
2022-08-23 07:11:38 |
OpenStack Infra |
horizon: status |
New |
In Progress |
|
2024-03-07 07:44:40 |
Andres Mariano Zwaal |
bug |
|
|
added subscriber Andres Mariano Zwaal |
2024-03-20 15:22:25 |
OpenStack Infra |
horizon: status |
In Progress |
Fix Released |
|
2024-03-28 19:25:54 |
OpenStack Infra |
tags |
keystone |
in-stable-zed keystone |
|
2024-04-01 16:21:17 |
Rodrigo Barbieri |
summary |
Unable to change user password when ENFORCE_PASSWORD_CHECK is True |
[SRU] Unable to change user password when ENFORCE_PASSWORD_CHECK is True |
|
2024-04-01 18:18:05 |
Rodrigo Barbieri |
description |
After following the security hardening guidelines:
https://docs.openstack.org/security-guide/dashboard/checklist.html#check-dashboard-09-is-enforce-password-check-set-to-true
After this check is enabled
Check-Dashboard-09: Is ENFORCE_PASSWORD_CHECK set to True
The user password cannot be changed.
The form submission fails by displaying that admin password is incorrect.
The reason for this is in keystone.py in openstack_dashboard/api/keystone.py
user_verify_admin_password method uses internal url to communicate with the keystone.
line 500:
endpoint = _get_endpoint_url(request, 'internalURL')
This should be changed to adminURL |
After following the security hardening guidelines:
https://docs.openstack.org/security-guide/dashboard/checklist.html#check-dashboard-09-is-enforce-password-check-set-to-true
After this check is enabled
Check-Dashboard-09: Is ENFORCE_PASSWORD_CHECK set to True
The user password cannot be changed.
The form submission fails by displaying that admin password is incorrect.
The reason for this is in keystone.py in openstack_dashboard/api/keystone.py
user_verify_admin_password method uses internal url to communicate with the keystone.
line 500:
endpoint = _get_endpoint_url(request, 'internalURL')
This should be changed to adminURL
===============
SRU Description
===============
[Impact]
Admins cannot change user's password as it gives an error saying that the admin's password is incorrect, despite being correct. There are 2 causes:
1) due to the lack of user_domain being specified when validating the admin's password, it will always fail if the admin is not registered in the "default" domain, because the user_domain defaults to "default" when not specified.
2) even if the admin user is registered in the "default" domain, it may fail due to the wrong endpoint being used in the request to validate the admin's password.
The issues are fixed in 2 separate patches [1] and [2]. However, [2] is introducing a new config option, while [1] alone is also enough to fix the occurrence on some deployments. We are including only [1] in the SRU.
[Test case]
1. Setting up the env
1a. Deploy openstack env with horizon/openstack-dashboard
1b. Set up admin user in a domain not named "default", such as "admin_domain".
1c. Set up any other user, such as demo. Preferably in the admin_domain as well for convenience.
2. Reproduce the bug
2a. Login as admin and navigate to Identity > Users
2b. On the far right-hand side of the demo user row, click the options button and select Change Password
2c. Type in any new password, repeat it below, and type in the admin password. Click Save and you should see a message "The admin password is incorrect"
3. Install package that contains the fixed code
4. Confirm fix
5a. Repeat steps 2a-2c
5b. The password should now be saved successfully
[Regression Potential]
The code is a 1-line change that was tested in upstream CI (without the addition of bug-specific functional tests) from master(Caracal) to stable/zed without any issue captured. No side effects or risks are foreseen. Usage of fix [1] has also been tested manually without fix [2] and still worked.
[Other Info]
None.
[1] https://review.opendev.org/c/openstack/horizon/+/913250
[2] https://review.opendev.org/c/openstack/horizon/+/844574 |
|
2024-04-01 18:18:23 |
Rodrigo Barbieri |
tags |
in-stable-zed keystone |
in-stable-zed keystone sts sts-sru-needed |
|
2024-04-01 19:18:59 |
Rodrigo Barbieri |
attachment added |
|
lp1728031_mantic.debdiff https://bugs.launchpad.net/horizon/+bug/1728031/+attachment/5761110/+files/lp1728031_mantic.debdiff |
|
2024-04-01 19:19:18 |
Rodrigo Barbieri |
attachment added |
|
lp1728031_lunar.debdiff https://bugs.launchpad.net/horizon/+bug/1728031/+attachment/5761111/+files/lp1728031_lunar.debdiff |
|
2024-04-01 19:25:58 |
Rodrigo Barbieri |
attachment added |
|
lp1728031_zed.debdiff https://bugs.launchpad.net/horizon/+bug/1728031/+attachment/5761112/+files/lp1728031_zed.debdiff |
|
2024-04-01 19:27:46 |
Rodrigo Barbieri |
attachment added |
|
lp1728031_jammy.debdiff https://bugs.launchpad.net/horizon/+bug/1728031/+attachment/5761113/+files/lp1728031_jammy.debdiff |
|
2024-04-10 10:17:49 |
Rodrigo Barbieri |
bug task added |
|
ubuntu |
|
2024-04-10 10:18:14 |
Rodrigo Barbieri |
nominated for series |
|
Ubuntu Mantic |
|
2024-04-10 10:18:14 |
Rodrigo Barbieri |
bug task added |
|
Ubuntu Mantic |
|
2024-04-10 10:18:14 |
Rodrigo Barbieri |
nominated for series |
|
Ubuntu Focal |
|
2024-04-10 10:18:14 |
Rodrigo Barbieri |
bug task added |
|
Ubuntu Focal |
|
2024-04-10 10:18:14 |
Rodrigo Barbieri |
nominated for series |
|
Ubuntu Jammy |
|
2024-04-10 10:18:14 |
Rodrigo Barbieri |
bug task added |
|
Ubuntu Jammy |
|
2024-04-10 10:19:55 |
Rodrigo Barbieri |
bug task added |
|
cloud-archive |
|
2024-04-10 10:20:20 |
Rodrigo Barbieri |
nominated for series |
|
cloud-archive/antelope |
|
2024-04-10 10:20:20 |
Rodrigo Barbieri |
bug task added |
|
cloud-archive/antelope |
|
2024-04-10 10:20:20 |
Rodrigo Barbieri |
nominated for series |
|
cloud-archive/yoga |
|
2024-04-10 10:20:20 |
Rodrigo Barbieri |
bug task added |
|
cloud-archive/yoga |
|
2024-04-10 10:20:20 |
Rodrigo Barbieri |
nominated for series |
|
cloud-archive/bobcat |
|
2024-04-10 10:20:20 |
Rodrigo Barbieri |
bug task added |
|
cloud-archive/bobcat |
|
2024-04-10 10:20:20 |
Rodrigo Barbieri |
nominated for series |
|
cloud-archive/zed |
|
2024-04-10 10:20:20 |
Rodrigo Barbieri |
bug task added |
|
cloud-archive/zed |
|
2024-04-10 10:23:01 |
Rodrigo Barbieri |
bug task deleted |
ubuntu |
|
|
2024-04-10 10:23:10 |
Rodrigo Barbieri |
bug task deleted |
Ubuntu Focal |
|
|
2024-04-10 10:23:15 |
Rodrigo Barbieri |
bug task deleted |
Ubuntu Jammy |
|
|
2024-04-10 10:23:20 |
Rodrigo Barbieri |
bug task deleted |
Ubuntu Mantic |
|
|
2024-04-10 10:24:02 |
Rodrigo Barbieri |
bug task added |
|
horizon (Ubuntu) |
|
2024-04-10 10:24:17 |
Rodrigo Barbieri |
nominated for series |
|
Ubuntu Mantic |
|
2024-04-10 10:24:17 |
Rodrigo Barbieri |
bug task added |
|
horizon (Ubuntu Mantic) |
|
2024-04-10 10:24:17 |
Rodrigo Barbieri |
nominated for series |
|
Ubuntu Focal |
|
2024-04-10 10:24:17 |
Rodrigo Barbieri |
bug task added |
|
horizon (Ubuntu Focal) |
|
2024-04-10 10:24:17 |
Rodrigo Barbieri |
nominated for series |
|
Ubuntu Jammy |
|
2024-04-10 10:24:17 |
Rodrigo Barbieri |
bug task added |
|
horizon (Ubuntu Jammy) |
|
2024-04-30 16:34:52 |
OpenStack Infra |
cloud-archive/zed: status |
New |
Fix Released |
|
2024-05-17 19:27:43 |
Mauricio Faria de Oliveira |
nominated for series |
|
Ubuntu Oracular |
|
2024-05-17 19:27:43 |
Mauricio Faria de Oliveira |
bug task added |
|
horizon (Ubuntu Oracular) |
|
2024-05-17 19:27:43 |
Mauricio Faria de Oliveira |
nominated for series |
|
Ubuntu Noble |
|
2024-05-17 19:27:43 |
Mauricio Faria de Oliveira |
bug task added |
|
horizon (Ubuntu Noble) |
|
2024-05-20 12:45:51 |
Rodrigo Barbieri |
description |
After following the security hardening guidelines:
https://docs.openstack.org/security-guide/dashboard/checklist.html#check-dashboard-09-is-enforce-password-check-set-to-true
After this check is enabled
Check-Dashboard-09: Is ENFORCE_PASSWORD_CHECK set to True
The user password cannot be changed.
The form submission fails by displaying that admin password is incorrect.
The reason for this is in keystone.py in openstack_dashboard/api/keystone.py
user_verify_admin_password method uses internal url to communicate with the keystone.
line 500:
endpoint = _get_endpoint_url(request, 'internalURL')
This should be changed to adminURL
===============
SRU Description
===============
[Impact]
Admins cannot change user's password as it gives an error saying that the admin's password is incorrect, despite being correct. There are 2 causes:
1) due to the lack of user_domain being specified when validating the admin's password, it will always fail if the admin is not registered in the "default" domain, because the user_domain defaults to "default" when not specified.
2) even if the admin user is registered in the "default" domain, it may fail due to the wrong endpoint being used in the request to validate the admin's password.
The issues are fixed in 2 separate patches [1] and [2]. However, [2] is introducing a new config option, while [1] alone is also enough to fix the occurrence on some deployments. We are including only [1] in the SRU.
[Test case]
1. Setting up the env
1a. Deploy openstack env with horizon/openstack-dashboard
1b. Set up admin user in a domain not named "default", such as "admin_domain".
1c. Set up any other user, such as demo. Preferably in the admin_domain as well for convenience.
2. Reproduce the bug
2a. Login as admin and navigate to Identity > Users
2b. On the far right-hand side of the demo user row, click the options button and select Change Password
2c. Type in any new password, repeat it below, and type in the admin password. Click Save and you should see a message "The admin password is incorrect"
3. Install package that contains the fixed code
4. Confirm fix
5a. Repeat steps 2a-2c
5b. The password should now be saved successfully
[Regression Potential]
The code is a 1-line change that was tested in upstream CI (without the addition of bug-specific functional tests) from master(Caracal) to stable/zed without any issue captured. No side effects or risks are foreseen. Usage of fix [1] has also been tested manually without fix [2] and still worked.
[Other Info]
None.
[1] https://review.opendev.org/c/openstack/horizon/+/913250
[2] https://review.opendev.org/c/openstack/horizon/+/844574 |
After following the security hardening guidelines:
https://docs.openstack.org/security-guide/dashboard/checklist.html#check-dashboard-09-is-enforce-password-check-set-to-true
After this check is enabled
Check-Dashboard-09: Is ENFORCE_PASSWORD_CHECK set to True
The user password cannot be changed.
The form submission fails by displaying that admin password is incorrect.
The reason for this is in keystone.py in openstack_dashboard/api/keystone.py
user_verify_admin_password method uses internal url to communicate with the keystone.
line 500:
endpoint = _get_endpoint_url(request, 'internalURL')
This should be changed to adminURL
===============
SRU Description
===============
[Impact]
Admins cannot change user's password as it gives an error saying that the admin's password is incorrect, despite being correct. There are 2 causes:
1) due to the lack of user_domain being specified when validating the admin's password, it will always fail if the admin is not registered in the "default" domain, because the user_domain defaults to "default" when not specified.
2) even if the admin user is registered in the "default" domain, it may fail due to the wrong endpoint being used in the request to validate the admin's password.
The issues are fixed in 2 separate patches [1] and [2]. However, [2] is introducing a new config option, while [1] alone is also enough to fix the occurrence on some deployments. We are including only [1] in the SRU.
[Test case]
1. Setting up the env, ensure ENFORCE_PASSWORD_CHECK is set to True
1a. Deploy openstack env with horizon/openstack-dashboard
1b. Set up admin user in a domain not named "default", such as "admin_domain".
1c. Set up any other user, such as demo. Preferably in the admin_domain as well for convenience.
2. Reproduce the bug
2a. Login as admin and navigate to Identity > Users
2b. On the far right-hand side of the demo user row, click the options button and select Change Password
2c. Type in any new password, repeat it below, and type in the admin password. Click Save and you should see a message "The admin password is incorrect"
3. Install package that contains the fixed code
4. Confirm fix
5a. Repeat steps 2a-2c
5b. The password should now be saved successfully
[Regression Potential]
The code is a 1-line change that was tested in upstream CI (without the addition of bug-specific functional tests) from master(Caracal) to stable/zed without any issue captured. No side effects or risks are foreseen. Usage of fix [1] has also been tested manually without fix [2] and still worked.
[Other Info]
None.
[1] https://review.opendev.org/c/openstack/horizon/+/913250
[2] https://review.opendev.org/c/openstack/horizon/+/844574 |
|
2024-05-20 12:55:08 |
Rodrigo Barbieri |
description |
After following the security hardening guidelines:
https://docs.openstack.org/security-guide/dashboard/checklist.html#check-dashboard-09-is-enforce-password-check-set-to-true
After this check is enabled
Check-Dashboard-09: Is ENFORCE_PASSWORD_CHECK set to True
The user password cannot be changed.
The form submission fails by displaying that admin password is incorrect.
The reason for this is in keystone.py in openstack_dashboard/api/keystone.py
user_verify_admin_password method uses internal url to communicate with the keystone.
line 500:
endpoint = _get_endpoint_url(request, 'internalURL')
This should be changed to adminURL
===============
SRU Description
===============
[Impact]
Admins cannot change user's password as it gives an error saying that the admin's password is incorrect, despite being correct. There are 2 causes:
1) due to the lack of user_domain being specified when validating the admin's password, it will always fail if the admin is not registered in the "default" domain, because the user_domain defaults to "default" when not specified.
2) even if the admin user is registered in the "default" domain, it may fail due to the wrong endpoint being used in the request to validate the admin's password.
The issues are fixed in 2 separate patches [1] and [2]. However, [2] is introducing a new config option, while [1] alone is also enough to fix the occurrence on some deployments. We are including only [1] in the SRU.
[Test case]
1. Setting up the env, ensure ENFORCE_PASSWORD_CHECK is set to True
1a. Deploy openstack env with horizon/openstack-dashboard
1b. Set up admin user in a domain not named "default", such as "admin_domain".
1c. Set up any other user, such as demo. Preferably in the admin_domain as well for convenience.
2. Reproduce the bug
2a. Login as admin and navigate to Identity > Users
2b. On the far right-hand side of the demo user row, click the options button and select Change Password
2c. Type in any new password, repeat it below, and type in the admin password. Click Save and you should see a message "The admin password is incorrect"
3. Install package that contains the fixed code
4. Confirm fix
5a. Repeat steps 2a-2c
5b. The password should now be saved successfully
[Regression Potential]
The code is a 1-line change that was tested in upstream CI (without the addition of bug-specific functional tests) from master(Caracal) to stable/zed without any issue captured. No side effects or risks are foreseen. Usage of fix [1] has also been tested manually without fix [2] and still worked.
[Other Info]
None.
[1] https://review.opendev.org/c/openstack/horizon/+/913250
[2] https://review.opendev.org/c/openstack/horizon/+/844574 |
After following the security hardening guidelines:
https://docs.openstack.org/security-guide/dashboard/checklist.html#check-dashboard-09-is-enforce-password-check-set-to-true
After this check is enabled
Check-Dashboard-09: Is ENFORCE_PASSWORD_CHECK set to True
The user password cannot be changed.
The form submission fails by displaying that admin password is incorrect.
The reason for this is in keystone.py in openstack_dashboard/api/keystone.py
user_verify_admin_password method uses internal url to communicate with the keystone.
line 500:
endpoint = _get_endpoint_url(request, 'internalURL')
This should be changed to adminURL
===============
SRU Description
===============
[Impact]
Admins cannot change user's password as it gives an error saying that the admin's password is incorrect, despite being correct. There are 2 causes:
1) due to the lack of user_domain being specified when validating the admin's password, it will always fail if the admin is not registered in the "default" domain, because the user_domain defaults to "default" when not specified.
2) even if the admin user is registered in the "default" domain, it may fail due to the wrong endpoint being used in the request to validate the admin's password.
The issues are fixed in 2 separate patches [1] and [2]. However, [2] is introducing a new config option, while [1] alone is also enough to fix the occurrence on some deployments. We are including only [1] in the SRU.
[Test case]
1. Setting up the env, ensure ENFORCE_PASSWORD_CHECK is set to True
1a. Deploy openstack env with horizon/openstack-dashboard
1b. Set up admin user in a domain not named "default", such as "admin_domain".
1c. Set up any other user, such as demo. Preferably in the admin_domain as well for convenience.
2. Reproduce the bug
2a. Login as admin and navigate to Identity > Users
2b. On the far right-hand side of the demo user row, click the options button and select Change Password
2c. Type in any new password, repeat it below, and type in the admin password. Click Save and you should see a message "The admin password is incorrect"
3. Install package that contains the fixed code
4. Confirm fix
5a. Repeat steps 2a-2c
5b. The password should now be saved successfully
[Where problems could occur]
The code is a 1-line change that was tested in upstream CI (without the addition of bug-specific functional tests) from master(Caracal) to stable/zed without any issue captured. No side effects or risks are foreseen. Usage of fix [1] has also been tested manually without fix [2] and still worked. Worst case scenario, the ability to change password that currently does not work will still not work, because the code change is isolated to the specific function that validates the authenticity of the password used.
[Other Info]
None.
[1] https://review.opendev.org/c/openstack/horizon/+/913250
[2] https://review.opendev.org/c/openstack/horizon/+/844574 |
|