Commit Graph

222 Commits

Author SHA1 Message Date
Tony Breeds ba2e54dfc6 Retire Packaging Deb project repos
This commit is part of a series to retire the Packaging Deb
project. Step 2 is to remove all content from the project
repos, replacing it with a README notification where to find
ongoing work, and how to recover the repo if needed at some
future point (as in
https://docs.openstack.org/infra/manual/drivers.html#retiring-a-project).

Change-Id: I7ec742e00d4be3aab5316550889bcb04d471a715
2017-09-12 16:19:59 -06:00
Andreas Jaeger 07d757cd90 Replace obsolete vanity openstack.org URLs
Project specific URLs are obsolete, use docs.openstack.org - and use
https for that site.

Change-Id: Iab3d2d2c05fa1bd9d8aa5d01e9511d3234616212
2017-03-28 16:34:52 +02:00
Jenkins b935e49add Merge "Drop MANIFEST.in - it's not needed by pbr" 2017-02-16 13:11:37 +00:00
nizam 6573269e37 Drop MANIFEST.in - it's not needed by pbr
swauth already uses PBR:
setuptools.setup(
    setup_requires=['pbr>=1.8'],
    pbr=True)

This patch removes `MANIFEST.in` file as pbr generates a
sensible manifest from git files and some standard files
and it removes the need for an explicit `MANIFEST.in` file.

Change-Id: Idb30c13b6c75129e07e46cbdd75a4aa92dcb5858
Closes-Bug: #1608980
2016-12-12 16:11:07 +00:00
Ondřej Nový 2d22f804a7 Fixed typo in docstring
Change-Id: Ib635eac542b26573560e714449960176380fa4fa
2016-11-21 16:40:40 +01:00
OpenStack Proposal Bot d4567f2232 Updated from global requirements
Change-Id: I13ad84968015230502aaf12a1f3129a843641e68
2016-11-08 12:57:44 +00:00
Jenkins 15745ad0c6 Merge "Don't ignore logger exception" 2016-11-08 11:34:34 +00:00
Ondřej Nový bb377d790d Don't ignore logger exception
Change-Id: I4a5001bf47b5910c1a543cbe5462758381274eb0
2016-10-29 15:14:29 +02:00
Ondřej Nový 0268a1605a Swift dependency bump to Newton.
Change-Id: I72013fa7a14a402bbe0a581cf4a4a35b3ae81b8f
2016-10-29 15:04:47 +02:00
Ondřej Nový 6f6380ffc8 Added Bandit
Change-Id: I9e3c548c23e2dc891cb7b1409b1df235706bbb17
2016-10-17 21:00:30 +02:00
pawnesh.kumar 9ed7577909 Constraints are ready to be used for tox.ini
Per email[1] from Andreas, we don't need to hack at install_command
any longer.

[1] http://openstack.markmail.org/thread/a4l7tokbotwqvuoh

Change-Id: If6e351a0ca3c60cce807ef4213da16ae7840ccfe
2016-10-10 20:58:49 +05:30
OpenStack Proposal Bot d7ae244d70 Updated from global requirements
Change-Id: Ib1f60f6ff6776a6c0cc0a622b471bf2bf443872c
2016-09-28 17:01:49 +00:00
Ondřej Nový 1752c2773b Release 1.2.0
Change-Id: Ifa251698f41c92a866bd98ac831b4b9359aa3f12
2016-09-22 13:36:42 +02:00
Jenkins d4d52ad8fe Merge "s3: Make s3 support configurable" 2016-08-04 19:37:15 +00:00
Jenkins 9e74e87472 Merge "Don't include salt in HMAC computation" 2016-08-04 19:36:52 +00:00
Prashanth Pai 26cf5aa107 s3: Make s3 support configurable
Amazon S3 compatibility:
Due to security concerns raised, this change makes S3 support tunable
using a config option and is turned off by default.

Change-Id: I077f78946983f5d6b3b725dd6aa3ed178dc5604e
Signed-off-by: Prashanth Pai <ppai@redhat.com>
2016-07-28 23:07:35 +05:30
OpenStack Proposal Bot 01d8e4e51b Updated from global requirements
Change-Id: I4a0c4edc34950a024970abc0ef4e057bf05efd49
2016-06-21 18:06:35 +00:00
Prashanth Pai 5d15daaab6 Don't include salt in HMAC computation
Currently, the input to HMAC function is the entire stored credential
in the format '<salt>$<hash>` but it should rather be only the hashed
key/password.

With this change, validate_creds() method is invoked and only the hash
of the password is used in HMAC computation.

Change-Id: I1a9bbcac6f49c23f3256572f148e55249a59f7ed
Signed-off-by: Prashanth Pai <ppai@redhat.com>
2016-06-07 15:12:27 +05:30
Jenkins 92c55ece9c Merge "Swift dependency bump to Mitaka." 2016-06-01 08:11:15 +00:00
Jenkins a5eef7d4cb Merge "More authtypes validation checks" 2016-06-01 08:00:11 +00:00
Ondřej Nový 2b1e3a7148 Swift dependency bump to Mitaka.
Change-Id: I70a4c3984ebf306c01b9600562a872266e025c1f
2016-05-31 21:39:51 +02:00
Jenkins c6d7ac91c5 Merge "creds validation function" 2016-05-31 18:50:45 +00:00
Ondřej Nový 5c76099efd More authtypes validation checks
Change-Id: I47e139dc100333e2befc362196ede1b238ee0588
2016-05-31 20:42:16 +02:00
Peter Lisák 07d1c0a3d0 creds validation function
Change-Id: Iae92c06b2f24a6ca80d98513cc54f3ca6910afa8
2016-05-31 17:00:48 +02:00
OpenStack Proposal Bot 66358d2ef6 Updated from global requirements
Change-Id: I1a8437255aa82227ba65b768edee0bded51eebaf
2016-05-26 17:06:34 +00:00
Ondřej Nový b548d3dcf7 Add support for setting already hashed password
You can use this for restoring dumped users list from swauth-list
command.
Change-Id: Ia77d7a0b91b2f79999286858e383477a80d7db15
2016-05-24 12:08:38 +02:00
Ondřej Nový 9b27778987 Changed Read the Docs TLD domain to .io
This change was requested from Read the Docs for security reasons

Change-Id: Ide2e42c64bd60b713eedd641f8b91b2dab50a880
2016-04-28 10:14:57 +02:00
OpenStack Proposal Bot 2af101fa42 Updated from global requirements
Change-Id: I0b9803d37df6a65427809eaf3e2cc4b346b73ac9
2016-04-08 13:29:58 +00:00
Jenkins 19f9beeb9d Merge "Fix changing of auth_type in existing deployments" 2016-03-08 10:26:55 +00:00
Jenkins 64eab78a92 Merge "Allow configuring salt manually" 2016-03-08 09:27:13 +00:00
Jenkins ac85c1c96e Merge "Document swift3 compatibility" 2016-03-08 08:45:05 +00:00
Jenkins 63c381d4b2 Merge "Don't pass unicode to hmac.new()" 2016-03-08 08:36:58 +00:00
Prashanth Pai e0b0292a27 Allow configuring salt manually
Older versions of swauth supported manually setting up a salt string in
conf file. This change re-introduces it and makes it a tunable option.

The current behavior of randomly generating salt for every password is
NOT affected with this change.

Change-Id: Ifdf6f806b954e4d41c083eeffa981cd7d0dd50b9
Signed-off-by: Prashanth Pai <ppai@redhat.com>
2016-02-29 11:49:11 +05:30
Prashanth Pai e40938cbb4 Fix changing of auth_type in existing deployments
Problem:
If an existing swauth deployment changes `auth_type` in conf file to a
different one (for example: sha1 to sha512), all attempts to authorize
existing/old users will fail because of change in encoder type.

Fix:
With this change, the credentials match is done using an encoder with
which the password was initially encoded. This allows swauth deployments
to change auth_type and old users will still be able to authorize.

Closes-Bug: 1516980
Change-Id: I8a5c397d0796062f4109c59b6dc61b14d4a97e4b
Signed-off-by: Prashanth Pai <ppai@redhat.com>
2016-02-29 10:30:32 +05:30
Prashanth Pai d7f4c79027 Document swift3 compatibility
Change-Id: I56f879f87a0f0bda6089c509c111dc14f223e5be
Signed-off-by: Prashanth Pai <ppai@redhat.com>
2016-02-26 15:10:42 +05:30
Prashanth Pai 2e4c9f954a Don't pass unicode to hmac.new()
This issue can be hit when swift3 middleware is in the pipeline.

Change-Id: If87a6663efcf31febe4a207b3d7f331b5f79b834
Signed-off-by: Prashanth Pai <ppai@redhat.com>
2016-02-26 12:58:20 +05:30
OpenStack Proposal Bot ac9698ae4d Updated from global requirements
Change-Id: Ibf201c34d253be2b1bf9da29a26b86f5a4485a89
2016-02-19 18:57:12 +00:00
Ondřej Nový f195a5f6ec Fixed E127 and E131 hacking.
E127 continuation line over-indented for visual indent
E131 continuation line unaligned for hanging indent

Change-Id: I19ceb58d8545fb1b585e04b40418271f6ff56a5e
2016-02-14 14:27:33 +01:00
Brian Cline 556aa15697 Use correct content type on JSON responses
Currently, in cases where swauth returns a JSON document as its body,
it does not specify a content type, and swob defaults it to text/html.

This change uses a standard content type of 'application/json' in each
of these instances, and adjusts the tests accordingly.

Closes-Bug: #1545430
APIImpact

Change-Id: I96d343a87f462811bcefb7d402887f8a570fe6bd
2016-02-14 06:41:21 -06:00
Jenkins 669df58783 Merge "Updated from global requirements" 2016-02-12 13:01:54 +00:00
Jenkins 9bac0e79fe Merge "Remove outdated locale" 2016-02-12 10:49:41 +00:00
OpenStack Proposal Bot f8e0758667 Updated from global requirements
Change-Id: Ibe633a74ddff7c7324dc2332cb157878ea364511
2016-02-11 07:45:26 +00:00
Jenkins 030f4d7bbb Merge "Dependency bump to Liberty." 2016-02-08 09:16:44 +00:00
Jenkins 5591c5926e Merge "Added swiftclient dependency, swauth-cleanup-tokens needs it" 2016-02-08 08:53:26 +00:00
Ondřej Nový 2ffc17cc91 Dependency bump to Liberty.
Change-Id: Id57ccf8c34c95a1db882de4ffbd60c2d7e776ca1
2016-02-08 09:50:27 +01:00
Andreas Jaeger 06521ed034 Remove outdated locale
There's no need to have an outdated translation file checked in.
For translations, the full file would be needed which can easily be
generated.

Also update setup.cfg so that - if needed in the future - translations
are used, they follow the OpenStack CI setup as explained in
the spec:
http://specs.openstack.org/openstack-infra/infra-specs/specs/translation_setup.html

Change-Id: I9063faec413f27d6f7312e9403fdf4d14a379d1b
2016-01-31 22:15:29 +01:00
Ondřej Nový b36bc35c88 Added swiftclient dependency, swauth-cleanup-tokens needs it
Change-Id: I3f6656e6996d13fd43b4a4e1f70ea1bc606f9ed1
2016-01-30 19:38:45 +01:00
Ondřej Nový 8cf1c715a0 +log_address in config example
Change-Id: I970c8a4566880ca357a902c1c94e1db724bed000
2016-01-29 20:39:24 +01:00
OpenStack Proposal Bot 41da1e6232 Updated from global requirements
Change-Id: I846bb72e36f5862cd9051817f275319a9d27ef6b
2016-01-28 01:32:19 +00:00
OpenStack Proposal Bot 79983fe302 Updated from global requirements
Change-Id: Ibb11efdca79ab4595420c0a2c5cbb3c46437d9b7
2016-01-24 20:54:46 +00:00