Merge "Remove policy for self-service password changes"

This commit is contained in:
Jenkins 2017-08-04 16:54:26 +00:00 committed by Gerrit Code Review
commit 4e98623571
4 changed files with 20 additions and 9 deletions

View File

@ -43,7 +43,6 @@ identity:list_users GET /v3/users
identity:create_user POST /v3/users
identity:update_user PATCH /v3/users/{user_id}
identity:delete_user DELETE /v3/users/{user_id}
identity:change_password POST /v3/users/{user_id}/password
identity:get_group GET /v3/groups/{group_id}
identity:list_groups GET /v3/groups

View File

@ -128,7 +128,6 @@
"identity:update_policy": "rule:cloud_admin",
"identity:delete_policy": "rule:cloud_admin",
"identity:change_password": "rule:owner",
"identity:check_token": "rule:admin_or_owner",
"identity:validate_token": "rule:service_admin_or_owner",
"identity:validate_token_head": "rule:service_or_admin",

View File

@ -62,13 +62,7 @@ user_policies = [
check_str=base.RULE_ADMIN_REQUIRED,
description='Delete a user.',
operations=[{'path': '/v3/users/{user_id}',
'method': 'DELETE'}]),
policy.DocumentedRuleDefault(
name=base.IDENTITY % 'change_password',
check_str=base.RULE_ADMIN_OR_OWNER,
description='Self-service password change.',
operations=[{'path': '/v3/users/{user_id}/password',
'method': 'POST'}])
'method': 'DELETE'}])
]

View File

@ -0,0 +1,19 @@
---
upgrade:
- |
[`bug 1705485 <https://bugs.launchpad.net/keystone/+bug/1705485>`_]
The `change_password` protection policy can be removed from file-based
policies. This policy is no longer used to protect the self-service
password change API since the logic was moved into code. Note that the
administrative password reset functionality is still protected via policy
on the `update_user` API.
fixes:
- |
[`bug 1705485 <https://bugs.launchpad.net/keystone/+bug/1705485>`_]
A `previous change <https://review.openstack.org/#/c/404022/>`_ removed
policy from the self-service password API. Since a user is required to
authenticate to change their password, protection via policy didn't
necessarily make sense. This change removes the default policy from code,
since it is no longer required or used by the service. Note that
administrative password resets for users are still protected via policy
through a separate endpoint.