82c2a06a97
This is cleaned up as of commit
2351d624ae
, and should be sufficient for
the final release. If something else with a release note lands, we can
make any changes there in a later patch.
Change-Id: Ia1ef442f3cc0d64c8a7c6fbb5aaf3f0160f214de
20 lines
1.0 KiB
YAML
20 lines
1.0 KiB
YAML
---
|
|
features:
|
|
- Adds a new policy rule that may be used to mask
|
|
instance-specific secrets, such as configdrive contents or the temp URL
|
|
used to store a configdrive or instance image. This is similar to how
|
|
passwords are already masked.
|
|
upgrade:
|
|
- Instance secrets will now, by default, be masked in API
|
|
responses. Operators wishing to expose the configdrive or instance image
|
|
to specific users will need to update their policy.json file and grant the
|
|
relevant keystone roles.
|
|
security:
|
|
- Configdrives often contain sensitive information. Users may upload their
|
|
own images, which could also contain sensitive information. The Agent
|
|
drivers may store this information in a Swift temp URL to allow access from
|
|
the Agent ramdisk. These URLs are considered sensitive information because
|
|
they grant unauthenticated access to sensitive information. Now,
|
|
we only selectively expose this information to privileged
|
|
users, whereas previously it was exposed to all authenticated users.
|