ironic/releasenotes/notes/mask-configdrive-contents-77fc557d6bc63b2b.yaml
Jim Rollenhagen 82c2a06a97 Clean up release notes for 6.2.0
This is cleaned up as of commit
2351d624ae, and should be sufficient for
the final release. If something else with a release note lands, we can
make any changes there in a later patch.

Change-Id: Ia1ef442f3cc0d64c8a7c6fbb5aaf3f0160f214de
2016-09-21 15:15:52 -04:00

20 lines
1.0 KiB
YAML

---
features:
- Adds a new policy rule that may be used to mask
instance-specific secrets, such as configdrive contents or the temp URL
used to store a configdrive or instance image. This is similar to how
passwords are already masked.
upgrade:
- Instance secrets will now, by default, be masked in API
responses. Operators wishing to expose the configdrive or instance image
to specific users will need to update their policy.json file and grant the
relevant keystone roles.
security:
- Configdrives often contain sensitive information. Users may upload their
own images, which could also contain sensitive information. The Agent
drivers may store this information in a Swift temp URL to allow access from
the Agent ramdisk. These URLs are considered sensitive information because
they grant unauthenticated access to sensitive information. Now,
we only selectively expose this information to privileged
users, whereas previously it was exposed to all authenticated users.