ironic/ironic/cmd
Julia Kreger bb3b2349f9 Pre-shared agent token
In order to improve security of the lookup/heartbeat
endpoints, we need to generate and provide temporary tokens
to the initial callers, if supported, to facilitate the
verification of commands.

This is the first patch in an entire series which utimately
enables the endpoint communication to be better secured.

The idea behind this started in private story 2006634 which
is locked as a security related filing covering multiple
aspects of ironic/ironic-python-agent interaction centered
around miss-use and generally exposed endpoints. That story
will remain marked as a private bug because it has several
different items covered, some of which did not prove to be
actually exploitable, but spawned stories 2006777, 2006773,
2007025, and is ultimately similar to Story 1526748.

Operationally this is a minimally invasive security
enhancement to lay the foundation to harden interactions
with the agent. This will take place over a series of
patches to both Ironic and the Ironic-Python-Agent.

Also see "Security of /heartbeat and /lookup endpoints"
in http://lists.openstack.org/pipermail/openstack-discuss/2019-November/010789.html

Story: 2007025
Task: 37818

Change-Id: I0118007cac3d6548e9d41c5e615a819150b6ef1a
2020-02-20 14:33:32 -08:00
..
__init__.py Resolve pep8 E402 errors and no longer ignore E402 2018-04-10 17:34:04 -07:00
api.py Fix E305 Errors 2018-05-09 06:12:57 -07:00
conductor.py Pre-shared agent token 2020-02-20 14:33:32 -08:00
dbsync.py Remove old online migrations and new models 2019-09-27 13:23:03 +00:00
status.py Add check for object versions 2019-02-20 17:24:42 +00:00