keystone/keystone/models
Colleen Murphy 6c73690f77 Ensure OAuth1 authorized roles are respected
Without this patch, when an OAuth1 request token is authorized with a
limited set of roles, the roles for the access token are ignored when
the user uses it to request a keystone token. This means that user of an
access token can use it to escallate their role assignments beyond what
was authorized by the creator. This patch fixes the issue by ensuring
the token model accounts for an OAuth1-scoped token and correctly
populating the roles for it.

Change-Id: I02f9836fbd4d7e629653977fc341476cfd89859e
Closes-bug: #1873290
2020-05-01 15:48:58 -07:00
..
__init__.py Add the new Keystone TokenModel 2014-07-25 09:50:27 -07:00
receipt_model.py Remove six usage 2020-01-30 06:06:51 +00:00
revoke_model.py Simplify the token provider API 2018-07-13 14:45:56 +00:00
token_model.py Ensure OAuth1 authorized roles are respected 2020-05-01 15:48:58 -07:00