keystone/keystone/tests
Colleen Murphy 81fd509350 Do not log token string
Without this patch, if a token fails to decrypt, the token string is
logged at the WARNING level, which means the majority of deployments
will log it. Since keystone tokens are bearer tokens, logging it to disk
is a security risk. Of course the reason for the log is that the token
is invalid, and so it can't be used as-is to gain access, but the token
might be *almost* valid: for example, it might be a token that the user
had intended to use on a different keystone instance, or it might be a
truncated token such that the last few characters could be guessed.

Since the encrypted token is nearly useless to an operator for
debugging, stop logging the token string and just emit a generic
warning.

Change-Id: Id05b506327d22e42b2da3b1a38d8237cbf7786a8
2018-08-16 21:29:11 +02:00
..
common Add application credential auth plugin 2018-01-27 12:00:19 +01:00
functional Update keystone functional tests 2018-04-18 21:04:59 +00:00
hacking Remove duplicated hacking rule 2017-06-28 07:48:03 +00:00
unit Do not log token string 2018-08-16 21:29:11 +02:00
__init__.py Move existing tests to unit 2015-02-13 15:54:29 -06:00