keystone/keystone/token
Colleen Murphy 81fd509350 Do not log token string
Without this patch, if a token fails to decrypt, the token string is
logged at the WARNING level, which means the majority of deployments
will log it. Since keystone tokens are bearer tokens, logging it to disk
is a security risk. Of course the reason for the log is that the token
is invalid, and so it can't be used as-is to gain access, but the token
might be *almost* valid: for example, it might be a token that the user
had intended to use on a different keystone instance, or it might be a
truncated token such that the last few characters could be guessed.

Since the encrypted token is nearly useless to an operator for
debugging, stop logging the token string and just emit a generic
warning.

Change-Id: Id05b506327d22e42b2da3b1a38d8237cbf7786a8
2018-08-16 21:29:11 +02:00
..
providers Cleanup keystone.token.providers.common 2018-07-13 14:49:07 +00:00
__init__.py Remove the sql token driver and uuid token provider 2018-02-12 17:32:47 +00:00
provider.py Address FIXMEs for listing revoked tokens 2018-08-01 11:46:10 -07:00
token_formatters.py Do not log token string 2018-08-16 21:29:11 +02:00