keystone/etc
Lance Bragstad d2cc4c83c0 Consolidate user protection tests
This commit removes user policies from policy.v3cloudsample.json. By
incorporating system-scope, domain-scope, project-scope, and default
roles, we've effectively made these policies obsolete. We can simplify
what we maintain and provide a more consistent, unified view of
default user behavior by removing them.

This commit also adds an important filter to the GET /v3/users API by
making sure the users in the response are filtered properly if the API
was called with a domain-scoped token. This is needed in case domain
configuration isn't setup and short-circuits normalization of the
domain ID, which sometimes comes from the token if it is
domain-scoped.  Regardless of domain configuration being used, we
should protect against cases where data leaks across domains in the
name of security.

Finally, this commit moves a couple of tests from test_v3_protection
to test_users protection tests that ensures we do reasonable filtering
while normalizing domain IDs. The remaining tests from
test_v3_protection have been removed because they are no longer
applicable. These tests were testing an HTTP 403 was returned when a
domain users attempted to filter users for domains they didn't have
authorization on. We don't use this approach consistently in keystone.
Most other places where filtering is implemented, we ignore invalid
filters and instead return an empty list. For domain users attempting
to fish information out of another domain, they will receive an empty
list to be consistent with other parts of the API.

Change-Id: I60b2e2b8af172c369eab0eb2c29f056f5c98ad16
Parial-Bug: 1806762
2019-03-26 12:58:15 +00:00
..
README.txt Remove the sample .conf file 2018-04-18 19:41:37 +00:00
default_catalog.templates Update sample catalog templates 2015-11-04 10:06:45 +08:00
logging.conf.sample Generate apache-style common access logs 2013-01-31 08:16:21 -06:00
policy.v3cloudsample.json Consolidate user protection tests 2019-03-26 12:58:15 +00:00
sso_callback_template.html Add WebSSO support for federation 2015-02-18 23:35:30 -05:00

README.txt

To generate the sample keystone.conf and keystone.policy.yaml files, run the
following commands from the top level of the keystone directory:

    tox -egenconfig
    tox -egenpolicy

For a pre-generated example of the latest files, see:

    https://docs.openstack.org/keystone/latest/configuration/samples/index.html