Commit graph

7 commits

Author SHA1 Message Date
Alfredo Moralejo
b7e97f2e9f Use a stronger hash algorithm in the example certs
CentOS Stream 9 does not accetp sha1 as a valid algorithm. This patch is
fixing the script used to generate the example certs and updating them.

Closes-Bug: #1963925
Change-Id: I6f1eb40bfd3d5adbf47ccd07fe06e2942e67644f
2022-03-07 16:37:36 +01:00
Dolph Mathews
2fdbcbd06c Set example timestamps to 2038-01-18T21:14:07Z
This timestamp is the last possible moment that can be represented on
32-bit systems as an integer.

As a consequence of revising the JSON examples, the corresponding PEM
files must be re-generated as well.

Change-Id: Ic6014c08b4545db036605beef1e6a8829ed347c4
Related-Bug: 1190054
Related-Bug: 1225084
2013-09-13 11:43:35 -05:00
Dirk Mueller
3f1415026b Raise key length defaults
Extend RSA keylength to 2048 bits by default,
as the previous default of 1024 bit is considered
weak since 12/31/2010.

Also unify the message_md to the openssl builtin
default.

Fixes bug 1103002

Change-Id: I619fc32b62beab4458ee6f21bf8dc7499fe400d7
2013-07-09 17:42:50 +02:00
Adam Young
8fe7a822d3 Check Expiry
Explicitly checks the expiry on the tokens, and rejects tokens that
have expired

had to regenerate the sample data for the tokens as they all had been
generated with values that are now expired.

bug 1179615

Change-Id: Ie06500d446f55fd0ad67ea540c92d8cfc57483f4
2013-05-28 16:47:54 +02:00
Chmouel Boudjnah
3ce7017c7a Fix v3 with UUID and memcache expiring.
- Regenerate tokens to change expires in expires_at.

Change-Id: Iaa62dca50d34a228e4850b59d263b807c5ee3549
2013-04-03 11:45:44 +02:00
Henry Nash
d782a99847 Fix auth-token middleware to understand v3 tokens
Now that the Identity server supports v3 tokens, the auth_token
middleware should permit the in-line validation of such a token.  This
essentially means just setting any new environment items
that correspond to the new attributes that may be in a v3 token (such
as domains), as well as allowing for the slight format differences.

Most of the work in this change is actually in the unit tests, where
it was important to try and enable the existing tests to be run against
an auth_token middleware configured for both v2 and v3.  This meant
restructing the test class so that the token format is separated
from the individual tests and is initialized by the class Setup().

Since there are some new signed token formats included in this testing,
a new set of the signed tokens was generated.

Fixes Bug #1132390

Change-Id: I78b232d30f5310c39089fbbc8e56c23df291f89f
2013-03-11 11:50:09 +00:00
Henry Nash
7920899af1 Add auth-token code to keystoneclient, along with supporting files
This step in the process duplicates the auth-token code to keystoneclient but,
for the moment, leaves a copy in its origional location in keystone.
Testing for auth-token is also copied across, as is the cms support file.

Although no other project will yet pick up the code here in the client, since
the paste.ini files haev not yet been updated, it would work if anyone
did reference it.

Once the client code is in, the next step is to update all the other
project paste files, and then finally retire the code from keystone.

Change-Id: I88853a373d406020d54b61cba5a5e887380e3b3e
2012-11-12 19:40:21 +00:00