Ocata 시리즈에 대한 릴리즈 노트¶
4.12.0¶
Prelude¶
Fetching expired tokens when using a valid service token is now allowed. This will help with long running operations that must continue between services longer than the original expiry of the token.
새로운 기능¶
AuthToken middleware will now allow fetching an expired token when a valid service token is present. This service token must contain any one of the roles specified in
service_token_roles.
Service tokens are compared against a list of possible roles for validity. This will ensure that only services are submitting tokens as an
X-Service-Token. For backwards compatibility, ifservice_token_roles_requiredis not set, a warning will be emitted. To enforce the check properly, setservice_token_roles_requiredtoTrue. It currently defaults toFalse
업그레이드 노트¶
Set the
service_token_rolesto a list of roles that services may have. The likely list isserviceoradmin. Anyservice_token_rolesmay apply to accept the service token. Ensure service users have one of these roles so interservice communication continues to work correctly. When verified, set theservice_token_roles_requiredflag toTrueto enforce this behaviour. This will become the default setting in future releases.
지원 종료된 기능 노트¶
For backwards compatibility the
service_token_roles_requiredoption in[keystone_authtoken]was added. The option defaults toFalseand has been immediately deprecated. This will allow the current behaviour that service tokens are validated but not checked for roles to continue. The option should be set toTrueas soon as possible. The option will default toTruein a future release.