*** This bug is a duplicate of bug 1435530 ***
    https://bugs.launchpad.net/bugs/1435530

** This bug is no longer a duplicate of bug 1434034
   Disabling users & groups may not invalidate previously-issued tokens
** This bug has been marked a duplicate of bug 1435530
   keystonemiddleware without TRL checking and default cache config can allow 
access after token revocation

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1432892

Title:
  When validating a trust scoped token, raise 404 instead of 403 if
  trustor is disabled

Status in Keystone:
  Triaged

Bug description:
  Any validation error that occurs when checking a token should be
  caught and re-raised as 404 NotFound (TokenNotFound), as we currently
  do for v2 tokens [1].

  For example, when validating a trust scoped token with disabled
  trustor, a 403 Forbidden exception with message 'Trustor is disabled.'
  is raised. This exception is appropriate when issuing tokens, but not
  when validating them.

  [1] 
  
https://github.com/openstack/keystone/blob/25d742ada803d8501e7c004242a625efd07fcaf6/keystone/token/providers/common.py#L618-L620

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1432892/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to     : [email protected]
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp

Reply via email to