Bug 1566611
Summary: | Suboptimal wait_condition_handle password generator | |||
---|---|---|---|---|
Product: | Red Hat OpenStack | Reporter: | Zane Bitter <zbitter> | |
Component: | openstack-heat | Assignee: | Zane Bitter <zbitter> | |
Status: | CLOSED ERRATA | QA Contact: | Ronnie Rasouli <rrasouli> | |
Severity: | high | Docs Contact: | ||
Priority: | high | |||
Version: | 12.0 (Pike) | CC: | adahms, astupnik, jamsmith, mburns, ramishra, rhel-osp-director-maint, rrasouli, sbaker, shardy, slinaber, srevivo, therve, zbitter | |
Target Milestone: | z3 | Keywords: | Triaged, ZStream | |
Target Release: | 12.0 (Pike) | |||
Hardware: | All | |||
OS: | All | |||
Whiteboard: | ||||
Fixed In Version: | openstack-heat-9.0.4-1.el7ost | Doc Type: | Enhancement | |
Doc Text: |
Keystone user passwords generated by Heat resources such as WaitConditionHandle now meet more stringent regular expression-based password complexity requirements. The new passwords are 32-character random strings containing at least one uppercase and one lowercase letter, one digit, and one of the characters '!@#%^&*'. These passwords should pass the standard of virtually any regular expression-based password validation.
Previously, generated passwords took the form of 32 hexadecimal digits, and thus never contained uppercase letters or special characters.
|
Story Points: | --- | |
Clone Of: | 1566607 | |||
: | 1566612 (view as bug list) | Environment: | ||
Last Closed: | 2018-08-20 12:44:10 UTC | Type: | Bug | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | --- | Target Upstream Version: | ||
Embargoed: | ||||
Bug Depends On: | 1556946, 1566607 | |||
Bug Blocks: | 1566612 |
Description
Zane Bitter
2018-04-12 15:29:00 UTC
Patch is merged in upstream stable/pike branch. tested wait condition and keystone regex compliance policy. password_regex = ^(?=.*\d)(?=.*[a-z])(?=.*[A-Z])(?=.*[!@#$%^&*]).{7,}$ integration tests passed Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2018:2520 |