The password dumping is actually in oslo apiclient. So that too should
be scrubbed, but it has to happen in oslo first.

So mostly just because I found it here.

        -Sean

On 06/12/2014 10:47 PM, Xuhan Peng wrote:
> Sorry to interrupt this discussion.
> 
> Sean, 
> 
> Since I'm working the neutron client code change, by looking at your
> code change to nova client, looks like only X-Auth-Token is taken care
> of in http_log_req. There is also password in header and token id in
> response. Any particular reason that they are not being taken care of?
> 
> Thanks, 
> Xu Han
> —
> Sent from Mailbox <https://www.dropbox.com/mailbox> for iPhone
> 
> 
> On Fri, Jun 13, 2014 at 8:47 AM, Gordon Chung <chu...@ca.ibm.com
> <mailto:chu...@ca.ibm.com>> wrote:
> 
>     >I'm hoping we can just ACK this approach, and get folks to start moving
>     > patches through the clients to clean this all up.
> 
>     just an fyi, in pyCADF, we obfuscate tokens similar to how credit
>     cards are handled: by capturing a percentage of leading and trailing
>     characters and substituting the middle ie. "4724 xxxxxxxx 8478".
>     whatever we decide here, i'm all for having a consistent way of
>     masking and minimising tokens in OpenStack.
> 
>     cheers,
>     gordon chung
>     openstack, ibm software standards 
> 
> 
> 
> 
> _______________________________________________
> OpenStack-dev mailing list
> OpenStack-dev@lists.openstack.org
> http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev
> 


-- 
Sean Dague
http://dague.net

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
OpenStack-dev mailing list
OpenStack-dev@lists.openstack.org
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev

Reply via email to