ironic/ironic
Julia Kreger c2ba869040 Redfish: Consider password part of the session cache
Previously, when a password change occured in ironic,
the session would not be invalidated, and this, in theory,
could lead to all sorts of issues with the old password
still being re-used for authentication.

In a large environment where credentials for BMCs may not
be centralized, this can quickly lead to repeated account
lockout experiences for the BMC service account.

Anyhow, now we consider it in tracking the sessions, so
when the saved password is changed, a new session is
established, and the old session is eventually expired out
of the cache.

Change-Id: I49e1907b89a9096aa043424b205e7bd390ed1a2f
2022-08-25 11:07:54 -07:00
..
api Suppress Chassis Not Found on API Operation 2022-08-02 02:56:07 +00:00
cmd Start API after conductor is started in the combined executable 2022-03-24 18:07:51 +01:00
common Merge "[iRMC] Add SNMPv3 authentication functionality" 2022-07-22 00:54:38 +00:00
conductor Merge "Allocation candidates prefer matching name" 2022-07-15 02:23:51 +00:00
conf Merge "[iRMC] Add SNMPv3 authentication functionality" 2022-07-22 00:54:38 +00:00
db Trivial: Remove prints in db api layer code 2022-04-29 13:49:14 -07:00
dhcp Add dhcp options for each ip_version once 2022-01-07 16:33:05 +01:00
drivers Redfish: Consider password part of the session cache 2022-08-25 11:07:54 -07:00
hacking Fix the remaining hacking issues 2020-03-31 13:40:00 +00:00
objects Explicit parameter to distinguish partition/whole-disk images 2022-01-28 19:13:13 +01:00
tests Redfish: Consider password part of the session cache 2022-08-25 11:07:54 -07:00
__init__.py Move eventlet monkey patch code 2017-03-02 13:48:18 +02:00
version.py