Merge lp:~gandelman-a/ubuntu/quantal/keystone/2012.2.1 into lp:~openstack-ubuntu-testing/keystone/folsom

Proposed by Adam Gandelman
Status: Merged
Approved by: Chuck Short
Approved revision: no longer in the source branch.
Merge reported by: Adam Gandelman
Merged at revision: not available
Proposed branch: lp:~gandelman-a/ubuntu/quantal/keystone/2012.2.1
Merge into: lp:~openstack-ubuntu-testing/keystone/folsom
Diff against target: 60 lines (+37/-2)
1 file modified
debian/changelog (+37/-2)
To merge this branch: bzr merge lp:~gandelman-a/ubuntu/quantal/keystone/2012.2.1
Reviewer Review Type Date Requested Status
Openstack Ubuntu Testers Pending
Review via email: mp+137352@code.launchpad.net
To post a comment you must log in.
155. By Adam Gandelman

Merge 2012.2.1 changes.

Preview Diff

[H/L] Next/Prev Comment, [J/K] Next/Prev File, [N/P] Next/Prev Hunk
1=== modified file 'debian/changelog'
2--- debian/changelog 2012-10-31 16:34:40 +0000
3+++ debian/changelog 2012-12-01 04:25:22 +0000
4@@ -1,11 +1,47 @@
5-keystone (2012.2-0ubuntu1.1) UNRELEASED; urgency=low
6+keystone (2012.2.1-0ubuntu1) UNRELEASED; urgency=low
7
8 * Ubuntu updates:
9 - debian/control: Ensure keystoneclient is upgraded with keystone,
10 require python-keystoneclient >= 1:0.1.3. (LP: #1073273)
11+ - Dropped patches, applied upsteram:
12+ - debian/patches/CVE-2012-5563.patch
13+ - debian/patches/CVE-2012-5571.patch
14+ - debian/patches/fix-ssl-tests-lp1068851.patch
15+ * Resynchronize with stable/folsom (7869c3ec) (LP: #1085255):
16+ - [f9d4766] token expires time incorrect for auth by one token
17+ (LP: #1079216)
18+ - [80d63c8] keystone throws error when removing user from tenant.
19+ (LP: #1078497)
20+ - [37308dd] Removing user from a tenant isn't invalidating user access to
21+ tenant (LP: #1064914)
22+ - [bec9b68] Redo part of bp/sql-identiy-pam undone by bug 968519
23+ (LP: #1068674)
24+ - [ee645e6] Jenkins jobs fail because of incompatibility between sqlalchemy-
25+ migrate and the newest sqlalchemy-0.8.0b1 (LP: #1073569)
26+ - [094c494] Non PKI Tokens longer than 32 characters can never be valid
27+ (LP: #1060389)
28+ - [3cd343b] Openssl tests rely on expired certificate (LP: #1068851)
29+ - [2f9807e] Set defaultbranch in .gitreview to stable/folsom
30
31 -- Adam Gandelman <adamg@canonical.com> Wed, 31 Oct 2012 13:43:11 +0100
32
33+keystone (2012.2-0ubuntu1.2) quantal-security; urgency=low
34+
35+ * SECURITY UPDATE: fix for EC2-style credentials invalidation
36+ - debian/patches/CVE-2012-5571.patch: adjust contrib/ec2/core.py to verify
37+ that the user is in at least one valid role for the tenant
38+ - CVE-2012-5571
39+ - LP: #1064914
40+ * debian/patches/fix-ssl-tests-lp1068851.patch: update certificates for
41+ SSL tests
42+ * SECURITY UPDATE: fix for token expiration
43+ - debian/patches/CVE-2012-5563.patch: ensure token expiration is
44+ maintained
45+ - CVE-2012-5563
46+ - LP: #1079216
47+
48+ -- Jamie Strandboge <jamie@ubuntu.com> Wed, 28 Nov 2012 11:29:47 -0600
49+
50 keystone (2012.2-0ubuntu1) quantal; urgency=low
51
52 * New upstream release.
53@@ -281,7 +317,6 @@
54
55 -- Chuck Short <zulcss@ubuntu.com> Fri, 16 Dec 2011 15:38:05 -0500
56
57-
58 keystone (2012.1~e2~20111209.1405-0ubuntu1) precise; urgency=low
59
60 * New upstream release.

Subscribers

People subscribed via source and target branches