summaryrefslogtreecommitdiffstats
path: root/keystone/config.py
diff options
context:
space:
mode:
authorDan Prince <dprince@redhat.com>2013-01-10 13:25:18 -0500
committerDan Prince <dprince@redhat.com>2013-02-05 09:20:57 -0500
commit8ec247bf61be0e487332d5d891246d2b7b606989 (patch)
treeab9ac2196007c3d87f2e0a6b1669a18c1c908314 /keystone/config.py
parentb3d667ab3bac874eda68c0ea0280f9e506f854aa (diff)
downloadkeystone-8ec247bf61be0e487332d5d891246d2b7b606989.tar.gz
keystone-8ec247bf61be0e487332d5d891246d2b7b606989.tar.xz
keystone-8ec247bf61be0e487332d5d891246d2b7b606989.zip
Add size validations to token controller.
Updates token controller so that it explicitly checks the max size of userId, username, tenantId, tenantname, token, and password before continuing with a request. Previously, when used with the SQL keystone backend an unauthenticated user could send in *really* large requests which would ultimately log large SQL exceptions and could thus fill up keystone logs on the disk. Change-Id: Ie7e3a958829f99f080e66582bdf558cded70248c
Diffstat (limited to 'keystone/config.py')
-rw-r--r--keystone/config.py3
1 files changed, 3 insertions, 0 deletions
diff --git a/keystone/config.py b/keystone/config.py
index e7f31394..40af2fd6 100644
--- a/keystone/config.py
+++ b/keystone/config.py
@@ -141,6 +141,9 @@ register_str('policy_file', default='policy.json')
register_str('policy_default_rule', default=None)
#default max request size is 112k
register_int('max_request_body_size', default=114688)
+register_int('max_param_size', default=64)
+# we allow tokens to be a bit larger to accomidate PKI
+register_int('max_token_size', default=8192)
# identity
register_str('default_domain_id', group='identity', default='default')