Bug 2237854

Summary: [rgw][sts]: assume_role_with_web_identity call is failing as validation of signature is failing with invalid padding
Product: [Red Hat Storage] Red Hat Ceph Storage Reporter: Hemanth Sai <hmaheswa>
Component: RGWAssignee: Pritha Srivastava <prsrivas>
Status: VERIFIED --- QA Contact: Hemanth Sai <hmaheswa>
Severity: low Docs Contact: Rivka Pollack <rpollack>
Priority: unspecified    
Version: 6.1CC: ceph-eng-bugs, cephqe-warriors, mbenjamin, mkasturi, rpollack, tserlin, vereddy
Target Milestone: ---   
Target Release: 8.1   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: ceph-19.2.1-114.el9cp Doc Type: Bug Fix
Doc Text:
.STS implementation now supports encryption keys larger than 1024 bytes Previously, Ceph Object Gateway STS implementation did not support encryption keys larger than 1024 bytes. With this fix, encryption keys larger than 1024 bytes are supported, as expected.
Story Points: ---
Clone Of:
: 2276931 (view as bug list) Environment:
Last Closed: Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 2276931, 2351689, 2267614, 2298578, 2298579