Bug 2237854

Summary: [rgw][sts]: assume_role_with_web_identity call is failing as validation of signature is failing with invalid padding
Product: [Red Hat Storage] Red Hat Ceph Storage Reporter: Hemanth Sai <hmaheswa>
Component: RGWAssignee: Pritha Srivastava <prsrivas>
Status: CLOSED ERRATA QA Contact: Hemanth Sai <hmaheswa>
Severity: low Docs Contact: Rivka Pollack <rpollack>
Priority: unspecified    
Version: 6.1CC: ceph-eng-bugs, cephqe-warriors, mbenjamin, mkasturi, rpollack, tserlin, vereddy
Target Milestone: ---   
Target Release: 8.1   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: ceph-19.2.1-114.el9cp Doc Type: Bug Fix
Doc Text:
.STS implementation now supports encryption keys larger than 1024 bytes Previously, Ceph Object Gateway STS implementation did not support encryption keys larger than 1024 bytes. With this fix, encryption keys larger than 1024 bytes are supported, as expected.
Story Points: ---
Clone Of:
: 2276931 (view as bug list) Environment:
Last Closed: 2025-06-26 12:09:53 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 2276931, 2267614, 2298578, 2298579, 2351689    

Comment 17 errata-xmlrpc 2025-06-26 12:09:53 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Important: Red Hat Ceph Storage 8.1 security, bug fix, and enhancement updates), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2025:9775