Bug 2276931
Summary: | [rgw][sts]: assume_role_with_web_identity call is failing as validation of signature is failing with invalid padding | ||
---|---|---|---|
Product: | [Red Hat Storage] Red Hat Ceph Storage | Reporter: | Matt Benjamin (redhat) <mbenjamin> |
Component: | RGW | Assignee: | Pritha Srivastava <prsrivas> |
Status: | ASSIGNED --- | QA Contact: | Hemanth Sai <hmaheswa> |
Severity: | low | Docs Contact: | |
Priority: | unspecified | ||
Version: | 6.1 | CC: | ceph-eng-bugs, cephqe-warriors, hmaheswa, kdreyer, mbenjamin, mkasturi, prsrivas, tserlin, vereddy |
Target Milestone: | --- | ||
Target Release: | 9.0 | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | ceph-18.2.1-151.el9cp | Doc Type: | Known Issue |
Doc Text: |
.Current RGW STS implementation does not support encryption keys larger than 1024 bytes
The current RGW STS implementation does not support encryption keys larger than 1024 bytes.
As a workaround, in `Keycloak: realm settings -> keys`, edit the ‘rsa-enc-generated’ provider to have priority 90 rather than 100 and `keySize` as 1024 instead of 2048.
|
Story Points: | --- |
Clone Of: | 2237854 | Environment: | |
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2237854 | ||
Bug Blocks: | 2267614, 2298578, 2298579 |
Description
Matt Benjamin (redhat)
2024-04-24 16:23:29 UTC
|