Bug 2324153
| Summary: | [8.0][rgw][sts] with incorrect thumbprints in the OIDC provider, sts aswi request is successful bypassing thumbprint verification | |||
|---|---|---|---|---|
| Product: | [Red Hat Storage] Red Hat Ceph Storage | Reporter: | Hemanth Sai <hmaheswa> | |
| Component: | RGW | Assignee: | Pritha Srivastava <prsrivas> | |
| Status: | CLOSED ERRATA | QA Contact: | Hemanth Sai <hmaheswa> | |
| Severity: | high | Docs Contact: | ||
| Priority: | unspecified | |||
| Version: | 8.0 | CC: | bhkaur, ceph-eng-bugs, cephqe-warriors, flucifre, mbenjamin, mkasturi, prsrivas, tserlin | |
| Target Milestone: | --- | |||
| Target Release: | 8.0z2 | |||
| Hardware: | Unspecified | |||
| OS: | Unspecified | |||
| Whiteboard: | ||||
| Fixed In Version: | ceph-19.2.0-89.el9cp | Doc Type: | Bug Fix | |
| Doc Text: |
.AssumeRoleWithWebIdentity operations now fails as expected when incorrect thumbprints are added
Previously, due to a boolean flag being incorrectly set in the code, the AssumeRoleWithWebIdentity operation succeeded even when an incorrect thumbprint was registered in the CreateOIDCProvider call. As a result, AssumeRoleWithWebIdentity was able to succeed when it should have failed.
With this fix, the boolean flag is not set when no correct thumbprints are found registered in the CreateOIDCProvider call. As a result, if the end user does not provide a correct thumbprint in the CreateOIDCProvider call, the AssumeRoleWithWebIdentity operation now fails as expected.
|
Story Points: | --- | |
| Clone Of: | ||||
| : | 2324227 (view as bug list) | Environment: | ||
| Last Closed: | 2025-03-06 14:22:56 UTC | Type: | Bug | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Embargoed: | ||||
| Bug Depends On: | ||||
| Bug Blocks: | 2324227 | |||
|
Description
Hemanth Sai
2024-11-06 10:59:08 UTC
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Red Hat Ceph Storage 8.0 security, bug fixes, and enhancement updates), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2025:2457 |