Bug 2276931
| Summary: | [rgw][sts]: assume_role_with_web_identity call is failing as validation of signature is failing with invalid padding | ||
|---|---|---|---|
| Product: | [Red Hat Storage] Red Hat Ceph Storage | Reporter: | Matt Benjamin (redhat) <mbenjamin> |
| Component: | RGW | Assignee: | Pritha Srivastava <prsrivas> |
| Status: | CLOSED ERRATA | QA Contact: | Hemanth Sai <hmaheswa> |
| Severity: | low | Docs Contact: | Rivka Pollack <rpollack> |
| Priority: | unspecified | ||
| Version: | 6.1 | CC: | ceph-eng-bugs, cephqe-warriors, hmaheswa, kdreyer, mbenjamin, mkasturi, prsrivas, rpollack, tserlin, vereddy |
| Target Milestone: | --- | ||
| Target Release: | 9.0 | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | ceph-20.1.0-26 | Doc Type: | Bug Fix |
| Doc Text: |
.RGW STS now supports encryption keys larger than 1024 bytes
Previously, the RGW STS implementation did not support encryption keys larger than 1024 bytes. Users had to manually adjust Keycloak settings by lowering the priority of the `rsa-enc-generated` provider and reducing the `keySize` to `1024`.
With this fix, RGW STS now supports encryption keys larger than 1024 bytes without requiring manual configuration changes in Keycloak. This improves security and simplifies setup.
|
Story Points: | --- |
| Clone Of: | 2237854 | Environment: | |
| Last Closed: | 2026-01-29 06:48:03 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 2237854 | ||
| Bug Blocks: | 2388233, 2267614, 2298578, 2298579 | ||
|
Description
Matt Benjamin (redhat)
2024-04-24 16:23:29 UTC
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Moderate: Red Hat Ceph Storage 9.0 Security and Enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2026:1536 |