Known issues
oidc-agent
Scitokens
XRootD
StoRM
STORM_WEBDAV_USE_CONSCRYPT="false"
STORM_WEBDAV_TPC_USE_CONSCRYPT="false"
STORM_WEBDAV_ENABLE_HTTP2="false"
dCache
DPM
- allows
HEAD requests with just storage.create:/ (mapping internally capabilities to simple ro/rw activity)
- supports
storage.write scope which is not defined in WLCG JWT profile
- insecure token identity mapping to local uid (only "sub" claim considered while only "sub"+"iss" guaranteed to be unique)
EOS
RUCIO
- token with
rucio audience used for FTS file transfers (changed to https://wlcg.cern.ch/jwt/v1/any for Rucio DOMA instnace)
- default
scope set to openid profile wich is not sufficient e.g. for rucio upload or rucio download
- fails in case there is expired X.509 proxy in
/tmp/x509up_u$(id -u) although auth_type is set to oidc
- use non-standard location for access token
/tmp/$(id -u -n)/.rucio_${RUCIO_ACCOUNT}/auth_token_${RUCIO_ACCOUNT}
- CLI OIDC arguments differs from FTS REST client
FTS
Gfal
- tokens can't be passed to
gfal-utils CLI tools
- unable to determine which audience and scope
storage.*:/path should be in used for SRM+HTTP transfers (TURL returned by SRM srmPrepareToGet + srmPrepareToPut not known before calling copy function)
- TPC transfers with StoRM active party fails with gfal2
KEEP_ALIVE=True configuration and davs:// protocol (can be reproduced also by 2x ctx.stat('davs://storm:8443/non-existing-file') using gfal python API)