Known issues
oidc-agent
Scitokens
XRootD
StoRM
STORM_WEBDAV_USE_CONSCRYPT="false"
STORM_WEBDAV_TPC_USE_CONSCRYPT="false"
STORM_WEBDAV_ENABLE_HTTP2="false"
dCache
DPM
- allows
HEAD
requests with just storage.create:/
(mapping internally capabilities to simple ro/rw activity)
- supports
storage.write
scope which is not defined in WLCG JWT profile
- insecure token identity mapping to local uid (only "sub" claim considered while only "sub"+"iss" guaranteed to be unique)
EOS
RUCIO
- token with
rucio
audience used for FTS file transfers (changed to https://wlcg.cern.ch/jwt/v1/any
for Rucio DOMA instnace)
- default
scope
set to openid profile
wich is not sufficient e.g. for rucio upload
or rucio download
- fails in case there is expired X.509 proxy in
/tmp/x509up_u$(id -u)
although auth_type
is set to oidc
- use non-standard location for access token
/tmp/$(id -u -n)/.rucio_${RUCIO_ACCOUNT}/auth_token_${RUCIO_ACCOUNT}
- CLI OIDC arguments differs from FTS REST client
FTS
Gfal
- tokens can't be passed to
gfal-utils
CLI tools
- unable to determine which audience and scope
storage.*:/path
should be in used for SRM+HTTP transfers (TURL returned by SRM srmPrepareToGet + srmPrepareToPut not known before calling copy
function)
- TPC transfers with StoRM active party fails with gfal2
KEEP_ALIVE=True
configuration and davs://
protocol (can be reproduced also by 2x ctx.stat('davs://storm:8443/non-existing-file')
using gfal python API)