Skip to content

Known issues

oidc-agent

Scitokens

XRootD

StoRM

STORM_WEBDAV_USE_CONSCRYPT="false"
STORM_WEBDAV_TPC_USE_CONSCRYPT="false"
STORM_WEBDAV_ENABLE_HTTP2="false"

dCache

DPM

  • allows HEAD requests with just storage.create:/ (mapping internally capabilities to simple ro/rw activity)
  • supports storage.write scope which is not defined in WLCG JWT profile
  • insecure token identity mapping to local uid (only "sub" claim considered while only "sub"+"iss" guaranteed to be unique)

EOS

RUCIO

  • token with rucio audience used for FTS file transfers (changed to https://wlcg.cern.ch/jwt/v1/any for Rucio DOMA instnace)
  • default scope set to openid profile wich is not sufficient e.g. for rucio upload or rucio download
  • fails in case there is expired X.509 proxy in /tmp/x509up_u$(id -u) although auth_type is set to oidc
  • use non-standard location for access token /tmp/$(id -u -n)/.rucio_${RUCIO_ACCOUNT}/auth_token_${RUCIO_ACCOUNT}
  • CLI OIDC arguments differs from FTS REST client

FTS

Gfal

  • tokens can't be passed to gfal-utils CLI tools
  • unable to determine which audience and scope storage.*:/path should be in used for SRM+HTTP transfers (TURL returned by SRM srmPrepareToGet + srmPrepareToPut not known before calling copy function)
  • TPC transfers with StoRM active party fails with gfal2 KEEP_ALIVE=True configuration and davs:// protocol (can be reproduced also by 2x ctx.stat('davs://storm:8443/non-existing-file') using gfal python API)