Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

X509 authentication plugin incorrect behavior when proxy includes a role #327

Closed
glpatcern opened this issue Jan 15, 2016 · 3 comments
Closed

Comments

@glpatcern
Copy link
Contributor

Following a user report, we have found that when a user accesses xroot via a VOMS proxy certificate that includes a VOMS role, the X509 plugin seems to require that a mapping be defined on the server side for that role.
Failure to provide a mapping results in the plugin to map the user to a default uid = 99 (i.e. 'nobody'), as can be seen in this log excerpt:

160115 13:19:48 time=1452860388.430486 func=GetIdMapping             level=WARN  logid=1267d8fe-bb7a-11e5-a0f5-c860001bd8b2 unit=rdr@c2public-1.cern.ch:1094 tid=139751941015296 source=XrdxCastor2Fs:1841  tid
ent=dirac.31411:74@voilcdiractest04 msg="no passwd struct found for role=dirac"
160115 13:19:48 time=1452860388.430564 func=GetIdMapping             level=DEBUG logid=1267d8fe-bb7a-11e5-a0f5-c860001bd8b2 unit=rdr@c2public-1.cern.ch:1094 tid=139751941015296 source=XrdxCastor2Fs:1846  tid
ent=dirac.31411:74@voilcdiractest04 msg="role=dirac -> uid/gid=99/99"

Shouldn't the appropriate behavior instead be to ignore the role and map the user according to the loaded gridmap file? Can you please check the code?

@bbockelm
Copy link
Contributor

Hi Giuseppe,

Looking at this snippet:

source=XrdxCastor2Fs:1846

it appears the error is coming from one of the CERN-specific plugins (not maintained by the Xrootd team). Sorry, I don't think this project would be able to help.

Brian

@glpatcern
Copy link
Contributor Author

Hi Brian,

Yes, sorry for the noise - we really believed it came from the core xrootd but no we can deal with it ourselves within CASTOR. Closing.

@bbockelm
Copy link
Contributor

Sure, no problem - I just had been working on this very piece of code, so I definitely would have recognized the error message :)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants