Print

Print


Following a user report, we have found that when a user accesses xroot via a VOMS proxy certificate that includes a VOMS role, the X509 plugin seems to require that a mapping be defined on the server side for that role
Failure to provide a mapping results in the plugin to map the user to a default uid = 99 (ie 'nobody'), as can be seen in this log excerpt:

`160115 13:19:48 time=1452860388430486 func=GetIdMapping             level=WARN  logid=1267d8fe-bb7a-11e5-a0f5-c860001bd8b2 unit=rdr@c2public-1cernch:1094 tid=139751941015296 source=XrdxCastor2Fs:1841  tid
ent=dirac31411:74@voilcdiractest04 msg="no passwd struct found for role=dirac"

160115 13:19:48 time=1452860388430564 func=GetIdMapping             level=DEBUG logid=1267d8fe-bb7a-11e5-a0f5-c860001bd8b2 unit=rdr@c2public-1cernch:1094 tid=139751941015296 source=XrdxCastor2Fs:1846  tid
ent=dirac31411:74@voilcdiractest04 msg="role=dirac -> uid/gid=99/99"`

Shouldn't the appropriate behavior instead be to ignore the role and map the user according to the loaded gridmap file? Can you please check the code?


---
Reply to this email directly or view it on GitHub:
https://github.com/xrootd/xrootd/issues/327

########################################################################
Use REPLY-ALL to reply to list

To unsubscribe from the XROOTD-DEV list, click the following link:
https://listserv.slac.stanford.edu/cgi-bin/wa?SUBED1=XROOTD-DEV&A=1