dcache
dcache copied to clipboard
Are root prepare requests properly supported?
Hello dCache.org,
today I found that bring-online requests submitted to the xrootd doors are successful but do not trigger staging. In fact, absolutely nothing happens following the request, as far as I can tell.
- dCache version
- 8.2.38
- Java version
- OpenJDK 11
- gfal2 version
- 2.22.1
Submit bring-online request to dCache door
$ gfal-bringonline root://dcachexrootd-kit.gridka.de:1094/pnfs/gridka.de/compass/users/conrad/hpt/mc/prod/mDST_mc_rec280.root root://dcachexrootd-kit.gridka.de:1094/pnfs/gridka.de/compass/users/conrad/hpt/mc/prod/mDST_mc_rec280.root QUEUED
Door responds with OK (debug level)
05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] [id: 0xf54778eb, L:/2a00:139c:5:1d9:0:41:d2:dd:1094 - R:/2a00:139c:3:2e5:0:61:d2:b9:54522] REGISTERED 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] [id: 0xf54778eb, L:/2a00:139c:5:1d9:0:41:d2:dd:1094 - R:/2a00:139c:3:2e5:0:61:d2:b9:54522] ACTIVE 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] [id: 0xf54778eb, L:/2a00:139c:5:1d9:0:41:d2:dd:1094 - R:/2a00:139c:3:2e5:0:61:d2:b9:54522] READ: org.dcache.xrootd.protocol.messages.ProtocolRequest@2562aac8 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] XrootdSessionHandler.getResponse: Request kXR_protocol 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] [id: 0xf54778eb, L:/2a00:139c:5:1d9:0:41:d2:dd:1094 - R:/2a00:139c:3:2e5:0:61:d2:b9:54522] READ COMPLETE 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] doOnProtocolRequest, version 1297, expect 3, option 11. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] setLocalTlsActivation 1297, 3, 11. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] Client version 1297, options 11, expect 3. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] [id: 0xf54778eb, L:/2a00:139c:5:1d9:0:41:d2:dd:1094 - R:/2a00:139c:3:2e5:0:61:d2:b9:54522] READ COMPLETE 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] setLocalTlsActivation, requires TLS for login, client kXR_ExpLogin. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] server uses TLS ? true. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] transitionedToTLS, server tlsActivation: LOGIN. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] PIPELINE addFirst: SSLHandler need auth false, want auth false. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] server transitioned to TLS ? true. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] kXR_protocol, server has now transitioned to tls? true. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] Sending protocol message with server flags mode: STRICT, flags: -1006632958 (manager true, meta-server false, proxy-server false, server false, supervisor false, data-server false, load-balancer true, tlsDat a false, tlsGPF false, tlsLogin true, tlsSession false, tlsTPC false, goToTLS true, anonGPF false), signing policy (secLvl 0)(overrides {})(force false). 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] [id: 0xf54778eb, L:/2a00:139c:5:1d9:0:41:d2:dd:1094 - R:/2a00:139c:3:2e5:0:61:d2:b9:54522] WRITE: protocol-response[-1006632958][(secLvl 0)(overrides {})(force false)] 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] [id: 0xf54778eb, L:/2a00:139c:5:1d9:0:41:d2:dd:1094 - R:/2a00:139c:3:2e5:0:61:d2:b9:54522] FLUSH 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] [id: 0xf54778eb, L:/2a00:139c:5:1d9:0:41:d2:dd:1094 - R:/2a00:139c:3:2e5:0:61:d2:b9:54522] READ COMPLETE 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] [id: 0xf54778eb, L:/2a00:139c:5:1d9:0:41:d2:dd:1094 - R:/2a00:139c:3:2e5:0:61:d2:b9:54522] USER_EVENT: SslHandshakeCompletionEvent(SUCCESS) 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] [id: 0xf54778eb, L:/2a00:139c:5:1d9:0:41:d2:dd:1094 - R:/2a00:139c:3:2e5:0:61:d2:b9:54522] READ: login[dcache-m,1824473,133,0,xrd.cc=de&xrd.tz=1&xrd.appname=platform-python3.6&xrd.info=&xrd.hostname=gm-1-kit -e.gridka.de&xrd.rn=v5.6.4] 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] XrootdSessionHandler.getResponse: Request kXR_login 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] server uses TLS ? true. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] Protocol: &P=ztn,0:4096:. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] server uses TLS ? true. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] Time since last server cert refresh 32071 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] protocols: &P=ztn,0:4096:&P=gsi,v:10400,c:ssl,ca:1149214e. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] [id: 0xf54778eb, L:/2a00:139c:5:1d9:0:41:d2:dd:1094 - R:/2a00:139c:3:2e5:0:61:d2:b9:54522] WRITE: login-response[E3234B4BC9238006A8C95B622EFFF19D,&P=ztn,0:4096:&P=gsi,v:10400,c:ssl,ca:1149214e] 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] [id: 0xf54778eb, L:/2a00:139c:5:1d9:0:41:d2:dd:1094 - R:/2a00:139c:3:2e5:0:61:d2:b9:54522] FLUSH 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] [id: 0xf54778eb, L:/2a00:139c:5:1d9:0:41:d2:dd:1094 - R:/2a00:139c:3:2e5:0:61:d2:b9:54522] READ COMPLETE 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] [id: 0xf54778eb, L:/2a00:139c:5:1d9:0:41:d2:dd:1094 - R:/2a00:139c:3:2e5:0:61:d2:b9:54522] READ: org.dcache.xrootd.protocol.messages.AuthenticationRequest@51d91b18 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] XrootdSessionHandler.getResponse: Request kXR_auth 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] Deserialized a bucket with code 3000, type kXRS_cryptomod 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] bucket type kXRS_cryptomod has length 3. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] Deserialized a bucket with code 3014, type kXRS_version 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] bucket type kXRS_version has length 4. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] Deserialized a bucket with code 3023, type kXRS_issuer_hash 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] bucket type kXRS_issuer_hash has length 21. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] Deserialized a bucket with code 3019, type kXRS_clnt_opts 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] bucket type kXRS_clnt_opts has length 4. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] Deserialized a bucket with code 3001, type kXRS_main 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] bucket type kXRS_main has length 28. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] NestedBucketBuffer protocol: gsi, step 1000 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] Deserialized a bucket with code 3006, type kXRS_rtag 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] bucket type kXRS_rtag has length 8. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] Client protocol version was 10600, using GSIPost49ServerRequestHandler. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] Received kXRS_clnt_opts 128; can sign proxy requests false. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] Validating crypto mode. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] The following ca hashes are recognized: [30ffc224.0, 1149214e.0]. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] Time since last server cert refresh 32099 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] RSA cipher initialized for encryption using private key of length 2377, max block size 501. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] Post-processing main bucket. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] Generated new challenge string: Y^iFA. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] Signing sender's random challenge tag of length 8. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] RSA cipher encryption, incoming length 8; max block 501. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] RSA cipher processing block of length 8. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] Building unencrypted main bucket. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] Getting encoded dh paramters (signed: true). 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] Signing encoded dh paramters. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] RSA cipher encryption, incoming length 313; max block 501. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] RSA cipher processing block of length 313. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] Getting encoded host certificate from PEM credential. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] authenticate, processed certreq step for stream 0, session org.dcache.xrootd.core.XrootdSession@621ff748. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] [id: 0xf54778eb, L:/2a00:139c:5:1d9:0:41:d2:dd:1094 - R:/2a00:139c:3:2e5:0:61:d2:b9:54522] WRITE: org.dcache.xrootd.protocol.messages.AuthenticationResponse@529b3529 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] [id: 0xf54778eb, L:/2a00:139c:5:1d9:0:41:d2:dd:1094 - R:/2a00:139c:3:2e5:0:61:d2:b9:54522] FLUSH 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] [id: 0xf54778eb, L:/2a00:139c:5:1d9:0:41:d2:dd:1094 - R:/2a00:139c:3:2e5:0:61:d2:b9:54522] READ COMPLETE 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] [id: 0xf54778eb, L:/2a00:139c:5:1d9:0:41:d2:dd:1094 - R:/2a00:139c:3:2e5:0:61:d2:b9:54522] READ: org.dcache.xrootd.protocol.messages.AuthenticationRequest@22938526 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] XrootdSessionHandler.getResponse: Request kXR_auth 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] Deserialized a bucket with code 3001, type kXRS_main 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] bucket type kXRS_main has length 7808. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] NestedBucketBuffer protocol: HH´³, step 1815165254 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] Deserialized a bucket with code 3000, type kXRS_cryptomod 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] bucket type kXRS_cryptomod has length 3. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] Deserialized a bucket with code 3025, type kXRS_cipher_alg 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] bucket type kXRS_cipher_alg has length 14. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] Deserialized a bucket with code 3026, type kXRS_md_alg 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] bucket type kXRS_md_alg has length 4. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] Deserialized a bucket with code 3005, type kXRS_cipher 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] bucket type kXRS_cipher has length 512. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] Deserialized a bucket with code 3004, type kXRS_puk 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] bucket type kXRS_puk has length 451. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] Validating cipher algorithm. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] checking cipher algorithm aes-128-cbc#16. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] Selected cipher algorithm aes-128-cbc#16 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] Setting sessionIVLen to 16. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] Validating cipher digests. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] Length of kXRS_puk bucket content: 451, size 459. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] resulting base64 byte array length 294. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] RSA modulus lenghth: 2048. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] RSA cipher initialized for decryption using public key of length 294, max block size 501. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] Finalizing session key using bucket type kXRS_cipher. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] Decrypting cipher bucket using public key, buffer length 512. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] RSA cipher decryption, in length 512; max block 256. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] RSA cipher processing block of length 256. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] RSA cipher processing block of length 256. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] DH message (params) from kXRS_cipher after decryption: -----BEGIN DH PARAMETERS----- 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] Remote endpoint sent: P = 8810252053191919589359420599637641654529526533255167910139019997260323899182669360368264455955601543214780189083983437542290860708561316883421676261825939, G = 2, L = 0, 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] Constructed buffer handler for signed hash use. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] Decrypting main bucket with session key. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] Using padded DH secret generation. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] NestedBucketBuffer protocol: gsi, step 1001 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] Deserialized a bucket with code 3007, type kXRS_signed_rtag 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] bucket type kXRS_signed_rtag has length 256. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] Deserialized a bucket with code 3022, type kXRS_x509 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] bucket type kXRS_x509 has length 7482. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] Deserialized a bucket with code 3006, type kXRS_rtag 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] bucket type kXRS_rtag has length 8. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] Processing RSA cert chain verification; previous key to match? true. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] Extracting X509Certificate chain. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] RSA cipher decryption, in length 256; max block 256. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] RSA cipher processing block of length 256. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] signature of challenge tag ok. Challenge: Y^iFA, rTagString: Y^iFA 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] authenticate, processed cert step for stream 0, session org.dcache.xrootd.core.XrootdSession@621ff748. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] doOnAuthentication, response ok, is completed. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] Attempting login strategy: org.dcache.services.login.RemoteLoginStrategy 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] Login strategy returned Subject: 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] server uses TLS ? true. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] server transitioned to TLS ? false. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] kXR_auth, server has now transitioned to tls? false. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] authenticated, set subject on session for login. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] [id: 0xf54778eb, L:/2a00:139c:5:1d9:0:41:d2:dd:1094 - R:/2a00:139c:3:2e5:0:61:d2:b9:54522] WRITE: ok 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] [id: 0xf54778eb, L:/2a00:139c:5:1d9:0:41:d2:dd:1094 - R:/2a00:139c:3:2e5:0:61:d2:b9:54522] FLUSH 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] [id: 0xf54778eb, L:/2a00:139c:5:1d9:0:41:d2:dd:1094 - R:/2a00:139c:3:2e5:0:61:d2:b9:54522] READ COMPLETE 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] [id: 0xf54778eb, L:/2a00:139c:5:1d9:0:41:d2:dd:1094 - R:/2a00:139c:3:2e5:0:61:d2:b9:54522] READ: prepare[2048,0,[//pnfs/gridka.de/compass/users/conrad/hpt/mc/prod/mDST_mc_rec280.root]] 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] XrootdSessionHandler.getResponse: Request 3021 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] [id: 0xf54778eb, L:/2a00:139c:5:1d9:0:41:d2:dd:1094 - R:/2a00:139c:3:2e5:0:61:d2:b9:54522] READ COMPLETE 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] [id: 0xf54778eb, L:/2a00:139c:5:1d9:0:41:d2:dd:1094 - R:/2a00:139c:3:2e5:0:61:d2:b9:54522] WRITE: ok 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] [id: 0xf54778eb, L:/2a00:139c:5:1d9:0:41:d2:dd:1094 - R:/2a00:139c:3:2e5:0:61:d2:b9:54522] FLUSH 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] [id: 0xf54778eb, L:/2a00:139c:5:1d9:0:41:d2:dd:1094 - R:/2a00:139c:3:2e5:0:61:d2:b9:54522] USER_EVENT: SslCloseCompletionEvent(SUCCESS) 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] [id: 0xf54778eb, L:/2a00:139c:5:1d9:0:41:d2:dd:1094 - R:/2a00:139c:3:2e5:0:61:d2:b9:54522] READ COMPLETE 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] [id: 0xf54778eb, L:/2a00:139c:5:1d9:0:41:d2:dd:1094 - R:/2a00:139c:3:2e5:0:61:d2:b9:54522] READ COMPLETE 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] [id: 0xf54778eb, L:/2a00:139c:5:1d9:0:41:d2:dd:1094 ! R:/2a00:139c:3:2e5:0:61:d2:b9:54522] INACTIVE 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] channel inactive event received on [id: 0xf54778eb, L:/2a00:139c:5:1d9:0:41:d2:dd:1094 ! R:/2a00:139c:3:2e5:0:61:d2:b9:54522]. 05 Jan 2024 09:42:28 (Xrootd-f01-210-221) [door:Xrootd-f01-210-221@xrootd-f01-210-221Domain:AAYOLtQBlXA] [id: 0xf54778eb, L:/2a00:139c:5:1d9:0:41:d2:dd:1094 ! R:/2a00:139c:3:2e5:0:61:d2:b9:54522] UNREGISTERED
Zero stage requests at PoolManager
admin > \s PoolManager@* rc ls PoolManager@poolManager-f01-210-103Domain: OK PoolManager@poolManager-f01-210-110Domain: OK
Zero pins for this specific file with PinManager
admin > \s PinManager@* ls 000F00000000000000285FA0 PinManager@pinManager-f01-210-103Domain: total 0 PinManager@pinManager-f01-210-110Domain: total 0
Zero stage requests on the designated stage pool
admin > \s f01-152-190-e_sT_shared rh ls
- No trace of the xrootd session ID (AAYOLtQBlXA) in either log file for PoolManager (on debug level), PinManager or the pool
So this begs the question, are root bring-online requests officially supported? Reading the file as a regular transfer will trigger on-demand staging of this file just fine.
Best regards, Xavier.
add @samuambroj
Hi Xavier,
No, this feature is not supported in dCache xrootd. dCache offers rest api for bring online and gfal client can talk to it.
Dmitry
FWIW, you're right dCache claims to support staging in xrootd but doesn't really. Such requests will succeed but are (silently) ignored.
The behaviour is because staging via xroot was only supported at NDGF, and only for ALICE. For all other Tier-1 sites, staging was achieved via SRM (and now Tape/REST API). At NDGF, dCache would actually stage ALICE files on open. For "reasons" the additional latency on open did not matter. Therefore, dCache only needed to say that staging "succeeded" so that tape access for ALICE (at NDGF) worked.
From memory, the effort required to implement proper support for staging under the xroot protocl would be relatively minor. However, since nobody needed real staging via xroot it was never implemented.
Thanks @DmitryLitvintsev, @paulmillar,
may I request this be changed? I agree that it probably isn't worth the time to make root prepare tasks work as srm-bringonline would. But then maybe tell the client that nothing will happen? Maybe you have an error code to convey "unsupported feature"?
Ciao,
Xavier.
Yes, lets add it as feature request (and start with "not supported" implementation)