Skip to content

Conversation

@rahmans1
Copy link
Contributor

Briefly, what does this PR introduce?

Use variable for RSE in register_to_rucio calls

What kind of change does this PR introduce?

  • Bug fix (issue #__)
  • New feature (issue #__)
  • Documentation update
  • Other: __

Please check if this PR fulfills the following:

  • Tests for the changes have been added
  • Documentation has been added / updated
  • Changes have been communicated to collaborators

Does this PR introduce breaking changes? What changes might users need to make to their code?

Does this PR change default behavior?

rahmans1 and others added 7 commits October 17, 2025 21:44
Set USERUCIO=false for all test runs to disable Rucio and use direct
xrootd file transfers instead. Comment out optional XRD configuration
for future use.

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <[email protected]>
- Add --debug 2 flag to xrdcp for verbose output
- Show source/destination paths before each copy attempt
- Check for BEARER_TOKEN file existence before loading
- Fallback to X509_USER_PROXY if BEARER_TOKEN file not found
- Remove unnecessary local directory creation
- Display error exit codes when xrdcp fails
- Add clear debug markers around each copy operation

This helps diagnose xrdcp write failures to BNL xrootd server.

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <[email protected]>
Move commented environment variable lines outside of bash continuation
blocks to prevent breaking the variable assignment chain. Previously,
comments with backslashes were interrupting the line continuation,
causing COPYLOG, COPYRECO, USERUCIO, XRDWURL, and XRDWBASE to not be
passed to the script.

This was preventing xrdcp from running at all.

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <[email protected]>
Add chmod 600 to restrict x509_user_proxy file permissions. XRootD
requires certificate files to have restrictive permissions (600 or 400)
for security. Without this, TLS handshake fails with:
"Unable to use cert+key file x509_user_proxy; has excessive access rights"

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants