GT 4.0.7 Incremental Release Notes

GT 4.0.7 Incremental Release Notes

1. Introduction

GT 4.0.7 is recommended for all users. It was released because of Bug 5910, a potential RFT data corruption bug. The bug affected only GT 4.0.6, and users of GT4.0.6 can apply the update package from http://www.globus.org/toolkit/advisories.html. New users are encouraged to start with the 4.0.7 release, as other bugs were also fixed (see below).

This page describes only the changes since the 4.0.7 release. For details regarding previous 4.0 releases, see Release Notes.

2. Obtaining and Installing Software

To download this release, go to the 4.0.7 Download page.

For information on installing this release, go to the 4.0 Installation Guide.

3. Documentation

Use the existing documentation for 4.0, which starts at http://www.globus.org/toolkit/docs/4.0/.

4. Support

An overview on GT support can be found here.

5. Licensing

The Globus Toolkit is distributed and licensed for use under the terms of the Apache License, Version 2.0.

To view the licenses of the 3rd party software used by the developers of the Globus Toolkit, click here.

6. Usage Statistics

For full information about usage statistics collected by GT 4.0.7 and how to opt-out, see Usage Statistics Collection by the Globus Alliance.

7. Summary of Changes Since 4.0.6

7.1. Common Runtime Components

7.1.1. Java WS Core

The following changes have occurred for Java WS Core:

  • Added support for thread pool in notification subsytem, to avoid starting up of new threads for each notification. This improves performance and scalability of notification system.
  • Added client globus-check-environment that displays local and remote environment/version information.

7.1.2. Python WS Core

No changes have been made since the previous release.

7.1.3. C WS Core

Aside from bug fixes, no changes were made to this component since 4.0.6.

7.1.4. XIO

Other than bug fixes, no changes have been made for XIO since 4.0.6.

7.1.5. C Common Libraries

Other than bug fixes, no changes have been made for C Common libraries since 4.0.6.

7.2. Security

7.2.1. Community Authorization Services

Changes since GT 4.0.6 release:

7.2.1.1. Support RFC 3820 compliant embedded assertion

Added an option in cas-proxy-init, to embed assertion that complies with RFC 3820 requirements on certificate extension. Support for OID 1.3.6.1.4.1.3536.1.1.1.9, with an assertion that is NOT encoded is defailt. The new option will use OID 1.3.6.1.4.1.3536.1.1.1.12, with value set to be a DER encoded ASN.1 representation of the SAML assertion. Details are part of Bug 5606

7.2.2. Delegation Services

No changes have been made to Delegation Service since GT 4.0.6.

7.2.3. Message/Transport-level Security

Changes since GT 4.0.6 release:

7.2.3.1. Support for signing policy enforcement

Optional support signing policy enforcement has been added. By default, signing policy (files) is not required and not enforced.

To view the bug fixes, click here.

7.2.4. WS Authorization Framework

No changes, other than bug fixes, have been made since the previous release.

7.2.5. Pre-WS Authentication & Authorization

Support for building GSI with an external OpenSSL package.

7.2.6. MyProxy

No changes have occurred for MyProxy.

7.2.7. SimpleCA

Except for a bug fix, no changes have been made since 4.0.6.

7.2.8. SweGrid Accounting Service (SGAS)

No changes have happened since the last release.

7.2.9. GSI OpenSSH

No changes have occurred for GSI-OpenSSH.

7.3. Data Management

7.3.1. Reliable File Transfer (RFT)

A configurable option to control the number of concurrent threads to handle transfer request has been added. This would help prevent the container being overloaded.

To view the bug fixes, click here.

7.3.2. GridFTP

Other than bug fixes, no changes have been made for GridFTP since 4.0.6.

7.3.3. OGSA-DAI

No changes have been made since the previous release.

7.3.4. Replica Location Service (RLS)

No changes have been made to this component since the previous release.

To view the bug fixes, click here.

7.3.5. Data Replication Service (DRS)

There are no changes for this release.

7.4. Information Services

7.4.1. WS MDS Aggregator Framework

No changes have been made since the previous release.

7.4.2. WS MDS Index Service

No changes have been made since the previous release.

7.4.3. Pre-WS MDS

There were no changes for Pre-WS MDS since the previous release. This component is deprecated.

To view the bug fix, click here.

7.4.4. WS MDS Trigger Service

No changes have been made since the previous release.

7.4.5. WS MDS WebMDS

No changes have been made since the previous release.

7.5. Execution Management

7.5.1. WS GRAM

WS GRAM in 4.0.7 includes both bug fixes and enhancements. Enhancements focussed on improving reliability by reducing the time for the service to reply to the client (bug 5935) and more efficient processing of job (bug 5937)

Additionally, this release is highly recommended for WS GRAM users in order to benefit from the scalability improvements made in processing notifications in the GT Java WS Core. WS GRAM clients submitting 100s or 1000s of jobs to a WS GRAM Service that relied on notifications for job status updates will see improvement in reliability and throughput. See the Java WS Core release notes for details.

Additionally, some important bug fixes were made in GT components used by WS GRAM for staging - RFT and GridFTP. See their release notes for details.

7.5.2. Pre-WS GRAM

Other than bug fixes, no changes have been made to Pre WS GRAM since the previous release.

To view the bug fix, click here.

7.5.3. GridWay

GridWay version shipped with GT4.0.7 is based on GridWay 5.2 as in the last version so just bugfixes are relevant between this version and the one shipped with 4.0.6

7.5.4. Community Scheduler Framework (CSF)

No changes have been made since 4.0.3.

7.5.5. Globus Teleoperations Control Protocol (GTCP)

No changes have been made since the previous release.

7.5.6. Dynamic Accounts (DA)

No changes have been made since the previous release.

7.6. Cross-component Tools

7.6.1. CoG jglobus

Changes since GT 4.0.6:

7.6.1.1. Support for signing policy enforcement

Optional support signing policy enforcement has been added.

7.6.1.2. GridFTP Control Channel DNS-RR support

Modified GridFTP control channel so that it will attempt to connect to all IPs returned in a DNS lookup. This is useful for cases where many IPs are associated with one hostname and one of the IPs returned points to a down machine. This is the accepted TCP methodology. A timeout associated with each IP can be controlled with the org.globus.ftp.openTO property, and the number of hosts to try is controlled by org.globus.ftp.DNSRRHostsToTry.

7.6.1.3. Clean up sockets on garbage collection

Added code to clean up socket connections in the finalize() mentod of FTPClient and the constructor of GridFTPClient. This will prevent possible FD leaks observed by some user communites. API uses should explicitly call close in all cases, but this change should help they out in case they do not.

7.6.2. pyGlobus

No changes have been made since the previous release.

To view the bug fixes, click here.

8. All Fixed Bugs Since 4.0.6

8.1. Common Runtime Components

8.1.1. Java WS Core

Following bugs have been fixed for Java WS Core since GT 4.0.6 release:

8.1.2. Python WS Core

No bugs have been fixed since the previous release.

8.1.3. C Common Libraries

8.1.4. C WS Core

No bugs have been fixed since 4.0.6.

8.1.5. XIO

  • Bug 5004: A race in deactivation of globus_common caused a a seg fault. globus_mutex_lock() was being called on a destroyed mutex. This is solved now.
  • Bug 5503: UDP driver sendto() fails on Solaris

8.2. Security

8.2.1. Community Authorization Service

No bugs were fixed since the previous release.

8.2.2. Delegation Service

No bugs have been fixed for Delegation Service since GT 4.0.6.

8.2.3. Message/Transport-level Security

Bugs fixed for Message/Transport-level security since GT 4.0.6.

  • Bug 5756: Allow developer to bypass secure msg consistency check
  • Bug 5757: allow developer to bypass sending cert chain in secure message

8.2.4. WS Authorization Framework

No bugs have been fixed since the previus release

8.2.5. Pre-WS Authentication & Authorization

  • Bug 5756: allow developer to bypass secure msg consistency check
  • Bug 5757: allow developer to bypass sending cert chain in secure me...
  • Bug 5816: type frees wrong memory
  • Bug 5872: Please list the CA filename in the "Could not find CA" er...

8.2.6. MyProxy

No changes have occurred for MyProxy.

8.2.7. SweGrid Accounting System (SGAS)

You can find information about fixed bugs here.

8.2.8. SimpleCA

No bugs have been fixed since the previous version.

8.2.9. GSI OpenSSH

No changes have occurred for GSI-OpenSSH.

8.3. Data Management

8.3.1. Reliable File Transfer (RFT)

  • Bug 5910:Possible corruption on cached data connections
  • Bug 5919:Problem with user DN based authroization
  • Bug 3121:Bug in enforcing maximum active transfers in a container limit
  • Fixed problem with 'all or none' option in 4.0.6
  • Fixed problem with the back off mechanism for transfer retries in 4.0.6

8.3.2. GridFTP

Related to Bug 5910, when TYPE A is used in MODE E, data conversion was only done on the receiving side and not on the sending side. This has been fixed in the server.

8.3.3. Replica Location Service (RLS)

No changes have been made since the last release.

8.3.4. OGSA-DAI

No OGSA-DAI WSRF-specific bug fixes have been made for this release.

8.3.5. Data Replication Service (DRS)

There have been no new bug fixes since the previous release.

8.4. Information Services

8.4.1. WS MDS Aggregator

No bugs have been fixed in the Aggregator framework since the previous release.

8.4.2. WS MDS Index Service

No new bugs have been fixed for the WS MDS Index Service since the previous release.

8.4.3. Pre-WS MDS

No bugs were fixed for Pre-WS MDS since the previous release. This component is deprecated.

8.4.4. WS MDS Index Service

No new bugs have been fixed for the WS MDS Trigger Service since the previous release.

8.4.5. WS MDS WebMDS

No new bugs have been fixed since the previous release.

8.5. Execution Management

8.5.1. WS GRAM

  • Bug 5711:globusrun-ws error with -term +HH:MM option
  • Bug 4275:globus-gram-local-proxy-tool fails on Solaris
  • Bug 4597:Globus/Condor integration
  • Bug 5822:Improve diagnostics for globus-scheduler-event-generator program
  • Bug 5930:Make SchedulerEventGenerator.run() (Java) more robust
  • Bug 5935:Make job creation slimmer
  • Bug 5937:Add priorities to RunQueue
  • Bug 5926:Cloning EPR's from stubs before storing them
  • Bug 5928:Log an info statement when factory returns EPR of existing job

8.5.2. Pre-WS GRAM

  • Bug 5688:asctime_r hardcoded in globus_gram_job_manager_auditing.c

8.5.3. GridWay

Here is the list of bugs fixed in Globus GridWay 4.0.7, follow the links for a description of each bug:

8.5.4. Community Scheduler Framework (CSF)

No bugs have been fixed for CSF since 4.0.4.

8.5.5. Globus Teleoperations Control Protocol (GTCP)

No bugs have been fixed since the previous release.

8.5.6. Dynamic Accounts (DA)

No bug fixes have been made since the previous release.

8.6. Cross-component Tools

8.6.1. CoG jglobus

  • Bug 3789: CA signing policy should be handled the same in Java and pre-WS GSI

8.6.2. pyGlobus

No bug fixes have been made since the previous release.

9. Known Problems As of 4.0.7

9.1. Common Runtime Components

9.1.1. Java WS Core

  • Limitations: No new limitations have been identified.
  • Known Bugs: No new bugs have been filed since GT 4.0.6

9.1.2. C WS Core

  • Multiple schemas which use the same namespace prefixes can confuse the WSDL parser.
  • Nillable elements are not serialized or deserialized correctly if the element does not contain the minOccurs="0" attribute
  • The service engine and clients are not thread-safe

9.1.3. Python WS Core

For information on existing bugs, click here.

9.1.4. XIO

  • Bug 2530: END_OF_ENTITY
  • Bug 3147: XIO doesn't provide for multiplexed drivers passing down driver_handle_cntl
  • Bug 4186: Some GRAM security errors less informative than before
  • Bug 4354: Encryption may cause a deadlock.
  • Bug 4429: Memory leaks when using GSI driver from XIO library.

9.1.5. C Common Libraries

  • Bug 484: Mem leak on deactivate_all
  • Bug 686: globus_mutex_lock() behaves differently on Unix -vs- Win32
  • Bug 1141: Misleading error messages using globus-makefile-header
  • Bug 2791: Command globus-domainname needs g11n
  • Bug 2793: Command globus-generalized-time needs g11n
  • Bug 2794: Command globus-hostname needs g11n
  • Bug 3081: Small leak in libltldl
  • Bug 3107: Fatal error: tcp_init(): globus_io_tcp_create_listener() ...
  • Bug 3436: globus_uuid MAC address retrieval doesn't work on solaris
  • Bug 3509: GLOBUS_COMMON_MODULE->GLOBUS_CALLBACK_MODULE deactivation...
  • Bug 3610: globus-makefile-header returns bad field
  • Bug 4035: MacOS threading issues
  • Bug 4097: Signal handling probrem on MacOS X
  • Bug 4318: Pkgdata needs to make source dir explicit
  • Bug 4348: globus-makefile-header generates invalid makefile for Index Service bindings

9.2. Security

9.2.1. Community Authorization Service (CAS)

  • Limitations: No new limitations have been identified.
  • Known Bugs

9.2.2. Delegation Service

  • Limitations: No new limitations have been identified.
  • Known Bugs

    • Bug 4300: Delegation Service does not implement GetRP interface

9.2.3. Message-level Security

No new problems are known to exist at the time of the GT 4.0.7 release.

9.2.4. WS Authorization Framework

No new problems are known to exist for WS Authorization Framework at the time of this release.

9.2.5. Pre-WS Authentication and Authorization

No new problems are known to exist for Pre-WS Authentication & Authorization at the time of the 4.0.7 release.

9.2.6. MyProxy

  • Bug 2709: The MyProxy package isn't internationalized.

9.2.7. SimpleCA

  • Bug 1712:-default should not be required the first time

9.2.8. GSI OpenSSH

No problems are known to exist for GSI-OpenSSH at the time of this release.

9.2.9. SweGrid Accounting System (SGAS)

You can find information about known issues here.

9.3. Data Management

9.3.1. Reliable File Transfer (RFT)

    9.3.2. GridFTP

    • Bug 3324: gridftpd croaking on startup - globus_l_io_tcp_contact_string failed
    • Bug 3214: Backend of GT4 GridFTPd should ignore ~/.globus/certificates
    • Bug 3387: client library doesn't respect GLOBUS_HOSTNAME
    • Bug 3761: globus_ftp_control library hangs at various places (depending on os)
    • Bug 3807: "not a plain file" could be "file not found"
    • Bug 3845: data channel authentication failure
    • Bug 4119: Malformed UTF-8 character problem in globus-ftp-client tests
    • Bug 4274: client library has no default striping layout.

    9.3.3. Replica Location Service (RLS)

    The following known problems exist.

    • Threading/Libc Problems: set LD_ASSUME_KERNEL=2.2.5 in your environment and see Platform Notes for more information.
    • Bug 3656: ACLs cannot be modified dynamically
    • Bug 3828: RLSClient crashes when a null parameter is passed to a method
    • Bug 4114: Java apis fail on 64 bit machine (patch available)
    • Bug 4141: regexec call in auth.c's auth_getperms
    • Bug 4142: globus-rls-admin -s always indicates RLI does not exist
    • Bug 4512: RLS query returns incomplete result on 64bit system (patch available)
    • Bug 4630: RLS java client cannot load libaries through JNI on Mac (see workaround)
    • Bug 5684: RLS server unstable on Debian 4.0

    9.3.4. OGSA-DAI WSRF

    The following problems are known to exist for OGSA-DAI at the time of the 4.0.6 release and will be addressed in the future. If you have any others that you feel should be added to this list then please let us know.

    You may also want to consult the platform-specific FAQ and general FAQ. Additional information may be posted in the advisories page which report any problems since the release, or the OGSA-DAI bugzilla which may also have information on any problems with the current release.

    • Performance:

      • Accessing the databaseSchema property for DB2/Cloudscape can sometimes retrieve unrelated meta-data and also cause OGSA-DAI to crash.
      • Accessing the databaseSchema property for Oracle causes a server-side java.lang.OutOfMemoryError.
      • Attempting to return a very large data set in a Response document can cause a server-side java.lang.OutOfMemoryError. This can be avoided by submitting an asynchronous request (one that uses an outputStream) and retrieving the results using a data service's data transport operations.
      • Queries of tables for millions of small rows can eventually cause a server-side java.lang.OutOfMemoryError even if using stream activities and data transport operations.
      • The fileWritingActivity attempts to read the whole file in a oner and so could cause a server-side java.lang.OutOfMemoryError for very large files.
      • Some databases, such as dBASE IV database on Microsoft Windows 2000, allow unusual characters, such as 0xC to be contained in certain field types. When field values containing this character, OGSA-DAI encodes them into invalid XML that subsequently causes Xerces-dependent components to raise an org.xml.sax.SAXParseException. Activities that have two outputs can sometimes cause java.lang.OutOfMemoryErrors to occur server-side if manipulating large amounts of data. This can arise when using the GZIP activities for example.

        • Such activities are driven by one of the two connected activities and the other activity can accumulate data without processing it. So, for example for the GZIP activities OGSA-DAI focuses on the GZIP meta-data output steam and data only flows from this stream when a file has been completely unzipped. Therefore for large files the whole contents of the file flows into the activity and is buffered without being sent on.
        • OGSA-DAI's GZIP activities will warn if memory usage is close to maximum and throw an OGSA-DAI exception server-side so that the web services container does not crash.
    • Error and exception handling:

      • The failure of a single activity in a request can cause the status of all activities to be set to ERROR, even those that are not connected and succeeded.
      • The data transport activities can gulp exceptions. For example if an sqlQueryStatement with a incorrectly formed SQL query statment is connected to an outputStream activity then attempting to pull data from the outputStream using the data transport operations results in no data - no indication of an error is given to the client.
      • The uk.org.ogsadai.exception.DAILogger methods can sometimes log the wrong line numbers. Searching the logs will usually reveal where the problem actually arose.
    • Security:

      • Encrypted role map files are currently unsupported.
      • If a client does not provide a certificate then deliverFromGridFTP and deliverToGridFTP in a request will fail.
    • File activities:

      • The fileAccessActivity encodes text line-by-line if Base 64 encoding is being used. This may give different results from encoding a whole file in a oner.
      • In fileWritingActivity, EOF means "end of file" when perLine has value false but "end of line" when perLine has value true.
      • In fileWritingActivity only strings from its input stream are handled. Other block types e.g. bytes are ignored.
    • General:

      • Note that when deploying new data service resources dynamically via configurable data service this only works if the JARs required by the data service resource (e.g. database driver JARs) are already within the web service container's library directories. If this is not the case then the container has to be restarted.
      • The data service terminate operation currently does nothing. It is intended as a placeholder for future development.
      • Meta-data from a database, returned in the databaseSchema property, can be case-sensitive depending upon the database. For example MySQL might return a table called littleblackbook while DB2 returns LITTLEBLACKBOOK.
      • The uk.org.ogsadai.common.BinaryLob class contains unimplemented methods which throw java.lang UnsupportedMethodException.
      • Conversion of java.sql.ResultSet to XML WebRowSet returns empty key-column and map properties in the properties element.
      • deliverFromGridFTP and deliverToGridFTP do not allow the setting of certain GridFTP parameters.
    • There is no support in the client toolkit for certain activities. These include:

      • directoryAccessActivity
      • fileAccessActivity
      • fileManipulationActivity
      • deliverFromFTP
      • deliverToFTP
      • gzipDecompression
    • The deliverToStream activity only works if services are deployed in Tomcat.

    9.3.5. Data Replication Service (DRS)

    The following known problems exist for this release.

    • See Java WS Core buglist concerning container freeze, which may affect DRS performance: Bug 3502: Container freezes (CPU spin) when making remote call between ws-resources. See record for WORKAROUND.
    • Bug 4231: DRS does not implement subscription/notification

    9.4. Information Services

    9.4.1. WS MDS Aggregator Framework

    There are no known problems with the WS MDS Aggregator API at the time of this release.

    9.4.2. WS MDS Index Service

    No known problems exist for the WS MDS Index service at the time of this release.

    9.4.3. Pre-WS MDS

    No known problems exist for Pre-WS MDS at the time of this release.

    9.4.4. WS MDS Trigger Service

    9.4.5. Web MDS

    9.5. Execution Management

    9.5.1. WS GRAM

    • Bug 3310:Inconsistency across components with respect to client command behavior.
    • Bug 3865:Enhance RSL with Job Name
    • Bug 3866:Support for parametric or array job types
    • Bug 3892:Out of date performance data?
    • Bug 3912:Rotation of gram_condor_log?
    • Bug 4182:Improve Condor/Fork Job Monitoring for reliability and security
    • Bug 4311:GRAM error log files
    • Bug 4513:LD_LIBRARY_PATH should not be set if no library_path is specified
    • Bug 4684:Loading persisted jobs with expired delegation resources causes stacktraces
    • Bug 4751:GRAM2 GRAM4 Performance Comparison
    • Bug 4787:no lifetime management for WS Rendezvous
    • Bug 4790:stdout RP gets null
    • Bug 4824:feature request: configurability of location where service writes PBS job scripts
    • Bug 4833:command line program for service audit info
    • Bug 4836:job submitted INFO level logging
    • Bug 4864:environment variables containing '=' get escaped
    • Bug 4918:user account details are cached even for unknown users
    • Bug 4944:Multijob resources never yield to memory pressure and can't be destroyed
    • Bug 5012:Container in livelock state for an incorrectly mapped DN
    • Bug 5112:submitting job error
    • Bug 5120:submitting job error with PBS
    • Bug 5348:Missing documentation for job recovery information
    • Bug 5397:GRAM4 recovery of persisted job resources needs to be reviewed
    • Bug 5405:custom extensions in WS GRAM
    • Bug 5414:Add globus_wsrf_gram_client_tools to 4.0 branch for 4.0.6
    • Bug 5471:GRAM Jobs Hang in Unsubmitted State
    • Bug 5525:Add support for OSC mpiexec (not MPICH2 command!) to PBS adapter
    • Bug 5611:GramJob API changes to improve performace and efficiency
    • Bug 5617:GRAM4 seg hangs with fork jobs
    • Bug 5698:Allow a prologue/epilogue script for 'mpi' and 'multiple' jobs
    • Bug 5712:Gram auditing: local_job_id format variations
    • Bug 5713:GRAM auditing: Failed database connection loses audit records
    • Bug 5714:GRAM Auditing: additional data in audit records
    • Bug 5725:Gram auditing: housekeeping for the auditRecords database
    • Bug 5770:GRAM4 auditing: inconsistent data in job_description column of DB
    • Bug 5776:GRAM4 auditing: Need for an INFO log message
    • Bug 5777:GRAM2 audting: database connection times out
    • Bug 5778:GRAM2 audting: no error message on db update failure
    • Bug 5859: Java GramJob getExitCode() always returns 0

    9.5.2. Pre-WS GRAM

    • Bug 227:Auth information made available in runtime environment
    • Bug 720:allow gram client to detect the version of a gram server
    • Bug 851:Add cleanup RSL attribute for cleaning up a job submission
    • Bug 865:Total and available MEM not reported for gram inforproviders
    • Bug 1460:Condor Jobmanager missing several features
    • Bug 1538:Gatekeeper log rotation and logging job accounting info
    • Bug 1550:Fixes for race condition in job manager
    • Bug 1934:Gatekeeper's syslog output cannot be controlled
    • Bug 2739:Gatekeeper AuthZ/Gridmap Callout result logging
    • Bug 2741:catching SIGSEGV if dynamic loading of authorization modules fails
    • Bug 3373:globus removes the temporary job directory before pbs writes back into it
    • Bug 3795:jobmanager perl modules issues
    • Bug 4199:Patch pre-WS GRAM to use individual condor logs for jobs
    • Bug 4213:Patch to disable streaming
    • Bug 4235:globus-job-manager doesn't exit if the job fails.
    • Bug 4450:GT 4.0.1 globus-gatekeeper hang on UC/ANL TeraGrid
    • Bug 4730:MPI Jobs using Globus LSF in HP XC Cluster....
    • Bug 4747:Need evaluation of patch to JobManager.pm
    • Bug 4771:date bug in job manager log file
    • Bug 4779:gram GT2 log files: timestamps are not ISO 8601 compatible
    • Bug 5143:DONE state never reported for Condor jobs when using Condor-G grid monitor
    • Bug 5200:GRAM (pre-webservices) from OSG 0.6.0 (VDT 1.6.1) has bad syslog format
    • Bug 5207:GRAM SoftEnv extension bug
    • Bug 5250:Does not support mpi jobtype of RSL script
    • Bug 5272:Invalid parsing of RSL file
    • Bug 5429:stdin is lost when jobtype=multiple with jobmanager-lsf
    • Bug 5536:Missing dependency in package globus_gram_job_manager_auditing
    • Bug 5537:Missing dependency in package globus_gram_job_manager_auditing
    • Bug 5554:GRAM2 4.0.5 setup-globus-job-manager-fork.pl silent failure
    • Bug 5556:Audit directory setup instructions are insecure
    • Bug 5580:ERROR regarding proxy lifetime should not be so frustrating - make it a WARNING
    • Bug 5621:gram2 credential refresh problems in 4.0.5
    • Bug 5775:gram status of old jobs incorrect on some lsf systems

    9.5.3. GridWay

    The following is a list of all of the bugs known at the time for the 4.0.7 release:

    • Bug 5592: gwd blocks when misconfigured sudo
    • Bug 5724: Environment for Non-Wrapper based jobs
    • Bug 5308: gwd doesn't recover AIDs and TIDs
    • Bug 5641: Sudoers configuration not allowing sudo to be run from a program
    • Bug 5592: gwd blocks when misconfigured sudo
    • Bug 5724: Environment for Non-Wrapper based jobs
    • Bug 5734: Documentation doesn't reference the new DRMAA 1.0 binding
    • Bug 5898: JSDL-Support needs Java 1.5+

    9.5.4. Community Scheduler Framework (CSF)

    There are no known problems with CSF at the time of this release.

    9.5.5. Globus Teleoperations Control Protocol (GTCP)

    No problems are known to exist for Globus Teleoperations Control Protocol (GTCP) at the time of this release.

    9.5.6. Dynamic Accounts (DA)

    • The LeasedAccountsResource implementation will quarantine an account if the expiration script fails for any reason; but currently we provide no user friendly mechanism for manually un-quarantining the account when the situation is cleared by an administrator. We are planning to release an update shortly.

    9.6. Cross-component Tools

    9.6.1. CoG jglobus

    No new issues have been reported since GT 4.0.5

    • Bug 5811: empty SSL packet causes jglobus to shutdown connection
    • Bug 5868: Usefulness of log and error messages
    • Bug 5888:Support for other types of KeyStores in GridProxyInit

    9.6.2. pyGlobus

    There are no known problems to exist for pyGlobus at the time of this release.