OSG 23 News¶
Supported OS Versions: EL8, EL9 (see this document for details)
OSG 23 is the first release series that follows our new support policy, which aims to increase the regularity of the OSG Software Stack lifecycle. Moving forward, we plan to distribute a new release series each year, supporting each release series for approximately 2 years total. As with OSG 3.6, we will continue to release OSG 23 package updates in a rolling fashion.
Additionally, OSG 23 aligns the OSG and HTCondor Software Suite (HTCSS) release cycles:
- OSG 23 main Yum repositories will contain HTCSS LTS series (HTCondor 23.0, HTCondor-CE 23.0)
- OSG 23 upcoming Yum repositories will contain HTCSS feature series (HTCondor 23.x, HTCondor-CE 23.x)
Known Issues¶
The following issues are known to currently affect packages distributed in OSG 23:
CA Certificates on EL9¶
EL9 operating systems have a tighter default cryptographic policy that can cause services to reject certificates issued
by SHA-1 signed CAs.
Some CAs in the igtf-ca-certs
and osg-ca-certs
packages are affected and you may see service issues if your server
certificate or certificates presented by clients are issued by these CAs.
The Software Team is investigating solutions but in the meantime, we recommend running the following command on XRootD
hosts to accept certificates issued by SHA-1 signed CAs:
root@host # update-crypto-policies --set DEFAULT:SHA1
Do I need to run this on my Compute Entrypoint (CE) hosts?
No. At this time, the Software Team believes that CE hosts are unaffected since their clients only present tokens and token issuers present modern CAs.
Latest News¶
December 19, 2024: IGTF 1.132, gratia-probe 2.5.8, HTCondor-CE 23.0.18, XCache 3.7.0-2¶
- CA certificates based on IGTF 1.132
- added new trust anchor for TRGRID transition (TR)
- gratia-probe 2.8.5
- Log HTCondor schedd cron stdout/stderr for easier debugging
- HTCondor-CE 23.0.18
- Does not pass WholeNode request expressions to non-HTCondor batch systems
- Fix certificate subject parsing in
condor_ce_host_network_check
- XCache 3.7.0-2
- Relax RPM package requirement to ease upgrade to OSG 24
December 11, 2024: XRootD 5.7.2-1.1, GlideinWMS 3.10.8 Upcoming: osdf-server 7.11.7¶
- XRootD 5.7.2-1.1
- Various major bug fixes
- GlideinWMS 3.10.8
- Bug fix: Fixed root unable to remove other users jobs in the Factory
- Bug fix: Disabled shebang mangling in
rpm_build
to avoid gwms-python not finding the shell - Bug fix: Dynamic creation of HTCondor IDTOKEN password so it is not in the images
- Bug fix: Failed log rotation due to wrong file creation time
- Upcoming
- osdf-server 7.11.7
- Updated to Pelican 7.11.7
- Use config.d Pelican configuration layout
- osdf-server 7.11.7
November 19, 2024: HTCondor 23.0.18; Upcoming: HTCondor 23.10.18¶
- HTCondor 23.0.18
- Proper error message and hold when Docker emits multi-line error message
- Upcoming
- HTCondor 23.10.18
- Fix issue where an unresponsive libvirtd blocked an EP from starting up
- HTCondor 23.10.18
November 13, 2024: XRootD 5.7.1-1.4¶
- XRootD 5.7.1-1.4
- Reduce XCache error rate under load
October 30, 2024: Upcoming: HTCondor 23.10.2¶
- Upcoming
- HTCondor 23.10.2
- Fix for output file transfer errors obscuring input file transfer errors
- HTCondor 23.10.2
October 10, 2024: XRootD 5.7.1-1.3, HTCondor 23.0.17¶
- XRootD 5.7.1-1.3
- Urgent fix for S3 caches to avoid near-infinite loop
- Change cache age logic to only indicate fully cached files
- HTCondor 23.0.17
- Bug fix for PID namespaces and
condor_ssh_to_job
on EL9 - Augment
condor_upgrade_check
to find unit suffixes in ClassAd expressions
- Bug fix for PID namespaces and
October 10, 2024: HTCondor 23.0.16; Upcoming: osdf-server 7.10.7¶
- HTCondor 23.0.16
- Back-port all cgroup v2 fixes and enhancements from the 23.10.1 release
- Upcoming
- osdf-server 7.10.7
- Update to require Pelican 7.10.7
- Restart services when Pelican or XRootD are upgraded.
- osdf-server 7.10.7
October 3, 2024: IGTF 1.131; Upcoming: HTCondor 23.10.1, Pelican 7.10.7¶
- CA Certificates based on IGTF 1.131
- removed discontinued HKU-CA-2 authority (HK)
- removed obsolete 3rd generation TCS intermediates (EU)
- Upcoming
- HTCondor 23.10.1
- Improvements to disk usage enforcement when using LVM
- Can encrypt job sandboxes when using LVM
- More precise tracking of disk usage when using LVM
- Reduced disk usage tracking overhead
- Improvements tracking CPU and memory usage with cgroup v2 (on EL9)
- Don't count kernel cache pages against job's memory usage
- Avoid rare inclusion of previous job's CPU and peak memory usage
- HTCondor now re-checks DNS before re-connecting to a collector
- HTCondor now writes out per job epoch history
- HTCondor can encrypt network connections without authentication
- htcondor CLI can now show status for local server, AP, and CM
- htcondor CLI can now display OAUTH2 credentials
- Uses job's sandbox to convert image format for Singularity/Apptainer
- Bug fix to not lose GPUs in Docker job on systemd reconfig
- Bug fix for PID namespaces and
condor_ssh_to_job
on EL9
- Improvements to disk usage enforcement when using LVM
- Pelican 7.10.7
- Stopped file transfers are now retryable errors
- General improvements to error messages within the client and the plugin
- Put requests now work with Origins using OA4MP Issuers
- Retries metadata lookup failures
- Fixed naming issue with queries on get/copy
- Director supports server sorting on distance, server load, and objects
- Add object availability test for cache access
- Caches can fetch objects from other caches when there's a cache miss
- Site name is populated in the Origin/Cache auto-registration process
- Origins and Caches advertise their storage backend type to the director
- HTCondor 23.10.1
October 1, 2024: HTCondor 23.0.15, XRootD 5.7.1-1.1, xrdcl-pelican 0.9.6¶
- HTCondor 23.0.15 LTS
- Fix bug where Docker universe jobs reported zero memory usage on EL9
- Fix bug where Docker universe images would not be removed from EP cache
- Fix bug where
condor_watch_q
could crash - Fix bug that could cause the file transfer hold reason to be truncated
- XRootD 5.7.1
- New Features
- Allow cconfig to write out combined config file
- Allow for API endpoints for fixed remote origins
- Allow server to assume an arbitrary network identity
- Allow a redirector to be configured read-only
- Add "OSS Statistics" plugin to enable file system load monitoring
- Defer client TLS authentication for XRootD to avoid unnecessary browser popups
- Major bug fixes
- Do not leak file pointer on open error
- Fix memory leaks when creating Python objects
- Ensure correct certificate is used when passed via cgi with
xrd.gsiusrproxy=...
- Fix too few arguments to formatting function
- New Features
- xrdcl-pelican 0.9.4
- Allow X.509 client authentication
- Provide an error code on metadata lookup failure
September 12, 2024: CVMFS 2.11.5, vault 1.17.2, htvault-config 1.18, htgettoken 2.0, xrootd-multiuser 2.2.0-1.1, xrdcl-pelican 0.9.3-2.1¶
- CVMFS 2.11.5
- Fix blocking behavior in repositories when pipe reads take longer than a timeout
- Fix streaming cache manager with secure repositories
- Fix handling of network errors in streaming cache manager
- Fix rare stuck condition after cache manager crashes
- vault 1.17.2
- Update to latest upstream version
- htvault-config 1.18
- Add caching of exchanged tokens
- Give vault tokens the ability to delete secrets and revoke themselves
- Update dependencies
- htgettoken 2.0
- Major update replacing some libraries with modern equivalents
- Remove use of PyInstaller
- Make htgettoken directly callable from Python
- Add use of a newer API to access vault secrets
- Fix the -o option to work with relative paths
- Change the --nobearertoken option to always save a vault token
- xrootd-multiuser 2.2.0-1.1
- Rebuild for ARM64 (aarch64)
- xrdcl-pelican 0.9.3-2.1
- Rebuild for ARM64 (aarch64)
September 5, 2024: XRootD 5.7.0-1.6¶
- XRootD 5.7.0-1.6
- Fix file descriptor leak causing "too many open files" error in XCache
- Improve performance by reducing stat calls on HTTP GET
August 8, 2024: HTCondor 23.0.14; Upcoming: HTCondor-CE 23.9.1, HTCondor 23.9.6¶
- HTCondor 23.0.14 LTS
- Docker and Container jobs run on EPs that match the AP's CPU architecture
- Fixed premature cleanup of credentials by the
condor_credd
- Fixed bug where a malformed SciToken could cause a
condor_schedd
crash - Fixed crash in
condor_annex
script - Fixed daemon crash after IDTOKEN request is approved by the collector
- Upcoming
- HTCondor-CE 23.9.1
- Use new Job Router syntax by default
- Update configuration files to work with HTCondor 23.9.1 and later
- HTCondor 23.9.6
- Add configuration knob to have cgroups not count kernel memory for jobs on EL9
- Remove support for numeric unit suffixes (k,M,G) in ClassAd expressions
- In submit files,
request_disk
&request_memory
still accept unit suffixes - Hide GPUs not allocated to the job on cgroup v2 systems such as EL9
- DAGMan can now produce credentials when using direct submission
- Singularity jobs have a contained home directory when file transfer is on
- Avoid using IPv6 link local addresses when resolving hostname to IP addr
- New 'htcondor credential' command to aid in debugging
- HTCondor-CE 23.9.1
July 30, 2024: XRootD 5.7.0¶
- XRootD 5.7.0
- New feature release
- Support for Python 2.x is now deprecated
- Support for CentOS 7 is now deprecated (although official RPMs for 5.7.0 are available)
- Add support for pelican:// protocol
- Update min/default RSA bits to 2048
- Add option to force the destination IP address on a HTTP-TPC
- Always create directory path when opening dest file for HTTP TPC
- HTTP header parsing is now case-insensitive
- See upstream release notes for details
July 25, 2024: HTCondor-CE 23.0.13, GlideinWMS 3.10.7, hosted-ce-tools 2.1¶
- HTCondor-CE 23.0.13
- Include
condor_ce_upgrade_check
script
- Include
- GlideinWMS 3.10.7
- Apptainer cache and temp directory set in the Glidein working directory
- Ability to set a minimum required memory for partitionable Glideins
- Blackhole Detection
- Stop accepting jobs if they are consumed at a high rate
- Fix Apptainer validation not considering
uid_map
w/o initial blank - Flatten error messages in HTCondor error file and
JobWrapperFailure
Ad - Fix problem when
check_signature
inglidein_startup
is not defined get_tarballs
also looks for HTCondor tarballs in the update directory
- hosted-ce-tools 2.1
cvmfsexec-osg-wrapper
now detects Red Hat Enterprise Linux as RHEL-like
July 17, 2024: HTCondor-CE 23.0.12, IGTF 1.130; Upcoming: osdf-server 7.9.3¶
- HTCondor-CE 23.0.12
- Fix whole node GPU request expression for non-HTCondor batch systems
- CA certificates based on IGTF 1.130
- osg-ca-certs version number matches igft-ca-certs version number
- resolve subjectDN nameformat compatibility issues trust anchor metadata
- Upcoming
- osdf-server 7.9.3
- Updated to upstream Pelican 7.9.3
- Added logrotate config
- Raised minimum XRootD version requirement to 5.6.9-1.6
- osdf-server 7.9.3
June 27, 2024: IGTF 1.129, osg-configure 4.2.0; Upcoming: HTCondor 23.8.1¶
- CA certificates based on IGTF 1.129
- Updated CRL URL location for MREN CA (ME)
- Removed discontinued TSU-GE GRENA CA (GE)
- Removed suspended BYGCA (BY)
- Removed discontinued LIP CA (PT)
- Removed obsolete DT transitional CAs (AE)
- Additions to OSG CA Bundle (osg-ca-certs)
- Add Let's Encrypt Intermediate CAs to support XRootD
- Add Let's Encrypt root CA (ISRG Root X2)
- osg-configure 4.2.0
- Add "queue" to
OSG_ResourceCatalog
for Pilot sections - Remove osg-configure-rsv
- Add "queue" to
- Upcoming
- HTCondor 23.8.1
- HTCondor Docker images are now based on Alma Linux 9
- HTCondor Docker images are now available for the arm64 CPU architecture
- The user can now choose which submit method DAGMan will use
- Can add custom attributes to the User ClassAd with
condor_qusers -edit
- Add use-projection option to
condor_gangliad
to reduce memory footprint - Fix bug where interactive submit does not work on cgroup v2 systems (EL9)
- HTCondor 23.8.1
June 13, 2024: HTCondor 23.0.12¶
- HTCondor 23.0.12 LTS
- Remote
condor_history
queries now work the same as local queries - Improve error handling when submitting to a remote scheduler via ssh
- Fix bug on Windows where
condor_procd
may crash when suspending a job - Fix Python binding crash when submitting a DAG which has empty lines
- Remote
June 11, 2024: XRootD 5.6.9-1.6¶
- XRootD 5.6.9-1.6
- Add
gateway timeout
error code for unresponsive origins - Add g-stream monitoring for I/O time
- Add ability to disable or defer TLS authentication
- Fix timers used for I/O throttling
- Add
May 16, 2024: VOMS 2.1.0-0.31.rc3.2; Upcoming: HTCondor 23.7.2, Pelican 7.8.2¶
- VOMS 2.1.0-0.31.rc3.2
- Fix
voms-proxy-init
incompatibility with new LHC IAM servers
- Fix
- Upcoming
- HTCondor 23.7.2
- Warns about deprecated multiple
queue
statements in a submit file - The semantics of
skip_if_dataflow
have been improved - Removing large DAGs is now non-blocking, preserving schedd performance
- Periodic policy expressions are now checked during input file transfer
- Local universe jobs can now specify a container image
- File transfer plugins can now advertise extra attributes
- DAGMan can rescue and abort if pending jobs are missing from the job queue
- Fix so
condor_submit -interactive
works on cgroup v2 execution points
- Warns about deprecated multiple
- Pelican 7.8.2
- HTCondor 23.7.2
May 9, 2024: VO Package v136¶
- VO Package v136
- Transition to new IAM-based VOMS signing servers for LHC experiments
- HTCondor 23.0.10 LTS
- Preliminary support for Ubuntu 22.04 (Noble Numbat)
- Warns about deprecated multiple queue statements in a submit file
- Fix bug where plugins could not signify to retry a file transfer
- The
condor_upgrade_check
script checks for proper token file permissions - Fix bug where the
condor_upgrade_check
script crashes on older platforms - The bundled version of apptainer was moved to libexec in the tarball
- XRootD 5.6.9-1.3:
- Add g-stream monitoring for IO time for Pelican
- CVMFS 2.11.3
- Update method of downloading the MaxMind GeoIP, including requiring new configuration parameter
CVMFS_GEO_ACCOUNT_ID
- Update method of downloading the MaxMind GeoIP, including requiring new configuration parameter
May 2, 2024: XCache 3.7.0, osg-xrootd 23-6¶
- XCache 3.7.0 and osg-xrootd 23-6
- Security update for OSDF caches and origins
- Require explicit mapping of DNs to avoid hash collisions
- Get mappings for cache and origin DNs from Topology
- Security update for OSDF caches and origins
April 15, 2024: Upcoming: HTCondor 23.6.1¶
- Upcoming
- HTCondor 23.6.1
- Add the ability to force vanilla universe jobs to run in a container
- Add the ability to override the entrypoint for a Docker image
condor_q -better-analyze
includes units for memory and disk quantities
- HTCondor 23.6.1
April 11, 2024: HTCondor 23.0.8 LTS, HTCondor-CE 23.0.8¶
- HTCondor 23.0.8 LTS
- Fix bug where ssh-agent processes were leaked with grid universe jobs
- Fix DAGMan crash when a provisioner node was given a parent
- Fix bug that prevented use of ftp: URLs in file transfer
- Fix bug where jobs that matched an offline slot never start
- HTCondor-CE 23.0.8
- Fix memory request being ignored for whole node jobs
April 4, 2024: XRootD 5.6.9¶
- XRootD 5.6.9
- Various minor bug fixes; see upstream release notes for details
March 21, 2024: osg-scitokens-mapfile 13-2, vo-client 135-1¶
- osg-scitokens-mapfile 13-2
- Add the new CERN IAM instances for ATLAS and CMS to the default CE token to local user mapfiles
- vo-client 135-1
- Adds LSC files for new LHC IAM hosts for ALICE, ATLAS, CMS, DTEAM, and LHCb
March 14, 2024: IGTF 1.128, osg-xrootd 23-5, HTCondor 23.0.6 LTS, HTCondor-CE 23.0.6; Upcoming: HTCondor 23.5.2¶
- CA certificates based on IGTF 1.128
- Update CRL download URL for ArmeSFo (AM)
- osg-xrootd 23-5
- Automatically log DN of incoming user
- HTCondor 23.0.6 LTS
- Fix DAGMan where descendants of removed retry-able jobs are marked futile
- Ensure the
condor_test_token
works correctly when invoked as root - Fix bug where empty multi-line values could cause a crash
- Return proper exit code in
condor_qusers
for errors in formatting options - Fix crash in job router when a job transform is missing an argument
- Upcoming
- HTCondor 23.5.2
- Disable old ClassAd-based syntax by default for the job router
- Add ability to use LVM partitions to efficiently manage/enforce disk space
- Enable GPU discovery on all Execution Points by default
- Use cgroups v1 enforcement to prevent accessing unallocated GPUs
- Add new
condor_submit
commands for constraining GPU properties - Add ability to transfer EP's starter log back to the Access Point
- Enable use of VOMS attributes when mapping identities of SSL connections
- Add the Git SHA of the HTCondor sources to the CondorVersion string
- HTCondor 23.5.2
February 29, 2024: XRootD 5.6.8¶
- XRootD 5.6.8
- Fix automatic renewal of server certificate with OpenSSL>=1.1
- Other minor bug fixes
February 27, 2024: VO Package v134, osg-pki-tools 3.7.1, osg-xrootd 3.6-22, GlideinWMS 3.10.6¶
- VO Package v134
- Update OSG VOMS certificate used by the LIGO VO
- osg-pki-tools 3.7.1
- Fix
osg-incommon-cert-request
to work on Enterprise Linux 9
- Fix
- osg-xrootd 3.6-22
- Enable HTTP directory listings for authenticated caches and all origins
February 22, 2024: XRootD 5.6.7, xrdcl-pelican 0.9.3, IGTF 1.127, GlideinWMS 3.10.6, VOMS 2.10.0-0.31.rc3.1; Upcoming: osg-token-renewer 0.9.0, oidc-agent 5.1.0, osdf-server 7.5.6¶
- XRootD 5.6.7
- Add pelican:// support
- Fix potential segmentation fault in third-party copy
- xrdcl-pelican 0.9.3
- A Pelican platform-based plugin for the XrdCl interface
- CA certificates based on IGTF 1.127
- added supplementary issuing CA Issuing CA IGTF - C5 - 1 for eMudhra (IN)
- removed discontinued QuoVadis CAs: QuoVadis-Grid-ICA-G2, QuoVadis-Root-CA2G3, QuoVadis-Root-CA2, and QuoVadis-Root-CA3G3 (BM)
- VOMS 2.10.0-0.31.rc3.1
- Rebuild with latest source to get Enterprise Linux 9 support
- GlideinWMS 3.10.6: Enterprise Linux 9 only
- Knobs to overload memory and CPU
- HTCondor tarball downloader
- Advertising of Factory's HTCondor submit parameters
- Fixed match policy_file import failure
- Fixed syntax error in ClassAd used for gangliad configuration
- Fixed writing of missing dict files during upgrade
- Upcoming
- osg-token-renewer 0.9.0
- Utilize oidc-agent 5.1.0 to use new '--skip-check' option
- oidc-agent 5.1.0
- Fix issue where osg-token-renewer would get 'No scopes found' error
- Note: This is in upcoming because it requires redoing OIDC token authentication for any existing refresh tokens
- osdf-server 7.5.6
- osg-token-renewer 0.9.0
February 8, 2024: Frontier-squid 5.9-2.1, HTCondor 23.0.4, htvault-config 1.16, vault 1.15.4, osg-configure 4.1.1-3; Upcoming: HTCondor 23.4.0, Pelican 7.5.0¶
- Frontier-squid 5.9-2.1
- Fixed several security vulnerabilities
- Improved support for SELinux
- HTCondor 23.0.4 LTS
NVIDIA_VISIBLE_DEVICES
environment variable lists full uuid of slot GPUs- Fix problem where some container jobs would see GPUs not assigned to them
- Restore condor keyboard monitoring that was broken since HTCondor 23.0.0
- In
condor_adstash
, the search engine timeouts now apply to all operations - Ensure the prerequisite perl modules are installed for
condor_gather_info
- htvault-config 1.16
- Support rate limits
- Support '@' in ssh authentication key names
- vault 1.15.4
- Update to latest upstream version
- osg-configure 4.1.1-3
- Create necessary directories for CE on Enterprise Linux 8 and 9
- Upcoming
- HTCondor 23.4.0
condor_submit
warns about unit-lessrequest_disk
andrequest_memory
- Separate
condor-credmon-local
RPM package provides local SciTokens issuer - Fix bug where
NEGOTIATOR_SLOT_CONSTRAINT
was ignored since version 23.3.0 - The
htcondor
command line tool can process multiple event logs at once - Prevent Docker daemon from keeping a duplicate copy of the job's stdout
- Pelican 7.5.0
- The plugin now downloads files in parallel
- Improved file unpacking
- Origins now support public namespaces
- HTCondor 23.4.0
January 4, 2024: IGTF 1.126, ospool-ep 1.0¶
- CA certificates based on IGTF 1.126
- Removed replaced InCommon IGTF Server CA and associated Comodo RSA CA (US)
- Removed discontinued UNLPGrid CA (CL)
- ospool-ep 1.0
December 14, 2023: XRootD 5.6.4, XCache 3.6.0, xrootd-multiuser 2.2.0¶
- XRootD 5.6.4
- Fix segfault with macaroons
- Fix segfault if pss.origin uses https protocol with no port
- Switch from using a certificate file to a certificate chain file
- XCache 3.6.0
- Allow overriding redirector in caches with the environment variable
XC_REDIRECTOR
- Allow adding local additions to
Authfile
andscitokens.conf
file in/etc/xrootd
- Allow overriding redirector in caches with the environment variable
- xrootd-multiuser 2.2.0
- Add ability to enable/disable xrootd-multiuser with the
XC_ENABLE_MULTIUSER
environment variable
- Add ability to enable/disable xrootd-multiuser with the
November 30, 2023: VO Package v133, IGTF 1.125¶
- VO Package v133
- Update certificates for FNAL and GlueX VOMS servers
- CA certificates based on IGTF 1.125
- Updated root certificate ArmeSFo CA with extended validity (AM)
November 16, 2023: VO Package v132, XRootD 5.6.3, osg-ce 23-2, HTCondor-CE 23.0.1, osg-system-profiler 1.7.0¶
- VO Package v132
- Update certificates for FNAL and SLAC VOMS servers
- Update certificates for CLAS12, EIC, GLOW, and HCC
- Drop stale certificates for nanohub, STAR, and wisc.edu lz
- XRootD 5.6.3
- Fix parsing of chunked PUT requests
- Add HTTP TPC packet marking
- Differentiate between push and pull TPC error messages
- Use configured CA path for the SciTokens plugin
- osg-ce meta package
- Correctly set value of
OSG_RELEASE_SERIES
attribute for OSG 23
- Correctly set value of
- HTCondor-CE 23.0.1
- Add
condor_ce_test_token
command
- Add
- osg-system-profiler 1.7.0
- Add system cryptographic policy
- Better XRootD configuration information for generated profile
November 2, 2023: IGTF 1.124, CVMFS 2.11.2, cvmfs-x509-helper 2.4¶
- CA certificates based on IGTF 1.124
- Updated contact meta-data for ArmeSFo authority (AM)
- Removed discontinued AEGIS authority (RS)
- Removed suspended KENET Root and issuing CAs (KE)
- Removed suspended SDG-G2 authority (CN)
- Removed suspended CNIC authority (CN)
- Removed all four discontinued DigitalTrust CAs operated by their issuer (AE)
- CVMFS 2.11.2
- Bug fix release
- cvmfs-x509-helper 2.4
- Important bug fix for reading credentials from within an unprivileged user namespace such as unprivileged apptainer users. This is needed due to a change in recent el8 & el9 kernels.
October 31, 2023: HTCondor 23.0.1 LTS; Upcoming: HTCondor 23.1.0¶
- HTCondor 23.0.1 LTS
- Update to apptainer version 1.2.4 in the HTCondor tarballs
- Fix 10.6.0 bug that broke PID namespaces
- Fix bug where execution times for ARC CE jobs were 60 times too large
- Fix bug where a failed 'Service' node would crash DAGMan
- Condor-C and Job Router jobs now get resources provisioned updates
- Upcoming: HTCondor 23.1.0
- Enhanced filtering with
condor_watch_q
- The Access Point can now be told to use a non-standard ssh port when sending jobs to a remote scheduling system (such as Slurm)
- Laid groundwork to allow an Execution Point running without root access to accurately limit the job's usage of CPU and Memory in real time via Linux kernel cgroups; this is particularly interesting for glidein pools
- HTCondor file transfers using HTTPS can now utilize CA certificates in a non-standard location
- All the fixes from HTCondor 23.0.1
- Enhanced filtering with
October 26, 2023: CVMFS 2.11.1-1.3, XRootD 5.6.2-2.3, osg-update-vos 1.4.2-2¶
- CVMFS 2.11.1-1.3
- Important fix to bug impacting osgstorage.org repositories introduced in 2.11.0 -- all 2.11.0 installations should upgrade urgently
- Fix race conditions on concurrent fuse3 mounts
- XRootD 5.6.2-2.3
- Update to -2.3 release to avoid confusion with upstream -2 release
- Fix a bug with parsing compound IDs in authfiles
- osg-update-vos 1.4.2-2
- tarballs now contain cpio, so osg-update-vos will work
October 3, 2023: Initial Release¶
OSG 3.6 retirement
As part of our transition to our new series release cadence, we are planning to end support for OSG 3.6 on 30 June 2024 to align with the EL7 end-of-life. See our release series life-cycle table for details.
The initial release of OSG 23 contains major package updates, package removals, and new container images. All other packages may have received minor version and/or packaging updates compared to OSG 3.6.
Major package updates¶
This release contains the following major package updates compared to the current OSG 3.6 release:
-
HTCondor 23.0.0: an update from 10.0.8 in OSG 3.6 main and 10.8.0 in OSG 3.6 upcoming.
- New features
- A
condor_startd
without any slot types defined will now default to a single partitionable slot rather than a number of static slots equal to the number of cores as it was in previous versions. The configuration template useFEATURE : StaticSlots
was added for admins wanting the old behavior. - The
TargetType
attribute is no longer a required attribute in most Classads. It is still used for queries to thecondor_collector
and it remains in the Job ClassAd and the Machine ClassAd because of older versions of HTCondor require it to be present. - The
-dry-run option
ofcondor_submit
will now print the output of aSEC_CREDENTIAL_STORER script
. This can be useful when developing such a script. - Added ability to query epoch history records from the python bindings.
- The default value of
SEC_DEFAULT_AUTHENTICATION_METHODS
will now be visible incondor_config_val
. The default forSEC_*_AUTHENTICATION_METHODS will
inherit from this value, and thus noREAD
andCLIENT
will no longer automatically haveCLAIMTOBE
. - Added new tool
condor_test_token
, which will create a SciToken with configurable contents (including issuer) which will be accepted for a short period of time by the local HTCondor daemons.
- A
- Bug fixes
- Fixed a bug that would cause the condor_startd to crash in rare cases when jobs go on hold
- Fixed a bug where if a user-level checkpoint could not be transferred from the starter to the AP, the job would go on hold Now it will retry, or go back to idle
- Fixed a bug where the
CommittedTime
attribute was not set correctly for Docker Universe jobs doing user level check-pointing - Fixed a bug where
condor_preen
was deleting files named 'OfflineAds' in the spool directory - Fixed a bug where the blahpd would incorrectly believe that an LSF batch scheduler was not working
- Fixed the Execution Point’s detection of whether libvirt is working properly for the VM universe
- Fixed a bug where container universe did not work for late materialization jobs submitted to the
condor_schedd
- Fixed a bug where the condor_startd could crash if a new match is made at the end a drain request
- New features
-
HTCondor-CE 23.0.0: an update from 6.0.0 in OSG 3.6 main.
Job router configuration deprecation
The configuration macros
JOB_ROUTER_DEFAULTS
,JOB_ROUTER_ENTRIES
,JOB_ROUTER_ENTRIES_CMD
, andJOB_ROUTER_ENTRIES_FILE
are deprecated and will be removed for V24 of HTCondor. New configuration syntax for the job router is defined usingJOB_ROUTER_ROUTE_NAMES
andJOB_ROUTER_ROUTE_<name>
. Note: The removal will occur during the lifetime of the HTCondor V23 feature series, i.e. the versions that will be available in OSG upcoming repositories.- Adds deprecation warnings for old job router configuration syntax
- Adds grid CA and host certificate/key locations to default SSL search paths
- Verifies that HTCondor-CE can access the local HTCondor's
SPOOL
directory on startup condor_ce_upgrade_check
checks compatibility with HTCondor 23- Adds an option to allow running
condor_ce_trace
without a SciToken for testing batch system integration
-
XRootD 5.6.2: an update from XRootD 5.5.5 in OSG 3.6 main.
- New Features
- Add xrdfs cache subcommand to allow for cache evictions
- Better handling of unicode strings in the API
- Add gsi option to display DN when it differs from entity name
- Allow specfication of minimum and maximum creation mode
- Make maxfd be configurable (default is 256k)
- Include token information in the monitoring stream (phase 1)
- Implement a file evict function
- Increase default number of parallel event loops to 10
- xrdcp: number of parallel copy jobs increased from 4 to 128
- Allow XRootD to return trailers indicating failure
- Denote Accept-Ranges in HEAD response
- Report cache object age for caching proxy mode
- Allow origin to be a directory of a locally mounted file system
- Implement ability to have the token username as a separate claim
- Use SHA-256 for signatures, and message digest algorithm
- Allow option '-tokenlib none' to disable token validation
- Allow to point to a token file using CGI
'?xrd.ztn=tokenfile'
- Major bug fixes
- Fix SEGV in case request has object for opaque data but no content
- Fix memory leaks in GSI authentication
- Fix chunked PUT creating empty files
- New Features
-
GlideinWMS 3.10.5: an update from 3.10.1 in OSG 3.6 main
If you are using custom setup scripts...
If you are using custom setup scripts please change the use of
glidein_config
:- Custom scripts should always read values via
gconfig_get()
. The only exception is the parsing of the line to get theadd_config_line
source file. add_config_line
is deprecated in favor ofgconfig_add
.add_config_line
will be removed from future versions.add_config_line_safe
is deprecated in favor ofgconfig_add_safe
.gconfig_add
is the recommended method to use also in concurrent scripts.- Custom scripts in Python should
import gconfig.py
(compatible with both Python 2 and 3) and use the provided functions or classes:gconfig_get
,gconfig_add
, etc.
- This release completes EL9 and Python 3.9 support
- Added structured logging
- Various OSG_Autoconf improvements
- Fixed bugs with Python 3.9 and rrdtools failures with missing ClassAds and monitoring
- Custom scripts should always read values via
Package Removals¶
The following packages were removed from OSG 23 compared to OSG 3.6:
blahp
: available as part of thecondor
packageoidc-agent
: available in EPELpython-jwt
: available in EPELpython-scitokens
: available in EPELrrdtool
available from OS repositories
Container Images¶
The following container images have new tags for OSG 23:
Image name | Tags |
---|---|
hub.opensciencegrid.org/opensciencegrid/atlas-xcache |
23-release , 23-testing |
hub.opensciencegrid.org/opensciencegrid/cms-xcache |
23-release , 23-testing |
hub.opensciencegrid.org/opensciencegrid/frontier-squid |
23-release , 23-testing |
hub.opensciencegrid.org/opensciencegrid/oidc-agent |
23-release , 23-testing |
hub.opensciencegrid.org/opensciencegrid/osgvo-docker-pilot |
23-release , 23-testing |
hub.opensciencegrid.org/opensciencegrid/stash-cache |
23-release , 23-testing |
hub.opensciencegrid.org/opensciencegrid/stash-origin |
23-release , 23-testing |
For example, to retreive an OSG 23 backfill container image, run the following command:
docker pull hub.opensciencegrid.org/opensciencegrid/osgvo-docker-pilot:23-release
For more details on OSG container images, see our policy document.
Announcements¶
Updates to critical packages also announced by email and are sent to the following recipients and lists: