Just a couple of small edits to the Readme requried.
The command pip install covalent-slurm-plugin[sshproxy] doesn't work in zsh (because of the square brackets). I would reccomend changing this to pip install "covalent-slurm-plugin[sshproxy]" such that it works in bash and zsh.
The instructions indicate that the command line oathtool can be used to verify secrets with the command oathtool <secret> but NERSC uses TOTP and alphanumeric strings. The correct syntax is oathtool --totp --base32 <secret>. These options aren't needed if using the Python wrapper but we are talking about the command line here.
We should have an example in the README or elsewhere which works out-of-the-box for Perlmutter (cori is decommissioned soon). The existing example will not "just work". We need to specify an account to charge and paths to keys/certs. For example, the below executor will work with conda and sshproxy:
What should we add?
Just a couple of small edits to the Readme requried.
The command
pip install covalent-slurm-plugin[sshproxy]
doesn't work inzsh
(because of the square brackets). I would reccomend changing this topip install "covalent-slurm-plugin[sshproxy]"
such that it works inbash
andzsh
.The instructions indicate that the command line
oathtool
can be used to verify secrets with the commandoathtool <secret>
but NERSC uses TOTP and alphanumeric strings. The correct syntax isoathtool --totp --base32 <secret>
. These options aren't needed if using the Python wrapper but we are talking about the command line here.We should have an example in the README or elsewhere which works out-of-the-box for Perlmutter (cori is decommissioned soon). The existing example will not "just work". We need to specify an account to charge and paths to keys/certs. For example, the below executor will work with conda and sshproxy:
Opinions @wjcunningham7 ?