The Pleiades IT Security protocols require us to control the workloads that are submitted to Pleiades and have traceability back to the user that submitted the jobs. To support this, we need to insert a call to the NAS Secure Unattended Proxy (SUP) tool to run commands on Pleiades. The WPS-T endpoint implementations need to be updated to use the SUP tool to run the necessary commands on Pleiades. These commands are singularity,qsub, qstat, and qdel.
Definition of Done:
[ ] New SUP-based ADES-PBS works as intended with the SUP calls
[ ] Documentation provided
[ ] Github repo commits provided
[ ] Live demo provided showing all of the WPS-T endpoints working as intended and connecting to Pleiades as needed.
The Pleiades IT Security protocols require us to control the workloads that are submitted to Pleiades and have traceability back to the user that submitted the jobs. To support this, we need to insert a call to the NAS Secure Unattended Proxy (SUP) tool to run commands on Pleiades. The WPS-T endpoint implementations need to be updated to use the SUP tool to run the necessary commands on Pleiades. These commands are
singularity
,qsub
,qstat
, andqdel
.Definition of Done: