| #!/usr/bin/env expect |
| ############################################################################ |
| # Purpose: Test of Slurm functionality |
| # sacctmgr modify multiple users |
| ############################################################################ |
| # Copyright (C) 2008-2010 Lawrence Livermore National Security. |
| # Produced at Lawrence Livermore National Laboratory (cf, DISCLAIMER). |
| # Written by Joseph Donaghy <donaghy1@llnl.gov> |
| # CODE-OCEC-09-009. All rights reserved. |
| # |
| # This file is part of Slurm, a resource management program. |
| # For details, see <https://slurm.schedmd.com/>. |
| # Please also read the included file: DISCLAIMER. |
| # |
| # Slurm is free software; you can redistribute it and/or modify it under |
| # the terms of the GNU General Public License as published by the Free |
| # Software Foundation; either version 2 of the License, or (at your option) |
| # any later version. |
| # |
| # Slurm is distributed in the hope that it will be useful, but WITHOUT ANY |
| # WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS |
| # FOR A PARTICULAR PURPOSE. See the GNU General Public License for more |
| # details. |
| # |
| # You should have received a copy of the GNU General Public License along |
| # with Slurm; if not, write to the Free Software Foundation, Inc., |
| # 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. |
| ############################################################################ |
| source ./globals_accounting |
| |
| set tc1 "${test_name}-cluster-1" |
| set tc2 "${test_name}-cluster-2" |
| set tc3 "${test_name}-cluster-3" |
| set ta1 "${test_name}-account.1" |
| set ta2 "${test_name}-account.2" |
| set ta3 "${test_name}-account.3" |
| set tu1 "${test_name}-user.1" |
| set tu2 "${test_name}-user.2" |
| set tu3 "${test_name}-user.3" |
| set access_err 0 |
| |
| # Cluster |
| array set clus_req {} |
| |
| # Accounts |
| array set acct_req {} |
| set acct_req(cluster) $tc1,$tc2,$tc3 |
| |
| # User |
| array set user_req {} |
| set user_req(cluster) $tc1,$tc2,$tc3 |
| set user_req(account) $ta1,$ta2,$ta3 |
| |
| # Mod User 1 |
| array set user_mod_info {} |
| set user_mod_info(cluster) $tc1,$tc2,$tc3 |
| array set user_mod_acct { |
| adminlevel Operator |
| } |
| set user_mod_acct(defaultaccount) $ta2 |
| array set user_mod_assoc {} |
| |
| # Mod User 2 |
| array set user_mod_info2 {} |
| set user_mod_info2(cluster) $tc1,$tc2,$tc3 |
| array set user_mod_acct2 { |
| adminlevel Administrator |
| } |
| set user_mod_acct2(defaultaccount) "'$ta3'" |
| array set user_mod_assoc2 {} |
| |
| # Mod User 3 |
| array set user_mod_info3 {} |
| set user_mod_info3(cluster) $tc1,$tc2 |
| array set user_mod_acct3 {} |
| array set user_mod_assoc3 { |
| fairshare 1700 |
| maxcpumin 700000 |
| maxjob 70 |
| maxnode 700 |
| maxwall 00:07:00 |
| } |
| |
| # Mod User 4 |
| array set user_mod_info4 {} |
| set user_mod_info4(cluster) $tc1,$tc2 |
| array set user_mod_acct4 {} |
| array set user_mod_assoc4 { |
| fairshare 1 |
| maxcpumin 1 |
| maxjob 1 |
| maxnode 1 |
| maxwall 00:01:00 |
| } |
| |
| |
| set timeout 60 |
| |
| # |
| # Check accounting config and bail if not found. |
| # |
| if {[get_config_param "AccountingStorageType"] ne "accounting_storage/slurmdbd"} { |
| skip "This test can't be run without a usable AccountStorageType" |
| } |
| |
| if {[get_admin_level] ne "Administrator"} { |
| skip "This test can't be run without being an Accounting administrator.\nUse: sacctmgr mod user \$USER set admin=admin" |
| } |
| |
| proc cleanup {} { |
| global ta1 ta2 ta3 tc1 tc2 tc3 tu1 tu2 tu3 |
| |
| remove_user "" "" "$tu1,$tu2,$tu3" |
| remove_acct "" "$ta1,$ta2,$ta3" |
| remove_cluster "$tc1,$tc2,$tc3" |
| } |
| |
| # Make sure we have a clean system and permission to do this work |
| cleanup |
| if {$access_err != 0} { |
| skip "Not authorized to perform this test" |
| } |
| |
| # Add cluster |
| if [add_cluster "$tc1,$tc2,$tc3" [array get clus_req]] { |
| fail "Unable to add clusters ($tc1,$tc2,$tc3)" |
| } |
| |
| # Add accounts |
| if [add_acct "$ta1,$ta2,$ta3" [array get acct_req]] { |
| fail "Unable to add accounts ($ta1,$ta2,$ta3)" |
| } |
| |
| # Add users |
| if [add_user "$tu1,$tu2,$tu3" [array get user_req]] { |
| fail "Unable to add users ($tu1,$tu2,$tu3)" |
| } |
| |
| # First test change the AdminLevel and DefaultAccount of the accounts |
| |
| if [mod_user "$tu1,$tu2,$tu3" [array get user_mod_info] [array get user_mod_acct] [array get user_mod_assoc]] { |
| fail "Unable to modify users ($tu1,$tu2,$tu3)" |
| } |
| |
| # |
| # Use sacctmgr to list the test account modifications |
| # |
| set matches 0 |
| spawn $sacctmgr -n -p list user names=$tu1,$tu2,$tu3 format="User,DefaultA,Admin" cluster=$tc1 |
| expect { |
| -re "There was a problem" { |
| fail "There was a problem with the sacctmgr command" |
| } |
| -re "($tu1|$tu2|$tu3).$ta2.$user_mod_acct(adminlevel)." { |
| incr matches |
| exp_continue |
| } |
| timeout { |
| fail "sacctmgr list associations not responding" |
| } |
| eof { |
| wait |
| } |
| } |
| |
| if {$matches != 3} { |
| fail "Account modification 3 incorrect ($matches != 3)" |
| } |
| |
| # Test change the AdminLevel and DefaultAccount of two accounts |
| |
| if [mod_user "$tu1,$tu3" [array get user_mod_info2] [array get user_mod_acct2] [array get user_mod_assoc2]] { |
| fail "Unable to modify users ($tu1,$tu3)" |
| } |
| |
| # |
| # Use sacctmgr to list the test account modifications |
| # |
| set matches 0 |
| spawn $sacctmgr -n -p list user names=$tu1,$tu2,$tu3 format="User,DefaultA,Admin" cluster=$tc1 |
| expect { |
| -re "There was a problem" { |
| fail "There was a problem with the sacctmgr command" |
| } |
| -re "(($tu1|$tu3).$ta3.$user_mod_acct2(adminlevel).|$tu2.$ta2.$user_mod_acct(adminlevel).)" { |
| incr matches |
| exp_continue |
| } |
| timeout { |
| fail "sacctmgr list associations not responding" |
| } |
| eof { |
| wait |
| } |
| } |
| |
| if {$matches != 3} { |
| fail "Account modification 3 incorrect ($matches != 3)" |
| } |
| |
| # Next, test change the limits of the users |
| |
| if [mod_user "$tu1,$tu2,$tu3" [array get user_mod_info3] [array get user_mod_acct3] [array get user_mod_assoc3]] { |
| fail "Unable to modify users ($tu1,$tu2,$tu3)" |
| } |
| |
| # |
| # Use sacctmgr to list the test user modifications |
| # |
| set matches 0 |
| spawn $sacctmgr -n -p list assoc users=$tu1,$tu2,$tu3 format="User,Cluster,Fairshare,Maxcpum,MaxJ,MaxN,MaxW" |
| expect { |
| -re "There was a problem" { |
| fail "There was a problem with the sacctmgr command" |
| } |
| -re "(($tu1|$tu2|$tu3).($tc1|$tc2).$user_mod_assoc3(fairshare).$user_mod_assoc3(maxcpumin).$user_mod_assoc3(maxjob).$user_mod_assoc3(maxnode).$user_mod_assoc3(maxwall).)" { |
| incr matches |
| exp_continue |
| } |
| timeout { |
| fail "sacctmgr list associations not responding" |
| } |
| eof { |
| wait |
| } |
| } |
| |
| if {$matches != 18} { |
| fail "User modification 18 incorrect ($matches != 18)" |
| } |
| |
| # Next, test change the limits of two users |
| |
| if [mod_user "$tu1,$tu3" [array get user_mod_info4] [array get user_mod_acct4] [array get user_mod_assoc4]] { |
| fail "Unable to modify users ($tu1,$tu3)" |
| } |
| |
| # |
| # Use sacctmgr to list the test user modifications |
| # |
| set matches 0 |
| eval spawn $sacctmgr -n -p list assoc user=$tu1,$tu2,$tu3 format="User,Cluster,Fairshare,Maxcpum,MaxJ,MaxN,MaxW" |
| expect { |
| -re "There was a problem" { |
| fail "There was a problem with the sacctmgr command" |
| } |
| # Any time you use () around something you need to combine all |
| # those things together since you can miss some and they be thrown away |
| -re "(($tu1|$tu3).($tc1|$tc2).$user_mod_assoc4(fairshare).$user_mod_assoc4(maxcpumin).$user_mod_assoc4(maxjob).$user_mod_assoc4(maxnode).$user_mod_assoc4(maxwall).|$tu2.($tc1|$tc2).$user_mod_assoc3(fairshare).$user_mod_assoc3(maxcpumin).$user_mod_assoc3(maxjob).$user_mod_assoc3(maxnode).$user_mod_assoc3(maxwall).)" { |
| incr matches |
| exp_continue |
| } |
| timeout { |
| fail "sacctmgr list associations not responding" |
| } |
| eof { |
| wait |
| } |
| } |
| |
| if {$matches != 18} { |
| fail "User modification 18 incorrect ($matches != 18)" |
| } |