1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70
|
#!/bin/sh
# PCP QA Test No. 1768
# Exercise the pmfind_check(1) utility.
#
# Copyright (c) 2020 Red Hat. All Rights Reserved.
#
seq=`basename $0`
echo "QA output created by $seq"
# get standard environment, filters and checks
. ./common.product
. ./common.filter
. ./common.check
_cleanup()
{
cd $here
_restore_config $PCP_ETC_DIR/pcp/pmlogger/class.d
$sudo rm -rf $tmp $tmp.*
}
status=1 # failure is the default!
trap "_cleanup; exit \$status" 0 1 2 3 15
# this test requires only the pmfind policy class is in place
#
_save_config $PCP_ETC_DIR/pcp/pmlogger/class.d
for policy in $PCP_ETC_DIR/pcp/pmlogger/class.d/*
do
case "$policy"
in
*/pmfind) ;;
*) $sudo rm -f "$policy"
;;
esac
done
_filter()
{
sed \
-e '/^# created by pmlogctl/s/ on .*/ on DATE/' \
-e '/^# created by pmiectl/s/ on .*/ on DATE/' \
-e "s;$PCP_TMPFILE_DIR/pmlogctl\.[^/]*;PCP_TMPFILE_DIR/pmlogctl.XXXXX;g" \
-e "s;$PCP_TMPFILE_DIR/pmiectl\.[^/]*;PCP_TMPFILE_DIR/pmiectl.XXXXX;g" \
-e "s;$PCP_BINADM_DIR/;PCP_BINADM_DIR/;g" \
-e "s;$PCP_ETC_DIR/;PCP_ETC_DIR/;g" \
#end
}
# create a script to produce test data
cat >$tmp.pmfind << EOF
#!/bin/sh
cat $tmp.found
EOF
# and some test data for it to produce
cat >$tmp.found <<EOF
243f90596d76cf23e8da47476ec452a2adbe0b32 pcp://slick:44321
8d00c4cf51d11bb9dced8a0e7507542653635377 pcp://slack:44321
7745e45ed37ca712f418ec7b871c04fc898b9276 pcp://localhost:44321?container=b0cd2cc912a3
68dcffbdd4111d3ee82bb855286e3e35da828ca2 pcp://localhost:44321?container=77475e5fa09c
EOF
# real QA test starts here
chmod 755 $tmp.pmfind
PMFIND=$tmp.pmfind; export PMFIND
$PCP_BINADM_DIR/pmfind_check -N -V 2>&1 | tee -a $seq_full | _filter
status=$?
exit
|