Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Protect against the envar version of the Slurm custom args param #38

Merged
merged 1 commit into from
Oct 21, 2024

Commits on Oct 8, 2024

  1. Protect against the envar version of the Slurm custom args param

    Protect against the envar version of the Slurm
    custom args MCA param. This is an unfortunate
    hack that hopefully will eventually go away.
    See both of the following for detailed
    explanations and discussion:
    
    openpmix#1974
    open-mpi/ompi#12471
    
    Orgs/users wanting to add custom args to the
    internal "srun" command used to spawn the
    PRRTE daemons must do so via the default MCA
    param files (system or user), or via the
    prterun (or its proxy) cmd line
    
    Signed-off-by: Ralph Castain <rhc@pmix.org>
    (from upstream commit 28432ed)
    rhc54 authored and hppritcha committed Oct 8, 2024
    Configuration menu
    Copy the full SHA
    5c844a7 View commit details
    Browse the repository at this point in the history