Lines Matching refs:config
51 namespace config = utils::config;
67 static optional< config::tree > defaults;
71 class bytes_node : public config::native_leaf_node< units::bytes > {
101 class delta_node : public config::typed_leaf_node< datetime::delta > {
126 throw config::value_error(F("Invalid time delta %s") % raw_value); in set_string()
162 class user_node : public config::string_node {
183 throw config::value_error("Invalid required user value"); in validate()
193 class paths_set_node : public config::base_set_node< fs::path > {
218 throw config::value_error(e.what()); in parse_one()
234 throw config::value_error(F("Relative path '%s' not allowed") % in validate()
245 init_tree(config::tree& tree) in init_tree()
247 tree.define< config::strings_set_node >("allowed_architectures"); in init_tree()
248 tree.define< config::strings_set_node >("allowed_platforms"); in init_tree()
250 tree.define< config::string_node >("description"); in init_tree()
251 tree.define< config::string_node >("execenv"); in init_tree()
252 tree.define< config::string_node >("execenv_jail_params"); in init_tree()
253 tree.define< config::bool_node >("has_cleanup"); in init_tree()
254 tree.define< config::bool_node >("is_exclusive"); in init_tree()
255 tree.define< config::strings_set_node >("required_configs"); in init_tree()
269 set_defaults(config::tree& tree) in set_defaults()
271 tree.set< config::strings_set_node >("allowed_architectures", in set_defaults()
273 tree.set< config::strings_set_node >("allowed_platforms", in set_defaults()
275 tree.set< config::string_node >("description", ""); in set_defaults()
276 tree.set< config::string_node >("execenv", ""); in set_defaults()
277 tree.set< config::string_node >("execenv_jail_params", ""); in set_defaults()
278 tree.set< config::bool_node >("has_cleanup", false); in set_defaults()
279 tree.set< config::bool_node >("is_exclusive", false); in set_defaults()
280 tree.set< config::strings_set_node >("required_configs", in set_defaults()
297 const config::tree&
301 config::tree props; in get_defaults()
321 lookup_rw(config::tree& tree, const std::string& key) in lookup_rw()
325 } catch (const config::unknown_key_error& e) { in lookup_rw()
327 } catch (const config::value_error& e) { in lookup_rw()
344 set(config::tree& tree, const std::string& key, in set()
349 } catch (const config::unknown_key_error& e) { in set()
351 } catch (const config::value_error& e) { in set()
364 config::tree props;
369 impl(const utils::config::tree& props_) : in impl()
391 model::metadata::metadata(const utils::config::tree& props) : in metadata()
423 return _pimpl->props.lookup< config::strings_set_node >( in allowed_architectures()
426 return get_defaults().lookup< config::strings_set_node >( in allowed_architectures()
439 return _pimpl->props.lookup< config::strings_set_node >( in allowed_platforms()
442 return get_defaults().lookup< config::strings_set_node >( in allowed_platforms()
465 return _pimpl->props.lookup< config::string_node >("description"); in description()
467 return get_defaults().lookup< config::string_node >("description"); in description()
479 return _pimpl->props.lookup< config::string_node >("execenv"); in execenv()
481 return get_defaults().lookup< config::string_node >("execenv"); in execenv()
493 return _pimpl->props.lookup< config::string_node >( in execenv_jail_params()
496 return get_defaults().lookup< config::string_node >( in execenv_jail_params()
509 return _pimpl->props.lookup< config::bool_node >("has_cleanup"); in has_cleanup()
511 return get_defaults().lookup< config::bool_node >("has_cleanup"); in has_cleanup()
535 return _pimpl->props.lookup< config::bool_node >("is_exclusive"); in is_exclusive()
537 return get_defaults().lookup< config::bool_node >("is_exclusive"); in is_exclusive()
549 return _pimpl->props.lookup< config::strings_set_node >( in required_configs()
552 return get_defaults().lookup< config::strings_set_node >( in required_configs()
649 const config::tree fully_specified = get_defaults().combine(_pimpl->props); in to_properties()
708 config::tree props;
762 _pimpl->props.set< config::strings_set_node >( in add_allowed_architecture()
764 get_defaults().lookup< config::strings_set_node >( in add_allowed_architecture()
767 lookup_rw< config::strings_set_node >( in add_allowed_architecture()
784 _pimpl->props.set< config::strings_set_node >( in add_allowed_platform()
786 get_defaults().lookup< config::strings_set_node >( in add_allowed_platform()
789 lookup_rw< config::strings_set_node >( in add_allowed_platform()
823 _pimpl->props.set< config::strings_set_node >( in add_required_config()
825 get_defaults().lookup< config::strings_set_node >( in add_required_config()
828 lookup_rw< config::strings_set_node >( in add_required_config()
886 set< config::strings_set_node >(_pimpl->props, "allowed_architectures", as); in set_allowed_architectures()
901 set< config::strings_set_node >(_pimpl->props, "allowed_platforms", ps); in set_allowed_platforms()
934 set< config::string_node >(_pimpl->props, "description", description); in set_description()
949 set< config::string_node >(_pimpl->props, "execenv", name); in set_execenv()
964 set< config::string_node >(_pimpl->props, "execenv_jail_params", params); in set_execenv_jail_params()
979 set< config::bool_node >(_pimpl->props, "has_cleanup", cleanup); in set_has_cleanup()
994 set< config::bool_node >(_pimpl->props, "is_exclusive", exclusive); in set_is_exclusive()
1009 set< config::strings_set_node >(_pimpl->props, "required_configs", vars); in set_required_configs()
1103 } catch (const config::unknown_key_error& e) { in set_string()
1105 } catch (const config::value_error& e) { in set_string()