Elektra
0.8.19
|
The @ handles operating system dependent tasks. One task is the resolving of the filenames for user and system (hence its name).
Use following command to see to which file is resolved to:
kdb file <Elektra path you are interested in>
See the constants of this plugin for further information, they are:
system/elektra/modules/@PLUGIN_SHORT_NAME@/constants system/elektra/modules/@PLUGIN_SHORT_NAME@/constants/ELEKTRA_VARIANT_SYSTEM system/elektra/modules/@PLUGIN_SHORT_NAME@/constants/ELEKTRA_VARIANT_USER system/elektra/modules/@PLUGIN_SHORT_NAME@/constants/KDB_DB_HOME system/elektra/modules/@PLUGIN_SHORT_NAME@/constants/KDB_DB_SYSTEM system/elektra/modules/@PLUGIN_SHORT_NAME@/constants/KDB_DB_USER system/elektra/modules/@PLUGIN_SHORT_NAME@/constants/KDB_DB_SPEC system/elektra/modules/@PLUGIN_SHORT_NAME@/constants/KDB_DB_DIR
The build-in resolving considers following cases:
pwd
+ path (or above when path is found)pwd
+ KDB_DB_DIR + path (or above when path is found)(~ and pwd
are resolved from system)
For an absolute path /example.ini, you might get following values:
pwd
/example.iniFor an relative path example.ini, you might get following values:
pwd
/.dir/example.iniSee the mount tutorial for more examples.
Many variants exist that additionally influence the resolving process, typically by using environment variables.
Environment variables are very simple for one-time usage but their maintenance in start-up scripts is problematic. Additionally, they are controlled by the user, so they cannot be trusted. So it is not recommended to use environment variables.
Note that the file permissions apply, so it might be possible for non-root to modify keys in system
.
See COMPILE.md for a documentation of possible variants.
The resolver is fully XDG compatible if configured with the variant:
Additionally KDB_DB_USER
needs to be left unchanged as .config
.
XDG_CONFIG_DIRS
will be used to resolve system paths the following way:
/etc/xdg
will be used instead0. On unchanged configuration: quit successfully
We have an optimistic approach. Locking is only used to detect concurrent cooperative processes in the short moment between prepare and commit. A conflict will be raised in that situation. When processes do not lock the file it might be overwritten. This is, however, very unlikely on file systems with nanosecond precision.