1 Introduction 2 Ground Rules Building a File System 3 File Systems 4 File Content Data Structure 5 Allocation Cluster Manager 6 Exceptions and Emancipation 7 Base Classes, Testing, and More 8 File Meta Data 9 Native File Class 10 Our File System 11 Allocation Table 12 File System Support Code 13 Initializing the File System 14 Contiguous Files 15 Rebuilding the File System 16 Native File System Support Methods 17 Lookups, Wildcards, and Unicode, Oh My 18 Finishing the File System Class The Init Program 19 Hardware Abstraction and UOS Architecture 20 Init Command Mode 21 Using Our File System 22 Hardware and Device Lists 23 Fun with Stores: Partitions 24 Fun with Stores: RAID 25 Fun with Stores: RAM Disks 26 Init wrap-up The Executive 27 Overview of The Executive 28 Starting the Kernel 29 The Kernel 30 Making a Store Bootable 31 The MMC 32 The HMC 33 Loading the components 34 Using the File Processor 35 Symbols and the SSC 36 The File Processor and Device Management 37 The File Processor and File System Management 38 Finishing Executive Startup Users and Security 39 Introduction to Users and Security 40 More Fun With Stores: File Heaps 41 File Heaps, part 2 42 SysUAF 43 TUser 44 SysUAF API Terminal I/O 45 Shells and UCL 46 UOS API, the Application Side 47 UOS API, the Executive Side 48 I/O Devices 49 Streams 50 Terminal Output Filters 51 The TTerminal Class 52 Handles 53 Putting it All Together 54 Getting Terminal Input 55 QIO 56 Cooking Terminal Input 57 Putting it all together, part 2 58 Quotas and I/O UCL 59 UCL Basics 60 Symbol Substitution 61 Command execution 62 Command execution, part 2 63 Command Abbreviation 64 ASTs 65 Expressions, Part 1 66 Expressions, Part 2: Support code 67 Expressions, part 3: Parsing 68 SYS_GETJPIW and SYS_TRNLNM 69 Expressions, part 4: Evaluation UCL Lexical Functions 70 PROCESS_SCAN 71 PROCESS_SCAN, Part 2 72 TProcess updates 73 Unicode revisted 74 Lexical functions: F$CONTEXT 75 Lexical functions: F$PID 76 Lexical Functions: F$CUNITS 77 Lexical Functions: F$CVSI and F$CVUI 78 UOS Date and Time Formatting 79 Lexical Functions: F$CVTIME 80 LIB_CVTIME 81 Date/Time Contexts 82 SYS_GETTIM, LIB_Get_Timestamp, SYS_ASCTIM, and LIB_SYS_ASCTIM 83 Lexical Functions: F$DELTA_TIME 84 Lexical functions: F$DEVICE 85 SYS_DEVICE_SCAN 86 Lexical functions: F$DIRECTORY 87 Lexical functions: F$EDIT and F$ELEMENT 88 Lexical functions: F$ENVIRONMENT 89 SYS_GETUAI 90 Lexical functions: F$EXTRACT and F$IDENTIFIER 91 LIB_FAO and LIB_FAOL 92 LIB_FAO and LIB_FAOL, part 2 93 Lexical functions: F$FAO 94 File Processing Structures 95 Lexical functions: F$FILE_ATTRIBUTES 96 SYS_DISPLAY 97 Lexical functions: F$GETDVI 98 Parse_GetDVI 99 GetDVI 100 GetDVI, part 2 101 GetDVI, part 3 102 Lexical functions: F$GETJPI 103 GETJPI 104 Lexical functions: F$GETSYI 105 GETSYI 106 Lexical functions: F$INTEGER, F$LENGTH, F$LOCATE, and F$MATCH_WILD 107 Lexical function: F$PARSE 108 FILESCAN 109 SYS_PARSE 110 Lexical Functions: F$MODE, F$PRIVILEGE, and F$PROCESS 111 File Lookup Service 112 Lexical Functions: F$SEARCH 113 SYS_SEARCH 114 F$SETPRV and SYS_SETPRV 115 Lexical Functions: F$STRING, F$TIME, and F$TYPE 116 More on symbols 117 Lexical Functions: F$TRNLNM 118 SYS_TRNLNM, Part 2 119 Lexical functions: F$UNIQUE, F$USER, and F$VERIFY 120 Lexical functions: F$MESSAGE 121 TUOS_File_Wrapper 122 OPEN, CLOSE, and READ system services UCL Commands 123 WRITE 124 Symbol assignment 125 The @ command 126 @ and EXIT 127 CRELNT system service 128 DELLNT system service 129 IF...THEN...ELSE 130 Comments, labels, and GOTO 131 GOSUB and RETURN 132 CALL, SUBROUTINE, and ENDSUBROUTINE 133 ON, SET {NO}ON, and error handling 134 INQUIRE 135 SYS_WRITE Service 136 OPEN 137 CLOSE 138 DELLNM system service 139 READ 140 Command Recall 141 RECALL 142 RUN 143 LIB_RUN 144 The Data Stream Interface 145 Preparing for execution 146 EOJ and LOGOUT 147 SYS_DELPROC and LIB_GET_FOREIGN CUSPs and utilities 148 The I/O Queue 149 Timers 150 Logging in, part one 151 Logging in, part 2 152 System configuration 153 SET NODE utility 154 UUI 155 SETTERM utility 156 SETTERM utility, part 2 157 SETTERM utility, part 3 158 AUTHORIZE utility 159 AUTHORIZE utility, UI 160 AUTHORIZE utility, Access Restrictions 161 AUTHORIZE utility, Part 4 162 AUTHORIZE utility, Reporting 163 AUTHORIZE utility, Part 6 164 Authentication 165 Hashlib 166 Authenticate, Part 7 167 Logging in, part 3 168 DAY_OF_WEEK, CVT_FROM_INTERNAL_TIME, and SPAWN 169 DAY_OF_WEEK and CVT_FROM_INTERNAL_TIME 170 LIB_SPAWN 171 CREPRC 172 CREPRC, Part 2 173 COPY 174 COPY, part 2 175 COPY, part 3 176 COPY, part 4 177 LIB_Get_Default_File_Protection and LIB_Substitute_Wildcards 178 CREATESTREAM, STREAMNAME, and Set_Contiguous 179 Help Files 180 LBR Services 181 LBR Services, Part 2 182 LIBRARY utility 183 LIBRARY utility, Part 2 184 FS Services 185 FS Services, Part 2 186 Implementing Help 187 HELP 188 HELP, Part 2 189 DMG_Get_Key and LIB_Put_Formatted_Output 190 LIBRARY utility, Part 3 191 Shutting Down UOS 192 SHUTDOWN 193 WAIT 194 SETIMR 195 WAITFR and Scheduling 196 REPLY, OPCOM, and Mailboxes 197 REPLY utility 198 Mailboxes 199 BRKTHRU 200 OPCOM 201 Mailbox Services 202 Mailboxes, Part 2 203 DEFINE 204 CRELNM 205 DISABLE 206 STOP 207 OPCCRASH and SHUTDOWN 208 APPEND Glossary/Index Downloads |
SET NODE utility
In the previous article, we looked at the system configuration script. If the user
specifies a node name, we use the Before we dive into the utility in question, we have to talk a little about the way that VMS maps DCL commands onto CUSPs. VMS uses a Command Definition utility to define what commands are allowed, what options (switches) they support, and what programs they run. As we've discussed in the past, we allow a program to automatically serve as a command if its name is typed into the shell. Thus, users don't have to create command definitions in UOS. The downside is that a command that has multiple words separated by spaces (such as "SET NODE") only works if the user includes quotes around the name - otherwise, the command is assumed to be "SET" followed by a parameter "NODE". For compatibility with VMS, we don't want to enforce that kind of non-intuitive restriction, although the user can use quotes if he wishes. So, we will implement this (and some future utilities) by creating a SET.exe CUSP in the system library. This program will then automatically redirect the user to the appropriate CUSP. So we will discuss that program first. Of course, there are always many approaches to any problem and I've considered several options that I rejected in favor of the SET program that redirects to other programs. It would be tedious to go through all the possible options, but I think that examining one of the most obvious ones might be instructional. In this alternative approach, the SET program would handle all of the SET operations in a single program. Anything from SET NODE to SET TERMINAL could be handled by this program. However, this has several drawbacks. First, it would make the program huge. This would result in unnecessary use of system resources (such as memory) even for simple SET operations, and would be slower to load/run. Second, it would make the program more complex. I like the unix approach of making programs do only one thing, but have them do it well. A lack of focus in any program causes several problems, among which is the introduction of bugs. It can also be a security risk since many of the SET operations require one or more privileges. When dealing with elevated privileges, an increase in code complexity is just asking for trouble. Finally, it makes the SET command less flexible. With the approach we are taking, a system administrator could add additional SET commands, by placing new programs in sys$system. There is no such easy customization if we put everything into a single program.
Run procedure
which starts by initializing data and get the command line. Next, we extract the
switches, if any, and save them for later.
There is a standard way we are going to handle CUSPs in UOS. We've discussed a few
ways in which this is done, such as the
We will discuss the GUI interface in the future. For now, we will concentrate on
the standards that we will use for the command-line interface. In most cases, when
a CUSP is run in command-line mode, we will display an identifying line of information.
This line will have the following layout: There are four circumstances under which the ID line isn't shown in command-line mode: 1) if the entire command is entered on a single line (meaning the program won't be prompting the user), 2) if there is no option to provide or only a single piece of information needed with no switches or other options (such as SET NODE, which only needs a node name), 3) if the program uses smart terminal commands to write on the screen (such as VT100 escape sequences), and 4) if an indirect command file is specified (which is a variant of circumstance 1). Thus, SET NODE won't display the ID line as per circumstance 2. Here is the user documentation for SET NODE. SET NODE Sets the computer's node name.
Format SET NODE name
Parameters name
Description The SET NODE utility sets the current node name of the computer. This happens immediately and might terminate existing network connections. You should be aware of requirements and restrictions of network identifiers used on your network.
Examples
Privileges required PHY_IO
UUI.Execute returns false,
then the user either aborted the program or there was a command line processing error,
in which case we simply exit without doing anything. Note: The Set_String
function is just the same as used in LOGIN.
Execute returns, the
program can query the "name" component's Text attribute to get the node
name. One thing to note: UUI doesn't validate the node name other than to make sure
it isn't null. That validation must still be done by the program. The reason is
simple: UUI cannot know all of the possible validations needed for every CUSP. We
will see some common situations as we continue, but the program must still do some
basic checks on the user-supplied input.
"top", "left", and "hint" attributes are only used in a GUI and are ignored in command line. Now, this may seem like a bunch of extra work to prompt for a simple name, but the actual line count of the program is smaller due to the TUUI code handling various conditions. Not to mention that the program will now work with a GUI. Besides, most CUSPs will have far more options that will make the use of UUI more obviously beneficial. If you have a passing familiarity with VMS, you might ask: why use UUI when one could use the VMS CDU (Command Definition Utility)? The answer is that they are quite different despite the superficial similarities. First, CDU must be used by the user or system administrator to define commands ahead of time. Because any program can be given a UUI by the developer, no knowledge or effort is required on the part of the user or admin. And although standard CUSPs can be handled by some startup command files provided with UOS, that does nothing to help with custom CUSPs or third-party CUSPs that may be installed on the system. Second, all CDU does is validate the command line - the program must still parse the command line on VMS and handle errors. UUI, by comparison, does both validation and parsing of the command line (or user input). Further, it supports modal use of CUSPs, which we will discuss in the future. Third, CDU doesn't do anything to help with a GUI interface. Finally, it is better to combine as much as possible in one place (the program) than to have pieces of it in different places (such as a command definition in a script plus the program in a different file). Although it cannot always be avoided, when all the pieces needed to make a program work are scattered across different files and/or locations, it is much easier for something to go wrong. Long term, it is less problematic to bundle together as much as possible in a program. This is the guiding philosophy that also led to the incorporation of ancillary data streams in files, which we discussed in the past. Note: if there must be several pieces, it is best if they are segregated from other programs, together somewhere. We will look at the UUI code at some point in the future, and we will cover additional features of it as needed as we go forward. In the next article, we will provide a formal introduction to UUI. We'll finish this article with a description of the SYS_SET_NODE_NAME service.
Here is the documentation for the new system service: SYS_SET_NODE_NAME Sets the computer's node name.
Format SYS_SET_NODE_NAME name
Parameters name
Description The SYS_SET_NODE_NAME service sets the current node name of the computer. This happens immediately and might terminate existing network connections.
ondition codes returned SS_NORMAL
Privileges required PHY_IO In the next article, we will look at a formal definition of UUI - at least as much as we've used it thus far.
Copyright © 2022 by Alan Conroy. This article may be copied in whole or in part as long as this copyright is included. |