Initial commit of OpenSPARC T2 design and verification files.
[OpenSPARC-T2-DV] / tools / perl-5.8.0 / man / man3 / Psh::Strategy.3
CommitLineData
86530b38
AT
1.\" Automatically generated by Pod::Man v1.34, Pod::Parser v1.13
2.\"
3.\" Standard preamble:
4.\" ========================================================================
5.de Sh \" Subsection heading
6.br
7.if t .Sp
8.ne 5
9.PP
10\fB\\$1\fR
11.PP
12..
13.de Sp \" Vertical space (when we can't use .PP)
14.if t .sp .5v
15.if n .sp
16..
17.de Vb \" Begin verbatim text
18.ft CW
19.nf
20.ne \\$1
21..
22.de Ve \" End verbatim text
23.ft R
24.fi
25..
26.\" Set up some character translations and predefined strings. \*(-- will
27.\" give an unbreakable dash, \*(PI will give pi, \*(L" will give a left
28.\" double quote, and \*(R" will give a right double quote. | will give a
29.\" real vertical bar. \*(C+ will give a nicer C++. Capital omega is used to
30.\" do unbreakable dashes and therefore won't be available. \*(C` and \*(C'
31.\" expand to `' in nroff, nothing in troff, for use with C<>.
32.tr \(*W-|\(bv\*(Tr
33.ds C+ C\v'-.1v'\h'-1p'\s-2+\h'-1p'+\s0\v'.1v'\h'-1p'
34.ie n \{\
35. ds -- \(*W-
36. ds PI pi
37. if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch
38. if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch
39. ds L" ""
40. ds R" ""
41. ds C` ""
42. ds C' ""
43'br\}
44.el\{\
45. ds -- \|\(em\|
46. ds PI \(*p
47. ds L" ``
48. ds R" ''
49'br\}
50.\"
51.\" If the F register is turned on, we'll generate index entries on stderr for
52.\" titles (.TH), headers (.SH), subsections (.Sh), items (.Ip), and index
53.\" entries marked with X<> in POD. Of course, you'll have to process the
54.\" output yourself in some meaningful fashion.
55.if \nF \{\
56. de IX
57. tm Index:\\$1\t\\n%\t"\\$2"
58..
59. nr % 0
60. rr F
61.\}
62.\"
63.\" For nroff, turn off justification. Always turn off hyphenation; it makes
64.\" way too many mistakes in technical documents.
65.hy 0
66.if n .na
67.\"
68.\" Accent mark definitions (@(#)ms.acc 1.5 88/02/08 SMI; from UCB 4.2).
69.\" Fear. Run. Save yourself. No user-serviceable parts.
70. \" fudge factors for nroff and troff
71.if n \{\
72. ds #H 0
73. ds #V .8m
74. ds #F .3m
75. ds #[ \f1
76. ds #] \fP
77.\}
78.if t \{\
79. ds #H ((1u-(\\\\n(.fu%2u))*.13m)
80. ds #V .6m
81. ds #F 0
82. ds #[ \&
83. ds #] \&
84.\}
85. \" simple accents for nroff and troff
86.if n \{\
87. ds ' \&
88. ds ` \&
89. ds ^ \&
90. ds , \&
91. ds ~ ~
92. ds /
93.\}
94.if t \{\
95. ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"
96. ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'
97. ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u'
98. ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u'
99. ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u'
100. ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u'
101.\}
102. \" troff and (daisy-wheel) nroff accents
103.ds : \\k:\h'-(\\n(.wu*8/10-\*(#H+.1m+\*(#F)'\v'-\*(#V'\z.\h'.2m+\*(#F'.\h'|\\n:u'\v'\*(#V'
104.ds 8 \h'\*(#H'\(*b\h'-\*(#H'
105.ds o \\k:\h'-(\\n(.wu+\w'\(de'u-\*(#H)/2u'\v'-.3n'\*(#[\z\(de\v'.3n'\h'|\\n:u'\*(#]
106.ds d- \h'\*(#H'\(pd\h'-\w'~'u'\v'-.25m'\f2\(hy\fP\v'.25m'\h'-\*(#H'
107.ds D- D\\k:\h'-\w'D'u'\v'-.11m'\z\(hy\v'.11m'\h'|\\n:u'
108.ds th \*(#[\v'.3m'\s+1I\s-1\v'-.3m'\h'-(\w'I'u*2/3)'\s-1o\s+1\*(#]
109.ds Th \*(#[\s+2I\s-2\h'-\w'I'u*3/5'\v'-.3m'o\v'.3m'\*(#]
110.ds ae a\h'-(\w'a'u*4/10)'e
111.ds Ae A\h'-(\w'A'u*4/10)'E
112. \" corrections for vroff
113.if v .ds ~ \\k:\h'-(\\n(.wu*9/10-\*(#H)'\s-2\u~\d\s+2\h'|\\n:u'
114.if v .ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'\v'-.4m'^\v'.4m'\h'|\\n:u'
115. \" for low resolution devices (crt and lpr)
116.if \n(.H>23 .if \n(.V>19 \
117\{\
118. ds : e
119. ds 8 ss
120. ds o a
121. ds d- d\h'-1'\(ga
122. ds D- D\h'-1'\(hy
123. ds th \o'bp'
124. ds Th \o'LP'
125. ds ae ae
126. ds Ae AE
127.\}
128.rm #[ #] #H #V #F C
129.\" ========================================================================
130.\"
131.IX Title "Psh::Strategy 3"
132.TH Psh::Strategy 3 "2003-01-02" "perl v5.8.0" "User Contributed Perl Documentation"
133.SH "NAME"
134Psh::Strategy \- a Perl Shell Evaluation Strategy (base class)
135.SH "SYNOPSIS"
136.IX Header "SYNOPSIS"
137.Vb 1
138\& use Psh::Strategy;
139.Ve
140.SH "DESCRIPTION"
141.IX Header "DESCRIPTION"
142Psh::Strategy offers a procedural strategy list interface and a
143base class for developing strategies.
144.SH "PROCEDURAL STRATEGY LIST"
145.IX Header "PROCEDURAL STRATEGY LIST"
146.Vb 1
147\& Psh::Strategy::list()
148.Ve
149.PP
150Returns a list of active Psh::Strategy objects.
151.PP
152.Vb 1
153\& my $obj= Psh::Strategy::get('name')
154.Ve
155.PP
156Loads and initializes a certain Psh::Strategy object
157.PP
158.Vb 1
159\& Psh::Strategy::add($obj [, $suggest_position])
160.Ve
161.PP
162Adds a strategy object to the list of active strategies
163.PP
164.Vb 1
165\& Psh::Strategy::remove($name)
166.Ve
167.PP
168Removes a strategy
169.PP
170.Vb 1
171\& @list= Psh::Strategy::available_list()
172.Ve
173.PP
174Lists available strategies
175.PP
176.Vb 1
177\& my $pos= find($name)
178.Ve
179.PP
180Finds the position of the named strategy
181.PP
182.Vb 1
183\& my $flag= active($name)
184.Ve
185.PP
186Returns true if the named strategy is currently active
187.SH "DEVELOPING STRATEGIES"
188.IX Header "DEVELOPING STRATEGIES"
189You have to inherit from Psh::Strategy and you \s-1MUST\s0 at least
190override the functions \f(CW\*(C`consumes\*(C'\fR, \f(CW\*(C`applies\*(C'\fR, \f(CW\*(C`execute\*(C'\fR.
191You \s-1CAN\s0 also override the function \f(CW\*(C`runs_before\*(C'\fR
192.IP "\(bu consumes" 4
193.IX Item "consumes"
194Returns either \s-1CONSUME_LINE\s0, \s-1CONSUME_WORDS\s0, \s-1CONSUME_TOKENS\s0.
195\&\s-1CONSUME_LINE\s0 means you want to receive the whole input line
196unparsed. \s-1CONSUME_WORDS\s0 means you want to receive the whole
197input line tokenized (currenty unimplemented). \s-1CONSUME_TOKENS\s0
198means that you want to receive a sub-part of the line, tokenized
199(this is probably what you want)
200.IP "\(bu applies" 4
201.IX Item "applies"
202Returns undef if the strategy does not want to handle the input.
203Returns a human-readable description if it wants to handle the input.
204.Sp
205If you specified \s-1CONSUME_LINE\s0, this method will be called as
206 \f(CW$obj\fR\->applies(\e$inputline);
207.Sp
208If you specified \s-1CONSUME_TOKENS\s0, this method will be called as
209 \f(CW$obj\fR\->applies(\e$inputline,\e@tokens,$piped_flag)
210.IP "\(bu execute" 4
211.IX Item "execute"
212Will be called as
213 \f(CW$obj\fR\->execute(\e$inputline,\e@tokens,$how,$piped_flag)
214.Sp
215\&\f(CW$how\fR is what the call to applies returned. If \f(CW@tokens\fR is
216not applicable an empty array will be supplied.
217.Sp
218Your execute function should return an array of the form:
219.Sp
220.Vb 1
221\& ($evalcode, \e@words, $forcefork, @return_val)
222.Ve
223.Sp
224If \f(CW$evalcode\fR, <@words> and <$forcefork> are undef, execution is finished
225after this call and \f(CW@return_val\fR will be used as return value.
226.Sp
227But \f(CW$evalcode\fR can also be a Perl sub \- in which case it is evaluated
228later on, or a string \- in which case it's a filename of a program to
229execute. \f(CW@words\fR will then be used as arguments for the program.
230.Sp
231\&\f(CW$forcefork\fR may be used to force a \f(CW\*(C`fork()\*(C'\fR call even for the perl
232subs.
233.IP "\(bu runs_before" 4
234.IX Item "runs_before"
235Returns a list of names of other strategies. It is guaranteed that
236the evaluation strategy will be tried before those other named strategies
237are tried.