>I think HAL main weakness is absence of RT scripting, so you need There is a (userland) scripting capability using haltcl that is available specifically for configuring from ini files. In addition to aiding ini configuration, haltcl scripts can be used to make or augment a hal-based machine. For ongoing scripting, the script writer must manage an event loop (the wish interpreter is convenient) and, while not real-time, such scripts can have many applications for observation and/or control of hal.
I think few are aware of these powerful capabilities, some history for ini configuration follows: The topic was apparently discussed first on irc and then introduced on this (emc-devel) list in 2009 as a PATCH RFC: http://article.gmane.org/gmane.linux.distributions.emc.devel/2518 The initial incorporating commits seem to begin with aefefc1d9e2e Subsequent changes have made additional updates to haltcl. The distribution includes a directory with a simple sim example: configs/sim/simtcl The example primarily demonstrates the use of twopass processing that allows the use of multiple loadrt commands for a given component (using the names= option) but also shows the inclusion of tcl procedures, conditional statements, for loops, etc. The README file gives a general explanation and two example ini files are included: twopass_demo.ini -- demo using a tcl configuration file for hal twopass_compat.ini -- test compatibility with existing hal files This scripting capability was made possible because the hal command language is very similar to tcl scripting with two minor name clashes for the "gets" and "list" commands and a different way of specifying ini file items (halcmd uses [SECTION]ITEM while haltcl uses $SECTION(ITEM)) as documented in the early PATCH RFC -- Dewey Garrett ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ _______________________________________________ Emc-developers mailing list Emc-developers@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/emc-developers