2019-08-23 20:38:04 +02:00
|
|
|
//
|
|
|
|
// Copyright 2019 The Abseil Authors.
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// https://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
#include "absl/flags/internal/flag.h"
|
|
|
|
|
2020-01-10 17:42:35 +01:00
|
|
|
#include <stddef.h>
|
|
|
|
#include <stdint.h>
|
|
|
|
#include <string.h>
|
|
|
|
|
|
|
|
#include <atomic>
|
|
|
|
#include <memory>
|
|
|
|
#include <string>
|
|
|
|
#include <vector>
|
|
|
|
|
|
|
|
#include "absl/base/attributes.h"
|
|
|
|
#include "absl/base/config.h"
|
|
|
|
#include "absl/base/const_init.h"
|
2019-10-21 19:21:03 +02:00
|
|
|
#include "absl/base/optimization.h"
|
2020-01-10 17:42:35 +01:00
|
|
|
#include "absl/flags/internal/commandlineflag.h"
|
2020-01-03 17:41:10 +01:00
|
|
|
#include "absl/flags/usage_config.h"
|
2020-01-10 17:42:35 +01:00
|
|
|
#include "absl/strings/str_cat.h"
|
|
|
|
#include "absl/strings/string_view.h"
|
2019-08-23 20:38:04 +02:00
|
|
|
#include "absl/synchronization/mutex.h"
|
|
|
|
|
|
|
|
namespace absl {
|
2019-12-12 19:36:03 +01:00
|
|
|
ABSL_NAMESPACE_BEGIN
|
2019-08-23 20:38:04 +02:00
|
|
|
namespace flags_internal {
|
2020-01-03 17:41:10 +01:00
|
|
|
|
|
|
|
// The help message indicating that the commandline flag has been
|
|
|
|
// 'stripped'. It will not show up when doing "-help" and its
|
|
|
|
// variants. The flag is stripped if ABSL_FLAGS_STRIP_HELP is set to 1
|
|
|
|
// before including absl/flags/flag.h
|
|
|
|
const char kStrippedFlagHelp[] = "\001\002\003\004 (unknown) \004\003\002\001";
|
|
|
|
|
2019-10-21 19:21:03 +02:00
|
|
|
namespace {
|
2019-08-23 20:38:04 +02:00
|
|
|
|
2019-10-21 19:21:03 +02:00
|
|
|
// Currently we only validate flag values for user-defined flag types.
|
2020-01-03 17:41:10 +01:00
|
|
|
bool ShouldValidateFlagValue(FlagOpFn flag_type_id) {
|
2019-10-21 19:21:03 +02:00
|
|
|
#define DONT_VALIDATE(T) \
|
2020-01-03 17:41:10 +01:00
|
|
|
if (flag_type_id == &flags_internal::FlagOps<T>) return false;
|
2020-01-09 18:58:48 +01:00
|
|
|
ABSL_FLAGS_INTERNAL_BUILTIN_TYPES(DONT_VALIDATE)
|
2019-10-21 19:21:03 +02:00
|
|
|
#undef DONT_VALIDATE
|
2019-08-23 20:38:04 +02:00
|
|
|
|
2019-10-21 19:21:03 +02:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2019-12-12 19:36:03 +01:00
|
|
|
// RAII helper used to temporarily unlock and relock `absl::Mutex`.
|
|
|
|
// This is used when we need to ensure that locks are released while
|
|
|
|
// invoking user supplied callbacks and then reacquired, since callbacks may
|
|
|
|
// need to acquire these locks themselves.
|
|
|
|
class MutexRelock {
|
|
|
|
public:
|
|
|
|
explicit MutexRelock(absl::Mutex* mu) : mu_(mu) { mu_->Unlock(); }
|
|
|
|
~MutexRelock() { mu_->Lock(); }
|
|
|
|
|
|
|
|
MutexRelock(const MutexRelock&) = delete;
|
|
|
|
MutexRelock& operator=(const MutexRelock&) = delete;
|
|
|
|
|
|
|
|
private:
|
|
|
|
absl::Mutex* mu_;
|
|
|
|
};
|
|
|
|
|
|
|
|
// This global lock guards the initialization and destruction of data_guard_,
|
|
|
|
// which is used to guard the other Flag data.
|
|
|
|
ABSL_CONST_INIT static absl::Mutex flag_mutex_lifetime_guard(absl::kConstInit);
|
|
|
|
|
2019-10-21 19:21:03 +02:00
|
|
|
} // namespace
|
|
|
|
|
|
|
|
void FlagImpl::Init() {
|
|
|
|
{
|
2019-12-12 19:36:03 +01:00
|
|
|
absl::MutexLock lock(&flag_mutex_lifetime_guard);
|
2019-10-21 19:21:03 +02:00
|
|
|
|
2019-12-12 19:36:03 +01:00
|
|
|
// Must initialize data guard for this flag.
|
|
|
|
if (!is_data_guard_inited_) {
|
|
|
|
new (&data_guard_) absl::Mutex;
|
|
|
|
is_data_guard_inited_ = true;
|
2019-10-21 19:21:03 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-12-12 19:36:03 +01:00
|
|
|
absl::MutexLock lock(reinterpret_cast<absl::Mutex*>(&data_guard_));
|
2019-10-21 19:21:03 +02:00
|
|
|
|
2020-02-05 23:38:00 +01:00
|
|
|
if (value_.dynamic != nullptr) {
|
2019-10-21 19:21:03 +02:00
|
|
|
inited_.store(true, std::memory_order_release);
|
|
|
|
} else {
|
2019-12-02 19:41:53 +01:00
|
|
|
// Need to initialize cur field.
|
2020-02-05 23:38:00 +01:00
|
|
|
value_.dynamic = MakeInitValue().release();
|
2019-10-21 19:21:03 +02:00
|
|
|
StoreAtomic();
|
|
|
|
inited_.store(true, std::memory_order_release);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensures that the lazily initialized data is initialized,
|
|
|
|
// and returns pointer to the mutex guarding flags data.
|
2019-12-02 19:41:53 +01:00
|
|
|
absl::Mutex* FlagImpl::DataGuard() const {
|
2019-10-21 19:21:03 +02:00
|
|
|
if (ABSL_PREDICT_FALSE(!inited_.load(std::memory_order_acquire))) {
|
|
|
|
const_cast<FlagImpl*>(this)->Init();
|
|
|
|
}
|
|
|
|
|
2019-12-12 19:36:03 +01:00
|
|
|
// data_guard_ is initialized.
|
|
|
|
return reinterpret_cast<absl::Mutex*>(&data_guard_);
|
2019-10-21 19:21:03 +02:00
|
|
|
}
|
|
|
|
|
2019-12-12 19:36:03 +01:00
|
|
|
void FlagImpl::Destroy() {
|
2019-08-23 20:38:04 +02:00
|
|
|
{
|
2019-10-21 19:21:03 +02:00
|
|
|
absl::MutexLock l(DataGuard());
|
|
|
|
|
|
|
|
// Values are heap allocated for Abseil Flags.
|
2020-02-05 23:38:00 +01:00
|
|
|
if (value_.dynamic) Delete(op_, value_.dynamic);
|
2019-12-12 19:36:03 +01:00
|
|
|
|
|
|
|
// Release the dynamically allocated default value if any.
|
|
|
|
if (def_kind_ == FlagDefaultSrcKind::kDynamicValue) {
|
2019-12-02 19:41:53 +01:00
|
|
|
Delete(op_, default_src_.dynamic_value);
|
2019-12-12 19:36:03 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// If this flag has an assigned callback, release callback data.
|
2020-02-05 23:38:00 +01:00
|
|
|
if (callback_) delete callback_;
|
2019-08-23 20:38:04 +02:00
|
|
|
}
|
|
|
|
|
2019-12-12 19:36:03 +01:00
|
|
|
absl::MutexLock l(&flag_mutex_lifetime_guard);
|
|
|
|
DataGuard()->~Mutex();
|
|
|
|
is_data_guard_inited_ = false;
|
2019-10-21 19:21:03 +02:00
|
|
|
}
|
|
|
|
|
2019-12-02 19:41:53 +01:00
|
|
|
std::unique_ptr<void, DynValueDeleter> FlagImpl::MakeInitValue() const {
|
|
|
|
void* res = nullptr;
|
|
|
|
if (def_kind_ == FlagDefaultSrcKind::kDynamicValue) {
|
|
|
|
res = Clone(op_, default_src_.dynamic_value);
|
|
|
|
} else {
|
|
|
|
res = (*default_src_.gen_func)();
|
|
|
|
}
|
|
|
|
return {res, DynValueDeleter{op_}};
|
|
|
|
}
|
|
|
|
|
2020-01-03 17:41:10 +01:00
|
|
|
absl::string_view FlagImpl::Name() const { return name_; }
|
|
|
|
|
|
|
|
std::string FlagImpl::Filename() const {
|
|
|
|
return flags_internal::GetUsageConfig().normalize_filename(filename_);
|
|
|
|
}
|
|
|
|
|
2019-11-18 20:02:26 +01:00
|
|
|
std::string FlagImpl::Help() const {
|
2020-02-05 23:38:00 +01:00
|
|
|
return help_source_kind_ == FlagHelpKind::kLiteral ? help_.literal
|
|
|
|
: help_.gen_func();
|
2019-11-18 20:02:26 +01:00
|
|
|
}
|
|
|
|
|
2019-10-21 19:21:03 +02:00
|
|
|
bool FlagImpl::IsModified() const {
|
|
|
|
absl::MutexLock l(DataGuard());
|
|
|
|
return modified_;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool FlagImpl::IsSpecifiedOnCommandLine() const {
|
|
|
|
absl::MutexLock l(DataGuard());
|
|
|
|
return on_command_line_;
|
|
|
|
}
|
|
|
|
|
|
|
|
std::string FlagImpl::DefaultValue() const {
|
|
|
|
absl::MutexLock l(DataGuard());
|
|
|
|
|
2019-12-02 19:41:53 +01:00
|
|
|
auto obj = MakeInitValue();
|
|
|
|
return Unparse(marshalling_op_, obj.get());
|
2019-10-21 19:21:03 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
std::string FlagImpl::CurrentValue() const {
|
|
|
|
absl::MutexLock l(DataGuard());
|
|
|
|
|
2020-02-05 23:38:00 +01:00
|
|
|
return Unparse(marshalling_op_, value_.dynamic);
|
2019-10-21 19:21:03 +02:00
|
|
|
}
|
|
|
|
|
2020-02-05 23:38:00 +01:00
|
|
|
void FlagImpl::SetCallback(const FlagCallbackFunc mutation_callback) {
|
2019-10-21 19:21:03 +02:00
|
|
|
absl::MutexLock l(DataGuard());
|
|
|
|
|
2020-02-05 23:38:00 +01:00
|
|
|
if (callback_ == nullptr) {
|
|
|
|
callback_ = new FlagCallback;
|
2019-12-12 19:36:03 +01:00
|
|
|
}
|
2020-02-05 23:38:00 +01:00
|
|
|
callback_->func = mutation_callback;
|
2019-10-21 19:21:03 +02:00
|
|
|
|
|
|
|
InvokeCallback();
|
|
|
|
}
|
|
|
|
|
2019-12-02 19:41:53 +01:00
|
|
|
void FlagImpl::InvokeCallback() const {
|
2020-02-05 23:38:00 +01:00
|
|
|
if (!callback_) return;
|
2019-12-12 19:36:03 +01:00
|
|
|
|
|
|
|
// Make a copy of the C-style function pointer that we are about to invoke
|
|
|
|
// before we release the lock guarding it.
|
2020-02-05 23:38:00 +01:00
|
|
|
FlagCallbackFunc cb = callback_->func;
|
2019-10-21 19:21:03 +02:00
|
|
|
|
|
|
|
// If the flag has a mutation callback this function invokes it. While the
|
|
|
|
// callback is being invoked the primary flag's mutex is unlocked and it is
|
|
|
|
// re-locked back after call to callback is completed. Callback invocation is
|
|
|
|
// guarded by flag's secondary mutex instead which prevents concurrent
|
|
|
|
// callback invocation. Note that it is possible for other thread to grab the
|
|
|
|
// primary lock and update flag's value at any time during the callback
|
|
|
|
// invocation. This is by design. Callback can get a value of the flag if
|
|
|
|
// necessary, but it might be different from the value initiated the callback
|
|
|
|
// and it also can be different by the time the callback invocation is
|
|
|
|
// completed. Requires that *primary_lock be held in exclusive mode; it may be
|
|
|
|
// released and reacquired by the implementation.
|
2019-12-12 19:36:03 +01:00
|
|
|
MutexRelock relock(DataGuard());
|
2020-02-05 23:38:00 +01:00
|
|
|
absl::MutexLock lock(&callback_->guard);
|
2019-12-12 19:36:03 +01:00
|
|
|
cb();
|
2019-10-21 19:21:03 +02:00
|
|
|
}
|
|
|
|
|
2020-01-03 17:41:10 +01:00
|
|
|
bool FlagImpl::RestoreState(const void* value, bool modified,
|
|
|
|
bool on_command_line, int64_t counter) {
|
2019-10-21 19:21:03 +02:00
|
|
|
{
|
|
|
|
absl::MutexLock l(DataGuard());
|
|
|
|
|
|
|
|
if (counter_ == counter) return false;
|
|
|
|
}
|
|
|
|
|
2020-01-03 17:41:10 +01:00
|
|
|
Write(value, op_);
|
2019-10-21 19:21:03 +02:00
|
|
|
|
|
|
|
{
|
|
|
|
absl::MutexLock l(DataGuard());
|
|
|
|
|
|
|
|
modified_ = modified;
|
|
|
|
on_command_line_ = on_command_line;
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Attempts to parse supplied `value` string using parsing routine in the `flag`
|
2019-12-12 19:36:03 +01:00
|
|
|
// argument. If parsing successful, this function replaces the dst with newly
|
|
|
|
// parsed value. In case if any error is encountered in either step, the error
|
|
|
|
// message is stored in 'err'
|
2020-01-03 17:41:10 +01:00
|
|
|
bool FlagImpl::TryParse(void** dst, absl::string_view value,
|
|
|
|
std::string* err) const {
|
2019-12-02 19:41:53 +01:00
|
|
|
auto tentative_value = MakeInitValue();
|
2019-12-12 19:36:03 +01:00
|
|
|
|
2019-10-21 19:21:03 +02:00
|
|
|
std::string parse_err;
|
2019-12-02 19:41:53 +01:00
|
|
|
if (!Parse(marshalling_op_, value, tentative_value.get(), &parse_err)) {
|
2019-10-21 19:21:03 +02:00
|
|
|
absl::string_view err_sep = parse_err.empty() ? "" : "; ";
|
2020-01-03 17:41:10 +01:00
|
|
|
*err = absl::StrCat("Illegal value '", value, "' specified for flag '",
|
|
|
|
Name(), "'", err_sep, parse_err);
|
2019-10-21 19:21:03 +02:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2019-12-12 19:36:03 +01:00
|
|
|
void* old_val = *dst;
|
|
|
|
*dst = tentative_value.release();
|
|
|
|
tentative_value.reset(old_val);
|
|
|
|
|
2019-10-21 19:21:03 +02:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2020-01-03 17:41:10 +01:00
|
|
|
void FlagImpl::Read(void* dst, const flags_internal::FlagOpFn dst_op) const {
|
2019-10-21 19:21:03 +02:00
|
|
|
absl::ReaderMutexLock l(DataGuard());
|
|
|
|
|
|
|
|
// `dst_op` is the unmarshaling operation corresponding to the declaration
|
|
|
|
// visibile at the call site. `op` is the Flag's defined unmarshalling
|
|
|
|
// operation. They must match for this operation to be well-defined.
|
|
|
|
if (ABSL_PREDICT_FALSE(dst_op != op_)) {
|
|
|
|
ABSL_INTERNAL_LOG(
|
|
|
|
ERROR,
|
2020-01-03 17:41:10 +01:00
|
|
|
absl::StrCat("Flag '", Name(),
|
2019-10-21 19:21:03 +02:00
|
|
|
"' is defined as one type and declared as another"));
|
|
|
|
}
|
2020-02-05 23:38:00 +01:00
|
|
|
CopyConstruct(op_, value_.dynamic, dst);
|
2019-10-21 19:21:03 +02:00
|
|
|
}
|
|
|
|
|
2019-12-02 19:41:53 +01:00
|
|
|
void FlagImpl::StoreAtomic() {
|
2019-10-21 19:21:03 +02:00
|
|
|
size_t data_size = Sizeof(op_);
|
|
|
|
|
|
|
|
if (data_size <= sizeof(int64_t)) {
|
|
|
|
int64_t t = 0;
|
2020-02-05 23:38:00 +01:00
|
|
|
std::memcpy(&t, value_.dynamic, data_size);
|
|
|
|
value_.atomics.small_atomic.store(t, std::memory_order_release);
|
2019-10-21 19:21:03 +02:00
|
|
|
}
|
2020-01-09 18:58:48 +01:00
|
|
|
#if defined(ABSL_FLAGS_INTERNAL_ATOMIC_DOUBLE_WORD)
|
|
|
|
else if (data_size <= sizeof(FlagsInternalTwoWordsType)) {
|
|
|
|
FlagsInternalTwoWordsType t{0, 0};
|
2020-02-05 23:38:00 +01:00
|
|
|
std::memcpy(&t, value_.dynamic, data_size);
|
|
|
|
value_.atomics.big_atomic.store(t, std::memory_order_release);
|
2020-01-09 18:58:48 +01:00
|
|
|
}
|
|
|
|
#endif
|
2019-10-21 19:21:03 +02:00
|
|
|
}
|
|
|
|
|
2020-01-03 17:41:10 +01:00
|
|
|
void FlagImpl::Write(const void* src, const flags_internal::FlagOpFn src_op) {
|
2019-10-21 19:21:03 +02:00
|
|
|
absl::MutexLock l(DataGuard());
|
|
|
|
|
|
|
|
// `src_op` is the marshalling operation corresponding to the declaration
|
|
|
|
// visible at the call site. `op` is the Flag's defined marshalling operation.
|
|
|
|
// They must match for this operation to be well-defined.
|
|
|
|
if (ABSL_PREDICT_FALSE(src_op != op_)) {
|
|
|
|
ABSL_INTERNAL_LOG(
|
|
|
|
ERROR,
|
2020-01-03 17:41:10 +01:00
|
|
|
absl::StrCat("Flag '", Name(),
|
2019-10-21 19:21:03 +02:00
|
|
|
"' is defined as one type and declared as another"));
|
|
|
|
}
|
|
|
|
|
2020-01-03 17:41:10 +01:00
|
|
|
if (ShouldValidateFlagValue(op_)) {
|
2019-10-21 19:21:03 +02:00
|
|
|
void* obj = Clone(op_, src);
|
|
|
|
std::string ignored_error;
|
|
|
|
std::string src_as_str = Unparse(marshalling_op_, src);
|
|
|
|
if (!Parse(marshalling_op_, src_as_str, obj, &ignored_error)) {
|
2020-01-03 17:41:10 +01:00
|
|
|
ABSL_INTERNAL_LOG(ERROR, absl::StrCat("Attempt to set flag '", Name(),
|
|
|
|
"' to invalid value ", src_as_str));
|
2019-10-21 19:21:03 +02:00
|
|
|
}
|
|
|
|
Delete(op_, obj);
|
|
|
|
}
|
|
|
|
|
|
|
|
modified_ = true;
|
|
|
|
counter_++;
|
2020-02-05 23:38:00 +01:00
|
|
|
Copy(op_, src, value_.dynamic);
|
2019-10-21 19:21:03 +02:00
|
|
|
|
|
|
|
StoreAtomic();
|
|
|
|
InvokeCallback();
|
|
|
|
}
|
|
|
|
|
|
|
|
// Sets the value of the flag based on specified string `value`. If the flag
|
|
|
|
// was successfully set to new value, it returns true. Otherwise, sets `err`
|
|
|
|
// to indicate the error, leaves the flag unchanged, and returns false. There
|
|
|
|
// are three ways to set the flag's value:
|
|
|
|
// * Update the current flag value
|
|
|
|
// * Update the flag's default value
|
|
|
|
// * Update the current flag value if it was never set before
|
|
|
|
// The mode is selected based on 'set_mode' parameter.
|
2020-01-03 17:41:10 +01:00
|
|
|
bool FlagImpl::SetFromString(absl::string_view value, FlagSettingMode set_mode,
|
2019-10-21 19:21:03 +02:00
|
|
|
ValueSource source, std::string* err) {
|
|
|
|
absl::MutexLock l(DataGuard());
|
|
|
|
|
|
|
|
switch (set_mode) {
|
|
|
|
case SET_FLAGS_VALUE: {
|
|
|
|
// set or modify the flag's value
|
2020-02-05 23:38:00 +01:00
|
|
|
if (!TryParse(&value_.dynamic, value, err)) return false;
|
2019-10-21 19:21:03 +02:00
|
|
|
modified_ = true;
|
|
|
|
counter_++;
|
|
|
|
StoreAtomic();
|
|
|
|
InvokeCallback();
|
|
|
|
|
|
|
|
if (source == kCommandLine) {
|
|
|
|
on_command_line_ = true;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case SET_FLAG_IF_DEFAULT: {
|
|
|
|
// set the flag's value, but only if it hasn't been set by someone else
|
|
|
|
if (!modified_) {
|
2020-02-05 23:38:00 +01:00
|
|
|
if (!TryParse(&value_.dynamic, value, err)) return false;
|
2019-10-21 19:21:03 +02:00
|
|
|
modified_ = true;
|
|
|
|
counter_++;
|
|
|
|
StoreAtomic();
|
|
|
|
InvokeCallback();
|
|
|
|
} else {
|
|
|
|
// TODO(rogeeff): review and fix this semantic. Currently we do not fail
|
|
|
|
// in this case if flag is modified. This is misleading since the flag's
|
|
|
|
// value is not updated even though we return true.
|
|
|
|
// *err = absl::StrCat(Name(), " is already set to ",
|
|
|
|
// CurrentValue(), "\n");
|
|
|
|
// return false;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case SET_FLAGS_DEFAULT: {
|
2019-12-02 19:41:53 +01:00
|
|
|
if (def_kind_ == FlagDefaultSrcKind::kDynamicValue) {
|
2020-01-03 17:41:10 +01:00
|
|
|
if (!TryParse(&default_src_.dynamic_value, value, err)) {
|
2019-12-12 19:36:03 +01:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
void* new_default_val = nullptr;
|
2020-01-03 17:41:10 +01:00
|
|
|
if (!TryParse(&new_default_val, value, err)) {
|
2019-12-12 19:36:03 +01:00
|
|
|
return false;
|
|
|
|
}
|
2019-12-02 19:41:53 +01:00
|
|
|
|
2019-12-12 19:36:03 +01:00
|
|
|
default_src_.dynamic_value = new_default_val;
|
|
|
|
def_kind_ = FlagDefaultSrcKind::kDynamicValue;
|
|
|
|
}
|
2019-10-21 19:21:03 +02:00
|
|
|
|
|
|
|
if (!modified_) {
|
|
|
|
// Need to set both default value *and* current, in this case
|
2020-02-05 23:38:00 +01:00
|
|
|
Copy(op_, default_src_.dynamic_value, value_.dynamic);
|
2019-10-21 19:21:03 +02:00
|
|
|
StoreAtomic();
|
|
|
|
InvokeCallback();
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2020-01-03 17:41:10 +01:00
|
|
|
void FlagImpl::CheckDefaultValueParsingRoundtrip() const {
|
2019-10-21 19:21:03 +02:00
|
|
|
std::string v = DefaultValue();
|
|
|
|
|
|
|
|
absl::MutexLock lock(DataGuard());
|
|
|
|
|
2019-12-02 19:41:53 +01:00
|
|
|
auto dst = MakeInitValue();
|
2019-10-21 19:21:03 +02:00
|
|
|
std::string error;
|
2019-12-02 19:41:53 +01:00
|
|
|
if (!flags_internal::Parse(marshalling_op_, v, dst.get(), &error)) {
|
2019-10-21 19:21:03 +02:00
|
|
|
ABSL_INTERNAL_LOG(
|
|
|
|
FATAL,
|
2020-01-03 17:41:10 +01:00
|
|
|
absl::StrCat("Flag ", Name(), " (from ", Filename(),
|
2019-10-21 19:21:03 +02:00
|
|
|
"): std::string form of default value '", v,
|
|
|
|
"' could not be parsed; error=", error));
|
|
|
|
}
|
|
|
|
|
|
|
|
// We do not compare dst to def since parsing/unparsing may make
|
|
|
|
// small changes, e.g., precision loss for floating point types.
|
|
|
|
}
|
|
|
|
|
|
|
|
bool FlagImpl::ValidateInputValue(absl::string_view value) const {
|
|
|
|
absl::MutexLock l(DataGuard());
|
|
|
|
|
2019-12-02 19:41:53 +01:00
|
|
|
auto obj = MakeInitValue();
|
2019-10-21 19:21:03 +02:00
|
|
|
std::string ignored_error;
|
2019-12-02 19:41:53 +01:00
|
|
|
return flags_internal::Parse(marshalling_op_, value, obj.get(),
|
|
|
|
&ignored_error);
|
2019-08-23 20:38:04 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
} // namespace flags_internal
|
2019-12-12 19:36:03 +01:00
|
|
|
ABSL_NAMESPACE_END
|
2019-08-23 20:38:04 +02:00
|
|
|
} // namespace absl
|