Lines Matching refs:path

22 (** Thrown when a path looks invalid e.g. if it contains "//" *)
166 let validate_path path =
169 for offset = 0 to String.length path - (String.length bad) do
170 if String.sub path offset (String.length bad) = bad then
171 raise (Invalid_path path)
174 if path <> "/" && path <> "" && path.[String.length path - 1] = '/' then
175 raise (Invalid_path path)
177 (** Check to see if a path is suitable for watches *)
178 let validate_watch_path path =
180 if path <> "" && path.[0] = '@' then ()
181 else validate_path path
186 let directory tid path con =
187 validate_path path;
188 let data = sync (Queueop.directory tid path) con in
191 let read tid path con =
192 validate_path path;
193 sync (Queueop.read tid path) con
196 List.map (fun path -> validate_path path; read tid path con)
200 let getperms tid path con =
201 validate_path path;
202 perms_of_string (sync (Queueop.getperms tid path) con)
204 let watch path data con =
205 validate_watch_path path;
206 ack (sync (Queueop.watch path data) con)
208 let unwatch path data con =
209 validate_watch_path path;
210 ack (sync (Queueop.unwatch path data) con)
238 let write tid path value con =
239 validate_path path;
240 ack (sync (Queueop.write tid path value) con)
244 let path = (if dir <> "" then dir ^ "/" ^ entry else entry) in
245 validate_path path;
246 write tid path value con) vec
248 let mkdir tid path con =
249 validate_path path;
250 ack (sync (Queueop.mkdir tid path) con)
252 let rm tid path con =
253 validate_path path;
255 ack (sync (Queueop.rm tid path) con)
259 let setperms tid path perms con =
260 validate_path path;
261 ack (sync (Queueop.setperms tid path (string_of_perms perms)) con)
265 let path = (if dir <> "" then dir ^ "/" ^ entry else entry) in
266 validate_path path;
267 setperms tid path perms con) vec