config - Configuration file.


   A  configuration  file contains values for configuration parameters for
   the applications in the system. The erl command-line  argument  -config
   Name  tells  the  system  to  use data in the system configuration file

   Configuration parameter values in the configuration file  override  the
   values in the application resource files (see app(5). The values in the
   configuration  file  can  be  overridden  by  command-line  flags  (see

   The  value  of  a  configuration  parameter  is  retrieved  by  calling


   The configuration file is to be called Name.config, where Name  is  any

   File  .config  contains  a  single  Erlang  term  and has the following

   [{Application1, [{Par11, Val11}, ...]},
    {ApplicationN, [{ParN1, ValN1}, ...]}].

     Application = atom():
       Application name.

     Par = atom():
       Name of a configuration parameter.

     Val = term():
       Value of a configuration parameter.


   When starting Erlang in embedded mode, it is assumed that  exactly  one
   system configuration file is used, named sys.config. This file is to be
   located in $ROOT/releases/Vsn,  where  $ROOT  is  the  Erlang/OTP  root
   installation directory and Vsn is the release version.

   Release  handling  relies  on  this  assumption.  When installing a new
   release version, the new sys.config is read  and  used  to  update  the
   application configurations.

   This means that specifying another .config file, or more .config files,
   leads to inconsistent update of application configurations.  Therefore,
   in  Erlang 5.4/OTP R10B, the syntax of sys.config was extended to allow
   pointing out other .config files:

   [{Application, [{Par, Val}]} | File].

     File = string():
       Name of another .config file. Extension .config can be omitted.  It
       is  recommended  to use absolute paths. A relative path is relative
       the current working directory of the emulator.

   When  traversing  the  contents  of  sys.config  and  a   filename   is
   encountered,  its  contents are read and merged with the result so far.
   When an application configuration tuple {Application, Env} is found, it
   is merged with the result so far. Merging means that new parameters are
   added and existing parameter values overwritten.






   This yields the following environment for myapp:


   The behavior if a file specified in sys.config does not  exist,  or  is
   erroneous,  is  backwards  compatible. Starting the runtime system will
   fail. Installing a new release version will  not  fail,  but  an  error
   message is returned and the erroneous file is ignored.


   app(5), erts:erl(1), OTP Design Principles

More Linux Commands

scsi_id(8) - retrieve and generate a unique SCSI identifier
scsi_id queries a SCSI device via the SCSI INQUIRY vital product data (VPD) page 0x80 or 0x83 and uses the resulting data to generate a value that is unique acr

XCopyGC(3) - create or free graphics contexts and graphics c
The XCreateGC function creates a graphics context and returns a GC. The GC can be used with any destination drawable having the same root and depth as the speci

DPMSForceLevel(3) - forces a DPMS capable display into the s
The DPMSForceLevel function forces a DPMS capable display into the specified power level. The level must be one of following four states: DPMSModeOn, DPMSModeSt

gnutls_x509_privkey_generate(3) - API function (Man Page)...
This function will generate a random private key. Note that this function must be called on an empty private key. Do not set the number of bits directly, use gn

ttk_progressbar(n) Provide progress feedback (Man Page).....
A ttk::progressbar widget shows the status of a long-running operation. They can operate in two modes: determinate mode shows the amount completed relative to t

dosfsck(8) - check and repair MS-DOS filesystems (Man Page)
fsck.fat verifies the consistency of MS-DOS filesystems and optionally tries to repair them. The following filesystem problems can be corrected (in this order):

Mail::SpamAssassin::Plugin::URIDNSBL(3pm) - look up URLs aga
This works by analysing message text and HTML for URLs, extracting the domain names from those, querying their NS records in DNS , resolving the hostnames used

box_set(3ncurses) - create curses borders or lines using com
The border_set and wborder_set functions draw a border around the edges of the current or specified window. These functions do not change the cursor position, a

inet(3) - Internet address manipulation routines (Man Page)
inet_aton() converts the Internet host address cp from the IPv4 numbers-and-dots notation into binary form (in network byte order) and stores it in the structur

XListDeviceProperties(3) - List a device's properties.......
The XListDeviceProperties function returns a list of the properties associated with the input device specified in device. Each device may have an arbitrary numb

destroy(n) - Destroy one or more windows - Linux man page...
This command deletes the windows given by the window arguments, plus all of their descendants. If a window . is deleted then all windows will be destroyed and t

gnutls_certificate_get_ours(3) - API function (Man Page)....
Gets the certificate as sent to the peer in the last handshake. The certificate is in raw (DER) format. No certificate list is being returned. Only the first ce

We can't live, work or learn in freedom unless the software we use is free.