The VTK pipeline relies on algorithms providing information about their input and output and responding to requests.
More...
The VTK pipeline relies on algorithms providing information about their input and output and responding to requests.
The information objects used to perform these actions map known keys to values. This is a list of keys that information objects use and what each key should be used for.
Key that tells the pipeline that a particular algorithm can or cannot handle piece request. If a filter cannot handle piece requests and is asked for a piece, the executive will flag an error. If a structured data source cannot handle piece requests but can produce sub-extents (CAN_PRODUCE_SUB_EXTENT), the executive will use an extent translator to split the extent into pieces. Otherwise, if a source cannot handle piece requests, the executive will ask for the whole data for piece 0 and not execute the source for other pieces.
Key defining a request to make sure the output data objects exist.
Key defining a request to make sure the output information is up to date.
Key defining a request to make sure the output data are up to date.
Key defining a request to mark outputs that will NOT be generated during a REQUEST_DATA.
Key to specify in pipeline information the request that data be released after it is used.
Key to store a mark for an output that will not be generated. Algorithms use this to tell the executive that they will not generate certain outputs for a REQUEST_DATA.
Key defining a request to propagate the update extent upstream.
Key defining a request to propagate the update extent upstream.
Key defining a request to make sure the meta information is up to date.
Key for an algorithm to store in a request to tell this executive to keep executing it.
Key for combining the update extents requested by all consumers, so that the final extent that is produced satisfies all consumers.
Key to store the whole extent provided in pipeline information.
This is set if the update extent is not restricted to the whole extent, for sources that can generate an extent of any requested size.
Key to specify the request for exact extent in pipeline information.
Key to store available time steps.
Update time steps requested by the pipeline.
Whether there are time dependent meta information if there is, the pipeline will perform two extra passes to gather the time dependent information
key to record the bounds of a dataset.