Hi all,

What is the interface of OOo? More specifically, when OOo is installed on a computer, what are the files from that installation that are either:

1 Intended to be executed directly by a client (human or program) to accomplish a certain task.

2 Intended to be registered (typically during installation) with the operating system or some other external framework, to be executed by the operating system or external framework upon certain events.

I am asking because for <http://wiki.services.openoffice.org/wiki/ODF_Toolkit/Efforts/OOo_without_URE> I need to make sure that all these executions happen in environments that meet certain requirements.

Doing

  ( for i in * ; do file $i ; done ) | grep executable

in the program directory of a vanilla unxsoli4.pro SRC680m209 OOo, I get the below long list, probably containing many false positives and lacking many false negatives (that are only there on other platforms, special installations, whatever).

Please help me assemble an accurate list. To start, the files I pretty much *know* are in the first category are (all from the program directory):

  pkgchk
  sbase
  scalc
  sdraw
  setofficelang
  simpress
  smath
  soffice
  spadmin
  swriter
  testtool.bin
  uno
  unopkg

-Stephan


The long list:
---8<---
cde-open-url: executable shell script
configimport: executable shell script
configimport.bin: ELF 32-bit LSB executable 80386 Version 1, dynamically linked, stripped
crash_report: executable shell script
crash_report.bin: ELF 32-bit LSB executable 80386 Version 1, dynamically linked, stripped
gengal: executable shell script
gengal.bin: ELF 32-bit LSB executable 80386 Version 1, dynamically linked, stripped
gnome-open-url: executable shell script
gnome-open-url.bin: ELF 32-bit LSB executable 80386 Version 1, dynamically linked, stripped gnome-set-default-application: ELF 32-bit LSB executable 80386 Version 1, dynamically linked, stripped javaldx: ELF 32-bit LSB executable 80386 Version 1, dynamically linked, stripped
kde-open-url: executable shell script
mailmerge.py: executable /bin/python script
msfontextract: ELF 32-bit LSB executable 80386 Version 1, dynamically linked, stripped nsplugin: ELF 32-bit LSB executable 80386 Version 1, dynamically linked, stripped
open-url: executable shell script
pagein: ELF 32-bit LSB executable 80386 Version 1, dynamically linked, stripped
pkgchk: executable shell script
pkgchk.bin: ELF 32-bit LSB executable 80386 Version 1, dynamically linked, stripped pluginapp.bin: ELF 32-bit LSB executable 80386 Version 1, dynamically linked, stripped
python: executable shell script
python.bin: ELF 32-bit LSB executable 80386 Version 1, dynamically linked, stripped
python.sh: executable shell script
sbase: executable shell script
scalc: executable shell script
sdraw: executable shell script
senddoc: executable shell script
setofficelang: executable shell script
setofficelang.bin: ELF 32-bit LSB executable 80386 Version 1, dynamically linked, stripped
simpress: executable shell script
smath: executable shell script
soffice: executable shell script
soffice.bin: ELF 32-bit LSB executable 80386 Version 1, dynamically linked, stripped
spadmin: executable shell script
spadmin.bin: ELF 32-bit LSB executable 80386 Version 1, dynamically linked, stripped
swriter: executable shell script
testtool.bin: ELF 32-bit LSB executable 80386 Version 1, dynamically linked, stripped
uno: executable shell script
uno.bin: ELF 32-bit LSB executable 80386 Version 1, dynamically linked, stripped
unopkg: executable shell script
unopkg.bin: ELF 32-bit LSB executable 80386 Version 1, dynamically linked, stripped uri-encode: ELF 32-bit LSB executable 80386 Version 1, dynamically linked, stripped
viewdoc: executable shell script
---8<---

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to