Hi all,
What is the interface of OOo? More specifically, when OOo is installed
on a computer, what are the files from that installation that are either:
1 Intended to be executed directly by a client (human or program) to
accomplish a certain task.
2 Intended to be registered (typically during installation) with the
operating system or some other external framework, to be executed by the
operating system or external framework upon certain events.
I am asking because for
<http://wiki.services.openoffice.org/wiki/ODF_Toolkit/Efforts/OOo_without_URE>
I need to make sure that all these executions happen in environments
that meet certain requirements.
Doing
( for i in * ; do file $i ; done ) | grep executable
in the program directory of a vanilla unxsoli4.pro SRC680m209 OOo, I get
the below long list, probably containing many false positives and
lacking many false negatives (that are only there on other platforms,
special installations, whatever).
Please help me assemble an accurate list. To start, the files I pretty
much *know* are in the first category are (all from the program directory):
pkgchk
sbase
scalc
sdraw
setofficelang
simpress
smath
soffice
spadmin
swriter
testtool.bin
uno
unopkg
-Stephan
The long list:
---8<---
cde-open-url: executable shell script
configimport: executable shell script
configimport.bin: ELF 32-bit LSB executable 80386 Version 1, dynamically
linked, stripped
crash_report: executable shell script
crash_report.bin: ELF 32-bit LSB executable 80386 Version 1, dynamically
linked, stripped
gengal: executable shell script
gengal.bin: ELF 32-bit LSB executable 80386 Version 1, dynamically
linked, stripped
gnome-open-url: executable shell script
gnome-open-url.bin: ELF 32-bit LSB executable 80386 Version 1,
dynamically linked, stripped
gnome-set-default-application: ELF 32-bit LSB executable 80386 Version
1, dynamically linked, stripped
javaldx: ELF 32-bit LSB executable 80386 Version 1, dynamically linked,
stripped
kde-open-url: executable shell script
mailmerge.py: executable /bin/python script
msfontextract: ELF 32-bit LSB executable 80386 Version 1, dynamically
linked, stripped
nsplugin: ELF 32-bit LSB executable 80386 Version 1, dynamically linked,
stripped
open-url: executable shell script
pagein: ELF 32-bit LSB executable 80386 Version 1, dynamically linked,
stripped
pkgchk: executable shell script
pkgchk.bin: ELF 32-bit LSB executable 80386 Version 1, dynamically
linked, stripped
pluginapp.bin: ELF 32-bit LSB executable 80386 Version 1, dynamically
linked, stripped
python: executable shell script
python.bin: ELF 32-bit LSB executable 80386 Version 1, dynamically
linked, stripped
python.sh: executable shell script
sbase: executable shell script
scalc: executable shell script
sdraw: executable shell script
senddoc: executable shell script
setofficelang: executable shell script
setofficelang.bin: ELF 32-bit LSB executable 80386 Version 1,
dynamically linked, stripped
simpress: executable shell script
smath: executable shell script
soffice: executable shell script
soffice.bin: ELF 32-bit LSB executable 80386 Version 1, dynamically
linked, stripped
spadmin: executable shell script
spadmin.bin: ELF 32-bit LSB executable 80386 Version 1, dynamically
linked, stripped
swriter: executable shell script
testtool.bin: ELF 32-bit LSB executable 80386 Version 1, dynamically
linked, stripped
uno: executable shell script
uno.bin: ELF 32-bit LSB executable 80386 Version 1, dynamically linked,
stripped
unopkg: executable shell script
unopkg.bin: ELF 32-bit LSB executable 80386 Version 1, dynamically
linked, stripped
uri-encode: ELF 32-bit LSB executable 80386 Version 1, dynamically
linked, stripped
viewdoc: executable shell script
---8<---
---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]