From 3145e79923143b961e132cbf887910bce35467ba Mon Sep 17 00:00:00 2001 From: Sumit Bose Date: Wed, 29 Oct 2008 15:29:15 +0100 Subject: rename XSLT file from *.xslt to *.xsl --- ipaaction/ipaaction.rng | 2 +- ipaaction/ipaaction.xsl | 100 ++++++++ ipaaction/ipaaction.xslt | 100 -------- ipaaction/ipaaction_example_policy.xml | 2 +- policykit_roles/PKpolicy2IPArole.xsl | 43 ++++ policykit_roles/PKpolicy2IPArole.xslt | 43 ---- policykit_roles/policykit_roles.rng | 2 +- policykit_roles/policykit_roles.xsl | 120 ++++++++++ policykit_roles/policykit_roles.xslt | 120 ---------- policykit_roles/policykit_roles_example_policy.xml | 2 +- sudoers/sudoers.rng | 2 +- sudoers/sudoers.xsl | 259 +++++++++++++++++++++ sudoers/sudoers.xslt | 259 --------------------- sudoers/sudoers_example_policy.xml | 2 +- 14 files changed, 528 insertions(+), 528 deletions(-) create mode 100644 ipaaction/ipaaction.xsl delete mode 100644 ipaaction/ipaaction.xslt create mode 100644 policykit_roles/PKpolicy2IPArole.xsl delete mode 100644 policykit_roles/PKpolicy2IPArole.xslt create mode 100644 policykit_roles/policykit_roles.xsl delete mode 100644 policykit_roles/policykit_roles.xslt create mode 100644 sudoers/sudoers.xsl delete mode 100644 sudoers/sudoers.xslt diff --git a/ipaaction/ipaaction.rng b/ipaaction/ipaaction.rng index 9255ed5..bb49d87 100644 --- a/ipaaction/ipaaction.rng +++ b/ipaaction/ipaaction.rng @@ -16,7 +16,7 @@ xmlns:pa="http://freeipa.org/xml/rng/ns/plugable_architecture/1.0"> 0.1 ipaaction.rng - ipaaction.xslt + ipaaction.xsl ipaaction diff --git a/ipaaction/ipaaction.xsl b/ipaaction/ipaaction.xsl new file mode 100644 index 0000000..cb4be34 --- /dev/null +++ b/ipaaction/ipaaction.xsl @@ -0,0 +1,100 @@ + + + + + Here we have two different kind of handlers 'download' and 'exec'. + + TODO: we have to decide what the client application should do. It would be possible to call an external program like 'curl' or 'wget' or the call libcurl to download a file. I would vote for using 'curl' or 'libcurl' because it seem that curl supports more methods than wget. Download should be done by user nobody into a teporary file and then moved and chowned to the destination. + + TODO: we have to decide how the client application should call the applied program or script. If no 'user' is specifed the default user should be 'nobody'. + + + + + + + + + # IPA generated script for ipaaction policy. DO NOT EDIT + + + + + + + + + + + + + + + + + + + + + + # unknown output_selector + + + + + + + + su - nobody 'curl -o /tmp/SAFE_TEMP_FILE + + ' + + + cat << EOF | base64 -d > /tmp/SAFE_TEMP_FILE + + EOF + + + # unknown element: + + + + + + mv /tmp/SAFE_TEMP_FILE + + + + chown + + : + + + + + + + + + + + + + + nobody + + + + su - + + ' + + ' + + + diff --git a/ipaaction/ipaaction.xslt b/ipaaction/ipaaction.xslt deleted file mode 100644 index cb4be34..0000000 --- a/ipaaction/ipaaction.xslt +++ /dev/null @@ -1,100 +0,0 @@ - - - - - Here we have two different kind of handlers 'download' and 'exec'. - - TODO: we have to decide what the client application should do. It would be possible to call an external program like 'curl' or 'wget' or the call libcurl to download a file. I would vote for using 'curl' or 'libcurl' because it seem that curl supports more methods than wget. Download should be done by user nobody into a teporary file and then moved and chowned to the destination. - - TODO: we have to decide how the client application should call the applied program or script. If no 'user' is specifed the default user should be 'nobody'. - - - - - - - - - # IPA generated script for ipaaction policy. DO NOT EDIT - - - - - - - - - - - - - - - - - - - - - - # unknown output_selector - - - - - - - - su - nobody 'curl -o /tmp/SAFE_TEMP_FILE - - ' - - - cat << EOF | base64 -d > /tmp/SAFE_TEMP_FILE - - EOF - - - # unknown element: - - - - - - mv /tmp/SAFE_TEMP_FILE - - - - chown - - : - - - - - - - - - - - - - - nobody - - - - su - - - ' - - ' - - - diff --git a/ipaaction/ipaaction_example_policy.xml b/ipaaction/ipaaction_example_policy.xml index 061bc21..3ca7e51 100644 --- a/ipaaction/ipaaction_example_policy.xml +++ b/ipaaction/ipaaction_example_policy.xml @@ -5,7 +5,7 @@ sbose@redhat.com 0.7071 ipaaction.rng - ipaaction.xslt + ipaaction.xsl ipaaction diff --git a/policykit_roles/PKpolicy2IPArole.xsl b/policykit_roles/PKpolicy2IPArole.xsl new file mode 100644 index 0000000..6fdf44f --- /dev/null +++ b/policykit_roles/PKpolicy2IPArole.xsl @@ -0,0 +1,43 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + diff --git a/policykit_roles/PKpolicy2IPArole.xslt b/policykit_roles/PKpolicy2IPArole.xslt deleted file mode 100644 index 6fdf44f..0000000 --- a/policykit_roles/PKpolicy2IPArole.xslt +++ /dev/null @@ -1,43 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/policykit_roles/policykit_roles.rng b/policykit_roles/policykit_roles.rng index aa8897d..1803b84 100644 --- a/policykit_roles/policykit_roles.rng +++ b/policykit_roles/policykit_roles.rng @@ -15,7 +15,7 @@ xmlns:pa="http://freeipa.org/xml/rng/ns/plugable_architecture/1.0"> 0.1 policykit_roles.rng - policykit_roles.xslt + policykit_roles.xsl policykit_roles diff --git a/policykit_roles/policykit_roles.xsl b/policykit_roles/policykit_roles.xsl new file mode 100644 index 0000000..09718ee --- /dev/null +++ b/policykit_roles/policykit_roles.xsl @@ -0,0 +1,120 @@ + + + + + + + + + + + + + + # IPA generated ldif for policykit roles. DO NOT EDIT + + + + + + + + + + + + + + + + + + # role: + + + dn: ou= + + ,ou=PolicyKitRoles,xx=some,xx=ldap,xx=path + + + + + + + + + + dn: ou= + + ,ou= + + ,ou=PolicyKitRoles,xx=some,xx=ldap,xx=path + changetype: modify + replace: allow_any allow_any: + + - changetype: modify + replace: allow_inactive allow_inactive: + + - changetype: modify + replace: allow_active allow_active: + + + + + + + + + su - nobody 'curl -o /tmp/SAFE_TEMP_FILE + + ' + + + cat << EOF | base64 -d > /tmp/SAFE_TEMP_FILE + + EOF + + + # unknown element: + + + + + + mv /tmp/SAFE_TEMP_FILE + + + + chown + + : + + + + + + + + + + + + + + nobody + + + + su - + + ' + + ' + + + diff --git a/policykit_roles/policykit_roles.xslt b/policykit_roles/policykit_roles.xslt deleted file mode 100644 index 09718ee..0000000 --- a/policykit_roles/policykit_roles.xslt +++ /dev/null @@ -1,120 +0,0 @@ - - - - - - - - - - - - - - # IPA generated ldif for policykit roles. DO NOT EDIT - - - - - - - - - - - - - - - - - - # role: - - - dn: ou= - - ,ou=PolicyKitRoles,xx=some,xx=ldap,xx=path - - - - - - - - - - dn: ou= - - ,ou= - - ,ou=PolicyKitRoles,xx=some,xx=ldap,xx=path - changetype: modify - replace: allow_any allow_any: - - - changetype: modify - replace: allow_inactive allow_inactive: - - - changetype: modify - replace: allow_active allow_active: - - - - - - - - - su - nobody 'curl -o /tmp/SAFE_TEMP_FILE - - ' - - - cat << EOF | base64 -d > /tmp/SAFE_TEMP_FILE - - EOF - - - # unknown element: - - - - - - mv /tmp/SAFE_TEMP_FILE - - - - chown - - : - - - - - - - - - - - - - - nobody - - - - su - - - ' - - ' - - - diff --git a/policykit_roles/policykit_roles_example_policy.xml b/policykit_roles/policykit_roles_example_policy.xml index 1f615d3..4d0764d 100644 --- a/policykit_roles/policykit_roles_example_policy.xml +++ b/policykit_roles/policykit_roles_example_policy.xml @@ -5,7 +5,7 @@ sbose@redhat.com 0.7071 policykit_roles.rng - policykit_roles.xslt + policykit_roles.xsl policykit_roles diff --git a/sudoers/sudoers.rng b/sudoers/sudoers.rng index 3fa8507..e52a6f2 100644 --- a/sudoers/sudoers.rng +++ b/sudoers/sudoers.rng @@ -15,7 +15,7 @@ xmlns:pa="http://freeipa.org/xml/rng/ns/plugable_architecture/1.0"> 0.5 sudoers.rng - sudoers.xslt + sudoers.xsl sudo diff --git a/sudoers/sudoers.xsl b/sudoers/sudoers.xsl new file mode 100644 index 0000000..7fc4748 --- /dev/null +++ b/sudoers/sudoers.xsl @@ -0,0 +1,259 @@ + + + + + + + + + + + + # IPA generated /etc/sudoers: DO NOT EDIT + + + + + + + + + + + + + + + + + + + + + This is the short description with HTML tags. + + And here comes a more detailed + description showed only in the detailed view of the documentation. + + + + + + + + + + + + + + + + + + + + + + + + + Default + + + + + + : + + + + + + + + + + ! + + + + + + + + = + + + + + + + = + + + + + + + =" + + " + + + + + + ! + + + + + =" + + " + + + + + + + + + ! + + + + + =" + + " + + + + + + + + + + + + + + + + + + + + ALL = + + ( + + ) + + + + + + + + + + + + + + + + ALL + + + + + + + + + % + + + + + + + + + + + + + : + + + diff --git a/sudoers/sudoers.xslt b/sudoers/sudoers.xslt deleted file mode 100644 index 7fc4748..0000000 --- a/sudoers/sudoers.xslt +++ /dev/null @@ -1,259 +0,0 @@ - - - - - - - - - - - - # IPA generated /etc/sudoers: DO NOT EDIT - - - - - - - - - - - - - - - - - - - - - This is the short description with HTML tags. - - And here comes a more detailed - description showed only in the detailed view of the documentation. - - - - - - - - - - - - - - - - - - - - - - - - - Default - - - - - - : - - - - - - - - - - ! - - - - - - - - = - - - - - - - = - - - - - - - =" - - " - - - - - - ! - - - - - =" - - " - - - - - - - - - ! - - - - - =" - - " - - - - - - - - - - - - - - - - - - - - ALL = - - ( - - ) - - - - - - - - - - - - - - - - ALL - - - - - + - - - % - - - - - - - - - - - - - : - - - diff --git a/sudoers/sudoers_example_policy.xml b/sudoers/sudoers_example_policy.xml index 1323ff1..6a49fc2 100644 --- a/sudoers/sudoers_example_policy.xml +++ b/sudoers/sudoers_example_policy.xml @@ -5,7 +5,7 @@ sbose@redhat.com 0.7071 sudoers.rng - sudoers.xslt + sudoers.xsl sudo -- cgit