You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
tdeadmin/knetworkconf/backends/service-list.pl.in

336 lines
8.5 KiB

#!/usr/bin/env perl
# Functions for getting service descriptions.
#
# Copyright (C) 2002 Ximian, Inc.
#
# Authors: Carlos Garnacho Parro <garnacho@tuxerver.net>
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU Library General Public License as published
# by the Free Software Foundation; either version 2 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU Library General Public License for more details.
#
# You should have received a copy of the GNU Library General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
# This function determines if a service is "forbidden" or not (if runlevel-admin must show it or not)
sub gst_service_list_service_is_forbidden
{
my ($service) = @_;
my ($ret);
my ($service_forbidden_list) =
[
# These are the forbidden services I found in Red Hat
"halt",
"functions",
"killall",
# These are the forbidden services I found in Debian Woody
"single",
"sendsigs",
"reboot",
"rcS",
"modutils",
"hostname\.sh",
"devpts\.sh",
"console-screen\.sh",
"checkroot\.sh",
"checkfs\.sh",
"bootmisc\.sh",
"bootclean\.sh",
"checkfs\.sh",
"keymap\.sh",
"hwclockfirst\.sh",
"etc-setserial",
"procps\.sh",
"mountall\.sh",
"dns-clean",
"ifupdown",
"networking",
"mountnfs\.sh",
"mountkernfs",
"mountvirtfs",
"setserial",
"hwclock\.sh",
"urandom",
"nviboot",
"pppd-dns",
"skeleton",
"xfree86-common",
"rc",
".*\.dpkg-old",
".*~",
# this shouldn't be shown in slackware
"inet2",
# those were found in gentoo
"bootmisc",
"checkfs",
"checkroot",
"clock",
"consolefont",
"crypto-loop",
"domainname",
"hostname",
"keymaps",
"localmount",
"net\..*",
"numlock",
"depscan\.sh",
"functions\.sh",
"halt\.sh",
"reboot\.sh",
"rmnologin",
"runscript\.sh",
"serial",
"shutdown\.sh",
"switch",
# those were found in FreeBSD
"DAEMON",
"LOGIN",
"NETWORKING",
"SERVERS",
"addswap",
"adjkerntz",
"archdep",
"atm2\.sh",
"atm3\.sh",
"ccd",
"cleanvar",
"devdb",
"devfs",
"dhclient",
"diskless",
"dumpon",
"fsck",
"hostname",
"initdiskless",
"initrandom",
"ldconfig",
"local",
"localdaemons",
"mountcritlocal",
"mountcritremote",
"msgs",
"netif",
"network1",
"network2",
"network3",
"nisdomain",
"othermta",
"pccard",
"pcvt",
"pwcheck",
"random",
"rcconf\.sh",
"root",
"savecore",
"securelevel",
"serial",
"sppp",
"swap1",
"syscons",
"sysctl",
"ttys",
"virecover",
# These are the services found in SuSE
"rc[sS0-9]\.d",
"boot",
"boot\..*",
];
foreach $i (@$service_forbidden_list)
{
return 1 if ($service =~ "^$i\$");
}
return undef;
}
# Ok, maybe we should define this roles stuff a bit:
#
# SYSTEM: all system related services that only powerusers care of
# SOUND: any service related to sound
# WEB_SERVER: any web server
# COMMAND_SCHEDULER: any service which runs scheduled commands
# NETWORK: network related services that only powerusers care of
# PRINTER_SERVICE: printing daemons in general
# DYNAMIC_DNS: Dinamic DNS services
# DICT:
# MTA: Mail transport agents
# MAIL_FETCHER: services that fetch the mail from other accounts
# DISPLAY_MANAGER: Display managers
# SYSTEM_LOGGER: system log services
# DATABASE_SERVER: database servers
# FILE_SERVER: file servers
# NTP_SERVER: Network time protocol servers
# SECURE_SHELL_SERVER: Secure shell servers
# AUTOMOUNTER: automounter daemons and so
# ANTIVIRUS:
# FILE_SHARING: for emule-like services
# FTP_SERVER:
#
#
# If you feel that there are more important/necessary roles,
# mail me at carlosg@gnome.org
sub gst_service_get_role
{
my ($script) = @_;
my %service_roles = (
"acpid" => "SYSTEM",
"alsa" => "SOUND",
"am-utils" => "AUTOMOUNTER",
"amavis" => "ANTIVIRUS",
"amavis-ng" => "ANTIVIRUS",
"apache" => "WEB_SERVER",
"apache-perl" => "WEB_SERVER",
"apache-ssl" => "WEB_SERVER",
"apache2" => "WEB_SERVER",
"anacron" => "COMMAND_SCHEDULER",
"apmd" => "SYSTEM",
"atd" => "COMMAND_SCHEDULER", #FIXME
"atftpd" => "FTP_SERVER",
"aumix" => "SOUND",
"autofs" => "AUTOMOUNTER",
"bind" => "NETWORK",
"binfmt-support" => "SYSTEM",
"bootlogd" => "SYSTEM",
"chargen" => "NETWORK",
"chargen-udp" => "NETWORK",
"cherokee" => "WEB_SERVER",
"clamav-daemon" => "ANTIVIRUS",
"courier" => "MTA",
"courier-mta" => "MTA",
"cpufreqd" => "SYSTEM",
"cron" => "COMMAND_SCHEDULER",
"crond" => "COMMAND_SCHEDULER",
"cupsd" => "PRINTER_SERVICE",
"cups" => "PRINTER_SERVICE",
"cupsys" => "PRINTER_SERVICE",
"daytime" => "NETWORK",
"daytime-udp" => "NETWORK",
"dbus-1" => "SYSTEM",
"ddclient" => "DYNAMIC_DNS",
"dhis-client" => "DYNAMIC_DNS",
"dictd" => "DICT",
"echo" => "NETWORK",
"echo-udp" => "NETWORK",
"esound" => "SOUND",
"exim" => "MTA",
"fam" => "SYSTEM",
"fcron" => "COMMAND_SCHEDULER",
"firstboot" => "SYSTEM",
"festival" => "SOUND", #FIXME
"fetchmail" => "MAIL_FETCHER",
"freenet6" => "NETWORK",
"ftpd" => "FTP_SERVER",
"gdm" => "DISPLAY_MANAGER",
"gpm" => "SYSTEM", #FIXME
"hdparm" => "SYSTEM",
"hotplug" => "SYSTEM",
"httpd" => "WEB_SERVER",
"inetd" => "NETWORK",
"iptables" => "NETWORK",
"irda" => "SYSTEM",
"isakmpd" => "NETWORK",
"isdn" => "NETWORK",
"joystick" => "SYSTEM",
"tdm" => "DISPLAY_MANAGER",
"keytable" => "SYSTEM",
"klogd" => "SYSTEM_LOGGER",
"kudzu" => "SYSTEM",
"lircd" => "SYSTEM",
"lircmd" => "SYSTEM",
"local" => "SYSTEM",
"lpd" => "PRINTER_SERVICE",
"lpdng" => "PRINTER_SERVICE",
"mailscanner" => "ANTIVIRUS",
"makedev" => "SYSTEM",
"metalog" => "SYSTEM_LOGGER",
"mldonkey-server" => "FILE_SHARING",
"modules" => "SYSTEM",
"module-init-tools" => "SYSTEM",
"mysql" => "DATABASE_SERVER",
"muddleftpd" => "FTP_SERVER",
"named" => "NETWORK",
"netfs" => "SYSTEM",
"network" => "SYSTEM",
"nfs" => "FILE_SERVER",
"nfs-user-server" => "FILE_SERVER",
"nfs-kernel-server" => "FILE_SERVER",
"nfslock" => "SYSTEM",
"nscd" => "NETWORK",
"ntpd" => "NTP_SERVER",
"ntpdate" => "NTP_SERVER",
"ntp-client" => "NTP_CLIENT",
"ntp-simple" => "NTP_SERVER",
"oftpd" => "FTP_SERVER",
"oops" => "NETWORK",
"pcmcia" => "SYSTEM",
"pdnsd" => "NETWORK",
"pipsecd" => "NETWORK",
"portmap" => "NETWORK",
"postfix" => "MTA",
"postgresql" => "DATABASE_SERVER",
"postgresql-7.4" => "DATABASE_SERVER",
"postgresql-8.0" => "DATABASE_SERVER",
"ppp" => "NETWORK",
"proftpd" => "FTP_SERVER",
"privoxy" => "NETWORK",
"pure-ftpd" => "FTP_SERVER",
"qmail" => "MTA",
"random" => "SYSTEM",
"rawdevices" => "SYSTEM",
"rhnsd" => "SYSTEM",
"rsync" => "NETWORK",
"rsyncd" => "NETWORK",
"samba" => "FILE_SERVER",
"saslauthd" => "SYSTEM", # FIXME: maybe a SECURITY role makes sense?
"sendmail" => "MTA",
"servers" => "NETWORK",
"services" => "NETWORK",
"setserial" => "SYSTEM",
"sgi_fam" => "SYSTEM",
"smartmontools" => "SYSTEM",
"spamassassin" => "SYSTEM",
"snmpd" => "NETWORK",
"ssh" => "SECURE_SHELL_SERVER",
"sshd" => "SECURE_SHELL_SERVER",
"sysklogd" => "SYSTEM_LOGGER",
"syslog" => "SYSTEM_LOGGER",
"tftpd-hpa" => "FTP_SERVER",
"time" => "NETWORK",
"time-udp" => "NETWORK",
"urandom" => "SYSTEM",
"vcron" => "COMMAND_SCHEDULER",
"vmware" => "SYSTEM", # FIXME
"vsftpd" => "FTP_SERVER",
"wdm" => "DISPLAY_MANAGER",
"webmin" => "SYSTEM", # FIXME as well
"winbind" => "NETWORK",
"wine" => "SYSTEM", # FIXME like vmware
"wu-ftpd" => "FTP_SERVER",
"wzdftpd" => "FTP_SERVER",
"xdm" => "DISPLAY_MANAGER",
"xfs" => "SYSTEM",
"xinetd" => "NETWORK",
"zmailer" => "MTA",
);
my ($role) = $service_roles{$script};
return $role if ($role);
return "UNKNOWN";
}
1;