Abstract:
The present mechanism provides a data driven command line output within an environment that supports a pipeline of object-based commands. Each object-based command inputs a parseable object for processing and outputs another parseable object for subsequent command processing. The mechanism is operative to direct formatting and subsequent processing of the commands based on a type of the incoming parseable object. Format information is obtained for the type, such as shape, properties to display, and the like. The format information may be specified within an XML-based document. The mechanism utilizes one or more output processing commands, such as format commands, markup commands, convert commands, transform commands, and out commands. These output processing commands may be arranged within the pipeline in various ways to achieve the desired output results.
Abstract:
The present mechanism provides a data driven command line output within an environment that supports a pipeline of object-based commands. Each object-based command inputs a parseable object for processing and outputs another parseable object for subsequent command processing. The parseable objects do not have methods. The mechanism is operative to direct formatting and subsequent processing of the commands based on a type of the incoming parseable object. Format information is obtained for the type, such as shape, properties to display, and the like. The format information may be specified within an XML-based document. The mechanism utilizes one or more output processing it commands, such as format commands, markup commands, convert commands, transform commands, and out commands. These output processing commands may be arranged within the pipeline in various ways to achieve the desired output results.
Abstract:
The adaptation of at least a portion of an object provided by a previous script component to a subsequent script component, despite the subsequent component being incapable of recognizing a format of the at least a portion of the object as provided by the previous component. The previous component generates an object having a property. Adaptation script identifies adaptation(s) to perform on the property prior to being used by the subsequent component. The adaptation is performed, and the adapted property is then used by the subsequent component.
Abstract:
Script is accessed and interpreted to identify an executable component. Processing context configuration files may then be used to identify an appropriate processing context for the identified executable component. Examples of processing context include, but are not limited to, a process in which the identified executable component is to run, one or more adaptations to perform on the component prior to running, and/or a security context in which to run the component. Processing context thus need not be specified in the actual script itself. The identified components may then be executed in the identified processing context.
Abstract:
The techniques and mechanisms described herein are directed to a scripting security mechanism that minimizes security risks associated with interpreting a script written with a scripting language. An interpreter recognizes the scripting-language syntax within the script and processes each line that is designated within a data block using a restrictive set of operations. The restrictive set of operations are a subset of the total operations available for processing. If one of the lines within the data block attempts to perform an operation that is not within the restrictive set of operations, the interpreter provides an indication, such as an exception or message explaining the illegal operation. The interpreter also recognizes a list of export variables associated with the data block and exports only the variables identified in the list to an external environment if the export variable meets a constraint identified for it, if any.
Abstract:
The present mechanism allows commands entered on a command line in a command line operating environment the ability to execute in a first execution mode or an alternate execution mode. The command is executed in the alternate execution mode if the command includes an instruction to execute in the alternate execution mode. The alternate execution mode is provided by the operating environment and provides extended functionality to the command. The alternate execution mode may visually display results of executing the command, visually display simulated results of executing the command, prompt for verification before executing the command, may perform a security check to determine whether a user requesting the execution has sufficient privileges to execute the command, and the like.
Abstract:
A method and system for providing a computing device control interface are provided. A system administrator accesses a graphical user interface and selects a group of actions that are to be executed by a number of computing devices. The actions selected by the system administrator are embodied in a graphical action icon and displayed on the graphical user interface. The system administrator initiates the actions by manipulating the action icon such that it overlaps a computer icon, which embodies one or more computing devices within the network that will execute the selected actions. The computing device icon is also displayed on the user interface. The user interface executes the selected action on the selected computer and then generates an archive file embodying the execution of the selected actions on the selected group of computing devices.
Abstract:
Computerized facilitation of an assessment of risk associated with running interpretable code. The interpretable code under evaluation is parsed to identify a command unit within the interpretable code. One or more risk factors associated with the identified command unit is then identified using the parsed code. A report is then made of including identification of the command unit found the interpretable code along with the identified associated one or more risk factors. Thus, a user need not have to read and evaluate the interpretable code itself, but may instead review the much less complex report to evaluate the risks associated with running the interpretable code.
Abstract:
An exemplary software architecture allows for defining and accessing data and auxiliary data for an item in a navigable namespace. For example, such an exemplary architecture can include a provider engine operable to access data for an item in a navigable namespace, an auxiliary provider engine operable to access auxiliary data for the item and an auxiliary provider class for use in defining the auxiliary data for the item and accessing the auxiliary data for the item. Various other exemplary technologies are also disclosed.
Abstract:
Systems and/or methods are presented that may be used to enable operation of a command line having an upstream command and a downstream command where the upstream command may output data of a type that may be unacceptable as input to the downstream command.