Hello!
I'd like to modify custom values in a XML config file between comment tags using bash script.
I want to modify the child elements' values of "feature"s between both comment tags. Use sed or is it doable with something like xmlstarlet?
Greetings,
I am creating a ksh script to automate the installation of a utility on many servers.
As part of this install, I want to check for a job in root's crontab.
If the job exists, I need to comment it out.
I know I will need to copy off the crontab then read it back in, but I am... (4 Replies)
Hi,
I would like to get rid of all comment in an xml file by grep or sed command:
The content seem like this:
<!-- ab cd
ef gh
ij kl -->
Anyone can help?
Thanks and Regards (3 Replies)
I'm trying to write a script to help automate some VERY tedious manual tasks.
I have groups of fairly large XML files (~3mb+) that I need to edit.
I need to look through the files and parse the XML looking for a certain flag contained in a field. If I find this flag (an integer value) I need... (4 Replies)
Hello,
I have two files, consider that as file1 and file2. Here file1 is the master file.
file1 will contain data like
GS*RA*071000013*102562451P*091130*0520*334052023*X*003050
ST*820*334052023
BPR*C*509.77*C*ACH*CTX*01*071000013*DA*5529085*9000002008**01*071000013*DA*5529085*091130... (8 Replies)
I have special requirement, my system provided the xml file as below(available xml file) and I need to convert it as below desired xml file.
is it possible thru shell scripts or awk?
What I need is :
my available xml contains number of records with tags <RevenueAmounts>, the last of record is... (6 Replies)
hi,
i need my bash script to find regex in xml file.. and comment 2 lines before and after the line that contains regex.. can't use # needs to be <!-- at the beginning and --> and the end of the comment.
so eg..
first block
<filter>
<filter-name>MyRegEx</filter-name>
... (11 Replies)
Hallo,
im basically a complete noob on shell scripting and im trying to replace or rather add 1 to a number between xml tags.
The xml basically has a tag somewhere that looks like this:
<tag>12345678901234</tag>
Now i want to replace the number between the tags. And i want the file to... (6 Replies)
I want to comment a block of code in xml. Note that the tags will be similar. In the below xml code, I want to block the listener block for com.pkg1.class2. How do i do it ?
Thanks in Advance
<listener>
<listener-class>com.pkg1.class1</listener-class>
</listener>
.........
<listener>... (4 Replies)
Hi guys!
I have quite a lot of files like
all_10001_ct1212307460308.alf*
and I want to get rid of the first number for all at once like:
all_ct1212307460308.alf*
How can I do this in the shell? (12 Replies)
Discussion started by: TimmyTiz
12 Replies
LEARN ABOUT NETBSD
secmodel_extensions
SECMODEL_EXTENSIONS(9) BSD Kernel Developer's Manual SECMODEL_EXTENSIONS(9)NAME
secmodel_extensions -- Extensions security model
DESCRIPTION
secmodel_extensions implements extensions to the traditional security model based on the original 4.4BSD. They can be used to grant addi-
tional privileges to ordinary users, or enable specific security measures like curtain mode.
The extensions are described below.
Curtain mode
When enabled, all returned objects will be filtered according to the user-id requesting information about them, preventing users from access-
ing objects they do not own.
It affects the output of many commands, including fstat(1), netstat(1), ps(1), sockstat(1), and w(1).
This extension is enabled by setting security.models.extensions.curtain or security.curtain sysctl(7) to a non-zero value.
It can be enabled at any time, but cannot be disabled anymore when the securelevel of the system is above 0.
Non-superuser mounts
When enabled, it allows file-systems to be mounted by an ordinary user who owns the point node and has at least read access to the special
device mount(8) arguments. Note that the nosuid and nodev flags must be given for non-superuser mounts.
This extension is enabled by setting security.models.extensions.usermount or vfs.generic.usermount sysctl(7) to a non-zero value.
It can be disabled at any time, but cannot be enabled anymore when the securelevel of the system is above 0.
Non-superuser control of CPU sets
When enabled, an ordinary user is allowed to control the CPU affinity(3) of the processes and threads he owns.
This extension is enabled by setting security.models.extensions.user_set_cpu_affinity sysctl(7) to a non-zero value.
It can be disabled at any time, but cannot be enabled anymore when the securelevel of the system is above 0.
SEE ALSO affinity(3), sched(3), sysctl(7), kauth(9), secmodel(9), secmodel_bsd44(9), secmodel_securelevel(9), secmodel_suser(9)AUTHORS
Elad Efrat <elad@NetBSD.org>
BSD December 3, 2011 BSD