• Aucun résultat trouvé

NETWORKING FEATURES NFS

Dans le document HP-UX Reference (Page 186-198)

User Commands

NETWORKING FEATURES NFS

The file /etc/passwd can be implemented as a Yellow Pages database. Chsh can change only the local /etc/passwd file.

AUTHOR

Chsh was developed by the University of California, Berkeley.

SEE ALSO

csh(l), ksh(l), passwd(l), pam(l), sh(l), passwd(4).

166 (Section 1) - 1 - HP-UX Release 7.0: September 1989

CI(1) Cl(t)

NAME

ci - check in ReS revisions SYNOPSIS

ci [ options ] file '"

DESCRIPTION

Ci stores new revisions into ReS files. Each file name ending in ",V" is taken to be an ReS file;

all others are assumed to be working files. Ci deposits the contents of each working file into the corresponding ReS file (see rcsintro(5».

If the ReS file does not exist, ci creates it and deposits the contents of the working file as the initial revision. The default number is "1.1". The access list is initialized to empty. Instead of the log message, ci requests descriptive text (see the -t option below).

An ReS file created by ci inherits the read and execute permissions from the working file. If the ReS file exists, ci preserves its read and execute permissions. Ci always turns off all write permissions of ReS files.

The caller of the command must have read/write permission for the directories containing the ReS file and the working file, and read permission for the ReS file itself. A number of tem-porary files are created. A semaphore file is created in the directory containing the ReS file.

Because ci always creates a new ReS file and unlinks the old one, links to ReS files are useless.

For ci to work the caller's login must be in the access list, unless the access list is empty, or the caller is the owner of the file, or the caller is superuser.

Normally, ci checks whether the revision to be deposited is different from the preceding one. If it is not different, ci either aborts the deposit (if -q is given) or asks whether to abort (if -q is omitted). A deposit can be forced with the -f option.

For each revision deposited, ci prompts for a log message. The log message should summarize the change and must be terminated with a line containing a single "." or a control-D. If several files are being checked in, ci asks whether or not to reuse the log message from the previous file. If the standard input is not a terminal, ci suppresses the prompt and uses the same log message for all files, see the -m option below.

The number of the deposited revision can be given with any of the options -r, -f, -k, -1, -u, or -q (see the -r option below).

To add a new revision to an existing branch, the head revision on that branch must be locked by the caller. Otherwise, only a new branch can be created. This restriction is not enforced for the owner of the file, unless locking is set to strict (see rcs(l». A lock held by someone else may be broken with the rcs(l) command.

Options

-f[rev] Forces a deposit. The new revision is deposited even if it is not different from the preceding one.

-k[rev]

-I[rev]

Searches the working file for keyword values to determine its revision number, creation date, author, and state (see co(l», and assigns these values to the deposited revision, rather than computing them locally. A revision number given with a command option overrides the number in the working file. This option is useful for software distribution. A revision that is sent to several sites should be checked in with the -k option at these sites to preserve its original number, date, author, and state.

Works like -r, except it performs an additional co -1 for the deposited revi-sion. Thus, the deposited revision is immediately checked out again and locked. This is useful for saving a revision although one wants to continue

CI(I) corresponding lock, and deletes the working file. This is the default.

If rev is omitted, ci derives the new revision number from the caller's last lock. branch is created with the initial revision numbered rev.I.

NOTE: On the trunk, revisions can be added to the head, but not inserted. copied from the file txtfile. During initialization, descriptive text is requested even if -t is not given. The prompt is suppressed if standard input is not a terminal.

-u[rev] Works like -1, except that the deposited revision is not locked. This is useful if one wants to process (e.g., compile) the revision immediately after check in.

Access Control Lists (ACLs)

Optional ACL entries should not be added to RCS files, because they might be deleted.

DIAGNOSTICS

For each revision, ci prints the RCS file, the working file, and the number of both the deposited and the preceding revision. The exit status always refers to the last file checked in, and is 0 if the operation was successful, 1 if unsuccessful.

EXAMPLES

168

If the current directory contains a subdirectory RCS with an RCS file io.c,v, all of the following commands deposit the latest revision from io.c into RCS/io.c,v.

ci io.c

(Section 1) - 2 - HP-UX Release 7.0: September 1989

CI(I)

ci RCS/io.c,v ci io.c,v

ci io.c RCS /io.c, v ci io.c io.c, v ci RCS/io.c,v io.c ci io.c, v io.c

CI(I)

WARNINGS

The names of ReS files are generated by appending ,V to the end of the working file name. If the resulting RCS file name is too long for the file system on which the RCS file should reside, ci terminates with an error message.

The log message may not exceed 2046 bytes.

A file with approximately 240 revisions may cause a hashtable overflow. Ci cannot add another revision to the file until some of the old revisions have been removed. Use the res command with the - 0 (obsolete) option to remove old revisions.

AUTHOR

Ci was developed by Walter F. Tichy, Purdue University, West Lafayette, IN 47907.

Revision Number: 3.0; Release Date: 83/05 /ll.

Copyright 1982 by Walter F. Tichy.

SEE ALSO

co(l), ident(l), rcs(l), rcsdiff(l), rcsintro(5), rcsmerge(l), rlog(l), rcsfile(4), acl(5).

CLEAR(1)

NAME

clear - clear terminal screen SYNOPSIS

clear DESCRIPTION

CLEAR(l)

Clear clears your screen if this is possible. It reads the TERM environment variable for the ter-minal type and then reads the appropriate terminfo data base to figure out how to clear the screen.

FILES

/usr/lib/terminfo/?/* terminal database files AUTHOR

Clear was developed by the University of California, Berkeley California, Computer Science Division, Department of Electrical Engineering and Computer Science.

SEE ALSO terminfo(4).

170 (Section 1) - 1 - HP-UX Release 7.0: September 1989

CMP(1) CMP(l)

NAME

cmp - compare two files SYNOPSIS

cmp [ -1 ] [ -s ] file1 file2 DESCRIPTION

The two files are compared. (If filel or file2 is -, the standard input is used.) Under default options, cmp makes no comment if the files are the same; if thev differ, it announces the bvte and line n~mber at which the difference occurred. If one file i; an initial subsequence of the other, that fact is noted.

Options:

-1 Print the byte number (decimal) and the differing bytes (octal) for each difference (byte numbering begins at 1 rather than 0).

-s Print nothing for differing files; return codes only.

EXTERNAL INFLUENCES Environment Variables

LANG determines the language in which messages are displayed. If LANG is not specified or is set to the empty string, a default of "C" (see lang(S» is used instead of LANG. If any interna-tionalization variable contains an invalid setting, cmp behaves as if all internationalization vari-ables are set to "C". See environ(S).

International Code Set Support

Single- and multi-byte character code sets are supported.

SEE ALSO

comm(l), diff(l).

DIAGNOSTICS

Exit code 0 is returned for identical files, 1 for different files, and 2 for an inaccessible or miss-ing argument.

STANDARDS CONFORMANCE

cmp:SVID2,XPG2,XPG3

CNODES(l) CNODES(l)

NAME

cnodes - display information about specified cluster nodes SYNOPSIS

cnodes [ -almnrsxACl ] [ name ... ] DESCRIPTION

Cnodes displays information about the cluster nodes described in the /etc/c1usterconf file for clustered systems. When no argument is given, all currently active cluster nodes in the cluster termi-nal, the default format is to list one cluster node per line.

In order to determine output formats for multi-column output, cnodes uses the environment variable COLUMNS to determine the number of character positions available on the output line.

If this variable is not set, the term info database is used to determine the number of columns, name is given, cnodes lists all entries in the /etc/c1usterconf file. Cluster nodes not currently clustered are displayed with an asterisk (*) following the cluster node name.

List cluster nodes in long format, giving cluster node name, cnode 10, the cnode's swap server and whether or not the cnode is a root server. If the out-put is going to a terminal, a header is also displayed.

List information about the local cluster node only. If -m is specified, any name arguments are ignored.

List cluster node IDs instead of cluster node names.

Display information about the cluster's root server only. If -r is specified, any name arguments are ignored.

Suppress all output. This option is useful for testing the exit value.

Do not display information about the local cluster node.

Same as -a, except cluster nodes currently not clustered will not have an aster-isk appended to their names.

Cnodes writes "Machine is not clustered" to the standard error output if the specified machine is not currently a member of a cluster and neither the -a nor the -s option was specified.

"Machine does not exist" is written to the standard error output if the specified machine is not listed in /etc/c1usterconf and -s was not specified.

(Section 1) - 1 - HP-UX Release 7.0: September 1989

CNODES(1)

AUTHOR

Cnodes was developed by HP.

FILES

/ etc / cl us terconf SEE ALSO

ccck(lM), cnodeid(2), cnodes(2), terminfo(4), clusterconf(4).

EXTERNAL INFLUENCES Environment Variables

LANG determines the language in which messages are displayed.

CNODES(1)

If LANG is not specified or is set to the empty string, a default of "C" (see lang(S)) is used instead of LANG. If any internationalization variable contains an invalid setting, cnodes behaves as if all internationalization variables are set to "C". See environ(S).

CO(1) CO(1) stores it in the corresponding working file (see also rcsintro)(5).

Revisions of an ReS file may be checked out locked or unlocked. Locking a revision prevents overlapping updates. A revision checked out for reading or processing (e.g., compiling) need not be locked. A revision checked out for editing and later checked in must normally be locked.

Locking a revision currently locked by another user fails. (A lock may be broken with the rcs(l) command.) Co with locking requires the caller to be on the access list of the ReS file, unless he is the owner of the file or the superuser, or the access list is empty. Co without locking is not subject to access list restrictions.

A revision is selected by number, check in date/time, author, or state. If none of these options are specified, the latest revision on the trunk is retrieved. When the options are applied in com-bination, the latest revision that satisfies all of them is retrieved. The options for date/time, locking) in the directory that contains the ReS file.

The working file inherits the read and execute permissions from the RCS file. In addition, the RCS file to prevent simultaneous update.

A co command applied to an ReS file with no revisions creates a zero-length file. Co always

Quiet mode; diagnostics are not printed.

Retrieves the latest revision on the selected branch whose check in date/time is less than or equal to date. The date and time may be given in free format and are con-verted to local time. Examples of formats for date:

Tue-PDT, 1981, 4pm Jul 21 (free format) Fri April 16 15:52:25 EST 1982 (output of ctime(3C»

86/4/21 1O:30am (format: yy/mm/dd hh:mm:ss)

- 1 - HP-UX Release 7.0: September 1989

CO(1)

-r[rev]

-sstate

CO(1)

Most fields in the date and time may be defaulted. Co determines the defaults in the order year, month, day, hour, minute, and second (from most to least significant).

At least one of these fields must be provided. For omitted fields that are of higher significance than the highest provided field, the current values are assumed. For all other omitted fields, the lowest possible values are assumed. For example, the date

"20, 10:30" defaults to 10:30:00 of the 20th of the current month and current year.

Date/time fields may be delimited by spaces or commas. If spaces are used, the string must be surrounded by double quotes.

Retrieves the latest revision whose number is less than or equal to rev. If rev indi-cates a branch rather than a revision, the latest revision on that branch is retrieved.

Rev is <rom posed of one or more numeric or symbolic fields separated by ".". The numeric equivalent of a symbolic field is specified with the -n option of the com-mands ci(1) and rcs(1).

Retrieves the latest revision on the selected branch whose state is set to state.

-w[login] Retrieves the latest revision on the selected branch that was checked in by the user with login name login. If the argument login is omitted, the caller's login is assumed.

-jjoinlist Generates a new revision that is the result of the joining of the revisions on joinlist.

joinlist is a comma-separated list of pairs of the form rev2:rev3, where rev2 and rev3 are (symbolic or numeric) revision numbers. For the initial pair, rev1 denotes the revision selected by the options -1, ... , -w. For all other pairs, rev1 denotes the revi-sion generated by the previous pair. (Thus, the output of one join becomes the input to the next.)

For each pair, co joins revisions revl and rev3 with respect to rev2. This means that all changes that transform rev2 into rev1 are applied to a copy of rev3. This is partic-ularly useful if rev1 and rev3 are the ends of two branches that have rev2 as a com-mon ancestor. If rev1 < rev2 < rev3 on the same branch, joining generates a new revision that is similar to rev3, but with all changes that lead from rev1 to rev2 undone. If changes from rev2 to rev1 overlap with changes from rev2 to rev3, co prints a warning and includes the overlapping sections, delimited by the lines

«««<rev1,

=======,

and »»»>rev3.

For the initial pair, rev2 may be omitted. The default is the common ancestor. If any of the arguments indicate branches, the latest revisions on those branches are assumed. If the option -1 is present, the initial revl is locked.

Keyword Substitution

Strings of the form $keyword$ and $keyword: ... $ embedded in the text are replaced with strings of the form $keyword: value $, where keyword and value are pairs listed below. Keywords may be embedded in literal strings or comments to identify a revision.

Initially, the user enters strings of the form $keyword$. On check out, co replaces these strings with strings of the form $keyword: value $. If a revision containing strings of the latter form is checked back in, the value fields will be replaced during the next check out. Thus, the keyword values are automatically updated on check out.

Keywords and their corresponding values:

$Author$ The login name of the user who checked in the revision.

$Date$ The date and time the revision was checked in.

$Header$ A standard header containing the ReS file name, the revision number, the date, the author, and the state.

CO(1)

$ Locker$

$Log$

$Revision$

$Source$

CO(1)

The login name of the user who locked the revision (empty if not locked).

The log message supplied during check in, preceded by a header containing the RCS file name, the revisioJ,1 number, the author, and the date. Existing log messages are NOT replaced. Instead, the new log message is inserted after

$Log: ... $. This is useful for accumulating a complete change log in a source file.

The revision number assigned to the revision.

The full pathname of the RCS file.

$State$ The state assigned to the revision with res -s or ci -so Access Control Lists (ACLs)

Optional ACL entries should not be added to RCS files because they might be deleted.

DIAGNOSTICS

The RCS file name, the working file name, and the revision number retrieved are written to the diagnostic output. The exit status always refers to the last file checked out, and is 0 if the operation was successful, 1 if unsuccessful.

EXAMPLES

Suppose the current directory contains a subdirectory named RCS with an RCS file named io.c,v. Each of the following commands retrieves the latest revision from RCS/io.c,v and stores it into io.c:

co io.c co RCS/io.c,v co io.c,v

co io.c RCS/io.c,v co io.c io.c,v co RCS/io.c,v io.c co io.c,v io.c WARNINGS

The co command generates the working file name by removing the ,v from the end of the RCS file name. If the given RCS file name is too long for the file system on which the RCS file should reside, co terminates with an error message.

There is no way to suppress the expansion of keywords, except by writing them differently. In nroff(l) and troff, this is done by embedding the null-character"

\&"

into the keyword.

The option -d gets confused in some circumstances, and accepts no date before 1970.

The option -j does not work for files that contain lines with a single ".".

AUTHOR

Co was developed by Walter F. Tichy, Purdue University, West Lafayette, IN 47907.

Revision Number: 3.0; Release Date: 83/05/11.

Copyright 1982 by Walter F. Tichy.

SEE ALSO

ci(l), ident(l), rcs(l), rcsdiff(l), rcsintro(5), rcsmerge(l), rlog(l), rcsfile(4), acl(5).

176 (Section 1) - 3 - HP-UX Release 7.0: September 1989

COL(1) COL(l)

NAME

col - filter reverse line-feeds and backspaces SYNOPSIS

col [ -blfxp ] DESCRIPTION

Col reads from the standard input and writes onto the standard output. It performs the line overlays implied by reverse line feeds (ASCII code ESC-7), and by forward and reverse half-line feeds (ESC-9 and ESC-8). Col is particularly useful for filtering multicolumn output made with the .rt command of nroff(l} and output resulting from use of the tbl(l) preprocessor.

If the -b option is given, col assumes that the output device in use is not capable of backspac-ing. In this case, if two or more characters are to appear in the same place, only the last one read will be output.

If the -I option is given, col assumes the output device is a line printer (rather than a character printer) and removes backspaces in favor of multiply overstruck full lines. It generates the minimum number of print operations necessary to generate the required number of overstrikes.

(All but the last print operation on a line are separated by carriage returns (\r); the last print operation is terminated by a newline (\n).)

Although col accepts half-line motions in its input, it normally does not emit them on output.

Instead, text that would appear between lines is moved to the next lower full-line boundary.

This treatment can be suppressed by the -f (fine) option; in this case, the output from col may contain forward half-line feeds (ESC-9), but will still never contain either kind of reverse line motion.

Unless the -x option is given, col will convert white space to tabs on output wherever possible to shorten printing time.

The ASCII control characters SO (\016) and 51 (\017) are assumed by col to start and end text in an alternate character set. The character set to which each input character belongs is remem-bered, and on output 51 and SO characters are generated as appropriate to ensure that each character is printed in the correct character set.

On input, the only control characters accepted are space, backspace, tab, return, new-line, SI, SO, VT (\013), and ESC followed by 7, 8, or 9. The VT character is an alternate form of full

On input, the only control characters accepted are space, backspace, tab, return, new-line, SI, SO, VT (\013), and ESC followed by 7, 8, or 9. The VT character is an alternate form of full

Dans le document HP-UX Reference (Page 186-198)