shar.1 (5a4db6eb6c59dae2e683cc6e5c2355079d2a6168) | shar.1 (93e0d62d1c2a83232e87912c20f74ab92b0f22b2) |
---|---|
1.\" Copyright (c) 1990, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. --- 16 unchanged lines hidden (view full) --- 25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30.\" SUCH DAMAGE. 31.\" 32.\" @(#)shar.1 8.1 (Berkeley) 6/6/93 | 1.\" Copyright (c) 1990, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. --- 16 unchanged lines hidden (view full) --- 25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30.\" SUCH DAMAGE. 31.\" 32.\" @(#)shar.1 8.1 (Berkeley) 6/6/93 |
33.\" $Id$ |
|
33.\" 34.Dd June 6, 1993 35.Dt SHAR 1 36.Os BSD 4.4 37.Sh NAME 38.Nm shar 39.Nd create a shell archive of files 40.Sh SYNOPSIS 41.Nm shar Ar 42.Sh DESCRIPTION | 34.\" 35.Dd June 6, 1993 36.Dt SHAR 1 37.Os BSD 4.4 38.Sh NAME 39.Nm shar 40.Nd create a shell archive of files 41.Sh SYNOPSIS 42.Nm shar Ar 43.Sh DESCRIPTION |
43.Nm Shar 44writes an | 44The 45.Nm 46command writes a |
45.Xr sh 1 46shell script to the standard output which will recreate the file 47hierarchy specified by the command line operands. 48Directories will be recreated and must be specified before the 49files they contain (the 50.Xr find 1 51utility does this correctly). 52.Pp | 47.Xr sh 1 48shell script to the standard output which will recreate the file 49hierarchy specified by the command line operands. 50Directories will be recreated and must be specified before the 51files they contain (the 52.Xr find 1 53utility does this correctly). 54.Pp |
53.Nm Shar 54is normally used for distributing files by | 55The 56.Nm 57command is normally used for distributing files by |
55.Xr ftp 1 56or 57.Xr mail 1 . 58.Sh SEE ALSO 59.Xr compress 1 , 60.Xr mail 1 , 61.Xr tar 1 , 62.Xr uuencode 1 63.Sh BUGS | 58.Xr ftp 1 59or 60.Xr mail 1 . 61.Sh SEE ALSO 62.Xr compress 1 , 63.Xr mail 1 , 64.Xr tar 1 , 65.Xr uuencode 1 66.Sh BUGS |
64.Nm Shar 65makes no provisions for special types of files or files containing | 67The 68.Nm 69command makes no provisions for special types of files or files containing |
66magic characters. | 70magic characters. |
67.Nm Shar 68cannot handle files without a newline ('\\n') | 71The 72.Nm 73command cannot handle files without a newline ('\\n') |
69as the last character. 70.Pp 71It is easy to insert trojan horses into | 74as the last character. 75.Pp 76It is easy to insert trojan horses into |
72.Nm shar | 77.Nm |
73files. 74It is strongly recommended that all shell archive files be examined 75before running them through 76.Xr sh 1 . 77Archives produced using this implementation of | 78files. 79It is strongly recommended that all shell archive files be examined 80before running them through 81.Xr sh 1 . 82Archives produced using this implementation of |
78.Nm shar | 83.Nm |
79may be easily examined with the command: 80.Bd -literal -offset indent 81egrep -v '^[X#]' shar.file 82.Ed 83.Sh EXAMPLES 84To create a shell archive of the program 85.Xr ls 1 86and mail it to Rick: --- 9 unchanged lines hidden (view full) --- 96... 97<delete header lines and examine mailed archive> 98... 99sh archive 100.Ed 101.Sh HISTORY 102The 103.Nm | 84may be easily examined with the command: 85.Bd -literal -offset indent 86egrep -v '^[X#]' shar.file 87.Ed 88.Sh EXAMPLES 89To create a shell archive of the program 90.Xr ls 1 91and mail it to Rick: --- 9 unchanged lines hidden (view full) --- 101... 102<delete header lines and examine mailed archive> 103... 104sh archive 105.Ed 106.Sh HISTORY 107The 108.Nm |
104command appears in | 109command appeared in |
105.Bx 4.4 . | 110.Bx 4.4 . |