shar.1 (5a4db6eb6c59dae2e683cc6e5c2355079d2a6168) shar.1 (93e0d62d1c2a83232e87912c20f74ab92b0f22b2)
1.\" Copyright (c) 1990, 1993
2.\" The Regents of the University of California. All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\" notice, this list of conditions and the following disclaimer.

--- 16 unchanged lines hidden (view full) ---

25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30.\" SUCH DAMAGE.
31.\"
32.\" @(#)shar.1 8.1 (Berkeley) 6/6/93
1.\" Copyright (c) 1990, 1993
2.\" The Regents of the University of California. All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\" notice, this list of conditions and the following disclaimer.

--- 16 unchanged lines hidden (view full) ---

25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30.\" SUCH DAMAGE.
31.\"
32.\" @(#)shar.1 8.1 (Berkeley) 6/6/93
33.\" $Id$
33.\"
34.Dd June 6, 1993
35.Dt SHAR 1
36.Os BSD 4.4
37.Sh NAME
38.Nm shar
39.Nd create a shell archive of files
40.Sh SYNOPSIS
41.Nm shar Ar
42.Sh DESCRIPTION
34.\"
35.Dd June 6, 1993
36.Dt SHAR 1
37.Os BSD 4.4
38.Sh NAME
39.Nm shar
40.Nd create a shell archive of files
41.Sh SYNOPSIS
42.Nm shar Ar
43.Sh DESCRIPTION
43.Nm Shar
44writes an
44The
45.Nm
46command writes a
45.Xr sh 1
46shell script to the standard output which will recreate the file
47hierarchy specified by the command line operands.
48Directories will be recreated and must be specified before the
49files they contain (the
50.Xr find 1
51utility does this correctly).
52.Pp
47.Xr sh 1
48shell script to the standard output which will recreate the file
49hierarchy specified by the command line operands.
50Directories will be recreated and must be specified before the
51files they contain (the
52.Xr find 1
53utility does this correctly).
54.Pp
53.Nm Shar
54is normally used for distributing files by
55The
56.Nm
57command is normally used for distributing files by
55.Xr ftp 1
56or
57.Xr mail 1 .
58.Sh SEE ALSO
59.Xr compress 1 ,
60.Xr mail 1 ,
61.Xr tar 1 ,
62.Xr uuencode 1
63.Sh BUGS
58.Xr ftp 1
59or
60.Xr mail 1 .
61.Sh SEE ALSO
62.Xr compress 1 ,
63.Xr mail 1 ,
64.Xr tar 1 ,
65.Xr uuencode 1
66.Sh BUGS
64.Nm Shar
65makes no provisions for special types of files or files containing
67The
68.Nm
69command makes no provisions for special types of files or files containing
66magic characters.
70magic characters.
67.Nm Shar
68cannot handle files without a newline ('\\n')
71The
72.Nm
73command cannot handle files without a newline ('\\n')
69as the last character.
70.Pp
71It is easy to insert trojan horses into
74as the last character.
75.Pp
76It is easy to insert trojan horses into
72.Nm shar
77.Nm
73files.
74It is strongly recommended that all shell archive files be examined
75before running them through
76.Xr sh 1 .
77Archives produced using this implementation of
78files.
79It is strongly recommended that all shell archive files be examined
80before running them through
81.Xr sh 1 .
82Archives produced using this implementation of
78.Nm shar
83.Nm
79may be easily examined with the command:
80.Bd -literal -offset indent
81egrep -v '^[X#]' shar.file
82.Ed
83.Sh EXAMPLES
84To create a shell archive of the program
85.Xr ls 1
86and mail it to Rick:

--- 9 unchanged lines hidden (view full) ---

96...
97<delete header lines and examine mailed archive>
98...
99sh archive
100.Ed
101.Sh HISTORY
102The
103.Nm
84may be easily examined with the command:
85.Bd -literal -offset indent
86egrep -v '^[X#]' shar.file
87.Ed
88.Sh EXAMPLES
89To create a shell archive of the program
90.Xr ls 1
91and mail it to Rick:

--- 9 unchanged lines hidden (view full) ---

101...
102<delete header lines and examine mailed archive>
103...
104sh archive
105.Ed
106.Sh HISTORY
107The
108.Nm
104command appears in
109command appeared in
105.Bx 4.4 .
110.Bx 4.4 .