mirror of
https://github.com/cheat/cheat.git
synced 2025-09-01 17:48:30 +02:00
Compare commits
468 Commits
Author | SHA1 | Date | |
---|---|---|---|
1b6b5b79b7 | |||
87448c49fa | |||
80b8cfc06b | |||
8a8f30679d | |||
4d19505b79 | |||
a2e028fd19 | |||
5eec6bf040 | |||
3a4c2a887d | |||
879a58b721 | |||
7814de96d2 | |||
a651426075 | |||
c4c935a6a5 | |||
df86142b8e | |||
60b05c8781 | |||
22b64d2d08 | |||
1224908445 | |||
28a2902e20 | |||
730c488854 | |||
ba9051e3cd | |||
7c7278ac8b | |||
e1fdca231e | |||
6b796adaf7 | |||
95843e4674 | |||
2b58300d84 | |||
bf1be86fb9 | |||
35c4a8d639 | |||
6910adae90 | |||
b47b4bc1d1 | |||
ea7e71b002 | |||
d576eef13b | |||
bec516b30a | |||
f0b3f8037b | |||
3938032595 | |||
f35cfa084e | |||
cdb22f310d | |||
6d1eff16a1 | |||
9241de04d6 | |||
8ac1851a69 | |||
cccf37c284 | |||
15f70c2cc3 | |||
cebe3de389 | |||
8ec51d3194 | |||
500dbbbd4a | |||
66ebae4ed5 | |||
5a83a22888 | |||
62a2bf3c2d | |||
4b6dc22c0a | |||
cd46559250 | |||
03fb44159a | |||
f0bd3ba4e6 | |||
72f8c88394 | |||
2fcc808e63 | |||
4aef22f457 | |||
146b671412 | |||
feab7a9706 | |||
a5b0132b08 | |||
ce1f4a099c | |||
0e84cae79e | |||
93180c3852 | |||
795bcaffcb | |||
d6f12c4397 | |||
8ccc8bd546 | |||
c29a3dfdc1 | |||
7e94f1e0ba | |||
ff1227bca8 | |||
b0aa272b49 | |||
130cf1d830 | |||
f93ca8f7ce | |||
c0fe871b33 | |||
b210fbca5f | |||
45c0dad364 | |||
544d11aebc | |||
51f7a42ece | |||
cd6826d5d4 | |||
c09f0b0c6c | |||
3fe72a03cc | |||
0c0d924df6 | |||
aa1e12625e | |||
d09353bfca | |||
81e80c87a1 | |||
3d498d5ce7 | |||
d90d509702 | |||
b46f5b2c34 | |||
e2d63e7603 | |||
67f52f8317 | |||
67134b9240 | |||
c67adb1422 | |||
c2aa5e0148 | |||
332f0bd4ee | |||
b303bc0028 | |||
02f79ddd13 | |||
71680c6586 | |||
a240413eb9 | |||
cde64e3ea4 | |||
0b0bc441c6 | |||
2aa37432cb | |||
89de3705b0 | |||
d12718b8c4 | |||
900e083b99 | |||
837e0b5b71 | |||
30d2a77a6c | |||
1a8cdf84f4 | |||
181403e7ac | |||
2c10955690 | |||
4319b8e699 | |||
57dff86a44 | |||
761bf2eb2f | |||
aa4f6daf77 | |||
d7272c50c4 | |||
cdf573a725 | |||
eb6dfaad39 | |||
f8d2ce516e | |||
e5bf9146fe | |||
d6dc39c687 | |||
fb5ec798fa | |||
866eb68d64 | |||
e17f60e4d5 | |||
ed2ef113f0 | |||
432379d1e6 | |||
7089bef7cc | |||
aa57371819 | |||
921db35400 | |||
852db958a4 | |||
d58bbba1f8 | |||
e5ffcf65e4 | |||
d59ac66f1c | |||
f4f8592933 | |||
c540a600b2 | |||
9224216581 | |||
2da5c2b710 | |||
e468f8d0a0 | |||
cdee0e44cd | |||
efcd687070 | |||
ae309c7dc4 | |||
86ba22e7b8 | |||
2a6ec9cef5 | |||
2d59026b0d | |||
bcb0d71dd3 | |||
d1526ede16 | |||
374d381c00 | |||
1f3f9828c3 | |||
5d3f89924c | |||
74808845a5 | |||
517bf9599b | |||
7716827dfc | |||
c65fde1b3a | |||
bb3c4105cb | |||
edd7b5e806 | |||
7abb663bf4 | |||
f6f1233b12 | |||
b9241efab1 | |||
8019325f1e | |||
7209f2c929 | |||
068d117bef | |||
9ead66461d | |||
d00bd87dd1 | |||
dd8b20a17a | |||
84e42e7f2f | |||
a59e91ead7 | |||
f495a4dfd9 | |||
10dd0e9a8b | |||
d06e5bab6f | |||
aa9403d432 | |||
75b2555710 | |||
632da2024a | |||
1baa6d39c0 | |||
8cad76943a | |||
a6ec02c296 | |||
7392787e31 | |||
208dd24a0c | |||
df34774a7a | |||
8d65424ffb | |||
597acec6ac | |||
7d4150b937 | |||
5df5b1ab49 | |||
f1c8017342 | |||
8f2912e5da | |||
3139796524 | |||
bcd4563bf3 | |||
5cd5387a47 | |||
c8f0e6295b | |||
31e442d7f9 | |||
05400a92ed | |||
034c1a2415 | |||
dab8645394 | |||
352a760561 | |||
6be87e2d42 | |||
403d715127 | |||
0edd1450dc | |||
d87a26ce4f | |||
cdf240b70e | |||
809c6d77bc | |||
be543450c7 | |||
9889d77adb | |||
354376340f | |||
d82eee726c | |||
9a23458a2d | |||
32802c2907 | |||
2a6d34de35 | |||
f1253031f2 | |||
76fa9cfc23 | |||
0a54b2a2ff | |||
6a1742984c | |||
80d2a09456 | |||
5121fece91 | |||
e8d32102cb | |||
eff042d50b | |||
f000756f2c | |||
ef1dfb2168 | |||
3c1b5c5860 | |||
3494827403 | |||
f0879831c5 | |||
8c056d09e9 | |||
dd8d0ae58b | |||
6cc99a2b6a | |||
70ad22c12e | |||
b28e6a84ac | |||
bf4f1c80ca | |||
9cf1a5761d | |||
13fdcec332 | |||
b2feeab4e8 | |||
c4b7fd507f | |||
b77aa0974b | |||
3be95142ed | |||
bb324e94a4 | |||
7084ce2f45 | |||
905006f09c | |||
06a368fb1f | |||
6a9422502a | |||
41332f1d8a | |||
b6d54b135c | |||
a3c682729e | |||
f38da23741 | |||
20d985d993 | |||
09f821835c | |||
7e5e4315e5 | |||
869e7095f3 | |||
6dd8faf26a | |||
c0585ee55c | |||
c0d755e102 | |||
49e1fc46f4 | |||
3d90b26b04 | |||
3b73b9b06b | |||
74d1bc1ec7 | |||
78c76dc75a | |||
f204ed66e1 | |||
29c53b754d | |||
5a7fdfcca7 | |||
c3f082eccf | |||
808a2585ef | |||
c0aad062ec | |||
8ffeaa4211 | |||
c1d4c768de | |||
a063c7bb64 | |||
d058ee087e | |||
35c38be120 | |||
cc86f23dba | |||
54086bf8d6 | |||
429ed25aba | |||
128f28ac99 | |||
420a320839 | |||
e3f435a78a | |||
dcc01bb980 | |||
6f27a3e614 | |||
36b078c9f6 | |||
73c1842866 | |||
ceb3707d28 | |||
f9e8e041ef | |||
b59e83e706 | |||
bfa813a0b8 | |||
c179ef64c6 | |||
14a4ee867e | |||
70ef6239fe | |||
1b55a238df | |||
eeb2c92576 | |||
c1fbeffde5 | |||
b6137cac8b | |||
711fd02195 | |||
248f5a0526 | |||
8e7ce511bd | |||
ba7ebc8392 | |||
6670785a2a | |||
aabaab1185 | |||
22eb1f2df4 | |||
a519ea163e | |||
6a2eda80d4 | |||
20d52376f9 | |||
3b2848668a | |||
a8f91d4224 | |||
e0adbbc5b9 | |||
905f12a279 | |||
0c24bbbaaf | |||
baa782b8ce | |||
740358e4c0 | |||
2ebc8c9fac | |||
f3ecf76239 | |||
84df17a0f6 | |||
91c28712e6 | |||
8eda2266bc | |||
47fd7c90f4 | |||
cafa2fb2fd | |||
9c31ba5102 | |||
da65ea32d8 | |||
e1aec49ed6 | |||
ab86ac970d | |||
90f66ccaf3 | |||
f63406bc3e | |||
b3a93bc128 | |||
8f0d2e9fc3 | |||
4c2d0d2d8e | |||
ac445388d9 | |||
705601f0b1 | |||
2d7fdb5425 | |||
4512a61086 | |||
8096ca7f90 | |||
511c57f582 | |||
6ca4b6c8e7 | |||
9c696cc430 | |||
001fdb0eda | |||
af354ba6a3 | |||
196875a828 | |||
6cf69bc190 | |||
6b736083c3 | |||
b477df20b2 | |||
6304a65399 | |||
bc40ced2c1 | |||
74dfd51601 | |||
51b0b12663 | |||
ae45265317 | |||
97dd037538 | |||
402d15e8d8 | |||
8a07a1e96c | |||
aa9b3e8bb4 | |||
9db66dbaeb | |||
c906a394cc | |||
6ca560c1b7 | |||
e75e9bb211 | |||
dd93473464 | |||
0d6de64fc0 | |||
26991977fd | |||
878e266f5b | |||
55e7181d87 | |||
59accc64f7 | |||
c18e475fd1 | |||
2166a57ccd | |||
b2e1400bb6 | |||
30a49d3596 | |||
86ba1ad9e6 | |||
820de5dba8 | |||
33f0dc346b | |||
889c8ef8fe | |||
434802341e | |||
d897a8a8ea | |||
aba6fe5043 | |||
86d1ce58a9 | |||
fd7f31bf16 | |||
417f47f037 | |||
f39fad1324 | |||
4cf03c5363 | |||
afcd74c8bf | |||
e27ce3f1f9 | |||
e9b8f04c24 | |||
d14c759a48 | |||
c70dc002fa | |||
ff8ba4e717 | |||
718ec4f685 | |||
3d8343a878 | |||
a5352ad9e5 | |||
f5ee3d5e29 | |||
e64babc972 | |||
cd465ef84f | |||
96e26a38d4 | |||
998ed00424 | |||
1fd03d3305 | |||
77cba58599 | |||
c5a738a8b1 | |||
250a265b25 | |||
c232721119 | |||
55492c50ac | |||
d9df28e3f2 | |||
710c7bcf70 | |||
efba736aee | |||
95774db7c5 | |||
da63c5d27f | |||
2e1cda114a | |||
353fe48d60 | |||
a96bd229a6 | |||
4d57f529c9 | |||
5caa8fed38 | |||
69f91e0cf4 | |||
fdbc8909cc | |||
76a91ce358 | |||
be2cb6e632 | |||
426b0aaa0d | |||
9041c57d21 | |||
1dd9d85509 | |||
9506167af8 | |||
27482cbabd | |||
03bb651bf0 | |||
c4a5ca3900 | |||
03b587f538 | |||
e4d7722476 | |||
3807aa5433 | |||
956ce7fadd | |||
57876ed0e7 | |||
58abb16ca1 | |||
54e30022f0 | |||
c412cd0534 | |||
2d67038188 | |||
603bc360c0 | |||
f772ef167e | |||
2c2ab6a57f | |||
61458933eb | |||
6f579f9234 | |||
77429d9ccc | |||
4ea583503b | |||
7eb405dcf8 | |||
6b8ecd6b5c | |||
6efae113cf | |||
ed91f9fa37 | |||
0720d0fdc2 | |||
cb706de241 | |||
873968903a | |||
dde3acf109 | |||
d1d5d84e4c | |||
41d2a810e6 | |||
28478ff257 | |||
111c2098c0 | |||
ce611eaceb | |||
ab2d96edb4 | |||
b193112a13 | |||
db92b4c5d8 | |||
8dd00d8c9b | |||
f9f1c5b3e4 | |||
6a8e3f7fc6 | |||
64d331265e | |||
e391cf2f01 | |||
3e287e62b8 | |||
13429f6148 | |||
f125db6f45 | |||
22a33dc5d3 | |||
7bd603cf23 | |||
d0324ecef3 | |||
d1fb8414f8 | |||
191a5e6e84 | |||
95636f5433 | |||
e4417b2d65 | |||
eda53cccd6 | |||
ccfe2a9cbd | |||
301203f268 | |||
9cd4bdd6d7 | |||
7b895adee5 | |||
b77b9e8541 | |||
d68fb456ba | |||
d7d033c908 | |||
fa4b482832 | |||
cf8893ec5f | |||
0a3fd3559c | |||
6a4414f538 | |||
538aeee2b2 | |||
371c0af156 | |||
8677e0c35a | |||
afcaaafbe5 | |||
f128167311 | |||
74a91aa1d4 | |||
f0cbc2df7b | |||
377da479e6 | |||
2f56270ded |
4
.gitignore
vendored
4
.gitignore
vendored
@ -1,2 +1,6 @@
|
||||
*.pyc
|
||||
.env
|
||||
MANIFEST
|
||||
build
|
||||
cheat.egg-info
|
||||
dist
|
||||
|
29
CONTRIBUTING.md
Normal file
29
CONTRIBUTING.md
Normal file
@ -0,0 +1,29 @@
|
||||
Contributing
|
||||
============
|
||||
If you would like to contribute cheetsheets or program functionality, please
|
||||
fork this repository, make your changes, and submit a pull request against the
|
||||
`master` branch.
|
||||
|
||||
|
||||
## Python standards ##
|
||||
Python code should conform to [PEP 8][].
|
||||
|
||||
|
||||
## Cheatsheet Format ##
|
||||
Please pattern your cheatsheets after the following:
|
||||
|
||||
```sh
|
||||
# To extract an uncompressed archive:
|
||||
tar -xvf /path/to/foo.tar
|
||||
|
||||
# To create an uncompressed archive:
|
||||
tar -cvf /path/to/foo.tar /path/to/foo/
|
||||
|
||||
# To extract a .gz archive:
|
||||
tar -xzvf /path/to/foo.tgz
|
||||
```
|
||||
|
||||
If you are submitting a cheatsheet that contains side-by-side columns of text,
|
||||
please align the columns using spaces rather than tabs.
|
||||
|
||||
[PEP 8]: http://legacy.python.org/dev/peps/pep-0008/
|
680
LICENSE
680
LICENSE
@ -1,678 +1,2 @@
|
||||
|
||||
GNU GENERAL PUBLIC LICENSE
|
||||
Version 3, 29 June 2007
|
||||
|
||||
Copyright (C) 2007 Free Software Foundation, Inc. [http://fsf.org/]
|
||||
Everyone is permitted to copy and distribute verbatim copies
|
||||
of this license document, but changing it is not allowed.
|
||||
|
||||
Preamble
|
||||
|
||||
The GNU General Public License is a free, copyleft license for
|
||||
software and other kinds of works.
|
||||
|
||||
The licenses for most software and other practical works are designed
|
||||
to take away your freedom to share and change the works. By contrast,
|
||||
the GNU General Public License is intended to guarantee your freedom to
|
||||
share and change all versions of a program--to make sure it remains free
|
||||
software for all its users. We, the Free Software Foundation, use the
|
||||
GNU General Public License for most of our software; it applies also to
|
||||
any other work released this way by its authors. You can apply it to
|
||||
your programs, too.
|
||||
|
||||
When we speak of free software, we are referring to freedom, not
|
||||
price. Our General Public Licenses are designed to make sure that you
|
||||
have the freedom to distribute copies of free software (and charge for
|
||||
them if you wish), that you receive source code or can get it if you
|
||||
want it, that you can change the software or use pieces of it in new
|
||||
free programs, and that you know you can do these things.
|
||||
|
||||
To protect your rights, we need to prevent others from denying you
|
||||
these rights or asking you to surrender the rights. Therefore, you have
|
||||
certain responsibilities if you distribute copies of the software, or if
|
||||
you modify it: responsibilities to respect the freedom of others.
|
||||
|
||||
For example, if you distribute copies of such a program, whether
|
||||
gratis or for a fee, you must pass on to the recipients the same
|
||||
freedoms that you received. You must make sure that they, too, receive
|
||||
or can get the source code. And you must show them these terms so they
|
||||
know their rights.
|
||||
|
||||
Developers that use the GNU GPL protect your rights with two steps:
|
||||
(1) assert copyright on the software, and (2) offer you this License
|
||||
giving you legal permission to copy, distribute and/or modify it.
|
||||
|
||||
For the developers' and authors' protection, the GPL clearly explains
|
||||
that there is no warranty for this free software. For both users' and
|
||||
authors' sake, the GPL requires that modified versions be marked as
|
||||
changed, so that their problems will not be attributed erroneously to
|
||||
authors of previous versions.
|
||||
|
||||
Some devices are designed to deny users access to install or run
|
||||
modified versions of the software inside them, although the manufacturer
|
||||
can do so. This is fundamentally incompatible with the aim of
|
||||
protecting users' freedom to change the software. The systematic
|
||||
pattern of such abuse occurs in the area of products for individuals to
|
||||
use, which is precisely where it is most unacceptable. Therefore, we
|
||||
have designed this version of the GPL to prohibit the practice for those
|
||||
products. If such problems arise substantially in other domains, we
|
||||
stand ready to extend this provision to those domains in future versions
|
||||
of the GPL, as needed to protect the freedom of users.
|
||||
|
||||
Finally, every program is threatened constantly by software patents.
|
||||
States should not allow patents to restrict development and use of
|
||||
software on general-purpose computers, but in those that do, we wish to
|
||||
avoid the special danger that patents applied to a free program could
|
||||
make it effectively proprietary. To prevent this, the GPL assures that
|
||||
patents cannot be used to render the program non-free.
|
||||
|
||||
The precise terms and conditions for copying, distribution and
|
||||
modification follow.
|
||||
|
||||
TERMS AND CONDITIONS
|
||||
|
||||
0. Definitions.
|
||||
|
||||
"This License" refers to version 3 of the GNU General Public License.
|
||||
|
||||
"Copyright" also means copyright-like laws that apply to other kinds of
|
||||
works, such as semiconductor masks.
|
||||
|
||||
"The Program" refers to any copyrightable work licensed under this
|
||||
License. Each licensee is addressed as "you". "Licensees" and
|
||||
"recipients" may be individuals or organizations.
|
||||
|
||||
To "modify" a work means to copy from or adapt all or part of the work
|
||||
in a fashion requiring copyright permission, other than the making of an
|
||||
exact copy. The resulting work is called a "modified version" of the
|
||||
earlier work or a work "based on" the earlier work.
|
||||
|
||||
A "covered work" means either the unmodified Program or a work based
|
||||
on the Program.
|
||||
|
||||
To "propagate" a work means to do anything with it that, without
|
||||
permission, would make you directly or secondarily liable for
|
||||
infringement under applicable copyright law, except executing it on a
|
||||
computer or modifying a private copy. Propagation includes copying,
|
||||
distribution (with or without modification), making available to the
|
||||
public, and in some countries other activities as well.
|
||||
|
||||
To "convey" a work means any kind of propagation that enables other
|
||||
parties to make or receive copies. Mere interaction with a user through
|
||||
a computer network, with no transfer of a copy, is not conveying.
|
||||
|
||||
An interactive user interface displays "Appropriate Legal Notices"
|
||||
to the extent that it includes a convenient and prominently visible
|
||||
feature that (1) displays an appropriate copyright notice, and (2)
|
||||
tells the user that there is no warranty for the work (except to the
|
||||
extent that warranties are provided), that licensees may convey the
|
||||
work under this License, and how to view a copy of this License. If
|
||||
the interface presents a list of user commands or options, such as a
|
||||
menu, a prominent item in the list meets this criterion.
|
||||
|
||||
1. Source Code.
|
||||
|
||||
The "source code" for a work means the preferred form of the work
|
||||
for making modifications to it. "Object code" means any non-source
|
||||
form of a work.
|
||||
|
||||
A "Standard Interface" means an interface that either is an official
|
||||
standard defined by a recognized standards body, or, in the case of
|
||||
interfaces specified for a particular programming language, one that
|
||||
is widely used among developers working in that language.
|
||||
|
||||
The "System Libraries" of an executable work include anything, other
|
||||
than the work as a whole, that (a) is included in the normal form of
|
||||
packaging a Major Component, but which is not part of that Major
|
||||
Component, and (b) serves only to enable use of the work with that
|
||||
Major Component, or to implement a Standard Interface for which an
|
||||
implementation is available to the public in source code form. A
|
||||
"Major Component", in this context, means a major essential component
|
||||
(kernel, window system, and so on) of the specific operating system
|
||||
(if any) on which the executable work runs, or a compiler used to
|
||||
produce the work, or an object code interpreter used to run it.
|
||||
|
||||
The "Corresponding Source" for a work in object code form means all
|
||||
the source code needed to generate, install, and (for an executable
|
||||
work) run the object code and to modify the work, including scripts to
|
||||
control those activities. However, it does not include the work's
|
||||
System Libraries, or general-purpose tools or generally available free
|
||||
programs which are used unmodified in performing those activities but
|
||||
which are not part of the work. For example, Corresponding Source
|
||||
includes interface definition files associated with source files for
|
||||
the work, and the source code for shared libraries and dynamically
|
||||
linked subprograms that the work is specifically designed to require,
|
||||
such as by intimate data communication or control flow between those
|
||||
subprograms and other parts of the work.
|
||||
|
||||
The Corresponding Source need not include anything that users
|
||||
can regenerate automatically from other parts of the Corresponding
|
||||
Source.
|
||||
|
||||
The Corresponding Source for a work in source code form is that
|
||||
same work.
|
||||
|
||||
2. Basic Permissions.
|
||||
|
||||
All rights granted under this License are granted for the term of
|
||||
copyright on the Program, and are irrevocable provided the stated
|
||||
conditions are met. This License explicitly affirms your unlimited
|
||||
permission to run the unmodified Program. The output from running a
|
||||
covered work is covered by this License only if the output, given its
|
||||
content, constitutes a covered work. This License acknowledges your
|
||||
rights of fair use or other equivalent, as provided by copyright law.
|
||||
|
||||
You may make, run and propagate covered works that you do not
|
||||
convey, without conditions so long as your license otherwise remains
|
||||
in force. You may convey covered works to others for the sole purpose
|
||||
of having them make modifications exclusively for you, or provide you
|
||||
with facilities for running those works, provided that you comply with
|
||||
the terms of this License in conveying all material for which you do
|
||||
not control copyright. Those thus making or running the covered works
|
||||
for you must do so exclusively on your behalf, under your direction
|
||||
and control, on terms that prohibit them from making any copies of
|
||||
your copyrighted material outside their relationship with you.
|
||||
|
||||
Conveying under any other circumstances is permitted solely under
|
||||
the conditions stated below. Sublicensing is not allowed; section 10
|
||||
makes it unnecessary.
|
||||
|
||||
3. Protecting Users' Legal Rights From Anti-Circumvention Law.
|
||||
|
||||
No covered work shall be deemed part of an effective technological
|
||||
measure under any applicable law fulfilling obligations under article
|
||||
11 of the WIPO copyright treaty adopted on 20 December 1996, or
|
||||
similar laws prohibiting or restricting circumvention of such
|
||||
measures.
|
||||
|
||||
When you convey a covered work, you waive any legal power to forbid
|
||||
circumvention of technological measures to the extent such circumvention
|
||||
is effected by exercising rights under this License with respect to
|
||||
the covered work, and you disclaim any intention to limit operation or
|
||||
modification of the work as a means of enforcing, against the work's
|
||||
users, your or third parties' legal rights to forbid circumvention of
|
||||
technological measures.
|
||||
|
||||
4. Conveying Verbatim Copies.
|
||||
|
||||
You may convey verbatim copies of the Program's source code as you
|
||||
receive it, in any medium, provided that you conspicuously and
|
||||
appropriately publish on each copy an appropriate copyright notice;
|
||||
keep intact all notices stating that this License and any
|
||||
non-permissive terms added in accord with section 7 apply to the code;
|
||||
keep intact all notices of the absence of any warranty; and give all
|
||||
recipients a copy of this License along with the Program.
|
||||
|
||||
You may charge any price or no price for each copy that you convey,
|
||||
and you may offer support or warranty protection for a fee.
|
||||
|
||||
5. Conveying Modified Source Versions.
|
||||
|
||||
You may convey a work based on the Program, or the modifications to
|
||||
produce it from the Program, in the form of source code under the
|
||||
terms of section 4, provided that you also meet all of these conditions:
|
||||
|
||||
a) The work must carry prominent notices stating that you modified
|
||||
it, and giving a relevant date.
|
||||
|
||||
b) The work must carry prominent notices stating that it is
|
||||
released under this License and any conditions added under section
|
||||
7. This requirement modifies the requirement in section 4 to
|
||||
"keep intact all notices".
|
||||
|
||||
c) You must license the entire work, as a whole, under this
|
||||
License to anyone who comes into possession of a copy. This
|
||||
License will therefore apply, along with any applicable section 7
|
||||
additional terms, to the whole of the work, and all its parts,
|
||||
regardless of how they are packaged. This License gives no
|
||||
permission to license the work in any other way, but it does not
|
||||
invalidate such permission if you have separately received it.
|
||||
|
||||
d) If the work has interactive user interfaces, each must display
|
||||
Appropriate Legal Notices; however, if the Program has interactive
|
||||
interfaces that do not display Appropriate Legal Notices, your
|
||||
work need not make them do so.
|
||||
|
||||
A compilation of a covered work with other separate and independent
|
||||
works, which are not by their nature extensions of the covered work,
|
||||
and which are not combined with it such as to form a larger program,
|
||||
in or on a volume of a storage or distribution medium, is called an
|
||||
"aggregate" if the compilation and its resulting copyright are not
|
||||
used to limit the access or legal rights of the compilation's users
|
||||
beyond what the individual works permit. Inclusion of a covered work
|
||||
in an aggregate does not cause this License to apply to the other
|
||||
parts of the aggregate.
|
||||
|
||||
6. Conveying Non-Source Forms.
|
||||
|
||||
You may convey a covered work in object code form under the terms
|
||||
of sections 4 and 5, provided that you also convey the
|
||||
machine-readable Corresponding Source under the terms of this License,
|
||||
in one of these ways:
|
||||
|
||||
a) Convey the object code in, or embodied in, a physical product
|
||||
(including a physical distribution medium), accompanied by the
|
||||
Corresponding Source fixed on a durable physical medium
|
||||
customarily used for software interchange.
|
||||
|
||||
b) Convey the object code in, or embodied in, a physical product
|
||||
(including a physical distribution medium), accompanied by a
|
||||
written offer, valid for at least three years and valid for as
|
||||
long as you offer spare parts or customer support for that product
|
||||
model, to give anyone who possesses the object code either (1) a
|
||||
copy of the Corresponding Source for all the software in the
|
||||
product that is covered by this License, on a durable physical
|
||||
medium customarily used for software interchange, for a price no
|
||||
more than your reasonable cost of physically performing this
|
||||
conveying of source, or (2) access to copy the
|
||||
Corresponding Source from a network server at no charge.
|
||||
|
||||
c) Convey individual copies of the object code with a copy of the
|
||||
written offer to provide the Corresponding Source. This
|
||||
alternative is allowed only occasionally and noncommercially, and
|
||||
only if you received the object code with such an offer, in accord
|
||||
with subsection 6b.
|
||||
|
||||
d) Convey the object code by offering access from a designated
|
||||
place (gratis or for a charge), and offer equivalent access to the
|
||||
Corresponding Source in the same way through the same place at no
|
||||
further charge. You need not require recipients to copy the
|
||||
Corresponding Source along with the object code. If the place to
|
||||
copy the object code is a network server, the Corresponding Source
|
||||
may be on a different server (operated by you or a third party)
|
||||
that supports equivalent copying facilities, provided you maintain
|
||||
clear directions next to the object code saying where to find the
|
||||
Corresponding Source. Regardless of what server hosts the
|
||||
Corresponding Source, you remain obligated to ensure that it is
|
||||
available for as long as needed to satisfy these requirements.
|
||||
|
||||
e) Convey the object code using peer-to-peer transmission, provided
|
||||
you inform other peers where the object code and Corresponding
|
||||
Source of the work are being offered to the general public at no
|
||||
charge under subsection 6d.
|
||||
|
||||
A separable portion of the object code, whose source code is excluded
|
||||
from the Corresponding Source as a System Library, need not be
|
||||
included in conveying the object code work.
|
||||
|
||||
A "User Product" is either (1) a "consumer product", which means any
|
||||
tangible personal property which is normally used for personal, family,
|
||||
or household purposes, or (2) anything designed or sold for incorporation
|
||||
into a dwelling. In determining whether a product is a consumer product,
|
||||
doubtful cases shall be resolved in favor of coverage. For a particular
|
||||
product received by a particular user, "normally used" refers to a
|
||||
typical or common use of that class of product, regardless of the status
|
||||
of the particular user or of the way in which the particular user
|
||||
actually uses, or expects or is expected to use, the product. A product
|
||||
is a consumer product regardless of whether the product has substantial
|
||||
commercial, industrial or non-consumer uses, unless such uses represent
|
||||
the only significant mode of use of the product.
|
||||
|
||||
"Installation Information" for a User Product means any methods,
|
||||
procedures, authorization keys, or other information required to install
|
||||
and execute modified versions of a covered work in that User Product from
|
||||
a modified version of its Corresponding Source. The information must
|
||||
suffice to ensure that the continued functioning of the modified object
|
||||
code is in no case prevented or interfered with solely because
|
||||
modification has been made.
|
||||
|
||||
If you convey an object code work under this section in, or with, or
|
||||
specifically for use in, a User Product, and the conveying occurs as
|
||||
part of a transaction in which the right of possession and use of the
|
||||
User Product is transferred to the recipient in perpetuity or for a
|
||||
fixed term (regardless of how the transaction is characterized), the
|
||||
Corresponding Source conveyed under this section must be accompanied
|
||||
by the Installation Information. But this requirement does not apply
|
||||
if neither you nor any third party retains the ability to install
|
||||
modified object code on the User Product (for example, the work has
|
||||
been installed in ROM).
|
||||
|
||||
The requirement to provide Installation Information does not include a
|
||||
requirement to continue to provide support service, warranty, or updates
|
||||
for a work that has been modified or installed by the recipient, or for
|
||||
the User Product in which it has been modified or installed. Access to a
|
||||
network may be denied when the modification itself materially and
|
||||
adversely affects the operation of the network or violates the rules and
|
||||
protocols for communication across the network.
|
||||
|
||||
Corresponding Source conveyed, and Installation Information provided,
|
||||
in accord with this section must be in a format that is publicly
|
||||
documented (and with an implementation available to the public in
|
||||
source code form), and must require no special password or key for
|
||||
unpacking, reading or copying.
|
||||
|
||||
7. Additional Terms.
|
||||
|
||||
"Additional permissions" are terms that supplement the terms of this
|
||||
License by making exceptions from one or more of its conditions.
|
||||
Additional permissions that are applicable to the entire Program shall
|
||||
be treated as though they were included in this License, to the extent
|
||||
that they are valid under applicable law. If additional permissions
|
||||
apply only to part of the Program, that part may be used separately
|
||||
under those permissions, but the entire Program remains governed by
|
||||
this License without regard to the additional permissions.
|
||||
|
||||
When you convey a copy of a covered work, you may at your option
|
||||
remove any additional permissions from that copy, or from any part of
|
||||
it. (Additional permissions may be written to require their own
|
||||
removal in certain cases when you modify the work.) You may place
|
||||
additional permissions on material, added by you to a covered work,
|
||||
for which you have or can give appropriate copyright permission.
|
||||
|
||||
Notwithstanding any other provision of this License, for material you
|
||||
add to a covered work, you may (if authorized by the copyright holders of
|
||||
that material) supplement the terms of this License with terms:
|
||||
|
||||
a) Disclaiming warranty or limiting liability differently from the
|
||||
terms of sections 15 and 16 of this License; or
|
||||
|
||||
b) Requiring preservation of specified reasonable legal notices or
|
||||
author attributions in that material or in the Appropriate Legal
|
||||
Notices displayed by works containing it; or
|
||||
|
||||
c) Prohibiting misrepresentation of the origin of that material, or
|
||||
requiring that modified versions of such material be marked in
|
||||
reasonable ways as different from the original version; or
|
||||
|
||||
d) Limiting the use for publicity purposes of names of licensors or
|
||||
authors of the material; or
|
||||
|
||||
e) Declining to grant rights under trademark law for use of some
|
||||
trade names, trademarks, or service marks; or
|
||||
|
||||
f) Requiring indemnification of licensors and authors of that
|
||||
material by anyone who conveys the material (or modified versions of
|
||||
it) with contractual assumptions of liability to the recipient, for
|
||||
any liability that these contractual assumptions directly impose on
|
||||
those licensors and authors.
|
||||
|
||||
All other non-permissive additional terms are considered "further
|
||||
restrictions" within the meaning of section 10. If the Program as you
|
||||
received it, or any part of it, contains a notice stating that it is
|
||||
governed by this License along with a term that is a further
|
||||
restriction, you may remove that term. If a license document contains
|
||||
a further restriction but permits relicensing or conveying under this
|
||||
License, you may add to a covered work material governed by the terms
|
||||
of that license document, provided that the further restriction does
|
||||
not survive such relicensing or conveying.
|
||||
|
||||
If you add terms to a covered work in accord with this section, you
|
||||
must place, in the relevant source files, a statement of the
|
||||
additional terms that apply to those files, or a notice indicating
|
||||
where to find the applicable terms.
|
||||
|
||||
Additional terms, permissive or non-permissive, may be stated in the
|
||||
form of a separately written license, or stated as exceptions;
|
||||
the above requirements apply either way.
|
||||
|
||||
8. Termination.
|
||||
|
||||
You may not propagate or modify a covered work except as expressly
|
||||
provided under this License. Any attempt otherwise to propagate or
|
||||
modify it is void, and will automatically terminate your rights under
|
||||
this License (including any patent licenses granted under the third
|
||||
paragraph of section 11).
|
||||
|
||||
However, if you cease all violation of this License, then your
|
||||
license from a particular copyright holder is reinstated (a)
|
||||
provisionally, unless and until the copyright holder explicitly and
|
||||
finally terminates your license, and (b) permanently, if the copyright
|
||||
holder fails to notify you of the violation by some reasonable means
|
||||
prior to 60 days after the cessation.
|
||||
|
||||
Moreover, your license from a particular copyright holder is
|
||||
reinstated permanently if the copyright holder notifies you of the
|
||||
violation by some reasonable means, this is the first time you have
|
||||
received notice of violation of this License (for any work) from that
|
||||
copyright holder, and you cure the violation prior to 30 days after
|
||||
your receipt of the notice.
|
||||
|
||||
Termination of your rights under this section does not terminate the
|
||||
licenses of parties who have received copies or rights from you under
|
||||
this License. If your rights have been terminated and not permanently
|
||||
reinstated, you do not qualify to receive new licenses for the same
|
||||
material under section 10.
|
||||
|
||||
9. Acceptance Not Required for Having Copies.
|
||||
|
||||
You are not required to accept this License in order to receive or
|
||||
run a copy of the Program. Ancillary propagation of a covered work
|
||||
occurring solely as a consequence of using peer-to-peer transmission
|
||||
to receive a copy likewise does not require acceptance. However,
|
||||
nothing other than this License grants you permission to propagate or
|
||||
modify any covered work. These actions infringe copyright if you do
|
||||
not accept this License. Therefore, by modifying or propagating a
|
||||
covered work, you indicate your acceptance of this License to do so.
|
||||
|
||||
10. Automatic Licensing of Downstream Recipients.
|
||||
|
||||
Each time you convey a covered work, the recipient automatically
|
||||
receives a license from the original licensors, to run, modify and
|
||||
propagate that work, subject to this License. You are not responsible
|
||||
for enforcing compliance by third parties with this License.
|
||||
|
||||
An "entity transaction" is a transaction transferring control of an
|
||||
organization, or substantially all assets of one, or subdividing an
|
||||
organization, or merging organizations. If propagation of a covered
|
||||
work results from an entity transaction, each party to that
|
||||
transaction who receives a copy of the work also receives whatever
|
||||
licenses to the work the party's predecessor in interest had or could
|
||||
give under the previous paragraph, plus a right to possession of the
|
||||
Corresponding Source of the work from the predecessor in interest, if
|
||||
the predecessor has it or can get it with reasonable efforts.
|
||||
|
||||
You may not impose any further restrictions on the exercise of the
|
||||
rights granted or affirmed under this License. For example, you may
|
||||
not impose a license fee, royalty, or other charge for exercise of
|
||||
rights granted under this License, and you may not initiate litigation
|
||||
(including a cross-claim or counterclaim in a lawsuit) alleging that
|
||||
any patent claim is infringed by making, using, selling, offering for
|
||||
sale, or importing the Program or any portion of it.
|
||||
|
||||
11. Patents.
|
||||
|
||||
A "contributor" is a copyright holder who authorizes use under this
|
||||
License of the Program or a work on which the Program is based. The
|
||||
work thus licensed is called the contributor's "contributor version".
|
||||
|
||||
A contributor's "essential patent claims" are all patent claims
|
||||
owned or controlled by the contributor, whether already acquired or
|
||||
hereafter acquired, that would be infringed by some manner, permitted
|
||||
by this License, of making, using, or selling its contributor version,
|
||||
but do not include claims that would be infringed only as a
|
||||
consequence of further modification of the contributor version. For
|
||||
purposes of this definition, "control" includes the right to grant
|
||||
patent sublicenses in a manner consistent with the requirements of
|
||||
this License.
|
||||
|
||||
Each contributor grants you a non-exclusive, worldwide, royalty-free
|
||||
patent license under the contributor's essential patent claims, to
|
||||
make, use, sell, offer for sale, import and otherwise run, modify and
|
||||
propagate the contents of its contributor version.
|
||||
|
||||
In the following three paragraphs, a "patent license" is any express
|
||||
agreement or commitment, however denominated, not to enforce a patent
|
||||
(such as an express permission to practice a patent or covenant not to
|
||||
sue for patent infringement). To "grant" such a patent license to a
|
||||
party means to make such an agreement or commitment not to enforce a
|
||||
patent against the party.
|
||||
|
||||
If you convey a covered work, knowingly relying on a patent license,
|
||||
and the Corresponding Source of the work is not available for anyone
|
||||
to copy, free of charge and under the terms of this License, through a
|
||||
publicly available network server or other readily accessible means,
|
||||
then you must either (1) cause the Corresponding Source to be so
|
||||
available, or (2) arrange to deprive yourself of the benefit of the
|
||||
patent license for this particular work, or (3) arrange, in a manner
|
||||
consistent with the requirements of this License, to extend the patent
|
||||
license to downstream recipients. "Knowingly relying" means you have
|
||||
actual knowledge that, but for the patent license, your conveying the
|
||||
covered work in a country, or your recipient's use of the covered work
|
||||
in a country, would infringe one or more identifiable patents in that
|
||||
country that you have reason to believe are valid.
|
||||
|
||||
If, pursuant to or in connection with a single transaction or
|
||||
arrangement, you convey, or propagate by procuring conveyance of, a
|
||||
covered work, and grant a patent license to some of the parties
|
||||
receiving the covered work authorizing them to use, propagate, modify
|
||||
or convey a specific copy of the covered work, then the patent license
|
||||
you grant is automatically extended to all recipients of the covered
|
||||
work and works based on it.
|
||||
|
||||
A patent license is "discriminatory" if it does not include within
|
||||
the scope of its coverage, prohibits the exercise of, or is
|
||||
conditioned on the non-exercise of one or more of the rights that are
|
||||
specifically granted under this License. You may not convey a covered
|
||||
work if you are a party to an arrangement with a third party that is
|
||||
in the business of distributing software, under which you make payment
|
||||
to the third party based on the extent of your activity of conveying
|
||||
the work, and under which the third party grants, to any of the
|
||||
parties who would receive the covered work from you, a discriminatory
|
||||
patent license (a) in connection with copies of the covered work
|
||||
conveyed by you (or copies made from those copies), or (b) primarily
|
||||
for and in connection with specific products or compilations that
|
||||
contain the covered work, unless you entered into that arrangement,
|
||||
or that patent license was granted, prior to 28 March 2007.
|
||||
|
||||
Nothing in this License shall be construed as excluding or limiting
|
||||
any implied license or other defenses to infringement that may
|
||||
otherwise be available to you under applicable patent law.
|
||||
|
||||
12. No Surrender of Others' Freedom.
|
||||
|
||||
If conditions are imposed on you (whether by court order, agreement or
|
||||
otherwise) that contradict the conditions of this License, they do not
|
||||
excuse you from the conditions of this License. If you cannot convey a
|
||||
covered work so as to satisfy simultaneously your obligations under this
|
||||
License and any other pertinent obligations, then as a consequence you may
|
||||
not convey it at all. For example, if you agree to terms that obligate you
|
||||
to collect a royalty for further conveying from those to whom you convey
|
||||
the Program, the only way you could satisfy both those terms and this
|
||||
License would be to refrain entirely from conveying the Program.
|
||||
|
||||
13. Use with the GNU Affero General Public License.
|
||||
|
||||
Notwithstanding any other provision of this License, you have
|
||||
permission to link or combine any covered work with a work licensed
|
||||
under version 3 of the GNU Affero General Public License into a single
|
||||
combined work, and to convey the resulting work. The terms of this
|
||||
License will continue to apply to the part which is the covered work,
|
||||
but the special requirements of the GNU Affero General Public License,
|
||||
section 13, concerning interaction through a network will apply to the
|
||||
combination as such.
|
||||
|
||||
14. Revised Versions of this License.
|
||||
|
||||
The Free Software Foundation may publish revised and/or new versions of
|
||||
the GNU General Public License from time to time. Such new versions will
|
||||
be similar in spirit to the present version, but may differ in detail to
|
||||
address new problems or concerns.
|
||||
|
||||
Each version is given a distinguishing version number. If the
|
||||
Program specifies that a certain numbered version of the GNU General
|
||||
Public License "or any later version" applies to it, you have the
|
||||
option of following the terms and conditions either of that numbered
|
||||
version or of any later version published by the Free Software
|
||||
Foundation. If the Program does not specify a version number of the
|
||||
GNU General Public License, you may choose any version ever published
|
||||
by the Free Software Foundation.
|
||||
|
||||
If the Program specifies that a proxy can decide which future
|
||||
versions of the GNU General Public License can be used, that proxy's
|
||||
public statement of acceptance of a version permanently authorizes you
|
||||
to choose that version for the Program.
|
||||
|
||||
Later license versions may give you additional or different
|
||||
permissions. However, no additional obligations are imposed on any
|
||||
author or copyright holder as a result of your choosing to follow a
|
||||
later version.
|
||||
|
||||
15. Disclaimer of Warranty.
|
||||
|
||||
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
|
||||
APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
|
||||
HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY
|
||||
OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
|
||||
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM
|
||||
IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
|
||||
ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
|
||||
|
||||
16. Limitation of Liability.
|
||||
|
||||
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
|
||||
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS
|
||||
THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
|
||||
GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
|
||||
USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
|
||||
DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
|
||||
PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
|
||||
EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
|
||||
SUCH DAMAGES.
|
||||
|
||||
17. Interpretation of Sections 15 and 16.
|
||||
|
||||
If the disclaimer of warranty and limitation of liability provided
|
||||
above cannot be given local legal effect according to their terms,
|
||||
reviewing courts shall apply local law that most closely approximates
|
||||
an absolute waiver of all civil liability in connection with the
|
||||
Program, unless a warranty or assumption of liability accompanies a
|
||||
copy of the Program in return for a fee.
|
||||
|
||||
END OF TERMS AND CONDITIONS
|
||||
|
||||
How to Apply These Terms to Your New Programs
|
||||
|
||||
If you develop a new program, and you want it to be of the greatest
|
||||
possible use to the public, the best way to achieve this is to make it
|
||||
free software which everyone can redistribute and change under these terms.
|
||||
|
||||
To do so, attach the following notices to the program. It is safest
|
||||
to attach them to the start of each source file to most effectively
|
||||
state the exclusion of warranty; and each file should have at least
|
||||
the "copyright" line and a pointer to where the full notice is found.
|
||||
|
||||
{one line to give the program's name and a brief idea of what it does.}
|
||||
Copyright (C) {year} {name of author}
|
||||
|
||||
This program is free software: you can redistribute it and/or modify
|
||||
it under the terms of the GNU General Public License as published by
|
||||
the Free Software Foundation, either version 3 of the License, or
|
||||
(at your option) any later version.
|
||||
|
||||
This program is distributed in the hope that it will be useful,
|
||||
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
GNU General Public License for more details.
|
||||
|
||||
You should have received a copy of the GNU General Public License
|
||||
along with this program. If not, see [http://www.gnu.org/licenses/].
|
||||
|
||||
Also add information on how to contact you by electronic and paper mail.
|
||||
|
||||
If the program does terminal interaction, make it output a short
|
||||
notice like this when it starts in an interactive mode:
|
||||
|
||||
{project} Copyright (C) {year} {fullname}
|
||||
This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
|
||||
This is free software, and you are welcome to redistribute it
|
||||
under certain conditions; type `show c' for details.
|
||||
|
||||
The hypothetical commands `show w' and `show c' should show the appropriate
|
||||
parts of the General Public License. Of course, your program's commands
|
||||
might be different; for a GUI interface, you would use an "about box".
|
||||
|
||||
You should also get your employer (if you work as a programmer) or school,
|
||||
if any, to sign a "copyright disclaimer" for the program, if necessary.
|
||||
For more information on this, and how to apply and follow the GNU GPL, see
|
||||
[http://www.gnu.org/licenses/].
|
||||
|
||||
The GNU General Public License does not permit incorporating your program
|
||||
into proprietary programs. If your program is a subroutine library, you
|
||||
may consider it more useful to permit linking proprietary applications with
|
||||
the library. If this is what you want to do, use the GNU Lesser General
|
||||
Public License instead of this License. But first, please read
|
||||
[http://www.gnu.org/philosophy/why-not-lgpl.html].
|
||||
|
||||
|
||||
|
||||
This program is dual-licensed under the MIT and GPL3 licenses. See the licenses
|
||||
directory for the license text in full.
|
||||
|
6
MANIFEST.in
Normal file
6
MANIFEST.in
Normal file
@ -0,0 +1,6 @@
|
||||
include CHANGELOG
|
||||
include CONTRIBUTING.md
|
||||
include LICENSE
|
||||
include README.md
|
||||
include licenses/gpl-3.txt
|
||||
include licenses/mit.txt
|
123
README.md
123
README.md
@ -1,3 +1,5 @@
|
||||
[](https://pypi.python.org/pypi/cheat/)
|
||||
|
||||
cheat
|
||||
=====
|
||||
`cheat` allows you to create and view interactive cheatsheets on the
|
||||
@ -7,51 +9,51 @@ remember.
|
||||
|
||||

|
||||
|
||||
`cheat` depends only on `python` and `pip`.
|
||||
|
||||
|
||||
Example
|
||||
-------
|
||||
The next time you're forced to disarm a nuclear weapon without consulting
|
||||
Google, you may run:
|
||||
|
||||
cheat tar
|
||||
```sh
|
||||
cheat tar
|
||||
```
|
||||
|
||||
You will be presented with a cheatsheet resembling:
|
||||
|
||||
```
|
||||
```sh
|
||||
# To extract an uncompressed archive:
|
||||
tar -xvf /path/to/foo.tar
|
||||
tar -xvf '/path/to/foo.tar'
|
||||
|
||||
# To extract a .gz archive:
|
||||
tar -xzvf /path/to/foo.tgz
|
||||
tar -xzvf '/path/to/foo.tgz'
|
||||
|
||||
# To create a .gz archive:
|
||||
tar -czvf /path/to/foo.tgz /path/to/foo/
|
||||
tar -czvf '/path/to/foo.tgz' '/path/to/foo/'
|
||||
|
||||
# To extract a .bz2 archive:
|
||||
tar -xjvf /path/to/foo.tgz
|
||||
tar -xjvf '/path/to/foo.tgz'
|
||||
|
||||
# To create a .bz2 archive:
|
||||
tar -cjvf /path/to/foo.tgz /path/to/foo/
|
||||
tar -cjvf '/path/to/foo.tgz' '/path/to/foo/'
|
||||
```
|
||||
|
||||
To see what cheatsheets are availble, run `cheat -l`.
|
||||
To see what cheatsheets are available, run `cheat -l`.
|
||||
|
||||
Note that, while `cheat` was designed primarily for *nix system administrators,
|
||||
Note that, while `cheat` was designed primarily for \*nix system administrators,
|
||||
it is agnostic as to what content it stores. If you would like to use `cheat`
|
||||
to store notes on your favorite cookie recipes, feel free.
|
||||
|
||||
|
||||
Installing
|
||||
----------
|
||||
First install the required python dependencies with:
|
||||
It is recommended to install `cheat` with `pip`:
|
||||
|
||||
sudo pip install docopt pygments
|
||||
```sh
|
||||
[sudo] pip install cheat
|
||||
```
|
||||
|
||||
Then, clone this repository, `cd` into it, and run:
|
||||
|
||||
sudo python setup.py install
|
||||
[Other installation methods are available][installing].
|
||||
|
||||
|
||||
Modifying Cheatsheets
|
||||
@ -64,12 +66,14 @@ Cheatsheets are stored in the `~/.cheat/` directory, and are named on a
|
||||
per-keyphrase basis. In other words, the content for the `tar` cheatsheet lives
|
||||
in the `~/.cheat/tar` file.
|
||||
|
||||
Provided that you have an `EDITOR` environment variable set, you may edit
|
||||
cheatsheets with:
|
||||
Provided that you have a `CHEAT_EDITOR`, `VISUAL`, or `EDITOR` environment
|
||||
variable set, you may edit cheatsheets with:
|
||||
|
||||
cheat -e foo
|
||||
```sh
|
||||
cheat -e foo
|
||||
```
|
||||
|
||||
If the 'foo' cheatsheet already exists, it will be opened for editing.
|
||||
If the `foo` cheatsheet already exists, it will be opened for editing.
|
||||
Otherwise, it will be created automatically.
|
||||
|
||||
After you've customized your cheatsheets, I urge you to track `~/.cheat/` along
|
||||
@ -84,45 +88,82 @@ Personal cheatsheets are saved in the `~/.cheat` directory by default, but you
|
||||
can specify a different default by exporting a `DEFAULT_CHEAT_DIR` environment
|
||||
variable:
|
||||
|
||||
export DEFAULT_CHEAT_DIR=/path/to/my/cheats
|
||||
```sh
|
||||
export DEFAULT_CHEAT_DIR='/path/to/my/cheats'
|
||||
```
|
||||
|
||||
### Setting a CHEATPATH ###
|
||||
You can additionally instruct `cheat` to look for cheatsheets in other
|
||||
directories by exporting a `CHEATPATH` environment variable:
|
||||
|
||||
export CHEATPATH=/path/to/my/cheats
|
||||
```sh
|
||||
export CHEATPATH='/path/to/my/cheats'
|
||||
```
|
||||
|
||||
You may, of course, append multiple directories to your `CHEATPATH`:
|
||||
|
||||
export CHEATPATH=$CHEATPATH:/path/to/more/cheats
|
||||
```sh
|
||||
export CHEATPATH="$CHEATPATH:/path/to/more/cheats"
|
||||
```
|
||||
|
||||
You may view which directories are on your `CHEATPATH` with `cheat -d`.
|
||||
|
||||
### Enabling Syntax Highlighting ###
|
||||
`cheat` can apply syntax highlighting to your cheatsheets if so desired. To
|
||||
enable this feature, set a `CHEATCOLORS` environment variable:
|
||||
`cheat` can optionally apply syntax highlighting to your cheatsheets. To
|
||||
enable syntax highlighting, export a `CHEATCOLORS` environment variable:
|
||||
|
||||
export CHEATCOLORS=true
|
||||
```sh
|
||||
export CHEATCOLORS=true
|
||||
```
|
||||
|
||||
Note that [pygments][] must be installed on your system for this to work.
|
||||
|
||||
|
||||
Related Projects
|
||||
----------------
|
||||
#### Specifying a Syntax Highlighter ####
|
||||
You may manually specify which syntax highlighter to use for each cheatsheet by
|
||||
wrapping the sheet's contents in a [Github-Flavored Markdown code-fence][gfm].
|
||||
|
||||
- [lucaswerkmeister/cheats][1]: An implementation of this concept in pure bash
|
||||
that also allows not only for numerical indexing of subcomands but also
|
||||
supports running commands interactively.
|
||||
Example:
|
||||
|
||||
- [jahendrie/cheat][2]: A bash-only implementation that additionally allows for
|
||||
cheatsheets to be created and `grep` searched from the command-line.
|
||||
([jahendrie][] contributed key ideas to this project as well.)
|
||||
<pre>
|
||||
```sql
|
||||
-- to select a user by ID
|
||||
SELECT *
|
||||
FROM Users
|
||||
WHERE id = 100
|
||||
```
|
||||
</pre>
|
||||
|
||||
- [`cheat` RubyGem][3]: A clever gem from 2006 that clearly had similar
|
||||
motivations. It is unclear whether or not it is currently maintained.
|
||||
If no syntax highlighter is specified, the `bash` highlighter will be used by
|
||||
default.
|
||||
|
||||
### Enabling Search Match Highlighting ###
|
||||
`cheat` can optionally be configured to highlight search term matches in search
|
||||
results. To do so, export a `CHEAT_HIGHLIGHT` environment variable with a value
|
||||
of one of the following:
|
||||
|
||||
- blue
|
||||
- cyan
|
||||
- green
|
||||
- grey
|
||||
- magenta
|
||||
- red
|
||||
- white
|
||||
- yellow
|
||||
|
||||
Note that the `termcolor` module must be installed on your system for this to
|
||||
work.
|
||||
|
||||
|
||||
See Also:
|
||||
---------
|
||||
- [Enabling Command-line Autocompletion][autocompletion]
|
||||
- [Related Projects][related-projects]
|
||||
|
||||
|
||||
[autocompletion]: https://github.com/chrisallenlane/cheat/wiki/Enabling-Command-line-Autocompletion
|
||||
[dotfiles]: http://dotfiles.github.io/
|
||||
[jahendrie]: https://github.com/jahendrie
|
||||
[1]: https://github.com/lucaswerkmeister/cheats
|
||||
[2]: https://github.com/jahendrie/cheat
|
||||
[3]: http://errtheblog.com/posts/21-cheat
|
||||
[4]: https://github.com/chrisallenlane/cheat/pull/77
|
||||
[gfm]: https://help.github.com/articles/creating-and-highlighting-code-blocks/
|
||||
[installing]: https://github.com/chrisallenlane/cheat/wiki/Installing
|
||||
[pygments]: http://pygments.org/
|
||||
[related-projects]: https://github.com/chrisallenlane/cheat/wiki/Related-Projects
|
||||
|
50
bin/cheat
50
bin/cheat
@ -2,6 +2,8 @@
|
||||
|
||||
"""cheat
|
||||
|
||||
Create and view cheatsheets on the command line.
|
||||
|
||||
Usage:
|
||||
cheat <cheatsheet>
|
||||
cheat -e <cheatsheet>
|
||||
@ -10,35 +12,47 @@ Usage:
|
||||
cheat -d
|
||||
cheat -v
|
||||
|
||||
cheat allows you to create and view interactive cheatsheets on the
|
||||
command-line. It was designed to help remind *nix system
|
||||
administrators of options for commands that they use frequently,
|
||||
but not frequently enough to remember.
|
||||
|
||||
Examples:
|
||||
To look up 'tar':
|
||||
cheat tar
|
||||
|
||||
To create or edit the cheatsheet for 'foo':
|
||||
cheat -e foo
|
||||
|
||||
Options:
|
||||
-d --directories List directories on CHEATPATH
|
||||
-e --edit Edit cheatsheet
|
||||
-l --list List cheatsheets
|
||||
-s --search Search cheatsheets for <keyword>
|
||||
-v --version Print the version number
|
||||
|
||||
Examples:
|
||||
|
||||
To view the `tar` cheatsheet:
|
||||
cheat tar
|
||||
|
||||
To edit (or create) the `foo` cheatsheet:
|
||||
cheat -e foo
|
||||
|
||||
To list all available cheatsheets:
|
||||
cheat -l
|
||||
|
||||
To search for "ssh" among all cheatsheets:
|
||||
cheat -s ssh
|
||||
"""
|
||||
|
||||
# require the dependencies
|
||||
from cheat import *
|
||||
from cheat.utils import *
|
||||
from __future__ import print_function
|
||||
from cheat.sheets import Sheets
|
||||
from cheat.sheet import Sheet
|
||||
from cheat.utils import Utils
|
||||
from cheat.configuration import Configuration
|
||||
from docopt import docopt
|
||||
import os
|
||||
|
||||
|
||||
if __name__ == '__main__':
|
||||
|
||||
# parse the command-line options
|
||||
options = docopt(__doc__, version='cheat 2.0.1')
|
||||
options = docopt(__doc__, version='cheat 2.4.0')
|
||||
|
||||
config = Configuration()
|
||||
sheets = Sheets(config)
|
||||
utils = Utils(config)
|
||||
sheet = Sheet(sheets, utils)
|
||||
|
||||
# list directories
|
||||
if options['--directories']:
|
||||
@ -46,7 +60,7 @@ if __name__ == '__main__':
|
||||
|
||||
# list cheatsheets
|
||||
elif options['--list']:
|
||||
print(sheets.list())
|
||||
print(sheets.list(), end="")
|
||||
|
||||
# create/edit cheatsheet
|
||||
elif options['--edit']:
|
||||
@ -54,8 +68,8 @@ if __name__ == '__main__':
|
||||
|
||||
# search among the cheatsheets
|
||||
elif options['--search']:
|
||||
print(colorize(sheets.search(options['<keyword>'])))
|
||||
print(utils.colorize(sheets.search(options['<keyword>'])), end="")
|
||||
|
||||
# print the cheatsheet
|
||||
else:
|
||||
print(colorize(sheet.read(options['<cheatsheet>'])))
|
||||
print(utils.colorize(sheet.read(options['<cheatsheet>'])), end="")
|
||||
|
@ -1,3 +1,4 @@
|
||||
import sheet
|
||||
import sheets
|
||||
import utils
|
||||
from . import sheet
|
||||
from . import sheets
|
||||
from . import utils
|
||||
from . import configuration
|
@ -11,7 +11,7 @@ u update
|
||||
x extract with full paths
|
||||
|
||||
Example:
|
||||
7z a -t7z -m0-lzma -mx=9 -mfb=64 -md=32m -ms=on archive.7z dir1
|
||||
7z a -t7z -m0=lzma -mx=9 -mfb=64 -md=32m -ms=on archive.7z dir1
|
||||
|
||||
-t7z 7z archive
|
||||
-m0=lzma lzma method
|
||||
|
@ -1,4 +0,0 @@
|
||||
import os
|
||||
|
||||
def sheets_dir():
|
||||
return os.path.split(__file__)
|
5
cheat/cheatsheets/alias
Normal file
5
cheat/cheatsheets/alias
Normal file
@ -0,0 +1,5 @@
|
||||
# Show a list of your current shell aliases
|
||||
alias
|
||||
|
||||
# Map `ll` to `ls -l` (Can be used per session or put inside a shell config file)
|
||||
alias ll='ls -l'
|
72
cheat/cheatsheets/ansi
Normal file
72
cheat/cheatsheets/ansi
Normal file
@ -0,0 +1,72 @@
|
||||
# Reset
|
||||
Color_Off='\e[0m' # Text Reset
|
||||
|
||||
# Regular Colors
|
||||
Black='\e[0;30m' # Black
|
||||
Red='\e[0;31m' # Red
|
||||
Green='\e[0;32m' # Green
|
||||
Yellow='\e[0;33m' # Yellow
|
||||
Blue='\e[0;34m' # Blue
|
||||
Purple='\e[0;35m' # Purple
|
||||
Cyan='\e[0;36m' # Cyan
|
||||
White='\e[0;37m' # White
|
||||
|
||||
# Bold
|
||||
BBlack='\e[1;30m' # Black
|
||||
BRed='\e[1;31m' # Red
|
||||
BGreen='\e[1;32m' # Green
|
||||
BYellow='\e[1;33m' # Yellow
|
||||
BBlue='\e[1;34m' # Blue
|
||||
BPurple='\e[1;35m' # Purple
|
||||
BCyan='\e[1;36m' # Cyan
|
||||
BWhite='\e[1;37m' # White
|
||||
|
||||
# Underline
|
||||
UBlack='\e[4;30m' # Black
|
||||
URed='\e[4;31m' # Red
|
||||
UGreen='\e[4;32m' # Green
|
||||
UYellow='\e[4;33m' # Yellow
|
||||
UBlue='\e[4;34m' # Blue
|
||||
UPurple='\e[4;35m' # Purple
|
||||
UCyan='\e[4;36m' # Cyan
|
||||
UWhite='\e[4;37m' # White
|
||||
|
||||
# Background
|
||||
On_Black='\e[40m' # Black
|
||||
On_Red='\e[41m' # Red
|
||||
On_Green='\e[42m' # Green
|
||||
On_Yellow='\e[43m' # Yellow
|
||||
On_Blue='\e[44m' # Blue
|
||||
On_Purple='\e[45m' # Purple
|
||||
On_Cyan='\e[46m' # Cyan
|
||||
On_White='\e[47m' # White
|
||||
|
||||
# High Intensity
|
||||
IBlack='\e[0;90m' # Black
|
||||
IRed='\e[0;91m' # Red
|
||||
IGreen='\e[0;92m' # Green
|
||||
IYellow='\e[0;93m' # Yellow
|
||||
IBlue='\e[0;94m' # Blue
|
||||
IPurple='\e[0;95m' # Purple
|
||||
ICyan='\e[0;96m' # Cyan
|
||||
IWhite='\e[0;97m' # White
|
||||
|
||||
# Bold High Intensity
|
||||
BIBlack='\e[1;90m' # Black
|
||||
BIRed='\e[1;91m' # Red
|
||||
BIGreen='\e[1;92m' # Green
|
||||
BIYellow='\e[1;93m' # Yellow
|
||||
BIBlue='\e[1;94m' # Blue
|
||||
BIPurple='\e[1;95m' # Purple
|
||||
BICyan='\e[1;96m' # Cyan
|
||||
BIWhite='\e[1;97m' # White
|
||||
|
||||
# High Intensity backgrounds
|
||||
On_IBlack='\e[0;100m' # Black
|
||||
On_IRed='\e[0;101m' # Red
|
||||
On_IGreen='\e[0;102m' # Green
|
||||
On_IYellow='\e[0;103m' # Yellow
|
||||
On_IBlue='\e[0;104m' # Blue
|
||||
On_IPurple='\e[0;105m' # Purple
|
||||
On_ICyan='\e[0;106m' # Cyan
|
||||
On_IWhite='\e[0;107m' # White
|
23
cheat/cheatsheets/apt
Normal file
23
cheat/cheatsheets/apt
Normal file
@ -0,0 +1,23 @@
|
||||
# To search a package:
|
||||
apt search package
|
||||
|
||||
# To show package informations:
|
||||
apt show package
|
||||
|
||||
# To fetch package list:
|
||||
apt update
|
||||
|
||||
# To download and install updates without installing new package:
|
||||
apt upgrade
|
||||
|
||||
# To download and install the updates AND install new necessary packages:
|
||||
apt dist-upgrade
|
||||
|
||||
# Full command:
|
||||
apt update && apt dist-upgrade
|
||||
|
||||
# To install a new package(s):
|
||||
apt install package(s)
|
||||
|
||||
# To uninstall package(s)
|
||||
apt remove package(s)
|
@ -4,7 +4,7 @@
|
||||
apt-get update
|
||||
|
||||
# To download and install updates without installing new package.
|
||||
apt-get update
|
||||
apt-get upgrade
|
||||
|
||||
# To download and install the updates AND install new necessary packages
|
||||
apt-get dist-upgrade
|
||||
@ -23,3 +23,6 @@ apt-get -o Dir::Cache="/path/to/destination/dir/" -o Dir::Cache::archives="./" i
|
||||
|
||||
# Show apt-get installed packages.
|
||||
grep 'install ' /var/log/dpkg.log
|
||||
|
||||
# Silently keep old configuration during batch updates
|
||||
apt-get update -o DPkg::Options::='--force-confold' ...
|
||||
|
12
cheat/cheatsheets/aria2c
Normal file
12
cheat/cheatsheets/aria2c
Normal file
@ -0,0 +1,12 @@
|
||||
# Just download a file
|
||||
# The url can be a http(s), ftp, .torrent file or even a magnet link
|
||||
aria2c <url>
|
||||
|
||||
# To prevent downloading the .torrent file
|
||||
aria2c --follow-torrent=mem <url>
|
||||
|
||||
# Download 1 file at a time (-j)
|
||||
# continuing (-c) any partially downloaded ones
|
||||
# to the directory specified (-d)
|
||||
# reading urls from the file (-i)
|
||||
aria2c -j 1 -c -d ~/Downloads -i /path/to/file
|
@ -1,2 +1,11 @@
|
||||
# sum integers from a file or stdin, one integer per line:
|
||||
printf '1\n2\n3\n' | awk '{ sum += $1} END {print sum}'
|
||||
|
||||
# using specific character as separator to sum integers from a file or stdin
|
||||
printf '1:2:3' | awk -F ":" '{print $1+$2+$3}'
|
||||
|
||||
# print a multiplication table
|
||||
seq 9 | sed 'H;g' | awk -v RS='' '{for(i=1;i<=NF;i++)printf("%dx%d=%d%s", i, NR, i*NR, i==NR?"\n":"\t")}'
|
||||
|
||||
# Specify output separator character
|
||||
printf '1 2 3' | awk 'BEGIN {OFS=":"}; {print $1,$2,$3}'
|
||||
|
@ -1,5 +1,5 @@
|
||||
# To implement a for loop:
|
||||
for file in `ls .`;
|
||||
for file in *;
|
||||
do
|
||||
echo $file found;
|
||||
done
|
||||
@ -12,3 +12,16 @@ in
|
||||
2) echo "two found";;
|
||||
3*) echo "something beginning with 3 found";;
|
||||
esac
|
||||
|
||||
# Turn on debugging:
|
||||
set -x
|
||||
|
||||
# Turn off debugging:
|
||||
set +x
|
||||
|
||||
# Retrieve N-th piped command exit status
|
||||
printf 'foo' | fgrep 'foo' | sed 's/foo/bar/'
|
||||
echo ${PIPESTATUS[0]} # replace 0 with N
|
||||
|
||||
# Lock file:
|
||||
( set -o noclobber; echo > my.lock ) || echo 'Failed to create lock file'
|
||||
|
26
cheat/cheatsheets/bower
Normal file
26
cheat/cheatsheets/bower
Normal file
@ -0,0 +1,26 @@
|
||||
# Install a package locally
|
||||
bower install <package-name>
|
||||
|
||||
# Install a package locally directly from github
|
||||
bower install <user>/<repo>
|
||||
|
||||
# Install a specific package locally
|
||||
bower install <package-name>#<version>
|
||||
|
||||
# Install a package locally and save installed package into bower.json
|
||||
bower install <package-name> --save
|
||||
|
||||
# Retrieve info of a particular package
|
||||
bower info <package-name>
|
||||
|
||||
# List local packages
|
||||
bower list
|
||||
|
||||
# Search for a package by name
|
||||
bower search <package-name>
|
||||
|
||||
# Update a package to their newest version
|
||||
bower update <package-name>
|
||||
|
||||
# Remove a local package
|
||||
bower uninstall <package-name>
|
11
cheat/cheatsheets/bzip2
Normal file
11
cheat/cheatsheets/bzip2
Normal file
@ -0,0 +1,11 @@
|
||||
# compress foo -> foo.bz2
|
||||
bzip2 -z foo
|
||||
|
||||
# decompress foo.bz2 -> foo
|
||||
bzip2 -d foo.bz2
|
||||
|
||||
# compress foo to stdout
|
||||
bzip2 -zc foo > foo.bz2
|
||||
|
||||
# decompress foo.bz2 to stdout
|
||||
bzip2 -dc foo.bz2
|
8
cheat/cheatsheets/cat
Normal file
8
cheat/cheatsheets/cat
Normal file
@ -0,0 +1,8 @@
|
||||
# Display the contents of a file
|
||||
cat /path/to/foo
|
||||
|
||||
# Display contents with line numbers
|
||||
cat -n /path/to/foo
|
||||
|
||||
# Display contents with line numbers (blank lines excluded)
|
||||
cat -b /path/to/foo
|
11
cheat/cheatsheets/cd
Normal file
11
cheat/cheatsheets/cd
Normal file
@ -0,0 +1,11 @@
|
||||
#Go to the given directory
|
||||
cd path/to/directory
|
||||
|
||||
#Go to home directory of current user
|
||||
cd
|
||||
|
||||
#Go up to the parent of the current directory
|
||||
cd ..
|
||||
|
||||
#Go to the previously chosen directory
|
||||
cd -
|
14
cheat/cheatsheets/cheat
Normal file
14
cheat/cheatsheets/cheat
Normal file
@ -0,0 +1,14 @@
|
||||
# To see example usage of a program:
|
||||
cheat <command>
|
||||
|
||||
# To edit a cheatsheet
|
||||
cheat -e <command>
|
||||
|
||||
# To list available cheatsheets
|
||||
cheat -l
|
||||
|
||||
# To search available cheatsheets
|
||||
cheat -s <command>
|
||||
|
||||
# To get the current `cheat' version
|
||||
cheat -v
|
@ -15,5 +15,5 @@ convert original-image.jpg -resize 100x converted-image.png
|
||||
for file in `ls original/image/path/`;
|
||||
do new_path=${file%.*};
|
||||
new_file=`basename $new_path`;
|
||||
convert $file -resize 150 conerted/image/path/$new_file.png;
|
||||
convert $file -resize 150 converted/image/path/$new_file.png;
|
||||
done
|
||||
|
11
cheat/cheatsheets/cp
Normal file
11
cheat/cheatsheets/cp
Normal file
@ -0,0 +1,11 @@
|
||||
# Create a copy of a file
|
||||
cp ~/Desktop/foo.txt ~/Downloads/foo.txt
|
||||
|
||||
# Create a copy of a directory
|
||||
cp -r ~/Desktop/cruise_pics/ ~/Pictures/
|
||||
|
||||
# Create a copy but ask to overwrite if the destination file already exists
|
||||
cp -i ~/Desktop/foo.txt ~/Documents/foo.txt
|
||||
|
||||
# Create a backup file with date
|
||||
cp foo.txt{,."$(date +%Y%m%d-%H%M%S)"}
|
132
cheat/cheatsheets/cpdf
Normal file
132
cheat/cheatsheets/cpdf
Normal file
@ -0,0 +1,132 @@
|
||||
# Read in.pdf, select pages 1, 2, 3 and 6, and write those pages to
|
||||
# out.pdf
|
||||
cpdf in.pdf 1-3,6 -o out.pdf
|
||||
|
||||
# Select the even pages (2, 4, 6...) from in.pdf and write those pages
|
||||
# to out.pdf
|
||||
cpdf in.pdf even -o out.pdf
|
||||
|
||||
# Using AND to perform several operations in order, here merging two
|
||||
# files together and adding a copyright stamp to every page.
|
||||
cpdf -merge in.pdf in2.pdf AND -add-text "Copyright 2014" -o out.pdf
|
||||
|
||||
# Read control.txt and use its contents as the command line arguments
|
||||
# for cpdf.
|
||||
cpdf -control control.txt
|
||||
|
||||
# Merge in.pdf and in2.pdf into one document, writing to out.pdf.
|
||||
cpdf -merge in.pdf in2.pdf -o out.pdf
|
||||
|
||||
# Split in.pdf into ten-page chunks, writing them to Chunk001.pdf,
|
||||
# Chunk002.pdf etc
|
||||
cpdf -split in.pdf -o Chunk%%%.pdf -chunk 10
|
||||
|
||||
# Split in.pdf on bookmark boundaries, writing each to a file whose
|
||||
# name is the bookmark label
|
||||
cpdf -split-bookmarks 0 in.pdf -o @N.pdf
|
||||
|
||||
# Scale both the dimensions and contents of in.pdf by a factor of two
|
||||
# in x and y directions.
|
||||
cpdf -scale-page "2 2" in.pdf -o out.pdf
|
||||
|
||||
# Scale the pages in in.pdf to fit the US Letter page size, writing to
|
||||
# out.pdf
|
||||
cpdf -scale-to-fit usletterportrait in.pdf -o out.pdf
|
||||
|
||||
# Shift the contents of the page by 26 pts in the x direction, and 18
|
||||
# millimetres in the y direction, writing to out.pdf
|
||||
cpdf -shift "26pt 18mm" in.pdf -o out.pdf
|
||||
|
||||
# Rotate the contents of the pages in in.pdf by ninety degrees and
|
||||
# write to out.pdf.
|
||||
cpdf -rotate-contents 90 in.pdf -o out.pdf
|
||||
|
||||
# Crop the pages in in.pdf to a 600 pts by 400 pts rectangle.
|
||||
cpdf -crop "0 0 600pt 400pt" in.pdf -o out.pdf
|
||||
|
||||
# Encrypt using 128bit PDF encryption using the owner password 'fred'
|
||||
# and the user password 'joe'
|
||||
cpdf -encrypt 128bit fred joe in.pdf -o out.pdf
|
||||
|
||||
# Decrypt using the owner password, writing to out.pdf.
|
||||
cpdf -decrypt in.pdf owner=fred -o out.pdf
|
||||
|
||||
# Compress the data streams in in.pdf, writing the result to out.pdf.
|
||||
cpdf -compress in.pdf -o out.pdf
|
||||
|
||||
# Decompress the data streams in in.pdf, writing to out.pdf.
|
||||
cpdf -decompress in.pdf -o out.pdf
|
||||
|
||||
# List the bookmarks in in.pdf. This would produce:
|
||||
cpdf -list-bookmarks in.pdf
|
||||
|
||||
# Outputs:
|
||||
|
||||
# Add bookmarks in the same form from a prepared file bookmarks.txt to
|
||||
# in.pdf, writing to out.pdf.
|
||||
cpdf -add-bookmarks bookmarks.txt in.pdf -o out.pdf
|
||||
|
||||
# Use the Split style to build a presentation from the PDF in.pdf,
|
||||
# each slide staying 10 seconds on screen unless manually advanced.
|
||||
# The first page, being a title does not move on automatically, and
|
||||
# has no transition effect.
|
||||
cpdf -presentation in.pdf 2-end -trans Split -duration 10 -o out.pdf
|
||||
|
||||
# Stamp the file watermark.pdf on to each page of in.pdf, writing the
|
||||
# result to out.pdf.
|
||||
cpdf -stamp-on watermark.pdf in.pdf -o out.pdf
|
||||
|
||||
# Add a page number and date to all the pages in in.pdf using the
|
||||
# Courier font, writing to out.pdf
|
||||
cpdf -topleft 10 -font Courier -add-text "Page %Page\nDate %d-%m-%Y" in.pdf -o out.pdf
|
||||
|
||||
# Two up impose the file in.pdf, writing to out.pdf
|
||||
cpdf -twoup-stack in.pdf -o out.pdf
|
||||
|
||||
# Add extra blank pages after pages one, three and four of a document.
|
||||
cpdf -pad-after 1,3,4 in.pdf -o out.pdf
|
||||
|
||||
# List the annotations in a file in.pdf to standard output.
|
||||
cpdf -list-annotations in.pdf
|
||||
|
||||
# Might Produce:
|
||||
|
||||
# -- # Annotation text content 1 # -- # -- # Annotation text content 2
|
||||
# --
|
||||
|
||||
# Copy the annotations from from.pdf to in.pdf, writing to out.pdf.
|
||||
cpdf -copy-annotations from.pdf in.pdf -o out.pdf
|
||||
|
||||
# Set the document title of in.pdf. writing to out.pdf.
|
||||
cpdf -set-title "The New Title" in.pdf -o out.pdf
|
||||
|
||||
# Set the document in.pdf to open with the Acrobat Viewer's toolbar
|
||||
# hidden, writing to out.pdf.
|
||||
cpdf -hide-toolbar true in.pdf -o out.pdf
|
||||
|
||||
# Set the metadata in a PDF in.pdf to the contents of the file
|
||||
# metadata.xml, and write the output to out.pdf.
|
||||
cpdf -set-metadata metadata.xml in.pdf -o out.pdf
|
||||
|
||||
# Set the document in.pdf to open in Acrobat Viewer showing two
|
||||
# columns of pages, starting on the right, putting the result in
|
||||
# out.pdf.
|
||||
cpdf -set-page-layout TwoColumnRight in.pdf -o out.pdf
|
||||
|
||||
# Set the document in.pdf to open in Acrobat Viewer in full screen
|
||||
# mode, putting the result in out.pdf.
|
||||
cpdf -set-page-mode FullScreen in.pdf -o out.pdf
|
||||
|
||||
# Attach the file sheet.xls to in.pdf, writing to out.pdf.
|
||||
cpdf -attach-file sheet.xls in.pdf -o out.pdf
|
||||
|
||||
# Remove any attachments from in.pdf, writing to out.pdf.
|
||||
cpdf -remove-files in.pdf -o out.pdf
|
||||
|
||||
# Blacken all the text in in.pdf, writing to out.pdf.
|
||||
cpdf -blacktext in.pdf -o out.pdf
|
||||
|
||||
# Make sure all lines in in.pdf are at least 2 pts wide, writing to
|
||||
# out.pdf.
|
||||
cpdf -thinlines 2pt in.pdf -o out.pdf
|
||||
|
@ -14,7 +14,9 @@ SHELL=/bin/bash
|
||||
# example entries
|
||||
# every 15 min
|
||||
*/15 * * * * /home/user/command.sh
|
||||
|
||||
# every midnight
|
||||
0 * * * * /home/user/command.sh
|
||||
0 0 * * * /home/user/command.sh
|
||||
|
||||
# every Saturday at 8:05 AM
|
||||
5 8 * * 6 /home/user/command.sh
|
||||
|
8
cheat/cheatsheets/cryptsetup
Normal file
8
cheat/cheatsheets/cryptsetup
Normal file
@ -0,0 +1,8 @@
|
||||
# open encrypted partition /dev/sdb1 (reachable at /dev/mapper/backup)
|
||||
cryptsetup open --type luks /dev/sdb1 backup
|
||||
|
||||
# open encrypted partition /dev/sdb1 using a keyfile (reachable at /dev/mapper/hdd)
|
||||
cryptsetup open --type luks --key-file hdd.key /dev/sdb1 hdd
|
||||
|
||||
# close luks container at /dev/mapper/hdd
|
||||
cryptsetup close hdd
|
5
cheat/cheatsheets/csplit
Normal file
5
cheat/cheatsheets/csplit
Normal file
@ -0,0 +1,5 @@
|
||||
# Split a file based on pattern
|
||||
csplit input.file '/PATTERN/'
|
||||
|
||||
# Use prefix/suffix to improve resulting file names
|
||||
csplit -f 'prefix-' -b '%d.extension' input.file '/PATTERN/' '{*}'
|
22
cheat/cheatsheets/cups
Normal file
22
cheat/cheatsheets/cups
Normal file
@ -0,0 +1,22 @@
|
||||
# Manage printers through CUPS:
|
||||
http://localhost:631 (in web browser)
|
||||
|
||||
# Print file from command line
|
||||
lp myfile.txt
|
||||
|
||||
# Display print queue
|
||||
lpq
|
||||
|
||||
# Remove print job from queue
|
||||
lprm 545
|
||||
or
|
||||
lprm -
|
||||
|
||||
# Print log location
|
||||
/var/log/cups
|
||||
|
||||
# Reject new jobs
|
||||
cupsreject printername
|
||||
|
||||
# Accept new jobs
|
||||
cupsaccept printername
|
@ -29,7 +29,13 @@ curl -C - -o partial_file.zip http://example.com/file.zip
|
||||
curl -I http://example.com
|
||||
|
||||
# Fetch your external IP and network info as JSON
|
||||
curl http://ifconfig.me/all/json
|
||||
curl http://ifconfig.me/all.json
|
||||
|
||||
# Limit the rate of a download
|
||||
curl --limit-rate 1000B -O http://path.to.the/file
|
||||
|
||||
# Get your global IP
|
||||
curl httpbin.org/ip
|
||||
|
||||
# Get only the HTTP status code
|
||||
curl -o /dev/null -w '%{http_code}\n' -s -I URL
|
||||
|
@ -1,2 +1,8 @@
|
||||
# Printout date in format suitable for affixing to file names
|
||||
# Print date in format suitable for affixing to file names
|
||||
date +"%Y%m%d_%H%M%S"
|
||||
|
||||
# Convert Unix timestamp to Date(Linux)
|
||||
date -d @1440359821
|
||||
|
||||
# Convert Unix timestamp to Date(Mac)
|
||||
date -r 1440359821
|
||||
|
@ -1,7 +1,7 @@
|
||||
# Read from {/dev/urandom} 2*512 Bytes and put it into {/tmp/test.txt}
|
||||
# Note: At the first iteration, we read 512 Bytes.
|
||||
# Note: At the second iteration, we read 512 Bytes.
|
||||
dd if=/dev/urandom of=/tmp/test.txt count=512 bs=2
|
||||
dd if=/dev/urandom of=/tmp/test.txt count=2 bs=512
|
||||
|
||||
# Watch the progress of 'dd'
|
||||
dd if=/dev/zero of=/dev/null bs=4KB &; export dd_pid=`pgrep '^dd'`; while [[ -d /proc/$dd_pid ]]; do kill -USR1 $dd_pid && sleep 1 && clear; done
|
||||
@ -12,6 +12,11 @@ dd if=/dev/zero of=/dev/null bs=4KB &; export dd_pid=`pgrep '^dd'`; while [[ -d
|
||||
# Watch the progress of 'dd' with `pv` and `zenity` (apt-get install pv zenity)
|
||||
(pv -n /dev/zero | dd of=/dev/null bs=128M conv=notrunc,noerror) 2>&1 | zenity --title 'Running dd command (cloning), please wait...' --progress
|
||||
|
||||
# Watch the progress of 'dd' with the built-in `progress` functionality (introduced in coreutils v8.24)
|
||||
dd if=/dev/zero of=/dev/null bs=128M status=progress
|
||||
|
||||
# DD with "graphical" return
|
||||
dcfldd if=/dev/zero of=/dev/null bs=500K
|
||||
|
||||
# This will output the sound from your microphone port to the ssh target computer's speaker port. The sound quality is very bad, so you will hear a lot of hissing.
|
||||
dd if=/dev/dsp | ssh -c arcfour -C username@host dd of=/dev/dsp
|
||||
|
7
cheat/cheatsheets/deb
Normal file
7
cheat/cheatsheets/deb
Normal file
@ -0,0 +1,7 @@
|
||||
# Extract contents of a .deb file
|
||||
$ ar vx foo.deb # -> data.tar.gz
|
||||
$ tar xf data.tar.gz
|
||||
|
||||
# Install .deb file to a debian like system, e.g. ubuntu
|
||||
$ sudo dpkg -i foo.deb
|
||||
$ sudo apt-get install -f
|
@ -21,3 +21,6 @@ diff -s version1 version2
|
||||
|
||||
# To diff the output of two commands or scripts:
|
||||
diff <(command1) <(command2)
|
||||
|
||||
# Generate a patch file from two files
|
||||
diff -Naur version1 version2 > version.patch
|
||||
|
16
cheat/cheatsheets/dnf
Normal file
16
cheat/cheatsheets/dnf
Normal file
@ -0,0 +1,16 @@
|
||||
# To install the latest version of a package:
|
||||
dnf install <package name>
|
||||
|
||||
# To search package details for the given string
|
||||
dnf search <string>
|
||||
|
||||
# To find which package provides a binary
|
||||
dnf provides <path to binary>
|
||||
|
||||
# The following are available after installing "dnf-plugins-core"
|
||||
|
||||
# Download a package
|
||||
dnf download <package name>
|
||||
|
||||
# install the build dependencies for a SRPM or from a .spec file
|
||||
dnf builddep <srpm/.spec file>
|
32
cheat/cheatsheets/docker
Normal file
32
cheat/cheatsheets/docker
Normal file
@ -0,0 +1,32 @@
|
||||
# Start docker daemon
|
||||
docker -d
|
||||
|
||||
# start a container with an interactive shell
|
||||
docker run -ti <image_name> /bin/bash
|
||||
|
||||
# "shell" into a running container (docker-1.3+)
|
||||
docker exec -ti <container_name> bash
|
||||
|
||||
# inspect a running container
|
||||
docker inspect <container_name> (or <container_id>)
|
||||
|
||||
# Get the process ID for a container
|
||||
# Source: https://github.com/jpetazzo/nsenter
|
||||
docker inspect --format {{.State.Pid}} <container_name_or_ID>
|
||||
|
||||
# List the current mounted volumes for a container (and pretty print)
|
||||
# Source:
|
||||
# http://nathanleclaire.com/blog/2014/07/12/10-docker-tips-and-tricks-that-will-make-you-sing-a-whale-song-of-joy/
|
||||
docker inspect --format='{{json .Volumes}}' <container_id> | python -mjson.tool
|
||||
|
||||
# Copy files/folders between a container and your host
|
||||
docker cp foo.txt mycontainer:/foo.txt
|
||||
|
||||
# list currently running containers
|
||||
docker ps
|
||||
|
||||
# list all containers
|
||||
docker ps -a
|
||||
|
||||
# list all images
|
||||
docker images
|
11
cheat/cheatsheets/dpkg
Normal file
11
cheat/cheatsheets/dpkg
Normal file
@ -0,0 +1,11 @@
|
||||
# Install the package or upgrade it
|
||||
dpkg -i test.deb
|
||||
|
||||
# Remove a package including configuration files
|
||||
dpkg -P test.deb
|
||||
|
||||
# List all installed packages with versions and details
|
||||
dpkg -I
|
||||
|
||||
# Find out if a Debian package is installed or not
|
||||
dpkg -s test.deb | grep Status
|
5
cheat/cheatsheets/du
Normal file
5
cheat/cheatsheets/du
Normal file
@ -0,0 +1,5 @@
|
||||
# To sort directories/files by size
|
||||
du -sk *| sort -rn
|
||||
|
||||
# To show cumulative humanreadable size
|
||||
du -sh
|
@ -1,17 +1,24 @@
|
||||
# Running emacs
|
||||
|
||||
GUI mode $ emacs
|
||||
Terminal mode $ emacs -nw
|
||||
|
||||
# Basic usage
|
||||
|
||||
Indent Select text then press TAB
|
||||
Cut CTRL-w
|
||||
Copy ALT-w
|
||||
Paste CTRL-y
|
||||
Paste ("yank") CTRL-y
|
||||
Begin selection CTRL-SPACE
|
||||
Search/Find CTRL-s
|
||||
Replace ALT-% (ALT-SHIFT-5)
|
||||
Save CTRL-x CTRL-s
|
||||
Save as CTRL-x CTRL-w
|
||||
Load/Open CTRL-x CTRL-f
|
||||
Undo CTRL-x u
|
||||
Highlight all text CTRL-x h
|
||||
Directory listing CTRL-x d
|
||||
Cancel a command ESC ESC ESC
|
||||
Cancel a command CTRL-g
|
||||
Font size bigger CTRL-x CTRL-+
|
||||
Font size smaller CTRL-x CTRL--
|
||||
|
||||
@ -23,11 +30,21 @@
|
||||
Split screen horizontally with 24 column width CTRL-u 24 CTRL-x 3
|
||||
Revert to single screen CTRL-x 1
|
||||
Hide the current screen CTRL-x 0
|
||||
Kill the current screen CTRL-x k
|
||||
Move to the next buffer CTRL-x O
|
||||
Move to the next screen CTRL-x o
|
||||
Kill the current buffer CTRL-x k
|
||||
Select a buffer CTRL-x b
|
||||
Run command in the scratch buffer CTRL-x CTRL-e
|
||||
|
||||
# Navigation ( backward / forward )
|
||||
|
||||
Character-wise CTRL-b , CTRL-f
|
||||
Word-wise ALT-b , ALT-f
|
||||
Line-wise CTRL-p , CTRL-n
|
||||
Sentence-wise ALT-a , ALT-e
|
||||
Paragraph-wise ALT-{ , ALT-}
|
||||
Function-wise CTRL-ALT-a , CTRL-ALT-e
|
||||
Line beginning / end CTRL-a , CTRL-e
|
||||
|
||||
# Other stuff
|
||||
|
||||
Open a shell ALT-x eshell
|
||||
@ -39,32 +56,9 @@
|
||||
Compile some code ALT-x compile
|
||||
List packages ALT-x package-list-packages
|
||||
|
||||
# Sudoing within eshell
|
||||
|
||||
By default when using the sudo command within eshell you'll just
|
||||
get "permission denied" messages. To overcome that type:
|
||||
|
||||
alias sudo '*sudo $*'
|
||||
|
||||
# Line numbers
|
||||
|
||||
To add line numbers and enable moving to a line with CTRL-l:
|
||||
|
||||
(global-set-key "\C-l" 'goto-line)
|
||||
(add-hook 'find-file-hook (lambda () (linum-mode 1)))
|
||||
|
||||
# Org-mode
|
||||
|
||||
To begin org-mode ALT-x org-mode
|
||||
Table column separator Vertical/pipe character
|
||||
Reorganize table TAB
|
||||
Section heading *
|
||||
Open/collapse section TAB
|
||||
Open/collapse All CTRL-TAB
|
||||
Export in other file formats (eg HTML,PDF) CTRL-c CTRL-e
|
||||
|
||||
To make org-mode automatically wrap lines:
|
||||
|
||||
(add-hook 'org-mode-hook
|
||||
'(lambda ()
|
||||
(visual-line-mode 1)))
|
||||
|
5
cheat/cheatsheets/export
Normal file
5
cheat/cheatsheets/export
Normal file
@ -0,0 +1,5 @@
|
||||
# Calling export with no arguments will show current shell attributes
|
||||
export
|
||||
|
||||
# Create new environment variable
|
||||
export VARNAME="value"
|
23
cheat/cheatsheets/ffmpeg
Normal file
23
cheat/cheatsheets/ffmpeg
Normal file
@ -0,0 +1,23 @@
|
||||
# Print file metadata etc.
|
||||
ffmpeg -i path/to/file.ext
|
||||
|
||||
# Convert all m4a files to mp3
|
||||
for f in *.m4a; do ffmpeg -i "$f" -acodec libmp3lame -vn -b:a 320k "${f%.m4a}.mp3"; done
|
||||
|
||||
# Convert video from .foo to .bar
|
||||
# -g : GOP, for searchability
|
||||
ffmpeg -i input.foo -vcodec bar -acodec baz -b:v 21000k -b:a 320k -g 150 -threads 4 output.bar
|
||||
|
||||
# Convert image sequence to video
|
||||
ffmpeg -r 18 -pattern_type glob -i '*.png' -b:v 21000k -s hd1080 -vcodec vp9 -an -pix_fmt yuv420p -deinterlace output.ext
|
||||
|
||||
# Combine video and audio into one file
|
||||
ffmpeg -i video.ext -i audio.ext -c:v copy -c:a copy output.ext
|
||||
|
||||
# Listen to 10 seconds of audio from a video file
|
||||
#
|
||||
# -ss : start time
|
||||
# -t : seconds to cut
|
||||
# -autoexit : closes ffplay as soon as the audio finishes
|
||||
ffmpeg -ss 00:34:24.85 -t 10 -i path/to/file.mp4 -f mp3 pipe:play | ffplay -i pipe:play -autoexit
|
||||
|
@ -19,11 +19,11 @@ find ./path/ -name '*.txt' -exec rm '{}' \;
|
||||
# To find files with extension '.txt' and look for a string into them:
|
||||
find ./path/ -name '*.txt' | xargs grep 'string'
|
||||
|
||||
# To find files with size bigger than 5 Mb and sort them by size:
|
||||
find ./ -size +5M -type f -print0 | xargs -0 ls -Ssh
|
||||
# To find files with size bigger than 5 Mebibyte and sort them by size:
|
||||
find . -size +5M -type f -print0 | xargs -0 ls -Ssh | sort -z
|
||||
|
||||
# To find files bigger thank 2 MB and list them:
|
||||
find / -type f -size +20000k -exec ls -lh {} \; | awk '{ print $9 ": " $5 }'
|
||||
# To find files bigger than 2 Megabyte and list them:
|
||||
find . -type f -size +200000000c -exec ls -lh {} \; | awk '{ print $9 ": " $5 }'
|
||||
|
||||
# To find files modified more than 7 days ago and list file information
|
||||
find . -type f -mtime +7d -ls
|
||||
@ -40,5 +40,8 @@ find . -maxdepth 2 -name build -type d
|
||||
# To search all files who are not in .git directory
|
||||
find . ! -iwholename '*.git*' -type f
|
||||
|
||||
# Find all files that have the same node (hard link) as MY_FILE_HERE
|
||||
find / -type f -samefile MY_FILE_HERE 2>/dev/null
|
||||
# To find all files that have the same node (hard link) as MY_FILE_HERE
|
||||
find . -type f -samefile MY_FILE_HERE 2>/dev/null
|
||||
|
||||
# To find all files in the current directory and modify their permissions
|
||||
find . -type f -exec chmod 644 {} \;
|
||||
|
35
cheat/cheatsheets/for
Normal file
35
cheat/cheatsheets/for
Normal file
@ -0,0 +1,35 @@
|
||||
# basic loop
|
||||
for i in 1 2 3 4 5 6 7 8 9 10
|
||||
do
|
||||
echo $i
|
||||
done
|
||||
|
||||
# loop ls command results
|
||||
for var in `ls -alF`
|
||||
do
|
||||
echo $var
|
||||
done
|
||||
|
||||
# loop over all the JPG files in the current directory
|
||||
for jpg_file in *.jpg
|
||||
do
|
||||
echo $jpg_file
|
||||
done
|
||||
|
||||
# loop specified number of times
|
||||
for i in `seq 1 10`
|
||||
do
|
||||
echo $i
|
||||
done
|
||||
|
||||
# loop specified number of times: the C/C++ style
|
||||
for ((i=1;i<=10;++i))
|
||||
do
|
||||
echo $i
|
||||
done
|
||||
|
||||
# loop specified number of times: the brace expansion
|
||||
for i in {1..10}
|
||||
do
|
||||
echo $i
|
||||
done
|
@ -1,4 +1,4 @@
|
||||
# To set your identify:
|
||||
# To set your identity:
|
||||
git config --global user.name "John Doe"
|
||||
git config --global user.email johndoe@example.com
|
||||
|
||||
@ -11,15 +11,49 @@ git config --global color.ui true
|
||||
# To stage all changes for commit:
|
||||
git add --all
|
||||
|
||||
# To stash changes locally, this will keep the changes in a separate changelist
|
||||
# called stash and the working directory is cleaned. You can apply changes
|
||||
# from the stash anytime
|
||||
git stash
|
||||
|
||||
# To stash changes with a message
|
||||
git stash save "message"
|
||||
|
||||
# To list all the stashed changes
|
||||
git stash list
|
||||
|
||||
# To apply the most recent change and remove the stash from the stash list
|
||||
git stash pop
|
||||
|
||||
# To apply any stash from the list of stashes. This does not remove the stash
|
||||
# from the stash list
|
||||
git stash apply stash@{6}
|
||||
|
||||
# To commit staged changes
|
||||
git commit -m "Your commit message"
|
||||
|
||||
# To edit previous commit message
|
||||
git commit --amend
|
||||
|
||||
# Git commit in the past
|
||||
git commit --date="`date --date='2 day ago'`"
|
||||
git commit --date="Jun 13 18:30:25 IST 2015"
|
||||
# more recent versions of Git also support --date="2 days ago" directly
|
||||
|
||||
# To change the date of an existing commit
|
||||
git filter-branch --env-filter \
|
||||
'if [ $GIT_COMMIT = 119f9ecf58069b265ab22f1f97d2b648faf932e0 ]
|
||||
then
|
||||
export GIT_AUTHOR_DATE="Fri Jan 2 21:38:53 2009 -0800"
|
||||
export GIT_COMMITTER_DATE="Sat May 19 01:01:01 2007 -0700"
|
||||
fi'
|
||||
|
||||
# To removed staged and working directory changes
|
||||
git reset --hard
|
||||
|
||||
# To go 2 commits back
|
||||
git reset --hard HEAD~2
|
||||
|
||||
# To remove untracked files
|
||||
git clean -f -d
|
||||
|
||||
@ -35,6 +69,9 @@ git push git@github.com:username/project.git
|
||||
# To delete the branch "branch_name"
|
||||
git branch -D branch_name
|
||||
|
||||
# To make an exisiting branch track a remote branch
|
||||
git branch -u upstream/foo
|
||||
|
||||
# To see who commited which line in a file
|
||||
git blame filename
|
||||
|
||||
@ -51,3 +88,64 @@ git show 83fb499:path/fo/file.ext # Shows the file as it a
|
||||
git diff branch_1 branch_2 # Check difference between branches
|
||||
git log # Show all the commits
|
||||
git status # Show the changes from last commit
|
||||
|
||||
# Commit history of a set of files
|
||||
git log --pretty=email --patch-with-stat --reverse --full-index -- Admin\*.py > Sripts.patch
|
||||
|
||||
# Import commits from another repo
|
||||
git --git-dir=../some_other_repo/.git format-patch -k -1 --stdout <commit SHA> | git am -3 -k
|
||||
|
||||
# View commits that will be pushed
|
||||
git log @{u}..
|
||||
|
||||
# View changes that are new on a feature branch
|
||||
git log -p feature --not master
|
||||
git diff master...feature
|
||||
|
||||
# Interactive rebase for the last 7 commits
|
||||
git rebase -i @~7
|
||||
|
||||
# Diff files WITHOUT considering them a part of git
|
||||
# This can be used to diff files that are not in a git repo!
|
||||
git diff --no-index path/to/file/A path/to/file/B
|
||||
|
||||
# To pull changes while overwriting any local commits
|
||||
git fetch --all
|
||||
git reset --hard origin/master
|
||||
|
||||
# Update all your submodules
|
||||
git submodule update --init --recursive
|
||||
|
||||
# Perform a shallow clone to only get latest commits
|
||||
# (helps save data when cloning large repos)
|
||||
git clone --depth 1 <remote-url>
|
||||
|
||||
# To unshallow a clone
|
||||
git pull --unshallow
|
||||
|
||||
# Create a bare branch (one that has no commits on it)
|
||||
git checkout --orphan branch_name
|
||||
|
||||
# Checkout a new branch from a different starting point
|
||||
git checkout -b master upstream/master
|
||||
|
||||
# Remove all stale branches (ones that have been deleted on remote)
|
||||
# So if you have a lot of useless branches, delete them on Github and then run this
|
||||
git remote prune origin
|
||||
|
||||
# The following can be used to prune all remotes at once
|
||||
git remote prune $(git remote | tr '\n' ' ')
|
||||
|
||||
# Revisions can also be identified with :/text
|
||||
# So, this will show the first commit that has "cool" in their message body
|
||||
git show :/cool
|
||||
|
||||
# Undo parts of last commit in a specific file
|
||||
git checkout -p HEAD^ -- /path/to/file
|
||||
|
||||
# Revert a commit and keep the history of the reverted change as a separate revert commit
|
||||
git revert <commit SHA>
|
||||
|
||||
# Pich a commit from a branch to current branch. This is different than merge as
|
||||
# this just applies a single commit from a branch to current branch
|
||||
git cherry-pick <commit SHA1>
|
||||
|
@ -1,13 +1,13 @@
|
||||
# Basic:
|
||||
# Search a file for a pattern
|
||||
grep pattern file
|
||||
|
||||
# case nonsensitive research:
|
||||
grep -i pattern file
|
||||
# Case insensitive search (with line numbers)
|
||||
grep -in pattern file
|
||||
|
||||
# Recursively grep for string <pattern> in folder:
|
||||
grep -R pattern folder
|
||||
|
||||
# Getting pattern from file (one by line):
|
||||
# Read search patterns from a file (one per line)
|
||||
grep -f pattern_file file
|
||||
|
||||
# Find lines NOT containing pattern
|
||||
@ -17,10 +17,13 @@ grep -v pattern file
|
||||
grep "^00" file #Match lines starting with 00
|
||||
grep -E "[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}" file #Find IP add
|
||||
|
||||
# Find all files who contain {pattern} in the directory {directory}.
|
||||
# Find all files which match {pattern} in {directory}
|
||||
# This will show: "file:line my research"
|
||||
grep -rnw 'directory' -e "pattern"
|
||||
|
||||
# Exclude grep from your grepped output of ps.
|
||||
# Add [] to the first letter. Ex: sshd -> [s]shd
|
||||
ps aux | grep '[h]ttpd'
|
||||
|
||||
# Colour in red {bash} and keep all other lines
|
||||
ps aux | grep -E --color 'bash|$'
|
||||
|
12
cheat/cheatsheets/gyb
Normal file
12
cheat/cheatsheets/gyb
Normal file
@ -0,0 +1,12 @@
|
||||
# To estimate the number and the size of all mails on youremail@gmail.com
|
||||
gyb --email youremail@gmail.com --action estimate
|
||||
|
||||
# To backup from youremail@gmail.com to your local-folder
|
||||
gyb --email youremail@gmail.com --action backup --local-folder "~/MyLocalFolder/"
|
||||
|
||||
# To backup from youremail@gmail.com only important or starred emails to the
|
||||
# default local folder GYB-GMail-Backup-youremail@gmail.com
|
||||
gyb --email youremail@gmail.com --search "is:important OR is:starred"
|
||||
|
||||
# To restore from your local-folder to youremail@gmail.com
|
||||
gyb --email youremail@gmail.com --action restore --local-folder "~/MyLocalFolder/"
|
17
cheat/cheatsheets/gzip
Normal file
17
cheat/cheatsheets/gzip
Normal file
@ -0,0 +1,17 @@
|
||||
# To create a *.gz compressed file
|
||||
gzip test.txt
|
||||
|
||||
# To create a *.gz compressed file to a specific location using -c option (standard out)
|
||||
gzip -c test.txt > test_custom.txt.gz
|
||||
|
||||
# To uncompress a *.gz file
|
||||
gzip -d test.txt.gz
|
||||
|
||||
# Display compression ratio of the compressed file using gzip -l
|
||||
gzip -l *.gz
|
||||
|
||||
# Recursively compress all the files under a specified directory
|
||||
gzip -r documents_directory
|
||||
|
||||
# To create a *.gz compressed file and keep the original
|
||||
gzip < test.txt > test.txt.gz
|
32
cheat/cheatsheets/hardware-info
Normal file
32
cheat/cheatsheets/hardware-info
Normal file
@ -0,0 +1,32 @@
|
||||
# Display all hardware details
|
||||
sudo lshw
|
||||
|
||||
# List currently loaded kernel modules
|
||||
lsmod
|
||||
|
||||
# List all modules available to the system
|
||||
find /lib/modules/$(uname -r) -type f -iname "*.ko"
|
||||
|
||||
# Load a module into kernel
|
||||
modprobe modulename
|
||||
|
||||
# Remove a module from kernel
|
||||
modprobe -r modulename
|
||||
|
||||
# List devices connected via pci bus
|
||||
lspci
|
||||
|
||||
# Debug output for pci devices (hex)
|
||||
lspci -vvxxx
|
||||
|
||||
# Display cpu hardware stats
|
||||
cat /proc/cpuinfo
|
||||
|
||||
# Display memory hardware stats
|
||||
cat /proc/meminfo
|
||||
|
||||
# Output the kernel ring buffer
|
||||
dmesg
|
||||
|
||||
# Ouput kernel messages
|
||||
dmesg --kernel
|
20
cheat/cheatsheets/hg
Normal file
20
cheat/cheatsheets/hg
Normal file
@ -0,0 +1,20 @@
|
||||
# Clone a directory
|
||||
hg clone
|
||||
|
||||
# Add files to hg tracker
|
||||
hg add filename
|
||||
|
||||
# Add all files in a folder to hg tracker
|
||||
hg add folder/
|
||||
|
||||
# Create a commit with all tracked changes and a message
|
||||
hg commit -m "message"
|
||||
|
||||
# Push commits to source repository
|
||||
hg push
|
||||
|
||||
# Pull changes from source repository
|
||||
hg pull
|
||||
|
||||
# Rebase local commits to disambiguate with remote repository
|
||||
hg pull --rebase
|
195
cheat/cheatsheets/http
Normal file
195
cheat/cheatsheets/http
Normal file
@ -0,0 +1,195 @@
|
||||
# Custom HTTP method HTTP headers and JSON data:
|
||||
http PUT example.org X-API-Token:123 name=John
|
||||
|
||||
# Submitting forms:
|
||||
http -f POST example.org hello=World
|
||||
|
||||
# See the request that is being sent using one of the output options:
|
||||
http -v example.org
|
||||
|
||||
# Use Github API to post a comment on an issue with authentication:
|
||||
http -a USERNAME POST https://api.github.com/repos/jkbrzt/httpie/issues/83/comments body='HTTPie is awesome!'
|
||||
|
||||
# Upload a file using redirected input:
|
||||
http example.org < file.json
|
||||
|
||||
# Download a file and save it via redirected output:
|
||||
http example.org/file > file
|
||||
|
||||
# Download a file wget style:
|
||||
http --download example.org/file
|
||||
|
||||
# Use named sessions_ to make certain aspects or the communication
|
||||
# persistent between requests to the same host:
|
||||
# http --session=logged-in -a username:password httpbin.org/get API-Key:123
|
||||
http --session=logged-in httpbin.org/headers
|
||||
|
||||
# Set a custom Host header to work around missing DNS records:
|
||||
http localhost:8000 Host:example.com
|
||||
|
||||
# Simple JSON example:
|
||||
http PUT example.org name=John email=john@example.org
|
||||
|
||||
# Non-string fields use the := separator, which allows you to embed raw
|
||||
# JSON into the resulting object. Text and raw JSON files can also be
|
||||
# embedded into fields using =@ and :=@:
|
||||
http PUT api.example.com/person/1 name=John age:=29 married:=false hobbies:='["http", "pies"]' description=@about-john.txt bookmarks:=@bookmarks.json
|
||||
|
||||
# Send JSON data stored in a file:
|
||||
http POST api.example.com/person/1 < person.json
|
||||
|
||||
# Regular Forms
|
||||
http --form POST api.example.org/person/1 name='John Smith' email=john@example.org cv=@~/Documents/cv.txt
|
||||
|
||||
# File Upload Forms
|
||||
# If one or more file fields is present, the serialization and content
|
||||
# type is multipart/form-data:
|
||||
http -f POST example.com/jobs name='John Smith' cv@~/Documents/cv.pdf
|
||||
|
||||
# To set custom headers you can use the Header:Value notation:
|
||||
http example.org User-Agent:Bacon/1.0 'Cookie:valued-visitor=yes;foo=bar' X-Foo:Bar Referer:http://httpie.org/
|
||||
|
||||
# Basic auth:
|
||||
http -a username:password example.org
|
||||
|
||||
# Digest auth:
|
||||
http --auth-type=digest -a username:password example.org
|
||||
|
||||
# With password prompt:
|
||||
http -a username example.org
|
||||
|
||||
# Authorization information from your ~/.netrc file is honored as well:
|
||||
cat ~/.netrc
|
||||
machine httpbin.org
|
||||
login httpie
|
||||
# password test
|
||||
http httpbin.org/basic-auth/httpie/test
|
||||
|
||||
# You can specify proxies to be used through the --proxy argument for each
|
||||
# protocol (which is included in the value in case of redirects across
|
||||
# protocols):
|
||||
http --proxy=http:http://10.10.1.10:3128 --proxy=https:https://10.10.1.10:1080 example.org
|
||||
|
||||
# With Basic authentication:
|
||||
http --proxy=http:http://user:pass@10.10.1.10:3128 example.org
|
||||
|
||||
# To skip the HOST'S SSL CERTIFICATE VERIFICATION, you can pass
|
||||
# --verify=no (default is yes):
|
||||
http --verify=no https://example.org
|
||||
|
||||
# You can also use --verify=<CA_BUNDLE_PATH> to set a CUSTOM CA BUNDLE path:
|
||||
http --verify=/ssl/custom_ca_bundle https://example.org
|
||||
|
||||
# To use a CLIENT SIDE CERTIFICATE for the SSL communication, you can pass
|
||||
# the path of the cert file with --cert:
|
||||
http --cert=client.pem https://example.org
|
||||
|
||||
# If the PRIVATE KEY is not contained in the cert file you may pass the
|
||||
# path of the key file with --cert-key:
|
||||
http --cert=client.crt --cert-key=client.key https://example.org
|
||||
|
||||
# You can control what should be printed via several options:
|
||||
# --headers, -h Only the response headers are printed.
|
||||
# --body, -b Only the response body is printed.
|
||||
# --verbose, -v Print the whole HTTP exchange (request and response).
|
||||
# --print, -p Selects parts of the HTTP exchange.
|
||||
http --verbose PUT httpbin.org/put hello=world
|
||||
|
||||
# Print request and response headers:
|
||||
# Character Stands for
|
||||
# ----------- -------------------
|
||||
# H Request headers.
|
||||
# B Request body.
|
||||
# h Response headers.
|
||||
# b Response body.
|
||||
http --print=Hh PUT httpbin.org/put hello=world
|
||||
|
||||
# Let's say that there is an API that returns the whole resource when it
|
||||
# is updated, but you are only interested in the response headers to see
|
||||
# the status code after an update:
|
||||
http --headers PATCH example.org/Really-Huge-Resource name='New Name'
|
||||
|
||||
# Redirect from a file:
|
||||
http PUT example.com/person/1 X-API-Token:123 < person.json
|
||||
|
||||
# Or the output of another program:
|
||||
grep '401 Unauthorized' /var/log/httpd/error_log | http POST example.org/intruders
|
||||
|
||||
# You can use echo for simple data:
|
||||
echo '{"name": "John"}' | http PATCH example.com/person/1 X-API-Token:123
|
||||
|
||||
# You can even pipe web services together using HTTPie:
|
||||
http GET https://api.github.com/repos/jkbrzt/httpie | http POST httpbin.org/post
|
||||
|
||||
# You can use cat to enter multiline data on the terminal:
|
||||
cat | http POST example.com
|
||||
<paste>
|
||||
# ^D
|
||||
cat | http POST example.com/todos Content-Type:text/plain
|
||||
- buy milk
|
||||
- call parents
|
||||
^D
|
||||
|
||||
# On OS X, you can send the contents of the clipboard with pbpaste:
|
||||
pbpaste | http PUT example.com
|
||||
|
||||
# Passing data through stdin cannot be combined with data fields specified
|
||||
# on the command line:
|
||||
echo 'data' | http POST example.org more=data # This is invalid
|
||||
|
||||
|
||||
# AN ALTERNATIVE TO REDIRECTED stdin is specifying a filename (as
|
||||
# @/path/to/file) whose content is used as if it came from stdin.
|
||||
|
||||
# It has the advantage that THE Content-Type HEADER IS AUTOMATICALLY SET
|
||||
# to the appropriate value based on the filename extension. For example,
|
||||
# the following request sends the verbatim contents of that XML file with
|
||||
# Content-Type: application/xml:
|
||||
http PUT httpbin.org/put @/data/file.xml
|
||||
|
||||
# Download a file:
|
||||
http example.org/Movie.mov > Movie.mov
|
||||
|
||||
# Download an image of Octocat, resize it using ImageMagick, upload it
|
||||
# elsewhere:
|
||||
http octodex.github.com/images/original.jpg | convert - -resize 25% - | http example.org/Octocats
|
||||
|
||||
# Force colorizing and formatting, and show both the request and the
|
||||
# response in less pager:
|
||||
http --pretty=all --verbose example.org | less -R
|
||||
|
||||
# When enabled using the --download, -d flag, response headers are printed
|
||||
# to the terminal (stderr), and a progress bar is shown while the response
|
||||
# body is being saved to a file.
|
||||
http --download https://github.com/jkbrzt/httpie/tarball/master
|
||||
|
||||
# You can also redirect the response body to another program while the
|
||||
# response headers and progress are still shown in the terminal:
|
||||
http -d https://github.com/jkbrzt/httpie/tarball/master | tar zxf -
|
||||
|
||||
# If --output, -o is specified, you can resume a partial download using
|
||||
# the --continue, -c option. This only works with servers that support
|
||||
# Range requests and 206 Partial Content responses. If the server doesn't
|
||||
# support that, the whole file will simply be downloaded:
|
||||
http -dco file.zip example.org/file
|
||||
|
||||
# Prettified streamed response:
|
||||
http --stream -f -a YOUR-TWITTER-NAME https://stream.twitter.com/1/statuses/filter.json track='Justin Bieber'
|
||||
|
||||
# Send each new tweet (JSON object) mentioning "Apple" to another
|
||||
# server as soon as it arrives from the Twitter streaming API:
|
||||
http --stream -f -a YOUR-TWITTER-NAME https://stream.twitter.com/1/statuses/filter.json track=Apple | while read tweet; do echo "$tweet" | http POST example.org/tweets ; done
|
||||
|
||||
# Create a new session named user1 for example.org:
|
||||
http --session=user1 -a user1:password example.org X-Foo:Bar
|
||||
|
||||
# Now you can refer to the session by its name, and the previously used
|
||||
# authorization and HTTP headers will automatically be set:
|
||||
http --session=user1 example.org
|
||||
|
||||
# To create or reuse a different session, simple specify a different name:
|
||||
http --session=user2 -a user2:password example.org X-Bar:Foo
|
||||
|
||||
# Instead of a name, you can also directly specify a path to a session
|
||||
# file. This allows for sessions to be re-used across multiple hosts:
|
||||
http --session=/tmp/session.json example.orghttp --session=/tmp/session.json admin.example.orghttp --session=~/.httpie/sessions/another.example.org/test.json example.orghttp --session-read-only=/tmp/session.json example.org
|
74
cheat/cheatsheets/hub
Normal file
74
cheat/cheatsheets/hub
Normal file
@ -0,0 +1,74 @@
|
||||
As a contributor to open-source
|
||||
-------------------------------
|
||||
|
||||
# clone your own project
|
||||
$ git clone dotfiles
|
||||
→ git clone git://github.com/YOUR_USER/dotfiles.git
|
||||
|
||||
# clone another project
|
||||
$ git clone github/hub
|
||||
→ git clone git://github.com/github/hub.git
|
||||
|
||||
# see the current project's issues
|
||||
$ git browse -- issues
|
||||
→ open https://github.com/github/hub/issues
|
||||
|
||||
# open another project's wiki
|
||||
$ git browse mojombo/jekyll wiki
|
||||
→ open https://github.com/mojombo/jekyll/wiki
|
||||
|
||||
## Example workflow for contributing to a project:
|
||||
$ git clone github/hub
|
||||
$ cd hub
|
||||
# create a topic branch
|
||||
$ git checkout -b feature
|
||||
→ ( making changes ... )
|
||||
$ git commit -m "done with feature"
|
||||
# It's time to fork the repo!
|
||||
$ git fork
|
||||
→ (forking repo on GitHub...)
|
||||
→ git remote add YOUR_USER git://github.com/YOUR_USER/hub.git
|
||||
# push the changes to your new remote
|
||||
$ git push YOUR_USER feature
|
||||
# open a pull request for the topic branch you've just pushed
|
||||
$ git pull-request
|
||||
→ (opens a text editor for your pull request message)
|
||||
|
||||
|
||||
As an open-source maintainer
|
||||
----------------------------
|
||||
|
||||
# fetch from multiple trusted forks, even if they don't yet exist as remotes
|
||||
$ git fetch mislav,cehoffman
|
||||
→ git remote add mislav git://github.com/mislav/hub.git
|
||||
→ git remote add cehoffman git://github.com/cehoffman/hub.git
|
||||
→ git fetch --multiple mislav cehoffman
|
||||
|
||||
# check out a pull request for review
|
||||
$ git checkout https://github.com/github/hub/pull/134
|
||||
→ (creates a new branch with the contents of the pull request)
|
||||
|
||||
# directly apply all commits from a pull request to the current branch
|
||||
$ git am -3 https://github.com/github/hub/pull/134
|
||||
|
||||
# cherry-pick a GitHub URL
|
||||
$ git cherry-pick https://github.com/xoebus/hub/commit/177eeb8
|
||||
→ git remote add xoebus git://github.com/xoebus/hub.git
|
||||
→ git fetch xoebus
|
||||
→ git cherry-pick 177eeb8
|
||||
|
||||
# `am` can be better than cherry-pick since it doesn't create a remote
|
||||
$ git am https://github.com/xoebus/hub/commit/177eeb8
|
||||
|
||||
# open the GitHub compare view between two releases
|
||||
$ git compare v0.9..v1.0
|
||||
|
||||
# put compare URL for a topic branch to clipboard
|
||||
$ git compare -u feature | pbcopy
|
||||
|
||||
# create a repo for a new project
|
||||
$ git init
|
||||
$ git add . && git commit -m "It begins."
|
||||
$ git create -d "My new thing"
|
||||
→ (creates a new project on GitHub with the name of current directory)
|
||||
$ git push origin master
|
3
cheat/cheatsheets/iconv
Normal file
3
cheat/cheatsheets/iconv
Normal file
@ -0,0 +1,3 @@
|
||||
# To convert file (iconv.src) from iso-8859-1 to utf-8 and save to
|
||||
# /tmp/iconv.out
|
||||
iconv -f iso-8859-1 -t utf-8 iconv.src -o /tmp/iconv.out
|
32
cheat/cheatsheets/ip
Normal file
32
cheat/cheatsheets/ip
Normal file
@ -0,0 +1,32 @@
|
||||
# Display all interfaces with addresses
|
||||
ip addr
|
||||
|
||||
# Take down / up the wireless adapter
|
||||
ip link set dev wlan0 {up|down}
|
||||
|
||||
# Set a static IP and netmask
|
||||
ip addr add 192.168.1.100/32 dev eth0
|
||||
|
||||
# Remove a IP from an interface
|
||||
ip addr del 192.168.1.100/32 dev eth0
|
||||
|
||||
# Remove all IPs from an interface
|
||||
ip address flush dev eth0
|
||||
|
||||
# Display all routes
|
||||
ip route
|
||||
|
||||
# Display all routes for IPv6
|
||||
ip -6 route
|
||||
|
||||
# Add default route via gateway IP
|
||||
ip route add default via 192.168.1.1
|
||||
|
||||
# Add route via interface
|
||||
ip route add 192.168.0.0/24 dev eth0
|
||||
|
||||
# Change your mac address
|
||||
ip link set dev eth0 address aa:bb:cc:dd:ee:ff
|
||||
|
||||
# View neighbors (using ARP and NDP)
|
||||
ip neighbor show
|
@ -16,11 +16,18 @@
|
||||
# To switch between channel windows
|
||||
ALT+<number>, eg. ALT+1, ALT+2
|
||||
|
||||
# To list the nicknames within a channel
|
||||
# To list the nicknames within the active channel
|
||||
/names
|
||||
|
||||
# To change the topic
|
||||
# To change the channel topic
|
||||
/topic <description>
|
||||
|
||||
# To quit irssi
|
||||
# To limit channel background noise (joins, parts, quits, etc.)
|
||||
/ignore #foo,#bar JOINS PARTS QUITS NICKS # Quieten only channels `#foo`, `#bar`
|
||||
/ignore * JOINS PARTS QUITS NICKS # Quieten all channels
|
||||
|
||||
# To save the current Irssi session config into the configuration file
|
||||
/save
|
||||
|
||||
# To quit Irssi
|
||||
/exit
|
||||
|
@ -19,3 +19,14 @@ journalctl /usr/bin/dbus-daemon
|
||||
# Filter by PID
|
||||
journalctl _PID=123
|
||||
|
||||
# Filter by Command, e.g., sshd
|
||||
journalctl _COMM=sshd
|
||||
|
||||
# Filter by Command and time period
|
||||
journalctl _COMM=crond --since '10:00' --until '11:00'
|
||||
|
||||
# List all available boots
|
||||
journalctl --list-boots
|
||||
|
||||
# Filter by specific User ID e.g., user id 1000
|
||||
journalctl _UID=1000
|
||||
|
13
cheat/cheatsheets/jq
Normal file
13
cheat/cheatsheets/jq
Normal file
@ -0,0 +1,13 @@
|
||||
# Pretty print the json
|
||||
jq "." < filename.json
|
||||
|
||||
# Access the value at key "foo"
|
||||
jq '.foo'
|
||||
|
||||
# Access first list item
|
||||
jq '.[0]'
|
||||
|
||||
# Slice & Dice
|
||||
jq '.[2:4]'
|
||||
jq '.[:3]'
|
||||
jq '.[-2:]'
|
25
cheat/cheatsheets/jrnl
Normal file
25
cheat/cheatsheets/jrnl
Normal file
@ -0,0 +1,25 @@
|
||||
# Add entry to default jrnl (from your configured text editor)
|
||||
jrnl
|
||||
|
||||
# Add entry to default jrnl
|
||||
jrnl Write entry here.
|
||||
|
||||
# List of tags
|
||||
jrnl --tags
|
||||
|
||||
# Entries per tag
|
||||
jrnl @tag
|
||||
|
||||
# Export jrnl as json
|
||||
jrnl --export json
|
||||
|
||||
# Entries in a timeframe
|
||||
jrnl -from 2009 -until may
|
||||
|
||||
# Add Sublime text to .jrnl_config
|
||||
|
||||
# Windows
|
||||
"editor": "F:\\Powerpack\\Sublime\\sublime_text.exe -w"
|
||||
|
||||
# Linux
|
||||
"editor": "/usr/bin/sublime -w"
|
5
cheat/cheatsheets/kill
Normal file
5
cheat/cheatsheets/kill
Normal file
@ -0,0 +1,5 @@
|
||||
# Kill a process gracefully
|
||||
kill -15 <process id>
|
||||
|
||||
# Kill a process forcefully
|
||||
kill -9 <process id>
|
@ -1,2 +1,9 @@
|
||||
# To disable the terminal refresh when exiting
|
||||
less -X
|
||||
|
||||
# To save the contents to a file
|
||||
# Method 1 - Only works when the input is a pipe
|
||||
s <filename>
|
||||
|
||||
# Method 2 - This should work whether input is a pipe or an ordinary file.
|
||||
Type g or < (g or less-than) | $ (pipe then dollar) then cat > <filename> and Enter.
|
||||
|
23
cheat/cheatsheets/lib
Normal file
23
cheat/cheatsheets/lib
Normal file
@ -0,0 +1,23 @@
|
||||
# Display available libraries
|
||||
ldconfig -p
|
||||
|
||||
# Update library resources
|
||||
ldconfig
|
||||
|
||||
# Display libraries and file location
|
||||
ldd
|
||||
|
||||
# Libraries available to apps in real-time
|
||||
"Dynamic Libraries" (.so.)
|
||||
|
||||
# Libraries only available to apps when installed (imported)
|
||||
"Static Libraries" (.a.)
|
||||
|
||||
# Standard (usual) library file location
|
||||
/lib
|
||||
|
||||
# Sofware-accessible source for library info
|
||||
/etc/ld.so.cache # (binary)
|
||||
|
||||
# Human-readable source for library info
|
||||
/etc/ld.so.conf # (points to /etc/ld.so.conf.d)
|
@ -1,2 +1,5 @@
|
||||
# To create a symlink:
|
||||
ln -s path/to/the/target/directory name-of-symlink
|
||||
|
||||
# Symlink, while overwriting existing destination files
|
||||
ln -sf /some/dir/exec /usr/bin/exec
|
||||
|
@ -9,3 +9,9 @@ ls -lh
|
||||
|
||||
# Display files, sorted by size
|
||||
ls -S
|
||||
|
||||
# Display directories only
|
||||
ls -d */
|
||||
|
||||
# Display directories only, include hidden
|
||||
ls -d .*/ */
|
||||
|
21
cheat/cheatsheets/lsblk
Normal file
21
cheat/cheatsheets/lsblk
Normal file
@ -0,0 +1,21 @@
|
||||
# Show all available block devices along with their partitioning schemes
|
||||
lsblk
|
||||
|
||||
# To show SCSI devices:
|
||||
lsblk --scsi
|
||||
|
||||
# To show a specific device
|
||||
lsblk /dev/sda
|
||||
|
||||
# To verify TRIM support:
|
||||
# Check the values of DISC-GRAN (discard granularity) and DISC-MAX (discard max bytes) columns.
|
||||
# Non-zero values indicate TRIM support
|
||||
lsblk --discard
|
||||
|
||||
# To featch info about filesystems:
|
||||
lsblk --fs
|
||||
|
||||
# For JSON, LIST or TREE output formats use the following flags:
|
||||
lsblk --json
|
||||
lsblk --list
|
||||
lsblk --tree # default view
|
@ -4,20 +4,34 @@ sudo lsof -i4
|
||||
# List all IPv6 network files
|
||||
sudo lsof -i6
|
||||
|
||||
# To find listening ports:
|
||||
# List all open sockets
|
||||
lsof -i
|
||||
|
||||
# List all listening ports
|
||||
lsof -Pnl +M -i4
|
||||
|
||||
# To find which program is using the port 80:
|
||||
# Find which program is using the port 80
|
||||
lsof -i TCP:80
|
||||
|
||||
# List all connections to a specific host
|
||||
lsof -i@192.168.1.5
|
||||
|
||||
# List all processes accessing a particular file/directory
|
||||
lsof </path/to/file>
|
||||
|
||||
# List all files open for a particular user
|
||||
lsof -u <username>
|
||||
|
||||
# List all files/network connections a given process is using
|
||||
# List all files/network connections a command is using
|
||||
lsof -c <command-name>
|
||||
|
||||
# List all files a process has open
|
||||
lsof -p <pid>
|
||||
|
||||
# List all files open mounted at /mount/point.
|
||||
# Particularly useful for finding which process(es) are using a
|
||||
# mounted USB stick or CD/DVD.
|
||||
lsof +f -- </mount/point>
|
||||
|
||||
# See this primer: http://www.danielmiessler.com/study/lsof/
|
||||
# for a number of other useful lsof tips
|
||||
|
7
cheat/cheatsheets/lvm
Normal file
7
cheat/cheatsheets/lvm
Normal file
@ -0,0 +1,7 @@
|
||||
#Exclusive Activation of a Volume Group in a Cluster
|
||||
#Link --> https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/High_Availability_Add-On_Administration/s1-exclusiveactive-HAAA.html
|
||||
1> vgs --noheadings -o vg_name
|
||||
2> volume_list = [ "rhel_root", "rhel_home" ]
|
||||
3> dracut -H -f /boot/initramfs-$(uname -r).img $(uname -r)
|
||||
4> Reboot the node
|
||||
5> uname -r to verify the correct initrd image
|
5
cheat/cheatsheets/man
Normal file
5
cheat/cheatsheets/man
Normal file
@ -0,0 +1,5 @@
|
||||
# Convert a man page to pdf
|
||||
man -t bash | ps2pdf - bash.pdf
|
||||
|
||||
# View the ascii chart
|
||||
man 7 ascii
|
@ -35,7 +35,10 @@ ___
|
||||
# links
|
||||
This is [an example](http://example.com "Title") inline link.
|
||||
|
||||
# emphasis
|
||||
*em* _em_
|
||||
# image
|
||||

|
||||
|
||||
# formatting
|
||||
*em* _em_
|
||||
**strong** __strong__
|
||||
~~strikethrough~~
|
||||
|
58
cheat/cheatsheets/mdadm
Normal file
58
cheat/cheatsheets/mdadm
Normal file
@ -0,0 +1,58 @@
|
||||
# For the sake of briefness, we use Bash "group compound" stanza:
|
||||
# /dev/sd{a,b,...}1 => /dev/sda1 /dev/sdb1 ...
|
||||
# Along the following variables:
|
||||
# ${M} array identifier (/dev/md${M})
|
||||
# ${D} device identifier (/dev/sd${D})
|
||||
# ${P} partition identifier (/dev/sd${D}${P})
|
||||
|
||||
# Create (initialize) a new array
|
||||
mdadm --create /dev/md${M} --level=raid5 --raid-devices=4 /dev/sd{a,b,c,d,e}${P} --spare-devices=/dev/sdf1
|
||||
|
||||
# Manually assemble (activate) an existing array
|
||||
mdadm --assemble /dev/md${M} /dev/sd{a,b,c,d,e}${P}
|
||||
|
||||
# Automatically assemble (activate) all existing arrays
|
||||
mdadm --assemble --scan
|
||||
|
||||
# Stop an assembled (active) array
|
||||
mdadm --stop /dev/md${M}
|
||||
|
||||
# See array configuration
|
||||
mdadm --query /dev/md${M}
|
||||
|
||||
# See array component configuration (dump superblock content)
|
||||
mdadm --query --examine /dev/sd${D}${P}
|
||||
|
||||
# See detailed array confiration/status
|
||||
mdadm --detail /dev/md${M}
|
||||
|
||||
# Save existing arrays configuration
|
||||
# (MAY be required by initrd for successfull boot)
|
||||
mdadm --detail --scan > /etc/mdadm/mdadm.conf
|
||||
|
||||
# Erase array component superblock
|
||||
# (MUST do before reusing a partition for other purposes)
|
||||
mdadm --zero-superblock /dev/sd${D}${P}
|
||||
|
||||
# Manually mark a component as failed
|
||||
# (SHOULD when a device shows wear-and-tear signs, e.g. through SMART)
|
||||
mdadm --manage /dev/md${M} --fail /dev/sd${D}${P}
|
||||
|
||||
# Remove a failed component
|
||||
# (SHOULD before preemptively replacing a device, after failing it)
|
||||
mdadm --manage /dev/md${M} --remove /dev/sd${D}${P}
|
||||
|
||||
# Prepare (format) a new device to replace a failed one
|
||||
sfdisk -d /dev/sd${D,sane} | sfdisk /dev/sd${D,new}
|
||||
|
||||
# Add new component to an existing array
|
||||
# (this will trigger the rebuild)
|
||||
mdadm --manage /dev/md${M} --add /dev/sd${D,new}${P}
|
||||
|
||||
# See assembled (active) arrays status
|
||||
cat /proc/mdstat
|
||||
|
||||
# Rename a device
|
||||
# (SHOULD after hostname change; eg. name="$(hostname -s)")
|
||||
mdadm --assemble /dev/md${M} /dev/sd{a,b,c,d,e}${P} --name="${name}:${M}" --update=name
|
||||
|
3
cheat/cheatsheets/more
Normal file
3
cheat/cheatsheets/more
Normal file
@ -0,0 +1,3 @@
|
||||
# To show the file start at line number 5
|
||||
more +5 file
|
||||
|
@ -1,8 +1,14 @@
|
||||
# To mount / partition as read-write in repair mode:
|
||||
mount -o remount,rw /
|
||||
|
||||
# Bind mount path to a second location
|
||||
mount --bind /origin/path /destination/path
|
||||
|
||||
# To mount Usb disk as user writable:
|
||||
mount -o uid=username,gid=usergroup /dev/sdx /mnt/xxx
|
||||
|
||||
# To mount a remote NFS directory
|
||||
mount -t nfs example.com:/remote/example/dir /local/example/dir
|
||||
|
||||
# To mount an ISO
|
||||
mount -o loop disk1.iso /mnt/disk
|
||||
|
22
cheat/cheatsheets/mutt
Normal file
22
cheat/cheatsheets/mutt
Normal file
@ -0,0 +1,22 @@
|
||||
# Create new mailbox in IMAP
|
||||
+ When located in mailbox list (c)
|
||||
shift + C
|
||||
|
||||
# Move multiple messages to folder (bulk operations)
|
||||
|
||||
1. Select/tag them with alt+'t'
|
||||
2. ;s in mail inbox overview for bulk operation
|
||||
|
||||
# Deleting / Undeleting all messages in mutt
|
||||
|
||||
1. In mutt’s index, hit ‘D’ (UPPERCASE D)
|
||||
2. It will prompt you with “Delete messages matching: “
|
||||
|
||||
+ enter this string:
|
||||
|
||||
~A
|
||||
|
||||
3. It should mark all for deletion!
|
||||
|
||||
|
||||
4. Conversely, you can do the same thing with UPPERCASE U to undelete multiple messages.
|
17
cheat/cheatsheets/mv
Normal file
17
cheat/cheatsheets/mv
Normal file
@ -0,0 +1,17 @@
|
||||
# Move a file from one place to another
|
||||
mv ~/Desktop/foo.txt ~/Documents/foo.txt
|
||||
|
||||
# Move a file from one place to another and automatically overwrite if the destination file exists
|
||||
# (This will override any previous -i or -n args)
|
||||
mv -f ~/Desktop/foo.txt ~/Documents/foo.txt
|
||||
|
||||
# Move a file from one place to another but ask before overwriting an existing file
|
||||
# (This will override any previous -f or -n args)
|
||||
mv -i ~/Desktop/foo.txt ~/Documents/foo.txt
|
||||
|
||||
# Move a file from one place to another but never overwrite anything
|
||||
# (This will override any previous -f or -i args)
|
||||
mv -n ~/Desktop/foo.txt ~/Documents/foo.txt
|
||||
|
||||
# Move listed files to a directory
|
||||
mv -t ~/Desktop/ file1 file2 file3
|
@ -12,3 +12,26 @@ CREATE DATABASE owa CHARACTER SET utf8 COLLATE utf8_general_ci;
|
||||
|
||||
# To add a user and give rights on the given database
|
||||
GRANT ALL PRIVILEGES ON database.* TO 'user'@'localhost'IDENTIFIED BY 'password' WITH GRANT OPTION;
|
||||
|
||||
# To list the privileges granted to the account that you are using to connect to the server. Any of the 3 statements will work.
|
||||
SHOW GRANTS FOR CURRENT_USER();
|
||||
SHOW GRANTS;
|
||||
SHOW GRANTS FOR CURRENT_USER;
|
||||
|
||||
# Basic SELECT Statement
|
||||
SELECT * FROM tbl_name;
|
||||
|
||||
# Basic INSERT Statement
|
||||
INSERT INTO tbl_name (col1,col2) VALUES(15,col1*2);
|
||||
|
||||
# Basic UPDATE Statement
|
||||
UPDATE tbl_name SET col1 = "example";
|
||||
|
||||
# Basic DELETE Statement
|
||||
DELETE FROM tbl_name WHERE user = 'jcole';
|
||||
|
||||
# To check stored procedure
|
||||
SHOW PROCEDURE STATUS;
|
||||
|
||||
# To check stored function
|
||||
SHOW FUNCTION STATUS;
|
||||
|
@ -1,16 +1,16 @@
|
||||
# To dump a database to a file (Note that your password will appear in your command history!):
|
||||
# To dump a database to a file (Note that your password will appear in your command history!):
|
||||
mysqldump -uusername -ppassword the-database > db.sql
|
||||
|
||||
# To dump a database to a file:
|
||||
mysqldump -uusername -p the-database > db.sql
|
||||
|
||||
# To dump a database to a .tgz file (Note that your password will appear in your command history!):
|
||||
# To dump a database to a .tgz file (Note that your password will appear in your command history!):
|
||||
mysqldump -uusername -ppassword the-database | gzip -9 > db.sql
|
||||
|
||||
# To dump a database to a .tgz file:
|
||||
mysqldump -uusername -p the-database | gzip -9 > db.sql
|
||||
|
||||
# To dump all databases to a file (Note that your password will appear in your command history!):
|
||||
# To dump all databases to a file (Note that your password will appear in your command history!):
|
||||
mysqldump -uusername -ppassword --all-databases > all-databases.sql
|
||||
|
||||
# To dump all databases to a file:
|
||||
|
20
cheat/cheatsheets/nc
Normal file
20
cheat/cheatsheets/nc
Normal file
@ -0,0 +1,20 @@
|
||||
# To open a TCP connection to port 42 of host.example.com, using port 31337 as the source port, with a timeout of 5 seconds:
|
||||
nc -p 31337 -w 5 host.example.com 42
|
||||
|
||||
# To open a UDP connection to port 53 of host.example.com:
|
||||
nc -u host.example.com 53
|
||||
|
||||
# To open a TCP connection to port 42 of host.example.com using 10.1.2.3 as the IP for the local end of the connection:
|
||||
nc -s 10.1.2.3 host.example.com 42
|
||||
|
||||
# To create and listen on a UNIX-domain stream socket:
|
||||
nc -lU /var/tmp/dsocket
|
||||
|
||||
# To connect to port 42 of host.example.com via an HTTP proxy at 10.2.3.4, port 8080. This example could also be used by ssh(1); see the ProxyCommand directive in ssh_config(5) for more information.
|
||||
nc -x10.2.3.4:8080 -Xconnect host.example.com 42
|
||||
|
||||
# The same example again, this time enabling proxy authentication with username "ruser" if the proxy requires it:
|
||||
nc -x10.2.3.4:8080 -Xconnect -Pruser host.example.com 42
|
||||
|
||||
# To choose the source IP for the testing using the -s option
|
||||
nc -zv -s source_IP target_IP Port
|
11
cheat/cheatsheets/ncdu
Normal file
11
cheat/cheatsheets/ncdu
Normal file
@ -0,0 +1,11 @@
|
||||
# Save results to file
|
||||
ncdu -o ncdu.file
|
||||
|
||||
# Read from file
|
||||
ncdu -f ncdu.file
|
||||
|
||||
# Save results to compressed file
|
||||
ncdu -o-| gzip > ncdu.file.gz
|
||||
|
||||
# Read from compressed file
|
||||
zcat ncdu.file.gz | ncdu -f-
|
29
cheat/cheatsheets/nkf
Normal file
29
cheat/cheatsheets/nkf
Normal file
@ -0,0 +1,29 @@
|
||||
# check the file's charactor code
|
||||
nkf -g test.txt
|
||||
|
||||
# convert charactor code to UTF-8
|
||||
nkf -w --overwrite test.txt
|
||||
|
||||
# convert charactor code to EUC-JP
|
||||
nkf -e --overwrite test.txt
|
||||
|
||||
# convert charactor code to Shift-JIS
|
||||
nkf -s --overwrite test.txt
|
||||
|
||||
# convert charactor code to ISO-2022-JP
|
||||
nkf -j --overwrite test.txt
|
||||
|
||||
# convert newline to LF
|
||||
nkf -Lu --overwrite test.txt
|
||||
|
||||
# convert newline to CRLF
|
||||
nkf -Lw --overwrite test.txt
|
||||
|
||||
# convert newline to CR
|
||||
nkf -Lm --overwrite test.txt
|
||||
|
||||
# MIME encode
|
||||
echo テスト | nkf -WwMQ
|
||||
|
||||
# MIME decode
|
||||
echo "=E3=83=86=E3=82=B9=E3=83=88" | nkf -WwmQ
|
@ -23,13 +23,15 @@ nmap -source-port [port] [target]
|
||||
nmap -A [target]
|
||||
|
||||
# Speedup your scan:
|
||||
nmap -T5 --min-parallelism=50 [target]
|
||||
# -n => disable ReverseDNS
|
||||
# --min-rate=X => min X packets / sec
|
||||
nmap -T5 --min-parallelism=50 -n --min-rate=300 [target]
|
||||
|
||||
# Traceroute:
|
||||
nmap -traceroute [target]
|
||||
|
||||
# Ping scan only: -sP
|
||||
# Don't ping: -PN
|
||||
# Don't ping: -PN <- Use full if a host don't reply to a ping.
|
||||
# TCP SYN ping: -PS
|
||||
# TCP ACK ping: -PA
|
||||
# UDP ping: -PU
|
||||
@ -38,6 +40,9 @@ nmap -traceroute [target]
|
||||
# Example: Ping scan all machines on a class C network
|
||||
nmap -sP 192.168.0.0/24
|
||||
|
||||
# Force TCP scan: -sT
|
||||
# Force UDP scan: -sU
|
||||
|
||||
# Use some script:
|
||||
nmap --script default,safe
|
||||
|
||||
@ -55,3 +60,10 @@ nmap --script "default and safe"
|
||||
|
||||
# Loads scripts in the default, safe, or intrusive categories, except for those whose names start with http-.
|
||||
nmap --script "(default or safe or intrusive) and not http-*"
|
||||
|
||||
# Scan for the heartbleed
|
||||
# -pT:443 => Scan only port 443 with TCP (T:)
|
||||
nmap -T5 --min-parallelism=50 -n --script "ssl-heartbleed" -pT:443 127.0.0.1
|
||||
|
||||
# Show all informations (debug mode)
|
||||
nmap -d ...
|
||||
|
43
cheat/cheatsheets/nmcli
Normal file
43
cheat/cheatsheets/nmcli
Normal file
@ -0,0 +1,43 @@
|
||||
# Desc: Command line interface to NetworkManager
|
||||
|
||||
# Connect to a wireless access point - Parameters:
|
||||
# <wiface> -- the name of your wireless interface
|
||||
# <ssid> -- the SSID of the access point
|
||||
# <pass> -- the WiFi password
|
||||
nmcli d wifi connect <ssid> password <pass> iface <wiface>
|
||||
|
||||
# Disconnect from WiFi - Parameters:
|
||||
# <wiface> -- the name of your wireless interface
|
||||
nmcli d wifi disconnect iface <wiface>
|
||||
|
||||
# Get WiFi status (enabled / disabled)
|
||||
nmcli radio wifi
|
||||
|
||||
# Enable / Disable WiFi
|
||||
nmcli radio wifi <on|off>
|
||||
|
||||
# Show all available WiFi access points
|
||||
nmcli dev wifi list
|
||||
|
||||
# Refresh the available WiFi connection list
|
||||
nmcli dev wifi rescan
|
||||
|
||||
# Show all available connections
|
||||
nmcli con
|
||||
|
||||
# Show only active connections
|
||||
nmcli con show --active
|
||||
|
||||
# Review the available devices
|
||||
nmcli dev status
|
||||
|
||||
# Add a dynamic ethernet connection - parameters:
|
||||
# <name> -- the name of the connection
|
||||
# <iface_name> -- the name of the interface
|
||||
nmcli con add type ethernet con-name <name> ifname <iface_name>
|
||||
|
||||
# Import OpenVPN connection settings from file:
|
||||
nmcli con import type openvpn file <path_to_ovpn_file>
|
||||
|
||||
# Bring up the ethernet connection
|
||||
nmcli con up <name>
|
20
cheat/cheatsheets/nova
Normal file
20
cheat/cheatsheets/nova
Normal file
@ -0,0 +1,20 @@
|
||||
# To list VMs on current tenant:
|
||||
nova list
|
||||
|
||||
# To list VMs of all tenants (admin user only):
|
||||
nova list --all-tenants
|
||||
|
||||
# To boot a VM on a specific host:
|
||||
nova boot --nic net-id=<net_id> \
|
||||
--image <image_id> \
|
||||
--flavor <flavor> \
|
||||
--availability-zone nova:<host_name> <vm_name>
|
||||
|
||||
# To stop a server
|
||||
nova stop <server>
|
||||
|
||||
# To start a server
|
||||
nova start <server>
|
||||
|
||||
# To attach a network interface to a specific VM:
|
||||
nova interface-attach --net-id <net_id> <server>
|
22
cheat/cheatsheets/npm
Normal file
22
cheat/cheatsheets/npm
Normal file
@ -0,0 +1,22 @@
|
||||
# Every command shown here can be used with the `-g` switch for global scope
|
||||
|
||||
# Install a package in the current directory
|
||||
npm install <package>
|
||||
|
||||
# Install a package, and save it in the `dependencies` section of `package.json`
|
||||
npm install --save <package>
|
||||
|
||||
# Install a package, and save it in the `devDependencies` section of `package.json`
|
||||
npm install --save-dev <package>
|
||||
|
||||
# Show outdated packages in the current directory
|
||||
npm outdated
|
||||
|
||||
# Update outdated packages
|
||||
npm update
|
||||
|
||||
# Update `npm` (will override the one shipped with Node.js)
|
||||
npm install -g npm
|
||||
|
||||
# Uninstall a package
|
||||
npm uninstall <package>
|
33
cheat/cheatsheets/ntp
Normal file
33
cheat/cheatsheets/ntp
Normal file
@ -0,0 +1,33 @@
|
||||
# Verify ntpd running:
|
||||
service ntp status
|
||||
|
||||
# Start ntpd if not running:
|
||||
service ntp start
|
||||
|
||||
# Display current hardware clock value:
|
||||
sudo hwclock -r
|
||||
|
||||
# Apply system time to hardware time:
|
||||
sudo hwclock --systohc
|
||||
|
||||
# Apply hardware time to system time:
|
||||
sudo hwclock --hctosys
|
||||
|
||||
# Set hwclock to local time:
|
||||
sudo hwclock --localtime
|
||||
|
||||
# Set hwclock to UTC:
|
||||
sudo hwclock --utc
|
||||
|
||||
# Set hwclock manually:
|
||||
sudo hwclock --set --date="8/10/15 13:10:05"
|
||||
|
||||
# Query surrounding stratum time servers
|
||||
ntpq -pn
|
||||
|
||||
# Config file:
|
||||
/etc/ntp.conf
|
||||
|
||||
# Driftfile:
|
||||
location of "drift" of your system clock compared to ntp servers
|
||||
/var/lib/ntp/ntp.drift
|
2
cheat/cheatsheets/numfmt
Normal file
2
cheat/cheatsheets/numfmt
Normal file
@ -0,0 +1,2 @@
|
||||
# Convert bytes to Human readable format
|
||||
numfmt --to=iec --suffix=B --padding=7 1048576
|
@ -15,7 +15,13 @@ openssl req -text -noout -in server.csr
|
||||
# To show certificate information for generated certificate
|
||||
openssl x509 -text -noout -in server.crt
|
||||
|
||||
# To get the sha256 fingerprint of a certificate
|
||||
openssl x509 -in server.crt -noout -sha256 -fingerprint
|
||||
|
||||
# To view certificate expiration:
|
||||
echo | openssl s_client -connect <hostname>:443 2> /dev/null | \
|
||||
awk '/-----BEGIN/,/END CERTIFICATE-----/' | \
|
||||
openssl x509 -noout -enddate
|
||||
|
||||
# Generate Diffie-Hellman parameters:
|
||||
openssl dhparam -outform PEM -out dhparams.pem 2048
|
||||
|
46
cheat/cheatsheets/org-mode
Normal file
46
cheat/cheatsheets/org-mode
Normal file
@ -0,0 +1,46 @@
|
||||
Begin org-mode ALT-x org-mode
|
||||
Save CTRL-x CTRL-s
|
||||
Export in other file formats (eg HTML,PDF) CTRL-c CTRL-e
|
||||
|
||||
# Outline
|
||||
|
||||
Section heading *
|
||||
New headline ALT-return
|
||||
Move headline up or down ALT-up_arrow/down_arrow
|
||||
Adjust indent depth of headline ALT-left_arrow/right_arrow
|
||||
Open/collapse section TAB
|
||||
Open/collapse All CTRL-TAB
|
||||
|
||||
# To-Do Lists
|
||||
|
||||
Mark list item as TODO ** TODO
|
||||
Cycle through workflow SHIFT-left_arrow/right_arrow
|
||||
Show only outstanding TODO items CTRL-c CTRL-v
|
||||
|
||||
# Tables
|
||||
|
||||
Table column separator Vertical/pipe character
|
||||
Reorganize table TAB
|
||||
Move column ALT-left_arrow/right_arrow
|
||||
Move row ALT-up_arrow/down_arrow
|
||||
|
||||
# Styles
|
||||
|
||||
*bold*
|
||||
/italic/
|
||||
_underlined_
|
||||
=code=
|
||||
~verbatim~
|
||||
+strike-through+
|
||||
|
||||
# Heading
|
||||
|
||||
Header -*- mode: org -*-
|
||||
|
||||
# .emacs
|
||||
|
||||
To make org-mode automatically wrap lines:
|
||||
|
||||
(add-hook 'org-mode-hook
|
||||
'(lambda ()
|
||||
(visual-line-mode 1)))
|
5
cheat/cheatsheets/p4
Normal file
5
cheat/cheatsheets/p4
Normal file
@ -0,0 +1,5 @@
|
||||
# Print details related to Client and server configuration
|
||||
p4 info
|
||||
|
||||
# Open a file and add it to depot
|
||||
p4 add <filename>
|
@ -27,6 +27,9 @@ pacman -Ql <package name> | sed -n -e 's/.*\/bin\///p' | tail -n +2
|
||||
# To list explicitly installed packages
|
||||
pacman -Qe
|
||||
|
||||
# To list the top-most recent explicitly installed packages (not in the base groups)
|
||||
expac --timefmt='%Y-%m-%d %T' '%l\t%n' $(comm -23 <(pacman -Qeq|sort) <(pacman -Qqg base base-devel|sort)) | sort -r | head -20
|
||||
|
||||
# To list orphan packages (installed as dependencies and not required anymore)
|
||||
pacman -Qdt
|
||||
|
||||
|
15
cheat/cheatsheets/paste
Normal file
15
cheat/cheatsheets/paste
Normal file
@ -0,0 +1,15 @@
|
||||
# Concat columns from files
|
||||
paste file1 file2 ...
|
||||
|
||||
# List the files in the current directory in three columns:
|
||||
ls | paste - - -
|
||||
|
||||
# Combine pairs of lines from a file into single lines:
|
||||
paste -s -d '\t\n' myfile
|
||||
|
||||
# Number the lines in a file, similar to nl(1):
|
||||
sed = myfile | paste -s -d '\t\n' - -
|
||||
|
||||
# Create a colon-separated list of directories named bin,
|
||||
# suitable for use in the PATH environment variable:
|
||||
find / -name bin -type d | paste -s -d : -
|
13
cheat/cheatsheets/patch
Normal file
13
cheat/cheatsheets/patch
Normal file
@ -0,0 +1,13 @@
|
||||
# Patch one file
|
||||
patch version1 < version.patch
|
||||
|
||||
# Reverse a patch
|
||||
patch -R version1 < version.patch
|
||||
|
||||
# Patch all files in a directory, adding any missing new files
|
||||
# -p strips leading slashes
|
||||
$ cd dir
|
||||
$ patch -p1 -i ../big.patch
|
||||
|
||||
# Patch files in a directory, with one level (/) offset
|
||||
patch -p1 -r version1/ < version.patch
|
8
cheat/cheatsheets/perl
Normal file
8
cheat/cheatsheets/perl
Normal file
@ -0,0 +1,8 @@
|
||||
# To view the perl version:
|
||||
perl -v
|
||||
|
||||
# Replace string "\n" to newline
|
||||
echo -e "foo\nbar\nbaz" | perl -pe 's/\n/\\n/g;'
|
||||
|
||||
# Replace newline with multiple line to space
|
||||
cat test.txt | perl -0pe "s/test1\ntest2/test1 test2/m"
|
5
cheat/cheatsheets/pgrep
Normal file
5
cheat/cheatsheets/pgrep
Normal file
@ -0,0 +1,5 @@
|
||||
# Get a list of PIDs matching the pattern
|
||||
pgrep example
|
||||
|
||||
# Kill all PIDs matching the pattern
|
||||
pgrep -f example | xargs kill
|
8
cheat/cheatsheets/ping
Normal file
8
cheat/cheatsheets/ping
Normal file
@ -0,0 +1,8 @@
|
||||
# ping a host with a total count of 15 packets overall.
|
||||
ping -c 15 www.example.com
|
||||
|
||||
# ping a host with a total count of 15 packets overall, one every .5 seconds (faster ping).
|
||||
ping -c 15 -i .5 www.example.com
|
||||
|
||||
# test if a packet size of 1500 bytes is supported (to check the MTU for example)
|
||||
ping -s 1500 -c 10 -M do www.example.com
|
2
cheat/cheatsheets/ping6
Normal file
2
cheat/cheatsheets/ping6
Normal file
@ -0,0 +1,2 @@
|
||||
# get all ipv6 neighbors via broadcast ping
|
||||
ping6 -I eth0 ff02::1
|
30
cheat/cheatsheets/pip
Normal file
30
cheat/cheatsheets/pip
Normal file
@ -0,0 +1,30 @@
|
||||
# Search for packages
|
||||
pip search SomePackage
|
||||
|
||||
# Install some packages
|
||||
pip install SomePackage
|
||||
|
||||
# Install some package in user space
|
||||
pip install --user SomePackage
|
||||
|
||||
# Upgrade some package
|
||||
pip install --upgrade SomePackage
|
||||
|
||||
# Output and install packages in a requirement file
|
||||
pip freeze > requirements.txt
|
||||
pip install -r requirements.txt
|
||||
|
||||
# Show details of a package
|
||||
pip show SomePackage
|
||||
|
||||
# List outdated packages
|
||||
pip list --outdated
|
||||
|
||||
# Upgrade all outdated packages, thanks to http://stackoverflow.com/a/3452888
|
||||
pip freeze --local | grep -v '^\-e' | cut -d = -f 1 | xargs -n1 pip install -U
|
||||
|
||||
# Upgrade outdated packages on latest version of pip
|
||||
pip list --outdated --format=freeze | cut -d = -f 1 | xargs -n1 pip install -U
|
||||
|
||||
# Install specific version of a package
|
||||
pip install -I SomePackage1==1.1.0 'SomePackage2>=1.0.4'
|
27
cheat/cheatsheets/pkgtools
Normal file
27
cheat/cheatsheets/pkgtools
Normal file
@ -0,0 +1,27 @@
|
||||
# Create a Slackware package from a structured directory and sub-tree
|
||||
$ cd /path/to/pkg/dir
|
||||
$ su - c 'makepkg --linkadd y --chown n $foo-1.0.3-x86_64-1_tag.tgz'
|
||||
|
||||
|
||||
# Install a Slackware package
|
||||
installpkg foo-1.0.3-x86_64-1.tgz
|
||||
|
||||
# Install a Slackware package to non-standard location
|
||||
ROOT=/path/to/dir installpkg foo-1.0.4-noarch-1.tgz
|
||||
|
||||
# Create backup of files that will be overwritten when installing
|
||||
tar czvf /tmp/backup.tar.gz $(installpkg --warn foo-1.0.4-noarch-1.tgz)
|
||||
|
||||
|
||||
# Upgrade a Slackware package including files only in new version
|
||||
upgradepkg --install-new foo-1.0.6-noarch-1.tgz
|
||||
|
||||
# Upgrade a Slackware package even if version is the same
|
||||
upgradepkg --reinstall foo-1.0.4-noarch-1.tgz
|
||||
|
||||
|
||||
# Remove a Slackware package
|
||||
removepkg foo-0.2.8-x86_64-1
|
||||
|
||||
# Remove a Slackware package, retaining a backup (uninstalled) copy
|
||||
removepkg -copy foo-0.2.8-x86_64-1 # -> /var/log/setup/tmp/preserved_packages/foo...
|
5
cheat/cheatsheets/pkill
Normal file
5
cheat/cheatsheets/pkill
Normal file
@ -0,0 +1,5 @@
|
||||
# To kill a process using it's full process name
|
||||
pkill <processname>
|
||||
|
||||
# To kill a process by it's partial name
|
||||
pkill -f <string>
|
2
cheat/cheatsheets/popd
Normal file
2
cheat/cheatsheets/popd
Normal file
@ -0,0 +1,2 @@
|
||||
# Returns to the directory at the top of the `pushd' stack
|
||||
popd
|
26
cheat/cheatsheets/psql
Normal file
26
cheat/cheatsheets/psql
Normal file
@ -0,0 +1,26 @@
|
||||
# psql is the PostgreSQL terminal interface. The following commands were tested on version 9.5.
|
||||
# Connection options:
|
||||
# -U username (if not specified current OS user is used).
|
||||
# -p port.
|
||||
# -h server hostname/address.
|
||||
|
||||
# Connect to a specific database:
|
||||
psql -U postgres -h serverAddress -d dbName
|
||||
|
||||
# Get databases on a server:
|
||||
psql -U postgres -h serverAddress --list
|
||||
|
||||
# Execute sql query and save output to file:
|
||||
psql -U postgres -d dbName -c 'select * from tableName;' -o fileName
|
||||
|
||||
# Execute query and get tabular html output:
|
||||
psql -U postgres -d dbName -H -c 'select * from tableName;'
|
||||
|
||||
# Execute query and save resulting rows to csv file:
|
||||
psql -U postgres -d dbName -t -A -P fieldsep=',' -c 'select * from tableName;' -o fileName.csv
|
||||
|
||||
# Read commands from file:
|
||||
psql -f fileName
|
||||
|
||||
# Restore databases from file:
|
||||
psql -f fileName.backup postgres
|
5
cheat/cheatsheets/pushd
Normal file
5
cheat/cheatsheets/pushd
Normal file
@ -0,0 +1,5 @@
|
||||
# Pushes your current directory to the top of a stack while changing to the specified directory
|
||||
pushd <directory>
|
||||
|
||||
# To return use popd
|
||||
popd
|
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user