mirror of
https://github.com/cheat/cheat.git
synced 2025-09-01 09:38:29 +02:00
Compare commits
231 Commits
Author | SHA1 | Date | |
---|---|---|---|
09f821835c | |||
7e5e4315e5 | |||
869e7095f3 | |||
6dd8faf26a | |||
c0585ee55c | |||
c0d755e102 | |||
49e1fc46f4 | |||
3d90b26b04 | |||
3b73b9b06b | |||
74d1bc1ec7 | |||
78c76dc75a | |||
f204ed66e1 | |||
29c53b754d | |||
5a7fdfcca7 | |||
c3f082eccf | |||
808a2585ef | |||
c0aad062ec | |||
8ffeaa4211 | |||
c1d4c768de | |||
a063c7bb64 | |||
d058ee087e | |||
35c38be120 | |||
cc86f23dba | |||
54086bf8d6 | |||
429ed25aba | |||
128f28ac99 | |||
420a320839 | |||
e3f435a78a | |||
dcc01bb980 | |||
6f27a3e614 | |||
36b078c9f6 | |||
73c1842866 | |||
ceb3707d28 | |||
f9e8e041ef | |||
b59e83e706 | |||
bfa813a0b8 | |||
c179ef64c6 | |||
14a4ee867e | |||
70ef6239fe | |||
1b55a238df | |||
eeb2c92576 | |||
b6137cac8b | |||
711fd02195 | |||
248f5a0526 | |||
8e7ce511bd | |||
ba7ebc8392 | |||
6670785a2a | |||
aabaab1185 | |||
22eb1f2df4 | |||
a519ea163e | |||
6a2eda80d4 | |||
20d52376f9 | |||
3b2848668a | |||
a8f91d4224 | |||
e0adbbc5b9 | |||
905f12a279 | |||
0c24bbbaaf | |||
baa782b8ce | |||
740358e4c0 | |||
2ebc8c9fac | |||
f3ecf76239 | |||
84df17a0f6 | |||
91c28712e6 | |||
8eda2266bc | |||
47fd7c90f4 | |||
cafa2fb2fd | |||
9c31ba5102 | |||
da65ea32d8 | |||
e1aec49ed6 | |||
ab86ac970d | |||
90f66ccaf3 | |||
f63406bc3e | |||
b3a93bc128 | |||
8f0d2e9fc3 | |||
4c2d0d2d8e | |||
ac445388d9 | |||
705601f0b1 | |||
2d7fdb5425 | |||
4512a61086 | |||
8096ca7f90 | |||
511c57f582 | |||
6ca4b6c8e7 | |||
9c696cc430 | |||
001fdb0eda | |||
af354ba6a3 | |||
196875a828 | |||
6cf69bc190 | |||
6b736083c3 | |||
b477df20b2 | |||
6304a65399 | |||
bc40ced2c1 | |||
74dfd51601 | |||
51b0b12663 | |||
ae45265317 | |||
97dd037538 | |||
402d15e8d8 | |||
8a07a1e96c | |||
aa9b3e8bb4 | |||
9db66dbaeb | |||
c906a394cc | |||
6ca560c1b7 | |||
e75e9bb211 | |||
dd93473464 | |||
0d6de64fc0 | |||
26991977fd | |||
878e266f5b | |||
55e7181d87 | |||
59accc64f7 | |||
c18e475fd1 | |||
2166a57ccd | |||
b2e1400bb6 | |||
30a49d3596 | |||
86ba1ad9e6 | |||
820de5dba8 | |||
33f0dc346b | |||
889c8ef8fe | |||
434802341e | |||
d897a8a8ea | |||
aba6fe5043 | |||
86d1ce58a9 | |||
fd7f31bf16 | |||
417f47f037 | |||
f39fad1324 | |||
4cf03c5363 | |||
afcd74c8bf | |||
e27ce3f1f9 | |||
e9b8f04c24 | |||
d14c759a48 | |||
c70dc002fa | |||
ff8ba4e717 | |||
718ec4f685 | |||
3d8343a878 | |||
a5352ad9e5 | |||
f5ee3d5e29 | |||
e64babc972 | |||
cd465ef84f | |||
96e26a38d4 | |||
998ed00424 | |||
1fd03d3305 | |||
77cba58599 | |||
c5a738a8b1 | |||
250a265b25 | |||
c232721119 | |||
55492c50ac | |||
d9df28e3f2 | |||
710c7bcf70 | |||
efba736aee | |||
95774db7c5 | |||
da63c5d27f | |||
2e1cda114a | |||
353fe48d60 | |||
a96bd229a6 | |||
4d57f529c9 | |||
5caa8fed38 | |||
69f91e0cf4 | |||
fdbc8909cc | |||
76a91ce358 | |||
be2cb6e632 | |||
426b0aaa0d | |||
9041c57d21 | |||
1dd9d85509 | |||
9506167af8 | |||
27482cbabd | |||
03bb651bf0 | |||
c4a5ca3900 | |||
03b587f538 | |||
e4d7722476 | |||
3807aa5433 | |||
956ce7fadd | |||
57876ed0e7 | |||
58abb16ca1 | |||
54e30022f0 | |||
c412cd0534 | |||
2d67038188 | |||
603bc360c0 | |||
f772ef167e | |||
2c2ab6a57f | |||
61458933eb | |||
6f579f9234 | |||
77429d9ccc | |||
4ea583503b | |||
7eb405dcf8 | |||
6b8ecd6b5c | |||
6efae113cf | |||
ed91f9fa37 | |||
0720d0fdc2 | |||
cb706de241 | |||
873968903a | |||
dde3acf109 | |||
d1d5d84e4c | |||
41d2a810e6 | |||
28478ff257 | |||
111c2098c0 | |||
ce611eaceb | |||
ab2d96edb4 | |||
b193112a13 | |||
db92b4c5d8 | |||
8dd00d8c9b | |||
f9f1c5b3e4 | |||
6a8e3f7fc6 | |||
64d331265e | |||
e391cf2f01 | |||
3e287e62b8 | |||
13429f6148 | |||
f125db6f45 | |||
22a33dc5d3 | |||
7bd603cf23 | |||
d0324ecef3 | |||
d1fb8414f8 | |||
191a5e6e84 | |||
95636f5433 | |||
e4417b2d65 | |||
eda53cccd6 | |||
ccfe2a9cbd | |||
301203f268 | |||
9cd4bdd6d7 | |||
7b895adee5 | |||
b77b9e8541 | |||
d68fb456ba | |||
d7d033c908 | |||
fa4b482832 | |||
cf8893ec5f | |||
0a3fd3559c | |||
6a4414f538 | |||
538aeee2b2 | |||
371c0af156 | |||
8677e0c35a | |||
afcaaafbe5 | |||
f128167311 | |||
74a91aa1d4 | |||
377da479e6 |
3
.gitignore
vendored
3
.gitignore
vendored
@ -1,2 +1,5 @@
|
|||||||
*.pyc
|
*.pyc
|
||||||
|
MANIFEST
|
||||||
build
|
build
|
||||||
|
cheat.egg-info
|
||||||
|
dist
|
||||||
|
17
CONTRIBUTING.md
Normal file
17
CONTRIBUTING.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
Contributing
|
||||||
|
============
|
||||||
|
If you would like to contribute cheetsheets or program functionality, please
|
||||||
|
fork this repository, make your changes, and submit a pull request.
|
||||||
|
|
||||||
|
Python code should conform to [PEP 8][].
|
||||||
|
|
||||||
|
Licensing
|
||||||
|
---------
|
||||||
|
By contributing to the project, you agree to license your work under the same
|
||||||
|
licenses as `cheat` itself. `cheat` is currently dual-licensed under the GPL3
|
||||||
|
and MIT licenses, though that could change without notice in the future.
|
||||||
|
|
||||||
|
`cheat`, however, will always remain free software (as in both "free as in
|
||||||
|
freedom" and "free as in beer") and shall always be licensed accordingly.
|
||||||
|
|
||||||
|
[PEP 8]: http://legacy.python.org/dev/peps/pep-0008/
|
680
LICENSE
680
LICENSE
@ -1,678 +1,2 @@
|
|||||||
|
This program is dual-licensed under the MIT and GPL3 licenses. See the licenses
|
||||||
GNU GENERAL PUBLIC LICENSE
|
directory for the license text in full.
|
||||||
Version 3, 29 June 2007
|
|
||||||
|
|
||||||
Copyright (C) 2007 Free Software Foundation, Inc. [http://fsf.org/]
|
|
||||||
Everyone is permitted to copy and distribute verbatim copies
|
|
||||||
of this license document, but changing it is not allowed.
|
|
||||||
|
|
||||||
Preamble
|
|
||||||
|
|
||||||
The GNU General Public License is a free, copyleft license for
|
|
||||||
software and other kinds of works.
|
|
||||||
|
|
||||||
The licenses for most software and other practical works are designed
|
|
||||||
to take away your freedom to share and change the works. By contrast,
|
|
||||||
the GNU General Public License is intended to guarantee your freedom to
|
|
||||||
share and change all versions of a program--to make sure it remains free
|
|
||||||
software for all its users. We, the Free Software Foundation, use the
|
|
||||||
GNU General Public License for most of our software; it applies also to
|
|
||||||
any other work released this way by its authors. You can apply it to
|
|
||||||
your programs, too.
|
|
||||||
|
|
||||||
When we speak of free software, we are referring to freedom, not
|
|
||||||
price. Our General Public Licenses are designed to make sure that you
|
|
||||||
have the freedom to distribute copies of free software (and charge for
|
|
||||||
them if you wish), that you receive source code or can get it if you
|
|
||||||
want it, that you can change the software or use pieces of it in new
|
|
||||||
free programs, and that you know you can do these things.
|
|
||||||
|
|
||||||
To protect your rights, we need to prevent others from denying you
|
|
||||||
these rights or asking you to surrender the rights. Therefore, you have
|
|
||||||
certain responsibilities if you distribute copies of the software, or if
|
|
||||||
you modify it: responsibilities to respect the freedom of others.
|
|
||||||
|
|
||||||
For example, if you distribute copies of such a program, whether
|
|
||||||
gratis or for a fee, you must pass on to the recipients the same
|
|
||||||
freedoms that you received. You must make sure that they, too, receive
|
|
||||||
or can get the source code. And you must show them these terms so they
|
|
||||||
know their rights.
|
|
||||||
|
|
||||||
Developers that use the GNU GPL protect your rights with two steps:
|
|
||||||
(1) assert copyright on the software, and (2) offer you this License
|
|
||||||
giving you legal permission to copy, distribute and/or modify it.
|
|
||||||
|
|
||||||
For the developers' and authors' protection, the GPL clearly explains
|
|
||||||
that there is no warranty for this free software. For both users' and
|
|
||||||
authors' sake, the GPL requires that modified versions be marked as
|
|
||||||
changed, so that their problems will not be attributed erroneously to
|
|
||||||
authors of previous versions.
|
|
||||||
|
|
||||||
Some devices are designed to deny users access to install or run
|
|
||||||
modified versions of the software inside them, although the manufacturer
|
|
||||||
can do so. This is fundamentally incompatible with the aim of
|
|
||||||
protecting users' freedom to change the software. The systematic
|
|
||||||
pattern of such abuse occurs in the area of products for individuals to
|
|
||||||
use, which is precisely where it is most unacceptable. Therefore, we
|
|
||||||
have designed this version of the GPL to prohibit the practice for those
|
|
||||||
products. If such problems arise substantially in other domains, we
|
|
||||||
stand ready to extend this provision to those domains in future versions
|
|
||||||
of the GPL, as needed to protect the freedom of users.
|
|
||||||
|
|
||||||
Finally, every program is threatened constantly by software patents.
|
|
||||||
States should not allow patents to restrict development and use of
|
|
||||||
software on general-purpose computers, but in those that do, we wish to
|
|
||||||
avoid the special danger that patents applied to a free program could
|
|
||||||
make it effectively proprietary. To prevent this, the GPL assures that
|
|
||||||
patents cannot be used to render the program non-free.
|
|
||||||
|
|
||||||
The precise terms and conditions for copying, distribution and
|
|
||||||
modification follow.
|
|
||||||
|
|
||||||
TERMS AND CONDITIONS
|
|
||||||
|
|
||||||
0. Definitions.
|
|
||||||
|
|
||||||
"This License" refers to version 3 of the GNU General Public License.
|
|
||||||
|
|
||||||
"Copyright" also means copyright-like laws that apply to other kinds of
|
|
||||||
works, such as semiconductor masks.
|
|
||||||
|
|
||||||
"The Program" refers to any copyrightable work licensed under this
|
|
||||||
License. Each licensee is addressed as "you". "Licensees" and
|
|
||||||
"recipients" may be individuals or organizations.
|
|
||||||
|
|
||||||
To "modify" a work means to copy from or adapt all or part of the work
|
|
||||||
in a fashion requiring copyright permission, other than the making of an
|
|
||||||
exact copy. The resulting work is called a "modified version" of the
|
|
||||||
earlier work or a work "based on" the earlier work.
|
|
||||||
|
|
||||||
A "covered work" means either the unmodified Program or a work based
|
|
||||||
on the Program.
|
|
||||||
|
|
||||||
To "propagate" a work means to do anything with it that, without
|
|
||||||
permission, would make you directly or secondarily liable for
|
|
||||||
infringement under applicable copyright law, except executing it on a
|
|
||||||
computer or modifying a private copy. Propagation includes copying,
|
|
||||||
distribution (with or without modification), making available to the
|
|
||||||
public, and in some countries other activities as well.
|
|
||||||
|
|
||||||
To "convey" a work means any kind of propagation that enables other
|
|
||||||
parties to make or receive copies. Mere interaction with a user through
|
|
||||||
a computer network, with no transfer of a copy, is not conveying.
|
|
||||||
|
|
||||||
An interactive user interface displays "Appropriate Legal Notices"
|
|
||||||
to the extent that it includes a convenient and prominently visible
|
|
||||||
feature that (1) displays an appropriate copyright notice, and (2)
|
|
||||||
tells the user that there is no warranty for the work (except to the
|
|
||||||
extent that warranties are provided), that licensees may convey the
|
|
||||||
work under this License, and how to view a copy of this License. If
|
|
||||||
the interface presents a list of user commands or options, such as a
|
|
||||||
menu, a prominent item in the list meets this criterion.
|
|
||||||
|
|
||||||
1. Source Code.
|
|
||||||
|
|
||||||
The "source code" for a work means the preferred form of the work
|
|
||||||
for making modifications to it. "Object code" means any non-source
|
|
||||||
form of a work.
|
|
||||||
|
|
||||||
A "Standard Interface" means an interface that either is an official
|
|
||||||
standard defined by a recognized standards body, or, in the case of
|
|
||||||
interfaces specified for a particular programming language, one that
|
|
||||||
is widely used among developers working in that language.
|
|
||||||
|
|
||||||
The "System Libraries" of an executable work include anything, other
|
|
||||||
than the work as a whole, that (a) is included in the normal form of
|
|
||||||
packaging a Major Component, but which is not part of that Major
|
|
||||||
Component, and (b) serves only to enable use of the work with that
|
|
||||||
Major Component, or to implement a Standard Interface for which an
|
|
||||||
implementation is available to the public in source code form. A
|
|
||||||
"Major Component", in this context, means a major essential component
|
|
||||||
(kernel, window system, and so on) of the specific operating system
|
|
||||||
(if any) on which the executable work runs, or a compiler used to
|
|
||||||
produce the work, or an object code interpreter used to run it.
|
|
||||||
|
|
||||||
The "Corresponding Source" for a work in object code form means all
|
|
||||||
the source code needed to generate, install, and (for an executable
|
|
||||||
work) run the object code and to modify the work, including scripts to
|
|
||||||
control those activities. However, it does not include the work's
|
|
||||||
System Libraries, or general-purpose tools or generally available free
|
|
||||||
programs which are used unmodified in performing those activities but
|
|
||||||
which are not part of the work. For example, Corresponding Source
|
|
||||||
includes interface definition files associated with source files for
|
|
||||||
the work, and the source code for shared libraries and dynamically
|
|
||||||
linked subprograms that the work is specifically designed to require,
|
|
||||||
such as by intimate data communication or control flow between those
|
|
||||||
subprograms and other parts of the work.
|
|
||||||
|
|
||||||
The Corresponding Source need not include anything that users
|
|
||||||
can regenerate automatically from other parts of the Corresponding
|
|
||||||
Source.
|
|
||||||
|
|
||||||
The Corresponding Source for a work in source code form is that
|
|
||||||
same work.
|
|
||||||
|
|
||||||
2. Basic Permissions.
|
|
||||||
|
|
||||||
All rights granted under this License are granted for the term of
|
|
||||||
copyright on the Program, and are irrevocable provided the stated
|
|
||||||
conditions are met. This License explicitly affirms your unlimited
|
|
||||||
permission to run the unmodified Program. The output from running a
|
|
||||||
covered work is covered by this License only if the output, given its
|
|
||||||
content, constitutes a covered work. This License acknowledges your
|
|
||||||
rights of fair use or other equivalent, as provided by copyright law.
|
|
||||||
|
|
||||||
You may make, run and propagate covered works that you do not
|
|
||||||
convey, without conditions so long as your license otherwise remains
|
|
||||||
in force. You may convey covered works to others for the sole purpose
|
|
||||||
of having them make modifications exclusively for you, or provide you
|
|
||||||
with facilities for running those works, provided that you comply with
|
|
||||||
the terms of this License in conveying all material for which you do
|
|
||||||
not control copyright. Those thus making or running the covered works
|
|
||||||
for you must do so exclusively on your behalf, under your direction
|
|
||||||
and control, on terms that prohibit them from making any copies of
|
|
||||||
your copyrighted material outside their relationship with you.
|
|
||||||
|
|
||||||
Conveying under any other circumstances is permitted solely under
|
|
||||||
the conditions stated below. Sublicensing is not allowed; section 10
|
|
||||||
makes it unnecessary.
|
|
||||||
|
|
||||||
3. Protecting Users' Legal Rights From Anti-Circumvention Law.
|
|
||||||
|
|
||||||
No covered work shall be deemed part of an effective technological
|
|
||||||
measure under any applicable law fulfilling obligations under article
|
|
||||||
11 of the WIPO copyright treaty adopted on 20 December 1996, or
|
|
||||||
similar laws prohibiting or restricting circumvention of such
|
|
||||||
measures.
|
|
||||||
|
|
||||||
When you convey a covered work, you waive any legal power to forbid
|
|
||||||
circumvention of technological measures to the extent such circumvention
|
|
||||||
is effected by exercising rights under this License with respect to
|
|
||||||
the covered work, and you disclaim any intention to limit operation or
|
|
||||||
modification of the work as a means of enforcing, against the work's
|
|
||||||
users, your or third parties' legal rights to forbid circumvention of
|
|
||||||
technological measures.
|
|
||||||
|
|
||||||
4. Conveying Verbatim Copies.
|
|
||||||
|
|
||||||
You may convey verbatim copies of the Program's source code as you
|
|
||||||
receive it, in any medium, provided that you conspicuously and
|
|
||||||
appropriately publish on each copy an appropriate copyright notice;
|
|
||||||
keep intact all notices stating that this License and any
|
|
||||||
non-permissive terms added in accord with section 7 apply to the code;
|
|
||||||
keep intact all notices of the absence of any warranty; and give all
|
|
||||||
recipients a copy of this License along with the Program.
|
|
||||||
|
|
||||||
You may charge any price or no price for each copy that you convey,
|
|
||||||
and you may offer support or warranty protection for a fee.
|
|
||||||
|
|
||||||
5. Conveying Modified Source Versions.
|
|
||||||
|
|
||||||
You may convey a work based on the Program, or the modifications to
|
|
||||||
produce it from the Program, in the form of source code under the
|
|
||||||
terms of section 4, provided that you also meet all of these conditions:
|
|
||||||
|
|
||||||
a) The work must carry prominent notices stating that you modified
|
|
||||||
it, and giving a relevant date.
|
|
||||||
|
|
||||||
b) The work must carry prominent notices stating that it is
|
|
||||||
released under this License and any conditions added under section
|
|
||||||
7. This requirement modifies the requirement in section 4 to
|
|
||||||
"keep intact all notices".
|
|
||||||
|
|
||||||
c) You must license the entire work, as a whole, under this
|
|
||||||
License to anyone who comes into possession of a copy. This
|
|
||||||
License will therefore apply, along with any applicable section 7
|
|
||||||
additional terms, to the whole of the work, and all its parts,
|
|
||||||
regardless of how they are packaged. This License gives no
|
|
||||||
permission to license the work in any other way, but it does not
|
|
||||||
invalidate such permission if you have separately received it.
|
|
||||||
|
|
||||||
d) If the work has interactive user interfaces, each must display
|
|
||||||
Appropriate Legal Notices; however, if the Program has interactive
|
|
||||||
interfaces that do not display Appropriate Legal Notices, your
|
|
||||||
work need not make them do so.
|
|
||||||
|
|
||||||
A compilation of a covered work with other separate and independent
|
|
||||||
works, which are not by their nature extensions of the covered work,
|
|
||||||
and which are not combined with it such as to form a larger program,
|
|
||||||
in or on a volume of a storage or distribution medium, is called an
|
|
||||||
"aggregate" if the compilation and its resulting copyright are not
|
|
||||||
used to limit the access or legal rights of the compilation's users
|
|
||||||
beyond what the individual works permit. Inclusion of a covered work
|
|
||||||
in an aggregate does not cause this License to apply to the other
|
|
||||||
parts of the aggregate.
|
|
||||||
|
|
||||||
6. Conveying Non-Source Forms.
|
|
||||||
|
|
||||||
You may convey a covered work in object code form under the terms
|
|
||||||
of sections 4 and 5, provided that you also convey the
|
|
||||||
machine-readable Corresponding Source under the terms of this License,
|
|
||||||
in one of these ways:
|
|
||||||
|
|
||||||
a) Convey the object code in, or embodied in, a physical product
|
|
||||||
(including a physical distribution medium), accompanied by the
|
|
||||||
Corresponding Source fixed on a durable physical medium
|
|
||||||
customarily used for software interchange.
|
|
||||||
|
|
||||||
b) Convey the object code in, or embodied in, a physical product
|
|
||||||
(including a physical distribution medium), accompanied by a
|
|
||||||
written offer, valid for at least three years and valid for as
|
|
||||||
long as you offer spare parts or customer support for that product
|
|
||||||
model, to give anyone who possesses the object code either (1) a
|
|
||||||
copy of the Corresponding Source for all the software in the
|
|
||||||
product that is covered by this License, on a durable physical
|
|
||||||
medium customarily used for software interchange, for a price no
|
|
||||||
more than your reasonable cost of physically performing this
|
|
||||||
conveying of source, or (2) access to copy the
|
|
||||||
Corresponding Source from a network server at no charge.
|
|
||||||
|
|
||||||
c) Convey individual copies of the object code with a copy of the
|
|
||||||
written offer to provide the Corresponding Source. This
|
|
||||||
alternative is allowed only occasionally and noncommercially, and
|
|
||||||
only if you received the object code with such an offer, in accord
|
|
||||||
with subsection 6b.
|
|
||||||
|
|
||||||
d) Convey the object code by offering access from a designated
|
|
||||||
place (gratis or for a charge), and offer equivalent access to the
|
|
||||||
Corresponding Source in the same way through the same place at no
|
|
||||||
further charge. You need not require recipients to copy the
|
|
||||||
Corresponding Source along with the object code. If the place to
|
|
||||||
copy the object code is a network server, the Corresponding Source
|
|
||||||
may be on a different server (operated by you or a third party)
|
|
||||||
that supports equivalent copying facilities, provided you maintain
|
|
||||||
clear directions next to the object code saying where to find the
|
|
||||||
Corresponding Source. Regardless of what server hosts the
|
|
||||||
Corresponding Source, you remain obligated to ensure that it is
|
|
||||||
available for as long as needed to satisfy these requirements.
|
|
||||||
|
|
||||||
e) Convey the object code using peer-to-peer transmission, provided
|
|
||||||
you inform other peers where the object code and Corresponding
|
|
||||||
Source of the work are being offered to the general public at no
|
|
||||||
charge under subsection 6d.
|
|
||||||
|
|
||||||
A separable portion of the object code, whose source code is excluded
|
|
||||||
from the Corresponding Source as a System Library, need not be
|
|
||||||
included in conveying the object code work.
|
|
||||||
|
|
||||||
A "User Product" is either (1) a "consumer product", which means any
|
|
||||||
tangible personal property which is normally used for personal, family,
|
|
||||||
or household purposes, or (2) anything designed or sold for incorporation
|
|
||||||
into a dwelling. In determining whether a product is a consumer product,
|
|
||||||
doubtful cases shall be resolved in favor of coverage. For a particular
|
|
||||||
product received by a particular user, "normally used" refers to a
|
|
||||||
typical or common use of that class of product, regardless of the status
|
|
||||||
of the particular user or of the way in which the particular user
|
|
||||||
actually uses, or expects or is expected to use, the product. A product
|
|
||||||
is a consumer product regardless of whether the product has substantial
|
|
||||||
commercial, industrial or non-consumer uses, unless such uses represent
|
|
||||||
the only significant mode of use of the product.
|
|
||||||
|
|
||||||
"Installation Information" for a User Product means any methods,
|
|
||||||
procedures, authorization keys, or other information required to install
|
|
||||||
and execute modified versions of a covered work in that User Product from
|
|
||||||
a modified version of its Corresponding Source. The information must
|
|
||||||
suffice to ensure that the continued functioning of the modified object
|
|
||||||
code is in no case prevented or interfered with solely because
|
|
||||||
modification has been made.
|
|
||||||
|
|
||||||
If you convey an object code work under this section in, or with, or
|
|
||||||
specifically for use in, a User Product, and the conveying occurs as
|
|
||||||
part of a transaction in which the right of possession and use of the
|
|
||||||
User Product is transferred to the recipient in perpetuity or for a
|
|
||||||
fixed term (regardless of how the transaction is characterized), the
|
|
||||||
Corresponding Source conveyed under this section must be accompanied
|
|
||||||
by the Installation Information. But this requirement does not apply
|
|
||||||
if neither you nor any third party retains the ability to install
|
|
||||||
modified object code on the User Product (for example, the work has
|
|
||||||
been installed in ROM).
|
|
||||||
|
|
||||||
The requirement to provide Installation Information does not include a
|
|
||||||
requirement to continue to provide support service, warranty, or updates
|
|
||||||
for a work that has been modified or installed by the recipient, or for
|
|
||||||
the User Product in which it has been modified or installed. Access to a
|
|
||||||
network may be denied when the modification itself materially and
|
|
||||||
adversely affects the operation of the network or violates the rules and
|
|
||||||
protocols for communication across the network.
|
|
||||||
|
|
||||||
Corresponding Source conveyed, and Installation Information provided,
|
|
||||||
in accord with this section must be in a format that is publicly
|
|
||||||
documented (and with an implementation available to the public in
|
|
||||||
source code form), and must require no special password or key for
|
|
||||||
unpacking, reading or copying.
|
|
||||||
|
|
||||||
7. Additional Terms.
|
|
||||||
|
|
||||||
"Additional permissions" are terms that supplement the terms of this
|
|
||||||
License by making exceptions from one or more of its conditions.
|
|
||||||
Additional permissions that are applicable to the entire Program shall
|
|
||||||
be treated as though they were included in this License, to the extent
|
|
||||||
that they are valid under applicable law. If additional permissions
|
|
||||||
apply only to part of the Program, that part may be used separately
|
|
||||||
under those permissions, but the entire Program remains governed by
|
|
||||||
this License without regard to the additional permissions.
|
|
||||||
|
|
||||||
When you convey a copy of a covered work, you may at your option
|
|
||||||
remove any additional permissions from that copy, or from any part of
|
|
||||||
it. (Additional permissions may be written to require their own
|
|
||||||
removal in certain cases when you modify the work.) You may place
|
|
||||||
additional permissions on material, added by you to a covered work,
|
|
||||||
for which you have or can give appropriate copyright permission.
|
|
||||||
|
|
||||||
Notwithstanding any other provision of this License, for material you
|
|
||||||
add to a covered work, you may (if authorized by the copyright holders of
|
|
||||||
that material) supplement the terms of this License with terms:
|
|
||||||
|
|
||||||
a) Disclaiming warranty or limiting liability differently from the
|
|
||||||
terms of sections 15 and 16 of this License; or
|
|
||||||
|
|
||||||
b) Requiring preservation of specified reasonable legal notices or
|
|
||||||
author attributions in that material or in the Appropriate Legal
|
|
||||||
Notices displayed by works containing it; or
|
|
||||||
|
|
||||||
c) Prohibiting misrepresentation of the origin of that material, or
|
|
||||||
requiring that modified versions of such material be marked in
|
|
||||||
reasonable ways as different from the original version; or
|
|
||||||
|
|
||||||
d) Limiting the use for publicity purposes of names of licensors or
|
|
||||||
authors of the material; or
|
|
||||||
|
|
||||||
e) Declining to grant rights under trademark law for use of some
|
|
||||||
trade names, trademarks, or service marks; or
|
|
||||||
|
|
||||||
f) Requiring indemnification of licensors and authors of that
|
|
||||||
material by anyone who conveys the material (or modified versions of
|
|
||||||
it) with contractual assumptions of liability to the recipient, for
|
|
||||||
any liability that these contractual assumptions directly impose on
|
|
||||||
those licensors and authors.
|
|
||||||
|
|
||||||
All other non-permissive additional terms are considered "further
|
|
||||||
restrictions" within the meaning of section 10. If the Program as you
|
|
||||||
received it, or any part of it, contains a notice stating that it is
|
|
||||||
governed by this License along with a term that is a further
|
|
||||||
restriction, you may remove that term. If a license document contains
|
|
||||||
a further restriction but permits relicensing or conveying under this
|
|
||||||
License, you may add to a covered work material governed by the terms
|
|
||||||
of that license document, provided that the further restriction does
|
|
||||||
not survive such relicensing or conveying.
|
|
||||||
|
|
||||||
If you add terms to a covered work in accord with this section, you
|
|
||||||
must place, in the relevant source files, a statement of the
|
|
||||||
additional terms that apply to those files, or a notice indicating
|
|
||||||
where to find the applicable terms.
|
|
||||||
|
|
||||||
Additional terms, permissive or non-permissive, may be stated in the
|
|
||||||
form of a separately written license, or stated as exceptions;
|
|
||||||
the above requirements apply either way.
|
|
||||||
|
|
||||||
8. Termination.
|
|
||||||
|
|
||||||
You may not propagate or modify a covered work except as expressly
|
|
||||||
provided under this License. Any attempt otherwise to propagate or
|
|
||||||
modify it is void, and will automatically terminate your rights under
|
|
||||||
this License (including any patent licenses granted under the third
|
|
||||||
paragraph of section 11).
|
|
||||||
|
|
||||||
However, if you cease all violation of this License, then your
|
|
||||||
license from a particular copyright holder is reinstated (a)
|
|
||||||
provisionally, unless and until the copyright holder explicitly and
|
|
||||||
finally terminates your license, and (b) permanently, if the copyright
|
|
||||||
holder fails to notify you of the violation by some reasonable means
|
|
||||||
prior to 60 days after the cessation.
|
|
||||||
|
|
||||||
Moreover, your license from a particular copyright holder is
|
|
||||||
reinstated permanently if the copyright holder notifies you of the
|
|
||||||
violation by some reasonable means, this is the first time you have
|
|
||||||
received notice of violation of this License (for any work) from that
|
|
||||||
copyright holder, and you cure the violation prior to 30 days after
|
|
||||||
your receipt of the notice.
|
|
||||||
|
|
||||||
Termination of your rights under this section does not terminate the
|
|
||||||
licenses of parties who have received copies or rights from you under
|
|
||||||
this License. If your rights have been terminated and not permanently
|
|
||||||
reinstated, you do not qualify to receive new licenses for the same
|
|
||||||
material under section 10.
|
|
||||||
|
|
||||||
9. Acceptance Not Required for Having Copies.
|
|
||||||
|
|
||||||
You are not required to accept this License in order to receive or
|
|
||||||
run a copy of the Program. Ancillary propagation of a covered work
|
|
||||||
occurring solely as a consequence of using peer-to-peer transmission
|
|
||||||
to receive a copy likewise does not require acceptance. However,
|
|
||||||
nothing other than this License grants you permission to propagate or
|
|
||||||
modify any covered work. These actions infringe copyright if you do
|
|
||||||
not accept this License. Therefore, by modifying or propagating a
|
|
||||||
covered work, you indicate your acceptance of this License to do so.
|
|
||||||
|
|
||||||
10. Automatic Licensing of Downstream Recipients.
|
|
||||||
|
|
||||||
Each time you convey a covered work, the recipient automatically
|
|
||||||
receives a license from the original licensors, to run, modify and
|
|
||||||
propagate that work, subject to this License. You are not responsible
|
|
||||||
for enforcing compliance by third parties with this License.
|
|
||||||
|
|
||||||
An "entity transaction" is a transaction transferring control of an
|
|
||||||
organization, or substantially all assets of one, or subdividing an
|
|
||||||
organization, or merging organizations. If propagation of a covered
|
|
||||||
work results from an entity transaction, each party to that
|
|
||||||
transaction who receives a copy of the work also receives whatever
|
|
||||||
licenses to the work the party's predecessor in interest had or could
|
|
||||||
give under the previous paragraph, plus a right to possession of the
|
|
||||||
Corresponding Source of the work from the predecessor in interest, if
|
|
||||||
the predecessor has it or can get it with reasonable efforts.
|
|
||||||
|
|
||||||
You may not impose any further restrictions on the exercise of the
|
|
||||||
rights granted or affirmed under this License. For example, you may
|
|
||||||
not impose a license fee, royalty, or other charge for exercise of
|
|
||||||
rights granted under this License, and you may not initiate litigation
|
|
||||||
(including a cross-claim or counterclaim in a lawsuit) alleging that
|
|
||||||
any patent claim is infringed by making, using, selling, offering for
|
|
||||||
sale, or importing the Program or any portion of it.
|
|
||||||
|
|
||||||
11. Patents.
|
|
||||||
|
|
||||||
A "contributor" is a copyright holder who authorizes use under this
|
|
||||||
License of the Program or a work on which the Program is based. The
|
|
||||||
work thus licensed is called the contributor's "contributor version".
|
|
||||||
|
|
||||||
A contributor's "essential patent claims" are all patent claims
|
|
||||||
owned or controlled by the contributor, whether already acquired or
|
|
||||||
hereafter acquired, that would be infringed by some manner, permitted
|
|
||||||
by this License, of making, using, or selling its contributor version,
|
|
||||||
but do not include claims that would be infringed only as a
|
|
||||||
consequence of further modification of the contributor version. For
|
|
||||||
purposes of this definition, "control" includes the right to grant
|
|
||||||
patent sublicenses in a manner consistent with the requirements of
|
|
||||||
this License.
|
|
||||||
|
|
||||||
Each contributor grants you a non-exclusive, worldwide, royalty-free
|
|
||||||
patent license under the contributor's essential patent claims, to
|
|
||||||
make, use, sell, offer for sale, import and otherwise run, modify and
|
|
||||||
propagate the contents of its contributor version.
|
|
||||||
|
|
||||||
In the following three paragraphs, a "patent license" is any express
|
|
||||||
agreement or commitment, however denominated, not to enforce a patent
|
|
||||||
(such as an express permission to practice a patent or covenant not to
|
|
||||||
sue for patent infringement). To "grant" such a patent license to a
|
|
||||||
party means to make such an agreement or commitment not to enforce a
|
|
||||||
patent against the party.
|
|
||||||
|
|
||||||
If you convey a covered work, knowingly relying on a patent license,
|
|
||||||
and the Corresponding Source of the work is not available for anyone
|
|
||||||
to copy, free of charge and under the terms of this License, through a
|
|
||||||
publicly available network server or other readily accessible means,
|
|
||||||
then you must either (1) cause the Corresponding Source to be so
|
|
||||||
available, or (2) arrange to deprive yourself of the benefit of the
|
|
||||||
patent license for this particular work, or (3) arrange, in a manner
|
|
||||||
consistent with the requirements of this License, to extend the patent
|
|
||||||
license to downstream recipients. "Knowingly relying" means you have
|
|
||||||
actual knowledge that, but for the patent license, your conveying the
|
|
||||||
covered work in a country, or your recipient's use of the covered work
|
|
||||||
in a country, would infringe one or more identifiable patents in that
|
|
||||||
country that you have reason to believe are valid.
|
|
||||||
|
|
||||||
If, pursuant to or in connection with a single transaction or
|
|
||||||
arrangement, you convey, or propagate by procuring conveyance of, a
|
|
||||||
covered work, and grant a patent license to some of the parties
|
|
||||||
receiving the covered work authorizing them to use, propagate, modify
|
|
||||||
or convey a specific copy of the covered work, then the patent license
|
|
||||||
you grant is automatically extended to all recipients of the covered
|
|
||||||
work and works based on it.
|
|
||||||
|
|
||||||
A patent license is "discriminatory" if it does not include within
|
|
||||||
the scope of its coverage, prohibits the exercise of, or is
|
|
||||||
conditioned on the non-exercise of one or more of the rights that are
|
|
||||||
specifically granted under this License. You may not convey a covered
|
|
||||||
work if you are a party to an arrangement with a third party that is
|
|
||||||
in the business of distributing software, under which you make payment
|
|
||||||
to the third party based on the extent of your activity of conveying
|
|
||||||
the work, and under which the third party grants, to any of the
|
|
||||||
parties who would receive the covered work from you, a discriminatory
|
|
||||||
patent license (a) in connection with copies of the covered work
|
|
||||||
conveyed by you (or copies made from those copies), or (b) primarily
|
|
||||||
for and in connection with specific products or compilations that
|
|
||||||
contain the covered work, unless you entered into that arrangement,
|
|
||||||
or that patent license was granted, prior to 28 March 2007.
|
|
||||||
|
|
||||||
Nothing in this License shall be construed as excluding or limiting
|
|
||||||
any implied license or other defenses to infringement that may
|
|
||||||
otherwise be available to you under applicable patent law.
|
|
||||||
|
|
||||||
12. No Surrender of Others' Freedom.
|
|
||||||
|
|
||||||
If conditions are imposed on you (whether by court order, agreement or
|
|
||||||
otherwise) that contradict the conditions of this License, they do not
|
|
||||||
excuse you from the conditions of this License. If you cannot convey a
|
|
||||||
covered work so as to satisfy simultaneously your obligations under this
|
|
||||||
License and any other pertinent obligations, then as a consequence you may
|
|
||||||
not convey it at all. For example, if you agree to terms that obligate you
|
|
||||||
to collect a royalty for further conveying from those to whom you convey
|
|
||||||
the Program, the only way you could satisfy both those terms and this
|
|
||||||
License would be to refrain entirely from conveying the Program.
|
|
||||||
|
|
||||||
13. Use with the GNU Affero General Public License.
|
|
||||||
|
|
||||||
Notwithstanding any other provision of this License, you have
|
|
||||||
permission to link or combine any covered work with a work licensed
|
|
||||||
under version 3 of the GNU Affero General Public License into a single
|
|
||||||
combined work, and to convey the resulting work. The terms of this
|
|
||||||
License will continue to apply to the part which is the covered work,
|
|
||||||
but the special requirements of the GNU Affero General Public License,
|
|
||||||
section 13, concerning interaction through a network will apply to the
|
|
||||||
combination as such.
|
|
||||||
|
|
||||||
14. Revised Versions of this License.
|
|
||||||
|
|
||||||
The Free Software Foundation may publish revised and/or new versions of
|
|
||||||
the GNU General Public License from time to time. Such new versions will
|
|
||||||
be similar in spirit to the present version, but may differ in detail to
|
|
||||||
address new problems or concerns.
|
|
||||||
|
|
||||||
Each version is given a distinguishing version number. If the
|
|
||||||
Program specifies that a certain numbered version of the GNU General
|
|
||||||
Public License "or any later version" applies to it, you have the
|
|
||||||
option of following the terms and conditions either of that numbered
|
|
||||||
version or of any later version published by the Free Software
|
|
||||||
Foundation. If the Program does not specify a version number of the
|
|
||||||
GNU General Public License, you may choose any version ever published
|
|
||||||
by the Free Software Foundation.
|
|
||||||
|
|
||||||
If the Program specifies that a proxy can decide which future
|
|
||||||
versions of the GNU General Public License can be used, that proxy's
|
|
||||||
public statement of acceptance of a version permanently authorizes you
|
|
||||||
to choose that version for the Program.
|
|
||||||
|
|
||||||
Later license versions may give you additional or different
|
|
||||||
permissions. However, no additional obligations are imposed on any
|
|
||||||
author or copyright holder as a result of your choosing to follow a
|
|
||||||
later version.
|
|
||||||
|
|
||||||
15. Disclaimer of Warranty.
|
|
||||||
|
|
||||||
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
|
|
||||||
APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
|
|
||||||
HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY
|
|
||||||
OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
|
|
||||||
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
|
||||||
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM
|
|
||||||
IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
|
|
||||||
ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
|
|
||||||
|
|
||||||
16. Limitation of Liability.
|
|
||||||
|
|
||||||
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
|
|
||||||
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS
|
|
||||||
THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
|
|
||||||
GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
|
|
||||||
USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
|
|
||||||
DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
|
|
||||||
PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
|
|
||||||
EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
|
|
||||||
SUCH DAMAGES.
|
|
||||||
|
|
||||||
17. Interpretation of Sections 15 and 16.
|
|
||||||
|
|
||||||
If the disclaimer of warranty and limitation of liability provided
|
|
||||||
above cannot be given local legal effect according to their terms,
|
|
||||||
reviewing courts shall apply local law that most closely approximates
|
|
||||||
an absolute waiver of all civil liability in connection with the
|
|
||||||
Program, unless a warranty or assumption of liability accompanies a
|
|
||||||
copy of the Program in return for a fee.
|
|
||||||
|
|
||||||
END OF TERMS AND CONDITIONS
|
|
||||||
|
|
||||||
How to Apply These Terms to Your New Programs
|
|
||||||
|
|
||||||
If you develop a new program, and you want it to be of the greatest
|
|
||||||
possible use to the public, the best way to achieve this is to make it
|
|
||||||
free software which everyone can redistribute and change under these terms.
|
|
||||||
|
|
||||||
To do so, attach the following notices to the program. It is safest
|
|
||||||
to attach them to the start of each source file to most effectively
|
|
||||||
state the exclusion of warranty; and each file should have at least
|
|
||||||
the "copyright" line and a pointer to where the full notice is found.
|
|
||||||
|
|
||||||
{one line to give the program's name and a brief idea of what it does.}
|
|
||||||
Copyright (C) {year} {name of author}
|
|
||||||
|
|
||||||
This program is free software: you can redistribute it and/or modify
|
|
||||||
it under the terms of the GNU General Public License as published by
|
|
||||||
the Free Software Foundation, either version 3 of the License, or
|
|
||||||
(at your option) any later version.
|
|
||||||
|
|
||||||
This program is distributed in the hope that it will be useful,
|
|
||||||
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
||||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
||||||
GNU General Public License for more details.
|
|
||||||
|
|
||||||
You should have received a copy of the GNU General Public License
|
|
||||||
along with this program. If not, see [http://www.gnu.org/licenses/].
|
|
||||||
|
|
||||||
Also add information on how to contact you by electronic and paper mail.
|
|
||||||
|
|
||||||
If the program does terminal interaction, make it output a short
|
|
||||||
notice like this when it starts in an interactive mode:
|
|
||||||
|
|
||||||
{project} Copyright (C) {year} {fullname}
|
|
||||||
This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
|
|
||||||
This is free software, and you are welcome to redistribute it
|
|
||||||
under certain conditions; type `show c' for details.
|
|
||||||
|
|
||||||
The hypothetical commands `show w' and `show c' should show the appropriate
|
|
||||||
parts of the General Public License. Of course, your program's commands
|
|
||||||
might be different; for a GUI interface, you would use an "about box".
|
|
||||||
|
|
||||||
You should also get your employer (if you work as a programmer) or school,
|
|
||||||
if any, to sign a "copyright disclaimer" for the program, if necessary.
|
|
||||||
For more information on this, and how to apply and follow the GNU GPL, see
|
|
||||||
[http://www.gnu.org/licenses/].
|
|
||||||
|
|
||||||
The GNU General Public License does not permit incorporating your program
|
|
||||||
into proprietary programs. If your program is a subroutine library, you
|
|
||||||
may consider it more useful to permit linking proprietary applications with
|
|
||||||
the library. If this is what you want to do, use the GNU Lesser General
|
|
||||||
Public License instead of this License. But first, please read
|
|
||||||
[http://www.gnu.org/philosophy/why-not-lgpl.html].
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
85
README.md
85
README.md
@ -1,3 +1,6 @@
|
|||||||
|
[](https://pypi.python.org/pypi/cheat/)
|
||||||
|
[](https://pypi.python.org/pypi/cheat/)
|
||||||
|
|
||||||
cheat
|
cheat
|
||||||
=====
|
=====
|
||||||
`cheat` allows you to create and view interactive cheatsheets on the
|
`cheat` allows you to create and view interactive cheatsheets on the
|
||||||
@ -7,51 +10,51 @@ remember.
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
`cheat` depends only on `python` and `pip`.
|
|
||||||
|
|
||||||
|
|
||||||
Example
|
Example
|
||||||
-------
|
-------
|
||||||
The next time you're forced to disarm a nuclear weapon without consulting
|
The next time you're forced to disarm a nuclear weapon without consulting
|
||||||
Google, you may run:
|
Google, you may run:
|
||||||
|
|
||||||
cheat tar
|
```sh
|
||||||
|
cheat tar
|
||||||
|
```
|
||||||
|
|
||||||
You will be presented with a cheatsheet resembling:
|
You will be presented with a cheatsheet resembling:
|
||||||
|
|
||||||
```
|
```sh
|
||||||
# To extract an uncompressed archive:
|
# To extract an uncompressed archive:
|
||||||
tar -xvf /path/to/foo.tar
|
tar -xvf '/path/to/foo.tar'
|
||||||
|
|
||||||
# To extract a .gz archive:
|
# To extract a .gz archive:
|
||||||
tar -xzvf /path/to/foo.tgz
|
tar -xzvf '/path/to/foo.tgz'
|
||||||
|
|
||||||
# To create a .gz archive:
|
# To create a .gz archive:
|
||||||
tar -czvf /path/to/foo.tgz /path/to/foo/
|
tar -czvf '/path/to/foo.tgz' '/path/to/foo/'
|
||||||
|
|
||||||
# To extract a .bz2 archive:
|
# To extract a .bz2 archive:
|
||||||
tar -xjvf /path/to/foo.tgz
|
tar -xjvf '/path/to/foo.tgz'
|
||||||
|
|
||||||
# To create a .bz2 archive:
|
# To create a .bz2 archive:
|
||||||
tar -cjvf /path/to/foo.tgz /path/to/foo/
|
tar -cjvf '/path/to/foo.tgz' '/path/to/foo/'
|
||||||
```
|
```
|
||||||
|
|
||||||
To see what cheatsheets are availble, run `cheat -l`.
|
To see what cheatsheets are available, run `cheat -l`.
|
||||||
|
|
||||||
Note that, while `cheat` was designed primarily for *nix system administrators,
|
Note that, while `cheat` was designed primarily for \*nix system administrators,
|
||||||
it is agnostic as to what content it stores. If you would like to use `cheat`
|
it is agnostic as to what content it stores. If you would like to use `cheat`
|
||||||
to store notes on your favorite cookie recipes, feel free.
|
to store notes on your favorite cookie recipes, feel free.
|
||||||
|
|
||||||
|
|
||||||
Installing
|
Installing
|
||||||
----------
|
----------
|
||||||
First install the required python dependencies with:
|
It is recommended to install `cheat` with `pip`:
|
||||||
|
|
||||||
sudo pip install docopt pygments
|
```sh
|
||||||
|
[sudo] pip install cheat
|
||||||
|
```
|
||||||
|
|
||||||
Then, clone this repository, `cd` into it, and run:
|
[Other installation methods are available][installing].
|
||||||
|
|
||||||
sudo python setup.py install
|
|
||||||
|
|
||||||
|
|
||||||
Modifying Cheatsheets
|
Modifying Cheatsheets
|
||||||
@ -67,7 +70,9 @@ in the `~/.cheat/tar` file.
|
|||||||
Provided that you have an `EDITOR` environment variable set, you may edit
|
Provided that you have an `EDITOR` environment variable set, you may edit
|
||||||
cheatsheets with:
|
cheatsheets with:
|
||||||
|
|
||||||
cheat -e foo
|
```sh
|
||||||
|
cheat -e foo
|
||||||
|
```
|
||||||
|
|
||||||
If the 'foo' cheatsheet already exists, it will be opened for editing.
|
If the 'foo' cheatsheet already exists, it will be opened for editing.
|
||||||
Otherwise, it will be created automatically.
|
Otherwise, it will be created automatically.
|
||||||
@ -84,17 +89,23 @@ Personal cheatsheets are saved in the `~/.cheat` directory by default, but you
|
|||||||
can specify a different default by exporting a `DEFAULT_CHEAT_DIR` environment
|
can specify a different default by exporting a `DEFAULT_CHEAT_DIR` environment
|
||||||
variable:
|
variable:
|
||||||
|
|
||||||
export DEFAULT_CHEAT_DIR=/path/to/my/cheats
|
```sh
|
||||||
|
export DEFAULT_CHEAT_DIR='/path/to/my/cheats'
|
||||||
|
```
|
||||||
|
|
||||||
### Setting a CHEATPATH ###
|
### Setting a CHEATPATH ###
|
||||||
You can additionally instruct `cheat` to look for cheatsheets in other
|
You can additionally instruct `cheat` to look for cheatsheets in other
|
||||||
directories by exporting a `CHEATPATH` environment variable:
|
directories by exporting a `CHEATPATH` environment variable:
|
||||||
|
|
||||||
export CHEATPATH=/path/to/my/cheats
|
```sh
|
||||||
|
export CHEATPATH='/path/to/my/cheats'
|
||||||
|
```
|
||||||
|
|
||||||
You may, of course, append multiple directories to your `CHEATPATH`:
|
You may, of course, append multiple directories to your `CHEATPATH`:
|
||||||
|
|
||||||
export CHEATPATH=$CHEATPATH:/path/to/more/cheats
|
```sh
|
||||||
|
export CHEATPATH="$CHEATPATH:/path/to/more/cheats"
|
||||||
|
```
|
||||||
|
|
||||||
You may view which directories are on your `CHEATPATH` with `cheat -d`.
|
You may view which directories are on your `CHEATPATH` with `cheat -d`.
|
||||||
|
|
||||||
@ -102,27 +113,17 @@ You may view which directories are on your `CHEATPATH` with `cheat -d`.
|
|||||||
`cheat` can apply syntax highlighting to your cheatsheets if so desired. To
|
`cheat` can apply syntax highlighting to your cheatsheets if so desired. To
|
||||||
enable this feature, set a `CHEATCOLORS` environment variable:
|
enable this feature, set a `CHEATCOLORS` environment variable:
|
||||||
|
|
||||||
export CHEATCOLORS=true
|
```sh
|
||||||
|
export CHEATCOLORS=true
|
||||||
|
```
|
||||||
|
|
||||||
|
See Also:
|
||||||
|
---------
|
||||||
|
- [Enabling Command-line Autocompletion][autocompletion]
|
||||||
|
- [Related Projects][related-projects]
|
||||||
|
|
||||||
|
|
||||||
Related Projects
|
[autocompletion]: https://github.com/chrisallenlane/cheat/wiki/Enabling-Command-line-Autocompletion
|
||||||
----------------
|
[dotfiles]: http://dotfiles.github.io/
|
||||||
|
[installing]: https://github.com/chrisallenlane/cheat/wiki/Installing
|
||||||
- [lucaswerkmeister/cheats][1]: An implementation of this concept in pure bash
|
[related-projects]: https://github.com/chrisallenlane/cheat/wiki/Related-Projects
|
||||||
that also allows not only for numerical indexing of subcomands but also
|
|
||||||
supports running commands interactively.
|
|
||||||
|
|
||||||
- [jahendrie/cheat][2]: A bash-only implementation that additionally allows for
|
|
||||||
cheatsheets to be created and `grep` searched from the command-line.
|
|
||||||
([jahendrie][] contributed key ideas to this project as well.)
|
|
||||||
|
|
||||||
- [`cheat` RubyGem][3]: A clever gem from 2006 that clearly had similar
|
|
||||||
motivations. It is unclear whether or not it is currently maintained.
|
|
||||||
|
|
||||||
|
|
||||||
[dotfiles]: http://dotfiles.github.io/
|
|
||||||
[jahendrie]: https://github.com/jahendrie
|
|
||||||
[1]: https://github.com/lucaswerkmeister/cheats
|
|
||||||
[2]: https://github.com/jahendrie/cheat
|
|
||||||
[3]: http://errtheblog.com/posts/21-cheat
|
|
||||||
[4]: https://github.com/chrisallenlane/cheat/pull/77
|
|
||||||
|
@ -38,7 +38,7 @@ from docopt import docopt
|
|||||||
|
|
||||||
if __name__ == '__main__':
|
if __name__ == '__main__':
|
||||||
# parse the command-line options
|
# parse the command-line options
|
||||||
options = docopt(__doc__, version='cheat 2.0.2')
|
options = docopt(__doc__, version='cheat 2.1.23')
|
||||||
|
|
||||||
# list directories
|
# list directories
|
||||||
if options['--directories']:
|
if options['--directories']:
|
||||||
|
@ -1,3 +1,3 @@
|
|||||||
import sheet
|
from . import sheet
|
||||||
import sheets
|
from . import sheets
|
||||||
import utils
|
from . import utils
|
||||||
|
23
cheat/cheatsheets/apt
Normal file
23
cheat/cheatsheets/apt
Normal file
@ -0,0 +1,23 @@
|
|||||||
|
# To search a package:
|
||||||
|
apt search package
|
||||||
|
|
||||||
|
# To show package informations:
|
||||||
|
apt show package
|
||||||
|
|
||||||
|
# To fetch package list:
|
||||||
|
apt update
|
||||||
|
|
||||||
|
# To download and install updates without installing new package:
|
||||||
|
apt upgrade
|
||||||
|
|
||||||
|
# To download and install the updates AND install new necessary packages:
|
||||||
|
apt dist-upgrade
|
||||||
|
|
||||||
|
# Full command:
|
||||||
|
apt update && apt dist-upgrade
|
||||||
|
|
||||||
|
# To install a new package(s):
|
||||||
|
apt install package(s)
|
||||||
|
|
||||||
|
# To uninstall package(s)
|
||||||
|
apt remove package(s)
|
@ -4,7 +4,7 @@
|
|||||||
apt-get update
|
apt-get update
|
||||||
|
|
||||||
# To download and install updates without installing new package.
|
# To download and install updates without installing new package.
|
||||||
apt-get update
|
apt-get upgrade
|
||||||
|
|
||||||
# To download and install the updates AND install new necessary packages
|
# To download and install the updates AND install new necessary packages
|
||||||
apt-get dist-upgrade
|
apt-get dist-upgrade
|
||||||
@ -23,3 +23,6 @@ apt-get -o Dir::Cache="/path/to/destination/dir/" -o Dir::Cache::archives="./" i
|
|||||||
|
|
||||||
# Show apt-get installed packages.
|
# Show apt-get installed packages.
|
||||||
grep 'install ' /var/log/dpkg.log
|
grep 'install ' /var/log/dpkg.log
|
||||||
|
|
||||||
|
# Silently keep old configuration during batch updates
|
||||||
|
apt-get update -o DPkg::Options::='--force-confold' ...
|
||||||
|
@ -1,2 +1,11 @@
|
|||||||
# sum integers from a file or stdin, one integer per line:
|
# sum integers from a file or stdin, one integer per line:
|
||||||
printf '1\n2\n3\n' | awk '{ sum += $1} END {print sum}'
|
printf '1\n2\n3\n' | awk '{ sum += $1} END {print sum}'
|
||||||
|
|
||||||
|
# using specific character as separator to sum integers from a file or stdin
|
||||||
|
printf '1:2:3' | awk -F ":" '{print $1+$2+$3}'
|
||||||
|
|
||||||
|
# print a multiplication table
|
||||||
|
seq 9 | sed 'H;g' | awk -v RS='' '{for(i=1;i<=NF;i++)printf("%dx%d=%d%s", i, NR, i*NR, i==NR?"\n":"\t")}'
|
||||||
|
|
||||||
|
# Specify output separator character
|
||||||
|
printf '1 2 3' | awk 'BEGIN {OFS=":"}; {print $1,$2,$3}'
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
# To implement a for loop:
|
# To implement a for loop:
|
||||||
for file in `ls .`;
|
for file in *;
|
||||||
do
|
do
|
||||||
echo $file found;
|
echo $file found;
|
||||||
done
|
done
|
||||||
@ -12,3 +12,16 @@ in
|
|||||||
2) echo "two found";;
|
2) echo "two found";;
|
||||||
3*) echo "something beginning with 3 found";;
|
3*) echo "something beginning with 3 found";;
|
||||||
esac
|
esac
|
||||||
|
|
||||||
|
# Turn on debugging:
|
||||||
|
set -x
|
||||||
|
|
||||||
|
# Turn off debugging:
|
||||||
|
set +x
|
||||||
|
|
||||||
|
# Retrieve N-th piped command exit status
|
||||||
|
printf 'foo' | fgrep 'foo' | sed 's/foo/bar/'
|
||||||
|
echo ${PIPESTATUS[0]} # replace 0 with N
|
||||||
|
|
||||||
|
# Lock file:
|
||||||
|
( set -o noclobber; echo > my.lock ) || echo 'Failed to create lock file'
|
||||||
|
26
cheat/cheatsheets/bower
Normal file
26
cheat/cheatsheets/bower
Normal file
@ -0,0 +1,26 @@
|
|||||||
|
# Install a package locally
|
||||||
|
bower install <package-name>
|
||||||
|
|
||||||
|
# Install a package locally directly from github
|
||||||
|
bower install <user>/<repo>
|
||||||
|
|
||||||
|
# Install a specific package locally
|
||||||
|
bower install <package-name>#<version>
|
||||||
|
|
||||||
|
# Install a package locally and save installed package into bower.json
|
||||||
|
bower install <package-name> --save
|
||||||
|
|
||||||
|
# Retrieve info of a particular package
|
||||||
|
bower info <package-name>
|
||||||
|
|
||||||
|
# List local packages
|
||||||
|
bower list
|
||||||
|
|
||||||
|
# Search for a package by name
|
||||||
|
bower search <package-name>
|
||||||
|
|
||||||
|
# Update a package to their newest version
|
||||||
|
bower update <package-name>
|
||||||
|
|
||||||
|
# Remove a local package
|
||||||
|
bower uninstall <package-name>
|
5
cheat/cheatsheets/csplit
Normal file
5
cheat/cheatsheets/csplit
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
# Split a file based on pattern
|
||||||
|
csplit input.file '/PATTERN/'
|
||||||
|
|
||||||
|
# Use prefix/suffix to improve resulting file names
|
||||||
|
csplit -f 'prefix-' -b '%d.extension' input.file '/PATTERN/' '{*}'
|
22
cheat/cheatsheets/cups
Normal file
22
cheat/cheatsheets/cups
Normal file
@ -0,0 +1,22 @@
|
|||||||
|
# Manage printers through CUPS:
|
||||||
|
http://localhost:631 (in web browser)
|
||||||
|
|
||||||
|
# Print file from command line
|
||||||
|
lp myfile.txt
|
||||||
|
|
||||||
|
# Display print queue
|
||||||
|
lpq
|
||||||
|
|
||||||
|
# Remove print job from queue
|
||||||
|
lprm 545
|
||||||
|
or
|
||||||
|
lprm -
|
||||||
|
|
||||||
|
# Print log location
|
||||||
|
/var/log/cups
|
||||||
|
|
||||||
|
# Reject new jobs
|
||||||
|
cupsreject printername
|
||||||
|
|
||||||
|
# Accept new jobs
|
||||||
|
cupsaccept printername
|
@ -1,2 +1,5 @@
|
|||||||
# Printout date in format suitable for affixing to file names
|
# Print date in format suitable for affixing to file names
|
||||||
date +"%Y%m%d_%H%M%S"
|
date +"%Y%m%d_%H%M%S"
|
||||||
|
|
||||||
|
# Convert Unix timestamp to Date
|
||||||
|
date -d @1440359821
|
||||||
|
@ -12,6 +12,8 @@ dd if=/dev/zero of=/dev/null bs=4KB &; export dd_pid=`pgrep '^dd'`; while [[ -d
|
|||||||
# Watch the progress of 'dd' with `pv` and `zenity` (apt-get install pv zenity)
|
# Watch the progress of 'dd' with `pv` and `zenity` (apt-get install pv zenity)
|
||||||
(pv -n /dev/zero | dd of=/dev/null bs=128M conv=notrunc,noerror) 2>&1 | zenity --title 'Running dd command (cloning), please wait...' --progress
|
(pv -n /dev/zero | dd of=/dev/null bs=128M conv=notrunc,noerror) 2>&1 | zenity --title 'Running dd command (cloning), please wait...' --progress
|
||||||
|
|
||||||
|
# Watch the progress of 'dd' with the built-in `progress` functionality (introduced in coreutils v8.24)
|
||||||
|
dd if=/dev/zero of=/dev/null bs=128M status=progress
|
||||||
|
|
||||||
# DD with "graphical" return
|
# DD with "graphical" return
|
||||||
dcfldd if=/dev/zero of=/dev/null bs=500K
|
dcfldd if=/dev/zero of=/dev/null bs=500K
|
||||||
|
|
||||||
|
16
cheat/cheatsheets/dnf
Normal file
16
cheat/cheatsheets/dnf
Normal file
@ -0,0 +1,16 @@
|
|||||||
|
# To install the latest version of a package:
|
||||||
|
dnf install <package name>
|
||||||
|
|
||||||
|
# To search package details for the given string
|
||||||
|
dnf search <string>
|
||||||
|
|
||||||
|
# To find which package provides a binary
|
||||||
|
dnf provides <path to binary>
|
||||||
|
|
||||||
|
# The following are available after installing "dnf-plugins-core"
|
||||||
|
|
||||||
|
# Download a package
|
||||||
|
dnf download <package name>
|
||||||
|
|
||||||
|
# install the build dependencies for a SRPM or from a .spec file
|
||||||
|
dnf builddep <srpm/.spec file>
|
32
cheat/cheatsheets/docker
Normal file
32
cheat/cheatsheets/docker
Normal file
@ -0,0 +1,32 @@
|
|||||||
|
# Start docker daemon
|
||||||
|
docker -d
|
||||||
|
|
||||||
|
# start a container with an interactive shell
|
||||||
|
docker run -ti <image_name> /bin/bash
|
||||||
|
|
||||||
|
# "shell" into a running container (docker-1.3+)
|
||||||
|
docker exec -ti <container_name> bash
|
||||||
|
|
||||||
|
# inspect a running container
|
||||||
|
docker inspect <container_name> (or <container_id>)
|
||||||
|
|
||||||
|
# Get the process ID for a container
|
||||||
|
# Source: https://github.com/jpetazzo/nsenter
|
||||||
|
docker inspect --format {{.State.Pid}} <container_name_or_ID>
|
||||||
|
|
||||||
|
# List the current mounted volumes for a container (and pretty print)
|
||||||
|
# Source:
|
||||||
|
# http://nathanleclaire.com/blog/2014/07/12/10-docker-tips-and-tricks-that-will-make-you-sing-a-whale-song-of-joy/
|
||||||
|
docker inspect --format='{{json .Volumes}}' <container_id> | python -mjson.tool
|
||||||
|
|
||||||
|
# Copy files/folders between a container and your host
|
||||||
|
docker cp foo.txt mycontainer:/foo.txt
|
||||||
|
|
||||||
|
# list currently running containers
|
||||||
|
docker ps
|
||||||
|
|
||||||
|
# list all containers
|
||||||
|
docker ps -a
|
||||||
|
|
||||||
|
# list all images
|
||||||
|
docker images
|
11
cheat/cheatsheets/dpkg
Normal file
11
cheat/cheatsheets/dpkg
Normal file
@ -0,0 +1,11 @@
|
|||||||
|
# Install the package or upgrade it
|
||||||
|
dpkg -i test.deb
|
||||||
|
|
||||||
|
# Remove a package including configuration files
|
||||||
|
dpkg -P test.deb
|
||||||
|
|
||||||
|
# List all installed packages with versions and details
|
||||||
|
dpkg -I
|
||||||
|
|
||||||
|
# Find out if a Debian package is installed or not
|
||||||
|
dpkg -s test.deb | grep Status
|
5
cheat/cheatsheets/du
Normal file
5
cheat/cheatsheets/du
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
# To sort directories/files by size
|
||||||
|
du -sk *| sort -rn
|
||||||
|
|
||||||
|
# To show cumulative humanreadable size
|
||||||
|
du -sh
|
12
cheat/cheatsheets/ffmpeg
Normal file
12
cheat/cheatsheets/ffmpeg
Normal file
@ -0,0 +1,12 @@
|
|||||||
|
# Print file metadata etc.
|
||||||
|
ffmpeg -i path/to/file.ext
|
||||||
|
|
||||||
|
# Convert all m4a files to mp3
|
||||||
|
for f in *.m4a; do ffmpeg -i "$f" -acodec libmp3lame -ab 320k "${f%.m4a}.mp3"; done
|
||||||
|
|
||||||
|
# Listen to 10 seconds of audio from a video file
|
||||||
|
#
|
||||||
|
# -ss : start time
|
||||||
|
# -t : seconds to cut
|
||||||
|
# -autoexit : closes ffplay as soon as the audio finishes
|
||||||
|
ffmpeg -ss 00:34:24.85 -t 10 -i path/to/file.mp4 -f mp3 pipe:play | ffplay -i pipe:play -autoexit
|
@ -20,10 +20,10 @@ find ./path/ -name '*.txt' -exec rm '{}' \;
|
|||||||
find ./path/ -name '*.txt' | xargs grep 'string'
|
find ./path/ -name '*.txt' | xargs grep 'string'
|
||||||
|
|
||||||
# To find files with size bigger than 5 Mb and sort them by size:
|
# To find files with size bigger than 5 Mb and sort them by size:
|
||||||
find ./ -size +5M -type f -print0 | xargs -0 ls -Ssh
|
find . -size +5M -type f -print0 | xargs -0 ls -Ssh | sort -z
|
||||||
|
|
||||||
# To find files bigger thank 2 MB and list them:
|
# To find files bigger thank 2 MB and list them:
|
||||||
find / -type f -size +20000k -exec ls -lh {} \; | awk '{ print $9 ": " $5 }'
|
find . -type f -size +20000k -exec ls -lh {} \; | awk '{ print $9 ": " $5 }'
|
||||||
|
|
||||||
# To find files modified more than 7 days ago and list file information
|
# To find files modified more than 7 days ago and list file information
|
||||||
find . -type f -mtime +7d -ls
|
find . -type f -mtime +7d -ls
|
||||||
@ -40,5 +40,8 @@ find . -maxdepth 2 -name build -type d
|
|||||||
# To search all files who are not in .git directory
|
# To search all files who are not in .git directory
|
||||||
find . ! -iwholename '*.git*' -type f
|
find . ! -iwholename '*.git*' -type f
|
||||||
|
|
||||||
# Find all files that have the same node (hard link) as MY_FILE_HERE
|
# To find all files that have the same node (hard link) as MY_FILE_HERE
|
||||||
find / -type f -samefile MY_FILE_HERE 2>/dev/null
|
find . -type f -samefile MY_FILE_HERE 2>/dev/null
|
||||||
|
|
||||||
|
# To find all files in the current directory and modify their permissions
|
||||||
|
find . -type f -exec chmod 644 {} \;
|
||||||
|
17
cheat/cheatsheets/for
Normal file
17
cheat/cheatsheets/for
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
# basic loop
|
||||||
|
for i in 1 2 3 4 5 6 7 8 9 10
|
||||||
|
do
|
||||||
|
echo $i
|
||||||
|
done
|
||||||
|
|
||||||
|
# loop ls command results
|
||||||
|
for var in `ls -alF`
|
||||||
|
do
|
||||||
|
echo $var
|
||||||
|
done
|
||||||
|
|
||||||
|
# loop specified number of times
|
||||||
|
for i in `seq 1 10`
|
||||||
|
do
|
||||||
|
echo $i
|
||||||
|
done
|
@ -1,4 +1,4 @@
|
|||||||
# To set your identify:
|
# To set your identity:
|
||||||
git config --global user.name "John Doe"
|
git config --global user.name "John Doe"
|
||||||
git config --global user.email johndoe@example.com
|
git config --global user.email johndoe@example.com
|
||||||
|
|
||||||
@ -17,9 +17,25 @@ git commit -m "Your commit message"
|
|||||||
# To edit previous commit message
|
# To edit previous commit message
|
||||||
git commit --amend
|
git commit --amend
|
||||||
|
|
||||||
|
# Git commit in the past
|
||||||
|
git commit --date="`date --date='2 day ago'`"
|
||||||
|
git commit --date="Jun 13 18:30:25 IST 2015"
|
||||||
|
# more recent versions of Git also support --date="2 days ago" directly
|
||||||
|
|
||||||
|
# To change the date of an existing commit
|
||||||
|
git filter-branch --env-filter \
|
||||||
|
'if [ $GIT_COMMIT = 119f9ecf58069b265ab22f1f97d2b648faf932e0 ]
|
||||||
|
then
|
||||||
|
export GIT_AUTHOR_DATE="Fri Jan 2 21:38:53 2009 -0800"
|
||||||
|
export GIT_COMMITTER_DATE="Sat May 19 01:01:01 2007 -0700"
|
||||||
|
fi'
|
||||||
|
|
||||||
# To removed staged and working directory changes
|
# To removed staged and working directory changes
|
||||||
git reset --hard
|
git reset --hard
|
||||||
|
|
||||||
|
# To go 2 commits back
|
||||||
|
git reset --hard HEAD~2
|
||||||
|
|
||||||
# To remove untracked files
|
# To remove untracked files
|
||||||
git clean -f -d
|
git clean -f -d
|
||||||
|
|
||||||
@ -35,6 +51,9 @@ git push git@github.com:username/project.git
|
|||||||
# To delete the branch "branch_name"
|
# To delete the branch "branch_name"
|
||||||
git branch -D branch_name
|
git branch -D branch_name
|
||||||
|
|
||||||
|
# To make an exisiting branch track a remote branch
|
||||||
|
git branch -u upstream/foo
|
||||||
|
|
||||||
# To see who commited which line in a file
|
# To see who commited which line in a file
|
||||||
git blame filename
|
git blame filename
|
||||||
|
|
||||||
@ -51,3 +70,37 @@ git show 83fb499:path/fo/file.ext # Shows the file as it a
|
|||||||
git diff branch_1 branch_2 # Check difference between branches
|
git diff branch_1 branch_2 # Check difference between branches
|
||||||
git log # Show all the commits
|
git log # Show all the commits
|
||||||
git status # Show the changes from last commit
|
git status # Show the changes from last commit
|
||||||
|
|
||||||
|
# Commit history of a set of files
|
||||||
|
git log --pretty=email --patch-with-stat --reverse --full-index -- Admin\*.py > Sripts.patch
|
||||||
|
|
||||||
|
# Import commits from another repo
|
||||||
|
git --git-dir=../some_other_repo/.git format-patch -k -1 --stdout <commit SHA> | git am -3 -k
|
||||||
|
|
||||||
|
# View commits that will be pushed
|
||||||
|
git log @{u}..
|
||||||
|
|
||||||
|
# View changes that are new on a feature branch
|
||||||
|
git log -p feature --not master
|
||||||
|
git diff master...feature
|
||||||
|
|
||||||
|
# Interactive rebase for the last 7 commits
|
||||||
|
git rebase -i @~7
|
||||||
|
|
||||||
|
# Diff files WITHOUT considering them a part of git
|
||||||
|
# This can be used to diff files that are not in a git repo!
|
||||||
|
git diff --no-index path/to/file/A path/to/file/B
|
||||||
|
|
||||||
|
# To pull changes while overwriting any local commits
|
||||||
|
git fetch --all
|
||||||
|
git reset --hard origin/master
|
||||||
|
|
||||||
|
# Update all your submodules
|
||||||
|
git submodule update --init --recursive
|
||||||
|
|
||||||
|
# Perform a shallow clone to only get latest commits
|
||||||
|
# (helps save data when cloning large repos)
|
||||||
|
git clone --depth 1 <remote-url>
|
||||||
|
|
||||||
|
# To unshallow a clone
|
||||||
|
git pull --unshallow
|
||||||
|
@ -1,13 +1,13 @@
|
|||||||
# Basic:
|
# Search a file for a pattern
|
||||||
grep pattern file
|
grep pattern file
|
||||||
|
|
||||||
# case nonsensitive research:
|
# Case insensitive search (with line numbers)
|
||||||
grep -i pattern file
|
grep -in pattern file
|
||||||
|
|
||||||
# Recursively grep for string <pattern> in folder:
|
# Recursively grep for string <pattern> in folder:
|
||||||
grep -R pattern folder
|
grep -R pattern folder
|
||||||
|
|
||||||
# Getting pattern from file (one by line):
|
# Read search patterns from a file (one per line)
|
||||||
grep -f pattern_file file
|
grep -f pattern_file file
|
||||||
|
|
||||||
# Find lines NOT containing pattern
|
# Find lines NOT containing pattern
|
||||||
@ -17,10 +17,13 @@ grep -v pattern file
|
|||||||
grep "^00" file #Match lines starting with 00
|
grep "^00" file #Match lines starting with 00
|
||||||
grep -E "[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}" file #Find IP add
|
grep -E "[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}" file #Find IP add
|
||||||
|
|
||||||
# Find all files who contain {pattern} in the directory {directory}.
|
# Find all files which match {pattern} in {directory}
|
||||||
# This will show: "file:line my research"
|
# This will show: "file:line my research"
|
||||||
grep -rnw 'directory' -e "pattern"
|
grep -rnw 'directory' -e "pattern"
|
||||||
|
|
||||||
# Exclude grep from your grepped output of ps.
|
# Exclude grep from your grepped output of ps.
|
||||||
# Add [] to the first letter. Ex: sshd -> [s]shd
|
# Add [] to the first letter. Ex: sshd -> [s]shd
|
||||||
ps aux | grep '[h]ttpd'
|
ps aux | grep '[h]ttpd'
|
||||||
|
|
||||||
|
# Colour in red {bash} and keep all other lines
|
||||||
|
ps aux | grep -E --color 'bash|$'
|
||||||
|
17
cheat/cheatsheets/gzip
Normal file
17
cheat/cheatsheets/gzip
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
# To create a *.gz compressed file
|
||||||
|
gzip test.txt
|
||||||
|
|
||||||
|
# To create a *.gz compressed file to a specific location using -c option (standard out)
|
||||||
|
gzip -c test.txt > test_custom.txt.gz
|
||||||
|
|
||||||
|
# To uncompress a *.gz file
|
||||||
|
gzip -d test.txt.gz
|
||||||
|
|
||||||
|
# Display compression ratio of the compressed file using gzip -l
|
||||||
|
gzip -l *.gz
|
||||||
|
|
||||||
|
# Recursively compress all the files under a specified directory
|
||||||
|
gzip -r documents_directory
|
||||||
|
|
||||||
|
# To create a *.gz compressed file and keep the original
|
||||||
|
gzip < test.txt > test.txt.gz
|
32
cheat/cheatsheets/hardware-info
Normal file
32
cheat/cheatsheets/hardware-info
Normal file
@ -0,0 +1,32 @@
|
|||||||
|
# Display all hardware details
|
||||||
|
sudo lshw
|
||||||
|
|
||||||
|
# List currently loaded kernel modules
|
||||||
|
lsmod
|
||||||
|
|
||||||
|
# List all modules available to the system
|
||||||
|
find /lib/modules/$(uname -r) -type f -iname "*.ko"
|
||||||
|
|
||||||
|
# Load a module into kernel
|
||||||
|
modprobe modulename
|
||||||
|
|
||||||
|
# Remove a module from kernel
|
||||||
|
modprobe -r modulename
|
||||||
|
|
||||||
|
# List devices connected via pci bus
|
||||||
|
lspci
|
||||||
|
|
||||||
|
# Debug output for pci devices (hex)
|
||||||
|
lspci -vvxxx
|
||||||
|
|
||||||
|
# Display cpu hardware stats
|
||||||
|
cat /proc/cpuinfo
|
||||||
|
|
||||||
|
# Display memory hardware stats
|
||||||
|
cat /proc/meminfo
|
||||||
|
|
||||||
|
# Output the kernel ring buffer
|
||||||
|
dmesg
|
||||||
|
|
||||||
|
# Ouput kernel messages
|
||||||
|
dmesg --kernel
|
195
cheat/cheatsheets/http
Normal file
195
cheat/cheatsheets/http
Normal file
@ -0,0 +1,195 @@
|
|||||||
|
# Custom HTTP method HTTP headers and JSON data:
|
||||||
|
http PUT example.org X-API-Token:123 name=John
|
||||||
|
|
||||||
|
# Submitting forms:
|
||||||
|
http -f POST example.org hello=World
|
||||||
|
|
||||||
|
# See the request that is being sent using one of the output options:
|
||||||
|
http -v example.org
|
||||||
|
|
||||||
|
# Use Github API to post a comment on an issue with authentication:
|
||||||
|
http -a USERNAME POST https://api.github.com/repos/jkbrzt/httpie/issues/83/comments body='HTTPie is awesome!'
|
||||||
|
|
||||||
|
# Upload a file using redirected input:
|
||||||
|
http example.org < file.json
|
||||||
|
|
||||||
|
# Download a file and save it via redirected output:
|
||||||
|
http example.org/file > file
|
||||||
|
|
||||||
|
# Download a file wget style:
|
||||||
|
http --download example.org/file
|
||||||
|
|
||||||
|
# Use named sessions_ to make certain aspects or the communication
|
||||||
|
# persistent between requests to the same host:
|
||||||
|
# http --session=logged-in -a username:password httpbin.org/get API-Key:123
|
||||||
|
http --session=logged-in httpbin.org/headers
|
||||||
|
|
||||||
|
# Set a custom Host header to work around missing DNS records:
|
||||||
|
http localhost:8000 Host:example.com
|
||||||
|
|
||||||
|
# Simple JSON example:
|
||||||
|
http PUT example.org name=John email=john@example.org
|
||||||
|
|
||||||
|
# Non-string fields use the := separator, which allows you to embed raw
|
||||||
|
# JSON into the resulting object. Text and raw JSON files can also be
|
||||||
|
# embedded into fields using =@ and :=@:
|
||||||
|
http PUT api.example.com/person/1 name=John age:=29 married:=false hobbies:='["http", "pies"]' description=@about-john.txt bookmarks:=@bookmarks.json
|
||||||
|
|
||||||
|
# Send JSON data stored in a file:
|
||||||
|
http POST api.example.com/person/1 < person.json
|
||||||
|
|
||||||
|
# Regular Forms
|
||||||
|
http --form POST api.example.org/person/1 name='John Smith' email=john@example.org cv=@~/Documents/cv.txt
|
||||||
|
|
||||||
|
# File Upload Forms
|
||||||
|
# If one or more file fields is present, the serialization and content
|
||||||
|
# type is multipart/form-data:
|
||||||
|
http -f POST example.com/jobs name='John Smith' cv@~/Documents/cv.pdf
|
||||||
|
|
||||||
|
# To set custom headers you can use the Header:Value notation:
|
||||||
|
http example.org User-Agent:Bacon/1.0 'Cookie:valued-visitor=yes;foo=bar' X-Foo:Bar Referer:http://httpie.org/
|
||||||
|
|
||||||
|
# Basic auth:
|
||||||
|
http -a username:password example.org
|
||||||
|
|
||||||
|
# Digest auth:
|
||||||
|
http --auth-type=digest -a username:password example.org
|
||||||
|
|
||||||
|
# With password prompt:
|
||||||
|
http -a username example.org
|
||||||
|
|
||||||
|
# Authorization information from your ~/.netrc file is honored as well:
|
||||||
|
cat ~/.netrc
|
||||||
|
machine httpbin.org
|
||||||
|
login httpie
|
||||||
|
# password test
|
||||||
|
http httpbin.org/basic-auth/httpie/test
|
||||||
|
|
||||||
|
# You can specify proxies to be used through the --proxy argument for each
|
||||||
|
# protocol (which is included in the value in case of redirects across
|
||||||
|
# protocols):
|
||||||
|
http --proxy=http:http://10.10.1.10:3128 --proxy=https:https://10.10.1.10:1080 example.org
|
||||||
|
|
||||||
|
# With Basic authentication:
|
||||||
|
http --proxy=http:http://user:pass@10.10.1.10:3128 example.org
|
||||||
|
|
||||||
|
# To skip the HOST'S SSL CERTIFICATE VERIFICATION, you can pass
|
||||||
|
# --verify=no (default is yes):
|
||||||
|
http --verify=no https://example.org
|
||||||
|
|
||||||
|
# You can also use --verify=<CA_BUNDLE_PATH> to set a CUSTOM CA BUNDLE path:
|
||||||
|
http --verify=/ssl/custom_ca_bundle https://example.org
|
||||||
|
|
||||||
|
# To use a CLIENT SIDE CERTIFICATE for the SSL communication, you can pass
|
||||||
|
# the path of the cert file with --cert:
|
||||||
|
http --cert=client.pem https://example.org
|
||||||
|
|
||||||
|
# If the PRIVATE KEY is not contained in the cert file you may pass the
|
||||||
|
# path of the key file with --cert-key:
|
||||||
|
http --cert=client.crt --cert-key=client.key https://example.org
|
||||||
|
|
||||||
|
# You can control what should be printed via several options:
|
||||||
|
# --headers, -h Only the response headers are printed.
|
||||||
|
# --body, -b Only the response body is printed.
|
||||||
|
# --verbose, -v Print the whole HTTP exchange (request and response).
|
||||||
|
# --print, -p Selects parts of the HTTP exchange.
|
||||||
|
http --verbose PUT httpbin.org/put hello=world
|
||||||
|
|
||||||
|
# Print request and response headers:
|
||||||
|
# Character Stands for
|
||||||
|
# ----------- -------------------
|
||||||
|
# H Request headers.
|
||||||
|
# B Request body.
|
||||||
|
# h Response headers.
|
||||||
|
# b Response body.
|
||||||
|
http --print=Hh PUT httpbin.org/put hello=world
|
||||||
|
|
||||||
|
# Let's say that there is an API that returns the whole resource when it
|
||||||
|
# is updated, but you are only interested in the response headers to see
|
||||||
|
# the status code after an update:
|
||||||
|
http --headers PATCH example.org/Really-Huge-Resource name='New Name'
|
||||||
|
|
||||||
|
# Redirect from a file:
|
||||||
|
http PUT example.com/person/1 X-API-Token:123 < person.json
|
||||||
|
|
||||||
|
# Or the output of another program:
|
||||||
|
grep '401 Unauthorized' /var/log/httpd/error_log | http POST example.org/intruders
|
||||||
|
|
||||||
|
# You can use echo for simple data:
|
||||||
|
echo '{"name": "John"}' | http PATCH example.com/person/1 X-API-Token:123
|
||||||
|
|
||||||
|
# You can even pipe web services together using HTTPie:
|
||||||
|
http GET https://api.github.com/repos/jkbrzt/httpie | http POST httpbin.org/post
|
||||||
|
|
||||||
|
# You can use cat to enter multiline data on the terminal:
|
||||||
|
cat | http POST example.com
|
||||||
|
<paste>
|
||||||
|
# ^D
|
||||||
|
cat | http POST example.com/todos Content-Type:text/plain
|
||||||
|
- buy milk
|
||||||
|
- call parents
|
||||||
|
^D
|
||||||
|
|
||||||
|
# On OS X, you can send the contents of the clipboard with pbpaste:
|
||||||
|
pbpaste | http PUT example.com
|
||||||
|
|
||||||
|
# Passing data through stdin cannot be combined with data fields specified
|
||||||
|
# on the command line:
|
||||||
|
echo 'data' | http POST example.org more=data # This is invalid
|
||||||
|
|
||||||
|
|
||||||
|
# AN ALTERNATIVE TO REDIRECTED stdin is specifying a filename (as
|
||||||
|
# @/path/to/file) whose content is used as if it came from stdin.
|
||||||
|
|
||||||
|
# It has the advantage that THE Content-Type HEADER IS AUTOMATICALLY SET
|
||||||
|
# to the appropriate value based on the filename extension. For example,
|
||||||
|
# the following request sends the verbatim contents of that XML file with
|
||||||
|
# Content-Type: application/xml:
|
||||||
|
http PUT httpbin.org/put @/data/file.xml
|
||||||
|
|
||||||
|
# Download a file:
|
||||||
|
http example.org/Movie.mov > Movie.mov
|
||||||
|
|
||||||
|
# Download an image of Octocat, resize it using ImageMagick, upload it
|
||||||
|
# elsewhere:
|
||||||
|
http octodex.github.com/images/original.jpg | convert - -resize 25% - | http example.org/Octocats
|
||||||
|
|
||||||
|
# Force colorizing and formatting, and show both the request and the
|
||||||
|
# response in less pager:
|
||||||
|
http --pretty=all --verbose example.org | less -R
|
||||||
|
|
||||||
|
# When enabled using the --download, -d flag, response headers are printed
|
||||||
|
# to the terminal (stderr), and a progress bar is shown while the response
|
||||||
|
# body is being saved to a file.
|
||||||
|
http --download https://github.com/jkbrzt/httpie/tarball/master
|
||||||
|
|
||||||
|
# You can also redirect the response body to another program while the
|
||||||
|
# response headers and progress are still shown in the terminal:
|
||||||
|
http -d https://github.com/jkbrzt/httpie/tarball/master | tar zxf -
|
||||||
|
|
||||||
|
# If --output, -o is specified, you can resume a partial download using
|
||||||
|
# the --continue, -c option. This only works with servers that support
|
||||||
|
# Range requests and 206 Partial Content responses. If the server doesn't
|
||||||
|
# support that, the whole file will simply be downloaded:
|
||||||
|
http -dco file.zip example.org/file
|
||||||
|
|
||||||
|
# Prettified streamed response:
|
||||||
|
http --stream -f -a YOUR-TWITTER-NAME https://stream.twitter.com/1/statuses/filter.json track='Justin Bieber'
|
||||||
|
|
||||||
|
# Send each new tweet (JSON object) mentioning "Apple" to another
|
||||||
|
# server as soon as it arrives from the Twitter streaming API:
|
||||||
|
http --stream -f -a YOUR-TWITTER-NAME https://stream.twitter.com/1/statuses/filter.json track=Apple | while read tweet; do echo "$tweet" | http POST example.org/tweets ; done
|
||||||
|
|
||||||
|
# Create a new session named user1 for example.org:
|
||||||
|
http --session=user1 -a user1:password example.org X-Foo:Bar
|
||||||
|
|
||||||
|
# Now you can refer to the session by its name, and the previously used
|
||||||
|
# authorization and HTTP headers will automatically be set:
|
||||||
|
http --session=user1 example.org
|
||||||
|
|
||||||
|
# To create or reuse a different session, simple specify a different name:
|
||||||
|
http --session=user2 -a user2:password example.org X-Bar:Foo
|
||||||
|
|
||||||
|
# Instead of a name, you can also directly specify a path to a session
|
||||||
|
# file. This allows for sessions to be re-used across multiple hosts:
|
||||||
|
http --session=/tmp/session.json example.orghttp --session=/tmp/session.json admin.example.orghttp --session=~/.httpie/sessions/another.example.org/test.json example.orghttp --session-read-only=/tmp/session.json example.org
|
74
cheat/cheatsheets/hub
Normal file
74
cheat/cheatsheets/hub
Normal file
@ -0,0 +1,74 @@
|
|||||||
|
As a contributor to open-source
|
||||||
|
-------------------------------
|
||||||
|
|
||||||
|
# clone your own project
|
||||||
|
$ git clone dotfiles
|
||||||
|
→ git clone git://github.com/YOUR_USER/dotfiles.git
|
||||||
|
|
||||||
|
# clone another project
|
||||||
|
$ git clone github/hub
|
||||||
|
→ git clone git://github.com/github/hub.git
|
||||||
|
|
||||||
|
# see the current project's issues
|
||||||
|
$ git browse -- issues
|
||||||
|
→ open https://github.com/github/hub/issues
|
||||||
|
|
||||||
|
# open another project's wiki
|
||||||
|
$ git browse mojombo/jekyll wiki
|
||||||
|
→ open https://github.com/mojombo/jekyll/wiki
|
||||||
|
|
||||||
|
## Example workflow for contributing to a project:
|
||||||
|
$ git clone github/hub
|
||||||
|
$ cd hub
|
||||||
|
# create a topic branch
|
||||||
|
$ git checkout -b feature
|
||||||
|
→ ( making changes ... )
|
||||||
|
$ git commit -m "done with feature"
|
||||||
|
# It's time to fork the repo!
|
||||||
|
$ git fork
|
||||||
|
→ (forking repo on GitHub...)
|
||||||
|
→ git remote add YOUR_USER git://github.com/YOUR_USER/hub.git
|
||||||
|
# push the changes to your new remote
|
||||||
|
$ git push YOUR_USER feature
|
||||||
|
# open a pull request for the topic branch you've just pushed
|
||||||
|
$ git pull-request
|
||||||
|
→ (opens a text editor for your pull request message)
|
||||||
|
|
||||||
|
|
||||||
|
As an open-source maintainer
|
||||||
|
----------------------------
|
||||||
|
|
||||||
|
# fetch from multiple trusted forks, even if they don't yet exist as remotes
|
||||||
|
$ git fetch mislav,cehoffman
|
||||||
|
→ git remote add mislav git://github.com/mislav/hub.git
|
||||||
|
→ git remote add cehoffman git://github.com/cehoffman/hub.git
|
||||||
|
→ git fetch --multiple mislav cehoffman
|
||||||
|
|
||||||
|
# check out a pull request for review
|
||||||
|
$ git checkout https://github.com/github/hub/pull/134
|
||||||
|
→ (creates a new branch with the contents of the pull request)
|
||||||
|
|
||||||
|
# directly apply all commits from a pull request to the current branch
|
||||||
|
$ git am -3 https://github.com/github/hub/pull/134
|
||||||
|
|
||||||
|
# cherry-pick a GitHub URL
|
||||||
|
$ git cherry-pick https://github.com/xoebus/hub/commit/177eeb8
|
||||||
|
→ git remote add xoebus git://github.com/xoebus/hub.git
|
||||||
|
→ git fetch xoebus
|
||||||
|
→ git cherry-pick 177eeb8
|
||||||
|
|
||||||
|
# `am` can be better than cherry-pick since it doesn't create a remote
|
||||||
|
$ git am https://github.com/xoebus/hub/commit/177eeb8
|
||||||
|
|
||||||
|
# open the GitHub compare view between two releases
|
||||||
|
$ git compare v0.9..v1.0
|
||||||
|
|
||||||
|
# put compare URL for a topic branch to clipboard
|
||||||
|
$ git compare -u feature | pbcopy
|
||||||
|
|
||||||
|
# create a repo for a new project
|
||||||
|
$ git init
|
||||||
|
$ git add . && git commit -m "It begins."
|
||||||
|
$ git create -d "My new thing"
|
||||||
|
→ (creates a new project on GitHub with the name of current directory)
|
||||||
|
$ git push origin master
|
32
cheat/cheatsheets/ip
Normal file
32
cheat/cheatsheets/ip
Normal file
@ -0,0 +1,32 @@
|
|||||||
|
# Display all interfaces with addresses
|
||||||
|
ip addr
|
||||||
|
|
||||||
|
# Take down / up the wireless adapter
|
||||||
|
ip link set dev wlan0 {up|down}
|
||||||
|
|
||||||
|
# Set a static IP and netmask
|
||||||
|
ip addr add 192.168.1.100/32 dev eth0
|
||||||
|
|
||||||
|
# Remove a IP from an interface
|
||||||
|
ip addr del 192.168.1.100/32 dev eth0
|
||||||
|
|
||||||
|
# Remove all IPs from an interface
|
||||||
|
ip address flush dev eth0
|
||||||
|
|
||||||
|
# Display all routes
|
||||||
|
ip route
|
||||||
|
|
||||||
|
# Display all routes for IPv6
|
||||||
|
ip -6 route
|
||||||
|
|
||||||
|
# Add default route via gateway IP
|
||||||
|
ip route add default via 192.168.1.1
|
||||||
|
|
||||||
|
# Add route via interface
|
||||||
|
ip route add 192.168.0.0/24 dev eth0
|
||||||
|
|
||||||
|
# Change your mac address
|
||||||
|
ip link set dev eth0 address aa:bb:cc:dd:ee:ff
|
||||||
|
|
||||||
|
# View neighbors (using ARP and NDP)
|
||||||
|
ip neighbor show
|
@ -16,11 +16,18 @@
|
|||||||
# To switch between channel windows
|
# To switch between channel windows
|
||||||
ALT+<number>, eg. ALT+1, ALT+2
|
ALT+<number>, eg. ALT+1, ALT+2
|
||||||
|
|
||||||
# To list the nicknames within a channel
|
# To list the nicknames within the active channel
|
||||||
/names
|
/names
|
||||||
|
|
||||||
# To change the topic
|
# To change the channel topic
|
||||||
/topic <description>
|
/topic <description>
|
||||||
|
|
||||||
# To quit irssi
|
# To limit channel background noise (joins, parts, quits, etc.)
|
||||||
|
/ignore #foo,#bar JOINS PARTS QUITS NICKS # Quieten only channels `#foo`, `#bar`
|
||||||
|
/ignore * JOINS PARTS QUITS NICKS # Quieten all channels
|
||||||
|
|
||||||
|
# To save the current Irssi session config into the configuration file
|
||||||
|
/save
|
||||||
|
|
||||||
|
# To quit Irssi
|
||||||
/exit
|
/exit
|
||||||
|
@ -19,3 +19,14 @@ journalctl /usr/bin/dbus-daemon
|
|||||||
# Filter by PID
|
# Filter by PID
|
||||||
journalctl _PID=123
|
journalctl _PID=123
|
||||||
|
|
||||||
|
# Filter by Command, e.g., sshd
|
||||||
|
journalctl _COMM=sshd
|
||||||
|
|
||||||
|
# Filter by Command and time period
|
||||||
|
journalctl _COMM=crond --since '10:00' --until '11:00'
|
||||||
|
|
||||||
|
# List all available boots
|
||||||
|
journalctl --list-boots
|
||||||
|
|
||||||
|
# Filter by specific User ID e.g., user id 1000
|
||||||
|
journalctl _UID=1000
|
||||||
|
13
cheat/cheatsheets/jq
Normal file
13
cheat/cheatsheets/jq
Normal file
@ -0,0 +1,13 @@
|
|||||||
|
# Pretty print the json
|
||||||
|
jq "." < filename.json
|
||||||
|
|
||||||
|
# Access the value at key "foo"
|
||||||
|
jq '.foo'
|
||||||
|
|
||||||
|
# Access first list item
|
||||||
|
jq '.[0]'
|
||||||
|
|
||||||
|
# Slice & Dice
|
||||||
|
jq '.[2:4]'
|
||||||
|
jq '.[:3]'
|
||||||
|
jq '.[-2:]'
|
25
cheat/cheatsheets/jrnl
Normal file
25
cheat/cheatsheets/jrnl
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
# Add entry to default jrnl (from your configured text editor)
|
||||||
|
jrnl
|
||||||
|
|
||||||
|
# Add entry to default jrnl
|
||||||
|
jrnl Write entry here.
|
||||||
|
|
||||||
|
# List of tags
|
||||||
|
jrnl --tags
|
||||||
|
|
||||||
|
# Entries per tag
|
||||||
|
jrnl @tag
|
||||||
|
|
||||||
|
# Export jrnl as json
|
||||||
|
jrnl --export json
|
||||||
|
|
||||||
|
# Entries in a timeframe
|
||||||
|
jrnl -from 2009 -until may
|
||||||
|
|
||||||
|
# Add Sublime text to .jrnl_config
|
||||||
|
|
||||||
|
# Windows
|
||||||
|
"editor": "F:\\Powerpack\\Sublime\\sublime_text.exe -w"
|
||||||
|
|
||||||
|
# Linux
|
||||||
|
"editor": "/usr/bin/sublime -w"
|
23
cheat/cheatsheets/lib
Normal file
23
cheat/cheatsheets/lib
Normal file
@ -0,0 +1,23 @@
|
|||||||
|
# Display available libraries
|
||||||
|
ldconfig -p
|
||||||
|
|
||||||
|
# Update library resources
|
||||||
|
ldconfig
|
||||||
|
|
||||||
|
# Display libraries and file location
|
||||||
|
ldd
|
||||||
|
|
||||||
|
# Libraries available to apps in real-time
|
||||||
|
"Dynamic Libraries" (.so.)
|
||||||
|
|
||||||
|
# Libraries only available to apps when installed (imported)
|
||||||
|
"Static Libraries" (.a.)
|
||||||
|
|
||||||
|
# Standard (usual) library file location
|
||||||
|
/lib
|
||||||
|
|
||||||
|
# Sofware-accessible source for library info
|
||||||
|
/etc/ld.so.cache # (binary)
|
||||||
|
|
||||||
|
# Human-readable source for library info
|
||||||
|
/etc/ld.so.conf # (points to /etc/ld.so.conf.d)
|
@ -1,2 +1,5 @@
|
|||||||
# To create a symlink:
|
# To create a symlink:
|
||||||
ln -s path/to/the/target/directory name-of-symlink
|
ln -s path/to/the/target/directory name-of-symlink
|
||||||
|
|
||||||
|
# Symlink, while overwriting existing destination files
|
||||||
|
ln -sf /some/dir/exec /usr/bin/exec
|
||||||
|
@ -9,3 +9,9 @@ ls -lh
|
|||||||
|
|
||||||
# Display files, sorted by size
|
# Display files, sorted by size
|
||||||
ls -S
|
ls -S
|
||||||
|
|
||||||
|
# Display directories only
|
||||||
|
ls -d */
|
||||||
|
|
||||||
|
# Display directories only, include hidden
|
||||||
|
ls -d .*/ */
|
||||||
|
7
cheat/cheatsheets/lvm
Normal file
7
cheat/cheatsheets/lvm
Normal file
@ -0,0 +1,7 @@
|
|||||||
|
#Exclusive Activation of a Volume Group in a Cluster
|
||||||
|
#Link --> https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/High_Availability_Add-On_Administration/s1-exclusiveactive-HAAA.html
|
||||||
|
1> vgs --noheadings -o vg_name
|
||||||
|
2> volume_list = [ "rhel_root", "rhel_home" ]
|
||||||
|
3> dracut -H -f /boot/initramfs-$(uname -r).img $(uname -r)
|
||||||
|
4> Reboot the node
|
||||||
|
5> uname -r to verify the correct initrd image
|
5
cheat/cheatsheets/man
Normal file
5
cheat/cheatsheets/man
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
# Convert a man page to pdf
|
||||||
|
man -t bash | ps2pdf - bash.pdf
|
||||||
|
|
||||||
|
# View the ascii chart
|
||||||
|
man 7 ascii
|
@ -35,6 +35,9 @@ ___
|
|||||||
# links
|
# links
|
||||||
This is [an example](http://example.com "Title") inline link.
|
This is [an example](http://example.com "Title") inline link.
|
||||||
|
|
||||||
|
# image
|
||||||
|

|
||||||
|
|
||||||
# emphasis
|
# emphasis
|
||||||
*em* _em_
|
*em* _em_
|
||||||
|
|
||||||
|
58
cheat/cheatsheets/mdadm
Normal file
58
cheat/cheatsheets/mdadm
Normal file
@ -0,0 +1,58 @@
|
|||||||
|
# For the sake of briefness, we use Bash "group compound" stanza:
|
||||||
|
# /dev/sd{a,b,...}1 => /dev/sda1 /dev/sdb1 ...
|
||||||
|
# Along the following variables:
|
||||||
|
# ${M} array identifier (/dev/md${M})
|
||||||
|
# ${D} device identifier (/dev/sd${D})
|
||||||
|
# ${P} partition identifier (/dev/sd${D}${P})
|
||||||
|
|
||||||
|
# Create (initialize) a new array
|
||||||
|
mdadm --create /dev/md${M} --level=raid5 --raid-devices=4 /dev/sd{a,b,c,d,e}${P} --spare-devices=/dev/sdf1
|
||||||
|
|
||||||
|
# Manually assemble (activate) an existing array
|
||||||
|
mdadm --assemble /dev/md${M} /dev/sd{a,b,c,d,e}${P}
|
||||||
|
|
||||||
|
# Automatically assemble (activate) all existing arrays
|
||||||
|
mdadm --assemble --scan
|
||||||
|
|
||||||
|
# Stop an assembled (active) array
|
||||||
|
mdadm --stop /dev/md${M}
|
||||||
|
|
||||||
|
# See array configuration
|
||||||
|
mdadm --query /dev/md${M}
|
||||||
|
|
||||||
|
# See array component configuration (dump superblock content)
|
||||||
|
mdadm --query --examine /dev/sd${D}${P}
|
||||||
|
|
||||||
|
# See detailed array confiration/status
|
||||||
|
mdadm --detail /dev/md${M}
|
||||||
|
|
||||||
|
# Save existing arrays configuration
|
||||||
|
# (MAY be required by initrd for successfull boot)
|
||||||
|
mdadm --detail --scan > /etc/mdadm/mdadm.conf
|
||||||
|
|
||||||
|
# Erase array component superblock
|
||||||
|
# (MUST do before reusing a partition for other purposes)
|
||||||
|
mdadm --zero-superblock /dev/sd${D}${P}
|
||||||
|
|
||||||
|
# Manually mark a component as failed
|
||||||
|
# (SHOULD when a device shows wear-and-tear signs, e.g. through SMART)
|
||||||
|
mdadm --manage /dev/md${M} --fail /dev/sd${D}${P}
|
||||||
|
|
||||||
|
# Remove a failed component
|
||||||
|
# (SHOULD before preemptively replacing a device, after failing it)
|
||||||
|
mdadm --manage /dev/md${M} --remove /dev/sd${D}${P}
|
||||||
|
|
||||||
|
# Prepare (format) a new device to replace a failed one
|
||||||
|
sfdisk -d /dev/sd${D,sane} | sfdisk /dev/sd${D,new}
|
||||||
|
|
||||||
|
# Add new component to an existing array
|
||||||
|
# (this will trigger the rebuild)
|
||||||
|
mdadm --manage /dev/md${M} --add /dev/sd${D,new}${P}
|
||||||
|
|
||||||
|
# See assembled (active) arrays status
|
||||||
|
cat /proc/mdstat
|
||||||
|
|
||||||
|
# Rename a device
|
||||||
|
# (SHOULD after hostname change; eg. name="$(hostname -s)")
|
||||||
|
mdadm --assemble /dev/md${M} /dev/sd{a,b,c,d,e}${P} --name="${name}:${M}" --update=name
|
||||||
|
|
3
cheat/cheatsheets/more
Normal file
3
cheat/cheatsheets/more
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
# To show the file start at line number 5
|
||||||
|
more +5 file
|
||||||
|
|
@ -1,8 +1,14 @@
|
|||||||
# To mount / partition as read-write in repair mode:
|
# To mount / partition as read-write in repair mode:
|
||||||
mount -o remount,rw /
|
mount -o remount,rw /
|
||||||
|
|
||||||
|
# Bind mount path to a second location
|
||||||
|
mount --bind /origin/path /destination/path
|
||||||
|
|
||||||
# To mount Usb disk as user writable:
|
# To mount Usb disk as user writable:
|
||||||
mount -o uid=username,gid=usergroup /dev/sdx /mnt/xxx
|
mount -o uid=username,gid=usergroup /dev/sdx /mnt/xxx
|
||||||
|
|
||||||
# To mount a remote NFS directory
|
# To mount a remote NFS directory
|
||||||
mount -t nfs example.com:/remote/example/dir /local/example/dir
|
mount -t nfs example.com:/remote/example/dir /local/example/dir
|
||||||
|
|
||||||
|
# To mount an ISO
|
||||||
|
mount -o loop disk1.iso /mnt/disk
|
||||||
|
@ -12,3 +12,20 @@ CREATE DATABASE owa CHARACTER SET utf8 COLLATE utf8_general_ci;
|
|||||||
|
|
||||||
# To add a user and give rights on the given database
|
# To add a user and give rights on the given database
|
||||||
GRANT ALL PRIVILEGES ON database.* TO 'user'@'localhost'IDENTIFIED BY 'password' WITH GRANT OPTION;
|
GRANT ALL PRIVILEGES ON database.* TO 'user'@'localhost'IDENTIFIED BY 'password' WITH GRANT OPTION;
|
||||||
|
|
||||||
|
# To list the privileges granted to the account that you are using to connect to the server. Any of the 3 statements will work.
|
||||||
|
SHOW GRANTS FOR CURRENT_USER();
|
||||||
|
SHOW GRANTS;
|
||||||
|
SHOW GRANTS FOR CURRENT_USER;
|
||||||
|
|
||||||
|
# Basic SELECT Statement
|
||||||
|
SELECT * FROM tbl_name;
|
||||||
|
|
||||||
|
# Basic INSERT Statement
|
||||||
|
INSERT INTO tbl_name (col1,col2) VALUES(15,col1*2);
|
||||||
|
|
||||||
|
# Basic UPDATE Statement
|
||||||
|
UPDATE tbl_name SET col1 = "example";
|
||||||
|
|
||||||
|
# Basic DELETE Statement
|
||||||
|
DELETE FROM tbl_name WHERE user = 'jcole';
|
@ -1,16 +1,16 @@
|
|||||||
# To dump a database to a file (Note that your password will appear in your command history!):
|
# To dump a database to a file (Note that your password will appear in your command history!):
|
||||||
mysqldump -uusername -ppassword the-database > db.sql
|
mysqldump -uusername -ppassword the-database > db.sql
|
||||||
|
|
||||||
# To dump a database to a file:
|
# To dump a database to a file:
|
||||||
mysqldump -uusername -p the-database > db.sql
|
mysqldump -uusername -p the-database > db.sql
|
||||||
|
|
||||||
# To dump a database to a .tgz file (Note that your password will appear in your command history!):
|
# To dump a database to a .tgz file (Note that your password will appear in your command history!):
|
||||||
mysqldump -uusername -ppassword the-database | gzip -9 > db.sql
|
mysqldump -uusername -ppassword the-database | gzip -9 > db.sql
|
||||||
|
|
||||||
# To dump a database to a .tgz file:
|
# To dump a database to a .tgz file:
|
||||||
mysqldump -uusername -p the-database | gzip -9 > db.sql
|
mysqldump -uusername -p the-database | gzip -9 > db.sql
|
||||||
|
|
||||||
# To dump all databases to a file (Note that your password will appear in your command history!):
|
# To dump all databases to a file (Note that your password will appear in your command history!):
|
||||||
mysqldump -uusername -ppassword --all-databases > all-databases.sql
|
mysqldump -uusername -ppassword --all-databases > all-databases.sql
|
||||||
|
|
||||||
# To dump all databases to a file:
|
# To dump all databases to a file:
|
||||||
|
20
cheat/cheatsheets/nc
Normal file
20
cheat/cheatsheets/nc
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
# To open a TCP connection to port 42 of host.example.com, using port 31337 as the source port, with a timeout of 5 seconds:
|
||||||
|
nc -p 31337 -w 5 host.example.com 42
|
||||||
|
|
||||||
|
# To open a UDP connection to port 53 of host.example.com:
|
||||||
|
nc -u host.example.com 53
|
||||||
|
|
||||||
|
# To open a TCP connection to port 42 of host.example.com using 10.1.2.3 as the IP for the local end of the connection:
|
||||||
|
nc -s 10.1.2.3 host.example.com 42
|
||||||
|
|
||||||
|
# To create and listen on a UNIX-domain stream socket:
|
||||||
|
nc -lU /var/tmp/dsocket
|
||||||
|
|
||||||
|
# To connect to port 42 of host.example.com via an HTTP proxy at 10.2.3.4, port 8080. This example could also be used by ssh(1); see the ProxyCommand directive in ssh_config(5) for more information.
|
||||||
|
nc -x10.2.3.4:8080 -Xconnect host.example.com 42
|
||||||
|
|
||||||
|
# The same example again, this time enabling proxy authentication with username "ruser" if the proxy requires it:
|
||||||
|
nc -x10.2.3.4:8080 -Xconnect -Pruser host.example.com 42
|
||||||
|
|
||||||
|
# To choose the source IP for the testing using the -s option
|
||||||
|
nc -zv -s source_IP target_IP Port
|
29
cheat/cheatsheets/nkf
Normal file
29
cheat/cheatsheets/nkf
Normal file
@ -0,0 +1,29 @@
|
|||||||
|
# check the file's charactor code
|
||||||
|
nkf -g test.txt
|
||||||
|
|
||||||
|
# convert charactor code to UTF-8
|
||||||
|
nkf -w --overwrite test.txt
|
||||||
|
|
||||||
|
# convert charactor code to EUC-JP
|
||||||
|
nkf -e --overwrite test.txt
|
||||||
|
|
||||||
|
# convert charactor code to Shift-JIS
|
||||||
|
nkf -s --overwrite test.txt
|
||||||
|
|
||||||
|
# convert charactor code to ISO-2022-JP
|
||||||
|
nkf -j --overwrite test.txt
|
||||||
|
|
||||||
|
# convert newline to LF
|
||||||
|
nkf -Lu --overwrite test.txt
|
||||||
|
|
||||||
|
# convert newline to CRLF
|
||||||
|
nkf -Lw --overwrite test.txt
|
||||||
|
|
||||||
|
# convert newline to CR
|
||||||
|
nkf -Lm --overwrite test.txt
|
||||||
|
|
||||||
|
# MIME encode
|
||||||
|
echo テスト | nkf -WwMQ
|
||||||
|
|
||||||
|
# MIME decode
|
||||||
|
echo "=E3=83=86=E3=82=B9=E3=83=88" | nkf -WwmQ
|
@ -23,13 +23,15 @@ nmap -source-port [port] [target]
|
|||||||
nmap -A [target]
|
nmap -A [target]
|
||||||
|
|
||||||
# Speedup your scan:
|
# Speedup your scan:
|
||||||
nmap -T5 --min-parallelism=50 [target]
|
# -n => disable ReverseDNS
|
||||||
|
# --min-rate=X => min X packets / sec
|
||||||
|
nmap -T5 --min-parallelism=50 -n --min-rate=300 [target]
|
||||||
|
|
||||||
# Traceroute:
|
# Traceroute:
|
||||||
nmap -traceroute [target]
|
nmap -traceroute [target]
|
||||||
|
|
||||||
# Ping scan only: -sP
|
# Ping scan only: -sP
|
||||||
# Don't ping: -PN
|
# Don't ping: -PN <- Use full if a host don't reply to a ping.
|
||||||
# TCP SYN ping: -PS
|
# TCP SYN ping: -PS
|
||||||
# TCP ACK ping: -PA
|
# TCP ACK ping: -PA
|
||||||
# UDP ping: -PU
|
# UDP ping: -PU
|
||||||
@ -38,6 +40,9 @@ nmap -traceroute [target]
|
|||||||
# Example: Ping scan all machines on a class C network
|
# Example: Ping scan all machines on a class C network
|
||||||
nmap -sP 192.168.0.0/24
|
nmap -sP 192.168.0.0/24
|
||||||
|
|
||||||
|
# Force TCP scan: -sT
|
||||||
|
# Force UDP scan: -sU
|
||||||
|
|
||||||
# Use some script:
|
# Use some script:
|
||||||
nmap --script default,safe
|
nmap --script default,safe
|
||||||
|
|
||||||
@ -55,3 +60,10 @@ nmap --script "default and safe"
|
|||||||
|
|
||||||
# Loads scripts in the default, safe, or intrusive categories, except for those whose names start with http-.
|
# Loads scripts in the default, safe, or intrusive categories, except for those whose names start with http-.
|
||||||
nmap --script "(default or safe or intrusive) and not http-*"
|
nmap --script "(default or safe or intrusive) and not http-*"
|
||||||
|
|
||||||
|
# Scan for the heartbleed
|
||||||
|
# -pT:443 => Scan only port 443 with TCP (T:)
|
||||||
|
nmap -T5 --min-parallelism=50 -n --script "ssl-heartbleed" -pT:443 127.0.0.1
|
||||||
|
|
||||||
|
# Show all informations (debug mode)
|
||||||
|
nmap -d ...
|
||||||
|
40
cheat/cheatsheets/nmcli
Normal file
40
cheat/cheatsheets/nmcli
Normal file
@ -0,0 +1,40 @@
|
|||||||
|
# Desc: Command line interface to NetworkManager
|
||||||
|
|
||||||
|
# Connect to a wireless access point - Parameters:
|
||||||
|
# <wiface> -- the name of your wireless interface
|
||||||
|
# <ssid> -- the SSID of the access point
|
||||||
|
# <pass> -- the WiFi password
|
||||||
|
nmcli d wifi connect <ssid> password <pass> iface <wiface>
|
||||||
|
|
||||||
|
# Disconnect from WiFi - Parameters:
|
||||||
|
# <wiface> -- the name of your wireless interface
|
||||||
|
nmcli d wifi disconnect iface <wiface>
|
||||||
|
|
||||||
|
# Get WiFi status (enabled / disabled)
|
||||||
|
nmcli radio wifi
|
||||||
|
|
||||||
|
# Enable / Disable WiFi
|
||||||
|
nmcli radio wifi <on|off>
|
||||||
|
|
||||||
|
# Show all available WiFi access points
|
||||||
|
nmcli dev wifi list
|
||||||
|
|
||||||
|
# Refresh the available WiFi connection list
|
||||||
|
nmcli dev wifi rescan
|
||||||
|
|
||||||
|
# Show all available connections
|
||||||
|
nmcli con
|
||||||
|
|
||||||
|
# Show only active connections
|
||||||
|
nmcli con show --active
|
||||||
|
|
||||||
|
# Review the available devices
|
||||||
|
nmcli dev status
|
||||||
|
|
||||||
|
# Add a dynamic ethernet connection - parameters:
|
||||||
|
# <name> -- the name of the connection
|
||||||
|
# <iface_name> -- the name of the interface
|
||||||
|
ncmli con add type ethernet con-name <name> ifname <iface_name>
|
||||||
|
|
||||||
|
# Bring up the ethernet connection
|
||||||
|
nmcli con up <name>
|
20
cheat/cheatsheets/nova
Normal file
20
cheat/cheatsheets/nova
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
# To list VMs on current tenant:
|
||||||
|
nova list
|
||||||
|
|
||||||
|
# To list VMs of all tenants (admin user only):
|
||||||
|
nova list --all-tenants
|
||||||
|
|
||||||
|
# To boot a VM on a specific host:
|
||||||
|
nova boot --nic net-id=<net_id> \
|
||||||
|
--image <image_id> \
|
||||||
|
--flavor <flavor> \
|
||||||
|
--availability-zone nova:<host_name> <vm_name>
|
||||||
|
|
||||||
|
# To stop a server
|
||||||
|
nova stop <server>
|
||||||
|
|
||||||
|
# To start a server
|
||||||
|
nova start <server>
|
||||||
|
|
||||||
|
# To attach a network interface to a specific VM:
|
||||||
|
nova interface-attach --net-id <net_id> <server>
|
33
cheat/cheatsheets/ntp
Normal file
33
cheat/cheatsheets/ntp
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
# Verify ntpd running:
|
||||||
|
service ntp status
|
||||||
|
|
||||||
|
# Start ntpd if not running:
|
||||||
|
service ntp start
|
||||||
|
|
||||||
|
# Display current hardware clock value:
|
||||||
|
sudo hwclock -r
|
||||||
|
|
||||||
|
# Apply system time to hardware time:
|
||||||
|
sudo hwclock --systohc
|
||||||
|
|
||||||
|
# Apply hardware time to system time:
|
||||||
|
sudo hwclock --hctosys
|
||||||
|
|
||||||
|
# Set hwclock to local time:
|
||||||
|
sudo hwclock --localtime
|
||||||
|
|
||||||
|
# Set hwclock to UTC:
|
||||||
|
sudo hwclock --utc
|
||||||
|
|
||||||
|
# Set hwclock manually:
|
||||||
|
sudo hwclock --set --date="8/10/15 13:10:05"
|
||||||
|
|
||||||
|
# Query surrounding stratum time servers
|
||||||
|
ntpq -pn
|
||||||
|
|
||||||
|
# Config file:
|
||||||
|
/etc/ntp.conf
|
||||||
|
|
||||||
|
# Driftfile:
|
||||||
|
location of "drift" of your system clock compared to ntp servers
|
||||||
|
/var/lib/ntp/ntp.drift
|
2
cheat/cheatsheets/numfmt
Normal file
2
cheat/cheatsheets/numfmt
Normal file
@ -0,0 +1,2 @@
|
|||||||
|
# Convert bytes to Human readable format
|
||||||
|
numfmt --to=iec --suffix=B --padding=7 1048576
|
@ -19,3 +19,6 @@ openssl x509 -text -noout -in server.crt
|
|||||||
echo | openssl s_client -connect <hostname>:443 2> /dev/null | \
|
echo | openssl s_client -connect <hostname>:443 2> /dev/null | \
|
||||||
awk '/-----BEGIN/,/END CERTIFICATE-----/' | \
|
awk '/-----BEGIN/,/END CERTIFICATE-----/' | \
|
||||||
openssl x509 -noout -enddate
|
openssl x509 -noout -enddate
|
||||||
|
|
||||||
|
# Generate Diffie-Hellman parameters:
|
||||||
|
openssl dhparam -outform PEM -out dhparams.pem 2048
|
||||||
|
5
cheat/cheatsheets/p4
Normal file
5
cheat/cheatsheets/p4
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
# Print details related to Client and server configuration
|
||||||
|
p4 info
|
||||||
|
|
||||||
|
# Open a file and add it to depot
|
||||||
|
p4 add <filename>
|
15
cheat/cheatsheets/paste
Normal file
15
cheat/cheatsheets/paste
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
# Concat columns from files
|
||||||
|
paste file1 file2 ...
|
||||||
|
|
||||||
|
# List the files in the current directory in three columns:
|
||||||
|
ls | paste - - -
|
||||||
|
|
||||||
|
# Combine pairs of lines from a file into single lines:
|
||||||
|
paste -s -d '\t\n' myfile
|
||||||
|
|
||||||
|
# Number the lines in a file, similar to nl(1):
|
||||||
|
sed = myfile | paste -s -d '\t\n' - -
|
||||||
|
|
||||||
|
# Create a colon-separated list of directories named bin,
|
||||||
|
# suitable for use in the PATH environment variable:
|
||||||
|
find / -name bin -type d | paste -s -d : -
|
8
cheat/cheatsheets/ping
Normal file
8
cheat/cheatsheets/ping
Normal file
@ -0,0 +1,8 @@
|
|||||||
|
# ping a host with a total count of 15 packets overall.
|
||||||
|
ping -c 15 www.example.com
|
||||||
|
|
||||||
|
# ping a host with a total count of 15 packets overall, one every .5 seconds (faster ping).
|
||||||
|
ping -c 15 -i .5 www.example.com
|
||||||
|
|
||||||
|
# test if a packet size of 1500 bytes is supported (to check the MTU for example)
|
||||||
|
ping -s 1500 -c 10 -M do www.example.com
|
2
cheat/cheatsheets/ping6
Normal file
2
cheat/cheatsheets/ping6
Normal file
@ -0,0 +1,2 @@
|
|||||||
|
# get all ipv6 neighbors via broadcast ping
|
||||||
|
ping6 -I eth0 ff02::1
|
27
cheat/cheatsheets/pip
Normal file
27
cheat/cheatsheets/pip
Normal file
@ -0,0 +1,27 @@
|
|||||||
|
# Search for packages
|
||||||
|
pip search SomePackage
|
||||||
|
|
||||||
|
# Install some packages
|
||||||
|
pip install SomePackage
|
||||||
|
|
||||||
|
# Install some package in user space
|
||||||
|
pip install --user SomePackage
|
||||||
|
|
||||||
|
# Upgrade some package
|
||||||
|
pip install --upgrade SomePackage
|
||||||
|
|
||||||
|
# Output and install packages in a requirement file
|
||||||
|
pip freeze > requirements.txt
|
||||||
|
pip install -r requirements.txt
|
||||||
|
|
||||||
|
# Show details of a package
|
||||||
|
pip show SomePackage
|
||||||
|
|
||||||
|
# List outdated packages
|
||||||
|
pip list --outdated
|
||||||
|
|
||||||
|
# Upgrade all outdated packages, thanks to http://stackoverflow.com/a/3452888
|
||||||
|
pip freeze --local | grep -v '^\-e' | cut -d = -f 1 | xargs -n1 pip install -U
|
||||||
|
|
||||||
|
# Install specific version of a package
|
||||||
|
pip install -I SomePackage1==1.1.0 'SomePackage2>=1.0.4'
|
49
cheat/cheatsheets/readline
Normal file
49
cheat/cheatsheets/readline
Normal file
@ -0,0 +1,49 @@
|
|||||||
|
Moving around
|
||||||
|
Ctrl-b Move the cursor one character ⇦ to the left
|
||||||
|
Ctrl-f Move the cursor one character ⇨ to the right
|
||||||
|
Alt-b Move the cursor one word ⇦ to the left
|
||||||
|
Alt-f Move the cursor one word ⇨ to the right
|
||||||
|
Ctrl-a Move the cursor ⇤ to the start of the line
|
||||||
|
Ctrl-e Move the cursor ⇥ to the end of the line
|
||||||
|
Ctrl-x-x Move the cursor ⇤⇥ to the start, and to the end again
|
||||||
|
|
||||||
|
Cut, copy and paste
|
||||||
|
Backspace Delete the character ⇦ to the left of the cursor
|
||||||
|
DEL
|
||||||
|
Ctrl-d Delete the character underneath the cursor
|
||||||
|
Ctrl-u Delete everything ⇤ from the cursor back to the line start
|
||||||
|
Ctrl-k Delete everything ⇥ from the cursor to the end of the line
|
||||||
|
Alt-d Delete word ⇨ until before the next word boundary
|
||||||
|
Ctrl-w Delete word ⇦ until after the previous word boundary
|
||||||
|
Ctrl-y Yank/Paste prev. killed text at the cursor position
|
||||||
|
Alt-y Yank/Paste prev. prev. killed text at the cursor position
|
||||||
|
|
||||||
|
History
|
||||||
|
Ctrl-p Move in history one line ⇧ before this line
|
||||||
|
Ctrl-n Move in history one line ⇩ after this line
|
||||||
|
Alt-> Move in history all the lines ⇩ to the line currently being entered
|
||||||
|
Ctrl-r Incrementally search the line history ⇧ backwardly
|
||||||
|
Ctrl-s Incrementally search the line history ⇩ forwardly
|
||||||
|
Ctrl-J End an incremental search
|
||||||
|
Ctrl-G Abort an incremental search and restore the original line
|
||||||
|
Alt-Ctrl-y Yank/Paste arg. 1 of prev. cmnd at the cursor position
|
||||||
|
Alt-.
|
||||||
|
Alt-_ Yank/Paste last arg of prev. cmnd at the cursor position
|
||||||
|
|
||||||
|
Undo
|
||||||
|
Ctrl-_
|
||||||
|
Ctrl-x
|
||||||
|
Ctrl-u Undo the last editing command; you can undo all the way back to an empty line
|
||||||
|
Alt-r Undo all changes made to this line
|
||||||
|
Ctrl-l Clear the screen, reprinting the current line at the top
|
||||||
|
Ctrl-l Clear the screen, reprinting the current line at the top
|
||||||
|
|
||||||
|
Completion
|
||||||
|
TAB Auto-complete a name
|
||||||
|
Alt-/ Auto-complete a name (without smart completion)
|
||||||
|
Alt-? List the possible completions of the preceeding text
|
||||||
|
Alt-* Insert all possible completions of the preceeding text
|
||||||
|
|
||||||
|
Transpose
|
||||||
|
Ctrl-t Transpose/drag char. before the cursor ↷ over the character at the cursor
|
||||||
|
Alt-t Transpose/drag word before the cursor ↷ over the word at/after the cursor
|
2
cheat/cheatsheets/rename
Normal file
2
cheat/cheatsheets/rename
Normal file
@ -0,0 +1,2 @@
|
|||||||
|
# Lowercase all files and folders in current directory
|
||||||
|
rename 'y/A-Z/a-z/' *
|
@ -1,5 +1,8 @@
|
|||||||
# Remove files and subdirs
|
# Remove files and subdirs
|
||||||
rm -rf path/to/the/target/
|
rm -rf path/to/the/target/
|
||||||
|
|
||||||
# Ignore non existent files
|
# Ignore non existent files
|
||||||
rm -f path/to/the/target
|
rm -f path/to/the/target
|
||||||
|
|
||||||
|
# Remove a file with his inode
|
||||||
|
find /tmp/ -inum 6666 -exec rm -i '{}' \;
|
||||||
|
29
cheat/cheatsheets/route
Normal file
29
cheat/cheatsheets/route
Normal file
@ -0,0 +1,29 @@
|
|||||||
|
# To display routing table IP addresses instead of host names:
|
||||||
|
route -n
|
||||||
|
|
||||||
|
# To add a default gateway:
|
||||||
|
route add default gateway 192.168.0.1
|
||||||
|
|
||||||
|
# To add the normal loopback entry, using netmask 255.0.0.0 and associated with the "lo" device (assuming this device was previously set up correctly with ifconfig(8)).
|
||||||
|
route add -net 127.0.0.0 netmask 255.0.0.0 dev lo
|
||||||
|
|
||||||
|
# To add a route to the local network 192.56.76.x via "eth0". The word "dev" can be omitted here.
|
||||||
|
route add -net 192.56.76.0 netmask 255.255.255.0 dev eth0
|
||||||
|
|
||||||
|
# To delete the current default route, which is labeled "default" or 0.0.0.0 in the destination field of the current routing table.
|
||||||
|
route del default
|
||||||
|
|
||||||
|
# To add a default route (which will be used if no other route matches). All packets using this route will be gatewayed through "mango-gw". The device which will actually be used for that route depends on how we can reach "mango-gw" - the static route to "mango-gw" will have to be set up before.
|
||||||
|
route add default gw mango-gw
|
||||||
|
|
||||||
|
# To add the route to the "ipx4" host via the SLIP interface (assuming that "ipx4" is the SLIP host).
|
||||||
|
route add ipx4 sl0
|
||||||
|
|
||||||
|
# To add the net "192.57.66.x" to be gateway through the former route to the SLIP interface.
|
||||||
|
route add -net 192.57.66.0 netmask 255.255.255.0 gw ipx4
|
||||||
|
|
||||||
|
# To install a rejecting route for the private network "10.x.x.x."
|
||||||
|
route add -net 10.0.0.0 netmask 255.0.0.0 reject
|
||||||
|
|
||||||
|
# This is an obscure one documented so people know how to do it. This sets all of the class D (multicast) IP routes to go via "eth0". This is the correct normal configuration line with a multicasting kernel
|
||||||
|
route add -net 224.0.0.0 netmask 240.0.0.0 dev eth0
|
31
cheat/cheatsheets/rpm
Normal file
31
cheat/cheatsheets/rpm
Normal file
@ -0,0 +1,31 @@
|
|||||||
|
# To install a package:
|
||||||
|
rpm -ivh <rpm>
|
||||||
|
|
||||||
|
# To remove a package:
|
||||||
|
rpm -e <package>
|
||||||
|
|
||||||
|
# To remove a package, but not its dependencies
|
||||||
|
rpm -e --nodeps <package>
|
||||||
|
|
||||||
|
# To find what package installs a file:
|
||||||
|
rpm -qf </path/to/file>
|
||||||
|
|
||||||
|
# To find what files are installed by a package:
|
||||||
|
rpm -ql <package>
|
||||||
|
rpm -qpl <rpm>
|
||||||
|
|
||||||
|
# To find what packages require a package or file:
|
||||||
|
rpm -q --whatrequires <package>
|
||||||
|
rpm -q --whatrequires <file>
|
||||||
|
|
||||||
|
# To list all installed packages:
|
||||||
|
rpm -qa
|
||||||
|
|
||||||
|
# To find a pkg's dependencies
|
||||||
|
rpm -i --test <package>
|
||||||
|
|
||||||
|
# Display checksum against source
|
||||||
|
rpm -K <package>
|
||||||
|
|
||||||
|
# Verify a package
|
||||||
|
rpm -V <package>
|
21
cheat/cheatsheets/rss2email
Normal file
21
cheat/cheatsheets/rss2email
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
'rss2email -- converts rss feeds and emails them to your inbox'
|
||||||
|
|
||||||
|
# List all feeds
|
||||||
|
r2e list
|
||||||
|
|
||||||
|
# Convert RSS entries to email
|
||||||
|
r2e run
|
||||||
|
|
||||||
|
# Add a new feed
|
||||||
|
r2e add <feed address>
|
||||||
|
|
||||||
|
# Add a new feed with new email address
|
||||||
|
r2e add <feed address> [newemail address]
|
||||||
|
|
||||||
|
# Delete a feed
|
||||||
|
r2e delete <# of feed in list/>
|
||||||
|
|
||||||
|
# Help
|
||||||
|
r2e -h
|
||||||
|
|
||||||
|
|
@ -1,6 +1,14 @@
|
|||||||
# copy files from remote to local, maintaining file propertires and sym-links (-a), zipping for faster transfer (-z), verbose (-v).
|
# To copy files from remote to local, maintaining file properties and sym-links (-a), zipping for faster transfer (-z), verbose (-v).
|
||||||
rsync -avz host:file1 :file1 /dest/
|
rsync -avz host:file1 :file1 /dest/
|
||||||
rsync -avz /source host:/dest
|
rsync -avz /source host:/dest
|
||||||
|
|
||||||
# Copy files using checksum (-c), rather than time, to detect if the file has changed. (Useful for validating backups).
|
# Copy files using checksum (-c) rather than time to detect if the file has changed. (Useful for validating backups).
|
||||||
rsync -avc /source/ /dest/
|
rsync -avc /source/ /dest/
|
||||||
|
|
||||||
|
# Copy contents of /src/foo to destination:
|
||||||
|
|
||||||
|
# This command will create /dest/foo if it does not already exist
|
||||||
|
rsync -auv /src/foo /dest
|
||||||
|
|
||||||
|
# Explicitly copy /src/foo to /dest/foo
|
||||||
|
rsync -auv /src/foo/ /dest/foo
|
||||||
|
@ -10,5 +10,8 @@ echo 'It is daytime' | sed 's/day/night/g'
|
|||||||
# To remove leading spaces
|
# To remove leading spaces
|
||||||
sed -i -r 's/^\s+//g' file.txt
|
sed -i -r 's/^\s+//g' file.txt
|
||||||
|
|
||||||
# Remove empty lines and print results to stdout:
|
# To remove empty lines and print results to stdout:
|
||||||
sed '/^$/d' file.txt
|
sed '/^$/d' file.txt
|
||||||
|
|
||||||
|
# To replace newlines in multiple lines
|
||||||
|
sed ':a;N;$!ba;s/\n//g' file.txt
|
||||||
|
5
cheat/cheatsheets/smbclient
Normal file
5
cheat/cheatsheets/smbclient
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
# To display public shares on the server:
|
||||||
|
smbclient -L <hostname> -U%
|
||||||
|
|
||||||
|
# To connect to a share:
|
||||||
|
smbclient //<hostname>/<share> -U<username>%<password>
|
5
cheat/cheatsheets/snmpwalk
Normal file
5
cheat/cheatsheets/snmpwalk
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
# To retrieve all of the variables under system for host zeus
|
||||||
|
snmpwalk -Os -c public -v 1 zeus system
|
||||||
|
|
||||||
|
# To retrieve the scalar values, but omit the sysORTable for host zeus
|
||||||
|
snmpwalk -Os -c public -v 1 -CE sysORTable zeus system
|
18
cheat/cheatsheets/ss
Normal file
18
cheat/cheatsheets/ss
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
ss
|
||||||
|
Utility to investigate sockets
|
||||||
|
|
||||||
|
Args
|
||||||
|
-4/-6 list ipv4/ipv6 sockets
|
||||||
|
-n numeric addresses instead of hostnames
|
||||||
|
-l list listing sockets
|
||||||
|
-u/-t/-x list udp/tcp/unix sockets
|
||||||
|
-p Show process(es) that using socket
|
||||||
|
|
||||||
|
# show all listing tcp sockets including the corresponding process
|
||||||
|
ss -tlp
|
||||||
|
|
||||||
|
# show all sockets connecting to 192.168.2.1 on port 80
|
||||||
|
ss -t dst 192.168.2.1:80
|
||||||
|
|
||||||
|
# show all ssh related connection
|
||||||
|
ss -t state established '( dport = :ssh or sport = :ssh )'
|
@ -4,12 +4,19 @@ ssh -i /path/to/file.pem user@example.com
|
|||||||
# To connect on an non-standard port:
|
# To connect on an non-standard port:
|
||||||
ssh -p 2222 user@example.com
|
ssh -p 2222 user@example.com
|
||||||
|
|
||||||
|
# To connect and forward the authentication agent
|
||||||
|
ssh -A user@example.com
|
||||||
|
|
||||||
# To execute a command on a remote server:
|
# To execute a command on a remote server:
|
||||||
ssh -t user@example.com 'the-remote-command'
|
ssh -t user@example.com 'the-remote-command'
|
||||||
|
|
||||||
# To tunnel an x session over SSH:
|
# To tunnel an x session over SSH:
|
||||||
ssh -X user@example.com
|
ssh -X user@example.com
|
||||||
|
|
||||||
|
# Redirect traffic with a tunnel between local host (port 8080) and a remote
|
||||||
|
# host (remote.example.com:5000) through a proxy (personal.server.com):
|
||||||
|
ssh -f -L 8080:remote.example.com:5000 user@personal.server.com -N
|
||||||
|
|
||||||
# To launch a specific x application over SSH:
|
# To launch a specific x application over SSH:
|
||||||
ssh -X -t user@example.com 'chromium-browser'
|
ssh -X -t user@example.com 'chromium-browser'
|
||||||
|
|
||||||
@ -21,3 +28,7 @@ ssh user@example.com -C -c blowfish -X
|
|||||||
|
|
||||||
# For more information, see:
|
# For more information, see:
|
||||||
# http://unix.stackexchange.com/q/12755/44856
|
# http://unix.stackexchange.com/q/12755/44856
|
||||||
|
|
||||||
|
# Copy files and folders through ssh from remote host to pwd with tar.gz compression
|
||||||
|
# when there is no rsync command available
|
||||||
|
ssh user@example.com "cd /var/www/Shared/; tar zcf - asset1 asset2" | tar zxf -
|
||||||
|
18
cheat/cheatsheets/systemd
Normal file
18
cheat/cheatsheets/systemd
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
# Display process startup time
|
||||||
|
systemd-analyze
|
||||||
|
|
||||||
|
# Display process startup time at service level
|
||||||
|
systemd-analyze blame
|
||||||
|
|
||||||
|
# List running units
|
||||||
|
systemctl list-units
|
||||||
|
|
||||||
|
# Load a unit at startup
|
||||||
|
systemctl enable foo.service
|
||||||
|
|
||||||
|
# Start or Stop a unit
|
||||||
|
systemctl <start | stop> foo.service
|
||||||
|
|
||||||
|
# Unit file locations
|
||||||
|
/etc/systemd/system
|
||||||
|
/usr/lib/systemd/system
|
@ -24,3 +24,8 @@ tar -jtvf /path/to/foo.tgz
|
|||||||
|
|
||||||
# To create a .gz archive and exclude all jpg,gif,... from the tgz
|
# To create a .gz archive and exclude all jpg,gif,... from the tgz
|
||||||
tar czvf /path/to/foo.tgz --exclude=\*.{jpg,gif,png,wmv,flv,tar.gz,zip} /path/to/foo/
|
tar czvf /path/to/foo.tgz --exclude=\*.{jpg,gif,png,wmv,flv,tar.gz,zip} /path/to/foo/
|
||||||
|
|
||||||
|
# To use parallel (multi-threaded) implementation of compression algorithms:
|
||||||
|
tar -z ... -> tar -Ipigz ...
|
||||||
|
tar -j ... -> tar -Ipbzip2 ...
|
||||||
|
tar -J ... -> tar -Ipixz ...
|
||||||
|
5
cheat/cheatsheets/tee
Normal file
5
cheat/cheatsheets/tee
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
# To tee stdout to a file:
|
||||||
|
ls | tee outfile.txt
|
||||||
|
|
||||||
|
# To tee stdout and append to a file:
|
||||||
|
ls | tee -a outfile.txt
|
@ -13,6 +13,12 @@ tmux attach -d
|
|||||||
# Display session:
|
# Display session:
|
||||||
tmux ls
|
tmux ls
|
||||||
|
|
||||||
|
# Rename session:
|
||||||
|
Ctrl-b $
|
||||||
|
|
||||||
|
# Switch session:
|
||||||
|
Ctrl-b s
|
||||||
|
|
||||||
# Start a shared session:
|
# Start a shared session:
|
||||||
tmux -S /tmp/your_shared_session
|
tmux -S /tmp/your_shared_session
|
||||||
chmod 777 /tmp/your_shared_session
|
chmod 777 /tmp/your_shared_session
|
||||||
|
22
cheat/cheatsheets/tr
Normal file
22
cheat/cheatsheets/tr
Normal file
@ -0,0 +1,22 @@
|
|||||||
|
#replace : with new line
|
||||||
|
echo $PATH|tr ":" "\n" #equivalent with:
|
||||||
|
echo $PATH|tr -t ":" \n
|
||||||
|
|
||||||
|
#remove all occurance of "ab"
|
||||||
|
echo aabbcc |tr -d "ab"
|
||||||
|
#ouput: cc
|
||||||
|
|
||||||
|
#complement "aa"
|
||||||
|
echo aabbccd |tr -c "aa" 1
|
||||||
|
#output: aa11111 without new line
|
||||||
|
#tip: Complement meaning keep aa,all others are replaced with 1
|
||||||
|
|
||||||
|
#complement "ab\n"
|
||||||
|
echo aabbccd |tr -c "ab\n" 1
|
||||||
|
#output: aabb111 with new line
|
||||||
|
|
||||||
|
#Preserve all alpha(-c). ":-[:digit:] etc" will be translated to "\n". sequeeze mode.
|
||||||
|
echo $PATH|tr -cs "[:alpha:]" "\n"
|
||||||
|
|
||||||
|
#ordered list to unordered list
|
||||||
|
echo "1. /usr/bin\n2. /bin" |tr -cs " /[:alpha:]\n" "+"
|
11
cheat/cheatsheets/tree
Normal file
11
cheat/cheatsheets/tree
Normal file
@ -0,0 +1,11 @@
|
|||||||
|
# To display a recursive directory tree
|
||||||
|
tree
|
||||||
|
|
||||||
|
# To make tree output contents from path `/foo/bar`
|
||||||
|
tree /foo/bar
|
||||||
|
|
||||||
|
# To make tree omit any empty directories from the output
|
||||||
|
tree --prune
|
||||||
|
|
||||||
|
# To list directories only (`-d`), and at a max depth of two levels (`-L`)
|
||||||
|
tree -d -L 2
|
11
cheat/cheatsheets/udisksctl
Normal file
11
cheat/cheatsheets/udisksctl
Normal file
@ -0,0 +1,11 @@
|
|||||||
|
# Get info about block device
|
||||||
|
udisksctl info -b <block_device>
|
||||||
|
|
||||||
|
# Mounting device
|
||||||
|
udisksctl mount --block-device <block_device>
|
||||||
|
|
||||||
|
# Unmounting device
|
||||||
|
udisksctl unmount --block-device <block_device>
|
||||||
|
|
||||||
|
# Get help
|
||||||
|
udisksctl help
|
18
cheat/cheatsheets/uniq
Normal file
18
cheat/cheatsheets/uniq
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
# show all lines without duplication
|
||||||
|
# `sort -u` and `uniq` is the same effect.
|
||||||
|
sort file | uniq
|
||||||
|
|
||||||
|
# show not duplicated lines
|
||||||
|
sort file | uniq -u
|
||||||
|
|
||||||
|
# show duplicated lines only
|
||||||
|
sort file | uniq -d
|
||||||
|
|
||||||
|
# count all lines
|
||||||
|
sort file | uniq -c
|
||||||
|
|
||||||
|
# count not duplicated lines
|
||||||
|
sort file | uniq -uc
|
||||||
|
|
||||||
|
# count only duplicated lines
|
||||||
|
sort file | uniq -dc
|
8
cheat/cheatsheets/unzip
Normal file
8
cheat/cheatsheets/unzip
Normal file
@ -0,0 +1,8 @@
|
|||||||
|
# Extract archive
|
||||||
|
unzip archive.zip
|
||||||
|
|
||||||
|
# Test integrity of archive
|
||||||
|
unzip -tq archive.zip
|
||||||
|
|
||||||
|
# List files and directories in a file
|
||||||
|
unzip -l archive.zip
|
33
cheat/cheatsheets/vagrant
Normal file
33
cheat/cheatsheets/vagrant
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
# Initate Vagrant
|
||||||
|
mkdir vag-vm; cd vag-vm
|
||||||
|
vagrant init
|
||||||
|
|
||||||
|
# Add a box to vagrant repo
|
||||||
|
vagrant box add hashicorp/precise32
|
||||||
|
|
||||||
|
# Add a box Vagrant file
|
||||||
|
config.vm.box = "hashicorp/precise32"
|
||||||
|
|
||||||
|
# Add vm to public network as host
|
||||||
|
config.vm.network "public_network"
|
||||||
|
|
||||||
|
# Add provision script to vagrant file
|
||||||
|
config.vm.provision :shell, path: "provision.sh"
|
||||||
|
|
||||||
|
# Start vm
|
||||||
|
vagrant up
|
||||||
|
|
||||||
|
# Connect to started instance
|
||||||
|
vagrant ssh
|
||||||
|
|
||||||
|
# Shutdown vm
|
||||||
|
vagrant halt
|
||||||
|
|
||||||
|
# Hibernate vm
|
||||||
|
vagrant suspend
|
||||||
|
|
||||||
|
# Set vm to initial state by cleaning all data
|
||||||
|
vagrant destroy
|
||||||
|
|
||||||
|
# Restart vm with new provision script
|
||||||
|
vagran reload --provision
|
@ -23,7 +23,8 @@ B previous start of whitespace-delimited word
|
|||||||
$ end of line
|
$ end of line
|
||||||
gg go to first line in file
|
gg go to first line in file
|
||||||
G go to end of file
|
G go to end of file
|
||||||
|
gk move down one displayed line
|
||||||
|
gj move up one displayed line
|
||||||
|
|
||||||
# Insertion
|
# Insertion
|
||||||
# To exit from insert mode use Esc or Ctrl-C
|
# To exit from insert mode use Esc or Ctrl-C
|
||||||
@ -49,8 +50,14 @@ P paste before cursor
|
|||||||
dd delete a line
|
dd delete a line
|
||||||
d{motion} delete text that {motion} moves over
|
d{motion} delete text that {motion} moves over
|
||||||
|
|
||||||
|
# Search and replace with the `:substitute` (aka `:s`) command
|
||||||
|
|
||||||
# Preceding a motion or edition with a number repeats it n times
|
:s/foo/bar/ replace the first match of 'foo' with 'bar' on the current line only
|
||||||
|
:s/foo/bar/g replace all matches (`g` flag) of 'foo' with 'bar' on the current line only
|
||||||
|
:%s/foo/bar/g replace all matches of 'foo' with 'bar' in the entire file (`:%s`)
|
||||||
|
:%s/foo/bar/gc ask to manually confirm (`c` flag) each replacement
|
||||||
|
|
||||||
|
# Preceding a motion or edition with a number repeats it 'n' times
|
||||||
# Examples:
|
# Examples:
|
||||||
50k moves 50 lines up
|
50k moves 50 lines up
|
||||||
2dw deletes 2 words
|
2dw deletes 2 words
|
||||||
|
38
cheat/cheatsheets/virtualenv
Normal file
38
cheat/cheatsheets/virtualenv
Normal file
@ -0,0 +1,38 @@
|
|||||||
|
# Create new environment
|
||||||
|
virtualenv /path/to/project/env_name
|
||||||
|
|
||||||
|
# Create new environment and inherit already installed Python libraries
|
||||||
|
virtualenv --system-site-package /path/to/project/env_name
|
||||||
|
|
||||||
|
# Create new environment with a given Python interpreter
|
||||||
|
virtualenv /path/to/project/env_name -p /usr/bin/python/3.4
|
||||||
|
|
||||||
|
# Activate environnment
|
||||||
|
source /path/to/project/env_name/bin/activate
|
||||||
|
|
||||||
|
# Quit environment
|
||||||
|
deactivate
|
||||||
|
|
||||||
|
|
||||||
|
# virtualenvwrapper (wrapper for virtualenv)
|
||||||
|
# installation
|
||||||
|
pip install --user virtualenvwrapper
|
||||||
|
# configuration
|
||||||
|
# add in ~/.bashrc or similar
|
||||||
|
export WORKON_HOME=~/.virtualenvs
|
||||||
|
mkdir -p $WORKON_HOME
|
||||||
|
source ~/.local/bin/virtualenvwrapper.sh
|
||||||
|
|
||||||
|
# Create new environmment (with virtualenvwrapper)
|
||||||
|
mkvirtualenv env_name
|
||||||
|
# new environmment is stored in ~/.virtualenvs
|
||||||
|
|
||||||
|
# Activate environmment (with virtualenvwrapper)
|
||||||
|
workon env_name
|
||||||
|
|
||||||
|
# Quit environmment (with virtualenvwrapper)
|
||||||
|
deactivate
|
||||||
|
|
||||||
|
# Delete environmment (with virtualenvwrapper)
|
||||||
|
rmvirtualenv env_name
|
||||||
|
|
16
cheat/cheatsheets/weechat
Normal file
16
cheat/cheatsheets/weechat
Normal file
@ -0,0 +1,16 @@
|
|||||||
|
# Set unread marker on all windows
|
||||||
|
Ctrl-s Ctrl-u
|
||||||
|
|
||||||
|
# Switch buffer left
|
||||||
|
Ctrl-p, Alt-left
|
||||||
|
# Switch buffer right
|
||||||
|
Ctrl-n, Alt-right
|
||||||
|
# Next buffer with activity
|
||||||
|
Alt-a
|
||||||
|
# Switch buffers
|
||||||
|
Alt-0...9
|
||||||
|
|
||||||
|
# Scroll buffer title
|
||||||
|
F9/F10
|
||||||
|
# Scroll nick list
|
||||||
|
F11/F12
|
@ -2,7 +2,7 @@
|
|||||||
wget http://path.to.the/file
|
wget http://path.to.the/file
|
||||||
|
|
||||||
# To download a file and change its name
|
# To download a file and change its name
|
||||||
wget http://path.to.the/file -o newname
|
wget http://path.to.the/file -O newname
|
||||||
|
|
||||||
# To download a file into a directory
|
# To download a file into a directory
|
||||||
wget -P path/to/directory http://path.to.the/file
|
wget -P path/to/directory http://path.to.the/file
|
||||||
@ -30,3 +30,6 @@ wget -r -l1 -A.extension http://myserver.com/directory
|
|||||||
|
|
||||||
# Allows you to download just the headers of responses (-S --spider) and display them on Stdout (-O -).
|
# Allows you to download just the headers of responses (-S --spider) and display them on Stdout (-O -).
|
||||||
wget -S --spider -O - http://google.com
|
wget -S --spider -O - http://google.com
|
||||||
|
|
||||||
|
# Change the User-Agent to 'User-Agent: toto'
|
||||||
|
wget -U 'toto' http://google.com
|
||||||
|
11
cheat/cheatsheets/xrandr
Normal file
11
cheat/cheatsheets/xrandr
Normal file
@ -0,0 +1,11 @@
|
|||||||
|
# To enable HDMI2 output with maximal resolution:
|
||||||
|
xrandr --output HDMI2 --auto
|
||||||
|
|
||||||
|
# To enable HDMI2 output with specific resolution:
|
||||||
|
xrandr --output HDMI2 --mode 1280x800
|
||||||
|
|
||||||
|
# To enable HDMI2 output next to HDMI1 output:
|
||||||
|
xrandr --output HDMI2 --auto --right-of HDMI1
|
||||||
|
|
||||||
|
# To disable HDMI2 output:
|
||||||
|
xrandr --output HDMI2 --off
|
@ -22,6 +22,9 @@ yum info <package name>
|
|||||||
# List currently enabled repositories:
|
# List currently enabled repositories:
|
||||||
yum repolist
|
yum repolist
|
||||||
|
|
||||||
|
# List packages containing a certain keyword:
|
||||||
|
yum list <package_name_or_word_to_search>
|
||||||
|
|
||||||
# To download the source RPM for a package:
|
# To download the source RPM for a package:
|
||||||
yumdownloader --source <package name>
|
yumdownloader --source <package name>
|
||||||
|
|
||||||
|
5
cheat/cheatsheets/zip
Normal file
5
cheat/cheatsheets/zip
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
# Create zip file
|
||||||
|
zip archive.zip file1 directory/
|
||||||
|
|
||||||
|
# To list, test and extract zip archives, see unzip
|
||||||
|
cheat unzip
|
21
cheat/cheatsheets/zoneadm
Normal file
21
cheat/cheatsheets/zoneadm
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
# Halt zone
|
||||||
|
zoneadm -z <zone_name> halt
|
||||||
|
|
||||||
|
# Delete Zone
|
||||||
|
zoneadm -z <zone_name> halt
|
||||||
|
zoneadm -z <zone_name> uninstall
|
||||||
|
|
||||||
|
# Verify Zone
|
||||||
|
zoneadm -z <zone_name> verify
|
||||||
|
|
||||||
|
# Installing Zone
|
||||||
|
zoneadm -z <zone_name> install
|
||||||
|
|
||||||
|
# Boot Zone
|
||||||
|
zoneadm -z <zone_name> boot
|
||||||
|
|
||||||
|
# Reboot Zone
|
||||||
|
zoneadm -z <zone_name> reboot
|
||||||
|
|
||||||
|
# List Zones
|
||||||
|
zoneadm list -cv
|
@ -25,28 +25,16 @@ def create_or_edit(sheet):
|
|||||||
# if the cheatsheet does not exist
|
# if the cheatsheet does not exist
|
||||||
if not exists(sheet):
|
if not exists(sheet):
|
||||||
create(sheet)
|
create(sheet)
|
||||||
|
|
||||||
# if the cheatsheet exists and is writeable...
|
# if the cheatsheet exists but not in the default_path, copy it to the
|
||||||
elif exists(sheet) and is_writable(sheet):
|
# default path before editing
|
||||||
|
elif exists(sheet) and not exists_in_default_path(sheet):
|
||||||
|
copy(path(sheet), os.path.join(sheets.default_path(), sheet))
|
||||||
edit(sheet)
|
edit(sheet)
|
||||||
|
|
||||||
# if the cheatsheet exists but is not writable...
|
# if it exists and is in the default path, then just open it
|
||||||
elif exists(sheet) and not is_writable(sheet):
|
else:
|
||||||
# ... ask the user if we should copy the cheatsheet to her home directory for editing
|
edit(sheet)
|
||||||
yes = prompt_yes_or_no(
|
|
||||||
'The ' + sheet + ' sheet is not editable. Do you want to copy it to '
|
|
||||||
'your user cheatsheets directory before editing? Keep in mind that '
|
|
||||||
'your sheet will always be used before system-wide one.'
|
|
||||||
)
|
|
||||||
|
|
||||||
# if yes, copy the cheatsheet to the home directory before editing
|
|
||||||
if yes:
|
|
||||||
copy(path(sheet), os.path.join(sheets.default_path(), sheet))
|
|
||||||
edit(sheet)
|
|
||||||
|
|
||||||
# if no, just abort
|
|
||||||
else:
|
|
||||||
die('Aborting.')
|
|
||||||
|
|
||||||
|
|
||||||
def create(sheet):
|
def create(sheet):
|
||||||
@ -75,6 +63,12 @@ def exists(sheet):
|
|||||||
return sheet in sheets.get() and os.access(path(sheet), os.R_OK)
|
return sheet in sheets.get() and os.access(path(sheet), os.R_OK)
|
||||||
|
|
||||||
|
|
||||||
|
def exists_in_default_path(sheet):
|
||||||
|
""" Predicate that returns true if the sheet exists in default_path"""
|
||||||
|
default_path_sheet = os.path.join(sheets.default_path(), sheet)
|
||||||
|
return sheet in sheets.get() and os.access(default_path_sheet, os.R_OK)
|
||||||
|
|
||||||
|
|
||||||
def is_writable(sheet):
|
def is_writable(sheet):
|
||||||
""" Predicate that returns true if the sheet is writeable """
|
""" Predicate that returns true if the sheet is writeable """
|
||||||
return sheet in sheets.get() and os.access(path(sheet), os.W_OK)
|
return sheet in sheets.get() and os.access(path(sheet), os.W_OK)
|
||||||
|
@ -2,16 +2,9 @@ from cheat import cheatsheets
|
|||||||
from cheat.utils import *
|
from cheat.utils import *
|
||||||
import os
|
import os
|
||||||
|
|
||||||
|
|
||||||
def default_path():
|
def default_path():
|
||||||
""" Returns the default cheatsheet path """
|
""" Returns the default cheatsheet path """
|
||||||
|
|
||||||
# the default path becomes confused when cheat is run as root, so fail
|
|
||||||
# under those circumstances. (There is no good reason to need to run cheat
|
|
||||||
# as root.)
|
|
||||||
if os.name != 'nt' and os.geteuid() == 0:
|
|
||||||
die('Please do not run this application as root.');
|
|
||||||
|
|
||||||
# determine the default cheatsheet dir
|
# determine the default cheatsheet dir
|
||||||
default_sheets_dir = os.environ.get('DEFAULT_CHEAT_DIR') or os.path.join(os.path.expanduser('~'), '.cheat')
|
default_sheets_dir = os.environ.get('DEFAULT_CHEAT_DIR') or os.path.join(os.path.expanduser('~'), '.cheat')
|
||||||
|
|
||||||
@ -35,10 +28,11 @@ def default_path():
|
|||||||
return default_sheets_dir
|
return default_sheets_dir
|
||||||
|
|
||||||
|
|
||||||
# @todo: memoize result
|
|
||||||
def get():
|
def get():
|
||||||
""" Assembles a dictionary of cheatsheets as name => file-path """
|
""" Assembles a dictionary of cheatsheets as name => file-path """
|
||||||
cheats = {}
|
cheats = {}
|
||||||
|
|
||||||
|
# otherwise, scan the filesystem
|
||||||
for cheat_dir in reversed(paths()):
|
for cheat_dir in reversed(paths()):
|
||||||
cheats.update(
|
cheats.update(
|
||||||
dict([
|
dict([
|
||||||
|
@ -1,3 +1,4 @@
|
|||||||
|
from __future__ import print_function
|
||||||
import os
|
import os
|
||||||
import sys
|
import sys
|
||||||
|
|
||||||
@ -23,7 +24,7 @@ def colorize(sheet_content):
|
|||||||
|
|
||||||
def die(message):
|
def die(message):
|
||||||
""" Prints a message to stderr and then terminates """
|
""" Prints a message to stderr and then terminates """
|
||||||
warn (message)
|
warn(message)
|
||||||
exit(1)
|
exit(1)
|
||||||
|
|
||||||
|
|
||||||
@ -47,10 +48,18 @@ def editor():
|
|||||||
|
|
||||||
def prompt_yes_or_no(question):
|
def prompt_yes_or_no(question):
|
||||||
""" Prompts the user with a yes-or-no question """
|
""" Prompts the user with a yes-or-no question """
|
||||||
|
# Support Python 2 and 3 input
|
||||||
|
# Default to Python 2's input()
|
||||||
|
get_input = raw_input
|
||||||
|
|
||||||
|
# If this is Python 3, use input()
|
||||||
|
if sys.version_info[:2] >= (3, 0):
|
||||||
|
get_input = input
|
||||||
|
|
||||||
print(question)
|
print(question)
|
||||||
return raw_input('[y/n] ') == 'y'
|
return get_input('[y/n] ') == 'y'
|
||||||
|
|
||||||
|
|
||||||
def warn(message):
|
def warn(message):
|
||||||
""" Prints a message to stderr """
|
""" Prints a message to stderr """
|
||||||
print >> sys.stderr, (message)
|
print((message), file=sys.stderr)
|
||||||
|
674
licenses/gpl-3.txt
Normal file
674
licenses/gpl-3.txt
Normal file
@ -0,0 +1,674 @@
|
|||||||
|
GNU GENERAL PUBLIC LICENSE
|
||||||
|
Version 3, 29 June 2007
|
||||||
|
|
||||||
|
Copyright (C) 2007 Free Software Foundation, Inc. <http://fsf.org/>
|
||||||
|
Everyone is permitted to copy and distribute verbatim copies
|
||||||
|
of this license document, but changing it is not allowed.
|
||||||
|
|
||||||
|
Preamble
|
||||||
|
|
||||||
|
The GNU General Public License is a free, copyleft license for
|
||||||
|
software and other kinds of works.
|
||||||
|
|
||||||
|
The licenses for most software and other practical works are designed
|
||||||
|
to take away your freedom to share and change the works. By contrast,
|
||||||
|
the GNU General Public License is intended to guarantee your freedom to
|
||||||
|
share and change all versions of a program--to make sure it remains free
|
||||||
|
software for all its users. We, the Free Software Foundation, use the
|
||||||
|
GNU General Public License for most of our software; it applies also to
|
||||||
|
any other work released this way by its authors. You can apply it to
|
||||||
|
your programs, too.
|
||||||
|
|
||||||
|
When we speak of free software, we are referring to freedom, not
|
||||||
|
price. Our General Public Licenses are designed to make sure that you
|
||||||
|
have the freedom to distribute copies of free software (and charge for
|
||||||
|
them if you wish), that you receive source code or can get it if you
|
||||||
|
want it, that you can change the software or use pieces of it in new
|
||||||
|
free programs, and that you know you can do these things.
|
||||||
|
|
||||||
|
To protect your rights, we need to prevent others from denying you
|
||||||
|
these rights or asking you to surrender the rights. Therefore, you have
|
||||||
|
certain responsibilities if you distribute copies of the software, or if
|
||||||
|
you modify it: responsibilities to respect the freedom of others.
|
||||||
|
|
||||||
|
For example, if you distribute copies of such a program, whether
|
||||||
|
gratis or for a fee, you must pass on to the recipients the same
|
||||||
|
freedoms that you received. You must make sure that they, too, receive
|
||||||
|
or can get the source code. And you must show them these terms so they
|
||||||
|
know their rights.
|
||||||
|
|
||||||
|
Developers that use the GNU GPL protect your rights with two steps:
|
||||||
|
(1) assert copyright on the software, and (2) offer you this License
|
||||||
|
giving you legal permission to copy, distribute and/or modify it.
|
||||||
|
|
||||||
|
For the developers' and authors' protection, the GPL clearly explains
|
||||||
|
that there is no warranty for this free software. For both users' and
|
||||||
|
authors' sake, the GPL requires that modified versions be marked as
|
||||||
|
changed, so that their problems will not be attributed erroneously to
|
||||||
|
authors of previous versions.
|
||||||
|
|
||||||
|
Some devices are designed to deny users access to install or run
|
||||||
|
modified versions of the software inside them, although the manufacturer
|
||||||
|
can do so. This is fundamentally incompatible with the aim of
|
||||||
|
protecting users' freedom to change the software. The systematic
|
||||||
|
pattern of such abuse occurs in the area of products for individuals to
|
||||||
|
use, which is precisely where it is most unacceptable. Therefore, we
|
||||||
|
have designed this version of the GPL to prohibit the practice for those
|
||||||
|
products. If such problems arise substantially in other domains, we
|
||||||
|
stand ready to extend this provision to those domains in future versions
|
||||||
|
of the GPL, as needed to protect the freedom of users.
|
||||||
|
|
||||||
|
Finally, every program is threatened constantly by software patents.
|
||||||
|
States should not allow patents to restrict development and use of
|
||||||
|
software on general-purpose computers, but in those that do, we wish to
|
||||||
|
avoid the special danger that patents applied to a free program could
|
||||||
|
make it effectively proprietary. To prevent this, the GPL assures that
|
||||||
|
patents cannot be used to render the program non-free.
|
||||||
|
|
||||||
|
The precise terms and conditions for copying, distribution and
|
||||||
|
modification follow.
|
||||||
|
|
||||||
|
TERMS AND CONDITIONS
|
||||||
|
|
||||||
|
0. Definitions.
|
||||||
|
|
||||||
|
"This License" refers to version 3 of the GNU General Public License.
|
||||||
|
|
||||||
|
"Copyright" also means copyright-like laws that apply to other kinds of
|
||||||
|
works, such as semiconductor masks.
|
||||||
|
|
||||||
|
"The Program" refers to any copyrightable work licensed under this
|
||||||
|
License. Each licensee is addressed as "you". "Licensees" and
|
||||||
|
"recipients" may be individuals or organizations.
|
||||||
|
|
||||||
|
To "modify" a work means to copy from or adapt all or part of the work
|
||||||
|
in a fashion requiring copyright permission, other than the making of an
|
||||||
|
exact copy. The resulting work is called a "modified version" of the
|
||||||
|
earlier work or a work "based on" the earlier work.
|
||||||
|
|
||||||
|
A "covered work" means either the unmodified Program or a work based
|
||||||
|
on the Program.
|
||||||
|
|
||||||
|
To "propagate" a work means to do anything with it that, without
|
||||||
|
permission, would make you directly or secondarily liable for
|
||||||
|
infringement under applicable copyright law, except executing it on a
|
||||||
|
computer or modifying a private copy. Propagation includes copying,
|
||||||
|
distribution (with or without modification), making available to the
|
||||||
|
public, and in some countries other activities as well.
|
||||||
|
|
||||||
|
To "convey" a work means any kind of propagation that enables other
|
||||||
|
parties to make or receive copies. Mere interaction with a user through
|
||||||
|
a computer network, with no transfer of a copy, is not conveying.
|
||||||
|
|
||||||
|
An interactive user interface displays "Appropriate Legal Notices"
|
||||||
|
to the extent that it includes a convenient and prominently visible
|
||||||
|
feature that (1) displays an appropriate copyright notice, and (2)
|
||||||
|
tells the user that there is no warranty for the work (except to the
|
||||||
|
extent that warranties are provided), that licensees may convey the
|
||||||
|
work under this License, and how to view a copy of this License. If
|
||||||
|
the interface presents a list of user commands or options, such as a
|
||||||
|
menu, a prominent item in the list meets this criterion.
|
||||||
|
|
||||||
|
1. Source Code.
|
||||||
|
|
||||||
|
The "source code" for a work means the preferred form of the work
|
||||||
|
for making modifications to it. "Object code" means any non-source
|
||||||
|
form of a work.
|
||||||
|
|
||||||
|
A "Standard Interface" means an interface that either is an official
|
||||||
|
standard defined by a recognized standards body, or, in the case of
|
||||||
|
interfaces specified for a particular programming language, one that
|
||||||
|
is widely used among developers working in that language.
|
||||||
|
|
||||||
|
The "System Libraries" of an executable work include anything, other
|
||||||
|
than the work as a whole, that (a) is included in the normal form of
|
||||||
|
packaging a Major Component, but which is not part of that Major
|
||||||
|
Component, and (b) serves only to enable use of the work with that
|
||||||
|
Major Component, or to implement a Standard Interface for which an
|
||||||
|
implementation is available to the public in source code form. A
|
||||||
|
"Major Component", in this context, means a major essential component
|
||||||
|
(kernel, window system, and so on) of the specific operating system
|
||||||
|
(if any) on which the executable work runs, or a compiler used to
|
||||||
|
produce the work, or an object code interpreter used to run it.
|
||||||
|
|
||||||
|
The "Corresponding Source" for a work in object code form means all
|
||||||
|
the source code needed to generate, install, and (for an executable
|
||||||
|
work) run the object code and to modify the work, including scripts to
|
||||||
|
control those activities. However, it does not include the work's
|
||||||
|
System Libraries, or general-purpose tools or generally available free
|
||||||
|
programs which are used unmodified in performing those activities but
|
||||||
|
which are not part of the work. For example, Corresponding Source
|
||||||
|
includes interface definition files associated with source files for
|
||||||
|
the work, and the source code for shared libraries and dynamically
|
||||||
|
linked subprograms that the work is specifically designed to require,
|
||||||
|
such as by intimate data communication or control flow between those
|
||||||
|
subprograms and other parts of the work.
|
||||||
|
|
||||||
|
The Corresponding Source need not include anything that users
|
||||||
|
can regenerate automatically from other parts of the Corresponding
|
||||||
|
Source.
|
||||||
|
|
||||||
|
The Corresponding Source for a work in source code form is that
|
||||||
|
same work.
|
||||||
|
|
||||||
|
2. Basic Permissions.
|
||||||
|
|
||||||
|
All rights granted under this License are granted for the term of
|
||||||
|
copyright on the Program, and are irrevocable provided the stated
|
||||||
|
conditions are met. This License explicitly affirms your unlimited
|
||||||
|
permission to run the unmodified Program. The output from running a
|
||||||
|
covered work is covered by this License only if the output, given its
|
||||||
|
content, constitutes a covered work. This License acknowledges your
|
||||||
|
rights of fair use or other equivalent, as provided by copyright law.
|
||||||
|
|
||||||
|
You may make, run and propagate covered works that you do not
|
||||||
|
convey, without conditions so long as your license otherwise remains
|
||||||
|
in force. You may convey covered works to others for the sole purpose
|
||||||
|
of having them make modifications exclusively for you, or provide you
|
||||||
|
with facilities for running those works, provided that you comply with
|
||||||
|
the terms of this License in conveying all material for which you do
|
||||||
|
not control copyright. Those thus making or running the covered works
|
||||||
|
for you must do so exclusively on your behalf, under your direction
|
||||||
|
and control, on terms that prohibit them from making any copies of
|
||||||
|
your copyrighted material outside their relationship with you.
|
||||||
|
|
||||||
|
Conveying under any other circumstances is permitted solely under
|
||||||
|
the conditions stated below. Sublicensing is not allowed; section 10
|
||||||
|
makes it unnecessary.
|
||||||
|
|
||||||
|
3. Protecting Users' Legal Rights From Anti-Circumvention Law.
|
||||||
|
|
||||||
|
No covered work shall be deemed part of an effective technological
|
||||||
|
measure under any applicable law fulfilling obligations under article
|
||||||
|
11 of the WIPO copyright treaty adopted on 20 December 1996, or
|
||||||
|
similar laws prohibiting or restricting circumvention of such
|
||||||
|
measures.
|
||||||
|
|
||||||
|
When you convey a covered work, you waive any legal power to forbid
|
||||||
|
circumvention of technological measures to the extent such circumvention
|
||||||
|
is effected by exercising rights under this License with respect to
|
||||||
|
the covered work, and you disclaim any intention to limit operation or
|
||||||
|
modification of the work as a means of enforcing, against the work's
|
||||||
|
users, your or third parties' legal rights to forbid circumvention of
|
||||||
|
technological measures.
|
||||||
|
|
||||||
|
4. Conveying Verbatim Copies.
|
||||||
|
|
||||||
|
You may convey verbatim copies of the Program's source code as you
|
||||||
|
receive it, in any medium, provided that you conspicuously and
|
||||||
|
appropriately publish on each copy an appropriate copyright notice;
|
||||||
|
keep intact all notices stating that this License and any
|
||||||
|
non-permissive terms added in accord with section 7 apply to the code;
|
||||||
|
keep intact all notices of the absence of any warranty; and give all
|
||||||
|
recipients a copy of this License along with the Program.
|
||||||
|
|
||||||
|
You may charge any price or no price for each copy that you convey,
|
||||||
|
and you may offer support or warranty protection for a fee.
|
||||||
|
|
||||||
|
5. Conveying Modified Source Versions.
|
||||||
|
|
||||||
|
You may convey a work based on the Program, or the modifications to
|
||||||
|
produce it from the Program, in the form of source code under the
|
||||||
|
terms of section 4, provided that you also meet all of these conditions:
|
||||||
|
|
||||||
|
a) The work must carry prominent notices stating that you modified
|
||||||
|
it, and giving a relevant date.
|
||||||
|
|
||||||
|
b) The work must carry prominent notices stating that it is
|
||||||
|
released under this License and any conditions added under section
|
||||||
|
7. This requirement modifies the requirement in section 4 to
|
||||||
|
"keep intact all notices".
|
||||||
|
|
||||||
|
c) You must license the entire work, as a whole, under this
|
||||||
|
License to anyone who comes into possession of a copy. This
|
||||||
|
License will therefore apply, along with any applicable section 7
|
||||||
|
additional terms, to the whole of the work, and all its parts,
|
||||||
|
regardless of how they are packaged. This License gives no
|
||||||
|
permission to license the work in any other way, but it does not
|
||||||
|
invalidate such permission if you have separately received it.
|
||||||
|
|
||||||
|
d) If the work has interactive user interfaces, each must display
|
||||||
|
Appropriate Legal Notices; however, if the Program has interactive
|
||||||
|
interfaces that do not display Appropriate Legal Notices, your
|
||||||
|
work need not make them do so.
|
||||||
|
|
||||||
|
A compilation of a covered work with other separate and independent
|
||||||
|
works, which are not by their nature extensions of the covered work,
|
||||||
|
and which are not combined with it such as to form a larger program,
|
||||||
|
in or on a volume of a storage or distribution medium, is called an
|
||||||
|
"aggregate" if the compilation and its resulting copyright are not
|
||||||
|
used to limit the access or legal rights of the compilation's users
|
||||||
|
beyond what the individual works permit. Inclusion of a covered work
|
||||||
|
in an aggregate does not cause this License to apply to the other
|
||||||
|
parts of the aggregate.
|
||||||
|
|
||||||
|
6. Conveying Non-Source Forms.
|
||||||
|
|
||||||
|
You may convey a covered work in object code form under the terms
|
||||||
|
of sections 4 and 5, provided that you also convey the
|
||||||
|
machine-readable Corresponding Source under the terms of this License,
|
||||||
|
in one of these ways:
|
||||||
|
|
||||||
|
a) Convey the object code in, or embodied in, a physical product
|
||||||
|
(including a physical distribution medium), accompanied by the
|
||||||
|
Corresponding Source fixed on a durable physical medium
|
||||||
|
customarily used for software interchange.
|
||||||
|
|
||||||
|
b) Convey the object code in, or embodied in, a physical product
|
||||||
|
(including a physical distribution medium), accompanied by a
|
||||||
|
written offer, valid for at least three years and valid for as
|
||||||
|
long as you offer spare parts or customer support for that product
|
||||||
|
model, to give anyone who possesses the object code either (1) a
|
||||||
|
copy of the Corresponding Source for all the software in the
|
||||||
|
product that is covered by this License, on a durable physical
|
||||||
|
medium customarily used for software interchange, for a price no
|
||||||
|
more than your reasonable cost of physically performing this
|
||||||
|
conveying of source, or (2) access to copy the
|
||||||
|
Corresponding Source from a network server at no charge.
|
||||||
|
|
||||||
|
c) Convey individual copies of the object code with a copy of the
|
||||||
|
written offer to provide the Corresponding Source. This
|
||||||
|
alternative is allowed only occasionally and noncommercially, and
|
||||||
|
only if you received the object code with such an offer, in accord
|
||||||
|
with subsection 6b.
|
||||||
|
|
||||||
|
d) Convey the object code by offering access from a designated
|
||||||
|
place (gratis or for a charge), and offer equivalent access to the
|
||||||
|
Corresponding Source in the same way through the same place at no
|
||||||
|
further charge. You need not require recipients to copy the
|
||||||
|
Corresponding Source along with the object code. If the place to
|
||||||
|
copy the object code is a network server, the Corresponding Source
|
||||||
|
may be on a different server (operated by you or a third party)
|
||||||
|
that supports equivalent copying facilities, provided you maintain
|
||||||
|
clear directions next to the object code saying where to find the
|
||||||
|
Corresponding Source. Regardless of what server hosts the
|
||||||
|
Corresponding Source, you remain obligated to ensure that it is
|
||||||
|
available for as long as needed to satisfy these requirements.
|
||||||
|
|
||||||
|
e) Convey the object code using peer-to-peer transmission, provided
|
||||||
|
you inform other peers where the object code and Corresponding
|
||||||
|
Source of the work are being offered to the general public at no
|
||||||
|
charge under subsection 6d.
|
||||||
|
|
||||||
|
A separable portion of the object code, whose source code is excluded
|
||||||
|
from the Corresponding Source as a System Library, need not be
|
||||||
|
included in conveying the object code work.
|
||||||
|
|
||||||
|
A "User Product" is either (1) a "consumer product", which means any
|
||||||
|
tangible personal property which is normally used for personal, family,
|
||||||
|
or household purposes, or (2) anything designed or sold for incorporation
|
||||||
|
into a dwelling. In determining whether a product is a consumer product,
|
||||||
|
doubtful cases shall be resolved in favor of coverage. For a particular
|
||||||
|
product received by a particular user, "normally used" refers to a
|
||||||
|
typical or common use of that class of product, regardless of the status
|
||||||
|
of the particular user or of the way in which the particular user
|
||||||
|
actually uses, or expects or is expected to use, the product. A product
|
||||||
|
is a consumer product regardless of whether the product has substantial
|
||||||
|
commercial, industrial or non-consumer uses, unless such uses represent
|
||||||
|
the only significant mode of use of the product.
|
||||||
|
|
||||||
|
"Installation Information" for a User Product means any methods,
|
||||||
|
procedures, authorization keys, or other information required to install
|
||||||
|
and execute modified versions of a covered work in that User Product from
|
||||||
|
a modified version of its Corresponding Source. The information must
|
||||||
|
suffice to ensure that the continued functioning of the modified object
|
||||||
|
code is in no case prevented or interfered with solely because
|
||||||
|
modification has been made.
|
||||||
|
|
||||||
|
If you convey an object code work under this section in, or with, or
|
||||||
|
specifically for use in, a User Product, and the conveying occurs as
|
||||||
|
part of a transaction in which the right of possession and use of the
|
||||||
|
User Product is transferred to the recipient in perpetuity or for a
|
||||||
|
fixed term (regardless of how the transaction is characterized), the
|
||||||
|
Corresponding Source conveyed under this section must be accompanied
|
||||||
|
by the Installation Information. But this requirement does not apply
|
||||||
|
if neither you nor any third party retains the ability to install
|
||||||
|
modified object code on the User Product (for example, the work has
|
||||||
|
been installed in ROM).
|
||||||
|
|
||||||
|
The requirement to provide Installation Information does not include a
|
||||||
|
requirement to continue to provide support service, warranty, or updates
|
||||||
|
for a work that has been modified or installed by the recipient, or for
|
||||||
|
the User Product in which it has been modified or installed. Access to a
|
||||||
|
network may be denied when the modification itself materially and
|
||||||
|
adversely affects the operation of the network or violates the rules and
|
||||||
|
protocols for communication across the network.
|
||||||
|
|
||||||
|
Corresponding Source conveyed, and Installation Information provided,
|
||||||
|
in accord with this section must be in a format that is publicly
|
||||||
|
documented (and with an implementation available to the public in
|
||||||
|
source code form), and must require no special password or key for
|
||||||
|
unpacking, reading or copying.
|
||||||
|
|
||||||
|
7. Additional Terms.
|
||||||
|
|
||||||
|
"Additional permissions" are terms that supplement the terms of this
|
||||||
|
License by making exceptions from one or more of its conditions.
|
||||||
|
Additional permissions that are applicable to the entire Program shall
|
||||||
|
be treated as though they were included in this License, to the extent
|
||||||
|
that they are valid under applicable law. If additional permissions
|
||||||
|
apply only to part of the Program, that part may be used separately
|
||||||
|
under those permissions, but the entire Program remains governed by
|
||||||
|
this License without regard to the additional permissions.
|
||||||
|
|
||||||
|
When you convey a copy of a covered work, you may at your option
|
||||||
|
remove any additional permissions from that copy, or from any part of
|
||||||
|
it. (Additional permissions may be written to require their own
|
||||||
|
removal in certain cases when you modify the work.) You may place
|
||||||
|
additional permissions on material, added by you to a covered work,
|
||||||
|
for which you have or can give appropriate copyright permission.
|
||||||
|
|
||||||
|
Notwithstanding any other provision of this License, for material you
|
||||||
|
add to a covered work, you may (if authorized by the copyright holders of
|
||||||
|
that material) supplement the terms of this License with terms:
|
||||||
|
|
||||||
|
a) Disclaiming warranty or limiting liability differently from the
|
||||||
|
terms of sections 15 and 16 of this License; or
|
||||||
|
|
||||||
|
b) Requiring preservation of specified reasonable legal notices or
|
||||||
|
author attributions in that material or in the Appropriate Legal
|
||||||
|
Notices displayed by works containing it; or
|
||||||
|
|
||||||
|
c) Prohibiting misrepresentation of the origin of that material, or
|
||||||
|
requiring that modified versions of such material be marked in
|
||||||
|
reasonable ways as different from the original version; or
|
||||||
|
|
||||||
|
d) Limiting the use for publicity purposes of names of licensors or
|
||||||
|
authors of the material; or
|
||||||
|
|
||||||
|
e) Declining to grant rights under trademark law for use of some
|
||||||
|
trade names, trademarks, or service marks; or
|
||||||
|
|
||||||
|
f) Requiring indemnification of licensors and authors of that
|
||||||
|
material by anyone who conveys the material (or modified versions of
|
||||||
|
it) with contractual assumptions of liability to the recipient, for
|
||||||
|
any liability that these contractual assumptions directly impose on
|
||||||
|
those licensors and authors.
|
||||||
|
|
||||||
|
All other non-permissive additional terms are considered "further
|
||||||
|
restrictions" within the meaning of section 10. If the Program as you
|
||||||
|
received it, or any part of it, contains a notice stating that it is
|
||||||
|
governed by this License along with a term that is a further
|
||||||
|
restriction, you may remove that term. If a license document contains
|
||||||
|
a further restriction but permits relicensing or conveying under this
|
||||||
|
License, you may add to a covered work material governed by the terms
|
||||||
|
of that license document, provided that the further restriction does
|
||||||
|
not survive such relicensing or conveying.
|
||||||
|
|
||||||
|
If you add terms to a covered work in accord with this section, you
|
||||||
|
must place, in the relevant source files, a statement of the
|
||||||
|
additional terms that apply to those files, or a notice indicating
|
||||||
|
where to find the applicable terms.
|
||||||
|
|
||||||
|
Additional terms, permissive or non-permissive, may be stated in the
|
||||||
|
form of a separately written license, or stated as exceptions;
|
||||||
|
the above requirements apply either way.
|
||||||
|
|
||||||
|
8. Termination.
|
||||||
|
|
||||||
|
You may not propagate or modify a covered work except as expressly
|
||||||
|
provided under this License. Any attempt otherwise to propagate or
|
||||||
|
modify it is void, and will automatically terminate your rights under
|
||||||
|
this License (including any patent licenses granted under the third
|
||||||
|
paragraph of section 11).
|
||||||
|
|
||||||
|
However, if you cease all violation of this License, then your
|
||||||
|
license from a particular copyright holder is reinstated (a)
|
||||||
|
provisionally, unless and until the copyright holder explicitly and
|
||||||
|
finally terminates your license, and (b) permanently, if the copyright
|
||||||
|
holder fails to notify you of the violation by some reasonable means
|
||||||
|
prior to 60 days after the cessation.
|
||||||
|
|
||||||
|
Moreover, your license from a particular copyright holder is
|
||||||
|
reinstated permanently if the copyright holder notifies you of the
|
||||||
|
violation by some reasonable means, this is the first time you have
|
||||||
|
received notice of violation of this License (for any work) from that
|
||||||
|
copyright holder, and you cure the violation prior to 30 days after
|
||||||
|
your receipt of the notice.
|
||||||
|
|
||||||
|
Termination of your rights under this section does not terminate the
|
||||||
|
licenses of parties who have received copies or rights from you under
|
||||||
|
this License. If your rights have been terminated and not permanently
|
||||||
|
reinstated, you do not qualify to receive new licenses for the same
|
||||||
|
material under section 10.
|
||||||
|
|
||||||
|
9. Acceptance Not Required for Having Copies.
|
||||||
|
|
||||||
|
You are not required to accept this License in order to receive or
|
||||||
|
run a copy of the Program. Ancillary propagation of a covered work
|
||||||
|
occurring solely as a consequence of using peer-to-peer transmission
|
||||||
|
to receive a copy likewise does not require acceptance. However,
|
||||||
|
nothing other than this License grants you permission to propagate or
|
||||||
|
modify any covered work. These actions infringe copyright if you do
|
||||||
|
not accept this License. Therefore, by modifying or propagating a
|
||||||
|
covered work, you indicate your acceptance of this License to do so.
|
||||||
|
|
||||||
|
10. Automatic Licensing of Downstream Recipients.
|
||||||
|
|
||||||
|
Each time you convey a covered work, the recipient automatically
|
||||||
|
receives a license from the original licensors, to run, modify and
|
||||||
|
propagate that work, subject to this License. You are not responsible
|
||||||
|
for enforcing compliance by third parties with this License.
|
||||||
|
|
||||||
|
An "entity transaction" is a transaction transferring control of an
|
||||||
|
organization, or substantially all assets of one, or subdividing an
|
||||||
|
organization, or merging organizations. If propagation of a covered
|
||||||
|
work results from an entity transaction, each party to that
|
||||||
|
transaction who receives a copy of the work also receives whatever
|
||||||
|
licenses to the work the party's predecessor in interest had or could
|
||||||
|
give under the previous paragraph, plus a right to possession of the
|
||||||
|
Corresponding Source of the work from the predecessor in interest, if
|
||||||
|
the predecessor has it or can get it with reasonable efforts.
|
||||||
|
|
||||||
|
You may not impose any further restrictions on the exercise of the
|
||||||
|
rights granted or affirmed under this License. For example, you may
|
||||||
|
not impose a license fee, royalty, or other charge for exercise of
|
||||||
|
rights granted under this License, and you may not initiate litigation
|
||||||
|
(including a cross-claim or counterclaim in a lawsuit) alleging that
|
||||||
|
any patent claim is infringed by making, using, selling, offering for
|
||||||
|
sale, or importing the Program or any portion of it.
|
||||||
|
|
||||||
|
11. Patents.
|
||||||
|
|
||||||
|
A "contributor" is a copyright holder who authorizes use under this
|
||||||
|
License of the Program or a work on which the Program is based. The
|
||||||
|
work thus licensed is called the contributor's "contributor version".
|
||||||
|
|
||||||
|
A contributor's "essential patent claims" are all patent claims
|
||||||
|
owned or controlled by the contributor, whether already acquired or
|
||||||
|
hereafter acquired, that would be infringed by some manner, permitted
|
||||||
|
by this License, of making, using, or selling its contributor version,
|
||||||
|
but do not include claims that would be infringed only as a
|
||||||
|
consequence of further modification of the contributor version. For
|
||||||
|
purposes of this definition, "control" includes the right to grant
|
||||||
|
patent sublicenses in a manner consistent with the requirements of
|
||||||
|
this License.
|
||||||
|
|
||||||
|
Each contributor grants you a non-exclusive, worldwide, royalty-free
|
||||||
|
patent license under the contributor's essential patent claims, to
|
||||||
|
make, use, sell, offer for sale, import and otherwise run, modify and
|
||||||
|
propagate the contents of its contributor version.
|
||||||
|
|
||||||
|
In the following three paragraphs, a "patent license" is any express
|
||||||
|
agreement or commitment, however denominated, not to enforce a patent
|
||||||
|
(such as an express permission to practice a patent or covenant not to
|
||||||
|
sue for patent infringement). To "grant" such a patent license to a
|
||||||
|
party means to make such an agreement or commitment not to enforce a
|
||||||
|
patent against the party.
|
||||||
|
|
||||||
|
If you convey a covered work, knowingly relying on a patent license,
|
||||||
|
and the Corresponding Source of the work is not available for anyone
|
||||||
|
to copy, free of charge and under the terms of this License, through a
|
||||||
|
publicly available network server or other readily accessible means,
|
||||||
|
then you must either (1) cause the Corresponding Source to be so
|
||||||
|
available, or (2) arrange to deprive yourself of the benefit of the
|
||||||
|
patent license for this particular work, or (3) arrange, in a manner
|
||||||
|
consistent with the requirements of this License, to extend the patent
|
||||||
|
license to downstream recipients. "Knowingly relying" means you have
|
||||||
|
actual knowledge that, but for the patent license, your conveying the
|
||||||
|
covered work in a country, or your recipient's use of the covered work
|
||||||
|
in a country, would infringe one or more identifiable patents in that
|
||||||
|
country that you have reason to believe are valid.
|
||||||
|
|
||||||
|
If, pursuant to or in connection with a single transaction or
|
||||||
|
arrangement, you convey, or propagate by procuring conveyance of, a
|
||||||
|
covered work, and grant a patent license to some of the parties
|
||||||
|
receiving the covered work authorizing them to use, propagate, modify
|
||||||
|
or convey a specific copy of the covered work, then the patent license
|
||||||
|
you grant is automatically extended to all recipients of the covered
|
||||||
|
work and works based on it.
|
||||||
|
|
||||||
|
A patent license is "discriminatory" if it does not include within
|
||||||
|
the scope of its coverage, prohibits the exercise of, or is
|
||||||
|
conditioned on the non-exercise of one or more of the rights that are
|
||||||
|
specifically granted under this License. You may not convey a covered
|
||||||
|
work if you are a party to an arrangement with a third party that is
|
||||||
|
in the business of distributing software, under which you make payment
|
||||||
|
to the third party based on the extent of your activity of conveying
|
||||||
|
the work, and under which the third party grants, to any of the
|
||||||
|
parties who would receive the covered work from you, a discriminatory
|
||||||
|
patent license (a) in connection with copies of the covered work
|
||||||
|
conveyed by you (or copies made from those copies), or (b) primarily
|
||||||
|
for and in connection with specific products or compilations that
|
||||||
|
contain the covered work, unless you entered into that arrangement,
|
||||||
|
or that patent license was granted, prior to 28 March 2007.
|
||||||
|
|
||||||
|
Nothing in this License shall be construed as excluding or limiting
|
||||||
|
any implied license or other defenses to infringement that may
|
||||||
|
otherwise be available to you under applicable patent law.
|
||||||
|
|
||||||
|
12. No Surrender of Others' Freedom.
|
||||||
|
|
||||||
|
If conditions are imposed on you (whether by court order, agreement or
|
||||||
|
otherwise) that contradict the conditions of this License, they do not
|
||||||
|
excuse you from the conditions of this License. If you cannot convey a
|
||||||
|
covered work so as to satisfy simultaneously your obligations under this
|
||||||
|
License and any other pertinent obligations, then as a consequence you may
|
||||||
|
not convey it at all. For example, if you agree to terms that obligate you
|
||||||
|
to collect a royalty for further conveying from those to whom you convey
|
||||||
|
the Program, the only way you could satisfy both those terms and this
|
||||||
|
License would be to refrain entirely from conveying the Program.
|
||||||
|
|
||||||
|
13. Use with the GNU Affero General Public License.
|
||||||
|
|
||||||
|
Notwithstanding any other provision of this License, you have
|
||||||
|
permission to link or combine any covered work with a work licensed
|
||||||
|
under version 3 of the GNU Affero General Public License into a single
|
||||||
|
combined work, and to convey the resulting work. The terms of this
|
||||||
|
License will continue to apply to the part which is the covered work,
|
||||||
|
but the special requirements of the GNU Affero General Public License,
|
||||||
|
section 13, concerning interaction through a network will apply to the
|
||||||
|
combination as such.
|
||||||
|
|
||||||
|
14. Revised Versions of this License.
|
||||||
|
|
||||||
|
The Free Software Foundation may publish revised and/or new versions of
|
||||||
|
the GNU General Public License from time to time. Such new versions will
|
||||||
|
be similar in spirit to the present version, but may differ in detail to
|
||||||
|
address new problems or concerns.
|
||||||
|
|
||||||
|
Each version is given a distinguishing version number. If the
|
||||||
|
Program specifies that a certain numbered version of the GNU General
|
||||||
|
Public License "or any later version" applies to it, you have the
|
||||||
|
option of following the terms and conditions either of that numbered
|
||||||
|
version or of any later version published by the Free Software
|
||||||
|
Foundation. If the Program does not specify a version number of the
|
||||||
|
GNU General Public License, you may choose any version ever published
|
||||||
|
by the Free Software Foundation.
|
||||||
|
|
||||||
|
If the Program specifies that a proxy can decide which future
|
||||||
|
versions of the GNU General Public License can be used, that proxy's
|
||||||
|
public statement of acceptance of a version permanently authorizes you
|
||||||
|
to choose that version for the Program.
|
||||||
|
|
||||||
|
Later license versions may give you additional or different
|
||||||
|
permissions. However, no additional obligations are imposed on any
|
||||||
|
author or copyright holder as a result of your choosing to follow a
|
||||||
|
later version.
|
||||||
|
|
||||||
|
15. Disclaimer of Warranty.
|
||||||
|
|
||||||
|
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
|
||||||
|
APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
|
||||||
|
HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY
|
||||||
|
OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
|
||||||
|
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||||
|
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM
|
||||||
|
IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
|
||||||
|
ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
|
||||||
|
|
||||||
|
16. Limitation of Liability.
|
||||||
|
|
||||||
|
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
|
||||||
|
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS
|
||||||
|
THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
|
||||||
|
GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
|
||||||
|
USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
|
||||||
|
DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
|
||||||
|
PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
|
||||||
|
EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
|
||||||
|
SUCH DAMAGES.
|
||||||
|
|
||||||
|
17. Interpretation of Sections 15 and 16.
|
||||||
|
|
||||||
|
If the disclaimer of warranty and limitation of liability provided
|
||||||
|
above cannot be given local legal effect according to their terms,
|
||||||
|
reviewing courts shall apply local law that most closely approximates
|
||||||
|
an absolute waiver of all civil liability in connection with the
|
||||||
|
Program, unless a warranty or assumption of liability accompanies a
|
||||||
|
copy of the Program in return for a fee.
|
||||||
|
|
||||||
|
END OF TERMS AND CONDITIONS
|
||||||
|
|
||||||
|
How to Apply These Terms to Your New Programs
|
||||||
|
|
||||||
|
If you develop a new program, and you want it to be of the greatest
|
||||||
|
possible use to the public, the best way to achieve this is to make it
|
||||||
|
free software which everyone can redistribute and change under these terms.
|
||||||
|
|
||||||
|
To do so, attach the following notices to the program. It is safest
|
||||||
|
to attach them to the start of each source file to most effectively
|
||||||
|
state the exclusion of warranty; and each file should have at least
|
||||||
|
the "copyright" line and a pointer to where the full notice is found.
|
||||||
|
|
||||||
|
<one line to give the program's name and a brief idea of what it does.>
|
||||||
|
Copyright (C) <year> <name of author>
|
||||||
|
|
||||||
|
This program is free software: you can redistribute it and/or modify
|
||||||
|
it under the terms of the GNU General Public License as published by
|
||||||
|
the Free Software Foundation, either version 3 of the License, or
|
||||||
|
(at your option) any later version.
|
||||||
|
|
||||||
|
This program is distributed in the hope that it will be useful,
|
||||||
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
GNU General Public License for more details.
|
||||||
|
|
||||||
|
You should have received a copy of the GNU General Public License
|
||||||
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
|
||||||
|
Also add information on how to contact you by electronic and paper mail.
|
||||||
|
|
||||||
|
If the program does terminal interaction, make it output a short
|
||||||
|
notice like this when it starts in an interactive mode:
|
||||||
|
|
||||||
|
<program> Copyright (C) <year> <name of author>
|
||||||
|
This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
|
||||||
|
This is free software, and you are welcome to redistribute it
|
||||||
|
under certain conditions; type `show c' for details.
|
||||||
|
|
||||||
|
The hypothetical commands `show w' and `show c' should show the appropriate
|
||||||
|
parts of the General Public License. Of course, your program's commands
|
||||||
|
might be different; for a GUI interface, you would use an "about box".
|
||||||
|
|
||||||
|
You should also get your employer (if you work as a programmer) or school,
|
||||||
|
if any, to sign a "copyright disclaimer" for the program, if necessary.
|
||||||
|
For more information on this, and how to apply and follow the GNU GPL, see
|
||||||
|
<http://www.gnu.org/licenses/>.
|
||||||
|
|
||||||
|
The GNU General Public License does not permit incorporating your program
|
||||||
|
into proprietary programs. If your program is a subroutine library, you
|
||||||
|
may consider it more useful to permit linking proprietary applications with
|
||||||
|
the library. If this is what you want to do, use the GNU Lesser General
|
||||||
|
Public License instead of this License. But first, please read
|
||||||
|
<http://www.gnu.org/philosophy/why-not-lgpl.html>.
|
19
licenses/mit.txt
Normal file
19
licenses/mit.txt
Normal file
@ -0,0 +1,19 @@
|
|||||||
|
The MIT License (MIT) Copyright (c) 2016 Chris Allen Lane
|
||||||
|
|
||||||
|
Permission is hereby granted, free of charge, to any person obtaining a copy of
|
||||||
|
this software and associated documentation files (the "Software"), to deal in
|
||||||
|
the Software without restriction, including without limitation the rights to
|
||||||
|
use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies
|
||||||
|
of the Software, and to permit persons to whom the Software is furnished to do
|
||||||
|
so, subject to the following conditions:
|
||||||
|
|
||||||
|
The above copyright notice and this permission notice shall be included in all
|
||||||
|
copies or substantial portions of the Software.
|
||||||
|
|
||||||
|
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||||
|
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||||
|
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||||||
|
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||||
|
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
||||||
|
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
||||||
|
SOFTWARE.
|
9
setup.py
9
setup.py
@ -3,7 +3,7 @@ import os
|
|||||||
|
|
||||||
setup(
|
setup(
|
||||||
name = 'cheat',
|
name = 'cheat',
|
||||||
version = '2.0.2',
|
version = '2.1.23',
|
||||||
author = 'Chris Lane',
|
author = 'Chris Lane',
|
||||||
author_email = 'chris@chris-allen-lane.com',
|
author_email = 'chris@chris-allen-lane.com',
|
||||||
license = 'GPL3',
|
license = 'GPL3',
|
||||||
@ -20,12 +20,7 @@ setup(
|
|||||||
package_data = {
|
package_data = {
|
||||||
'cheat.cheatsheets': [f for f in os.listdir('cheat/cheatsheets') if '.' not in f]
|
'cheat.cheatsheets': [f for f in os.listdir('cheat/cheatsheets') if '.' not in f]
|
||||||
},
|
},
|
||||||
scripts = ['bin/cheat'],
|
scripts = ['bin/cheat'],
|
||||||
data_files = [
|
|
||||||
('/usr/share/zsh/site-functions', ['cheat/autocompletion/_cheat.zsh']),
|
|
||||||
('/etc/bash_completion.d' , ['cheat/autocompletion/cheat.bash']),
|
|
||||||
('/usr/share/fish/completions' , ['cheat/autocompletion/cheat.fish'])
|
|
||||||
],
|
|
||||||
install_requires = [
|
install_requires = [
|
||||||
'docopt >= 0.6.1',
|
'docopt >= 0.6.1',
|
||||||
'pygments >= 1.6.0',
|
'pygments >= 1.6.0',
|
||||||
|
Reference in New Issue
Block a user