mirror of
https://github.com/cheat/cheat.git
synced 2025-09-01 09:38:29 +02:00
Compare commits
177 Commits
Author | SHA1 | Date | |
---|---|---|---|
aa1e12625e | |||
d09353bfca | |||
81e80c87a1 | |||
3d498d5ce7 | |||
d90d509702 | |||
b46f5b2c34 | |||
e2d63e7603 | |||
67f52f8317 | |||
67134b9240 | |||
c67adb1422 | |||
c2aa5e0148 | |||
332f0bd4ee | |||
b303bc0028 | |||
02f79ddd13 | |||
71680c6586 | |||
a240413eb9 | |||
cde64e3ea4 | |||
0b0bc441c6 | |||
2aa37432cb | |||
89de3705b0 | |||
d12718b8c4 | |||
900e083b99 | |||
837e0b5b71 | |||
30d2a77a6c | |||
1a8cdf84f4 | |||
181403e7ac | |||
2c10955690 | |||
4319b8e699 | |||
57dff86a44 | |||
aa4f6daf77 | |||
d7272c50c4 | |||
cdf573a725 | |||
eb6dfaad39 | |||
f8d2ce516e | |||
e5bf9146fe | |||
d6dc39c687 | |||
fb5ec798fa | |||
866eb68d64 | |||
e17f60e4d5 | |||
ed2ef113f0 | |||
432379d1e6 | |||
7089bef7cc | |||
aa57371819 | |||
921db35400 | |||
852db958a4 | |||
d58bbba1f8 | |||
e5ffcf65e4 | |||
d59ac66f1c | |||
f4f8592933 | |||
c540a600b2 | |||
9224216581 | |||
2da5c2b710 | |||
e468f8d0a0 | |||
cdee0e44cd | |||
efcd687070 | |||
ae309c7dc4 | |||
86ba22e7b8 | |||
2a6ec9cef5 | |||
2d59026b0d | |||
bcb0d71dd3 | |||
d1526ede16 | |||
374d381c00 | |||
1f3f9828c3 | |||
5d3f89924c | |||
74808845a5 | |||
517bf9599b | |||
7716827dfc | |||
c65fde1b3a | |||
bb3c4105cb | |||
edd7b5e806 | |||
7abb663bf4 | |||
f6f1233b12 | |||
b9241efab1 | |||
8019325f1e | |||
7209f2c929 | |||
068d117bef | |||
9ead66461d | |||
d00bd87dd1 | |||
dd8b20a17a | |||
84e42e7f2f | |||
a59e91ead7 | |||
f495a4dfd9 | |||
10dd0e9a8b | |||
d06e5bab6f | |||
aa9403d432 | |||
75b2555710 | |||
632da2024a | |||
1baa6d39c0 | |||
8cad76943a | |||
a6ec02c296 | |||
7392787e31 | |||
208dd24a0c | |||
df34774a7a | |||
8d65424ffb | |||
597acec6ac | |||
7d4150b937 | |||
5df5b1ab49 | |||
f1c8017342 | |||
8f2912e5da | |||
3139796524 | |||
bcd4563bf3 | |||
5cd5387a47 | |||
c8f0e6295b | |||
31e442d7f9 | |||
05400a92ed | |||
034c1a2415 | |||
dab8645394 | |||
352a760561 | |||
6be87e2d42 | |||
403d715127 | |||
0edd1450dc | |||
d87a26ce4f | |||
cdf240b70e | |||
809c6d77bc | |||
be543450c7 | |||
9889d77adb | |||
354376340f | |||
d82eee726c | |||
9a23458a2d | |||
32802c2907 | |||
2a6d34de35 | |||
f1253031f2 | |||
76fa9cfc23 | |||
0a54b2a2ff | |||
6a1742984c | |||
80d2a09456 | |||
5121fece91 | |||
e8d32102cb | |||
eff042d50b | |||
f000756f2c | |||
ef1dfb2168 | |||
3c1b5c5860 | |||
3494827403 | |||
f0879831c5 | |||
8c056d09e9 | |||
dd8d0ae58b | |||
6cc99a2b6a | |||
70ad22c12e | |||
b28e6a84ac | |||
bf4f1c80ca | |||
9cf1a5761d | |||
13fdcec332 | |||
b2feeab4e8 | |||
c4b7fd507f | |||
b77aa0974b | |||
3be95142ed | |||
bb324e94a4 | |||
7084ce2f45 | |||
905006f09c | |||
06a368fb1f | |||
6a9422502a | |||
41332f1d8a | |||
b6d54b135c | |||
a3c682729e | |||
f38da23741 | |||
20d985d993 | |||
09f821835c | |||
7e5e4315e5 | |||
869e7095f3 | |||
6dd8faf26a | |||
c0585ee55c | |||
c0d755e102 | |||
49e1fc46f4 | |||
3d90b26b04 | |||
3b73b9b06b | |||
74d1bc1ec7 | |||
78c76dc75a | |||
f204ed66e1 | |||
29c53b754d | |||
5a7fdfcca7 | |||
c3f082eccf | |||
808a2585ef | |||
c0aad062ec | |||
8ffeaa4211 | |||
c1d4c768de | |||
a063c7bb64 | |||
c1fbeffde5 |
@ -1,9 +1,29 @@
|
||||
Contributing
|
||||
============
|
||||
If you would like to contribute cheetsheets or program functionality, please
|
||||
fork this repository, make your changes, and send me a pull request.
|
||||
fork this repository, make your changes, and submit a pull request against the
|
||||
`master` branch.
|
||||
|
||||
Python code show follow the standards laid out by [PEP 8][].
|
||||
|
||||
## Python standards ##
|
||||
Python code should conform to [PEP 8][].
|
||||
|
||||
|
||||
## Cheatsheet Format ##
|
||||
Please pattern your cheatsheets after the following:
|
||||
|
||||
```sh
|
||||
# To extract an uncompressed archive:
|
||||
tar -xvf /path/to/foo.tar
|
||||
|
||||
# To create an uncompressed archive:
|
||||
tar -cvf /path/to/foo.tar /path/to/foo/
|
||||
|
||||
# To extract a .gz archive:
|
||||
tar -xzvf /path/to/foo.tgz
|
||||
```
|
||||
|
||||
If you are submitting a cheatsheet that contains side-by-side columns of text,
|
||||
please align the columns using spaces rather than tabs.
|
||||
|
||||
[PEP 8]: http://legacy.python.org/dev/peps/pep-0008/
|
||||
|
680
LICENSE
680
LICENSE
@ -1,678 +1,2 @@
|
||||
|
||||
GNU GENERAL PUBLIC LICENSE
|
||||
Version 3, 29 June 2007
|
||||
|
||||
Copyright (C) 2007 Free Software Foundation, Inc. [http://fsf.org/]
|
||||
Everyone is permitted to copy and distribute verbatim copies
|
||||
of this license document, but changing it is not allowed.
|
||||
|
||||
Preamble
|
||||
|
||||
The GNU General Public License is a free, copyleft license for
|
||||
software and other kinds of works.
|
||||
|
||||
The licenses for most software and other practical works are designed
|
||||
to take away your freedom to share and change the works. By contrast,
|
||||
the GNU General Public License is intended to guarantee your freedom to
|
||||
share and change all versions of a program--to make sure it remains free
|
||||
software for all its users. We, the Free Software Foundation, use the
|
||||
GNU General Public License for most of our software; it applies also to
|
||||
any other work released this way by its authors. You can apply it to
|
||||
your programs, too.
|
||||
|
||||
When we speak of free software, we are referring to freedom, not
|
||||
price. Our General Public Licenses are designed to make sure that you
|
||||
have the freedom to distribute copies of free software (and charge for
|
||||
them if you wish), that you receive source code or can get it if you
|
||||
want it, that you can change the software or use pieces of it in new
|
||||
free programs, and that you know you can do these things.
|
||||
|
||||
To protect your rights, we need to prevent others from denying you
|
||||
these rights or asking you to surrender the rights. Therefore, you have
|
||||
certain responsibilities if you distribute copies of the software, or if
|
||||
you modify it: responsibilities to respect the freedom of others.
|
||||
|
||||
For example, if you distribute copies of such a program, whether
|
||||
gratis or for a fee, you must pass on to the recipients the same
|
||||
freedoms that you received. You must make sure that they, too, receive
|
||||
or can get the source code. And you must show them these terms so they
|
||||
know their rights.
|
||||
|
||||
Developers that use the GNU GPL protect your rights with two steps:
|
||||
(1) assert copyright on the software, and (2) offer you this License
|
||||
giving you legal permission to copy, distribute and/or modify it.
|
||||
|
||||
For the developers' and authors' protection, the GPL clearly explains
|
||||
that there is no warranty for this free software. For both users' and
|
||||
authors' sake, the GPL requires that modified versions be marked as
|
||||
changed, so that their problems will not be attributed erroneously to
|
||||
authors of previous versions.
|
||||
|
||||
Some devices are designed to deny users access to install or run
|
||||
modified versions of the software inside them, although the manufacturer
|
||||
can do so. This is fundamentally incompatible with the aim of
|
||||
protecting users' freedom to change the software. The systematic
|
||||
pattern of such abuse occurs in the area of products for individuals to
|
||||
use, which is precisely where it is most unacceptable. Therefore, we
|
||||
have designed this version of the GPL to prohibit the practice for those
|
||||
products. If such problems arise substantially in other domains, we
|
||||
stand ready to extend this provision to those domains in future versions
|
||||
of the GPL, as needed to protect the freedom of users.
|
||||
|
||||
Finally, every program is threatened constantly by software patents.
|
||||
States should not allow patents to restrict development and use of
|
||||
software on general-purpose computers, but in those that do, we wish to
|
||||
avoid the special danger that patents applied to a free program could
|
||||
make it effectively proprietary. To prevent this, the GPL assures that
|
||||
patents cannot be used to render the program non-free.
|
||||
|
||||
The precise terms and conditions for copying, distribution and
|
||||
modification follow.
|
||||
|
||||
TERMS AND CONDITIONS
|
||||
|
||||
0. Definitions.
|
||||
|
||||
"This License" refers to version 3 of the GNU General Public License.
|
||||
|
||||
"Copyright" also means copyright-like laws that apply to other kinds of
|
||||
works, such as semiconductor masks.
|
||||
|
||||
"The Program" refers to any copyrightable work licensed under this
|
||||
License. Each licensee is addressed as "you". "Licensees" and
|
||||
"recipients" may be individuals or organizations.
|
||||
|
||||
To "modify" a work means to copy from or adapt all or part of the work
|
||||
in a fashion requiring copyright permission, other than the making of an
|
||||
exact copy. The resulting work is called a "modified version" of the
|
||||
earlier work or a work "based on" the earlier work.
|
||||
|
||||
A "covered work" means either the unmodified Program or a work based
|
||||
on the Program.
|
||||
|
||||
To "propagate" a work means to do anything with it that, without
|
||||
permission, would make you directly or secondarily liable for
|
||||
infringement under applicable copyright law, except executing it on a
|
||||
computer or modifying a private copy. Propagation includes copying,
|
||||
distribution (with or without modification), making available to the
|
||||
public, and in some countries other activities as well.
|
||||
|
||||
To "convey" a work means any kind of propagation that enables other
|
||||
parties to make or receive copies. Mere interaction with a user through
|
||||
a computer network, with no transfer of a copy, is not conveying.
|
||||
|
||||
An interactive user interface displays "Appropriate Legal Notices"
|
||||
to the extent that it includes a convenient and prominently visible
|
||||
feature that (1) displays an appropriate copyright notice, and (2)
|
||||
tells the user that there is no warranty for the work (except to the
|
||||
extent that warranties are provided), that licensees may convey the
|
||||
work under this License, and how to view a copy of this License. If
|
||||
the interface presents a list of user commands or options, such as a
|
||||
menu, a prominent item in the list meets this criterion.
|
||||
|
||||
1. Source Code.
|
||||
|
||||
The "source code" for a work means the preferred form of the work
|
||||
for making modifications to it. "Object code" means any non-source
|
||||
form of a work.
|
||||
|
||||
A "Standard Interface" means an interface that either is an official
|
||||
standard defined by a recognized standards body, or, in the case of
|
||||
interfaces specified for a particular programming language, one that
|
||||
is widely used among developers working in that language.
|
||||
|
||||
The "System Libraries" of an executable work include anything, other
|
||||
than the work as a whole, that (a) is included in the normal form of
|
||||
packaging a Major Component, but which is not part of that Major
|
||||
Component, and (b) serves only to enable use of the work with that
|
||||
Major Component, or to implement a Standard Interface for which an
|
||||
implementation is available to the public in source code form. A
|
||||
"Major Component", in this context, means a major essential component
|
||||
(kernel, window system, and so on) of the specific operating system
|
||||
(if any) on which the executable work runs, or a compiler used to
|
||||
produce the work, or an object code interpreter used to run it.
|
||||
|
||||
The "Corresponding Source" for a work in object code form means all
|
||||
the source code needed to generate, install, and (for an executable
|
||||
work) run the object code and to modify the work, including scripts to
|
||||
control those activities. However, it does not include the work's
|
||||
System Libraries, or general-purpose tools or generally available free
|
||||
programs which are used unmodified in performing those activities but
|
||||
which are not part of the work. For example, Corresponding Source
|
||||
includes interface definition files associated with source files for
|
||||
the work, and the source code for shared libraries and dynamically
|
||||
linked subprograms that the work is specifically designed to require,
|
||||
such as by intimate data communication or control flow between those
|
||||
subprograms and other parts of the work.
|
||||
|
||||
The Corresponding Source need not include anything that users
|
||||
can regenerate automatically from other parts of the Corresponding
|
||||
Source.
|
||||
|
||||
The Corresponding Source for a work in source code form is that
|
||||
same work.
|
||||
|
||||
2. Basic Permissions.
|
||||
|
||||
All rights granted under this License are granted for the term of
|
||||
copyright on the Program, and are irrevocable provided the stated
|
||||
conditions are met. This License explicitly affirms your unlimited
|
||||
permission to run the unmodified Program. The output from running a
|
||||
covered work is covered by this License only if the output, given its
|
||||
content, constitutes a covered work. This License acknowledges your
|
||||
rights of fair use or other equivalent, as provided by copyright law.
|
||||
|
||||
You may make, run and propagate covered works that you do not
|
||||
convey, without conditions so long as your license otherwise remains
|
||||
in force. You may convey covered works to others for the sole purpose
|
||||
of having them make modifications exclusively for you, or provide you
|
||||
with facilities for running those works, provided that you comply with
|
||||
the terms of this License in conveying all material for which you do
|
||||
not control copyright. Those thus making or running the covered works
|
||||
for you must do so exclusively on your behalf, under your direction
|
||||
and control, on terms that prohibit them from making any copies of
|
||||
your copyrighted material outside their relationship with you.
|
||||
|
||||
Conveying under any other circumstances is permitted solely under
|
||||
the conditions stated below. Sublicensing is not allowed; section 10
|
||||
makes it unnecessary.
|
||||
|
||||
3. Protecting Users' Legal Rights From Anti-Circumvention Law.
|
||||
|
||||
No covered work shall be deemed part of an effective technological
|
||||
measure under any applicable law fulfilling obligations under article
|
||||
11 of the WIPO copyright treaty adopted on 20 December 1996, or
|
||||
similar laws prohibiting or restricting circumvention of such
|
||||
measures.
|
||||
|
||||
When you convey a covered work, you waive any legal power to forbid
|
||||
circumvention of technological measures to the extent such circumvention
|
||||
is effected by exercising rights under this License with respect to
|
||||
the covered work, and you disclaim any intention to limit operation or
|
||||
modification of the work as a means of enforcing, against the work's
|
||||
users, your or third parties' legal rights to forbid circumvention of
|
||||
technological measures.
|
||||
|
||||
4. Conveying Verbatim Copies.
|
||||
|
||||
You may convey verbatim copies of the Program's source code as you
|
||||
receive it, in any medium, provided that you conspicuously and
|
||||
appropriately publish on each copy an appropriate copyright notice;
|
||||
keep intact all notices stating that this License and any
|
||||
non-permissive terms added in accord with section 7 apply to the code;
|
||||
keep intact all notices of the absence of any warranty; and give all
|
||||
recipients a copy of this License along with the Program.
|
||||
|
||||
You may charge any price or no price for each copy that you convey,
|
||||
and you may offer support or warranty protection for a fee.
|
||||
|
||||
5. Conveying Modified Source Versions.
|
||||
|
||||
You may convey a work based on the Program, or the modifications to
|
||||
produce it from the Program, in the form of source code under the
|
||||
terms of section 4, provided that you also meet all of these conditions:
|
||||
|
||||
a) The work must carry prominent notices stating that you modified
|
||||
it, and giving a relevant date.
|
||||
|
||||
b) The work must carry prominent notices stating that it is
|
||||
released under this License and any conditions added under section
|
||||
7. This requirement modifies the requirement in section 4 to
|
||||
"keep intact all notices".
|
||||
|
||||
c) You must license the entire work, as a whole, under this
|
||||
License to anyone who comes into possession of a copy. This
|
||||
License will therefore apply, along with any applicable section 7
|
||||
additional terms, to the whole of the work, and all its parts,
|
||||
regardless of how they are packaged. This License gives no
|
||||
permission to license the work in any other way, but it does not
|
||||
invalidate such permission if you have separately received it.
|
||||
|
||||
d) If the work has interactive user interfaces, each must display
|
||||
Appropriate Legal Notices; however, if the Program has interactive
|
||||
interfaces that do not display Appropriate Legal Notices, your
|
||||
work need not make them do so.
|
||||
|
||||
A compilation of a covered work with other separate and independent
|
||||
works, which are not by their nature extensions of the covered work,
|
||||
and which are not combined with it such as to form a larger program,
|
||||
in or on a volume of a storage or distribution medium, is called an
|
||||
"aggregate" if the compilation and its resulting copyright are not
|
||||
used to limit the access or legal rights of the compilation's users
|
||||
beyond what the individual works permit. Inclusion of a covered work
|
||||
in an aggregate does not cause this License to apply to the other
|
||||
parts of the aggregate.
|
||||
|
||||
6. Conveying Non-Source Forms.
|
||||
|
||||
You may convey a covered work in object code form under the terms
|
||||
of sections 4 and 5, provided that you also convey the
|
||||
machine-readable Corresponding Source under the terms of this License,
|
||||
in one of these ways:
|
||||
|
||||
a) Convey the object code in, or embodied in, a physical product
|
||||
(including a physical distribution medium), accompanied by the
|
||||
Corresponding Source fixed on a durable physical medium
|
||||
customarily used for software interchange.
|
||||
|
||||
b) Convey the object code in, or embodied in, a physical product
|
||||
(including a physical distribution medium), accompanied by a
|
||||
written offer, valid for at least three years and valid for as
|
||||
long as you offer spare parts or customer support for that product
|
||||
model, to give anyone who possesses the object code either (1) a
|
||||
copy of the Corresponding Source for all the software in the
|
||||
product that is covered by this License, on a durable physical
|
||||
medium customarily used for software interchange, for a price no
|
||||
more than your reasonable cost of physically performing this
|
||||
conveying of source, or (2) access to copy the
|
||||
Corresponding Source from a network server at no charge.
|
||||
|
||||
c) Convey individual copies of the object code with a copy of the
|
||||
written offer to provide the Corresponding Source. This
|
||||
alternative is allowed only occasionally and noncommercially, and
|
||||
only if you received the object code with such an offer, in accord
|
||||
with subsection 6b.
|
||||
|
||||
d) Convey the object code by offering access from a designated
|
||||
place (gratis or for a charge), and offer equivalent access to the
|
||||
Corresponding Source in the same way through the same place at no
|
||||
further charge. You need not require recipients to copy the
|
||||
Corresponding Source along with the object code. If the place to
|
||||
copy the object code is a network server, the Corresponding Source
|
||||
may be on a different server (operated by you or a third party)
|
||||
that supports equivalent copying facilities, provided you maintain
|
||||
clear directions next to the object code saying where to find the
|
||||
Corresponding Source. Regardless of what server hosts the
|
||||
Corresponding Source, you remain obligated to ensure that it is
|
||||
available for as long as needed to satisfy these requirements.
|
||||
|
||||
e) Convey the object code using peer-to-peer transmission, provided
|
||||
you inform other peers where the object code and Corresponding
|
||||
Source of the work are being offered to the general public at no
|
||||
charge under subsection 6d.
|
||||
|
||||
A separable portion of the object code, whose source code is excluded
|
||||
from the Corresponding Source as a System Library, need not be
|
||||
included in conveying the object code work.
|
||||
|
||||
A "User Product" is either (1) a "consumer product", which means any
|
||||
tangible personal property which is normally used for personal, family,
|
||||
or household purposes, or (2) anything designed or sold for incorporation
|
||||
into a dwelling. In determining whether a product is a consumer product,
|
||||
doubtful cases shall be resolved in favor of coverage. For a particular
|
||||
product received by a particular user, "normally used" refers to a
|
||||
typical or common use of that class of product, regardless of the status
|
||||
of the particular user or of the way in which the particular user
|
||||
actually uses, or expects or is expected to use, the product. A product
|
||||
is a consumer product regardless of whether the product has substantial
|
||||
commercial, industrial or non-consumer uses, unless such uses represent
|
||||
the only significant mode of use of the product.
|
||||
|
||||
"Installation Information" for a User Product means any methods,
|
||||
procedures, authorization keys, or other information required to install
|
||||
and execute modified versions of a covered work in that User Product from
|
||||
a modified version of its Corresponding Source. The information must
|
||||
suffice to ensure that the continued functioning of the modified object
|
||||
code is in no case prevented or interfered with solely because
|
||||
modification has been made.
|
||||
|
||||
If you convey an object code work under this section in, or with, or
|
||||
specifically for use in, a User Product, and the conveying occurs as
|
||||
part of a transaction in which the right of possession and use of the
|
||||
User Product is transferred to the recipient in perpetuity or for a
|
||||
fixed term (regardless of how the transaction is characterized), the
|
||||
Corresponding Source conveyed under this section must be accompanied
|
||||
by the Installation Information. But this requirement does not apply
|
||||
if neither you nor any third party retains the ability to install
|
||||
modified object code on the User Product (for example, the work has
|
||||
been installed in ROM).
|
||||
|
||||
The requirement to provide Installation Information does not include a
|
||||
requirement to continue to provide support service, warranty, or updates
|
||||
for a work that has been modified or installed by the recipient, or for
|
||||
the User Product in which it has been modified or installed. Access to a
|
||||
network may be denied when the modification itself materially and
|
||||
adversely affects the operation of the network or violates the rules and
|
||||
protocols for communication across the network.
|
||||
|
||||
Corresponding Source conveyed, and Installation Information provided,
|
||||
in accord with this section must be in a format that is publicly
|
||||
documented (and with an implementation available to the public in
|
||||
source code form), and must require no special password or key for
|
||||
unpacking, reading or copying.
|
||||
|
||||
7. Additional Terms.
|
||||
|
||||
"Additional permissions" are terms that supplement the terms of this
|
||||
License by making exceptions from one or more of its conditions.
|
||||
Additional permissions that are applicable to the entire Program shall
|
||||
be treated as though they were included in this License, to the extent
|
||||
that they are valid under applicable law. If additional permissions
|
||||
apply only to part of the Program, that part may be used separately
|
||||
under those permissions, but the entire Program remains governed by
|
||||
this License without regard to the additional permissions.
|
||||
|
||||
When you convey a copy of a covered work, you may at your option
|
||||
remove any additional permissions from that copy, or from any part of
|
||||
it. (Additional permissions may be written to require their own
|
||||
removal in certain cases when you modify the work.) You may place
|
||||
additional permissions on material, added by you to a covered work,
|
||||
for which you have or can give appropriate copyright permission.
|
||||
|
||||
Notwithstanding any other provision of this License, for material you
|
||||
add to a covered work, you may (if authorized by the copyright holders of
|
||||
that material) supplement the terms of this License with terms:
|
||||
|
||||
a) Disclaiming warranty or limiting liability differently from the
|
||||
terms of sections 15 and 16 of this License; or
|
||||
|
||||
b) Requiring preservation of specified reasonable legal notices or
|
||||
author attributions in that material or in the Appropriate Legal
|
||||
Notices displayed by works containing it; or
|
||||
|
||||
c) Prohibiting misrepresentation of the origin of that material, or
|
||||
requiring that modified versions of such material be marked in
|
||||
reasonable ways as different from the original version; or
|
||||
|
||||
d) Limiting the use for publicity purposes of names of licensors or
|
||||
authors of the material; or
|
||||
|
||||
e) Declining to grant rights under trademark law for use of some
|
||||
trade names, trademarks, or service marks; or
|
||||
|
||||
f) Requiring indemnification of licensors and authors of that
|
||||
material by anyone who conveys the material (or modified versions of
|
||||
it) with contractual assumptions of liability to the recipient, for
|
||||
any liability that these contractual assumptions directly impose on
|
||||
those licensors and authors.
|
||||
|
||||
All other non-permissive additional terms are considered "further
|
||||
restrictions" within the meaning of section 10. If the Program as you
|
||||
received it, or any part of it, contains a notice stating that it is
|
||||
governed by this License along with a term that is a further
|
||||
restriction, you may remove that term. If a license document contains
|
||||
a further restriction but permits relicensing or conveying under this
|
||||
License, you may add to a covered work material governed by the terms
|
||||
of that license document, provided that the further restriction does
|
||||
not survive such relicensing or conveying.
|
||||
|
||||
If you add terms to a covered work in accord with this section, you
|
||||
must place, in the relevant source files, a statement of the
|
||||
additional terms that apply to those files, or a notice indicating
|
||||
where to find the applicable terms.
|
||||
|
||||
Additional terms, permissive or non-permissive, may be stated in the
|
||||
form of a separately written license, or stated as exceptions;
|
||||
the above requirements apply either way.
|
||||
|
||||
8. Termination.
|
||||
|
||||
You may not propagate or modify a covered work except as expressly
|
||||
provided under this License. Any attempt otherwise to propagate or
|
||||
modify it is void, and will automatically terminate your rights under
|
||||
this License (including any patent licenses granted under the third
|
||||
paragraph of section 11).
|
||||
|
||||
However, if you cease all violation of this License, then your
|
||||
license from a particular copyright holder is reinstated (a)
|
||||
provisionally, unless and until the copyright holder explicitly and
|
||||
finally terminates your license, and (b) permanently, if the copyright
|
||||
holder fails to notify you of the violation by some reasonable means
|
||||
prior to 60 days after the cessation.
|
||||
|
||||
Moreover, your license from a particular copyright holder is
|
||||
reinstated permanently if the copyright holder notifies you of the
|
||||
violation by some reasonable means, this is the first time you have
|
||||
received notice of violation of this License (for any work) from that
|
||||
copyright holder, and you cure the violation prior to 30 days after
|
||||
your receipt of the notice.
|
||||
|
||||
Termination of your rights under this section does not terminate the
|
||||
licenses of parties who have received copies or rights from you under
|
||||
this License. If your rights have been terminated and not permanently
|
||||
reinstated, you do not qualify to receive new licenses for the same
|
||||
material under section 10.
|
||||
|
||||
9. Acceptance Not Required for Having Copies.
|
||||
|
||||
You are not required to accept this License in order to receive or
|
||||
run a copy of the Program. Ancillary propagation of a covered work
|
||||
occurring solely as a consequence of using peer-to-peer transmission
|
||||
to receive a copy likewise does not require acceptance. However,
|
||||
nothing other than this License grants you permission to propagate or
|
||||
modify any covered work. These actions infringe copyright if you do
|
||||
not accept this License. Therefore, by modifying or propagating a
|
||||
covered work, you indicate your acceptance of this License to do so.
|
||||
|
||||
10. Automatic Licensing of Downstream Recipients.
|
||||
|
||||
Each time you convey a covered work, the recipient automatically
|
||||
receives a license from the original licensors, to run, modify and
|
||||
propagate that work, subject to this License. You are not responsible
|
||||
for enforcing compliance by third parties with this License.
|
||||
|
||||
An "entity transaction" is a transaction transferring control of an
|
||||
organization, or substantially all assets of one, or subdividing an
|
||||
organization, or merging organizations. If propagation of a covered
|
||||
work results from an entity transaction, each party to that
|
||||
transaction who receives a copy of the work also receives whatever
|
||||
licenses to the work the party's predecessor in interest had or could
|
||||
give under the previous paragraph, plus a right to possession of the
|
||||
Corresponding Source of the work from the predecessor in interest, if
|
||||
the predecessor has it or can get it with reasonable efforts.
|
||||
|
||||
You may not impose any further restrictions on the exercise of the
|
||||
rights granted or affirmed under this License. For example, you may
|
||||
not impose a license fee, royalty, or other charge for exercise of
|
||||
rights granted under this License, and you may not initiate litigation
|
||||
(including a cross-claim or counterclaim in a lawsuit) alleging that
|
||||
any patent claim is infringed by making, using, selling, offering for
|
||||
sale, or importing the Program or any portion of it.
|
||||
|
||||
11. Patents.
|
||||
|
||||
A "contributor" is a copyright holder who authorizes use under this
|
||||
License of the Program or a work on which the Program is based. The
|
||||
work thus licensed is called the contributor's "contributor version".
|
||||
|
||||
A contributor's "essential patent claims" are all patent claims
|
||||
owned or controlled by the contributor, whether already acquired or
|
||||
hereafter acquired, that would be infringed by some manner, permitted
|
||||
by this License, of making, using, or selling its contributor version,
|
||||
but do not include claims that would be infringed only as a
|
||||
consequence of further modification of the contributor version. For
|
||||
purposes of this definition, "control" includes the right to grant
|
||||
patent sublicenses in a manner consistent with the requirements of
|
||||
this License.
|
||||
|
||||
Each contributor grants you a non-exclusive, worldwide, royalty-free
|
||||
patent license under the contributor's essential patent claims, to
|
||||
make, use, sell, offer for sale, import and otherwise run, modify and
|
||||
propagate the contents of its contributor version.
|
||||
|
||||
In the following three paragraphs, a "patent license" is any express
|
||||
agreement or commitment, however denominated, not to enforce a patent
|
||||
(such as an express permission to practice a patent or covenant not to
|
||||
sue for patent infringement). To "grant" such a patent license to a
|
||||
party means to make such an agreement or commitment not to enforce a
|
||||
patent against the party.
|
||||
|
||||
If you convey a covered work, knowingly relying on a patent license,
|
||||
and the Corresponding Source of the work is not available for anyone
|
||||
to copy, free of charge and under the terms of this License, through a
|
||||
publicly available network server or other readily accessible means,
|
||||
then you must either (1) cause the Corresponding Source to be so
|
||||
available, or (2) arrange to deprive yourself of the benefit of the
|
||||
patent license for this particular work, or (3) arrange, in a manner
|
||||
consistent with the requirements of this License, to extend the patent
|
||||
license to downstream recipients. "Knowingly relying" means you have
|
||||
actual knowledge that, but for the patent license, your conveying the
|
||||
covered work in a country, or your recipient's use of the covered work
|
||||
in a country, would infringe one or more identifiable patents in that
|
||||
country that you have reason to believe are valid.
|
||||
|
||||
If, pursuant to or in connection with a single transaction or
|
||||
arrangement, you convey, or propagate by procuring conveyance of, a
|
||||
covered work, and grant a patent license to some of the parties
|
||||
receiving the covered work authorizing them to use, propagate, modify
|
||||
or convey a specific copy of the covered work, then the patent license
|
||||
you grant is automatically extended to all recipients of the covered
|
||||
work and works based on it.
|
||||
|
||||
A patent license is "discriminatory" if it does not include within
|
||||
the scope of its coverage, prohibits the exercise of, or is
|
||||
conditioned on the non-exercise of one or more of the rights that are
|
||||
specifically granted under this License. You may not convey a covered
|
||||
work if you are a party to an arrangement with a third party that is
|
||||
in the business of distributing software, under which you make payment
|
||||
to the third party based on the extent of your activity of conveying
|
||||
the work, and under which the third party grants, to any of the
|
||||
parties who would receive the covered work from you, a discriminatory
|
||||
patent license (a) in connection with copies of the covered work
|
||||
conveyed by you (or copies made from those copies), or (b) primarily
|
||||
for and in connection with specific products or compilations that
|
||||
contain the covered work, unless you entered into that arrangement,
|
||||
or that patent license was granted, prior to 28 March 2007.
|
||||
|
||||
Nothing in this License shall be construed as excluding or limiting
|
||||
any implied license or other defenses to infringement that may
|
||||
otherwise be available to you under applicable patent law.
|
||||
|
||||
12. No Surrender of Others' Freedom.
|
||||
|
||||
If conditions are imposed on you (whether by court order, agreement or
|
||||
otherwise) that contradict the conditions of this License, they do not
|
||||
excuse you from the conditions of this License. If you cannot convey a
|
||||
covered work so as to satisfy simultaneously your obligations under this
|
||||
License and any other pertinent obligations, then as a consequence you may
|
||||
not convey it at all. For example, if you agree to terms that obligate you
|
||||
to collect a royalty for further conveying from those to whom you convey
|
||||
the Program, the only way you could satisfy both those terms and this
|
||||
License would be to refrain entirely from conveying the Program.
|
||||
|
||||
13. Use with the GNU Affero General Public License.
|
||||
|
||||
Notwithstanding any other provision of this License, you have
|
||||
permission to link or combine any covered work with a work licensed
|
||||
under version 3 of the GNU Affero General Public License into a single
|
||||
combined work, and to convey the resulting work. The terms of this
|
||||
License will continue to apply to the part which is the covered work,
|
||||
but the special requirements of the GNU Affero General Public License,
|
||||
section 13, concerning interaction through a network will apply to the
|
||||
combination as such.
|
||||
|
||||
14. Revised Versions of this License.
|
||||
|
||||
The Free Software Foundation may publish revised and/or new versions of
|
||||
the GNU General Public License from time to time. Such new versions will
|
||||
be similar in spirit to the present version, but may differ in detail to
|
||||
address new problems or concerns.
|
||||
|
||||
Each version is given a distinguishing version number. If the
|
||||
Program specifies that a certain numbered version of the GNU General
|
||||
Public License "or any later version" applies to it, you have the
|
||||
option of following the terms and conditions either of that numbered
|
||||
version or of any later version published by the Free Software
|
||||
Foundation. If the Program does not specify a version number of the
|
||||
GNU General Public License, you may choose any version ever published
|
||||
by the Free Software Foundation.
|
||||
|
||||
If the Program specifies that a proxy can decide which future
|
||||
versions of the GNU General Public License can be used, that proxy's
|
||||
public statement of acceptance of a version permanently authorizes you
|
||||
to choose that version for the Program.
|
||||
|
||||
Later license versions may give you additional or different
|
||||
permissions. However, no additional obligations are imposed on any
|
||||
author or copyright holder as a result of your choosing to follow a
|
||||
later version.
|
||||
|
||||
15. Disclaimer of Warranty.
|
||||
|
||||
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
|
||||
APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
|
||||
HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY
|
||||
OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
|
||||
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM
|
||||
IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
|
||||
ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
|
||||
|
||||
16. Limitation of Liability.
|
||||
|
||||
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
|
||||
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS
|
||||
THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
|
||||
GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
|
||||
USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
|
||||
DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
|
||||
PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
|
||||
EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
|
||||
SUCH DAMAGES.
|
||||
|
||||
17. Interpretation of Sections 15 and 16.
|
||||
|
||||
If the disclaimer of warranty and limitation of liability provided
|
||||
above cannot be given local legal effect according to their terms,
|
||||
reviewing courts shall apply local law that most closely approximates
|
||||
an absolute waiver of all civil liability in connection with the
|
||||
Program, unless a warranty or assumption of liability accompanies a
|
||||
copy of the Program in return for a fee.
|
||||
|
||||
END OF TERMS AND CONDITIONS
|
||||
|
||||
How to Apply These Terms to Your New Programs
|
||||
|
||||
If you develop a new program, and you want it to be of the greatest
|
||||
possible use to the public, the best way to achieve this is to make it
|
||||
free software which everyone can redistribute and change under these terms.
|
||||
|
||||
To do so, attach the following notices to the program. It is safest
|
||||
to attach them to the start of each source file to most effectively
|
||||
state the exclusion of warranty; and each file should have at least
|
||||
the "copyright" line and a pointer to where the full notice is found.
|
||||
|
||||
{one line to give the program's name and a brief idea of what it does.}
|
||||
Copyright (C) {year} {name of author}
|
||||
|
||||
This program is free software: you can redistribute it and/or modify
|
||||
it under the terms of the GNU General Public License as published by
|
||||
the Free Software Foundation, either version 3 of the License, or
|
||||
(at your option) any later version.
|
||||
|
||||
This program is distributed in the hope that it will be useful,
|
||||
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
GNU General Public License for more details.
|
||||
|
||||
You should have received a copy of the GNU General Public License
|
||||
along with this program. If not, see [http://www.gnu.org/licenses/].
|
||||
|
||||
Also add information on how to contact you by electronic and paper mail.
|
||||
|
||||
If the program does terminal interaction, make it output a short
|
||||
notice like this when it starts in an interactive mode:
|
||||
|
||||
{project} Copyright (C) {year} {fullname}
|
||||
This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
|
||||
This is free software, and you are welcome to redistribute it
|
||||
under certain conditions; type `show c' for details.
|
||||
|
||||
The hypothetical commands `show w' and `show c' should show the appropriate
|
||||
parts of the General Public License. Of course, your program's commands
|
||||
might be different; for a GUI interface, you would use an "about box".
|
||||
|
||||
You should also get your employer (if you work as a programmer) or school,
|
||||
if any, to sign a "copyright disclaimer" for the program, if necessary.
|
||||
For more information on this, and how to apply and follow the GNU GPL, see
|
||||
[http://www.gnu.org/licenses/].
|
||||
|
||||
The GNU General Public License does not permit incorporating your program
|
||||
into proprietary programs. If your program is a subroutine library, you
|
||||
may consider it more useful to permit linking proprietary applications with
|
||||
the library. If this is what you want to do, use the GNU Lesser General
|
||||
Public License instead of this License. But first, please read
|
||||
[http://www.gnu.org/philosophy/why-not-lgpl.html].
|
||||
|
||||
|
||||
|
||||
This program is dual-licensed under the MIT and GPL3 licenses. See the licenses
|
||||
directory for the license text in full.
|
||||
|
6
MANIFEST.in
Normal file
6
MANIFEST.in
Normal file
@ -0,0 +1,6 @@
|
||||
include CHANGELOG
|
||||
include CONTRIBUTING.md
|
||||
include LICENSE
|
||||
include README.md
|
||||
include licenses/gpl-3.txt
|
||||
include licenses/mit.txt
|
135
README.md
135
README.md
@ -1,3 +1,5 @@
|
||||
[](https://pypi.python.org/pypi/cheat/)
|
||||
|
||||
cheat
|
||||
=====
|
||||
`cheat` allows you to create and view interactive cheatsheets on the
|
||||
@ -7,66 +9,51 @@ remember.
|
||||
|
||||

|
||||
|
||||
`cheat` depends only on `python` and `pip`.
|
||||
|
||||
PyPI status:
|
||||
|
||||
[](https://pypi.python.org/pypi/cheat/)
|
||||
[](https://pypi.python.org/pypi/cheat/)
|
||||
|
||||
Example
|
||||
-------
|
||||
The next time you're forced to disarm a nuclear weapon without consulting
|
||||
Google, you may run:
|
||||
|
||||
cheat tar
|
||||
```sh
|
||||
cheat tar
|
||||
```
|
||||
|
||||
You will be presented with a cheatsheet resembling:
|
||||
|
||||
```
|
||||
```sh
|
||||
# To extract an uncompressed archive:
|
||||
tar -xvf /path/to/foo.tar
|
||||
tar -xvf '/path/to/foo.tar'
|
||||
|
||||
# To extract a .gz archive:
|
||||
tar -xzvf /path/to/foo.tgz
|
||||
tar -xzvf '/path/to/foo.tgz'
|
||||
|
||||
# To create a .gz archive:
|
||||
tar -czvf /path/to/foo.tgz /path/to/foo/
|
||||
tar -czvf '/path/to/foo.tgz' '/path/to/foo/'
|
||||
|
||||
# To extract a .bz2 archive:
|
||||
tar -xjvf /path/to/foo.tgz
|
||||
tar -xjvf '/path/to/foo.tgz'
|
||||
|
||||
# To create a .bz2 archive:
|
||||
tar -cjvf /path/to/foo.tgz /path/to/foo/
|
||||
tar -cjvf '/path/to/foo.tgz' '/path/to/foo/'
|
||||
```
|
||||
|
||||
To see what cheatsheets are availble, run `cheat -l`.
|
||||
To see what cheatsheets are available, run `cheat -l`.
|
||||
|
||||
Note that, while `cheat` was designed primarily for *nix system administrators,
|
||||
Note that, while `cheat` was designed primarily for \*nix system administrators,
|
||||
it is agnostic as to what content it stores. If you would like to use `cheat`
|
||||
to store notes on your favorite cookie recipes, feel free.
|
||||
|
||||
|
||||
Installing
|
||||
----------
|
||||
|
||||
### Using pip ###
|
||||
It is recommended to install `cheat` with `pip`:
|
||||
|
||||
sudo pip install cheat
|
||||
```sh
|
||||
[sudo] pip install cheat
|
||||
```
|
||||
|
||||
### Using homebrew ###
|
||||
|
||||
brew install cheat
|
||||
|
||||
### Manually ###
|
||||
|
||||
First install the required python dependencies with:
|
||||
|
||||
sudo pip install docopt pygments
|
||||
|
||||
Then, clone this repository, `cd` into it, and run:
|
||||
|
||||
sudo python setup.py install
|
||||
[Other installation methods are available][installing].
|
||||
|
||||
|
||||
Modifying Cheatsheets
|
||||
@ -79,12 +66,14 @@ Cheatsheets are stored in the `~/.cheat/` directory, and are named on a
|
||||
per-keyphrase basis. In other words, the content for the `tar` cheatsheet lives
|
||||
in the `~/.cheat/tar` file.
|
||||
|
||||
Provided that you have an `EDITOR` environment variable set, you may edit
|
||||
cheatsheets with:
|
||||
Provided that you have a `CHEAT_EDITOR`, `VISUAL`, or `EDITOR` environment
|
||||
variable set, you may edit cheatsheets with:
|
||||
|
||||
cheat -e foo
|
||||
```sh
|
||||
cheat -e foo
|
||||
```
|
||||
|
||||
If the 'foo' cheatsheet already exists, it will be opened for editing.
|
||||
If the `foo` cheatsheet already exists, it will be opened for editing.
|
||||
Otherwise, it will be created automatically.
|
||||
|
||||
After you've customized your cheatsheets, I urge you to track `~/.cheat/` along
|
||||
@ -99,57 +88,61 @@ Personal cheatsheets are saved in the `~/.cheat` directory by default, but you
|
||||
can specify a different default by exporting a `DEFAULT_CHEAT_DIR` environment
|
||||
variable:
|
||||
|
||||
export DEFAULT_CHEAT_DIR=/path/to/my/cheats
|
||||
```sh
|
||||
export DEFAULT_CHEAT_DIR='/path/to/my/cheats'
|
||||
```
|
||||
|
||||
### Setting a CHEATPATH ###
|
||||
You can additionally instruct `cheat` to look for cheatsheets in other
|
||||
directories by exporting a `CHEATPATH` environment variable:
|
||||
|
||||
export CHEATPATH=/path/to/my/cheats
|
||||
```sh
|
||||
export CHEATPATH='/path/to/my/cheats'
|
||||
```
|
||||
|
||||
You may, of course, append multiple directories to your `CHEATPATH`:
|
||||
|
||||
export CHEATPATH=$CHEATPATH:/path/to/more/cheats
|
||||
```sh
|
||||
export CHEATPATH="$CHEATPATH:/path/to/more/cheats"
|
||||
```
|
||||
|
||||
You may view which directories are on your `CHEATPATH` with `cheat -d`.
|
||||
|
||||
### Enabling Syntax Highlighting ###
|
||||
`cheat` can apply syntax highlighting to your cheatsheets if so desired. To
|
||||
enable this feature, set a `CHEATCOLORS` environment variable:
|
||||
`cheat` can optionally apply syntax highlighting to your cheatsheets. To enable
|
||||
syntax highlighting, export a `CHEATCOLORS` environment variable:
|
||||
|
||||
export CHEATCOLORS=true
|
||||
```sh
|
||||
export CHEATCOLORS=true
|
||||
```
|
||||
|
||||
### Enabling Command-line Autocompletion ###
|
||||
The `cheat/autocompletion` directory contains scripts to enable command-line
|
||||
autocompletion for various shells. To activate autocompletion, simply copy the
|
||||
appropriate script to the appropriate path on your system. (The "appropriate
|
||||
path" will vary on a per-platform basis, so this documentation shall not
|
||||
speculate as to where that may be.)
|
||||
#### Specifying a Syntax Highlighter ####
|
||||
You may manually specify which syntax highlighter to use for each cheatsheet by
|
||||
wrapping the sheet's contents in a [Github-Flavored Markdown code-fence][gfm].
|
||||
|
||||
Example:
|
||||
|
||||
<pre>
|
||||
```sql
|
||||
-- to select a user by ID
|
||||
SELECT *
|
||||
FROM Users
|
||||
WHERE id = 100
|
||||
```
|
||||
</pre>
|
||||
|
||||
If no syntax highlighter is specified, the `bash` highlighter will be used by
|
||||
default.
|
||||
|
||||
|
||||
Related Projects
|
||||
----------------
|
||||
See Also:
|
||||
---------
|
||||
- [Enabling Command-line Autocompletion][autocompletion]
|
||||
- [Related Projects][related-projects]
|
||||
|
||||
- [lucaswerkmeister/cheats][1]: An implementation of this concept in pure bash
|
||||
that also allows not only for numerical indexing of subcomands but also
|
||||
supports running commands interactively.
|
||||
|
||||
- [jahendrie/cheat][2]: A bash-only implementation that additionally allows for
|
||||
cheatsheets to be created and `grep` searched from the command-line.
|
||||
([jahendrie][] contributed key ideas to this project as well.)
|
||||
|
||||
- [`cheat` RubyGem][3]: A clever gem from 2006 that clearly had similar
|
||||
motivations. It is unclear whether or not it is currently maintained.
|
||||
|
||||
- [`tldr`][tldr]: "Simplified and community-driven man pages".
|
||||
|
||||
- [dufferzafar/cheat][5]: An implementation in golang that has syntax highlighting and allows to copy cheats directly to clipboard.
|
||||
|
||||
[dotfiles]: http://dotfiles.github.io/
|
||||
[jahendrie]: https://github.com/jahendrie
|
||||
[1]: https://github.com/lucaswerkmeister/cheats
|
||||
[2]: https://github.com/jahendrie/cheat
|
||||
[3]: http://errtheblog.com/posts/21-cheat
|
||||
[4]: https://github.com/chrisallenlane/cheat/pull/77
|
||||
[5]: https://github.com/dufferzafar/cheat
|
||||
[tldr]: https://github.com/tldr-pages/tldr
|
||||
[autocompletion]: https://github.com/chrisallenlane/cheat/wiki/Enabling-Command-line-Autocompletion
|
||||
[dotfiles]: http://dotfiles.github.io/
|
||||
[gfm]: https://help.github.com/articles/creating-and-highlighting-code-blocks/
|
||||
[installing]: https://github.com/chrisallenlane/cheat/wiki/Installing
|
||||
[related-projects]: https://github.com/chrisallenlane/cheat/wiki/Related-Projects
|
||||
|
34
bin/cheat
34
bin/cheat
@ -2,6 +2,8 @@
|
||||
|
||||
"""cheat
|
||||
|
||||
Create and view cheatsheets on the command line.
|
||||
|
||||
Usage:
|
||||
cheat <cheatsheet>
|
||||
cheat -e <cheatsheet>
|
||||
@ -10,35 +12,37 @@ Usage:
|
||||
cheat -d
|
||||
cheat -v
|
||||
|
||||
cheat allows you to create and view interactive cheatsheets on the
|
||||
command-line. It was designed to help remind *nix system
|
||||
administrators of options for commands that they use frequently,
|
||||
but not frequently enough to remember.
|
||||
|
||||
Examples:
|
||||
To look up 'tar':
|
||||
cheat tar
|
||||
|
||||
To create or edit the cheatsheet for 'foo':
|
||||
cheat -e foo
|
||||
|
||||
Options:
|
||||
-d --directories List directories on CHEATPATH
|
||||
-e --edit Edit cheatsheet
|
||||
-l --list List cheatsheets
|
||||
-s --search Search cheatsheets for <keyword>
|
||||
-v --version Print the version number
|
||||
|
||||
Examples:
|
||||
|
||||
To view the `tar` cheatsheet:
|
||||
cheat tar
|
||||
|
||||
To edit (or create) the `foo` cheatsheet:
|
||||
cheat -e foo
|
||||
|
||||
To list all available cheatsheets:
|
||||
cheat -l
|
||||
|
||||
To search for "ssh" among all cheatsheets:
|
||||
cheat -s ssh
|
||||
"""
|
||||
|
||||
# require the dependencies
|
||||
from cheat import *
|
||||
from cheat.utils import *
|
||||
from cheat import sheets, sheet
|
||||
from cheat.utils import colorize
|
||||
from docopt import docopt
|
||||
|
||||
|
||||
if __name__ == '__main__':
|
||||
# parse the command-line options
|
||||
options = docopt(__doc__, version='cheat 2.1.21')
|
||||
options = docopt(__doc__, version='cheat 2.2.3')
|
||||
|
||||
# list directories
|
||||
if options['--directories']:
|
||||
|
@ -11,7 +11,7 @@ u update
|
||||
x extract with full paths
|
||||
|
||||
Example:
|
||||
7z a -t7z -m0-lzma -mx=9 -mfb=64 -md=32m -ms=on archive.7z dir1
|
||||
7z a -t7z -m0=lzma -mx=9 -mfb=64 -md=32m -ms=on archive.7z dir1
|
||||
|
||||
-t7z 7z archive
|
||||
-m0=lzma lzma method
|
||||
|
5
cheat/cheatsheets/alias
Normal file
5
cheat/cheatsheets/alias
Normal file
@ -0,0 +1,5 @@
|
||||
# Show a list of your current shell aliases
|
||||
alias
|
||||
|
||||
# Map `ll` to `ls -l` (Can be used per session or put inside a shell config file)
|
||||
alias ll='ls -l'
|
72
cheat/cheatsheets/ansi
Normal file
72
cheat/cheatsheets/ansi
Normal file
@ -0,0 +1,72 @@
|
||||
# Reset
|
||||
Color_Off='\e[0m' # Text Reset
|
||||
|
||||
# Regular Colors
|
||||
Black='\e[0;30m' # Black
|
||||
Red='\e[0;31m' # Red
|
||||
Green='\e[0;32m' # Green
|
||||
Yellow='\e[0;33m' # Yellow
|
||||
Blue='\e[0;34m' # Blue
|
||||
Purple='\e[0;35m' # Purple
|
||||
Cyan='\e[0;36m' # Cyan
|
||||
White='\e[0;37m' # White
|
||||
|
||||
# Bold
|
||||
BBlack='\e[1;30m' # Black
|
||||
BRed='\e[1;31m' # Red
|
||||
BGreen='\e[1;32m' # Green
|
||||
BYellow='\e[1;33m' # Yellow
|
||||
BBlue='\e[1;34m' # Blue
|
||||
BPurple='\e[1;35m' # Purple
|
||||
BCyan='\e[1;36m' # Cyan
|
||||
BWhite='\e[1;37m' # White
|
||||
|
||||
# Underline
|
||||
UBlack='\e[4;30m' # Black
|
||||
URed='\e[4;31m' # Red
|
||||
UGreen='\e[4;32m' # Green
|
||||
UYellow='\e[4;33m' # Yellow
|
||||
UBlue='\e[4;34m' # Blue
|
||||
UPurple='\e[4;35m' # Purple
|
||||
UCyan='\e[4;36m' # Cyan
|
||||
UWhite='\e[4;37m' # White
|
||||
|
||||
# Background
|
||||
On_Black='\e[40m' # Black
|
||||
On_Red='\e[41m' # Red
|
||||
On_Green='\e[42m' # Green
|
||||
On_Yellow='\e[43m' # Yellow
|
||||
On_Blue='\e[44m' # Blue
|
||||
On_Purple='\e[45m' # Purple
|
||||
On_Cyan='\e[46m' # Cyan
|
||||
On_White='\e[47m' # White
|
||||
|
||||
# High Intensity
|
||||
IBlack='\e[0;90m' # Black
|
||||
IRed='\e[0;91m' # Red
|
||||
IGreen='\e[0;92m' # Green
|
||||
IYellow='\e[0;93m' # Yellow
|
||||
IBlue='\e[0;94m' # Blue
|
||||
IPurple='\e[0;95m' # Purple
|
||||
ICyan='\e[0;96m' # Cyan
|
||||
IWhite='\e[0;97m' # White
|
||||
|
||||
# Bold High Intensity
|
||||
BIBlack='\e[1;90m' # Black
|
||||
BIRed='\e[1;91m' # Red
|
||||
BIGreen='\e[1;92m' # Green
|
||||
BIYellow='\e[1;93m' # Yellow
|
||||
BIBlue='\e[1;94m' # Blue
|
||||
BIPurple='\e[1;95m' # Purple
|
||||
BICyan='\e[1;96m' # Cyan
|
||||
BIWhite='\e[1;97m' # White
|
||||
|
||||
# High Intensity backgrounds
|
||||
On_IBlack='\e[0;100m' # Black
|
||||
On_IRed='\e[0;101m' # Red
|
||||
On_IGreen='\e[0;102m' # Green
|
||||
On_IYellow='\e[0;103m' # Yellow
|
||||
On_IBlue='\e[0;104m' # Blue
|
||||
On_IPurple='\e[0;105m' # Purple
|
||||
On_ICyan='\e[0;106m' # Cyan
|
||||
On_IWhite='\e[0;107m' # White
|
12
cheat/cheatsheets/aria2c
Normal file
12
cheat/cheatsheets/aria2c
Normal file
@ -0,0 +1,12 @@
|
||||
# Just download a file
|
||||
# The url can be a http(s), ftp, .torrent file or even a magnet link
|
||||
aria2c <url>
|
||||
|
||||
# To prevent downloading the .torrent file
|
||||
aria2c --follow-torrent=mem <url>
|
||||
|
||||
# Download 1 file at a time (-j)
|
||||
# continuing (-c) any partially downloaded ones
|
||||
# to the directory specified (-d)
|
||||
# reading urls from the file (-i)
|
||||
aria2c -j 1 -c -d ~/Downloads -i /path/to/file
|
11
cheat/cheatsheets/bzip2
Normal file
11
cheat/cheatsheets/bzip2
Normal file
@ -0,0 +1,11 @@
|
||||
# compress foo -> foo.bz2
|
||||
bzip2 -z foo
|
||||
|
||||
# decompress foo.bz2 -> foo
|
||||
bzip2 -d foo.bz2
|
||||
|
||||
# compress foo to stdout
|
||||
bzip2 -zc foo > foo.bz2
|
||||
|
||||
# decompress foo.bz2 to stdout
|
||||
bzip2 -dc foo.bz2
|
8
cheat/cheatsheets/cat
Normal file
8
cheat/cheatsheets/cat
Normal file
@ -0,0 +1,8 @@
|
||||
# Display the contents of a file
|
||||
cat /path/to/foo
|
||||
|
||||
# Display contents with line numbers
|
||||
cat -n /path/to/foo
|
||||
|
||||
# Display contents with line numbers (blank lines excluded)
|
||||
cat -b /path/to/foo
|
11
cheat/cheatsheets/cd
Normal file
11
cheat/cheatsheets/cd
Normal file
@ -0,0 +1,11 @@
|
||||
#Go to the given directory
|
||||
cd path/to/directory
|
||||
|
||||
#Go to home directory of current user
|
||||
cd
|
||||
|
||||
#Go up to the parent of the current directory
|
||||
cd ..
|
||||
|
||||
#Go to the previously chosen directory
|
||||
cd -
|
14
cheat/cheatsheets/cheat
Normal file
14
cheat/cheatsheets/cheat
Normal file
@ -0,0 +1,14 @@
|
||||
# To see example usage of a program:
|
||||
cheat <command>
|
||||
|
||||
# To edit a cheatsheet
|
||||
cheat -e <command>
|
||||
|
||||
# To list available cheatsheets
|
||||
cheat -l
|
||||
|
||||
# To search available cheatsheets
|
||||
cheat -s <command>
|
||||
|
||||
# To get the current `cheat' version
|
||||
cheat -v
|
11
cheat/cheatsheets/cp
Normal file
11
cheat/cheatsheets/cp
Normal file
@ -0,0 +1,11 @@
|
||||
# Create a copy of a file
|
||||
cp ~/Desktop/foo.txt ~/Downloads/foo.txt
|
||||
|
||||
# Create a copy of a directory
|
||||
cp -r ~/Desktop/cruise_pics/ ~/Pictures/
|
||||
|
||||
# Create a copy but ask to overwrite if the destination file already exists
|
||||
cp -i ~/Desktop/foo.txt ~/Documents/foo.txt
|
||||
|
||||
# Create a backup file with date
|
||||
cp foo.txt{,."$(date +%Y%m%d-%H%M%S)"}
|
132
cheat/cheatsheets/cpdf
Normal file
132
cheat/cheatsheets/cpdf
Normal file
@ -0,0 +1,132 @@
|
||||
# Read in.pdf, select pages 1, 2, 3 and 6, and write those pages to
|
||||
# out.pdf
|
||||
cpdf in.pdf 1-3,6 -o out.pdf
|
||||
|
||||
# Select the even pages (2, 4, 6...) from in.pdf and write those pages
|
||||
# to out.pdf
|
||||
cpdf in.pdf even -o out.pdf
|
||||
|
||||
# Using AND to perform several operations in order, here merging two
|
||||
# files together and adding a copyright stamp to every page.
|
||||
cpdf -merge in.pdf in2.pdf AND -add-text "Copyright 2014" -o out.pdf
|
||||
|
||||
# Read control.txt and use its contents as the command line arguments
|
||||
# for cpdf.
|
||||
cpdf -control control.txt
|
||||
|
||||
# Merge in.pdf and in2.pdf into one document, writing to out.pdf.
|
||||
cpdf -merge in.pdf in2.pdf -o out.pdf
|
||||
|
||||
# Split in.pdf into ten-page chunks, writing them to Chunk001.pdf,
|
||||
# Chunk002.pdf etc
|
||||
cpdf -split in.pdf -o Chunk%%%.pdf -chunk 10
|
||||
|
||||
# Split in.pdf on bookmark boundaries, writing each to a file whose
|
||||
# name is the bookmark label
|
||||
cpdf -split-bookmarks 0 in.pdf -o @N.pdf
|
||||
|
||||
# Scale both the dimensions and contents of in.pdf by a factor of two
|
||||
# in x and y directions.
|
||||
cpdf -scale-page "2 2" in.pdf -o out.pdf
|
||||
|
||||
# Scale the pages in in.pdf to fit the US Letter page size, writing to
|
||||
# out.pdf
|
||||
cpdf -scale-to-fit usletterportrait in.pdf -o out.pdf
|
||||
|
||||
# Shift the contents of the page by 26 pts in the x direction, and 18
|
||||
# millimetres in the y direction, writing to out.pdf
|
||||
cpdf -shift "26pt 18mm" in.pdf -o out.pdf
|
||||
|
||||
# Rotate the contents of the pages in in.pdf by ninety degrees and
|
||||
# write to out.pdf.
|
||||
cpdf -rotate-contents 90 in.pdf -o out.pdf
|
||||
|
||||
# Crop the pages in in.pdf to a 600 pts by 400 pts rectangle.
|
||||
cpdf -crop "0 0 600pt 400pt" in.pdf -o out.pdf
|
||||
|
||||
# Encrypt using 128bit PDF encryption using the owner password 'fred'
|
||||
# and the user password 'joe'
|
||||
cpdf -encrypt 128bit fred joe in.pdf -o out.pdf
|
||||
|
||||
# Decrypt using the owner password, writing to out.pdf.
|
||||
cpdf -decrypt in.pdf owner=fred -o out.pdf
|
||||
|
||||
# Compress the data streams in in.pdf, writing the result to out.pdf.
|
||||
cpdf -compress in.pdf -o out.pdf
|
||||
|
||||
# Decompress the data streams in in.pdf, writing to out.pdf.
|
||||
cpdf -decompress in.pdf -o out.pdf
|
||||
|
||||
# List the bookmarks in in.pdf. This would produce:
|
||||
cpdf -list-bookmarks in.pdf
|
||||
|
||||
# Outputs:
|
||||
|
||||
# Add bookmarks in the same form from a prepared file bookmarks.txt to
|
||||
# in.pdf, writing to out.pdf.
|
||||
cpdf -add-bookmarks bookmarks.txt in.pdf -o out.pdf
|
||||
|
||||
# Use the Split style to build a presentation from the PDF in.pdf,
|
||||
# each slide staying 10 seconds on screen unless manually advanced.
|
||||
# The first page, being a title does not move on automatically, and
|
||||
# has no transition effect.
|
||||
cpdf -presentation in.pdf 2-end -trans Split -duration 10 -o out.pdf
|
||||
|
||||
# Stamp the file watermark.pdf on to each page of in.pdf, writing the
|
||||
# result to out.pdf.
|
||||
cpdf -stamp-on watermark.pdf in.pdf -o out.pdf
|
||||
|
||||
# Add a page number and date to all the pages in in.pdf using the
|
||||
# Courier font, writing to out.pdf
|
||||
cpdf -topleft 10 -font Courier -add-text "Page %Page\nDate %d-%m-%Y" in.pdf -o out.pdf
|
||||
|
||||
# Two up impose the file in.pdf, writing to out.pdf
|
||||
cpdf -twoup-stack in.pdf -o out.pdf
|
||||
|
||||
# Add extra blank pages after pages one, three and four of a document.
|
||||
cpdf -pad-after 1,3,4 in.pdf -o out.pdf
|
||||
|
||||
# List the annotations in a file in.pdf to standard output.
|
||||
cpdf -list-annotations in.pdf
|
||||
|
||||
# Might Produce:
|
||||
|
||||
# -- # Annotation text content 1 # -- # -- # Annotation text content 2
|
||||
# --
|
||||
|
||||
# Copy the annotations from from.pdf to in.pdf, writing to out.pdf.
|
||||
cpdf -copy-annotations from.pdf in.pdf -o out.pdf
|
||||
|
||||
# Set the document title of in.pdf. writing to out.pdf.
|
||||
cpdf -set-title "The New Title" in.pdf -o out.pdf
|
||||
|
||||
# Set the document in.pdf to open with the Acrobat Viewer's toolbar
|
||||
# hidden, writing to out.pdf.
|
||||
cpdf -hide-toolbar true in.pdf -o out.pdf
|
||||
|
||||
# Set the metadata in a PDF in.pdf to the contents of the file
|
||||
# metadata.xml, and write the output to out.pdf.
|
||||
cpdf -set-metadata metadata.xml in.pdf -o out.pdf
|
||||
|
||||
# Set the document in.pdf to open in Acrobat Viewer showing two
|
||||
# columns of pages, starting on the right, putting the result in
|
||||
# out.pdf.
|
||||
cpdf -set-page-layout TwoColumnRight in.pdf -o out.pdf
|
||||
|
||||
# Set the document in.pdf to open in Acrobat Viewer in full screen
|
||||
# mode, putting the result in out.pdf.
|
||||
cpdf -set-page-mode FullScreen in.pdf -o out.pdf
|
||||
|
||||
# Attach the file sheet.xls to in.pdf, writing to out.pdf.
|
||||
cpdf -attach-file sheet.xls in.pdf -o out.pdf
|
||||
|
||||
# Remove any attachments from in.pdf, writing to out.pdf.
|
||||
cpdf -remove-files in.pdf -o out.pdf
|
||||
|
||||
# Blacken all the text in in.pdf, writing to out.pdf.
|
||||
cpdf -blacktext in.pdf -o out.pdf
|
||||
|
||||
# Make sure all lines in in.pdf are at least 2 pts wide, writing to
|
||||
# out.pdf.
|
||||
cpdf -thinlines 2pt in.pdf -o out.pdf
|
||||
|
@ -14,7 +14,9 @@ SHELL=/bin/bash
|
||||
# example entries
|
||||
# every 15 min
|
||||
*/15 * * * * /home/user/command.sh
|
||||
|
||||
# every midnight
|
||||
0 * * * * /home/user/command.sh
|
||||
0 0 * * * /home/user/command.sh
|
||||
|
||||
# every Saturday at 8:05 AM
|
||||
5 8 * * 6 /home/user/command.sh
|
||||
|
8
cheat/cheatsheets/cryptsetup
Normal file
8
cheat/cheatsheets/cryptsetup
Normal file
@ -0,0 +1,8 @@
|
||||
# open encrypted partition /dev/sdb1 (reachable at /dev/mapper/backup)
|
||||
cryptsetup open --type luks /dev/sdb1 backup
|
||||
|
||||
# open encrypted partition /dev/sdb1 using a keyfile (reachable at /dev/mapper/hdd)
|
||||
cryptsetup open --type luks --key-file hdd.key /dev/sdb1 hdd
|
||||
|
||||
# close luks container at /dev/mapper/hdd
|
||||
cryptsetup close hdd
|
@ -33,3 +33,9 @@ curl http://ifconfig.me/all/json
|
||||
|
||||
# Limit the rate of a download
|
||||
curl --limit-rate 1000B -O http://path.to.the/file
|
||||
|
||||
# Get your global IP
|
||||
curl httpbin.org/ip
|
||||
|
||||
# Get only the HTTP status code
|
||||
curl -o /dev/null -w '%{http_code}\n' -s -I URL
|
||||
|
@ -1,5 +1,8 @@
|
||||
# Print date in format suitable for affixing to file names
|
||||
date +"%Y%m%d_%H%M%S"
|
||||
|
||||
# Convert Unix timestamp to Date
|
||||
# Convert Unix timestamp to Date(Linux)
|
||||
date -d @1440359821
|
||||
|
||||
# Convert Unix timestamp to Date(Mac)
|
||||
date -r 1440359821
|
||||
|
@ -1,7 +1,7 @@
|
||||
# Read from {/dev/urandom} 2*512 Bytes and put it into {/tmp/test.txt}
|
||||
# Note: At the first iteration, we read 512 Bytes.
|
||||
# Note: At the second iteration, we read 512 Bytes.
|
||||
dd if=/dev/urandom of=/tmp/test.txt count=512 bs=2
|
||||
dd if=/dev/urandom of=/tmp/test.txt count=2 bs=512
|
||||
|
||||
# Watch the progress of 'dd'
|
||||
dd if=/dev/zero of=/dev/null bs=4KB &; export dd_pid=`pgrep '^dd'`; while [[ -d /proc/$dd_pid ]]; do kill -USR1 $dd_pid && sleep 1 && clear; done
|
||||
@ -18,3 +18,5 @@ dd if=/dev/zero of=/dev/null bs=128M status=progress
|
||||
# DD with "graphical" return
|
||||
dcfldd if=/dev/zero of=/dev/null bs=500K
|
||||
|
||||
# This will output the sound from your microphone port to the ssh target computer's speaker port. The sound quality is very bad, so you will hear a lot of hissing.
|
||||
dd if=/dev/dsp | ssh -c arcfour -C username@host dd of=/dev/dsp
|
||||
|
7
cheat/cheatsheets/deb
Normal file
7
cheat/cheatsheets/deb
Normal file
@ -0,0 +1,7 @@
|
||||
# Extract contents of a .deb file
|
||||
$ ar vx foo.deb # -> data.tar.gz
|
||||
$ tar xf data.tar.gz
|
||||
|
||||
# Install .deb file to a debian like system, e.g. ubuntu
|
||||
$ sudo dpkg -i foo.deb
|
||||
$ sudo apt-get install -f
|
@ -21,3 +21,6 @@ diff -s version1 version2
|
||||
|
||||
# To diff the output of two commands or scripts:
|
||||
diff <(command1) <(command2)
|
||||
|
||||
# Generate a patch file from two files
|
||||
diff -Naur version1 version2 > version.patch
|
||||
|
@ -1,21 +1,28 @@
|
||||
# Running emacs
|
||||
|
||||
GUI mode $ emacs
|
||||
Terminal mode $ emacs -nw
|
||||
|
||||
# Basic usage
|
||||
|
||||
Indent Select text then press TAB
|
||||
Cut CTRL-w
|
||||
Copy ALT-w
|
||||
Paste CTRL-y
|
||||
Paste ("yank") CTRL-y
|
||||
Begin selection CTRL-SPACE
|
||||
Search/Find CTRL-s
|
||||
Replace ALT-% (ALT-SHIFT-5)
|
||||
Save CTRL-x CTRL-s
|
||||
Save as CTRL-x CTRL-w
|
||||
Load/Open CTRL-x CTRL-f
|
||||
Undo CTRL-x u
|
||||
Highlight all text CTRL-x h
|
||||
Directory listing CTRL-x d
|
||||
Cancel a command ESC ESC ESC
|
||||
Cancel a command CTRL-g
|
||||
Font size bigger CTRL-x CTRL-+
|
||||
Font size smaller CTRL-x CTRL--
|
||||
|
||||
# Buffers
|
||||
# Buffers
|
||||
|
||||
Split screen vertically CTRL-x 2
|
||||
Split screen vertically with 5 row height CTRL-u 5 CTRL-x 2
|
||||
@ -23,11 +30,21 @@
|
||||
Split screen horizontally with 24 column width CTRL-u 24 CTRL-x 3
|
||||
Revert to single screen CTRL-x 1
|
||||
Hide the current screen CTRL-x 0
|
||||
Kill the current screen CTRL-x k
|
||||
Move to the next buffer CTRL-x O
|
||||
Move to the next screen CTRL-x o
|
||||
Kill the current buffer CTRL-x k
|
||||
Select a buffer CTRL-x b
|
||||
Run command in the scratch buffer CTRL-x CTRL-e
|
||||
|
||||
# Navigation ( backward / forward )
|
||||
|
||||
Character-wise CTRL-b , CTRL-f
|
||||
Word-wise ALT-b , ALT-f
|
||||
Line-wise CTRL-p , CTRL-n
|
||||
Sentence-wise ALT-a , ALT-e
|
||||
Paragraph-wise ALT-{ , ALT-}
|
||||
Function-wise CTRL-ALT-a , CTRL-ALT-e
|
||||
Line beginning / end CTRL-a , CTRL-e
|
||||
|
||||
# Other stuff
|
||||
|
||||
Open a shell ALT-x eshell
|
||||
@ -39,32 +56,9 @@
|
||||
Compile some code ALT-x compile
|
||||
List packages ALT-x package-list-packages
|
||||
|
||||
# Sudoing within eshell
|
||||
|
||||
By default when using the sudo command within eshell you'll just
|
||||
get "permission denied" messages. To overcome that type:
|
||||
|
||||
alias sudo '*sudo $*'
|
||||
|
||||
# Line numbers
|
||||
|
||||
To add line numbers and enable moving to a line with CTRL-l:
|
||||
|
||||
(global-set-key "\C-l" 'goto-line)
|
||||
(add-hook 'find-file-hook (lambda () (linum-mode 1)))
|
||||
|
||||
# Org-mode
|
||||
|
||||
To begin org-mode ALT-x org-mode
|
||||
Table column separator Vertical/pipe character
|
||||
Reorganize table TAB
|
||||
Section heading *
|
||||
Open/collapse section TAB
|
||||
Open/collapse All CTRL-TAB
|
||||
Export in other file formats (eg HTML,PDF) CTRL-c CTRL-e
|
||||
|
||||
To make org-mode automatically wrap lines:
|
||||
|
||||
(add-hook 'org-mode-hook
|
||||
'(lambda ()
|
||||
(visual-line-mode 1)))
|
||||
|
5
cheat/cheatsheets/export
Normal file
5
cheat/cheatsheets/export
Normal file
@ -0,0 +1,5 @@
|
||||
# Calling export with no arguments will show current shell attributes
|
||||
export
|
||||
|
||||
# Create new environment variable
|
||||
export VARNAME="value"
|
@ -2,7 +2,17 @@
|
||||
ffmpeg -i path/to/file.ext
|
||||
|
||||
# Convert all m4a files to mp3
|
||||
for f in *.m4a; do ffmpeg -i "$f" -acodec libmp3lame -ab 320k "${f%.m4a}.mp3"; done
|
||||
for f in *.m4a; do ffmpeg -i "$f" -acodec libmp3lame -vn -b:a 320k "${f%.m4a}.mp3"; done
|
||||
|
||||
# Convert video from .foo to .bar
|
||||
# -g : GOP, for searchability
|
||||
ffmpeg -i input.foo -vcodec bar -acodec baz -b:v 21000k -b:a 320k -g 150 -threads 4 output.bar
|
||||
|
||||
# Convert image sequence to video
|
||||
ffmpeg -r 18 -pattern_type glob -i '*.png' -b:v 21000k -s hd1080 -vcodec vp9 -an -pix_fmt yuv420p -deinterlace output.ext
|
||||
|
||||
# Combine video and audio into one file
|
||||
ffmpeg -i video.ext -i audio.ext -c:v copy -c:a copy output.ext
|
||||
|
||||
# Listen to 10 seconds of audio from a video file
|
||||
#
|
||||
@ -10,3 +20,4 @@ for f in *.m4a; do ffmpeg -i "$f" -acodec libmp3lame -ab 320k "${f%.m4a}.mp3"; d
|
||||
# -t : seconds to cut
|
||||
# -autoexit : closes ffplay as soon as the audio finishes
|
||||
ffmpeg -ss 00:34:24.85 -t 10 -i path/to/file.mp4 -f mp3 pipe:play | ffplay -i pipe:play -autoexit
|
||||
|
||||
|
@ -19,11 +19,11 @@ find ./path/ -name '*.txt' -exec rm '{}' \;
|
||||
# To find files with extension '.txt' and look for a string into them:
|
||||
find ./path/ -name '*.txt' | xargs grep 'string'
|
||||
|
||||
# To find files with size bigger than 5 Mb and sort them by size:
|
||||
# To find files with size bigger than 5 Mebibyte and sort them by size:
|
||||
find . -size +5M -type f -print0 | xargs -0 ls -Ssh | sort -z
|
||||
|
||||
# To find files bigger thank 2 MB and list them:
|
||||
find . -type f -size +20000k -exec ls -lh {} \; | awk '{ print $9 ": " $5 }'
|
||||
# To find files bigger than 2 Megabyte and list them:
|
||||
find . -type f -size +200000000c -exec ls -lh {} \; | awk '{ print $9 ": " $5 }'
|
||||
|
||||
# To find files modified more than 7 days ago and list file information
|
||||
find . -type f -mtime +7d -ls
|
||||
@ -40,5 +40,8 @@ find . -maxdepth 2 -name build -type d
|
||||
# To search all files who are not in .git directory
|
||||
find . ! -iwholename '*.git*' -type f
|
||||
|
||||
# Find all files that have the same node (hard link) as MY_FILE_HERE
|
||||
# To find all files that have the same node (hard link) as MY_FILE_HERE
|
||||
find . -type f -samefile MY_FILE_HERE 2>/dev/null
|
||||
|
||||
# To find all files in the current directory and modify their permissions
|
||||
find . -type f -exec chmod 644 {} \;
|
||||
|
@ -11,6 +11,24 @@ git config --global color.ui true
|
||||
# To stage all changes for commit:
|
||||
git add --all
|
||||
|
||||
# To stash changes locally, this will keep the changes in a separate changelist
|
||||
# called stash and the working directory is cleaned. You can apply changes
|
||||
# from the stash anytime
|
||||
git stash
|
||||
|
||||
# To stash changes with a message
|
||||
git stash save "message"
|
||||
|
||||
# To list all the stashed changes
|
||||
git stash list
|
||||
|
||||
# To apply the most recent change and remove the stash from the stash list
|
||||
git stash pop
|
||||
|
||||
# To apply any stash from the list of stashes. This does not remove the stash
|
||||
# from the stash list
|
||||
git stash apply stash@{6}
|
||||
|
||||
# To commit staged changes
|
||||
git commit -m "Your commit message"
|
||||
|
||||
@ -104,3 +122,30 @@ git clone --depth 1 <remote-url>
|
||||
|
||||
# To unshallow a clone
|
||||
git pull --unshallow
|
||||
|
||||
# Create a bare branch (one that has no commits on it)
|
||||
git checkout --orphan branch_name
|
||||
|
||||
# Checkout a new branch from a different starting point
|
||||
git checkout -b master upstream/master
|
||||
|
||||
# Remove all stale branches (ones that have been deleted on remote)
|
||||
# So if you have a lot of useless branches, delete them on Github and then run this
|
||||
git remote prune origin
|
||||
|
||||
# The following can be used to prune all remotes at once
|
||||
git remote prune $(git remote | tr '\n' ' ')
|
||||
|
||||
# Revisions can also be identified with :/text
|
||||
# So, this will show the first commit that has "cool" in their message body
|
||||
git show :/cool
|
||||
|
||||
# Undo parts of last commit in a specific file
|
||||
git checkout -p HEAD^ -- /path/to/file
|
||||
|
||||
# Revert a commit and keep the history of the reverted change as a separate revert commit
|
||||
git revert <commit SHA>
|
||||
|
||||
# Pich a commit from a branch to current branch. This is different than merge as
|
||||
# this just applies a single commit from a branch to current branch
|
||||
git cherry-pick <commit SHA1>
|
||||
|
12
cheat/cheatsheets/gyb
Normal file
12
cheat/cheatsheets/gyb
Normal file
@ -0,0 +1,12 @@
|
||||
# To estimate the number and the size of all mails on youremail@gmail.com
|
||||
gyb --email youremail@gmail.com --action estimate
|
||||
|
||||
# To backup from youremail@gmail.com to your local-folder
|
||||
gyb --email youremail@gmail.com --action backup --local-folder "~/MyLocalFolder/"
|
||||
|
||||
# To backup from youremail@gmail.com only important or starred emails to the
|
||||
# default local folder GYB-GMail-Backup-youremail@gmail.com
|
||||
gyb --email youremail@gmail.com --search "is:important OR is:starred"
|
||||
|
||||
# To restore from your local-folder to youremail@gmail.com
|
||||
gyb --email youremail@gmail.com --action restore --local-folder "~/MyLocalFolder/"
|
20
cheat/cheatsheets/hg
Normal file
20
cheat/cheatsheets/hg
Normal file
@ -0,0 +1,20 @@
|
||||
# Clone a directory
|
||||
hg clone
|
||||
|
||||
# Add files to hg tracker
|
||||
hg add filename
|
||||
|
||||
# Add all files in a folder to hg tracker
|
||||
hg add folder/
|
||||
|
||||
# Create a commit with all tracked changes and a message
|
||||
hg commit -m "message"
|
||||
|
||||
# Push commits to source repository
|
||||
hg push
|
||||
|
||||
# Pull changes from source repository
|
||||
hg pull
|
||||
|
||||
# Rebase local commits to disambiguate with remote repository
|
||||
hg pull --rebase
|
3
cheat/cheatsheets/iconv
Normal file
3
cheat/cheatsheets/iconv
Normal file
@ -0,0 +1,3 @@
|
||||
# To convert file (iconv.src) from iso-8859-1 to utf-8 and save to
|
||||
# /tmp/iconv.out
|
||||
iconv -f iso-8859-1 -t utf-8 iconv.src -o /tmp/iconv.out
|
@ -16,11 +16,18 @@
|
||||
# To switch between channel windows
|
||||
ALT+<number>, eg. ALT+1, ALT+2
|
||||
|
||||
# To list the nicknames within a channel
|
||||
# To list the nicknames within the active channel
|
||||
/names
|
||||
|
||||
# To change the topic
|
||||
# To change the channel topic
|
||||
/topic <description>
|
||||
|
||||
# To quit irssi
|
||||
# To limit channel background noise (joins, parts, quits, etc.)
|
||||
/ignore #foo,#bar JOINS PARTS QUITS NICKS # Quieten only channels `#foo`, `#bar`
|
||||
/ignore * JOINS PARTS QUITS NICKS # Quieten all channels
|
||||
|
||||
# To save the current Irssi session config into the configuration file
|
||||
/save
|
||||
|
||||
# To quit Irssi
|
||||
/exit
|
||||
|
5
cheat/cheatsheets/kill
Normal file
5
cheat/cheatsheets/kill
Normal file
@ -0,0 +1,5 @@
|
||||
# Kill a process gracefully
|
||||
kill -15 <process id>
|
||||
|
||||
# Kill a process forcefully
|
||||
kill -9 <process id>
|
@ -1,2 +1,9 @@
|
||||
# To disable the terminal refresh when exiting
|
||||
less -X
|
||||
less -X
|
||||
|
||||
# To save the contents to a file
|
||||
# Method 1 - Only works when the input is a pipe
|
||||
s <filename>
|
||||
|
||||
# Method 2 - This should work whether input is a pipe or an ordinary file.
|
||||
Type g or < (g or less-than) | $ (pipe then dollar) then cat > <filename> and Enter.
|
||||
|
@ -4,20 +4,34 @@ sudo lsof -i4
|
||||
# List all IPv6 network files
|
||||
sudo lsof -i6
|
||||
|
||||
# To find listening ports:
|
||||
# List all open sockets
|
||||
lsof -i
|
||||
|
||||
# List all listening ports
|
||||
lsof -Pnl +M -i4
|
||||
|
||||
# To find which program is using the port 80:
|
||||
# Find which program is using the port 80
|
||||
lsof -i TCP:80
|
||||
|
||||
# List all connections to a specific host
|
||||
lsof -i@192.168.1.5
|
||||
|
||||
# List all processes accessing a particular file/directory
|
||||
lsof </path/to/file>
|
||||
|
||||
# List all files open for a particular user
|
||||
lsof -u <username>
|
||||
|
||||
# List all files/network connections a given process is using
|
||||
# List all files/network connections a command is using
|
||||
lsof -c <command-name>
|
||||
|
||||
# List all files a process has open
|
||||
lsof -p <pid>
|
||||
|
||||
# List all files open mounted at /mount/point.
|
||||
# Particularly useful for finding which process(es) are using a
|
||||
# mounted USB stick or CD/DVD.
|
||||
lsof +f -- </mount/point>
|
||||
|
||||
# See this primer: http://www.danielmiessler.com/study/lsof/
|
||||
# for a number of other useful lsof tips
|
||||
|
14
cheat/cheatsheets/mv
Normal file
14
cheat/cheatsheets/mv
Normal file
@ -0,0 +1,14 @@
|
||||
# Move a file from one place to another
|
||||
mv ~/Desktop/foo.txt ~/Documents/foo.txt
|
||||
|
||||
# Move a file from one place to another and automatically overwrite if the destination file exists
|
||||
# (This will override any previous -i or -n args)
|
||||
mv -f ~/Desktop/foo.txt ~/Documents/foo.txt
|
||||
|
||||
# Move a file from one place to another but ask before overwriting an existing file
|
||||
# (This will override any previous -f or -n args)
|
||||
mv -i ~/Desktop/foo.txt ~/Documents/foo.txt
|
||||
|
||||
# Move a file from one place to another but never overwrite anything
|
||||
# (This will override any previous -f or -i args)
|
||||
mv -n ~/Desktop/foo.txt ~/Documents/foo.txt
|
@ -28,4 +28,10 @@ INSERT INTO tbl_name (col1,col2) VALUES(15,col1*2);
|
||||
UPDATE tbl_name SET col1 = "example";
|
||||
|
||||
# Basic DELETE Statement
|
||||
DELETE FROM tbl_name WHERE user = 'jcole';
|
||||
DELETE FROM tbl_name WHERE user = 'jcole';
|
||||
|
||||
# To check stored procedure
|
||||
SHOW PROCEDURE STATUS;
|
||||
|
||||
# To check stored function
|
||||
SHOW FUNCTION STATUS;
|
||||
|
11
cheat/cheatsheets/ncdu
Normal file
11
cheat/cheatsheets/ncdu
Normal file
@ -0,0 +1,11 @@
|
||||
# Save results to file
|
||||
ncdu -o ncdu.file
|
||||
|
||||
# Read from file
|
||||
ncdu -f ncdu.file
|
||||
|
||||
# Save results to compressed file
|
||||
ncdu -o-| gzip > ncdu.file.gz
|
||||
|
||||
# Read from compressed file
|
||||
zcat ncdu.file.gz | ncdu -f-
|
40
cheat/cheatsheets/nmcli
Normal file
40
cheat/cheatsheets/nmcli
Normal file
@ -0,0 +1,40 @@
|
||||
# Desc: Command line interface to NetworkManager
|
||||
|
||||
# Connect to a wireless access point - Parameters:
|
||||
# <wiface> -- the name of your wireless interface
|
||||
# <ssid> -- the SSID of the access point
|
||||
# <pass> -- the WiFi password
|
||||
nmcli d wifi connect <ssid> password <pass> iface <wiface>
|
||||
|
||||
# Disconnect from WiFi - Parameters:
|
||||
# <wiface> -- the name of your wireless interface
|
||||
nmcli d wifi disconnect iface <wiface>
|
||||
|
||||
# Get WiFi status (enabled / disabled)
|
||||
nmcli radio wifi
|
||||
|
||||
# Enable / Disable WiFi
|
||||
nmcli radio wifi <on|off>
|
||||
|
||||
# Show all available WiFi access points
|
||||
nmcli dev wifi list
|
||||
|
||||
# Refresh the available WiFi connection list
|
||||
nmcli dev wifi rescan
|
||||
|
||||
# Show all available connections
|
||||
nmcli con
|
||||
|
||||
# Show only active connections
|
||||
nmcli con show --active
|
||||
|
||||
# Review the available devices
|
||||
nmcli dev status
|
||||
|
||||
# Add a dynamic ethernet connection - parameters:
|
||||
# <name> -- the name of the connection
|
||||
# <iface_name> -- the name of the interface
|
||||
ncmli con add type ethernet con-name <name> ifname <iface_name>
|
||||
|
||||
# Bring up the ethernet connection
|
||||
nmcli con up <name>
|
22
cheat/cheatsheets/npm
Normal file
22
cheat/cheatsheets/npm
Normal file
@ -0,0 +1,22 @@
|
||||
# Every command shown here can be used with the `-g` switch for global scope
|
||||
|
||||
# Install a package in the current directory
|
||||
npm install <package>
|
||||
|
||||
# Install a package, and save it in the `dependencies` section of `package.json`
|
||||
npm install --save <package>
|
||||
|
||||
# Install a package, and save it in the `devDependencies` section of `package.json`
|
||||
npm install --save-dev <package>
|
||||
|
||||
# Show outdated packages in the current directory
|
||||
npm outdated
|
||||
|
||||
# Update outdated packages
|
||||
npm update
|
||||
|
||||
# Update `npm` (will override the one shipped with Node.js)
|
||||
npm install -g npm
|
||||
|
||||
# Uninstall a package
|
||||
npm uninstall <package>
|
@ -15,6 +15,9 @@ openssl req -text -noout -in server.csr
|
||||
# To show certificate information for generated certificate
|
||||
openssl x509 -text -noout -in server.crt
|
||||
|
||||
# To get the sha256 fingerprint of a certificate
|
||||
openssl x509 -in server.crt -noout -sha256 -fingerprint
|
||||
|
||||
# To view certificate expiration:
|
||||
echo | openssl s_client -connect <hostname>:443 2> /dev/null | \
|
||||
awk '/-----BEGIN/,/END CERTIFICATE-----/' | \
|
||||
|
46
cheat/cheatsheets/org-mode
Normal file
46
cheat/cheatsheets/org-mode
Normal file
@ -0,0 +1,46 @@
|
||||
Begin org-mode ALT-x org-mode
|
||||
Save CTRL-x CTRL-s
|
||||
Export in other file formats (eg HTML,PDF) CTRL-c CTRL-e
|
||||
|
||||
# Outline
|
||||
|
||||
Section heading *
|
||||
New headline ALT-return
|
||||
Move headline up or down ALT-up_arrow/down_arrow
|
||||
Adjust indent depth of headline ALT-left_arrow/right_arrow
|
||||
Open/collapse section TAB
|
||||
Open/collapse All CTRL-TAB
|
||||
|
||||
# To-Do Lists
|
||||
|
||||
Mark list item as TODO ** TODO
|
||||
Cycle through workflow SHIFT-left_arrow/right_arrow
|
||||
Show only outstanding TODO items CTRL-c CTRL-v
|
||||
|
||||
# Tables
|
||||
|
||||
Table column separator Vertical/pipe character
|
||||
Reorganize table TAB
|
||||
Move column ALT-left_arrow/right_arrow
|
||||
Move row ALT-up_arrow/down_arrow
|
||||
|
||||
# Styles
|
||||
|
||||
*bold*
|
||||
/italic/
|
||||
_underlined_
|
||||
=code=
|
||||
~verbatim~
|
||||
+strike-through+
|
||||
|
||||
# Heading
|
||||
|
||||
Header -*- mode: org -*-
|
||||
|
||||
# .emacs
|
||||
|
||||
To make org-mode automatically wrap lines:
|
||||
|
||||
(add-hook 'org-mode-hook
|
||||
'(lambda ()
|
||||
(visual-line-mode 1)))
|
13
cheat/cheatsheets/patch
Normal file
13
cheat/cheatsheets/patch
Normal file
@ -0,0 +1,13 @@
|
||||
# Patch one file
|
||||
patch version1 < version.patch
|
||||
|
||||
# Reverse a patch
|
||||
patch -R version1 < version.patch
|
||||
|
||||
# Patch all files in a directory, adding any missing new files
|
||||
# -p strips leading slashes
|
||||
$ cd dir
|
||||
$ patch -p1 -i ../big.patch
|
||||
|
||||
# Patch files in a directory, with one level (/) offset
|
||||
patch -p1 -r version1/ < version.patch
|
8
cheat/cheatsheets/perl
Normal file
8
cheat/cheatsheets/perl
Normal file
@ -0,0 +1,8 @@
|
||||
# To view the perl version:
|
||||
perl -v
|
||||
|
||||
# Replace string "\n" to newline
|
||||
echo -e "foo\nbar\nbaz" | perl -pe 's/\n/\\n/g;'
|
||||
|
||||
# Replace newline with multiple line to space
|
||||
cat test.txt | perl -0pe "s/test1\ntest2/test1 test2/m"
|
5
cheat/cheatsheets/pgrep
Normal file
5
cheat/cheatsheets/pgrep
Normal file
@ -0,0 +1,5 @@
|
||||
# Get a list of PIDs matching the pattern
|
||||
pgrep example
|
||||
|
||||
# Kill all PIDs matching the pattern
|
||||
pgrep -f example | xargs kill
|
@ -4,6 +4,12 @@ pip search SomePackage
|
||||
# Install some packages
|
||||
pip install SomePackage
|
||||
|
||||
# Install some package in user space
|
||||
pip install --user SomePackage
|
||||
|
||||
# Upgrade some package
|
||||
pip install --upgrade SomePackage
|
||||
|
||||
# Output and install packages in a requirement file
|
||||
pip freeze > requirements.txt
|
||||
pip install -r requirements.txt
|
||||
@ -17,5 +23,8 @@ pip list --outdated
|
||||
# Upgrade all outdated packages, thanks to http://stackoverflow.com/a/3452888
|
||||
pip freeze --local | grep -v '^\-e' | cut -d = -f 1 | xargs -n1 pip install -U
|
||||
|
||||
# Upgrade outdated packages on latest version of pip
|
||||
pip list --outdated --format=freeze | cut -d = -f 1 | xargs -n1 pip install -U
|
||||
|
||||
# Install specific version of a package
|
||||
pip install -I SomePackage1==1.1.0 'SomePackage2>=1.0.4'
|
||||
|
27
cheat/cheatsheets/pkgtools
Normal file
27
cheat/cheatsheets/pkgtools
Normal file
@ -0,0 +1,27 @@
|
||||
# Create a Slackware package from a structured directory and sub-tree
|
||||
$ cd /path/to/pkg/dir
|
||||
$ su - c 'makepkg --linkadd y --chown n $foo-1.0.3-x86_64-1_tag.tgz'
|
||||
|
||||
|
||||
# Install a Slackware package
|
||||
installpkg foo-1.0.3-x86_64-1.tgz
|
||||
|
||||
# Install a Slackware package to non-standard location
|
||||
ROOT=/path/to/dir installpkg foo-1.0.4-noarch-1.tgz
|
||||
|
||||
# Create backup of files that will be overwritten when installing
|
||||
tar czvf /tmp/backup.tar.gz $(installpkg --warn foo-1.0.4-noarch-1.tgz)
|
||||
|
||||
|
||||
# Upgrade a Slackware package including files only in new version
|
||||
upgradepkg --install-new foo-1.0.6-noarch-1.tgz
|
||||
|
||||
# Upgrade a Slackware package even if version is the same
|
||||
upgradepkg --reinstall foo-1.0.4-noarch-1.tgz
|
||||
|
||||
|
||||
# Remove a Slackware package
|
||||
removepkg foo-0.2.8-x86_64-1
|
||||
|
||||
# Remove a Slackware package, retaining a backup (uninstalled) copy
|
||||
removepkg -copy foo-0.2.8-x86_64-1 # -> /var/log/setup/tmp/preserved_packages/foo...
|
5
cheat/cheatsheets/pkill
Normal file
5
cheat/cheatsheets/pkill
Normal file
@ -0,0 +1,5 @@
|
||||
# To kill a process using it's full process name
|
||||
pkill <processname>
|
||||
|
||||
# To kill a process by it's partial name
|
||||
pkill -f <string>
|
2
cheat/cheatsheets/popd
Normal file
2
cheat/cheatsheets/popd
Normal file
@ -0,0 +1,2 @@
|
||||
# Returns to the directory at the top of the `pushd' stack
|
||||
popd
|
26
cheat/cheatsheets/psql
Normal file
26
cheat/cheatsheets/psql
Normal file
@ -0,0 +1,26 @@
|
||||
# psql is the PostgreSQL terminal interface. The following commands were tested on version 9.5.
|
||||
# Connection options:
|
||||
# -U username (if not specified current OS user is used).
|
||||
# -p port.
|
||||
# -h server hostname/address.
|
||||
|
||||
# Connect to a specific database:
|
||||
psql -U postgres -h serverAddress -d dbName
|
||||
|
||||
# Get databases on a server:
|
||||
psql -U postgres -h serverAddress --list
|
||||
|
||||
# Execute sql query and save output to file:
|
||||
psql -U postgres -d dbName -c 'select * from tableName;' -o fileName
|
||||
|
||||
# Execute query and get tabular html output:
|
||||
psql -U postgres -d dbName -H -c 'select * from tableName;'
|
||||
|
||||
# Execute query and save resulting rows to csv file:
|
||||
psql -U postgres -d dbName -t -A -P fieldsep=',' -c 'select * from tableName;' -o fileName.csv
|
||||
|
||||
# Read commands from file:
|
||||
psql -f fileName
|
||||
|
||||
# Restore databases from file:
|
||||
psql -f fileName.backup postgres
|
5
cheat/cheatsheets/pushd
Normal file
5
cheat/cheatsheets/pushd
Normal file
@ -0,0 +1,5 @@
|
||||
# Pushes your current directory to the top of a stack while changing to the specified directory
|
||||
pushd <directory>
|
||||
|
||||
# To return use popd
|
||||
popd
|
2
cheat/cheatsheets/pwd
Normal file
2
cheat/cheatsheets/pwd
Normal file
@ -0,0 +1,2 @@
|
||||
# Show the absolute path of your current working directory on the filesystem
|
||||
pwd
|
26
cheat/cheatsheets/rcs
Normal file
26
cheat/cheatsheets/rcs
Normal file
@ -0,0 +1,26 @@
|
||||
# Initial check-in of file (leaving file active in filesystem)
|
||||
ci -u <filename>
|
||||
|
||||
# Check out with lock
|
||||
co -l <filename>
|
||||
|
||||
# Check in and unlock (leaving file active in filesystem)
|
||||
ci -u <filename>
|
||||
|
||||
# Display version x.y of a file
|
||||
co -px.y <filename>
|
||||
|
||||
# Undo to version x.y (overwrites file active in filesystem with the specified revision)
|
||||
co -rx.y <filename>
|
||||
|
||||
# Diff file active in filesystem and last revision
|
||||
rcsdiff <filename>
|
||||
|
||||
# Diff versions x.y and x.z
|
||||
rcsdiff -rx.y -rx.z <filename>
|
||||
|
||||
# View log of check-ins
|
||||
rlog <filename>
|
||||
|
||||
# Break an RCS lock held by another person on a file
|
||||
rcs -u <filename>
|
5
cheat/cheatsheets/rpm2cpio
Normal file
5
cheat/cheatsheets/rpm2cpio
Normal file
@ -0,0 +1,5 @@
|
||||
# List contents of RPM
|
||||
rpm2cpio foo.rpm | cpio -vt
|
||||
|
||||
# Extract contents of RPM
|
||||
rpm2cpio foo.rpm | cpio -vid
|
8
cheat/cheatsheets/shutdown
Normal file
8
cheat/cheatsheets/shutdown
Normal file
@ -0,0 +1,8 @@
|
||||
# Reboot the system immediately
|
||||
shutdown -r now
|
||||
|
||||
# Shut system down immediately
|
||||
shutdown -h now
|
||||
|
||||
# Reboot system after 5 minutes
|
||||
shutdown -r +5
|
32
cheat/cheatsheets/sport
Normal file
32
cheat/cheatsheets/sport
Normal file
@ -0,0 +1,32 @@
|
||||
# Sync to newest SlackBuild.org tree
|
||||
sport r
|
||||
|
||||
# Search (fuzzy) SlackBuild tree for packages foo and BaR
|
||||
sport s foo bar
|
||||
|
||||
# Operate from alternate build tree
|
||||
SBOPATH=/path/to/tree sport s foo
|
||||
|
||||
# View info and README of BaR (not fuzzy)
|
||||
sport c foo BaR
|
||||
|
||||
# Build a package
|
||||
sport i --build-only foo
|
||||
|
||||
# Build and install package foo and BaR
|
||||
sport i foo BaR
|
||||
|
||||
# Build and install package from current directory
|
||||
sport i .
|
||||
|
||||
# Upgrade instead of install
|
||||
INSTALLER=upgradepkg sport i foo
|
||||
|
||||
# Build dependency list for baz
|
||||
echo "foo BaR" >> /tmp/baz.list
|
||||
|
||||
# Install list of packages from file
|
||||
sport i $(< /tmp/baz.list)
|
||||
|
||||
# Check if package is installed
|
||||
sport k foo
|
20
cheat/cheatsheets/sqlite3
Normal file
20
cheat/cheatsheets/sqlite3
Normal file
@ -0,0 +1,20 @@
|
||||
# create database and launch interactive shell
|
||||
sqlite3 example.db
|
||||
|
||||
# create table
|
||||
sqlite3 example.db "CREATE TABLE Os(ID INTEGER PRIMARY KEY, Name TEXT, Year INTEGER);"
|
||||
|
||||
# insert data
|
||||
sqlite3 example.db "INSERT INTO 'Os' VALUES(1,'Linux',1991);"
|
||||
|
||||
# list tables
|
||||
sqlite3 example.db ".tables"
|
||||
|
||||
# view records in table
|
||||
sqlite3 example.db "SELECT * FROM 'Os';"
|
||||
|
||||
# view records in table conditionally
|
||||
sqlite example.db "SELECT * FROM 'Os' WHERE Year='1991';"
|
||||
|
||||
# view records with fuzzy matching
|
||||
sqlite3 ~/example.db "SELECT * FROM 'Os' WHERE Year like '19%';"
|
@ -32,3 +32,12 @@ ssh user@example.com -C -c blowfish -X
|
||||
# Copy files and folders through ssh from remote host to pwd with tar.gz compression
|
||||
# when there is no rsync command available
|
||||
ssh user@example.com "cd /var/www/Shared/; tar zcf - asset1 asset2" | tar zxf -
|
||||
|
||||
# Mount folder/filesystem through SSH
|
||||
# Install SSHFS from https://github.com/libfuse/sshfs
|
||||
# Will allow you to mount a folder securely over a network.
|
||||
sshfs name@server:/path/to/folder /path/to/mount/point
|
||||
|
||||
# Emacs can read file through SSH
|
||||
# Doc: http://www.gnu.org/software/emacs/manual/html_node/emacs/Remote-Files.html
|
||||
emacs /ssh:name@server:/path/to/file
|
||||
|
2
cheat/cheatsheets/su
Normal file
2
cheat/cheatsheets/su
Normal file
@ -0,0 +1,2 @@
|
||||
# Switch to another user account
|
||||
su USERNAME
|
20
cheat/cheatsheets/svn
Normal file
20
cheat/cheatsheets/svn
Normal file
@ -0,0 +1,20 @@
|
||||
# update working copy from repository
|
||||
svn update "/path"
|
||||
|
||||
# show changed files in working copy
|
||||
svn status
|
||||
|
||||
# show what changed in local file
|
||||
svn diff "/path/filename"
|
||||
|
||||
# add files or folders
|
||||
svn add "path/item"
|
||||
|
||||
# revert local uncommited changes
|
||||
svn revert "/path/file"
|
||||
|
||||
# commit changes to repo
|
||||
svn commit -m "message" "/path"
|
||||
|
||||
# show help for 'svn diff'
|
||||
svn help diff
|
@ -19,6 +19,9 @@ tar -xjvf /path/to/foo.tgz
|
||||
# To create a .bz2 archive:
|
||||
tar -cjvf /path/to/foo.tgz /path/to/foo/
|
||||
|
||||
# To extract a .tar in specified Directory:
|
||||
tar -xvf /path/to/foo.tar -C /path/to/destination/
|
||||
|
||||
# To list the content of an .bz2 archive:
|
||||
tar -jtvf /path/to/foo.tgz
|
||||
|
||||
|
@ -13,6 +13,12 @@ tmux attach -d
|
||||
# Display session:
|
||||
tmux ls
|
||||
|
||||
# Rename session:
|
||||
Ctrl-b $
|
||||
|
||||
# Switch session:
|
||||
Ctrl-b s
|
||||
|
||||
# Start a shared session:
|
||||
tmux -S /tmp/your_shared_session
|
||||
chmod 777 /tmp/your_shared_session
|
||||
|
14
cheat/cheatsheets/trashy
Normal file
14
cheat/cheatsheets/trashy
Normal file
@ -0,0 +1,14 @@
|
||||
# Trash foo and bar
|
||||
trash foo bar
|
||||
|
||||
# Trash "foo bar"
|
||||
trash foo\ bar
|
||||
|
||||
# List files in trash
|
||||
trash -v --list
|
||||
|
||||
# Restore foo from trash
|
||||
trash --restore foo
|
||||
|
||||
# Empty trash
|
||||
trash --empty
|
11
cheat/cheatsheets/tree
Normal file
11
cheat/cheatsheets/tree
Normal file
@ -0,0 +1,11 @@
|
||||
# To display a recursive directory tree
|
||||
tree
|
||||
|
||||
# To make tree output contents from path `/foo/bar`
|
||||
tree /foo/bar
|
||||
|
||||
# To make tree omit any empty directories from the output
|
||||
tree --prune
|
||||
|
||||
# To list directories only (`-d`), and at a max depth of two levels (`-L`)
|
||||
tree -d -L 2
|
14
cheat/cheatsheets/urpm
Normal file
14
cheat/cheatsheets/urpm
Normal file
@ -0,0 +1,14 @@
|
||||
# search (fuzzy) for package foo
|
||||
urpmq -Y foo
|
||||
|
||||
# check if foo is installed
|
||||
rpm -q foo
|
||||
|
||||
# install package foo
|
||||
urpmi foo
|
||||
|
||||
# download but don't install foo
|
||||
urpmi --no-install foo
|
||||
|
||||
# uninstall package foo
|
||||
urpme foo
|
@ -23,7 +23,8 @@ B previous start of whitespace-delimited word
|
||||
$ end of line
|
||||
gg go to first line in file
|
||||
G go to end of file
|
||||
|
||||
gk move down one displayed line
|
||||
gj move up one displayed line
|
||||
|
||||
# Insertion
|
||||
# To exit from insert mode use Esc or Ctrl-C
|
||||
@ -49,8 +50,14 @@ P paste before cursor
|
||||
dd delete a line
|
||||
d{motion} delete text that {motion} moves over
|
||||
|
||||
# Search and replace with the `:substitute` (aka `:s`) command
|
||||
|
||||
# Preceding a motion or edition with a number repeats it n times
|
||||
:s/foo/bar/ replace the first match of 'foo' with 'bar' on the current line only
|
||||
:s/foo/bar/g replace all matches (`g` flag) of 'foo' with 'bar' on the current line only
|
||||
:%s/foo/bar/g replace all matches of 'foo' with 'bar' in the entire file (`:%s`)
|
||||
:%s/foo/bar/gc ask to manually confirm (`c` flag) each replacement
|
||||
|
||||
# Preceding a motion or edition with a number repeats it 'n' times
|
||||
# Examples:
|
||||
50k moves 50 lines up
|
||||
2dw deletes 2 words
|
||||
|
38
cheat/cheatsheets/virtualenv
Normal file
38
cheat/cheatsheets/virtualenv
Normal file
@ -0,0 +1,38 @@
|
||||
# Create new environment
|
||||
virtualenv /path/to/project/env_name
|
||||
|
||||
# Create new environment and inherit already installed Python libraries
|
||||
virtualenv --system-site-package /path/to/project/env_name
|
||||
|
||||
# Create new environment with a given Python interpreter
|
||||
virtualenv /path/to/project/env_name -p /usr/bin/python/3.4
|
||||
|
||||
# Activate environnment
|
||||
source /path/to/project/env_name/bin/activate
|
||||
|
||||
# Quit environment
|
||||
deactivate
|
||||
|
||||
|
||||
# virtualenvwrapper (wrapper for virtualenv)
|
||||
# installation
|
||||
pip install --user virtualenvwrapper
|
||||
# configuration
|
||||
# add in ~/.bashrc or similar
|
||||
export WORKON_HOME=~/.virtualenvs
|
||||
mkdir -p $WORKON_HOME
|
||||
source ~/.local/bin/virtualenvwrapper.sh
|
||||
|
||||
# Create new environmment (with virtualenvwrapper)
|
||||
mkvirtualenv env_name
|
||||
# new environmment is stored in ~/.virtualenvs
|
||||
|
||||
# Activate environmment (with virtualenvwrapper)
|
||||
workon env_name
|
||||
|
||||
# Quit environmment (with virtualenvwrapper)
|
||||
deactivate
|
||||
|
||||
# Delete environmment (with virtualenvwrapper)
|
||||
rmvirtualenv env_name
|
||||
|
18
cheat/cheatsheets/wc
Normal file
18
cheat/cheatsheets/wc
Normal file
@ -0,0 +1,18 @@
|
||||
# Count the number of words (file or STDIN)
|
||||
wc -w /path/to/foo.txt
|
||||
cat /path/to/foo.txt | wc -w
|
||||
|
||||
# Count the number of lines (file or STDIN)
|
||||
wc -l /path/to/foo.txt
|
||||
cat /path/to/foo.txt | wc -l
|
||||
|
||||
# Count the number of bytes (file or STDIN)
|
||||
wc -c /path/to/foo.txt
|
||||
cat /path/to/foo.txt | wc -c
|
||||
|
||||
# Count files and directories at a given location
|
||||
ls -l | wc -l
|
||||
|
||||
# If you ever use `wc` in a shell script and need to compare the output with an int you can
|
||||
# clean the output (wc returns extra characters around the integer) by using xargs:
|
||||
ls -l | wc -l | xargs
|
@ -10,3 +10,7 @@ find -name *.pdf | xargs -I{} rm -rf '{}'
|
||||
# -n1 => One file by one file. ( -n2 => 2 files by 2 files )
|
||||
|
||||
find -name *.pdf | xargs -I{} -n1 echo '&{}='
|
||||
|
||||
# If find returns no result, do not run rm
|
||||
# This option is a GNU extension.
|
||||
find -name "*.pdf" | xargs --no-run-if-empty rm
|
||||
|
14
cheat/cheatsheets/xmlto
Normal file
14
cheat/cheatsheets/xmlto
Normal file
@ -0,0 +1,14 @@
|
||||
# DocBook XML to PDF
|
||||
xmlto pdf mydoc.xml
|
||||
|
||||
# DocBook XML to HTML
|
||||
xmlto -o html-dir html mydoc.xml
|
||||
|
||||
# DocBook XML to single HTML file
|
||||
xmlto html-nochunks mydoc.xml
|
||||
|
||||
# modify output with XSL override
|
||||
xmlto -m ulink.xsl pdf mydoc.xml
|
||||
|
||||
# use non-default xsl
|
||||
xmlto -x mystylesheet.xsl pdf mydoc.xml
|
11
cheat/cheatsheets/xrandr
Normal file
11
cheat/cheatsheets/xrandr
Normal file
@ -0,0 +1,11 @@
|
||||
# To enable HDMI2 output with maximal resolution:
|
||||
xrandr --output HDMI2 --auto
|
||||
|
||||
# To enable HDMI2 output with specific resolution:
|
||||
xrandr --output HDMI2 --mode 1280x800
|
||||
|
||||
# To enable HDMI2 output next to HDMI1 output:
|
||||
xrandr --output HDMI2 --auto --right-of HDMI1
|
||||
|
||||
# To disable HDMI2 output:
|
||||
xrandr --output HDMI2 --off
|
8
cheat/cheatsheets/xxd
Normal file
8
cheat/cheatsheets/xxd
Normal file
@ -0,0 +1,8 @@
|
||||
# Convert bin/string to hex.
|
||||
# Result: 34322069732074686520736f6c7574696f6e0a
|
||||
echo '42 is the solution' | xxd -p
|
||||
|
||||
# Convert hex to bin/string.
|
||||
# Result: 42 is the solution
|
||||
echo '34322069732074686520736f6c7574696f6e0a' | xxd -r -p
|
||||
|
@ -16,5 +16,8 @@ youtube-dl --playlist-start 5 example.com/watch?v=id&list=listid
|
||||
# To simulate a download with youtube-dl:
|
||||
youtube-dl -s example.com/watch?v=id
|
||||
|
||||
# To download audio in mp3 format with best quality available
|
||||
youtube-dl --extract-audio --audio-format mp3 --audio-quality 0 example.com/watch?v=id
|
||||
|
||||
# For all video formats see
|
||||
# http://en.wikipedia.org/wiki/YouTube#Quality_and_codecs
|
||||
|
82
cheat/cheatsheets/zsh
Normal file
82
cheat/cheatsheets/zsh
Normal file
@ -0,0 +1,82 @@
|
||||
# A plain old glob
|
||||
print -l *.txt
|
||||
print -l **/*.txt
|
||||
|
||||
# Show text files that end in a number from 1 to 10
|
||||
print -l **/*<1-10>.txt
|
||||
|
||||
# Show text files that start with the letter a
|
||||
print -l **/[a]*.txt
|
||||
|
||||
# Show text files that start with either ab or bc
|
||||
print -l **/(ab|bc)*.txt
|
||||
|
||||
# Show text files that don't start with a lower or uppercase c
|
||||
print -l **/[^cC]*.txt
|
||||
|
||||
# Show only directories
|
||||
print -l **/*(/)
|
||||
|
||||
# Show only regular files
|
||||
print -l **/*(.)
|
||||
|
||||
# Show empty files
|
||||
print -l **/*(L0)
|
||||
|
||||
# Show files greater than 3 KB
|
||||
print -l **/*(Lk+3)
|
||||
|
||||
# Show files modified in the last hour
|
||||
print -l **/*(mh-1)
|
||||
|
||||
# Sort files from most to least recently modified and show the last 3
|
||||
print -l **/*(om[1,3])
|
||||
|
||||
# `.` show files, `Lm-2` smaller than 2MB, `mh-1` modified in last hour,
|
||||
# `om` sort by modification date, `[1,3]` only first 3 files
|
||||
print -l **/*(.Lm-2mh-1om[1,3])
|
||||
|
||||
# Show every directory that contain directory `.git`
|
||||
print -l **/*(e:'[[ -d $REPLY/.git ]]':)
|
||||
|
||||
# Return the file name (t stands for tail)
|
||||
print -l *.txt(:t)
|
||||
|
||||
# Return the file name without the extension (r stands for remove_extension)
|
||||
print -l *.txt(:t:r)
|
||||
|
||||
# Return the extension
|
||||
print -l *.txt(:e)
|
||||
|
||||
# Return the parent folder of the file (h stands for head)
|
||||
print -l *.txt(:h)
|
||||
|
||||
# Return the parent folder of the parent
|
||||
print -l *.txt(:h:h)
|
||||
|
||||
# Return the parent folder of the first file
|
||||
print -l *.txt([1]:h)
|
||||
|
||||
# Parameter expansion
|
||||
files=(*.txt) # store a glob in a variable
|
||||
print -l $files
|
||||
print -l $files(:h) # this is the syntax we saw before
|
||||
print -l ${files:h}
|
||||
print -l ${files(:h)} # don't mix the two, or you'll get an error
|
||||
print -l ${files:u} # the :u modifier makes the text uppercase
|
||||
|
||||
# :s modifier
|
||||
variable="path/aaabcd"
|
||||
echo ${variable:s/bc/BC/} # path/aaaBCd
|
||||
echo ${variable:s_bc_BC_} # path/aaaBCd
|
||||
echo ${variable:s/\//./} # path.aaabcd (escaping the slash \/)
|
||||
echo ${variable:s_/_._} # path.aaabcd (slightly more readable)
|
||||
echo ${variable:s/a/A/} # pAth/aaabcd (only first A is replaced)
|
||||
echo ${variable:gs/a/A/} # pAth/AAAbcd (all A is replaced)
|
||||
|
||||
# Split the file name at each underscore
|
||||
echo ${(s._.)file}
|
||||
|
||||
# Join expansion flag, opposite of the split flag.
|
||||
array=(a b c d)
|
||||
echo ${(j.-.)array} # a-b-c-d
|
@ -1,10 +1,8 @@
|
||||
from cheat import sheets
|
||||
from cheat import utils
|
||||
from cheat.utils import *
|
||||
import os
|
||||
import shutil
|
||||
import subprocess
|
||||
|
||||
from cheat import sheets
|
||||
from cheat.utils import die, open_with_editor
|
||||
|
||||
def copy(current_sheet_path, new_sheet_path):
|
||||
""" Copies a sheet to a new path """
|
||||
@ -16,7 +14,7 @@ def copy(current_sheet_path, new_sheet_path):
|
||||
# fail gracefully if the cheatsheet cannot be copied. This can happen if
|
||||
# DEFAULT_CHEAT_DIR does not exist
|
||||
except IOError:
|
||||
die ('Could not copy cheatsheet for editing.')
|
||||
die('Could not copy cheatsheet for editing.')
|
||||
|
||||
|
||||
def create_or_edit(sheet):
|
||||
@ -40,22 +38,12 @@ def create_or_edit(sheet):
|
||||
def create(sheet):
|
||||
""" Creates a cheatsheet """
|
||||
new_sheet_path = os.path.join(sheets.default_path(), sheet)
|
||||
|
||||
try:
|
||||
subprocess.call([editor(), new_sheet_path])
|
||||
|
||||
except OSError:
|
||||
die('Could not launch ' + editor())
|
||||
open_with_editor(new_sheet_path)
|
||||
|
||||
|
||||
def edit(sheet):
|
||||
""" Opens a cheatsheet for editing """
|
||||
|
||||
try:
|
||||
subprocess.call([editor(), path(sheet)])
|
||||
|
||||
except OSError:
|
||||
die('Could not launch ' + editor())
|
||||
open_with_editor(path(sheet))
|
||||
|
||||
|
||||
def exists(sheet):
|
||||
@ -84,5 +72,5 @@ def read(sheet):
|
||||
if not exists(sheet):
|
||||
die('No cheatsheet found for ' + sheet)
|
||||
|
||||
with open (path(sheet)) as cheatfile:
|
||||
return cheatfile.read()
|
||||
with open(path(sheet)) as cheatfile:
|
||||
return cheatfile.read()
|
||||
|
@ -1,12 +1,14 @@
|
||||
from cheat import cheatsheets
|
||||
from cheat.utils import *
|
||||
import os
|
||||
|
||||
from cheat import cheatsheets
|
||||
from cheat.utils import die
|
||||
|
||||
def default_path():
|
||||
""" Returns the default cheatsheet path """
|
||||
|
||||
# determine the default cheatsheet dir
|
||||
default_sheets_dir = os.environ.get('DEFAULT_CHEAT_DIR') or os.path.join(os.path.expanduser('~'), '.cheat')
|
||||
default_sheets_dir = os.environ.get('DEFAULT_CHEAT_DIR') or os.path.join('~', '.cheat')
|
||||
default_sheets_dir = os.path.expanduser(os.path.expandvars(default_sheets_dir))
|
||||
|
||||
# create the DEFAULT_CHEAT_DIR if it does not exist
|
||||
if not os.path.isdir(default_sheets_dir):
|
||||
@ -22,7 +24,7 @@ def default_path():
|
||||
if not os.access(default_sheets_dir, os.R_OK):
|
||||
die('The DEFAULT_CHEAT_DIR (' + default_sheets_dir +') is not readable.')
|
||||
if not os.access(default_sheets_dir, os.W_OK):
|
||||
die('The DEFAULT_CHEAT_DIR (' + default_sheets_dir +') is not writeable.')
|
||||
die('The DEFAULT_CHEAT_DIR (' + default_sheets_dir +') is not writable.')
|
||||
|
||||
# return the default dir
|
||||
return default_sheets_dir
|
||||
@ -81,10 +83,10 @@ def search(term):
|
||||
for cheatsheet in sorted(get().items()):
|
||||
match = ''
|
||||
for line in open(cheatsheet[1]):
|
||||
if term in line:
|
||||
match += ' ' + line
|
||||
if term in line:
|
||||
match += ' ' + line
|
||||
|
||||
if not match == '':
|
||||
if match != '':
|
||||
result += cheatsheet[0] + ":\n" + match + "\n"
|
||||
|
||||
return result
|
||||
|
@ -1,6 +1,7 @@
|
||||
from __future__ import print_function
|
||||
import os
|
||||
import sys
|
||||
import subprocess
|
||||
|
||||
|
||||
def colorize(sheet_content):
|
||||
@ -12,14 +13,23 @@ def colorize(sheet_content):
|
||||
|
||||
try:
|
||||
from pygments import highlight
|
||||
from pygments.lexers import BashLexer
|
||||
from pygments.lexers import get_lexer_by_name
|
||||
from pygments.formatters import TerminalFormatter
|
||||
|
||||
# if pygments can't load, just return the uncolorized text
|
||||
except ImportError:
|
||||
return sheet_content
|
||||
|
||||
return highlight(sheet_content, BashLexer(), TerminalFormatter())
|
||||
first_line = sheet_content.splitlines()[0]
|
||||
lexer = get_lexer_by_name('bash')
|
||||
if first_line.startswith('```'):
|
||||
sheet_content = '\n'.join(sheet_content.split('\n')[1:-2])
|
||||
try:
|
||||
lexer = get_lexer_by_name(first_line[3:])
|
||||
except Exception:
|
||||
pass
|
||||
|
||||
return highlight(sheet_content, lexer, TerminalFormatter())
|
||||
|
||||
|
||||
def die(message):
|
||||
@ -30,34 +40,30 @@ def die(message):
|
||||
|
||||
def editor():
|
||||
""" Determines the user's preferred editor """
|
||||
if 'EDITOR' not in os.environ:
|
||||
|
||||
# determine which editor to use
|
||||
editor = os.environ.get('CHEAT_EDITOR') \
|
||||
or os.environ.get('VISUAL') \
|
||||
or os.environ.get('EDITOR') \
|
||||
or False
|
||||
|
||||
# assert that the editor is set
|
||||
if editor == False:
|
||||
die(
|
||||
'In order to create/edit a cheatsheet you must set your EDITOR '
|
||||
'environment variable to your editor\'s path.'
|
||||
'You must set a CHEAT_EDITOR, VISUAL, or EDITOR environment '
|
||||
'variable in order to create/edit a cheatsheet.'
|
||||
)
|
||||
|
||||
elif os.environ['EDITOR'] == "":
|
||||
die(
|
||||
'Your EDITOR environment variable is set to an empty string. It must '
|
||||
'be set to your editor\'s path.'
|
||||
)
|
||||
|
||||
else:
|
||||
return os.environ['EDITOR']
|
||||
return editor
|
||||
|
||||
|
||||
def prompt_yes_or_no(question):
|
||||
""" Prompts the user with a yes-or-no question """
|
||||
# Support Python 2 and 3 input
|
||||
# Default to Python 2's input()
|
||||
get_input = raw_input
|
||||
|
||||
# If this is Python 3, use input()
|
||||
if sys.version_info[:2] >= (3, 0):
|
||||
get_input = input
|
||||
|
||||
print(question)
|
||||
return get_input('[y/n] ') == 'y'
|
||||
def open_with_editor(filepath):
|
||||
""" Open `filepath` using the EDITOR specified by the environment variables """
|
||||
editor_cmd = editor().split()
|
||||
try:
|
||||
subprocess.call(editor_cmd + [filepath])
|
||||
except OSError:
|
||||
die('Could not launch ' + editor())
|
||||
|
||||
|
||||
def warn(message):
|
||||
|
674
licenses/gpl-3.txt
Normal file
674
licenses/gpl-3.txt
Normal file
@ -0,0 +1,674 @@
|
||||
GNU GENERAL PUBLIC LICENSE
|
||||
Version 3, 29 June 2007
|
||||
|
||||
Copyright (C) 2007 Free Software Foundation, Inc. <http://fsf.org/>
|
||||
Everyone is permitted to copy and distribute verbatim copies
|
||||
of this license document, but changing it is not allowed.
|
||||
|
||||
Preamble
|
||||
|
||||
The GNU General Public License is a free, copyleft license for
|
||||
software and other kinds of works.
|
||||
|
||||
The licenses for most software and other practical works are designed
|
||||
to take away your freedom to share and change the works. By contrast,
|
||||
the GNU General Public License is intended to guarantee your freedom to
|
||||
share and change all versions of a program--to make sure it remains free
|
||||
software for all its users. We, the Free Software Foundation, use the
|
||||
GNU General Public License for most of our software; it applies also to
|
||||
any other work released this way by its authors. You can apply it to
|
||||
your programs, too.
|
||||
|
||||
When we speak of free software, we are referring to freedom, not
|
||||
price. Our General Public Licenses are designed to make sure that you
|
||||
have the freedom to distribute copies of free software (and charge for
|
||||
them if you wish), that you receive source code or can get it if you
|
||||
want it, that you can change the software or use pieces of it in new
|
||||
free programs, and that you know you can do these things.
|
||||
|
||||
To protect your rights, we need to prevent others from denying you
|
||||
these rights or asking you to surrender the rights. Therefore, you have
|
||||
certain responsibilities if you distribute copies of the software, or if
|
||||
you modify it: responsibilities to respect the freedom of others.
|
||||
|
||||
For example, if you distribute copies of such a program, whether
|
||||
gratis or for a fee, you must pass on to the recipients the same
|
||||
freedoms that you received. You must make sure that they, too, receive
|
||||
or can get the source code. And you must show them these terms so they
|
||||
know their rights.
|
||||
|
||||
Developers that use the GNU GPL protect your rights with two steps:
|
||||
(1) assert copyright on the software, and (2) offer you this License
|
||||
giving you legal permission to copy, distribute and/or modify it.
|
||||
|
||||
For the developers' and authors' protection, the GPL clearly explains
|
||||
that there is no warranty for this free software. For both users' and
|
||||
authors' sake, the GPL requires that modified versions be marked as
|
||||
changed, so that their problems will not be attributed erroneously to
|
||||
authors of previous versions.
|
||||
|
||||
Some devices are designed to deny users access to install or run
|
||||
modified versions of the software inside them, although the manufacturer
|
||||
can do so. This is fundamentally incompatible with the aim of
|
||||
protecting users' freedom to change the software. The systematic
|
||||
pattern of such abuse occurs in the area of products for individuals to
|
||||
use, which is precisely where it is most unacceptable. Therefore, we
|
||||
have designed this version of the GPL to prohibit the practice for those
|
||||
products. If such problems arise substantially in other domains, we
|
||||
stand ready to extend this provision to those domains in future versions
|
||||
of the GPL, as needed to protect the freedom of users.
|
||||
|
||||
Finally, every program is threatened constantly by software patents.
|
||||
States should not allow patents to restrict development and use of
|
||||
software on general-purpose computers, but in those that do, we wish to
|
||||
avoid the special danger that patents applied to a free program could
|
||||
make it effectively proprietary. To prevent this, the GPL assures that
|
||||
patents cannot be used to render the program non-free.
|
||||
|
||||
The precise terms and conditions for copying, distribution and
|
||||
modification follow.
|
||||
|
||||
TERMS AND CONDITIONS
|
||||
|
||||
0. Definitions.
|
||||
|
||||
"This License" refers to version 3 of the GNU General Public License.
|
||||
|
||||
"Copyright" also means copyright-like laws that apply to other kinds of
|
||||
works, such as semiconductor masks.
|
||||
|
||||
"The Program" refers to any copyrightable work licensed under this
|
||||
License. Each licensee is addressed as "you". "Licensees" and
|
||||
"recipients" may be individuals or organizations.
|
||||
|
||||
To "modify" a work means to copy from or adapt all or part of the work
|
||||
in a fashion requiring copyright permission, other than the making of an
|
||||
exact copy. The resulting work is called a "modified version" of the
|
||||
earlier work or a work "based on" the earlier work.
|
||||
|
||||
A "covered work" means either the unmodified Program or a work based
|
||||
on the Program.
|
||||
|
||||
To "propagate" a work means to do anything with it that, without
|
||||
permission, would make you directly or secondarily liable for
|
||||
infringement under applicable copyright law, except executing it on a
|
||||
computer or modifying a private copy. Propagation includes copying,
|
||||
distribution (with or without modification), making available to the
|
||||
public, and in some countries other activities as well.
|
||||
|
||||
To "convey" a work means any kind of propagation that enables other
|
||||
parties to make or receive copies. Mere interaction with a user through
|
||||
a computer network, with no transfer of a copy, is not conveying.
|
||||
|
||||
An interactive user interface displays "Appropriate Legal Notices"
|
||||
to the extent that it includes a convenient and prominently visible
|
||||
feature that (1) displays an appropriate copyright notice, and (2)
|
||||
tells the user that there is no warranty for the work (except to the
|
||||
extent that warranties are provided), that licensees may convey the
|
||||
work under this License, and how to view a copy of this License. If
|
||||
the interface presents a list of user commands or options, such as a
|
||||
menu, a prominent item in the list meets this criterion.
|
||||
|
||||
1. Source Code.
|
||||
|
||||
The "source code" for a work means the preferred form of the work
|
||||
for making modifications to it. "Object code" means any non-source
|
||||
form of a work.
|
||||
|
||||
A "Standard Interface" means an interface that either is an official
|
||||
standard defined by a recognized standards body, or, in the case of
|
||||
interfaces specified for a particular programming language, one that
|
||||
is widely used among developers working in that language.
|
||||
|
||||
The "System Libraries" of an executable work include anything, other
|
||||
than the work as a whole, that (a) is included in the normal form of
|
||||
packaging a Major Component, but which is not part of that Major
|
||||
Component, and (b) serves only to enable use of the work with that
|
||||
Major Component, or to implement a Standard Interface for which an
|
||||
implementation is available to the public in source code form. A
|
||||
"Major Component", in this context, means a major essential component
|
||||
(kernel, window system, and so on) of the specific operating system
|
||||
(if any) on which the executable work runs, or a compiler used to
|
||||
produce the work, or an object code interpreter used to run it.
|
||||
|
||||
The "Corresponding Source" for a work in object code form means all
|
||||
the source code needed to generate, install, and (for an executable
|
||||
work) run the object code and to modify the work, including scripts to
|
||||
control those activities. However, it does not include the work's
|
||||
System Libraries, or general-purpose tools or generally available free
|
||||
programs which are used unmodified in performing those activities but
|
||||
which are not part of the work. For example, Corresponding Source
|
||||
includes interface definition files associated with source files for
|
||||
the work, and the source code for shared libraries and dynamically
|
||||
linked subprograms that the work is specifically designed to require,
|
||||
such as by intimate data communication or control flow between those
|
||||
subprograms and other parts of the work.
|
||||
|
||||
The Corresponding Source need not include anything that users
|
||||
can regenerate automatically from other parts of the Corresponding
|
||||
Source.
|
||||
|
||||
The Corresponding Source for a work in source code form is that
|
||||
same work.
|
||||
|
||||
2. Basic Permissions.
|
||||
|
||||
All rights granted under this License are granted for the term of
|
||||
copyright on the Program, and are irrevocable provided the stated
|
||||
conditions are met. This License explicitly affirms your unlimited
|
||||
permission to run the unmodified Program. The output from running a
|
||||
covered work is covered by this License only if the output, given its
|
||||
content, constitutes a covered work. This License acknowledges your
|
||||
rights of fair use or other equivalent, as provided by copyright law.
|
||||
|
||||
You may make, run and propagate covered works that you do not
|
||||
convey, without conditions so long as your license otherwise remains
|
||||
in force. You may convey covered works to others for the sole purpose
|
||||
of having them make modifications exclusively for you, or provide you
|
||||
with facilities for running those works, provided that you comply with
|
||||
the terms of this License in conveying all material for which you do
|
||||
not control copyright. Those thus making or running the covered works
|
||||
for you must do so exclusively on your behalf, under your direction
|
||||
and control, on terms that prohibit them from making any copies of
|
||||
your copyrighted material outside their relationship with you.
|
||||
|
||||
Conveying under any other circumstances is permitted solely under
|
||||
the conditions stated below. Sublicensing is not allowed; section 10
|
||||
makes it unnecessary.
|
||||
|
||||
3. Protecting Users' Legal Rights From Anti-Circumvention Law.
|
||||
|
||||
No covered work shall be deemed part of an effective technological
|
||||
measure under any applicable law fulfilling obligations under article
|
||||
11 of the WIPO copyright treaty adopted on 20 December 1996, or
|
||||
similar laws prohibiting or restricting circumvention of such
|
||||
measures.
|
||||
|
||||
When you convey a covered work, you waive any legal power to forbid
|
||||
circumvention of technological measures to the extent such circumvention
|
||||
is effected by exercising rights under this License with respect to
|
||||
the covered work, and you disclaim any intention to limit operation or
|
||||
modification of the work as a means of enforcing, against the work's
|
||||
users, your or third parties' legal rights to forbid circumvention of
|
||||
technological measures.
|
||||
|
||||
4. Conveying Verbatim Copies.
|
||||
|
||||
You may convey verbatim copies of the Program's source code as you
|
||||
receive it, in any medium, provided that you conspicuously and
|
||||
appropriately publish on each copy an appropriate copyright notice;
|
||||
keep intact all notices stating that this License and any
|
||||
non-permissive terms added in accord with section 7 apply to the code;
|
||||
keep intact all notices of the absence of any warranty; and give all
|
||||
recipients a copy of this License along with the Program.
|
||||
|
||||
You may charge any price or no price for each copy that you convey,
|
||||
and you may offer support or warranty protection for a fee.
|
||||
|
||||
5. Conveying Modified Source Versions.
|
||||
|
||||
You may convey a work based on the Program, or the modifications to
|
||||
produce it from the Program, in the form of source code under the
|
||||
terms of section 4, provided that you also meet all of these conditions:
|
||||
|
||||
a) The work must carry prominent notices stating that you modified
|
||||
it, and giving a relevant date.
|
||||
|
||||
b) The work must carry prominent notices stating that it is
|
||||
released under this License and any conditions added under section
|
||||
7. This requirement modifies the requirement in section 4 to
|
||||
"keep intact all notices".
|
||||
|
||||
c) You must license the entire work, as a whole, under this
|
||||
License to anyone who comes into possession of a copy. This
|
||||
License will therefore apply, along with any applicable section 7
|
||||
additional terms, to the whole of the work, and all its parts,
|
||||
regardless of how they are packaged. This License gives no
|
||||
permission to license the work in any other way, but it does not
|
||||
invalidate such permission if you have separately received it.
|
||||
|
||||
d) If the work has interactive user interfaces, each must display
|
||||
Appropriate Legal Notices; however, if the Program has interactive
|
||||
interfaces that do not display Appropriate Legal Notices, your
|
||||
work need not make them do so.
|
||||
|
||||
A compilation of a covered work with other separate and independent
|
||||
works, which are not by their nature extensions of the covered work,
|
||||
and which are not combined with it such as to form a larger program,
|
||||
in or on a volume of a storage or distribution medium, is called an
|
||||
"aggregate" if the compilation and its resulting copyright are not
|
||||
used to limit the access or legal rights of the compilation's users
|
||||
beyond what the individual works permit. Inclusion of a covered work
|
||||
in an aggregate does not cause this License to apply to the other
|
||||
parts of the aggregate.
|
||||
|
||||
6. Conveying Non-Source Forms.
|
||||
|
||||
You may convey a covered work in object code form under the terms
|
||||
of sections 4 and 5, provided that you also convey the
|
||||
machine-readable Corresponding Source under the terms of this License,
|
||||
in one of these ways:
|
||||
|
||||
a) Convey the object code in, or embodied in, a physical product
|
||||
(including a physical distribution medium), accompanied by the
|
||||
Corresponding Source fixed on a durable physical medium
|
||||
customarily used for software interchange.
|
||||
|
||||
b) Convey the object code in, or embodied in, a physical product
|
||||
(including a physical distribution medium), accompanied by a
|
||||
written offer, valid for at least three years and valid for as
|
||||
long as you offer spare parts or customer support for that product
|
||||
model, to give anyone who possesses the object code either (1) a
|
||||
copy of the Corresponding Source for all the software in the
|
||||
product that is covered by this License, on a durable physical
|
||||
medium customarily used for software interchange, for a price no
|
||||
more than your reasonable cost of physically performing this
|
||||
conveying of source, or (2) access to copy the
|
||||
Corresponding Source from a network server at no charge.
|
||||
|
||||
c) Convey individual copies of the object code with a copy of the
|
||||
written offer to provide the Corresponding Source. This
|
||||
alternative is allowed only occasionally and noncommercially, and
|
||||
only if you received the object code with such an offer, in accord
|
||||
with subsection 6b.
|
||||
|
||||
d) Convey the object code by offering access from a designated
|
||||
place (gratis or for a charge), and offer equivalent access to the
|
||||
Corresponding Source in the same way through the same place at no
|
||||
further charge. You need not require recipients to copy the
|
||||
Corresponding Source along with the object code. If the place to
|
||||
copy the object code is a network server, the Corresponding Source
|
||||
may be on a different server (operated by you or a third party)
|
||||
that supports equivalent copying facilities, provided you maintain
|
||||
clear directions next to the object code saying where to find the
|
||||
Corresponding Source. Regardless of what server hosts the
|
||||
Corresponding Source, you remain obligated to ensure that it is
|
||||
available for as long as needed to satisfy these requirements.
|
||||
|
||||
e) Convey the object code using peer-to-peer transmission, provided
|
||||
you inform other peers where the object code and Corresponding
|
||||
Source of the work are being offered to the general public at no
|
||||
charge under subsection 6d.
|
||||
|
||||
A separable portion of the object code, whose source code is excluded
|
||||
from the Corresponding Source as a System Library, need not be
|
||||
included in conveying the object code work.
|
||||
|
||||
A "User Product" is either (1) a "consumer product", which means any
|
||||
tangible personal property which is normally used for personal, family,
|
||||
or household purposes, or (2) anything designed or sold for incorporation
|
||||
into a dwelling. In determining whether a product is a consumer product,
|
||||
doubtful cases shall be resolved in favor of coverage. For a particular
|
||||
product received by a particular user, "normally used" refers to a
|
||||
typical or common use of that class of product, regardless of the status
|
||||
of the particular user or of the way in which the particular user
|
||||
actually uses, or expects or is expected to use, the product. A product
|
||||
is a consumer product regardless of whether the product has substantial
|
||||
commercial, industrial or non-consumer uses, unless such uses represent
|
||||
the only significant mode of use of the product.
|
||||
|
||||
"Installation Information" for a User Product means any methods,
|
||||
procedures, authorization keys, or other information required to install
|
||||
and execute modified versions of a covered work in that User Product from
|
||||
a modified version of its Corresponding Source. The information must
|
||||
suffice to ensure that the continued functioning of the modified object
|
||||
code is in no case prevented or interfered with solely because
|
||||
modification has been made.
|
||||
|
||||
If you convey an object code work under this section in, or with, or
|
||||
specifically for use in, a User Product, and the conveying occurs as
|
||||
part of a transaction in which the right of possession and use of the
|
||||
User Product is transferred to the recipient in perpetuity or for a
|
||||
fixed term (regardless of how the transaction is characterized), the
|
||||
Corresponding Source conveyed under this section must be accompanied
|
||||
by the Installation Information. But this requirement does not apply
|
||||
if neither you nor any third party retains the ability to install
|
||||
modified object code on the User Product (for example, the work has
|
||||
been installed in ROM).
|
||||
|
||||
The requirement to provide Installation Information does not include a
|
||||
requirement to continue to provide support service, warranty, or updates
|
||||
for a work that has been modified or installed by the recipient, or for
|
||||
the User Product in which it has been modified or installed. Access to a
|
||||
network may be denied when the modification itself materially and
|
||||
adversely affects the operation of the network or violates the rules and
|
||||
protocols for communication across the network.
|
||||
|
||||
Corresponding Source conveyed, and Installation Information provided,
|
||||
in accord with this section must be in a format that is publicly
|
||||
documented (and with an implementation available to the public in
|
||||
source code form), and must require no special password or key for
|
||||
unpacking, reading or copying.
|
||||
|
||||
7. Additional Terms.
|
||||
|
||||
"Additional permissions" are terms that supplement the terms of this
|
||||
License by making exceptions from one or more of its conditions.
|
||||
Additional permissions that are applicable to the entire Program shall
|
||||
be treated as though they were included in this License, to the extent
|
||||
that they are valid under applicable law. If additional permissions
|
||||
apply only to part of the Program, that part may be used separately
|
||||
under those permissions, but the entire Program remains governed by
|
||||
this License without regard to the additional permissions.
|
||||
|
||||
When you convey a copy of a covered work, you may at your option
|
||||
remove any additional permissions from that copy, or from any part of
|
||||
it. (Additional permissions may be written to require their own
|
||||
removal in certain cases when you modify the work.) You may place
|
||||
additional permissions on material, added by you to a covered work,
|
||||
for which you have or can give appropriate copyright permission.
|
||||
|
||||
Notwithstanding any other provision of this License, for material you
|
||||
add to a covered work, you may (if authorized by the copyright holders of
|
||||
that material) supplement the terms of this License with terms:
|
||||
|
||||
a) Disclaiming warranty or limiting liability differently from the
|
||||
terms of sections 15 and 16 of this License; or
|
||||
|
||||
b) Requiring preservation of specified reasonable legal notices or
|
||||
author attributions in that material or in the Appropriate Legal
|
||||
Notices displayed by works containing it; or
|
||||
|
||||
c) Prohibiting misrepresentation of the origin of that material, or
|
||||
requiring that modified versions of such material be marked in
|
||||
reasonable ways as different from the original version; or
|
||||
|
||||
d) Limiting the use for publicity purposes of names of licensors or
|
||||
authors of the material; or
|
||||
|
||||
e) Declining to grant rights under trademark law for use of some
|
||||
trade names, trademarks, or service marks; or
|
||||
|
||||
f) Requiring indemnification of licensors and authors of that
|
||||
material by anyone who conveys the material (or modified versions of
|
||||
it) with contractual assumptions of liability to the recipient, for
|
||||
any liability that these contractual assumptions directly impose on
|
||||
those licensors and authors.
|
||||
|
||||
All other non-permissive additional terms are considered "further
|
||||
restrictions" within the meaning of section 10. If the Program as you
|
||||
received it, or any part of it, contains a notice stating that it is
|
||||
governed by this License along with a term that is a further
|
||||
restriction, you may remove that term. If a license document contains
|
||||
a further restriction but permits relicensing or conveying under this
|
||||
License, you may add to a covered work material governed by the terms
|
||||
of that license document, provided that the further restriction does
|
||||
not survive such relicensing or conveying.
|
||||
|
||||
If you add terms to a covered work in accord with this section, you
|
||||
must place, in the relevant source files, a statement of the
|
||||
additional terms that apply to those files, or a notice indicating
|
||||
where to find the applicable terms.
|
||||
|
||||
Additional terms, permissive or non-permissive, may be stated in the
|
||||
form of a separately written license, or stated as exceptions;
|
||||
the above requirements apply either way.
|
||||
|
||||
8. Termination.
|
||||
|
||||
You may not propagate or modify a covered work except as expressly
|
||||
provided under this License. Any attempt otherwise to propagate or
|
||||
modify it is void, and will automatically terminate your rights under
|
||||
this License (including any patent licenses granted under the third
|
||||
paragraph of section 11).
|
||||
|
||||
However, if you cease all violation of this License, then your
|
||||
license from a particular copyright holder is reinstated (a)
|
||||
provisionally, unless and until the copyright holder explicitly and
|
||||
finally terminates your license, and (b) permanently, if the copyright
|
||||
holder fails to notify you of the violation by some reasonable means
|
||||
prior to 60 days after the cessation.
|
||||
|
||||
Moreover, your license from a particular copyright holder is
|
||||
reinstated permanently if the copyright holder notifies you of the
|
||||
violation by some reasonable means, this is the first time you have
|
||||
received notice of violation of this License (for any work) from that
|
||||
copyright holder, and you cure the violation prior to 30 days after
|
||||
your receipt of the notice.
|
||||
|
||||
Termination of your rights under this section does not terminate the
|
||||
licenses of parties who have received copies or rights from you under
|
||||
this License. If your rights have been terminated and not permanently
|
||||
reinstated, you do not qualify to receive new licenses for the same
|
||||
material under section 10.
|
||||
|
||||
9. Acceptance Not Required for Having Copies.
|
||||
|
||||
You are not required to accept this License in order to receive or
|
||||
run a copy of the Program. Ancillary propagation of a covered work
|
||||
occurring solely as a consequence of using peer-to-peer transmission
|
||||
to receive a copy likewise does not require acceptance. However,
|
||||
nothing other than this License grants you permission to propagate or
|
||||
modify any covered work. These actions infringe copyright if you do
|
||||
not accept this License. Therefore, by modifying or propagating a
|
||||
covered work, you indicate your acceptance of this License to do so.
|
||||
|
||||
10. Automatic Licensing of Downstream Recipients.
|
||||
|
||||
Each time you convey a covered work, the recipient automatically
|
||||
receives a license from the original licensors, to run, modify and
|
||||
propagate that work, subject to this License. You are not responsible
|
||||
for enforcing compliance by third parties with this License.
|
||||
|
||||
An "entity transaction" is a transaction transferring control of an
|
||||
organization, or substantially all assets of one, or subdividing an
|
||||
organization, or merging organizations. If propagation of a covered
|
||||
work results from an entity transaction, each party to that
|
||||
transaction who receives a copy of the work also receives whatever
|
||||
licenses to the work the party's predecessor in interest had or could
|
||||
give under the previous paragraph, plus a right to possession of the
|
||||
Corresponding Source of the work from the predecessor in interest, if
|
||||
the predecessor has it or can get it with reasonable efforts.
|
||||
|
||||
You may not impose any further restrictions on the exercise of the
|
||||
rights granted or affirmed under this License. For example, you may
|
||||
not impose a license fee, royalty, or other charge for exercise of
|
||||
rights granted under this License, and you may not initiate litigation
|
||||
(including a cross-claim or counterclaim in a lawsuit) alleging that
|
||||
any patent claim is infringed by making, using, selling, offering for
|
||||
sale, or importing the Program or any portion of it.
|
||||
|
||||
11. Patents.
|
||||
|
||||
A "contributor" is a copyright holder who authorizes use under this
|
||||
License of the Program or a work on which the Program is based. The
|
||||
work thus licensed is called the contributor's "contributor version".
|
||||
|
||||
A contributor's "essential patent claims" are all patent claims
|
||||
owned or controlled by the contributor, whether already acquired or
|
||||
hereafter acquired, that would be infringed by some manner, permitted
|
||||
by this License, of making, using, or selling its contributor version,
|
||||
but do not include claims that would be infringed only as a
|
||||
consequence of further modification of the contributor version. For
|
||||
purposes of this definition, "control" includes the right to grant
|
||||
patent sublicenses in a manner consistent with the requirements of
|
||||
this License.
|
||||
|
||||
Each contributor grants you a non-exclusive, worldwide, royalty-free
|
||||
patent license under the contributor's essential patent claims, to
|
||||
make, use, sell, offer for sale, import and otherwise run, modify and
|
||||
propagate the contents of its contributor version.
|
||||
|
||||
In the following three paragraphs, a "patent license" is any express
|
||||
agreement or commitment, however denominated, not to enforce a patent
|
||||
(such as an express permission to practice a patent or covenant not to
|
||||
sue for patent infringement). To "grant" such a patent license to a
|
||||
party means to make such an agreement or commitment not to enforce a
|
||||
patent against the party.
|
||||
|
||||
If you convey a covered work, knowingly relying on a patent license,
|
||||
and the Corresponding Source of the work is not available for anyone
|
||||
to copy, free of charge and under the terms of this License, through a
|
||||
publicly available network server or other readily accessible means,
|
||||
then you must either (1) cause the Corresponding Source to be so
|
||||
available, or (2) arrange to deprive yourself of the benefit of the
|
||||
patent license for this particular work, or (3) arrange, in a manner
|
||||
consistent with the requirements of this License, to extend the patent
|
||||
license to downstream recipients. "Knowingly relying" means you have
|
||||
actual knowledge that, but for the patent license, your conveying the
|
||||
covered work in a country, or your recipient's use of the covered work
|
||||
in a country, would infringe one or more identifiable patents in that
|
||||
country that you have reason to believe are valid.
|
||||
|
||||
If, pursuant to or in connection with a single transaction or
|
||||
arrangement, you convey, or propagate by procuring conveyance of, a
|
||||
covered work, and grant a patent license to some of the parties
|
||||
receiving the covered work authorizing them to use, propagate, modify
|
||||
or convey a specific copy of the covered work, then the patent license
|
||||
you grant is automatically extended to all recipients of the covered
|
||||
work and works based on it.
|
||||
|
||||
A patent license is "discriminatory" if it does not include within
|
||||
the scope of its coverage, prohibits the exercise of, or is
|
||||
conditioned on the non-exercise of one or more of the rights that are
|
||||
specifically granted under this License. You may not convey a covered
|
||||
work if you are a party to an arrangement with a third party that is
|
||||
in the business of distributing software, under which you make payment
|
||||
to the third party based on the extent of your activity of conveying
|
||||
the work, and under which the third party grants, to any of the
|
||||
parties who would receive the covered work from you, a discriminatory
|
||||
patent license (a) in connection with copies of the covered work
|
||||
conveyed by you (or copies made from those copies), or (b) primarily
|
||||
for and in connection with specific products or compilations that
|
||||
contain the covered work, unless you entered into that arrangement,
|
||||
or that patent license was granted, prior to 28 March 2007.
|
||||
|
||||
Nothing in this License shall be construed as excluding or limiting
|
||||
any implied license or other defenses to infringement that may
|
||||
otherwise be available to you under applicable patent law.
|
||||
|
||||
12. No Surrender of Others' Freedom.
|
||||
|
||||
If conditions are imposed on you (whether by court order, agreement or
|
||||
otherwise) that contradict the conditions of this License, they do not
|
||||
excuse you from the conditions of this License. If you cannot convey a
|
||||
covered work so as to satisfy simultaneously your obligations under this
|
||||
License and any other pertinent obligations, then as a consequence you may
|
||||
not convey it at all. For example, if you agree to terms that obligate you
|
||||
to collect a royalty for further conveying from those to whom you convey
|
||||
the Program, the only way you could satisfy both those terms and this
|
||||
License would be to refrain entirely from conveying the Program.
|
||||
|
||||
13. Use with the GNU Affero General Public License.
|
||||
|
||||
Notwithstanding any other provision of this License, you have
|
||||
permission to link or combine any covered work with a work licensed
|
||||
under version 3 of the GNU Affero General Public License into a single
|
||||
combined work, and to convey the resulting work. The terms of this
|
||||
License will continue to apply to the part which is the covered work,
|
||||
but the special requirements of the GNU Affero General Public License,
|
||||
section 13, concerning interaction through a network will apply to the
|
||||
combination as such.
|
||||
|
||||
14. Revised Versions of this License.
|
||||
|
||||
The Free Software Foundation may publish revised and/or new versions of
|
||||
the GNU General Public License from time to time. Such new versions will
|
||||
be similar in spirit to the present version, but may differ in detail to
|
||||
address new problems or concerns.
|
||||
|
||||
Each version is given a distinguishing version number. If the
|
||||
Program specifies that a certain numbered version of the GNU General
|
||||
Public License "or any later version" applies to it, you have the
|
||||
option of following the terms and conditions either of that numbered
|
||||
version or of any later version published by the Free Software
|
||||
Foundation. If the Program does not specify a version number of the
|
||||
GNU General Public License, you may choose any version ever published
|
||||
by the Free Software Foundation.
|
||||
|
||||
If the Program specifies that a proxy can decide which future
|
||||
versions of the GNU General Public License can be used, that proxy's
|
||||
public statement of acceptance of a version permanently authorizes you
|
||||
to choose that version for the Program.
|
||||
|
||||
Later license versions may give you additional or different
|
||||
permissions. However, no additional obligations are imposed on any
|
||||
author or copyright holder as a result of your choosing to follow a
|
||||
later version.
|
||||
|
||||
15. Disclaimer of Warranty.
|
||||
|
||||
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
|
||||
APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
|
||||
HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY
|
||||
OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
|
||||
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM
|
||||
IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
|
||||
ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
|
||||
|
||||
16. Limitation of Liability.
|
||||
|
||||
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
|
||||
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS
|
||||
THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
|
||||
GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
|
||||
USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
|
||||
DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
|
||||
PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
|
||||
EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
|
||||
SUCH DAMAGES.
|
||||
|
||||
17. Interpretation of Sections 15 and 16.
|
||||
|
||||
If the disclaimer of warranty and limitation of liability provided
|
||||
above cannot be given local legal effect according to their terms,
|
||||
reviewing courts shall apply local law that most closely approximates
|
||||
an absolute waiver of all civil liability in connection with the
|
||||
Program, unless a warranty or assumption of liability accompanies a
|
||||
copy of the Program in return for a fee.
|
||||
|
||||
END OF TERMS AND CONDITIONS
|
||||
|
||||
How to Apply These Terms to Your New Programs
|
||||
|
||||
If you develop a new program, and you want it to be of the greatest
|
||||
possible use to the public, the best way to achieve this is to make it
|
||||
free software which everyone can redistribute and change under these terms.
|
||||
|
||||
To do so, attach the following notices to the program. It is safest
|
||||
to attach them to the start of each source file to most effectively
|
||||
state the exclusion of warranty; and each file should have at least
|
||||
the "copyright" line and a pointer to where the full notice is found.
|
||||
|
||||
<one line to give the program's name and a brief idea of what it does.>
|
||||
Copyright (C) <year> <name of author>
|
||||
|
||||
This program is free software: you can redistribute it and/or modify
|
||||
it under the terms of the GNU General Public License as published by
|
||||
the Free Software Foundation, either version 3 of the License, or
|
||||
(at your option) any later version.
|
||||
|
||||
This program is distributed in the hope that it will be useful,
|
||||
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
GNU General Public License for more details.
|
||||
|
||||
You should have received a copy of the GNU General Public License
|
||||
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
Also add information on how to contact you by electronic and paper mail.
|
||||
|
||||
If the program does terminal interaction, make it output a short
|
||||
notice like this when it starts in an interactive mode:
|
||||
|
||||
<program> Copyright (C) <year> <name of author>
|
||||
This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
|
||||
This is free software, and you are welcome to redistribute it
|
||||
under certain conditions; type `show c' for details.
|
||||
|
||||
The hypothetical commands `show w' and `show c' should show the appropriate
|
||||
parts of the General Public License. Of course, your program's commands
|
||||
might be different; for a GUI interface, you would use an "about box".
|
||||
|
||||
You should also get your employer (if you work as a programmer) or school,
|
||||
if any, to sign a "copyright disclaimer" for the program, if necessary.
|
||||
For more information on this, and how to apply and follow the GNU GPL, see
|
||||
<http://www.gnu.org/licenses/>.
|
||||
|
||||
The GNU General Public License does not permit incorporating your program
|
||||
into proprietary programs. If your program is a subroutine library, you
|
||||
may consider it more useful to permit linking proprietary applications with
|
||||
the library. If this is what you want to do, use the GNU Lesser General
|
||||
Public License instead of this License. But first, please read
|
||||
<http://www.gnu.org/philosophy/why-not-lgpl.html>.
|
19
licenses/mit.txt
Normal file
19
licenses/mit.txt
Normal file
@ -0,0 +1,19 @@
|
||||
The MIT License (MIT) Copyright (c) 2016 Chris Allen Lane
|
||||
|
||||
Permission is hereby granted, free of charge, to any person obtaining a copy of
|
||||
this software and associated documentation files (the "Software"), to deal in
|
||||
the Software without restriction, including without limitation the rights to
|
||||
use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies
|
||||
of the Software, and to permit persons to whom the Software is furnished to do
|
||||
so, subject to the following conditions:
|
||||
|
||||
The above copyright notice and this permission notice shall be included in all
|
||||
copies or substantial portions of the Software.
|
||||
|
||||
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||||
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
||||
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
||||
SOFTWARE.
|
BIN
man1/cheat.1.gz
Normal file
BIN
man1/cheat.1.gz
Normal file
Binary file not shown.
Reference in New Issue
Block a user