[BACK]Return to lndir.1 CVS log [TXT][DIR] Up to [local] / src / usr.bin / lndir

Diff for /src/usr.bin/lndir/lndir.1 between version 1.7 and 1.8

version 1.7, 1998/09/26 19:54:58 version 1.8, 1999/06/05 01:21:31
Line 33 
Line 33 
 .\" $XConsortium: lndir.man /main/9 1995/12/15 14:00:35 gildea $  .\" $XConsortium: lndir.man /main/9 1995/12/15 14:00:35 gildea $
 .\"  .\"
 .\" Copyright (c) 1993, 1994  X Consortium  .\" Copyright (c) 1993, 1994  X Consortium
 .\"  .\"
 .\" Permission is hereby granted, free of charge, to any person obtaining  .\" Permission is hereby granted, free of charge, to any person obtaining
 .\" a copy of this software and associated documentation files (the  .\" a copy of this software and associated documentation files (the
 .\" "Software"), to deal in the Software without restriction, including  .\" "Software"), to deal in the Software without restriction, including
Line 41 
Line 41 
 .\" distribute, sublicense, and/or sell copies of the Software, and to  .\" distribute, sublicense, and/or sell copies of the Software, and to
 .\" permit persons to whom the Software is furnished to do so, subject to  .\" permit persons to whom the Software is furnished to do so, subject to
 .\" the following conditions:  .\" the following conditions:
 .\"  .\"
 .\" The above copyright notice and this permission notice shall be  .\" The above copyright notice and this permission notice shall be
 .\" included in all copies or substantial portions of the Software.  .\" included in all copies or substantial portions of the Software.
 .\"  .\"
 .\" THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,  .\" THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
 .\" EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF  .\" EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
 .\" MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.  .\" MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
Line 52 
Line 52 
 .\" OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE,  .\" OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE,
 .\" ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR  .\" ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR
 .\" OTHER DEALINGS IN THE SOFTWARE.  .\" OTHER DEALINGS IN THE SOFTWARE.
 .\"  .\"
 .\" Except as contained in this notice, the name of the X Consortium shall  .\" Except as contained in this notice, the name of the X Consortium shall
 .\" not be used in advertising or otherwise to promote the sale, use or  .\" not be used in advertising or otherwise to promote the sale, use or
 .\" other dealings in this Software without prior written authorization  .\" other dealings in this Software without prior written authorization
 .\" from the X Consortium.  .\" from the X Consortium.
 .\"  .\"
 .Dd June 21, 1997  .Dd June 21, 1997
 .Dt LNDIR 1  .Dt LNDIR 1
 .Os OpenBSD  .Os
 .Sh NAME  .Sh NAME
 .Nm lndir  .Nm lndir
 .Nd create a shadow directory of symbolic links to another directory tree  .Nd create a shadow directory of symbolic links to another directory tree
Line 74 
Line 74 
 .Sh DESCRIPTION  .Sh DESCRIPTION
 The  The
 .Nm lndir  .Nm lndir
 program makes a shadow copy  program makes a shadow copy
 .Ar todir  .Ar todir
 of a directory tree  of a directory tree
 .Ar fromdir,  .Ar fromdir,
 except that the shadow is not  except that the shadow is not
 populated with real files but instead with symbolic links pointing at  populated with real files but instead with symbolic links pointing at
 the real files in the  the real files in the
 .Ar fromdir  .Ar fromdir
 directory tree.  This is usually useful for maintaining source code for  directory tree.  This is usually useful for maintaining source code for
 different machine architectures.  You create a shadow directory  different machine architectures.  You create a shadow directory
Line 90 
Line 90 
 source files in the shadow directory are just symlinks to the real  source files in the shadow directory are just symlinks to the real
 files.  files.
 .Pp  .Pp
 This scheme has the advantage that if you update the source, you need not  This scheme has the advantage that if you update the source, you need not
 propagate the change to the other architectures by hand, since all  propagate the change to the other architectures by hand, since all
 source in all shadow directories are symlinks to the real thing: just cd  source in all shadow directories are symlinks to the real thing: just cd
 to the shadow directory and recompile away.  to the shadow directory and recompile away.
Line 102 
Line 102 
 argument may be relative (e.g., ../src) and is relative to  argument may be relative (e.g., ../src) and is relative to
 .Ar todir  .Ar todir
 (not the current directory).  (not the current directory).
 .Pp  .Pp
 .\" CVS.adm is used by the Concurrent Versions System.  .\" CVS.adm is used by the Concurrent Versions System.
 Note that RCS, SCCS, CVS and CVS.adm directories are not shadowed, in  Note that RCS, SCCS, CVS and CVS.adm directories are not shadowed, in
 addition to any specified on the command line with  addition to any specified on the command line with
Line 117 
Line 117 
 Deleting files is a more painful problem; the symlinks will  Deleting files is a more painful problem; the symlinks will
 just point into never never land.  just point into never never land.
 .Pp  .Pp
 If a file in  If a file in
 .Ar fromdir  .Ar fromdir
 is a symbolic link,  is a symbolic link,
 .Nm lndir  .Nm lndir
 will make the same link in  will make the same link in
 .Ar todir  .Ar todir
 rather than making a link back to the (symbolic link) entry in  rather than making a link back to the (symbolic link) entry in
 .Ar fromdir .  .Ar fromdir .
 The  The
 .Fl i  .Fl i
Line 132 
Line 132 
 .Bl -tag -width XxXXXXXXXXXXXX  .Bl -tag -width XxXXXXXXXXXXXX
 .It Fl e Ar exceptfile  .It Fl e Ar exceptfile
 Add the specified file to the list of excluded files/directories.  This is  Add the specified file to the list of excluded files/directories.  This is
 effective in all directories searched by  effective in all directories searched by
 .Nm lndir .  .Nm lndir .
 This option may be specified as many times as needed.  This option may be specified as many times as needed.
 .It Fl s  .It Fl s
Line 140 
Line 140 
 .Nm lndir  .Nm lndir
 descends into each subdirectory.  descends into each subdirectory.
 .It Fl i  .It Fl i
 Causes the program to not treat symbolic links in  Causes the program to not treat symbolic links in
 .Ar fromdir  .Ar fromdir
 specially.  The link created in  specially.  The link created in
 .Ar todir  .Ar todir
 will point back to the corresponding (symbolic link) file in  will point back to the corresponding (symbolic link) file in
 .Ar fromdir .  .Ar fromdir .
 If the link is to a directory, this is almost certainly the wrong thing.  If the link is to a directory, this is almost certainly the wrong thing.
 .Pp  .Pp
Line 154 
Line 154 
 .El  .El
 .Sh DIAGNOSTICS  .Sh DIAGNOSTICS
 The program displays the name of each subdirectory it enters, followed  The program displays the name of each subdirectory it enters, followed
 by a colon.  The  by a colon.  The
 .Fl s  .Fl s
 option suppresses these messages.  option suppresses these messages.
 .Pp  .Pp

Legend:
Removed from v.1.7  
changed lines
  Added in v.1.8