代码搜索:bash

找到约 5,321 项符合「bash」的源代码

代码结果 5,321
www.eeworm.com/read/374494/9402904

tst-groupmod

#!/bin/bash export LANG=C TEMPDIR=`mktemp -d tests.XXXXXX` cat $TEMPDIR/group root:x:0:bigsister bin:x:1:daemon uucp:x:14: dialout:x:16: audio:x:17: floppy:x:19: utmp:x:22: video:x:33: EOT
www.eeworm.com/read/417848/10974448

sh testit.sh

#!/bin/bash -norc set -x strace -v ./mapper1 /mnt/wrapfs/BAR.TXT 0 20 exit 0 # attach a node so /mnt/wrapfs/abc -> /n/fist/zadok ./fist_ioctl +a /mnt/wrapfs abc /n/fist/zadok #read n #./fist_ioctl
www.eeworm.com/read/469347/6973355

sh foo_backup.sh

#!/bin/bash BACKUP_DIR=/backup SRCDIR=/src TODAY_TIME=$(date +%F) full() { touch /tmp/time.key cd $SRCDIR find ./ ! -type d > file.list mkdir -p $BACKUP_DIR/$TODAY_TIME tar -T file.list -c | tar
www.eeworm.com/read/468463/6991120

gitcompile

#!/bin/bash if test -d ../alsa-lib/utils && ! test -r `aclocal --print-ac-dir`/alsa.m4; then alsa_m4_flags="-I ../alsa-lib/utils" fi aclocal $alsa_m4_flags $ACLOCAL_FLAGS # save original files to a
www.eeworm.com/read/458613/7293192

sh build_bootloader.sh

#!/bin/bash rm -f *.zip rm -f *.nb0 wget http://www.handhelds.org/~aquadran/MyPal716/firmware/original/asus716_bootloader_Jan_30_2004_backup.zip unzip asus716_bootloader_Jan_30_2004_backup.zip A7123
www.eeworm.com/read/458613/7293193

sh build_first_time.sh

#!/bin/bash rm -f orig/asus716_bootloader_Jan_30_2004_backup.zip rm -f orig/A7123000_orig.nb0 cd orig wget http://www.handhelds.org/~aquadran/MyPal716/firmware/original/asus716_bootloader_Jan_30_200
www.eeworm.com/read/438832/7725292

sh arrow-detect.sh

#!/bin/bash # arrow-detect.sh: 检测方向键, 和一些非打印字符的按键. # 感谢, Sandro Magi, 告诉了我们怎么做到这点. # -------------------------------------------- # 按键所产生的字符编码. arrowup='\[A' arrowdown='\[B' arrowrt='\[C' arrowleft='
www.eeworm.com/read/438832/7725401

sh numbers.sh

#!/bin/bash # numbers.sh: 几种不同数制的数字表示法. # 10进制: 默认情况 let "dec = 32" echo "decimal number = $dec" # 32 # 这没什么特别的. # 8进制: 以'0'(零)开头 let "oct = 032" echo "octal number = $oct"
www.eeworm.com/read/438832/7725430

sh stupid-script-tricks.sh

#!/bin/bash # stupid-script-tricks.sh: 朋友, 别在家试这个脚本. # 来自于"Stupid Script Tricks," 卷I. dangerous_variable=`cat /boot/vmlinuz` # 这是压缩过的Linux内核自身. echo "string-length of \$dangerous_variable = ${#
www.eeworm.com/read/438832/7725460

html index.html

高级Bash脚本编程指南