Sponsored Content
Full Discussion: update a file by key
Top Forums Shell Programming and Scripting update a file by key Post 302112075 by ghostdog74 on Sunday 25th of March 2007 08:02:08 PM
Old 03-25-2007
if you have Python, here's an alternative:
Code:
#!/usr/bin/python
new = open("new").readlines()
fi = open("file").readlines()
for li in fi:
    li = li.strip().split(";")
    for li2 in new:
        li2 = li2.strip().split(";")
        if li2[0] == li[0] and li2[1] == li[1]:
            print ';'.join(li2)
        else:
            print ';'.join(li)

 

9 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Pressing backspace key simulates enter key

Hi, Whenever i press the backspace key, a new line appears, i.e. it works like a enter key. :confused: Thanks (2 Replies)
Discussion started by: vibhor_agarwali
2 Replies

2. Shell Programming and Scripting

Using Key to get data from second file

I posted a problem last week that had essentially two steps. Someone was kind enough to help me with the first step, but beacuse I didn't explain things well, left out the second step. I'm required to work in C Shell. I deeply appreciate any help, since I've never worked in a shell language... (4 Replies)
Discussion started by: bassmaster
4 Replies

3. UNIX for Dummies Questions & Answers

Remove VI encryption key from file

Hi There, I have set encryption key to my file using :X command. Now that I no more need encryption key to the file, I just want to delete/remove the encryption key. I have gone through many source but in vain. None of the source provided me with the solution that I am looking for. I... (2 Replies)
Discussion started by: grc
2 Replies

4. Solaris

Solaris 8 ssh public key authentication issue - Server refused our key

Hi, I've used the following way to set ssh public key authentication and it is working fine on Solaris 10, RedHat Linux and SuSE Linux servers without any problem. But I got error 'Server refused our key' on Solaris 8 system. Solaris 8 uses SSH2 too. Why? Please help. Thanks. ... (1 Reply)
Discussion started by: aixlover
1 Replies

5. Shell Programming and Scripting

Shell Script @ Find a key word and If the key word matches then replace next 7 lines only

Hi All, I have a XML file which is looks like as below. <<please see the attachment >> <?xml version="1.0" encoding="UTF-8"?> <esites> <esite> <name>XXX.com</name> <storeId>10001</storeId> <module> ... (4 Replies)
Discussion started by: Rajeev_hbk
4 Replies

6. Shell Programming and Scripting

Searching the content of one file using the search key of another file

I have two files: file 1: hello.com neo.com,japan.com,example.com news.net xyz.com, telecom.net, highlands.net, software.com example2.com earth.net, abc.gov.uk file 2: neo.com example.com abc.gov.uk file 2 are the search keys to search in file 1 if any of the search key is... (3 Replies)
Discussion started by: csim_mohan
3 Replies

7. Shell Programming and Scripting

How to extract information a file according key id in another file?

hi, i have a large file containing the detailed information of a bunch of keys like this: JAT_0001 contig102_342_3_n2 contig102_342 atgcacgacta 30 50 20... (11 Replies)
Discussion started by: the_simpsons
11 Replies

8. Shell Programming and Scripting

Update a specific field in file with Variable value based on other Key Word

I have an input file with A=xyz B=pqr I would want the value in Second Field (xyz or pqr) updated with a value present in Shell Variable based on the value passed in the first field. (A or B ) while read line do NEW_VALUE = `some functionality done on $line` If $line=First Field-... (1 Reply)
Discussion started by: infernalhell
1 Replies

9. UNIX for Beginners Questions & Answers

Getting count of Key in another file

Hi All, I need to find the count of key occurrence from one file corresponding to another file. Any help please. I am planning to read the CUST_ID in a while loop and do a grep , is there a way to do easier CUST_ID 677582806078 687582821181 687582828910 687582834580 687582834849... (1 Reply)
Discussion started by: arunkumar_mca
1 Replies
cp(1)							      General Commands Manual							     cp(1)

NAME
cp - copy files and directory subtrees SYNOPSIS
extarg] file1 new_file extarg] file1 [file2 ...] dest_directory extarg] directory1 [directory2 ...] dest_directory extarg] file1|directory1 [file2|directory2 ...] dest_directory DESCRIPTION
copies: o file1 to new or existing new_file, o file1 to existing dest_directory, o file1, file2, ... to existing dest_directory, o directory subtree directory1, to new or existing dest_directory. or o multiple directory subtrees directory1, directory2, ... to new or existing dest_directory. fails if file1 and new_file are the same (be cautious when using shell metacharacters). When destination is a directory, one or more files are copied into that directory. If two or more files are copied, the destination must be a directory. When copying a single file to a new file, if new_file exists, its contents are destroyed. If the access permissions of the destination dest_directory or existing destination file new_file forbid writing, aborts and produces an error message "cannot create file". To copy one or more directory subtrees to another directory, the option is required. The option is ignored if used when copying a file to another file or files to a directory. If new_file is a link to an existing file with other links, overwrites the existing file and retains all links. If copying a file to an existing file, does not change existing file access permission bits, owner, or group. When copying files to a directory or to a new file that does not already exist, creates a new file with the same file permission bits as file1, modified by the file creation mask of the user if the option was not specified, and then bitwise inclusively ORed with S_IRWXU. The owner and group of the new file or files are those of the user. The last modification time of new_file (and last access time, if new_file did not exist) and the last access time of the source file1 are set to the time the copy was made. Options (interactive copy) Causes to write a prompt to standard error and wait for a response before copying a file that would overwrite an existing file. If the response from the standard input is affirmative, the file is copied if permissions allow the copy. (force copy) Forces existing destination pathnames to be removed before copying, without prompting for confirmation. This option has the effect of destroying and replacing any existing file whose name and direc- tory location conflicts with the name and location of the new file created by the copy operation. When the flag is set and if the destination file exists and the user has write permission on the destination file, then the desti- nation file is not removed. (preserve permissions) Causes to preserve in the copy as many of the modification time, access time, file mode, user ID, and group ID as allowed by permissions. (recursive subtree copy) Causes to copy the subtree rooted at each source directory to dest_directory. If dest_directory exists, it must be a directory, in which case creates a directory within dest_directory with the same name as file1 and copies the subtree rooted at file1 to dest_direc- tory/file1. An error occurs if dest_directory/file1 already exists. If dest_directory does not exist, creates it and copies the subtree rooted at file1 to dest_directory. Note that cannot merge subtrees. Usually normal files and directories are copied. Character special devices, block special devices, network special files, named pipes, symbolic links, and sockets are copied, if the user has access to the file; otherwise, a warning is printed stating that the file cannot be created, and the file is skipped. dest_directory should not reside within directory1, nor should directory1 have a cyclic directory structure, since in both cases attempts to copy an infinite amount of data. Under the UNIX Standard environment (see standards(5)), will exit with error if multiple sources are being copied to a non-existing directory. (recursive subtree copy) The option is identical to the option. With the and options, in addition to regular files and directories, also copies FIFOs, character and block device files and sym- bolic links. Only superusers can copy device files. All other users get an error. Symbolic links are copied so the target points to the same location that the source did. Warning: While copying a directory tree that has device special files, use the option; otherwise, an infinite amount of data is read from the device special file and is duplicated as a special file in the destination directory occupying large file system space. Causes to traverse the symbolic link specified as an operand and copy it to the destination. Causes to traverse the symbolic link specified as an operand or any symbolic links encountered during traversal of a file hierarchy, and copy it to the destination. Causes to copy the symbolic link specified as an operand and any symbolic links encountered during traversal of a file hierarchy. This option will not follow any symbolic links. Specifies the handling of any extent attributes of the file[s] to be copied. extarg takes one of the following values. Issues a warning message if extent attributes cannot be copied, but copies the file anyway. Does not copy the extent attributes. Fails to copy the file if the extent attribute can not be copied. Extent attributes can not be copied if the files are being copied to a file system which does not support extent attributes or if that file system has a different block size than the original. If is not specified, the default value for extarg is Specifies "safe" mode. This option minimizes the impact of on the performance of the system by opening the target file using the flag. This is recommended when the total size of the copy (not of a single file) is a significant portion of the size of system buffer cache. Usage of this option increases copy time. Specifying more than one of the mutually-exclusive options and will not be considered an error. The last option specified will determine the behavior of the utility. Access Control Lists (ACLs) If new_file is a new file, or if a new file is created in dest_directory, it inherits the access control list of the original file1, file2, etc., altered to reflect any difference in ownership between the two files (see acl(5) and aclv(5)). In JFS file systems, new files cre- ated by do not inherit their parent directory's default ACL entries (if any), but instead retain the ACLs of the files being copied. When copying files from a JFS file system to an HFS file system or vice versa, optional ACL entries are lost. EXTERNAL INFLUENCES
For information about the UNIX standard environment, see standards(5). Environment Variables determines the interpretation of text as single and/or multi-byte characters. and determine the local language equivalent of (for yes/no queries). determines the language in which messages are displayed. If is not specified in the environment or is set to the empty string, the value of is used as a default for each unspecified or empty vari- able. If is not specified or is set to the empty string, a default of "C" (see lang(5)) is used instead of If any internationalization variable contains an invalid setting, behaves as if all internationalization variables are set to "C". See environ(5). International Code Set Support Single- and multi-byte character code sets are supported. EXAMPLES
The following command moves the directory sourcedir and its contents to a new location (targetdir) in the file system. Since creates the new directory, the destination directory targetdir should not already exist. The option copies the subtree (files and subdirectories) in directory sourcedir to directory targetdir. The double ampersand causes a con- ditional action. If the operation on the left side of the is successful, the right side is executed (and removes the old directory). If the operation on the left of the is not successful, the old directory is not removed. This example is equivalent to: To copy all files and directory subtrees in the current directory to an existing targetdir, use: To copy all files and directory subtrees in sourcedir to targetdir, use: Note that directory pathnames can precede both sourcedir and targetdir. To create a zero-length file, use any of the following: DEPENDENCIES
NFS Access control lists of networked files are summarized (as returned in by but not copied to the new file. When using or on such files, a is not printed after the mode value when asking for permission to overwrite a file. AUTHOR
was developed by AT&T, the University of California, Berkeley, and HP. SEE ALSO
cpio(1), ln(1), mv(1), rm(1), link(1M), lstat(2), readlink(2), stat(2), symlink(2), symlink(4), acl(5), aclv(5), standards(5). STANDARDS CONFORMANCE
cp(1)
All times are GMT -4. The time now is 01:48 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy