If i have userid and passwd in FileA script works.
But if i put userid and passwd in FileB
Script Fails complaining FileB not found (even if i give pull fileB path)
I need to keep userid and passwd in FileB and not In FileA
hi,
Am trying to compare to files using the 'for' loop have tried this but keeps going on and on..
#!/bin/bash
for i in $(cat $c.sh);
do
for j in $(cat $d.sh);
do
if test "$i" != "$j"
then echo $i not in $j
fi
done
done
have tried this as... (0 Replies)
Hello,
I am quite new to Linux... I need to set some aliases and I can't get it to work. Can somebody tell me what's wrong?
I modified the .bashrc file in my home directory. I added:
alias pmv= '/home/vera/MGLTools-1.4.5/share/bin/pmv'
saved it and ran source .bashrc
The shell... (3 Replies)
Hi Team,
Thank you for your time.
i have a situation where the user IDs of the applicatio users have been locked down to Read only.
Hence I am writing a script to invoke their old .profile every time they login.
My problem is : when i run . $userpath/.profile from within the ksh script... (9 Replies)
I am very new to bash scripting and this is my first script.
I am trying to write a script that takes an argument d as the directory.
It looks through the files to find duplicates and delete them.
Here's some sorta-pseudocode but am unsure how to implement it:
#! /bin/bash
#get... (1 Reply)
I want to run nested loop inside shell script using which I want to copy files on diff machines on round robin basis.Number of machiines is fixed as 4 but number of files may vary. For eg.
Files: f1,f2,f3,f4,f5,f6
Machines: M1,M2,M3,M4
M1 - f1
M2 - f2
M3 - f3
M4 - f4
M1 - f5
M2 - f6
... (1 Reply)
Hi,
Im trying to run script A which requires path /sbin.
I have a crontab entry to run script A every 10 minutes.
Script A is executed fine by cron, but because script A requires /sbin in its path it fails to run.
My situation is script A get overwritten from time to time so I can't modify... (4 Replies)
Hey everyone!
I have my .bash_profile file which is read automatically when I launch Terminal therefore I can run my own functions.
BUT.
When I do:
sudo -s
sudo su
sudo su -
No matter what I do, I can't get the .bash_profile file to be sourced automatically so I end up having to run... (2 Replies)
I have a issue.sh script
more issue.sh
#!/bin/bash -e
echo "start"
source ~/.moht
echo "end"
Contents of ~/.moht are as below
more ~/.moht
umask 022
export EDITOR=vi
SYSNM=`uname -n`
UID=`id`
HOST=`hostname`
Executing of issue.sh throws the below error (1 Reply)
Discussion started by: mohtashims
1 Replies
LEARN ABOUT DEBIAN
sivtest
SIVTEST(1) General Commands Manual SIVTEST(1)
*
NAME
sivtest - interactive MANAGESIEVE test program
SYNOPSIS
sivtest [ -t keyfile ] [ -p port ] [ -m mechanism ]
[ -a userid ] [ -u userid ] [ -k num ] [ -l num ]
[ -r realm ] [ -f file ] [ -n num ] [ -c ]
[ -i ] [ -o option=value ] [ -v ] hostname
DESCRIPTION
sivtest is a utility that allows you to authenticate to a MANAGESIEVE server and interactively issue commands to it. Once authenticated you
may issue any MANAGESIEVE command by simply typing it in. It is capable of multiple SASL authentication mechanisms and handles encryption
layers transparently. This utility is often used for testing the operation of a timsieved server. Also those developing MANAGESIEVE clients
find it useful.
OPTIONS -t keyfile
Enable TLS. keyfile contains the TLS public and private keys. Specify "" to negotiate a TLS encryption layer but not use TLS
authentication.
-p port
Port to connect to. If left off this defaults to sieve as defined in /etc/services.
-m mechanism
Force sivtest to use mechanism for authentication. If not specified the strongest authentication mechanism supported by the server
is chosen.
-a userid
Userid to use for authentication; defaults to the current user. This is the userid whose password or credentials will be presented
to the server for verification.
-u userid
Userid to use for authorization; defaults to the current user. This is the userid whose identity will be assumed after authentica-
tion. NOTE: This is only used with SASL mechanisms that allow proxying (e.g. PLAIN, DIGEST-MD5).
-k num Minimum protection layer required.
-l num Maximum protection layer to use (0=none; 1=integrity; etc). For example if you are using the KERBEROS_V4 authentication mechanism
specifying 0 will force sivtest to not use any layer and specifying 1 will force it to use the integrity layer. By default the max-
imum supported protection layer will be used.
-r realm
Specify the realm to use. Certain authentication mechanisms (e.g. DIGEST-MD5) may require one to specify the realm.
-f file
Pipe file into connection after authentication.
-n num Number of authentication attempts; default = 1. The client will attempt to do SSL/TLS session reuse and/or fast reauth (e.g.
DIGEST-MD5), if possible.
-c Enable challenge prompt callbacks. This will cause the OTP mechanism to ask for the the one-time password instead of the secret
pass-phrase (library generates the correct response).
-i Don't send an initial client response for SASL mechanisms, even if the protocol supports it.
-o option=value
Set the SASL option to value.
-v Verbose. Print out more information than usual.
SEE ALSO timsieved(8)CMU Project Cyrus SIVTEST(1)