Intel XENIX 286 Programmers Guide (86) - Tenox.tc
Intel XENIX 286 Programmers Guide (86) - Tenox.tc Intel XENIX 286 Programmers Guide (86) - Tenox.tc
XENIX Programming Programming Commands get (continued) If the g-file generated by get with an -e option is accidentally ruined in the editing process, it may be regenerated by re-executing the get command with the -k option in place of the -e option. sees file protection specified via the ceiling, floor, and authorized user list stored in the sees file (see admin) are enforced when the -e option is used. -b Used with the -e option to indicate that the new delta should have an SID in a new branch. This option is ignored if the b flag is not present in the file (see admin) or if the retrieved delta is not a leaf delta. (A leaf delta is one that has no successors on the sees file tree.) -ilist -xlist Note: A branch delta may always be created from a nonleaf delta. A list of deltas to be included (forced to be applied) in the creation of the generated file. The list has the following syntax: ::= I , ::= SIDISID-SID SID, the SCCS identification of a delta, may be in any form described in [get citation]. A list of deltas to be excluded (forced not to be applied) in the creat ion of the generated file. See the -i option for the list format. -k Suppresses replacement of identification keywords in the retrieved text by their value. The -k option is implied by the -e option. -l[p] Causes a delta summary to be written into an 1-file. If -lp is used, then an 1-file is not created; the delta summary is written on the standard output instead. See the "Files" section later in this entry for the format of the 1-file. -p Causes the text retrieved from the SCCS file to be written on the standard output. No g-file is created. All output that normally goes to the standard output goes to file descriptor 2 instead, unless the -s option is used, in which case it disappears. -s Suppresses all output normally written on the standard output. However, fatal error messages (which always go to file descriptor 2) remain unaffected. -m Causes each text line retrieved from the SCCS file to be preceded by the SID of the delta that inserted the text line in the SCCS file. The format is: SID, a horizontal tab, the text line. B-65
Programming Commands XENIX Programming get (continued) -n Causes each generated text line to be preceded with the %M% identification keyword value. The format is: %M% value, a horizontal tab, the text line. When both the -m and -n options are used, the format is: %M% value, a horizontal tab, the -m option-generated format. -g Suppresses the actual retrieval of text from the SCCS file. It is primarily used to generate an 1-file or to verify the existence of a particular SID. -t Used to access the most recently cre.ated (top) delta in a given release (for example, -rl) or release and level (-r1.2). -aseq-no . The delta sequence nu mber of the SCCS file delta (version) to be retrieved. (See sccsfile in "File Formats" in XENIX 286 C Library Guide.) This option is used by the comb command; it is not particularly useful and should be avoided. If both the -r and -a options are specified, the -a option is used. Care should be taken when using the -a option in conjunction with the -e option, as the SID of the delta to be created may not be what you expect. The -r option can be used with the -a and -e options to control the naming of the SID of the delta to be created. For each file processed, get responds (on the standard output) with the SID being accessed and with the number of lines retrieved from the sees file. If the -e option is used, the SID of the delta to be made appears after the SID accessed and before the number of lines generated. If there is more than one named file or if a directory or standard input is named, each file name is printed {preceded by a newline) before it is processed. If the -i option is used, included deltas are listed following the notation "Included"; if the -x option is used, excluded deltas are listed following the notation "Excluded." Identification Keywords Identifying information is inserted into the text retrieved from the SCCS file by replacing identification keywords with their value wherever they occur. The following keywords may be used in the text stored in an sees file: Keyword %M% %1% %R% %L% B-66 Value Module name: either the value of the m flag in the file (see admin), or if absent, the name of the sees file with the leading s. removed. SCCS identification (SID) {%R %. %L%. %B%. %S%} of the retrieved text. Release. Level.
- Page 280 and 281: XENIX Programming Programming Comma
- Page 282 and 283: XENIX Programming Programming Comma
- Page 284 and 285: XENIX Programming as (continued) Fi
- Page 286 and 287: XENIX Programming Programming Comma
- Page 288 and 289: XENIX Programming Programming Comma
- Page 290 and 291: XENIX Programming Programm ing Comm
- Page 292 and 293: XENIX Programming Programming Comma
- Page 294 and 295: XENIX Programming Programming Comma
- Page 296 and 297: XENIX Programming Programm ing Comm
- Page 298 and 299: XENIX Programming Programming Comma
- Page 300 and 301: XENIX Programming Programming Comma
- Page 302 and 303: XENIX Programming Programming Comma
- Page 304 and 305: XENIX Programming Programming Comma
- Page 306 and 307: XENIX Programming Programming Comma
- Page 308 and 309: XENIX Programming Programming Comma
- Page 310 and 311: XENIX Programming Programming Comma
- Page 312 and 313: XENIX Programming Programming Comma
- Page 314 and 315: XENIX Programm ing Programming Comm
- Page 316 and 317: XENIX Programming Programming Comma
- Page 318 and 319: XENIX Programming Programming Comma
- Page 320 and 321: XENIX Programming Programming Comma
- Page 322 and 323: XENIX Programming Programming Comma
- Page 324 and 325: XENIX Programming Programming Comma
- Page 326 and 327: XENIX Programming Programming Comma
- Page 328 and 329: XENIX Programming Programming Comma
- Page 332 and 333: XENIX Programming Programming Comma
- Page 334 and 335: XENIX Programming Programming Comma
- Page 336 and 337: XENIX Programming Programming Comma
- Page 338 and 339: XENIX Programming Programming Comma
- Page 340 and 341: XENIX Programming Programming Comma
- Page 342 and 343: XENIX Programming Programming Comma
- Page 344 and 345: XENIX Programming lex (continued) E
- Page 346 and 347: XENIX Programming Programming Comma
- Page 348 and 349: XENIX Programming Programming Comma
- Page 350 and 351: XENIX Programming Programming Comma
- Page 352 and 353: XENIX Programming Programming Comma
- Page 354 and 355: XENIX Programming Programming Comma
- Page 356 and 357: XENIX Programming Programming Comma
- Page 358 and 359: XENIX Programming Programming Comma
- Page 360 and 361: XENIX Programm ing Programming Comm
- Page 362 and 363: XENIX Programming Programming Comma
- Page 364 and 365: XENIX Programming prs (continued) :
- Page 366 and 367: XENIX Programming Programming Comma
- Page 368 and 369: XENIX Programming Programm ing Comm
- Page 370 and 371: XENIX Programming Programming Comma
- Page 372 and 373: XENIX Programming Programm ing Comm
- Page 374 and 375: XENIX Programming Programming Comma
- Page 376 and 377: XENIX Programming Programming Comma
- Page 378 and 379: XENIX Programming Programming Comma
<strong>XENIX</strong> Programming Programming Commands<br />
get (continued)<br />
If the g-file generated by get with an -e option is accidentally ruined in the<br />
editing process, it may be regenerated by re-executing the get command with<br />
the -k option in place of the -e option.<br />
sees file protection specified via the ceiling, floor, and authorized user list<br />
stored in the sees file (see admin) are enforced when the -e option is used.<br />
-b Used with the -e option to indicate that the new delta should have an SID in a<br />
new branch. This option is ignored if the b flag is not present in the file (see<br />
admin) or if the retrieved delta is not a leaf delta. (A leaf delta is one that has<br />
no successors on the sees file tree.)<br />
-ilist<br />
-xlist<br />
Note: A branch delta may always be created from a nonleaf delta.<br />
A list of deltas to be included (forced to be applied) in the creation of the<br />
generated file. The list has the following syntax:<br />
::= I , <br />
::= SIDISID-SID<br />
SID, the SCCS identification of a delta, may be in any form described in [get<br />
citation].<br />
A list of deltas to be excluded (forced not to be applied) in the creat ion of the<br />
generated file. See the -i option for the list format.<br />
-k Suppresses replacement of identification keywords in the retrieved text by their<br />
value. The -k option is implied by the -e option.<br />
-l[p]<br />
Causes a delta summary to be written into an 1-file. If -lp is used, then an 1-file<br />
is not created; the delta summary is written on the standard output instead. See<br />
the "Files" section later in this entry for the format of the 1-file.<br />
-p Causes the text retrieved from the SCCS file to be written on the standard<br />
output. No g-file is created. All output that normally goes to the standard<br />
output goes to file descriptor 2 instead, unless the -s option is used, in which<br />
case it disappears.<br />
-s Suppresses all output normally written on the standard output. However, fatal<br />
error messages (which always go to file descriptor 2) remain unaffected.<br />
-m Causes each text line retrieved from the SCCS file to be preceded by the SID of<br />
the delta that inserted the text line in the SCCS file. The format is: SID, a<br />
horizontal tab, the text line.<br />
B-65