Skip to main content

How to write shell script



How to write shell script


Following steps are required to write shell script:

(1) Use any editor like vi or mcedit to write shell script.

(2)  After  writing  shell  script  set  execute  permission  for  your  script  as  follows
syntax:
chmod permission your-script-name

Examples:
$ chmod +x your-script-name
$ chmod 755 your-script-name

Note: This will set read write execute(7) permission for owner, for group and other permission is read and execute only(5).

ls -l command earlier presented a long of listing file with a line like the following for each file:

-rw-r--r--    1   root  user  0   2009-04-28 08:26 newfile.txt



Here the first character  in  the first column (-) indicates that  the file is a normal file. The next 9 characters indicate the access permissions for the file. The next set of 9 characters is divided into3 groups of 3 cha- racters. Purpose of these characters is as under:

(-) represents no permission
(r) represents 'read' permission
(w) represents 'write' permission
(x) represents 'execute' permission

Permission
Octal number
Equivalent Symbol
Read
4
r--
Write
2
-w-
Execute
1
--x


The  three  group  represents  user  (owner  of  the  file),  group(to  which  the  owner belongs)  and  others (any  other user of the system) respectively. Three characters in each group are for 'read', 'write' and 'execute' permission respectively.

In our example, the owner has 'read' and 'write' permission for the file and everyone else has only read permission. For a normal file, read, write and execute permissions are obvious.   For a directory,   read and write permissions mean   that   to   read   the contents of  the directory and create new entries in the directory. Execute permission means that one can search in the directory but not read from or write to the directory.

You can use   the chmod command   to change   the access permissions of a  file or a directory. To  specify permissions  for a file  with chmod, any of the following  two methods can be used.

Symbol
Meaning
u
User
g
Group
o
Other
a
All (equals to ugo)
+
Add Permission
-
Remove a permission
r
Read Permission
w
Write permission
x
Execute permission

Syntax: chmod u+x filename

(3) Execute your script as
syntax:
bash your-script-name
sh your-script-name
./your-script-name

Examples:
$ bash bar
$ sh bar
$ ./bar

 


Anurag

Comments

Popular posts from this blog

Standard and Formatted Input / Output in C++

The C++ standard libraries provide an extensive set of input/output capabilities which we will see in subsequent chapters. This chapter will discuss very basic and most common I/O operations required for C++ programming. C++ I/O occurs in streams, which are sequences of bytes. If bytes flow from a device like a keyboard, a disk drive, or a network connection etc. to main memory, this is called   input operation   and if bytes flow from main memory to a device like a display screen, a printer, a disk drive, or a network connection, etc., this is called   output operation . Standard Input and Output in C++ is done through the use of  streams . Streams are generic places to send or receive data. In C++, I/O is done through classes and objects defined in the header file  <iostream> .  iostream  stands for standard input-output stream. This header file contains definitions to objects like  cin ,  cout , etc. /O Library Header Files There are...

locking

DBMS Locking Part I (DBMS only) TECHNICAL ARTICLES -> PERFORMANCE ARTICLES [  Back  ] [  Next  ] DBMS is often criticized for excessive locking – resulting in poor database performance when sharing data among multiple concurrent processes. Is this criticism justified, or is DBMS being unfairly blamed for application design and implementation shortfalls? To evaluate this question, we need to understand more about DBMS locking protocols. In this article, we examine how, why, what and when DBMS locks and unlocks database resources. Future articles will address how to minimize the impact of database locking. THE NEED FOR LOCKING In an ideal concurrent environment, many processes can simultaneously access data in a DBMS database, each having the appearance that they have exclusive access to the database. In practice, this environment is closely approximated by careful use of locking protocols. Locking is necessary in a concurrent environment to as...

DATA WAREHOUSE VERSUS DATA MART: THE GREAT DEBATE

DATA WAREHOUSE VERSUS DATA MART: THE GREAT DEBATE Customers exploring the field of business intelligence for the first time often lead with: What is the difference between a data warehouse and a data mart? The next question follows as predictably as night follows day: which one does my company need? Let me start by saying that the two terms are often confused. Indeed, some people in the industry use them virtually interchangeably, which is unfortunate, because they do reflect a valuable hierarchical difference. The Data Warehouse A "data warehouse" will typically contain the full range of business intelligence available to a company from all sources. That data consists of transaction-processing records, corporate and marketing data, and other business operations information; for example, a bank might include loans, credit card statements, and demand deposits data, along with basic customer information. This internal data is frequently combined with statistica...