Commit | Line | Data |
---|---|---|
4f55d991 KT |
1 | .TH UUX 1C |
2 | .SH NAME | |
3 | uux \- unix to unix command execution | |
4 | .SH SYNOPSIS | |
5 | .B uux | |
6 | [ | |
7 | .B \- | |
8 | ] | |
9 | command-string | |
10 | .SH DESCRIPTION | |
11 | .I Uux | |
12 | will gather 0 or more files from various systems, | |
13 | execute a command on a specified system | |
14 | and send standard output to a file on a specified | |
15 | system. | |
16 | .PP | |
17 | The command-string is made up of one or more arguments that look | |
18 | like a shell command line, | |
19 | except that the command and file names | |
20 | may be prefixed by system-name!. | |
21 | A null system-name is interpreted as the local system. | |
22 | .PP | |
23 | File names may be one of | |
24 | .IP | |
25 | (1) a full pathname; | |
26 | .IP | |
27 | (2) a pathname preceded by | |
28 | .IR ~xxx ; | |
29 | where | |
30 | .I xxx | |
31 | is a userid on the specified system | |
32 | and is replaced by that user's login directory; | |
33 | .br | |
34 | .IP | |
35 | (3) anything else is prefixed by the current directory. | |
36 | .PP | |
37 | The `\-' option will cause the standard input to the | |
38 | .I uux | |
39 | command to be the standard input to the command-string. | |
40 | .PP | |
41 | For example, the command | |
42 | .IP | |
43 | uux "!diff usg!/usr/dan/f1 pwba!/a4/dan/f1 > !fi.diff" | |
44 | .PP | |
45 | will get the f1 files from the usg and pwba machines, | |
46 | execute a | |
47 | .I diff | |
48 | command | |
49 | and put the results in f1.diff in the local directory. | |
50 | .PP | |
51 | Any special shell characters such as <>;| should be quoted either | |
52 | by quoting the entire command-string, or quoting the special | |
53 | characters as individual arguments. | |
54 | .SH FILES | |
55 | /usr/uucp/spool - spool directory | |
56 | .br | |
57 | /usr/uucp/* - other data and programs | |
58 | .SH SEE ALSO | |
59 | uucp(1) | |
60 | .br | |
61 | D. A. Nowitz, | |
62 | .I Uucp implementation description | |
63 | .SH WARNING | |
64 | An installation may, and for security reasons | |
65 | generally will, limit the list of | |
66 | commands executable on behalf of an incoming request from | |
67 | .I uux. | |
68 | Typically, a restricted site will permit little other than | |
69 | the receipt of mail via | |
70 | .I uux. | |
71 | .SH BUGS | |
72 | Only the first command of a shell pipeline may | |
73 | have a system-name!. | |
74 | All other commands are executed on the system of the first | |
75 | command. | |
76 | .br | |
77 | The use of the shell metacharacter | |
78 | .B * | |
79 | will probably not do what you want it to do. | |
80 | .br | |
81 | The shell tokens << and >> are not implemented. | |
82 | .br | |
83 | There is no notification of denial of execution | |
84 | on the remote machine. |