1 .\" Copyright (c) 1987, 1990, 1993
2 .\" The Regents of the University of California. All rights reserved.
4 .\" Redistribution and use in source and binary forms, with or without
5 .\" modification, are permitted provided that the following conditions
7 .\" 1. Redistributions of source code must retain the above copyright
8 .\" notice, this list of conditions and the following disclaimer.
9 .\" 2. Redistributions in binary form must reproduce the above copyright
10 .\" notice, this list of conditions and the following disclaimer in the
11 .\" documentation and/or other materials provided with the distribution.
12 .\" 3. Neither the name of the University nor the names of its contributors
13 .\" may be used to endorse or promote products derived from this software
14 .\" without specific prior written permission.
16 .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
17 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
18 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
19 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
20 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
21 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
28 .\" From: @(#)install.1 8.1 (Berkeley) 6/6/93
29 .\" $FreeBSD: src/usr.bin/xinstall/install.1,v 1.16.2.9 2002/07/01 21:01:23 des Exp $
59 .Ar file1 ... fileN directory
70 The file(s) are copied
73 option is specified) to the target file or directory.
74 If the destination is a directory, then the
78 with its original filename.
79 If the target file already exists, it is
87 An alternate backup suffix may be specified via the
91 The options are as follows:
92 .Bl -tag -width indent
94 Back up any existing files before overwriting them by renaming
99 for specifying a different backup suffix.
103 as the backup suffix if
108 If the target file already exists and the files are the same,
109 then don't change the modification time of the target.
112 This is actually the default.
115 option is only included for backwards compatibility.
118 Missing parent directories are created as required.
122 (top of the file hierarchy) that the items are installed into.
123 This option is implemented for compatibility with the
129 Specify the target's file flags; see
131 for a list of possible flags and their meanings.
134 A numeric GID is allowed.
135 .It Fl l Ar linkflags
136 Instead of copying the file make a link to the source.
137 The type of the link is determined by the
153 Absolute and relative have effect only for symbolic links.
155 are hard links for files on the same filesystem, symbolic otherwise.
160 Specify an alternate mode.
161 The default mode is set to rwxr-xr-x (0755).
162 The specified mode may be either an octal or symbolic value; see
164 for a description of possible mode values.
166 Use the user database text file
168 and group database text file
172 rather than using the results from the system's
176 (and related) library calls.
179 A numeric UID is allowed.
181 Preserve the modification time.
182 Copy the file, as if the
184 (compare and copy) option is specified,
185 except if the target file doesn't already exist or is different,
186 then preserve the modification time of the file.
191 unlinks an existing target before installing the new file.
194 flag a temporary file is used and then renamed to be
196 The reason this is safer is that if the copy or
197 rename fails, the existing target is left untouched.
202 to strip binaries so that
204 can be portable over a large
205 number of systems and binary types.
209 is running unprivileged, and that it should not try to change
210 the owner, the group, or the file flags of the destination.
215 showing files as they are installed or backed up.
220 preserves all file flags, with the exception of the
226 utility attempts to prevent moving a file onto itself.
230 creates an empty file.
234 utility checks for the presence of the
236 environment variable and if present,
237 uses the assigned value as the program to run if and when the
239 option has been specified.
243 environment variable is present,
245 will ignore any specification of the
248 This is mainly for use in debugging the
253 .Bl -tag -width INS@XXXX -compact
257 option is specified, or the
261 option is used in conjunction with the
263 option, temporary files named
269 are created in the target directory.
276 moved files by default.
277 The default was changed to copy in
296 Temporary files may be left in the target directory if
300 File flags cannot be set by
302 over a NFS filesystem. Other filesystems do not have a concept of flags.
305 utility will only warn when flags could not be set on a filesystem
306 that does not support them.
312 falsely says a file is copied when