-
-
Notifications
You must be signed in to change notification settings - Fork 17
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support more dircolors keys #6
Comments
Thank you for the feedback. Sounds good! We should try to support all of these (if feasible / possible). |
Do you know how What if a file is both executable ( |
My version of the logic in C, in In particular, I'm currently cooking up a test script that compares my version against the output of |
Thank you very much for sharing your implementation! So I guess there is no real specification on how |
Yeah the spec is the implementation AFAIK ;) There's
but it doesn't tell you details like the relative priorities of things like |
Hey, the filenames are relative and you can't stat them, thus you can't decide if they are directories, executables or anything else. (In this simple example I know what they are, but you get the point). If we want to implement all of these extra keys, we would need to always get absolute paths as input which I don't think is feasible. Thoughts? |
If I understand you correctly, the question is not really about relative or absolute paths, but rather about whether In my understanding, there are two steps in the
|
I made the first step configurable with a simple binary on/off switch, because of
|
Partially addresses sharkdp#6.
Partially addresses sharkdp#6.
Partially addresses sharkdp#6.
Partially addresses sharkdp#6.
I believe this can be closed. I don't expect that anyone will miss |
Right now it supports the ones based on file types. But there's also
ca
for files with capabilities setdo
for doors (some Solaris thing)fi
for regular filesmh
for files with multiple hard linksno
the "normal" color which acts as a fallbackow
for directories writable by other userssu
for setuid filessg
for setgid filesst
for sticky filestw
for sticky directories that are writable by other usersThe text was updated successfully, but these errors were encountered: