1 .\" Copyright (c) 1987, 1990, 1993
2 .\" The Regents of the University of California. All rights reserved.
4 .\" Redistribution and use in source and binary forms, with or without
5 .\" modification, are permitted provided that the following conditions
7 .\" 1. Redistributions of source code must retain the above copyright
8 .\" notice, this list of conditions and the following disclaimer.
9 .\" 2. Redistributions in binary form must reproduce the above copyright
10 .\" notice, this list of conditions and the following disclaimer in the
11 .\" documentation and/or other materials provided with the distribution.
12 .\" 3. Neither the name of the University nor the names of its contributors
13 .\" may be used to endorse or promote products derived from this software
14 .\" without specific prior written permission.
16 .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
17 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
18 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
19 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
20 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
21 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
28 .\" From: @(#)install.1 8.1 (Berkeley) 6/6/93
65 .Ar file1 ... fileN directory
79 The file(s) are copied
82 option is specified) to the target file or directory.
83 If the destination is a directory, then the
87 with its original filename.
88 If the target file already exists, it is
96 An alternate backup suffix may be specified via the
100 The options are as follows:
101 .Bl -tag -width indent
105 as the backup suffix if
109 Back up any existing files before overwriting them by renaming
111 .Ar file Ns Pa .old .
114 for specifying a different backup suffix.
117 If the target file already exists and the files are the same,
118 then do not change the modification time of the target.
119 If the target's file flags and mode need not to be changed,
120 the target's inode change time is also unchanged.
123 This is actually the default.
126 option is only included for backwards compatibility.
130 (top of the file hierarchy) that the items are installed in to.
133 is in use, a leading string of
135 will be removed from the file names logged to the
137 This option does not affect where the actual files are installed.
140 Missing parent directories are created as required.
142 Specify the target's file flags; see
144 for a list of possible flags and their meanings.
147 A numeric GID is allowed.
149 When copying, calculate the digest of the files with
155 is given no hash is emitted.
157 .Bl -tag -width rmd160 -offset indent
162 The MD5 cryptographic message digest.
164 The RMD-160 cryptographic message digest.
166 The SHA-1 cryptographic message digest.
168 The 256-bits SHA-2 cryptographic message digest of the file.
170 The 512-bits SHA-2 cryptographic message digest of the file.
172 .It Fl l Ar linkflags
173 Instead of copying the file make a link to the source.
174 The type of the link is determined by the
190 Absolute and relative have effect only for symbolic links.
192 are hard links for files on the same filesystem, symbolic otherwise.
194 Write the metadata associated with each item installed to
200 The metadata includes: the file name and file type, and depending upon
201 other options, the owner, group, file flags, modification time, and tags.
203 Specify an alternate mode.
204 The default mode is set to rwxr-xr-x (0755).
205 The specified mode may be either an octal or symbolic value; see
207 for a description of possible mode values.
209 Use the user database text file
211 and group database text file
215 rather than using the results from the system's
219 (and related) library calls.
222 A numeric UID is allowed.
224 Preserve the access and modification times.
225 Copy the file, as if the
227 (compare and copy) option is specified,
228 except if the target file does not already exist or is different,
229 then preserve the access and modification times of the source file.
234 unlinks an existing target before installing the new file.
237 flag a temporary file is used and then renamed to be
239 The reason this is safer is that if the copy or
240 rename fails, the existing target is left untouched.
245 to strip binaries so that
247 can be portable over a large
248 number of systems and binary types.
251 can be instructed to use another program to strip binaries.
255 tags to write out for the file when using
258 Indicate that install is running unprivileged, and that it should not
259 try to change the owner, the group, or the file flags of the destination.
260 The information that would have been updated can be stored in a log
267 showing files as they are installed or backed up.
272 preserves all file flags, with the exception of the
278 utility attempts to prevent moving a file onto itself.
282 creates an empty file.
286 utility checks for the presence of the
288 environment variable and if present,
289 uses the assigned value as the program to run if and when the
291 option has been specified.
295 environment variable is present,
297 will ignore any specification of the
300 This is mainly for use in debugging the
304 .Bl -tag -width "INS@XXXXXX" -compact
308 option is specified, or the
312 option is used in conjunction with the
314 option, temporary files named
320 are created in the target directory.
327 moved files by default.
328 The default was changed to copy in
349 option has changed as of
351 and it now takes an argument.
352 Command lines that used the old
354 will get an error or in rare cases will append logs to the first of
355 multiple source files rather than installing it.
357 Temporary files may be left in the target directory if
361 File flags cannot be set by
363 over a NFS file system.
364 Other file systems do not have a concept of flags.
367 utility will only warn when flags could not be set on a file system
368 that does not support them.
374 falsely says a file is copied when