Directly use ${parameter#word} of sh(1) - plumb - Open certain URL patterns with an ad-hoc opener (plumber)
(HTM) hg clone https://bitbucket.org/iamleot/plumb
(DIR) Log
(DIR) Files
(DIR) Refs
(DIR) README
---
(DIR) changeset 0c5ddb73f952b5b5e9070f64a50ea62494440598
(DIR) parent 2aa1df6ae9bc450bb86793b00bee3aed595c5fb6
(HTM) Author: Leonardo Taccari <iamleot@gmail.com>
Date: Mon, 26 Mar 2018 20:51:31
Directly use ${parameter#word} of sh(1)
(No need to disturb printf(1) and cut(1))
Diffstat:
openers/cve | 2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
---
diff -r 2aa1df6ae9bc -r 0c5ddb73f952 openers/cve
--- a/openers/cve Mon Mar 26 17:15:03 2018 +0200
+++ b/openers/cve Mon Mar 26 20:51:31 2018 +0200
@@ -1,7 +1,7 @@
#!/bin/sh
for u in "$@"; do
- cve="$(printf "%s\n" "$u" | cut -d : -f 2)"
+ cve="${u#*://}"
cveurl="https://nvd.nist.gov/vuln/detail/${cve}"
plumb "${cveurl}"
done