Bash Extended Globbing
Wildcards in bash are referred to as pathname expansion. Pathname expansion is also sometimes referred to as globbing. Pathname expansion "expands" the "*", "?", and "[...]" syntaxes when you type them as part of a command, for example:
$ ls *.jpg # List all JPEG files $ ls ?.jpg # List JPEG files with 1 char names (eg a.jpg, 1.jpg) $ rm [A-Z]*.jpg # Remove JPEG files that start with a capital letterA subtle point about pathname expansion that is not often understood is that it is done by bash and not by the operating system or by the program that is being run. The program never sees the wildcards, bash substitutes the expansion into the command line before running the program. This is rarely important except when you're writing code and calling exec() and friends: if you don't execute the program via bash any wildcards in the command line that you pass to exec() won't get expanded.
But these are not the only forms of wildcards supported by bash. The other forms are referred to as extended globbing and you must enable them before you can use them:
$ shopt -s extglobExtended globbing as described by the bash man page:
?(pattern-list) Matches zero or one occurrence of the given patterns *(pattern-list) Matches zero or more occurrences of the given patterns +(pattern-list) Matches one or more occurrences of the given patterns @(pattern-list) Matches one of the given patterns !(pattern-list) Matches anything except one of the given patternsHere a pattern-list is a list of items separated by a vertical bar "|" (aka the pipe symbol). If you look at these you can see why the leading character was chosen as it matches what is used in regular expression syntax:
Bash Regular Expression ?(pattern-list) (...|...)? *(pattern-list) (...|...)* +(pattern-list) (...|...)+ @(pattern-list) (...|...) [@ not a RE syntax] !(pattern-list) "!" used as for negative assertions in RE syntaxWell, except for the "@" character you can see why...
For example, to list all the JPEG and GIF files that start with either "ab" or "def" you could do:
$ ls +(ab|def)*+(.jpg|.gif)Of course you could also do this without extended globbing:
# ls ab*.jpg ab*.gif def*.jpg def*.gif
To list all the files that match the regular expression "ab(2|3)+.jpg" you could do:
$ ls ab+(2|3).jpgNow that's something you can't do with regular globbing. Note: this matches files like ab2.jpg, ab3.jpg, ab2222.jpg, ab333.jpg, etc.
However, probably the most interesting extended globbing syntax is the "!(...)" syntax for matching everything except (ie not matching). But, be careful, this doesn't always do what you might expect. For example, let's list all the files that aren't JPEGs or GIFs. One's first thought might be something like this:
$ ls *!(.jpg|.gif) # wrong, Wrong, WRONGBut that doesn't work because the ".jpg" and the ".gif" of any file's name end up getting matched by the "*" and the null string at the end of the file name is the part that ends up not matching the "!(...)" pattern. The correct syntax is:
$ ls !(*.jpg|*.gif)
For a more complex negation example, let's go back to the first example and list all the files that aren't JPEG or GIF files and start with either "ab" or "def". This is actually quite simple, we just take the first example and nest it inside of "!(...)":
$ ls !(+(ab|def)*+(.jpg|.gif))Of course, like complex regular expressions, this will be completely incomprehensible 10 minutes after you write it.
Mitch Frazier is an Associate Editor for Linux Journal.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- BitTorrent Inc.'s Sync
- The Death of RoboVM
- The US Government and Open-Source Software
- The Humble Hacker?
- Open-Source Project Secretly Funded by CIA
- Linaro Announces Software Reference Platform for ARM
- ACI Worldwide's UP Retail Payments
- New Container Image Standard Promises More Portable Apps
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide