-rw-r--r-- | doc/iiid.8.in | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/doc/iiid.8.in b/doc/iiid.8.in index 30476f7..a8768cc 100644 --- a/doc/iiid.8.in +++ b/doc/iiid.8.in | |||
@@ -1,106 +1,106 @@ | |||
1 | .TH iiid 8 "March 8th, 2009" "iii" "Klever Group (http://www.klever.net/)" | 1 | .TH iiid 8 "March 8th, 2009" "iii" "Klever Group (http://www.klever.net/)" |
2 | .hla en | 2 | .hla en |
3 | 3 | ||
4 | .SH NAME | 4 | .SH NAME |
5 | 5 | ||
6 | iiid \- An eye-fi card management daemon | 6 | iiid \- An eye-fi card management daemon |
7 | 7 | ||
8 | .SH SYNOPSYS | 8 | .SH SYNOPSYS |
9 | 9 | ||
10 | \fBiiid\fR | 10 | \fBiiid\fR |
11 | [\fB-h\fR] [\fB--help\fR] [\fB--usage\fR] | 11 | [\fB-h\fR] [\fB--help\fR] [\fB--usage\fR] |
12 | [\fB-V\fR] [\fB--version\fR] | 12 | [\fB-V\fR] [\fB--version\fR] |
13 | [\fB-L\fR] [\fB--license\fR] | 13 | [\fB-L\fR] [\fB--license\fR] |
14 | [\fB-p\fR \fIport\fR] [\fB--port=\fR\fIport\fR] | 14 | [\fB-p\fR \fIport\fR] [\fB--port=\fR\fIport\fR] |
15 | 15 | ||
16 | .SH DESCRIPTION | 16 | .SH DESCRIPTION |
17 | 17 | ||
18 | iiid daemon is a minimalistic open source eye-fi management daemon | 18 | iiid daemon is a minimalistic open source eye-fi management daemon |
19 | implementation. It is listening for incoming connections and accepts files from | 19 | implementation. It is listening for incoming connections and accepts files from |
20 | eye-fi card, optionally invoking scripts to sort out files or send out | 20 | eye-fi card, optionally invoking scripts to sort out files or send out |
21 | notifications. | 21 | notifications. |
22 | 22 | ||
23 | .SH OPTIONS | 23 | .SH OPTIONS |
24 | 24 | ||
25 | .TP | 25 | .TP |
26 | \fB-p\fR \fIport\fR, \fB--port=\fR\fIport\fR | 26 | \fB-p\fR \fIport\fR, \fB--port=\fR\fIport\fR |
27 | Set the port to listen to. You're not likely to ever need to change this, | 27 | Set the port to listen to. You're not likely to ever need to change this, |
28 | perhaps for debugging purpose or if you want to proxy connections. | 28 | perhaps for debugging purpose or if you want to proxy connections. |
29 | .TP | 29 | .TP |
30 | \fB-h\fR, \fB--help\fR, \fB--usage\fR | 30 | \fB-h\fR, \fB--help\fR, \fB--usage\fR |
31 | Display short usage instructions and exit. | 31 | Display short usage instructions and exit. |
32 | .TP | 32 | .TP |
33 | \fB-V\fR, \fB--version\fR | 33 | \fB-V\fR, \fB--version\fR |
34 | Report version and exit. | 34 | Report version and exit. |
35 | .TP | 35 | .TP |
36 | \fB-L\fR, \fB--license\fR | 36 | \fB-L\fR, \fB--license\fR |
37 | Show licensing terms. | 37 | Show licensing terms. |
38 | 38 | ||
39 | .SH EXIT STATUS | 39 | .SH EXIT STATUS |
40 | 40 | ||
41 | The daemon isn't supposed to exit at this point, but, like most executables, it returns zero in case of success, non-zero otherwise. | 41 | The daemon isn't supposed to exit at this point, but, like most executables, it returns zero in case of success, non-zero otherwise. |
42 | 42 | ||
43 | .SH FILES | 43 | .SH FILES |
44 | 44 | ||
45 | .TP | 45 | .TP |
46 | @sysconfdir@/iii/\fBXXXXXXXXXXXX.conf/fR | 46 | @sysconfdir@/iii/\fBXXXXXXXXXXXX.conf\fR |
47 | Upon successfull connection, the daemon reads the configuration from this file, | 47 | Upon successfull connection, the daemon reads the configuration from this file, |
48 | where XXXXXXXXXXXX is the macaddress of your eyefi card. You can lookup the mac | 48 | where XXXXXXXXXXXX is the macaddress of your eyefi card. You can lookup the mac |
49 | address of your card in your Mac/Windows Settings.xml file. Be sure to remove | 49 | address of your card in your Mac/Windows Settings.xml file. Be sure to remove |
50 | dashes from it. | 50 | dashes from it. |
51 | 51 | ||
52 | .SH CONFIGURATION OPTIONS | 52 | .SH CONFIGURATION OPTIONS |
53 | 53 | ||
54 | .TP | 54 | .TP |
55 | \fBtargetdir\fR = "\fI/var/lib/iii/%s/\fR" | 55 | \fBtargetdir\fR = "\fI/var/lib/iii/%s/\fR" |
56 | Sets the target directory for uploaded files. If the \fI%s\fR placeholder is | 56 | Sets the target directory for uploaded files. If the \fI%s\fR placeholder is |
57 | present in the string, it is replaced with card mac address. | 57 | present in the string, it is replaced with card mac address. |
58 | .TP | 58 | .TP |
59 | \fBuploadkey\fR = "\fIxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\fR" | 59 | \fBuploadkey\fR = "\fIxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\fR" |
60 | The upload key as seen in Mac/Windows Settings.xml file. | 60 | The upload key as seen in Mac/Windows Settings.xml file. |
61 | .TP | 61 | .TP |
62 | \fBon-start-session\fR = "\fIlogger iii-StartSession ${EYEFI_MACADDRESS} ${EYEFI_TRANSFER_MODE} ${EYEFI_TRANSFERMODETIMESTAMP}\fR" | 62 | \fBon-start-session\fR = "\fIlogger iii-StartSession ${EYEFI_MACADDRESS} ${EYEFI_TRANSFER_MODE} ${EYEFI_TRANSFERMODETIMESTAMP}\fR" |
63 | The command to execute on \fBStartSession\fR request. The command receives some | 63 | The command to execute on \fBStartSession\fR request. The command receives some |
64 | information via environment variables. | 64 | information via environment variables. |
65 | .TP | 65 | .TP |
66 | \fBon-upload-photo\fR = "\fIlogger iii-UploadPhoto ${EYEFI_MACADDRESS} ${EYEFI_UPLOADED}\fR" | 66 | \fBon-upload-photo\fR = "\fIlogger iii-UploadPhoto ${EYEFI_MACADDRESS} ${EYEFI_UPLOADED}\fR" |
67 | The command to execute after successfull photo upload. The information about | 67 | The command to execute after successfull photo upload. The information about |
68 | the card mac address and uploaded file name is passed via environment | 68 | the card mac address and uploaded file name is passed via environment |
69 | variables. | 69 | variables. |
70 | .TP | 70 | .TP |
71 | \fBon-mark-last-photo-in-roll\fR = "\fIlogger iii-MarkLastPhotoInRoll ${EYEFI_MACADDRESS} ${EYEFI_MERGEDELTA}\fR" | 71 | \fBon-mark-last-photo-in-roll\fR = "\fIlogger iii-MarkLastPhotoInRoll ${EYEFI_MACADDRESS} ${EYEFI_MERGEDELTA}\fR" |
72 | The command to execute on \fBMarkLastPhotoInRoll\fR request. The information | 72 | The command to execute on \fBMarkLastPhotoInRoll\fR request. The information |
73 | about request is passed via environment variables. | 73 | about request is passed via environment variables. |
74 | .TP | 74 | .TP |
75 | \fBumask\fR = \fI002\fR | 75 | \fBumask\fR = \fI002\fR |
76 | The file mode creation mask. | 76 | The file mode creation mask. |
77 | 77 | ||
78 | .SH AUTHOR | 78 | .SH AUTHOR |
79 | 79 | ||
80 | Written by Michael Krelin <hacker@klever.net> | 80 | Written by Michael Krelin <hacker@klever.net> |
81 | 81 | ||
82 | .SH COPYRIGHT | 82 | .SH COPYRIGHT |
83 | 83 | ||
84 | Copyright (c) 2009-2011 Klever Group (http://www.klever.net/) | 84 | Copyright (c) 2009-2011 Klever Group (http://www.klever.net/) |
85 | 85 | ||
86 | Permission is hereby granted, free of charge, to any person obtaining a copy of | 86 | Permission is hereby granted, free of charge, to any person obtaining a copy of |
87 | this software and associated documentation files (the "Software"), to deal in | 87 | this software and associated documentation files (the "Software"), to deal in |
88 | the Software without restriction, including without limitation the rights to | 88 | the Software without restriction, including without limitation the rights to |
89 | use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies | 89 | use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies |
90 | of the Software, and to permit persons to whom the Software is furnished to do | 90 | of the Software, and to permit persons to whom the Software is furnished to do |
91 | so, subject to the following conditions: | 91 | so, subject to the following conditions: |
92 | 92 | ||
93 | The above copyright notice and this permission notice shall be included in all | 93 | The above copyright notice and this permission notice shall be included in all |
94 | copies or substantial portions of the Software. | 94 | copies or substantial portions of the Software. |
95 | 95 | ||
96 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR | 96 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR |
97 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, | 97 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, |
98 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE | 98 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE |
99 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER | 99 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER |
100 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, | 100 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, |
101 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE | 101 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE |
102 | SOFTWARE. | 102 | SOFTWARE. |
103 | 103 | ||
104 | .SH BUGS | 104 | .SH BUGS |
105 | 105 | ||
106 | You tell me. Send reports to <iii-bugs@klever.net> | 106 | You tell me. Send reports to <iii-bugs@klever.net> |