aboutsummaryrefslogtreecommitdiff
path: root/files/.zsh
diff options
context:
space:
mode:
Diffstat (limited to 'files/.zsh')
-rw-r--r--files/.zsh/rc-10093352-sibsac/S10_functions10
-rw-r--r--files/.zsh/rc/S30_binds7
-rw-r--r--files/.zsh/rc/S50_aliases2
-rw-r--r--files/.zsh/zprofile6
4 files changed, 24 insertions, 1 deletions
diff --git a/files/.zsh/rc-10093352-sibsac/S10_functions b/files/.zsh/rc-10093352-sibsac/S10_functions
index 91aa4d3..2d51014 100644
--- a/files/.zsh/rc-10093352-sibsac/S10_functions
+++ b/files/.zsh/rc-10093352-sibsac/S10_functions
@@ -1,3 +1,13 @@
open() { explorer $(cygpath -w "$*") }
+wsdl2html() {
+ while : ; do
+ local fname="$1"
+ local out="$fname.html"
+ xsltproc /cygdrive/d/bobov/scripts/wsdl-viewer.xsl "$fname" > "$out"
+ echo "WSDL documentation file: $out"
+ shift
+ [[ $# -eq 0 ]] && break
+ done
+}
# vim: et ft=zsh :
diff --git a/files/.zsh/rc/S30_binds b/files/.zsh/rc/S30_binds
index 7808b83..4cfeb7a 100644
--- a/files/.zsh/rc/S30_binds
+++ b/files/.zsh/rc/S30_binds
@@ -1,3 +1,9 @@
+backward-delete-to-slash() {
+ local WORDCHARS=${WORDCHARS//\//}
+ zle .backward-delete-word
+}
+zle -N backward-delete-to-slash
+
bindkey -v "^[[3~" delete-char
bindkey -v "^[[5~" backward-word
bindkey -v "^[[6~" forward-word
@@ -13,6 +19,7 @@ bindkey -v "^R" history-incremental-search-backward
bindkey -v "^U" kill-whole-line
bindkey -v "^V" quoted-insert
bindkey -v "^W" backward-kill-word
+bindkey -v "^[w" backward-delete-to-slash
bindkey -v "^N" down-history
bindkey -v "^P" up-history
diff --git a/files/.zsh/rc/S50_aliases b/files/.zsh/rc/S50_aliases
index 0f5b10c..bc4837a 100644
--- a/files/.zsh/rc/S50_aliases
+++ b/files/.zsh/rc/S50_aliases
@@ -1,4 +1,4 @@
-alias -s html=firefox
+alias -s html=$BROWSER
alias df='df -h'
alias free='free -tm'
diff --git a/files/.zsh/zprofile b/files/.zsh/zprofile
new file mode 100644
index 0000000..b9df8e5
--- /dev/null
+++ b/files/.zsh/zprofile
@@ -0,0 +1,6 @@
+SSHAGENT=/usr/bin/ssh-agent
+SSHAGENTARGS="-s"
+if [ -z "$SSH_AUTH_SOCK" -a -x "$SSHAGENT" ]; then
+ eval `$SSHAGENT $SSHAGENTARGS`
+ trap "kill $SSH_AGENT_PID" 0
+fi