Announcement

Collapse
No announcement yet.

How to Make Bash Script Executable

Collapse
X
Collapse
  •  

  • How to Make Bash Script Executable


    Bash scripts are an essential part of the Linux system, but they are not like other files because scripts need executable permissions. These permissions help a script execute commands and make changes accordingly. 
    Hence, you must provide the executable permissions to run them from the command line. However, as a beginner, many users don’t know the commands to make the bash file executable. So, this blog has every possible method to make the bash script executable. 
    Chmod Command

    Chmod is the basic command used to set or change the file permission. In Linux, Readable (r), Writable (w), and executable (x) are the permissions that you can provide to a file. Hence, you need to run the following command to make a file executable for a particular user only: 

    chmod u+x <filename>.sh




    You can remove the u option from the above command to give all users executable permissions. 
    Using a Script

    If you use scripts regularly, you can create a sample script that will automatically provide the executable permissions to the other scripts. Here is the sample script you can use: 

    #!/bin/bash

    for script in "$@"; do

    chmod +x "$script"

    echo "$script has now the executable permission"

    done




    Now, use this script with your other one to give executable permissions to multiple scripts through a single command: 

    ./permission.sh script1.sh script2.sh script3.sh script4.sh




    However, ensure the script’s name starts with the “script,” as we have used the $script in the above code block. 
    Conclusion

    So, this is how you can easily check and change file permissions and make a bash script executable. We have explained a simple chmod command you can use to give executable permission to a specific user. Moreover, you can also create a script to make multiple scripts executable through a single command. 




    More...
      Posting comments is disabled.

    Categories

    Collapse

    Article Tags

    Collapse

    There are no tags yet.

    Latest Articles

    Collapse

    • Using MAXQDA for Qualitative Data Analysis on Linux
      by Kasimba



      by George Whittaker


      Introduction

      Qualitative data analysis (QDA) is a cornerstone of research across various fields, from social sciences to marketing. It involves uncovering patterns, themes, and meanings within non-numerical data such as interviews, focus groups, and textual narratives. In this era of digital tools, MAXQDA stands out as a premier software solution for QDA, empowering researchers to organize...
      11-21-2024, 11:31 PM
    • HAProxy on Ubuntu: Load Balancing and Failover for Resilient Infrastructure
      by Kasimba



      by german.suarez


      Introduction

      In today’s fast-paced digital landscape, ensuring the availability and performance of applications is paramount. Modern infrastructures require robust solutions to distribute traffic efficiently and maintain service availability even in the face of server failures. Enter HAProxy, the de facto standard for high-performance load balancing and failover.


      This article...
      11-21-2024, 03:00 PM
    • Providing a license for package sources
      by Kasimba
      Arch Linux hasn't had a license for any package sources (such as PKGBUILD files) in the past, which is potentially problematic. Providing a license will preempt that uncertainty.

      In RFC 40 we agreed to change all package sources to be licensed under the very liberal 0BSD license. This change will not limit what you can do with package sources. Check out the RFC for more on the rationale and prior discussion.

      Before we make this change, we will provide contributors with...
      11-19-2024, 09:21 AM
    • Linux Binary Analysis for Reverse Engineering and Vulnerability Discovery
      by Kasimba



      by George Whittaker


      Introduction

      In the world of cybersecurity and software development, binary analysis holds a unique place. It is the art of examining compiled programs to understand their functionality, identify vulnerabilities, or debug issues—without access to the original source code. For Linux, which dominates servers, embedded systems, and even personal computing, the skill of binary analysis is...
      11-18-2024, 07:10 PM
    • Ubuntu vs Debian: Linux Distributions Compared Deep Dive
      by Kasimba
      Debian and Ubuntu are two popular Linux distributions. In this deep dive we will guide you on the key differences between them from perspective of both corporate enterprise and personal productivity or pleasure usage. After reading this blog post you should be in a better position to decide to select Ubuntu or Debian.
      Stewardship, Licensing, Community and Cost

      Where as Debian is 100% fully committed to free software as defined by the Debian Free Software Guidelines, Ubuntu is created...
      11-17-2024, 08:30 PM
    • Debian Backup and Recovery Solutions: Safeguard Your Data with Confidence
      by Kasimba



      by George Whittaker


      Introduction

      In the digital age, data loss is a critical concern, and effective backup and recovery systems are vital for any Debian system administrator or user. Debian, known for its stability and suitability in enterprise, server, and personal computing environments, offers a multitude of tools for creating robust backup and recovery solutions. This guide will explore these solutions,...
      11-13-2024, 05:30 PM
    Working...
    X