From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on inbox.vuxu.org X-Spam-Level: X-Spam-Status: No, score=-1.0 required=5.0 tests=DKIM_ADSP_CUSTOM_MED, FREEMAIL_FROM,MAILING_LIST_MULTI,RCVD_IN_DNSWL_NONE autolearn=ham autolearn_force=no version=3.4.4 Received: (qmail 31002 invoked from network); 17 May 2020 20:20:04 -0000 Received: from ns1.primenet.com.au (HELO primenet.com.au) (203.24.36.2) by inbox.vuxu.org with ESMTPUTF8; 17 May 2020 20:20:04 -0000 Received: (qmail 24666 invoked by alias); 17 May 2020 20:19:59 -0000 Mailing-List: contact zsh-workers-help@zsh.org; run by ezmlm Precedence: bulk X-No-Archive: yes List-Id: Zsh Workers List List-Post: List-Help: List-Unsubscribe: X-Seq: 45839 Received: (qmail 8465 invoked by uid 1010); 17 May 2020 20:19:58 -0000 X-Qmail-Scanner-Diagnostics: from mail-il1-f171.google.com by f.primenet.com.au (envelope-from , uid 7791) with qmail-scanner-2.11 (clamdscan: 0.102.3/25814. spamassassin: 3.4.4. Clear:RC:0(209.85.166.171):SA:0(-2.0/5.0):. Processed in 0.737504 secs); 17 May 2020 20:19:58 -0000 X-Envelope-From: mikachu@gmail.com X-Qmail-Scanner-Mime-Attachments: | X-Qmail-Scanner-Zip-Files: | Received-SPF: pass (ns1.primenet.com.au: SPF record at _netblocks.google.com designates 209.85.166.171 as permitted sender) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to; bh=xaejQqMj07aRc9f7ewkjOS8KOpUF0DS3947ry39959E=; b=N7g7mOQd22qR35mwyu27/3rAtkWymgZKTj4V5yXDRVLqoLghtabi1zoLu2bG2Xnstx xbrEr+x0Widcz3xpicMQI1MyIjp4dGqhrwRPHTvoLb5t/m/mp3d+Lwtdv0PgapQU7vGO PRIv6WCY99RGk5SLapCc7df1D/VimglEzJLvGJ0WuFPvLT7XcOao/khzguuHRyPP6OCI o0jVj8viHDDqzTYrNKXJhyqcRjmHdkz/wvcq8DAEdmqV33v05puCaaKs8b66fy1jMAJ7 7/5Y1DVbC0DVrKAGYGxXH6VxdZdssN+dj46wZo83scoRH2+aImH+4i79OagiMzu2H27z RJtw== X-Gm-Message-State: AOAM533QQjHF56m3qGnK+aj4RB8Pnwk02uCKBfVbjgL6nTM1zZEt5L7w zxKzl1ot+PSZtD7PfMeTwQCUeJoCvAf/NMffwUOLiw== X-Google-Smtp-Source: ABdhPJynAnAIGZ4ZYBqs6nwz5rzL3oXCySVDpo7SH99j4kBzcMeerOybGcvISnpc95w4Ii3B2UUtf40o4iRC7O9zWg8= X-Received: by 2002:a05:6e02:13a3:: with SMTP id h3mr12924904ilo.3.1589746765247; Sun, 17 May 2020 13:19:25 -0700 (PDT) MIME-Version: 1.0 In-Reply-To: <20200517101347.g7v6k2g7hoew636q@chazelas.org> References: <20200517101347.g7v6k2g7hoew636q@chazelas.org> From: Mikael Magnusson Date: Sun, 17 May 2020 22:19:24 +0200 Message-ID: Subject: Re: [PATCH] [doc] clone module using xterm's slave mode To: Zsh hackers list Content-Type: text/plain; charset="UTF-8" On 5/17/20, Stephane Chazelas wrote: > Here's a doc patch to document that approach (requires socat, > though the same could be done with expect or some perl/python > pty module). > > @@ -39,11 +39,30 @@ enditemize() > +The cloned zsh is the process that opens that device here. And once > +started, we make it read the X11 Window ID that tt(xterm) oututs there outputs -- Mikael Magnusson