Pablo Aguiar
Pablo Aguiar
Go for it, @TarunRKaushik! 🚀
Probably the best way to run it is by calling `thefuck` from the terminal. e.g. `thefuck PINGG` or `thefuck "git brnch"`.
One point of interest would be `utils.get_all_executables()`: https://github.com/nvbn/thefuck/blob/d8ddf5a2be9d52ec4bc8c11e79fcc7b3c390b669/thefuck/utils.py#L112-L133 as it is used in the `no_command` rule: https://github.com/nvbn/thefuck/blob/d8ddf5a2be9d52ec4bc8c11e79fcc7b3c390b669/thefuck/rules/no_command.py#L1-L42 I gave this issue a bit more thought. Turning executable names to lower...
Could you please share the contents of `.bashrc`?
> ### The output of The Fuck with `THEFUCK_DEBUG=true` exported (typically execute `export THEFUCK_DEBUG=true` in your shell before The Fuck): > > ``` > same output > ``` The debug...
Could you please share your `~/.zshrc` file with sensitive information filtered out?
Instant mode is an experimental feature, I recommend disabling it. So, please change from ```bash eval $(thefuck --alias --enable-experimental-instant-mode) ``` to ```bash eval $(thefuck --alias) ``` Sorry for any inconvenience.
Yes. There's a PR on that direction to which I should be soon giving attention: #1249
Thing is, The Fuck tries to guess your shell by inspecting its parent process and that information lives in `/proc`. So, if your user can't access `/proc`, you must specify...
Added a section to troubleshooting: https://github.com/nvbn/thefuck/wiki/Troubleshooting#usage-on-android-or-other-systems-that-forbid-access-to-proc