docker-distribution/vendor/github.com/inconshreveable/mousetrap
Sebastiaan van Stijn b1285c33a8
go.mod: github.com/spf13/cobra v1.6.1
We were using v1.0.0 of Cobra as newer versions added spf13/viper as dependency,
which came with many indirect dependencies. Cobra v1.6.0 and up no longer depend
on viper, so we can now safely upgrade to the latest version.

full diff: https://github.com/spf13/cobra/compare/v1.0.0...v1.6.1

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
2022-11-02 19:48:45 +01:00
..
LICENSE go.mod: github.com/spf13/cobra v1.6.1 2022-11-02 19:48:45 +01:00
README.md Update vendor directory to match expectation of vndr tool 2017-04-10 12:07:32 -07:00
trap_others.go Move to vendor 2016-03-22 10:45:49 -07:00
trap_windows.go Move to vendor 2016-03-22 10:45:49 -07:00
trap_windows_1.4.go Move to vendor 2016-03-22 10:45:49 -07:00

README.md

mousetrap

mousetrap is a tiny library that answers a single question.

On a Windows machine, was the process invoked by someone double clicking on the executable file while browsing in explorer?

Motivation

Windows developers unfamiliar with command line tools will often "double-click" the executable for a tool. Because most CLI tools print the help and then exit when invoked without arguments, this is often very frustrating for those users.

mousetrap provides a way to detect these invocations so that you can provide more helpful behavior and instructions on how to run the CLI tool. To see what this looks like, both from an organizational and a technical perspective, see https://inconshreveable.com/09-09-2014/sweat-the-small-stuff/

The interface

The library exposes a single interface:

func StartedByExplorer() (bool)