TimeWarrior : Commandline Time Reporting

Timewarrior is a time tracking utility that offers simple stopwatch features as well as sophisticated calendar-based backfill, along with flexible reporting. It is a portable, well supported and very active Open Source project.

Installing

  • From Package

Thanks to the community, there are binary packages available here.

  • Building Timewarrior

Building Timewarrior yourself requires

git
cmake
make
C++ compiler, currently gcc 4.8.1+ or clang 3.3+ for full C++11 support
Python 3, for running the testsuite

There are two ways to retrieve the Timewarrior sources:

  • Clone the repository from Github, git clone --recurse-submodules https://github.com/GothenburgBitFactory/timewarrior cd timewarrior
  • Or download the tarball with curl, curl -O https://github.com/GothenburgBitFactory/timewarrior/releases/download/v1.4.2/timew-1.4.2.tar.gz and expand the tarball tar xzf timew-1.4.2.tar.gz cd timew-1.4.2

Build Timewarrior, optionally run the test suite (note: the tarball does not contain tests), and install it.

cmake -DCMAKE_BUILD_TYPE=release
make
[make test]
sudo make install

This copies files into the right place (default under /usr/local), and installs man pages.

Add the optional parameter -DCMAKE_INSTALL_PREFIX=/path/to/your/install/location to the cmake command if you want to install Timewarrior at a location other than /usr/local. The make install command may not require sudo depending on your choice of install location.

Documentation

There is extensive online documentation. You’ll find all the details at timewarrior.net/docs/.

There you will find the documentation, downloads, news and more.

R K

Recent Posts

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

5 hours ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

1 week ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 weeks ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

2 weeks ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

2 weeks ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

2 weeks ago