Unsterwerx

search

Performs full-text search across canonical document content using SQLite FTS5, with optional metadata filters over authors, origin software, file type, and created/modified date windows. When you omit the text query and provide only filters, search runs in metadata-only mode.

Usage

bash
unsterwerx search [OPTIONS] [QUERY]

Arguments

ArgumentRequiredDescription
QUERYNoSearch query string; required only when no metadata filters are provided

Options

OptionShortTypeDefaultDescription
--limit-linteger20Maximum number of results to return
--authorstring, repeatableFilter by canonicalized document_author
--origin-softwarestring, repeatableFilter by canonicalized origin_software_name
--file-typestring, repeatableRestrict results to these file types
--created-fromdate/datetimeInclusive lower bound for document_created_at
--created-todate/datetimeInclusive upper bound for document_created_at
--modified-fromdate/datetimeInclusive lower bound for document_modified_at
--modified-todate/datetimeInclusive upper bound for document_modified_at

Examples

bash
unsterwerx search "cybersecurity"
Search Results (20 matches)
══════════════════════════════════════════════════════════════
  1. Cybersecurity and Risk Management Framework [b8e01573]
     Acquisition Cybersecurity Training  February 18, 2016
     DOD Cybersecurity and the Risk Management Framework (RMF)
     Process for the Acquisition Community...

  2. DoD Program Manager's Guidebook, Cybersecurity RMF [bd51b3ed]
     Department of Defense DoD Program Manager's Guidebook for
     Integrating the Cybersecurity Risk Management Framework...

  3. NBIS PPP Version 1.5 [afb068e7]
     Cybersecurity Strategy  UNCLASSIFIED  National Background
     Investigation System...
══════════════════════════════════════════════════════════════

Limit results

bash
unsterwerx search "policy" --limit 5
Search Results (5 matches)
══════════════════════════════════════════════════════════════
  1. Homeowners Policy Packet [d3d2da43]
     HOMEOWNERS POLICY PACKET  IMPORTANT MESSAGES  Refer to
     your Declarations Page and endorsements...

  2. DODI Standards [455d5bb1]
     Establishing Policy in DoDIs For DoDIs that establish
     policy, the section may need to be longer...
══════════════════════════════════════════════════════════════
bash
unsterwerx search \
    --origin-software "Microsoft Office Word" \
    --file-type docx
text
Search Results (6 matches)
══════════════════════════════════════════════════════════════
  1. Acquisition-Plan.docx [570c62fd]
       · origin_software_name = microsoft office word

  2. PM-Guidebook.docx [8e62a1fb]
       · origin_software_name = microsoft office word
══════════════════════════════════════════════════════════════

Combined text + metadata filters

bash
unsterwerx search "cybersecurity" \
    --author "Department of Defense CIO" \
    --created-from 2017-12-01 \
    --created-to 2017-12-31

Notes