Server IP : 68.65.120.251 / Your IP : 18.218.8.36 [ Web Server : LiteSpeed System : Linux server105.web-hosting.com 4.18.0-513.18.1.lve.el8.x86_64 #1 SMP Thu Feb 22 12:55:50 UTC 2024 x86_64 User : travtpib ( 6521) PHP Version : 7.4.33 Disable Function : NONE Domains : 1 Domains MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : ON | Sudo : OFF | Pkexec : OFF Directory : /opt/alt/ruby18/share/ri/1.8/system/Open3/ |
Upload File : |
--- !ruby/object:RI::MethodDescription aliases: [] block_params: "" comment: - !ruby/struct:SM::Flow::P body: "Open stdin, stdout, and stderr streams and start external executable. Non-block form:" - !ruby/struct:SM::Flow::VERB body: " require 'open3'\n\n stdin, stdout, stderr = Open3.popen3(cmd)\n" - !ruby/struct:SM::Flow::P body: "Block form:" - !ruby/struct:SM::Flow::VERB body: " require 'open3'\n\n Open3.popen3(cmd) { |stdin, stdout, stderr| ... }\n" - !ruby/struct:SM::Flow::P body: The parameter <tt>cmd</tt> is passed directly to Kernel#exec. - !ruby/struct:SM::Flow::P body: _popen3_ is like <em>system</em> in that you can pass extra parameters, and the strings won't be mangled by shell expansion. - !ruby/struct:SM::Flow::VERB body: " stdin, stdout, stderr = Open3.popen3('identify', '/weird path/with spaces/and "strange" characters.jpg')\n result = stdout.read\n" full_name: Open3#popen3 is_singleton: false name: popen3 params: (*cmd) {|| ...} visibility: public