blob: 59ee13f63ddd053afc5617e66423e445f733756c [file] [log] [blame]
Georg Brandl116aa622007-08-15 14:28:22 +00001:mod:`subprocess` --- Subprocess management
2===========================================
3
4.. module:: subprocess
5 :synopsis: Subprocess management.
6.. moduleauthor:: Peter Åstrand <astrand@lysator.liu.se>
7.. sectionauthor:: Peter Åstrand <astrand@lysator.liu.se>
8
9
Georg Brandl116aa622007-08-15 14:28:22 +000010The :mod:`subprocess` module allows you to spawn new processes, connect to their
11input/output/error pipes, and obtain their return codes. This module intends to
12replace several other, older modules and functions, such as::
13
14 os.system
15 os.spawn*
Georg Brandl116aa622007-08-15 14:28:22 +000016
17Information about how the :mod:`subprocess` module can be used to replace these
18modules and functions can be found in the following sections.
19
Benjamin Peterson41181742008-07-02 20:22:54 +000020.. seealso::
21
22 :pep:`324` -- PEP proposing the subprocess module
23
Georg Brandl116aa622007-08-15 14:28:22 +000024
Ezio Melotti402f75d2012-11-08 10:07:10 +020025Using the :mod:`subprocess` Module
26----------------------------------
Georg Brandl116aa622007-08-15 14:28:22 +000027
Nick Coghlanc29248f2011-11-08 20:49:23 +100028The recommended approach to invoking subprocesses is to use the following
29convenience functions for all use cases they can handle. For more advanced
30use cases, the underlying :class:`Popen` interface can be used directly.
31
32
33.. function:: call(args, *, stdin=None, stdout=None, stderr=None, shell=False)
34
35 Run the command described by *args*. Wait for command to complete, then
36 return the :attr:`returncode` attribute.
37
38 The arguments shown above are merely the most common ones, described below
39 in :ref:`frequently-used-arguments` (hence the slightly odd notation in
40 the abbreviated signature). The full function signature is the same as
41 that of the :class:`Popen` constructor - this functions passes all
42 supplied arguments directly through to that interface.
43
44 Examples::
45
46 >>> subprocess.call(["ls", "-l"])
47 0
48
49 >>> subprocess.call("exit 1", shell=True)
50 1
51
52 .. warning::
53
54 Invoking the system shell with ``shell=True`` can be a security hazard
55 if combined with untrusted input. See the warning under
56 :ref:`frequently-used-arguments` for details.
57
58 .. note::
59
60 Do not use ``stdout=PIPE`` or ``stderr=PIPE`` with this function. As
61 the pipes are not being read in the current process, the child
62 process may block if it generates enough output to a pipe to fill up
63 the OS pipe buffer.
64
65
66.. function:: check_call(args, *, stdin=None, stdout=None, stderr=None, shell=False)
67
68 Run command with arguments. Wait for command to complete. If the return
69 code was zero then return, otherwise raise :exc:`CalledProcessError`. The
70 :exc:`CalledProcessError` object will have the return code in the
71 :attr:`returncode` attribute.
72
73 The arguments shown above are merely the most common ones, described below
74 in :ref:`frequently-used-arguments` (hence the slightly odd notation in
75 the abbreviated signature). The full function signature is the same as
76 that of the :class:`Popen` constructor - this functions passes all
77 supplied arguments directly through to that interface.
78
79 Examples::
80
81 >>> subprocess.check_call(["ls", "-l"])
82 0
83
84 >>> subprocess.check_call("exit 1", shell=True)
85 Traceback (most recent call last):
86 ...
87 subprocess.CalledProcessError: Command 'exit 1' returned non-zero exit status 1
88
89 .. versionadded:: 2.5
90
91 .. warning::
92
93 Invoking the system shell with ``shell=True`` can be a security hazard
94 if combined with untrusted input. See the warning under
95 :ref:`frequently-used-arguments` for details.
96
97 .. note::
98
99 Do not use ``stdout=PIPE`` or ``stderr=PIPE`` with this function. As
100 the pipes are not being read in the current process, the child
101 process may block if it generates enough output to a pipe to fill up
102 the OS pipe buffer.
103
104
105.. function:: check_output(args, *, stdin=None, stderr=None, shell=False, universal_newlines=False)
106
107 Run command with arguments and return its output as a byte string.
108
109 If the return code was non-zero it raises a :exc:`CalledProcessError`. The
110 :exc:`CalledProcessError` object will have the return code in the
111 :attr:`returncode` attribute and any output in the :attr:`output`
112 attribute.
113
114 The arguments shown above are merely the most common ones, described below
115 in :ref:`frequently-used-arguments` (hence the slightly odd notation in
116 the abbreviated signature). The full function signature is largely the
117 same as that of the :class:`Popen` constructor, except that *stdout* is
118 not permitted as it is used internally. All other supplied arguments are
119 passed directly through to the :class:`Popen` constructor.
120
121 Examples::
122
123 >>> subprocess.check_output(["echo", "Hello World!"])
124 b'Hello World!\n'
125
126 >>> subprocess.check_output(["echo", "Hello World!"], universal_newlines=True)
127 'Hello World!\n'
128
129 >>> subprocess.check_output("exit 1", shell=True)
130 Traceback (most recent call last):
131 ...
132 subprocess.CalledProcessError: Command 'exit 1' returned non-zero exit status 1
133
134 By default, this function will return the data as encoded bytes. The actual
135 encoding of the output data may depend on the command being invoked, so the
136 decoding to text will often need to be handled at the application level.
137
138 This behaviour may be overridden by setting *universal_newlines* to
Andrew Svetlov50be4522012-08-13 22:09:04 +0300139 ``True`` as described below in :ref:`frequently-used-arguments`.
Nick Coghlanc29248f2011-11-08 20:49:23 +1000140
141 To also capture standard error in the result, use
142 ``stderr=subprocess.STDOUT``::
143
144 >>> subprocess.check_output(
145 ... "ls non_existent_file; exit 0",
146 ... stderr=subprocess.STDOUT,
147 ... shell=True)
148 'ls: non_existent_file: No such file or directory\n'
149
150 .. versionadded:: 2.7
151
152 .. warning::
153
154 Invoking the system shell with ``shell=True`` can be a security hazard
155 if combined with untrusted input. See the warning under
156 :ref:`frequently-used-arguments` for details.
157
158 .. note::
159
160 Do not use ``stderr=PIPE`` with this function. As the pipe is not being
161 read in the current process, the child process may block if it
162 generates enough output to the pipe to fill up the OS pipe buffer.
163
164
165.. data:: PIPE
166
167 Special value that can be used as the *stdin*, *stdout* or *stderr* argument
168 to :class:`Popen` and indicates that a pipe to the standard stream should be
169 opened.
170
171
172.. data:: STDOUT
173
174 Special value that can be used as the *stderr* argument to :class:`Popen` and
175 indicates that standard error should go into the same handle as standard
176 output.
177
178
Andrew Svetloveec64202012-08-09 15:20:45 +0300179.. exception:: CalledProcessError
180
181 Exception raised when a process run by :func:`check_call` or
182 :func:`check_output` returns a non-zero exit status.
183
184 .. attribute:: returncode
185
186 Exit status of the child process.
187
188 .. attribute:: cmd
189
190 Command that was used to spawn the child process.
191
192 .. attribute:: output
193
194 Output of the child process if this exception is raised by
195 :func:`check_output`. Otherwise, ``None``.
196
197
198
Nick Coghlanc29248f2011-11-08 20:49:23 +1000199.. _frequently-used-arguments:
200
201Frequently Used Arguments
202^^^^^^^^^^^^^^^^^^^^^^^^^
203
204To support a wide variety of use cases, the :class:`Popen` constructor (and
205the convenience functions) accept a large number of optional arguments. For
206most typical use cases, many of these arguments can be safely left at their
207default values. The arguments that are most commonly needed are:
208
209 *args* is required for all calls and should be a string, or a sequence of
210 program arguments. Providing a sequence of arguments is generally
211 preferred, as it allows the module to take care of any required escaping
212 and quoting of arguments (e.g. to permit spaces in file names). If passing
213 a single string, either *shell* must be :const:`True` (see below) or else
214 the string must simply name the program to be executed without specifying
215 any arguments.
216
217 *stdin*, *stdout* and *stderr* specify the executed program's standard input,
218 standard output and standard error file handles, respectively. Valid values
219 are :data:`PIPE`, an existing file descriptor (a positive integer), an
220 existing file object, and ``None``. :data:`PIPE` indicates that a new pipe
221 to the child should be created. With the default settings of ``None``, no
222 redirection will occur; the child's file handles will be inherited from the
223 parent. Additionally, *stderr* can be :data:`STDOUT`, which indicates that
224 the stderr data from the child process should be captured into the same file
225 handle as for stdout.
226
R David Murray1b00f252012-08-15 10:43:58 -0400227 .. index::
228 single: universal newlines; subprocess module
229
Andrew Svetlov50be4522012-08-13 22:09:04 +0300230 If *universal_newlines* is ``True``, the file objects *stdin*, *stdout*
R David Murray1b00f252012-08-15 10:43:58 -0400231 and *stderr* will be opened as text streams in :term:`universal newlines`
232 mode using the encoding returned by :func:`locale.getpreferredencoding`.
Andrew Svetlov50be4522012-08-13 22:09:04 +0300233 For *stdin*, line ending characters ``'\n'`` in the input will be converted
234 to the default line separator :data:`os.linesep`. For *stdout* and
235 *stderr*, all line endings in the output will be converted to ``'\n'``.
236 For more information see the documentation of the :class:`io.TextIOWrapper`
237 class when the *newline* argument to its constructor is ``None``.
Nick Coghlanc29248f2011-11-08 20:49:23 +1000238
Andrew Svetlov50be4522012-08-13 22:09:04 +0300239 .. note::
240
Gregory P. Smith1f8a40b2013-03-20 18:32:03 -0700241 The newlines attribute of the file objects :attr:`Popen.stdin`,
242 :attr:`Popen.stdout` and :attr:`Popen.stderr` are not updated by
243 the :meth:`Popen.communicate` method.
Andrew Svetlov50be4522012-08-13 22:09:04 +0300244
245 If *shell* is ``True``, the specified command will be executed through
Ezio Melotti186d5232012-09-15 08:34:08 +0300246 the shell. This can be useful if you are using Python primarily for the
Nick Coghlanc29248f2011-11-08 20:49:23 +1000247 enhanced control flow it offers over most system shells and still want
Ezio Melotti186d5232012-09-15 08:34:08 +0300248 convenient access to other shell features such as shell pipes, filename
249 wildcards, environment variable expansion, and expansion of ``~`` to a
250 user's home directory. However, note that Python itself offers
251 implementations of many shell-like features (in particular, :mod:`glob`,
252 :mod:`fnmatch`, :func:`os.walk`, :func:`os.path.expandvars`,
253 :func:`os.path.expanduser`, and :mod:`shutil`).
Nick Coghlanc29248f2011-11-08 20:49:23 +1000254
255 .. warning::
256
257 Executing shell commands that incorporate unsanitized input from an
258 untrusted source makes a program vulnerable to `shell injection
259 <http://en.wikipedia.org/wiki/Shell_injection#Shell_injection>`_,
260 a serious security flaw which can result in arbitrary command execution.
Chris Jerdonekcc32a682012-10-10 22:52:22 -0700261 For this reason, the use of ``shell=True`` is **strongly discouraged**
262 in cases where the command string is constructed from external input::
Nick Coghlanc29248f2011-11-08 20:49:23 +1000263
264 >>> from subprocess import call
265 >>> filename = input("What file would you like to display?\n")
266 What file would you like to display?
267 non_existent; rm -rf / #
268 >>> call("cat " + filename, shell=True) # Uh-oh. This will end badly...
269
270 ``shell=False`` disables all shell based features, but does not suffer
271 from this vulnerability; see the Note in the :class:`Popen` constructor
272 documentation for helpful hints in getting ``shell=False`` to work.
273
274These options, along with all of the other options, are described in more
275detail in the :class:`Popen` constructor documentation.
276
277
Sandro Tosi1526ad12011-12-25 11:27:37 +0100278Popen Constructor
Sandro Tosi3e6c8142011-12-25 17:14:11 +0100279^^^^^^^^^^^^^^^^^
Nick Coghlanc29248f2011-11-08 20:49:23 +1000280
281The underlying process creation and management in this module is handled by
282the :class:`Popen` class. It offers a lot of flexibility so that developers
283are able to handle the less common cases not covered by the convenience
284functions.
Georg Brandl116aa622007-08-15 14:28:22 +0000285
286
Gregory P. Smitha1ed5392013-03-23 11:44:25 -0700287.. class:: Popen(args, bufsize=-1, executable=None, stdin=None, stdout=None, \
Chris Jerdonek4a4a02b2012-10-10 17:46:18 -0700288 stderr=None, preexec_fn=None, close_fds=True, shell=False, \
289 cwd=None, env=None, universal_newlines=False, \
290 startupinfo=None, creationflags=0, restore_signals=True, \
291 start_new_session=False, pass_fds=())
Georg Brandl116aa622007-08-15 14:28:22 +0000292
Chris Jerdonek4a4a02b2012-10-10 17:46:18 -0700293 Execute a child program in a new process. On Unix, the class uses
294 :meth:`os.execvp`-like behavior to execute the child program. On Windows,
295 the class uses the Windows ``CreateProcess()`` function. The arguments to
296 :class:`Popen` are as follows.
Georg Brandl116aa622007-08-15 14:28:22 +0000297
Chris Jerdonek470ee392012-10-08 23:06:57 -0700298 *args* should be a sequence of program arguments or else a single string.
299 By default, the program to execute is the first item in *args* if *args* is
Chris Jerdonek4a4a02b2012-10-10 17:46:18 -0700300 a sequence. If *args* is a string, the interpretation is
301 platform-dependent and described below. See the *shell* and *executable*
302 arguments for additional differences from the default behavior. Unless
303 otherwise stated, it is recommended to pass *args* as a sequence.
Georg Brandl116aa622007-08-15 14:28:22 +0000304
Chris Jerdonek4a4a02b2012-10-10 17:46:18 -0700305 On Unix, if *args* is a string, the string is interpreted as the name or
306 path of the program to execute. However, this can only be done if not
307 passing arguments to the program.
Georg Brandl116aa622007-08-15 14:28:22 +0000308
R. David Murray5973e4d2010-02-04 16:41:57 +0000309 .. note::
310
311 :meth:`shlex.split` can be useful when determining the correct
312 tokenization for *args*, especially in complex cases::
313
314 >>> import shlex, subprocess
R. David Murray73bc75b2010-02-05 16:25:12 +0000315 >>> command_line = input()
R. David Murray5973e4d2010-02-04 16:41:57 +0000316 /bin/vikings -input eggs.txt -output "spam spam.txt" -cmd "echo '$MONEY'"
317 >>> args = shlex.split(command_line)
318 >>> print(args)
319 ['/bin/vikings', '-input', 'eggs.txt', '-output', 'spam spam.txt', '-cmd', "echo '$MONEY'"]
320 >>> p = subprocess.Popen(args) # Success!
321
322 Note in particular that options (such as *-input*) and arguments (such
323 as *eggs.txt*) that are separated by whitespace in the shell go in separate
324 list elements, while arguments that need quoting or backslash escaping when
325 used in the shell (such as filenames containing spaces or the *echo* command
326 shown above) are single list elements.
327
Chris Jerdonek4a4a02b2012-10-10 17:46:18 -0700328 On Windows, if *args* is a sequence, it will be converted to a string in a
329 manner described in :ref:`converting-argument-sequence`. This is because
330 the underlying ``CreateProcess()`` operates on strings.
Chris Jerdonek470ee392012-10-08 23:06:57 -0700331
332 The *shell* argument (which defaults to *False*) specifies whether to use
Chris Jerdonek4a4a02b2012-10-10 17:46:18 -0700333 the shell as the program to execute. If *shell* is *True*, it is
334 recommended to pass *args* as a string rather than as a sequence.
Chris Jerdonek470ee392012-10-08 23:06:57 -0700335
336 On Unix with ``shell=True``, the shell defaults to :file:`/bin/sh`. If
337 *args* is a string, the string specifies the command
338 to execute through the shell. This means that the string must be
R. David Murray5973e4d2010-02-04 16:41:57 +0000339 formatted exactly as it would be when typed at the shell prompt. This
340 includes, for example, quoting or backslash escaping filenames with spaces in
341 them. If *args* is a sequence, the first item specifies the command string, and
342 any additional items will be treated as additional arguments to the shell
Chris Jerdonek470ee392012-10-08 23:06:57 -0700343 itself. That is to say, :class:`Popen` does the equivalent of::
R. David Murray5973e4d2010-02-04 16:41:57 +0000344
345 Popen(['/bin/sh', '-c', args[0], args[1], ...])
Georg Brandl116aa622007-08-15 14:28:22 +0000346
Chris Jerdonek470ee392012-10-08 23:06:57 -0700347 On Windows with ``shell=True``, the :envvar:`COMSPEC` environment variable
348 specifies the default shell. The only time you need to specify
349 ``shell=True`` on Windows is when the command you wish to execute is built
350 into the shell (e.g. :command:`dir` or :command:`copy`). You do not need
351 ``shell=True`` to run a batch file or console-based executable.
Georg Brandl116aa622007-08-15 14:28:22 +0000352
Chris Jerdonekcc32a682012-10-10 22:52:22 -0700353 .. warning::
354
355 Passing ``shell=True`` can be a security hazard if combined with
356 untrusted input. See the warning under :ref:`frequently-used-arguments`
357 for details.
358
Gregory P. Smitha1ed5392013-03-23 11:44:25 -0700359 *bufsize* will be supplied as the corresponding argument to the :meth:`io.open`
360 function when creating the stdin/stdout/stderr pipe file objects:
361 :const:`0` means unbuffered (read and write are one system call and can return short),
362 :const:`1` means line buffered, any other positive value means use a buffer of
363 approximately that size. A negative bufsize (the default) means
364 the system default of io.DEFAULT_BUFFER_SIZE will be used.
Georg Brandl116aa622007-08-15 14:28:22 +0000365
Gregory P. Smitha1ed5392013-03-23 11:44:25 -0700366 .. versionchanged:: 3.2.4
Antoine Pitrou4b876202010-06-02 17:10:49 +0000367
Gregory P. Smitha1ed5392013-03-23 11:44:25 -0700368 *bufsize* now defaults to -1 to enable buffering by default to match the
369 behavior that most code expects. In 3.2.0 through 3.2.3 it incorrectly
370 defaulted to :const:`0` which was unbuffered and allowed short reads.
371 This was unintentional and did not match the behavior of Python 2 as
372 most code expected.
Antoine Pitrou4b876202010-06-02 17:10:49 +0000373
Chris Jerdonek470ee392012-10-08 23:06:57 -0700374 The *executable* argument specifies a replacement program to execute. It
375 is very seldom needed. When ``shell=False``, *executable* replaces the
Chris Jerdonek4a4a02b2012-10-10 17:46:18 -0700376 program to execute specified by *args*. However, the original *args* is
377 still passed to the program. Most programs treat the program specified
378 by *args* as the command name, which can then be different from the program
379 actually executed. On Unix, the *args* name
Chris Jerdonek470ee392012-10-08 23:06:57 -0700380 becomes the display name for the executable in utilities such as
381 :program:`ps`. If ``shell=True``, on Unix the *executable* argument
382 specifies a replacement shell for the default :file:`/bin/sh`.
Georg Brandl116aa622007-08-15 14:28:22 +0000383
Nick Coghlanc29248f2011-11-08 20:49:23 +1000384 *stdin*, *stdout* and *stderr* specify the executed program's standard input,
Georg Brandlaf265f42008-12-07 15:06:20 +0000385 standard output and standard error file handles, respectively. Valid values
386 are :data:`PIPE`, an existing file descriptor (a positive integer), an
Antoine Pitrou11cb9612010-09-15 11:11:28 +0000387 existing :term:`file object`, and ``None``. :data:`PIPE` indicates that a
Nick Coghlanc29248f2011-11-08 20:49:23 +1000388 new pipe to the child should be created. With the default settings of
389 ``None``, no redirection will occur; the child's file handles will be
390 inherited from the parent. Additionally, *stderr* can be :data:`STDOUT`,
391 which indicates that the stderr data from the applications should be
392 captured into the same file handle as for stdout.
Georg Brandl116aa622007-08-15 14:28:22 +0000393
394 If *preexec_fn* is set to a callable object, this object will be called in the
Gregory P. Smithfb94c5f2010-03-14 06:49:55 +0000395 child process just before the child is executed.
396 (Unix only)
397
398 .. warning::
399
400 The *preexec_fn* parameter is not safe to use in the presence of threads
401 in your application. The child process could deadlock before exec is
402 called.
403 If you must use it, keep it trivial! Minimize the number of libraries
404 you call into.
405
406 .. note::
407
408 If you need to modify the environment for the child use the *env*
409 parameter rather than doing it in a *preexec_fn*.
410 The *start_new_session* parameter can take the place of a previously
411 common use of *preexec_fn* to call os.setsid() in the child.
Georg Brandl116aa622007-08-15 14:28:22 +0000412
413 If *close_fds* is true, all file descriptors except :const:`0`, :const:`1` and
414 :const:`2` will be closed before the child process is executed. (Unix only).
Gregory P. Smith8edd99d2010-12-14 13:43:30 +0000415 The default varies by platform: Always true on Unix. On Windows it is
416 true when *stdin*/*stdout*/*stderr* are :const:`None`, false otherwise.
Gregory P. Smithd23047b2010-12-04 09:10:44 +0000417 On Windows, if *close_fds* is true then no handles will be inherited by the
Georg Brandl116aa622007-08-15 14:28:22 +0000418 child process. Note that on Windows, you cannot set *close_fds* to true and
419 also redirect the standard handles by setting *stdin*, *stdout* or *stderr*.
420
Gregory P. Smith8edd99d2010-12-14 13:43:30 +0000421 .. versionchanged:: 3.2
422 The default for *close_fds* was changed from :const:`False` to
423 what is described above.
424
425 *pass_fds* is an optional sequence of file descriptors to keep open
426 between the parent and child. Providing any *pass_fds* forces
427 *close_fds* to be :const:`True`. (Unix only)
428
429 .. versionadded:: 3.2
430 The *pass_fds* parameter was added.
Georg Brandl116aa622007-08-15 14:28:22 +0000431
Chris Jerdonekec3ea942012-09-30 00:10:28 -0700432 If *cwd* is not ``None``, the function changes the working directory to
433 *cwd* before executing the child. In particular, the function looks for
434 *executable* (or for the first item in *args*) relative to *cwd* if the
435 executable path is a relative path.
Georg Brandl116aa622007-08-15 14:28:22 +0000436
Gregory P. Smithfb94c5f2010-03-14 06:49:55 +0000437 If *restore_signals* is True (the default) all signals that Python has set to
438 SIG_IGN are restored to SIG_DFL in the child process before the exec.
439 Currently this includes the SIGPIPE, SIGXFZ and SIGXFSZ signals.
440 (Unix only)
441
442 .. versionchanged:: 3.2
443 *restore_signals* was added.
444
445 If *start_new_session* is True the setsid() system call will be made in the
446 child process prior to the execution of the subprocess. (Unix only)
447
448 .. versionchanged:: 3.2
449 *start_new_session* was added.
450
Christian Heimesa342c012008-04-20 21:01:16 +0000451 If *env* is not ``None``, it must be a mapping that defines the environment
Gregory P. Smithfb94c5f2010-03-14 06:49:55 +0000452 variables for the new process; these are used instead of the default
453 behavior of inheriting the current process' environment.
Georg Brandl116aa622007-08-15 14:28:22 +0000454
R. David Murray1055e892009-04-16 18:15:32 +0000455 .. note::
R. David Murrayf4ac1492009-04-15 22:35:15 +0000456
Georg Brandl2708f3a2009-12-20 14:38:23 +0000457 If specified, *env* must provide any variables required for the program to
458 execute. On Windows, in order to run a `side-by-side assembly`_ the
459 specified *env* **must** include a valid :envvar:`SystemRoot`.
R. David Murrayf4ac1492009-04-15 22:35:15 +0000460
R. David Murray1055e892009-04-16 18:15:32 +0000461 .. _side-by-side assembly: http://en.wikipedia.org/wiki/Side-by-Side_Assembly
462
Andrew Svetlov50be4522012-08-13 22:09:04 +0300463 If *universal_newlines* is ``True``, the file objects *stdin*, *stdout*
R David Murray1b00f252012-08-15 10:43:58 -0400464 and *stderr* are opened as text streams in universal newlines mode, as
Andrew Svetlov50be4522012-08-13 22:09:04 +0300465 described above in :ref:`frequently-used-arguments`.
Georg Brandl116aa622007-08-15 14:28:22 +0000466
Brian Curtine6242d72011-04-29 22:17:51 -0500467 If given, *startupinfo* will be a :class:`STARTUPINFO` object, which is
468 passed to the underlying ``CreateProcess`` function.
Brian Curtin30401932011-04-29 22:20:57 -0500469 *creationflags*, if given, can be :data:`CREATE_NEW_CONSOLE` or
470 :data:`CREATE_NEW_PROCESS_GROUP`. (Windows only)
Georg Brandl116aa622007-08-15 14:28:22 +0000471
Gregory P. Smithc9557af2011-05-11 22:18:23 -0700472 Popen objects are supported as context managers via the :keyword:`with` statement:
473 on exit, standard file descriptors are closed, and the process is waited for.
Brian Curtin79cdb662010-12-03 02:46:02 +0000474 ::
475
476 with Popen(["ifconfig"], stdout=PIPE) as proc:
477 log.write(proc.stdout.read())
478
479 .. versionchanged:: 3.2
480 Added context manager support.
481
Georg Brandl116aa622007-08-15 14:28:22 +0000482
Georg Brandl116aa622007-08-15 14:28:22 +0000483Exceptions
484^^^^^^^^^^
485
486Exceptions raised in the child process, before the new program has started to
487execute, will be re-raised in the parent. Additionally, the exception object
488will have one extra attribute called :attr:`child_traceback`, which is a string
Georg Brandl81675612010-08-26 14:30:56 +0000489containing traceback information from the child's point of view.
Georg Brandl116aa622007-08-15 14:28:22 +0000490
491The most common exception raised is :exc:`OSError`. This occurs, for example,
492when trying to execute a non-existent file. Applications should prepare for
493:exc:`OSError` exceptions.
494
495A :exc:`ValueError` will be raised if :class:`Popen` is called with invalid
496arguments.
497
Nick Coghlanc29248f2011-11-08 20:49:23 +1000498:func:`check_call` and :func:`check_output` will raise
499:exc:`CalledProcessError` if the called process returns a non-zero return
500code.
Georg Brandl116aa622007-08-15 14:28:22 +0000501
502
503Security
504^^^^^^^^
505
Nick Coghlanc29248f2011-11-08 20:49:23 +1000506Unlike some other popen functions, this implementation will never call a
507system shell implicitly. This means that all characters, including shell
508metacharacters, can safely be passed to child processes. Obviously, if the
509shell is invoked explicitly, then it is the application's responsibility to
510ensure that all whitespace and metacharacters are quoted appropriately.
Georg Brandl116aa622007-08-15 14:28:22 +0000511
512
513Popen Objects
514-------------
515
516Instances of the :class:`Popen` class have the following methods:
517
518
519.. method:: Popen.poll()
520
Christian Heimes7f044312008-01-06 17:05:40 +0000521 Check if child process has terminated. Set and return :attr:`returncode`
522 attribute.
Georg Brandl116aa622007-08-15 14:28:22 +0000523
524
525.. method:: Popen.wait()
526
Christian Heimes7f044312008-01-06 17:05:40 +0000527 Wait for child process to terminate. Set and return :attr:`returncode`
528 attribute.
Georg Brandl116aa622007-08-15 14:28:22 +0000529
Georg Brandl734e2682008-08-12 08:18:18 +0000530 .. warning::
531
Philip Jenveyb0896842009-12-03 02:29:36 +0000532 This will deadlock when using ``stdout=PIPE`` and/or
533 ``stderr=PIPE`` and the child process generates enough output to
534 a pipe such that it blocks waiting for the OS pipe buffer to
535 accept more data. Use :meth:`communicate` to avoid that.
Georg Brandl734e2682008-08-12 08:18:18 +0000536
Georg Brandl116aa622007-08-15 14:28:22 +0000537
538.. method:: Popen.communicate(input=None)
539
540 Interact with process: Send data to stdin. Read data from stdout and stderr,
Serhiy Storchakab3f194d2013-02-04 16:47:39 +0200541 until end-of-file is reached. Wait for process to terminate. The optional
542 *input* argument should be data to be sent to the child process, or
543 ``None``, if no data should be sent to the child. The type of *input*
544 must be bytes or, if *universal_newlines* was ``True``, a string.
Georg Brandl116aa622007-08-15 14:28:22 +0000545
Georg Brandlaf265f42008-12-07 15:06:20 +0000546 :meth:`communicate` returns a tuple ``(stdoutdata, stderrdata)``.
Georg Brandl116aa622007-08-15 14:28:22 +0000547
Guido van Rossum0d3fb8a2007-11-26 23:23:18 +0000548 Note that if you want to send data to the process's stdin, you need to create
549 the Popen object with ``stdin=PIPE``. Similarly, to get anything other than
550 ``None`` in the result tuple, you need to give ``stdout=PIPE`` and/or
551 ``stderr=PIPE`` too.
552
Christian Heimes7f044312008-01-06 17:05:40 +0000553 .. note::
Georg Brandl116aa622007-08-15 14:28:22 +0000554
Christian Heimes7f044312008-01-06 17:05:40 +0000555 The data read is buffered in memory, so do not use this method if the data
556 size is large or unlimited.
557
Georg Brandl116aa622007-08-15 14:28:22 +0000558
Christian Heimesa342c012008-04-20 21:01:16 +0000559.. method:: Popen.send_signal(signal)
560
561 Sends the signal *signal* to the child.
562
563 .. note::
564
Brian Curtineb24d742010-04-12 17:16:38 +0000565 On Windows, SIGTERM is an alias for :meth:`terminate`. CTRL_C_EVENT and
Senthil Kumaran916bd382010-10-15 12:55:19 +0000566 CTRL_BREAK_EVENT can be sent to processes started with a *creationflags*
Brian Curtineb24d742010-04-12 17:16:38 +0000567 parameter which includes `CREATE_NEW_PROCESS_GROUP`.
Christian Heimesa342c012008-04-20 21:01:16 +0000568
Christian Heimesa342c012008-04-20 21:01:16 +0000569
570.. method:: Popen.terminate()
571
572 Stop the child. On Posix OSs the method sends SIGTERM to the
Georg Brandl60203b42010-10-06 10:11:56 +0000573 child. On Windows the Win32 API function :c:func:`TerminateProcess` is called
Christian Heimesa342c012008-04-20 21:01:16 +0000574 to stop the child.
575
Christian Heimesa342c012008-04-20 21:01:16 +0000576
577.. method:: Popen.kill()
578
579 Kills the child. On Posix OSs the function sends SIGKILL to the child.
580 On Windows :meth:`kill` is an alias for :meth:`terminate`.
581
Christian Heimesa342c012008-04-20 21:01:16 +0000582
Georg Brandl116aa622007-08-15 14:28:22 +0000583The following attributes are also available:
584
Georg Brandl734e2682008-08-12 08:18:18 +0000585.. warning::
586
Ezio Melottiaa935df2012-08-27 10:00:05 +0300587 Use :meth:`~Popen.communicate` rather than :attr:`.stdin.write <Popen.stdin>`,
588 :attr:`.stdout.read <Popen.stdout>` or :attr:`.stderr.read <Popen.stderr>` to avoid
Georg Brandle720c0a2009-04-27 16:20:50 +0000589 deadlocks due to any of the other OS pipe buffers filling up and blocking the
590 child process.
Georg Brandl734e2682008-08-12 08:18:18 +0000591
592
Georg Brandl116aa622007-08-15 14:28:22 +0000593.. attribute:: Popen.stdin
594
Antoine Pitrou11cb9612010-09-15 11:11:28 +0000595 If the *stdin* argument was :data:`PIPE`, this attribute is a :term:`file
596 object` that provides input to the child process. Otherwise, it is ``None``.
Georg Brandl116aa622007-08-15 14:28:22 +0000597
598
599.. attribute:: Popen.stdout
600
Antoine Pitrou11cb9612010-09-15 11:11:28 +0000601 If the *stdout* argument was :data:`PIPE`, this attribute is a :term:`file
602 object` that provides output from the child process. Otherwise, it is ``None``.
Georg Brandl116aa622007-08-15 14:28:22 +0000603
604
605.. attribute:: Popen.stderr
606
Antoine Pitrou11cb9612010-09-15 11:11:28 +0000607 If the *stderr* argument was :data:`PIPE`, this attribute is a :term:`file
608 object` that provides error output from the child process. Otherwise, it is
Georg Brandlaf265f42008-12-07 15:06:20 +0000609 ``None``.
Georg Brandl116aa622007-08-15 14:28:22 +0000610
611
612.. attribute:: Popen.pid
613
614 The process ID of the child process.
615
Georg Brandl58bfdca2010-03-21 09:50:49 +0000616 Note that if you set the *shell* argument to ``True``, this is the process ID
617 of the spawned shell.
618
Georg Brandl116aa622007-08-15 14:28:22 +0000619
620.. attribute:: Popen.returncode
621
Christian Heimes7f044312008-01-06 17:05:40 +0000622 The child return code, set by :meth:`poll` and :meth:`wait` (and indirectly
623 by :meth:`communicate`). A ``None`` value indicates that the process
624 hasn't terminated yet.
Georg Brandl48310cd2009-01-03 21:18:54 +0000625
Christian Heimes7f044312008-01-06 17:05:40 +0000626 A negative value ``-N`` indicates that the child was terminated by signal
627 ``N`` (Unix only).
Georg Brandl116aa622007-08-15 14:28:22 +0000628
629
Brian Curtine6242d72011-04-29 22:17:51 -0500630Windows Popen Helpers
631---------------------
632
633The :class:`STARTUPINFO` class and following constants are only available
634on Windows.
635
636.. class:: STARTUPINFO()
Brian Curtin73365dd2011-04-29 22:18:33 -0500637
Brian Curtine6242d72011-04-29 22:17:51 -0500638 Partial support of the Windows
639 `STARTUPINFO <http://msdn.microsoft.com/en-us/library/ms686331(v=vs.85).aspx>`__
640 structure is used for :class:`Popen` creation.
641
642 .. attribute:: dwFlags
643
Senthil Kumarana6bac952011-07-04 11:28:30 -0700644 A bit field that determines whether certain :class:`STARTUPINFO`
645 attributes are used when the process creates a window. ::
Brian Curtine6242d72011-04-29 22:17:51 -0500646
647 si = subprocess.STARTUPINFO()
648 si.dwFlags = subprocess.STARTF_USESTDHANDLES | subprocess.STARTF_USESHOWWINDOW
649
650 .. attribute:: hStdInput
651
Senthil Kumarana6bac952011-07-04 11:28:30 -0700652 If :attr:`dwFlags` specifies :data:`STARTF_USESTDHANDLES`, this attribute
653 is the standard input handle for the process. If
654 :data:`STARTF_USESTDHANDLES` is not specified, the default for standard
655 input is the keyboard buffer.
Brian Curtine6242d72011-04-29 22:17:51 -0500656
657 .. attribute:: hStdOutput
658
Senthil Kumarana6bac952011-07-04 11:28:30 -0700659 If :attr:`dwFlags` specifies :data:`STARTF_USESTDHANDLES`, this attribute
660 is the standard output handle for the process. Otherwise, this attribute
661 is ignored and the default for standard output is the console window's
Brian Curtine6242d72011-04-29 22:17:51 -0500662 buffer.
663
664 .. attribute:: hStdError
665
Senthil Kumarana6bac952011-07-04 11:28:30 -0700666 If :attr:`dwFlags` specifies :data:`STARTF_USESTDHANDLES`, this attribute
667 is the standard error handle for the process. Otherwise, this attribute is
Brian Curtine6242d72011-04-29 22:17:51 -0500668 ignored and the default for standard error is the console window's buffer.
669
670 .. attribute:: wShowWindow
671
Senthil Kumarana6bac952011-07-04 11:28:30 -0700672 If :attr:`dwFlags` specifies :data:`STARTF_USESHOWWINDOW`, this attribute
Brian Curtine6242d72011-04-29 22:17:51 -0500673 can be any of the values that can be specified in the ``nCmdShow``
674 parameter for the
675 `ShowWindow <http://msdn.microsoft.com/en-us/library/ms633548(v=vs.85).aspx>`__
Senthil Kumarana6bac952011-07-04 11:28:30 -0700676 function, except for ``SW_SHOWDEFAULT``. Otherwise, this attribute is
Brian Curtine6242d72011-04-29 22:17:51 -0500677 ignored.
Brian Curtin73365dd2011-04-29 22:18:33 -0500678
Brian Curtine6242d72011-04-29 22:17:51 -0500679 :data:`SW_HIDE` is provided for this attribute. It is used when
680 :class:`Popen` is called with ``shell=True``.
681
682
683Constants
684^^^^^^^^^
685
686The :mod:`subprocess` module exposes the following constants.
687
688.. data:: STD_INPUT_HANDLE
689
690 The standard input device. Initially, this is the console input buffer,
691 ``CONIN$``.
692
693.. data:: STD_OUTPUT_HANDLE
694
695 The standard output device. Initially, this is the active console screen
696 buffer, ``CONOUT$``.
697
698.. data:: STD_ERROR_HANDLE
699
700 The standard error device. Initially, this is the active console screen
701 buffer, ``CONOUT$``.
702
703.. data:: SW_HIDE
704
705 Hides the window. Another window will be activated.
706
707.. data:: STARTF_USESTDHANDLES
708
709 Specifies that the :attr:`STARTUPINFO.hStdInput`,
Senthil Kumarana6bac952011-07-04 11:28:30 -0700710 :attr:`STARTUPINFO.hStdOutput`, and :attr:`STARTUPINFO.hStdError` attributes
Brian Curtine6242d72011-04-29 22:17:51 -0500711 contain additional information.
712
713.. data:: STARTF_USESHOWWINDOW
714
Senthil Kumarana6bac952011-07-04 11:28:30 -0700715 Specifies that the :attr:`STARTUPINFO.wShowWindow` attribute contains
Brian Curtine6242d72011-04-29 22:17:51 -0500716 additional information.
717
718.. data:: CREATE_NEW_CONSOLE
719
720 The new process has a new console, instead of inheriting its parent's
721 console (the default).
Brian Curtin73365dd2011-04-29 22:18:33 -0500722
Brian Curtine6242d72011-04-29 22:17:51 -0500723 This flag is always set when :class:`Popen` is created with ``shell=True``.
724
Brian Curtin30401932011-04-29 22:20:57 -0500725.. data:: CREATE_NEW_PROCESS_GROUP
726
727 A :class:`Popen` ``creationflags`` parameter to specify that a new process
728 group will be created. This flag is necessary for using :func:`os.kill`
729 on the subprocess.
730
731 This flag is ignored if :data:`CREATE_NEW_CONSOLE` is specified.
732
Brian Curtine6242d72011-04-29 22:17:51 -0500733
Benjamin Petersondcf97b92008-07-02 17:30:14 +0000734.. _subprocess-replacements:
735
Ezio Melotti402f75d2012-11-08 10:07:10 +0200736Replacing Older Functions with the :mod:`subprocess` Module
737-----------------------------------------------------------
Georg Brandl116aa622007-08-15 14:28:22 +0000738
Nick Coghlanc29248f2011-11-08 20:49:23 +1000739In this section, "a becomes b" means that b can be used as a replacement for a.
Georg Brandl116aa622007-08-15 14:28:22 +0000740
741.. note::
742
Nick Coghlanc29248f2011-11-08 20:49:23 +1000743 All "a" functions in this section fail (more or less) silently if the
744 executed program cannot be found; the "b" replacements raise :exc:`OSError`
745 instead.
Georg Brandl116aa622007-08-15 14:28:22 +0000746
Nick Coghlanc29248f2011-11-08 20:49:23 +1000747 In addition, the replacements using :func:`check_output` will fail with a
748 :exc:`CalledProcessError` if the requested operation produces a non-zero
749 return code. The output is still available as the ``output`` attribute of
750 the raised exception.
751
752In the following examples, we assume that the relevant functions have already
Ezio Melotti402f75d2012-11-08 10:07:10 +0200753been imported from the :mod:`subprocess` module.
Georg Brandl116aa622007-08-15 14:28:22 +0000754
755
756Replacing /bin/sh shell backquote
757^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
758
759::
760
761 output=`mycmd myarg`
Nick Coghlanc29248f2011-11-08 20:49:23 +1000762 # becomes
763 output = check_output(["mycmd", "myarg"])
Georg Brandl116aa622007-08-15 14:28:22 +0000764
765
Benjamin Petersonf10a79a2008-10-11 00:49:57 +0000766Replacing shell pipeline
767^^^^^^^^^^^^^^^^^^^^^^^^
Georg Brandl116aa622007-08-15 14:28:22 +0000768
769::
770
771 output=`dmesg | grep hda`
Nick Coghlanc29248f2011-11-08 20:49:23 +1000772 # becomes
Georg Brandl116aa622007-08-15 14:28:22 +0000773 p1 = Popen(["dmesg"], stdout=PIPE)
774 p2 = Popen(["grep", "hda"], stdin=p1.stdout, stdout=PIPE)
Gregory P. Smithe09d2f12011-02-05 21:47:25 +0000775 p1.stdout.close() # Allow p1 to receive a SIGPIPE if p2 exits.
Georg Brandl116aa622007-08-15 14:28:22 +0000776 output = p2.communicate()[0]
777
Gregory P. Smithe09d2f12011-02-05 21:47:25 +0000778The p1.stdout.close() call after starting the p2 is important in order for p1
779to receive a SIGPIPE if p2 exits before p1.
Georg Brandl116aa622007-08-15 14:28:22 +0000780
Nick Coghlanc29248f2011-11-08 20:49:23 +1000781Alternatively, for trusted input, the shell's own pipeline support may still
R David Murray28b8b942012-04-03 08:46:48 -0400782be used directly::
Nick Coghlanc29248f2011-11-08 20:49:23 +1000783
784 output=`dmesg | grep hda`
785 # becomes
786 output=check_output("dmesg | grep hda", shell=True)
787
788
Benjamin Peterson87c8d872009-06-11 22:54:11 +0000789Replacing :func:`os.system`
790^^^^^^^^^^^^^^^^^^^^^^^^^^^
Georg Brandl116aa622007-08-15 14:28:22 +0000791
792::
793
794 sts = os.system("mycmd" + " myarg")
Nick Coghlanc29248f2011-11-08 20:49:23 +1000795 # becomes
796 sts = call("mycmd" + " myarg", shell=True)
Georg Brandl116aa622007-08-15 14:28:22 +0000797
798Notes:
799
800* Calling the program through the shell is usually not required.
801
Georg Brandl116aa622007-08-15 14:28:22 +0000802A more realistic example would look like this::
803
804 try:
805 retcode = call("mycmd" + " myarg", shell=True)
806 if retcode < 0:
Collin Winterc79461b2007-09-01 23:34:30 +0000807 print("Child was terminated by signal", -retcode, file=sys.stderr)
Georg Brandl116aa622007-08-15 14:28:22 +0000808 else:
Collin Winterc79461b2007-09-01 23:34:30 +0000809 print("Child returned", retcode, file=sys.stderr)
Georg Brandl116aa622007-08-15 14:28:22 +0000810 except OSError as e:
Collin Winterc79461b2007-09-01 23:34:30 +0000811 print("Execution failed:", e, file=sys.stderr)
Georg Brandl116aa622007-08-15 14:28:22 +0000812
813
Benjamin Peterson87c8d872009-06-11 22:54:11 +0000814Replacing the :func:`os.spawn <os.spawnl>` family
815^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Georg Brandl116aa622007-08-15 14:28:22 +0000816
817P_NOWAIT example::
818
819 pid = os.spawnlp(os.P_NOWAIT, "/bin/mycmd", "mycmd", "myarg")
820 ==>
821 pid = Popen(["/bin/mycmd", "myarg"]).pid
822
823P_WAIT example::
824
825 retcode = os.spawnlp(os.P_WAIT, "/bin/mycmd", "mycmd", "myarg")
826 ==>
827 retcode = call(["/bin/mycmd", "myarg"])
828
829Vector example::
830
831 os.spawnvp(os.P_NOWAIT, path, args)
832 ==>
833 Popen([path] + args[1:])
834
835Environment example::
836
837 os.spawnlpe(os.P_NOWAIT, "/bin/mycmd", "mycmd", "myarg", env)
838 ==>
839 Popen(["/bin/mycmd", "myarg"], env={"PATH": "/usr/bin"})
840
841
Benjamin Peterson87c8d872009-06-11 22:54:11 +0000842
843Replacing :func:`os.popen`, :func:`os.popen2`, :func:`os.popen3`
844^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Georg Brandl116aa622007-08-15 14:28:22 +0000845
846::
847
Benjamin Peterson87c8d872009-06-11 22:54:11 +0000848 (child_stdin, child_stdout) = os.popen2(cmd, mode, bufsize)
Georg Brandl116aa622007-08-15 14:28:22 +0000849 ==>
Benjamin Peterson87c8d872009-06-11 22:54:11 +0000850 p = Popen(cmd, shell=True, bufsize=bufsize,
851 stdin=PIPE, stdout=PIPE, close_fds=True)
852 (child_stdin, child_stdout) = (p.stdin, p.stdout)
Georg Brandl116aa622007-08-15 14:28:22 +0000853
854::
855
Benjamin Peterson87c8d872009-06-11 22:54:11 +0000856 (child_stdin,
857 child_stdout,
858 child_stderr) = os.popen3(cmd, mode, bufsize)
Georg Brandl116aa622007-08-15 14:28:22 +0000859 ==>
Benjamin Peterson87c8d872009-06-11 22:54:11 +0000860 p = Popen(cmd, shell=True, bufsize=bufsize,
861 stdin=PIPE, stdout=PIPE, stderr=PIPE, close_fds=True)
862 (child_stdin,
863 child_stdout,
864 child_stderr) = (p.stdin, p.stdout, p.stderr)
865
866::
867
868 (child_stdin, child_stdout_and_stderr) = os.popen4(cmd, mode, bufsize)
869 ==>
870 p = Popen(cmd, shell=True, bufsize=bufsize,
871 stdin=PIPE, stdout=PIPE, stderr=STDOUT, close_fds=True)
872 (child_stdin, child_stdout_and_stderr) = (p.stdin, p.stdout)
873
874Return code handling translates as follows::
875
876 pipe = os.popen(cmd, 'w')
877 ...
878 rc = pipe.close()
Stefan Krahfc9e08d2010-07-14 10:16:11 +0000879 if rc is not None and rc >> 8:
Ezio Melotti985e24d2009-09-13 07:54:02 +0000880 print("There were some errors")
Benjamin Peterson87c8d872009-06-11 22:54:11 +0000881 ==>
882 process = Popen(cmd, 'w', stdin=PIPE)
883 ...
884 process.stdin.close()
885 if process.wait() != 0:
Ezio Melotti985e24d2009-09-13 07:54:02 +0000886 print("There were some errors")
Benjamin Peterson87c8d872009-06-11 22:54:11 +0000887
888
889Replacing functions from the :mod:`popen2` module
890^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
891
892.. note::
893
894 If the cmd argument to popen2 functions is a string, the command is executed
895 through /bin/sh. If it is a list, the command is directly executed.
896
897::
898
899 (child_stdout, child_stdin) = popen2.popen2("somestring", bufsize, mode)
900 ==>
901 p = Popen(["somestring"], shell=True, bufsize=bufsize,
902 stdin=PIPE, stdout=PIPE, close_fds=True)
903 (child_stdout, child_stdin) = (p.stdout, p.stdin)
904
905::
906
907 (child_stdout, child_stdin) = popen2.popen2(["mycmd", "myarg"], bufsize, mode)
908 ==>
909 p = Popen(["mycmd", "myarg"], bufsize=bufsize,
910 stdin=PIPE, stdout=PIPE, close_fds=True)
911 (child_stdout, child_stdin) = (p.stdout, p.stdin)
912
913:class:`popen2.Popen3` and :class:`popen2.Popen4` basically work as
914:class:`subprocess.Popen`, except that:
915
916* :class:`Popen` raises an exception if the execution fails.
917
918* the *capturestderr* argument is replaced with the *stderr* argument.
919
920* ``stdin=PIPE`` and ``stdout=PIPE`` must be specified.
921
922* popen2 closes all file descriptors by default, but you have to specify
Gregory P. Smithf5604852010-12-13 06:45:02 +0000923 ``close_fds=True`` with :class:`Popen` to guarantee this behavior on
924 all platforms or past Python versions.
Eli Bendersky046a7642011-04-15 07:23:26 +0300925
Nick Coghlanc29248f2011-11-08 20:49:23 +1000926
Nick Coghlanc29248f2011-11-08 20:49:23 +1000927Legacy Shell Invocation Functions
Nick Coghlan32e4a582011-11-08 21:50:58 +1000928---------------------------------
Nick Coghlanc29248f2011-11-08 20:49:23 +1000929
930This module also provides the following legacy functions from the 2.x
931``commands`` module. These operations implicitly invoke the system shell and
932none of the guarantees described above regarding security and exception
933handling consistency are valid for these functions.
934
935.. function:: getstatusoutput(cmd)
936
937 Return ``(status, output)`` of executing *cmd* in a shell.
938
939 Execute the string *cmd* in a shell with :func:`os.popen` and return a 2-tuple
940 ``(status, output)``. *cmd* is actually run as ``{ cmd ; } 2>&1``, so that the
941 returned output will contain output or error messages. A trailing newline is
942 stripped from the output. The exit status for the command can be interpreted
943 according to the rules for the C function :c:func:`wait`. Example::
944
945 >>> subprocess.getstatusoutput('ls /bin/ls')
946 (0, '/bin/ls')
947 >>> subprocess.getstatusoutput('cat /bin/junk')
948 (256, 'cat: /bin/junk: No such file or directory')
949 >>> subprocess.getstatusoutput('/bin/junk')
950 (256, 'sh: /bin/junk: not found')
951
952 Availability: UNIX.
953
954
955.. function:: getoutput(cmd)
956
957 Return output (stdout and stderr) of executing *cmd* in a shell.
958
959 Like :func:`getstatusoutput`, except the exit status is ignored and the return
960 value is a string containing the command's output. Example::
961
962 >>> subprocess.getoutput('ls /bin/ls')
963 '/bin/ls'
964
965 Availability: UNIX.
966
Nick Coghlan32e4a582011-11-08 21:50:58 +1000967
968Notes
969-----
970
971.. _converting-argument-sequence:
972
973Converting an argument sequence to a string on Windows
974^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
975
976On Windows, an *args* sequence is converted to a string that can be parsed
977using the following rules (which correspond to the rules used by the MS C
978runtime):
979
9801. Arguments are delimited by white space, which is either a
981 space or a tab.
982
9832. A string surrounded by double quotation marks is
984 interpreted as a single argument, regardless of white space
985 contained within. A quoted string can be embedded in an
986 argument.
987
9883. A double quotation mark preceded by a backslash is
989 interpreted as a literal double quotation mark.
990
9914. Backslashes are interpreted literally, unless they
992 immediately precede a double quotation mark.
993
9945. If backslashes immediately precede a double quotation mark,
995 every pair of backslashes is interpreted as a literal
996 backslash. If the number of backslashes is odd, the last
997 backslash escapes the next double quotation mark as
998 described in rule 3.