in reply to VMS: Pipe to process

I know nothing about VMS, but...:
open OUTFILE, ' | TYPE SYS$INPUT /OUTPUT=FILE.TMP' ^
You need to remove the errant space (see the ^ above) for perl's open() to interpret this as a pipe open, rather than a file name.

Or maybe it was just a cut-n-paste error ?

Replies are listed 'Best First'.
(bbfu)(solution)Re: Re: VMS: Pipe to process
by bbfu (Curate) on Feb 03, 2001 at 04:21 UTC

    Okay! That works perfectly! I swear that somewhere I remember reading that Perl would allow leading space and that it was actually a good idea to put it in there (something about preventing some abuse from input strings??). I'll remember that it's not.

    Well, now I feel silly. Such a simple thing, I should've tried that before posting! :-) Thanks a million, kschwab!

    bbfu
    Seasons don't fear The Reaper.
    Nor do the wind, the sun, and the rain.
    We can be like they are.

      It's generally a good idea to put a leading space before the actual name of the file/command, not before any control characters that determine how the filehandle should be opened. Consider:
      # this is pseudo-code $filename = '>test' or '+test' open(HANDLE, ">$filename"); # >>test or >+test (ruh-roh!) # likewise $filename = 'ls|' or '>test; open(HANDLE, "$filename"); # ls| (pipe) or clobbers 'test' # generally safe (in that behavior is not unexpected): open(PIPE, " $command |") open(PIPE, "| $command\0"); # safe version of "|ls" open(FILE, "> $filename\0"); # ">file" open(FILE, " $filename\0"); # "file"
      In the last case, the presence of a space doesn't affect what is open, but since the first character is a space, any leading "mode" characters in $filename will be ignored, much like what was happening with your code.

      Also see sysopen and perlipc (e.g., using fork/exec), which (in my opinion) are significantly more readable/safer than using weird manglings of open. Note that issues of shell meta-characters and other security considerations are out of the scope of this message. Each of the "PIPE" examples above are still incredibly insecure if untrusted input is allowed to use any shell metacharacters in the string. See perlsec and use Taint-checking.

        Okay, thanks for the info! I think I understand how it works now. =)

        As for, fork()... I tried it and it's not supported in VMS. I think I'm really going to want a bi-directional pipe at some point but without fork() I think I'm gonna be SOL. =(

        Again, thanks much for explaining it to me! I couldn't remember where I'd heard that to look it up and perlipc didn't have that info (that I saw).

        bbfu
        Seasons don't fear The Reaper.
        Nor do the wind, the sun, and the rain.
        We can be like they are.