# 2. Defs ## pyOpenRPA.Agent.__Agent__ **Functions:** | `OSCMD`(inCMDStr[, inRunAsyncBool, …]) | Execute CMD on the Agent daemonic process | | `OSFileBinaryDataBase64StrAppend`(…[, …]) | Create binary file by the base64 string (safe for JSON transmition) | | `OSFileBinaryDataBase64StrCreate`(…[, …]) | Create binary file by the base64 string (safe for JSON transmition) | | `OSFileBinaryDataBase64StrReceive`(inFilePathStr) | Read binary file and encode in base64 to transmit (safe for JSON transmition) | | `OSFileTextDataStrCreate`(inFilePathStr, …) | Create text file in the agent GUI session | | `OSFileTextDataStrReceive`(inFilePathStr[, …]) | Read text file in the agent GUI session | | `ProcessWOExeUpperUserListGet`() | Return the process list only for the current user (where Agent is running) without .EXE in upper case. | ### pyOpenRPA.Agent.__Agent__.OSCMD(inCMDStr, inRunAsyncBool=True, inGSettings=None, inSendOutputToOrchestratorLogsBool=True, inCMDEncodingStr='cp1251') Execute CMD on the Agent daemonic process * **Parameters** * **inCMDStr** – command to execute on the Agent session * **inRunAsyncBool** – True - Agent processor don’t wait execution; False - Agent processor wait cmd execution * **inGSettings** – Agent global settings dict * **inSendOutputToOrchestratorLogsBool** – True - catch cmd execution output and send it to the Orchestrator logs; Flase - else case; Default True !ATTENTION! If you need to start absolutely encapsulated app - set this flag as False. If you set True - the app output will come to Agent :param inCMDEncodingStr: Set the encoding of the DOS window on the Agent server session. Windows is beautiful :) . Default is “cp1251” early was “cp866” - need test :return: ### pyOpenRPA.Agent.__Agent__.OSFileBinaryDataBase64StrAppend(inFilePathStr, inFileDataBase64Str, inGSettings=None) Create binary file by the base64 string (safe for JSON transmition) ### pyOpenRPA.Agent.__Agent__.OSFileBinaryDataBase64StrCreate(inFilePathStr, inFileDataBase64Str, inGSettings=None) Create binary file by the base64 string (safe for JSON transmition) ### pyOpenRPA.Agent.__Agent__.OSFileBinaryDataBase64StrReceive(inFilePathStr, inGSettings=None) Read binary file and encode in base64 to transmit (safe for JSON transmition) * **Parameters** * **inFilePathStr** – File path to read * **inGSettings** – global settings of the Agent (singleton) * **Returns** File content in string base64 format (use base64.b64decode to decode data). Return None if file is not exist ### pyOpenRPA.Agent.__Agent__.OSFileTextDataStrCreate(inFilePathStr, inFileDataStr, inEncodingStr='utf-8', inGSettings=None) Create text file in the agent GUI session * **Parameters** * **inFilePathStr** – File abs path * **inFileDataStr** – File data text content * **inEncodingStr** – Write file encoding * **inGSettings** – global settings of the Agent (singleton) * **Returns** ### pyOpenRPA.Agent.__Agent__.OSFileTextDataStrReceive(inFilePathStr, inEncodingStr='utf-8', inGSettings=None) Read text file in the agent GUI session * **Parameters** * **inFilePathStr** – File abs path * **inEncodingStr** – Read file encoding. Default utf-8 * **inGSettings** – global settings of the Agent (singleton) * **Returns** File text content in string format (use base64.b64decode to decode data). Return None if file is not exist ### pyOpenRPA.Agent.__Agent__.ProcessWOExeUpperUserListGet() Return the process list only for the current user (where Agent is running) without .EXE in upper case. Can use in ActivityItem from Orchestrator to Agent * **Parameters** **inProcessNameWOExeList** – * **Returns** list of the agent user process in upper case without .EXE. Example [“NOTEPAD”,”…”], ## References [reStructuredText](http://docutils.sourceforge.net/rst.html)