# 2. Defs ## pyOpenRPA.Agent.__Agent__ **Functions:** | `OSCMD`(inCMDStr[, inRunAsyncBool, …]) | Execute CMD on the Agent daemonic process | | `OSFileBinaryDataBase64StrCreate`(…[, …]) | Create binary file by the base64 string (safe for JSON transmition) | | `ProcessWOExeUpperUserListGet`() | Return the process list only for the current user (where Agent is running) without .EXE in upper case. | ### pyOpenRPA.Agent.__Agent__.OSCMD(inCMDStr, inRunAsyncBool=True, inGSettings=None, inSendOutputToOrchestratorLogsBool=True, inCMDEncodingStr='cp1251') Execute CMD on the Agent daemonic process * **Parameters** * **inCMDStr** – command to execute on the Agent session * **inRunAsyncBool** – True - Agent processor don’t wait execution; False - Agent processor wait cmd execution * **inGSettings** – Agent global settings dict * **inSendOutputToOrchestratorLogsBool** – True - catch cmd execution output and send it to the Orchestrator logs; Flase - else case; Default True * **inCMDEncodingStr** – Set the encoding of the DOS window on the Agent server session. Windows is beautiful :) . Default is “cp1251” early was “cp866” - need test * **Returns** ### pyOpenRPA.Agent.__Agent__.OSFileBinaryDataBase64StrCreate(inFilePathStr, inFileDataBase64Str, inGSettings=None) Create binary file by the base64 string (safe for JSON transmition) ### pyOpenRPA.Agent.__Agent__.ProcessWOExeUpperUserListGet() Return the process list only for the current user (where Agent is running) without .EXE in upper case. Can use in ActivityItem from Orchestrator to Agent * **Parameters** **inProcessNameWOExeList** – * **Returns** list of the agent user process in upper case without .EXE. Example [“NOTEPAD”,”…”], ## References [reStructuredText](http://docutils.sourceforge.net/rst.html)