zoukankan      html  css  js  c++  java
  • ruby当中的字符串处理%Q, %q, %W, %w, %x, %r, %s 的用法

    %Q

    This is an alternative for double-quoted strings, when you have more quote characters in a string.Instead of putting backslashes in front of them, you can easily write:
    >> %Q(Joe said: "Frank said: "#{what_frank_said}"")
    => "Joe said: "Frank said: "Hello!"""

    The parenthesis “()” can be replaced with any other non-alphanumeric characters and non-printing characters (pairs), so the following commands are equivalent:
    >> %Q!Joe said: "Frank said: "#{what_frank_said}""!
    >> %Q[Joe said: "Frank said: "#{what_frank_said}""]
    >> %Q+Joe said: "Frank said: "#{what_frank_said}""+

    You can use also:
    >> %/Joe said: "Frank said: "#{what_frank_said}""/
    => "Joe said: "Frank said: "Hello!"""

    %q

    Used for single-quoted strings.The syntax is similar to %Q, but single-quoted strings are not subject to expression substitution or escape sequences.
    >> %q(Joe said: 'Frank said: '#{what_frank_said} ' ')
    => "Joe said: 'Frank said: '#{what_frank_said} ' '"

    字符串的切分,将已有的字符串切分为多个数组

    %W

    Used for double-quoted array elements.The syntax is similar to %Q
    >> %W(#{foo} Bar Bar with space)
    => ["Foo", "Bar", "Bar with space"]

    %w

    Used for single-quoted array elements.The syntax is similar to %Q, but single-quoted elements are not subject to expression substitution or escape sequences.
    >> %w(#{foo} Bar Bar with space)
    => ["#{foo}", "Bar", "Bar with space"]

    %x

    Uses the ` method and returns the standard output of running the command in a subshell.The syntax is similar to %Q.
    >> %x(echo foo:#{foo})
    => "foo:Foo "

    %r

    Used for regular expressions.The syntax is similar to %Q.
    >> %r(/home/#{foo})
    => "/\/home\/Foo/"

    %s

    Used for symbols.It’s not subject to expression substitution or escape sequences.
    >> %s(foo)
    => :foo
    >> %s(foo bar)
    => :"foo bar"
    >> %s(#{foo} bar)
    => :"#{foo} bar"

  • 相关阅读:
    被动信息收集-dns
    Tcpdump
    Netcat-NC 工具的使用
    无线攻击
    无线渗透实操 aircrack-ng suite
    无线渗透技术概念
    sudo提权复现(CVE-2019-14187)
    Django学习小记-ORM操作概要1
    Django学习小记-cookie的使用(判断是否已登陆)
    Plan 4 Local VRF with NAT
  • 原文地址:https://www.cnblogs.com/aguai1992/p/4895827.html
Copyright © 2011-2022 走看看