Reading a file into an array using Bash
This article shows some ways to read lines from a file and load them into an array using Bash.
First, we'll look at the readarray method. Afterwards, we'll look at a more general method for reading files into Bash arrays.
Read a file into an array using Bash using the readarray method
readarray is a function that comes with Bash 4.0. This method works with all Bash versions higher than 4.0.
If you want to see which version of Bash you are currently running, you can use the following command:
echo ${Bash_VERSION}
If your Bash version is lower than 4.0, you can skip to the next method since readarray won't work for you.
We will use a file called numbers.txt for all examples with the following content.
numbers.txt file:
1 1
2 1
3 1
4 1
5 1
6 1
7 1
8 1
9 1
10 1
The syntax for reading this file and saving its contents into an array is as follows:
readarray -t Arr < numbers.txt
Breaking down the syntax, we have readarray as the name of the command, -t will remove newlines, and Arr is the name of the array into which the file contents will be written. numbers.txt is the name of the file we want to read.
请注意
, if the file you want to read is not in the same folder as your script, you should provide the full path to the file.
The contents of this array can be read, as shown in the following example:
echo ${Arr[1]}
The above code will output the line in array index 1, which is the second line of the file.
The output is:
2 1
To print out an entire array, use the following syntax:
echo ${Arr[@]}
The output of this will be:
1 1 2 1 3 1 4 1 5 1 6 1 7 1 8 1 9 1 10 1
Reading a file into an array using a generic method using Bash
The syntax of the general method is as follows:
IFS=$'\r\n' GLOBIGNORE='*' command eval 'ArrName=($(cat filename))'
Reading this array would have similar syntax as shown in the previous example:
echo ${ArrName[1]}
The Bash line above will display the contents of array index 1. However, if we want to display the contents of the entire array, we can use:
echo ${ArrName[@]}
General Method Description
ArrName in the general syntax is the name of the array, and the filename after cat is the file name to be read. We will modify these two variables for our custom use.
IFS
Defines the break characters, in this case \r and \n . \r is a carriage return character and \n is a line feed character.
On most modern systems you'll see \n used as a newline character.
GLOBIGNORE='*'
is set to be safe to avoid weird edge cases with file names. It should be noted that due to the use of GLOBIGNORE, this command requires Bash (and may not necessarily work with other shells such as zsh or fish).
Another important point to note is that this solution is much slower than readarray . The only reason to use it is if your version of Bash is older than 4.0.
For reprinting, please send an email to 1244347461@qq.com for approval. After obtaining the author's consent, kindly include the source as a link.
Related Articles
How to decompress x.tar.xz format files under Linux
Publish Date:2025/04/08 Views:186 Category:OPERATING SYSTEM
-
A lot of software found today is in the tar.xz format, which is a lossless data compression file format that uses the LZMA compression algorithm. Like gzip and bzip2, it supports multiple file compression, but the convention is not to compr
Summary of vim common commands
Publish Date:2025/04/08 Views:115 Category:OPERATING SYSTEM
-
In Linux, the best editor should be vim. However, the complex commands behind vim's powerful functions also make us daunted. Of course, these commands do not need to be memorized by rote. As long as you practice using vim more, you can reme
Detailed explanation of command return value $? in Linux
Publish Date:2025/04/08 Views:58 Category:OPERATING SYSTEM
-
? is a special variable. This variable represents the return value of the previous command. That is to say, when we run certain commands, these commands will return a code after running. Generally, if the command is successfully run, the re
Common judgment formulas for Linux script shell
Publish Date:2025/04/08 Views:159 Category:OPERATING SYSTEM
-
In shell script programming, predicates are often used. There are two ways to use predicates, one is to use test, and the other is to use []. Let's take a look at how to use these two methods through two simple examples. Example 1 # test –
Shell script programming practice - specify a directory to delete files
Publish Date:2025/04/08 Views:98 Category:OPERATING SYSTEM
-
Usually, in Linux system we need to frequently delete some temporary files or junk files. If we delete them one by one manually, it will be quite troublesome. I have also been learning shell script programming recently, so I tried to write
Use of Linux command at - set time to execute command only once
Publish Date:2025/04/08 Views:158 Category:OPERATING SYSTEM
-
This article mainly involves a knowledge point, which is the atd service. Similar to this service is the crond service. The functions of these two services can be similar to the two functional functions of javascript. Those who have learned
Use of Linux command crontab - loop execution of set commands
Publish Date:2025/04/08 Views:170 Category:OPERATING SYSTEM
-
Compared with at , which executes a command only once, crontab, which we are going to talk about in this article, executes the set commands in a loop. Similarly, the use of crontab requires the support of the crond service. The service is s
Linux practice - regularly delete files under the directory
Publish Date:2025/04/08 Views:198 Category:OPERATING SYSTEM
-
Since we want to delete the files under the directory regularly, we need to use the Linux crontab command. And the content format of each work routine is also introduced in the format of each crontab work. Similarly, we need to use shell sc
How to use the Linux file remote copy command scp
Publish Date:2025/04/08 Views:151 Category:OPERATING SYSTEM
-
Scp copies files between two hosts over the network, and the data is encrypted during transmission. Its underlying layer uses ssh for data transmission. And it has the same authentication mechanism and the same security level as ssh. When u