Excellent kata, thanks a lot!
Very good, thank you!!!
Crystal Translation added :)
If you successfully solved this kata, you might like a slightly more advanced version of it:
(currently python only)
Great challenging Kata. Well Done!
This comment is hidden because it contains spoiler information about the solution
Am not seeing why '/home/codewarrior/killall...' is the expected result for one of the test cases. On my machine killall is in /usr/bin. Aren't we asked to return the output of 'which killall', assuming the input is valid? Are we supposed to execute it, or go poking around the filesystem? And the description doesn't hint at what to return if the input isn't a single command name. I would be inclined to return nil if it looks like there's any funny business. I guess I'm not equipped with much hacker knowledge...
Interesting. There are seven Ruby solutions that have been submitted over the past few days.
Do you also see the array being sent to your function?
Just updated the Ruby solution to make 0 neutral. Will probably take a bit to propagate.
Thanks for pointing out the issue.
Great kata. Thanks.
Thanks, I added the second 'abc' test.
I didn't add the '' characters test as there's a valid hash for the empty string.
Doesn't help to make this kata more complicated...;-) There's a new testcase, so marked it as resolved...