Beefy Boxes and Bandwidth Generously Provided by pair Networks
XP is just a number

Re: Use Getopt::Long even if you don't think you need to

by herveus (Parson)
on May 19, 2008 at 12:11 UTC ( #687365=note: print w/replies, xml ) Need Help??

in reply to Use Getopt::Long even if you don't think you need to


I've taken to using Getopt::Euclid. It forces me to write POD in order to have arguments at all, then handles the option parsing for me.

I suppose the main message is "don't be hand-rolling your option parser", just as "don't be hand-rolling your CGI parameter parser". Some things aren't worth the effort to reinvent save as a pedagogical exercise.

  • Comment on Re: Use Getopt::Long even if you don't think you need to

Replies are listed 'Best First'.
Re^2: Use Getopt::Long even if you don't think you need to
by Anonymous Monk on May 19, 2008 at 16:39 UTC

    I'd fallen in love with Getopt::Euclid myself. Unfortunately many of the programs I write must be distributed via Activestate's PerlApp which does not allow the program to see anything past it's __END__ tag.

    I've fallen back to using Getopt::Long and Pod::Usage because PerlApp programs can be made to see what's in their __DATA__ section.

Log In?

What's my password?
Create A New User
Node Status?
node history
Node Type: note [id://687365]
[Corion]: I think that ITIL is mostly to prevent people from doing harm to a system that basically runs unattended :)
[Corion]: Maybe you could reduce ITIL to a computer network, a man and a dog. The network runs the computations. The man is there to feed the dog. The dog is there to prevent the man from accessing the computers.
[marto]: from experience of this side of the fence, it's all about proving to people that you are ITIL compliant, then the client ignores logical processes anyway :P
[marto]: when you work on the outside, for a client, you can make them aware of the stupids, but they don' t always listen :/
[Corion]: Yeah, you can lead them to water, but it's illegal to drown them...
[Discipulus]: Here my solution marto: create a win fake machine insied AD. do a micro fake partition foreach remote partition you wont to monit. put a web server that acept from data from remote systems and full fake partition as needed. fake partition are Mb. ;=)
[marto]: Discipulus yeah, the nuclear industry love fake machines sitting around on a controlled domain :P
[marto]: changing a typo on a website is often a great deal of paper work :P

How do I use this? | Other CB clients
Other Users?
Others contemplating the Monastery: (12)
As of 2017-01-24 10:35 GMT
Find Nodes?
    Voting Booth?
    Do you watch meteor showers?

    Results (203 votes). Check out past polls.