Beefy Boxes and Bandwidth Generously Provided by pair Networks
Perl: the Markov chain saw
 
PerlMonks  

Re^3: It LOOKS right...

by Fletch (Chancellor)
on May 31, 2011 at 17:45 UTC ( #907512=note: print w/replies, xml ) Need Help??


in reply to Re^2: It LOOKS right...
in thread It LOOKS right...

If the #! line isn't correct then your code will be passed to /bin/sh, not Perl, and that's what produced the error messages.

The cake is a lie.
The cake is a lie.
The cake is a lie.

Replies are listed 'Best First'.
Re^4: It LOOKS right...
by ikegami (Pope) on May 31, 2011 at 18:20 UTC

    If the #! line isn't correct then your code will be passed to /bin/sh, not Perl

    No.

    $ a.pl sh: ./a.pl: usr/bin/perl: bad interpreter: No such file or directory

    and that's what produced the error messages.

    No. If the error messages originated from sh, they would look like

    $ . a.pl sh: =: command not found sh: ./a.pl: line 3: syntax error near unexpected token `{' sh: ./a.pl: line 3: `if ($count <= 20) {'

    or (requires changing shebang to #!/bin/sh)

    $ a.pl ./a.pl: line 2: =: command not found ./a.pl: line 3: syntax error near unexpected token `{' ./a.pl: line 3: `if ($count <= 20) {'

    The error the OP gave is indeed from perl.

Log In?
Username:
Password:

What's my password?
Create A New User
Node Status?
node history
Node Type: note [id://907512]
help
Chatterbox?
[Corion]: :-D
[Corion]: I think that ITIL is mostly to prevent people from doing harm to a system that basically runs unattended :)
[Corion]: Maybe you could reduce ITIL to a computer network, a man and a dog. The network runs the computations. The man is there to feed the dog. The dog is there to prevent the man from accessing the computers.
[marto]: from experience of this side of the fence, it's all about proving to people that you are ITIL compliant, then the client ignores logical processes anyway :P
[marto]: when you work on the outside, for a client, you can make them aware of the stupids, but they don' t always listen :/
[Corion]: Yeah, you can lead them to water, but it's illegal to drown them...
[Discipulus]: Here my solution marto: create a win fake machine insied AD. do a micro fake partition foreach remote partition you wont to monit. put a web server that acept from data from remote systems and full fake partition as needed. fake partition are Mb. ;=)

How do I use this? | Other CB clients
Other Users?
Others avoiding work at the Monastery: (12)
As of 2017-01-24 10:33 GMT
Sections?
Information?
Find Nodes?
Leftovers?
    Voting Booth?
    Do you watch meteor showers?




    Results (203 votes). Check out past polls.