403Webshell
Server IP : 66.29.132.122  /  Your IP : 3.139.88.33
Web Server : LiteSpeed
System : Linux business142.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64
User : admazpex ( 531)
PHP Version : 7.2.34
Disable Function : NONE
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : OFF  |  Pkexec : OFF
Directory :  /usr/lib64/perl5/vendor_perl/Filter/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /usr/lib64/perl5/vendor_perl/Filter/exec.pm
package Filter::exec ;

use Filter::Util::Exec ;
use strict ;
use warnings ;

our $VERSION = "1.58" ;

sub import
{
    my($self, @args) = @_ ;

    unless (@args) {
        require Carp;
        Carp::croak("Usage: use Filter::exec 'command'");
    }

    Filter::Util::Exec::filter_add($self, @args) ;
}

1 ;
__END__

=head1 NAME

Filter::exec - exec source filter

=head1 SYNOPSIS

    use Filter::exec qw(command parameters) ;

=head1 DESCRIPTION

This filter pipes the current source file through the program which
corresponds to the C<command> parameter.

As with all source filters its scope is limited to the current source
file only. Every file you want to be processed by the filter must have a

    use Filter::exec qw(command ) ;

near the top.

Here is an example script which uses the filter:

    use Filter::exec qw(tr XYZ PQR) ;
    $a = 1 ;
    print "XYZ a = $a\n" ;

And here is what it will output:

    PQR = 1

=head1 WARNING

You should be I<very> careful when using this filter. Because of the
way the filter is implemented it is possible to end up with deadlock.

Be especially careful when stacking multiple instances of the filter in
a single source file.

=head1 AUTHOR

Paul Marquess 

=head1 DATE

11th December 1995.

=cut


Youez - 2016 - github.com/yon3zu
LinuXploit