centos man page for perl::critic::policy::valuesandexpressions::prohibitspecialliter

Query: perl::critic::policy::valuesandexpressions::prohibitspecialliter

OS: centos

Section: 3

Format: Original Unix Latex Style Formatted with HTML and a Horizontal Scroll Bar

Perl::Critic::Policy::ValuesAndExpressions::ProhibitSpecUserPerl::Critic::Policy::ValuesAndExpressions::ProhibitSpecialLiteralHeredocTerminator(3)

NAME
Perl::Critic::Policy::ValuesAndExpressions::ProhibitSpecialLiteralHeredocTerminator - Don't write " print <<'__END__' ".
AFFILIATION
This Policy is part of the core Perl::Critic distribution.
DESCRIPTION
Using one of Perl's special literals as a HEREDOC terminator could be confusing to tools that try to parse perl. print <<'__END__'; #not ok Hello world __END__ print <<'__END_OF_WORLD__'; #ok Goodbye world! __END_OF_WORLD__ The special literals that this policy prohibits are: __END__ __DATA__ __PACKAGE__ __FILE__ __LINE__
CONFIGURATION
This Policy is not configurable except for the standard options.
SEE ALSO
Perl::Critic::Policy::ValuesAndExpressions::RequireUpperCaseHeredocTerminator Perl::Critic::Policy::ValuesAndExpressions::RequireQuotedHeredocTerminator
AUTHOR
Kyle Hasselbacher <kyle@cpan.org>
COPYRIGHT
Copyright (c) 2009-2011 Kyle Hasselbacher. This program is free software; you can redistribute it and/or modify it under the same terms as Perl itself. The full text of this license can be found in the LICENSE file included with this module. perl v5.16.3 Perl::Critic::Policy::ValuesAndExpressions::ProhibitSpecialLiteralHeredocTerminator(3)
Related Man Pages
perl::critic::policy::valuesandexpressions::restrictlongstrings(3) - centos
perl::critic::policy::valuesandexpressions::prohibitnoisyquotes(3) - centos
perl::critic::policy::valuesandexpressions::prohibitmixedboolean(3) - centos
perl::critic::policy::valuesandexpressions::prohibitspecialliter(3pm) - debian
perl::critic::policy::valuesandexpressions::requireuppercasehere(3pm) - debian
Similar Topics in the Unix Linux Community
Improving Policy Verification Capabilities of Trusted Platforms
Using Modeling and Simulation for Policy Decision Support in Identity Management
Optimizing Network Patching Policy Decisions
Making Policy Decisions Disappear into the User's Workflow
A Data Assurance Policy Specification and Enforcement Framework for Outsourced Services