b374k
m1n1 1.01
Apache/2.2.15 (CentOS)
Linux obd60-6c49958d75-2q7cw 5.4.0-174-generic #193-Ubuntu SMP Thu Mar 7 14:29:28 UTC 2024 x86_64
uid=48(apache) gid=48(apache) groups=48(apache)
server ip : 104.21.65.202 | your ip : 10.244.126.0
safemode OFF
 >  / usr / share / perl5 /
Filename/usr/share/perl5/assert.pl
Size1.27 kb
Permissionrw-r--r--
Ownerapache
Create time23-Dec-2025 17:41
Last modified22-Mar-2017 16:32
Last accessed21-Apr-2026 22:55
Actionsedit | rename | delete | download (gzip)
Viewtext | code | image
# assert.pl
# [email protected] (Tom Christiansen)
#
# Usage:
#
# &assert('@x > @y');
# &assert('$var > 10', $var, $othervar, @various_info);
#
# That is, if the first expression evals false, we blow up. The
# rest of the args, if any, are nice to know because they will
# be printed out by &panic, which is just the stack-backtrace
# routine shamelessly borrowed from the perl debugger.

sub assert {
&panic("ASSERTION BOTCHED: $_[$[]",$@) unless eval $_[$[];
}

sub panic {
package DB;

select(STDERR);

print "\npanic: @_\n";

exit 1 if $] <= 4.003; # caller broken

# stack traceback gratefully borrowed from perl debugger

local $_;
my $i;
my ($p,$f,$l,$s,$h,$a,@a,@frames);
for ($i = 0; ($p,$f,$l,$s,$h,$w) = caller($i); $i++) {
@a = @args;
for (@a) {
if (/^StB\000/ && length($_) == length($_main{'_main'})) {
$_ = sprintf("%s",$_);
}
else {
s/'/\\'/g;
s/([^\0]*)/'$1'/ unless /^-?[\d.]+$/;
s/([\200-\377])/sprintf("M-%c",ord($1)&0177)/eg;
s/([\0-\37\177])/sprintf("^%c",ord($1)^64)/eg;
}
}
$w = $w ? '@ = ' : '$ = ';
$a = $h ? '(' . join(', ', @a) . ')' : '';
push(@frames, "$w&$s$a from file $f line $l\n");
}
for ($i=0; $i <= $#frames; $i++) {
print $frames[$i];
}
exit 1;
}

1;