Skip Menu |

This queue is for tickets about the JSON-PPdev CPAN distribution.

Report information
The Basics
Id: 84258
Status: resolved
Priority: 0/
Queue: JSON-PPdev

People
Owner: Nobody in particular
Requestors: ANDK [...] cpan.org
Cc: demerphq [...] gmail.com
AdminCc:

Bug Information
Severity: Important
Broken in: 2.27100
Fixed in: (no value)



CC: demerphq [...] gmail.com
Subject: Bleadperl v5.17.9-200-g0e0ab62 breaks MAKAMAKA/JSON-PPdev-2.27100.tar.gz
As per subject. Canonical ticket for the issue is https://rt.perl.org/rt3//Public/Bug/Display.html?id=117313 Hash randomization is involved. Sample fail report: http://www.cpantesters.org/cpan/report/0bc3b0e8-9109-11e2-a497-32613b384401 HTH&&Thanks&&Regards,
CC: Perl5 Porteros <perl5-porters [...] perl.org>, "Andreas J. Koenig" <andreas.koenig.7os6VVqR [...] franz.ak.mind.de>
Subject: Re: [rt.cpan.org #84258] Bleadperl v5.17.9-200-g0e0ab62 breaks MAKAMAKA/JSON-PPdev-2.27100.tar.gz
Date: Thu, 28 Mar 2013 14:09:47 +0100
To: bug-JSON-PPdev [...] rt.cpan.org
From: demerphq <demerphq [...] gmail.com>
On 28 March 2013 13:55, Andreas Koenig via RT <bug-JSON-PPdev@rt.cpan.org> wrote: Show quoted text
> <URL: https://rt.cpan.org/Ticket/Display.html?id=84258 > > > As per subject. Canonical ticket for the issue is https://rt.perl.org/rt3//Public/Bug/Display.html?id=117313 > > Hash randomization is involved. > > Sample fail report: > > http://www.cpantesters.org/cpan/report/0bc3b0e8-9109-11e2-a497-32613b384401 > > HTH&&Thanks&&Regards,
Given that JSON::PP is in core fixed, and this module is fixed by the same patch to JSON::XS and JSON::PP already published there is nothing for me to do here. Andreas, could you please send stuff like this to the perl5porters list and not to me directly? Thanks, Yves -- perl -Mre=debug -e "/just|another|perl|hacker/"
RT-Send-CC: demerphq [...] gmail.com
JSON::PPdev is not used now. I prepared to remove it from CPAN. This module will be deleted in a few days. Thanks, On 2013-3月-28 木 08:55:27, ANDK wrote: Show quoted text
> As per subject. Canonical ticket for the issue is > https://rt.perl.org/rt3//Public/Bug/Display.html?id=117313 > > Hash randomization is involved. > > Sample fail report: > > http://www.cpantesters.org/cpan/report/0bc3b0e8-9109-11e2-a497- > 32613b384401 > > HTH&&Thanks&&Regards,