Skip Menu |
 

This queue is for tickets about the Sentry CPAN distribution.

Report information
The Basics
Id: 125077
Status: new
Priority: 0/
Queue: Sentry

People
Owner: Nobody in particular
Requestors: ANDK [...] cpan.org
Cc:
AdminCc:

Bug Information
Severity: (no value)
Broken in: 0.01
Fixed in: (no value)



Subject: Fails with perls < 5.14
Download (untitled) / with headers
text/plain 597b
As per subject. Sample fail report: http://www.cpantesters.org/cpan/report/092287a8-3c92-11e8-9883-d4e1623cb565 Diagnostics: Bareword found where operator expected at /tmpfs/.cpan-build-cpansand/2018041006/Sentry-0.01-16/WWW-Sentry-0.01/../blib/lib/Sentry.pm line 50, near "m{^ ( https? ) :// ( \w+ ) : ( \w+ ) @ ( .+ ) / ( \d+ ) $}ixaa" If you want to keep the m//a Syntax in the regexp, it would be cool if you could declare your requirement. That way the FAILS are converted to UNKNOWNS. Details about how to do it are on this page: http://wiki.cpantesters.org/wiki/CPANAuthorNotes Thanks!


This service is sponsored and maintained by Best Practical Solutions and runs on Perl.org infrastructure.

Please report any issues with rt.cpan.org to rt-cpan-admin@bestpractical.com.