perl5121delta - what is new for perl v5.12.1
This document describes differences between the 5.12.0 release and the 5.12.1 release.
If you are upgrading from an earlier release such as 5.10.1, first read perl5120delta, which describes differences between 5.10.0 and 5.12.0.
There are no changes intentionally incompatible with 5.12.0. If any incompatibilities with 5.12.0 exist, they are bugs. Please report them.
Other than the bug fixes listed below, there should be no user-visible changes to the core language in this release.
is_strict
and is_lax
from version.These were being exported with a wrapper that treated them as method calls, which caused them to fail. They are just functions, are documented as such, and should never be subclassed, so this patch just exports them directly as functions without the wrapper.
reval()
and rdo()
.:=
to perldiagsleep() time on Win32 may be rounded down to multiple of the clock tick interval.
Term::ReadLine::Gnu
is installed.See also: https://github.com/Perl/perl5/issues/10335
See also: http://rt.cpan.org/Public/Bug/Display.html?id=55049
fputc()
or fputs()
: on Windows could cause an error due to their arguments being swapped.See also: https://github.com/Perl/perl5/issues/10156
See also: https://github.com/Perl/perl5/issues/10273
See also: https://github.com/Perl/perl5/issues/10367
See also: https://github.com/Perl/perl5/issues/10287
See also: https://github.com/Perl/perl5/issues/10301
The changes required work around AIX 4.2s' lack of support for IPv6, and limited support for POSIX sigaction()
.
DCL symbol length was limited to 1K up until about seven years or so ago, but there was no particularly deep reason to prevent those older systems from configuring and building Perl.
-Uuseperlio
build on VMS.We were checking a variable that doesn't exist in the non-default case of disabling perlio. Now we only look at it when it exists.
Formerly it only worked if you went through all the questions interactively and explicitly answered no.
List::Util::first
misbehaves in the presence of a lexical $_
(typically introduced by my $_
or implicitly by given
). The variable which gets set for each iteration is the package variable $_
, not the lexical $_
.A similar issue may occur in other modules that provide functions which take a block as their first argument, like
foo { ... $_ ...} list
See also: https://github.com/Perl/perl5/issues/9798
Module::Load::Conditional
and version
have an unfortunate interaction which can cause CPANPLUS
to crash when it encounters an unparseable version string. Upgrading to CPANPLUS
0.9004 or Module::Load::Conditional
0.38 from CPAN will resolve this issue.Perl 5.12.1 represents approximately four weeks of development since Perl 5.12.0 and contains approximately 4,000 lines of changes across 142 files from 28 authors.
Perl continues to flourish into its third decade thanks to a vibrant community of users and developers. The following people are known to have contributed the improvements that became Perl 5.12.1:
Ævar Arnfjörð Bjarmason, Chris Williams, chromatic, Craig A. Berry, David Golden, Father Chrysostomos, Florian Ragwitz, Frank Wiegand, Gene Sullivan, Goro Fuji, H.Merijn Brand, James E Keenan, Jan Dubois, Jesse Vincent, Josh ben Jore, Karl Williamson, Leon Brocard, Michael Schwern, Nga Tang Chan, Nicholas Clark, Niko Tyni, Philippe Bruhat, Rafael Garcia-Suarez, Ricardo Signes, Steffen Mueller, Todd Rinaldo, Vincent Pit and Zefram.
If you find what you think is a bug, you might check the articles recently posted to the comp.lang.perl.misc newsgroup and the perl bug database at http://rt.perl.org/perlbug/ . There may also be information at http://www.perl.org/ , the Perl Home Page.
If you believe you have an unreported bug, please run the perlbug program included with your release. Be sure to trim your bug down to a tiny but sufficient test case. Your bug report, along with the output of perl -V
, will be sent off to perlbug@perl.org to be analysed by the Perl porting team.
If the bug you are reporting has security implications, which make it inappropriate to send to a publicly archived mailing list, then please send it to perl5-security-report@perl.org. This points to a closed subscription unarchived mailing list, which includes all the core committers, who will be able to help assess the impact of issues, figure out a resolution, and help co-ordinate the release of patches to mitigate or fix the problem across all platforms on which Perl is supported. Please only use this address for security issues in the Perl core, not for modules independently distributed on CPAN.
The Changes file for an explanation of how to view exhaustive details on what changed.
The INSTALL file for how to build Perl.
The README file for general stuff.
The Artistic and Copying files for copyright information.