From: Andrew Dunstan Date: Tue, 22 Jan 2008 20:41:39 +0000 (+0000) Subject: Work around for perl 5.10 bug - fix due to perl hacker Simon Cozens. X-Git-Url: http://git.postgresql.org/gitweb/static/gitweb.js?a=commitdiff_plain;h=2f8e0833306b4cf14316f75283d4bdf406ebcc77;p=users%2Fbernd%2Fpostgres.git Work around for perl 5.10 bug - fix due to perl hacker Simon Cozens. --- diff --git a/src/pl/plperl/plperl.c b/src/pl/plperl/plperl.c index d7b9f89192..36f9ab74b1 100644 --- a/src/pl/plperl/plperl.c +++ b/src/pl/plperl/plperl.c @@ -272,8 +272,8 @@ _PG_init(void) "sub ::mksafefunc {" \ " my $ret = $PLContainer->reval(qq[sub { $_[0] $_[1] }]); " \ " $@ =~ s/\\(eval \\d+\\) //g if $@; return $ret; }" \ - "$PLContainer->permit('require'); $PLContainer->reval('use strict;');" \ - "$PLContainer->deny('require');" \ + "$PLContainer->permit(qw[require caller]); $PLContainer->reval('use strict;');" \ + "$PLContainer->deny(qw[require caller]); " \ "sub ::mk_strict_safefunc {" \ " my $ret = $PLContainer->reval(qq[sub { BEGIN { strict->import(); } $_[0] $_[1] }]); " \ " $@ =~ s/\\(eval \\d+\\) //g if $@; return $ret; }"