Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:108154 Return-Path: Delivered-To: mailing list internals@lists.php.net Received: (qmail 64115 invoked from network); 15 Jan 2020 22:11:05 -0000 Received: from unknown (HELO php-smtp4.php.net) (45.112.84.5) by pb1.pair.com with SMTP; 15 Jan 2020 22:11:05 -0000 Received: from php-smtp4.php.net (localhost [127.0.0.1]) by php-smtp4.php.net (Postfix) with ESMTP id 404FA180568 for ; Wed, 15 Jan 2020 12:18:19 -0800 (PST) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on php-smtp4.php.net X-Spam-Level: X-Spam-Status: No, score=-2.6 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_LOW, SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.2 X-Spam-ASN: AS29169 217.70.176.0/20 X-Spam-Virus: No X-Envelope-From: Received: from relay11.mail.gandi.net (relay11.mail.gandi.net [217.70.178.231]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by php-smtp4.php.net (Postfix) with ESMTPS for ; Wed, 15 Jan 2020 12:18:17 -0800 (PST) Received: from samurai.attlocal.net (107-223-28-39.lightspeed.nsvltn.sbcglobal.net [107.223.28.39]) (Authenticated sender: pmjones@pmjones.io) by relay11.mail.gandi.net (Postfix) with ESMTPSA id 98B46100008; Wed, 15 Jan 2020 20:18:15 +0000 (UTC) Content-Type: text/plain; charset=utf-8 Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\)) In-Reply-To: Date: Wed, 15 Jan 2020 14:18:13 -0600 Cc: PHP Internals List Content-Transfer-Encoding: quoted-printable Message-ID: References: <008CDD73-A01E-4204-AE03-F6EC9933CA5A@benramsey.com> To: Ben Ramsey X-Mailer: Apple Mail (2.3445.9.1) Subject: Re: [PHP-DEV] Who are the current eligible voters? From: pmjones@pmjones.io ("Paul M. Jones") > On Jan 15, 2020, at 14:12, Ben Ramsey wrote: >=20 >> Ben (and others) -- your thoughts? Is it really as straightforward as = "having a php.net account alone is enough to be eligible to vote=E2=80=9D = ? >=20 > I wasn=E2=80=99t answering based on the rules. My answer is based on = practice. Sure, though that practice has to be codified *somewhere*, otherwise = there'd be no way for the wiki voting plugin to figure out who's allowed = to vote. > AFAIK, everyone with a php.net account also has access to the wiki = (you log into the wiki using your php.net account), and therefore, also = has the ability to vote on RFCs. "As far as you know" is fine, but it would be nice to hear something = more authoritative ... > Whomever has admin access on the wiki can provide more information. ... as you note. Can anyone besides Ben provide some insight here, perhaps even point to = the code that determines if a wiki user is allowed to vote? --=20 Paul M. Jones pmjones@pmjones.io http://paul-m-jones.com Modernizing Legacy Applications in PHP https://leanpub.com/mlaphp Solving the N+1 Problem in PHP https://leanpub.com/sn1php