Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:117007 Return-Path: Delivered-To: mailing list internals@lists.php.net Received: (qmail 46169 invoked from network); 9 Feb 2022 11:46:08 -0000 Received: from unknown (HELO php-smtp4.php.net) (45.112.84.5) by pb1.pair.com with SMTP; 9 Feb 2022 11:46:08 -0000 Received: from php-smtp4.php.net (localhost [127.0.0.1]) by php-smtp4.php.net (Postfix) with ESMTP id A2C5D1804DF for ; Wed, 9 Feb 2022 05:02:21 -0800 (PST) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on php-smtp4.php.net X-Spam-Level: X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW,SPF_HELO_NONE, SPF_PASS autolearn=no autolearn_force=no version=3.4.2 X-Spam-ASN: AS199118 195.10.208.0/24 X-Spam-Virus: No X-Envelope-From: Received: from mout-b-105.mailbox.org (mout-b-105.mailbox.org [195.10.208.50]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by php-smtp4.php.net (Postfix) with ESMTPS for ; Wed, 9 Feb 2022 05:02:21 -0800 (PST) Received: from smtp102.mailbox.org (smtp102.mailbox.org [80.241.60.233]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-384) server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mout-b-105.mailbox.org (Postfix) with ESMTPS id 4Jv0Qg1QDqz9st8 for ; Wed, 9 Feb 2022 14:02:19 +0100 (CET) X-Virus-Scanned: amavisd-new at heinlein-support.de DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=woltlab.com; s=MBO0001; t=1644411736; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=Zwakq1xJsfgxBb6wJ68NDsYWGf0IfSdpni5iMt8iQyI=; b=dya8CTwaDBBPA1gXk813osO1lQ7/TWlpItjW8+N4LPnE2SES1AV/5ffIKeygdGRUpOoSUh XQsW+XiJ1z/PUnmBaF79iQWluxlc9d3JUBrHWNh3dz3uEGQj8W46PzmTMpi8/sxXJHFQtj H28lp7CIVeefneeeeMBcduQDAvl3mlYdgNfRQcA42DNMIVZkIVAlewmjsCGn5bPW1N1nAK fCi7diCBbwy8B60/0WeO7qctEsfTfURPFW9mFSL6dRlNtt/9MP97HOoZJyr/+vuY5glEeM 3c0X7tfOgtRScTCyxOEpGdY2rOCJ/czS2GAfk0MN9cM63Fn3OOgtCSKO+WBVNQ== Message-ID: <8bf50f69-00bc-4173-efe6-d3a5cfa4cee2@woltlab.com> Date: Wed, 9 Feb 2022 14:02:09 +0100 MIME-Version: 1.0 Content-Language: en-US To: PHP internals Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit Subject: [VOTE] Redacting parameters in back traces From: duesterhus@woltlab.com (=?UTF-8?Q?Tim_D=c3=bcsterhus=2c_WoltLab_GmbH?=) Hi Internals! As I've announced on Monday [1] I've just started the vote on my RFC "Redacting parameters in back traces" [2] Voting will be for the concept, but a proof of concept implementation exists. The RFC will require a 2/3 majority. Voting will run 2 weeks until: 2022-02-23 at 13:30 UTC -------- Please find the below resources for your reference: RFC: https://wiki.php.net/rfc/redact_parameters_in_back_traces PoC implementation: https://github.com/php/php-src/pull/7921 Pre-RFC Announcement: https://externals.io/message/116847#116847 Discussion Thread: https://externals.io/message/116853#116853 PHP Internals News Podcast Ep. 97: https://phpinternals.news/97 -------- [1] https://externals.io/message/116853#116994 [2] https://wiki.php.net/rfc/redact_parameters_in_back_traces Best regards Tim Düsterhus Developer WoltLab GmbH -- WoltLab GmbH Nedlitzer Str. 27B 14469 Potsdam Tel.: +49 331 96784338 duesterhus@woltlab.com www.woltlab.com Managing director: Marcel Werk AG Potsdam HRB 26795 P