Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:117119 Return-Path: Delivered-To: mailing list internals@lists.php.net Received: (qmail 57737 invoked from network); 23 Feb 2022 12:16:13 -0000 Received: from unknown (HELO php-smtp4.php.net) (45.112.84.5) by pb1.pair.com with SMTP; 23 Feb 2022 12:16:13 -0000 Received: from php-smtp4.php.net (localhost [127.0.0.1]) by php-smtp4.php.net (Postfix) with ESMTP id BA37E180003 for ; Wed, 23 Feb 2022 05:35:53 -0800 (PST) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on php-smtp4.php.net X-Spam-Level: X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW, RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,T_SPF_TEMPERROR autolearn=no autolearn_force=no version=3.4.2 X-Spam-ASN: AS199118 195.10.208.0/24 X-Spam-Virus: No X-Envelope-From: Received: from mout-b-206.mailbox.org (mout-b-206.mailbox.org [195.10.208.51]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by php-smtp4.php.net (Postfix) with ESMTPS for ; Wed, 23 Feb 2022 05:35:53 -0800 (PST) Received: from smtp1.mailbox.org (smtp1.mailbox.org [80.241.60.240]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-384) server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mout-b-206.mailbox.org (Postfix) with ESMTPS id 4K3cVv2Thhz9skp for ; Wed, 23 Feb 2022 14:35:51 +0100 (CET) Message-ID: <59224e10-488b-af00-827c-b5ad9b3f6e9a@woltlab.com> DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=woltlab.com; s=MBO0001; t=1645623349; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=ewfZFXKwc7TfWD1CmiCWNiFaxnvNImJpC34c8CHgHgw=; b=u6a2kHwKJjV2W+lv5zuxMUITk7kuYXKwUZAL1drPVwnEdirWz8/QKUUi/L+EyllRb4xfIJ u0qILtFGSDdjWGaKQYkX3fylKrZHrkpcPOCrVBuVr0ua9/k9OJFm+dINvqFygDT0463Ztx zdvNOej1SiBwdbQCYjDMp5a0IpbHVQS/DKJ0TFP+9Han0JDaNTxIVgSyFC5QD9xbztcYt5 YInzWop3++GDCHWEZUm2XKO3bXMUlwXcvec/FZ9+7leje5OePeb8/G4DilE9A9ZmXLZ2YI Ahv/MjyyPKk3HvPSjvVjKdBL+gxgIHegFwzEIouDOOTuH+h1ZdDA1yF2dfMHrg== Date: Wed, 23 Feb 2022 14:35:46 +0100 MIME-Version: 1.0 Content-Language: en-US To: PHP internals References: <8bf50f69-00bc-4173-efe6-d3a5cfa4cee2@woltlab.com> <26bc0db6-5cc1-5eb9-05fc-1c000d918b57@woltlab.com> In-Reply-To: <26bc0db6-5cc1-5eb9-05fc-1c000d918b57@woltlab.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit Subject: Re: [PHP-DEV] [VOTE] Redacting parameters in back traces From: duesterhus@woltlab.com (=?UTF-8?Q?Tim_D=c3=bcsterhus=2c_WoltLab_GmbH?=) Hi Internals! On 2/22/22 13:25, Tim Düsterhus, WoltLab GmbH wrote: > As a reminder: Voting for the "Redacting parameters in back traces" RFC > closes in a little more than 25 hours. > I just closed the vote. The "Redacting parameters in back traces" RFC https://wiki.php.net/rfc/redact_parameters_in_back_traces was accepted with 24 (Yes) to 1 (No) votes (96% acceptance). Thanks to all of you who participated in the discussion and the voting process. I'll proceed with cleaning up the git history of the implementation at https://github.com/php/php-src/pull/7921 so that it can be reviewed. Best regards Tim Düsterhus Developer WoltLab GmbH -- WoltLab GmbH Nedlitzer Str. 27B 14469 Potsdam Tel.: +49 331 96784338 duesterhus@woltlab.com www.woltlab.com Managing director: Marcel Werk AG Potsdam HRB 26795 P