Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:46251 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 10250 invoked from network); 30 Nov 2009 15:59:57 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 30 Nov 2009 15:59:57 -0000 Authentication-Results: pb1.pair.com smtp.mail=rquadling@googlemail.com; spf=pass; sender-id=pass Authentication-Results: pb1.pair.com header.from=rquadling@googlemail.com; sender-id=pass; domainkeys=bad Received-SPF: pass (pb1.pair.com: domain googlemail.com designates 209.85.220.221 as permitted sender) DomainKey-Status: bad X-DomainKeys: Ecelerity dk_validate implementing draft-delany-domainkeys-base-01 X-PHP-List-Original-Sender: rquadling@googlemail.com X-Host-Fingerprint: 209.85.220.221 mail-fx0-f221.google.com Received: from [209.85.220.221] ([209.85.220.221:55615] helo=mail-fx0-f221.google.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 9A/5C-43487-8FBE31B4 for ; Mon, 30 Nov 2009 10:59:54 -0500 Received: by fxm21 with SMTP id 21so3322766fxm.1 for ; Mon, 30 Nov 2009 07:59:50 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=googlemail.com; s=gamma; h=domainkey-signature:mime-version:received:reply-to:in-reply-to :references:from:date:message-id:subject:to:cc:content-type; bh=qYRo7z20aOANYSlXWfy4nYBRJdg5lgbZCrH4seP1OZ0=; b=KLz/tQP4rCtpOaS8U+U39/7URREEFmi0VCVYKO0cKw9bsILsx5fO0SVvwDzx3tIg3H ZQbyiE0wIq94yt988ZeFzgD410+Pj+e5FfR5uiC6X5aP3gmeRcWLygm0O/MwRl0IcEu3 nwRTIdkGOoVm2A2KicQKprbun2EPgXtGkp9ho= DomainKey-Signature: a=rsa-sha1; c=nofws; d=googlemail.com; s=gamma; h=mime-version:reply-to:in-reply-to:references:from:date:message-id :subject:to:cc:content-type; b=OTsS6Yn35sbKNctNhL2oH0m7ghDCqrAK3C/tFs8VbMF/6Dv6IOOdVHDpwAGSPMlIaz 9TwFfN2jV5uJgSVq/z8h6ALQ87Rq0S2GZ/ebC1M+u6Iasc9i6eye654cSr8HvMBsbZ3U xITh75Ljl4c+reKzvD2MVJ59nbi6z8g5UbB98= MIME-Version: 1.0 Received: by 10.223.4.137 with SMTP id 9mr713093far.95.1259596790095; Mon, 30 Nov 2009 07:59:50 -0800 (PST) Reply-To: RQuadling@googlemail.com In-Reply-To: <4B11AA29.7030105@sci.fi> References: <7F59B61F-90E6-45E2-9CF3-84051A1CE530@darkrainfall.org> <4B11AA29.7030105@sci.fi> Date: Mon, 30 Nov 2009 15:59:30 +0000 Message-ID: <10845a340911300759u72ef1f34xa5ecc74418a3dfa4@mail.gmail.com> To: jani.taskinen@iki.fi Cc: Gwynne Raskind , PHP Internals List Content-Type: text/plain; charset=UTF-8 Subject: Re: [PHP-DEV] Backporting bypass_shell and posix_pipe() from trunk to 5.3 From: rquadling@googlemail.com (Richard Quadling) 2009/11/28 Jani Taskinen : > Gwynne Raskind wrote: >> >> Some while ago, I committed a patch to trunk which adds the shell_bypass >> option to proc_open() on UNIX. I'd like to backport that patch to 5.3.2, >> along with posix_pipe(), which helps quite a bit in using it. The patch can >> be found at . It's been tested and run >> through valgrind and the Clang analyzer. Any reason I shouldn't commit it? I >> tried to get it into 5.3.0 but the consensus at the time was "let's get this >> out the door already" :). > > -1 > > And buy an enter key. > > --Jani > > > > -- > PHP Internals - PHP Runtime Development Mailing List > To unsubscribe, visit: http://www.php.net/unsub.php > > You'll find them in the same place as the "Any" key. -- ----- Richard Quadling "Standing on the shoulders of some very clever giants!" EE : http://www.experts-exchange.com/M_248814.html Zend Certified Engineer : http://zend.com/zce.php?c=ZEND002498&r=213474731 ZOPA : http://uk.zopa.com/member/RQuadling