Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:65265 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 33963 invoked from network); 28 Jan 2013 15:57:00 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 28 Jan 2013 15:57:00 -0000 Authentication-Results: pb1.pair.com smtp.mail=glopes@nebm.ist.utl.pt; spf=permerror; sender-id=unknown Authentication-Results: pb1.pair.com header.from=glopes@nebm.ist.utl.pt; sender-id=unknown Received-SPF: error (pb1.pair.com: domain nebm.ist.utl.pt from 193.136.128.21 cause and error) X-PHP-List-Original-Sender: glopes@nebm.ist.utl.pt X-Host-Fingerprint: 193.136.128.21 smtp1.ist.utl.pt Linux 2.6 Received: from [193.136.128.21] ([193.136.128.21:51502] helo=smtp1.ist.utl.pt) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id DD/A0-28517-BCF96015 for ; Mon, 28 Jan 2013 10:57:00 -0500 Received: from localhost (localhost.localdomain [127.0.0.1]) by smtp1.ist.utl.pt (Postfix) with ESMTP id 9C59C7000430; Mon, 28 Jan 2013 15:56:56 +0000 (WET) X-Virus-Scanned: by amavisd-new-2.6.4 (20090625) (Debian) at ist.utl.pt Received: from smtp1.ist.utl.pt ([127.0.0.1]) by localhost (smtp1.ist.utl.pt [127.0.0.1]) (amavisd-new, port 10025) with LMTP id JRnbYzlCakdL; Mon, 28 Jan 2013 15:56:56 +0000 (WET) Received: from mail2.ist.utl.pt (mail.ist.utl.pt [IPv6:2001:690:2100:1::8]) by smtp1.ist.utl.pt (Postfix) with ESMTP id 29E66700042E; Mon, 28 Jan 2013 15:56:56 +0000 (WET) Received: from damnation.nl.lo.geleia.net (unknown [IPv6:2001:470:94a2:4:21d:baff:feee:cc0b]) (Authenticated sender: ist155741) by mail2.ist.utl.pt (Postfix) with ESMTPSA id 149452003FC0; Mon, 28 Jan 2013 15:56:53 +0000 (WET) Content-Type: text/plain; charset=utf-8; format=flowed; delsp=yes To: "Zeev Suraski" , "Pierre Joye" Cc: "Alan Knowles" , "PHP Internals" References: <1460659e-237d-4c7c-8cfa-523ec857d646@email.android.com> Date: Mon, 28 Jan 2013 16:56:50 +0100 MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Organization: =?utf-8?Q?N=C3=BAcleo_de_Eng=2E_Biom=C3=A9di?= =?utf-8?Q?ca_do_I=2ES=2ET=2E?= Message-ID: In-Reply-To: User-Agent: Opera Mail/12.12 (Linux) Subject: Re: [PHP-DEV] [VOTE] Deprecate and remove calls from incompatible context From: glopes@nebm.ist.utl.pt ("Gustavo Lopes") On Mon, 28 Jan 2013 16:45:43 +0100, Pierre Joye wrote: > On Mon, Jan 28, 2013 at 4:30 PM, Zeev Suraski wrote: >>> -----Original Message----- > >> Can you explain why you think it's a major BC break? The RFC suggested >> that the BC break would be minimal and that the likelihood a lot of >> people used it is very low. If you think differently and share it it >> might put it in a different light. > > Problem is that we do not allow BC break in 5.5, at all, minor or not. > Minor vs major BC is all relative, a minor BC for someone can create > large issues for someone else, that's why we do not allow BC, in > general. Killing some outdated "security" features however may fit > better, but I am really not sure this one is worse the risk. > Sorry, this objection simply is not timely. In order for this voting thing to work, votes have to have a strong degree of finality. It would have to take a pretty strong new fact to overcome that finality. Otherwise, people will not have incentives to look *early* at the RFCs and the discussions will never end. In any case, the interpretation of the release process RFC as to BC breaks has been rather lax. 5.4 introduced pretty disruptive BC breaks like eliminating call-time pass-by-ref and changing the default encoding for htmlentities/htmlspecialchars and new keywords. 5.5 will also introduce a few (look at UPGRADING). -- Gustavo Lopes