Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:68281 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 37792 invoked from network); 23 Jul 2013 07:41:39 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 23 Jul 2013 07:41:39 -0000 Authentication-Results: pb1.pair.com smtp.mail=lior.k@zend.com; spf=permerror; sender-id=unknown Authentication-Results: pb1.pair.com header.from=lior.k@zend.com; sender-id=unknown Received-SPF: error (pb1.pair.com: domain zend.com from 209.85.219.49 cause and error) X-PHP-List-Original-Sender: lior.k@zend.com X-Host-Fingerprint: 209.85.219.49 mail-oa0-f49.google.com Received: from [209.85.219.49] ([209.85.219.49:57054] helo=mail-oa0-f49.google.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id F5/96-17597-2B33EE15 for ; Tue, 23 Jul 2013 03:41:39 -0400 Received: by mail-oa0-f49.google.com with SMTP id n12so5715115oag.8 for ; Tue, 23 Jul 2013 00:41:36 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:date:message-id:subject:from:to:content-type :x-gm-message-state; bh=QAxLrCo5yZlC9iW/XKZyUvpd7Sgxfa6uH0kRZtr6mZA=; b=c6mfWaLySW2TJzhUqjxraCoYatvcWOTKN/y5CIiDDYUxHJ+sWDTGwxrxOi33eVlFpH v2l29QId7wO4Nq4O4rAQL17eg7mLsZ/xpHp34n2IzUC+0tm8wQ5ldpDA91nRBHSsP1rw 9kVOKC6Dphe5WM43MQ8g46ouLCm5pq+/nNMXuhFCD4jQXJJe1OECh+XSXHYzlVwHz0tZ cUt+4wQrlZ9F00dm0seWyI4pbXTM56L1Y2Svh5LOLEIaOKSpjRS0rcG8Cc9UBMISg6Hm MWVND/ejoEURqcLgGWtw8ayRdQEVDD3OsMjAPu1V1xFzQYLN/fnc27Rg3ARLlp+cJ00v +aWw== MIME-Version: 1.0 X-Received: by 10.182.53.194 with SMTP id d2mr23650866obp.28.1374565296177; Tue, 23 Jul 2013 00:41:36 -0700 (PDT) Received: by 10.60.40.65 with HTTP; Tue, 23 Jul 2013 00:41:36 -0700 (PDT) Date: Tue, 23 Jul 2013 10:41:36 +0300 Message-ID: To: PHP internals list Content-Type: multipart/alternative; boundary=089e0158c5ae331a6804e228ec91 X-Gm-Message-State: ALoCoQnrBhboNjkTQK3VVRo4Zxis7GTkcnrECKfDOGNDHqfts7q3O9GKdWWKU16AGRZgXnzICYJSVdXbpAejC4nhRUdk37GBERhdzKED9+QVECwgEGcSewmXhqY6YyQ4VvEfcbWT7mxq Subject: Pull requests report (23/7/2013) From: lior.k@zend.com (Lior Kaplan) --089e0158c5ae331a6804e228ec91 Content-Type: text/plain; charset=UTF-8 This is the 3rd report, and I'm glad to see more people reviewing & commenting the requests. Thanks. Merged requests (past 7 days): #99 Added recursivetreeiterator::setPostfix() method #231 Bringing CSS up to this decade's standards #267 Bug #38917 - Native SPKAC support request (merged two months ago) #317 Fix saving of -1 index from keys column in array_column function #326 zend_register_bool_constant patch #351 working example of session garbage collection in sub-directories #384 HASH_KEY_NON_EXISTANT typo fix #385 mssql.compatability_mode typo fix #387 Wrong value for FILTER_SANITIZE_FULL_SPECIAL_CHARS #389 Fixed bug #65291 - get_defined_constants() crash with __CLASS__ in trait #391 addressed bug #65159, Misleading configure help text for --with-mysql-sock Thanks Stas for your work on this, and to Yasuo who helped as well. Closed requests (without merge): #52 Imap send (*abandoned patch*) #72 Implemented posix_getspnam() function (*abandoned patch*) #167 Add PDO::quoteName() method #213 Copied reproduction code from bugs.php.net to phpt #265 ext/session/mod_files.sh fix (*conflicts with fix at 5f0656b89ddb42d17a70f767060a08226809421a*) #366 PHP 5.3 strict session (*no new features for 5.3*) #375 Fixed bug #48770: when call_user_func() fails to call parent from inheriting class (*BC break*) New (and still open) requests (past 7 days): #388 Add new 'use function' sequence for importing namespaced functions #390 Add DateInterval::add method #392 Fix bug #65028 #393 Fix #60873: Add read_property handler for DateTime object existing requests (7-21 days): #373 Add apparmor change hat functionality to fpm #374 PostgreSQL's PDOStatement::getColumnMeta() fills in table's name. #381 Fixed #65225: PHP_BINARY incorrectly set #382 Added support for not canonicalizing the SASL realm on sasl_binds for LDAP Kaplan --089e0158c5ae331a6804e228ec91--