Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:72523 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 63225 invoked from network); 12 Feb 2014 20:29:52 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 12 Feb 2014 20:29:52 -0000 Authentication-Results: pb1.pair.com smtp.mail=php@golemon.com; spf=softfail; sender-id=softfail Authentication-Results: pb1.pair.com header.from=php@golemon.com; sender-id=softfail Received-SPF: softfail (pb1.pair.com: domain golemon.com does not designate 209.85.160.46 as permitted sender) X-PHP-List-Original-Sender: php@golemon.com X-Host-Fingerprint: 209.85.160.46 mail-pb0-f46.google.com Received: from [209.85.160.46] ([209.85.160.46:65483] helo=mail-pb0-f46.google.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 26/B7-19387-FB9DBF25 for ; Wed, 12 Feb 2014 15:29:51 -0500 Received: by mail-pb0-f46.google.com with SMTP id um1so9707906pbc.19 for ; Wed, 12 Feb 2014 12:29:47 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:sender:in-reply-to:references:date :message-id:subject:from:to:cc:content-type; bh=y9vPV0WJk1OzkVWUgAALeMtsxlCUPnC75klh59RNVE8=; b=fNmp4wGNnSHP4gxhUA8GVuQw2/QKRuL6I/Tl+E0Lr5azoXb16u4EuxLHDS28pIsI5T t3EDmVyOKhXpeFOs9ESu+hGD0XBCXBQR6r0iZbRz0fWjgQsHPidMvfn+YFNljmPBQDPW DhMUhxHzVHw8cjbJ+1wvd71qFjLNxR1QJnbiKZKyi/YbFizaSGVoeiK6Dk/XB76zF2hH /tOtpRFco37EaHCRjt7nlispcnfSlAOzHVqxRaLxfTCMh2cAG0nDNDlvEXDl1qG1WwSQ NDDhxExNEOACs3/Pzcqt54FiBJW+Bo3RjSqED8BP/vs2QXP/UIULmYEg1L8UVSkopLkH ptXA== X-Gm-Message-State: ALoCoQm4u56JOKAXApUs7CCloQMXLoczCMK25ZZAc5OVWUi+0raSlNDaEgHAROMByvsMJVy8l4ez MIME-Version: 1.0 X-Received: by 10.68.180.37 with SMTP id dl5mr53059634pbc.111.1392236987317; Wed, 12 Feb 2014 12:29:47 -0800 (PST) Sender: php@golemon.com Received: by 10.70.69.162 with HTTP; Wed, 12 Feb 2014 12:29:47 -0800 (PST) X-Originating-IP: [2620:0:1cfe:18:22c9:d0ff:fe87:295b] In-Reply-To: <52FA9FD3.6000008@googlemail.com> References: <52F00437.7010903@googlemail.com> <52FA71FE.8060808@googlemail.com> <1392151967.3990.11.camel@guybrush> <52FA90B3.5040205@googlemail.com> <1392153156.3990.13.camel@guybrush> <52FA99C4.5080006@googlemail.com> <1392155891.3990.15.camel@guybrush> <52FA9FD3.6000008@googlemail.com> Date: Wed, 12 Feb 2014 12:29:47 -0800 X-Google-Sender-Auth: FauWBVqQVuNxwQMcPNZg4kzvEoY Message-ID: To: Crypto Compress Cc: =?ISO-8859-1?Q?Johannes_Schl=FCter?= , Derick Rethans , PHP Developers Mailing List Content-Type: text/plain; charset=ISO-8859-1 Subject: Re: [PHP-DEV] [RFC] [VOTE] __debugInfo() From: pollita@php.net (Sara Golemon) On Tue, Feb 11, 2014 at 2:10 PM, Crypto Compress wrote: > No, it's not about risk of abuse. There can be *only* abuse! > This hook is only intended to hide debug information. If you don't want to > hide info, you don't need this hook. > Debug info is *important*! Do not hide it without a option to bypass! > That statement is incorrect. This hook is not only intended to hide debug information. It can just as easily be used to expose *more* debug information. For example: class MyMySQL { protected $conn; public function __debugInfo() { return [ 'conn' => $this->conn, 'encoding' => mysql_client_encoding($this->conn), 'error' => mysql_error($this->conn), 'info' => mysql_info($this->conn), // etc... } } Here, our mysql wrapper class exposes a great deal more information for use when debugging what went wrong. Not less. Therefore I refute your statement. -Sara