Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:90962 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 1221 invoked from network); 27 Jan 2016 03:19:55 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 27 Jan 2016 03:19:55 -0000 Authentication-Results: pb1.pair.com smtp.mail=yohgaki@gmail.com; spf=pass; sender-id=pass Authentication-Results: pb1.pair.com header.from=yohgaki@gmail.com; sender-id=pass Received-SPF: pass (pb1.pair.com: domain gmail.com designates 209.85.160.182 as permitted sender) X-PHP-List-Original-Sender: yohgaki@gmail.com X-Host-Fingerprint: 209.85.160.182 mail-yk0-f182.google.com Received: from [209.85.160.182] ([209.85.160.182:35364] helo=mail-yk0-f182.google.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 34/21-28185-A5738A65 for ; Tue, 26 Jan 2016 22:19:55 -0500 Received: by mail-yk0-f182.google.com with SMTP id y137so3228547yka.2 for ; Tue, 26 Jan 2016 19:19:54 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc:content-type; bh=ctnWv5LJ4WMAstjIibOalfjQFk1rrHn6tVBXkRzJaI0=; b=BmGQJtGxG7A/XuZVJqMDtlPV//nGzY0vl9f/F2/V0LXTMjGGNOKVruZd9LL9ahfnt2 SgZl5W5FbpPlINtvRlMYi8vuZWw/2nnX4gKmNsjOB/GUo1NxD8SFyoQGPPKk3Rkvq6kU sICUejyNGN8EwC7zCh1dv1c58ydtXoX4mgT77HeCOmvhNWzzSnCI5cXEbe/QJY1W40tT r6vyxXovzZwEs6Y+tqYfFIG29AOIKcRDMzEKjMHhgYUw3geo0/IQxGWgcIxy4CIz8JDf BuTfRhK2qu6cDeCvnZqMhd2hQe48mI2aBsh+vcaWLQLNTVryfoyTZLSCOB9e/yHbxqp2 r+MA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:sender:in-reply-to:references:from :date:message-id:subject:to:cc:content-type; bh=ctnWv5LJ4WMAstjIibOalfjQFk1rrHn6tVBXkRzJaI0=; b=H3QFAltxwJvmE+qBygiNY2+PK5PBCRYDFAUg5ps3TCRM04sg/qBXSilRMR+iMVGnb1 +HQeN2g/O6T+bu87ARpAAuV1ORfDy2cLs9k88I6hdd8juCDVUULHGSHTAoBxd+OKp9tI PUuMmqGVwq8tQ9TiWsbswUoshvcF7mu+skyQ+5g3CXxUCjPIIA/26zvJdBMpdLR26/8t cMvj44XHrijMXnZ0dgOoV8zUshwTdLn/WBOUsaI/2NZ9gqh8uFmHfytvPz2WcEqR2ZNE oIVb5BCHFs/FRZqUw1jikfJKBQvfziAigsZNNGWcjiNuAtxK2fGI3VTMQczNMAq0gYC1 qAZw== X-Gm-Message-State: AG10YORrSYMUzOq4pxM1i0W8WkiJOJytucIpaKsghPzLiec42Z44Q6K7VedYQXa7NOsQGaZzfJDhUrc2qbWSEA== X-Received: by 10.37.231.198 with SMTP id e189mr14186859ybh.130.1453864791748; Tue, 26 Jan 2016 19:19:51 -0800 (PST) MIME-Version: 1.0 Sender: yohgaki@gmail.com Received: by 10.129.88.139 with HTTP; Tue, 26 Jan 2016 19:19:12 -0800 (PST) In-Reply-To: <56A825A9.9020706@gmail.com> References: <03a501d15439$fcbf9ca0$f63ed5e0$@php.net> <56A1054A.5080102@fedoraproject.org> <56A2069B.2050007@fedoraproject.org> <56A21D68.6030403@fedoraproject.org> <56A825A9.9020706@gmail.com> Date: Wed, 27 Jan 2016 12:19:12 +0900 X-Google-Sender-Auth: Gu4y0V6tap1TSNb1dx7nk_OQNVo Message-ID: To: Stanislav Malyshev Cc: Remi Collet , "internals@lists.php.net" , Yasuo Ohgaki Content-Type: text/plain; charset=UTF-8 Subject: Re: [PHP-DEV] PHP 7.0.3 RC1 is available for testing - **** BC break *** From: yohgaki@ohgaki.net (Yasuo Ohgaki) Hi all, On Wed, Jan 27, 2016 at 11:04 AM, Stanislav Malyshev wrote: > >>> It seems that using a user land SessionHandler, the "write" method >>> is not called, raising this issue. >> >> Attached as .phpt > > Bisecting with this test shows a15e9ccba8a34553c029fb4574edba87c76447e5 > as the breaking change. So we need to either fix it (this week, as next > week it should be released) or revert this patch. Note for this issue. The change does not breaks normal codes as PHP cannot set new session ID when header is already sent. The session is _not_ accessible anyway. Not writing orphaned session does not matter at all. If you understand exactly what is happening, it is understandable this is not a BC for production code, but only breaks test code that inspect session behaviors and it found out bogus write() is gone now. Anyway, to fix existing app/framework unit test failures, (it's not fixing anything but leave bogus write(), though) removing php_session_abort() from php_session_cache_limitter() should be enough. Regards, -- Yasuo Ohgaki yohgaki@ohgaki.net