Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:90965 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 12074 invoked from network); 27 Jan 2016 05:45:19 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 27 Jan 2016 05:45:19 -0000 Authentication-Results: pb1.pair.com header.from=smalyshev@gmail.com; sender-id=pass Authentication-Results: pb1.pair.com smtp.mail=smalyshev@gmail.com; spf=pass; sender-id=pass Received-SPF: pass (pb1.pair.com: domain gmail.com designates 209.85.192.181 as permitted sender) X-PHP-List-Original-Sender: smalyshev@gmail.com X-Host-Fingerprint: 209.85.192.181 mail-pf0-f181.google.com Received: from [209.85.192.181] ([209.85.192.181:36343] helo=mail-pf0-f181.google.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 7A/42-28185-F6958A65 for ; Wed, 27 Jan 2016 00:45:19 -0500 Received: by mail-pf0-f181.google.com with SMTP id n128so111841658pfn.3 for ; Tue, 26 Jan 2016 21:45:19 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=subject:to:references:cc:from:message-id:date:user-agent :mime-version:in-reply-to:content-type:content-transfer-encoding; bh=PJL0JA6rUWBKQ1uDu9kc8G/pHxUBBLp/bmBAHNsoZRw=; b=mW4OUIItIPqaRB5ypYpppaK6WZ2rgTNhOYA581rQorlAU3kG3AJ75Z78mTYuuLd0Hv HHJEze57vT2wVpF3b1lw8C8hrbkF4EL1to7j1omczzTzyLcUgqO7Z6dTocxBTNRCAzEq vqY2JtTUCe4Q8HDZ5eMOEMeMqJWOk8YFlXJAr0OnEDyZMe+Na3Ml4QBa+N4l7423Jtz1 DPZEwI1u7e8+i7OJGegy9Ta2OvyZpKznV+61MsMMPGVSm1fPKsvhbfbRfBh7zwUcizc9 nY3pvy305L4TcqvUE8ZSRwc0L+lYbWjLPQvwQ6G88qXHW30gWdiE4ckJRjyp5+7wOKmG F68w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:subject:to:references:cc:from:message-id:date :user-agent:mime-version:in-reply-to:content-type :content-transfer-encoding; bh=PJL0JA6rUWBKQ1uDu9kc8G/pHxUBBLp/bmBAHNsoZRw=; b=cun+63jy9KdzBkQGlMF2IswLcP0gkSzieAKokEq0zr2o5Zg2qgrLUhumTbFoZvrrcJ qCWD4UhIKCbLADxlX60fmke1TQmZaYPfAbnWfIALMWk9YtcGQxxll5IbqkZVL/HO/6xC stC7HKKZYNitpc/HSodbaffgJ7LlRN3f8KhdoI/uByXQwQ8eoo6vr2HPnUgSl2pXEJuV BIjC/qhI8h9q4b08Yn+kX5oIuj55gmdqytpTmY7TvGbsQ6ickgqD0G89vqo33rSgN1rx 82Hcy+wKRJlfY1ZqliYtMPiRBKOLuqDZ4/VyysWcFkukXWL3d519RkYtcmbQYmn7zGzR cJeg== X-Gm-Message-State: AG10YORNgDnzAsAtHFk8XowMFCJnKKktldarHpprm1VxW6ltkr3fHWOB0+mEU9uHAg9TdQ== X-Received: by 10.98.40.131 with SMTP id o125mr39978213pfo.83.1453873515704; Tue, 26 Jan 2016 21:45:15 -0800 (PST) Received: from Stas-Air.local (76-220-46-95.lightspeed.sntcca.sbcglobal.net. [76.220.46.95]) by smtp.gmail.com with ESMTPSA id w85sm5676456pfi.13.2016.01.26.21.45.13 (version=TLSv1/SSLv3 cipher=OTHER); Tue, 26 Jan 2016 21:45:14 -0800 (PST) To: Yasuo Ohgaki References: <03a501d15439$fcbf9ca0$f63ed5e0$@php.net> <56A1054A.5080102@fedoraproject.org> <56A2069B.2050007@fedoraproject.org> <56A21D68.6030403@fedoraproject.org> <56A825A9.9020706@gmail.com> Cc: Remi Collet , "internals@lists.php.net" , Yasuo Ohgaki X-Enigmail-Draft-Status: N1110 Message-ID: <56A85967.4090603@gmail.com> Date: Tue, 26 Jan 2016 21:45:11 -0800 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.4.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Subject: Re: [PHP-DEV] PHP 7.0.3 RC1 is available for testing - **** BC break *** From: smalyshev@gmail.com (Stanislav Malyshev) Hi! > Note for this issue. > The change does not breaks normal codes as PHP cannot set new session > ID when header is already sent. The session is _not_ accessible > anyway. Not writing orphaned session does not matter at all. So it looks like this particular breakage is because write does not happen when cookies could not be sent. However, it is not necessarily true that session is not accessible in this case - session ID can be passed by other means, not only via cookies, and it also may be existing session ID. The second part of this test opens session with known ID, but write still does not happen. I think assuming that if cookie sending failed then the whole session failed is dangerous. Also, removing session write is a pretty serious change, I'm not sure this should be happening in a stable version. > If you understand exactly what is happening, it is understandable this > is not a BC for production code, but only breaks test code that > inspect session behaviors and it found out bogus write() is gone now.> > Anyway, to fix existing app/framework unit test failures, (it's not > fixing anything but leave bogus write(), though) > removing php_session_abort() from php_session_cache_limitter() should be enough. Yes, this patch: https://gist.github.com/smalyshev/4d8435b7993bef80c0ed fixes it for me. Remi, could you check that it also fixes the failures in the test suites? -- Stas Malyshev smalyshev@gmail.com