Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:97009 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 28279 invoked from network); 19 Nov 2016 00:03:16 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 19 Nov 2016 00:03:16 -0000 Authentication-Results: pb1.pair.com smtp.mail=markus@fischer.name; spf=permerror; sender-id=unknown Authentication-Results: pb1.pair.com header.from=markus@fischer.name; sender-id=unknown Received-SPF: error (pb1.pair.com: domain fischer.name from 62.179.121.155 cause and error) X-PHP-List-Original-Sender: markus@fischer.name X-Host-Fingerprint: 62.179.121.155 vie01a-dmta-pe01-2.mx.upcmail.net Received: from [62.179.121.155] ([62.179.121.155:52396] helo=vie01a-dmta-pe01-2.mx.upcmail.net) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 9B/80-24806-FB69F285 for ; Fri, 18 Nov 2016 19:03:12 -0500 Received: from [172.31.216.43] (helo=vie01a-pemc-psmtp-pe01) by vie01a-dmta-pe01.mx.upcmail.net with esmtp (Exim 4.87) (envelope-from ) id 1c7t7b-0005t9-DG for internals@lists.php.net; Sat, 19 Nov 2016 01:03:07 +0100 Received: from mail02.home ([213.47.8.56]) by vie01a-pemc-psmtp-pe01 with SMTP @ mailcloud.upcmail.net id 9c351u00k1CY7x901c36Y3; Sat, 19 Nov 2016 01:03:07 +0100 X-SourceIP: 213.47.8.56 Received: from [192.168.1.220] by mail02.home with esmtp (Exim 4.72) (envelope-from ) id 1c7t7Z-0005Dv-16 for internals@lists.php.net; Sat, 19 Nov 2016 01:03:05 +0100 To: internals@lists.php.net References: Message-ID: <507c801d-1442-c6c6-581c-16ced9d35a53@fischer.name> Date: Sat, 19 Nov 2016 01:02:59 +0100 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.4.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-Spam_score: -2.9 X-Spam_score_int: -28 X-Spam_bar: -- X-Spam_report: Spam detection software, running on the system "scanner01.home", has identified this incoming email as possible spam. The original message has been attached to this so you can view it (if it isn't spam) or label similar future email. If you have any questions, see the administrator of that system for details. Content preview: Hello, On 17.11.2016 11:55, Yasuo Ohgaki wrote: > > Session module implements serialize handler as module. > This RFC is to expose it to user space. > > RFC > https://wiki.php.net/rfc/user_defined_session_serializer > > PR > https://github.com/php/php-src/pull/2205 > > Comments are appreciated! [...] Content analysis details: (-2.9 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- -1.0 ALL_TRUSTED Passed through trusted hosts only via SMTP -1.9 BAYES_00 BODY: Bayes spam probability is 0 to 1% [score: 0.0000] Subject: Re: [PHP-DEV] [RFC DISCUSSION] User defined session serializer From: markus@fischer.name (Markus Fischer) Hello, On 17.11.2016 11:55, Yasuo Ohgaki wrote: > > Session module implements serialize handler as module. > This RFC is to expose it to user space. > > RFC > https://wiki.php.net/rfc/user_defined_session_serializer > > PR > https://github.com/php/php-src/pull/2205 > > Comments are appreciated! Well, I like it. It's sometimes necessary to share session state with non-PHP application and this is IMHO a welcome addition to ease the exchange. Btw, what is the proper way to signal a problem during serialization/unserialization? I couldn't figure it out from the RFC nor the PR and there doesn't seem to be a test case for it. Return null/false? Throw an exception? thanks, - Markus