Hello Andi,
> I don't see why this attack is directed at Zend people working on PHP,
> where the release process is completely a community driven effort (and
> last time I checked, no enterprise was involved in that process either).
Well I don't see why Zend people commit code that obviously broke a key
functionality without testing it. And then Zend people come out under
the trees and speak up that our testers are doing bad jobs. It is true
that obviously NOONE has tested the code, because otherwise it would
have been seen instantly.

> Ilia for one works hard and does his best (probably better than any
> release manager before him) to juggle between the various issues and
> priorities of each release.
Andi, I was not speaking against Ilia. I know that he does a job that
actually noone really likes todo. The problems with 5.1.x releases have
to be blamed on other parties. Maybe you can say it was his fault that
this stupid .phar was not in the archive, but the bigger fault is the
lack of a sense of basic security principles. From my point of view it
is unbelievable how someone can add a 'wget pear.php.net/bla...' to the
'make install' process. Of course this is not triggered if the .phar
file is packaged, but this fallback is insane.

And Ilia has also nothing todo with the lack of a PHP 4.4.3 release.

Yours,
Stefan Esser

-- 
PHP Internals - PHP Runtime Development Mailing List
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to