Am 24.07.2012 18:46, schrieb Lester Caine:
Sebastian Krebs wrote:
Hi,
I'm using Ubuntu, but here you can update the "system packages" with
the pear
executable too
$ sudo pear update-channels && sudo pear upgrade --alldeps
The question is - Is the result E_STRICT safe?
Would say: Depends on the package you use. I don't use PEAR-packages
myself, thus I don't really know. I would say: Try it out :) Test it on
your dev-machine, or within a vm and nothing can break.
I've got what I think is the latest from SUSE12.1 but with PHP5.4 I have
to disable E_STRICT again in order to use anything from it ...
Regards,
Sebastian
Am 24.07.2012 17:05, schrieb Lester Caine:
Not sure the best place to ask this ...
I've worked through all of my own codebase to eliminate E_STRICT
warnings/errors and now I'm working on the more basic ones coming from
PEAR such as
PHP Strict Standards: Non-static method PEAR::isError() should not be
called statically
Since these are installed by the distribution, in my case SUSE12.1, is
there a better version to download that is E_STRICT clean? Or o I h2ve
to work through that as well for the modules that the third party
libraries are picking up?
--
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php